We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Here is an example test case:
import { getAddress } from "@ethersproject/address" // ... it('handles ES256K-R algorithm with checksum address in blockchainAccountId', async () => { expect.assertions(1) const verificationMethod = { id: `${did}#keys-1`, type: 'EcdsaSecp256k1RecoveryMethod2020', owner: did, blockchainAccountId: `eip155:1:${getAddress(address)}`, // use checksum address (mixed case) } const ethResolver = { resolve: jest.fn().mockReturnValue({ didDocument: { id: did, verificationMethod: [ verificationMethod ], }, }), } const jwt = await createJWT({ hello: 'world' }, { issuer: aud, signer: recoverySigner, alg: 'ES256K-R' }) const result = await verifyJWT(jwt, { resolver: ethResolver }) return expect(result.signer).toEqual(verificationMethod) })
The test should pass
The test from above fails with invalid signature for JWT
invalid signature for JWT
The failure is likely caused by a case comparison of strings
The text was updated successfully, but these errors were encountered:
fix: ES256K-R verification with checksumAddress in eip155 blockchainA…
dcbd0b9
…ccountId (#232) fixes #231
chore(release): 6.1.2 [skip ci]
9c6e084
## [6.1.2](6.1.1...6.1.2) (2022-06-06) ### Bug Fixes * ES256K-R verification with checksumAddress in eip155 blockchainAccountId ([#232](#232)) ([dcbd0b9](dcbd0b9)), closes [#231](#231)
🎉 This issue has been resolved in version 6.1.2 🎉
The release is available on:
Your semantic-release bot 📦🚀
Sorry, something went wrong.
mirceanis
Successfully merging a pull request may close this issue.
Current Behavior
Here is an example test case:
Expected Behavior
The test should pass
Failure Information
The test from above fails with
invalid signature for JWT
The failure is likely caused by a case comparison of strings
The text was updated successfully, but these errors were encountered: