-
-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Boring SSL update #31
Conversation
@tanner0101 this test is failing on master too - looks like there might actually be a bug. From the brief look at it, it's looks like the payload is correct but the header and signature are different |
Looks like the JWT header key sorting changed. So a bug in the test technically. I set the header encoder to sort keys but I'm not sure that's the right solution. The keys don't really need to be sorted and that costs cpu time. Really the deterministic encoding just makes testing easier, so this should probably go behind some sort of flag. Or the tests should be refactored to not care about JSON ordering. Thoughts? |
Yeah I agree having the header keys sorted in prod code is not the way forward. My preference would be to refactor the tests so that they don't care about JSON ordering - since this is what happens in real life. As a first pass to get this and #32 unblocked we could check both variants in the test. Since there are only two keys there are only two possible values so it's not unreasonable |
These changes are now available in 4.0.0-rc.1.6 |
Brings in the latest version of BoringSSL (#31).