class ActiveSupport::MessageVerifier

def verified(signed_message, purpose: nil, **)

verifier.verified(incompatible_message) # => TypeError: incompatible marshal file format
incompatible_message = "test--dad7b06c94abba8d46a15fafaef56c327665d5ff"

Raises any error raised while decoding the signed message.

verifier.verified(invalid_message) # => nil
invalid_message = "f--46a0120593880c733a53b6dad75b42ddc1c8996d"

Returns +nil+ if the message is not Base64-encoded.

other_verifier.verified(signed_message) # => nil
other_verifier = ActiveSupport::MessageVerifier.new 'd1ff3r3nt-s3Krit'

Returns +nil+ if the message was not signed with the same secret.

verifier.verified(signed_message) # => 'a private message'
signed_message = verifier.generate 'a private message'

verifier = ActiveSupport::MessageVerifier.new 's3Krit'

Decodes the signed message using the +MessageVerifier+'s secret.
def verified(signed_message, purpose: nil, **)
  if valid_message?(signed_message)
    begin
      data = signed_message.split("--")[0]
      message = Messages::Metadata.verify(decode(data), purpose)
      @serializer.load(message) if message
    rescue ArgumentError => argument_error
      return if argument_error.message.include?("invalid base64")
      raise
    end
  end
end