aca-omniauth-jwt-blocking 1.1.1

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 4b69fce672717357d20170c846953e53acbfb6dc
4
+ data.tar.gz: 1e0d6752b55b584fe86e6d6ba879d536716e93ef
5
+ SHA512:
6
+ metadata.gz: 1ac0d053244a14b7da8b6b9ba37eddea007ac6e573b05e72180e3f03835a1569832d3b079fe6e5e2aaae960989c5a5be5a31c52253d7fefd53d5ea4654e7dca4
7
+ data.tar.gz: 3e2152701d65f597216c819707e82eac4fce7bd17ecab9118815f7a41998f362a5f55eae291b110511df933aa5ecfa23f677899867326b707d28f71ccd1cb424
@@ -0,0 +1,18 @@
1
+ *.gem
2
+ *.rbc
3
+ .bundle
4
+ .config
5
+ .yardoc
6
+ Gemfile.lock
7
+ InstalledFiles
8
+ _yardoc
9
+ coverage
10
+ doc/
11
+ lib/bundler/man
12
+ pkg
13
+ rdoc
14
+ spec/reports
15
+ test/tmp
16
+ test/version_tmp
17
+ tmp
18
+ Gemfile.lock
data/.rspec ADDED
@@ -0,0 +1,2 @@
1
+ --color
2
+ --format progress
@@ -0,0 +1,6 @@
1
+ language: ruby
2
+ rvm:
3
+ - 2.0.0
4
+ - 1.9.3
5
+ - jruby-19mode
6
+ - rbx-19mode
data/Gemfile ADDED
@@ -0,0 +1,8 @@
1
+ source 'https://rubygems.org'
2
+
3
+ # Specify your gem's dependencies in omniauth-jwt.gemspec
4
+ gemspec
5
+
6
+ group :test, :development do
7
+ gem 'multi_json'
8
+ end
@@ -0,0 +1,8 @@
1
+ # A sample Guardfile
2
+ # More info at https://github.com/guard/guard#readme
3
+
4
+ guard :rspec do
5
+ watch(%r{^spec/.+_spec\.rb$})
6
+ watch(%r{^lib/(.+)\.rb$}) { |m| "spec/lib/#{m[1]}_spec.rb" }
7
+ watch('spec/spec_helper.rb') { "spec" }
8
+ end
@@ -0,0 +1,22 @@
1
+ Copyright (c) 2013 Michael Bleigh
2
+
3
+ MIT License
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining
6
+ a copy of this software and associated documentation files (the
7
+ "Software"), to deal in the Software without restriction, including
8
+ without limitation the rights to use, copy, modify, merge, publish,
9
+ distribute, sublicense, and/or sell copies of the Software, and to
10
+ permit persons to whom the Software is furnished to do so, subject to
11
+ the following conditions:
12
+
13
+ The above copyright notice and this permission notice shall be
14
+ included in all copies or substantial portions of the Software.
15
+
16
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
17
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
18
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
19
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
20
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
21
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
22
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
@@ -0,0 +1,85 @@
1
+ # OmniAuth::JWT
2
+
3
+ [![Build Status](https://travis-ci.org/mbleigh/omniauth-jwt.png)](https://travis-ci.org/mbleigh/omniauth-jwt)
4
+
5
+ [JSON Web Token](http://self-issued.info/docs/draft-ietf-oauth-json-web-token.html) (JWT) is a simple
6
+ way to send verified information between two parties online. This can be useful as a mechanism for
7
+ providing Single Sign-On (SSO) to an application by allowing an authentication server to send a validated
8
+ claim and log the user in. This is how [Zendesk does SSO](https://support.zendesk.com/entries/23675367-Setting-up-single-sign-on-with-JWT-JSON-Web-Token-),
9
+ for example.
10
+
11
+ OmniAuth::JWT provides a clean, simple wrapper on top of JWT so that you can easily implement this kind
12
+ of SSO either between your own applications or allow third parties to delegate authentication.
13
+
14
+ ## Installation
15
+
16
+ Add this line to your application's Gemfile:
17
+
18
+ gem 'omniauth-jwt'
19
+
20
+ And then execute:
21
+
22
+ $ bundle
23
+
24
+ Or install it yourself as:
25
+
26
+ $ gem install omniauth-jwt
27
+
28
+ ## Usage
29
+
30
+ You use OmniAuth::JWT just like you do any other OmniAuth strategy:
31
+
32
+ ```ruby
33
+ use OmniAuth::JWT, 'SHAREDSECRET', auth_url: 'http://example.com/login'
34
+ ```
35
+
36
+ The first parameter is the shared secret that will be used by the external authenticator to verify
37
+ that. You must also specify the `auth_url` option to tell the strategy where to redirect to log
38
+ in. Other available options are:
39
+
40
+ * **algorithm:** the algorithm to use to decode the JWT token. This is `HS256` by default but can
41
+ be set to anything supported by [ruby-jwt](https://github.com/progrium/ruby-jwt)
42
+ * **uid_claim:** this determines which claim will be used to uniquely identify the user. Defaults
43
+ to `email`
44
+ * **required_claims:** array of claims that are required to make this a valid authentication call.
45
+ Defaults to `['name', 'email']`
46
+ * **info_map:** array mapping claim values to info hash values. Defaults to mapping `name` and `email`
47
+ to the same in the info hash.
48
+ * **valid_within:** integer of how many seconds of time skew you will allow. Defaults to `nil`. If this
49
+ is set, the `iat` claim becomes required and must be within the specified number of seconds of the
50
+ current time. This helps to prevent replay attacks.
51
+
52
+ ### Authentication Process
53
+
54
+ When you authenticate through `omniauth-jwt` you can send users to `/auth/jwt` and it will redirect
55
+ them to the URL specified in the `auth_url` option. From there, the provider must generate a JWT
56
+ and send it to the `/auth/jwt/callback` URL as a "jwt" parameter:
57
+
58
+ /auth/jwt/callback?jwt=ENCODEDJWTGOESHERE
59
+
60
+ An example of how to do that in Sinatra:
61
+
62
+ ```ruby
63
+ require 'jwt'
64
+
65
+ get '/login/sso/other-app' do
66
+ # assuming the user is already logged in and this is available as current_user
67
+ claims = {
68
+ id: current_user.id,
69
+ name: current_user.name,
70
+ email: current_user.email,
71
+ iat: Time.now.to_i
72
+ }
73
+
74
+ payload = JWT.encode(claims, ENV['SSO_SECRET'])
75
+ redirect "http://other-app.com/auth/jwt/callback?jwt=#{payload}"
76
+ end
77
+ ```
78
+
79
+ ## Contributing
80
+
81
+ 1. Fork it
82
+ 2. Create your feature branch (`git checkout -b my-new-feature`)
83
+ 3. Commit your changes (`git commit -am 'Add some feature'`)
84
+ 4. Push to the branch (`git push origin my-new-feature`)
85
+ 5. Create new Pull Request
@@ -0,0 +1,6 @@
1
+ require "bundler/gem_tasks"
2
+ require "rspec/core/rake_task"
3
+
4
+ RSpec::Core::RakeTask.new
5
+
6
+ task :default => :spec
@@ -0,0 +1,11 @@
1
+ #!/usr/bin/env bash
2
+
3
+ set -e
4
+
5
+ echo "Building Gem"
6
+ rm -f pkg/*.gem
7
+
8
+ bundle install
9
+ bundle exec rake build
10
+
11
+ gem inabox --host $GEM_SERVER pkg/*.gem
@@ -0,0 +1,2 @@
1
+ require "omniauth/jwt/version"
2
+ require "omniauth/strategies/jwt"
@@ -0,0 +1,5 @@
1
+ module Omniauth
2
+ module JWT
3
+ VERSION = "1.1.1"
4
+ end
5
+ end
@@ -0,0 +1,129 @@
1
+ require 'omniauth'
2
+ require 'jwt'
3
+ require 'json'
4
+ require 'net/http'
5
+
6
+ module OmniAuth
7
+ module Strategies
8
+ class JWT
9
+ class ClaimInvalid < StandardError; end
10
+
11
+ include OmniAuth::Strategy
12
+
13
+ args [:app_token, :secret]
14
+
15
+ option :title, 'Vivant Authentication'
16
+ option :app_token, nil
17
+ option :secret, nil
18
+ option :algorithm, 'HS256'
19
+ option :uid_claim, 'id'
20
+ option :required_claims, %w(firstName lastName email)
21
+ option :info_map, {"name" => proc { |raw| "#{raw['firstName']} #{raw['lastName']}" }, "email" => "email"}
22
+ option :auth_url, nil
23
+ option :valid_within, nil
24
+
25
+
26
+ def request_phase
27
+ f = OmniAuth::Form.new(:title => (options[:title] || "LDAP Authentication"), :url => callback_path)
28
+ f.text_field 'Login', 'username'
29
+ f.password_field 'Password', 'password'
30
+ f.button "Sign In"
31
+ f.to_response
32
+ end
33
+
34
+ attr_reader :decoded
35
+
36
+ def callback_phase
37
+ return fail!(:missing_credentials) if missing_credentials?
38
+
39
+ if params['token'] && !params['token'].empty?
40
+ parse_token(params['token'])
41
+ super
42
+ else
43
+ req = {
44
+ username: params['username'],
45
+ password: params['password'],
46
+ appToken: options.app_token
47
+ }.to_json
48
+
49
+ http = Net::HTTP.new('api.internationaltowers.com', 443)
50
+ http.use_ssl = true
51
+
52
+ request = Net::HTTP::Post.new(options.auth_url)
53
+ request.body = req
54
+ request.content_type = 'application/json'
55
+ request['Authorization'] = "Bearer #{options.app_token}"
56
+
57
+ response = http.request(request)
58
+
59
+ if response.code == '200'
60
+ parse_token(JSON.parse(response.body)['userToken'])
61
+ super
62
+ else
63
+ fail! :invalid_credentials
64
+ end
65
+ end
66
+ rescue ClaimInvalid => e
67
+ fail! :claim_invalid, e
68
+ end
69
+
70
+ uid do
71
+ if options.uid_claim.is_a?(String)
72
+ decoded[options.uid_claim]
73
+ else
74
+ uid_lookup.uid(decoded)
75
+ end
76
+ end
77
+
78
+ extra do
79
+ {:raw_info => decoded}
80
+ end
81
+
82
+ info do
83
+ options.info_map.inject({}) do |h,(k,v)|
84
+ h[k.to_s] = v.respond_to?(:call) ? v.call(decoded) : decoded[v.to_s]
85
+ h
86
+ end
87
+ end
88
+
89
+ private
90
+
91
+ def secret
92
+ if options.secret.is_a?(String)
93
+ options.secret
94
+ else
95
+ secret_lookup.secret
96
+ end
97
+ end
98
+
99
+ def parse_token(data)
100
+ @decoded, _ = ::JWT.decode(data, secret, options.algorithm)
101
+ @decoded = @decoded['userInfo']
102
+
103
+ (options.required_claims || []).each do |field|
104
+ raise ClaimInvalid.new("Missing required '#{field}' claim.") if !@decoded.key?(field.to_s)
105
+ end
106
+ raise ClaimInvalid.new("Missing required 'iat' claim.") if options.valid_within && !@decoded["iat"]
107
+ raise ClaimInvalid.new("'iat' timestamp claim is too skewed from present.") if options.valid_within && (Time.now.to_i - @decoded["iat"]).abs > options.valid_within
108
+ end
109
+
110
+ def secret_lookup
111
+ @secret_lookup ||= options.secret.new(request)
112
+ end
113
+
114
+ def uid_lookup
115
+ @uid_lookup ||= options.uid_claim.new(request)
116
+ end
117
+
118
+ def params
119
+ request.params
120
+ end
121
+
122
+ def missing_credentials?
123
+ (params['username'].nil? || params['username'].empty? || params['password'].nil? || params['password'].empty?) && (params['token'].nil? || params['token'].empty?)
124
+ end
125
+ end
126
+
127
+ class Jwt < JWT; end
128
+ end
129
+ end
@@ -0,0 +1,30 @@
1
+ # coding: utf-8
2
+ lib = File.expand_path('../lib', __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require 'omniauth/jwt/version'
5
+
6
+ Gem::Specification.new do |spec|
7
+ spec.name = "aca-omniauth-jwt-blocking"
8
+ spec.version = Omniauth::JWT::VERSION
9
+ spec.authors = ["Michael Bleigh", "Tobias Haar"]
10
+ spec.email = ["mbleigh@mbleigh.com", "tobias.haar@sage.com"]
11
+ spec.description = %q{An OmniAuth strategy to accept JWT-based single sign-on.}
12
+ spec.summary = %q{An OmniAuth strategy to accept JWT-based single sign-on.}
13
+ spec.homepage = "http://github.com/Sage/omniauth-jwt"
14
+ spec.license = "MIT"
15
+
16
+ spec.files = `git ls-files`.split($/)
17
+ spec.executables = spec.files.grep(%r{^bin/}) { |f| File.basename(f) }
18
+ spec.test_files = spec.files.grep(%r{^(test|spec|features)/})
19
+ spec.require_paths = ["lib"]
20
+
21
+ spec.add_development_dependency "bundler", "~> 1.3"
22
+ spec.add_development_dependency "rake"
23
+ spec.add_development_dependency "rspec"
24
+ spec.add_development_dependency "guard"
25
+ spec.add_development_dependency "guard-rspec"
26
+ spec.add_development_dependency "rack-test"
27
+
28
+ spec.add_dependency "jwt", "~> 1.0"
29
+ spec.add_dependency "omniauth", "~> 1.1"
30
+ end
@@ -0,0 +1,96 @@
1
+ require 'spec_helper'
2
+ require 'multi_json'
3
+
4
+ class TestLookup
5
+ def initialize(request)
6
+ @request = request
7
+ end
8
+
9
+ def secret
10
+ "test_secret"
11
+ end
12
+
13
+ def uid(decoded)
14
+ "foo"
15
+ end
16
+ end
17
+
18
+ describe OmniAuth::Strategies::JWT do
19
+ let(:response_json){ MultiJson.load(last_response.body) }
20
+ let(:args){ ['imasecret', {auth_url: 'http://example.com/login'}] }
21
+
22
+ let(:app){
23
+ the_args = args
24
+ Rack::Builder.new do |b|
25
+ b.use Rack::Session::Cookie, secret: 'sekrit'
26
+ b.use OmniAuth::Strategies::JWT, *the_args
27
+ b.run lambda{|env| [200, {}, [(env['omniauth.auth'] || {}).to_json]]}
28
+ end
29
+ }
30
+
31
+ context "when lookup class is defined" do
32
+ let(:args) { [TestLookup, {:uid_claim => TestLookup}] }
33
+
34
+ it "uses the provided class to lookup the key" do
35
+ encoded = JWT.encode({name: 'Bob', email: 'steve@example.com'}, "test_secret")
36
+ get '/auth/jwt/callback?jwt=' + encoded
37
+ expect(response_json["info"]["email"]).to eq("steve@example.com")
38
+ end
39
+
40
+ it "provides a UID for the signatory" do
41
+ encoded = JWT.encode({name: 'Bob', email: 'steve@example.com'}, "test_secret")
42
+ get '/auth/jwt/callback?jwt=' + encoded
43
+ expect(response_json["uid"]).to eq('foo')
44
+ end
45
+ end
46
+
47
+ context 'request phase' do
48
+ it 'should redirect to the configured login url' do
49
+ get '/auth/jwt'
50
+ expect(last_response.status).to eq(302)
51
+ expect(last_response.headers['Location']).to eq('http://example.com/login')
52
+ end
53
+ end
54
+
55
+ context 'callback phase' do
56
+ it 'should decode the response' do
57
+ encoded = JWT.encode({name: 'Bob', email: 'steve@example.com'}, 'imasecret')
58
+ get '/auth/jwt/callback?jwt=' + encoded
59
+ expect(response_json["info"]["email"]).to eq("steve@example.com")
60
+ end
61
+
62
+ it 'should not work without required fields' do
63
+ encoded = JWT.encode({name: 'Steve'}, 'imasecret')
64
+ get '/auth/jwt/callback?jwt=' + encoded
65
+ expect(last_response.status).to eq(302)
66
+ end
67
+
68
+ it 'should assign the uid' do
69
+ encoded = JWT.encode({name: 'Steve', email: 'dude@awesome.com'}, 'imasecret')
70
+ get '/auth/jwt/callback?jwt=' + encoded
71
+ expect(response_json["uid"]).to eq('dude@awesome.com')
72
+ end
73
+
74
+ context 'with a :valid_within option set' do
75
+ let(:args){ ['imasecret', {auth_url: 'http://example.com/login', valid_within: 300}] }
76
+
77
+ it 'should work if the iat key is within the time window' do
78
+ encoded = JWT.encode({name: 'Ted', email: 'ted@example.com', iat: Time.now.to_i}, 'imasecret')
79
+ get '/auth/jwt/callback?jwt=' + encoded
80
+ expect(last_response.status).to eq(200)
81
+ end
82
+
83
+ it 'should not work if the iat key is outside the time window' do
84
+ encoded = JWT.encode({name: 'Ted', email: 'ted@example.com', iat: Time.now.to_i + 500}, 'imasecret')
85
+ get '/auth/jwt/callback?jwt=' + encoded
86
+ expect(last_response.status).to eq(302)
87
+ end
88
+
89
+ it 'should not work if the iat key is missing' do
90
+ encoded = JWT.encode({name: 'Ted', email: 'ted@example.com'}, 'imasecret')
91
+ get '/auth/jwt/callback?jwt=' + encoded
92
+ expect(last_response.status).to eq(302)
93
+ end
94
+ end
95
+ end
96
+ end
@@ -0,0 +1,24 @@
1
+ $:.unshift File.dirname(__FILE__) + "/../lib"
2
+ require 'rack/test'
3
+
4
+ require 'omniauth/jwt'
5
+ OmniAuth.config.logger = Logger.new('/dev/null')
6
+ # This file was generated by the `rspec --init` command. Conventionally, all
7
+ # specs live under a `spec` directory, which RSpec adds to the `$LOAD_PATH`.
8
+ # Require this file using `require "spec_helper"` to ensure that it is only
9
+ # loaded once.
10
+ #
11
+ # See http://rubydoc.info/gems/rspec-core/RSpec/Core/Configuration
12
+ RSpec.configure do |config|
13
+ config.treat_symbols_as_metadata_keys_with_true_values = true
14
+ config.run_all_when_everything_filtered = true
15
+ config.filter_run :focus
16
+
17
+ include Rack::Test::Methods
18
+
19
+ # Run specs in random order to surface order dependencies. If you find an
20
+ # order dependency and want to debug it, you can fix the order by providing
21
+ # the seed, which is printed after each run.
22
+ # --seed 1234
23
+ config.order = 'random'
24
+ end
metadata ADDED
@@ -0,0 +1,175 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: aca-omniauth-jwt-blocking
3
+ version: !ruby/object:Gem::Version
4
+ version: 1.1.1
5
+ platform: ruby
6
+ authors:
7
+ - Michael Bleigh
8
+ - Tobias Haar
9
+ autorequire:
10
+ bindir: bin
11
+ cert_chain: []
12
+ date: 2017-11-13 00:00:00.000000000 Z
13
+ dependencies:
14
+ - !ruby/object:Gem::Dependency
15
+ name: bundler
16
+ requirement: !ruby/object:Gem::Requirement
17
+ requirements:
18
+ - - "~>"
19
+ - !ruby/object:Gem::Version
20
+ version: '1.3'
21
+ type: :development
22
+ prerelease: false
23
+ version_requirements: !ruby/object:Gem::Requirement
24
+ requirements:
25
+ - - "~>"
26
+ - !ruby/object:Gem::Version
27
+ version: '1.3'
28
+ - !ruby/object:Gem::Dependency
29
+ name: rake
30
+ requirement: !ruby/object:Gem::Requirement
31
+ requirements:
32
+ - - ">="
33
+ - !ruby/object:Gem::Version
34
+ version: '0'
35
+ type: :development
36
+ prerelease: false
37
+ version_requirements: !ruby/object:Gem::Requirement
38
+ requirements:
39
+ - - ">="
40
+ - !ruby/object:Gem::Version
41
+ version: '0'
42
+ - !ruby/object:Gem::Dependency
43
+ name: rspec
44
+ requirement: !ruby/object:Gem::Requirement
45
+ requirements:
46
+ - - ">="
47
+ - !ruby/object:Gem::Version
48
+ version: '0'
49
+ type: :development
50
+ prerelease: false
51
+ version_requirements: !ruby/object:Gem::Requirement
52
+ requirements:
53
+ - - ">="
54
+ - !ruby/object:Gem::Version
55
+ version: '0'
56
+ - !ruby/object:Gem::Dependency
57
+ name: guard
58
+ requirement: !ruby/object:Gem::Requirement
59
+ requirements:
60
+ - - ">="
61
+ - !ruby/object:Gem::Version
62
+ version: '0'
63
+ type: :development
64
+ prerelease: false
65
+ version_requirements: !ruby/object:Gem::Requirement
66
+ requirements:
67
+ - - ">="
68
+ - !ruby/object:Gem::Version
69
+ version: '0'
70
+ - !ruby/object:Gem::Dependency
71
+ name: guard-rspec
72
+ requirement: !ruby/object:Gem::Requirement
73
+ requirements:
74
+ - - ">="
75
+ - !ruby/object:Gem::Version
76
+ version: '0'
77
+ type: :development
78
+ prerelease: false
79
+ version_requirements: !ruby/object:Gem::Requirement
80
+ requirements:
81
+ - - ">="
82
+ - !ruby/object:Gem::Version
83
+ version: '0'
84
+ - !ruby/object:Gem::Dependency
85
+ name: rack-test
86
+ requirement: !ruby/object:Gem::Requirement
87
+ requirements:
88
+ - - ">="
89
+ - !ruby/object:Gem::Version
90
+ version: '0'
91
+ type: :development
92
+ prerelease: false
93
+ version_requirements: !ruby/object:Gem::Requirement
94
+ requirements:
95
+ - - ">="
96
+ - !ruby/object:Gem::Version
97
+ version: '0'
98
+ - !ruby/object:Gem::Dependency
99
+ name: jwt
100
+ requirement: !ruby/object:Gem::Requirement
101
+ requirements:
102
+ - - "~>"
103
+ - !ruby/object:Gem::Version
104
+ version: '1.0'
105
+ type: :runtime
106
+ prerelease: false
107
+ version_requirements: !ruby/object:Gem::Requirement
108
+ requirements:
109
+ - - "~>"
110
+ - !ruby/object:Gem::Version
111
+ version: '1.0'
112
+ - !ruby/object:Gem::Dependency
113
+ name: omniauth
114
+ requirement: !ruby/object:Gem::Requirement
115
+ requirements:
116
+ - - "~>"
117
+ - !ruby/object:Gem::Version
118
+ version: '1.1'
119
+ type: :runtime
120
+ prerelease: false
121
+ version_requirements: !ruby/object:Gem::Requirement
122
+ requirements:
123
+ - - "~>"
124
+ - !ruby/object:Gem::Version
125
+ version: '1.1'
126
+ description: An OmniAuth strategy to accept JWT-based single sign-on.
127
+ email:
128
+ - mbleigh@mbleigh.com
129
+ - tobias.haar@sage.com
130
+ executables: []
131
+ extensions: []
132
+ extra_rdoc_files: []
133
+ files:
134
+ - ".gitignore"
135
+ - ".rspec"
136
+ - ".travis.yml"
137
+ - Gemfile
138
+ - Guardfile
139
+ - LICENSE.txt
140
+ - README.md
141
+ - Rakefile
142
+ - ci/deploy-gems.sh
143
+ - lib/omniauth/jwt.rb
144
+ - lib/omniauth/jwt/version.rb
145
+ - lib/omniauth/strategies/jwt.rb
146
+ - omniauth-jwt.gemspec
147
+ - spec/lib/omniauth/strategies/jwt_spec.rb
148
+ - spec/spec_helper.rb
149
+ homepage: http://github.com/Sage/omniauth-jwt
150
+ licenses:
151
+ - MIT
152
+ metadata: {}
153
+ post_install_message:
154
+ rdoc_options: []
155
+ require_paths:
156
+ - lib
157
+ required_ruby_version: !ruby/object:Gem::Requirement
158
+ requirements:
159
+ - - ">="
160
+ - !ruby/object:Gem::Version
161
+ version: '0'
162
+ required_rubygems_version: !ruby/object:Gem::Requirement
163
+ requirements:
164
+ - - ">="
165
+ - !ruby/object:Gem::Version
166
+ version: '0'
167
+ requirements: []
168
+ rubyforge_project:
169
+ rubygems_version: 2.6.14
170
+ signing_key:
171
+ specification_version: 4
172
+ summary: An OmniAuth strategy to accept JWT-based single sign-on.
173
+ test_files:
174
+ - spec/lib/omniauth/strategies/jwt_spec.rb
175
+ - spec/spec_helper.rb