access_token_agent 3.1.0 → 3.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.gitignore +6 -0
- data/.rubocop.yml +44 -0
- data/.ruby-version +1 -0
- data/.travis.yml +4 -0
- data/CHANGELOG.md +25 -0
- data/Gemfile +5 -0
- data/LICENSE.md +21 -0
- data/README.md +64 -0
- data/access_token_agent.gemspec +24 -0
- data/lib/access_token_agent/connection_error.rb +7 -0
- data/lib/access_token_agent/connector.rb +53 -0
- data/lib/access_token_agent/error.rb +2 -0
- data/lib/access_token_agent/invalid_token_type_error.rb +5 -0
- data/lib/access_token_agent/token.rb +21 -0
- data/lib/access_token_agent/unauthorized_error.rb +7 -0
- metadata +17 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: dc26e506a5e724e2f3fb483ffb8a8b7b74447e35
|
4
|
+
data.tar.gz: 31cce846d3c53a66737d2f5cb603dcf269ea3119
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 560a1ce6c00cf31738b7d3c2d6ae7ee2ef0b9b9857e01aa620d299197f8cdba74daaf031a2cb5b7eee60d4f6c77e5f581ed86ed9e1a1279fb5ac83132d9a91a1
|
7
|
+
data.tar.gz: e5afd37637915dbe189fe7630b3b092e8cb588262f8c64167685711f9e2e0dc644bbbd08fc2f5d02a9333c35566dc5da2f36e29e17e607bdb20acd808cc17af5
|
data/.gitignore
ADDED
data/.rubocop.yml
ADDED
@@ -0,0 +1,44 @@
|
|
1
|
+
AllCops:
|
2
|
+
TargetRubyVersion: 2.1
|
3
|
+
Exclude:
|
4
|
+
- 'db/schema.rb'
|
5
|
+
- 'doc/**/*'
|
6
|
+
- 'Gemfile'
|
7
|
+
- '*.gemspec'
|
8
|
+
|
9
|
+
Style/AsciiComments:
|
10
|
+
Enabled: false
|
11
|
+
|
12
|
+
Style/Documentation:
|
13
|
+
Enabled: false
|
14
|
+
|
15
|
+
# Encoding comments are not neccessary in all 2.x versions of ruby, since
|
16
|
+
# UTF-8 has become the default encoding.
|
17
|
+
Style/Encoding:
|
18
|
+
EnforcedStyle: never
|
19
|
+
Enabled: true
|
20
|
+
|
21
|
+
# This cop tries to make you use module_funtion instead of extend self
|
22
|
+
# This is bad because both have their own use-case and should not be used
|
23
|
+
# and sometimes cannot be used to do the same thing
|
24
|
+
Style/ModuleFunction:
|
25
|
+
Enabled: false
|
26
|
+
# While it is very often useful to separate numbers after every three digits
|
27
|
+
# for readability, this mostly doesn't make sense if the number doesn't
|
28
|
+
# represent an amount but rather an identifier. Thus the use of underscores
|
29
|
+
# every three digits is recommended but not enforced.
|
30
|
+
Style/NumericLiterals:
|
31
|
+
Enabled: false
|
32
|
+
|
33
|
+
# Do not force the same one letter variable names for all occurences of inject
|
34
|
+
Style/SingleLineBlockParams:
|
35
|
+
Enabled: false
|
36
|
+
|
37
|
+
# No significant improvement in speed or memory usage apparent. Readability is
|
38
|
+
# atrocious.
|
39
|
+
Performance/Casecmp:
|
40
|
+
Enabled: false
|
41
|
+
|
42
|
+
# Not safe in a rails context, since Relation.count is != Enumerable.count
|
43
|
+
Performance/Count:
|
44
|
+
Enabled: false
|
data/.ruby-version
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
2.1.10
|
data/.travis.yml
ADDED
data/CHANGELOG.md
ADDED
@@ -0,0 +1,25 @@
|
|
1
|
+
## 3.1.1
|
2
|
+
|
3
|
+
- Fix broken gem release (missing files)
|
4
|
+
|
5
|
+
## 3.1.0
|
6
|
+
|
7
|
+
- Raise `AccessTokenAgent::ConnectionError` if the auth service could not be reached.
|
8
|
+
|
9
|
+
## 3.0.0
|
10
|
+
|
11
|
+
- Rename fake_authenticate parameter to fake_auth
|
12
|
+
- This is compatible with the file format that AuthConnector already expects
|
13
|
+
|
14
|
+
## 2.0.1
|
15
|
+
|
16
|
+
- Remove obsolete class Credentials
|
17
|
+
|
18
|
+
## 2.0.0
|
19
|
+
|
20
|
+
- Rename base_uri parameter to host
|
21
|
+
- This is compatible with the file format that AuthConnector already expects
|
22
|
+
|
23
|
+
## 1.0.0
|
24
|
+
|
25
|
+
- initial Release
|
data/Gemfile
ADDED
data/LICENSE.md
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
MIT License
|
2
|
+
|
3
|
+
Copyright (c) 2016 Beko Käuferportal GmbH
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
7
|
+
in the Software without restriction, including without limitation the rights
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
10
|
+
furnished to do so, subject to the following conditions:
|
11
|
+
|
12
|
+
The above copyright notice and this permission notice shall be included in all
|
13
|
+
copies or substantial portions of the Software.
|
14
|
+
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
21
|
+
SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,64 @@
|
|
1
|
+
[](https://travis-ci.org/kaeuferportal/access_token_agent)
|
2
|
+
|
3
|
+
# AccessTokenAgent
|
4
|
+
|
5
|
+
Handles authentication against an OAuth2 provider.
|
6
|
+
|
7
|
+
Retrieves an access token from the authentication server using the
|
8
|
+
OAuth2 [client credentials flow](https://tools.ietf.org/html/rfc6749#section-4.4).
|
9
|
+
|
10
|
+
## Installation
|
11
|
+
|
12
|
+
Add this line to your application's Gemfile:
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
gem 'access_token_agent', '~> 3.1'
|
16
|
+
```
|
17
|
+
|
18
|
+
And then execute:
|
19
|
+
|
20
|
+
$ bundle
|
21
|
+
|
22
|
+
## Configuration
|
23
|
+
|
24
|
+
Create an instance of AccessTokenAgent::Connector with the desired
|
25
|
+
configuration and use that instance to authenticate.
|
26
|
+
|
27
|
+
Needs the following parameters:
|
28
|
+
|
29
|
+
* `host` - the server address where the auth provider is running.
|
30
|
+
* `client_id` - the client_id of the application using this gem.
|
31
|
+
* `client_secret` - the client_secret of the application using this gem.
|
32
|
+
|
33
|
+
Optional parameters:
|
34
|
+
|
35
|
+
* `fake_auth` - if true, do not connect to the auth service and return
|
36
|
+
an empty access token (`nil`).
|
37
|
+
|
38
|
+
### Example
|
39
|
+
|
40
|
+
```ruby
|
41
|
+
AccessTokenAgent::Connector.new(host: 'https://auth.kaeuferportal.de',
|
42
|
+
client_id: 'my_client',
|
43
|
+
client_secret: 'very_secure_and_secret')
|
44
|
+
```
|
45
|
+
|
46
|
+
## Usage
|
47
|
+
|
48
|
+
Setup an AcccessTokenAgent::Connector instance (see Configuration) and call
|
49
|
+
authenticate on it to receive your access_token.
|
50
|
+
|
51
|
+
```
|
52
|
+
@access_token_agent.authenticate
|
53
|
+
```
|
54
|
+
|
55
|
+
When no valid AccessToken is present a call to authenticate returns one of the
|
56
|
+
following:
|
57
|
+
- a Bearer Token if the credentials are valid (auth response code 200)
|
58
|
+
- raises an UnauthorizedError if the credentials are invalid (auth response
|
59
|
+
code 401)
|
60
|
+
- raises an Error if the auth response code is neither 200 nor 401
|
61
|
+
|
62
|
+
As long as a valid AccessToken is present a call to authenticate simply returns
|
63
|
+
that AccessToken. An AccessToken is valid for a limited time. The exact value is
|
64
|
+
determined by the auth response which contains an `expires_at` parameter.
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# coding: utf-8
|
2
|
+
|
3
|
+
Gem::Specification.new do |s|
|
4
|
+
s.name = 'access_token_agent'
|
5
|
+
s.version = '3.1.1'
|
6
|
+
s.date = '2016-04-08'
|
7
|
+
s.summary = 'Handles authentication against an OAuth2 provider'
|
8
|
+
s.homepage = 'https://github.com/kaeuferportal/access_token_agent'
|
9
|
+
s.description = 'Retrieves an access token from an OAuth2 provider' \
|
10
|
+
'using the supplied credentials.'
|
11
|
+
s.authors = ['Beko Käuferportal GmbH']
|
12
|
+
s.email = 'oss@kaeuferportal.de'
|
13
|
+
s.license = 'MIT'
|
14
|
+
s.files = `git ls-files -z`.split("\x0")
|
15
|
+
.reject { |f| f.match(%r{^spec/}) }
|
16
|
+
|
17
|
+
s.add_development_dependency 'bundler', '~> 1.11'
|
18
|
+
s.add_development_dependency 'rspec', '~> 3.4'
|
19
|
+
s.add_development_dependency 'pry', '~> 0.10'
|
20
|
+
s.add_development_dependency 'rubocop', '~> 0.39'
|
21
|
+
s.add_development_dependency 'vcr', '~> 3.0'
|
22
|
+
s.add_development_dependency 'webmock', '~> 1.24'
|
23
|
+
s.add_development_dependency 'simplecov', '~> 0.11'
|
24
|
+
end
|
@@ -0,0 +1,53 @@
|
|
1
|
+
require 'net/http'
|
2
|
+
|
3
|
+
module AccessTokenAgent
|
4
|
+
class Connector
|
5
|
+
def initialize(host:,
|
6
|
+
client_id:,
|
7
|
+
client_secret:,
|
8
|
+
fake_auth: false)
|
9
|
+
@host = host
|
10
|
+
@client_id = client_id
|
11
|
+
@client_secret = client_secret
|
12
|
+
@fake_auth = fake_auth
|
13
|
+
end
|
14
|
+
|
15
|
+
def authenticate
|
16
|
+
return if @fake_auth
|
17
|
+
fetch_token unless @known_token && @known_token.valid?
|
18
|
+
@known_token.value
|
19
|
+
end
|
20
|
+
|
21
|
+
def fetch_token
|
22
|
+
@known_token = Token.new(from_auth)
|
23
|
+
end
|
24
|
+
|
25
|
+
def from_auth
|
26
|
+
response = request
|
27
|
+
case response.code
|
28
|
+
when '200' then JSON.parse(response.body)
|
29
|
+
when '401' then raise UnauthorizedError
|
30
|
+
else
|
31
|
+
raise Error, "status: #{response.code}, body: #{response.body}"
|
32
|
+
end
|
33
|
+
rescue Errno::ECONNREFUSED
|
34
|
+
raise ConnectionError
|
35
|
+
end
|
36
|
+
|
37
|
+
def request
|
38
|
+
request = Net::HTTP::Post.new(auth_uri)
|
39
|
+
request.basic_auth @client_id, @client_secret
|
40
|
+
request.form_data = { 'grant_type' => 'client_credentials' }
|
41
|
+
use_tls = auth_uri.scheme == 'https'
|
42
|
+
Net::HTTP.start(auth_uri.hostname,
|
43
|
+
auth_uri.port,
|
44
|
+
use_ssl: use_tls) do |http|
|
45
|
+
http.request(request)
|
46
|
+
end
|
47
|
+
end
|
48
|
+
|
49
|
+
def auth_uri
|
50
|
+
@auth_uri ||= URI("#{@host}/oauth/token")
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
require 'access_token_agent/invalid_token_type_error'
|
2
|
+
|
3
|
+
module AccessTokenAgent
|
4
|
+
class Token
|
5
|
+
attr_reader :value, :expires_at
|
6
|
+
|
7
|
+
EXPIRY_MARGIN = 60 # seconds
|
8
|
+
|
9
|
+
def initialize(auth_response)
|
10
|
+
unless auth_response['token_type'] == 'bearer'
|
11
|
+
raise InvalidTokenTypeError, auth_response['token_type']
|
12
|
+
end
|
13
|
+
@value = auth_response['access_token']
|
14
|
+
@expires_at = Time.now + auth_response['expires_in']
|
15
|
+
end
|
16
|
+
|
17
|
+
def valid?
|
18
|
+
@expires_at - EXPIRY_MARGIN > Time.now
|
19
|
+
end
|
20
|
+
end
|
21
|
+
end
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: access_token_agent
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.1.
|
4
|
+
version: 3.1.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Beko Käuferportal GmbH
|
@@ -114,7 +114,22 @@ executables: []
|
|
114
114
|
extensions: []
|
115
115
|
extra_rdoc_files: []
|
116
116
|
files:
|
117
|
+
- ".gitignore"
|
118
|
+
- ".rubocop.yml"
|
119
|
+
- ".ruby-version"
|
120
|
+
- ".travis.yml"
|
121
|
+
- CHANGELOG.md
|
122
|
+
- Gemfile
|
123
|
+
- LICENSE.md
|
124
|
+
- README.md
|
125
|
+
- access_token_agent.gemspec
|
117
126
|
- lib/access_token_agent.rb
|
127
|
+
- lib/access_token_agent/connection_error.rb
|
128
|
+
- lib/access_token_agent/connector.rb
|
129
|
+
- lib/access_token_agent/error.rb
|
130
|
+
- lib/access_token_agent/invalid_token_type_error.rb
|
131
|
+
- lib/access_token_agent/token.rb
|
132
|
+
- lib/access_token_agent/unauthorized_error.rb
|
118
133
|
homepage: https://github.com/kaeuferportal/access_token_agent
|
119
134
|
licenses:
|
120
135
|
- MIT
|
@@ -135,7 +150,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
135
150
|
version: '0'
|
136
151
|
requirements: []
|
137
152
|
rubyforge_project:
|
138
|
-
rubygems_version: 2.
|
153
|
+
rubygems_version: 2.2.5
|
139
154
|
signing_key:
|
140
155
|
specification_version: 4
|
141
156
|
summary: Handles authentication against an OAuth2 provider
|