apill 3.1.3 → 4.0.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (59) hide show
  1. checksums.yaml +4 -4
  2. data/lib/apill/configuration.rb +2 -1
  3. data/lib/apill/errors/{invalid_api_request_error.rb → invalid_api_request.rb} +1 -1
  4. data/lib/apill/errors/{invalid_subdomain_error.rb → invalid_subdomain.rb} +1 -1
  5. data/lib/apill/errors/invalid_token.rb +21 -0
  6. data/lib/apill/matchers/accept_header.rb +13 -0
  7. data/lib/apill/matchers/{generic_matcher.rb → generic.rb} +5 -9
  8. data/lib/apill/matchers/{subdomain_matcher.rb → subdomain.rb} +3 -9
  9. data/lib/apill/matchers/{version_matcher.rb → version.rb} +4 -6
  10. data/lib/apill/middleware/api_request.rb +22 -21
  11. data/lib/apill/parameters/index.rb +1 -1
  12. data/lib/apill/parameters/page.rb +1 -1
  13. data/lib/apill/parameters/sort.rb +1 -1
  14. data/lib/apill/requests/base.rb +86 -10
  15. data/lib/apill/requests/rack.rb +34 -0
  16. data/lib/apill/requests/rails.rb +31 -0
  17. data/lib/apill/resource/model.rb +1 -1
  18. data/lib/apill/resource/processors/filtering.rb +2 -0
  19. data/lib/apill/resource/processors/indexing.rb +2 -0
  20. data/lib/apill/resource/processors/paging.rb +2 -0
  21. data/lib/apill/resource/processors/sorting.rb +2 -0
  22. data/lib/apill/responses/{invalid_subdomain_response.rb → invalid_api_request.rb} +3 -3
  23. data/lib/apill/responses/{invalid_api_request_response.rb → invalid_subdomain.rb} +3 -3
  24. data/lib/apill/responses/invalid_token.rb +17 -0
  25. data/lib/apill/tokens/invalid_request_authorization.rb +21 -0
  26. data/lib/apill/tokens/null_request_authorization.rb +21 -0
  27. data/lib/apill/tokens/request_authorization.rb +62 -0
  28. data/lib/apill/version.rb +1 -1
  29. data/lib/apill.rb +5 -5
  30. data/spec/apill/accept_header_spec.rb +1 -1
  31. data/spec/apill/errors/{invalid_api_request_error_spec.rb → invalid_api_request_spec.rb} +6 -6
  32. data/spec/apill/errors/{invalid_subdomain_error_spec.rb → invalid_subdomain_spec.rb} +6 -6
  33. data/spec/apill/errors/invalid_token_spec.rb +23 -0
  34. data/spec/apill/{invalid_subdomain_response_spec.rb → invalid_subdomain_spec.rb} +7 -7
  35. data/spec/apill/invalid_token_spec.rb +42 -0
  36. data/spec/apill/matchers/{accept_header_matcher_spec.rb → accept_header_spec.rb} +32 -24
  37. data/spec/apill/matchers/subdomain_spec.rb +81 -0
  38. data/spec/apill/matchers/{version_matcher_spec.rb → version_spec.rb} +31 -20
  39. data/spec/apill/middleware/api_request_spec.rb +36 -38
  40. data/spec/apill/parameters_spec.rb +1 -1
  41. data/spec/apill/requests/rack_spec.rb +159 -0
  42. data/spec/apill/requests/rails_spec.rb +151 -0
  43. data/spec/apill/resource/model_spec.rb +1 -1
  44. data/spec/apill/resource/processors/filtering_spec.rb +1 -1
  45. data/spec/apill/resource/processors/indexing_spec.rb +1 -1
  46. data/spec/apill/resource/processors/paging_spec.rb +1 -1
  47. data/spec/apill/resource/processors/sorting_spec.rb +1 -1
  48. data/spec/apill/tokens/request_authorization_spec.rb +49 -0
  49. data/spec/fixtures/test_rsa_key +27 -0
  50. data/spec/fixtures/test_rsa_key.pub +9 -0
  51. data/spec/spec_helper.rb +3 -0
  52. data/spec/support/private_keys.rb +19 -0
  53. metadata +75 -29
  54. data/lib/apill/matchers/accept_header_matcher.rb +0 -15
  55. data/lib/apill/requests/rack_request.rb +0 -37
  56. data/lib/apill/requests/rails_request.rb +0 -29
  57. data/spec/apill/matchers/subdomain_matcher_spec.rb +0 -72
  58. data/spec/apill/requests/rack_request_spec.rb +0 -70
  59. data/spec/apill/requests/rails_request_spec.rb +0 -59
@@ -0,0 +1,159 @@
1
+ require 'spec_helper'
2
+ require 'apill/requests/rack'
3
+
4
+ module Apill
5
+ module Requests
6
+ describe Rack do
7
+ it 'finds the accept header from the headers if it is valid' do
8
+ raw_request = {
9
+ 'HTTP_ACCEPT' => 'application/vnd.matrix+zion;version=10.0',
10
+ 'QUERY_STRING' => '',
11
+ 'HTTP_X_APPLICATION_NAME' => 'matrix',
12
+ }
13
+ request = Rack.new(request: raw_request)
14
+
15
+ expect(request.accept_header.to_s).to eql 'application/vnd.matrix+zion;version=10.0'
16
+ end
17
+
18
+ it 'finds the accept header from the headers if it is invalid but there is no ' \
19
+ 'accept header in the params' do
20
+
21
+ raw_request = {
22
+ 'HTTP_ACCEPT' => 'invalid/vnd.matrix+zion;version=10.0',
23
+ 'QUERY_STRING' => '',
24
+ 'HTTP_X_APPLICATION_NAME' => 'matrix',
25
+ }
26
+ request = Rack.new(request: raw_request)
27
+
28
+ expect(request.accept_header.to_s).to eql 'invalid/vnd.matrix+zion;version=10.0'
29
+ end
30
+
31
+ it 'finds the accept header from the params if it is valid' do
32
+ raw_request = {
33
+ 'HTTP_ACCEPT' => '',
34
+ 'QUERY_STRING' => 'accept=application/vnd.matrix+zion;version=10.0',
35
+ 'HTTP_X_APPLICATION_NAME' => 'matrix',
36
+ }
37
+ request = Rack.new(request: raw_request)
38
+
39
+ expect(request.accept_header.to_s).to eql 'application/vnd.matrix+zion;version=10.0'
40
+ end
41
+
42
+ # rubocop:disable Metrics/LineLength
43
+ it 'finds the accept header from the query string if it is encoded' do
44
+ raw_request = {
45
+ 'HTTP_ACCEPT' => '',
46
+ 'QUERY_STRING' => 'accept=application%2Fvnd.matrix%2Bzion%3Bversion%3D10.0',
47
+ 'HTTP_X_APPLICATION_NAME' => 'matrix',
48
+ }
49
+ request = Rack.new(request: raw_request)
50
+
51
+ expect(request.accept_header.to_s).to eql 'application/vnd.matrix+zion;version=10.0'
52
+ end
53
+ # rubocop:enable Metrics/LineLength
54
+
55
+ it 'finds the authorization token from the header' do
56
+ raw_request = {
57
+ 'HTTP_AUTHORIZATION' => "Token #{valid_token}",
58
+ 'QUERY_STRING' => '',
59
+ }
60
+ request = Rack.new(token_private_key: test_private_key,
61
+ request: raw_request)
62
+
63
+ expect(request.authorization_token).to be_valid
64
+ expect(request.authorization_token.to_h).to eql(
65
+ [
66
+ { 'bar' => 'baz' },
67
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
68
+ ])
69
+ end
70
+
71
+ it 'can process an authorization token if it is sent through incorrectly' do
72
+ raw_request = {
73
+ 'HTTP_AUTHORIZATION' => "#{valid_token}",
74
+ 'QUERY_STRING' => '',
75
+ }
76
+ request = Rack.new(token_private_key: test_private_key,
77
+ request: raw_request)
78
+
79
+ expect(request.authorization_token).not_to be_valid
80
+ expect(request.authorization_token.to_h).to eql({})
81
+ end
82
+
83
+ it 'finds the authorization token from the params if the authorization token from ' \
84
+ 'the header is invalid and the authorization token from the params is valid' do
85
+
86
+ raw_request = {
87
+ 'HTTP_AUTHORIZATION' => "Token #{invalid_token}",
88
+ 'QUERY_STRING' => "auth_token=#{valid_token}",
89
+ }
90
+ request = Rack.new(token_private_key: test_private_key,
91
+ request: raw_request)
92
+
93
+ expect(request.authorization_token).to be_valid
94
+ expect(request.authorization_token.to_h).to eql(
95
+ [
96
+ { 'bar' => 'baz' },
97
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
98
+ ])
99
+ end
100
+
101
+ it 'finds the authorization token from the params if the authorization token from ' \
102
+ 'the header is not present and the authorization token from the params is valid' do
103
+
104
+ raw_request = {
105
+ 'QUERY_STRING' => "auth_token=#{valid_token}",
106
+ }
107
+ request = Rack.new(token_private_key: test_private_key,
108
+ request: raw_request)
109
+
110
+ expect(request.authorization_token).to be_valid
111
+ expect(request.authorization_token.to_h).to eql(
112
+ [
113
+ { 'bar' => 'baz' },
114
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
115
+ ])
116
+ end
117
+
118
+ it 'is a null authorization token if neither authorization token is present' do
119
+ raw_request = {
120
+ 'QUERY_STRING' => '',
121
+ }
122
+ request = Rack.new(token_private_key: test_private_key,
123
+ request: raw_request)
124
+
125
+ expect(request.authorization_token).to be_valid
126
+ expect(request.authorization_token.to_h).to eql({})
127
+ end
128
+
129
+ it 'finds the authorization token from the params' do
130
+ raw_request = {
131
+ 'QUERY_STRING' => "auth_token=#{valid_token}",
132
+ }
133
+ request = Rack.new(token_private_key: test_private_key,
134
+ request: raw_request)
135
+
136
+ expect(request.authorization_token).to be_valid
137
+ expect(request.authorization_token.to_h).to eql(
138
+ [
139
+ { 'bar' => 'baz' },
140
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
141
+ ])
142
+ end
143
+
144
+ it 'defaults to the application name in the configuration if none is found in ' \
145
+ 'the header' do
146
+
147
+ Apill.configuration.application_name = 'zion'
148
+
149
+ raw_request = {
150
+ 'HTTP_ACCEPT' => '',
151
+ 'QUERY_STRING' => 'accept=application/vnd.zion+zion;version=10.0',
152
+ }
153
+ request = Rack.new(request: raw_request)
154
+
155
+ expect(request.accept_header.to_s).to eql 'application/vnd.zion+zion;version=10.0'
156
+ end
157
+ end
158
+ end
159
+ end
@@ -0,0 +1,151 @@
1
+ require 'ostruct'
2
+ require 'spec_helper'
3
+ require 'apill/requests/rails'
4
+
5
+ module Apill
6
+ module Requests
7
+ describe Rails do
8
+ it 'finds the accept header from the headers if it is valid' do
9
+ raw_request = OpenStruct.new(
10
+ headers: {
11
+ 'X-Application-Name' => 'matrix',
12
+ 'Accept' => 'application/vnd.matrix+zion;version=10.0',
13
+ },
14
+ params: {})
15
+ request = Rails.new(request: raw_request)
16
+
17
+ expect(request.accept_header.to_s).to eql 'application/vnd.matrix+zion;version=10.0'
18
+ end
19
+
20
+ it 'finds the accept header from the headers if it is invalid but there is no ' \
21
+ 'accept header in the params' do
22
+
23
+ raw_request = OpenStruct.new(
24
+ headers: {
25
+ 'X-Application-Name' => 'matrix',
26
+ 'Accept' => 'invalid/vnd.matrix+zion;version=10.0',
27
+ },
28
+ params: {})
29
+ request = Rails.new(request: raw_request)
30
+
31
+ expect(request.accept_header.to_s).to eql 'invalid/vnd.matrix+zion;version=10.0'
32
+ end
33
+
34
+ it 'finds the accept header from the params if it is valid' do
35
+ raw_request = OpenStruct.new(
36
+ headers: {
37
+ 'X-Application-Name' => 'matrix',
38
+ },
39
+ params: { 'accept' => 'application/vnd.matrix+zion;version=10.0' })
40
+ request = Rails.new(request: raw_request)
41
+
42
+ expect(request.accept_header.to_s).to eql 'application/vnd.matrix+zion;version=10.0'
43
+ end
44
+
45
+ it 'finds the authorization token from the header' do
46
+ raw_request = OpenStruct.new(
47
+ headers: {
48
+ 'HTTP_AUTHORIZATION' => "Token #{valid_token}",
49
+ },
50
+ params: {})
51
+ request = Rails.new(token_private_key: test_private_key,
52
+ request: raw_request)
53
+
54
+ expect(request.authorization_token).to be_valid
55
+ expect(request.authorization_token.to_h).to eql(
56
+ [
57
+ { 'bar' => 'baz' },
58
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
59
+ ])
60
+ end
61
+
62
+ it 'can process an authorization token if it is sent through incorrectly' do
63
+ raw_request = OpenStruct.new(
64
+ headers: {
65
+ 'HTTP_AUTHORIZATION' => "#{valid_token}",
66
+ },
67
+ params: {})
68
+ request = Rails.new(token_private_key: test_private_key,
69
+ request: raw_request)
70
+
71
+ expect(request.authorization_token).not_to be_valid
72
+ expect(request.authorization_token.to_h).to eql({})
73
+ end
74
+
75
+ it 'finds the authorization token from the params if the authorization token from ' \
76
+ 'the header is invalid and the authorization token from the params is valid' do
77
+
78
+ raw_request = OpenStruct.new(
79
+ headers: {
80
+ 'HTTP_AUTHORIZATION' => "Token #{invalid_token}",
81
+ },
82
+ params: { 'auth_token' => valid_token })
83
+ request = Rails.new(token_private_key: test_private_key,
84
+ request: raw_request)
85
+
86
+ expect(request.authorization_token).to be_valid
87
+ expect(request.authorization_token.to_h).to eql(
88
+ [
89
+ { 'bar' => 'baz' },
90
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
91
+ ])
92
+ end
93
+
94
+ it 'finds the authorization token from the params if the authorization token from ' \
95
+ 'the header is not present and the authorization token from the params is valid' do
96
+
97
+ raw_request = OpenStruct.new(
98
+ headers: {},
99
+ params: { 'auth_token' => valid_token })
100
+ request = Rails.new(token_private_key: test_private_key,
101
+ request: raw_request)
102
+
103
+ expect(request.authorization_token).to be_valid
104
+ expect(request.authorization_token.to_h).to eql(
105
+ [
106
+ { 'bar' => 'baz' },
107
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
108
+ ])
109
+ end
110
+
111
+ it 'is a null authorization token if neither authorization token is present' do
112
+ raw_request = OpenStruct.new(
113
+ headers: {},
114
+ params: {})
115
+ request = Rails.new(token_private_key: test_private_key,
116
+ request: raw_request)
117
+
118
+ expect(request.authorization_token).to be_valid
119
+ expect(request.authorization_token.to_h).to eql({})
120
+ end
121
+
122
+ it 'finds the authorization token from the params' do
123
+ raw_request = OpenStruct.new(
124
+ headers: {},
125
+ params: { 'auth_token' => valid_token })
126
+ request = Rails.new(token_private_key: test_private_key,
127
+ request: raw_request)
128
+
129
+ expect(request.authorization_token).to be_valid
130
+ expect(request.authorization_token.to_h).to eql(
131
+ [
132
+ { 'bar' => 'baz' },
133
+ { 'typ' => 'JWT', 'alg' => 'RS256' },
134
+ ])
135
+ end
136
+
137
+ it 'defaults to the application name in the configuration if none is found in ' \
138
+ 'the header' do
139
+
140
+ Apill.configuration.application_name = 'zion'
141
+
142
+ raw_request = OpenStruct.new(
143
+ headers: {},
144
+ params: { 'accept' => 'application/vnd.zion+zion;version=10.0' })
145
+ request = Rails.new(request: raw_request)
146
+
147
+ expect(request.accept_header.to_s).to eql 'application/vnd.zion+zion;version=10.0'
148
+ end
149
+ end
150
+ end
151
+ end
@@ -1,4 +1,4 @@
1
- require 'rspectacular'
1
+ require 'spec_helper'
2
2
  require 'apill/resource/model'
3
3
 
4
4
  module Apill
@@ -1,4 +1,4 @@
1
- require 'rspectacular'
1
+ require 'spec_helper'
2
2
  require 'apill/resource/processors/filtering'
3
3
 
4
4
  module Apill
@@ -1,4 +1,4 @@
1
- require 'rspectacular'
1
+ require 'spec_helper'
2
2
  require 'apill/resource/processors/indexing'
3
3
 
4
4
  module Apill
@@ -1,4 +1,4 @@
1
- require 'rspectacular'
1
+ require 'spec_helper'
2
2
  require 'apill/resource/processors/paging'
3
3
 
4
4
  module Apill
@@ -1,4 +1,4 @@
1
- require 'rspectacular'
1
+ require 'spec_helper'
2
2
  require 'apill/resource/processors/sorting'
3
3
 
4
4
  module Apill
@@ -0,0 +1,49 @@
1
+ require 'spec_helper'
2
+ require 'apill/tokens/request_authorization'
3
+
4
+ module Apill
5
+ module Tokens
6
+ describe RequestAuthorization do
7
+ it 'can convert an empty token' do
8
+ token = RequestAuthorization.convert(token_private_key: test_private_key,
9
+ raw_token: nil)
10
+
11
+ expect(token).to be_a NullRequestAuthorization
12
+ end
13
+
14
+ it 'can convert an invalid token' do
15
+ token = RequestAuthorization.convert(token_private_key: test_private_key,
16
+ raw_token: invalid_token)
17
+
18
+ expect(token).to be_a InvalidRequestAuthorization
19
+ end
20
+
21
+ it 'can verify an expired token' do
22
+ expired_jwe = valid_token('exp' => 1.day.ago.to_i,
23
+ 'baz' => 'bar')
24
+ token = RequestAuthorization.convert(
25
+ token_private_key: test_private_key,
26
+ raw_token: expired_jwe)
27
+
28
+ expect(token).to be_a InvalidRequestAuthorization
29
+ end
30
+
31
+ it 'can convert an invalidly signed token' do
32
+ other_private_key = OpenSSL::PKey::RSA.new(2048)
33
+ token = RequestAuthorization.convert(
34
+ token_private_key: other_private_key,
35
+ raw_token: valid_token)
36
+
37
+ expect(token).to be_a InvalidRequestAuthorization
38
+ end
39
+
40
+ it 'can convert a valid token' do
41
+ token = RequestAuthorization.convert(token_private_key: test_private_key,
42
+ raw_token: valid_token)
43
+
44
+ expect(token).to be_a RequestAuthorization
45
+ expect(token.to_h).to eql([{ 'bar' => 'baz' }, { 'typ' => 'JWT', 'alg' => 'RS256' }])
46
+ end
47
+ end
48
+ end
49
+ end
@@ -0,0 +1,27 @@
1
+ -----BEGIN RSA PRIVATE KEY-----
2
+ MIIEpQIBAAKCAQEAzQNhPtJl68EAoLBh92nBpDlif2M61dS+HBoRinfWT5sD3CeJ
3
+ eMPmlj9vqOdmBzBfMuoHkr3QPVjTAvsTMthoVFKVUEA28eglFABZYP99+VDIKJtr
4
+ rpXMkwjKBXaXP58QZ1bkQfMdNHuKC9xY7w4tpZP3q3PcW7xqI2bR/APQPfW3xfhU
5
+ 8gDAVWkv0+LM76wcGdqfqXd/Z7P9ZtXb74qI575KZR6l+4v22ZYOn0yYL3wc0g3l
6
+ jskF5qeTD4nuSqSzIanYAIo+0jy/BLY9gzFUQPS1Z4INtkEVwX9TO1IpwJvYpqYU
7
+ 0KpJSo5G5eyxM37iQWTTCbmq2byanRLlinXstQIDAQABAoIBAQChO+VBGQubTCEI
8
+ P2/suznVxGPYt9vPzA7v3vioo/LijJGOlXGijr9MrvtMJSCyyrI0QqZOHAYoGTFr
9
+ CLdip5v1pTVU9gvAWMjAYD3q8UTLzWJ9vS4FEj7f7GulvEzbdmfaPhYqX986JWa+
10
+ ST+QUuBHdoW0S9ykMRxwVy8SOpWOA8YqfRbb9J4IYwbYXIDv7yJNE039x3cVqp1Q
11
+ oSoOjW0rka0NObjjEJuJTZKpshze08B6gL1Vi7lcUWyeCXuDbMh18dSGEYU2YN2f
12
+ 9eMLXI981zgBP8BnnR6UuSR2PpsLRSkqC7ZPGZZXC/xP3Ln+I8YPmqMlUDtXeaMf
13
+ zLmBGCoJAoGBAPl1sMFne3E4kFscjyYQytqED2h0DUF4zT4tefUL7wTwsTm6WTgW
14
+ 8xYlegW5kvdFsVq7PM1hLTNKK74QRoHFn+uwyCw9w9/fmU2FJ3BIB4MhFyQRu0MM
15
+ J/3qJHHjILFz+gHYMtxsWEnAviWPPznxR0ocP+6eSE9HerZqOyBnpoP3AoGBANJj
16
+ YDH1K8RneSTYDSqJ93yM2wE+Y0YutOeteJOyOtpA8Xdi7V81BcHo4aemjZ6kyjIF
17
+ KydYbWh/9dekY89QrUOjQOwfFon7Gf3RHZAklgy4Kibkyt29fakP3m+CCdQJhPrM
18
+ y/c5HpCG1M/pyizAg8O3l6bmn4QfNgH+DmOCTdGzAoGAEsvFV60+ZdeHOPY76vhU
19
+ 8IYGyy4DWa2KeWbfy5Dsn4irMdhSpKFGC6MjQI8s/aiopld5S1hJGZY7GYUMavbD
20
+ B/U3/+1fdtzYJjkkMZebyUuS/MrBO1oNIVqlCFe+vOAqND1gB6+6L0Rwj0/tyaXe
21
+ Yz0hrA8ND7wpCNmUPurQZx0CgYEAi3VYJIVx16UHRob4Y0RFCwiLe42RXMpFHHV+
22
+ wdiY7meyKAMpeby57kmimvDqW0i8xt9qNZCGJYj8u0664oeF8pnaxSnuVNRf7EGb
23
+ qRq3ZAMH3fQ3DTk4fMKKHbxDK4yL23u5kE0Kl57onlFItNWAAlJGclnZT0kpEbUI
24
+ cKnFT8UCgYEApdfJ7GCA3vz45AWV9ya16BwfwTcmLnL2YsfbF+d1Rb3Frzl1G+kj
25
+ UG8TuiRAF2oTQSlXaU1118Fty9DN5goC+N8NQuz6neVPD47on8J7BkjtfTVY7Jbi
26
+ hDxOp9E0EpC5EfHarYyfst1/iWQqRbqJZe7414EhAlfL2T5a6Y05j/g=
27
+ -----END RSA PRIVATE KEY-----
@@ -0,0 +1,9 @@
1
+ -----BEGIN PUBLIC KEY-----
2
+ MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzQNhPtJl68EAoLBh92nB
3
+ pDlif2M61dS+HBoRinfWT5sD3CeJeMPmlj9vqOdmBzBfMuoHkr3QPVjTAvsTMtho
4
+ VFKVUEA28eglFABZYP99+VDIKJtrrpXMkwjKBXaXP58QZ1bkQfMdNHuKC9xY7w4t
5
+ pZP3q3PcW7xqI2bR/APQPfW3xfhU8gDAVWkv0+LM76wcGdqfqXd/Z7P9ZtXb74qI
6
+ 575KZR6l+4v22ZYOn0yYL3wc0g3ljskF5qeTD4nuSqSzIanYAIo+0jy/BLY9gzFU
7
+ QPS1Z4INtkEVwX9TO1IpwJvYpqYU0KpJSo5G5eyxM37iQWTTCbmq2byanRLlinXs
8
+ tQIDAQAB
9
+ -----END PUBLIC KEY-----
@@ -0,0 +1,3 @@
1
+ require 'rspectacular'
2
+
3
+ Dir[File.expand_path('support/**/*.rb', __dir__)].each { |f| require f }
@@ -0,0 +1,19 @@
1
+ require 'json/jwt'
2
+
3
+ def test_private_key
4
+ OpenSSL::PKey::RSA.new File.read(File.expand_path('../fixtures/test_rsa_key', __dir__))
5
+ end
6
+
7
+ def valid_token(payload = { 'bar' => 'baz' })
8
+ @valid_token ||= begin
9
+ jwt = JSON::JWT.new(payload)
10
+ jws = jwt.sign(test_private_key, :RS256)
11
+ jwe = jws.encrypt(test_private_key, :'RSA-OAEP', :A256GCM)
12
+
13
+ jwe.to_s
14
+ end
15
+ end
16
+
17
+ def invalid_token
18
+ @invalid_token ||= valid_token.tr('a', 'f')
19
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: apill
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.1.3
4
+ version: 4.0.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - jfelchner
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2015-10-21 00:00:00.000000000 Z
11
+ date: 2015-10-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: human_error
@@ -24,6 +24,34 @@ dependencies:
24
24
  - - "~>"
25
25
  - !ruby/object:Gem::Version
26
26
  version: '3.0'
27
+ - !ruby/object:Gem::Dependency
28
+ name: json-jwt
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '1.5'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '1.5'
41
+ - !ruby/object:Gem::Dependency
42
+ name: jwt
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '1.5'
48
+ type: :runtime
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '1.5'
27
55
  - !ruby/object:Gem::Dependency
28
56
  name: rspec
29
57
  requirement: !ruby/object:Gem::Requirement
@@ -64,12 +92,13 @@ files:
64
92
  - lib/apill.rb
65
93
  - lib/apill/accept_header.rb
66
94
  - lib/apill/configuration.rb
67
- - lib/apill/errors/invalid_api_request_error.rb
68
- - lib/apill/errors/invalid_subdomain_error.rb
69
- - lib/apill/matchers/accept_header_matcher.rb
70
- - lib/apill/matchers/generic_matcher.rb
71
- - lib/apill/matchers/subdomain_matcher.rb
72
- - lib/apill/matchers/version_matcher.rb
95
+ - lib/apill/errors/invalid_api_request.rb
96
+ - lib/apill/errors/invalid_subdomain.rb
97
+ - lib/apill/errors/invalid_token.rb
98
+ - lib/apill/matchers/accept_header.rb
99
+ - lib/apill/matchers/generic.rb
100
+ - lib/apill/matchers/subdomain.rb
101
+ - lib/apill/matchers/version.rb
73
102
  - lib/apill/middleware/api_request.rb
74
103
  - lib/apill/parameters.rb
75
104
  - lib/apill/parameters/filter.rb
@@ -78,34 +107,45 @@ files:
78
107
  - lib/apill/parameters/sort.rb
79
108
  - lib/apill/processable_resource.rb
80
109
  - lib/apill/requests/base.rb
81
- - lib/apill/requests/rack_request.rb
82
- - lib/apill/requests/rails_request.rb
110
+ - lib/apill/requests/rack.rb
111
+ - lib/apill/requests/rails.rb
83
112
  - lib/apill/resource.rb
84
113
  - lib/apill/resource/model.rb
85
114
  - lib/apill/resource/processors/filtering.rb
86
115
  - lib/apill/resource/processors/indexing.rb
87
116
  - lib/apill/resource/processors/paging.rb
88
117
  - lib/apill/resource/processors/sorting.rb
89
- - lib/apill/responses/invalid_api_request_response.rb
90
- - lib/apill/responses/invalid_subdomain_response.rb
118
+ - lib/apill/responses/invalid_api_request.rb
119
+ - lib/apill/responses/invalid_subdomain.rb
120
+ - lib/apill/responses/invalid_token.rb
91
121
  - lib/apill/serializers/json_api.rb
122
+ - lib/apill/tokens/invalid_request_authorization.rb
123
+ - lib/apill/tokens/null_request_authorization.rb
124
+ - lib/apill/tokens/request_authorization.rb
92
125
  - lib/apill/version.rb
93
126
  - spec/apill/accept_header_spec.rb
94
- - spec/apill/errors/invalid_api_request_error_spec.rb
95
- - spec/apill/errors/invalid_subdomain_error_spec.rb
96
- - spec/apill/invalid_subdomain_response_spec.rb
97
- - spec/apill/matchers/accept_header_matcher_spec.rb
98
- - spec/apill/matchers/subdomain_matcher_spec.rb
99
- - spec/apill/matchers/version_matcher_spec.rb
127
+ - spec/apill/errors/invalid_api_request_spec.rb
128
+ - spec/apill/errors/invalid_subdomain_spec.rb
129
+ - spec/apill/errors/invalid_token_spec.rb
130
+ - spec/apill/invalid_subdomain_spec.rb
131
+ - spec/apill/invalid_token_spec.rb
132
+ - spec/apill/matchers/accept_header_spec.rb
133
+ - spec/apill/matchers/subdomain_spec.rb
134
+ - spec/apill/matchers/version_spec.rb
100
135
  - spec/apill/middleware/api_request_spec.rb
101
136
  - spec/apill/parameters_spec.rb
102
- - spec/apill/requests/rack_request_spec.rb
103
- - spec/apill/requests/rails_request_spec.rb
137
+ - spec/apill/requests/rack_spec.rb
138
+ - spec/apill/requests/rails_spec.rb
104
139
  - spec/apill/resource/model_spec.rb
105
140
  - spec/apill/resource/processors/filtering_spec.rb
106
141
  - spec/apill/resource/processors/indexing_spec.rb
107
142
  - spec/apill/resource/processors/paging_spec.rb
108
143
  - spec/apill/resource/processors/sorting_spec.rb
144
+ - spec/apill/tokens/request_authorization_spec.rb
145
+ - spec/fixtures/test_rsa_key
146
+ - spec/fixtures/test_rsa_key.pub
147
+ - spec/spec_helper.rb
148
+ - spec/support/private_keys.rb
109
149
  homepage: https://github.com/jfelchner/apill
110
150
  licenses:
111
151
  - MIT
@@ -132,19 +172,25 @@ specification_version: 4
132
172
  summary: Common API functionality
133
173
  test_files:
134
174
  - spec/apill/accept_header_spec.rb
135
- - spec/apill/errors/invalid_api_request_error_spec.rb
136
- - spec/apill/errors/invalid_subdomain_error_spec.rb
137
- - spec/apill/invalid_subdomain_response_spec.rb
138
- - spec/apill/matchers/accept_header_matcher_spec.rb
139
- - spec/apill/matchers/subdomain_matcher_spec.rb
140
- - spec/apill/matchers/version_matcher_spec.rb
175
+ - spec/apill/errors/invalid_api_request_spec.rb
176
+ - spec/apill/errors/invalid_subdomain_spec.rb
177
+ - spec/apill/errors/invalid_token_spec.rb
178
+ - spec/apill/invalid_subdomain_spec.rb
179
+ - spec/apill/invalid_token_spec.rb
180
+ - spec/apill/matchers/accept_header_spec.rb
181
+ - spec/apill/matchers/subdomain_spec.rb
182
+ - spec/apill/matchers/version_spec.rb
141
183
  - spec/apill/middleware/api_request_spec.rb
142
184
  - spec/apill/parameters_spec.rb
143
- - spec/apill/requests/rack_request_spec.rb
144
- - spec/apill/requests/rails_request_spec.rb
185
+ - spec/apill/requests/rack_spec.rb
186
+ - spec/apill/requests/rails_spec.rb
145
187
  - spec/apill/resource/model_spec.rb
146
188
  - spec/apill/resource/processors/filtering_spec.rb
147
189
  - spec/apill/resource/processors/indexing_spec.rb
148
190
  - spec/apill/resource/processors/paging_spec.rb
149
191
  - spec/apill/resource/processors/sorting_spec.rb
150
- has_rdoc:
192
+ - spec/apill/tokens/request_authorization_spec.rb
193
+ - spec/fixtures/test_rsa_key
194
+ - spec/fixtures/test_rsa_key.pub
195
+ - spec/spec_helper.rb
196
+ - spec/support/private_keys.rb
@@ -1,15 +0,0 @@
1
- require 'apill/matchers/generic_matcher'
2
-
3
- module Apill
4
- module Matchers
5
- class AcceptHeaderMatcher
6
- include Apill::Matchers::GenericMatcher
7
-
8
- def matches?(request)
9
- super
10
-
11
- accept_header.valid?
12
- end
13
- end
14
- end
15
- end
@@ -1,37 +0,0 @@
1
- require 'apill/configuration'
2
- require 'apill/requests/base'
3
- require 'apill/accept_header'
4
-
5
- module Apill
6
- module Requests
7
- class RackRequest < Base
8
- ACCEPT_PARAM_PATTERN = /(?:\A|&)accept=(.+?)(?=\z|&)/
9
-
10
- attr_accessor :request
11
-
12
- def initialize(request)
13
- self.request = request
14
- end
15
-
16
- def accept_header_from_header
17
- AcceptHeader.new(application: application_name,
18
- header: request['HTTP_ACCEPT'] || '')
19
- end
20
-
21
- def accept_header_from_params
22
- AcceptHeader.new(application: application_name,
23
- header: raw_accept_header_from_params || '')
24
- end
25
-
26
- def application_name
27
- request['HTTP_X_APPLICATION_NAME'] || Apill.configuration.application_name
28
- end
29
-
30
- private
31
-
32
- def raw_accept_header_from_params
33
- URI.unescape(request['QUERY_STRING'][ACCEPT_PARAM_PATTERN, 1] || '')
34
- end
35
- end
36
- end
37
- end