clerk-sdk-ruby 4.0.0.beta3 → 4.0.0.beta4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.env.example +3 -0
- data/.github/workflows/main.yml +22 -14
- data/.gitignore +7 -1
- data/.rspec +3 -0
- data/.ruby-version +1 -0
- data/CHANGELOG.md +22 -0
- data/Gemfile +26 -3
- data/Gemfile.lock +269 -13
- data/Guardfile +14 -0
- data/README.md +71 -11
- data/Rakefile +50 -6
- data/apps/rack/app.rb +67 -0
- data/apps/rack/config.ru +17 -0
- data/apps/rack/middleware/disable_paths.rb +13 -0
- data/apps/rails-api/.dockerignore +41 -0
- data/apps/rails-api/.gitattributes +9 -0
- data/apps/rails-api/.gitignore +32 -0
- data/apps/rails-api/.kamal/hooks/docker-setup.sample +3 -0
- data/apps/rails-api/.kamal/hooks/post-deploy.sample +14 -0
- data/apps/rails-api/.kamal/hooks/post-proxy-reboot.sample +3 -0
- data/apps/rails-api/.kamal/hooks/pre-build.sample +51 -0
- data/apps/rails-api/.kamal/hooks/pre-connect.sample +47 -0
- data/apps/rails-api/.kamal/hooks/pre-deploy.sample +109 -0
- data/apps/rails-api/.kamal/hooks/pre-proxy-reboot.sample +3 -0
- data/apps/rails-api/.kamal/secrets +17 -0
- data/apps/rails-api/.rubocop.yml +8 -0
- data/apps/rails-api/.ruby-version +1 -0
- data/apps/rails-api/Dockerfile +69 -0
- data/apps/rails-api/Gemfile +54 -0
- data/apps/rails-api/Gemfile.lock +374 -0
- data/apps/rails-api/README.md +24 -0
- data/apps/rails-api/Rakefile +6 -0
- data/apps/rails-api/app/controllers/application_controller.rb +3 -0
- data/apps/rails-api/app/controllers/home_controller.rb +5 -0
- data/apps/rails-api/app/jobs/application_job.rb +7 -0
- data/apps/rails-api/app/mailers/application_mailer.rb +4 -0
- data/apps/rails-api/app/models/application_record.rb +3 -0
- data/apps/rails-api/app/views/layouts/mailer.html.erb +13 -0
- data/apps/rails-api/app/views/layouts/mailer.text.erb +1 -0
- data/apps/rails-api/bin/brakeman +7 -0
- data/apps/rails-api/bin/bundle +109 -0
- data/apps/rails-api/bin/dev +2 -0
- data/apps/rails-api/bin/docker-entrypoint +14 -0
- data/apps/rails-api/bin/jobs +6 -0
- data/apps/rails-api/bin/kamal +27 -0
- data/apps/rails-api/bin/rails +4 -0
- data/apps/rails-api/bin/rake +4 -0
- data/apps/rails-api/bin/rubocop +8 -0
- data/apps/rails-api/bin/setup +34 -0
- data/apps/rails-api/bin/thrust +5 -0
- data/apps/rails-api/config/application.rb +36 -0
- data/apps/rails-api/config/boot.rb +4 -0
- data/apps/rails-api/config/cable.yml +17 -0
- data/apps/rails-api/config/cache.yml +16 -0
- data/apps/rails-api/config/credentials.yml.enc +1 -0
- data/apps/rails-api/config/database.yml +41 -0
- data/apps/rails-api/config/deploy.yml +116 -0
- data/apps/rails-api/config/environment.rb +5 -0
- data/apps/rails-api/config/environments/development.rb +70 -0
- data/apps/rails-api/config/environments/production.rb +88 -0
- data/apps/rails-api/config/environments/test.rb +53 -0
- data/apps/rails-api/config/initializers/cors.rb +16 -0
- data/apps/rails-api/config/initializers/filter_parameter_logging.rb +8 -0
- data/apps/rails-api/config/initializers/inflections.rb +16 -0
- data/apps/rails-api/config/locales/en.yml +31 -0
- data/apps/rails-api/config/puma.rb +41 -0
- data/apps/rails-api/config/queue.yml +18 -0
- data/apps/rails-api/config/recurring.yml +10 -0
- data/apps/rails-api/config/routes.rb +10 -0
- data/apps/rails-api/config/storage.yml +34 -0
- data/apps/rails-api/config.ru +6 -0
- data/apps/rails-api/db/cable_schema.rb +11 -0
- data/apps/rails-api/db/cache_schema.rb +14 -0
- data/apps/rails-api/db/queue_schema.rb +129 -0
- data/apps/rails-api/db/seeds.rb +9 -0
- data/apps/rails-api/public/robots.txt +1 -0
- data/apps/rails-api/test/controllers/home_controller_test.rb +7 -0
- data/apps/rails-api/test/test_helper.rb +15 -0
- data/apps/rails-full/.dockerignore +47 -0
- data/apps/rails-full/.gitattributes +9 -0
- data/apps/rails-full/.gitignore +34 -0
- data/apps/rails-full/.kamal/hooks/docker-setup.sample +3 -0
- data/apps/rails-full/.kamal/hooks/post-deploy.sample +14 -0
- data/apps/rails-full/.kamal/hooks/post-proxy-reboot.sample +3 -0
- data/apps/rails-full/.kamal/hooks/pre-build.sample +51 -0
- data/apps/rails-full/.kamal/hooks/pre-connect.sample +47 -0
- data/apps/rails-full/.kamal/hooks/pre-deploy.sample +109 -0
- data/apps/rails-full/.kamal/hooks/pre-proxy-reboot.sample +3 -0
- data/apps/rails-full/.kamal/secrets +17 -0
- data/apps/rails-full/.rubocop.yml +8 -0
- data/apps/rails-full/.ruby-version +1 -0
- data/apps/rails-full/Dockerfile +72 -0
- data/apps/rails-full/Gemfile +70 -0
- data/apps/rails-full/Gemfile.lock +429 -0
- data/apps/rails-full/README.md +24 -0
- data/apps/rails-full/Rakefile +6 -0
- data/apps/rails-full/app/assets/stylesheets/application.css +10 -0
- data/apps/rails-full/app/controllers/application_controller.rb +6 -0
- data/apps/rails-full/app/controllers/home_controller.rb +11 -0
- data/apps/rails-full/app/helpers/application_helper.rb +2 -0
- data/apps/rails-full/app/helpers/home_helper.rb +2 -0
- data/apps/rails-full/app/javascript/application.js +3 -0
- data/apps/rails-full/app/javascript/controllers/application.js +9 -0
- data/apps/rails-full/app/javascript/controllers/hello_controller.js +7 -0
- data/apps/rails-full/app/javascript/controllers/index.js +4 -0
- data/apps/rails-full/app/jobs/application_job.rb +7 -0
- data/apps/rails-full/app/mailers/application_mailer.rb +4 -0
- data/apps/rails-full/app/models/application_record.rb +3 -0
- data/apps/rails-full/app/views/home/index.html.erb +7 -0
- data/apps/rails-full/app/views/layouts/application.html.erb +60 -0
- data/apps/rails-full/app/views/layouts/mailer.html.erb +13 -0
- data/apps/rails-full/app/views/layouts/mailer.text.erb +1 -0
- data/apps/rails-full/app/views/pwa/manifest.json.erb +22 -0
- data/apps/rails-full/app/views/pwa/service-worker.js +26 -0
- data/apps/rails-full/bin/brakeman +7 -0
- data/apps/rails-full/bin/bundle +109 -0
- data/apps/rails-full/bin/dev +2 -0
- data/apps/rails-full/bin/docker-entrypoint +14 -0
- data/apps/rails-full/bin/importmap +4 -0
- data/apps/rails-full/bin/jobs +6 -0
- data/apps/rails-full/bin/kamal +27 -0
- data/apps/rails-full/bin/rails +4 -0
- data/apps/rails-full/bin/rake +4 -0
- data/apps/rails-full/bin/rubocop +8 -0
- data/apps/rails-full/bin/setup +34 -0
- data/apps/rails-full/bin/thrust +5 -0
- data/apps/rails-full/config/application.rb +31 -0
- data/apps/rails-full/config/boot.rb +4 -0
- data/apps/rails-full/config/cable.yml +17 -0
- data/apps/rails-full/config/cache.yml +16 -0
- data/apps/rails-full/config/credentials.yml.enc +1 -0
- data/apps/rails-full/config/database.yml +41 -0
- data/apps/rails-full/config/deploy.yml +116 -0
- data/apps/rails-full/config/environment.rb +5 -0
- data/apps/rails-full/config/environments/development.rb +72 -0
- data/apps/rails-full/config/environments/production.rb +91 -0
- data/apps/rails-full/config/environments/test.rb +53 -0
- data/apps/rails-full/config/importmap.rb +7 -0
- data/apps/rails-full/config/initializers/assets.rb +7 -0
- data/apps/rails-full/config/initializers/clerk.rb +4 -0
- data/apps/rails-full/config/initializers/content_security_policy.rb +25 -0
- data/apps/rails-full/config/initializers/filter_parameter_logging.rb +8 -0
- data/apps/rails-full/config/initializers/inflections.rb +16 -0
- data/apps/rails-full/config/locales/en.yml +31 -0
- data/apps/rails-full/config/puma.rb +41 -0
- data/apps/rails-full/config/queue.yml +18 -0
- data/apps/rails-full/config/recurring.yml +10 -0
- data/apps/rails-full/config/routes.rb +15 -0
- data/apps/rails-full/config/storage.yml +34 -0
- data/apps/rails-full/config.ru +6 -0
- data/apps/rails-full/db/cable_schema.rb +11 -0
- data/apps/rails-full/db/cache_schema.rb +14 -0
- data/apps/rails-full/db/queue_schema.rb +129 -0
- data/apps/rails-full/db/seeds.rb +9 -0
- data/apps/rails-full/public/400.html +114 -0
- data/apps/rails-full/public/404.html +114 -0
- data/apps/rails-full/public/406-unsupported-browser.html +114 -0
- data/apps/rails-full/public/422.html +114 -0
- data/apps/rails-full/public/500.html +114 -0
- data/apps/rails-full/public/icon.png +0 -0
- data/apps/rails-full/public/icon.svg +3 -0
- data/apps/rails-full/public/robots.txt +1 -0
- data/apps/rails-full/test/application_system_test_case.rb +5 -0
- data/apps/rails-full/test/controllers/home_controller_test.rb +7 -0
- data/apps/rails-full/test/test_helper.rb +15 -0
- data/apps/sinatra/app.rb +29 -0
- data/apps/sinatra/config.ru +2 -0
- data/apps/sinatra/views/index.erb +44 -0
- data/clerk-sdk-ruby.gemspec +2 -1
- data/lib/clerk/authenticatable.rb +14 -79
- data/lib/clerk/authenticate_context.rb +164 -181
- data/lib/clerk/authenticate_request.rb +238 -230
- data/lib/clerk/configuration.rb +78 -0
- data/lib/clerk/constants.rb +68 -46
- data/lib/clerk/error.rb +17 -0
- data/lib/clerk/jwks_cache.rb +27 -22
- data/lib/clerk/proxy.rb +135 -0
- data/lib/clerk/rack.rb +2 -0
- data/lib/clerk/rack_middleware.rb +88 -73
- data/lib/clerk/rails.rb +3 -0
- data/lib/clerk/railtie.rb +7 -6
- data/lib/clerk/sdk.rb +46 -156
- data/lib/clerk/sinatra.rb +52 -0
- data/lib/clerk/utils.rb +52 -6
- data/lib/clerk/version.rb +1 -1
- data/lib/clerk.rb +15 -51
- metadata +187 -25
- data/CODEOWNERS +0 -1
- data/lib/clerk/errors.rb +0 -22
- data/lib/clerk/rack_middleware_v2.rb +0 -167
- data/lib/clerk/resources/allowlist.rb +0 -16
- data/lib/clerk/resources/allowlist_identifiers.rb +0 -16
- data/lib/clerk/resources/clients.rb +0 -23
- data/lib/clerk/resources/email_addresses.rb +0 -17
- data/lib/clerk/resources/emails.rb +0 -16
- data/lib/clerk/resources/jwks.rb +0 -18
- data/lib/clerk/resources/organizations.rb +0 -73
- data/lib/clerk/resources/phone_numbers.rb +0 -17
- data/lib/clerk/resources/plural_resource.rb +0 -38
- data/lib/clerk/resources/sessions.rb +0 -26
- data/lib/clerk/resources/singular_resource.rb +0 -14
- data/lib/clerk/resources/users.rb +0 -37
- data/lib/clerk/resources.rb +0 -10
@@ -1,253 +1,261 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "clerk/proxy"
|
4
|
+
require "rack/utils"
|
5
|
+
|
1
6
|
module Clerk
|
2
|
-
|
3
|
-
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
11
|
-
|
12
|
-
@auth_context = auth_context
|
13
|
-
end
|
7
|
+
# This class represents a service object used to determine the current request state
|
8
|
+
# for the current env passed based on a provided Clerk::AuthenticateContext.
|
9
|
+
# There is only 1 public method exposed (`resolve`) to be invoked with a env parameter.
|
10
|
+
class AuthenticateRequest
|
11
|
+
attr_reader :auth_context
|
12
|
+
|
13
|
+
# Creates a new instance using Clerk::AuthenticateContext object.
|
14
|
+
def initialize(auth_context)
|
15
|
+
@auth_context = auth_context
|
16
|
+
end
|
14
17
|
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
end
|
18
|
+
# Determines the current request state by verifying a Clerk token in headers or cookies.
|
19
|
+
# The possible outcomes of this method are `signed-in`, `signed-out` or `handshake` states.
|
20
|
+
# The return values are the same as a return value of a rack middleware `[http_status_code, headers, body]`.
|
21
|
+
# When used in a middleware the consumer of this service should return the return value when there is an
|
22
|
+
# `http_status_code` provided otherwise the should continue with the middleware chain.
|
23
|
+
# The headers provided in the return value is a hash of { header_key => header_value } and in the case
|
24
|
+
# of a `Set-Cookie` header the `header_value` used is a list of raw HTTP Set-Cookie directives.
|
25
|
+
def resolve(env)
|
26
|
+
if auth_context.session_token_in_header?
|
27
|
+
resolve_header_token(env)
|
28
|
+
else
|
29
|
+
resolve_cookie_token(env)
|
30
|
+
end
|
31
|
+
end
|
30
32
|
|
31
|
-
|
32
|
-
|
33
|
-
def resolve_header_token(env)
|
34
|
-
begin
|
35
|
-
# malformed JWT
|
36
|
-
return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID) if !sdk.decode_token(auth_context.session_token_in_header)
|
37
|
-
|
38
|
-
claims = verify_token(auth_context.session_token_in_header)
|
39
|
-
return signed_in(env, claims, auth_context.session_token_in_header) if claims
|
40
|
-
rescue JWT::DecodeError
|
41
|
-
# malformed JSON authorization header
|
42
|
-
return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
|
43
|
-
rescue JWT::ExpiredSignature
|
44
|
-
return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
|
45
|
-
rescue JWT::InvalidIatError
|
46
|
-
return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
|
47
|
-
end
|
48
|
-
|
49
|
-
# Clerk.js should refresh the token and retry
|
50
|
-
return signed_out(enforce_auth: true)
|
51
|
-
end
|
33
|
+
protected
|
52
34
|
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
if auth_context.handshake_token?
|
59
|
-
return resolve_handshake(env)
|
60
|
-
end
|
61
|
-
|
62
|
-
if auth_context.development_instance? && auth_context.dev_browser?
|
63
|
-
return handle_handshake_maybe_status(env, reason: AuthErrorReason::DEV_BROWSER_SYNC)
|
64
|
-
end
|
65
|
-
|
66
|
-
# TODO(dimkl): Add multi-domain support for production
|
67
|
-
# if auth_context.production_instance? && auth_context.eligible_for_multi_domain?
|
68
|
-
# return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING)
|
69
|
-
# end
|
70
|
-
|
71
|
-
# TODO(dimkl): Add multi-domain support for development
|
72
|
-
# if auth_context.development_instance? && auth_context.eligible_for_multi_domain?
|
73
|
-
# trigger handshake using auth_context.sign_in_url as base redirect_url
|
74
|
-
# return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING, '', headers);
|
75
|
-
# end
|
76
|
-
|
77
|
-
# TODO(dimkl): Add multi-domain support for development in primary
|
78
|
-
# if auth_context.development_instance? && !auth_context.is_satellite? && auth_context.clerk_redirect_url
|
79
|
-
# trigger handshake using auth_context.clerk_redirect_url as base redirect_url + mark it as clerk_synced
|
80
|
-
# return handle_handshake_maybe_status(env, reason: AuthErrorReason::PRIMARY_RESPONDS_TO_SYNCING, '', headers);
|
81
|
-
# end
|
82
|
-
|
83
|
-
if !auth_context.active_client? && !auth_context.session_token_in_cookie?
|
84
|
-
return signed_out(reason: AuthErrorReason::SESSION_TOKEN_AND_UAT_MISSING)
|
85
|
-
end
|
86
|
-
|
87
|
-
# This can eagerly run handshake since client_uat is SameSite=Strict in dev
|
88
|
-
if !auth_context.active_client? && auth_context.session_token_in_cookie?
|
89
|
-
return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_WITHOUT_CLIENT_UAT)
|
90
|
-
end
|
91
|
-
|
92
|
-
if auth_context.active_client? && !auth_context.session_token_in_cookie?
|
93
|
-
return handle_handshake_maybe_status(env, reason: AuthErrorReason::CLIENT_UAT_WITHOUT_SESSION_TOKEN)
|
94
|
-
end
|
95
|
-
|
96
|
-
begin
|
97
|
-
token = verify_token(auth_context.session_token_in_cookie)
|
98
|
-
return signed_out if !token
|
99
|
-
|
100
|
-
if token["iat"] < auth_context.client_uat
|
101
|
-
return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_OUTDATED);
|
102
|
-
end
|
103
|
-
|
104
|
-
return signed_in(env, token, auth_context.session_token_in_cookie)
|
105
|
-
rescue JWT::ExpiredSignature
|
106
|
-
handshake(env, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
|
107
|
-
rescue JWT::InvalidIatError
|
108
|
-
handshake(env, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
|
109
|
-
end
|
110
|
-
|
111
|
-
signed_out
|
35
|
+
def resolve_header_token(env)
|
36
|
+
begin
|
37
|
+
# malformed JWT
|
38
|
+
unless sdk.decode_token(auth_context.session_token_in_header)
|
39
|
+
return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
|
112
40
|
end
|
113
41
|
|
114
|
-
|
115
|
-
|
116
|
-
|
117
|
-
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
|
129
|
-
|
130
|
-
headers[COOKIE_HEADER] ||= []
|
131
|
-
headers[COOKIE_HEADER] << cookie
|
132
|
-
|
133
|
-
if cookie.start_with?("#{SESSION_COOKIE}=")
|
134
|
-
session_token = cookie.split(';')[0].split('=')[1]
|
135
|
-
end
|
136
|
-
end
|
137
|
-
|
138
|
-
# Clear handshake token from query params and set headers to redirect to the initial request url
|
139
|
-
if auth_context.development_instance?
|
140
|
-
redirect_url = auth_context.clerk_url.dup
|
141
|
-
remove_from_query_string(redirect_url, HANDSHAKE_COOKIE)
|
142
|
-
remove_from_query_string(redirect_url, HANDSHAKE_HELP_QUERY_PARAM)
|
143
|
-
|
144
|
-
headers[LOCATION_HEADER] = redirect_url.to_s
|
145
|
-
end
|
146
|
-
|
147
|
-
if !session_token
|
148
|
-
return signed_out(reason: AuthErrorReason::SESSION_TOKEN_MISSING, headers: headers)
|
149
|
-
end
|
150
|
-
|
151
|
-
verify_token_with_retry(env, session_token)
|
152
|
-
end
|
42
|
+
claims = verify_token(auth_context.session_token_in_header)
|
43
|
+
return signed_in(env, claims, auth_context.session_token_in_header) if claims
|
44
|
+
rescue JWT::ExpiredSignature
|
45
|
+
# Expired token
|
46
|
+
return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
|
47
|
+
rescue JWT::InvalidIatError
|
48
|
+
# Token not active yet
|
49
|
+
return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
|
50
|
+
rescue JWT::DecodeError
|
51
|
+
# Malformed JWT (NOTE: Must be the last rescue block as it catches all decoding errors)
|
52
|
+
return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
|
53
|
+
end
|
54
|
+
|
55
|
+
# Clerk.js should refresh the token and retry
|
56
|
+
signed_out(enforce_auth: true)
|
57
|
+
end
|
153
58
|
|
154
|
-
|
155
|
-
|
156
|
-
|
59
|
+
def resolve_cookie_token(env)
|
60
|
+
# in cross-origin XHRs the use of Authorization header is mandatory.
|
61
|
+
# TODO: add reason
|
62
|
+
return signed_out if auth_context.cross_origin_request?
|
63
|
+
|
64
|
+
return resolve_handshake(env) if auth_context.handshake_token?
|
65
|
+
|
66
|
+
if auth_context.development_instance? && auth_context.dev_browser_in_url?
|
67
|
+
return handle_handshake_maybe_status(env, reason: AuthErrorReason::DEV_BROWSER_SYNC)
|
68
|
+
end
|
69
|
+
|
70
|
+
if auth_context.development_instance? && !auth_context.dev_browser?
|
71
|
+
return handle_handshake_maybe_status(env, reason: AuthErrorReason::DEV_BROWSER_MISSING)
|
72
|
+
end
|
73
|
+
|
74
|
+
# TODO: Add multi-domain support for production
|
75
|
+
# if auth_context.production_instance? && auth_context.eligible_for_multi_domain?
|
76
|
+
# return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING)
|
77
|
+
# end
|
78
|
+
|
79
|
+
# TODO: Add multi-domain support for development
|
80
|
+
# if auth_context.development_instance? && auth_context.eligible_for_multi_domain?
|
81
|
+
# # trigger handshake using auth_context.sign_in_url as base redirect_url
|
82
|
+
# # return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING, '', headers)
|
83
|
+
# end
|
84
|
+
|
85
|
+
# TODO: Add multi-domain support for development in primary
|
86
|
+
# if auth_context.development_instance? && !auth_context.is_satellite? && auth_context.clerk_redirect_url
|
87
|
+
# # trigger handshake using auth_context.clerk_redirect_url as base redirect_url + mark it as clerk_synced
|
88
|
+
# # return handle_handshake_maybe_status(env, reason: AuthErrorReason::PRIMARY_RESPONDS_TO_SYNCING, '', headers)
|
89
|
+
# end
|
90
|
+
|
91
|
+
if !auth_context.active_client? && !auth_context.session_token_in_cookie?
|
92
|
+
return signed_out(reason: AuthErrorReason::SESSION_TOKEN_AND_UAT_MISSING)
|
93
|
+
end
|
94
|
+
|
95
|
+
# This can eagerly run handshake since client_uat is SameSite=Strict in dev
|
96
|
+
if !auth_context.active_client? && auth_context.session_token_in_cookie?
|
97
|
+
return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_WITHOUT_CLIENT_UAT)
|
98
|
+
end
|
99
|
+
|
100
|
+
if auth_context.active_client? && !auth_context.session_token_in_cookie?
|
101
|
+
return handle_handshake_maybe_status(env, reason: AuthErrorReason::CLIENT_UAT_WITHOUT_SESSION_TOKEN)
|
102
|
+
end
|
103
|
+
|
104
|
+
begin
|
105
|
+
claims = verify_token(auth_context.session_token_in_cookie)
|
106
|
+
return signed_out unless claims
|
107
|
+
|
108
|
+
if claims["iat"] < auth_context.client_uat.to_i
|
109
|
+
return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_OUTDATED)
|
157
110
|
end
|
158
111
|
|
159
|
-
|
160
|
-
|
161
|
-
|
162
|
-
|
163
|
-
|
112
|
+
signed_in(env, claims, auth_context.session_token_in_cookie)
|
113
|
+
rescue JWT::ExpiredSignature
|
114
|
+
handshake(env, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
|
115
|
+
rescue JWT::InvalidIatError
|
116
|
+
handshake(env, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
|
117
|
+
rescue JWT::DecodeError
|
118
|
+
signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
|
119
|
+
rescue
|
120
|
+
signed_out
|
121
|
+
end
|
122
|
+
end
|
164
123
|
|
165
|
-
|
166
|
-
|
167
|
-
|
168
|
-
|
124
|
+
def resolve_handshake(env)
|
125
|
+
headers = {
|
126
|
+
"Access-Control-Allow-Origin" => "null",
|
127
|
+
"Access-Control-Allow-Credentials" => "true"
|
128
|
+
}
|
129
|
+
session_token = nil
|
169
130
|
|
170
|
-
|
171
|
-
|
172
|
-
|
173
|
-
|
174
|
-
|
175
|
-
end
|
131
|
+
# Return signed-out outcome if the handshake verification fails
|
132
|
+
handshake_payload = verify_token(auth_context.handshake_token)
|
133
|
+
unless handshake_payload
|
134
|
+
return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::JWK_FAILED_TO_RESOLVE)
|
135
|
+
end
|
176
136
|
|
177
|
-
|
178
|
-
|
179
|
-
|
180
|
-
|
181
|
-
|
137
|
+
# Retrieve the cookie directives included in handshake token payload and convert it to set-cookie headers
|
138
|
+
# Also retrieve the session token separately to determine the outcome of the request
|
139
|
+
cookies_to_set = handshake_payload[HANDSHAKE_COOKIE_DIRECTIVES_KEY] || []
|
140
|
+
cookies_to_set.each do |cookie|
|
141
|
+
headers[SET_COOKIE_HEADER] ||= []
|
142
|
+
headers[SET_COOKIE_HEADER] << cookie
|
182
143
|
|
183
|
-
|
184
|
-
|
185
|
-
end
|
144
|
+
session_token = cookie.split(";")[0].split("=")[1] if cookie.start_with?("#{SESSION_COOKIE}=")
|
145
|
+
end
|
186
146
|
|
187
|
-
|
147
|
+
# Clear handshake token from query params and set headers to redirect to the initial request url
|
148
|
+
if auth_context.development_instance?
|
149
|
+
redirect_url = auth_context.clerk_url.dup
|
150
|
+
remove_from_query_string(redirect_url, HANDSHAKE_COOKIE)
|
188
151
|
|
189
|
-
|
190
|
-
|
191
|
-
remove_from_query_string(redirect_url, DEV_BROWSER_COOKIE)
|
152
|
+
headers[LOCATION_HEADER] = redirect_url.to_s
|
153
|
+
end
|
192
154
|
|
193
|
-
|
194
|
-
handshake_url_qs = Rack::Utils.parse_query(handshake_url.query)
|
195
|
-
handshake_url_qs["redirect_url"] = redirect_url
|
155
|
+
return signed_out(reason: AuthErrorReason::SESSION_TOKEN_MISSING, headers: headers) unless session_token
|
196
156
|
|
197
|
-
|
198
|
-
|
199
|
-
end
|
157
|
+
verify_token_with_retry(env, session_token)
|
158
|
+
end
|
200
159
|
|
201
|
-
|
202
|
-
|
203
|
-
end
|
160
|
+
def handle_handshake_maybe_status(env, **opts)
|
161
|
+
return signed_out unless eligible_for_handshake?
|
204
162
|
|
205
|
-
|
206
|
-
|
207
|
-
qs.delete(key)
|
208
|
-
url.query = qs.to_query
|
209
|
-
end
|
163
|
+
handshake(env, **opts)
|
164
|
+
end
|
210
165
|
|
211
|
-
|
212
|
-
|
213
|
-
|
214
|
-
|
215
|
-
|
216
|
-
rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
|
217
|
-
raise e
|
218
|
-
rescue JWT::DecodeError, JWT::RequiredDependencyError => e
|
219
|
-
false
|
220
|
-
end
|
221
|
-
end
|
166
|
+
# A outcome
|
167
|
+
def handshake(_env, **opts)
|
168
|
+
redirect_headers = {LOCATION_HEADER => redirect_to_handshake}
|
169
|
+
[307, debug_auth_headers(**opts).merge(redirect_headers), []]
|
170
|
+
end
|
222
171
|
|
223
|
-
|
224
|
-
|
225
|
-
|
226
|
-
|
227
|
-
return signed_in(env, claims, token) if claims
|
228
|
-
rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
|
229
|
-
if auth_context.development_instance?
|
230
|
-
# TODO: log possible Clock skew detected
|
231
|
-
|
232
|
-
# Retry with a generous clock skew allowance (1 day)
|
233
|
-
claims = verify_token(token, timeout: 86_400)
|
234
|
-
return signed_in(env, claims, token) if claims
|
235
|
-
end
|
236
|
-
|
237
|
-
# Raise error if handshake resolution fails in production
|
238
|
-
raise e
|
239
|
-
end
|
172
|
+
# B outcome
|
173
|
+
def signed_out(**opts)
|
174
|
+
headers = opts.delete(:headers) || {}
|
175
|
+
enforce_auth = opts.delete(:enforce_auth)
|
240
176
|
|
241
|
-
|
242
|
-
|
243
|
-
|
244
|
-
|
245
|
-
|
246
|
-
|
247
|
-
|
248
|
-
|
249
|
-
|
250
|
-
|
251
|
-
|
177
|
+
[
|
178
|
+
enforce_auth ? 401 : nil,
|
179
|
+
debug_auth_headers(**opts).merge(headers),
|
180
|
+
[]
|
181
|
+
]
|
182
|
+
end
|
183
|
+
|
184
|
+
# C outcome
|
185
|
+
def signed_in(env, claims, token, **headers)
|
186
|
+
env["clerk"] = Proxy.new(session_claims: claims, session_token: token)
|
187
|
+
[nil, headers, []]
|
188
|
+
end
|
189
|
+
|
190
|
+
def eligible_for_handshake?
|
191
|
+
auth_context.document_request? || (!auth_context.document_request? && auth_context.accepts_html?)
|
192
|
+
end
|
193
|
+
|
194
|
+
private
|
195
|
+
|
196
|
+
def redirect_to_handshake
|
197
|
+
redirect_url = auth_context.clerk_url.dup
|
198
|
+
remove_from_query_string(redirect_url, DEV_BROWSER_COOKIE)
|
199
|
+
|
200
|
+
handshake_url = URI.parse("https://#{auth_context.frontend_api}/v1/client/handshake")
|
201
|
+
handshake_url_qs = ::Rack::Utils.parse_query(handshake_url.query)
|
202
|
+
handshake_url_qs["redirect_url"] = redirect_url
|
203
|
+
|
204
|
+
if auth_context.development_instance? && auth_context.dev_browser?
|
205
|
+
handshake_url_qs[DEV_BROWSER_COOKIE] = auth_context.dev_browser
|
206
|
+
end
|
207
|
+
|
208
|
+
handshake_url.query = ::Rack::Utils.build_query(handshake_url_qs)
|
209
|
+
handshake_url.to_s
|
210
|
+
end
|
211
|
+
|
212
|
+
def remove_from_query_string(url, key)
|
213
|
+
qs = ::Rack::Utils.parse_query(url.query)
|
214
|
+
qs.delete(key)
|
215
|
+
|
216
|
+
url.query = ::Rack::Utils.build_query(qs)
|
217
|
+
end
|
218
|
+
|
219
|
+
def verify_token(token, **opts)
|
220
|
+
return false if token.nil? || token.strip.empty?
|
221
|
+
|
222
|
+
begin
|
223
|
+
sdk.verify_token(token, **opts)
|
224
|
+
rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
|
225
|
+
raise e
|
226
|
+
rescue JWT::DecodeError, JWT::RequiredDependencyError => _
|
227
|
+
false
|
228
|
+
end
|
229
|
+
end
|
230
|
+
|
231
|
+
# Verify session token and provide a 1-day leeway for development if initial verification
|
232
|
+
# fails for development instance due to invalid exp or iat
|
233
|
+
def verify_token_with_retry(env, token)
|
234
|
+
claims = verify_token(token)
|
235
|
+
signed_in(env, claims, token) if claims
|
236
|
+
rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
|
237
|
+
if auth_context.development_instance?
|
238
|
+
# TODO: log possible Clock skew detected
|
239
|
+
|
240
|
+
# Retry with a generous clock skew allowance (1 day)
|
241
|
+
claims = verify_token(token, timeout: 86_400)
|
242
|
+
return signed_in(env, claims, token) if claims
|
243
|
+
end
|
244
|
+
|
245
|
+
# Raise error if handshake resolution fails in production
|
246
|
+
raise e
|
247
|
+
end
|
248
|
+
|
249
|
+
def sdk
|
250
|
+
SDK.new
|
251
|
+
end
|
252
|
+
|
253
|
+
def debug_auth_headers(reason: nil, message: nil, status: nil)
|
254
|
+
{
|
255
|
+
AUTH_REASON_HEADER => reason,
|
256
|
+
AUTH_MESSAGE_HEADER => message,
|
257
|
+
AUTH_STATUS_HEADER => status
|
258
|
+
}.compact
|
252
259
|
end
|
253
|
-
end
|
260
|
+
end
|
261
|
+
end
|
@@ -0,0 +1,78 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "clerk-http-client"
|
4
|
+
|
5
|
+
module Clerk
|
6
|
+
class Configuration
|
7
|
+
attr_reader :cache_store
|
8
|
+
attr_reader :debug
|
9
|
+
attr_reader :excluded_routes
|
10
|
+
attr_reader :publishable_key
|
11
|
+
attr_reader :secret_key
|
12
|
+
|
13
|
+
def initialize
|
14
|
+
@excluded_routes = []
|
15
|
+
@publishable_key = ENV["CLERK_PUBLISHABLE_KEY"]
|
16
|
+
@secret_key = ENV["CLERK_SECRET_KEY"]
|
17
|
+
|
18
|
+
# Default to Rails.cache or ActiveSupport::Cache::MemoryStore, if available, otherwise nil
|
19
|
+
@cache_store = if defined?(::Rails)
|
20
|
+
::Rails.cache
|
21
|
+
elsif defined?(::ActiveSupport::Cache::MemoryStore)
|
22
|
+
::ActiveSupport::Cache::MemoryStore.new
|
23
|
+
end
|
24
|
+
|
25
|
+
ClerkHttpClient.configure do |config|
|
26
|
+
unless secret_key.nil? || secret_key.empty?
|
27
|
+
config.access_token = @secret_key
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
32
|
+
def self.default
|
33
|
+
@@default ||= new
|
34
|
+
end
|
35
|
+
|
36
|
+
def update(options)
|
37
|
+
options.each do |key, value|
|
38
|
+
send(:"#{key}=", value)
|
39
|
+
end
|
40
|
+
end
|
41
|
+
|
42
|
+
def debug=(value)
|
43
|
+
ClerkHttpClient::Configuration.default.debugging = value
|
44
|
+
@debug = value
|
45
|
+
end
|
46
|
+
|
47
|
+
def cache_store=(store)
|
48
|
+
if !store
|
49
|
+
@cache_store = nil
|
50
|
+
return
|
51
|
+
end
|
52
|
+
|
53
|
+
raise ArgumentError, "cache_store must respond to :fetch" unless store.respond_to?(:fetch)
|
54
|
+
|
55
|
+
@cache_store = store
|
56
|
+
end
|
57
|
+
|
58
|
+
def excluded_routes=(routes)
|
59
|
+
raise ArgumentError, "excluded_routes must be an array" unless routes.is_a?(Array)
|
60
|
+
raise ArgumentError, "All elements in the excluded_routes array must be strings" unless routes.all? { |r| r.is_a?(String) }
|
61
|
+
|
62
|
+
@excluded_routes = routes
|
63
|
+
end
|
64
|
+
|
65
|
+
def publishable_key=(pk)
|
66
|
+
raise ArgumentError, "publishable_key must start with 'pk_'" unless pk.start_with?("pk_")
|
67
|
+
|
68
|
+
@publishable_key = pk
|
69
|
+
end
|
70
|
+
|
71
|
+
def secret_key=(sk)
|
72
|
+
raise ArgumentError, "secret_key must start with 'sk_'" unless sk.start_with?("sk_")
|
73
|
+
|
74
|
+
ClerkHttpClient::Configuration.default.access_token = sk
|
75
|
+
@secret_key = sk
|
76
|
+
end
|
77
|
+
end
|
78
|
+
end
|