clerk-sdk-ruby 4.0.0.beta3 → 4.0.0.beta5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (204) hide show
  1. checksums.yaml +4 -4
  2. data/.env.example +3 -0
  3. data/.github/workflows/main.yml +24 -14
  4. data/.gitignore +7 -1
  5. data/.rspec +3 -0
  6. data/.ruby-version +1 -0
  7. data/CHANGELOG.md +22 -0
  8. data/Gemfile +26 -3
  9. data/Gemfile.lock +269 -13
  10. data/Guardfile +14 -0
  11. data/README.md +71 -11
  12. data/Rakefile +50 -6
  13. data/apps/rack/app.rb +67 -0
  14. data/apps/rack/config.ru +17 -0
  15. data/apps/rack/middleware/disable_paths.rb +13 -0
  16. data/apps/rails-api/.dockerignore +41 -0
  17. data/apps/rails-api/.gitattributes +9 -0
  18. data/apps/rails-api/.gitignore +32 -0
  19. data/apps/rails-api/.kamal/hooks/docker-setup.sample +3 -0
  20. data/apps/rails-api/.kamal/hooks/post-deploy.sample +14 -0
  21. data/apps/rails-api/.kamal/hooks/post-proxy-reboot.sample +3 -0
  22. data/apps/rails-api/.kamal/hooks/pre-build.sample +51 -0
  23. data/apps/rails-api/.kamal/hooks/pre-connect.sample +47 -0
  24. data/apps/rails-api/.kamal/hooks/pre-deploy.sample +109 -0
  25. data/apps/rails-api/.kamal/hooks/pre-proxy-reboot.sample +3 -0
  26. data/apps/rails-api/.kamal/secrets +17 -0
  27. data/apps/rails-api/.rubocop.yml +8 -0
  28. data/apps/rails-api/.ruby-version +1 -0
  29. data/apps/rails-api/Dockerfile +69 -0
  30. data/apps/rails-api/Gemfile +54 -0
  31. data/apps/rails-api/Gemfile.lock +374 -0
  32. data/apps/rails-api/README.md +24 -0
  33. data/apps/rails-api/Rakefile +6 -0
  34. data/apps/rails-api/app/controllers/application_controller.rb +3 -0
  35. data/apps/rails-api/app/controllers/home_controller.rb +5 -0
  36. data/apps/rails-api/app/jobs/application_job.rb +7 -0
  37. data/apps/rails-api/app/mailers/application_mailer.rb +4 -0
  38. data/apps/rails-api/app/models/application_record.rb +3 -0
  39. data/apps/rails-api/app/views/layouts/mailer.html.erb +13 -0
  40. data/apps/rails-api/app/views/layouts/mailer.text.erb +1 -0
  41. data/apps/rails-api/bin/brakeman +7 -0
  42. data/apps/rails-api/bin/bundle +109 -0
  43. data/apps/rails-api/bin/dev +2 -0
  44. data/apps/rails-api/bin/docker-entrypoint +14 -0
  45. data/apps/rails-api/bin/jobs +6 -0
  46. data/apps/rails-api/bin/kamal +27 -0
  47. data/apps/rails-api/bin/rails +4 -0
  48. data/apps/rails-api/bin/rake +4 -0
  49. data/apps/rails-api/bin/rubocop +8 -0
  50. data/apps/rails-api/bin/setup +34 -0
  51. data/apps/rails-api/bin/thrust +5 -0
  52. data/apps/rails-api/config/application.rb +36 -0
  53. data/apps/rails-api/config/boot.rb +4 -0
  54. data/apps/rails-api/config/cable.yml +17 -0
  55. data/apps/rails-api/config/cache.yml +16 -0
  56. data/apps/rails-api/config/credentials.yml.enc +1 -0
  57. data/apps/rails-api/config/database.yml +41 -0
  58. data/apps/rails-api/config/deploy.yml +116 -0
  59. data/apps/rails-api/config/environment.rb +5 -0
  60. data/apps/rails-api/config/environments/development.rb +70 -0
  61. data/apps/rails-api/config/environments/production.rb +88 -0
  62. data/apps/rails-api/config/environments/test.rb +53 -0
  63. data/apps/rails-api/config/initializers/cors.rb +16 -0
  64. data/apps/rails-api/config/initializers/filter_parameter_logging.rb +8 -0
  65. data/apps/rails-api/config/initializers/inflections.rb +16 -0
  66. data/apps/rails-api/config/locales/en.yml +31 -0
  67. data/apps/rails-api/config/puma.rb +41 -0
  68. data/apps/rails-api/config/queue.yml +18 -0
  69. data/apps/rails-api/config/recurring.yml +10 -0
  70. data/apps/rails-api/config/routes.rb +10 -0
  71. data/apps/rails-api/config/storage.yml +34 -0
  72. data/apps/rails-api/config.ru +6 -0
  73. data/apps/rails-api/db/cable_schema.rb +11 -0
  74. data/apps/rails-api/db/cache_schema.rb +14 -0
  75. data/apps/rails-api/db/queue_schema.rb +129 -0
  76. data/apps/rails-api/db/seeds.rb +9 -0
  77. data/apps/rails-api/public/robots.txt +1 -0
  78. data/apps/rails-api/test/controllers/home_controller_test.rb +7 -0
  79. data/apps/rails-api/test/test_helper.rb +15 -0
  80. data/apps/rails-full/.dockerignore +47 -0
  81. data/apps/rails-full/.gitattributes +9 -0
  82. data/apps/rails-full/.gitignore +34 -0
  83. data/apps/rails-full/.kamal/hooks/docker-setup.sample +3 -0
  84. data/apps/rails-full/.kamal/hooks/post-deploy.sample +14 -0
  85. data/apps/rails-full/.kamal/hooks/post-proxy-reboot.sample +3 -0
  86. data/apps/rails-full/.kamal/hooks/pre-build.sample +51 -0
  87. data/apps/rails-full/.kamal/hooks/pre-connect.sample +47 -0
  88. data/apps/rails-full/.kamal/hooks/pre-deploy.sample +109 -0
  89. data/apps/rails-full/.kamal/hooks/pre-proxy-reboot.sample +3 -0
  90. data/apps/rails-full/.kamal/secrets +17 -0
  91. data/apps/rails-full/.rubocop.yml +8 -0
  92. data/apps/rails-full/.ruby-version +1 -0
  93. data/apps/rails-full/Dockerfile +72 -0
  94. data/apps/rails-full/Gemfile +70 -0
  95. data/apps/rails-full/Gemfile.lock +429 -0
  96. data/apps/rails-full/README.md +24 -0
  97. data/apps/rails-full/Rakefile +6 -0
  98. data/apps/rails-full/app/assets/stylesheets/application.css +10 -0
  99. data/apps/rails-full/app/controllers/application_controller.rb +6 -0
  100. data/apps/rails-full/app/controllers/home_controller.rb +11 -0
  101. data/apps/rails-full/app/helpers/application_helper.rb +2 -0
  102. data/apps/rails-full/app/helpers/home_helper.rb +2 -0
  103. data/apps/rails-full/app/javascript/application.js +3 -0
  104. data/apps/rails-full/app/javascript/controllers/application.js +9 -0
  105. data/apps/rails-full/app/javascript/controllers/hello_controller.js +7 -0
  106. data/apps/rails-full/app/javascript/controllers/index.js +4 -0
  107. data/apps/rails-full/app/jobs/application_job.rb +7 -0
  108. data/apps/rails-full/app/mailers/application_mailer.rb +4 -0
  109. data/apps/rails-full/app/models/application_record.rb +3 -0
  110. data/apps/rails-full/app/views/home/index.html.erb +7 -0
  111. data/apps/rails-full/app/views/layouts/application.html.erb +60 -0
  112. data/apps/rails-full/app/views/layouts/mailer.html.erb +13 -0
  113. data/apps/rails-full/app/views/layouts/mailer.text.erb +1 -0
  114. data/apps/rails-full/app/views/pwa/manifest.json.erb +22 -0
  115. data/apps/rails-full/app/views/pwa/service-worker.js +26 -0
  116. data/apps/rails-full/bin/brakeman +7 -0
  117. data/apps/rails-full/bin/bundle +109 -0
  118. data/apps/rails-full/bin/dev +2 -0
  119. data/apps/rails-full/bin/docker-entrypoint +14 -0
  120. data/apps/rails-full/bin/importmap +4 -0
  121. data/apps/rails-full/bin/jobs +6 -0
  122. data/apps/rails-full/bin/kamal +27 -0
  123. data/apps/rails-full/bin/rails +4 -0
  124. data/apps/rails-full/bin/rake +4 -0
  125. data/apps/rails-full/bin/rubocop +8 -0
  126. data/apps/rails-full/bin/setup +34 -0
  127. data/apps/rails-full/bin/thrust +5 -0
  128. data/apps/rails-full/config/application.rb +31 -0
  129. data/apps/rails-full/config/boot.rb +4 -0
  130. data/apps/rails-full/config/cable.yml +17 -0
  131. data/apps/rails-full/config/cache.yml +16 -0
  132. data/apps/rails-full/config/credentials.yml.enc +1 -0
  133. data/apps/rails-full/config/database.yml +41 -0
  134. data/apps/rails-full/config/deploy.yml +116 -0
  135. data/apps/rails-full/config/environment.rb +5 -0
  136. data/apps/rails-full/config/environments/development.rb +72 -0
  137. data/apps/rails-full/config/environments/production.rb +91 -0
  138. data/apps/rails-full/config/environments/test.rb +53 -0
  139. data/apps/rails-full/config/importmap.rb +7 -0
  140. data/apps/rails-full/config/initializers/assets.rb +7 -0
  141. data/apps/rails-full/config/initializers/clerk.rb +4 -0
  142. data/apps/rails-full/config/initializers/content_security_policy.rb +25 -0
  143. data/apps/rails-full/config/initializers/filter_parameter_logging.rb +8 -0
  144. data/apps/rails-full/config/initializers/inflections.rb +16 -0
  145. data/apps/rails-full/config/locales/en.yml +31 -0
  146. data/apps/rails-full/config/puma.rb +41 -0
  147. data/apps/rails-full/config/queue.yml +18 -0
  148. data/apps/rails-full/config/recurring.yml +10 -0
  149. data/apps/rails-full/config/routes.rb +15 -0
  150. data/apps/rails-full/config/storage.yml +34 -0
  151. data/apps/rails-full/config.ru +6 -0
  152. data/apps/rails-full/db/cable_schema.rb +11 -0
  153. data/apps/rails-full/db/cache_schema.rb +14 -0
  154. data/apps/rails-full/db/queue_schema.rb +129 -0
  155. data/apps/rails-full/db/seeds.rb +9 -0
  156. data/apps/rails-full/public/400.html +114 -0
  157. data/apps/rails-full/public/404.html +114 -0
  158. data/apps/rails-full/public/406-unsupported-browser.html +114 -0
  159. data/apps/rails-full/public/422.html +114 -0
  160. data/apps/rails-full/public/500.html +114 -0
  161. data/apps/rails-full/public/icon.png +0 -0
  162. data/apps/rails-full/public/icon.svg +3 -0
  163. data/apps/rails-full/public/robots.txt +1 -0
  164. data/apps/rails-full/test/application_system_test_case.rb +5 -0
  165. data/apps/rails-full/test/controllers/home_controller_test.rb +7 -0
  166. data/apps/rails-full/test/test_helper.rb +15 -0
  167. data/apps/sinatra/app.rb +29 -0
  168. data/apps/sinatra/config.ru +2 -0
  169. data/apps/sinatra/views/index.erb +44 -0
  170. data/clerk-sdk-ruby.gemspec +2 -1
  171. data/lib/clerk/authenticatable.rb +14 -79
  172. data/lib/clerk/authenticate_context.rb +164 -181
  173. data/lib/clerk/authenticate_request.rb +238 -230
  174. data/lib/clerk/configuration.rb +78 -0
  175. data/lib/clerk/constants.rb +68 -46
  176. data/lib/clerk/error.rb +17 -0
  177. data/lib/clerk/jwks_cache.rb +27 -22
  178. data/lib/clerk/proxy.rb +135 -0
  179. data/lib/clerk/rack.rb +2 -0
  180. data/lib/clerk/rack_middleware.rb +88 -73
  181. data/lib/clerk/rails.rb +3 -0
  182. data/lib/clerk/railtie.rb +7 -6
  183. data/lib/clerk/sdk.rb +17 -156
  184. data/lib/clerk/sinatra.rb +52 -0
  185. data/lib/clerk/utils.rb +46 -6
  186. data/lib/clerk/version.rb +1 -1
  187. data/lib/clerk.rb +15 -51
  188. metadata +187 -25
  189. data/CODEOWNERS +0 -1
  190. data/lib/clerk/errors.rb +0 -22
  191. data/lib/clerk/rack_middleware_v2.rb +0 -167
  192. data/lib/clerk/resources/allowlist.rb +0 -16
  193. data/lib/clerk/resources/allowlist_identifiers.rb +0 -16
  194. data/lib/clerk/resources/clients.rb +0 -23
  195. data/lib/clerk/resources/email_addresses.rb +0 -17
  196. data/lib/clerk/resources/emails.rb +0 -16
  197. data/lib/clerk/resources/jwks.rb +0 -18
  198. data/lib/clerk/resources/organizations.rb +0 -73
  199. data/lib/clerk/resources/phone_numbers.rb +0 -17
  200. data/lib/clerk/resources/plural_resource.rb +0 -38
  201. data/lib/clerk/resources/sessions.rb +0 -26
  202. data/lib/clerk/resources/singular_resource.rb +0 -14
  203. data/lib/clerk/resources/users.rb +0 -37
  204. data/lib/clerk/resources.rb +0 -10
@@ -1,253 +1,261 @@
1
+ # frozen_string_literal: true
2
+
3
+ require "clerk/proxy"
4
+ require "rack/utils"
5
+
1
6
  module Clerk
2
- ##
3
- # This class represents a service object used to determine the current request state
4
- # for the current env passed based on a provided Clerk::AuthenticateContext.
5
- # There is only 1 public method exposed (`resolve`) to be invoked with a env parameter.
6
- class AuthenticateRequest
7
- attr_reader :auth_context
8
-
9
- ##
10
- # Creates a new instance using Clerk::AuthenticateContext object.
11
- def initialize(auth_context)
12
- @auth_context = auth_context
13
- end
7
+ # This class represents a service object used to determine the current request state
8
+ # for the current env passed based on a provided Clerk::AuthenticateContext.
9
+ # There is only 1 public method exposed (`resolve`) to be invoked with a env parameter.
10
+ class AuthenticateRequest
11
+ attr_reader :auth_context
12
+
13
+ # Creates a new instance using Clerk::AuthenticateContext object.
14
+ def initialize(auth_context)
15
+ @auth_context = auth_context
16
+ end
14
17
 
15
- ##
16
- # Determines the current request state by verifying a Clerk token in headers or cookies.
17
- # The possible outcomes of this method are `signed-in`, `signed-out` or `handshake` states.
18
- # The return values are the same as a return value of a rack middleware `[http_status_code, headers, body]`.
19
- # When used in a middleware the consumer of this service should return the return value when there is an
20
- # `http_status_code` provided otherwise the should continue with the middleware chain.
21
- # The headers provided in the return value is a hash of { header_key => header_value } and in the case
22
- # of a `Set-Cookie` header the `header_value` used is a list of raw HTTP Set-Cookie directives.
23
- def resolve(env)
24
- if auth_context.session_token_in_header?
25
- resolve_header_token(env)
26
- else
27
- resolve_cookie_token(env)
28
- end
29
- end
18
+ # Determines the current request state by verifying a Clerk token in headers or cookies.
19
+ # The possible outcomes of this method are `signed-in`, `signed-out` or `handshake` states.
20
+ # The return values are the same as a return value of a rack middleware `[http_status_code, headers, body]`.
21
+ # When used in a middleware the consumer of this service should return the return value when there is an
22
+ # `http_status_code` provided otherwise the should continue with the middleware chain.
23
+ # The headers provided in the return value is a hash of { header_key => header_value } and in the case
24
+ # of a `Set-Cookie` header the `header_value` used is a list of raw HTTP Set-Cookie directives.
25
+ def resolve(env)
26
+ if auth_context.session_token_in_header?
27
+ resolve_header_token(env)
28
+ else
29
+ resolve_cookie_token(env)
30
+ end
31
+ end
30
32
 
31
- protected
32
-
33
- def resolve_header_token(env)
34
- begin
35
- # malformed JWT
36
- return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID) if !sdk.decode_token(auth_context.session_token_in_header)
37
-
38
- claims = verify_token(auth_context.session_token_in_header)
39
- return signed_in(env, claims, auth_context.session_token_in_header) if claims
40
- rescue JWT::DecodeError
41
- # malformed JSON authorization header
42
- return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
43
- rescue JWT::ExpiredSignature
44
- return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
45
- rescue JWT::InvalidIatError
46
- return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
47
- end
48
-
49
- # Clerk.js should refresh the token and retry
50
- return signed_out(enforce_auth: true)
51
- end
33
+ protected
52
34
 
53
- def resolve_cookie_token(env)
54
- # in cross-origin XHRs the use of Authorization header is mandatory.
55
- # TODO: add reason
56
- return signed_out if auth_context.cross_origin_request?
57
-
58
- if auth_context.handshake_token?
59
- return resolve_handshake(env)
60
- end
61
-
62
- if auth_context.development_instance? && auth_context.dev_browser?
63
- return handle_handshake_maybe_status(env, reason: AuthErrorReason::DEV_BROWSER_SYNC)
64
- end
65
-
66
- # TODO(dimkl): Add multi-domain support for production
67
- # if auth_context.production_instance? && auth_context.eligible_for_multi_domain?
68
- # return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING)
69
- # end
70
-
71
- # TODO(dimkl): Add multi-domain support for development
72
- # if auth_context.development_instance? && auth_context.eligible_for_multi_domain?
73
- # trigger handshake using auth_context.sign_in_url as base redirect_url
74
- # return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING, '', headers);
75
- # end
76
-
77
- # TODO(dimkl): Add multi-domain support for development in primary
78
- # if auth_context.development_instance? && !auth_context.is_satellite? && auth_context.clerk_redirect_url
79
- # trigger handshake using auth_context.clerk_redirect_url as base redirect_url + mark it as clerk_synced
80
- # return handle_handshake_maybe_status(env, reason: AuthErrorReason::PRIMARY_RESPONDS_TO_SYNCING, '', headers);
81
- # end
82
-
83
- if !auth_context.active_client? && !auth_context.session_token_in_cookie?
84
- return signed_out(reason: AuthErrorReason::SESSION_TOKEN_AND_UAT_MISSING)
85
- end
86
-
87
- # This can eagerly run handshake since client_uat is SameSite=Strict in dev
88
- if !auth_context.active_client? && auth_context.session_token_in_cookie?
89
- return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_WITHOUT_CLIENT_UAT)
90
- end
91
-
92
- if auth_context.active_client? && !auth_context.session_token_in_cookie?
93
- return handle_handshake_maybe_status(env, reason: AuthErrorReason::CLIENT_UAT_WITHOUT_SESSION_TOKEN)
94
- end
95
-
96
- begin
97
- token = verify_token(auth_context.session_token_in_cookie)
98
- return signed_out if !token
99
-
100
- if token["iat"] < auth_context.client_uat
101
- return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_OUTDATED);
102
- end
103
-
104
- return signed_in(env, token, auth_context.session_token_in_cookie)
105
- rescue JWT::ExpiredSignature
106
- handshake(env, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
107
- rescue JWT::InvalidIatError
108
- handshake(env, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
109
- end
110
-
111
- signed_out
35
+ def resolve_header_token(env)
36
+ begin
37
+ # malformed JWT
38
+ unless sdk.decode_token(auth_context.session_token_in_header)
39
+ return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
112
40
  end
113
41
 
114
- def resolve_handshake(env)
115
- headers = {
116
- "Access-Control-Allow-Origin" => "null",
117
- "Access-Control-Allow-Credentials" => "true"
118
- }
119
-
120
- session_token = ''
121
-
122
- # Return signed-out outcome if the handshake verification fails
123
- handshake_payload = verify_token(auth_context.handshake_token)
124
- return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::JWK_FAILED_TO_RESOLVE) if !handshake_payload
125
-
126
- # Retrieve the cookie directives included in handshake token payload and convert it to set-cookie headers
127
- # Also retrieve the session token separately to determine the outcome of the request
128
- cookies_to_set = handshake_payload[HANDSHAKE_COOKIE_DIRECTIVES_KEY] || []
129
- cookies_to_set.each do |cookie|
130
- headers[COOKIE_HEADER] ||= []
131
- headers[COOKIE_HEADER] << cookie
132
-
133
- if cookie.start_with?("#{SESSION_COOKIE}=")
134
- session_token = cookie.split(';')[0].split('=')[1]
135
- end
136
- end
137
-
138
- # Clear handshake token from query params and set headers to redirect to the initial request url
139
- if auth_context.development_instance?
140
- redirect_url = auth_context.clerk_url.dup
141
- remove_from_query_string(redirect_url, HANDSHAKE_COOKIE)
142
- remove_from_query_string(redirect_url, HANDSHAKE_HELP_QUERY_PARAM)
143
-
144
- headers[LOCATION_HEADER] = redirect_url.to_s
145
- end
146
-
147
- if !session_token
148
- return signed_out(reason: AuthErrorReason::SESSION_TOKEN_MISSING, headers: headers)
149
- end
150
-
151
- verify_token_with_retry(env, session_token)
152
- end
42
+ claims = verify_token(auth_context.session_token_in_header)
43
+ return signed_in(env, claims, auth_context.session_token_in_header) if claims
44
+ rescue JWT::ExpiredSignature
45
+ # Expired token
46
+ return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
47
+ rescue JWT::InvalidIatError
48
+ # Token not active yet
49
+ return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
50
+ rescue JWT::DecodeError
51
+ # Malformed JWT (NOTE: Must be the last rescue block as it catches all decoding errors)
52
+ return signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
53
+ end
54
+
55
+ # Clerk.js should refresh the token and retry
56
+ signed_out(enforce_auth: true)
57
+ end
153
58
 
154
- def handle_handshake_maybe_status(env, **opts)
155
- return signed_out if !eligible_for_handshake?
156
- handshake(env, **opts)
59
+ def resolve_cookie_token(env)
60
+ # in cross-origin XHRs the use of Authorization header is mandatory.
61
+ # TODO: add reason
62
+ return signed_out if auth_context.cross_origin_request?
63
+
64
+ return resolve_handshake(env) if auth_context.handshake_token?
65
+
66
+ if auth_context.development_instance? && auth_context.dev_browser_in_url?
67
+ return handle_handshake_maybe_status(env, reason: AuthErrorReason::DEV_BROWSER_SYNC)
68
+ end
69
+
70
+ if auth_context.development_instance? && !auth_context.dev_browser?
71
+ return handle_handshake_maybe_status(env, reason: AuthErrorReason::DEV_BROWSER_MISSING)
72
+ end
73
+
74
+ # TODO: Add multi-domain support for production
75
+ # if auth_context.production_instance? && auth_context.eligible_for_multi_domain?
76
+ # return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING)
77
+ # end
78
+
79
+ # TODO: Add multi-domain support for development
80
+ # if auth_context.development_instance? && auth_context.eligible_for_multi_domain?
81
+ # # trigger handshake using auth_context.sign_in_url as base redirect_url
82
+ # # return handle_handshake_maybe_status(env, reason: AuthErrorReason::SATELLITE_COOKIE_NEEDS_SYNCING, '', headers)
83
+ # end
84
+
85
+ # TODO: Add multi-domain support for development in primary
86
+ # if auth_context.development_instance? && !auth_context.is_satellite? && auth_context.clerk_redirect_url
87
+ # # trigger handshake using auth_context.clerk_redirect_url as base redirect_url + mark it as clerk_synced
88
+ # # return handle_handshake_maybe_status(env, reason: AuthErrorReason::PRIMARY_RESPONDS_TO_SYNCING, '', headers)
89
+ # end
90
+
91
+ if !auth_context.active_client? && !auth_context.session_token_in_cookie?
92
+ return signed_out(reason: AuthErrorReason::SESSION_TOKEN_AND_UAT_MISSING)
93
+ end
94
+
95
+ # This can eagerly run handshake since client_uat is SameSite=Strict in dev
96
+ if !auth_context.active_client? && auth_context.session_token_in_cookie?
97
+ return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_WITHOUT_CLIENT_UAT)
98
+ end
99
+
100
+ if auth_context.active_client? && !auth_context.session_token_in_cookie?
101
+ return handle_handshake_maybe_status(env, reason: AuthErrorReason::CLIENT_UAT_WITHOUT_SESSION_TOKEN)
102
+ end
103
+
104
+ begin
105
+ claims = verify_token(auth_context.session_token_in_cookie)
106
+ return signed_out unless claims
107
+
108
+ if claims["iat"] < auth_context.client_uat.to_i
109
+ return handle_handshake_maybe_status(env, reason: AuthErrorReason::SESSION_TOKEN_OUTDATED)
157
110
  end
158
111
 
159
- # A outcome
160
- def handshake(env, **opts)
161
- redirect_headers = { LOCATION_HEADER => redirect_to_handshake }
162
- [307, debug_auth_headers(**opts).merge(redirect_headers), []]
163
- end
112
+ signed_in(env, claims, auth_context.session_token_in_cookie)
113
+ rescue JWT::ExpiredSignature
114
+ handshake(env, reason: TokenVerificationErrorReason::TOKEN_EXPIRED)
115
+ rescue JWT::InvalidIatError
116
+ handshake(env, reason: TokenVerificationErrorReason::TOKEN_NOT_ACTIVE_YET)
117
+ rescue JWT::DecodeError
118
+ signed_out(reason: TokenVerificationErrorReason::TOKEN_INVALID)
119
+ rescue
120
+ signed_out
121
+ end
122
+ end
164
123
 
165
- # B outcome
166
- def signed_out(**opts)
167
- headers = opts.delete(:headers) || {}
168
- enforce_auth = opts.delete(:enforce_auth)
124
+ def resolve_handshake(env)
125
+ headers = {
126
+ "Access-Control-Allow-Origin" => "null",
127
+ "Access-Control-Allow-Credentials" => "true"
128
+ }
129
+ session_token = nil
169
130
 
170
- if enforce_auth
171
- [401, debug_auth_headers(**opts).merge(headers), []]
172
- else
173
- [nil, headers, []]
174
- end
175
- end
131
+ # Return signed-out outcome if the handshake verification fails
132
+ handshake_payload = verify_token(auth_context.handshake_token)
133
+ unless handshake_payload
134
+ return signed_out(enforce_auth: true, reason: TokenVerificationErrorReason::JWK_FAILED_TO_RESOLVE)
135
+ end
176
136
 
177
- # C outcome
178
- def signed_in(env, claims, token, **headers)
179
- env["clerk"] = ProxyV2.new(session_claims: claims, session_token: token)
180
- [nil, headers, []]
181
- end
137
+ # Retrieve the cookie directives included in handshake token payload and convert it to set-cookie headers
138
+ # Also retrieve the session token separately to determine the outcome of the request
139
+ cookies_to_set = handshake_payload[HANDSHAKE_COOKIE_DIRECTIVES_KEY] || []
140
+ cookies_to_set.each do |cookie|
141
+ headers[SET_COOKIE_HEADER] ||= []
142
+ headers[SET_COOKIE_HEADER] << cookie
182
143
 
183
- def eligible_for_handshake?
184
- auth_context.document_request? || (!auth_context.document_request? && auth_context.accepts_html?)
185
- end
144
+ session_token = cookie.split(";")[0].split("=")[1] if cookie.start_with?("#{SESSION_COOKIE}=")
145
+ end
186
146
 
187
- private
147
+ # Clear handshake token from query params and set headers to redirect to the initial request url
148
+ if auth_context.development_instance?
149
+ redirect_url = auth_context.clerk_url.dup
150
+ remove_from_query_string(redirect_url, HANDSHAKE_COOKIE)
188
151
 
189
- def redirect_to_handshake
190
- redirect_url = auth_context.clerk_url.dup
191
- remove_from_query_string(redirect_url, DEV_BROWSER_COOKIE)
152
+ headers[LOCATION_HEADER] = redirect_url.to_s
153
+ end
192
154
 
193
- handshake_url = URI.parse("https://#{auth_context.frontend_api}/v1/client/handshake")
194
- handshake_url_qs = Rack::Utils.parse_query(handshake_url.query)
195
- handshake_url_qs["redirect_url"] = redirect_url
155
+ return signed_out(reason: AuthErrorReason::SESSION_TOKEN_MISSING, headers: headers) unless session_token
196
156
 
197
- if auth_context.development_instance? && auth_context.dev_browser?
198
- handshake_url_qs[DEV_BROWSER_COOKIE] = auth_context.dev_browser
199
- end
157
+ verify_token_with_retry(env, session_token)
158
+ end
200
159
 
201
- handshake_url.query = handshake_url_qs.to_query
202
- handshake_url.to_s
203
- end
160
+ def handle_handshake_maybe_status(env, **opts)
161
+ return signed_out unless eligible_for_handshake?
204
162
 
205
- def remove_from_query_string(url, key)
206
- qs = Rack::Utils.parse_query(url.query)
207
- qs.delete(key)
208
- url.query = qs.to_query
209
- end
163
+ handshake(env, **opts)
164
+ end
210
165
 
211
- def verify_token(token, **opts)
212
- return false if token.nil? || token.strip.empty?
213
-
214
- begin
215
- sdk.verify_token(token, **opts)
216
- rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
217
- raise e
218
- rescue JWT::DecodeError, JWT::RequiredDependencyError => e
219
- false
220
- end
221
- end
166
+ # A outcome
167
+ def handshake(_env, **opts)
168
+ redirect_headers = {LOCATION_HEADER => redirect_to_handshake}
169
+ [307, debug_auth_headers(**opts).merge(redirect_headers), []]
170
+ end
222
171
 
223
- # Verify session token and provide a 1-day leeway for development if initial verification
224
- # fails for development instance due to invalid exp or iat
225
- def verify_token_with_retry(env, token)
226
- claims = verify_token(token)
227
- return signed_in(env, claims, token) if claims
228
- rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
229
- if auth_context.development_instance?
230
- # TODO: log possible Clock skew detected
231
-
232
- # Retry with a generous clock skew allowance (1 day)
233
- claims = verify_token(token, timeout: 86_400)
234
- return signed_in(env, claims, token) if claims
235
- end
236
-
237
- # Raise error if handshake resolution fails in production
238
- raise e
239
- end
172
+ # B outcome
173
+ def signed_out(**opts)
174
+ headers = opts.delete(:headers) || {}
175
+ enforce_auth = opts.delete(:enforce_auth)
240
176
 
241
- def sdk
242
- Clerk::SDK.new
243
- end
244
-
245
- def debug_auth_headers(reason: nil, message: nil, status: nil)
246
- {
247
- AUTH_REASON_HEADER => reason,
248
- AUTH_MESSAGE_HEADER => message,
249
- AUTH_STATUS_HEADER => status,
250
- }.compact
251
- end
177
+ [
178
+ enforce_auth ? 401 : nil,
179
+ debug_auth_headers(**opts).merge(headers),
180
+ []
181
+ ]
182
+ end
183
+
184
+ # C outcome
185
+ def signed_in(env, claims, token, **headers)
186
+ env["clerk"] = Proxy.new(session_claims: claims, session_token: token)
187
+ [nil, headers, []]
188
+ end
189
+
190
+ def eligible_for_handshake?
191
+ auth_context.document_request? || (!auth_context.document_request? && auth_context.accepts_html?)
192
+ end
193
+
194
+ private
195
+
196
+ def redirect_to_handshake
197
+ redirect_url = auth_context.clerk_url.dup
198
+ remove_from_query_string(redirect_url, DEV_BROWSER_COOKIE)
199
+
200
+ handshake_url = URI.parse("https://#{auth_context.frontend_api}/v1/client/handshake")
201
+ handshake_url_qs = ::Rack::Utils.parse_query(handshake_url.query)
202
+ handshake_url_qs["redirect_url"] = redirect_url
203
+
204
+ if auth_context.development_instance? && auth_context.dev_browser?
205
+ handshake_url_qs[DEV_BROWSER_COOKIE] = auth_context.dev_browser
206
+ end
207
+
208
+ handshake_url.query = ::Rack::Utils.build_query(handshake_url_qs)
209
+ handshake_url.to_s
210
+ end
211
+
212
+ def remove_from_query_string(url, key)
213
+ qs = ::Rack::Utils.parse_query(url.query)
214
+ qs.delete(key)
215
+
216
+ url.query = ::Rack::Utils.build_query(qs)
217
+ end
218
+
219
+ def verify_token(token, **opts)
220
+ return false if token.nil? || token.strip.empty?
221
+
222
+ begin
223
+ sdk.verify_token(token, **opts)
224
+ rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
225
+ raise e
226
+ rescue JWT::DecodeError, JWT::RequiredDependencyError => _
227
+ false
228
+ end
229
+ end
230
+
231
+ # Verify session token and provide a 1-day leeway for development if initial verification
232
+ # fails for development instance due to invalid exp or iat
233
+ def verify_token_with_retry(env, token)
234
+ claims = verify_token(token)
235
+ signed_in(env, claims, token) if claims
236
+ rescue JWT::ExpiredSignature, JWT::InvalidIatError => e
237
+ if auth_context.development_instance?
238
+ # TODO: log possible Clock skew detected
239
+
240
+ # Retry with a generous clock skew allowance (1 day)
241
+ claims = verify_token(token, timeout: 86_400)
242
+ return signed_in(env, claims, token) if claims
243
+ end
244
+
245
+ # Raise error if handshake resolution fails in production
246
+ raise e
247
+ end
248
+
249
+ def sdk
250
+ SDK.new
251
+ end
252
+
253
+ def debug_auth_headers(reason: nil, message: nil, status: nil)
254
+ {
255
+ AUTH_REASON_HEADER => reason,
256
+ AUTH_MESSAGE_HEADER => message,
257
+ AUTH_STATUS_HEADER => status
258
+ }.compact
252
259
  end
253
- end
260
+ end
261
+ end
@@ -0,0 +1,78 @@
1
+ # frozen_string_literal: true
2
+
3
+ require "clerk-http-client"
4
+
5
+ module Clerk
6
+ class Configuration
7
+ attr_reader :cache_store
8
+ attr_reader :debug
9
+ attr_reader :excluded_routes
10
+ attr_reader :publishable_key
11
+ attr_reader :secret_key
12
+
13
+ def initialize
14
+ @excluded_routes = []
15
+ @publishable_key = ENV["CLERK_PUBLISHABLE_KEY"]
16
+ @secret_key = ENV["CLERK_SECRET_KEY"]
17
+
18
+ # Default to Rails.cache or ActiveSupport::Cache::MemoryStore, if available, otherwise nil
19
+ @cache_store = if defined?(::Rails)
20
+ ::Rails.cache
21
+ elsif defined?(::ActiveSupport::Cache::MemoryStore)
22
+ ::ActiveSupport::Cache::MemoryStore.new
23
+ end
24
+
25
+ ClerkHttpClient.configure do |config|
26
+ unless secret_key.nil? || secret_key.empty?
27
+ config.access_token = @secret_key
28
+ end
29
+ end
30
+ end
31
+
32
+ def self.default
33
+ @@default ||= new
34
+ end
35
+
36
+ def update(options)
37
+ options.each do |key, value|
38
+ send(:"#{key}=", value)
39
+ end
40
+ end
41
+
42
+ def debug=(value)
43
+ ClerkHttpClient::Configuration.default.debugging = value
44
+ @debug = value
45
+ end
46
+
47
+ def cache_store=(store)
48
+ if !store
49
+ @cache_store = nil
50
+ return
51
+ end
52
+
53
+ raise ArgumentError, "cache_store must respond to :fetch" unless store.respond_to?(:fetch)
54
+
55
+ @cache_store = store
56
+ end
57
+
58
+ def excluded_routes=(routes)
59
+ raise ArgumentError, "excluded_routes must be an array" unless routes.is_a?(Array)
60
+ raise ArgumentError, "All elements in the excluded_routes array must be strings" unless routes.all? { |r| r.is_a?(String) }
61
+
62
+ @excluded_routes = routes
63
+ end
64
+
65
+ def publishable_key=(pk)
66
+ raise ArgumentError, "publishable_key must start with 'pk_'" unless pk.start_with?("pk_")
67
+
68
+ @publishable_key = pk
69
+ end
70
+
71
+ def secret_key=(sk)
72
+ raise ArgumentError, "secret_key must start with 'sk_'" unless sk.start_with?("sk_")
73
+
74
+ ClerkHttpClient::Configuration.default.access_token = sk
75
+ @secret_key = sk
76
+ end
77
+ end
78
+ end