foobara-auth-http 0.1.0 → 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 62b67f4f6ae5108b39697d7c792e33854f1a9f79d2bd9a00cdd28999a15330be
4
- data.tar.gz: 99efd48356f66e58aeb1c387cf54f5b08a3de61bfb7ab68c58a8d88f34e244c7
3
+ metadata.gz: b560d7ee6971787591dc89f1633fbf2e7a94342201e8a9dcf0e64590decc28bb
4
+ data.tar.gz: 4c7ea4a062a2e58e332fba9a83d300cbb47000db2f3e0566704a8bd5329c9895
5
5
  SHA512:
6
- metadata.gz: d9973773609190f3b369a29dbaba12e67d17b048baf4bd44091a00b3d1491d60328c8af38f42c922bac6187b2d30abc12b8799fe9c8fdf866d2fb62453dfb78e
7
- data.tar.gz: db20a0f1870d0048d0cb59f628707470b36af8403c1dd04a718a4459f54fb918f29ab242bfe2962e5c9dc5b8a0e3cab3572a9103a8af415f11edf2a627000a45
6
+ metadata.gz: 909ad7cbc1048851904c69aec412fec01980fbfb8eb5978ef699c8820b266c38dbd6110ab188de206baf934258b551131ec64d48de7d03434c59f3db846ec777
7
+ data.tar.gz: 3f6944615986d90e65f5baa943d8f73f016b264b259f729ff0881652ca5fcce7860dc7eac12ac148423c92ebcca2f4ce30c451cdaaef0cb90deb944254490925
data/CHANGELOG.md CHANGED
@@ -1,3 +1,7 @@
1
+ ## [0.1.1] - 2026-01-27
2
+
3
+ - Use lower-case header keys to appease Rack::Lint
4
+
1
5
  ## [0.1.0] - 2025-08-22
2
6
 
3
7
  - Mark as compatible with Foobara 0.1.0
data/README.md CHANGED
@@ -75,13 +75,13 @@ A rundown of everything happening here:
75
75
  * We are declaring that we want to authenticate using bearer tokens. These are JWT tokens in an
76
76
  `Authorization: Bearer <token>` header.
77
77
  * We are declaring that when we login or refresh our login, we would like to move the new access token
78
- from the result to an X-Access-Token header, and we would like
78
+ from the result to an x-access-token header, and we would like
79
79
  to move the new refresh token from the result to a secure http only cookie.
80
80
  * We are declaring that when we want to refresh our login, we want to move the refresh token from the
81
81
  headers to an input to RefreshLogin.
82
82
  * Logout could technically be handled by the client but for convenience/added safety, we expose
83
83
  Logout and move the refresh token to its inputs so that it can invalidate the refresh token.
84
- * When we respond from Logout, we set the X-Access-Token header to nil. This is something the client
84
+ * When we respond from Logout, we set the x-access-token header to nil. This is something the client
85
85
  could do but gives an easy way to clobber the client's access token without effort on their end.
86
86
 
87
87
  We also expose a few app commands using our authenticator. This is configured as part of command connectors not
@@ -8,7 +8,7 @@ module Foobara
8
8
  end
9
9
  end
10
10
 
11
- def initialize(header_name = "X-Access-Token", header_value = nil)
11
+ def initialize(header_name = "x-access-token", header_value = nil)
12
12
  super()
13
13
 
14
14
  self.header_name = header_name.to_s
@@ -8,7 +8,7 @@ module Foobara
8
8
  end
9
9
  end
10
10
 
11
- def initialize(attribute_name = :access_token, header_name = "X-Access-Token")
11
+ def initialize(attribute_name = :access_token, header_name = "x-access-token")
12
12
  super()
13
13
 
14
14
  self.attribute_name = attribute_name.to_sym
@@ -1,5 +1,6 @@
1
1
  module Foobara
2
2
  module AuthHttp
3
+ # Is this genuinely a generic enough concept to be a class in this project?
3
4
  class SetUserToAuthenticatedUser < Foobara::CommandConnectors::Http::SetInputToProcResult
4
5
  # TODO: move this into base class as default?
5
6
  class << self
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: foobara-auth-http
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.1.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Miles Georgi