jwt_authorize 0.2.5
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/lib/jwt_authorize.rb +64 -0
- data/lib/jwt_authorize/jwt_consts.rb +4 -0
- data/lib/jwt_authorize/jwt_decoder.rb +75 -0
- data/lib/jwt_authorize/jwt_payload_authorizer.rb +55 -0
- data/lib/jwt_authorize/version.rb +3 -0
- metadata +118 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 66496a68b009b540f997f4ea96f0bdcc15c8182b2bae9c78b77f42a1f9c74f4b
|
4
|
+
data.tar.gz: d729629a346b4806cd4f88cc6d42a1744edf90627a408c61d3e08c3fbff236c7
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 7eb7e532be4ae3e215ee07792abdcf96f1d7b69e7dff03b7f926ece9802d9ac731111982d20e16857266093a6a6af36834f195d7a39d653e4485ef20e4139fed
|
7
|
+
data.tar.gz: 997b0802d7af46b8aa07440e4071ea62b8603fe624e24374bccd2dfae0995567a4a6fb7eeb37aa5d3e6b63bb73081e67f864370a21ae644528eec79b6848a184
|
@@ -0,0 +1,64 @@
|
|
1
|
+
# Copyright 2016 Adobe Systems Incorporated. All rights reserved.
|
2
|
+
# This file is licensed to you under the Apache License, Version 2.0 (the "License");
|
3
|
+
# you may not use this file except in compliance with the License. You may obtain a copy
|
4
|
+
# of the License at http://www.apache.org/licenses/LICENSE-2.0
|
5
|
+
#
|
6
|
+
# Unless required by applicable law or agreed to in writing, software distributed under
|
7
|
+
# the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS
|
8
|
+
# OF ANY KIND, either express or implied. See the License for the specific language
|
9
|
+
# governing permissions and limitations under the License.
|
10
|
+
|
11
|
+
require "jwt_authorize/version"
|
12
|
+
require "jwt_authorize/jwt_decoder"
|
13
|
+
require "jwt_authorize/jwt_payload_authorizer"
|
14
|
+
require "logger"
|
15
|
+
|
16
|
+
module JwtAuthorize
|
17
|
+
class << self
|
18
|
+
attr_writer :logger
|
19
|
+
|
20
|
+
def get_certificate_thumbprint(auth_token)
|
21
|
+
headers = get_jwt_headers(auth_token)
|
22
|
+
|
23
|
+
headers[CERTIFICATE_THUMBPRINT]
|
24
|
+
end
|
25
|
+
|
26
|
+
def get_certificate_path(auth_token)
|
27
|
+
headers = get_jwt_headers(auth_token)
|
28
|
+
|
29
|
+
headers[CERTIFICATE_PATH]
|
30
|
+
end
|
31
|
+
|
32
|
+
def get_jwt_headers(auth_token)
|
33
|
+
JwtAuthorize::JwtDecoder.new.get_headers_from_jwt(auth_token)
|
34
|
+
end
|
35
|
+
|
36
|
+
def decode(auth_token, certificate, options = {})
|
37
|
+
fail "No public key" if certificate.nil?
|
38
|
+
|
39
|
+
JwtAuthorize::JwtDecoder.new(logger, options).get_payload_from_jwt(auth_token, certificate)
|
40
|
+
rescue => err
|
41
|
+
logger.error("Error decoding JWT token: #{err}")
|
42
|
+
nil
|
43
|
+
end
|
44
|
+
|
45
|
+
def authorized_request?(payload, permissions, base_repo)
|
46
|
+
JwtAuthorize::JwtPayloadAuthorizer.new(permissions, logger).authorized?(payload, base_repo)
|
47
|
+
rescue => err
|
48
|
+
logger.error("Error processing JWT token: #{err}")
|
49
|
+
false
|
50
|
+
end
|
51
|
+
|
52
|
+
def authorized?(certificate, auth_token, permissions, base_repo, options = {})
|
53
|
+
decoded = decode(auth_token, certificate, options)
|
54
|
+
|
55
|
+
decoded.nil? ? false : authorized_request?(decoded.first, permissions, base_repo)
|
56
|
+
end
|
57
|
+
|
58
|
+
def logger
|
59
|
+
@logger ||= Logger.new($stdout).tap do |log|
|
60
|
+
log.progname = name
|
61
|
+
end
|
62
|
+
end
|
63
|
+
end
|
64
|
+
end
|
@@ -0,0 +1,75 @@
|
|
1
|
+
# Copyright 2016 Adobe Systems Incorporated. All rights reserved.
|
2
|
+
# This file is licensed to you under the Apache License, Version 2.0 (the "License");
|
3
|
+
# you may not use this file except in compliance with the License. You may obtain a copy
|
4
|
+
# of the License at http://www.apache.org/licenses/LICENSE-2.0
|
5
|
+
#
|
6
|
+
# Unless required by applicable law or agreed to in writing, software distributed under
|
7
|
+
# the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS
|
8
|
+
# OF ANY KIND, either express or implied. See the License for the specific language
|
9
|
+
# governing permissions and limitations under the License.
|
10
|
+
|
11
|
+
require "jwt"
|
12
|
+
require "jwt_authorize/jwt_consts"
|
13
|
+
|
14
|
+
module JwtAuthorize
|
15
|
+
class JwtDecoder
|
16
|
+
def initialize(logger = nil, options = {})
|
17
|
+
@logger = logger
|
18
|
+
@options = options
|
19
|
+
end
|
20
|
+
|
21
|
+
def get_payload_from_jwt(header, certificate)
|
22
|
+
fail "No certificate specified" unless certificate
|
23
|
+
|
24
|
+
validate_header(header)
|
25
|
+
|
26
|
+
token = token_from_header(header)
|
27
|
+
|
28
|
+
decoded = decode_token(token, certificate)
|
29
|
+
|
30
|
+
options = decoded.last
|
31
|
+
validate_thumbprint(options[CERTIFICATE_THUMBPRINT], certificate)
|
32
|
+
|
33
|
+
decoded
|
34
|
+
end
|
35
|
+
|
36
|
+
def get_headers_from_jwt(token)
|
37
|
+
fail "token is nil" if token.nil?
|
38
|
+
|
39
|
+
headers = token_from_header(token).split(".").first
|
40
|
+
|
41
|
+
JSON.parse(Base64.decode64(headers))
|
42
|
+
end
|
43
|
+
|
44
|
+
private
|
45
|
+
|
46
|
+
def validate_header(header)
|
47
|
+
fail "Header is nil!" if header.nil?
|
48
|
+
fail "Incorrectly formatted token" unless header.start_with?("bearer")
|
49
|
+
end
|
50
|
+
|
51
|
+
def token_from_header(header)
|
52
|
+
_type, token = header.split(" ", 2)
|
53
|
+
fail "#{header} is invalid token!" unless token
|
54
|
+
|
55
|
+
token
|
56
|
+
end
|
57
|
+
|
58
|
+
def validate_thumbprint(head_thumb, certificate)
|
59
|
+
cert_thumb = calculate_thumbprint(certificate)
|
60
|
+
fail "Cert SHA1 mismatch. head: #{head_thumb}, cert: #{cert_thumb}" unless head_thumb.casecmp(cert_thumb)
|
61
|
+
end
|
62
|
+
|
63
|
+
def decode_token(token, certificate)
|
64
|
+
@options[:algorithm] = "RS256"
|
65
|
+
JWT.decode(token, certificate.public_key, true, @options)
|
66
|
+
rescue JWT::ExpiredSignature, JWT::VerificationError => err
|
67
|
+
@logger.error("Payload could not be decoded: #{err}") unless @logger.nil?
|
68
|
+
raise "Payload could not be decoded from token."
|
69
|
+
end
|
70
|
+
|
71
|
+
def calculate_thumbprint(certificate)
|
72
|
+
OpenSSL::Digest::SHA1.hexdigest(certificate.to_der).scan(/../).join(":")
|
73
|
+
end
|
74
|
+
end
|
75
|
+
end
|
@@ -0,0 +1,55 @@
|
|
1
|
+
# Copyright 2016 Adobe Systems Incorporated. All rights reserved.
|
2
|
+
# This file is licensed to you under the Apache License, Version 2.0 (the "License");
|
3
|
+
# you may not use this file except in compliance with the License. You may obtain a copy
|
4
|
+
# of the License at http://www.apache.org/licenses/LICENSE-2.0
|
5
|
+
#
|
6
|
+
# Unless required by applicable law or agreed to in writing, software distributed under
|
7
|
+
# the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS
|
8
|
+
# OF ANY KIND, either express or implied. See the License for the specific language
|
9
|
+
# governing permissions and limitations under the License.
|
10
|
+
|
11
|
+
module JwtAuthorize
|
12
|
+
class JwtPayloadAuthorizer
|
13
|
+
def initialize(permissions, logger = nil)
|
14
|
+
fail "Permissions are empty!" unless permissions
|
15
|
+
|
16
|
+
@perms = permissions.split(",")
|
17
|
+
@logger = logger
|
18
|
+
end
|
19
|
+
|
20
|
+
def authorized?(payload, base_repo)
|
21
|
+
repos = payload["repositories"]
|
22
|
+
|
23
|
+
same_repositories?(repos, base_repo) && permissions_valid?(repos)
|
24
|
+
end
|
25
|
+
|
26
|
+
private
|
27
|
+
|
28
|
+
def same_repositories?(payload_repos, base_repo)
|
29
|
+
test_repos = payload_repos.map { |repo| repo["name"].downcase }
|
30
|
+
fail "No payload repositories." if test_repos.size == 0
|
31
|
+
|
32
|
+
same = test_repos.include?(base_repo.downcase)
|
33
|
+
fail "Repositories do not match." unless same
|
34
|
+
|
35
|
+
same
|
36
|
+
end
|
37
|
+
|
38
|
+
def permissions_valid?(payload_repos)
|
39
|
+
repo_perms = payload_repos.map { |repo| repo["permissions"] }.flatten
|
40
|
+
|
41
|
+
valid = (permissions & repo_perms).size > 0
|
42
|
+
|
43
|
+
unless valid
|
44
|
+
@logger.error("Invalid perms. Jwt: #{permissions.inspect}, repo: #{repo_perms.inspect}") unless @logger.nil?
|
45
|
+
fail "Invalid permissions."
|
46
|
+
end
|
47
|
+
|
48
|
+
valid
|
49
|
+
end
|
50
|
+
|
51
|
+
def permissions
|
52
|
+
@perms
|
53
|
+
end
|
54
|
+
end
|
55
|
+
end
|
metadata
ADDED
@@ -0,0 +1,118 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: jwt_authorize
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.2.5
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Dave Persing
|
8
|
+
autorequire:
|
9
|
+
bindir: exe
|
10
|
+
cert_chain: []
|
11
|
+
date: 2018-12-13 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: bundler
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - "~>"
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '1.12'
|
20
|
+
type: :development
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - "~>"
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '1.12'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: rake
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - "~>"
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '10.0'
|
34
|
+
type: :development
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - "~>"
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '10.0'
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: rspec
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - "~>"
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: '3.0'
|
48
|
+
type: :development
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - "~>"
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: '3.0'
|
55
|
+
- !ruby/object:Gem::Dependency
|
56
|
+
name: rubocop
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
58
|
+
requirements:
|
59
|
+
- - "~>"
|
60
|
+
- !ruby/object:Gem::Version
|
61
|
+
version: '0.36'
|
62
|
+
type: :development
|
63
|
+
prerelease: false
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
65
|
+
requirements:
|
66
|
+
- - "~>"
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: '0.36'
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: jwt
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - "~>"
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '1.5'
|
76
|
+
type: :runtime
|
77
|
+
prerelease: false
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - "~>"
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: '1.5'
|
83
|
+
description:
|
84
|
+
email:
|
85
|
+
- persing@adobe.com
|
86
|
+
executables: []
|
87
|
+
extensions: []
|
88
|
+
extra_rdoc_files: []
|
89
|
+
files:
|
90
|
+
- lib/jwt_authorize.rb
|
91
|
+
- lib/jwt_authorize/jwt_consts.rb
|
92
|
+
- lib/jwt_authorize/jwt_decoder.rb
|
93
|
+
- lib/jwt_authorize/jwt_payload_authorizer.rb
|
94
|
+
- lib/jwt_authorize/version.rb
|
95
|
+
homepage: https://github.com/adobe-platform/jwt-authorize-gem
|
96
|
+
licenses: []
|
97
|
+
metadata: {}
|
98
|
+
post_install_message:
|
99
|
+
rdoc_options: []
|
100
|
+
require_paths:
|
101
|
+
- lib
|
102
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
103
|
+
requirements:
|
104
|
+
- - ">="
|
105
|
+
- !ruby/object:Gem::Version
|
106
|
+
version: '0'
|
107
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
108
|
+
requirements:
|
109
|
+
- - ">="
|
110
|
+
- !ruby/object:Gem::Version
|
111
|
+
version: '0'
|
112
|
+
requirements: []
|
113
|
+
rubyforge_project:
|
114
|
+
rubygems_version: 2.7.6
|
115
|
+
signing_key:
|
116
|
+
specification_version: 4
|
117
|
+
summary: Authorizing requests containing an Authorization header against custom permissions
|
118
|
+
test_files: []
|