jwt_sessions 3.2.0 → 3.2.2

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f73b9f84080047130ad1d468d79418be979c742de84603a06c9933d8a185d935
4
- data.tar.gz: 14e06ad9f9262b12a7b05339ed93f0c45cdc9d2ee39f526ff69bef99a0851ff0
3
+ metadata.gz: ab27c010b7b580843d1e42915dc03d0485d8ea41ec50943d45b982dbb42270d2
4
+ data.tar.gz: 3a5dc602c627d3f7a6afb286cdf35353ecce6e6e584101b63251b6e263fe9fe1
5
5
  SHA512:
6
- metadata.gz: e4a0a9d70804717e8a310c77be865bff624f3e824800a0df35d082be906e79120012dde275d4cbe1d9b18dd51445b570ad081488d7a6df201fefaa154ad71aff
7
- data.tar.gz: 4964b5277b235c50715f6886965693a9fda64735d7d5b0b90d599929c06d743110a72fc27efcb7d250fc85b141d6fb441adc54bdaddc2daf41e9382a28d563be
6
+ metadata.gz: 834dc98d69fa6f2b56dc5ea6a1bf8f4e24eff2064fb06354468f74be5038033f44e9aec74fc6ba817cc851d03cc1844758004072644f2db13069d8b2e7c16461
7
+ data.tar.gz: 0d1057f364b8cdf824f1b40d6f929afb05889d6f1e4779120b98ad80dada0a3b686750a6b82b32a4bc0620c56a0589c0162f703b736352556b8ef3927aef3d6b
data/CHANGELOG.md CHANGED
@@ -1,3 +1,16 @@
1
+ ## 3.2.2 (March 5, 2024)
2
+
3
+ Support:
4
+
5
+ - upgrade `jwt` to 2.8 in dependencies
6
+ - upgrade development dependencies
7
+
8
+ ## 3.2.1 (September 11, 2023)
9
+
10
+ Support:
11
+
12
+ - switched the positions of #should_check_csrf? and @_csrf_check in the code logic for the sake of minor perf improvement.
13
+
1
14
  ## 3.2.0 (June 20, 2023)
2
15
 
3
16
  Features:
@@ -55,11 +55,11 @@ module JWTSessions
55
55
  end
56
56
 
57
57
  def refresh_by_access_invalid?
58
- should_check_csrf? && @_csrf_check && !JWTSessions::Session.new.valid_access_request?(retrieve_csrf, claimless_payload)
58
+ @_csrf_check && should_check_csrf? && !JWTSessions::Session.new.valid_access_request?(retrieve_csrf, claimless_payload)
59
59
  end
60
60
 
61
61
  def check_csrf(token_type)
62
- invalid_authorization if should_check_csrf? && @_csrf_check && !valid_csrf_token?(retrieve_csrf, token_type)
62
+ invalid_authorization if @_csrf_check && should_check_csrf? && !valid_csrf_token?(retrieve_csrf, token_type)
63
63
  end
64
64
 
65
65
  def should_check_csrf?
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module JWTSessions
4
- VERSION = "3.2.0"
4
+ VERSION = "3.2.2"
5
5
  end
data/lib/jwt_sessions.rb CHANGED
@@ -155,7 +155,7 @@ module JWTSessions
155
155
  private
156
156
 
157
157
  def supported_algos
158
- algos = JWT::Algos::ALGOS - [JWT::Algos::Unsupported]
158
+ algos = JWT::JWA::ALGOS - [JWT::JWA::Unsupported]
159
159
  algos.map { |algo| algo::SUPPORTED }.flatten + [NONE]
160
160
  end
161
161
  end
@@ -35,17 +35,17 @@ class TestRedisStoreAdapter < Minitest::Test
35
35
  def test_default_url
36
36
  adapter = JWTSessions::StoreAdapters::RedisStoreAdapter.new
37
37
 
38
- assert_equal "redis://127.0.0.1:6379/0", adapter.storage.config.server_url
38
+ assert_equal "redis://127.0.0.1:6379", adapter.storage.config.server_url
39
39
  end
40
40
 
41
41
  def test_url_with_env_var
42
42
  ENV["REDIS_URL"] = "redis://locallol:2018/"
43
43
  adapter = JWTSessions::StoreAdapters::RedisStoreAdapter.new
44
- assert_equal "redis://locallol:2018/0", adapter.storage.config.server_url
44
+ assert_equal "redis://locallol:2018", adapter.storage.config.server_url
45
45
 
46
46
  ENV.delete("REDIS_URL")
47
47
  adapter = JWTSessions::StoreAdapters::RedisStoreAdapter.new
48
- assert_equal "redis://127.0.0.1:6379/0", adapter.storage.config.server_url
48
+ assert_equal "redis://127.0.0.1:6379", adapter.storage.config.server_url
49
49
  end
50
50
 
51
51
  def test_configuration_via_host_port_and_db
@@ -68,13 +68,13 @@ class TestRedisStoreAdapter < Minitest::Test
68
68
 
69
69
  def test_configuration_via_redis_url
70
70
  adapter = JWTSessions::StoreAdapters::RedisStoreAdapter.new(redis_url: "redis://127.0.0.2:6322")
71
- assert_equal "redis://127.0.0.2:6322/0", adapter.storage.config.server_url
71
+ assert_equal "redis://127.0.0.2:6322", adapter.storage.config.server_url
72
72
  end
73
73
 
74
74
  def test_configuration_via_redis_url_in_module
75
- JWTSessions.redis_url = "redis://127.0.0.2:6322"
75
+ JWTSessions.redis_url = "redis://127.0.0.2:6323"
76
76
  adapter = JWTSessions::StoreAdapters::RedisStoreAdapter.new
77
- assert_equal "redis://127.0.0.2:6322/0", adapter.storage.config.server_url
77
+ assert_equal "redis://127.0.0.2:6323", adapter.storage.config.server_url
78
78
  end
79
79
 
80
80
  def test_configuration_via_redis_client
@@ -30,7 +30,7 @@ class TestTokenStore < Minitest::Test
30
30
  JWTSessions.redis_port = 6378
31
31
  JWTSessions.token_store = :redis
32
32
 
33
- assert_equal "redis://127.0.0.1:6378/0", JWTSessions.token_store.storage.config.server_url
33
+ assert_equal "redis://127.0.0.1:6378", JWTSessions.token_store.storage.config.server_url
34
34
  end
35
35
 
36
36
  def test_setting_redis_token_store_without_options
metadata CHANGED
@@ -1,22 +1,22 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: jwt_sessions
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.2.0
4
+ version: 3.2.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Julija Alieckaja
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-06-20 00:00:00.000000000 Z
11
+ date: 2024-03-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jwt
15
15
  requirement: !ruby/object:Gem::Requirement
16
16
  requirements:
17
- - - "~>"
17
+ - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '2.6'
19
+ version: '2.8'
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: '3'
@@ -24,9 +24,9 @@ dependencies:
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
26
26
  requirements:
27
- - - "~>"
27
+ - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: '2.6'
29
+ version: '2.8'
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: '3'
@@ -36,42 +36,42 @@ dependencies:
36
36
  requirements:
37
37
  - - ">="
38
38
  - !ruby/object:Gem::Version
39
- version: '1.16'
39
+ version: '2'
40
40
  type: :development
41
41
  prerelease: false
42
42
  version_requirements: !ruby/object:Gem::Requirement
43
43
  requirements:
44
44
  - - ">="
45
45
  - !ruby/object:Gem::Version
46
- version: '1.16'
46
+ version: '2'
47
47
  - !ruby/object:Gem::Dependency
48
48
  name: rake
49
49
  requirement: !ruby/object:Gem::Requirement
50
50
  requirements:
51
51
  - - "~>"
52
52
  - !ruby/object:Gem::Version
53
- version: '12.3'
53
+ version: '13.1'
54
54
  type: :development
55
55
  prerelease: false
56
56
  version_requirements: !ruby/object:Gem::Requirement
57
57
  requirements:
58
58
  - - "~>"
59
59
  - !ruby/object:Gem::Version
60
- version: '12.3'
60
+ version: '13.1'
61
61
  - !ruby/object:Gem::Dependency
62
62
  name: rspec
63
63
  requirement: !ruby/object:Gem::Requirement
64
64
  requirements:
65
65
  - - "~>"
66
66
  - !ruby/object:Gem::Version
67
- version: '3.11'
67
+ version: '3.13'
68
68
  type: :development
69
69
  prerelease: false
70
70
  version_requirements: !ruby/object:Gem::Requirement
71
71
  requirements:
72
72
  - - "~>"
73
73
  - !ruby/object:Gem::Version
74
- version: '3.11'
74
+ version: '3.13'
75
75
  description: XSS/CSRF safe JWT auth designed for SPA
76
76
  email: yulia.oletskaya@gmail.com
77
77
  executables: []