jwt_signed_request 2.4.1 → 2.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
- SHA256:
3
- metadata.gz: 223bee2fbebac240f4545a6743a8142caa85e53368888efcd15b122d879fb0aa
4
- data.tar.gz: eda9041c02891f02c67f88b0b5d5877a8540c89bc619212ebb06507d5c1a44f5
2
+ SHA1:
3
+ metadata.gz: 6a4b6d9d7869c58d436404dc533c1918dc21a8fb
4
+ data.tar.gz: 4e87bacd334d5cafe414f6d350eb6b6c556fb2c1
5
5
  SHA512:
6
- metadata.gz: 2f6b10faac1fb80562ed2f9240cf32f96b96c81b2ee04b2bd097cc53714a45f420411a94bfa8bf541fe81e5103a23aad185ba88dfa0aec679f4ad03d493be626
7
- data.tar.gz: 1dabc24f6f7476b4fddeebd6662d81e63f93ff9fa5caad5ff93f8214c82586b1a83e8070c054dc4df381d13d2218b551a6e0ab303cab78f8f26588aea14c7535
6
+ metadata.gz: ebea05eab2c08b118fa7fd01b329e8e48ad1385806a3d97ed7cb6c3642b4d58a7f19bbcf4234b5ad7c6aa87fd71abce1cec8f582144deaeff7f24edb8bcfa61e
7
+ data.tar.gz: 4b23e201723c6066820df703c7bdf4c8fa281c281beef379f3ffb4c13fa333f95d54c348fae53224ae44222258858c1431fb94a94d9f8925c2d36930ec2cfb03
data/README.md CHANGED
@@ -79,8 +79,7 @@ require 'jwt_signed_request'
79
79
 
80
80
  uri = URI('http://example.com')
81
81
  req = Net::HTTP::Get.new(uri)
82
-
83
- req['Authorization'] = JWTSignedRequest.sign(
82
+ jwt_token = JWTSignedRequest.sign(
84
83
  method: req.method,
85
84
  path: req.path,
86
85
  headers: {"Content-Type" => "application/json"},
@@ -91,6 +90,8 @@ req['Authorization'] = JWTSignedRequest.sign(
91
90
  additional_headers_to_sign: ['X-AUTH'] # optional
92
91
  )
93
92
 
93
+ req['Authorization'] = "Bearer #{jwt_token}"
94
+
94
95
  res = Net::HTTP.start(uri.hostname, uri.port) {|http|
95
96
  http.request(req)
96
97
  }
@@ -20,7 +20,7 @@ module JWTSignedRequest
20
20
  **optional_settings
21
21
  )
22
22
 
23
- env[:request_headers].store("Authorization", jwt_token)
23
+ env[:request_headers].store("Authorization", "Bearer #{jwt_token}")
24
24
  app.call(env)
25
25
  end
26
26
 
@@ -50,8 +50,11 @@ module JWTSignedRequest
50
50
  @secret_key ||= stored_key.fetch(:key) { raise MissingKeyIdError }
51
51
  end
52
52
 
53
+ JWT_BEARER_REGEX = /\A(Bearer\s+)?([^*]+)\z/
54
+
53
55
  def jwt_token
54
- @jwt_token ||= Headers.fetch('Authorization', request)
56
+ @jwt_token ||= Headers.fetch('Authorization', request) &&
57
+ Headers.fetch('Authorization', request).match(JWT_BEARER_REGEX)[2]
55
58
  end
56
59
 
57
60
  def claims
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module JWTSignedRequest
4
- VERSION = '2.4.1'.freeze
4
+ VERSION = '2.5.0'.freeze
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: jwt_signed_request
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.4.1
4
+ version: 2.5.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Envato
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-01-08 00:00:00.000000000 Z
11
+ date: 2019-01-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jwt
@@ -154,7 +154,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
154
154
  version: '0'
155
155
  requirements: []
156
156
  rubyforge_project:
157
- rubygems_version: 2.7.6
157
+ rubygems_version: 2.6.13
158
158
  signing_key:
159
159
  specification_version: 4
160
160
  summary: JWT request signing and verification for Internal APIs