jwt_signed_request 2.4.1 → 2.5.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
- SHA256:
3
- metadata.gz: 223bee2fbebac240f4545a6743a8142caa85e53368888efcd15b122d879fb0aa
4
- data.tar.gz: eda9041c02891f02c67f88b0b5d5877a8540c89bc619212ebb06507d5c1a44f5
2
+ SHA1:
3
+ metadata.gz: 6a4b6d9d7869c58d436404dc533c1918dc21a8fb
4
+ data.tar.gz: 4e87bacd334d5cafe414f6d350eb6b6c556fb2c1
5
5
  SHA512:
6
- metadata.gz: 2f6b10faac1fb80562ed2f9240cf32f96b96c81b2ee04b2bd097cc53714a45f420411a94bfa8bf541fe81e5103a23aad185ba88dfa0aec679f4ad03d493be626
7
- data.tar.gz: 1dabc24f6f7476b4fddeebd6662d81e63f93ff9fa5caad5ff93f8214c82586b1a83e8070c054dc4df381d13d2218b551a6e0ab303cab78f8f26588aea14c7535
6
+ metadata.gz: ebea05eab2c08b118fa7fd01b329e8e48ad1385806a3d97ed7cb6c3642b4d58a7f19bbcf4234b5ad7c6aa87fd71abce1cec8f582144deaeff7f24edb8bcfa61e
7
+ data.tar.gz: 4b23e201723c6066820df703c7bdf4c8fa281c281beef379f3ffb4c13fa333f95d54c348fae53224ae44222258858c1431fb94a94d9f8925c2d36930ec2cfb03
data/README.md CHANGED
@@ -79,8 +79,7 @@ require 'jwt_signed_request'
79
79
 
80
80
  uri = URI('http://example.com')
81
81
  req = Net::HTTP::Get.new(uri)
82
-
83
- req['Authorization'] = JWTSignedRequest.sign(
82
+ jwt_token = JWTSignedRequest.sign(
84
83
  method: req.method,
85
84
  path: req.path,
86
85
  headers: {"Content-Type" => "application/json"},
@@ -91,6 +90,8 @@ req['Authorization'] = JWTSignedRequest.sign(
91
90
  additional_headers_to_sign: ['X-AUTH'] # optional
92
91
  )
93
92
 
93
+ req['Authorization'] = "Bearer #{jwt_token}"
94
+
94
95
  res = Net::HTTP.start(uri.hostname, uri.port) {|http|
95
96
  http.request(req)
96
97
  }
@@ -20,7 +20,7 @@ module JWTSignedRequest
20
20
  **optional_settings
21
21
  )
22
22
 
23
- env[:request_headers].store("Authorization", jwt_token)
23
+ env[:request_headers].store("Authorization", "Bearer #{jwt_token}")
24
24
  app.call(env)
25
25
  end
26
26
 
@@ -50,8 +50,11 @@ module JWTSignedRequest
50
50
  @secret_key ||= stored_key.fetch(:key) { raise MissingKeyIdError }
51
51
  end
52
52
 
53
+ JWT_BEARER_REGEX = /\A(Bearer\s+)?([^*]+)\z/
54
+
53
55
  def jwt_token
54
- @jwt_token ||= Headers.fetch('Authorization', request)
56
+ @jwt_token ||= Headers.fetch('Authorization', request) &&
57
+ Headers.fetch('Authorization', request).match(JWT_BEARER_REGEX)[2]
55
58
  end
56
59
 
57
60
  def claims
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module JWTSignedRequest
4
- VERSION = '2.4.1'.freeze
4
+ VERSION = '2.5.0'.freeze
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: jwt_signed_request
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.4.1
4
+ version: 2.5.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Envato
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-01-08 00:00:00.000000000 Z
11
+ date: 2019-01-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jwt
@@ -154,7 +154,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
154
154
  version: '0'
155
155
  requirements: []
156
156
  rubyforge_project:
157
- rubygems_version: 2.7.6
157
+ rubygems_version: 2.6.13
158
158
  signing_key:
159
159
  specification_version: 4
160
160
  summary: JWT request signing and verification for Internal APIs