jwt_signed_request 2.4.1 → 2.5.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/README.md +3 -2
- data/lib/jwt_signed_request/middlewares/faraday.rb +1 -1
- data/lib/jwt_signed_request/verify.rb +4 -1
- data/lib/jwt_signed_request/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
|
-
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 6a4b6d9d7869c58d436404dc533c1918dc21a8fb
|
4
|
+
data.tar.gz: 4e87bacd334d5cafe414f6d350eb6b6c556fb2c1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ebea05eab2c08b118fa7fd01b329e8e48ad1385806a3d97ed7cb6c3642b4d58a7f19bbcf4234b5ad7c6aa87fd71abce1cec8f582144deaeff7f24edb8bcfa61e
|
7
|
+
data.tar.gz: 4b23e201723c6066820df703c7bdf4c8fa281c281beef379f3ffb4c13fa333f95d54c348fae53224ae44222258858c1431fb94a94d9f8925c2d36930ec2cfb03
|
data/README.md
CHANGED
@@ -79,8 +79,7 @@ require 'jwt_signed_request'
|
|
79
79
|
|
80
80
|
uri = URI('http://example.com')
|
81
81
|
req = Net::HTTP::Get.new(uri)
|
82
|
-
|
83
|
-
req['Authorization'] = JWTSignedRequest.sign(
|
82
|
+
jwt_token = JWTSignedRequest.sign(
|
84
83
|
method: req.method,
|
85
84
|
path: req.path,
|
86
85
|
headers: {"Content-Type" => "application/json"},
|
@@ -91,6 +90,8 @@ req['Authorization'] = JWTSignedRequest.sign(
|
|
91
90
|
additional_headers_to_sign: ['X-AUTH'] # optional
|
92
91
|
)
|
93
92
|
|
93
|
+
req['Authorization'] = "Bearer #{jwt_token}"
|
94
|
+
|
94
95
|
res = Net::HTTP.start(uri.hostname, uri.port) {|http|
|
95
96
|
http.request(req)
|
96
97
|
}
|
@@ -50,8 +50,11 @@ module JWTSignedRequest
|
|
50
50
|
@secret_key ||= stored_key.fetch(:key) { raise MissingKeyIdError }
|
51
51
|
end
|
52
52
|
|
53
|
+
JWT_BEARER_REGEX = /\A(Bearer\s+)?([^*]+)\z/
|
54
|
+
|
53
55
|
def jwt_token
|
54
|
-
@jwt_token ||= Headers.fetch('Authorization', request)
|
56
|
+
@jwt_token ||= Headers.fetch('Authorization', request) &&
|
57
|
+
Headers.fetch('Authorization', request).match(JWT_BEARER_REGEX)[2]
|
55
58
|
end
|
56
59
|
|
57
60
|
def claims
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: jwt_signed_request
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.
|
4
|
+
version: 2.5.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Envato
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-01-
|
11
|
+
date: 2019-01-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jwt
|
@@ -154,7 +154,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
154
154
|
version: '0'
|
155
155
|
requirements: []
|
156
156
|
rubyforge_project:
|
157
|
-
rubygems_version: 2.
|
157
|
+
rubygems_version: 2.6.13
|
158
158
|
signing_key:
|
159
159
|
specification_version: 4
|
160
160
|
summary: JWT request signing and verification for Internal APIs
|