rack-jive-signed_request 0.1.1 → 0.1.2

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 9c1e5d12872f53f0d220590ff065e87d60c4cfa1
4
- data.tar.gz: e7333566f7c0767eb1737aa7e9ec80d514c83685
3
+ metadata.gz: 9642a95014b328f8f8e43512ed6186eb85c94729
4
+ data.tar.gz: e20d6a056432191cd43571c036db86ef743525e6
5
5
  SHA512:
6
- metadata.gz: 69c340d0d22e93874e4125a8c4ceb0f0013e45aba741065b32f78149a319883fb4257e6da3aa6e07640c0047a05dcb1c35d26a9b618174f3c247cb028a52e243
7
- data.tar.gz: 0a15ed523095c97aeb615de7e13473c17ba218cfca4361f8e844a3ec9de1869bdc18e54edb8dff1f00573fece631e173deac9016ef4abe80460ba970b5f166d0
6
+ metadata.gz: aa924164532d4c5a3d67408faf60bcc69c5cdce3e7b70b881bb8ee16f57660052c410310885690acf41bef9cfd3738bfcd6ac5e30a55ffcfa286bee6360d05a6
7
+ data.tar.gz: 69a703aea48749c75173bc9a27c0c7266a8dce62122d018e67b03941f1f69647c8dc8d60ca6a9f2240c607049ad11477506c2026c8217b56079cf9551d423741
@@ -2,4 +2,4 @@ language: ruby
2
2
  rvm:
3
3
  - 2.1.1
4
4
  script:
5
- - rspec spec
5
+ - bundle exec rspec
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- rack-jive-signed_request (0.1.1)
4
+ rack-jive-signed_request (0.1.2)
5
5
  jive-signed_request
6
6
  rack (>= 1.1)
7
7
 
@@ -23,11 +23,11 @@ module Rack
23
23
  request = Request.new(env)
24
24
 
25
25
  # Only bother authenticating if the request is identifying itself as signed
26
- if env["X-Shindig-AuthType"] === "signed" || env["Authorization"].to_s.match(/^JiveEXTN/)
27
- auth_header_params = ::CGI.parse env["Authorization"].gsub(/^JiveEXTN\s/,'')
26
+ if env["HTTP_X_SHINDIG_AUTHTYPE"] === "signed" || env["HTTP_AUTHORIZATION"].to_s.match(/^JiveEXTN/)
27
+ auth_header_params = ::CGI.parse env["HTTP_AUTHORIZATION"].gsub(/^JiveEXTN\s/,'')
28
28
 
29
29
  begin
30
- unless ::Jive::SignedRequest.authenticate(env["Authorization"], @secret.call(auth_header_params))
30
+ unless ::Jive::SignedRequest.authenticate(env["HTTP_AUTHORIZATION"], @secret.call(auth_header_params))
31
31
  return [401, {"Content-Type" => "text/html"}, ["Invalid"]]
32
32
  end
33
33
  rescue ArgumentError => $e
@@ -35,9 +35,9 @@ module Rack
35
35
  end
36
36
  end
37
37
 
38
- env["jive.user_id"] = env["X-Jive-User-ID"]
39
- env["jive.email"] = env["X-Jive-User-Email"]
40
- env["jive.external"] = (env["X-Jive-User-External"] === "true")
38
+ env["jive.user_id"] = env["HTTP_X_JIVE_USER_ID"]
39
+ env["jive.email"] = env["HTTP_X_JIVE_USER_EMAIL"]
40
+ env["jive.external"] = (env["HTTP_X_JIVE_USER_EXTERNAL"] === "true")
41
41
 
42
42
  @app.call(env)
43
43
  end
@@ -1,7 +1,7 @@
1
1
  module Rack
2
2
  module Jive
3
3
  class SignedRequest
4
- VERSION = "0.1.1"
4
+ VERSION = "0.1.2"
5
5
  end
6
6
  end
7
7
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rack-jive-signed_request
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.1
4
+ version: 0.1.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Butch Marshall