rack-jwt-auth 0.0.3 → 1.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/rack/jwt/auth/authenticate.rb +8 -4
- data/lib/rack/jwt/auth/version.rb +1 -1
- data/spec/authenticate_options_spec.rb +39 -1
- data/spec/authenticate_spec.rb +29 -5
- metadata +16 -16
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bbe873d8ecf67c8398c5de86881ccb16e64b23d8
|
4
|
+
data.tar.gz: 82d3627695fa803b3c714481f55865e941045d9d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9177c3e1e77145ba05f565bc23e41ec6a1b594ad28061575b2c714037fb4bd0f8a9b12b5eb5cb9f3c59980ac6b1b74e85f1d66c1ee3b439fb6d03b168170cdfa
|
7
|
+
data.tar.gz: 65df06c77cbf4f507020418c8ddb8348201937556ea6db17cdf3caecb41f5902cd5ca9b9403cdcc5f3903fb0d8a714ec6d93780bc8e427780309c5f475cf4988
|
@@ -37,11 +37,15 @@ module Rack
|
|
37
37
|
if authenticated_route?(env)
|
38
38
|
header = env['HTTP_AUTHORIZATION']
|
39
39
|
|
40
|
-
return [401, {}, ['Missing Authorization header']] if header.nil?
|
40
|
+
return [401, {}, [{message: 'Missing Authorization header'}.to_json]] if header.nil?
|
41
41
|
|
42
|
-
|
42
|
+
scheme, token = header.split(" ")
|
43
43
|
|
44
|
-
return [401, {}, ['
|
44
|
+
return [401, {}, [{message: 'Format is Authorization: Bearer [token]'}.to_json]] unless scheme.match(/^Bearer$/i) && !token.nil?
|
45
|
+
|
46
|
+
payload = AuthToken.valid?(token, @secret)
|
47
|
+
|
48
|
+
return [401, {}, [{message: 'Invalid Authorization'}.to_json]] unless payload
|
45
49
|
end
|
46
50
|
|
47
51
|
yield payload
|
@@ -80,4 +84,4 @@ module Rack
|
|
80
84
|
|
81
85
|
end
|
82
86
|
end
|
83
|
-
end
|
87
|
+
end
|
@@ -79,4 +79,42 @@ describe Rack::Jwt::Auth::Authenticate do
|
|
79
79
|
|
80
80
|
end
|
81
81
|
|
82
|
-
|
82
|
+
context "Only with except routes" do
|
83
|
+
|
84
|
+
let(:app) do
|
85
|
+
main_app = lambda { |env| [200, env, ['Hello']] }
|
86
|
+
Rack::Jwt::Auth::Authenticate.new(main_app, {only: ['/authenticated', '/authenticated/*'], secret: 'supertestsecret'})
|
87
|
+
end
|
88
|
+
|
89
|
+
it 'returns 200 ok if the request is for a route that is not authenticated' do
|
90
|
+
get('/not_authenticated')
|
91
|
+
|
92
|
+
expect(last_response.status).to eql(200)
|
93
|
+
expect(last_response.body).to eql('Hello')
|
94
|
+
|
95
|
+
get('/not_authenticated/other')
|
96
|
+
|
97
|
+
expect(last_response.status).to eql(200)
|
98
|
+
expect(last_response.body).to eql('Hello')
|
99
|
+
|
100
|
+
get('/not_authenticated/other/test')
|
101
|
+
|
102
|
+
expect(last_response.status).to eql(200)
|
103
|
+
expect(last_response.body).to eql('Hello')
|
104
|
+
end
|
105
|
+
|
106
|
+
it 'returns 401 ok if the request is for a route that is authenticated' do
|
107
|
+
get('/authenticated')
|
108
|
+
expect(last_response.status).to eql(401)
|
109
|
+
|
110
|
+
get('/authenticated/other')
|
111
|
+
expect(last_response.status).to eql(401)
|
112
|
+
|
113
|
+
get('/authenticated/other/test')
|
114
|
+
expect(last_response.status).to eql(401)
|
115
|
+
end
|
116
|
+
|
117
|
+
end
|
118
|
+
|
119
|
+
|
120
|
+
end
|
data/spec/authenticate_spec.rb
CHANGED
@@ -16,7 +16,7 @@ describe Rack::Jwt::Auth::Authenticate do
|
|
16
16
|
|
17
17
|
it 'returns 200 ok if the request is authenticated' do
|
18
18
|
token = issuer.issue_token({user_id: 1, username: 'test'}, 'supertestsecret')
|
19
|
-
get('/', {}, {'HTTP_AUTHORIZATION' => token})
|
19
|
+
get('/', {}, {'HTTP_AUTHORIZATION' => "Bearer #{token}"})
|
20
20
|
|
21
21
|
expect(last_response.status).to eql(200)
|
22
22
|
expect(last_response.body).to eql('Hello')
|
@@ -30,16 +30,40 @@ describe Rack::Jwt::Auth::Authenticate do
|
|
30
30
|
it 'returns 401 if the authorization header is missing' do
|
31
31
|
get('/')
|
32
32
|
|
33
|
+
jsonResponse = JSON.parse(last_response.body)
|
34
|
+
|
33
35
|
expect(last_response.status).to eql(401)
|
34
|
-
expect(
|
36
|
+
expect(jsonResponse["message"]).to eql("Missing Authorization header")
|
35
37
|
end
|
36
38
|
|
37
39
|
it 'returns 401 if the authorization header signature is invalid' do
|
38
40
|
token = issuer.issue_token({user_id: 1}, 'invalid_secret')
|
39
|
-
get('/', {}, {'HTTP_AUTHORIZATION' => token})
|
41
|
+
get('/', {}, {'HTTP_AUTHORIZATION' => "Bearer #{token}"})
|
42
|
+
|
43
|
+
jsonResponse = JSON.parse(last_response.body)
|
44
|
+
|
45
|
+
expect(last_response.status).to eql(401)
|
46
|
+
expect(jsonResponse["message"]).to eql("Invalid Authorization")
|
47
|
+
end
|
48
|
+
|
49
|
+
it 'returns 401 if the header format is not Authorization: Bearer [token]' do
|
50
|
+
token = issuer.issue_token({user_id: 1}, 'supertestsecret')
|
51
|
+
get('/', {}, {'HTTP_AUTHORIZATION' => "#{token}"})
|
52
|
+
|
53
|
+
jsonResponse = JSON.parse(last_response.body)
|
54
|
+
|
55
|
+
expect(last_response.status).to eql(401)
|
56
|
+
expect(jsonResponse["message"]).to eql("Format is Authorization: Bearer [token]")
|
57
|
+
end
|
58
|
+
|
59
|
+
it 'returns 401 if authorization scheme is not Bearer' do
|
60
|
+
token = issuer.issue_token({user_id: 1}, 'supertestsecret')
|
61
|
+
get('/', {}, {'HTTP_AUTHORIZATION' => "WrongScheme #{token}"})
|
62
|
+
|
63
|
+
jsonResponse = JSON.parse(last_response.body)
|
40
64
|
|
41
65
|
expect(last_response.status).to eql(401)
|
42
|
-
expect(
|
66
|
+
expect(jsonResponse["message"]).to eql("Format is Authorization: Bearer [token]")
|
43
67
|
end
|
44
68
|
|
45
|
-
end
|
69
|
+
end
|
metadata
CHANGED
@@ -1,83 +1,83 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: rack-jwt-auth
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 1.0.3
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- João Almeida
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2015-02-05 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jwt
|
15
15
|
requirement: !ruby/object:Gem::Requirement
|
16
16
|
requirements:
|
17
|
-
- -
|
17
|
+
- - ~>
|
18
18
|
- !ruby/object:Gem::Version
|
19
19
|
version: '1.0'
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
|
-
- -
|
24
|
+
- - ~>
|
25
25
|
- !ruby/object:Gem::Version
|
26
26
|
version: '1.0'
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: bundler
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
30
30
|
requirements:
|
31
|
-
- -
|
31
|
+
- - ~>
|
32
32
|
- !ruby/object:Gem::Version
|
33
33
|
version: '1.3'
|
34
34
|
type: :development
|
35
35
|
prerelease: false
|
36
36
|
version_requirements: !ruby/object:Gem::Requirement
|
37
37
|
requirements:
|
38
|
-
- -
|
38
|
+
- - ~>
|
39
39
|
- !ruby/object:Gem::Version
|
40
40
|
version: '1.3'
|
41
41
|
- !ruby/object:Gem::Dependency
|
42
42
|
name: rake
|
43
43
|
requirement: !ruby/object:Gem::Requirement
|
44
44
|
requirements:
|
45
|
-
- -
|
45
|
+
- - ~>
|
46
46
|
- !ruby/object:Gem::Version
|
47
47
|
version: '10.3'
|
48
48
|
type: :development
|
49
49
|
prerelease: false
|
50
50
|
version_requirements: !ruby/object:Gem::Requirement
|
51
51
|
requirements:
|
52
|
-
- -
|
52
|
+
- - ~>
|
53
53
|
- !ruby/object:Gem::Version
|
54
54
|
version: '10.3'
|
55
55
|
- !ruby/object:Gem::Dependency
|
56
56
|
name: rspec
|
57
57
|
requirement: !ruby/object:Gem::Requirement
|
58
58
|
requirements:
|
59
|
-
- -
|
59
|
+
- - ~>
|
60
60
|
- !ruby/object:Gem::Version
|
61
61
|
version: '3.1'
|
62
62
|
type: :development
|
63
63
|
prerelease: false
|
64
64
|
version_requirements: !ruby/object:Gem::Requirement
|
65
65
|
requirements:
|
66
|
-
- -
|
66
|
+
- - ~>
|
67
67
|
- !ruby/object:Gem::Version
|
68
68
|
version: '3.1'
|
69
69
|
- !ruby/object:Gem::Dependency
|
70
70
|
name: rack-test
|
71
71
|
requirement: !ruby/object:Gem::Requirement
|
72
72
|
requirements:
|
73
|
-
- -
|
73
|
+
- - ~>
|
74
74
|
- !ruby/object:Gem::Version
|
75
75
|
version: '0.6'
|
76
76
|
type: :development
|
77
77
|
prerelease: false
|
78
78
|
version_requirements: !ruby/object:Gem::Requirement
|
79
79
|
requirements:
|
80
|
-
- -
|
80
|
+
- - ~>
|
81
81
|
- !ruby/object:Gem::Version
|
82
82
|
version: '0.6'
|
83
83
|
description: Rack jwt auth middleware
|
@@ -87,7 +87,7 @@ executables: []
|
|
87
87
|
extensions: []
|
88
88
|
extra_rdoc_files: []
|
89
89
|
files:
|
90
|
-
-
|
90
|
+
- .gitignore
|
91
91
|
- Gemfile
|
92
92
|
- LICENSE.txt
|
93
93
|
- README.md
|
@@ -111,17 +111,17 @@ require_paths:
|
|
111
111
|
- lib
|
112
112
|
required_ruby_version: !ruby/object:Gem::Requirement
|
113
113
|
requirements:
|
114
|
-
- -
|
114
|
+
- - '>='
|
115
115
|
- !ruby/object:Gem::Version
|
116
116
|
version: '0'
|
117
117
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
118
118
|
requirements:
|
119
|
-
- -
|
119
|
+
- - '>='
|
120
120
|
- !ruby/object:Gem::Version
|
121
121
|
version: '0'
|
122
122
|
requirements: []
|
123
123
|
rubyforge_project:
|
124
|
-
rubygems_version: 2.
|
124
|
+
rubygems_version: 2.0.14
|
125
125
|
signing_key:
|
126
126
|
specification_version: 4
|
127
127
|
summary: Rack jwt auth middleware
|