rack-jwt 0.1.0 → 0.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.travis.yml +4 -0
- data/README.md +5 -1
- data/Rakefile +7 -0
- data/lib/rack/jwt/auth.rb +30 -38
- data/lib/rack/jwt/version.rb +1 -1
- data/rack-jwt.gemspec +3 -2
- data/spec/auth_spec.rb +77 -34
- metadata +6 -5
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2cdc1b0bd5715e4d4d5e8cd04822d0e6825b089f
|
4
|
+
data.tar.gz: 2397aac243a1d587e109f46942cecdaaccb9b5cd
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1ccae31dc0d69b94d0da8243276c532b2793dbae1563da3b328a163d9f03f5284abb58f60a193b8e421591ca9f9ff0e2b1b6bac9dcd80a0954525b6ffd25d371
|
7
|
+
data.tar.gz: 03b28fa23d5d00bce804435ff76c6e1dd4f873f6c5d49bf8830ee5295ad747d90e5dbfba7fcb371d34f58968534fb7725e1545272ec82a48f78b582808f62019
|
data/.travis.yml
ADDED
data/README.md
CHANGED
@@ -1,4 +1,8 @@
|
|
1
|
-
# Rack::
|
1
|
+
# Rack::JWT
|
2
|
+
|
3
|
+
[](http://badge.fury.io/rb/rack-jwt)
|
4
|
+
[](https://travis-ci.org/eigenbart/rack-jwt)
|
5
|
+
[](https://codeclimate.com/github/eigenbart/rack-jwt)
|
2
6
|
|
3
7
|
This gem provides JSON Web Token (JWT) based authentication.
|
4
8
|
|
data/Rakefile
CHANGED
data/lib/rack/jwt/auth.rb
CHANGED
@@ -10,57 +10,49 @@ module Rack
|
|
10
10
|
end
|
11
11
|
|
12
12
|
def call(env)
|
13
|
-
if @exclude.include? env[
|
13
|
+
if @exclude.include? env['PATH_INFO']
|
14
14
|
@app.call(env)
|
15
|
-
elsif env["HTTP_AUTHORIZATION"]
|
16
|
-
begin
|
17
|
-
if env["HTTP_AUTHORIZATION"].split(" ").first != 'Bearer'
|
18
|
-
invalid_auth_header
|
19
|
-
else
|
20
|
-
token = env["HTTP_AUTHORIZATION"].split(" ")[-1]
|
21
|
-
decoded_token = Token.decode(token, @secret)
|
22
|
-
env["jwt.header"] = decoded_token.last
|
23
|
-
env["jwt.payload"] = decoded_token.first
|
24
|
-
@app.call(env)
|
25
|
-
end
|
26
|
-
rescue
|
27
|
-
unauthorized
|
28
|
-
end
|
29
15
|
else
|
30
|
-
|
16
|
+
check_jwt_token(env)
|
31
17
|
end
|
32
18
|
end
|
33
19
|
|
34
20
|
private
|
35
21
|
|
36
|
-
def
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
22
|
+
def check_jwt_token(env)
|
23
|
+
if valid_header?(env)
|
24
|
+
begin
|
25
|
+
token = env['HTTP_AUTHORIZATION'].split(' ')[-1]
|
26
|
+
decoded_token = Token.decode(token, @secret)
|
27
|
+
env['jwt.header'] = decoded_token.last
|
28
|
+
env['jwt.payload'] = decoded_token.first
|
29
|
+
@app.call(env)
|
30
|
+
rescue
|
31
|
+
return_error('Invalid JWT token')
|
32
|
+
end
|
33
|
+
else
|
34
|
+
return_jwt_header_error(env)
|
35
|
+
end
|
44
36
|
end
|
45
37
|
|
46
|
-
def
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
38
|
+
def return_jwt_header_error(env)
|
39
|
+
if env['HTTP_AUTHORIZATION'].nil?
|
40
|
+
return_error('Missing Authorization header')
|
41
|
+
elsif env['HTTP_AUTHORIZATION'].split(' ').first != 'Bearer'
|
42
|
+
return_error('Invalid Authorization header format')
|
43
|
+
end
|
44
|
+
end
|
52
45
|
|
53
|
-
|
46
|
+
def valid_header?(env)
|
47
|
+
env['HTTP_AUTHORIZATION'] =~ /\ABearer \S*\.\S*\.\S*\z/
|
54
48
|
end
|
55
49
|
|
56
|
-
def
|
57
|
-
body
|
58
|
-
headers = {
|
59
|
-
'Content-
|
60
|
-
'Content-Length' => body.bytesize.to_s
|
61
|
-
}
|
50
|
+
def return_error(message)
|
51
|
+
body = { error: message }.to_json
|
52
|
+
headers = { 'Content-Type' => 'application/json',
|
53
|
+
'Content-Length' => body.bytesize.to_s }
|
62
54
|
|
63
|
-
|
55
|
+
[401, headers, [body]]
|
64
56
|
end
|
65
57
|
end
|
66
58
|
end
|
data/lib/rack/jwt/version.rb
CHANGED
data/rack-jwt.gemspec
CHANGED
@@ -17,9 +17,10 @@ Gem::Specification.new do |spec|
|
|
17
17
|
spec.executables = spec.files.grep(%r{^bin/}) { |f| File.basename(f) }
|
18
18
|
spec.test_files = spec.files.grep(%r{^(test|spec|features)/})
|
19
19
|
spec.require_paths = ["lib"]
|
20
|
+
spec.required_ruby_version = '>= 1.9.3'
|
20
21
|
|
21
|
-
spec.add_development_dependency
|
22
|
-
spec.add_development_dependency
|
22
|
+
spec.add_development_dependency 'bundler', '~> 1.7'
|
23
|
+
spec.add_development_dependency 'rake', '~> 10.0.0'
|
23
24
|
spec.add_development_dependency 'rack-test', '~> 0.6.3'
|
24
25
|
spec.add_development_dependency 'rspec', '~> 3.2.0'
|
25
26
|
|
data/spec/auth_spec.rb
CHANGED
@@ -5,64 +5,107 @@ describe Rack::JWT::Auth do
|
|
5
5
|
|
6
6
|
let(:issuer) { Rack::JWT::Token }
|
7
7
|
let(:secret) { 'foo' }
|
8
|
+
let(:body) {{ 'foo' => 'bar' }}
|
8
9
|
|
9
10
|
let(:app) do
|
10
|
-
main_app = lambda { |env| [200, env, [
|
11
|
-
Rack::JWT::Auth.new(main_app, {secret: secret})
|
11
|
+
main_app = lambda { |env| [200, env, [body.to_json]] }
|
12
|
+
Rack::JWT::Auth.new(main_app, { secret: secret })
|
12
13
|
end
|
13
14
|
|
14
|
-
|
15
|
-
|
15
|
+
before do
|
16
|
+
get('/', {}, headers)
|
16
17
|
end
|
17
18
|
|
18
|
-
|
19
|
-
|
20
|
-
get('/', {}, {'HTTP_AUTHORIZATION' => 'Bearer #{token}'})
|
19
|
+
context 'when no secret provided' do
|
20
|
+
let(:headers) { {} }
|
21
21
|
|
22
|
-
|
23
|
-
|
22
|
+
it 'raises an exception' do
|
23
|
+
expect{ Rack::JWT::Auth.new(main_app, {}) }.to raise_error
|
24
|
+
end
|
25
|
+
end
|
26
|
+
|
27
|
+
context 'when no authorization header provided' do
|
28
|
+
let(:headers) { {} }
|
29
|
+
|
30
|
+
subject { JSON.parse(last_response.body) }
|
24
31
|
|
25
|
-
|
32
|
+
it 'returns 401 status code' do
|
33
|
+
expect(last_response.status).to eq(401)
|
34
|
+
end
|
26
35
|
|
27
|
-
|
36
|
+
it 'returns an error message' do
|
37
|
+
expect(subject['error']).to eq('Missing Authorization header')
|
38
|
+
end
|
28
39
|
end
|
29
40
|
|
30
|
-
|
31
|
-
|
41
|
+
context 'when authorzation header does not contain the schema' do
|
42
|
+
let(:token) { issuer.encode({ iss: 1 }, secret) }
|
43
|
+
let(:headers) {{ 'HTTP_AUTHORIZATION' => token }}
|
32
44
|
|
33
|
-
|
45
|
+
subject { JSON.parse(last_response.body) }
|
34
46
|
|
35
|
-
|
36
|
-
|
47
|
+
it 'returns 401 status code' do
|
48
|
+
expect(last_response.status).to eq(401)
|
49
|
+
end
|
50
|
+
|
51
|
+
it 'returns an error message' do
|
52
|
+
expect(subject['error']).to eq('Invalid Authorization header format')
|
53
|
+
end
|
37
54
|
end
|
38
55
|
|
39
|
-
|
40
|
-
token
|
41
|
-
|
56
|
+
context 'when authorization header contains an invalid schema' do
|
57
|
+
let(:token) { issuer.encode({ iss: 1 }, secret) }
|
58
|
+
let(:headers) {{ 'HTTP_AUTHORIZATION' => "WrongScheme #{token}" }}
|
59
|
+
|
60
|
+
subject { JSON.parse(last_response.body) }
|
42
61
|
|
43
|
-
|
62
|
+
it 'returns 401 status code' do
|
63
|
+
expect(last_response.status).to eq(401)
|
64
|
+
end
|
44
65
|
|
45
|
-
|
46
|
-
|
66
|
+
it 'returns an error message' do
|
67
|
+
expect(subject['error']).to eq('Invalid Authorization header format')
|
68
|
+
end
|
47
69
|
end
|
48
70
|
|
49
|
-
|
50
|
-
token
|
51
|
-
|
71
|
+
context 'when token signature is invalid' do
|
72
|
+
let(:token) { issuer.encode({ iss: 1 }, 'invalid secret') }
|
73
|
+
let(:headers) {{ 'HTTP_AUTHORIZATION' => "Bearer #{token}" }}
|
52
74
|
|
53
|
-
|
75
|
+
subject { JSON.parse(last_response.body) }
|
54
76
|
|
55
|
-
|
56
|
-
|
77
|
+
it 'returns 401 status code' do
|
78
|
+
expect(last_response.status).to eq(401)
|
79
|
+
end
|
80
|
+
|
81
|
+
it 'returns an error message' do
|
82
|
+
expect(subject['error']).to eq('Invalid JWT token')
|
83
|
+
end
|
57
84
|
end
|
58
85
|
|
59
|
-
|
60
|
-
token
|
61
|
-
|
86
|
+
context 'when token is valid' do
|
87
|
+
let(:token) { issuer.encode({ iss: 1 }, secret) }
|
88
|
+
let(:headers) {{ 'HTTP_AUTHORIZATION' => "Bearer #{token}" }}
|
89
|
+
|
90
|
+
subject { JSON.parse(last_response.body) }
|
91
|
+
|
92
|
+
it 'returns 200 status code' do
|
93
|
+
expect(last_response.status).to eq(200)
|
94
|
+
end
|
95
|
+
|
96
|
+
it 'process the request' do
|
97
|
+
expect(subject).to eq(body)
|
98
|
+
end
|
62
99
|
|
63
|
-
|
100
|
+
it 'adds the token payload to the request' do
|
101
|
+
payload = last_response.header['jwt.payload']
|
102
|
+
expect(payload['iss']).to eq(1)
|
103
|
+
end
|
64
104
|
|
65
|
-
|
66
|
-
|
105
|
+
it 'adds the token header to the request' do
|
106
|
+
header = last_response.header['jwt.header']
|
107
|
+
expect(header['alg']).to eq('HS256')
|
108
|
+
expect(header['typ']).to eq('JWT')
|
109
|
+
end
|
67
110
|
end
|
68
111
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: rack-jwt
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.1.
|
4
|
+
version: 0.1.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Mr. Eigenbart
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2015-02-
|
11
|
+
date: 2015-02-07 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: bundler
|
@@ -30,14 +30,14 @@ dependencies:
|
|
30
30
|
requirements:
|
31
31
|
- - "~>"
|
32
32
|
- !ruby/object:Gem::Version
|
33
|
-
version:
|
33
|
+
version: 10.0.0
|
34
34
|
type: :development
|
35
35
|
prerelease: false
|
36
36
|
version_requirements: !ruby/object:Gem::Requirement
|
37
37
|
requirements:
|
38
38
|
- - "~>"
|
39
39
|
- !ruby/object:Gem::Version
|
40
|
-
version:
|
40
|
+
version: 10.0.0
|
41
41
|
- !ruby/object:Gem::Dependency
|
42
42
|
name: rack-test
|
43
43
|
requirement: !ruby/object:Gem::Requirement
|
@@ -103,6 +103,7 @@ extra_rdoc_files: []
|
|
103
103
|
files:
|
104
104
|
- ".gitignore"
|
105
105
|
- ".rspec"
|
106
|
+
- ".travis.yml"
|
106
107
|
- Gemfile
|
107
108
|
- LICENSE.txt
|
108
109
|
- README.md
|
@@ -126,7 +127,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
126
127
|
requirements:
|
127
128
|
- - ">="
|
128
129
|
- !ruby/object:Gem::Version
|
129
|
-
version:
|
130
|
+
version: 1.9.3
|
130
131
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
131
132
|
requirements:
|
132
133
|
- - ">="
|