ripple_token 0.1.0 → 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c2c8ced1eec1151d4485a3614d3876b9a8941bbf5bad79f05919c1876d067f7c
4
- data.tar.gz: 34f24e9079b2c04e436d4482d8aa0409f4793b002eae580404ac6ed579eadcb2
3
+ metadata.gz: c256c95422a75c6ea026ce2a3ba93e82180d1b874b3a0cf683604228d4320109
4
+ data.tar.gz: e0b5c1ef7b3d6552053117942d626096d5c755fc026534d0cb272a3a3fbf479e
5
5
  SHA512:
6
- metadata.gz: 72c955c3fe7d11d8e92663677099ed8319e46f12955fb2e2672a54d66f7b8a00dbaad6a615efe1353deb7cc69156372f3c95df4418f2c095b9d268ac89f6a48a
7
- data.tar.gz: 1569009de54f65d7c37cf9c3abf2edf38f06aae6f691bcdc5dbcf17f89af7ed075bcca0814eb5d1b687150b2dec0ac63363328c8237c9e18101b9d4e4d56a159
6
+ metadata.gz: 666512da31bb1a5c189c34cc90c47980f74d41982391b61c17083273b68e49668d9c9a6b4d9f2f99096f61293f3bef35db1d5c3e9be335c49277f62917113c3a
7
+ data.tar.gz: a8b4a8665077d0c1c68200f0f0d228d8ae3c607e2b9cc7feedf4ca39e60d30f3b4f0eb656f03622151c92d106dc9e746a379fc90dcc74a277059da8c6e465a8d
@@ -14,11 +14,14 @@ module RippleToken
14
14
  method = env['REQUEST_METHOD']
15
15
  path = env['PATH_INFO']
16
16
 
17
+ encoded_token = env['HTTP_AUTHORIZATION']&.gsub(/^Bearer /, '') || ''
17
18
  unless token.public_path? method, path
18
- encoded_token = env['HTTP_AUTHORIZATION']&.gsub(/^Bearer /, '') || ''
19
- decoded_token = token.decode(encoded_token)
20
- store_user_details(decoded_token, env)
19
+ raise MissingTokenError if encoded_token.nil || encoded_token&.empty?
21
20
  end
21
+ decoded_token = token.decode(encoded_token)
22
+
23
+ store_user_details(decoded_token, env)
24
+
22
25
  @app.call(env)
23
26
  end
24
27
 
@@ -7,8 +7,6 @@ module RippleToken
7
7
  end
8
8
 
9
9
  def decode(token)
10
- raise MissingTokenError if token.nil? || token&.empty?
11
-
12
10
  begin
13
11
  decoded_token = JWT.decode(token, public_key, true, { algorithm: 'RS256' })[0]
14
12
  raise ExpiredTokenError if expired? decoded_token
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module RippleToken
4
- VERSION = '0.1.0'
4
+ VERSION = '0.2.0'
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: ripple_token
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.2.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Hex Event Solutions Limited
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2020-06-19 00:00:00.000000000 Z
11
+ date: 2020-06-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport