ripple_token 0.1.0 → 0.3.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c2c8ced1eec1151d4485a3614d3876b9a8941bbf5bad79f05919c1876d067f7c
4
- data.tar.gz: 34f24e9079b2c04e436d4482d8aa0409f4793b002eae580404ac6ed579eadcb2
3
+ metadata.gz: 912f506e6c36d5722d3dcdf483edac3feefc85af352c702d6ca474f261286593
4
+ data.tar.gz: aed1cf8068be78bba5692d122f9ed26495ecb6b33e6900b8ca2ef513d325f60a
5
5
  SHA512:
6
- metadata.gz: 72c955c3fe7d11d8e92663677099ed8319e46f12955fb2e2672a54d66f7b8a00dbaad6a615efe1353deb7cc69156372f3c95df4418f2c095b9d268ac89f6a48a
7
- data.tar.gz: 1569009de54f65d7c37cf9c3abf2edf38f06aae6f691bcdc5dbcf17f89af7ed075bcca0814eb5d1b687150b2dec0ac63363328c8237c9e18101b9d4e4d56a159
6
+ metadata.gz: e0ae686632b27e47b898622a1a7723f831b2833a3affc58af63e7f4e1e7617379858d5cd14ce40c9457f017172bf5953aaaac0cb38004795c47d2901ba3fec90
7
+ data.tar.gz: 6064cd17c8593c3f7070065b1240ba759c1218da3b9a6c5d467046b5232f77dad5ce9efb05c50d4b8eedf228764ba441b300ee7e4beb22e61a890270cf5fe33d
@@ -14,17 +14,23 @@ module RippleToken
14
14
  method = env['REQUEST_METHOD']
15
15
  path = env['PATH_INFO']
16
16
 
17
- unless token.public_path? method, path
18
- encoded_token = env['HTTP_AUTHORIZATION']&.gsub(/^Bearer /, '') || ''
19
- decoded_token = token.decode(encoded_token)
20
- store_user_details(decoded_token, env)
17
+ encoded_token = env['HTTP_AUTHORIZATION']&.gsub(/^Bearer /, '') || ''
18
+
19
+ if encoded_token.nil? || encoded_token&.empty?
20
+ raise MissingTokenError unless token.public_path? method, path
21
+ else
22
+ store_user_details(encoded_token, env)
21
23
  end
24
+
22
25
  @app.call(env)
23
26
  end
24
27
 
25
28
  private
26
29
 
27
- def store_user_details(decoded_token, env)
30
+ def store_user_details(encoded_token, env)
31
+ env['keycloak.raw_token'] = encoded_token
32
+ decoded_token = token.decode(encoded_token)
33
+
28
34
  env['keycloak.token'] = decoded_token
29
35
  env['keycloak.user_id'] = decoded_token['sub']
30
36
  env['keycloak.user_roles'] = decoded_token['realm_access']['roles']
@@ -7,8 +7,6 @@ module RippleToken
7
7
  end
8
8
 
9
9
  def decode(token)
10
- raise MissingTokenError if token.nil? || token&.empty?
11
-
12
10
  begin
13
11
  decoded_token = JWT.decode(token, public_key, true, { algorithm: 'RS256' })[0]
14
12
  raise ExpiredTokenError if expired? decoded_token
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module RippleToken
4
- VERSION = '0.1.0'
4
+ VERSION = '0.3.0'
5
5
  end
@@ -25,7 +25,7 @@ Gem::Specification.new do |spec|
25
25
  spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
26
26
  spec.require_paths = ['lib']
27
27
 
28
- spec.add_dependency('activesupport', '6.0.3.1')
28
+ spec.add_dependency('activesupport', '~>6.0')
29
29
  spec.add_dependency('httparty', '0.18.1')
30
30
  spec.add_dependency('jwt', '2.2.1')
31
31
 
metadata CHANGED
@@ -1,29 +1,29 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: ripple_token
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Hex Event Solutions Limited
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2020-06-19 00:00:00.000000000 Z
11
+ date: 2020-07-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport
15
15
  requirement: !ruby/object:Gem::Requirement
16
16
  requirements:
17
- - - '='
17
+ - - "~>"
18
18
  - !ruby/object:Gem::Version
19
- version: 6.0.3.1
19
+ version: '6.0'
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
- - - '='
24
+ - - "~>"
25
25
  - !ruby/object:Gem::Version
26
- version: 6.0.3.1
26
+ version: '6.0'
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: httparty
29
29
  requirement: !ruby/object:Gem::Requirement