ripple_token 0.4.0 → 0.5.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8cda4c01f2b7c8c6e8ce0835a8869b4b41d3fa630d97271213a86c06a13350b0
4
- data.tar.gz: add32a390ee2e34e138b3b8524879bf27765cb57fe9af21f077ed14dda983a2e
3
+ metadata.gz: 9340efe777dcdb596e731768b6ca0d0781db3d74e162a1bc138b8d1d555c26ed
4
+ data.tar.gz: 33f413b201c9fc280d4a773f819374121b57b6591f7d347619e263f46278d785
5
5
  SHA512:
6
- metadata.gz: d7871db406c255d77ca7f984701db7b3e060b7a897cf30d8b0e4feb147dacf8d29d25ae77025d2b6d750707153eeb6355b8d8c7b97ed90aa2870d49f000ccf90
7
- data.tar.gz: dc0eee417cf07132cb115480febb568de4a5d40665e028f959deef3ada974815c5fca9a56bb327a4ff4d488aee719cebf89a73a03a99fd9ac1f651b01ecc8e29
6
+ metadata.gz: 01f1df20b2e3830a7462f1e416548abd4c6890be3755e1399092676917ea133d8cc832685214d980c01f1f2be0daaee1874d57414aa3c7ccbf895f99bfd4a54e
7
+ data.tar.gz: 7e612334e9b018e567f085586f1290a2c316d0636b3e7a55f7c4e6759d39892a5bb11dc3135996eeb20ddacda6c26a5e9983fe4167911d9942bfc8e10487f402
@@ -11,7 +11,7 @@ module RippleToken
11
11
  include HTTParty
12
12
 
13
13
  class << self
14
- delegate :public_paths, to: :configuration
14
+ delegate :public_paths, :logger, to: :configuration
15
15
 
16
16
  def configure
17
17
  @configuration = Configuration.new
@@ -5,6 +5,7 @@ module RippleToken
5
5
  attr_accessor :base_url,
6
6
  :realm,
7
7
  :public_key_ttl,
8
- :public_paths
8
+ :public_paths,
9
+ :logger
9
10
  end
10
11
  end
@@ -16,7 +16,10 @@ module RippleToken
16
16
 
17
17
  encoded_token = env['HTTP_AUTHORIZATION']&.gsub(/^Bearer /, '') || ''
18
18
 
19
+ Client.logger.debug("Received #{encoded_token} token")
20
+
19
21
  if encoded_token.nil? || encoded_token&.empty?
22
+ Client.logger.info('No token provided in request')
20
23
  raise MissingTokenError unless token.public_path? method, path
21
24
  else
22
25
  store_user_details(encoded_token, env)
@@ -7,16 +7,14 @@ module RippleToken
7
7
  end
8
8
 
9
9
  def decode(token)
10
- begin
11
- decoded_token = JWT.decode(token, public_key, true, { algorithm: 'RS256' })[0]
12
- raise ExpiredTokenError if expired? decoded_token
13
-
14
- decoded_token
15
- rescue JWT::DecodeError => e
16
- raise TokenDecodeError, e.message
17
- rescue JWT::ExpiredSignature => e
18
- raise ExpiredTokenError, e.message
19
- end
10
+ decoded_token = JWT.decode(token, public_key, true, { algorithm: 'RS256' })[0]
11
+ raise ExpiredTokenError if expired? decoded_token
12
+
13
+ decoded_token
14
+ rescue JWT::DecodeError => e
15
+ raise TokenDecodeError, e.message
16
+ rescue JWT::ExpiredSignature => e
17
+ raise ExpiredTokenError, e.message
20
18
  end
21
19
 
22
20
  def public_path?(method, path)
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module RippleToken
4
- VERSION = '0.4.0'
4
+ VERSION = '0.5.1'
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: ripple_token
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.0
4
+ version: 0.5.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Hex Event Solutions Limited
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2020-07-24 00:00:00.000000000 Z
11
+ date: 2020-08-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport