ripple_token 0.4.0 → 0.5.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8cda4c01f2b7c8c6e8ce0835a8869b4b41d3fa630d97271213a86c06a13350b0
4
- data.tar.gz: add32a390ee2e34e138b3b8524879bf27765cb57fe9af21f077ed14dda983a2e
3
+ metadata.gz: 9340efe777dcdb596e731768b6ca0d0781db3d74e162a1bc138b8d1d555c26ed
4
+ data.tar.gz: 33f413b201c9fc280d4a773f819374121b57b6591f7d347619e263f46278d785
5
5
  SHA512:
6
- metadata.gz: d7871db406c255d77ca7f984701db7b3e060b7a897cf30d8b0e4feb147dacf8d29d25ae77025d2b6d750707153eeb6355b8d8c7b97ed90aa2870d49f000ccf90
7
- data.tar.gz: dc0eee417cf07132cb115480febb568de4a5d40665e028f959deef3ada974815c5fca9a56bb327a4ff4d488aee719cebf89a73a03a99fd9ac1f651b01ecc8e29
6
+ metadata.gz: 01f1df20b2e3830a7462f1e416548abd4c6890be3755e1399092676917ea133d8cc832685214d980c01f1f2be0daaee1874d57414aa3c7ccbf895f99bfd4a54e
7
+ data.tar.gz: 7e612334e9b018e567f085586f1290a2c316d0636b3e7a55f7c4e6759d39892a5bb11dc3135996eeb20ddacda6c26a5e9983fe4167911d9942bfc8e10487f402
@@ -11,7 +11,7 @@ module RippleToken
11
11
  include HTTParty
12
12
 
13
13
  class << self
14
- delegate :public_paths, to: :configuration
14
+ delegate :public_paths, :logger, to: :configuration
15
15
 
16
16
  def configure
17
17
  @configuration = Configuration.new
@@ -5,6 +5,7 @@ module RippleToken
5
5
  attr_accessor :base_url,
6
6
  :realm,
7
7
  :public_key_ttl,
8
- :public_paths
8
+ :public_paths,
9
+ :logger
9
10
  end
10
11
  end
@@ -16,7 +16,10 @@ module RippleToken
16
16
 
17
17
  encoded_token = env['HTTP_AUTHORIZATION']&.gsub(/^Bearer /, '') || ''
18
18
 
19
+ Client.logger.debug("Received #{encoded_token} token")
20
+
19
21
  if encoded_token.nil? || encoded_token&.empty?
22
+ Client.logger.info('No token provided in request')
20
23
  raise MissingTokenError unless token.public_path? method, path
21
24
  else
22
25
  store_user_details(encoded_token, env)
@@ -7,16 +7,14 @@ module RippleToken
7
7
  end
8
8
 
9
9
  def decode(token)
10
- begin
11
- decoded_token = JWT.decode(token, public_key, true, { algorithm: 'RS256' })[0]
12
- raise ExpiredTokenError if expired? decoded_token
13
-
14
- decoded_token
15
- rescue JWT::DecodeError => e
16
- raise TokenDecodeError, e.message
17
- rescue JWT::ExpiredSignature => e
18
- raise ExpiredTokenError, e.message
19
- end
10
+ decoded_token = JWT.decode(token, public_key, true, { algorithm: 'RS256' })[0]
11
+ raise ExpiredTokenError if expired? decoded_token
12
+
13
+ decoded_token
14
+ rescue JWT::DecodeError => e
15
+ raise TokenDecodeError, e.message
16
+ rescue JWT::ExpiredSignature => e
17
+ raise ExpiredTokenError, e.message
20
18
  end
21
19
 
22
20
  def public_path?(method, path)
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module RippleToken
4
- VERSION = '0.4.0'
4
+ VERSION = '0.5.1'
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: ripple_token
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.0
4
+ version: 0.5.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Hex Event Solutions Limited
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2020-07-24 00:00:00.000000000 Z
11
+ date: 2020-08-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport