vestauth 0.2.2 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 695290e5fb4ac1ce87fd4b86abf1ba20862bf77dbdc0803d72617937958204af
4
- data.tar.gz: 70284e5aa34a6d45b3d3f7eef525a4be2c305f0f006611679e15a42949b7d79c
3
+ metadata.gz: '0594e61b96f3a5b773c8ad81feda6e2d52016b0dfd0ee418df2f870f774d16b2'
4
+ data.tar.gz: 8429841bd56a497cf453c7c8f7bc919bda1c2cb577ebe2068244b80467af20bf
5
5
  SHA512:
6
- metadata.gz: 9424fb000e3f8ff37afe0f142eaa9eefa2beaa06e464b0bc21bceeb832d7eb0efe36f15cdc2b2368e3e80e83818cb8d38c785154b1c40edad1fae10cb6790eec
7
- data.tar.gz: 91a584e689fc281fea7b82af2ab17e01b173de4e2e0f3aff8b0bf37f57cebe0cc9a9637f7f4d3b60a8acee3f5f4ccc3d32f6a2d6b6f88a313fb7421a3f94bb6b
6
+ metadata.gz: 88c9c51db5a3f6de562e23c4008bc4ad573e72aebfcc993338966c10e7a9ba9dc7a7a3c9df6534f1e4fe53f5f2d8bd0c2ad7b39bb5f1f2333df2756808c6a32b
7
+ data.tar.gz: 0b76d439231a6537acff84a7021ea53a380e4fcf4dd433bee302a0316b36e7ed65dafdbab933e3f565f8929d0d596dd4fa9b1da862aa1afe8adba2ca0e4732e2
data/README.md CHANGED
@@ -17,7 +17,7 @@ class ApplicationController < ActionController::Base
17
17
  private
18
18
 
19
19
  def verify_agent!
20
- @current_agent ||= Vestauth.provider.verify(http_method: request.method, uri: request.original_url, headers: request.headers)
20
+ @current_agent ||= Vestauth.tool.verify(http_method: request.method, uri: request.original_url, headers: request.headers)
21
21
  rescue => e
22
22
  render json: { error: { status: 401, code: 401, message: e.message } }, status: 401
23
23
  end
@@ -10,10 +10,10 @@ module Vestauth
10
10
  @executable = executable
11
11
  end
12
12
 
13
- def provider_verify(http_method:, uri:, signature:, signature_input:, signature_agent:)
13
+ def tool_verify(http_method:, uri:, signature:, signature_input:, signature_agent:)
14
14
  command = [
15
15
  @executable,
16
- "provider",
16
+ "tool",
17
17
  "verify",
18
18
  http_method,
19
19
  uri,
@@ -1,42 +1,7 @@
1
1
  # frozen_string_literal: true
2
2
 
3
- module Vestauth
4
- module Provider
5
- module_function
6
-
7
- def verify(http_method:, uri:, headers:)
8
- signature = signature_header(headers)
9
- signature_input = signature_input_header(headers)
10
- signature_agent = signature_agent_header(headers)
11
-
12
- attrs = {
13
- http_method: http_method,
14
- uri: uri,
15
- signature: signature,
16
- signature_input: signature_input,
17
- signature_agent: signature_agent
18
- }
19
- vestauth_binary.provider_verify(**attrs)
20
- end
21
-
22
- def vestauth_binary
23
- Vestauth::Binary.new
24
- end
25
- private_class_method :vestauth_binary
3
+ require_relative "tool"
26
4
 
27
- def signature_header(headers)
28
- headers["Signature"] || headers["signature"]
29
- end
30
- private_class_method :signature_header
31
-
32
- def signature_input_header(headers)
33
- headers["Signature-Input"] || headers["signature-input"]
34
- end
35
- private_class_method :signature_input_header
36
-
37
- def signature_agent_header(headers)
38
- headers["Signature-Agent"] || headers["signature-agent"]
39
- end
40
- private_class_method :signature_agent_header
41
- end
5
+ module Vestauth
6
+ Provider = Tool
42
7
  end
@@ -0,0 +1,42 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Vestauth
4
+ module Tool
5
+ module_function
6
+
7
+ def verify(http_method:, uri:, headers:)
8
+ signature = signature_header(headers)
9
+ signature_input = signature_input_header(headers)
10
+ signature_agent = signature_agent_header(headers)
11
+
12
+ attrs = {
13
+ http_method: http_method,
14
+ uri: uri,
15
+ signature: signature,
16
+ signature_input: signature_input,
17
+ signature_agent: signature_agent
18
+ }
19
+ vestauth_binary.tool_verify(**attrs)
20
+ end
21
+
22
+ def vestauth_binary
23
+ Vestauth::Binary.new
24
+ end
25
+ private_class_method :vestauth_binary
26
+
27
+ def signature_header(headers)
28
+ headers["Signature"] || headers["signature"]
29
+ end
30
+ private_class_method :signature_header
31
+
32
+ def signature_input_header(headers)
33
+ headers["Signature-Input"] || headers["signature-input"]
34
+ end
35
+ private_class_method :signature_input_header
36
+
37
+ def signature_agent_header(headers)
38
+ headers["Signature-Agent"] || headers["signature-agent"]
39
+ end
40
+ private_class_method :signature_agent_header
41
+ end
42
+ end
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Vestauth
4
- VERSION = "0.2.2"
4
+ VERSION = "0.3.0"
5
5
  end
data/lib/vestauth.rb CHANGED
@@ -3,13 +3,18 @@
3
3
  require_relative "vestauth/version"
4
4
  require_relative "vestauth/agent"
5
5
  require_relative "vestauth/binary"
6
+ require_relative "vestauth/tool"
6
7
  require_relative "vestauth/provider"
7
8
 
8
9
  module Vestauth
9
10
  class Error < StandardError; end
10
11
 
11
- def self.provider
12
- Provider
12
+ def self.tool
13
+ Tool
14
+ end
15
+
16
+ class << self
17
+ alias provider tool
13
18
  end
14
19
 
15
20
  def self.agent
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: vestauth
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.2
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - motdotla
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2026-02-25 00:00:00.000000000 Z
11
+ date: 2026-02-26 00:00:00.000000000 Z
12
12
  dependencies: []
13
13
  description: web-bot-auth for agents–from the creator of `dotenv` and `dotenvx`
14
14
  email:
@@ -26,6 +26,7 @@ files:
26
26
  - lib/vestauth/agent.rb
27
27
  - lib/vestauth/binary.rb
28
28
  - lib/vestauth/provider.rb
29
+ - lib/vestauth/tool.rb
29
30
  - lib/vestauth/version.rb
30
31
  homepage: https://vestauth.com
31
32
  licenses: