warden-jwt_auth 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,37 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'warden'
4
+
5
+ module Warden
6
+ module JWTAuth
7
+ # Warden strategy to authenticate an user through a JWT token in the
8
+ # `Authorization` request header
9
+ # :reek:PrimmaDonnaMethod
10
+ class Strategy < Warden::Strategies::Base
11
+ attr_reader :token
12
+
13
+ def valid?
14
+ !token.nil?
15
+ end
16
+
17
+ def store?
18
+ false
19
+ end
20
+
21
+ def authenticate!
22
+ user = UserDecoder.new.call(token, scope)
23
+ success!(user)
24
+ rescue JWT::DecodeError
25
+ fail!
26
+ end
27
+
28
+ private
29
+
30
+ def token
31
+ @token ||= HeaderParser.from_env(env)
32
+ end
33
+ end
34
+ end
35
+ end
36
+
37
+ Warden::Strategies.add(:jwt, Warden::JWTAuth::Strategy)
@@ -0,0 +1,22 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Warden
4
+ module JWTAuth
5
+ # Decodes a JWT into a hash payload into a JWT token
6
+ class TokenDecoder
7
+ include JWTAuth::Import['secret']
8
+
9
+ # Decodes the payload from a JWT as a hash
10
+ #
11
+ # @param token [String] a JWT
12
+ # @return [Hash] payload decoded from the JWT
13
+ def call(token)
14
+ JWT.decode(token,
15
+ secret,
16
+ true,
17
+ algorithm: TokenEncoder::ALG,
18
+ verify_jti: true)[0]
19
+ end
20
+ end
21
+ end
22
+ end
@@ -0,0 +1,34 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Warden
4
+ module JWTAuth
5
+ # Encodes a payload into a JWT token, adding some configurable
6
+ # claims
7
+ class TokenEncoder
8
+ include JWTAuth::Import['secret', 'expiration_time']
9
+
10
+ # Algorithm used to encode
11
+ ALG = 'HS256'
12
+
13
+ # Encodes a payload into a JWT
14
+ #
15
+ # @param payload [Hash] what has to be encoded
16
+ # @return [String] JWT
17
+ def call(payload)
18
+ payload_to_encode = merge_with_default_claims(payload)
19
+ JWT.encode(payload_to_encode, secret, ALG)
20
+ end
21
+
22
+ private
23
+
24
+ #:reek:FeatureEnvy
25
+ def merge_with_default_claims(payload)
26
+ now = Time.now.to_i
27
+ payload['iat'] ||= now
28
+ payload['exp'] ||= now + expiration_time
29
+ payload['jti'] ||= SecureRandom.uuid
30
+ payload
31
+ end
32
+ end
33
+ end
34
+ end
@@ -0,0 +1,20 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Warden
4
+ module JWTAuth
5
+ # Revokes a JWT using configured revocation strategy
6
+ class TokenRevoker
7
+ include JWTAuth::Import['revocation_strategies']
8
+
9
+ # Revokes the JWT token
10
+ #
11
+ # @param token [String] a JWT
12
+ def call(token)
13
+ payload = TokenDecoder.new.call(token)
14
+ scope = payload['scp'].to_sym
15
+ user = PayloadUserHelper.find_user(payload)
16
+ revocation_strategies[scope].revoke_jwt(payload, user)
17
+ end
18
+ end
19
+ end
20
+ end
@@ -0,0 +1,45 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'warden/jwt_auth/errors'
4
+
5
+ module Warden
6
+ module JWTAuth
7
+ # Layer above token decoding which directly decodes a user from a JWT
8
+ class UserDecoder
9
+ include JWTAuth::Import['revocation_strategies']
10
+
11
+ attr_reader :helper
12
+
13
+ def initialize(*args)
14
+ super
15
+ @helper = PayloadUserHelper
16
+ end
17
+
18
+ # Returns the user that is encoded in a JWT. The scope is used to choose
19
+ # the user repository to which send `#find_for_jwt_authentication(sub)`
20
+ # with decoded `sub` claim.
21
+ #
22
+ # @param token [String] a JWT
23
+ # @param scope [Symbol] Warden scope
24
+ # @return [Interfaces::User] an user, whatever it is
25
+ # @raise [Errors::RevokedToken] when token has been revoked for the
26
+ # encoded user
27
+ # @raise [Errors::WrongScope] when encoded scope does not match with scope
28
+ # argument
29
+ def call(token, scope)
30
+ payload = TokenDecoder.new.call(token)
31
+ raise Errors::WrongScope unless helper.scope_matches?(payload, scope)
32
+ user = helper.find_user(payload)
33
+ raise Errors::RevokedToken if revoked?(payload, user, scope)
34
+ user
35
+ end
36
+
37
+ private
38
+
39
+ def revoked?(payload, user, scope)
40
+ strategy = revocation_strategies[scope]
41
+ strategy.jwt_revoked?(payload, user)
42
+ end
43
+ end
44
+ end
45
+ end
@@ -0,0 +1,29 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'warden/jwt_auth/errors'
4
+
5
+ module Warden
6
+ module JWTAuth
7
+ # Layer above token encoding which directly encodes a user to a JWT
8
+ class UserEncoder
9
+ attr_reader :helper
10
+
11
+ def initialize
12
+ @helper = PayloadUserHelper
13
+ end
14
+
15
+ # Encodes a user for given scope into a JWT. Payload generated includes a
16
+ # `sub` claim which is build calling `jwt_subject` in `user`, and a custom
17
+ # `scp` claim which value is `scope` as a string. The result of
18
+ # calling `jwt_payload` in user is also merged into the payload.
19
+ #
20
+ # @param user [Interfaces::User] an user, whatever it is
21
+ # @param scope [Symbol] Warden scope
22
+ # @return [String] encoded JWT
23
+ def call(user, scope)
24
+ payload = helper.payload_for_user(user, scope)
25
+ TokenEncoder.new.call(payload)
26
+ end
27
+ end
28
+ end
29
+ end
@@ -0,0 +1,7 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Warden
4
+ module JWTAuth
5
+ VERSION = '0.1.0'
6
+ end
7
+ end
@@ -0,0 +1,35 @@
1
+ # coding: utf-8
2
+ lib = File.expand_path('../lib', __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require 'warden/jwt_auth/version'
5
+
6
+ Gem::Specification.new do |spec|
7
+ spec.name = "warden-jwt_auth"
8
+ spec.version = Warden::JWTAuth::VERSION
9
+ spec.authors = ["Marc Busqué"]
10
+ spec.email = ["marc@lamarciana.com"]
11
+
12
+ spec.summary = %q{JWT authentication for Warden.}
13
+ spec.description = %q{JWT authentication for Warden, ORM agnostic and accepting the implementation of token revocation strategies.}
14
+ spec.homepage = "https://github.com/waiting-for-dev/warden-jwt_auth"
15
+ spec.license = "MIT"
16
+
17
+ spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
18
+ spec.bindir = "exe"
19
+ spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
20
+ spec.require_paths = ["lib"]
21
+
22
+ spec.add_dependency 'dry-configurable', '~> 0.5'
23
+ spec.add_dependency 'dry-auto_inject', '~> 0.4'
24
+ spec.add_dependency 'jwt', '~> 1.5'
25
+ spec.add_dependency 'warden', '~> 1.2'
26
+
27
+ spec.add_development_dependency "bundler", "~> 1.12"
28
+ spec.add_development_dependency "rake", "~> 10.0"
29
+ spec.add_development_dependency "rspec", "~> 3.0"
30
+ spec.add_development_dependency "rack-test", "~> 0.6"
31
+ spec.add_development_dependency "pry-byebug", "~> 3.4"
32
+ # Test reporting
33
+ spec.add_development_dependency 'simplecov', '~> 0.13'
34
+ spec.add_development_dependency 'codeclimate-test-reporter', '~> 1.0'
35
+ end
metadata ADDED
@@ -0,0 +1,233 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: warden-jwt_auth
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Marc Busqué
8
+ autorequire:
9
+ bindir: exe
10
+ cert_chain: []
11
+ date: 2017-01-26 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: dry-configurable
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '0.5'
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '0.5'
27
+ - !ruby/object:Gem::Dependency
28
+ name: dry-auto_inject
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '0.4'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '0.4'
41
+ - !ruby/object:Gem::Dependency
42
+ name: jwt
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '1.5'
48
+ type: :runtime
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '1.5'
55
+ - !ruby/object:Gem::Dependency
56
+ name: warden
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: '1.2'
62
+ type: :runtime
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: '1.2'
69
+ - !ruby/object:Gem::Dependency
70
+ name: bundler
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - "~>"
74
+ - !ruby/object:Gem::Version
75
+ version: '1.12'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - "~>"
81
+ - !ruby/object:Gem::Version
82
+ version: '1.12'
83
+ - !ruby/object:Gem::Dependency
84
+ name: rake
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - "~>"
88
+ - !ruby/object:Gem::Version
89
+ version: '10.0'
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - "~>"
95
+ - !ruby/object:Gem::Version
96
+ version: '10.0'
97
+ - !ruby/object:Gem::Dependency
98
+ name: rspec
99
+ requirement: !ruby/object:Gem::Requirement
100
+ requirements:
101
+ - - "~>"
102
+ - !ruby/object:Gem::Version
103
+ version: '3.0'
104
+ type: :development
105
+ prerelease: false
106
+ version_requirements: !ruby/object:Gem::Requirement
107
+ requirements:
108
+ - - "~>"
109
+ - !ruby/object:Gem::Version
110
+ version: '3.0'
111
+ - !ruby/object:Gem::Dependency
112
+ name: rack-test
113
+ requirement: !ruby/object:Gem::Requirement
114
+ requirements:
115
+ - - "~>"
116
+ - !ruby/object:Gem::Version
117
+ version: '0.6'
118
+ type: :development
119
+ prerelease: false
120
+ version_requirements: !ruby/object:Gem::Requirement
121
+ requirements:
122
+ - - "~>"
123
+ - !ruby/object:Gem::Version
124
+ version: '0.6'
125
+ - !ruby/object:Gem::Dependency
126
+ name: pry-byebug
127
+ requirement: !ruby/object:Gem::Requirement
128
+ requirements:
129
+ - - "~>"
130
+ - !ruby/object:Gem::Version
131
+ version: '3.4'
132
+ type: :development
133
+ prerelease: false
134
+ version_requirements: !ruby/object:Gem::Requirement
135
+ requirements:
136
+ - - "~>"
137
+ - !ruby/object:Gem::Version
138
+ version: '3.4'
139
+ - !ruby/object:Gem::Dependency
140
+ name: simplecov
141
+ requirement: !ruby/object:Gem::Requirement
142
+ requirements:
143
+ - - "~>"
144
+ - !ruby/object:Gem::Version
145
+ version: '0.13'
146
+ type: :development
147
+ prerelease: false
148
+ version_requirements: !ruby/object:Gem::Requirement
149
+ requirements:
150
+ - - "~>"
151
+ - !ruby/object:Gem::Version
152
+ version: '0.13'
153
+ - !ruby/object:Gem::Dependency
154
+ name: codeclimate-test-reporter
155
+ requirement: !ruby/object:Gem::Requirement
156
+ requirements:
157
+ - - "~>"
158
+ - !ruby/object:Gem::Version
159
+ version: '1.0'
160
+ type: :development
161
+ prerelease: false
162
+ version_requirements: !ruby/object:Gem::Requirement
163
+ requirements:
164
+ - - "~>"
165
+ - !ruby/object:Gem::Version
166
+ version: '1.0'
167
+ description: JWT authentication for Warden, ORM agnostic and accepting the implementation
168
+ of token revocation strategies.
169
+ email:
170
+ - marc@lamarciana.com
171
+ executables: []
172
+ extensions: []
173
+ extra_rdoc_files: []
174
+ files:
175
+ - ".codeclimate.yml"
176
+ - ".gitignore"
177
+ - ".overcommit.yml"
178
+ - ".overcommit_gems.rb"
179
+ - ".reek"
180
+ - ".rspec"
181
+ - ".rubocop.yml"
182
+ - ".travis.yml"
183
+ - CODE_OF_CONDUCT.md
184
+ - Dockerfile
185
+ - Gemfile
186
+ - LICENSE.txt
187
+ - README.md
188
+ - Rakefile
189
+ - bin/console
190
+ - bin/setup
191
+ - docker-compose.yml
192
+ - lib/warden/jwt_auth.rb
193
+ - lib/warden/jwt_auth/errors.rb
194
+ - lib/warden/jwt_auth/header_parser.rb
195
+ - lib/warden/jwt_auth/hooks.rb
196
+ - lib/warden/jwt_auth/interfaces.rb
197
+ - lib/warden/jwt_auth/middleware.rb
198
+ - lib/warden/jwt_auth/middleware/revocation_manager.rb
199
+ - lib/warden/jwt_auth/middleware/token_dispatcher.rb
200
+ - lib/warden/jwt_auth/payload_user_helper.rb
201
+ - lib/warden/jwt_auth/strategy.rb
202
+ - lib/warden/jwt_auth/token_decoder.rb
203
+ - lib/warden/jwt_auth/token_encoder.rb
204
+ - lib/warden/jwt_auth/token_revoker.rb
205
+ - lib/warden/jwt_auth/user_decoder.rb
206
+ - lib/warden/jwt_auth/user_encoder.rb
207
+ - lib/warden/jwt_auth/version.rb
208
+ - warden-jwt_auth.gemspec
209
+ homepage: https://github.com/waiting-for-dev/warden-jwt_auth
210
+ licenses:
211
+ - MIT
212
+ metadata: {}
213
+ post_install_message:
214
+ rdoc_options: []
215
+ require_paths:
216
+ - lib
217
+ required_ruby_version: !ruby/object:Gem::Requirement
218
+ requirements:
219
+ - - ">="
220
+ - !ruby/object:Gem::Version
221
+ version: '0'
222
+ required_rubygems_version: !ruby/object:Gem::Requirement
223
+ requirements:
224
+ - - ">="
225
+ - !ruby/object:Gem::Version
226
+ version: '0'
227
+ requirements: []
228
+ rubyforge_project:
229
+ rubygems_version: 2.5.1
230
+ signing_key:
231
+ specification_version: 4
232
+ summary: JWT authentication for Warden.
233
+ test_files: []