auth0 5.17.0 → 5.18.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 001f09f32948583c13fb7a3bf421d34a469ba5cd4b0b8ce080a5febaf2e8369b
4
- data.tar.gz: 671271047cdaa71aa6cbf6595d35623b9cfdc79e59aa2a5f9f6e8af59e1d6e52
3
+ metadata.gz: f9f09b3cbb82970d76ce07a4e20b7791059f9e6c8874e8c7723b9e02fa2f7221
4
+ data.tar.gz: ac5451e6f51c813f40ad9f233253a9d3556e7aa4a1908aec8d6ed95b3a1a99a9
5
5
  SHA512:
6
- metadata.gz: 5d95a176bd531635ac2502eb147384da9ac0417020dc17e6e0592ba508ece19c70cd1e7037718ffcfdb4b1bcedb3dd6c2866746923328fe5777c075e542aabb0
7
- data.tar.gz: 9e693a863adeabb6940f06832ecfd67c30fbcfb6106108f228c3e3959b1bb0892601cca649a5d3a009ec645b24750f5a467a3942be4202c9c30d353102fb4722
6
+ metadata.gz: fdaf8bf8869532464bd71f51fbba1503e1d529d9fd06e35a9d88dc346400858a60c4b0de7a85b2a079f45fec342e62fca3042c8872ad3cdd48efa6d27dba1f04
7
+ data.tar.gz: f43c6fc7a97a0ff55acd7b92f7f6376a52877f3988219b102c8c69625e753ca7540f50be464771f137b4e45e577a4665ee44f87e493c3f814d7d1e74636f1d00
data/.github/CODEOWNERS CHANGED
@@ -1 +1 @@
1
- * @auth0/dx-sdks-engineer
1
+ * @auth0/project-dx-sdks-engineer-codeowner
@@ -0,0 +1,71 @@
1
+ name: 'Reversing Labs Scanner'
2
+ description: 'Runs the Reversing Labs scanner on a specified artifact.'
3
+ inputs:
4
+ artifact-path:
5
+ description: 'Path to the artifact to be scanned.'
6
+ required: true
7
+ version:
8
+ description: 'Version of the artifact.'
9
+ required: true
10
+
11
+ runs:
12
+ using: 'composite'
13
+ steps:
14
+ - name: Set up Python
15
+ uses: actions/setup-python@v4
16
+ with:
17
+ python-version: '3.10'
18
+
19
+ - name: Install Python dependencies
20
+ shell: bash
21
+ run: |
22
+ pip install boto3 requests
23
+
24
+ - name: Configure AWS credentials
25
+ uses: aws-actions/configure-aws-credentials@v1
26
+ with:
27
+ role-to-assume: ${{ env.PRODSEC_TOOLS_ARN }}
28
+ aws-region: us-east-1
29
+ mask-aws-account-id: true
30
+
31
+ - name: Install RL Wrapper
32
+ shell: bash
33
+ run: |
34
+ pip install rl-wrapper>=1.0.0 --index-url "https://${{ env.PRODSEC_TOOLS_USER }}:${{ env.PRODSEC_TOOLS_TOKEN }}@a0us.jfrog.io/artifactory/api/pypi/python-local/simple"
35
+
36
+ - name: Run RL Scanner
37
+ shell: bash
38
+ env:
39
+ RLSECURE_LICENSE: ${{ env.RLSECURE_LICENSE }}
40
+ RLSECURE_SITE_KEY: ${{ env.RLSECURE_SITE_KEY }}
41
+ SIGNAL_HANDLER_TOKEN: ${{ env.SIGNAL_HANDLER_TOKEN }}
42
+ PYTHONUNBUFFERED: 1
43
+ run: |
44
+ if [ ! -f "${{ inputs.artifact-path }}" ]; then
45
+ echo "Artifact not found: ${{ inputs.artifact-path }}"
46
+ exit 1
47
+ fi
48
+
49
+ rl-wrapper \
50
+ --artifact "${{ inputs.artifact-path }}" \
51
+ --name "${{ github.event.repository.name }}" \
52
+ --version "${{ inputs.version }}" \
53
+ --repository "${{ github.repository }}" \
54
+ --commit "${{ github.sha }}" \
55
+ --build-env "github_actions" \
56
+ --suppress_output
57
+
58
+ # Check the outcome of the scanner
59
+ if [ $? -ne 0 ]; then
60
+ echo "RL Scanner failed."
61
+ echo "scan-status=failed" >> $GITHUB_ENV
62
+ exit 1
63
+ else
64
+ echo "RL Scanner passed."
65
+ echo "scan-status=success" >> $GITHUB_ENV
66
+ fi
67
+
68
+ outputs:
69
+ scan-status:
70
+ description: 'The outcome of the scan process.'
71
+ value: ${{ env.scan-status }}
@@ -36,18 +36,18 @@ jobs:
36
36
  run: exit 0 # Skip unnecessary test runs for dependabot and merge queues. Artifically flag as successful, as this is a required check for branch protection.
37
37
 
38
38
  - name: Checkout
39
- uses: actions/checkout@v4
39
+ uses: actions/checkout@v6
40
40
 
41
41
  - name: Initialize CodeQL
42
- uses: github/codeql-action/init@v3
42
+ uses: github/codeql-action/init@v4
43
43
  with:
44
44
  languages: ${{ matrix.language }}
45
45
  queries: +security-and-quality
46
46
 
47
47
  - name: Autobuild
48
- uses: github/codeql-action/autobuild@v3
48
+ uses: github/codeql-action/autobuild@v4
49
49
 
50
50
  - name: Perform CodeQL Analysis
51
- uses: github/codeql-action/analyze@v3
51
+ uses: github/codeql-action/analyze@v4
52
52
  with:
53
53
  category: "/language:${{ matrix.language }}"
@@ -8,13 +8,27 @@ on:
8
8
 
9
9
  permissions:
10
10
  contents: write
11
+ id-token: write # This is required for requesting the JWT
11
12
 
12
13
  ### TODO: Replace instances of './.github/workflow/' w/ `auth0/dx-sdk-actions/` and append `@latest` after the common `dx-sdk-actions` repo is made public.
13
14
  ### TODO: Also remove `get-prerelease`, `get-version`, `rubygems-publish`, `release-create`, `tag-create` and `tag-exists` actions from this repo's .github/actions folder and `ruby-release` from `./github/workflows` once the repo is public.
14
15
 
15
16
  jobs:
17
+ rl-scanner:
18
+ uses: ./.github/workflows/rl-scanner.yml
19
+ with:
20
+ ruby-version: 3.2
21
+ secrets:
22
+ RLSECURE_LICENSE: ${{ secrets.RLSECURE_LICENSE }}
23
+ RLSECURE_SITE_KEY: ${{ secrets.RLSECURE_SITE_KEY }}
24
+ SIGNAL_HANDLER_TOKEN: ${{ secrets.SIGNAL_HANDLER_TOKEN }}
25
+ PRODSEC_TOOLS_USER: ${{ secrets.PRODSEC_TOOLS_USER }}
26
+ PRODSEC_TOOLS_TOKEN: ${{ secrets.PRODSEC_TOOLS_TOKEN }}
27
+ PRODSEC_TOOLS_ARN: ${{ secrets.PRODSEC_TOOLS_ARN }}
28
+
16
29
  release:
17
30
  uses: ./.github/workflows/ruby-release.yml
31
+ needs: rl-scanner
18
32
  with:
19
33
  ruby-version: 3.2
20
34
  secrets:
@@ -0,0 +1,65 @@
1
+ name: RL-Secure Workflow
2
+
3
+ on:
4
+ workflow_call:
5
+ inputs:
6
+ ruby-version:
7
+ required: true
8
+ type: string
9
+ secrets:
10
+ RLSECURE_LICENSE:
11
+ required: true
12
+ RLSECURE_SITE_KEY:
13
+ required: true
14
+ SIGNAL_HANDLER_TOKEN:
15
+ required: true
16
+ PRODSEC_TOOLS_USER:
17
+ required: true
18
+ PRODSEC_TOOLS_TOKEN:
19
+ required: true
20
+ PRODSEC_TOOLS_ARN:
21
+ required: true
22
+
23
+ jobs:
24
+ rl-scanner:
25
+ if: github.event_name == 'workflow_dispatch' || (github.event_name == 'pull_request' && github.event.pull_request.merged && startsWith(github.event.pull_request.head.ref, 'release/'))
26
+ runs-on: ubuntu-latest
27
+ outputs:
28
+ scan-status: ${{ steps.rl-scan-conclusion.outcome }}
29
+
30
+ steps:
31
+ - name: Checkout code
32
+ uses: actions/checkout@v6
33
+
34
+ - name: Configure Ruby
35
+ uses: ./.github/actions/setup
36
+ with:
37
+ ruby-version: ${{ inputs.ruby-version }}
38
+
39
+ - name: Build RubyGems
40
+ shell: bash
41
+ run: |
42
+ gem build *.gemspec
43
+ export GEM_FILE=$(ls *.gem)
44
+ echo "gem_file=$GEM_FILE" >> $GITHUB_ENV
45
+
46
+ - name: Get Artifact Version
47
+ id: get_version
48
+ uses: ./.github/actions/get-version
49
+
50
+ - name: Run RL Scanner
51
+ id: rl-scan-conclusion
52
+ uses: ./.github/actions/rl-scanner
53
+ with:
54
+ artifact-path: "$(pwd)/${{ env.gem_file }}"
55
+ version: "${{ steps.get_version.outputs.version }}"
56
+ env:
57
+ RLSECURE_LICENSE: ${{ secrets.RLSECURE_LICENSE }}
58
+ RLSECURE_SITE_KEY: ${{ secrets.RLSECURE_SITE_KEY }}
59
+ SIGNAL_HANDLER_TOKEN: ${{ secrets.SIGNAL_HANDLER_TOKEN }}
60
+ PRODSEC_TOOLS_USER: ${{ secrets.PRODSEC_TOOLS_USER }}
61
+ PRODSEC_TOOLS_TOKEN: ${{ secrets.PRODSEC_TOOLS_TOKEN }}
62
+ PRODSEC_TOOLS_ARN: ${{ secrets.PRODSEC_TOOLS_ARN }}
63
+
64
+ - name: Output scan result
65
+ run: echo "scan-status=${{ steps.rl-scan-conclusion.outcome }}" >> $GITHUB_ENV
@@ -20,7 +20,7 @@ jobs:
20
20
 
21
21
  steps:
22
22
  # Checkout the code
23
- - uses: actions/checkout@v4
23
+ - uses: actions/checkout@v6
24
24
  with:
25
25
  fetch-depth: 0
26
26
 
@@ -2,7 +2,7 @@ name: Semgrep
2
2
 
3
3
  on:
4
4
  merge_group:
5
- pull_request_target:
5
+ pull_request:
6
6
  types:
7
7
  - opened
8
8
  - synchronize
@@ -20,16 +20,7 @@ concurrency:
20
20
  cancel-in-progress: ${{ github.ref != 'refs/heads/master' }}
21
21
 
22
22
  jobs:
23
- authorize:
24
- name: Authorize
25
- environment: ${{ github.actor != 'dependabot[bot]' && github.event_name == 'pull_request_target' && github.event.pull_request.head.repo.full_name != github.repository && 'external' || 'internal' }}
26
- runs-on: ubuntu-latest
27
- steps:
28
- - run: true
29
-
30
23
  run:
31
- needs: authorize # Require approval before running on forked pull requests
32
-
33
24
  name: Check for Vulnerabilities
34
25
  runs-on: ubuntu-latest
35
26
 
@@ -40,7 +31,7 @@ jobs:
40
31
  - if: github.actor == 'dependabot[bot]' || github.event_name == 'merge_group'
41
32
  run: exit 0 # Skip unnecessary test runs for dependabot and merge queues. Artifically flag as successful, as this is a required check for branch protection.
42
33
 
43
- - uses: actions/checkout@v4
34
+ - uses: actions/checkout@v6
44
35
  with:
45
36
  ref: ${{ github.event.pull_request.head.sha || github.ref }}
46
37
 
@@ -3,7 +3,7 @@ name: Snyk
3
3
  on:
4
4
  merge_group:
5
5
  workflow_dispatch:
6
- pull_request_target:
6
+ pull_request:
7
7
  types:
8
8
  - opened
9
9
  - synchronize
@@ -21,16 +21,7 @@ concurrency:
21
21
  cancel-in-progress: ${{ github.ref != 'refs/heads/master' }}
22
22
 
23
23
  jobs:
24
- authorize:
25
- name: Authorize
26
- environment: ${{ github.actor != 'dependabot[bot]' && github.event_name == 'pull_request_target' && github.event.pull_request.head.repo.full_name != github.repository && 'external' || 'internal' }}
27
- runs-on: ubuntu-latest
28
- steps:
29
- - run: true
30
-
31
24
  check:
32
- needs: authorize
33
-
34
25
  name: Check for Vulnerabilities
35
26
  runs-on: ubuntu-latest
36
27
 
@@ -38,7 +29,7 @@ jobs:
38
29
  - if: github.actor == 'dependabot[bot]' || github.event_name == 'merge_group'
39
30
  run: exit 0 # Skip unnecessary test runs for dependabot and merge queues. Artifically flag as successful, as this is a required check for branch protection.
40
31
 
41
- - uses: actions/checkout@v4
32
+ - uses: actions/checkout@v6
42
33
  with:
43
34
  ref: ${{ github.event.pull_request.head.sha || github.ref }}
44
35
 
@@ -29,7 +29,7 @@ jobs:
29
29
  matrix: ${{ steps.set-matrix.outputs.matrix }}
30
30
 
31
31
  steps:
32
- - uses: actions/checkout@v4
32
+ - uses: actions/checkout@v6
33
33
  with:
34
34
  ref: ${{ github.event.pull_request.head.sha || github.ref }}
35
35
 
@@ -54,7 +54,7 @@ jobs:
54
54
 
55
55
  steps:
56
56
  - name: Checkout code
57
- uses: actions/checkout@v4
57
+ uses: actions/checkout@v6
58
58
 
59
59
  - name: Configure Ruby
60
60
  uses: ./.github/actions/setup
@@ -66,4 +66,4 @@ jobs:
66
66
 
67
67
  - name: Upload coverage
68
68
  if: matrix.ruby == '3.2' || matrix.ruby == '3.3'
69
- uses: codecov/codecov-action@4fe8c5f003fae66aa5ebb77cfd3e7bfbbda0b6b0 # pin@3.1.5
69
+ uses: codecov/codecov-action@671740ac38dd9b0130fbe1cec585b89eea48d3de # pin@5.5.2
data/.snyk CHANGED
@@ -9,3 +9,9 @@ ignore:
9
9
  - dotenv-rails > railties > actionpack > rack-test:
10
10
  reason: No direct upgrade available
11
11
  expires: "2023-11-02T12:00:00.000Z"
12
+ snyk:lic:rubygems:json:Ruby:
13
+ - '*':
14
+ reason: Ruby standard library gem, Ruby license is acceptable
15
+ snyk:lic:rubygems:reline:Ruby:
16
+ - '*':
17
+ reason: Ruby standard library gem, Ruby license is acceptable
data/.version CHANGED
@@ -1 +1 @@
1
- v5.17.0
1
+ v5.18.1
data/CHANGELOG.md CHANGED
@@ -1,5 +1,27 @@
1
1
  # Change Log
2
2
 
3
+ ## [v5.18.1](https://github.com/auth0/ruby-auth0/tree/v5.18.1) (2026-03-13)
4
+ [Full Changelog](https://github.com/auth0/ruby-auth0/compare/v5.18.0...v5.18.1)
5
+
6
+ **Changed**
7
+ - chore(deps): bump zache from 0.15.0 to 0.15.2 [\#691](https://github.com/auth0/ruby-auth0/pull/691) ([dependabot[bot]](https://github.com/apps/dependabot))
8
+ - chore(deps): bump jwt from 2.9.3 to 2.10.2 [\#682](https://github.com/auth0/ruby-auth0/pull/682) ([dependabot[bot]](https://github.com/apps/dependabot))
9
+ - chore(deps): bump addressable from 2.8.7 to 2.8.8 [\#686](https://github.com/auth0/ruby-auth0/pull/686) ([dependabot[bot]](https://github.com/apps/dependabot))
10
+ - chore(deps): bump zache from 0.13.2 to 0.15.0 [\#649](https://github.com/auth0/ruby-auth0/pull/649) ([dependabot[bot]](https://github.com/apps/dependabot))
11
+
12
+ **Fixed**
13
+ - fix deleting array content when passing an array as payload [\#697](https://github.com/auth0/ruby-auth0/pull/697) ([carlastabile](https://github.com/carlastabile))
14
+
15
+ **Security**
16
+ - fix(deps): upgrade dev dependencies to resolve Snyk security vulnerab… [\#704](https://github.com/auth0/ruby-auth0/pull/704) ([arpit-jn](https://github.com/arpit-jn))
17
+
18
+ ## [v5.18.0](https://github.com/auth0/ruby-auth0/tree/v5.18.0) (2024-11-25)
19
+ [Full Changelog](https://github.com/auth0/ruby-auth0/compare/v5.17.0...v5.18.0)
20
+
21
+ **Added**
22
+ - Add Refresh Token endpoints for the Auth0 Management API #614 [\#623](https://github.com/auth0/ruby-auth0/pull/623) ([arpit-jn](https://github.com/arpit-jn))
23
+ - Add Management API calls for session API endpoints #613 [\#616](https://github.com/auth0/ruby-auth0/pull/616) ([arpit-jn](https://github.com/arpit-jn))
24
+
3
25
  ## [v5.17.0](https://github.com/auth0/ruby-auth0/tree/v5.17.0) (2024-05-24)
4
26
  [Full Changelog](https://github.com/auth0/ruby-auth0/compare/v5.16.0...v5.17.0)
5
27
 
data/Gemfile CHANGED
@@ -5,10 +5,8 @@ gemspec
5
5
 
6
6
  group :development do
7
7
  gem 'terminal-notifier-guard', require: false unless ENV['CIRCLECI']
8
- gem 'coveralls', require: false
9
8
  gem 'rubocop', require: false
10
9
  gem 'rubocop-rails', require: false
11
- gem 'irb', require: false
12
10
  end
13
11
 
14
12
  group :test do