auth0 4.6.0 → 4.7.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (33) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +13 -0
  3. data/DEPLOYMENT.md +2 -1
  4. data/lib/auth0/api/v2/jobs.rb +43 -10
  5. data/lib/auth0/api/v2/resource_servers.rb +25 -0
  6. data/lib/auth0/api/v2/tickets.rb +26 -6
  7. data/lib/auth0/mixins/httpproxy.rb +8 -1
  8. data/lib/auth0/version.rb +1 -1
  9. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/_export_users_and_get_job/should_create_an_export_users_job_successfully.yml +61 -0
  10. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/_export_users_and_get_job/should_get_the_export_users_job.yml +117 -0
  11. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/_import_users_and_get_job/should_create_an_import_users_job_successfully.yml +60 -0
  12. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/_import_users_and_get_job/should_get_the_import_users_job.yml +116 -0
  13. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/_send_verification_email_and_get_job/should_create_a_new_verification_email_job.yml +119 -0
  14. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/_send_verification_email_and_get_job/should_get_the_completed_verification_email.yml +175 -0
  15. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/_send_verification_email_and_get_job/should_reject_an_invalid_client_id.yml +109 -0
  16. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/delete_imported_user.yml +110 -0
  17. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_Jobs/search_for_connection_id.yml +59 -0
  18. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/_delete_resource_server/should_delete_the_test_server_without_an_error.yml +8 -8
  19. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/_patch_resource_server/should_update_the_resource_server_with_the_correct_attributes.yml +61 -0
  20. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/_resource_server/should_get_the_test_server.yml +9 -14
  21. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/_resource_servers/should_get_the_test_server.yml +59 -0
  22. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/_resource_servers/should_return_at_least_1_result.yml +59 -0
  23. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/_resource_servers/should_return_the_first_page_of_one_result.yml +64 -0
  24. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/create_test_server.yml +7 -12
  25. data/spec/fixtures/vcr_cassettes/Auth0_Api_V2_ResourceServers/delete_test_server.yml +8 -8
  26. data/spec/integration/lib/auth0/api/v2/api_email_spec.rb +2 -2
  27. data/spec/integration/lib/auth0/api/v2/api_jobs_spec.rb +101 -60
  28. data/spec/integration/lib/auth0/api/v2/api_resource_servers_spec.rb +38 -0
  29. data/spec/lib/auth0/api/v2/jobs_spec.rb +48 -5
  30. data/spec/lib/auth0/api/v2/resource_servers_spec.rb +23 -0
  31. data/spec/lib/auth0/api/v2/tickets_spec.rb +10 -4
  32. data/spec/spec_helper.rb +1 -1
  33. metadata +35 -10
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 44aa1a52cec04f4b9e2f8ac6f6d032cf599223f962f8f31f5ea75ac66f85a310
4
- data.tar.gz: 522d4c589930e8c4036570b8c87fbccb3362cc386dbbc13ec828cc8134bce43a
3
+ metadata.gz: 37765b52eeb99f419d48fb8166e496c566e71dbee391ab8a6d964eab4196e32b
4
+ data.tar.gz: 463bdc63eb772dbdb361c955aa51dc6e0e3c72bdfe37a2dafec92924f947bf75
5
5
  SHA512:
6
- metadata.gz: d1aec8459dc67d87089273a12d5ab1c02b40509d92442d84d29123d2472c4499a8e252b325c6bc333ac7fc22bc2910bf9ed95cf6429444ec0d7c27b5ee8fe780
7
- data.tar.gz: b44f46446c0ea25470b4ff7bfecba848983602cec4404b6221029aac21839e2127a9462ab2560e64b3869ef7f5d4fa212bf32e9b3a06c3858af8d1bc3de5fdaf
6
+ metadata.gz: ae51583299385b8f3bda6ce6b549690ee9ed4e28c95acfad8a66b0479e3aff0a06964773bcc61cfd881ed67eb226ca83a0858dc8ebdbea811c170b25e1dec4f3
7
+ data.tar.gz: '018345873306b64d9960fec8d2d7ea50f60f236bced1e546aa3a5bfe098c2291db4a0da9f129e03d9ca3e75f6f6d780b0a4b44b0270e28e748c2f756dc9d8d86'
@@ -1,5 +1,18 @@
1
1
  # Change Log
2
2
 
3
+ ## [v4.7.0](https://github.com/auth0/ruby-auth0/tree/v4.7.0) (2019-03-19)
4
+ [Full Changelog](https://github.com/auth0/ruby-auth0/compare/v4.6.0...v4.7.0)
5
+
6
+ **Closed issues**
7
+ - No method to update/patch resource servers [\#156](https://github.com/auth0/ruby-auth0/issues/156)
8
+ - No method to get all resource servers [\#154](https://github.com/auth0/ruby-auth0/issues/154)
9
+
10
+ **Added**
11
+ - Add Client ID to send_verification_email [\#162](https://github.com/auth0/ruby-auth0/pull/162) ([joshcanhelp](https://github.com/joshcanhelp))
12
+ - More password change params [\#159](https://github.com/auth0/ruby-auth0/pull/159) ([nhusher](https://github.com/nhusher))
13
+ - Add patch resource server [\#157](https://github.com/auth0/ruby-auth0/pull/157) ([philomory](https://github.com/philomory))
14
+ - Get all resource servers [\#155](https://github.com/auth0/ruby-auth0/pull/155) ([philomory](https://github.com/philomory))
15
+
3
16
  ## [v4.6.0](https://github.com/auth0/ruby-auth0/tree/v4.6.0) (2018-12-17)
4
17
  [Full Changelog](https://github.com/auth0/ruby-auth0/compare/v4.5.0...v4.6.0)
5
18
 
@@ -3,12 +3,13 @@
3
3
  bundle install
4
4
 
5
5
  # Run all tests
6
- MODE=full bundle exec rake all
6
+ bundle exec rake test
7
7
 
8
8
  # Create a release branch
9
9
  git checkout master
10
10
  git pull
11
11
  git checkout -b release-X.X.X
12
+ git push --set-upstream origin release-X.X.X
12
13
 
13
14
  # Update the version number
14
15
  bundle exec gem bump --version x.y.z
@@ -3,29 +3,29 @@ module Auth0
3
3
  module V2
4
4
  # Methods to use the jobs endpoints
5
5
  module Jobs
6
- attr_reader :jobs_path
7
-
8
6
  # Retrieves a job. Useful to check its status.
9
7
  # @see https://auth0.com/docs/api/v2#!/Jobs/get_jobs_by_job_id
10
- # @param job_id [string] The id of the job.
8
+ # @param job_id [string] The ID of the job.
11
9
  #
12
10
  # @return [json] Returns the job status and properties.
13
11
  def get_job(job_id)
14
12
  raise Auth0::InvalidParameter, 'Must specify a job id' if job_id.to_s.empty?
13
+
15
14
  path = "#{jobs_path}/#{job_id}"
16
15
  get(path)
17
16
  end
18
17
 
19
18
  # Imports users to a connection from a file using a long running job.
20
- # Important: The documentation for the file format is at https://docs.auth0.com/bulk-import.
19
+ # Documentation for the file format: https://docs.auth0.com/bulk-import
21
20
  # @see https://auth0.com/docs/api/v2#!/Jobs/post_users_imports
22
21
  # @param users_file [file] A file containing the users to import.
23
- # @param connection_id [string] The connection id of the connection to which users will be inserted.
22
+ # @param connection_id [string] Database connection ID to import to.
24
23
  #
25
24
  # @return [json] Returns the job status and properties.
26
25
  def import_users(users_file, connection_id)
27
26
  raise Auth0::InvalidParameter, 'Must specify a valid file' if users_file.to_s.empty?
28
27
  raise Auth0::InvalidParameter, 'Must specify a connection_id' if connection_id.to_s.empty?
28
+
29
29
  request_params = {
30
30
  users: users_file,
31
31
  connection_id: connection_id
@@ -34,16 +34,39 @@ module Auth0
34
34
  post_file(path, request_params)
35
35
  end
36
36
 
37
+ # Export all users to a file using a long running job.
38
+ # @see https://auth0.com/docs/api/v2#!/Jobs/post_users_exports
39
+ # @param options [hash] The options used to configure the output file.
40
+ # :connection_id [string] Database connection ID to export from.
41
+ # :format [string] The format of the file. Valid values are: "json" and "csv".
42
+ # :limit [integer] Limit the number of users to export.
43
+ # :fields [array] A list of fields to be included in the CSV.
44
+ # If omitted, a set of predefined fields will be exported.
45
+ #
46
+ # @return [json] Returns the job status and properties.
47
+ def export_users(options = {})
48
+ request_params = {
49
+ connection_id: options.fetch(:connection_id, nil),
50
+ format: options.fetch(:format, nil),
51
+ limit: options.fetch(:limit, nil),
52
+ fields: fields_for_export(options.fetch(:fields, nil))
53
+ }
54
+ path = "#{jobs_path}/users-exports"
55
+ post(path, request_params)
56
+ end
57
+
37
58
  # Send an email to the specified user that asks them to click a link to verify their email address.
38
- # @see https://auth0.com/docs/api/v2#!/Jobs/post_verification_email
59
+ # @see https://auth0.com/docs/api/management/v2#!/Jobs/post_verification_email
39
60
  # @param user_id [string] The user_id of the user to whom the email will be sent.
61
+ # @param client_id [string] Client ID to send an Application-specific email.
40
62
  #
41
63
  # @return [json] Returns the job status and properties.
42
- def send_verification_email(user_id)
64
+ def send_verification_email(user_id, client_id = nil)
43
65
  raise Auth0::InvalidParameter, 'Must specify a user id' if user_id.to_s.empty?
44
- request_params = {
45
- user_id: user_id
46
- }
66
+
67
+ request_params = { user_id: user_id }
68
+ request_params[:client_id] = client_id unless client_id.nil?
69
+
47
70
  path = "#{jobs_path}/verification-email"
48
71
  post(path, request_params)
49
72
  end
@@ -54,6 +77,16 @@ module Auth0
54
77
  def jobs_path
55
78
  @jobs_path ||= '/api/v2/jobs'
56
79
  end
80
+
81
+ # Map array of field names for export to array of objects
82
+ # @param fields [array] Field names to be included in the export
83
+
84
+ # @return [array] Returns the fields mapped as array of objects for the export_users endpoint
85
+ def fields_for_export(fields)
86
+ return nil if fields.to_s.empty?
87
+
88
+ fields.map { |field| { name: field } }
89
+ end
57
90
  end
58
91
  end
59
92
  end
@@ -5,6 +5,20 @@ module Auth0
5
5
  module ResourceServers
6
6
  attr_reader :resource_servers_path
7
7
 
8
+ # Retrieves a list of all resource servers.
9
+ # @see https://auth0.com/docs/api/management/v2#!/Resource_servers/get_resource_servers
10
+ # @param page [int] Page number to get, 0-based.
11
+ # @param per_page [int] Results per page if also passing a page number.
12
+ # @return [json] Returns the resource servers.
13
+ def resource_servers(page: nil, per_page: nil)
14
+ request_params = {
15
+ page: !page.nil? ? page.to_i : nil,
16
+ per_page: !page.nil? && !per_page.nil? ? per_page.to_i : nil
17
+ }
18
+ get(resource_servers_path, request_params)
19
+ end
20
+ alias get_resource_servers resource_servers
21
+
8
22
  # Retrieves a resource server by its ID.
9
23
  # @see https://auth0.com/docs/api/management/v2#!/Resource_Servers/get_resource_servers_by_id
10
24
  # @param resource_server_id [string] The id of the resource server to retrieve.
@@ -48,6 +62,17 @@ module Auth0
48
62
  delete(path)
49
63
  end
50
64
 
65
+ # Updates a resource server.
66
+ # @see https://auth0.com/docs/api/management/v2#!/Resource_Servers/patch_resource_servers_by_id
67
+ # @param id [string] The id or audience of the resource server to update.
68
+ # @param body [hash] The Hash options used to define the resource servers's properties.
69
+ def patch_resource_server(id, body)
70
+ raise Auth0::InvalidParameter, 'Must specify a resource server id or audience' if id.to_s.empty?
71
+ raise Auth0::InvalidParameter, 'Must specify a valid body' if body.to_s.empty?
72
+ path = "#{resource_servers_path}/#{id}"
73
+ patch(path, body)
74
+ end
75
+
51
76
  private
52
77
 
53
78
  # Resource Servers API path
@@ -29,22 +29,42 @@ module Auth0
29
29
 
30
30
  # Create a password change ticket
31
31
  # @see https://auth0.com/docs/api/v2#!/Tickets/post_password_change
32
- # @param new_password [string] The password to be set for the user once the ticket is used.
33
- # @param user_id [string] The user_id of for which the ticket is to be created.
34
32
  # @param result_url [string] The user will be redirected to this endpoint once the ticket is used.
33
+ # @param user_id [string] The user_id of for which the ticket is to be created.
35
34
  # @param connection_id [string] The connection that provides the identity for which the password is to be
36
35
  # changed. If sending this parameter, the email is also required and the user_id is invalid.
37
36
  # @param email [string] The user's email.
37
+ # @param ttl_sec [integer] The ticket's lifetime in seconds starting from the moment of creation. After
38
+ # expiration, the ticket cannot be used to change the user's password. If not specified or if you send 0,
39
+ # the Auth0 default lifetime of 5 days will be applied.
40
+ # @param mark_email_as_verified [boolean] true if email_verified attribute must be set to true once password is
41
+ # changed, false if email_verified attribute should not be updated
42
+ # @param includeEmailInRedirect [boolean] Whether or not we include the email as part of the returnUrl
43
+ # in the reset_email
44
+ # @param new_password [string] The password to be set for the user once the ticket is used.
38
45
  #
39
46
  # @return [json] Returns the created ticket url.
40
- def post_password_change(new_password: nil, user_id: nil, result_url: nil, connection_id: nil, email: nil)
47
+ def post_password_change(
48
+ result_url: nil,
49
+ user_id: nil,
50
+ connection_id: nil,
51
+ email: nil,
52
+ ttl_sec: nil,
53
+ mark_email_as_verified: nil,
54
+ includeEmailInRedirect: nil,
55
+ new_password: nil)
56
+
57
+ booleans = [true, false]
41
58
  path = "#{tickets_path}/password-change"
42
59
  request_params = {
43
- user_id: user_id,
44
60
  result_url: result_url,
45
- new_password: new_password,
61
+ user_id: user_id,
46
62
  connection_id: connection_id,
47
- email: email
63
+ email: email,
64
+ ttl_sec: ttl_sec.is_a?(Integer) ? ttl_sec : nil,
65
+ mark_email_as_verified: booleans.include?(mark_email_as_verified) ? mark_email_as_verified : nil,
66
+ includeEmailInRedirect: booleans.include?(includeEmailInRedirect) ? includeEmailInRedirect : nil,
67
+ new_password: new_password
48
68
  }
49
69
  post(path, request_params)
50
70
  end
@@ -21,6 +21,7 @@ module Auth0
21
21
  elsif method == :delete
22
22
  call(:delete, url(safe_path), timeout, add_headers({params: body}))
23
23
  elsif method == :post_file
24
+ body.merge!(multipart: true)
24
25
  call(:post, url(safe_path), timeout, headers, body)
25
26
  else
26
27
  call(method, url(safe_path), timeout, headers, body.to_json)
@@ -54,7 +55,13 @@ module Auth0
54
55
  end
55
56
 
56
57
  def call(method, url, timeout, headers, body = nil)
57
- RestClient::Request.execute(method: method, url: url, timeout: timeout, headers: headers, payload: body)
58
+ RestClient::Request.execute(
59
+ method: method,
60
+ url: url,
61
+ timeout: timeout,
62
+ headers: headers,
63
+ payload: body
64
+ )
58
65
  rescue RestClient::Exception => e
59
66
  case e
60
67
  when RestClient::RequestTimeout
@@ -1,4 +1,4 @@
1
1
  # current version of gem
2
2
  module Auth0
3
- VERSION = '4.6.0'.freeze
3
+ VERSION = '4.7.0'.freeze
4
4
  end
@@ -0,0 +1,61 @@
1
+ ---
2
+ http_interactions:
3
+ - request:
4
+ method: post
5
+ uri: https://auth0-sdk-tests.auth0.com/api/v2/jobs/users-exports
6
+ body:
7
+ encoding: UTF-8
8
+ string: '{"connection_id":"con_Xx4Kruoab04wvlYX"}'
9
+ headers:
10
+ Accept:
11
+ - "*/*"
12
+ Accept-Encoding:
13
+ - gzip, deflate
14
+ User-Agent:
15
+ - rest-client/2.0.2 (darwin17.7.0 x86_64) ruby/2.5.1p57
16
+ Content-Type:
17
+ - application/json
18
+ Auth0-Client:
19
+ - eyJuYW1lIjoicnVieS1hdXRoMCIsInZlcnNpb24iOiI0LjYuMCIsImVudiI6eyJydWJ5IjoiMi41LjEifX0=
20
+ Authorization:
21
+ - Bearer API_TOKEN
22
+ Content-Length:
23
+ - '40'
24
+ Host:
25
+ - auth0-sdk-tests.auth0.com
26
+ response:
27
+ status:
28
+ code: 200
29
+ message: OK
30
+ headers:
31
+ Date:
32
+ - Wed, 27 Feb 2019 16:13:15 GMT
33
+ Content-Type:
34
+ - application/json; charset=utf-8
35
+ Transfer-Encoding:
36
+ - chunked
37
+ Connection:
38
+ - keep-alive
39
+ X-Ratelimit-Limit:
40
+ - '10'
41
+ X-Ratelimit-Remaining:
42
+ - '8'
43
+ X-Ratelimit-Reset:
44
+ - '1551283997'
45
+ Vary:
46
+ - origin,accept-encoding
47
+ Cache-Control:
48
+ - private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
49
+ Content-Encoding:
50
+ - gzip
51
+ Strict-Transport-Security:
52
+ - max-age=15724800
53
+ X-Robots-Tag:
54
+ - noindex, nofollow, nosnippet, noarchive
55
+ body:
56
+ encoding: ASCII-8BIT
57
+ string: !binary |-
58
+ H4sIAAAAAAAAA1WOPQ+CMBCG/0tnMRQRlM3FxcVETZClKe2pJdKS9vgwxv/uyeZ4z/vc3ftm+OqAFawP4IOAqXMe2YIFlNgH4h1YbeydkHLWgkLjrDCaEppFOaUH3ztZx+k4PK8laTfnW4m/PAx/W4Qu9MTKFqKjDGF0Xke7Hh9g0Sg5K+R7kAhazCeSmG+jOImS/Myzgq8Kvl4m+bYib67QuFqcNi5k1bjXcaNM5hX7fAHRdXvC1AAAAA==
59
+ http_version:
60
+ recorded_at: Wed, 27 Feb 2019 16:13:15 GMT
61
+ recorded_with: VCR 4.0.0
@@ -0,0 +1,117 @@
1
+ ---
2
+ http_interactions:
3
+ - request:
4
+ method: post
5
+ uri: https://auth0-sdk-tests.auth0.com/api/v2/jobs/users-exports
6
+ body:
7
+ encoding: UTF-8
8
+ string: '{"connection_id":"con_Xx4Kruoab04wvlYX"}'
9
+ headers:
10
+ Accept:
11
+ - "*/*"
12
+ Accept-Encoding:
13
+ - gzip, deflate
14
+ User-Agent:
15
+ - rest-client/2.0.2 (darwin17.7.0 x86_64) ruby/2.5.1p57
16
+ Content-Type:
17
+ - application/json
18
+ Auth0-Client:
19
+ - eyJuYW1lIjoicnVieS1hdXRoMCIsInZlcnNpb24iOiI0LjYuMCIsImVudiI6eyJydWJ5IjoiMi41LjEifX0=
20
+ Authorization:
21
+ - Bearer API_TOKEN
22
+ Content-Length:
23
+ - '40'
24
+ Host:
25
+ - auth0-sdk-tests.auth0.com
26
+ response:
27
+ status:
28
+ code: 200
29
+ message: OK
30
+ headers:
31
+ Date:
32
+ - Wed, 27 Feb 2019 16:13:15 GMT
33
+ Content-Type:
34
+ - application/json; charset=utf-8
35
+ Transfer-Encoding:
36
+ - chunked
37
+ Connection:
38
+ - keep-alive
39
+ X-Ratelimit-Limit:
40
+ - '10'
41
+ X-Ratelimit-Remaining:
42
+ - '7'
43
+ X-Ratelimit-Reset:
44
+ - '1551283998'
45
+ Vary:
46
+ - origin,accept-encoding
47
+ Cache-Control:
48
+ - private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
49
+ Content-Encoding:
50
+ - gzip
51
+ Strict-Transport-Security:
52
+ - max-age=15724800
53
+ X-Robots-Tag:
54
+ - noindex, nofollow, nosnippet, noarchive
55
+ body:
56
+ encoding: ASCII-8BIT
57
+ string: !binary |-
58
+ H4sIAAAAAAAAA1WOyw6CMBBF/6VrMbyN7NgZ2ZggCbhpCoxalJa0w8MY/92Rncs598zMfTN8DcASNlowlsMyaINswywKHC3xAVQr1Y1Qo5WCBqVWXLaU0MzLJczMqEXthvP0rErSrtr0An+5nf62CBX0RIkenJOwdtamddIR76BQNmJVyDcgEFq+nvBdb++4vuPvzl6ceEHiRdsoiC7krRU6XfOuyB9xejhWjcmmacnZ5wu9hN4Y1AAAAA==
59
+ http_version:
60
+ recorded_at: Wed, 27 Feb 2019 16:13:15 GMT
61
+ - request:
62
+ method: get
63
+ uri: https://auth0-sdk-tests.auth0.com/api/v2/jobs/job_jUSk6AHJYcrKvvxS
64
+ body:
65
+ encoding: US-ASCII
66
+ string: ''
67
+ headers:
68
+ Accept:
69
+ - "*/*"
70
+ Accept-Encoding:
71
+ - gzip, deflate
72
+ User-Agent:
73
+ - rest-client/2.0.2 (darwin17.7.0 x86_64) ruby/2.5.1p57
74
+ Content-Type:
75
+ - application/json
76
+ Auth0-Client:
77
+ - eyJuYW1lIjoicnVieS1hdXRoMCIsInZlcnNpb24iOiI0LjYuMCIsImVudiI6eyJydWJ5IjoiMi41LjEifX0=
78
+ Authorization:
79
+ - Bearer API_TOKEN
80
+ Host:
81
+ - auth0-sdk-tests.auth0.com
82
+ response:
83
+ status:
84
+ code: 200
85
+ message: OK
86
+ headers:
87
+ Date:
88
+ - Wed, 27 Feb 2019 16:13:15 GMT
89
+ Content-Type:
90
+ - application/json; charset=utf-8
91
+ Transfer-Encoding:
92
+ - chunked
93
+ Connection:
94
+ - keep-alive
95
+ X-Ratelimit-Limit:
96
+ - '10'
97
+ X-Ratelimit-Remaining:
98
+ - '7'
99
+ X-Ratelimit-Reset:
100
+ - '1551283998'
101
+ Vary:
102
+ - origin,accept-encoding
103
+ Cache-Control:
104
+ - private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
105
+ Content-Encoding:
106
+ - gzip
107
+ Strict-Transport-Security:
108
+ - max-age=15724800
109
+ X-Robots-Tag:
110
+ - noindex, nofollow, nosnippet, noarchive
111
+ body:
112
+ encoding: ASCII-8BIT
113
+ string: !binary |-
114
+ H4sIAAAAAAAAA1WOyw6CMBBF/6VrMbyN7NgZ2ZggCbhpCoxalJa0w8MY/92Rncs598zMfTN8DcASNlowlsMyaINswywKHC3xAVQr1Y1Qo5WCBqVWXLaU0MzLJczMqEXthvP0rErSrtr0An+5nf62CBX0RIkenJOwdtamddIR76BQNmJVyDcgEFq+nvBdb++4vuPvzl6ceEHiRdsoiC7krRU6XfOuyB9xejhWjcmmacnZ5wu9hN4Y1AAAAA==
115
+ http_version:
116
+ recorded_at: Wed, 27 Feb 2019 16:13:15 GMT
117
+ recorded_with: VCR 4.0.0
@@ -0,0 +1,60 @@
1
+ ---
2
+ http_interactions:
3
+ - request:
4
+ method: post
5
+ uri: https://auth0-sdk-tests.auth0.com/api/v2/jobs/users-imports
6
+ body:
7
+ encoding: ASCII-8BIT
8
+ string: "------RubyFormBoundary7fUORMCp03LhWn7G\r\nContent-Disposition: form-data;
9
+ name=\"users\"; filename=\"api-jobs-spec-import-users.json\"\r\nContent-Type:
10
+ application/json\r\n\r\n[{\"email\":\"rubytestzulema_haag@example.com\",\"email_verified\":false,\"app_metadata\":{\"roles\":[\"admin\"]},\"user_metadata\":{\"theme\":\"light\"}}]\r\n------RubyFormBoundary7fUORMCp03LhWn7G\r\nContent-Disposition:
11
+ form-data; name=\"connection_id\"\r\n\r\ncon_Xx4Kruoab04wvlYX\r\n------RubyFormBoundary7fUORMCp03LhWn7G--\r\n"
12
+ headers:
13
+ Accept:
14
+ - "*/*"
15
+ Accept-Encoding:
16
+ - gzip, deflate
17
+ User-Agent:
18
+ - rest-client/2.0.2 (darwin17.7.0 x86_64) ruby/2.5.1p57
19
+ Content-Type:
20
+ - multipart/form-data; boundary=----RubyFormBoundary7fUORMCp03LhWn7G
21
+ Auth0-Client:
22
+ - eyJuYW1lIjoicnVieS1hdXRoMCIsInZlcnNpb24iOiI0LjYuMCIsImVudiI6eyJydWJ5IjoiMi41LjEifX0=
23
+ Authorization:
24
+ - Bearer API_TOKEN
25
+ Content-Length:
26
+ - '463'
27
+ Host:
28
+ - auth0-sdk-tests.auth0.com
29
+ response:
30
+ status:
31
+ code: 202
32
+ message: Accepted
33
+ headers:
34
+ Date:
35
+ - Wed, 27 Feb 2019 16:14:17 GMT
36
+ Content-Type:
37
+ - application/json; charset=utf-8
38
+ Transfer-Encoding:
39
+ - chunked
40
+ Connection:
41
+ - keep-alive
42
+ X-Ratelimit-Limit:
43
+ - '10'
44
+ X-Ratelimit-Remaining:
45
+ - '9'
46
+ X-Ratelimit-Reset:
47
+ - '1551284058'
48
+ Vary:
49
+ - origin,accept-encoding
50
+ Cache-Control:
51
+ - private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
52
+ Content-Encoding:
53
+ - gzip
54
+ body:
55
+ encoding: ASCII-8BIT
56
+ string: !binary |-
57
+ H4sIAAAAAAAAA1XNMQvCMBAF4P+S2UgSQ4vdCk6K4FChdQlpGzRik5BcrCL+d49ujvfex7sPgXcwpCI5mZiUnYKPQFYkgYacMA/GjdZdMRq8c2YA652yIzZ4q/YlDzF73TM5Px9d+8fQnHHV6cnQk05p9nGkdYabcWAHvRD00Wgwo9KAXjC+pUxQUTa8qLiseLmWBbugW37efa+aQoqOzfu6ro/hutmR7w/HprJfxQAAAA==
58
+ http_version:
59
+ recorded_at: Wed, 27 Feb 2019 16:14:17 GMT
60
+ recorded_with: VCR 4.0.0