authlete 1.22.0 → 1.25.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 60a371aeaee64d57c31d45b32f7e6a46c1ff5217a502c03a2d90b04d889f5d0e
4
- data.tar.gz: ce7f5c8ecffa1dca079b4a2263090532ba6dfe0a5f09a65fc9af0d1fdd632e14
3
+ metadata.gz: 79ece9b673c6fac13369ab9c416eb10bb32042187c6a715255aa4b57431a8e04
4
+ data.tar.gz: '079c970bf19094115267b90ec8bcb3bcba325344b1f5fbe1cd57dea9961f7ca9'
5
5
  SHA512:
6
- metadata.gz: 7ee5c9831a9a34344e3166855c69cbcc5352966fe2ae313ca57485d00fb00096582fbdac964f4e84b197085be27b77334aee06bd451c7cdf32dd066c411a4959
7
- data.tar.gz: '080bcb418e171ffd0be38572c76cf982b1d5f8c17a7bc356f38e64838c4126953a22552ba616f65de3b319d84a29dc6a418ff46407d0e320c9907fe122f4d10f'
6
+ metadata.gz: 1d5bf5c451530b58976fa7cacccd92bb3b5783789ad3dea8d20acc5b5efada2138a3bb7874eaffab2b82b22de9e859d6b10f25ae95b608ae0b5b7c71d0f528c0
7
+ data.tar.gz: d79415db8c6cdc3e2b595f7e7848af757f260658eef5329533bef8c6019921070ee3ab589534222fc6284ebb747e363d9b32f7e44fd77073ce3713761b0a0acd
@@ -312,6 +312,14 @@ module Authlete
312
312
  attr_accessor :singleAccessTokenPerSubject
313
313
  alias_method :single_access_token_per_subject, :singleAccessTokenPerSubject
314
314
  alias_method :single_access_token_per_subject=, :singleAccessTokenPerSubject=
315
+
316
+ attr_accessor :pkceRequired
317
+ alias_method :pkce_required, :pkceRequired
318
+ alias_method :pkce_required=, :pkceRequired=
319
+
320
+ attr_accessor :pkceS256Required
321
+ alias_method :pkce_s256_required, :pkceS256Required
322
+ alias_method :pkce_s256_required=, :pkceS256Required=
315
323
  private
316
324
 
317
325
  def defaults
@@ -392,7 +400,9 @@ module Authlete
392
400
  requestObjectEncryptionAlgMatchRequired: false,
393
401
  requestObjectEncryptionEncMatchRequired: false,
394
402
  digestAlgorithm: nil,
395
- singleAccessTokenPerSubject: false
403
+ singleAccessTokenPerSubject: false,
404
+ pkceRequired: false,
405
+ pkceS256Required: false,
396
406
  }
397
407
  end
398
408
 
@@ -474,6 +484,8 @@ module Authlete
474
484
  @requestObjectEncryptionEncMatchRequired = hash[:requestObjectEncryptionEncMatchRequired]
475
485
  @digestAlgorithm = hash[:digestAlgorithm]
476
486
  @singleAccessTokenPerSubject = hash[:singleAccessTokenPerSubject]
487
+ @pkceRequired = hash[:pkceRequired]
488
+ @pkceS256Required = hash[:pkceS256Required]
477
489
  end
478
490
 
479
491
  def to_hash_value(key, var)
@@ -583,6 +583,26 @@ module Authlete
583
583
  alias_method :token_exchange_unsigned_jwt_rejected, :tokenExchangeUnsignedJwtRejected
584
584
  alias_method :token_exchange_unsigned_jwt_rejected=, :tokenExchangeUnsignedJwtRejected=
585
585
 
586
+ attr_accessor :jwtGrantByIdentifiableClientsOnly
587
+ alias_method :jwt_grant_by_identifiable_clients_only, :jwtGrantByIdentifiableClientsOnly
588
+ alias_method :jwt_grant_by_identifiable_clients_only=, :jwtGrantByIdentifiableClientsOnly=
589
+
590
+ attr_accessor :jwtGrantEncryptedJwtRejected
591
+ alias_method :jwt_grant_encrypted_jwt_rejected, :jwtGrantEncryptedJwtRejected
592
+ alias_method :jwt_grant_encrypted_jwt_rejected=, :jwtGrantEncryptedJwtRejected=
593
+
594
+ attr_accessor :jwtGrantUnsignedJwtRejected
595
+ alias_method :jwt_grant_unsigned_jwt_rejected, :jwtGrantUnsignedJwtRejected
596
+ alias_method :jwt_grant_unsigned_jwt_rejected=, :jwtGrantUnsignedJwtRejected=
597
+
598
+ attr_accessor :federationSignatureKeyId
599
+ alias_method :federation_signature_key_id, :federationSignatureKeyId
600
+ alias_method :federation_signature_key_id=, :federationSignatureKeyId=
601
+
602
+ attr_accessor :federationConfigurationDuration
603
+ alias_method :federation_configuration_duration, :federationConfigurationDuration
604
+ alias_method :federation_configuration_duration=, :federationConfigurationDuration=
605
+
586
606
  private
587
607
 
588
608
  def defaults
@@ -731,6 +751,11 @@ module Authlete
731
751
  tokenExchangeByPermittedClientsOnly: false,
732
752
  tokenExchangeEncryptedJwtRejected: false,
733
753
  tokenExchangeUnsignedJwtRejected: false,
754
+ jwtGrantByIdentifiableClientsOnly: false,
755
+ jwtGrantEncryptedJwtRejected: false,
756
+ jwtGrantUnsignedJwtRejected: false,
757
+ federationSignatureKeyId: nil,
758
+ federationConfigurationDuration: 0,
734
759
  }
735
760
  end
736
761
 
@@ -879,6 +904,11 @@ module Authlete
879
904
  @tokenExchangeByPermittedClientsOnly = hash[:tokenExchangeByPermittedClientsOnly]
880
905
  @tokenExchangeEncryptedJwtRejected = hash[:tokenExchangeEncryptedJwtRejected]
881
906
  @tokenExchangeUnsignedJwtRejected = hash[:tokenExchangeUnsignedJwtRejected]
907
+ @jwtGrantByIdentifiableClientsOnly = hash[:jwtGrantByIdentifiableClientsOnly]
908
+ @jwtGrantEncryptedJwtRejected = hash[:jwtGrantEncryptedJwtRejected]
909
+ @jwtGrantUnsignedJwtRejected = hash[:jwtGrantUnsignedJwtRejected]
910
+ @federationSignatureKeyId = hash[:federationSignatureKeyId]
911
+ @federationConfigurationDuration = hash[:federationConfigurationDuration]
882
912
 
883
913
  end
884
914
 
@@ -16,5 +16,5 @@
16
16
 
17
17
 
18
18
  module Authlete
19
- VERSION = "1.22.0"
19
+ VERSION = "1.25.0"
20
20
  end
@@ -123,6 +123,8 @@ class ClientTest < Minitest::Test
123
123
  REQUEST_OBJECT_ENCRYPTION_ENC_MATCH_REQUIRED = false
124
124
  DIGEST_ALGORITHM = '<digest-algorithm>'
125
125
  SINGLE_ACCESS_TOKEN_PER_SUBJECT = false
126
+ PKCE_REQUIRED = false
127
+ PKCE_S256_REQUIRED = false
126
128
 
127
129
  def generate_json
128
130
  return <<~JSON
@@ -209,11 +211,13 @@ class ClientTest < Minitest::Test
209
211
  "requestObjectEncryptionAlgMatchRequired": false,
210
212
  "requestObjectEncryptionEncMatchRequired": false,
211
213
  "digestAlgorithm": "<digest-algorithm>",
212
- "singleAccessTokenPerSubject": false
214
+ "singleAccessTokenPerSubject": false,
215
+ "pkceRequired": false,
216
+ "pkceS256Required": false
213
217
  }
214
- JSON
215
- end
216
-
218
+ JSON
219
+ end
220
+
217
221
 
218
222
  def generate_hash
219
223
  {
@@ -299,7 +303,9 @@ class ClientTest < Minitest::Test
299
303
  requestObjectEncryptionAlgMatchRequired: false,
300
304
  requestObjectEncryptionEncMatchRequired: false,
301
305
  digestAlgorithm: '<digest-algorithm>',
302
- singleAccessTokenPerSubject: false
306
+ singleAccessTokenPerSubject: false,
307
+ pkceRequired: false,
308
+ pkceS256Required: false,
303
309
  }
304
310
  end
305
311
 
@@ -382,6 +388,8 @@ class ClientTest < Minitest::Test
382
388
  obj.requestObjectEncryptionEncMatchRequired = REQUEST_OBJECT_ENCRYPTION_ENC_MATCH_REQUIRED
383
389
  obj.digestAlgorithm = DIGEST_ALGORITHM
384
390
  obj.singleAccessTokenPerSubject = SINGLE_ACCESS_TOKEN_PER_SUBJECT
391
+ obj.pkceRequired = PKCE_REQUIRED
392
+ obj.pkceS256Required = PKCE_S256_REQUIRED
385
393
  end
386
394
 
387
395
 
@@ -472,6 +480,8 @@ class ClientTest < Minitest::Test
472
480
  assert_equal REQUEST_OBJECT_ENCRYPTION_ENC_MATCH_REQUIRED, obj.requestObjectEncryptionEncMatchRequired
473
481
  assert_equal DIGEST_ALGORITHM, obj.digestAlgorithm
474
482
  assert_equal SINGLE_ACCESS_TOKEN_PER_SUBJECT, obj.singleAccessTokenPerSubject
483
+ assert_equal PKCE_REQUIRED, obj.pkceRequired
484
+ assert_equal PKCE_S256_REQUIRED, obj.pkceS256Required
475
485
  end
476
486
 
477
487
 
@@ -188,6 +188,11 @@ class ServiceTest < Minitest::Test
188
188
  TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY = false
189
189
  TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED = false
190
190
  TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED = false
191
+ JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY = false
192
+ JWT_GRANT_ENCRYPTED_JWT_REJECTED = false
193
+ JWT_GRANT_UNSIGNED_JWT_REJECTED = false
194
+ FEDERATION_SIGNATURE_KEY_ID = '<federation-signature-key-id>'
195
+ FEDERATION_CONFIGURATION_DURATION = 100
191
196
 
192
197
  def generate_json
193
198
  return <<~JSON
@@ -335,7 +340,12 @@ class ServiceTest < Minitest::Test
335
340
  "tokenExchangeByConfidentialClientsOnly": false,
336
341
  "tokenExchangeByPermittedClientsOnly": false,
337
342
  "tokenExchangeEncryptedJwtRejected": false,
338
- "tokenExchangeUnsignedJwtRejected": false
343
+ "tokenExchangeUnsignedJwtRejected": false,
344
+ "jwtGrantByIdentifiableClientsOnly": false,
345
+ "jwtGrantEncryptedJwtRejected": false,
346
+ "jwtGrantUnsignedJwtRejected": false,
347
+ "federationSignatureKeyId": "<federation-signature-key-id>",
348
+ "federationConfigurationDuration": 100
339
349
  }
340
350
  JSON
341
351
 
@@ -488,6 +498,11 @@ class ServiceTest < Minitest::Test
488
498
  tokenExchangeByPermittedClientsOnly: false,
489
499
  tokenExchangeEncryptedJwtRejected: false,
490
500
  tokenExchangeUnsignedJwtRejected: false,
501
+ jwtGrantByIdentifiableClientsOnly: false,
502
+ jwtGrantEncryptedJwtRejected: false,
503
+ jwtGrantUnsignedJwtRejected: false,
504
+ federationSignatureKeyId: '<federation-signature-key-id>',
505
+ federationConfigurationDuration: 100
491
506
  }
492
507
  end
493
508
 
@@ -635,9 +650,13 @@ class ServiceTest < Minitest::Test
635
650
  obj.token_exchange_by_identifiable_clients_only = TOKEN_EXCHANGE_BY_IDENTIFIABLE_CLIENTS_ONLY
636
651
  obj.token_exchange_by_confidential_clients_only = TOKEN_EXCHANGE_BY_CONFIDENTIAL_CLIENTS_ONLY
637
652
  obj.token_exchange_by_permitted_clients_only = TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY
653
+ obj.jwt_grant_by_identifiable_clients_only = JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY
654
+ obj.jwt_grant_encrypted_jwt_rejected = JWT_GRANT_ENCRYPTED_JWT_REJECTED
655
+ obj.jwt_grant_unsigned_jwt_rejected = JWT_GRANT_UNSIGNED_JWT_REJECTED
656
+ obj.federation_signature_key_id = FEDERATION_SIGNATURE_KEY_ID
657
+ obj.federation_configuration_duration = FEDERATION_CONFIGURATION_DURATION
638
658
  end
639
659
 
640
-
641
660
  def match(obj)
642
661
  assert_equal NUMBER, obj.number
643
662
  assert_equal SERVICE_OWNER_NUMBER, obj.serviceOwnerNumber
@@ -798,6 +817,11 @@ class ServiceTest < Minitest::Test
798
817
  assert_equal TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY, obj.token_exchange_by_permitted_clients_only
799
818
  assert_equal TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED, obj.token_exchange_encrypted_jwt_rejected
800
819
  assert_equal TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED, obj.token_exchange_unsigned_jwt_rejected
820
+ assert_equal JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY, obj.jwtGrantByIdentifiableClientsOnly
821
+ assert_equal JWT_GRANT_ENCRYPTED_JWT_REJECTED, obj.jwtGrantEncryptedJwtRejected
822
+ assert_equal JWT_GRANT_UNSIGNED_JWT_REJECTED, obj.jwtGrantUnsignedJwtRejected
823
+ assert_equal FEDERATION_SIGNATURE_KEY_ID, obj.federationSignatureKeyId
824
+ assert_equal FEDERATION_CONFIGURATION_DURATION, obj.federationConfigurationDuration
801
825
  end
802
826
 
803
827
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: authlete
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.22.0
4
+ version: 1.25.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Takahiko Kawasaki
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2022-07-27 00:00:00.000000000 Z
12
+ date: 2022-08-23 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: rest-client