authlete 1.23.0 → 1.26.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/authlete/model/client.rb +8 -1
- data/lib/authlete/model/service.rb +36 -0
- data/lib/authlete/version.rb +1 -1
- data/test/authlete/model/test_client.rb +6 -2
- data/test/authlete/model/test_service.rb +31 -2
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4a3bead217fba752e6d6971b910416e9191712b694af9729bc080d48eb2150b1
|
4
|
+
data.tar.gz: 3106a4db8aa7b20df6307fbc49b2d27693594e6274512ea8ddf19b7436d57627
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 84df551852f4561a775ac21045251feebba5e3c319ef1a6a503a9618679f6e332f3ad8fa0c1c5fd4023a937668dfa28dbbc7e65bf66078c8d92434d958c030b6
|
7
|
+
data.tar.gz: '0049b9381bb5af3d8e1909eb54b168f66ecccd1c24980f381581d74e4c357cd88e28bcc4c9d1b354a2d81397f5ea4ac14cb53918b137a294bae13024a8971a54'
|
@@ -319,7 +319,12 @@ module Authlete
|
|
319
319
|
|
320
320
|
attr_accessor :pkceS256Required
|
321
321
|
alias_method :pkce_s256_required, :pkceS256Required
|
322
|
-
alias_method :pkce_s256_required=, :pkceS256Required=
|
322
|
+
alias_method :pkce_s256_required=, :pkceS256Required=
|
323
|
+
|
324
|
+
attr_accessor :dynamicallyRegistered
|
325
|
+
alias_method :dynamically_registered, :dynamicallyRegistered
|
326
|
+
alias_method :dynamically_registered=, :dynamicallyRegistered=
|
327
|
+
|
323
328
|
private
|
324
329
|
|
325
330
|
def defaults
|
@@ -403,6 +408,7 @@ module Authlete
|
|
403
408
|
singleAccessTokenPerSubject: false,
|
404
409
|
pkceRequired: false,
|
405
410
|
pkceS256Required: false,
|
411
|
+
dynamicallyRegistered: false,
|
406
412
|
}
|
407
413
|
end
|
408
414
|
|
@@ -486,6 +492,7 @@ module Authlete
|
|
486
492
|
@singleAccessTokenPerSubject = hash[:singleAccessTokenPerSubject]
|
487
493
|
@pkceRequired = hash[:pkceRequired]
|
488
494
|
@pkceS256Required = hash[:pkceS256Required]
|
495
|
+
@dynamicallyRegistered = hash[:dynamicallyRegistered]
|
489
496
|
end
|
490
497
|
|
491
498
|
def to_hash_value(key, var)
|
@@ -583,6 +583,30 @@ module Authlete
|
|
583
583
|
alias_method :token_exchange_unsigned_jwt_rejected, :tokenExchangeUnsignedJwtRejected
|
584
584
|
alias_method :token_exchange_unsigned_jwt_rejected=, :tokenExchangeUnsignedJwtRejected=
|
585
585
|
|
586
|
+
attr_accessor :jwtGrantByIdentifiableClientsOnly
|
587
|
+
alias_method :jwt_grant_by_identifiable_clients_only, :jwtGrantByIdentifiableClientsOnly
|
588
|
+
alias_method :jwt_grant_by_identifiable_clients_only=, :jwtGrantByIdentifiableClientsOnly=
|
589
|
+
|
590
|
+
attr_accessor :jwtGrantEncryptedJwtRejected
|
591
|
+
alias_method :jwt_grant_encrypted_jwt_rejected, :jwtGrantEncryptedJwtRejected
|
592
|
+
alias_method :jwt_grant_encrypted_jwt_rejected=, :jwtGrantEncryptedJwtRejected=
|
593
|
+
|
594
|
+
attr_accessor :jwtGrantUnsignedJwtRejected
|
595
|
+
alias_method :jwt_grant_unsigned_jwt_rejected, :jwtGrantUnsignedJwtRejected
|
596
|
+
alias_method :jwt_grant_unsigned_jwt_rejected=, :jwtGrantUnsignedJwtRejected=
|
597
|
+
|
598
|
+
attr_accessor :federationSignatureKeyId
|
599
|
+
alias_method :federation_signature_key_id, :federationSignatureKeyId
|
600
|
+
alias_method :federation_signature_key_id=, :federationSignatureKeyId=
|
601
|
+
|
602
|
+
attr_accessor :federationConfigurationDuration
|
603
|
+
alias_method :federation_configuration_duration, :federationConfigurationDuration
|
604
|
+
alias_method :federation_configuration_duration=, :federationConfigurationDuration=
|
605
|
+
|
606
|
+
attr_accessor :dcrDuplicateSoftwareIdBlocked
|
607
|
+
alias_method :dcr_duplicate_software_id_blocked, :dcrDuplicateSoftwareIdBlocked
|
608
|
+
alias_method :dcr_duplicate_software_id_blocked=, :dcrDuplicateSoftwareIdBlocked=
|
609
|
+
|
586
610
|
private
|
587
611
|
|
588
612
|
def defaults
|
@@ -731,6 +755,12 @@ module Authlete
|
|
731
755
|
tokenExchangeByPermittedClientsOnly: false,
|
732
756
|
tokenExchangeEncryptedJwtRejected: false,
|
733
757
|
tokenExchangeUnsignedJwtRejected: false,
|
758
|
+
jwtGrantByIdentifiableClientsOnly: false,
|
759
|
+
jwtGrantEncryptedJwtRejected: false,
|
760
|
+
jwtGrantUnsignedJwtRejected: false,
|
761
|
+
federationSignatureKeyId: nil,
|
762
|
+
federationConfigurationDuration: 0,
|
763
|
+
dcrDuplicateSoftwareIdBlocked: false,
|
734
764
|
}
|
735
765
|
end
|
736
766
|
|
@@ -879,6 +909,12 @@ module Authlete
|
|
879
909
|
@tokenExchangeByPermittedClientsOnly = hash[:tokenExchangeByPermittedClientsOnly]
|
880
910
|
@tokenExchangeEncryptedJwtRejected = hash[:tokenExchangeEncryptedJwtRejected]
|
881
911
|
@tokenExchangeUnsignedJwtRejected = hash[:tokenExchangeUnsignedJwtRejected]
|
912
|
+
@jwtGrantByIdentifiableClientsOnly = hash[:jwtGrantByIdentifiableClientsOnly]
|
913
|
+
@jwtGrantEncryptedJwtRejected = hash[:jwtGrantEncryptedJwtRejected]
|
914
|
+
@jwtGrantUnsignedJwtRejected = hash[:jwtGrantUnsignedJwtRejected]
|
915
|
+
@federationSignatureKeyId = hash[:federationSignatureKeyId]
|
916
|
+
@federationConfigurationDuration = hash[:federationConfigurationDuration]
|
917
|
+
@dcrDuplicateSoftwareIdBlocked = hash[:dcrDuplicateSoftwareIdBlocked]
|
882
918
|
|
883
919
|
end
|
884
920
|
|
data/lib/authlete/version.rb
CHANGED
@@ -125,6 +125,7 @@ class ClientTest < Minitest::Test
|
|
125
125
|
SINGLE_ACCESS_TOKEN_PER_SUBJECT = false
|
126
126
|
PKCE_REQUIRED = false
|
127
127
|
PKCE_S256_REQUIRED = false
|
128
|
+
DYNAMICALLY_REGISTERED = false
|
128
129
|
|
129
130
|
def generate_json
|
130
131
|
return <<~JSON
|
@@ -213,7 +214,8 @@ class ClientTest < Minitest::Test
|
|
213
214
|
"digestAlgorithm": "<digest-algorithm>",
|
214
215
|
"singleAccessTokenPerSubject": false,
|
215
216
|
"pkceRequired": false,
|
216
|
-
"pkceS256Required": false
|
217
|
+
"pkceS256Required": false,
|
218
|
+
"dynamicallyRegistered": false
|
217
219
|
}
|
218
220
|
JSON
|
219
221
|
end
|
@@ -306,10 +308,10 @@ class ClientTest < Minitest::Test
|
|
306
308
|
singleAccessTokenPerSubject: false,
|
307
309
|
pkceRequired: false,
|
308
310
|
pkceS256Required: false,
|
311
|
+
dynamicallyRegistered: false,
|
309
312
|
}
|
310
313
|
end
|
311
314
|
|
312
|
-
|
313
315
|
def set_params(obj)
|
314
316
|
obj.number = NUMBER
|
315
317
|
obj.service_number = SERVICE_NUMBER
|
@@ -390,6 +392,7 @@ class ClientTest < Minitest::Test
|
|
390
392
|
obj.singleAccessTokenPerSubject = SINGLE_ACCESS_TOKEN_PER_SUBJECT
|
391
393
|
obj.pkceRequired = PKCE_REQUIRED
|
392
394
|
obj.pkceS256Required = PKCE_S256_REQUIRED
|
395
|
+
obj.dynamicallyRegistered = DYNAMICALLY_REGISTERED
|
393
396
|
end
|
394
397
|
|
395
398
|
|
@@ -482,6 +485,7 @@ class ClientTest < Minitest::Test
|
|
482
485
|
assert_equal SINGLE_ACCESS_TOKEN_PER_SUBJECT, obj.singleAccessTokenPerSubject
|
483
486
|
assert_equal PKCE_REQUIRED, obj.pkceRequired
|
484
487
|
assert_equal PKCE_S256_REQUIRED, obj.pkceS256Required
|
488
|
+
assert_equal DYNAMICALLY_REGISTERED, obj.dynamicallyRegistered
|
485
489
|
end
|
486
490
|
|
487
491
|
|
@@ -188,6 +188,12 @@ class ServiceTest < Minitest::Test
|
|
188
188
|
TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY = false
|
189
189
|
TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED = false
|
190
190
|
TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED = false
|
191
|
+
JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY = false
|
192
|
+
JWT_GRANT_ENCRYPTED_JWT_REJECTED = false
|
193
|
+
JWT_GRANT_UNSIGNED_JWT_REJECTED = false
|
194
|
+
FEDERATION_SIGNATURE_KEY_ID = '<federation-signature-key-id>'
|
195
|
+
FEDERATION_CONFIGURATION_DURATION = 100
|
196
|
+
DCR_DUPLICATE_SOFTWARE_ID_BLOCKED = false
|
191
197
|
|
192
198
|
def generate_json
|
193
199
|
return <<~JSON
|
@@ -335,7 +341,13 @@ class ServiceTest < Minitest::Test
|
|
335
341
|
"tokenExchangeByConfidentialClientsOnly": false,
|
336
342
|
"tokenExchangeByPermittedClientsOnly": false,
|
337
343
|
"tokenExchangeEncryptedJwtRejected": false,
|
338
|
-
"tokenExchangeUnsignedJwtRejected": false
|
344
|
+
"tokenExchangeUnsignedJwtRejected": false,
|
345
|
+
"jwtGrantByIdentifiableClientsOnly": false,
|
346
|
+
"jwtGrantEncryptedJwtRejected": false,
|
347
|
+
"jwtGrantUnsignedJwtRejected": false,
|
348
|
+
"federationSignatureKeyId": "<federation-signature-key-id>",
|
349
|
+
"federationConfigurationDuration": 100,
|
350
|
+
"dcrDuplicateSoftwareIdBlocked": false
|
339
351
|
}
|
340
352
|
JSON
|
341
353
|
|
@@ -488,6 +500,12 @@ class ServiceTest < Minitest::Test
|
|
488
500
|
tokenExchangeByPermittedClientsOnly: false,
|
489
501
|
tokenExchangeEncryptedJwtRejected: false,
|
490
502
|
tokenExchangeUnsignedJwtRejected: false,
|
503
|
+
jwtGrantByIdentifiableClientsOnly: false,
|
504
|
+
jwtGrantEncryptedJwtRejected: false,
|
505
|
+
jwtGrantUnsignedJwtRejected: false,
|
506
|
+
federationSignatureKeyId: '<federation-signature-key-id>',
|
507
|
+
federationConfigurationDuration: 100,
|
508
|
+
dcrDuplicateSoftwareIdBlocked: false
|
491
509
|
}
|
492
510
|
end
|
493
511
|
|
@@ -635,9 +653,14 @@ class ServiceTest < Minitest::Test
|
|
635
653
|
obj.token_exchange_by_identifiable_clients_only = TOKEN_EXCHANGE_BY_IDENTIFIABLE_CLIENTS_ONLY
|
636
654
|
obj.token_exchange_by_confidential_clients_only = TOKEN_EXCHANGE_BY_CONFIDENTIAL_CLIENTS_ONLY
|
637
655
|
obj.token_exchange_by_permitted_clients_only = TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY
|
656
|
+
obj.jwt_grant_by_identifiable_clients_only = JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY
|
657
|
+
obj.jwt_grant_encrypted_jwt_rejected = JWT_GRANT_ENCRYPTED_JWT_REJECTED
|
658
|
+
obj.jwt_grant_unsigned_jwt_rejected = JWT_GRANT_UNSIGNED_JWT_REJECTED
|
659
|
+
obj.federation_signature_key_id = FEDERATION_SIGNATURE_KEY_ID
|
660
|
+
obj.federation_configuration_duration = FEDERATION_CONFIGURATION_DURATION
|
661
|
+
obj.dcr_duplicate_software_id_blocked = DCR_DUPLICATE_SOFTWARE_ID_BLOCKED
|
638
662
|
end
|
639
663
|
|
640
|
-
|
641
664
|
def match(obj)
|
642
665
|
assert_equal NUMBER, obj.number
|
643
666
|
assert_equal SERVICE_OWNER_NUMBER, obj.serviceOwnerNumber
|
@@ -798,6 +821,12 @@ class ServiceTest < Minitest::Test
|
|
798
821
|
assert_equal TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY, obj.token_exchange_by_permitted_clients_only
|
799
822
|
assert_equal TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED, obj.token_exchange_encrypted_jwt_rejected
|
800
823
|
assert_equal TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED, obj.token_exchange_unsigned_jwt_rejected
|
824
|
+
assert_equal JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY, obj.jwtGrantByIdentifiableClientsOnly
|
825
|
+
assert_equal JWT_GRANT_ENCRYPTED_JWT_REJECTED, obj.jwtGrantEncryptedJwtRejected
|
826
|
+
assert_equal JWT_GRANT_UNSIGNED_JWT_REJECTED, obj.jwtGrantUnsignedJwtRejected
|
827
|
+
assert_equal FEDERATION_SIGNATURE_KEY_ID, obj.federationSignatureKeyId
|
828
|
+
assert_equal FEDERATION_CONFIGURATION_DURATION, obj.federationConfigurationDuration
|
829
|
+
assert_equal DCR_DUPLICATE_SOFTWARE_ID_BLOCKED, obj.dcrDuplicateSoftwareIdBlocked
|
801
830
|
end
|
802
831
|
|
803
832
|
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authlete
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.26.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Takahiko Kawasaki
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2022-08-
|
12
|
+
date: 2022-08-23 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: rest-client
|