authlete 1.23.0 → 1.26.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3ff212bd1b3919e176b67af639ee6f712b68edd79e84e9c53dd38a9d57e6a4b9
4
- data.tar.gz: 3c1a772790b54d7723aaecade60563c7eef07b295eaac9d343b06ada3c9e0b98
3
+ metadata.gz: 4a3bead217fba752e6d6971b910416e9191712b694af9729bc080d48eb2150b1
4
+ data.tar.gz: 3106a4db8aa7b20df6307fbc49b2d27693594e6274512ea8ddf19b7436d57627
5
5
  SHA512:
6
- metadata.gz: 46b424e7e7b5cf06fb3f413ec572a61e878b8de70db2cc5a6c696667e7e3f7b8203d90c0eab8aeb0d1d86c9e79d89dac9bffaa3233d304effd9c29bbb4b55c5c
7
- data.tar.gz: 923ccd23038030e2f1cc6c77f9da2babae678fed6e291d553463c4d6f3e022cda6b7c1257d192c36bc7519a50727246b1b2d083d83ec368f2c67bd23177c6472
6
+ metadata.gz: 84df551852f4561a775ac21045251feebba5e3c319ef1a6a503a9618679f6e332f3ad8fa0c1c5fd4023a937668dfa28dbbc7e65bf66078c8d92434d958c030b6
7
+ data.tar.gz: '0049b9381bb5af3d8e1909eb54b168f66ecccd1c24980f381581d74e4c357cd88e28bcc4c9d1b354a2d81397f5ea4ac14cb53918b137a294bae13024a8971a54'
@@ -319,7 +319,12 @@ module Authlete
319
319
 
320
320
  attr_accessor :pkceS256Required
321
321
  alias_method :pkce_s256_required, :pkceS256Required
322
- alias_method :pkce_s256_required=, :pkceS256Required=
322
+ alias_method :pkce_s256_required=, :pkceS256Required=
323
+
324
+ attr_accessor :dynamicallyRegistered
325
+ alias_method :dynamically_registered, :dynamicallyRegistered
326
+ alias_method :dynamically_registered=, :dynamicallyRegistered=
327
+
323
328
  private
324
329
 
325
330
  def defaults
@@ -403,6 +408,7 @@ module Authlete
403
408
  singleAccessTokenPerSubject: false,
404
409
  pkceRequired: false,
405
410
  pkceS256Required: false,
411
+ dynamicallyRegistered: false,
406
412
  }
407
413
  end
408
414
 
@@ -486,6 +492,7 @@ module Authlete
486
492
  @singleAccessTokenPerSubject = hash[:singleAccessTokenPerSubject]
487
493
  @pkceRequired = hash[:pkceRequired]
488
494
  @pkceS256Required = hash[:pkceS256Required]
495
+ @dynamicallyRegistered = hash[:dynamicallyRegistered]
489
496
  end
490
497
 
491
498
  def to_hash_value(key, var)
@@ -583,6 +583,30 @@ module Authlete
583
583
  alias_method :token_exchange_unsigned_jwt_rejected, :tokenExchangeUnsignedJwtRejected
584
584
  alias_method :token_exchange_unsigned_jwt_rejected=, :tokenExchangeUnsignedJwtRejected=
585
585
 
586
+ attr_accessor :jwtGrantByIdentifiableClientsOnly
587
+ alias_method :jwt_grant_by_identifiable_clients_only, :jwtGrantByIdentifiableClientsOnly
588
+ alias_method :jwt_grant_by_identifiable_clients_only=, :jwtGrantByIdentifiableClientsOnly=
589
+
590
+ attr_accessor :jwtGrantEncryptedJwtRejected
591
+ alias_method :jwt_grant_encrypted_jwt_rejected, :jwtGrantEncryptedJwtRejected
592
+ alias_method :jwt_grant_encrypted_jwt_rejected=, :jwtGrantEncryptedJwtRejected=
593
+
594
+ attr_accessor :jwtGrantUnsignedJwtRejected
595
+ alias_method :jwt_grant_unsigned_jwt_rejected, :jwtGrantUnsignedJwtRejected
596
+ alias_method :jwt_grant_unsigned_jwt_rejected=, :jwtGrantUnsignedJwtRejected=
597
+
598
+ attr_accessor :federationSignatureKeyId
599
+ alias_method :federation_signature_key_id, :federationSignatureKeyId
600
+ alias_method :federation_signature_key_id=, :federationSignatureKeyId=
601
+
602
+ attr_accessor :federationConfigurationDuration
603
+ alias_method :federation_configuration_duration, :federationConfigurationDuration
604
+ alias_method :federation_configuration_duration=, :federationConfigurationDuration=
605
+
606
+ attr_accessor :dcrDuplicateSoftwareIdBlocked
607
+ alias_method :dcr_duplicate_software_id_blocked, :dcrDuplicateSoftwareIdBlocked
608
+ alias_method :dcr_duplicate_software_id_blocked=, :dcrDuplicateSoftwareIdBlocked=
609
+
586
610
  private
587
611
 
588
612
  def defaults
@@ -731,6 +755,12 @@ module Authlete
731
755
  tokenExchangeByPermittedClientsOnly: false,
732
756
  tokenExchangeEncryptedJwtRejected: false,
733
757
  tokenExchangeUnsignedJwtRejected: false,
758
+ jwtGrantByIdentifiableClientsOnly: false,
759
+ jwtGrantEncryptedJwtRejected: false,
760
+ jwtGrantUnsignedJwtRejected: false,
761
+ federationSignatureKeyId: nil,
762
+ federationConfigurationDuration: 0,
763
+ dcrDuplicateSoftwareIdBlocked: false,
734
764
  }
735
765
  end
736
766
 
@@ -879,6 +909,12 @@ module Authlete
879
909
  @tokenExchangeByPermittedClientsOnly = hash[:tokenExchangeByPermittedClientsOnly]
880
910
  @tokenExchangeEncryptedJwtRejected = hash[:tokenExchangeEncryptedJwtRejected]
881
911
  @tokenExchangeUnsignedJwtRejected = hash[:tokenExchangeUnsignedJwtRejected]
912
+ @jwtGrantByIdentifiableClientsOnly = hash[:jwtGrantByIdentifiableClientsOnly]
913
+ @jwtGrantEncryptedJwtRejected = hash[:jwtGrantEncryptedJwtRejected]
914
+ @jwtGrantUnsignedJwtRejected = hash[:jwtGrantUnsignedJwtRejected]
915
+ @federationSignatureKeyId = hash[:federationSignatureKeyId]
916
+ @federationConfigurationDuration = hash[:federationConfigurationDuration]
917
+ @dcrDuplicateSoftwareIdBlocked = hash[:dcrDuplicateSoftwareIdBlocked]
882
918
 
883
919
  end
884
920
 
@@ -16,5 +16,5 @@
16
16
 
17
17
 
18
18
  module Authlete
19
- VERSION = "1.23.0"
19
+ VERSION = "1.26.0"
20
20
  end
@@ -125,6 +125,7 @@ class ClientTest < Minitest::Test
125
125
  SINGLE_ACCESS_TOKEN_PER_SUBJECT = false
126
126
  PKCE_REQUIRED = false
127
127
  PKCE_S256_REQUIRED = false
128
+ DYNAMICALLY_REGISTERED = false
128
129
 
129
130
  def generate_json
130
131
  return <<~JSON
@@ -213,7 +214,8 @@ class ClientTest < Minitest::Test
213
214
  "digestAlgorithm": "<digest-algorithm>",
214
215
  "singleAccessTokenPerSubject": false,
215
216
  "pkceRequired": false,
216
- "pkceS256Required": false
217
+ "pkceS256Required": false,
218
+ "dynamicallyRegistered": false
217
219
  }
218
220
  JSON
219
221
  end
@@ -306,10 +308,10 @@ class ClientTest < Minitest::Test
306
308
  singleAccessTokenPerSubject: false,
307
309
  pkceRequired: false,
308
310
  pkceS256Required: false,
311
+ dynamicallyRegistered: false,
309
312
  }
310
313
  end
311
314
 
312
-
313
315
  def set_params(obj)
314
316
  obj.number = NUMBER
315
317
  obj.service_number = SERVICE_NUMBER
@@ -390,6 +392,7 @@ class ClientTest < Minitest::Test
390
392
  obj.singleAccessTokenPerSubject = SINGLE_ACCESS_TOKEN_PER_SUBJECT
391
393
  obj.pkceRequired = PKCE_REQUIRED
392
394
  obj.pkceS256Required = PKCE_S256_REQUIRED
395
+ obj.dynamicallyRegistered = DYNAMICALLY_REGISTERED
393
396
  end
394
397
 
395
398
 
@@ -482,6 +485,7 @@ class ClientTest < Minitest::Test
482
485
  assert_equal SINGLE_ACCESS_TOKEN_PER_SUBJECT, obj.singleAccessTokenPerSubject
483
486
  assert_equal PKCE_REQUIRED, obj.pkceRequired
484
487
  assert_equal PKCE_S256_REQUIRED, obj.pkceS256Required
488
+ assert_equal DYNAMICALLY_REGISTERED, obj.dynamicallyRegistered
485
489
  end
486
490
 
487
491
 
@@ -188,6 +188,12 @@ class ServiceTest < Minitest::Test
188
188
  TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY = false
189
189
  TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED = false
190
190
  TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED = false
191
+ JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY = false
192
+ JWT_GRANT_ENCRYPTED_JWT_REJECTED = false
193
+ JWT_GRANT_UNSIGNED_JWT_REJECTED = false
194
+ FEDERATION_SIGNATURE_KEY_ID = '<federation-signature-key-id>'
195
+ FEDERATION_CONFIGURATION_DURATION = 100
196
+ DCR_DUPLICATE_SOFTWARE_ID_BLOCKED = false
191
197
 
192
198
  def generate_json
193
199
  return <<~JSON
@@ -335,7 +341,13 @@ class ServiceTest < Minitest::Test
335
341
  "tokenExchangeByConfidentialClientsOnly": false,
336
342
  "tokenExchangeByPermittedClientsOnly": false,
337
343
  "tokenExchangeEncryptedJwtRejected": false,
338
- "tokenExchangeUnsignedJwtRejected": false
344
+ "tokenExchangeUnsignedJwtRejected": false,
345
+ "jwtGrantByIdentifiableClientsOnly": false,
346
+ "jwtGrantEncryptedJwtRejected": false,
347
+ "jwtGrantUnsignedJwtRejected": false,
348
+ "federationSignatureKeyId": "<federation-signature-key-id>",
349
+ "federationConfigurationDuration": 100,
350
+ "dcrDuplicateSoftwareIdBlocked": false
339
351
  }
340
352
  JSON
341
353
 
@@ -488,6 +500,12 @@ class ServiceTest < Minitest::Test
488
500
  tokenExchangeByPermittedClientsOnly: false,
489
501
  tokenExchangeEncryptedJwtRejected: false,
490
502
  tokenExchangeUnsignedJwtRejected: false,
503
+ jwtGrantByIdentifiableClientsOnly: false,
504
+ jwtGrantEncryptedJwtRejected: false,
505
+ jwtGrantUnsignedJwtRejected: false,
506
+ federationSignatureKeyId: '<federation-signature-key-id>',
507
+ federationConfigurationDuration: 100,
508
+ dcrDuplicateSoftwareIdBlocked: false
491
509
  }
492
510
  end
493
511
 
@@ -635,9 +653,14 @@ class ServiceTest < Minitest::Test
635
653
  obj.token_exchange_by_identifiable_clients_only = TOKEN_EXCHANGE_BY_IDENTIFIABLE_CLIENTS_ONLY
636
654
  obj.token_exchange_by_confidential_clients_only = TOKEN_EXCHANGE_BY_CONFIDENTIAL_CLIENTS_ONLY
637
655
  obj.token_exchange_by_permitted_clients_only = TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY
656
+ obj.jwt_grant_by_identifiable_clients_only = JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY
657
+ obj.jwt_grant_encrypted_jwt_rejected = JWT_GRANT_ENCRYPTED_JWT_REJECTED
658
+ obj.jwt_grant_unsigned_jwt_rejected = JWT_GRANT_UNSIGNED_JWT_REJECTED
659
+ obj.federation_signature_key_id = FEDERATION_SIGNATURE_KEY_ID
660
+ obj.federation_configuration_duration = FEDERATION_CONFIGURATION_DURATION
661
+ obj.dcr_duplicate_software_id_blocked = DCR_DUPLICATE_SOFTWARE_ID_BLOCKED
638
662
  end
639
663
 
640
-
641
664
  def match(obj)
642
665
  assert_equal NUMBER, obj.number
643
666
  assert_equal SERVICE_OWNER_NUMBER, obj.serviceOwnerNumber
@@ -798,6 +821,12 @@ class ServiceTest < Minitest::Test
798
821
  assert_equal TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY, obj.token_exchange_by_permitted_clients_only
799
822
  assert_equal TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED, obj.token_exchange_encrypted_jwt_rejected
800
823
  assert_equal TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED, obj.token_exchange_unsigned_jwt_rejected
824
+ assert_equal JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY, obj.jwtGrantByIdentifiableClientsOnly
825
+ assert_equal JWT_GRANT_ENCRYPTED_JWT_REJECTED, obj.jwtGrantEncryptedJwtRejected
826
+ assert_equal JWT_GRANT_UNSIGNED_JWT_REJECTED, obj.jwtGrantUnsignedJwtRejected
827
+ assert_equal FEDERATION_SIGNATURE_KEY_ID, obj.federationSignatureKeyId
828
+ assert_equal FEDERATION_CONFIGURATION_DURATION, obj.federationConfigurationDuration
829
+ assert_equal DCR_DUPLICATE_SOFTWARE_ID_BLOCKED, obj.dcrDuplicateSoftwareIdBlocked
801
830
  end
802
831
 
803
832
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: authlete
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.23.0
4
+ version: 1.26.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Takahiko Kawasaki
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2022-08-08 00:00:00.000000000 Z
12
+ date: 2022-08-23 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: rest-client