authlete 1.23.0 → 1.26.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3ff212bd1b3919e176b67af639ee6f712b68edd79e84e9c53dd38a9d57e6a4b9
4
- data.tar.gz: 3c1a772790b54d7723aaecade60563c7eef07b295eaac9d343b06ada3c9e0b98
3
+ metadata.gz: 4a3bead217fba752e6d6971b910416e9191712b694af9729bc080d48eb2150b1
4
+ data.tar.gz: 3106a4db8aa7b20df6307fbc49b2d27693594e6274512ea8ddf19b7436d57627
5
5
  SHA512:
6
- metadata.gz: 46b424e7e7b5cf06fb3f413ec572a61e878b8de70db2cc5a6c696667e7e3f7b8203d90c0eab8aeb0d1d86c9e79d89dac9bffaa3233d304effd9c29bbb4b55c5c
7
- data.tar.gz: 923ccd23038030e2f1cc6c77f9da2babae678fed6e291d553463c4d6f3e022cda6b7c1257d192c36bc7519a50727246b1b2d083d83ec368f2c67bd23177c6472
6
+ metadata.gz: 84df551852f4561a775ac21045251feebba5e3c319ef1a6a503a9618679f6e332f3ad8fa0c1c5fd4023a937668dfa28dbbc7e65bf66078c8d92434d958c030b6
7
+ data.tar.gz: '0049b9381bb5af3d8e1909eb54b168f66ecccd1c24980f381581d74e4c357cd88e28bcc4c9d1b354a2d81397f5ea4ac14cb53918b137a294bae13024a8971a54'
@@ -319,7 +319,12 @@ module Authlete
319
319
 
320
320
  attr_accessor :pkceS256Required
321
321
  alias_method :pkce_s256_required, :pkceS256Required
322
- alias_method :pkce_s256_required=, :pkceS256Required=
322
+ alias_method :pkce_s256_required=, :pkceS256Required=
323
+
324
+ attr_accessor :dynamicallyRegistered
325
+ alias_method :dynamically_registered, :dynamicallyRegistered
326
+ alias_method :dynamically_registered=, :dynamicallyRegistered=
327
+
323
328
  private
324
329
 
325
330
  def defaults
@@ -403,6 +408,7 @@ module Authlete
403
408
  singleAccessTokenPerSubject: false,
404
409
  pkceRequired: false,
405
410
  pkceS256Required: false,
411
+ dynamicallyRegistered: false,
406
412
  }
407
413
  end
408
414
 
@@ -486,6 +492,7 @@ module Authlete
486
492
  @singleAccessTokenPerSubject = hash[:singleAccessTokenPerSubject]
487
493
  @pkceRequired = hash[:pkceRequired]
488
494
  @pkceS256Required = hash[:pkceS256Required]
495
+ @dynamicallyRegistered = hash[:dynamicallyRegistered]
489
496
  end
490
497
 
491
498
  def to_hash_value(key, var)
@@ -583,6 +583,30 @@ module Authlete
583
583
  alias_method :token_exchange_unsigned_jwt_rejected, :tokenExchangeUnsignedJwtRejected
584
584
  alias_method :token_exchange_unsigned_jwt_rejected=, :tokenExchangeUnsignedJwtRejected=
585
585
 
586
+ attr_accessor :jwtGrantByIdentifiableClientsOnly
587
+ alias_method :jwt_grant_by_identifiable_clients_only, :jwtGrantByIdentifiableClientsOnly
588
+ alias_method :jwt_grant_by_identifiable_clients_only=, :jwtGrantByIdentifiableClientsOnly=
589
+
590
+ attr_accessor :jwtGrantEncryptedJwtRejected
591
+ alias_method :jwt_grant_encrypted_jwt_rejected, :jwtGrantEncryptedJwtRejected
592
+ alias_method :jwt_grant_encrypted_jwt_rejected=, :jwtGrantEncryptedJwtRejected=
593
+
594
+ attr_accessor :jwtGrantUnsignedJwtRejected
595
+ alias_method :jwt_grant_unsigned_jwt_rejected, :jwtGrantUnsignedJwtRejected
596
+ alias_method :jwt_grant_unsigned_jwt_rejected=, :jwtGrantUnsignedJwtRejected=
597
+
598
+ attr_accessor :federationSignatureKeyId
599
+ alias_method :federation_signature_key_id, :federationSignatureKeyId
600
+ alias_method :federation_signature_key_id=, :federationSignatureKeyId=
601
+
602
+ attr_accessor :federationConfigurationDuration
603
+ alias_method :federation_configuration_duration, :federationConfigurationDuration
604
+ alias_method :federation_configuration_duration=, :federationConfigurationDuration=
605
+
606
+ attr_accessor :dcrDuplicateSoftwareIdBlocked
607
+ alias_method :dcr_duplicate_software_id_blocked, :dcrDuplicateSoftwareIdBlocked
608
+ alias_method :dcr_duplicate_software_id_blocked=, :dcrDuplicateSoftwareIdBlocked=
609
+
586
610
  private
587
611
 
588
612
  def defaults
@@ -731,6 +755,12 @@ module Authlete
731
755
  tokenExchangeByPermittedClientsOnly: false,
732
756
  tokenExchangeEncryptedJwtRejected: false,
733
757
  tokenExchangeUnsignedJwtRejected: false,
758
+ jwtGrantByIdentifiableClientsOnly: false,
759
+ jwtGrantEncryptedJwtRejected: false,
760
+ jwtGrantUnsignedJwtRejected: false,
761
+ federationSignatureKeyId: nil,
762
+ federationConfigurationDuration: 0,
763
+ dcrDuplicateSoftwareIdBlocked: false,
734
764
  }
735
765
  end
736
766
 
@@ -879,6 +909,12 @@ module Authlete
879
909
  @tokenExchangeByPermittedClientsOnly = hash[:tokenExchangeByPermittedClientsOnly]
880
910
  @tokenExchangeEncryptedJwtRejected = hash[:tokenExchangeEncryptedJwtRejected]
881
911
  @tokenExchangeUnsignedJwtRejected = hash[:tokenExchangeUnsignedJwtRejected]
912
+ @jwtGrantByIdentifiableClientsOnly = hash[:jwtGrantByIdentifiableClientsOnly]
913
+ @jwtGrantEncryptedJwtRejected = hash[:jwtGrantEncryptedJwtRejected]
914
+ @jwtGrantUnsignedJwtRejected = hash[:jwtGrantUnsignedJwtRejected]
915
+ @federationSignatureKeyId = hash[:federationSignatureKeyId]
916
+ @federationConfigurationDuration = hash[:federationConfigurationDuration]
917
+ @dcrDuplicateSoftwareIdBlocked = hash[:dcrDuplicateSoftwareIdBlocked]
882
918
 
883
919
  end
884
920
 
@@ -16,5 +16,5 @@
16
16
 
17
17
 
18
18
  module Authlete
19
- VERSION = "1.23.0"
19
+ VERSION = "1.26.0"
20
20
  end
@@ -125,6 +125,7 @@ class ClientTest < Minitest::Test
125
125
  SINGLE_ACCESS_TOKEN_PER_SUBJECT = false
126
126
  PKCE_REQUIRED = false
127
127
  PKCE_S256_REQUIRED = false
128
+ DYNAMICALLY_REGISTERED = false
128
129
 
129
130
  def generate_json
130
131
  return <<~JSON
@@ -213,7 +214,8 @@ class ClientTest < Minitest::Test
213
214
  "digestAlgorithm": "<digest-algorithm>",
214
215
  "singleAccessTokenPerSubject": false,
215
216
  "pkceRequired": false,
216
- "pkceS256Required": false
217
+ "pkceS256Required": false,
218
+ "dynamicallyRegistered": false
217
219
  }
218
220
  JSON
219
221
  end
@@ -306,10 +308,10 @@ class ClientTest < Minitest::Test
306
308
  singleAccessTokenPerSubject: false,
307
309
  pkceRequired: false,
308
310
  pkceS256Required: false,
311
+ dynamicallyRegistered: false,
309
312
  }
310
313
  end
311
314
 
312
-
313
315
  def set_params(obj)
314
316
  obj.number = NUMBER
315
317
  obj.service_number = SERVICE_NUMBER
@@ -390,6 +392,7 @@ class ClientTest < Minitest::Test
390
392
  obj.singleAccessTokenPerSubject = SINGLE_ACCESS_TOKEN_PER_SUBJECT
391
393
  obj.pkceRequired = PKCE_REQUIRED
392
394
  obj.pkceS256Required = PKCE_S256_REQUIRED
395
+ obj.dynamicallyRegistered = DYNAMICALLY_REGISTERED
393
396
  end
394
397
 
395
398
 
@@ -482,6 +485,7 @@ class ClientTest < Minitest::Test
482
485
  assert_equal SINGLE_ACCESS_TOKEN_PER_SUBJECT, obj.singleAccessTokenPerSubject
483
486
  assert_equal PKCE_REQUIRED, obj.pkceRequired
484
487
  assert_equal PKCE_S256_REQUIRED, obj.pkceS256Required
488
+ assert_equal DYNAMICALLY_REGISTERED, obj.dynamicallyRegistered
485
489
  end
486
490
 
487
491
 
@@ -188,6 +188,12 @@ class ServiceTest < Minitest::Test
188
188
  TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY = false
189
189
  TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED = false
190
190
  TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED = false
191
+ JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY = false
192
+ JWT_GRANT_ENCRYPTED_JWT_REJECTED = false
193
+ JWT_GRANT_UNSIGNED_JWT_REJECTED = false
194
+ FEDERATION_SIGNATURE_KEY_ID = '<federation-signature-key-id>'
195
+ FEDERATION_CONFIGURATION_DURATION = 100
196
+ DCR_DUPLICATE_SOFTWARE_ID_BLOCKED = false
191
197
 
192
198
  def generate_json
193
199
  return <<~JSON
@@ -335,7 +341,13 @@ class ServiceTest < Minitest::Test
335
341
  "tokenExchangeByConfidentialClientsOnly": false,
336
342
  "tokenExchangeByPermittedClientsOnly": false,
337
343
  "tokenExchangeEncryptedJwtRejected": false,
338
- "tokenExchangeUnsignedJwtRejected": false
344
+ "tokenExchangeUnsignedJwtRejected": false,
345
+ "jwtGrantByIdentifiableClientsOnly": false,
346
+ "jwtGrantEncryptedJwtRejected": false,
347
+ "jwtGrantUnsignedJwtRejected": false,
348
+ "federationSignatureKeyId": "<federation-signature-key-id>",
349
+ "federationConfigurationDuration": 100,
350
+ "dcrDuplicateSoftwareIdBlocked": false
339
351
  }
340
352
  JSON
341
353
 
@@ -488,6 +500,12 @@ class ServiceTest < Minitest::Test
488
500
  tokenExchangeByPermittedClientsOnly: false,
489
501
  tokenExchangeEncryptedJwtRejected: false,
490
502
  tokenExchangeUnsignedJwtRejected: false,
503
+ jwtGrantByIdentifiableClientsOnly: false,
504
+ jwtGrantEncryptedJwtRejected: false,
505
+ jwtGrantUnsignedJwtRejected: false,
506
+ federationSignatureKeyId: '<federation-signature-key-id>',
507
+ federationConfigurationDuration: 100,
508
+ dcrDuplicateSoftwareIdBlocked: false
491
509
  }
492
510
  end
493
511
 
@@ -635,9 +653,14 @@ class ServiceTest < Minitest::Test
635
653
  obj.token_exchange_by_identifiable_clients_only = TOKEN_EXCHANGE_BY_IDENTIFIABLE_CLIENTS_ONLY
636
654
  obj.token_exchange_by_confidential_clients_only = TOKEN_EXCHANGE_BY_CONFIDENTIAL_CLIENTS_ONLY
637
655
  obj.token_exchange_by_permitted_clients_only = TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY
656
+ obj.jwt_grant_by_identifiable_clients_only = JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY
657
+ obj.jwt_grant_encrypted_jwt_rejected = JWT_GRANT_ENCRYPTED_JWT_REJECTED
658
+ obj.jwt_grant_unsigned_jwt_rejected = JWT_GRANT_UNSIGNED_JWT_REJECTED
659
+ obj.federation_signature_key_id = FEDERATION_SIGNATURE_KEY_ID
660
+ obj.federation_configuration_duration = FEDERATION_CONFIGURATION_DURATION
661
+ obj.dcr_duplicate_software_id_blocked = DCR_DUPLICATE_SOFTWARE_ID_BLOCKED
638
662
  end
639
663
 
640
-
641
664
  def match(obj)
642
665
  assert_equal NUMBER, obj.number
643
666
  assert_equal SERVICE_OWNER_NUMBER, obj.serviceOwnerNumber
@@ -798,6 +821,12 @@ class ServiceTest < Minitest::Test
798
821
  assert_equal TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY, obj.token_exchange_by_permitted_clients_only
799
822
  assert_equal TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED, obj.token_exchange_encrypted_jwt_rejected
800
823
  assert_equal TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED, obj.token_exchange_unsigned_jwt_rejected
824
+ assert_equal JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY, obj.jwtGrantByIdentifiableClientsOnly
825
+ assert_equal JWT_GRANT_ENCRYPTED_JWT_REJECTED, obj.jwtGrantEncryptedJwtRejected
826
+ assert_equal JWT_GRANT_UNSIGNED_JWT_REJECTED, obj.jwtGrantUnsignedJwtRejected
827
+ assert_equal FEDERATION_SIGNATURE_KEY_ID, obj.federationSignatureKeyId
828
+ assert_equal FEDERATION_CONFIGURATION_DURATION, obj.federationConfigurationDuration
829
+ assert_equal DCR_DUPLICATE_SOFTWARE_ID_BLOCKED, obj.dcrDuplicateSoftwareIdBlocked
801
830
  end
802
831
 
803
832
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: authlete
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.23.0
4
+ version: 1.26.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Takahiko Kawasaki
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2022-08-08 00:00:00.000000000 Z
12
+ date: 2022-08-23 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: rest-client