authlete 1.23.0 → 1.26.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/authlete/model/client.rb +8 -1
- data/lib/authlete/model/service.rb +36 -0
- data/lib/authlete/version.rb +1 -1
- data/test/authlete/model/test_client.rb +6 -2
- data/test/authlete/model/test_service.rb +31 -2
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4a3bead217fba752e6d6971b910416e9191712b694af9729bc080d48eb2150b1
|
4
|
+
data.tar.gz: 3106a4db8aa7b20df6307fbc49b2d27693594e6274512ea8ddf19b7436d57627
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 84df551852f4561a775ac21045251feebba5e3c319ef1a6a503a9618679f6e332f3ad8fa0c1c5fd4023a937668dfa28dbbc7e65bf66078c8d92434d958c030b6
|
7
|
+
data.tar.gz: '0049b9381bb5af3d8e1909eb54b168f66ecccd1c24980f381581d74e4c357cd88e28bcc4c9d1b354a2d81397f5ea4ac14cb53918b137a294bae13024a8971a54'
|
@@ -319,7 +319,12 @@ module Authlete
|
|
319
319
|
|
320
320
|
attr_accessor :pkceS256Required
|
321
321
|
alias_method :pkce_s256_required, :pkceS256Required
|
322
|
-
alias_method :pkce_s256_required=, :pkceS256Required=
|
322
|
+
alias_method :pkce_s256_required=, :pkceS256Required=
|
323
|
+
|
324
|
+
attr_accessor :dynamicallyRegistered
|
325
|
+
alias_method :dynamically_registered, :dynamicallyRegistered
|
326
|
+
alias_method :dynamically_registered=, :dynamicallyRegistered=
|
327
|
+
|
323
328
|
private
|
324
329
|
|
325
330
|
def defaults
|
@@ -403,6 +408,7 @@ module Authlete
|
|
403
408
|
singleAccessTokenPerSubject: false,
|
404
409
|
pkceRequired: false,
|
405
410
|
pkceS256Required: false,
|
411
|
+
dynamicallyRegistered: false,
|
406
412
|
}
|
407
413
|
end
|
408
414
|
|
@@ -486,6 +492,7 @@ module Authlete
|
|
486
492
|
@singleAccessTokenPerSubject = hash[:singleAccessTokenPerSubject]
|
487
493
|
@pkceRequired = hash[:pkceRequired]
|
488
494
|
@pkceS256Required = hash[:pkceS256Required]
|
495
|
+
@dynamicallyRegistered = hash[:dynamicallyRegistered]
|
489
496
|
end
|
490
497
|
|
491
498
|
def to_hash_value(key, var)
|
@@ -583,6 +583,30 @@ module Authlete
|
|
583
583
|
alias_method :token_exchange_unsigned_jwt_rejected, :tokenExchangeUnsignedJwtRejected
|
584
584
|
alias_method :token_exchange_unsigned_jwt_rejected=, :tokenExchangeUnsignedJwtRejected=
|
585
585
|
|
586
|
+
attr_accessor :jwtGrantByIdentifiableClientsOnly
|
587
|
+
alias_method :jwt_grant_by_identifiable_clients_only, :jwtGrantByIdentifiableClientsOnly
|
588
|
+
alias_method :jwt_grant_by_identifiable_clients_only=, :jwtGrantByIdentifiableClientsOnly=
|
589
|
+
|
590
|
+
attr_accessor :jwtGrantEncryptedJwtRejected
|
591
|
+
alias_method :jwt_grant_encrypted_jwt_rejected, :jwtGrantEncryptedJwtRejected
|
592
|
+
alias_method :jwt_grant_encrypted_jwt_rejected=, :jwtGrantEncryptedJwtRejected=
|
593
|
+
|
594
|
+
attr_accessor :jwtGrantUnsignedJwtRejected
|
595
|
+
alias_method :jwt_grant_unsigned_jwt_rejected, :jwtGrantUnsignedJwtRejected
|
596
|
+
alias_method :jwt_grant_unsigned_jwt_rejected=, :jwtGrantUnsignedJwtRejected=
|
597
|
+
|
598
|
+
attr_accessor :federationSignatureKeyId
|
599
|
+
alias_method :federation_signature_key_id, :federationSignatureKeyId
|
600
|
+
alias_method :federation_signature_key_id=, :federationSignatureKeyId=
|
601
|
+
|
602
|
+
attr_accessor :federationConfigurationDuration
|
603
|
+
alias_method :federation_configuration_duration, :federationConfigurationDuration
|
604
|
+
alias_method :federation_configuration_duration=, :federationConfigurationDuration=
|
605
|
+
|
606
|
+
attr_accessor :dcrDuplicateSoftwareIdBlocked
|
607
|
+
alias_method :dcr_duplicate_software_id_blocked, :dcrDuplicateSoftwareIdBlocked
|
608
|
+
alias_method :dcr_duplicate_software_id_blocked=, :dcrDuplicateSoftwareIdBlocked=
|
609
|
+
|
586
610
|
private
|
587
611
|
|
588
612
|
def defaults
|
@@ -731,6 +755,12 @@ module Authlete
|
|
731
755
|
tokenExchangeByPermittedClientsOnly: false,
|
732
756
|
tokenExchangeEncryptedJwtRejected: false,
|
733
757
|
tokenExchangeUnsignedJwtRejected: false,
|
758
|
+
jwtGrantByIdentifiableClientsOnly: false,
|
759
|
+
jwtGrantEncryptedJwtRejected: false,
|
760
|
+
jwtGrantUnsignedJwtRejected: false,
|
761
|
+
federationSignatureKeyId: nil,
|
762
|
+
federationConfigurationDuration: 0,
|
763
|
+
dcrDuplicateSoftwareIdBlocked: false,
|
734
764
|
}
|
735
765
|
end
|
736
766
|
|
@@ -879,6 +909,12 @@ module Authlete
|
|
879
909
|
@tokenExchangeByPermittedClientsOnly = hash[:tokenExchangeByPermittedClientsOnly]
|
880
910
|
@tokenExchangeEncryptedJwtRejected = hash[:tokenExchangeEncryptedJwtRejected]
|
881
911
|
@tokenExchangeUnsignedJwtRejected = hash[:tokenExchangeUnsignedJwtRejected]
|
912
|
+
@jwtGrantByIdentifiableClientsOnly = hash[:jwtGrantByIdentifiableClientsOnly]
|
913
|
+
@jwtGrantEncryptedJwtRejected = hash[:jwtGrantEncryptedJwtRejected]
|
914
|
+
@jwtGrantUnsignedJwtRejected = hash[:jwtGrantUnsignedJwtRejected]
|
915
|
+
@federationSignatureKeyId = hash[:federationSignatureKeyId]
|
916
|
+
@federationConfigurationDuration = hash[:federationConfigurationDuration]
|
917
|
+
@dcrDuplicateSoftwareIdBlocked = hash[:dcrDuplicateSoftwareIdBlocked]
|
882
918
|
|
883
919
|
end
|
884
920
|
|
data/lib/authlete/version.rb
CHANGED
@@ -125,6 +125,7 @@ class ClientTest < Minitest::Test
|
|
125
125
|
SINGLE_ACCESS_TOKEN_PER_SUBJECT = false
|
126
126
|
PKCE_REQUIRED = false
|
127
127
|
PKCE_S256_REQUIRED = false
|
128
|
+
DYNAMICALLY_REGISTERED = false
|
128
129
|
|
129
130
|
def generate_json
|
130
131
|
return <<~JSON
|
@@ -213,7 +214,8 @@ class ClientTest < Minitest::Test
|
|
213
214
|
"digestAlgorithm": "<digest-algorithm>",
|
214
215
|
"singleAccessTokenPerSubject": false,
|
215
216
|
"pkceRequired": false,
|
216
|
-
"pkceS256Required": false
|
217
|
+
"pkceS256Required": false,
|
218
|
+
"dynamicallyRegistered": false
|
217
219
|
}
|
218
220
|
JSON
|
219
221
|
end
|
@@ -306,10 +308,10 @@ class ClientTest < Minitest::Test
|
|
306
308
|
singleAccessTokenPerSubject: false,
|
307
309
|
pkceRequired: false,
|
308
310
|
pkceS256Required: false,
|
311
|
+
dynamicallyRegistered: false,
|
309
312
|
}
|
310
313
|
end
|
311
314
|
|
312
|
-
|
313
315
|
def set_params(obj)
|
314
316
|
obj.number = NUMBER
|
315
317
|
obj.service_number = SERVICE_NUMBER
|
@@ -390,6 +392,7 @@ class ClientTest < Minitest::Test
|
|
390
392
|
obj.singleAccessTokenPerSubject = SINGLE_ACCESS_TOKEN_PER_SUBJECT
|
391
393
|
obj.pkceRequired = PKCE_REQUIRED
|
392
394
|
obj.pkceS256Required = PKCE_S256_REQUIRED
|
395
|
+
obj.dynamicallyRegistered = DYNAMICALLY_REGISTERED
|
393
396
|
end
|
394
397
|
|
395
398
|
|
@@ -482,6 +485,7 @@ class ClientTest < Minitest::Test
|
|
482
485
|
assert_equal SINGLE_ACCESS_TOKEN_PER_SUBJECT, obj.singleAccessTokenPerSubject
|
483
486
|
assert_equal PKCE_REQUIRED, obj.pkceRequired
|
484
487
|
assert_equal PKCE_S256_REQUIRED, obj.pkceS256Required
|
488
|
+
assert_equal DYNAMICALLY_REGISTERED, obj.dynamicallyRegistered
|
485
489
|
end
|
486
490
|
|
487
491
|
|
@@ -188,6 +188,12 @@ class ServiceTest < Minitest::Test
|
|
188
188
|
TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY = false
|
189
189
|
TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED = false
|
190
190
|
TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED = false
|
191
|
+
JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY = false
|
192
|
+
JWT_GRANT_ENCRYPTED_JWT_REJECTED = false
|
193
|
+
JWT_GRANT_UNSIGNED_JWT_REJECTED = false
|
194
|
+
FEDERATION_SIGNATURE_KEY_ID = '<federation-signature-key-id>'
|
195
|
+
FEDERATION_CONFIGURATION_DURATION = 100
|
196
|
+
DCR_DUPLICATE_SOFTWARE_ID_BLOCKED = false
|
191
197
|
|
192
198
|
def generate_json
|
193
199
|
return <<~JSON
|
@@ -335,7 +341,13 @@ class ServiceTest < Minitest::Test
|
|
335
341
|
"tokenExchangeByConfidentialClientsOnly": false,
|
336
342
|
"tokenExchangeByPermittedClientsOnly": false,
|
337
343
|
"tokenExchangeEncryptedJwtRejected": false,
|
338
|
-
"tokenExchangeUnsignedJwtRejected": false
|
344
|
+
"tokenExchangeUnsignedJwtRejected": false,
|
345
|
+
"jwtGrantByIdentifiableClientsOnly": false,
|
346
|
+
"jwtGrantEncryptedJwtRejected": false,
|
347
|
+
"jwtGrantUnsignedJwtRejected": false,
|
348
|
+
"federationSignatureKeyId": "<federation-signature-key-id>",
|
349
|
+
"federationConfigurationDuration": 100,
|
350
|
+
"dcrDuplicateSoftwareIdBlocked": false
|
339
351
|
}
|
340
352
|
JSON
|
341
353
|
|
@@ -488,6 +500,12 @@ class ServiceTest < Minitest::Test
|
|
488
500
|
tokenExchangeByPermittedClientsOnly: false,
|
489
501
|
tokenExchangeEncryptedJwtRejected: false,
|
490
502
|
tokenExchangeUnsignedJwtRejected: false,
|
503
|
+
jwtGrantByIdentifiableClientsOnly: false,
|
504
|
+
jwtGrantEncryptedJwtRejected: false,
|
505
|
+
jwtGrantUnsignedJwtRejected: false,
|
506
|
+
federationSignatureKeyId: '<federation-signature-key-id>',
|
507
|
+
federationConfigurationDuration: 100,
|
508
|
+
dcrDuplicateSoftwareIdBlocked: false
|
491
509
|
}
|
492
510
|
end
|
493
511
|
|
@@ -635,9 +653,14 @@ class ServiceTest < Minitest::Test
|
|
635
653
|
obj.token_exchange_by_identifiable_clients_only = TOKEN_EXCHANGE_BY_IDENTIFIABLE_CLIENTS_ONLY
|
636
654
|
obj.token_exchange_by_confidential_clients_only = TOKEN_EXCHANGE_BY_CONFIDENTIAL_CLIENTS_ONLY
|
637
655
|
obj.token_exchange_by_permitted_clients_only = TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY
|
656
|
+
obj.jwt_grant_by_identifiable_clients_only = JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY
|
657
|
+
obj.jwt_grant_encrypted_jwt_rejected = JWT_GRANT_ENCRYPTED_JWT_REJECTED
|
658
|
+
obj.jwt_grant_unsigned_jwt_rejected = JWT_GRANT_UNSIGNED_JWT_REJECTED
|
659
|
+
obj.federation_signature_key_id = FEDERATION_SIGNATURE_KEY_ID
|
660
|
+
obj.federation_configuration_duration = FEDERATION_CONFIGURATION_DURATION
|
661
|
+
obj.dcr_duplicate_software_id_blocked = DCR_DUPLICATE_SOFTWARE_ID_BLOCKED
|
638
662
|
end
|
639
663
|
|
640
|
-
|
641
664
|
def match(obj)
|
642
665
|
assert_equal NUMBER, obj.number
|
643
666
|
assert_equal SERVICE_OWNER_NUMBER, obj.serviceOwnerNumber
|
@@ -798,6 +821,12 @@ class ServiceTest < Minitest::Test
|
|
798
821
|
assert_equal TOKEN_EXCHANGE_BY_PERMITTED_CLIENTS_ONLY, obj.token_exchange_by_permitted_clients_only
|
799
822
|
assert_equal TOKEN_EXCHANGE_ENCRYPTED_JWT_REJECTED, obj.token_exchange_encrypted_jwt_rejected
|
800
823
|
assert_equal TOKEN_EXCHANGE_UNSIGNED_JWT_REJECTED, obj.token_exchange_unsigned_jwt_rejected
|
824
|
+
assert_equal JWT_GRANT_BY_IDENTIFIABLE_CLIENTS_ONLY, obj.jwtGrantByIdentifiableClientsOnly
|
825
|
+
assert_equal JWT_GRANT_ENCRYPTED_JWT_REJECTED, obj.jwtGrantEncryptedJwtRejected
|
826
|
+
assert_equal JWT_GRANT_UNSIGNED_JWT_REJECTED, obj.jwtGrantUnsignedJwtRejected
|
827
|
+
assert_equal FEDERATION_SIGNATURE_KEY_ID, obj.federationSignatureKeyId
|
828
|
+
assert_equal FEDERATION_CONFIGURATION_DURATION, obj.federationConfigurationDuration
|
829
|
+
assert_equal DCR_DUPLICATE_SOFTWARE_ID_BLOCKED, obj.dcrDuplicateSoftwareIdBlocked
|
801
830
|
end
|
802
831
|
|
803
832
|
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authlete
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.26.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Takahiko Kawasaki
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2022-08-
|
12
|
+
date: 2022-08-23 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: rest-client
|