authlete 1.25.0 → 1.26.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4a3bead217fba752e6d6971b910416e9191712b694af9729bc080d48eb2150b1
|
4
|
+
data.tar.gz: 3106a4db8aa7b20df6307fbc49b2d27693594e6274512ea8ddf19b7436d57627
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 84df551852f4561a775ac21045251feebba5e3c319ef1a6a503a9618679f6e332f3ad8fa0c1c5fd4023a937668dfa28dbbc7e65bf66078c8d92434d958c030b6
|
7
|
+
data.tar.gz: '0049b9381bb5af3d8e1909eb54b168f66ecccd1c24980f381581d74e4c357cd88e28bcc4c9d1b354a2d81397f5ea4ac14cb53918b137a294bae13024a8971a54'
|
@@ -319,7 +319,12 @@ module Authlete
|
|
319
319
|
|
320
320
|
attr_accessor :pkceS256Required
|
321
321
|
alias_method :pkce_s256_required, :pkceS256Required
|
322
|
-
alias_method :pkce_s256_required=, :pkceS256Required=
|
322
|
+
alias_method :pkce_s256_required=, :pkceS256Required=
|
323
|
+
|
324
|
+
attr_accessor :dynamicallyRegistered
|
325
|
+
alias_method :dynamically_registered, :dynamicallyRegistered
|
326
|
+
alias_method :dynamically_registered=, :dynamicallyRegistered=
|
327
|
+
|
323
328
|
private
|
324
329
|
|
325
330
|
def defaults
|
@@ -403,6 +408,7 @@ module Authlete
|
|
403
408
|
singleAccessTokenPerSubject: false,
|
404
409
|
pkceRequired: false,
|
405
410
|
pkceS256Required: false,
|
411
|
+
dynamicallyRegistered: false,
|
406
412
|
}
|
407
413
|
end
|
408
414
|
|
@@ -486,6 +492,7 @@ module Authlete
|
|
486
492
|
@singleAccessTokenPerSubject = hash[:singleAccessTokenPerSubject]
|
487
493
|
@pkceRequired = hash[:pkceRequired]
|
488
494
|
@pkceS256Required = hash[:pkceS256Required]
|
495
|
+
@dynamicallyRegistered = hash[:dynamicallyRegistered]
|
489
496
|
end
|
490
497
|
|
491
498
|
def to_hash_value(key, var)
|
@@ -603,6 +603,10 @@ module Authlete
|
|
603
603
|
alias_method :federation_configuration_duration, :federationConfigurationDuration
|
604
604
|
alias_method :federation_configuration_duration=, :federationConfigurationDuration=
|
605
605
|
|
606
|
+
attr_accessor :dcrDuplicateSoftwareIdBlocked
|
607
|
+
alias_method :dcr_duplicate_software_id_blocked, :dcrDuplicateSoftwareIdBlocked
|
608
|
+
alias_method :dcr_duplicate_software_id_blocked=, :dcrDuplicateSoftwareIdBlocked=
|
609
|
+
|
606
610
|
private
|
607
611
|
|
608
612
|
def defaults
|
@@ -756,6 +760,7 @@ module Authlete
|
|
756
760
|
jwtGrantUnsignedJwtRejected: false,
|
757
761
|
federationSignatureKeyId: nil,
|
758
762
|
federationConfigurationDuration: 0,
|
763
|
+
dcrDuplicateSoftwareIdBlocked: false,
|
759
764
|
}
|
760
765
|
end
|
761
766
|
|
@@ -909,6 +914,7 @@ module Authlete
|
|
909
914
|
@jwtGrantUnsignedJwtRejected = hash[:jwtGrantUnsignedJwtRejected]
|
910
915
|
@federationSignatureKeyId = hash[:federationSignatureKeyId]
|
911
916
|
@federationConfigurationDuration = hash[:federationConfigurationDuration]
|
917
|
+
@dcrDuplicateSoftwareIdBlocked = hash[:dcrDuplicateSoftwareIdBlocked]
|
912
918
|
|
913
919
|
end
|
914
920
|
|
data/lib/authlete/version.rb
CHANGED
@@ -125,6 +125,7 @@ class ClientTest < Minitest::Test
|
|
125
125
|
SINGLE_ACCESS_TOKEN_PER_SUBJECT = false
|
126
126
|
PKCE_REQUIRED = false
|
127
127
|
PKCE_S256_REQUIRED = false
|
128
|
+
DYNAMICALLY_REGISTERED = false
|
128
129
|
|
129
130
|
def generate_json
|
130
131
|
return <<~JSON
|
@@ -213,7 +214,8 @@ class ClientTest < Minitest::Test
|
|
213
214
|
"digestAlgorithm": "<digest-algorithm>",
|
214
215
|
"singleAccessTokenPerSubject": false,
|
215
216
|
"pkceRequired": false,
|
216
|
-
"pkceS256Required": false
|
217
|
+
"pkceS256Required": false,
|
218
|
+
"dynamicallyRegistered": false
|
217
219
|
}
|
218
220
|
JSON
|
219
221
|
end
|
@@ -306,10 +308,10 @@ class ClientTest < Minitest::Test
|
|
306
308
|
singleAccessTokenPerSubject: false,
|
307
309
|
pkceRequired: false,
|
308
310
|
pkceS256Required: false,
|
311
|
+
dynamicallyRegistered: false,
|
309
312
|
}
|
310
313
|
end
|
311
314
|
|
312
|
-
|
313
315
|
def set_params(obj)
|
314
316
|
obj.number = NUMBER
|
315
317
|
obj.service_number = SERVICE_NUMBER
|
@@ -390,6 +392,7 @@ class ClientTest < Minitest::Test
|
|
390
392
|
obj.singleAccessTokenPerSubject = SINGLE_ACCESS_TOKEN_PER_SUBJECT
|
391
393
|
obj.pkceRequired = PKCE_REQUIRED
|
392
394
|
obj.pkceS256Required = PKCE_S256_REQUIRED
|
395
|
+
obj.dynamicallyRegistered = DYNAMICALLY_REGISTERED
|
393
396
|
end
|
394
397
|
|
395
398
|
|
@@ -482,6 +485,7 @@ class ClientTest < Minitest::Test
|
|
482
485
|
assert_equal SINGLE_ACCESS_TOKEN_PER_SUBJECT, obj.singleAccessTokenPerSubject
|
483
486
|
assert_equal PKCE_REQUIRED, obj.pkceRequired
|
484
487
|
assert_equal PKCE_S256_REQUIRED, obj.pkceS256Required
|
488
|
+
assert_equal DYNAMICALLY_REGISTERED, obj.dynamicallyRegistered
|
485
489
|
end
|
486
490
|
|
487
491
|
|
@@ -193,6 +193,7 @@ class ServiceTest < Minitest::Test
|
|
193
193
|
JWT_GRANT_UNSIGNED_JWT_REJECTED = false
|
194
194
|
FEDERATION_SIGNATURE_KEY_ID = '<federation-signature-key-id>'
|
195
195
|
FEDERATION_CONFIGURATION_DURATION = 100
|
196
|
+
DCR_DUPLICATE_SOFTWARE_ID_BLOCKED = false
|
196
197
|
|
197
198
|
def generate_json
|
198
199
|
return <<~JSON
|
@@ -345,7 +346,8 @@ class ServiceTest < Minitest::Test
|
|
345
346
|
"jwtGrantEncryptedJwtRejected": false,
|
346
347
|
"jwtGrantUnsignedJwtRejected": false,
|
347
348
|
"federationSignatureKeyId": "<federation-signature-key-id>",
|
348
|
-
"federationConfigurationDuration": 100
|
349
|
+
"federationConfigurationDuration": 100,
|
350
|
+
"dcrDuplicateSoftwareIdBlocked": false
|
349
351
|
}
|
350
352
|
JSON
|
351
353
|
|
@@ -502,7 +504,8 @@ class ServiceTest < Minitest::Test
|
|
502
504
|
jwtGrantEncryptedJwtRejected: false,
|
503
505
|
jwtGrantUnsignedJwtRejected: false,
|
504
506
|
federationSignatureKeyId: '<federation-signature-key-id>',
|
505
|
-
federationConfigurationDuration: 100
|
507
|
+
federationConfigurationDuration: 100,
|
508
|
+
dcrDuplicateSoftwareIdBlocked: false
|
506
509
|
}
|
507
510
|
end
|
508
511
|
|
@@ -655,6 +658,7 @@ class ServiceTest < Minitest::Test
|
|
655
658
|
obj.jwt_grant_unsigned_jwt_rejected = JWT_GRANT_UNSIGNED_JWT_REJECTED
|
656
659
|
obj.federation_signature_key_id = FEDERATION_SIGNATURE_KEY_ID
|
657
660
|
obj.federation_configuration_duration = FEDERATION_CONFIGURATION_DURATION
|
661
|
+
obj.dcr_duplicate_software_id_blocked = DCR_DUPLICATE_SOFTWARE_ID_BLOCKED
|
658
662
|
end
|
659
663
|
|
660
664
|
def match(obj)
|
@@ -822,6 +826,7 @@ class ServiceTest < Minitest::Test
|
|
822
826
|
assert_equal JWT_GRANT_UNSIGNED_JWT_REJECTED, obj.jwtGrantUnsignedJwtRejected
|
823
827
|
assert_equal FEDERATION_SIGNATURE_KEY_ID, obj.federationSignatureKeyId
|
824
828
|
assert_equal FEDERATION_CONFIGURATION_DURATION, obj.federationConfigurationDuration
|
829
|
+
assert_equal DCR_DUPLICATE_SOFTWARE_ID_BLOCKED, obj.dcrDuplicateSoftwareIdBlocked
|
825
830
|
end
|
826
831
|
|
827
832
|
|