authlete 1.25.0 → 1.26.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 79ece9b673c6fac13369ab9c416eb10bb32042187c6a715255aa4b57431a8e04
4
- data.tar.gz: '079c970bf19094115267b90ec8bcb3bcba325344b1f5fbe1cd57dea9961f7ca9'
3
+ metadata.gz: 4a3bead217fba752e6d6971b910416e9191712b694af9729bc080d48eb2150b1
4
+ data.tar.gz: 3106a4db8aa7b20df6307fbc49b2d27693594e6274512ea8ddf19b7436d57627
5
5
  SHA512:
6
- metadata.gz: 1d5bf5c451530b58976fa7cacccd92bb3b5783789ad3dea8d20acc5b5efada2138a3bb7874eaffab2b82b22de9e859d6b10f25ae95b608ae0b5b7c71d0f528c0
7
- data.tar.gz: d79415db8c6cdc3e2b595f7e7848af757f260658eef5329533bef8c6019921070ee3ab589534222fc6284ebb747e363d9b32f7e44fd77073ce3713761b0a0acd
6
+ metadata.gz: 84df551852f4561a775ac21045251feebba5e3c319ef1a6a503a9618679f6e332f3ad8fa0c1c5fd4023a937668dfa28dbbc7e65bf66078c8d92434d958c030b6
7
+ data.tar.gz: '0049b9381bb5af3d8e1909eb54b168f66ecccd1c24980f381581d74e4c357cd88e28bcc4c9d1b354a2d81397f5ea4ac14cb53918b137a294bae13024a8971a54'
@@ -319,7 +319,12 @@ module Authlete
319
319
 
320
320
  attr_accessor :pkceS256Required
321
321
  alias_method :pkce_s256_required, :pkceS256Required
322
- alias_method :pkce_s256_required=, :pkceS256Required=
322
+ alias_method :pkce_s256_required=, :pkceS256Required=
323
+
324
+ attr_accessor :dynamicallyRegistered
325
+ alias_method :dynamically_registered, :dynamicallyRegistered
326
+ alias_method :dynamically_registered=, :dynamicallyRegistered=
327
+
323
328
  private
324
329
 
325
330
  def defaults
@@ -403,6 +408,7 @@ module Authlete
403
408
  singleAccessTokenPerSubject: false,
404
409
  pkceRequired: false,
405
410
  pkceS256Required: false,
411
+ dynamicallyRegistered: false,
406
412
  }
407
413
  end
408
414
 
@@ -486,6 +492,7 @@ module Authlete
486
492
  @singleAccessTokenPerSubject = hash[:singleAccessTokenPerSubject]
487
493
  @pkceRequired = hash[:pkceRequired]
488
494
  @pkceS256Required = hash[:pkceS256Required]
495
+ @dynamicallyRegistered = hash[:dynamicallyRegistered]
489
496
  end
490
497
 
491
498
  def to_hash_value(key, var)
@@ -603,6 +603,10 @@ module Authlete
603
603
  alias_method :federation_configuration_duration, :federationConfigurationDuration
604
604
  alias_method :federation_configuration_duration=, :federationConfigurationDuration=
605
605
 
606
+ attr_accessor :dcrDuplicateSoftwareIdBlocked
607
+ alias_method :dcr_duplicate_software_id_blocked, :dcrDuplicateSoftwareIdBlocked
608
+ alias_method :dcr_duplicate_software_id_blocked=, :dcrDuplicateSoftwareIdBlocked=
609
+
606
610
  private
607
611
 
608
612
  def defaults
@@ -756,6 +760,7 @@ module Authlete
756
760
  jwtGrantUnsignedJwtRejected: false,
757
761
  federationSignatureKeyId: nil,
758
762
  federationConfigurationDuration: 0,
763
+ dcrDuplicateSoftwareIdBlocked: false,
759
764
  }
760
765
  end
761
766
 
@@ -909,6 +914,7 @@ module Authlete
909
914
  @jwtGrantUnsignedJwtRejected = hash[:jwtGrantUnsignedJwtRejected]
910
915
  @federationSignatureKeyId = hash[:federationSignatureKeyId]
911
916
  @federationConfigurationDuration = hash[:federationConfigurationDuration]
917
+ @dcrDuplicateSoftwareIdBlocked = hash[:dcrDuplicateSoftwareIdBlocked]
912
918
 
913
919
  end
914
920
 
@@ -16,5 +16,5 @@
16
16
 
17
17
 
18
18
  module Authlete
19
- VERSION = "1.25.0"
19
+ VERSION = "1.26.0"
20
20
  end
@@ -125,6 +125,7 @@ class ClientTest < Minitest::Test
125
125
  SINGLE_ACCESS_TOKEN_PER_SUBJECT = false
126
126
  PKCE_REQUIRED = false
127
127
  PKCE_S256_REQUIRED = false
128
+ DYNAMICALLY_REGISTERED = false
128
129
 
129
130
  def generate_json
130
131
  return <<~JSON
@@ -213,7 +214,8 @@ class ClientTest < Minitest::Test
213
214
  "digestAlgorithm": "<digest-algorithm>",
214
215
  "singleAccessTokenPerSubject": false,
215
216
  "pkceRequired": false,
216
- "pkceS256Required": false
217
+ "pkceS256Required": false,
218
+ "dynamicallyRegistered": false
217
219
  }
218
220
  JSON
219
221
  end
@@ -306,10 +308,10 @@ class ClientTest < Minitest::Test
306
308
  singleAccessTokenPerSubject: false,
307
309
  pkceRequired: false,
308
310
  pkceS256Required: false,
311
+ dynamicallyRegistered: false,
309
312
  }
310
313
  end
311
314
 
312
-
313
315
  def set_params(obj)
314
316
  obj.number = NUMBER
315
317
  obj.service_number = SERVICE_NUMBER
@@ -390,6 +392,7 @@ class ClientTest < Minitest::Test
390
392
  obj.singleAccessTokenPerSubject = SINGLE_ACCESS_TOKEN_PER_SUBJECT
391
393
  obj.pkceRequired = PKCE_REQUIRED
392
394
  obj.pkceS256Required = PKCE_S256_REQUIRED
395
+ obj.dynamicallyRegistered = DYNAMICALLY_REGISTERED
393
396
  end
394
397
 
395
398
 
@@ -482,6 +485,7 @@ class ClientTest < Minitest::Test
482
485
  assert_equal SINGLE_ACCESS_TOKEN_PER_SUBJECT, obj.singleAccessTokenPerSubject
483
486
  assert_equal PKCE_REQUIRED, obj.pkceRequired
484
487
  assert_equal PKCE_S256_REQUIRED, obj.pkceS256Required
488
+ assert_equal DYNAMICALLY_REGISTERED, obj.dynamicallyRegistered
485
489
  end
486
490
 
487
491
 
@@ -193,6 +193,7 @@ class ServiceTest < Minitest::Test
193
193
  JWT_GRANT_UNSIGNED_JWT_REJECTED = false
194
194
  FEDERATION_SIGNATURE_KEY_ID = '<federation-signature-key-id>'
195
195
  FEDERATION_CONFIGURATION_DURATION = 100
196
+ DCR_DUPLICATE_SOFTWARE_ID_BLOCKED = false
196
197
 
197
198
  def generate_json
198
199
  return <<~JSON
@@ -345,7 +346,8 @@ class ServiceTest < Minitest::Test
345
346
  "jwtGrantEncryptedJwtRejected": false,
346
347
  "jwtGrantUnsignedJwtRejected": false,
347
348
  "federationSignatureKeyId": "<federation-signature-key-id>",
348
- "federationConfigurationDuration": 100
349
+ "federationConfigurationDuration": 100,
350
+ "dcrDuplicateSoftwareIdBlocked": false
349
351
  }
350
352
  JSON
351
353
 
@@ -502,7 +504,8 @@ class ServiceTest < Minitest::Test
502
504
  jwtGrantEncryptedJwtRejected: false,
503
505
  jwtGrantUnsignedJwtRejected: false,
504
506
  federationSignatureKeyId: '<federation-signature-key-id>',
505
- federationConfigurationDuration: 100
507
+ federationConfigurationDuration: 100,
508
+ dcrDuplicateSoftwareIdBlocked: false
506
509
  }
507
510
  end
508
511
 
@@ -655,6 +658,7 @@ class ServiceTest < Minitest::Test
655
658
  obj.jwt_grant_unsigned_jwt_rejected = JWT_GRANT_UNSIGNED_JWT_REJECTED
656
659
  obj.federation_signature_key_id = FEDERATION_SIGNATURE_KEY_ID
657
660
  obj.federation_configuration_duration = FEDERATION_CONFIGURATION_DURATION
661
+ obj.dcr_duplicate_software_id_blocked = DCR_DUPLICATE_SOFTWARE_ID_BLOCKED
658
662
  end
659
663
 
660
664
  def match(obj)
@@ -822,6 +826,7 @@ class ServiceTest < Minitest::Test
822
826
  assert_equal JWT_GRANT_UNSIGNED_JWT_REJECTED, obj.jwtGrantUnsignedJwtRejected
823
827
  assert_equal FEDERATION_SIGNATURE_KEY_ID, obj.federationSignatureKeyId
824
828
  assert_equal FEDERATION_CONFIGURATION_DURATION, obj.federationConfigurationDuration
829
+ assert_equal DCR_DUPLICATE_SOFTWARE_ID_BLOCKED, obj.dcrDuplicateSoftwareIdBlocked
825
830
  end
826
831
 
827
832
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: authlete
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.25.0
4
+ version: 1.26.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Takahiko Kawasaki