doorkeeper-openid_connect 1.0.0 → 1.0.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 4a7c3aedaa20bdd3901db1b929c3c3bb99657741
4
- data.tar.gz: 87ac0f39c66b33ddbbf37507f3aed1d1982077b7
3
+ metadata.gz: ae67f5718e8a89e0ebca2879c0e160d85b605f05
4
+ data.tar.gz: eb28b2f5e753cd4844830358b7cca3c81ef4de6f
5
5
  SHA512:
6
- metadata.gz: 0a9d2fc390e85c552b1cfe7bd316864b5d86973044233f276e46dd442ce4fc566ff55e7b5132c671b04c045c761ffcedbe35419c5f3d70b1e30852300c1ab13b
7
- data.tar.gz: ae08481f8d98779741c9cd7daaceaea8825b178c8591e3d33423f9cb6bcfc399fa0331e899e776c4481a71bf8b384e7af7dbb77f980140d0d4c199aa342f585b
6
+ metadata.gz: 20967d5bcc944e7afd6a0788c67b4618d8c250e97afa180f8a11b27aef970e917d64229866feccfbb6900fd01c44ee0b0c2b6697186af96ef1f48cbacb518346
7
+ data.tar.gz: 57f7f47f3dcdbf6a6e226ad7416c4dbb75912d7bc2ab8dfe73002d4e969780e8cbb8190e27eaabd8f2682006afe8f09952dc173cbbb0ac9ea0ac3b370c9805d5
data/README.md CHANGED
@@ -42,12 +42,21 @@ Add the following to your config/initializers/doorkeeper_openid_connect.rb:
42
42
  -----END RSA PUBLIC KEY-----
43
43
  eol
44
44
 
45
+ resource_owner_from_access_token do |access_token|
46
+ # Example implementation:
47
+ # User.find_by(id: access_token.resource_owner_id)
48
+ end
49
+
45
50
  issuer 'issuer string'
46
51
 
47
52
  subject do |resource_owner|
48
- resource_owner.key
53
+ # Example implementation:
54
+ # resource_owner.key
49
55
  end
50
56
 
57
+ # Expiration time on or after which the ID Token MUST NOT be accepted for processing. (default 120 seconds).
58
+ # expiration 600
59
+
51
60
  claims do
52
61
  claim :_foo_ do |resource_owner|
53
62
  resource_owner.foo
@@ -66,13 +75,18 @@ The following configurations are required:
66
75
 
67
76
  * jws_private_key - private key for JSON Web Signature(https://tools.ietf.org/html/draft-ietf-jose-json-web-signature-31)
68
77
  * jws_public_key - public key for JSON Web Signature(https://tools.ietf.org/html/draft-ietf-jose-json-web-signature-31)
69
- * issuer - Issuer Identifier for the Issuer of the response. The iss value is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components and no query or fragment components.
70
78
  * resource_owner_from_access_token - defines how to translate the doorkeeper access_token to a resource owner model
71
79
 
72
80
  Given a resource owner, the following claims are required:
73
81
 
82
+ * issuer - REQUIRED. Issuer Identifier for the Issuer of the response. The iss value is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components and no query or fragment components.
74
83
  * subject - REQUIRED. Subject Identifier. A locally unique and never reassigned identifier within the Issuer for the End-User, which is intended to be consumed by the Client, e.g., 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4. It MUST NOT exceed 255 ASCII characters in length. The sub value is a case sensitive string.
75
84
 
85
+ Exp claim can optionally be specified by expiration configuration.
86
+
87
+ * exp - REQUIRED. Expiration time on or after which the ID Token MUST NOT be accepted for processing. The processing of this parameter requires that the current date/time MUST be before the expiration date/time listed in the value. Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew. Its value is a JSON number representing the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the date/time. See RFC 3339 [RFC3339] for details regarding date/times in general and UTC in particular.
88
+ * Default 120 seconds
89
+
76
90
  Custom claims can optionally be specified in a `claims` block. The following claim types are currently supported:
77
91
 
78
92
  * normal_claim - Normal claims (http://openid.net/specs/openid-connect-core-1_0.html#NormalClaims) - specify claim name and a block using resource_owner to determine the claim value.
@@ -119,7 +119,9 @@ module Doorkeeper
119
119
  nil
120
120
  end)
121
121
 
122
+ option :expiration, default: 120
123
+
122
124
  option :claims, builder_class: ClaimsBuilder
123
125
  end
124
126
  end
125
- end
127
+ end
@@ -1,5 +1,5 @@
1
1
  module Doorkeeper
2
2
  module OpenidConnect
3
- VERSION = '1.0.0'
3
+ VERSION = '1.0.1'
4
4
  end
5
5
  end
@@ -53,6 +53,16 @@ describe Doorkeeper::OpenidConnect, 'configuration' do
53
53
  end
54
54
  end
55
55
 
56
+ describe 'expiration' do
57
+ it 'sets the value that is accessible via expiration' do
58
+ value = ''
59
+ Doorkeeper::OpenidConnect.configure do
60
+ expiration value
61
+ end
62
+ expect(subject.expiration).to eq(value)
63
+ end
64
+ end
65
+
56
66
  describe 'claims' do
57
67
  it 'sets the claims configuration that is accessible via claims' do
58
68
  Doorkeeper::OpenidConnect.configure do
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: doorkeeper-openid_connect
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.0
4
+ version: 1.0.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Sam Dengler
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2015-03-24 00:00:00.000000000 Z
11
+ date: 2015-05-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: railties