files.com 1.1.3 → 1.1.5

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e7e9f5238627784c9e8f5a5205cc69968a7cea8cc8960dbf161c554eeda2ce33
4
- data.tar.gz: d8f97881249ec3a71b713baa752d877b3a364f3f36b7ad5dfa04306dd198efc0
3
+ metadata.gz: 4c2e0388803cdaac806fb010497a65b76610cbfe6aed1e53214b4577ad2ce123
4
+ data.tar.gz: 3e868d57eb91c00238e0b3433fd2be29eb1ed1a19e16376cdf7545480a19a3e0
5
5
  SHA512:
6
- metadata.gz: e270b0f252e971f03ea2b49d0b2afb8b25949bdc1370fa6619af9d32157cd6bda9299813f871c83a06a5df6481bc24086364400ae4f45bafca87000c2d0580c6
7
- data.tar.gz: 709e26324054a511c47367634b3d0569aa191463cadaf852c16f7a0d6e27bb38c81f2df56f9956b86daf5a771700b571d832d74e73c09f727fc86099c37b50b9
6
+ metadata.gz: c06383e3d14e002b59e131c3e8309edb8c393c71307a1b452f92fd136fc942456f82ae09c93146ef2d0f472ac1fd0e2c07c65b29d9d47a186ed1662a4d64807d
7
+ data.tar.gz: 3ef209022f4312e96149d28d10da8214c2b1b63582c52b65a4535bd6945a166d00dd8c26af1217ca76b6bba986beea54f6a01dfb6637e57b2df62d9fdfd01271
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.3
1
+ 1.1.5
data/docs/sso_strategy.md CHANGED
@@ -9,6 +9,7 @@
9
9
  "label": "My Corporate SSO Provider",
10
10
  "logo_url": "https://mysite.files.com/.../logo.png",
11
11
  "id": 1,
12
+ "user_count": 1,
12
13
  "saml_provider_cert_fingerprint": "example",
13
14
  "saml_provider_issuer_url": "example",
14
15
  "saml_provider_metadata_content": "example",
@@ -56,6 +57,7 @@
56
57
  * `label` (string): Custom label for the SSO provider on the login page.
57
58
  * `logo_url` (string): URL holding a custom logo for the SSO provider on the login page.
58
59
  * `id` (int64): ID
60
+ * `user_count` (int64): Count of users with this SSO Strategy
59
61
  * `saml_provider_cert_fingerprint` (string): Identity provider sha256 cert fingerprint if saml_provider_metadata_url is not available.
60
62
  * `saml_provider_issuer_url` (string): Identity provider issuer url
61
63
  * `saml_provider_metadata_content` (string): Custom identity provider metadata
@@ -28,17 +28,18 @@ module Files
28
28
  class NotImplementedError < Error; end
29
29
 
30
30
  class APIError < Error
31
- attr_reader :detail, :error, :errors, :http_code, :instance, :model_errors, :title, :type
31
+ attr_reader :detail, :error, :errors, :http_code, :instance, :model_errors, :title, :type, :data
32
32
 
33
33
  def initialize(message = nil, **kwargs)
34
- @detail = kwargs.dig(:json_body, 'detail')
35
- @error = kwargs.dig(:json_body, 'error')
36
- @errors = kwargs.dig(:json_body, 'errors')
37
- @http_code = kwargs.dig(:json_body, 'http-code')
38
- @instance = kwargs.dig(:json_body, 'instance')
39
- @model_errors = kwargs.dig(:json_body, 'model_errors')
40
- @title = kwargs.dig(:json_body, 'title')
41
- @type = kwargs.dig(:json_body, 'type')
34
+ @detail = kwargs.dig(:json_body, :detail)
35
+ @error = kwargs.dig(:json_body, :error)
36
+ @errors = kwargs.dig(:json_body, :errors)
37
+ @http_code = kwargs.dig(:json_body, :'http-code')
38
+ @instance = kwargs.dig(:json_body, :instance)
39
+ @model_errors = kwargs.dig(:json_body, :model_errors)
40
+ @title = kwargs.dig(:json_body, :title)
41
+ @type = kwargs.dig(:json_body, :type)
42
+ @data = kwargs.dig(:json_body, :data)
42
43
 
43
44
  super(message, **kwargs)
44
45
  end
@@ -34,6 +34,11 @@ module Files
34
34
  @attributes[:id]
35
35
  end
36
36
 
37
+ # int64 - Count of users with this SSO Strategy
38
+ def user_count
39
+ @attributes[:user_count]
40
+ end
41
+
37
42
  # string - Identity provider sha256 cert fingerprint if saml_provider_metadata_url is not available.
38
43
  def saml_provider_cert_fingerprint
39
44
  @attributes[:saml_provider_cert_fingerprint]
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.3"
4
+ VERSION = "1.1.5"
5
5
  end
@@ -53,12 +53,24 @@ RSpec.describe Files::ApiClient do
53
53
  type: "bad-request/request-param-path-cannot-have-trailing-whitespace"
54
54
  }
55
55
  }
56
+ let(:bad_region_request_with_data) {
57
+ {
58
+ error: "You have connected to a URL that has different security settings than those required for your site.",
59
+ 'http-code': 403,
60
+ title: "Lockout Region Mismatch",
61
+ type: "not-authenticated/lockout-region-mismatch",
62
+ data: {
63
+ host: "test.host"
64
+ }
65
+ }
66
+ }
56
67
  let(:bad_request_without_data) {
57
68
  {
58
69
  error: 'Bad Request'
59
70
  }
60
71
  }
61
72
  let(:mock_good_response) { { status: 400, headers: {}, body: bad_request_with_data.to_json } }
73
+ let(:mock_good_region_response) { { status: 403, headers: {}, body: bad_region_request_with_data.to_json } }
62
74
  let(:mock_response_without_type) { { status: 400, headers: {}, body: bad_request_without_data.to_json } }
63
75
  let(:mock_empty_response) { { status: 400, headers: {}, body: '' } }
64
76
 
@@ -66,7 +78,14 @@ RSpec.describe Files::ApiClient do
66
78
  allow(subject).to receive(:log_request).and_raise(Faraday::BadRequestError.new('', mock_good_response))
67
79
  expect {
68
80
  subject.execute_request_with_rescues(1, context) { 'empty block' }
69
- }.to raise_error(Files::RequestParamPathCannotHaveTrailingWhitespaceError, bad_request_with_data[:error])
81
+ }.to raise_error do |error|
82
+ expect(error).to be_a(Files::RequestParamPathCannotHaveTrailingWhitespaceError)
83
+ expect(error.message).to eq bad_request_with_data[:error]
84
+ expect(error.title).to eq "Request Param Path Cannot Have Trailing Whitespace"
85
+ expect(error.type).to eq "bad-request/request-param-path-cannot-have-trailing-whitespace"
86
+ expect(error.http_code).to eq 400
87
+ expect(error.data).to be_nil
88
+ end
70
89
  end
71
90
 
72
91
  it "throws generic bad request error when no type" do
@@ -82,5 +101,20 @@ RSpec.describe Files::ApiClient do
82
101
  subject.execute_request_with_rescues(1, context) { 'empty block' }
83
102
  }.to raise_error(Files::APIConnectionError)
84
103
  end
104
+
105
+ it "handles region lockout error response" do
106
+ allow(subject).to receive(:log_request).and_raise(Faraday::BadRequestError.new('', mock_good_region_response))
107
+ expect {
108
+ subject.execute_request_with_rescues(1, context) { 'empty block' }
109
+ }.to raise_error do |error|
110
+ expect(error).to be_a(Files::LockoutRegionMismatchError)
111
+ expect(error.message).to eq bad_region_request_with_data[:error]
112
+ expect(error.title).to eq "Lockout Region Mismatch"
113
+ expect(error.type).to eq "not-authenticated/lockout-region-mismatch"
114
+ expect(error.http_code).to eq 403
115
+ expect(error.data).to have_key(:host)
116
+ expect(error.data[:host]).to eq "test.host"
117
+ end
118
+ end
85
119
  end
86
120
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.3
4
+ version: 1.1.5
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-12-13 00:00:00.000000000 Z
11
+ date: 2023-12-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable