oauthenticator 1.4.0 → 1.4.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 98e9bd15e6f01dd9896f6d499d3141f56614f93fd13fc9ac000c24796e74c5c2
4
- data.tar.gz: 5479b9b613a4a0b77758a325a007e258dbeaa9b9aaa430414223737870abb7b3
3
+ metadata.gz: 781f1dc15efaf29b18f10bd6d17658afaecb9569150d5bb8aa665a97e2970f1c
4
+ data.tar.gz: c233a50d0369b7f08ba951ced36fc71c1ab139ed8fb5ff8989f78f5d8882f696
5
5
  SHA512:
6
- metadata.gz: 6920168511a6582d34d4f4201e9c9d2c24adce1968389dc72e8d33878477b2a78d378aa4a140a817790ef41a8983c8ab620c631c83e6790333d7a7a3df41beff
7
- data.tar.gz: 4260c1569b7a47d3bc1e9c3e40fb559cda77f5f1e888edeef1cb5943a927afd600f99348d0e6483a0de53005ad14707cd5e307e5509e41a138590c8190f9456f
6
+ metadata.gz: 0f18da06cfbba676551ff8cdd0c534b77dde1a3c132645f473cfb1cfabd1adff9c1e75fbb964bad7b1c3614f1023252a6bc6dd0fbfb724695a7839e142f9a6b5
7
+ data.tar.gz: 04107cc48f5fd8f068393f81545c7007f050c9b3743d8716802f3339ced9d7cf989b119a9f87ed38796fc552f3dea8edbb5158e6b6b1cd21fda1ca87074ab41c
data/CHANGELOG.md CHANGED
@@ -1,3 +1,8 @@
1
+ # 1.4.1
2
+
3
+ - compatible with rack 3
4
+ - compatible with faraday 2
5
+
1
6
  # 1.4.0
2
7
 
3
8
  - support signature methods HMAC-SHA256, HMAC-SHA512
data/README.md CHANGED
@@ -142,7 +142,7 @@ module AwesomeOAuthConfig
142
142
  %w(HMAC-SHA1 RSA-SHA1)
143
143
  end
144
144
 
145
- # consumer secret, looked up by consumer key from awesome storage
145
+ # consumer secret, looked up by consumer key from ActiveRecord storage
146
146
  def consumer_secret
147
147
  OAuthConsumer.where(:key => consumer_key).first.try(:secret)
148
148
  end
@@ -159,7 +159,7 @@ module AwesomeOAuthConfig
159
159
  # OAuthToken.where(:token => token, :consumer_key => consumer_key).any?
160
160
  end
161
161
 
162
- # whether oauth_body_hash_is_required (this method defaults to false and may be omitted)
162
+ # whether oauth_body_hash is required (this method defaults to false and may be omitted)
163
163
  def body_hash_required?
164
164
  false
165
165
  end
@@ -57,25 +57,21 @@ module OAuthenticator
57
57
  return attributes.map { |k,v| {k => v.first} }.inject({}, &:update)
58
58
  end
59
59
 
60
+ # @private
61
+ URI_PARSER = URI.const_defined?(:DEFAULT_PARSER) ? URI::DEFAULT_PARSER : URI
62
+
60
63
  # escape a value
61
64
  # @param value [String] value
62
65
  # @return [String] escaped value
63
66
  def escape(value)
64
- uri_parser.escape(value.to_s, /[^a-z0-9\-\.\_\~]/i)
67
+ URI_PARSER.escape(value.to_s, /[^a-z0-9\-\.\_\~]/i)
65
68
  end
66
69
 
67
70
  # unescape a value
68
71
  # @param value [String] escaped value
69
72
  # @return [String] unescaped value
70
73
  def unescape(value)
71
- uri_parser.unescape(value.to_s)
72
- end
73
-
74
- private
75
-
76
- # @return [Object] a parser that responds to #escape and #unescape
77
- def uri_parser
78
- @uri_parser ||= URI.const_defined?(:Parser) ? URI::Parser.new : URI
74
+ URI_PARSER.unescape(value.to_s)
79
75
  end
80
76
  end
81
77
  end
@@ -9,7 +9,7 @@ module OAuthenticator
9
9
  # body a JSON object indicating errors encountered authenticating the request. The error object is
10
10
  # structured like rails / ActiveResource:
11
11
  #
12
- # {'errors': {'attribute1': ['messageA', 'messageB'], 'attribute2': ['messageC']}}
12
+ # {'errors' => {'attribute1' => ['messageA', 'messageB'], 'attribute2' => ['messageC']}}
13
13
  class RackAuthenticator
14
14
  # options:
15
15
  #
@@ -201,7 +201,7 @@ module OAuthenticator
201
201
 
202
202
  # section 3.4.1.3
203
203
  #
204
- # @return [Array<Array<String> (size 2)>]
204
+ # @return [Array<Array<String, nil> (size 2)>]
205
205
  def normalized_request_params
206
206
  query_params + protocol_params.reject { |k,v| %w(realm oauth_signature).include?(k) }.to_a + entity_params
207
207
  end
@@ -281,7 +281,7 @@ module OAuthenticator
281
281
  #
282
282
  # @return [Boolean]
283
283
  def hash_body?
284
- BODY_HASH_METHODS[signature_method] && !form_encoded? &&
284
+ BODY_HASH_METHODS.key?(signature_method) && !form_encoded? &&
285
285
  (@attributes.key?('hash_body?') ? @attributes['hash_body?'] : true)
286
286
  end
287
287
 
@@ -93,7 +93,7 @@ module OAuthenticator
93
93
  #
94
94
  # @return [nil, Hash<String, Array<String>>] either nil or a hash of errors
95
95
  def errors
96
- return @errors if instance_variables.any? { |ivar| ivar.to_s == '@errors' }
96
+ return @errors if instance_variable_defined?('@errors')
97
97
  @errors = catch(:errors) do
98
98
  if authorization.nil?
99
99
  throw(:errors, {'Authorization' => ["Authorization header is missing"]})
@@ -1,5 +1,5 @@
1
1
  # OAuthenticator
2
2
  module OAuthenticator
3
3
  # OAuthenticator::VERSION
4
- VERSION = "1.4.0"
4
+ VERSION = "1.4.1"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: oauthenticator
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.4.0
4
+ version: 1.4.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Ethan
8
- autorequire:
8
+ autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-01-13 00:00:00.000000000 Z
11
+ date: 2023-02-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rack
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '1.4'
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
- version: '3.0'
22
+ version: '4.0'
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '1.4'
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
- version: '3.0'
32
+ version: '4.0'
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: json
35
35
  requirement: !ruby/object:Gem::Requirement
@@ -53,7 +53,7 @@ dependencies:
53
53
  version: '0.9'
54
54
  - - "<"
55
55
  - !ruby/object:Gem::Version
56
- version: '2.0'
56
+ version: '3.0'
57
57
  type: :runtime
58
58
  prerelease: false
59
59
  version_requirements: !ruby/object:Gem::Requirement
@@ -63,7 +63,7 @@ dependencies:
63
63
  version: '0.9'
64
64
  - - "<"
65
65
  - !ruby/object:Gem::Version
66
- version: '2.0'
66
+ version: '3.0'
67
67
  - !ruby/object:Gem::Dependency
68
68
  name: addressable
69
69
  requirement: !ruby/object:Gem::Requirement
@@ -78,118 +78,6 @@ dependencies:
78
78
  - - "~>"
79
79
  - !ruby/object:Gem::Version
80
80
  version: '2.3'
81
- - !ruby/object:Gem::Dependency
82
- name: rake
83
- requirement: !ruby/object:Gem::Requirement
84
- requirements:
85
- - - ">="
86
- - !ruby/object:Gem::Version
87
- version: '0'
88
- type: :development
89
- prerelease: false
90
- version_requirements: !ruby/object:Gem::Requirement
91
- requirements:
92
- - - ">="
93
- - !ruby/object:Gem::Version
94
- version: '0'
95
- - !ruby/object:Gem::Dependency
96
- name: minitest
97
- requirement: !ruby/object:Gem::Requirement
98
- requirements:
99
- - - ">="
100
- - !ruby/object:Gem::Version
101
- version: '0'
102
- type: :development
103
- prerelease: false
104
- version_requirements: !ruby/object:Gem::Requirement
105
- requirements:
106
- - - ">="
107
- - !ruby/object:Gem::Version
108
- version: '0'
109
- - !ruby/object:Gem::Dependency
110
- name: minitest-reporters
111
- requirement: !ruby/object:Gem::Requirement
112
- requirements:
113
- - - ">="
114
- - !ruby/object:Gem::Version
115
- version: '0'
116
- type: :development
117
- prerelease: false
118
- version_requirements: !ruby/object:Gem::Requirement
119
- requirements:
120
- - - ">="
121
- - !ruby/object:Gem::Version
122
- version: '0'
123
- - !ruby/object:Gem::Dependency
124
- name: rack-test
125
- requirement: !ruby/object:Gem::Requirement
126
- requirements:
127
- - - ">="
128
- - !ruby/object:Gem::Version
129
- version: '0'
130
- type: :development
131
- prerelease: false
132
- version_requirements: !ruby/object:Gem::Requirement
133
- requirements:
134
- - - ">="
135
- - !ruby/object:Gem::Version
136
- version: '0'
137
- - !ruby/object:Gem::Dependency
138
- name: timecop
139
- requirement: !ruby/object:Gem::Requirement
140
- requirements:
141
- - - ">="
142
- - !ruby/object:Gem::Version
143
- version: '0'
144
- type: :development
145
- prerelease: false
146
- version_requirements: !ruby/object:Gem::Requirement
147
- requirements:
148
- - - ">="
149
- - !ruby/object:Gem::Version
150
- version: '0'
151
- - !ruby/object:Gem::Dependency
152
- name: simplecov
153
- requirement: !ruby/object:Gem::Requirement
154
- requirements:
155
- - - ">="
156
- - !ruby/object:Gem::Version
157
- version: '0'
158
- type: :development
159
- prerelease: false
160
- version_requirements: !ruby/object:Gem::Requirement
161
- requirements:
162
- - - ">="
163
- - !ruby/object:Gem::Version
164
- version: '0'
165
- - !ruby/object:Gem::Dependency
166
- name: api_hammer
167
- requirement: !ruby/object:Gem::Requirement
168
- requirements:
169
- - - ">="
170
- - !ruby/object:Gem::Version
171
- version: '0'
172
- type: :development
173
- prerelease: false
174
- version_requirements: !ruby/object:Gem::Requirement
175
- requirements:
176
- - - ">="
177
- - !ruby/object:Gem::Version
178
- version: '0'
179
- - !ruby/object:Gem::Dependency
180
- name: yard
181
- requirement: !ruby/object:Gem::Requirement
182
- requirements:
183
- - - ">="
184
- - !ruby/object:Gem::Version
185
- version: '0'
186
- type: :development
187
- prerelease: false
188
- version_requirements: !ruby/object:Gem::Requirement
189
- requirements:
190
- - - ">="
191
- - !ruby/object:Gem::Version
192
- version: '0'
193
81
  description: OAuthenticator signs and authenticates OAuth 1.0 requests
194
82
  email:
195
83
  - ethan@unth
@@ -197,12 +85,10 @@ executables: []
197
85
  extensions: []
198
86
  extra_rdoc_files: []
199
87
  files:
200
- - ".simplecov"
201
88
  - ".yardopts"
202
89
  - CHANGELOG.md
203
90
  - LICENSE.txt
204
91
  - README.md
205
- - Rakefile.rb
206
92
  - lib/oauthenticator.rb
207
93
  - lib/oauthenticator/config_methods.rb
208
94
  - lib/oauthenticator/faraday_signer.rb
@@ -212,20 +98,11 @@ files:
212
98
  - lib/oauthenticator/signable_request.rb
213
99
  - lib/oauthenticator/signed_request.rb
214
100
  - lib/oauthenticator/version.rb
215
- - test/config_methods_test.rb
216
- - test/faraday_signer_test.rb
217
- - test/helper.rb
218
- - test/parse_authorization_test.rb
219
- - test/rack_authenticator_test.rb
220
- - test/rack_test_signer_test.rb
221
- - test/signable_request_test.rb
222
- - test/signed_request_test.rb
223
- - test/test_config_methods.rb
224
101
  homepage: https://github.com/notEthan/oauthenticator
225
102
  licenses:
226
103
  - MIT
227
104
  metadata: {}
228
- post_install_message:
105
+ post_install_message:
229
106
  rdoc_options: []
230
107
  require_paths:
231
108
  - lib
@@ -240,18 +117,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
240
117
  - !ruby/object:Gem::Version
241
118
  version: '0'
242
119
  requirements: []
243
- rubygems_version: 3.0.6
244
- signing_key:
120
+ rubygems_version: 3.1.6
121
+ signing_key:
245
122
  specification_version: 4
246
123
  summary: OAuth 1.0 request signing and authentication
247
- test_files:
248
- - test/config_methods_test.rb
249
- - test/faraday_signer_test.rb
250
- - test/helper.rb
251
- - test/parse_authorization_test.rb
252
- - test/rack_authenticator_test.rb
253
- - test/rack_test_signer_test.rb
254
- - test/signable_request_test.rb
255
- - test/signed_request_test.rb
256
- - test/test_config_methods.rb
257
- - ".simplecov"
124
+ test_files: []
data/.simplecov DELETED
@@ -1 +0,0 @@
1
- SimpleCov.start
data/Rakefile.rb DELETED
@@ -1,14 +0,0 @@
1
- require 'rake/testtask'
2
- Rake::TestTask.new do |t|
3
- t.name = 'test'
4
- t.test_files = FileList['test/**/*_test.rb']
5
- t.verbose = true
6
- end
7
- require 'wwtd/tasks'
8
- task 'default' => 'wwtd'
9
-
10
- require 'yard'
11
- YARD::Rake::YardocTask.new do |t|
12
- end
13
-
14
- require 'api_hammer/tasks'
@@ -1,44 +0,0 @@
1
- # encoding: utf-8
2
- proc { |p| $:.unshift(p) unless $:.any? { |lp| File.expand_path(lp) == p } }.call(File.expand_path('.', File.dirname(__FILE__)))
3
- require 'helper'
4
-
5
- describe OAuthenticator::SignedRequest do
6
- %w(timestamp_valid_period consumer_secret token_secret nonce_used? use_nonce! token_belongs_to_consumer?).each do |method_without_default|
7
- it "complains when #{method_without_default} is not implemented" do
8
- exc = assert_raises(NotImplementedError) do
9
- OAuthenticator::SignedRequest.new({}).public_send(method_without_default)
10
- end
11
- assert_match(/included in a subclass of OAuthenticator::SignedRequest/, exc.message)
12
- end
13
- it "uses the method #{method_without_default} when implemented" do
14
- called = false
15
- mod = Module.new { define_method(method_without_default) { called = true } }
16
- OAuthenticator::SignedRequest.including_config(mod).new({}).public_send(method_without_default)
17
- assert called
18
- end
19
- end
20
- it "complains when a method without a default is not implemented, using RackAuthenticator" do
21
- exc = assert_raises(NotImplementedError) do
22
- OAuthenticator::RackAuthenticator.new(proc {}, {:config_methods => Module.new}).call({'HTTP_AUTHORIZATION' => %q(OAuth oauth_timestamp="1")})
23
- end
24
- assert_match(/passed to OAuthenticator::RackAuthenticator using the option :config_methods./, exc.message)
25
- end
26
- it "complains RackAuthenticator is not given config methods" do
27
- assert_raises(ArgumentError) do
28
- OAuthenticator::RackAuthenticator.new(proc {})
29
- end
30
- end
31
- it 'uses timestamp_valid_period if that is implemented but timestamp_valid_past or timestamp_valid_future is not' do
32
- called = 0
33
- mod = Module.new { define_method(:timestamp_valid_period) { called +=1 } }
34
- OAuthenticator::SignedRequest.including_config(mod).new({}).public_send(:timestamp_valid_future)
35
- OAuthenticator::SignedRequest.including_config(mod).new({}).public_send(:timestamp_valid_past)
36
- assert_equal 2, called
37
- end
38
- it 'uses the default value for allowed signature methods' do
39
- assert_equal %w(RSA-SHA1 HMAC-SHA256 HMAC-SHA512 HMAC-SHA1 PLAINTEXT).sort, OAuthenticator::SignedRequest.new({}).allowed_signature_methods.sort
40
- end
41
- it 'uses default value for body_hash_required?' do
42
- assert_equal false, OAuthenticator::SignedRequest.new({}).body_hash_required?
43
- end
44
- end
@@ -1,82 +0,0 @@
1
- # encoding: utf-8
2
- proc { |p| $:.unshift(p) unless $:.any? { |lp| File.expand_path(lp) == p } }.call(File.expand_path('.', File.dirname(__FILE__)))
3
- require 'helper'
4
-
5
- # not going to test a ton here, since the Faraday middleware mostly just calls to SignableRequest which is
6
- # rather well-tested
7
- describe OAuthenticator::FaradaySigner do
8
- def assert_response(expected_status, expected_body, faraday_response)
9
- assert_equal expected_status.to_i, faraday_response.status.to_i, "Expected status to be #{expected_status.inspect}" +
10
- "; got #{faraday_response.status.inspect}. body was: #{faraday_response.body}"
11
- assert expected_body === faraday_response.body, "Expected match for #{expected_body}; got #{faraday_response.body}"
12
- end
13
-
14
- it 'succeeds' do
15
- signing_options = {
16
- :signature_method => 'PLAINTEXT',
17
- :consumer_key => consumer_key,
18
- :consumer_secret => consumer_secret,
19
- :token => token,
20
- :token_secret => token_secret,
21
- }
22
-
23
- connection = Faraday.new(:url => 'http://example.com') do |faraday|
24
- faraday.request :oauthenticator_signer, signing_options
25
- faraday.adapter :rack, oapp
26
- end
27
- response = connection.get '/'
28
- assert_response 200, '☺', response
29
- end
30
-
31
- it 'succeeds with form-encoded with HMAC' do
32
- signing_options = {
33
- :signature_method => 'HMAC-SHA1',
34
- :consumer_key => consumer_key,
35
- :consumer_secret => consumer_secret,
36
- :token => token,
37
- :token_secret => token_secret,
38
- }
39
-
40
- connection = Faraday.new(:url => 'http://example.com') do |faraday|
41
- faraday.request :url_encoded
42
- faraday.request :oauthenticator_signer, signing_options
43
- faraday.adapter :rack, oapp
44
- end
45
- response = connection.put('/', :foo => {:bar => :baz})
46
- assert_response 200, '☺', response
47
- end
48
-
49
- it 'succeeds with charset' do
50
- signing_options = {
51
- :signature_method => 'HMAC-SHA1',
52
- :consumer_key => consumer_key,
53
- :consumer_secret => consumer_secret,
54
- :token => token,
55
- :token_secret => token_secret,
56
- }
57
-
58
- connection = Faraday.new(:url => 'http://example.com', :headers => {'Content-Type' => 'application/x-www-form-urlencoded; charset=UTF-8'}) do |faraday|
59
- faraday.request :oauthenticator_signer, signing_options
60
- faraday.adapter :rack, oapp
61
- end
62
- response = connection.post('/', 'a=b')
63
- assert_response 200, '☺', response
64
- end
65
-
66
- it 'is unauthorized' do
67
- signing_options = {
68
- :signature_method => 'PLAINTEXT',
69
- :consumer_key => consumer_key,
70
- :consumer_secret => 'nope',
71
- :token => token,
72
- :token_secret => 'definitelynot',
73
- }
74
-
75
- connection = Faraday.new(:url => 'http://example.com') do |faraday|
76
- faraday.request :oauthenticator_signer, signing_options
77
- faraday.adapter :rack, oapp
78
- end
79
- response = connection.get '/'
80
- assert_response 401, /Authorization oauth_signature.*is invalid/m, response
81
- end
82
- end
data/test/helper.rb DELETED
@@ -1,30 +0,0 @@
1
- proc { |p| $:.unshift(p) unless $:.any? { |lp| File.expand_path(lp) == p } }.call(File.expand_path('../lib', File.dirname(__FILE__)))
2
-
3
- require 'simplecov'
4
-
5
- require 'byebug'
6
-
7
- # NO EXPECTATIONS
8
- ENV["MT_NO_EXPECTATIONS"] = ''
9
-
10
- require 'minitest/autorun'
11
- require 'minitest/reporters'
12
- Minitest::Reporters.use! Minitest::Reporters::SpecReporter.new
13
-
14
- require 'rack/test'
15
- require 'timecop'
16
-
17
- require 'oauthenticator'
18
-
19
- require 'test_config_methods'
20
-
21
- class OAuthenticatorConfigSpec < Minitest::Spec
22
- after do
23
- Timecop.return
24
- end
25
-
26
- include TestHelperMethods
27
- end
28
-
29
- # register this to be the base class for specs instead of Minitest::Spec
30
- Minitest::Spec.register_spec_type(//, OAuthenticatorConfigSpec)
@@ -1,86 +0,0 @@
1
- # encoding: utf-8
2
- proc { |p| $:.unshift(p) unless $:.any? { |lp| File.expand_path(lp) == p } }.call(File.expand_path('.', File.dirname(__FILE__)))
3
- require 'helper'
4
-
5
- describe 'OAuthenticator.parse_authorization' do
6
- let :spec_authorization do
7
- %q(OAuth realm="Example",
8
- oauth_consumer_key="9djdj82h48djs9d2",
9
- oauth_token="kkk9d7dh3k39sjv7",
10
- oauth_signature_method="HMAC-SHA1",
11
- oauth_timestamp="137131201",
12
- oauth_nonce="7d8f3e4a",
13
- oauth_signature="r6%2FTJjbCOr97%2F%2BUU0NsvSne7s5g%3D"
14
- )
15
- end
16
- let :spec_authorization_hash do
17
- {
18
- 'realm' => "Example",
19
- 'oauth_consumer_key' => "9djdj82h48djs9d2",
20
- 'oauth_token' => "kkk9d7dh3k39sjv7",
21
- 'oauth_signature_method' => "HMAC-SHA1",
22
- 'oauth_timestamp' => "137131201",
23
- 'oauth_nonce' => "7d8f3e4a",
24
- 'oauth_signature' => "r6/TJjbCOr97/+UU0NsvSne7s5g=",
25
- }
26
- end
27
-
28
- it 'parses the example in the spec' do
29
- assert_equal(spec_authorization_hash, OAuthenticator.parse_authorization(spec_authorization))
30
- end
31
- it 'parses the authorization SignableRequest calculates' do
32
- request = OAuthenticator::SignableRequest.new({
33
- :request_method => 'POST',
34
- :uri => 'http://example.com/request?b5=%3D%253D&a3=a&c%40=&a2=r%20b',
35
- :media_type => 'application/x-www-form-urlencoded',
36
- :body => 'c2&a3=2+q',
37
- :authorization => spec_authorization_hash,
38
- :consumer_secret => 'j49sk3j29djd',
39
- :token_secret => 'dh893hdasih9',
40
- })
41
- assert_equal(spec_authorization_hash, OAuthenticator.parse_authorization(request.authorization))
42
- end
43
-
44
- describe 'optional linear white space' do
45
- { :space => %q(OAuth a="b", c="d", e="f"),
46
- :spaces => %q(OAuth a="b", c="d", e="f" ),
47
- :tab => %q(OAuth a="b", c="d", e="f"),
48
- :tabs => %q(OAuth a="b", c="d", e="f"),
49
- :tabs_and_spaces => %q(OAuth a="b", c="d", e="f"),
50
- :none => %q(OAuth a="b",c="d",e="f"),
51
- }.map do |name, authorization|
52
- it "parses with #{name}" do
53
- assert_equal({'a' => 'b', 'c' => 'd', 'e' => 'f'}, OAuthenticator.parse_authorization(authorization))
54
- end
55
- end
56
- end
57
-
58
- it "handles commas inside quoted values" do
59
- # note that this is invalid according to the spec; commas should be %-encoded, but this is accepted in
60
- # the interests of robustness and consistency (other characters are accepted when they should really be
61
- # escaped).
62
- header_with_commas = 'OAuth oauth_consumer_key="a,bcd", oauth_nonce="o,LKtec51GQy", oauth_signature="efgh%2Cmnop"'
63
- assert_equal({'oauth_consumer_key' => "a,bcd", 'oauth_nonce' => "o,LKtec51GQy", 'oauth_signature' => "efgh,mnop"},
64
- OAuthenticator.parse_authorization(header_with_commas))
65
- end
66
-
67
- it "raises ParseError on input without a comma between key/value pairs" do
68
- assert_raises(OAuthenticator::ParseError) do
69
- OAuthenticator.parse_authorization(%q(OAuth oauth_consumer_key="k" oauth_nonce="n"))
70
- end
71
- end
72
-
73
- it "raises ParseError on malformed input" do
74
- assert_raises(OAuthenticator::ParseError) { OAuthenticator.parse_authorization(%q(OAuth huh=/)) }
75
- end
76
-
77
- it "raises ParseError when the header does not start with 'OAuth '" do
78
- assert_raises(OAuthenticator::ParseError) { OAuthenticator.parse_authorization(%q(FooAuth foo="baz")) }
79
- end
80
-
81
- it "raises DuplicatedParameter when the header contains duplicated parameters" do
82
- assert_raises(OAuthenticator::DuplicatedParameters) do
83
- OAuthenticator.parse_authorization(%q(OAuth oauth_nonce="a", oauth_nonce="b"))
84
- end
85
- end
86
- end