openid_connect 0.0.26 → 0.0.27
Sign up to get free protection for your applications and to get access to all the features.
data/.travis.yml
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
0.0.
|
1
|
+
0.0.27
|
@@ -28,19 +28,10 @@ module Rack
|
|
28
28
|
include IdTokenResponse
|
29
29
|
attr_required :id_token, :private_key
|
30
30
|
|
31
|
-
def
|
32
|
-
|
31
|
+
def protocol_params_location
|
32
|
+
:fragment
|
33
33
|
end
|
34
34
|
|
35
|
-
def redirect_uri_with_credentials_with_id_token
|
36
|
-
_redirect_uri_ = URI.parse redirect_uri_with_credentials_without_id_token
|
37
|
-
_redirect_uri_.fragment = {
|
38
|
-
:id_token => jwt_string
|
39
|
-
}.to_query
|
40
|
-
_redirect_uri_.to_s
|
41
|
-
end
|
42
|
-
alias_method_chain :redirect_uri_with_credentials, :id_token
|
43
|
-
|
44
35
|
end
|
45
36
|
end
|
46
37
|
end
|
@@ -26,11 +26,13 @@ describe Rack::OAuth2::Server::Authorize::Extension::CodeAndIdToken do
|
|
26
26
|
end
|
27
27
|
end
|
28
28
|
its(:status) { should == 302 }
|
29
|
-
its(:location) { should
|
29
|
+
its(:location) { should include "#{redirect_uri}#" }
|
30
|
+
its(:location) { should include "code=#{code}" }
|
31
|
+
its(:location) { should include "id_token=#{id_token.to_jwt(private_key)}" }
|
30
32
|
|
31
33
|
context 'when id_token is String' do
|
32
|
-
let(:id_token) { '
|
33
|
-
its(:location) { should
|
34
|
+
let(:id_token) { 'non_jwt_string' }
|
35
|
+
its(:location) { should include "id_token=non_jwt_string" }
|
34
36
|
end
|
35
37
|
|
36
38
|
context 'when private_key is missing' do
|
metadata
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
name: openid_connect
|
3
3
|
version: !ruby/object:Gem::Version
|
4
4
|
prerelease:
|
5
|
-
version: 0.0.
|
5
|
+
version: 0.0.27
|
6
6
|
platform: ruby
|
7
7
|
authors:
|
8
8
|
- nov matake
|
@@ -10,7 +10,7 @@ autorequire:
|
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
12
|
|
13
|
-
date: 2011-09-
|
13
|
+
date: 2011-09-20 00:00:00 Z
|
14
14
|
dependencies:
|
15
15
|
- !ruby/object:Gem::Dependency
|
16
16
|
name: json
|