rodauth-oauth 0.4.2 → 0.4.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +18 -28
- data/lib/rodauth/features/oauth.rb +2 -2
- data/lib/rodauth/oauth/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 96756ac8a30c904c5b832b64c47a00af9524810561d58c909b6f322da7348e8c
|
|
4
|
+
data.tar.gz: 965f6ff260bd86c2fcb7bbd2ba2bd131b453f04a39b73f99ef0860d2bc95b0e0
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: e7e257a12204599a27d0917f2b31c32906f0d4c566d51ee6d4fde146e2340e36afb9a932cff8bf37872d59259f4d43d423d1c1266f3066063c70aa334f83e119
|
|
7
|
+
data.tar.gz: 07c0e564e7636893f736f6e05f634684cd7bc28e9d0acfb53ba518357fab198bc878792a68bde6b988b8c8ddf2d3e2bb4d4ecebcd9c4bf68d85f75178cdd0fdf
|
data/CHANGELOG.md
CHANGED
|
@@ -2,13 +2,17 @@
|
|
|
2
2
|
|
|
3
3
|
## master
|
|
4
4
|
|
|
5
|
-
### 0.4.
|
|
5
|
+
### 0.4.3 (09/12/2020)
|
|
6
|
+
|
|
7
|
+
* Introspection requests made to an Authorization Server in "resource server" mode are not correctly encoding the body using the "application/x-www-form-urlencoded" format.
|
|
8
|
+
|
|
9
|
+
### 0.4.2 (24/11/2020)
|
|
6
10
|
|
|
7
11
|
### Bugfixes
|
|
8
12
|
|
|
9
|
-
* database
|
|
13
|
+
* database extensions were being run in resource server mode, when it's not expected that the oauth db tables are around.
|
|
10
14
|
|
|
11
|
-
### 0.4.1
|
|
15
|
+
### 0.4.1 (24/11/2020)
|
|
12
16
|
|
|
13
17
|
### Improvements
|
|
14
18
|
|
|
@@ -16,9 +20,9 @@ When in "Resource Server" mode, calling `rodauth.authorization_token` will now r
|
|
|
16
20
|
|
|
17
21
|
### Bugfixes
|
|
18
22
|
|
|
19
|
-
* An error
|
|
23
|
+
* An error occurred if the client passed an empty authorization header (`Authorization: ` or `Authorization: Bearer `), causing an unexpected error; It now responds with the proper `401 Unauthorized` status code.
|
|
20
24
|
|
|
21
|
-
### 0.4.0
|
|
25
|
+
### 0.4.0 (13/11/2020)
|
|
22
26
|
|
|
23
27
|
### Features
|
|
24
28
|
|
|
@@ -37,7 +41,7 @@ When in "Resource Server" mode, calling `rodauth.authorization_token` will now r
|
|
|
37
41
|
* rails tests were silently not running in CI;
|
|
38
42
|
* The CI suite was revamped, so that all Oauth tests would be run under rails as well. All versions from rails equal or above 5.0 are now targeted;
|
|
39
43
|
|
|
40
|
-
### 0.3.0
|
|
44
|
+
### 0.3.0 (8/10/2020)
|
|
41
45
|
|
|
42
46
|
#### Features
|
|
43
47
|
|
|
@@ -66,7 +70,7 @@ Use `rodauth.convert_timestamp` in the templates, whenever dates are displayed.
|
|
|
66
70
|
|
|
67
71
|
Set HTTP Cache headers for metadata responses, such as `/.well-known/oauth-authorization-server` and `/.well-known/openid-configuration`, so they can be stored at the edge. The cache will be valid for 1 day (this value isn't set by an option yet).
|
|
68
72
|
|
|
69
|
-
### 0.2.0
|
|
73
|
+
### 0.2.0 (9/9/2020)
|
|
70
74
|
|
|
71
75
|
#### Features
|
|
72
76
|
|
|
@@ -110,9 +114,7 @@ Fixed some mishandling of HTTP headers when in in resource-server mode.
|
|
|
110
114
|
* 97.7% test coverage;
|
|
111
115
|
* `rodauth-oauth` CI tests run against sqlite, postgresql and mysql.
|
|
112
116
|
|
|
113
|
-
### 0.1.0
|
|
114
|
-
|
|
115
|
-
(31/7/2020)
|
|
117
|
+
### 0.1.0 (31/7/2020)
|
|
116
118
|
|
|
117
119
|
#### Features
|
|
118
120
|
|
|
@@ -158,9 +160,7 @@ URI schemes for client applications redirect URIs have to be `https`. In order t
|
|
|
158
160
|
* fixed trailing "/" in the "issuer" value in server metadata (`https://server.com/` -> `https://server.com`).
|
|
159
161
|
|
|
160
162
|
|
|
161
|
-
### 0.0.6
|
|
162
|
-
|
|
163
|
-
(6/7/2020)
|
|
163
|
+
### 0.0.6 (6/7/2020)
|
|
164
164
|
|
|
165
165
|
#### Features
|
|
166
166
|
|
|
@@ -183,9 +183,7 @@ The `oauth_jwt` feature now supports JWT Secured Authorization Request (JAR) (se
|
|
|
183
183
|
Removed React Javascript from example applications.
|
|
184
184
|
|
|
185
185
|
|
|
186
|
-
### 0.0.5
|
|
187
|
-
|
|
188
|
-
(26/6/2020)
|
|
186
|
+
### 0.0.5 (26/6/2020)
|
|
189
187
|
|
|
190
188
|
#### Features
|
|
191
189
|
|
|
@@ -222,9 +220,7 @@ It **requires** the authorization to implement the server metadata endpoint (`/.
|
|
|
222
220
|
* option `scopes_param` renamed to `scope_param`;
|
|
223
221
|
*
|
|
224
222
|
|
|
225
|
-
## 0.0.4
|
|
226
|
-
|
|
227
|
-
(13/6/2020)
|
|
223
|
+
## 0.0.4 (13/6/2020)
|
|
228
224
|
|
|
229
225
|
### Features
|
|
230
226
|
|
|
@@ -261,9 +257,7 @@ The `oauth_jwt` feature now allows the usage of access tokens to authorize the g
|
|
|
261
257
|
|
|
262
258
|
* Fixed scope claim of JWT ("scopes" -> "scope");
|
|
263
259
|
|
|
264
|
-
## 0.0.3
|
|
265
|
-
|
|
266
|
-
(5/6/2020)
|
|
260
|
+
## 0.0.3 (5/6/2020)
|
|
267
261
|
|
|
268
262
|
### Features
|
|
269
263
|
|
|
@@ -295,9 +289,7 @@ end
|
|
|
295
289
|
* renamed the existing `use_oauth_implicit_grant_type` to `use_oauth_implicit_grant_type?`;
|
|
296
290
|
* It's now usable as JSON API (small caveat: POST authorize will still redirect on success...);
|
|
297
291
|
|
|
298
|
-
## 0.0.2
|
|
299
|
-
|
|
300
|
-
(29/5/2020)
|
|
292
|
+
## 0.0.2 (29/5/2020)
|
|
301
293
|
|
|
302
294
|
### Features
|
|
303
295
|
|
|
@@ -313,8 +305,6 @@ end
|
|
|
313
305
|
|
|
314
306
|
* usage of client secret for authorizing the generation of tokens, as the spec mandates (and refraining from them when doing PKCE).
|
|
315
307
|
|
|
316
|
-
## 0.0.1
|
|
317
|
-
|
|
318
|
-
(14/5/2020)
|
|
308
|
+
## 0.0.1 (14/5/2020)
|
|
319
309
|
|
|
320
310
|
Initial implementation of the Oauth 2.0 framework, with an example app done using roda.
|
|
@@ -624,9 +624,9 @@ module Rodauth
|
|
|
624
624
|
http.use_ssl = auth_url.scheme == "https"
|
|
625
625
|
|
|
626
626
|
request = Net::HTTP::Post.new(introspect_path)
|
|
627
|
-
request["content-type"] =
|
|
627
|
+
request["content-type"] = "application/x-www-form-urlencoded"
|
|
628
628
|
request["accept"] = json_response_content_type
|
|
629
|
-
request.
|
|
629
|
+
request.set_form_data({ "token_type_hint" => token_type_hint, "token" => token })
|
|
630
630
|
|
|
631
631
|
before_introspection_request(request)
|
|
632
632
|
response = http.request(request)
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: rodauth-oauth
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.4.
|
|
4
|
+
version: 0.4.3
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Tiago Cardoso
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2020-
|
|
11
|
+
date: 2020-12-10 00:00:00.000000000 Z
|
|
12
12
|
dependencies: []
|
|
13
13
|
description: Implementation of the OAuth 2.0 protocol on top of rodauth.
|
|
14
14
|
email:
|