Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package rubygem-openid_connect for
openSUSE:Factory checked in at 2022-10-30 18:28:55
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/rubygem-openid_connect (Old)
and /work/SRC/openSUSE:Factory/.rubygem-openid_connect.new.2275 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "rubygem-openid_connect"
Sun Oct 30 18:28:55 2022 rev:9 rq:1032150 version:2.2.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/rubygem-openid_connect/rubygem-openid_connect.changes
2022-10-13 15:45:10.243092298 +0200
+++
/work/SRC/openSUSE:Factory/.rubygem-openid_connect.new.2275/rubygem-openid_connect.changes
2022-10-30 18:29:11.802501337 +0100
@@ -1,0 +2,13 @@
+Fri Oct 28 05:02:38 UTC 2022 - Stephan Kulow <[email protected]>
+
+updated to version 2.2.0
+ see installed CHANGELOG.md
+
+ ## [2.1.0] - 2022-10-10
+
+ ### Changed
+
+ - mTLS access token by @nov in https://github.com/nov/openid_connect/pull/76
+
+
+-------------------------------------------------------------------
Old:
----
openid_connect-2.1.0.gem
New:
----
openid_connect-2.2.0.gem
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ rubygem-openid_connect.spec ++++++
--- /var/tmp/diff_new_pack.CH4FJH/_old 2022-10-30 18:29:12.230503649 +0100
+++ /var/tmp/diff_new_pack.CH4FJH/_new 2022-10-30 18:29:12.234503672 +0100
@@ -24,7 +24,7 @@
#
Name: rubygem-openid_connect
-Version: 2.1.0
+Version: 2.2.0
Release: 0
%define mod_name openid_connect
%define mod_full_name %{mod_name}-%{version}
++++++ openid_connect-2.1.0.gem -> openid_connect-2.2.0.gem ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/CHANGELOG.md new/CHANGELOG.md
--- old/CHANGELOG.md 2022-10-10 04:34:15.000000000 +0200
+++ new/CHANGELOG.md 2022-10-11 08:50:59.000000000 +0200
@@ -1,5 +1,11 @@
## [Unreleased]
+## [2.1.0] - 2022-10-10
+
+### Changed
+
+- mTLS access token by @nov in https://github.com/nov/openid_connect/pull/76
+
## [2.0.0] - 2022-10-09
### Added
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/VERSION new/VERSION
--- old/VERSION 2022-10-10 04:34:15.000000000 +0200
+++ new/VERSION 2022-10-11 08:50:59.000000000 +0200
@@ -1 +1 @@
-2.1.0
\ No newline at end of file
+2.2.0
\ No newline at end of file
Binary files old/checksums.yaml.gz and new/checksums.yaml.gz differ
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/lib/openid_connect/access_token.rb
new/lib/openid_connect/access_token.rb
--- old/lib/openid_connect/access_token.rb 2022-10-10 04:34:15.000000000
+0200
+++ new/lib/openid_connect/access_token.rb 2022-10-11 08:50:59.000000000
+0200
@@ -28,7 +28,7 @@
res = yield
case res.status
when 200
- JSON.parse(res.body).with_indifferent_access
+ res.body.with_indifferent_access
when 400
raise BadRequest.new('API Access Faild', res)
when 401
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/lib/openid_connect/client/registrar.rb
new/lib/openid_connect/client/registrar.rb
--- old/lib/openid_connect/client/registrar.rb 2022-10-10 04:34:15.000000000
+0200
+++ new/lib/openid_connect/client/registrar.rb 2022-10-11 08:50:59.000000000
+0200
@@ -170,7 +170,7 @@
end
def handle_success_response(response)
- credentials = JSON.parse(response.body).with_indifferent_access
+ credentials = response.body.with_indifferent_access
Client.new(
identifier: credentials[:client_id],
secret: credentials[:client_secret],
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/lib/openid_connect/client.rb
new/lib/openid_connect/client.rb
--- old/lib/openid_connect/client.rb 2022-10-10 04:34:15.000000000 +0200
+++ new/lib/openid_connect/client.rb 2022-10-11 08:50:59.000000000 +0200
@@ -26,7 +26,7 @@
end
def handle_success_response(response)
- token_hash = JSON.parse(response.body).with_indifferent_access
+ token_hash = response.body.with_indifferent_access
token_type = (@forced_token_type ||
token_hash[:token_type]).try(:downcase)
case token_type
when 'bearer'
@@ -34,8 +34,6 @@
else
raise Exception.new("Unexpected Token Type: #{token_type}")
end
- rescue JSON::ParserError
- raise Exception.new("Unknown Token Type")
end
end
end
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/lib/openid_connect/discovery/provider/config/response.rb
new/lib/openid_connect/discovery/provider/config/response.rb
--- old/lib/openid_connect/discovery/provider/config/response.rb
2022-10-10 04:34:15.000000000 +0200
+++ new/lib/openid_connect/discovery/provider/config/response.rb
2022-10-11 08:50:59.000000000 +0200
@@ -81,9 +81,7 @@
end
def jwks
- @jwks ||= JSON.parse(
- OpenIDConnect.http_client.get(jwks_uri).body
- ).with_indifferent_access
+ @jwks ||=
OpenIDConnect.http_client.get(jwks_uri).body.with_indifferent_access
JSON::JWK::Set.new @jwks[:keys]
end
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/lib/openid_connect.rb new/lib/openid_connect.rb
--- old/lib/openid_connect.rb 2022-10-10 04:34:15.000000000 +0200
+++ new/lib/openid_connect.rb 2022-10-11 08:50:59.000000000 +0200
@@ -69,6 +69,7 @@
Faraday.new(headers: {user_agent: "OpenIDConnect (#{VERSION})"}) do
|faraday|
faraday.request :url_encoded
faraday.request :json
+ faraday.response :json
faraday.response :logger, OpenIDConnect.logger, {bodies: true} if
debugging?
faraday.adapter Faraday.default_adapter
http_config&.call(faraday)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/metadata new/metadata
--- old/metadata 2022-10-10 04:34:15.000000000 +0200
+++ new/metadata 2022-10-11 08:50:59.000000000 +0200
@@ -1,14 +1,14 @@
--- !ruby/object:Gem::Specification
name: openid_connect
version: !ruby/object:Gem::Version
- version: 2.1.0
+ version: 2.2.0
platform: ruby
authors:
- nov matake
autorequire:
bindir: bin
cert_chain: []
-date: 2022-10-10 00:00:00.000000000 Z
+date: 2022-10-11 00:00:00.000000000 Z
dependencies:
- !ruby/object:Gem::Dependency
name: tzinfo
@@ -156,14 +156,14 @@
requirements:
- - "~>"
- !ruby/object:Gem::Version
- version: '2.0'
+ version: '2.2'
type: :runtime
prerelease: false
version_requirements: !ruby/object:Gem::Requirement
requirements:
- - "~>"
- !ruby/object:Gem::Version
- version: '2.0'
+ version: '2.2'
- !ruby/object:Gem::Dependency
name: net-smtp
requirement: !ruby/object:Gem::Requirement
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/openid_connect.gemspec new/openid_connect.gemspec
--- old/openid_connect.gemspec 2022-10-10 04:34:15.000000000 +0200
+++ new/openid_connect.gemspec 2022-10-11 08:50:59.000000000 +0200
@@ -22,7 +22,7 @@
s.add_runtime_dependency "json-jwt", ">= 1.16"
s.add_runtime_dependency "swd", "~> 2.0"
s.add_runtime_dependency "webfinger", "~> 2.0"
- s.add_runtime_dependency "rack-oauth2", "~> 2.0"
+ s.add_runtime_dependency "rack-oauth2", "~> 2.2"
if Gem.ruby_version >= Gem::Version.create(3.1)
# TODO:
# remove "net-smtp" dependency after mail gem 2.8+ (which supports ruby
3.1+) released.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/spec/mock_response/errors/unknown.json
new/spec/mock_response/errors/unknown.json
--- old/spec/mock_response/errors/unknown.json 2022-10-10 04:34:15.000000000
+0200
+++ new/spec/mock_response/errors/unknown.json 2022-10-11 08:50:59.000000000
+0200
@@ -1 +1,3 @@
-Fuckin Unknown Error
\ No newline at end of file
+{
+ "unknown": "unknown"
+}
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/spec/openid_connect/client_spec.rb
new/spec/openid_connect/client_spec.rb
--- old/spec/openid_connect/client_spec.rb 2022-10-10 04:34:15.000000000
+0200
+++ new/spec/openid_connect/client_spec.rb 2022-10-11 08:50:59.000000000
+0200
@@ -162,16 +162,6 @@
end
end
- context 'when invalid JSON is returned' do
- it 'should raise OpenIDConnect::Exception' do
- mock_json :post, client.token_endpoint, 'access_token/invalid_json',
request_header: header_params, params: protocol_params do
- expect do
- access_token
- end.to raise_error OpenIDConnect::Exception, 'Unknown Token Type'
- end
- end
- end
-
context 'otherwise' do
it 'should raise Unexpected Token Type exception' do
mock_json :post, client.token_endpoint, 'access_token/mac',
request_header: header_params, params: protocol_params do