devise_zxcvbn 4.4.1 → 5.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/.gitignore +1 -0
- data/README.md +61 -24
- data/devise_zxcvbn.gemspec +1 -0
- data/lib/devise_zxcvbn/errors/devise_zxcvbn_error.rb +2 -0
- data/lib/devise_zxcvbn/model.rb +25 -16
- data/lib/devise_zxcvbn/version.rb +1 -1
- data/spec/devise_zxcvbn/devise_zxcbn_spec.rb +0 -1
- data/spec/devise_zxcvbn/errors/devise_zxcvbn_error.rb +2 -0
- data/spec/devise_zxcvbn/model_spec.rb +113 -26
- data/spec/spec_helper.rb +2 -87
- metadata +20 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
|
-
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: ff8317142cd17809de1fe6825970d106063f6c1413ef86d24be86b1c5b4dcc51
|
4
|
+
data.tar.gz: 569c6ab6a45ffca59600a36a18c079d4924361680a22663872a2618fac99031e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 696f4916cc7e45b7f88fd7af2e972ce53185e294b07fd4a766106a6e5a9ae5ad545f71165d05d9341381eed31d9e4d9e35db8e16554500b464327979055b33f7
|
7
|
+
data.tar.gz: 58c4048efc829042e0bfb27c28614891e81bc853d65e5742592f19f99039723d786cffd5f29282674e29a04035642d4abdae5911500fc93b7b802ee58592f637
|
data/.gitignore
CHANGED
data/README.md
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# devise_zxcvbn
|
2
2
|
|
3
|
-
[![Gem Version](https://badge.fury.io/rb/devise_zxcvbn.
|
3
|
+
[![Gem Version](https://badge.fury.io/rb/devise_zxcvbn.svg)](http://badge.fury.io/rb/devise_zxcvbn)
|
4
4
|
[![Circle CI](https://circleci.com/gh/bitzesty/devise_zxcvbn.svg?style=svg)](https://circleci.com/gh/bitzesty/devise_zxcvbn)
|
5
5
|
[![Code Climate](https://codeclimate.com/github/bitzesty/devise_zxcvbn/badges/gpa.svg)](https://codeclimate.com/github/bitzesty/devise_zxcvbn)
|
6
6
|
|
@@ -14,50 +14,87 @@ The scores 0, 1, 2, 3 or 4 are given when the estimated crack time (seconds) is
|
|
14
14
|
|
15
15
|
Add this line to your application's Gemfile:
|
16
16
|
|
17
|
-
|
18
|
-
|
17
|
+
```ruby
|
18
|
+
gem 'devise_zxcvbn'
|
19
|
+
```
|
19
20
|
|
20
21
|
## Configuration
|
21
22
|
|
22
|
-
|
23
|
-
|
23
|
+
```ruby
|
24
|
+
class User < ActiveRecord::Base
|
25
|
+
devise :zxcvbnable
|
26
|
+
|
27
|
+
# Optionally add more weak words to check against:
|
28
|
+
def weak_words
|
29
|
+
['mysitename', self.name, self.username]
|
30
|
+
end
|
31
|
+
end
|
32
|
+
```
|
33
|
+
|
34
|
+
## Available methods for devise resources
|
35
|
+
|
36
|
+
```ruby
|
37
|
+
class User < ApplicationRecord
|
38
|
+
devise :zxcvbnable
|
39
|
+
end
|
24
40
|
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
41
|
+
user = User.new.tap do |user|
|
42
|
+
user.email = "example@example.com"
|
43
|
+
user.password = "123456789"
|
44
|
+
end
|
45
|
+
|
46
|
+
user.password_score => #<OpenStruct password="123456789", guesses=6, guesses_log10=0.7781512503836435, sequence=[{"pattern"=>"dictionary", "i"=>0, "j"=>8, "token"=>"123456789", "matched_word"=>"123456789", "rank"=>5, "dictionary_name"=>"passwords", "reversed"=>false, "l33t"=>false, "base_guesses"=>5, "uppercase_variations"=>1, "l33t_variations"=>1, "guesses"=>5, "guesses_log10"=>0.6989700043360187}], calc_time=15, crack_times_seconds={"online_throttling_100_per_hour"=>216, "online_no_throttling_10_per_second"=>0.6, "offline_slow_hashing_1e4_per_second"=>0.0006, "offline_fast_hashing_1e10_per_second"=>6.0e-10}, crack_times_display={"online_throttling_100_per_hour"=>"4 minutes", "online_no_throttling_10_per_second"=>"less than a second", "offline_slow_hashing_1e4_per_second"=>"less than a second", "offline_fast_hashing_1e10_per_second"=>"less than a second"}, score=0, feedback={"warning"=>"This is a top-10 common password", "suggestions"=>["Add another word or two. Uncommon words are better."]}>
|
47
|
+
# returns a simple OpenStruct object so than you could send another messages to get more info
|
48
|
+
|
49
|
+
user.password_weak? => true/false # returns a boolean result of checking of weakness of your set password
|
50
|
+
```
|
30
51
|
|
31
52
|
### Default parameters
|
32
53
|
|
33
54
|
_A score of less than 3 is not recommended._
|
34
55
|
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
56
|
+
```ruby
|
57
|
+
# config/initializers/devise.rb
|
58
|
+
Devise.setup do |config|
|
59
|
+
config.min_password_score = 4
|
60
|
+
end
|
61
|
+
```
|
39
62
|
|
40
63
|
### Error Message
|
41
64
|
|
42
65
|
The default error message:
|
43
66
|
|
44
|
-
|
67
|
+
```yml
|
68
|
+
"not strong enough. It scored %{score}. It must score at least %{min_password_score}."
|
69
|
+
```
|
45
70
|
|
46
71
|
You can customize this error message modifying the `devise` YAML file.
|
47
72
|
|
48
|
-
The `
|
73
|
+
The `crack_time_display`, `password_sample`, `score` and `min_password_score` variables are passed through if you need them.
|
74
|
+
|
75
|
+
```yml
|
76
|
+
# config/locales/devise.en.yml
|
77
|
+
en:
|
78
|
+
errors:
|
79
|
+
messages:
|
80
|
+
weak_password: "not strong enough. Consider adding a number, symbols or more letters to make it stronger."
|
81
|
+
```
|
82
|
+
|
83
|
+
### Skipping password complexity validation
|
49
84
|
|
50
|
-
|
51
|
-
en:
|
52
|
-
errors:
|
53
|
-
messages:
|
54
|
-
weak_password: "not strong enough. Consider adding a number, symbols or more letters to make it stronger."
|
85
|
+
To turn off password complexity validation for certain conditions, you could implement a concern (or similar) that overloads `skip_password_complexity?`:
|
55
86
|
|
87
|
+
```ruby
|
88
|
+
def skip_password_complexity?
|
89
|
+
true
|
90
|
+
end
|
91
|
+
```
|
56
92
|
|
57
93
|
## Contributing
|
58
94
|
|
59
95
|
1. Fork it
|
60
96
|
2. Create your feature branch (`git checkout -b my-new-feature`)
|
61
|
-
3.
|
62
|
-
4.
|
63
|
-
5.
|
97
|
+
3. Add test coverage for the feature, We use rspec for this purpose
|
98
|
+
4. Commit your changes (`git commit -am 'Add some feature'`)
|
99
|
+
5. Push to the branch (`git push origin my-new-feature`)
|
100
|
+
6. Create new Pull Request
|
data/devise_zxcvbn.gemspec
CHANGED
@@ -23,6 +23,7 @@ Gem::Specification.new do |spec|
|
|
23
23
|
spec.add_development_dependency "rake"
|
24
24
|
spec.add_development_dependency "rspec"
|
25
25
|
spec.add_development_dependency "rspec_junit_formatter"
|
26
|
+
spec.add_development_dependency "byebug"
|
26
27
|
|
27
28
|
spec.add_runtime_dependency "devise"
|
28
29
|
spec.add_runtime_dependency("zxcvbn-js", "~> 4.4.1")
|
data/lib/devise_zxcvbn/model.rb
CHANGED
@@ -1,4 +1,6 @@
|
|
1
|
-
require
|
1
|
+
require "devise_zxcvbn/email_tokeniser"
|
2
|
+
require "devise_zxcvbn/errors/devise_zxcvbn_error"
|
3
|
+
require "ostruct"
|
2
4
|
|
3
5
|
module Devise
|
4
6
|
module Models
|
@@ -9,17 +11,21 @@ module Devise
|
|
9
11
|
delegate :zxcvbn_tester, to: "self.class"
|
10
12
|
|
11
13
|
included do
|
12
|
-
validate :
|
14
|
+
validate :strong_password, unless: :skip_password_complexity?
|
13
15
|
end
|
14
16
|
|
15
17
|
def password_score
|
16
|
-
@
|
18
|
+
@password_score = self.class.password_score(self)
|
19
|
+
end
|
20
|
+
|
21
|
+
def password_weak?
|
22
|
+
password_score.score < min_password_score
|
17
23
|
end
|
18
24
|
|
19
25
|
private
|
20
26
|
|
21
|
-
def
|
22
|
-
if errors.messages.blank? &&
|
27
|
+
def strong_password
|
28
|
+
if errors.messages.blank? && password_weak?
|
23
29
|
errors.add :password, :weak_password, i18n_variables
|
24
30
|
end
|
25
31
|
end
|
@@ -28,28 +34,30 @@ module Devise
|
|
28
34
|
{
|
29
35
|
feedback: zxcvbn_feedback,
|
30
36
|
crack_time_display: time_to_crack,
|
31
|
-
score:
|
37
|
+
score: password_score.score,
|
32
38
|
min_password_score: min_password_score
|
33
39
|
}
|
34
40
|
end
|
35
41
|
|
36
42
|
def zxcvbn_feedback
|
37
|
-
feedback =
|
38
|
-
return
|
43
|
+
feedback = password_score.feedback.values.flatten.reject(&:empty?)
|
44
|
+
return "Add another word or two. Uncommon words are better." if feedback.empty?
|
39
45
|
|
40
|
-
feedback.join(
|
46
|
+
feedback.join(". ").gsub(/\.\s*\./, ".")
|
41
47
|
end
|
42
48
|
|
43
49
|
def time_to_crack
|
44
|
-
|
50
|
+
password_score.crack_times_display["offline_fast_hashing_1e10_per_second"]
|
45
51
|
end
|
46
52
|
|
47
|
-
|
53
|
+
class_methods do
|
48
54
|
Devise::Models.config(self, :min_password_score)
|
49
55
|
Devise::Models.config(self, :zxcvbn_tester)
|
50
56
|
|
51
|
-
def password_score(user, arg_email=nil)
|
52
|
-
password
|
57
|
+
def password_score(user, arg_email = nil)
|
58
|
+
return raise DeviseZxcvbnError, "the object must respond to password" unless user.respond_to?(:password)
|
59
|
+
|
60
|
+
password = user.password.to_s
|
53
61
|
|
54
62
|
zxcvbn_weak_words = []
|
55
63
|
|
@@ -58,14 +66,15 @@ module Devise
|
|
58
66
|
end
|
59
67
|
|
60
68
|
# User method results are saved locally to prevent repeat calls that might be expensive
|
61
|
-
if user.respond_to?
|
69
|
+
if user.respond_to?(:email)
|
62
70
|
local_email = user.email
|
63
71
|
zxcvbn_weak_words += [local_email, *DeviseZxcvbn::EmailTokeniser.split(local_email)]
|
64
72
|
end
|
65
73
|
|
66
|
-
if user.respond_to?
|
74
|
+
if user.respond_to?(:weak_words)
|
75
|
+
return raise DeviseZxcvbnError, "weak_words must return an Array" unless user.weak_words.is_a?(Array)
|
76
|
+
|
67
77
|
local_weak_words = user.weak_words
|
68
|
-
raise "weak_words must return an Array" unless (local_weak_words.is_a? Array)
|
69
78
|
zxcvbn_weak_words += local_weak_words
|
70
79
|
end
|
71
80
|
|
@@ -1,43 +1,130 @@
|
|
1
|
-
require
|
2
|
-
require
|
3
|
-
require
|
4
|
-
require
|
1
|
+
require 'active_model'
|
2
|
+
require 'devise'
|
3
|
+
require 'devise_zxcvbn'
|
4
|
+
require 'devise_zxcvbn/model'
|
5
5
|
|
6
6
|
describe Devise::Models::Zxcvbnable do
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
11
|
-
|
7
|
+
ValidDummyClass = Struct.new(:password, :skip_password_complexity, keyword_init: true) do
|
8
|
+
include ActiveModel::Validations
|
9
|
+
include Devise::Models::Zxcvbnable
|
10
|
+
|
11
|
+
def skip_password_complexity?
|
12
|
+
skip_password_complexity
|
12
13
|
end
|
13
14
|
end
|
14
15
|
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
16
|
+
let(:skip_password_complexity) { false }
|
17
|
+
|
18
|
+
describe '#password_score' do
|
19
|
+
context 'when password is strong' do
|
20
|
+
let(:user) { ValidDummyClass.new(password: 'Jm1C4C3aaDzC1aRW', skip_password_complexity: skip_password_complexity) }
|
21
|
+
|
22
|
+
it 'returns the score equal 4' do
|
23
|
+
password_score = user.password_score
|
24
|
+
|
25
|
+
expect(password_score.score).to eq(4)
|
26
|
+
expect(password_score.crack_times_display['offline_fast_hashing_1e10_per_second']).to eq('12 days')
|
27
|
+
end
|
28
|
+
end
|
29
|
+
|
30
|
+
context 'when password is weak' do
|
31
|
+
let(:user) { ValidDummyClass.new(password: '12345678', skip_password_complexity: skip_password_complexity) }
|
32
|
+
|
33
|
+
it 'returns the weak score' do
|
34
|
+
password_score = user.password_score
|
35
|
+
|
36
|
+
expect(password_score.score).to eq(0)
|
37
|
+
expect(password_score.crack_times_display['offline_fast_hashing_1e10_per_second']).to eq('less than a second')
|
38
|
+
end
|
20
39
|
end
|
40
|
+
end
|
41
|
+
|
42
|
+
describe '#password_weak?' do
|
43
|
+
let(:user) { ValidDummyClass.new(password: 'Jm1C4C3aaDzC1aRW', skip_password_complexity: skip_password_complexity) }
|
21
44
|
|
22
|
-
it
|
23
|
-
user
|
24
|
-
expect(user).to be_valid
|
25
|
-
expect(user.errors[:password]).to be_empty
|
45
|
+
it 'returns false for the call of the method' do
|
46
|
+
expect(user.password_weak?).to be_falsey
|
26
47
|
end
|
27
48
|
end
|
28
49
|
|
29
|
-
|
30
|
-
|
31
|
-
|
50
|
+
describe 'validations' do
|
51
|
+
subject { resource.validate; resource }
|
52
|
+
|
53
|
+
let(:resource) { ValidDummyClass.new(password: password, skip_password_complexity: skip_password_complexity) }
|
54
|
+
|
55
|
+
context 'when password complexity check is required' do
|
56
|
+
context 'when password is strong' do
|
57
|
+
let(:password) { 'Jm1C4C3aaDzC1aRW' }
|
32
58
|
|
33
|
-
|
59
|
+
it 'expects the model to be valid' do
|
60
|
+
expect(subject).to be_valid
|
61
|
+
end
|
34
62
|
|
35
|
-
|
36
|
-
|
63
|
+
it 'returns empty validation messages' do
|
64
|
+
expect(subject.errors[:password]).to be_empty
|
65
|
+
end
|
66
|
+
end
|
67
|
+
|
68
|
+
context 'when password is weak' do
|
69
|
+
let(:password) { '12345678' }
|
70
|
+
|
71
|
+
it 'expects the model to be invalid' do
|
72
|
+
expect(subject).to be_invalid
|
73
|
+
end
|
74
|
+
|
75
|
+
it 'returns validation message' do
|
76
|
+
expect(subject.errors[:password])
|
77
|
+
.to eq(['not strong enough. It scored 0. It must score at least 4.'])
|
78
|
+
end
|
79
|
+
end
|
80
|
+
end
|
81
|
+
|
82
|
+
context 'when password complexity check is not required' do
|
83
|
+
let(:skip_password_complexity) { true }
|
84
|
+
|
85
|
+
context 'when password score is strong' do
|
86
|
+
let(:password) { 'Jm1C4C3aaDzC1aRW' }
|
87
|
+
|
88
|
+
it 'expects the model to be valid' do
|
89
|
+
expect(subject).to be_valid
|
90
|
+
end
|
91
|
+
end
|
92
|
+
|
93
|
+
context 'when password score is weak' do
|
94
|
+
let(:password) { '12345678' }
|
95
|
+
|
96
|
+
it 'expects the model to be valid' do
|
97
|
+
expect(subject).to be_valid
|
98
|
+
end
|
99
|
+
end
|
100
|
+
end
|
101
|
+
end
|
102
|
+
|
103
|
+
describe 'exceptions raises' do
|
104
|
+
context 'when password method is not given for instance' do
|
105
|
+
class InvalidPasswordDummyClass < ValidDummyClass
|
106
|
+
undef_method :password
|
107
|
+
end
|
108
|
+
|
109
|
+
let(:user) { InvalidPasswordDummyClass.new }
|
110
|
+
|
111
|
+
it 'raises exception regarding absence password method' do
|
112
|
+
expect { user.password_score }.to raise_error(DeviseZxcvbnError, 'the object must respond to password')
|
113
|
+
end
|
37
114
|
end
|
38
115
|
|
39
|
-
|
40
|
-
|
116
|
+
context 'when weak_words method returns not Array' do
|
117
|
+
class InvalidWeakWordsDummyClass < ValidDummyClass
|
118
|
+
def weak_words
|
119
|
+
String.new()
|
120
|
+
end
|
121
|
+
end
|
122
|
+
|
123
|
+
let(:user) { InvalidWeakWordsDummyClass.new }
|
124
|
+
|
125
|
+
it 'raises exception regarding type of weak_words method' do
|
126
|
+
expect { user.password_score }.to raise_error(DeviseZxcvbnError, 'weak_words must return an Array')
|
127
|
+
end
|
41
128
|
end
|
42
129
|
end
|
43
130
|
end
|
data/spec/spec_helper.rb
CHANGED
@@ -1,96 +1,11 @@
|
|
1
|
-
|
2
|
-
|
3
|
-
# The generated `.rspec` file contains `--require spec_helper` which will cause
|
4
|
-
# this file to always be loaded, without a need to explicitly require it in any
|
5
|
-
# files.
|
6
|
-
#
|
7
|
-
# Given that it is always loaded, you are encouraged to keep this file as
|
8
|
-
# light-weight as possible. Requiring heavyweight dependencies from this file
|
9
|
-
# will add to the boot time of your test suite on EVERY test run, even for an
|
10
|
-
# individual file that may not need all of that loaded. Instead, consider making
|
11
|
-
# a separate helper file that requires the additional dependencies and performs
|
12
|
-
# the additional setup, and require it from the spec files that actually need
|
13
|
-
# it.
|
14
|
-
#
|
15
|
-
# The `.rspec` file also contains a few flags that are not defaults but that
|
16
|
-
# users commonly want.
|
17
|
-
#
|
18
|
-
# See http://rubydoc.info/gems/rspec-core/RSpec/Core/Configuration
|
1
|
+
require 'byebug'
|
2
|
+
|
19
3
|
RSpec.configure do |config|
|
20
|
-
# rspec-expectations config goes here. You can use an alternate
|
21
|
-
# assertion/expectation library such as wrong or the stdlib/minitest
|
22
|
-
# assertions if you prefer.
|
23
4
|
config.expect_with :rspec do |expectations|
|
24
|
-
# This option will default to `true` in RSpec 4. It makes the `description`
|
25
|
-
# and `failure_message` of custom matchers include text for helper methods
|
26
|
-
# defined using `chain`, e.g.:
|
27
|
-
# be_bigger_than(2).and_smaller_than(4).description
|
28
|
-
# # => "be bigger than 2 and smaller than 4"
|
29
|
-
# ...rather than:
|
30
|
-
# # => "be bigger than 2"
|
31
5
|
expectations.include_chain_clauses_in_custom_matcher_descriptions = true
|
32
6
|
end
|
33
7
|
|
34
|
-
# rspec-mocks config goes here. You can use an alternate test double
|
35
|
-
# library (such as bogus or mocha) by changing the `mock_with` option here.
|
36
8
|
config.mock_with :rspec do |mocks|
|
37
|
-
# Prevents you from mocking or stubbing a method that does not exist on
|
38
|
-
# a real object. This is generally recommended, and will default to
|
39
|
-
# `true` in RSpec 4.
|
40
9
|
mocks.verify_partial_doubles = true
|
41
10
|
end
|
42
|
-
|
43
|
-
# The settings below are suggested to provide a good initial experience
|
44
|
-
# with RSpec, but feel free to customize to your heart's content.
|
45
|
-
=begin
|
46
|
-
# These two settings work together to allow you to limit a spec run
|
47
|
-
# to individual examples or groups you care about by tagging them with
|
48
|
-
# `:focus` metadata. When nothing is tagged with `:focus`, all examples
|
49
|
-
# get run.
|
50
|
-
config.filter_run :focus
|
51
|
-
config.run_all_when_everything_filtered = true
|
52
|
-
|
53
|
-
# Allows RSpec to persist some state between runs in order to support
|
54
|
-
# the `--only-failures` and `--next-failure` CLI options. We recommend
|
55
|
-
# you configure your source control system to ignore this file.
|
56
|
-
config.example_status_persistence_file_path = "spec/examples.txt"
|
57
|
-
|
58
|
-
# Limits the available syntax to the non-monkey patched syntax that is
|
59
|
-
# recommended. For more details, see:
|
60
|
-
# - http://rspec.info/blog/2012/06/rspecs-new-expectation-syntax/
|
61
|
-
# - http://www.teaisaweso.me/blog/2013/05/27/rspecs-new-message-expectation-syntax/
|
62
|
-
# - http://rspec.info/blog/2014/05/notable-changes-in-rspec-3/#zero-monkey-patching-mode
|
63
|
-
config.disable_monkey_patching!
|
64
|
-
|
65
|
-
# This setting enables warnings. It's recommended, but in some cases may
|
66
|
-
# be too noisy due to issues in dependencies.
|
67
|
-
config.warnings = true
|
68
|
-
|
69
|
-
# Many RSpec users commonly either run the entire suite or an individual
|
70
|
-
# file, and it's useful to allow more verbose output when running an
|
71
|
-
# individual spec file.
|
72
|
-
if config.files_to_run.one?
|
73
|
-
# Use the documentation formatter for detailed output,
|
74
|
-
# unless a formatter has already been configured
|
75
|
-
# (e.g. via a command-line flag).
|
76
|
-
config.default_formatter = 'doc'
|
77
|
-
end
|
78
|
-
|
79
|
-
# Print the 10 slowest examples and example groups at the
|
80
|
-
# end of the spec run, to help surface which specs are running
|
81
|
-
# particularly slow.
|
82
|
-
config.profile_examples = 10
|
83
|
-
|
84
|
-
# Run specs in random order to surface order dependencies. If you find an
|
85
|
-
# order dependency and want to debug it, you can fix the order by providing
|
86
|
-
# the seed, which is printed after each run.
|
87
|
-
# --seed 1234
|
88
|
-
config.order = :random
|
89
|
-
|
90
|
-
# Seed global randomization in this process using the `--seed` CLI option.
|
91
|
-
# Setting this allows you to use `--seed` to deterministically reproduce
|
92
|
-
# test failures related to randomization by passing the same `--seed` value
|
93
|
-
# as the one that triggered the failure.
|
94
|
-
Kernel.srand config.seed
|
95
|
-
=end
|
96
11
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: devise_zxcvbn
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 5.0.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Bit Zesty
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2019-11-15 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: activemodel
|
@@ -80,6 +80,20 @@ dependencies:
|
|
80
80
|
- - ">="
|
81
81
|
- !ruby/object:Gem::Version
|
82
82
|
version: '0'
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: byebug
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ">="
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0'
|
90
|
+
type: :development
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - ">="
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '0'
|
83
97
|
- !ruby/object:Gem::Dependency
|
84
98
|
name: devise
|
85
99
|
requirement: !ruby/object:Gem::Requirement
|
@@ -126,11 +140,13 @@ files:
|
|
126
140
|
- devise_zxcvbn.gemspec
|
127
141
|
- lib/devise_zxcvbn.rb
|
128
142
|
- lib/devise_zxcvbn/email_tokeniser.rb
|
143
|
+
- lib/devise_zxcvbn/errors/devise_zxcvbn_error.rb
|
129
144
|
- lib/devise_zxcvbn/locales/en.yml
|
130
145
|
- lib/devise_zxcvbn/model.rb
|
131
146
|
- lib/devise_zxcvbn/version.rb
|
132
147
|
- spec/devise_zxcvbn/devise_zxcbn_spec.rb
|
133
148
|
- spec/devise_zxcvbn/email_tokeniser_spec.rb
|
149
|
+
- spec/devise_zxcvbn/errors/devise_zxcvbn_error.rb
|
134
150
|
- spec/devise_zxcvbn/model_spec.rb
|
135
151
|
- spec/spec_helper.rb
|
136
152
|
homepage: https://github.com/bitzesty/devise_zxcvbn
|
@@ -152,13 +168,13 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
152
168
|
- !ruby/object:Gem::Version
|
153
169
|
version: '0'
|
154
170
|
requirements: []
|
155
|
-
|
156
|
-
rubygems_version: 2.4.5.1
|
171
|
+
rubygems_version: 3.0.1
|
157
172
|
signing_key:
|
158
173
|
specification_version: 4
|
159
174
|
summary: Devise plugin to reject weak passwords
|
160
175
|
test_files:
|
161
176
|
- spec/devise_zxcvbn/devise_zxcbn_spec.rb
|
162
177
|
- spec/devise_zxcvbn/email_tokeniser_spec.rb
|
178
|
+
- spec/devise_zxcvbn/errors/devise_zxcvbn_error.rb
|
163
179
|
- spec/devise_zxcvbn/model_spec.rb
|
164
180
|
- spec/spec_helper.rb
|