googleauth 0.3.0 → 0.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.rubocop_todo.yml +4 -4
- data/CHANGELOG.md +6 -0
- data/googleauth.gemspec +7 -7
- data/lib/googleauth/service_account.rb +116 -1
- data/lib/googleauth/version.rb +1 -1
- data/spec/googleauth/apply_auth_examples.rb +7 -7
- data/spec/googleauth/service_account_spec.rb +164 -4
- metadata +16 -16
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 85200987eca465d01dd0eab971906ba8ee145ca4
|
4
|
+
data.tar.gz: 78773e93e52dabae41d49e86c602e3352ca96b6c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9e06dde72a93f223edccfc50824ed9e6b1c46843ba0f4afc0aed0882670637161377503ced93b660b602fa053e9e1c2d243e0f313f0f843086352fd2ca0acc45
|
7
|
+
data.tar.gz: 30e4767d112096c8916f78a28bc4d48574c21239bd3dcc052a702fd4ab65b490f85189c2313ea7a416d771ce15c3f5449935d89788077a3df66cd595ff77756b
|
data/.rubocop_todo.yml
CHANGED
@@ -1,15 +1,15 @@
|
|
1
1
|
# This configuration was generated by `rubocop --auto-gen-config`
|
2
|
-
# on 2015-
|
2
|
+
# on 2015-03-06 19:51:00 -0800 using RuboCop version 0.28.0.
|
3
3
|
# The point is for the user to remove these configuration records
|
4
4
|
# one by one as the offenses are removed from the code base.
|
5
5
|
# Note that changes in the inspected code, or installation of new
|
6
6
|
# versions of RuboCop, may require this file to be generated again.
|
7
7
|
|
8
|
-
# Offense count:
|
8
|
+
# Offense count: 3
|
9
9
|
Metrics/AbcSize:
|
10
|
-
Max:
|
10
|
+
Max: 24
|
11
11
|
|
12
|
-
# Offense count:
|
12
|
+
# Offense count: 3
|
13
13
|
# Configuration parameters: CountComments.
|
14
14
|
Metrics/MethodLength:
|
15
15
|
Max: 11
|
data/CHANGELOG.md
CHANGED
data/googleauth.gemspec
CHANGED
@@ -27,15 +27,15 @@ Gem::Specification.new do |s|
|
|
27
27
|
|
28
28
|
s.add_dependency 'faraday', '~> 0.9'
|
29
29
|
s.add_dependency 'logging', '~> 1.8'
|
30
|
-
s.add_dependency 'jwt', '~> 1.4
|
31
|
-
s.add_dependency 'memoist', '~> 0.11
|
32
|
-
s.add_dependency 'multi_json', '1.11
|
33
|
-
s.add_dependency 'signet', '~> 0.6
|
30
|
+
s.add_dependency 'jwt', '~> 1.4'
|
31
|
+
s.add_dependency 'memoist', '~> 0.11'
|
32
|
+
s.add_dependency 'multi_json', '1.11'
|
33
|
+
s.add_dependency 'signet', '~> 0.6'
|
34
34
|
|
35
35
|
s.add_development_dependency 'bundler', '~> 1.7'
|
36
|
-
s.add_development_dependency 'simplecov', '~> 0.9
|
37
|
-
s.add_development_dependency 'coveralls', '~> 0.7
|
36
|
+
s.add_development_dependency 'simplecov', '~> 0.9'
|
37
|
+
s.add_development_dependency 'coveralls', '~> 0.7'
|
38
38
|
s.add_development_dependency 'rake', '~> 10.0'
|
39
|
-
s.add_development_dependency 'rubocop', '~> 0.29
|
39
|
+
s.add_development_dependency 'rubocop', '~> 0.29'
|
40
40
|
s.add_development_dependency 'rspec', '~> 3.0'
|
41
41
|
end
|
@@ -29,13 +29,16 @@
|
|
29
29
|
|
30
30
|
require 'googleauth/signet'
|
31
31
|
require 'googleauth/credentials_loader'
|
32
|
+
require 'jwt'
|
32
33
|
require 'multi_json'
|
34
|
+
require 'stringio'
|
33
35
|
|
34
36
|
module Google
|
35
37
|
# Module Auth provides classes that provide Google-specific authorization
|
36
38
|
# used to access Google APIs.
|
37
39
|
module Auth
|
38
|
-
# Authenticates requests using Google's Service Account credentials
|
40
|
+
# Authenticates requests using Google's Service Account credentials via an
|
41
|
+
# OAuth access token.
|
39
42
|
#
|
40
43
|
# This class allows authorizing requests for service accounts directly
|
41
44
|
# from credentials from a json key file downloaded from the developer
|
@@ -67,6 +70,118 @@ module Google
|
|
67
70
|
issuer: client_email,
|
68
71
|
signing_key: OpenSSL::PKey::RSA.new(private_key))
|
69
72
|
end
|
73
|
+
|
74
|
+
# Extends the base class.
|
75
|
+
#
|
76
|
+
# If scope(s) is not set, it creates a transient
|
77
|
+
# ServiceAccountJwtHeaderCredentials instance and uses that to
|
78
|
+
# authenticate instead.
|
79
|
+
def apply!(a_hash, opts = {})
|
80
|
+
# Use the base implementation if scopes are set
|
81
|
+
unless scope.nil?
|
82
|
+
super
|
83
|
+
return
|
84
|
+
end
|
85
|
+
|
86
|
+
# Use the ServiceAccountJwtHeaderCredentials using the same cred values
|
87
|
+
# if no scopes are set.
|
88
|
+
cred_json = {
|
89
|
+
private_key: @signing_key.to_s,
|
90
|
+
client_email: @issuer
|
91
|
+
}
|
92
|
+
alt_clz = ServiceAccountJwtHeaderCredentials
|
93
|
+
alt = alt_clz.new(StringIO.new(MultiJson.dump(cred_json)))
|
94
|
+
alt.apply!(a_hash)
|
95
|
+
end
|
96
|
+
end
|
97
|
+
|
98
|
+
# Authenticates requests using Google's Service Account credentials via
|
99
|
+
# JWT Header.
|
100
|
+
#
|
101
|
+
# This class allows authorizing requests for service accounts directly
|
102
|
+
# from credentials from a json key file downloaded from the developer
|
103
|
+
# console (via 'Generate new Json Key'). It is not part of any OAuth2
|
104
|
+
# flow, rather it creates a JWT and sends that as a credential.
|
105
|
+
#
|
106
|
+
# cf [Application Default Credentials](http://goo.gl/mkAHpZ)
|
107
|
+
class ServiceAccountJwtHeaderCredentials
|
108
|
+
JWT_AUD_URI_KEY = :jwt_aud_uri
|
109
|
+
AUTH_METADATA_KEY = Signet::OAuth2::AUTH_METADATA_KEY
|
110
|
+
TOKEN_CRED_URI = 'https://www.googleapis.com/oauth2/v3/token'
|
111
|
+
SIGNING_ALGORITHM = 'RS256'
|
112
|
+
EXPIRY = 60
|
113
|
+
extend CredentialsLoader
|
114
|
+
|
115
|
+
# make_creds proxies the construction of a credentials instance
|
116
|
+
#
|
117
|
+
# make_creds is used by the methods in CredentialsLoader.
|
118
|
+
#
|
119
|
+
# By default, it calls #new with 2 args, the second one being an
|
120
|
+
# optional scope. Here's the constructor only has one param, so
|
121
|
+
# we modify make_creds to reflect this.
|
122
|
+
def self.make_creds(*args)
|
123
|
+
new(args[0])
|
124
|
+
end
|
125
|
+
|
126
|
+
# Reads the private key and client email fields from the service account
|
127
|
+
# JSON key.
|
128
|
+
def self.read_json_key(json_key_io)
|
129
|
+
json_key = MultiJson.load(json_key_io.read)
|
130
|
+
fail 'missing client_email' unless json_key.key?('client_email')
|
131
|
+
fail 'missing private_key' unless json_key.key?('private_key')
|
132
|
+
[json_key['private_key'], json_key['client_email']]
|
133
|
+
end
|
134
|
+
|
135
|
+
# Initializes a ServiceAccountJwtHeaderCredentials.
|
136
|
+
#
|
137
|
+
# @param json_key_io [IO] an IO from which the JSON key can be read
|
138
|
+
def initialize(json_key_io)
|
139
|
+
private_key, client_email = self.class.read_json_key(json_key_io)
|
140
|
+
@private_key = private_key
|
141
|
+
@issuer = client_email
|
142
|
+
@signing_key = OpenSSL::PKey::RSA.new(private_key)
|
143
|
+
end
|
144
|
+
|
145
|
+
# Construct a jwt token if the JWT_AUD_URI key is present in the input
|
146
|
+
# hash.
|
147
|
+
#
|
148
|
+
# The jwt token is used as the value of a 'Bearer '.
|
149
|
+
def apply!(a_hash, opts = {})
|
150
|
+
jwt_aud_uri = a_hash.delete(JWT_AUD_URI_KEY)
|
151
|
+
return a_hash if jwt_aud_uri.nil?
|
152
|
+
jwt_token = new_jwt_token(jwt_aud_uri, opts)
|
153
|
+
a_hash[AUTH_METADATA_KEY] = "Bearer #{jwt_token}"
|
154
|
+
a_hash
|
155
|
+
end
|
156
|
+
|
157
|
+
# Returns a clone of a_hash updated with the authoriation header
|
158
|
+
def apply(a_hash, opts = {})
|
159
|
+
a_copy = a_hash.clone
|
160
|
+
apply!(a_copy, opts)
|
161
|
+
a_copy
|
162
|
+
end
|
163
|
+
|
164
|
+
# Returns a reference to the #apply method, suitable for passing as
|
165
|
+
# a closure
|
166
|
+
def updater_proc
|
167
|
+
lambda(&method(:apply))
|
168
|
+
end
|
169
|
+
|
170
|
+
protected
|
171
|
+
|
172
|
+
# Creates a jwt uri token.
|
173
|
+
def new_jwt_token(jwt_aud_uri, options = {})
|
174
|
+
now = Time.new
|
175
|
+
skew = options[:skew] || 60
|
176
|
+
assertion = {
|
177
|
+
'iss' => @issuer,
|
178
|
+
'sub' => @issuer,
|
179
|
+
'aud' => jwt_aud_uri,
|
180
|
+
'exp' => (now + EXPIRY).to_i,
|
181
|
+
'iat' => (now - skew).to_i
|
182
|
+
}
|
183
|
+
JWT.encode(assertion, @signing_key, SIGNING_ALGORITHM)
|
184
|
+
end
|
70
185
|
end
|
71
186
|
end
|
72
187
|
end
|
data/lib/googleauth/version.rb
CHANGED
@@ -46,9 +46,9 @@ def build_access_token_json(token)
|
|
46
46
|
'expires_in' => 3600)
|
47
47
|
end
|
48
48
|
|
49
|
-
WANTED_AUTH_KEY = :Authorization
|
50
|
-
|
51
49
|
shared_examples 'apply/apply! are OK' do
|
50
|
+
let(:auth_key) { :Authorization }
|
51
|
+
|
52
52
|
# tests that use these examples need to define
|
53
53
|
#
|
54
54
|
# @client which should be an auth client
|
@@ -79,7 +79,7 @@ shared_examples 'apply/apply! are OK' do
|
|
79
79
|
|
80
80
|
md = { foo: 'bar' }
|
81
81
|
@client.apply!(md, connection: c)
|
82
|
-
want = { :foo => 'bar',
|
82
|
+
want = { :foo => 'bar', auth_key => "Bearer #{token}" }
|
83
83
|
expect(md).to eq(want)
|
84
84
|
stubs.verify_stubbed_calls
|
85
85
|
end
|
@@ -96,7 +96,7 @@ shared_examples 'apply/apply! are OK' do
|
|
96
96
|
md = { foo: 'bar' }
|
97
97
|
the_proc = @client.updater_proc
|
98
98
|
got = the_proc.call(md, connection: c)
|
99
|
-
want = { :foo => 'bar',
|
99
|
+
want = { :foo => 'bar', auth_key => "Bearer #{token}" }
|
100
100
|
expect(got).to eq(want)
|
101
101
|
stubs.verify_stubbed_calls
|
102
102
|
end
|
@@ -126,7 +126,7 @@ shared_examples 'apply/apply! are OK' do
|
|
126
126
|
|
127
127
|
md = { foo: 'bar' }
|
128
128
|
got = @client.apply(md, connection: c)
|
129
|
-
want = { :foo => 'bar',
|
129
|
+
want = { :foo => 'bar', auth_key => "Bearer #{token}" }
|
130
130
|
expect(got).to eq(want)
|
131
131
|
stubs.verify_stubbed_calls
|
132
132
|
end
|
@@ -142,7 +142,7 @@ shared_examples 'apply/apply! are OK' do
|
|
142
142
|
n.times do |_t|
|
143
143
|
md = { foo: 'bar' }
|
144
144
|
got = @client.apply(md, connection: c)
|
145
|
-
want = { :foo => 'bar',
|
145
|
+
want = { :foo => 'bar', auth_key => "Bearer #{token}" }
|
146
146
|
expect(got).to eq(want)
|
147
147
|
end
|
148
148
|
stubs.verify_stubbed_calls
|
@@ -159,7 +159,7 @@ shared_examples 'apply/apply! are OK' do
|
|
159
159
|
end
|
160
160
|
md = { foo: 'bar' }
|
161
161
|
got = @client.apply(md, connection: c)
|
162
|
-
want = { :foo => 'bar',
|
162
|
+
want = { :foo => 'bar', auth_key => "Bearer #{t}" }
|
163
163
|
expect(got).to eq(want)
|
164
164
|
stubs.verify_stubbed_calls
|
165
165
|
@client.expires_at -= 3601 # default is to expire in 1hr
|
@@ -40,9 +40,74 @@ require 'openssl'
|
|
40
40
|
require 'spec_helper'
|
41
41
|
require 'tmpdir'
|
42
42
|
|
43
|
+
include Google::Auth::CredentialsLoader
|
44
|
+
|
45
|
+
shared_examples 'jwt header auth' do
|
46
|
+
context 'when jwt_aud_uri is present' do
|
47
|
+
let(:test_uri) { 'https://www.googleapis.com/myservice' }
|
48
|
+
let(:auth_prefix) { 'Bearer ' }
|
49
|
+
let(:auth_key) { ServiceAccountJwtHeaderCredentials::AUTH_METADATA_KEY }
|
50
|
+
let(:jwt_uri_key) { ServiceAccountJwtHeaderCredentials::JWT_AUD_URI_KEY }
|
51
|
+
|
52
|
+
def expect_is_encoded_jwt(hdr)
|
53
|
+
expect(hdr).to_not be_nil
|
54
|
+
expect(hdr.start_with?(auth_prefix)).to be true
|
55
|
+
authorization = hdr[auth_prefix.length..-1]
|
56
|
+
payload, _ = JWT.decode(authorization, @key.public_key)
|
57
|
+
expect(payload['aud']).to eq(test_uri)
|
58
|
+
expect(payload['iss']).to eq(client_email)
|
59
|
+
end
|
60
|
+
|
61
|
+
describe '#apply!' do
|
62
|
+
it 'should update the target hash with a jwt token' do
|
63
|
+
md = { foo: 'bar' }
|
64
|
+
md[jwt_uri_key] = test_uri
|
65
|
+
@client.apply!(md)
|
66
|
+
auth_header = md[auth_key]
|
67
|
+
expect_is_encoded_jwt(auth_header)
|
68
|
+
expect(md[jwt_uri_key]).to be_nil
|
69
|
+
end
|
70
|
+
end
|
71
|
+
|
72
|
+
describe 'updater_proc' do
|
73
|
+
it 'should provide a proc that updates a hash with a jwt token' do
|
74
|
+
md = { foo: 'bar' }
|
75
|
+
md[jwt_uri_key] = test_uri
|
76
|
+
the_proc = @client.updater_proc
|
77
|
+
got = the_proc.call(md)
|
78
|
+
auth_header = got[auth_key]
|
79
|
+
expect_is_encoded_jwt(auth_header)
|
80
|
+
expect(got[jwt_uri_key]).to be_nil
|
81
|
+
expect(md[jwt_uri_key]).to_not be_nil
|
82
|
+
end
|
83
|
+
end
|
84
|
+
|
85
|
+
describe '#apply' do
|
86
|
+
it 'should not update the original hash with a jwt token' do
|
87
|
+
md = { foo: 'bar' }
|
88
|
+
md[jwt_uri_key] = test_uri
|
89
|
+
the_proc = @client.updater_proc
|
90
|
+
got = the_proc.call(md)
|
91
|
+
auth_header = md[auth_key]
|
92
|
+
expect(auth_header).to be_nil
|
93
|
+
expect(got[jwt_uri_key]).to be_nil
|
94
|
+
expect(md[jwt_uri_key]).to_not be_nil
|
95
|
+
end
|
96
|
+
|
97
|
+
it 'should add a jwt token to the returned hash' do
|
98
|
+
md = { foo: 'bar' }
|
99
|
+
md[jwt_uri_key] = test_uri
|
100
|
+
got = @client.apply(md)
|
101
|
+
auth_header = got[auth_key]
|
102
|
+
expect_is_encoded_jwt(auth_header)
|
103
|
+
end
|
104
|
+
end
|
105
|
+
end
|
106
|
+
end
|
107
|
+
|
43
108
|
describe Google::Auth::ServiceAccountCredentials do
|
44
109
|
ServiceAccountCredentials = Google::Auth::ServiceAccountCredentials
|
45
|
-
|
110
|
+
let(:client_email) { 'app@developer.gserviceaccount.com' }
|
46
111
|
|
47
112
|
before(:example) do
|
48
113
|
@key = OpenSSL::PKey::RSA.new(2048)
|
@@ -69,7 +134,7 @@ describe Google::Auth::ServiceAccountCredentials do
|
|
69
134
|
cred_json = {
|
70
135
|
private_key_id: 'a_private_key_id',
|
71
136
|
private_key: @key.to_pem,
|
72
|
-
client_email:
|
137
|
+
client_email: client_email,
|
73
138
|
client_id: 'app.apps.googleusercontent.com',
|
74
139
|
type: 'service_account'
|
75
140
|
}
|
@@ -78,9 +143,17 @@ describe Google::Auth::ServiceAccountCredentials do
|
|
78
143
|
|
79
144
|
it_behaves_like 'apply/apply! are OK'
|
80
145
|
|
146
|
+
context 'when scope is nil' do
|
147
|
+
before(:example) do
|
148
|
+
@client.scope = nil
|
149
|
+
end
|
150
|
+
|
151
|
+
it_behaves_like 'jwt header auth'
|
152
|
+
end
|
153
|
+
|
81
154
|
describe '#from_env' do
|
82
155
|
before(:example) do
|
83
|
-
@var_name =
|
156
|
+
@var_name = ENV_VAR
|
84
157
|
@orig = ENV[@var_name]
|
85
158
|
@scope = 'https://www.googleapis.com/auth/userinfo.profile'
|
86
159
|
@clz = ServiceAccountCredentials
|
@@ -120,7 +193,7 @@ describe Google::Auth::ServiceAccountCredentials do
|
|
120
193
|
before(:example) do
|
121
194
|
@home = ENV['HOME']
|
122
195
|
@scope = 'https://www.googleapis.com/auth/userinfo.profile'
|
123
|
-
@known_path =
|
196
|
+
@known_path = WELL_KNOWN_PATH
|
124
197
|
@clz = ServiceAccountCredentials
|
125
198
|
end
|
126
199
|
|
@@ -144,3 +217,90 @@ describe Google::Auth::ServiceAccountCredentials do
|
|
144
217
|
end
|
145
218
|
end
|
146
219
|
end
|
220
|
+
|
221
|
+
describe Google::Auth::ServiceAccountJwtHeaderCredentials do
|
222
|
+
ServiceAccountJwtHeaderCredentials =
|
223
|
+
Google::Auth::ServiceAccountJwtHeaderCredentials
|
224
|
+
|
225
|
+
let(:client_email) { 'app@developer.gserviceaccount.com' }
|
226
|
+
let(:clz) { Google::Auth::ServiceAccountJwtHeaderCredentials }
|
227
|
+
|
228
|
+
before(:example) do
|
229
|
+
@key = OpenSSL::PKey::RSA.new(2048)
|
230
|
+
@client = clz.new(StringIO.new(cred_json_text))
|
231
|
+
end
|
232
|
+
|
233
|
+
def cred_json_text
|
234
|
+
cred_json = {
|
235
|
+
private_key_id: 'a_private_key_id',
|
236
|
+
private_key: @key.to_pem,
|
237
|
+
client_email: client_email,
|
238
|
+
client_id: 'app.apps.googleusercontent.com',
|
239
|
+
type: 'service_account'
|
240
|
+
}
|
241
|
+
MultiJson.dump(cred_json)
|
242
|
+
end
|
243
|
+
|
244
|
+
it_behaves_like 'jwt header auth'
|
245
|
+
|
246
|
+
describe '#from_env' do
|
247
|
+
before(:example) do
|
248
|
+
@var_name = ENV_VAR
|
249
|
+
@orig = ENV[@var_name]
|
250
|
+
end
|
251
|
+
|
252
|
+
after(:example) do
|
253
|
+
ENV[@var_name] = @orig unless @orig.nil?
|
254
|
+
end
|
255
|
+
|
256
|
+
it 'returns nil if the GOOGLE_APPLICATION_CREDENTIALS is unset' do
|
257
|
+
ENV.delete(@var_name) unless ENV[@var_name].nil?
|
258
|
+
expect(clz.from_env).to be_nil
|
259
|
+
end
|
260
|
+
|
261
|
+
it 'fails if the GOOGLE_APPLICATION_CREDENTIALS path does not exist' do
|
262
|
+
ENV.delete(@var_name) unless ENV[@var_name].nil?
|
263
|
+
expect(clz.from_env).to be_nil
|
264
|
+
Dir.mktmpdir do |dir|
|
265
|
+
key_path = File.join(dir, 'does-not-exist')
|
266
|
+
ENV[@var_name] = key_path
|
267
|
+
expect { clz.from_env }.to raise_error
|
268
|
+
end
|
269
|
+
end
|
270
|
+
|
271
|
+
it 'succeeds when the GOOGLE_APPLICATION_CREDENTIALS file is valid' do
|
272
|
+
Dir.mktmpdir do |dir|
|
273
|
+
key_path = File.join(dir, 'my_cert_file')
|
274
|
+
FileUtils.mkdir_p(File.dirname(key_path))
|
275
|
+
File.write(key_path, cred_json_text)
|
276
|
+
ENV[@var_name] = key_path
|
277
|
+
expect(clz.from_env).to_not be_nil
|
278
|
+
end
|
279
|
+
end
|
280
|
+
end
|
281
|
+
|
282
|
+
describe '#from_well_known_path' do
|
283
|
+
before(:example) do
|
284
|
+
@home = ENV['HOME']
|
285
|
+
end
|
286
|
+
|
287
|
+
after(:example) do
|
288
|
+
ENV['HOME'] = @home unless @home == ENV['HOME']
|
289
|
+
end
|
290
|
+
|
291
|
+
it 'is nil if no file exists' do
|
292
|
+
ENV['HOME'] = File.dirname(__FILE__)
|
293
|
+
expect(clz.from_well_known_path).to be_nil
|
294
|
+
end
|
295
|
+
|
296
|
+
it 'successfully loads the file when it is present' do
|
297
|
+
Dir.mktmpdir do |dir|
|
298
|
+
key_path = File.join(dir, '.config', WELL_KNOWN_PATH)
|
299
|
+
FileUtils.mkdir_p(File.dirname(key_path))
|
300
|
+
File.write(key_path, cred_json_text)
|
301
|
+
ENV['HOME'] = dir
|
302
|
+
expect(clz.from_well_known_path).to_not be_nil
|
303
|
+
end
|
304
|
+
end
|
305
|
+
end
|
306
|
+
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: googleauth
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.4.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Tim Emiola
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2015-03-
|
11
|
+
date: 2015-03-26 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: faraday
|
@@ -44,56 +44,56 @@ dependencies:
|
|
44
44
|
requirements:
|
45
45
|
- - "~>"
|
46
46
|
- !ruby/object:Gem::Version
|
47
|
-
version: 1.4
|
47
|
+
version: '1.4'
|
48
48
|
type: :runtime
|
49
49
|
prerelease: false
|
50
50
|
version_requirements: !ruby/object:Gem::Requirement
|
51
51
|
requirements:
|
52
52
|
- - "~>"
|
53
53
|
- !ruby/object:Gem::Version
|
54
|
-
version: 1.4
|
54
|
+
version: '1.4'
|
55
55
|
- !ruby/object:Gem::Dependency
|
56
56
|
name: memoist
|
57
57
|
requirement: !ruby/object:Gem::Requirement
|
58
58
|
requirements:
|
59
59
|
- - "~>"
|
60
60
|
- !ruby/object:Gem::Version
|
61
|
-
version: 0.11
|
61
|
+
version: '0.11'
|
62
62
|
type: :runtime
|
63
63
|
prerelease: false
|
64
64
|
version_requirements: !ruby/object:Gem::Requirement
|
65
65
|
requirements:
|
66
66
|
- - "~>"
|
67
67
|
- !ruby/object:Gem::Version
|
68
|
-
version: 0.11
|
68
|
+
version: '0.11'
|
69
69
|
- !ruby/object:Gem::Dependency
|
70
70
|
name: multi_json
|
71
71
|
requirement: !ruby/object:Gem::Requirement
|
72
72
|
requirements:
|
73
73
|
- - '='
|
74
74
|
- !ruby/object:Gem::Version
|
75
|
-
version: 1.11
|
75
|
+
version: '1.11'
|
76
76
|
type: :runtime
|
77
77
|
prerelease: false
|
78
78
|
version_requirements: !ruby/object:Gem::Requirement
|
79
79
|
requirements:
|
80
80
|
- - '='
|
81
81
|
- !ruby/object:Gem::Version
|
82
|
-
version: 1.11
|
82
|
+
version: '1.11'
|
83
83
|
- !ruby/object:Gem::Dependency
|
84
84
|
name: signet
|
85
85
|
requirement: !ruby/object:Gem::Requirement
|
86
86
|
requirements:
|
87
87
|
- - "~>"
|
88
88
|
- !ruby/object:Gem::Version
|
89
|
-
version: 0.6
|
89
|
+
version: '0.6'
|
90
90
|
type: :runtime
|
91
91
|
prerelease: false
|
92
92
|
version_requirements: !ruby/object:Gem::Requirement
|
93
93
|
requirements:
|
94
94
|
- - "~>"
|
95
95
|
- !ruby/object:Gem::Version
|
96
|
-
version: 0.6
|
96
|
+
version: '0.6'
|
97
97
|
- !ruby/object:Gem::Dependency
|
98
98
|
name: bundler
|
99
99
|
requirement: !ruby/object:Gem::Requirement
|
@@ -114,28 +114,28 @@ dependencies:
|
|
114
114
|
requirements:
|
115
115
|
- - "~>"
|
116
116
|
- !ruby/object:Gem::Version
|
117
|
-
version: 0.9
|
117
|
+
version: '0.9'
|
118
118
|
type: :development
|
119
119
|
prerelease: false
|
120
120
|
version_requirements: !ruby/object:Gem::Requirement
|
121
121
|
requirements:
|
122
122
|
- - "~>"
|
123
123
|
- !ruby/object:Gem::Version
|
124
|
-
version: 0.9
|
124
|
+
version: '0.9'
|
125
125
|
- !ruby/object:Gem::Dependency
|
126
126
|
name: coveralls
|
127
127
|
requirement: !ruby/object:Gem::Requirement
|
128
128
|
requirements:
|
129
129
|
- - "~>"
|
130
130
|
- !ruby/object:Gem::Version
|
131
|
-
version: 0.7
|
131
|
+
version: '0.7'
|
132
132
|
type: :development
|
133
133
|
prerelease: false
|
134
134
|
version_requirements: !ruby/object:Gem::Requirement
|
135
135
|
requirements:
|
136
136
|
- - "~>"
|
137
137
|
- !ruby/object:Gem::Version
|
138
|
-
version: 0.7
|
138
|
+
version: '0.7'
|
139
139
|
- !ruby/object:Gem::Dependency
|
140
140
|
name: rake
|
141
141
|
requirement: !ruby/object:Gem::Requirement
|
@@ -156,14 +156,14 @@ dependencies:
|
|
156
156
|
requirements:
|
157
157
|
- - "~>"
|
158
158
|
- !ruby/object:Gem::Version
|
159
|
-
version: 0.29
|
159
|
+
version: '0.29'
|
160
160
|
type: :development
|
161
161
|
prerelease: false
|
162
162
|
version_requirements: !ruby/object:Gem::Requirement
|
163
163
|
requirements:
|
164
164
|
- - "~>"
|
165
165
|
- !ruby/object:Gem::Version
|
166
|
-
version: 0.29
|
166
|
+
version: '0.29'
|
167
167
|
- !ruby/object:Gem::Dependency
|
168
168
|
name: rspec
|
169
169
|
requirement: !ruby/object:Gem::Requirement
|