mojo_auth 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 05391a8161fa237e960a39f300e1a6d1672d29fd
4
+ data.tar.gz: a2f0a74a402dc59e4607ecf25d8ef34dad6275ce
5
+ SHA512:
6
+ metadata.gz: 09102d044180a4d493e7b17bb1c2b629470b2841304abd29107cf2ebd10ce4a3f6c7908459f4078daf4e15d4f7ddd885960a4ac066ad73222df95ce468614bcf
7
+ data.tar.gz: b7dd6991b3603f627363f867f3fccf20400ece3d8c2a820cdfd6e3895d20a1e1bfda8d037f57ec44ecc6d6a9c9111d0e89c9895129da0377c1899fbfb7c3380a
data/.gitignore ADDED
@@ -0,0 +1,14 @@
1
+ /.bundle/
2
+ /.yardoc
3
+ /Gemfile.lock
4
+ /_yardoc/
5
+ /coverage/
6
+ /doc/
7
+ /pkg/
8
+ /spec/reports/
9
+ /tmp/
10
+ *.bundle
11
+ *.so
12
+ *.o
13
+ *.a
14
+ mkmf.log
data/.rubocop.yml ADDED
@@ -0,0 +1,2 @@
1
+ LineLength:
2
+ Enabled: false
data/.travis.yml ADDED
@@ -0,0 +1,16 @@
1
+ language: ruby
2
+ rvm:
3
+ - 2.0.0
4
+ - 2.1.3
5
+ - jruby
6
+ - jruby-head
7
+ - ruby-head
8
+ matrix:
9
+ include:
10
+ - rvm: jruby
11
+ env: JRUBY_OPTS="--2.0"
12
+ allow_failures:
13
+ - rvm: jruby
14
+ before_script:
15
+ - sudo rm /dev/random
16
+ - sudo ln -s /dev/urandom /dev/random
data/CHANGELOG.md ADDED
@@ -0,0 +1,4 @@
1
+ # [develop](https://github.com/mojolingo/mojo-auth.rb)
2
+
3
+ # [v0.1.0](https://github.com/adhearsion/punchblock/compare/0e767e1c19b251a6dd3665e2f1f920fa237ac9cf...v0.1.0) - [2014-09-26](https://rubygems.org/gems/mojo_auth/versions/0.1.0)
4
+ * Initial release
data/Gemfile ADDED
@@ -0,0 +1,3 @@
1
+ source 'https://rubygems.org'
2
+
3
+ gemspec
data/Guardfile ADDED
@@ -0,0 +1,14 @@
1
+ guard :rubocop do
2
+ watch(/.+\.rb$/)
3
+ watch(/(?:.+\/)?\.rubocop\.yml$/) { |m| File.dirname(m[0]) }
4
+ end
5
+
6
+ guard :rspec, cmd: 'bundle exec rspec' do
7
+ watch(/^spec\/.+_spec\.rb$/)
8
+ watch(/^lib\/(.+)\.rb$/) { |m| "spec/#{m[1]}_spec.rb" }
9
+ watch('spec/spec_helper.rb') { 'spec' }
10
+ end
11
+
12
+ guard 'yard' do
13
+ watch(/lib\/.+\.rb/)
14
+ end
data/LICENSE.txt ADDED
@@ -0,0 +1,22 @@
1
+ Copyright (c) 2014 Mojo Lingo LLC
2
+
3
+ MIT License
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining
6
+ a copy of this software and associated documentation files (the
7
+ "Software"), to deal in the Software without restriction, including
8
+ without limitation the rights to use, copy, modify, merge, publish,
9
+ distribute, sublicense, and/or sell copies of the Software, and to
10
+ permit persons to whom the Software is furnished to do so, subject to
11
+ the following conditions:
12
+
13
+ The above copyright notice and this permission notice shall be
14
+ included in all copies or substantial portions of the Software.
15
+
16
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
17
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
18
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
19
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
20
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
21
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
22
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,58 @@
1
+ [![Gem Version](https://badge.fury.io/rb/mojo_auth.png)](https://rubygems.org/gems/mojo_auth)
2
+ [![Build Status](https://secure.travis-ci.org/mojolingo/mojo-auth.rb.png?branch=develop)](http://travis-ci.org/mojolingo/mojo-auth.rb)
3
+ [![Dependency Status](https://gemnasium.com/mojolingo/mojo-auth.rb.png?travis)](https://gemnasium.com/mojolingo/mojo-auth.rb)
4
+ [![Code Climate](https://codeclimate.com/github/mojolingo/mojo-auth.rb.png)](https://codeclimate.com/github/mojolingo/mojo-auth.rb)
5
+ [![Coverage Status](https://coveralls.io/repos/mojolingo/mojo-auth.rb/badge.png?branch=develop)](https://coveralls.io/r/mojolingo/mojo-auth.rb)
6
+ [![Inline docs](http://inch-ci.org/github/mojolingo/mojo-auth.rb.png?branch=develop)](http://inch-ci.org/github/mojolingo/mojo-auth.rb)
7
+
8
+ # mojo_auth
9
+
10
+ [MojoAuth](http://mojolingo.com/mojoauth) is a set of standard approaches to cross-app authentication based on [Hash-based Message Authentication Codes](http://en.wikipedia.org/wiki/Hash-based_message_authentication_code) (HMAC), inspired by ["A REST API For Access To TURN Services"](http://tools.ietf.org/html/draft-uberti-behave-turn-rest).
11
+
12
+ ## Installation
13
+
14
+ Add this line to your application's Gemfile:
15
+
16
+ ```ruby
17
+ gem 'mojo_auth'
18
+ ```
19
+
20
+ And then execute:
21
+
22
+ $ bundle
23
+
24
+ Or install it yourself as:
25
+
26
+ $ gem install mojo_auth
27
+
28
+ ## Usage
29
+
30
+ ```ruby
31
+ require 'mojo_auth'
32
+
33
+ # Generate a shared secret
34
+ secret = MojoAuth.create_secret
35
+ # => "XyD+xeJHivzbOUe3vwdU6Z5vDe/vio34MxKX8HYViR0+p4t/NzaIpbK+9VwX\n5qHCj7m4f7UNRXgOJPXzn6MT0Q==\n"
36
+
37
+ # Create temporary credentials
38
+ credentials = MojoAuth.create_credentials(id: 'foobar', secret: secret)
39
+ # => {:username=>"1411837760:foobar", :password=>"wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}
40
+
41
+ # Test credentials
42
+ MojoAuth.test_credentials({username: "1411837760:foobar", password: "wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}, secret: secret)
43
+ # => "foobar"
44
+ MojoAuth.test_credentials({username: "1411837760:foobar", password: "wrongpassword"}, secret: secret)
45
+ # => false
46
+
47
+ # 1 day later
48
+ MojoAuth.test_credentials({username: "1411837760:foobar", password: "wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}, secret: secret)
49
+ # => false
50
+ ```
51
+
52
+ ## Contributing
53
+
54
+ 1. [Fork it](https://github.com/mojolingo/mojo_auth.rb/fork)
55
+ 2. Create your feature branch (`git checkout -b my-new-feature`)
56
+ 3. Commit your changes (`git commit -am 'Add some feature'`)
57
+ 4. Push to the branch (`git push origin my-new-feature`)
58
+ 5. Create a new Pull Request
data/Rakefile ADDED
@@ -0,0 +1,12 @@
1
+ require 'bundler/gem_tasks'
2
+
3
+ require 'rspec/core/rake_task'
4
+ RSpec::Core::RakeTask.new('spec')
5
+
6
+ require 'rubocop/rake_task'
7
+ RuboCop::RakeTask.new
8
+
9
+ require 'yard'
10
+ YARD::Rake::YardocTask.new
11
+
12
+ task default: [:rubocop, :spec]
@@ -0,0 +1,4 @@
1
+ # MojoAuth version
2
+ class MojoAuth
3
+ VERSION = '0.1.0'
4
+ end
data/lib/mojo_auth.rb ADDED
@@ -0,0 +1,125 @@
1
+ require 'base64'
2
+ require 'digest'
3
+ require 'openssl'
4
+
5
+ require 'mojo_auth/version'
6
+
7
+ # MojoAuth is a set of standard approaches to cross-app authentication based on HMAC
8
+ #
9
+ # @example Typical usage
10
+ # require 'mojo_auth'
11
+ #
12
+ # # Generate a shared secret
13
+ # secret = MojoAuth.create_secret
14
+ # # => "XyD+xeJHivzbOUe3vwdU6Z5vDe/vio34MxKX8HYViR0+p4t/NzaIpbK+9VwX\n5qHCj7m4f7UNRXgOJPXzn6MT0Q==\n"
15
+ #
16
+ # # Create temporary credentials
17
+ # credentials = MojoAuth.create_credentials(id: 'foobar', secret: secret)
18
+ # # => {:username=>"1411837760:foobar", :password=>"wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}
19
+ #
20
+ # # Test credentials
21
+ # MojoAuth.test_credentials({username: "1411837760:foobar", password: "wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}, secret: secret)
22
+ # # => "foobar"
23
+ # MojoAuth.test_credentials({username: "1411837760:foobar", password: "wrongpassword"}, secret: secret)
24
+ # # => false
25
+ #
26
+ # # 1 day later
27
+ # MojoAuth.test_credentials({username: "1411837760:foobar", password: "wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}, secret: secret)
28
+ # # => false
29
+ #
30
+ class MojoAuth
31
+ DAY_IN_SECONDS = 86_400
32
+
33
+ # Create a new random secret
34
+ #
35
+ # @return [String] a new secret based on /dev/random
36
+ def self.create_secret
37
+ random = File.read('/dev/random', 512)
38
+ Base64.encode64(Digest::SHA2.new(512).digest(random))
39
+ end
40
+
41
+ # Create a new credential set
42
+ #
43
+ # @param [String] id the identity to be asserted in the credentials
44
+ # @param [String] secret the shared secret with which to create credentials
45
+ # @param [Integer] ttl the duration for which the credentials should be valid in seconds
46
+ #
47
+ # @return [Hash] signed credentials, keys :username and :password
48
+ #
49
+ # @example Basic usage
50
+ # credentials = MojoAuth.create_credentials(secret: secret)
51
+ # # => {:username=>"1411837760", :password=>"wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}
52
+ #
53
+ # @example Asserting an identity
54
+ # credentials = MojoAuth.create_credentials(id: 'foobar', secret: secret)
55
+ # # => {:username=>"1411837760:foobar", :password=>"wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}
56
+ #
57
+ # @example Specifying an alternative TTL
58
+ # credentials = MojoAuth.create_credentials(ttl: 600, secret: secret)
59
+ # # => {:username=>"1411837760", :password=>"wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}
60
+ #
61
+ def self.create_credentials(id: nil, secret: required, ttl: DAY_IN_SECONDS)
62
+ expiry_timestamp = (Time.now.utc + ttl).to_i
63
+ username = [expiry_timestamp, id].join(':')
64
+ { username: username, password: new(secret).sign(username) }
65
+ end
66
+
67
+ # Test that credentials are valid
68
+ #
69
+ # @param [Hash] credentials a set of credentials including a :username and a :password
70
+ # @param [String] secret the shared secret against which to test credentials
71
+ #
72
+ # @return [Boolean, String] whether or not the credentials are valid (were created using the specified secret) and current (have not yet expired). When the credentials assert an identity, that identity is returned.
73
+ #
74
+ # @example Testing correct credentials
75
+ # MojoAuth.test_credentials({username: "1411837760", password: "wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}, secret: secret)
76
+ # # => true
77
+ #
78
+ # @example Testing correct ID-asserting credentials
79
+ # MojoAuth.test_credentials({username: "1411837760:foobar", password: "wb6KxLj6NXcUaqNb1SlHH1V3QHw=\n"}, secret: secret)
80
+ # # => "foobar"
81
+ #
82
+ # @example Testing incorrect credentials
83
+ # MojoAuth.test_credentials({username: "1411837760:foobar", password: "wrongpassword"}, secret: secret)
84
+ # # => false
85
+ #
86
+ def self.test_credentials(credentials, secret: required)
87
+ new(secret).assert(credentials)
88
+ end
89
+
90
+ # Work-around for required named parameters pre Ruby 2.1
91
+ # @private
92
+ def self.required
93
+ method = caller_locations(1, 1)[0].label
94
+ fail ArgumentError, "A required keyword argument was not specified when calling '#{method}'"
95
+ end
96
+
97
+ # Create a MojoAuth instance
98
+ #
99
+ # @param [String] secret the shared secret to sign credentials with
100
+ def initialize(secret)
101
+ @secret = secret
102
+ end
103
+
104
+ # Sign a message via HMAC-SHA1
105
+ #
106
+ # @param [String] message the message to be signed
107
+ #
108
+ # @return [String] the message signed with the shared secret
109
+ def sign(message)
110
+ Base64.encode64(OpenSSL::HMAC.digest('sha1', @secret, message))
111
+ end
112
+
113
+ # Assert a set of credentials
114
+ #
115
+ # @param [Hash] credentials a set of credentials including a :username and a :password
116
+ # @param [String] secret the shared secret against which to test credentials
117
+ #
118
+ # @return [Boolean, String] whether or not the credentials are valid (were created using the specified secret) and current (have not yet expired). When the credentials assert an identity, that identity is returned.
119
+ def assert(credentials)
120
+ expiry_timestamp, id = credentials[:username].split(':')
121
+ return false if expiry_timestamp.to_i < Time.now.utc.to_i
122
+ return false unless sign(credentials[:username]) == credentials[:password]
123
+ id || true
124
+ end
125
+ end
data/mojo-auth.gemspec ADDED
@@ -0,0 +1,32 @@
1
+ # coding: utf-8
2
+ lib = File.expand_path('../lib', __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require 'mojo_auth/version'
5
+
6
+ Gem::Specification.new do |spec|
7
+ spec.name = 'mojo_auth'
8
+ spec.version = MojoAuth::VERSION
9
+ spec.authors = ['Ben Langfeld']
10
+ spec.email = ['ben@langfeld.me']
11
+ spec.summary = 'Implementation of MojoAuth in Ruby'
12
+ spec.description = 'MojoAuth is a set of standard approaches to cross-app authentication based on HMAC.'
13
+ spec.homepage = 'https://github.com/mojolingo/mojo_auth.rb'
14
+ spec.license = 'MIT'
15
+
16
+ spec.files = `git ls-files -z`.split("\x0")
17
+ spec.executables = spec.files.grep(/^bin\//) { |f| File.basename(f) }
18
+ spec.test_files = spec.files.grep(/^(test|spec|features)\//)
19
+ spec.require_paths = ['lib']
20
+
21
+ spec.add_development_dependency 'bundler', '~> 1.7'
22
+ spec.add_development_dependency 'rake', '~> 10.0'
23
+ spec.add_development_dependency 'guard', '~> 2.6'
24
+ spec.add_development_dependency 'rspec', '~> 3.0'
25
+ spec.add_development_dependency 'guard-rspec', '~> 4.3'
26
+ spec.add_development_dependency 'rubocop'
27
+ spec.add_development_dependency 'guard-rubocop', '~> 1.1'
28
+ spec.add_development_dependency 'coveralls'
29
+ spec.add_development_dependency 'timecop', '~> 0.7'
30
+ spec.add_development_dependency 'yard'
31
+ spec.add_development_dependency 'guard-yard'
32
+ end
@@ -0,0 +1,136 @@
1
+ require 'spec_helper'
2
+
3
+ describe MojoAuth do
4
+ describe 'create a secret' do
5
+ subject(:secret) { described_class.create_secret }
6
+
7
+ it { should be_a String }
8
+
9
+ it 'should be long enough' do
10
+ expect(secret.length).to be > 20
11
+ end
12
+ end
13
+
14
+ describe 'creating and testing credentials' do
15
+ let(:secret) { described_class.create_secret }
16
+
17
+ it 'raises if the secret is not provided' do
18
+ expect { described_class.create_credentials }.to raise_error
19
+ end
20
+
21
+ context 'without an asserted ID' do
22
+ let(:credentials) { described_class.create_credentials(secret: secret) }
23
+
24
+ describe 'for the generated credentials' do
25
+ it 'tests true' do
26
+ expect(described_class.test_credentials(credentials, secret: secret)).to be true
27
+ end
28
+ end
29
+
30
+ describe 'with an incorrect password' do
31
+ it 'tests false' do
32
+ expect(described_class.test_credentials({ username: credentials[:username], password: 'foobar' }, secret: secret)).to be false
33
+ end
34
+ end
35
+
36
+ describe 'with a different secret' do
37
+ it 'tests false' do
38
+ expect(described_class.test_credentials(credentials, secret: 'something_else')).to be false
39
+ end
40
+ end
41
+
42
+ describe 'when attempting to extend the expiration' do
43
+ it 'tests false' do
44
+ expect(described_class.test_credentials({ username: "#{(Time.now + 100_000).to_i}", password: credentials[:password] }, secret: secret)).to be false
45
+ end
46
+ end
47
+
48
+ describe 'after the default TTL (1 day) expires' do
49
+ around do |example|
50
+ credentials # Create the credentials before advancing the time
51
+ Timecop.freeze(Time.now + MojoAuth::DAY_IN_SECONDS + 1) do
52
+ example.run
53
+ end
54
+ end
55
+
56
+ it 'tests false' do
57
+ expect(described_class.test_credentials(credentials, secret: secret)).to be false
58
+ end
59
+ end
60
+
61
+ describe 'after expiry of a custom TTL' do
62
+ let(:ttl) { 200 }
63
+ let(:credentials) { described_class.create_credentials(secret: secret, ttl: ttl) }
64
+
65
+ around do |example|
66
+ credentials # Create the credentials before advancing the time
67
+ Timecop.freeze(Time.now + ttl + 1) do
68
+ example.run
69
+ end
70
+ end
71
+
72
+ it 'tests false' do
73
+ expect(described_class.test_credentials(credentials, secret: secret)).to be false
74
+ end
75
+ end
76
+ end
77
+
78
+ context 'with an asserted ID' do
79
+ let(:id) { SecureRandom.uuid }
80
+ let(:credentials) { described_class.create_credentials(id: id, secret: secret) }
81
+
82
+ describe 'for the generated credentials' do
83
+ it 'tests truthy, returning the asserted ID' do
84
+ expect(described_class.test_credentials(credentials, secret: secret)).to eql(id)
85
+ end
86
+ end
87
+
88
+ describe 'with an incorrect password' do
89
+ it 'tests false' do
90
+ expect(described_class.test_credentials({ username: credentials[:username], password: 'foobar' }, secret: secret)).to be false
91
+ end
92
+ end
93
+
94
+ describe 'with a different secret' do
95
+ it 'tests false' do
96
+ expect(described_class.test_credentials(credentials, secret: 'something_else')).to be false
97
+ end
98
+ end
99
+
100
+ describe 'when attempting to extend the expiration' do
101
+ it 'tests false' do
102
+ expect(described_class.test_credentials({ username: "#{(Time.now + 100_000).to_i}:#{id}", password: credentials[:password] }, secret: secret)).to be false
103
+ end
104
+ end
105
+
106
+ describe 'after the default TTL (1 day) expires' do
107
+ around do |example|
108
+ credentials # Create the credentials before advancing the time
109
+ Timecop.freeze(Time.now + MojoAuth::DAY_IN_SECONDS + 1) do
110
+ example.run
111
+ end
112
+ end
113
+
114
+ it 'tests false' do
115
+ expect(described_class.test_credentials(credentials, secret: secret)).to be false
116
+ end
117
+ end
118
+
119
+ describe 'after expiry of a custom TTL' do
120
+ let(:ttl) { 200 }
121
+ let(:credentials) { described_class.create_credentials(id: id, secret: secret, ttl: ttl) }
122
+
123
+ around do |example|
124
+ credentials # Create the credentials before advancing the time
125
+ Timecop.freeze(Time.now + ttl + 1) do
126
+ example.run
127
+ end
128
+ end
129
+
130
+ it 'tests false' do
131
+ expect(described_class.test_credentials(credentials, secret: secret)).to be false
132
+ end
133
+ end
134
+ end
135
+ end
136
+ end
@@ -0,0 +1,13 @@
1
+ require 'bundler/setup'
2
+ Bundler.setup
3
+
4
+ require 'coveralls'
5
+ Coveralls.wear!
6
+
7
+ require 'timecop'
8
+ Timecop.safe_mode = true
9
+
10
+ require 'mojo_auth'
11
+
12
+ RSpec.configure do
13
+ end
metadata ADDED
@@ -0,0 +1,216 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: mojo_auth
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Ben Langfeld
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2014-09-26 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: bundler
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '1.7'
20
+ type: :development
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '1.7'
27
+ - !ruby/object:Gem::Dependency
28
+ name: rake
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '10.0'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '10.0'
41
+ - !ruby/object:Gem::Dependency
42
+ name: guard
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '2.6'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '2.6'
55
+ - !ruby/object:Gem::Dependency
56
+ name: rspec
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: '3.0'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: '3.0'
69
+ - !ruby/object:Gem::Dependency
70
+ name: guard-rspec
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - "~>"
74
+ - !ruby/object:Gem::Version
75
+ version: '4.3'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - "~>"
81
+ - !ruby/object:Gem::Version
82
+ version: '4.3'
83
+ - !ruby/object:Gem::Dependency
84
+ name: rubocop
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - ">="
88
+ - !ruby/object:Gem::Version
89
+ version: '0'
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - ">="
95
+ - !ruby/object:Gem::Version
96
+ version: '0'
97
+ - !ruby/object:Gem::Dependency
98
+ name: guard-rubocop
99
+ requirement: !ruby/object:Gem::Requirement
100
+ requirements:
101
+ - - "~>"
102
+ - !ruby/object:Gem::Version
103
+ version: '1.1'
104
+ type: :development
105
+ prerelease: false
106
+ version_requirements: !ruby/object:Gem::Requirement
107
+ requirements:
108
+ - - "~>"
109
+ - !ruby/object:Gem::Version
110
+ version: '1.1'
111
+ - !ruby/object:Gem::Dependency
112
+ name: coveralls
113
+ requirement: !ruby/object:Gem::Requirement
114
+ requirements:
115
+ - - ">="
116
+ - !ruby/object:Gem::Version
117
+ version: '0'
118
+ type: :development
119
+ prerelease: false
120
+ version_requirements: !ruby/object:Gem::Requirement
121
+ requirements:
122
+ - - ">="
123
+ - !ruby/object:Gem::Version
124
+ version: '0'
125
+ - !ruby/object:Gem::Dependency
126
+ name: timecop
127
+ requirement: !ruby/object:Gem::Requirement
128
+ requirements:
129
+ - - "~>"
130
+ - !ruby/object:Gem::Version
131
+ version: '0.7'
132
+ type: :development
133
+ prerelease: false
134
+ version_requirements: !ruby/object:Gem::Requirement
135
+ requirements:
136
+ - - "~>"
137
+ - !ruby/object:Gem::Version
138
+ version: '0.7'
139
+ - !ruby/object:Gem::Dependency
140
+ name: yard
141
+ requirement: !ruby/object:Gem::Requirement
142
+ requirements:
143
+ - - ">="
144
+ - !ruby/object:Gem::Version
145
+ version: '0'
146
+ type: :development
147
+ prerelease: false
148
+ version_requirements: !ruby/object:Gem::Requirement
149
+ requirements:
150
+ - - ">="
151
+ - !ruby/object:Gem::Version
152
+ version: '0'
153
+ - !ruby/object:Gem::Dependency
154
+ name: guard-yard
155
+ requirement: !ruby/object:Gem::Requirement
156
+ requirements:
157
+ - - ">="
158
+ - !ruby/object:Gem::Version
159
+ version: '0'
160
+ type: :development
161
+ prerelease: false
162
+ version_requirements: !ruby/object:Gem::Requirement
163
+ requirements:
164
+ - - ">="
165
+ - !ruby/object:Gem::Version
166
+ version: '0'
167
+ description: MojoAuth is a set of standard approaches to cross-app authentication
168
+ based on HMAC.
169
+ email:
170
+ - ben@langfeld.me
171
+ executables: []
172
+ extensions: []
173
+ extra_rdoc_files: []
174
+ files:
175
+ - ".gitignore"
176
+ - ".rubocop.yml"
177
+ - ".travis.yml"
178
+ - CHANGELOG.md
179
+ - Gemfile
180
+ - Guardfile
181
+ - LICENSE.txt
182
+ - README.md
183
+ - Rakefile
184
+ - lib/mojo_auth.rb
185
+ - lib/mojo_auth/version.rb
186
+ - mojo-auth.gemspec
187
+ - spec/mojo_auth_spec.rb
188
+ - spec/spec_helper.rb
189
+ homepage: https://github.com/mojolingo/mojo_auth.rb
190
+ licenses:
191
+ - MIT
192
+ metadata: {}
193
+ post_install_message:
194
+ rdoc_options: []
195
+ require_paths:
196
+ - lib
197
+ required_ruby_version: !ruby/object:Gem::Requirement
198
+ requirements:
199
+ - - ">="
200
+ - !ruby/object:Gem::Version
201
+ version: '0'
202
+ required_rubygems_version: !ruby/object:Gem::Requirement
203
+ requirements:
204
+ - - ">="
205
+ - !ruby/object:Gem::Version
206
+ version: '0'
207
+ requirements: []
208
+ rubyforge_project:
209
+ rubygems_version: 2.2.2
210
+ signing_key:
211
+ specification_version: 4
212
+ summary: Implementation of MojoAuth in Ruby
213
+ test_files:
214
+ - spec/mojo_auth_spec.rb
215
+ - spec/spec_helper.rb
216
+ has_rdoc: