octoauth 0.0.1 → 0.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 2f18a1e0fb13d72ba6e6280673831a2e6e855a42
4
- data.tar.gz: b59375a0a2a198e939a55306f75edf9d1eb5c603
3
+ metadata.gz: e662d2be3726ad6da9d18f4404199106052aa599
4
+ data.tar.gz: f139f60f766463b2ee0ecdd0aa17ae6464e18573
5
5
  SHA512:
6
- metadata.gz: 209f5e8f5a68cd9ae9d3c993d4bb74021d61bf10dad180e778da96c2d32b1a578abb4c464cb8bd5a7646a784fb3c6534cd8be9a9f16bb76ddaf456c178e1876e
7
- data.tar.gz: 6994adcdf5e62c89d0a8b218ae14a4f5d9ef5d2acfbea00acd23e0ca9d067ecee3cd2cc5efcfc386ceacc72fd6d4e77cecf12295c3bf4c01aa1e0390f23b4102
6
+ metadata.gz: 5a9e4b20659320da55cc9f913be5e7fd151dfd2bbff4328716555e1e393b343bea4e0eae16e784785c9daea172039dbc5846697a8b881bf6fd60c3bd3d254980
7
+ data.tar.gz: 8344027f6637f8f54cc4691ea7b171e6511a11f82b2ff6e922b8a250883b9f5262b579a1c3f82f3d9f7f12facd698d8575500b762284a8c31c58f24dbcb4fd6f
data/.gitignore CHANGED
@@ -3,3 +3,5 @@ coverage/
3
3
  .coveralls.yml
4
4
  .bundle
5
5
  Gemfile.lock
6
+ spec/examples/tmp.yml
7
+ spec/examples/priv_test.yml
data/README.md CHANGED
@@ -8,10 +8,47 @@ octoauth
8
8
  [![Build Status](https://img.shields.io/travis/akerl/octoauth.svg)](https://travis-ci.org/akerl/octoauth)
9
9
  [![MIT Licensed](https://img.shields.io/badge/license-MIT-green.svg)](https://tldrlegal.com/license/mit-license)
10
10
 
11
- SHORT_DESCRIPTION
11
+ Authentication wrapper for GitHub's API
12
12
 
13
13
  ## Usage
14
14
 
15
+ Get your authentication token quickly and simply:
16
+
17
+ ```
18
+ require 'octoauth'
19
+
20
+ auth = Octoauth.new note: 'my_cool_app'
21
+ puts "My token is #{auth.token}"
22
+ ```
23
+
24
+ This will prompt the user for a username/password and potentially 2FA token using [userinput](https://github.com/akerl/userinput). A note is required, and is what the token will appear as in the user's GitHub tokens list.
25
+
26
+ If you want to store this token and reuse it, just drop it into a file. The default file is ~/.octoauth.yml. Subsequent runs with the same file and note will load the same token without prompting the user:
27
+
28
+ ```
29
+ auth = Octoauth.new note: 'my_cooler_app', file: :default
30
+ puts "My token is #{auth.token}"
31
+ auth.save
32
+
33
+ other_auth = Octoauth.new note: 'other_nice_app', file: '~/.other_app_config.yml'
34
+ puts "The other token is #{other_auth.token}"
35
+ other_auth.save
36
+ ```
37
+
38
+ The above examples get us the basic scope, which means some read-only public access. For other scopes, specify them when creating the token:
39
+
40
+ ```
41
+ auth = Octoauth.new note: 'my_app', scopes: ['gist', 'delete_repo']
42
+ ```
43
+
44
+ If you're trying to use this with a GitHub Enterprise deployment, you can specify an alternate API endpoint:
45
+
46
+ ```
47
+ auth = Octoauth.new note: 'enterprise_app', api_endpoint: 'https://sekrit.codez.com/api/v3/'
48
+ ```
49
+
50
+ If an alternate endpoint is provided, that string is included as part of the saved config, so you can generate a token for GitHub and multiple alternate endpoints with the same note in the same config file.
51
+
15
52
  ## Installation
16
53
 
17
54
  gem install octoauth
data/lib/octoauth.rb CHANGED
@@ -1,6 +1,3 @@
1
- require 'octokit'
2
- require 'userinput'
3
-
4
1
  ##
5
2
  # Octokit wrapper for simplifying authentication
6
3
  module Octoauth
@@ -11,38 +8,7 @@ module Octoauth
11
8
  self::Auth.new(*args)
12
9
  end
13
10
  end
14
-
15
- ##
16
- # Define some sane defaults
17
- DEFAULTS = {
18
- file: '~/.octoauth.yml'
19
- }
20
-
21
- ##
22
- # Authentication object
23
- class Auth
24
- attr_reader :user, :note, :file
25
-
26
- def initialize(params = {})
27
- @user = nil
28
- @file = params.delete(:file) || DEFAULTS[:file]
29
- @note = params.delete(:note)
30
- fail ArgumentError, 'Must provide a note for GitHub token' if @note.nil?
31
- @api = Octokit::Client.new params
32
- end
33
-
34
- def authenticate!(params = {})
35
- end
36
-
37
- private
38
-
39
- def login
40
- end
41
-
42
- def password
43
- end
44
-
45
- def twofactor
46
- end
47
- end
48
11
  end
12
+
13
+ require 'octoauth/configfile'
14
+ require 'octoauth/auth'
@@ -0,0 +1,74 @@
1
+ require 'octokit'
2
+ require 'userinput'
3
+
4
+ ##
5
+ # Define Auth object and related info for Octoauth
6
+ module Octoauth
7
+ ##
8
+ # Default OAuth scopes for tokens
9
+ DEFAULT_SCOPES = []
10
+
11
+ ##
12
+ # Prompt information for collecting user info
13
+ PROMPTS = {
14
+ login: UserInput.new(message: 'GitHub username', validation: /\w+/),
15
+ password: UserInput.new(message: 'Password', secret: true),
16
+ twofactor: UserInput.new(message: '2FA token', validation: /\d+/)
17
+ }
18
+
19
+ ##
20
+ # Authentication object
21
+ class Auth
22
+ attr_reader :token
23
+
24
+ def initialize(params = {})
25
+ params[:config_note] = params[:note].dup
26
+ if params.include? :api_endpoint
27
+ params[:config_note] << "--#{params[:api_endpoint]}"
28
+ end
29
+ @config = ConfigFile.new file: params[:file], note: params[:config_note]
30
+ @token = load_token params
31
+ end
32
+
33
+ def save
34
+ fail 'No token to save' unless @token
35
+ @config.token = @token
36
+ @config.write
37
+ end
38
+
39
+ private
40
+
41
+ def load_token(params = {})
42
+ return @config.token if @config.token
43
+ params[:login] ||= PROMPTS[:login].ask
44
+ params[:password] ||= PROMPTS[:password].ask
45
+ params[:twofactor] ||= PROMPTS[:twofactor].ask if params[:needs2fa]
46
+ params[:scopes] ||= DEFAULT_SCOPES
47
+ if params[:twofactor]
48
+ params[:headers] = { 'X-GitHub-OTP' => params[:twofactor] }
49
+ end
50
+ authenticate! params
51
+ end
52
+
53
+ def authenticate!(params = {})
54
+ client = Octokit::Client.new(
55
+ params.subset(:login, :password, :api_endpoint)
56
+ )
57
+ client.create_authorization(
58
+ params.subset(:note, :scopes, :headers)
59
+ ).token
60
+ rescue Octokit::OneTimePasswordRequired
61
+ load_token params.merge(needs2fa: true)
62
+ rescue Octokit::UnprocessableEntity
63
+ client.authorizations.find { |x| x[:note] == params[:note] }.token
64
+ end
65
+ end
66
+ end
67
+
68
+ ##
69
+ # Add .subset to Hash for selecting a subhash
70
+ class Hash
71
+ def subset(*keys)
72
+ select { |k| keys.include? k }
73
+ end
74
+ end
@@ -0,0 +1,41 @@
1
+ require 'yaml'
2
+
3
+ ##
4
+ # Define Config spec
5
+ module Octoauth
6
+ ##
7
+ # Define default file path
8
+ DEFAULT_FILE = '~/.octoauth.yml'
9
+
10
+ ##
11
+ # Configuration object
12
+ class ConfigFile
13
+ attr_reader :file
14
+ attr_accessor :token
15
+
16
+ ##
17
+ # Create new Config object, either ephemerally or from a file
18
+ def initialize(params = {})
19
+ @file = params[:file] == :default ? DEFAULT_FILE : params[:file]
20
+ @note = params[:note] || fail(ArgumentError, 'A note must be provided')
21
+ @token = parse
22
+ end
23
+
24
+ def write
25
+ new = get
26
+ new[@note] = @token
27
+ File.open(@file, 'w', 0400) { |fh| fh.write new.to_yaml }
28
+ end
29
+
30
+ private
31
+
32
+ def get
33
+ return {} unless @file && File.exist?(@file)
34
+ YAML.load File.read(File.expand_path(@file))
35
+ end
36
+
37
+ def parse
38
+ get[@note]
39
+ end
40
+ end
41
+ end
data/octoauth.gemspec CHANGED
@@ -1,6 +1,6 @@
1
1
  Gem::Specification.new do |s|
2
2
  s.name = 'octoauth'
3
- s.version = '0.0.1'
3
+ s.version = '0.0.2'
4
4
  s.date = Time.now.strftime("%Y-%m-%d")
5
5
 
6
6
  s.summary = ''
@@ -13,11 +13,11 @@ Gem::Specification.new do |s|
13
13
  s.files = `git ls-files`.split
14
14
  s.test_files = `git ls-files spec/*`.split
15
15
 
16
- s.add_dependency 'octokit', '~> 3.0.0'
16
+ s.add_dependency 'octokit', '~> 3.1.0'
17
17
  s.add_dependency 'userinput', '~> 0.0.2'
18
18
 
19
19
  s.add_development_dependency 'rubocop', '~> 0.20.0'
20
- s.add_development_dependency 'rake', '~> 10.2.1'
20
+ s.add_development_dependency 'rake', '~> 10.3.0'
21
21
  s.add_development_dependency 'coveralls', '~> 0.7.0'
22
22
  s.add_development_dependency 'rspec', '~> 2.14.1'
23
23
  s.add_development_dependency 'fuubar', '~> 1.3.2'
@@ -0,0 +1,3 @@
1
+ ---
2
+ foo: 'bcdebcdebcdebcdebcdebcdebcde'
3
+
@@ -0,0 +1,146 @@
1
+ require 'spec_helper'
2
+ require 'fileutils'
3
+
4
+ ##
5
+ # Shim object for mocking auth resources
6
+ AuthShim = Struct.new(:note, :token)
7
+
8
+ module UserInput
9
+ ##
10
+ # Mask prints from UserInput
11
+ class Prompt
12
+ def print(*args)
13
+ end
14
+
15
+ def puts(*args)
16
+ end
17
+ end
18
+ end
19
+
20
+ describe Octoauth do
21
+ describe Octoauth::Auth do
22
+ describe '#initialize' do
23
+ context 'if the file and note already exist' do
24
+ it 'loads the existing token' do
25
+ auth = Octoauth::Auth.new(
26
+ note: 'foo',
27
+ file: 'spec/examples/conf_a.yml'
28
+ )
29
+ expect(auth.token).to eql 'bcdebcdebcdebcdebcdebcdebcde'
30
+ end
31
+ end
32
+ context 'if there is a note conflict' do
33
+ it 'returns the existing token' do
34
+ stub_request(:post, 'https://user:pw@api.github.com/authorizations')
35
+ .with(body: "{\"note\":\"existing\",\"scopes\":[]}")
36
+ .to_return(status: 422)
37
+ stub_request(:get, 'https://user:pw@api.github.com/authorizations')
38
+ .to_return(
39
+ status: 200,
40
+ body: [
41
+ AuthShim.new('not_match', 'bad'),
42
+ AuthShim.new('existing', 'existing_token')
43
+ ]
44
+ )
45
+ auth = Octoauth::Auth.new(
46
+ note: 'existing',
47
+ login: 'user',
48
+ password: 'pw'
49
+ )
50
+ expect(auth.token).to eql 'existing_token'
51
+ end
52
+ end
53
+ context 'if the file does not exist' do
54
+ it 'requests user input to create token' do
55
+ stub_request(:post, 'https://user:pw@api.github.com/authorizations')
56
+ .with(body: "{\"note\":\"foo\",\"scopes\":[]}")
57
+ .to_return(
58
+ status: 200,
59
+ body: AuthShim.new('foo', 'qwertyqwertyqwertyqwerty')
60
+ )
61
+ auth = Octoauth::Auth.new(
62
+ note: 'foo',
63
+ login: 'user',
64
+ password: 'pw'
65
+ )
66
+ expect(auth.token).to eql 'qwertyqwertyqwertyqwerty'
67
+ end
68
+ it 'handles users with 2 factor auth enabled' do
69
+ stub_request(:post, 'https://user:pw@api.github.com/authorizations')
70
+ .with(body: "{\"note\":\"foo\",\"scopes\":[]}")
71
+ .to_return(
72
+ status: 401,
73
+ headers: { 'X-GitHub-OTP' => 'required; app' }
74
+ )
75
+ stub_request(:post, 'https://user:pw@api.github.com/authorizations')
76
+ .with(
77
+ body: "{\"note\":\"foo\",\"scopes\":[]}",
78
+ headers: { 'X-GitHub-OTP' => '1234' }
79
+ )
80
+ .to_return(
81
+ status: 200,
82
+ body: AuthShim.new('foo', 'qwertyqwertyqwertyqwerty')
83
+ )
84
+ allow(STDIN).to receive(:gets).and_return("user\n", "pw\n", "1234\n")
85
+ auth = Octoauth::Auth.new(note: 'foo')
86
+ expect(auth.token).to eql 'qwertyqwertyqwertyqwerty'
87
+ end
88
+ end
89
+ it 'supports alternate endpoints' do
90
+ stub_request(:post, 'https://user:pw@sekrit.com/api/v3/authorizations')
91
+ .with(body: "{\"note\":\"foo\",\"scopes\":[]}")
92
+ .to_return(
93
+ status: 200,
94
+ body: AuthShim.new('foo', 'qwertyqwertyqwertyqwerty')
95
+ )
96
+ auth = Octoauth::Auth.new(
97
+ note: 'foo',
98
+ login: 'user',
99
+ password: 'pw',
100
+ api_endpoint: 'https://sekrit.com/api/v3/'
101
+ )
102
+ expect(auth.token).to eql 'qwertyqwertyqwertyqwerty'
103
+ end
104
+ it 'supports requesting scopes' do
105
+ stub_request(:post, 'https://user:pw@api.github.com/authorizations')
106
+ .with(body: '{"note":"foo","scopes":["gist","delete_repo"]}')
107
+ .to_return(
108
+ status: 200,
109
+ body: AuthShim.new('foo', 'qwertyqwertyqwertyqwerty')
110
+ )
111
+ auth = Octoauth::Auth.new(
112
+ note: 'foo',
113
+ login: 'user',
114
+ password: 'pw',
115
+ scopes: %w(gist delete_repo)
116
+ )
117
+ expect(auth.token).to eql 'qwertyqwertyqwertyqwerty'
118
+ end
119
+ end
120
+
121
+ describe '#save' do
122
+ it 'saves the config to disk' do
123
+ random = rand(36**30).to_s(30)
124
+ FileUtils.rm_f 'spec/examples/tmp.yml'
125
+ stub_request(:post, 'https://user:pw@api.github.com/authorizations')
126
+ .with(body: "{\"note\":\"write_test\",\"scopes\":[]}")
127
+ .to_return(
128
+ status: 200,
129
+ body: AuthShim.new('foo', random)
130
+ )
131
+ auth = Octoauth::Auth.new(
132
+ note: 'write_test',
133
+ file: 'spec/examples/tmp.yml',
134
+ login: 'user',
135
+ password: 'pw'
136
+ )
137
+ auth.save
138
+ new_auth = Octoauth::Auth.new(
139
+ note: 'write_test',
140
+ file: 'spec/examples/tmp.yml'
141
+ )
142
+ expect(new_auth.token).to eql random
143
+ end
144
+ end
145
+ end
146
+ end
@@ -0,0 +1,68 @@
1
+ require 'spec_helper'
2
+ require 'fileutils'
3
+
4
+ describe Octoauth do
5
+ describe Octoauth::ConfigFile do
6
+ describe '#initialize' do
7
+ it 'requires a note' do
8
+ expect { Octoauth::ConfigFile.new }.to raise_error ArgumentError
9
+ end
10
+ context 'when given a file path' do
11
+ it 'loads that config' do
12
+ config = Octoauth::ConfigFile.new(
13
+ note: 'foo',
14
+ file: 'spec/examples/conf_a.yml'
15
+ )
16
+ expect(config.token).to eql 'bcdebcdebcdebcdebcdebcdebcde'
17
+ end
18
+ it 'returns nil if the file does not exist' do
19
+ config = Octoauth::ConfigFile.new(note: 'foo', file: 'wat')
20
+ expect(config.token).to be_nil
21
+ end
22
+ end
23
+ context 'when give :default' do
24
+ it 'uses the default file' do
25
+ config = Octoauth::ConfigFile.new(note: 'foo', file: :default)
26
+ expect(config.file).to eql Octoauth::DEFAULT_FILE
27
+ end
28
+ end
29
+ context 'when given no file' do
30
+ it 'returns an empty hash' do
31
+ config = Octoauth::ConfigFile.new(note: 'foo')
32
+ expect(config.token).to be_nil
33
+ expect(config.file).to be_nil
34
+ end
35
+ end
36
+ end
37
+
38
+ describe '#write' do
39
+ it 'saves a config to disk' do
40
+ FileUtils.rm_f 'spec/examples/tmp.yml'
41
+ random = rand(36**30).to_s(30)
42
+ config = Octoauth::ConfigFile.new(
43
+ note: 'bar',
44
+ file: 'spec/examples/tmp.yml'
45
+ )
46
+ config.token = random
47
+ config.write
48
+ new_config = Octoauth::ConfigFile.new(
49
+ note: 'bar',
50
+ file: 'spec/examples/tmp.yml'
51
+ )
52
+ expect(new_config.token).to eql random
53
+ end
54
+ it 'makes the config file owner-readable' do
55
+ FileUtils.rm_f 'spec/examples/priv_test.yml'
56
+ random = rand(36**30).to_s(30)
57
+ config = Octoauth::ConfigFile.new(
58
+ note: 'bar',
59
+ file: 'spec/examples/priv_test.yml'
60
+ )
61
+ config.token = random
62
+ config.write
63
+ privs = File.stat('spec/examples/priv_test.yml').mode.to_s(8)
64
+ expect(privs).to eql '100400'
65
+ end
66
+ end
67
+ end
68
+ end
@@ -3,15 +3,13 @@ require 'spec_helper'
3
3
  describe Octoauth do
4
4
  describe '#new' do
5
5
  it 'creates auth objects' do
6
- expect(Octoauth.new).to be_an_instance_of Octoauth::Auth
7
- end
8
- end
9
-
10
- describe Octoauth::Auth do
11
- let(:subject) { Octoauth::Auth.new }
12
-
13
- it 'creates an auth object' do
14
- expect(subject).to be_an_instance_of Octoauth::Auth
6
+ stub_request(:post, 'https://good:sekrit@api.github.com/authorizations')
7
+ .to_return(
8
+ status: 200,
9
+ body: Struct.new(:token).new('abcdabcdabcdabcdabcdabcdabcdabcdabcd')
10
+ )
11
+ auth = Octoauth.new note: 'testing', login: 'good', password: 'sekrit'
12
+ expect(auth).to be_an_instance_of Octoauth::Auth
15
13
  end
16
14
  end
17
15
  end
metadata CHANGED
@@ -1,125 +1,125 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: octoauth
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.1
4
+ version: 0.0.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Les Aker
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-04-06 00:00:00.000000000 Z
11
+ date: 2014-04-20 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: octokit
15
15
  requirement: !ruby/object:Gem::Requirement
16
16
  requirements:
17
- - - ~>
17
+ - - "~>"
18
18
  - !ruby/object:Gem::Version
19
- version: 3.0.0
19
+ version: 3.1.0
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
- - - ~>
24
+ - - "~>"
25
25
  - !ruby/object:Gem::Version
26
- version: 3.0.0
26
+ version: 3.1.0
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: userinput
29
29
  requirement: !ruby/object:Gem::Requirement
30
30
  requirements:
31
- - - ~>
31
+ - - "~>"
32
32
  - !ruby/object:Gem::Version
33
33
  version: 0.0.2
34
34
  type: :runtime
35
35
  prerelease: false
36
36
  version_requirements: !ruby/object:Gem::Requirement
37
37
  requirements:
38
- - - ~>
38
+ - - "~>"
39
39
  - !ruby/object:Gem::Version
40
40
  version: 0.0.2
41
41
  - !ruby/object:Gem::Dependency
42
42
  name: rubocop
43
43
  requirement: !ruby/object:Gem::Requirement
44
44
  requirements:
45
- - - ~>
45
+ - - "~>"
46
46
  - !ruby/object:Gem::Version
47
47
  version: 0.20.0
48
48
  type: :development
49
49
  prerelease: false
50
50
  version_requirements: !ruby/object:Gem::Requirement
51
51
  requirements:
52
- - - ~>
52
+ - - "~>"
53
53
  - !ruby/object:Gem::Version
54
54
  version: 0.20.0
55
55
  - !ruby/object:Gem::Dependency
56
56
  name: rake
57
57
  requirement: !ruby/object:Gem::Requirement
58
58
  requirements:
59
- - - ~>
59
+ - - "~>"
60
60
  - !ruby/object:Gem::Version
61
- version: 10.2.1
61
+ version: 10.3.0
62
62
  type: :development
63
63
  prerelease: false
64
64
  version_requirements: !ruby/object:Gem::Requirement
65
65
  requirements:
66
- - - ~>
66
+ - - "~>"
67
67
  - !ruby/object:Gem::Version
68
- version: 10.2.1
68
+ version: 10.3.0
69
69
  - !ruby/object:Gem::Dependency
70
70
  name: coveralls
71
71
  requirement: !ruby/object:Gem::Requirement
72
72
  requirements:
73
- - - ~>
73
+ - - "~>"
74
74
  - !ruby/object:Gem::Version
75
75
  version: 0.7.0
76
76
  type: :development
77
77
  prerelease: false
78
78
  version_requirements: !ruby/object:Gem::Requirement
79
79
  requirements:
80
- - - ~>
80
+ - - "~>"
81
81
  - !ruby/object:Gem::Version
82
82
  version: 0.7.0
83
83
  - !ruby/object:Gem::Dependency
84
84
  name: rspec
85
85
  requirement: !ruby/object:Gem::Requirement
86
86
  requirements:
87
- - - ~>
87
+ - - "~>"
88
88
  - !ruby/object:Gem::Version
89
89
  version: 2.14.1
90
90
  type: :development
91
91
  prerelease: false
92
92
  version_requirements: !ruby/object:Gem::Requirement
93
93
  requirements:
94
- - - ~>
94
+ - - "~>"
95
95
  - !ruby/object:Gem::Version
96
96
  version: 2.14.1
97
97
  - !ruby/object:Gem::Dependency
98
98
  name: fuubar
99
99
  requirement: !ruby/object:Gem::Requirement
100
100
  requirements:
101
- - - ~>
101
+ - - "~>"
102
102
  - !ruby/object:Gem::Version
103
103
  version: 1.3.2
104
104
  type: :development
105
105
  prerelease: false
106
106
  version_requirements: !ruby/object:Gem::Requirement
107
107
  requirements:
108
- - - ~>
108
+ - - "~>"
109
109
  - !ruby/object:Gem::Version
110
110
  version: 1.3.2
111
111
  - !ruby/object:Gem::Dependency
112
112
  name: webmock
113
113
  requirement: !ruby/object:Gem::Requirement
114
114
  requirements:
115
- - - ~>
115
+ - - "~>"
116
116
  - !ruby/object:Gem::Version
117
117
  version: 1.17.4
118
118
  type: :development
119
119
  prerelease: false
120
120
  version_requirements: !ruby/object:Gem::Requirement
121
121
  requirements:
122
- - - ~>
122
+ - - "~>"
123
123
  - !ruby/object:Gem::Version
124
124
  version: 1.17.4
125
125
  description: ''
@@ -128,16 +128,21 @@ executables: []
128
128
  extensions: []
129
129
  extra_rdoc_files: []
130
130
  files:
131
- - .gitignore
132
- - .rspec
133
- - .rubocop.yml
134
- - .travis.yml
131
+ - ".gitignore"
132
+ - ".rspec"
133
+ - ".rubocop.yml"
134
+ - ".travis.yml"
135
135
  - Gemfile
136
136
  - LICENSE
137
137
  - README.md
138
138
  - Rakefile
139
139
  - lib/octoauth.rb
140
+ - lib/octoauth/auth.rb
141
+ - lib/octoauth/configfile.rb
140
142
  - octoauth.gemspec
143
+ - spec/examples/conf_a.yml
144
+ - spec/octoauth/auth_spec.rb
145
+ - spec/octoauth/configfile_spec.rb
141
146
  - spec/octoauth_spec.rb
142
147
  - spec/spec_helper.rb
143
148
  homepage: https://github.com/akerl/octoauth
@@ -150,12 +155,12 @@ require_paths:
150
155
  - lib
151
156
  required_ruby_version: !ruby/object:Gem::Requirement
152
157
  requirements:
153
- - - '>='
158
+ - - ">="
154
159
  - !ruby/object:Gem::Version
155
160
  version: '0'
156
161
  required_rubygems_version: !ruby/object:Gem::Requirement
157
162
  requirements:
158
- - - '>='
163
+ - - ">="
159
164
  - !ruby/object:Gem::Version
160
165
  version: '0'
161
166
  requirements: []
@@ -165,5 +170,8 @@ signing_key:
165
170
  specification_version: 4
166
171
  summary: ''
167
172
  test_files:
173
+ - spec/examples/conf_a.yml
174
+ - spec/octoauth/auth_spec.rb
175
+ - spec/octoauth/configfile_spec.rb
168
176
  - spec/octoauth_spec.rb
169
177
  - spec/spec_helper.rb