omniauth-github-organization 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +18 -0
- data/.rspec +1 -0
- data/Gemfile +13 -0
- data/Guardfile +10 -0
- data/LICENSE.txt +7 -0
- data/README.md +38 -0
- data/Rakefile +8 -0
- data/lib/omniauth-github-organization.rb +2 -0
- data/lib/omniauth-github-organization/version.rb +5 -0
- data/lib/omniauth/strategies/github_organization.rb +96 -0
- data/omniauth-github-organization.gemspec +24 -0
- data/spec/omniauth/strategies/github_organization_spec.rb +178 -0
- data/spec/spec_helper.rb +16 -0
- metadata +151 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 8ee761593b94579587c1458522cfdfab119045d82e5eb798871870d02699fca5
|
4
|
+
data.tar.gz: 7194d2d81ac82dd13fb5060c57274faa90cc0fe1eab6cdca28b4f18c8d91d815
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 15417059ecfd6ec0fd67ad42693f84c243d172cfb91fe4c17de53f77d7e5c1a0b9641e6e7cd5fec97b811bfed1b42b80afcd296e7dd3d835c13b0d552c0cc7da
|
7
|
+
data.tar.gz: 118b186fc9ef394f43f8f6ee9bf61f39dd9246c1f9e4a59e3f01930b0bfb4f3a4df6399d47689378f88ddaf04e0624e689b86098b1f8fcb01ddb7334269c282f
|
data/.gitignore
ADDED
data/.rspec
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
--colour
|
data/Gemfile
ADDED
data/Guardfile
ADDED
data/LICENSE.txt
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
Copyright (c) 2018 Sequoia Capital.
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
|
4
|
+
|
5
|
+
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
|
6
|
+
|
7
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,38 @@
|
|
1
|
+
# OmniAuth GitHub Organization
|
2
|
+
|
3
|
+
|
4
|
+
This is the OmniAuth strategy for authenticating to GitHub Organization. To
|
5
|
+
use it, you'll need to sign up for an OAuth2 Application ID and Secret
|
6
|
+
on the [GitHub Applications Page](https://github.com/settings/applications).
|
7
|
+
|
8
|
+
## Basic Usage
|
9
|
+
|
10
|
+
```ruby
|
11
|
+
use OmniAuth::Builder do
|
12
|
+
provider :github_organization, ENV['GITHUB_KEY'], ENV['GITHUB_SECRET'], organization: ENV['GITHUB_ORGANIZATION_NAME']
|
13
|
+
end
|
14
|
+
```
|
15
|
+
|
16
|
+
## Scopes
|
17
|
+
|
18
|
+
GitHub API v3 lets you set scopes to provide granular access to different types of data:
|
19
|
+
|
20
|
+
```ruby
|
21
|
+
use OmniAuth::Builder do
|
22
|
+
provider :github, ENV['GITHUB_KEY'], ENV['GITHUB_SECRET'],ENV['GITHUB_ORGANIZATION_NAME'], { organization: ENV['GITHUB_ORGANIZATION_NAME'], scope: "user,repo,gist" }
|
23
|
+
end
|
24
|
+
```
|
25
|
+
|
26
|
+
More info on [Scopes](http://developer.github.com/v3/oauth/#scopes).
|
27
|
+
|
28
|
+
## License
|
29
|
+
|
30
|
+
Copyright (c) 2018 Sequoia Capital.
|
31
|
+
|
32
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
|
33
|
+
|
34
|
+
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
|
35
|
+
|
36
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
37
|
+
|
38
|
+
> Fork by [omniauth-github](https://github.com/omniauth/omniauth-github). Copyright (c) 2011 Michael Bleigh and Intridea, Inc.
|
data/Rakefile
ADDED
@@ -0,0 +1,96 @@
|
|
1
|
+
require 'omniauth-oauth2'
|
2
|
+
|
3
|
+
module OmniAuth
|
4
|
+
module Strategies
|
5
|
+
class GitHubOrganization < OmniAuth::Strategies::OAuth2
|
6
|
+
option :name, 'github_organization'
|
7
|
+
option :scope, 'user,read:org'
|
8
|
+
option :organization, 'example'
|
9
|
+
# rubocop:disable Style/BracesAroundHashParameters
|
10
|
+
option :client_options, {
|
11
|
+
site: 'https://api.github.com',
|
12
|
+
authorize_url: 'https://github.com/login/oauth/authorize',
|
13
|
+
token_url: 'https://github.com/login/oauth/access_token'
|
14
|
+
}
|
15
|
+
|
16
|
+
def request_phase
|
17
|
+
super
|
18
|
+
end
|
19
|
+
|
20
|
+
def authorize_params
|
21
|
+
super.tap do |params|
|
22
|
+
%w[scope client_options].each do |v|
|
23
|
+
if request.params[v]
|
24
|
+
params[v.to_sym] = request.params[v]
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
|
30
|
+
def callback_phase
|
31
|
+
return fail!(:user_denied, CallbackError.new(:user_denied, options['organization'])) unless organizations.include? options['organization']
|
32
|
+
super
|
33
|
+
end
|
34
|
+
|
35
|
+
def organizations
|
36
|
+
access_token.options[:mode] = :query
|
37
|
+
organizations = access_token.get('user/orgs', headers: { 'Accept' => 'application/vnd.github.v3' }).parsed
|
38
|
+
organizations.map { |x| x['login'] }
|
39
|
+
end
|
40
|
+
|
41
|
+
uid { raw_info['id'].to_s }
|
42
|
+
|
43
|
+
info do
|
44
|
+
{
|
45
|
+
'nickname' => raw_info['login'],
|
46
|
+
'email' => email,
|
47
|
+
'name' => raw_info['name'],
|
48
|
+
'image' => raw_info['avatar_url'],
|
49
|
+
'organizations' => organizations,
|
50
|
+
'urls' => {
|
51
|
+
'GitHub' => raw_info['html_url'],
|
52
|
+
'Blog' => raw_info['blog'],
|
53
|
+
},
|
54
|
+
}
|
55
|
+
end
|
56
|
+
|
57
|
+
extra do
|
58
|
+
{ raw_info: raw_info, all_emails: emails }
|
59
|
+
end
|
60
|
+
|
61
|
+
def raw_info
|
62
|
+
access_token.options[:mode] = :query
|
63
|
+
@raw_info ||= access_token.get('user').parsed
|
64
|
+
end
|
65
|
+
|
66
|
+
def email
|
67
|
+
email_access_allowed? ? primary_email : raw_info['email']
|
68
|
+
end
|
69
|
+
|
70
|
+
def primary_email
|
71
|
+
primary = emails.find { |i| i['primary'] && i['verified'] }
|
72
|
+
primary && primary['email'] || nil
|
73
|
+
end
|
74
|
+
|
75
|
+
# The new /user/emails API - http://developer.github.com/v3/users/emails/#future-response
|
76
|
+
def emails
|
77
|
+
return [] unless email_access_allowed?
|
78
|
+
access_token.options[:mode] = :query
|
79
|
+
@emails ||= access_token.get('user/emails', headers: { 'Accept' => 'application/vnd.github.v3' }).parsed
|
80
|
+
end
|
81
|
+
|
82
|
+
def email_access_allowed?
|
83
|
+
return false unless options['scope']
|
84
|
+
email_scopes = %w[user user:email]
|
85
|
+
scopes = options['scope'].split(',')
|
86
|
+
(scopes & email_scopes).any?
|
87
|
+
end
|
88
|
+
|
89
|
+
def callback_url
|
90
|
+
full_host + script_name + callback_path
|
91
|
+
end
|
92
|
+
end
|
93
|
+
end
|
94
|
+
end
|
95
|
+
|
96
|
+
OmniAuth.config.add_camelization 'github_organization', 'GitHubOrganization'
|
@@ -0,0 +1,24 @@
|
|
1
|
+
require File.expand_path('../lib/omniauth-github-organization/version', __FILE__)
|
2
|
+
|
3
|
+
Gem::Specification.new do |gem|
|
4
|
+
gem.authors = ['Boris Ding', 'Michael Bleigh']
|
5
|
+
gem.email = %w[lding@sequoiacap.com michael@intridea.com]
|
6
|
+
gem.description = 'This is the OmniAuth strategy for authenticating to GitHub Organization.'
|
7
|
+
gem.summary = 'This is the OmniAuth strategy for authenticating to GitHub Organization.'
|
8
|
+
gem.homepage = 'https://github.com/sequoia-china/omniauth-github-organization'
|
9
|
+
gem.license = 'MIT'
|
10
|
+
|
11
|
+
gem.executables = `git ls-files -- bin/*`.split("\n").map{ |f| File.basename(f) }
|
12
|
+
gem.files = `git ls-files`.split("\n")
|
13
|
+
gem.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
|
14
|
+
gem.name = 'omniauth-github-organization'
|
15
|
+
gem.require_paths = ['lib']
|
16
|
+
gem.version = OmniAuth::GitHubOrganization::VERSION
|
17
|
+
|
18
|
+
gem.add_dependency 'omniauth', '~> 1.5'
|
19
|
+
gem.add_dependency 'omniauth-oauth2', '>= 1.4.0', '< 2.0'
|
20
|
+
gem.add_development_dependency 'rack-test'
|
21
|
+
gem.add_development_dependency 'rspec', '~> 3.5'
|
22
|
+
gem.add_development_dependency 'simplecov'
|
23
|
+
gem.add_development_dependency 'webmock'
|
24
|
+
end
|
@@ -0,0 +1,178 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
|
3
|
+
describe OmniAuth::Strategies::GitHubOrganization do
|
4
|
+
let(:access_token) { instance_double('AccessToken', options: {}) }
|
5
|
+
let(:parsed_response) { instance_double('ParsedResponse') }
|
6
|
+
let(:response) { instance_double('Response', parsed: parsed_response) }
|
7
|
+
|
8
|
+
let(:enterprise_site) { 'https://some.other.site.com/api/v3' }
|
9
|
+
let(:enterprise_authorize_url) { 'https://some.other.site.com/login/oauth/authorize' }
|
10
|
+
let(:enterprise_token_url) { 'https://some.other.site.com/login/oauth/access_token' }
|
11
|
+
let(:enterprise) do
|
12
|
+
OmniAuth::Strategies::GitHubOrganization.new('GITHUB_KEY', 'GITHUB_SECRET',
|
13
|
+
{
|
14
|
+
client_options: {
|
15
|
+
site: enterprise_site,
|
16
|
+
authorize_url: enterprise_authorize_url,
|
17
|
+
token_url: enterprise_token_url
|
18
|
+
},
|
19
|
+
organization: 'test'
|
20
|
+
}
|
21
|
+
)
|
22
|
+
end
|
23
|
+
|
24
|
+
subject do
|
25
|
+
OmniAuth::Strategies::GitHubOrganization.new({},scope: 'read:org')
|
26
|
+
end
|
27
|
+
|
28
|
+
before(:each) do
|
29
|
+
allow(subject).to receive(:access_token).and_return(access_token)
|
30
|
+
allow(subject).to receive(:organizations).and_return(%w[example test])
|
31
|
+
end
|
32
|
+
|
33
|
+
context 'client options' do
|
34
|
+
it 'should have correct site' do
|
35
|
+
expect(subject.options.client_options.site).to eq('https://api.github.com')
|
36
|
+
end
|
37
|
+
|
38
|
+
it 'should have correct authorize url' do
|
39
|
+
expect(subject.options.client_options.authorize_url).to eq('https://github.com/login/oauth/authorize')
|
40
|
+
end
|
41
|
+
|
42
|
+
it 'should have correct token url' do
|
43
|
+
expect(subject.options.client_options.token_url).to eq('https://github.com/login/oauth/access_token')
|
44
|
+
end
|
45
|
+
|
46
|
+
it 'should have correct organization name' do
|
47
|
+
expect(subject.options.organization).to eq('example')
|
48
|
+
end
|
49
|
+
|
50
|
+
describe 'should be overrideable' do
|
51
|
+
it 'for site' do
|
52
|
+
expect(enterprise.options.client_options.site).to eq(enterprise_site)
|
53
|
+
end
|
54
|
+
|
55
|
+
it 'for authorize url' do
|
56
|
+
expect(enterprise.options.client_options.authorize_url).to eq(enterprise_authorize_url)
|
57
|
+
end
|
58
|
+
|
59
|
+
it 'for token url' do
|
60
|
+
expect(enterprise.options.client_options.token_url).to eq(enterprise_token_url)
|
61
|
+
end
|
62
|
+
|
63
|
+
it 'for organization name' do
|
64
|
+
expect(enterprise.options.organization).to eq('test')
|
65
|
+
end
|
66
|
+
end
|
67
|
+
end
|
68
|
+
|
69
|
+
context '#email_access_allowed?' do
|
70
|
+
it 'should not allow email if scope is nil' do
|
71
|
+
expect(subject.options['scope']).to eq('read:org')
|
72
|
+
expect(subject).to_not be_email_access_allowed
|
73
|
+
end
|
74
|
+
|
75
|
+
it 'should allow email if scope is user' do
|
76
|
+
subject.options['scope'] = 'user'
|
77
|
+
expect(subject).to be_email_access_allowed
|
78
|
+
end
|
79
|
+
|
80
|
+
it 'should allow email if scope is a bunch of stuff including user' do
|
81
|
+
subject.options['scope'] = 'public_repo,user,repo,delete_repo,gist'
|
82
|
+
expect(subject).to be_email_access_allowed
|
83
|
+
end
|
84
|
+
|
85
|
+
it 'should not allow email if scope does not grant email access' do
|
86
|
+
subject.options['scope'] = 'repo,user:follow'
|
87
|
+
expect(subject).to_not be_email_access_allowed
|
88
|
+
end
|
89
|
+
|
90
|
+
it 'should assume email access not allowed if scope is something currently not documented' do
|
91
|
+
subject.options['scope'] = 'currently_not_documented'
|
92
|
+
expect(subject).to_not be_email_access_allowed
|
93
|
+
end
|
94
|
+
end
|
95
|
+
|
96
|
+
context '#email' do
|
97
|
+
it 'should return email from raw_info if available' do
|
98
|
+
allow(subject).to receive(:raw_info).and_return({ 'email' => 'you@example.com' })
|
99
|
+
expect(subject.email).to eq('you@example.com')
|
100
|
+
end
|
101
|
+
|
102
|
+
it 'should return nil if there is no raw_info and email access is not allowed' do
|
103
|
+
allow(subject).to receive(:raw_info).and_return({})
|
104
|
+
expect(subject.email).to be_nil
|
105
|
+
end
|
106
|
+
|
107
|
+
it 'should not return the primary email if there is no raw_info and email access is allowed' do
|
108
|
+
emails = [
|
109
|
+
{ 'email' => 'secondary@example.com', 'primary' => false },
|
110
|
+
{ 'email' => 'primary@example.com', 'primary' => true }
|
111
|
+
]
|
112
|
+
allow(subject).to receive(:raw_info).and_return({})
|
113
|
+
subject.options['scope'] = 'user'
|
114
|
+
allow(subject).to receive(:emails).and_return(emails)
|
115
|
+
expect(subject.email).to be_nil
|
116
|
+
end
|
117
|
+
|
118
|
+
it 'should not return the first email if there is no raw_info and email access is allowed' do
|
119
|
+
emails = [
|
120
|
+
{ 'email' => 'first@example.com', 'primary' => false },
|
121
|
+
{ 'email' => 'second@example.com', 'primary' => false }
|
122
|
+
]
|
123
|
+
allow(subject).to receive(:raw_info).and_return({})
|
124
|
+
subject.options['scope'] = 'user'
|
125
|
+
allow(subject).to receive(:emails).and_return(emails)
|
126
|
+
expect(subject.email).to be_nil
|
127
|
+
end
|
128
|
+
end
|
129
|
+
|
130
|
+
context '#raw_info' do
|
131
|
+
it 'should use relative paths' do
|
132
|
+
expect(access_token).to receive(:get).with('user').and_return(response)
|
133
|
+
expect(subject.raw_info).to eq(parsed_response)
|
134
|
+
end
|
135
|
+
end
|
136
|
+
|
137
|
+
context '#emails' do
|
138
|
+
it 'should use relative paths' do
|
139
|
+
expect(access_token).to receive(:get).with('user/emails', headers: {
|
140
|
+
'Accept' => 'application/vnd.github.v3'
|
141
|
+
}).and_return(response)
|
142
|
+
|
143
|
+
subject.options['scope'] = 'user'
|
144
|
+
expect(subject.emails).to eq(parsed_response)
|
145
|
+
end
|
146
|
+
end
|
147
|
+
|
148
|
+
context '#info.email' do
|
149
|
+
it 'should use any available email' do
|
150
|
+
allow(subject).to receive(:raw_info).and_return({})
|
151
|
+
allow(subject).to receive(:email).and_return('you@example.com')
|
152
|
+
expect(subject.info['email']).to eq('you@example.com')
|
153
|
+
end
|
154
|
+
end
|
155
|
+
|
156
|
+
context '#info.urls' do
|
157
|
+
it 'should use html_url from raw_info' do
|
158
|
+
allow(subject).to receive(:raw_info).and_return({ 'login' => 'me', 'html_url' => 'http://enterprise/me' })
|
159
|
+
expect(subject.info['urls']['GitHub']).to eq('http://enterprise/me')
|
160
|
+
end
|
161
|
+
end
|
162
|
+
|
163
|
+
describe '#callback_url' do
|
164
|
+
it 'is a combination of host, script name, and callback path' do
|
165
|
+
allow(subject).to receive(:full_host).and_return('https://example.com')
|
166
|
+
allow(subject).to receive(:script_name).and_return('/sub_uri')
|
167
|
+
|
168
|
+
expect(subject.callback_url).to eq('https://example.com/sub_uri/auth/github_organization/callback')
|
169
|
+
end
|
170
|
+
end
|
171
|
+
|
172
|
+
it 'is should return error if organization not match' do
|
173
|
+
allow(subject).to receive(:organizations).and_return(%w[not_match])
|
174
|
+
expect(subject).to receive(:fail!).with(:user_denied, anything)
|
175
|
+
subject.callback_phase
|
176
|
+
end
|
177
|
+
|
178
|
+
end
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1,16 @@
|
|
1
|
+
$:.unshift File.expand_path('..', __FILE__)
|
2
|
+
$:.unshift File.expand_path('../../lib', __FILE__)
|
3
|
+
require 'simplecov'
|
4
|
+
SimpleCov.start
|
5
|
+
require 'rspec'
|
6
|
+
require 'rack/test'
|
7
|
+
require 'webmock/rspec'
|
8
|
+
require 'omniauth'
|
9
|
+
require 'omniauth-github-organization'
|
10
|
+
|
11
|
+
RSpec.configure do |config|
|
12
|
+
config.include WebMock::API
|
13
|
+
config.include Rack::Test::Methods
|
14
|
+
config.extend OmniAuth::Test::StrategyMacros, type: :strategy
|
15
|
+
end
|
16
|
+
|
metadata
ADDED
@@ -0,0 +1,151 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: omniauth-github-organization
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.1.0
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Boris Ding
|
8
|
+
- Michael Bleigh
|
9
|
+
autorequire:
|
10
|
+
bindir: bin
|
11
|
+
cert_chain: []
|
12
|
+
date: 2018-02-27 00:00:00.000000000 Z
|
13
|
+
dependencies:
|
14
|
+
- !ruby/object:Gem::Dependency
|
15
|
+
name: omniauth
|
16
|
+
requirement: !ruby/object:Gem::Requirement
|
17
|
+
requirements:
|
18
|
+
- - "~>"
|
19
|
+
- !ruby/object:Gem::Version
|
20
|
+
version: '1.5'
|
21
|
+
type: :runtime
|
22
|
+
prerelease: false
|
23
|
+
version_requirements: !ruby/object:Gem::Requirement
|
24
|
+
requirements:
|
25
|
+
- - "~>"
|
26
|
+
- !ruby/object:Gem::Version
|
27
|
+
version: '1.5'
|
28
|
+
- !ruby/object:Gem::Dependency
|
29
|
+
name: omniauth-oauth2
|
30
|
+
requirement: !ruby/object:Gem::Requirement
|
31
|
+
requirements:
|
32
|
+
- - ">="
|
33
|
+
- !ruby/object:Gem::Version
|
34
|
+
version: 1.4.0
|
35
|
+
- - "<"
|
36
|
+
- !ruby/object:Gem::Version
|
37
|
+
version: '2.0'
|
38
|
+
type: :runtime
|
39
|
+
prerelease: false
|
40
|
+
version_requirements: !ruby/object:Gem::Requirement
|
41
|
+
requirements:
|
42
|
+
- - ">="
|
43
|
+
- !ruby/object:Gem::Version
|
44
|
+
version: 1.4.0
|
45
|
+
- - "<"
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: '2.0'
|
48
|
+
- !ruby/object:Gem::Dependency
|
49
|
+
name: rack-test
|
50
|
+
requirement: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - ">="
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: '0'
|
55
|
+
type: :development
|
56
|
+
prerelease: false
|
57
|
+
version_requirements: !ruby/object:Gem::Requirement
|
58
|
+
requirements:
|
59
|
+
- - ">="
|
60
|
+
- !ruby/object:Gem::Version
|
61
|
+
version: '0'
|
62
|
+
- !ruby/object:Gem::Dependency
|
63
|
+
name: rspec
|
64
|
+
requirement: !ruby/object:Gem::Requirement
|
65
|
+
requirements:
|
66
|
+
- - "~>"
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: '3.5'
|
69
|
+
type: :development
|
70
|
+
prerelease: false
|
71
|
+
version_requirements: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - "~>"
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '3.5'
|
76
|
+
- !ruby/object:Gem::Dependency
|
77
|
+
name: simplecov
|
78
|
+
requirement: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - ">="
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: '0'
|
83
|
+
type: :development
|
84
|
+
prerelease: false
|
85
|
+
version_requirements: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ">="
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0'
|
90
|
+
- !ruby/object:Gem::Dependency
|
91
|
+
name: webmock
|
92
|
+
requirement: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - ">="
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '0'
|
97
|
+
type: :development
|
98
|
+
prerelease: false
|
99
|
+
version_requirements: !ruby/object:Gem::Requirement
|
100
|
+
requirements:
|
101
|
+
- - ">="
|
102
|
+
- !ruby/object:Gem::Version
|
103
|
+
version: '0'
|
104
|
+
description: This is the OmniAuth strategy for authenticating to GitHub Organization.
|
105
|
+
email:
|
106
|
+
- lding@sequoiacap.com
|
107
|
+
- michael@intridea.com
|
108
|
+
executables: []
|
109
|
+
extensions: []
|
110
|
+
extra_rdoc_files: []
|
111
|
+
files:
|
112
|
+
- ".gitignore"
|
113
|
+
- ".rspec"
|
114
|
+
- Gemfile
|
115
|
+
- Guardfile
|
116
|
+
- LICENSE.txt
|
117
|
+
- README.md
|
118
|
+
- Rakefile
|
119
|
+
- lib/omniauth-github-organization.rb
|
120
|
+
- lib/omniauth-github-organization/version.rb
|
121
|
+
- lib/omniauth/strategies/github_organization.rb
|
122
|
+
- omniauth-github-organization.gemspec
|
123
|
+
- spec/omniauth/strategies/github_organization_spec.rb
|
124
|
+
- spec/spec_helper.rb
|
125
|
+
homepage: https://github.com/sequoia-china/omniauth-github-organization
|
126
|
+
licenses:
|
127
|
+
- MIT
|
128
|
+
metadata: {}
|
129
|
+
post_install_message:
|
130
|
+
rdoc_options: []
|
131
|
+
require_paths:
|
132
|
+
- lib
|
133
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
134
|
+
requirements:
|
135
|
+
- - ">="
|
136
|
+
- !ruby/object:Gem::Version
|
137
|
+
version: '0'
|
138
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
139
|
+
requirements:
|
140
|
+
- - ">="
|
141
|
+
- !ruby/object:Gem::Version
|
142
|
+
version: '0'
|
143
|
+
requirements: []
|
144
|
+
rubyforge_project:
|
145
|
+
rubygems_version: 2.7.3
|
146
|
+
signing_key:
|
147
|
+
specification_version: 4
|
148
|
+
summary: This is the OmniAuth strategy for authenticating to GitHub Organization.
|
149
|
+
test_files:
|
150
|
+
- spec/omniauth/strategies/github_organization_spec.rb
|
151
|
+
- spec/spec_helper.rb
|