omniauth-oauth 1.0.0.beta1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +17 -0
- data/.rspec +2 -0
- data/Gemfile +12 -0
- data/Guardfile +11 -0
- data/README.md +78 -0
- data/Rakefile +9 -0
- data/lib/omniauth-oauth.rb +3 -0
- data/lib/omniauth-oauth/version.rb +5 -0
- data/lib/omniauth/strategies/oauth.rb +81 -0
- data/omniauth-oauth.gemspec +24 -0
- data/spec/omniauth/strategies/oauth_spec.rb +140 -0
- data/spec/spec_helper.rb +16 -0
- metadata +125 -0
data/.gitignore
ADDED
data/.rspec
ADDED
data/Gemfile
ADDED
data/Guardfile
ADDED
data/README.md
ADDED
@@ -0,0 +1,78 @@
|
|
1
|
+
# OmniAuth OAuth
|
2
|
+
|
3
|
+
**Note:** This gem is designed to work with the in-beta OmniAuth 1.0
|
4
|
+
library. It will not be officially released on RubyGems.org until
|
5
|
+
OmniAuth 1.0 is released.
|
6
|
+
|
7
|
+
This gem contains a generic OAuth strategy for OmniAuth. It is meant to
|
8
|
+
serve as a building block strategy for other strategies and not to be
|
9
|
+
used independently (since it has no inherent way to gather uid and user
|
10
|
+
info).
|
11
|
+
|
12
|
+
## Creating an OAuth Strategy
|
13
|
+
|
14
|
+
To create an OmniAuth OAuth strategy using this gem, you can simply
|
15
|
+
subclass it and add a few extra methods like so:
|
16
|
+
|
17
|
+
require 'omniauth-oauth'
|
18
|
+
|
19
|
+
module OmniAuth
|
20
|
+
module Strategies
|
21
|
+
class SomeSite < OmniAuth::Strategies::OAuth
|
22
|
+
# Give your strategy a name.
|
23
|
+
option :name, "some_site"
|
24
|
+
|
25
|
+
# This is where you pass the options you would pass when
|
26
|
+
# initializing your consumer from the OAuth gem.
|
27
|
+
option :client_options, {:site => "https://api.somesite.com"}
|
28
|
+
|
29
|
+
# These are called after authentication has succeeded. If
|
30
|
+
# possible, you should try to set the UID without making
|
31
|
+
# additional calls (if the user id is returned with the token
|
32
|
+
# or as a URI parameter). This may not be possible with all
|
33
|
+
# providers.
|
34
|
+
uid{ request.params['user_id'] }
|
35
|
+
|
36
|
+
info do
|
37
|
+
{
|
38
|
+
:name => raw_info['name'],
|
39
|
+
:location => raw_info['city']
|
40
|
+
}
|
41
|
+
end
|
42
|
+
|
43
|
+
extra do
|
44
|
+
{
|
45
|
+
'raw_info' => raw_info
|
46
|
+
}
|
47
|
+
end
|
48
|
+
|
49
|
+
def raw_info
|
50
|
+
@raw_info ||= MultiJson.decode(access_token.get('/me.json')).body
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
54
|
+
end
|
55
|
+
|
56
|
+
That's pretty much it!
|
57
|
+
|
58
|
+
## License
|
59
|
+
|
60
|
+
Copyright (C) 2011 by Michael Bleigh and Intridea, Inc.
|
61
|
+
|
62
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
63
|
+
of this software and associated documentation files (the "Software"), to deal
|
64
|
+
in the Software without restriction, including without limitation the rights
|
65
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
66
|
+
copies of the Software, and to permit persons to whom the Software is
|
67
|
+
furnished to do so, subject to the following conditions:
|
68
|
+
|
69
|
+
The above copyright notice and this permission notice shall be included in
|
70
|
+
all copies or substantial portions of the Software.
|
71
|
+
|
72
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
73
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
74
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
75
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
76
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
77
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
78
|
+
THE SOFTWARE.
|
data/Rakefile
ADDED
@@ -0,0 +1,81 @@
|
|
1
|
+
require 'multi_json'
|
2
|
+
require 'oauth'
|
3
|
+
require 'omniauth'
|
4
|
+
|
5
|
+
module OmniAuth
|
6
|
+
module Strategies
|
7
|
+
class OAuth
|
8
|
+
include OmniAuth::Strategy
|
9
|
+
|
10
|
+
args [:consumer_key, :consumer_secret]
|
11
|
+
option :consumer_key, nil
|
12
|
+
option :consumer_secret, nil
|
13
|
+
option :client_options, {}
|
14
|
+
option :open_timeout, 30
|
15
|
+
option :read_timeout, 30
|
16
|
+
option :authorize_params, {}
|
17
|
+
|
18
|
+
attr_reader :access_token
|
19
|
+
|
20
|
+
def consumer
|
21
|
+
consumer = ::OAuth::Consumer.new(options.consumer_key, options.consumer_secret, options.client_options)
|
22
|
+
consumer.http.open_timeout = options.open_timeout if options.open_timeout
|
23
|
+
consumer.http.read_timeout = options.read_timeout if options.read_timeout
|
24
|
+
consumer
|
25
|
+
end
|
26
|
+
|
27
|
+
def request_phase
|
28
|
+
request_token = consumer.get_request_token(:oauth_callback => callback_url)
|
29
|
+
session['oauth'] ||= {}
|
30
|
+
session['oauth'][name.to_s] = {'callback_confirmed' => request_token.callback_confirmed?, 'request_token' => request_token.token, 'request_secret' => request_token.secret}
|
31
|
+
|
32
|
+
if request_token.callback_confirmed?
|
33
|
+
redirect request_token.authorize_url(options[:authorize_params])
|
34
|
+
else
|
35
|
+
redirect request_token.authorize_url(options[:authorize_params].merge(:oauth_callback => callback_url))
|
36
|
+
end
|
37
|
+
|
38
|
+
rescue ::Timeout::Error => e
|
39
|
+
fail!(:timeout, e)
|
40
|
+
rescue ::Net::HTTPFatalError, ::OpenSSL::SSL::SSLError => e
|
41
|
+
fail!(:service_unavailable, e)
|
42
|
+
end
|
43
|
+
|
44
|
+
def callback_phase
|
45
|
+
raise OmniAuth::NoSessionError.new("Session Expired") if session['oauth'].nil?
|
46
|
+
|
47
|
+
request_token = ::OAuth::RequestToken.new(consumer, session['oauth'][name.to_s].delete('request_token'), session['oauth'][name.to_s].delete('request_secret'))
|
48
|
+
|
49
|
+
opts = {}
|
50
|
+
if session['oauth'][name.to_s]['callback_confirmed']
|
51
|
+
opts[:oauth_verifier] = request['oauth_verifier']
|
52
|
+
else
|
53
|
+
opts[:oauth_callback] = callback_url
|
54
|
+
end
|
55
|
+
|
56
|
+
@access_token = request_token.get_access_token(opts)
|
57
|
+
super
|
58
|
+
rescue ::Timeout::Error => e
|
59
|
+
fail!(:timeout, e)
|
60
|
+
rescue ::Net::HTTPFatalError, ::OpenSSL::SSL::SSLError => e
|
61
|
+
fail!(:service_unavailable, e)
|
62
|
+
rescue ::OAuth::Unauthorized => e
|
63
|
+
fail!(:invalid_credentials, e)
|
64
|
+
rescue ::NoMethodError, ::MultiJson::DecodeError => e
|
65
|
+
fail!(:invalid_response, e)
|
66
|
+
rescue ::OmniAuth::NoSessionError => e
|
67
|
+
fail!(:session_expired, e)
|
68
|
+
end
|
69
|
+
|
70
|
+
credentials do
|
71
|
+
{'token' => access_token.token, 'secret' => access_token.secret}
|
72
|
+
end
|
73
|
+
|
74
|
+
extra do
|
75
|
+
{'access_token' => access_token}
|
76
|
+
end
|
77
|
+
end
|
78
|
+
end
|
79
|
+
end
|
80
|
+
|
81
|
+
OmniAuth.config.add_camelization 'oauth', 'OAuth'
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
require File.expand_path('../lib/omniauth-oauth/version', __FILE__)
|
3
|
+
|
4
|
+
Gem::Specification.new do |gem|
|
5
|
+
gem.authors = ["Michael Bleigh"]
|
6
|
+
gem.email = ["michael@intridea.com"]
|
7
|
+
gem.description = %q{A generic OAuth (1.0/1.0a) strategy for OmniAuth.}
|
8
|
+
gem.summary = %q{A generic OAuth (1.0/1.0a) strategy for OmniAuth.}
|
9
|
+
gem.homepage = "https://github.com/intridea/omniauth-oauth"
|
10
|
+
|
11
|
+
gem.add_runtime_dependency 'omniauth', '~> 1.0.0.beta1'
|
12
|
+
gem.add_runtime_dependency 'oauth'
|
13
|
+
gem.add_development_dependency 'rspec', '~> 2.6'
|
14
|
+
gem.add_development_dependency 'webmock'
|
15
|
+
gem.add_development_dependency 'simplecov'
|
16
|
+
gem.add_development_dependency 'rack-test'
|
17
|
+
|
18
|
+
gem.executables = `git ls-files -- bin/*`.split("\n").map{ |f| File.basename(f) }
|
19
|
+
gem.files = `git ls-files`.split("\n")
|
20
|
+
gem.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
|
21
|
+
gem.name = "omniauth-oauth"
|
22
|
+
gem.require_paths = ["lib"]
|
23
|
+
gem.version = OmniAuth::OAuth::VERSION
|
24
|
+
end
|
@@ -0,0 +1,140 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
|
3
|
+
describe "OmniAuth::Strategies::OAuth" do
|
4
|
+
class MyOAuthProvider < OmniAuth::Strategies::OAuth
|
5
|
+
uid{ access_token.token }
|
6
|
+
info{ {'name' => access_token.token} }
|
7
|
+
end
|
8
|
+
|
9
|
+
def app
|
10
|
+
Rack::Builder.new {
|
11
|
+
use OmniAuth::Test::PhonySession
|
12
|
+
use OmniAuth::Builder do
|
13
|
+
provider MyOAuthProvider, 'abc', 'def', :client_options => {:site => 'https://api.example.org'}, :name => 'example.org'
|
14
|
+
provider MyOAuthProvider, 'abc', 'def', :client_options => {:site => 'https://api.example.org'}, :authorize_params => {:abc => 'def'}, :name => 'example.org_with_authorize_params'
|
15
|
+
end
|
16
|
+
run lambda { |env| [404, {'Content-Type' => 'text/plain'}, [env.key?('omniauth.auth').to_s]] }
|
17
|
+
}.to_app
|
18
|
+
end
|
19
|
+
|
20
|
+
def session
|
21
|
+
last_request.env['rack.session']
|
22
|
+
end
|
23
|
+
|
24
|
+
before do
|
25
|
+
stub_request(:post, 'https://api.example.org/oauth/request_token').
|
26
|
+
to_return(:body => "oauth_token=yourtoken&oauth_token_secret=yoursecret&oauth_callback_confirmed=true")
|
27
|
+
end
|
28
|
+
|
29
|
+
it 'should add a camelization for itself' do
|
30
|
+
OmniAuth::Utils.camelize('oauth').should == 'OAuth'
|
31
|
+
end
|
32
|
+
|
33
|
+
describe '/auth/{name}' do
|
34
|
+
context 'successful' do
|
35
|
+
before do
|
36
|
+
get '/auth/example.org'
|
37
|
+
end
|
38
|
+
|
39
|
+
it 'should redirect to authorize_url' do
|
40
|
+
last_response.should be_redirect
|
41
|
+
last_response.headers['Location'].should == 'https://api.example.org/oauth/authorize?oauth_token=yourtoken'
|
42
|
+
end
|
43
|
+
|
44
|
+
it 'should redirect to authorize_url with authorize_params when set' do
|
45
|
+
get '/auth/example.org_with_authorize_params'
|
46
|
+
last_response.should be_redirect
|
47
|
+
[
|
48
|
+
'https://api.example.org/oauth/authorize?abc=def&oauth_token=yourtoken',
|
49
|
+
'https://api.example.org/oauth/authorize?oauth_token=yourtoken&abc=def'
|
50
|
+
].should be_include(last_response.headers['Location'])
|
51
|
+
end
|
52
|
+
|
53
|
+
it 'should set appropriate session variables' do
|
54
|
+
session['oauth'].should == {"example.org" => {'callback_confirmed' => true, 'request_token' => 'yourtoken', 'request_secret' => 'yoursecret'}}
|
55
|
+
end
|
56
|
+
end
|
57
|
+
|
58
|
+
context 'unsuccessful' do
|
59
|
+
before do
|
60
|
+
stub_request(:post, 'https://api.example.org/oauth/request_token').
|
61
|
+
to_raise(::Net::HTTPFatalError.new(%Q{502 "Bad Gateway"}, nil))
|
62
|
+
get '/auth/example.org'
|
63
|
+
end
|
64
|
+
|
65
|
+
it 'should call fail! with :service_unavailable' do
|
66
|
+
last_request.env['omniauth.error'].should be_kind_of(::Net::HTTPFatalError)
|
67
|
+
last_request.env['omniauth.error.type'] = :service_unavailable
|
68
|
+
end
|
69
|
+
|
70
|
+
context "SSL failure" do
|
71
|
+
before do
|
72
|
+
stub_request(:post, 'https://api.example.org/oauth/request_token').
|
73
|
+
to_raise(::OpenSSL::SSL::SSLError.new("SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed"))
|
74
|
+
get '/auth/example.org'
|
75
|
+
end
|
76
|
+
|
77
|
+
it 'should call fail! with :service_unavailable' do
|
78
|
+
last_request.env['omniauth.error'].should be_kind_of(::OpenSSL::SSL::SSLError)
|
79
|
+
last_request.env['omniauth.error.type'] = :service_unavailable
|
80
|
+
end
|
81
|
+
end
|
82
|
+
end
|
83
|
+
end
|
84
|
+
|
85
|
+
describe '/auth/{name}/callback' do
|
86
|
+
before do
|
87
|
+
stub_request(:post, 'https://api.example.org/oauth/access_token').
|
88
|
+
to_return(:body => "oauth_token=yourtoken&oauth_token_secret=yoursecret")
|
89
|
+
get '/auth/example.org/callback', {:oauth_verifier => 'dudeman'}, {'rack.session' => {'oauth' => {"example.org" => {'callback_confirmed' => true, 'request_token' => 'yourtoken', 'request_secret' => 'yoursecret'}}}}
|
90
|
+
end
|
91
|
+
|
92
|
+
it 'should exchange the request token for an access token' do
|
93
|
+
last_request.env['omniauth.auth']['provider'].should == 'example.org'
|
94
|
+
last_request.env['omniauth.auth']['extra']['access_token'].should be_kind_of(OAuth::AccessToken)
|
95
|
+
end
|
96
|
+
|
97
|
+
it 'should call through to the master app' do
|
98
|
+
last_response.body.should == 'true'
|
99
|
+
end
|
100
|
+
|
101
|
+
context "bad gateway (or any 5xx) for access_token" do
|
102
|
+
before do
|
103
|
+
stub_request(:post, 'https://api.example.org/oauth/access_token').
|
104
|
+
to_raise(::Net::HTTPFatalError.new(%Q{502 "Bad Gateway"}, nil))
|
105
|
+
get '/auth/example.org/callback', {:oauth_verifier => 'dudeman'}, {'rack.session' => {'oauth' => {"example.org" => {'callback_confirmed' => true, 'request_token' => 'yourtoken', 'request_secret' => 'yoursecret'}}}}
|
106
|
+
end
|
107
|
+
|
108
|
+
it 'should call fail! with :service_unavailable' do
|
109
|
+
last_request.env['omniauth.error'].should be_kind_of(::Net::HTTPFatalError)
|
110
|
+
last_request.env['omniauth.error.type'] = :service_unavailable
|
111
|
+
end
|
112
|
+
end
|
113
|
+
|
114
|
+
context "SSL failure" do
|
115
|
+
before do
|
116
|
+
stub_request(:post, 'https://api.example.org/oauth/access_token').
|
117
|
+
to_raise(::OpenSSL::SSL::SSLError.new("SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed"))
|
118
|
+
get '/auth/example.org/callback', {:oauth_verifier => 'dudeman'}, {'rack.session' => {'oauth' => {"example.org" => {'callback_confirmed' => true, 'request_token' => 'yourtoken', 'request_secret' => 'yoursecret'}}}}
|
119
|
+
end
|
120
|
+
|
121
|
+
it 'should call fail! with :service_unavailable' do
|
122
|
+
last_request.env['omniauth.error'].should be_kind_of(::OpenSSL::SSL::SSLError)
|
123
|
+
last_request.env['omniauth.error.type'] = :service_unavailable
|
124
|
+
end
|
125
|
+
end
|
126
|
+
end
|
127
|
+
|
128
|
+
describe '/auth/{name}/callback with expired session' do
|
129
|
+
before do
|
130
|
+
stub_request(:post, 'https://api.example.org/oauth/access_token').
|
131
|
+
to_return(:body => "oauth_token=yourtoken&oauth_token_secret=yoursecret")
|
132
|
+
get '/auth/example.org/callback', {:oauth_verifier => 'dudeman'}, {'rack.session' => {}}
|
133
|
+
end
|
134
|
+
|
135
|
+
it 'should call fail! with :session_expired' do
|
136
|
+
last_request.env['omniauth.error'].should be_kind_of(::OmniAuth::NoSessionError)
|
137
|
+
last_request.env['omniauth.error.type'] = :session_expired
|
138
|
+
end
|
139
|
+
end
|
140
|
+
end
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1,16 @@
|
|
1
|
+
$:.unshift File.expand_path('..', __FILE__)
|
2
|
+
$:.unshift File.expand_path('../../lib', __FILE__)
|
3
|
+
require 'simplecov'
|
4
|
+
SimpleCov.start
|
5
|
+
require 'rspec'
|
6
|
+
require 'rack/test'
|
7
|
+
require 'webmock/rspec'
|
8
|
+
require 'omniauth'
|
9
|
+
require 'omniauth-oauth'
|
10
|
+
|
11
|
+
RSpec.configure do |config|
|
12
|
+
config.include WebMock::API
|
13
|
+
config.include Rack::Test::Methods
|
14
|
+
config.extend OmniAuth::Test::StrategyMacros, :type => :strategy
|
15
|
+
end
|
16
|
+
|
metadata
ADDED
@@ -0,0 +1,125 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: omniauth-oauth
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 1.0.0.beta1
|
5
|
+
prerelease: 6
|
6
|
+
platform: ruby
|
7
|
+
authors:
|
8
|
+
- Michael Bleigh
|
9
|
+
autorequire:
|
10
|
+
bindir: bin
|
11
|
+
cert_chain: []
|
12
|
+
date: 2011-10-19 00:00:00.000000000Z
|
13
|
+
dependencies:
|
14
|
+
- !ruby/object:Gem::Dependency
|
15
|
+
name: omniauth
|
16
|
+
requirement: &70140877791080 !ruby/object:Gem::Requirement
|
17
|
+
none: false
|
18
|
+
requirements:
|
19
|
+
- - ~>
|
20
|
+
- !ruby/object:Gem::Version
|
21
|
+
version: 1.0.0.beta1
|
22
|
+
type: :runtime
|
23
|
+
prerelease: false
|
24
|
+
version_requirements: *70140877791080
|
25
|
+
- !ruby/object:Gem::Dependency
|
26
|
+
name: oauth
|
27
|
+
requirement: &70140877790660 !ruby/object:Gem::Requirement
|
28
|
+
none: false
|
29
|
+
requirements:
|
30
|
+
- - ! '>='
|
31
|
+
- !ruby/object:Gem::Version
|
32
|
+
version: '0'
|
33
|
+
type: :runtime
|
34
|
+
prerelease: false
|
35
|
+
version_requirements: *70140877790660
|
36
|
+
- !ruby/object:Gem::Dependency
|
37
|
+
name: rspec
|
38
|
+
requirement: &70140877790120 !ruby/object:Gem::Requirement
|
39
|
+
none: false
|
40
|
+
requirements:
|
41
|
+
- - ~>
|
42
|
+
- !ruby/object:Gem::Version
|
43
|
+
version: '2.6'
|
44
|
+
type: :development
|
45
|
+
prerelease: false
|
46
|
+
version_requirements: *70140877790120
|
47
|
+
- !ruby/object:Gem::Dependency
|
48
|
+
name: webmock
|
49
|
+
requirement: &70140877789700 !ruby/object:Gem::Requirement
|
50
|
+
none: false
|
51
|
+
requirements:
|
52
|
+
- - ! '>='
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: '0'
|
55
|
+
type: :development
|
56
|
+
prerelease: false
|
57
|
+
version_requirements: *70140877789700
|
58
|
+
- !ruby/object:Gem::Dependency
|
59
|
+
name: simplecov
|
60
|
+
requirement: &70140877789240 !ruby/object:Gem::Requirement
|
61
|
+
none: false
|
62
|
+
requirements:
|
63
|
+
- - ! '>='
|
64
|
+
- !ruby/object:Gem::Version
|
65
|
+
version: '0'
|
66
|
+
type: :development
|
67
|
+
prerelease: false
|
68
|
+
version_requirements: *70140877789240
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: rack-test
|
71
|
+
requirement: &70140877788820 !ruby/object:Gem::Requirement
|
72
|
+
none: false
|
73
|
+
requirements:
|
74
|
+
- - ! '>='
|
75
|
+
- !ruby/object:Gem::Version
|
76
|
+
version: '0'
|
77
|
+
type: :development
|
78
|
+
prerelease: false
|
79
|
+
version_requirements: *70140877788820
|
80
|
+
description: A generic OAuth (1.0/1.0a) strategy for OmniAuth.
|
81
|
+
email:
|
82
|
+
- michael@intridea.com
|
83
|
+
executables: []
|
84
|
+
extensions: []
|
85
|
+
extra_rdoc_files: []
|
86
|
+
files:
|
87
|
+
- .gitignore
|
88
|
+
- .rspec
|
89
|
+
- Gemfile
|
90
|
+
- Guardfile
|
91
|
+
- README.md
|
92
|
+
- Rakefile
|
93
|
+
- lib/omniauth-oauth.rb
|
94
|
+
- lib/omniauth-oauth/version.rb
|
95
|
+
- lib/omniauth/strategies/oauth.rb
|
96
|
+
- omniauth-oauth.gemspec
|
97
|
+
- spec/omniauth/strategies/oauth_spec.rb
|
98
|
+
- spec/spec_helper.rb
|
99
|
+
homepage: https://github.com/intridea/omniauth-oauth
|
100
|
+
licenses: []
|
101
|
+
post_install_message:
|
102
|
+
rdoc_options: []
|
103
|
+
require_paths:
|
104
|
+
- lib
|
105
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
106
|
+
none: false
|
107
|
+
requirements:
|
108
|
+
- - ! '>='
|
109
|
+
- !ruby/object:Gem::Version
|
110
|
+
version: '0'
|
111
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
112
|
+
none: false
|
113
|
+
requirements:
|
114
|
+
- - ! '>'
|
115
|
+
- !ruby/object:Gem::Version
|
116
|
+
version: 1.3.1
|
117
|
+
requirements: []
|
118
|
+
rubyforge_project:
|
119
|
+
rubygems_version: 1.8.10
|
120
|
+
signing_key:
|
121
|
+
specification_version: 3
|
122
|
+
summary: A generic OAuth (1.0/1.0a) strategy for OmniAuth.
|
123
|
+
test_files:
|
124
|
+
- spec/omniauth/strategies/oauth_spec.rb
|
125
|
+
- spec/spec_helper.rb
|