omniauth-oauth2 1.2.0 → 1.3.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 34d25ec93bea77d3d2003a6aa2072dfa427f9e37
4
- data.tar.gz: 89be10c650c34a5585147ef113f20c8f562b36f6
3
+ metadata.gz: 97b27d270aece449c0fbd5318ef61056b3179b03
4
+ data.tar.gz: 94cc90831da565635c64c5ff036926c7999d3619
5
5
  SHA512:
6
- metadata.gz: 19d5f076d435e34138b5beb42214e1a2cc22e3f6145e8030d64d644a91b250de0f3b7e34dda04d49a020e0bc3347b7cfdcb5b8942910cafec095286da1dbb310
7
- data.tar.gz: b997b90fa32ffa10c1e27ae5095acea1793ae9d4ecb160856de82a4a53a64cdcc60f9c352a8c114e50a50c13c3ff024174cbcdc573caa4411d18f17e95aba385
6
+ metadata.gz: 021f0ccaed1fb0bca365ea86ffc31c955e678da42fdad37f8083c71132d7f365af84d0f21da143f6328cb658a26d4e789249d9743899c776bf3872fda0529b9b
7
+ data.tar.gz: 68ad4394e13f8adce5aac65da939f823b572ab58d11928ee05d1fba4e932360db79893e1038ac7d039094467c9a3fe98fea564a064b4802ff06d0a53082a549e
@@ -1,82 +1,42 @@
1
- AllCops:
2
- Include:
3
- - 'Gemfile'
4
- - 'Rakefile'
5
- - 'omniauth-oauth2.gemspec'
1
+ Metrics/BlockNesting:
2
+ Max: 2
6
3
 
7
- # Avoid long parameter lists
8
- ParameterLists:
9
- Max: 5
10
- CountKeywordArgs: true
4
+ Metrics/LineLength:
5
+ AllowURI: true
6
+ Enabled: false
11
7
 
12
- MethodLength:
8
+ Metrics/MethodLength:
13
9
  CountComments: false
14
- Max: 18
10
+ Max: 10
15
11
 
16
- # Avoid more than `Max` levels of nesting.
17
- BlockNesting:
18
- Max: 2
12
+ Metrics/ParameterLists:
13
+ Max: 4
14
+ CountKeywordArgs: true
19
15
 
20
- # Align with the style guide.
21
- CollectionMethods:
16
+ Style/AccessModifierIndentation:
17
+ EnforcedStyle: outdent
18
+
19
+ Style/CollectionMethods:
22
20
  PreferredMethods:
23
21
  map: 'collect'
24
22
  reduce: 'inject'
25
23
  find: 'detect'
26
24
  find_all: 'select'
27
25
 
28
- # Do not force public/protected/private keyword to be indented at the same
29
- # level as the def keyword. My personal preference is to outdent these keywords
30
- # because I think when scanning code it makes it easier to identify the
31
- # sections of code and visually separate them. When the keyword is at the same
32
- # level I think it sort of blends in with the def keywords and makes it harder
33
- # to scan the code and see where the sections are.
34
- AccessModifierIndentation:
26
+ Style/Documentation:
35
27
  Enabled: false
36
28
 
37
- # Limit line length
38
- LineLength:
29
+ Style/DoubleNegation:
39
30
  Enabled: false
40
31
 
41
- # Disable documentation checking until a class needs to be documented once
42
- Documentation:
43
- Enabled: false
44
-
45
- # Enforce Ruby 1.8-compatible hash syntax
46
- HashSyntax:
32
+ Style/HashSyntax:
47
33
  EnforcedStyle: hash_rockets
48
34
 
49
- # No spaces inside hash literals
50
- SpaceInsideHashLiteralBraces:
35
+ Style/SpaceInsideHashLiteralBraces:
51
36
  EnforcedStyle: no_space
52
37
 
53
- # Allow dots at the end of lines
54
- DotPosition:
55
- Enabled: false
56
-
57
- # Don't require magic comment at the top of every file
58
- Encoding:
59
- Enabled: false
60
-
61
- # Enforce outdenting of access modifiers (i.e. public, private, protected)
62
- AccessModifierIndentation:
63
- EnforcedStyle: outdent
64
-
65
- EmptyLinesAroundAccessModifier:
66
- Enabled: true
67
-
68
- # Align ends correctly
69
- EndAlignment:
70
- AlignWith: variable
71
-
72
- # Indentation of when/else
73
- CaseIndentation:
74
- IndentWhenRelativeTo: end
75
- IndentOneStep: false
76
-
77
- Lambda:
78
- Enabled: false
38
+ Style/StringLiterals:
39
+ EnforcedStyle: double_quotes
79
40
 
80
- FileName:
81
- Exclude:
82
- - 'lib/omniauth-oauth2.rb'
41
+ Style/TrailingComma:
42
+ EnforcedStyleForMultiline: 'comma'
@@ -1,22 +1,22 @@
1
- bundler_args: --without development
1
+ before_install: gem install bundler
2
+ env:
3
+ global:
4
+ - JRUBY_OPTS="$JRUBY_OPTS --debug"
2
5
  language: ruby
3
6
  rvm:
4
7
  - 1.8.7
5
- - 1.9.2
6
8
  - 1.9.3
7
9
  - 2.0.0
8
- - 2.1.0
10
+ - 2.1
11
+ - 2.2
12
+ - jruby-18mode
13
+ - jruby-19mode
14
+ - jruby-head
9
15
  - rbx-2
10
16
  - ruby-head
11
17
  matrix:
12
- include:
13
- - rvm: jruby-18mode
14
- env: JRUBY_OPTS="$JRUBY_OPTS --debug"
15
- - rvm: jruby-19mode
16
- env: JRUBY_OPTS="$JRUBY_OPTS --debug"
17
- - rvm: jruby-head
18
- env: JRUBY_OPTS="$JRUBY_OPTS --debug"
19
18
  allow_failures:
20
19
  - rvm: jruby-head
21
20
  - rvm: ruby-head
22
21
  fast_finish: true
22
+ sudo: false
data/Gemfile CHANGED
@@ -1,24 +1,17 @@
1
- source 'http://rubygems.org'
1
+ source "http://rubygems.org"
2
2
 
3
- gem 'rake'
4
-
5
- group :development do
6
- platforms :ruby_19, :ruby_20, :ruby_21 do
7
- gem 'guard'
8
- gem 'guard-rspec'
9
- gem 'guard-bundler'
10
- end
11
- end
3
+ gem "rake"
12
4
 
13
5
  group :test do
14
- gem 'coveralls', :require => false
15
- gem 'json', :platforms => [:jruby, :ruby_18, :ruby_19]
16
- gem 'mime-types', '~> 1.25', :platforms => [:jruby, :ruby_18]
17
- gem 'rack-test'
18
- gem 'rspec', '~> 3.0.0'
19
- gem 'rubocop', '>= 0.21', :platforms => [:ruby_19, :ruby_20, :ruby_21]
20
- gem 'simplecov', :require => false
21
- gem 'webmock'
6
+ gem "coveralls"
7
+ gem "json", :platforms => [:jruby, :ruby_18, :ruby_19]
8
+ gem "mime-types", "~> 1.25", :platforms => [:jruby, :ruby_18]
9
+ gem "rack-test"
10
+ gem "rest-client", "~> 1.6.0", :platforms => [:jruby, :ruby_18]
11
+ gem "rspec", "~> 3.2"
12
+ gem "rubocop", ">= 0.30", :platforms => [:ruby_19, :ruby_20, :ruby_21, :ruby_22]
13
+ gem "simplecov", ">= 0.9"
14
+ gem "webmock"
22
15
  end
23
16
 
24
17
  # Specify your gem's dependencies in omniauth-oauth2.gemspec
data/Rakefile CHANGED
@@ -1,17 +1,17 @@
1
1
  #!/usr/bin/env rake
2
- require 'bundler/gem_tasks'
3
- require 'rspec/core/rake_task'
2
+ require "bundler/gem_tasks"
3
+ require "rspec/core/rake_task"
4
4
 
5
5
  RSpec::Core::RakeTask.new
6
6
 
7
7
  task :test => :spec
8
8
 
9
9
  begin
10
- require 'rubocop/rake_task'
10
+ require "rubocop/rake_task"
11
11
  RuboCop::RakeTask.new
12
12
  rescue LoadError
13
13
  task :rubocop do
14
- $stderr.puts 'RuboCop is disabled'
14
+ $stderr.puts "RuboCop is disabled"
15
15
  end
16
16
  end
17
17
 
@@ -1,2 +1,2 @@
1
- require 'omniauth-oauth2/version'
2
- require 'omniauth/strategies/oauth2'
1
+ require "omniauth-oauth2/version" # rubocop:disable FileName
2
+ require "omniauth/strategies/oauth2"
@@ -1,5 +1,5 @@
1
1
  module OmniAuth
2
2
  module OAuth2
3
- VERSION = '1.2.0'
3
+ VERSION = "1.3.0"
4
4
  end
5
5
  end
@@ -1,10 +1,8 @@
1
- require 'oauth2'
2
- require 'omniauth'
3
- require 'securerandom'
4
- require 'socket' # for SocketError
5
- require 'timeout' # for Timeout::Error
6
- require 'faraday' # for Faraday::Error::TimeoutError and Faraday::Error::ConnectionFailed
7
- require 'multi_json' # for MultiJson::DecodeError
1
+ require "oauth2"
2
+ require "omniauth"
3
+ require "securerandom"
4
+ require "socket" # for SocketError
5
+ require "timeout" # for Timeout::Error
8
6
 
9
7
  module OmniAuth
10
8
  module Strategies
@@ -39,10 +37,10 @@ module OmniAuth
39
37
  end
40
38
 
41
39
  credentials do
42
- hash = {'token' => access_token.token}
43
- hash.merge!('refresh_token' => access_token.refresh_token) if access_token.expires? && access_token.refresh_token
44
- hash.merge!('expires_at' => access_token.expires_at) if access_token.expires?
45
- hash.merge!('expires' => access_token.expires?)
40
+ hash = {"token" => access_token.token}
41
+ hash.merge!("refresh_token" => access_token.refresh_token) if access_token.expires? && access_token.refresh_token
42
+ hash.merge!("expires_at" => access_token.expires_at) if access_token.expires?
43
+ hash.merge!("expires" => access_token.expires?)
46
44
  hash
47
45
  end
48
46
 
@@ -52,25 +50,25 @@ module OmniAuth
52
50
 
53
51
  def authorize_params
54
52
  options.authorize_params[:state] = SecureRandom.hex(24)
55
- params = options.authorize_params.merge(options_for('authorize'))
53
+ params = options.authorize_params.merge(options_for("authorize"))
56
54
  if OmniAuth.config.test_mode
57
55
  @env ||= {}
58
- @env['rack.session'] ||= {}
56
+ @env["rack.session"] ||= {}
59
57
  end
60
- session['omniauth.state'] = params[:state]
58
+ session["omniauth.state"] = params[:state]
61
59
  params
62
60
  end
63
61
 
64
62
  def token_params
65
- options.token_params.merge(options_for('token'))
63
+ options.token_params.merge(options_for("token"))
66
64
  end
67
65
 
68
- def callback_phase # rubocop:disable CyclomaticComplexity
69
- error = request.params['error_reason'] || request.params['error']
66
+ def callback_phase # rubocop:disable AbcSize, CyclomaticComplexity, MethodLength, PerceivedComplexity
67
+ error = request.params["error_reason"] || request.params["error"]
70
68
  if error
71
- fail!(error, CallbackError.new(request.params['error'], request.params['error_description'] || request.params['error_reason'], request.params['error_uri']))
72
- elsif !options.provider_ignores_state && (request.params['state'].to_s.empty? || request.params['state'] != session.delete('omniauth.state'))
73
- fail!(:csrf_detected, CallbackError.new(:csrf_detected, 'CSRF detected'))
69
+ fail!(error, CallbackError.new(request.params["error"], request.params["error_description"] || request.params["error_reason"], request.params["error_uri"]))
70
+ elsif !options.provider_ignores_state && (request.params["state"].to_s.empty? || request.params["state"] != session.delete("omniauth.state"))
71
+ fail!(:csrf_detected, CallbackError.new(:csrf_detected, "CSRF detected"))
74
72
  else
75
73
  self.access_token = build_access_token
76
74
  self.access_token = access_token.refresh! if access_token.expired?
@@ -78,18 +76,16 @@ module OmniAuth
78
76
  end
79
77
  rescue ::OAuth2::Error, CallbackError => e
80
78
  fail!(:invalid_credentials, e)
81
- rescue ::MultiJson::DecodeError => e
82
- fail!(:invalid_response, e)
83
- rescue ::Timeout::Error, ::Errno::ETIMEDOUT, Faraday::Error::TimeoutError => e
79
+ rescue ::Timeout::Error, ::Errno::ETIMEDOUT => e
84
80
  fail!(:timeout, e)
85
- rescue ::SocketError, Faraday::Error::ConnectionFailed => e
81
+ rescue ::SocketError => e
86
82
  fail!(:failed_to_connect, e)
87
83
  end
88
84
 
89
85
  protected
90
86
 
91
87
  def build_access_token
92
- verifier = request.params['code']
88
+ verifier = request.params["code"]
93
89
  client.auth_code.get_token(verifier, {:redirect_uri => callback_url}.merge(token_params.to_hash(:symbolize_keys => true)), deep_symbolize(options.auth_token_params))
94
90
  end
95
91
 
@@ -121,11 +117,11 @@ module OmniAuth
121
117
  end
122
118
 
123
119
  def message
124
- [error, error_reason, error_uri].compact.join(' | ')
120
+ [error, error_reason, error_uri].compact.join(" | ")
125
121
  end
126
122
  end
127
123
  end
128
124
  end
129
125
  end
130
126
 
131
- OmniAuth.config.add_camelization 'oauth2', 'OAuth2'
127
+ OmniAuth.config.add_camelization "oauth2", "OAuth2"
@@ -1,26 +1,24 @@
1
- lib = File.expand_path('../lib', __FILE__)
1
+ lib = File.expand_path("../lib", __FILE__)
2
2
  $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
3
- require 'omniauth-oauth2/version'
3
+ require "omniauth-oauth2/version"
4
4
 
5
5
  Gem::Specification.new do |gem|
6
- gem.add_dependency 'faraday', ['>= 0.8', '< 0.10']
7
- gem.add_dependency 'multi_json', '~> 1.3'
8
- gem.add_dependency 'oauth2', '~> 1.0'
9
- gem.add_dependency 'omniauth', '~> 1.2'
6
+ gem.add_dependency "oauth2", "~> 1.0"
7
+ gem.add_dependency "omniauth", "~> 1.2"
10
8
 
11
- gem.add_development_dependency 'bundler', '~> 1.0'
9
+ gem.add_development_dependency "bundler", "~> 1.0"
12
10
 
13
- gem.authors = ['Michael Bleigh', 'Erik Michaels-Ober']
14
- gem.email = ['michael@intridea.com', 'sferik@gmail.com']
15
- gem.description = %q(An abstract OAuth2 strategy for OmniAuth.)
11
+ gem.authors = ["Michael Bleigh", "Erik Michaels-Ober"]
12
+ gem.email = ["michael@intridea.com", "sferik@gmail.com"]
13
+ gem.description = "An abstract OAuth2 strategy for OmniAuth."
16
14
  gem.summary = gem.description
17
- gem.homepage = 'https://github.com/intridea/omniauth-oauth2'
15
+ gem.homepage = "https://github.com/intridea/omniauth-oauth2"
18
16
  gem.licenses = %w(MIT)
19
17
 
20
18
  gem.executables = `git ls-files -- bin/*`.split("\n").collect { |f| File.basename(f) }
21
19
  gem.files = `git ls-files`.split("\n")
22
20
  gem.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
23
- gem.name = 'omniauth-oauth2'
21
+ gem.name = "omniauth-oauth2"
24
22
  gem.require_paths = %w(lib)
25
23
  gem.version = OmniAuth::OAuth2::VERSION
26
24
  end
@@ -1,22 +1,22 @@
1
- $LOAD_PATH.unshift File.expand_path('..', __FILE__)
2
- $LOAD_PATH.unshift File.expand_path('../../lib', __FILE__)
1
+ $LOAD_PATH.unshift File.expand_path("..", __FILE__)
2
+ $LOAD_PATH.unshift File.expand_path("../../lib", __FILE__)
3
3
 
4
- require 'simplecov'
5
- require 'coveralls'
4
+ if RUBY_VERSION >= "1.9"
5
+ require "simplecov"
6
+ require "coveralls"
6
7
 
7
- SimpleCov.formatter = SimpleCov::Formatter::MultiFormatter[
8
- SimpleCov::Formatter::HTMLFormatter,
9
- Coveralls::SimpleCov::Formatter
10
- ]
11
- SimpleCov.start do
12
- minimum_coverage(76)
8
+ SimpleCov.formatters = [SimpleCov::Formatter::HTMLFormatter, Coveralls::SimpleCov::Formatter]
9
+
10
+ SimpleCov.start do
11
+ minimum_coverage(78.48)
12
+ end
13
13
  end
14
14
 
15
- require 'rspec'
16
- require 'rack/test'
17
- require 'webmock/rspec'
18
- require 'omniauth'
19
- require 'omniauth-oauth2'
15
+ require "rspec"
16
+ require "rack/test"
17
+ require "webmock/rspec"
18
+ require "omniauth"
19
+ require "omniauth-oauth2"
20
20
 
21
21
  RSpec.configure do |config|
22
22
  config.expect_with :rspec do |c|
@@ -1,9 +1,9 @@
1
- require 'helper'
1
+ require "helper"
2
2
 
3
3
  describe OmniAuth::Strategies::OAuth2 do
4
4
  def app
5
5
  lambda do |_env|
6
- [200, {}, ['Hello.']]
6
+ [200, {}, ["Hello."]]
7
7
  end
8
8
  end
9
9
  let(:fresh_strategy) { Class.new(OmniAuth::Strategies::OAuth2) }
@@ -16,65 +16,65 @@ describe OmniAuth::Strategies::OAuth2 do
16
16
  OmniAuth.config.test_mode = false
17
17
  end
18
18
 
19
- describe '#client' do
19
+ describe "#client" do
20
20
  subject { fresh_strategy }
21
21
 
22
- it 'is initialized with symbolized client_options' do
23
- instance = subject.new(app, :client_options => {'authorize_url' => 'https://example.com'})
24
- expect(instance.client.options[:authorize_url]).to eq('https://example.com')
22
+ it "is initialized with symbolized client_options" do
23
+ instance = subject.new(app, :client_options => {"authorize_url" => "https://example.com"})
24
+ expect(instance.client.options[:authorize_url]).to eq("https://example.com")
25
25
  end
26
26
 
27
- it 'sets ssl options as connection options' do
28
- instance = subject.new(app, :client_options => {'ssl' => {'ca_path' => 'foo'}})
29
- expect(instance.client.options[:connection_opts][:ssl]).to eq(:ca_path => 'foo')
27
+ it "sets ssl options as connection options" do
28
+ instance = subject.new(app, :client_options => {"ssl" => {"ca_path" => "foo"}})
29
+ expect(instance.client.options[:connection_opts][:ssl]).to eq(:ca_path => "foo")
30
30
  end
31
31
  end
32
32
 
33
- describe '#authorize_params' do
33
+ describe "#authorize_params" do
34
34
  subject { fresh_strategy }
35
35
 
36
- it 'includes any authorize params passed in the :authorize_params option' do
37
- instance = subject.new('abc', 'def', :authorize_params => {:foo => 'bar', :baz => 'zip'})
38
- expect(instance.authorize_params['foo']).to eq('bar')
39
- expect(instance.authorize_params['baz']).to eq('zip')
36
+ it "includes any authorize params passed in the :authorize_params option" do
37
+ instance = subject.new("abc", "def", :authorize_params => {:foo => "bar", :baz => "zip"})
38
+ expect(instance.authorize_params["foo"]).to eq("bar")
39
+ expect(instance.authorize_params["baz"]).to eq("zip")
40
40
  end
41
41
 
42
- it 'includes top-level options that are marked as :authorize_options' do
43
- instance = subject.new('abc', 'def', :authorize_options => [:scope, :foo, :state], :scope => 'bar', :foo => 'baz')
44
- expect(instance.authorize_params['scope']).to eq('bar')
45
- expect(instance.authorize_params['foo']).to eq('baz')
42
+ it "includes top-level options that are marked as :authorize_options" do
43
+ instance = subject.new("abc", "def", :authorize_options => [:scope, :foo, :state], :scope => "bar", :foo => "baz")
44
+ expect(instance.authorize_params["scope"]).to eq("bar")
45
+ expect(instance.authorize_params["foo"]).to eq("baz")
46
46
  end
47
47
 
48
- it 'includes random state in the authorize params' do
49
- instance = subject.new('abc', 'def')
50
- expect(instance.authorize_params.keys).to eq(['state'])
51
- expect(instance.session['omniauth.state']).not_to be_empty
48
+ it "includes random state in the authorize params" do
49
+ instance = subject.new("abc", "def")
50
+ expect(instance.authorize_params.keys).to eq(["state"])
51
+ expect(instance.session["omniauth.state"]).not_to be_empty
52
52
  end
53
53
  end
54
54
 
55
- describe '#token_params' do
55
+ describe "#token_params" do
56
56
  subject { fresh_strategy }
57
57
 
58
- it 'includes any authorize params passed in the :authorize_params option' do
59
- instance = subject.new('abc', 'def', :token_params => {:foo => 'bar', :baz => 'zip'})
60
- expect(instance.token_params).to eq('foo' => 'bar', 'baz' => 'zip')
58
+ it "includes any authorize params passed in the :authorize_params option" do
59
+ instance = subject.new("abc", "def", :token_params => {:foo => "bar", :baz => "zip"})
60
+ expect(instance.token_params).to eq("foo" => "bar", "baz" => "zip")
61
61
  end
62
62
 
63
- it 'includes top-level options that are marked as :authorize_options' do
64
- instance = subject.new('abc', 'def', :token_options => [:scope, :foo], :scope => 'bar', :foo => 'baz')
65
- expect(instance.token_params).to eq('scope' => 'bar', 'foo' => 'baz')
63
+ it "includes top-level options that are marked as :authorize_options" do
64
+ instance = subject.new("abc", "def", :token_options => [:scope, :foo], :scope => "bar", :foo => "baz")
65
+ expect(instance.token_params).to eq("scope" => "bar", "foo" => "baz")
66
66
  end
67
67
  end
68
68
 
69
- describe '#callback_phase' do
69
+ describe "#callback_phase" do
70
70
  subject { fresh_strategy }
71
- it 'calls fail with the client error received' do
72
- instance = subject.new('abc', 'def')
71
+ it "calls fail with the client error received" do
72
+ instance = subject.new("abc", "def")
73
73
  allow(instance).to receive(:request) do
74
- double('Request', :params => {'error_reason' => 'user_denied', 'error' => 'access_denied'})
74
+ double("Request", :params => {"error_reason" => "user_denied", "error" => "access_denied"})
75
75
  end
76
76
 
77
- expect(instance).to receive(:fail!).with('user_denied', anything)
77
+ expect(instance).to receive(:fail!).with("user_denied", anything)
78
78
  instance.callback_phase
79
79
  end
80
80
  end
@@ -82,17 +82,17 @@ end
82
82
 
83
83
  describe OmniAuth::Strategies::OAuth2::CallbackError do
84
84
  let(:error) { Class.new(OmniAuth::Strategies::OAuth2::CallbackError) }
85
- describe '#message' do
85
+ describe "#message" do
86
86
  subject { error }
87
- it 'includes all of the attributes' do
88
- instance = subject.new('error', 'description', 'uri')
87
+ it "includes all of the attributes" do
88
+ instance = subject.new("error", "description", "uri")
89
89
  expect(instance.message).to match(/error/)
90
90
  expect(instance.message).to match(/description/)
91
91
  expect(instance.message).to match(/uri/)
92
92
  end
93
- it 'includes all of the attributes' do
93
+ it "includes all of the attributes" do
94
94
  instance = subject.new(nil, :symbol)
95
- expect(instance.message).to eq('symbol')
95
+ expect(instance.message).to eq("symbol")
96
96
  end
97
97
  end
98
98
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: omniauth-oauth2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.2.0
4
+ version: 1.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Michael Bleigh
@@ -9,42 +9,8 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2014-07-09 00:00:00.000000000 Z
12
+ date: 2015-04-22 00:00:00.000000000 Z
13
13
  dependencies:
14
- - !ruby/object:Gem::Dependency
15
- name: faraday
16
- requirement: !ruby/object:Gem::Requirement
17
- requirements:
18
- - - ">="
19
- - !ruby/object:Gem::Version
20
- version: '0.8'
21
- - - "<"
22
- - !ruby/object:Gem::Version
23
- version: '0.10'
24
- type: :runtime
25
- prerelease: false
26
- version_requirements: !ruby/object:Gem::Requirement
27
- requirements:
28
- - - ">="
29
- - !ruby/object:Gem::Version
30
- version: '0.8'
31
- - - "<"
32
- - !ruby/object:Gem::Version
33
- version: '0.10'
34
- - !ruby/object:Gem::Dependency
35
- name: multi_json
36
- requirement: !ruby/object:Gem::Requirement
37
- requirements:
38
- - - "~>"
39
- - !ruby/object:Gem::Version
40
- version: '1.3'
41
- type: :runtime
42
- prerelease: false
43
- version_requirements: !ruby/object:Gem::Requirement
44
- requirements:
45
- - - "~>"
46
- - !ruby/object:Gem::Version
47
- version: '1.3'
48
14
  - !ruby/object:Gem::Dependency
49
15
  name: oauth2
50
16
  requirement: !ruby/object:Gem::Requirement
@@ -100,7 +66,6 @@ files:
100
66
  - ".rubocop.yml"
101
67
  - ".travis.yml"
102
68
  - Gemfile
103
- - Guardfile
104
69
  - LICENSE.md
105
70
  - README.md
106
71
  - Rakefile
@@ -130,7 +95,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
130
95
  version: '0'
131
96
  requirements: []
132
97
  rubyforge_project:
133
- rubygems_version: 2.2.2
98
+ rubygems_version: 2.4.5
134
99
  signing_key:
135
100
  specification_version: 4
136
101
  summary: An abstract OAuth2 strategy for OmniAuth.
data/Guardfile DELETED
@@ -1,11 +0,0 @@
1
- guard 'rspec', :version => 2 do
2
- watch(%r{^spec/.+_spec\.rb$})
3
- watch(%r{^lib/(.+)\.rb$}) { |m| "spec/#{m[1]}_spec.rb" }
4
- watch('spec/spec_helper.rb') { "spec" }
5
- end
6
-
7
-
8
- guard 'bundler' do
9
- watch('Gemfile')
10
- watch(/^.+\.gemspec/)
11
- end