opentoken 1.0.0 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +22 -0
- data/CONTRIBUTORS.txt +7 -0
- data/Gemfile +2 -10
- data/LICENSE.txt +22 -0
- data/README.md +33 -0
- data/Rakefile +1 -43
- data/lib/opentoken.rb +81 -19
- data/lib/opentoken/key_value_serializer.rb +116 -91
- data/lib/opentoken/password_key_generator.rb +52 -44
- data/lib/opentoken/version.rb +3 -0
- data/opentoken.gemspec +19 -67
- data/test/test_opentoken.rb +25 -9
- metadata +37 -83
- data/LICENSE +0 -20
- data/README.rdoc +0 -25
- data/VERSION +0 -1
data/.gitignore
ADDED
data/CONTRIBUTORS.txt
ADDED
data/Gemfile
CHANGED
@@ -1,12 +1,4 @@
|
|
1
1
|
source "http://rubygems.org"
|
2
2
|
|
3
|
-
gem
|
4
|
-
|
5
|
-
|
6
|
-
group :development do
|
7
|
-
gem "shoulda", ">= 0"
|
8
|
-
gem "timecop", '>=0.3.4'
|
9
|
-
gem "bundler", "~> 1.0.0"
|
10
|
-
gem "jeweler", "~> 1.5.2"
|
11
|
-
gem "rcov", ">= 0"
|
12
|
-
end
|
3
|
+
# Specify your gem's dependencies in opentoken.gemspec
|
4
|
+
gemspec
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
The MIT License
|
2
|
+
|
3
|
+
Copyright (c) 2011 Socialcast, Inc
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
7
|
+
in the Software without restriction, including without limitation the rights
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
10
|
+
furnished to do so, subject to the following conditions:
|
11
|
+
|
12
|
+
The above copyright notice and this permission notice shall be included in
|
13
|
+
all copies or substantial portions of the Software.
|
14
|
+
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
21
|
+
THE SOFTWARE.
|
22
|
+
|
data/README.md
ADDED
@@ -0,0 +1,33 @@
|
|
1
|
+
# opentoken
|
2
|
+
|
3
|
+
Parse encrypted opentoken properties
|
4
|
+
|
5
|
+
see http://www.pingidentity.com/opentoken
|
6
|
+
|
7
|
+
## Usage
|
8
|
+
|
9
|
+
```ruby
|
10
|
+
# configure decryption with shared key
|
11
|
+
OpenToken.password = 'shared_secret_to_decrypt'
|
12
|
+
|
13
|
+
# decrypt opentoken into hash of attributes
|
14
|
+
attributes = OpenToken.decode 'opentoken-hashed-string'
|
15
|
+
|
16
|
+
# encrypt opentoken from hash of attributes
|
17
|
+
attributes = { 'subject' => 'foo', 'bar' => 'bak' }
|
18
|
+
token = OpenToken.encode attributes, OpenToken::CIPHER_AES_128_CBC
|
19
|
+
```
|
20
|
+
|
21
|
+
## Contributing
|
22
|
+
|
23
|
+
* Fork the project
|
24
|
+
* Fix the issue
|
25
|
+
* Add tests
|
26
|
+
* Send me a pull request. Bonus points for topic branches.
|
27
|
+
|
28
|
+
see CONTRIBUTORS.txt for complete list of contributors.
|
29
|
+
|
30
|
+
## Copyright
|
31
|
+
|
32
|
+
Copyright (c) 2011 Socialcast Inc.
|
33
|
+
See LICENSE.txt for details.
|
data/Rakefile
CHANGED
@@ -1,30 +1,5 @@
|
|
1
|
-
require 'rubygems'
|
2
1
|
require 'bundler'
|
3
|
-
|
4
|
-
Bundler.setup(:default, :development)
|
5
|
-
rescue Bundler::BundlerError => e
|
6
|
-
$stderr.puts e.message
|
7
|
-
$stderr.puts "Run `bundle install` to install missing gems"
|
8
|
-
exit e.status_code
|
9
|
-
end
|
10
|
-
require 'rake'
|
11
|
-
|
12
|
-
require 'jeweler'
|
13
|
-
Jeweler::Tasks.new do |gem|
|
14
|
-
# gem is a Gem::Specification... see http://docs.rubygems.org/read/chapter/20 for more options
|
15
|
-
gem.name = "opentoken"
|
16
|
-
gem.homepage = "http://github.com/wireframe/opentoken"
|
17
|
-
gem.license = "MIT"
|
18
|
-
gem.summary = %Q{ruby implementation of the opentoken specification}
|
19
|
-
gem.description = %Q{parse opentoken properties passed for Single Signon requests}
|
20
|
-
gem.email = "ryan@codecrate.com"
|
21
|
-
gem.authors = ["Ryan Sonnek"]
|
22
|
-
# Include your dependencies below. Runtime dependencies are required when using your gem,
|
23
|
-
# and development dependencies are only needed for development (ie running rake tasks, tests, etc)
|
24
|
-
# gem.add_runtime_dependency 'jabber4r', '> 0.1'
|
25
|
-
# gem.add_development_dependency 'rspec', '> 1.2.3'
|
26
|
-
end
|
27
|
-
Jeweler::RubygemsDotOrgTasks.new
|
2
|
+
Bundler::GemHelper.install_tasks
|
28
3
|
|
29
4
|
require 'rake/testtask'
|
30
5
|
Rake::TestTask.new(:test) do |test|
|
@@ -33,21 +8,4 @@ Rake::TestTask.new(:test) do |test|
|
|
33
8
|
test.verbose = true
|
34
9
|
end
|
35
10
|
|
36
|
-
require 'rcov/rcovtask'
|
37
|
-
Rcov::RcovTask.new do |test|
|
38
|
-
test.libs << 'test'
|
39
|
-
test.pattern = 'test/**/test_*.rb'
|
40
|
-
test.verbose = true
|
41
|
-
end
|
42
|
-
|
43
11
|
task :default => :test
|
44
|
-
|
45
|
-
require 'rake/rdoctask'
|
46
|
-
Rake::RDocTask.new do |rdoc|
|
47
|
-
version = File.exist?('VERSION') ? File.read('VERSION') : ""
|
48
|
-
|
49
|
-
rdoc.rdoc_dir = 'rdoc'
|
50
|
-
rdoc.title = "opentoken #{version}"
|
51
|
-
rdoc.rdoc_files.include('README*')
|
52
|
-
rdoc.rdoc_files.include('lib/**/*.rb')
|
53
|
-
end
|
data/lib/opentoken.rb
CHANGED
@@ -4,6 +4,7 @@ require 'digest/sha1'
|
|
4
4
|
require 'zlib'
|
5
5
|
require 'stringio'
|
6
6
|
require 'cgi'
|
7
|
+
require 'time'
|
7
8
|
require File.join(File.dirname(__FILE__), 'opentoken', 'token')
|
8
9
|
require File.join(File.dirname(__FILE__), 'opentoken', 'key_value_serializer')
|
9
10
|
require File.join(File.dirname(__FILE__), 'opentoken', 'password_key_generator')
|
@@ -38,27 +39,68 @@ module OpenToken
|
|
38
39
|
}
|
39
40
|
|
40
41
|
class << self
|
41
|
-
|
42
|
-
def debug=(flag)
|
43
|
-
@@debug = flag
|
44
|
-
end
|
42
|
+
attr_accessor :debug
|
45
43
|
def debug?
|
46
|
-
|
44
|
+
!!debug
|
47
45
|
end
|
48
|
-
|
49
|
-
|
50
|
-
|
46
|
+
|
47
|
+
attr_accessor :password
|
48
|
+
attr_accessor :token_lifetime
|
49
|
+
attr_accessor :renew_until_lifetime
|
50
|
+
|
51
|
+
def encode(attributes, cipher_suite)
|
52
|
+
attributes['not-before'] = Time.now.utc.iso8601.to_s
|
53
|
+
attributes['not-on-or-after'] = Time.at(Time.now.to_i + token_lifetime).utc.iso8601.to_s
|
54
|
+
attributes['renew-until'] = Time.at(Time.now.to_i + renew_until_lifetime).utc.iso8601.to_s
|
55
|
+
|
56
|
+
cipher = CIPHERS[cipher_suite]
|
57
|
+
verify !cipher.nil?, "Unknown cipher suite: #{cipher_suite}"
|
58
|
+
key = OpenToken::PasswordKeyGenerator.generate(password, cipher)
|
59
|
+
c = OpenSSL::Cipher::Cipher::new(cipher[:algorithm])
|
60
|
+
c.encrypt
|
61
|
+
c.key = key
|
62
|
+
c.iv = iv = c.random_iv
|
63
|
+
serialized = OpenToken::KeyValueSerializer.serialize(attributes)
|
64
|
+
compressed = zip_payload serialized
|
65
|
+
ivlen = cipher[:iv_length]
|
66
|
+
if ((compressed.length % ivlen) == 0)
|
67
|
+
padlen = ivlen
|
68
|
+
else
|
69
|
+
padlen = ivlen - (compressed.length % ivlen)
|
70
|
+
end
|
71
|
+
compressed += padlen.chr * padlen
|
72
|
+
encrypted = c.update(compressed)
|
73
|
+
mac = []
|
74
|
+
mac << "0x01".hex.chr # OTK version
|
75
|
+
mac << cipher_suite.chr
|
76
|
+
mac << iv
|
77
|
+
mac << serialized
|
78
|
+
hash = OpenSSL::HMAC.digest(OpenToken::PasswordKeyGenerator::SHA1_DIGEST, key, mac.join)
|
79
|
+
|
80
|
+
token_string = ""
|
81
|
+
token_string = "OTK" + 1.chr + cipher_suite.chr
|
82
|
+
token_string += hash
|
83
|
+
token_string += ivlen.chr
|
84
|
+
token_string += iv
|
85
|
+
token_string += 0.chr # key info length
|
86
|
+
token_string += ((encrypted.length >> 8) &0xFF ).chr
|
87
|
+
token_string += (encrypted.length & 0xFF).chr
|
88
|
+
token_string += encrypted
|
89
|
+
inspect_binary_string "Unencoded", token_string
|
90
|
+
encoded = urlsafe_encode64 token_string
|
91
|
+
inspect_binary_string "Encoded", encoded
|
92
|
+
encoded
|
51
93
|
end
|
52
|
-
def
|
94
|
+
def decode(opentoken = nil)
|
53
95
|
verify opentoken.present?, 'Unable to parse empty token'
|
54
|
-
data =
|
96
|
+
data = urlsafe_decode64(opentoken)
|
55
97
|
inspect_binary_string 'DATA', data
|
56
98
|
|
57
99
|
verify_header data
|
58
100
|
verify_version data
|
59
101
|
|
60
102
|
#cipher suite identifier
|
61
|
-
cipher_suite = data[4]
|
103
|
+
cipher_suite = char_value_of data[4]
|
62
104
|
cipher = CIPHERS[cipher_suite]
|
63
105
|
verify !cipher.nil?, "Unknown cipher suite: #{cipher_suite}"
|
64
106
|
|
@@ -67,16 +109,16 @@ module OpenToken
|
|
67
109
|
inspect_binary_string "PAYLOAD HMAC [5..24]", payload_hmac
|
68
110
|
|
69
111
|
#Initialization Vector (iv)
|
70
|
-
iv_length = data[25]
|
71
|
-
iv_end = [26, 26 + iv_length - 1].max
|
112
|
+
iv_length = char_value_of data[25]
|
113
|
+
iv_end = char_value_of [26, 26 + iv_length - 1].max
|
72
114
|
iv = data[26..iv_end]
|
73
115
|
inspect_binary_string "IV [26..#{iv_end}]", iv
|
74
116
|
verify iv_length == cipher[:iv_length], "Cipher expects iv length of #{cipher[:iv_length]} and was: #{iv_length}"
|
75
117
|
|
76
118
|
#key (not currently used)
|
77
|
-
key_length = data[iv_end + 1]
|
119
|
+
key_length = char_value_of data[iv_end + 1]
|
78
120
|
key_end = iv_end + 1
|
79
|
-
verify key_length == 0, "Token key embedding is not currently supported"
|
121
|
+
verify key_length == 0, "Token key embedding is not currently supported. Key length is: #{key_length}"
|
80
122
|
|
81
123
|
#payload
|
82
124
|
payload_length = data[(key_end + 1)..(key_end + 2)].unpack('n').first
|
@@ -85,7 +127,7 @@ module OpenToken
|
|
85
127
|
verify encrypted_payload.length == payload_length, "Payload length is #{encrypted_payload.length} and was expected to be #{payload_length}"
|
86
128
|
inspect_binary_string "ENCRYPTED PAYLOAD [#{payload_offset}..#{data.length - 1}]", encrypted_payload
|
87
129
|
|
88
|
-
key = OpenToken::PasswordKeyGenerator.generate(
|
130
|
+
key = OpenToken::PasswordKeyGenerator.generate(password, cipher)
|
89
131
|
inspect_binary_string 'KEY', key
|
90
132
|
|
91
133
|
compressed_payload = decrypt_payload(encrypted_payload, cipher, key, iv)
|
@@ -115,19 +157,31 @@ module OpenToken
|
|
115
157
|
end
|
116
158
|
|
117
159
|
private
|
160
|
+
def char_value_of(character)
|
161
|
+
if RUBY_VERSION < "1.9"
|
162
|
+
return character
|
163
|
+
else
|
164
|
+
return character.chr.ord
|
165
|
+
end
|
166
|
+
end
|
118
167
|
def verify_header(data)
|
119
168
|
header = data[0..2]
|
120
169
|
verify header == 'OTK', "Invalid token header: #{header}"
|
121
170
|
end
|
122
171
|
def verify_version(data)
|
123
|
-
version = data[3]
|
124
|
-
verify version == 1, "Unsupported token version: #{version}"
|
172
|
+
version = char_value_of data[3]
|
173
|
+
verify version == 1, "Unsupported token version: '#{version}'"
|
125
174
|
end
|
126
175
|
#ruby 1.9 has Base64.urlsafe_decode64 which can be used instead of gsubbing '_' and '-'
|
127
|
-
def
|
176
|
+
def urlsafe_decode64(token)
|
128
177
|
string = token.gsub('*', '=').gsub('_', '/').gsub('-', '+')
|
129
178
|
data = Base64.decode64(string)
|
130
179
|
end
|
180
|
+
def urlsafe_encode64(token)
|
181
|
+
string = Base64.encode64(token);
|
182
|
+
string = string.gsub('=', '*').gsub('/', '_').gsub('+', '-').gsub(10.chr, '').gsub(11.chr, '')
|
183
|
+
string
|
184
|
+
end
|
131
185
|
def verify(assertion, message = 'Invalid Token')
|
132
186
|
raise OpenToken::TokenInvalidError.new(message) unless assertion
|
133
187
|
end
|
@@ -151,6 +205,10 @@ module OpenToken
|
|
151
205
|
Zlib::Inflate.new(-Zlib::MAX_WBITS).inflate(compressed_payload[2, compressed_payload.size])
|
152
206
|
end
|
153
207
|
end
|
208
|
+
def zip_payload(uncompressed)
|
209
|
+
compressed = Zlib::Deflate.deflate(uncompressed, 9)
|
210
|
+
compressed
|
211
|
+
end
|
154
212
|
def inspect_binary_string(header, string)
|
155
213
|
return unless debug?
|
156
214
|
puts "#{header}:"
|
@@ -162,3 +220,7 @@ module OpenToken
|
|
162
220
|
end
|
163
221
|
end
|
164
222
|
end
|
223
|
+
|
224
|
+
# intialize defaults
|
225
|
+
OpenToken.token_lifetime = 300
|
226
|
+
OpenToken.renew_until_lifetime = 43200
|
@@ -8,110 +8,135 @@ module OpenToken
|
|
8
8
|
IN_VALUE = 5
|
9
9
|
IN_QUOTED_VALUE = 6
|
10
10
|
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
open_quote_char = 0.chr
|
19
|
-
currkey = ""
|
20
|
-
token = ""
|
21
|
-
nextval = ""
|
22
|
-
|
23
|
-
string.split(//).each do |c|
|
24
|
-
nextval = c
|
25
|
-
|
26
|
-
case c
|
27
|
-
when "\t"
|
28
|
-
if state == IN_KEY
|
29
|
-
# key ends
|
30
|
-
currkey = token
|
31
|
-
token = ""
|
32
|
-
state = EMPTY_SPACE
|
33
|
-
elsif state == IN_VALUE
|
34
|
-
# non-quoted value ends
|
35
|
-
result[currkey] = self.deserialize(token)
|
36
|
-
token = ""
|
37
|
-
state = LINE_END
|
38
|
-
elsif state == IN_QUOTED_VALUE
|
39
|
-
token += c
|
40
|
-
end
|
41
|
-
when " "
|
42
|
-
if state == IN_KEY
|
43
|
-
# key ends
|
44
|
-
currkey = token
|
45
|
-
token = ""
|
46
|
-
state = EMPTY_SPACE
|
47
|
-
elsif state == IN_VALUE
|
48
|
-
# non-quoted value ends
|
49
|
-
result[currkey] = self.deserialize(token)
|
50
|
-
token = ""
|
51
|
-
state = LINE_END
|
52
|
-
elsif state == IN_QUOTED_VALUE
|
53
|
-
token += c
|
54
|
-
end
|
55
|
-
when "\n"
|
56
|
-
# newline
|
57
|
-
if (state == IN_VALUE) || (state == VALUE_START)
|
58
|
-
result[currkey] = self.unescape_value(token)
|
59
|
-
token = ""
|
60
|
-
state = LINE_START
|
61
|
-
elsif state == LINE_END
|
62
|
-
token = ""
|
63
|
-
state = LINE_START
|
64
|
-
elsif state == IN_QUOTED_VALUE
|
65
|
-
token += c
|
11
|
+
class << self
|
12
|
+
def serialize(hashmap)
|
13
|
+
result = String.new
|
14
|
+
count = 0;
|
15
|
+
hashmap.each_pair do |key,value|
|
16
|
+
if (count != 0)
|
17
|
+
result = result + "\n"
|
66
18
|
end
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
19
|
+
count +=1
|
20
|
+
result += key + "="
|
21
|
+
result += escape_value(value)
|
22
|
+
end
|
23
|
+
result
|
24
|
+
end
|
25
|
+
def deserialize(string)
|
26
|
+
result = OpenToken::Token.new
|
27
|
+
state = LINE_START
|
28
|
+
open_quote_char = 0.chr
|
29
|
+
currkey = ""
|
30
|
+
token = ""
|
31
|
+
nextval = ""
|
32
|
+
|
33
|
+
string.split(//).each do |c|
|
34
|
+
nextval = c
|
35
|
+
|
36
|
+
case c
|
37
|
+
when "\t"
|
38
|
+
if state == IN_KEY
|
39
|
+
# key ends
|
40
|
+
currkey = token
|
41
|
+
token = ""
|
42
|
+
state = EMPTY_SPACE
|
43
|
+
elsif state == IN_VALUE
|
44
|
+
# non-quoted value ends
|
45
|
+
result[currkey] = self.deserialize(token)
|
79
46
|
token = ""
|
80
47
|
state = LINE_END
|
81
|
-
|
48
|
+
elsif state == IN_QUOTED_VALUE
|
82
49
|
token += c
|
83
50
|
end
|
84
|
-
|
85
|
-
state
|
86
|
-
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
51
|
+
when " "
|
52
|
+
if state == IN_KEY
|
53
|
+
# key ends
|
54
|
+
currkey = token
|
55
|
+
token = ""
|
56
|
+
state = EMPTY_SPACE
|
57
|
+
elsif state == IN_VALUE
|
58
|
+
# non-quoted value ends
|
59
|
+
result[currkey] = self.deserialize(token)
|
92
60
|
token = ""
|
93
61
|
state = LINE_END
|
94
|
-
|
62
|
+
elsif state == IN_QUOTED_VALUE
|
63
|
+
token += c
|
64
|
+
end
|
65
|
+
when "\n"
|
66
|
+
# newline
|
67
|
+
if (state == IN_VALUE) || (state == VALUE_START)
|
68
|
+
result[currkey] = unescape_value(token)
|
69
|
+
token = ""
|
70
|
+
state = LINE_START
|
71
|
+
elsif state == LINE_END
|
72
|
+
token = ""
|
73
|
+
state = LINE_START
|
74
|
+
elsif state == IN_QUOTED_VALUE
|
75
|
+
token += c
|
76
|
+
end
|
77
|
+
when "="
|
78
|
+
if state == IN_KEY
|
79
|
+
currkey = token
|
80
|
+
token = ""
|
81
|
+
state = VALUE_START
|
82
|
+
elsif (state == IN_QUOTED_VALUE) || (state == IN_VALUE)
|
95
83
|
token += c
|
96
84
|
end
|
97
|
-
|
98
|
-
state
|
99
|
-
|
85
|
+
when "\""
|
86
|
+
if state == IN_QUOTED_VALUE
|
87
|
+
if (c == open_quote_char) && (token[token.size-1] != "\\"[0])
|
88
|
+
result[currkey] = unescape_value(token)
|
89
|
+
token = ""
|
90
|
+
state = LINE_END
|
91
|
+
else
|
92
|
+
token += c
|
93
|
+
end
|
94
|
+
elsif state == VALUE_START
|
95
|
+
state = IN_QUOTED_VALUE
|
96
|
+
open_quote_char = c
|
97
|
+
end
|
98
|
+
when "'"
|
99
|
+
if state == IN_QUOTED_VALUE
|
100
|
+
if (c == open_quote_char) && (token[token.size-1] != "\\"[0])
|
101
|
+
result[currkey] = unescape_value(token)
|
102
|
+
token = ""
|
103
|
+
state = LINE_END
|
104
|
+
else
|
105
|
+
token += c
|
106
|
+
end
|
107
|
+
else state == VALUE_START
|
108
|
+
state = IN_QUOTED_VALUE
|
109
|
+
open_quote_char = c
|
110
|
+
end
|
111
|
+
else
|
112
|
+
if state == LINE_START
|
113
|
+
state = IN_KEY
|
114
|
+
elsif state == VALUE_START
|
115
|
+
state = IN_VALUE
|
116
|
+
end
|
117
|
+
token += c
|
100
118
|
end
|
101
|
-
|
102
|
-
if state ==
|
103
|
-
|
104
|
-
elsif state == VALUE_START
|
105
|
-
state = IN_VALUE
|
119
|
+
|
120
|
+
if (state == IN_QUOTED_VALUE) || (state == IN_VALUE)
|
121
|
+
result[currkey] = unescape_value(token)
|
106
122
|
end
|
107
|
-
token += c
|
108
123
|
end
|
109
|
-
|
110
|
-
|
111
|
-
|
124
|
+
result
|
125
|
+
end
|
126
|
+
private
|
127
|
+
def unescape_value(value)
|
128
|
+
value.gsub("\\\"", "\"").gsub("\\\'", "'")
|
129
|
+
end
|
130
|
+
def escape_value(value)
|
131
|
+
value.each_byte do |b|
|
132
|
+
c = b.chr
|
133
|
+
if c == "\n" or c == "\t" or c == " " or c == "'" or c == "\""
|
134
|
+
value = "'" + value.gsub("'", "\'").gsub("\"", "\\\"") + "'"
|
135
|
+
break
|
136
|
+
end
|
112
137
|
end
|
138
|
+
value
|
113
139
|
end
|
114
|
-
result
|
115
140
|
end
|
116
141
|
end
|
117
|
-
end
|
142
|
+
end
|
@@ -2,56 +2,64 @@ module OpenToken
|
|
2
2
|
class PasswordKeyGenerator
|
3
3
|
SHA1_DIGEST = OpenSSL::Digest::Digest.new('sha1')
|
4
4
|
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
5
|
+
class << self
|
6
|
+
def generate(password, cipher_suite)
|
7
|
+
salt = 0.chr * 8
|
8
|
+
generate_impl(password, cipher_suite, salt, 1000)
|
9
|
+
end
|
9
10
|
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
result = OpenSSL::HMAC.digest(SHA1_DIGEST, password, mac)
|
15
|
-
cur = result
|
16
|
-
|
17
|
-
i_count = 1
|
18
|
-
while i_count < count
|
19
|
-
i_count +=1
|
11
|
+
private
|
12
|
+
def generate_block(password, salt, count, index)
|
13
|
+
mac = salt
|
14
|
+
mac += [index].pack("N")
|
20
15
|
|
21
|
-
|
16
|
+
result = OpenSSL::HMAC.digest(SHA1_DIGEST, password, mac)
|
17
|
+
cur = result
|
22
18
|
|
23
|
-
|
24
|
-
|
19
|
+
i_count = 1
|
20
|
+
while i_count < count
|
21
|
+
i_count +=1
|
22
|
+
|
23
|
+
cur = OpenSSL::HMAC.digest(SHA1_DIGEST, password, cur)
|
24
|
+
|
25
|
+
20.times do |i|
|
26
|
+
if RUBY_VERSION < "1.9"
|
27
|
+
result[i] = result[i] ^ cur[i]
|
28
|
+
else
|
29
|
+
result[i] = (result[i].chr.ord ^ cur[i].chr.ord).chr
|
30
|
+
end
|
31
|
+
end
|
25
32
|
end
|
33
|
+
|
34
|
+
return result
|
26
35
|
end
|
36
|
+
|
37
|
+
def generate_impl(password, cipher, salt, iterations)
|
38
|
+
return unless cipher[:algorithm]
|
27
39
|
|
28
|
-
|
40
|
+
key_size = cipher[:key_length] / 8
|
41
|
+
numblocks = key_size / 20
|
42
|
+
numblocks += 1 if (key_size % 20) > 0
|
43
|
+
|
44
|
+
# Generate the appropriate number of blocks and write their output to
|
45
|
+
# the key bytes; note that it's important to start from 1 (vs. 0) as the
|
46
|
+
# initial block number affects the hash. It's not clear that this fact
|
47
|
+
# is stated explicitly anywhere, but without this approach, the generated
|
48
|
+
# keys will not match up with test cases defined in RFC 3962.
|
49
|
+
key_buffer_index = 0
|
50
|
+
key = ""
|
51
|
+
|
52
|
+
numblocks.times do |i|
|
53
|
+
i+=1 # Previously zero based, needs to be 1 based
|
54
|
+
block = generate_block(password, salt, iterations, i)
|
55
|
+
len = [20, (key_size - key_buffer_index)].min
|
56
|
+
key += block[0, len]
|
57
|
+
key_buffer_index += len
|
58
|
+
end
|
59
|
+
|
60
|
+
return key
|
61
|
+
end
|
29
62
|
end
|
30
|
-
|
31
|
-
def self.generate_impl(password, cipher, salt, iterations)
|
32
|
-
return unless cipher[:algorithm]
|
33
63
|
|
34
|
-
key_size = cipher[:key_length] / 8
|
35
|
-
numblocks = key_size / 20
|
36
|
-
numblocks += 1 if (key_size % 20) > 0
|
37
|
-
|
38
|
-
# Generate the appropriate number of blocks and write their output to
|
39
|
-
# the key bytes; note that it's important to start from 1 (vs. 0) as the
|
40
|
-
# initial block number affects the hash. It's not clear that this fact
|
41
|
-
# is stated explicitly anywhere, but without this approach, the generated
|
42
|
-
# keys will not match up with test cases defined in RFC 3962.
|
43
|
-
key_buffer_index = 0
|
44
|
-
key = ""
|
45
|
-
|
46
|
-
numblocks.times do |i|
|
47
|
-
i+=1 # Previously zero based, needs to be 1 based
|
48
|
-
block = self.generate_block(password, salt, iterations, i)
|
49
|
-
len = [20, (key_size - key_buffer_index)].min
|
50
|
-
key += block[0, len]
|
51
|
-
key_buffer_index += len
|
52
|
-
end
|
53
|
-
|
54
|
-
return key
|
55
64
|
end
|
56
|
-
|
57
|
-
end
|
65
|
+
end
|
data/opentoken.gemspec
CHANGED
@@ -1,74 +1,26 @@
|
|
1
|
-
# Generated by jeweler
|
2
|
-
# DO NOT EDIT THIS FILE DIRECTLY
|
3
|
-
# Instead, edit Jeweler::Tasks in Rakefile, and run 'rake gemspec'
|
4
1
|
# -*- encoding: utf-8 -*-
|
2
|
+
$:.push File.expand_path("../lib", __FILE__)
|
3
|
+
require "opentoken/version"
|
5
4
|
|
6
5
|
Gem::Specification.new do |s|
|
7
|
-
s.name
|
8
|
-
s.version
|
9
|
-
|
10
|
-
s.
|
11
|
-
s.
|
12
|
-
s.
|
6
|
+
s.name = "opentoken"
|
7
|
+
s.version = OpenToken::VERSION
|
8
|
+
s.platform = Gem::Platform::RUBY
|
9
|
+
s.authors = ["Ryan Sonnek"]
|
10
|
+
s.email = ["ryan@socialcast.com"]
|
11
|
+
s.homepage = "http://github.com/socialcast/opentoken"
|
12
|
+
s.summary = %q{ruby implementation of the opentoken specification}
|
13
13
|
s.description = %q{parse opentoken properties passed for Single Signon requests}
|
14
|
-
s.email = %q{ryan@codecrate.com}
|
15
|
-
s.extra_rdoc_files = [
|
16
|
-
"LICENSE",
|
17
|
-
"README.rdoc"
|
18
|
-
]
|
19
|
-
s.files = [
|
20
|
-
".document",
|
21
|
-
"Gemfile",
|
22
|
-
"LICENSE",
|
23
|
-
"README.rdoc",
|
24
|
-
"Rakefile",
|
25
|
-
"VERSION",
|
26
|
-
"lib/opentoken.rb",
|
27
|
-
"lib/opentoken/key_value_serializer.rb",
|
28
|
-
"lib/opentoken/password_key_generator.rb",
|
29
|
-
"lib/opentoken/token.rb",
|
30
|
-
"opentoken.gemspec",
|
31
|
-
"test/helper.rb",
|
32
|
-
"test/test_opentoken.rb"
|
33
|
-
]
|
34
|
-
s.homepage = %q{http://github.com/wireframe/opentoken}
|
35
|
-
s.licenses = ["MIT"]
|
36
|
-
s.require_paths = ["lib"]
|
37
|
-
s.rubygems_version = %q{1.4.2}
|
38
|
-
s.summary = %q{ruby implementation of the opentoken specification}
|
39
|
-
s.test_files = [
|
40
|
-
"test/helper.rb",
|
41
|
-
"test/test_opentoken.rb"
|
42
|
-
]
|
43
14
|
|
44
|
-
|
45
|
-
s.specification_version = 3
|
15
|
+
s.rubyforge_project = "opentoken"
|
46
16
|
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
s.add_development_dependency(%q<timecop>, [">= 0.3.4"])
|
52
|
-
s.add_development_dependency(%q<bundler>, ["~> 1.0.0"])
|
53
|
-
s.add_development_dependency(%q<jeweler>, ["~> 1.5.2"])
|
54
|
-
s.add_development_dependency(%q<rcov>, [">= 0"])
|
55
|
-
else
|
56
|
-
s.add_dependency(%q<activesupport>, ["~> 3.0.3"])
|
57
|
-
s.add_dependency(%q<i18n>, [">= 0"])
|
58
|
-
s.add_dependency(%q<shoulda>, [">= 0"])
|
59
|
-
s.add_dependency(%q<timecop>, [">= 0.3.4"])
|
60
|
-
s.add_dependency(%q<bundler>, ["~> 1.0.0"])
|
61
|
-
s.add_dependency(%q<jeweler>, ["~> 1.5.2"])
|
62
|
-
s.add_dependency(%q<rcov>, [">= 0"])
|
63
|
-
end
|
64
|
-
else
|
65
|
-
s.add_dependency(%q<activesupport>, ["~> 3.0.3"])
|
66
|
-
s.add_dependency(%q<i18n>, [">= 0"])
|
67
|
-
s.add_dependency(%q<shoulda>, [">= 0"])
|
68
|
-
s.add_dependency(%q<timecop>, [">= 0.3.4"])
|
69
|
-
s.add_dependency(%q<bundler>, ["~> 1.0.0"])
|
70
|
-
s.add_dependency(%q<jeweler>, ["~> 1.5.2"])
|
71
|
-
s.add_dependency(%q<rcov>, [">= 0"])
|
72
|
-
end
|
73
|
-
end
|
17
|
+
s.add_runtime_dependency(%q<activesupport>, ["~> 3.0.3"])
|
18
|
+
s.add_runtime_dependency(%q<i18n>, [">= 0"])
|
19
|
+
s.add_development_dependency(%q<shoulda>, [">= 0"])
|
20
|
+
s.add_development_dependency(%q<timecop>, [">= 0.3.4"])
|
74
21
|
|
22
|
+
s.files = `git ls-files`.split("\n")
|
23
|
+
s.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
|
24
|
+
s.executables = `git ls-files -- bin/*`.split("\n").map{ |f| File.basename(f) }
|
25
|
+
s.require_paths = ["lib"]
|
26
|
+
end
|
data/test/test_opentoken.rb
CHANGED
@@ -10,11 +10,11 @@ class TestOpentoken < Test::Unit::TestCase
|
|
10
10
|
@password = 'Test123'
|
11
11
|
OpenToken.password = @password
|
12
12
|
end
|
13
|
-
context "
|
13
|
+
context "decoding token between expiration dates" do
|
14
14
|
setup do
|
15
15
|
Timecop.travel(Time.iso8601('2010-03-04T19:20:10Z')) do
|
16
16
|
assert_nothing_raised do
|
17
|
-
@token = OpenToken.
|
17
|
+
@token = OpenToken.decode @opentoken
|
18
18
|
end
|
19
19
|
end
|
20
20
|
end
|
@@ -29,31 +29,31 @@ class TestOpentoken < Test::Unit::TestCase
|
|
29
29
|
end
|
30
30
|
end
|
31
31
|
|
32
|
-
context "
|
32
|
+
context "decoding token when current time is before expiration date" do
|
33
33
|
should "raise TokenExpiredError" do
|
34
34
|
Timecop.travel(Time.iso8601('2010-03-04T19:19:10Z')) do
|
35
35
|
assert_raises OpenToken::TokenExpiredError do
|
36
|
-
@token = OpenToken.
|
36
|
+
@token = OpenToken.decode @opentoken
|
37
37
|
end
|
38
38
|
end
|
39
39
|
end
|
40
40
|
end
|
41
41
|
|
42
|
-
context "
|
42
|
+
context "decoding token when current time is equal to expiration date" do
|
43
43
|
should "raise TokenExpiredError" do
|
44
44
|
Timecop.travel(Time.iso8601('2010-03-04T19:24:15Z')) do
|
45
45
|
assert_raises OpenToken::TokenExpiredError do
|
46
|
-
@token = OpenToken.
|
46
|
+
@token = OpenToken.decode @opentoken
|
47
47
|
end
|
48
48
|
end
|
49
49
|
end
|
50
50
|
end
|
51
51
|
|
52
|
-
context "
|
52
|
+
context "decoding token with attribute value containing apostrophe" do
|
53
53
|
setup do
|
54
54
|
Timecop.travel(Time.iso8601('2011-01-13T11:08:01Z')) do
|
55
55
|
@opentoken = "T1RLAQLIjiqgexqi1PQcEKCetvGoSYR2jhDFSIfE5ctlSBxEnq3S1ydjAADQUNRIKJx6_14aE3MQZnDABupGJrKNfoJHFS5VOnKexjMtboeOgst31Hf-D9CZBrpB7Jv0KBwnQ7DN3HizecPT76oX3UGtq_Vi5j5bKYCeObYm9W6h7NY-VzcZY5TTqIuulc2Jit381usAWZ2Sv1c_CWwhrH4hw-x7vUQMSjErvXK1qvsrFCpfNr7XlArx0HjI6kT5XEaHgQNdC0zrLw9cZ4rewoEisR3H5oM7B6gMaP82wTSFVBXvpn5r0KT-Iuc3JuG2en1zVh3GNf110oQCKQ**"
|
56
|
-
@token = OpenToken.
|
56
|
+
@token = OpenToken.decode @opentoken
|
57
57
|
end
|
58
58
|
end
|
59
59
|
should 'preserve apostrophe in attribute payload' do
|
@@ -63,7 +63,23 @@ class TestOpentoken < Test::Unit::TestCase
|
|
63
63
|
|
64
64
|
should 'raise invalid token error parsing nil token' do
|
65
65
|
assert_raises OpenToken::TokenInvalidError do
|
66
|
-
OpenToken.
|
66
|
+
OpenToken.decode nil
|
67
|
+
end
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
71
|
+
context "encoding token" do
|
72
|
+
setup do
|
73
|
+
OpenToken.password = "Password1"
|
74
|
+
end
|
75
|
+
context "with aes-128-cbc and subject attribute" do
|
76
|
+
setup do
|
77
|
+
@attributesIn = { "subject" => "john", "email" => "john@example.com"}
|
78
|
+
@token = OpenToken.encode @attributesIn, OpenToken::CIPHER_AES_128_CBC
|
79
|
+
end
|
80
|
+
should "be decodable" do
|
81
|
+
@attributesOut = OpenToken.decode @token
|
82
|
+
assert_equal @attributesIn, @attributesOut
|
67
83
|
end
|
68
84
|
end
|
69
85
|
end
|
metadata
CHANGED
@@ -1,13 +1,13 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: opentoken
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
hash:
|
4
|
+
hash: 19
|
5
5
|
prerelease:
|
6
6
|
segments:
|
7
7
|
- 1
|
8
|
+
- 1
|
8
9
|
- 0
|
9
|
-
|
10
|
-
version: 1.0.0
|
10
|
+
version: 1.1.0
|
11
11
|
platform: ruby
|
12
12
|
authors:
|
13
13
|
- Ryan Sonnek
|
@@ -15,12 +15,12 @@ autorequire:
|
|
15
15
|
bindir: bin
|
16
16
|
cert_chain: []
|
17
17
|
|
18
|
-
date: 2011-
|
19
|
-
default_executable:
|
18
|
+
date: 2011-10-13 00:00:00 Z
|
20
19
|
dependencies:
|
21
20
|
- !ruby/object:Gem::Dependency
|
22
|
-
|
23
|
-
|
21
|
+
name: activesupport
|
22
|
+
prerelease: false
|
23
|
+
requirement: &id001 !ruby/object:Gem::Requirement
|
24
24
|
none: false
|
25
25
|
requirements:
|
26
26
|
- - ~>
|
@@ -31,12 +31,12 @@ dependencies:
|
|
31
31
|
- 0
|
32
32
|
- 3
|
33
33
|
version: 3.0.3
|
34
|
-
requirement: *id001
|
35
|
-
prerelease: false
|
36
|
-
name: activesupport
|
37
|
-
- !ruby/object:Gem::Dependency
|
38
34
|
type: :runtime
|
39
|
-
version_requirements:
|
35
|
+
version_requirements: *id001
|
36
|
+
- !ruby/object:Gem::Dependency
|
37
|
+
name: i18n
|
38
|
+
prerelease: false
|
39
|
+
requirement: &id002 !ruby/object:Gem::Requirement
|
40
40
|
none: false
|
41
41
|
requirements:
|
42
42
|
- - ">="
|
@@ -45,12 +45,12 @@ dependencies:
|
|
45
45
|
segments:
|
46
46
|
- 0
|
47
47
|
version: "0"
|
48
|
-
|
49
|
-
|
50
|
-
name: i18n
|
48
|
+
type: :runtime
|
49
|
+
version_requirements: *id002
|
51
50
|
- !ruby/object:Gem::Dependency
|
52
|
-
|
53
|
-
|
51
|
+
name: shoulda
|
52
|
+
prerelease: false
|
53
|
+
requirement: &id003 !ruby/object:Gem::Requirement
|
54
54
|
none: false
|
55
55
|
requirements:
|
56
56
|
- - ">="
|
@@ -59,12 +59,12 @@ dependencies:
|
|
59
59
|
segments:
|
60
60
|
- 0
|
61
61
|
version: "0"
|
62
|
-
requirement: *id003
|
63
|
-
prerelease: false
|
64
|
-
name: shoulda
|
65
|
-
- !ruby/object:Gem::Dependency
|
66
62
|
type: :development
|
67
|
-
version_requirements:
|
63
|
+
version_requirements: *id003
|
64
|
+
- !ruby/object:Gem::Dependency
|
65
|
+
name: timecop
|
66
|
+
prerelease: false
|
67
|
+
requirement: &id004 !ruby/object:Gem::Requirement
|
68
68
|
none: false
|
69
69
|
requirements:
|
70
70
|
- - ">="
|
@@ -75,82 +75,36 @@ dependencies:
|
|
75
75
|
- 3
|
76
76
|
- 4
|
77
77
|
version: 0.3.4
|
78
|
-
requirement: *id004
|
79
|
-
prerelease: false
|
80
|
-
name: timecop
|
81
|
-
- !ruby/object:Gem::Dependency
|
82
78
|
type: :development
|
83
|
-
version_requirements:
|
84
|
-
none: false
|
85
|
-
requirements:
|
86
|
-
- - ~>
|
87
|
-
- !ruby/object:Gem::Version
|
88
|
-
hash: 23
|
89
|
-
segments:
|
90
|
-
- 1
|
91
|
-
- 0
|
92
|
-
- 0
|
93
|
-
version: 1.0.0
|
94
|
-
requirement: *id005
|
95
|
-
prerelease: false
|
96
|
-
name: bundler
|
97
|
-
- !ruby/object:Gem::Dependency
|
98
|
-
type: :development
|
99
|
-
version_requirements: &id006 !ruby/object:Gem::Requirement
|
100
|
-
none: false
|
101
|
-
requirements:
|
102
|
-
- - ~>
|
103
|
-
- !ruby/object:Gem::Version
|
104
|
-
hash: 7
|
105
|
-
segments:
|
106
|
-
- 1
|
107
|
-
- 5
|
108
|
-
- 2
|
109
|
-
version: 1.5.2
|
110
|
-
requirement: *id006
|
111
|
-
prerelease: false
|
112
|
-
name: jeweler
|
113
|
-
- !ruby/object:Gem::Dependency
|
114
|
-
type: :development
|
115
|
-
version_requirements: &id007 !ruby/object:Gem::Requirement
|
116
|
-
none: false
|
117
|
-
requirements:
|
118
|
-
- - ">="
|
119
|
-
- !ruby/object:Gem::Version
|
120
|
-
hash: 3
|
121
|
-
segments:
|
122
|
-
- 0
|
123
|
-
version: "0"
|
124
|
-
requirement: *id007
|
125
|
-
prerelease: false
|
126
|
-
name: rcov
|
79
|
+
version_requirements: *id004
|
127
80
|
description: parse opentoken properties passed for Single Signon requests
|
128
|
-
email:
|
81
|
+
email:
|
82
|
+
- ryan@socialcast.com
|
129
83
|
executables: []
|
130
84
|
|
131
85
|
extensions: []
|
132
86
|
|
133
|
-
extra_rdoc_files:
|
134
|
-
|
135
|
-
- README.rdoc
|
87
|
+
extra_rdoc_files: []
|
88
|
+
|
136
89
|
files:
|
137
90
|
- .document
|
91
|
+
- .gitignore
|
92
|
+
- CONTRIBUTORS.txt
|
138
93
|
- Gemfile
|
139
|
-
- LICENSE
|
140
|
-
- README.
|
94
|
+
- LICENSE.txt
|
95
|
+
- README.md
|
141
96
|
- Rakefile
|
142
|
-
- VERSION
|
143
97
|
- lib/opentoken.rb
|
144
98
|
- lib/opentoken/key_value_serializer.rb
|
145
99
|
- lib/opentoken/password_key_generator.rb
|
146
100
|
- lib/opentoken/token.rb
|
101
|
+
- lib/opentoken/version.rb
|
147
102
|
- opentoken.gemspec
|
148
103
|
- test/helper.rb
|
149
104
|
- test/test_opentoken.rb
|
150
|
-
|
151
|
-
|
152
|
-
|
153
|
-
- MIT
|
105
|
+
homepage: http://github.com/socialcast/opentoken
|
106
|
+
licenses: []
|
107
|
+
|
154
108
|
post_install_message:
|
155
109
|
rdoc_options: []
|
156
110
|
|
@@ -176,8 +130,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
176
130
|
version: "0"
|
177
131
|
requirements: []
|
178
132
|
|
179
|
-
rubyforge_project:
|
180
|
-
rubygems_version: 1.
|
133
|
+
rubyforge_project: opentoken
|
134
|
+
rubygems_version: 1.8.5
|
181
135
|
signing_key:
|
182
136
|
specification_version: 3
|
183
137
|
summary: ruby implementation of the opentoken specification
|
data/LICENSE
DELETED
@@ -1,20 +0,0 @@
|
|
1
|
-
Copyright (c) 2009 Ryan Sonnek
|
2
|
-
|
3
|
-
Permission is hereby granted, free of charge, to any person obtaining
|
4
|
-
a copy of this software and associated documentation files (the
|
5
|
-
"Software"), to deal in the Software without restriction, including
|
6
|
-
without limitation the rights to use, copy, modify, merge, publish,
|
7
|
-
distribute, sublicense, and/or sell copies of the Software, and to
|
8
|
-
permit persons to whom the Software is furnished to do so, subject to
|
9
|
-
the following conditions:
|
10
|
-
|
11
|
-
The above copyright notice and this permission notice shall be
|
12
|
-
included in all copies or substantial portions of the Software.
|
13
|
-
|
14
|
-
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
15
|
-
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
16
|
-
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
17
|
-
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
18
|
-
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
19
|
-
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
20
|
-
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.rdoc
DELETED
@@ -1,25 +0,0 @@
|
|
1
|
-
= opentoken
|
2
|
-
|
3
|
-
Parse encrypted opentoken properties
|
4
|
-
|
5
|
-
see http://www.pingidentity.com/opentoken
|
6
|
-
|
7
|
-
== Usage
|
8
|
-
|
9
|
-
#configure decryption with shared key
|
10
|
-
OpenToken.password = 'shared_secret_to_decrypt'
|
11
|
-
|
12
|
-
#decrypt opentoken into hash of attributes
|
13
|
-
attributes = OpenToken.parse opentoken
|
14
|
-
|
15
|
-
== Note on Patches/Pull Requests
|
16
|
-
|
17
|
-
* Fork the project.
|
18
|
-
* Make your feature addition or bug fix.
|
19
|
-
* Add tests for it. This is important so I don't break it in a future version unintentionally.
|
20
|
-
* Commit, do not mess with rakefile, version, or history. (bump version in a commit by itself I can ignore when I pull)
|
21
|
-
* Send me a pull request. Bonus points for topic branches.
|
22
|
-
|
23
|
-
== Copyright
|
24
|
-
|
25
|
-
Copyright (c) 2010 Ryan Sonnek. See LICENSE for details.
|
data/VERSION
DELETED
@@ -1 +0,0 @@
|
|
1
|
-
1.0.0
|