rails_auth_generator 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA256:
3
+ metadata.gz: 85d77a6bc6b301f548d4b32df46624745643fca4c44549abac11c9ed1649b3c6
4
+ data.tar.gz: da6497b98e1fb6e88ebd045d7879f4be199242f7ef5339617ef62c69b56f505f
5
+ SHA512:
6
+ metadata.gz: ad1a93631c931470ba58429e00d42148945806ae6bef329097c69128d6858f34232b47ecfefd0f903795028222fa1f5027a79b05a1e7d009cb87876396a2db25
7
+ data.tar.gz: f11d8ed3bf418bf57574db49f40ff9a3b96a7b80439f272ba23a2596d205dc7fda006599efb7f7c2e6d193c8286676d31673938719844aac7e1836fe8cfe3005
data/CHANGELOG.md ADDED
@@ -0,0 +1,5 @@
1
+ ## [Unreleased]
2
+
3
+ ## [0.1.0] - 2025-08-18
4
+
5
+ - Initial release
@@ -0,0 +1,132 @@
1
+ # Contributor Covenant Code of Conduct
2
+
3
+ ## Our Pledge
4
+
5
+ We as members, contributors, and leaders pledge to make participation in our
6
+ community a harassment-free experience for everyone, regardless of age, body
7
+ size, visible or invisible disability, ethnicity, sex characteristics, gender
8
+ identity and expression, level of experience, education, socio-economic status,
9
+ nationality, personal appearance, race, caste, color, religion, or sexual
10
+ identity and orientation.
11
+
12
+ We pledge to act and interact in ways that contribute to an open, welcoming,
13
+ diverse, inclusive, and healthy community.
14
+
15
+ ## Our Standards
16
+
17
+ Examples of behavior that contributes to a positive environment for our
18
+ community include:
19
+
20
+ * Demonstrating empathy and kindness toward other people
21
+ * Being respectful of differing opinions, viewpoints, and experiences
22
+ * Giving and gracefully accepting constructive feedback
23
+ * Accepting responsibility and apologizing to those affected by our mistakes,
24
+ and learning from the experience
25
+ * Focusing on what is best not just for us as individuals, but for the overall
26
+ community
27
+
28
+ Examples of unacceptable behavior include:
29
+
30
+ * The use of sexualized language or imagery, and sexual attention or advances of
31
+ any kind
32
+ * Trolling, insulting or derogatory comments, and personal or political attacks
33
+ * Public or private harassment
34
+ * Publishing others' private information, such as a physical or email address,
35
+ without their explicit permission
36
+ * Other conduct which could reasonably be considered inappropriate in a
37
+ professional setting
38
+
39
+ ## Enforcement Responsibilities
40
+
41
+ Community leaders are responsible for clarifying and enforcing our standards of
42
+ acceptable behavior and will take appropriate and fair corrective action in
43
+ response to any behavior that they deem inappropriate, threatening, offensive,
44
+ or harmful.
45
+
46
+ Community leaders have the right and responsibility to remove, edit, or reject
47
+ comments, commits, code, wiki edits, issues, and other contributions that are
48
+ not aligned to this Code of Conduct, and will communicate reasons for moderation
49
+ decisions when appropriate.
50
+
51
+ ## Scope
52
+
53
+ This Code of Conduct applies within all community spaces, and also applies when
54
+ an individual is officially representing the community in public spaces.
55
+ Examples of representing our community include using an official email address,
56
+ posting via an official social media account, or acting as an appointed
57
+ representative at an online or offline event.
58
+
59
+ ## Enforcement
60
+
61
+ Instances of abusive, harassing, or otherwise unacceptable behavior may be
62
+ reported to the community leaders responsible for enforcement at
63
+ [INSERT CONTACT METHOD].
64
+ All complaints will be reviewed and investigated promptly and fairly.
65
+
66
+ All community leaders are obligated to respect the privacy and security of the
67
+ reporter of any incident.
68
+
69
+ ## Enforcement Guidelines
70
+
71
+ Community leaders will follow these Community Impact Guidelines in determining
72
+ the consequences for any action they deem in violation of this Code of Conduct:
73
+
74
+ ### 1. Correction
75
+
76
+ **Community Impact**: Use of inappropriate language or other behavior deemed
77
+ unprofessional or unwelcome in the community.
78
+
79
+ **Consequence**: A private, written warning from community leaders, providing
80
+ clarity around the nature of the violation and an explanation of why the
81
+ behavior was inappropriate. A public apology may be requested.
82
+
83
+ ### 2. Warning
84
+
85
+ **Community Impact**: A violation through a single incident or series of
86
+ actions.
87
+
88
+ **Consequence**: A warning with consequences for continued behavior. No
89
+ interaction with the people involved, including unsolicited interaction with
90
+ those enforcing the Code of Conduct, for a specified period of time. This
91
+ includes avoiding interactions in community spaces as well as external channels
92
+ like social media. Violating these terms may lead to a temporary or permanent
93
+ ban.
94
+
95
+ ### 3. Temporary Ban
96
+
97
+ **Community Impact**: A serious violation of community standards, including
98
+ sustained inappropriate behavior.
99
+
100
+ **Consequence**: A temporary ban from any sort of interaction or public
101
+ communication with the community for a specified period of time. No public or
102
+ private interaction with the people involved, including unsolicited interaction
103
+ with those enforcing the Code of Conduct, is allowed during this period.
104
+ Violating these terms may lead to a permanent ban.
105
+
106
+ ### 4. Permanent Ban
107
+
108
+ **Community Impact**: Demonstrating a pattern of violation of community
109
+ standards, including sustained inappropriate behavior, harassment of an
110
+ individual, or aggression toward or disparagement of classes of individuals.
111
+
112
+ **Consequence**: A permanent ban from any sort of public interaction within the
113
+ community.
114
+
115
+ ## Attribution
116
+
117
+ This Code of Conduct is adapted from the [Contributor Covenant][homepage],
118
+ version 2.1, available at
119
+ [https://www.contributor-covenant.org/version/2/1/code_of_conduct.html][v2.1].
120
+
121
+ Community Impact Guidelines were inspired by
122
+ [Mozilla's code of conduct enforcement ladder][Mozilla CoC].
123
+
124
+ For answers to common questions about this code of conduct, see the FAQ at
125
+ [https://www.contributor-covenant.org/faq][FAQ]. Translations are available at
126
+ [https://www.contributor-covenant.org/translations][translations].
127
+
128
+ [homepage]: https://www.contributor-covenant.org
129
+ [v2.1]: https://www.contributor-covenant.org/version/2/1/code_of_conduct.html
130
+ [Mozilla CoC]: https://github.com/mozilla/diversity
131
+ [FAQ]: https://www.contributor-covenant.org/faq
132
+ [translations]: https://www.contributor-covenant.org/translations
data/Gemfile ADDED
@@ -0,0 +1,13 @@
1
+ # frozen_string_literal: true
2
+
3
+ source "https://rubygems.org"
4
+
5
+ # Specify your gem's dependencies in rails_auth_generator.gemspec
6
+ gemspec
7
+
8
+ gem "irb"
9
+ gem "rake", "~> 13.0"
10
+
11
+ gem "rspec", "~> 3.0"
12
+
13
+ gem "rubocop", "~> 1.21"
data/LICENSE.txt ADDED
@@ -0,0 +1,21 @@
1
+ The MIT License (MIT)
2
+
3
+ Copyright (c) 2025 Zeyad Hassan
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in
13
+ all copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21
+ THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,43 @@
1
+ # RailsAuthGenerator
2
+
3
+ TODO: Delete this and the text below, and describe your gem
4
+
5
+ Welcome to your new gem! In this directory, you'll find the files you need to be able to package up your Ruby library into a gem. Put your Ruby code in the file `lib/rails_auth_generator`. To experiment with that code, run `bin/console` for an interactive prompt.
6
+
7
+ ## Installation
8
+
9
+ TODO: Replace `UPDATE_WITH_YOUR_GEM_NAME_IMMEDIATELY_AFTER_RELEASE_TO_RUBYGEMS_ORG` with your gem name right after releasing it to RubyGems.org. Please do not do it earlier due to security reasons. Alternatively, replace this section with instructions to install your gem from git if you don't plan to release to RubyGems.org.
10
+
11
+ Install the gem and add to the application's Gemfile by executing:
12
+
13
+ ```bash
14
+ bundle add UPDATE_WITH_YOUR_GEM_NAME_IMMEDIATELY_AFTER_RELEASE_TO_RUBYGEMS_ORG
15
+ ```
16
+
17
+ If bundler is not being used to manage dependencies, install the gem by executing:
18
+
19
+ ```bash
20
+ gem install UPDATE_WITH_YOUR_GEM_NAME_IMMEDIATELY_AFTER_RELEASE_TO_RUBYGEMS_ORG
21
+ ```
22
+
23
+ ## Usage
24
+
25
+ TODO: Write usage instructions here
26
+
27
+ ## Development
28
+
29
+ After checking out the repo, run `bin/setup` to install dependencies. Then, run `rake spec` to run the tests. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
30
+
31
+ To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and the created tag, and push the `.gem` file to [rubygems.org](https://rubygems.org).
32
+
33
+ ## Contributing
34
+
35
+ Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/rails_auth_generator. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [code of conduct](https://github.com/[USERNAME]/rails_auth_generator/blob/master/CODE_OF_CONDUCT.md).
36
+
37
+ ## License
38
+
39
+ The gem is available as open source under the terms of the [MIT License](https://opensource.org/licenses/MIT).
40
+
41
+ ## Code of Conduct
42
+
43
+ Everyone interacting in the RailsAuthGenerator project's codebases, issue trackers, chat rooms and mailing lists is expected to follow the [code of conduct](https://github.com/[USERNAME]/rails_auth_generator/blob/master/CODE_OF_CONDUCT.md).
data/README_NEW.md ADDED
@@ -0,0 +1,59 @@
1
+ # RailsAuthGenerator
2
+
3
+ RailsAuthGenerator provides Rails generators for authentication, user management, password resets, and mailers, streamlining the setup of secure user authentication in Rails applications. It helps you quickly scaffold all necessary models, controllers, mailers, and migrations for a robust authentication system.
4
+
5
+ ## Features
6
+
7
+ - User model and migration generator
8
+ - Authentication controller and password reset controller
9
+ - User serializer for API responses
10
+ - Mailers for sending token to reset password
11
+ - Easy integration with Rails 6.0+
12
+
13
+ ## Installation
14
+
15
+ Add this line to your application's Gemfile:
16
+
17
+ ```ruby
18
+ bundle add rails_auth_generator
19
+ ```
20
+
21
+ Or install it manually:
22
+
23
+ ```bash
24
+ gem install rails_auth_generator
25
+ ```
26
+
27
+ If you want to use the latest version from GitHub:
28
+
29
+ ```ruby
30
+ gem 'rails_auth_generator', git: 'https://github.com/Zeyad-Hassan-1/authJWT.git'
31
+ ```
32
+
33
+ ## Usage
34
+
35
+ Run the generator to scaffold authentication features:
36
+
37
+ ```bash
38
+ rails generate auth
39
+ ```
40
+
41
+ This will create:
42
+ - User model and migration
43
+ - Authentication controllers (auth, password resets, users)
44
+ - Mailers for sending token to reset password
45
+ - Serializers for user data
46
+
47
+ You can customize the generated files as needed for your application.
48
+
49
+ ## Contributing
50
+
51
+ Bug reports and pull requests are welcome on GitHub at [https://github.com/Zeyad-Hassan-1/authJWT](https://github.com/Zeyad-Hassan-1/authJWT). This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [code of conduct](CODE_OF_CONDUCT.md).
52
+
53
+ ## License
54
+
55
+ The gem is available as open source under the terms of the [MIT License](LICENSE.txt).
56
+
57
+ ## Code of Conduct
58
+
59
+ Everyone interacting in the RailsAuthGenerator project's codebases, issue trackers, chat rooms and mailing lists is expected to follow the [code of conduct](CODE_OF_CONDUCT.md).
data/Rakefile ADDED
@@ -0,0 +1,12 @@
1
+ # frozen_string_literal: true
2
+
3
+ require "bundler/gem_tasks"
4
+ require "rspec/core/rake_task"
5
+
6
+ RSpec::Core::RakeTask.new(:spec)
7
+
8
+ require "rubocop/rake_task"
9
+
10
+ RuboCop::RakeTask.new
11
+
12
+ task default: %i[spec rubocop]
data/bin/console ADDED
@@ -0,0 +1,11 @@
1
+ #!/usr/bin/env ruby
2
+ # frozen_string_literal: true
3
+
4
+ require "bundler/setup"
5
+ require "rails_auth_generator"
6
+
7
+ # You can add fixtures and/or initialization code here to make experimenting
8
+ # with your gem easier. You can also use a different console, if you like.
9
+
10
+ require "irb"
11
+ IRB.start(__FILE__)
data/bin/setup ADDED
@@ -0,0 +1,8 @@
1
+ #!/usr/bin/env bash
2
+ set -euo pipefail
3
+ IFS=$'\n\t'
4
+ set -vx
5
+
6
+ bundle install
7
+
8
+ # Do any other automated setup that you need to do here
@@ -0,0 +1,8 @@
1
+ Description:
2
+ Explain the generator
3
+
4
+ Example:
5
+ bin/rails generate auth Thing
6
+
7
+ This will create:
8
+ what/will/it/create
@@ -0,0 +1,100 @@
1
+ class AuthGenerator < Rails::Generators::Base
2
+ include Rails::Generators::Migration
3
+ source_root File.expand_path("templates", __dir__)
4
+
5
+ def modify_gemfile
6
+ insert_into_file "Gemfile", after: /^source ['"].*['"]\n/ do
7
+ <<~RUBY
8
+ gem 'bcrypt', '~> 3.1', '>= 3.1.12'
9
+ gem 'jwt', '~> 2.5'
10
+ gem 'rack-cors'
11
+ gem 'active_model_serializers', '~> 0.10.12'
12
+ RUBY
13
+ end
14
+
15
+ end
16
+
17
+ def add_routes
18
+ route <<~RUBY
19
+ # config/routes.rb
20
+ post '/login', to: 'auth#login'
21
+ post '/signup', to: 'users#create'
22
+ get '/me', to: 'users#me'
23
+ resources :password_resets, only: [:create] do
24
+ collection do
25
+ put '/', to: 'password_resets#update' # PUT /password_resets
26
+ end
27
+ end
28
+ # Admin routes
29
+ post '/users/:id/make_admin', to: 'users#make_admin'
30
+ RUBY
31
+ end
32
+
33
+ def create_auth_files
34
+ template "auth_controller.rb", "app/controllers/auth_controller.rb"
35
+ template "user_serializer.rb", "app/serializers/user_serializer.rb"
36
+ template "users_controller.rb", "app/controllers/users_controller.rb"
37
+ template "password_resets_controller.rb", "app/controllers/password_resets_controller.rb"
38
+ template "user.rb", "app/models/user.rb"
39
+ template "mailers/user_mailer.rb", "app/mailers/user_mailer.rb"
40
+ template "mailers/application_mailer.rb", "app/mailers/application_mailer.rb"
41
+ end
42
+
43
+ def modify_application_controller
44
+ inject_into_class "app/controllers/application_controller.rb", "ApplicationController" do
45
+ <<~RUBY
46
+ before_action :authorized
47
+
48
+ def encode_token(payload)
49
+ # Add admin status to the payload if user is admin
50
+ payload[:admin] = @user.admin? if @user.is_a?(User)
51
+ JWT.encode(payload, 'hellomars1211')
52
+ end
53
+
54
+ def decoded_token
55
+ header = request.headers['Authorization']
56
+ if header
57
+ token = header.split(" ")[1]
58
+ begin
59
+ JWT.decode(token, 'hellomars1211', true, algorithm: 'HS256')
60
+ rescue JWT::DecodeError
61
+ nil
62
+ end
63
+ end
64
+ end
65
+
66
+ def current_user
67
+ if decoded_token
68
+ user_id = decoded_token[0]['user_id']
69
+ @user = User.find_by(id: user_id)
70
+ end
71
+ end
72
+
73
+ def current_admin
74
+ current_user && (current_user.admin? || decoded_token[0]['admin'])
75
+ end
76
+
77
+ def authorized
78
+ unless !!current_user
79
+ render json: { message: 'Please log in' }, status: :unauthorized
80
+ end
81
+ end
82
+
83
+ def admin_authorized
84
+ unless current_admin
85
+ render json: { message: 'Admin access required' }, status: :forbidden
86
+ end
87
+ end
88
+
89
+ RUBY
90
+ end
91
+ end
92
+
93
+ def self.next_migration_number(dirname)
94
+ Time.now.utc.strftime("%Y%m%d%H%M%S")
95
+ end
96
+
97
+ def copy_migration
98
+ migration_template "migrations/create_user.rb", "db/migrate/create_users.rb"
99
+ end
100
+ end
@@ -0,0 +1,27 @@
1
+ class AuthController < ApplicationController
2
+ skip_before_action :authorized, only: [:login]
3
+ rescue_from ActiveRecord::RecordNotFound, with: :handle_record_not_found
4
+
5
+ def login
6
+ @user = User.find_by!(username: login_params[:username])
7
+ if @user.authenticate(login_params[:password])
8
+ @token = encode_token(user_id: @user.id)
9
+ render json: {
10
+ user: UserSerializer.new(@user),
11
+ token: @token
12
+ }, status: :accepted
13
+ else
14
+ render json: {message: 'Incorrect password'}, status: :unauthorized
15
+ end
16
+ end
17
+
18
+ private
19
+
20
+ def login_params
21
+ params.permit(:username, :password)
22
+ end
23
+
24
+ def handle_record_not_found(e)
25
+ render json: { message: "User doesn't exist" }, status: :unauthorized
26
+ end
27
+ end
@@ -0,0 +1,4 @@
1
+ class ApplicationMailer < ActionMailer::Base
2
+ default from: "from@example.com"
3
+ layout "mailer"
4
+ end
@@ -0,0 +1,6 @@
1
+ class UserMailer < ApplicationMailer
2
+ def password_reset(user)
3
+ @user = user
4
+ mail to: user.email, subject: "Password Reset Instructions"
5
+ end
6
+ end
@@ -0,0 +1,19 @@
1
+ class CreateUsers < ActiveRecord::Migration[8.0]
2
+ def change
3
+ create_table :users do |t|
4
+ t.string :username, null: false
5
+ t.string :email
6
+ t.string :password_digest, null: false
7
+ t.string :bio
8
+ t.boolean :admin, default: false, null: false
9
+ t.string :reset_token
10
+ t.datetime :reset_sent_at
11
+
12
+ t.timestamps
13
+ end
14
+
15
+ add_index :users, :username, unique: true
16
+ add_index :users, :admin
17
+ add_index :users, :reset_token, unique: true
18
+ end
19
+ end
@@ -0,0 +1,34 @@
1
+ # app/controllers/password_resets_controller.rb
2
+ class PasswordResetsController < ApplicationController
3
+ skip_before_action :authorized
4
+
5
+ # Request reset (step 1)
6
+ # New version using username
7
+ def create
8
+ user = User.find_by(email: params[:email])
9
+ if user
10
+ user.generate_password_reset_token!
11
+ # Send token via your preferred method (API response, SMS, etc.)
12
+ render json: {
13
+ message: "Reset instructions sent",
14
+ token: user.reset_token # In production, send this via email/SMS instead
15
+ }
16
+ else
17
+ render json: { error: "Username not found" }, status: :not_found
18
+ end
19
+ end
20
+
21
+ # Actual reset (step 2)
22
+ def update
23
+ user = User.find_by(reset_token: params[:token])
24
+ if user&.reset_sent_at && !user.password_reset_expired?
25
+ if user.update(password: params[:password], reset_token: nil)
26
+ render json: { message: "Password updated" }
27
+ else
28
+ render json: { errors: user.errors.full_messages }, status: :unprocessable_entity
29
+ end
30
+ else
31
+ render json: { error: "Invalid or expired token" }, status: :unprocessable_entity
32
+ end
33
+ end
34
+ end
@@ -0,0 +1,15 @@
1
+ class User < ApplicationRecord
2
+ has_secure_password
3
+ validates :username, uniqueness: true
4
+ # validates :email, presence: true, uniqueness: true
5
+
6
+ def generate_password_reset_token!
7
+ self.reset_token = SecureRandom.urlsafe_base64
8
+ self.reset_sent_at = Time.now.utc
9
+ save!(validate: false) # Skip validations for password reset
10
+ end
11
+
12
+ def password_reset_expired?
13
+ reset_sent_at < 1.hour.ago
14
+ end
15
+ end
@@ -0,0 +1,3 @@
1
+ class UserSerializer < ActiveModel::Serializer
2
+ attributes :username, :bio, :admin
3
+ end
@@ -0,0 +1,35 @@
1
+ class UsersController < ApplicationController
2
+ skip_before_action :authorized, only: [:create]
3
+ before_action :admin_authorized, only: [:make_admin]
4
+ rescue_from ActiveRecord::RecordInvalid, with: :handle_invalid_record
5
+
6
+ # app/controllers/users_controller.rb
7
+ def create
8
+ user = User.create!(user_params)
9
+ @token = encode_token(user_id: user.id)
10
+ render json: {
11
+ user: UserSerializer.new(user),
12
+ token: @token
13
+ }, status: :created
14
+ end
15
+
16
+ def me
17
+ render json: current_user, status: :ok
18
+ end
19
+
20
+ def make_admin
21
+ user = User.find(params[:id])
22
+ user.update!(admin: true)
23
+ render json: { message: "#{user.username} is now an admin" }, status: :ok
24
+ end
25
+
26
+ private
27
+
28
+ def user_params
29
+ params.permit(:username, :password, :bio)
30
+ end
31
+
32
+ def handle_invalid_record(e)
33
+ render json: { errors: e.record.errors.full_messages }, status: :unprocessable_entity
34
+ end
35
+ end
@@ -0,0 +1,5 @@
1
+ # frozen_string_literal: true
2
+
3
+ module RailsAuthGenerator
4
+ VERSION = "0.1.0"
5
+ end
@@ -0,0 +1,5 @@
1
+ require "rails_auth_generator/version"
2
+
3
+ module RailsAuthGenerator
4
+ class Error < StandardError; end
5
+ end
metadata ADDED
@@ -0,0 +1,81 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: rails_auth_generator
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Zeyad Hassan
8
+ bindir: exe
9
+ cert_chain: []
10
+ date: 1980-01-02 00:00:00.000000000 Z
11
+ dependencies:
12
+ - !ruby/object:Gem::Dependency
13
+ name: rails
14
+ requirement: !ruby/object:Gem::Requirement
15
+ requirements:
16
+ - - ">="
17
+ - !ruby/object:Gem::Version
18
+ version: '6.0'
19
+ - - "<"
20
+ - !ruby/object:Gem::Version
21
+ version: '9.0'
22
+ type: :runtime
23
+ prerelease: false
24
+ version_requirements: !ruby/object:Gem::Requirement
25
+ requirements:
26
+ - - ">="
27
+ - !ruby/object:Gem::Version
28
+ version: '6.0'
29
+ - - "<"
30
+ - !ruby/object:Gem::Version
31
+ version: '9.0'
32
+ email:
33
+ - " studying.zezo@gmail.com"
34
+ executables: []
35
+ extensions: []
36
+ extra_rdoc_files: []
37
+ files:
38
+ - CHANGELOG.md
39
+ - CODE_OF_CONDUCT.md
40
+ - Gemfile
41
+ - LICENSE.txt
42
+ - README.md
43
+ - README_NEW.md
44
+ - Rakefile
45
+ - bin/console
46
+ - bin/setup
47
+ - lib/generators/auth/USAGE
48
+ - lib/generators/auth/auth_generator.rb
49
+ - lib/generators/auth/templates/auth_controller.rb
50
+ - lib/generators/auth/templates/mailers/application_mailer.rb
51
+ - lib/generators/auth/templates/mailers/user_mailer.rb
52
+ - lib/generators/auth/templates/migrations/create_user.rb
53
+ - lib/generators/auth/templates/password_resets_controller.rb
54
+ - lib/generators/auth/templates/user.rb
55
+ - lib/generators/auth/templates/user_serializer.rb
56
+ - lib/generators/auth/templates/users_controller.rb
57
+ - lib/rails_auth_generator.rb
58
+ - lib/rails_auth_generator/version.rb
59
+ homepage: https://github.com/Zeyad-Hassan-1/authJWT.git
60
+ licenses:
61
+ - MIT
62
+ metadata: {}
63
+ rdoc_options: []
64
+ require_paths:
65
+ - lib
66
+ required_ruby_version: !ruby/object:Gem::Requirement
67
+ requirements:
68
+ - - ">="
69
+ - !ruby/object:Gem::Version
70
+ version: 3.2.0
71
+ required_rubygems_version: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ">="
74
+ - !ruby/object:Gem::Version
75
+ version: '0'
76
+ requirements: []
77
+ rubygems_version: 3.6.9
78
+ specification_version: 4
79
+ summary: Provides Rails generators for authentication, user management, password resets,
80
+ and mailers, streamlining the setup of secure user authentication in Rails applications.
81
+ test_files: []