restrict 0.0.2

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: c99bdbebb900cbb8bd4f2e16c7951a00077c9552
4
+ data.tar.gz: ad856af2b30b2e808db164da909ee824598707ee
5
+ SHA512:
6
+ metadata.gz: cef3ff540a576034e4d243304e52717dd4edb910e738e707417ba8bcbcfaf024dfc963307e411dd799627697692cc0d106d0135ffdbe6a3ddfedbedfcf9cb16b
7
+ data.tar.gz: 2d6bf74cbe84d97398ea0c23cb99429e6be7dbb7dfd8359f3c6abbbfdd8c215beb3fd70c22b4f810bdbc3bd70c29d0e85a5286a42429723256f584e62fdbb116
data/.gitignore ADDED
@@ -0,0 +1,17 @@
1
+ *.gem
2
+ *.rbc
3
+ .bundle
4
+ .config
5
+ .yardoc
6
+ Gemfile.lock
7
+ InstalledFiles
8
+ _yardoc
9
+ coverage
10
+ doc/
11
+ lib/bundler/man
12
+ pkg
13
+ rdoc
14
+ spec/reports
15
+ test/tmp
16
+ test/version_tmp
17
+ tmp
data/.rspec ADDED
@@ -0,0 +1 @@
1
+ --color
data/.travis.yml ADDED
@@ -0,0 +1,11 @@
1
+ rvm:
2
+ - 2.0.0
3
+ - 2.1.0
4
+ - 2.1.1
5
+
6
+ script: 'bundle exec rake spec'
7
+
8
+ notifications:
9
+ disabled: false
10
+ recipients:
11
+ - johannes.opper@gmail.com
data/CHANGELOG.md ADDED
@@ -0,0 +1,6 @@
1
+ [not released] - 2014-08-22
2
+ * Added railtie to require controller extension instantly
3
+
4
+ [0.0.1] - 2014-08-21 Initial import
5
+ * Includes plain and conditional restrictions
6
+ * ..and RSpec matcher
data/Gemfile ADDED
@@ -0,0 +1,4 @@
1
+ source 'https://rubygems.org'
2
+
3
+ # Specify your gem's dependencies in restrict.gemspec
4
+ gemspec
data/LICENSE.txt ADDED
@@ -0,0 +1,13 @@
1
+ DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
2
+ Version 2, December 2004
3
+
4
+ Copyright (C) 2014 Johannes Opper <johannes.opper@gmail.com>
5
+
6
+ Everyone is permitted to copy and distribute verbatim or modified
7
+ copies of this license document, and changing it is allowed as long
8
+ as the name is changed.
9
+
10
+ DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
11
+ TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
12
+
13
+ 0. You just DO WHAT THE FUCK YOU WANT TO.
data/README.md ADDED
@@ -0,0 +1,51 @@
1
+ # Restrict
2
+
3
+ A rails controller extension, that gives you the possibility to restrict access to your controller actions.
4
+
5
+ [![Build Status](https://secure.travis-ci.org/xijo/restrict.png?branch=master)](https://travis-ci.org/xijo/restrict) [![Gem Version](https://badge.fury.io/rb/restrict.png)](http://badge.fury.io/rb/restrict) [![Code Climate](https://codeclimate.com/github/xijo/restrict.png)](https://codeclimate.com/github/xijo/restrict) [![Code Climate](https://codeclimate.com/github/xijo/restrict/coverage.png)](https://codeclimate.com/github/xijo/restrict)
6
+
7
+ ## Installation
8
+
9
+ gem 'restrict'
10
+
11
+ ## Compatibility
12
+
13
+ Works with rails 3 and 4 and all versions every ruby 2.
14
+
15
+ ## Usage
16
+
17
+ ```ruby
18
+ class GoodiesController < ApplicationController
19
+ restrict :take
20
+ restrict :delete, allow_if: :goodie_manager?
21
+
22
+ def take
23
+ # Grab a goodie
24
+ end
25
+
26
+ def delete
27
+ # Remove all the goodies
28
+ end
29
+
30
+ private
31
+
32
+ def goodie_manager?
33
+ # Your domain implementation
34
+ end
35
+ end
36
+ ```
37
+
38
+ What that does:
39
+ 1. Any anonymous access to one of both methods will raise `Restrict::LoginRequired`
40
+ 2. If a `current_user` exists the access to take is allowed
41
+ 3. If a `current_user` exists but `goodie_manager?` returns false, then `Restrict::AccessDenied` will be raised
42
+ 4. If a `current_user` exists and `goodie_manager?` is true, the access is allowed
43
+
44
+ ## Todos/Ideas
45
+
46
+ * make `current_user` configurable
47
+ * introduce `any_action` option
48
+
49
+ ## Contributing
50
+
51
+ You know how this works and bonus points for feature branches!
data/Rakefile ADDED
@@ -0,0 +1,14 @@
1
+ require "bundler/gem_tasks"
2
+
3
+ if File.exist?('.codeclimate')
4
+ ENV["CODECLIMATE_REPO_TOKEN"] = File.read('.codeclimate')
5
+ end
6
+
7
+ require 'rspec/core/rake_task'
8
+ RSpec::Core::RakeTask.new(:spec)
9
+ task :default => :spec
10
+
11
+ desc "Open an irb session preloaded with this library"
12
+ task :console do
13
+ sh "irb -rubygems -I lib -r restrict.rb"
14
+ end
data/lib/restrict.rb ADDED
@@ -0,0 +1,14 @@
1
+ require 'active_support'
2
+
3
+ require 'restrict/version'
4
+ require 'restrict/error'
5
+ require 'restrict/login_required'
6
+ require 'restrict/access_denied'
7
+ require 'restrict/restriction'
8
+ require 'restrict/gatekeeper'
9
+ require 'restrict/rails/controller'
10
+ require 'restrict/rails/railtie' if defined?(Rails)
11
+
12
+ module Restrict
13
+ # Your code goes here...
14
+ end
@@ -0,0 +1,4 @@
1
+ module Restrict
2
+ class AccessDenied < Error
3
+ end
4
+ end
@@ -0,0 +1,4 @@
1
+ module Restrict
2
+ class Error < StandardError
3
+ end
4
+ end
@@ -0,0 +1,27 @@
1
+ module Restrict
2
+ class Gatekeeper
3
+ def eye(controller)
4
+ restriction = current_restriction(controller)
5
+ restriction and handle_restriction(restriction, controller)
6
+ end
7
+
8
+ private
9
+
10
+ def handle_restriction(restriction, controller)
11
+ controller.current_user or raise Restrict::LoginRequired
12
+
13
+ if restriction.allow_if
14
+ unless controller.__send__(restriction.allow_if)
15
+ raise Restrict::AccessDenied, reason: restriction
16
+ end
17
+ end
18
+ end
19
+
20
+ def current_restriction(controller)
21
+ controller.restrictions or return
22
+ controller.restrictions.find do |restriction|
23
+ restriction.restricts?(controller.action_name)
24
+ end
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,4 @@
1
+ module Restrict
2
+ class LoginRequired < Error
3
+ end
4
+ end
@@ -0,0 +1,26 @@
1
+ module Restrict
2
+ module Rails
3
+ module Controller
4
+ extend ActiveSupport::Concern
5
+
6
+ included do
7
+ cattr_accessor :restrictions
8
+ self.restrictions ||= []
9
+ before_filter :invoke_gatekeeper
10
+ end
11
+
12
+ module ClassMethods
13
+ def restrict(*args)
14
+ self.restrictions ||= []
15
+ restrictions << Restrict::Restriction.new(*args)
16
+ end
17
+ end
18
+
19
+ private
20
+
21
+ def invoke_gatekeeper
22
+ Restrict::Gatekeeper.new.eye(self)
23
+ end
24
+ end
25
+ end
26
+ end
@@ -0,0 +1,9 @@
1
+ module Restrict
2
+ module Rails
3
+ class Railtie < ::Rails::Railtie
4
+ initializer 'restrict.add_controller_extension' do
5
+ ActionController::Base.send :include, Restrict::Rails::Controller
6
+ end
7
+ end
8
+ end
9
+ end
@@ -0,0 +1,17 @@
1
+ module Restrict
2
+ class Restriction
3
+ attr_accessor :actions, :role, :allow_if
4
+
5
+ def initialize(*args)
6
+ options = args.extract_options!
7
+ @role = options[:role]
8
+ @allow_if = options[:allow_if]
9
+ @actions = args
10
+ actions.empty? and raise ArgumentError, "expected actions to restrict, but got #{actions.inspect}"
11
+ end
12
+
13
+ def restricts?(action_name)
14
+ actions.include?(action_name.to_sym)
15
+ end
16
+ end
17
+ end
@@ -0,0 +1,44 @@
1
+ RSpec::Matchers.define :have_restriction_on do |given_action_name|
2
+ match do |given_controller|
3
+ @given_action_name = given_action_name
4
+ @given_controller = given_controller
5
+
6
+ @restriction = given_controller.restrictions.find do |restriction|
7
+ restriction.restricts?(given_action_name)
8
+ end
9
+
10
+ if @restriction
11
+ if @given_allow_if
12
+ @restriction.allow_if == @given_allow_if
13
+ else
14
+ true
15
+ end
16
+ else
17
+ false
18
+ end
19
+ end
20
+
21
+ chain :with_allow_if do |given_allow_if|
22
+ @given_allow_if = given_allow_if
23
+ end
24
+
25
+ failure_message do |actual|
26
+ if @restriction && @given_allow_if
27
+ "Expected restriction to call #{@given_allow_if.inspect}, but calls #{@restriction.allow_if.inspect}"
28
+ else
29
+ "Expected to have restriction on #{@given_action_name}, but was not found in #{@given_controller.restrictions.inspect}"
30
+ end
31
+ end
32
+
33
+ failure_message_when_negated do |actual|
34
+ if @given_allow_if
35
+ "Expected restriction not to call #{@given_allow_if.inspect}, but calls #{@restriction.allow_if.inspect}"
36
+ else
37
+ "Expected not to have restriction on #{@given_action_name}, but was found in #{@given_controller.restrictions.inspect}"
38
+ end
39
+ end
40
+
41
+ def description
42
+ "Checks if a restriction for a given action is defined on the controller"
43
+ end
44
+ end
@@ -0,0 +1,44 @@
1
+ RSpec::Matchers.define :have_restriction_on do |given_action_name|
2
+ match do |given_controller|
3
+ @given_action_name = given_action_name
4
+ @given_controller = given_controller
5
+
6
+ @restriction = given_controller.restrictions.find do |restriction|
7
+ restriction.restricts?(given_action_name)
8
+ end
9
+
10
+ if @restriction
11
+ if @given_allow_if
12
+ @restriction.allow_if == @given_allow_if
13
+ else
14
+ true
15
+ end
16
+ else
17
+ false
18
+ end
19
+ end
20
+
21
+ chain :with_allow_if do |given_allow_if|
22
+ @given_allow_if = given_allow_if
23
+ end
24
+
25
+ failure_message_for_should do |actual|
26
+ if @restriction && @given_allow_if
27
+ "Expected restriction to call #{@given_allow_if.inspect}, but calls #{@restriction.allow_if.inspect}"
28
+ else
29
+ "Expected to have restriction on #{@given_action_name}, but was not found in #{@given_controller.restrictions.inspect}"
30
+ end
31
+ end
32
+
33
+ failure_message_for_should_not do |actual|
34
+ if @given_allow_if
35
+ "Expected restriction not to call #{@given_allow_if.inspect}, but calls #{@restriction.allow_if.inspect}"
36
+ else
37
+ "Expected not to have restriction on #{@given_action_name}, but was found in #{@given_controller.restrictions.inspect}"
38
+ end
39
+ end
40
+
41
+ def description
42
+ "Checks if a restriction for a given action is defined on the controller"
43
+ end
44
+ end
@@ -0,0 +1,3 @@
1
+ module Restrict
2
+ VERSION = "0.0.2"
3
+ end
data/restrict.gemspec ADDED
@@ -0,0 +1,29 @@
1
+ # coding: utf-8
2
+ lib = File.expand_path('../lib', __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require 'restrict/version'
5
+
6
+ Gem::Specification.new do |spec|
7
+ spec.name = "restrict"
8
+ spec.version = Restrict::VERSION
9
+ spec.authors = ["Johannes Opper"]
10
+ spec.email = ["johannes.opper@gmail.com"]
11
+ spec.summary = %q{Simple access control dsl for controllers.}
12
+ spec.description = %q{Simple access control dsl for controllers}
13
+ spec.homepage = "https://github.com/xijo/restrict"
14
+ spec.license = "WTFPL"
15
+
16
+ spec.files = `git ls-files`.split($/)
17
+ spec.executables = spec.files.grep(%r{^bin/}) { |f| File.basename(f) }
18
+ spec.test_files = spec.files.grep(%r{^(test|spec|features)/})
19
+ spec.require_paths = ["lib"]
20
+
21
+ spec.add_dependency 'rails', '> 3.0'
22
+
23
+ spec.add_development_dependency 'bundler', '~> 1.5'
24
+ spec.add_development_dependency 'rspec'
25
+ spec.add_development_dependency 'simplecov'
26
+ spec.add_development_dependency 'rake'
27
+ spec.add_development_dependency 'byebug'
28
+ spec.add_development_dependency 'codeclimate-test-reporter'
29
+ end
@@ -0,0 +1,67 @@
1
+ require 'spec_helper'
2
+
3
+ describe Restrict::Gatekeeper do
4
+
5
+ let(:gatekeeper) { Restrict::Gatekeeper.new }
6
+ let(:controller) { ExampleController.new }
7
+ let(:user) { FakeUser.new }
8
+
9
+ before { controller.action_name = 'edit' }
10
+
11
+ describe '#eye' do
12
+ context 'without restriction' do
13
+ it 'grants anonymous access' do
14
+ expect { gatekeeper.eye(controller) }.not_to raise_error
15
+ end
16
+
17
+ it 'grants user access' do
18
+ controller.current_user = user
19
+ expect { gatekeeper.eye(controller) }.not_to raise_error
20
+ end
21
+ end
22
+
23
+ context 'with plain restriction' do
24
+ before { controller.class.restrict :edit }
25
+
26
+ it 'denies anonymous access' do
27
+ expect { gatekeeper.eye(controller) }.to raise_error(Restrict::LoginRequired)
28
+ end
29
+
30
+ it 'grants user access' do
31
+ controller.current_user = user
32
+ expect { gatekeeper.eye(controller) }.not_to raise_error
33
+ end
34
+ end
35
+
36
+ context 'with conditional restriction' do
37
+ before do
38
+ controller.class.restrict :action1, allow_if: :missing
39
+ controller.class.restrict :action2, allow_if: :falsy
40
+ controller.class.restrict :action3, allow_if: :truthy
41
+ end
42
+
43
+ it 'raises on missing method' do
44
+ controller.current_user = user
45
+ controller.action_name = 'action1'
46
+ expect { gatekeeper.eye(controller) }.to raise_error(NoMethodError)
47
+ end
48
+
49
+ it 'denies anonymous access' do
50
+ controller.action_name = 'action1'
51
+ expect { gatekeeper.eye(controller) }.to raise_error(Restrict::LoginRequired)
52
+ end
53
+
54
+ it 'denies access on falsy return value' do
55
+ controller.current_user = user
56
+ controller.action_name = 'action2'
57
+ expect { gatekeeper.eye(controller) }.to raise_error(Restrict::AccessDenied)
58
+ end
59
+
60
+ it 'grants access on truthy return value' do
61
+ controller.current_user = user
62
+ controller.action_name = 'action3'
63
+ expect { gatekeeper.eye(controller) }.not_to raise_error
64
+ end
65
+ end
66
+ end
67
+ end
@@ -0,0 +1,35 @@
1
+ require 'spec_helper'
2
+
3
+ describe Restrict::Rails::Controller do
4
+
5
+ let(:controller) { ExampleController.new }
6
+
7
+ before do
8
+ controller.class.restrict :index
9
+ controller.class.restrict :show, allow_if: :access_allowed?
10
+ end
11
+
12
+ describe '#restrict' do
13
+ it 'builds and adds a plain restriction' do
14
+ expect(controller).to have_restriction_on(:index)
15
+ end
16
+
17
+ it 'builds and adds a conditional restriction' do
18
+ expect(controller).to have_restriction_on(:show).with_allow_if(:access_allowed?)
19
+ end
20
+ end
21
+
22
+ describe '#included' do
23
+ it 'adds the before filter' do
24
+ expect(controller.before_filters).to include :invoke_gatekeeper
25
+ end
26
+ end
27
+
28
+ describe '#invoke_gatekeeper' do
29
+ it 'builds and calls a gatekeeper for the controller' do
30
+ expect_any_instance_of(Restrict::Gatekeeper).to receive(:eye).with(controller)
31
+ controller.__send__ :invoke_gatekeeper
32
+ end
33
+ end
34
+
35
+ end
@@ -0,0 +1,36 @@
1
+ require 'spec_helper'
2
+
3
+ describe Restrict::Restriction do
4
+ let(:restriction) { Restrict::Restriction.new(:show, :edit, role: :manager) }
5
+
6
+ describe '#initialize' do
7
+ it 'knows about its actions' do
8
+ expect(restriction.actions).to eq [:show, :edit]
9
+ end
10
+
11
+ it 'raises an error if no actions were given' do
12
+ expect { Restrict::Restriction.new }.to raise_error(ArgumentError)
13
+ end
14
+ end
15
+
16
+ describe '#restricts?' do
17
+ it 'returns true if the given action is contained' do
18
+ expect(restriction).to be_restricts(:show)
19
+ end
20
+
21
+ it 'returns false if the given action name is not contained' do
22
+ expect(restriction).not_to be_restricts(:index)
23
+ end
24
+ end
25
+
26
+ describe '#role' do
27
+ it 'returns the role name if given' do
28
+ expect(restriction.role).to eq :manager
29
+ end
30
+
31
+ it 'returns nil if non was given' do
32
+ expect(Restrict::Restriction.new(:foo).role).to be_nil
33
+ end
34
+ end
35
+
36
+ end
@@ -0,0 +1,84 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'have_restriction_on' do
4
+ let(:controller) { ExampleController.new }
5
+
6
+ # before do
7
+ # controller.class.restrict :index
8
+ # controller.class.restrict :show, allow_if: :access_allowed?
9
+ # end
10
+
11
+
12
+ context 'without restrictions' do
13
+ it 'matcher fails' do
14
+ expect {
15
+ expect(controller).to have_restriction_on(:show)
16
+ }.to raise_error RSpec::Expectations::ExpectationNotMetError
17
+ end
18
+
19
+ it 'negated matcher passes' do
20
+ expect(controller).not_to have_restriction_on(:show)
21
+ end
22
+ end
23
+
24
+ context 'with plain restriction' do
25
+ before { controller.class.restrict :show }
26
+
27
+ it 'matcher passes' do
28
+ expect(controller).to have_restriction_on(:show)
29
+ end
30
+
31
+ it 'wrong matcher fails' do
32
+ expect {
33
+ expect(controller).to have_restriction_on(:index)
34
+ }.to raise_error RSpec::Expectations::ExpectationNotMetError
35
+ end
36
+
37
+ it 'negated matcher fails' do
38
+ expect {
39
+ expect(controller).not_to have_restriction_on(:show)
40
+ }.to raise_error RSpec::Expectations::ExpectationNotMetError
41
+ end
42
+
43
+ it 'matcher conditional chain fails' do
44
+ expect {
45
+ expect(controller).to have_restriction_on(:show).with_allow_if(:something)
46
+ }.to raise_error RSpec::Expectations::ExpectationNotMetError
47
+ end
48
+
49
+ it 'negated matcher with conditional chain passes' do
50
+ expect(controller).not_to have_restriction_on(:show).with_allow_if(:something)
51
+ end
52
+ end
53
+
54
+ context 'with conditional restriction' do
55
+ before { controller.class.restrict :show, allow_if: :something }
56
+
57
+ it 'matcher passes' do
58
+ expect(controller).to have_restriction_on(:show)
59
+ end
60
+
61
+ it 'wrong matcher fails' do
62
+ expect {
63
+ expect(controller).to have_restriction_on(:index)
64
+ }.to raise_error RSpec::Expectations::ExpectationNotMetError
65
+ end
66
+
67
+ it 'negated matcher fails' do
68
+ expect {
69
+ expect(controller).not_to have_restriction_on(:show)
70
+ }.to raise_error RSpec::Expectations::ExpectationNotMetError
71
+ end
72
+
73
+ it 'matcher conditional chain passes' do
74
+ expect(controller).to have_restriction_on(:show).with_allow_if(:something)
75
+ end
76
+
77
+ it 'negated matcher with conditional chain passes' do
78
+ expect {
79
+ expect(controller).not_to have_restriction_on(:show).with_allow_if(:something)
80
+ }.to raise_error RSpec::Expectations::ExpectationNotMetError
81
+ end
82
+ end
83
+
84
+ end
@@ -0,0 +1,46 @@
1
+ require 'codeclimate-test-reporter'
2
+ CodeClimate::TestReporter.start
3
+
4
+ require 'simplecov'
5
+ require 'byebug'
6
+
7
+ SimpleCov.profiles.define 'gem' do
8
+ add_filter '/spec/'
9
+ add_filter '/autotest/'
10
+ add_group 'Libraries', '/lib/'
11
+ end
12
+ SimpleCov.start 'gem'
13
+
14
+ require 'restrict'
15
+ require 'restrict/rspec/matcher'
16
+
17
+ RSpec.configure do |config|
18
+ config.after do
19
+ ExampleController.restrictions = []
20
+ end
21
+ end
22
+
23
+ # Mimics the behavior of ActionController::Base
24
+ class FakeController
25
+ attr_accessor :action_name, :current_user
26
+ cattr_accessor :before_filters
27
+
28
+ def self.before_filter(filter)
29
+ self.before_filters ||= []
30
+ before_filters << filter
31
+ end
32
+ end
33
+
34
+ FakeUser = Struct.new(:foo)
35
+
36
+ class ExampleController < FakeController
37
+ include Restrict::Rails::Controller
38
+
39
+ def falsy
40
+ false
41
+ end
42
+
43
+ def truthy
44
+ true
45
+ end
46
+ end
metadata ADDED
@@ -0,0 +1,172 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: restrict
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.0.2
5
+ platform: ruby
6
+ authors:
7
+ - Johannes Opper
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2014-08-23 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: rails
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - ">"
18
+ - !ruby/object:Gem::Version
19
+ version: '3.0'
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - ">"
25
+ - !ruby/object:Gem::Version
26
+ version: '3.0'
27
+ - !ruby/object:Gem::Dependency
28
+ name: bundler
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '1.5'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '1.5'
41
+ - !ruby/object:Gem::Dependency
42
+ name: rspec
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - ">="
46
+ - !ruby/object:Gem::Version
47
+ version: '0'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - ">="
53
+ - !ruby/object:Gem::Version
54
+ version: '0'
55
+ - !ruby/object:Gem::Dependency
56
+ name: simplecov
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - ">="
60
+ - !ruby/object:Gem::Version
61
+ version: '0'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - ">="
67
+ - !ruby/object:Gem::Version
68
+ version: '0'
69
+ - !ruby/object:Gem::Dependency
70
+ name: rake
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ">="
74
+ - !ruby/object:Gem::Version
75
+ version: '0'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - ">="
81
+ - !ruby/object:Gem::Version
82
+ version: '0'
83
+ - !ruby/object:Gem::Dependency
84
+ name: byebug
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - ">="
88
+ - !ruby/object:Gem::Version
89
+ version: '0'
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - ">="
95
+ - !ruby/object:Gem::Version
96
+ version: '0'
97
+ - !ruby/object:Gem::Dependency
98
+ name: codeclimate-test-reporter
99
+ requirement: !ruby/object:Gem::Requirement
100
+ requirements:
101
+ - - ">="
102
+ - !ruby/object:Gem::Version
103
+ version: '0'
104
+ type: :development
105
+ prerelease: false
106
+ version_requirements: !ruby/object:Gem::Requirement
107
+ requirements:
108
+ - - ">="
109
+ - !ruby/object:Gem::Version
110
+ version: '0'
111
+ description: Simple access control dsl for controllers
112
+ email:
113
+ - johannes.opper@gmail.com
114
+ executables: []
115
+ extensions: []
116
+ extra_rdoc_files: []
117
+ files:
118
+ - ".gitignore"
119
+ - ".rspec"
120
+ - ".travis.yml"
121
+ - CHANGELOG.md
122
+ - Gemfile
123
+ - LICENSE.txt
124
+ - README.md
125
+ - Rakefile
126
+ - lib/restrict.rb
127
+ - lib/restrict/access_denied.rb
128
+ - lib/restrict/error.rb
129
+ - lib/restrict/gatekeeper.rb
130
+ - lib/restrict/login_required.rb
131
+ - lib/restrict/rails/controller.rb
132
+ - lib/restrict/rails/railtie.rb
133
+ - lib/restrict/restriction.rb
134
+ - lib/restrict/rspec/matcher.rb
135
+ - lib/restrict/rspec/matcher_rspec2.rb
136
+ - lib/restrict/version.rb
137
+ - restrict.gemspec
138
+ - spec/lib/restrict/gatekeeper_spec.rb
139
+ - spec/lib/restrict/rails/controller_spec.rb
140
+ - spec/lib/restrict/restriction_spec.rb
141
+ - spec/lib/restrict/rspec/matcher_spec.rb
142
+ - spec/spec_helper.rb
143
+ homepage: https://github.com/xijo/restrict
144
+ licenses:
145
+ - WTFPL
146
+ metadata: {}
147
+ post_install_message:
148
+ rdoc_options: []
149
+ require_paths:
150
+ - lib
151
+ required_ruby_version: !ruby/object:Gem::Requirement
152
+ requirements:
153
+ - - ">="
154
+ - !ruby/object:Gem::Version
155
+ version: '0'
156
+ required_rubygems_version: !ruby/object:Gem::Requirement
157
+ requirements:
158
+ - - ">="
159
+ - !ruby/object:Gem::Version
160
+ version: '0'
161
+ requirements: []
162
+ rubyforge_project:
163
+ rubygems_version: 2.2.2
164
+ signing_key:
165
+ specification_version: 4
166
+ summary: Simple access control dsl for controllers.
167
+ test_files:
168
+ - spec/lib/restrict/gatekeeper_spec.rb
169
+ - spec/lib/restrict/rails/controller_spec.rb
170
+ - spec/lib/restrict/restriction_spec.rb
171
+ - spec/lib/restrict/rspec/matcher_spec.rb
172
+ - spec/spec_helper.rb