signet 0.11.0 → 0.12.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (38) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +47 -36
  3. data/Gemfile +5 -4
  4. data/README.md +4 -5
  5. data/Rakefile +86 -37
  6. data/lib/signet.rb +17 -14
  7. data/lib/signet/errors.rb +4 -4
  8. data/lib/signet/oauth_1.rb +128 -153
  9. data/lib/signet/oauth_1/client.rb +309 -343
  10. data/lib/signet/oauth_1/credential.rb +40 -37
  11. data/lib/signet/oauth_1/server.rb +197 -203
  12. data/lib/signet/oauth_1/signature_methods/hmac_sha1.rb +11 -10
  13. data/lib/signet/oauth_1/signature_methods/plaintext.rb +8 -7
  14. data/lib/signet/oauth_1/signature_methods/rsa_sha1.rb +11 -11
  15. data/lib/signet/oauth_2.rb +41 -43
  16. data/lib/signet/oauth_2/client.rb +302 -313
  17. data/lib/signet/version.rb +2 -73
  18. data/signet.gemspec +37 -39
  19. data/spec/signet/oauth_1/client_spec.rb +313 -315
  20. data/spec/signet/oauth_1/credential_spec.rb +64 -56
  21. data/spec/signet/oauth_1/server_spec.rb +362 -362
  22. data/spec/signet/oauth_1/signature_methods/hmac_sha1_spec.rb +26 -26
  23. data/spec/signet/oauth_1/signature_methods/plaintext_spec.rb +28 -28
  24. data/spec/signet/oauth_1/signature_methods/rsa_sha1_spec.rb +34 -35
  25. data/spec/signet/oauth_1_spec.rb +527 -524
  26. data/spec/signet/oauth_2/client_spec.rb +612 -576
  27. data/spec/signet/oauth_2_spec.rb +88 -89
  28. data/spec/signet_spec.rb +41 -41
  29. data/spec/spec_helper.rb +7 -7
  30. data/spec/spec_helper_spec.rb +8 -8
  31. metadata +50 -43
  32. data/tasks/clobber.rake +0 -2
  33. data/tasks/gem.rake +0 -34
  34. data/tasks/git.rake +0 -40
  35. data/tasks/metrics.rake +0 -41
  36. data/tasks/spec.rake +0 -34
  37. data/tasks/wiki.rake +0 -38
  38. data/tasks/yard.rake +0 -21
@@ -11,72 +11,72 @@
11
11
  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
12
  # See the License for the specific language governing permissions and
13
13
  # limitations under the License.
14
- require 'spec_helper'
15
- require 'signet/errors'
16
- require 'signet/oauth_2'
14
+ require "spec_helper"
15
+ require "signet/errors"
16
+ require "signet/oauth_2"
17
17
 
18
18
  describe Signet::OAuth2 do
19
19
  # This behavior will almost certainly change in subsequent updates.
20
- describe 'when parsing an Authorization header' do
21
- it 'should correctly handle HTTP Basic auth-scheme' do
20
+ describe "when parsing an Authorization header" do
21
+ it "should correctly handle HTTP Basic auth-scheme" do
22
22
  parameters = Signet::OAuth2.parse_authorization_header(
23
- 'Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW'
24
- ).inject({}) { |h,(k,v)| h[k]=v; h }
25
- expect(parameters['client_id']).to eq 's6BhdRkqt3'
26
- expect(parameters['client_secret']).to eq 'gX1fBat3bV'
23
+ "Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW"
24
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
25
+ expect(parameters["client_id"]).to eq "s6BhdRkqt3"
26
+ expect(parameters["client_secret"]).to eq "gX1fBat3bV"
27
27
  end
28
28
 
29
- it 'should correctly handle OAuth auth-scheme' do
29
+ it "should correctly handle OAuth auth-scheme" do
30
30
  parameters = Signet::OAuth2.parse_authorization_header(
31
- 'OAuth vF9dft4qmT'
32
- ).inject({}) { |h,(k,v)| h[k]=v; h }
33
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
31
+ "OAuth vF9dft4qmT"
32
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
33
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
34
34
  end
35
35
 
36
- it 'should correctly handle OAuth auth-scheme with realm' do
36
+ it "should correctly handle OAuth auth-scheme with realm" do
37
37
  parameters = Signet::OAuth2.parse_authorization_header(
38
38
  'OAuth vF9dft4qmT, realm="http://sp.example.com/"'
39
- ).inject({}) { |h,(k,v)| h[k]=v; h }
40
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
41
- expect(parameters['realm']).to eq 'http://sp.example.com/'
39
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
40
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
41
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
42
42
  end
43
43
 
44
- it 'should correctly handle OAuth auth-scheme with multiple auth-params' do
44
+ it "should correctly handle OAuth auth-scheme with multiple auth-params" do
45
45
  parameters = Signet::OAuth2.parse_authorization_header(
46
46
  'OAuth vF9dft4qmT, first="one", second="two"'
47
- ).inject({}) { |h,(k,v)| h[k]=v; h }
48
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
49
- expect(parameters['first']).to eq 'one'
50
- expect(parameters['second']).to eq 'two'
47
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
48
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
49
+ expect(parameters["first"]).to eq "one"
50
+ expect(parameters["second"]).to eq "two"
51
51
  end
52
52
 
53
- it 'should liberally handle auth-params with single-quoted strings' do
53
+ it "should liberally handle auth-params with single-quoted strings" do
54
54
  parameters = Signet::OAuth2.parse_authorization_header(
55
- 'OAuth vF9dft4qmT, first=\'one\', second=\'two\''
56
- ).inject({}) { |h,(k,v)| h[k]=v; h }
57
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
58
- expect(parameters['first']).to eq 'one'
59
- expect(parameters['second']).to eq 'two'
55
+ "OAuth vF9dft4qmT, first='one', second='two'"
56
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
57
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
58
+ expect(parameters["first"]).to eq "one"
59
+ expect(parameters["second"]).to eq "two"
60
60
  end
61
61
 
62
- it 'should liberally handle auth-params with unquoted strings' do
62
+ it "should liberally handle auth-params with unquoted strings" do
63
63
  parameters = Signet::OAuth2.parse_authorization_header(
64
- 'OAuth vF9dft4qmT, first=one, second=two'
65
- ).inject({}) { |h,(k,v)| h[k]=v; h }
66
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
67
- expect(parameters['first']).to eq 'one'
68
- expect(parameters['second']).to eq 'two'
64
+ "OAuth vF9dft4qmT, first=one, second=two"
65
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
66
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
67
+ expect(parameters["first"]).to eq "one"
68
+ expect(parameters["second"]).to eq "two"
69
69
  end
70
70
 
71
- it 'should not allow unquoted strings that do not match tchar' do
71
+ it "should not allow unquoted strings that do not match tchar" do
72
72
  expect(lambda do
73
73
  parameters = Signet::OAuth2.parse_authorization_header(
74
- 'OAuth vF9dft4qmT, first=one:1'
74
+ "OAuth vF9dft4qmT, first=one:1"
75
75
  )
76
76
  end).to raise_error(Signet::ParseError)
77
77
  end
78
78
 
79
- it 'should not parse non-OAuth auth-schemes' do
79
+ it "should not parse non-OAuth auth-schemes" do
80
80
  expect(lambda do
81
81
  Signet::OAuth2.parse_authorization_header(
82
82
  'AuthSub token="GD32CMCL25aZ-v____8B"'
@@ -86,57 +86,57 @@ describe Signet::OAuth2 do
86
86
  end
87
87
 
88
88
  # This behavior will almost certainly change in subsequent updates.
89
- describe 'when parsing a WWW-Authenticate header' do
90
- it 'should correctly handle OAuth challenge with auth-params' do
89
+ describe "when parsing a WWW-Authenticate header" do
90
+ it "should correctly handle OAuth challenge with auth-params" do
91
91
  parameters = Signet::OAuth2.parse_www_authenticate_header(
92
- 'OAuth realm="http://sp.example.com/", error="expired_token", ' +
92
+ 'OAuth realm="http://sp.example.com/", error="expired_token", ' \
93
93
  'error_description="The access token has expired."'
94
- ).inject({}) { |h,(k,v)| h[k]=v; h }
95
- expect(parameters['realm']).to eq 'http://sp.example.com/'
96
- expect(parameters['error']).to eq 'expired_token'
97
- expect(parameters['error_description']).to eq 'The access token has expired.'
94
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
95
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
96
+ expect(parameters["error"]).to eq "expired_token"
97
+ expect(parameters["error_description"]).to eq "The access token has expired."
98
98
  end
99
99
 
100
- it 'should liberally handle auth-params with single-quoted strings' do
100
+ it "should liberally handle auth-params with single-quoted strings" do
101
101
  parameters = Signet::OAuth2.parse_www_authenticate_header(
102
- 'OAuth realm=\'http://sp.example.com/\', error=\'expired_token\', ' +
103
- 'error_description=\'The access token has expired.\''
104
- ).inject({}) { |h,(k,v)| h[k]=v; h }
105
- expect(parameters['realm']).to eq 'http://sp.example.com/'
106
- expect(parameters['error']).to eq 'expired_token'
107
- expect(parameters['error_description']).to eq 'The access token has expired.'
102
+ "OAuth realm='http://sp.example.com/', error='expired_token', " \
103
+ "error_description='The access token has expired.'"
104
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
105
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
106
+ expect(parameters["error"]).to eq "expired_token"
107
+ expect(parameters["error_description"]).to eq "The access token has expired."
108
108
  end
109
109
 
110
- it 'should liberally handle auth-params with token strings' do
110
+ it "should liberally handle auth-params with token strings" do
111
111
  parameters = Signet::OAuth2.parse_www_authenticate_header(
112
- 'OAuth realm="http://sp.example.com/", error=expired_token, ' +
112
+ 'OAuth realm="http://sp.example.com/", error=expired_token, ' \
113
113
  'error_description="The access token has expired."'
114
- ).inject({}) { |h,(k,v)| h[k]=v; h }
115
- expect(parameters['realm']).to eq 'http://sp.example.com/'
116
- expect(parameters['error']).to eq 'expired_token'
117
- expect(parameters['error_description']).to eq 'The access token has expired.'
114
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
115
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
116
+ expect(parameters["error"]).to eq "expired_token"
117
+ expect(parameters["error_description"]).to eq "The access token has expired."
118
118
  end
119
119
 
120
- it 'should liberally handle out-of-order auth-params' do
120
+ it "should liberally handle out-of-order auth-params" do
121
121
  parameters = Signet::OAuth2.parse_www_authenticate_header(
122
- 'OAuth error_description=\'The access token has expired.\', ' +
123
- 'error=\'expired_token\', realm=\'http://sp.example.com/\''
124
- ).inject({}) { |h,(k,v)| h[k]=v; h }
125
- expect(parameters['realm']).to eq 'http://sp.example.com/'
126
- expect(parameters['error']).to eq 'expired_token'
127
- expect(parameters['error_description']).to eq 'The access token has expired.'
122
+ "OAuth error_description='The access token has expired.', " \
123
+ "error='expired_token', realm='http://sp.example.com/'"
124
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
125
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
126
+ expect(parameters["error"]).to eq "expired_token"
127
+ expect(parameters["error_description"]).to eq "The access token has expired."
128
128
  end
129
129
 
130
- it 'should not allow unquoted strings that do not match tchar' do
130
+ it "should not allow unquoted strings that do not match tchar" do
131
131
  expect(lambda do
132
132
  Signet::OAuth2.parse_www_authenticate_header(
133
- 'OAuth realm=http://sp.example.com/, error=expired_token, ' +
133
+ "OAuth realm=http://sp.example.com/, error=expired_token, " \
134
134
  'error_description="The access token has expired."'
135
135
  )
136
136
  end).to raise_error(Signet::ParseError)
137
137
  end
138
138
 
139
- it 'should not parse non-OAuth challenges' do
139
+ it "should not parse non-OAuth challenges" do
140
140
  expect(lambda do
141
141
  Signet::OAuth2.parse_www_authenticate_header(
142
142
  'AuthSub realm="https://www.google.com/accounts/AuthSubRequest"'
@@ -145,50 +145,49 @@ describe Signet::OAuth2 do
145
145
  end
146
146
  end
147
147
 
148
- describe 'when generating a Basic Authorization header' do
149
- it 'should correctly handle client ID and password pairs' do
148
+ describe "when generating a Basic Authorization header" do
149
+ it "should correctly handle client ID and password pairs" do
150
150
  # Example from OAuth 2 spec
151
151
  expect(Signet::OAuth2.generate_basic_authorization_header(
152
- 's6BhdRkqt3', 'gX1fBat3bV'
153
- )).to eq 'Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW'
152
+ "s6BhdRkqt3", "gX1fBat3bV"
153
+ )).to eq "Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW"
154
154
  end
155
155
 
156
- it 'should correctly encode using the alogrithm given in RFC 2617' do
156
+ it "should correctly encode using the alogrithm given in RFC 2617" do
157
157
  # Example from RFC 2617
158
158
  expect(Signet::OAuth2.generate_basic_authorization_header(
159
- 'Aladdin', 'open sesame'
160
- )).to eq 'Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=='
159
+ "Aladdin", "open sesame"
160
+ )).to eq "Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=="
161
161
  end
162
162
  end
163
163
 
164
- describe 'when parsing a token response body' do
165
-
166
- it 'should correctly handle just an access token' do
164
+ describe "when parsing a token response body" do
165
+ it "should correctly handle just an access token" do
167
166
  expect(Signet::OAuth2.parse_credentials(
168
- '{"access_token": "12345"}',
169
- 'application/json; charset=utf-8'
170
- )).to eq ({"access_token" => "12345"})
167
+ '{"access_token": "12345"}',
168
+ "application/json; charset=utf-8"
169
+ )).to eq ({ "access_token" => "12345" })
171
170
  end
172
171
 
173
- it 'should handle form encoded responses' do
172
+ it "should handle form encoded responses" do
174
173
  expect(Signet::OAuth2.parse_credentials(
175
- 'access_token=12345&expires=1000',
176
- 'application/x-www-form-urlencoded; charset=utf-8'
177
- )).to eq({"access_token" => "12345", "expires" => "1000" })
174
+ "access_token=12345&expires=1000",
175
+ "application/x-www-form-urlencoded; charset=utf-8"
176
+ )).to eq("access_token" => "12345", "expires" => "1000")
178
177
  end
179
178
 
180
- it 'should raise an error for an invalid body' do
179
+ it "should raise an error for an invalid body" do
181
180
  expect(lambda do
182
181
  Signet::OAuth2.parse_credentials(
183
- 'This is not JSON.',
184
- 'application/json'
182
+ "This is not JSON.",
183
+ "application/json"
185
184
  )
186
185
  end).to raise_error(MultiJson::DecodeError)
187
186
  end
188
187
 
189
- it 'should raise an error for a bogus body' do
188
+ it "should raise an error for a bogus body" do
190
189
  expect(lambda do
191
- Signet::OAuth2.parse_credentials(:bogus, 'application/json')
190
+ Signet::OAuth2.parse_credentials :bogus, "application/json"
192
191
  end).to raise_error(TypeError)
193
192
  end
194
193
  end
@@ -11,68 +11,68 @@
11
11
  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
12
  # See the License for the specific language governing permissions and
13
13
  # limitations under the License.
14
- require 'spec_helper'
15
- require 'signet/oauth_2'
14
+ require "spec_helper"
15
+ require "signet/oauth_2"
16
16
 
17
17
  describe Signet do
18
- describe 'when parsing an auth param list' do
19
- it 'should correctly handle commas' do
18
+ describe "when parsing an auth param list" do
19
+ it "should correctly handle commas" do
20
20
  parameters = Signet.parse_auth_param_list(
21
21
  'a="1, 2" , b="3,4",c="5 , 6" ,d="7 ,8"'
22
- ).inject({}) { |h,(k,v)| h[k]=v; h }
23
- expect(parameters['a']).to eq '1, 2'
24
- expect(parameters['b']).to eq '3,4'
25
- expect(parameters['c']).to eq '5 , 6'
26
- expect(parameters['d']).to eq '7 ,8'
22
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
23
+ expect(parameters["a"]).to eq "1, 2"
24
+ expect(parameters["b"]).to eq "3,4"
25
+ expect(parameters["c"]).to eq "5 , 6"
26
+ expect(parameters["d"]).to eq "7 ,8"
27
27
  end
28
28
 
29
- it 'should correctly handle backslash-escaped pairs' do
29
+ it "should correctly handle backslash-escaped pairs" do
30
30
  parameters = Signet.parse_auth_param_list(
31
31
  'token="\t\o\k\e\n" sigalg="\s\i\g\a\l\g" data="\d\a\t\a"'
32
- ).inject({}) { |h,(k,v)| h[k]=v; h }
33
- expect(parameters['token']).to eq 'token'
34
- expect(parameters['sigalg']).to eq 'sigalg'
35
- expect(parameters['data']).to eq 'data'
32
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
33
+ expect(parameters["token"]).to eq "token"
34
+ expect(parameters["sigalg"]).to eq "sigalg"
35
+ expect(parameters["data"]).to eq "data"
36
36
  end
37
37
 
38
- it 'should liberally handle space-separated auth-param lists' do
38
+ it "should liberally handle space-separated auth-param lists" do
39
39
  parameters = Signet.parse_auth_param_list(
40
40
  'token="token" sigalg="sigalg" data="data" sig="sig"'
41
- ).inject({}) { |h,(k,v)| h[k]=v; h }
42
- expect(parameters['token']).to eq 'token'
43
- expect(parameters['sigalg']).to eq 'sigalg'
44
- expect(parameters['data']).to eq 'data'
45
- expect(parameters['sig']).to eq 'sig'
41
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
42
+ expect(parameters["token"]).to eq "token"
43
+ expect(parameters["sigalg"]).to eq "sigalg"
44
+ expect(parameters["data"]).to eq "data"
45
+ expect(parameters["sig"]).to eq "sig"
46
46
  end
47
47
 
48
- it 'should liberally handle single-quoted auth-param lists' do
48
+ it "should liberally handle single-quoted auth-param lists" do
49
49
  parameters = Signet.parse_auth_param_list(
50
- 'token=\'token\' sigalg=\'sigalg\' data=\'data\' sig=\'sig\''
51
- ).inject({}) { |h,(k,v)| h[k]=v; h }
52
- expect(parameters['token']).to eq 'token'
53
- expect(parameters['sigalg']).to eq 'sigalg'
54
- expect(parameters['data']).to eq 'data'
55
- expect(parameters['sig']).to eq 'sig'
50
+ "token='token' sigalg='sigalg' data='data' sig='sig'"
51
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
52
+ expect(parameters["token"]).to eq "token"
53
+ expect(parameters["sigalg"]).to eq "sigalg"
54
+ expect(parameters["data"]).to eq "data"
55
+ expect(parameters["sig"]).to eq "sig"
56
56
  end
57
57
 
58
- it 'should liberally handle unquoted auth-param lists' do
58
+ it "should liberally handle unquoted auth-param lists" do
59
59
  parameters = Signet.parse_auth_param_list(
60
- 'token=token sigalg=sigalg data=data sig=sig'
61
- ).inject({}) { |h,(k,v)| h[k]=v; h }
62
- expect(parameters['token']).to eq 'token'
63
- expect(parameters['sigalg']).to eq 'sigalg'
64
- expect(parameters['data']).to eq 'data'
65
- expect(parameters['sig']).to eq 'sig'
60
+ "token=token sigalg=sigalg data=data sig=sig"
61
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
62
+ expect(parameters["token"]).to eq "token"
63
+ expect(parameters["sigalg"]).to eq "sigalg"
64
+ expect(parameters["data"]).to eq "data"
65
+ expect(parameters["sig"]).to eq "sig"
66
66
  end
67
67
 
68
- it 'should liberally handle auth-param lists with empty sections' do
68
+ it "should liberally handle auth-param lists with empty sections" do
69
69
  parameters = Signet.parse_auth_param_list(
70
- 'token=token, , sigalg=sigalg,, data=data, sig=sig'
71
- ).inject({}) { |h,(k,v)| h[k]=v; h }
72
- expect(parameters['token']).to eq 'token'
73
- expect(parameters['sigalg']).to eq 'sigalg'
74
- expect(parameters['data']).to eq 'data'
75
- expect(parameters['sig']).to eq 'sig'
70
+ "token=token, , sigalg=sigalg,, data=data, sig=sig"
71
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
72
+ expect(parameters["token"]).to eq "token"
73
+ expect(parameters["sigalg"]).to eq "sigalg"
74
+ expect(parameters["data"]).to eq "data"
75
+ expect(parameters["sig"]).to eq "sig"
76
76
  end
77
77
  end
78
78
  end
@@ -1,10 +1,10 @@
1
- $:.uniq!
1
+ $LOAD_PATH.uniq!
2
2
 
3
- require 'rubygems'
4
- require 'signet'
5
- require 'rspec'
6
- require 'simplecov'
7
- require 'faraday'
3
+ require "rubygems"
4
+ require "signet"
5
+ require "rspec"
6
+ require "simplecov"
7
+ require "faraday"
8
8
 
9
9
  SimpleCov.start if ENV["COVERAGE"]
10
- Faraday::Adapter.load_middleware(:test)
10
+ Faraday::Adapter.load_middleware :test
@@ -1,16 +1,16 @@
1
- RSpec.describe 'spec_helper.rb' do
2
- let(:spec_dir) { File.expand_path(File.dirname(__FILE__)) }
3
- let(:root_dir) { File.expand_path(File.join(spec_dir, '..')) }
4
- let(:lib_dir) { File.expand_path(File.join(root_dir, 'lib')) }
1
+ RSpec.describe "spec_helper.rb" do
2
+ let(:spec_dir) { __dir__ }
3
+ let(:root_dir) { File.expand_path File.join(spec_dir, "..") }
4
+ let(:lib_dir) { File.expand_path File.join(root_dir, "lib") }
5
5
 
6
- describe 'spec_dir' do
7
- it 'is already in $LOAD_PATH' do
6
+ describe "spec_dir" do
7
+ it "is already in $LOAD_PATH" do
8
8
  expect($LOAD_PATH).to include spec_dir
9
9
  end
10
10
  end
11
11
 
12
- describe 'lib_dir' do
13
- it 'is already in $LOAD_PATH' do
12
+ describe "lib_dir" do
13
+ it "is already in $LOAD_PATH" do
14
14
  expect($LOAD_PATH).to include lib_dir
15
15
  end
16
16
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: signet
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.11.0
4
+ version: 0.12.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Bob Aman
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2018-10-10 00:00:00.000000000 Z
12
+ date: 2019-10-09 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: addressable
@@ -39,20 +39,6 @@ dependencies:
39
39
  - - "~>"
40
40
  - !ruby/object:Gem::Version
41
41
  version: '0.9'
42
- - !ruby/object:Gem::Dependency
43
- name: multi_json
44
- requirement: !ruby/object:Gem::Requirement
45
- requirements:
46
- - - "~>"
47
- - !ruby/object:Gem::Version
48
- version: '1.10'
49
- type: :runtime
50
- prerelease: false
51
- version_requirements: !ruby/object:Gem::Requirement
52
- requirements:
53
- - - "~>"
54
- - !ruby/object:Gem::Version
55
- version: '1.10'
56
42
  - !ruby/object:Gem::Dependency
57
43
  name: jwt
58
44
  requirement: !ruby/object:Gem::Requirement
@@ -74,53 +60,47 @@ dependencies:
74
60
  - !ruby/object:Gem::Version
75
61
  version: '3.0'
76
62
  - !ruby/object:Gem::Dependency
77
- name: rake
63
+ name: multi_json
78
64
  requirement: !ruby/object:Gem::Requirement
79
65
  requirements:
80
66
  - - "~>"
81
67
  - !ruby/object:Gem::Version
82
- version: '12.0'
83
- type: :development
68
+ version: '1.10'
69
+ type: :runtime
84
70
  prerelease: false
85
71
  version_requirements: !ruby/object:Gem::Requirement
86
72
  requirements:
87
73
  - - "~>"
88
74
  - !ruby/object:Gem::Version
89
- version: '12.0'
75
+ version: '1.10'
90
76
  - !ruby/object:Gem::Dependency
91
- name: yard
77
+ name: google-style
92
78
  requirement: !ruby/object:Gem::Requirement
93
79
  requirements:
94
80
  - - "~>"
95
81
  - !ruby/object:Gem::Version
96
- version: '0.9'
97
- - - ">="
98
- - !ruby/object:Gem::Version
99
- version: 0.9.12
82
+ version: '0.3'
100
83
  type: :development
101
84
  prerelease: false
102
85
  version_requirements: !ruby/object:Gem::Requirement
103
86
  requirements:
104
87
  - - "~>"
105
88
  - !ruby/object:Gem::Version
106
- version: '0.9'
107
- - - ">="
108
- - !ruby/object:Gem::Version
109
- version: 0.9.12
89
+ version: '0.3'
110
90
  - !ruby/object:Gem::Dependency
111
- name: rspec
91
+ name: kramdown
112
92
  requirement: !ruby/object:Gem::Requirement
113
93
  requirements:
114
94
  - - "~>"
115
95
  - !ruby/object:Gem::Version
116
- version: '3.1'
96
+ version: '1.5'
117
97
  type: :development
118
98
  prerelease: false
119
99
  version_requirements: !ruby/object:Gem::Requirement
120
100
  requirements:
121
101
  - - "~>"
122
102
  - !ruby/object:Gem::Version
123
- version: '3.1'
103
+ version: '1.5'
124
104
  - !ruby/object:Gem::Dependency
125
105
  name: launchy
126
106
  requirement: !ruby/object:Gem::Requirement
@@ -136,19 +116,33 @@ dependencies:
136
116
  - !ruby/object:Gem::Version
137
117
  version: '2.4'
138
118
  - !ruby/object:Gem::Dependency
139
- name: kramdown
119
+ name: rake
140
120
  requirement: !ruby/object:Gem::Requirement
141
121
  requirements:
142
122
  - - "~>"
143
123
  - !ruby/object:Gem::Version
144
- version: '1.5'
124
+ version: '12.0'
145
125
  type: :development
146
126
  prerelease: false
147
127
  version_requirements: !ruby/object:Gem::Requirement
148
128
  requirements:
149
129
  - - "~>"
150
130
  - !ruby/object:Gem::Version
151
- version: '1.5'
131
+ version: '12.0'
132
+ - !ruby/object:Gem::Dependency
133
+ name: rspec
134
+ requirement: !ruby/object:Gem::Requirement
135
+ requirements:
136
+ - - "~>"
137
+ - !ruby/object:Gem::Version
138
+ version: '3.1'
139
+ type: :development
140
+ prerelease: false
141
+ version_requirements: !ruby/object:Gem::Requirement
142
+ requirements:
143
+ - - "~>"
144
+ - !ruby/object:Gem::Version
145
+ version: '3.1'
152
146
  - !ruby/object:Gem::Dependency
153
147
  name: simplecov
154
148
  requirement: !ruby/object:Gem::Requirement
@@ -163,6 +157,26 @@ dependencies:
163
157
  - - "~>"
164
158
  - !ruby/object:Gem::Version
165
159
  version: '0.9'
160
+ - !ruby/object:Gem::Dependency
161
+ name: yard
162
+ requirement: !ruby/object:Gem::Requirement
163
+ requirements:
164
+ - - "~>"
165
+ - !ruby/object:Gem::Version
166
+ version: '0.9'
167
+ - - ">="
168
+ - !ruby/object:Gem::Version
169
+ version: 0.9.12
170
+ type: :development
171
+ prerelease: false
172
+ version_requirements: !ruby/object:Gem::Requirement
173
+ requirements:
174
+ - - "~>"
175
+ - !ruby/object:Gem::Version
176
+ version: '0.9'
177
+ - - ">="
178
+ - !ruby/object:Gem::Version
179
+ version: 0.9.12
166
180
  description: 'Signet is an OAuth 1.0 / OAuth 2.0 implementation.
167
181
 
168
182
  '
@@ -203,13 +217,6 @@ files:
203
217
  - spec/spec.opts
204
218
  - spec/spec_helper.rb
205
219
  - spec/spec_helper_spec.rb
206
- - tasks/clobber.rake
207
- - tasks/gem.rake
208
- - tasks/git.rake
209
- - tasks/metrics.rake
210
- - tasks/spec.rake
211
- - tasks/wiki.rake
212
- - tasks/yard.rake
213
220
  - website/index.html
214
221
  homepage: https://github.com/google/signet/
215
222
  licenses:
@@ -228,7 +235,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
228
235
  requirements:
229
236
  - - ">="
230
237
  - !ruby/object:Gem::Version
231
- version: 1.9.3
238
+ version: 2.4.0
232
239
  required_rubygems_version: !ruby/object:Gem::Requirement
233
240
  requirements:
234
241
  - - ">="