signet 0.11.0 → 0.14.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +51 -15
  3. data/Gemfile +5 -4
  4. data/README.md +4 -6
  5. data/Rakefile +107 -37
  6. data/lib/signet.rb +17 -14
  7. data/lib/signet/errors.rb +4 -4
  8. data/lib/signet/oauth_1.rb +129 -154
  9. data/lib/signet/oauth_1/client.rb +309 -343
  10. data/lib/signet/oauth_1/credential.rb +40 -37
  11. data/lib/signet/oauth_1/server.rb +197 -203
  12. data/lib/signet/oauth_1/signature_methods/hmac_sha1.rb +11 -10
  13. data/lib/signet/oauth_1/signature_methods/plaintext.rb +8 -7
  14. data/lib/signet/oauth_1/signature_methods/rsa_sha1.rb +11 -11
  15. data/lib/signet/oauth_2.rb +41 -43
  16. data/lib/signet/oauth_2/client.rb +328 -313
  17. data/lib/signet/version.rb +2 -73
  18. data/signet.gemspec +37 -39
  19. data/spec/signet/oauth_1/client_spec.rb +313 -315
  20. data/spec/signet/oauth_1/credential_spec.rb +64 -56
  21. data/spec/signet/oauth_1/server_spec.rb +362 -362
  22. data/spec/signet/oauth_1/signature_methods/hmac_sha1_spec.rb +26 -26
  23. data/spec/signet/oauth_1/signature_methods/plaintext_spec.rb +28 -28
  24. data/spec/signet/oauth_1/signature_methods/rsa_sha1_spec.rb +34 -35
  25. data/spec/signet/oauth_1_spec.rb +553 -524
  26. data/spec/signet/oauth_2/client_spec.rb +652 -576
  27. data/spec/signet/oauth_2_spec.rb +88 -89
  28. data/spec/signet_spec.rb +41 -41
  29. data/spec/spec_helper.rb +7 -7
  30. data/spec/spec_helper_spec.rb +8 -8
  31. metadata +64 -52
  32. data/tasks/clobber.rake +0 -2
  33. data/tasks/gem.rake +0 -34
  34. data/tasks/git.rake +0 -40
  35. data/tasks/metrics.rake +0 -41
  36. data/tasks/spec.rake +0 -34
  37. data/tasks/wiki.rake +0 -38
  38. data/tasks/yard.rake +0 -21
@@ -11,72 +11,72 @@
11
11
  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
12
  # See the License for the specific language governing permissions and
13
13
  # limitations under the License.
14
- require 'spec_helper'
15
- require 'signet/errors'
16
- require 'signet/oauth_2'
14
+ require "spec_helper"
15
+ require "signet/errors"
16
+ require "signet/oauth_2"
17
17
 
18
18
  describe Signet::OAuth2 do
19
19
  # This behavior will almost certainly change in subsequent updates.
20
- describe 'when parsing an Authorization header' do
21
- it 'should correctly handle HTTP Basic auth-scheme' do
20
+ describe "when parsing an Authorization header" do
21
+ it "should correctly handle HTTP Basic auth-scheme" do
22
22
  parameters = Signet::OAuth2.parse_authorization_header(
23
- 'Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW'
24
- ).inject({}) { |h,(k,v)| h[k]=v; h }
25
- expect(parameters['client_id']).to eq 's6BhdRkqt3'
26
- expect(parameters['client_secret']).to eq 'gX1fBat3bV'
23
+ "Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW"
24
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
25
+ expect(parameters["client_id"]).to eq "s6BhdRkqt3"
26
+ expect(parameters["client_secret"]).to eq "gX1fBat3bV"
27
27
  end
28
28
 
29
- it 'should correctly handle OAuth auth-scheme' do
29
+ it "should correctly handle OAuth auth-scheme" do
30
30
  parameters = Signet::OAuth2.parse_authorization_header(
31
- 'OAuth vF9dft4qmT'
32
- ).inject({}) { |h,(k,v)| h[k]=v; h }
33
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
31
+ "OAuth vF9dft4qmT"
32
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
33
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
34
34
  end
35
35
 
36
- it 'should correctly handle OAuth auth-scheme with realm' do
36
+ it "should correctly handle OAuth auth-scheme with realm" do
37
37
  parameters = Signet::OAuth2.parse_authorization_header(
38
38
  'OAuth vF9dft4qmT, realm="http://sp.example.com/"'
39
- ).inject({}) { |h,(k,v)| h[k]=v; h }
40
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
41
- expect(parameters['realm']).to eq 'http://sp.example.com/'
39
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
40
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
41
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
42
42
  end
43
43
 
44
- it 'should correctly handle OAuth auth-scheme with multiple auth-params' do
44
+ it "should correctly handle OAuth auth-scheme with multiple auth-params" do
45
45
  parameters = Signet::OAuth2.parse_authorization_header(
46
46
  'OAuth vF9dft4qmT, first="one", second="two"'
47
- ).inject({}) { |h,(k,v)| h[k]=v; h }
48
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
49
- expect(parameters['first']).to eq 'one'
50
- expect(parameters['second']).to eq 'two'
47
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
48
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
49
+ expect(parameters["first"]).to eq "one"
50
+ expect(parameters["second"]).to eq "two"
51
51
  end
52
52
 
53
- it 'should liberally handle auth-params with single-quoted strings' do
53
+ it "should liberally handle auth-params with single-quoted strings" do
54
54
  parameters = Signet::OAuth2.parse_authorization_header(
55
- 'OAuth vF9dft4qmT, first=\'one\', second=\'two\''
56
- ).inject({}) { |h,(k,v)| h[k]=v; h }
57
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
58
- expect(parameters['first']).to eq 'one'
59
- expect(parameters['second']).to eq 'two'
55
+ "OAuth vF9dft4qmT, first='one', second='two'"
56
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
57
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
58
+ expect(parameters["first"]).to eq "one"
59
+ expect(parameters["second"]).to eq "two"
60
60
  end
61
61
 
62
- it 'should liberally handle auth-params with unquoted strings' do
62
+ it "should liberally handle auth-params with unquoted strings" do
63
63
  parameters = Signet::OAuth2.parse_authorization_header(
64
- 'OAuth vF9dft4qmT, first=one, second=two'
65
- ).inject({}) { |h,(k,v)| h[k]=v; h }
66
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
67
- expect(parameters['first']).to eq 'one'
68
- expect(parameters['second']).to eq 'two'
64
+ "OAuth vF9dft4qmT, first=one, second=two"
65
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
66
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
67
+ expect(parameters["first"]).to eq "one"
68
+ expect(parameters["second"]).to eq "two"
69
69
  end
70
70
 
71
- it 'should not allow unquoted strings that do not match tchar' do
71
+ it "should not allow unquoted strings that do not match tchar" do
72
72
  expect(lambda do
73
73
  parameters = Signet::OAuth2.parse_authorization_header(
74
- 'OAuth vF9dft4qmT, first=one:1'
74
+ "OAuth vF9dft4qmT, first=one:1"
75
75
  )
76
76
  end).to raise_error(Signet::ParseError)
77
77
  end
78
78
 
79
- it 'should not parse non-OAuth auth-schemes' do
79
+ it "should not parse non-OAuth auth-schemes" do
80
80
  expect(lambda do
81
81
  Signet::OAuth2.parse_authorization_header(
82
82
  'AuthSub token="GD32CMCL25aZ-v____8B"'
@@ -86,57 +86,57 @@ describe Signet::OAuth2 do
86
86
  end
87
87
 
88
88
  # This behavior will almost certainly change in subsequent updates.
89
- describe 'when parsing a WWW-Authenticate header' do
90
- it 'should correctly handle OAuth challenge with auth-params' do
89
+ describe "when parsing a WWW-Authenticate header" do
90
+ it "should correctly handle OAuth challenge with auth-params" do
91
91
  parameters = Signet::OAuth2.parse_www_authenticate_header(
92
- 'OAuth realm="http://sp.example.com/", error="expired_token", ' +
92
+ 'OAuth realm="http://sp.example.com/", error="expired_token", ' \
93
93
  'error_description="The access token has expired."'
94
- ).inject({}) { |h,(k,v)| h[k]=v; h }
95
- expect(parameters['realm']).to eq 'http://sp.example.com/'
96
- expect(parameters['error']).to eq 'expired_token'
97
- expect(parameters['error_description']).to eq 'The access token has expired.'
94
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
95
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
96
+ expect(parameters["error"]).to eq "expired_token"
97
+ expect(parameters["error_description"]).to eq "The access token has expired."
98
98
  end
99
99
 
100
- it 'should liberally handle auth-params with single-quoted strings' do
100
+ it "should liberally handle auth-params with single-quoted strings" do
101
101
  parameters = Signet::OAuth2.parse_www_authenticate_header(
102
- 'OAuth realm=\'http://sp.example.com/\', error=\'expired_token\', ' +
103
- 'error_description=\'The access token has expired.\''
104
- ).inject({}) { |h,(k,v)| h[k]=v; h }
105
- expect(parameters['realm']).to eq 'http://sp.example.com/'
106
- expect(parameters['error']).to eq 'expired_token'
107
- expect(parameters['error_description']).to eq 'The access token has expired.'
102
+ "OAuth realm='http://sp.example.com/', error='expired_token', " \
103
+ "error_description='The access token has expired.'"
104
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
105
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
106
+ expect(parameters["error"]).to eq "expired_token"
107
+ expect(parameters["error_description"]).to eq "The access token has expired."
108
108
  end
109
109
 
110
- it 'should liberally handle auth-params with token strings' do
110
+ it "should liberally handle auth-params with token strings" do
111
111
  parameters = Signet::OAuth2.parse_www_authenticate_header(
112
- 'OAuth realm="http://sp.example.com/", error=expired_token, ' +
112
+ 'OAuth realm="http://sp.example.com/", error=expired_token, ' \
113
113
  'error_description="The access token has expired."'
114
- ).inject({}) { |h,(k,v)| h[k]=v; h }
115
- expect(parameters['realm']).to eq 'http://sp.example.com/'
116
- expect(parameters['error']).to eq 'expired_token'
117
- expect(parameters['error_description']).to eq 'The access token has expired.'
114
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
115
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
116
+ expect(parameters["error"]).to eq "expired_token"
117
+ expect(parameters["error_description"]).to eq "The access token has expired."
118
118
  end
119
119
 
120
- it 'should liberally handle out-of-order auth-params' do
120
+ it "should liberally handle out-of-order auth-params" do
121
121
  parameters = Signet::OAuth2.parse_www_authenticate_header(
122
- 'OAuth error_description=\'The access token has expired.\', ' +
123
- 'error=\'expired_token\', realm=\'http://sp.example.com/\''
124
- ).inject({}) { |h,(k,v)| h[k]=v; h }
125
- expect(parameters['realm']).to eq 'http://sp.example.com/'
126
- expect(parameters['error']).to eq 'expired_token'
127
- expect(parameters['error_description']).to eq 'The access token has expired.'
122
+ "OAuth error_description='The access token has expired.', " \
123
+ "error='expired_token', realm='http://sp.example.com/'"
124
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
125
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
126
+ expect(parameters["error"]).to eq "expired_token"
127
+ expect(parameters["error_description"]).to eq "The access token has expired."
128
128
  end
129
129
 
130
- it 'should not allow unquoted strings that do not match tchar' do
130
+ it "should not allow unquoted strings that do not match tchar" do
131
131
  expect(lambda do
132
132
  Signet::OAuth2.parse_www_authenticate_header(
133
- 'OAuth realm=http://sp.example.com/, error=expired_token, ' +
133
+ "OAuth realm=http://sp.example.com/, error=expired_token, " \
134
134
  'error_description="The access token has expired."'
135
135
  )
136
136
  end).to raise_error(Signet::ParseError)
137
137
  end
138
138
 
139
- it 'should not parse non-OAuth challenges' do
139
+ it "should not parse non-OAuth challenges" do
140
140
  expect(lambda do
141
141
  Signet::OAuth2.parse_www_authenticate_header(
142
142
  'AuthSub realm="https://www.google.com/accounts/AuthSubRequest"'
@@ -145,50 +145,49 @@ describe Signet::OAuth2 do
145
145
  end
146
146
  end
147
147
 
148
- describe 'when generating a Basic Authorization header' do
149
- it 'should correctly handle client ID and password pairs' do
148
+ describe "when generating a Basic Authorization header" do
149
+ it "should correctly handle client ID and password pairs" do
150
150
  # Example from OAuth 2 spec
151
151
  expect(Signet::OAuth2.generate_basic_authorization_header(
152
- 's6BhdRkqt3', 'gX1fBat3bV'
153
- )).to eq 'Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW'
152
+ "s6BhdRkqt3", "gX1fBat3bV"
153
+ )).to eq "Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW"
154
154
  end
155
155
 
156
- it 'should correctly encode using the alogrithm given in RFC 2617' do
156
+ it "should correctly encode using the alogrithm given in RFC 2617" do
157
157
  # Example from RFC 2617
158
158
  expect(Signet::OAuth2.generate_basic_authorization_header(
159
- 'Aladdin', 'open sesame'
160
- )).to eq 'Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=='
159
+ "Aladdin", "open sesame"
160
+ )).to eq "Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=="
161
161
  end
162
162
  end
163
163
 
164
- describe 'when parsing a token response body' do
165
-
166
- it 'should correctly handle just an access token' do
164
+ describe "when parsing a token response body" do
165
+ it "should correctly handle just an access token" do
167
166
  expect(Signet::OAuth2.parse_credentials(
168
- '{"access_token": "12345"}',
169
- 'application/json; charset=utf-8'
170
- )).to eq ({"access_token" => "12345"})
167
+ '{"access_token": "12345"}',
168
+ "application/json; charset=utf-8"
169
+ )).to eq ({ "access_token" => "12345" })
171
170
  end
172
171
 
173
- it 'should handle form encoded responses' do
172
+ it "should handle form encoded responses" do
174
173
  expect(Signet::OAuth2.parse_credentials(
175
- 'access_token=12345&expires=1000',
176
- 'application/x-www-form-urlencoded; charset=utf-8'
177
- )).to eq({"access_token" => "12345", "expires" => "1000" })
174
+ "access_token=12345&expires=1000",
175
+ "application/x-www-form-urlencoded; charset=utf-8"
176
+ )).to eq("access_token" => "12345", "expires" => "1000")
178
177
  end
179
178
 
180
- it 'should raise an error for an invalid body' do
179
+ it "should raise an error for an invalid body" do
181
180
  expect(lambda do
182
181
  Signet::OAuth2.parse_credentials(
183
- 'This is not JSON.',
184
- 'application/json'
182
+ "This is not JSON.",
183
+ "application/json"
185
184
  )
186
185
  end).to raise_error(MultiJson::DecodeError)
187
186
  end
188
187
 
189
- it 'should raise an error for a bogus body' do
188
+ it "should raise an error for a bogus body" do
190
189
  expect(lambda do
191
- Signet::OAuth2.parse_credentials(:bogus, 'application/json')
190
+ Signet::OAuth2.parse_credentials :bogus, "application/json"
192
191
  end).to raise_error(TypeError)
193
192
  end
194
193
  end
@@ -11,68 +11,68 @@
11
11
  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
12
  # See the License for the specific language governing permissions and
13
13
  # limitations under the License.
14
- require 'spec_helper'
15
- require 'signet/oauth_2'
14
+ require "spec_helper"
15
+ require "signet/oauth_2"
16
16
 
17
17
  describe Signet do
18
- describe 'when parsing an auth param list' do
19
- it 'should correctly handle commas' do
18
+ describe "when parsing an auth param list" do
19
+ it "should correctly handle commas" do
20
20
  parameters = Signet.parse_auth_param_list(
21
21
  'a="1, 2" , b="3,4",c="5 , 6" ,d="7 ,8"'
22
- ).inject({}) { |h,(k,v)| h[k]=v; h }
23
- expect(parameters['a']).to eq '1, 2'
24
- expect(parameters['b']).to eq '3,4'
25
- expect(parameters['c']).to eq '5 , 6'
26
- expect(parameters['d']).to eq '7 ,8'
22
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
23
+ expect(parameters["a"]).to eq "1, 2"
24
+ expect(parameters["b"]).to eq "3,4"
25
+ expect(parameters["c"]).to eq "5 , 6"
26
+ expect(parameters["d"]).to eq "7 ,8"
27
27
  end
28
28
 
29
- it 'should correctly handle backslash-escaped pairs' do
29
+ it "should correctly handle backslash-escaped pairs" do
30
30
  parameters = Signet.parse_auth_param_list(
31
31
  'token="\t\o\k\e\n" sigalg="\s\i\g\a\l\g" data="\d\a\t\a"'
32
- ).inject({}) { |h,(k,v)| h[k]=v; h }
33
- expect(parameters['token']).to eq 'token'
34
- expect(parameters['sigalg']).to eq 'sigalg'
35
- expect(parameters['data']).to eq 'data'
32
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
33
+ expect(parameters["token"]).to eq "token"
34
+ expect(parameters["sigalg"]).to eq "sigalg"
35
+ expect(parameters["data"]).to eq "data"
36
36
  end
37
37
 
38
- it 'should liberally handle space-separated auth-param lists' do
38
+ it "should liberally handle space-separated auth-param lists" do
39
39
  parameters = Signet.parse_auth_param_list(
40
40
  'token="token" sigalg="sigalg" data="data" sig="sig"'
41
- ).inject({}) { |h,(k,v)| h[k]=v; h }
42
- expect(parameters['token']).to eq 'token'
43
- expect(parameters['sigalg']).to eq 'sigalg'
44
- expect(parameters['data']).to eq 'data'
45
- expect(parameters['sig']).to eq 'sig'
41
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
42
+ expect(parameters["token"]).to eq "token"
43
+ expect(parameters["sigalg"]).to eq "sigalg"
44
+ expect(parameters["data"]).to eq "data"
45
+ expect(parameters["sig"]).to eq "sig"
46
46
  end
47
47
 
48
- it 'should liberally handle single-quoted auth-param lists' do
48
+ it "should liberally handle single-quoted auth-param lists" do
49
49
  parameters = Signet.parse_auth_param_list(
50
- 'token=\'token\' sigalg=\'sigalg\' data=\'data\' sig=\'sig\''
51
- ).inject({}) { |h,(k,v)| h[k]=v; h }
52
- expect(parameters['token']).to eq 'token'
53
- expect(parameters['sigalg']).to eq 'sigalg'
54
- expect(parameters['data']).to eq 'data'
55
- expect(parameters['sig']).to eq 'sig'
50
+ "token='token' sigalg='sigalg' data='data' sig='sig'"
51
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
52
+ expect(parameters["token"]).to eq "token"
53
+ expect(parameters["sigalg"]).to eq "sigalg"
54
+ expect(parameters["data"]).to eq "data"
55
+ expect(parameters["sig"]).to eq "sig"
56
56
  end
57
57
 
58
- it 'should liberally handle unquoted auth-param lists' do
58
+ it "should liberally handle unquoted auth-param lists" do
59
59
  parameters = Signet.parse_auth_param_list(
60
- 'token=token sigalg=sigalg data=data sig=sig'
61
- ).inject({}) { |h,(k,v)| h[k]=v; h }
62
- expect(parameters['token']).to eq 'token'
63
- expect(parameters['sigalg']).to eq 'sigalg'
64
- expect(parameters['data']).to eq 'data'
65
- expect(parameters['sig']).to eq 'sig'
60
+ "token=token sigalg=sigalg data=data sig=sig"
61
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
62
+ expect(parameters["token"]).to eq "token"
63
+ expect(parameters["sigalg"]).to eq "sigalg"
64
+ expect(parameters["data"]).to eq "data"
65
+ expect(parameters["sig"]).to eq "sig"
66
66
  end
67
67
 
68
- it 'should liberally handle auth-param lists with empty sections' do
68
+ it "should liberally handle auth-param lists with empty sections" do
69
69
  parameters = Signet.parse_auth_param_list(
70
- 'token=token, , sigalg=sigalg,, data=data, sig=sig'
71
- ).inject({}) { |h,(k,v)| h[k]=v; h }
72
- expect(parameters['token']).to eq 'token'
73
- expect(parameters['sigalg']).to eq 'sigalg'
74
- expect(parameters['data']).to eq 'data'
75
- expect(parameters['sig']).to eq 'sig'
70
+ "token=token, , sigalg=sigalg,, data=data, sig=sig"
71
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
72
+ expect(parameters["token"]).to eq "token"
73
+ expect(parameters["sigalg"]).to eq "sigalg"
74
+ expect(parameters["data"]).to eq "data"
75
+ expect(parameters["sig"]).to eq "sig"
76
76
  end
77
77
  end
78
78
  end
@@ -1,10 +1,10 @@
1
- $:.uniq!
1
+ $LOAD_PATH.uniq!
2
2
 
3
- require 'rubygems'
4
- require 'signet'
5
- require 'rspec'
6
- require 'simplecov'
7
- require 'faraday'
3
+ require "rubygems"
4
+ require "signet"
5
+ require "rspec"
6
+ require "simplecov"
7
+ require "faraday"
8
8
 
9
9
  SimpleCov.start if ENV["COVERAGE"]
10
- Faraday::Adapter.load_middleware(:test)
10
+ Faraday::Adapter.load_middleware :test
@@ -1,16 +1,16 @@
1
- RSpec.describe 'spec_helper.rb' do
2
- let(:spec_dir) { File.expand_path(File.dirname(__FILE__)) }
3
- let(:root_dir) { File.expand_path(File.join(spec_dir, '..')) }
4
- let(:lib_dir) { File.expand_path(File.join(root_dir, 'lib')) }
1
+ RSpec.describe "spec_helper.rb" do
2
+ let(:spec_dir) { __dir__ }
3
+ let(:root_dir) { File.expand_path File.join(spec_dir, "..") }
4
+ let(:lib_dir) { File.expand_path File.join(root_dir, "lib") }
5
5
 
6
- describe 'spec_dir' do
7
- it 'is already in $LOAD_PATH' do
6
+ describe "spec_dir" do
7
+ it "is already in $LOAD_PATH" do
8
8
  expect($LOAD_PATH).to include spec_dir
9
9
  end
10
10
  end
11
11
 
12
- describe 'lib_dir' do
13
- it 'is already in $LOAD_PATH' do
12
+ describe "lib_dir" do
13
+ it "is already in $LOAD_PATH" do
14
14
  expect($LOAD_PATH).to include lib_dir
15
15
  end
16
16
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: signet
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.11.0
4
+ version: 0.14.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Bob Aman
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2018-10-10 00:00:00.000000000 Z
12
+ date: 2021-01-27 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: addressable
@@ -29,30 +29,22 @@ dependencies:
29
29
  name: faraday
30
30
  requirement: !ruby/object:Gem::Requirement
31
31
  requirements:
32
- - - "~>"
33
- - !ruby/object:Gem::Version
34
- version: '0.9'
35
- type: :runtime
36
- prerelease: false
37
- version_requirements: !ruby/object:Gem::Requirement
38
- requirements:
39
- - - "~>"
32
+ - - ">="
40
33
  - !ruby/object:Gem::Version
41
- version: '0.9'
42
- - !ruby/object:Gem::Dependency
43
- name: multi_json
44
- requirement: !ruby/object:Gem::Requirement
45
- requirements:
46
- - - "~>"
34
+ version: 0.17.3
35
+ - - "<"
47
36
  - !ruby/object:Gem::Version
48
- version: '1.10'
37
+ version: '2.0'
49
38
  type: :runtime
50
39
  prerelease: false
51
40
  version_requirements: !ruby/object:Gem::Requirement
52
41
  requirements:
53
- - - "~>"
42
+ - - ">="
54
43
  - !ruby/object:Gem::Version
55
- version: '1.10'
44
+ version: 0.17.3
45
+ - - "<"
46
+ - !ruby/object:Gem::Version
47
+ version: '2.0'
56
48
  - !ruby/object:Gem::Dependency
57
49
  name: jwt
58
50
  requirement: !ruby/object:Gem::Requirement
@@ -74,53 +66,47 @@ dependencies:
74
66
  - !ruby/object:Gem::Version
75
67
  version: '3.0'
76
68
  - !ruby/object:Gem::Dependency
77
- name: rake
69
+ name: multi_json
78
70
  requirement: !ruby/object:Gem::Requirement
79
71
  requirements:
80
72
  - - "~>"
81
73
  - !ruby/object:Gem::Version
82
- version: '12.0'
83
- type: :development
74
+ version: '1.10'
75
+ type: :runtime
84
76
  prerelease: false
85
77
  version_requirements: !ruby/object:Gem::Requirement
86
78
  requirements:
87
79
  - - "~>"
88
80
  - !ruby/object:Gem::Version
89
- version: '12.0'
81
+ version: '1.10'
90
82
  - !ruby/object:Gem::Dependency
91
- name: yard
83
+ name: google-style
92
84
  requirement: !ruby/object:Gem::Requirement
93
85
  requirements:
94
86
  - - "~>"
95
87
  - !ruby/object:Gem::Version
96
- version: '0.9'
97
- - - ">="
98
- - !ruby/object:Gem::Version
99
- version: 0.9.12
88
+ version: '0.3'
100
89
  type: :development
101
90
  prerelease: false
102
91
  version_requirements: !ruby/object:Gem::Requirement
103
92
  requirements:
104
93
  - - "~>"
105
94
  - !ruby/object:Gem::Version
106
- version: '0.9'
107
- - - ">="
108
- - !ruby/object:Gem::Version
109
- version: 0.9.12
95
+ version: '0.3'
110
96
  - !ruby/object:Gem::Dependency
111
- name: rspec
97
+ name: kramdown
112
98
  requirement: !ruby/object:Gem::Requirement
113
99
  requirements:
114
100
  - - "~>"
115
101
  - !ruby/object:Gem::Version
116
- version: '3.1'
102
+ version: '1.5'
117
103
  type: :development
118
104
  prerelease: false
119
105
  version_requirements: !ruby/object:Gem::Requirement
120
106
  requirements:
121
107
  - - "~>"
122
108
  - !ruby/object:Gem::Version
123
- version: '3.1'
109
+ version: '1.5'
124
110
  - !ruby/object:Gem::Dependency
125
111
  name: launchy
126
112
  requirement: !ruby/object:Gem::Requirement
@@ -136,19 +122,33 @@ dependencies:
136
122
  - !ruby/object:Gem::Version
137
123
  version: '2.4'
138
124
  - !ruby/object:Gem::Dependency
139
- name: kramdown
125
+ name: rake
140
126
  requirement: !ruby/object:Gem::Requirement
141
127
  requirements:
142
128
  - - "~>"
143
129
  - !ruby/object:Gem::Version
144
- version: '1.5'
130
+ version: '12.0'
145
131
  type: :development
146
132
  prerelease: false
147
133
  version_requirements: !ruby/object:Gem::Requirement
148
134
  requirements:
149
135
  - - "~>"
150
136
  - !ruby/object:Gem::Version
151
- version: '1.5'
137
+ version: '12.0'
138
+ - !ruby/object:Gem::Dependency
139
+ name: rspec
140
+ requirement: !ruby/object:Gem::Requirement
141
+ requirements:
142
+ - - "~>"
143
+ - !ruby/object:Gem::Version
144
+ version: '3.1'
145
+ type: :development
146
+ prerelease: false
147
+ version_requirements: !ruby/object:Gem::Requirement
148
+ requirements:
149
+ - - "~>"
150
+ - !ruby/object:Gem::Version
151
+ version: '3.1'
152
152
  - !ruby/object:Gem::Dependency
153
153
  name: simplecov
154
154
  requirement: !ruby/object:Gem::Requirement
@@ -163,6 +163,26 @@ dependencies:
163
163
  - - "~>"
164
164
  - !ruby/object:Gem::Version
165
165
  version: '0.9'
166
+ - !ruby/object:Gem::Dependency
167
+ name: yard
168
+ requirement: !ruby/object:Gem::Requirement
169
+ requirements:
170
+ - - "~>"
171
+ - !ruby/object:Gem::Version
172
+ version: '0.9'
173
+ - - ">="
174
+ - !ruby/object:Gem::Version
175
+ version: 0.9.12
176
+ type: :development
177
+ prerelease: false
178
+ version_requirements: !ruby/object:Gem::Requirement
179
+ requirements:
180
+ - - "~>"
181
+ - !ruby/object:Gem::Version
182
+ version: '0.9'
183
+ - - ">="
184
+ - !ruby/object:Gem::Version
185
+ version: 0.9.12
166
186
  description: 'Signet is an OAuth 1.0 / OAuth 2.0 implementation.
167
187
 
168
188
  '
@@ -203,21 +223,14 @@ files:
203
223
  - spec/spec.opts
204
224
  - spec/spec_helper.rb
205
225
  - spec/spec_helper_spec.rb
206
- - tasks/clobber.rake
207
- - tasks/gem.rake
208
- - tasks/git.rake
209
- - tasks/metrics.rake
210
- - tasks/spec.rake
211
- - tasks/wiki.rake
212
- - tasks/yard.rake
213
226
  - website/index.html
214
- homepage: https://github.com/google/signet/
227
+ homepage: https://github.com/googleapis/signet
215
228
  licenses:
216
229
  - Apache-2.0
217
230
  metadata:
218
- changelog_uri: https://github.com/google/signet/blob/master/CHANGELOG.md
219
- source_code_uri: https://github.com/google/signet
220
- bug_tracker_uri: https://github.com/google/signet/issues
231
+ changelog_uri: https://github.com/googleapis/signet/blob/master/CHANGELOG.md
232
+ source_code_uri: https://github.com/googleapis/signet
233
+ bug_tracker_uri: https://github.com/googleapis/signet/issues
221
234
  post_install_message:
222
235
  rdoc_options:
223
236
  - "--main"
@@ -228,15 +241,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
228
241
  requirements:
229
242
  - - ">="
230
243
  - !ruby/object:Gem::Version
231
- version: 1.9.3
244
+ version: 2.4.0
232
245
  required_rubygems_version: !ruby/object:Gem::Requirement
233
246
  requirements:
234
247
  - - ">="
235
248
  - !ruby/object:Gem::Version
236
249
  version: 1.3.5
237
250
  requirements: []
238
- rubyforge_project:
239
- rubygems_version: 2.7.6
251
+ rubygems_version: 3.2.6
240
252
  signing_key:
241
253
  specification_version: 4
242
254
  summary: Signet is an OAuth 1.0 / OAuth 2.0 implementation.