signet 0.11.0 → 0.14.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (38) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +51 -15
  3. data/Gemfile +5 -4
  4. data/README.md +4 -6
  5. data/Rakefile +107 -37
  6. data/lib/signet.rb +17 -14
  7. data/lib/signet/errors.rb +4 -4
  8. data/lib/signet/oauth_1.rb +129 -154
  9. data/lib/signet/oauth_1/client.rb +309 -343
  10. data/lib/signet/oauth_1/credential.rb +40 -37
  11. data/lib/signet/oauth_1/server.rb +197 -203
  12. data/lib/signet/oauth_1/signature_methods/hmac_sha1.rb +11 -10
  13. data/lib/signet/oauth_1/signature_methods/plaintext.rb +8 -7
  14. data/lib/signet/oauth_1/signature_methods/rsa_sha1.rb +11 -11
  15. data/lib/signet/oauth_2.rb +41 -43
  16. data/lib/signet/oauth_2/client.rb +328 -313
  17. data/lib/signet/version.rb +2 -73
  18. data/signet.gemspec +37 -39
  19. data/spec/signet/oauth_1/client_spec.rb +313 -315
  20. data/spec/signet/oauth_1/credential_spec.rb +64 -56
  21. data/spec/signet/oauth_1/server_spec.rb +362 -362
  22. data/spec/signet/oauth_1/signature_methods/hmac_sha1_spec.rb +26 -26
  23. data/spec/signet/oauth_1/signature_methods/plaintext_spec.rb +28 -28
  24. data/spec/signet/oauth_1/signature_methods/rsa_sha1_spec.rb +34 -35
  25. data/spec/signet/oauth_1_spec.rb +553 -524
  26. data/spec/signet/oauth_2/client_spec.rb +652 -576
  27. data/spec/signet/oauth_2_spec.rb +88 -89
  28. data/spec/signet_spec.rb +41 -41
  29. data/spec/spec_helper.rb +7 -7
  30. data/spec/spec_helper_spec.rb +8 -8
  31. metadata +64 -52
  32. data/tasks/clobber.rake +0 -2
  33. data/tasks/gem.rake +0 -34
  34. data/tasks/git.rake +0 -40
  35. data/tasks/metrics.rake +0 -41
  36. data/tasks/spec.rake +0 -34
  37. data/tasks/wiki.rake +0 -38
  38. data/tasks/yard.rake +0 -21
@@ -11,72 +11,72 @@
11
11
  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
12
  # See the License for the specific language governing permissions and
13
13
  # limitations under the License.
14
- require 'spec_helper'
15
- require 'signet/errors'
16
- require 'signet/oauth_2'
14
+ require "spec_helper"
15
+ require "signet/errors"
16
+ require "signet/oauth_2"
17
17
 
18
18
  describe Signet::OAuth2 do
19
19
  # This behavior will almost certainly change in subsequent updates.
20
- describe 'when parsing an Authorization header' do
21
- it 'should correctly handle HTTP Basic auth-scheme' do
20
+ describe "when parsing an Authorization header" do
21
+ it "should correctly handle HTTP Basic auth-scheme" do
22
22
  parameters = Signet::OAuth2.parse_authorization_header(
23
- 'Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW'
24
- ).inject({}) { |h,(k,v)| h[k]=v; h }
25
- expect(parameters['client_id']).to eq 's6BhdRkqt3'
26
- expect(parameters['client_secret']).to eq 'gX1fBat3bV'
23
+ "Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW"
24
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
25
+ expect(parameters["client_id"]).to eq "s6BhdRkqt3"
26
+ expect(parameters["client_secret"]).to eq "gX1fBat3bV"
27
27
  end
28
28
 
29
- it 'should correctly handle OAuth auth-scheme' do
29
+ it "should correctly handle OAuth auth-scheme" do
30
30
  parameters = Signet::OAuth2.parse_authorization_header(
31
- 'OAuth vF9dft4qmT'
32
- ).inject({}) { |h,(k,v)| h[k]=v; h }
33
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
31
+ "OAuth vF9dft4qmT"
32
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
33
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
34
34
  end
35
35
 
36
- it 'should correctly handle OAuth auth-scheme with realm' do
36
+ it "should correctly handle OAuth auth-scheme with realm" do
37
37
  parameters = Signet::OAuth2.parse_authorization_header(
38
38
  'OAuth vF9dft4qmT, realm="http://sp.example.com/"'
39
- ).inject({}) { |h,(k,v)| h[k]=v; h }
40
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
41
- expect(parameters['realm']).to eq 'http://sp.example.com/'
39
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
40
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
41
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
42
42
  end
43
43
 
44
- it 'should correctly handle OAuth auth-scheme with multiple auth-params' do
44
+ it "should correctly handle OAuth auth-scheme with multiple auth-params" do
45
45
  parameters = Signet::OAuth2.parse_authorization_header(
46
46
  'OAuth vF9dft4qmT, first="one", second="two"'
47
- ).inject({}) { |h,(k,v)| h[k]=v; h }
48
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
49
- expect(parameters['first']).to eq 'one'
50
- expect(parameters['second']).to eq 'two'
47
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
48
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
49
+ expect(parameters["first"]).to eq "one"
50
+ expect(parameters["second"]).to eq "two"
51
51
  end
52
52
 
53
- it 'should liberally handle auth-params with single-quoted strings' do
53
+ it "should liberally handle auth-params with single-quoted strings" do
54
54
  parameters = Signet::OAuth2.parse_authorization_header(
55
- 'OAuth vF9dft4qmT, first=\'one\', second=\'two\''
56
- ).inject({}) { |h,(k,v)| h[k]=v; h }
57
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
58
- expect(parameters['first']).to eq 'one'
59
- expect(parameters['second']).to eq 'two'
55
+ "OAuth vF9dft4qmT, first='one', second='two'"
56
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
57
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
58
+ expect(parameters["first"]).to eq "one"
59
+ expect(parameters["second"]).to eq "two"
60
60
  end
61
61
 
62
- it 'should liberally handle auth-params with unquoted strings' do
62
+ it "should liberally handle auth-params with unquoted strings" do
63
63
  parameters = Signet::OAuth2.parse_authorization_header(
64
- 'OAuth vF9dft4qmT, first=one, second=two'
65
- ).inject({}) { |h,(k,v)| h[k]=v; h }
66
- expect(parameters['access_token']).to eq 'vF9dft4qmT'
67
- expect(parameters['first']).to eq 'one'
68
- expect(parameters['second']).to eq 'two'
64
+ "OAuth vF9dft4qmT, first=one, second=two"
65
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
66
+ expect(parameters["access_token"]).to eq "vF9dft4qmT"
67
+ expect(parameters["first"]).to eq "one"
68
+ expect(parameters["second"]).to eq "two"
69
69
  end
70
70
 
71
- it 'should not allow unquoted strings that do not match tchar' do
71
+ it "should not allow unquoted strings that do not match tchar" do
72
72
  expect(lambda do
73
73
  parameters = Signet::OAuth2.parse_authorization_header(
74
- 'OAuth vF9dft4qmT, first=one:1'
74
+ "OAuth vF9dft4qmT, first=one:1"
75
75
  )
76
76
  end).to raise_error(Signet::ParseError)
77
77
  end
78
78
 
79
- it 'should not parse non-OAuth auth-schemes' do
79
+ it "should not parse non-OAuth auth-schemes" do
80
80
  expect(lambda do
81
81
  Signet::OAuth2.parse_authorization_header(
82
82
  'AuthSub token="GD32CMCL25aZ-v____8B"'
@@ -86,57 +86,57 @@ describe Signet::OAuth2 do
86
86
  end
87
87
 
88
88
  # This behavior will almost certainly change in subsequent updates.
89
- describe 'when parsing a WWW-Authenticate header' do
90
- it 'should correctly handle OAuth challenge with auth-params' do
89
+ describe "when parsing a WWW-Authenticate header" do
90
+ it "should correctly handle OAuth challenge with auth-params" do
91
91
  parameters = Signet::OAuth2.parse_www_authenticate_header(
92
- 'OAuth realm="http://sp.example.com/", error="expired_token", ' +
92
+ 'OAuth realm="http://sp.example.com/", error="expired_token", ' \
93
93
  'error_description="The access token has expired."'
94
- ).inject({}) { |h,(k,v)| h[k]=v; h }
95
- expect(parameters['realm']).to eq 'http://sp.example.com/'
96
- expect(parameters['error']).to eq 'expired_token'
97
- expect(parameters['error_description']).to eq 'The access token has expired.'
94
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
95
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
96
+ expect(parameters["error"]).to eq "expired_token"
97
+ expect(parameters["error_description"]).to eq "The access token has expired."
98
98
  end
99
99
 
100
- it 'should liberally handle auth-params with single-quoted strings' do
100
+ it "should liberally handle auth-params with single-quoted strings" do
101
101
  parameters = Signet::OAuth2.parse_www_authenticate_header(
102
- 'OAuth realm=\'http://sp.example.com/\', error=\'expired_token\', ' +
103
- 'error_description=\'The access token has expired.\''
104
- ).inject({}) { |h,(k,v)| h[k]=v; h }
105
- expect(parameters['realm']).to eq 'http://sp.example.com/'
106
- expect(parameters['error']).to eq 'expired_token'
107
- expect(parameters['error_description']).to eq 'The access token has expired.'
102
+ "OAuth realm='http://sp.example.com/', error='expired_token', " \
103
+ "error_description='The access token has expired.'"
104
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
105
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
106
+ expect(parameters["error"]).to eq "expired_token"
107
+ expect(parameters["error_description"]).to eq "The access token has expired."
108
108
  end
109
109
 
110
- it 'should liberally handle auth-params with token strings' do
110
+ it "should liberally handle auth-params with token strings" do
111
111
  parameters = Signet::OAuth2.parse_www_authenticate_header(
112
- 'OAuth realm="http://sp.example.com/", error=expired_token, ' +
112
+ 'OAuth realm="http://sp.example.com/", error=expired_token, ' \
113
113
  'error_description="The access token has expired."'
114
- ).inject({}) { |h,(k,v)| h[k]=v; h }
115
- expect(parameters['realm']).to eq 'http://sp.example.com/'
116
- expect(parameters['error']).to eq 'expired_token'
117
- expect(parameters['error_description']).to eq 'The access token has expired.'
114
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
115
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
116
+ expect(parameters["error"]).to eq "expired_token"
117
+ expect(parameters["error_description"]).to eq "The access token has expired."
118
118
  end
119
119
 
120
- it 'should liberally handle out-of-order auth-params' do
120
+ it "should liberally handle out-of-order auth-params" do
121
121
  parameters = Signet::OAuth2.parse_www_authenticate_header(
122
- 'OAuth error_description=\'The access token has expired.\', ' +
123
- 'error=\'expired_token\', realm=\'http://sp.example.com/\''
124
- ).inject({}) { |h,(k,v)| h[k]=v; h }
125
- expect(parameters['realm']).to eq 'http://sp.example.com/'
126
- expect(parameters['error']).to eq 'expired_token'
127
- expect(parameters['error_description']).to eq 'The access token has expired.'
122
+ "OAuth error_description='The access token has expired.', " \
123
+ "error='expired_token', realm='http://sp.example.com/'"
124
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
125
+ expect(parameters["realm"]).to eq "http://sp.example.com/"
126
+ expect(parameters["error"]).to eq "expired_token"
127
+ expect(parameters["error_description"]).to eq "The access token has expired."
128
128
  end
129
129
 
130
- it 'should not allow unquoted strings that do not match tchar' do
130
+ it "should not allow unquoted strings that do not match tchar" do
131
131
  expect(lambda do
132
132
  Signet::OAuth2.parse_www_authenticate_header(
133
- 'OAuth realm=http://sp.example.com/, error=expired_token, ' +
133
+ "OAuth realm=http://sp.example.com/, error=expired_token, " \
134
134
  'error_description="The access token has expired."'
135
135
  )
136
136
  end).to raise_error(Signet::ParseError)
137
137
  end
138
138
 
139
- it 'should not parse non-OAuth challenges' do
139
+ it "should not parse non-OAuth challenges" do
140
140
  expect(lambda do
141
141
  Signet::OAuth2.parse_www_authenticate_header(
142
142
  'AuthSub realm="https://www.google.com/accounts/AuthSubRequest"'
@@ -145,50 +145,49 @@ describe Signet::OAuth2 do
145
145
  end
146
146
  end
147
147
 
148
- describe 'when generating a Basic Authorization header' do
149
- it 'should correctly handle client ID and password pairs' do
148
+ describe "when generating a Basic Authorization header" do
149
+ it "should correctly handle client ID and password pairs" do
150
150
  # Example from OAuth 2 spec
151
151
  expect(Signet::OAuth2.generate_basic_authorization_header(
152
- 's6BhdRkqt3', 'gX1fBat3bV'
153
- )).to eq 'Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW'
152
+ "s6BhdRkqt3", "gX1fBat3bV"
153
+ )).to eq "Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW"
154
154
  end
155
155
 
156
- it 'should correctly encode using the alogrithm given in RFC 2617' do
156
+ it "should correctly encode using the alogrithm given in RFC 2617" do
157
157
  # Example from RFC 2617
158
158
  expect(Signet::OAuth2.generate_basic_authorization_header(
159
- 'Aladdin', 'open sesame'
160
- )).to eq 'Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=='
159
+ "Aladdin", "open sesame"
160
+ )).to eq "Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=="
161
161
  end
162
162
  end
163
163
 
164
- describe 'when parsing a token response body' do
165
-
166
- it 'should correctly handle just an access token' do
164
+ describe "when parsing a token response body" do
165
+ it "should correctly handle just an access token" do
167
166
  expect(Signet::OAuth2.parse_credentials(
168
- '{"access_token": "12345"}',
169
- 'application/json; charset=utf-8'
170
- )).to eq ({"access_token" => "12345"})
167
+ '{"access_token": "12345"}',
168
+ "application/json; charset=utf-8"
169
+ )).to eq ({ "access_token" => "12345" })
171
170
  end
172
171
 
173
- it 'should handle form encoded responses' do
172
+ it "should handle form encoded responses" do
174
173
  expect(Signet::OAuth2.parse_credentials(
175
- 'access_token=12345&expires=1000',
176
- 'application/x-www-form-urlencoded; charset=utf-8'
177
- )).to eq({"access_token" => "12345", "expires" => "1000" })
174
+ "access_token=12345&expires=1000",
175
+ "application/x-www-form-urlencoded; charset=utf-8"
176
+ )).to eq("access_token" => "12345", "expires" => "1000")
178
177
  end
179
178
 
180
- it 'should raise an error for an invalid body' do
179
+ it "should raise an error for an invalid body" do
181
180
  expect(lambda do
182
181
  Signet::OAuth2.parse_credentials(
183
- 'This is not JSON.',
184
- 'application/json'
182
+ "This is not JSON.",
183
+ "application/json"
185
184
  )
186
185
  end).to raise_error(MultiJson::DecodeError)
187
186
  end
188
187
 
189
- it 'should raise an error for a bogus body' do
188
+ it "should raise an error for a bogus body" do
190
189
  expect(lambda do
191
- Signet::OAuth2.parse_credentials(:bogus, 'application/json')
190
+ Signet::OAuth2.parse_credentials :bogus, "application/json"
192
191
  end).to raise_error(TypeError)
193
192
  end
194
193
  end
@@ -11,68 +11,68 @@
11
11
  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
12
  # See the License for the specific language governing permissions and
13
13
  # limitations under the License.
14
- require 'spec_helper'
15
- require 'signet/oauth_2'
14
+ require "spec_helper"
15
+ require "signet/oauth_2"
16
16
 
17
17
  describe Signet do
18
- describe 'when parsing an auth param list' do
19
- it 'should correctly handle commas' do
18
+ describe "when parsing an auth param list" do
19
+ it "should correctly handle commas" do
20
20
  parameters = Signet.parse_auth_param_list(
21
21
  'a="1, 2" , b="3,4",c="5 , 6" ,d="7 ,8"'
22
- ).inject({}) { |h,(k,v)| h[k]=v; h }
23
- expect(parameters['a']).to eq '1, 2'
24
- expect(parameters['b']).to eq '3,4'
25
- expect(parameters['c']).to eq '5 , 6'
26
- expect(parameters['d']).to eq '7 ,8'
22
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
23
+ expect(parameters["a"]).to eq "1, 2"
24
+ expect(parameters["b"]).to eq "3,4"
25
+ expect(parameters["c"]).to eq "5 , 6"
26
+ expect(parameters["d"]).to eq "7 ,8"
27
27
  end
28
28
 
29
- it 'should correctly handle backslash-escaped pairs' do
29
+ it "should correctly handle backslash-escaped pairs" do
30
30
  parameters = Signet.parse_auth_param_list(
31
31
  'token="\t\o\k\e\n" sigalg="\s\i\g\a\l\g" data="\d\a\t\a"'
32
- ).inject({}) { |h,(k,v)| h[k]=v; h }
33
- expect(parameters['token']).to eq 'token'
34
- expect(parameters['sigalg']).to eq 'sigalg'
35
- expect(parameters['data']).to eq 'data'
32
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
33
+ expect(parameters["token"]).to eq "token"
34
+ expect(parameters["sigalg"]).to eq "sigalg"
35
+ expect(parameters["data"]).to eq "data"
36
36
  end
37
37
 
38
- it 'should liberally handle space-separated auth-param lists' do
38
+ it "should liberally handle space-separated auth-param lists" do
39
39
  parameters = Signet.parse_auth_param_list(
40
40
  'token="token" sigalg="sigalg" data="data" sig="sig"'
41
- ).inject({}) { |h,(k,v)| h[k]=v; h }
42
- expect(parameters['token']).to eq 'token'
43
- expect(parameters['sigalg']).to eq 'sigalg'
44
- expect(parameters['data']).to eq 'data'
45
- expect(parameters['sig']).to eq 'sig'
41
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
42
+ expect(parameters["token"]).to eq "token"
43
+ expect(parameters["sigalg"]).to eq "sigalg"
44
+ expect(parameters["data"]).to eq "data"
45
+ expect(parameters["sig"]).to eq "sig"
46
46
  end
47
47
 
48
- it 'should liberally handle single-quoted auth-param lists' do
48
+ it "should liberally handle single-quoted auth-param lists" do
49
49
  parameters = Signet.parse_auth_param_list(
50
- 'token=\'token\' sigalg=\'sigalg\' data=\'data\' sig=\'sig\''
51
- ).inject({}) { |h,(k,v)| h[k]=v; h }
52
- expect(parameters['token']).to eq 'token'
53
- expect(parameters['sigalg']).to eq 'sigalg'
54
- expect(parameters['data']).to eq 'data'
55
- expect(parameters['sig']).to eq 'sig'
50
+ "token='token' sigalg='sigalg' data='data' sig='sig'"
51
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
52
+ expect(parameters["token"]).to eq "token"
53
+ expect(parameters["sigalg"]).to eq "sigalg"
54
+ expect(parameters["data"]).to eq "data"
55
+ expect(parameters["sig"]).to eq "sig"
56
56
  end
57
57
 
58
- it 'should liberally handle unquoted auth-param lists' do
58
+ it "should liberally handle unquoted auth-param lists" do
59
59
  parameters = Signet.parse_auth_param_list(
60
- 'token=token sigalg=sigalg data=data sig=sig'
61
- ).inject({}) { |h,(k,v)| h[k]=v; h }
62
- expect(parameters['token']).to eq 'token'
63
- expect(parameters['sigalg']).to eq 'sigalg'
64
- expect(parameters['data']).to eq 'data'
65
- expect(parameters['sig']).to eq 'sig'
60
+ "token=token sigalg=sigalg data=data sig=sig"
61
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
62
+ expect(parameters["token"]).to eq "token"
63
+ expect(parameters["sigalg"]).to eq "sigalg"
64
+ expect(parameters["data"]).to eq "data"
65
+ expect(parameters["sig"]).to eq "sig"
66
66
  end
67
67
 
68
- it 'should liberally handle auth-param lists with empty sections' do
68
+ it "should liberally handle auth-param lists with empty sections" do
69
69
  parameters = Signet.parse_auth_param_list(
70
- 'token=token, , sigalg=sigalg,, data=data, sig=sig'
71
- ).inject({}) { |h,(k,v)| h[k]=v; h }
72
- expect(parameters['token']).to eq 'token'
73
- expect(parameters['sigalg']).to eq 'sigalg'
74
- expect(parameters['data']).to eq 'data'
75
- expect(parameters['sig']).to eq 'sig'
70
+ "token=token, , sigalg=sigalg,, data=data, sig=sig"
71
+ ).each_with_object({}) { |(k, v), h| h[k] = v; }
72
+ expect(parameters["token"]).to eq "token"
73
+ expect(parameters["sigalg"]).to eq "sigalg"
74
+ expect(parameters["data"]).to eq "data"
75
+ expect(parameters["sig"]).to eq "sig"
76
76
  end
77
77
  end
78
78
  end
@@ -1,10 +1,10 @@
1
- $:.uniq!
1
+ $LOAD_PATH.uniq!
2
2
 
3
- require 'rubygems'
4
- require 'signet'
5
- require 'rspec'
6
- require 'simplecov'
7
- require 'faraday'
3
+ require "rubygems"
4
+ require "signet"
5
+ require "rspec"
6
+ require "simplecov"
7
+ require "faraday"
8
8
 
9
9
  SimpleCov.start if ENV["COVERAGE"]
10
- Faraday::Adapter.load_middleware(:test)
10
+ Faraday::Adapter.load_middleware :test
@@ -1,16 +1,16 @@
1
- RSpec.describe 'spec_helper.rb' do
2
- let(:spec_dir) { File.expand_path(File.dirname(__FILE__)) }
3
- let(:root_dir) { File.expand_path(File.join(spec_dir, '..')) }
4
- let(:lib_dir) { File.expand_path(File.join(root_dir, 'lib')) }
1
+ RSpec.describe "spec_helper.rb" do
2
+ let(:spec_dir) { __dir__ }
3
+ let(:root_dir) { File.expand_path File.join(spec_dir, "..") }
4
+ let(:lib_dir) { File.expand_path File.join(root_dir, "lib") }
5
5
 
6
- describe 'spec_dir' do
7
- it 'is already in $LOAD_PATH' do
6
+ describe "spec_dir" do
7
+ it "is already in $LOAD_PATH" do
8
8
  expect($LOAD_PATH).to include spec_dir
9
9
  end
10
10
  end
11
11
 
12
- describe 'lib_dir' do
13
- it 'is already in $LOAD_PATH' do
12
+ describe "lib_dir" do
13
+ it "is already in $LOAD_PATH" do
14
14
  expect($LOAD_PATH).to include lib_dir
15
15
  end
16
16
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: signet
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.11.0
4
+ version: 0.14.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Bob Aman
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2018-10-10 00:00:00.000000000 Z
12
+ date: 2021-01-27 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: addressable
@@ -29,30 +29,22 @@ dependencies:
29
29
  name: faraday
30
30
  requirement: !ruby/object:Gem::Requirement
31
31
  requirements:
32
- - - "~>"
33
- - !ruby/object:Gem::Version
34
- version: '0.9'
35
- type: :runtime
36
- prerelease: false
37
- version_requirements: !ruby/object:Gem::Requirement
38
- requirements:
39
- - - "~>"
32
+ - - ">="
40
33
  - !ruby/object:Gem::Version
41
- version: '0.9'
42
- - !ruby/object:Gem::Dependency
43
- name: multi_json
44
- requirement: !ruby/object:Gem::Requirement
45
- requirements:
46
- - - "~>"
34
+ version: 0.17.3
35
+ - - "<"
47
36
  - !ruby/object:Gem::Version
48
- version: '1.10'
37
+ version: '2.0'
49
38
  type: :runtime
50
39
  prerelease: false
51
40
  version_requirements: !ruby/object:Gem::Requirement
52
41
  requirements:
53
- - - "~>"
42
+ - - ">="
54
43
  - !ruby/object:Gem::Version
55
- version: '1.10'
44
+ version: 0.17.3
45
+ - - "<"
46
+ - !ruby/object:Gem::Version
47
+ version: '2.0'
56
48
  - !ruby/object:Gem::Dependency
57
49
  name: jwt
58
50
  requirement: !ruby/object:Gem::Requirement
@@ -74,53 +66,47 @@ dependencies:
74
66
  - !ruby/object:Gem::Version
75
67
  version: '3.0'
76
68
  - !ruby/object:Gem::Dependency
77
- name: rake
69
+ name: multi_json
78
70
  requirement: !ruby/object:Gem::Requirement
79
71
  requirements:
80
72
  - - "~>"
81
73
  - !ruby/object:Gem::Version
82
- version: '12.0'
83
- type: :development
74
+ version: '1.10'
75
+ type: :runtime
84
76
  prerelease: false
85
77
  version_requirements: !ruby/object:Gem::Requirement
86
78
  requirements:
87
79
  - - "~>"
88
80
  - !ruby/object:Gem::Version
89
- version: '12.0'
81
+ version: '1.10'
90
82
  - !ruby/object:Gem::Dependency
91
- name: yard
83
+ name: google-style
92
84
  requirement: !ruby/object:Gem::Requirement
93
85
  requirements:
94
86
  - - "~>"
95
87
  - !ruby/object:Gem::Version
96
- version: '0.9'
97
- - - ">="
98
- - !ruby/object:Gem::Version
99
- version: 0.9.12
88
+ version: '0.3'
100
89
  type: :development
101
90
  prerelease: false
102
91
  version_requirements: !ruby/object:Gem::Requirement
103
92
  requirements:
104
93
  - - "~>"
105
94
  - !ruby/object:Gem::Version
106
- version: '0.9'
107
- - - ">="
108
- - !ruby/object:Gem::Version
109
- version: 0.9.12
95
+ version: '0.3'
110
96
  - !ruby/object:Gem::Dependency
111
- name: rspec
97
+ name: kramdown
112
98
  requirement: !ruby/object:Gem::Requirement
113
99
  requirements:
114
100
  - - "~>"
115
101
  - !ruby/object:Gem::Version
116
- version: '3.1'
102
+ version: '1.5'
117
103
  type: :development
118
104
  prerelease: false
119
105
  version_requirements: !ruby/object:Gem::Requirement
120
106
  requirements:
121
107
  - - "~>"
122
108
  - !ruby/object:Gem::Version
123
- version: '3.1'
109
+ version: '1.5'
124
110
  - !ruby/object:Gem::Dependency
125
111
  name: launchy
126
112
  requirement: !ruby/object:Gem::Requirement
@@ -136,19 +122,33 @@ dependencies:
136
122
  - !ruby/object:Gem::Version
137
123
  version: '2.4'
138
124
  - !ruby/object:Gem::Dependency
139
- name: kramdown
125
+ name: rake
140
126
  requirement: !ruby/object:Gem::Requirement
141
127
  requirements:
142
128
  - - "~>"
143
129
  - !ruby/object:Gem::Version
144
- version: '1.5'
130
+ version: '12.0'
145
131
  type: :development
146
132
  prerelease: false
147
133
  version_requirements: !ruby/object:Gem::Requirement
148
134
  requirements:
149
135
  - - "~>"
150
136
  - !ruby/object:Gem::Version
151
- version: '1.5'
137
+ version: '12.0'
138
+ - !ruby/object:Gem::Dependency
139
+ name: rspec
140
+ requirement: !ruby/object:Gem::Requirement
141
+ requirements:
142
+ - - "~>"
143
+ - !ruby/object:Gem::Version
144
+ version: '3.1'
145
+ type: :development
146
+ prerelease: false
147
+ version_requirements: !ruby/object:Gem::Requirement
148
+ requirements:
149
+ - - "~>"
150
+ - !ruby/object:Gem::Version
151
+ version: '3.1'
152
152
  - !ruby/object:Gem::Dependency
153
153
  name: simplecov
154
154
  requirement: !ruby/object:Gem::Requirement
@@ -163,6 +163,26 @@ dependencies:
163
163
  - - "~>"
164
164
  - !ruby/object:Gem::Version
165
165
  version: '0.9'
166
+ - !ruby/object:Gem::Dependency
167
+ name: yard
168
+ requirement: !ruby/object:Gem::Requirement
169
+ requirements:
170
+ - - "~>"
171
+ - !ruby/object:Gem::Version
172
+ version: '0.9'
173
+ - - ">="
174
+ - !ruby/object:Gem::Version
175
+ version: 0.9.12
176
+ type: :development
177
+ prerelease: false
178
+ version_requirements: !ruby/object:Gem::Requirement
179
+ requirements:
180
+ - - "~>"
181
+ - !ruby/object:Gem::Version
182
+ version: '0.9'
183
+ - - ">="
184
+ - !ruby/object:Gem::Version
185
+ version: 0.9.12
166
186
  description: 'Signet is an OAuth 1.0 / OAuth 2.0 implementation.
167
187
 
168
188
  '
@@ -203,21 +223,14 @@ files:
203
223
  - spec/spec.opts
204
224
  - spec/spec_helper.rb
205
225
  - spec/spec_helper_spec.rb
206
- - tasks/clobber.rake
207
- - tasks/gem.rake
208
- - tasks/git.rake
209
- - tasks/metrics.rake
210
- - tasks/spec.rake
211
- - tasks/wiki.rake
212
- - tasks/yard.rake
213
226
  - website/index.html
214
- homepage: https://github.com/google/signet/
227
+ homepage: https://github.com/googleapis/signet
215
228
  licenses:
216
229
  - Apache-2.0
217
230
  metadata:
218
- changelog_uri: https://github.com/google/signet/blob/master/CHANGELOG.md
219
- source_code_uri: https://github.com/google/signet
220
- bug_tracker_uri: https://github.com/google/signet/issues
231
+ changelog_uri: https://github.com/googleapis/signet/blob/master/CHANGELOG.md
232
+ source_code_uri: https://github.com/googleapis/signet
233
+ bug_tracker_uri: https://github.com/googleapis/signet/issues
221
234
  post_install_message:
222
235
  rdoc_options:
223
236
  - "--main"
@@ -228,15 +241,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
228
241
  requirements:
229
242
  - - ">="
230
243
  - !ruby/object:Gem::Version
231
- version: 1.9.3
244
+ version: 2.4.0
232
245
  required_rubygems_version: !ruby/object:Gem::Requirement
233
246
  requirements:
234
247
  - - ">="
235
248
  - !ruby/object:Gem::Version
236
249
  version: 1.3.5
237
250
  requirements: []
238
- rubyforge_project:
239
- rubygems_version: 2.7.6
251
+ rubygems_version: 3.2.6
240
252
  signing_key:
241
253
  specification_version: 4
242
254
  summary: Signet is an OAuth 1.0 / OAuth 2.0 implementation.