sso_client 0.4.2 → 0.4.3

Sign up to get free protection for your applications and to get access to all the features.
@@ -1,12 +1,133 @@
1
1
  # Use this hook to configure devise mailer, warden hooks and so forth.
2
2
  # Many of these configuration options can be set straight in your model.
3
3
  Devise.setup do |config|
4
+ # ==> Mailer Configuration
5
+ # Configure the e-mail address which will be shown in Devise::Mailer,
6
+ # note that it will be overwritten if you use your own mailer class with default "from" parameter.
7
+ #config.mailer_sender = "please-change-me-at-config-initializers-devise@example.com"
8
+
9
+ # Configure the class responsible to send e-mails.
10
+ # config.mailer = "Devise::Mailer"
11
+
12
+ # Automatically apply schema changes in tableless databases
13
+ config.apply_schema = false
14
+
4
15
  # ==> ORM configuration
5
16
  # Load and configure the ORM. Supports :active_record (default) and
6
17
  # :mongoid (bson_ext recommended) by default. Other ORMs may be
7
18
  # available as additional gems.
8
19
  require 'devise/orm/active_record'
9
20
 
21
+ # ==> Configuration for any authentication mechanism
22
+ # Configure which keys are used when authenticating a user. The default is
23
+ # just :email. You can configure it to use [:username, :subdomain], so for
24
+ # authenticating a user, both parameters are required. Remember that those
25
+ # parameters are used only when authenticating and not when retrieving from
26
+ # session. If you need permissions, you should implement that in a before filter.
27
+ # You can also supply a hash where the value is a boolean determining whether
28
+ # or not authentication should be aborted when the value is not present.
29
+ # config.authentication_keys = [ :email ]
30
+
31
+ # Configure parameters from the request object used for authentication. Each entry
32
+ # given should be a request method and it will automatically be passed to the
33
+ # find_for_authentication method and considered in your model lookup. For instance,
34
+ # if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
35
+ # The same considerations mentioned for authentication_keys also apply to request_keys.
36
+ # config.request_keys = []
37
+
38
+ # Configure which authentication keys should be case-insensitive.
39
+ # These keys will be downcased upon creating or modifying a user and when used
40
+ # to authenticate or find a user. Default is :email.
41
+ config.case_insensitive_keys = [ :email ]
42
+
43
+ # Configure which authentication keys should have whitespace stripped.
44
+ # These keys will have whitespace before and after removed upon creating or
45
+ # modifying a user and when used to authenticate or find a user. Default is :email.
46
+ config.strip_whitespace_keys = [ :email ]
47
+
48
+ # Tell if authentication through request.params is enabled. True by default.
49
+ # It can be set to an array that will enable params authentication only for the
50
+ # given strategies, for example, `config.params_authenticatable = [:database]` will
51
+ # enable it only for database (email + password) authentication.
52
+ # config.params_authenticatable = true
53
+
54
+ # Tell if authentication through HTTP Basic Auth is enabled. False by default.
55
+ # It can be set to an array that will enable http authentication only for the
56
+ # given strategies, for example, `config.http_authenticatable = [:token]` will
57
+ # enable it only for token authentication.
58
+ # config.http_authenticatable = false
59
+
60
+ # If http headers should be returned for AJAX requests. True by default.
61
+ # config.http_authenticatable_on_xhr = true
62
+
63
+ # The realm used in Http Basic Authentication. "Application" by default.
64
+ # config.http_authentication_realm = "Application"
65
+
66
+ # It will change confirmation, password recovery and other workflows
67
+ # to behave the same regardless if the e-mail provided was right or wrong.
68
+ # Does not affect registerable.
69
+ # config.paranoid = true
70
+
71
+ # By default Devise will store the user in session. You can skip storage for
72
+ # :http_auth and :token_auth by adding those symbols to the array below.
73
+ # Notice that if you are skipping storage for all authentication paths, you
74
+ # may want to disable generating routes to Devise's sessions controller by
75
+ # passing :skip => :sessions to `devise_for` in your config/routes.rb
76
+ config.skip_session_storage = [:http_auth]
77
+
78
+ # ==> Configuration for :database_authenticatable
79
+ # For bcrypt, this is the cost for hashing the password and defaults to 10. If
80
+ # using other encryptors, it sets how many times you want the password re-encrypted.
81
+ #
82
+ # Limiting the stretches to just one in testing will increase the performance of
83
+ # your test suite dramatically. However, it is STRONGLY RECOMMENDED to not use
84
+ # a value less than 10 in other environments.
85
+ config.stretches = Rails.env.test? ? 1 : 10
86
+
87
+ # Setup a pepper to generate the encrypted password.
88
+ # config.pepper = "40f388c45a014998e25192c81fa4020e2358df39b81ff4138ffc86875a4a74d9e6d2fddcd47af371dbd856b0ad917c26368866b96ce0bf2f2ff52932c0122dca"
89
+
90
+ # ==> Configuration for :confirmable
91
+ # A period that the user is allowed to access the website even without
92
+ # confirming his account. For instance, if set to 2.days, the user will be
93
+ # able to access the website for two days without confirming his account,
94
+ # access will be blocked just in the third day. Default is 0.days, meaning
95
+ # the user cannot access the website without confirming his account.
96
+ # config.allow_unconfirmed_access_for = 2.days
97
+
98
+ # If true, requires any email changes to be confirmed (exctly the same way as
99
+ # initial account confirmation) to be applied. Requires additional unconfirmed_email
100
+ # db field (see migrations). Until confirmed new email is stored in
101
+ # unconfirmed email column, and copied to email column on successful confirmation.
102
+ config.reconfirmable = true
103
+
104
+ # Defines which key will be used when confirming an account
105
+ # config.confirmation_keys = [ :email ]
106
+
107
+ # ==> Configuration for :rememberable
108
+ # The time the user will be remembered without asking for credentials again.
109
+ # config.remember_for = 2.weeks
110
+
111
+ # If true, extends the user's remember period when remembered via cookie.
112
+ # config.extend_remember_period = false
113
+
114
+ # If true, uses the password salt as remember token. This should be turned
115
+ # to false if you are not using database authenticatable.
116
+ config.use_salt_as_remember_token = true
117
+
118
+ # Options to be passed to the created cookie. For instance, you can set
119
+ # :secure => true in order to force SSL only cookies.
120
+ # config.cookie_options = {}
121
+
122
+ # ==> Configuration for :validatable
123
+ # Range for password length. Default is 6..128.
124
+ # config.password_length = 6..128
125
+
126
+ # Email regex used to validate email formats. It simply asserts that
127
+ # an one (and only one) @ exists in the given string. This is mainly
128
+ # to give user feedback and not to assert the e-mail validity.
129
+ # config.email_regexp = /\A[^@]+@[^@]+\z/
130
+
10
131
  # ==> Configuration for :timeoutable
11
132
  # The time you want to timeout the user session without activity. After this
12
133
  # time the user will be asked for credentials again. Default is 30 minutes.
@@ -35,14 +156,28 @@ Devise.setup do |config|
35
156
  # Time interval to unlock the account if :time is enabled as unlock_strategy.
36
157
  # config.unlock_in = 1.hour
37
158
 
159
+ # ==> Configuration for :recoverable
160
+ #
161
+ # Defines which key will be used when recovering the password for an account
162
+ # config.reset_password_keys = [ :email ]
163
+
164
+ # Time interval you can reset your password with a reset password key.
165
+ # Don't put a too small interval or your users won't have the time to
166
+ # change their passwords.
167
+ config.reset_password_within = 6.hours
168
+
169
+ # ==> Configuration for :encryptable
170
+ # Allow you to use another encryption algorithm besides bcrypt (default). You can use
171
+ # :sha1, :sha512 or encryptors from others authentication tools as :clearance_sha1,
172
+ # :authlogic_sha512 (then you should set stretches above to 20 for default behavior)
173
+ # and :restful_authentication_sha1 (then you should set stretches to 10, and copy
174
+ # REST_AUTH_SITE_KEY to pepper)
175
+ # config.encryptor = :sha512
176
+
38
177
  # ==> Configuration for :token_authenticatable
39
178
  # Defines name of the authentication token params key
40
179
  # config.token_authentication_key = :auth_token
41
180
 
42
- # If true, authentication through token does not store user in session and needs
43
- # to be supplied on each request. Useful if you are using the token as API token.
44
- # config.stateless_token = false
45
-
46
181
  # ==> Scopes configuration
47
182
  # Turn scoped views on. Before rendering "sessions/new", it will first check for
48
183
  # "users/sessions/new". It's turned off by default because it's slower if you
@@ -66,10 +201,23 @@ Devise.setup do |config|
66
201
  # If you have any extra navigational formats, like :iphone or :mobile, you
67
202
  # should add them to the navigational formats lists.
68
203
  #
69
- # The :"*/*" and "*/*" formats below is required to match Internet
70
- # Explorer requests.
71
- # config.navigational_formats = [:"*/*", "*/*", :html]
204
+ # The "*/*" below is required to match Internet Explorer requests.
205
+ # config.navigational_formats = ["*/*", :html]
72
206
 
73
207
  # The default HTTP method used to sign out a resource. Default is :delete.
74
208
  config.sign_out_via = :delete
209
+
210
+ # ==> OmniAuth
211
+ # Add a new OmniAuth provider. Check the wiki for more information on setting
212
+ # up on your models and hooks.
213
+ # config.omniauth :github, 'APP_ID', 'APP_SECRET', :scope => 'user,public_repo'
214
+
215
+ # ==> Warden configuration
216
+ # If you want to use other strategies, that are not supported by Devise, or
217
+ # change the failure app, you can configure them inside the config.warden block.
218
+ #
219
+ # config.warden do |manager|
220
+ # manager.intercept_401 = false
221
+ # manager.default_strategies(:scope => :user).unshift :some_external_strategy
222
+ # end
75
223
  end
@@ -1,3 +1,3 @@
1
1
  module SsoClient
2
- VERSION = "0.4.2"
2
+ VERSION = "0.4.3"
3
3
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: sso_client
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.2
4
+ version: 0.4.3
5
5
  prerelease:
6
6
  platform: ruby
7
7
  authors:
@@ -9,11 +9,11 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2012-01-24 00:00:00.000000000 Z
12
+ date: 2012-01-30 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: rails
16
- requirement: &19952480 !ruby/object:Gem::Requirement
16
+ requirement: &21964280 !ruby/object:Gem::Requirement
17
17
  none: false
18
18
  requirements:
19
19
  - - ! '>='
@@ -21,10 +21,10 @@ dependencies:
21
21
  version: '0'
22
22
  type: :runtime
23
23
  prerelease: false
24
- version_requirements: *19952480
24
+ version_requirements: *21964280
25
25
  - !ruby/object:Gem::Dependency
26
26
  name: configliere
27
- requirement: &19950600 !ruby/object:Gem::Requirement
27
+ requirement: &21963800 !ruby/object:Gem::Requirement
28
28
  none: false
29
29
  requirements:
30
30
  - - ! '>='
@@ -32,10 +32,10 @@ dependencies:
32
32
  version: '0'
33
33
  type: :runtime
34
34
  prerelease: false
35
- version_requirements: *19950600
35
+ version_requirements: *21963800
36
36
  - !ruby/object:Gem::Dependency
37
37
  name: devise
38
- requirement: &19949500 !ruby/object:Gem::Requirement
38
+ requirement: &21963180 !ruby/object:Gem::Requirement
39
39
  none: false
40
40
  requirements:
41
41
  - - ! '>='
@@ -43,10 +43,21 @@ dependencies:
43
43
  version: '0'
44
44
  type: :runtime
45
45
  prerelease: false
46
- version_requirements: *19949500
46
+ version_requirements: *21963180
47
+ - !ruby/object:Gem::Dependency
48
+ name: devise-russian
49
+ requirement: &21962500 !ruby/object:Gem::Requirement
50
+ none: false
51
+ requirements:
52
+ - - ! '>='
53
+ - !ruby/object:Gem::Version
54
+ version: '0'
55
+ type: :runtime
56
+ prerelease: false
57
+ version_requirements: *21962500
47
58
  - !ruby/object:Gem::Dependency
48
59
  name: omniauth
49
- requirement: &19948180 !ruby/object:Gem::Requirement
60
+ requirement: &21961880 !ruby/object:Gem::Requirement
50
61
  none: false
51
62
  requirements:
52
63
  - - ! '>='
@@ -54,10 +65,10 @@ dependencies:
54
65
  version: '0'
55
66
  type: :runtime
56
67
  prerelease: false
57
- version_requirements: *19948180
68
+ version_requirements: *21961880
58
69
  - !ruby/object:Gem::Dependency
59
70
  name: omniauth-oauth2
60
- requirement: &19945320 !ruby/object:Gem::Requirement
71
+ requirement: &21961160 !ruby/object:Gem::Requirement
61
72
  none: false
62
73
  requirements:
63
74
  - - ! '>='
@@ -65,10 +76,10 @@ dependencies:
65
76
  version: '0'
66
77
  type: :runtime
67
78
  prerelease: false
68
- version_requirements: *19945320
79
+ version_requirements: *21961160
69
80
  - !ruby/object:Gem::Dependency
70
81
  name: fabrication
71
- requirement: &19943640 !ruby/object:Gem::Requirement
82
+ requirement: &21960660 !ruby/object:Gem::Requirement
72
83
  none: false
73
84
  requirements:
74
85
  - - ! '>='
@@ -76,10 +87,10 @@ dependencies:
76
87
  version: '0'
77
88
  type: :development
78
89
  prerelease: false
79
- version_requirements: *19943640
90
+ version_requirements: *21960660
80
91
  - !ruby/object:Gem::Dependency
81
92
  name: guard-rspec
82
- requirement: &19941960 !ruby/object:Gem::Requirement
93
+ requirement: &21960060 !ruby/object:Gem::Requirement
83
94
  none: false
84
95
  requirements:
85
96
  - - ! '>='
@@ -87,10 +98,10 @@ dependencies:
87
98
  version: '0'
88
99
  type: :development
89
100
  prerelease: false
90
- version_requirements: *19941960
101
+ version_requirements: *21960060
91
102
  - !ruby/object:Gem::Dependency
92
103
  name: guard-spork
93
- requirement: &19940020 !ruby/object:Gem::Requirement
104
+ requirement: &21959080 !ruby/object:Gem::Requirement
94
105
  none: false
95
106
  requirements:
96
107
  - - ! '>='
@@ -98,10 +109,10 @@ dependencies:
98
109
  version: '0'
99
110
  type: :development
100
111
  prerelease: false
101
- version_requirements: *19940020
112
+ version_requirements: *21959080
102
113
  - !ruby/object:Gem::Dependency
103
114
  name: libnotify
104
- requirement: &19938800 !ruby/object:Gem::Requirement
115
+ requirement: &21953860 !ruby/object:Gem::Requirement
105
116
  none: false
106
117
  requirements:
107
118
  - - ! '>='
@@ -109,10 +120,10 @@ dependencies:
109
120
  version: '0'
110
121
  type: :development
111
122
  prerelease: false
112
- version_requirements: *19938800
123
+ version_requirements: *21953860
113
124
  - !ruby/object:Gem::Dependency
114
125
  name: rb-inotify
115
- requirement: &19937140 !ruby/object:Gem::Requirement
126
+ requirement: &21952860 !ruby/object:Gem::Requirement
116
127
  none: false
117
128
  requirements:
118
129
  - - ! '>='
@@ -120,10 +131,10 @@ dependencies:
120
131
  version: '0'
121
132
  type: :development
122
133
  prerelease: false
123
- version_requirements: *19937140
134
+ version_requirements: *21952860
124
135
  - !ruby/object:Gem::Dependency
125
136
  name: rspec-rails
126
- requirement: &19935860 !ruby/object:Gem::Requirement
137
+ requirement: &21952100 !ruby/object:Gem::Requirement
127
138
  none: false
128
139
  requirements:
129
140
  - - ! '>='
@@ -131,10 +142,10 @@ dependencies:
131
142
  version: '0'
132
143
  type: :development
133
144
  prerelease: false
134
- version_requirements: *19935860
145
+ version_requirements: *21952100
135
146
  - !ruby/object:Gem::Dependency
136
147
  name: shoulda-matchers
137
- requirement: &19931540 !ruby/object:Gem::Requirement
148
+ requirement: &21951320 !ruby/object:Gem::Requirement
138
149
  none: false
139
150
  requirements:
140
151
  - - ! '>='
@@ -142,10 +153,10 @@ dependencies:
142
153
  version: '0'
143
154
  type: :development
144
155
  prerelease: false
145
- version_requirements: *19931540
156
+ version_requirements: *21951320
146
157
  - !ruby/object:Gem::Dependency
147
158
  name: spork
148
- requirement: &19929140 !ruby/object:Gem::Requirement
159
+ requirement: &21950720 !ruby/object:Gem::Requirement
149
160
  none: false
150
161
  requirements:
151
162
  - - ! '>='
@@ -153,10 +164,10 @@ dependencies:
153
164
  version: '0'
154
165
  type: :development
155
166
  prerelease: false
156
- version_requirements: *19929140
167
+ version_requirements: *21950720
157
168
  - !ruby/object:Gem::Dependency
158
169
  name: sqlite3
159
- requirement: &19928280 !ruby/object:Gem::Requirement
170
+ requirement: &21950200 !ruby/object:Gem::Requirement
160
171
  none: false
161
172
  requirements:
162
173
  - - ! '>='
@@ -164,7 +175,7 @@ dependencies:
164
175
  version: '0'
165
176
  type: :development
166
177
  prerelease: false
167
- version_requirements: *19928280
178
+ version_requirements: *21950200
168
179
  description: Client gem for connecting to SSO server (http://github.com/openteam/sso_server)
169
180
  email:
170
181
  - lda@openteam.ru
@@ -201,7 +212,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
201
212
  version: '0'
202
213
  segments:
203
214
  - 0
204
- hash: -4380210081594473515
215
+ hash: -3173358716531986839
205
216
  required_rubygems_version: !ruby/object:Gem::Requirement
206
217
  none: false
207
218
  requirements:
@@ -210,10 +221,10 @@ required_rubygems_version: !ruby/object:Gem::Requirement
210
221
  version: '0'
211
222
  segments:
212
223
  - 0
213
- hash: -4380210081594473515
224
+ hash: -3173358716531986839
214
225
  requirements: []
215
226
  rubyforge_project:
216
- rubygems_version: 1.8.10
227
+ rubygems_version: 1.8.15
217
228
  signing_key:
218
229
  specification_version: 3
219
230
  summary: Client gem for connecting to SSO server