web-push 1.0.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,162 @@
1
+ require 'spec_helper'
2
+
3
+ describe WebPush::Request do
4
+ describe '#headers' do
5
+ let(:request) { build_request }
6
+
7
+ it { expect(request.headers['Content-Type']).to eq('application/octet-stream') }
8
+ it { expect(request.headers['Ttl']).to eq('2419200') }
9
+ it { expect(request.headers['Urgency']).to eq('normal') }
10
+
11
+ describe 'from :message' do
12
+ it 'inserts encryption headers for valid payload' do
13
+ allow(WebPush::Encryption).to receive(:encrypt).and_return('encrypted')
14
+ request = build_request(message: 'Hello')
15
+
16
+ expect(request.headers['Content-Encoding']).to eq('aes128gcm')
17
+ expect(request.headers['Content-Length']).to eq('9')
18
+ end
19
+ end
20
+
21
+ describe 'from :api_key' do
22
+ def build_request_with_api_key(endpoint, options = {})
23
+ subscription = {
24
+ endpoint: endpoint,
25
+ keys: {
26
+ p256dh: 'p256dh',
27
+ auth: 'auth'
28
+ }
29
+ }
30
+ WebPush::Request.new(message: '', subscription: subscription, vapid: {}, **options)
31
+ end
32
+
33
+ it 'inserts Authorization header when api_key present, and endpoint is for Chrome\'s non-standards-compliant GCM endpoints' do
34
+ request = build_request_with_api_key('https://gcm-http.googleapis.com/gcm/xyz', api_key: 'api_key')
35
+
36
+ expect(request.headers['Authorization']).to eq('key=api_key')
37
+ end
38
+
39
+ it 'insert Authorization header for Chrome\'s new standards-compliant endpoints, even if api_key is present' do
40
+ request = build_request_with_api_key('https://fcm.googleapis.com/fcm/send/ABCD1234', api_key: 'api_key')
41
+
42
+ expect(request.headers['Authorization']).to eq('key=api_key')
43
+ end
44
+
45
+ it 'does not insert Authorization header when endpoint is not for Chrome, even if api_key is present' do
46
+ request = build_request_with_api_key('https://some.random.endpoint.com/xyz', api_key: 'api_key')
47
+
48
+ expect(request.headers['Authorization']).to be_nil
49
+ end
50
+
51
+ it 'does not insert Authorization header when api_key blank' do
52
+ request = build_request_with_api_key('endpoint', api_key: nil)
53
+
54
+ expect(request.headers['Authorization']).to be_nil
55
+
56
+ request = build_request_with_api_key('endpoint', api_key: '')
57
+
58
+ expect(request.headers['Authorization']).to be_nil
59
+
60
+ request = build_request_with_api_key('endpoint')
61
+
62
+ expect(request.headers['Authorization']).to be_nil
63
+ end
64
+ end
65
+
66
+ describe 'from :ttl' do
67
+ it 'can override Ttl with :ttl option with string' do
68
+ request = build_request(ttl: '300')
69
+
70
+ expect(request.headers['Ttl']).to eq('300')
71
+ end
72
+
73
+ it 'can override Ttl with :ttl option with fixnum' do
74
+ request = build_request(ttl: 60 * 5)
75
+
76
+ expect(request.headers['Ttl']).to eq('300')
77
+ end
78
+ end
79
+
80
+ describe 'from :urgency' do
81
+ it 'can override Urgency with :urgency option' do
82
+ request = build_request(urgency: 'high')
83
+
84
+ expect(request.headers['Urgency']).to eq('high')
85
+ end
86
+ end
87
+ end
88
+
89
+ describe '#build_vapid_header' do
90
+ it 'returns the VAPID header' do
91
+ time = Time.at(1_476_150_897)
92
+ jwt_payload = {
93
+ aud: 'https://fcm.googleapis.com',
94
+ exp: time.to_i + 24 * 60 * 60,
95
+ sub: 'mailto:sender@example.com'
96
+ }
97
+ jwt_header_fields = { "typ": "JWT", "alg": "ES256" }
98
+
99
+ vapid_key = WebPush::VapidKey.from_keys(vapid_public_key, vapid_private_key)
100
+ expect(Time).to receive(:now).and_return(time)
101
+ expect(WebPush::VapidKey).to receive(:from_keys).with(vapid_public_key, vapid_private_key).and_return(vapid_key)
102
+ expect(JWT).to receive(:encode).with(jwt_payload, vapid_key.curve, 'ES256', jwt_header_fields).and_return('jwt.encoded.payload')
103
+
104
+ request = build_request
105
+ header = request.build_vapid_header
106
+
107
+ expect(header).to eq("vapid t=jwt.encoded.payload,k=#{vapid_public_key.delete('=')}")
108
+ end
109
+
110
+ it 'supports PEM format' do
111
+ pem = WebPush::VapidKey.new.to_pem
112
+ expect(WebPush::VapidKey).to receive(:from_pem).with(pem).and_call_original
113
+ request = build_request(vapid: { subject: 'mailto:sender@example.com', pem: pem })
114
+ request.build_vapid_header
115
+ end
116
+ end
117
+
118
+ describe '#body' do
119
+ it 'is set to the payload if a message is provided' do
120
+ allow(WebPush::Encryption).to receive(:encrypt).and_return('encrypted')
121
+
122
+ request = build_request(message: 'Hello')
123
+
124
+ expect(request.body).to eq('encrypted')
125
+ end
126
+
127
+ it 'is empty string when no message is provided' do
128
+ request = build_request
129
+
130
+ expect(request.body).to eq('')
131
+ end
132
+ end
133
+
134
+ describe '#proxy_options' do
135
+ it 'returns an array of proxy options' do
136
+ request = build_request(proxy: 'http://user:password@proxy_addr:8080')
137
+
138
+ expect(request.proxy_options).to eq(['proxy_addr', 8080, 'user', 'password'])
139
+ end
140
+
141
+ it 'returns empty array' do
142
+ request = build_request
143
+
144
+ expect(request.proxy_options).to be_empty
145
+ end
146
+ end
147
+
148
+ def build_request(options = {})
149
+ subscription = {
150
+ endpoint: endpoint,
151
+ keys: {
152
+ p256dh: 'p256dh',
153
+ auth: 'auth'
154
+ }
155
+ }
156
+ WebPush::Request.new(message: '', subscription: subscription, vapid: vapid_options, **options)
157
+ end
158
+
159
+ def endpoint
160
+ 'https://fcm.googleapis.com/gcm/send/subscription-id'
161
+ end
162
+ end
@@ -0,0 +1,66 @@
1
+ require 'spec_helper'
2
+
3
+ describe WebPush::VapidKey do
4
+ it 'generates an elliptic curve' do
5
+ key = WebPush::VapidKey.new
6
+ expect(key.curve).to be_a(OpenSSL::PKey::EC)
7
+ expect(key.curve_name).to eq('prime256v1')
8
+ end
9
+
10
+ it 'returns an encoded public key' do
11
+ key = WebPush::VapidKey.new
12
+
13
+ expect(Base64.urlsafe_decode64(key.public_key).bytesize).to eq(65)
14
+ end
15
+
16
+ it 'returns an encoded private key' do
17
+ key = WebPush::VapidKey.new
18
+
19
+ expect(Base64.urlsafe_decode64(key.private_key).bytesize).to eq(32)
20
+ end
21
+
22
+ it 'pretty prints encoded keys' do
23
+ key = WebPush::VapidKey.new
24
+ printed = key.inspect
25
+
26
+ expect(printed).to match(/public_key=#{key.public_key}/)
27
+ expect(printed).to match(/private_key=#{key.private_key}/)
28
+ end
29
+
30
+ it 'returns hash of public and private keys' do
31
+ key = WebPush::VapidKey.new
32
+ hash = key.to_h
33
+
34
+ expect(hash[:public_key]).to eq(key.public_key)
35
+ expect(hash[:private_key]).to eq(key.private_key)
36
+ end
37
+
38
+ it 'returns pem of public and private keys' do
39
+ key = WebPush::VapidKey.new
40
+ pem = key.to_pem
41
+
42
+ expect(pem).to include('-----BEGIN EC PRIVATE KEY-----')
43
+ expect(pem).to include('-----BEGIN PUBLIC KEY-----')
44
+ end
45
+
46
+ it 'imports pem of public and private keys' do
47
+ pem = WebPush::VapidKey.new.to_pem
48
+ key = WebPush::VapidKey.from_pem pem
49
+
50
+ expect(key.to_pem).to eq(pem)
51
+ end
52
+
53
+ describe 'self.from_keys' do
54
+ it 'returns an encoded public key' do
55
+ key = WebPush::VapidKey.from_keys(vapid_public_key, vapid_private_key)
56
+
57
+ expect(key.public_key).to eq(vapid_public_key)
58
+ end
59
+
60
+ it 'returns an encoded private key' do
61
+ key = WebPush::VapidKey.from_keys(vapid_public_key, vapid_private_key)
62
+
63
+ expect(key.private_key).to eq(vapid_private_key)
64
+ end
65
+ end
66
+ end
@@ -0,0 +1,253 @@
1
+ require 'spec_helper'
2
+
3
+ describe WebPush do
4
+ it 'has a version number' do
5
+ expect(WebPush::VERSION).not_to be nil
6
+ end
7
+
8
+ shared_examples 'web push protocol standard error handling' do
9
+ it 'raises InvalidSubscription if the API returns a 404 Error' do
10
+ stub_request(:post, expected_endpoint)
11
+ .to_return(status: 404, body: '', headers: {})
12
+ expect { subject }.to raise_error(WebPush::InvalidSubscription)
13
+ end
14
+
15
+ it 'raises ExpiredSubscription if the API returns a 410 Error' do
16
+ stub_request(:post, expected_endpoint)
17
+ .to_return(status: 410, body: '', headers: {})
18
+ expect { subject }.to raise_error(WebPush::ExpiredSubscription)
19
+ end
20
+
21
+ it 'raises Unauthorized if the API returns a 401 Error, a 403 Error or 400 with specific message' do
22
+ stub_request(:post, expected_endpoint)
23
+ .to_return(status: 401, body: '', headers: {})
24
+ expect { subject }.to raise_error(WebPush::Unauthorized)
25
+
26
+ stub_request(:post, expected_endpoint)
27
+ .to_return(status: 403, body: '', headers: {})
28
+ expect { subject }.to raise_error(WebPush::Unauthorized)
29
+
30
+ stub_request(:post, expected_endpoint)
31
+ .to_return(status: [400, 'UnauthorizedRegistration'], body: '', headers: {})
32
+ expect { subject }.to raise_error(WebPush::Unauthorized)
33
+ end
34
+
35
+ it 'raises PayloadTooLarge if the API returns a 413 Error' do
36
+ stub_request(:post, expected_endpoint)
37
+ .to_return(status: 413, body: '', headers: {})
38
+ expect { subject }.to raise_error(WebPush::PayloadTooLarge)
39
+ end
40
+
41
+ it 'raises TooManyRequests if the API returns a 429 Error' do
42
+ stub_request(:post, expected_endpoint)
43
+ .to_return(status: 429, body: '', headers: {})
44
+ expect { subject }.to raise_error(WebPush::TooManyRequests)
45
+ end
46
+
47
+ it 'raises PushServiceError if the API returns a 5xx Error' do
48
+ stub_request(:post, expected_endpoint)
49
+ .to_return(status: 500, body: '', headers: {})
50
+ expect { subject }.to raise_error(WebPush::PushServiceError)
51
+
52
+ stub_request(:post, expected_endpoint)
53
+ .to_return(status: 503, body: '', headers: {})
54
+ expect { subject }.to raise_error(WebPush::PushServiceError)
55
+ end
56
+
57
+ it 'raises ResponseError for unsuccessful status code by default' do
58
+ stub_request(:post, expected_endpoint)
59
+ .to_return(status: 401, body: '', headers: {})
60
+
61
+ expect { subject }.to raise_error(WebPush::ResponseError)
62
+ end
63
+
64
+ it 'supplies the original status code on the ResponseError' do
65
+ stub_request(:post, expected_endpoint)
66
+ .to_return(status: 401, body: 'Oh snap', headers: {})
67
+
68
+ expect { subject }.to raise_error { |error|
69
+ expect(error).to be_a(WebPush::ResponseError)
70
+ expect(error.response.code).to eq '401'
71
+ expect(error.response.body).to eq 'Oh snap'
72
+ }
73
+ end
74
+
75
+ it 'sets the error message to be the host + stringified response' do
76
+ stub_request(:post, expected_endpoint)
77
+ .to_return(status: 401, body: 'Oh snap', headers: {})
78
+
79
+ host = URI.parse(expected_endpoint).host
80
+
81
+ expect { subject }.to raise_error { |error|
82
+ expect(error.message).to eq(
83
+ "host: #{host}, #<Net::HTTPUnauthorized 401 readbody=true>\nbody:\nOh snap"
84
+ )
85
+ }
86
+ end
87
+
88
+ it 'raises exception on error by default' do
89
+ stub_request(:post, expected_endpoint).to_raise(StandardError)
90
+
91
+ expect { subject }.to raise_error(StandardError)
92
+ end
93
+ end
94
+
95
+ shared_examples 'request headers with VAPID' do
96
+ let(:message) { JSON.generate(body: 'body') }
97
+ let(:p256dh) { 'BN4GvZtEZiZuqFxSKVZfSfluwKBD7UxHNBmWkfiZfCtgDE8Bwh-_MtLXbBxTBAWH9r7IPKL0lhdcaqtL1dfxU5E=' }
98
+ let(:auth) { 'Q2BoAjC09xH3ywDLNJr-dA==' }
99
+ let(:payload) { "encrypted" }
100
+ let(:expected_body) { payload }
101
+ let(:expected_headers) do
102
+ {
103
+ 'Accept' => '*/*',
104
+ 'Accept-Encoding' => 'gzip;q=1.0,deflate;q=0.6,identity;q=0.3',
105
+ 'Content-Encoding' => 'aes128gcm',
106
+ 'Content-Type' => 'application/octet-stream',
107
+ 'Ttl' => '2419200',
108
+ 'Urgency' => 'normal',
109
+ 'User-Agent' => 'Ruby'
110
+ }
111
+ end
112
+
113
+ let(:vapid_header) { "vapid t=jwt.encoded.payload,k=#{vapid_public_key.delete('=')}" }
114
+
115
+ before do
116
+ allow(WebPush::Encryption).to receive(:encrypt).and_return(payload)
117
+ allow(JWT).to receive(:encode).and_return('jwt.encoded.payload')
118
+ end
119
+
120
+ subject do
121
+ WebPush.payload_send(
122
+ message: message,
123
+ endpoint: endpoint,
124
+ p256dh: p256dh,
125
+ auth: auth,
126
+ vapid: vapid_options
127
+ )
128
+ end
129
+
130
+ it 'calls the relevant service with the correct headers' do
131
+ expect(WebPush::Encryption).to receive(:encrypt).and_return(payload)
132
+
133
+ expected_headers['Authorization'] = vapid_header
134
+
135
+ stub_request(:post, expected_endpoint)
136
+ .with(body: expected_body, headers: expected_headers)
137
+ .to_return(status: 201, body: '', headers: {})
138
+
139
+ result = subject
140
+
141
+ expect(result).to be_a(Net::HTTPCreated)
142
+ expect(result.code).to eql('201')
143
+ end
144
+
145
+ include_examples 'web push protocol standard error handling'
146
+
147
+ it 'message is optional' do
148
+ expect(WebPush::Encryption).to_not receive(:encrypt)
149
+
150
+ expected_headers.delete('Crypto-Key')
151
+ expected_headers.delete('Content-Encoding')
152
+ expected_headers.delete('Encryption')
153
+
154
+ stub_request(:post, expected_endpoint)
155
+ .with(body: nil, headers: expected_headers)
156
+ .to_return(status: 201, body: '', headers: {})
157
+
158
+ WebPush.payload_send(endpoint: endpoint)
159
+ end
160
+
161
+ it 'vapid options are optional' do
162
+ expect(WebPush::Encryption).to receive(:encrypt).and_return(payload)
163
+
164
+ expected_headers.delete('Crypto-Key')
165
+ expected_headers.delete('Authorization')
166
+
167
+ stub_request(:post, expected_endpoint)
168
+ .with(body: expected_body, headers: expected_headers)
169
+ .to_return(status: 201, body: '', headers: {})
170
+
171
+ result = WebPush.payload_send(
172
+ message: message,
173
+ endpoint: endpoint,
174
+ p256dh: p256dh,
175
+ auth: auth
176
+ )
177
+
178
+ expect(result).to be_a(Net::HTTPCreated)
179
+ expect(result.code).to eql('201')
180
+ end
181
+ end
182
+
183
+ context 'chrome FCM endpoint' do
184
+ let(:endpoint) { 'https://fcm.googleapis.com/gcm/send/subscription-id' }
185
+ let(:expected_endpoint) { endpoint }
186
+
187
+ include_examples 'request headers with VAPID'
188
+ end
189
+
190
+ context 'firefox endpoint' do
191
+ let(:endpoint) { 'https://updates.push.services.mozilla.com/push/v1/subscription-id' }
192
+ let(:expected_endpoint) { endpoint }
193
+
194
+ include_examples 'request headers with VAPID'
195
+ end
196
+
197
+ context 'chrome GCM endpoint: request headers with GCM api key' do
198
+ let(:endpoint) { 'https://android.googleapis.com/gcm/send/subscription-id' }
199
+ let(:expected_endpoint) { 'https://fcm.googleapis.com/fcm/subscription-id' }
200
+
201
+ let(:message) { JSON.generate(body: 'body') }
202
+ let(:p256dh) { 'BN4GvZtEZiZuqFxSKVZfSfluwKBD7UxHNBmWkfiZfCtgDE8Bwh-_MtLXbBxTBAWH9r7IPKL0lhdcaqtL1dfxU5E=' }
203
+ let(:auth) { 'Q2BoAjC09xH3ywDLNJr-dA==' }
204
+ let(:payload) { "encrypted" }
205
+ let(:expected_body) { payload }
206
+ let(:expected_headers) do
207
+ {
208
+ 'Accept' => '*/*',
209
+ 'Accept-Encoding' => 'gzip;q=1.0,deflate;q=0.6,identity;q=0.3',
210
+ 'Content-Encoding' => 'aes128gcm',
211
+ 'Content-Type' => 'application/octet-stream',
212
+ 'Ttl' => '2419200',
213
+ 'Urgency' => 'normal',
214
+ 'User-Agent' => 'Ruby'
215
+ }
216
+ end
217
+
218
+ let(:subscription) {}
219
+
220
+ before do
221
+ allow(WebPush::Encryption).to receive(:encrypt).and_return(payload)
222
+ end
223
+
224
+ subject { WebPush.payload_send(message: message, endpoint: endpoint, p256dh: p256dh, auth: auth, api_key: 'GCM_API_KEY') }
225
+
226
+ it 'calls the relevant service with the correct headers' do
227
+ expect(WebPush::Encryption).to receive(:encrypt).and_return(payload)
228
+
229
+ stub_request(:post, expected_endpoint)
230
+ .with(body: expected_body, headers: expected_headers)
231
+ .to_return(status: 201, body: '', headers: {})
232
+
233
+ result = subject
234
+
235
+ expect(result).to be_a(Net::HTTPCreated)
236
+ expect(result.code).to eql('201')
237
+ end
238
+
239
+ include_examples 'web push protocol standard error handling'
240
+
241
+ it 'message and encryption keys are optional' do
242
+ expect(WebPush::Encryption).to_not receive(:encrypt)
243
+
244
+ expected_headers.delete('Content-Encoding')
245
+
246
+ stub_request(:post, expected_endpoint)
247
+ .with(body: nil, headers: expected_headers)
248
+ .to_return(status: 201, body: '', headers: {})
249
+
250
+ WebPush.payload_send(endpoint: endpoint, api_key: 'GCM_API_KEY')
251
+ end
252
+ end
253
+ end
data/web-push.gemspec ADDED
@@ -0,0 +1,25 @@
1
+ require_relative 'lib/web_push/version'
2
+
3
+ Gem::Specification.new do |spec|
4
+ spec.name = 'web-push'
5
+ spec.version = WebPush::VERSION
6
+ spec.authors = ['zaru', 'collimarco']
7
+ spec.email = ['support@pushpad.xyz']
8
+
9
+ spec.summary = 'Web Push library for Ruby (RFC8030)'
10
+ spec.homepage = 'https://github.com/pushpad/web-push'
11
+
12
+ spec.files = `git ls-files`.split("\n")
13
+
14
+ spec.required_ruby_version = '>= 2.2'
15
+
16
+ spec.add_dependency 'hkdf', '~> 0.2'
17
+ spec.add_dependency 'jwt', '~> 2.0'
18
+
19
+ spec.add_development_dependency 'bundler', '>= 1.17.3'
20
+ spec.add_development_dependency 'pry'
21
+ spec.add_development_dependency 'rake', '>= 10.0'
22
+ spec.add_development_dependency 'rspec', '~> 3.0'
23
+ spec.add_development_dependency 'simplecov'
24
+ spec.add_development_dependency 'webmock', '~> 3.0'
25
+ end
metadata ADDED
@@ -0,0 +1,183 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: web-push
3
+ version: !ruby/object:Gem::Version
4
+ version: 1.0.0
5
+ platform: ruby
6
+ authors:
7
+ - zaru
8
+ - collimarco
9
+ autorequire:
10
+ bindir: bin
11
+ cert_chain: []
12
+ date: 2022-11-26 00:00:00.000000000 Z
13
+ dependencies:
14
+ - !ruby/object:Gem::Dependency
15
+ name: hkdf
16
+ requirement: !ruby/object:Gem::Requirement
17
+ requirements:
18
+ - - "~>"
19
+ - !ruby/object:Gem::Version
20
+ version: '0.2'
21
+ type: :runtime
22
+ prerelease: false
23
+ version_requirements: !ruby/object:Gem::Requirement
24
+ requirements:
25
+ - - "~>"
26
+ - !ruby/object:Gem::Version
27
+ version: '0.2'
28
+ - !ruby/object:Gem::Dependency
29
+ name: jwt
30
+ requirement: !ruby/object:Gem::Requirement
31
+ requirements:
32
+ - - "~>"
33
+ - !ruby/object:Gem::Version
34
+ version: '2.0'
35
+ type: :runtime
36
+ prerelease: false
37
+ version_requirements: !ruby/object:Gem::Requirement
38
+ requirements:
39
+ - - "~>"
40
+ - !ruby/object:Gem::Version
41
+ version: '2.0'
42
+ - !ruby/object:Gem::Dependency
43
+ name: bundler
44
+ requirement: !ruby/object:Gem::Requirement
45
+ requirements:
46
+ - - ">="
47
+ - !ruby/object:Gem::Version
48
+ version: 1.17.3
49
+ type: :development
50
+ prerelease: false
51
+ version_requirements: !ruby/object:Gem::Requirement
52
+ requirements:
53
+ - - ">="
54
+ - !ruby/object:Gem::Version
55
+ version: 1.17.3
56
+ - !ruby/object:Gem::Dependency
57
+ name: pry
58
+ requirement: !ruby/object:Gem::Requirement
59
+ requirements:
60
+ - - ">="
61
+ - !ruby/object:Gem::Version
62
+ version: '0'
63
+ type: :development
64
+ prerelease: false
65
+ version_requirements: !ruby/object:Gem::Requirement
66
+ requirements:
67
+ - - ">="
68
+ - !ruby/object:Gem::Version
69
+ version: '0'
70
+ - !ruby/object:Gem::Dependency
71
+ name: rake
72
+ requirement: !ruby/object:Gem::Requirement
73
+ requirements:
74
+ - - ">="
75
+ - !ruby/object:Gem::Version
76
+ version: '10.0'
77
+ type: :development
78
+ prerelease: false
79
+ version_requirements: !ruby/object:Gem::Requirement
80
+ requirements:
81
+ - - ">="
82
+ - !ruby/object:Gem::Version
83
+ version: '10.0'
84
+ - !ruby/object:Gem::Dependency
85
+ name: rspec
86
+ requirement: !ruby/object:Gem::Requirement
87
+ requirements:
88
+ - - "~>"
89
+ - !ruby/object:Gem::Version
90
+ version: '3.0'
91
+ type: :development
92
+ prerelease: false
93
+ version_requirements: !ruby/object:Gem::Requirement
94
+ requirements:
95
+ - - "~>"
96
+ - !ruby/object:Gem::Version
97
+ version: '3.0'
98
+ - !ruby/object:Gem::Dependency
99
+ name: simplecov
100
+ requirement: !ruby/object:Gem::Requirement
101
+ requirements:
102
+ - - ">="
103
+ - !ruby/object:Gem::Version
104
+ version: '0'
105
+ type: :development
106
+ prerelease: false
107
+ version_requirements: !ruby/object:Gem::Requirement
108
+ requirements:
109
+ - - ">="
110
+ - !ruby/object:Gem::Version
111
+ version: '0'
112
+ - !ruby/object:Gem::Dependency
113
+ name: webmock
114
+ requirement: !ruby/object:Gem::Requirement
115
+ requirements:
116
+ - - "~>"
117
+ - !ruby/object:Gem::Version
118
+ version: '3.0'
119
+ type: :development
120
+ prerelease: false
121
+ version_requirements: !ruby/object:Gem::Requirement
122
+ requirements:
123
+ - - "~>"
124
+ - !ruby/object:Gem::Version
125
+ version: '3.0'
126
+ description:
127
+ email:
128
+ - support@pushpad.xyz
129
+ executables: []
130
+ extensions: []
131
+ extra_rdoc_files: []
132
+ files:
133
+ - ".gitignore"
134
+ - ".rspec"
135
+ - ".rubocop.yml"
136
+ - ".travis.yml"
137
+ - CHANGELOG.md
138
+ - Gemfile
139
+ - LICENSE
140
+ - README.md
141
+ - Rakefile
142
+ - bin/console
143
+ - bin/rake
144
+ - bin/rspec
145
+ - bin/setup
146
+ - lib/tasks/web_push.rake
147
+ - lib/web-push.rb
148
+ - lib/web_push.rb
149
+ - lib/web_push/encryption.rb
150
+ - lib/web_push/errors.rb
151
+ - lib/web_push/railtie.rb
152
+ - lib/web_push/request.rb
153
+ - lib/web_push/vapid_key.rb
154
+ - lib/web_push/version.rb
155
+ - spec/spec_helper.rb
156
+ - spec/web_push/encryption_spec.rb
157
+ - spec/web_push/request_spec.rb
158
+ - spec/web_push/vapid_key_spec.rb
159
+ - spec/web_push_spec.rb
160
+ - web-push.gemspec
161
+ homepage: https://github.com/pushpad/web-push
162
+ licenses: []
163
+ metadata: {}
164
+ post_install_message:
165
+ rdoc_options: []
166
+ require_paths:
167
+ - lib
168
+ required_ruby_version: !ruby/object:Gem::Requirement
169
+ requirements:
170
+ - - ">="
171
+ - !ruby/object:Gem::Version
172
+ version: '2.2'
173
+ required_rubygems_version: !ruby/object:Gem::Requirement
174
+ requirements:
175
+ - - ">="
176
+ - !ruby/object:Gem::Version
177
+ version: '0'
178
+ requirements: []
179
+ rubygems_version: 3.0.3.1
180
+ signing_key:
181
+ specification_version: 4
182
+ summary: Web Push library for Ruby (RFC8030)
183
+ test_files: []