Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Commits on Nov 21, 2014
  1. @petehamilton

    Remove Coveralls for now

    petehamilton authored
  2. @isaacseymour

    Merge pull request #76 from petems/add_spec_for_pre_authorised_bill

    isaacseymour authored
    Adds a basic spec for #create_bill
  3. @isaacseymour

    Merge pull request #77 from petems/add_resource_inspect_spec

    isaacseymour authored
    Adds spec for #inspect
  4. @petehamilton

    Add Coverage Status

    petehamilton authored
  5. @petems

    Adds a basic spec for #create_bill

    petems authored petems committed
  6. @petems

    Adds spec for #inspect

    petems authored petems committed
    Does a simple regex against string given from inspect
  7. @isaacseymour

    Merge pull request #78 from petems/patch-1

    isaacseymour authored
    Change install task
  8. @petems

    Fix indentation

    petems authored
  9. @petems

    Change install task

    petems authored
    See travis-ci/travis-ci#2821 for details, issues with parralel and rbx
Commits on Oct 31, 2014
  1. @petehamilton

    Bump version to 1.12.0

    petehamilton authored
  2. @petehamilton

    Merge pull request #74 from gocardless/prevent-bad-environments

    petehamilton authored
    Prevent setting bad GoCardless Environments
  3. @petehamilton
  4. @petehamilton

    Merge pull request #72 from gocardless/update-gems

    petehamilton authored
    Update Gem Dependencies
  5. @hmarr

    Merge pull request #73 from gocardless/fix-timezone-issues

    hmarr authored
    Fix timezone issues
Commits on Oct 30, 2014
  1. @petehamilton
Commits on Oct 27, 2014
  1. @petehamilton

    Update Gem Dependencies

    petehamilton authored
  2. @petehamilton

    Merge pull request #70 from gocardless/update-all-rspec

    petehamilton authored
    Upgrade RSpec & Convert specs to RSpec 3.1.7 syntax with Transpec
  3. @petehamilton

    Upgrade RSpec & Convert specs to RSpec 3.1.7 syntax with Transpec

    petehamilton authored
    This conversion is done by Transpec 2.3.7 with the following command:
        transpec -f
    
    * 171 conversions
        from: obj.should
          to: expect(obj).to
    
    * 109 conversions
        from: == expected
          to: eq(expected)
    
    * 43 conversions
        from: obj.should_receive(:message)
          to: expect(obj).to receive(:message)
    
    * 15 conversions
        from: it { should ... }
          to: it { is_expected.to ... }
    
    * 14 conversions
        from: obj.stub(:message)
          to: allow(obj).to receive(:message)
    
    * 4 conversions
        from: lambda { }.should
          to: expect { }.to
    
    * 2 conversions
        from: obj.should_not
          to: expect(obj).not_to
    
    * 2 conversions
        from: obj.should_not_receive(:message)
          to: expect(obj).not_to receive(:message)
    
    * 2 conversions
        from: obj.stub(:message => value)
          to: allow(obj).to receive_messages(:message => value)
    
    * 1 conversion
        from: obj.should
          to: expect(obj).to
    
    For more details: https://github.com/yujinakayama/transpec#supported-conversions
  4. @petehamilton

    Merge pull request #71 from gocardless/drop-ruby-1.8.7

    petehamilton authored
    Stop testing against Ruby 1.8
  5. @hmarr

    Merge pull request #69 from gocardless/fix-secure-compare-for-nil-values

    hmarr authored
    Handle nil values in secure_compare util
  6. @greysteil
  7. @petehamilton
  8. @hmarr

    Bump version to 1.11.2

    hmarr authored
  9. @hmarr

    Merge pull request #66 from gocardless/fix-spec-deprecations

    hmarr authored
    Fix spec deprecations
  10. @hmarr

    Merge pull request #68 from philnash/fix-timing-attack

    hmarr authored
    Uses a constant time string comparison to avoid timing attacks.
Commits on Oct 26, 2014
  1. @philnash

    Uses a constant time string comparison to avoid timing attacks.

    philnash authored
    Ruby's == string comparison will short circuit once it knows the string is not the same. This could allow a potential attacker to figure out the app secret with a timing attack against the user's webhook endpoint. This uses ActiveSupport's secure compare function to avoid that.
Commits on Sep 18, 2014
  1. @petehamilton
  2. @petehamilton
Commits on Sep 16, 2014
  1. @greysteil

    Fix typo

    greysteil authored
Commits on Aug 22, 2014
  1. @hmarr

    Bump version to v1.11.1

    hmarr authored
  2. @hmarr

    Add spec for #65

    hmarr authored
  3. @hmarr

    Merge pull request #65 from Malet/patch-1

    hmarr authored
    Fix for all resources called on merchant
Commits on Aug 20, 2014
  1. @Malet

    Fix for all resources called on merchant

    Malet authored
    `GoCardless.client.merchant.(preauthorizations|users|payouts).to_a` works after this change, the `each` method throwing an exception (it was trying to use GoCardless::Merchant as the resource type for all resources)
Commits on Jul 7, 2014
  1. @hmarr

    Bump version to v1.11.0

    hmarr authored
Commits on Jun 27, 2014
  1. @hmarr

    Merge pull request #64 from gocardless/uri-encode-path

    hmarr authored
    URI encode path before making request
Something went wrong with that request. Please try again.