Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updated UserRefreshCredentials hash to use string keys #36

Closed
wants to merge 1 commit into from

Conversation

haabaato
Copy link

@haabaato haabaato commented Jul 1, 2015

Fixed an issue I introduced in 5061fb5 where the user_creds default hash used symbol instead of string keys.
Updated a test.

@googlebot googlebot added the cla: yes This human has signed the Contributor License Agreement. label Jul 1, 2015
haabaato referenced this pull request Jul 1, 2015
- ServiceAccountCredentials, ServiceAccountJwtHeaderCredentials
and UserRefreshCredentials initializers now take keyword args
via options hash.

- In `credentials_loader.rb`, refactored env var checking into
private methods

- Updated tests & added new tests.

- Fixed existing test for #from_well_known_path 'fails if
the file is invalid', where `from_env` was called instead of
`from_well_known_path`.

- Fixed rubocop errors I introduced, but two existing ones remain.

- Added entry to changelog.

- Fixed rubocop errors from code containing parallel assignments

- Updated rubocop_todo.yml to ignore parallel assignments and
trailing underscore assignments.
@dwilkie
Copy link
Contributor

dwilkie commented Jul 1, 2015

I already did that over here #31

@haabaato
Copy link
Author

haabaato commented Jul 1, 2015

Okay, great!

Sent from my iPhone

On Jul 1, 2015, at 10:14 AM, David Wilkie notifications@github.com wrote:

I already did that over here #31


Reply to this email directly or view it on GitHub.

@tbetbetbe
Copy link
Contributor

Please update the PR so that it can be merged

@haabaato
Copy link
Author

haabaato commented Jul 8, 2015

Closing because #31 handles the issue already.

@haabaato haabaato closed this Jul 8, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cla: yes This human has signed the Contributor License Agreement.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants