HEX
Server: Apache
System: Linux sg241.singhost.net 2.6.32-896.16.1.lve1.4.51.el6.x86_64 #1 SMP Wed Jan 17 13:19:23 EST 2018 x86_64
User: honghock (909)
PHP: 8.0.30
Disabled: passthru,system,shell_exec,show_source,exec,popen,proc_open
Upload Files
File: //proc/self/root/usr/lib/ruby/site_ruby/1.8/puppet/vendor/safe_yaml/safe_yaml.gemspec
# -*- encoding: utf-8 -*-
require File.join(File.dirname(__FILE__), "lib", "safe_yaml", "version")

Gem::Specification.new do |gem|
  gem.name          = "safe_yaml"
  gem.version       = SafeYAML::VERSION
  gem.authors       = "Dan Tao"
  gem.email         = "daniel.tao@gmail.com"
  gem.description   = %q{Parse YAML safely, without that pesky arbitrary object deserialization vulnerability}
  gem.summary       = %q{SameYAML provides an alternative implementation of YAML.load suitable for accepting user input in Ruby applications.}
  gem.homepage      = "http://dtao.github.com/safe_yaml/"
  gem.license       = "MIT"
  gem.files         = `git ls-files`.split($\)
  gem.test_files    = gem.files.grep(%r{^spec/})
  gem.require_paths = ["lib"]

  gem.required_ruby_version = ">= 1.8.7"
end