a_b 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- data/MIT-LICENSE +18 -0
- data/README.markdown +4 -0
- data/Rakefile +74 -0
- data/config.ru +3 -0
- data/config/database.example.yml +6 -0
- data/config/externals.yml +6 -0
- data/config/mail.example.yml +32 -0
- data/db/migrate/001_a_b_tests.rb +14 -0
- data/db/migrate/002_a_b_variants.rb +19 -0
- data/db/migrate/003_a_b_users.rb +25 -0
- data/db/migrate/004_a_b_tokens.rb +12 -0
- data/features/example.feature +10 -0
- data/features/support/env.rb +35 -0
- data/features/support/rspec.rb +11 -0
- data/features/support/webrat.rb +3 -0
- data/gemspec.rb +41 -0
- data/lib/a_b.rb +31 -0
- data/lib/a_b/boot.rb +30 -0
- data/lib/a_b/controller/api.rb +32 -0
- data/lib/a_b/controller/application.rb +6 -0
- data/lib/a_b/controller/index.rb +16 -0
- data/lib/a_b/controller/sessions.rb +28 -0
- data/lib/a_b/controller/tests.rb +37 -0
- data/lib/a_b/controller/variants.rb +14 -0
- data/lib/a_b/helper/api.rb +8 -0
- data/lib/a_b/helper/application.rb +56 -0
- data/lib/a_b/helper/index.rb +12 -0
- data/lib/a_b/model/a_b_test.rb +65 -0
- data/lib/a_b/model/a_b_variant.rb +131 -0
- data/lib/a_b/model/token.rb +22 -0
- data/lib/a_b/model/user.rb +5 -0
- data/lib/a_b/model/user_session.rb +4 -0
- data/lib/a_b/view/index.haml +129 -0
- data/lib/a_b/view/index.sass +55 -0
- data/lib/a_b/view/layout.haml +15 -0
- data/lib/a_b/view/layout.sass +34 -0
- data/lib/a_b/view/log_in.haml +15 -0
- data/lib/a_b/view/log_in.sass +11 -0
- data/public/css/blueprint/ie.css +35 -0
- data/public/css/blueprint/print.css +29 -0
- data/public/css/blueprint/screen.css +257 -0
- data/public/js/index.js +126 -0
- data/public/js/jquery.js +19 -0
- data/public/js/visit.js +59 -0
- data/script/console +2 -0
- data/script/env.rb +30 -0
- data/spec/spec.opts +1 -0
- data/spec/spec_helper.rb +16 -0
- data/vendor/authlogic/CHANGELOG.rdoc +345 -0
- data/vendor/authlogic/LICENSE +20 -0
- data/vendor/authlogic/README.rdoc +246 -0
- data/vendor/authlogic/Rakefile +42 -0
- data/vendor/authlogic/VERSION.yml +5 -0
- data/vendor/authlogic/authlogic.gemspec +217 -0
- data/vendor/authlogic/generators/session/session_generator.rb +9 -0
- data/vendor/authlogic/generators/session/templates/session.rb +2 -0
- data/vendor/authlogic/init.rb +1 -0
- data/vendor/authlogic/lib/authlogic.rb +57 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/base.rb +107 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/email.rb +110 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/logged_in_status.rb +60 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/login.rb +141 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/password.rb +344 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
- data/vendor/authlogic/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
- data/vendor/authlogic/lib/authlogic/authenticates_many/association.rb +42 -0
- data/vendor/authlogic/lib/authlogic/authenticates_many/base.rb +55 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/rails_adapter.rb +48 -0
- data/vendor/authlogic/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/aes256.rb +43 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/md5.rb +34 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/sha1.rb +35 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/sha256.rb +50 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/sha512.rb +50 -0
- data/vendor/authlogic/lib/authlogic/crypto_providers/wordpress.rb +43 -0
- data/vendor/authlogic/lib/authlogic/i18n.rb +83 -0
- data/vendor/authlogic/lib/authlogic/i18n/translator.rb +15 -0
- data/vendor/authlogic/lib/authlogic/random.rb +33 -0
- data/vendor/authlogic/lib/authlogic/regex.rb +25 -0
- data/vendor/authlogic/lib/authlogic/session/activation.rb +58 -0
- data/vendor/authlogic/lib/authlogic/session/active_record_trickery.rb +61 -0
- data/vendor/authlogic/lib/authlogic/session/base.rb +37 -0
- data/vendor/authlogic/lib/authlogic/session/brute_force_protection.rb +96 -0
- data/vendor/authlogic/lib/authlogic/session/callbacks.rb +88 -0
- data/vendor/authlogic/lib/authlogic/session/cookies.rb +130 -0
- data/vendor/authlogic/lib/authlogic/session/existence.rb +93 -0
- data/vendor/authlogic/lib/authlogic/session/foundation.rb +63 -0
- data/vendor/authlogic/lib/authlogic/session/http_auth.rb +58 -0
- data/vendor/authlogic/lib/authlogic/session/id.rb +41 -0
- data/vendor/authlogic/lib/authlogic/session/klass.rb +78 -0
- data/vendor/authlogic/lib/authlogic/session/magic_columns.rb +95 -0
- data/vendor/authlogic/lib/authlogic/session/magic_states.rb +59 -0
- data/vendor/authlogic/lib/authlogic/session/params.rb +101 -0
- data/vendor/authlogic/lib/authlogic/session/password.rb +240 -0
- data/vendor/authlogic/lib/authlogic/session/perishable_token.rb +18 -0
- data/vendor/authlogic/lib/authlogic/session/persistence.rb +70 -0
- data/vendor/authlogic/lib/authlogic/session/priority_record.rb +34 -0
- data/vendor/authlogic/lib/authlogic/session/scopes.rb +101 -0
- data/vendor/authlogic/lib/authlogic/session/session.rb +62 -0
- data/vendor/authlogic/lib/authlogic/session/timeout.rb +82 -0
- data/vendor/authlogic/lib/authlogic/session/unauthorized_record.rb +50 -0
- data/vendor/authlogic/lib/authlogic/session/validation.rb +82 -0
- data/vendor/authlogic/lib/authlogic/test_case.rb +120 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_controller.rb +45 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_logger.rb +10 -0
- data/vendor/authlogic/lib/authlogic/test_case/mock_request.rb +19 -0
- data/vendor/authlogic/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
- data/vendor/authlogic/rails/init.rb +1 -0
- data/vendor/authlogic/shoulda_macros/authlogic.rb +69 -0
- data/vendor/authlogic/test/acts_as_authentic_test/base_test.rb +18 -0
- data/vendor/authlogic/test/acts_as_authentic_test/email_test.rb +97 -0
- data/vendor/authlogic/test/acts_as_authentic_test/logged_in_status_test.rb +36 -0
- data/vendor/authlogic/test/acts_as_authentic_test/login_test.rb +109 -0
- data/vendor/authlogic/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
- data/vendor/authlogic/test/acts_as_authentic_test/password_test.rb +236 -0
- data/vendor/authlogic/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
- data/vendor/authlogic/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
- data/vendor/authlogic/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
- data/vendor/authlogic/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
- data/vendor/authlogic/test/acts_as_authentic_test/single_access_test.rb +44 -0
- data/vendor/authlogic/test/authenticates_many_test.rb +16 -0
- data/vendor/authlogic/test/crypto_provider_test/aes256_test.rb +14 -0
- data/vendor/authlogic/test/crypto_provider_test/bcrypt_test.rb +14 -0
- data/vendor/authlogic/test/crypto_provider_test/sha1_test.rb +23 -0
- data/vendor/authlogic/test/crypto_provider_test/sha256_test.rb +14 -0
- data/vendor/authlogic/test/crypto_provider_test/sha512_test.rb +14 -0
- data/vendor/authlogic/test/fixtures/companies.yml +5 -0
- data/vendor/authlogic/test/fixtures/employees.yml +17 -0
- data/vendor/authlogic/test/fixtures/projects.yml +3 -0
- data/vendor/authlogic/test/fixtures/users.yml +24 -0
- data/vendor/authlogic/test/i18n_test.rb +33 -0
- data/vendor/authlogic/test/libs/affiliate.rb +7 -0
- data/vendor/authlogic/test/libs/company.rb +6 -0
- data/vendor/authlogic/test/libs/employee.rb +7 -0
- data/vendor/authlogic/test/libs/employee_session.rb +2 -0
- data/vendor/authlogic/test/libs/ldaper.rb +3 -0
- data/vendor/authlogic/test/libs/ordered_hash.rb +9 -0
- data/vendor/authlogic/test/libs/project.rb +3 -0
- data/vendor/authlogic/test/libs/user.rb +5 -0
- data/vendor/authlogic/test/libs/user_session.rb +6 -0
- data/vendor/authlogic/test/random_test.rb +49 -0
- data/vendor/authlogic/test/session_test/activation_test.rb +43 -0
- data/vendor/authlogic/test/session_test/active_record_trickery_test.rb +36 -0
- data/vendor/authlogic/test/session_test/brute_force_protection_test.rb +101 -0
- data/vendor/authlogic/test/session_test/callbacks_test.rb +6 -0
- data/vendor/authlogic/test/session_test/cookies_test.rb +112 -0
- data/vendor/authlogic/test/session_test/credentials_test.rb +0 -0
- data/vendor/authlogic/test/session_test/existence_test.rb +64 -0
- data/vendor/authlogic/test/session_test/http_auth_test.rb +28 -0
- data/vendor/authlogic/test/session_test/id_test.rb +17 -0
- data/vendor/authlogic/test/session_test/klass_test.rb +40 -0
- data/vendor/authlogic/test/session_test/magic_columns_test.rb +62 -0
- data/vendor/authlogic/test/session_test/magic_states_test.rb +60 -0
- data/vendor/authlogic/test/session_test/params_test.rb +53 -0
- data/vendor/authlogic/test/session_test/password_test.rb +106 -0
- data/vendor/authlogic/test/session_test/perishability_test.rb +15 -0
- data/vendor/authlogic/test/session_test/persistence_test.rb +21 -0
- data/vendor/authlogic/test/session_test/scopes_test.rb +60 -0
- data/vendor/authlogic/test/session_test/session_test.rb +59 -0
- data/vendor/authlogic/test/session_test/timeout_test.rb +52 -0
- data/vendor/authlogic/test/session_test/unauthorized_record_test.rb +13 -0
- data/vendor/authlogic/test/session_test/validation_test.rb +23 -0
- data/vendor/authlogic/test/test_helper.rb +182 -0
- metadata +325 -0
@@ -0,0 +1,68 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module ActsAsAuthentic
|
3
|
+
# Maintains the persistence token, the token responsible for persisting sessions. This token
|
4
|
+
# gets stores in the session and the cookie.
|
5
|
+
module PersistenceToken
|
6
|
+
def self.included(klass)
|
7
|
+
klass.class_eval do
|
8
|
+
add_acts_as_authentic_module(Methods)
|
9
|
+
end
|
10
|
+
end
|
11
|
+
|
12
|
+
# Methods for the persistence token.
|
13
|
+
module Methods
|
14
|
+
def self.included(klass)
|
15
|
+
klass.class_eval do
|
16
|
+
extend ClassMethods
|
17
|
+
include InstanceMethods
|
18
|
+
|
19
|
+
if respond_to?(:after_password_set) && respond_to?(:after_password_verification)
|
20
|
+
after_password_set :reset_persistence_token
|
21
|
+
after_password_verification :reset_persistence_token!, :if => :reset_persistence_token?
|
22
|
+
end
|
23
|
+
|
24
|
+
validates_presence_of :persistence_token
|
25
|
+
validates_uniqueness_of :persistence_token, :if => :persistence_token_changed?
|
26
|
+
|
27
|
+
before_validation :reset_persistence_token, :if => :reset_persistence_token?
|
28
|
+
end
|
29
|
+
end
|
30
|
+
|
31
|
+
# Class level methods for the persistence token.
|
32
|
+
module ClassMethods
|
33
|
+
# Resets ALL persistence tokens in the database, which will require all users to reauthenticate.
|
34
|
+
def forget_all
|
35
|
+
# Paginate these to save on memory
|
36
|
+
records = nil
|
37
|
+
i = 0
|
38
|
+
begin
|
39
|
+
records = find(:all, :limit => 50, :offset => i)
|
40
|
+
records.each { |record| record.forget! }
|
41
|
+
i += 50
|
42
|
+
end while !records.blank?
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
# Instance level methods for the persistence token.
|
47
|
+
module InstanceMethods
|
48
|
+
# Resets the persistence_token field to a random hex value.
|
49
|
+
def reset_persistence_token
|
50
|
+
self.persistence_token = Authlogic::Random.hex_token
|
51
|
+
end
|
52
|
+
|
53
|
+
# Same as reset_persistence_token, but then saves the record.
|
54
|
+
def reset_persistence_token!
|
55
|
+
reset_persistence_token
|
56
|
+
save_without_session_maintenance(false)
|
57
|
+
end
|
58
|
+
alias_method :forget!, :reset_persistence_token!
|
59
|
+
|
60
|
+
private
|
61
|
+
def reset_persistence_token?
|
62
|
+
persistence_token.blank?
|
63
|
+
end
|
64
|
+
end
|
65
|
+
end
|
66
|
+
end
|
67
|
+
end
|
68
|
+
end
|
@@ -0,0 +1,61 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module ActsAsAuthentic
|
3
|
+
# This module is responsible for transitioning existing applications from the restful_authentication plugin.
|
4
|
+
module RestfulAuthentication
|
5
|
+
def self.included(klass)
|
6
|
+
klass.class_eval do
|
7
|
+
extend Config
|
8
|
+
include InstanceMethods
|
9
|
+
end
|
10
|
+
end
|
11
|
+
|
12
|
+
module Config
|
13
|
+
# Switching an existing app to Authlogic from restful_authentication? No problem, just set this true and your users won't know
|
14
|
+
# anything changed. From your database perspective nothing will change at all. Authlogic will continue to encrypt passwords
|
15
|
+
# just like restful_authentication, so your app won't skip a beat. Although, might consider transitioning your users to a newer
|
16
|
+
# and stronger algorithm. Checkout the transition_from_restful_authentication option.
|
17
|
+
#
|
18
|
+
# * <tt>Default:</tt> false
|
19
|
+
# * <tt>Accepts:</tt> Boolean
|
20
|
+
def act_like_restful_authentication(value = nil)
|
21
|
+
r = rw_config(:act_like_restful_authentication, value, false)
|
22
|
+
set_restful_authentication_config if value
|
23
|
+
r
|
24
|
+
end
|
25
|
+
alias_method :act_like_restful_authentication=, :act_like_restful_authentication
|
26
|
+
|
27
|
+
# This works just like act_like_restful_authentication except that it will start transitioning your users to the algorithm you
|
28
|
+
# specify with the crypto provider option. The next time they log in it will resave their password with the new algorithm
|
29
|
+
# and any new record will use the new algorithm as well. Make sure to update your users table if you are using the default
|
30
|
+
# migration since it will set crypted_password and salt columns to a maximum width of 40 characters which is not enough.
|
31
|
+
def transition_from_restful_authentication(value = nil)
|
32
|
+
r = rw_config(:transition_from_restful_authentication, value, false)
|
33
|
+
set_restful_authentication_config if value
|
34
|
+
r
|
35
|
+
end
|
36
|
+
alias_method :transition_from_restful_authentication=, :transition_from_restful_authentication
|
37
|
+
|
38
|
+
private
|
39
|
+
def set_restful_authentication_config
|
40
|
+
crypto_provider_key = act_like_restful_authentication ? :crypto_provider : :transition_from_crypto_providers
|
41
|
+
self.send("#{crypto_provider_key}=", CryptoProviders::Sha1)
|
42
|
+
if !defined?(::REST_AUTH_SITE_KEY) || ::REST_AUTH_SITE_KEY.nil?
|
43
|
+
class_eval("::REST_AUTH_SITE_KEY = ''") if !defined?(::REST_AUTH_SITE_KEY)
|
44
|
+
CryptoProviders::Sha1.stretches = 1
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|
48
|
+
|
49
|
+
module InstanceMethods
|
50
|
+
private
|
51
|
+
def act_like_restful_authentication?
|
52
|
+
self.class.act_like_restful_authentication == true
|
53
|
+
end
|
54
|
+
|
55
|
+
def transition_from_restful_authentication?
|
56
|
+
self.class.transition_from_restful_authentication == true
|
57
|
+
end
|
58
|
+
end
|
59
|
+
end
|
60
|
+
end
|
61
|
+
end
|
@@ -0,0 +1,139 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module ActsAsAuthentic
|
3
|
+
# This is one of my favorite features that I think is pretty cool. It's things like this that make a library great
|
4
|
+
# and let you know you are on the right track.
|
5
|
+
#
|
6
|
+
# Just to clear up any confusion, Authlogic stores both the record id and the persistence token in the session.
|
7
|
+
# Why? So stale sessions can not be persisted. It stores the id so it can quickly find the record, and the
|
8
|
+
# persistence token to ensure no sessions are stale. So if the persistence token changes, the user must log
|
9
|
+
# back in.
|
10
|
+
#
|
11
|
+
# Well, the persistence token changes with the password. What happens if the user changes his own password?
|
12
|
+
# He shouldn't have to log back in, he's the one that made the change.
|
13
|
+
#
|
14
|
+
# That being said, wouldn't it be nice if their session and cookie information was automatically updated?
|
15
|
+
# Instead of cluttering up your controller with redundant session code. The same thing goes for new
|
16
|
+
# registrations.
|
17
|
+
#
|
18
|
+
# That's what this module is all about. This will automatically maintain the cookie and session values as
|
19
|
+
# records are saved.
|
20
|
+
module SessionMaintenance
|
21
|
+
def self.included(klass)
|
22
|
+
klass.class_eval do
|
23
|
+
extend Config
|
24
|
+
add_acts_as_authentic_module(Methods)
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
module Config
|
29
|
+
# This is more of a convenience method. In order to turn off automatic maintenance of sessions just
|
30
|
+
# set this to false, or you can also set the session_ids method to a blank array. Both accomplish
|
31
|
+
# the same thing. This method is a little clearer in it's intentions though.
|
32
|
+
#
|
33
|
+
# * <tt>Default:</tt> true
|
34
|
+
# * <tt>Accepts:</tt> Boolean
|
35
|
+
def maintain_sessions(value = nil)
|
36
|
+
rw_config(:maintain_sessions, value, true)
|
37
|
+
end
|
38
|
+
alias_method :maintain_sessions=, :maintain_sessions
|
39
|
+
|
40
|
+
# As you may know, authlogic sessions can be separate by id (See Authlogic::Session::Base#id). You can
|
41
|
+
# specify here what session ids you want auto maintained. By default it is the main session, which has
|
42
|
+
# an id of nil.
|
43
|
+
#
|
44
|
+
# * <tt>Default:</tt> [nil]
|
45
|
+
# * <tt>Accepts:</tt> Array
|
46
|
+
def session_ids(value = nil)
|
47
|
+
rw_config(:session_ids, value, [nil])
|
48
|
+
end
|
49
|
+
alias_method :session_ids=, :session_ids
|
50
|
+
|
51
|
+
# The name of the associated session class. This is inferred by the name of the model.
|
52
|
+
#
|
53
|
+
# * <tt>Default:</tt> "#{klass.name}Session".constantize
|
54
|
+
# * <tt>Accepts:</tt> Class
|
55
|
+
def session_class(value = nil)
|
56
|
+
const = "#{base_class.name}Session".constantize rescue nil
|
57
|
+
rw_config(:session_class, value, const)
|
58
|
+
end
|
59
|
+
alias_method :session_class=, :session_class
|
60
|
+
end
|
61
|
+
|
62
|
+
module Methods
|
63
|
+
def self.included(klass)
|
64
|
+
klass.class_eval do
|
65
|
+
before_save :get_session_information, :if => :update_sessions?
|
66
|
+
before_save :maintain_sessions, :if => :update_sessions?
|
67
|
+
end
|
68
|
+
end
|
69
|
+
|
70
|
+
# Save the record and skip session maintenance all together.
|
71
|
+
def save_without_session_maintenance(*args)
|
72
|
+
self.skip_session_maintenance = true
|
73
|
+
result = save(*args)
|
74
|
+
self.skip_session_maintenance = false
|
75
|
+
result
|
76
|
+
end
|
77
|
+
|
78
|
+
private
|
79
|
+
def skip_session_maintenance=(value)
|
80
|
+
@skip_session_maintenance = value
|
81
|
+
end
|
82
|
+
|
83
|
+
def skip_session_maintenance
|
84
|
+
@skip_session_maintenance ||= false
|
85
|
+
end
|
86
|
+
|
87
|
+
def update_sessions?
|
88
|
+
!skip_session_maintenance && session_class && session_class.activated? && self.class.maintain_sessions == true && !session_ids.blank? && persistence_token_changed?
|
89
|
+
end
|
90
|
+
|
91
|
+
def get_session_information
|
92
|
+
# Need to determine if we are completely logged out, or logged in as another user
|
93
|
+
@_sessions = []
|
94
|
+
|
95
|
+
session_ids.each do |session_id|
|
96
|
+
session = session_class.find(session_id, self)
|
97
|
+
@_sessions << session if session && session.record
|
98
|
+
end
|
99
|
+
end
|
100
|
+
|
101
|
+
def maintain_sessions
|
102
|
+
if @_sessions.empty?
|
103
|
+
create_session
|
104
|
+
else
|
105
|
+
update_sessions
|
106
|
+
end
|
107
|
+
end
|
108
|
+
|
109
|
+
def create_session
|
110
|
+
# We only want to automatically login into the first session, since this is the main session. The other sessions are sessions
|
111
|
+
# that need to be created after logging into the main session.
|
112
|
+
session_id = session_ids.first
|
113
|
+
session_class.create(*[self, self, session_id].compact)
|
114
|
+
|
115
|
+
return true
|
116
|
+
end
|
117
|
+
|
118
|
+
def update_sessions
|
119
|
+
# We found sessions above, let's update them with the new info
|
120
|
+
@_sessions.each do |stale_session|
|
121
|
+
next if stale_session.record != self
|
122
|
+
stale_session.unauthorized_record = self
|
123
|
+
stale_session.save
|
124
|
+
end
|
125
|
+
|
126
|
+
return true
|
127
|
+
end
|
128
|
+
|
129
|
+
def session_ids
|
130
|
+
self.class.session_ids
|
131
|
+
end
|
132
|
+
|
133
|
+
def session_class
|
134
|
+
self.class.session_class
|
135
|
+
end
|
136
|
+
end
|
137
|
+
end
|
138
|
+
end
|
139
|
+
end
|
@@ -0,0 +1,65 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module ActsAsAuthentic
|
3
|
+
# This module is responsible for maintaining the single_access token. For more information the single access token and how to use it,
|
4
|
+
# see the Authlogic::Session::Params module.
|
5
|
+
module SingleAccessToken
|
6
|
+
def self.included(klass)
|
7
|
+
klass.class_eval do
|
8
|
+
extend Config
|
9
|
+
add_acts_as_authentic_module(Methods)
|
10
|
+
end
|
11
|
+
end
|
12
|
+
|
13
|
+
# All configuration for the single_access token aspect of acts_as_authentic.
|
14
|
+
module Config
|
15
|
+
# The single access token is used for authentication via URLs, such as a private feed. That being said,
|
16
|
+
# if the user changes their password, that token probably shouldn't change. If it did, the user would have
|
17
|
+
# to update all of their URLs. So be default this is option is disabled, if you need it, feel free to turn
|
18
|
+
# it on.
|
19
|
+
#
|
20
|
+
# * <tt>Default:</tt> false
|
21
|
+
# * <tt>Accepts:</tt> Boolean
|
22
|
+
def change_single_access_token_with_password(value = nil)
|
23
|
+
rw_config(:change_single_access_token_with_password, value, false)
|
24
|
+
end
|
25
|
+
alias_method :change_single_access_token_with_password=, :change_single_access_token_with_password
|
26
|
+
end
|
27
|
+
|
28
|
+
# All method, for the single_access token aspect of acts_as_authentic.
|
29
|
+
module Methods
|
30
|
+
def self.included(klass)
|
31
|
+
return if !klass.column_names.include?("single_access_token")
|
32
|
+
|
33
|
+
klass.class_eval do
|
34
|
+
include InstanceMethods
|
35
|
+
validates_uniqueness_of :single_access_token, :if => :single_access_token_changed?
|
36
|
+
before_validation :reset_single_access_token, :if => :reset_single_access_token?
|
37
|
+
after_password_set(:reset_single_access_token, :if => :change_single_access_token_with_password?) if respond_to?(:after_password_set)
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
module InstanceMethods
|
42
|
+
# Resets the single_access_token to a random friendly token.
|
43
|
+
def reset_single_access_token
|
44
|
+
self.single_access_token = Authlogic::Random.friendly_token
|
45
|
+
end
|
46
|
+
|
47
|
+
# same as reset_single_access_token, but then saves the record.
|
48
|
+
def reset_single_access_token!
|
49
|
+
reset_single_access_token
|
50
|
+
save_without_session_maintenance
|
51
|
+
end
|
52
|
+
|
53
|
+
protected
|
54
|
+
def reset_single_access_token?
|
55
|
+
single_access_token.blank?
|
56
|
+
end
|
57
|
+
|
58
|
+
def change_single_access_token_with_password?
|
59
|
+
self.class.change_single_access_token_with_password == true
|
60
|
+
end
|
61
|
+
end
|
62
|
+
end
|
63
|
+
end
|
64
|
+
end
|
65
|
+
end
|
@@ -0,0 +1,32 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module ActsAsAuthentic
|
3
|
+
# Allows you to scope everything to specific fields.
|
4
|
+
# See the Config submodule for more info.
|
5
|
+
# For information on how to scope off of a parent object see Authlogic::AuthenticatesMany
|
6
|
+
module ValidationsScope
|
7
|
+
def self.included(klass)
|
8
|
+
klass.class_eval do
|
9
|
+
extend Config
|
10
|
+
end
|
11
|
+
end
|
12
|
+
|
13
|
+
# All configuration for the scope feature.
|
14
|
+
module Config
|
15
|
+
# Allows you to scope everything to specific field(s). Works just like validates_uniqueness_of.
|
16
|
+
# For example, let's say a user belongs to a company, and you want to scope everything to the
|
17
|
+
# company:
|
18
|
+
#
|
19
|
+
# acts_as_authentic do |c|
|
20
|
+
# c.validations_scope = :company_id
|
21
|
+
# end
|
22
|
+
#
|
23
|
+
# * <tt>Default:</tt> nil
|
24
|
+
# * <tt>Accepts:</tt> Symbol or Array of symbols
|
25
|
+
def validations_scope(value = nil)
|
26
|
+
rw_config(:validations_scope, value)
|
27
|
+
end
|
28
|
+
alias_method :validations_scope=, :validations_scope
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
@@ -0,0 +1,42 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module AuthenticatesMany
|
3
|
+
# An object of this class is used as a proxy for the authenticates_many relationship. It basically allows you to "save" scope details
|
4
|
+
# and call them on an object, which allows you to do the following:
|
5
|
+
#
|
6
|
+
# @account.user_sessions.new
|
7
|
+
# @account.user_sessions.find
|
8
|
+
# # ... etc
|
9
|
+
#
|
10
|
+
# You can call all of the class level methods off of an object with a saved scope, so that calling the above methods scopes the user
|
11
|
+
# sessions down to that specific account. To implement this via ActiveRecord do something like:
|
12
|
+
#
|
13
|
+
# class User < ActiveRecord::Base
|
14
|
+
# authenticates_many :user_sessions
|
15
|
+
# end
|
16
|
+
class Association
|
17
|
+
attr_accessor :klass, :find_options, :id
|
18
|
+
|
19
|
+
def initialize(klass, find_options, id)
|
20
|
+
self.klass = klass
|
21
|
+
self.find_options = find_options
|
22
|
+
self.id = id
|
23
|
+
end
|
24
|
+
|
25
|
+
[:create, :create!, :find, :new].each do |method|
|
26
|
+
class_eval <<-"end_eval", __FILE__, __LINE__
|
27
|
+
def #{method}(*args)
|
28
|
+
klass.with_scope(scope_options) do
|
29
|
+
klass.#{method}(*args)
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end_eval
|
33
|
+
end
|
34
|
+
alias_method :build, :new
|
35
|
+
|
36
|
+
private
|
37
|
+
def scope_options
|
38
|
+
{:find_options => find_options, :id => id}
|
39
|
+
end
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
@@ -0,0 +1,55 @@
|
|
1
|
+
module Authlogic
|
2
|
+
# This allows you to scope your authentication. For example, let's say all users belong to an account, you want to make sure only users
|
3
|
+
# that belong to that account can actually login into that account. Simple, just do:
|
4
|
+
#
|
5
|
+
# class Account < ActiveRecord::Base
|
6
|
+
# authenticates_many :user_sessions
|
7
|
+
# end
|
8
|
+
#
|
9
|
+
# Now you can scope sessions just like everything else in ActiveRecord:
|
10
|
+
#
|
11
|
+
# @account.user_sessions.new(*args)
|
12
|
+
# @account.user_sessions.create(*args)
|
13
|
+
# @account.user_sessions.find(*args)
|
14
|
+
# # ... etc
|
15
|
+
#
|
16
|
+
# Checkout the authenticates_many method for a list of options.
|
17
|
+
# You may also want to checkout Authlogic::ActsAsAuthentic::Scope to scope your model.
|
18
|
+
module AuthenticatesMany
|
19
|
+
module Base
|
20
|
+
# Allows you set essentially set up a relationship with your sessions. See module definition above for more details.
|
21
|
+
#
|
22
|
+
# === Options
|
23
|
+
#
|
24
|
+
# * <tt>session_class:</tt> default: "#{name}Session",
|
25
|
+
# This is the related session class.
|
26
|
+
#
|
27
|
+
# * <tt>relationship_name:</tt> default: options[:session_class].klass_name.underscore.pluralize,
|
28
|
+
# This is the name of the relationship you want to use to scope everything. For example an Account has many Users. There should be a relationship
|
29
|
+
# called :users that you defined with a has_many. The reason we use the relationship is so you don't have to repeat yourself. The relatonship
|
30
|
+
# could have all kinds of custom options. So instead of repeating yourself we essentially use the scope that the relationship creates.
|
31
|
+
#
|
32
|
+
# * <tt>find_options:</tt> default: nil,
|
33
|
+
# By default the find options are created from the relationship you specify with :relationship_name. But if you want to override this and
|
34
|
+
# manually specify find_options you can do it here. Specify options just as you would in ActiveRecord::Base.find.
|
35
|
+
#
|
36
|
+
# * <tt>scope_cookies:</tt> default: false
|
37
|
+
# By the nature of cookies they scope theirself if you are using subdomains to access accounts. If you aren't using subdomains you need to have
|
38
|
+
# separate cookies for each account, assuming a user is logging into mroe than one account. Authlogic can take care of this for you by
|
39
|
+
# prefixing the name of the cookie and sessin with the model id. You just need to tell Authlogic to do this by passing this option.
|
40
|
+
def authenticates_many(name, options = {})
|
41
|
+
options[:session_class] ||= name.to_s.classify.constantize
|
42
|
+
options[:relationship_name] ||= options[:session_class].klass_name.underscore.pluralize
|
43
|
+
class_eval <<-"end_eval", __FILE__, __LINE__
|
44
|
+
def #{name}
|
45
|
+
find_options = #{options[:find_options].inspect} || #{options[:relationship_name]}.scope(:find)
|
46
|
+
find_options.delete_if { |key, value| ![:conditions, :include, :joins].include?(key.to_sym) || value.nil? }
|
47
|
+
@#{name} ||= Authlogic::AuthenticatesMany::Association.new(#{options[:session_class]}, find_options, #{options[:scope_cookies] ? "self.class.model_name.underscore + '_' + self.send(self.class.primary_key).to_s" : "nil"})
|
48
|
+
end
|
49
|
+
end_eval
|
50
|
+
end
|
51
|
+
end
|
52
|
+
|
53
|
+
::ActiveRecord::Base.extend(Base) if defined?(::ActiveRecord)
|
54
|
+
end
|
55
|
+
end
|