annotation_security 1.0.1 → 1.0.2
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG.md +14 -0
- data/HOW-TO.md +275 -0
- data/{MIT-LICENSE → LICENSE} +1 -1
- data/README.md +39 -0
- data/Rakefile +62 -55
- data/assets/app/helpers/annotation_security_helper.rb +8 -8
- data/assets/config/initializers/annotation_security.rb +11 -11
- data/assets/config/security/relations.rb +20 -20
- data/assets/vendor/plugins/annotation_security/init.rb +13 -13
- data/bin/annotation_security +7 -7
- data/lib/annotation_security/exceptions.rb +124 -124
- data/lib/annotation_security/exec.rb +188 -188
- data/lib/annotation_security/filters.rb +37 -37
- data/lib/annotation_security/includes/action_controller.rb +144 -143
- data/lib/annotation_security/includes/active_record.rb +27 -27
- data/lib/annotation_security/includes/helper.rb +215 -215
- data/lib/annotation_security/includes/resource.rb +84 -84
- data/lib/annotation_security/includes/role.rb +30 -30
- data/lib/annotation_security/includes/user.rb +26 -26
- data/lib/annotation_security/manager/policy_factory.rb +29 -29
- data/lib/annotation_security/manager/policy_manager.rb +79 -79
- data/lib/annotation_security/manager/relation_loader.rb +272 -272
- data/lib/annotation_security/manager/resource_manager.rb +36 -36
- data/lib/annotation_security/manager/right_loader.rb +87 -87
- data/lib/annotation_security/model_observer.rb +61 -61
- data/lib/annotation_security/policy/abstract_policy.rb +344 -344
- data/lib/annotation_security/policy/abstract_static_policy.rb +75 -75
- data/lib/annotation_security/policy/all_resources_policy.rb +20 -20
- data/lib/annotation_security/policy/rule.rb +340 -340
- data/lib/annotation_security/policy/rule_set.rb +138 -138
- data/lib/annotation_security/rails.rb +38 -38
- data/lib/annotation_security/user_wrapper.rb +73 -73
- data/lib/annotation_security/utils.rb +141 -141
- data/lib/annotation_security/version.rb +10 -0
- data/lib/annotation_security.rb +102 -97
- data/lib/extensions/action_controller.rb +32 -32
- data/lib/extensions/active_record.rb +34 -34
- data/lib/extensions/filter.rb +133 -133
- data/lib/extensions/object.rb +10 -10
- data/lib/security_context.rb +589 -551
- data/spec/annotation_security/exceptions_spec.rb +16 -16
- data/spec/annotation_security/includes/helper_spec.rb +82 -82
- data/spec/annotation_security/manager/policy_manager_spec.rb +15 -15
- data/spec/annotation_security/manager/resource_manager_spec.rb +17 -17
- data/spec/annotation_security/manager/right_loader_spec.rb +17 -17
- data/spec/annotation_security/policy/abstract_policy_spec.rb +16 -16
- data/spec/annotation_security/policy/all_resources_policy_spec.rb +24 -24
- data/spec/annotation_security/policy/rule_set_spec.rb +112 -112
- data/spec/annotation_security/policy/rule_spec.rb +77 -77
- data/spec/annotation_security/policy/test_policy_spec.rb +80 -80
- data/spec/annotation_security/security_context_spec.rb +78 -78
- data/spec/annotation_security/utils_spec.rb +73 -73
- data/spec/helper/test_controller.rb +65 -65
- data/spec/helper/test_helper.rb +5 -5
- data/spec/helper/test_relations.rb +6 -6
- data/spec/helper/test_resource.rb +38 -38
- data/spec/helper/test_role.rb +21 -21
- data/spec/helper/test_user.rb +31 -31
- data/spec/rails_stub.rb +37 -37
- metadata +94 -72
- data/CHANGELOG +0 -2
- data/HOW-TO +0 -261
- data/README +0 -39
data/HOW-TO
DELETED
@@ -1,261 +0,0 @@
|
|
1
|
-
= How to secure your Rails application with Annotation Security
|
2
|
-
|
3
|
-
== Step 0: Installing Annotation Security
|
4
|
-
|
5
|
-
Annotation Security comes as a gem hosted on rubygems.org. You can install it
|
6
|
-
via <tt>gem install annotation_security</tt>.
|
7
|
-
The gem contains a binary called <tt>annotation_security</tt>. It can be used to
|
8
|
-
install the security layer into a rails app via
|
9
|
-
<tt>annotation_security --rails RAILS_HOME</tt>. This will make your app ready to be
|
10
|
-
secured.
|
11
|
-
|
12
|
-
== Step 1: Defining user and roles
|
13
|
-
|
14
|
-
Annotation Security assumes that there is a user class, representing the user,
|
15
|
-
and some role classes containing additional information if the user has a
|
16
|
-
certain role in the application.
|
17
|
-
|
18
|
-
If you don't have user or role classes in your application,
|
19
|
-
continue with step 2.
|
20
|
-
|
21
|
-
=== User
|
22
|
-
|
23
|
-
In most cases the user class will be a subclass of ActiveRecord::Base,
|
24
|
-
but this is not necessary.
|
25
|
-
|
26
|
-
Include the module AnnotationSecurity::User into this class.
|
27
|
-
|
28
|
-
class User < ActiveRecord::Base
|
29
|
-
include AnnotationSecurity::User
|
30
|
-
...
|
31
|
-
|
32
|
-
=== Roles
|
33
|
-
|
34
|
-
Include the module AnnotationSecurity::Role into these classes. If you are
|
35
|
-
having a hierachy of role classes, only include the module in the topmost class.
|
36
|
-
|
37
|
-
class Role < ActiveRecord::Base
|
38
|
-
belongs_to :user
|
39
|
-
include AnnotationSecurity::Role
|
40
|
-
...
|
41
|
-
|
42
|
-
class Student < Role
|
43
|
-
# no include here
|
44
|
-
...
|
45
|
-
|
46
|
-
A role object should respond to +user+ with returning the user object
|
47
|
-
it belongs to.
|
48
|
-
|
49
|
-
Do not include both modules in one class!
|
50
|
-
|
51
|
-
=== Connecting user and roles
|
52
|
-
|
53
|
-
As next, you should provide some default methods for accessing the roles
|
54
|
-
of a user. You can skip this step, but it will be helpfull later on.
|
55
|
-
|
56
|
-
There are two types of access methods: <tt>is_ROLE?</tt> and +as_ROLE+.
|
57
|
-
|
58
|
-
IS-methods return true or false whether a user has a role or not.
|
59
|
-
class User < ActiveRecord::Base
|
60
|
-
def is_administrator?
|
61
|
-
self.admin_flag == 1
|
62
|
-
end
|
63
|
-
def is_student?
|
64
|
-
self.roles.any? { |role| role.is_a? Student }
|
65
|
-
end
|
66
|
-
...
|
67
|
-
|
68
|
-
AS-methods return a single object or an array of objects representing the role.
|
69
|
-
If the user does not have the role, the result should be an empty array or nil.
|
70
|
-
class User < ActiveRecord::Base
|
71
|
-
def as_administrator
|
72
|
-
# there is no administrator class, just return the user
|
73
|
-
is_administrator? ? self : nil
|
74
|
-
end
|
75
|
-
def as_student
|
76
|
-
# assuming a user can only be student once
|
77
|
-
self.roles.detect { |role| role.is_a? Student }
|
78
|
-
end
|
79
|
-
def as_corrector
|
80
|
-
# assuming a user can be a corrector several times
|
81
|
-
self.roles.select { |role| role.is_a? Corrector }
|
82
|
-
end
|
83
|
-
|
84
|
-
== Step 2: Providing the current credential
|
85
|
-
|
86
|
-
To evaluate the security policies, for each request the current credential has
|
87
|
-
to be provided. Therefore, a new filter type was introduced: security filters
|
88
|
-
are around filters that are always the first in the filter chain. You can also
|
89
|
-
use these filters to react to security violations.
|
90
|
-
|
91
|
-
In this example, the user is simply fetched from the session. However, you
|
92
|
-
could also pass a symbol or a string (e.g. if you are using API-keys).
|
93
|
-
|
94
|
-
Passing +nil+ will be interpreted as not being authenticated in any way.
|
95
|
-
|
96
|
-
class ApplicationController < ActionController::Base
|
97
|
-
|
98
|
-
security_filter :security_filter
|
99
|
-
|
100
|
-
private
|
101
|
-
|
102
|
-
def security_filter
|
103
|
-
SecurityContext.current_credential = session[:user]
|
104
|
-
yield
|
105
|
-
rescue SecurityViolationError
|
106
|
-
if SecurityContext.is? :logged_in
|
107
|
-
render :template => "welcome/not_allowed"
|
108
|
-
else
|
109
|
-
render :template => "welcome/please_login"
|
110
|
-
end
|
111
|
-
end
|
112
|
-
|
113
|
-
Please notice that once set, the credential cannot be changed.
|
114
|
-
|
115
|
-
== Step 3: Defining your resources
|
116
|
-
|
117
|
-
Another wild assumption we made is that your application contains some resources
|
118
|
-
you want to protect. In most cases, this will be your ActiveRecord classes.
|
119
|
-
To turn them into resources, just call <tt>resource(symbol)</tt> in the class
|
120
|
-
definition.
|
121
|
-
class Course < ActiveRecord::Base
|
122
|
-
resource :course
|
123
|
-
...
|
124
|
-
The symbol is used to further identify this class and should be unique.
|
125
|
-
|
126
|
-
It is possible (and likely) that the users and roles are resources as well.
|
127
|
-
|
128
|
-
If you want to restrict access to other resource classes, see
|
129
|
-
AnnotationSecurity::Resource for more information.
|
130
|
-
|
131
|
-
== Step 4: Defining relations and rights
|
132
|
-
|
133
|
-
in <tt>config/security</tt> you will find the files <tt>relations.rb</tt> and
|
134
|
-
<tt>rights.yml</tt>.
|
135
|
-
|
136
|
-
=== Relations
|
137
|
-
|
138
|
-
The relations between the user (or the roles) and the resources are defined
|
139
|
-
as code blocks, that evaluate to true or false.
|
140
|
-
|
141
|
-
The <tt>:as</tt>-flag causes that instead of the user object, a role object
|
142
|
-
will be passed into the block (using the +as_ROLE+-method from above).
|
143
|
-
Similar, the <tt>:is</tt>-flag can be used as precondition.
|
144
|
-
|
145
|
-
AnnotationSecurity.define_relations do
|
146
|
-
resource :course do
|
147
|
-
enrolled :as => :student { |student,course| course.students.include? student }
|
148
|
-
corrector :as => :corrector { |corrector,course| corrector.corrects? course }
|
149
|
-
lecturer :as => :lecturer { |lecturer,course| lecturer.lectures? course }
|
150
|
-
end
|
151
|
-
...
|
152
|
-
|
153
|
-
You can also define relations that are valid for all resources.
|
154
|
-
all_resources do
|
155
|
-
# corrector and lecturer are defined by the resource
|
156
|
-
responsible { corrector or lecturer }
|
157
|
-
# no block required here
|
158
|
-
administrator :is => :administrator
|
159
|
-
end
|
160
|
-
|
161
|
-
For more details and features on defining relations,
|
162
|
-
see AnnotationSecurity::RelationLoader.
|
163
|
-
|
164
|
-
=== Rights
|
165
|
-
|
166
|
-
The rights of application are specified in a YAML-file, they correspond to the
|
167
|
-
actions(not necessarily the controller actions) that can be performed on a
|
168
|
-
resource. For instance, to edit a course object, you will need the edit-right
|
169
|
-
for the course resource. If you are not sure which rights your application
|
170
|
-
needs, just skip this now and return after step 5.
|
171
|
-
|
172
|
-
Rights should be valid ruby conditional statements.
|
173
|
-
|
174
|
-
course:
|
175
|
-
create: if lecturer
|
176
|
-
show: if enrolled or responsible
|
177
|
-
edit: if responsible
|
178
|
-
|
179
|
-
AnnotationSecurity provides two default relations: +logged_in+, that is true
|
180
|
-
if there is a user at all, and +self+, that can be used to determine if a user
|
181
|
-
or role resource belongs to the current user.
|
182
|
-
|
183
|
-
user:
|
184
|
-
register: unless logged_in
|
185
|
-
show: if logged_in
|
186
|
-
edit: if self or administrator
|
187
|
-
student:
|
188
|
-
show_results: if self
|
189
|
-
|
190
|
-
To improve readability, you can append 'may', 'is', 'can' or 'has' as prefix and
|
191
|
-
'for', 'in', 'of' or 'to' as suffix to the relation name.
|
192
|
-
This is especially recommended if you are defining rights that depend on
|
193
|
-
other rights of the resource.
|
194
|
-
|
195
|
-
assignment:
|
196
|
-
edit: if responsible
|
197
|
-
delete: if may_edit
|
198
|
-
|
199
|
-
Another example can be found at AnnotationSecurity::RightLoader.
|
200
|
-
|
201
|
-
== Step 5: Securing your actions
|
202
|
-
|
203
|
-
The main goal of AnnotationSecurity was to remove security logic from
|
204
|
-
controller actions. Now you only have to define the abstract effects of an
|
205
|
-
action.
|
206
|
-
|
207
|
-
An action performs one or more tasks on different resources. You have to provide
|
208
|
-
this information as a descriptions, using the
|
209
|
-
{Action Annotation Gem}[http://comasy.nixis.de].
|
210
|
-
A description always has the form 'ACTION on RESOURCE'.
|
211
|
-
|
212
|
-
desc 'shows a course'
|
213
|
-
def show
|
214
|
-
@course = Course.find(params[:id])
|
215
|
-
end
|
216
|
-
|
217
|
-
To perform a task, the user must have the right for it. Thus, when a course is
|
218
|
-
fetched from the database during the show-action, the right course/show will be
|
219
|
-
evaluated for the current user and the course instance.
|
220
|
-
|
221
|
-
In our example, the user has to be responsible or enrolled. If both relations
|
222
|
-
evaluate to false, the right is not given and access will be denied by raising
|
223
|
-
a SecurityViolationError, which will then be catched in the security filter.
|
224
|
-
|
225
|
-
Congratulations, you Rails application is secured now.
|
226
|
-
|
227
|
-
== Step 6: Securing your views
|
228
|
-
|
229
|
-
However, actions aren't the only place with security code. Links to the actions
|
230
|
-
are shown in the view and very often, the view itself depends on the
|
231
|
-
user's rights.
|
232
|
-
|
233
|
-
When setting up Annotation Security in your Rails project, a helper will be
|
234
|
-
included automatically. The most important functions this helper provides are
|
235
|
-
<tt>allowed?</tt> and +link_to_if_allowed+.
|
236
|
-
|
237
|
-
The method <tt>allowed?</tt> expects a right and a resource and returns true iif
|
238
|
-
the current user has that right.
|
239
|
-
|
240
|
-
<% unless allowed? :edit, @course %>
|
241
|
-
<p>You may not edit this course!</p>
|
242
|
-
<% end %>
|
243
|
-
|
244
|
-
+link_to_if_allowed+ expects the same arguments as +link_to+, except it also
|
245
|
-
expects a block like +link_to_if+ (which will be called internally).
|
246
|
-
|
247
|
-
<%= link_to_if_allowed("New", new_course_path) { "You may not create a new course." } %>
|
248
|
-
<%= link_to_if_allowed("Edit", edit_course_path(@course)) { } %>
|
249
|
-
<%= link_to_if_allowed("Delete", @course, {:method => :delete}) { } %>
|
250
|
-
|
251
|
-
+link_to_if_allowed+ tries to automatically detect the accessed resources.
|
252
|
-
In case this should not work for you, see AnnotationSecurity::Helper for more
|
253
|
-
features.
|
254
|
-
|
255
|
-
== Step 7: Live long and prosper
|
256
|
-
|
257
|
-
Well, that's it. Here are some additional notes:
|
258
|
-
* in development mode, the rights and relations are reloaded with every request.
|
259
|
-
* See AnnotationSecurity::RelationLoader and AnnotationSecurity::RightLoader
|
260
|
-
for more examples and features for defining relations and rights.
|
261
|
-
* See AnnotationSecurity::Helper for more methods for securing your views.
|
data/README
DELETED
@@ -1,39 +0,0 @@
|
|
1
|
-
== AnnotationSecurity plugin for Ruby on Rails
|
2
|
-
|
3
|
-
This plugin provides a security layer for rails applications. It performs access
|
4
|
-
checks based on a behavioural description of controller actions. Security rules
|
5
|
-
are defined cleanly separated from your models and controllers.
|
6
|
-
|
7
|
-
== Installation steps
|
8
|
-
|
9
|
-
The security layer is a gem and may be installed using
|
10
|
-
<tt>gem install annotation_security</tt>.
|
11
|
-
|
12
|
-
After installing the gem, run <tt>annotation_security --rails RAILS_HOME</tt> to
|
13
|
-
integrate the security layer in your rails app. Along with the
|
14
|
-
annotation_security plugin this will add
|
15
|
-
|
16
|
-
* the AnnotationSecurity::Helper in the <tt>app/helpers</tt> folder of your
|
17
|
-
rails-app. It provides some useful methods to create links and query the
|
18
|
-
security layer from views.
|
19
|
-
* example configuration files to setup the security layer under <tt>config/security</tt>
|
20
|
-
* an initializer for the security layer under <tt>config/initializer</tt>
|
21
|
-
|
22
|
-
== Where to start
|
23
|
-
|
24
|
-
You can find a basic introduction how to secure your application {here}[link:files/HOW-TO.html].
|
25
|
-
In order to get a detailed idea about how things work, have a deeper look
|
26
|
-
inside AnnotationSecurity::ActionController (how to secure your application),
|
27
|
-
AnnotationSecurity::RightLoader (how to setup rights) and
|
28
|
-
AnnotationSecurity::RelationLoader (how to setup relations).
|
29
|
-
|
30
|
-
Have a look at the view methods provided by the AnnotationSecurity::Helper as
|
31
|
-
well and at the SecurityContext which is the main entry-point for security related
|
32
|
-
functionality in the layer.
|
33
|
-
|
34
|
-
== License
|
35
|
-
|
36
|
-
Copyright Nico Rehwaldt, Arian Treffer 2009, 2010
|
37
|
-
|
38
|
-
You may use, copy and redistribute this library under the same terms as
|
39
|
-
{Ruby itself}[http://www.ruby-lang.org/en/LICENSE.txt] or under the MIT license.
|