bmaland-aegis 1.1.5
Sign up to get free protection for your applications and to get access to all the features.
- data/.gitignore +3 -0
- data/MIT-LICENSE +20 -0
- data/README.rdoc +201 -0
- data/Rakefile +40 -0
- data/VERSION +1 -0
- data/init.rb +2 -0
- data/lib/aegis/constants.rb +6 -0
- data/lib/aegis/has_role.rb +79 -0
- data/lib/aegis/normalization.rb +26 -0
- data/lib/aegis/permission_error.rb +5 -0
- data/lib/aegis/permission_evaluator.rb +34 -0
- data/lib/aegis/permissions.rb +108 -0
- data/lib/aegis/role.rb +55 -0
- data/lib/aegis.rb +10 -0
- data/lib/rails/active_record.rb +5 -0
- data/test/app_root/app/controllers/application_controller.rb +2 -0
- data/test/app_root/app/models/permissions.rb +49 -0
- data/test/app_root/app/models/soldier.rb +5 -0
- data/test/app_root/app/models/user.rb +6 -0
- data/test/app_root/app/models/user_subclass.rb +2 -0
- data/test/app_root/config/boot.rb +114 -0
- data/test/app_root/config/database.yml +21 -0
- data/test/app_root/config/environment.rb +14 -0
- data/test/app_root/config/environments/in_memory.rb +0 -0
- data/test/app_root/config/environments/mysql.rb +0 -0
- data/test/app_root/config/environments/postgresql.rb +0 -0
- data/test/app_root/config/environments/sqlite.rb +0 -0
- data/test/app_root/config/environments/sqlite3.rb +0 -0
- data/test/app_root/config/routes.rb +4 -0
- data/test/app_root/db/migrate/20090408115228_create_users.rb +14 -0
- data/test/app_root/db/migrate/20090429075648_create_soldiers.rb +16 -0
- data/test/app_root/lib/console_with_fixtures.rb +4 -0
- data/test/app_root/log/.gitignore +1 -0
- data/test/app_root/script/console +7 -0
- data/test/has_role_options_test.rb +28 -0
- data/test/has_role_test.rb +48 -0
- data/test/permissions_test.rb +109 -0
- data/test/test_helper.rb +23 -0
- data/test/validation_test.rb +49 -0
- metadata +113 -0
data/.gitignore
ADDED
data/MIT-LICENSE
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
Copyright (c) 2009 Henning Koch
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
4
|
+
a copy of this software and associated documentation files (the
|
5
|
+
"Software"), to deal in the Software without restriction, including
|
6
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
7
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
8
|
+
permit persons to whom the Software is furnished to do so, subject to
|
9
|
+
the following conditions:
|
10
|
+
|
11
|
+
The above copyright notice and this permission notice shall be
|
12
|
+
included in all copies or substantial portions of the Software.
|
13
|
+
|
14
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
15
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
16
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
17
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
18
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
19
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
20
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.rdoc
ADDED
@@ -0,0 +1,201 @@
|
|
1
|
+
= Aegis - role-based permissions for your user models
|
2
|
+
|
3
|
+
Aegis allows you to manage fine-grained, complex permission for user accounts in a central place.
|
4
|
+
|
5
|
+
== Installation
|
6
|
+
|
7
|
+
Add the following to your <tt>Initializer.run</tt> block in your <tt>environment.rb</tt>:
|
8
|
+
config.gem 'aegis', :source => 'http://gemcutter.org'
|
9
|
+
Then do a
|
10
|
+
sudo rake gems:install
|
11
|
+
|
12
|
+
Alternatively, use
|
13
|
+
sudo gem sources -a http://gemcutter.org
|
14
|
+
sudo gem install aegis
|
15
|
+
|
16
|
+
== Example
|
17
|
+
|
18
|
+
First, let's define some roles:
|
19
|
+
|
20
|
+
# app/models/permissions.rb
|
21
|
+
class Permissions < Aegis::Permissions
|
22
|
+
|
23
|
+
role :guest
|
24
|
+
role :registered_user
|
25
|
+
role :moderator
|
26
|
+
role :administrator, :default_permission => :allow
|
27
|
+
|
28
|
+
permission :edit_post do |user, post|
|
29
|
+
allow :registered_user do
|
30
|
+
post.creator == user # a registered_user can only edit his own posts
|
31
|
+
end
|
32
|
+
allow :moderator
|
33
|
+
end
|
34
|
+
|
35
|
+
permission :read_post do |post|
|
36
|
+
allow :everyone
|
37
|
+
deny :guest do
|
38
|
+
post.private? # guests may not read private posts
|
39
|
+
end
|
40
|
+
end
|
41
|
+
|
42
|
+
end
|
43
|
+
|
44
|
+
|
45
|
+
Now we assign roles to users. For this, the users table needs to have a string
|
46
|
+
column +role_name+.
|
47
|
+
|
48
|
+
# app/models/user.rb
|
49
|
+
class User
|
50
|
+
has_role
|
51
|
+
end
|
52
|
+
|
53
|
+
|
54
|
+
These permissions may be used in views and controllers:
|
55
|
+
|
56
|
+
# app/views/posts/index.html.erb
|
57
|
+
@posts.each do |post|
|
58
|
+
<% if current_user.may_read_post? post %>
|
59
|
+
<%= render post %>
|
60
|
+
<% if current_user.may_edit_post? post %>
|
61
|
+
<%= link_to 'Edit', edit_post_path(post) %>
|
62
|
+
<% end %>
|
63
|
+
<% end %>
|
64
|
+
<% end %>
|
65
|
+
|
66
|
+
|
67
|
+
# app/controllers/posts_controller.rb
|
68
|
+
class PostsController
|
69
|
+
# ...
|
70
|
+
|
71
|
+
def update
|
72
|
+
@post = Post.find(params[:id])
|
73
|
+
current_user.may_edit_post! @post # raises an Aegis::PermissionError for unauthorized access
|
74
|
+
# ...
|
75
|
+
end
|
76
|
+
|
77
|
+
end
|
78
|
+
|
79
|
+
You might want to specifiy a default role:
|
80
|
+
class Permissions < Aegis::Permissions
|
81
|
+
default_role 'role_name'
|
82
|
+
end
|
83
|
+
|
84
|
+
This role will be returned for objects that has +nil+ as their +role_name+. This
|
85
|
+
greatly reduces noise in your database (i.e. if you have 100 000 users, you don't
|
86
|
+
have to store 'role_name' for each row, just for your non-default
|
87
|
+
roles). +default_role+ takes the same options as +role+.
|
88
|
+
|
89
|
+
To explicitly make sure that a given row won't have a permission object, set
|
90
|
+
+role_name+ to the empty string ("").
|
91
|
+
|
92
|
+
== Details
|
93
|
+
|
94
|
+
=== Roles
|
95
|
+
|
96
|
+
To equip a (user) model with any permissions, you simply call *has_role* within
|
97
|
+
the model:
|
98
|
+
class User < ActiveRecord::Base
|
99
|
+
has_role
|
100
|
+
end
|
101
|
+
Aegis assumes that the corresponding database table has a string-valued column
|
102
|
+
called +role_name+. You may override the name with the <tt>:name_accessor =>
|
103
|
+
:my_role_column</tt> option.
|
104
|
+
|
105
|
+
The roles and permissions themselves are defined in a class inheriting from
|
106
|
+
<b>Aegis::Permissions</b>. To define roles you create a model <tt>permissions.rb</tt>
|
107
|
+
and use the *role* method:
|
108
|
+
class Permissions < Aegis::Permissions
|
109
|
+
role 'role_name'
|
110
|
+
end
|
111
|
+
|
112
|
+
By default, users belonging to this role are not permitted anything. You may
|
113
|
+
override this with <tt>:default_permission => :allow</tt>, e.g.
|
114
|
+
role 'admin', :default_permission => :allow
|
115
|
+
|
116
|
+
=== Permissions
|
117
|
+
|
118
|
+
Permissions are specified with the *permission* method and *allow* and *deny*
|
119
|
+
permission :do_something do
|
120
|
+
allow :role_a, :role_b
|
121
|
+
deny :role_c
|
122
|
+
end
|
123
|
+
|
124
|
+
Your user model just received two methods called <b>User#may_do_something?</b>
|
125
|
+
and <b>User#may_do_something!</b>. The first one with the ? returns true for users with
|
126
|
+
+role_a+ and +role_b+, and false for users with +role_c+. The second one with the ! raises an
|
127
|
+
Aegis::PermissionError for +role_c+.
|
128
|
+
|
129
|
+
=== Normalization
|
130
|
+
|
131
|
+
Aegis will perform some normalization. For example, the permissions
|
132
|
+
+edit_something+ and +update_something+ will be the same, each granting both
|
133
|
+
<tt>may_edit_something?</tt> and <tt>may_update_something?</tt>. The following normalizations
|
134
|
+
are active:
|
135
|
+
* edit = update
|
136
|
+
* show = list = view = read
|
137
|
+
* delete = remove = destroy
|
138
|
+
|
139
|
+
=== Complex permissions (with parameters)
|
140
|
+
|
141
|
+
*allow* and *deny* can also take a block that may return +true+ or +false+
|
142
|
+
indicating if this really applies. So
|
143
|
+
permission :pull_april_fools_prank do
|
144
|
+
allow :everyone do
|
145
|
+
Date.today.month == 4 and Date.today.day == 1
|
146
|
+
end
|
147
|
+
end
|
148
|
+
will generate a <tt>may_pull_april_fools_prank?</tt> method that only returns true on
|
149
|
+
April 1.
|
150
|
+
|
151
|
+
This becomes more useful if you pass parameters to a <tt>may_...?</tt> method, which
|
152
|
+
are passed through to the permission block (together with the user object). This
|
153
|
+
way you can define more complex permissions like
|
154
|
+
permission :edit_post do |current_user, post|
|
155
|
+
allow :registered_user do
|
156
|
+
post.owner == current_user
|
157
|
+
end
|
158
|
+
allow :admin
|
159
|
+
end
|
160
|
+
which will permit admins and post owners to edit posts.
|
161
|
+
|
162
|
+
=== For your convenience
|
163
|
+
|
164
|
+
As a convenience, if you create a permission ending in a plural 's', this
|
165
|
+
automatically includes the singular form. That is, after
|
166
|
+
permission :read_posts do
|
167
|
+
allow :everyone
|
168
|
+
end
|
169
|
+
<tt>.may_read_post? @post</tt> will return true, as well.
|
170
|
+
|
171
|
+
If you want to grant +create_something+, +read_something+, +update_something+
|
172
|
+
and +destroy_something+ permissions all at once, just use
|
173
|
+
permission :crud_something do
|
174
|
+
allow :admin
|
175
|
+
end
|
176
|
+
|
177
|
+
If several permission blocks (or several allow and denies) apply to a certain
|
178
|
+
role, the later one always wins. That is
|
179
|
+
permission :do_something do
|
180
|
+
deny :everyone
|
181
|
+
allow :admin
|
182
|
+
end
|
183
|
+
will work as expected.
|
184
|
+
|
185
|
+
=== Our stance on multiple roles per user
|
186
|
+
|
187
|
+
We believe that you should only distinguish roles that have different ways of resolving their permissions. A typical set of roles would be
|
188
|
+
|
189
|
+
* anonymous guest (has access to nothing with some exceptions)
|
190
|
+
* signed up user (has access to some things depending on its attributes and associations)
|
191
|
+
* administrator (has access to everything)
|
192
|
+
|
193
|
+
We don't do multiple, parametrized roles like "leader for project #2" and "author of post #7".
|
194
|
+
That would be reinventing associations. Just use a single :user role and let your permission block
|
195
|
+
query regular associations and attributes.
|
196
|
+
|
197
|
+
=== Credits
|
198
|
+
|
199
|
+
Henning Koch, Tobias Kraze
|
200
|
+
|
201
|
+
{link www.makandra.de}[http://www.makandra.de/]
|
data/Rakefile
ADDED
@@ -0,0 +1,40 @@
|
|
1
|
+
require 'rake'
|
2
|
+
require 'rake/testtask'
|
3
|
+
require 'rake/rdoctask'
|
4
|
+
|
5
|
+
desc 'Default: run unit tests.'
|
6
|
+
task :default => :test
|
7
|
+
|
8
|
+
desc 'Test the aegis gem.'
|
9
|
+
Rake::TestTask.new(:test) do |t|
|
10
|
+
t.libs << 'lib'
|
11
|
+
t.pattern = 'test/**/*_test.rb'
|
12
|
+
t.verbose = true
|
13
|
+
end
|
14
|
+
|
15
|
+
desc 'Generate documentation for the aegis plugin.'
|
16
|
+
Rake::RDocTask.new(:rdoc) do |rdoc|
|
17
|
+
rdoc.rdoc_dir = 'rdoc'
|
18
|
+
rdoc.title = 'Aegis'
|
19
|
+
rdoc.options << '--line-numbers' << '--inline-source'
|
20
|
+
rdoc.rdoc_files.include('README')
|
21
|
+
rdoc.rdoc_files.include('lib/**/*.rb')
|
22
|
+
end
|
23
|
+
|
24
|
+
begin
|
25
|
+
gem 'jeweler', '>= 1.3.0'
|
26
|
+
require 'jeweler'
|
27
|
+
Jeweler::Tasks.new do |gemspec|
|
28
|
+
gemspec.name = "bmaland-aegis"
|
29
|
+
gemspec.summary = "Role-based permissions for your user models."
|
30
|
+
gemspec.email = "github@makandra.de"
|
31
|
+
gemspec.homepage = "http://github.com/bmaland/aegis"
|
32
|
+
gemspec.description = "Aegis is a role-based permission system, where all users are given a role. It is possible to define detailed and complex permissions for each role very easily."
|
33
|
+
gemspec.authors = ["Henning Koch"]
|
34
|
+
gemspec.version = '1.1.5'
|
35
|
+
end
|
36
|
+
rescue LoadError
|
37
|
+
puts "Jeweler not available. Install it with: sudo gem install technicalpickles-jeweler -s http://gems.github.com"
|
38
|
+
end
|
39
|
+
|
40
|
+
Jeweler::GemcutterTasks.new
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
1.1.5
|
data/init.rb
ADDED
@@ -0,0 +1,79 @@
|
|
1
|
+
module Aegis
|
2
|
+
module HasRole
|
3
|
+
|
4
|
+
def validates_role_name(options = {})
|
5
|
+
validates_each :role_name do |record, attr, value|
|
6
|
+
options[:message] ||= ActiveRecord::Errors.default_error_messages[:inclusion]
|
7
|
+
role = ::Permissions.find_role_by_name(value)
|
8
|
+
record.errors.add attr, options[:message] if role.nil?
|
9
|
+
end
|
10
|
+
end
|
11
|
+
|
12
|
+
alias_method :validates_role, :validates_role_name
|
13
|
+
|
14
|
+
def has_role(options = {})
|
15
|
+
|
16
|
+
if options[:name_accessor]
|
17
|
+
options[:name_reader] = "#{options[:name_accessor]}"
|
18
|
+
options[:name_writer] = "#{options[:name_accessor]}="
|
19
|
+
options.delete(:name_accessor)
|
20
|
+
end
|
21
|
+
|
22
|
+
self.class_eval do
|
23
|
+
|
24
|
+
class_inheritable_accessor :aegis_role_name_reader, :aegis_role_name_writer
|
25
|
+
|
26
|
+
self.aegis_role_name_reader = (options[:name_reader] || "role_name").to_sym
|
27
|
+
self.aegis_role_name_writer = (options[:name_writer] || "role_name=").to_sym
|
28
|
+
|
29
|
+
def aegis_role_name_reader
|
30
|
+
self.class.class_eval{ aegis_role_name_reader }
|
31
|
+
end
|
32
|
+
|
33
|
+
def aegis_role_name_writer
|
34
|
+
self.class.class_eval{ aegis_role_name_writer }
|
35
|
+
end
|
36
|
+
|
37
|
+
def aegis_role_name
|
38
|
+
send(aegis_role_name_reader)
|
39
|
+
end
|
40
|
+
|
41
|
+
def aegis_role_name=(value)
|
42
|
+
send(aegis_role_name_writer, value)
|
43
|
+
end
|
44
|
+
|
45
|
+
def role
|
46
|
+
::Permissions.find_role_by_name!(aegis_role_name)
|
47
|
+
end
|
48
|
+
|
49
|
+
def role=(role_or_name)
|
50
|
+
self.aegis_role_name = if role_or_name.is_a?(Aegis::Role)
|
51
|
+
role_or_name.name
|
52
|
+
else
|
53
|
+
role_or_name.to_s
|
54
|
+
end
|
55
|
+
end
|
56
|
+
|
57
|
+
private
|
58
|
+
|
59
|
+
# Delegate may_...? and may_...! methods to the user's role.
|
60
|
+
def method_missing_with_aegis_permissions(symb, *args)
|
61
|
+
method_name = symb.to_s
|
62
|
+
if method_name =~ /^may_(.+?)[\!\?]$/
|
63
|
+
role.send(symb, self, *args)
|
64
|
+
elsif method_name =~ /^(.*?)\?$/ && queried_role = ::Permissions.find_role_by_name($1)
|
65
|
+
role == queried_role
|
66
|
+
else
|
67
|
+
method_missing_without_aegis_permissions(symb, *args)
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
71
|
+
alias_method_chain :method_missing, :aegis_permissions
|
72
|
+
|
73
|
+
end
|
74
|
+
|
75
|
+
end
|
76
|
+
|
77
|
+
end
|
78
|
+
|
79
|
+
end
|
@@ -0,0 +1,26 @@
|
|
1
|
+
module Aegis
|
2
|
+
class Normalization
|
3
|
+
|
4
|
+
VERB_NORMALIZATIONS = {
|
5
|
+
"edit" => "update",
|
6
|
+
"show" => "read",
|
7
|
+
"list" => "read",
|
8
|
+
"view" => "read",
|
9
|
+
"delete" => "destroy",
|
10
|
+
"remove" => "destroy"
|
11
|
+
}
|
12
|
+
|
13
|
+
def self.normalize_verb(verb)
|
14
|
+
VERB_NORMALIZATIONS[verb] || verb
|
15
|
+
end
|
16
|
+
|
17
|
+
def self.normalize_permission(permission)
|
18
|
+
if permission =~ /^([^_]+?)_(.+?)$/
|
19
|
+
verb, target = $1, $2
|
20
|
+
permission = normalize_verb(verb) + "_" + target
|
21
|
+
end
|
22
|
+
permission
|
23
|
+
end
|
24
|
+
|
25
|
+
end
|
26
|
+
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
module Aegis
|
2
|
+
class PermissionEvaluator
|
3
|
+
|
4
|
+
def initialize(role)
|
5
|
+
@role = role
|
6
|
+
end
|
7
|
+
|
8
|
+
def evaluate(permissions, rule_args)
|
9
|
+
@result = @role.allow_by_default?
|
10
|
+
permissions.each do |permission|
|
11
|
+
instance_exec(*rule_args, &permission)
|
12
|
+
end
|
13
|
+
@result
|
14
|
+
end
|
15
|
+
|
16
|
+
def allow(*role_name_or_names, &block)
|
17
|
+
rule_encountered(role_name_or_names, true, &block)
|
18
|
+
end
|
19
|
+
|
20
|
+
def deny(*role_name_or_names, &block)
|
21
|
+
rule_encountered(role_name_or_names, false, &block)
|
22
|
+
end
|
23
|
+
|
24
|
+
def rule_encountered(role_name_or_names, is_allow, &block)
|
25
|
+
role_names = Array(role_name_or_names)
|
26
|
+
if role_names.include?(@role.name) || role_names.include?(Aegis::Constants::EVERYONE_ROLE_NAME)
|
27
|
+
@result = (block ? block.call : true)
|
28
|
+
@result = !@result unless is_allow
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
32
|
+
end
|
33
|
+
end
|
34
|
+
|
@@ -0,0 +1,108 @@
|
|
1
|
+
module Aegis
|
2
|
+
class Permissions
|
3
|
+
|
4
|
+
def self.inherited(base)
|
5
|
+
base.class_eval do
|
6
|
+
@default_role = nil
|
7
|
+
@roles_by_name = {}
|
8
|
+
@permission_blocks = Hash.new { |hash, key| hash[key] = [] }
|
9
|
+
extend ClassMethods
|
10
|
+
end
|
11
|
+
end
|
12
|
+
|
13
|
+
module ClassMethods
|
14
|
+
|
15
|
+
def default_role(role_name, options = {})
|
16
|
+
@default_role = role(role_name, options)
|
17
|
+
end
|
18
|
+
|
19
|
+
def role(role_name, options = {})
|
20
|
+
role_name = role_name.to_sym
|
21
|
+
role_name != Aegis::Constants::EVERYONE_ROLE_NAME or raise "Cannot define a role named: #{Aegis::Constants::EVERYONE_ROLE_NAME}"
|
22
|
+
@roles_by_name[role_name] = Aegis::Role.new(role_name, self, options)
|
23
|
+
end
|
24
|
+
|
25
|
+
def find_all_role_names
|
26
|
+
@roles_by_name.keys
|
27
|
+
end
|
28
|
+
|
29
|
+
def find_all_roles
|
30
|
+
@roles_by_name.values.sort
|
31
|
+
end
|
32
|
+
|
33
|
+
def find_role_by_name(name)
|
34
|
+
return nil if name == ""
|
35
|
+
# If name is nil, try to return the default role.
|
36
|
+
name.nil? ? @default_role : @roles_by_name[name.to_sym]
|
37
|
+
end
|
38
|
+
|
39
|
+
def find_role_by_name!(name)
|
40
|
+
find_role_by_name(name) or raise "Undefined role: #{name}"
|
41
|
+
end
|
42
|
+
|
43
|
+
def permission(*permission_name_or_names, &block)
|
44
|
+
permission_names = Array(permission_name_or_names).map(&:to_s)
|
45
|
+
permission_names.each do |permission_name|
|
46
|
+
add_split_crud_permission(permission_name, &block)
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
def may?(role_or_role_name, permission, *args)
|
51
|
+
role = role_or_role_name.is_a?(Aegis::Role) ? role_or_role_name : find_role_by_name(role_or_role_name)
|
52
|
+
blocks = @permission_blocks[permission.to_sym]
|
53
|
+
evaluate_permission_blocks(role, blocks, *args)
|
54
|
+
end
|
55
|
+
|
56
|
+
def evaluate_permission_blocks(role, blocks, *args)
|
57
|
+
evaluator = Aegis::PermissionEvaluator.new(role)
|
58
|
+
evaluator.evaluate(blocks, args)
|
59
|
+
end
|
60
|
+
|
61
|
+
def denied?(*args)
|
62
|
+
!allowed?(*args)
|
63
|
+
end
|
64
|
+
|
65
|
+
private
|
66
|
+
|
67
|
+
def add_split_crud_permission(permission_name, &block)
|
68
|
+
if permission_name =~ /^crud_(.+?)$/
|
69
|
+
target = $1
|
70
|
+
Aegis::Constants::CRUD_VERBS.each do |verb|
|
71
|
+
add_normalized_permission("#{verb}_#{target}", &block)
|
72
|
+
end
|
73
|
+
else
|
74
|
+
add_normalized_permission(permission_name, &block)
|
75
|
+
end
|
76
|
+
end
|
77
|
+
|
78
|
+
def add_normalized_permission(permission_name, &block)
|
79
|
+
normalized_permission_name = Aegis::Normalization.normalize_permission(permission_name)
|
80
|
+
add_singularized_permission(normalized_permission_name, &block)
|
81
|
+
end
|
82
|
+
|
83
|
+
def add_singularized_permission(permission_name, &block)
|
84
|
+
if permission_name =~ /^([^_]+?)_(.+?)$/
|
85
|
+
verb = $1
|
86
|
+
target = $2
|
87
|
+
singular_target = target.singularize
|
88
|
+
if singular_target.length < target.length
|
89
|
+
singular_block = lambda do |*args|
|
90
|
+
args.delete_at 1
|
91
|
+
instance_exec(*args, &block)
|
92
|
+
end
|
93
|
+
singular_permission_name = "#{verb}_#{singular_target}"
|
94
|
+
add_permission(singular_permission_name, &singular_block)
|
95
|
+
end
|
96
|
+
end
|
97
|
+
add_permission(permission_name, &block)
|
98
|
+
end
|
99
|
+
|
100
|
+
def add_permission(permission_name, &block)
|
101
|
+
permission_name = permission_name.to_sym
|
102
|
+
@permission_blocks[permission_name] << block
|
103
|
+
end
|
104
|
+
|
105
|
+
end # module ClassMethods
|
106
|
+
|
107
|
+
end # class Permissions
|
108
|
+
end # module Aegis
|
data/lib/aegis/role.rb
ADDED
@@ -0,0 +1,55 @@
|
|
1
|
+
module Aegis
|
2
|
+
class Role
|
3
|
+
|
4
|
+
attr_reader :name, :default_permission
|
5
|
+
|
6
|
+
# permissions is a hash like: permissions[:edit_user] = lambda { |user| ... }
|
7
|
+
def initialize(name, permissions, options)
|
8
|
+
@name = name
|
9
|
+
@permissions = permissions
|
10
|
+
@default_permission = options[:default_permission] == :allow ? :allow : :deny
|
11
|
+
freeze
|
12
|
+
end
|
13
|
+
|
14
|
+
def allow_by_default?
|
15
|
+
@default_permission == :allow
|
16
|
+
end
|
17
|
+
|
18
|
+
def may?(permission, *args)
|
19
|
+
# puts "may? #{permission}, #{args}"
|
20
|
+
@permissions.may?(self, permission, *args)
|
21
|
+
end
|
22
|
+
|
23
|
+
def <=>(other)
|
24
|
+
name.to_s <=> other.name.to_s
|
25
|
+
end
|
26
|
+
|
27
|
+
def to_s
|
28
|
+
name.to_s.humanize
|
29
|
+
end
|
30
|
+
|
31
|
+
def id
|
32
|
+
name.to_s
|
33
|
+
end
|
34
|
+
|
35
|
+
private
|
36
|
+
|
37
|
+
def method_missing(symb, *args)
|
38
|
+
method_name = symb.to_s
|
39
|
+
if method_name =~ /^may_(.+)(\?|\!)$/
|
40
|
+
permission, severity = $1, $2
|
41
|
+
permission = Aegis::Normalization.normalize_permission(permission)
|
42
|
+
may = may?(permission, *args)
|
43
|
+
if severity == '!' && !may
|
44
|
+
raise PermissionError, "Access denied: #{permission}"
|
45
|
+
else
|
46
|
+
may
|
47
|
+
end
|
48
|
+
else
|
49
|
+
super
|
50
|
+
end
|
51
|
+
end
|
52
|
+
|
53
|
+
|
54
|
+
end
|
55
|
+
end
|
data/lib/aegis.rb
ADDED
@@ -0,0 +1,10 @@
|
|
1
|
+
# Include hook code here
|
2
|
+
require 'aegis/constants'
|
3
|
+
require 'aegis/has_role'
|
4
|
+
require 'aegis/normalization'
|
5
|
+
require 'aegis/permission_error'
|
6
|
+
require 'aegis/permission_evaluator'
|
7
|
+
require 'aegis/permissions'
|
8
|
+
require 'aegis/role'
|
9
|
+
require 'rails/active_record'
|
10
|
+
|
@@ -0,0 +1,49 @@
|
|
1
|
+
|
2
|
+
class Permissions < Aegis::Permissions
|
3
|
+
|
4
|
+
default_role :guest
|
5
|
+
role :student
|
6
|
+
role :admin, :default_permission => :allow
|
7
|
+
|
8
|
+
permission :use_empty do
|
9
|
+
end
|
10
|
+
|
11
|
+
permission :use_simple do
|
12
|
+
allow :student
|
13
|
+
deny :admin
|
14
|
+
end
|
15
|
+
|
16
|
+
permission :update_users do
|
17
|
+
allow :student
|
18
|
+
deny :admin
|
19
|
+
end
|
20
|
+
|
21
|
+
permission :crud_projects do
|
22
|
+
allow :student
|
23
|
+
end
|
24
|
+
|
25
|
+
permission :edit_drinks do
|
26
|
+
allow :student
|
27
|
+
deny :admin
|
28
|
+
end
|
29
|
+
|
30
|
+
permission :hug do
|
31
|
+
allow :everyone
|
32
|
+
end
|
33
|
+
|
34
|
+
permission :divide do |user, left, right|
|
35
|
+
allow :student do
|
36
|
+
right != 0
|
37
|
+
end
|
38
|
+
end
|
39
|
+
|
40
|
+
permission :draw do
|
41
|
+
allow :everyone
|
42
|
+
end
|
43
|
+
|
44
|
+
permission :draw do
|
45
|
+
deny :student
|
46
|
+
deny :admin
|
47
|
+
end
|
48
|
+
|
49
|
+
end
|
@@ -0,0 +1,114 @@
|
|
1
|
+
# Allow customization of the rails framework path
|
2
|
+
RAILS_FRAMEWORK_ROOT = (ENV['RAILS_FRAMEWORK_ROOT'] || "#{File.dirname(__FILE__)}/../../../../../../vendor/rails") unless defined?(RAILS_FRAMEWORK_ROOT)
|
3
|
+
|
4
|
+
# Don't change this file!
|
5
|
+
# Configure your app in config/environment.rb and config/environments/*.rb
|
6
|
+
|
7
|
+
RAILS_ROOT = "#{File.dirname(__FILE__)}/.." unless defined?(RAILS_ROOT)
|
8
|
+
|
9
|
+
module Rails
|
10
|
+
class << self
|
11
|
+
def boot!
|
12
|
+
unless booted?
|
13
|
+
preinitialize
|
14
|
+
pick_boot.run
|
15
|
+
end
|
16
|
+
end
|
17
|
+
|
18
|
+
def booted?
|
19
|
+
defined? Rails::Initializer
|
20
|
+
end
|
21
|
+
|
22
|
+
def pick_boot
|
23
|
+
(vendor_rails? ? VendorBoot : GemBoot).new
|
24
|
+
end
|
25
|
+
|
26
|
+
def vendor_rails?
|
27
|
+
File.exist?(RAILS_FRAMEWORK_ROOT)
|
28
|
+
end
|
29
|
+
|
30
|
+
def preinitialize
|
31
|
+
load(preinitializer_path) if File.exist?(preinitializer_path)
|
32
|
+
end
|
33
|
+
|
34
|
+
def preinitializer_path
|
35
|
+
"#{RAILS_ROOT}/config/preinitializer.rb"
|
36
|
+
end
|
37
|
+
end
|
38
|
+
|
39
|
+
class Boot
|
40
|
+
def run
|
41
|
+
load_initializer
|
42
|
+
Rails::Initializer.run(:set_load_path)
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
class VendorBoot < Boot
|
47
|
+
def load_initializer
|
48
|
+
require "#{RAILS_FRAMEWORK_ROOT}/railties/lib/initializer"
|
49
|
+
Rails::Initializer.run(:install_gem_spec_stubs)
|
50
|
+
end
|
51
|
+
end
|
52
|
+
|
53
|
+
class GemBoot < Boot
|
54
|
+
def load_initializer
|
55
|
+
self.class.load_rubygems
|
56
|
+
load_rails_gem
|
57
|
+
require 'initializer'
|
58
|
+
end
|
59
|
+
|
60
|
+
def load_rails_gem
|
61
|
+
if version = self.class.gem_version
|
62
|
+
gem 'rails', version
|
63
|
+
else
|
64
|
+
gem 'rails'
|
65
|
+
end
|
66
|
+
rescue Gem::LoadError => load_error
|
67
|
+
$stderr.puts %(Missing the Rails #{version} gem. Please `gem install -v=#{version} rails`, update your RAILS_GEM_VERSION setting in config/environment.rb for the Rails version you do have installed, or comment out RAILS_GEM_VERSION to use the latest version installed.)
|
68
|
+
exit 1
|
69
|
+
end
|
70
|
+
|
71
|
+
class << self
|
72
|
+
def rubygems_version
|
73
|
+
Gem::RubyGemsVersion rescue nil
|
74
|
+
end
|
75
|
+
|
76
|
+
def gem_version
|
77
|
+
if defined? RAILS_GEM_VERSION
|
78
|
+
RAILS_GEM_VERSION
|
79
|
+
elsif ENV.include?('RAILS_GEM_VERSION')
|
80
|
+
ENV['RAILS_GEM_VERSION']
|
81
|
+
else
|
82
|
+
parse_gem_version(read_environment_rb)
|
83
|
+
end
|
84
|
+
end
|
85
|
+
|
86
|
+
def load_rubygems
|
87
|
+
require 'rubygems'
|
88
|
+
min_version = '1.1.1'
|
89
|
+
unless rubygems_version >= min_version
|
90
|
+
$stderr.puts %Q(Rails requires RubyGems >= #{min_version} (you have #{rubygems_version}). Please `gem update --system` and try again.)
|
91
|
+
exit 1
|
92
|
+
end
|
93
|
+
|
94
|
+
rescue LoadError
|
95
|
+
$stderr.puts %Q(Rails requires RubyGems >= #{min_version}. Please install RubyGems and try again: http://rubygems.rubyforge.org)
|
96
|
+
exit 1
|
97
|
+
end
|
98
|
+
|
99
|
+
def parse_gem_version(text)
|
100
|
+
$1 if text =~ /^[^#]*RAILS_GEM_VERSION\s*=\s*["']([!~<>=]*\s*[\d.]+)["']/
|
101
|
+
end
|
102
|
+
|
103
|
+
private
|
104
|
+
def read_environment_rb
|
105
|
+
environment_rb = "#{RAILS_ROOT}/config/environment.rb"
|
106
|
+
environment_rb = "#{HELPER_RAILS_ROOT}/config/environment.rb" unless File.exists?(environment_rb)
|
107
|
+
File.read(environment_rb)
|
108
|
+
end
|
109
|
+
end
|
110
|
+
end
|
111
|
+
end
|
112
|
+
|
113
|
+
# All that for this:
|
114
|
+
Rails.boot!
|
@@ -0,0 +1,21 @@
|
|
1
|
+
in_memory:
|
2
|
+
adapter: sqlite3
|
3
|
+
database: ":memory:"
|
4
|
+
verbosity: quiet
|
5
|
+
sqlite:
|
6
|
+
adapter: sqlite
|
7
|
+
dbfile: plugin_test.sqlite.db
|
8
|
+
sqlite3:
|
9
|
+
adapter: sqlite3
|
10
|
+
dbfile: plugin_test.sqlite3.db
|
11
|
+
postgresql:
|
12
|
+
adapter: postgresql
|
13
|
+
username: postgres
|
14
|
+
password: postgres
|
15
|
+
database: plugin_test
|
16
|
+
mysql:
|
17
|
+
adapter: mysql
|
18
|
+
host: localhost
|
19
|
+
username: root
|
20
|
+
password:
|
21
|
+
database: plugin_test
|
@@ -0,0 +1,14 @@
|
|
1
|
+
require File.join(File.dirname(__FILE__), 'boot')
|
2
|
+
|
3
|
+
Rails::Initializer.run do |config|
|
4
|
+
config.cache_classes = false
|
5
|
+
config.whiny_nils = true
|
6
|
+
config.action_controller.session = { :key => "_myapp_session", :secret => "gwirofjweroijger8924rt2zfwehfuiwehb1378rifowenfoqwphf23" }
|
7
|
+
config.plugin_locators.unshift(
|
8
|
+
Class.new(Rails::Plugin::Locator) do
|
9
|
+
def plugins
|
10
|
+
[Rails::Plugin.new(File.expand_path('.'))]
|
11
|
+
end
|
12
|
+
end
|
13
|
+
) unless defined?(PluginTestHelper::PluginLocator)
|
14
|
+
end
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
@@ -0,0 +1,4 @@
|
|
1
|
+
# Loads fixtures into the database when running the test app via the console
|
2
|
+
(ENV['FIXTURES'] ? ENV['FIXTURES'].split(/,/) : Dir.glob(File.join(Rails.root, '../fixtures/*.{yml,csv}'))).each do |fixture_file|
|
3
|
+
Fixtures.create_fixtures(File.join(Rails.root, '../fixtures'), File.basename(fixture_file, '.*'))
|
4
|
+
end
|
@@ -0,0 +1 @@
|
|
1
|
+
*.log
|
@@ -0,0 +1,28 @@
|
|
1
|
+
require "test/test_helper"
|
2
|
+
|
3
|
+
class HasRoleOptionsTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
context "A record with a custom role field" do
|
6
|
+
|
7
|
+
setup do
|
8
|
+
@soldier = Soldier.new
|
9
|
+
end
|
10
|
+
|
11
|
+
should "allow its role to be written and read" do
|
12
|
+
@soldier.role = "guest"
|
13
|
+
assert "guest", @soldier.role.name
|
14
|
+
end
|
15
|
+
|
16
|
+
should "store the role name in the custom field" do
|
17
|
+
assert "guest", @soldier.rank
|
18
|
+
end
|
19
|
+
|
20
|
+
should "still work with permissions" do
|
21
|
+
@soldier.role = "guest"
|
22
|
+
assert @soldier.may_hug?
|
23
|
+
assert !@soldier.may_update_users?
|
24
|
+
end
|
25
|
+
|
26
|
+
end
|
27
|
+
|
28
|
+
end
|
@@ -0,0 +1,48 @@
|
|
1
|
+
require "test/test_helper"
|
2
|
+
|
3
|
+
class HasRoleTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
context "Objects that have an aegis role" do
|
6
|
+
|
7
|
+
setup do
|
8
|
+
@guest = User.new(:role_name => "guest")
|
9
|
+
@student = User.new(:role_name => "student")
|
10
|
+
@student_subclass = UserSubclass.new(:role_name => "student")
|
11
|
+
@admin = User.new(:role_name => "admin")
|
12
|
+
end
|
13
|
+
|
14
|
+
should "know their role" do
|
15
|
+
assert :guest, @guest.role.name
|
16
|
+
assert :student, @student.role.name
|
17
|
+
assert :student_subclass, @student.role.name
|
18
|
+
assert :admin, @admin.role.name
|
19
|
+
end
|
20
|
+
|
21
|
+
should "know if they belong to a role" do
|
22
|
+
assert @guest.guest?
|
23
|
+
assert !@guest.student?
|
24
|
+
assert !@guest.admin?
|
25
|
+
assert !@student.guest?
|
26
|
+
assert !@student_subclass.guest?
|
27
|
+
assert @student.student?
|
28
|
+
assert @student_subclass.student?
|
29
|
+
assert !@student.admin?
|
30
|
+
assert !@student_subclass.admin?
|
31
|
+
assert !@admin.guest?
|
32
|
+
assert !@admin.student?
|
33
|
+
assert @admin.admin?
|
34
|
+
end
|
35
|
+
|
36
|
+
should "still behave as usual when a method ending in a '?' does not map to a role query" do
|
37
|
+
assert_raise NoMethodError do
|
38
|
+
@guest.nonexisting_method?
|
39
|
+
end
|
40
|
+
end
|
41
|
+
|
42
|
+
should "have a default roule" do
|
43
|
+
assert :guest, User.new(:role_name => nil).role.name
|
44
|
+
end
|
45
|
+
|
46
|
+
end
|
47
|
+
|
48
|
+
end
|
@@ -0,0 +1,109 @@
|
|
1
|
+
require "test/test_helper"
|
2
|
+
|
3
|
+
class PermissionsTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
context "Aegis permissions" do
|
6
|
+
|
7
|
+
setup do
|
8
|
+
@guest = User.new(:role_name => "guest")
|
9
|
+
@student = User.new(:role_name => "student")
|
10
|
+
@student_subclass = UserSubclass.new(:role_name => "student")
|
11
|
+
@admin = User.new(:role_name => "admin")
|
12
|
+
end
|
13
|
+
|
14
|
+
should "use the default permission for actions without any allow or grant directives" do
|
15
|
+
assert !@guest.may_use_empty?
|
16
|
+
assert !@student.may_use_empty?
|
17
|
+
assert !@student_subclass.may_use_empty?
|
18
|
+
assert @admin.may_use_empty?
|
19
|
+
end
|
20
|
+
|
21
|
+
should "understand simple allow and deny directives" do
|
22
|
+
assert !@guest.may_use_simple?
|
23
|
+
assert @student.may_use_simple?
|
24
|
+
assert @student_subclass.may_use_simple?
|
25
|
+
assert !@admin.may_use_simple?
|
26
|
+
end
|
27
|
+
|
28
|
+
should 'raise exceptions when a denied action is queried with an exclamation mark' do
|
29
|
+
assert_raise Aegis::PermissionError do
|
30
|
+
@guest.may_use_simple!
|
31
|
+
end
|
32
|
+
assert_raise Aegis::PermissionError do
|
33
|
+
@admin.may_use_simple!
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
should 'do nothing if an allowed action is queried with an exclamation mark' do
|
38
|
+
assert_nothing_raised do
|
39
|
+
@student.may_use_simple!
|
40
|
+
@student_subclass.may_use_simple!
|
41
|
+
end
|
42
|
+
end
|
43
|
+
|
44
|
+
should "implicate the singular form of an action described in plural form" do
|
45
|
+
assert !@guest.may_update_users?
|
46
|
+
assert !@guest.may_update_user?("foo")
|
47
|
+
assert @student.may_update_users?
|
48
|
+
assert @student_subclass.may_update_users?
|
49
|
+
assert @student.may_update_user?("foo")
|
50
|
+
assert @student_subclass.may_update_user?("foo")
|
51
|
+
assert !@admin.may_update_users?
|
52
|
+
assert !@admin.may_update_user?("foo")
|
53
|
+
end
|
54
|
+
|
55
|
+
should 'implicate create, read, update and destroy forms for actions named "crud_..."' do
|
56
|
+
assert @student.may_create_projects?
|
57
|
+
assert @student_subclass.may_create_projects?
|
58
|
+
assert @student.may_read_projects?
|
59
|
+
assert @student_subclass.may_read_projects?
|
60
|
+
assert @student.may_update_projects?
|
61
|
+
assert @student_subclass.may_update_projects?
|
62
|
+
assert @student.may_destroy_projects?
|
63
|
+
assert @student_subclass.may_destroy_projects?
|
64
|
+
end
|
65
|
+
|
66
|
+
should 'perform normalization of CRUD verbs (e.g. "edit" and "update")' do
|
67
|
+
assert !@guest.may_edit_drinks?
|
68
|
+
assert @student.may_edit_drinks?
|
69
|
+
assert @student_subclass.may_edit_drinks?
|
70
|
+
assert !@admin.may_edit_drinks?
|
71
|
+
assert !@guest.may_update_drinks?
|
72
|
+
assert @student.may_update_drinks?
|
73
|
+
assert @student_subclass.may_update_drinks?
|
74
|
+
assert !@admin.may_update_drinks?
|
75
|
+
end
|
76
|
+
|
77
|
+
should "be able to grant or deny actions to all roles using :everyone" do
|
78
|
+
assert @guest.may_hug?
|
79
|
+
assert @student.may_hug?
|
80
|
+
assert @student_subclass.may_hug?
|
81
|
+
assert @admin.may_hug?
|
82
|
+
end
|
83
|
+
|
84
|
+
should "allow the definition of parametrized actions" do
|
85
|
+
assert !@guest.may_divide?(10, 2)
|
86
|
+
assert @student.may_divide?(10, 2)
|
87
|
+
assert @student_subclass.may_divide?(10, 2)
|
88
|
+
assert !@student.may_divide?(10, 0)
|
89
|
+
assert !@student_subclass.may_divide?(10, 0)
|
90
|
+
assert @admin.may_divide?(10, 2)
|
91
|
+
assert @admin.may_divide?(10, 0)
|
92
|
+
end
|
93
|
+
|
94
|
+
should 'use default permissions for undefined actions' do
|
95
|
+
!@student.may_do_undefined_stuff?("foo")
|
96
|
+
!@student_subclass.may_do_undefined_stuff?("foo")
|
97
|
+
@admin.may_do_undefined_stuff?("foo")
|
98
|
+
end
|
99
|
+
|
100
|
+
should 'overshadow previous action definitions with the same name' do
|
101
|
+
assert @guest.may_draw?
|
102
|
+
assert !@student.may_draw?
|
103
|
+
assert !@student_subclass.may_draw?
|
104
|
+
assert !@admin.may_draw?
|
105
|
+
end
|
106
|
+
|
107
|
+
end
|
108
|
+
|
109
|
+
end
|
data/test/test_helper.rb
ADDED
@@ -0,0 +1,23 @@
|
|
1
|
+
# Set the default environment to sqlite3's in_memory database
|
2
|
+
ENV['RAILS_ENV'] ||= 'in_memory'
|
3
|
+
|
4
|
+
# Load the Rails environment and testing framework
|
5
|
+
require "#{File.dirname(__FILE__)}/app_root/config/environment"
|
6
|
+
require "#{File.dirname(__FILE__)}/../lib/aegis"
|
7
|
+
require 'test_help'
|
8
|
+
require 'action_view/test_case' # Load additional test classes not done automatically by < Rails 2.2.2
|
9
|
+
|
10
|
+
require "shoulda"
|
11
|
+
|
12
|
+
# Undo changes to RAILS_ENV
|
13
|
+
silence_warnings {RAILS_ENV = ENV['RAILS_ENV']}
|
14
|
+
|
15
|
+
# Run the migrations
|
16
|
+
ActiveRecord::Migrator.migrate("#{Rails.root}/db/migrate")
|
17
|
+
|
18
|
+
# Set default fixture loading properties
|
19
|
+
ActiveSupport::TestCase.class_eval do
|
20
|
+
self.use_transactional_fixtures = true
|
21
|
+
self.use_instantiated_fixtures = false
|
22
|
+
self.fixture_path = "#{File.dirname(__FILE__)}/fixtures"
|
23
|
+
end
|
@@ -0,0 +1,49 @@
|
|
1
|
+
require "test/test_helper"
|
2
|
+
|
3
|
+
class ValidationTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
context "A model that has and validates its role" do
|
6
|
+
|
7
|
+
setup do
|
8
|
+
@user = User.new()
|
9
|
+
end
|
10
|
+
|
11
|
+
context "that has a role_name mapping to a role" do
|
12
|
+
|
13
|
+
setup do
|
14
|
+
@user.role_name = "admin"
|
15
|
+
end
|
16
|
+
|
17
|
+
should "be valid" do
|
18
|
+
assert @user.valid?
|
19
|
+
end
|
20
|
+
|
21
|
+
end
|
22
|
+
|
23
|
+
context "that has a blank role_name" do
|
24
|
+
|
25
|
+
setup do
|
26
|
+
@user.role_name = ""
|
27
|
+
end
|
28
|
+
|
29
|
+
should "not be valid" do
|
30
|
+
assert !@user.valid?
|
31
|
+
end
|
32
|
+
|
33
|
+
end
|
34
|
+
|
35
|
+
context "that has a role_name not mapping to a role" do
|
36
|
+
|
37
|
+
setup do
|
38
|
+
@user.role_name = "nonexisting_role_name"
|
39
|
+
end
|
40
|
+
|
41
|
+
should "not be valid" do
|
42
|
+
assert !@user.valid?
|
43
|
+
end
|
44
|
+
|
45
|
+
end
|
46
|
+
|
47
|
+
end
|
48
|
+
|
49
|
+
end
|
metadata
ADDED
@@ -0,0 +1,113 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: bmaland-aegis
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 1.1.5
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Henning Koch
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
|
12
|
+
date: 2009-11-10 00:00:00 +01:00
|
13
|
+
default_executable:
|
14
|
+
dependencies: []
|
15
|
+
|
16
|
+
description: Aegis is a role-based permission system, where all users are given a role. It is possible to define detailed and complex permissions for each role very easily.
|
17
|
+
email: github@makandra.de
|
18
|
+
executables: []
|
19
|
+
|
20
|
+
extensions: []
|
21
|
+
|
22
|
+
extra_rdoc_files:
|
23
|
+
- README.rdoc
|
24
|
+
files:
|
25
|
+
- .gitignore
|
26
|
+
- MIT-LICENSE
|
27
|
+
- README.rdoc
|
28
|
+
- Rakefile
|
29
|
+
- VERSION
|
30
|
+
- init.rb
|
31
|
+
- lib/aegis.rb
|
32
|
+
- lib/aegis/constants.rb
|
33
|
+
- lib/aegis/has_role.rb
|
34
|
+
- lib/aegis/normalization.rb
|
35
|
+
- lib/aegis/permission_error.rb
|
36
|
+
- lib/aegis/permission_evaluator.rb
|
37
|
+
- lib/aegis/permissions.rb
|
38
|
+
- lib/aegis/role.rb
|
39
|
+
- lib/rails/active_record.rb
|
40
|
+
- test/app_root/app/controllers/application_controller.rb
|
41
|
+
- test/app_root/app/models/permissions.rb
|
42
|
+
- test/app_root/app/models/soldier.rb
|
43
|
+
- test/app_root/app/models/user.rb
|
44
|
+
- test/app_root/app/models/user_subclass.rb
|
45
|
+
- test/app_root/config/boot.rb
|
46
|
+
- test/app_root/config/database.yml
|
47
|
+
- test/app_root/config/environment.rb
|
48
|
+
- test/app_root/config/environments/in_memory.rb
|
49
|
+
- test/app_root/config/environments/mysql.rb
|
50
|
+
- test/app_root/config/environments/postgresql.rb
|
51
|
+
- test/app_root/config/environments/sqlite.rb
|
52
|
+
- test/app_root/config/environments/sqlite3.rb
|
53
|
+
- test/app_root/config/routes.rb
|
54
|
+
- test/app_root/db/migrate/20090408115228_create_users.rb
|
55
|
+
- test/app_root/db/migrate/20090429075648_create_soldiers.rb
|
56
|
+
- test/app_root/lib/console_with_fixtures.rb
|
57
|
+
- test/app_root/log/.gitignore
|
58
|
+
- test/app_root/script/console
|
59
|
+
- test/has_role_options_test.rb
|
60
|
+
- test/has_role_test.rb
|
61
|
+
- test/permissions_test.rb
|
62
|
+
- test/test_helper.rb
|
63
|
+
- test/validation_test.rb
|
64
|
+
has_rdoc: true
|
65
|
+
homepage: http://github.com/bmaland/aegis
|
66
|
+
licenses: []
|
67
|
+
|
68
|
+
post_install_message:
|
69
|
+
rdoc_options:
|
70
|
+
- --charset=UTF-8
|
71
|
+
require_paths:
|
72
|
+
- lib
|
73
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
74
|
+
requirements:
|
75
|
+
- - ">="
|
76
|
+
- !ruby/object:Gem::Version
|
77
|
+
version: "0"
|
78
|
+
version:
|
79
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
80
|
+
requirements:
|
81
|
+
- - ">="
|
82
|
+
- !ruby/object:Gem::Version
|
83
|
+
version: "0"
|
84
|
+
version:
|
85
|
+
requirements: []
|
86
|
+
|
87
|
+
rubyforge_project:
|
88
|
+
rubygems_version: 1.3.5
|
89
|
+
signing_key:
|
90
|
+
specification_version: 3
|
91
|
+
summary: Role-based permissions for your user models.
|
92
|
+
test_files:
|
93
|
+
- test/validation_test.rb
|
94
|
+
- test/permissions_test.rb
|
95
|
+
- test/test_helper.rb
|
96
|
+
- test/app_root/db/migrate/20090408115228_create_users.rb
|
97
|
+
- test/app_root/db/migrate/20090429075648_create_soldiers.rb
|
98
|
+
- test/app_root/lib/console_with_fixtures.rb
|
99
|
+
- test/app_root/app/controllers/application_controller.rb
|
100
|
+
- test/app_root/app/models/permissions.rb
|
101
|
+
- test/app_root/app/models/soldier.rb
|
102
|
+
- test/app_root/app/models/user_subclass.rb
|
103
|
+
- test/app_root/app/models/user.rb
|
104
|
+
- test/app_root/config/environments/sqlite3.rb
|
105
|
+
- test/app_root/config/environments/sqlite.rb
|
106
|
+
- test/app_root/config/environments/postgresql.rb
|
107
|
+
- test/app_root/config/environments/in_memory.rb
|
108
|
+
- test/app_root/config/environments/mysql.rb
|
109
|
+
- test/app_root/config/environment.rb
|
110
|
+
- test/app_root/config/routes.rb
|
111
|
+
- test/app_root/config/boot.rb
|
112
|
+
- test/has_role_options_test.rb
|
113
|
+
- test/has_role_test.rb
|