bmedia-casserver 1.1.1
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG +325 -0
- data/Gemfile +3 -0
- data/LICENSE +26 -0
- data/README.md +19 -0
- data/Rakefile +2 -0
- data/bin/rubycas-server +30 -0
- data/config/config.example.yml +592 -0
- data/config/unicorn.rb +88 -0
- data/config.ru +17 -0
- data/db/migrate/001_create_initial_structure.rb +47 -0
- data/lib/casserver/authenticators/active_directory_ldap.rb +19 -0
- data/lib/casserver/authenticators/active_resource.rb +127 -0
- data/lib/casserver/authenticators/authlogic_crypto_providers/aes256.rb +43 -0
- data/lib/casserver/authenticators/authlogic_crypto_providers/bcrypt.rb +92 -0
- data/lib/casserver/authenticators/authlogic_crypto_providers/md5.rb +34 -0
- data/lib/casserver/authenticators/authlogic_crypto_providers/sha1.rb +59 -0
- data/lib/casserver/authenticators/authlogic_crypto_providers/sha512.rb +50 -0
- data/lib/casserver/authenticators/base.rb +67 -0
- data/lib/casserver/authenticators/client_certificate.rb +47 -0
- data/lib/casserver/authenticators/google.rb +58 -0
- data/lib/casserver/authenticators/ldap.rb +147 -0
- data/lib/casserver/authenticators/ntlm.rb +88 -0
- data/lib/casserver/authenticators/open_id.rb +22 -0
- data/lib/casserver/authenticators/sql.rb +133 -0
- data/lib/casserver/authenticators/sql_authlogic.rb +93 -0
- data/lib/casserver/authenticators/sql_encrypted.rb +75 -0
- data/lib/casserver/authenticators/sql_md5.rb +19 -0
- data/lib/casserver/authenticators/sql_rest_auth.rb +82 -0
- data/lib/casserver/authenticators/test.rb +22 -0
- data/lib/casserver/cas.rb +323 -0
- data/lib/casserver/localization.rb +13 -0
- data/lib/casserver/model.rb +270 -0
- data/lib/casserver/server.rb +758 -0
- data/lib/casserver/utils.rb +32 -0
- data/lib/casserver/views/_login_form.erb +42 -0
- data/lib/casserver/views/layout.erb +18 -0
- data/lib/casserver/views/login.erb +30 -0
- data/lib/casserver/views/proxy.builder +12 -0
- data/lib/casserver/views/proxy_validate.builder +25 -0
- data/lib/casserver/views/service_validate.builder +18 -0
- data/lib/casserver/views/validate.erb +2 -0
- data/lib/casserver.rb +11 -0
- data/locales/de.yml +27 -0
- data/locales/en.yml +26 -0
- data/locales/es.yml +26 -0
- data/locales/es_ar.yml +26 -0
- data/locales/fr.yml +26 -0
- data/locales/jp.yml +26 -0
- data/locales/pl.yml +26 -0
- data/locales/pt.yml +26 -0
- data/locales/ru.yml +26 -0
- data/locales/zh.yml +26 -0
- data/locales/zh_tw.yml +26 -0
- data/public/themes/cas.css +126 -0
- data/public/themes/notice.png +0 -0
- data/public/themes/ok.png +0 -0
- data/public/themes/simple/bg.png +0 -0
- data/public/themes/simple/favicon.png +0 -0
- data/public/themes/simple/login_box_bg.png +0 -0
- data/public/themes/simple/logo.png +0 -0
- data/public/themes/simple/theme.css +28 -0
- data/public/themes/urbacon/bg.png +0 -0
- data/public/themes/urbacon/login_box_bg.png +0 -0
- data/public/themes/urbacon/logo.png +0 -0
- data/public/themes/urbacon/theme.css +33 -0
- data/public/themes/warning.png +0 -0
- data/resources/init.d.sh +58 -0
- data/setup.rb +1585 -0
- data/spec/alt_config.yml +50 -0
- data/spec/authenticators/active_resource_spec.rb +109 -0
- data/spec/authenticators/ldap_spec.rb +53 -0
- data/spec/casserver_spec.rb +156 -0
- data/spec/default_config.yml +50 -0
- data/spec/model_spec.rb +42 -0
- data/spec/spec.opts +4 -0
- data/spec/spec_helper.rb +89 -0
- data/spec/utils_spec.rb +53 -0
- data/tasks/bundler.rake +4 -0
- data/tasks/db/migrate.rake +12 -0
- data/tasks/spec.rake +10 -0
- metadata +308 -0
@@ -0,0 +1,47 @@
|
|
1
|
+
class CreateInitialStructure < ActiveRecord::Migration
|
2
|
+
def self.up
|
3
|
+
# Oracle table names cannot exceed 30 chars...
|
4
|
+
# See http://code.google.com/p/rubycas-server/issues/detail?id=15
|
5
|
+
create_table 'casserver_lt', :force => true do |t|
|
6
|
+
t.string 'ticket', :null => false
|
7
|
+
t.timestamp 'created_on', :null => false
|
8
|
+
t.datetime 'consumed', :null => true
|
9
|
+
t.string 'client_hostname', :null => false
|
10
|
+
end
|
11
|
+
|
12
|
+
create_table 'casserver_st', :force => true do |t|
|
13
|
+
t.string 'ticket', :null => false
|
14
|
+
t.text 'service', :null => false
|
15
|
+
t.timestamp 'created_on', :null => false
|
16
|
+
t.datetime 'consumed', :null => true
|
17
|
+
t.string 'client_hostname', :null => false
|
18
|
+
t.string 'username', :null => false
|
19
|
+
t.string 'type', :null => false
|
20
|
+
t.integer 'granted_by_pgt_id', :null => true
|
21
|
+
t.integer 'granted_by_tgt_id', :null => true
|
22
|
+
end
|
23
|
+
|
24
|
+
create_table 'casserver_tgt', :force => true do |t|
|
25
|
+
t.string 'ticket', :null => false
|
26
|
+
t.timestamp 'created_on', :null => false
|
27
|
+
t.string 'client_hostname', :null => false
|
28
|
+
t.string 'username', :null => false
|
29
|
+
t.text 'extra_attributes', :null => true
|
30
|
+
end
|
31
|
+
|
32
|
+
create_table 'casserver_pgt', :force => true do |t|
|
33
|
+
t.string 'ticket', :null => false
|
34
|
+
t.timestamp 'created_on', :null => false
|
35
|
+
t.string 'client_hostname', :null => false
|
36
|
+
t.string 'iou', :null => false
|
37
|
+
t.integer 'service_ticket_id', :null => false
|
38
|
+
end
|
39
|
+
end # self.up
|
40
|
+
|
41
|
+
def self.down
|
42
|
+
drop_table 'casserver_pgt'
|
43
|
+
drop_table 'casserver_tgt'
|
44
|
+
drop_table 'casserver_st'
|
45
|
+
drop_table 'casserver_lt'
|
46
|
+
end # self.down
|
47
|
+
end
|
@@ -0,0 +1,19 @@
|
|
1
|
+
require 'casserver/authenticators/ldap'
|
2
|
+
|
3
|
+
# Slightly modified version of the LDAP authenticator for Microsoft's ActiveDirectory.
|
4
|
+
# The only difference is that the default_username_attribute for AD is 'sAMAccountName'
|
5
|
+
# rather than 'uid'.
|
6
|
+
class CASServer::Authenticators::ActiveDirectoryLDAP < CASServer::Authenticators::LDAP
|
7
|
+
protected
|
8
|
+
def default_username_attribute
|
9
|
+
"sAMAccountName"
|
10
|
+
end
|
11
|
+
|
12
|
+
def extract_extra_attributes(ldap_entry)
|
13
|
+
super(ldap_entry)
|
14
|
+
if @extra_attributes["objectGUID"]
|
15
|
+
@extra_attributes["guid"] = @extra_attributes["objectGUID"].to_s.unpack("H*").to_s
|
16
|
+
end
|
17
|
+
ldap_entry
|
18
|
+
end
|
19
|
+
end
|
@@ -0,0 +1,127 @@
|
|
1
|
+
require 'casserver/authenticators/base'
|
2
|
+
|
3
|
+
begin
|
4
|
+
require 'active_resource'
|
5
|
+
rescue LoadError
|
6
|
+
require 'rubygems'
|
7
|
+
begin
|
8
|
+
gem 'activeresource', '~> 3.0.0'
|
9
|
+
rescue Gem::LoadError
|
10
|
+
$stderr.puts
|
11
|
+
$stderr.puts "!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
|
12
|
+
$stderr.puts
|
13
|
+
$stderr.puts "To use the ActiveResource authenticator, you must first install the 'activeresource' gem."
|
14
|
+
$stderr.puts
|
15
|
+
$stderr.puts "!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
|
16
|
+
exit 1
|
17
|
+
end
|
18
|
+
require 'active_resource'
|
19
|
+
end
|
20
|
+
|
21
|
+
module CASServer
|
22
|
+
module Authenticators
|
23
|
+
|
24
|
+
module Helpers
|
25
|
+
class Identity < ActiveResource::Base
|
26
|
+
|
27
|
+
# define method_name accessor
|
28
|
+
cattr_accessor(:method_name)
|
29
|
+
self.method_name = :authenticate
|
30
|
+
|
31
|
+
def self.method_type
|
32
|
+
@@method_type ||= :post
|
33
|
+
end
|
34
|
+
|
35
|
+
def self.method_type= type
|
36
|
+
methods = [:get, :post, :put, :delete]
|
37
|
+
raise ArgumentError, "Method type should be one of #{methods.map { |m| m.to_s.upcase }.join(', ')}" unless methods.include? type.to_sym
|
38
|
+
@@method_type = type
|
39
|
+
end
|
40
|
+
|
41
|
+
# Autenticate an identity using the given method
|
42
|
+
# @param [Hash] credentials
|
43
|
+
def self.authenticate(credentials = {})
|
44
|
+
response = send(method_type, method_name, credentials)
|
45
|
+
new.from_authentication_data(response)
|
46
|
+
end
|
47
|
+
|
48
|
+
# Used to load object attributes from the given response
|
49
|
+
def from_authentication_data response
|
50
|
+
load_attributes_from_response(response)
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
class ActiveResource < Base
|
56
|
+
|
57
|
+
# This is called at server startup.
|
58
|
+
# Any class-wide initializiation for the authenticator should be done here.
|
59
|
+
# (e.g. establish database connection).
|
60
|
+
# You can leave this empty if you don't need to set up anything.
|
61
|
+
def self.setup(options)
|
62
|
+
raise AuthenticatorError, 'You must define at least site option' unless options[:site]
|
63
|
+
# apply options to active resource object
|
64
|
+
options.each do |method, arg|
|
65
|
+
Helpers::Identity.send "#{method}=", arg if Helpers::Identity.respond_to? "#{method}="
|
66
|
+
end
|
67
|
+
$LOG.info "ActiveResource configuration loaded"
|
68
|
+
end
|
69
|
+
|
70
|
+
# Override this to implement your authentication credential validation.
|
71
|
+
# This is called each time the user tries to log in. The credentials hash
|
72
|
+
# holds the credentials as entered by the user (generally under :username
|
73
|
+
# and :password keys; :service and :request are also included by default)
|
74
|
+
#
|
75
|
+
# Note that the standard credentials can be read in to instance variables
|
76
|
+
# by calling #read_standard_credentials.
|
77
|
+
def validate(credentials)
|
78
|
+
begin
|
79
|
+
$LOG.debug("Starting Active Resource authentication")
|
80
|
+
result = Helpers::Identity.authenticate(credentials.except(:request))
|
81
|
+
extract_extra_attributes(result) if result
|
82
|
+
!!result
|
83
|
+
rescue ::ActiveResource::ConnectionError => e
|
84
|
+
if e.response.blank? # band-aid for ARes 2.3.x -- craps out if to_s is called without a response
|
85
|
+
e = e.class.to_s
|
86
|
+
end
|
87
|
+
$LOG.warn("Error during authentication: #{e}")
|
88
|
+
false
|
89
|
+
end
|
90
|
+
end
|
91
|
+
|
92
|
+
private
|
93
|
+
|
94
|
+
def extract_extra_attributes(resource)
|
95
|
+
@extra_attributes = {}
|
96
|
+
$LOG.debug("Parsing extra attributes")
|
97
|
+
if @options[:extra_attributes]
|
98
|
+
extra_attributes_to_extract.each do |attr|
|
99
|
+
@extra_attributes[attr] = resource.send(attr).to_s
|
100
|
+
end
|
101
|
+
else
|
102
|
+
@extra_attributes = resource.attributes
|
103
|
+
end
|
104
|
+
# do filtering
|
105
|
+
extra_attributes_to_filter.each do |attr|
|
106
|
+
@extra_attributes.delete(attr)
|
107
|
+
end
|
108
|
+
end
|
109
|
+
|
110
|
+
# extract attributes to filter from the given configuration
|
111
|
+
def extra_attributes_to_filter
|
112
|
+
# default value if not set
|
113
|
+
return ['password'] unless @options[:filter_attributes]
|
114
|
+
# parse option value
|
115
|
+
if @options[:filter_attributes].kind_of? Array
|
116
|
+
attrs = @options[:filter_attributes]
|
117
|
+
elsif @options[:filter_attributes].kind_of? String
|
118
|
+
attrs = @options[:filter_attributes].split(',').collect { |col| col.strip }
|
119
|
+
else
|
120
|
+
$LOG.error("Can't figure out attribute list from #{@options[:filter_attributes].inspect}. This must be an Aarray of column names or a comma-separated list.")
|
121
|
+
attrs = []
|
122
|
+
end
|
123
|
+
attrs
|
124
|
+
end
|
125
|
+
end
|
126
|
+
end
|
127
|
+
end
|
@@ -0,0 +1,43 @@
|
|
1
|
+
require "openssl"
|
2
|
+
|
3
|
+
module Authlogic
|
4
|
+
module CryptoProviders
|
5
|
+
# This encryption method is reversible if you have the supplied key. So in order to use this encryption method you must supply it with a key first.
|
6
|
+
# In an initializer, or before your application initializes, you should do the following:
|
7
|
+
#
|
8
|
+
# Authlogic::CryptoProviders::AES256.key = "my really long and unique key, preferrably a bunch of random characters"
|
9
|
+
#
|
10
|
+
# My final comment is that this is a strong encryption method, but its main weakness is that its reversible. If you do not need to reverse the hash
|
11
|
+
# then you should consider Sha512 or BCrypt instead.
|
12
|
+
#
|
13
|
+
# Keep your key in a safe place, some even say the key should be stored on a separate server.
|
14
|
+
# This won't hurt performance because the only time it will try and access the key on the separate server is during initialization, which only
|
15
|
+
# happens once. The reasoning behind this is if someone does compromise your server they won't have the key also. Basically, you don't want to
|
16
|
+
# store the key with the lock.
|
17
|
+
class AES256
|
18
|
+
class << self
|
19
|
+
attr_writer :key
|
20
|
+
|
21
|
+
def encrypt(*tokens)
|
22
|
+
aes.encrypt
|
23
|
+
aes.key = @key
|
24
|
+
[aes.update(tokens.join) + aes.final].pack("m").chomp
|
25
|
+
end
|
26
|
+
|
27
|
+
def matches?(crypted, *tokens)
|
28
|
+
aes.decrypt
|
29
|
+
aes.key = @key
|
30
|
+
(aes.update(crypted.unpack("m").first) + aes.final) == tokens.join
|
31
|
+
rescue OpenSSL::CipherError
|
32
|
+
false
|
33
|
+
end
|
34
|
+
|
35
|
+
private
|
36
|
+
def aes
|
37
|
+
raise ArgumentError.new("You must provide a key like #{name}.key = my_key before using the #{name}") if @key.blank?
|
38
|
+
@aes ||= OpenSSL::Cipher::Cipher.new("AES-256-ECB")
|
39
|
+
end
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
@@ -0,0 +1,92 @@
|
|
1
|
+
begin
|
2
|
+
require "bcrypt"
|
3
|
+
rescue LoadError
|
4
|
+
end
|
5
|
+
|
6
|
+
module Authlogic
|
7
|
+
module CryptoProviders
|
8
|
+
# For most apps Sha512 is plenty secure, but if you are building an app that stores nuclear launch codes you might want to consier BCrypt. This is an extremely
|
9
|
+
# secure hashing algorithm, mainly because it is slow. A brute force attack on a BCrypt encrypted password would take much longer than a brute force attack on a
|
10
|
+
# password encrypted with a Sha algorithm. Keep in mind you are sacrificing performance by using this, generating a password takes exponentially longer than any
|
11
|
+
# of the Sha algorithms. I did some benchmarking to save you some time with your decision:
|
12
|
+
#
|
13
|
+
# require "bcrypt"
|
14
|
+
# require "digest"
|
15
|
+
# require "benchmark"
|
16
|
+
#
|
17
|
+
# Benchmark.bm(18) do |x|
|
18
|
+
# x.report("BCrypt (cost = 10:") { 100.times { BCrypt::Password.create("mypass", :cost => 10) } }
|
19
|
+
# x.report("BCrypt (cost = 2:") { 100.times { BCrypt::Password.create("mypass", :cost => 2) } }
|
20
|
+
# x.report("Sha512:") { 100.times { Digest::SHA512.hexdigest("mypass") } }
|
21
|
+
# x.report("Sha1:") { 100.times { Digest::SHA1.hexdigest("mypass") } }
|
22
|
+
# end
|
23
|
+
#
|
24
|
+
# user system total real
|
25
|
+
# BCrypt (cost = 10): 10.780000 0.060000 10.840000 ( 11.100289)
|
26
|
+
# BCrypt (cost = 2): 0.180000 0.000000 0.180000 ( 0.181914)
|
27
|
+
# Sha512: 0.000000 0.000000 0.000000 ( 0.000829)
|
28
|
+
# Sha1: 0.000000 0.000000 0.000000 ( 0.000395)
|
29
|
+
#
|
30
|
+
# You can play around with the cost to get that perfect balance between performance and security.
|
31
|
+
#
|
32
|
+
# Decided BCrypt is for you? Just insall the bcrypt gem:
|
33
|
+
#
|
34
|
+
# gem install bcrypt-ruby
|
35
|
+
#
|
36
|
+
# Tell acts_as_authentic to use it:
|
37
|
+
#
|
38
|
+
# acts_as_authentic do |c|
|
39
|
+
# c.crypto_provider = Authlogic::CryptoProviders::BCrypt
|
40
|
+
# end
|
41
|
+
#
|
42
|
+
# You are good to go!
|
43
|
+
class BCrypt
|
44
|
+
class << self
|
45
|
+
# This is the :cost option for the BCrpyt library. The higher the cost the more secure it is and the longer is take the generate a hash. By default this is 10.
|
46
|
+
# Set this to whatever you want, play around with it to get that perfect balance between security and performance.
|
47
|
+
def cost
|
48
|
+
@cost ||= 10
|
49
|
+
end
|
50
|
+
attr_writer :cost
|
51
|
+
|
52
|
+
# Creates a BCrypt hash for the password passed.
|
53
|
+
def encrypt(*tokens)
|
54
|
+
::BCrypt::Password.create(join_tokens(tokens), :cost => cost)
|
55
|
+
end
|
56
|
+
|
57
|
+
# Does the hash match the tokens? Uses the same tokens that were used to encrypt.
|
58
|
+
def matches?(hash, *tokens)
|
59
|
+
$LOG.debug hash
|
60
|
+
$LOG.debug tokens.inspect
|
61
|
+
|
62
|
+
hash = new_from_hash(hash)
|
63
|
+
return false if hash.blank?
|
64
|
+
hash == join_tokens(tokens)
|
65
|
+
end
|
66
|
+
|
67
|
+
# This method is used as a flag to tell Authlogic to "resave" the password upon a successful login, using the new cost
|
68
|
+
def cost_matches?(hash)
|
69
|
+
hash = new_from_hash(hash)
|
70
|
+
if hash.blank?
|
71
|
+
false
|
72
|
+
else
|
73
|
+
hash.cost == cost
|
74
|
+
end
|
75
|
+
end
|
76
|
+
|
77
|
+
private
|
78
|
+
def join_tokens(tokens)
|
79
|
+
tokens.flatten.join
|
80
|
+
end
|
81
|
+
|
82
|
+
def new_from_hash(hash)
|
83
|
+
begin
|
84
|
+
::BCrypt::Password.new(hash)
|
85
|
+
rescue ::BCrypt::Errors::InvalidHash
|
86
|
+
return nil
|
87
|
+
end
|
88
|
+
end
|
89
|
+
end
|
90
|
+
end
|
91
|
+
end
|
92
|
+
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
require "digest/md5"
|
2
|
+
|
3
|
+
module Authlogic
|
4
|
+
module CryptoProviders
|
5
|
+
# This class was made for the users transitioning from md5 based systems.
|
6
|
+
# I highly discourage using this crypto provider as it superbly inferior
|
7
|
+
# to your other options.
|
8
|
+
#
|
9
|
+
# Please use any other provider offered by Authlogic.
|
10
|
+
class MD5
|
11
|
+
class << self
|
12
|
+
attr_accessor :join_token
|
13
|
+
|
14
|
+
# The number of times to loop through the encryption.
|
15
|
+
def stretches
|
16
|
+
@stretches ||= 1
|
17
|
+
end
|
18
|
+
attr_writer :stretches
|
19
|
+
|
20
|
+
# Turns your raw password into a MD5 hash.
|
21
|
+
def encrypt(*tokens)
|
22
|
+
digest = tokens.flatten.join(join_token)
|
23
|
+
stretches.times { digest = Digest::MD5.hexdigest(digest) }
|
24
|
+
digest
|
25
|
+
end
|
26
|
+
|
27
|
+
# Does the crypted password match the tokens? Uses the same tokens that were used to encrypt.
|
28
|
+
def matches?(crypted, *tokens)
|
29
|
+
encrypt(*tokens) == crypted
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
@@ -0,0 +1,59 @@
|
|
1
|
+
require "digest/sha1"
|
2
|
+
|
3
|
+
module Authlogic
|
4
|
+
module CryptoProviders
|
5
|
+
# This class was made for the users transitioning from restful_authentication.
|
6
|
+
# I highly discourage using this crypto provider as it inferior to your other options.
|
7
|
+
# Please use any other provider offered by Authlogic.
|
8
|
+
class Sha1
|
9
|
+
class << self
|
10
|
+
def join_token
|
11
|
+
@join_token ||= "--"
|
12
|
+
end
|
13
|
+
attr_writer :join_token
|
14
|
+
|
15
|
+
def digest_format=(format)
|
16
|
+
@digest_format = format
|
17
|
+
end
|
18
|
+
|
19
|
+
# This is for "old style" authentication with a custom format of digest
|
20
|
+
def digest(tokens)
|
21
|
+
if @digest_format
|
22
|
+
@digest_format.
|
23
|
+
gsub('PASSWORD', tokens.first).
|
24
|
+
gsub('SALT', tokens.last)
|
25
|
+
else
|
26
|
+
tokens.join(join_token)
|
27
|
+
end
|
28
|
+
end
|
29
|
+
|
30
|
+
# The number of times to loop through the encryption.
|
31
|
+
# This is ten because that is what restful_authentication defaults to.
|
32
|
+
|
33
|
+
def stretches
|
34
|
+
@stretches ||= 10
|
35
|
+
end
|
36
|
+
attr_writer :stretches
|
37
|
+
|
38
|
+
# Turns your raw password into a Sha1 hash.
|
39
|
+
def encrypt(*tokens)
|
40
|
+
tokens = tokens.flatten
|
41
|
+
|
42
|
+
if stretches > 1
|
43
|
+
hash = tokens.shift
|
44
|
+
stretches.times { hash = Digest::SHA1.hexdigest([hash, *tokens].join(join_token)) }
|
45
|
+
else
|
46
|
+
hash = Digest::SHA1.hexdigest( digest(tokens) )
|
47
|
+
end
|
48
|
+
|
49
|
+
hash
|
50
|
+
end
|
51
|
+
|
52
|
+
# Does the crypted password match the tokens? Uses the same tokens that were used to encrypt.
|
53
|
+
def matches?(crypted, *tokens)
|
54
|
+
encrypt(*tokens) == crypted
|
55
|
+
end
|
56
|
+
end
|
57
|
+
end
|
58
|
+
end
|
59
|
+
end
|
@@ -0,0 +1,50 @@
|
|
1
|
+
require "digest/sha2"
|
2
|
+
|
3
|
+
module Authlogic
|
4
|
+
# The acts_as_authentic method has a crypto_provider option. This allows you to use any type of encryption you like.
|
5
|
+
# Just create a class with a class level encrypt and matches? method. See example below.
|
6
|
+
#
|
7
|
+
# === Example
|
8
|
+
#
|
9
|
+
# class MyAwesomeEncryptionMethod
|
10
|
+
# def self.encrypt(*tokens)
|
11
|
+
# # the tokens passed will be an array of objects, what type of object is irrelevant,
|
12
|
+
# # just do what you need to do with them and return a single encrypted string.
|
13
|
+
# # for example, you will most likely join all of the objects into a single string and then encrypt that string
|
14
|
+
# end
|
15
|
+
#
|
16
|
+
# def self.matches?(crypted, *tokens)
|
17
|
+
# # return true if the crypted string matches the tokens.
|
18
|
+
# # depending on your algorithm you might decrypt the string then compare it to the token, or you might
|
19
|
+
# # encrypt the tokens and make sure it matches the crypted string, its up to you
|
20
|
+
# end
|
21
|
+
# end
|
22
|
+
module CryptoProviders
|
23
|
+
# = Sha512
|
24
|
+
#
|
25
|
+
# Uses the Sha512 hash algorithm to encrypt passwords.
|
26
|
+
class Sha512
|
27
|
+
class << self
|
28
|
+
attr_accessor :join_token
|
29
|
+
|
30
|
+
# The number of times to loop through the encryption. This is ten because that is what restful_authentication defaults to.
|
31
|
+
def stretches
|
32
|
+
@stretches ||= 20
|
33
|
+
end
|
34
|
+
attr_writer :stretches
|
35
|
+
|
36
|
+
# Turns your raw password into a Sha512 hash.
|
37
|
+
def encrypt(*tokens)
|
38
|
+
digest = tokens.flatten.join(join_token)
|
39
|
+
stretches.times { digest = Digest::SHA512.hexdigest(digest) }
|
40
|
+
digest
|
41
|
+
end
|
42
|
+
|
43
|
+
# Does the crypted password match the tokens? Uses the same tokens that were used to encrypt.
|
44
|
+
def matches?(crypted, *tokens)
|
45
|
+
encrypt(*tokens) == crypted
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
@@ -0,0 +1,67 @@
|
|
1
|
+
module CASServer
|
2
|
+
module Authenticators
|
3
|
+
class Base
|
4
|
+
attr_accessor :options
|
5
|
+
attr_reader :username # make this accessible so that we can pick up any
|
6
|
+
# transformations done within the authenticator
|
7
|
+
|
8
|
+
# This is called at server startup.
|
9
|
+
# Any class-wide initializiation for the authenticator should be done here.
|
10
|
+
# (e.g. establish database connection).
|
11
|
+
# You can leave this empty if you don't need to set up anything.
|
12
|
+
def self.setup(options)
|
13
|
+
end
|
14
|
+
|
15
|
+
# This is called prior to #validate (i.e. each time the user tries to log in).
|
16
|
+
# Any per-instance initialization for the authenticator should be done here.
|
17
|
+
#
|
18
|
+
# By default this makes the authenticator options hash available for #validate
|
19
|
+
# under @options and initializes @extra_attributes to an empty hash.
|
20
|
+
def configure(options)
|
21
|
+
raise ArgumentError, "options must be a HashWithIndifferentAccess" unless options.kind_of? HashWithIndifferentAccess
|
22
|
+
@options = options.dup
|
23
|
+
@extra_attributes = {}
|
24
|
+
end
|
25
|
+
|
26
|
+
# Override this to implement your authentication credential validation.
|
27
|
+
# This is called each time the user tries to log in. The credentials hash
|
28
|
+
# holds the credentials as entered by the user (generally under :username
|
29
|
+
# and :password keys; :service and :request are also included by default)
|
30
|
+
#
|
31
|
+
# Note that the standard credentials can be read in to instance variables
|
32
|
+
# by calling #read_standard_credentials.
|
33
|
+
def validate(credentials)
|
34
|
+
raise NotImplementedError, "This method must be implemented by a class extending #{self.class}"
|
35
|
+
end
|
36
|
+
|
37
|
+
def extra_attributes
|
38
|
+
@extra_attributes
|
39
|
+
end
|
40
|
+
|
41
|
+
protected
|
42
|
+
def read_standard_credentials(credentials)
|
43
|
+
@username = credentials[:username]
|
44
|
+
@password = credentials[:password]
|
45
|
+
@service = credentials[:service]
|
46
|
+
@request = credentials[:request]
|
47
|
+
end
|
48
|
+
|
49
|
+
def extra_attributes_to_extract
|
50
|
+
if @options[:extra_attributes].kind_of? Array
|
51
|
+
attrs = @options[:extra_attributes]
|
52
|
+
elsif @options[:extra_attributes].kind_of? String
|
53
|
+
attrs = @options[:extra_attributes].split(',').collect{|col| col.strip}
|
54
|
+
else
|
55
|
+
$LOG.error("Can't figure out attribute list from #{@options[:extra_attributes].inspect}. This must be an Aarray of column names or a comma-separated list.")
|
56
|
+
attrs = []
|
57
|
+
end
|
58
|
+
|
59
|
+
$LOG.debug("#{self.class.name} will try to extract the following extra_attributes: #{attrs.inspect}")
|
60
|
+
return attrs
|
61
|
+
end
|
62
|
+
end
|
63
|
+
end
|
64
|
+
|
65
|
+
class AuthenticatorError < Exception
|
66
|
+
end
|
67
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
require 'casserver/authenticators/base'
|
2
|
+
|
3
|
+
# NOT YET IMPLEMENTED
|
4
|
+
#
|
5
|
+
# This authenticator will authenticate the user based on a client SSL certificate.
|
6
|
+
#
|
7
|
+
# You will probably want to use this along with another authenticator, chaining
|
8
|
+
# it so that if the client does not provide a certificate, the server can
|
9
|
+
# fall back to some other authentication mechanism.
|
10
|
+
#
|
11
|
+
# Here's an example of how to use two chained authenticators in the config.yml
|
12
|
+
# file. The server will first use the ClientCertificate authenticator, and
|
13
|
+
# only fall back to the SQL authenticator of the first one fails:
|
14
|
+
#
|
15
|
+
# authenticator:
|
16
|
+
# -
|
17
|
+
# class: CASServer::Authenticators::ClientCertificate
|
18
|
+
# -
|
19
|
+
# class: CASServer::Authenticators::SQL
|
20
|
+
# database:
|
21
|
+
# adapter: mysql
|
22
|
+
# database: some_database_with_users_table
|
23
|
+
# user: root
|
24
|
+
# password:
|
25
|
+
# server: localhost
|
26
|
+
# user_table: user
|
27
|
+
# username_column: username
|
28
|
+
# password_column: password
|
29
|
+
#
|
30
|
+
class CASServer::Authenticators::ClientCertificate < CASServer::Authenticators::Base
|
31
|
+
def validate(credentials)
|
32
|
+
read_standard_credentials(credentials)
|
33
|
+
|
34
|
+
@client_cert = credentials[:request]['SSL_CLIENT_CERT']
|
35
|
+
|
36
|
+
# note that I haven't actually tested to see if SSL_CLIENT_CERT gets
|
37
|
+
# filled with data when a client cert is provided, but this should be
|
38
|
+
# the case at least in theory :)
|
39
|
+
|
40
|
+
return false if @client_cert.blank?
|
41
|
+
|
42
|
+
# IMPLEMENT SSL CERTIFICATE VALIDATION CODE HERE
|
43
|
+
raise NotImplementedError, "#{self.class.name}#validate NOT YET IMPLEMENTED!"
|
44
|
+
|
45
|
+
return true # if SSL certificate is valid, false otherwise
|
46
|
+
end
|
47
|
+
end
|
@@ -0,0 +1,58 @@
|
|
1
|
+
require 'casserver/authenticators/base'
|
2
|
+
require 'uri'
|
3
|
+
require 'net/http'
|
4
|
+
require 'net/https'
|
5
|
+
require 'timeout'
|
6
|
+
|
7
|
+
# Validates Google accounts against Google's authentication service -- in other
|
8
|
+
# words, this authenticator allows users to log in to CAS using their
|
9
|
+
# Gmail/Google accounts.
|
10
|
+
class CASServer::Authenticators::Google < CASServer::Authenticators::Base
|
11
|
+
def validate(credentials)
|
12
|
+
read_standard_credentials(credentials)
|
13
|
+
|
14
|
+
return false if @username.blank? || @password.blank?
|
15
|
+
|
16
|
+
auth_data = {
|
17
|
+
'Email' => @username,
|
18
|
+
'Passwd' => @password,
|
19
|
+
'service' => 'xapi',
|
20
|
+
'source' => 'RubyCAS-Server',
|
21
|
+
'accountType' => 'HOSTED_OR_GOOGLE'
|
22
|
+
}
|
23
|
+
|
24
|
+
url = URI.parse('https://www.google.com/accounts/ClientLogin')
|
25
|
+
if @options[:proxy]
|
26
|
+
http = Net::HTTP.Proxy(@options[:proxy][:host], @options[:proxy][:port], @options[:proxy][:username], @options[:proxy][:password]).new(url.host, url.port)
|
27
|
+
else
|
28
|
+
http = Net::HTTP.new(url.host, url.port)
|
29
|
+
end
|
30
|
+
http.use_ssl = true
|
31
|
+
|
32
|
+
# TODO: make the timeout configurable
|
33
|
+
wait_seconds = 10
|
34
|
+
begin
|
35
|
+
timeout(wait_seconds) do
|
36
|
+
res = http.start do |conn|
|
37
|
+
req = Net::HTTP::Post.new(url.path)
|
38
|
+
req.set_form_data(auth_data,'&')
|
39
|
+
conn.request(req)
|
40
|
+
end
|
41
|
+
|
42
|
+
case res
|
43
|
+
when Net::HTTPSuccess
|
44
|
+
true
|
45
|
+
when Net::HTTPForbidden
|
46
|
+
false
|
47
|
+
else
|
48
|
+
$LOG.error("Unexpected response from Google while validating credentials: #{res.inspect} ==> #{res.body}.")
|
49
|
+
raise CASServer::AuthenticatorError, "Unexpected response received from Google while validating credentials."
|
50
|
+
end
|
51
|
+
end
|
52
|
+
rescue Timeout::Error
|
53
|
+
$LOG.error("Google did not respond to the credential validation request. We waited for #{wait_seconds.inspect} seconds before giving up.")
|
54
|
+
raise CASServer::AuthenticatorError, "Timeout while waiting for Google to validate credentials."
|
55
|
+
end
|
56
|
+
|
57
|
+
end
|
58
|
+
end
|