bmedia-casserver 1.1.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (81) hide show
  1. data/CHANGELOG +325 -0
  2. data/Gemfile +3 -0
  3. data/LICENSE +26 -0
  4. data/README.md +19 -0
  5. data/Rakefile +2 -0
  6. data/bin/rubycas-server +30 -0
  7. data/config/config.example.yml +592 -0
  8. data/config/unicorn.rb +88 -0
  9. data/config.ru +17 -0
  10. data/db/migrate/001_create_initial_structure.rb +47 -0
  11. data/lib/casserver/authenticators/active_directory_ldap.rb +19 -0
  12. data/lib/casserver/authenticators/active_resource.rb +127 -0
  13. data/lib/casserver/authenticators/authlogic_crypto_providers/aes256.rb +43 -0
  14. data/lib/casserver/authenticators/authlogic_crypto_providers/bcrypt.rb +92 -0
  15. data/lib/casserver/authenticators/authlogic_crypto_providers/md5.rb +34 -0
  16. data/lib/casserver/authenticators/authlogic_crypto_providers/sha1.rb +59 -0
  17. data/lib/casserver/authenticators/authlogic_crypto_providers/sha512.rb +50 -0
  18. data/lib/casserver/authenticators/base.rb +67 -0
  19. data/lib/casserver/authenticators/client_certificate.rb +47 -0
  20. data/lib/casserver/authenticators/google.rb +58 -0
  21. data/lib/casserver/authenticators/ldap.rb +147 -0
  22. data/lib/casserver/authenticators/ntlm.rb +88 -0
  23. data/lib/casserver/authenticators/open_id.rb +22 -0
  24. data/lib/casserver/authenticators/sql.rb +133 -0
  25. data/lib/casserver/authenticators/sql_authlogic.rb +93 -0
  26. data/lib/casserver/authenticators/sql_encrypted.rb +75 -0
  27. data/lib/casserver/authenticators/sql_md5.rb +19 -0
  28. data/lib/casserver/authenticators/sql_rest_auth.rb +82 -0
  29. data/lib/casserver/authenticators/test.rb +22 -0
  30. data/lib/casserver/cas.rb +323 -0
  31. data/lib/casserver/localization.rb +13 -0
  32. data/lib/casserver/model.rb +270 -0
  33. data/lib/casserver/server.rb +758 -0
  34. data/lib/casserver/utils.rb +32 -0
  35. data/lib/casserver/views/_login_form.erb +42 -0
  36. data/lib/casserver/views/layout.erb +18 -0
  37. data/lib/casserver/views/login.erb +30 -0
  38. data/lib/casserver/views/proxy.builder +12 -0
  39. data/lib/casserver/views/proxy_validate.builder +25 -0
  40. data/lib/casserver/views/service_validate.builder +18 -0
  41. data/lib/casserver/views/validate.erb +2 -0
  42. data/lib/casserver.rb +11 -0
  43. data/locales/de.yml +27 -0
  44. data/locales/en.yml +26 -0
  45. data/locales/es.yml +26 -0
  46. data/locales/es_ar.yml +26 -0
  47. data/locales/fr.yml +26 -0
  48. data/locales/jp.yml +26 -0
  49. data/locales/pl.yml +26 -0
  50. data/locales/pt.yml +26 -0
  51. data/locales/ru.yml +26 -0
  52. data/locales/zh.yml +26 -0
  53. data/locales/zh_tw.yml +26 -0
  54. data/public/themes/cas.css +126 -0
  55. data/public/themes/notice.png +0 -0
  56. data/public/themes/ok.png +0 -0
  57. data/public/themes/simple/bg.png +0 -0
  58. data/public/themes/simple/favicon.png +0 -0
  59. data/public/themes/simple/login_box_bg.png +0 -0
  60. data/public/themes/simple/logo.png +0 -0
  61. data/public/themes/simple/theme.css +28 -0
  62. data/public/themes/urbacon/bg.png +0 -0
  63. data/public/themes/urbacon/login_box_bg.png +0 -0
  64. data/public/themes/urbacon/logo.png +0 -0
  65. data/public/themes/urbacon/theme.css +33 -0
  66. data/public/themes/warning.png +0 -0
  67. data/resources/init.d.sh +58 -0
  68. data/setup.rb +1585 -0
  69. data/spec/alt_config.yml +50 -0
  70. data/spec/authenticators/active_resource_spec.rb +109 -0
  71. data/spec/authenticators/ldap_spec.rb +53 -0
  72. data/spec/casserver_spec.rb +156 -0
  73. data/spec/default_config.yml +50 -0
  74. data/spec/model_spec.rb +42 -0
  75. data/spec/spec.opts +4 -0
  76. data/spec/spec_helper.rb +89 -0
  77. data/spec/utils_spec.rb +53 -0
  78. data/tasks/bundler.rake +4 -0
  79. data/tasks/db/migrate.rake +12 -0
  80. data/tasks/spec.rake +10 -0
  81. metadata +308 -0
@@ -0,0 +1,47 @@
1
+ class CreateInitialStructure < ActiveRecord::Migration
2
+ def self.up
3
+ # Oracle table names cannot exceed 30 chars...
4
+ # See http://code.google.com/p/rubycas-server/issues/detail?id=15
5
+ create_table 'casserver_lt', :force => true do |t|
6
+ t.string 'ticket', :null => false
7
+ t.timestamp 'created_on', :null => false
8
+ t.datetime 'consumed', :null => true
9
+ t.string 'client_hostname', :null => false
10
+ end
11
+
12
+ create_table 'casserver_st', :force => true do |t|
13
+ t.string 'ticket', :null => false
14
+ t.text 'service', :null => false
15
+ t.timestamp 'created_on', :null => false
16
+ t.datetime 'consumed', :null => true
17
+ t.string 'client_hostname', :null => false
18
+ t.string 'username', :null => false
19
+ t.string 'type', :null => false
20
+ t.integer 'granted_by_pgt_id', :null => true
21
+ t.integer 'granted_by_tgt_id', :null => true
22
+ end
23
+
24
+ create_table 'casserver_tgt', :force => true do |t|
25
+ t.string 'ticket', :null => false
26
+ t.timestamp 'created_on', :null => false
27
+ t.string 'client_hostname', :null => false
28
+ t.string 'username', :null => false
29
+ t.text 'extra_attributes', :null => true
30
+ end
31
+
32
+ create_table 'casserver_pgt', :force => true do |t|
33
+ t.string 'ticket', :null => false
34
+ t.timestamp 'created_on', :null => false
35
+ t.string 'client_hostname', :null => false
36
+ t.string 'iou', :null => false
37
+ t.integer 'service_ticket_id', :null => false
38
+ end
39
+ end # self.up
40
+
41
+ def self.down
42
+ drop_table 'casserver_pgt'
43
+ drop_table 'casserver_tgt'
44
+ drop_table 'casserver_st'
45
+ drop_table 'casserver_lt'
46
+ end # self.down
47
+ end
@@ -0,0 +1,19 @@
1
+ require 'casserver/authenticators/ldap'
2
+
3
+ # Slightly modified version of the LDAP authenticator for Microsoft's ActiveDirectory.
4
+ # The only difference is that the default_username_attribute for AD is 'sAMAccountName'
5
+ # rather than 'uid'.
6
+ class CASServer::Authenticators::ActiveDirectoryLDAP < CASServer::Authenticators::LDAP
7
+ protected
8
+ def default_username_attribute
9
+ "sAMAccountName"
10
+ end
11
+
12
+ def extract_extra_attributes(ldap_entry)
13
+ super(ldap_entry)
14
+ if @extra_attributes["objectGUID"]
15
+ @extra_attributes["guid"] = @extra_attributes["objectGUID"].to_s.unpack("H*").to_s
16
+ end
17
+ ldap_entry
18
+ end
19
+ end
@@ -0,0 +1,127 @@
1
+ require 'casserver/authenticators/base'
2
+
3
+ begin
4
+ require 'active_resource'
5
+ rescue LoadError
6
+ require 'rubygems'
7
+ begin
8
+ gem 'activeresource', '~> 3.0.0'
9
+ rescue Gem::LoadError
10
+ $stderr.puts
11
+ $stderr.puts "!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
12
+ $stderr.puts
13
+ $stderr.puts "To use the ActiveResource authenticator, you must first install the 'activeresource' gem."
14
+ $stderr.puts
15
+ $stderr.puts "!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
16
+ exit 1
17
+ end
18
+ require 'active_resource'
19
+ end
20
+
21
+ module CASServer
22
+ module Authenticators
23
+
24
+ module Helpers
25
+ class Identity < ActiveResource::Base
26
+
27
+ # define method_name accessor
28
+ cattr_accessor(:method_name)
29
+ self.method_name = :authenticate
30
+
31
+ def self.method_type
32
+ @@method_type ||= :post
33
+ end
34
+
35
+ def self.method_type= type
36
+ methods = [:get, :post, :put, :delete]
37
+ raise ArgumentError, "Method type should be one of #{methods.map { |m| m.to_s.upcase }.join(', ')}" unless methods.include? type.to_sym
38
+ @@method_type = type
39
+ end
40
+
41
+ # Autenticate an identity using the given method
42
+ # @param [Hash] credentials
43
+ def self.authenticate(credentials = {})
44
+ response = send(method_type, method_name, credentials)
45
+ new.from_authentication_data(response)
46
+ end
47
+
48
+ # Used to load object attributes from the given response
49
+ def from_authentication_data response
50
+ load_attributes_from_response(response)
51
+ end
52
+ end
53
+ end
54
+
55
+ class ActiveResource < Base
56
+
57
+ # This is called at server startup.
58
+ # Any class-wide initializiation for the authenticator should be done here.
59
+ # (e.g. establish database connection).
60
+ # You can leave this empty if you don't need to set up anything.
61
+ def self.setup(options)
62
+ raise AuthenticatorError, 'You must define at least site option' unless options[:site]
63
+ # apply options to active resource object
64
+ options.each do |method, arg|
65
+ Helpers::Identity.send "#{method}=", arg if Helpers::Identity.respond_to? "#{method}="
66
+ end
67
+ $LOG.info "ActiveResource configuration loaded"
68
+ end
69
+
70
+ # Override this to implement your authentication credential validation.
71
+ # This is called each time the user tries to log in. The credentials hash
72
+ # holds the credentials as entered by the user (generally under :username
73
+ # and :password keys; :service and :request are also included by default)
74
+ #
75
+ # Note that the standard credentials can be read in to instance variables
76
+ # by calling #read_standard_credentials.
77
+ def validate(credentials)
78
+ begin
79
+ $LOG.debug("Starting Active Resource authentication")
80
+ result = Helpers::Identity.authenticate(credentials.except(:request))
81
+ extract_extra_attributes(result) if result
82
+ !!result
83
+ rescue ::ActiveResource::ConnectionError => e
84
+ if e.response.blank? # band-aid for ARes 2.3.x -- craps out if to_s is called without a response
85
+ e = e.class.to_s
86
+ end
87
+ $LOG.warn("Error during authentication: #{e}")
88
+ false
89
+ end
90
+ end
91
+
92
+ private
93
+
94
+ def extract_extra_attributes(resource)
95
+ @extra_attributes = {}
96
+ $LOG.debug("Parsing extra attributes")
97
+ if @options[:extra_attributes]
98
+ extra_attributes_to_extract.each do |attr|
99
+ @extra_attributes[attr] = resource.send(attr).to_s
100
+ end
101
+ else
102
+ @extra_attributes = resource.attributes
103
+ end
104
+ # do filtering
105
+ extra_attributes_to_filter.each do |attr|
106
+ @extra_attributes.delete(attr)
107
+ end
108
+ end
109
+
110
+ # extract attributes to filter from the given configuration
111
+ def extra_attributes_to_filter
112
+ # default value if not set
113
+ return ['password'] unless @options[:filter_attributes]
114
+ # parse option value
115
+ if @options[:filter_attributes].kind_of? Array
116
+ attrs = @options[:filter_attributes]
117
+ elsif @options[:filter_attributes].kind_of? String
118
+ attrs = @options[:filter_attributes].split(',').collect { |col| col.strip }
119
+ else
120
+ $LOG.error("Can't figure out attribute list from #{@options[:filter_attributes].inspect}. This must be an Aarray of column names or a comma-separated list.")
121
+ attrs = []
122
+ end
123
+ attrs
124
+ end
125
+ end
126
+ end
127
+ end
@@ -0,0 +1,43 @@
1
+ require "openssl"
2
+
3
+ module Authlogic
4
+ module CryptoProviders
5
+ # This encryption method is reversible if you have the supplied key. So in order to use this encryption method you must supply it with a key first.
6
+ # In an initializer, or before your application initializes, you should do the following:
7
+ #
8
+ # Authlogic::CryptoProviders::AES256.key = "my really long and unique key, preferrably a bunch of random characters"
9
+ #
10
+ # My final comment is that this is a strong encryption method, but its main weakness is that its reversible. If you do not need to reverse the hash
11
+ # then you should consider Sha512 or BCrypt instead.
12
+ #
13
+ # Keep your key in a safe place, some even say the key should be stored on a separate server.
14
+ # This won't hurt performance because the only time it will try and access the key on the separate server is during initialization, which only
15
+ # happens once. The reasoning behind this is if someone does compromise your server they won't have the key also. Basically, you don't want to
16
+ # store the key with the lock.
17
+ class AES256
18
+ class << self
19
+ attr_writer :key
20
+
21
+ def encrypt(*tokens)
22
+ aes.encrypt
23
+ aes.key = @key
24
+ [aes.update(tokens.join) + aes.final].pack("m").chomp
25
+ end
26
+
27
+ def matches?(crypted, *tokens)
28
+ aes.decrypt
29
+ aes.key = @key
30
+ (aes.update(crypted.unpack("m").first) + aes.final) == tokens.join
31
+ rescue OpenSSL::CipherError
32
+ false
33
+ end
34
+
35
+ private
36
+ def aes
37
+ raise ArgumentError.new("You must provide a key like #{name}.key = my_key before using the #{name}") if @key.blank?
38
+ @aes ||= OpenSSL::Cipher::Cipher.new("AES-256-ECB")
39
+ end
40
+ end
41
+ end
42
+ end
43
+ end
@@ -0,0 +1,92 @@
1
+ begin
2
+ require "bcrypt"
3
+ rescue LoadError
4
+ end
5
+
6
+ module Authlogic
7
+ module CryptoProviders
8
+ # For most apps Sha512 is plenty secure, but if you are building an app that stores nuclear launch codes you might want to consier BCrypt. This is an extremely
9
+ # secure hashing algorithm, mainly because it is slow. A brute force attack on a BCrypt encrypted password would take much longer than a brute force attack on a
10
+ # password encrypted with a Sha algorithm. Keep in mind you are sacrificing performance by using this, generating a password takes exponentially longer than any
11
+ # of the Sha algorithms. I did some benchmarking to save you some time with your decision:
12
+ #
13
+ # require "bcrypt"
14
+ # require "digest"
15
+ # require "benchmark"
16
+ #
17
+ # Benchmark.bm(18) do |x|
18
+ # x.report("BCrypt (cost = 10:") { 100.times { BCrypt::Password.create("mypass", :cost => 10) } }
19
+ # x.report("BCrypt (cost = 2:") { 100.times { BCrypt::Password.create("mypass", :cost => 2) } }
20
+ # x.report("Sha512:") { 100.times { Digest::SHA512.hexdigest("mypass") } }
21
+ # x.report("Sha1:") { 100.times { Digest::SHA1.hexdigest("mypass") } }
22
+ # end
23
+ #
24
+ # user system total real
25
+ # BCrypt (cost = 10): 10.780000 0.060000 10.840000 ( 11.100289)
26
+ # BCrypt (cost = 2): 0.180000 0.000000 0.180000 ( 0.181914)
27
+ # Sha512: 0.000000 0.000000 0.000000 ( 0.000829)
28
+ # Sha1: 0.000000 0.000000 0.000000 ( 0.000395)
29
+ #
30
+ # You can play around with the cost to get that perfect balance between performance and security.
31
+ #
32
+ # Decided BCrypt is for you? Just insall the bcrypt gem:
33
+ #
34
+ # gem install bcrypt-ruby
35
+ #
36
+ # Tell acts_as_authentic to use it:
37
+ #
38
+ # acts_as_authentic do |c|
39
+ # c.crypto_provider = Authlogic::CryptoProviders::BCrypt
40
+ # end
41
+ #
42
+ # You are good to go!
43
+ class BCrypt
44
+ class << self
45
+ # This is the :cost option for the BCrpyt library. The higher the cost the more secure it is and the longer is take the generate a hash. By default this is 10.
46
+ # Set this to whatever you want, play around with it to get that perfect balance between security and performance.
47
+ def cost
48
+ @cost ||= 10
49
+ end
50
+ attr_writer :cost
51
+
52
+ # Creates a BCrypt hash for the password passed.
53
+ def encrypt(*tokens)
54
+ ::BCrypt::Password.create(join_tokens(tokens), :cost => cost)
55
+ end
56
+
57
+ # Does the hash match the tokens? Uses the same tokens that were used to encrypt.
58
+ def matches?(hash, *tokens)
59
+ $LOG.debug hash
60
+ $LOG.debug tokens.inspect
61
+
62
+ hash = new_from_hash(hash)
63
+ return false if hash.blank?
64
+ hash == join_tokens(tokens)
65
+ end
66
+
67
+ # This method is used as a flag to tell Authlogic to "resave" the password upon a successful login, using the new cost
68
+ def cost_matches?(hash)
69
+ hash = new_from_hash(hash)
70
+ if hash.blank?
71
+ false
72
+ else
73
+ hash.cost == cost
74
+ end
75
+ end
76
+
77
+ private
78
+ def join_tokens(tokens)
79
+ tokens.flatten.join
80
+ end
81
+
82
+ def new_from_hash(hash)
83
+ begin
84
+ ::BCrypt::Password.new(hash)
85
+ rescue ::BCrypt::Errors::InvalidHash
86
+ return nil
87
+ end
88
+ end
89
+ end
90
+ end
91
+ end
92
+ end
@@ -0,0 +1,34 @@
1
+ require "digest/md5"
2
+
3
+ module Authlogic
4
+ module CryptoProviders
5
+ # This class was made for the users transitioning from md5 based systems.
6
+ # I highly discourage using this crypto provider as it superbly inferior
7
+ # to your other options.
8
+ #
9
+ # Please use any other provider offered by Authlogic.
10
+ class MD5
11
+ class << self
12
+ attr_accessor :join_token
13
+
14
+ # The number of times to loop through the encryption.
15
+ def stretches
16
+ @stretches ||= 1
17
+ end
18
+ attr_writer :stretches
19
+
20
+ # Turns your raw password into a MD5 hash.
21
+ def encrypt(*tokens)
22
+ digest = tokens.flatten.join(join_token)
23
+ stretches.times { digest = Digest::MD5.hexdigest(digest) }
24
+ digest
25
+ end
26
+
27
+ # Does the crypted password match the tokens? Uses the same tokens that were used to encrypt.
28
+ def matches?(crypted, *tokens)
29
+ encrypt(*tokens) == crypted
30
+ end
31
+ end
32
+ end
33
+ end
34
+ end
@@ -0,0 +1,59 @@
1
+ require "digest/sha1"
2
+
3
+ module Authlogic
4
+ module CryptoProviders
5
+ # This class was made for the users transitioning from restful_authentication.
6
+ # I highly discourage using this crypto provider as it inferior to your other options.
7
+ # Please use any other provider offered by Authlogic.
8
+ class Sha1
9
+ class << self
10
+ def join_token
11
+ @join_token ||= "--"
12
+ end
13
+ attr_writer :join_token
14
+
15
+ def digest_format=(format)
16
+ @digest_format = format
17
+ end
18
+
19
+ # This is for "old style" authentication with a custom format of digest
20
+ def digest(tokens)
21
+ if @digest_format
22
+ @digest_format.
23
+ gsub('PASSWORD', tokens.first).
24
+ gsub('SALT', tokens.last)
25
+ else
26
+ tokens.join(join_token)
27
+ end
28
+ end
29
+
30
+ # The number of times to loop through the encryption.
31
+ # This is ten because that is what restful_authentication defaults to.
32
+
33
+ def stretches
34
+ @stretches ||= 10
35
+ end
36
+ attr_writer :stretches
37
+
38
+ # Turns your raw password into a Sha1 hash.
39
+ def encrypt(*tokens)
40
+ tokens = tokens.flatten
41
+
42
+ if stretches > 1
43
+ hash = tokens.shift
44
+ stretches.times { hash = Digest::SHA1.hexdigest([hash, *tokens].join(join_token)) }
45
+ else
46
+ hash = Digest::SHA1.hexdigest( digest(tokens) )
47
+ end
48
+
49
+ hash
50
+ end
51
+
52
+ # Does the crypted password match the tokens? Uses the same tokens that were used to encrypt.
53
+ def matches?(crypted, *tokens)
54
+ encrypt(*tokens) == crypted
55
+ end
56
+ end
57
+ end
58
+ end
59
+ end
@@ -0,0 +1,50 @@
1
+ require "digest/sha2"
2
+
3
+ module Authlogic
4
+ # The acts_as_authentic method has a crypto_provider option. This allows you to use any type of encryption you like.
5
+ # Just create a class with a class level encrypt and matches? method. See example below.
6
+ #
7
+ # === Example
8
+ #
9
+ # class MyAwesomeEncryptionMethod
10
+ # def self.encrypt(*tokens)
11
+ # # the tokens passed will be an array of objects, what type of object is irrelevant,
12
+ # # just do what you need to do with them and return a single encrypted string.
13
+ # # for example, you will most likely join all of the objects into a single string and then encrypt that string
14
+ # end
15
+ #
16
+ # def self.matches?(crypted, *tokens)
17
+ # # return true if the crypted string matches the tokens.
18
+ # # depending on your algorithm you might decrypt the string then compare it to the token, or you might
19
+ # # encrypt the tokens and make sure it matches the crypted string, its up to you
20
+ # end
21
+ # end
22
+ module CryptoProviders
23
+ # = Sha512
24
+ #
25
+ # Uses the Sha512 hash algorithm to encrypt passwords.
26
+ class Sha512
27
+ class << self
28
+ attr_accessor :join_token
29
+
30
+ # The number of times to loop through the encryption. This is ten because that is what restful_authentication defaults to.
31
+ def stretches
32
+ @stretches ||= 20
33
+ end
34
+ attr_writer :stretches
35
+
36
+ # Turns your raw password into a Sha512 hash.
37
+ def encrypt(*tokens)
38
+ digest = tokens.flatten.join(join_token)
39
+ stretches.times { digest = Digest::SHA512.hexdigest(digest) }
40
+ digest
41
+ end
42
+
43
+ # Does the crypted password match the tokens? Uses the same tokens that were used to encrypt.
44
+ def matches?(crypted, *tokens)
45
+ encrypt(*tokens) == crypted
46
+ end
47
+ end
48
+ end
49
+ end
50
+ end
@@ -0,0 +1,67 @@
1
+ module CASServer
2
+ module Authenticators
3
+ class Base
4
+ attr_accessor :options
5
+ attr_reader :username # make this accessible so that we can pick up any
6
+ # transformations done within the authenticator
7
+
8
+ # This is called at server startup.
9
+ # Any class-wide initializiation for the authenticator should be done here.
10
+ # (e.g. establish database connection).
11
+ # You can leave this empty if you don't need to set up anything.
12
+ def self.setup(options)
13
+ end
14
+
15
+ # This is called prior to #validate (i.e. each time the user tries to log in).
16
+ # Any per-instance initialization for the authenticator should be done here.
17
+ #
18
+ # By default this makes the authenticator options hash available for #validate
19
+ # under @options and initializes @extra_attributes to an empty hash.
20
+ def configure(options)
21
+ raise ArgumentError, "options must be a HashWithIndifferentAccess" unless options.kind_of? HashWithIndifferentAccess
22
+ @options = options.dup
23
+ @extra_attributes = {}
24
+ end
25
+
26
+ # Override this to implement your authentication credential validation.
27
+ # This is called each time the user tries to log in. The credentials hash
28
+ # holds the credentials as entered by the user (generally under :username
29
+ # and :password keys; :service and :request are also included by default)
30
+ #
31
+ # Note that the standard credentials can be read in to instance variables
32
+ # by calling #read_standard_credentials.
33
+ def validate(credentials)
34
+ raise NotImplementedError, "This method must be implemented by a class extending #{self.class}"
35
+ end
36
+
37
+ def extra_attributes
38
+ @extra_attributes
39
+ end
40
+
41
+ protected
42
+ def read_standard_credentials(credentials)
43
+ @username = credentials[:username]
44
+ @password = credentials[:password]
45
+ @service = credentials[:service]
46
+ @request = credentials[:request]
47
+ end
48
+
49
+ def extra_attributes_to_extract
50
+ if @options[:extra_attributes].kind_of? Array
51
+ attrs = @options[:extra_attributes]
52
+ elsif @options[:extra_attributes].kind_of? String
53
+ attrs = @options[:extra_attributes].split(',').collect{|col| col.strip}
54
+ else
55
+ $LOG.error("Can't figure out attribute list from #{@options[:extra_attributes].inspect}. This must be an Aarray of column names or a comma-separated list.")
56
+ attrs = []
57
+ end
58
+
59
+ $LOG.debug("#{self.class.name} will try to extract the following extra_attributes: #{attrs.inspect}")
60
+ return attrs
61
+ end
62
+ end
63
+ end
64
+
65
+ class AuthenticatorError < Exception
66
+ end
67
+ end
@@ -0,0 +1,47 @@
1
+ require 'casserver/authenticators/base'
2
+
3
+ # NOT YET IMPLEMENTED
4
+ #
5
+ # This authenticator will authenticate the user based on a client SSL certificate.
6
+ #
7
+ # You will probably want to use this along with another authenticator, chaining
8
+ # it so that if the client does not provide a certificate, the server can
9
+ # fall back to some other authentication mechanism.
10
+ #
11
+ # Here's an example of how to use two chained authenticators in the config.yml
12
+ # file. The server will first use the ClientCertificate authenticator, and
13
+ # only fall back to the SQL authenticator of the first one fails:
14
+ #
15
+ # authenticator:
16
+ # -
17
+ # class: CASServer::Authenticators::ClientCertificate
18
+ # -
19
+ # class: CASServer::Authenticators::SQL
20
+ # database:
21
+ # adapter: mysql
22
+ # database: some_database_with_users_table
23
+ # user: root
24
+ # password:
25
+ # server: localhost
26
+ # user_table: user
27
+ # username_column: username
28
+ # password_column: password
29
+ #
30
+ class CASServer::Authenticators::ClientCertificate < CASServer::Authenticators::Base
31
+ def validate(credentials)
32
+ read_standard_credentials(credentials)
33
+
34
+ @client_cert = credentials[:request]['SSL_CLIENT_CERT']
35
+
36
+ # note that I haven't actually tested to see if SSL_CLIENT_CERT gets
37
+ # filled with data when a client cert is provided, but this should be
38
+ # the case at least in theory :)
39
+
40
+ return false if @client_cert.blank?
41
+
42
+ # IMPLEMENT SSL CERTIFICATE VALIDATION CODE HERE
43
+ raise NotImplementedError, "#{self.class.name}#validate NOT YET IMPLEMENTED!"
44
+
45
+ return true # if SSL certificate is valid, false otherwise
46
+ end
47
+ end
@@ -0,0 +1,58 @@
1
+ require 'casserver/authenticators/base'
2
+ require 'uri'
3
+ require 'net/http'
4
+ require 'net/https'
5
+ require 'timeout'
6
+
7
+ # Validates Google accounts against Google's authentication service -- in other
8
+ # words, this authenticator allows users to log in to CAS using their
9
+ # Gmail/Google accounts.
10
+ class CASServer::Authenticators::Google < CASServer::Authenticators::Base
11
+ def validate(credentials)
12
+ read_standard_credentials(credentials)
13
+
14
+ return false if @username.blank? || @password.blank?
15
+
16
+ auth_data = {
17
+ 'Email' => @username,
18
+ 'Passwd' => @password,
19
+ 'service' => 'xapi',
20
+ 'source' => 'RubyCAS-Server',
21
+ 'accountType' => 'HOSTED_OR_GOOGLE'
22
+ }
23
+
24
+ url = URI.parse('https://www.google.com/accounts/ClientLogin')
25
+ if @options[:proxy]
26
+ http = Net::HTTP.Proxy(@options[:proxy][:host], @options[:proxy][:port], @options[:proxy][:username], @options[:proxy][:password]).new(url.host, url.port)
27
+ else
28
+ http = Net::HTTP.new(url.host, url.port)
29
+ end
30
+ http.use_ssl = true
31
+
32
+ # TODO: make the timeout configurable
33
+ wait_seconds = 10
34
+ begin
35
+ timeout(wait_seconds) do
36
+ res = http.start do |conn|
37
+ req = Net::HTTP::Post.new(url.path)
38
+ req.set_form_data(auth_data,'&')
39
+ conn.request(req)
40
+ end
41
+
42
+ case res
43
+ when Net::HTTPSuccess
44
+ true
45
+ when Net::HTTPForbidden
46
+ false
47
+ else
48
+ $LOG.error("Unexpected response from Google while validating credentials: #{res.inspect} ==> #{res.body}.")
49
+ raise CASServer::AuthenticatorError, "Unexpected response received from Google while validating credentials."
50
+ end
51
+ end
52
+ rescue Timeout::Error
53
+ $LOG.error("Google did not respond to the credential validation request. We waited for #{wait_seconds.inspect} seconds before giving up.")
54
+ raise CASServer::AuthenticatorError, "Timeout while waiting for Google to validate credentials."
55
+ end
56
+
57
+ end
58
+ end