devise-pwned_password 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 7794b80de3b65f09c95f29c5cb907c9643d61bad
4
+ data.tar.gz: e76f856c88cb727d8b93d5df55ba69ddbd96ca32
5
+ SHA512:
6
+ metadata.gz: 1c3f388b3f4ba33481294492f318e5eecf8f45c790e12608fe3dfa7096b3e0c5526a7dc857d03f40e479ec37bceea5371d26e0768030fcc9e6eb83b00bb5eb7c
7
+ data.tar.gz: 741f99479411bdbaaa2d5eea56c68c10eaaa216aef2f295615bfe9fb91810b79f512665e14b01547496e5bc82142d13cdcc27c82c48b819bd303daf33b293a33
data/MIT-LICENSE ADDED
@@ -0,0 +1,20 @@
1
+ Copyright 2017 Michael
2
+
3
+ Permission is hereby granted, free of charge, to any person obtaining
4
+ a copy of this software and associated documentation files (the
5
+ "Software"), to deal in the Software without restriction, including
6
+ without limitation the rights to use, copy, modify, merge, publish,
7
+ distribute, sublicense, and/or sell copies of the Software, and to
8
+ permit persons to whom the Software is furnished to do so, subject to
9
+ the following conditions:
10
+
11
+ The above copyright notice and this permission notice shall be
12
+ included in all copies or substantial portions of the Software.
13
+
14
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
15
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
16
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
17
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
18
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
19
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
20
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,28 @@
1
+ # Devise::PwnedPassword
2
+ Short description and motivation.
3
+
4
+ ## Usage
5
+ How to use my plugin.
6
+
7
+ ## Installation
8
+ Add this line to your application's Gemfile:
9
+
10
+ ```ruby
11
+ gem 'devise-pwned_password'
12
+ ```
13
+
14
+ And then execute:
15
+ ```bash
16
+ $ bundle
17
+ ```
18
+
19
+ Or install it yourself as:
20
+ ```bash
21
+ $ gem install devise-pwned_password
22
+ ```
23
+
24
+ ## Contributing
25
+ Contribution directions go here.
26
+
27
+ ## License
28
+ The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).
data/Rakefile ADDED
@@ -0,0 +1,33 @@
1
+ begin
2
+ require 'bundler/setup'
3
+ rescue LoadError
4
+ puts 'You must `gem install bundler` and `bundle install` to run rake tasks'
5
+ end
6
+
7
+ require 'rdoc/task'
8
+
9
+ RDoc::Task.new(:rdoc) do |rdoc|
10
+ rdoc.rdoc_dir = 'rdoc'
11
+ rdoc.title = 'Devise::PwnedPassword'
12
+ rdoc.options << '--line-numbers'
13
+ rdoc.rdoc_files.include('README.md')
14
+ rdoc.rdoc_files.include('lib/**/*.rb')
15
+ end
16
+
17
+
18
+
19
+
20
+
21
+
22
+ require 'bundler/gem_tasks'
23
+
24
+ require 'rake/testtask'
25
+
26
+ Rake::TestTask.new(:test) do |t|
27
+ t.libs << 'test'
28
+ t.pattern = 'test/**/*_test.rb'
29
+ t.verbose = false
30
+ end
31
+
32
+
33
+ task default: :test
@@ -0,0 +1,62 @@
1
+ require 'net/http'
2
+
3
+ module Devise
4
+ module Models
5
+ # The PwnedPassword module adds a new validation for Devise Models.
6
+ # No modifications to routes or controllers needed.
7
+ # Simply add :pwned_password to the list of included modules in your
8
+ # devise module, and all new registrations will be blocked if they use
9
+ # a password in this dataset https://haveibeenpwned.com/Passwords.
10
+ module PwnedPassword
11
+ extend ActiveSupport::Concern
12
+
13
+ included do
14
+ validate :not_pwned_password
15
+ end
16
+
17
+ private
18
+
19
+
20
+ # Returns true if password is present in the PwnedPasswords dataset
21
+ # Implement retry behaviour described here https://haveibeenpwned.com/API/v2#RateLimiting
22
+ def is_password_pwned(password)
23
+
24
+ sha1Hash = Digest::SHA1.hexdigest password
25
+
26
+ userAgent = "devise_pwned_password"
27
+
28
+ uri = URI.parse("https://haveibeenpwned.com/api/v2/pwnedpassword/#{sha1Hash}")
29
+
30
+ Net::HTTP.start(uri.host, uri.port, :use_ssl => true) do |http|
31
+ request = Net::HTTP::Get.new(uri.request_uri, {'User-Agent' => userAgent})
32
+ 3.times {
33
+ response = http.request request
34
+ if response.code != '429'
35
+ return response.code == '200'
36
+ end
37
+
38
+ retryAfter = response.get_fields('Retry-After')[0].to_i
39
+
40
+ if retryAfter > 10
41
+ #Exit early if the throttling is too high
42
+ return false
43
+ end
44
+
45
+ sleep retryAfter
46
+ }
47
+ end
48
+
49
+ return false
50
+ end
51
+
52
+ def not_pwned_password
53
+
54
+ #This deliberately fails silently on 500's etc. Most apps wont want to tie the ability to sign up customers to the availability of a third party API
55
+ if is_password_pwned(password)
56
+ # Error message taken from https://haveibeenpwned.com/Passwords
57
+ errors.add(:password, "This password has previously appeared in a data breach and should never be used. Please choose something harder to guess.")
58
+ end
59
+ end
60
+ end
61
+ end
62
+ end
@@ -0,0 +1,5 @@
1
+ module Devise
2
+ module PwnedPassword
3
+ VERSION = '0.1.0'
4
+ end
5
+ end
@@ -0,0 +1,9 @@
1
+ require 'devise'
2
+ require 'devise/pwned_password/model'
3
+
4
+ module Devise
5
+ module PwnedPassword
6
+ end
7
+ end
8
+
9
+ Devise.add_module :pwned_password, model: "devise_pwned_password/model"
@@ -0,0 +1,4 @@
1
+ # desc "Explaining what the task does"
2
+ # task :devise_pwned_password do
3
+ # # Task goes here
4
+ # end
metadata ADDED
@@ -0,0 +1,80 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: devise-pwned_password
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Michael Banfield
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2017-10-04 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: rails
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: 5.1.2
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: 5.1.2
27
+ - !ruby/object:Gem::Dependency
28
+ name: sqlite3
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - ">="
32
+ - !ruby/object:Gem::Version
33
+ version: '0'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - ">="
39
+ - !ruby/object:Gem::Version
40
+ version: '0'
41
+ description: Devise extension that checks user passwords against the PwnedPasswords
42
+ dataset https://haveibeenpwned.com/Passwords.
43
+ email:
44
+ - michael@michaelbanfield.com
45
+ executables: []
46
+ extensions: []
47
+ extra_rdoc_files: []
48
+ files:
49
+ - MIT-LICENSE
50
+ - README.md
51
+ - Rakefile
52
+ - lib/devise/pwned_password.rb
53
+ - lib/devise/pwned_password/model.rb
54
+ - lib/devise/pwned_password/version.rb
55
+ - lib/tasks/devise/pwned_password_tasks.rake
56
+ homepage: https://github.com/michaelbanfield/devise-pwned_password
57
+ licenses:
58
+ - MIT
59
+ metadata: {}
60
+ post_install_message:
61
+ rdoc_options: []
62
+ require_paths:
63
+ - lib
64
+ required_ruby_version: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - ">="
67
+ - !ruby/object:Gem::Version
68
+ version: '0'
69
+ required_rubygems_version: !ruby/object:Gem::Requirement
70
+ requirements:
71
+ - - ">="
72
+ - !ruby/object:Gem::Version
73
+ version: '0'
74
+ requirements: []
75
+ rubyforge_project:
76
+ rubygems_version: 2.6.12
77
+ signing_key:
78
+ specification_version: 4
79
+ summary: Devise extension that checks user passwords against the PwnedPasswords dataset.
80
+ test_files: []