devise-pwned_password 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 7794b80de3b65f09c95f29c5cb907c9643d61bad
4
+ data.tar.gz: e76f856c88cb727d8b93d5df55ba69ddbd96ca32
5
+ SHA512:
6
+ metadata.gz: 1c3f388b3f4ba33481294492f318e5eecf8f45c790e12608fe3dfa7096b3e0c5526a7dc857d03f40e479ec37bceea5371d26e0768030fcc9e6eb83b00bb5eb7c
7
+ data.tar.gz: 741f99479411bdbaaa2d5eea56c68c10eaaa216aef2f295615bfe9fb91810b79f512665e14b01547496e5bc82142d13cdcc27c82c48b819bd303daf33b293a33
data/MIT-LICENSE ADDED
@@ -0,0 +1,20 @@
1
+ Copyright 2017 Michael
2
+
3
+ Permission is hereby granted, free of charge, to any person obtaining
4
+ a copy of this software and associated documentation files (the
5
+ "Software"), to deal in the Software without restriction, including
6
+ without limitation the rights to use, copy, modify, merge, publish,
7
+ distribute, sublicense, and/or sell copies of the Software, and to
8
+ permit persons to whom the Software is furnished to do so, subject to
9
+ the following conditions:
10
+
11
+ The above copyright notice and this permission notice shall be
12
+ included in all copies or substantial portions of the Software.
13
+
14
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
15
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
16
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
17
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
18
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
19
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
20
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,28 @@
1
+ # Devise::PwnedPassword
2
+ Short description and motivation.
3
+
4
+ ## Usage
5
+ How to use my plugin.
6
+
7
+ ## Installation
8
+ Add this line to your application's Gemfile:
9
+
10
+ ```ruby
11
+ gem 'devise-pwned_password'
12
+ ```
13
+
14
+ And then execute:
15
+ ```bash
16
+ $ bundle
17
+ ```
18
+
19
+ Or install it yourself as:
20
+ ```bash
21
+ $ gem install devise-pwned_password
22
+ ```
23
+
24
+ ## Contributing
25
+ Contribution directions go here.
26
+
27
+ ## License
28
+ The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).
data/Rakefile ADDED
@@ -0,0 +1,33 @@
1
+ begin
2
+ require 'bundler/setup'
3
+ rescue LoadError
4
+ puts 'You must `gem install bundler` and `bundle install` to run rake tasks'
5
+ end
6
+
7
+ require 'rdoc/task'
8
+
9
+ RDoc::Task.new(:rdoc) do |rdoc|
10
+ rdoc.rdoc_dir = 'rdoc'
11
+ rdoc.title = 'Devise::PwnedPassword'
12
+ rdoc.options << '--line-numbers'
13
+ rdoc.rdoc_files.include('README.md')
14
+ rdoc.rdoc_files.include('lib/**/*.rb')
15
+ end
16
+
17
+
18
+
19
+
20
+
21
+
22
+ require 'bundler/gem_tasks'
23
+
24
+ require 'rake/testtask'
25
+
26
+ Rake::TestTask.new(:test) do |t|
27
+ t.libs << 'test'
28
+ t.pattern = 'test/**/*_test.rb'
29
+ t.verbose = false
30
+ end
31
+
32
+
33
+ task default: :test
@@ -0,0 +1,62 @@
1
+ require 'net/http'
2
+
3
+ module Devise
4
+ module Models
5
+ # The PwnedPassword module adds a new validation for Devise Models.
6
+ # No modifications to routes or controllers needed.
7
+ # Simply add :pwned_password to the list of included modules in your
8
+ # devise module, and all new registrations will be blocked if they use
9
+ # a password in this dataset https://haveibeenpwned.com/Passwords.
10
+ module PwnedPassword
11
+ extend ActiveSupport::Concern
12
+
13
+ included do
14
+ validate :not_pwned_password
15
+ end
16
+
17
+ private
18
+
19
+
20
+ # Returns true if password is present in the PwnedPasswords dataset
21
+ # Implement retry behaviour described here https://haveibeenpwned.com/API/v2#RateLimiting
22
+ def is_password_pwned(password)
23
+
24
+ sha1Hash = Digest::SHA1.hexdigest password
25
+
26
+ userAgent = "devise_pwned_password"
27
+
28
+ uri = URI.parse("https://haveibeenpwned.com/api/v2/pwnedpassword/#{sha1Hash}")
29
+
30
+ Net::HTTP.start(uri.host, uri.port, :use_ssl => true) do |http|
31
+ request = Net::HTTP::Get.new(uri.request_uri, {'User-Agent' => userAgent})
32
+ 3.times {
33
+ response = http.request request
34
+ if response.code != '429'
35
+ return response.code == '200'
36
+ end
37
+
38
+ retryAfter = response.get_fields('Retry-After')[0].to_i
39
+
40
+ if retryAfter > 10
41
+ #Exit early if the throttling is too high
42
+ return false
43
+ end
44
+
45
+ sleep retryAfter
46
+ }
47
+ end
48
+
49
+ return false
50
+ end
51
+
52
+ def not_pwned_password
53
+
54
+ #This deliberately fails silently on 500's etc. Most apps wont want to tie the ability to sign up customers to the availability of a third party API
55
+ if is_password_pwned(password)
56
+ # Error message taken from https://haveibeenpwned.com/Passwords
57
+ errors.add(:password, "This password has previously appeared in a data breach and should never be used. Please choose something harder to guess.")
58
+ end
59
+ end
60
+ end
61
+ end
62
+ end
@@ -0,0 +1,5 @@
1
+ module Devise
2
+ module PwnedPassword
3
+ VERSION = '0.1.0'
4
+ end
5
+ end
@@ -0,0 +1,9 @@
1
+ require 'devise'
2
+ require 'devise/pwned_password/model'
3
+
4
+ module Devise
5
+ module PwnedPassword
6
+ end
7
+ end
8
+
9
+ Devise.add_module :pwned_password, model: "devise_pwned_password/model"
@@ -0,0 +1,4 @@
1
+ # desc "Explaining what the task does"
2
+ # task :devise_pwned_password do
3
+ # # Task goes here
4
+ # end
metadata ADDED
@@ -0,0 +1,80 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: devise-pwned_password
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Michael Banfield
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2017-10-04 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: rails
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: 5.1.2
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: 5.1.2
27
+ - !ruby/object:Gem::Dependency
28
+ name: sqlite3
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - ">="
32
+ - !ruby/object:Gem::Version
33
+ version: '0'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - ">="
39
+ - !ruby/object:Gem::Version
40
+ version: '0'
41
+ description: Devise extension that checks user passwords against the PwnedPasswords
42
+ dataset https://haveibeenpwned.com/Passwords.
43
+ email:
44
+ - michael@michaelbanfield.com
45
+ executables: []
46
+ extensions: []
47
+ extra_rdoc_files: []
48
+ files:
49
+ - MIT-LICENSE
50
+ - README.md
51
+ - Rakefile
52
+ - lib/devise/pwned_password.rb
53
+ - lib/devise/pwned_password/model.rb
54
+ - lib/devise/pwned_password/version.rb
55
+ - lib/tasks/devise/pwned_password_tasks.rake
56
+ homepage: https://github.com/michaelbanfield/devise-pwned_password
57
+ licenses:
58
+ - MIT
59
+ metadata: {}
60
+ post_install_message:
61
+ rdoc_options: []
62
+ require_paths:
63
+ - lib
64
+ required_ruby_version: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - ">="
67
+ - !ruby/object:Gem::Version
68
+ version: '0'
69
+ required_rubygems_version: !ruby/object:Gem::Requirement
70
+ requirements:
71
+ - - ">="
72
+ - !ruby/object:Gem::Version
73
+ version: '0'
74
+ requirements: []
75
+ rubyforge_project:
76
+ rubygems_version: 2.6.12
77
+ signing_key:
78
+ specification_version: 4
79
+ summary: Devise extension that checks user passwords against the PwnedPasswords dataset.
80
+ test_files: []