expertiza-authlogic 2.1.6.1
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG.rdoc +345 -0
- data/LICENSE +20 -0
- data/README.rdoc +246 -0
- data/Rakefile +41 -0
- data/VERSION.yml +5 -0
- data/expertiza-authlogic.gemspec +161 -0
- data/generators/session/session_generator.rb +9 -0
- data/generators/session/templates/session.rb +2 -0
- data/init.rb +1 -0
- data/lib/authlogic.rb +64 -0
- data/lib/authlogic/acts_as_authentic/base.rb +107 -0
- data/lib/authlogic/acts_as_authentic/email.rb +110 -0
- data/lib/authlogic/acts_as_authentic/logged_in_status.rb +60 -0
- data/lib/authlogic/acts_as_authentic/login.rb +141 -0
- data/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
- data/lib/authlogic/acts_as_authentic/password.rb +391 -0
- data/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
- data/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
- data/lib/authlogic/acts_as_authentic/restful_authentication.rb +76 -0
- data/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
- data/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
- data/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
- data/lib/authlogic/authenticates_many/association.rb +42 -0
- data/lib/authlogic/authenticates_many/base.rb +55 -0
- data/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
- data/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
- data/lib/authlogic/controller_adapters/rails_adapter.rb +48 -0
- data/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
- data/lib/authlogic/crypto_providers/aes256.rb +43 -0
- data/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
- data/lib/authlogic/crypto_providers/md5.rb +34 -0
- data/lib/authlogic/crypto_providers/sha1.rb +35 -0
- data/lib/authlogic/crypto_providers/sha256.rb +50 -0
- data/lib/authlogic/crypto_providers/sha512.rb +50 -0
- data/lib/authlogic/crypto_providers/wordpress.rb +43 -0
- data/lib/authlogic/i18n.rb +83 -0
- data/lib/authlogic/i18n/translator.rb +15 -0
- data/lib/authlogic/random.rb +33 -0
- data/lib/authlogic/regex.rb +25 -0
- data/lib/authlogic/session/activation.rb +58 -0
- data/lib/authlogic/session/active_record_trickery.rb +64 -0
- data/lib/authlogic/session/base.rb +37 -0
- data/lib/authlogic/session/brute_force_protection.rb +96 -0
- data/lib/authlogic/session/callbacks.rb +99 -0
- data/lib/authlogic/session/cookies.rb +130 -0
- data/lib/authlogic/session/existence.rb +93 -0
- data/lib/authlogic/session/foundation.rb +63 -0
- data/lib/authlogic/session/http_auth.rb +58 -0
- data/lib/authlogic/session/id.rb +41 -0
- data/lib/authlogic/session/klass.rb +78 -0
- data/lib/authlogic/session/magic_columns.rb +95 -0
- data/lib/authlogic/session/magic_states.rb +59 -0
- data/lib/authlogic/session/params.rb +101 -0
- data/lib/authlogic/session/password.rb +240 -0
- data/lib/authlogic/session/perishable_token.rb +18 -0
- data/lib/authlogic/session/persistence.rb +70 -0
- data/lib/authlogic/session/priority_record.rb +34 -0
- data/lib/authlogic/session/scopes.rb +101 -0
- data/lib/authlogic/session/session.rb +62 -0
- data/lib/authlogic/session/timeout.rb +82 -0
- data/lib/authlogic/session/unauthorized_record.rb +50 -0
- data/lib/authlogic/session/validation.rb +82 -0
- data/lib/authlogic/test_case.rb +120 -0
- data/lib/authlogic/test_case/mock_controller.rb +45 -0
- data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
- data/lib/authlogic/test_case/mock_logger.rb +10 -0
- data/lib/authlogic/test_case/mock_request.rb +19 -0
- data/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
- data/rails/init.rb +1 -0
- data/shoulda_macros/authlogic.rb +69 -0
- data/test/acts_as_authentic_test/base_test.rb +18 -0
- data/test/acts_as_authentic_test/email_test.rb +101 -0
- data/test/acts_as_authentic_test/logged_in_status_test.rb +36 -0
- data/test/acts_as_authentic_test/login_test.rb +109 -0
- data/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
- data/test/acts_as_authentic_test/password_test.rb +245 -0
- data/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
- data/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
- data/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
- data/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
- data/test/acts_as_authentic_test/single_access_test.rb +44 -0
- data/test/authenticates_many_test.rb +16 -0
- data/test/crypto_provider_test/aes256_test.rb +14 -0
- data/test/crypto_provider_test/bcrypt_test.rb +14 -0
- data/test/crypto_provider_test/sha1_test.rb +23 -0
- data/test/crypto_provider_test/sha256_test.rb +14 -0
- data/test/crypto_provider_test/sha512_test.rb +14 -0
- data/test/fixtures/companies.yml +5 -0
- data/test/fixtures/employees.yml +17 -0
- data/test/fixtures/projects.yml +3 -0
- data/test/fixtures/users.yml +24 -0
- data/test/i18n_test.rb +33 -0
- data/test/libs/affiliate.rb +7 -0
- data/test/libs/company.rb +6 -0
- data/test/libs/employee.rb +7 -0
- data/test/libs/employee_session.rb +2 -0
- data/test/libs/ldaper.rb +3 -0
- data/test/libs/ordered_hash.rb +9 -0
- data/test/libs/project.rb +3 -0
- data/test/libs/user.rb +5 -0
- data/test/libs/user_session.rb +6 -0
- data/test/random_test.rb +42 -0
- data/test/session_test/activation_test.rb +43 -0
- data/test/session_test/active_record_trickery_test.rb +36 -0
- data/test/session_test/brute_force_protection_test.rb +101 -0
- data/test/session_test/callbacks_test.rb +6 -0
- data/test/session_test/cookies_test.rb +112 -0
- data/test/session_test/credentials_test.rb +0 -0
- data/test/session_test/existence_test.rb +64 -0
- data/test/session_test/http_auth_test.rb +28 -0
- data/test/session_test/id_test.rb +17 -0
- data/test/session_test/klass_test.rb +40 -0
- data/test/session_test/magic_columns_test.rb +62 -0
- data/test/session_test/magic_states_test.rb +60 -0
- data/test/session_test/params_test.rb +53 -0
- data/test/session_test/password_test.rb +106 -0
- data/test/session_test/perishability_test.rb +15 -0
- data/test/session_test/persistence_test.rb +21 -0
- data/test/session_test/scopes_test.rb +60 -0
- data/test/session_test/session_test.rb +59 -0
- data/test/session_test/timeout_test.rb +52 -0
- data/test/session_test/unauthorized_record_test.rb +13 -0
- data/test/session_test/validation_test.rb +23 -0
- data/test/test_helper.rb +182 -0
- metadata +205 -0
@@ -0,0 +1,37 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module Session # :nodoc:
|
3
|
+
# This is the base class Authlogic, where all modules are included. For information on functiionality see the various
|
4
|
+
# sub modules.
|
5
|
+
class Base
|
6
|
+
include Foundation
|
7
|
+
include Callbacks
|
8
|
+
|
9
|
+
# Included first so that the session resets itself to nil
|
10
|
+
include Timeout
|
11
|
+
|
12
|
+
# Included in a specific order so they are tried in this order when persisting
|
13
|
+
include Params
|
14
|
+
include Cookies
|
15
|
+
include Session
|
16
|
+
include HttpAuth
|
17
|
+
|
18
|
+
# Included in a specific order so magic states gets ran after a record is found
|
19
|
+
include Password
|
20
|
+
include UnauthorizedRecord
|
21
|
+
include MagicStates
|
22
|
+
|
23
|
+
include Activation
|
24
|
+
include ActiveRecordTrickery
|
25
|
+
include BruteForceProtection
|
26
|
+
include Existence
|
27
|
+
include Klass
|
28
|
+
include MagicColumns
|
29
|
+
include PerishableToken
|
30
|
+
include Persistence
|
31
|
+
include Scopes
|
32
|
+
include Id
|
33
|
+
include Validation
|
34
|
+
include PriorityRecord
|
35
|
+
end
|
36
|
+
end
|
37
|
+
end
|
@@ -0,0 +1,96 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module Session
|
3
|
+
# A brute force attacks is executed by hammering a login with as many password combinations as possible, until one works. A brute force attacked is
|
4
|
+
# generally combated with a slow hasing algorithm such as BCrypt. You can increase the cost, which makes the hash generation slower, and ultimately
|
5
|
+
# increases the time it takes to execute a brute force attack. Just to put this into perspective, if a hacker was to gain access to your server
|
6
|
+
# and execute a brute force attack locally, meaning there is no network lag, it would probably take decades to complete. Now throw in network lag
|
7
|
+
# and it would take MUCH longer.
|
8
|
+
#
|
9
|
+
# But for those that are extra paranoid and can't get enough protection, why not stop them as soon as you realize something isn't right? That's
|
10
|
+
# what this module is all about. By default the consecutive_failed_logins_limit configuration option is set to 50, if someone consecutively fails to login
|
11
|
+
# after 50 attempts their account will be suspended. This is a very liberal number and at this point it should be obvious that something is not right.
|
12
|
+
# If you wish to lower this number just set the configuration to a lower number:
|
13
|
+
#
|
14
|
+
# class UserSession < Authlogic::Session::Base
|
15
|
+
# consecutive_failed_logins_limit 10
|
16
|
+
# end
|
17
|
+
module BruteForceProtection
|
18
|
+
def self.included(klass)
|
19
|
+
klass.class_eval do
|
20
|
+
extend Config
|
21
|
+
include InstanceMethods
|
22
|
+
validate :reset_failed_login_count, :if => :reset_failed_login_count?
|
23
|
+
validate :validate_failed_logins, :if => :being_brute_force_protected?
|
24
|
+
end
|
25
|
+
end
|
26
|
+
|
27
|
+
# Configuration for the brute force protection feature.
|
28
|
+
module Config
|
29
|
+
# To help protect from brute force attacks you can set a limit on the allowed number of consecutive failed logins. By default this is 50, this is a very liberal
|
30
|
+
# number, and if someone fails to login after 50 tries it should be pretty obvious that it's a machine trying to login in and very likely a brute force attack.
|
31
|
+
#
|
32
|
+
# In order to enable this field your model MUST have a failed_login_count (integer) field.
|
33
|
+
#
|
34
|
+
# If you don't know what a brute force attack is, it's when a machine tries to login into a system using every combination of character possible. Thus resulting
|
35
|
+
# in possibly millions of attempts to log into an account.
|
36
|
+
#
|
37
|
+
# * <tt>Default:</tt> 50
|
38
|
+
# * <tt>Accepts:</tt> Integer, set to 0 to disable
|
39
|
+
def consecutive_failed_logins_limit(value = nil)
|
40
|
+
rw_config(:consecutive_failed_logins_limit, value, 50)
|
41
|
+
end
|
42
|
+
alias_method :consecutive_failed_logins_limit=, :consecutive_failed_logins_limit
|
43
|
+
|
44
|
+
# Once the failed logins limit has been exceed, how long do you want to ban the user? This can be a temporary or permanent ban.
|
45
|
+
#
|
46
|
+
# * <tt>Default:</tt> 2.hours
|
47
|
+
# * <tt>Accepts:</tt> Fixnum, set to 0 for permanent ban
|
48
|
+
def failed_login_ban_for(value = nil)
|
49
|
+
rw_config(:failed_login_ban_for, (!value.nil? && value) || value, 2.hours.to_i)
|
50
|
+
end
|
51
|
+
alias_method :failed_login_ban_for=, :failed_login_ban_for
|
52
|
+
end
|
53
|
+
|
54
|
+
# The methods available for an Authlogic::Session::Base object that make up the brute force protection feature.
|
55
|
+
module InstanceMethods
|
56
|
+
# Returns true when the consecutive_failed_logins_limit has been exceeded and is being temporarily banned.
|
57
|
+
# Notice the word temporary, the user will not be permanently banned unless you choose to do so with configuration.
|
58
|
+
# By default they will be banned for 2 hours. During that 2 hour period this method will return true.
|
59
|
+
def being_brute_force_protected?
|
60
|
+
exceeded_failed_logins_limit? && (failed_login_ban_for <= 0 ||
|
61
|
+
(attempted_record.respond_to?(:updated_at) && attempted_record.updated_at >= failed_login_ban_for.seconds.ago))
|
62
|
+
end
|
63
|
+
|
64
|
+
private
|
65
|
+
def exceeded_failed_logins_limit?
|
66
|
+
!attempted_record.nil? && attempted_record.respond_to?(:failed_login_count) && consecutive_failed_logins_limit > 0 &&
|
67
|
+
attempted_record.failed_login_count && attempted_record.failed_login_count >= consecutive_failed_logins_limit
|
68
|
+
end
|
69
|
+
|
70
|
+
def reset_failed_login_count?
|
71
|
+
exceeded_failed_logins_limit? && !being_brute_force_protected?
|
72
|
+
end
|
73
|
+
|
74
|
+
def reset_failed_login_count
|
75
|
+
attempted_record.failed_login_count = 0
|
76
|
+
end
|
77
|
+
|
78
|
+
def validate_failed_logins
|
79
|
+
errors.clear # Clear all other error messages, as they are irrelevant at this point and can only provide additional information that is not needed
|
80
|
+
errors.add(:base, I18n.t(
|
81
|
+
'error_messages.consecutive_failed_logins_limit_exceeded',
|
82
|
+
:default => "Consecutive failed logins limit exceeded, account has been" + (failed_login_ban_for == 0 ? "" : " temporarily") + " disabled."
|
83
|
+
))
|
84
|
+
end
|
85
|
+
|
86
|
+
def consecutive_failed_logins_limit
|
87
|
+
self.class.consecutive_failed_logins_limit
|
88
|
+
end
|
89
|
+
|
90
|
+
def failed_login_ban_for
|
91
|
+
self.class.failed_login_ban_for
|
92
|
+
end
|
93
|
+
end
|
94
|
+
end
|
95
|
+
end
|
96
|
+
end
|
@@ -0,0 +1,99 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module Session
|
3
|
+
# Between these callsbacks and the configuration, this is the contract between me and you to safely
|
4
|
+
# modify Authlogic's behavior. I will do everything I can to make sure these do not change.
|
5
|
+
#
|
6
|
+
# Check out the sub modules of Authlogic::Session. They are very concise, clear, and to the point. More
|
7
|
+
# importantly they use the same API that you would use to extend Authlogic. That being said, they are great
|
8
|
+
# examples of how to extend Authlogic and add / modify behavior to Authlogic. These modules could easily be pulled out
|
9
|
+
# into their own plugin and become an "add on" without any change.
|
10
|
+
#
|
11
|
+
# Now to the point of this module. Just like in ActiveRecord you have before_save, before_validation, etc.
|
12
|
+
# You have similar callbacks with Authlogic, see the METHODS constant below. The order of execution is as follows:
|
13
|
+
#
|
14
|
+
# before_persisting
|
15
|
+
# persist
|
16
|
+
# after_persisting
|
17
|
+
# [save record if record.changed?]
|
18
|
+
#
|
19
|
+
# before_validation
|
20
|
+
# before_validation_on_create
|
21
|
+
# before_validation_on_update
|
22
|
+
# validate
|
23
|
+
# after_validation_on_update
|
24
|
+
# after_validation_on_create
|
25
|
+
# after_validation
|
26
|
+
# [save record if record.changed?]
|
27
|
+
#
|
28
|
+
# before_save
|
29
|
+
# before_create
|
30
|
+
# before_update
|
31
|
+
# after_update
|
32
|
+
# after_create
|
33
|
+
# after_save
|
34
|
+
# [save record if record.changed?]
|
35
|
+
#
|
36
|
+
# before_destroy
|
37
|
+
# [save record if record.changed?]
|
38
|
+
# destroy
|
39
|
+
# after_destroy
|
40
|
+
#
|
41
|
+
# Notice the "save record if changed?" lines above. This helps with performance. If you need to make
|
42
|
+
# changes to the associated record, there is no need to save the record, Authlogic will do it for you.
|
43
|
+
# This allows multiple modules to modify the record and execute as few queries as possible.
|
44
|
+
#
|
45
|
+
# **WARNING**: unlike ActiveRecord, these callbacks must be set up on the class level:
|
46
|
+
#
|
47
|
+
# class UserSession < Authlogic::Session::Base
|
48
|
+
# before_validation :my_method
|
49
|
+
# validate :another_method
|
50
|
+
# # ..etc
|
51
|
+
# end
|
52
|
+
#
|
53
|
+
# You can NOT define a "before_validation" method, this is bad practice and does not allow Authlogic
|
54
|
+
# to extend properly with multiple extensions. Please ONLY use the method above.
|
55
|
+
module Callbacks
|
56
|
+
METHODS = [
|
57
|
+
"before_persisting", "persist", "after_persisting",
|
58
|
+
"before_validation", "before_validation_on_create", "before_validation_on_update", "validate",
|
59
|
+
"after_validation_on_update", "after_validation_on_create", "after_validation",
|
60
|
+
"before_save", "before_create", "before_update", "after_update", "after_create", "after_save",
|
61
|
+
"before_destroy", "after_destroy"
|
62
|
+
]
|
63
|
+
|
64
|
+
def self.included(base) #:nodoc:
|
65
|
+
base.send :include, ActiveSupport::Callbacks
|
66
|
+
base.define_callbacks *METHODS
|
67
|
+
|
68
|
+
# If Rails 3, support the new callback syntax
|
69
|
+
if base.send(base.respond_to?(:singleton_class) ? :singleton_class : :metaclass).method_defined?(:set_callback)
|
70
|
+
METHODS.each do |method|
|
71
|
+
base.class_eval <<-"end_eval", __FILE__, __LINE__
|
72
|
+
def self.#{method}(*methods, &block)
|
73
|
+
set_callback :#{method}, *methods, &block
|
74
|
+
end
|
75
|
+
end_eval
|
76
|
+
end
|
77
|
+
end
|
78
|
+
end
|
79
|
+
|
80
|
+
private
|
81
|
+
METHODS.each do |method|
|
82
|
+
class_eval <<-"end_eval", __FILE__, __LINE__
|
83
|
+
def #{method}
|
84
|
+
run_callbacks(:#{method}) { |result, object| result == false }
|
85
|
+
end
|
86
|
+
end_eval
|
87
|
+
end
|
88
|
+
|
89
|
+
def persist
|
90
|
+
run_callbacks(:persist) { |result, object| result == true }
|
91
|
+
end
|
92
|
+
|
93
|
+
def save_record(alternate_record = nil)
|
94
|
+
r = alternate_record || record
|
95
|
+
r.save_without_session_maintenance(false) if r && r.changed? && !r.readonly?
|
96
|
+
end
|
97
|
+
end
|
98
|
+
end
|
99
|
+
end
|
@@ -0,0 +1,130 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module Session
|
3
|
+
# Handles all authentication that deals with cookies, such as persisting, saving, and destroying.
|
4
|
+
module Cookies
|
5
|
+
def self.included(klass)
|
6
|
+
klass.class_eval do
|
7
|
+
extend Config
|
8
|
+
include InstanceMethods
|
9
|
+
persist :persist_by_cookie
|
10
|
+
after_save :save_cookie
|
11
|
+
after_destroy :destroy_cookie
|
12
|
+
end
|
13
|
+
end
|
14
|
+
|
15
|
+
# Configuration for the cookie feature set.
|
16
|
+
module Config
|
17
|
+
# The name of the cookie or the key in the cookies hash. Be sure and use a unique name. If you have multiple sessions and they use the same cookie it will cause problems.
|
18
|
+
# Also, if a id is set it will be inserted into the beginning of the string. Exmaple:
|
19
|
+
#
|
20
|
+
# session = UserSession.new
|
21
|
+
# session.cookie_key => "user_credentials"
|
22
|
+
#
|
23
|
+
# session = UserSession.new(:super_high_secret)
|
24
|
+
# session.cookie_key => "super_high_secret_user_credentials"
|
25
|
+
#
|
26
|
+
# * <tt>Default:</tt> "#{guessed_klass_name.underscore}_credentials"
|
27
|
+
# * <tt>Accepts:</tt> String
|
28
|
+
def cookie_key(value = nil)
|
29
|
+
rw_config(:cookie_key, value, "#{guessed_klass_name.underscore}_credentials")
|
30
|
+
end
|
31
|
+
alias_method :cookie_key=, :cookie_key
|
32
|
+
|
33
|
+
# If sessions should be remembered by default or not.
|
34
|
+
#
|
35
|
+
# * <tt>Default:</tt> false
|
36
|
+
# * <tt>Accepts:</tt> Boolean
|
37
|
+
def remember_me(value = nil)
|
38
|
+
rw_config(:remember_me, value, false)
|
39
|
+
end
|
40
|
+
alias_method :remember_me=, :remember_me
|
41
|
+
|
42
|
+
# The length of time until the cookie expires.
|
43
|
+
#
|
44
|
+
# * <tt>Default:</tt> 3.months
|
45
|
+
# * <tt>Accepts:</tt> Integer, length of time in seconds, such as 60 or 3.months
|
46
|
+
def remember_me_for(value = :_read)
|
47
|
+
rw_config(:remember_me_for, value, 3.months, :_read)
|
48
|
+
end
|
49
|
+
alias_method :remember_me_for=, :remember_me_for
|
50
|
+
end
|
51
|
+
|
52
|
+
# The methods available for an Authlogic::Session::Base object that make up the cookie feature set.
|
53
|
+
module InstanceMethods
|
54
|
+
# Allows you to set the remember_me option when passing credentials.
|
55
|
+
def credentials=(value)
|
56
|
+
super
|
57
|
+
values = value.is_a?(Array) ? value : [value]
|
58
|
+
case values.first
|
59
|
+
when Hash
|
60
|
+
self.remember_me = values.first.with_indifferent_access[:remember_me] if values.first.with_indifferent_access.key?(:remember_me)
|
61
|
+
else
|
62
|
+
r = values.find { |value| value.is_a?(TrueClass) || value.is_a?(FalseClass) }
|
63
|
+
self.remember_me = r if !r.nil?
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
# Is the cookie going to expire after the session is over, or will it stick around?
|
68
|
+
def remember_me
|
69
|
+
return @remember_me if defined?(@remember_me)
|
70
|
+
@remember_me = self.class.remember_me
|
71
|
+
end
|
72
|
+
|
73
|
+
# Accepts a boolean as a flag to remember the session or not. Basically to expire the cookie at the end of the session or keep it for "remember_me_until".
|
74
|
+
def remember_me=(value)
|
75
|
+
@remember_me = value
|
76
|
+
end
|
77
|
+
|
78
|
+
# See remember_me
|
79
|
+
def remember_me?
|
80
|
+
remember_me == true || remember_me == "true" || remember_me == "1"
|
81
|
+
end
|
82
|
+
|
83
|
+
# How long to remember the user if remember_me is true. This is based on the class level configuration: remember_me_for
|
84
|
+
def remember_me_for
|
85
|
+
return unless remember_me?
|
86
|
+
self.class.remember_me_for
|
87
|
+
end
|
88
|
+
|
89
|
+
# When to expire the cookie. See remember_me_for configuration option to change this.
|
90
|
+
def remember_me_until
|
91
|
+
return unless remember_me?
|
92
|
+
remember_me_for.from_now
|
93
|
+
end
|
94
|
+
|
95
|
+
private
|
96
|
+
def cookie_key
|
97
|
+
build_key(self.class.cookie_key)
|
98
|
+
end
|
99
|
+
|
100
|
+
def cookie_credentials
|
101
|
+
controller.cookies[cookie_key] && controller.cookies[cookie_key].split("::")
|
102
|
+
end
|
103
|
+
|
104
|
+
# Tries to validate the session from information in the cookie
|
105
|
+
def persist_by_cookie
|
106
|
+
persistence_token, record_id = cookie_credentials
|
107
|
+
if !persistence_token.nil?
|
108
|
+
record = record_id.nil? ? search_for_record("find_by_persistence_token", persistence_token) : search_for_record("find_by_#{klass.primary_key}", record_id)
|
109
|
+
self.unauthorized_record = record if record && record.persistence_token == persistence_token
|
110
|
+
valid?
|
111
|
+
else
|
112
|
+
false
|
113
|
+
end
|
114
|
+
end
|
115
|
+
|
116
|
+
def save_cookie
|
117
|
+
controller.cookies[cookie_key] = {
|
118
|
+
:value => "#{record.persistence_token}::#{record.send(record.class.primary_key)}",
|
119
|
+
:expires => remember_me_until,
|
120
|
+
:domain => controller.cookie_domain
|
121
|
+
}
|
122
|
+
end
|
123
|
+
|
124
|
+
def destroy_cookie
|
125
|
+
controller.cookies.delete cookie_key, :domain => controller.cookie_domain
|
126
|
+
end
|
127
|
+
end
|
128
|
+
end
|
129
|
+
end
|
130
|
+
end
|
@@ -0,0 +1,93 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module Session
|
3
|
+
# Provides methods to create and destroy objects. Basically controls their "existence".
|
4
|
+
module Existence
|
5
|
+
class SessionInvalidError < ::StandardError # :nodoc:
|
6
|
+
def initialize(session)
|
7
|
+
super("Your session is invalid and has the following errors: #{session.errors.full_messages.to_sentence}")
|
8
|
+
end
|
9
|
+
end
|
10
|
+
|
11
|
+
def self.included(klass)
|
12
|
+
klass.class_eval do
|
13
|
+
extend ClassMethods
|
14
|
+
include InstanceMethods
|
15
|
+
attr_accessor :new_session, :record
|
16
|
+
end
|
17
|
+
end
|
18
|
+
|
19
|
+
module ClassMethods
|
20
|
+
# A convenince method. The same as:
|
21
|
+
#
|
22
|
+
# session = UserSession.new(*args)
|
23
|
+
# session.save
|
24
|
+
#
|
25
|
+
# Instead you can do:
|
26
|
+
#
|
27
|
+
# UserSession.create(*args)
|
28
|
+
def create(*args, &block)
|
29
|
+
session = new(*args)
|
30
|
+
session.save(&block)
|
31
|
+
session
|
32
|
+
end
|
33
|
+
|
34
|
+
# Same as create but calls create!, which raises an exception when validation fails.
|
35
|
+
def create!(*args)
|
36
|
+
session = new(*args)
|
37
|
+
session.save!
|
38
|
+
session
|
39
|
+
end
|
40
|
+
end
|
41
|
+
|
42
|
+
module InstanceMethods
|
43
|
+
# Clears all errors and the associated record, you should call this terminate a session, thus requring
|
44
|
+
# the user to authenticate again if it is needed.
|
45
|
+
def destroy
|
46
|
+
before_destroy
|
47
|
+
save_record
|
48
|
+
errors.clear
|
49
|
+
@record = nil
|
50
|
+
after_destroy
|
51
|
+
true
|
52
|
+
end
|
53
|
+
|
54
|
+
# Returns true if the session is new, meaning no action has been taken on it and a successful save
|
55
|
+
# has not taken place.
|
56
|
+
def new_session?
|
57
|
+
new_session != false
|
58
|
+
end
|
59
|
+
|
60
|
+
# After you have specified all of the details for your session you can try to save it. This will
|
61
|
+
# run validation checks and find the associated record, if all validation passes. If validation
|
62
|
+
# does not pass, the save will fail and the erorrs will be stored in the errors object.
|
63
|
+
def save(&block)
|
64
|
+
result = nil
|
65
|
+
if valid?
|
66
|
+
self.record = attempted_record
|
67
|
+
|
68
|
+
before_save
|
69
|
+
new_session? ? before_create : before_update
|
70
|
+
new_session? ? after_create : after_update
|
71
|
+
after_save
|
72
|
+
|
73
|
+
save_record
|
74
|
+
self.new_session = false
|
75
|
+
result = true
|
76
|
+
else
|
77
|
+
result = false
|
78
|
+
end
|
79
|
+
|
80
|
+
yield result if block_given?
|
81
|
+
result
|
82
|
+
end
|
83
|
+
|
84
|
+
# Same as save but raises an exception of validation errors when validation fails
|
85
|
+
def save!
|
86
|
+
result = save
|
87
|
+
raise SessionInvalidError.new(self) unless result
|
88
|
+
result
|
89
|
+
end
|
90
|
+
end
|
91
|
+
end
|
92
|
+
end
|
93
|
+
end
|