halorgium-actionpack 3.0.pre
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG +5179 -0
- data/MIT-LICENSE +21 -0
- data/README +409 -0
- data/lib/abstract_controller.rb +16 -0
- data/lib/abstract_controller/base.rb +158 -0
- data/lib/abstract_controller/callbacks.rb +113 -0
- data/lib/abstract_controller/exceptions.rb +12 -0
- data/lib/abstract_controller/helpers.rb +151 -0
- data/lib/abstract_controller/layouts.rb +250 -0
- data/lib/abstract_controller/localized_cache.rb +49 -0
- data/lib/abstract_controller/logger.rb +61 -0
- data/lib/abstract_controller/rendering_controller.rb +188 -0
- data/lib/action_controller.rb +72 -0
- data/lib/action_controller/base.rb +168 -0
- data/lib/action_controller/caching.rb +80 -0
- data/lib/action_controller/caching/actions.rb +163 -0
- data/lib/action_controller/caching/fragments.rb +116 -0
- data/lib/action_controller/caching/pages.rb +154 -0
- data/lib/action_controller/caching/sweeping.rb +97 -0
- data/lib/action_controller/deprecated.rb +4 -0
- data/lib/action_controller/deprecated/integration_test.rb +2 -0
- data/lib/action_controller/deprecated/performance_test.rb +1 -0
- data/lib/action_controller/dispatch/dispatcher.rb +57 -0
- data/lib/action_controller/metal.rb +129 -0
- data/lib/action_controller/metal/benchmarking.rb +73 -0
- data/lib/action_controller/metal/compatibility.rb +145 -0
- data/lib/action_controller/metal/conditional_get.rb +86 -0
- data/lib/action_controller/metal/configuration.rb +28 -0
- data/lib/action_controller/metal/cookies.rb +105 -0
- data/lib/action_controller/metal/exceptions.rb +55 -0
- data/lib/action_controller/metal/filter_parameter_logging.rb +77 -0
- data/lib/action_controller/metal/flash.rb +162 -0
- data/lib/action_controller/metal/head.rb +27 -0
- data/lib/action_controller/metal/helpers.rb +115 -0
- data/lib/action_controller/metal/hide_actions.rb +47 -0
- data/lib/action_controller/metal/http_authentication.rb +312 -0
- data/lib/action_controller/metal/layouts.rb +171 -0
- data/lib/action_controller/metal/mime_responds.rb +317 -0
- data/lib/action_controller/metal/rack_convenience.rb +27 -0
- data/lib/action_controller/metal/redirector.rb +22 -0
- data/lib/action_controller/metal/render_options.rb +103 -0
- data/lib/action_controller/metal/rendering_controller.rb +57 -0
- data/lib/action_controller/metal/request_forgery_protection.rb +108 -0
- data/lib/action_controller/metal/rescuable.rb +13 -0
- data/lib/action_controller/metal/responder.rb +200 -0
- data/lib/action_controller/metal/session.rb +15 -0
- data/lib/action_controller/metal/session_management.rb +45 -0
- data/lib/action_controller/metal/streaming.rb +188 -0
- data/lib/action_controller/metal/testing.rb +39 -0
- data/lib/action_controller/metal/url_for.rb +41 -0
- data/lib/action_controller/metal/verification.rb +130 -0
- data/lib/action_controller/middleware.rb +38 -0
- data/lib/action_controller/notifications.rb +10 -0
- data/lib/action_controller/polymorphic_routes.rb +183 -0
- data/lib/action_controller/record_identifier.rb +91 -0
- data/lib/action_controller/testing/process.rb +111 -0
- data/lib/action_controller/testing/test_case.rb +345 -0
- data/lib/action_controller/translation.rb +13 -0
- data/lib/action_controller/url_rewriter.rb +204 -0
- data/lib/action_controller/vendor/html-scanner.rb +16 -0
- data/lib/action_controller/vendor/html-scanner/html/document.rb +68 -0
- data/lib/action_controller/vendor/html-scanner/html/node.rb +537 -0
- data/lib/action_controller/vendor/html-scanner/html/sanitizer.rb +176 -0
- data/lib/action_controller/vendor/html-scanner/html/selector.rb +828 -0
- data/lib/action_controller/vendor/html-scanner/html/tokenizer.rb +105 -0
- data/lib/action_controller/vendor/html-scanner/html/version.rb +11 -0
- data/lib/action_dispatch.rb +70 -0
- data/lib/action_dispatch/http/headers.rb +33 -0
- data/lib/action_dispatch/http/mime_type.rb +231 -0
- data/lib/action_dispatch/http/mime_types.rb +23 -0
- data/lib/action_dispatch/http/request.rb +539 -0
- data/lib/action_dispatch/http/response.rb +290 -0
- data/lib/action_dispatch/http/status_codes.rb +42 -0
- data/lib/action_dispatch/http/utils.rb +20 -0
- data/lib/action_dispatch/middleware/callbacks.rb +50 -0
- data/lib/action_dispatch/middleware/params_parser.rb +79 -0
- data/lib/action_dispatch/middleware/rescue.rb +26 -0
- data/lib/action_dispatch/middleware/session/abstract_store.rb +208 -0
- data/lib/action_dispatch/middleware/session/cookie_store.rb +235 -0
- data/lib/action_dispatch/middleware/session/mem_cache_store.rb +47 -0
- data/lib/action_dispatch/middleware/show_exceptions.rb +143 -0
- data/lib/action_dispatch/middleware/stack.rb +116 -0
- data/lib/action_dispatch/middleware/static.rb +44 -0
- data/lib/action_dispatch/middleware/string_coercion.rb +29 -0
- data/lib/action_dispatch/middleware/templates/rescues/_request_and_response.erb +24 -0
- data/lib/action_dispatch/middleware/templates/rescues/_trace.erb +26 -0
- data/lib/action_dispatch/middleware/templates/rescues/diagnostics.erb +10 -0
- data/lib/action_dispatch/middleware/templates/rescues/layout.erb +29 -0
- data/lib/action_dispatch/middleware/templates/rescues/missing_template.erb +2 -0
- data/lib/action_dispatch/middleware/templates/rescues/routing_error.erb +10 -0
- data/lib/action_dispatch/middleware/templates/rescues/template_error.erb +21 -0
- data/lib/action_dispatch/middleware/templates/rescues/unknown_action.erb +2 -0
- data/lib/action_dispatch/routing.rb +381 -0
- data/lib/action_dispatch/routing/deprecated_mapper.rb +878 -0
- data/lib/action_dispatch/routing/mapper.rb +327 -0
- data/lib/action_dispatch/routing/route.rb +49 -0
- data/lib/action_dispatch/routing/route_set.rb +497 -0
- data/lib/action_dispatch/testing/assertions.rb +8 -0
- data/lib/action_dispatch/testing/assertions/dom.rb +35 -0
- data/lib/action_dispatch/testing/assertions/model.rb +19 -0
- data/lib/action_dispatch/testing/assertions/response.rb +145 -0
- data/lib/action_dispatch/testing/assertions/routing.rb +144 -0
- data/lib/action_dispatch/testing/assertions/selector.rb +639 -0
- data/lib/action_dispatch/testing/assertions/tag.rb +123 -0
- data/lib/action_dispatch/testing/integration.rb +504 -0
- data/lib/action_dispatch/testing/performance_test.rb +15 -0
- data/lib/action_dispatch/testing/test_request.rb +83 -0
- data/lib/action_dispatch/testing/test_response.rb +131 -0
- data/lib/action_pack.rb +24 -0
- data/lib/action_pack/version.rb +9 -0
- data/lib/action_view.rb +58 -0
- data/lib/action_view/base.rb +308 -0
- data/lib/action_view/context.rb +44 -0
- data/lib/action_view/erb/util.rb +48 -0
- data/lib/action_view/helpers.rb +62 -0
- data/lib/action_view/helpers/active_model_helper.rb +306 -0
- data/lib/action_view/helpers/ajax_helper.rb +68 -0
- data/lib/action_view/helpers/asset_tag_helper.rb +830 -0
- data/lib/action_view/helpers/atom_feed_helper.rb +198 -0
- data/lib/action_view/helpers/cache_helper.rb +39 -0
- data/lib/action_view/helpers/capture_helper.rb +168 -0
- data/lib/action_view/helpers/date_helper.rb +988 -0
- data/lib/action_view/helpers/debug_helper.rb +38 -0
- data/lib/action_view/helpers/form_helper.rb +1102 -0
- data/lib/action_view/helpers/form_options_helper.rb +600 -0
- data/lib/action_view/helpers/form_tag_helper.rb +495 -0
- data/lib/action_view/helpers/javascript_helper.rb +208 -0
- data/lib/action_view/helpers/number_helper.rb +311 -0
- data/lib/action_view/helpers/prototype_helper.rb +1309 -0
- data/lib/action_view/helpers/raw_output_helper.rb +9 -0
- data/lib/action_view/helpers/record_identification_helper.rb +20 -0
- data/lib/action_view/helpers/record_tag_helper.rb +58 -0
- data/lib/action_view/helpers/sanitize_helper.rb +259 -0
- data/lib/action_view/helpers/scriptaculous_helper.rb +226 -0
- data/lib/action_view/helpers/tag_helper.rb +151 -0
- data/lib/action_view/helpers/text_helper.rb +594 -0
- data/lib/action_view/helpers/translation_helper.rb +39 -0
- data/lib/action_view/helpers/url_helper.rb +639 -0
- data/lib/action_view/locale/en.yml +117 -0
- data/lib/action_view/paths.rb +80 -0
- data/lib/action_view/render/partials.rb +342 -0
- data/lib/action_view/render/rendering.rb +134 -0
- data/lib/action_view/safe_buffer.rb +28 -0
- data/lib/action_view/template/error.rb +101 -0
- data/lib/action_view/template/handler.rb +36 -0
- data/lib/action_view/template/handlers.rb +52 -0
- data/lib/action_view/template/handlers/builder.rb +17 -0
- data/lib/action_view/template/handlers/erb.rb +53 -0
- data/lib/action_view/template/handlers/rjs.rb +18 -0
- data/lib/action_view/template/resolver.rb +165 -0
- data/lib/action_view/template/template.rb +131 -0
- data/lib/action_view/template/text.rb +38 -0
- data/lib/action_view/test_case.rb +163 -0
- metadata +236 -0
@@ -0,0 +1,27 @@
|
|
1
|
+
module ActionController
|
2
|
+
module Head
|
3
|
+
# Return a response that has no content (merely headers). The options
|
4
|
+
# argument is interpreted to be a hash of header names and values.
|
5
|
+
# This allows you to easily return a response that consists only of
|
6
|
+
# significant headers:
|
7
|
+
#
|
8
|
+
# head :created, :location => person_path(@person)
|
9
|
+
#
|
10
|
+
# It can also be used to return exceptional conditions:
|
11
|
+
#
|
12
|
+
# return head(:method_not_allowed) unless request.post?
|
13
|
+
# return head(:bad_request) unless valid_request?
|
14
|
+
# render
|
15
|
+
def head(status, options = {})
|
16
|
+
options, status = status, nil if status.is_a?(Hash)
|
17
|
+
status ||= options.delete(:status) || :ok
|
18
|
+
location = options.delete(:location)
|
19
|
+
|
20
|
+
options.each do |key, value|
|
21
|
+
headers[key.to_s.dasherize.split(/-/).map { |v| v.capitalize }.join("-")] = value.to_s
|
22
|
+
end
|
23
|
+
|
24
|
+
render :nothing => true, :status => status, :location => location
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
@@ -0,0 +1,115 @@
|
|
1
|
+
module ActionController
|
2
|
+
# The Rails framework provides a large number of helpers for working with +assets+, +dates+, +forms+,
|
3
|
+
# +numbers+ and model objects, to name a few. These helpers are available to all templates
|
4
|
+
# by default.
|
5
|
+
#
|
6
|
+
# In addition to using the standard template helpers provided in the Rails framework, creating custom helpers to
|
7
|
+
# extract complicated logic or reusable functionality is strongly encouraged. By default, the controller will
|
8
|
+
# include a helper whose name matches that of the controller, e.g., <tt>MyController</tt> will automatically
|
9
|
+
# include <tt>MyHelper</tt>.
|
10
|
+
#
|
11
|
+
# Additional helpers can be specified using the +helper+ class method in <tt>ActionController::Base</tt> or any
|
12
|
+
# controller which inherits from it.
|
13
|
+
#
|
14
|
+
# ==== Examples
|
15
|
+
# The +to_s+ method from the Time class can be wrapped in a helper method to display a custom message if
|
16
|
+
# the Time object is blank:
|
17
|
+
#
|
18
|
+
# module FormattedTimeHelper
|
19
|
+
# def format_time(time, format=:long, blank_message=" ")
|
20
|
+
# time.blank? ? blank_message : time.to_s(format)
|
21
|
+
# end
|
22
|
+
# end
|
23
|
+
#
|
24
|
+
# FormattedTimeHelper can now be included in a controller, using the +helper+ class method:
|
25
|
+
#
|
26
|
+
# class EventsController < ActionController::Base
|
27
|
+
# helper FormattedTimeHelper
|
28
|
+
# def index
|
29
|
+
# @events = Event.find(:all)
|
30
|
+
# end
|
31
|
+
# end
|
32
|
+
#
|
33
|
+
# Then, in any view rendered by <tt>EventController</tt>, the <tt>format_time</tt> method can be called:
|
34
|
+
#
|
35
|
+
# <% @events.each do |event| -%>
|
36
|
+
# <p>
|
37
|
+
# <% format_time(event.time, :short, "N/A") %> | <%= event.name %>
|
38
|
+
# </p>
|
39
|
+
# <% end -%>
|
40
|
+
#
|
41
|
+
# Finally, assuming we have two event instances, one which has a time and one which does not,
|
42
|
+
# the output might look like this:
|
43
|
+
#
|
44
|
+
# 23 Aug 11:30 | Carolina Railhawks Soccer Match
|
45
|
+
# N/A | Carolina Railhaws Training Workshop
|
46
|
+
#
|
47
|
+
module Helpers
|
48
|
+
extend ActiveSupport::Concern
|
49
|
+
|
50
|
+
include AbstractController::Helpers
|
51
|
+
|
52
|
+
included do
|
53
|
+
# Set the default directory for helpers
|
54
|
+
extlib_inheritable_accessor(:helpers_dir) do
|
55
|
+
defined?(Rails) ? "#{Rails.root}/app/helpers" : "app/helpers"
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
59
|
+
module ClassMethods
|
60
|
+
def inherited(klass)
|
61
|
+
klass.class_eval { default_helper_module! unless name.blank? }
|
62
|
+
super
|
63
|
+
end
|
64
|
+
|
65
|
+
# Declares helper accessors for controller attributes. For example, the
|
66
|
+
# following adds new +name+ and <tt>name=</tt> instance methods to a
|
67
|
+
# controller and makes them available to the view:
|
68
|
+
# helper_attr :name
|
69
|
+
# attr_accessor :name
|
70
|
+
#
|
71
|
+
# ==== Parameters
|
72
|
+
# *attrs<Array[String, Symbol]>:: Names of attributes to be converted
|
73
|
+
# into helpers.
|
74
|
+
def helper_attr(*attrs)
|
75
|
+
attrs.flatten.each { |attr| helper_method(attr, "#{attr}=") }
|
76
|
+
end
|
77
|
+
|
78
|
+
# Provides a proxy to access helpers methods from outside the view.
|
79
|
+
def helpers
|
80
|
+
@helper_proxy ||= ActionView::Base.new.extend(_helpers)
|
81
|
+
end
|
82
|
+
|
83
|
+
private
|
84
|
+
# Overwrite _modules_for_helpers to accept :all as argument, which loads
|
85
|
+
# all helpers in helpers_dir.
|
86
|
+
#
|
87
|
+
# ==== Parameters
|
88
|
+
# args<Array[String, Symbol, Module, all]>:: A list of helpers
|
89
|
+
#
|
90
|
+
# ==== Returns
|
91
|
+
# Array[Module]:: A normalized list of modules for the list of
|
92
|
+
# helpers provided.
|
93
|
+
def _modules_for_helpers(args)
|
94
|
+
args += all_application_helpers if args.delete(:all)
|
95
|
+
super(args)
|
96
|
+
end
|
97
|
+
|
98
|
+
def default_helper_module!
|
99
|
+
module_name = name.sub(/Controller$/, '')
|
100
|
+
module_path = module_name.underscore
|
101
|
+
helper module_path
|
102
|
+
rescue MissingSourceFile => e
|
103
|
+
raise e unless e.is_missing? "#{module_path}_helper"
|
104
|
+
rescue NameError => e
|
105
|
+
raise e unless e.missing_name? "#{module_name}Helper"
|
106
|
+
end
|
107
|
+
|
108
|
+
# Extract helper names from files in app/helpers/**/*.rb
|
109
|
+
def all_application_helpers
|
110
|
+
extract = /^#{Regexp.quote(helpers_dir)}\/?(.*)_helper.rb$/
|
111
|
+
Dir["#{helpers_dir}/**/*_helper.rb"].map { |file| file.sub extract, '\1' }
|
112
|
+
end
|
113
|
+
end
|
114
|
+
end
|
115
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
module ActionController
|
2
|
+
# ActionController::HideActions adds the ability to prevent public methods on a controller
|
3
|
+
# to be called as actions.
|
4
|
+
module HideActions
|
5
|
+
extend ActiveSupport::Concern
|
6
|
+
|
7
|
+
included do
|
8
|
+
extlib_inheritable_accessor(:hidden_actions) { Set.new }
|
9
|
+
end
|
10
|
+
|
11
|
+
private
|
12
|
+
|
13
|
+
# Overrides AbstractController::Base#action_method? to return false if the
|
14
|
+
# action name is in the list of hidden actions.
|
15
|
+
def action_method?(action_name)
|
16
|
+
self.class.visible_action?(action_name) do
|
17
|
+
!hidden_actions.include?(action_name) && super
|
18
|
+
end
|
19
|
+
end
|
20
|
+
|
21
|
+
module ClassMethods
|
22
|
+
# Sets all of the actions passed in as hidden actions.
|
23
|
+
#
|
24
|
+
# ==== Parameters
|
25
|
+
# *args<#to_s>:: A list of actions
|
26
|
+
def hide_action(*args)
|
27
|
+
hidden_actions.merge(args.map! {|a| a.to_s })
|
28
|
+
end
|
29
|
+
|
30
|
+
def inherited(klass)
|
31
|
+
klass.instance_variable_set("@visible_actions", {})
|
32
|
+
super
|
33
|
+
end
|
34
|
+
|
35
|
+
def visible_action?(action_name)
|
36
|
+
return @visible_actions[action_name] if @visible_actions.key?(action_name)
|
37
|
+
@visible_actions[action_name] = yield
|
38
|
+
end
|
39
|
+
|
40
|
+
# Overrides AbstractController::Base#action_methods to remove any methods
|
41
|
+
# that are listed as hidden methods.
|
42
|
+
def action_methods
|
43
|
+
@action_methods ||= Set.new(super.reject {|name| hidden_actions.include?(name)})
|
44
|
+
end
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|
@@ -0,0 +1,312 @@
|
|
1
|
+
require 'active_support/base64'
|
2
|
+
|
3
|
+
module ActionController
|
4
|
+
module HttpAuthentication
|
5
|
+
# Makes it dead easy to do HTTP Basic authentication.
|
6
|
+
#
|
7
|
+
# Simple Basic example:
|
8
|
+
#
|
9
|
+
# class PostsController < ApplicationController
|
10
|
+
# USER_NAME, PASSWORD = "dhh", "secret"
|
11
|
+
#
|
12
|
+
# before_filter :authenticate, :except => [ :index ]
|
13
|
+
#
|
14
|
+
# def index
|
15
|
+
# render :text => "Everyone can see me!"
|
16
|
+
# end
|
17
|
+
#
|
18
|
+
# def edit
|
19
|
+
# render :text => "I'm only accessible if you know the password"
|
20
|
+
# end
|
21
|
+
#
|
22
|
+
# private
|
23
|
+
# def authenticate
|
24
|
+
# authenticate_or_request_with_http_basic do |user_name, password|
|
25
|
+
# user_name == USER_NAME && password == PASSWORD
|
26
|
+
# end
|
27
|
+
# end
|
28
|
+
# end
|
29
|
+
#
|
30
|
+
#
|
31
|
+
# Here is a more advanced Basic example where only Atom feeds and the XML API is protected by HTTP authentication,
|
32
|
+
# the regular HTML interface is protected by a session approach:
|
33
|
+
#
|
34
|
+
# class ApplicationController < ActionController::Base
|
35
|
+
# before_filter :set_account, :authenticate
|
36
|
+
#
|
37
|
+
# protected
|
38
|
+
# def set_account
|
39
|
+
# @account = Account.find_by_url_name(request.subdomains.first)
|
40
|
+
# end
|
41
|
+
#
|
42
|
+
# def authenticate
|
43
|
+
# case request.format
|
44
|
+
# when Mime::XML, Mime::ATOM
|
45
|
+
# if user = authenticate_with_http_basic { |u, p| @account.users.authenticate(u, p) }
|
46
|
+
# @current_user = user
|
47
|
+
# else
|
48
|
+
# request_http_basic_authentication
|
49
|
+
# end
|
50
|
+
# else
|
51
|
+
# if session_authenticated?
|
52
|
+
# @current_user = @account.users.find(session[:authenticated][:user_id])
|
53
|
+
# else
|
54
|
+
# redirect_to(login_url) and return false
|
55
|
+
# end
|
56
|
+
# end
|
57
|
+
# end
|
58
|
+
# end
|
59
|
+
#
|
60
|
+
# In your integration tests, you can do something like this:
|
61
|
+
#
|
62
|
+
# def test_access_granted_from_xml
|
63
|
+
# get(
|
64
|
+
# "/notes/1.xml", nil,
|
65
|
+
# :authorization => ActionController::HttpAuthentication::Basic.encode_credentials(users(:dhh).name, users(:dhh).password)
|
66
|
+
# )
|
67
|
+
#
|
68
|
+
# assert_equal 200, status
|
69
|
+
# end
|
70
|
+
#
|
71
|
+
# Simple Digest example:
|
72
|
+
#
|
73
|
+
# require 'digest/md5'
|
74
|
+
# class PostsController < ApplicationController
|
75
|
+
# REALM = "SuperSecret"
|
76
|
+
# USERS = {"dhh" => "secret", #plain text password
|
77
|
+
# "dap" => Digest:MD5::hexdigest(["dap",REALM,"secret"].join(":")) #ha1 digest password
|
78
|
+
#
|
79
|
+
# before_filter :authenticate, :except => [:index]
|
80
|
+
#
|
81
|
+
# def index
|
82
|
+
# render :text => "Everyone can see me!"
|
83
|
+
# end
|
84
|
+
#
|
85
|
+
# def edit
|
86
|
+
# render :text => "I'm only accessible if you know the password"
|
87
|
+
# end
|
88
|
+
#
|
89
|
+
# private
|
90
|
+
# def authenticate
|
91
|
+
# authenticate_or_request_with_http_digest(REALM) do |username|
|
92
|
+
# USERS[username]
|
93
|
+
# end
|
94
|
+
# end
|
95
|
+
# end
|
96
|
+
#
|
97
|
+
# NOTE: The +authenticate_or_request_with_http_digest+ block must return the user's password or the ha1 digest hash so the framework can appropriately
|
98
|
+
# hash to check the user's credentials. Returning +nil+ will cause authentication to fail.
|
99
|
+
# Storing the ha1 hash: MD5(username:realm:password), is better than storing a plain password. If
|
100
|
+
# the password file or database is compromised, the attacker would be able to use the ha1 hash to
|
101
|
+
# authenticate as the user at this +realm+, but would not have the user's password to try using at
|
102
|
+
# other sites.
|
103
|
+
#
|
104
|
+
# On shared hosts, Apache sometimes doesn't pass authentication headers to
|
105
|
+
# FCGI instances. If your environment matches this description and you cannot
|
106
|
+
# authenticate, try this rule in your Apache setup:
|
107
|
+
#
|
108
|
+
# RewriteRule ^(.*)$ dispatch.fcgi [E=X-HTTP_AUTHORIZATION:%{HTTP:Authorization},QSA,L]
|
109
|
+
module Basic
|
110
|
+
extend self
|
111
|
+
|
112
|
+
module ControllerMethods
|
113
|
+
def authenticate_or_request_with_http_basic(realm = "Application", &login_procedure)
|
114
|
+
authenticate_with_http_basic(&login_procedure) || request_http_basic_authentication(realm)
|
115
|
+
end
|
116
|
+
|
117
|
+
def authenticate_with_http_basic(&login_procedure)
|
118
|
+
HttpAuthentication::Basic.authenticate(request, &login_procedure)
|
119
|
+
end
|
120
|
+
|
121
|
+
def request_http_basic_authentication(realm = "Application")
|
122
|
+
HttpAuthentication::Basic.authentication_request(self, realm)
|
123
|
+
end
|
124
|
+
end
|
125
|
+
|
126
|
+
def authenticate(request, &login_procedure)
|
127
|
+
unless authorization(request).blank?
|
128
|
+
login_procedure.call(*user_name_and_password(request))
|
129
|
+
end
|
130
|
+
end
|
131
|
+
|
132
|
+
def user_name_and_password(request)
|
133
|
+
decode_credentials(request).split(/:/, 2)
|
134
|
+
end
|
135
|
+
|
136
|
+
def authorization(request)
|
137
|
+
request.env['HTTP_AUTHORIZATION'] ||
|
138
|
+
request.env['X-HTTP_AUTHORIZATION'] ||
|
139
|
+
request.env['X_HTTP_AUTHORIZATION'] ||
|
140
|
+
request.env['REDIRECT_X_HTTP_AUTHORIZATION']
|
141
|
+
end
|
142
|
+
|
143
|
+
def decode_credentials(request)
|
144
|
+
ActiveSupport::Base64.decode64(authorization(request).split(' ', 2).last || '')
|
145
|
+
end
|
146
|
+
|
147
|
+
def encode_credentials(user_name, password)
|
148
|
+
"Basic #{ActiveSupport::Base64.encode64("#{user_name}:#{password}")}"
|
149
|
+
end
|
150
|
+
|
151
|
+
def authentication_request(controller, realm)
|
152
|
+
controller.headers["WWW-Authenticate"] = %(Basic realm="#{realm.gsub(/"/, "")}")
|
153
|
+
controller.response_body = "HTTP Basic: Access denied.\n"
|
154
|
+
controller.status = 401
|
155
|
+
end
|
156
|
+
end
|
157
|
+
|
158
|
+
module Digest
|
159
|
+
extend self
|
160
|
+
|
161
|
+
module ControllerMethods
|
162
|
+
def authenticate_or_request_with_http_digest(realm = "Application", &password_procedure)
|
163
|
+
authenticate_with_http_digest(realm, &password_procedure) || request_http_digest_authentication(realm)
|
164
|
+
end
|
165
|
+
|
166
|
+
# Authenticate with HTTP Digest, returns true or false
|
167
|
+
def authenticate_with_http_digest(realm = "Application", &password_procedure)
|
168
|
+
HttpAuthentication::Digest.authenticate(request, realm, &password_procedure)
|
169
|
+
end
|
170
|
+
|
171
|
+
# Render output including the HTTP Digest authentication header
|
172
|
+
def request_http_digest_authentication(realm = "Application", message = nil)
|
173
|
+
HttpAuthentication::Digest.authentication_request(self, realm, message)
|
174
|
+
end
|
175
|
+
end
|
176
|
+
|
177
|
+
# Returns false on a valid response, true otherwise
|
178
|
+
def authenticate(request, realm, &password_procedure)
|
179
|
+
authorization(request) && validate_digest_response(request, realm, &password_procedure)
|
180
|
+
end
|
181
|
+
|
182
|
+
def authorization(request)
|
183
|
+
request.env['HTTP_AUTHORIZATION'] ||
|
184
|
+
request.env['X-HTTP_AUTHORIZATION'] ||
|
185
|
+
request.env['X_HTTP_AUTHORIZATION'] ||
|
186
|
+
request.env['REDIRECT_X_HTTP_AUTHORIZATION']
|
187
|
+
end
|
188
|
+
|
189
|
+
# Returns false unless the request credentials response value matches the expected value.
|
190
|
+
# First try the password as a ha1 digest password. If this fails, then try it as a plain
|
191
|
+
# text password.
|
192
|
+
def validate_digest_response(request, realm, &password_procedure)
|
193
|
+
credentials = decode_credentials_header(request)
|
194
|
+
valid_nonce = validate_nonce(request, credentials[:nonce])
|
195
|
+
|
196
|
+
if valid_nonce && realm == credentials[:realm] && opaque == credentials[:opaque]
|
197
|
+
password = password_procedure.call(credentials[:username])
|
198
|
+
return false unless password
|
199
|
+
|
200
|
+
method = request.env['rack.methodoverride.original_method'] || request.env['REQUEST_METHOD']
|
201
|
+
uri = credentials[:uri][0,1] == '/' ? request.request_uri : request.url
|
202
|
+
|
203
|
+
[true, false].any? do |password_is_ha1|
|
204
|
+
expected = expected_response(method, uri, credentials, password, password_is_ha1)
|
205
|
+
expected == credentials[:response]
|
206
|
+
end
|
207
|
+
end
|
208
|
+
end
|
209
|
+
|
210
|
+
# Returns the expected response for a request of +http_method+ to +uri+ with the decoded +credentials+ and the expected +password+
|
211
|
+
# Optional parameter +password_is_ha1+ is set to +true+ by default, since best practice is to store ha1 digest instead
|
212
|
+
# of a plain-text password.
|
213
|
+
def expected_response(http_method, uri, credentials, password, password_is_ha1=true)
|
214
|
+
ha1 = password_is_ha1 ? password : ha1(credentials, password)
|
215
|
+
ha2 = ::Digest::MD5.hexdigest([http_method.to_s.upcase, uri].join(':'))
|
216
|
+
::Digest::MD5.hexdigest([ha1, credentials[:nonce], credentials[:nc], credentials[:cnonce], credentials[:qop], ha2].join(':'))
|
217
|
+
end
|
218
|
+
|
219
|
+
def ha1(credentials, password)
|
220
|
+
::Digest::MD5.hexdigest([credentials[:username], credentials[:realm], password].join(':'))
|
221
|
+
end
|
222
|
+
|
223
|
+
def encode_credentials(http_method, credentials, password, password_is_ha1)
|
224
|
+
credentials[:response] = expected_response(http_method, credentials[:uri], credentials, password, password_is_ha1)
|
225
|
+
"Digest " + credentials.sort_by {|x| x[0].to_s }.inject([]) {|a, v| a << "#{v[0]}='#{v[1]}'" }.join(', ')
|
226
|
+
end
|
227
|
+
|
228
|
+
def decode_credentials_header(request)
|
229
|
+
decode_credentials(authorization(request))
|
230
|
+
end
|
231
|
+
|
232
|
+
def decode_credentials(header)
|
233
|
+
header.to_s.gsub(/^Digest\s+/,'').split(',').inject({}) do |hash, pair|
|
234
|
+
key, value = pair.split('=', 2)
|
235
|
+
hash[key.strip.to_sym] = value.to_s.gsub(/^"|"$/,'').gsub(/'/, '')
|
236
|
+
hash
|
237
|
+
end
|
238
|
+
end
|
239
|
+
|
240
|
+
def authentication_header(controller, realm)
|
241
|
+
controller.headers["WWW-Authenticate"] = %(Digest realm="#{realm}", qop="auth", algorithm=MD5, nonce="#{nonce}", opaque="#{opaque}")
|
242
|
+
end
|
243
|
+
|
244
|
+
def authentication_request(controller, realm, message = nil)
|
245
|
+
message ||= "HTTP Digest: Access denied.\n"
|
246
|
+
authentication_header(controller, realm)
|
247
|
+
controller.response_body = message
|
248
|
+
controller.status = 401
|
249
|
+
end
|
250
|
+
|
251
|
+
# Uses an MD5 digest based on time to generate a value to be used only once.
|
252
|
+
#
|
253
|
+
# A server-specified data string which should be uniquely generated each time a 401 response is made.
|
254
|
+
# It is recommended that this string be base64 or hexadecimal data.
|
255
|
+
# Specifically, since the string is passed in the header lines as a quoted string, the double-quote character is not allowed.
|
256
|
+
#
|
257
|
+
# The contents of the nonce are implementation dependent.
|
258
|
+
# The quality of the implementation depends on a good choice.
|
259
|
+
# A nonce might, for example, be constructed as the base 64 encoding of
|
260
|
+
#
|
261
|
+
# => time-stamp H(time-stamp ":" ETag ":" private-key)
|
262
|
+
#
|
263
|
+
# where time-stamp is a server-generated time or other non-repeating value,
|
264
|
+
# ETag is the value of the HTTP ETag header associated with the requested entity,
|
265
|
+
# and private-key is data known only to the server.
|
266
|
+
# With a nonce of this form a server would recalculate the hash portion after receiving the client authentication header and
|
267
|
+
# reject the request if it did not match the nonce from that header or
|
268
|
+
# if the time-stamp value is not recent enough. In this way the server can limit the time of the nonce's validity.
|
269
|
+
# The inclusion of the ETag prevents a replay request for an updated version of the resource.
|
270
|
+
# (Note: including the IP address of the client in the nonce would appear to offer the server the ability
|
271
|
+
# to limit the reuse of the nonce to the same client that originally got it.
|
272
|
+
# However, that would break proxy farms, where requests from a single user often go through different proxies in the farm.
|
273
|
+
# Also, IP address spoofing is not that hard.)
|
274
|
+
#
|
275
|
+
# An implementation might choose not to accept a previously used nonce or a previously used digest, in order to
|
276
|
+
# protect against a replay attack. Or, an implementation might choose to use one-time nonces or digests for
|
277
|
+
# POST or PUT requests and a time-stamp for GET requests. For more details on the issues involved see Section 4
|
278
|
+
# of this document.
|
279
|
+
#
|
280
|
+
# The nonce is opaque to the client. Composed of Time, and hash of Time with secret
|
281
|
+
# key from the Rails session secret generated upon creation of project. Ensures
|
282
|
+
# the time cannot be modified by client.
|
283
|
+
def nonce(time = Time.now)
|
284
|
+
t = time.to_i
|
285
|
+
hashed = [t, secret_key]
|
286
|
+
digest = ::Digest::MD5.hexdigest(hashed.join(":"))
|
287
|
+
ActiveSupport::Base64.encode64("#{t}:#{digest}").gsub("\n", '')
|
288
|
+
end
|
289
|
+
|
290
|
+
# Might want a shorter timeout depending on whether the request
|
291
|
+
# is a PUT or POST, and if client is browser or web service.
|
292
|
+
# Can be much shorter if the Stale directive is implemented. This would
|
293
|
+
# allow a user to use new nonce without prompting user again for their
|
294
|
+
# username and password.
|
295
|
+
def validate_nonce(request, value, seconds_to_timeout=5*60)
|
296
|
+
t = ActiveSupport::Base64.decode64(value).split(":").first.to_i
|
297
|
+
nonce(t) == value && (t - Time.now.to_i).abs <= seconds_to_timeout
|
298
|
+
end
|
299
|
+
|
300
|
+
# Opaque based on random generation - but changing each request?
|
301
|
+
def opaque()
|
302
|
+
::Digest::MD5.hexdigest(secret_key)
|
303
|
+
end
|
304
|
+
|
305
|
+
# Set in /initializers/session_store.rb, and loaded even if sessions are not in use.
|
306
|
+
def secret_key
|
307
|
+
ActionController::Base.session_options[:secret]
|
308
|
+
end
|
309
|
+
|
310
|
+
end
|
311
|
+
end
|
312
|
+
end
|