hubssolib 3.6.1 → 3.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +6 -0
- data/Gemfile.lock +1 -1
- data/README.md +74 -0
- data/hubssolib.gemspec +1 -1
- data/lib/hub_sso_lib.rb +124 -14
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 68326a50593cfc8b53f1d5ba20e668a0a18316d8e3c6f9a9b245f213522f46f7
|
4
|
+
data.tar.gz: 9267e261fb2af094e0801cea965007c8ee5760d93886a3525640ecca5603f52a
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1849bcd713bb28f152fae7ca328f0d5f9cbb3b49aef31485019e930ba083af8f79cc3f804d04cf81628aed1bcfdbf669acada4c9cf97b2d190eefe4bc4cf6e9d
|
7
|
+
data.tar.gz: 22c27953133bda55f46e83636298a7b978480bf2d05160a22caf16cecdf4579d39ddff294185dc8510e415fa94a04bd087a6875a983c6cf3df0238e4eac647ee
|
data/CHANGELOG.md
CHANGED
@@ -1,3 +1,9 @@
|
|
1
|
+
## 3.7.0 and 3.7.1, 28-Mar-2025
|
2
|
+
|
3
|
+
* Login indicator cookie wasn't updated on session timeout, so when the page loaded for pages that do *not* require authorisation, the warning flash about being timed out would show, but the indicator would still show a "logged in" state until the next page fetch.
|
4
|
+
* User trust mechanism introduced, including HubSsoLib::Core#hubssolib_trusted? convenience accessor for Hub-integrated applications to check on user trust and `HubSsoLib::Core#hubssolib_review_action` convenience alias for `HubSsoLib::Trust.get_trust_object().review_action`.
|
5
|
+
* 3.7.1, released only a few minutes after 3.7.0, added the aforementioned `#hubssolib_retrieve_action` method, previously overlooked.
|
6
|
+
|
1
7
|
## 3.6.1, 27-Mar-2025
|
2
8
|
|
3
9
|
Some fixes:
|
data/Gemfile.lock
CHANGED
data/README.md
CHANGED
@@ -376,3 +376,77 @@ In the example of "permissions for arbitrary user" you may well not have ready a
|
|
376
376
|
When a user logs in with a traditional log-in system, there's usually some message shown on the page presented when log-in is successful. This is achieved through the Hub equivalent of the Rails `flash` hash. Replace your preferred mechanism for including contents of the `flash` hash into your views (usually via one or more layout files) with an equivalent which calls Hub's flash handling code, which aggregates both current application and cross-application flash content into one.
|
377
377
|
|
378
378
|
Just using `<%= hubssolib_flash_tags -%>` in your layout(s) and/or view(s) will output merged flash data. HTML is generated consisting of `h2` tags with class names derived from the keys used in the flash tag. Each heading tag encapsulates the value for the key and is followed by an empty paragraph tag for spacing reasons on older browsers when more than one key is present, though normally there is only one. Hub itself commonly uses keys `:notice` ("green" / general information - e.g. "you are now logged in"), `:attention` ("orange" / something unusual happened - e.g. "your session timed out so you were logged out") and `:alert` ("red" / something bad happened - e.g. "incorrect password given").
|
379
|
+
|
380
|
+
|
381
|
+
|
382
|
+
## Trust mechanism
|
383
|
+
|
384
|
+
Hub 3.7.0 and later introduce a trust mechanism. Users have a "trusted" flag that's off by default for any new user. Participating applications can check the current user trust with `hubssolib_trusted?`. For actions where you care about trust - which are typically for creations (e.g. post to a forum, comment on an article) then:
|
385
|
+
|
386
|
+
* The relevant controller action proceeds as normal to the point of being ready to save new or updated record(s)
|
387
|
+
* If the user is untrusted and the to-be-saved record(s) is/are valid, and so should save OK...
|
388
|
+
- ...instead assemble information about the action and send it to Hub
|
389
|
+
- ...and *do not* save anything but instead exit with an appropriate flash message (e.g. "Thanks, that's gone into our moderation queue and should show up soon - please check back later!").
|
390
|
+
|
391
|
+
You send an action to Hub with an alias method `hubssolib_review_action` which has this effective signature:
|
392
|
+
|
393
|
+
```ruby
|
394
|
+
def hubssolib_review_action(
|
395
|
+
user_email:,
|
396
|
+
action_scheme:,
|
397
|
+
action_url:,
|
398
|
+
action_payload:,
|
399
|
+
action_as_html:,
|
400
|
+
callback_url:
|
401
|
+
)
|
402
|
+
```
|
403
|
+
|
404
|
+
...where you pass:
|
405
|
+
|
406
|
+
* The user's email address _as known to Hub_, which is used to look up the user on the Hub side
|
407
|
+
* The HTTP method that was being used as a string, case insensitive, e.g. `POST`, for display to admins only
|
408
|
+
* The URL in full upon which this current request was made, for display to admins only
|
409
|
+
* The payload - usually just `params`, as-is - you'll get send this back again later, so include everything you need to reprocess the action
|
410
|
+
* Your choice of **safe** HTML that the Hub application will show as a preview (this may undergo some allow-list sanitisation; Hub does not expect a malicious integrated application to send it bad HTML which attempts skullduggery, but it shouldn't compromise its view layer just because something unsafe got sent accidentally, either!)
|
411
|
+
* **A callback URL** described below
|
412
|
+
|
413
|
+
If an admin thinks that the submission is bad - e.g. spam - then you won't hear about it again. Otherwise, the admin thinks the delayed action should now be taken for real. To accomplish this, Hub will `POST` back (and always uses `POST`) to your `callback_url` **in JSON** with an object that just has a key, `id`.
|
414
|
+
|
415
|
+
You create a controller action for your endpoint which retrieves the action details using code similar to this:
|
416
|
+
|
417
|
+
```ruby
|
418
|
+
# The request format might be JSON because ".json" ended the path of the
|
419
|
+
# URI used to call here, but a missing or incorrect Content-Type header
|
420
|
+
# may mean that Rack/Rails doesn't process the body into "params" as
|
421
|
+
# expected. The latter would result in a nonsense database lookup which
|
422
|
+
# is harmless but wasteful, so don't do it.
|
423
|
+
#
|
424
|
+
if request.format.json? && request.headers['Content-Type']&.downcase == 'application/json'
|
425
|
+
@details = hubssolib_retrieve_action(id: params[:id])
|
426
|
+
head :unprocessable_entity if @details.nil?
|
427
|
+
else
|
428
|
+
head :unsupported_media_type
|
429
|
+
end
|
430
|
+
```
|
431
|
+
|
432
|
+
...then uses the object to work out what to do next. The retrieved object is a Hash, with **Symbol keys at the top level** but **String keys in `action_payload`**:
|
433
|
+
|
434
|
+
```
|
435
|
+
{
|
436
|
+
timestamp: untrusted_action.created_at,
|
437
|
+
user_email: untrusted_action.user_email,
|
438
|
+
user_unique_name: user_unique_name,
|
439
|
+
action_scheme: untrusted_action.action_scheme,
|
440
|
+
action_url: untrusted_action.action_url,
|
441
|
+
action_payload: untrusted_action.action_payload
|
442
|
+
}
|
443
|
+
```
|
444
|
+
|
445
|
+
...so that's:
|
446
|
+
|
447
|
+
* The created-at time when you sent the action for review. This is usually only needed if you're dealing with a delayed edit/update action, where you might need to make sure that nobody else had edited the same entity in the mean time.
|
448
|
+
* The previously submitted user e-mail is given so you know _who_ it was that is now being trusted, along with the associated Hub "unique display name" (e.g. `Jane Doe (14510)`).
|
449
|
+
* Your previously submitted action scheme and URL are also given in case you need them because you've decided to implement one callback handler for different kinds of untrusted action.
|
450
|
+
* The `action_payload` is where all your important data, meaningful only to you, resides and this must contain everything else, other than the above parameters, required to complete the action previously sent for review, _while making sure things are attributed to the correct user_.
|
451
|
+
|
452
|
+
The trust mechanism involves a fair amount of effort on the integrating app's side but it can be very useful if you have a site where, despite your best efforts, sometimes spam/bot accounts manage to get inside and try to flood the system with spam. It's just one of many different potential protection and mitigation mechanisms that your site might choose to employ.
|
data/hubssolib.gemspec
CHANGED
data/lib/hub_sso_lib.rb
CHANGED
@@ -23,14 +23,16 @@ module HubSsoLib
|
|
23
23
|
require 'json'
|
24
24
|
require 'yaml'
|
25
25
|
|
26
|
-
# DRb
|
26
|
+
# DRb connections.
|
27
27
|
#
|
28
|
-
HUB_CONNECTION_URI
|
28
|
+
HUB_CONNECTION_URI = ENV['HUB_CONNECTION_URI' ] || 'drbunix:' + File.join(ENV['HOME'] || '/', '/.hub_drb')
|
29
|
+
HUB_TRUST_CONNECTION_URI = ENV['HUB_TRUST_CONNECTION_URI'] || 'drbunix:' + File.join(ENV['HOME'] || '/', '/.hub_trust_drb')
|
29
30
|
|
30
|
-
unless HUB_CONNECTION_URI.downcase.start_with?('drbunix:')
|
31
|
+
unless HUB_CONNECTION_URI.downcase.start_with?('drbunix:') && HUB_TRUST_CONNECTION_URI.downcase.start_with?('drbunix:')
|
31
32
|
puts
|
32
33
|
puts '*' * 80
|
33
|
-
puts
|
34
|
+
puts 'You *must* "drbunix:" for HUB_CONNECTION_URI and HUB_TRUST_CONNECTION_URI.'
|
35
|
+
puts "Either or both of #{HUB_CONNECTION_URI.inspect} and #{HUB_TRUST_CONNECTION_URI.inspect} is invalid)"
|
34
36
|
puts '*' * 80
|
35
37
|
puts
|
36
38
|
|
@@ -39,7 +41,7 @@ module HubSsoLib
|
|
39
41
|
|
40
42
|
# External application command registry for on-user-change events.
|
41
43
|
#
|
42
|
-
HUB_COMMAND_REGISTRY = ENV['HUB_COMMAND_REGISTRY'] || File.join(
|
44
|
+
HUB_COMMAND_REGISTRY = ENV['HUB_COMMAND_REGISTRY'] || File.join(ENV['HOME'] || '/', '/.hub_cmd_reg')
|
43
45
|
|
44
46
|
unless Dir.exist?(File.dirname(HUB_COMMAND_REGISTRY))
|
45
47
|
puts
|
@@ -221,7 +223,7 @@ module HubSsoLib
|
|
221
223
|
return @role_array.dup
|
222
224
|
end
|
223
225
|
|
224
|
-
# Return a copy of the
|
226
|
+
# Return a copy of the internal roles list as a human readable string.
|
225
227
|
#
|
226
228
|
def to_human_s
|
227
229
|
human_names = []
|
@@ -259,6 +261,7 @@ module HubSsoLib
|
|
259
261
|
return false if roles.nil?
|
260
262
|
|
261
263
|
# Ensure we've an array of roles, one way or another
|
264
|
+
#
|
262
265
|
roles = roles.to_s if roles.class == Symbol
|
263
266
|
roles = roles.split(',') if roles.class == String
|
264
267
|
|
@@ -360,6 +363,7 @@ module HubSsoLib
|
|
360
363
|
# Author: A.D.Hodgkinson #
|
361
364
|
# #
|
362
365
|
# History: 21-Oct-2006 (ADH): Created. #
|
366
|
+
# 26-Feb-2025 (ADH): Add 'trusted' concept. #
|
363
367
|
#######################################################################
|
364
368
|
|
365
369
|
class User
|
@@ -388,6 +392,7 @@ module HubSsoLib
|
|
388
392
|
attr_accessor :user_email
|
389
393
|
attr_accessor :user_created_at
|
390
394
|
attr_accessor :user_password_reset_code_expires_at
|
395
|
+
attr_accessor :user_trusted
|
391
396
|
|
392
397
|
def initialize
|
393
398
|
@user_salt = nil
|
@@ -405,6 +410,7 @@ module HubSsoLib
|
|
405
410
|
@user_email = nil
|
406
411
|
@user_created_at = nil
|
407
412
|
@user_password_reset_code_expires_at = nil
|
413
|
+
@user_trusted = nil
|
408
414
|
end
|
409
415
|
end # User class
|
410
416
|
|
@@ -465,7 +471,7 @@ module HubSsoLib
|
|
465
471
|
|
466
472
|
class SessionFactory
|
467
473
|
def initialize
|
468
|
-
@hub_be_quiet =
|
474
|
+
@hub_be_quiet = (ENV['HUB_QUIET_SERVER'] == 'yes')
|
469
475
|
@hub_sessions = {}
|
470
476
|
|
471
477
|
puts "Session factory: Awakening..." unless @hub_be_quiet
|
@@ -785,7 +791,7 @@ module HubSsoLib
|
|
785
791
|
QUEUE = ::Queue.new
|
786
792
|
|
787
793
|
def self.run
|
788
|
-
puts "Server: Starting at #{ HUB_CONNECTION_URI }" if ENV['HUB_QUIET_SERVER']
|
794
|
+
puts "Server: Starting at #{ HUB_CONNECTION_URI }" if ENV['HUB_QUIET_SERVER'] != 'yes'
|
789
795
|
|
790
796
|
@@hub_session_factory = HubSsoLib::SessionFactory.new
|
791
797
|
|
@@ -815,6 +821,79 @@ module HubSsoLib
|
|
815
821
|
end # Runner class
|
816
822
|
end # Server module
|
817
823
|
|
824
|
+
#######################################################################
|
825
|
+
# Class: Trust #
|
826
|
+
# #
|
827
|
+
# Purpose: Allow other applications to call into the Hub Rails #
|
828
|
+
# application to tell it about untrusted user operations. #
|
829
|
+
# The application can then store the details, e-mail #
|
830
|
+
# moderators and in due course call back to the originating #
|
831
|
+
# other application to move the user action forwards. #
|
832
|
+
# #
|
833
|
+
# The external API is HubSsoLib::Trust::Server, implemented #
|
834
|
+
# by the Hub Rails application, not this gem. #
|
835
|
+
# #
|
836
|
+
# Author: A.D.Hodgkinson #
|
837
|
+
# #
|
838
|
+
# History: 19-Mar-2025 (ADH): Created #
|
839
|
+
#######################################################################
|
840
|
+
|
841
|
+
class Trust
|
842
|
+
|
843
|
+
# Return the DRb endpoint URI for the trust server.
|
844
|
+
#
|
845
|
+
def self.get_trust_server_connection_uri
|
846
|
+
HUB_TRUST_CONNECTION_URI
|
847
|
+
end
|
848
|
+
|
849
|
+
# Start the trust server. This should only ever be called by the Hub Rails
|
850
|
+
# application, which implements HubSsoLib::Trust::Server.
|
851
|
+
#
|
852
|
+
def self.launch_server
|
853
|
+
uri = self.get_trust_server_connection_uri()
|
854
|
+
path = URI.parse(uri).path
|
855
|
+
already_running = File.exist?(path)
|
856
|
+
|
857
|
+
unless ENV['HUB_QUIET_SERVER'] == 'yes'
|
858
|
+
message = unless already_running
|
859
|
+
"Trust server: Starting at #{ uri }"
|
860
|
+
else
|
861
|
+
"Trust server: Already running at at #{ uri }"
|
862
|
+
end
|
863
|
+
|
864
|
+
puts message
|
865
|
+
end
|
866
|
+
|
867
|
+
unless already_running
|
868
|
+
loop do
|
869
|
+
DRb.start_service(uri, ::HubSsoLib::Trust::Server.new)
|
870
|
+
DRb.thread.join # Keep the thread alive...
|
871
|
+
end # ...but auto-restart if e.g. DRb.stop_service() is invoked
|
872
|
+
end
|
873
|
+
end
|
874
|
+
|
875
|
+
# Obtain a connection to the trust server. This is called by any client
|
876
|
+
# code that needs to talk to the server which must, at the time called, be
|
877
|
+
# running via startup within the Hub Rails application.
|
878
|
+
#
|
879
|
+
# The returned object is an instance of ::HubSsoLib::Trust::Server, which
|
880
|
+
# is defined inside the Hub Rails application. See there for details.
|
881
|
+
#
|
882
|
+
def self.get_trust_object
|
883
|
+
HUB_MUTEX.synchronize do
|
884
|
+
begin
|
885
|
+
DRb.current_server
|
886
|
+
rescue DRb::DRbServerNotFound
|
887
|
+
DRb.start_service()
|
888
|
+
end
|
889
|
+
|
890
|
+
@@trust_object ||= DRbObject.new_with_uri(self.get_trust_server_connection_uri())
|
891
|
+
end
|
892
|
+
|
893
|
+
return @@trust_object
|
894
|
+
end
|
895
|
+
end
|
896
|
+
|
818
897
|
#######################################################################
|
819
898
|
# Module: Core #
|
820
899
|
# Various authors #
|
@@ -848,6 +927,8 @@ module HubSsoLib
|
|
848
927
|
#
|
849
928
|
def hubssolib_log_out
|
850
929
|
self.hubssolib_current_user = nil # (which deals with all related session and cookie consequences)
|
930
|
+
@hubssolib_session = nil
|
931
|
+
cookies.delete(HUB_LOGIN_INDICATOR_COOKIE, domain: :all, path: '/')
|
851
932
|
end
|
852
933
|
|
853
934
|
# Returns true or false if a user is logged in or not, respectively.
|
@@ -991,6 +1072,33 @@ module HubSsoLib
|
|
991
1072
|
return (puser && !puser.empty? && puser != pnormal)
|
992
1073
|
end
|
993
1074
|
|
1075
|
+
# Convenience method that returns +true+ if there's a currently logged-in
|
1076
|
+
# Hub user that has been flagged as trusted, else - whether there is no
|
1077
|
+
# current user, or they haven't been flagged as trusted - returns +false+.
|
1078
|
+
#
|
1079
|
+
def hubssolib_trusted?
|
1080
|
+
self.hubssolib_current_user&.user_trusted == 'true'
|
1081
|
+
end
|
1082
|
+
|
1083
|
+
# Convenience accessor to HubSsoLib::Trust.get_trust_object().review_action
|
1084
|
+
# - see that method for details. Note that the Trust object is implemented
|
1085
|
+
# in the Hub application, not here; see:
|
1086
|
+
#
|
1087
|
+
# HubSsoLib::Trust::Server::review_action
|
1088
|
+
#
|
1089
|
+
# ...in "app/hub/lib/hub_sso_lib/trust/server.rb".
|
1090
|
+
#
|
1091
|
+
def hubssolib_review_action(**args)
|
1092
|
+
HubSsoLib::Trust.get_trust_object().review_action(**args)
|
1093
|
+
end
|
1094
|
+
|
1095
|
+
# The equivalent of #hubssolib_review_action, but for retrieving details of
|
1096
|
+
# an action when Hub invokes your callback via POST request.
|
1097
|
+
#
|
1098
|
+
def hubssolib_retrieve_action(**args)
|
1099
|
+
HubSsoLib::Trust.get_trust_object().retrieve_action(**args)
|
1100
|
+
end
|
1101
|
+
|
994
1102
|
# Public read-only accessor methods for common user activities:
|
995
1103
|
# return the current user's roles as a Roles object, or nil if
|
996
1104
|
# there's no user.
|
@@ -1031,7 +1139,7 @@ module HubSsoLib
|
|
1031
1139
|
# hubssolib_get_name.
|
1032
1140
|
#
|
1033
1141
|
def hubssolib_unique_name
|
1034
|
-
user = hubssolib_current_user
|
1142
|
+
user = self.hubssolib_current_user
|
1035
1143
|
user ? "#{user.user_real_name} (#{user.user_id})" : 'Anonymous'
|
1036
1144
|
end
|
1037
1145
|
|
@@ -1267,7 +1375,7 @@ module HubSsoLib
|
|
1267
1375
|
# quietly log out and let action processing carry on.
|
1268
1376
|
|
1269
1377
|
if (hubssolib_session_expired?)
|
1270
|
-
hubssolib_log_out
|
1378
|
+
hubssolib_log_out()
|
1271
1379
|
hubssolib_set_flash(:attention, 'Your session timed out, so you are no longer logged in.')
|
1272
1380
|
else
|
1273
1381
|
hubssolib_set_last_used(Time.now.utc)
|
@@ -1297,7 +1405,6 @@ module HubSsoLib
|
|
1297
1405
|
def hubssolib_afterwards
|
1298
1406
|
begin
|
1299
1407
|
DRb.current_server
|
1300
|
-
DRb.stop_service()
|
1301
1408
|
rescue DRb::DRbServerNotFound
|
1302
1409
|
# Nothing to do; no service is running.
|
1303
1410
|
end
|
@@ -1441,11 +1548,13 @@ module HubSsoLib
|
|
1441
1548
|
|
1442
1549
|
:hubssolib_current_user,
|
1443
1550
|
:hubssolib_unique_name,
|
1551
|
+
:hubssolib_account_link,
|
1552
|
+
:hubssolib_flash_data,
|
1553
|
+
|
1444
1554
|
:hubssolib_logged_in?,
|
1445
1555
|
:hubssolib_authorized?,
|
1446
1556
|
:hubssolib_privileged?,
|
1447
|
-
:
|
1448
|
-
:hubssolib_flash_data
|
1557
|
+
:hubssolib_trusted?
|
1449
1558
|
)
|
1450
1559
|
end
|
1451
1560
|
end
|
@@ -1606,8 +1715,9 @@ module HubSsoLib
|
|
1606
1715
|
# halted (since the overall return value is therefore 'false').
|
1607
1716
|
#
|
1608
1717
|
def hubssolib_access_denied
|
1609
|
-
# See hubsso_must_login for the reason behind the following call.
|
1610
1718
|
|
1719
|
+
# See hubsso_must_login for the reason behind the following call.
|
1720
|
+
#
|
1611
1721
|
if hubssolib_ensure_https
|
1612
1722
|
hubssolib_set_flash(:alert, 'You do not have permission to carry out that action on this site.')
|
1613
1723
|
redirect_to HUB_PATH_PREFIX + '/'
|
metadata
CHANGED
@@ -1,13 +1,13 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: hubssolib
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
4
|
+
version: 3.7.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Andrew Hodgkinson and others
|
8
8
|
bindir: bin
|
9
9
|
cert_chain: []
|
10
|
-
date: 2025-03-
|
10
|
+
date: 2025-03-28 00:00:00.000000000 Z
|
11
11
|
dependencies:
|
12
12
|
- !ruby/object:Gem::Dependency
|
13
13
|
name: drb
|