hubssolib 3.6.1 → 3.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: eaea423d2eec6433b30522f6a6d46ab3c1b2868bb860d985cd7472116a17bc95
4
- data.tar.gz: 19ae77e97c1e480b6b6cba78eee22523d9964af677ac9a9531582aa68883350b
3
+ metadata.gz: 68326a50593cfc8b53f1d5ba20e668a0a18316d8e3c6f9a9b245f213522f46f7
4
+ data.tar.gz: 9267e261fb2af094e0801cea965007c8ee5760d93886a3525640ecca5603f52a
5
5
  SHA512:
6
- metadata.gz: db1d1f887967b480cb7ef066b1d038ca4540c5aa18fdb307a42fa825f20ca5c9cc7390bccdf9d5b7de247d9ccdfe0b7219f40cc7c7e7cc7b283d2c0a9a458be5
7
- data.tar.gz: ccc14fd7c1015d61bc40cde504976d4eafc38368fa2bcb076b3f1e89fe9974b5c2179f55295789c28f25256335f02479161d8966cc774ce8b924bbb41d646119
6
+ metadata.gz: 1849bcd713bb28f152fae7ca328f0d5f9cbb3b49aef31485019e930ba083af8f79cc3f804d04cf81628aed1bcfdbf669acada4c9cf97b2d190eefe4bc4cf6e9d
7
+ data.tar.gz: 22c27953133bda55f46e83636298a7b978480bf2d05160a22caf16cecdf4579d39ddff294185dc8510e415fa94a04bd087a6875a983c6cf3df0238e4eac647ee
data/CHANGELOG.md CHANGED
@@ -1,3 +1,9 @@
1
+ ## 3.7.0 and 3.7.1, 28-Mar-2025
2
+
3
+ * Login indicator cookie wasn't updated on session timeout, so when the page loaded for pages that do *not* require authorisation, the warning flash about being timed out would show, but the indicator would still show a "logged in" state until the next page fetch.
4
+ * User trust mechanism introduced, including HubSsoLib::Core#hubssolib_trusted? convenience accessor for Hub-integrated applications to check on user trust and `HubSsoLib::Core#hubssolib_review_action` convenience alias for `HubSsoLib::Trust.get_trust_object().review_action`.
5
+ * 3.7.1, released only a few minutes after 3.7.0, added the aforementioned `#hubssolib_retrieve_action` method, previously overlooked.
6
+
1
7
  ## 3.6.1, 27-Mar-2025
2
8
 
3
9
  Some fixes:
data/Gemfile.lock CHANGED
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- hubssolib (3.6.1)
4
+ hubssolib (3.7.1)
5
5
  base64 (~> 0.2)
6
6
  drb (~> 2.2)
7
7
 
data/README.md CHANGED
@@ -376,3 +376,77 @@ In the example of "permissions for arbitrary user" you may well not have ready a
376
376
  When a user logs in with a traditional log-in system, there's usually some message shown on the page presented when log-in is successful. This is achieved through the Hub equivalent of the Rails `flash` hash. Replace your preferred mechanism for including contents of the `flash` hash into your views (usually via one or more layout files) with an equivalent which calls Hub's flash handling code, which aggregates both current application and cross-application flash content into one.
377
377
 
378
378
  Just using `<%= hubssolib_flash_tags -%>` in your layout(s) and/or view(s) will output merged flash data. HTML is generated consisting of `h2` tags with class names derived from the keys used in the flash tag. Each heading tag encapsulates the value for the key and is followed by an empty paragraph tag for spacing reasons on older browsers when more than one key is present, though normally there is only one. Hub itself commonly uses keys `:notice` ("green" / general information - e.g. "you are now logged in"), `:attention` ("orange" / something unusual happened - e.g. "your session timed out so you were logged out") and `:alert` ("red" / something bad happened - e.g. "incorrect password given").
379
+
380
+
381
+
382
+ ## Trust mechanism
383
+
384
+ Hub 3.7.0 and later introduce a trust mechanism. Users have a "trusted" flag that's off by default for any new user. Participating applications can check the current user trust with `hubssolib_trusted?`. For actions where you care about trust - which are typically for creations (e.g. post to a forum, comment on an article) then:
385
+
386
+ * The relevant controller action proceeds as normal to the point of being ready to save new or updated record(s)
387
+ * If the user is untrusted and the to-be-saved record(s) is/are valid, and so should save OK...
388
+ - ...instead assemble information about the action and send it to Hub
389
+ - ...and *do not* save anything but instead exit with an appropriate flash message (e.g. "Thanks, that's gone into our moderation queue and should show up soon - please check back later!").
390
+
391
+ You send an action to Hub with an alias method `hubssolib_review_action` which has this effective signature:
392
+
393
+ ```ruby
394
+ def hubssolib_review_action(
395
+ user_email:,
396
+ action_scheme:,
397
+ action_url:,
398
+ action_payload:,
399
+ action_as_html:,
400
+ callback_url:
401
+ )
402
+ ```
403
+
404
+ ...where you pass:
405
+
406
+ * The user's email address _as known to Hub_, which is used to look up the user on the Hub side
407
+ * The HTTP method that was being used as a string, case insensitive, e.g. `POST`, for display to admins only
408
+ * The URL in full upon which this current request was made, for display to admins only
409
+ * The payload - usually just `params`, as-is - you'll get send this back again later, so include everything you need to reprocess the action
410
+ * Your choice of **safe** HTML that the Hub application will show as a preview (this may undergo some allow-list sanitisation; Hub does not expect a malicious integrated application to send it bad HTML which attempts skullduggery, but it shouldn't compromise its view layer just because something unsafe got sent accidentally, either!)
411
+ * **A callback URL** described below
412
+
413
+ If an admin thinks that the submission is bad - e.g. spam - then you won't hear about it again. Otherwise, the admin thinks the delayed action should now be taken for real. To accomplish this, Hub will `POST` back (and always uses `POST`) to your `callback_url` **in JSON** with an object that just has a key, `id`.
414
+
415
+ You create a controller action for your endpoint which retrieves the action details using code similar to this:
416
+
417
+ ```ruby
418
+ # The request format might be JSON because ".json" ended the path of the
419
+ # URI used to call here, but a missing or incorrect Content-Type header
420
+ # may mean that Rack/Rails doesn't process the body into "params" as
421
+ # expected. The latter would result in a nonsense database lookup which
422
+ # is harmless but wasteful, so don't do it.
423
+ #
424
+ if request.format.json? && request.headers['Content-Type']&.downcase == 'application/json'
425
+ @details = hubssolib_retrieve_action(id: params[:id])
426
+ head :unprocessable_entity if @details.nil?
427
+ else
428
+ head :unsupported_media_type
429
+ end
430
+ ```
431
+
432
+ ...then uses the object to work out what to do next. The retrieved object is a Hash, with **Symbol keys at the top level** but **String keys in `action_payload`**:
433
+
434
+ ```
435
+ {
436
+ timestamp: untrusted_action.created_at,
437
+ user_email: untrusted_action.user_email,
438
+ user_unique_name: user_unique_name,
439
+ action_scheme: untrusted_action.action_scheme,
440
+ action_url: untrusted_action.action_url,
441
+ action_payload: untrusted_action.action_payload
442
+ }
443
+ ```
444
+
445
+ ...so that's:
446
+
447
+ * The created-at time when you sent the action for review. This is usually only needed if you're dealing with a delayed edit/update action, where you might need to make sure that nobody else had edited the same entity in the mean time.
448
+ * The previously submitted user e-mail is given so you know _who_ it was that is now being trusted, along with the associated Hub "unique display name" (e.g. `Jane Doe (14510)`).
449
+ * Your previously submitted action scheme and URL are also given in case you need them because you've decided to implement one callback handler for different kinds of untrusted action.
450
+ * The `action_payload` is where all your important data, meaningful only to you, resides and this must contain everything else, other than the above parameters, required to complete the action previously sent for review, _while making sure things are attributed to the correct user_.
451
+
452
+ The trust mechanism involves a fair amount of effort on the integrating app's side but it can be very useful if you have a site where, despite your best efforts, sometimes spam/bot accounts manage to get inside and try to flood the system with spam. It's just one of many different potential protection and mitigation mechanisms that your site might choose to employ.
data/hubssolib.gemspec CHANGED
@@ -4,7 +4,7 @@ spec = Gem::Specification.new do |s|
4
4
  s.platform = Gem::Platform::RUBY
5
5
  s.name = 'hubssolib'
6
6
 
7
- s.version = '3.6.1'
7
+ s.version = '3.7.1'
8
8
  s.author = 'Andrew Hodgkinson and others'
9
9
  s.email = 'ahodgkin@rowing.org.uk'
10
10
  s.homepage = 'http://pond.org.uk/'
data/lib/hub_sso_lib.rb CHANGED
@@ -23,14 +23,16 @@ module HubSsoLib
23
23
  require 'json'
24
24
  require 'yaml'
25
25
 
26
- # DRb connection.
26
+ # DRb connections.
27
27
  #
28
- HUB_CONNECTION_URI = ENV['HUB_CONNECTION_URI'] || 'drbunix:' + File.join( ENV['HOME'] || '/', '/.hub_drb')
28
+ HUB_CONNECTION_URI = ENV['HUB_CONNECTION_URI' ] || 'drbunix:' + File.join(ENV['HOME'] || '/', '/.hub_drb')
29
+ HUB_TRUST_CONNECTION_URI = ENV['HUB_TRUST_CONNECTION_URI'] || 'drbunix:' + File.join(ENV['HOME'] || '/', '/.hub_trust_drb')
29
30
 
30
- unless HUB_CONNECTION_URI.downcase.start_with?('drbunix:')
31
+ unless HUB_CONNECTION_URI.downcase.start_with?('drbunix:') && HUB_TRUST_CONNECTION_URI.downcase.start_with?('drbunix:')
31
32
  puts
32
33
  puts '*' * 80
33
- puts "You *must* use a 'drbunix:' scheme for HUB_CONNECTION_URI (#{ HUB_CONNECTION_URI.inspect } is invalid)"
34
+ puts 'You *must* "drbunix:" for HUB_CONNECTION_URI and HUB_TRUST_CONNECTION_URI.'
35
+ puts "Either or both of #{HUB_CONNECTION_URI.inspect} and #{HUB_TRUST_CONNECTION_URI.inspect} is invalid)"
34
36
  puts '*' * 80
35
37
  puts
36
38
 
@@ -39,7 +41,7 @@ module HubSsoLib
39
41
 
40
42
  # External application command registry for on-user-change events.
41
43
  #
42
- HUB_COMMAND_REGISTRY = ENV['HUB_COMMAND_REGISTRY'] || File.join( ENV['HOME'] || '/', '/.hub_cmd_reg')
44
+ HUB_COMMAND_REGISTRY = ENV['HUB_COMMAND_REGISTRY'] || File.join(ENV['HOME'] || '/', '/.hub_cmd_reg')
43
45
 
44
46
  unless Dir.exist?(File.dirname(HUB_COMMAND_REGISTRY))
45
47
  puts
@@ -221,7 +223,7 @@ module HubSsoLib
221
223
  return @role_array.dup
222
224
  end
223
225
 
224
- # Return a copy of the intenal roles list as a human readable string.
226
+ # Return a copy of the internal roles list as a human readable string.
225
227
  #
226
228
  def to_human_s
227
229
  human_names = []
@@ -259,6 +261,7 @@ module HubSsoLib
259
261
  return false if roles.nil?
260
262
 
261
263
  # Ensure we've an array of roles, one way or another
264
+ #
262
265
  roles = roles.to_s if roles.class == Symbol
263
266
  roles = roles.split(',') if roles.class == String
264
267
 
@@ -360,6 +363,7 @@ module HubSsoLib
360
363
  # Author: A.D.Hodgkinson #
361
364
  # #
362
365
  # History: 21-Oct-2006 (ADH): Created. #
366
+ # 26-Feb-2025 (ADH): Add 'trusted' concept. #
363
367
  #######################################################################
364
368
 
365
369
  class User
@@ -388,6 +392,7 @@ module HubSsoLib
388
392
  attr_accessor :user_email
389
393
  attr_accessor :user_created_at
390
394
  attr_accessor :user_password_reset_code_expires_at
395
+ attr_accessor :user_trusted
391
396
 
392
397
  def initialize
393
398
  @user_salt = nil
@@ -405,6 +410,7 @@ module HubSsoLib
405
410
  @user_email = nil
406
411
  @user_created_at = nil
407
412
  @user_password_reset_code_expires_at = nil
413
+ @user_trusted = nil
408
414
  end
409
415
  end # User class
410
416
 
@@ -465,7 +471,7 @@ module HubSsoLib
465
471
 
466
472
  class SessionFactory
467
473
  def initialize
468
- @hub_be_quiet = ! ENV['HUB_QUIET_SERVER'].nil?
474
+ @hub_be_quiet = (ENV['HUB_QUIET_SERVER'] == 'yes')
469
475
  @hub_sessions = {}
470
476
 
471
477
  puts "Session factory: Awakening..." unless @hub_be_quiet
@@ -785,7 +791,7 @@ module HubSsoLib
785
791
  QUEUE = ::Queue.new
786
792
 
787
793
  def self.run
788
- puts "Server: Starting at #{ HUB_CONNECTION_URI }" if ENV['HUB_QUIET_SERVER'].nil?
794
+ puts "Server: Starting at #{ HUB_CONNECTION_URI }" if ENV['HUB_QUIET_SERVER'] != 'yes'
789
795
 
790
796
  @@hub_session_factory = HubSsoLib::SessionFactory.new
791
797
 
@@ -815,6 +821,79 @@ module HubSsoLib
815
821
  end # Runner class
816
822
  end # Server module
817
823
 
824
+ #######################################################################
825
+ # Class: Trust #
826
+ # #
827
+ # Purpose: Allow other applications to call into the Hub Rails #
828
+ # application to tell it about untrusted user operations. #
829
+ # The application can then store the details, e-mail #
830
+ # moderators and in due course call back to the originating #
831
+ # other application to move the user action forwards. #
832
+ # #
833
+ # The external API is HubSsoLib::Trust::Server, implemented #
834
+ # by the Hub Rails application, not this gem. #
835
+ # #
836
+ # Author: A.D.Hodgkinson #
837
+ # #
838
+ # History: 19-Mar-2025 (ADH): Created #
839
+ #######################################################################
840
+
841
+ class Trust
842
+
843
+ # Return the DRb endpoint URI for the trust server.
844
+ #
845
+ def self.get_trust_server_connection_uri
846
+ HUB_TRUST_CONNECTION_URI
847
+ end
848
+
849
+ # Start the trust server. This should only ever be called by the Hub Rails
850
+ # application, which implements HubSsoLib::Trust::Server.
851
+ #
852
+ def self.launch_server
853
+ uri = self.get_trust_server_connection_uri()
854
+ path = URI.parse(uri).path
855
+ already_running = File.exist?(path)
856
+
857
+ unless ENV['HUB_QUIET_SERVER'] == 'yes'
858
+ message = unless already_running
859
+ "Trust server: Starting at #{ uri }"
860
+ else
861
+ "Trust server: Already running at at #{ uri }"
862
+ end
863
+
864
+ puts message
865
+ end
866
+
867
+ unless already_running
868
+ loop do
869
+ DRb.start_service(uri, ::HubSsoLib::Trust::Server.new)
870
+ DRb.thread.join # Keep the thread alive...
871
+ end # ...but auto-restart if e.g. DRb.stop_service() is invoked
872
+ end
873
+ end
874
+
875
+ # Obtain a connection to the trust server. This is called by any client
876
+ # code that needs to talk to the server which must, at the time called, be
877
+ # running via startup within the Hub Rails application.
878
+ #
879
+ # The returned object is an instance of ::HubSsoLib::Trust::Server, which
880
+ # is defined inside the Hub Rails application. See there for details.
881
+ #
882
+ def self.get_trust_object
883
+ HUB_MUTEX.synchronize do
884
+ begin
885
+ DRb.current_server
886
+ rescue DRb::DRbServerNotFound
887
+ DRb.start_service()
888
+ end
889
+
890
+ @@trust_object ||= DRbObject.new_with_uri(self.get_trust_server_connection_uri())
891
+ end
892
+
893
+ return @@trust_object
894
+ end
895
+ end
896
+
818
897
  #######################################################################
819
898
  # Module: Core #
820
899
  # Various authors #
@@ -848,6 +927,8 @@ module HubSsoLib
848
927
  #
849
928
  def hubssolib_log_out
850
929
  self.hubssolib_current_user = nil # (which deals with all related session and cookie consequences)
930
+ @hubssolib_session = nil
931
+ cookies.delete(HUB_LOGIN_INDICATOR_COOKIE, domain: :all, path: '/')
851
932
  end
852
933
 
853
934
  # Returns true or false if a user is logged in or not, respectively.
@@ -991,6 +1072,33 @@ module HubSsoLib
991
1072
  return (puser && !puser.empty? && puser != pnormal)
992
1073
  end
993
1074
 
1075
+ # Convenience method that returns +true+ if there's a currently logged-in
1076
+ # Hub user that has been flagged as trusted, else - whether there is no
1077
+ # current user, or they haven't been flagged as trusted - returns +false+.
1078
+ #
1079
+ def hubssolib_trusted?
1080
+ self.hubssolib_current_user&.user_trusted == 'true'
1081
+ end
1082
+
1083
+ # Convenience accessor to HubSsoLib::Trust.get_trust_object().review_action
1084
+ # - see that method for details. Note that the Trust object is implemented
1085
+ # in the Hub application, not here; see:
1086
+ #
1087
+ # HubSsoLib::Trust::Server::review_action
1088
+ #
1089
+ # ...in "app/hub/lib/hub_sso_lib/trust/server.rb".
1090
+ #
1091
+ def hubssolib_review_action(**args)
1092
+ HubSsoLib::Trust.get_trust_object().review_action(**args)
1093
+ end
1094
+
1095
+ # The equivalent of #hubssolib_review_action, but for retrieving details of
1096
+ # an action when Hub invokes your callback via POST request.
1097
+ #
1098
+ def hubssolib_retrieve_action(**args)
1099
+ HubSsoLib::Trust.get_trust_object().retrieve_action(**args)
1100
+ end
1101
+
994
1102
  # Public read-only accessor methods for common user activities:
995
1103
  # return the current user's roles as a Roles object, or nil if
996
1104
  # there's no user.
@@ -1031,7 +1139,7 @@ module HubSsoLib
1031
1139
  # hubssolib_get_name.
1032
1140
  #
1033
1141
  def hubssolib_unique_name
1034
- user = hubssolib_current_user
1142
+ user = self.hubssolib_current_user
1035
1143
  user ? "#{user.user_real_name} (#{user.user_id})" : 'Anonymous'
1036
1144
  end
1037
1145
 
@@ -1267,7 +1375,7 @@ module HubSsoLib
1267
1375
  # quietly log out and let action processing carry on.
1268
1376
 
1269
1377
  if (hubssolib_session_expired?)
1270
- hubssolib_log_out
1378
+ hubssolib_log_out()
1271
1379
  hubssolib_set_flash(:attention, 'Your session timed out, so you are no longer logged in.')
1272
1380
  else
1273
1381
  hubssolib_set_last_used(Time.now.utc)
@@ -1297,7 +1405,6 @@ module HubSsoLib
1297
1405
  def hubssolib_afterwards
1298
1406
  begin
1299
1407
  DRb.current_server
1300
- DRb.stop_service()
1301
1408
  rescue DRb::DRbServerNotFound
1302
1409
  # Nothing to do; no service is running.
1303
1410
  end
@@ -1441,11 +1548,13 @@ module HubSsoLib
1441
1548
 
1442
1549
  :hubssolib_current_user,
1443
1550
  :hubssolib_unique_name,
1551
+ :hubssolib_account_link,
1552
+ :hubssolib_flash_data,
1553
+
1444
1554
  :hubssolib_logged_in?,
1445
1555
  :hubssolib_authorized?,
1446
1556
  :hubssolib_privileged?,
1447
- :hubssolib_account_link,
1448
- :hubssolib_flash_data
1557
+ :hubssolib_trusted?
1449
1558
  )
1450
1559
  end
1451
1560
  end
@@ -1606,8 +1715,9 @@ module HubSsoLib
1606
1715
  # halted (since the overall return value is therefore 'false').
1607
1716
  #
1608
1717
  def hubssolib_access_denied
1609
- # See hubsso_must_login for the reason behind the following call.
1610
1718
 
1719
+ # See hubsso_must_login for the reason behind the following call.
1720
+ #
1611
1721
  if hubssolib_ensure_https
1612
1722
  hubssolib_set_flash(:alert, 'You do not have permission to carry out that action on this site.')
1613
1723
  redirect_to HUB_PATH_PREFIX + '/'
metadata CHANGED
@@ -1,13 +1,13 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: hubssolib
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.6.1
4
+ version: 3.7.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Andrew Hodgkinson and others
8
8
  bindir: bin
9
9
  cert_chain: []
10
- date: 2025-03-26 00:00:00.000000000 Z
10
+ date: 2025-03-28 00:00:00.000000000 Z
11
11
  dependencies:
12
12
  - !ruby/object:Gem::Dependency
13
13
  name: drb