leash_provider 0.0.1

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,5 @@
1
+ class ApplicationController < ActionController::Base
2
+ # Prevent CSRF attacks by raising an exception.
3
+ # For APIs, you may want to use :null_session instead.
4
+ protect_from_forgery with: :exception
5
+ end
@@ -0,0 +1,6 @@
1
+ class Admin < ActiveRecord::Base
2
+ devise :database_authenticatable, :registerable,
3
+ :recoverable, :rememberable, :trackable, :validatable,
4
+ :confirmable, :lockable
5
+
6
+ end
@@ -0,0 +1,3 @@
1
+ test:
2
+ adapter: sqlite3
3
+ database: db/combustion_test.sqlite
@@ -0,0 +1,228 @@
1
+ # Use this hook to configure devise mailer, warden hooks and so forth.
2
+ # Many of these configuration options can be set straight in your model.
3
+ Devise.setup do |config|
4
+ # The secret key used by Devise. Devise uses this key to generate
5
+ # random tokens. Changing this key will render invalid all existing
6
+ # confirmation, reset password and unlock tokens in the database.
7
+ config.secret_key = "dummy"
8
+
9
+ # ==> Mailer Configuration
10
+ # Configure the e-mail address which will be shown in Devise::Mailer,
11
+ # note that it will be overwritten if you use your own mailer class
12
+ # with default "from" parameter.
13
+ config.mailer_sender = "dummy@dummy.org"
14
+
15
+ # Configure the class responsible to send e-mails.
16
+ # config.mailer = 'Devise::Mailer'
17
+
18
+ # ==> ORM configuration
19
+ # Load and configure the ORM. Supports :active_record (default) and
20
+ # :mongoid (bson_ext recommended) by default. Other ORMs may be
21
+ # available as additional gems.
22
+ require 'devise/orm/active_record'
23
+
24
+ # ==> Configuration for any authentication mechanism
25
+ # Configure which keys are used when authenticating a user. The default is
26
+ # just :email. You can configure it to use [:username, :subdomain], so for
27
+ # authenticating a user, both parameters are required. Remember that those
28
+ # parameters are used only when authenticating and not when retrieving from
29
+ # session. If you need permissions, you should implement that in a before filter.
30
+ # You can also supply a hash where the value is a boolean determining whether
31
+ # or not authentication should be aborted when the value is not present.
32
+ # config.authentication_keys = [ :email ]
33
+
34
+ # Configure parameters from the request object used for authentication. Each entry
35
+ # given should be a request method and it will automatically be passed to the
36
+ # find_for_authentication method and considered in your model lookup. For instance,
37
+ # if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
38
+ # The same considerations mentioned for authentication_keys also apply to request_keys.
39
+ # config.request_keys = []
40
+
41
+ # Configure which authentication keys should be case-insensitive.
42
+ # These keys will be downcased upon creating or modifying a user and when used
43
+ # to authenticate or find a user. Default is :email.
44
+ config.case_insensitive_keys = [ :email ]
45
+
46
+ # Configure which authentication keys should have whitespace stripped.
47
+ # These keys will have whitespace before and after removed upon creating or
48
+ # modifying a user and when used to authenticate or find a user. Default is :email.
49
+ config.strip_whitespace_keys = [ :email ]
50
+
51
+ # Tell if authentication through request.params is enabled. True by default.
52
+ # It can be set to an array that will enable params authentication only for the
53
+ # given strategies, for example, `config.params_authenticatable = [:database]` will
54
+ # enable it only for database (email + password) authentication.
55
+ # config.params_authenticatable = true
56
+
57
+ # Tell if authentication through HTTP Auth is enabled. False by default.
58
+ # It can be set to an array that will enable http authentication only for the
59
+ # given strategies, for example, `config.http_authenticatable = [:database]` will
60
+ # enable it only for database authentication. The supported strategies are:
61
+ # :database = Support basic authentication with authentication key + password
62
+ # config.http_authenticatable = false
63
+
64
+ # If http headers should be returned for AJAX requests. True by default.
65
+ # config.http_authenticatable_on_xhr = true
66
+
67
+ # The realm used in Http Basic Authentication. 'Application' by default.
68
+ # config.http_authentication_realm = 'Application'
69
+
70
+ # It will change confirmation, password recovery and other workflows
71
+ # to behave the same regardless if the e-mail provided was right or wrong.
72
+ # Does not affect registerable.
73
+ config.paranoid = true
74
+
75
+ # By default Devise will store the user in session. You can skip storage for
76
+ # particular strategies by setting this option.
77
+ # Notice that if you are skipping storage for all authentication paths, you
78
+ # may want to disable generating routes to Devise's sessions controller by
79
+ # passing :skip => :sessions to `devise_for` in your config/routes.rb
80
+ config.skip_session_storage = [:http_auth]
81
+
82
+ # By default, Devise cleans up the CSRF token on authentication to
83
+ # avoid CSRF token fixation attacks. This means that, when using AJAX
84
+ # requests for sign in and sign up, you need to get a new CSRF token
85
+ # from the server. You can disable this option at your own risk.
86
+ # config.clean_up_csrf_token_on_authentication = true
87
+
88
+ # ==> Configuration for :database_authenticatable
89
+ # For bcrypt, this is the cost for hashing the password and defaults to 10. If
90
+ # using other encryptors, it sets how many times you want the password re-encrypted.
91
+ #
92
+ # Limiting the stretches to just one in testing will increase the performance of
93
+ # your test suite dramatically. However, it is STRONGLY RECOMMENDED to not use
94
+ # a value less than 10 in other environments.
95
+ config.stretches = Rails.env.test? ? 1 : 10
96
+
97
+ # Setup a pepper to generate the encrypted password.
98
+ # config.pepper = 'fc188c0c44df8a6f0911e4d872688965d5c0e7812d6490848d699057b98ce96049b10caf44942b33047efa6adb866754377a9f00edbb45c94045a06104aa40b5'
99
+
100
+ # ==> Configuration for :confirmable
101
+ # A period that the user is allowed to access the website even without
102
+ # confirming his account. For instance, if set to 2.days, the user will be
103
+ # able to access the website for two days without confirming his account,
104
+ # access will be blocked just in the third day. Default is 0.days, meaning
105
+ # the user cannot access the website without confirming his account.
106
+ # config.allow_unconfirmed_access_for = 2.days
107
+
108
+ # A period that the user is allowed to confirm their account before their
109
+ # token becomes invalid. For example, if set to 3.days, the user can confirm
110
+ # their account within 3 days after the mail was sent, but on the fourth day
111
+ # their account can't be confirmed with the token any more.
112
+ # Default is nil, meaning there is no restriction on how long a user can take
113
+ # before confirming their account.
114
+ # config.confirm_within = 3.days
115
+
116
+ # If true, requires any email changes to be confirmed (exactly the same way as
117
+ # initial account confirmation) to be applied. Requires additional unconfirmed_email
118
+ # db field (see migrations). Until confirmed new email is stored in
119
+ # unconfirmed email column, and copied to email column on successful confirmation.
120
+ # config.reconfirmable = true
121
+
122
+ # Defines which key will be used when confirming an account
123
+ # config.confirmation_keys = [ :email ]
124
+
125
+ # ==> Configuration for :rememberable
126
+ # The time the user will be remembered without asking for credentials again.
127
+ # config.remember_for = 2.weeks
128
+
129
+ # If true, extends the user's remember period when remembered via cookie.
130
+ # config.extend_remember_period = false
131
+
132
+ # Options to be passed to the created cookie. For instance, you can set
133
+ # :secure => true in order to force SSL only cookies.
134
+ # config.rememberable_options = {}
135
+
136
+ # ==> Configuration for :validatable
137
+ # Range for password length. Default is 8..128.
138
+ config.password_length = 8..128
139
+
140
+ # Email regex used to validate email formats. It simply asserts that
141
+ # one (and only one) @ exists in the given string. This is mainly
142
+ # to give user feedback and not to assert the e-mail validity.
143
+ # config.email_regexp = /\A[^@]+@[^@]+\z/
144
+
145
+ # ==> Configuration for :timeoutable
146
+ # The time you want to timeout the user session without activity. After this
147
+ # time the user will be asked for credentials again. Default is 30 minutes.
148
+ # config.timeout_in = 30.minutes
149
+
150
+ # If true, expires auth token on session timeout.
151
+ # config.expire_auth_token_on_timeout = false
152
+
153
+ # ==> Configuration for :lockable
154
+ # Defines which strategy will be used to lock an account.
155
+ # :failed_attempts = Locks an account after a number of failed attempts to sign in.
156
+ # :none = No lock strategy. You should handle locking by yourself.
157
+ config.lock_strategy = :failed_attempts
158
+
159
+ # Defines which key will be used when locking and unlocking an account
160
+ config.unlock_keys = [ :email ]
161
+
162
+ # Defines which strategy will be used to unlock an account.
163
+ # :email = Sends an unlock link to the user email
164
+ # :time = Re-enables login after a certain amount of time (see :unlock_in below)
165
+ # :both = Enables both strategies
166
+ # :none = No unlock strategy. You should handle unlocking by yourself.
167
+ config.unlock_strategy = :time
168
+
169
+ # Number of authentication tries before locking an account if lock_strategy
170
+ # is failed attempts.
171
+ config.maximum_attempts = 20
172
+
173
+ # Time interval to unlock the account if :time is enabled as unlock_strategy.
174
+ config.unlock_in = 1.hour
175
+
176
+ # Warn on the last attempt before the account is locked.
177
+ # config.last_attempt_warning = false
178
+
179
+ # ==> Configuration for :recoverable
180
+ #
181
+ # Defines which key will be used when recovering the password for an account
182
+ # config.reset_password_keys = [ :email ]
183
+
184
+ # Time interval you can reset your password with a reset password key.
185
+ # Don't put a too small interval or your users won't have the time to
186
+ # change their passwords.
187
+ config.reset_password_within = 6.hours
188
+
189
+ # ==> Configuration for :encryptable
190
+ # Allow you to use another encryption algorithm besides bcrypt (default). You can use
191
+ # :sha1, :sha512 or encryptors from others authentication tools as :clearance_sha1,
192
+ # :authlogic_sha512 (then you should set stretches above to 20 for default behavior)
193
+ # and :restful_authentication_sha1 (then you should set stretches to 10, and copy
194
+ # REST_AUTH_SITE_KEY to pepper).
195
+ #
196
+ # Require the `devise-encryptable` gem when using anything other than bcrypt
197
+ # config.encryptor = :sha512
198
+
199
+ # ==> Scopes configuration
200
+ # Turn scoped views on. Before rendering "sessions/new", it will first check for
201
+ # "users/sessions/new". It's turned off by default because it's slower if you
202
+ # are using only default views.
203
+ config.scoped_views = true
204
+
205
+ # Configure the default scope given to Warden. By default it's the first
206
+ # devise role declared in your routes (usually :user).
207
+ # config.default_scope = :user
208
+
209
+ # Set this configuration to false if you want /users/sign_out to sign out
210
+ # only the current scope. By default, Devise signs out all scopes.
211
+ config.sign_out_all_scopes = false
212
+
213
+ # ==> Navigation configuration
214
+ # Lists the formats that should be treated as navigational. Formats like
215
+ # :html, should redirect to the sign in page when the user does not have
216
+ # access, but formats like :xml or :json, should return 401.
217
+ #
218
+ # If you have any extra navigational formats, like :iphone or :mobile, you
219
+ # should add them to the navigational formats lists.
220
+ #
221
+ # The "*/*" below is required to match Internet Explorer requests.
222
+ # config.navigational_formats = ['*/*', :html]
223
+
224
+ # The default HTTP method used to sign out a resource. Default is :delete.
225
+ config.sign_out_via = :delete
226
+
227
+
228
+ end
@@ -0,0 +1,5 @@
1
+ Rails.application.routes.draw do
2
+ leash_provider
3
+
4
+ devise_for :admins
5
+ end
@@ -0,0 +1,28 @@
1
+ ActiveRecord::Schema.define do
2
+ create_table "admins", force: :cascade do |t|
3
+ t.string "email", default: "", null: false
4
+ t.string "encrypted_password", default: "", null: false
5
+ t.string "reset_password_token"
6
+ t.datetime "reset_password_sent_at"
7
+ t.datetime "remember_created_at"
8
+ t.integer "sign_in_count", default: 0, null: false
9
+ t.datetime "current_sign_in_at"
10
+ t.datetime "last_sign_in_at"
11
+ t.string "current_sign_in_ip"
12
+ t.string "last_sign_in_ip"
13
+ t.string "confirmation_token"
14
+ t.datetime "confirmed_at"
15
+ t.datetime "confirmation_sent_at"
16
+ t.string "unconfirmed_email"
17
+ t.integer "failed_attempts", default: 0, null: false
18
+ t.string "unlock_token"
19
+ t.datetime "locked_at"
20
+ t.datetime "created_at"
21
+ t.datetime "updated_at"
22
+ end
23
+
24
+ add_index "admins", ["confirmation_token"], name: "index_admins_on_confirmation_token", unique: true, using: :btree
25
+ add_index "admins", ["email"], name: "index_admins_on_email", unique: true, using: :btree
26
+ add_index "admins", ["reset_password_token"], name: "index_admins_on_reset_password_token", unique: true, using: :btree
27
+ add_index "admins", ["unlock_token"], name: "index_editors_on_unlock_token", unique: true, using: :btree
28
+ end
File without changes
@@ -0,0 +1,30 @@
1
+ require 'rubygems'
2
+ require 'bundler/setup'
3
+
4
+ require 'combustion'
5
+ require 'factory_girl_rails'
6
+
7
+ Combustion.initialize! :action_controller, :active_record
8
+
9
+ FactoryGirl.define do
10
+ factory :admin do
11
+ sequence :email do |n|
12
+ "admin#{n}@example.com"
13
+ end
14
+
15
+ confirmed_at { Time.now }
16
+ password "qwerty123"
17
+ end
18
+ end
19
+
20
+ require 'rspec/rails'
21
+
22
+ RSpec.configure do |config|
23
+ config.include Devise::TestHelpers, :type => :controller
24
+ config.include FactoryGirl::Syntax::Methods
25
+ config.use_transactional_fixtures = true
26
+
27
+ config.before(:suite) do
28
+ Ohm.redis.call "FLUSHALL"
29
+ end
30
+ end
metadata ADDED
@@ -0,0 +1,203 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: leash_provider
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.0.1
5
+ platform: ruby
6
+ authors:
7
+ - Marcin Lewandowski
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2015-05-14 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: rails
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '4.2'
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '4.2'
27
+ - !ruby/object:Gem::Dependency
28
+ name: ohm
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - ">="
32
+ - !ruby/object:Gem::Version
33
+ version: '0'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - ">="
39
+ - !ruby/object:Gem::Version
40
+ version: '0'
41
+ - !ruby/object:Gem::Dependency
42
+ name: devise
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - ">="
46
+ - !ruby/object:Gem::Version
47
+ version: '0'
48
+ type: :runtime
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - ">="
53
+ - !ruby/object:Gem::Version
54
+ version: '0'
55
+ - !ruby/object:Gem::Dependency
56
+ name: rspec-rails
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - ">="
60
+ - !ruby/object:Gem::Version
61
+ version: '0'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - ">="
67
+ - !ruby/object:Gem::Version
68
+ version: '0'
69
+ - !ruby/object:Gem::Dependency
70
+ name: rake
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ">="
74
+ - !ruby/object:Gem::Version
75
+ version: '0'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - ">="
81
+ - !ruby/object:Gem::Version
82
+ version: '0'
83
+ - !ruby/object:Gem::Dependency
84
+ name: factory_girl_rails
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - "~>"
88
+ - !ruby/object:Gem::Version
89
+ version: '4.0'
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - "~>"
95
+ - !ruby/object:Gem::Version
96
+ version: '4.0'
97
+ - !ruby/object:Gem::Dependency
98
+ name: bundler
99
+ requirement: !ruby/object:Gem::Requirement
100
+ requirements:
101
+ - - ">="
102
+ - !ruby/object:Gem::Version
103
+ version: '0'
104
+ type: :development
105
+ prerelease: false
106
+ version_requirements: !ruby/object:Gem::Requirement
107
+ requirements:
108
+ - - ">="
109
+ - !ruby/object:Gem::Version
110
+ version: '0'
111
+ - !ruby/object:Gem::Dependency
112
+ name: sqlite3
113
+ requirement: !ruby/object:Gem::Requirement
114
+ requirements:
115
+ - - ">="
116
+ - !ruby/object:Gem::Version
117
+ version: '0'
118
+ type: :development
119
+ prerelease: false
120
+ version_requirements: !ruby/object:Gem::Requirement
121
+ requirements:
122
+ - - ">="
123
+ - !ruby/object:Gem::Version
124
+ version: '0'
125
+ - !ruby/object:Gem::Dependency
126
+ name: combustion
127
+ requirement: !ruby/object:Gem::Requirement
128
+ requirements:
129
+ - - "~>"
130
+ - !ruby/object:Gem::Version
131
+ version: 0.5.3
132
+ type: :development
133
+ prerelease: false
134
+ version_requirements: !ruby/object:Gem::Requirement
135
+ requirements:
136
+ - - "~>"
137
+ - !ruby/object:Gem::Version
138
+ version: 0.5.3
139
+ description: Leash allows you to build an OAuth2 provider for closed set of trusted
140
+ apps. I can support multiple user types and is designed with high load in mind.
141
+ email:
142
+ - marcin@saepia.net
143
+ executables: []
144
+ extensions: []
145
+ extra_rdoc_files: []
146
+ files:
147
+ - ".gitignore"
148
+ - ".rspec"
149
+ - ".travis.yml"
150
+ - Gemfile
151
+ - Gemfile.lock
152
+ - README.md
153
+ - Rakefile
154
+ - app/controllers/leash/provider/authorize_controller.rb
155
+ - app/controllers/leash/provider/token_controller.rb
156
+ - app/controllers/leash/provider_controller.rb
157
+ - app/controllers/leash_controller.rb
158
+ - app/models/leash/provider/access_token.rb
159
+ - app/models/leash/provider/auth_code.rb
160
+ - config.ru
161
+ - leash_provider.gemspec
162
+ - lib/generators/leash/install_generator.rb
163
+ - lib/generators/leash/provider/install_generator.rb
164
+ - lib/generators/templates/leash_provider.rb
165
+ - lib/leash/provider/engine.rb
166
+ - lib/leash/provider/routing.rb
167
+ - lib/leash/provider/version.rb
168
+ - lib/leash_provider.rb
169
+ - spec/controllers/leash/provider/authorize_controller_spec.rb
170
+ - spec/internal/app/controllers/application_controller.rb
171
+ - spec/internal/app/models/admin.rb
172
+ - spec/internal/config/database.yml
173
+ - spec/internal/config/initializers/devise.rb
174
+ - spec/internal/config/routes.rb
175
+ - spec/internal/db/schema.rb
176
+ - spec/internal/log/.gitignore
177
+ - spec/internal/public/favicon.ico
178
+ - spec/spec_helper.rb
179
+ homepage: http://github.com/mspanc/leash-provider
180
+ licenses: []
181
+ metadata: {}
182
+ post_install_message:
183
+ rdoc_options: []
184
+ require_paths:
185
+ - lib
186
+ required_ruby_version: !ruby/object:Gem::Requirement
187
+ requirements:
188
+ - - ">="
189
+ - !ruby/object:Gem::Version
190
+ version: 1.9.3
191
+ required_rubygems_version: !ruby/object:Gem::Requirement
192
+ requirements:
193
+ - - ">="
194
+ - !ruby/object:Gem::Version
195
+ version: '0'
196
+ requirements: []
197
+ rubyforge_project:
198
+ rubygems_version: 2.4.6
199
+ signing_key:
200
+ specification_version: 4
201
+ summary: High-performance OAuth2 provider for a closed set of trusted apps with multiple
202
+ roles support
203
+ test_files: []