mortal-token 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/LICENSE +13 -0
- data/README.rdoc +88 -0
- data/lib/mortal-token/defaults.rb +10 -0
- data/lib/mortal-token/mortal-token.rb +76 -0
- data/lib/mortal-token/version.rb +4 -0
- data/lib/mortal-token.rb +5 -0
- metadata +69 -0
data/LICENSE
ADDED
@@ -0,0 +1,13 @@
|
|
1
|
+
Copyright 2012 Jordan Hollinger
|
2
|
+
|
3
|
+
Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
you may not use this file except in compliance with the License.
|
5
|
+
You may obtain a copy of the License at
|
6
|
+
|
7
|
+
http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
|
9
|
+
Unless required by applicable law or agreed to in writing, software
|
10
|
+
distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
See the License for the specific language governing permissions and
|
13
|
+
limitations under the License.
|
data/README.rdoc
ADDED
@@ -0,0 +1,88 @@
|
|
1
|
+
== MortalToken, because some tokens shouldn't live forever
|
2
|
+
|
3
|
+
MortalToken is a library for creating tokens that self-destruct after a specified time. No need to store and look up the
|
4
|
+
token; it is self-verifying and self-expiring.
|
5
|
+
|
6
|
+
I found myself wanting simple, secure (never a good mix), and not necessarily encrypted auth tokens for some Sinatra apps.
|
7
|
+
I wanted them to expire, but didn't want to keep track of them. Not finding anything, this library emerged. The default lifespan
|
8
|
+
is two of your Earth days. This does *not* mean "48 hours from when it was created". It means that the key will be valid throughout
|
9
|
+
"today" and "tomorrow". If the lifespan were one day, a key created at 23:59 would expire at 00:00.
|
10
|
+
|
11
|
+
Steps:
|
12
|
+
|
13
|
+
1. Generate a new token
|
14
|
+
2. Give the client the resulting hash and salt
|
15
|
+
3. *crickets*
|
16
|
+
4. Receive a hash and salt from client
|
17
|
+
5. Reconstitute the token from the salt, and test if the hashes match
|
18
|
+
|
19
|
+
Read the full documentation at {jordanhollinger.com/docs/mortal-token/}[http://jordanhollinger.com/docs/mortal-token/].
|
20
|
+
|
21
|
+
== Disclaimer
|
22
|
+
|
23
|
+
This is not intended to be the most secure thing ever, but for all I know it's less secure than I think. Suggestions and
|
24
|
+
pull requests are welcomed.
|
25
|
+
|
26
|
+
Also, it is very early and the API may go through significant changes.
|
27
|
+
|
28
|
+
== Use
|
29
|
+
|
30
|
+
Though my example is a Sinatra app, it need not be. In fact, it needn't have anything to do with the Web. It's useful
|
31
|
+
anytime you want a self-contained, self-expiring token (w/ salt).
|
32
|
+
|
33
|
+
require 'mortal-token'
|
34
|
+
|
35
|
+
# You MUST set a secret key! Otherwise, anyone who looks at the source code will be able to forge tokens.
|
36
|
+
MortalToken.secret = 'asdf092$78roasdjfjfaklmsdadASDFopijf98%2ejA#Df@sdf'
|
37
|
+
|
38
|
+
post '/login' do
|
39
|
+
if login_ok?
|
40
|
+
# Create a brand new token. Store the resulting hash and salt.
|
41
|
+
token = MortalToken.new
|
42
|
+
session[:token] = token.hash
|
43
|
+
session[:salt] = token.salt
|
44
|
+
|
45
|
+
redirect '/secret'
|
46
|
+
end
|
47
|
+
end
|
48
|
+
|
49
|
+
get '/secret' do
|
50
|
+
# Attempt to reconstitute the original token, using the salt
|
51
|
+
token = MortalToken.new(session[:salt])
|
52
|
+
|
53
|
+
# Test if the token still is (or ever was) valid
|
54
|
+
if token == session[:token]
|
55
|
+
'Welcome!'
|
56
|
+
else
|
57
|
+
'Go away!'
|
58
|
+
end
|
59
|
+
end
|
60
|
+
|
61
|
+
== Checking tokens
|
62
|
+
|
63
|
+
These are all valid means of checking a token's validity. In this case, they will all return true. == and === are treated the same.
|
64
|
+
|
65
|
+
token_a = MortalToken.new
|
66
|
+
token_b = MortalToken.new(token_a.salt)
|
67
|
+
|
68
|
+
token_a == token_b
|
69
|
+
token_a == token_b.to_s
|
70
|
+
token_a == token_b.hash
|
71
|
+
token_a.to_s == token_b.to_s
|
72
|
+
token_a.hash == token_b.hash
|
73
|
+
token_a.to_s == token_b.hash
|
74
|
+
|
75
|
+
== Tweak token parameters
|
76
|
+
|
77
|
+
You may tweak certain parameters of the library in order to make it more secure, less, faster, etc.
|
78
|
+
These are the defaults (see the MortalToken class for documentation about each parameter):
|
79
|
+
|
80
|
+
MortalCoil.rounds = 5
|
81
|
+
MortalCoil.valid_across = 2
|
82
|
+
MortalCoil.max_salt_length = 50
|
83
|
+
MortalCoil.min_salt_length = 10
|
84
|
+
|
85
|
+
== License
|
86
|
+
Copyright 2012 Jordan Hollinger
|
87
|
+
|
88
|
+
Licensed under the Apache License
|
@@ -0,0 +1,10 @@
|
|
1
|
+
class MortalToken
|
2
|
+
# Set defaults
|
3
|
+
self.rounds = 5
|
4
|
+
self.valid_across = 2
|
5
|
+
self.max_salt_length = 50
|
6
|
+
self.min_salt_length = 10
|
7
|
+
# Set a temporary secret key. You should set your own consistent key.
|
8
|
+
# Otherwise, existing tokens will be invalidated each time the library is loaded.
|
9
|
+
self.secret = self.salt
|
10
|
+
end
|
@@ -0,0 +1,76 @@
|
|
1
|
+
# A token hash that "self-destructs" after a certain time.
|
2
|
+
class MortalToken
|
3
|
+
# Seeds for generating random strings
|
4
|
+
RAND_SEEDS = [(0..9), ('a'..'z'), ('A'..'Z')].map(&:to_a).flatten
|
5
|
+
|
6
|
+
class << self
|
7
|
+
# The master secret token (Keep it secret! Keep it safe!). Changing this will invalidate all existing tokens.
|
8
|
+
attr_accessor :secret
|
9
|
+
# The number of encryption rounds. Defaults to 5. Changing this will invalidate existing tokens.
|
10
|
+
attr_accessor :rounds
|
11
|
+
# The number of days tokens will be valid across. Defaults to 2, which prevents a
|
12
|
+
# token generated at 23:59 from expiring at 00:00. Changing this will invalidate existing tokens.
|
13
|
+
attr_accessor :valid_across
|
14
|
+
# The maximum salt length, defaults to 50
|
15
|
+
attr_accessor :max_salt_length
|
16
|
+
# The minimum salt length, defaults to 10
|
17
|
+
attr_accessor :min_salt_length
|
18
|
+
|
19
|
+
# Returns a random string of between min_salt_length and max_salt_length alphanumeric charachters
|
20
|
+
def salt
|
21
|
+
max_length = rand(self.max_salt_length + 1)
|
22
|
+
max_length = self.min_salt_length if max_length < self.min_salt_length
|
23
|
+
pool_size = RAND_SEEDS.size
|
24
|
+
(0..max_length).map { RAND_SEEDS[rand(pool_size)] }.join('')
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
# The token's salt
|
29
|
+
attr_reader :salt
|
30
|
+
|
31
|
+
# To create a brand new token, do *not* pass any arguments.
|
32
|
+
#
|
33
|
+
# If you want to validate a hash from an existing token, pass
|
34
|
+
# the existing token's salt. You should usually leave "start_date" alone.
|
35
|
+
def initialize(salt=nil, start_date=nil)
|
36
|
+
@salt = salt || MortalToken.salt
|
37
|
+
@start_date = start_date || Date.today
|
38
|
+
end
|
39
|
+
|
40
|
+
# Returns the hash value of the token
|
41
|
+
def hash
|
42
|
+
val = [MortalToken.secret, salt, @start_date, end_date].join('_')
|
43
|
+
MortalToken.rounds.times { val = Digest::SHA512.hexdigest(val) }
|
44
|
+
val
|
45
|
+
end
|
46
|
+
|
47
|
+
# Alias to MortalToken::Token.hash
|
48
|
+
def to_s
|
49
|
+
hash
|
50
|
+
end
|
51
|
+
|
52
|
+
# Tests this token against another token or token hash
|
53
|
+
def ==(other_token_or_hash)
|
54
|
+
other_hash = other_token_or_hash.to_s
|
55
|
+
(earliest_date).upto(@start_date) do |date|
|
56
|
+
guess = MortalToken.new(salt, date)
|
57
|
+
return true if guess.to_s == other_hash
|
58
|
+
end
|
59
|
+
return false
|
60
|
+
end
|
61
|
+
|
62
|
+
alias_method :===, :==
|
63
|
+
|
64
|
+
private
|
65
|
+
|
66
|
+
# Returns the end date of this token
|
67
|
+
def end_date
|
68
|
+
@start_date + (MortalToken.valid_across - 1)
|
69
|
+
end
|
70
|
+
|
71
|
+
# Returns the earliest possible date this token could have been valid.
|
72
|
+
# Only useful when checking for validity.
|
73
|
+
def earliest_date
|
74
|
+
@start_date - (MortalToken.valid_across - 1)
|
75
|
+
end
|
76
|
+
end
|
data/lib/mortal-token.rb
ADDED
metadata
ADDED
@@ -0,0 +1,69 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: mortal-token
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
prerelease: false
|
5
|
+
segments:
|
6
|
+
- 0
|
7
|
+
- 0
|
8
|
+
- 1
|
9
|
+
version: 0.0.1
|
10
|
+
platform: ruby
|
11
|
+
authors:
|
12
|
+
- Jordan Hollinger
|
13
|
+
autorequire:
|
14
|
+
bindir: bin
|
15
|
+
cert_chain: []
|
16
|
+
|
17
|
+
date: 2012-08-02 00:00:00 -04:00
|
18
|
+
default_executable:
|
19
|
+
dependencies: []
|
20
|
+
|
21
|
+
description: A simple library for generating self-contained, self-destructing tokens
|
22
|
+
email: jordan@jordanhollinger.com
|
23
|
+
executables: []
|
24
|
+
|
25
|
+
extensions: []
|
26
|
+
|
27
|
+
extra_rdoc_files: []
|
28
|
+
|
29
|
+
files:
|
30
|
+
- lib/mortal-token.rb
|
31
|
+
- lib/mortal-token/defaults.rb
|
32
|
+
- lib/mortal-token/mortal-token.rb
|
33
|
+
- lib/mortal-token/version.rb
|
34
|
+
- README.rdoc
|
35
|
+
- LICENSE
|
36
|
+
has_rdoc: true
|
37
|
+
homepage: http://github.com/jhollinger/mortal-token
|
38
|
+
licenses: []
|
39
|
+
|
40
|
+
post_install_message:
|
41
|
+
rdoc_options: []
|
42
|
+
|
43
|
+
require_paths:
|
44
|
+
- lib
|
45
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
46
|
+
none: false
|
47
|
+
requirements:
|
48
|
+
- - ">="
|
49
|
+
- !ruby/object:Gem::Version
|
50
|
+
segments:
|
51
|
+
- 0
|
52
|
+
version: "0"
|
53
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
54
|
+
none: false
|
55
|
+
requirements:
|
56
|
+
- - ">="
|
57
|
+
- !ruby/object:Gem::Version
|
58
|
+
segments:
|
59
|
+
- 0
|
60
|
+
version: "0"
|
61
|
+
requirements: []
|
62
|
+
|
63
|
+
rubyforge_project:
|
64
|
+
rubygems_version: 1.3.7
|
65
|
+
signing_key:
|
66
|
+
specification_version: 3
|
67
|
+
summary: Generate self-destructing tokens
|
68
|
+
test_files: []
|
69
|
+
|