rodauth-pwned 0.1.0 → 0.2.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +22 -3
- data/lib/rodauth/features/pwned_password.rb +5 -0
- data/locales/en.yml +3 -0
- data/rodauth-pwned.gemspec +3 -2
- metadata +21 -6
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 29bda231ae44f13d0ed38c54f886c16b6237c396a2f61392f908ac039b327f77
|
4
|
+
data.tar.gz: b670e501eeb3bbe4f9c63a50af1cf1c6b4f47d5064abe4e1f69804dc75dc01ba
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 32d4e58eaebf0596105888df7427d48e97708d03d726c9cf688a983f9c7f886a23f78f7d0feea4f463a8b92e6b537d8ebe892e9e169ed71092582cc6c1d86d5f
|
7
|
+
data.tar.gz: 5fd32bc439e69ae59440c3766a9122b3445318156bbc7f955db3e6f125228e70cac04cd89c62419523fe324a8e61666b49ac483dec4408b67d82feb3dfb8bb9a
|
data/README.md
CHANGED
@@ -1,6 +1,7 @@
|
|
1
1
|
# rodauth-pwned
|
2
2
|
|
3
|
-
[Rodauth] feature that checks user passwords against the [Pwned Passwords API]
|
3
|
+
[Rodauth] feature that checks user passwords against the [Pwned Passwords API]
|
4
|
+
(using the [Pwned] rubygem).
|
4
5
|
|
5
6
|
## Installation
|
6
7
|
|
@@ -88,6 +89,23 @@ plugin :rodauth do
|
|
88
89
|
end
|
89
90
|
```
|
90
91
|
|
92
|
+
### Warning users with pwned passwords
|
93
|
+
|
94
|
+
If a user's password becomes pwned, you may want to warn them on login:
|
95
|
+
|
96
|
+
```rb
|
97
|
+
plugin :rodauth do
|
98
|
+
# ...
|
99
|
+
after_login do
|
100
|
+
db.after_commit do # better to make HTTP requests outside of transactions
|
101
|
+
if param_or_nil(password_param) && password_pwned?(param(password_param))
|
102
|
+
set_redirect_error_flash "Your password has previously appeared in a data breach and should never be used. We strongly recommend you change your password."
|
103
|
+
end
|
104
|
+
end
|
105
|
+
end
|
106
|
+
end
|
107
|
+
```
|
108
|
+
|
91
109
|
## Development
|
92
110
|
|
93
111
|
Run tests with Rake:
|
@@ -96,9 +114,9 @@ Run tests with Rake:
|
|
96
114
|
$ bundle exec rake test
|
97
115
|
```
|
98
116
|
|
99
|
-
##
|
117
|
+
## Credits
|
100
118
|
|
101
|
-
|
119
|
+
This gem has been inspired by [devise-pwned_password].
|
102
120
|
|
103
121
|
## License
|
104
122
|
|
@@ -111,3 +129,4 @@ Everyone interacting in the Rodauth::Pwned project's codebases, issue trackers,
|
|
111
129
|
[Rodauth]: https://github.com/jeremyevans/rodauth
|
112
130
|
[Pwned Passwords API]: https://haveibeenpwned.com/Passwords
|
113
131
|
[Pwned]: https://github.com/philnash/pwned
|
132
|
+
[devise-pwned_password]: https://github.com/michaelbanfield/devise-pwned_password
|
@@ -31,6 +31,11 @@ module Rodauth
|
|
31
31
|
Pwned.pwned_count(password, pwned_request_options)
|
32
32
|
end
|
33
33
|
|
34
|
+
def post_configure
|
35
|
+
super
|
36
|
+
i18n_register File.expand_path("#{__dir__}/../../../locales") if features.include?(:i18n)
|
37
|
+
end
|
38
|
+
|
34
39
|
private
|
35
40
|
|
36
41
|
def password_not_pwned?(password)
|
data/locales/en.yml
ADDED
data/rodauth-pwned.gemspec
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
Gem::Specification.new do |spec|
|
2
2
|
spec.name = "rodauth-pwned"
|
3
|
-
spec.version = "0.1
|
3
|
+
spec.version = "0.2.1"
|
4
4
|
spec.authors = ["Janko Marohnić"]
|
5
5
|
spec.email = ["janko.marohnic@gmail.com"]
|
6
6
|
|
@@ -14,7 +14,7 @@ Gem::Specification.new do |spec|
|
|
14
14
|
spec.metadata["homepage_uri"] = spec.homepage
|
15
15
|
spec.metadata["source_code_uri"] = spec.homepage
|
16
16
|
|
17
|
-
spec.files = Dir["README.md", "LICENSE.txt", "*.gemspec", "lib/**/*"]
|
17
|
+
spec.files = Dir["README.md", "LICENSE.txt", "*.gemspec", "lib/**/*", "locales/**/*"]
|
18
18
|
spec.require_paths = ["lib"]
|
19
19
|
|
20
20
|
spec.add_dependency "rodauth", "~> 2.0"
|
@@ -25,4 +25,5 @@ Gem::Specification.new do |spec|
|
|
25
25
|
spec.add_development_dependency "tilt"
|
26
26
|
spec.add_development_dependency "bcrypt"
|
27
27
|
spec.add_development_dependency "capybara"
|
28
|
+
spec.add_development_dependency "rodauth-i18n"
|
28
29
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: rodauth-pwned
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.1
|
4
|
+
version: 0.2.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Janko Marohnić
|
8
|
-
autorequire:
|
8
|
+
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2023-03-16 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rodauth
|
@@ -108,6 +108,20 @@ dependencies:
|
|
108
108
|
- - ">="
|
109
109
|
- !ruby/object:Gem::Version
|
110
110
|
version: '0'
|
111
|
+
- !ruby/object:Gem::Dependency
|
112
|
+
name: rodauth-i18n
|
113
|
+
requirement: !ruby/object:Gem::Requirement
|
114
|
+
requirements:
|
115
|
+
- - ">="
|
116
|
+
- !ruby/object:Gem::Version
|
117
|
+
version: '0'
|
118
|
+
type: :development
|
119
|
+
prerelease: false
|
120
|
+
version_requirements: !ruby/object:Gem::Requirement
|
121
|
+
requirements:
|
122
|
+
- - ">="
|
123
|
+
- !ruby/object:Gem::Version
|
124
|
+
version: '0'
|
111
125
|
description: Rodauth extension for checking whether a password had been exposed in
|
112
126
|
a database breach according to https://haveibeenpwned.com.
|
113
127
|
email:
|
@@ -119,6 +133,7 @@ files:
|
|
119
133
|
- LICENSE.txt
|
120
134
|
- README.md
|
121
135
|
- lib/rodauth/features/pwned_password.rb
|
136
|
+
- locales/en.yml
|
122
137
|
- rodauth-pwned.gemspec
|
123
138
|
homepage: https://github.com/janko/rodauth-pwned
|
124
139
|
licenses:
|
@@ -126,7 +141,7 @@ licenses:
|
|
126
141
|
metadata:
|
127
142
|
homepage_uri: https://github.com/janko/rodauth-pwned
|
128
143
|
source_code_uri: https://github.com/janko/rodauth-pwned
|
129
|
-
post_install_message:
|
144
|
+
post_install_message:
|
130
145
|
rdoc_options: []
|
131
146
|
require_paths:
|
132
147
|
- lib
|
@@ -141,8 +156,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
141
156
|
- !ruby/object:Gem::Version
|
142
157
|
version: '0'
|
143
158
|
requirements: []
|
144
|
-
rubygems_version: 3.
|
145
|
-
signing_key:
|
159
|
+
rubygems_version: 3.4.7
|
160
|
+
signing_key:
|
146
161
|
specification_version: 4
|
147
162
|
summary: Rodauth extension for checking whether a password had been exposed in a database
|
148
163
|
breach according to https://haveibeenpwned.com.
|