rodauth-rails 0.14.0 → 0.17.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +42 -0
- data/README.md +248 -77
- data/lib/generators/rodauth/install_generator.rb +10 -2
- data/lib/generators/rodauth/migration/base.erb +8 -2
- data/lib/generators/rodauth/templates/app/lib/rodauth_app.rb +3 -8
- data/lib/generators/rodauth/templates/app/models/account.rb +1 -0
- data/lib/generators/rodauth/templates/app/views/rodauth/_recovery_codes_form.html.erb +1 -1
- data/lib/generators/rodauth/views_generator.rb +6 -2
- data/lib/rodauth/rails/auth.rb +2 -2
- data/lib/rodauth/rails/controller_methods.rb +42 -1
- data/lib/rodauth/rails/feature/base.rb +9 -0
- data/lib/rodauth/rails/feature/callbacks.rb +6 -2
- data/lib/rodauth/rails/feature/csrf.rb +15 -4
- data/lib/rodauth/rails/feature/internal_request.rb +46 -0
- data/lib/rodauth/rails/feature.rb +2 -0
- data/lib/rodauth/rails/model/associations.rb +195 -0
- data/lib/rodauth/rails/model.rb +101 -0
- data/lib/rodauth/rails/tasks.rake +5 -5
- data/lib/rodauth/rails/version.rb +1 -1
- data/lib/rodauth/rails.rb +32 -31
- data/rodauth-rails.gemspec +4 -1
- metadata +49 -4
@@ -4,6 +4,7 @@ module Rodauth
|
|
4
4
|
module Base
|
5
5
|
def self.included(feature)
|
6
6
|
feature.auth_methods :rails_controller
|
7
|
+
feature.auth_value_methods :rails_account_model
|
7
8
|
feature.auth_cached_method :rails_controller_instance
|
8
9
|
end
|
9
10
|
|
@@ -30,6 +31,14 @@ module Rodauth
|
|
30
31
|
end
|
31
32
|
end
|
32
33
|
|
34
|
+
def rails_account_model
|
35
|
+
table = accounts_table
|
36
|
+
table = table.column if table.is_a?(Sequel::SQL::QualifiedIdentifier) # schema is specified
|
37
|
+
table.to_s.classify.constantize
|
38
|
+
rescue NameError
|
39
|
+
raise Error, "cannot infer account model, please set `rails_account_model` in your rodauth configuration"
|
40
|
+
end
|
41
|
+
|
33
42
|
delegate :rails_routes, :rails_request, to: :scope
|
34
43
|
|
35
44
|
private
|
@@ -4,13 +4,17 @@ module Rodauth
|
|
4
4
|
module Callbacks
|
5
5
|
private
|
6
6
|
|
7
|
+
def _around_rodauth
|
8
|
+
rails_controller_around { super }
|
9
|
+
end
|
10
|
+
|
7
11
|
# Runs controller callbacks and rescue handlers around Rodauth actions.
|
8
|
-
def
|
12
|
+
def rails_controller_around
|
9
13
|
result = nil
|
10
14
|
|
11
15
|
rails_controller_rescue do
|
12
16
|
rails_controller_callbacks do
|
13
|
-
result = catch(:halt) {
|
17
|
+
result = catch(:halt) { yield }
|
14
18
|
end
|
15
19
|
end
|
16
20
|
|
@@ -13,23 +13,23 @@ module Rodauth
|
|
13
13
|
|
14
14
|
# Render Rails CSRF tags in Rodauth templates.
|
15
15
|
def csrf_tag(*)
|
16
|
-
rails_csrf_tag
|
16
|
+
rails_csrf_tag if rails_controller_csrf?
|
17
17
|
end
|
18
18
|
|
19
19
|
# Verify Rails' authenticity token.
|
20
20
|
def check_csrf
|
21
|
-
rails_check_csrf!
|
21
|
+
rails_check_csrf! if rails_controller_csrf?
|
22
22
|
end
|
23
23
|
|
24
24
|
# Have Rodauth call #check_csrf automatically.
|
25
25
|
def check_csrf?
|
26
|
-
|
26
|
+
rails_check_csrf? if rails_controller_csrf?
|
27
27
|
end
|
28
28
|
|
29
29
|
private
|
30
30
|
|
31
31
|
def rails_controller_callbacks
|
32
|
-
return super
|
32
|
+
return super unless rails_controller_csrf?
|
33
33
|
|
34
34
|
# don't verify CSRF token as part of callbacks, Rodauth will do that
|
35
35
|
rails_controller_instance.allow_forgery_protection = false
|
@@ -40,6 +40,12 @@ module Rodauth
|
|
40
40
|
end
|
41
41
|
end
|
42
42
|
|
43
|
+
# Checks whether ActionController::RequestForgeryProtection is included
|
44
|
+
# and that protect_from_forgery was called.
|
45
|
+
def rails_check_csrf?
|
46
|
+
!!rails_controller_instance.forgery_protection_strategy
|
47
|
+
end
|
48
|
+
|
43
49
|
# Calls the controller to verify the authenticity token.
|
44
50
|
def rails_check_csrf!
|
45
51
|
rails_controller_instance.send(:verify_authenticity_token)
|
@@ -59,6 +65,11 @@ module Rodauth
|
|
59
65
|
def rails_csrf_token
|
60
66
|
rails_controller_instance.send(:form_authenticity_token)
|
61
67
|
end
|
68
|
+
|
69
|
+
# Checks whether ActionController::RequestForgeryProtection is included.
|
70
|
+
def rails_controller_csrf?
|
71
|
+
rails_controller.respond_to?(:protect_from_forgery)
|
72
|
+
end
|
62
73
|
end
|
63
74
|
end
|
64
75
|
end
|
@@ -0,0 +1,46 @@
|
|
1
|
+
module Rodauth
|
2
|
+
module Rails
|
3
|
+
module Feature
|
4
|
+
module InternalRequest
|
5
|
+
def domain
|
6
|
+
return super unless missing_host?
|
7
|
+
|
8
|
+
Rodauth::Rails.url_options[:host]
|
9
|
+
end
|
10
|
+
|
11
|
+
def base_url
|
12
|
+
return super unless missing_host? && domain
|
13
|
+
|
14
|
+
url_options = Rodauth::Rails.url_options
|
15
|
+
|
16
|
+
url = "#{url_options[:protocol]}://#{domain}"
|
17
|
+
url << ":#{url_options[:port]}" if url_options[:port]
|
18
|
+
url
|
19
|
+
end
|
20
|
+
|
21
|
+
private
|
22
|
+
|
23
|
+
def rails_controller_around
|
24
|
+
return yield if internal_request?
|
25
|
+
super
|
26
|
+
end
|
27
|
+
|
28
|
+
def rails_instrument_request
|
29
|
+
return yield if internal_request?
|
30
|
+
super
|
31
|
+
end
|
32
|
+
|
33
|
+
def rails_instrument_redirection
|
34
|
+
return yield if internal_request?
|
35
|
+
super
|
36
|
+
end
|
37
|
+
|
38
|
+
# Checks whether we're in an internal request and host was not set,
|
39
|
+
# or the request doesn't exist such as with path_class_methods feature.
|
40
|
+
def missing_host?
|
41
|
+
internal_request? && request.host == INVALID_DOMAIN || scope.nil?
|
42
|
+
end
|
43
|
+
end
|
44
|
+
end
|
45
|
+
end
|
46
|
+
end
|
@@ -10,6 +10,7 @@ module Rodauth
|
|
10
10
|
require "rodauth/rails/feature/render"
|
11
11
|
require "rodauth/rails/feature/email"
|
12
12
|
require "rodauth/rails/feature/instrumentation"
|
13
|
+
require "rodauth/rails/feature/internal_request"
|
13
14
|
|
14
15
|
include Rodauth::Rails::Feature::Base
|
15
16
|
include Rodauth::Rails::Feature::Callbacks
|
@@ -17,5 +18,6 @@ module Rodauth
|
|
17
18
|
include Rodauth::Rails::Feature::Render
|
18
19
|
include Rodauth::Rails::Feature::Email
|
19
20
|
include Rodauth::Rails::Feature::Instrumentation
|
21
|
+
include Rodauth::Rails::Feature::InternalRequest
|
20
22
|
end
|
21
23
|
end
|
@@ -0,0 +1,195 @@
|
|
1
|
+
module Rodauth
|
2
|
+
module Rails
|
3
|
+
class Model
|
4
|
+
class Associations
|
5
|
+
attr_reader :rodauth
|
6
|
+
|
7
|
+
def self.call(rodauth)
|
8
|
+
new(rodauth).call
|
9
|
+
end
|
10
|
+
|
11
|
+
def initialize(rodauth)
|
12
|
+
@rodauth = rodauth
|
13
|
+
end
|
14
|
+
|
15
|
+
def call
|
16
|
+
rodauth.features
|
17
|
+
.select { |feature| respond_to?(feature, true) }
|
18
|
+
.flat_map { |feature| send(feature) }
|
19
|
+
end
|
20
|
+
|
21
|
+
private
|
22
|
+
|
23
|
+
def remember
|
24
|
+
{
|
25
|
+
name: :remember_key,
|
26
|
+
type: :has_one,
|
27
|
+
table: rodauth.remember_table,
|
28
|
+
foreign_key: rodauth.remember_id_column,
|
29
|
+
}
|
30
|
+
end
|
31
|
+
|
32
|
+
def verify_account
|
33
|
+
{
|
34
|
+
name: :verification_key,
|
35
|
+
type: :has_one,
|
36
|
+
table: rodauth.verify_account_table,
|
37
|
+
foreign_key: rodauth.verify_account_id_column,
|
38
|
+
}
|
39
|
+
end
|
40
|
+
|
41
|
+
def reset_password
|
42
|
+
{
|
43
|
+
name: :password_reset_key,
|
44
|
+
type: :has_one,
|
45
|
+
table: rodauth.reset_password_table,
|
46
|
+
foreign_key: rodauth.reset_password_id_column,
|
47
|
+
}
|
48
|
+
end
|
49
|
+
|
50
|
+
def verify_login_change
|
51
|
+
{
|
52
|
+
name: :login_change_key,
|
53
|
+
type: :has_one,
|
54
|
+
table: rodauth.verify_login_change_table,
|
55
|
+
foreign_key: rodauth.verify_login_change_id_column,
|
56
|
+
}
|
57
|
+
end
|
58
|
+
|
59
|
+
def lockout
|
60
|
+
[
|
61
|
+
{
|
62
|
+
name: :lockout,
|
63
|
+
type: :has_one,
|
64
|
+
table: rodauth.account_lockouts_table,
|
65
|
+
foreign_key: rodauth.account_lockouts_id_column,
|
66
|
+
},
|
67
|
+
{
|
68
|
+
name: :login_failure,
|
69
|
+
type: :has_one,
|
70
|
+
table: rodauth.account_login_failures_table,
|
71
|
+
foreign_key: rodauth.account_login_failures_id_column,
|
72
|
+
}
|
73
|
+
]
|
74
|
+
end
|
75
|
+
|
76
|
+
def email_auth
|
77
|
+
{
|
78
|
+
name: :email_auth_key,
|
79
|
+
type: :has_one,
|
80
|
+
table: rodauth.email_auth_table,
|
81
|
+
foreign_key: rodauth.email_auth_id_column,
|
82
|
+
}
|
83
|
+
end
|
84
|
+
|
85
|
+
def account_expiration
|
86
|
+
{
|
87
|
+
name: :activity_time,
|
88
|
+
type: :has_one,
|
89
|
+
table: rodauth.account_activity_table,
|
90
|
+
foreign_key: rodauth.account_activity_id_column,
|
91
|
+
}
|
92
|
+
end
|
93
|
+
|
94
|
+
def active_sessions
|
95
|
+
{
|
96
|
+
name: :active_session_keys,
|
97
|
+
type: :has_many,
|
98
|
+
table: rodauth.active_sessions_table,
|
99
|
+
foreign_key: rodauth.active_sessions_account_id_column,
|
100
|
+
}
|
101
|
+
end
|
102
|
+
|
103
|
+
def audit_logging
|
104
|
+
{
|
105
|
+
name: :authentication_audit_logs,
|
106
|
+
type: :has_many,
|
107
|
+
table: rodauth.audit_logging_table,
|
108
|
+
foreign_key: rodauth.audit_logging_account_id_column,
|
109
|
+
dependent: nil,
|
110
|
+
}
|
111
|
+
end
|
112
|
+
|
113
|
+
def disallow_password_reuse
|
114
|
+
{
|
115
|
+
name: :previous_password_hashes,
|
116
|
+
type: :has_many,
|
117
|
+
table: rodauth.previous_password_hash_table,
|
118
|
+
foreign_key: rodauth.previous_password_account_id_column,
|
119
|
+
}
|
120
|
+
end
|
121
|
+
|
122
|
+
def jwt_refresh
|
123
|
+
{
|
124
|
+
name: :jwt_refresh_keys,
|
125
|
+
type: :has_many,
|
126
|
+
table: rodauth.jwt_refresh_token_table,
|
127
|
+
foreign_key: rodauth.jwt_refresh_token_account_id_column,
|
128
|
+
}
|
129
|
+
end
|
130
|
+
|
131
|
+
def password_expiration
|
132
|
+
{
|
133
|
+
name: :password_change_time,
|
134
|
+
type: :has_one,
|
135
|
+
table: rodauth.password_expiration_table,
|
136
|
+
foreign_key: rodauth.password_expiration_id_column,
|
137
|
+
}
|
138
|
+
end
|
139
|
+
|
140
|
+
def single_session
|
141
|
+
{
|
142
|
+
name: :session_key,
|
143
|
+
type: :has_one,
|
144
|
+
table: rodauth.single_session_table,
|
145
|
+
foreign_key: rodauth.single_session_id_column,
|
146
|
+
}
|
147
|
+
end
|
148
|
+
|
149
|
+
def otp
|
150
|
+
{
|
151
|
+
name: :otp_key,
|
152
|
+
type: :has_one,
|
153
|
+
table: rodauth.otp_keys_table,
|
154
|
+
foreign_key: rodauth.otp_keys_id_column,
|
155
|
+
}
|
156
|
+
end
|
157
|
+
|
158
|
+
def sms_codes
|
159
|
+
{
|
160
|
+
name: :sms_code,
|
161
|
+
type: :has_one,
|
162
|
+
table: rodauth.sms_codes_table,
|
163
|
+
foreign_key: rodauth.sms_id_column,
|
164
|
+
}
|
165
|
+
end
|
166
|
+
|
167
|
+
def recovery_codes
|
168
|
+
{
|
169
|
+
name: :recovery_codes,
|
170
|
+
type: :has_many,
|
171
|
+
table: rodauth.recovery_codes_table,
|
172
|
+
foreign_key: rodauth.recovery_codes_id_column,
|
173
|
+
}
|
174
|
+
end
|
175
|
+
|
176
|
+
def webauthn
|
177
|
+
[
|
178
|
+
{
|
179
|
+
name: :webauthn_user_id,
|
180
|
+
type: :has_one,
|
181
|
+
table: rodauth.webauthn_user_ids_table,
|
182
|
+
foreign_key: rodauth.webauthn_user_ids_account_id_column,
|
183
|
+
},
|
184
|
+
{
|
185
|
+
name: :webauthn_keys,
|
186
|
+
type: :has_many,
|
187
|
+
table: rodauth.webauthn_keys_table,
|
188
|
+
foreign_key: rodauth.webauthn_keys_account_id_column,
|
189
|
+
}
|
190
|
+
]
|
191
|
+
end
|
192
|
+
end
|
193
|
+
end
|
194
|
+
end
|
195
|
+
end
|
@@ -0,0 +1,101 @@
|
|
1
|
+
module Rodauth
|
2
|
+
module Rails
|
3
|
+
class Model < Module
|
4
|
+
require "rodauth/rails/model/associations"
|
5
|
+
|
6
|
+
def initialize(auth_class, association_options: {})
|
7
|
+
@auth_class = auth_class
|
8
|
+
@association_options = association_options
|
9
|
+
|
10
|
+
define_methods
|
11
|
+
end
|
12
|
+
|
13
|
+
def included(model)
|
14
|
+
fail Rodauth::Rails::Error, "must be an Active Record model" unless model < ActiveRecord::Base
|
15
|
+
|
16
|
+
define_associations(model)
|
17
|
+
end
|
18
|
+
|
19
|
+
private
|
20
|
+
|
21
|
+
def define_methods
|
22
|
+
rodauth = @auth_class.allocate.freeze
|
23
|
+
|
24
|
+
attr_reader :password
|
25
|
+
|
26
|
+
define_method(:password=) do |password|
|
27
|
+
@password = password
|
28
|
+
password_hash = rodauth.send(:password_hash, password) if password
|
29
|
+
set_password_hash(password_hash)
|
30
|
+
end
|
31
|
+
|
32
|
+
define_method(:set_password_hash) do |password_hash|
|
33
|
+
if rodauth.account_password_hash_column
|
34
|
+
public_send(:"#{rodauth.account_password_hash_column}=", password_hash)
|
35
|
+
else
|
36
|
+
if password_hash
|
37
|
+
record = self.password_hash || build_password_hash
|
38
|
+
record.public_send(:"#{rodauth.password_hash_column}=", password_hash)
|
39
|
+
else
|
40
|
+
self.password_hash&.mark_for_destruction
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
def define_associations(model)
|
47
|
+
define_password_hash_association(model) unless rodauth.account_password_hash_column
|
48
|
+
|
49
|
+
feature_associations.each do |association|
|
50
|
+
define_association(model, **association)
|
51
|
+
end
|
52
|
+
end
|
53
|
+
|
54
|
+
def define_password_hash_association(model)
|
55
|
+
password_hash_id_column = rodauth.password_hash_id_column
|
56
|
+
scope = -> { select(password_hash_id_column) } if rodauth.send(:use_database_authentication_functions?)
|
57
|
+
|
58
|
+
define_association model,
|
59
|
+
type: :has_one,
|
60
|
+
name: :password_hash,
|
61
|
+
table: rodauth.password_hash_table,
|
62
|
+
foreign_key: password_hash_id_column,
|
63
|
+
scope: scope,
|
64
|
+
autosave: true
|
65
|
+
end
|
66
|
+
|
67
|
+
def define_association(model, type:, name:, table:, foreign_key:, scope: nil, **options)
|
68
|
+
associated_model = Class.new(model.superclass)
|
69
|
+
associated_model.table_name = table
|
70
|
+
associated_model.belongs_to :account,
|
71
|
+
class_name: model.name,
|
72
|
+
foreign_key: foreign_key,
|
73
|
+
inverse_of: name
|
74
|
+
|
75
|
+
model.const_set(name.to_s.singularize.camelize, associated_model)
|
76
|
+
|
77
|
+
model.public_send type, name, scope,
|
78
|
+
class_name: associated_model.name,
|
79
|
+
foreign_key: foreign_key,
|
80
|
+
dependent: type == :has_many ? :delete_all : :delete,
|
81
|
+
inverse_of: :account,
|
82
|
+
**options,
|
83
|
+
**association_options(name)
|
84
|
+
end
|
85
|
+
|
86
|
+
def feature_associations
|
87
|
+
Rodauth::Rails::Model::Associations.call(rodauth)
|
88
|
+
end
|
89
|
+
|
90
|
+
def association_options(name)
|
91
|
+
options = @association_options
|
92
|
+
options = options.call(name) if options.respond_to?(:call)
|
93
|
+
options || {}
|
94
|
+
end
|
95
|
+
|
96
|
+
def rodauth
|
97
|
+
@auth_class.allocate
|
98
|
+
end
|
99
|
+
end
|
100
|
+
end
|
101
|
+
end
|
@@ -4,15 +4,15 @@ namespace :rodauth do
|
|
4
4
|
|
5
5
|
puts "Routes handled by #{app}:"
|
6
6
|
|
7
|
-
app.opts[:rodauths].
|
8
|
-
|
7
|
+
app.opts[:rodauths].each do |configuration_name, auth_class|
|
8
|
+
auth_class.configure { enable :path_class_methods }
|
9
9
|
|
10
|
-
routes =
|
10
|
+
routes = auth_class.routes.map do |handle_method|
|
11
11
|
path_method = "#{handle_method.to_s.sub(/\Ahandle_/, "")}_path"
|
12
12
|
|
13
13
|
[
|
14
|
-
|
15
|
-
"rodauth#{
|
14
|
+
auth_class.public_send(path_method),
|
15
|
+
"rodauth#{configuration_name && "(:#{configuration_name})"}.#{path_method}",
|
16
16
|
]
|
17
17
|
end
|
18
18
|
|
data/lib/rodauth/rails.rb
CHANGED
@@ -1,9 +1,6 @@
|
|
1
1
|
require "rodauth/rails/version"
|
2
2
|
require "rodauth/rails/railtie"
|
3
3
|
|
4
|
-
require "rack/utils"
|
5
|
-
require "stringio"
|
6
|
-
|
7
4
|
module Rodauth
|
8
5
|
module Rails
|
9
6
|
class Error < StandardError
|
@@ -12,47 +9,45 @@ module Rodauth
|
|
12
9
|
# This allows the developer to avoid loading Rodauth at boot time.
|
13
10
|
autoload :App, "rodauth/rails/app"
|
14
11
|
autoload :Auth, "rodauth/rails/auth"
|
12
|
+
autoload :Model, "rodauth/rails/model"
|
15
13
|
|
16
14
|
@app = nil
|
17
15
|
@middleware = true
|
18
16
|
|
17
|
+
LOCK = Mutex.new
|
18
|
+
|
19
19
|
class << self
|
20
|
-
def rodauth(name = nil, query:
|
21
|
-
|
20
|
+
def rodauth(name = nil, query: nil, form: nil, account: nil, **options)
|
21
|
+
auth_class = app.rodauth(name)
|
22
|
+
|
23
|
+
unless auth_class
|
22
24
|
fail ArgumentError, "undefined rodauth configuration: #{name.inspect}"
|
23
25
|
end
|
24
26
|
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
host += ":#{port}" if port
|
32
|
-
|
33
|
-
content_type = "application/x-www-form-urlencoded" if form.any?
|
34
|
-
|
35
|
-
rack_env = {
|
36
|
-
"QUERY_STRING" => Rack::Utils.build_nested_query(query),
|
37
|
-
"rack.input" => StringIO.new(Rack::Utils.build_nested_query(form)),
|
38
|
-
"CONTENT_TYPE" => content_type,
|
39
|
-
"rack.session" => {},
|
40
|
-
"HTTP_HOST" => host,
|
41
|
-
"rack.url_scheme" => scheme,
|
42
|
-
}.merge(env)
|
43
|
-
|
44
|
-
scope = app.new(rack_env)
|
45
|
-
instance = scope.rodauth(name)
|
27
|
+
LOCK.synchronize do
|
28
|
+
unless auth_class.features.include?(:internal_request)
|
29
|
+
auth_class.configure { enable :internal_request }
|
30
|
+
warn "Rodauth::Rails.rodauth requires the internal_request feature to be enabled. For now it was enabled automatically, but this behaviour will be removed in version 1.0."
|
31
|
+
end
|
32
|
+
end
|
46
33
|
|
47
|
-
|
48
|
-
|
34
|
+
if query || form
|
35
|
+
warn "The :query and :form keyword arguments for Rodauth::Rails.rodauth have been deprecated. Please use the :params argument supported by internal_request feature instead."
|
36
|
+
options[:params] = query || form
|
37
|
+
end
|
49
38
|
|
50
39
|
if account
|
51
|
-
|
52
|
-
instance.session[instance.session_key] = instance.account_session_value
|
40
|
+
options[:account_id] = account.id
|
53
41
|
end
|
54
42
|
|
55
|
-
|
43
|
+
auth_class.internal_request_eval(options) do
|
44
|
+
@account = account.attributes.symbolize_keys if account
|
45
|
+
self
|
46
|
+
end
|
47
|
+
end
|
48
|
+
|
49
|
+
def model(name = nil, **options)
|
50
|
+
Rodauth::Rails::Model.new(app.rodauth(name), **options)
|
56
51
|
end
|
57
52
|
|
58
53
|
# routing constraint that requires authentication
|
@@ -84,6 +79,12 @@ module Rodauth
|
|
84
79
|
end
|
85
80
|
end
|
86
81
|
|
82
|
+
def url_options
|
83
|
+
options = ::Rails.application.config.action_mailer.default_url_options || {}
|
84
|
+
options[:protocol] ||= "http"
|
85
|
+
options
|
86
|
+
end
|
87
|
+
|
87
88
|
def configure
|
88
89
|
yield self
|
89
90
|
end
|
data/rodauth-rails.gemspec
CHANGED
@@ -17,10 +17,13 @@ Gem::Specification.new do |spec|
|
|
17
17
|
spec.require_paths = ["lib"]
|
18
18
|
|
19
19
|
spec.add_dependency "railties", ">= 4.2", "< 7"
|
20
|
-
spec.add_dependency "rodauth", "~> 2.
|
20
|
+
spec.add_dependency "rodauth", "~> 2.15"
|
21
21
|
spec.add_dependency "sequel-activerecord_connection", "~> 1.1"
|
22
22
|
spec.add_dependency "tilt"
|
23
23
|
spec.add_dependency "bcrypt"
|
24
24
|
|
25
25
|
spec.add_development_dependency "jwt"
|
26
|
+
spec.add_development_dependency "rotp"
|
27
|
+
spec.add_development_dependency "rqrcode"
|
28
|
+
spec.add_development_dependency "webauthn" unless RUBY_ENGINE == "jruby"
|
26
29
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: rodauth-rails
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.17.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Janko Marohnić
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-10-20 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: railties
|
@@ -36,14 +36,14 @@ dependencies:
|
|
36
36
|
requirements:
|
37
37
|
- - "~>"
|
38
38
|
- !ruby/object:Gem::Version
|
39
|
-
version: '2.
|
39
|
+
version: '2.15'
|
40
40
|
type: :runtime
|
41
41
|
prerelease: false
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
43
43
|
requirements:
|
44
44
|
- - "~>"
|
45
45
|
- !ruby/object:Gem::Version
|
46
|
-
version: '2.
|
46
|
+
version: '2.15'
|
47
47
|
- !ruby/object:Gem::Dependency
|
48
48
|
name: sequel-activerecord_connection
|
49
49
|
requirement: !ruby/object:Gem::Requirement
|
@@ -100,6 +100,48 @@ dependencies:
|
|
100
100
|
- - ">="
|
101
101
|
- !ruby/object:Gem::Version
|
102
102
|
version: '0'
|
103
|
+
- !ruby/object:Gem::Dependency
|
104
|
+
name: rotp
|
105
|
+
requirement: !ruby/object:Gem::Requirement
|
106
|
+
requirements:
|
107
|
+
- - ">="
|
108
|
+
- !ruby/object:Gem::Version
|
109
|
+
version: '0'
|
110
|
+
type: :development
|
111
|
+
prerelease: false
|
112
|
+
version_requirements: !ruby/object:Gem::Requirement
|
113
|
+
requirements:
|
114
|
+
- - ">="
|
115
|
+
- !ruby/object:Gem::Version
|
116
|
+
version: '0'
|
117
|
+
- !ruby/object:Gem::Dependency
|
118
|
+
name: rqrcode
|
119
|
+
requirement: !ruby/object:Gem::Requirement
|
120
|
+
requirements:
|
121
|
+
- - ">="
|
122
|
+
- !ruby/object:Gem::Version
|
123
|
+
version: '0'
|
124
|
+
type: :development
|
125
|
+
prerelease: false
|
126
|
+
version_requirements: !ruby/object:Gem::Requirement
|
127
|
+
requirements:
|
128
|
+
- - ">="
|
129
|
+
- !ruby/object:Gem::Version
|
130
|
+
version: '0'
|
131
|
+
- !ruby/object:Gem::Dependency
|
132
|
+
name: webauthn
|
133
|
+
requirement: !ruby/object:Gem::Requirement
|
134
|
+
requirements:
|
135
|
+
- - ">="
|
136
|
+
- !ruby/object:Gem::Version
|
137
|
+
version: '0'
|
138
|
+
type: :development
|
139
|
+
prerelease: false
|
140
|
+
version_requirements: !ruby/object:Gem::Requirement
|
141
|
+
requirements:
|
142
|
+
- - ">="
|
143
|
+
- !ruby/object:Gem::Version
|
144
|
+
version: '0'
|
103
145
|
description: Provides Rails integration for Rodauth.
|
104
146
|
email:
|
105
147
|
- janko.marohnic@gmail.com
|
@@ -212,8 +254,11 @@ files:
|
|
212
254
|
- lib/rodauth/rails/feature/csrf.rb
|
213
255
|
- lib/rodauth/rails/feature/email.rb
|
214
256
|
- lib/rodauth/rails/feature/instrumentation.rb
|
257
|
+
- lib/rodauth/rails/feature/internal_request.rb
|
215
258
|
- lib/rodauth/rails/feature/render.rb
|
216
259
|
- lib/rodauth/rails/middleware.rb
|
260
|
+
- lib/rodauth/rails/model.rb
|
261
|
+
- lib/rodauth/rails/model/associations.rb
|
217
262
|
- lib/rodauth/rails/railtie.rb
|
218
263
|
- lib/rodauth/rails/tasks.rake
|
219
264
|
- lib/rodauth/rails/version.rb
|