secret_token_migration 0.0.2

Sign up to get free protection for your applications and to get access to all the features.
data/.gitignore ADDED
@@ -0,0 +1,18 @@
1
+ *.gem
2
+ *.rbc
3
+ .bundle
4
+ .config
5
+ .yardoc
6
+ Gemfile.lock
7
+ InstalledFiles
8
+ _yardoc
9
+ coverage
10
+ doc/
11
+ lib/bundler/man
12
+ pkg
13
+ rdoc
14
+ spec/reports
15
+ test/tmp
16
+ test/version_tmp
17
+ tmp
18
+ log/*
data/Gemfile ADDED
@@ -0,0 +1,4 @@
1
+ source 'https://rubygems.org'
2
+
3
+ # Specify your gem's dependencies in secret_token_migration.gemspec
4
+ gemspec
data/LICENSE.txt ADDED
@@ -0,0 +1,22 @@
1
+ Copyright (c) 2013 Tieg Zaharia
2
+
3
+ MIT License
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining
6
+ a copy of this software and associated documentation files (the
7
+ "Software"), to deal in the Software without restriction, including
8
+ without limitation the rights to use, copy, modify, merge, publish,
9
+ distribute, sublicense, and/or sell copies of the Software, and to
10
+ permit persons to whom the Software is furnished to do so, subject to
11
+ the following conditions:
12
+
13
+ The above copyright notice and this permission notice shall be
14
+ included in all copies or substantial portions of the Software.
15
+
16
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
17
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
18
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
19
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
20
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
21
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
22
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,68 @@
1
+ # SecretTokenMigration
2
+
3
+ ```
4
+ ★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★
5
+ ★ WARNING: this is intended for maintenance. If your `secret_token` was compromised, REPLACE IT instead of using this ★
6
+ ★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★★
7
+ ```
8
+
9
+ The most basic convention for maintaining session state in Rails apps has been this:
10
+
11
+ ``` ruby
12
+ def login(user)
13
+ session[:user_id] = user.id
14
+ end
15
+ ```
16
+
17
+ The Rails session is just a cookie that includes a signed digest of the contents, using a `secret_token`.
18
+
19
+ But sometimes you need to change your `secret_token`, which would in these most basic cases logout most of your users.
20
+
21
+ This gem provides a graceful way to change your `secret_token` without logging out **most** of your active users.
22
+
23
+ ## Example Situations
24
+
25
+ * You use the same `secret_token` in all of your environments, but decide that you want to separate them.
26
+ * Your `secret_token` was found logged in some third-party software, **but** you have no evidence that it was compromised, and want to change it.
27
+ * Regular swapping of `secret_token` as a precaution.
28
+
29
+ ## How It Works
30
+
31
+ Regularly, you set a `MyApp::Application.config.secret_token` in your Rails app. By requiring this gem, setting `secret_token` to a new value, and including a `MyApp::Application.config.deprecated_secret_token` set to the old value, users with sessions digested with the old value will be gracefully transitioned to a session digested with the new value. When you feel comfortable that most active users have transitioned, you can remove this gem and the `deprecated_secret_token` config variable.
32
+
33
+ ## Installation
34
+
35
+ Add this line to your application's Gemfile:
36
+
37
+ gem 'secret_token_migration'
38
+
39
+ And then execute:
40
+
41
+ $ bundle
42
+
43
+ Or install it yourself as:
44
+
45
+ $ gem install secret_token_migration
46
+
47
+ ## Usage
48
+
49
+ 1. In your `config/initializers/secret_token.rb` file, set the `secret_token` to a new, secure value.
50
+ 2. Add this line:
51
+ `MyApp::Application.config.deprecated_secret_token = [THE_OLD_SECRET_TOKEN_VALUE]`
52
+ 3. Optionally, add some instrumentation (described below) to track how many users have been transitioned.
53
+
54
+ ## Instrumentation
55
+
56
+ You can also subscribe to `MessageVerifier` digesting to track when a deprecated secret_token is used (eg, for graphing):
57
+
58
+ ``` ruby
59
+ ActiveSupport::Notifications.subscribe "deprecated_secret.active_support" do
60
+ Rails.logger.info "deprecated secret_token used"
61
+ end
62
+ ```
63
+
64
+ ## Reminder
65
+
66
+ If your `secret_token` **has** been compromised, don't bother with this library. You need to switch it ASAP and deal with all users being logged out.
67
+
68
+
data/Rakefile ADDED
@@ -0,0 +1,12 @@
1
+ require "bundler/gem_tasks"
2
+
3
+ require 'rake/testtask'
4
+
5
+ Rake::TestTask.new(:test) do |t|
6
+ t.libs << 'lib'
7
+ t.libs << 'test'
8
+ t.pattern = 'test/**/*_test.rb'
9
+ t.verbose = false
10
+ end
11
+
12
+ task :default => :test
@@ -0,0 +1,34 @@
1
+ module ActionDispatch
2
+ class Cookies
3
+ DEPRECATED_TOKEN_KEY = "action_dispatch.deprecated_secret_token".freeze
4
+
5
+ class CookieJar
6
+ class << self
7
+ def build_with_deprecated_secret(request)
8
+ build_without_deprecated_secret(request).tap do |hash|
9
+ hash.instance_variable_set(:@deprecated_secret, request.env[DEPRECATED_TOKEN_KEY])
10
+ end
11
+ end
12
+ alias_method_chain :build, :deprecated_secret # apologies
13
+ end
14
+
15
+ def signed
16
+ @signed ||= if @deprecated_secret
17
+ ActionDispatch::Cookies::SignedCookieWithDeprecatedTokenJar.new(self, @secret, {:deprecated_secret => @deprecated_secret})
18
+ else
19
+ ActionDispatch::Cookies::SignedCookieJar.new(self, @secret)
20
+ end
21
+ end
22
+ end
23
+
24
+ class SignedCookieWithDeprecatedTokenJar < ActionDispatch::Cookies::SignedCookieJar
25
+ def initialize(parent_jar, secret, options={})
26
+ ensure_secret_secure(secret)
27
+ ensure_secret_secure(options[:deprecated_secret])
28
+ @parent_jar = parent_jar
29
+ @verifier = ActiveSupport::MessageVerifier.new(secret, options)
30
+ @verifier.instance_variable_set(:@deprecated_secret, options[:deprecated_secret])
31
+ end
32
+ end
33
+ end
34
+ end
@@ -0,0 +1,19 @@
1
+ class ActiveSupport::MessageVerifier
2
+ def verify(signed_message)
3
+ raise InvalidSignature if signed_message.blank?
4
+
5
+ data, digest = signed_message.split("--")
6
+ if data.present? && digest.present? && secure_compare(digest, generate_digest(data))
7
+ @serializer.load(::Base64.decode64(data))
8
+ elsif data.present? && digest.present? && @deprecated_secret && secure_compare(digest, generate_deprecated_digest(data))
9
+ ActiveSupport::Notifications.instrument("deprecated_secret.active_support")
10
+ @serializer.load(::Base64.decode64(data))
11
+ else
12
+ raise InvalidSignature
13
+ end
14
+ end
15
+
16
+ def generate_deprecated_digest(data)
17
+ OpenSSL::HMAC.hexdigest(OpenSSL::Digest.const_get(@digest).new, @deprecated_secret, data)
18
+ end
19
+ end
@@ -0,0 +1,19 @@
1
+ require 'secret_token_migration'
2
+
3
+ module SecretTokenMigration
4
+ require 'rails'
5
+
6
+ class Railtie < Rails::Railtie
7
+ initializer 'secret_token_migration.insert_into_application' do
8
+ ActiveSupport.on_load :before_configuration do
9
+ SecretTokenMigration::Railtie.insert
10
+ end
11
+ end
12
+
13
+ def self.insert
14
+ require 'secret_token_migration/railties/application'
15
+ require 'secret_token_migration/action_dispatch/cookies'
16
+ require 'secret_token_migration/active_support/message_verifier'
17
+ end
18
+ end
19
+ end
@@ -0,0 +1,14 @@
1
+ module Rails
2
+ class Application
3
+ class Configuration
4
+ attr_accessor :deprecated_secret_token
5
+ end
6
+
7
+ def env_config_with_deprecated_secret_token
8
+ @env_config ||= env_config_without_deprecated_secret_token.merge({
9
+ "action_dispatch.deprecated_secret_token" => config.deprecated_secret_token
10
+ })
11
+ end
12
+ alias_method_chain :env_config, :deprecated_secret_token
13
+ end
14
+ end
@@ -0,0 +1,3 @@
1
+ module SecretTokenMigration
2
+ VERSION = "0.0.2"
3
+ end
@@ -0,0 +1,5 @@
1
+ require "secret_token_migration/version"
2
+ require "secret_token_migration/railtie"
3
+
4
+ module SecretTokenMigration
5
+ end
@@ -0,0 +1,24 @@
1
+ # -*- encoding: utf-8 -*-
2
+ lib = File.expand_path('../lib', __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require 'secret_token_migration/version'
5
+
6
+ Gem::Specification.new do |gem|
7
+ gem.name = "secret_token_migration"
8
+ gem.version = SecretTokenMigration::VERSION
9
+ gem.authors = ["Tieg Zaharia"]
10
+ gem.email = ["tieg.zaharia@gmail.com"]
11
+ gem.description = %q{A gem for the maintaneance of secret_tokens.}
12
+ gem.summary = %q{Easy way to switch to a secret_token while not
13
+ logging out most of your users.}
14
+ gem.homepage = "https://github.com/tiegz/secret_token_migration"
15
+
16
+ gem.files = `git ls-files`.split($/)
17
+ gem.executables = gem.files.grep(%r{^bin/}).map{ |f| File.basename(f) }
18
+ gem.test_files = gem.files.grep(%r{^(test|spec|features)/})
19
+ gem.require_paths = ["lib"]
20
+
21
+ gem.add_dependency "rails", "~> 3.2.11"
22
+
23
+ gem.add_development_dependency "shoulda", "~> 3.3.2"
24
+ end
@@ -0,0 +1,41 @@
1
+ require_relative '../test_helper'
2
+
3
+ class CookiesTest < ActiveSupport::TestCase
4
+ context "with only regular token" do
5
+ setup do
6
+ @old_cookies = ActionDispatch::Cookies::CookieJar.build(ActionController::TestRequest.new({
7
+ "action_dispatch.secret_token" => "old" * 50
8
+ }))
9
+
10
+ @deprecated_cookies = ActionDispatch::Cookies::CookieJar.build(ActionController::TestRequest.new({
11
+ "action_dispatch.secret_token" => "new" * 50,
12
+ "action_dispatch.deprecated_secret_token" => "old" * 50
13
+ }))
14
+
15
+ @new_cookies = ActionDispatch::Cookies::CookieJar.build(ActionController::TestRequest.new({
16
+ "action_dispatch.secret_token" => "new" * 50,
17
+ }))
18
+
19
+ @old_cookies.signed["foo"] = "bar"
20
+ end
21
+
22
+ should "use correct class for signed cookies" do
23
+ assert_equal ActionDispatch::Cookies::SignedCookieJar,
24
+ @old_cookies.signed.class
25
+ assert_equal ActionDispatch::Cookies::SignedCookieWithDeprecatedTokenJar,
26
+ @deprecated_cookies.signed.class
27
+ assert_equal ActionDispatch::Cookies::SignedCookieJar,
28
+ @new_cookies.signed.class
29
+ end
30
+
31
+ should "read/write the old value with a deprecated token cookie" do
32
+ @deprecated_cookies["foo"] = @old_cookies["foo"] # without 'signed', fetches the digested value
33
+ assert_equal "bar", @deprecated_cookies.signed["foo"]
34
+ end
35
+
36
+ should "not read/write the old value with a new token cookie" do
37
+ @new_cookies["foo"] = @old_cookies["foo"] # without 'signed', fetches the digested value
38
+ assert_equal nil, @new_cookies.signed["foo"]
39
+ end
40
+ end
41
+ end
@@ -0,0 +1,26 @@
1
+ require_relative '../test_helper'
2
+
3
+ class RailsApplicationTest < ActiveSupport::TestCase
4
+ context "a rails application" do
5
+ subject do
6
+ Class.new(Rails::Application).tap do |app|
7
+ app.config.deprecated_secret_token = "b"*128
8
+ app.config.secret_token = "a"*128
9
+ end
10
+ end
11
+
12
+ teardown do
13
+ Rails.application = nil
14
+ end
15
+
16
+ should "have secret_token" do
17
+ assert subject.env_config["action_dispatch.secret_token"].present?
18
+ assert_equal 128, subject.env_config["action_dispatch.secret_token"].length
19
+ end
20
+
21
+ should "have deprecated_secret_token" do
22
+ assert subject.env_config["action_dispatch.deprecated_secret_token"].present?
23
+ assert_equal 128, subject.env_config["action_dispatch.deprecated_secret_token"].length
24
+ end
25
+ end
26
+ end
@@ -0,0 +1,14 @@
1
+ ENV["RAILS_ENV"] = "test"
2
+
3
+ require 'test/unit'
4
+ require 'rails'
5
+ require 'active_support/test_case'
6
+ require 'action_controller/test_case'
7
+ require 'action_dispatch/testing/integration'
8
+ require 'shoulda'
9
+ require 'secret_token_migration'
10
+
11
+ # the railtie logic
12
+ require 'secret_token_migration/railties/application'
13
+ require 'secret_token_migration/action_dispatch/cookies'
14
+ require 'secret_token_migration/active_support/message_verifier'
metadata ADDED
@@ -0,0 +1,96 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: secret_token_migration
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.0.2
5
+ prerelease:
6
+ platform: ruby
7
+ authors:
8
+ - Tieg Zaharia
9
+ autorequire:
10
+ bindir: bin
11
+ cert_chain: []
12
+ date: 2013-01-14 00:00:00.000000000 Z
13
+ dependencies:
14
+ - !ruby/object:Gem::Dependency
15
+ name: rails
16
+ requirement: !ruby/object:Gem::Requirement
17
+ none: false
18
+ requirements:
19
+ - - ~>
20
+ - !ruby/object:Gem::Version
21
+ version: 3.2.11
22
+ type: :runtime
23
+ prerelease: false
24
+ version_requirements: !ruby/object:Gem::Requirement
25
+ none: false
26
+ requirements:
27
+ - - ~>
28
+ - !ruby/object:Gem::Version
29
+ version: 3.2.11
30
+ - !ruby/object:Gem::Dependency
31
+ name: shoulda
32
+ requirement: !ruby/object:Gem::Requirement
33
+ none: false
34
+ requirements:
35
+ - - ~>
36
+ - !ruby/object:Gem::Version
37
+ version: 3.3.2
38
+ type: :development
39
+ prerelease: false
40
+ version_requirements: !ruby/object:Gem::Requirement
41
+ none: false
42
+ requirements:
43
+ - - ~>
44
+ - !ruby/object:Gem::Version
45
+ version: 3.3.2
46
+ description: A gem for the maintaneance of secret_tokens.
47
+ email:
48
+ - tieg.zaharia@gmail.com
49
+ executables: []
50
+ extensions: []
51
+ extra_rdoc_files: []
52
+ files:
53
+ - .gitignore
54
+ - Gemfile
55
+ - LICENSE.txt
56
+ - README.md
57
+ - Rakefile
58
+ - lib/secret_token_migration.rb
59
+ - lib/secret_token_migration/action_dispatch/cookies.rb
60
+ - lib/secret_token_migration/active_support/message_verifier.rb
61
+ - lib/secret_token_migration/railtie.rb
62
+ - lib/secret_token_migration/railties/application.rb
63
+ - lib/secret_token_migration/version.rb
64
+ - secret_token_migration.gemspec
65
+ - test/action_dispatch/cookies_test.rb
66
+ - test/railties/application_test.rb
67
+ - test/test_helper.rb
68
+ homepage: https://github.com/tiegz/secret_token_migration
69
+ licenses: []
70
+ post_install_message:
71
+ rdoc_options: []
72
+ require_paths:
73
+ - lib
74
+ required_ruby_version: !ruby/object:Gem::Requirement
75
+ none: false
76
+ requirements:
77
+ - - ! '>='
78
+ - !ruby/object:Gem::Version
79
+ version: '0'
80
+ required_rubygems_version: !ruby/object:Gem::Requirement
81
+ none: false
82
+ requirements:
83
+ - - ! '>='
84
+ - !ruby/object:Gem::Version
85
+ version: '0'
86
+ requirements: []
87
+ rubyforge_project:
88
+ rubygems_version: 1.8.24
89
+ signing_key:
90
+ specification_version: 3
91
+ summary: Easy way to switch to a secret_token while not logging out most of your
92
+ users.
93
+ test_files:
94
+ - test/action_dispatch/cookies_test.rb
95
+ - test/railties/application_test.rb
96
+ - test/test_helper.rb