soar_policy_access_manager 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: a81bf46d7cb69b1a960e47cdf840ac90b3352e7d
4
+ data.tar.gz: ba2f109d65130734518d3c82c8940185cdeb6c18
5
+ SHA512:
6
+ metadata.gz: 01d39a231f413c919a29a72673c51a04cfd58ffa8ff6d462c2e05a717af00515d02175e675a49e2854b2b3a537ebe583547f642742ce99870f77c33418d6c060
7
+ data.tar.gz: 1af27fea5ac9f79511019c516be7518c419a108362c380fd64f3e1989402b5ad6374ae4cd729ccd244f57308a40d1ddbbd1a3b1e0c38e786fcd1a755934e3f0f
data/.gitignore ADDED
@@ -0,0 +1,11 @@
1
+ /.bundle/
2
+ /.yardoc
3
+ /Gemfile.lock
4
+ /_yardoc/
5
+ /coverage/
6
+ /doc/
7
+ /pkg/
8
+ /spec/reports/
9
+ /tmp/
10
+ .byebug_history
11
+ *.gem
data/.rspec ADDED
@@ -0,0 +1,2 @@
1
+ --format documentation
2
+ --color
data/.travis.yml ADDED
@@ -0,0 +1,5 @@
1
+ sudo: false
2
+ language: ruby
3
+ rvm:
4
+ - 2.2.1
5
+ before_install: gem install bundler -v 1.12.5
data/Gemfile ADDED
@@ -0,0 +1,4 @@
1
+ source 'https://rubygems.org'
2
+
3
+ # Specify your gem's dependencies in soar_policy_access_manager.gemspec
4
+ gemspec
data/LICENSE.txt ADDED
@@ -0,0 +1,21 @@
1
+ The MIT License (MIT)
2
+
3
+ Copyright (c) 2016 Ernst Van Graan
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in
13
+ all copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21
+ THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,52 @@
1
+ # SoarPolicyAccessManager
2
+
3
+ This Access Manager adheres to SoarAm::AmApi. It is initialized with a soar_sr service registy client (https://rubygems.org/gems/soar_sr)
4
+
5
+ This access manager denies access for unauthenticated requests, that is, request that do not habe request.session['user'] set. If set, this access manager then queries the service registry for meta regarding the service identifier in question.
6
+
7
+ If the service meta indicates no policy, the request is allowed. It the service meta indicates a policy, the policy service is asked, given the authenticated subject identifier, service identifier, resource identifier and request parameters, whether the request should be allowed. This access manager then allows / denies accordingly.
8
+
9
+ In the case of the service not found in the service registry, or a failure of any kind, the request is denied. In the interest of security, exceptions while authorizing will be swallowed by this access manager. Only the last exception message will be reported to STDERR.
10
+
11
+ ## Installation
12
+
13
+ Add this line to your application's Gemfile:
14
+
15
+ ```ruby
16
+ gem 'soar_policy_access_manager'
17
+ ```
18
+
19
+ And then execute:
20
+
21
+ $ bundle
22
+
23
+ Or install it yourself as:
24
+
25
+ $ gem install soar_policy_access_manager
26
+
27
+ ## Usage
28
+
29
+ ```
30
+ policy_am = SoarPolicyAccessManager::PolicyAccessManager.new(SoarSc::service_registry)
31
+ puts policy_am.authorize(service_identifier, resource_identifier, authentication_identifier, request)
32
+ ```
33
+
34
+ This access manager can be used with the SoarAuthorization::Authorize middleware:
35
+
36
+ ```
37
+ SoarAuthorization::Authorize::register_access_manager('/path', 'path-service', policy_am)
38
+
39
+ use SoarAuthorization::Authorize
40
+ ```
41
+
42
+ ## Contributing
43
+
44
+ Please send feedback and comments to the author at:
45
+
46
+ Ernst van Graan <ernst.van.graan@hetzner.co.za>
47
+
48
+ This gem is sponsored by Hetzner (Pty) Ltd - http://hetzner.co.za
49
+
50
+ ## License
51
+
52
+ The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).
data/Rakefile ADDED
@@ -0,0 +1,6 @@
1
+ require "bundler/gem_tasks"
2
+ require "rspec/core/rake_task"
3
+
4
+ RSpec::Core::RakeTask.new(:spec)
5
+
6
+ task :default => :spec
data/bin/console ADDED
@@ -0,0 +1,14 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require "bundler/setup"
4
+ require "soar_policy_access_manager"
5
+
6
+ # You can add fixtures and/or initialization code here to make experimenting
7
+ # with your gem easier. You can also use a different console, if you like.
8
+
9
+ # (If you use this, don't forget to add pry to your Gemfile!)
10
+ # require "pry"
11
+ # Pry.start
12
+
13
+ require "irb"
14
+ IRB.start
data/bin/setup ADDED
@@ -0,0 +1,8 @@
1
+ #!/usr/bin/env bash
2
+ set -euo pipefail
3
+ IFS=$'\n\t'
4
+ set -vx
5
+
6
+ bundle install
7
+
8
+ # Do any other automated setup that you need to do here
@@ -0,0 +1,59 @@
1
+ require "soar_policy_access_manager/version"
2
+ require "soar_am"
3
+
4
+ module SoarPolicyAccessManager
5
+ class PolicyAccessManagerException < StandardError
6
+ end
7
+
8
+ class PolicyAccessManager < SoarAm::AmApi
9
+ attr_reader :service_registry
10
+
11
+ def initialize(service_registry)
12
+ @service_registry = service_registry
13
+ end
14
+
15
+ def authorize(service_identifier, resource_identifier, authentication_identifier, request)
16
+ return true if ENV['RACK_ENV'] == 'development'
17
+
18
+ subject_identifier = authentication_identifier
19
+
20
+ meta = @service_registry.services.meta_for_service(service_identifier)
21
+ policy = meta['policy'] if meta and meta.is_a?(Hash) and meta['policy']
22
+ policy.nil? ? true : ask_policy(policy, subject_identifier, service_identifier, resource_identifier, request)
23
+ rescue SoarSr::ValidationError
24
+ return false
25
+ rescue => ex
26
+ STDERR.puts "AccessManager error authorizing #{service_identifier} for #{resource_identifier}: #{ex.message}"
27
+ return false
28
+ end
29
+
30
+ private
31
+
32
+ def ask_policy(policy, subject_identifier, service_identifier, resource_identifier, request)
33
+ uri = find_first_uri(policy)
34
+ return false if uri.nil?
35
+ url = URI.parse(uri)
36
+ params = { 'resource_identifier' => resource_identifier,
37
+ 'subject_identifier' => subject_identifier,
38
+ 'service_identifier' => service_identifier,
39
+ 'request' => request }
40
+ res = Net::HTTP.post_form(url, params)
41
+ result = JSON.parse(res.body)
42
+ return false if not result['status'] == 'success'
43
+ result['data']['allowed']
44
+ rescue => ex
45
+ false
46
+ end
47
+
48
+ def find_first_uri(policy)
49
+ result = @service_registry.services.service_by_name(policy)
50
+ return nil if not result['status'] == 'success'
51
+ return nil if result['data']['services'].nil? or result['data']['services'].first.nil?
52
+ service = result['data']['services'].first
53
+ return nil if service[1].nil? or service[1]['uris'].nil?
54
+ access = service[1]['uris'].first
55
+ return nil if access.nil? or access[1].nil? or access[1]['access_point'].nil?
56
+ access[1]['access_point']
57
+ end
58
+ end
59
+ end
@@ -0,0 +1,3 @@
1
+ module SoarPolicyAccessManager
2
+ VERSION = "0.1.0"
3
+ end
@@ -0,0 +1,35 @@
1
+ # coding: utf-8
2
+ lib = File.expand_path('../lib', __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require 'soar_policy_access_manager/version'
5
+
6
+ Gem::Specification.new do |spec|
7
+ spec.name = "soar_policy_access_manager"
8
+ spec.version = SoarPolicyAccessManager::VERSION
9
+ spec.authors = ["Ernst Van Graan"]
10
+ spec.email = ["ernst.van.graan@hetzner.co.za"]
11
+
12
+ spec.summary = %q{Access Manager that uses policy services to determine authorization}
13
+ spec.description = %q{Access Manager that uses policy services to determine authorization}
14
+ spec.homepage = "https://github.com/hetznerZA/soar_policy_access_manager"
15
+ spec.license = "MIT"
16
+
17
+ # Prevent pushing this gem to RubyGems.org. To allow pushes either set the 'allowed_push_host'
18
+ # to allow pushing to a single host or delete this section to allow pushing to any host.
19
+ # if spec.respond_to?(:metadata)
20
+ # spec.metadata['allowed_push_host'] = "TODO: Set to 'http://mygemserver.com'"
21
+ # else
22
+ # raise "RubyGems 2.0 or newer is required to protect against public gem pushes."
23
+ # end
24
+
25
+ spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
26
+ spec.bindir = "exe"
27
+ spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
28
+ spec.require_paths = ["lib"]
29
+
30
+ spec.add_dependency "soar_am", "~>0.1.1"
31
+
32
+ spec.add_development_dependency "bundler", "~> 1.12"
33
+ spec.add_development_dependency "rake", "~> 10.0"
34
+ spec.add_development_dependency "rspec", "~> 3.0"
35
+ end
metadata ADDED
@@ -0,0 +1,113 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: soar_policy_access_manager
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Ernst Van Graan
8
+ autorequire:
9
+ bindir: exe
10
+ cert_chain: []
11
+ date: 2016-07-17 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: soar_am
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: 0.1.1
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: 0.1.1
27
+ - !ruby/object:Gem::Dependency
28
+ name: bundler
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '1.12'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '1.12'
41
+ - !ruby/object:Gem::Dependency
42
+ name: rake
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '10.0'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '10.0'
55
+ - !ruby/object:Gem::Dependency
56
+ name: rspec
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: '3.0'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: '3.0'
69
+ description: Access Manager that uses policy services to determine authorization
70
+ email:
71
+ - ernst.van.graan@hetzner.co.za
72
+ executables: []
73
+ extensions: []
74
+ extra_rdoc_files: []
75
+ files:
76
+ - ".gitignore"
77
+ - ".rspec"
78
+ - ".travis.yml"
79
+ - Gemfile
80
+ - LICENSE.txt
81
+ - README.md
82
+ - Rakefile
83
+ - bin/console
84
+ - bin/setup
85
+ - lib/soar_policy_access_manager.rb
86
+ - lib/soar_policy_access_manager/version.rb
87
+ - soar_policy_access_manager.gemspec
88
+ homepage: https://github.com/hetznerZA/soar_policy_access_manager
89
+ licenses:
90
+ - MIT
91
+ metadata: {}
92
+ post_install_message:
93
+ rdoc_options: []
94
+ require_paths:
95
+ - lib
96
+ required_ruby_version: !ruby/object:Gem::Requirement
97
+ requirements:
98
+ - - ">="
99
+ - !ruby/object:Gem::Version
100
+ version: '0'
101
+ required_rubygems_version: !ruby/object:Gem::Requirement
102
+ requirements:
103
+ - - ">="
104
+ - !ruby/object:Gem::Version
105
+ version: '0'
106
+ requirements: []
107
+ rubyforge_project:
108
+ rubygems_version: 2.4.8
109
+ signing_key:
110
+ specification_version: 4
111
+ summary: Access Manager that uses policy services to determine authorization
112
+ test_files: []
113
+ has_rdoc: