tuersteher 0.0.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +2 -0
- data/Manifest +9 -0
- data/README.rdoc +43 -0
- data/Rakefile +20 -0
- data/VERSION +1 -0
- data/init.rb +2 -0
- data/lib/tuersteher.rb +389 -0
- data/license.txt +165 -0
- data/samples/access_rules.rb +30 -0
- data/samples/application_controller.rb +26 -0
- data/tuersteher.gemspec +47 -0
- metadata +65 -0
data/.gitignore
ADDED
data/Manifest
ADDED
data/README.rdoc
ADDED
@@ -0,0 +1,43 @@
|
|
1
|
+
|
2
|
+
= Tuersteher
|
3
|
+
Security-Layer for Rails-Application acts like a firewall.
|
4
|
+
It's check your URL's or Modells to have the rights for this.
|
5
|
+
|
6
|
+
== Install
|
7
|
+
|
8
|
+
gem install bledig-tuersteher --source http://gems.github.org
|
9
|
+
|
10
|
+
|
11
|
+
== Usage
|
12
|
+
|
13
|
+
Create in your Rails-Application the rules-file "config/access_rules.rb"
|
14
|
+
(or copy the sample from samples-directory and modify)
|
15
|
+
|
16
|
+
Here is as small sample for "config/access_rules.rb"
|
17
|
+
|
18
|
+
# Path-Acces-Rules
|
19
|
+
grant_path '/', :get, :all
|
20
|
+
grant_path '/admin-area/', :all, :ADMIN
|
21
|
+
|
22
|
+
# Model-Acces-Rules
|
23
|
+
grant_model Product, :view, :all
|
24
|
+
grant_model Product, :update, :EDITOR do |product, current_user|
|
25
|
+
product.owner_id == current_user.id
|
26
|
+
end
|
27
|
+
|
28
|
+
Then extend your ApplicationController with:
|
29
|
+
|
30
|
+
include Tuersteher::ControllerExtensions
|
31
|
+
before_filter :check_access # methode is from Tuersteher::ControllerExtensions
|
32
|
+
|
33
|
+
Check if your authendicate-system has implemented the methods:
|
34
|
+
|
35
|
+
* current_user
|
36
|
+
* access_denied
|
37
|
+
|
38
|
+
If not, just implemen it (see samples/application_controller.rb)
|
39
|
+
|
40
|
+
== License
|
41
|
+
|
42
|
+
LGPL V3 (see license.txt)
|
43
|
+
|
data/Rakefile
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
# Rakefile
|
2
|
+
require 'rubygems'
|
3
|
+
require 'rake'
|
4
|
+
|
5
|
+
begin
|
6
|
+
require 'jeweler'
|
7
|
+
Jeweler::Tasks.new do |gemspec|
|
8
|
+
gemspec.name = "tuersteher"
|
9
|
+
gemspec.summary = "Security-Layer for Rails-Application"
|
10
|
+
gemspec.description = "Security-Layer for Rails-Application acts like a firewall."
|
11
|
+
gemspec.email = "bernd@ledig.info"
|
12
|
+
gemspec.homepage = "http://github.com/bledig/tuersteher"
|
13
|
+
gemspec.authors = ["Bernd Ledig"]
|
14
|
+
end
|
15
|
+
rescue LoadError
|
16
|
+
puts "Jeweler not available. Install it with: sudo gem install jeweler -s http://gems.github.com"
|
17
|
+
end
|
18
|
+
|
19
|
+
Dir["#{File.dirname(__FILE__)}/tasks/*.rake"].sort.each { |ext| load ext }
|
20
|
+
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
0.0.6
|
data/init.rb
ADDED
data/lib/tuersteher.rb
ADDED
@@ -0,0 +1,389 @@
|
|
1
|
+
# Module, welches AccesRules fuer Controller/Actions und
|
2
|
+
# Model-Object umsetzt.
|
3
|
+
#
|
4
|
+
# Die Regeln werden aus der Datei "config/acces_rules.rb" geladen
|
5
|
+
#
|
6
|
+
# Author: Bernd Ledig
|
7
|
+
#
|
8
|
+
|
9
|
+
require 'singleton'
|
10
|
+
|
11
|
+
module Tuersteher
|
12
|
+
|
13
|
+
# Logger to log messages with timestamp and severity
|
14
|
+
class TLogger < Logger
|
15
|
+
@@logger = nil
|
16
|
+
|
17
|
+
def format_message(severity, timestamp, progname, msg)
|
18
|
+
"#{timestamp.to_formatted_s(:db)} #{severity} #{msg}\n"
|
19
|
+
end
|
20
|
+
|
21
|
+
def self.logger
|
22
|
+
return @@logger if @@logger
|
23
|
+
@@logger = self.new(File.join(Rails.root, 'log', 'tuersteher.log'), 3)
|
24
|
+
@@logger.level = INFO if Rails.env != 'development'
|
25
|
+
@@logger
|
26
|
+
end
|
27
|
+
|
28
|
+
def self.logger= logger
|
29
|
+
@@logger = logger
|
30
|
+
end
|
31
|
+
end
|
32
|
+
|
33
|
+
class AccessRulesStorage
|
34
|
+
include Singleton
|
35
|
+
|
36
|
+
attr_accessor :rules_config_file # to set own access_rules-path
|
37
|
+
|
38
|
+
DEFAULT_RULES_CONFIG_FILE = File.join(Rails.root, 'config', 'access_rules.rb')
|
39
|
+
|
40
|
+
def initialize
|
41
|
+
@path_rules = []
|
42
|
+
@model_rules = []
|
43
|
+
end
|
44
|
+
|
45
|
+
def path_rules
|
46
|
+
read_rules unless @was_read
|
47
|
+
@path_rules
|
48
|
+
end
|
49
|
+
|
50
|
+
def model_rules
|
51
|
+
read_rules unless @was_read
|
52
|
+
@model_rules
|
53
|
+
end
|
54
|
+
|
55
|
+
|
56
|
+
# Laden der AccesRules aus den Dateien
|
57
|
+
# config/access_rules.rb
|
58
|
+
def read_rules
|
59
|
+
config_file = @rules_config_file || DEFAULT_RULES_CONFIG_FILE
|
60
|
+
rules_file = File.new config_file
|
61
|
+
if @last_mtime.nil? || rules_file.mtime > @last_mtime
|
62
|
+
@last_mtime = rules_file.mtime
|
63
|
+
content = rules_file.read
|
64
|
+
eval content
|
65
|
+
Tuersteher::TLogger.logger.info "Tuersteher::AccessRulesStorage: #{@path_rules.size} path-rules and #{@model_rules.size} model-rules"
|
66
|
+
end
|
67
|
+
rules_file.close
|
68
|
+
@was_read = true
|
69
|
+
end
|
70
|
+
|
71
|
+
# definiert HTTP-Pfad-basierende Zugriffsregel
|
72
|
+
#
|
73
|
+
# path: :all fuer beliebig, sonst String mit der http-path beginnen muss,
|
74
|
+
# wird als RegEX-Ausdruck ausgewertet
|
75
|
+
# method: http-Methode, es sind hier erlaubt :get, :put, :delete, :post, :all
|
76
|
+
# accepted_roles: Aufzaehlung der erfoderlichen Rolen (oder-Verknuepfung), es sind nur Symbole zulaessig
|
77
|
+
# hier ist auch ein Array von Symbolen möglich
|
78
|
+
def grant_path url_path, http_methode, *accepted_roles
|
79
|
+
@path_rules << PathAccessRule.new(url_path, http_methode, *accepted_roles)
|
80
|
+
end
|
81
|
+
|
82
|
+
# definiert HTTP-Pfad-basierende Ablehnungsregel
|
83
|
+
#
|
84
|
+
# path: :all fuer beliebig, sonst String mit der http-path beginnen muss,
|
85
|
+
# wird als RegEX-Ausdruck ausgewertet
|
86
|
+
# method: http-Methode, es sind hier erlaubt :get, :put, :delete, :post, :all
|
87
|
+
# accepted_roles: Aufzaehlung der erfoderlichen Rolen (oder-Verknuepfung), es sind nur Symbole zulaessig
|
88
|
+
# hier ist auch ein Array von Symbolen möglich
|
89
|
+
def deny_path url_path, http_methode, *accepted_roles
|
90
|
+
rule = PathAccessRule.new(url_path, http_methode, *accepted_roles)
|
91
|
+
rule.deny = true
|
92
|
+
@path_rules << rule
|
93
|
+
end
|
94
|
+
|
95
|
+
# definiert Model-basierende Zugriffsregel
|
96
|
+
#
|
97
|
+
# model_class: Model-Klassenname oder :all fuer alle
|
98
|
+
# access_type: Zugriffsart (:create, :update, :destroy, :all o.A. selbst definierte Typen)
|
99
|
+
# roles Aufzählung der erforderliche Rolen (:all für ist egal),
|
100
|
+
# hier ist auch ein Array von Symbolen möglich
|
101
|
+
# block optionaler Block, wird mit model und user aufgerufen und muss true oder false liefern
|
102
|
+
# hier ein Beispiel mit Block:
|
103
|
+
# <code>
|
104
|
+
# # Regel, in der sich jeder User selbst aendern darf
|
105
|
+
# grant_model(User, :update, :all){|model,user| model.id==user.id}
|
106
|
+
# </code>
|
107
|
+
#
|
108
|
+
def grant_model model_class, access_type, *roles, &block
|
109
|
+
@model_rules << ModelAccessRule.new(model_class, access_type, *roles, &block)
|
110
|
+
end
|
111
|
+
|
112
|
+
end
|
113
|
+
|
114
|
+
class AccessRules
|
115
|
+
|
116
|
+
# Pruefen Zugriff fuer eine Web-action
|
117
|
+
# user User, für den der Zugriff geprüft werden soll (muss Methode has_role? haben)
|
118
|
+
# path Pfad der Webresource (String)
|
119
|
+
# method http-Methode (:get, :put, :delete, :post), default ist :get
|
120
|
+
#
|
121
|
+
def self.path_access?(user, path, method = :get)
|
122
|
+
rule = AccessRulesStorage.instance.path_rules.detect do |r|
|
123
|
+
r.fired?(path, method, user)
|
124
|
+
end
|
125
|
+
if Tuersteher::TLogger.logger.debug?
|
126
|
+
if rule.nil?
|
127
|
+
s = 'denied'
|
128
|
+
elsif rule.deny
|
129
|
+
s = "denied with #{rule}"
|
130
|
+
else
|
131
|
+
s = "granted with #{rule}"
|
132
|
+
end
|
133
|
+
Tuersteher::TLogger.logger.debug("Tuersteher: path_access?(#{path}, #{method}) => #{s}")
|
134
|
+
end
|
135
|
+
rule!=nil && !rule.deny
|
136
|
+
end
|
137
|
+
|
138
|
+
# Pruefen Zugriff auf ein Model-Object
|
139
|
+
#
|
140
|
+
# user User, für den der Zugriff geprüft werden soll (muss Methode has_role? haben)
|
141
|
+
# model das Model-Object
|
142
|
+
# permission das geforderte Zugriffsrecht (:create, :update, :destroy, :get)
|
143
|
+
#
|
144
|
+
# liefert true/false
|
145
|
+
def self.model_access? user, model, permission
|
146
|
+
raise "Wrong call! Use: model_access(model-instance-or-class, permission)" unless permission.is_a? Symbol
|
147
|
+
return false unless model
|
148
|
+
|
149
|
+
access = AccessRulesStorage.instance.model_rules.detect do |rule|
|
150
|
+
rule.has_access? model, permission, user
|
151
|
+
end
|
152
|
+
if Tuersteher::TLogger.logger.debug?
|
153
|
+
if model.instance_of?(Class)
|
154
|
+
Tuersteher::TLogger.logger.debug("Tuersteher: model_access?(#{model}, #{permission}) => #{access ? access : 'denied'}")
|
155
|
+
else
|
156
|
+
Tuersteher::TLogger.logger.debug("Tuersteher: model_access?(#{model.class}(#{model.respond_to?(:id) ? model.id : model.object_id }), #{permission}) => #{access ? access : 'denied'}")
|
157
|
+
end
|
158
|
+
end
|
159
|
+
access!=nil
|
160
|
+
end
|
161
|
+
end
|
162
|
+
|
163
|
+
|
164
|
+
|
165
|
+
# Module zum Include in Controllers
|
166
|
+
# Dieser muss die folgenden Methoden bereitstellen:
|
167
|
+
#
|
168
|
+
# current_user : akt. Login-User
|
169
|
+
# access_denied : Methode aus dem authenticated_system, welche ein redirect zum login auslöst
|
170
|
+
#
|
171
|
+
# Der Loginuser muss fuer die hier benoetigte Funktionalitaet
|
172
|
+
# die Methode:
|
173
|
+
# has_role?(*roles) # roles is Array of Symbols
|
174
|
+
# besitzen.
|
175
|
+
#
|
176
|
+
# Beispiel der Einbindung in den ApplicationController
|
177
|
+
# include Tuersteher::ControllerExtensions
|
178
|
+
# before_filter :check_access # methode is from Tuersteher::ControllerExtensions
|
179
|
+
#
|
180
|
+
module ControllerExtensions
|
181
|
+
|
182
|
+
|
183
|
+
# Pruefen Zugriff fuer eine Web-action
|
184
|
+
#
|
185
|
+
# path Pfad der Webresource (String oder Hash mit Options)
|
186
|
+
# method http-Methode (:get, :put, :delete, :post), default ist :get
|
187
|
+
#
|
188
|
+
def path_access?(path, method = :get)
|
189
|
+
|
190
|
+
# ist path eine Hash (also der alte Stil mit :controller=> .., :action=>..)
|
191
|
+
# dann diese in ein http-path wandeln
|
192
|
+
path = url_for(path.merge(:only_path => true)) if path.instance_of?(Hash)
|
193
|
+
|
194
|
+
AccessRules.path_access? current_user, path, method
|
195
|
+
end
|
196
|
+
|
197
|
+
# Pruefen Zugriff auf ein Model-Object
|
198
|
+
#
|
199
|
+
# model das Model-Object
|
200
|
+
# permission das geforderte Zugriffsrecht (:create, :update, :destroy, :get)
|
201
|
+
#
|
202
|
+
# liefert true/false
|
203
|
+
def model_access? model, permission
|
204
|
+
AccessRules.model_access? current_user, model, permission
|
205
|
+
end
|
206
|
+
|
207
|
+
def self.included(base)
|
208
|
+
base.class_eval do
|
209
|
+
# Methoden path_access? und model_access? auch als Helper fuer die Views bereitstellen
|
210
|
+
helper_method :path_access?, :model_access?
|
211
|
+
end
|
212
|
+
end
|
213
|
+
|
214
|
+
protected
|
215
|
+
|
216
|
+
# Pruefen, ob Zugriff des current_user
|
217
|
+
# fuer aktullen Request erlaubt ist
|
218
|
+
def check_access
|
219
|
+
|
220
|
+
# im dev-mode rules bei jeden request auf Änderungen prüfen
|
221
|
+
AccessRulesStorage.instance.read_rules if Rails.env=='development'
|
222
|
+
|
223
|
+
unless path_access?(request.request_uri, request.method)
|
224
|
+
msg = "Tuersteher#check_access: access denied for #{request.request_uri} :#{request.method}"
|
225
|
+
Tuersteher::TLogger.logger.warn msg
|
226
|
+
logger.warn msg # log message also for Rails-Default logger
|
227
|
+
access_denied # Methode aus dem authenticated_system, welche ein redirect zum login auslöst
|
228
|
+
end
|
229
|
+
end
|
230
|
+
|
231
|
+
end
|
232
|
+
|
233
|
+
|
234
|
+
class PathAccessRule
|
235
|
+
attr_reader :path, :method, :roles
|
236
|
+
attr_accessor :deny
|
237
|
+
|
238
|
+
METHOD_NAMES = [:get, :edit, :put, :delete, :post, :all].freeze
|
239
|
+
|
240
|
+
|
241
|
+
# Zugriffsregel
|
242
|
+
#
|
243
|
+
# path :all fuer beliebig, sonst String mit der http-path beginnen muss
|
244
|
+
# method http-Methode, es sind hier erlaubt :get, :put, :delete, :post, :all
|
245
|
+
# needed_roles Aufzaehlung der erfoderlichen Rolen (oder-Verknuepfung), es sind nur Symbole zulaessig
|
246
|
+
#
|
247
|
+
def initialize(path, method, *needed_roles)
|
248
|
+
raise "wrong path '#{path}'! Must be a String or :all ." unless path==:all or path.is_a?(String)
|
249
|
+
raise "wrong method '#{method}'! Must be #{METHOD_NAMES.join(', ')} !" unless METHOD_NAMES.include?(method)
|
250
|
+
raise "needed_roles expected!" if needed_roles.empty?
|
251
|
+
@roles = needed_roles.flatten
|
252
|
+
for r in @roles
|
253
|
+
raise "wrong role '#{r}'! Must be a symbol " unless r.is_a?(Symbol)
|
254
|
+
end
|
255
|
+
@path = path
|
256
|
+
if path != :all
|
257
|
+
# path in regex ^#{path} wandeln ausser bei "/",
|
258
|
+
# dies darf keine Regex mit ^/ werden,
|
259
|
+
# da diese ja immer matchen wuerde
|
260
|
+
if path == "/"
|
261
|
+
@path = /^\/$/
|
262
|
+
else
|
263
|
+
@path = /^#{path}/
|
264
|
+
end
|
265
|
+
end
|
266
|
+
@method = method
|
267
|
+
end
|
268
|
+
|
269
|
+
|
270
|
+
# pruefen, ob Zugriff fuer angegebenen
|
271
|
+
# path / method fuer den current_user erlaubt ist
|
272
|
+
#
|
273
|
+
# user ist ein Object (meist der Loginuser),
|
274
|
+
# welcher die Methode 'has_role?(*roles)' besitzen muss.
|
275
|
+
# *roles ist dabei eine Array aus Symbolen
|
276
|
+
#
|
277
|
+
def fired?(path, method, user)
|
278
|
+
user = nil if user==:false # manche Authenticate-System setzen den user auf :false
|
279
|
+
if @path!=:all && !(@path =~ path)
|
280
|
+
return false
|
281
|
+
end
|
282
|
+
|
283
|
+
if @method!=:all && @method != method
|
284
|
+
return false
|
285
|
+
end
|
286
|
+
|
287
|
+
# ist jetzt role :all, dann prinzipiell Zugriff erlaubt
|
288
|
+
return true if @roles.first == :all
|
289
|
+
|
290
|
+
if user && user.has_role?(*@roles)
|
291
|
+
return true
|
292
|
+
end
|
293
|
+
false
|
294
|
+
end
|
295
|
+
|
296
|
+
|
297
|
+
def to_s
|
298
|
+
"PathAccesRule[#{@path}, #{@method}, #{@roles.join(' ')}#{@deny ? ' deny' : ''}]"
|
299
|
+
end
|
300
|
+
|
301
|
+
end
|
302
|
+
|
303
|
+
|
304
|
+
|
305
|
+
class ModelAccessRule
|
306
|
+
attr_reader :clazz, :access_type, :role, :block
|
307
|
+
|
308
|
+
|
309
|
+
# erzeugt neue Object-Zugriffsregel
|
310
|
+
#
|
311
|
+
# clazz Model-Klassenname oder :all fuer alle
|
312
|
+
# access_type Zugriffsart (:create, :update, :destroy, :all o.A. selbst definierte Typem)
|
313
|
+
# roles Aufzählung der erforderliche Rolen (:all für ist egal),
|
314
|
+
# hier ist auch ein Array von Symbolen möglich
|
315
|
+
# block optionaler Block, wird mit model und user aufgerufen und muss true oder false liefern
|
316
|
+
# hier ein Beispiel mit Block:
|
317
|
+
# <code>
|
318
|
+
# # Regel, in der sich jeder User selbst aendern darf
|
319
|
+
# ModelAccessRule.new(User, :update, :all){|model,user| model.id==user.id}
|
320
|
+
# </code>
|
321
|
+
#
|
322
|
+
def initialize(clazz, access_type, *roles, &block)
|
323
|
+
raise "wrong clazz '#{clazz}'! Must be a Class or :all ." unless clazz==:all or clazz.is_a?(Class)
|
324
|
+
raise "wrong access_type '#{ access_type}'! Must be a Symbol ." unless access_type.is_a?(Symbol)
|
325
|
+
@roles = roles.flatten
|
326
|
+
for r in @roles
|
327
|
+
raise "wrong role '#{r}'! Must be a symbol " unless r.is_a?(Symbol)
|
328
|
+
end
|
329
|
+
@clazz = clazz.instance_of?(Symbol) ? clazz : clazz.to_s
|
330
|
+
@access_type = access_type
|
331
|
+
@block = block
|
332
|
+
end
|
333
|
+
|
334
|
+
# liefert true, wenn zugriff fuer das angegebene model mit
|
335
|
+
# der Zugriffsart perm für das security_object hat
|
336
|
+
#
|
337
|
+
# model des zupruefende ModelObject
|
338
|
+
# perm gewunschte Zugriffsart (Symbol :create, :update, :destroy)
|
339
|
+
#
|
340
|
+
# user ist ein User-Object (meist der Loginuser),
|
341
|
+
# welcher die Methode 'has_role?(*roles)' besitzen muss.
|
342
|
+
# *roles ist dabei eine Array aus Symbolen
|
343
|
+
#
|
344
|
+
#
|
345
|
+
def has_access? model, perm, user
|
346
|
+
user = nil if user==:false # manche Authenticate-System setzen den user auf :false
|
347
|
+
m_class = model.instance_of?(Class) ? model : model.class
|
348
|
+
if @clazz!=m_class.to_s && @clazz!=:all
|
349
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why #{@clazz}!=#{model.class.to_s} && #{@clazz}!=:all")
|
350
|
+
return false
|
351
|
+
end
|
352
|
+
|
353
|
+
if @access_type!=:all && @access_type!=perm
|
354
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why #{@access_type}!=:all && #{@access_type}!=#{perm}")
|
355
|
+
return false
|
356
|
+
end
|
357
|
+
|
358
|
+
if @roles.first!=:all && (user.nil? || !user.has_role?(*@roles))
|
359
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why #{@roles.first}!=:all && #{!user.has_role?(*@roles)}")
|
360
|
+
return false
|
361
|
+
end
|
362
|
+
|
363
|
+
if @block
|
364
|
+
unless @block.call(model, user)
|
365
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why block return false")
|
366
|
+
return false
|
367
|
+
end
|
368
|
+
end
|
369
|
+
true
|
370
|
+
end
|
371
|
+
|
372
|
+
def to_s
|
373
|
+
"ModelAccessRule[#{@clazz}, #{@access_type}, #{@roles.join(' ')}]"
|
374
|
+
end
|
375
|
+
|
376
|
+
end
|
377
|
+
|
378
|
+
|
379
|
+
# ActiveRecord erweitern mit
|
380
|
+
# Sicherheits-Check
|
381
|
+
#
|
382
|
+
# class ActiveRecord::Base
|
383
|
+
# before_create {|model| SecurityModule::SecurityService.check_model_access model, :create }
|
384
|
+
# before_update {|model| SecurityModule::SecurityService.check_model_access model, :update }
|
385
|
+
# before_destroy{|model| SecurityModule::SecurityService.check_model_access model, :destroy }
|
386
|
+
# end
|
387
|
+
|
388
|
+
|
389
|
+
end
|
data/license.txt
ADDED
@@ -0,0 +1,165 @@
|
|
1
|
+
GNU LESSER GENERAL PUBLIC LICENSE
|
2
|
+
Version 3, 29 June 2007
|
3
|
+
|
4
|
+
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
5
|
+
Everyone is permitted to copy and distribute verbatim copies
|
6
|
+
of this license document, but changing it is not allowed.
|
7
|
+
|
8
|
+
|
9
|
+
This version of the GNU Lesser General Public License incorporates
|
10
|
+
the terms and conditions of version 3 of the GNU General Public
|
11
|
+
License, supplemented by the additional permissions listed below.
|
12
|
+
|
13
|
+
0. Additional Definitions.
|
14
|
+
|
15
|
+
As used herein, "this License" refers to version 3 of the GNU Lesser
|
16
|
+
General Public License, and the "GNU GPL" refers to version 3 of the GNU
|
17
|
+
General Public License.
|
18
|
+
|
19
|
+
"The Library" refers to a covered work governed by this License,
|
20
|
+
other than an Application or a Combined Work as defined below.
|
21
|
+
|
22
|
+
An "Application" is any work that makes use of an interface provided
|
23
|
+
by the Library, but which is not otherwise based on the Library.
|
24
|
+
Defining a subclass of a class defined by the Library is deemed a mode
|
25
|
+
of using an interface provided by the Library.
|
26
|
+
|
27
|
+
A "Combined Work" is a work produced by combining or linking an
|
28
|
+
Application with the Library. The particular version of the Library
|
29
|
+
with which the Combined Work was made is also called the "Linked
|
30
|
+
Version".
|
31
|
+
|
32
|
+
The "Minimal Corresponding Source" for a Combined Work means the
|
33
|
+
Corresponding Source for the Combined Work, excluding any source code
|
34
|
+
for portions of the Combined Work that, considered in isolation, are
|
35
|
+
based on the Application, and not on the Linked Version.
|
36
|
+
|
37
|
+
The "Corresponding Application Code" for a Combined Work means the
|
38
|
+
object code and/or source code for the Application, including any data
|
39
|
+
and utility programs needed for reproducing the Combined Work from the
|
40
|
+
Application, but excluding the System Libraries of the Combined Work.
|
41
|
+
|
42
|
+
1. Exception to Section 3 of the GNU GPL.
|
43
|
+
|
44
|
+
You may convey a covered work under sections 3 and 4 of this License
|
45
|
+
without being bound by section 3 of the GNU GPL.
|
46
|
+
|
47
|
+
2. Conveying Modified Versions.
|
48
|
+
|
49
|
+
If you modify a copy of the Library, and, in your modifications, a
|
50
|
+
facility refers to a function or data to be supplied by an Application
|
51
|
+
that uses the facility (other than as an argument passed when the
|
52
|
+
facility is invoked), then you may convey a copy of the modified
|
53
|
+
version:
|
54
|
+
|
55
|
+
a) under this License, provided that you make a good faith effort to
|
56
|
+
ensure that, in the event an Application does not supply the
|
57
|
+
function or data, the facility still operates, and performs
|
58
|
+
whatever part of its purpose remains meaningful, or
|
59
|
+
|
60
|
+
b) under the GNU GPL, with none of the additional permissions of
|
61
|
+
this License applicable to that copy.
|
62
|
+
|
63
|
+
3. Object Code Incorporating Material from Library Header Files.
|
64
|
+
|
65
|
+
The object code form of an Application may incorporate material from
|
66
|
+
a header file that is part of the Library. You may convey such object
|
67
|
+
code under terms of your choice, provided that, if the incorporated
|
68
|
+
material is not limited to numerical parameters, data structure
|
69
|
+
layouts and accessors, or small macros, inline functions and templates
|
70
|
+
(ten or fewer lines in length), you do both of the following:
|
71
|
+
|
72
|
+
a) Give prominent notice with each copy of the object code that the
|
73
|
+
Library is used in it and that the Library and its use are
|
74
|
+
covered by this License.
|
75
|
+
|
76
|
+
b) Accompany the object code with a copy of the GNU GPL and this license
|
77
|
+
document.
|
78
|
+
|
79
|
+
4. Combined Works.
|
80
|
+
|
81
|
+
You may convey a Combined Work under terms of your choice that,
|
82
|
+
taken together, effectively do not restrict modification of the
|
83
|
+
portions of the Library contained in the Combined Work and reverse
|
84
|
+
engineering for debugging such modifications, if you also do each of
|
85
|
+
the following:
|
86
|
+
|
87
|
+
a) Give prominent notice with each copy of the Combined Work that
|
88
|
+
the Library is used in it and that the Library and its use are
|
89
|
+
covered by this License.
|
90
|
+
|
91
|
+
b) Accompany the Combined Work with a copy of the GNU GPL and this license
|
92
|
+
document.
|
93
|
+
|
94
|
+
c) For a Combined Work that displays copyright notices during
|
95
|
+
execution, include the copyright notice for the Library among
|
96
|
+
these notices, as well as a reference directing the user to the
|
97
|
+
copies of the GNU GPL and this license document.
|
98
|
+
|
99
|
+
d) Do one of the following:
|
100
|
+
|
101
|
+
0) Convey the Minimal Corresponding Source under the terms of this
|
102
|
+
License, and the Corresponding Application Code in a form
|
103
|
+
suitable for, and under terms that permit, the user to
|
104
|
+
recombine or relink the Application with a modified version of
|
105
|
+
the Linked Version to produce a modified Combined Work, in the
|
106
|
+
manner specified by section 6 of the GNU GPL for conveying
|
107
|
+
Corresponding Source.
|
108
|
+
|
109
|
+
1) Use a suitable shared library mechanism for linking with the
|
110
|
+
Library. A suitable mechanism is one that (a) uses at run time
|
111
|
+
a copy of the Library already present on the user's computer
|
112
|
+
system, and (b) will operate properly with a modified version
|
113
|
+
of the Library that is interface-compatible with the Linked
|
114
|
+
Version.
|
115
|
+
|
116
|
+
e) Provide Installation Information, but only if you would otherwise
|
117
|
+
be required to provide such information under section 6 of the
|
118
|
+
GNU GPL, and only to the extent that such information is
|
119
|
+
necessary to install and execute a modified version of the
|
120
|
+
Combined Work produced by recombining or relinking the
|
121
|
+
Application with a modified version of the Linked Version. (If
|
122
|
+
you use option 4d0, the Installation Information must accompany
|
123
|
+
the Minimal Corresponding Source and Corresponding Application
|
124
|
+
Code. If you use option 4d1, you must provide the Installation
|
125
|
+
Information in the manner specified by section 6 of the GNU GPL
|
126
|
+
for conveying Corresponding Source.)
|
127
|
+
|
128
|
+
5. Combined Libraries.
|
129
|
+
|
130
|
+
You may place library facilities that are a work based on the
|
131
|
+
Library side by side in a single library together with other library
|
132
|
+
facilities that are not Applications and are not covered by this
|
133
|
+
License, and convey such a combined library under terms of your
|
134
|
+
choice, if you do both of the following:
|
135
|
+
|
136
|
+
a) Accompany the combined library with a copy of the same work based
|
137
|
+
on the Library, uncombined with any other library facilities,
|
138
|
+
conveyed under the terms of this License.
|
139
|
+
|
140
|
+
b) Give prominent notice with the combined library that part of it
|
141
|
+
is a work based on the Library, and explaining where to find the
|
142
|
+
accompanying uncombined form of the same work.
|
143
|
+
|
144
|
+
6. Revised Versions of the GNU Lesser General Public License.
|
145
|
+
|
146
|
+
The Free Software Foundation may publish revised and/or new versions
|
147
|
+
of the GNU Lesser General Public License from time to time. Such new
|
148
|
+
versions will be similar in spirit to the present version, but may
|
149
|
+
differ in detail to address new problems or concerns.
|
150
|
+
|
151
|
+
Each version is given a distinguishing version number. If the
|
152
|
+
Library as you received it specifies that a certain numbered version
|
153
|
+
of the GNU Lesser General Public License "or any later version"
|
154
|
+
applies to it, you have the option of following the terms and
|
155
|
+
conditions either of that published version or of any later version
|
156
|
+
published by the Free Software Foundation. If the Library as you
|
157
|
+
received it does not specify a version number of the GNU Lesser
|
158
|
+
General Public License, you may choose any version of the GNU Lesser
|
159
|
+
General Public License ever published by the Free Software Foundation.
|
160
|
+
|
161
|
+
If the Library as you received it specifies that a proxy can decide
|
162
|
+
whether future versions of the GNU Lesser General Public License shall
|
163
|
+
apply, that proxy's public statement of acceptance of any version is
|
164
|
+
permanent authorization for you to choose that version for the
|
165
|
+
Library.
|
@@ -0,0 +1,30 @@
|
|
1
|
+
# derzeit genutzte Rollen:
|
2
|
+
# * ADMIN
|
3
|
+
# * EDITOR
|
4
|
+
# * APPROVER
|
5
|
+
# * USER
|
6
|
+
|
7
|
+
|
8
|
+
#
|
9
|
+
# Pfad-Zugriffsregeln
|
10
|
+
# Aufbau:
|
11
|
+
# Path : URL-Pfad, wird als regex ausgewertet
|
12
|
+
# Methode : :all, :get, :put, :post, :delete oder :edit
|
13
|
+
# roles :Liste der berechtigten Rollen (es können mehrere Rollen durch Komma getrennt angegeben werden)
|
14
|
+
#
|
15
|
+
grant_path '/', :get, :all
|
16
|
+
grant_path :all, :all, :ADMIN
|
17
|
+
deny_path '/user/lock', :user
|
18
|
+
|
19
|
+
#
|
20
|
+
# Model-Object-Zugriffsregeln
|
21
|
+
# Aufbau:
|
22
|
+
# Model-Klasse : Klasse des Models
|
23
|
+
# Zugriffsart : frei definierbares Symbol, empfohlen :update, :create, :destroy
|
24
|
+
# Roles : Aufzählung der Rollen
|
25
|
+
# Block : optionaler Block, diesem wird die Model-Instance und der User als Parameter bereitgestellt
|
26
|
+
|
27
|
+
grant_model String, :view, :all
|
28
|
+
grant_model String, :view, :ADMIN, :EDITOR
|
29
|
+
grant_model String, :update, :EDITOR do |model, user| model == user.name end
|
30
|
+
|
@@ -0,0 +1,26 @@
|
|
1
|
+
class ApplicationController < ActionController::Base
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
include Tuersteher::ControllerExtensions
|
6
|
+
before_filter :check_access # methode is from Tuersteher::ControllerExtensions
|
7
|
+
|
8
|
+
# This method need Tuersteher for his rules-check
|
9
|
+
# It should return a User-Object, which have a method "has_role?"
|
10
|
+
#
|
11
|
+
# This is here a dummy Stub-Implementation
|
12
|
+
def current_user
|
13
|
+
user = Object.new
|
14
|
+
def user.has_role?(*roles)
|
15
|
+
true
|
16
|
+
end
|
17
|
+
user
|
18
|
+
end
|
19
|
+
|
20
|
+
# This Method is called from Tuersteher if access are denied (no grant rules fired)
|
21
|
+
# stub Authentication-Methode
|
22
|
+
def access_denied
|
23
|
+
redirect_to "/"
|
24
|
+
end
|
25
|
+
|
26
|
+
end
|
data/tuersteher.gemspec
ADDED
@@ -0,0 +1,47 @@
|
|
1
|
+
# Generated by jeweler
|
2
|
+
# DO NOT EDIT THIS FILE DIRECTLY
|
3
|
+
# Instead, edit Jeweler::Tasks in Rakefile, and run the gemspec command
|
4
|
+
# -*- encoding: utf-8 -*-
|
5
|
+
|
6
|
+
Gem::Specification.new do |s|
|
7
|
+
s.name = %q{tuersteher}
|
8
|
+
s.version = "0.0.6"
|
9
|
+
|
10
|
+
s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
|
11
|
+
s.authors = ["Bernd Ledig"]
|
12
|
+
s.date = %q{2010-02-20}
|
13
|
+
s.description = %q{Security-Layer for Rails-Application acts like a firewall.}
|
14
|
+
s.email = %q{bernd@ledig.info}
|
15
|
+
s.extra_rdoc_files = [
|
16
|
+
"README.rdoc"
|
17
|
+
]
|
18
|
+
s.files = [
|
19
|
+
".gitignore",
|
20
|
+
"Manifest",
|
21
|
+
"README.rdoc",
|
22
|
+
"Rakefile",
|
23
|
+
"VERSION",
|
24
|
+
"init.rb",
|
25
|
+
"lib/tuersteher.rb",
|
26
|
+
"license.txt",
|
27
|
+
"samples/access_rules.rb",
|
28
|
+
"samples/application_controller.rb",
|
29
|
+
"tuersteher.gemspec"
|
30
|
+
]
|
31
|
+
s.homepage = %q{http://github.com/bledig/tuersteher}
|
32
|
+
s.rdoc_options = ["--charset=UTF-8"]
|
33
|
+
s.require_paths = ["lib"]
|
34
|
+
s.rubygems_version = %q{1.3.5}
|
35
|
+
s.summary = %q{Security-Layer for Rails-Application}
|
36
|
+
|
37
|
+
if s.respond_to? :specification_version then
|
38
|
+
current_version = Gem::Specification::CURRENT_SPECIFICATION_VERSION
|
39
|
+
s.specification_version = 3
|
40
|
+
|
41
|
+
if Gem::Version.new(Gem::RubyGemsVersion) >= Gem::Version.new('1.2.0') then
|
42
|
+
else
|
43
|
+
end
|
44
|
+
else
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
metadata
ADDED
@@ -0,0 +1,65 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: tuersteher
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.0.6
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Bernd Ledig
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
|
12
|
+
date: 2010-02-20 00:00:00 +01:00
|
13
|
+
default_executable:
|
14
|
+
dependencies: []
|
15
|
+
|
16
|
+
description: Security-Layer for Rails-Application acts like a firewall.
|
17
|
+
email: bernd@ledig.info
|
18
|
+
executables: []
|
19
|
+
|
20
|
+
extensions: []
|
21
|
+
|
22
|
+
extra_rdoc_files:
|
23
|
+
- README.rdoc
|
24
|
+
files:
|
25
|
+
- .gitignore
|
26
|
+
- Manifest
|
27
|
+
- README.rdoc
|
28
|
+
- Rakefile
|
29
|
+
- VERSION
|
30
|
+
- init.rb
|
31
|
+
- lib/tuersteher.rb
|
32
|
+
- license.txt
|
33
|
+
- samples/access_rules.rb
|
34
|
+
- samples/application_controller.rb
|
35
|
+
- tuersteher.gemspec
|
36
|
+
has_rdoc: true
|
37
|
+
homepage: http://github.com/bledig/tuersteher
|
38
|
+
licenses: []
|
39
|
+
|
40
|
+
post_install_message:
|
41
|
+
rdoc_options:
|
42
|
+
- --charset=UTF-8
|
43
|
+
require_paths:
|
44
|
+
- lib
|
45
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
46
|
+
requirements:
|
47
|
+
- - ">="
|
48
|
+
- !ruby/object:Gem::Version
|
49
|
+
version: "0"
|
50
|
+
version:
|
51
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
52
|
+
requirements:
|
53
|
+
- - ">="
|
54
|
+
- !ruby/object:Gem::Version
|
55
|
+
version: "0"
|
56
|
+
version:
|
57
|
+
requirements: []
|
58
|
+
|
59
|
+
rubyforge_project:
|
60
|
+
rubygems_version: 1.3.5
|
61
|
+
signing_key:
|
62
|
+
specification_version: 3
|
63
|
+
summary: Security-Layer for Rails-Application
|
64
|
+
test_files: []
|
65
|
+
|