tuersteher 0.0.6
Sign up to get free protection for your applications and to get access to all the features.
- data/.gitignore +2 -0
- data/Manifest +9 -0
- data/README.rdoc +43 -0
- data/Rakefile +20 -0
- data/VERSION +1 -0
- data/init.rb +2 -0
- data/lib/tuersteher.rb +389 -0
- data/license.txt +165 -0
- data/samples/access_rules.rb +30 -0
- data/samples/application_controller.rb +26 -0
- data/tuersteher.gemspec +47 -0
- metadata +65 -0
data/.gitignore
ADDED
data/Manifest
ADDED
data/README.rdoc
ADDED
@@ -0,0 +1,43 @@
|
|
1
|
+
|
2
|
+
= Tuersteher
|
3
|
+
Security-Layer for Rails-Application acts like a firewall.
|
4
|
+
It's check your URL's or Modells to have the rights for this.
|
5
|
+
|
6
|
+
== Install
|
7
|
+
|
8
|
+
gem install bledig-tuersteher --source http://gems.github.org
|
9
|
+
|
10
|
+
|
11
|
+
== Usage
|
12
|
+
|
13
|
+
Create in your Rails-Application the rules-file "config/access_rules.rb"
|
14
|
+
(or copy the sample from samples-directory and modify)
|
15
|
+
|
16
|
+
Here is as small sample for "config/access_rules.rb"
|
17
|
+
|
18
|
+
# Path-Acces-Rules
|
19
|
+
grant_path '/', :get, :all
|
20
|
+
grant_path '/admin-area/', :all, :ADMIN
|
21
|
+
|
22
|
+
# Model-Acces-Rules
|
23
|
+
grant_model Product, :view, :all
|
24
|
+
grant_model Product, :update, :EDITOR do |product, current_user|
|
25
|
+
product.owner_id == current_user.id
|
26
|
+
end
|
27
|
+
|
28
|
+
Then extend your ApplicationController with:
|
29
|
+
|
30
|
+
include Tuersteher::ControllerExtensions
|
31
|
+
before_filter :check_access # methode is from Tuersteher::ControllerExtensions
|
32
|
+
|
33
|
+
Check if your authendicate-system has implemented the methods:
|
34
|
+
|
35
|
+
* current_user
|
36
|
+
* access_denied
|
37
|
+
|
38
|
+
If not, just implemen it (see samples/application_controller.rb)
|
39
|
+
|
40
|
+
== License
|
41
|
+
|
42
|
+
LGPL V3 (see license.txt)
|
43
|
+
|
data/Rakefile
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
# Rakefile
|
2
|
+
require 'rubygems'
|
3
|
+
require 'rake'
|
4
|
+
|
5
|
+
begin
|
6
|
+
require 'jeweler'
|
7
|
+
Jeweler::Tasks.new do |gemspec|
|
8
|
+
gemspec.name = "tuersteher"
|
9
|
+
gemspec.summary = "Security-Layer for Rails-Application"
|
10
|
+
gemspec.description = "Security-Layer for Rails-Application acts like a firewall."
|
11
|
+
gemspec.email = "bernd@ledig.info"
|
12
|
+
gemspec.homepage = "http://github.com/bledig/tuersteher"
|
13
|
+
gemspec.authors = ["Bernd Ledig"]
|
14
|
+
end
|
15
|
+
rescue LoadError
|
16
|
+
puts "Jeweler not available. Install it with: sudo gem install jeweler -s http://gems.github.com"
|
17
|
+
end
|
18
|
+
|
19
|
+
Dir["#{File.dirname(__FILE__)}/tasks/*.rake"].sort.each { |ext| load ext }
|
20
|
+
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
0.0.6
|
data/init.rb
ADDED
data/lib/tuersteher.rb
ADDED
@@ -0,0 +1,389 @@
|
|
1
|
+
# Module, welches AccesRules fuer Controller/Actions und
|
2
|
+
# Model-Object umsetzt.
|
3
|
+
#
|
4
|
+
# Die Regeln werden aus der Datei "config/acces_rules.rb" geladen
|
5
|
+
#
|
6
|
+
# Author: Bernd Ledig
|
7
|
+
#
|
8
|
+
|
9
|
+
require 'singleton'
|
10
|
+
|
11
|
+
module Tuersteher
|
12
|
+
|
13
|
+
# Logger to log messages with timestamp and severity
|
14
|
+
class TLogger < Logger
|
15
|
+
@@logger = nil
|
16
|
+
|
17
|
+
def format_message(severity, timestamp, progname, msg)
|
18
|
+
"#{timestamp.to_formatted_s(:db)} #{severity} #{msg}\n"
|
19
|
+
end
|
20
|
+
|
21
|
+
def self.logger
|
22
|
+
return @@logger if @@logger
|
23
|
+
@@logger = self.new(File.join(Rails.root, 'log', 'tuersteher.log'), 3)
|
24
|
+
@@logger.level = INFO if Rails.env != 'development'
|
25
|
+
@@logger
|
26
|
+
end
|
27
|
+
|
28
|
+
def self.logger= logger
|
29
|
+
@@logger = logger
|
30
|
+
end
|
31
|
+
end
|
32
|
+
|
33
|
+
class AccessRulesStorage
|
34
|
+
include Singleton
|
35
|
+
|
36
|
+
attr_accessor :rules_config_file # to set own access_rules-path
|
37
|
+
|
38
|
+
DEFAULT_RULES_CONFIG_FILE = File.join(Rails.root, 'config', 'access_rules.rb')
|
39
|
+
|
40
|
+
def initialize
|
41
|
+
@path_rules = []
|
42
|
+
@model_rules = []
|
43
|
+
end
|
44
|
+
|
45
|
+
def path_rules
|
46
|
+
read_rules unless @was_read
|
47
|
+
@path_rules
|
48
|
+
end
|
49
|
+
|
50
|
+
def model_rules
|
51
|
+
read_rules unless @was_read
|
52
|
+
@model_rules
|
53
|
+
end
|
54
|
+
|
55
|
+
|
56
|
+
# Laden der AccesRules aus den Dateien
|
57
|
+
# config/access_rules.rb
|
58
|
+
def read_rules
|
59
|
+
config_file = @rules_config_file || DEFAULT_RULES_CONFIG_FILE
|
60
|
+
rules_file = File.new config_file
|
61
|
+
if @last_mtime.nil? || rules_file.mtime > @last_mtime
|
62
|
+
@last_mtime = rules_file.mtime
|
63
|
+
content = rules_file.read
|
64
|
+
eval content
|
65
|
+
Tuersteher::TLogger.logger.info "Tuersteher::AccessRulesStorage: #{@path_rules.size} path-rules and #{@model_rules.size} model-rules"
|
66
|
+
end
|
67
|
+
rules_file.close
|
68
|
+
@was_read = true
|
69
|
+
end
|
70
|
+
|
71
|
+
# definiert HTTP-Pfad-basierende Zugriffsregel
|
72
|
+
#
|
73
|
+
# path: :all fuer beliebig, sonst String mit der http-path beginnen muss,
|
74
|
+
# wird als RegEX-Ausdruck ausgewertet
|
75
|
+
# method: http-Methode, es sind hier erlaubt :get, :put, :delete, :post, :all
|
76
|
+
# accepted_roles: Aufzaehlung der erfoderlichen Rolen (oder-Verknuepfung), es sind nur Symbole zulaessig
|
77
|
+
# hier ist auch ein Array von Symbolen möglich
|
78
|
+
def grant_path url_path, http_methode, *accepted_roles
|
79
|
+
@path_rules << PathAccessRule.new(url_path, http_methode, *accepted_roles)
|
80
|
+
end
|
81
|
+
|
82
|
+
# definiert HTTP-Pfad-basierende Ablehnungsregel
|
83
|
+
#
|
84
|
+
# path: :all fuer beliebig, sonst String mit der http-path beginnen muss,
|
85
|
+
# wird als RegEX-Ausdruck ausgewertet
|
86
|
+
# method: http-Methode, es sind hier erlaubt :get, :put, :delete, :post, :all
|
87
|
+
# accepted_roles: Aufzaehlung der erfoderlichen Rolen (oder-Verknuepfung), es sind nur Symbole zulaessig
|
88
|
+
# hier ist auch ein Array von Symbolen möglich
|
89
|
+
def deny_path url_path, http_methode, *accepted_roles
|
90
|
+
rule = PathAccessRule.new(url_path, http_methode, *accepted_roles)
|
91
|
+
rule.deny = true
|
92
|
+
@path_rules << rule
|
93
|
+
end
|
94
|
+
|
95
|
+
# definiert Model-basierende Zugriffsregel
|
96
|
+
#
|
97
|
+
# model_class: Model-Klassenname oder :all fuer alle
|
98
|
+
# access_type: Zugriffsart (:create, :update, :destroy, :all o.A. selbst definierte Typen)
|
99
|
+
# roles Aufzählung der erforderliche Rolen (:all für ist egal),
|
100
|
+
# hier ist auch ein Array von Symbolen möglich
|
101
|
+
# block optionaler Block, wird mit model und user aufgerufen und muss true oder false liefern
|
102
|
+
# hier ein Beispiel mit Block:
|
103
|
+
# <code>
|
104
|
+
# # Regel, in der sich jeder User selbst aendern darf
|
105
|
+
# grant_model(User, :update, :all){|model,user| model.id==user.id}
|
106
|
+
# </code>
|
107
|
+
#
|
108
|
+
def grant_model model_class, access_type, *roles, &block
|
109
|
+
@model_rules << ModelAccessRule.new(model_class, access_type, *roles, &block)
|
110
|
+
end
|
111
|
+
|
112
|
+
end
|
113
|
+
|
114
|
+
class AccessRules
|
115
|
+
|
116
|
+
# Pruefen Zugriff fuer eine Web-action
|
117
|
+
# user User, für den der Zugriff geprüft werden soll (muss Methode has_role? haben)
|
118
|
+
# path Pfad der Webresource (String)
|
119
|
+
# method http-Methode (:get, :put, :delete, :post), default ist :get
|
120
|
+
#
|
121
|
+
def self.path_access?(user, path, method = :get)
|
122
|
+
rule = AccessRulesStorage.instance.path_rules.detect do |r|
|
123
|
+
r.fired?(path, method, user)
|
124
|
+
end
|
125
|
+
if Tuersteher::TLogger.logger.debug?
|
126
|
+
if rule.nil?
|
127
|
+
s = 'denied'
|
128
|
+
elsif rule.deny
|
129
|
+
s = "denied with #{rule}"
|
130
|
+
else
|
131
|
+
s = "granted with #{rule}"
|
132
|
+
end
|
133
|
+
Tuersteher::TLogger.logger.debug("Tuersteher: path_access?(#{path}, #{method}) => #{s}")
|
134
|
+
end
|
135
|
+
rule!=nil && !rule.deny
|
136
|
+
end
|
137
|
+
|
138
|
+
# Pruefen Zugriff auf ein Model-Object
|
139
|
+
#
|
140
|
+
# user User, für den der Zugriff geprüft werden soll (muss Methode has_role? haben)
|
141
|
+
# model das Model-Object
|
142
|
+
# permission das geforderte Zugriffsrecht (:create, :update, :destroy, :get)
|
143
|
+
#
|
144
|
+
# liefert true/false
|
145
|
+
def self.model_access? user, model, permission
|
146
|
+
raise "Wrong call! Use: model_access(model-instance-or-class, permission)" unless permission.is_a? Symbol
|
147
|
+
return false unless model
|
148
|
+
|
149
|
+
access = AccessRulesStorage.instance.model_rules.detect do |rule|
|
150
|
+
rule.has_access? model, permission, user
|
151
|
+
end
|
152
|
+
if Tuersteher::TLogger.logger.debug?
|
153
|
+
if model.instance_of?(Class)
|
154
|
+
Tuersteher::TLogger.logger.debug("Tuersteher: model_access?(#{model}, #{permission}) => #{access ? access : 'denied'}")
|
155
|
+
else
|
156
|
+
Tuersteher::TLogger.logger.debug("Tuersteher: model_access?(#{model.class}(#{model.respond_to?(:id) ? model.id : model.object_id }), #{permission}) => #{access ? access : 'denied'}")
|
157
|
+
end
|
158
|
+
end
|
159
|
+
access!=nil
|
160
|
+
end
|
161
|
+
end
|
162
|
+
|
163
|
+
|
164
|
+
|
165
|
+
# Module zum Include in Controllers
|
166
|
+
# Dieser muss die folgenden Methoden bereitstellen:
|
167
|
+
#
|
168
|
+
# current_user : akt. Login-User
|
169
|
+
# access_denied : Methode aus dem authenticated_system, welche ein redirect zum login auslöst
|
170
|
+
#
|
171
|
+
# Der Loginuser muss fuer die hier benoetigte Funktionalitaet
|
172
|
+
# die Methode:
|
173
|
+
# has_role?(*roles) # roles is Array of Symbols
|
174
|
+
# besitzen.
|
175
|
+
#
|
176
|
+
# Beispiel der Einbindung in den ApplicationController
|
177
|
+
# include Tuersteher::ControllerExtensions
|
178
|
+
# before_filter :check_access # methode is from Tuersteher::ControllerExtensions
|
179
|
+
#
|
180
|
+
module ControllerExtensions
|
181
|
+
|
182
|
+
|
183
|
+
# Pruefen Zugriff fuer eine Web-action
|
184
|
+
#
|
185
|
+
# path Pfad der Webresource (String oder Hash mit Options)
|
186
|
+
# method http-Methode (:get, :put, :delete, :post), default ist :get
|
187
|
+
#
|
188
|
+
def path_access?(path, method = :get)
|
189
|
+
|
190
|
+
# ist path eine Hash (also der alte Stil mit :controller=> .., :action=>..)
|
191
|
+
# dann diese in ein http-path wandeln
|
192
|
+
path = url_for(path.merge(:only_path => true)) if path.instance_of?(Hash)
|
193
|
+
|
194
|
+
AccessRules.path_access? current_user, path, method
|
195
|
+
end
|
196
|
+
|
197
|
+
# Pruefen Zugriff auf ein Model-Object
|
198
|
+
#
|
199
|
+
# model das Model-Object
|
200
|
+
# permission das geforderte Zugriffsrecht (:create, :update, :destroy, :get)
|
201
|
+
#
|
202
|
+
# liefert true/false
|
203
|
+
def model_access? model, permission
|
204
|
+
AccessRules.model_access? current_user, model, permission
|
205
|
+
end
|
206
|
+
|
207
|
+
def self.included(base)
|
208
|
+
base.class_eval do
|
209
|
+
# Methoden path_access? und model_access? auch als Helper fuer die Views bereitstellen
|
210
|
+
helper_method :path_access?, :model_access?
|
211
|
+
end
|
212
|
+
end
|
213
|
+
|
214
|
+
protected
|
215
|
+
|
216
|
+
# Pruefen, ob Zugriff des current_user
|
217
|
+
# fuer aktullen Request erlaubt ist
|
218
|
+
def check_access
|
219
|
+
|
220
|
+
# im dev-mode rules bei jeden request auf Änderungen prüfen
|
221
|
+
AccessRulesStorage.instance.read_rules if Rails.env=='development'
|
222
|
+
|
223
|
+
unless path_access?(request.request_uri, request.method)
|
224
|
+
msg = "Tuersteher#check_access: access denied for #{request.request_uri} :#{request.method}"
|
225
|
+
Tuersteher::TLogger.logger.warn msg
|
226
|
+
logger.warn msg # log message also for Rails-Default logger
|
227
|
+
access_denied # Methode aus dem authenticated_system, welche ein redirect zum login auslöst
|
228
|
+
end
|
229
|
+
end
|
230
|
+
|
231
|
+
end
|
232
|
+
|
233
|
+
|
234
|
+
class PathAccessRule
|
235
|
+
attr_reader :path, :method, :roles
|
236
|
+
attr_accessor :deny
|
237
|
+
|
238
|
+
METHOD_NAMES = [:get, :edit, :put, :delete, :post, :all].freeze
|
239
|
+
|
240
|
+
|
241
|
+
# Zugriffsregel
|
242
|
+
#
|
243
|
+
# path :all fuer beliebig, sonst String mit der http-path beginnen muss
|
244
|
+
# method http-Methode, es sind hier erlaubt :get, :put, :delete, :post, :all
|
245
|
+
# needed_roles Aufzaehlung der erfoderlichen Rolen (oder-Verknuepfung), es sind nur Symbole zulaessig
|
246
|
+
#
|
247
|
+
def initialize(path, method, *needed_roles)
|
248
|
+
raise "wrong path '#{path}'! Must be a String or :all ." unless path==:all or path.is_a?(String)
|
249
|
+
raise "wrong method '#{method}'! Must be #{METHOD_NAMES.join(', ')} !" unless METHOD_NAMES.include?(method)
|
250
|
+
raise "needed_roles expected!" if needed_roles.empty?
|
251
|
+
@roles = needed_roles.flatten
|
252
|
+
for r in @roles
|
253
|
+
raise "wrong role '#{r}'! Must be a symbol " unless r.is_a?(Symbol)
|
254
|
+
end
|
255
|
+
@path = path
|
256
|
+
if path != :all
|
257
|
+
# path in regex ^#{path} wandeln ausser bei "/",
|
258
|
+
# dies darf keine Regex mit ^/ werden,
|
259
|
+
# da diese ja immer matchen wuerde
|
260
|
+
if path == "/"
|
261
|
+
@path = /^\/$/
|
262
|
+
else
|
263
|
+
@path = /^#{path}/
|
264
|
+
end
|
265
|
+
end
|
266
|
+
@method = method
|
267
|
+
end
|
268
|
+
|
269
|
+
|
270
|
+
# pruefen, ob Zugriff fuer angegebenen
|
271
|
+
# path / method fuer den current_user erlaubt ist
|
272
|
+
#
|
273
|
+
# user ist ein Object (meist der Loginuser),
|
274
|
+
# welcher die Methode 'has_role?(*roles)' besitzen muss.
|
275
|
+
# *roles ist dabei eine Array aus Symbolen
|
276
|
+
#
|
277
|
+
def fired?(path, method, user)
|
278
|
+
user = nil if user==:false # manche Authenticate-System setzen den user auf :false
|
279
|
+
if @path!=:all && !(@path =~ path)
|
280
|
+
return false
|
281
|
+
end
|
282
|
+
|
283
|
+
if @method!=:all && @method != method
|
284
|
+
return false
|
285
|
+
end
|
286
|
+
|
287
|
+
# ist jetzt role :all, dann prinzipiell Zugriff erlaubt
|
288
|
+
return true if @roles.first == :all
|
289
|
+
|
290
|
+
if user && user.has_role?(*@roles)
|
291
|
+
return true
|
292
|
+
end
|
293
|
+
false
|
294
|
+
end
|
295
|
+
|
296
|
+
|
297
|
+
def to_s
|
298
|
+
"PathAccesRule[#{@path}, #{@method}, #{@roles.join(' ')}#{@deny ? ' deny' : ''}]"
|
299
|
+
end
|
300
|
+
|
301
|
+
end
|
302
|
+
|
303
|
+
|
304
|
+
|
305
|
+
class ModelAccessRule
|
306
|
+
attr_reader :clazz, :access_type, :role, :block
|
307
|
+
|
308
|
+
|
309
|
+
# erzeugt neue Object-Zugriffsregel
|
310
|
+
#
|
311
|
+
# clazz Model-Klassenname oder :all fuer alle
|
312
|
+
# access_type Zugriffsart (:create, :update, :destroy, :all o.A. selbst definierte Typem)
|
313
|
+
# roles Aufzählung der erforderliche Rolen (:all für ist egal),
|
314
|
+
# hier ist auch ein Array von Symbolen möglich
|
315
|
+
# block optionaler Block, wird mit model und user aufgerufen und muss true oder false liefern
|
316
|
+
# hier ein Beispiel mit Block:
|
317
|
+
# <code>
|
318
|
+
# # Regel, in der sich jeder User selbst aendern darf
|
319
|
+
# ModelAccessRule.new(User, :update, :all){|model,user| model.id==user.id}
|
320
|
+
# </code>
|
321
|
+
#
|
322
|
+
def initialize(clazz, access_type, *roles, &block)
|
323
|
+
raise "wrong clazz '#{clazz}'! Must be a Class or :all ." unless clazz==:all or clazz.is_a?(Class)
|
324
|
+
raise "wrong access_type '#{ access_type}'! Must be a Symbol ." unless access_type.is_a?(Symbol)
|
325
|
+
@roles = roles.flatten
|
326
|
+
for r in @roles
|
327
|
+
raise "wrong role '#{r}'! Must be a symbol " unless r.is_a?(Symbol)
|
328
|
+
end
|
329
|
+
@clazz = clazz.instance_of?(Symbol) ? clazz : clazz.to_s
|
330
|
+
@access_type = access_type
|
331
|
+
@block = block
|
332
|
+
end
|
333
|
+
|
334
|
+
# liefert true, wenn zugriff fuer das angegebene model mit
|
335
|
+
# der Zugriffsart perm für das security_object hat
|
336
|
+
#
|
337
|
+
# model des zupruefende ModelObject
|
338
|
+
# perm gewunschte Zugriffsart (Symbol :create, :update, :destroy)
|
339
|
+
#
|
340
|
+
# user ist ein User-Object (meist der Loginuser),
|
341
|
+
# welcher die Methode 'has_role?(*roles)' besitzen muss.
|
342
|
+
# *roles ist dabei eine Array aus Symbolen
|
343
|
+
#
|
344
|
+
#
|
345
|
+
def has_access? model, perm, user
|
346
|
+
user = nil if user==:false # manche Authenticate-System setzen den user auf :false
|
347
|
+
m_class = model.instance_of?(Class) ? model : model.class
|
348
|
+
if @clazz!=m_class.to_s && @clazz!=:all
|
349
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why #{@clazz}!=#{model.class.to_s} && #{@clazz}!=:all")
|
350
|
+
return false
|
351
|
+
end
|
352
|
+
|
353
|
+
if @access_type!=:all && @access_type!=perm
|
354
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why #{@access_type}!=:all && #{@access_type}!=#{perm}")
|
355
|
+
return false
|
356
|
+
end
|
357
|
+
|
358
|
+
if @roles.first!=:all && (user.nil? || !user.has_role?(*@roles))
|
359
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why #{@roles.first}!=:all && #{!user.has_role?(*@roles)}")
|
360
|
+
return false
|
361
|
+
end
|
362
|
+
|
363
|
+
if @block
|
364
|
+
unless @block.call(model, user)
|
365
|
+
#Tuersteher::TLogger.logger.debug("#{to_s}.has_access? => false why block return false")
|
366
|
+
return false
|
367
|
+
end
|
368
|
+
end
|
369
|
+
true
|
370
|
+
end
|
371
|
+
|
372
|
+
def to_s
|
373
|
+
"ModelAccessRule[#{@clazz}, #{@access_type}, #{@roles.join(' ')}]"
|
374
|
+
end
|
375
|
+
|
376
|
+
end
|
377
|
+
|
378
|
+
|
379
|
+
# ActiveRecord erweitern mit
|
380
|
+
# Sicherheits-Check
|
381
|
+
#
|
382
|
+
# class ActiveRecord::Base
|
383
|
+
# before_create {|model| SecurityModule::SecurityService.check_model_access model, :create }
|
384
|
+
# before_update {|model| SecurityModule::SecurityService.check_model_access model, :update }
|
385
|
+
# before_destroy{|model| SecurityModule::SecurityService.check_model_access model, :destroy }
|
386
|
+
# end
|
387
|
+
|
388
|
+
|
389
|
+
end
|
data/license.txt
ADDED
@@ -0,0 +1,165 @@
|
|
1
|
+
GNU LESSER GENERAL PUBLIC LICENSE
|
2
|
+
Version 3, 29 June 2007
|
3
|
+
|
4
|
+
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
5
|
+
Everyone is permitted to copy and distribute verbatim copies
|
6
|
+
of this license document, but changing it is not allowed.
|
7
|
+
|
8
|
+
|
9
|
+
This version of the GNU Lesser General Public License incorporates
|
10
|
+
the terms and conditions of version 3 of the GNU General Public
|
11
|
+
License, supplemented by the additional permissions listed below.
|
12
|
+
|
13
|
+
0. Additional Definitions.
|
14
|
+
|
15
|
+
As used herein, "this License" refers to version 3 of the GNU Lesser
|
16
|
+
General Public License, and the "GNU GPL" refers to version 3 of the GNU
|
17
|
+
General Public License.
|
18
|
+
|
19
|
+
"The Library" refers to a covered work governed by this License,
|
20
|
+
other than an Application or a Combined Work as defined below.
|
21
|
+
|
22
|
+
An "Application" is any work that makes use of an interface provided
|
23
|
+
by the Library, but which is not otherwise based on the Library.
|
24
|
+
Defining a subclass of a class defined by the Library is deemed a mode
|
25
|
+
of using an interface provided by the Library.
|
26
|
+
|
27
|
+
A "Combined Work" is a work produced by combining or linking an
|
28
|
+
Application with the Library. The particular version of the Library
|
29
|
+
with which the Combined Work was made is also called the "Linked
|
30
|
+
Version".
|
31
|
+
|
32
|
+
The "Minimal Corresponding Source" for a Combined Work means the
|
33
|
+
Corresponding Source for the Combined Work, excluding any source code
|
34
|
+
for portions of the Combined Work that, considered in isolation, are
|
35
|
+
based on the Application, and not on the Linked Version.
|
36
|
+
|
37
|
+
The "Corresponding Application Code" for a Combined Work means the
|
38
|
+
object code and/or source code for the Application, including any data
|
39
|
+
and utility programs needed for reproducing the Combined Work from the
|
40
|
+
Application, but excluding the System Libraries of the Combined Work.
|
41
|
+
|
42
|
+
1. Exception to Section 3 of the GNU GPL.
|
43
|
+
|
44
|
+
You may convey a covered work under sections 3 and 4 of this License
|
45
|
+
without being bound by section 3 of the GNU GPL.
|
46
|
+
|
47
|
+
2. Conveying Modified Versions.
|
48
|
+
|
49
|
+
If you modify a copy of the Library, and, in your modifications, a
|
50
|
+
facility refers to a function or data to be supplied by an Application
|
51
|
+
that uses the facility (other than as an argument passed when the
|
52
|
+
facility is invoked), then you may convey a copy of the modified
|
53
|
+
version:
|
54
|
+
|
55
|
+
a) under this License, provided that you make a good faith effort to
|
56
|
+
ensure that, in the event an Application does not supply the
|
57
|
+
function or data, the facility still operates, and performs
|
58
|
+
whatever part of its purpose remains meaningful, or
|
59
|
+
|
60
|
+
b) under the GNU GPL, with none of the additional permissions of
|
61
|
+
this License applicable to that copy.
|
62
|
+
|
63
|
+
3. Object Code Incorporating Material from Library Header Files.
|
64
|
+
|
65
|
+
The object code form of an Application may incorporate material from
|
66
|
+
a header file that is part of the Library. You may convey such object
|
67
|
+
code under terms of your choice, provided that, if the incorporated
|
68
|
+
material is not limited to numerical parameters, data structure
|
69
|
+
layouts and accessors, or small macros, inline functions and templates
|
70
|
+
(ten or fewer lines in length), you do both of the following:
|
71
|
+
|
72
|
+
a) Give prominent notice with each copy of the object code that the
|
73
|
+
Library is used in it and that the Library and its use are
|
74
|
+
covered by this License.
|
75
|
+
|
76
|
+
b) Accompany the object code with a copy of the GNU GPL and this license
|
77
|
+
document.
|
78
|
+
|
79
|
+
4. Combined Works.
|
80
|
+
|
81
|
+
You may convey a Combined Work under terms of your choice that,
|
82
|
+
taken together, effectively do not restrict modification of the
|
83
|
+
portions of the Library contained in the Combined Work and reverse
|
84
|
+
engineering for debugging such modifications, if you also do each of
|
85
|
+
the following:
|
86
|
+
|
87
|
+
a) Give prominent notice with each copy of the Combined Work that
|
88
|
+
the Library is used in it and that the Library and its use are
|
89
|
+
covered by this License.
|
90
|
+
|
91
|
+
b) Accompany the Combined Work with a copy of the GNU GPL and this license
|
92
|
+
document.
|
93
|
+
|
94
|
+
c) For a Combined Work that displays copyright notices during
|
95
|
+
execution, include the copyright notice for the Library among
|
96
|
+
these notices, as well as a reference directing the user to the
|
97
|
+
copies of the GNU GPL and this license document.
|
98
|
+
|
99
|
+
d) Do one of the following:
|
100
|
+
|
101
|
+
0) Convey the Minimal Corresponding Source under the terms of this
|
102
|
+
License, and the Corresponding Application Code in a form
|
103
|
+
suitable for, and under terms that permit, the user to
|
104
|
+
recombine or relink the Application with a modified version of
|
105
|
+
the Linked Version to produce a modified Combined Work, in the
|
106
|
+
manner specified by section 6 of the GNU GPL for conveying
|
107
|
+
Corresponding Source.
|
108
|
+
|
109
|
+
1) Use a suitable shared library mechanism for linking with the
|
110
|
+
Library. A suitable mechanism is one that (a) uses at run time
|
111
|
+
a copy of the Library already present on the user's computer
|
112
|
+
system, and (b) will operate properly with a modified version
|
113
|
+
of the Library that is interface-compatible with the Linked
|
114
|
+
Version.
|
115
|
+
|
116
|
+
e) Provide Installation Information, but only if you would otherwise
|
117
|
+
be required to provide such information under section 6 of the
|
118
|
+
GNU GPL, and only to the extent that such information is
|
119
|
+
necessary to install and execute a modified version of the
|
120
|
+
Combined Work produced by recombining or relinking the
|
121
|
+
Application with a modified version of the Linked Version. (If
|
122
|
+
you use option 4d0, the Installation Information must accompany
|
123
|
+
the Minimal Corresponding Source and Corresponding Application
|
124
|
+
Code. If you use option 4d1, you must provide the Installation
|
125
|
+
Information in the manner specified by section 6 of the GNU GPL
|
126
|
+
for conveying Corresponding Source.)
|
127
|
+
|
128
|
+
5. Combined Libraries.
|
129
|
+
|
130
|
+
You may place library facilities that are a work based on the
|
131
|
+
Library side by side in a single library together with other library
|
132
|
+
facilities that are not Applications and are not covered by this
|
133
|
+
License, and convey such a combined library under terms of your
|
134
|
+
choice, if you do both of the following:
|
135
|
+
|
136
|
+
a) Accompany the combined library with a copy of the same work based
|
137
|
+
on the Library, uncombined with any other library facilities,
|
138
|
+
conveyed under the terms of this License.
|
139
|
+
|
140
|
+
b) Give prominent notice with the combined library that part of it
|
141
|
+
is a work based on the Library, and explaining where to find the
|
142
|
+
accompanying uncombined form of the same work.
|
143
|
+
|
144
|
+
6. Revised Versions of the GNU Lesser General Public License.
|
145
|
+
|
146
|
+
The Free Software Foundation may publish revised and/or new versions
|
147
|
+
of the GNU Lesser General Public License from time to time. Such new
|
148
|
+
versions will be similar in spirit to the present version, but may
|
149
|
+
differ in detail to address new problems or concerns.
|
150
|
+
|
151
|
+
Each version is given a distinguishing version number. If the
|
152
|
+
Library as you received it specifies that a certain numbered version
|
153
|
+
of the GNU Lesser General Public License "or any later version"
|
154
|
+
applies to it, you have the option of following the terms and
|
155
|
+
conditions either of that published version or of any later version
|
156
|
+
published by the Free Software Foundation. If the Library as you
|
157
|
+
received it does not specify a version number of the GNU Lesser
|
158
|
+
General Public License, you may choose any version of the GNU Lesser
|
159
|
+
General Public License ever published by the Free Software Foundation.
|
160
|
+
|
161
|
+
If the Library as you received it specifies that a proxy can decide
|
162
|
+
whether future versions of the GNU Lesser General Public License shall
|
163
|
+
apply, that proxy's public statement of acceptance of any version is
|
164
|
+
permanent authorization for you to choose that version for the
|
165
|
+
Library.
|
@@ -0,0 +1,30 @@
|
|
1
|
+
# derzeit genutzte Rollen:
|
2
|
+
# * ADMIN
|
3
|
+
# * EDITOR
|
4
|
+
# * APPROVER
|
5
|
+
# * USER
|
6
|
+
|
7
|
+
|
8
|
+
#
|
9
|
+
# Pfad-Zugriffsregeln
|
10
|
+
# Aufbau:
|
11
|
+
# Path : URL-Pfad, wird als regex ausgewertet
|
12
|
+
# Methode : :all, :get, :put, :post, :delete oder :edit
|
13
|
+
# roles :Liste der berechtigten Rollen (es können mehrere Rollen durch Komma getrennt angegeben werden)
|
14
|
+
#
|
15
|
+
grant_path '/', :get, :all
|
16
|
+
grant_path :all, :all, :ADMIN
|
17
|
+
deny_path '/user/lock', :user
|
18
|
+
|
19
|
+
#
|
20
|
+
# Model-Object-Zugriffsregeln
|
21
|
+
# Aufbau:
|
22
|
+
# Model-Klasse : Klasse des Models
|
23
|
+
# Zugriffsart : frei definierbares Symbol, empfohlen :update, :create, :destroy
|
24
|
+
# Roles : Aufzählung der Rollen
|
25
|
+
# Block : optionaler Block, diesem wird die Model-Instance und der User als Parameter bereitgestellt
|
26
|
+
|
27
|
+
grant_model String, :view, :all
|
28
|
+
grant_model String, :view, :ADMIN, :EDITOR
|
29
|
+
grant_model String, :update, :EDITOR do |model, user| model == user.name end
|
30
|
+
|
@@ -0,0 +1,26 @@
|
|
1
|
+
class ApplicationController < ActionController::Base
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
include Tuersteher::ControllerExtensions
|
6
|
+
before_filter :check_access # methode is from Tuersteher::ControllerExtensions
|
7
|
+
|
8
|
+
# This method need Tuersteher for his rules-check
|
9
|
+
# It should return a User-Object, which have a method "has_role?"
|
10
|
+
#
|
11
|
+
# This is here a dummy Stub-Implementation
|
12
|
+
def current_user
|
13
|
+
user = Object.new
|
14
|
+
def user.has_role?(*roles)
|
15
|
+
true
|
16
|
+
end
|
17
|
+
user
|
18
|
+
end
|
19
|
+
|
20
|
+
# This Method is called from Tuersteher if access are denied (no grant rules fired)
|
21
|
+
# stub Authentication-Methode
|
22
|
+
def access_denied
|
23
|
+
redirect_to "/"
|
24
|
+
end
|
25
|
+
|
26
|
+
end
|
data/tuersteher.gemspec
ADDED
@@ -0,0 +1,47 @@
|
|
1
|
+
# Generated by jeweler
|
2
|
+
# DO NOT EDIT THIS FILE DIRECTLY
|
3
|
+
# Instead, edit Jeweler::Tasks in Rakefile, and run the gemspec command
|
4
|
+
# -*- encoding: utf-8 -*-
|
5
|
+
|
6
|
+
Gem::Specification.new do |s|
|
7
|
+
s.name = %q{tuersteher}
|
8
|
+
s.version = "0.0.6"
|
9
|
+
|
10
|
+
s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
|
11
|
+
s.authors = ["Bernd Ledig"]
|
12
|
+
s.date = %q{2010-02-20}
|
13
|
+
s.description = %q{Security-Layer for Rails-Application acts like a firewall.}
|
14
|
+
s.email = %q{bernd@ledig.info}
|
15
|
+
s.extra_rdoc_files = [
|
16
|
+
"README.rdoc"
|
17
|
+
]
|
18
|
+
s.files = [
|
19
|
+
".gitignore",
|
20
|
+
"Manifest",
|
21
|
+
"README.rdoc",
|
22
|
+
"Rakefile",
|
23
|
+
"VERSION",
|
24
|
+
"init.rb",
|
25
|
+
"lib/tuersteher.rb",
|
26
|
+
"license.txt",
|
27
|
+
"samples/access_rules.rb",
|
28
|
+
"samples/application_controller.rb",
|
29
|
+
"tuersteher.gemspec"
|
30
|
+
]
|
31
|
+
s.homepage = %q{http://github.com/bledig/tuersteher}
|
32
|
+
s.rdoc_options = ["--charset=UTF-8"]
|
33
|
+
s.require_paths = ["lib"]
|
34
|
+
s.rubygems_version = %q{1.3.5}
|
35
|
+
s.summary = %q{Security-Layer for Rails-Application}
|
36
|
+
|
37
|
+
if s.respond_to? :specification_version then
|
38
|
+
current_version = Gem::Specification::CURRENT_SPECIFICATION_VERSION
|
39
|
+
s.specification_version = 3
|
40
|
+
|
41
|
+
if Gem::Version.new(Gem::RubyGemsVersion) >= Gem::Version.new('1.2.0') then
|
42
|
+
else
|
43
|
+
end
|
44
|
+
else
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
metadata
ADDED
@@ -0,0 +1,65 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: tuersteher
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.0.6
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Bernd Ledig
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
|
12
|
+
date: 2010-02-20 00:00:00 +01:00
|
13
|
+
default_executable:
|
14
|
+
dependencies: []
|
15
|
+
|
16
|
+
description: Security-Layer for Rails-Application acts like a firewall.
|
17
|
+
email: bernd@ledig.info
|
18
|
+
executables: []
|
19
|
+
|
20
|
+
extensions: []
|
21
|
+
|
22
|
+
extra_rdoc_files:
|
23
|
+
- README.rdoc
|
24
|
+
files:
|
25
|
+
- .gitignore
|
26
|
+
- Manifest
|
27
|
+
- README.rdoc
|
28
|
+
- Rakefile
|
29
|
+
- VERSION
|
30
|
+
- init.rb
|
31
|
+
- lib/tuersteher.rb
|
32
|
+
- license.txt
|
33
|
+
- samples/access_rules.rb
|
34
|
+
- samples/application_controller.rb
|
35
|
+
- tuersteher.gemspec
|
36
|
+
has_rdoc: true
|
37
|
+
homepage: http://github.com/bledig/tuersteher
|
38
|
+
licenses: []
|
39
|
+
|
40
|
+
post_install_message:
|
41
|
+
rdoc_options:
|
42
|
+
- --charset=UTF-8
|
43
|
+
require_paths:
|
44
|
+
- lib
|
45
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
46
|
+
requirements:
|
47
|
+
- - ">="
|
48
|
+
- !ruby/object:Gem::Version
|
49
|
+
version: "0"
|
50
|
+
version:
|
51
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
52
|
+
requirements:
|
53
|
+
- - ">="
|
54
|
+
- !ruby/object:Gem::Version
|
55
|
+
version: "0"
|
56
|
+
version:
|
57
|
+
requirements: []
|
58
|
+
|
59
|
+
rubyforge_project:
|
60
|
+
rubygems_version: 1.3.5
|
61
|
+
signing_key:
|
62
|
+
specification_version: 3
|
63
|
+
summary: Security-Layer for Rails-Application
|
64
|
+
test_files: []
|
65
|
+
|