two_factor_cookies 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/MIT-LICENSE +20 -0
- data/README.md +35 -0
- data/Rakefile +32 -0
- data/app/assets/config/two_factor_cookies_manifest.js +1 -0
- data/app/assets/stylesheets/two_factor_cookies/application.css +15 -0
- data/app/controllers/concerns/two_factor_authenticate.rb +37 -0
- data/app/controllers/two_factor_cookies/toggle_two_factor_controller.rb +60 -0
- data/app/controllers/two_factor_cookies/two_factor_authentication_controller.rb +96 -0
- data/app/helpers/two_factor_cookies/application_helper.rb +4 -0
- data/app/jobs/two_factor_cookies/application_job.rb +4 -0
- data/app/mailers/two_factor_cookies/application_mailer.rb +6 -0
- data/app/models/two_factor_cookies/one_time_password_generator.rb +21 -0
- data/app/models/two_factor_cookies/text_message.rb +26 -0
- data/app/views/layouts/two_factor_cookies/application.html.erb +15 -0
- data/app/views/two_factor_cookies/two_factor_authentication/show.html.erb +25 -0
- data/config/locales/en.yml +16 -0
- data/config/routes.rb +11 -0
- data/lib/tasks/two_factor_cookies_tasks.rake +4 -0
- data/lib/two_factor_cookies/configuration.rb +38 -0
- data/lib/two_factor_cookies/engine.rb +5 -0
- data/lib/two_factor_cookies/version.rb +3 -0
- data/lib/two_factor_cookies.rb +22 -0
- metadata +167 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 9713b369c8e8f380b513419c48aecf9ece9452b3
|
4
|
+
data.tar.gz: 6884bce7e414cafaaf41db49bd7219a890aef13e
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 7421c34e7c0b19cc41f20fa52141aa843e750689ebe1d0df4ed8f62d1ecd0c4f7e22797e9659724a5673916ec0b3d41dc4ab9ee3310ed786210d938ddffd0ff8
|
7
|
+
data.tar.gz: b70483ca83b32182b4db5e3a64f2bcf450c5262297548158d800d96cd77ce8af0e2612060054da7a7a5e4cf678b261d3a087bea1ab82fc415629dcb76e91fd32
|
data/MIT-LICENSE
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
Copyright 2019 Nicolai Bach Woller
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
4
|
+
a copy of this software and associated documentation files (the
|
5
|
+
"Software"), to deal in the Software without restriction, including
|
6
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
7
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
8
|
+
permit persons to whom the Software is furnished to do so, subject to
|
9
|
+
the following conditions:
|
10
|
+
|
11
|
+
The above copyright notice and this permission notice shall be
|
12
|
+
included in all copies or substantial portions of the Software.
|
13
|
+
|
14
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
15
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
16
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
17
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
18
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
19
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
20
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,35 @@
|
|
1
|
+
# TwoFactorCookies
|
2
|
+
Short description and motivation.
|
3
|
+
|
4
|
+
## Usage
|
5
|
+
How to use my plugin.
|
6
|
+
|
7
|
+
## Installation
|
8
|
+
Add this line to your application's Gemfile:
|
9
|
+
|
10
|
+
```ruby
|
11
|
+
gem 'two_factor_cookies', git: 'git@bitbucket.org:cs2software/two_factor_cookies.git', branch: 'master'
|
12
|
+
```
|
13
|
+
|
14
|
+
And then execute:
|
15
|
+
```bash
|
16
|
+
$ bundle
|
17
|
+
```
|
18
|
+
|
19
|
+
The gem is a rails engine, so it needs to be mounted to a location in `routes.rb`:
|
20
|
+
```ruby
|
21
|
+
# two factor cookies
|
22
|
+
mount TwoFactorCookies::Engine, at: '/two_factor_cookies'
|
23
|
+
```
|
24
|
+
|
25
|
+
Todo: Document initializeer
|
26
|
+
|
27
|
+
In your ApplicationController you must include TwoFactorAuthentication
|
28
|
+
|
29
|
+
The gem includes a template for submitting one time passwords. To override it, a partial named 'show' must be placed under `two_factor_cookies/two_factor_authentication`
|
30
|
+
|
31
|
+
## Contributing
|
32
|
+
Contribution directions go here.
|
33
|
+
|
34
|
+
## License
|
35
|
+
The gem is available as open source under the terms of the [MIT License](https://opensource.org/licenses/MIT).
|
data/Rakefile
ADDED
@@ -0,0 +1,32 @@
|
|
1
|
+
begin
|
2
|
+
require 'bundler/setup'
|
3
|
+
rescue LoadError
|
4
|
+
puts 'You must `gem install bundler` and `bundle install` to run rake tasks'
|
5
|
+
end
|
6
|
+
|
7
|
+
require 'rdoc/task'
|
8
|
+
|
9
|
+
RDoc::Task.new(:rdoc) do |rdoc|
|
10
|
+
rdoc.rdoc_dir = 'rdoc'
|
11
|
+
rdoc.title = 'TwoFactorCookies'
|
12
|
+
rdoc.options << '--line-numbers'
|
13
|
+
rdoc.rdoc_files.include('README.md')
|
14
|
+
rdoc.rdoc_files.include('lib/**/*.rb')
|
15
|
+
end
|
16
|
+
|
17
|
+
APP_RAKEFILE = File.expand_path("test/dummy/Rakefile", __dir__)
|
18
|
+
load 'rails/tasks/engine.rake'
|
19
|
+
|
20
|
+
load 'rails/tasks/statistics.rake'
|
21
|
+
|
22
|
+
require 'bundler/gem_tasks'
|
23
|
+
|
24
|
+
require 'rake/testtask'
|
25
|
+
|
26
|
+
Rake::TestTask.new(:test) do |t|
|
27
|
+
t.libs << 'test'
|
28
|
+
t.pattern = 'test/**/*_test.rb'
|
29
|
+
t.verbose = false
|
30
|
+
end
|
31
|
+
|
32
|
+
task default: :test
|
@@ -0,0 +1 @@
|
|
1
|
+
//= link_directory ../stylesheets/two_factor_cookies .css
|
@@ -0,0 +1,15 @@
|
|
1
|
+
/*
|
2
|
+
* This is a manifest file that'll be compiled into application.css, which will include all the files
|
3
|
+
* listed below.
|
4
|
+
*
|
5
|
+
* Any CSS and SCSS file within this directory, lib/assets/stylesheets, vendor/assets/stylesheets,
|
6
|
+
* or any plugin's vendor/assets/stylesheets directory can be referenced here using a relative path.
|
7
|
+
*
|
8
|
+
* You're free to add application-wide styles to this file and they'll appear at the bottom of the
|
9
|
+
* compiled file so the styles you add here take precedence over styles defined in any other CSS/SCSS
|
10
|
+
* files in this directory. Styles in this file should be added after the last require_* statement.
|
11
|
+
* It is generally better to create a new file per style scope.
|
12
|
+
*
|
13
|
+
*= require_tree .
|
14
|
+
*= require_self
|
15
|
+
*/
|
@@ -0,0 +1,37 @@
|
|
1
|
+
module TwoFactorAuthenticate
|
2
|
+
extend ActiveSupport::Concern
|
3
|
+
|
4
|
+
included do
|
5
|
+
before_action :two_factor_authenticate!
|
6
|
+
end
|
7
|
+
|
8
|
+
private
|
9
|
+
|
10
|
+
def two_factor_authenticate!
|
11
|
+
return unless current_user
|
12
|
+
return unless current_user.enabled_two_factor? && current_user.confirmed_phone_number?
|
13
|
+
return if two_factor_approved?
|
14
|
+
|
15
|
+
redirect_to two_factor_cookies.show_two_factor_authentication_path
|
16
|
+
end
|
17
|
+
|
18
|
+
def two_factor_approved?
|
19
|
+
return false if cookies.encrypted[:mfa].nil?
|
20
|
+
return false if parsed_cookies[:user_name] != current_user.public_send(TwoFactorCookies.configuration.username_field_name)
|
21
|
+
return false unless additional_authentication_values_approved?
|
22
|
+
|
23
|
+
parsed_cookies[:approved]
|
24
|
+
end
|
25
|
+
|
26
|
+
def additional_authentication_values_approved?
|
27
|
+
TwoFactorCookies.configuration.additional_authentication_values.each_pair do |key, value|
|
28
|
+
return false if parsed_cookies[key] != eval(value)
|
29
|
+
end
|
30
|
+
|
31
|
+
true
|
32
|
+
end
|
33
|
+
|
34
|
+
def parsed_cookies
|
35
|
+
JSON.parse(cookies.encrypted[:mfa]).symbolize_keys
|
36
|
+
end
|
37
|
+
end
|
@@ -0,0 +1,60 @@
|
|
1
|
+
TwoFactorCookies.const_set('ToggleTwoFactorController',
|
2
|
+
Class.new('TwoFactorCookies::TwoFactorAuthenticationController'.constantize) do
|
3
|
+
def update
|
4
|
+
if TwoFactorCookies::OneTimePasswordGenerator.verify_code(
|
5
|
+
confirm_phone_number_params[:one_time_password],
|
6
|
+
parsed_mfa_cookie[:seed]
|
7
|
+
)
|
8
|
+
current_user.confirm_phone_number!
|
9
|
+
|
10
|
+
set_authenticated_cookie
|
11
|
+
flash[:notice] = I18n.t('two_factor_cookies.confirm_phone_number.flash.confirmed')
|
12
|
+
else
|
13
|
+
flash[:alert] = I18n.t('two_factor_cookies.confirm_phone_number.flash.wrong_one_time_password')
|
14
|
+
end
|
15
|
+
|
16
|
+
redirect_to eval(TwoFactorCookies.configuration.engine_name).public_send(
|
17
|
+
TwoFactorCookies.configuration.confirm_phone_number_success_route,
|
18
|
+
current_user.to_param)
|
19
|
+
end
|
20
|
+
|
21
|
+
def toggle_two_factor
|
22
|
+
if toggle_two_factor_params[:enabled_two_factor] == '1'
|
23
|
+
current_user.enable_two_factor!
|
24
|
+
current_user.update(update_params) if TwoFactorCookies.configuration.update_params
|
25
|
+
set_authenticated_cookie
|
26
|
+
else
|
27
|
+
current_user.disable_two_factor!
|
28
|
+
current_user.disaffirm_phone_number!
|
29
|
+
end
|
30
|
+
|
31
|
+
redirect_to eval(TwoFactorCookies.configuration.engine_name).public_send(
|
32
|
+
TwoFactorCookies.configuration.toggle_two_factor_success_route, current_user.to_param
|
33
|
+
)
|
34
|
+
end
|
35
|
+
|
36
|
+
def resend_code
|
37
|
+
send_otp
|
38
|
+
|
39
|
+
head :ok
|
40
|
+
end
|
41
|
+
|
42
|
+
private
|
43
|
+
|
44
|
+
def confirm_phone_number_params
|
45
|
+
params.require(:confirm_phone_number).permit(:one_time_password)
|
46
|
+
end
|
47
|
+
|
48
|
+
def toggle_two_factor_params
|
49
|
+
params.require(TwoFactorCookies.configuration.user_model_name).permit(
|
50
|
+
:enabled_two_factor
|
51
|
+
)
|
52
|
+
end
|
53
|
+
|
54
|
+
def update_params
|
55
|
+
params.require(TwoFactorCookies.configuration.user_model_name).permit(
|
56
|
+
TwoFactorCookies.configuration.update_params
|
57
|
+
)
|
58
|
+
end
|
59
|
+
end
|
60
|
+
)
|
@@ -0,0 +1,96 @@
|
|
1
|
+
TwoFactorCookies.const_set('TwoFactorAuthenticationController',
|
2
|
+
Class.new(TwoFactorCookies.configuration.two_factor_authentication_controller_parent.constantize) do
|
3
|
+
layout TwoFactorCookies.configuration.layout_path if TwoFactorCookies.configuration.layout_path
|
4
|
+
|
5
|
+
skip_before_action :two_factor_authenticate!
|
6
|
+
|
7
|
+
def show
|
8
|
+
send_otp unless otp_already_sent?
|
9
|
+
|
10
|
+
render :show, locals: { user: current_user }
|
11
|
+
end
|
12
|
+
|
13
|
+
def update
|
14
|
+
if otp_verified?
|
15
|
+
set_authenticated_cookie
|
16
|
+
redirect_to public_send(TwoFactorCookies.configuration.two_factor_authentication_success_route)
|
17
|
+
else
|
18
|
+
flash[:alert] = I18n.t('two_factor_cookies.errors.wrong_one_time_password')
|
19
|
+
redirect_to two_factor_cookies.show_two_factor_authentication_path
|
20
|
+
end
|
21
|
+
end
|
22
|
+
|
23
|
+
def resend_code
|
24
|
+
send_otp
|
25
|
+
|
26
|
+
redirect_to two_factor_cookies.show_two_factor_authentication_path
|
27
|
+
end
|
28
|
+
|
29
|
+
private
|
30
|
+
|
31
|
+
def otp_already_sent?
|
32
|
+
cookies.encrypted[:mfa].present? && parsed_mfa_cookie[:seed].present?
|
33
|
+
end
|
34
|
+
|
35
|
+
def otp_verified?
|
36
|
+
TwoFactorCookies::OneTimePasswordGenerator.verify_code(
|
37
|
+
two_factor_authentication_params[:one_time_password],
|
38
|
+
parsed_mfa_cookie[:seed]
|
39
|
+
)
|
40
|
+
end
|
41
|
+
|
42
|
+
def two_factor_authentication_params
|
43
|
+
params.require(:two_factor_authentication).permit(:one_time_password)
|
44
|
+
end
|
45
|
+
|
46
|
+
def send_otp
|
47
|
+
generated = TwoFactorCookies::OneTimePasswordGenerator.generate_code
|
48
|
+
TwoFactorCookies::TextMessage.send(
|
49
|
+
code: generated[:code],
|
50
|
+
user: current_user
|
51
|
+
)
|
52
|
+
|
53
|
+
set_seed_cookie(generated[:seed])
|
54
|
+
end
|
55
|
+
|
56
|
+
def set_authenticated_cookie
|
57
|
+
cookies.delete(:mfa)
|
58
|
+
cookies.encrypted[:mfa] = {
|
59
|
+
value: JSON.generate(
|
60
|
+
standard_values.merge(additional_authentication_values)
|
61
|
+
),
|
62
|
+
expires: TwoFactorCookies.configuration.two_factor_authentication_expiry
|
63
|
+
}
|
64
|
+
end
|
65
|
+
|
66
|
+
def set_seed_cookie(seed)
|
67
|
+
cookies.delete(:mfa)
|
68
|
+
cookies.encrypted[:mfa] = {
|
69
|
+
value: JSON.generate(seed: seed, user_name: current_user.public_send(TwoFactorCookies.configuration.username_field_name)),
|
70
|
+
expires: TwoFactorCookies.configuration.otp_expiry
|
71
|
+
}
|
72
|
+
end
|
73
|
+
|
74
|
+
def parsed_mfa_cookie
|
75
|
+
JSON.parse(cookies.encrypted[:mfa]).symbolize_keys
|
76
|
+
end
|
77
|
+
|
78
|
+
def standard_values
|
79
|
+
{
|
80
|
+
approved: true,
|
81
|
+
user_name: current_user.public_send(TwoFactorCookies.configuration.username_field_name)
|
82
|
+
}
|
83
|
+
end
|
84
|
+
|
85
|
+
def additional_authentication_values
|
86
|
+
return {} unless TwoFactorCookies.configuration.additional_authentication_values
|
87
|
+
|
88
|
+
# TODO: Is there a better way, than to use eval?
|
89
|
+
additional_values = {}
|
90
|
+
TwoFactorCookies.configuration.additional_authentication_values.each_pair do |key, value|
|
91
|
+
additional_values.store(key, eval(value))
|
92
|
+
end
|
93
|
+
additional_values
|
94
|
+
end
|
95
|
+
end
|
96
|
+
)
|
@@ -0,0 +1,21 @@
|
|
1
|
+
module TwoFactorCookies
|
2
|
+
class OneTimePasswordGenerator
|
3
|
+
class << self
|
4
|
+
def generate_code
|
5
|
+
seed = Random.rand(10_000)
|
6
|
+
|
7
|
+
{ seed: seed, code: generator.at(seed) }
|
8
|
+
end
|
9
|
+
|
10
|
+
def verify_code(code, seed)
|
11
|
+
!!generator.verify(code, seed)
|
12
|
+
end
|
13
|
+
|
14
|
+
private
|
15
|
+
|
16
|
+
def generator
|
17
|
+
@generator ||= ROTP::HOTP.new(TwoFactorCookies.configuration.otp_generation_secret_key)
|
18
|
+
end
|
19
|
+
end
|
20
|
+
end
|
21
|
+
end
|
@@ -0,0 +1,26 @@
|
|
1
|
+
module TwoFactorCookies
|
2
|
+
class TextMessage
|
3
|
+
class << self
|
4
|
+
def send(user:, code:)
|
5
|
+
if Rails.env.development?
|
6
|
+
File.open(Rails.root.join('tmp', 'otp.txt'), 'w') { |file| file.write code }
|
7
|
+
else
|
8
|
+
client.messages.create(
|
9
|
+
body: I18n.t('two_factor_cookies.text_message.one_time_password', code: code),
|
10
|
+
from: TwoFactorCookies.configuration.twilio_phone_number,
|
11
|
+
to: user.public_send(TwoFactorCookies.configuration.phone_number_field_name)
|
12
|
+
)
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
private
|
17
|
+
|
18
|
+
def client
|
19
|
+
@client = Twilio::REST::Client.new(
|
20
|
+
TwoFactorCookies.configuration.twilio_account_sid,
|
21
|
+
TwoFactorCookies.configuration.twilio_auth_token
|
22
|
+
)
|
23
|
+
end
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
<!DOCTYPE html>
|
2
|
+
<html>
|
3
|
+
<head>
|
4
|
+
<title>Two factor cookies</title>
|
5
|
+
<%= csrf_meta_tags %>
|
6
|
+
<%= csp_meta_tag %>
|
7
|
+
|
8
|
+
<%= stylesheet_link_tag "two_factor_cookies/application", media: "all" %>
|
9
|
+
</head>
|
10
|
+
<body>
|
11
|
+
|
12
|
+
<%= yield %>
|
13
|
+
|
14
|
+
</body>
|
15
|
+
</html>
|
@@ -0,0 +1,25 @@
|
|
1
|
+
<div class="row">
|
2
|
+
<div class="col-md-4">
|
3
|
+
</div>
|
4
|
+
<div class="col-md-4">
|
5
|
+
<h2><%= t('two_factor_cookies.show.header') %></h2>
|
6
|
+
<p><%= t('two_factor_cookies.show.help_text') %></p>
|
7
|
+
<%= form_with url: two_factor_cookies.update_two_factor_authentication_path, method: :patch do |f| %>
|
8
|
+
<div class="input-group">
|
9
|
+
<span class="input-group-addon">*</span>
|
10
|
+
<%= f.text_field 'two_factor_authentication[one_time_password]', placeholder: t('two_factor_cookies.show.placeholder'), autofocus: true, class: 'form-control' %>
|
11
|
+
</div>
|
12
|
+
<br/>
|
13
|
+
<div class="row">
|
14
|
+
<div class="col-md-6">
|
15
|
+
<%= link_to t('two_factor_cookies.show.resend_code'), two_factor_cookies.resend_code_two_factor_authentication_path, class: 'btn btn-default btn-block' %>
|
16
|
+
</div>
|
17
|
+
<div class="col-md-6">
|
18
|
+
<%= f.submit t('two_factor_cookies.show.submit_code'), class: 'btn btn-primary btn-block' %>
|
19
|
+
</div>
|
20
|
+
</div>
|
21
|
+
<% end %>
|
22
|
+
</div>
|
23
|
+
<div class="col-md-4">
|
24
|
+
</div>
|
25
|
+
</div>
|
@@ -0,0 +1,16 @@
|
|
1
|
+
en:
|
2
|
+
two_factor_cookies:
|
3
|
+
show:
|
4
|
+
placeholder: One Time Password
|
5
|
+
header: One Time Password
|
6
|
+
help_text: Type the one time password, you have received in a text
|
7
|
+
resend_code: Resend code
|
8
|
+
submit_code: Verify code
|
9
|
+
text_message:
|
10
|
+
one_time_password: Your one time password is %{code}
|
11
|
+
errors:
|
12
|
+
wrong_one_time_password: Wrong code - try again
|
13
|
+
confirm_phone_number:
|
14
|
+
flash:
|
15
|
+
confirmed: Phone number confirmed
|
16
|
+
wrong_one_time_password: Wrong code - try again
|
data/config/routes.rb
ADDED
@@ -0,0 +1,11 @@
|
|
1
|
+
TwoFactorCookies::Engine.routes.draw do
|
2
|
+
# two_factor_authentication
|
3
|
+
get 'two_factor_authentication', to: 'two_factor_authentication#show', as: :show_two_factor_authentication
|
4
|
+
patch 'two_factor_authentication', to: 'two_factor_authentication#update', as: :update_two_factor_authentication
|
5
|
+
get 'two_factor_authentication/resend_code', to: 'two_factor_authentication#resend_code', as: :resend_code_two_factor_authentication
|
6
|
+
|
7
|
+
# confirm_phone_number
|
8
|
+
patch 'toggle_two_factor/:user_id', to: 'toggle_two_factor#update', as: :confirm_phone_number
|
9
|
+
patch 'toggle_two_factor/:user_id/toggle', to: 'toggle_two_factor#toggle_two_factor', as: :toggle_two_factor
|
10
|
+
get 'toggle_two_factor/:user_id/resend_code', to: 'toggle_two_factor#resend_code', as: :resend_code_confirm_phone_number
|
11
|
+
end
|
@@ -0,0 +1,38 @@
|
|
1
|
+
module TwoFactorCookies
|
2
|
+
class Configuration
|
3
|
+
attr_accessor :otp_generation_secret_key, :two_factor_authentication_success_route, :confirm_phone_number_success_route,
|
4
|
+
:toggle_two_factor_success_route, :two_factor_authentication_expiry, :otp_expiry, :twilio_account_sid,
|
5
|
+
:twilio_phone_number, :twilio_auth_token, :phone_number_field_name, :user_model_name, :user_model_namespace, :username_field_name,
|
6
|
+
:two_factor_authentication_controller_parent, :skip_before_action, :layout_path, :additional_authentication_values,
|
7
|
+
:update_params, :engine_name
|
8
|
+
|
9
|
+
def initialize
|
10
|
+
@otp_generation_secret_key = nil
|
11
|
+
@two_factor_authentication_expiry = 30.days.from_now
|
12
|
+
@otp_expiry = 30.minutes.from_now
|
13
|
+
|
14
|
+
@twilio_account_sid = nil
|
15
|
+
@twilio_phone_number = nil
|
16
|
+
@twilio_auth_token = nil
|
17
|
+
|
18
|
+
@user_model_namespace = nil
|
19
|
+
@user_model_name = :user
|
20
|
+
@phone_number_field_name = :phone_number
|
21
|
+
@username_field_name = :username
|
22
|
+
|
23
|
+
@two_factor_authentication_success_route = nil
|
24
|
+
@toggle_two_factor_success_route = nil
|
25
|
+
@confirm_phone_number_success_route = nil
|
26
|
+
@layout_path = nil
|
27
|
+
@two_factor_authentication_controller_parent = '::ApplicationController'
|
28
|
+
|
29
|
+
@additional_authentication_values = {}
|
30
|
+
|
31
|
+
@update_params = nil
|
32
|
+
|
33
|
+
|
34
|
+
|
35
|
+
@engine_name = 'main_app'
|
36
|
+
end
|
37
|
+
end
|
38
|
+
end
|
@@ -0,0 +1,22 @@
|
|
1
|
+
require 'two_factor_cookies/configuration'
|
2
|
+
require 'two_factor_cookies/engine'
|
3
|
+
require 'rotp'
|
4
|
+
require 'twilio-ruby'
|
5
|
+
|
6
|
+
module TwoFactorCookies
|
7
|
+
class << self
|
8
|
+
attr_accessor :configuration
|
9
|
+
|
10
|
+
def configuration
|
11
|
+
@configuration ||= Configuration.new
|
12
|
+
end
|
13
|
+
|
14
|
+
def reset
|
15
|
+
@configuration = Configuration.new
|
16
|
+
end
|
17
|
+
|
18
|
+
def configure
|
19
|
+
yield(configuration)
|
20
|
+
end
|
21
|
+
end
|
22
|
+
end
|
metadata
ADDED
@@ -0,0 +1,167 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: two_factor_cookies
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.1.0
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Nicolai Bach Woller
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
date: 2019-08-01 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: rails
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - "~>"
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '5.0'
|
20
|
+
type: :runtime
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - "~>"
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '5.0'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: rotp
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - '='
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: 5.1.0
|
34
|
+
type: :runtime
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - '='
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: 5.1.0
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: twilio-ruby
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - "~>"
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: 5.25.1
|
48
|
+
type: :runtime
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - "~>"
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: 5.25.1
|
55
|
+
- !ruby/object:Gem::Dependency
|
56
|
+
name: m
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
58
|
+
requirements:
|
59
|
+
- - ">="
|
60
|
+
- !ruby/object:Gem::Version
|
61
|
+
version: '0'
|
62
|
+
type: :development
|
63
|
+
prerelease: false
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
65
|
+
requirements:
|
66
|
+
- - ">="
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: '0'
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: minitest-spec-rails
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - ">="
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '0'
|
76
|
+
type: :development
|
77
|
+
prerelease: false
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - ">="
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: '0'
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: mocha
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ">="
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0'
|
90
|
+
type: :development
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - ">="
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '0'
|
97
|
+
- !ruby/object:Gem::Dependency
|
98
|
+
name: sqlite3
|
99
|
+
requirement: !ruby/object:Gem::Requirement
|
100
|
+
requirements:
|
101
|
+
- - ">="
|
102
|
+
- !ruby/object:Gem::Version
|
103
|
+
version: '0'
|
104
|
+
type: :development
|
105
|
+
prerelease: false
|
106
|
+
version_requirements: !ruby/object:Gem::Requirement
|
107
|
+
requirements:
|
108
|
+
- - ">="
|
109
|
+
- !ruby/object:Gem::Version
|
110
|
+
version: '0'
|
111
|
+
description: The aim is to be configurable and work with as many kinds of authentication
|
112
|
+
as possible.
|
113
|
+
email:
|
114
|
+
- woller@traels.it
|
115
|
+
executables: []
|
116
|
+
extensions: []
|
117
|
+
extra_rdoc_files: []
|
118
|
+
files:
|
119
|
+
- MIT-LICENSE
|
120
|
+
- README.md
|
121
|
+
- Rakefile
|
122
|
+
- app/assets/config/two_factor_cookies_manifest.js
|
123
|
+
- app/assets/stylesheets/two_factor_cookies/application.css
|
124
|
+
- app/controllers/concerns/two_factor_authenticate.rb
|
125
|
+
- app/controllers/two_factor_cookies/toggle_two_factor_controller.rb
|
126
|
+
- app/controllers/two_factor_cookies/two_factor_authentication_controller.rb
|
127
|
+
- app/helpers/two_factor_cookies/application_helper.rb
|
128
|
+
- app/jobs/two_factor_cookies/application_job.rb
|
129
|
+
- app/mailers/two_factor_cookies/application_mailer.rb
|
130
|
+
- app/models/two_factor_cookies/one_time_password_generator.rb
|
131
|
+
- app/models/two_factor_cookies/text_message.rb
|
132
|
+
- app/views/layouts/two_factor_cookies/application.html.erb
|
133
|
+
- app/views/two_factor_cookies/two_factor_authentication/show.html.erb
|
134
|
+
- config/locales/en.yml
|
135
|
+
- config/routes.rb
|
136
|
+
- lib/tasks/two_factor_cookies_tasks.rake
|
137
|
+
- lib/two_factor_cookies.rb
|
138
|
+
- lib/two_factor_cookies/configuration.rb
|
139
|
+
- lib/two_factor_cookies/engine.rb
|
140
|
+
- lib/two_factor_cookies/version.rb
|
141
|
+
homepage: https://traels.it
|
142
|
+
licenses:
|
143
|
+
- MIT
|
144
|
+
metadata:
|
145
|
+
allowed_push_host: https://rubygems.org
|
146
|
+
post_install_message:
|
147
|
+
rdoc_options: []
|
148
|
+
require_paths:
|
149
|
+
- lib
|
150
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
151
|
+
requirements:
|
152
|
+
- - ">="
|
153
|
+
- !ruby/object:Gem::Version
|
154
|
+
version: '0'
|
155
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
156
|
+
requirements:
|
157
|
+
- - ">="
|
158
|
+
- !ruby/object:Gem::Version
|
159
|
+
version: '0'
|
160
|
+
requirements: []
|
161
|
+
rubyforge_project:
|
162
|
+
rubygems_version: 2.5.2
|
163
|
+
signing_key:
|
164
|
+
specification_version: 4
|
165
|
+
summary: Simple two factor logon - with Twilio SMS for code delivery
|
166
|
+
test_files: []
|
167
|
+
has_rdoc:
|