# AeUsers
require 'active_record'
module AeUsers
begin
@@db_name = Rails::Configuration.new.database_configuration["users"]["database"]
def self.db_name
@@db_name
end
rescue
end
@@signup_allowed = true
def self.signup_allowed?
@@signup_allowed
end
def self.disallow_signup
@@signup_allowed = false
end
@@permissioned_classes = []
def self.add_permissioned_class(klass)
if not @@permissioned_classes.include?(klass.name)
@@permissioned_classes.push(klass.name)
end
end
def self.permissioned_classes
return @@permissioned_classes.collect do |name|
eval(name)
end
end
def self.permissioned_class(name)
if @@permissioned_classes.include?(name)
return eval(name)
end
end
@@js_framework = "prototype"
def self.js_framework
@@js_framework
end
def self.js_framework=(framework)
@@js_framework = framework
end
# yeah, the following 2 functions are Incredibly Evil(tm). I couldn't find any other way
# to pass around an ActiveRecord class without having it be potentially overwritten on
# association access.
def self.profile_class
nil
end
def self.profile_class=(klass)
module_eval <<-END_FUNC
def self.profile_class
return #{klass.name}
end
END_FUNC
end
def self.map_openid(map)
map.open_id_complete 'auth', :controller => "auth", :action => "login", :requirements => { :method => :get }
end
class PermissionCache
def initialize
@cache = {}
end
def permitted?(person, permissioned, permission)
RAILS_DEFAULT_LOGGER.debug "Permission cache looking up result for #{person}, #{permissioned}, #{permission}"
pcache = person_cache(person)
key = pcache_key(permissioned, permission)
unless pcache.has_key?(key)
RAILS_DEFAULT_LOGGER.debug "Cache miss! Loading uncached permission."
pcache[key] = person.uncached_permitted?(permissioned, permission)
end
RAILS_DEFAULT_LOGGER.debug "Result is #{pcache[key]}"
return pcache[key]
end
def invalidate(person, permissioned, permission)
RAILS_DEFAULT_LOGGER.debug "Permission cache invalidating result for #{person}, #{permissioned}, #{permission}"
pcache = person_cache(person)
pcache.delete(pcache_key(permissioned, permission))
end
def invalidate_all(options={})
if options[:person]
RAILS_DEFAULT_LOGGER.debug "Permission cache invalidating all results for #{options[:person]}"
@cache.delete(options[:person])
elsif options[:permission] and options[:permissioned]
RAILS_DEFAULT_LOGGER.debug "Permission cache invalidating all results for #{options[:permissioned]}, #{options[:permission]}"
@cache.each_value do |pcache|
pcache.delete(pcache_key(options[:permissioned], options[:permission]))
end
else
RAILS_DEFAULT_LOGGER.debug "Permission cache invalidating all results!"
@cache = {}
end
end
private
def person_cache(person)
unless @cache.has_key?(person)
RAILS_DEFAULT_LOGGER.debug "Permission cache creating new pcache for #{person}"
@cache[person] = {}
end
@cache[person]
end
def pcache_key(permissioned, permission)
if permissioned
return "#{permissioned.id}_#{permission}"
else
return "nil_#{permission}"
end
end
end
@@cache_permissions = true
@@permission_cache = AeUsers::PermissionCache.new
def self.cache_permissions=(value)
@@cache_permissions = value
end
def self.cache_permissions?
@@cache_permissions
end
def self.permission_cache
@@permission_cache
end
module Acts
module Permissioned
def self.included(base)
base.extend ClassMethods
end
module ClassMethods
def acts_as_permissioned(options = {})
has_many :permissions, :as => :permissioned, :dependent => :destroy, :include => [:person, :role, :permissioned]
cattr_accessor :permission_names
self.permission_names = options[:permission_names] || [:show, :edit, :destroy]
self.permission_names = self.permission_names.collect do |perm|
perm.to_s
end
if not self.permission_names.include? "change_permissions"
self.permission_names.push "change_permissions"
end
self.permission_names.each do |perm|
define_method("permit_#{perm}?") do |person|
self.permitted?(person, perm)
end
end
AeUsers.add_permissioned_class(self)
extend AeUsers::Acts::Permissioned::SingletonMethods
include AeUsers::Acts::Permissioned::InstanceMethods
end
end
module SingletonMethods
end
module InstanceMethods
def permitted?(person, permission=nil)
person.permitted? self, permission
end
def permitted_people(permission)
grants = permissions.select { |perm| perm.permission == permission }
people = []
grants.collect {|grant| grant.grantee}.each do |grantee|
if grantee.kind_of? Person
if not people.include? grantee
people << grantee
end
elsif grantee.kind_of? Role
grantee.people.each do |person|
if not people.include? person
people << person
end
end
end
end
return people
end
def grant(grantees, permissions=nil)
if not grantees.kind_of?(Array)
grantees = [grantees]
end
if not permissions.kind_of?(Array)
if permissions.nil?
permissions = self.class.permission_names
else
permissions = [permissions]
end
end
grantees.each do |grantee|
if grantee.kind_of? Role
permissions.each do |perm|
if AeUsers.cache_permissions?
grantee.members.each do |person|
AeUsers.permission_cache.invalidate(person, self, perm)
end
end
Permission.create :role => grantee, :permission => perm, :permissioned => self
end
elsif grantee.kind_of? Person
permissions.each do |perm|
if AeUsers.cache_permissions?
AeUsers.permission_cache.invalidate(grantee, self, perm)
end
Permission.create :person => grantee, :permission => perm, :permissioned => self
end
end
end
end
def revoke(grantees, permissions=nil)
if not grantees.kind_of?(Array)
grantees = [grantees]
end
if not permissions.kind_of?(Array)
if permissions.nil?
permissions = self.class.permission_names
else
permissions = [permissions]
end
end
grantees.each do |grantee|
permissions.each do |perm|
existing = if grantee.kind_of? Role
if AeUsers.cache_permissions?
grantee.members.each do |person|
AeUsers.permission_cache.invalidate(person, self, perm)
end
end
Permission.find_by_role_and_permission_type(grantee, perm)
elsif grantee.kind_of? Person
if AeUsers.cache_permissions?
AeUsers.permission_cache.invalidate(pesron, self, perm)
end
Permission.find_by_person_and_permission_type(person, perm)
end
if existing
existing.destroy
end
end
end
end
end
end
end
module ControllerExtensions
module RequirePermission
def self.included(base)
base.extend ClassMethods
end
def access_denied(msg=nil, options={})
options = {
:layout => active_layout
}.update(options)
msg ||= "Sorry, you don't have access to view that page."
if logged_in?
body = "If you feel you've been denied access in error, please contact the administrator of this web site."
respond_to do |format|
format.html { render options.update({:inline => "
#{msg}
\n\n"}) }
format.xml { render :xml => { :error => msg }.to_xml, :status => :forbidden }
format.js { render :json => msg, :status => :forbidden }
format.json { render :json => msg, :status => :forbidden }
end
else
flash[:error_messages] = msg
redirect_to :controller => 'auth', :action => 'login'
end
end
def logged_in?
if @logged_in_person
return @logged_in_person
end
if session[:person]
begin
@logged_in_person = Person.find(session[:person])
rescue ActiveRecord::RecordNotFound
end
elsif session[:account]
begin
acct = Account.find(session[:account])
session[:person] = acct.person.id
@logged_in_person = acct.person
rescue ActiveRecord::RecordNotFound
end
elsif attempt_login_from_params
return logged_in?
else
return @logged_in_person
end
end
def logged_in_person
return logged_in?
end
def attempt_login(login)
@account = Account.find_by_email_address(login.email)
if not @account.nil? and not @account.active
redirect_to :controller => 'auth', :action => :needs_activation, :account => @account, :email => login.email, :return_to => login.return_to
return false
elsif not @account.nil? and @account.check_password login.password
if (not AeUsers.profile_class.nil? and not @account.person.nil? and
AeUsers.profile_class.find_by_person_id(@account.person.id).nil?)
session[:provisional_person] = @account.person.id
redirect_to :controller => 'auth', :action => :needs_profile, :return_to => login.return_to
return false
else
session[:person] = @account.person.id
return true
end
else
flash[:error_messages] = ['Invalid email address or password.']
return false
end
end
def attempt_open_id_login(return_to)
if return_to
session[:return_to] = return_to
else
return_to = session[:return_to]
end
openid_url = params[:openid_url]
params.delete(:openid_url)
optional_fields = Person.sreg_map.keys
if AeUsers.profile_class and AeUsers.profile_class.respond_to?('sreg_map')
optional_fields += AeUsers.profile_class.sreg_map.keys
end
authenticate_with_open_id(openid_url, :optional => optional_fields) do |result, identity_url, registration|
if result.successful?
id = OpenIdIdentity.find_by_identity_url(identity_url)
if not id.nil?
@person = id.person
end
if id.nil? or @person.nil?
if AeUsers.signup_allowed?
session[:identity_url] = identity_url
redirect_to :controller => 'auth', :action => :needs_person, :return_to => return_to, :registration => registration.data
return false
else
flash[:error_messages] = ["Sorry, you are not registered with this site."]
return false
end
else
if (not AeUsers.profile_class.nil? and AeUsers.profile_class.find_by_person_id(@person.id).nil?)
session[:provisional_person] = @person.id
redirect_to :controller => 'auth', :action => :needs_profile, :return_to => return_to
return false
else
session[:person] = @person.id
return true
end
end
else
flash[:error_messages] = result.message
return false
end
end
return session[:person]
end
def attempt_ticket_login(secret)
t = AuthTicket.find_ticket(secret)
if t.nil?
flash[:error_messages] = ["Ticket not found"]
return false
else
session[:person] = t.person
t.destroy
return session[:person]
end
end
def attempt_login_from_params
return_to = request.request_uri
if not params[:ae_email].blank? and not params[:ae_password].blank?
login = Login.new(:email => params[:ae_email], :password => params[:ae_password], :return_to => return_to)
attempt_login(login)
elsif not params[:openid_url].blank?
attempt_open_id_login(return_to)
elsif not params[:ae_ticket].blank?
attempt_ticket_login(params[:ae_ticket])
end
end
def do_permission_check(obj, perm_name, fail_msg)
attempt_login_from_params
p = logged_in_person
if not (p and p.permitted?(obj, perm_name))
access_denied fail_msg
end
end
def create_account_and_person()
account = Account.new(:password => params[:password1])
person = Person.new(params[:person])
addr = EmailAddress.new :address => params[:email], :person => person, :primary => true
person.account = account
if not AeUsers.profile_class.nil?
app_profile = AeUsers.profile_class.send(:new, :person => person)
app_profile.attributes = params[:app_profile]
end
if request.post?
error_fields = []
error_messages = []
if Person.find_by_email_address(params[:email])
error_fields.push "email"
error_messages.push "An account at that email address already exists!"
end
if params[:password1] != params[:password2]
error_fields += ["password1", "password2"]
error_messages.push "Passwords do not match."
elsif params[:password1].length == 0
error_fields += ["password1", "password2"]
error_messages.push "You must enter a password."
end
["firstname", "lastname", "email", "gender"].each do |field|
if (not params[field] or params[field].length == 0) and (not params[:person][field] or params[:person][field].length == 0)
error_fields.push field
error_messages.push "You must enter a value for #{field}."
end
end
if error_fields.size > 0 or error_messages.size > 0
flash[:error_fields] = error_fields
flash[:error_messages] = error_messages
else
account.save
addr.save
person.save
if app_profile
app_profile.save
end
@account = account
@addr = addr
@person = person
@app_profile = app_profile
begin
ActionMailer::Base.default_url_options[:host] = request.host
account.generate_activation
rescue
account.activation_key = nil
account.active = true
account.save
return :no_activation
end
return :success
end
end
end
module ClassMethods
def require_login(conditions = {})
before_filter conditions do |controller|
if not controller.logged_in?
controller.attempt_login_from_params
if not controller.logged_in?
controller.access_denied "Sorry, but you need to be logged in to view that page."
end
end
end
end
def require_class_permission(perm_name, conditions = {})
delegated = false
if conditions[:class_name]
cn = conditions[:class_name]
delegated = true
elsif conditions[:class_param]
cpn = conditions[:class_param]
end
before_filter conditions do |controller|
if cn.nil? and cpn
cn = controller.params[cpn]
delegated = true
end
controller_cn = controller.class.name.gsub(/Controller$/, "").singularize
cn ||= controller_cn
full_perm_name = "#{perm_name}_#{cn.tableize}"
if delegated
msg = "Sorry, but you are not permitted to #{perm_name} #{controller_cn.tableize.humanize.downcase} in this #{cn.tableize.humanize.singularize.downcase}."
else
msg = "Sorry, but you are not permitted to #{perm_name} #{cn.tableize.humanize.downcase}."
end
controller.do_permission_check(nil, full_perm_name, msg)
end
end
def require_permission(perm_name, conditions = {})
if conditions[:class_name]
cn = conditions[:class_name]
end
id_param = conditions[:id_param] || :id
before_filter conditions do |controller|
cn ||= controller.class.name.gsub(/Controller$/, "").singularize
o = eval(cn).find(controller.params[id_param])
if not o.nil?
controller.do_permission_check(o, perm_name, "Sorry, but you are not permitted to #{perm_name} this #{cn.tableize.singularize.humanize.downcase}.")
end
end
end
def rest_edit_permissions(options = {})
options = {
:restrict_create => false,
}.update(options)
restrict_create = options[:restrict_create]
options.delete(:restrict_create)
require_permission("edit", { :only => [:edit, :update] }.update(options))
if restrict_create
require_class_permission("create", { :only => [:new, :create] }.update(options))
end
require_permission("destroy", { :only => [:destroy] }.update(options))
end
def rest_view_permissions(options = {})
options = {
:restrict_list => false,
}.update(options)
restrict_list = options[:restrict_list]
options.delete(:restrict_list)
if restrict_list
require_class_permission("list", { :only => [:index] }.update(options))
elsif options[:class_name]
require_permission("show", { :only => [:index], :id_param => "#{options[:class_name].tableize}_id" }.update(options))
end
require_permission("show", { :only => [:show] }.update(options))
end
def rest_permissions(options = {})
rest_view_permissions(options)
rest_edit_permissions(options)
end
end
end
end
module HelperFunctions
def permission_names(item)
if item.kind_of? ActiveRecord::Base
return item.class.permission_names
else
return item.permission_names
end
end
def full_permission_name(item, perm)
if item.kind_of? ActiveRecord::Base
return perm
else
return "#{perm}_#{item.class.name.tableize}"
end
end
def permission_grants(item, perm)
if item.kind_of? ActiveRecord::Base
grants = item.permissions.select {|p| p.permission == perm }
else
full_perm_name = full_permission_name(item, perm)
grants = Permission.find_all_by_permission(full_perm_name)
end
return grants
end
def all_permitted?(item, perm)
if item
# try to short-circuit this with an eager load check
if item.permissions.select {|p| (p.permission == perm or p.permission.nil?) and p.role.nil? and p.person.nil? }.size > 0
return true
end
end
sql = "permission = ? and (role_id = 0 or role_id is null) and (person_id = 0 or person_id is null)"
return Permission.find(:all, :conditions => [sql, full_permission_name(item, perm)]).length > 0
end
def logged_in?
return controller.logged_in?
end
def logged_in_person
return controller.logged_in_person
end
def app_profile(person = nil)
if person.nil?
person = logged_in_person
end
AeUsers.profile_class.find_by_person_id(person.id)
end
def user_picker(field_name, options = {})
options = {
:people => true,
:roles => false,
:callback => nil,
:default => nil,
:clear_after => true
}.update(options)
domid = field_name.gsub(/\W/, "_").gsub(/__+/, "_").sub(/_$/, "").sub(/^_/, "")
default = options[:default]
rhtml = text_field_tag("#{field_name}_shim", default ? default.name : "", { :style => "width: 15em; display: inline; float: none;" })
rhtml << hidden_field_tag(field_name, default ? default.id : "")
auto_complete_url = url_for(:controller => "permission", :action => "auto_complete_for_permission_grantee",
:people => options[:people], :roles => options[:roles], :escape => false, :only_path => false)
if AeUsers.js_framework == "prototype"
rhtml << <<-ENDRHTML
<%= auto_complete_field('#{domid}_shim', :select => "grantee_id", :param_name => "q",
:after_update_element => "function (el, selected) {
kid = el.value.split(':');
klass = kid[0];
id = kid[1];
cb = function(klass, id) {
$('#{domid}').value = el.value;
#{options[:clear_after] ? "$('#{domid}_shim').value = '';" : "$('#{domid}_shim').value = selected.getAttribute('granteeName');"}
#{options[:callback]}
};
cb(klass, id);
}",
:url => "#{auto_complete_url}") %>
ENDRHTML
elsif AeUsers.js_framework == "jquery"
jq_domid = "##{domid}"
rhtml << <<-ENDRHTML
ENDRHTML
end
render :inline => rhtml
end
end
end