mche / Mojolicious-Plugin-RoutesAuthDBI

From DBI tables does generate app routes, make authentication and make restrict access (authorization) with roles/profiles.
2 stars 0 forks source link
access auth authentication authorization dbi mojolicious plugin routes

package Mojolicious::Plugin::RoutesAuthDBI; use Mojo::Base 'Mojolicious::Plugin::Authentication'; use Mojolicious::Plugin::RoutesAuthDBI::Util qw(load_class); use Mojo::Util qw(hmac_sha1_sum); use Hash::Merge qw( merge ); use Scalar::Util 'weaken';

use constant PKG => PACKAGE;

has [qw(app dbh conf)];

has default => sub { my $self = shift; require Mojolicious::Plugin::RoutesAuthDBI::Schema; { auth => { stash_key => PKG."user", current_user_fn => 'auth_user',# helper load_user => \&load_user, validate_user => \&validate_user, },

access => { namespace => PKG, module => 'Access', fail_auth_cb => sub { shift->render(status => 401, format=>'txt', text=>"Please sign in.\n"); }, fail_access_cb => sub { shift->render(status => 403, format=>'txt', text=>"You don`t have access on this route (url, action).\n"); }, import => [qw(load_user validate_user)], },

admin => { namespace => PKG, controller => 'Admin', prefix => lc($self->conf->{admin}{controller} || 'admin'), trust => hmac_sha1_sum('admin', $self->app->secrets->[0]), role_admin => 'administrators', },

oauth => { namespace => PKG, controller => 'OAuth', fail_authcb => sub {shift->render(format=>'txt', text=>"@")}, },

template => $Mojolicious::Plugin::RoutesAuthDBI::Schema::defaults,

model_namespace => PKG.'::Model',

guest => {# from Mojolicious::Plugin::Authentication

~ autoload_user => 1,

session_key => 'guest_data',
stash_key => PKG."__guest__",
#~ current_user_fn => 'current_guest',# helper
#~ load_user => \&load_guest,
#~ validate_user => not need
#~ fail_render => not need
#######end Mojolicious::Plugin::Authentication conf#######
namespace => PKG,
module => 'Guest',
#~ import => [qw(load_guest)],

},

log=>{ namespace => PKG, module => 'Log', disabled=>0, }, }; };# end defaults

has merge_conf => sub {#hashref my $self = shift; merge($self->conf, $self->default); };

has access => sub {# object my $self = shift; weaken $self; my $conf = $self->merge_conf->{'access'}; @{$self->merge_conf->{template}{tables}}{keys %{$conf->{tables}}} = values %{$conf->{tables}} if $conf->{tables}; my $class = load_class($conf); $class->import( @{ $conf->{import} }); $class->new(app=>$self->app, plugin=>$self,); }, weak => 1;

has admin => sub {# object my $self = shift; my $conf = $self->merge_conf->{'admin'}; @{$self->merge_conf->{template}{tables}}{keys %{$conf->{tables}}} = values %{$conf->{tables}} if $conf->{tables}; load_class($conf)->init(%$conf, app=>$self->app, plugin=>$self,); }, weak => 1;

has oauth => sub { my $self = shift; my $conf = $self->merge_conf->{'oauth'}; @{$self->merge_conf->{template}{tables}}{keys %{$conf->{tables}}} = values %{$conf->{tables}} if $conf->{tables}; load_class($conf)->init(%$conf, app=>$self->app, plugin=>$self, model=>$self->model($conf->{controller}),); }, weak => 1;

has guest => sub {# object my $self = shift; my $conf = $self->merge_conf->{'guest'}; @{$self->merge_conf->{template}{tables}}{keys %{$conf->{tables}}} = values %{$conf->{tables}} if $conf->{tables};

$self->merge_conf->{template}{tables}{guests} = $conf->{table} if $conf->{table};

my $class = load_class($conf); $class->new( %$conf, app=>$self->app, plugin=>$self, model=>$self->model($conf->{module}), ); }, weak => 1;

has log => sub {# object my $self = shift; my $conf = $self->merge_conf->{'log'};

@{$self->merge_conf->{template}{tables}}{keys %{$conf->{tables}}} = values %{$conf->{tables}} if $conf->{tables};

$self->merge_conf->{template}{tables}{logs} = $conf->{table} if $conf->{table};

my $class = load_class($conf); $class->new( %$conf, app=>$self->app, plugin=>$self, model=>$self->model($conf->{module}), ) unless $conf->{disabled}; }, weak => 1;

sub register { my $self = shift; $self->app(shift); $self->conf(shift); # global

$self->dbh($self->conf->{dbh} || $self->app->dbh); $self->dbh($self->dbh->($self->app)) if ref($self->dbh) eq 'CODE'; die "Plugin must work with dbh, see SYNOPSIS" unless $self->dbh;

init base model

load_class($self->merge_conf->{model_namespace}."::Base")->singleton(dbh=>$self->dbh, template_vars=>$self->merge_conf->{template}, mt=>{tag_start=>'{%', tag_end=>'%}'});

my $access = $self->access;

die "Plugin [Authentication] already loaded" if $self->app->renderer->helpers->{'authenticate'};

$self->SUPER::register($self->app, $self->merge_conf->{auth}); $self->app->plugin('HeaderCondition');# routes host_re

weaken $self; $self->app->routes->add_condition(access => sub {$self->condaccess(@)}); $access->apply_ns(); $access->applyroute($) for @{ $access->routes };

if ($self->conf->{oauth}) { my $oauth = $self->oauth; $access->applyroute($) for $oauth->_routes; }

if ($self->conf->{admin} && ref($self->conf->{admin} eq 'HASH') && keys(%{$self->conf->{admin}})) { my $admin = $self->admin; $access->applyroute($) for $admin->self_routes; }

$self->guest if $self->conf->{guest};

$self->log if $self->conf->{log};

weaken $access; $self->app->helper('access', sub {$access});

return $self, $access;

}

sub cond_access {# addcondition my $self= shift; my ($route, $c, $captures, $args) = @;# $args - это маршрут-хэш из запроса БД или хэш-конфиг из кода $route->{(PKG)}{route} = $args;# может пригодиться: $c->match->endpoint->{'Mojolicious::Plugin::RoutesAuthDBI'}... my $conf = $self->merge_conf; my $app = $c->app; my $access = $self->access;

~ $app->log->debug($c->dumper($route));#$route->pattern->defaults

my $auth_helper = $conf->{auth}{current_user_fn}; my $u = $c->$auth_helper; my $fail_auth_cb = $conf->{access}{fail_auth_cb};

if (ref $args eq 'CODE') { $args->($u, @_) or $self->deny_log($route, $args, $u, $c) and $c->$fail_auth_cb() and return undef; $app->log->debug(sprintf(qq[Access allow [%s] by callback condition], $route->pattern->unparsed, )); return 0x01; }

$app->log->debug( sprintf(qq[Access allow [%s] for none {auth} and none {role} and none {guest}], $route->pattern->unparsed) ) and return 1 # не проверяем доступ unless $args->{auth} || $args->{role} || $args->{guest};

if ($args->{guest}) {# && $args->{auth} =~ m'\bguest\b'i $app->log->debug(sprintf(qq[Access allow [%s] for {guest}], $route->pattern->unparsed, )) and return 1 if $self->guest->is_guest($c); }

не авторизовался

$self->deny_log($route, $args, $u, $c) and $c->$fail_auth_cb() and return undef unless $u && $u->{id};

допустить если {auth=>'only'}

$app->log->debug(sprintf(qq[Access allow [%s] for {auth}=~'only'], $route->pattern->unparsed, )) and return 1 if $args->{auth} && $args->{auth} =~ m'\bonly\b'i;

my $id2 = [$u->{id}, map($->{id}, grep !$->{disable},@{$u->roles})]; my $id1 = [grep $_, @$args{qw(id route_id action_id controller_id namespace_id)}];

explicit acces to route

scalar @$id1 && $access->access_explicit($id1, $id2) && $app->log->debug(sprintf "Access allow [%s] for roles=[%s] joined id1=%s; args=[%s]; defaults=%s", $route->pattern->unparsed, $c->dumper($id2) =~ s/\s+//gr, $c->dumper($id1) =~ s/\s+//gr, $c->dumper($args) =~ s/\s+//gr, $c->dumper($route->pattern->defaults) =~ s/\s+//gr, ) && return 1;

Access to non db route by role

$args->{role} && $access->access_role($args->{role}, $id2) && $app->log->debug(sprintf "Access allow [%s] by role [%s]", $route->pattern->unparsed, $args->{role}, ) && return 1;

implicit access to non db routes

my $controller = $args->{controller} || $route->pattern->defaults->{controller} && ucfirst(lc($route->pattern->defaults->{controller})); my $namespace = $args->{namespace} || $route->pattern->defaults->{namespace}; if ($controller && !$namespace) { (loadclass(namespace=>$, controller=>$controller) and ($namespace = $_) and last) for @{ $app->routes->namespaces };

~ warn "FOUND CONTROLLER[$controller] in NAMESPACE: $namespace";

}

my $fail_access_cb = $conf->{access}{fail_access_cb};

$self->deny_log($route, $args, $u, $c) and $c->$fail_access_cb() and return undef unless $controller && $namespace;# failed load class

$access->access_namespace($namespace, $id2) && $app->log->debug(sprintf "Access allow [%s] for roles=[%s] by namespace=[%s]; args=[%s]; defaults=[%s]", $route->pattern->unparsed, $c->dumper($id2) =~ s/\s+//gr, $namespace, $c->dumper($args) =~ s/\s+//gr, $c->dumper($route->pattern->defaults) =~ s/\s+//gr, ) && return 1;

$access->access_controller($namespace, $controller, $id2) && $app->log->debug(sprintf "Access allow [%s] for roles=[%s] by namespace=[%s] and controller=[%s]; args=[%s]; defaults=[%s]", $route->pattern->unparsed, $c->dumper($id2) =~ s/\s+//gr, $namespace, $controller, $c->dumper($args) =~ s/\s+//gr, $c->dumper($route->pattern->defaults) =~ s/\s+//gr, ) && return 1;

еще раз контроллер, который тут без namespace и в базе без namespace ------> доступ из любого места

$args->{namespace} || $route->pattern->defaults->{namespace} || $access->access_controller(undef, $controller, $id2) && $app->log->debug(sprintf "Access allow [%s] for roles=[%s] by controller=[%s] without namespace on db; args=[%s]; defaults=[%s]", $route->pattern->unparsed, $c->dumper($id2) =~ s/\s+//gr, $controller, $c->dumper($args) =~ s/\s+//gr, $c->dumper($route->pattern->defaults) =~ s/\s+//gr, ) && return 1;

my $action = $args->{action} || $route->pattern->defaults->{action} or $self->deny_log($route, $args, $u, $c) and $c->$fail_access_cb() and return undef;

$access->access_action($namespace, $controller, $action, $id2) && $app->log->debug(sprintf "Access allow [%s] for roles=[%s] by namespace=[%s] and controller=[%s] and action=[%s]; args=[%s]; defaults=[%s]", $route->pattern->unparsed, $c->dumper($id2) =~ s/\s+//gr, $namespace , $controller, $action, $c->dumper($args) =~ s/\s+//gr, $c->dumper($route->pattern->defaults) =~ s/\s+//gr, ) && return 1;

еще раз контроллер, который тут без namespace и в базе без namespace ------> доступ из любого места

$args->{namespace} || $route->pattern->defaults->{namespace} && $access->access_action(undef, $controller, $action, $id2) && $app->log->debug(sprintf "Access allow [%s] for roles=[%s] by (namespace=[any]) controller=[%s] and action=[%s]; args=[%s]; defaults=[%s]", $route->pattern->unparsed, $c->dumper($id2) =~ s/\s+//gr, $controller, $action, $c->dumper($args) =~ s/\s+//gr, $c->dumper($route->pattern->defaults) =~ s/\s+//gr, ) && return 1;

$self->deny_log($route, $args, $u, $c); $c->$fail_access_cb(); return undef; }

sub denylog { my $self = shift; my ($route, $args, $u, $c) = @; my $app = $self->app; $app->log->debug(sprintf "Access deny [%s] for profile id=[%s]; args=[%s]; defaults=[%s]", $route->pattern->unparsed, $u ? $u->{id} : 'non auth', $app->dumper($args) =~ s/\s+//gr, $app->dumper($route->pattern->defaults) =~ s/\s+//gr, ); }

sub model { my ($self, $name) = @_; my $ns = $self->merge_conf->{'model_namespace'}; my $class = load_class(namespace => $ns, module=> $name) or die "Model module [$name] not found at namespace [$ns] or has errors";

weaken $self;

~ weaken $self->{app};

$class->new(app=>$self->app, plugin=>$self); # синглетоны в общем

};

our $VERSION = '0.881';

=pod

=encoding utf8

=head1 Доброго всем

¡ ¡ ¡ ALL GLORY TO GLORIA ! ! !

=head1 Mojolicious::Plugin::RoutesAuthDBI

Plugin makes an auth operations throught the plugin L and OAuth2 by L.

=head1 VERSION

0.881

=head1 NAME

Mojolicious::Plugin::RoutesAuthDBI - from DBI tables does generate app routes, make authentication and make restrict access (authorization).

=head1 DB DESIGN DIAGRAM

First of all you will see L<SVG|https://github.com/mche/Mojolicious-Plugin-RoutesAuthDBI/blob/master/Diagram.svg> or L<PNG|http://i.imgur.com/CwqiB4f.png>

=head1 SYNOPSIS

$app->plugin('RoutesAuthDBI', dbh => $app->dbh, auth => {...}, access => {...}, admin => {...}, oauth => {...}, guest => {...}, template => {...}, model_namespace=>..., );

=head2 PLUGIN OPTIONS

One option C is mandatory, all other - optional.

=head3 dbh

Handler DBI connection where are tables: controllers, actions, routes, logins, profiles, roles, refs and oauth.

dbh => $app->dbh,

or

dbh => sub { shift->dbh },

=head3 auth

Hashref options pass to base plugin L. By default the option:

current_user_fn => 'auth_user', stash_key => "Mojolicious::Plugin::RoutesAuthDBIuser",

The options:

load_user => \&load_user, validate_user => \&validate_user,

are imported from package access module. See below.

=head3 access

Hashref options for special access module. This module has subs/methods for manage auth and access operations, has appling routes from DBI table. By default plugin will load the builtin module:

access => { module => 'Access', namespace => 'Mojolicious::Plugin::RoutesAuthDBI', ..., },

You might define your own module by passing options:

access => { module => 'Foo', namespace => 'Bar::Baz', ..., },

See L for detail options list.

=head3 admin

Hashref options for admin controller for actions on SQL tables routes, roles, profiles, logins. By default the builtin module:

admin => { controller => 'Admin', namespace => 'Mojolicious::Plugin::RoutesAuthDBI', ..., },

You might define your own controller by passing options:

admin => { controller => 'Foo', namespace => 'Bar::Baz', ..., },

See L for detail options list.

=head3 oauth

Hashref options for oauth controller. By default the builtin module:

oauth => { controller => 'OAuth', namespace => 'Mojolicious::Plugin::RoutesAuthDBI', ..., },

You might define your own controller by passing options:

oauth => { controller => 'Foo::Bar::Baz', ..., },

See L for detail options list.

=head3 guest

Hashref options for guest module. Defaults are:

guest => { namespace => 'Mojolicious::Plugin::RoutesAuthDBI', module => 'Guest', session_key => 'guest_data', stash_key => "Mojolicious::Plugin::RoutesAuthDBIguest",

},

Disable guest module usage:

guest => undef, # or none in config

See L

=head3 model_namespace

Where are your models place. Default to "Mojolicious::Plugin::RoutesAuthDBI::Model".

=head3 template

Hashref variables for SQL templates of models dictionaries. Defaults is C<$Mojolicious::Plugin::RoutesAuthDBI::Schema::defaults>. See L.

=head1 INSTALL

See L.

=head1 REQUIRES CONDITIONS

=head2 access

Heart of this plugin! This condition apply for all db routes even if column auth set to 0. It is possible to apply this condition to non db routes also:

=over 4

=item * No access check to route, but authorization by session will ready:

$r->any('/foo')->...->requires(access=>{auth=>0})->...;

=item * Allow if has authentication only:

$r->any('/foo')->...->requires(access=>{auth=>'only'})->...;

same as

$r->any('/foo')->...->requires(authenticated => 1)->...; # see Mojolicious::Plugin::Authentication

=item * Allow for guest

$r->any('/foo')->...->requires(access=>{guest=>1})->...;

To makes guest session:

$c->access->plugin->guest->store($c, {<...some data...>});

See L

=item * Route accessible if profile roles assigned to either B namespace or controller 'Bar.pm' (which assigned neither namespece on db or assigned to that loadable namespace) or action 'bar' on controller Bar.pm (action record in db table actions):

$r->any('/bar-bar-any-namespace')->to('bar#bar',)->requires(access=>{auth=>1})->...;

=item * Explicit defined namespace route accessible either namespace 'Bar' or 'Bar::Bar.pm' controller or action 'bar' in controller 'Bar::Bar.pm' (which assigned to namespace 'Bar' in table refs):

$r->any('/bar-bar-bar')->to('bar#bar', namespace=>'Bar')->requires(access=>{auth=>1})->...;

=item * Check access by overriden namespace 'BarX': controller and action also with that namespace in db table refs:

$r->any('/bar-nsX')->to('bar#bar', namespace=>'Bar')->requires(access=>{auth=>1, namespace=>'BarX'})->...;

=item * Check access by overriden namespace 'BarX' and controller 'BarX.pm', action record also with that ns & c in db table refs:

$r->any('/bar-nsX-cX')->to('bar#bar', namespace=>'Bar')->requires(access=>{auth=>1, namespace=>'BarX', controller=>'BarX'})->...;

=item * Full override names access:

$r->any('/bar-nsX-cX-aX')->to('bar#bar', namespace=>'Bar')->requires(access=>{auth=>1, namespace=>'BarX', controller=>'BarX', action=>'barX'})->...;

=item *

$r->any('/bar-cX-aX')->to('bar#bar',)->requires(access=>{auth=>1, controller=>'BarX', action=>'barX'})->...;

=item * Route accessible if profile roles list has defined role (admin):

$r->any('/bar-role-admin')->to('bar#bar',)->requires(access=>{auth=>1, role=> 'admin'})->...;

=item * Pass callback to access condition

The callback will get parameters: $profile, $route, $c, $captures, $args (this callback ref). Callback must returns true or false for restrict access. Example simple auth access:

$r->any('/check-auth')->requires(access=>sub {my ($profile, $route, $c, $captures, $args) = @_; return $profile;})->to(cb=>sub {my $c =shift; $c->render(format=>'txt', text=>"Hi @{[$c->auth_user->{names}]}!\n\nYou have access!");});

=back

=head1 HELPERS

=head2 access

Returns access instance obiect. See L methods.

if ($c->access->access_explicit([1,2,3], [1,2,3])) {

yes, accessible

}

=head1 METHODS and SUBS

Registration() & access() & .

=head2 Example routing table records

Request
HTTP method(s) (optional)
and the URL (space delim)
                           Contoller    Method          Route Name        Auth
-------------------------  -----------  --------------  ----------------- -----
GET /city/new              City         new_form        city_new_form     1
GET /city/:id              City         show            city_show         1
GET /city/edit/:id         City         edit_form       city_edit_form    1
GET /cities                City         index           city_index        1
POST /city                 City         save            city_save         1
GET /city/delete/:id       City         delete_form     city_delete_form  1
DELETE /city/:id           City         delete          city_delete       1
/                          Home         index           home_index        0
get post /foo/baz          Foo          baz             foo_baz           1

It table will generate the L<Mojolicious routes|http://mojolicious.org/perldoc/Mojolicious/Guides/Routing>:

# GET /city/new 
$r->any('/city/new')->methods('get')->requires(<access>)->to(controller => 'city', action => 'new_form')->name('city_new_form');

# GET /city/123 - show item with id 123
$r->any('/city/:id')->methods('get')->requires(<access>)->to(controller => 'city', action => 'show')->name('city_show');

# GET /city/edit/123 - form to edit an item
$r->any('/city/edit/:id')->methods('get')->requires(<access>)->to(controller => 'city', action => 'edit_form')->name('city_edit_form');

# GET /cities - list of all items
$r->any('/cities')->methods('get')->requires(<access>)->to(controller => 'city', action => 'index')->name('cities_index');

# POST /city - create new item or update the item
$r->any('/city')->methods('post')->to(controller => 'city', action => 'save')->name('city_save');

# GET /city/delete/123 - form to confirm delete an item id=123
$r->any('/city/delete/:id')->methods('get')->requires(<access>)->to(controller => 'city', action => 'delete_form')->name('city_delete_form');

# DELETE /city/123 - delete an item id=123
$r->any('/city/:id')->methods('delete')->requires(<access>)->to(controller => 'city', action => 'delete')->name('city_delete');

# without HTTP method and no auth restrict
$r->any('/')->to(controller => 'Home', action => 'index')->name('home_index');

# GET or POST /foo/baz 
$r->any('/foo/baz')->methods('GET', 'post')->requires(<access>)->to(controller => 'Foo', action => 'baz')->name('foo_baz');

=head2 Warning

If you changed the routes table then kill -HUP or reload app to regenerate routes. Changing assess not require reloading the service.

=head1 SEE ALSO

L

L

=head1 AUTHOR

Михаил Че (Mikhail Che), C<< <mche[-at-]cpan.org> >>

=head1 BUGS / CONTRIBUTING

Please report any bugs or feature requests at Lhttps://github.com/mche/Mojolicious-Plugin-RoutesAuthDBI/issues. Pull requests also welcome.

=head1 COPYRIGHT

Copyright 2016+ Mikhail Che.

This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.

=cut