Module: ActiveModel::MassAssignmentSecurity::ClassMethods
- Defined in:
- lib/active_model/mass_assignment_security.rb
Overview
Mass assignment security provides an interface for protecting attributes from end-user assignment. For more complex permissions, mass assignment security may be handled outside the model by extending a non-ActiveRecord class, such as a controller, with this behavior.
For example, a logged in user may need to assign additional attributes depending on their role:
class AccountsController < ApplicationController
include ActiveModel::MassAssignmentSecurity
attr_accessible :first_name, :last_name
attr_accessible :first_name, :last_name, :plan_id, :as => :admin
def update
...
@account.update_attributes(account_params)
...
end
protected
def account_params
role = admin ? :admin : :default
sanitize_for_mass_assignment(params[:account], role)
end
end
Instance Method Summary collapse
- #accessible_attributes(role = :default) ⇒ Object
- #active_authorizers ⇒ Object (also: #active_authorizer)
-
#attr_accessible(*args) ⇒ Object
Specifies a white list of model attributes that can be set via mass-assignment.
-
#attr_protected(*args) ⇒ Object
Attributes named in this macro are protected from mass-assignment whenever attributes are sanitized before assignment.
- #attributes_protected_by_default ⇒ Object
- #protected_attributes(role = :default) ⇒ Object
Instance Method Details
#accessible_attributes(role = :default) ⇒ Object
174 175 176 |
# File 'lib/active_model/mass_assignment_security.rb', line 174 def accessible_attributes(role = :default) accessible_attributes_configs[role] end |
#active_authorizers ⇒ Object Also known as:
178 179 180 |
# File 'lib/active_model/mass_assignment_security.rb', line 178 def self. ||= protected_attributes_configs end |
#attr_accessible(*args) ⇒ Object
Specifies a white list of model attributes that can be set via mass-assignment.
Like attr_protected
, a role for the attributes is optional, if no role is provided then :default is used. A role can be defined by using the :as option.
This is the opposite of the attr_protected
macro: Mass-assignment will only set attributes in this list, to assign to the rest of attributes you can use direct writer methods. This is meant to protect sensitive attributes from being overwritten by malicious users tampering with URLs or forms. If you’d rather start from an all-open default and restrict attributes as needed, have a look at attr_protected
.
class Customer
include ActiveModel::MassAssignmentSecurity
attr_accessor :name, :credit_rating
attr_accessible :name
attr_accessible :name, :credit_rating, :as => :admin
def assign_attributes(values, = {})
sanitize_for_mass_assignment(values, [:as]).each do |k, v|
send("#{k}=", v)
end
end
end
When using the :default role :
customer = Customer.new
customer.assign_attributes({ "name" => "David", "credit_rating" => "Excellent", :last_login => 1.day.ago }, :as => :default)
customer.name # => "David"
customer. # => nil
customer. = "Average"
customer. # => "Average"
And using the :admin role :
customer = Customer.new
customer.assign_attributes({ "name" => "David", "credit_rating" => "Excellent", :last_login => 1.day.ago }, :as => :admin)
customer.name # => "David"
customer. # => "Excellent"
Note that using Hash#except
or Hash#slice
in place of attr_accessible
to sanitize attributes won’t provide sufficient protection.
157 158 159 160 161 162 163 164 165 166 167 168 |
# File 'lib/active_model/mass_assignment_security.rb', line 157 def attr_accessible(*args) = args. role = [:as] || :default self._accessible_attributes = accessible_attributes_configs.dup Array.wrap(role).each do |name| self._accessible_attributes[name] = self.accessible_attributes(name) + args end self. = self._accessible_attributes end |
#attr_protected(*args) ⇒ Object
Attributes named in this macro are protected from mass-assignment whenever attributes are sanitized before assignment. A role for the attributes is optional, if no role is provided then :default is used. A role can be defined by using the :as option.
Mass-assignment to these attributes will simply be ignored, to assign to them you can use direct writer methods. This is meant to protect sensitive attributes from being overwritten by malicious users tampering with URLs or forms. Example:
class Customer
include ActiveModel::MassAssignmentSecurity
attr_accessor :name, :credit_rating
attr_protected :credit_rating, :last_login
attr_protected :last_login, :as => :admin
def assign_attributes(values, = {})
sanitize_for_mass_assignment(values, [:as]).each do |k, v|
send("#{k}=", v)
end
end
end
When using the :default role :
customer = Customer.new
customer.assign_attributes({ "name" => "David", "credit_rating" => "Excellent", :last_login => 1.day.ago }, :as => :default)
customer.name # => "David"
customer. # => nil
customer.last_login # => nil
customer. = "Average"
customer. # => "Average"
And using the :admin role :
customer = Customer.new
customer.assign_attributes({ "name" => "David", "credit_rating" => "Excellent", :last_login => 1.day.ago }, :as => :admin)
customer.name # => "David"
customer. # => "Excellent"
customer.last_login # => nil
To start from an all-closed default and enable attributes as needed, have a look at attr_accessible
.
Note that using Hash#except
or Hash#slice
in place of attr_protected
to sanitize attributes won’t provide sufficient protection.
95 96 97 98 99 100 101 102 103 104 105 106 |
# File 'lib/active_model/mass_assignment_security.rb', line 95 def attr_protected(*args) = args. role = [:as] || :default self._protected_attributes = protected_attributes_configs.dup Array.wrap(role).each do |name| self._protected_attributes[name] = self.protected_attributes(name) + args end self. = self._protected_attributes end |
#attributes_protected_by_default ⇒ Object
183 184 185 |
# File 'lib/active_model/mass_assignment_security.rb', line 183 def attributes_protected_by_default [] end |
#protected_attributes(role = :default) ⇒ Object
170 171 172 |
# File 'lib/active_model/mass_assignment_security.rb', line 170 def protected_attributes(role = :default) protected_attributes_configs[role] end |