Class: CASServer::Authenticators::SQLAuthlogic
- Defined in:
- lib/casserver/authenticators/sql_authlogic.rb
Overview
authenticator:
class: CASServer::Authenticators::SQLAuthlogic
database:
adapter: mysql
database: some_database_with_users_table
user: root
password:
server: localhost
user_table: user
username_column: login
password_column: crypted_password
salt_column: password_salt
encryptor: BCrypt
Instance Attribute Summary
Attributes inherited from Base
Instance Method Summary collapse
Methods inherited from Base
Instance Method Details
#validate(credentials) ⇒ Object
45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 |
# File 'lib/casserver/authenticators/sql_authlogic.rb', line 45 def validate(credentials) read_standard_credentials(credentials) raise CASServer::AuthenticatorError, "Cannot validate credentials because the authenticator hasn't yet been configured" unless @options user_model = establish_database_connection_if_necessary username_column = @options[:username_column] || "login" password_column = @options[:password_column] || "crypted_password" salt_column = @options[:salt_column] results = user_model.find(:all, :conditions => ["#{username_column} = ?", @username]) begin encryptor = eval("Authlogic::CryptoProviders::" + @options[:encryptor] || "Sha512") rescue encryptor = Authlogic::CryptoProviders::Sha512 end if results.size > 0 $LOG.warn("Multiple matches found for user '#{@username}'") if results.size > 1 user = results.first tokens = [@password, (not salt_column.nil?) && user.send(salt_column) || nil].compact crypted = user.send(password_column) unless @options[:extra_attributes].blank? if results.size > 1 $LOG.warn("#{self.class}: Unable to extract extra_attributes because multiple matches were found for #{@username.inspect}") else @extra_attributes = {} extra_attributes_to_extract.each do |col| @extra_attributes[col] = user.send(col) end if @extra_attributes.empty? $LOG.warn("#{self.class}: Did not read any extra_attributes for user #{@username.inspect} even though an :extra_attributes option was provided.") else $LOG.debug("#{self.class}: Read the following extra_attributes for user #{@username.inspect}: #{@extra_attributes.inspect}") end end end return encryptor.matches?(crypted, tokens) else return false end end |