authlogic-rails3 2.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (126) hide show
  1. data/.gitignore +9 -0
  2. data/CHANGELOG.rdoc +345 -0
  3. data/LICENSE +20 -0
  4. data/README.rdoc +246 -0
  5. data/Rakefile +44 -0
  6. data/VERSION.yml +5 -0
  7. data/authlogic-rails3.gemspec +218 -0
  8. data/generators/session/session_generator.rb +9 -0
  9. data/generators/session/templates/session.rb +2 -0
  10. data/init.rb +1 -0
  11. data/lib/authlogic.rb +64 -0
  12. data/lib/authlogic/acts_as_authentic/base.rb +107 -0
  13. data/lib/authlogic/acts_as_authentic/email.rb +110 -0
  14. data/lib/authlogic/acts_as_authentic/logged_in_status.rb +60 -0
  15. data/lib/authlogic/acts_as_authentic/login.rb +141 -0
  16. data/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
  17. data/lib/authlogic/acts_as_authentic/password.rb +355 -0
  18. data/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
  19. data/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
  20. data/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
  21. data/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
  22. data/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
  23. data/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
  24. data/lib/authlogic/authenticates_many/association.rb +42 -0
  25. data/lib/authlogic/authenticates_many/base.rb +55 -0
  26. data/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
  27. data/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
  28. data/lib/authlogic/controller_adapters/rails_adapter.rb +48 -0
  29. data/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
  30. data/lib/authlogic/crypto_providers/aes256.rb +43 -0
  31. data/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
  32. data/lib/authlogic/crypto_providers/md5.rb +34 -0
  33. data/lib/authlogic/crypto_providers/sha1.rb +35 -0
  34. data/lib/authlogic/crypto_providers/sha256.rb +50 -0
  35. data/lib/authlogic/crypto_providers/sha512.rb +50 -0
  36. data/lib/authlogic/crypto_providers/wordpress.rb +43 -0
  37. data/lib/authlogic/i18n.rb +83 -0
  38. data/lib/authlogic/i18n/translator.rb +15 -0
  39. data/lib/authlogic/random.rb +33 -0
  40. data/lib/authlogic/regex.rb +25 -0
  41. data/lib/authlogic/session/activation.rb +58 -0
  42. data/lib/authlogic/session/active_record_trickery.rb +64 -0
  43. data/lib/authlogic/session/base.rb +37 -0
  44. data/lib/authlogic/session/brute_force_protection.rb +96 -0
  45. data/lib/authlogic/session/callbacks.rb +99 -0
  46. data/lib/authlogic/session/cookies.rb +130 -0
  47. data/lib/authlogic/session/existence.rb +93 -0
  48. data/lib/authlogic/session/foundation.rb +71 -0
  49. data/lib/authlogic/session/http_auth.rb +58 -0
  50. data/lib/authlogic/session/id.rb +41 -0
  51. data/lib/authlogic/session/klass.rb +78 -0
  52. data/lib/authlogic/session/magic_columns.rb +95 -0
  53. data/lib/authlogic/session/magic_states.rb +59 -0
  54. data/lib/authlogic/session/params.rb +101 -0
  55. data/lib/authlogic/session/password.rb +240 -0
  56. data/lib/authlogic/session/perishable_token.rb +18 -0
  57. data/lib/authlogic/session/persistence.rb +70 -0
  58. data/lib/authlogic/session/priority_record.rb +34 -0
  59. data/lib/authlogic/session/scopes.rb +101 -0
  60. data/lib/authlogic/session/session.rb +62 -0
  61. data/lib/authlogic/session/timeout.rb +82 -0
  62. data/lib/authlogic/session/unauthorized_record.rb +50 -0
  63. data/lib/authlogic/session/validation.rb +82 -0
  64. data/lib/authlogic/test_case.rb +120 -0
  65. data/lib/authlogic/test_case/mock_controller.rb +45 -0
  66. data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
  67. data/lib/authlogic/test_case/mock_logger.rb +10 -0
  68. data/lib/authlogic/test_case/mock_request.rb +19 -0
  69. data/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
  70. data/rails/init.rb +1 -0
  71. data/shoulda_macros/authlogic.rb +69 -0
  72. data/test/acts_as_authentic_test/base_test.rb +18 -0
  73. data/test/acts_as_authentic_test/email_test.rb +101 -0
  74. data/test/acts_as_authentic_test/logged_in_status_test.rb +36 -0
  75. data/test/acts_as_authentic_test/login_test.rb +109 -0
  76. data/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
  77. data/test/acts_as_authentic_test/password_test.rb +236 -0
  78. data/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
  79. data/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
  80. data/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
  81. data/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
  82. data/test/acts_as_authentic_test/single_access_test.rb +44 -0
  83. data/test/authenticates_many_test.rb +16 -0
  84. data/test/crypto_provider_test/aes256_test.rb +14 -0
  85. data/test/crypto_provider_test/bcrypt_test.rb +14 -0
  86. data/test/crypto_provider_test/sha1_test.rb +23 -0
  87. data/test/crypto_provider_test/sha256_test.rb +14 -0
  88. data/test/crypto_provider_test/sha512_test.rb +14 -0
  89. data/test/fixtures/companies.yml +5 -0
  90. data/test/fixtures/employees.yml +17 -0
  91. data/test/fixtures/projects.yml +3 -0
  92. data/test/fixtures/users.yml +24 -0
  93. data/test/i18n_test.rb +33 -0
  94. data/test/libs/affiliate.rb +7 -0
  95. data/test/libs/company.rb +6 -0
  96. data/test/libs/employee.rb +7 -0
  97. data/test/libs/employee_session.rb +2 -0
  98. data/test/libs/ldaper.rb +3 -0
  99. data/test/libs/ordered_hash.rb +9 -0
  100. data/test/libs/project.rb +3 -0
  101. data/test/libs/user.rb +5 -0
  102. data/test/libs/user_session.rb +6 -0
  103. data/test/random_test.rb +42 -0
  104. data/test/session_test/activation_test.rb +43 -0
  105. data/test/session_test/active_record_trickery_test.rb +36 -0
  106. data/test/session_test/brute_force_protection_test.rb +101 -0
  107. data/test/session_test/callbacks_test.rb +6 -0
  108. data/test/session_test/cookies_test.rb +112 -0
  109. data/test/session_test/credentials_test.rb +0 -0
  110. data/test/session_test/existence_test.rb +64 -0
  111. data/test/session_test/http_auth_test.rb +28 -0
  112. data/test/session_test/id_test.rb +17 -0
  113. data/test/session_test/klass_test.rb +40 -0
  114. data/test/session_test/magic_columns_test.rb +62 -0
  115. data/test/session_test/magic_states_test.rb +60 -0
  116. data/test/session_test/params_test.rb +53 -0
  117. data/test/session_test/password_test.rb +106 -0
  118. data/test/session_test/perishability_test.rb +15 -0
  119. data/test/session_test/persistence_test.rb +21 -0
  120. data/test/session_test/scopes_test.rb +60 -0
  121. data/test/session_test/session_test.rb +59 -0
  122. data/test/session_test/timeout_test.rb +52 -0
  123. data/test/session_test/unauthorized_record_test.rb +13 -0
  124. data/test/session_test/validation_test.rb +23 -0
  125. data/test/test_helper.rb +182 -0
  126. metadata +253 -0
@@ -0,0 +1,10 @@
1
+ module Authlogic
2
+ module TestCase
3
+ # Simple class to replace real loggers, so that we can raise any errors being logged.
4
+ class MockLogger
5
+ def error(message)
6
+ raise message
7
+ end
8
+ end
9
+ end
10
+ end
@@ -0,0 +1,19 @@
1
+ module Authlogic
2
+ module TestCase
3
+ class MockRequest # :nodoc:
4
+ attr_accessor :controller
5
+
6
+ def initialize(controller)
7
+ self.controller = controller
8
+ end
9
+
10
+ def remote_ip
11
+ (controller && controller.respond_to?(:env) && controller.env.is_a?(Hash) && controller.env['REMOTE_ADDR']) || "1.1.1.1"
12
+ end
13
+
14
+ private
15
+ def method_missing(*args, &block)
16
+ end
17
+ end
18
+ end
19
+ end
@@ -0,0 +1,30 @@
1
+ module Authlogic
2
+ module TestCase
3
+ # Adapts authlogic to work with the @request object when testing. This way Authlogic can set cookies and what not before
4
+ # a request is made, ultimately letting you log in users in functional tests.
5
+ class RailsRequestAdapter < ControllerAdapters::AbstractAdapter
6
+ def authenticate_with_http_basic(&block)
7
+ end
8
+
9
+ def cookies
10
+ new_cookies = MockCookieJar.new
11
+ super.each do |key, value|
12
+ new_cookies[key] = value[:value]
13
+ end
14
+ new_cookies
15
+ end
16
+
17
+ def cookie_domain
18
+ nil
19
+ end
20
+
21
+ def request
22
+ @request ||= MockRequest.new(controller)
23
+ end
24
+
25
+ def request_content_type
26
+ request.format.to_s
27
+ end
28
+ end
29
+ end
30
+ end
@@ -0,0 +1 @@
1
+ require "authlogic"
@@ -0,0 +1,69 @@
1
+ # Test::Unit
2
+ # Place this file into your test/shoulda_macros directory
3
+ #
4
+ # Example:
5
+ #
6
+ # class UserTest
7
+ # should_have_authlogic
8
+ # end
9
+ #
10
+ # Rspec
11
+ # Place this file into your spec/support/shoulda directory
12
+ #
13
+ # Example:
14
+ #
15
+ # describe User do
16
+ # it { should have_authlogic }
17
+ # end
18
+
19
+ module Authlogic
20
+ module Shoulda
21
+
22
+ module Matchers
23
+ def have_authlogic
24
+ HaveAuthlogic.new
25
+ end
26
+ alias_method :be_authentic, :have_authlogic
27
+
28
+ class HaveAuthlogic
29
+
30
+ def matches?(subject)
31
+ subject.respond_to?(:password=) && subject.respond_to?(:valid_password?)
32
+ end
33
+
34
+ def failure_message
35
+ "Add the line 'acts_as_authentic' to your model"
36
+ end
37
+
38
+ def description
39
+ "have Authlogic"
40
+ end
41
+ end
42
+
43
+ end
44
+
45
+ module Macros
46
+ include Matchers
47
+
48
+ def should_have_authlogic
49
+ klass = described_type rescue model_class
50
+ matcher = HaveAuthlogic.new
51
+
52
+ should matcher.description do
53
+ assert matcher.matches?(klass.new), matcher.failure_message
54
+ end
55
+ end
56
+ alias_method :should_be_authentic, :should_have_authlogic
57
+
58
+ end
59
+
60
+ end
61
+ end
62
+
63
+ if defined? Spec
64
+ Spec::Runner.configure do |config|
65
+ config.include(Authlogic::Shoulda::Matchers)
66
+ end
67
+ else
68
+ Test::Unit::TestCase.class_eval { extend Authlogic::Shoulda::Macros }
69
+ end
@@ -0,0 +1,18 @@
1
+ require 'test_helper'
2
+
3
+ module ActsAsAuthenticTest
4
+ class BaseTest < ActiveSupport::TestCase
5
+ def test_acts_as_authentic
6
+ assert_nothing_raised do
7
+ User.acts_as_authentic do
8
+ end
9
+ end
10
+ end
11
+
12
+ def test_acts_as_authentic_with_old_config
13
+ assert_raise(ArgumentError) do
14
+ User.acts_as_authentic({})
15
+ end
16
+ end
17
+ end
18
+ end
@@ -0,0 +1,101 @@
1
+ require 'test_helper'
2
+
3
+ module ActsAsAuthenticTest
4
+ class EmailTest < ActiveSupport::TestCase
5
+ def test_email_field_config
6
+ assert_equal :email, User.email_field
7
+ assert_equal :email, Employee.email_field
8
+
9
+ User.email_field = :nope
10
+ assert_equal :nope, User.email_field
11
+ User.email_field :email
12
+ assert_equal :email, User.email_field
13
+ end
14
+
15
+ def test_validate_email_field_config
16
+ assert User.validate_email_field
17
+ assert Employee.validate_email_field
18
+
19
+ User.validate_email_field = false
20
+ assert !User.validate_email_field
21
+ User.validate_email_field true
22
+ assert User.validate_email_field
23
+ end
24
+
25
+ def test_validates_length_of_email_field_options_config
26
+ assert_equal({:within => 6..100}, User.validates_length_of_email_field_options)
27
+ assert_equal({:within => 6..100}, Employee.validates_length_of_email_field_options)
28
+
29
+ User.validates_length_of_email_field_options = {:yes => "no"}
30
+ assert_equal({:yes => "no"}, User.validates_length_of_email_field_options)
31
+ User.validates_length_of_email_field_options({:within => 6..100})
32
+ assert_equal({:within => 6..100}, User.validates_length_of_email_field_options)
33
+ end
34
+
35
+ def test_validates_format_of_email_field_options_config
36
+ default = {:with => Authlogic::Regex.email, :message => I18n.t('error_messages.email_invalid', :default => "should look like an email address.")}
37
+ assert_equal default, User.validates_format_of_email_field_options
38
+ assert_equal default, Employee.validates_format_of_email_field_options
39
+
40
+ User.validates_format_of_email_field_options = {:yes => "no"}
41
+ assert_equal({:yes => "no"}, User.validates_format_of_email_field_options)
42
+ User.validates_format_of_email_field_options default
43
+ assert_equal default, User.validates_format_of_email_field_options
44
+ end
45
+
46
+ def test_validates_uniqueness_of_email_field_options_config
47
+ default = {:case_sensitive => false, :scope => Employee.validations_scope, :if => "#{Employee.email_field}_changed?".to_sym}
48
+ assert_equal default, Employee.validates_uniqueness_of_email_field_options
49
+
50
+ Employee.validates_uniqueness_of_email_field_options = {:yes => "no"}
51
+ assert_equal({:yes => "no"}, Employee.validates_uniqueness_of_email_field_options)
52
+ Employee.validates_uniqueness_of_email_field_options default
53
+ assert_equal default, Employee.validates_uniqueness_of_email_field_options
54
+ end
55
+
56
+ def test_validates_length_of_email_field
57
+ u = User.new
58
+ u.email = "a@a.a"
59
+ assert !u.valid?
60
+ assert u.errors[:email].size > 0
61
+
62
+ u.email = "a@a.com"
63
+ assert !u.valid?
64
+ assert u.errors[:email].size == 0
65
+ end
66
+
67
+ def test_validates_format_of_email_field
68
+ u = User.new
69
+ u.email = "aaaaaaaaaaaaa"
70
+ u.valid?
71
+ assert u.errors[:email].size > 0
72
+
73
+ u.email = "a@a.com"
74
+ u.valid?
75
+ assert u.errors[:email].size == 0
76
+
77
+ u.email = "damien+test1...etc..@mydomain.com"
78
+ u.valid?
79
+ assert u.errors[:email].size == 0
80
+
81
+ u.email = "dakota.dux+1@gmail.com"
82
+ u.valid?
83
+ assert u.errors[:email].size == 0
84
+ end
85
+
86
+ def test_validates_uniqueness_of_email_field
87
+ u = User.new
88
+ u.email = "bjohnson@binarylogic.com"
89
+ assert !u.valid?
90
+ assert u.errors[:email].size > 0
91
+
92
+ u.email = "BJOHNSON@binarylogic.com"
93
+ assert !u.valid?
94
+ assert u.errors[:email].size > 0
95
+
96
+ u.email = "a@a.com"
97
+ assert !u.valid?
98
+ assert u.errors[:email].size == 0
99
+ end
100
+ end
101
+ end
@@ -0,0 +1,36 @@
1
+ require 'test_helper'
2
+
3
+ module ActsAsAuthenticTest
4
+ class LoggedInStatusTest < ActiveSupport::TestCase
5
+ def test_logged_in_timeout_config
6
+ assert_equal 10.minutes.to_i, User.logged_in_timeout
7
+ assert_equal 10.minutes.to_i, Employee.logged_in_timeout
8
+
9
+ User.logged_in_timeout = 1.hour
10
+ assert_equal 1.hour.to_i, User.logged_in_timeout
11
+ User.logged_in_timeout 10.minutes
12
+ assert_equal 10.minutes.to_i, User.logged_in_timeout
13
+ end
14
+
15
+ def test_named_scope_logged_in
16
+ assert_equal 0, User.logged_in.count
17
+ User.first.update_attribute(:last_request_at, Time.now)
18
+ assert_equal 1, User.logged_in.count
19
+ end
20
+
21
+ def test_named_scope_logged_out
22
+ assert_equal 2, User.logged_out.count
23
+ User.first.update_attribute(:last_request_at, Time.now)
24
+ assert_equal 1, User.logged_out.count
25
+ end
26
+
27
+ def test_logged_in_logged_out
28
+ u = User.first
29
+ assert !u.logged_in?
30
+ assert u.logged_out?
31
+ u.last_request_at = Time.now
32
+ assert u.logged_in?
33
+ assert !u.logged_out?
34
+ end
35
+ end
36
+ end
@@ -0,0 +1,109 @@
1
+ require 'test_helper'
2
+
3
+ module ActsAsAuthenticTest
4
+ class LoginTest < ActiveSupport::TestCase
5
+ def test_login_field_config
6
+ assert_equal :login, User.login_field
7
+ assert_nil Employee.login_field
8
+
9
+ User.login_field = :nope
10
+ assert_equal :nope, User.login_field
11
+ User.login_field :login
12
+ assert_equal :login, User.login_field
13
+ end
14
+
15
+ def test_validate_login_field_config
16
+ assert User.validate_login_field
17
+ assert Employee.validate_login_field
18
+
19
+ User.validate_login_field = false
20
+ assert !User.validate_login_field
21
+ User.validate_login_field true
22
+ assert User.validate_login_field
23
+ end
24
+
25
+ def test_validates_length_of_login_field_options_config
26
+ assert_equal({:within => 3..100}, User.validates_length_of_login_field_options)
27
+ assert_equal({:within => 3..100}, Employee.validates_length_of_login_field_options)
28
+
29
+ User.validates_length_of_login_field_options = {:yes => "no"}
30
+ assert_equal({:yes => "no"}, User.validates_length_of_login_field_options)
31
+ User.validates_length_of_login_field_options({:within => 3..100})
32
+ assert_equal({:within => 3..100}, User.validates_length_of_login_field_options)
33
+ end
34
+
35
+ def test_validates_format_of_login_field_options_config
36
+ default = {:with => /\A\w[\w\.+\-_@ ]+$/, :message => I18n.t('error_messages.login_invalid', :default => "should use only letters, numbers, spaces, and .-_@ please.")}
37
+ assert_equal default, User.validates_format_of_login_field_options
38
+ assert_equal default, Employee.validates_format_of_login_field_options
39
+
40
+ User.validates_format_of_login_field_options = {:yes => "no"}
41
+ assert_equal({:yes => "no"}, User.validates_format_of_login_field_options)
42
+ User.validates_format_of_login_field_options default
43
+ assert_equal default, User.validates_format_of_login_field_options
44
+ end
45
+
46
+ def test_validates_uniqueness_of_login_field_options_config
47
+ default = {:case_sensitive => false, :scope => User.validations_scope, :if => "#{User.login_field}_changed?".to_sym}
48
+ assert_equal default, User.validates_uniqueness_of_login_field_options
49
+
50
+ User.validates_uniqueness_of_login_field_options = {:yes => "no"}
51
+ assert_equal({:yes => "no"}, User.validates_uniqueness_of_login_field_options)
52
+ User.validates_uniqueness_of_login_field_options default
53
+ assert_equal default, User.validates_uniqueness_of_login_field_options
54
+ end
55
+
56
+ def test_validates_length_of_login_field
57
+ u = User.new
58
+ u.login = "a"
59
+ assert !u.valid?
60
+ assert u.errors[:login].size > 0
61
+
62
+ u.login = "aaaaaaaaaa"
63
+ assert !u.valid?
64
+ assert u.errors[:login].size == 0
65
+ end
66
+
67
+ def test_validates_format_of_login_field
68
+ u = User.new
69
+ u.login = "fdsf@^&*"
70
+ assert !u.valid?
71
+ assert u.errors[:login].size > 0
72
+
73
+ u.login = "fdsfdsfdsfdsfs"
74
+ assert !u.valid?
75
+ assert u.errors[:login].size == 0
76
+
77
+ u.login = "dakota.dux+1@gmail.com"
78
+ assert !u.valid?
79
+ assert u.errors[:login].size == 0
80
+ end
81
+
82
+ def test_validates_uniqueness_of_login_field
83
+ u = User.new
84
+ u.login = "bjohnson"
85
+ assert !u.valid?
86
+ assert u.errors[:login].size > 0
87
+
88
+ u.login = "BJOHNSON"
89
+ assert !u.valid?
90
+ assert u.errors[:login].size > 0
91
+
92
+ u.login = "fdsfdsf"
93
+ assert !u.valid?
94
+ assert u.errors[:login].size == 0
95
+ end
96
+
97
+ def test_find_by_smart_case_login_field
98
+ ben = users(:ben)
99
+ assert_equal ben, User.find_by_smart_case_login_field("bjohnson")
100
+ assert_equal ben, User.find_by_smart_case_login_field("BJOHNSON")
101
+ assert_equal ben, User.find_by_smart_case_login_field("Bjohnson")
102
+
103
+ drew = employees(:drew)
104
+ assert_equal drew, Employee.find_by_smart_case_login_field("dgainor@binarylogic.com")
105
+ assert_equal drew, Employee.find_by_smart_case_login_field("Dgainor@binarylogic.com")
106
+ assert_equal drew, Employee.find_by_smart_case_login_field("DGAINOR@BINARYLOGIC.COM")
107
+ end
108
+ end
109
+ end
@@ -0,0 +1,27 @@
1
+ require 'test_helper'
2
+
3
+ module ActsAsAuthenticTest
4
+ class MagicColumnsTest < ActiveSupport::TestCase
5
+ def test_validates_numericality_of_login_count
6
+ u = User.new
7
+ u.login_count = -1
8
+ assert !u.valid?
9
+ assert u.errors[:login_count].size > 0
10
+
11
+ u.login_count = 0
12
+ assert !u.valid?
13
+ assert u.errors[:login_count].size == 0
14
+ end
15
+
16
+ def test_validates_numericality_of_failed_login_count
17
+ u = User.new
18
+ u.failed_login_count = -1
19
+ assert !u.valid?
20
+ assert u.errors[:failed_login_count].size > 0
21
+
22
+ u.failed_login_count = 0
23
+ assert !u.valid?
24
+ assert u.errors[:failed_login_count].size == 0
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,236 @@
1
+ require 'test_helper'
2
+
3
+ module ActsAsAuthenticTest
4
+ class PasswordTest < ActiveSupport::TestCase
5
+ def test_crypted_password_field_config
6
+ assert_equal :crypted_password, User.crypted_password_field
7
+ assert_equal :crypted_password, Employee.crypted_password_field
8
+
9
+ User.crypted_password_field = :nope
10
+ assert_equal :nope, User.crypted_password_field
11
+ User.crypted_password_field :crypted_password
12
+ assert_equal :crypted_password, User.crypted_password_field
13
+ end
14
+
15
+ def test_password_salt_field_config
16
+ assert_equal :password_salt, User.password_salt_field
17
+ assert_equal :password_salt, Employee.password_salt_field
18
+
19
+ User.password_salt_field = :nope
20
+ assert_equal :nope, User.password_salt_field
21
+ User.password_salt_field :password_salt
22
+ assert_equal :password_salt, User.password_salt_field
23
+ end
24
+
25
+ def test_ignore_blank_passwords_config
26
+ assert User.ignore_blank_passwords
27
+ assert Employee.ignore_blank_passwords
28
+
29
+ User.ignore_blank_passwords = false
30
+ assert !User.ignore_blank_passwords
31
+ User.ignore_blank_passwords true
32
+ assert User.ignore_blank_passwords
33
+ end
34
+
35
+ def test_check_passwords_against_database
36
+ assert User.check_passwords_against_database
37
+ User.check_passwords_against_database = false
38
+ assert !User.check_passwords_against_database
39
+ User.check_passwords_against_database true
40
+ assert User.check_passwords_against_database
41
+ end
42
+
43
+ def test_validate_password_field_config
44
+ assert User.validate_password_field
45
+ assert Employee.validate_password_field
46
+
47
+ User.validate_password_field = false
48
+ assert !User.validate_password_field
49
+ User.validate_password_field true
50
+ assert User.validate_password_field
51
+ end
52
+
53
+ def test_validates_length_of_password_field_options_config
54
+ default = {:minimum => 4, :if => :require_password?}
55
+ assert_equal default, User.validates_length_of_password_field_options
56
+ assert_equal default, Employee.validates_length_of_password_field_options
57
+
58
+ User.validates_length_of_password_field_options = {:yes => "no"}
59
+ assert_equal({:yes => "no"}, User.validates_length_of_password_field_options)
60
+ User.validates_length_of_password_field_options default
61
+ assert_equal default, User.validates_length_of_password_field_options
62
+ end
63
+
64
+ def test_validates_confirmation_of_password_field_options_config
65
+ default = {:if => :require_password?}
66
+ assert_equal default, User.validates_confirmation_of_password_field_options
67
+ assert_equal default, Employee.validates_confirmation_of_password_field_options
68
+
69
+ User.validates_confirmation_of_password_field_options = {:yes => "no"}
70
+ assert_equal({:yes => "no"}, User.validates_confirmation_of_password_field_options)
71
+ User.validates_confirmation_of_password_field_options default
72
+ assert_equal default, User.validates_confirmation_of_password_field_options
73
+ end
74
+
75
+ def test_validates_length_of_password_confirmation_field_options_config
76
+ default = {:minimum => 4, :if => :require_password?}
77
+ assert_equal default, User.validates_length_of_password_confirmation_field_options
78
+ assert_equal default, Employee.validates_length_of_password_confirmation_field_options
79
+
80
+ User.validates_length_of_password_confirmation_field_options = {:yes => "no"}
81
+ assert_equal({:yes => "no"}, User.validates_length_of_password_confirmation_field_options)
82
+ User.validates_length_of_password_confirmation_field_options default
83
+ assert_equal default, User.validates_length_of_password_confirmation_field_options
84
+ end
85
+
86
+ def test_crypto_provider_config
87
+ assert_equal Authlogic::CryptoProviders::Sha512, User.crypto_provider
88
+ assert_equal Authlogic::CryptoProviders::AES256, Employee.crypto_provider
89
+
90
+ User.crypto_provider = Authlogic::CryptoProviders::BCrypt
91
+ assert_equal Authlogic::CryptoProviders::BCrypt, User.crypto_provider
92
+ User.crypto_provider Authlogic::CryptoProviders::Sha512
93
+ assert_equal Authlogic::CryptoProviders::Sha512, User.crypto_provider
94
+ end
95
+
96
+ def test_transition_from_crypto_providers_config
97
+ assert_equal [], User.transition_from_crypto_providers
98
+ assert_equal [], Employee.transition_from_crypto_providers
99
+
100
+ User.transition_from_crypto_providers = [Authlogic::CryptoProviders::BCrypt]
101
+ assert_equal [Authlogic::CryptoProviders::BCrypt], User.transition_from_crypto_providers
102
+ User.transition_from_crypto_providers []
103
+ assert_equal [], User.transition_from_crypto_providers
104
+ end
105
+
106
+ def test_validates_length_of_password
107
+ u = User.new
108
+ u.password_confirmation = "test2"
109
+ assert !u.valid?
110
+ assert u.errors[:password].size > 0
111
+
112
+ u.password = "test"
113
+ assert !u.valid?
114
+ assert u.errors[:password_confirmation].size == 0
115
+ end
116
+
117
+ def test_validates_confirmation_of_password
118
+ u = User.new
119
+ u.password = "test"
120
+ u.password_confirmation = "test2"
121
+ assert !u.valid?
122
+ assert u.errors[:password].size > 0
123
+
124
+ u.password_confirmation = "test"
125
+ assert !u.valid?
126
+ assert u.errors[:password].size == 0
127
+ end
128
+
129
+ def test_validates_length_of_password_confirmation
130
+ u = User.new
131
+
132
+ u.password = "test"
133
+ u.password_confirmation = ""
134
+ assert !u.valid?
135
+ assert u.errors[:password_confirmation].size > 0
136
+
137
+ u.password_confirmation = "test"
138
+ assert !u.valid?
139
+ assert u.errors[:password_confirmation].size == 0
140
+
141
+ ben = users(:ben)
142
+ assert ben.valid?
143
+
144
+ ben.password = "newpass"
145
+ assert !ben.valid?
146
+ assert ben.errors[:password_confirmation].size > 0
147
+
148
+ ben.password_confirmation = "newpass"
149
+ assert ben.valid?
150
+ end
151
+
152
+ def test_password
153
+ u = User.new
154
+ old_password_salt = u.password_salt
155
+ old_crypted_password = u.crypted_password
156
+ u.password = "test"
157
+ assert_not_equal old_password_salt, u.password_salt
158
+ assert_not_equal old_crypted_password, u.crypted_password
159
+ end
160
+
161
+ def test_transitioning_password
162
+ ben = users(:ben)
163
+ transition_password_to(Authlogic::CryptoProviders::BCrypt, ben)
164
+ transition_password_to(Authlogic::CryptoProviders::Sha1, ben, [Authlogic::CryptoProviders::Sha512, Authlogic::CryptoProviders::BCrypt])
165
+ transition_password_to(Authlogic::CryptoProviders::Sha512, ben, [Authlogic::CryptoProviders::Sha1, Authlogic::CryptoProviders::BCrypt])
166
+ end
167
+
168
+ def test_checks_password_against_database
169
+ ben = users(:ben)
170
+ ben.password = "new pass"
171
+ assert !ben.valid_password?("new pass")
172
+ assert ben.valid_password?("benrocks")
173
+ end
174
+
175
+ def test_checks_password_against_database_and_always_fails_on_new_records
176
+ user = User.new
177
+ user.password = "new pass"
178
+ assert !user.valid_password?("new pass")
179
+ end
180
+
181
+ def test_checks_password_against_object
182
+ ben = users(:ben)
183
+ ben.password = "new pass"
184
+ assert ben.valid_password?("new pass", false)
185
+ assert !ben.valid_password?("benrocks", false)
186
+ end
187
+
188
+ def test_reset_password
189
+ ben = users(:ben)
190
+ old_crypted_password = ben.crypted_password
191
+ old_password_salt = ben.password_salt
192
+
193
+ # soft reset
194
+ ben.reset_password
195
+ assert_not_equal old_crypted_password, ben.crypted_password
196
+ assert_not_equal old_password_salt, ben.password_salt
197
+
198
+ # make sure it didn't go into the db
199
+ ben.reload
200
+ assert_equal old_crypted_password, ben.crypted_password
201
+ assert_equal old_password_salt, ben.password_salt
202
+
203
+ # hard reset
204
+ assert ben.reset_password!
205
+ assert_not_equal old_crypted_password, ben.crypted_password
206
+ assert_not_equal old_password_salt, ben.password_salt
207
+
208
+ # make sure it did go into the db
209
+ ben.reload
210
+ assert_not_equal old_crypted_password, ben.crypted_password
211
+ assert_not_equal old_password_salt, ben.password_salt
212
+ end
213
+
214
+ private
215
+ def transition_password_to(crypto_provider, records, from_crypto_providers = Authlogic::CryptoProviders::Sha512)
216
+ records = [records] unless records.is_a?(Array)
217
+ User.acts_as_authentic do |c|
218
+ c.crypto_provider = crypto_provider
219
+ c.transition_from_crypto_providers = from_crypto_providers
220
+ end
221
+ records.each do |record|
222
+ old_hash = record.crypted_password
223
+ old_persistence_token = record.persistence_token
224
+ assert record.valid_password?(password_for(record))
225
+ assert_not_equal old_hash.to_s, record.crypted_password.to_s
226
+ assert_not_equal old_persistence_token.to_s, record.persistence_token.to_s
227
+
228
+ old_hash = record.crypted_password
229
+ old_persistence_token = record.persistence_token
230
+ assert record.valid_password?(password_for(record))
231
+ assert_equal old_hash.to_s, record.crypted_password.to_s
232
+ assert_equal old_persistence_token.to_s, record.persistence_token.to_s
233
+ end
234
+ end
235
+ end
236
+ end