authlogic 3.4.6 → 4.2.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (140) hide show
  1. checksums.yaml +5 -5
  2. data/.github/ISSUE_TEMPLATE.md +13 -0
  3. data/.github/triage.md +87 -0
  4. data/.gitignore +4 -0
  5. data/.rubocop.yml +127 -0
  6. data/.rubocop_todo.yml +65 -0
  7. data/.travis.yml +18 -10
  8. data/CHANGELOG.md +156 -6
  9. data/CONTRIBUTING.md +71 -3
  10. data/Gemfile +2 -2
  11. data/README.md +386 -0
  12. data/Rakefile +13 -7
  13. data/UPGRADING.md +22 -0
  14. data/authlogic.gemspec +33 -22
  15. data/lib/authlogic.rb +60 -52
  16. data/lib/authlogic/acts_as_authentic/base.rb +40 -26
  17. data/lib/authlogic/acts_as_authentic/email.rb +96 -32
  18. data/lib/authlogic/acts_as_authentic/logged_in_status.rb +36 -12
  19. data/lib/authlogic/acts_as_authentic/login.rb +114 -49
  20. data/lib/authlogic/acts_as_authentic/magic_columns.rb +17 -6
  21. data/lib/authlogic/acts_as_authentic/password.rb +296 -139
  22. data/lib/authlogic/acts_as_authentic/perishable_token.rb +34 -20
  23. data/lib/authlogic/acts_as_authentic/persistence_token.rb +20 -24
  24. data/lib/authlogic/acts_as_authentic/queries/find_with_case.rb +67 -0
  25. data/lib/authlogic/acts_as_authentic/restful_authentication.rb +68 -23
  26. data/lib/authlogic/acts_as_authentic/session_maintenance.rb +128 -85
  27. data/lib/authlogic/acts_as_authentic/single_access_token.rb +41 -25
  28. data/lib/authlogic/acts_as_authentic/validations_scope.rb +8 -8
  29. data/lib/authlogic/authenticates_many/association.rb +22 -14
  30. data/lib/authlogic/authenticates_many/base.rb +35 -16
  31. data/lib/authlogic/config.rb +10 -10
  32. data/lib/authlogic/controller_adapters/abstract_adapter.rb +40 -12
  33. data/lib/authlogic/controller_adapters/rack_adapter.rb +15 -8
  34. data/lib/authlogic/controller_adapters/rails_adapter.rb +42 -22
  35. data/lib/authlogic/controller_adapters/sinatra_adapter.rb +3 -3
  36. data/lib/authlogic/crypto_providers.rb +91 -0
  37. data/lib/authlogic/crypto_providers/aes256.rb +42 -14
  38. data/lib/authlogic/crypto_providers/bcrypt.rb +35 -20
  39. data/lib/authlogic/crypto_providers/md5.rb +11 -9
  40. data/lib/authlogic/crypto_providers/scrypt.rb +26 -13
  41. data/lib/authlogic/crypto_providers/sha1.rb +14 -8
  42. data/lib/authlogic/crypto_providers/sha256.rb +16 -12
  43. data/lib/authlogic/crypto_providers/sha512.rb +8 -24
  44. data/lib/authlogic/crypto_providers/wordpress.rb +44 -15
  45. data/lib/authlogic/i18n.rb +33 -20
  46. data/lib/authlogic/i18n/translator.rb +1 -1
  47. data/lib/authlogic/random.rb +12 -29
  48. data/lib/authlogic/regex.rb +59 -27
  49. data/lib/authlogic/session/activation.rb +36 -23
  50. data/lib/authlogic/session/active_record_trickery.rb +13 -10
  51. data/lib/authlogic/session/base.rb +20 -8
  52. data/lib/authlogic/session/brute_force_protection.rb +87 -56
  53. data/lib/authlogic/session/callbacks.rb +99 -49
  54. data/lib/authlogic/session/cookies.rb +128 -59
  55. data/lib/authlogic/session/existence.rb +29 -19
  56. data/lib/authlogic/session/foundation.rb +70 -16
  57. data/lib/authlogic/session/http_auth.rb +39 -31
  58. data/lib/authlogic/session/id.rb +27 -15
  59. data/lib/authlogic/session/klass.rb +17 -13
  60. data/lib/authlogic/session/magic_columns.rb +78 -59
  61. data/lib/authlogic/session/magic_states.rb +50 -27
  62. data/lib/authlogic/session/params.rb +79 -50
  63. data/lib/authlogic/session/password.rb +197 -118
  64. data/lib/authlogic/session/perishable_token.rb +12 -6
  65. data/lib/authlogic/session/persistence.rb +20 -14
  66. data/lib/authlogic/session/priority_record.rb +20 -16
  67. data/lib/authlogic/session/scopes.rb +63 -33
  68. data/lib/authlogic/session/session.rb +40 -25
  69. data/lib/authlogic/session/timeout.rb +51 -34
  70. data/lib/authlogic/session/unauthorized_record.rb +24 -18
  71. data/lib/authlogic/session/validation.rb +32 -21
  72. data/lib/authlogic/test_case.rb +123 -35
  73. data/lib/authlogic/test_case/mock_controller.rb +14 -13
  74. data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -5
  75. data/lib/authlogic/test_case/mock_logger.rb +1 -1
  76. data/lib/authlogic/test_case/mock_request.rb +9 -4
  77. data/lib/authlogic/test_case/rails_request_adapter.rb +8 -7
  78. data/lib/authlogic/version.rb +21 -0
  79. data/test/acts_as_authentic_test/base_test.rb +1 -1
  80. data/test/acts_as_authentic_test/email_test.rb +80 -63
  81. data/test/acts_as_authentic_test/logged_in_status_test.rb +14 -8
  82. data/test/acts_as_authentic_test/login_test.rb +91 -49
  83. data/test/acts_as_authentic_test/magic_columns_test.rb +13 -13
  84. data/test/acts_as_authentic_test/password_test.rb +82 -60
  85. data/test/acts_as_authentic_test/perishable_token_test.rb +31 -25
  86. data/test/acts_as_authentic_test/persistence_token_test.rb +9 -5
  87. data/test/acts_as_authentic_test/restful_authentication_test.rb +18 -9
  88. data/test/acts_as_authentic_test/session_maintenance_test.rb +86 -22
  89. data/test/acts_as_authentic_test/single_access_test.rb +15 -15
  90. data/test/adapter_test.rb +21 -0
  91. data/test/authenticates_many_test.rb +26 -11
  92. data/test/config_test.rb +9 -9
  93. data/test/crypto_provider_test/aes256_test.rb +3 -3
  94. data/test/crypto_provider_test/bcrypt_test.rb +1 -1
  95. data/test/crypto_provider_test/scrypt_test.rb +2 -2
  96. data/test/crypto_provider_test/sha1_test.rb +4 -4
  97. data/test/crypto_provider_test/sha256_test.rb +2 -2
  98. data/test/crypto_provider_test/sha512_test.rb +3 -3
  99. data/test/crypto_provider_test/wordpress_test.rb +24 -0
  100. data/test/gemfiles/Gemfile.rails-4.2.x +2 -2
  101. data/test/gemfiles/Gemfile.rails-5.0.x +6 -0
  102. data/test/gemfiles/Gemfile.rails-5.1.x +6 -0
  103. data/test/gemfiles/Gemfile.rails-5.2.x +6 -0
  104. data/test/gemfiles/Gemfile.rails-master +6 -0
  105. data/test/i18n_test.rb +9 -9
  106. data/test/libs/affiliate.rb +2 -2
  107. data/test/libs/company.rb +4 -4
  108. data/test/libs/employee.rb +2 -2
  109. data/test/libs/employee_session.rb +1 -1
  110. data/test/libs/ldaper.rb +1 -1
  111. data/test/libs/project.rb +1 -1
  112. data/test/libs/user_session.rb +2 -2
  113. data/test/random_test.rb +9 -38
  114. data/test/session_test/activation_test.rb +7 -7
  115. data/test/session_test/active_record_trickery_test.rb +9 -6
  116. data/test/session_test/brute_force_protection_test.rb +26 -21
  117. data/test/session_test/callbacks_test.rb +10 -4
  118. data/test/session_test/cookies_test.rb +54 -20
  119. data/test/session_test/existence_test.rb +45 -23
  120. data/test/session_test/foundation_test.rb +17 -1
  121. data/test/session_test/http_auth_test.rb +11 -12
  122. data/test/session_test/id_test.rb +3 -3
  123. data/test/session_test/klass_test.rb +2 -2
  124. data/test/session_test/magic_columns_test.rb +15 -17
  125. data/test/session_test/magic_states_test.rb +17 -19
  126. data/test/session_test/params_test.rb +26 -20
  127. data/test/session_test/password_test.rb +11 -12
  128. data/test/session_test/perishability_test.rb +5 -5
  129. data/test/session_test/persistence_test.rb +4 -3
  130. data/test/session_test/scopes_test.rb +15 -9
  131. data/test/session_test/session_test.rb +7 -6
  132. data/test/session_test/timeout_test.rb +16 -14
  133. data/test/session_test/unauthorized_record_test.rb +3 -3
  134. data/test/session_test/validation_test.rb +5 -5
  135. data/test/test_helper.rb +115 -49
  136. metadata +107 -36
  137. data/README.rdoc +0 -232
  138. data/test/gemfiles/Gemfile.rails-3.2.x +0 -7
  139. data/test/gemfiles/Gemfile.rails-4.0.x +0 -7
  140. data/test/gemfiles/Gemfile.rails-4.1.x +0 -7
@@ -1,6 +1,22 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
+
3
+ # We forbid the use of AC::Parameters, and we have a test to that effect, but we
4
+ # do not want a development dependency on `actionpack`, so we define it here.
5
+ module ActionController
6
+ class Parameters; end
7
+ end
2
8
 
3
9
  module SessionTest
4
10
  class FoundationTest < ActiveSupport::TestCase
11
+ def test_credentials_raise_if_not_a_hash
12
+ session = UserSession.new
13
+ e = assert_raises(TypeError) {
14
+ session.credentials = ActionController::Parameters.new
15
+ }
16
+ assert_equal(
17
+ ::Authlogic::Session::Foundation::InstanceMethods::E_AC_PARAMETERS,
18
+ e.message
19
+ )
20
+ end
5
21
  end
6
22
  end
@@ -1,8 +1,8 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  class HttpAuthTest < ActiveSupport::TestCase
5
- class ConfiTest < ActiveSupport::TestCase
5
+ class ConfigTest < ActiveSupport::TestCase
6
6
  def test_allow_http_basic_auth
7
7
  UserSession.allow_http_basic_auth = false
8
8
  assert_equal false, UserSession.allow_http_basic_auth
@@ -20,37 +20,36 @@ module SessionTest
20
20
  end
21
21
 
22
22
  def test_http_basic_auth_realm
23
- original_http_basic_auth_realm = UserSession.http_basic_auth_realm
24
-
25
- assert_equal 'Application', UserSession.http_basic_auth_realm
26
-
27
- UserSession.http_basic_auth_realm = 'TestRealm'
28
- assert_equal 'TestRealm', UserSession.http_basic_auth_realm
23
+ assert_equal "Application", UserSession.http_basic_auth_realm
24
+ UserSession.http_basic_auth_realm = "TestRealm"
25
+ assert_equal "TestRealm", UserSession.http_basic_auth_realm
29
26
  end
30
27
  end
31
28
 
32
29
  class InstanceMethodsTest < ActiveSupport::TestCase
33
30
  def test_persist_persist_by_http_auth
31
+ UserSession.allow_http_basic_auth = true
32
+
34
33
  aaron = users(:aaron)
35
34
  http_basic_auth_for do
36
- assert !UserSession.find
35
+ refute UserSession.find
37
36
  end
38
37
  http_basic_auth_for(aaron) do
39
38
  assert session = UserSession.find
40
39
  assert_equal aaron, session.record
41
40
  assert_equal aaron.login, session.login
42
41
  assert_equal "aaronrocks", session.send(:protected_password)
43
- assert !controller.http_auth_requested?
42
+ refute controller.http_auth_requested?
44
43
  end
45
44
  unset_session
46
45
  UserSession.request_http_basic_auth = true
47
- UserSession.http_basic_auth_realm = 'PersistTestRealm'
46
+ UserSession.http_basic_auth_realm = "PersistTestRealm"
48
47
  http_basic_auth_for(aaron) do
49
48
  assert session = UserSession.find
50
49
  assert_equal aaron, session.record
51
50
  assert_equal aaron.login, session.login
52
51
  assert_equal "aaronrocks", session.send(:protected_password)
53
- assert_equal 'PersistTestRealm', controller.realm
52
+ assert_equal "PersistTestRealm", controller.realm
54
53
  assert controller.http_auth_requested?
55
54
  end
56
55
  end
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  class IdTest < ActiveSupport::TestCase
@@ -7,11 +7,11 @@ module SessionTest
7
7
  session.credentials = [:my_id]
8
8
  assert_equal :my_id, session.id
9
9
  end
10
-
10
+
11
11
  def test_id
12
12
  session = UserSession.new
13
13
  session.id = :my_id
14
14
  assert_equal :my_id, session.id
15
15
  end
16
16
  end
17
- end
17
+ end
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  module KlassTest
@@ -37,4 +37,4 @@ module SessionTest
37
37
  end
38
38
  end
39
39
  end
40
- end
40
+ end
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  module MagicColumnsTest
@@ -15,7 +15,7 @@ module SessionTest
15
15
  class InstanceMethodsTest < ActiveSupport::TestCase
16
16
  def test_after_persisting_set_last_request_at
17
17
  ben = users(:ben)
18
- assert !UserSession.create(ben).new_session?
18
+ refute UserSession.create(ben).new_session?
19
19
 
20
20
  set_cookie_for(ben)
21
21
  old_last_request_at = ben.last_request_at
@@ -27,7 +27,8 @@ module SessionTest
27
27
  def test_valid_increase_failed_login_count
28
28
  ben = users(:ben)
29
29
  old_failed_login_count = ben.failed_login_count
30
- assert UserSession.create(:login => ben.login, :password => "wrong").new_session?
30
+ session = UserSession.create(login: ben.login, password: "wrong")
31
+ assert session.new_session?
31
32
  ben.reload
32
33
  assert_equal old_failed_login_count + 1, ben.failed_login_count
33
34
  end
@@ -36,25 +37,22 @@ module SessionTest
36
37
  aaron = users(:aaron)
37
38
 
38
39
  # increase failed login count
39
- assert UserSession.create(:login => aaron.login, :password => "wrong").new_session?
40
+ session = UserSession.create(login: aaron.login, password: "wrong")
41
+ assert session.new_session?
40
42
  aaron.reload
43
+ assert_equal 0, aaron.login_count
44
+ assert_nil aaron.current_login_at
45
+ assert_nil aaron.current_login_ip
41
46
 
42
- # grab old values
43
- old_login_count = aaron.login_count
44
- old_failed_login_count = aaron.failed_login_count
45
- old_last_login_at = aaron.last_login_at
46
- old_current_login_at = aaron.current_login_at
47
- old_last_login_ip = aaron.last_login_ip
48
- old_current_login_ip = aaron.current_login_ip
49
-
50
- assert UserSession.create(:login => aaron.login, :password => "aaronrocks").valid?
47
+ session = UserSession.create(login: aaron.login, password: "aaronrocks")
48
+ assert session.valid?
51
49
 
52
50
  aaron.reload
53
- assert_equal old_login_count + 1, aaron.login_count
51
+ assert_equal 1, aaron.login_count
54
52
  assert_equal 0, aaron.failed_login_count
55
- assert_equal old_current_login_at, aaron.last_login_at
56
- assert aaron.current_login_at != old_current_login_at
57
- assert_equal old_current_login_ip, aaron.last_login_ip
53
+ assert_nil aaron.last_login_at
54
+ assert_not_nil aaron.current_login_at
55
+ assert_nil aaron.last_login_ip
58
56
  assert_equal "1.1.1.1", aaron.current_login_ip
59
57
  end
60
58
  end
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  module SessionTest
@@ -6,55 +6,53 @@ module SessionTest
6
6
  def test_disable_magic_states_config
7
7
  UserSession.disable_magic_states = true
8
8
  assert_equal true, UserSession.disable_magic_states
9
-
9
+
10
10
  UserSession.disable_magic_states false
11
11
  assert_equal false, UserSession.disable_magic_states
12
12
  end
13
13
  end
14
-
14
+
15
15
  class InstanceMethodsTest < ActiveSupport::TestCase
16
16
  def test_disabling_magic_states
17
17
  UserSession.disable_magic_states = true
18
-
19
18
  ben = users(:ben)
20
19
  ben.update_attribute(:active, false)
21
- assert UserSession.create(ben)
22
-
20
+ refute UserSession.create(ben).new_session?
23
21
  UserSession.disable_magic_states = false
24
22
  end
25
-
23
+
26
24
  def test_validate_validate_magic_states_active
27
25
  session = UserSession.new
28
26
  ben = users(:ben)
29
27
  session.unauthorized_record = ben
30
28
  assert session.valid?
31
-
29
+
32
30
  ben.update_attribute(:active, false)
33
- assert !session.valid?
34
- assert session.errors[:base].size > 0
31
+ refute session.valid?
32
+ refute session.errors[:base].empty?
35
33
  end
36
-
34
+
37
35
  def test_validate_validate_magic_states_approved
38
36
  session = UserSession.new
39
37
  ben = users(:ben)
40
38
  session.unauthorized_record = ben
41
39
  assert session.valid?
42
-
40
+
43
41
  ben.update_attribute(:approved, false)
44
- assert !session.valid?
45
- assert session.errors[:base].size > 0
42
+ refute session.valid?
43
+ refute session.errors[:base].empty?
46
44
  end
47
-
45
+
48
46
  def test_validate_validate_magic_states_confirmed
49
47
  session = UserSession.new
50
48
  ben = users(:ben)
51
49
  session.unauthorized_record = ben
52
50
  assert session.valid?
53
-
51
+
54
52
  ben.update_attribute(:confirmed, false)
55
- assert !session.valid?
56
- assert session.errors[:base].size > 0
53
+ refute session.valid?
54
+ refute session.errors[:base].empty?
57
55
  end
58
56
  end
59
57
  end
60
- end
58
+ end
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  module ParamsTest
@@ -6,43 +6,49 @@ module SessionTest
6
6
  def test_params_key
7
7
  UserSession.params_key = "my_params_key"
8
8
  assert_equal "my_params_key", UserSession.params_key
9
-
9
+
10
10
  UserSession.params_key "user_credentials"
11
11
  assert_equal "user_credentials", UserSession.params_key
12
12
  end
13
-
13
+
14
14
  def test_single_access_allowed_request_types
15
15
  UserSession.single_access_allowed_request_types = ["my request type"]
16
16
  assert_equal ["my request type"], UserSession.single_access_allowed_request_types
17
-
18
- UserSession.single_access_allowed_request_types ["application/rss+xml", "application/atom+xml"]
19
- assert_equal ["application/rss+xml", "application/atom+xml"], UserSession.single_access_allowed_request_types
17
+ UserSession.single_access_allowed_request_types(
18
+ ["application/rss+xml", "application/atom+xml"]
19
+ )
20
+ assert_equal(
21
+ ["application/rss+xml", "application/atom+xml"],
22
+ UserSession.single_access_allowed_request_types
23
+ )
20
24
  end
21
25
  end
22
-
26
+
23
27
  class InstanceMethodsTest < ActiveSupport::TestCase
24
28
  def test_persist_persist_by_params
25
29
  ben = users(:ben)
26
30
  session = UserSession.new
27
-
28
- assert !session.persisting?
31
+
32
+ refute session.persisting?
29
33
  set_params_for(ben)
30
-
31
- assert !session.persisting?
32
- assert !session.unauthorized_record
33
- assert !session.record
34
+
35
+ refute session.persisting?
36
+ refute session.unauthorized_record
37
+ refute session.record
34
38
  assert_nil controller.session["user_credentials"]
35
-
39
+
36
40
  set_request_content_type("text/plain")
37
- assert !session.persisting?
38
- assert !session.unauthorized_record
41
+ refute session.persisting?
42
+ refute session.unauthorized_record
39
43
  assert_nil controller.session["user_credentials"]
40
-
44
+
41
45
  set_request_content_type("application/atom+xml")
42
46
  assert session.persisting?
43
47
  assert_equal ben, session.record
44
- assert_nil controller.session["user_credentials"] # should not persist since this is single access
45
-
48
+
49
+ # should not persist since this is single access
50
+ assert_nil controller.session["user_credentials"]
51
+
46
52
  set_request_content_type("application/rss+xml")
47
53
  assert session.persisting?
48
54
  assert_equal ben, session.unauthorized_record
@@ -50,4 +56,4 @@ module SessionTest
50
56
  end
51
57
  end
52
58
  end
53
- end
59
+ end
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  module PasswordTest
@@ -21,26 +21,25 @@ module SessionTest
21
21
 
22
22
  def test_generalize_credentials_error_mesages_set_to_false
23
23
  UserSession.generalize_credentials_error_messages false
24
- assert !UserSession.generalize_credentials_error_messages
25
- session = UserSession.create(:login => users(:ben).login, :password => "invalud-password")
24
+ refute UserSession.generalize_credentials_error_messages
25
+ session = UserSession.create(login: users(:ben).login, password: "invalud-password")
26
26
  assert_equal ["Password is not valid"], session.errors.full_messages
27
27
  end
28
28
 
29
29
  def test_generalize_credentials_error_messages_set_to_true
30
30
  UserSession.generalize_credentials_error_messages true
31
31
  assert UserSession.generalize_credentials_error_messages
32
- session = UserSession.create(:login => users(:ben).login, :password => "invalud-password")
32
+ session = UserSession.create(login: users(:ben).login, password: "invalud-password")
33
33
  assert_equal ["Login/Password combination is not valid"], session.errors.full_messages
34
34
  end
35
35
 
36
36
  def test_generalize_credentials_error_messages_set_to_string
37
- UserSession.generalize_credentials_error_messages= "Custom Error Message"
37
+ UserSession.generalize_credentials_error_messages = "Custom Error Message"
38
38
  assert UserSession.generalize_credentials_error_messages
39
- session = UserSession.create(:login => users(:ben).login, :password => "invalud-password")
39
+ session = UserSession.create(login: users(:ben).login, password: "invalud-password")
40
40
  assert_equal ["Custom Error Message"], session.errors.full_messages
41
41
  end
42
42
 
43
-
44
43
  def test_login_field
45
44
  UserSession.configured_password_methods = false
46
45
  UserSession.login_field = :saweet
@@ -80,23 +79,23 @@ module SessionTest
80
79
 
81
80
  def test_credentials
82
81
  session = UserSession.new
83
- session.credentials = {:login => "login", :password => "pass"}
82
+ session.credentials = { login: "login", password: "pass" }
84
83
  assert_equal "login", session.login
85
84
  assert_nil session.password
86
85
  assert_equal "pass", session.send(:protected_password)
87
- assert_equal({:password => "<protected>", :login => "login"}, session.credentials)
86
+ assert_equal({ password: "<protected>", login: "login" }, session.credentials)
88
87
  end
89
88
 
90
89
  def test_credentials_are_params_safe
91
90
  session = UserSession.new
92
- assert_nothing_raised { session.credentials = {:hacker_method => "error!"} }
91
+ assert_nothing_raised { session.credentials = { hacker_method: "error!" } }
93
92
  end
94
93
 
95
94
  def test_save_with_credentials
96
95
  aaron = users(:aaron)
97
- session = UserSession.new(:login => aaron.login, :password => "aaronrocks")
96
+ session = UserSession.new(login: aaron.login, password: "aaronrocks")
98
97
  assert session.save
99
- assert !session.new_session?
98
+ refute session.new_session?
100
99
  assert_equal 1, session.record.login_count
101
100
  assert Time.now >= session.record.current_login_at
102
101
  assert_equal "1.1.1.1", session.record.current_login_ip
@@ -1,15 +1,15 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  class PerishabilityTest < ActiveSupport::TestCase
5
5
  def test_after_save
6
6
  ben = users(:ben)
7
7
  old_perishable_token = ben.perishable_token
8
- session = UserSession.create(ben)
8
+ UserSession.create(ben)
9
9
  assert_not_equal old_perishable_token, ben.perishable_token
10
-
10
+
11
11
  drew = employees(:drew)
12
- assert UserSession.create(drew)
12
+ refute UserSession.create(drew).new_session?
13
13
  end
14
14
  end
15
- end
15
+ end
@@ -1,10 +1,11 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  class PersistenceTest < ActiveSupport::TestCase
5
5
  def test_find
6
6
  aaron = users(:aaron)
7
- assert !UserSession.find
7
+ refute UserSession.find
8
+ UserSession.allow_http_basic_auth = true
8
9
  http_basic_auth_for(aaron) { assert UserSession.find }
9
10
  set_cookie_for(aaron)
10
11
  assert UserSession.find
@@ -22,7 +23,7 @@ module SessionTest
22
23
  aaron = users(:aaron)
23
24
  session = UserSession.new(aaron)
24
25
  session.remember_me = true
25
- assert !UserSession.remember_me
26
+ refute UserSession.remember_me
26
27
  assert session.save
27
28
  assert session.remember_me?
28
29
  session = UserSession.find(aaron)
@@ -1,4 +1,4 @@
1
- require 'test_helper'
1
+ require "test_helper"
2
2
 
3
3
  module SessionTest
4
4
  class ScopesTest < ActiveSupport::TestCase
@@ -6,7 +6,7 @@ module SessionTest
6
6
  assert_nil Authlogic::Session::Base.scope
7
7
 
8
8
  thread1 = Thread.new do
9
- scope = {:id => :scope1}
9
+ scope = { id: :scope1 }
10
10
  Authlogic::Session::Base.send(:scope=, scope)
11
11
  assert_equal scope, Authlogic::Session::Base.scope
12
12
  end
@@ -15,7 +15,7 @@ module SessionTest
15
15
  assert_nil Authlogic::Session::Base.scope
16
16
 
17
17
  thread2 = Thread.new do
18
- scope = {:id => :scope2}
18
+ scope = { id: :scope2 }
19
19
  Authlogic::Session::Base.send(:scope=, scope)
20
20
  assert_equal scope, Authlogic::Session::Base.scope
21
21
  end
@@ -27,17 +27,23 @@ module SessionTest
27
27
  def test_with_scope_method
28
28
  assert_raise(ArgumentError) { UserSession.with_scope }
29
29
 
30
- UserSession.with_scope(:find_options => {:conditions => "awesome = 1"}, :id => "some_id") do
31
- assert_equal({:find_options => {:conditions => "awesome = 1"}, :id => "some_id"}, UserSession.scope)
30
+ UserSession.with_scope(find_options: { conditions: "awesome = 1" }, id: "some_id") do
31
+ assert_equal(
32
+ { find_options: { conditions: "awesome = 1" }, id: "some_id" },
33
+ UserSession.scope
34
+ )
32
35
  end
33
36
 
34
37
  assert_nil UserSession.scope
35
38
  end
36
39
 
37
40
  def test_initialize
38
- UserSession.with_scope(:find_options => {:conditions => "awesome = 1"}, :id => "some_id") do
41
+ UserSession.with_scope(find_options: { conditions: "awesome = 1" }, id: "some_id") do
39
42
  session = UserSession.new
40
- assert_equal({:find_options => {:conditions => "awesome = 1"}, :id => "some_id"}, session.scope)
43
+ assert_equal(
44
+ { find_options: { conditions: "awesome = 1" }, id: "some_id" },
45
+ session.scope
46
+ )
41
47
  session.id = :another_id
42
48
  assert_equal "another_id_some_id_test", session.send(:build_key, "test")
43
49
  end
@@ -51,10 +57,10 @@ module SessionTest
51
57
  session = UserSession.new
52
58
  assert_equal zack, session.send(:search_for_record, "find_by_login", zack.login)
53
59
 
54
- session.scope = {:find_options => {:conditions => ["company_id = ?", binary_logic.id]}}
60
+ session.scope = { find_options: { conditions: ["company_id = ?", binary_logic.id] } }
55
61
  assert_nil session.send(:search_for_record, "find_by_login", zack.login)
56
62
 
57
63
  assert_equal ben, session.send(:search_for_record, "find_by_login", ben.login)
58
64
  end
59
65
  end
60
- end
66
+ end