authlogic 3.5.0 → 3.6.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (58) hide show
  1. checksums.yaml +4 -4
  2. data/.github/ISSUE_TEMPLATE.md +13 -0
  3. data/.rubocop_todo.yml +1 -37
  4. data/.travis.yml +11 -6
  5. data/CHANGELOG.md +19 -0
  6. data/CONTRIBUTING.md +13 -2
  7. data/README.md +2 -3
  8. data/authlogic.gemspec +5 -5
  9. data/lib/authlogic/acts_as_authentic/base.rb +4 -2
  10. data/lib/authlogic/acts_as_authentic/email.rb +8 -3
  11. data/lib/authlogic/acts_as_authentic/logged_in_status.rb +21 -3
  12. data/lib/authlogic/acts_as_authentic/login.rb +44 -25
  13. data/lib/authlogic/acts_as_authentic/password.rb +28 -12
  14. data/lib/authlogic/acts_as_authentic/perishable_token.rb +21 -12
  15. data/lib/authlogic/acts_as_authentic/restful_authentication.rb +16 -9
  16. data/lib/authlogic/acts_as_authentic/session_maintenance.rb +5 -3
  17. data/lib/authlogic/authenticates_many/association.rb +7 -4
  18. data/lib/authlogic/controller_adapters/rack_adapter.rb +6 -2
  19. data/lib/authlogic/controller_adapters/rails_adapter.rb +11 -8
  20. data/lib/authlogic/crypto_providers/bcrypt.rb +4 -1
  21. data/lib/authlogic/crypto_providers/sha512.rb +15 -10
  22. data/lib/authlogic/session/activation.rb +19 -10
  23. data/lib/authlogic/session/cookies.rb +3 -1
  24. data/lib/authlogic/session/id.rb +13 -7
  25. data/lib/authlogic/session/magic_columns.rb +19 -10
  26. data/lib/authlogic/session/magic_states.rb +7 -1
  27. data/lib/authlogic/session/password.rb +48 -34
  28. data/lib/authlogic/session/perishable_token.rb +7 -3
  29. data/lib/authlogic/session/validation.rb +13 -11
  30. data/lib/authlogic/test_case.rb +52 -32
  31. data/test/acts_as_authentic_test/email_test.rb +33 -29
  32. data/test/acts_as_authentic_test/logged_in_status_test.rb +2 -2
  33. data/test/acts_as_authentic_test/login_test.rb +50 -37
  34. data/test/acts_as_authentic_test/magic_columns_test.rb +8 -8
  35. data/test/acts_as_authentic_test/password_test.rb +14 -14
  36. data/test/acts_as_authentic_test/perishable_token_test.rb +5 -5
  37. data/test/acts_as_authentic_test/persistence_token_test.rb +4 -4
  38. data/test/acts_as_authentic_test/restful_authentication_test.rb +6 -6
  39. data/test/acts_as_authentic_test/session_maintenance_test.rb +15 -10
  40. data/test/acts_as_authentic_test/single_access_test.rb +6 -6
  41. data/test/authenticates_many_test.rb +1 -1
  42. data/test/gemfiles/Gemfile.rails-5.1.x +6 -0
  43. data/test/session_test/activation_test.rb +1 -1
  44. data/test/session_test/active_record_trickery_test.rb +3 -3
  45. data/test/session_test/brute_force_protection_test.rb +19 -14
  46. data/test/session_test/cookies_test.rb +21 -12
  47. data/test/session_test/existence_test.rb +15 -10
  48. data/test/session_test/http_auth_test.rb +2 -2
  49. data/test/session_test/magic_columns_test.rb +7 -4
  50. data/test/session_test/magic_states_test.rb +7 -9
  51. data/test/session_test/params_test.rb +6 -6
  52. data/test/session_test/password_test.rb +2 -2
  53. data/test/session_test/perishability_test.rb +1 -1
  54. data/test/session_test/persistence_test.rb +2 -2
  55. data/test/session_test/timeout_test.rb +7 -5
  56. data/test/session_test/validation_test.rb +1 -1
  57. data/test/test_helper.rb +10 -2
  58. metadata +10 -7
@@ -5,23 +5,23 @@ module ActsAsAuthenticTest
5
5
  def test_validates_numericality_of_login_count
6
6
  u = User.new
7
7
  u.login_count = -1
8
- assert !u.valid?
9
- assert u.errors[:login_count].size > 0
8
+ refute u.valid?
9
+ refute u.errors[:login_count].empty?
10
10
 
11
11
  u.login_count = 0
12
- assert !u.valid?
13
- assert u.errors[:login_count].size == 0
12
+ refute u.valid?
13
+ assert u.errors[:login_count].empty?
14
14
  end
15
15
 
16
16
  def test_validates_numericality_of_failed_login_count
17
17
  u = User.new
18
18
  u.failed_login_count = -1
19
- assert !u.valid?
20
- assert u.errors[:failed_login_count].size > 0
19
+ refute u.valid?
20
+ refute u.errors[:failed_login_count].empty?
21
21
 
22
22
  u.failed_login_count = 0
23
- assert !u.valid?
24
- assert u.errors[:failed_login_count].size == 0
23
+ refute u.valid?
24
+ assert u.errors[:failed_login_count].empty?
25
25
  end
26
26
  end
27
27
  end
@@ -28,7 +28,7 @@ module ActsAsAuthenticTest
28
28
  assert Employee.ignore_blank_passwords
29
29
 
30
30
  User.ignore_blank_passwords = false
31
- assert !User.ignore_blank_passwords
31
+ refute User.ignore_blank_passwords
32
32
  User.ignore_blank_passwords true
33
33
  assert User.ignore_blank_passwords
34
34
  end
@@ -36,7 +36,7 @@ module ActsAsAuthenticTest
36
36
  def test_check_passwords_against_database
37
37
  assert User.check_passwords_against_database
38
38
  User.check_passwords_against_database = false
39
- assert !User.check_passwords_against_database
39
+ refute User.check_passwords_against_database
40
40
  User.check_passwords_against_database true
41
41
  assert User.check_passwords_against_database
42
42
  end
@@ -46,7 +46,7 @@ module ActsAsAuthenticTest
46
46
  assert Employee.validate_password_field
47
47
 
48
48
  User.validate_password_field = false
49
- assert !User.validate_password_field
49
+ refute User.validate_password_field
50
50
  User.validate_password_field true
51
51
  assert User.validate_password_field
52
52
  end
@@ -109,7 +109,7 @@ module ActsAsAuthenticTest
109
109
  assert u.valid?
110
110
 
111
111
  u.password = u.password_confirmation = "abcdef"
112
- assert !u.valid?
112
+ refute u.valid?
113
113
 
114
114
  assert u.errors[:password].include?("is too short (minimum is 8 characters)")
115
115
  assert u.errors[:password_confirmation].include?("is too short (minimum is 8 characters)")
@@ -120,7 +120,7 @@ module ActsAsAuthenticTest
120
120
  assert u.valid?
121
121
 
122
122
  u.password_confirmation = "abcdefghij"
123
- assert !u.valid?
123
+ refute u.valid?
124
124
 
125
125
  if ActiveModel.respond_to?(:version) and ActiveModel.version.segments.first >= 4
126
126
  assert u.errors[:password_confirmation].include?("doesn't match Password")
@@ -134,19 +134,19 @@ module ActsAsAuthenticTest
134
134
 
135
135
  u.password = "testpass"
136
136
  u.password_confirmation = ""
137
- assert !u.valid?
138
- assert u.errors[:password_confirmation].size > 0
137
+ refute u.valid?
138
+ refute u.errors[:password_confirmation].empty?
139
139
 
140
140
  u.password_confirmation = "testpass"
141
- assert !u.valid?
142
- assert u.errors[:password_confirmation].size == 0
141
+ refute u.valid?
142
+ assert u.errors[:password_confirmation].empty?
143
143
 
144
144
  ben = users(:ben)
145
145
  assert ben.valid?
146
146
 
147
147
  ben.password = "newpasswd"
148
- assert !ben.valid?
149
- assert ben.errors[:password_confirmation].size > 0
148
+ refute ben.valid?
149
+ refute ben.errors[:password_confirmation].empty?
150
150
 
151
151
  ben.password_confirmation = "newpasswd"
152
152
  assert ben.valid?
@@ -180,21 +180,21 @@ module ActsAsAuthenticTest
180
180
  def test_checks_password_against_database
181
181
  ben = users(:aaron)
182
182
  ben.password = "new pass"
183
- assert !ben.valid_password?("new pass")
183
+ refute ben.valid_password?("new pass")
184
184
  assert ben.valid_password?("aaronrocks")
185
185
  end
186
186
 
187
187
  def test_checks_password_against_database_and_always_fails_on_new_records
188
188
  user = User.new
189
189
  user.password = "new pass"
190
- assert !user.valid_password?("new pass")
190
+ refute user.valid_password?("new pass")
191
191
  end
192
192
 
193
193
  def test_checks_password_against_object
194
194
  ben = users(:ben)
195
195
  ben.password = "new pass"
196
196
  assert ben.valid_password?("new pass", false)
197
- assert !ben.valid_password?("benrocks", false)
197
+ refute ben.valid_password?("benrocks", false)
198
198
  end
199
199
 
200
200
  def test_reset_password
@@ -13,20 +13,20 @@ module ActsAsAuthenticTest
13
13
  end
14
14
 
15
15
  def test_disable_perishable_token_maintenance_config
16
- assert !User.disable_perishable_token_maintenance
17
- assert !Employee.disable_perishable_token_maintenance
16
+ refute User.disable_perishable_token_maintenance
17
+ refute Employee.disable_perishable_token_maintenance
18
18
 
19
19
  User.disable_perishable_token_maintenance = true
20
20
  assert User.disable_perishable_token_maintenance
21
21
  User.disable_perishable_token_maintenance false
22
- assert !User.disable_perishable_token_maintenance
22
+ refute User.disable_perishable_token_maintenance
23
23
  end
24
24
 
25
25
  def test_validates_uniqueness_of_perishable_token
26
26
  u = User.new
27
27
  u.perishable_token = users(:ben).perishable_token
28
- assert !u.valid?
29
- assert u.errors[:perishable_token].size > 0
28
+ refute u.valid?
29
+ refute u.errors[:perishable_token].empty?
30
30
  end
31
31
 
32
32
  def test_before_save_reset_perishable_token
@@ -24,7 +24,7 @@ module ActsAsAuthenticTest
24
24
 
25
25
  def test_before_validate_reset_persistence_token
26
26
  u = User.new
27
- assert !u.valid?
27
+ refute u.valid?
28
28
  assert_not_nil u.persistence_token
29
29
  end
30
30
 
@@ -34,8 +34,8 @@ module ActsAsAuthenticTest
34
34
  assert UserSession.find
35
35
  assert UserSession.find(:ziggity_zack)
36
36
  User.forget_all
37
- assert !UserSession.find
38
- assert !UserSession.find(:ziggity_zack)
37
+ refute UserSession.find
38
+ refute UserSession.find(:ziggity_zack)
39
39
  end
40
40
 
41
41
  def test_forget
@@ -49,7 +49,7 @@ module ActsAsAuthenticTest
49
49
 
50
50
  ben.forget!
51
51
 
52
- assert !UserSession.find
52
+ refute UserSession.find
53
53
  assert UserSession.find(:ziggity_zack)
54
54
  end
55
55
  end
@@ -3,8 +3,8 @@ require 'test_helper'
3
3
  module ActsAsAuthenticTest
4
4
  class RestfulAuthenticationTest < ActiveSupport::TestCase
5
5
  def test_act_like_restful_authentication_config
6
- assert !User.act_like_restful_authentication
7
- assert !Employee.act_like_restful_authentication
6
+ refute User.act_like_restful_authentication
7
+ refute Employee.act_like_restful_authentication
8
8
 
9
9
  User.act_like_restful_authentication = true
10
10
  assert User.act_like_restful_authentication
@@ -14,15 +14,15 @@ module ActsAsAuthenticTest
14
14
  assert_equal 1, Authlogic::CryptoProviders::Sha1.stretches
15
15
 
16
16
  User.act_like_restful_authentication false
17
- assert !User.act_like_restful_authentication
17
+ refute User.act_like_restful_authentication
18
18
 
19
19
  User.crypto_provider = Authlogic::CryptoProviders::Sha512
20
20
  User.transition_from_crypto_providers = []
21
21
  end
22
22
 
23
23
  def test_transition_from_restful_authentication_config
24
- assert !User.transition_from_restful_authentication
25
- assert !Employee.transition_from_restful_authentication
24
+ refute User.transition_from_restful_authentication
25
+ refute Employee.transition_from_restful_authentication
26
26
 
27
27
  User.transition_from_restful_authentication = true
28
28
  assert User.transition_from_restful_authentication
@@ -31,7 +31,7 @@ module ActsAsAuthenticTest
31
31
  assert_equal 1, Authlogic::CryptoProviders::Sha1.stretches
32
32
 
33
33
  User.transition_from_restful_authentication false
34
- assert !User.transition_from_restful_authentication
34
+ refute User.transition_from_restful_authentication
35
35
  end
36
36
  end
37
37
  end
@@ -5,20 +5,19 @@ module ActsAsAuthenticTest
5
5
  def test_maintain_sessions_config
6
6
  assert User.maintain_sessions
7
7
  User.maintain_sessions = false
8
- assert !User.maintain_sessions
8
+ refute User.maintain_sessions
9
9
  User.maintain_sessions true
10
10
  assert User.maintain_sessions
11
11
  end
12
12
 
13
13
  def test_login_after_create
14
- assert(
15
- User.create(
16
- :login => "awesome",
17
- :password => "saweeeet",
18
- :password_confirmation => "saweeeet",
19
- :email => "awesome@awesome.com"
20
- )
14
+ user = User.create(
15
+ :login => "awesome",
16
+ :password => "saweeeet",
17
+ :password_confirmation => "saweeeet",
18
+ :email => "awesome@awesome.com"
21
19
  )
20
+ assert user.persisted?
22
21
  assert UserSession.find
23
22
  end
24
23
 
@@ -60,7 +59,13 @@ module ActsAsAuthenticTest
60
59
  UserSession.create(ben)
61
60
  old_session_key = controller.session["user_credentials"]
62
61
  old_cookie_key = controller.cookies["user_credentials"]
63
- assert User.create(:login => "awesome", :password => "saweet", :password_confirmation => "saweet", :email => "awesome@saweet.com")
62
+ user = User.create(
63
+ :login => "awesome",
64
+ :password => "saweet", # Password is too short, user invalid
65
+ :password_confirmation => "saweet",
66
+ :email => "awesome@saweet.com"
67
+ )
68
+ refute user.persisted?
64
69
  assert_equal controller.session["user_credentials"], old_session_key
65
70
  assert_equal controller.cookies["user_credentials"], old_cookie_key
66
71
  end
@@ -80,7 +85,7 @@ module ActsAsAuthenticTest
80
85
 
81
86
  def test_resetting_password_when_logged_out
82
87
  ben = users(:ben)
83
- assert !UserSession.find
88
+ refute UserSession.find
84
89
  ben.password = "newpasswd"
85
90
  ben.password_confirmation = "newpasswd"
86
91
  assert ben.save
@@ -3,25 +3,25 @@ require 'test_helper'
3
3
  module ActsAsAuthenticTest
4
4
  class SingleAccessTest < ActiveSupport::TestCase
5
5
  def test_change_single_access_token_with_password_config
6
- assert !User.change_single_access_token_with_password
7
- assert !Employee.change_single_access_token_with_password
6
+ refute User.change_single_access_token_with_password
7
+ refute Employee.change_single_access_token_with_password
8
8
 
9
9
  User.change_single_access_token_with_password = true
10
10
  assert User.change_single_access_token_with_password
11
11
  User.change_single_access_token_with_password false
12
- assert !User.change_single_access_token_with_password
12
+ refute User.change_single_access_token_with_password
13
13
  end
14
14
 
15
15
  def test_validates_uniqueness_of_single_access_token
16
16
  u = User.new
17
17
  u.single_access_token = users(:ben).single_access_token
18
- assert !u.valid?
19
- assert u.errors[:single_access_token].size > 0
18
+ refute u.valid?
19
+ refute u.errors[:single_access_token].empty?
20
20
  end
21
21
 
22
22
  def test_before_validation_reset_single_access_token
23
23
  u = User.new
24
- assert !u.valid?
24
+ refute u.valid?
25
25
  assert_not_nil u.single_access_token
26
26
  end
27
27
 
@@ -7,7 +7,7 @@ class AuthenticatesManyTest < ActiveSupport::TestCase
7
7
  binary_logic = companies(:binary_logic)
8
8
  set_session_for(zack)
9
9
 
10
- assert !binary_logic.user_sessions.find
10
+ refute binary_logic.user_sessions.find
11
11
 
12
12
  set_session_for(ben)
13
13
 
@@ -0,0 +1,6 @@
1
+ source "https://rubygems.org"
2
+ gemspec :path => "./../.."
3
+
4
+ gem "activerecord", "~> 5.1.0"
5
+ gem "activesupport", "~> 5.1.0"
6
+ gem 'sqlite3', :platforms => :ruby
@@ -6,7 +6,7 @@ module SessionTest
6
6
  def test_activated
7
7
  assert UserSession.activated?
8
8
  Authlogic::Session::Base.controller = nil
9
- assert !UserSession.activated?
9
+ refute UserSession.activated?
10
10
  end
11
11
 
12
12
  def test_controller
@@ -49,18 +49,18 @@ module SessionTest
49
49
 
50
50
  def test_persisted
51
51
  session = UserSession.new(users(:ben))
52
- assert !session.persisted?
52
+ refute session.persisted?
53
53
 
54
54
  session.save
55
55
  assert session.persisted?
56
56
 
57
57
  session.destroy
58
- assert !session.persisted?
58
+ refute session.persisted?
59
59
  end
60
60
 
61
61
  def test_destroyed?
62
62
  session = UserSession.create(users(:ben))
63
- assert !session.destroyed?
63
+ refute session.destroyed?
64
64
 
65
65
  session.destroy
66
66
  assert session.destroyed?
@@ -25,19 +25,20 @@ module SessionTest
25
25
  ben = users(:ben)
26
26
  ben.failed_login_count = UserSession.consecutive_failed_logins_limit - 1
27
27
  assert ben.save
28
- assert UserSession.create(:login => ben.login, :password => "benrocks")
28
+ session = UserSession.create(:login => ben.login, :password => "benrocks")
29
+ refute session.new_session?
29
30
  end
30
31
 
31
32
  def test_exceeded_limit
32
33
  ben = users(:ben)
33
34
  ben.failed_login_count = UserSession.consecutive_failed_logins_limit
34
35
  assert ben.save
35
- assert UserSession.create(:login => ben.login, :password => "benrocks").new_session?
36
+ session = UserSession.create(:login => ben.login, :password => "benrocks")
37
+ assert session.new_session?
36
38
  assert UserSession.create(ben).new_session?
37
-
38
39
  ben.reload
39
40
  ben.updated_at = (UserSession.failed_login_ban_for + 2.hours.to_i).seconds.ago
40
- assert !UserSession.create(ben).new_session?
41
+ refute UserSession.create(ben).new_session?
41
42
  end
42
43
 
43
44
  def test_exceeding_failed_logins_limit
@@ -46,14 +47,14 @@ module SessionTest
46
47
 
47
48
  2.times do |i|
48
49
  session = UserSession.new(:login => ben.login, :password => "badpassword1")
49
- assert !session.save
50
- assert session.errors[:password].size > 0
50
+ refute session.save
51
+ refute session.errors[:password].empty?
51
52
  assert_equal i + 1, ben.reload.failed_login_count
52
53
  end
53
54
 
54
55
  session = UserSession.new(:login => ben.login, :password => "badpassword2")
55
- assert !session.save
56
- assert session.errors[:password].size == 0
56
+ refute session.save
57
+ assert session.errors[:password].empty?
57
58
  assert_equal 3, ben.reload.failed_login_count
58
59
 
59
60
  UserSession.consecutive_failed_logins_limit = 50
@@ -66,12 +67,14 @@ module SessionTest
66
67
 
67
68
  2.times do |i|
68
69
  session = UserSession.new(:login => ben.login, :password => "badpassword1")
69
- assert !session.save
70
+ refute session.save
70
71
  assert session.invalid_password?
71
72
  assert_equal i + 1, ben.reload.failed_login_count
72
73
  end
73
74
 
74
- ActiveRecord::Base.connection.execute("update users set updated_at = '#{1.day.ago.to_s(:db)}' where login = '#{ben.login}'")
75
+ ActiveRecord::Base.connection.execute(
76
+ "update users set updated_at = '#{1.day.ago.to_s(:db)}' where login = '#{ben.login}'"
77
+ )
75
78
  session = UserSession.new(:login => ben.login, :password => "benrocks")
76
79
  assert session.save
77
80
  assert_equal 0, ben.reload.failed_login_count
@@ -86,14 +89,16 @@ module SessionTest
86
89
 
87
90
  2.times do |i|
88
91
  session = UserSession.new(:login => ben.login, :password => "badpassword1")
89
- assert !session.save
90
- assert session.errors[:password].size > 0
92
+ refute session.save
93
+ refute session.errors[:password].empty?
91
94
  assert_equal i + 1, ben.reload.failed_login_count
92
95
  end
93
96
 
94
- ActiveRecord::Base.connection.execute("update users set updated_at = '#{1.day.ago.to_s(:db)}' where login = '#{ben.login}'")
97
+ ActiveRecord::Base.connection.execute(
98
+ "update users set updated_at = '#{1.day.ago.to_s(:db)}' where login = '#{ben.login}'"
99
+ )
95
100
  session = UserSession.new(:login => ben.login, :password => "badpassword1")
96
- assert !session.save
101
+ refute session.save
97
102
  assert_equal 1, ben.reload.failed_login_count
98
103
 
99
104
  UserSession.consecutive_failed_logins_limit = 50
@@ -89,11 +89,11 @@ module SessionTest
89
89
  def test_remember_me
90
90
  session = UserSession.new
91
91
  assert_equal false, session.remember_me
92
- assert !session.remember_me?
92
+ refute session.remember_me?
93
93
 
94
94
  session.remember_me = false
95
95
  assert_equal false, session.remember_me
96
- assert !session.remember_me?
96
+ refute session.remember_me?
97
97
 
98
98
  session.remember_me = true
99
99
  assert_equal true, session.remember_me
@@ -101,7 +101,7 @@ module SessionTest
101
101
 
102
102
  session.remember_me = nil
103
103
  assert_nil session.remember_me
104
- assert !session.remember_me?
104
+ refute session.remember_me?
105
105
 
106
106
  session.remember_me = "1"
107
107
  assert_equal "1", session.remember_me
@@ -122,7 +122,7 @@ module SessionTest
122
122
 
123
123
  def test_persist_persist_by_cookie
124
124
  ben = users(:ben)
125
- assert !UserSession.find
125
+ refute UserSession.find
126
126
  set_cookie_for(ben)
127
127
  assert session = UserSession.find
128
128
  assert_equal ben, session.record
@@ -131,9 +131,9 @@ module SessionTest
131
131
  def test_persist_persist_by_cookie_with_blank_persistence_token
132
132
  ben = users(:ben)
133
133
  ben.update_column(:persistence_token, "")
134
- assert !UserSession.find
134
+ refute UserSession.find
135
135
  set_cookie_for(ben)
136
- assert !UserSession.find
136
+ refute UserSession.find
137
137
  end
138
138
 
139
139
  def test_remember_me_expired
@@ -141,19 +141,22 @@ module SessionTest
141
141
  session = UserSession.new(ben)
142
142
  session.remember_me = true
143
143
  assert session.save
144
- assert !session.remember_me_expired?
144
+ refute session.remember_me_expired?
145
145
 
146
146
  session = UserSession.new(ben)
147
147
  session.remember_me = false
148
148
  assert session.save
149
- assert !session.remember_me_expired?
149
+ refute session.remember_me_expired?
150
150
  end
151
151
 
152
152
  def test_after_save_save_cookie
153
153
  ben = users(:ben)
154
154
  session = UserSession.new(ben)
155
155
  assert session.save
156
- assert_equal "#{ben.persistence_token}::#{ben.id}", controller.cookies["user_credentials"]
156
+ assert_equal(
157
+ "#{ben.persistence_token}::#{ben.id}",
158
+ controller.cookies["user_credentials"]
159
+ )
157
160
  end
158
161
 
159
162
  def test_after_save_save_cookie_signed
@@ -166,7 +169,10 @@ module SessionTest
166
169
  session.sign_cookie = true
167
170
  assert session.save
168
171
  assert_equal payload, controller.cookies.signed["user_credentials"]
169
- assert_equal "#{payload}--#{Digest::SHA1.hexdigest payload}", controller.cookies.signed.parent_jar["user_credentials"]
172
+ assert_equal(
173
+ "#{payload}--#{Digest::SHA1.hexdigest payload}",
174
+ controller.cookies.signed.parent_jar["user_credentials"]
175
+ )
170
176
  end
171
177
 
172
178
  def test_after_save_save_cookie_with_remember_me
@@ -175,7 +181,10 @@ module SessionTest
175
181
  session = UserSession.new(ben)
176
182
  session.remember_me = true
177
183
  assert session.save
178
- assert_equal "#{ben.persistence_token}::#{ben.id}::#{session.remember_me_until.iso8601}", controller.cookies["user_credentials"]
184
+ assert_equal(
185
+ "#{ben.persistence_token}::#{ben.id}::#{session.remember_me_until.iso8601}",
186
+ controller.cookies["user_credentials"]
187
+ )
179
188
  end
180
189
  end
181
190
 
@@ -185,7 +194,7 @@ module SessionTest
185
194
  session = UserSession.find
186
195
  assert controller.cookies["user_credentials"]
187
196
  assert session.destroy
188
- assert !controller.cookies["user_credentials"]
197
+ refute controller.cookies["user_credentials"]
189
198
  end
190
199
  end
191
200
  end