authlogic 4.4.2 → 5.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (147) hide show
  1. checksums.yaml +5 -5
  2. data/lib/authlogic.rb +4 -28
  3. data/lib/authlogic/acts_as_authentic/base.rb +3 -18
  4. data/lib/authlogic/acts_as_authentic/email.rb +3 -170
  5. data/lib/authlogic/acts_as_authentic/logged_in_status.rb +3 -1
  6. data/lib/authlogic/acts_as_authentic/login.rb +7 -174
  7. data/lib/authlogic/acts_as_authentic/magic_columns.rb +7 -4
  8. data/lib/authlogic/acts_as_authentic/password.rb +54 -253
  9. data/lib/authlogic/acts_as_authentic/perishable_token.rb +8 -5
  10. data/lib/authlogic/acts_as_authentic/persistence_token.rb +10 -4
  11. data/lib/authlogic/acts_as_authentic/queries/case_sensitivity.rb +53 -0
  12. data/lib/authlogic/acts_as_authentic/queries/find_with_case.rb +36 -20
  13. data/lib/authlogic/acts_as_authentic/session_maintenance.rb +8 -6
  14. data/lib/authlogic/acts_as_authentic/single_access_token.rb +10 -8
  15. data/lib/authlogic/config.rb +9 -1
  16. data/lib/authlogic/controller_adapters/abstract_adapter.rb +7 -4
  17. data/lib/authlogic/controller_adapters/rack_adapter.rb +2 -0
  18. data/lib/authlogic/controller_adapters/rails_adapter.rb +19 -19
  19. data/lib/authlogic/controller_adapters/sinatra_adapter.rb +6 -0
  20. data/lib/authlogic/cookie_credentials.rb +63 -0
  21. data/lib/authlogic/crypto_providers.rb +5 -20
  22. data/lib/authlogic/crypto_providers/bcrypt.rb +3 -3
  23. data/lib/authlogic/crypto_providers/md5.rb +3 -6
  24. data/lib/authlogic/crypto_providers/scrypt.rb +2 -0
  25. data/lib/authlogic/crypto_providers/sha1.rb +4 -6
  26. data/lib/authlogic/crypto_providers/sha256.rb +2 -0
  27. data/lib/authlogic/crypto_providers/sha512.rb +6 -5
  28. data/lib/authlogic/i18n.rb +3 -1
  29. data/lib/authlogic/i18n/translator.rb +3 -0
  30. data/lib/authlogic/random.rb +2 -0
  31. data/lib/authlogic/session/base.rb +2087 -39
  32. data/lib/authlogic/session/magic_column/assigns_last_request_at.rb +46 -0
  33. data/lib/authlogic/test_case.rb +4 -0
  34. data/lib/authlogic/test_case/mock_controller.rb +2 -0
  35. data/lib/authlogic/test_case/mock_cookie_jar.rb +7 -0
  36. data/lib/authlogic/test_case/mock_logger.rb +2 -0
  37. data/lib/authlogic/test_case/mock_request.rb +2 -0
  38. data/lib/authlogic/test_case/rails_request_adapter.rb +2 -0
  39. data/lib/authlogic/version.rb +2 -1
  40. metadata +136 -182
  41. data/.github/ISSUE_TEMPLATE/bug_report.md +0 -28
  42. data/.github/ISSUE_TEMPLATE/feature_proposal.md +0 -32
  43. data/.github/triage.md +0 -86
  44. data/.gitignore +0 -15
  45. data/.rubocop.yml +0 -133
  46. data/.rubocop_todo.yml +0 -74
  47. data/.travis.yml +0 -24
  48. data/CHANGELOG.md +0 -326
  49. data/CONTRIBUTING.md +0 -91
  50. data/Gemfile +0 -6
  51. data/LICENSE +0 -20
  52. data/README.md +0 -439
  53. data/Rakefile +0 -21
  54. data/UPGRADING.md +0 -22
  55. data/authlogic.gemspec +0 -40
  56. data/doc/use_normal_rails_validation.md +0 -82
  57. data/gemfiles/Gemfile.rails-4.2.x +0 -6
  58. data/gemfiles/Gemfile.rails-5.1.x +0 -6
  59. data/gemfiles/Gemfile.rails-5.2.x +0 -6
  60. data/lib/authlogic/acts_as_authentic/restful_authentication.rb +0 -106
  61. data/lib/authlogic/acts_as_authentic/validations_scope.rb +0 -35
  62. data/lib/authlogic/authenticates_many/association.rb +0 -50
  63. data/lib/authlogic/authenticates_many/base.rb +0 -81
  64. data/lib/authlogic/crypto_providers/aes256.rb +0 -71
  65. data/lib/authlogic/crypto_providers/wordpress.rb +0 -72
  66. data/lib/authlogic/regex.rb +0 -79
  67. data/lib/authlogic/session/activation.rb +0 -73
  68. data/lib/authlogic/session/active_record_trickery.rb +0 -65
  69. data/lib/authlogic/session/brute_force_protection.rb +0 -127
  70. data/lib/authlogic/session/callbacks.rb +0 -153
  71. data/lib/authlogic/session/cookies.rb +0 -296
  72. data/lib/authlogic/session/existence.rb +0 -103
  73. data/lib/authlogic/session/foundation.rb +0 -105
  74. data/lib/authlogic/session/http_auth.rb +0 -107
  75. data/lib/authlogic/session/id.rb +0 -53
  76. data/lib/authlogic/session/klass.rb +0 -73
  77. data/lib/authlogic/session/magic_columns.rb +0 -119
  78. data/lib/authlogic/session/magic_states.rb +0 -82
  79. data/lib/authlogic/session/params.rb +0 -130
  80. data/lib/authlogic/session/password.rb +0 -318
  81. data/lib/authlogic/session/perishable_token.rb +0 -24
  82. data/lib/authlogic/session/persistence.rb +0 -77
  83. data/lib/authlogic/session/priority_record.rb +0 -38
  84. data/lib/authlogic/session/scopes.rb +0 -138
  85. data/lib/authlogic/session/session.rb +0 -77
  86. data/lib/authlogic/session/timeout.rb +0 -103
  87. data/lib/authlogic/session/unauthorized_record.rb +0 -56
  88. data/lib/authlogic/session/validation.rb +0 -93
  89. data/test/acts_as_authentic_test/base_test.rb +0 -27
  90. data/test/acts_as_authentic_test/email_test.rb +0 -241
  91. data/test/acts_as_authentic_test/logged_in_status_test.rb +0 -64
  92. data/test/acts_as_authentic_test/login_test.rb +0 -153
  93. data/test/acts_as_authentic_test/magic_columns_test.rb +0 -29
  94. data/test/acts_as_authentic_test/password_test.rb +0 -263
  95. data/test/acts_as_authentic_test/perishable_token_test.rb +0 -98
  96. data/test/acts_as_authentic_test/persistence_token_test.rb +0 -62
  97. data/test/acts_as_authentic_test/restful_authentication_test.rb +0 -48
  98. data/test/acts_as_authentic_test/session_maintenance_test.rb +0 -150
  99. data/test/acts_as_authentic_test/single_access_test.rb +0 -46
  100. data/test/adapter_test.rb +0 -23
  101. data/test/authenticates_many_test.rb +0 -33
  102. data/test/config_test.rb +0 -38
  103. data/test/crypto_provider_test/aes256_test.rb +0 -16
  104. data/test/crypto_provider_test/bcrypt_test.rb +0 -16
  105. data/test/crypto_provider_test/scrypt_test.rb +0 -16
  106. data/test/crypto_provider_test/sha1_test.rb +0 -25
  107. data/test/crypto_provider_test/sha256_test.rb +0 -16
  108. data/test/crypto_provider_test/sha512_test.rb +0 -16
  109. data/test/crypto_provider_test/wordpress_test.rb +0 -26
  110. data/test/fixtures/companies.yml +0 -5
  111. data/test/fixtures/employees.yml +0 -17
  112. data/test/fixtures/projects.yml +0 -3
  113. data/test/fixtures/users.yml +0 -41
  114. data/test/i18n/lol.yml +0 -4
  115. data/test/i18n_test.rb +0 -35
  116. data/test/libs/affiliate.rb +0 -9
  117. data/test/libs/company.rb +0 -8
  118. data/test/libs/employee.rb +0 -9
  119. data/test/libs/employee_session.rb +0 -4
  120. data/test/libs/ldaper.rb +0 -5
  121. data/test/libs/project.rb +0 -5
  122. data/test/libs/user.rb +0 -9
  123. data/test/libs/user_session.rb +0 -27
  124. data/test/random_test.rb +0 -15
  125. data/test/session_test/activation_test.rb +0 -45
  126. data/test/session_test/active_record_trickery_test.rb +0 -78
  127. data/test/session_test/brute_force_protection_test.rb +0 -110
  128. data/test/session_test/callbacks_test.rb +0 -42
  129. data/test/session_test/cookies_test.rb +0 -226
  130. data/test/session_test/credentials_test.rb +0 -0
  131. data/test/session_test/existence_test.rb +0 -88
  132. data/test/session_test/foundation_test.rb +0 -24
  133. data/test/session_test/http_auth_test.rb +0 -60
  134. data/test/session_test/id_test.rb +0 -19
  135. data/test/session_test/klass_test.rb +0 -42
  136. data/test/session_test/magic_columns_test.rb +0 -62
  137. data/test/session_test/magic_states_test.rb +0 -60
  138. data/test/session_test/params_test.rb +0 -61
  139. data/test/session_test/password_test.rb +0 -107
  140. data/test/session_test/perishability_test.rb +0 -17
  141. data/test/session_test/persistence_test.rb +0 -35
  142. data/test/session_test/scopes_test.rb +0 -68
  143. data/test/session_test/session_test.rb +0 -80
  144. data/test/session_test/timeout_test.rb +0 -84
  145. data/test/session_test/unauthorized_record_test.rb +0 -15
  146. data/test/session_test/validation_test.rb +0 -25
  147. data/test/test_helper.rb +0 -272
@@ -1,153 +0,0 @@
1
- # frozen_string_literal: true
2
-
3
- require "test_helper"
4
-
5
- module ActsAsAuthenticTest
6
- # Tests for configuration option: `validates_format_of_login_field_options`
7
- class ValidatesFormatOfLoginTest < ActiveSupport::TestCase
8
- def test_invalid_format
9
- [
10
- "fdsf@^&*",
11
- " space",
12
- ".dot",
13
- "-hyphen",
14
- "@atmark",
15
- "+plus"
16
- ].each do |login|
17
- u = User.new(login: login)
18
- refute u.valid?
19
- refute u.errors[:login].empty?
20
- end
21
- end
22
-
23
- def test_valid_format
24
- [
25
- "fdsfdsfdsfdsfs",
26
- "dakota.dux+1@gmail.com",
27
- "marks .-_@+",
28
- "_underscore"
29
- ].each do |login|
30
- u = User.new(login: login)
31
- refute u.valid?
32
- assert u.errors[:login].empty?
33
- end
34
- end
35
-
36
- def test_validates_format_of_login_field_options_config
37
- default = {
38
- with: /\A[a-zA-Z0-9_][a-zA-Z0-9\.+\-_@ ]+\z/,
39
- message: proc do
40
- I18n.t(
41
- "error_messages.login_invalid",
42
- default: "should use only letters, numbers, spaces, and .-_@+ please."
43
- )
44
- end
45
- }
46
- default_message = default.delete(:message).call
47
-
48
- options = User.validates_format_of_login_field_options
49
- message = options.delete(:message)
50
- assert message.is_a?(Proc)
51
- assert_equal default_message, message.call
52
- assert_equal default, options
53
-
54
- options = Employee.validates_format_of_login_field_options
55
- message = options.delete(:message)
56
- assert message.is_a?(Proc)
57
- assert_equal default_message, message.call
58
- assert_equal default, options
59
-
60
- User.validates_format_of_login_field_options = { yes: "no" }
61
- assert_equal({ yes: "no" }, User.validates_format_of_login_field_options)
62
- User.validates_format_of_login_field_options default
63
- assert_equal default, User.validates_format_of_login_field_options
64
- end
65
- end
66
-
67
- # Miscellaneous tests for configuration options related to the `login_field`.
68
- # Feel free to organize these into separate `TestCase`s as we have done above
69
- # with `ValidatesFormatOfLoginTest`.
70
- class MiscellaneousLoginTest < ActiveSupport::TestCase
71
- def test_login_field_config
72
- assert_equal :login, User.login_field
73
- assert_nil Employee.login_field
74
-
75
- User.login_field = :nope
76
- assert_equal :nope, User.login_field
77
- User.login_field :login
78
- assert_equal :login, User.login_field
79
- end
80
-
81
- def test_validate_login_field_config
82
- assert User.validate_login_field
83
- assert Employee.validate_login_field
84
-
85
- User.validate_login_field = false
86
- refute User.validate_login_field
87
- User.validate_login_field true
88
- assert User.validate_login_field
89
- end
90
-
91
- def test_validates_length_of_login_field_options_config
92
- assert_equal({ within: 3..100 }, User.validates_length_of_login_field_options)
93
- assert_equal({ within: 3..100 }, Employee.validates_length_of_login_field_options)
94
-
95
- User.validates_length_of_login_field_options = { yes: "no" }
96
- assert_equal({ yes: "no" }, User.validates_length_of_login_field_options)
97
- User.validates_length_of_login_field_options(within: 3..100)
98
- assert_equal({ within: 3..100 }, User.validates_length_of_login_field_options)
99
- end
100
-
101
- def test_validates_uniqueness_of_login_field_options_config
102
- default = {
103
- case_sensitive: false,
104
- scope: User.validations_scope,
105
- if: "#{User.login_field}_changed?".to_sym
106
- }
107
- assert_equal default, User.validates_uniqueness_of_login_field_options
108
-
109
- User.validates_uniqueness_of_login_field_options = { yes: "no" }
110
- assert_equal({ yes: "no" }, User.validates_uniqueness_of_login_field_options)
111
- User.validates_uniqueness_of_login_field_options default
112
- assert_equal default, User.validates_uniqueness_of_login_field_options
113
- end
114
-
115
- def test_validates_length_of_login_field
116
- u = User.new
117
- u.login = "a"
118
- refute u.valid?
119
- refute u.errors[:login].empty?
120
-
121
- u.login = "aaaaaaaaaa"
122
- refute u.valid?
123
- assert u.errors[:login].empty?
124
- end
125
-
126
- def test_validates_uniqueness_of_login_field
127
- u = User.new
128
- u.login = "bjohnson"
129
- refute u.valid?
130
- refute u.errors[:login].empty?
131
-
132
- u.login = "BJOHNSON"
133
- refute u.valid?
134
- refute u.errors[:login].empty?
135
-
136
- u.login = "fdsfdsf"
137
- refute u.valid?
138
- assert u.errors[:login].empty?
139
- end
140
-
141
- def test_find_by_smart_case_login_field
142
- ben = users(:ben)
143
- assert_equal ben, User.find_by_smart_case_login_field("bjohnson")
144
- assert_equal ben, User.find_by_smart_case_login_field("BJOHNSON")
145
- assert_equal ben, User.find_by_smart_case_login_field("Bjohnson")
146
-
147
- drew = employees(:drew)
148
- assert_equal drew, Employee.find_by_smart_case_login_field("dgainor@binarylogic.com")
149
- assert_equal drew, Employee.find_by_smart_case_login_field("Dgainor@binarylogic.com")
150
- assert_equal drew, Employee.find_by_smart_case_login_field("DGAINOR@BINARYLOGIC.COM")
151
- end
152
- end
153
- end
@@ -1,29 +0,0 @@
1
- # frozen_string_literal: true
2
-
3
- require "test_helper"
4
-
5
- module ActsAsAuthenticTest
6
- class MagicColumnsTest < ActiveSupport::TestCase
7
- def test_validates_numericality_of_login_count
8
- u = User.new
9
- u.login_count = -1
10
- refute u.valid?
11
- refute u.errors[:login_count].empty?
12
-
13
- u.login_count = 0
14
- refute u.valid?
15
- assert u.errors[:login_count].empty?
16
- end
17
-
18
- def test_validates_numericality_of_failed_login_count
19
- u = User.new
20
- u.failed_login_count = -1
21
- refute u.valid?
22
- refute u.errors[:failed_login_count].empty?
23
-
24
- u.failed_login_count = 0
25
- refute u.valid?
26
- assert u.errors[:failed_login_count].empty?
27
- end
28
- end
29
- end
@@ -1,263 +0,0 @@
1
- # frozen_string_literal: true
2
-
3
- require "test_helper"
4
-
5
- module ActsAsAuthenticTest
6
- class PasswordTest < ActiveSupport::TestCase
7
- # If test_human_name is executed after test_i18n_of_human_name the test will fail.
8
- i_suck_and_my_tests_are_order_dependent!
9
-
10
- def test_crypted_password_field_config
11
- assert_equal :crypted_password, User.crypted_password_field
12
- assert_equal :crypted_password, Employee.crypted_password_field
13
-
14
- User.crypted_password_field = :nope
15
- assert_equal :nope, User.crypted_password_field
16
- User.crypted_password_field :crypted_password
17
- assert_equal :crypted_password, User.crypted_password_field
18
- end
19
-
20
- def test_password_salt_field_config
21
- assert_equal :password_salt, User.password_salt_field
22
- assert_equal :password_salt, Employee.password_salt_field
23
-
24
- User.password_salt_field = :nope
25
- assert_equal :nope, User.password_salt_field
26
- User.password_salt_field :password_salt
27
- assert_equal :password_salt, User.password_salt_field
28
- end
29
-
30
- def test_ignore_blank_passwords_config
31
- assert User.ignore_blank_passwords
32
- assert Employee.ignore_blank_passwords
33
-
34
- User.ignore_blank_passwords = false
35
- refute User.ignore_blank_passwords
36
- User.ignore_blank_passwords true
37
- assert User.ignore_blank_passwords
38
- end
39
-
40
- def test_check_passwords_against_database
41
- assert User.check_passwords_against_database
42
- User.check_passwords_against_database = false
43
- refute User.check_passwords_against_database
44
- User.check_passwords_against_database true
45
- assert User.check_passwords_against_database
46
- end
47
-
48
- def test_validate_password_field_config
49
- assert User.validate_password_field
50
- assert Employee.validate_password_field
51
-
52
- User.validate_password_field = false
53
- refute User.validate_password_field
54
- User.validate_password_field true
55
- assert User.validate_password_field
56
- end
57
-
58
- def test_validates_length_of_password_field_options_config
59
- default = { minimum: 8, if: :require_password? }
60
- assert_equal default, User.validates_length_of_password_field_options
61
- assert_equal default, Employee.validates_length_of_password_field_options
62
-
63
- User.validates_length_of_password_field_options = { yes: "no" }
64
- assert_equal({ yes: "no" }, User.validates_length_of_password_field_options)
65
- User.validates_length_of_password_field_options default
66
- assert_equal default, User.validates_length_of_password_field_options
67
- end
68
-
69
- def test_validates_confirmation_of_password_field_options_config
70
- default = { if: :require_password? }
71
- assert_equal default, User.validates_confirmation_of_password_field_options
72
- assert_equal default, Employee.validates_confirmation_of_password_field_options
73
-
74
- User.validates_confirmation_of_password_field_options = { yes: "no" }
75
- assert_equal({ yes: "no" }, User.validates_confirmation_of_password_field_options)
76
- User.validates_confirmation_of_password_field_options default
77
- assert_equal default, User.validates_confirmation_of_password_field_options
78
- end
79
-
80
- def test_validates_length_of_password_confirmation_field_options_config
81
- default = { minimum: 8, if: :require_password? }
82
- assert_equal default, User.validates_length_of_password_confirmation_field_options
83
- assert_equal default, Employee.validates_length_of_password_confirmation_field_options
84
-
85
- User.validates_length_of_password_confirmation_field_options = { yes: "no" }
86
- assert_equal({ yes: "no" }, User.validates_length_of_password_confirmation_field_options)
87
- User.validates_length_of_password_confirmation_field_options default
88
- assert_equal default, User.validates_length_of_password_confirmation_field_options
89
- end
90
-
91
- def test_crypto_provider_config
92
- assert_equal Authlogic::CryptoProviders::SCrypt, User.crypto_provider
93
- assert_equal Authlogic::CryptoProviders::AES256, Employee.crypto_provider
94
-
95
- User.crypto_provider = Authlogic::CryptoProviders::BCrypt
96
- assert_equal Authlogic::CryptoProviders::BCrypt, User.crypto_provider
97
- User.crypto_provider Authlogic::CryptoProviders::Sha512
98
- assert_equal Authlogic::CryptoProviders::Sha512, User.crypto_provider
99
- end
100
-
101
- def test_transition_from_crypto_providers_config
102
- assert_equal [Authlogic::CryptoProviders::Sha512], User.transition_from_crypto_providers
103
- assert_equal [], Employee.transition_from_crypto_providers
104
-
105
- User.transition_from_crypto_providers = [Authlogic::CryptoProviders::BCrypt]
106
- assert_equal [Authlogic::CryptoProviders::BCrypt], User.transition_from_crypto_providers
107
- User.transition_from_crypto_providers []
108
- assert_equal [], User.transition_from_crypto_providers
109
- end
110
-
111
- def test_validates_length_of_password
112
- u = User.new(
113
- login: "abcde",
114
- email: "abcde@test.com",
115
- password: "abcdefgh",
116
- password_confirmation: "abcdefgh"
117
- )
118
- assert u.valid?
119
-
120
- u.password = u.password_confirmation = "abcdef"
121
- refute u.valid?
122
-
123
- assert u.errors[:password].include?("is too short (minimum is 8 characters)")
124
- assert u.errors[:password_confirmation].include?("is too short (minimum is 8 characters)")
125
- end
126
-
127
- def test_validates_confirmation_of_password
128
- u = User.new(
129
- login: "abcde",
130
- email: "abcde@test.com",
131
- password: "abcdefgh",
132
- password_confirmation: "abcdefgh"
133
- )
134
- assert u.valid?
135
-
136
- u.password_confirmation = "abcdefghij"
137
- refute u.valid?
138
-
139
- assert u.errors[:password_confirmation].include?("doesn't match Password")
140
- end
141
-
142
- def test_validates_length_of_password_confirmation
143
- u = User.new
144
-
145
- u.password = "testpass"
146
- u.password_confirmation = ""
147
- refute u.valid?
148
- refute u.errors[:password_confirmation].empty?
149
-
150
- u.password_confirmation = "testpass"
151
- refute u.valid?
152
- assert u.errors[:password_confirmation].empty?
153
-
154
- ben = users(:ben)
155
- assert ben.valid?
156
-
157
- ben.password = "newpasswd"
158
- refute ben.valid?
159
- refute ben.errors[:password_confirmation].empty?
160
-
161
- ben.password_confirmation = "newpasswd"
162
- assert ben.valid?
163
- end
164
-
165
- def test_password
166
- u = User.new
167
- old_password_salt = u.password_salt
168
- old_crypted_password = u.crypted_password
169
- u.password = "test"
170
- assert_not_equal old_password_salt, u.password_salt
171
- assert_not_equal old_crypted_password, u.crypted_password
172
- end
173
-
174
- def test_transitioning_password
175
- ben = users(:ben)
176
-
177
- transition_password_to(Authlogic::CryptoProviders::BCrypt, ben)
178
- transition_password_to(
179
- Authlogic::CryptoProviders::Sha1,
180
- ben,
181
- [Authlogic::CryptoProviders::Sha512, Authlogic::CryptoProviders::BCrypt]
182
- )
183
- transition_password_to(
184
- Authlogic::CryptoProviders::Sha512,
185
- ben,
186
- [Authlogic::CryptoProviders::Sha1, Authlogic::CryptoProviders::BCrypt]
187
- )
188
- end
189
-
190
- def test_checks_password_against_database
191
- ben = users(:aaron)
192
- ben.password = "new pass"
193
- refute ben.valid_password?("new pass")
194
- assert ben.valid_password?("aaronrocks")
195
- end
196
-
197
- def test_checks_password_against_database_and_always_fails_on_new_records
198
- user = User.new
199
- user.password = "new pass"
200
- refute user.valid_password?("new pass")
201
- end
202
-
203
- def test_checks_password_against_object
204
- ben = users(:ben)
205
- ben.password = "new pass"
206
- assert ben.valid_password?("new pass", false)
207
- refute ben.valid_password?("benrocks", false)
208
- end
209
-
210
- def test_reset_password
211
- ben = users(:ben)
212
- old_crypted_password = ben.crypted_password
213
- old_password_salt = ben.password_salt
214
-
215
- # soft reset
216
- ben.reset_password
217
- assert_not_equal old_crypted_password, ben.crypted_password
218
- assert_not_equal old_password_salt, ben.password_salt
219
-
220
- # make sure it didn't go into the db
221
- ben.reload
222
- assert_equal old_crypted_password, ben.crypted_password
223
- assert_equal old_password_salt, ben.password_salt
224
-
225
- # hard reset
226
- assert ben.reset_password!
227
- assert_not_equal old_crypted_password, ben.crypted_password
228
- assert_not_equal old_password_salt, ben.password_salt
229
-
230
- # make sure it did go into the db
231
- ben.reload
232
- assert_not_equal old_crypted_password, ben.crypted_password
233
- assert_not_equal old_password_salt, ben.password_salt
234
- end
235
-
236
- private
237
-
238
- def transition_password_to(
239
- crypto_provider,
240
- records,
241
- from_crypto_providers = Authlogic::CryptoProviders::Sha512
242
- )
243
- records = [records] unless records.is_a?(Array)
244
- User.acts_as_authentic do |c|
245
- c.crypto_provider = crypto_provider
246
- c.transition_from_crypto_providers = from_crypto_providers
247
- end
248
- records.each do |record|
249
- old_hash = record.crypted_password
250
- old_persistence_token = record.persistence_token
251
- assert record.valid_password?(password_for(record))
252
- assert_not_equal old_hash.to_s, record.crypted_password.to_s
253
- assert_not_equal old_persistence_token.to_s, record.persistence_token.to_s
254
-
255
- old_hash = record.crypted_password
256
- old_persistence_token = record.persistence_token
257
- assert record.valid_password?(password_for(record))
258
- assert_equal old_hash.to_s, record.crypted_password.to_s
259
- assert_equal old_persistence_token.to_s, record.persistence_token.to_s
260
- end
261
- end
262
- end
263
- end
@@ -1,98 +0,0 @@
1
- # frozen_string_literal: true
2
-
3
- require "test_helper"
4
-
5
- module ActsAsAuthenticTest
6
- class PerishableTokenTest < ActiveSupport::TestCase
7
- def test_perishable_token_valid_for_config
8
- assert_equal 10.minutes.to_i, User.perishable_token_valid_for
9
- assert_equal 10.minutes.to_i, Employee.perishable_token_valid_for
10
-
11
- User.perishable_token_valid_for = 1.hour
12
- assert_equal 1.hour.to_i, User.perishable_token_valid_for
13
- User.perishable_token_valid_for 10.minutes
14
- assert_equal 10.minutes.to_i, User.perishable_token_valid_for
15
- end
16
-
17
- def test_disable_perishable_token_maintenance_config
18
- refute User.disable_perishable_token_maintenance
19
- refute Employee.disable_perishable_token_maintenance
20
-
21
- User.disable_perishable_token_maintenance = true
22
- assert User.disable_perishable_token_maintenance
23
- User.disable_perishable_token_maintenance false
24
- refute User.disable_perishable_token_maintenance
25
- end
26
-
27
- def test_validates_uniqueness_of_perishable_token
28
- u = User.new
29
- u.perishable_token = users(:ben).perishable_token
30
- refute u.valid?
31
- refute u.errors[:perishable_token].empty?
32
- end
33
-
34
- def test_before_save_reset_perishable_token
35
- ben = users(:ben)
36
- old_perishable_token = ben.perishable_token
37
- assert ben.save
38
- assert_not_equal old_perishable_token, ben.perishable_token
39
- end
40
-
41
- def test_reset_perishable_token
42
- ben = users(:ben)
43
- old_perishable_token = ben.perishable_token
44
-
45
- assert ben.reset_perishable_token
46
- assert_not_equal old_perishable_token, ben.perishable_token
47
-
48
- ben.reload
49
- assert_equal old_perishable_token, ben.perishable_token
50
-
51
- assert ben.reset_perishable_token!
52
- assert_not_equal old_perishable_token, ben.perishable_token
53
-
54
- ben.reload
55
- assert_not_equal old_perishable_token, ben.perishable_token
56
- end
57
-
58
- def test_find_using_perishable_token
59
- ben = users(:ben)
60
- assert_equal ben, User.find_using_perishable_token(ben.perishable_token)
61
- end
62
-
63
- def test_find_using_perishable_token_when_perished
64
- ben = users(:ben)
65
- ActiveRecord::Base.connection.execute(
66
- "UPDATE users set updated_at = '#{1.week.ago.to_s(:db)}' where id = #{ben.id}"
67
- )
68
- assert_nil User.find_using_perishable_token(ben.perishable_token)
69
- end
70
-
71
- def test_find_using_perishable_token_when_perished_2
72
- User.perishable_token_valid_for = 1.minute
73
- ben = users(:ben)
74
- ActiveRecord::Base.connection.execute(
75
- "UPDATE users set updated_at = '#{2.minutes.ago.to_s(:db)}' where id = #{ben.id}"
76
- )
77
- assert_nil User.find_using_perishable_token(ben.perishable_token)
78
- User.perishable_token_valid_for = 10.minutes
79
- end
80
-
81
- def test_find_using_perishable_token_when_passing_threshold
82
- User.perishable_token_valid_for = 1.minute
83
- ben = users(:ben)
84
- ActiveRecord::Base.connection.execute(
85
- "UPDATE users set updated_at = '#{10.minutes.ago.to_s(:db)}' where id = #{ben.id}"
86
- )
87
- assert_nil User.find_using_perishable_token(ben.perishable_token, 5.minutes)
88
- assert_equal ben, User.find_using_perishable_token(ben.perishable_token, 20.minutes)
89
- User.perishable_token_valid_for = 10.minutes
90
- end
91
-
92
- def test_find_perishable_token_with_bang
93
- assert_raises ActiveRecord::RecordNotFound do
94
- User.find_using_perishable_token!("some_bad_value")
95
- end
96
- end
97
- end
98
- end