charanya-devise_ldap_authenticatable 0.4.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +6 -0
- data/MIT-LICENSE +20 -0
- data/README.md +175 -0
- data/Rakefile +54 -0
- data/VERSION +1 -0
- data/charanya-devise_ldap_authenticatable.gemspec +173 -0
- data/lib/devise_ldap_authenticatable.rb +45 -0
- data/lib/devise_ldap_authenticatable/exception.rb +6 -0
- data/lib/devise_ldap_authenticatable/ldap_adapter.rb +237 -0
- data/lib/devise_ldap_authenticatable/logger.rb +11 -0
- data/lib/devise_ldap_authenticatable/model.rb +118 -0
- data/lib/devise_ldap_authenticatable/routes.rb +8 -0
- data/lib/devise_ldap_authenticatable/schema.rb +14 -0
- data/lib/devise_ldap_authenticatable/strategy.rb +36 -0
- data/lib/devise_ldap_authenticatable/version.rb +4 -0
- data/lib/generators/devise_ldap_authenticatable/install_generator.rb +61 -0
- data/lib/generators/devise_ldap_authenticatable/templates/ldap.yml +75 -0
- data/rails/init.rb +2 -0
- data/test/devise_ldap_authenticatable_test.rb +8 -0
- data/test/ldap/base.ldif +73 -0
- data/test/ldap/clear.ldif +26 -0
- data/test/ldap/local.schema +6 -0
- data/test/ldap/run-server.sh +10 -0
- data/test/ldap/server.pem +38 -0
- data/test/ldap/slapd-ssl-test.conf +107 -0
- data/test/ldap/slapd-test.conf +107 -0
- data/test/rails_app/Gemfile +22 -0
- data/test/rails_app/Gemfile.lock +157 -0
- data/test/rails_app/Rakefile +7 -0
- data/test/rails_app/app/controllers/application_controller.rb +4 -0
- data/test/rails_app/app/controllers/posts_controller.rb +15 -0
- data/test/rails_app/app/helpers/application_helper.rb +2 -0
- data/test/rails_app/app/helpers/posts_helper.rb +2 -0
- data/test/rails_app/app/models/post.rb +2 -0
- data/test/rails_app/app/models/user.rb +10 -0
- data/test/rails_app/app/views/layouts/application.html.erb +26 -0
- data/test/rails_app/app/views/posts/index.html.erb +2 -0
- data/test/rails_app/config.ru +4 -0
- data/test/rails_app/config/application.rb +46 -0
- data/test/rails_app/config/boot.rb +13 -0
- data/test/rails_app/config/cucumber.yml +8 -0
- data/test/rails_app/config/database.yml +25 -0
- data/test/rails_app/config/environment.rb +5 -0
- data/test/rails_app/config/environments/development.rb +22 -0
- data/test/rails_app/config/environments/production.rb +46 -0
- data/test/rails_app/config/environments/test.rb +34 -0
- data/test/rails_app/config/initializers/backtrace_silencers.rb +7 -0
- data/test/rails_app/config/initializers/devise.rb +140 -0
- data/test/rails_app/config/initializers/inflections.rb +10 -0
- data/test/rails_app/config/initializers/mime_types.rb +5 -0
- data/test/rails_app/config/initializers/secret_token.rb +7 -0
- data/test/rails_app/config/initializers/session_store.rb +8 -0
- data/test/rails_app/config/ldap.yml +22 -0
- data/test/rails_app/config/ldap_with_erb.yml +23 -0
- data/test/rails_app/config/ldap_with_uid.yml +18 -0
- data/test/rails_app/config/locales/devise.en.yml +39 -0
- data/test/rails_app/config/locales/en.yml +5 -0
- data/test/rails_app/config/routes.rb +64 -0
- data/test/rails_app/config/ssl_ldap.yml +21 -0
- data/test/rails_app/config/ssl_ldap_with_erb.yml +23 -0
- data/test/rails_app/config/ssl_ldap_with_uid.yml +18 -0
- data/test/rails_app/db/migrate/20100708120302_create_posts.rb +14 -0
- data/test/rails_app/db/migrate/20100708120448_devise_create_users.rb +26 -0
- data/test/rails_app/db/schema.rb +42 -0
- data/test/rails_app/db/seeds.rb +7 -0
- data/test/rails_app/features/manage_logins.feature +35 -0
- data/test/rails_app/features/step_definitions/login_steps.rb +21 -0
- data/test/rails_app/features/step_definitions/web_steps.rb +219 -0
- data/test/rails_app/features/support/env.rb +58 -0
- data/test/rails_app/features/support/paths.rb +38 -0
- data/test/rails_app/lib/tasks/.gitkeep +0 -0
- data/test/rails_app/lib/tasks/cucumber.rake +53 -0
- data/test/rails_app/public/404.html +26 -0
- data/test/rails_app/public/422.html +26 -0
- data/test/rails_app/public/500.html +26 -0
- data/test/rails_app/public/images/rails.png +0 -0
- data/test/rails_app/public/javascripts/application.js +2 -0
- data/test/rails_app/public/javascripts/controls.js +965 -0
- data/test/rails_app/public/javascripts/dragdrop.js +974 -0
- data/test/rails_app/public/javascripts/effects.js +1123 -0
- data/test/rails_app/public/javascripts/prototype.js +4874 -0
- data/test/rails_app/public/javascripts/rails.js +118 -0
- data/test/rails_app/public/stylesheets/.gitkeep +0 -0
- data/test/rails_app/script/cucumber +10 -0
- data/test/rails_app/script/rails +6 -0
- data/test/rails_app/test/factories/users.rb +14 -0
- data/test/rails_app/test/functional/posts_controller_test.rb +58 -0
- data/test/rails_app/test/performance/browsing_test.rb +9 -0
- data/test/rails_app/test/test_helper.rb +36 -0
- data/test/rails_app/test/unit/helpers/posts_helper_test.rb +4 -0
- data/test/rails_app/test/unit/post_test.rb +4 -0
- data/test/rails_app/test/unit/user_test.rb +211 -0
- data/test/test_helper.rb +3 -0
- metadata +217 -0
@@ -0,0 +1,118 @@
|
|
1
|
+
document.observe("dom:loaded", function() {
|
2
|
+
function handleRemote(element) {
|
3
|
+
var method, url, params;
|
4
|
+
|
5
|
+
if (element.tagName.toLowerCase() === 'form') {
|
6
|
+
method = element.readAttribute('method') || 'post';
|
7
|
+
url = element.readAttribute('action');
|
8
|
+
params = element.serialize(true);
|
9
|
+
} else {
|
10
|
+
method = element.readAttribute('data-method') || 'get';
|
11
|
+
url = element.readAttribute('href');
|
12
|
+
params = {};
|
13
|
+
}
|
14
|
+
|
15
|
+
var event = element.fire("ajax:before");
|
16
|
+
if (event.stopped) return false;
|
17
|
+
|
18
|
+
new Ajax.Request(url, {
|
19
|
+
method: method,
|
20
|
+
parameters: params,
|
21
|
+
asynchronous: true,
|
22
|
+
evalScripts: true,
|
23
|
+
|
24
|
+
onLoading: function(request) { element.fire("ajax:loading", {request: request}); },
|
25
|
+
onLoaded: function(request) { element.fire("ajax:loaded", {request: request}); },
|
26
|
+
onInteractive: function(request) { element.fire("ajax:interactive", {request: request}); },
|
27
|
+
onComplete: function(request) { element.fire("ajax:complete", {request: request}); },
|
28
|
+
onSuccess: function(request) { element.fire("ajax:success", {request: request}); },
|
29
|
+
onFailure: function(request) { element.fire("ajax:failure", {request: request}); }
|
30
|
+
});
|
31
|
+
|
32
|
+
element.fire("ajax:after");
|
33
|
+
}
|
34
|
+
|
35
|
+
function handleMethod(element) {
|
36
|
+
var method, url, token_name, token;
|
37
|
+
|
38
|
+
method = element.readAttribute('data-method');
|
39
|
+
url = element.readAttribute('href');
|
40
|
+
csrf_param = $$('meta[name=csrf-param]').first();
|
41
|
+
csrf_token = $$('meta[name=csrf-token]').first();
|
42
|
+
|
43
|
+
var form = new Element('form', { method: "POST", action: url, style: "display: none;" });
|
44
|
+
element.parentNode.appendChild(form);
|
45
|
+
|
46
|
+
if (method != 'post') {
|
47
|
+
var field = new Element('input', { type: 'hidden', name: '_method', value: method });
|
48
|
+
form.appendChild(field);
|
49
|
+
}
|
50
|
+
|
51
|
+
if (csrf_param) {
|
52
|
+
var param = csrf_param.readAttribute('content');
|
53
|
+
var token = csrf_token.readAttribute('content');
|
54
|
+
var field = new Element('input', { type: 'hidden', name: param, value: token });
|
55
|
+
form.appendChild(field);
|
56
|
+
}
|
57
|
+
|
58
|
+
form.submit();
|
59
|
+
}
|
60
|
+
|
61
|
+
$(document.body).observe("click", function(event) {
|
62
|
+
var message = event.findElement().readAttribute('data-confirm');
|
63
|
+
if (message && !confirm(message)) {
|
64
|
+
event.stop();
|
65
|
+
return false;
|
66
|
+
}
|
67
|
+
|
68
|
+
var element = event.findElement("a[data-remote]");
|
69
|
+
if (element) {
|
70
|
+
handleRemote(element);
|
71
|
+
event.stop();
|
72
|
+
return true;
|
73
|
+
}
|
74
|
+
|
75
|
+
var element = event.findElement("a[data-method]");
|
76
|
+
if (element) {
|
77
|
+
handleMethod(element);
|
78
|
+
event.stop();
|
79
|
+
return true;
|
80
|
+
}
|
81
|
+
});
|
82
|
+
|
83
|
+
// TODO: I don't think submit bubbles in IE
|
84
|
+
$(document.body).observe("submit", function(event) {
|
85
|
+
var element = event.findElement(),
|
86
|
+
message = element.readAttribute('data-confirm');
|
87
|
+
if (message && !confirm(message)) {
|
88
|
+
event.stop();
|
89
|
+
return false;
|
90
|
+
}
|
91
|
+
|
92
|
+
var inputs = element.select("input[type=submit][data-disable-with]");
|
93
|
+
inputs.each(function(input) {
|
94
|
+
input.disabled = true;
|
95
|
+
input.writeAttribute('data-original-value', input.value);
|
96
|
+
input.value = input.readAttribute('data-disable-with');
|
97
|
+
});
|
98
|
+
|
99
|
+
var element = event.findElement("form[data-remote]");
|
100
|
+
if (element) {
|
101
|
+
handleRemote(element);
|
102
|
+
event.stop();
|
103
|
+
}
|
104
|
+
});
|
105
|
+
|
106
|
+
$(document.body).observe("ajax:after", function(event) {
|
107
|
+
var element = event.findElement();
|
108
|
+
|
109
|
+
if (element.tagName.toLowerCase() === 'form') {
|
110
|
+
var inputs = element.select("input[type=submit][disabled=true][data-disable-with]");
|
111
|
+
inputs.each(function(input) {
|
112
|
+
input.value = input.readAttribute('data-original-value');
|
113
|
+
input.writeAttribute('data-original-value', null);
|
114
|
+
input.disabled = false;
|
115
|
+
});
|
116
|
+
}
|
117
|
+
});
|
118
|
+
});
|
File without changes
|
@@ -0,0 +1,10 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
vendored_cucumber_bin = Dir["#{File.dirname(__FILE__)}/../vendor/{gems,plugins}/cucumber*/bin/cucumber"].first
|
4
|
+
if vendored_cucumber_bin
|
5
|
+
load File.expand_path(vendored_cucumber_bin)
|
6
|
+
else
|
7
|
+
require 'rubygems' unless ENV['NO_RUBYGEMS']
|
8
|
+
require 'cucumber'
|
9
|
+
load Cucumber::BINARY
|
10
|
+
end
|
@@ -0,0 +1,6 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
# This command will automatically be run when you run "rails" with Rails 3 gems installed from the root of your application.
|
3
|
+
|
4
|
+
APP_PATH = File.expand_path('../../config/application', __FILE__)
|
5
|
+
require File.expand_path('../../config/boot', __FILE__)
|
6
|
+
require 'rails/commands'
|
@@ -0,0 +1,14 @@
|
|
1
|
+
Factory.define :user do |f|
|
2
|
+
f.email "example.user@test.com"
|
3
|
+
f.password "secret"
|
4
|
+
end
|
5
|
+
|
6
|
+
Factory.define :admin, :class => "user" do |f|
|
7
|
+
f.email "example.admin@test.com"
|
8
|
+
f.password "admin_secret"
|
9
|
+
end
|
10
|
+
|
11
|
+
Factory.define :other, :class => "user" do |f|
|
12
|
+
f.email "other.user@test.com"
|
13
|
+
f.password "other_secret"
|
14
|
+
end
|
@@ -0,0 +1,58 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class PostsControllerTest < ActionController::TestCase
|
4
|
+
|
5
|
+
include Devise::TestHelpers
|
6
|
+
|
7
|
+
context "not logged in" do
|
8
|
+
should "should get INDEX" do
|
9
|
+
get :index
|
10
|
+
assert_response :success
|
11
|
+
assert_equal(response.body, "posts#index")
|
12
|
+
end
|
13
|
+
|
14
|
+
context "go to NEW page" do
|
15
|
+
setup do
|
16
|
+
get :new
|
17
|
+
end
|
18
|
+
|
19
|
+
should "not get NEW" do
|
20
|
+
assert_response :redirect
|
21
|
+
end
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
context "logged in" do
|
26
|
+
setup do
|
27
|
+
@user = Factory(:user)
|
28
|
+
sign_in(@user)
|
29
|
+
end
|
30
|
+
|
31
|
+
context "get NEW action" do
|
32
|
+
setup do
|
33
|
+
get :new
|
34
|
+
end
|
35
|
+
|
36
|
+
should "get the NEW action" do
|
37
|
+
assert_response :success
|
38
|
+
assert_equal(response.body, "posts#new")
|
39
|
+
end
|
40
|
+
end
|
41
|
+
|
42
|
+
context "log out user" do
|
43
|
+
setup do
|
44
|
+
sign_out(@user)
|
45
|
+
get :new
|
46
|
+
end
|
47
|
+
|
48
|
+
should "get redirected to the login page" do
|
49
|
+
assert_response :redirect
|
50
|
+
end
|
51
|
+
end
|
52
|
+
|
53
|
+
|
54
|
+
end
|
55
|
+
|
56
|
+
|
57
|
+
|
58
|
+
end
|
@@ -0,0 +1,36 @@
|
|
1
|
+
ENV["RAILS_ENV"] = "test"
|
2
|
+
require File.expand_path('../../config/environment', __FILE__)
|
3
|
+
require 'rails/test_help'
|
4
|
+
|
5
|
+
class ActiveSupport::TestCase
|
6
|
+
|
7
|
+
def ldap_connect_string
|
8
|
+
if ENV["LDAP_SSL"]
|
9
|
+
"-x -H ldaps://localhost:3389 -D 'cn=admin,dc=test,dc=com' -w secret"
|
10
|
+
else
|
11
|
+
"-x -h localhost -p 3389 -D 'cn=admin,dc=test,dc=com' -w secret"
|
12
|
+
end
|
13
|
+
end
|
14
|
+
|
15
|
+
def reset_ldap_server!
|
16
|
+
if ENV["LDAP_SSL"]
|
17
|
+
`ldapmodify #{ldap_connect_string} -f ../ldap/clear.ldif`
|
18
|
+
`ldapadd #{ldap_connect_string} -f ../ldap/base.ldif`
|
19
|
+
else
|
20
|
+
`ldapmodify #{ldap_connect_string} -f ../ldap/clear.ldif`
|
21
|
+
`ldapadd #{ldap_connect_string} -f ../ldap/base.ldif`
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
def default_devise_settings!
|
26
|
+
::Devise.ldap_logger = true
|
27
|
+
::Devise.ldap_create_user = false
|
28
|
+
::Devise.ldap_update_password = true
|
29
|
+
::Devise.ldap_config = "#{Rails.root}/config/#{"ssl_" if ENV["LDAP_SSL"]}ldap.yml"
|
30
|
+
::Devise.ldap_check_group_membership = false
|
31
|
+
::Devise.ldap_check_attributes = false
|
32
|
+
::Devise.ldap_auth_username_builder = Proc.new() {|attribute, login, ldap| "#{attribute}=#{login},#{ldap.base}" }
|
33
|
+
::Devise.authentication_keys = [:email]
|
34
|
+
end
|
35
|
+
|
36
|
+
end
|
@@ -0,0 +1,211 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class UserTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
def should_be_validated(user, password, message = "Password is invalid")
|
6
|
+
assert(user.valid_ldap_authentication?(password), message)
|
7
|
+
end
|
8
|
+
|
9
|
+
def should_not_be_validated(user, password, message = "Password is not properly set")
|
10
|
+
assert(!user.valid_ldap_authentication?(password), message)
|
11
|
+
end
|
12
|
+
|
13
|
+
context "With default settings" do
|
14
|
+
setup do
|
15
|
+
default_devise_settings!
|
16
|
+
reset_ldap_server!
|
17
|
+
end
|
18
|
+
|
19
|
+
context "create a basic user" do
|
20
|
+
setup do
|
21
|
+
@user = Factory(:user)
|
22
|
+
end
|
23
|
+
|
24
|
+
should "check for password validation" do
|
25
|
+
assert_equal(@user.email, "example.user@test.com")
|
26
|
+
should_be_validated @user, "secret"
|
27
|
+
should_not_be_validated @user, "wrong_secret"
|
28
|
+
should_not_be_validated @user, "Secret"
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
32
|
+
context "change a LDAP password" do
|
33
|
+
setup do
|
34
|
+
@user = Factory(:user)
|
35
|
+
end
|
36
|
+
|
37
|
+
should "change password" do
|
38
|
+
should_be_validated @user, "secret"
|
39
|
+
@user.reset_password!("changed","changed")
|
40
|
+
should_be_validated @user, "changed", "password was not changed properly on the LDAP sevrer"
|
41
|
+
end
|
42
|
+
|
43
|
+
should "not allow to change password if setting is false" do
|
44
|
+
should_be_validated @user, "secret"
|
45
|
+
::Devise.ldap_update_password = false
|
46
|
+
@user.reset_password!("wrong_secret", "wrong_secret")
|
47
|
+
should_not_be_validated @user, "wrong_secret"
|
48
|
+
should_be_validated @user, "secret"
|
49
|
+
end
|
50
|
+
end
|
51
|
+
|
52
|
+
context "create new local user if user is in LDAP" do
|
53
|
+
|
54
|
+
setup do
|
55
|
+
assert(User.all.blank?, "There shouldn't be any users in the database")
|
56
|
+
end
|
57
|
+
|
58
|
+
should "don't create user in the database" do
|
59
|
+
@user = User.authenticate_with_ldap(:email => "example.user@test.com", :password => "secret")
|
60
|
+
assert(User.all.blank?)
|
61
|
+
end
|
62
|
+
|
63
|
+
context "creating users is enabled" do
|
64
|
+
setup do
|
65
|
+
::Devise.ldap_create_user = true
|
66
|
+
end
|
67
|
+
|
68
|
+
should "create a user in the database" do
|
69
|
+
@user = User.authenticate_with_ldap(:email => "example.user@test.com", :password => "secret")
|
70
|
+
assert_equal(User.all.size, 1)
|
71
|
+
assert_contains(User.all.collect(&:email), "example.user@test.com", "user not in database")
|
72
|
+
end
|
73
|
+
|
74
|
+
should "not create a user in the database if the password is wrong_secret" do
|
75
|
+
@user = User.authenticate_with_ldap(:email => "example.user", :password => "wrong_secret")
|
76
|
+
assert(User.all.blank?, "There's users in the database")
|
77
|
+
end
|
78
|
+
|
79
|
+
should "create a user if the user is not in LDAP" do
|
80
|
+
@user = User.authenticate_with_ldap(:email => "wrong_secret.user@test.com", :password => "wrong_secret")
|
81
|
+
assert(User.all.blank?, "There's users in the database")
|
82
|
+
end
|
83
|
+
end
|
84
|
+
|
85
|
+
end
|
86
|
+
|
87
|
+
context "use groups for authorization" do
|
88
|
+
setup do
|
89
|
+
@admin = Factory(:admin)
|
90
|
+
@user = Factory(:user)
|
91
|
+
::Devise.authentication_keys = [:email]
|
92
|
+
::Devise.ldap_check_group_membership = true
|
93
|
+
end
|
94
|
+
|
95
|
+
should "admin should be allowed in" do
|
96
|
+
should_be_validated @admin, "admin_secret"
|
97
|
+
end
|
98
|
+
|
99
|
+
should "admin should have the proper groups set" do
|
100
|
+
assert_contains(@admin.ldap_groups, /cn=admins/, "groups attribute not being set properly")
|
101
|
+
end
|
102
|
+
|
103
|
+
should "user should not be allowed in" do
|
104
|
+
should_not_be_validated @user, "secret"
|
105
|
+
end
|
106
|
+
|
107
|
+
should "not be validated if group with different attribute is removed" do
|
108
|
+
`ldapmodify #{ldap_connect_string} -f ../ldap/delete_authorization_role.ldif`
|
109
|
+
should_not_be_validated @admin, "admin_secret"
|
110
|
+
end
|
111
|
+
end
|
112
|
+
|
113
|
+
context "use role attribute for authorization" do
|
114
|
+
setup do
|
115
|
+
@admin = Factory(:admin)
|
116
|
+
@user = Factory(:user)
|
117
|
+
::Devise.ldap_check_attributes = true
|
118
|
+
end
|
119
|
+
|
120
|
+
should "admin should be allowed in" do
|
121
|
+
should_be_validated @admin, "admin_secret"
|
122
|
+
end
|
123
|
+
|
124
|
+
should "user should not be allowed in" do
|
125
|
+
should_not_be_validated @user, "secret"
|
126
|
+
end
|
127
|
+
end
|
128
|
+
|
129
|
+
context "use admin setting to bind" do
|
130
|
+
setup do
|
131
|
+
@admin = Factory(:admin)
|
132
|
+
@user = Factory(:user)
|
133
|
+
::Devise.ldap_use_admin_to_bind = true
|
134
|
+
end
|
135
|
+
|
136
|
+
should "description" do
|
137
|
+
should_be_validated @admin, "admin_secret"
|
138
|
+
end
|
139
|
+
end
|
140
|
+
|
141
|
+
end
|
142
|
+
|
143
|
+
context "use uid for login" do
|
144
|
+
setup do
|
145
|
+
default_devise_settings!
|
146
|
+
reset_ldap_server!
|
147
|
+
::Devise.ldap_config = "#{Rails.root}/config/#{"ssl_" if ENV["LDAP_SSL"]}ldap_with_uid.yml"
|
148
|
+
::Devise.authentication_keys = [:uid]
|
149
|
+
end
|
150
|
+
|
151
|
+
context "description" do
|
152
|
+
setup do
|
153
|
+
@admin = Factory(:admin)
|
154
|
+
@user = Factory(:user, :uid => "example_user")
|
155
|
+
end
|
156
|
+
|
157
|
+
should "be able to authenticate using uid" do
|
158
|
+
should_be_validated @user, "secret"
|
159
|
+
should_not_be_validated @admin, "admin_secret"
|
160
|
+
end
|
161
|
+
end
|
162
|
+
|
163
|
+
context "create user" do
|
164
|
+
setup do
|
165
|
+
::Devise.ldap_create_user = true
|
166
|
+
end
|
167
|
+
|
168
|
+
should "create a user in the database" do
|
169
|
+
@user = User.authenticate_with_ldap(:uid => "example_user", :password => "secret")
|
170
|
+
assert_equal(User.all.size, 1)
|
171
|
+
assert_contains(User.all.collect(&:uid), "example_user", "user not in database")
|
172
|
+
end
|
173
|
+
end
|
174
|
+
end
|
175
|
+
|
176
|
+
context "using ERB in the config file" do
|
177
|
+
setup do
|
178
|
+
default_devise_settings!
|
179
|
+
reset_ldap_server!
|
180
|
+
::Devise.ldap_config = "#{Rails.root}/config/#{"ssl_" if ENV["LDAP_SSL"]}ldap_with_erb.yml"
|
181
|
+
end
|
182
|
+
|
183
|
+
context "authenticate" do
|
184
|
+
setup do
|
185
|
+
@admin = Factory(:admin)
|
186
|
+
@user = Factory(:user)
|
187
|
+
end
|
188
|
+
|
189
|
+
should "be able to authenticate" do
|
190
|
+
should_be_validated @user, "secret"
|
191
|
+
should_be_validated @admin, "admin_secret"
|
192
|
+
end
|
193
|
+
end
|
194
|
+
end
|
195
|
+
|
196
|
+
context "use username builder" do
|
197
|
+
setup do
|
198
|
+
default_devise_settings!
|
199
|
+
reset_ldap_server!
|
200
|
+
::Devise.ldap_auth_username_builder = Proc.new() do |attribute, login, ldap|
|
201
|
+
"#{attribute}=#{login},ou=others,dc=test,dc=com"
|
202
|
+
end
|
203
|
+
@other = Factory(:other)
|
204
|
+
end
|
205
|
+
|
206
|
+
should "be able to authenticate" do
|
207
|
+
should_be_validated @other, "other_secret"
|
208
|
+
end
|
209
|
+
end
|
210
|
+
|
211
|
+
end
|