dcu-devise 1.0.7
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG.rdoc +378 -0
- data/MIT-LICENSE +20 -0
- data/README.rdoc +260 -0
- data/Rakefile +53 -0
- data/TODO +2 -0
- data/app/controllers/confirmations_controller.rb +33 -0
- data/app/controllers/passwords_controller.rb +41 -0
- data/app/controllers/registrations_controller.rb +53 -0
- data/app/controllers/sessions_controller.rb +44 -0
- data/app/controllers/unlocks_controller.rb +41 -0
- data/app/models/devise_mailer.rb +68 -0
- data/app/views/confirmations/new.html.erb +12 -0
- data/app/views/devise_mailer/confirmation_instructions.html.erb +5 -0
- data/app/views/devise_mailer/reset_password_instructions.html.erb +8 -0
- data/app/views/devise_mailer/unlock_instructions.html.erb +7 -0
- data/app/views/passwords/edit.html.erb +16 -0
- data/app/views/passwords/new.html.erb +12 -0
- data/app/views/registrations/edit.html.erb +25 -0
- data/app/views/registrations/new.html.erb +17 -0
- data/app/views/sessions/new.html.erb +17 -0
- data/app/views/shared/_devise_links.erb +19 -0
- data/app/views/unlocks/new.html.erb +12 -0
- data/generators/devise/USAGE +5 -0
- data/generators/devise/devise_generator.rb +15 -0
- data/generators/devise/lib/route_devise.rb +32 -0
- data/generators/devise/templates/migration.rb +23 -0
- data/generators/devise/templates/model.rb +9 -0
- data/generators/devise_install/USAGE +3 -0
- data/generators/devise_install/devise_install_generator.rb +15 -0
- data/generators/devise_install/templates/README +23 -0
- data/generators/devise_install/templates/devise.rb +105 -0
- data/generators/devise_views/USAGE +3 -0
- data/generators/devise_views/devise_views_generator.rb +21 -0
- data/lib/devise.rb +264 -0
- data/lib/devise/controllers/helpers.rb +200 -0
- data/lib/devise/controllers/internal_helpers.rb +129 -0
- data/lib/devise/controllers/url_helpers.rb +41 -0
- data/lib/devise/encryptors/authlogic_sha512.rb +21 -0
- data/lib/devise/encryptors/base.rb +20 -0
- data/lib/devise/encryptors/bcrypt.rb +21 -0
- data/lib/devise/encryptors/clearance_sha1.rb +19 -0
- data/lib/devise/encryptors/restful_authentication_sha1.rb +22 -0
- data/lib/devise/encryptors/sha1.rb +27 -0
- data/lib/devise/encryptors/sha512.rb +27 -0
- data/lib/devise/failure_app.rb +65 -0
- data/lib/devise/hooks/activatable.rb +15 -0
- data/lib/devise/hooks/rememberable.rb +32 -0
- data/lib/devise/hooks/timeoutable.rb +18 -0
- data/lib/devise/hooks/trackable.rb +18 -0
- data/lib/devise/locales/en.yml +35 -0
- data/lib/devise/mapping.rb +128 -0
- data/lib/devise/models.rb +117 -0
- data/lib/devise/models/activatable.rb +16 -0
- data/lib/devise/models/confirmable.rb +162 -0
- data/lib/devise/models/database_authenticatable.rb +144 -0
- data/lib/devise/models/http_authenticatable.rb +21 -0
- data/lib/devise/models/lockable.rb +150 -0
- data/lib/devise/models/recoverable.rb +80 -0
- data/lib/devise/models/registerable.rb +8 -0
- data/lib/devise/models/rememberable.rb +92 -0
- data/lib/devise/models/timeoutable.rb +28 -0
- data/lib/devise/models/token_authenticatable.rb +89 -0
- data/lib/devise/models/trackable.rb +16 -0
- data/lib/devise/models/validatable.rb +39 -0
- data/lib/devise/orm/active_record.rb +41 -0
- data/lib/devise/orm/data_mapper.rb +83 -0
- data/lib/devise/orm/mongo_mapper.rb +47 -0
- data/lib/devise/rails.rb +14 -0
- data/lib/devise/rails/routes.rb +125 -0
- data/lib/devise/rails/warden_compat.rb +25 -0
- data/lib/devise/schema.rb +73 -0
- data/lib/devise/strategies/base.rb +16 -0
- data/lib/devise/strategies/database_authenticatable.rb +36 -0
- data/lib/devise/strategies/http_authenticatable.rb +59 -0
- data/lib/devise/strategies/rememberable.rb +37 -0
- data/lib/devise/strategies/token_authenticatable.rb +37 -0
- data/lib/devise/test_helpers.rb +90 -0
- data/lib/devise/version.rb +3 -0
- data/rails/init.rb +2 -0
- data/test/controllers/helpers_test.rb +177 -0
- data/test/controllers/internal_helpers_test.rb +55 -0
- data/test/controllers/url_helpers_test.rb +47 -0
- data/test/devise_test.rb +74 -0
- data/test/encryptors_test.rb +31 -0
- data/test/failure_app_test.rb +44 -0
- data/test/integration/authenticatable_test.rb +271 -0
- data/test/integration/confirmable_test.rb +97 -0
- data/test/integration/http_authenticatable_test.rb +52 -0
- data/test/integration/lockable_test.rb +102 -0
- data/test/integration/rack_middleware_test.rb +47 -0
- data/test/integration/recoverable_test.rb +141 -0
- data/test/integration/registerable_test.rb +144 -0
- data/test/integration/rememberable_test.rb +71 -0
- data/test/integration/timeoutable_test.rb +68 -0
- data/test/integration/token_authenticatable_test.rb +55 -0
- data/test/integration/trackable_test.rb +64 -0
- data/test/mailers/confirmation_instructions_test.rb +86 -0
- data/test/mailers/reset_password_instructions_test.rb +68 -0
- data/test/mailers/unlock_instructions_test.rb +62 -0
- data/test/mapping_test.rb +148 -0
- data/test/models/authenticatable_test.rb +180 -0
- data/test/models/confirmable_test.rb +212 -0
- data/test/models/lockable_test.rb +202 -0
- data/test/models/recoverable_test.rb +138 -0
- data/test/models/rememberable_test.rb +135 -0
- data/test/models/timeoutable_test.rb +28 -0
- data/test/models/token_authenticatable_test.rb +51 -0
- data/test/models/trackable_test.rb +5 -0
- data/test/models/validatable_test.rb +106 -0
- data/test/models_test.rb +70 -0
- data/test/orm/active_record.rb +31 -0
- data/test/orm/mongo_mapper.rb +20 -0
- data/test/rails_app/app/active_record/admin.rb +7 -0
- data/test/rails_app/app/active_record/user.rb +7 -0
- data/test/rails_app/app/controllers/admins_controller.rb +6 -0
- data/test/rails_app/app/controllers/application_controller.rb +12 -0
- data/test/rails_app/app/controllers/home_controller.rb +4 -0
- data/test/rails_app/app/controllers/users_controller.rb +16 -0
- data/test/rails_app/app/helpers/application_helper.rb +3 -0
- data/test/rails_app/app/mongo_mapper/admin.rb +13 -0
- data/test/rails_app/app/mongo_mapper/user.rb +14 -0
- data/test/rails_app/config/boot.rb +110 -0
- data/test/rails_app/config/environment.rb +42 -0
- data/test/rails_app/config/environments/development.rb +17 -0
- data/test/rails_app/config/environments/production.rb +28 -0
- data/test/rails_app/config/environments/test.rb +28 -0
- data/test/rails_app/config/initializers/devise.rb +82 -0
- data/test/rails_app/config/initializers/inflections.rb +2 -0
- data/test/rails_app/config/initializers/new_rails_defaults.rb +24 -0
- data/test/rails_app/config/initializers/session_store.rb +15 -0
- data/test/rails_app/config/routes.rb +21 -0
- data/test/routes_test.rb +110 -0
- data/test/support/assertions_helper.rb +37 -0
- data/test/support/integration_tests_helper.rb +71 -0
- data/test/support/test_silencer.rb +5 -0
- data/test/support/tests_helper.rb +39 -0
- data/test/test_helper.rb +21 -0
- data/test/test_helpers_test.rb +57 -0
- metadata +213 -0
@@ -0,0 +1,102 @@
|
|
1
|
+
require 'test/test_helper'
|
2
|
+
|
3
|
+
class LockTest < ActionController::IntegrationTest
|
4
|
+
|
5
|
+
def visit_user_unlock_with_token(unlock_token)
|
6
|
+
visit user_unlock_path(:unlock_token => unlock_token)
|
7
|
+
end
|
8
|
+
|
9
|
+
test 'user should be able to request a new unlock token' do
|
10
|
+
user = create_user(:locked => true)
|
11
|
+
ActionMailer::Base.deliveries.clear
|
12
|
+
|
13
|
+
visit new_user_session_path
|
14
|
+
click_link 'Didn\'t receive unlock instructions?'
|
15
|
+
|
16
|
+
fill_in 'email', :with => user.email
|
17
|
+
click_button 'Resend unlock instructions'
|
18
|
+
|
19
|
+
assert_template 'sessions/new'
|
20
|
+
assert_contain 'You will receive an email with instructions about how to unlock your account in a few minutes'
|
21
|
+
assert_equal 1, ActionMailer::Base.deliveries.size
|
22
|
+
end
|
23
|
+
|
24
|
+
test 'unlocked user should not be able to request a unlock token' do
|
25
|
+
user = create_user(:locked => false)
|
26
|
+
ActionMailer::Base.deliveries.clear
|
27
|
+
|
28
|
+
visit new_user_session_path
|
29
|
+
click_link 'Didn\'t receive unlock instructions?'
|
30
|
+
|
31
|
+
fill_in 'email', :with => user.email
|
32
|
+
click_button 'Resend unlock instructions'
|
33
|
+
|
34
|
+
assert_template 'unlocks/new'
|
35
|
+
assert_contain 'not locked'
|
36
|
+
assert_equal 0, ActionMailer::Base.deliveries.size
|
37
|
+
end
|
38
|
+
|
39
|
+
test 'unlocked pages should not be available if email strategy is disabled' do
|
40
|
+
visit new_user_unlock_path
|
41
|
+
assert_response :success
|
42
|
+
|
43
|
+
swap Devise, :unlock_strategy => :time do
|
44
|
+
visit new_user_unlock_path
|
45
|
+
assert_response :not_found
|
46
|
+
end
|
47
|
+
end
|
48
|
+
|
49
|
+
test 'user with invalid unlock token should not be able to unlock an account' do
|
50
|
+
visit_user_unlock_with_token('invalid_token')
|
51
|
+
|
52
|
+
assert_response :success
|
53
|
+
assert_template 'unlocks/new'
|
54
|
+
assert_have_selector '#errorExplanation'
|
55
|
+
assert_contain /Unlock token(.*)invalid/
|
56
|
+
end
|
57
|
+
|
58
|
+
test "locked user should be able to unlock account" do
|
59
|
+
user = create_user(:locked => true)
|
60
|
+
assert user.access_locked?
|
61
|
+
|
62
|
+
visit_user_unlock_with_token(user.unlock_token)
|
63
|
+
|
64
|
+
assert_template 'home/index'
|
65
|
+
assert_contain 'Your account was successfully unlocked.'
|
66
|
+
|
67
|
+
assert_not user.reload.access_locked?
|
68
|
+
end
|
69
|
+
|
70
|
+
test "sign in user automatically after unlocking it's account" do
|
71
|
+
user = create_user(:locked => true)
|
72
|
+
visit_user_unlock_with_token(user.unlock_token)
|
73
|
+
assert warden.authenticated?(:user)
|
74
|
+
end
|
75
|
+
|
76
|
+
test "user should not be able to sign in when locked" do
|
77
|
+
user = sign_in_as_user(:locked => true)
|
78
|
+
assert_template 'sessions/new'
|
79
|
+
assert_contain 'Your account is locked.'
|
80
|
+
assert_not warden.authenticated?(:user)
|
81
|
+
end
|
82
|
+
|
83
|
+
test "user should not send a new e-mail if already locked" do
|
84
|
+
user = create_user(:locked => true)
|
85
|
+
user.update_attribute(:failed_attempts, User.maximum_attempts + 1)
|
86
|
+
ActionMailer::Base.deliveries.clear
|
87
|
+
|
88
|
+
sign_in_as_user(:password => "invalid")
|
89
|
+
assert_contain 'Invalid email or password.'
|
90
|
+
assert ActionMailer::Base.deliveries.empty?
|
91
|
+
end
|
92
|
+
|
93
|
+
test 'error message is configurable by resource name' do
|
94
|
+
store_translations :en, :devise => {
|
95
|
+
:sessions => { :admin => { :locked => "You are locked!" } }
|
96
|
+
} do
|
97
|
+
get new_admin_session_path(:locked => true)
|
98
|
+
assert_contain 'You are locked!'
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
require "test/test_helper"
|
2
|
+
require "rack/test"
|
3
|
+
|
4
|
+
class RackMiddlewareTest < Test::Unit::TestCase
|
5
|
+
include Rack::Test::Methods
|
6
|
+
|
7
|
+
def app
|
8
|
+
ActionController::Dispatcher.new
|
9
|
+
end
|
10
|
+
|
11
|
+
def warden
|
12
|
+
last_request.env['warden']
|
13
|
+
end
|
14
|
+
|
15
|
+
def with_custom_strategy
|
16
|
+
get '/'
|
17
|
+
|
18
|
+
Warden::Strategies.add(:custom_test) do
|
19
|
+
def valid?
|
20
|
+
true
|
21
|
+
end
|
22
|
+
|
23
|
+
def authenticate!
|
24
|
+
custom! [599, {
|
25
|
+
"X-Custom-Response" => "Custom response test",
|
26
|
+
"Content-type" => "text/plain"
|
27
|
+
}, "Custom response test"]
|
28
|
+
end
|
29
|
+
end
|
30
|
+
|
31
|
+
#ActionController::Dispatcher.middleware.use CustomStrategyInterceptor
|
32
|
+
default_strategies = warden.manager.config.default_strategies
|
33
|
+
warden.manager.config.default_strategies :custom_test
|
34
|
+
yield
|
35
|
+
warden.manager.config.default_strategies default_strategies
|
36
|
+
end
|
37
|
+
|
38
|
+
def test_custom_strategy_response
|
39
|
+
with_custom_strategy do
|
40
|
+
post('/users/sign_in')
|
41
|
+
|
42
|
+
assert_equal 599, last_response.status
|
43
|
+
assert_equal "Custom response test", last_response.body
|
44
|
+
assert_equal "Custom response test", last_response.headers["X-Custom-Response"]
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|
@@ -0,0 +1,141 @@
|
|
1
|
+
require 'test/test_helper'
|
2
|
+
|
3
|
+
class PasswordTest < ActionController::IntegrationTest
|
4
|
+
|
5
|
+
def visit_new_password_path
|
6
|
+
visit new_user_session_path
|
7
|
+
click_link 'Forgot password?'
|
8
|
+
end
|
9
|
+
|
10
|
+
def request_forgot_password(&block)
|
11
|
+
visit_new_password_path
|
12
|
+
|
13
|
+
assert_response :success
|
14
|
+
assert_template 'passwords/new'
|
15
|
+
assert_not warden.authenticated?(:user)
|
16
|
+
|
17
|
+
fill_in 'email', :with => 'user@test.com'
|
18
|
+
yield if block_given?
|
19
|
+
click_button 'Send me reset password instructions'
|
20
|
+
end
|
21
|
+
|
22
|
+
def reset_password(options={}, &block)
|
23
|
+
unless options[:visit] == false
|
24
|
+
visit edit_user_password_path(:reset_password_token => options[:reset_password_token])
|
25
|
+
end
|
26
|
+
assert_response :success
|
27
|
+
assert_template 'passwords/edit'
|
28
|
+
|
29
|
+
fill_in 'Password', :with => '987654321'
|
30
|
+
fill_in 'Password confirmation', :with => '987654321'
|
31
|
+
yield if block_given?
|
32
|
+
click_button 'Change my password'
|
33
|
+
end
|
34
|
+
|
35
|
+
test 'authenticated user should not be able to visit forgot password page' do
|
36
|
+
sign_in_as_user
|
37
|
+
assert warden.authenticated?(:user)
|
38
|
+
|
39
|
+
get new_user_password_path
|
40
|
+
|
41
|
+
assert_response :redirect
|
42
|
+
assert_redirected_to root_path
|
43
|
+
end
|
44
|
+
|
45
|
+
test 'not authenticated user should be able to request a forgot password' do
|
46
|
+
create_user
|
47
|
+
request_forgot_password
|
48
|
+
|
49
|
+
assert_template 'sessions/new'
|
50
|
+
assert_contain 'You will receive an email with instructions about how to reset your password in a few minutes.'
|
51
|
+
end
|
52
|
+
|
53
|
+
test 'not authenticated user with invalid email should receive an error message' do
|
54
|
+
request_forgot_password do
|
55
|
+
fill_in 'email', :with => 'invalid.test@test.com'
|
56
|
+
end
|
57
|
+
|
58
|
+
assert_response :success
|
59
|
+
assert_template 'passwords/new'
|
60
|
+
assert_have_selector 'input[type=text][value=\'invalid.test@test.com\']'
|
61
|
+
assert_contain 'Email not found'
|
62
|
+
end
|
63
|
+
|
64
|
+
test 'authenticated user should not be able to visit edit password page' do
|
65
|
+
sign_in_as_user
|
66
|
+
|
67
|
+
get edit_user_password_path
|
68
|
+
|
69
|
+
assert_response :redirect
|
70
|
+
assert_redirected_to root_path
|
71
|
+
assert warden.authenticated?(:user)
|
72
|
+
end
|
73
|
+
|
74
|
+
test 'not authenticated user with invalid reset password token should not be able to change his password' do
|
75
|
+
user = create_user
|
76
|
+
reset_password :reset_password_token => 'invalid_reset_password'
|
77
|
+
|
78
|
+
assert_response :success
|
79
|
+
assert_template 'passwords/edit'
|
80
|
+
assert_have_selector '#errorExplanation'
|
81
|
+
assert_contain /Reset password token(.*)invalid/
|
82
|
+
assert_not user.reload.valid_password?('987654321')
|
83
|
+
end
|
84
|
+
|
85
|
+
test 'not authenticated user with valid reset password token but invalid password should not be able to change his password' do
|
86
|
+
user = create_user
|
87
|
+
request_forgot_password
|
88
|
+
reset_password :reset_password_token => user.reload.reset_password_token do
|
89
|
+
fill_in 'Password confirmation', :with => 'other_password'
|
90
|
+
end
|
91
|
+
|
92
|
+
assert_response :success
|
93
|
+
assert_template 'passwords/edit'
|
94
|
+
assert_have_selector '#errorExplanation'
|
95
|
+
assert_contain 'Password doesn\'t match confirmation'
|
96
|
+
assert_not user.reload.valid_password?('987654321')
|
97
|
+
end
|
98
|
+
|
99
|
+
test 'not authenticated user with valid data should be able to change his password' do
|
100
|
+
user = create_user
|
101
|
+
request_forgot_password
|
102
|
+
reset_password :reset_password_token => user.reload.reset_password_token
|
103
|
+
|
104
|
+
assert_template 'home/index'
|
105
|
+
assert_contain 'Your password was changed successfully.'
|
106
|
+
assert user.reload.valid_password?('987654321')
|
107
|
+
end
|
108
|
+
|
109
|
+
test 'after entering invalid data user should still be able to change his password' do
|
110
|
+
user = create_user
|
111
|
+
request_forgot_password
|
112
|
+
reset_password :reset_password_token => user.reload.reset_password_token do
|
113
|
+
fill_in 'Password confirmation', :with => 'other_password'
|
114
|
+
end
|
115
|
+
assert_response :success
|
116
|
+
assert_have_selector '#errorExplanation'
|
117
|
+
assert_not user.reload.valid_password?('987654321')
|
118
|
+
|
119
|
+
reset_password :reset_password_token => user.reload.reset_password_token, :visit => false
|
120
|
+
assert_contain 'Your password was changed successfully.'
|
121
|
+
assert user.reload.valid_password?('987654321')
|
122
|
+
end
|
123
|
+
|
124
|
+
test 'sign in user automatically after changing it\'s password' do
|
125
|
+
user = create_user
|
126
|
+
request_forgot_password
|
127
|
+
reset_password :reset_password_token => user.reload.reset_password_token
|
128
|
+
|
129
|
+
assert warden.authenticated?(:user)
|
130
|
+
end
|
131
|
+
|
132
|
+
test 'does not sign in user automatically after changing it\'s password if it\'s not active' do
|
133
|
+
user = create_user(:confirm => false)
|
134
|
+
request_forgot_password
|
135
|
+
reset_password :reset_password_token => user.reload.reset_password_token
|
136
|
+
|
137
|
+
assert_redirected_to new_user_session_path(:unconfirmed => true)
|
138
|
+
assert !warden.authenticated?(:user)
|
139
|
+
end
|
140
|
+
|
141
|
+
end
|
@@ -0,0 +1,144 @@
|
|
1
|
+
require 'test/test_helper'
|
2
|
+
|
3
|
+
class RegistrationTest < ActionController::IntegrationTest
|
4
|
+
|
5
|
+
test 'a guest admin should be able to sign in successfully' do
|
6
|
+
visit new_admin_session_path
|
7
|
+
click_link 'Sign up'
|
8
|
+
|
9
|
+
assert_template 'registrations/new'
|
10
|
+
|
11
|
+
fill_in 'email', :with => 'new_user@test.com'
|
12
|
+
fill_in 'password', :with => 'new_user123'
|
13
|
+
fill_in 'password confirmation', :with => 'new_user123'
|
14
|
+
click_button 'Sign up'
|
15
|
+
|
16
|
+
assert_contain 'You have signed up successfully.'
|
17
|
+
assert warden.authenticated?(:admin)
|
18
|
+
|
19
|
+
admin = Admin.last
|
20
|
+
assert_equal admin.email, 'new_user@test.com'
|
21
|
+
end
|
22
|
+
|
23
|
+
test 'a guest user should be able to sign up successfully and be blocked by confirmation' do
|
24
|
+
visit new_user_registration_path
|
25
|
+
|
26
|
+
fill_in 'email', :with => 'new_user@test.com'
|
27
|
+
fill_in 'password', :with => 'new_user123'
|
28
|
+
fill_in 'password confirmation', :with => 'new_user123'
|
29
|
+
click_button 'Sign up'
|
30
|
+
|
31
|
+
assert_equal "You have signed up successfully. If enabled, a confirmation was sent to your e-mail.", @controller.send(:flash)[:notice]
|
32
|
+
|
33
|
+
# For some reason flash is not being set correctly, so instead of getting the
|
34
|
+
# "signed_up" message we get the unconfirmed one. Seems to be an issue with
|
35
|
+
# the internal redirect by the hook and the tests.
|
36
|
+
# follow_redirect!
|
37
|
+
# assert_contain 'You have signed up successfully.'
|
38
|
+
# assert_not_contain 'confirm your account'
|
39
|
+
|
40
|
+
follow_redirect!
|
41
|
+
assert_contain 'Sign in'
|
42
|
+
assert_not warden.authenticated?(:user)
|
43
|
+
|
44
|
+
user = User.last
|
45
|
+
assert_equal user.email, 'new_user@test.com'
|
46
|
+
assert_not user.confirmed?
|
47
|
+
end
|
48
|
+
|
49
|
+
test 'a guest user cannot sign up with invalid information' do
|
50
|
+
visit new_user_registration_path
|
51
|
+
|
52
|
+
fill_in 'email', :with => 'invalid_email'
|
53
|
+
fill_in 'password', :with => 'new_user123'
|
54
|
+
fill_in 'password confirmation', :with => 'new_user321'
|
55
|
+
click_button 'Sign up'
|
56
|
+
|
57
|
+
assert_template 'registrations/new'
|
58
|
+
assert_have_selector '#errorExplanation'
|
59
|
+
assert_contain "Email is invalid"
|
60
|
+
assert_contain "Password doesn't match confirmation"
|
61
|
+
assert_nil User.first
|
62
|
+
|
63
|
+
assert_not warden.authenticated?(:user)
|
64
|
+
end
|
65
|
+
|
66
|
+
test 'a guest should not sign up with email/password that already exists' do
|
67
|
+
user = create_user
|
68
|
+
visit new_user_registration_path
|
69
|
+
|
70
|
+
fill_in 'email', :with => 'user@test.com'
|
71
|
+
fill_in 'password', :with => '123456'
|
72
|
+
fill_in 'password confirmation', :with => '123456'
|
73
|
+
click_button 'Sign up'
|
74
|
+
|
75
|
+
assert_template 'registrations/new'
|
76
|
+
assert_contain 'Email has already been taken'
|
77
|
+
|
78
|
+
assert_not warden.authenticated?(:user)
|
79
|
+
end
|
80
|
+
|
81
|
+
test 'a guest should not be able to change account' do
|
82
|
+
visit edit_user_registration_path
|
83
|
+
follow_redirect!
|
84
|
+
assert_template 'sessions/new'
|
85
|
+
end
|
86
|
+
|
87
|
+
test 'a signed in user should not be able to access sign up' do
|
88
|
+
sign_in_as_user
|
89
|
+
visit new_user_registration_path
|
90
|
+
assert_template 'home/index'
|
91
|
+
end
|
92
|
+
|
93
|
+
test 'a signed in user should be able to edit his account' do
|
94
|
+
sign_in_as_user
|
95
|
+
visit edit_user_registration_path
|
96
|
+
|
97
|
+
fill_in 'email', :with => 'user.new@email.com'
|
98
|
+
fill_in 'current password', :with => '123456'
|
99
|
+
click_button 'Update'
|
100
|
+
|
101
|
+
assert_template 'home/index'
|
102
|
+
assert_contain 'You updated your account successfully.'
|
103
|
+
|
104
|
+
assert_equal "user.new@email.com", User.first.email
|
105
|
+
end
|
106
|
+
|
107
|
+
test 'a signed in user should be able to edit his password' do
|
108
|
+
sign_in_as_user
|
109
|
+
visit edit_user_registration_path
|
110
|
+
|
111
|
+
fill_in 'password', :with => 'pas123'
|
112
|
+
fill_in 'password confirmation', :with => 'pas123'
|
113
|
+
fill_in 'current password', :with => '123456'
|
114
|
+
click_button 'Update'
|
115
|
+
|
116
|
+
assert_template 'home/index'
|
117
|
+
assert_contain 'You updated your account successfully.'
|
118
|
+
|
119
|
+
assert User.first.valid_password?('pas123')
|
120
|
+
end
|
121
|
+
|
122
|
+
test 'a signed in user should not be able to edit his password with invalid confirmation' do
|
123
|
+
sign_in_as_user
|
124
|
+
get edit_user_registration_path
|
125
|
+
|
126
|
+
fill_in 'password', :with => 'pas123'
|
127
|
+
fill_in 'password confirmation', :with => ''
|
128
|
+
fill_in 'current password', :with => '123456'
|
129
|
+
click_button 'Update'
|
130
|
+
|
131
|
+
assert_contain "Password doesn't match confirmation"
|
132
|
+
assert_not User.first.valid_password?('pas123')
|
133
|
+
end
|
134
|
+
|
135
|
+
test 'a signed in user should be able to cancel his account' do
|
136
|
+
sign_in_as_user
|
137
|
+
visit edit_user_registration_path
|
138
|
+
|
139
|
+
click_link "Cancel my account"
|
140
|
+
assert_contain "Bye! Your account was successfully cancelled. We hope to see you again soon."
|
141
|
+
|
142
|
+
assert User.all.empty?
|
143
|
+
end
|
144
|
+
end
|
@@ -0,0 +1,71 @@
|
|
1
|
+
require 'test/test_helper'
|
2
|
+
|
3
|
+
class RememberMeTest < ActionController::IntegrationTest
|
4
|
+
|
5
|
+
def create_user_and_remember(add_to_token='')
|
6
|
+
Devise.remember_for = 1
|
7
|
+
user = create_user
|
8
|
+
user.remember_me!
|
9
|
+
cookies['remember_user_token'] = User.serialize_into_cookie(user) + add_to_token
|
10
|
+
user
|
11
|
+
end
|
12
|
+
|
13
|
+
test 'do not remember the user if he has not checked remember me option' do
|
14
|
+
user = sign_in_as_user
|
15
|
+
assert_nil user.reload.remember_token
|
16
|
+
end
|
17
|
+
|
18
|
+
test 'generate remember token after sign in' do
|
19
|
+
user = sign_in_as_user :remember_me => true
|
20
|
+
assert_not_nil user.reload.remember_token
|
21
|
+
end
|
22
|
+
|
23
|
+
test 'remember the user before sign in' do
|
24
|
+
user = create_user_and_remember
|
25
|
+
get users_path
|
26
|
+
assert_response :success
|
27
|
+
assert warden.authenticated?(:user)
|
28
|
+
assert warden.user(:user) == user
|
29
|
+
end
|
30
|
+
|
31
|
+
test 'does not remember other scopes' do
|
32
|
+
user = create_user_and_remember
|
33
|
+
get root_path
|
34
|
+
assert_response :success
|
35
|
+
assert warden.authenticated?(:user)
|
36
|
+
assert_not warden.authenticated?(:admin)
|
37
|
+
end
|
38
|
+
|
39
|
+
test 'do not remember with invalid token' do
|
40
|
+
user = create_user_and_remember('add')
|
41
|
+
get users_path
|
42
|
+
assert_response :success
|
43
|
+
assert_not warden.authenticated?(:user)
|
44
|
+
end
|
45
|
+
|
46
|
+
test 'do not remember with token expired' do
|
47
|
+
user = create_user_and_remember
|
48
|
+
Devise.remember_for = 0
|
49
|
+
get users_path
|
50
|
+
assert_response :success
|
51
|
+
assert_not warden.authenticated?(:user)
|
52
|
+
end
|
53
|
+
|
54
|
+
test 'forget the user before sign out' do
|
55
|
+
user = create_user_and_remember
|
56
|
+
get users_path
|
57
|
+
assert warden.authenticated?(:user)
|
58
|
+
get destroy_user_session_path
|
59
|
+
assert_not warden.authenticated?(:user)
|
60
|
+
assert_nil user.reload.remember_token
|
61
|
+
end
|
62
|
+
|
63
|
+
test 'do not remember the user anymore after forget' do
|
64
|
+
user = create_user_and_remember
|
65
|
+
get users_path
|
66
|
+
assert warden.authenticated?(:user)
|
67
|
+
get destroy_user_session_path
|
68
|
+
get users_path
|
69
|
+
assert_not warden.authenticated?(:user)
|
70
|
+
end
|
71
|
+
end
|