devise-jdguyot 1.2.rc
Sign up to get free protection for your applications and to get access to all the features.
- data/.gitignore +10 -0
- data/CHANGELOG.rdoc +532 -0
- data/Gemfile +29 -0
- data/Gemfile.lock +152 -0
- data/MIT-LICENSE +20 -0
- data/README.rdoc +353 -0
- data/Rakefile +36 -0
- data/TODO +4 -0
- data/app/controllers/devise/confirmations_controller.rb +33 -0
- data/app/controllers/devise/omniauth_callbacks_controller.rb +26 -0
- data/app/controllers/devise/passwords_controller.rb +41 -0
- data/app/controllers/devise/registrations_controller.rb +110 -0
- data/app/controllers/devise/sessions_controller.rb +25 -0
- data/app/controllers/devise/unlocks_controller.rb +34 -0
- data/app/helpers/devise_helper.rb +19 -0
- data/app/mailers/devise/mailer.rb +88 -0
- data/app/views/devise/confirmations/new.html.erb +12 -0
- data/app/views/devise/mailer/confirmation_instructions.html.erb +5 -0
- data/app/views/devise/mailer/reset_password_instructions.html.erb +8 -0
- data/app/views/devise/mailer/unlock_instructions.html.erb +7 -0
- data/app/views/devise/passwords/edit.html.erb +16 -0
- data/app/views/devise/passwords/new.html.erb +12 -0
- data/app/views/devise/registrations/edit.html.erb +25 -0
- data/app/views/devise/registrations/new.html.erb +18 -0
- data/app/views/devise/sessions/new.html.erb +17 -0
- data/app/views/devise/shared/_links.erb +25 -0
- data/app/views/devise/unlocks/new.html.erb +12 -0
- data/config/locales/en.yml +46 -0
- data/devise.gemspec +25 -0
- data/lib/devise/controllers/helpers.rb +227 -0
- data/lib/devise/controllers/internal_helpers.rb +119 -0
- data/lib/devise/controllers/scoped_views.rb +33 -0
- data/lib/devise/controllers/url_helpers.rb +39 -0
- data/lib/devise/encryptors/authlogic_sha512.rb +19 -0
- data/lib/devise/encryptors/base.rb +20 -0
- data/lib/devise/encryptors/clearance_sha1.rb +17 -0
- data/lib/devise/encryptors/restful_authentication_sha1.rb +22 -0
- data/lib/devise/encryptors/sha1.rb +25 -0
- data/lib/devise/encryptors/sha512.rb +25 -0
- data/lib/devise/failure_app.rb +132 -0
- data/lib/devise/hooks/activatable.rb +11 -0
- data/lib/devise/hooks/forgetable.rb +12 -0
- data/lib/devise/hooks/rememberable.rb +48 -0
- data/lib/devise/hooks/timeoutable.rb +22 -0
- data/lib/devise/hooks/trackable.rb +9 -0
- data/lib/devise/mapping.rb +110 -0
- data/lib/devise/models/authenticatable.rb +146 -0
- data/lib/devise/models/confirmable.rb +160 -0
- data/lib/devise/models/database_authenticatable.rb +100 -0
- data/lib/devise/models/encryptable.rb +72 -0
- data/lib/devise/models/lockable.rb +169 -0
- data/lib/devise/models/omniauthable.rb +23 -0
- data/lib/devise/models/recoverable.rb +123 -0
- data/lib/devise/models/registerable.rb +21 -0
- data/lib/devise/models/rememberable.rb +130 -0
- data/lib/devise/models/timeoutable.rb +43 -0
- data/lib/devise/models/token_authenticatable.rb +72 -0
- data/lib/devise/models/trackable.rb +30 -0
- data/lib/devise/models/validatable.rb +65 -0
- data/lib/devise/models.rb +68 -0
- data/lib/devise/modules.rb +30 -0
- data/lib/devise/omniauth/config.rb +30 -0
- data/lib/devise/omniauth/test_helpers.rb +57 -0
- data/lib/devise/omniauth/url_helpers.rb +29 -0
- data/lib/devise/omniauth.rb +47 -0
- data/lib/devise/orm/active_record.rb +38 -0
- data/lib/devise/orm/mongoid.rb +31 -0
- data/lib/devise/path_checker.rb +18 -0
- data/lib/devise/rails/routes.rb +292 -0
- data/lib/devise/rails/warden_compat.rb +125 -0
- data/lib/devise/rails.rb +50 -0
- data/lib/devise/schema.rb +97 -0
- data/lib/devise/strategies/authenticatable.rb +150 -0
- data/lib/devise/strategies/base.rb +15 -0
- data/lib/devise/strategies/database_authenticatable.rb +21 -0
- data/lib/devise/strategies/rememberable.rb +51 -0
- data/lib/devise/strategies/token_authenticatable.rb +53 -0
- data/lib/devise/test_helpers.rb +100 -0
- data/lib/devise/version.rb +3 -0
- data/lib/devise.rb +381 -0
- data/lib/generators/active_record/devise_generator.rb +28 -0
- data/lib/generators/active_record/templates/migration.rb +31 -0
- data/lib/generators/devise/devise_generator.rb +17 -0
- data/lib/generators/devise/install_generator.rb +24 -0
- data/lib/generators/devise/orm_helpers.rb +23 -0
- data/lib/generators/devise/views_generator.rb +106 -0
- data/lib/generators/mongoid/devise_generator.rb +17 -0
- data/lib/generators/templates/README +25 -0
- data/lib/generators/templates/devise.rb +186 -0
- data/test/controllers/helpers_test.rb +237 -0
- data/test/controllers/internal_helpers_test.rb +72 -0
- data/test/controllers/url_helpers_test.rb +59 -0
- data/test/devise_test.rb +65 -0
- data/test/encryptors_test.rb +30 -0
- data/test/failure_app_test.rb +187 -0
- data/test/generators/active_record_generator_test.rb +24 -0
- data/test/generators/install_generator_test.rb +13 -0
- data/test/generators/mongoid_generator_test.rb +22 -0
- data/test/generators/views_generator_test.rb +35 -0
- data/test/indifferent_hash.rb +33 -0
- data/test/integration/authenticatable_test.rb +447 -0
- data/test/integration/confirmable_test.rb +104 -0
- data/test/integration/database_authenticatable_test.rb +60 -0
- data/test/integration/http_authenticatable_test.rb +74 -0
- data/test/integration/lockable_test.rb +109 -0
- data/test/integration/omniauthable_test.rb +107 -0
- data/test/integration/recoverable_test.rb +160 -0
- data/test/integration/registerable_test.rb +179 -0
- data/test/integration/rememberable_test.rb +180 -0
- data/test/integration/timeoutable_test.rb +89 -0
- data/test/integration/token_authenticatable_test.rb +99 -0
- data/test/integration/trackable_test.rb +64 -0
- data/test/mailers/confirmation_instructions_test.rb +84 -0
- data/test/mailers/reset_password_instructions_test.rb +72 -0
- data/test/mailers/unlock_instructions_test.rb +66 -0
- data/test/mapping_test.rb +119 -0
- data/test/models/confirmable_test.rb +221 -0
- data/test/models/database_authenticatable_test.rb +98 -0
- data/test/models/encryptable_test.rb +65 -0
- data/test/models/lockable_test.rb +204 -0
- data/test/models/recoverable_test.rb +190 -0
- data/test/models/rememberable_test.rb +279 -0
- data/test/models/timeoutable_test.rb +28 -0
- data/test/models/token_authenticatable_test.rb +37 -0
- data/test/models/trackable_test.rb +5 -0
- data/test/models/validatable_test.rb +99 -0
- data/test/models_test.rb +84 -0
- data/test/omniauth/url_helpers_test.rb +47 -0
- data/test/orm/active_record.rb +9 -0
- data/test/orm/mongoid.rb +11 -0
- data/test/rails_app/Rakefile +10 -0
- data/test/rails_app/app/active_record/admin.rb +6 -0
- data/test/rails_app/app/active_record/shim.rb +2 -0
- data/test/rails_app/app/active_record/user.rb +8 -0
- data/test/rails_app/app/controllers/admins/sessions_controller.rb +6 -0
- data/test/rails_app/app/controllers/admins_controller.rb +6 -0
- data/test/rails_app/app/controllers/application_controller.rb +8 -0
- data/test/rails_app/app/controllers/home_controller.rb +16 -0
- data/test/rails_app/app/controllers/publisher/registrations_controller.rb +2 -0
- data/test/rails_app/app/controllers/publisher/sessions_controller.rb +2 -0
- data/test/rails_app/app/controllers/users/omniauth_callbacks_controller.rb +7 -0
- data/test/rails_app/app/controllers/users_controller.rb +18 -0
- data/test/rails_app/app/helpers/application_helper.rb +3 -0
- data/test/rails_app/app/mongoid/admin.rb +9 -0
- data/test/rails_app/app/mongoid/shim.rb +29 -0
- data/test/rails_app/app/mongoid/user.rb +10 -0
- data/test/rails_app/app/views/admins/index.html.erb +1 -0
- data/test/rails_app/app/views/admins/sessions/new.html.erb +2 -0
- data/test/rails_app/app/views/home/index.html.erb +1 -0
- data/test/rails_app/app/views/home/private.html.erb +1 -0
- data/test/rails_app/app/views/layouts/application.html.erb +24 -0
- data/test/rails_app/app/views/users/index.html.erb +1 -0
- data/test/rails_app/app/views/users/mailer/confirmation_instructions.erb +1 -0
- data/test/rails_app/app/views/users/sessions/new.html.erb +1 -0
- data/test/rails_app/config/application.rb +40 -0
- data/test/rails_app/config/boot.rb +13 -0
- data/test/rails_app/config/database.yml +18 -0
- data/test/rails_app/config/environment.rb +5 -0
- data/test/rails_app/config/environments/development.rb +19 -0
- data/test/rails_app/config/environments/production.rb +33 -0
- data/test/rails_app/config/environments/test.rb +33 -0
- data/test/rails_app/config/initializers/backtrace_silencers.rb +7 -0
- data/test/rails_app/config/initializers/devise.rb +176 -0
- data/test/rails_app/config/initializers/inflections.rb +2 -0
- data/test/rails_app/config/initializers/secret_token.rb +2 -0
- data/test/rails_app/config/routes.rb +55 -0
- data/test/rails_app/config.ru +4 -0
- data/test/rails_app/db/migrate/20100401102949_create_tables.rb +31 -0
- data/test/rails_app/db/schema.rb +52 -0
- data/test/rails_app/lib/shared_admin.rb +9 -0
- data/test/rails_app/lib/shared_user.rb +23 -0
- data/test/rails_app/public/404.html +26 -0
- data/test/rails_app/public/422.html +26 -0
- data/test/rails_app/public/500.html +26 -0
- data/test/rails_app/public/favicon.ico +0 -0
- data/test/rails_app/script/rails +10 -0
- data/test/routes_test.rb +179 -0
- data/test/support/assertions.rb +24 -0
- data/test/support/helpers.rb +60 -0
- data/test/support/integration.rb +88 -0
- data/test/support/locale/en.yml +4 -0
- data/test/support/webrat/integrations/rails.rb +24 -0
- data/test/test_helper.rb +29 -0
- data/test/test_helpers_test.rb +118 -0
- metadata +388 -0
@@ -0,0 +1,190 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class RecoverableTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
def setup
|
6
|
+
setup_mailer
|
7
|
+
end
|
8
|
+
|
9
|
+
test 'should not generate reset password token after creating a record' do
|
10
|
+
assert_nil new_user.reset_password_token
|
11
|
+
end
|
12
|
+
|
13
|
+
test 'should never generate the same reset password token for different users' do
|
14
|
+
reset_password_tokens = []
|
15
|
+
3.times do
|
16
|
+
user = create_user
|
17
|
+
user.send_reset_password_instructions
|
18
|
+
token = user.reset_password_token
|
19
|
+
assert !reset_password_tokens.include?(token)
|
20
|
+
reset_password_tokens << token
|
21
|
+
end
|
22
|
+
end
|
23
|
+
|
24
|
+
test 'should reset password and password confirmation from params' do
|
25
|
+
user = create_user
|
26
|
+
user.reset_password!('123456789', '987654321')
|
27
|
+
assert_equal '123456789', user.password
|
28
|
+
assert_equal '987654321', user.password_confirmation
|
29
|
+
end
|
30
|
+
|
31
|
+
test 'should reset password and save the record' do
|
32
|
+
assert create_user.reset_password!('123456789', '123456789')
|
33
|
+
end
|
34
|
+
|
35
|
+
test 'should clear reset password token while reseting the password' do
|
36
|
+
user = create_user
|
37
|
+
assert_nil user.reset_password_token
|
38
|
+
|
39
|
+
user.send_reset_password_instructions
|
40
|
+
assert_present user.reset_password_token
|
41
|
+
assert user.reset_password!('123456789', '123456789')
|
42
|
+
assert_nil user.reset_password_token
|
43
|
+
end
|
44
|
+
|
45
|
+
test 'should not clear reset password token if record is invalid' do
|
46
|
+
user = create_user
|
47
|
+
user.send_reset_password_instructions
|
48
|
+
assert_present user.reset_password_token
|
49
|
+
assert_not user.reset_password!('123456789', '987654321')
|
50
|
+
assert_present user.reset_password_token
|
51
|
+
end
|
52
|
+
|
53
|
+
test 'should not reset password with invalid data' do
|
54
|
+
user = create_user
|
55
|
+
user.stubs(:valid?).returns(false)
|
56
|
+
assert_not user.reset_password!('123456789', '987654321')
|
57
|
+
end
|
58
|
+
|
59
|
+
test 'should reset reset password token and send instructions by email' do
|
60
|
+
user = create_user
|
61
|
+
assert_email_sent do
|
62
|
+
token = user.reset_password_token
|
63
|
+
user.send_reset_password_instructions
|
64
|
+
assert_not_equal token, user.reset_password_token
|
65
|
+
end
|
66
|
+
end
|
67
|
+
|
68
|
+
test 'should find a user to send instructions by email' do
|
69
|
+
user = create_user
|
70
|
+
reset_password_user = User.send_reset_password_instructions(:email => user.email)
|
71
|
+
assert_equal reset_password_user, user
|
72
|
+
end
|
73
|
+
|
74
|
+
test 'should return a new record with errors if user was not found by e-mail' do
|
75
|
+
reset_password_user = User.send_reset_password_instructions(:email => "invalid@email.com")
|
76
|
+
assert_not reset_password_user.persisted?
|
77
|
+
assert_equal "not found", reset_password_user.errors[:email].join
|
78
|
+
end
|
79
|
+
|
80
|
+
test 'should find a user to send instructions by authentication_keys' do
|
81
|
+
swap Devise, :authentication_keys => [:username, :email] do
|
82
|
+
user = create_user
|
83
|
+
reset_password_user = User.send_reset_password_instructions(:email => user.email, :username => user.username)
|
84
|
+
assert_equal reset_password_user, user
|
85
|
+
end
|
86
|
+
end
|
87
|
+
|
88
|
+
test 'should require all reset_password_keys' do
|
89
|
+
swap Devise, :reset_password_keys => [:username, :email] do
|
90
|
+
user = create_user
|
91
|
+
reset_password_user = User.send_reset_password_instructions(:email => user.email)
|
92
|
+
assert_not reset_password_user.persisted?
|
93
|
+
assert_equal "can't be blank", reset_password_user.errors[:username].join
|
94
|
+
end
|
95
|
+
end
|
96
|
+
|
97
|
+
test 'should reset reset_password_token before send the reset instructions email' do
|
98
|
+
user = create_user
|
99
|
+
token = user.reset_password_token
|
100
|
+
reset_password_user = User.send_reset_password_instructions(:email => user.email)
|
101
|
+
assert_not_equal token, user.reload.reset_password_token
|
102
|
+
end
|
103
|
+
|
104
|
+
test 'should send email instructions to the user reset his password' do
|
105
|
+
user = create_user
|
106
|
+
assert_email_sent do
|
107
|
+
User.send_reset_password_instructions(:email => user.email)
|
108
|
+
end
|
109
|
+
end
|
110
|
+
|
111
|
+
test 'should find a user to reset his password based on reset_password_token' do
|
112
|
+
user = create_user
|
113
|
+
user.send :generate_reset_password_token!
|
114
|
+
|
115
|
+
reset_password_user = User.reset_password_by_token(:reset_password_token => user.reset_password_token)
|
116
|
+
assert_equal reset_password_user, user
|
117
|
+
end
|
118
|
+
|
119
|
+
test 'should a new record with errors if no reset_password_token is found' do
|
120
|
+
reset_password_user = User.reset_password_by_token(:reset_password_token => 'invalid_token')
|
121
|
+
assert_not reset_password_user.persisted?
|
122
|
+
assert_equal "is invalid", reset_password_user.errors[:reset_password_token].join
|
123
|
+
end
|
124
|
+
|
125
|
+
test 'should a new record with errors if reset_password_token is blank' do
|
126
|
+
reset_password_user = User.reset_password_by_token(:reset_password_token => '')
|
127
|
+
assert_not reset_password_user.persisted?
|
128
|
+
assert_match "can't be blank", reset_password_user.errors[:reset_password_token].join
|
129
|
+
end
|
130
|
+
|
131
|
+
test 'should reset successfully user password given the new password and confirmation' do
|
132
|
+
user = create_user
|
133
|
+
old_password = user.password
|
134
|
+
user.send :generate_reset_password_token!
|
135
|
+
|
136
|
+
reset_password_user = User.reset_password_by_token(
|
137
|
+
:reset_password_token => user.reset_password_token,
|
138
|
+
:password => 'new_password',
|
139
|
+
:password_confirmation => 'new_password'
|
140
|
+
)
|
141
|
+
user.reload
|
142
|
+
|
143
|
+
assert_not user.valid_password?(old_password)
|
144
|
+
assert user.valid_password?('new_password')
|
145
|
+
end
|
146
|
+
|
147
|
+
test 'should not reset reset password token during reset_password_within time' do
|
148
|
+
swap Devise, :reset_password_within => 1.hour do
|
149
|
+
user = create_user
|
150
|
+
user.send_reset_password_instructions
|
151
|
+
3.times do
|
152
|
+
token = user.reset_password_token
|
153
|
+
user.send_reset_password_instructions
|
154
|
+
assert_equal token, user.reset_password_token
|
155
|
+
end
|
156
|
+
end
|
157
|
+
end
|
158
|
+
|
159
|
+
test 'should reset reset password token after reset_password_within time' do
|
160
|
+
swap Devise, :reset_password_within => 1.hour do
|
161
|
+
user = create_user
|
162
|
+
user.reset_password_sent_at = 2.days.ago
|
163
|
+
token = user.reset_password_token
|
164
|
+
user.send_reset_password_instructions
|
165
|
+
assert_not_equal token, user.reset_password_token
|
166
|
+
end
|
167
|
+
end
|
168
|
+
|
169
|
+
test 'should not reset password after reset_password_within time' do
|
170
|
+
swap Devise, :reset_password_within => 1.hour do
|
171
|
+
user = create_user
|
172
|
+
old_password = user.password
|
173
|
+
user.send :generate_reset_password_token!
|
174
|
+
user.reset_password_sent_at = 2.days.ago
|
175
|
+
user.save!
|
176
|
+
|
177
|
+
reset_password_user = User.reset_password_by_token(
|
178
|
+
:reset_password_token => user.reset_password_token,
|
179
|
+
:password => 'new_password',
|
180
|
+
:password_confirmation => 'new_password'
|
181
|
+
)
|
182
|
+
user.reload
|
183
|
+
|
184
|
+
assert user.valid_password?(old_password)
|
185
|
+
assert_not user.valid_password?('new_password')
|
186
|
+
assert_equal "is invalid", reset_password_user.errors[:reset_password_token].join
|
187
|
+
end
|
188
|
+
end
|
189
|
+
|
190
|
+
end
|
@@ -0,0 +1,279 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SharedRememberableTest
|
4
|
+
extend ActiveSupport::Testing::Declarative
|
5
|
+
|
6
|
+
test 'should respond to remember_me attribute' do
|
7
|
+
assert resource_class.new.respond_to?(:remember_me)
|
8
|
+
assert resource_class.new.respond_to?(:remember_me=)
|
9
|
+
end
|
10
|
+
|
11
|
+
test 'forget_me should clear remember_created_at' do
|
12
|
+
resource = create_resource
|
13
|
+
resource.remember_me!
|
14
|
+
assert_not resource.remember_created_at.nil?
|
15
|
+
resource.forget_me!
|
16
|
+
assert resource.remember_created_at.nil?
|
17
|
+
end
|
18
|
+
|
19
|
+
test 'remember is expired if not created at timestamp is set' do
|
20
|
+
assert create_resource.remember_expired?
|
21
|
+
end
|
22
|
+
|
23
|
+
test 'serialize should return nil if no resource is found' do
|
24
|
+
assert_nil resource_class.serialize_from_cookie([0], "123")
|
25
|
+
end
|
26
|
+
|
27
|
+
test 'remember me return nil if is a valid resource with invalid token' do
|
28
|
+
resource = create_resource
|
29
|
+
assert_nil resource_class.serialize_from_cookie([resource.id], "123")
|
30
|
+
end
|
31
|
+
|
32
|
+
test 'remember for should fallback to devise remember for default configuration' do
|
33
|
+
swap Devise, :remember_for => 1.day do
|
34
|
+
resource = create_resource
|
35
|
+
resource.remember_me!
|
36
|
+
assert_not resource.remember_expired?
|
37
|
+
end
|
38
|
+
end
|
39
|
+
|
40
|
+
test 'remember expires at should sum date of creation with remember for configuration' do
|
41
|
+
swap Devise, :remember_for => 3.days do
|
42
|
+
resource = create_resource
|
43
|
+
resource.remember_me!
|
44
|
+
assert_equal 3.days.from_now.to_date, resource.remember_expires_at.to_date
|
45
|
+
|
46
|
+
Devise.remember_for = 5.days
|
47
|
+
assert_equal 5.days.from_now.to_date, resource.remember_expires_at.to_date
|
48
|
+
end
|
49
|
+
end
|
50
|
+
|
51
|
+
test 'remember should be expired if remember_for is zero' do
|
52
|
+
swap Devise, :remember_for => 0.days do
|
53
|
+
Devise.remember_for = 0.days
|
54
|
+
resource = create_resource
|
55
|
+
resource.remember_me!
|
56
|
+
assert resource.remember_expired?
|
57
|
+
end
|
58
|
+
end
|
59
|
+
|
60
|
+
test 'remember should be expired if it was created before limit time' do
|
61
|
+
swap Devise, :remember_for => 1.day do
|
62
|
+
resource = create_resource
|
63
|
+
resource.remember_me!
|
64
|
+
resource.remember_created_at = 2.days.ago
|
65
|
+
resource.save
|
66
|
+
assert resource.remember_expired?
|
67
|
+
end
|
68
|
+
end
|
69
|
+
|
70
|
+
test 'remember should not be expired if it was created whitin the limit time' do
|
71
|
+
swap Devise, :remember_for => 30.days do
|
72
|
+
resource = create_resource
|
73
|
+
resource.remember_me!
|
74
|
+
resource.remember_created_at = (30.days.ago + 2.minutes)
|
75
|
+
resource.save
|
76
|
+
assert_not resource.remember_expired?
|
77
|
+
end
|
78
|
+
end
|
79
|
+
|
80
|
+
test 'if extend_remember_period is false, remember_me! should generate a new timestamp if expired' do
|
81
|
+
swap Devise, :remember_for => 5.minutes do
|
82
|
+
resource = create_resource
|
83
|
+
resource.remember_me!(false)
|
84
|
+
assert resource.remember_created_at
|
85
|
+
|
86
|
+
resource.remember_created_at = old = 10.minutes.ago
|
87
|
+
resource.save
|
88
|
+
|
89
|
+
resource.remember_me!(false)
|
90
|
+
assert_not_equal old.to_i, resource.remember_created_at.to_i
|
91
|
+
end
|
92
|
+
end
|
93
|
+
|
94
|
+
test 'if extend_remember_period is false, remember_me! should not generate a new timestamp' do
|
95
|
+
swap Devise, :remember_for => 1.year do
|
96
|
+
resource = create_resource
|
97
|
+
resource.remember_me!(false)
|
98
|
+
assert resource.remember_created_at
|
99
|
+
|
100
|
+
resource.remember_created_at = old = 10.minutes.ago.utc
|
101
|
+
resource.save
|
102
|
+
|
103
|
+
resource.remember_me!(false)
|
104
|
+
assert_equal old.to_i, resource.remember_created_at.to_i
|
105
|
+
end
|
106
|
+
end
|
107
|
+
|
108
|
+
test 'if extend_remember_period is true, remember_me! should always generate a new timestamp' do
|
109
|
+
swap Devise, :remember_for => 1.year do
|
110
|
+
resource = create_resource
|
111
|
+
resource.remember_me!(true)
|
112
|
+
assert resource.remember_created_at
|
113
|
+
|
114
|
+
resource.remember_created_at = old = 10.minutes.ago
|
115
|
+
resource.save
|
116
|
+
|
117
|
+
resource.remember_me!(true)
|
118
|
+
assert_not_equal old, resource.remember_created_at
|
119
|
+
end
|
120
|
+
end
|
121
|
+
end
|
122
|
+
|
123
|
+
class RememberableTest < ActiveSupport::TestCase
|
124
|
+
include SharedRememberableTest
|
125
|
+
|
126
|
+
def resource_class
|
127
|
+
Admin
|
128
|
+
end
|
129
|
+
|
130
|
+
def create_resource
|
131
|
+
create_admin
|
132
|
+
end
|
133
|
+
|
134
|
+
test 'remember_me should generate a new token and save the record without validating' do
|
135
|
+
admin = create_admin
|
136
|
+
admin.expects(:valid?).never
|
137
|
+
token = admin.remember_token
|
138
|
+
admin.remember_me!
|
139
|
+
assert_not_equal token, admin.remember_token
|
140
|
+
assert_not admin.changed?
|
141
|
+
end
|
142
|
+
|
143
|
+
test 'forget_me should clear remember token and save the record without validating' do
|
144
|
+
admin = create_admin
|
145
|
+
admin.remember_me!
|
146
|
+
assert_not admin.remember_token.nil?
|
147
|
+
admin.expects(:valid?).never
|
148
|
+
admin.forget_me!
|
149
|
+
assert admin.remember_token.nil?
|
150
|
+
assert_not admin.changed?
|
151
|
+
end
|
152
|
+
|
153
|
+
test 'serialize into cookie' do
|
154
|
+
admin = create_admin
|
155
|
+
admin.remember_me!
|
156
|
+
assert_equal [admin.to_key, admin.remember_token], Admin.serialize_into_cookie(admin)
|
157
|
+
end
|
158
|
+
|
159
|
+
test 'serialize from cookie' do
|
160
|
+
admin = create_admin
|
161
|
+
admin.remember_me!
|
162
|
+
assert_equal admin, Admin.serialize_from_cookie(admin.to_key, admin.remember_token)
|
163
|
+
end
|
164
|
+
|
165
|
+
test 'if remember_across_browsers is true, remember_me! should create a new token if no token exists' do
|
166
|
+
swap Devise, :remember_across_browsers => true, :remember_for => 1.year do
|
167
|
+
admin = create_admin
|
168
|
+
assert_equal nil, admin.remember_token
|
169
|
+
admin.remember_me!
|
170
|
+
assert_not_equal nil, admin.remember_token
|
171
|
+
end
|
172
|
+
end
|
173
|
+
|
174
|
+
test 'if remember_across_browsers is true, remember_me! should create a new token if a token exists but has expired' do
|
175
|
+
swap Devise, :remember_across_browsers => true, :remember_for => 1.day do
|
176
|
+
admin = create_admin
|
177
|
+
admin.remember_me!
|
178
|
+
admin.remember_created_at = 2.days.ago
|
179
|
+
admin.save
|
180
|
+
token = admin.remember_token
|
181
|
+
admin.remember_me!
|
182
|
+
assert_not_equal token, admin.remember_token
|
183
|
+
end
|
184
|
+
end
|
185
|
+
|
186
|
+
test 'if remember_across_browsers is true, remember_me! should not create a new token if a token exists and has not expired' do
|
187
|
+
swap Devise, :remember_across_browsers => true, :remember_for => 2.days do
|
188
|
+
admin = create_admin
|
189
|
+
admin.remember_me!
|
190
|
+
admin.remember_created_at = 1.day.ago
|
191
|
+
admin.save
|
192
|
+
token = admin.remember_token
|
193
|
+
admin.remember_me!
|
194
|
+
assert_equal token, admin.remember_token
|
195
|
+
end
|
196
|
+
end
|
197
|
+
|
198
|
+
test 'if remember_across_browsers is false, remember_me! should create a new token if no token exists' do
|
199
|
+
swap Devise, :remember_across_browsers => false do
|
200
|
+
admin = create_admin
|
201
|
+
assert_equal nil, admin.remember_token
|
202
|
+
admin.remember_me!
|
203
|
+
assert_not_equal nil, admin.remember_token
|
204
|
+
end
|
205
|
+
end
|
206
|
+
|
207
|
+
test 'if remember_across_browsers is false, remember_me! should create a new token if a token exists but has expired' do
|
208
|
+
swap Devise, :remember_across_browsers => false, :remember_for => 1.day do
|
209
|
+
admin = create_admin
|
210
|
+
admin.remember_me!
|
211
|
+
admin.remember_created_at = 2.days.ago
|
212
|
+
admin.save
|
213
|
+
token = admin.remember_token
|
214
|
+
admin.remember_me!
|
215
|
+
assert_not_equal token, admin.remember_token
|
216
|
+
end
|
217
|
+
end
|
218
|
+
|
219
|
+
test 'if remember_across_browsers is false, remember_me! should create a new token if a token exists and has not expired' do
|
220
|
+
swap Devise, :remember_across_browsers => false, :remember_for => 2.days do
|
221
|
+
admin = create_admin
|
222
|
+
admin.remember_me!
|
223
|
+
admin.remember_created_at = 1.day.ago
|
224
|
+
admin.save
|
225
|
+
token = admin.remember_token
|
226
|
+
admin.remember_me!
|
227
|
+
assert_not_equal token, admin.remember_token
|
228
|
+
end
|
229
|
+
end
|
230
|
+
end
|
231
|
+
|
232
|
+
class WithSaltRememberableTest < ActiveSupport::TestCase
|
233
|
+
include SharedRememberableTest
|
234
|
+
|
235
|
+
setup do
|
236
|
+
assert_not User.new.respond_to?(:remember_token)
|
237
|
+
end
|
238
|
+
|
239
|
+
def resource_class
|
240
|
+
User
|
241
|
+
end
|
242
|
+
|
243
|
+
def create_resource
|
244
|
+
create_user
|
245
|
+
end
|
246
|
+
|
247
|
+
test 'remember_me should not generate a new token if using salt' do
|
248
|
+
user = create_user
|
249
|
+
user.expects(:valid?).never
|
250
|
+
user.remember_me!
|
251
|
+
end
|
252
|
+
|
253
|
+
test 'forget_me should not clear remember token if using salt' do
|
254
|
+
user = create_user
|
255
|
+
user.remember_me!
|
256
|
+
user.expects(:valid?).never
|
257
|
+
user.forget_me!
|
258
|
+
end
|
259
|
+
|
260
|
+
test 'serialize into cookie' do
|
261
|
+
user = create_user
|
262
|
+
user.remember_me!
|
263
|
+
assert_equal [user.to_key, user.authenticatable_salt], User.serialize_into_cookie(user)
|
264
|
+
end
|
265
|
+
|
266
|
+
test 'serialize from cookie' do
|
267
|
+
user = create_user
|
268
|
+
user.remember_me!
|
269
|
+
assert_equal user, User.serialize_from_cookie(user.to_key, user.authenticatable_salt)
|
270
|
+
end
|
271
|
+
|
272
|
+
test 'raises a RuntimeError if authenticatable_salt is nil' do
|
273
|
+
user = User.new
|
274
|
+
user.encrypted_password = nil
|
275
|
+
assert_raise RuntimeError do
|
276
|
+
user.rememberable_value
|
277
|
+
end
|
278
|
+
end
|
279
|
+
end
|
@@ -0,0 +1,28 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class TimeoutableTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
test 'should be expired' do
|
6
|
+
assert new_user.timedout?(31.minutes.ago)
|
7
|
+
end
|
8
|
+
|
9
|
+
test 'should not be expired' do
|
10
|
+
assert_not new_user.timedout?(29.minutes.ago)
|
11
|
+
end
|
12
|
+
|
13
|
+
test 'should not be expired when params is nil' do
|
14
|
+
assert_not new_user.timedout?(nil)
|
15
|
+
end
|
16
|
+
|
17
|
+
test 'fallback to Devise config option' do
|
18
|
+
swap Devise, :timeout_in => 1.minute do
|
19
|
+
user = new_user
|
20
|
+
assert user.timedout?(2.minutes.ago)
|
21
|
+
assert_not user.timedout?(30.seconds.ago)
|
22
|
+
|
23
|
+
Devise.timeout_in = 5.minutes
|
24
|
+
assert_not user.timedout?(2.minutes.ago)
|
25
|
+
assert user.timedout?(6.minutes.ago)
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
@@ -0,0 +1,37 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class TokenAuthenticatableTest < ActiveSupport::TestCase
|
4
|
+
|
5
|
+
test 'should reset authentication token' do
|
6
|
+
user = new_user
|
7
|
+
user.reset_authentication_token
|
8
|
+
previous_token = user.authentication_token
|
9
|
+
user.reset_authentication_token
|
10
|
+
assert_not_equal previous_token, user.authentication_token
|
11
|
+
end
|
12
|
+
|
13
|
+
test 'should ensure authentication token' do
|
14
|
+
user = new_user
|
15
|
+
user.ensure_authentication_token
|
16
|
+
previous_token = user.authentication_token
|
17
|
+
user.ensure_authentication_token
|
18
|
+
assert_equal previous_token, user.authentication_token
|
19
|
+
end
|
20
|
+
|
21
|
+
test 'should authenticate a valid user with authentication token and return it' do
|
22
|
+
user = create_user
|
23
|
+
user.ensure_authentication_token!
|
24
|
+
user.confirm!
|
25
|
+
authenticated_user = User.find_for_token_authentication(:auth_token => user.authentication_token)
|
26
|
+
assert_equal authenticated_user, user
|
27
|
+
end
|
28
|
+
|
29
|
+
test 'should return nil when authenticating an invalid user by authentication token' do
|
30
|
+
user = create_user
|
31
|
+
user.ensure_authentication_token!
|
32
|
+
user.confirm!
|
33
|
+
authenticated_user = User.find_for_token_authentication(:auth_token => user.authentication_token.reverse)
|
34
|
+
assert_nil authenticated_user
|
35
|
+
end
|
36
|
+
|
37
|
+
end
|
@@ -0,0 +1,99 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class ValidatableTest < ActiveSupport::TestCase
|
4
|
+
test 'should require email to be set' do
|
5
|
+
user = new_user(:email => nil)
|
6
|
+
assert user.invalid?
|
7
|
+
assert user.errors[:email]
|
8
|
+
assert_equal 'can\'t be blank', user.errors[:email].join
|
9
|
+
end
|
10
|
+
|
11
|
+
test 'should require uniqueness of email, allowing blank' do
|
12
|
+
existing_user = create_user
|
13
|
+
|
14
|
+
user = new_user(:email => '')
|
15
|
+
assert user.invalid?
|
16
|
+
assert_no_match(/taken/, user.errors[:email].join)
|
17
|
+
|
18
|
+
user.email = existing_user.email
|
19
|
+
assert user.invalid?
|
20
|
+
assert_match(/taken/, user.errors[:email].join)
|
21
|
+
end
|
22
|
+
|
23
|
+
test 'should require correct email format, allowing blank' do
|
24
|
+
user = new_user(:email => '')
|
25
|
+
assert user.invalid?
|
26
|
+
assert_not_equal 'is invalid', user.errors[:email].join
|
27
|
+
|
28
|
+
%w(invalid_email_format email@invalid invalid$character@mail.com other@not 123).each do |email|
|
29
|
+
user.email = email
|
30
|
+
assert user.invalid?, 'should be invalid with email ' << email
|
31
|
+
assert_equal 'is invalid', user.errors[:email].join
|
32
|
+
end
|
33
|
+
end
|
34
|
+
|
35
|
+
test 'should accept valid emails' do
|
36
|
+
%w(a.b.c@example.com test_mail@gmail.com any@any.net email@test.br 123@mail.test).each do |email|
|
37
|
+
user = new_user(:email => email)
|
38
|
+
assert user.valid?, 'should be valid with email ' << email
|
39
|
+
assert_blank user.errors[:email]
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
test 'should require password to be set when creating a new record' do
|
44
|
+
user = new_user(:password => '', :password_confirmation => '')
|
45
|
+
assert user.invalid?
|
46
|
+
assert_equal 'can\'t be blank', user.errors[:password].join
|
47
|
+
end
|
48
|
+
|
49
|
+
test 'should require confirmation to be set when creating a new record' do
|
50
|
+
user = new_user(:password => 'new_password', :password_confirmation => 'blabla')
|
51
|
+
assert user.invalid?
|
52
|
+
assert_equal 'doesn\'t match confirmation', user.errors[:password].join
|
53
|
+
end
|
54
|
+
|
55
|
+
test 'should require password when updating/reseting password' do
|
56
|
+
user = create_user
|
57
|
+
|
58
|
+
user.password = ''
|
59
|
+
user.password_confirmation = ''
|
60
|
+
|
61
|
+
assert user.invalid?
|
62
|
+
assert_equal 'can\'t be blank', user.errors[:password].join
|
63
|
+
end
|
64
|
+
|
65
|
+
test 'should require confirmation when updating/reseting password' do
|
66
|
+
user = create_user
|
67
|
+
user.password_confirmation = 'another_password'
|
68
|
+
assert user.invalid?
|
69
|
+
assert_equal 'doesn\'t match confirmation', user.errors[:password].join
|
70
|
+
end
|
71
|
+
|
72
|
+
test 'should require a password with minimum of 6 characters' do
|
73
|
+
user = new_user(:password => '12345', :password_confirmation => '12345')
|
74
|
+
assert user.invalid?
|
75
|
+
assert_equal 'is too short (minimum is 6 characters)', user.errors[:password].join
|
76
|
+
end
|
77
|
+
|
78
|
+
test 'should require a password with maximum of 20 characters long' do
|
79
|
+
user = new_user(:password => 'x'*21, :password_confirmation => 'x'*21)
|
80
|
+
assert user.invalid?
|
81
|
+
assert_equal 'is too long (maximum is 20 characters)', user.errors[:password].join
|
82
|
+
end
|
83
|
+
|
84
|
+
test 'should not require password length when it\'s not changed' do
|
85
|
+
user = create_user.reload
|
86
|
+
user.password = user.password_confirmation = nil
|
87
|
+
assert user.valid?
|
88
|
+
|
89
|
+
user.password_confirmation = 'confirmation'
|
90
|
+
assert user.invalid?
|
91
|
+
assert_not (user.errors[:password].join =~ /is too long/)
|
92
|
+
end
|
93
|
+
|
94
|
+
test 'shuold not be included in objects with invalid API' do
|
95
|
+
assert_raise RuntimeError do
|
96
|
+
Class.new.send :include, Devise::Models::Validatable
|
97
|
+
end
|
98
|
+
end
|
99
|
+
end
|