devise_token_auth 1.0.0 → 1.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +5 -5
- data/README.md +4 -2
- data/app/controllers/devise_token_auth/application_controller.rb +19 -3
- data/app/controllers/devise_token_auth/concerns/resource_finder.rb +23 -11
- data/app/controllers/devise_token_auth/concerns/set_user_by_token.rb +78 -57
- data/app/controllers/devise_token_auth/confirmations_controller.rb +67 -20
- data/app/controllers/devise_token_auth/omniauth_callbacks_controller.rb +82 -30
- data/app/controllers/devise_token_auth/passwords_controller.rb +53 -31
- data/app/controllers/devise_token_auth/registrations_controller.rb +33 -40
- data/app/controllers/devise_token_auth/sessions_controller.rb +24 -6
- data/app/controllers/devise_token_auth/unlocks_controller.rb +10 -6
- data/app/models/devise_token_auth/concerns/active_record_support.rb +14 -0
- data/app/models/devise_token_auth/concerns/confirmable_support.rb +28 -0
- data/app/models/devise_token_auth/concerns/mongoid_support.rb +19 -0
- data/app/models/devise_token_auth/concerns/tokens_serialization.rb +31 -0
- data/app/models/devise_token_auth/concerns/user.rb +77 -80
- data/app/models/devise_token_auth/concerns/user_omniauth_callbacks.rb +12 -5
- data/app/validators/{email_validator.rb → devise_token_auth_email_validator.rb} +11 -3
- data/app/views/devise_token_auth/omniauth_external_window.html.erb +1 -1
- data/config/locales/da-DK.yml +2 -0
- data/config/locales/de.yml +2 -0
- data/config/locales/en.yml +10 -0
- data/config/locales/es.yml +2 -0
- data/config/locales/fr.yml +2 -0
- data/config/locales/he.yml +52 -0
- data/config/locales/it.yml +2 -0
- data/config/locales/ja.yml +16 -2
- data/config/locales/ko.yml +51 -0
- data/config/locales/nl.yml +2 -0
- data/config/locales/pl.yml +6 -3
- data/config/locales/pt-BR.yml +2 -0
- data/config/locales/pt.yml +6 -3
- data/config/locales/ro.yml +2 -0
- data/config/locales/ru.yml +2 -0
- data/config/locales/sq.yml +2 -0
- data/config/locales/sv.yml +2 -0
- data/config/locales/uk.yml +2 -0
- data/config/locales/vi.yml +2 -0
- data/config/locales/zh-CN.yml +2 -0
- data/config/locales/zh-HK.yml +2 -0
- data/config/locales/zh-TW.yml +2 -0
- data/lib/devise_token_auth/blacklist.rb +6 -0
- data/lib/devise_token_auth/controllers/helpers.rb +5 -9
- data/lib/devise_token_auth/engine.rb +17 -2
- data/lib/devise_token_auth/rails/routes.rb +18 -13
- data/lib/devise_token_auth/token_factory.rb +126 -0
- data/lib/devise_token_auth/url.rb +3 -0
- data/lib/devise_token_auth/version.rb +1 -1
- data/lib/devise_token_auth.rb +6 -3
- data/lib/generators/devise_token_auth/USAGE +1 -1
- data/lib/generators/devise_token_auth/install_generator.rb +7 -91
- data/lib/generators/devise_token_auth/install_generator_helpers.rb +98 -0
- data/lib/generators/devise_token_auth/install_mongoid_generator.rb +46 -0
- data/lib/generators/devise_token_auth/templates/devise_token_auth.rb +13 -0
- data/lib/generators/devise_token_auth/templates/devise_token_auth_create_users.rb.erb +1 -8
- data/lib/generators/devise_token_auth/templates/user.rb.erb +2 -2
- data/lib/generators/devise_token_auth/templates/user_mongoid.rb.erb +56 -0
- data/test/controllers/custom/custom_confirmations_controller_test.rb +1 -1
- data/test/controllers/demo_mang_controller_test.rb +37 -8
- data/test/controllers/demo_user_controller_test.rb +39 -10
- data/test/controllers/devise_token_auth/confirmations_controller_test.rb +163 -18
- data/test/controllers/devise_token_auth/omniauth_callbacks_controller_test.rb +110 -43
- data/test/controllers/devise_token_auth/passwords_controller_test.rb +299 -122
- data/test/controllers/devise_token_auth/registrations_controller_test.rb +54 -14
- data/test/controllers/devise_token_auth/sessions_controller_test.rb +31 -40
- data/test/controllers/devise_token_auth/token_validations_controller_test.rb +43 -2
- data/test/controllers/devise_token_auth/unlocks_controller_test.rb +44 -5
- data/test/controllers/overrides/confirmations_controller_test.rb +1 -1
- data/test/dummy/app/active_record/confirmable_user.rb +11 -0
- data/test/dummy/app/{models → active_record}/scoped_user.rb +2 -2
- data/test/dummy/app/{models → active_record}/unconfirmable_user.rb +1 -2
- data/test/dummy/app/{models → active_record}/unregisterable_user.rb +3 -3
- data/test/dummy/app/active_record/user.rb +6 -0
- data/test/dummy/app/controllers/overrides/confirmations_controller.rb +3 -3
- data/test/dummy/app/controllers/overrides/passwords_controller.rb +3 -3
- data/test/dummy/app/controllers/overrides/registrations_controller.rb +1 -1
- data/test/dummy/app/controllers/overrides/sessions_controller.rb +2 -2
- data/test/dummy/app/models/{user.rb → concerns/favorite_color.rb} +7 -8
- data/test/dummy/app/mongoid/confirmable_user.rb +52 -0
- data/test/dummy/app/mongoid/lockable_user.rb +38 -0
- data/test/dummy/app/mongoid/mang.rb +46 -0
- data/test/dummy/app/mongoid/only_email_user.rb +33 -0
- data/test/dummy/app/mongoid/scoped_user.rb +50 -0
- data/test/dummy/app/mongoid/unconfirmable_user.rb +44 -0
- data/test/dummy/app/mongoid/unregisterable_user.rb +47 -0
- data/test/dummy/app/mongoid/user.rb +49 -0
- data/test/dummy/app/views/layouts/application.html.erb +0 -2
- data/test/dummy/config/application.rb +22 -1
- data/test/dummy/config/boot.rb +4 -0
- data/test/dummy/config/environments/development.rb +0 -10
- data/test/dummy/config/environments/production.rb +0 -16
- data/test/dummy/config/initializers/devise.rb +285 -0
- data/test/dummy/config/initializers/devise_token_auth.rb +35 -4
- data/test/dummy/config/initializers/figaro.rb +1 -1
- data/test/dummy/config/initializers/omniauth.rb +1 -0
- data/test/dummy/config/routes.rb +2 -0
- data/test/dummy/db/migrate/20140715061447_devise_token_auth_create_users.rb +0 -7
- data/test/dummy/db/migrate/20140715061805_devise_token_auth_create_mangs.rb +0 -7
- data/test/dummy/db/migrate/20141222035835_devise_token_auth_create_only_email_users.rb +0 -7
- data/test/dummy/db/migrate/20141222053502_devise_token_auth_create_unregisterable_users.rb +0 -7
- data/test/dummy/db/migrate/20150708104536_devise_token_auth_create_unconfirmable_users.rb +0 -7
- data/test/dummy/db/migrate/20160103235141_devise_token_auth_create_scoped_users.rb +0 -7
- data/test/dummy/db/migrate/20160629184441_devise_token_auth_create_lockable_users.rb +0 -7
- data/test/dummy/db/migrate/20190924101113_devise_token_auth_create_confirmable_users.rb +49 -0
- data/test/dummy/db/schema.rb +31 -33
- data/test/dummy/tmp/generators/app/models/user.rb +11 -0
- data/test/dummy/tmp/generators/config/initializers/devise_token_auth.rb +60 -0
- data/test/dummy/tmp/generators/db/migrate/20220822003050_devise_token_auth_create_users.rb +49 -0
- data/test/factories/users.rb +3 -2
- data/test/lib/devise_token_auth/blacklist_test.rb +19 -0
- data/test/lib/devise_token_auth/rails/custom_routes_test.rb +29 -0
- data/test/lib/devise_token_auth/rails/routes_test.rb +87 -0
- data/test/lib/devise_token_auth/token_factory_test.rb +191 -0
- data/test/lib/devise_token_auth/url_test.rb +2 -2
- data/test/lib/generators/devise_token_auth/install_generator_test.rb +51 -31
- data/test/lib/generators/devise_token_auth/install_generator_with_namespace_test.rb +51 -31
- data/test/models/concerns/mongoid_support_test.rb +31 -0
- data/test/models/concerns/tokens_serialization_test.rb +104 -0
- data/test/models/confirmable_user_test.rb +35 -0
- data/test/models/only_email_user_test.rb +0 -8
- data/test/models/user_test.rb +13 -23
- data/test/test_helper.rb +45 -4
- metadata +126 -33
- data/config/initializers/devise.rb +0 -198
- data/test/dummy/config/initializers/assets.rb +0 -10
- data/test/dummy/tmp/generators/app/views/devise/mailer/confirmation_instructions.html.erb +0 -5
- data/test/dummy/tmp/generators/app/views/devise/mailer/reset_password_instructions.html.erb +0 -8
- /data/test/dummy/app/{models → active_record}/lockable_user.rb +0 -0
- /data/test/dummy/app/{models → active_record}/mang.rb +0 -0
- /data/test/dummy/app/{models → active_record}/only_email_user.rb +0 -0
@@ -0,0 +1,191 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class DeviseTokenAuth::TokenFactoryTest < ActiveSupport::TestCase
|
4
|
+
describe 'TokenFactory module' do
|
5
|
+
let(:tf) { DeviseTokenAuth::TokenFactory }
|
6
|
+
let(:token_regexp) { /^[-_A-Za-z0-9]{22}$/ }
|
7
|
+
|
8
|
+
it 'should be defined' do
|
9
|
+
assert_equal(tf.present?, true)
|
10
|
+
assert_kind_of(Module, tf)
|
11
|
+
end
|
12
|
+
|
13
|
+
describe 'interface' do
|
14
|
+
let(:token_hash_cost_regexp) { /\$[\w]+\$([\d]+)\$/ }
|
15
|
+
let(:lifespan) { 10 }
|
16
|
+
let(:cost) { DeviseTokenAuth.token_cost }
|
17
|
+
|
18
|
+
it '::secure_string' do
|
19
|
+
assert_respond_to(tf, :secure_string)
|
20
|
+
|
21
|
+
secure_string = tf.secure_string
|
22
|
+
assert_equal(secure_string.size, 22)
|
23
|
+
assert_match(token_regexp, secure_string)
|
24
|
+
|
25
|
+
SecureRandom.stub(:urlsafe_base64, secure_string) do
|
26
|
+
assert_equal(tf.secure_string, secure_string)
|
27
|
+
end
|
28
|
+
end
|
29
|
+
|
30
|
+
it '::client' do
|
31
|
+
assert_respond_to(tf, :client)
|
32
|
+
|
33
|
+
client = tf.client
|
34
|
+
assert_equal(client.size, 22)
|
35
|
+
assert_match(token_regexp, client)
|
36
|
+
|
37
|
+
secure_string = tf.secure_string
|
38
|
+
tf.stub(:secure_string, secure_string) do
|
39
|
+
assert_equal(tf.client, secure_string)
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
it '::token' do
|
44
|
+
assert_respond_to(tf, :token)
|
45
|
+
|
46
|
+
token = tf.token
|
47
|
+
assert_kind_of(String, token)
|
48
|
+
assert_equal(token.size, 22)
|
49
|
+
assert_match(token_regexp, token)
|
50
|
+
|
51
|
+
secure_string = tf.secure_string
|
52
|
+
tf.stub(:secure_string, secure_string) do
|
53
|
+
assert_equal(tf.token, secure_string)
|
54
|
+
end
|
55
|
+
end
|
56
|
+
|
57
|
+
it '::token_hash(args)' do
|
58
|
+
assert_respond_to(tf, :token_hash)
|
59
|
+
|
60
|
+
token_hash = tf.token_hash(tf.token)
|
61
|
+
assert_equal(token_hash.size, 60)
|
62
|
+
assert_kind_of(String, token_hash)
|
63
|
+
|
64
|
+
token_cost = token_hash_cost_regexp.match(token_hash)[1].to_i
|
65
|
+
assert_equal(token_cost, cost)
|
66
|
+
|
67
|
+
cost = DeviseTokenAuth.token_cost == 4 ? 10 : 4
|
68
|
+
token_hash = tf.token_hash(tf.token, cost)
|
69
|
+
token_cost = token_hash_cost_regexp.match(token_hash)[1].to_i
|
70
|
+
assert_equal(token_cost, cost)
|
71
|
+
|
72
|
+
cost = nil
|
73
|
+
token_hash = tf.token_hash(tf.token, cost)
|
74
|
+
token_cost = token_hash_cost_regexp.match(token_hash)[1].to_i
|
75
|
+
assert_equal(token_cost, DeviseTokenAuth.token_cost)
|
76
|
+
end
|
77
|
+
|
78
|
+
it '::expiry' do
|
79
|
+
assert_respond_to(tf, :expiry)
|
80
|
+
|
81
|
+
assert_kind_of(Integer, tf.expiry)
|
82
|
+
assert tf.expiry > Time.now.to_i
|
83
|
+
end
|
84
|
+
|
85
|
+
it '::expiry(args)' do
|
86
|
+
time = Time.now
|
87
|
+
Time.stub(:now, time) do
|
88
|
+
assert_equal(tf.expiry(lifespan), (time + lifespan).to_i)
|
89
|
+
|
90
|
+
lifespan = nil
|
91
|
+
assert_equal(tf.expiry(lifespan), (time + DeviseTokenAuth.token_lifespan).to_i)
|
92
|
+
end
|
93
|
+
end
|
94
|
+
|
95
|
+
it '::create' do
|
96
|
+
assert_respond_to(tf, :create)
|
97
|
+
|
98
|
+
token = tf.create
|
99
|
+
assert token
|
100
|
+
token.members.each { |m| refute_nil token[m] }
|
101
|
+
end
|
102
|
+
|
103
|
+
it '::create(args)' do
|
104
|
+
client = tf.client
|
105
|
+
token = tf.create(client: client)
|
106
|
+
assert_equal(token.client, client)
|
107
|
+
|
108
|
+
time = Time.now
|
109
|
+
Time.stub(:now, time) do
|
110
|
+
token = tf.create(lifespan: lifespan)
|
111
|
+
assert_equal(token.expiry, (time + lifespan).to_i)
|
112
|
+
end
|
113
|
+
|
114
|
+
token = tf.create(cost: cost)
|
115
|
+
token_cost = token_hash_cost_regexp.match(token.token_hash)[1].to_i
|
116
|
+
assert_equal(token_cost, cost)
|
117
|
+
end
|
118
|
+
|
119
|
+
it '::new' do
|
120
|
+
assert_respond_to(tf, :new)
|
121
|
+
|
122
|
+
token = tf.new
|
123
|
+
token.each { |v| assert_nil v }
|
124
|
+
end
|
125
|
+
|
126
|
+
it '::valid_token_hash?' do
|
127
|
+
assert_respond_to(tf, :valid_token_hash?)
|
128
|
+
|
129
|
+
refute tf.valid_token_hash?('koskoskos')
|
130
|
+
assert tf.valid_token_hash?(tf.create.token_hash)
|
131
|
+
end
|
132
|
+
|
133
|
+
it '::token_hash_is_token?' do
|
134
|
+
assert_respond_to(tf, :token_hash_is_token?)
|
135
|
+
|
136
|
+
token = tf.create
|
137
|
+
refute tf.token_hash_is_token?(token.token_hash, 'koskoskos')
|
138
|
+
refute tf.token_hash_is_token?('koskoskos', token.token)
|
139
|
+
assert tf.token_hash_is_token?(token.token_hash, token.token)
|
140
|
+
end
|
141
|
+
end
|
142
|
+
|
143
|
+
describe 'token object implements' do
|
144
|
+
let(:object) { tf.create }
|
145
|
+
|
146
|
+
it '#client' do
|
147
|
+
assert_respond_to(object, :client)
|
148
|
+
|
149
|
+
assert_kind_of(String, object.client)
|
150
|
+
assert_equal(object.client.size, 22)
|
151
|
+
assert_match(token_regexp, object.client)
|
152
|
+
end
|
153
|
+
|
154
|
+
it '#token' do
|
155
|
+
assert_respond_to(object, :token)
|
156
|
+
|
157
|
+
assert_kind_of(String, object.token)
|
158
|
+
assert_equal(object.token.size, 22)
|
159
|
+
assert_match(token_regexp, object.token)
|
160
|
+
end
|
161
|
+
|
162
|
+
it '#token_hash' do
|
163
|
+
assert_respond_to(object, :token_hash)
|
164
|
+
|
165
|
+
assert_kind_of(String, object.token_hash)
|
166
|
+
assert_equal(object.token_hash.size, 60)
|
167
|
+
end
|
168
|
+
|
169
|
+
it '#expiry' do
|
170
|
+
assert_respond_to(object, :expiry)
|
171
|
+
assert_kind_of(Integer, object.expiry)
|
172
|
+
end
|
173
|
+
|
174
|
+
it '#clear!' do
|
175
|
+
assert_respond_to(object, :clear!)
|
176
|
+
|
177
|
+
assert object.clear!
|
178
|
+
object.each { |v| assert_nil v }
|
179
|
+
end
|
180
|
+
|
181
|
+
it '#present?' do
|
182
|
+
assert_respond_to(object, :present?)
|
183
|
+
|
184
|
+
assert object.present?
|
185
|
+
|
186
|
+
object.token = nil
|
187
|
+
refute object.present?
|
188
|
+
end
|
189
|
+
end
|
190
|
+
end
|
191
|
+
end
|
@@ -4,10 +4,10 @@ require 'test_helper'
|
|
4
4
|
|
5
5
|
class DeviseTokenAuth::UrlTest < ActiveSupport::TestCase
|
6
6
|
describe 'DeviseTokenAuth::Url#generate' do
|
7
|
-
test 'URI fragment should appear at the end of URL' do
|
7
|
+
test 'URI fragment should appear at the end of URL with repeat of query params' do
|
8
8
|
params = { client_id: 123 }
|
9
9
|
url = 'http://example.com#fragment'
|
10
|
-
assert_equal DeviseTokenAuth::Url.send(:generate, url, params), 'http://example.com?client_id=123#fragment'
|
10
|
+
assert_equal DeviseTokenAuth::Url.send(:generate, url, params), 'http://example.com?client_id=123#fragment?client_id=123'
|
11
11
|
end
|
12
12
|
|
13
13
|
describe 'with existing query params' do
|
@@ -2,11 +2,13 @@
|
|
2
2
|
|
3
3
|
require 'test_helper'
|
4
4
|
require 'fileutils'
|
5
|
-
require 'generators/devise_token_auth/install_generator'
|
5
|
+
require 'generators/devise_token_auth/install_generator' if DEVISE_TOKEN_AUTH_ORM == :active_record
|
6
|
+
require 'generators/devise_token_auth/install_mongoid_generator' if DEVISE_TOKEN_AUTH_ORM == :mongoid
|
6
7
|
|
7
8
|
module DeviseTokenAuth
|
8
9
|
class InstallGeneratorTest < Rails::Generators::TestCase
|
9
|
-
tests InstallGenerator
|
10
|
+
tests InstallGenerator if DEVISE_TOKEN_AUTH_ORM == :active_record
|
11
|
+
tests InstallMongoidGenerator if DEVISE_TOKEN_AUTH_ORM == :mongoid
|
10
12
|
destination Rails.root.join('tmp/generators')
|
11
13
|
|
12
14
|
describe 'default values, clean install' do
|
@@ -26,28 +28,30 @@ module DeviseTokenAuth
|
|
26
28
|
assert_file 'config/initializers/devise_token_auth.rb'
|
27
29
|
end
|
28
30
|
|
29
|
-
test '
|
30
|
-
|
31
|
+
test 'subsequent runs raise no errors' do
|
32
|
+
run_generator
|
31
33
|
end
|
32
34
|
|
33
|
-
|
34
|
-
|
35
|
-
assert_migration 'db/migrate/devise_token_auth_create_users.rb', /#{Rails::VERSION::MAJOR}.#{Rails::VERSION::MINOR}/
|
36
|
-
else
|
35
|
+
if DEVISE_TOKEN_AUTH_ORM == :active_record
|
36
|
+
test 'migration is created' do
|
37
37
|
assert_migration 'db/migrate/devise_token_auth_create_users.rb'
|
38
38
|
end
|
39
|
-
end
|
40
39
|
|
41
|
-
|
42
|
-
|
43
|
-
|
40
|
+
test 'migration file contains rails version' do
|
41
|
+
if Rails::VERSION::MAJOR >= 5
|
42
|
+
assert_migration 'db/migrate/devise_token_auth_create_users.rb', /#{Rails::VERSION::MAJOR}.#{Rails::VERSION::MINOR}/
|
43
|
+
else
|
44
|
+
assert_migration 'db/migrate/devise_token_auth_create_users.rb'
|
45
|
+
end
|
46
|
+
end
|
44
47
|
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
48
|
+
test 'add primary key type with rails 5 when specified in rails generator' do
|
49
|
+
run_generator %w[--primary_key_type=uuid --force]
|
50
|
+
if Rails::VERSION::MAJOR >= 5
|
51
|
+
assert_migration 'db/migrate/devise_token_auth_create_users.rb', /create_table\(:users, id: :uuid\) do/
|
52
|
+
else
|
53
|
+
assert_migration 'db/migrate/devise_token_auth_create_users.rb', /create_table\(:users\) do/
|
54
|
+
end
|
51
55
|
end
|
52
56
|
end
|
53
57
|
end
|
@@ -63,18 +67,32 @@ module DeviseTokenAuth
|
|
63
67
|
# make dir if not exists
|
64
68
|
FileUtils.mkdir_p(@dir)
|
65
69
|
|
66
|
-
|
67
|
-
|
70
|
+
case DEVISE_TOKEN_AUTH_ORM
|
71
|
+
when :active_record
|
72
|
+
# account for rails version 5
|
73
|
+
active_record_needle = (Rails::VERSION::MAJOR >= 5) ? 'ApplicationRecord' : 'ActiveRecord::Base'
|
68
74
|
|
69
|
-
|
70
|
-
|
71
|
-
|
75
|
+
@f = File.open(@fname, 'w') do |f|
|
76
|
+
f.write <<-RUBY
|
77
|
+
class User < #{active_record_needle}
|
72
78
|
|
73
|
-
|
74
|
-
|
79
|
+
def whatever
|
80
|
+
puts 'whatever'
|
81
|
+
end
|
75
82
|
end
|
76
|
-
|
77
|
-
|
83
|
+
RUBY
|
84
|
+
end
|
85
|
+
when :mongoid
|
86
|
+
@f = File.open(@fname, 'w') do |f|
|
87
|
+
f.write <<-'RUBY'
|
88
|
+
class User
|
89
|
+
|
90
|
+
def whatever
|
91
|
+
puts 'whatever'
|
92
|
+
end
|
93
|
+
end
|
94
|
+
RUBY
|
95
|
+
end
|
78
96
|
end
|
79
97
|
|
80
98
|
run_generator
|
@@ -136,10 +154,6 @@ module DeviseTokenAuth
|
|
136
154
|
run_generator %w[Mang mangs]
|
137
155
|
end
|
138
156
|
|
139
|
-
test 'migration is created' do
|
140
|
-
assert_migration 'db/migrate/devise_token_auth_create_mangs.rb'
|
141
|
-
end
|
142
|
-
|
143
157
|
test 'route method is appended to routes file' do
|
144
158
|
assert_file 'config/routes.rb' do |routes|
|
145
159
|
assert_match(/mount_devise_token_auth_for 'Mang', at: 'mangs'/, routes)
|
@@ -152,6 +166,12 @@ module DeviseTokenAuth
|
|
152
166
|
assert_match(/# Define routes for Mang within this block./, routes)
|
153
167
|
end
|
154
168
|
end
|
169
|
+
|
170
|
+
if DEVISE_TOKEN_AUTH_ORM == :active_record
|
171
|
+
test 'migration is created' do
|
172
|
+
assert_migration 'db/migrate/devise_token_auth_create_mangs.rb'
|
173
|
+
end
|
174
|
+
end
|
155
175
|
end
|
156
176
|
end
|
157
177
|
|
@@ -2,11 +2,13 @@
|
|
2
2
|
|
3
3
|
require 'test_helper'
|
4
4
|
require 'fileutils'
|
5
|
-
require 'generators/devise_token_auth/install_generator'
|
5
|
+
require 'generators/devise_token_auth/install_generator' if DEVISE_TOKEN_AUTH_ORM == :active_record
|
6
|
+
require 'generators/devise_token_auth/install_mongoid_generator' if DEVISE_TOKEN_AUTH_ORM == :mongoid
|
6
7
|
|
7
8
|
module DeviseTokenAuth
|
8
9
|
class InstallGeneratorTest < Rails::Generators::TestCase
|
9
|
-
tests InstallGenerator
|
10
|
+
tests InstallGenerator if DEVISE_TOKEN_AUTH_ORM == :active_record
|
11
|
+
tests InstallMongoidGenerator if DEVISE_TOKEN_AUTH_ORM == :mongoid
|
10
12
|
destination Rails.root.join('tmp/generators')
|
11
13
|
|
12
14
|
# The namespaced user model for testing
|
@@ -31,28 +33,30 @@ module DeviseTokenAuth
|
|
31
33
|
assert_file 'config/initializers/devise_token_auth.rb'
|
32
34
|
end
|
33
35
|
|
34
|
-
test '
|
35
|
-
|
36
|
+
test 'subsequent runs raise no errors' do
|
37
|
+
run_generator %W[#{user_class} auth]
|
36
38
|
end
|
37
39
|
|
38
|
-
|
39
|
-
|
40
|
-
assert_migration "db/migrate/devise_token_auth_create_#{table_name}.rb", /#{Rails::VERSION::MAJOR}.#{Rails::VERSION::MINOR}/
|
41
|
-
else
|
40
|
+
if DEVISE_TOKEN_AUTH_ORM == :active_record
|
41
|
+
test 'migration is created for user model with namespace' do
|
42
42
|
assert_migration "db/migrate/devise_token_auth_create_#{table_name}.rb"
|
43
43
|
end
|
44
|
-
end
|
45
44
|
|
46
|
-
|
47
|
-
|
48
|
-
|
45
|
+
test 'migration file for user model with namespace contains rails version' do
|
46
|
+
if Rails::VERSION::MAJOR >= 5
|
47
|
+
assert_migration "db/migrate/devise_token_auth_create_#{table_name}.rb", /#{Rails::VERSION::MAJOR}.#{Rails::VERSION::MINOR}/
|
48
|
+
else
|
49
|
+
assert_migration "db/migrate/devise_token_auth_create_#{table_name}.rb"
|
50
|
+
end
|
51
|
+
end
|
49
52
|
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
53
|
+
test 'add primary key type with rails 5 when specified in rails generator' do
|
54
|
+
run_generator %W[#{user_class} auth --primary_key_type=uuid --force]
|
55
|
+
if Rails::VERSION::MAJOR >= 5
|
56
|
+
assert_migration "db/migrate/devise_token_auth_create_#{table_name}.rb", /create_table\(:#{table_name}, id: :uuid\) do/
|
57
|
+
else
|
58
|
+
assert_migration "db/migrate/devise_token_auth_create_#{table_name}.rb", /create_table\(:#{table_name}\) do/
|
59
|
+
end
|
56
60
|
end
|
57
61
|
end
|
58
62
|
end
|
@@ -68,18 +72,32 @@ module DeviseTokenAuth
|
|
68
72
|
# make dir if not exists
|
69
73
|
FileUtils.mkdir_p(@dir)
|
70
74
|
|
71
|
-
|
72
|
-
|
75
|
+
case DEVISE_TOKEN_AUTH_ORM
|
76
|
+
when :active_record
|
77
|
+
# account for rails version 5
|
78
|
+
active_record_needle = (Rails::VERSION::MAJOR >= 5) ? 'ApplicationRecord' : 'ActiveRecord::Base'
|
73
79
|
|
74
|
-
|
75
|
-
|
76
|
-
|
80
|
+
@f = File.open(@fname, 'w') do |f|
|
81
|
+
f.write <<-RUBY
|
82
|
+
class User < #{active_record_needle}
|
77
83
|
|
78
|
-
|
79
|
-
|
84
|
+
def whatever
|
85
|
+
puts 'whatever'
|
86
|
+
end
|
80
87
|
end
|
81
|
-
|
82
|
-
|
88
|
+
RUBY
|
89
|
+
end
|
90
|
+
when :mongoid
|
91
|
+
@f = File.open(@fname, 'w') do |f|
|
92
|
+
f.write <<-'RUBY'
|
93
|
+
class User
|
94
|
+
|
95
|
+
def whatever
|
96
|
+
puts 'whatever'
|
97
|
+
end
|
98
|
+
end
|
99
|
+
RUBY
|
100
|
+
end
|
83
101
|
end
|
84
102
|
|
85
103
|
run_generator
|
@@ -141,10 +159,6 @@ module DeviseTokenAuth
|
|
141
159
|
run_generator %w[Mang mangs]
|
142
160
|
end
|
143
161
|
|
144
|
-
test 'migration is created' do
|
145
|
-
assert_migration 'db/migrate/devise_token_auth_create_mangs.rb'
|
146
|
-
end
|
147
|
-
|
148
162
|
test 'route method is appended to routes file' do
|
149
163
|
assert_file 'config/routes.rb' do |routes|
|
150
164
|
assert_match(/mount_devise_token_auth_for 'Mang', at: 'mangs'/, routes)
|
@@ -157,6 +171,12 @@ module DeviseTokenAuth
|
|
157
171
|
assert_match(/# Define routes for Mang within this block./, routes)
|
158
172
|
end
|
159
173
|
end
|
174
|
+
|
175
|
+
if DEVISE_TOKEN_AUTH_ORM == :active_record
|
176
|
+
test 'migration is created' do
|
177
|
+
assert_migration 'db/migrate/devise_token_auth_create_mangs.rb'
|
178
|
+
end
|
179
|
+
end
|
160
180
|
end
|
161
181
|
end
|
162
182
|
|
@@ -0,0 +1,31 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'test_helper'
|
4
|
+
|
5
|
+
if DEVISE_TOKEN_AUTH_ORM == :mongoid
|
6
|
+
class DeviseTokenAuth::Concerns::MongoidSupportTest < ActiveSupport::TestCase
|
7
|
+
describe DeviseTokenAuth::Concerns::MongoidSupport do
|
8
|
+
before do
|
9
|
+
@user = create(:user)
|
10
|
+
end
|
11
|
+
|
12
|
+
describe '#as_json' do
|
13
|
+
test 'should be defined' do
|
14
|
+
assert @user.methods.include?(:as_json)
|
15
|
+
end
|
16
|
+
|
17
|
+
test 'should except _id attribute' do
|
18
|
+
refute @user.as_json.key?('_id')
|
19
|
+
end
|
20
|
+
|
21
|
+
test 'should return with id attribute' do
|
22
|
+
assert_equal @user._id.to_s, @user.as_json['id']
|
23
|
+
end
|
24
|
+
|
25
|
+
test 'should accept options' do
|
26
|
+
refute @user.as_json(except: [:created_at]).key?('created_at')
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
@@ -0,0 +1,104 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
if DEVISE_TOKEN_AUTH_ORM == :active_record
|
4
|
+
describe 'DeviseTokenAuth::Concerns::TokensSerialization' do
|
5
|
+
let(:ts) { DeviseTokenAuth::Concerns::TokensSerialization }
|
6
|
+
let(:user) { FactoryBot.create(:user) }
|
7
|
+
let(:tokens) do
|
8
|
+
# Сreate all possible token's attributes combinations
|
9
|
+
user.create_token
|
10
|
+
2.times { user.create_new_auth_token(user.tokens.first[0]) }
|
11
|
+
user.create_new_auth_token
|
12
|
+
user.create_token
|
13
|
+
|
14
|
+
user.tokens
|
15
|
+
end
|
16
|
+
|
17
|
+
it 'is defined' do
|
18
|
+
assert_equal(ts.present?, true)
|
19
|
+
assert_kind_of(Module, ts)
|
20
|
+
end
|
21
|
+
|
22
|
+
describe '.load(json)' do
|
23
|
+
|
24
|
+
let(:json) { JSON.generate(tokens) }
|
25
|
+
|
26
|
+
let(:default) { {} }
|
27
|
+
|
28
|
+
it 'is defined' do
|
29
|
+
assert_respond_to(ts, :load)
|
30
|
+
end
|
31
|
+
|
32
|
+
it 'handles nil' do
|
33
|
+
assert_equal(ts.load(nil), default)
|
34
|
+
end
|
35
|
+
|
36
|
+
it 'handles string' do
|
37
|
+
assert_equal(ts.load(json), JSON.parse(json))
|
38
|
+
end
|
39
|
+
|
40
|
+
it 'returns object of undesirable class' do
|
41
|
+
assert_equal(ts.load([]), [])
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
describe '.dump(object)' do
|
46
|
+
let(:default) { 'null' }
|
47
|
+
|
48
|
+
it 'is defined' do
|
49
|
+
assert_respond_to(ts, :dump)
|
50
|
+
end
|
51
|
+
|
52
|
+
it 'handles nil' do
|
53
|
+
assert_equal(ts.dump(nil), default)
|
54
|
+
end
|
55
|
+
|
56
|
+
it 'handles empty hash' do
|
57
|
+
assert_equal(ts.dump({}), '{}')
|
58
|
+
end
|
59
|
+
|
60
|
+
it 'removes nil values' do
|
61
|
+
new_tokens = tokens.dup
|
62
|
+
new_tokens[new_tokens.first[0]][:kos] = nil
|
63
|
+
|
64
|
+
assert_equal(ts.dump(tokens), ts.dump(new_tokens))
|
65
|
+
end
|
66
|
+
|
67
|
+
describe 'updated_at' do
|
68
|
+
before do
|
69
|
+
@default_format = ::Time::DATE_FORMATS[:default]
|
70
|
+
::Time::DATE_FORMATS[:default] = 'imprecise format'
|
71
|
+
end
|
72
|
+
|
73
|
+
after do
|
74
|
+
::Time::DATE_FORMATS[:default] = @default_format
|
75
|
+
end
|
76
|
+
|
77
|
+
def updated_ats(tokens)
|
78
|
+
tokens.
|
79
|
+
values.
|
80
|
+
flat_map do |token|
|
81
|
+
[:updated_at, 'updated_at'].map do |key|
|
82
|
+
token[key]
|
83
|
+
end
|
84
|
+
end.
|
85
|
+
compact
|
86
|
+
end
|
87
|
+
|
88
|
+
it 'is defined' do
|
89
|
+
refute_empty updated_ats(tokens)
|
90
|
+
end
|
91
|
+
|
92
|
+
it 'uses iso8601' do
|
93
|
+
updated_ats(JSON.parse(ts.dump(tokens))).each do |updated_at|
|
94
|
+
Time.strptime(updated_at, '%Y-%m-%dT%H:%M:%SZ')
|
95
|
+
end
|
96
|
+
end
|
97
|
+
|
98
|
+
it 'does not rely on Time#to_s' do
|
99
|
+
refute_includes(updated_ats(tokens), 'imprecise format')
|
100
|
+
end
|
101
|
+
end
|
102
|
+
end
|
103
|
+
end
|
104
|
+
end
|
@@ -0,0 +1,35 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'test_helper'
|
4
|
+
|
5
|
+
class ConfirmableUserTest < ActiveSupport::TestCase
|
6
|
+
describe ConfirmableUser do
|
7
|
+
describe 'creation' do
|
8
|
+
test 'email should be saved' do
|
9
|
+
@resource = create(:confirmable_user)
|
10
|
+
assert @resource.email.present?
|
11
|
+
end
|
12
|
+
end
|
13
|
+
|
14
|
+
describe 'updating email' do
|
15
|
+
test 'new email should be saved to unconfirmed_email' do
|
16
|
+
@resource = create(:confirmable_user, email: 'old_address@example.com')
|
17
|
+
@resource.update(email: 'new_address@example.com')
|
18
|
+
assert @resource.unconfirmed_email == 'new_address@example.com'
|
19
|
+
end
|
20
|
+
|
21
|
+
test 'old email should be kept in email' do
|
22
|
+
@resource = create(:confirmable_user, email: 'old_address@example.com')
|
23
|
+
@resource.update(email: 'new_address@example.com')
|
24
|
+
assert @resource.email == 'old_address@example.com'
|
25
|
+
end
|
26
|
+
|
27
|
+
test 'confirmation_token should be changed' do
|
28
|
+
@resource = create(:confirmable_user, email: 'old_address@example.com')
|
29
|
+
old_token = @resource.confirmation_token
|
30
|
+
@resource.update(email: 'new_address@example.com')
|
31
|
+
assert @resource.confirmation_token != old_token
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
@@ -4,14 +4,6 @@ require 'test_helper'
|
|
4
4
|
|
5
5
|
class OnlyEmailUserTest < ActiveSupport::TestCase
|
6
6
|
describe OnlyEmailUser do
|
7
|
-
test 'trackable is disabled' do
|
8
|
-
refute OnlyEmailUser.method_defined?(:sign_in_count)
|
9
|
-
refute OnlyEmailUser.method_defined?(:current_sign_in_at)
|
10
|
-
refute OnlyEmailUser.method_defined?(:last_sign_in_at)
|
11
|
-
refute OnlyEmailUser.method_defined?(:current_sign_in_ip)
|
12
|
-
refute OnlyEmailUser.method_defined?(:last_sign_in_ip)
|
13
|
-
end
|
14
|
-
|
15
7
|
test 'confirmable is disabled' do
|
16
8
|
refute OnlyEmailUser.method_defined?(:confirmation_token)
|
17
9
|
refute OnlyEmailUser.method_defined?(:confirmed_at)
|