drogus-authlogic 2.1.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (126) hide show
  1. data/.gitignore +9 -0
  2. data/CHANGELOG.rdoc +345 -0
  3. data/LICENSE +20 -0
  4. data/README.rdoc +246 -0
  5. data/Rakefile +42 -0
  6. data/VERSION.yml +5 -0
  7. data/authlogic.gemspec +217 -0
  8. data/generators/session/session_generator.rb +9 -0
  9. data/generators/session/templates/session.rb +2 -0
  10. data/init.rb +1 -0
  11. data/lib/authlogic.rb +64 -0
  12. data/lib/authlogic/acts_as_authentic/base.rb +107 -0
  13. data/lib/authlogic/acts_as_authentic/email.rb +110 -0
  14. data/lib/authlogic/acts_as_authentic/logged_in_status.rb +60 -0
  15. data/lib/authlogic/acts_as_authentic/login.rb +137 -0
  16. data/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
  17. data/lib/authlogic/acts_as_authentic/password.rb +355 -0
  18. data/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
  19. data/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
  20. data/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
  21. data/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
  22. data/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
  23. data/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
  24. data/lib/authlogic/authenticates_many/association.rb +42 -0
  25. data/lib/authlogic/authenticates_many/base.rb +55 -0
  26. data/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
  27. data/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
  28. data/lib/authlogic/controller_adapters/rails_adapter.rb +48 -0
  29. data/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
  30. data/lib/authlogic/crypto_providers/aes256.rb +43 -0
  31. data/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
  32. data/lib/authlogic/crypto_providers/md5.rb +34 -0
  33. data/lib/authlogic/crypto_providers/sha1.rb +35 -0
  34. data/lib/authlogic/crypto_providers/sha256.rb +50 -0
  35. data/lib/authlogic/crypto_providers/sha512.rb +50 -0
  36. data/lib/authlogic/crypto_providers/wordpress.rb +43 -0
  37. data/lib/authlogic/i18n.rb +83 -0
  38. data/lib/authlogic/i18n/translator.rb +15 -0
  39. data/lib/authlogic/random.rb +33 -0
  40. data/lib/authlogic/regex.rb +25 -0
  41. data/lib/authlogic/session/activation.rb +58 -0
  42. data/lib/authlogic/session/active_record_trickery.rb +64 -0
  43. data/lib/authlogic/session/base.rb +37 -0
  44. data/lib/authlogic/session/brute_force_protection.rb +96 -0
  45. data/lib/authlogic/session/callbacks.rb +99 -0
  46. data/lib/authlogic/session/cookies.rb +130 -0
  47. data/lib/authlogic/session/existence.rb +93 -0
  48. data/lib/authlogic/session/foundation.rb +63 -0
  49. data/lib/authlogic/session/http_auth.rb +58 -0
  50. data/lib/authlogic/session/id.rb +41 -0
  51. data/lib/authlogic/session/klass.rb +78 -0
  52. data/lib/authlogic/session/magic_columns.rb +95 -0
  53. data/lib/authlogic/session/magic_states.rb +59 -0
  54. data/lib/authlogic/session/params.rb +101 -0
  55. data/lib/authlogic/session/password.rb +240 -0
  56. data/lib/authlogic/session/perishable_token.rb +18 -0
  57. data/lib/authlogic/session/persistence.rb +70 -0
  58. data/lib/authlogic/session/priority_record.rb +34 -0
  59. data/lib/authlogic/session/scopes.rb +101 -0
  60. data/lib/authlogic/session/session.rb +62 -0
  61. data/lib/authlogic/session/timeout.rb +82 -0
  62. data/lib/authlogic/session/unauthorized_record.rb +50 -0
  63. data/lib/authlogic/session/validation.rb +82 -0
  64. data/lib/authlogic/test_case.rb +120 -0
  65. data/lib/authlogic/test_case/mock_controller.rb +45 -0
  66. data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
  67. data/lib/authlogic/test_case/mock_logger.rb +10 -0
  68. data/lib/authlogic/test_case/mock_request.rb +19 -0
  69. data/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
  70. data/rails/init.rb +1 -0
  71. data/shoulda_macros/authlogic.rb +69 -0
  72. data/test/acts_as_authentic_test/base_test.rb +18 -0
  73. data/test/acts_as_authentic_test/email_test.rb +97 -0
  74. data/test/acts_as_authentic_test/logged_in_status_test.rb +36 -0
  75. data/test/acts_as_authentic_test/login_test.rb +109 -0
  76. data/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
  77. data/test/acts_as_authentic_test/password_test.rb +236 -0
  78. data/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
  79. data/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
  80. data/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
  81. data/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
  82. data/test/acts_as_authentic_test/single_access_test.rb +44 -0
  83. data/test/authenticates_many_test.rb +16 -0
  84. data/test/crypto_provider_test/aes256_test.rb +14 -0
  85. data/test/crypto_provider_test/bcrypt_test.rb +14 -0
  86. data/test/crypto_provider_test/sha1_test.rb +23 -0
  87. data/test/crypto_provider_test/sha256_test.rb +14 -0
  88. data/test/crypto_provider_test/sha512_test.rb +14 -0
  89. data/test/fixtures/companies.yml +5 -0
  90. data/test/fixtures/employees.yml +17 -0
  91. data/test/fixtures/projects.yml +3 -0
  92. data/test/fixtures/users.yml +24 -0
  93. data/test/i18n_test.rb +33 -0
  94. data/test/libs/affiliate.rb +7 -0
  95. data/test/libs/company.rb +6 -0
  96. data/test/libs/employee.rb +7 -0
  97. data/test/libs/employee_session.rb +2 -0
  98. data/test/libs/ldaper.rb +3 -0
  99. data/test/libs/ordered_hash.rb +9 -0
  100. data/test/libs/project.rb +3 -0
  101. data/test/libs/user.rb +5 -0
  102. data/test/libs/user_session.rb +6 -0
  103. data/test/random_test.rb +49 -0
  104. data/test/session_test/activation_test.rb +43 -0
  105. data/test/session_test/active_record_trickery_test.rb +36 -0
  106. data/test/session_test/brute_force_protection_test.rb +101 -0
  107. data/test/session_test/callbacks_test.rb +6 -0
  108. data/test/session_test/cookies_test.rb +112 -0
  109. data/test/session_test/credentials_test.rb +0 -0
  110. data/test/session_test/existence_test.rb +64 -0
  111. data/test/session_test/http_auth_test.rb +28 -0
  112. data/test/session_test/id_test.rb +17 -0
  113. data/test/session_test/klass_test.rb +40 -0
  114. data/test/session_test/magic_columns_test.rb +62 -0
  115. data/test/session_test/magic_states_test.rb +60 -0
  116. data/test/session_test/params_test.rb +53 -0
  117. data/test/session_test/password_test.rb +106 -0
  118. data/test/session_test/perishability_test.rb +15 -0
  119. data/test/session_test/persistence_test.rb +21 -0
  120. data/test/session_test/scopes_test.rb +60 -0
  121. data/test/session_test/session_test.rb +59 -0
  122. data/test/session_test/timeout_test.rb +52 -0
  123. data/test/session_test/unauthorized_record_test.rb +13 -0
  124. data/test/session_test/validation_test.rb +23 -0
  125. data/test/test_helper.rb +182 -0
  126. metadata +238 -0
@@ -0,0 +1,10 @@
1
+ module Authlogic
2
+ module TestCase
3
+ # Simple class to replace real loggers, so that we can raise any errors being logged.
4
+ class MockLogger
5
+ def error(message)
6
+ raise message
7
+ end
8
+ end
9
+ end
10
+ end
@@ -0,0 +1,19 @@
1
+ module Authlogic
2
+ module TestCase
3
+ class MockRequest # :nodoc:
4
+ attr_accessor :controller
5
+
6
+ def initialize(controller)
7
+ self.controller = controller
8
+ end
9
+
10
+ def remote_ip
11
+ (controller && controller.respond_to?(:env) && controller.env.is_a?(Hash) && controller.env['REMOTE_ADDR']) || "1.1.1.1"
12
+ end
13
+
14
+ private
15
+ def method_missing(*args, &block)
16
+ end
17
+ end
18
+ end
19
+ end
@@ -0,0 +1,30 @@
1
+ module Authlogic
2
+ module TestCase
3
+ # Adapts authlogic to work with the @request object when testing. This way Authlogic can set cookies and what not before
4
+ # a request is made, ultimately letting you log in users in functional tests.
5
+ class RailsRequestAdapter < ControllerAdapters::AbstractAdapter
6
+ def authenticate_with_http_basic(&block)
7
+ end
8
+
9
+ def cookies
10
+ new_cookies = MockCookieJar.new
11
+ super.each do |key, value|
12
+ new_cookies[key] = value[:value]
13
+ end
14
+ new_cookies
15
+ end
16
+
17
+ def cookie_domain
18
+ nil
19
+ end
20
+
21
+ def request
22
+ @request ||= MockRequest.new(controller)
23
+ end
24
+
25
+ def request_content_type
26
+ request.format.to_s
27
+ end
28
+ end
29
+ end
30
+ end
@@ -0,0 +1 @@
1
+ require "authlogic"
@@ -0,0 +1,69 @@
1
+ # Test::Unit
2
+ # Place this file into your test/shoulda_macros directory
3
+ #
4
+ # Example:
5
+ #
6
+ # class UserTest
7
+ # should_have_authlogic
8
+ # end
9
+ #
10
+ # Rspec
11
+ # Place this file into your spec/support/shoulda directory
12
+ #
13
+ # Example:
14
+ #
15
+ # describe User do
16
+ # it { should have_authlogic }
17
+ # end
18
+
19
+ module Authlogic
20
+ module Shoulda
21
+
22
+ module Matchers
23
+ def have_authlogic
24
+ HaveAuthlogic.new
25
+ end
26
+ alias_method :be_authentic, :have_authlogic
27
+
28
+ class HaveAuthlogic
29
+
30
+ def matches?(subject)
31
+ subject.respond_to?(:password=) && subject.respond_to?(:valid_password?)
32
+ end
33
+
34
+ def failure_message
35
+ "Add the line 'acts_as_authentic' to your model"
36
+ end
37
+
38
+ def description
39
+ "have Authlogic"
40
+ end
41
+ end
42
+
43
+ end
44
+
45
+ module Macros
46
+ include Matchers
47
+
48
+ def should_have_authlogic
49
+ klass = described_type rescue model_class
50
+ matcher = HaveAuthlogic.new
51
+
52
+ should matcher.description do
53
+ assert matcher.matches?(klass.new), matcher.failure_message
54
+ end
55
+ end
56
+ alias_method :should_be_authentic, :should_have_authlogic
57
+
58
+ end
59
+
60
+ end
61
+ end
62
+
63
+ if defined? Spec
64
+ Spec::Runner.configure do |config|
65
+ config.include(Authlogic::Shoulda::Matchers)
66
+ end
67
+ else
68
+ Test::Unit::TestCase.class_eval { extend Authlogic::Shoulda::Macros }
69
+ end
@@ -0,0 +1,18 @@
1
+ require File.dirname(__FILE__) + '/../test_helper.rb'
2
+
3
+ module ActsAsAuthenticTest
4
+ class BaseTest < ActiveSupport::TestCase
5
+ def test_acts_as_authentic
6
+ assert_nothing_raised do
7
+ User.acts_as_authentic do
8
+ end
9
+ end
10
+ end
11
+
12
+ def test_acts_as_authentic_with_old_config
13
+ assert_raise(ArgumentError) do
14
+ User.acts_as_authentic({})
15
+ end
16
+ end
17
+ end
18
+ end
@@ -0,0 +1,97 @@
1
+ require File.dirname(__FILE__) + '/../test_helper.rb'
2
+
3
+ module ActsAsAuthenticTest
4
+ class EmailTest < ActiveSupport::TestCase
5
+ def test_email_field_config
6
+ assert_equal :email, User.email_field
7
+ assert_equal :email, Employee.email_field
8
+
9
+ User.email_field = :nope
10
+ assert_equal :nope, User.email_field
11
+ User.email_field :email
12
+ assert_equal :email, User.email_field
13
+ end
14
+
15
+ def test_validate_email_field_config
16
+ assert User.validate_email_field
17
+ assert Employee.validate_email_field
18
+
19
+ User.validate_email_field = false
20
+ assert !User.validate_email_field
21
+ User.validate_email_field true
22
+ assert User.validate_email_field
23
+ end
24
+
25
+ def test_validates_length_of_email_field_options_config
26
+ assert_equal({:within => 6..100}, User.validates_length_of_email_field_options)
27
+ assert_equal({:within => 6..100}, Employee.validates_length_of_email_field_options)
28
+
29
+ User.validates_length_of_email_field_options = {:yes => "no"}
30
+ assert_equal({:yes => "no"}, User.validates_length_of_email_field_options)
31
+ User.validates_length_of_email_field_options({:within => 6..100})
32
+ assert_equal({:within => 6..100}, User.validates_length_of_email_field_options)
33
+ end
34
+
35
+ def test_validates_format_of_email_field_options_config
36
+ default = {:with => Authlogic::Regex.email, :message => I18n.t('error_messages.email_invalid', :default => "should look like an email address.")}
37
+ assert_equal default, User.validates_format_of_email_field_options
38
+ assert_equal default, Employee.validates_format_of_email_field_options
39
+
40
+ User.validates_format_of_email_field_options = {:yes => "no"}
41
+ assert_equal({:yes => "no"}, User.validates_format_of_email_field_options)
42
+ User.validates_format_of_email_field_options default
43
+ assert_equal default, User.validates_format_of_email_field_options
44
+ end
45
+
46
+ def test_validates_uniqueness_of_email_field_options_config
47
+ default = {:case_sensitive => false, :scope => Employee.validations_scope, :if => "#{Employee.email_field}_changed?".to_sym}
48
+ assert_equal default, Employee.validates_uniqueness_of_email_field_options
49
+
50
+ Employee.validates_uniqueness_of_email_field_options = {:yes => "no"}
51
+ assert_equal({:yes => "no"}, Employee.validates_uniqueness_of_email_field_options)
52
+ Employee.validates_uniqueness_of_email_field_options default
53
+ assert_equal default, Employee.validates_uniqueness_of_email_field_options
54
+ end
55
+
56
+ def test_validates_length_of_email_field
57
+ u = User.new
58
+ u.email = "a@a.a"
59
+ assert !u.valid?
60
+ assert u.errors[:email].size > 0
61
+
62
+ u.email = "a@a.com"
63
+ assert !u.valid?
64
+ assert u.errors[:email].size == 0
65
+ end
66
+
67
+ def test_validates_format_of_email_field
68
+ u = User.new
69
+ u.email = "aaaaaaaaaaaaa"
70
+ u.valid?
71
+ assert u.errors[:email].size > 0
72
+
73
+ u.email = "a@a.com"
74
+ u.valid?
75
+ assert u.errors[:email].size == 0
76
+
77
+ u.email = "dakota.dux+1@gmail.com"
78
+ u.valid?
79
+ assert u.errors[:email].size == 0
80
+ end
81
+
82
+ def test_validates_uniqueness_of_email_field
83
+ u = User.new
84
+ u.email = "bjohnson@binarylogic.com"
85
+ assert !u.valid?
86
+ assert u.errors[:email].size > 0
87
+
88
+ u.email = "BJOHNSON@binarylogic.com"
89
+ assert !u.valid?
90
+ assert u.errors[:email].size > 0
91
+
92
+ u.email = "a@a.com"
93
+ assert !u.valid?
94
+ assert u.errors[:email].size == 0
95
+ end
96
+ end
97
+ end
@@ -0,0 +1,36 @@
1
+ require File.dirname(__FILE__) + '/../test_helper.rb'
2
+
3
+ module ActsAsAuthenticTest
4
+ class LoggedInStatusTest < ActiveSupport::TestCase
5
+ def test_logged_in_timeout_config
6
+ assert_equal 10.minutes.to_i, User.logged_in_timeout
7
+ assert_equal 10.minutes.to_i, Employee.logged_in_timeout
8
+
9
+ User.logged_in_timeout = 1.hour
10
+ assert_equal 1.hour.to_i, User.logged_in_timeout
11
+ User.logged_in_timeout 10.minutes
12
+ assert_equal 10.minutes.to_i, User.logged_in_timeout
13
+ end
14
+
15
+ def test_named_scope_logged_in
16
+ assert_equal 0, User.logged_in.count
17
+ User.first.update_attribute(:last_request_at, Time.now)
18
+ assert_equal 1, User.logged_in.count
19
+ end
20
+
21
+ def test_named_scope_logged_out
22
+ assert_equal 2, User.logged_out.count
23
+ User.first.update_attribute(:last_request_at, Time.now)
24
+ assert_equal 1, User.logged_out.count
25
+ end
26
+
27
+ def test_logged_in_logged_out
28
+ u = User.first
29
+ assert !u.logged_in?
30
+ assert u.logged_out?
31
+ u.last_request_at = Time.now
32
+ assert u.logged_in?
33
+ assert !u.logged_out?
34
+ end
35
+ end
36
+ end
@@ -0,0 +1,109 @@
1
+ require File.dirname(__FILE__) + '/../test_helper.rb'
2
+
3
+ module ActsAsAuthenticTest
4
+ class LoginTest < ActiveSupport::TestCase
5
+ def test_login_field_config
6
+ assert_equal :login, User.login_field
7
+ assert_nil Employee.login_field
8
+
9
+ User.login_field = :nope
10
+ assert_equal :nope, User.login_field
11
+ User.login_field :login
12
+ assert_equal :login, User.login_field
13
+ end
14
+
15
+ def test_validate_login_field_config
16
+ assert User.validate_login_field
17
+ assert Employee.validate_login_field
18
+
19
+ User.validate_login_field = false
20
+ assert !User.validate_login_field
21
+ User.validate_login_field true
22
+ assert User.validate_login_field
23
+ end
24
+
25
+ def test_validates_length_of_login_field_options_config
26
+ assert_equal({:within => 3..100}, User.validates_length_of_login_field_options)
27
+ assert_equal({:within => 3..100}, Employee.validates_length_of_login_field_options)
28
+
29
+ User.validates_length_of_login_field_options = {:yes => "no"}
30
+ assert_equal({:yes => "no"}, User.validates_length_of_login_field_options)
31
+ User.validates_length_of_login_field_options({:within => 3..100})
32
+ assert_equal({:within => 3..100}, User.validates_length_of_login_field_options)
33
+ end
34
+
35
+ def test_validates_format_of_login_field_options_config
36
+ default = {:with => /\A\w[\w\.+\-_@ ]+$/, :message => I18n.t('error_messages.login_invalid', :default => "should use only letters, numbers, spaces, and .-_@ please.")}
37
+ assert_equal default, User.validates_format_of_login_field_options
38
+ assert_equal default, Employee.validates_format_of_login_field_options
39
+
40
+ User.validates_format_of_login_field_options = {:yes => "no"}
41
+ assert_equal({:yes => "no"}, User.validates_format_of_login_field_options)
42
+ User.validates_format_of_login_field_options default
43
+ assert_equal default, User.validates_format_of_login_field_options
44
+ end
45
+
46
+ def test_validates_uniqueness_of_login_field_options_config
47
+ default = {:case_sensitive => false, :scope => User.validations_scope, :if => "#{User.login_field}_changed?".to_sym}
48
+ assert_equal default, User.validates_uniqueness_of_login_field_options
49
+
50
+ User.validates_uniqueness_of_login_field_options = {:yes => "no"}
51
+ assert_equal({:yes => "no"}, User.validates_uniqueness_of_login_field_options)
52
+ User.validates_uniqueness_of_login_field_options default
53
+ assert_equal default, User.validates_uniqueness_of_login_field_options
54
+ end
55
+
56
+ def test_validates_length_of_login_field
57
+ u = User.new
58
+ u.login = "a"
59
+ assert !u.valid?
60
+ assert u.errors[:login].size > 0
61
+
62
+ u.login = "aaaaaaaaaa"
63
+ assert !u.valid?
64
+ assert u.errors[:login].size == 0
65
+ end
66
+
67
+ def test_validates_format_of_login_field
68
+ u = User.new
69
+ u.login = "fdsf@^&*"
70
+ assert !u.valid?
71
+ assert u.errors[:login].size > 0
72
+
73
+ u.login = "fdsfdsfdsfdsfs"
74
+ assert !u.valid?
75
+ assert u.errors[:login].size == 0
76
+
77
+ u.login = "dakota.dux+1@gmail.com"
78
+ assert !u.valid?
79
+ assert u.errors[:login].size == 0
80
+ end
81
+
82
+ def test_validates_uniqueness_of_login_field
83
+ u = User.new
84
+ u.login = "bjohnson"
85
+ assert !u.valid?
86
+ assert u.errors[:login].size > 0
87
+
88
+ u.login = "BJOHNSON"
89
+ assert !u.valid?
90
+ assert u.errors[:login].size > 0
91
+
92
+ u.login = "fdsfdsf"
93
+ assert !u.valid?
94
+ assert u.errors[:login].size == 0
95
+ end
96
+
97
+ def test_find_by_smart_case_login_field
98
+ ben = users(:ben)
99
+ assert_equal ben, User.find_by_smart_case_login_field("bjohnson")
100
+ assert_equal ben, User.find_by_smart_case_login_field("BJOHNSON")
101
+ assert_equal ben, User.find_by_smart_case_login_field("Bjohnson")
102
+
103
+ drew = employees(:drew)
104
+ assert_equal drew, Employee.find_by_smart_case_login_field("dgainor@binarylogic.com")
105
+ assert_equal drew, Employee.find_by_smart_case_login_field("Dgainor@binarylogic.com")
106
+ assert_equal drew, Employee.find_by_smart_case_login_field("DGAINOR@BINARYLOGIC.COM")
107
+ end
108
+ end
109
+ end
@@ -0,0 +1,27 @@
1
+ require File.dirname(__FILE__) + '/../test_helper.rb'
2
+
3
+ module ActsAsAuthenticTest
4
+ class MagicColumnsTest < ActiveSupport::TestCase
5
+ def test_validates_numericality_of_login_count
6
+ u = User.new
7
+ u.login_count = -1
8
+ assert !u.valid?
9
+ assert u.errors[:login_count].size > 0
10
+
11
+ u.login_count = 0
12
+ assert !u.valid?
13
+ assert u.errors[:login_count].size == 0
14
+ end
15
+
16
+ def test_validates_numericality_of_failed_login_count
17
+ u = User.new
18
+ u.failed_login_count = -1
19
+ assert !u.valid?
20
+ assert u.errors[:failed_login_count].size > 0
21
+
22
+ u.failed_login_count = 0
23
+ assert !u.valid?
24
+ assert u.errors[:failed_login_count].size == 0
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,236 @@
1
+ require File.dirname(__FILE__) + '/../test_helper.rb'
2
+
3
+ module ActsAsAuthenticTest
4
+ class PasswordTest < ActiveSupport::TestCase
5
+ def test_crypted_password_field_config
6
+ assert_equal :crypted_password, User.crypted_password_field
7
+ assert_equal :crypted_password, Employee.crypted_password_field
8
+
9
+ User.crypted_password_field = :nope
10
+ assert_equal :nope, User.crypted_password_field
11
+ User.crypted_password_field :crypted_password
12
+ assert_equal :crypted_password, User.crypted_password_field
13
+ end
14
+
15
+ def test_password_salt_field_config
16
+ assert_equal :password_salt, User.password_salt_field
17
+ assert_equal :password_salt, Employee.password_salt_field
18
+
19
+ User.password_salt_field = :nope
20
+ assert_equal :nope, User.password_salt_field
21
+ User.password_salt_field :password_salt
22
+ assert_equal :password_salt, User.password_salt_field
23
+ end
24
+
25
+ def test_ignore_blank_passwords_config
26
+ assert User.ignore_blank_passwords
27
+ assert Employee.ignore_blank_passwords
28
+
29
+ User.ignore_blank_passwords = false
30
+ assert !User.ignore_blank_passwords
31
+ User.ignore_blank_passwords true
32
+ assert User.ignore_blank_passwords
33
+ end
34
+
35
+ def test_check_passwords_against_database
36
+ assert User.check_passwords_against_database
37
+ User.check_passwords_against_database = false
38
+ assert !User.check_passwords_against_database
39
+ User.check_passwords_against_database true
40
+ assert User.check_passwords_against_database
41
+ end
42
+
43
+ def test_validate_password_field_config
44
+ assert User.validate_password_field
45
+ assert Employee.validate_password_field
46
+
47
+ User.validate_password_field = false
48
+ assert !User.validate_password_field
49
+ User.validate_password_field true
50
+ assert User.validate_password_field
51
+ end
52
+
53
+ def test_validates_length_of_password_field_options_config
54
+ default = {:minimum => 4, :if => :require_password?}
55
+ assert_equal default, User.validates_length_of_password_field_options
56
+ assert_equal default, Employee.validates_length_of_password_field_options
57
+
58
+ User.validates_length_of_password_field_options = {:yes => "no"}
59
+ assert_equal({:yes => "no"}, User.validates_length_of_password_field_options)
60
+ User.validates_length_of_password_field_options default
61
+ assert_equal default, User.validates_length_of_password_field_options
62
+ end
63
+
64
+ def test_validates_confirmation_of_password_field_options_config
65
+ default = {:if => :require_password?}
66
+ assert_equal default, User.validates_confirmation_of_password_field_options
67
+ assert_equal default, Employee.validates_confirmation_of_password_field_options
68
+
69
+ User.validates_confirmation_of_password_field_options = {:yes => "no"}
70
+ assert_equal({:yes => "no"}, User.validates_confirmation_of_password_field_options)
71
+ User.validates_confirmation_of_password_field_options default
72
+ assert_equal default, User.validates_confirmation_of_password_field_options
73
+ end
74
+
75
+ def test_validates_length_of_password_confirmation_field_options_config
76
+ default = {:minimum => 4, :if => :require_password?}
77
+ assert_equal default, User.validates_length_of_password_confirmation_field_options
78
+ assert_equal default, Employee.validates_length_of_password_confirmation_field_options
79
+
80
+ User.validates_length_of_password_confirmation_field_options = {:yes => "no"}
81
+ assert_equal({:yes => "no"}, User.validates_length_of_password_confirmation_field_options)
82
+ User.validates_length_of_password_confirmation_field_options default
83
+ assert_equal default, User.validates_length_of_password_confirmation_field_options
84
+ end
85
+
86
+ def test_crypto_provider_config
87
+ assert_equal Authlogic::CryptoProviders::Sha512, User.crypto_provider
88
+ assert_equal Authlogic::CryptoProviders::AES256, Employee.crypto_provider
89
+
90
+ User.crypto_provider = Authlogic::CryptoProviders::BCrypt
91
+ assert_equal Authlogic::CryptoProviders::BCrypt, User.crypto_provider
92
+ User.crypto_provider Authlogic::CryptoProviders::Sha512
93
+ assert_equal Authlogic::CryptoProviders::Sha512, User.crypto_provider
94
+ end
95
+
96
+ def test_transition_from_crypto_providers_config
97
+ assert_equal [], User.transition_from_crypto_providers
98
+ assert_equal [], Employee.transition_from_crypto_providers
99
+
100
+ User.transition_from_crypto_providers = [Authlogic::CryptoProviders::BCrypt]
101
+ assert_equal [Authlogic::CryptoProviders::BCrypt], User.transition_from_crypto_providers
102
+ User.transition_from_crypto_providers []
103
+ assert_equal [], User.transition_from_crypto_providers
104
+ end
105
+
106
+ def test_validates_length_of_password
107
+ u = User.new
108
+ u.password_confirmation = "test2"
109
+ assert !u.valid?
110
+ assert u.errors[:password].size > 0
111
+
112
+ u.password = "test"
113
+ assert !u.valid?
114
+ assert u.errors[:password_confirmation].size == 0
115
+ end
116
+
117
+ def test_validates_confirmation_of_password
118
+ u = User.new
119
+ u.password = "test"
120
+ u.password_confirmation = "test2"
121
+ assert !u.valid?
122
+ assert u.errors[:password].size > 0
123
+
124
+ u.password_confirmation = "test"
125
+ assert !u.valid?
126
+ assert u.errors[:password].size == 0
127
+ end
128
+
129
+ def test_validates_length_of_password_confirmation
130
+ u = User.new
131
+
132
+ u.password = "test"
133
+ u.password_confirmation = ""
134
+ assert !u.valid?
135
+ assert u.errors[:password_confirmation].size > 0
136
+
137
+ u.password_confirmation = "test"
138
+ assert !u.valid?
139
+ assert u.errors[:password_confirmation].size == 0
140
+
141
+ ben = users(:ben)
142
+ assert ben.valid?
143
+
144
+ ben.password = "newpass"
145
+ assert !ben.valid?
146
+ assert ben.errors[:password_confirmation].size > 0
147
+
148
+ ben.password_confirmation = "newpass"
149
+ assert ben.valid?
150
+ end
151
+
152
+ def test_password
153
+ u = User.new
154
+ old_password_salt = u.password_salt
155
+ old_crypted_password = u.crypted_password
156
+ u.password = "test"
157
+ assert_not_equal old_password_salt, u.password_salt
158
+ assert_not_equal old_crypted_password, u.crypted_password
159
+ end
160
+
161
+ def test_transitioning_password
162
+ ben = users(:ben)
163
+ transition_password_to(Authlogic::CryptoProviders::BCrypt, ben)
164
+ transition_password_to(Authlogic::CryptoProviders::Sha1, ben, [Authlogic::CryptoProviders::Sha512, Authlogic::CryptoProviders::BCrypt])
165
+ transition_password_to(Authlogic::CryptoProviders::Sha512, ben, [Authlogic::CryptoProviders::Sha1, Authlogic::CryptoProviders::BCrypt])
166
+ end
167
+
168
+ def test_checks_password_against_database
169
+ ben = users(:ben)
170
+ ben.password = "new pass"
171
+ assert !ben.valid_password?("new pass")
172
+ assert ben.valid_password?("benrocks")
173
+ end
174
+
175
+ def test_checks_password_against_database_and_always_fails_on_new_records
176
+ user = User.new
177
+ user.password = "new pass"
178
+ assert !user.valid_password?("new pass")
179
+ end
180
+
181
+ def test_checks_password_against_object
182
+ ben = users(:ben)
183
+ ben.password = "new pass"
184
+ assert ben.valid_password?("new pass", false)
185
+ assert !ben.valid_password?("benrocks", false)
186
+ end
187
+
188
+ def test_reset_password
189
+ ben = users(:ben)
190
+ old_crypted_password = ben.crypted_password
191
+ old_password_salt = ben.password_salt
192
+
193
+ # soft reset
194
+ ben.reset_password
195
+ assert_not_equal old_crypted_password, ben.crypted_password
196
+ assert_not_equal old_password_salt, ben.password_salt
197
+
198
+ # make sure it didn't go into the db
199
+ ben.reload
200
+ assert_equal old_crypted_password, ben.crypted_password
201
+ assert_equal old_password_salt, ben.password_salt
202
+
203
+ # hard reset
204
+ assert ben.reset_password!
205
+ assert_not_equal old_crypted_password, ben.crypted_password
206
+ assert_not_equal old_password_salt, ben.password_salt
207
+
208
+ # make sure it did go into the db
209
+ ben.reload
210
+ assert_not_equal old_crypted_password, ben.crypted_password
211
+ assert_not_equal old_password_salt, ben.password_salt
212
+ end
213
+
214
+ private
215
+ def transition_password_to(crypto_provider, records, from_crypto_providers = Authlogic::CryptoProviders::Sha512)
216
+ records = [records] unless records.is_a?(Array)
217
+ User.acts_as_authentic do |c|
218
+ c.crypto_provider = crypto_provider
219
+ c.transition_from_crypto_providers = from_crypto_providers
220
+ end
221
+ records.each do |record|
222
+ old_hash = record.crypted_password
223
+ old_persistence_token = record.persistence_token
224
+ assert record.valid_password?(password_for(record))
225
+ assert_not_equal old_hash.to_s, record.crypted_password.to_s
226
+ assert_not_equal old_persistence_token.to_s, record.persistence_token.to_s
227
+
228
+ old_hash = record.crypted_password
229
+ old_persistence_token = record.persistence_token
230
+ assert record.valid_password?(password_for(record))
231
+ assert_equal old_hash.to_s, record.crypted_password.to_s
232
+ assert_equal old_persistence_token.to_s, record.persistence_token.to_s
233
+ end
234
+ end
235
+ end
236
+ end