drogus-authlogic 2.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +9 -0
- data/CHANGELOG.rdoc +345 -0
- data/LICENSE +20 -0
- data/README.rdoc +246 -0
- data/Rakefile +42 -0
- data/VERSION.yml +5 -0
- data/authlogic.gemspec +217 -0
- data/generators/session/session_generator.rb +9 -0
- data/generators/session/templates/session.rb +2 -0
- data/init.rb +1 -0
- data/lib/authlogic.rb +64 -0
- data/lib/authlogic/acts_as_authentic/base.rb +107 -0
- data/lib/authlogic/acts_as_authentic/email.rb +110 -0
- data/lib/authlogic/acts_as_authentic/logged_in_status.rb +60 -0
- data/lib/authlogic/acts_as_authentic/login.rb +137 -0
- data/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
- data/lib/authlogic/acts_as_authentic/password.rb +355 -0
- data/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
- data/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
- data/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
- data/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
- data/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
- data/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
- data/lib/authlogic/authenticates_many/association.rb +42 -0
- data/lib/authlogic/authenticates_many/base.rb +55 -0
- data/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
- data/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
- data/lib/authlogic/controller_adapters/rails_adapter.rb +48 -0
- data/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
- data/lib/authlogic/crypto_providers/aes256.rb +43 -0
- data/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
- data/lib/authlogic/crypto_providers/md5.rb +34 -0
- data/lib/authlogic/crypto_providers/sha1.rb +35 -0
- data/lib/authlogic/crypto_providers/sha256.rb +50 -0
- data/lib/authlogic/crypto_providers/sha512.rb +50 -0
- data/lib/authlogic/crypto_providers/wordpress.rb +43 -0
- data/lib/authlogic/i18n.rb +83 -0
- data/lib/authlogic/i18n/translator.rb +15 -0
- data/lib/authlogic/random.rb +33 -0
- data/lib/authlogic/regex.rb +25 -0
- data/lib/authlogic/session/activation.rb +58 -0
- data/lib/authlogic/session/active_record_trickery.rb +64 -0
- data/lib/authlogic/session/base.rb +37 -0
- data/lib/authlogic/session/brute_force_protection.rb +96 -0
- data/lib/authlogic/session/callbacks.rb +99 -0
- data/lib/authlogic/session/cookies.rb +130 -0
- data/lib/authlogic/session/existence.rb +93 -0
- data/lib/authlogic/session/foundation.rb +63 -0
- data/lib/authlogic/session/http_auth.rb +58 -0
- data/lib/authlogic/session/id.rb +41 -0
- data/lib/authlogic/session/klass.rb +78 -0
- data/lib/authlogic/session/magic_columns.rb +95 -0
- data/lib/authlogic/session/magic_states.rb +59 -0
- data/lib/authlogic/session/params.rb +101 -0
- data/lib/authlogic/session/password.rb +240 -0
- data/lib/authlogic/session/perishable_token.rb +18 -0
- data/lib/authlogic/session/persistence.rb +70 -0
- data/lib/authlogic/session/priority_record.rb +34 -0
- data/lib/authlogic/session/scopes.rb +101 -0
- data/lib/authlogic/session/session.rb +62 -0
- data/lib/authlogic/session/timeout.rb +82 -0
- data/lib/authlogic/session/unauthorized_record.rb +50 -0
- data/lib/authlogic/session/validation.rb +82 -0
- data/lib/authlogic/test_case.rb +120 -0
- data/lib/authlogic/test_case/mock_controller.rb +45 -0
- data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
- data/lib/authlogic/test_case/mock_logger.rb +10 -0
- data/lib/authlogic/test_case/mock_request.rb +19 -0
- data/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
- data/rails/init.rb +1 -0
- data/shoulda_macros/authlogic.rb +69 -0
- data/test/acts_as_authentic_test/base_test.rb +18 -0
- data/test/acts_as_authentic_test/email_test.rb +97 -0
- data/test/acts_as_authentic_test/logged_in_status_test.rb +36 -0
- data/test/acts_as_authentic_test/login_test.rb +109 -0
- data/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
- data/test/acts_as_authentic_test/password_test.rb +236 -0
- data/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
- data/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
- data/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
- data/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
- data/test/acts_as_authentic_test/single_access_test.rb +44 -0
- data/test/authenticates_many_test.rb +16 -0
- data/test/crypto_provider_test/aes256_test.rb +14 -0
- data/test/crypto_provider_test/bcrypt_test.rb +14 -0
- data/test/crypto_provider_test/sha1_test.rb +23 -0
- data/test/crypto_provider_test/sha256_test.rb +14 -0
- data/test/crypto_provider_test/sha512_test.rb +14 -0
- data/test/fixtures/companies.yml +5 -0
- data/test/fixtures/employees.yml +17 -0
- data/test/fixtures/projects.yml +3 -0
- data/test/fixtures/users.yml +24 -0
- data/test/i18n_test.rb +33 -0
- data/test/libs/affiliate.rb +7 -0
- data/test/libs/company.rb +6 -0
- data/test/libs/employee.rb +7 -0
- data/test/libs/employee_session.rb +2 -0
- data/test/libs/ldaper.rb +3 -0
- data/test/libs/ordered_hash.rb +9 -0
- data/test/libs/project.rb +3 -0
- data/test/libs/user.rb +5 -0
- data/test/libs/user_session.rb +6 -0
- data/test/random_test.rb +49 -0
- data/test/session_test/activation_test.rb +43 -0
- data/test/session_test/active_record_trickery_test.rb +36 -0
- data/test/session_test/brute_force_protection_test.rb +101 -0
- data/test/session_test/callbacks_test.rb +6 -0
- data/test/session_test/cookies_test.rb +112 -0
- data/test/session_test/credentials_test.rb +0 -0
- data/test/session_test/existence_test.rb +64 -0
- data/test/session_test/http_auth_test.rb +28 -0
- data/test/session_test/id_test.rb +17 -0
- data/test/session_test/klass_test.rb +40 -0
- data/test/session_test/magic_columns_test.rb +62 -0
- data/test/session_test/magic_states_test.rb +60 -0
- data/test/session_test/params_test.rb +53 -0
- data/test/session_test/password_test.rb +106 -0
- data/test/session_test/perishability_test.rb +15 -0
- data/test/session_test/persistence_test.rb +21 -0
- data/test/session_test/scopes_test.rb +60 -0
- data/test/session_test/session_test.rb +59 -0
- data/test/session_test/timeout_test.rb +52 -0
- data/test/session_test/unauthorized_record_test.rb +13 -0
- data/test/session_test/validation_test.rb +23 -0
- data/test/test_helper.rb +182 -0
- metadata +238 -0
@@ -0,0 +1,19 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module TestCase
|
3
|
+
class MockRequest # :nodoc:
|
4
|
+
attr_accessor :controller
|
5
|
+
|
6
|
+
def initialize(controller)
|
7
|
+
self.controller = controller
|
8
|
+
end
|
9
|
+
|
10
|
+
def remote_ip
|
11
|
+
(controller && controller.respond_to?(:env) && controller.env.is_a?(Hash) && controller.env['REMOTE_ADDR']) || "1.1.1.1"
|
12
|
+
end
|
13
|
+
|
14
|
+
private
|
15
|
+
def method_missing(*args, &block)
|
16
|
+
end
|
17
|
+
end
|
18
|
+
end
|
19
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
module Authlogic
|
2
|
+
module TestCase
|
3
|
+
# Adapts authlogic to work with the @request object when testing. This way Authlogic can set cookies and what not before
|
4
|
+
# a request is made, ultimately letting you log in users in functional tests.
|
5
|
+
class RailsRequestAdapter < ControllerAdapters::AbstractAdapter
|
6
|
+
def authenticate_with_http_basic(&block)
|
7
|
+
end
|
8
|
+
|
9
|
+
def cookies
|
10
|
+
new_cookies = MockCookieJar.new
|
11
|
+
super.each do |key, value|
|
12
|
+
new_cookies[key] = value[:value]
|
13
|
+
end
|
14
|
+
new_cookies
|
15
|
+
end
|
16
|
+
|
17
|
+
def cookie_domain
|
18
|
+
nil
|
19
|
+
end
|
20
|
+
|
21
|
+
def request
|
22
|
+
@request ||= MockRequest.new(controller)
|
23
|
+
end
|
24
|
+
|
25
|
+
def request_content_type
|
26
|
+
request.format.to_s
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
data/rails/init.rb
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
require "authlogic"
|
@@ -0,0 +1,69 @@
|
|
1
|
+
# Test::Unit
|
2
|
+
# Place this file into your test/shoulda_macros directory
|
3
|
+
#
|
4
|
+
# Example:
|
5
|
+
#
|
6
|
+
# class UserTest
|
7
|
+
# should_have_authlogic
|
8
|
+
# end
|
9
|
+
#
|
10
|
+
# Rspec
|
11
|
+
# Place this file into your spec/support/shoulda directory
|
12
|
+
#
|
13
|
+
# Example:
|
14
|
+
#
|
15
|
+
# describe User do
|
16
|
+
# it { should have_authlogic }
|
17
|
+
# end
|
18
|
+
|
19
|
+
module Authlogic
|
20
|
+
module Shoulda
|
21
|
+
|
22
|
+
module Matchers
|
23
|
+
def have_authlogic
|
24
|
+
HaveAuthlogic.new
|
25
|
+
end
|
26
|
+
alias_method :be_authentic, :have_authlogic
|
27
|
+
|
28
|
+
class HaveAuthlogic
|
29
|
+
|
30
|
+
def matches?(subject)
|
31
|
+
subject.respond_to?(:password=) && subject.respond_to?(:valid_password?)
|
32
|
+
end
|
33
|
+
|
34
|
+
def failure_message
|
35
|
+
"Add the line 'acts_as_authentic' to your model"
|
36
|
+
end
|
37
|
+
|
38
|
+
def description
|
39
|
+
"have Authlogic"
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
end
|
44
|
+
|
45
|
+
module Macros
|
46
|
+
include Matchers
|
47
|
+
|
48
|
+
def should_have_authlogic
|
49
|
+
klass = described_type rescue model_class
|
50
|
+
matcher = HaveAuthlogic.new
|
51
|
+
|
52
|
+
should matcher.description do
|
53
|
+
assert matcher.matches?(klass.new), matcher.failure_message
|
54
|
+
end
|
55
|
+
end
|
56
|
+
alias_method :should_be_authentic, :should_have_authlogic
|
57
|
+
|
58
|
+
end
|
59
|
+
|
60
|
+
end
|
61
|
+
end
|
62
|
+
|
63
|
+
if defined? Spec
|
64
|
+
Spec::Runner.configure do |config|
|
65
|
+
config.include(Authlogic::Shoulda::Matchers)
|
66
|
+
end
|
67
|
+
else
|
68
|
+
Test::Unit::TestCase.class_eval { extend Authlogic::Shoulda::Macros }
|
69
|
+
end
|
@@ -0,0 +1,18 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/../test_helper.rb'
|
2
|
+
|
3
|
+
module ActsAsAuthenticTest
|
4
|
+
class BaseTest < ActiveSupport::TestCase
|
5
|
+
def test_acts_as_authentic
|
6
|
+
assert_nothing_raised do
|
7
|
+
User.acts_as_authentic do
|
8
|
+
end
|
9
|
+
end
|
10
|
+
end
|
11
|
+
|
12
|
+
def test_acts_as_authentic_with_old_config
|
13
|
+
assert_raise(ArgumentError) do
|
14
|
+
User.acts_as_authentic({})
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
18
|
+
end
|
@@ -0,0 +1,97 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/../test_helper.rb'
|
2
|
+
|
3
|
+
module ActsAsAuthenticTest
|
4
|
+
class EmailTest < ActiveSupport::TestCase
|
5
|
+
def test_email_field_config
|
6
|
+
assert_equal :email, User.email_field
|
7
|
+
assert_equal :email, Employee.email_field
|
8
|
+
|
9
|
+
User.email_field = :nope
|
10
|
+
assert_equal :nope, User.email_field
|
11
|
+
User.email_field :email
|
12
|
+
assert_equal :email, User.email_field
|
13
|
+
end
|
14
|
+
|
15
|
+
def test_validate_email_field_config
|
16
|
+
assert User.validate_email_field
|
17
|
+
assert Employee.validate_email_field
|
18
|
+
|
19
|
+
User.validate_email_field = false
|
20
|
+
assert !User.validate_email_field
|
21
|
+
User.validate_email_field true
|
22
|
+
assert User.validate_email_field
|
23
|
+
end
|
24
|
+
|
25
|
+
def test_validates_length_of_email_field_options_config
|
26
|
+
assert_equal({:within => 6..100}, User.validates_length_of_email_field_options)
|
27
|
+
assert_equal({:within => 6..100}, Employee.validates_length_of_email_field_options)
|
28
|
+
|
29
|
+
User.validates_length_of_email_field_options = {:yes => "no"}
|
30
|
+
assert_equal({:yes => "no"}, User.validates_length_of_email_field_options)
|
31
|
+
User.validates_length_of_email_field_options({:within => 6..100})
|
32
|
+
assert_equal({:within => 6..100}, User.validates_length_of_email_field_options)
|
33
|
+
end
|
34
|
+
|
35
|
+
def test_validates_format_of_email_field_options_config
|
36
|
+
default = {:with => Authlogic::Regex.email, :message => I18n.t('error_messages.email_invalid', :default => "should look like an email address.")}
|
37
|
+
assert_equal default, User.validates_format_of_email_field_options
|
38
|
+
assert_equal default, Employee.validates_format_of_email_field_options
|
39
|
+
|
40
|
+
User.validates_format_of_email_field_options = {:yes => "no"}
|
41
|
+
assert_equal({:yes => "no"}, User.validates_format_of_email_field_options)
|
42
|
+
User.validates_format_of_email_field_options default
|
43
|
+
assert_equal default, User.validates_format_of_email_field_options
|
44
|
+
end
|
45
|
+
|
46
|
+
def test_validates_uniqueness_of_email_field_options_config
|
47
|
+
default = {:case_sensitive => false, :scope => Employee.validations_scope, :if => "#{Employee.email_field}_changed?".to_sym}
|
48
|
+
assert_equal default, Employee.validates_uniqueness_of_email_field_options
|
49
|
+
|
50
|
+
Employee.validates_uniqueness_of_email_field_options = {:yes => "no"}
|
51
|
+
assert_equal({:yes => "no"}, Employee.validates_uniqueness_of_email_field_options)
|
52
|
+
Employee.validates_uniqueness_of_email_field_options default
|
53
|
+
assert_equal default, Employee.validates_uniqueness_of_email_field_options
|
54
|
+
end
|
55
|
+
|
56
|
+
def test_validates_length_of_email_field
|
57
|
+
u = User.new
|
58
|
+
u.email = "a@a.a"
|
59
|
+
assert !u.valid?
|
60
|
+
assert u.errors[:email].size > 0
|
61
|
+
|
62
|
+
u.email = "a@a.com"
|
63
|
+
assert !u.valid?
|
64
|
+
assert u.errors[:email].size == 0
|
65
|
+
end
|
66
|
+
|
67
|
+
def test_validates_format_of_email_field
|
68
|
+
u = User.new
|
69
|
+
u.email = "aaaaaaaaaaaaa"
|
70
|
+
u.valid?
|
71
|
+
assert u.errors[:email].size > 0
|
72
|
+
|
73
|
+
u.email = "a@a.com"
|
74
|
+
u.valid?
|
75
|
+
assert u.errors[:email].size == 0
|
76
|
+
|
77
|
+
u.email = "dakota.dux+1@gmail.com"
|
78
|
+
u.valid?
|
79
|
+
assert u.errors[:email].size == 0
|
80
|
+
end
|
81
|
+
|
82
|
+
def test_validates_uniqueness_of_email_field
|
83
|
+
u = User.new
|
84
|
+
u.email = "bjohnson@binarylogic.com"
|
85
|
+
assert !u.valid?
|
86
|
+
assert u.errors[:email].size > 0
|
87
|
+
|
88
|
+
u.email = "BJOHNSON@binarylogic.com"
|
89
|
+
assert !u.valid?
|
90
|
+
assert u.errors[:email].size > 0
|
91
|
+
|
92
|
+
u.email = "a@a.com"
|
93
|
+
assert !u.valid?
|
94
|
+
assert u.errors[:email].size == 0
|
95
|
+
end
|
96
|
+
end
|
97
|
+
end
|
@@ -0,0 +1,36 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/../test_helper.rb'
|
2
|
+
|
3
|
+
module ActsAsAuthenticTest
|
4
|
+
class LoggedInStatusTest < ActiveSupport::TestCase
|
5
|
+
def test_logged_in_timeout_config
|
6
|
+
assert_equal 10.minutes.to_i, User.logged_in_timeout
|
7
|
+
assert_equal 10.minutes.to_i, Employee.logged_in_timeout
|
8
|
+
|
9
|
+
User.logged_in_timeout = 1.hour
|
10
|
+
assert_equal 1.hour.to_i, User.logged_in_timeout
|
11
|
+
User.logged_in_timeout 10.minutes
|
12
|
+
assert_equal 10.minutes.to_i, User.logged_in_timeout
|
13
|
+
end
|
14
|
+
|
15
|
+
def test_named_scope_logged_in
|
16
|
+
assert_equal 0, User.logged_in.count
|
17
|
+
User.first.update_attribute(:last_request_at, Time.now)
|
18
|
+
assert_equal 1, User.logged_in.count
|
19
|
+
end
|
20
|
+
|
21
|
+
def test_named_scope_logged_out
|
22
|
+
assert_equal 2, User.logged_out.count
|
23
|
+
User.first.update_attribute(:last_request_at, Time.now)
|
24
|
+
assert_equal 1, User.logged_out.count
|
25
|
+
end
|
26
|
+
|
27
|
+
def test_logged_in_logged_out
|
28
|
+
u = User.first
|
29
|
+
assert !u.logged_in?
|
30
|
+
assert u.logged_out?
|
31
|
+
u.last_request_at = Time.now
|
32
|
+
assert u.logged_in?
|
33
|
+
assert !u.logged_out?
|
34
|
+
end
|
35
|
+
end
|
36
|
+
end
|
@@ -0,0 +1,109 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/../test_helper.rb'
|
2
|
+
|
3
|
+
module ActsAsAuthenticTest
|
4
|
+
class LoginTest < ActiveSupport::TestCase
|
5
|
+
def test_login_field_config
|
6
|
+
assert_equal :login, User.login_field
|
7
|
+
assert_nil Employee.login_field
|
8
|
+
|
9
|
+
User.login_field = :nope
|
10
|
+
assert_equal :nope, User.login_field
|
11
|
+
User.login_field :login
|
12
|
+
assert_equal :login, User.login_field
|
13
|
+
end
|
14
|
+
|
15
|
+
def test_validate_login_field_config
|
16
|
+
assert User.validate_login_field
|
17
|
+
assert Employee.validate_login_field
|
18
|
+
|
19
|
+
User.validate_login_field = false
|
20
|
+
assert !User.validate_login_field
|
21
|
+
User.validate_login_field true
|
22
|
+
assert User.validate_login_field
|
23
|
+
end
|
24
|
+
|
25
|
+
def test_validates_length_of_login_field_options_config
|
26
|
+
assert_equal({:within => 3..100}, User.validates_length_of_login_field_options)
|
27
|
+
assert_equal({:within => 3..100}, Employee.validates_length_of_login_field_options)
|
28
|
+
|
29
|
+
User.validates_length_of_login_field_options = {:yes => "no"}
|
30
|
+
assert_equal({:yes => "no"}, User.validates_length_of_login_field_options)
|
31
|
+
User.validates_length_of_login_field_options({:within => 3..100})
|
32
|
+
assert_equal({:within => 3..100}, User.validates_length_of_login_field_options)
|
33
|
+
end
|
34
|
+
|
35
|
+
def test_validates_format_of_login_field_options_config
|
36
|
+
default = {:with => /\A\w[\w\.+\-_@ ]+$/, :message => I18n.t('error_messages.login_invalid', :default => "should use only letters, numbers, spaces, and .-_@ please.")}
|
37
|
+
assert_equal default, User.validates_format_of_login_field_options
|
38
|
+
assert_equal default, Employee.validates_format_of_login_field_options
|
39
|
+
|
40
|
+
User.validates_format_of_login_field_options = {:yes => "no"}
|
41
|
+
assert_equal({:yes => "no"}, User.validates_format_of_login_field_options)
|
42
|
+
User.validates_format_of_login_field_options default
|
43
|
+
assert_equal default, User.validates_format_of_login_field_options
|
44
|
+
end
|
45
|
+
|
46
|
+
def test_validates_uniqueness_of_login_field_options_config
|
47
|
+
default = {:case_sensitive => false, :scope => User.validations_scope, :if => "#{User.login_field}_changed?".to_sym}
|
48
|
+
assert_equal default, User.validates_uniqueness_of_login_field_options
|
49
|
+
|
50
|
+
User.validates_uniqueness_of_login_field_options = {:yes => "no"}
|
51
|
+
assert_equal({:yes => "no"}, User.validates_uniqueness_of_login_field_options)
|
52
|
+
User.validates_uniqueness_of_login_field_options default
|
53
|
+
assert_equal default, User.validates_uniqueness_of_login_field_options
|
54
|
+
end
|
55
|
+
|
56
|
+
def test_validates_length_of_login_field
|
57
|
+
u = User.new
|
58
|
+
u.login = "a"
|
59
|
+
assert !u.valid?
|
60
|
+
assert u.errors[:login].size > 0
|
61
|
+
|
62
|
+
u.login = "aaaaaaaaaa"
|
63
|
+
assert !u.valid?
|
64
|
+
assert u.errors[:login].size == 0
|
65
|
+
end
|
66
|
+
|
67
|
+
def test_validates_format_of_login_field
|
68
|
+
u = User.new
|
69
|
+
u.login = "fdsf@^&*"
|
70
|
+
assert !u.valid?
|
71
|
+
assert u.errors[:login].size > 0
|
72
|
+
|
73
|
+
u.login = "fdsfdsfdsfdsfs"
|
74
|
+
assert !u.valid?
|
75
|
+
assert u.errors[:login].size == 0
|
76
|
+
|
77
|
+
u.login = "dakota.dux+1@gmail.com"
|
78
|
+
assert !u.valid?
|
79
|
+
assert u.errors[:login].size == 0
|
80
|
+
end
|
81
|
+
|
82
|
+
def test_validates_uniqueness_of_login_field
|
83
|
+
u = User.new
|
84
|
+
u.login = "bjohnson"
|
85
|
+
assert !u.valid?
|
86
|
+
assert u.errors[:login].size > 0
|
87
|
+
|
88
|
+
u.login = "BJOHNSON"
|
89
|
+
assert !u.valid?
|
90
|
+
assert u.errors[:login].size > 0
|
91
|
+
|
92
|
+
u.login = "fdsfdsf"
|
93
|
+
assert !u.valid?
|
94
|
+
assert u.errors[:login].size == 0
|
95
|
+
end
|
96
|
+
|
97
|
+
def test_find_by_smart_case_login_field
|
98
|
+
ben = users(:ben)
|
99
|
+
assert_equal ben, User.find_by_smart_case_login_field("bjohnson")
|
100
|
+
assert_equal ben, User.find_by_smart_case_login_field("BJOHNSON")
|
101
|
+
assert_equal ben, User.find_by_smart_case_login_field("Bjohnson")
|
102
|
+
|
103
|
+
drew = employees(:drew)
|
104
|
+
assert_equal drew, Employee.find_by_smart_case_login_field("dgainor@binarylogic.com")
|
105
|
+
assert_equal drew, Employee.find_by_smart_case_login_field("Dgainor@binarylogic.com")
|
106
|
+
assert_equal drew, Employee.find_by_smart_case_login_field("DGAINOR@BINARYLOGIC.COM")
|
107
|
+
end
|
108
|
+
end
|
109
|
+
end
|
@@ -0,0 +1,27 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/../test_helper.rb'
|
2
|
+
|
3
|
+
module ActsAsAuthenticTest
|
4
|
+
class MagicColumnsTest < ActiveSupport::TestCase
|
5
|
+
def test_validates_numericality_of_login_count
|
6
|
+
u = User.new
|
7
|
+
u.login_count = -1
|
8
|
+
assert !u.valid?
|
9
|
+
assert u.errors[:login_count].size > 0
|
10
|
+
|
11
|
+
u.login_count = 0
|
12
|
+
assert !u.valid?
|
13
|
+
assert u.errors[:login_count].size == 0
|
14
|
+
end
|
15
|
+
|
16
|
+
def test_validates_numericality_of_failed_login_count
|
17
|
+
u = User.new
|
18
|
+
u.failed_login_count = -1
|
19
|
+
assert !u.valid?
|
20
|
+
assert u.errors[:failed_login_count].size > 0
|
21
|
+
|
22
|
+
u.failed_login_count = 0
|
23
|
+
assert !u.valid?
|
24
|
+
assert u.errors[:failed_login_count].size == 0
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
@@ -0,0 +1,236 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/../test_helper.rb'
|
2
|
+
|
3
|
+
module ActsAsAuthenticTest
|
4
|
+
class PasswordTest < ActiveSupport::TestCase
|
5
|
+
def test_crypted_password_field_config
|
6
|
+
assert_equal :crypted_password, User.crypted_password_field
|
7
|
+
assert_equal :crypted_password, Employee.crypted_password_field
|
8
|
+
|
9
|
+
User.crypted_password_field = :nope
|
10
|
+
assert_equal :nope, User.crypted_password_field
|
11
|
+
User.crypted_password_field :crypted_password
|
12
|
+
assert_equal :crypted_password, User.crypted_password_field
|
13
|
+
end
|
14
|
+
|
15
|
+
def test_password_salt_field_config
|
16
|
+
assert_equal :password_salt, User.password_salt_field
|
17
|
+
assert_equal :password_salt, Employee.password_salt_field
|
18
|
+
|
19
|
+
User.password_salt_field = :nope
|
20
|
+
assert_equal :nope, User.password_salt_field
|
21
|
+
User.password_salt_field :password_salt
|
22
|
+
assert_equal :password_salt, User.password_salt_field
|
23
|
+
end
|
24
|
+
|
25
|
+
def test_ignore_blank_passwords_config
|
26
|
+
assert User.ignore_blank_passwords
|
27
|
+
assert Employee.ignore_blank_passwords
|
28
|
+
|
29
|
+
User.ignore_blank_passwords = false
|
30
|
+
assert !User.ignore_blank_passwords
|
31
|
+
User.ignore_blank_passwords true
|
32
|
+
assert User.ignore_blank_passwords
|
33
|
+
end
|
34
|
+
|
35
|
+
def test_check_passwords_against_database
|
36
|
+
assert User.check_passwords_against_database
|
37
|
+
User.check_passwords_against_database = false
|
38
|
+
assert !User.check_passwords_against_database
|
39
|
+
User.check_passwords_against_database true
|
40
|
+
assert User.check_passwords_against_database
|
41
|
+
end
|
42
|
+
|
43
|
+
def test_validate_password_field_config
|
44
|
+
assert User.validate_password_field
|
45
|
+
assert Employee.validate_password_field
|
46
|
+
|
47
|
+
User.validate_password_field = false
|
48
|
+
assert !User.validate_password_field
|
49
|
+
User.validate_password_field true
|
50
|
+
assert User.validate_password_field
|
51
|
+
end
|
52
|
+
|
53
|
+
def test_validates_length_of_password_field_options_config
|
54
|
+
default = {:minimum => 4, :if => :require_password?}
|
55
|
+
assert_equal default, User.validates_length_of_password_field_options
|
56
|
+
assert_equal default, Employee.validates_length_of_password_field_options
|
57
|
+
|
58
|
+
User.validates_length_of_password_field_options = {:yes => "no"}
|
59
|
+
assert_equal({:yes => "no"}, User.validates_length_of_password_field_options)
|
60
|
+
User.validates_length_of_password_field_options default
|
61
|
+
assert_equal default, User.validates_length_of_password_field_options
|
62
|
+
end
|
63
|
+
|
64
|
+
def test_validates_confirmation_of_password_field_options_config
|
65
|
+
default = {:if => :require_password?}
|
66
|
+
assert_equal default, User.validates_confirmation_of_password_field_options
|
67
|
+
assert_equal default, Employee.validates_confirmation_of_password_field_options
|
68
|
+
|
69
|
+
User.validates_confirmation_of_password_field_options = {:yes => "no"}
|
70
|
+
assert_equal({:yes => "no"}, User.validates_confirmation_of_password_field_options)
|
71
|
+
User.validates_confirmation_of_password_field_options default
|
72
|
+
assert_equal default, User.validates_confirmation_of_password_field_options
|
73
|
+
end
|
74
|
+
|
75
|
+
def test_validates_length_of_password_confirmation_field_options_config
|
76
|
+
default = {:minimum => 4, :if => :require_password?}
|
77
|
+
assert_equal default, User.validates_length_of_password_confirmation_field_options
|
78
|
+
assert_equal default, Employee.validates_length_of_password_confirmation_field_options
|
79
|
+
|
80
|
+
User.validates_length_of_password_confirmation_field_options = {:yes => "no"}
|
81
|
+
assert_equal({:yes => "no"}, User.validates_length_of_password_confirmation_field_options)
|
82
|
+
User.validates_length_of_password_confirmation_field_options default
|
83
|
+
assert_equal default, User.validates_length_of_password_confirmation_field_options
|
84
|
+
end
|
85
|
+
|
86
|
+
def test_crypto_provider_config
|
87
|
+
assert_equal Authlogic::CryptoProviders::Sha512, User.crypto_provider
|
88
|
+
assert_equal Authlogic::CryptoProviders::AES256, Employee.crypto_provider
|
89
|
+
|
90
|
+
User.crypto_provider = Authlogic::CryptoProviders::BCrypt
|
91
|
+
assert_equal Authlogic::CryptoProviders::BCrypt, User.crypto_provider
|
92
|
+
User.crypto_provider Authlogic::CryptoProviders::Sha512
|
93
|
+
assert_equal Authlogic::CryptoProviders::Sha512, User.crypto_provider
|
94
|
+
end
|
95
|
+
|
96
|
+
def test_transition_from_crypto_providers_config
|
97
|
+
assert_equal [], User.transition_from_crypto_providers
|
98
|
+
assert_equal [], Employee.transition_from_crypto_providers
|
99
|
+
|
100
|
+
User.transition_from_crypto_providers = [Authlogic::CryptoProviders::BCrypt]
|
101
|
+
assert_equal [Authlogic::CryptoProviders::BCrypt], User.transition_from_crypto_providers
|
102
|
+
User.transition_from_crypto_providers []
|
103
|
+
assert_equal [], User.transition_from_crypto_providers
|
104
|
+
end
|
105
|
+
|
106
|
+
def test_validates_length_of_password
|
107
|
+
u = User.new
|
108
|
+
u.password_confirmation = "test2"
|
109
|
+
assert !u.valid?
|
110
|
+
assert u.errors[:password].size > 0
|
111
|
+
|
112
|
+
u.password = "test"
|
113
|
+
assert !u.valid?
|
114
|
+
assert u.errors[:password_confirmation].size == 0
|
115
|
+
end
|
116
|
+
|
117
|
+
def test_validates_confirmation_of_password
|
118
|
+
u = User.new
|
119
|
+
u.password = "test"
|
120
|
+
u.password_confirmation = "test2"
|
121
|
+
assert !u.valid?
|
122
|
+
assert u.errors[:password].size > 0
|
123
|
+
|
124
|
+
u.password_confirmation = "test"
|
125
|
+
assert !u.valid?
|
126
|
+
assert u.errors[:password].size == 0
|
127
|
+
end
|
128
|
+
|
129
|
+
def test_validates_length_of_password_confirmation
|
130
|
+
u = User.new
|
131
|
+
|
132
|
+
u.password = "test"
|
133
|
+
u.password_confirmation = ""
|
134
|
+
assert !u.valid?
|
135
|
+
assert u.errors[:password_confirmation].size > 0
|
136
|
+
|
137
|
+
u.password_confirmation = "test"
|
138
|
+
assert !u.valid?
|
139
|
+
assert u.errors[:password_confirmation].size == 0
|
140
|
+
|
141
|
+
ben = users(:ben)
|
142
|
+
assert ben.valid?
|
143
|
+
|
144
|
+
ben.password = "newpass"
|
145
|
+
assert !ben.valid?
|
146
|
+
assert ben.errors[:password_confirmation].size > 0
|
147
|
+
|
148
|
+
ben.password_confirmation = "newpass"
|
149
|
+
assert ben.valid?
|
150
|
+
end
|
151
|
+
|
152
|
+
def test_password
|
153
|
+
u = User.new
|
154
|
+
old_password_salt = u.password_salt
|
155
|
+
old_crypted_password = u.crypted_password
|
156
|
+
u.password = "test"
|
157
|
+
assert_not_equal old_password_salt, u.password_salt
|
158
|
+
assert_not_equal old_crypted_password, u.crypted_password
|
159
|
+
end
|
160
|
+
|
161
|
+
def test_transitioning_password
|
162
|
+
ben = users(:ben)
|
163
|
+
transition_password_to(Authlogic::CryptoProviders::BCrypt, ben)
|
164
|
+
transition_password_to(Authlogic::CryptoProviders::Sha1, ben, [Authlogic::CryptoProviders::Sha512, Authlogic::CryptoProviders::BCrypt])
|
165
|
+
transition_password_to(Authlogic::CryptoProviders::Sha512, ben, [Authlogic::CryptoProviders::Sha1, Authlogic::CryptoProviders::BCrypt])
|
166
|
+
end
|
167
|
+
|
168
|
+
def test_checks_password_against_database
|
169
|
+
ben = users(:ben)
|
170
|
+
ben.password = "new pass"
|
171
|
+
assert !ben.valid_password?("new pass")
|
172
|
+
assert ben.valid_password?("benrocks")
|
173
|
+
end
|
174
|
+
|
175
|
+
def test_checks_password_against_database_and_always_fails_on_new_records
|
176
|
+
user = User.new
|
177
|
+
user.password = "new pass"
|
178
|
+
assert !user.valid_password?("new pass")
|
179
|
+
end
|
180
|
+
|
181
|
+
def test_checks_password_against_object
|
182
|
+
ben = users(:ben)
|
183
|
+
ben.password = "new pass"
|
184
|
+
assert ben.valid_password?("new pass", false)
|
185
|
+
assert !ben.valid_password?("benrocks", false)
|
186
|
+
end
|
187
|
+
|
188
|
+
def test_reset_password
|
189
|
+
ben = users(:ben)
|
190
|
+
old_crypted_password = ben.crypted_password
|
191
|
+
old_password_salt = ben.password_salt
|
192
|
+
|
193
|
+
# soft reset
|
194
|
+
ben.reset_password
|
195
|
+
assert_not_equal old_crypted_password, ben.crypted_password
|
196
|
+
assert_not_equal old_password_salt, ben.password_salt
|
197
|
+
|
198
|
+
# make sure it didn't go into the db
|
199
|
+
ben.reload
|
200
|
+
assert_equal old_crypted_password, ben.crypted_password
|
201
|
+
assert_equal old_password_salt, ben.password_salt
|
202
|
+
|
203
|
+
# hard reset
|
204
|
+
assert ben.reset_password!
|
205
|
+
assert_not_equal old_crypted_password, ben.crypted_password
|
206
|
+
assert_not_equal old_password_salt, ben.password_salt
|
207
|
+
|
208
|
+
# make sure it did go into the db
|
209
|
+
ben.reload
|
210
|
+
assert_not_equal old_crypted_password, ben.crypted_password
|
211
|
+
assert_not_equal old_password_salt, ben.password_salt
|
212
|
+
end
|
213
|
+
|
214
|
+
private
|
215
|
+
def transition_password_to(crypto_provider, records, from_crypto_providers = Authlogic::CryptoProviders::Sha512)
|
216
|
+
records = [records] unless records.is_a?(Array)
|
217
|
+
User.acts_as_authentic do |c|
|
218
|
+
c.crypto_provider = crypto_provider
|
219
|
+
c.transition_from_crypto_providers = from_crypto_providers
|
220
|
+
end
|
221
|
+
records.each do |record|
|
222
|
+
old_hash = record.crypted_password
|
223
|
+
old_persistence_token = record.persistence_token
|
224
|
+
assert record.valid_password?(password_for(record))
|
225
|
+
assert_not_equal old_hash.to_s, record.crypted_password.to_s
|
226
|
+
assert_not_equal old_persistence_token.to_s, record.persistence_token.to_s
|
227
|
+
|
228
|
+
old_hash = record.crypted_password
|
229
|
+
old_persistence_token = record.persistence_token
|
230
|
+
assert record.valid_password?(password_for(record))
|
231
|
+
assert_equal old_hash.to_s, record.crypted_password.to_s
|
232
|
+
assert_equal old_persistence_token.to_s, record.persistence_token.to_s
|
233
|
+
end
|
234
|
+
end
|
235
|
+
end
|
236
|
+
end
|