houston-devise_ldap_authenticatable 0.7.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +9 -0
- data/CHANGELOG.md +7 -0
- data/Gemfile +8 -0
- data/MIT-LICENSE +20 -0
- data/README.md +131 -0
- data/Rakefile +16 -0
- data/devise_ldap_authenticatable.gemspec +34 -0
- data/lib/devise_ldap_authenticatable.rb +50 -0
- data/lib/devise_ldap_authenticatable/exception.rb +6 -0
- data/lib/devise_ldap_authenticatable/ldap_adapter.rb +292 -0
- data/lib/devise_ldap_authenticatable/logger.rb +11 -0
- data/lib/devise_ldap_authenticatable/model.rb +95 -0
- data/lib/devise_ldap_authenticatable/routes.rb +8 -0
- data/lib/devise_ldap_authenticatable/schema.rb +14 -0
- data/lib/devise_ldap_authenticatable/strategy.rb +19 -0
- data/lib/devise_ldap_authenticatable/version.rb +3 -0
- data/lib/generators/devise_ldap_authenticatable/install_generator.rb +62 -0
- data/lib/generators/devise_ldap_authenticatable/templates/ldap.yml +51 -0
- data/spec/ldap/.gitignore +2 -0
- data/spec/ldap/base.ldif +73 -0
- data/spec/ldap/clear.ldif +26 -0
- data/spec/ldap/local.schema +6 -0
- data/spec/ldap/openldap-data/.gitignore +2 -0
- data/spec/ldap/openldap-data/run/.gitignore +2 -0
- data/spec/ldap/openldap-data/run/.gitkeep +0 -0
- data/spec/ldap/run-server +31 -0
- data/spec/ldap/server.pem +38 -0
- data/spec/ldap/slapd-test.conf.erb +107 -0
- data/spec/rails_app/Rakefile +7 -0
- data/spec/rails_app/app/controllers/application_controller.rb +7 -0
- data/spec/rails_app/app/controllers/posts_controller.rb +15 -0
- data/spec/rails_app/app/helpers/application_helper.rb +2 -0
- data/spec/rails_app/app/helpers/posts_helper.rb +2 -0
- data/spec/rails_app/app/models/post.rb +2 -0
- data/spec/rails_app/app/models/user.rb +10 -0
- data/spec/rails_app/app/views/layouts/application.html.erb +26 -0
- data/spec/rails_app/app/views/posts/index.html.erb +2 -0
- data/spec/rails_app/config.ru +4 -0
- data/spec/rails_app/config/application.rb +46 -0
- data/spec/rails_app/config/boot.rb +13 -0
- data/spec/rails_app/config/cucumber.yml +8 -0
- data/spec/rails_app/config/database.yml +25 -0
- data/spec/rails_app/config/environment.rb +5 -0
- data/spec/rails_app/config/environments/development.rb +21 -0
- data/spec/rails_app/config/environments/production.rb +46 -0
- data/spec/rails_app/config/environments/test.rb +34 -0
- data/spec/rails_app/config/initializers/backtrace_silencers.rb +7 -0
- data/spec/rails_app/config/initializers/devise.rb +242 -0
- data/spec/rails_app/config/initializers/inflections.rb +10 -0
- data/spec/rails_app/config/initializers/mime_types.rb +5 -0
- data/spec/rails_app/config/initializers/secret_token.rb +7 -0
- data/spec/rails_app/config/initializers/session_store.rb +8 -0
- data/spec/rails_app/config/ldap.yml +22 -0
- data/spec/rails_app/config/ldap_with_boolean_ssl.yml +22 -0
- data/spec/rails_app/config/ldap_with_erb.yml +23 -0
- data/spec/rails_app/config/ldap_with_uid.yml +18 -0
- data/spec/rails_app/config/locales/devise.en.yml +58 -0
- data/spec/rails_app/config/locales/en.yml +5 -0
- data/spec/rails_app/config/routes.rb +64 -0
- data/spec/rails_app/config/ssl_ldap.yml +21 -0
- data/spec/rails_app/config/ssl_ldap_with_erb.yml +23 -0
- data/spec/rails_app/config/ssl_ldap_with_uid.yml +18 -0
- data/spec/rails_app/db/migrate/20100708120448_devise_create_users.rb +40 -0
- data/spec/rails_app/db/schema.rb +35 -0
- data/spec/rails_app/features/manage_logins.feature +35 -0
- data/spec/rails_app/features/step_definitions/login_steps.rb +21 -0
- data/spec/rails_app/features/step_definitions/web_steps.rb +219 -0
- data/spec/rails_app/features/support/env.rb +58 -0
- data/spec/rails_app/features/support/paths.rb +38 -0
- data/spec/rails_app/lib/tasks/.gitkeep +0 -0
- data/spec/rails_app/lib/tasks/cucumber.rake +53 -0
- data/spec/rails_app/public/404.html +26 -0
- data/spec/rails_app/public/422.html +26 -0
- data/spec/rails_app/public/500.html +26 -0
- data/spec/rails_app/public/images/rails.png +0 -0
- data/spec/rails_app/public/javascripts/application.js +2 -0
- data/spec/rails_app/public/javascripts/controls.js +965 -0
- data/spec/rails_app/public/javascripts/dragdrop.js +974 -0
- data/spec/rails_app/public/javascripts/effects.js +1123 -0
- data/spec/rails_app/public/javascripts/prototype.js +4874 -0
- data/spec/rails_app/public/javascripts/rails.js +118 -0
- data/spec/rails_app/public/stylesheets/.gitkeep +0 -0
- data/spec/rails_app/script/cucumber +10 -0
- data/spec/rails_app/script/rails +6 -0
- data/spec/spec_helper.rb +47 -0
- data/spec/support/factories.rb +16 -0
- data/spec/unit/user_spec.rb +298 -0
- metadata +411 -0
@@ -0,0 +1,118 @@
|
|
1
|
+
document.observe("dom:loaded", function() {
|
2
|
+
function handleRemote(element) {
|
3
|
+
var method, url, params;
|
4
|
+
|
5
|
+
if (element.tagName.toLowerCase() === 'form') {
|
6
|
+
method = element.readAttribute('method') || 'post';
|
7
|
+
url = element.readAttribute('action');
|
8
|
+
params = element.serialize(true);
|
9
|
+
} else {
|
10
|
+
method = element.readAttribute('data-method') || 'get';
|
11
|
+
url = element.readAttribute('href');
|
12
|
+
params = {};
|
13
|
+
}
|
14
|
+
|
15
|
+
var event = element.fire("ajax:before");
|
16
|
+
if (event.stopped) return false;
|
17
|
+
|
18
|
+
new Ajax.Request(url, {
|
19
|
+
method: method,
|
20
|
+
parameters: params,
|
21
|
+
asynchronous: true,
|
22
|
+
evalScripts: true,
|
23
|
+
|
24
|
+
onLoading: function(request) { element.fire("ajax:loading", {request: request}); },
|
25
|
+
onLoaded: function(request) { element.fire("ajax:loaded", {request: request}); },
|
26
|
+
onInteractive: function(request) { element.fire("ajax:interactive", {request: request}); },
|
27
|
+
onComplete: function(request) { element.fire("ajax:complete", {request: request}); },
|
28
|
+
onSuccess: function(request) { element.fire("ajax:success", {request: request}); },
|
29
|
+
onFailure: function(request) { element.fire("ajax:failure", {request: request}); }
|
30
|
+
});
|
31
|
+
|
32
|
+
element.fire("ajax:after");
|
33
|
+
}
|
34
|
+
|
35
|
+
function handleMethod(element) {
|
36
|
+
var method, url, token_name, token;
|
37
|
+
|
38
|
+
method = element.readAttribute('data-method');
|
39
|
+
url = element.readAttribute('href');
|
40
|
+
csrf_param = $$('meta[name=csrf-param]').first();
|
41
|
+
csrf_token = $$('meta[name=csrf-token]').first();
|
42
|
+
|
43
|
+
var form = new Element('form', { method: "POST", action: url, style: "display: none;" });
|
44
|
+
element.parentNode.appendChild(form);
|
45
|
+
|
46
|
+
if (method != 'post') {
|
47
|
+
var field = new Element('input', { type: 'hidden', name: '_method', value: method });
|
48
|
+
form.appendChild(field);
|
49
|
+
}
|
50
|
+
|
51
|
+
if (csrf_param) {
|
52
|
+
var param = csrf_param.readAttribute('content');
|
53
|
+
var token = csrf_token.readAttribute('content');
|
54
|
+
var field = new Element('input', { type: 'hidden', name: param, value: token });
|
55
|
+
form.appendChild(field);
|
56
|
+
}
|
57
|
+
|
58
|
+
form.submit();
|
59
|
+
}
|
60
|
+
|
61
|
+
$(document.body).observe("click", function(event) {
|
62
|
+
var message = event.findElement().readAttribute('data-confirm');
|
63
|
+
if (message && !confirm(message)) {
|
64
|
+
event.stop();
|
65
|
+
return false;
|
66
|
+
}
|
67
|
+
|
68
|
+
var element = event.findElement("a[data-remote]");
|
69
|
+
if (element) {
|
70
|
+
handleRemote(element);
|
71
|
+
event.stop();
|
72
|
+
return true;
|
73
|
+
}
|
74
|
+
|
75
|
+
var element = event.findElement("a[data-method]");
|
76
|
+
if (element) {
|
77
|
+
handleMethod(element);
|
78
|
+
event.stop();
|
79
|
+
return true;
|
80
|
+
}
|
81
|
+
});
|
82
|
+
|
83
|
+
// TODO: I don't think submit bubbles in IE
|
84
|
+
$(document.body).observe("submit", function(event) {
|
85
|
+
var element = event.findElement(),
|
86
|
+
message = element.readAttribute('data-confirm');
|
87
|
+
if (message && !confirm(message)) {
|
88
|
+
event.stop();
|
89
|
+
return false;
|
90
|
+
}
|
91
|
+
|
92
|
+
var inputs = element.select("input[type=submit][data-disable-with]");
|
93
|
+
inputs.each(function(input) {
|
94
|
+
input.disabled = true;
|
95
|
+
input.writeAttribute('data-original-value', input.value);
|
96
|
+
input.value = input.readAttribute('data-disable-with');
|
97
|
+
});
|
98
|
+
|
99
|
+
var element = event.findElement("form[data-remote]");
|
100
|
+
if (element) {
|
101
|
+
handleRemote(element);
|
102
|
+
event.stop();
|
103
|
+
}
|
104
|
+
});
|
105
|
+
|
106
|
+
$(document.body).observe("ajax:after", function(event) {
|
107
|
+
var element = event.findElement();
|
108
|
+
|
109
|
+
if (element.tagName.toLowerCase() === 'form') {
|
110
|
+
var inputs = element.select("input[type=submit][disabled=true][data-disable-with]");
|
111
|
+
inputs.each(function(input) {
|
112
|
+
input.value = input.readAttribute('data-original-value');
|
113
|
+
input.writeAttribute('data-original-value', null);
|
114
|
+
input.disabled = false;
|
115
|
+
});
|
116
|
+
}
|
117
|
+
});
|
118
|
+
});
|
File without changes
|
@@ -0,0 +1,10 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
vendored_cucumber_bin = Dir["#{File.dirname(__FILE__)}/../vendor/{gems,plugins}/cucumber*/bin/cucumber"].first
|
4
|
+
if vendored_cucumber_bin
|
5
|
+
load File.expand_path(vendored_cucumber_bin)
|
6
|
+
else
|
7
|
+
require 'rubygems' unless ENV['NO_RUBYGEMS']
|
8
|
+
require 'cucumber'
|
9
|
+
load Cucumber::BINARY
|
10
|
+
end
|
@@ -0,0 +1,6 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
# This command will automatically be run when you run "rails" with Rails 3 gems installed from the root of your application.
|
3
|
+
|
4
|
+
APP_PATH = File.expand_path('../../config/application', __FILE__)
|
5
|
+
require File.expand_path('../../config/boot', __FILE__)
|
6
|
+
require 'rails/commands'
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1,47 @@
|
|
1
|
+
ENV["RAILS_ENV"] = "test"
|
2
|
+
|
3
|
+
require File.expand_path("rails_app/config/environment.rb", File.dirname(__FILE__))
|
4
|
+
require 'rspec/rails'
|
5
|
+
require 'rspec/autorun'
|
6
|
+
require 'factory_girl' # not sure why this is not already required
|
7
|
+
|
8
|
+
Dir[File.expand_path("support/**/*.rb", File.dirname(__FILE__))].each {|f| require f}
|
9
|
+
|
10
|
+
RSpec.configure do |config|
|
11
|
+
config.mock_with :rspec
|
12
|
+
config.use_transactional_fixtures = true
|
13
|
+
config.infer_base_class_for_anonymous_controllers = false
|
14
|
+
end
|
15
|
+
|
16
|
+
def ldap_root
|
17
|
+
File.expand_path('ldap', File.dirname(__FILE__))
|
18
|
+
end
|
19
|
+
|
20
|
+
def ldap_connect_string
|
21
|
+
if ENV["LDAP_SSL"]
|
22
|
+
"-x -H ldaps://localhost:3389 -D 'cn=admin,dc=test,dc=com' -w secret"
|
23
|
+
else
|
24
|
+
"-x -h localhost -p 3389 -D 'cn=admin,dc=test,dc=com' -w secret"
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
def reset_ldap_server!
|
29
|
+
if ENV["LDAP_SSL"]
|
30
|
+
`ldapmodify #{ldap_connect_string} -f #{File.join(ldap_root, 'clear.ldif')}`
|
31
|
+
`ldapadd #{ldap_connect_string} -f #{File.join(ldap_root, 'base.ldif')}`
|
32
|
+
else
|
33
|
+
`ldapmodify #{ldap_connect_string} -f #{File.join(ldap_root, 'clear.ldif')}`
|
34
|
+
`ldapadd #{ldap_connect_string} -f #{File.join(ldap_root, 'base.ldif')}`
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
def default_devise_settings!
|
39
|
+
::Devise.ldap_logger = true
|
40
|
+
::Devise.ldap_create_user = false
|
41
|
+
::Devise.ldap_update_password = true
|
42
|
+
::Devise.ldap_config = "#{Rails.root}/config/#{"ssl_" if ENV["LDAP_SSL"]}ldap.yml"
|
43
|
+
::Devise.ldap_check_group_membership = false
|
44
|
+
::Devise.ldap_check_attributes = false
|
45
|
+
::Devise.ldap_auth_username_builder = Proc.new() {|attribute, login, ldap| "#{attribute}=#{login},#{ldap.base}" }
|
46
|
+
::Devise.authentication_keys = [:email]
|
47
|
+
end
|
@@ -0,0 +1,16 @@
|
|
1
|
+
FactoryGirl.define do
|
2
|
+
factory :user do
|
3
|
+
email "example.user@test.com"
|
4
|
+
password "secret"
|
5
|
+
end
|
6
|
+
|
7
|
+
factory :admin, :class => User do
|
8
|
+
email "example.admin@test.com"
|
9
|
+
password "admin_secret"
|
10
|
+
end
|
11
|
+
|
12
|
+
factory :other, :class => User do
|
13
|
+
email "other.user@test.com"
|
14
|
+
password "other_secret"
|
15
|
+
end
|
16
|
+
end
|
@@ -0,0 +1,298 @@
|
|
1
|
+
require File.expand_path('../spec_helper', File.dirname(__FILE__))
|
2
|
+
|
3
|
+
describe 'Users' do
|
4
|
+
|
5
|
+
def should_be_validated(user, password, message = "Password is invalid")
|
6
|
+
assert(user.valid_ldap_authentication?(password), message)
|
7
|
+
end
|
8
|
+
|
9
|
+
def should_not_be_validated(user, password, message = "Password is not properly set")
|
10
|
+
assert(!user.valid_ldap_authentication?(password), message)
|
11
|
+
end
|
12
|
+
|
13
|
+
describe "With default settings" do
|
14
|
+
before do
|
15
|
+
default_devise_settings!
|
16
|
+
reset_ldap_server!
|
17
|
+
end
|
18
|
+
|
19
|
+
describe "look up and ldap user" do
|
20
|
+
it "should return true for a user that does exist in LDAP" do
|
21
|
+
assert_equal true, ::Devise::LdapAdapter.valid_login?('example.user@test.com')
|
22
|
+
end
|
23
|
+
|
24
|
+
it "should return false for a user that doesn't exist in LDAP" do
|
25
|
+
assert_equal false, ::Devise::LdapAdapter.valid_login?('barneystinson')
|
26
|
+
end
|
27
|
+
end
|
28
|
+
|
29
|
+
describe "create a basic user" do
|
30
|
+
before do
|
31
|
+
@user = Factory.create(:user)
|
32
|
+
end
|
33
|
+
|
34
|
+
it "should check for password validation" do
|
35
|
+
assert_equal(@user.email, "example.user@test.com")
|
36
|
+
should_be_validated @user, "secret"
|
37
|
+
should_not_be_validated @user, "wrong_secret"
|
38
|
+
should_not_be_validated @user, "Secret"
|
39
|
+
end
|
40
|
+
end
|
41
|
+
|
42
|
+
describe "change a LDAP password" do
|
43
|
+
before do
|
44
|
+
@user = Factory.create(:user)
|
45
|
+
end
|
46
|
+
|
47
|
+
it "should change password" do
|
48
|
+
should_be_validated @user, "secret"
|
49
|
+
@user.reset_password!("changed","changed")
|
50
|
+
should_be_validated @user, "changed", "password was not changed properly on the LDAP sevrer"
|
51
|
+
end
|
52
|
+
|
53
|
+
it "should not allow to change password if setting is false" do
|
54
|
+
should_be_validated @user, "secret"
|
55
|
+
::Devise.ldap_update_password = false
|
56
|
+
@user.reset_password!("wrong_secret", "wrong_secret")
|
57
|
+
should_not_be_validated @user, "wrong_secret"
|
58
|
+
should_be_validated @user, "secret"
|
59
|
+
end
|
60
|
+
end
|
61
|
+
|
62
|
+
describe "create new local user if user is in LDAP" do
|
63
|
+
|
64
|
+
before do
|
65
|
+
assert(User.all.blank?, "There shouldn't be any users in the database")
|
66
|
+
end
|
67
|
+
|
68
|
+
it "should don't create user in the database" do
|
69
|
+
@user = User.authenticate_with_ldap(:email => "example.user@test.com", :password => "secret")
|
70
|
+
assert(User.all.blank?)
|
71
|
+
end
|
72
|
+
|
73
|
+
describe "creating users is enabled" do
|
74
|
+
before do
|
75
|
+
::Devise.ldap_create_user = true
|
76
|
+
end
|
77
|
+
|
78
|
+
it "should create a user in the database" do
|
79
|
+
@user = User.authenticate_with_ldap(:email => "example.user@test.com", :password => "secret")
|
80
|
+
assert_equal(User.all.size, 1)
|
81
|
+
User.all.collect(&:email).should include("example.user@test.com")
|
82
|
+
end
|
83
|
+
|
84
|
+
it "should not create a user in the database if the password is wrong_secret" do
|
85
|
+
@user = User.authenticate_with_ldap(:email => "example.user", :password => "wrong_secret")
|
86
|
+
assert(User.all.blank?, "There's users in the database")
|
87
|
+
end
|
88
|
+
|
89
|
+
it "should create a user if the user is not in LDAP" do
|
90
|
+
@user = User.authenticate_with_ldap(:email => "wrong_secret.user@test.com", :password => "wrong_secret")
|
91
|
+
assert(User.all.blank?, "There's users in the database")
|
92
|
+
end
|
93
|
+
|
94
|
+
it "should create a user in the database if case insensitivity does not matter" do
|
95
|
+
::Devise.case_insensitive_keys = []
|
96
|
+
@user = Factory.create(:user)
|
97
|
+
|
98
|
+
expect do
|
99
|
+
User.authenticate_with_ldap(:email => "EXAMPLE.user@test.com", :password => "secret")
|
100
|
+
end.to change { User.count }.by(1)
|
101
|
+
end
|
102
|
+
|
103
|
+
it "should not create a user in the database if case insensitivity matters" do
|
104
|
+
::Devise.case_insensitive_keys = [:email]
|
105
|
+
@user = Factory.create(:user)
|
106
|
+
|
107
|
+
expect do
|
108
|
+
User.authenticate_with_ldap(:email => "EXAMPLE.user@test.com", :password => "secret")
|
109
|
+
end.to_not change { User.count }
|
110
|
+
end
|
111
|
+
|
112
|
+
it "should create a user with downcased email in the database if case insensitivity matters" do
|
113
|
+
::Devise.case_insensitive_keys = [:email]
|
114
|
+
|
115
|
+
@user = User.authenticate_with_ldap(:email => "EXAMPLE.user@test.com", :password => "secret")
|
116
|
+
User.all.collect(&:email).should include("example.user@test.com")
|
117
|
+
end
|
118
|
+
end
|
119
|
+
|
120
|
+
end
|
121
|
+
|
122
|
+
describe "use groups for authorization" do
|
123
|
+
before do
|
124
|
+
@admin = Factory.create(:admin)
|
125
|
+
@user = Factory.create(:user)
|
126
|
+
::Devise.authentication_keys = [:email]
|
127
|
+
::Devise.ldap_check_group_membership = true
|
128
|
+
end
|
129
|
+
|
130
|
+
it "should admin should be allowed in" do
|
131
|
+
should_be_validated @admin, "admin_secret"
|
132
|
+
end
|
133
|
+
|
134
|
+
it "should admin should have the proper groups set" do
|
135
|
+
@admin.ldap_groups.should include('cn=admins,ou=groups,dc=test,dc=com')
|
136
|
+
end
|
137
|
+
|
138
|
+
it "should user should not be allowed in" do
|
139
|
+
should_not_be_validated @user, "secret"
|
140
|
+
end
|
141
|
+
end
|
142
|
+
|
143
|
+
describe "check group membership" do
|
144
|
+
before do
|
145
|
+
@admin = Factory.create(:admin)
|
146
|
+
@user = Factory.create(:user)
|
147
|
+
end
|
148
|
+
|
149
|
+
it "should return true for admin being in the admins group" do
|
150
|
+
assert_equal true, @admin.in_ldap_group?('cn=admins,ou=groups,dc=test,dc=com')
|
151
|
+
end
|
152
|
+
|
153
|
+
it "should return false for admin being in the admins group using the 'foobar' group attribute" do
|
154
|
+
assert_equal false, @admin.in_ldap_group?('cn=admins,ou=groups,dc=test,dc=com', 'foobar')
|
155
|
+
end
|
156
|
+
|
157
|
+
it "should return true for user being in the users group" do
|
158
|
+
assert_equal true, @user.in_ldap_group?('cn=users,ou=groups,dc=test,dc=com')
|
159
|
+
end
|
160
|
+
|
161
|
+
it "should return false for user being in the admins group" do
|
162
|
+
assert_equal false, @user.in_ldap_group?('cn=admins,ou=groups,dc=test,dc=com')
|
163
|
+
end
|
164
|
+
end
|
165
|
+
|
166
|
+
|
167
|
+
describe "use role attribute for authorization" do
|
168
|
+
before do
|
169
|
+
@admin = Factory.create(:admin)
|
170
|
+
@user = Factory.create(:user)
|
171
|
+
::Devise.ldap_check_attributes = true
|
172
|
+
end
|
173
|
+
|
174
|
+
it "should admin should be allowed in" do
|
175
|
+
should_be_validated @admin, "admin_secret"
|
176
|
+
end
|
177
|
+
|
178
|
+
it "should user should not be allowed in" do
|
179
|
+
should_not_be_validated @user, "secret"
|
180
|
+
end
|
181
|
+
end
|
182
|
+
|
183
|
+
describe "use admin setting to bind" do
|
184
|
+
before do
|
185
|
+
@admin = Factory.create(:admin)
|
186
|
+
@user = Factory.create(:user)
|
187
|
+
::Devise.ldap_use_admin_to_bind = true
|
188
|
+
end
|
189
|
+
|
190
|
+
it "should description" do
|
191
|
+
should_be_validated @admin, "admin_secret"
|
192
|
+
end
|
193
|
+
end
|
194
|
+
|
195
|
+
end
|
196
|
+
|
197
|
+
describe "use uid for login" do
|
198
|
+
before do
|
199
|
+
default_devise_settings!
|
200
|
+
reset_ldap_server!
|
201
|
+
::Devise.ldap_config = "#{Rails.root}/config/#{"ssl_" if ENV["LDAP_SSL"]}ldap_with_uid.yml"
|
202
|
+
::Devise.authentication_keys = [:uid]
|
203
|
+
end
|
204
|
+
|
205
|
+
describe "description" do
|
206
|
+
before do
|
207
|
+
@admin = Factory.create(:admin)
|
208
|
+
@user = Factory.create(:user, :uid => "example_user")
|
209
|
+
end
|
210
|
+
|
211
|
+
it "should be able to authenticate using uid" do
|
212
|
+
should_be_validated @user, "secret"
|
213
|
+
should_not_be_validated @admin, "admin_secret"
|
214
|
+
end
|
215
|
+
end
|
216
|
+
|
217
|
+
describe "create user" do
|
218
|
+
before do
|
219
|
+
::Devise.ldap_create_user = true
|
220
|
+
end
|
221
|
+
|
222
|
+
it "should create a user in the database" do
|
223
|
+
@user = User.authenticate_with_ldap(:uid => "example_user", :password => "secret")
|
224
|
+
assert_equal(User.all.size, 1)
|
225
|
+
User.all.collect(&:uid).should include("example_user")
|
226
|
+
end
|
227
|
+
|
228
|
+
it "should call ldap_before_save hooks" do
|
229
|
+
User.class_eval do
|
230
|
+
def ldap_before_save
|
231
|
+
@foobar = 'foobar'
|
232
|
+
end
|
233
|
+
end
|
234
|
+
user = User.authenticate_with_ldap(:uid => "example_user", :password => "secret")
|
235
|
+
assert_equal 'foobar', user.instance_variable_get(:"@foobar")
|
236
|
+
User.class_eval do
|
237
|
+
undef ldap_before_save
|
238
|
+
end
|
239
|
+
end
|
240
|
+
|
241
|
+
it "should not call ldap_before_save hook if not defined" do
|
242
|
+
assert_nothing_raised do
|
243
|
+
should_be_validated Factory.create(:user, :uid => "example_user"), "secret"
|
244
|
+
end
|
245
|
+
end
|
246
|
+
end
|
247
|
+
end
|
248
|
+
|
249
|
+
describe "using ERB in the config file" do
|
250
|
+
before do
|
251
|
+
default_devise_settings!
|
252
|
+
reset_ldap_server!
|
253
|
+
::Devise.ldap_config = "#{Rails.root}/config/#{"ssl_" if ENV["LDAP_SSL"]}ldap_with_erb.yml"
|
254
|
+
end
|
255
|
+
|
256
|
+
describe "authenticate" do
|
257
|
+
before do
|
258
|
+
@admin = Factory.create(:admin)
|
259
|
+
@user = Factory.create(:user)
|
260
|
+
end
|
261
|
+
|
262
|
+
it "should be able to authenticate" do
|
263
|
+
should_be_validated @user, "secret"
|
264
|
+
should_be_validated @admin, "admin_secret"
|
265
|
+
end
|
266
|
+
end
|
267
|
+
end
|
268
|
+
|
269
|
+
describe "using variants in the config file" do
|
270
|
+
before do
|
271
|
+
default_devise_settings!
|
272
|
+
reset_ldap_server!
|
273
|
+
::Devise.ldap_config = Rails.root.join 'config', 'ldap_with_boolean_ssl.yml'
|
274
|
+
end
|
275
|
+
|
276
|
+
it "should not fail if config file has ssl: true" do
|
277
|
+
assert_nothing_raised do
|
278
|
+
Devise::LdapAdapter::LdapConnect.new
|
279
|
+
end
|
280
|
+
end
|
281
|
+
end
|
282
|
+
|
283
|
+
describe "use username builder" do
|
284
|
+
before do
|
285
|
+
default_devise_settings!
|
286
|
+
reset_ldap_server!
|
287
|
+
::Devise.ldap_auth_username_builder = Proc.new() do |attribute, login, ldap|
|
288
|
+
"#{attribute}=#{login},ou=others,dc=test,dc=com"
|
289
|
+
end
|
290
|
+
@other = Factory.create(:other)
|
291
|
+
end
|
292
|
+
|
293
|
+
it "should be able to authenticate" do
|
294
|
+
should_be_validated @other, "other_secret"
|
295
|
+
end
|
296
|
+
end
|
297
|
+
|
298
|
+
end
|