loyal_devise 2.1.7 → 2.1.10

Sign up to get free protection for your applications and to get access to all the features.
Files changed (145) hide show
  1. data/README.md +16 -46
  2. data/app/controllers/devise/passwords_controller.rb +1 -1
  3. data/app/controllers/devise/registrations_controller.rb +1 -1
  4. data/lib/devise/controllers/helpers.rb +3 -6
  5. data/lib/devise/failure_app.rb +1 -8
  6. data/lib/devise/hooks/lockable.rb +1 -1
  7. data/lib/devise/mapping.rb +6 -6
  8. data/lib/devise/models/authenticatable.rb +4 -4
  9. data/lib/devise/models/confirmable.rb +4 -12
  10. data/lib/devise/models/database_authenticatable.rb +1 -1
  11. data/lib/devise/models/lockable.rb +1 -1
  12. data/lib/devise/models/recoverable.rb +2 -7
  13. data/lib/devise/models/rememberable.rb +1 -1
  14. data/lib/devise/{parameter_filter.rb → param_filter.rb} +1 -1
  15. data/lib/devise/parameter_sanitizer.rb +3 -3
  16. data/lib/devise/version.rb +1 -1
  17. data/lib/devise.rb +1 -1
  18. data/lib/generators/templates/README +1 -1
  19. data/lib/loyal_devise.rb +1 -0
  20. metadata +65 -301
  21. data/.gitignore +0 -12
  22. data/.travis.yml +0 -20
  23. data/.yardopts +0 -9
  24. data/CHANGELOG.rdoc +0 -936
  25. data/CONTRIBUTING.md +0 -14
  26. data/Gemfile +0 -31
  27. data/Gemfile.lock +0 -160
  28. data/devise.gemspec +0 -26
  29. data/devise.png +0 -0
  30. data/gemfiles/Gemfile.rails-3.2.x +0 -31
  31. data/gemfiles/Gemfile.rails-3.2.x.lock +0 -156
  32. data/loyal_devise.gemspec +0 -29
  33. data/test/controllers/custom_strategy_test.rb +0 -62
  34. data/test/controllers/helpers_test.rb +0 -253
  35. data/test/controllers/internal_helpers_test.rb +0 -120
  36. data/test/controllers/passwords_controller_test.rb +0 -32
  37. data/test/controllers/sessions_controller_test.rb +0 -85
  38. data/test/controllers/url_helpers_test.rb +0 -59
  39. data/test/delegator_test.rb +0 -19
  40. data/test/devise_test.rb +0 -83
  41. data/test/failure_app_test.rb +0 -221
  42. data/test/generators/active_record_generator_test.rb +0 -73
  43. data/test/generators/devise_generator_test.rb +0 -39
  44. data/test/generators/install_generator_test.rb +0 -13
  45. data/test/generators/mongoid_generator_test.rb +0 -23
  46. data/test/generators/views_generator_test.rb +0 -67
  47. data/test/helpers/devise_helper_test.rb +0 -51
  48. data/test/integration/authenticatable_test.rb +0 -699
  49. data/test/integration/confirmable_test.rb +0 -299
  50. data/test/integration/database_authenticatable_test.rb +0 -84
  51. data/test/integration/http_authenticatable_test.rb +0 -115
  52. data/test/integration/lockable_test.rb +0 -242
  53. data/test/integration/omniauthable_test.rb +0 -133
  54. data/test/integration/recoverable_test.rb +0 -335
  55. data/test/integration/registerable_test.rb +0 -349
  56. data/test/integration/rememberable_test.rb +0 -165
  57. data/test/integration/timeoutable_test.rb +0 -150
  58. data/test/integration/token_authenticatable_test.rb +0 -205
  59. data/test/integration/trackable_test.rb +0 -92
  60. data/test/mailers/confirmation_instructions_test.rb +0 -111
  61. data/test/mailers/reset_password_instructions_test.rb +0 -92
  62. data/test/mailers/unlock_instructions_test.rb +0 -87
  63. data/test/mapping_test.rb +0 -127
  64. data/test/models/authenticatable_test.rb +0 -13
  65. data/test/models/confirmable_test.rb +0 -443
  66. data/test/models/database_authenticatable_test.rb +0 -226
  67. data/test/models/lockable_test.rb +0 -273
  68. data/test/models/omniauthable_test.rb +0 -7
  69. data/test/models/recoverable_test.rb +0 -222
  70. data/test/models/registerable_test.rb +0 -7
  71. data/test/models/rememberable_test.rb +0 -175
  72. data/test/models/serializable_test.rb +0 -49
  73. data/test/models/timeoutable_test.rb +0 -46
  74. data/test/models/token_authenticatable_test.rb +0 -55
  75. data/test/models/trackable_test.rb +0 -13
  76. data/test/models/validatable_test.rb +0 -127
  77. data/test/models_test.rb +0 -163
  78. data/test/omniauth/config_test.rb +0 -57
  79. data/test/omniauth/url_helpers_test.rb +0 -54
  80. data/test/orm/active_record.rb +0 -10
  81. data/test/orm/mongoid.rb +0 -13
  82. data/test/parameter_sanitizer_test.rb +0 -51
  83. data/test/rails_app/Rakefile +0 -6
  84. data/test/rails_app/app/active_record/admin.rb +0 -6
  85. data/test/rails_app/app/active_record/shim.rb +0 -2
  86. data/test/rails_app/app/active_record/user.rb +0 -6
  87. data/test/rails_app/app/controllers/admins/sessions_controller.rb +0 -6
  88. data/test/rails_app/app/controllers/admins_controller.rb +0 -11
  89. data/test/rails_app/app/controllers/application_controller.rb +0 -9
  90. data/test/rails_app/app/controllers/home_controller.rb +0 -25
  91. data/test/rails_app/app/controllers/publisher/registrations_controller.rb +0 -2
  92. data/test/rails_app/app/controllers/publisher/sessions_controller.rb +0 -2
  93. data/test/rails_app/app/controllers/users/omniauth_callbacks_controller.rb +0 -14
  94. data/test/rails_app/app/controllers/users_controller.rb +0 -31
  95. data/test/rails_app/app/helpers/application_helper.rb +0 -3
  96. data/test/rails_app/app/mailers/users/mailer.rb +0 -12
  97. data/test/rails_app/app/mongoid/admin.rb +0 -29
  98. data/test/rails_app/app/mongoid/shim.rb +0 -23
  99. data/test/rails_app/app/mongoid/user.rb +0 -42
  100. data/test/rails_app/app/views/admins/index.html.erb +0 -1
  101. data/test/rails_app/app/views/admins/sessions/new.html.erb +0 -2
  102. data/test/rails_app/app/views/home/admin_dashboard.html.erb +0 -1
  103. data/test/rails_app/app/views/home/index.html.erb +0 -1
  104. data/test/rails_app/app/views/home/join.html.erb +0 -1
  105. data/test/rails_app/app/views/home/private.html.erb +0 -1
  106. data/test/rails_app/app/views/home/user_dashboard.html.erb +0 -1
  107. data/test/rails_app/app/views/layouts/application.html.erb +0 -24
  108. data/test/rails_app/app/views/users/edit_form.html.erb +0 -1
  109. data/test/rails_app/app/views/users/index.html.erb +0 -1
  110. data/test/rails_app/app/views/users/mailer/confirmation_instructions.erb +0 -1
  111. data/test/rails_app/app/views/users/sessions/new.html.erb +0 -1
  112. data/test/rails_app/bin/bundle +0 -3
  113. data/test/rails_app/bin/rails +0 -4
  114. data/test/rails_app/bin/rake +0 -4
  115. data/test/rails_app/config/application.rb +0 -40
  116. data/test/rails_app/config/boot.rb +0 -8
  117. data/test/rails_app/config/database.yml +0 -18
  118. data/test/rails_app/config/environment.rb +0 -5
  119. data/test/rails_app/config/environments/development.rb +0 -34
  120. data/test/rails_app/config/environments/production.rb +0 -84
  121. data/test/rails_app/config/environments/test.rb +0 -36
  122. data/test/rails_app/config/initializers/backtrace_silencers.rb +0 -7
  123. data/test/rails_app/config/initializers/devise.rb +0 -178
  124. data/test/rails_app/config/initializers/inflections.rb +0 -2
  125. data/test/rails_app/config/initializers/secret_token.rb +0 -8
  126. data/test/rails_app/config/initializers/session_store.rb +0 -1
  127. data/test/rails_app/config/routes.rb +0 -104
  128. data/test/rails_app/config.ru +0 -4
  129. data/test/rails_app/db/migrate/20100401102949_create_tables.rb +0 -74
  130. data/test/rails_app/db/schema.rb +0 -52
  131. data/test/rails_app/lib/shared_admin.rb +0 -14
  132. data/test/rails_app/lib/shared_user.rb +0 -25
  133. data/test/rails_app/public/404.html +0 -26
  134. data/test/rails_app/public/422.html +0 -26
  135. data/test/rails_app/public/500.html +0 -26
  136. data/test/rails_app/public/favicon.ico +0 -0
  137. data/test/routes_test.rb +0 -250
  138. data/test/support/assertions.rb +0 -40
  139. data/test/support/helpers.rb +0 -91
  140. data/test/support/integration.rb +0 -92
  141. data/test/support/locale/en.yml +0 -4
  142. data/test/support/webrat/integrations/rails.rb +0 -24
  143. data/test/test_helper.rb +0 -34
  144. data/test/test_helpers_test.rb +0 -151
  145. data/test/test_models.rb +0 -26
@@ -1,273 +0,0 @@
1
- require 'test_helper'
2
-
3
- class LockableTest < ActiveSupport::TestCase
4
- def setup
5
- setup_mailer
6
- end
7
-
8
- test "should respect maximum attempts configuration" do
9
- user = create_user
10
- user.confirm!
11
- swap Devise, :maximum_attempts => 2 do
12
- 3.times { user.valid_for_authentication?{ false } }
13
- assert user.reload.access_locked?
14
- end
15
- end
16
-
17
- test "should increment failed_attempts on successfull validation if the user is already locked" do
18
- user = create_user
19
- user.confirm!
20
-
21
- swap Devise, :maximum_attempts => 2 do
22
- 3.times { user.valid_for_authentication?{ false } }
23
- assert user.reload.access_locked?
24
- end
25
-
26
- user.valid_for_authentication?{ true }
27
- assert_equal 4, user.reload.failed_attempts
28
- end
29
-
30
- test "should not touch failed_attempts if lock_strategy is none" do
31
- user = create_user
32
- user.confirm!
33
- swap Devise, :lock_strategy => :none, :maximum_attempts => 2 do
34
- 3.times { user.valid_for_authentication?{ false } }
35
- assert !user.access_locked?
36
- assert_equal 0, user.failed_attempts
37
- end
38
- end
39
-
40
- test 'should be valid for authentication with a unlocked user' do
41
- user = create_user
42
- user.lock_access!
43
- user.unlock_access!
44
- assert user.valid_for_authentication?{ true }
45
- end
46
-
47
- test "should verify whether a user is locked or not" do
48
- user = create_user
49
- assert_not user.access_locked?
50
- user.lock_access!
51
- assert user.access_locked?
52
- end
53
-
54
- test "active_for_authentication? should be the opposite of locked?" do
55
- user = create_user
56
- user.confirm!
57
- assert user.active_for_authentication?
58
- user.lock_access!
59
- assert_not user.active_for_authentication?
60
- end
61
-
62
- test "should unlock a user by cleaning locked_at, failed_attempts and unlock_token" do
63
- user = create_user
64
- user.lock_access!
65
- assert_not_nil user.reload.locked_at
66
- assert_not_nil user.reload.unlock_token
67
-
68
- user.unlock_access!
69
- assert_nil user.reload.locked_at
70
- assert_nil user.reload.unlock_token
71
- assert_equal 0, user.reload.failed_attempts
72
- end
73
-
74
- test "new user should not be locked and should have zero failed_attempts" do
75
- assert_not new_user.access_locked?
76
- assert_equal 0, create_user.failed_attempts
77
- end
78
-
79
- test "should unlock user after unlock_in period" do
80
- swap Devise, :unlock_in => 3.hours do
81
- user = new_user
82
- user.locked_at = 2.hours.ago
83
- assert user.access_locked?
84
-
85
- Devise.unlock_in = 1.hour
86
- assert_not user.access_locked?
87
- end
88
- end
89
-
90
- test "should not unlock in 'unlock_in' if :time unlock strategy is not set" do
91
- swap Devise, :unlock_strategy => :email do
92
- user = new_user
93
- user.locked_at = 2.hours.ago
94
- assert user.access_locked?
95
- end
96
- end
97
-
98
- test "should set unlock_token when locking" do
99
- user = create_user
100
- assert_nil user.unlock_token
101
- user.lock_access!
102
- assert_not_nil user.unlock_token
103
- end
104
-
105
- test "should never generate the same unlock token for different users" do
106
- unlock_tokens = []
107
- 3.times do
108
- user = create_user
109
- user.lock_access!
110
- token = user.unlock_token
111
- assert !unlock_tokens.include?(token)
112
- unlock_tokens << token
113
- end
114
- end
115
-
116
- test "should not generate unlock_token when :email is not an unlock strategy" do
117
- swap Devise, :unlock_strategy => :time do
118
- user = create_user
119
- user.lock_access!
120
- assert_nil user.unlock_token
121
- end
122
- end
123
-
124
- test "should send email with unlock instructions when :email is an unlock strategy" do
125
- swap Devise, :unlock_strategy => :email do
126
- user = create_user
127
- assert_email_sent do
128
- user.lock_access!
129
- end
130
- end
131
- end
132
-
133
- test "should not send email with unlock instructions when :email is not an unlock strategy" do
134
- swap Devise, :unlock_strategy => :time do
135
- user = create_user
136
- assert_email_not_sent do
137
- user.lock_access!
138
- end
139
- end
140
- end
141
-
142
- test 'should find and unlock a user automatically' do
143
- user = create_user
144
- user.lock_access!
145
- locked_user = User.unlock_access_by_token(user.unlock_token)
146
- assert_equal locked_user, user
147
- assert_not user.reload.access_locked?
148
- end
149
-
150
- test 'should return a new record with errors when a invalid token is given' do
151
- locked_user = User.unlock_access_by_token('invalid_token')
152
- assert_not locked_user.persisted?
153
- assert_equal "is invalid", locked_user.errors[:unlock_token].join
154
- end
155
-
156
- test 'should return a new record with errors when a blank token is given' do
157
- locked_user = User.unlock_access_by_token('')
158
- assert_not locked_user.persisted?
159
- assert_equal "can't be blank", locked_user.errors[:unlock_token].join
160
- end
161
-
162
- test 'should find a user to send unlock instructions' do
163
- user = create_user
164
- user.lock_access!
165
- unlock_user = User.send_unlock_instructions(:email => user.email)
166
- assert_equal unlock_user, user
167
- end
168
-
169
- test 'should return a new user if no email was found' do
170
- unlock_user = User.send_unlock_instructions(:email => "invalid@example.com")
171
- assert_not unlock_user.persisted?
172
- end
173
-
174
- test 'should add error to new user email if no email was found' do
175
- unlock_user = User.send_unlock_instructions(:email => "invalid@example.com")
176
- assert_equal 'not found', unlock_user.errors[:email].join
177
- end
178
-
179
- test 'should find a user to send unlock instructions by authentication_keys' do
180
- swap Devise, :authentication_keys => [:username, :email] do
181
- user = create_user
182
- unlock_user = User.send_unlock_instructions(:email => user.email, :username => user.username)
183
- assert_equal unlock_user, user
184
- end
185
- end
186
-
187
- test 'should require all unlock_keys' do
188
- swap Devise, :unlock_keys => [:username, :email] do
189
- user = create_user
190
- unlock_user = User.send_unlock_instructions(:email => user.email)
191
- assert_not unlock_user.persisted?
192
- assert_equal "can't be blank", unlock_user.errors[:username].join
193
- end
194
- end
195
-
196
- test 'should not be able to send instructions if the user is not locked' do
197
- user = create_user
198
- assert_not user.resend_unlock_token
199
- assert_not user.access_locked?
200
- assert_equal 'was not locked', user.errors[:email].join
201
- end
202
-
203
- test 'should unlock account if lock has expired and increase attempts on failure' do
204
- swap Devise, :unlock_in => 1.minute do
205
- user = create_user
206
- user.confirm!
207
-
208
- user.failed_attempts = 2
209
- user.locked_at = 2.minutes.ago
210
-
211
- user.valid_for_authentication? { false }
212
- assert_equal 1, user.failed_attempts
213
- end
214
- end
215
-
216
- test 'should unlock account if lock has expired on success' do
217
- swap Devise, :unlock_in => 1.minute do
218
- user = create_user
219
- user.confirm!
220
-
221
- user.failed_attempts = 2
222
- user.locked_at = 2.minutes.ago
223
-
224
- user.valid_for_authentication? { true }
225
- assert_equal 0, user.failed_attempts
226
- assert_nil user.locked_at
227
- end
228
- end
229
-
230
- test 'required_fields should contain the all the fields when all the strategies are enabled' do
231
- swap Devise, :unlock_strategy => :both do
232
- swap Devise, :lock_strategy => :failed_attempts do
233
- assert_same_content Devise::Models::Lockable.required_fields(User), [
234
- :failed_attempts,
235
- :locked_at,
236
- :unlock_token
237
- ]
238
- end
239
- end
240
- end
241
-
242
- test 'required_fields should contain only failed_attempts and locked_at when the strategies are time and failed_attempts are enabled' do
243
- swap Devise, :unlock_strategy => :time do
244
- swap Devise, :lock_strategy => :failed_attempts do
245
- assert_same_content Devise::Models::Lockable.required_fields(User), [
246
- :failed_attempts,
247
- :locked_at
248
- ]
249
- end
250
- end
251
- end
252
-
253
- test 'required_fields should contain only failed_attempts and unlock_token when the strategies are token and failed_attempts are enabled' do
254
- swap Devise, :unlock_strategy => :email do
255
- swap Devise, :lock_strategy => :failed_attempts do
256
- assert_same_content Devise::Models::Lockable.required_fields(User), [
257
- :failed_attempts,
258
- :unlock_token
259
- ]
260
- end
261
- end
262
- end
263
-
264
- test 'should not return a locked unauthenticated message if in paranoid mode' do
265
- swap Devise, :paranoid => :true do
266
- user = create_user
267
- user.failed_attempts = Devise.maximum_attempts + 1
268
- user.lock_access!
269
-
270
- assert_equal :invalid, user.unauthenticated_message
271
- end
272
- end
273
- end
@@ -1,7 +0,0 @@
1
- require 'test_helper'
2
-
3
- class OmniauthableTest < ActiveSupport::TestCase
4
- test 'required_fields should contain the fields that Devise uses' do
5
- assert_same_content Devise::Models::Omniauthable.required_fields(User), []
6
- end
7
- end
@@ -1,222 +0,0 @@
1
- require 'test_helper'
2
-
3
- class RecoverableTest < ActiveSupport::TestCase
4
-
5
- def setup
6
- setup_mailer
7
- end
8
-
9
- test 'should not generate reset password token after creating a record' do
10
- assert_nil new_user.reset_password_token
11
- end
12
-
13
- test 'should never generate the same reset password token for different users' do
14
- reset_password_tokens = []
15
- 3.times do
16
- user = create_user
17
- user.send_reset_password_instructions
18
- token = user.reset_password_token
19
- assert !reset_password_tokens.include?(token)
20
- reset_password_tokens << token
21
- end
22
- end
23
-
24
- test 'should reset password and password confirmation from params' do
25
- user = create_user
26
- user.reset_password!('123456789', '987654321')
27
- assert_equal '123456789', user.password
28
- assert_equal '987654321', user.password_confirmation
29
- end
30
-
31
- test 'should reset password and save the record' do
32
- assert create_user.reset_password!('123456789', '123456789')
33
- end
34
-
35
- test 'should clear reset password token while reseting the password' do
36
- user = create_user
37
- assert_nil user.reset_password_token
38
-
39
- user.send_reset_password_instructions
40
- assert_present user.reset_password_token
41
- assert user.reset_password!('123456789', '123456789')
42
- assert_nil user.reset_password_token
43
- end
44
-
45
- test 'should not clear reset password token if record is invalid' do
46
- user = create_user
47
- user.send_reset_password_instructions
48
- assert_present user.reset_password_token
49
- assert_not user.reset_password!('123456789', '987654321')
50
- assert_present user.reset_password_token
51
- end
52
-
53
- test 'should not reset password with invalid data' do
54
- user = create_user
55
- user.stubs(:valid?).returns(false)
56
- assert_not user.reset_password!('123456789', '987654321')
57
- end
58
-
59
- test 'should reset reset password token and send instructions by email' do
60
- user = create_user
61
- assert_email_sent do
62
- token = user.reset_password_token
63
- user.send_reset_password_instructions
64
- assert_not_equal token, user.reset_password_token
65
- end
66
- end
67
-
68
- test 'should find a user to send instructions by email' do
69
- user = create_user
70
- reset_password_user = User.send_reset_password_instructions(:email => user.email)
71
- assert_equal reset_password_user, user
72
- end
73
-
74
- test 'should return a new record with errors if user was not found by e-mail' do
75
- reset_password_user = User.send_reset_password_instructions(:email => "invalid@example.com")
76
- assert_not reset_password_user.persisted?
77
- assert_equal "not found", reset_password_user.errors[:email].join
78
- end
79
-
80
- test 'should find a user to send instructions by authentication_keys' do
81
- swap Devise, :authentication_keys => [:username, :email] do
82
- user = create_user
83
- reset_password_user = User.send_reset_password_instructions(:email => user.email, :username => user.username)
84
- assert_equal reset_password_user, user
85
- end
86
- end
87
-
88
- test 'should require all reset_password_keys' do
89
- swap Devise, :reset_password_keys => [:username, :email] do
90
- user = create_user
91
- reset_password_user = User.send_reset_password_instructions(:email => user.email)
92
- assert_not reset_password_user.persisted?
93
- assert_equal "can't be blank", reset_password_user.errors[:username].join
94
- end
95
- end
96
-
97
- test 'should reset reset_password_token before send the reset instructions email' do
98
- user = create_user
99
- token = user.reset_password_token
100
- User.send_reset_password_instructions(:email => user.email)
101
- assert_not_equal token, user.reload.reset_password_token
102
- end
103
-
104
- test 'should send email instructions to the user reset his password' do
105
- user = create_user
106
- assert_email_sent do
107
- User.send_reset_password_instructions(:email => user.email)
108
- end
109
- end
110
-
111
- test 'should find a user to reset his password based on reset_password_token' do
112
- user = create_user
113
- user.ensure_reset_password_token!
114
-
115
- reset_password_user = User.reset_password_by_token(:reset_password_token => user.reset_password_token)
116
- assert_equal reset_password_user, user
117
- end
118
-
119
- test 'should return a new record with errors if no reset_password_token is found' do
120
- reset_password_user = User.reset_password_by_token(:reset_password_token => 'invalid_token')
121
- assert_not reset_password_user.persisted?
122
- assert_equal "is invalid", reset_password_user.errors[:reset_password_token].join
123
- end
124
-
125
- test 'should return a new record with errors if reset_password_token is blank' do
126
- reset_password_user = User.reset_password_by_token(:reset_password_token => '')
127
- assert_not reset_password_user.persisted?
128
- assert_match "can't be blank", reset_password_user.errors[:reset_password_token].join
129
- end
130
-
131
- test 'should return a new record with errors if password is blank' do
132
- user = create_user
133
- user.ensure_reset_password_token!
134
-
135
- reset_password_user = User.reset_password_by_token(:reset_password_token => user.reset_password_token, :password => '')
136
- assert_not reset_password_user.errors.empty?
137
- assert_match "can't be blank", reset_password_user.errors[:password].join
138
- end
139
-
140
- test 'should reset successfully user password given the new password and confirmation' do
141
- user = create_user
142
- old_password = user.password
143
- user.ensure_reset_password_token!
144
-
145
- User.reset_password_by_token(
146
- :reset_password_token => user.reset_password_token,
147
- :password => 'new_password',
148
- :password_confirmation => 'new_password'
149
- )
150
- user.reload
151
-
152
- assert_not user.valid_password?(old_password)
153
- assert user.valid_password?('new_password')
154
- end
155
-
156
- test 'should not reset reset password token during reset_password_within time' do
157
- swap Devise, :reset_password_within => 1.hour do
158
- user = create_user
159
- user.send_reset_password_instructions
160
- 3.times do
161
- token = user.reset_password_token
162
- user.send_reset_password_instructions
163
- assert_equal token, user.reset_password_token
164
- end
165
- end
166
- end
167
-
168
- test 'should reset reset password token after reset_password_within time' do
169
- swap Devise, :reset_password_within => 1.hour do
170
- user = create_user
171
- user.reset_password_sent_at = 2.days.ago
172
- token = user.reset_password_token
173
- user.send_reset_password_instructions
174
- assert_not_equal token, user.reset_password_token
175
- end
176
- end
177
-
178
- test 'should not reset password after reset_password_within time' do
179
- swap Devise, :reset_password_within => 1.hour do
180
- user = create_user
181
- old_password = user.password
182
- user.ensure_reset_password_token!
183
- user.reset_password_sent_at = 2.days.ago
184
- user.save!
185
-
186
- reset_password_user = User.reset_password_by_token(
187
- :reset_password_token => user.reset_password_token,
188
- :password => 'new_password',
189
- :password_confirmation => 'new_password'
190
- )
191
- user.reload
192
-
193
- assert user.valid_password?(old_password)
194
- assert_not user.valid_password?('new_password')
195
- assert_equal "has expired, please request a new one", reset_password_user.errors[:reset_password_token].join
196
- end
197
- end
198
-
199
- test 'required_fields should contain the fields that Devise uses' do
200
- assert_same_content Devise::Models::Recoverable.required_fields(User), [
201
- :reset_password_sent_at,
202
- :reset_password_token
203
- ]
204
- end
205
-
206
- test 'should generate a new token when a valid one does not exist' do
207
- user = create_user
208
- assert_nil user.reset_password_token
209
-
210
- user.ensure_reset_password_token!
211
- assert_not_nil user.reset_password_token
212
- end
213
-
214
- test 'should not generate a new token when a valid one exists' do
215
- user = create_user
216
- user.send :generate_reset_password_token!
217
- assert_not_nil user.reset_password_token
218
- old = user.reset_password_token
219
- user.ensure_reset_password_token!
220
- assert_equal user.reset_password_token, old
221
- end
222
- end
@@ -1,7 +0,0 @@
1
- require 'test_helper'
2
-
3
- class RegisterableTest < ActiveSupport::TestCase
4
- test 'required_fields should contain the fields that Devise uses' do
5
- assert_same_content Devise::Models::Registerable.required_fields(User), []
6
- end
7
- end
@@ -1,175 +0,0 @@
1
- require 'test_helper'
2
-
3
- class RememberableTest < ActiveSupport::TestCase
4
- def resource_class
5
- User
6
- end
7
-
8
- def create_resource
9
- create_user
10
- end
11
-
12
- test 'remember_me should not generate a new token if using salt' do
13
- user = create_user
14
- user.expects(:valid?).never
15
- user.remember_me!
16
- end
17
-
18
- test 'forget_me should not clear remember token if using salt' do
19
- user = create_user
20
- user.remember_me!
21
- user.expects(:valid?).never
22
- user.forget_me!
23
- end
24
-
25
- test 'serialize into cookie' do
26
- user = create_user
27
- user.remember_me!
28
- assert_equal [user.to_key, user.authenticatable_salt], User.serialize_into_cookie(user)
29
- end
30
-
31
- test 'serialize from cookie' do
32
- user = create_user
33
- user.remember_me!
34
- assert_equal user, User.serialize_from_cookie(user.to_key, user.authenticatable_salt)
35
- end
36
-
37
- test 'raises a RuntimeError if authenticatable_salt is nil' do
38
- user = User.new
39
- user.encrypted_password = nil
40
- assert_raise RuntimeError do
41
- user.rememberable_value
42
- end
43
- end
44
-
45
- test 'should respond to remember_me attribute' do
46
- assert resource_class.new.respond_to?(:remember_me)
47
- assert resource_class.new.respond_to?(:remember_me=)
48
- end
49
-
50
- test 'forget_me should clear remember_created_at' do
51
- resource = create_resource
52
- resource.remember_me!
53
- assert_not resource.remember_created_at.nil?
54
- resource.forget_me!
55
- assert resource.remember_created_at.nil?
56
- end
57
-
58
- test 'forget_me should not try to update resource if it has been destroyed' do
59
- resource = create_resource
60
- resource.expects(:remember_created_at).never
61
- resource.expects(:save).never
62
-
63
- resource.destroy
64
- resource.forget_me!
65
- end
66
-
67
- test 'remember is expired if not created at timestamp is set' do
68
- assert create_resource.remember_expired?
69
- end
70
-
71
- test 'serialize should return nil if no resource is found' do
72
- assert_nil resource_class.serialize_from_cookie([0], "123")
73
- end
74
-
75
- test 'remember me return nil if is a valid resource with invalid token' do
76
- resource = create_resource
77
- assert_nil resource_class.serialize_from_cookie([resource.id], "123")
78
- end
79
-
80
- test 'remember for should fallback to devise remember for default configuration' do
81
- swap Devise, :remember_for => 1.day do
82
- resource = create_resource
83
- resource.remember_me!
84
- assert_not resource.remember_expired?
85
- end
86
- end
87
-
88
- test 'remember expires at should sum date of creation with remember for configuration' do
89
- swap Devise, :remember_for => 3.days do
90
- resource = create_resource
91
- resource.remember_me!
92
- assert_equal 3.days.from_now.to_date, resource.remember_expires_at.to_date
93
-
94
- Devise.remember_for = 5.days
95
- assert_equal 5.days.from_now.to_date, resource.remember_expires_at.to_date
96
- end
97
- end
98
-
99
- test 'remember should be expired if remember_for is zero' do
100
- swap Devise, :remember_for => 0.days do
101
- Devise.remember_for = 0.days
102
- resource = create_resource
103
- resource.remember_me!
104
- assert resource.remember_expired?
105
- end
106
- end
107
-
108
- test 'remember should be expired if it was created before limit time' do
109
- swap Devise, :remember_for => 1.day do
110
- resource = create_resource
111
- resource.remember_me!
112
- resource.remember_created_at = 2.days.ago
113
- resource.save
114
- assert resource.remember_expired?
115
- end
116
- end
117
-
118
- test 'remember should not be expired if it was created within the limit time' do
119
- swap Devise, :remember_for => 30.days do
120
- resource = create_resource
121
- resource.remember_me!
122
- resource.remember_created_at = (30.days.ago + 2.minutes)
123
- resource.save
124
- assert_not resource.remember_expired?
125
- end
126
- end
127
-
128
- test 'if extend_remember_period is false, remember_me! should generate a new timestamp if expired' do
129
- swap Devise, :remember_for => 5.minutes do
130
- resource = create_resource
131
- resource.remember_me!(false)
132
- assert resource.remember_created_at
133
-
134
- resource.remember_created_at = old = 10.minutes.ago
135
- resource.save
136
-
137
- resource.remember_me!(false)
138
- assert_not_equal old.to_i, resource.remember_created_at.to_i
139
- end
140
- end
141
-
142
- test 'if extend_remember_period is false, remember_me! should not generate a new timestamp' do
143
- swap Devise, :remember_for => 1.year do
144
- resource = create_resource
145
- resource.remember_me!(false)
146
- assert resource.remember_created_at
147
-
148
- resource.remember_created_at = old = 10.minutes.ago.utc
149
- resource.save
150
-
151
- resource.remember_me!(false)
152
- assert_equal old.to_i, resource.remember_created_at.to_i
153
- end
154
- end
155
-
156
- test 'if extend_remember_period is true, remember_me! should always generate a new timestamp' do
157
- swap Devise, :remember_for => 1.year do
158
- resource = create_resource
159
- resource.remember_me!(true)
160
- assert resource.remember_created_at
161
-
162
- resource.remember_created_at = old = 10.minutes.ago
163
- resource.save
164
-
165
- resource.remember_me!(true)
166
- assert_not_equal old, resource.remember_created_at
167
- end
168
- end
169
-
170
- test 'should have the required_fields array' do
171
- assert_same_content Devise::Models::Rememberable.required_fields(User), [
172
- :remember_created_at
173
- ]
174
- end
175
- end