nulogy-authlogic 3.1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/Gemfile +3 -0
- data/Gemfile.lock +62 -0
- data/LICENSE +20 -0
- data/README.rdoc +250 -0
- data/Rakefile +50 -0
- data/VERSION.yml +5 -0
- data/authlogic.gemspec +192 -0
- data/generators/session/session_generator.rb +9 -0
- data/generators/session/templates/session.rb +2 -0
- data/init.rb +1 -0
- data/lib/authlogic.rb +64 -0
- data/lib/authlogic/acts_as_authentic/base.rb +109 -0
- data/lib/authlogic/acts_as_authentic/email.rb +110 -0
- data/lib/authlogic/acts_as_authentic/logged_in_status.rb +59 -0
- data/lib/authlogic/acts_as_authentic/login.rb +142 -0
- data/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
- data/lib/authlogic/acts_as_authentic/password.rb +355 -0
- data/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
- data/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
- data/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
- data/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
- data/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
- data/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
- data/lib/authlogic/authenticates_many/association.rb +42 -0
- data/lib/authlogic/authenticates_many/base.rb +54 -0
- data/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
- data/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
- data/lib/authlogic/controller_adapters/rails_adapter.rb +50 -0
- data/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
- data/lib/authlogic/crypto_providers/aes256.rb +43 -0
- data/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
- data/lib/authlogic/crypto_providers/md5.rb +34 -0
- data/lib/authlogic/crypto_providers/sha1.rb +35 -0
- data/lib/authlogic/crypto_providers/sha256.rb +50 -0
- data/lib/authlogic/crypto_providers/sha512.rb +50 -0
- data/lib/authlogic/crypto_providers/wordpress.rb +43 -0
- data/lib/authlogic/i18n.rb +84 -0
- data/lib/authlogic/i18n/translator.rb +15 -0
- data/lib/authlogic/random.rb +33 -0
- data/lib/authlogic/regex.rb +25 -0
- data/lib/authlogic/session/activation.rb +58 -0
- data/lib/authlogic/session/active_record_trickery.rb +72 -0
- data/lib/authlogic/session/base.rb +37 -0
- data/lib/authlogic/session/brute_force_protection.rb +96 -0
- data/lib/authlogic/session/callbacks.rb +96 -0
- data/lib/authlogic/session/cookies.rb +182 -0
- data/lib/authlogic/session/existence.rb +93 -0
- data/lib/authlogic/session/foundation.rb +77 -0
- data/lib/authlogic/session/http_auth.rb +99 -0
- data/lib/authlogic/session/id.rb +41 -0
- data/lib/authlogic/session/klass.rb +69 -0
- data/lib/authlogic/session/magic_columns.rb +95 -0
- data/lib/authlogic/session/magic_states.rb +59 -0
- data/lib/authlogic/session/params.rb +101 -0
- data/lib/authlogic/session/password.rb +240 -0
- data/lib/authlogic/session/perishable_token.rb +18 -0
- data/lib/authlogic/session/persistence.rb +70 -0
- data/lib/authlogic/session/priority_record.rb +34 -0
- data/lib/authlogic/session/scopes.rb +101 -0
- data/lib/authlogic/session/session.rb +62 -0
- data/lib/authlogic/session/timeout.rb +82 -0
- data/lib/authlogic/session/unauthorized_record.rb +50 -0
- data/lib/authlogic/session/validation.rb +82 -0
- data/lib/authlogic/test_case.rb +120 -0
- data/lib/authlogic/test_case/mock_controller.rb +55 -0
- data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
- data/lib/authlogic/test_case/mock_logger.rb +10 -0
- data/lib/authlogic/test_case/mock_request.rb +19 -0
- data/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
- data/lib/generators/authlogic/USAGE +8 -0
- data/lib/generators/authlogic/session_generator.rb +14 -0
- data/lib/generators/authlogic/templates/session.rb +2 -0
- data/rails/init.rb +1 -0
- data/shoulda_macros/authlogic.rb +69 -0
- data/test/acts_as_authentic_test/base_test.rb +18 -0
- data/test/acts_as_authentic_test/email_test.rb +116 -0
- data/test/acts_as_authentic_test/logged_in_status_test.rb +50 -0
- data/test/acts_as_authentic_test/login_test.rb +116 -0
- data/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
- data/test/acts_as_authentic_test/password_test.rb +236 -0
- data/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
- data/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
- data/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
- data/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
- data/test/acts_as_authentic_test/single_access_test.rb +44 -0
- data/test/authenticates_many_test.rb +16 -0
- data/test/crypto_provider_test/aes256_test.rb +14 -0
- data/test/crypto_provider_test/bcrypt_test.rb +14 -0
- data/test/crypto_provider_test/sha1_test.rb +23 -0
- data/test/crypto_provider_test/sha256_test.rb +14 -0
- data/test/crypto_provider_test/sha512_test.rb +14 -0
- data/test/fixtures/companies.yml +5 -0
- data/test/fixtures/employees.yml +17 -0
- data/test/fixtures/projects.yml +3 -0
- data/test/fixtures/users.yml +24 -0
- data/test/i18n_test.rb +33 -0
- data/test/libs/affiliate.rb +7 -0
- data/test/libs/company.rb +6 -0
- data/test/libs/employee.rb +7 -0
- data/test/libs/employee_session.rb +2 -0
- data/test/libs/ldaper.rb +3 -0
- data/test/libs/ordered_hash.rb +9 -0
- data/test/libs/project.rb +3 -0
- data/test/libs/user.rb +5 -0
- data/test/libs/user_session.rb +5 -0
- data/test/random_test.rb +42 -0
- data/test/session_test/activation_test.rb +43 -0
- data/test/session_test/active_record_trickery_test.rb +46 -0
- data/test/session_test/brute_force_protection_test.rb +101 -0
- data/test/session_test/callbacks_test.rb +54 -0
- data/test/session_test/cookies_test.rb +136 -0
- data/test/session_test/credentials_test.rb +0 -0
- data/test/session_test/existence_test.rb +64 -0
- data/test/session_test/http_auth_test.rb +57 -0
- data/test/session_test/id_test.rb +17 -0
- data/test/session_test/klass_test.rb +40 -0
- data/test/session_test/magic_columns_test.rb +62 -0
- data/test/session_test/magic_states_test.rb +60 -0
- data/test/session_test/params_test.rb +53 -0
- data/test/session_test/password_test.rb +106 -0
- data/test/session_test/perishability_test.rb +15 -0
- data/test/session_test/persistence_test.rb +21 -0
- data/test/session_test/scopes_test.rb +60 -0
- data/test/session_test/session_test.rb +59 -0
- data/test/session_test/timeout_test.rb +52 -0
- data/test/session_test/unauthorized_record_test.rb +13 -0
- data/test/session_test/validation_test.rb +23 -0
- data/test/test_helper.rb +168 -0
- metadata +252 -0
@@ -0,0 +1,17 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
class IdTest < ActiveSupport::TestCase
|
5
|
+
def test_credentials
|
6
|
+
session = UserSession.new
|
7
|
+
session.credentials = [:my_id]
|
8
|
+
assert_equal :my_id, session.id
|
9
|
+
end
|
10
|
+
|
11
|
+
def test_id
|
12
|
+
session = UserSession.new
|
13
|
+
session.id = :my_id
|
14
|
+
assert_equal :my_id, session.id
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
@@ -0,0 +1,40 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
module KlassTest
|
5
|
+
class ConfigTest < ActiveSupport::TestCase
|
6
|
+
def test_authenticate_with
|
7
|
+
UserSession.authenticate_with = Employee
|
8
|
+
assert_equal "Employee", UserSession.klass_name
|
9
|
+
assert_equal Employee, UserSession.klass
|
10
|
+
|
11
|
+
UserSession.authenticate_with User
|
12
|
+
assert_equal "User", UserSession.klass_name
|
13
|
+
assert_equal User, UserSession.klass
|
14
|
+
end
|
15
|
+
|
16
|
+
def test_klass
|
17
|
+
assert_equal User, UserSession.klass
|
18
|
+
end
|
19
|
+
|
20
|
+
def test_klass_name
|
21
|
+
assert_equal "User", UserSession.klass_name
|
22
|
+
end
|
23
|
+
|
24
|
+
def test_klass_name_uses_custom_name
|
25
|
+
assert_equal "User", UserSession.klass_name
|
26
|
+
assert_equal "BackOfficeUser", BackOfficeUserSession.klass_name
|
27
|
+
end
|
28
|
+
end
|
29
|
+
|
30
|
+
class InstanceMethodsTest < ActiveSupport::TestCase
|
31
|
+
def test_record_method
|
32
|
+
ben = users(:ben)
|
33
|
+
set_session_for(ben)
|
34
|
+
session = UserSession.find
|
35
|
+
assert_equal ben, session.record
|
36
|
+
assert_equal ben, session.user
|
37
|
+
end
|
38
|
+
end
|
39
|
+
end
|
40
|
+
end
|
@@ -0,0 +1,62 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
module MagicColumnsTest
|
5
|
+
class ConfigTest < ActiveSupport::TestCase
|
6
|
+
def test_last_request_at_threshold_config
|
7
|
+
UserSession.last_request_at_threshold = 2.minutes
|
8
|
+
assert_equal 2.minutes, UserSession.last_request_at_threshold
|
9
|
+
|
10
|
+
UserSession.last_request_at_threshold 0
|
11
|
+
assert_equal 0, UserSession.last_request_at_threshold
|
12
|
+
end
|
13
|
+
end
|
14
|
+
|
15
|
+
class InstanceMethodsTest < ActiveSupport::TestCase
|
16
|
+
def test_after_persisting_set_last_request_at
|
17
|
+
ben = users(:ben)
|
18
|
+
assert !UserSession.create(ben).new_session?
|
19
|
+
|
20
|
+
set_cookie_for(ben)
|
21
|
+
old_last_request_at = ben.last_request_at
|
22
|
+
assert UserSession.find
|
23
|
+
ben.reload
|
24
|
+
assert ben.last_request_at != old_last_request_at
|
25
|
+
end
|
26
|
+
|
27
|
+
def test_valid_increase_failed_login_count
|
28
|
+
ben = users(:ben)
|
29
|
+
old_failed_login_count = ben.failed_login_count
|
30
|
+
assert UserSession.create(:login => ben.login, :password => "wrong").new_session?
|
31
|
+
ben.reload
|
32
|
+
assert_equal old_failed_login_count + 1, ben.failed_login_count
|
33
|
+
end
|
34
|
+
|
35
|
+
def test_before_save_update_info
|
36
|
+
ben = users(:ben)
|
37
|
+
|
38
|
+
# increase failed login count
|
39
|
+
assert UserSession.create(:login => ben.login, :password => "wrong").new_session?
|
40
|
+
ben.reload
|
41
|
+
|
42
|
+
# grab old values
|
43
|
+
old_login_count = ben.login_count
|
44
|
+
old_failed_login_count = ben.failed_login_count
|
45
|
+
old_last_login_at = ben.last_login_at
|
46
|
+
old_current_login_at = ben.current_login_at
|
47
|
+
old_last_login_ip = ben.last_login_ip
|
48
|
+
old_current_login_ip = ben.current_login_ip
|
49
|
+
|
50
|
+
assert !UserSession.create(:login => ben.login, :password => "benrocks").new_session?
|
51
|
+
|
52
|
+
ben.reload
|
53
|
+
assert_equal old_login_count + 1, ben.login_count
|
54
|
+
assert_equal 0, ben.failed_login_count
|
55
|
+
assert_equal old_current_login_at, ben.last_login_at
|
56
|
+
assert ben.current_login_at != old_current_login_at
|
57
|
+
assert_equal old_current_login_ip, ben.last_login_ip
|
58
|
+
assert_equal "1.1.1.1", ben.current_login_ip
|
59
|
+
end
|
60
|
+
end
|
61
|
+
end
|
62
|
+
end
|
@@ -0,0 +1,60 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
module SessionTest
|
5
|
+
class ConfigTest < ActiveSupport::TestCase
|
6
|
+
def test_disable_magic_states_config
|
7
|
+
UserSession.disable_magic_states = true
|
8
|
+
assert_equal true, UserSession.disable_magic_states
|
9
|
+
|
10
|
+
UserSession.disable_magic_states false
|
11
|
+
assert_equal false, UserSession.disable_magic_states
|
12
|
+
end
|
13
|
+
end
|
14
|
+
|
15
|
+
class InstanceMethodsTest < ActiveSupport::TestCase
|
16
|
+
def test_disabling_magic_states
|
17
|
+
UserSession.disable_magic_states = true
|
18
|
+
|
19
|
+
ben = users(:ben)
|
20
|
+
ben.update_attribute(:active, false)
|
21
|
+
assert UserSession.create(ben)
|
22
|
+
|
23
|
+
UserSession.disable_magic_states = false
|
24
|
+
end
|
25
|
+
|
26
|
+
def test_validate_validate_magic_states_active
|
27
|
+
session = UserSession.new
|
28
|
+
ben = users(:ben)
|
29
|
+
session.unauthorized_record = ben
|
30
|
+
assert session.valid?
|
31
|
+
|
32
|
+
ben.update_attribute(:active, false)
|
33
|
+
assert !session.valid?
|
34
|
+
assert session.errors[:base].size > 0
|
35
|
+
end
|
36
|
+
|
37
|
+
def test_validate_validate_magic_states_approved
|
38
|
+
session = UserSession.new
|
39
|
+
ben = users(:ben)
|
40
|
+
session.unauthorized_record = ben
|
41
|
+
assert session.valid?
|
42
|
+
|
43
|
+
ben.update_attribute(:approved, false)
|
44
|
+
assert !session.valid?
|
45
|
+
assert session.errors[:base].size > 0
|
46
|
+
end
|
47
|
+
|
48
|
+
def test_validate_validate_magic_states_confirmed
|
49
|
+
session = UserSession.new
|
50
|
+
ben = users(:ben)
|
51
|
+
session.unauthorized_record = ben
|
52
|
+
assert session.valid?
|
53
|
+
|
54
|
+
ben.update_attribute(:confirmed, false)
|
55
|
+
assert !session.valid?
|
56
|
+
assert session.errors[:base].size > 0
|
57
|
+
end
|
58
|
+
end
|
59
|
+
end
|
60
|
+
end
|
@@ -0,0 +1,53 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
module ParamsTest
|
5
|
+
class ConfigTest < ActiveSupport::TestCase
|
6
|
+
def test_params_key
|
7
|
+
UserSession.params_key = "my_params_key"
|
8
|
+
assert_equal "my_params_key", UserSession.params_key
|
9
|
+
|
10
|
+
UserSession.params_key "user_credentials"
|
11
|
+
assert_equal "user_credentials", UserSession.params_key
|
12
|
+
end
|
13
|
+
|
14
|
+
def test_single_access_allowed_request_types
|
15
|
+
UserSession.single_access_allowed_request_types = ["my request type"]
|
16
|
+
assert_equal ["my request type"], UserSession.single_access_allowed_request_types
|
17
|
+
|
18
|
+
UserSession.single_access_allowed_request_types ["application/rss+xml", "application/atom+xml"]
|
19
|
+
assert_equal ["application/rss+xml", "application/atom+xml"], UserSession.single_access_allowed_request_types
|
20
|
+
end
|
21
|
+
end
|
22
|
+
|
23
|
+
class InstanceMethodsTest < ActiveSupport::TestCase
|
24
|
+
def test_persist_persist_by_params
|
25
|
+
ben = users(:ben)
|
26
|
+
session = UserSession.new
|
27
|
+
|
28
|
+
assert !session.persisting?
|
29
|
+
set_params_for(ben)
|
30
|
+
|
31
|
+
assert !session.persisting?
|
32
|
+
assert !session.unauthorized_record
|
33
|
+
assert !session.record
|
34
|
+
assert_nil controller.session["user_credentials"]
|
35
|
+
|
36
|
+
set_request_content_type("text/plain")
|
37
|
+
assert !session.persisting?
|
38
|
+
assert !session.unauthorized_record
|
39
|
+
assert_nil controller.session["user_credentials"]
|
40
|
+
|
41
|
+
set_request_content_type("application/atom+xml")
|
42
|
+
assert session.persisting?
|
43
|
+
assert_equal ben, session.record
|
44
|
+
assert_nil controller.session["user_credentials"] # should not persist since this is single access
|
45
|
+
|
46
|
+
set_request_content_type("application/rss+xml")
|
47
|
+
assert session.persisting?
|
48
|
+
assert_equal ben, session.unauthorized_record
|
49
|
+
assert_nil controller.session["user_credentials"]
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
@@ -0,0 +1,106 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
module PasswordTest
|
5
|
+
class ConfigTest < ActiveSupport::TestCase
|
6
|
+
def test_find_by_login_method
|
7
|
+
UserSession.find_by_login_method = "my_login_method"
|
8
|
+
assert_equal "my_login_method", UserSession.find_by_login_method
|
9
|
+
|
10
|
+
UserSession.find_by_login_method "find_by_login"
|
11
|
+
assert_equal "find_by_login", UserSession.find_by_login_method
|
12
|
+
end
|
13
|
+
|
14
|
+
def test_verify_password_method
|
15
|
+
UserSession.verify_password_method = "my_login_method"
|
16
|
+
assert_equal "my_login_method", UserSession.verify_password_method
|
17
|
+
|
18
|
+
UserSession.verify_password_method "valid_password?"
|
19
|
+
assert_equal "valid_password?", UserSession.verify_password_method
|
20
|
+
end
|
21
|
+
|
22
|
+
def test_generalize_credentials_error_mesages_set_to_false
|
23
|
+
UserSession.generalize_credentials_error_messages false
|
24
|
+
assert !UserSession.generalize_credentials_error_messages
|
25
|
+
session = UserSession.create(:login => users(:ben).login, :password => "invalud-password")
|
26
|
+
assert_equal ["Password is not valid"], session.errors.full_messages
|
27
|
+
end
|
28
|
+
|
29
|
+
def test_generalize_credentials_error_messages_set_to_true
|
30
|
+
UserSession.generalize_credentials_error_messages true
|
31
|
+
assert UserSession.generalize_credentials_error_messages
|
32
|
+
session = UserSession.create(:login => users(:ben).login, :password => "invalud-password")
|
33
|
+
assert_equal ["Login/Password combination is not valid"], session.errors.full_messages
|
34
|
+
end
|
35
|
+
|
36
|
+
def test_generalize_credentials_error_messages_set_to_string
|
37
|
+
UserSession.generalize_credentials_error_messages= "Custom Error Message"
|
38
|
+
assert UserSession.generalize_credentials_error_messages
|
39
|
+
session = UserSession.create(:login => users(:ben).login, :password => "invalud-password")
|
40
|
+
assert_equal ["Custom Error Message"], session.errors.full_messages
|
41
|
+
end
|
42
|
+
|
43
|
+
|
44
|
+
def test_login_field
|
45
|
+
UserSession.configured_password_methods = false
|
46
|
+
UserSession.login_field = :saweet
|
47
|
+
assert_equal :saweet, UserSession.login_field
|
48
|
+
session = UserSession.new
|
49
|
+
assert session.respond_to?(:saweet)
|
50
|
+
|
51
|
+
UserSession.login_field :login
|
52
|
+
assert_equal :login, UserSession.login_field
|
53
|
+
session = UserSession.new
|
54
|
+
assert session.respond_to?(:login)
|
55
|
+
end
|
56
|
+
|
57
|
+
def test_password_field
|
58
|
+
UserSession.configured_password_methods = false
|
59
|
+
UserSession.password_field = :saweet
|
60
|
+
assert_equal :saweet, UserSession.password_field
|
61
|
+
session = UserSession.new
|
62
|
+
assert session.respond_to?(:saweet)
|
63
|
+
|
64
|
+
UserSession.password_field :password
|
65
|
+
assert_equal :password, UserSession.password_field
|
66
|
+
session = UserSession.new
|
67
|
+
assert session.respond_to?(:password)
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
71
|
+
class InstanceMethodsTest < ActiveSupport::TestCase
|
72
|
+
def test_init
|
73
|
+
session = UserSession.new
|
74
|
+
assert session.respond_to?(:login)
|
75
|
+
assert session.respond_to?(:login=)
|
76
|
+
assert session.respond_to?(:password)
|
77
|
+
assert session.respond_to?(:password=)
|
78
|
+
assert session.respond_to?(:protected_password, true)
|
79
|
+
end
|
80
|
+
|
81
|
+
def test_credentials
|
82
|
+
session = UserSession.new
|
83
|
+
session.credentials = {:login => "login", :password => "pass"}
|
84
|
+
assert_equal "login", session.login
|
85
|
+
assert_nil session.password
|
86
|
+
assert_equal "pass", session.send(:protected_password)
|
87
|
+
assert_equal({:password => "<protected>", :login => "login"}, session.credentials)
|
88
|
+
end
|
89
|
+
|
90
|
+
def test_credentials_are_params_safe
|
91
|
+
session = UserSession.new
|
92
|
+
assert_nothing_raised { session.credentials = {:hacker_method => "error!"} }
|
93
|
+
end
|
94
|
+
|
95
|
+
def test_save_with_credentials
|
96
|
+
ben = users(:ben)
|
97
|
+
session = UserSession.new(:login => ben.login, :password => "benrocks")
|
98
|
+
assert session.save
|
99
|
+
assert !session.new_session?
|
100
|
+
assert_equal 1, session.record.login_count
|
101
|
+
assert Time.now >= session.record.current_login_at
|
102
|
+
assert_equal "1.1.1.1", session.record.current_login_ip
|
103
|
+
end
|
104
|
+
end
|
105
|
+
end
|
106
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
class PerishabilityTest < ActiveSupport::TestCase
|
5
|
+
def test_after_save
|
6
|
+
ben = users(:ben)
|
7
|
+
old_perishable_token = ben.perishable_token
|
8
|
+
session = UserSession.create(ben)
|
9
|
+
assert_not_equal old_perishable_token, ben.perishable_token
|
10
|
+
|
11
|
+
drew = employees(:drew)
|
12
|
+
assert UserSession.create(drew)
|
13
|
+
end
|
14
|
+
end
|
15
|
+
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
class PersistenceTest < ActiveSupport::TestCase
|
5
|
+
def test_find
|
6
|
+
ben = users(:ben)
|
7
|
+
assert !UserSession.find
|
8
|
+
http_basic_auth_for(ben) { assert UserSession.find }
|
9
|
+
set_cookie_for(ben)
|
10
|
+
assert UserSession.find
|
11
|
+
unset_cookie
|
12
|
+
set_session_for(ben)
|
13
|
+
session = UserSession.find
|
14
|
+
assert session
|
15
|
+
end
|
16
|
+
|
17
|
+
def test_persisting
|
18
|
+
# tested thoroughly in test_find
|
19
|
+
end
|
20
|
+
end
|
21
|
+
end
|
@@ -0,0 +1,60 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
module SessionTest
|
4
|
+
class ScopesTest < ActiveSupport::TestCase
|
5
|
+
def test_scope_method
|
6
|
+
assert_nil Authlogic::Session::Base.scope
|
7
|
+
|
8
|
+
thread1 = Thread.new do
|
9
|
+
scope = {:id => :scope1}
|
10
|
+
Authlogic::Session::Base.send(:scope=, scope)
|
11
|
+
assert_equal scope, Authlogic::Session::Base.scope
|
12
|
+
end
|
13
|
+
thread1.join
|
14
|
+
|
15
|
+
assert_nil Authlogic::Session::Base.scope
|
16
|
+
|
17
|
+
thread2 = Thread.new do
|
18
|
+
scope = {:id => :scope2}
|
19
|
+
Authlogic::Session::Base.send(:scope=, scope)
|
20
|
+
assert_equal scope, Authlogic::Session::Base.scope
|
21
|
+
end
|
22
|
+
thread2.join
|
23
|
+
|
24
|
+
assert_nil Authlogic::Session::Base.scope
|
25
|
+
end
|
26
|
+
|
27
|
+
def test_with_scope_method
|
28
|
+
assert_raise(ArgumentError) { UserSession.with_scope }
|
29
|
+
|
30
|
+
UserSession.with_scope(:find_options => {:conditions => "awesome = 1"}, :id => "some_id") do
|
31
|
+
assert_equal({:find_options => {:conditions => "awesome = 1"}, :id => "some_id"}, UserSession.scope)
|
32
|
+
end
|
33
|
+
|
34
|
+
assert_nil UserSession.scope
|
35
|
+
end
|
36
|
+
|
37
|
+
def test_initialize
|
38
|
+
UserSession.with_scope(:find_options => {:conditions => "awesome = 1"}, :id => "some_id") do
|
39
|
+
session = UserSession.new
|
40
|
+
assert_equal({:find_options => {:conditions => "awesome = 1"}, :id => "some_id"}, session.scope)
|
41
|
+
session.id = :another_id
|
42
|
+
assert_equal "another_id_some_id_test", session.send(:build_key, "test")
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
def test_search_for_record_with_scopes
|
47
|
+
binary_logic = companies(:binary_logic)
|
48
|
+
ben = users(:ben)
|
49
|
+
zack = users(:zack)
|
50
|
+
|
51
|
+
session = UserSession.new
|
52
|
+
assert_equal zack, session.send(:search_for_record, "find_by_login", zack.login)
|
53
|
+
|
54
|
+
session.scope = {:find_options => {:conditions => ["company_id = ?", binary_logic.id]}}
|
55
|
+
assert_nil session.send(:search_for_record, "find_by_login", zack.login)
|
56
|
+
|
57
|
+
assert_equal ben, session.send(:search_for_record, "find_by_login", ben.login)
|
58
|
+
end
|
59
|
+
end
|
60
|
+
end
|