nulogy-authlogic 3.1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (129) hide show
  1. data/Gemfile +3 -0
  2. data/Gemfile.lock +62 -0
  3. data/LICENSE +20 -0
  4. data/README.rdoc +250 -0
  5. data/Rakefile +50 -0
  6. data/VERSION.yml +5 -0
  7. data/authlogic.gemspec +192 -0
  8. data/generators/session/session_generator.rb +9 -0
  9. data/generators/session/templates/session.rb +2 -0
  10. data/init.rb +1 -0
  11. data/lib/authlogic.rb +64 -0
  12. data/lib/authlogic/acts_as_authentic/base.rb +109 -0
  13. data/lib/authlogic/acts_as_authentic/email.rb +110 -0
  14. data/lib/authlogic/acts_as_authentic/logged_in_status.rb +59 -0
  15. data/lib/authlogic/acts_as_authentic/login.rb +142 -0
  16. data/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
  17. data/lib/authlogic/acts_as_authentic/password.rb +355 -0
  18. data/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
  19. data/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
  20. data/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
  21. data/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
  22. data/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
  23. data/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
  24. data/lib/authlogic/authenticates_many/association.rb +42 -0
  25. data/lib/authlogic/authenticates_many/base.rb +54 -0
  26. data/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
  27. data/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
  28. data/lib/authlogic/controller_adapters/rails_adapter.rb +50 -0
  29. data/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
  30. data/lib/authlogic/crypto_providers/aes256.rb +43 -0
  31. data/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
  32. data/lib/authlogic/crypto_providers/md5.rb +34 -0
  33. data/lib/authlogic/crypto_providers/sha1.rb +35 -0
  34. data/lib/authlogic/crypto_providers/sha256.rb +50 -0
  35. data/lib/authlogic/crypto_providers/sha512.rb +50 -0
  36. data/lib/authlogic/crypto_providers/wordpress.rb +43 -0
  37. data/lib/authlogic/i18n.rb +84 -0
  38. data/lib/authlogic/i18n/translator.rb +15 -0
  39. data/lib/authlogic/random.rb +33 -0
  40. data/lib/authlogic/regex.rb +25 -0
  41. data/lib/authlogic/session/activation.rb +58 -0
  42. data/lib/authlogic/session/active_record_trickery.rb +72 -0
  43. data/lib/authlogic/session/base.rb +37 -0
  44. data/lib/authlogic/session/brute_force_protection.rb +96 -0
  45. data/lib/authlogic/session/callbacks.rb +96 -0
  46. data/lib/authlogic/session/cookies.rb +182 -0
  47. data/lib/authlogic/session/existence.rb +93 -0
  48. data/lib/authlogic/session/foundation.rb +77 -0
  49. data/lib/authlogic/session/http_auth.rb +99 -0
  50. data/lib/authlogic/session/id.rb +41 -0
  51. data/lib/authlogic/session/klass.rb +69 -0
  52. data/lib/authlogic/session/magic_columns.rb +95 -0
  53. data/lib/authlogic/session/magic_states.rb +59 -0
  54. data/lib/authlogic/session/params.rb +101 -0
  55. data/lib/authlogic/session/password.rb +240 -0
  56. data/lib/authlogic/session/perishable_token.rb +18 -0
  57. data/lib/authlogic/session/persistence.rb +70 -0
  58. data/lib/authlogic/session/priority_record.rb +34 -0
  59. data/lib/authlogic/session/scopes.rb +101 -0
  60. data/lib/authlogic/session/session.rb +62 -0
  61. data/lib/authlogic/session/timeout.rb +82 -0
  62. data/lib/authlogic/session/unauthorized_record.rb +50 -0
  63. data/lib/authlogic/session/validation.rb +82 -0
  64. data/lib/authlogic/test_case.rb +120 -0
  65. data/lib/authlogic/test_case/mock_controller.rb +55 -0
  66. data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
  67. data/lib/authlogic/test_case/mock_logger.rb +10 -0
  68. data/lib/authlogic/test_case/mock_request.rb +19 -0
  69. data/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
  70. data/lib/generators/authlogic/USAGE +8 -0
  71. data/lib/generators/authlogic/session_generator.rb +14 -0
  72. data/lib/generators/authlogic/templates/session.rb +2 -0
  73. data/rails/init.rb +1 -0
  74. data/shoulda_macros/authlogic.rb +69 -0
  75. data/test/acts_as_authentic_test/base_test.rb +18 -0
  76. data/test/acts_as_authentic_test/email_test.rb +116 -0
  77. data/test/acts_as_authentic_test/logged_in_status_test.rb +50 -0
  78. data/test/acts_as_authentic_test/login_test.rb +116 -0
  79. data/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
  80. data/test/acts_as_authentic_test/password_test.rb +236 -0
  81. data/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
  82. data/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
  83. data/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
  84. data/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
  85. data/test/acts_as_authentic_test/single_access_test.rb +44 -0
  86. data/test/authenticates_many_test.rb +16 -0
  87. data/test/crypto_provider_test/aes256_test.rb +14 -0
  88. data/test/crypto_provider_test/bcrypt_test.rb +14 -0
  89. data/test/crypto_provider_test/sha1_test.rb +23 -0
  90. data/test/crypto_provider_test/sha256_test.rb +14 -0
  91. data/test/crypto_provider_test/sha512_test.rb +14 -0
  92. data/test/fixtures/companies.yml +5 -0
  93. data/test/fixtures/employees.yml +17 -0
  94. data/test/fixtures/projects.yml +3 -0
  95. data/test/fixtures/users.yml +24 -0
  96. data/test/i18n_test.rb +33 -0
  97. data/test/libs/affiliate.rb +7 -0
  98. data/test/libs/company.rb +6 -0
  99. data/test/libs/employee.rb +7 -0
  100. data/test/libs/employee_session.rb +2 -0
  101. data/test/libs/ldaper.rb +3 -0
  102. data/test/libs/ordered_hash.rb +9 -0
  103. data/test/libs/project.rb +3 -0
  104. data/test/libs/user.rb +5 -0
  105. data/test/libs/user_session.rb +5 -0
  106. data/test/random_test.rb +42 -0
  107. data/test/session_test/activation_test.rb +43 -0
  108. data/test/session_test/active_record_trickery_test.rb +46 -0
  109. data/test/session_test/brute_force_protection_test.rb +101 -0
  110. data/test/session_test/callbacks_test.rb +54 -0
  111. data/test/session_test/cookies_test.rb +136 -0
  112. data/test/session_test/credentials_test.rb +0 -0
  113. data/test/session_test/existence_test.rb +64 -0
  114. data/test/session_test/http_auth_test.rb +57 -0
  115. data/test/session_test/id_test.rb +17 -0
  116. data/test/session_test/klass_test.rb +40 -0
  117. data/test/session_test/magic_columns_test.rb +62 -0
  118. data/test/session_test/magic_states_test.rb +60 -0
  119. data/test/session_test/params_test.rb +53 -0
  120. data/test/session_test/password_test.rb +106 -0
  121. data/test/session_test/perishability_test.rb +15 -0
  122. data/test/session_test/persistence_test.rb +21 -0
  123. data/test/session_test/scopes_test.rb +60 -0
  124. data/test/session_test/session_test.rb +59 -0
  125. data/test/session_test/timeout_test.rb +52 -0
  126. data/test/session_test/unauthorized_record_test.rb +13 -0
  127. data/test/session_test/validation_test.rb +23 -0
  128. data/test/test_helper.rb +168 -0
  129. metadata +252 -0
@@ -0,0 +1,68 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # Maintains the persistence token, the token responsible for persisting sessions. This token
4
+ # gets stored in the session and the cookie.
5
+ module PersistenceToken
6
+ def self.included(klass)
7
+ klass.class_eval do
8
+ add_acts_as_authentic_module(Methods)
9
+ end
10
+ end
11
+
12
+ # Methods for the persistence token.
13
+ module Methods
14
+ def self.included(klass)
15
+ klass.class_eval do
16
+ extend ClassMethods
17
+ include InstanceMethods
18
+
19
+ if respond_to?(:after_password_set) && respond_to?(:after_password_verification)
20
+ after_password_set :reset_persistence_token
21
+ after_password_verification :reset_persistence_token!, :if => :reset_persistence_token?
22
+ end
23
+
24
+ validates_presence_of :persistence_token
25
+ validates_uniqueness_of :persistence_token, :if => :persistence_token_changed?
26
+
27
+ before_validation :reset_persistence_token, :if => :reset_persistence_token?
28
+ end
29
+ end
30
+
31
+ # Class level methods for the persistence token.
32
+ module ClassMethods
33
+ # Resets ALL persistence tokens in the database, which will require all users to reauthenticate.
34
+ def forget_all
35
+ # Paginate these to save on memory
36
+ records = nil
37
+ i = 0
38
+ begin
39
+ records = find(:all, :limit => 50, :offset => i)
40
+ records.each { |record| record.forget! }
41
+ i += 50
42
+ end while !records.blank?
43
+ end
44
+ end
45
+
46
+ # Instance level methods for the persistence token.
47
+ module InstanceMethods
48
+ # Resets the persistence_token field to a random hex value.
49
+ def reset_persistence_token
50
+ self.persistence_token = Authlogic::Random.hex_token
51
+ end
52
+
53
+ # Same as reset_persistence_token, but then saves the record.
54
+ def reset_persistence_token!
55
+ reset_persistence_token
56
+ save_without_session_maintenance(:validate => false)
57
+ end
58
+ alias_method :forget!, :reset_persistence_token!
59
+
60
+ private
61
+ def reset_persistence_token?
62
+ persistence_token.blank?
63
+ end
64
+ end
65
+ end
66
+ end
67
+ end
68
+ end
@@ -0,0 +1,61 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # This module is responsible for transitioning existing applications from the restful_authentication plugin.
4
+ module RestfulAuthentication
5
+ def self.included(klass)
6
+ klass.class_eval do
7
+ extend Config
8
+ include InstanceMethods
9
+ end
10
+ end
11
+
12
+ module Config
13
+ # Switching an existing app to Authlogic from restful_authentication? No problem, just set this true and your users won't know
14
+ # anything changed. From your database perspective nothing will change at all. Authlogic will continue to encrypt passwords
15
+ # just like restful_authentication, so your app won't skip a beat. Although, might consider transitioning your users to a newer
16
+ # and stronger algorithm. Checkout the transition_from_restful_authentication option.
17
+ #
18
+ # * <tt>Default:</tt> false
19
+ # * <tt>Accepts:</tt> Boolean
20
+ def act_like_restful_authentication(value = nil)
21
+ r = rw_config(:act_like_restful_authentication, value, false)
22
+ set_restful_authentication_config if value
23
+ r
24
+ end
25
+ alias_method :act_like_restful_authentication=, :act_like_restful_authentication
26
+
27
+ # This works just like act_like_restful_authentication except that it will start transitioning your users to the algorithm you
28
+ # specify with the crypto provider option. The next time they log in it will resave their password with the new algorithm
29
+ # and any new record will use the new algorithm as well. Make sure to update your users table if you are using the default
30
+ # migration since it will set crypted_password and salt columns to a maximum width of 40 characters which is not enough.
31
+ def transition_from_restful_authentication(value = nil)
32
+ r = rw_config(:transition_from_restful_authentication, value, false)
33
+ set_restful_authentication_config if value
34
+ r
35
+ end
36
+ alias_method :transition_from_restful_authentication=, :transition_from_restful_authentication
37
+
38
+ private
39
+ def set_restful_authentication_config
40
+ crypto_provider_key = act_like_restful_authentication ? :crypto_provider : :transition_from_crypto_providers
41
+ self.send("#{crypto_provider_key}=", CryptoProviders::Sha1)
42
+ if !defined?(::REST_AUTH_SITE_KEY) || ::REST_AUTH_SITE_KEY.nil?
43
+ class_eval("::REST_AUTH_SITE_KEY = ''") if !defined?(::REST_AUTH_SITE_KEY)
44
+ CryptoProviders::Sha1.stretches = 1
45
+ end
46
+ end
47
+ end
48
+
49
+ module InstanceMethods
50
+ private
51
+ def act_like_restful_authentication?
52
+ self.class.act_like_restful_authentication == true
53
+ end
54
+
55
+ def transition_from_restful_authentication?
56
+ self.class.transition_from_restful_authentication == true
57
+ end
58
+ end
59
+ end
60
+ end
61
+ end
@@ -0,0 +1,139 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # This is one of my favorite features that I think is pretty cool. It's things like this that make a library great
4
+ # and let you know you are on the right track.
5
+ #
6
+ # Just to clear up any confusion, Authlogic stores both the record id and the persistence token in the session.
7
+ # Why? So stale sessions can not be persisted. It stores the id so it can quickly find the record, and the
8
+ # persistence token to ensure no sessions are stale. So if the persistence token changes, the user must log
9
+ # back in.
10
+ #
11
+ # Well, the persistence token changes with the password. What happens if the user changes his own password?
12
+ # He shouldn't have to log back in, he's the one that made the change.
13
+ #
14
+ # That being said, wouldn't it be nice if their session and cookie information was automatically updated?
15
+ # Instead of cluttering up your controller with redundant session code. The same thing goes for new
16
+ # registrations.
17
+ #
18
+ # That's what this module is all about. This will automatically maintain the cookie and session values as
19
+ # records are saved.
20
+ module SessionMaintenance
21
+ def self.included(klass)
22
+ klass.class_eval do
23
+ extend Config
24
+ add_acts_as_authentic_module(Methods)
25
+ end
26
+ end
27
+
28
+ module Config
29
+ # This is more of a convenience method. In order to turn off automatic maintenance of sessions just
30
+ # set this to false, or you can also set the session_ids method to a blank array. Both accomplish
31
+ # the same thing. This method is a little clearer in it's intentions though.
32
+ #
33
+ # * <tt>Default:</tt> true
34
+ # * <tt>Accepts:</tt> Boolean
35
+ def maintain_sessions(value = nil)
36
+ rw_config(:maintain_sessions, value, true)
37
+ end
38
+ alias_method :maintain_sessions=, :maintain_sessions
39
+
40
+ # As you may know, authlogic sessions can be separate by id (See Authlogic::Session::Base#id). You can
41
+ # specify here what session ids you want auto maintained. By default it is the main session, which has
42
+ # an id of nil.
43
+ #
44
+ # * <tt>Default:</tt> [nil]
45
+ # * <tt>Accepts:</tt> Array
46
+ def session_ids(value = nil)
47
+ rw_config(:session_ids, value, [nil])
48
+ end
49
+ alias_method :session_ids=, :session_ids
50
+
51
+ # The name of the associated session class. This is inferred by the name of the model.
52
+ #
53
+ # * <tt>Default:</tt> "#{klass.name}Session".constantize
54
+ # * <tt>Accepts:</tt> Class
55
+ def session_class(value = nil)
56
+ const = "#{base_class.name}Session".constantize rescue nil
57
+ rw_config(:session_class, value, const)
58
+ end
59
+ alias_method :session_class=, :session_class
60
+ end
61
+
62
+ module Methods
63
+ def self.included(klass)
64
+ klass.class_eval do
65
+ before_save :get_session_information, :if => :update_sessions?
66
+ before_save :maintain_sessions, :if => :update_sessions?
67
+ end
68
+ end
69
+
70
+ # Save the record and skip session maintenance all together.
71
+ def save_without_session_maintenance(*args)
72
+ self.skip_session_maintenance = true
73
+ result = save(*args)
74
+ self.skip_session_maintenance = false
75
+ result
76
+ end
77
+
78
+ private
79
+ def skip_session_maintenance=(value)
80
+ @skip_session_maintenance = value
81
+ end
82
+
83
+ def skip_session_maintenance
84
+ @skip_session_maintenance ||= false
85
+ end
86
+
87
+ def update_sessions?
88
+ !skip_session_maintenance && session_class && session_class.activated? && self.class.maintain_sessions == true && !session_ids.blank? && persistence_token_changed?
89
+ end
90
+
91
+ def get_session_information
92
+ # Need to determine if we are completely logged out, or logged in as another user
93
+ @_sessions = []
94
+
95
+ session_ids.each do |session_id|
96
+ session = session_class.find(session_id, self)
97
+ @_sessions << session if session && session.record
98
+ end
99
+ end
100
+
101
+ def maintain_sessions
102
+ if @_sessions.empty?
103
+ create_session
104
+ else
105
+ update_sessions
106
+ end
107
+ end
108
+
109
+ def create_session
110
+ # We only want to automatically login into the first session, since this is the main session. The other sessions are sessions
111
+ # that need to be created after logging into the main session.
112
+ session_id = session_ids.first
113
+ session_class.create(*[self, self, session_id].compact)
114
+
115
+ return true
116
+ end
117
+
118
+ def update_sessions
119
+ # We found sessions above, let's update them with the new info
120
+ @_sessions.each do |stale_session|
121
+ next if stale_session.record != self
122
+ stale_session.unauthorized_record = self
123
+ stale_session.save
124
+ end
125
+
126
+ return true
127
+ end
128
+
129
+ def session_ids
130
+ self.class.session_ids
131
+ end
132
+
133
+ def session_class
134
+ self.class.session_class
135
+ end
136
+ end
137
+ end
138
+ end
139
+ end
@@ -0,0 +1,65 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # This module is responsible for maintaining the single_access token. For more information the single access token and how to use it,
4
+ # see the Authlogic::Session::Params module.
5
+ module SingleAccessToken
6
+ def self.included(klass)
7
+ klass.class_eval do
8
+ extend Config
9
+ add_acts_as_authentic_module(Methods)
10
+ end
11
+ end
12
+
13
+ # All configuration for the single_access token aspect of acts_as_authentic.
14
+ module Config
15
+ # The single access token is used for authentication via URLs, such as a private feed. That being said,
16
+ # if the user changes their password, that token probably shouldn't change. If it did, the user would have
17
+ # to update all of their URLs. So be default this is option is disabled, if you need it, feel free to turn
18
+ # it on.
19
+ #
20
+ # * <tt>Default:</tt> false
21
+ # * <tt>Accepts:</tt> Boolean
22
+ def change_single_access_token_with_password(value = nil)
23
+ rw_config(:change_single_access_token_with_password, value, false)
24
+ end
25
+ alias_method :change_single_access_token_with_password=, :change_single_access_token_with_password
26
+ end
27
+
28
+ # All method, for the single_access token aspect of acts_as_authentic.
29
+ module Methods
30
+ def self.included(klass)
31
+ return if !klass.column_names.include?("single_access_token")
32
+
33
+ klass.class_eval do
34
+ include InstanceMethods
35
+ validates_uniqueness_of :single_access_token, :if => :single_access_token_changed?
36
+ before_validation :reset_single_access_token, :if => :reset_single_access_token?
37
+ after_password_set(:reset_single_access_token, :if => :change_single_access_token_with_password?) if respond_to?(:after_password_set)
38
+ end
39
+ end
40
+
41
+ module InstanceMethods
42
+ # Resets the single_access_token to a random friendly token.
43
+ def reset_single_access_token
44
+ self.single_access_token = Authlogic::Random.friendly_token
45
+ end
46
+
47
+ # same as reset_single_access_token, but then saves the record.
48
+ def reset_single_access_token!
49
+ reset_single_access_token
50
+ save_without_session_maintenance
51
+ end
52
+
53
+ protected
54
+ def reset_single_access_token?
55
+ single_access_token.blank?
56
+ end
57
+
58
+ def change_single_access_token_with_password?
59
+ self.class.change_single_access_token_with_password == true
60
+ end
61
+ end
62
+ end
63
+ end
64
+ end
65
+ end
@@ -0,0 +1,32 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # Allows you to scope everything to specific fields.
4
+ # See the Config submodule for more info.
5
+ # For information on how to scope off of a parent object see Authlogic::AuthenticatesMany
6
+ module ValidationsScope
7
+ def self.included(klass)
8
+ klass.class_eval do
9
+ extend Config
10
+ end
11
+ end
12
+
13
+ # All configuration for the scope feature.
14
+ module Config
15
+ # Allows you to scope everything to specific field(s). Works just like validates_uniqueness_of.
16
+ # For example, let's say a user belongs to a company, and you want to scope everything to the
17
+ # company:
18
+ #
19
+ # acts_as_authentic do |c|
20
+ # c.validations_scope = :company_id
21
+ # end
22
+ #
23
+ # * <tt>Default:</tt> nil
24
+ # * <tt>Accepts:</tt> Symbol or Array of symbols
25
+ def validations_scope(value = nil)
26
+ rw_config(:validations_scope, value)
27
+ end
28
+ alias_method :validations_scope=, :validations_scope
29
+ end
30
+ end
31
+ end
32
+ end
@@ -0,0 +1,42 @@
1
+ module Authlogic
2
+ module AuthenticatesMany
3
+ # An object of this class is used as a proxy for the authenticates_many relationship. It basically allows you to "save" scope details
4
+ # and call them on an object, which allows you to do the following:
5
+ #
6
+ # @account.user_sessions.new
7
+ # @account.user_sessions.find
8
+ # # ... etc
9
+ #
10
+ # You can call all of the class level methods off of an object with a saved scope, so that calling the above methods scopes the user
11
+ # sessions down to that specific account. To implement this via ActiveRecord do something like:
12
+ #
13
+ # class User < ActiveRecord::Base
14
+ # authenticates_many :user_sessions
15
+ # end
16
+ class Association
17
+ attr_accessor :klass, :find_options, :id
18
+
19
+ def initialize(klass, find_options, id)
20
+ self.klass = klass
21
+ self.find_options = find_options
22
+ self.id = id
23
+ end
24
+
25
+ [:create, :create!, :find, :new].each do |method|
26
+ class_eval <<-"end_eval", __FILE__, __LINE__
27
+ def #{method}(*args)
28
+ klass.with_scope(scope_options) do
29
+ klass.#{method}(*args)
30
+ end
31
+ end
32
+ end_eval
33
+ end
34
+ alias_method :build, :new
35
+
36
+ private
37
+ def scope_options
38
+ {:find_options => find_options, :id => id}
39
+ end
40
+ end
41
+ end
42
+ end
@@ -0,0 +1,54 @@
1
+ module Authlogic
2
+ # This allows you to scope your authentication. For example, let's say all users belong to an account, you want to make sure only users
3
+ # that belong to that account can actually login into that account. Simple, just do:
4
+ #
5
+ # class Account < ActiveRecord::Base
6
+ # authenticates_many :user_sessions
7
+ # end
8
+ #
9
+ # Now you can scope sessions just like everything else in ActiveRecord:
10
+ #
11
+ # @account.user_sessions.new(*args)
12
+ # @account.user_sessions.create(*args)
13
+ # @account.user_sessions.find(*args)
14
+ # # ... etc
15
+ #
16
+ # Checkout the authenticates_many method for a list of options.
17
+ # You may also want to checkout Authlogic::ActsAsAuthentic::Scope to scope your model.
18
+ module AuthenticatesMany
19
+ module Base
20
+ # Allows you set essentially set up a relationship with your sessions. See module definition above for more details.
21
+ #
22
+ # === Options
23
+ #
24
+ # * <tt>session_class:</tt> default: "#{name}Session",
25
+ # This is the related session class.
26
+ #
27
+ # * <tt>relationship_name:</tt> default: options[:session_class].klass_name.underscore.pluralize,
28
+ # This is the name of the relationship you want to use to scope everything. For example an Account has many Users. There should be a relationship
29
+ # called :users that you defined with a has_many. The reason we use the relationship is so you don't have to repeat yourself. The relatonship
30
+ # could have all kinds of custom options. So instead of repeating yourself we essentially use the scope that the relationship creates.
31
+ #
32
+ # * <tt>find_options:</tt> default: nil,
33
+ # By default the find options are created from the relationship you specify with :relationship_name. But if you want to override this and
34
+ # manually specify find_options you can do it here. Specify options just as you would in ActiveRecord::Base.find.
35
+ #
36
+ # * <tt>scope_cookies:</tt> default: false
37
+ # By the nature of cookies they scope theirself if you are using subdomains to access accounts. If you aren't using subdomains you need to have
38
+ # separate cookies for each account, assuming a user is logging into mroe than one account. Authlogic can take care of this for you by
39
+ # prefixing the name of the cookie and sessin with the model id. You just need to tell Authlogic to do this by passing this option.
40
+ def authenticates_many(name, options = {})
41
+ options[:session_class] ||= name.to_s.classify.constantize
42
+ options[:relationship_name] ||= options[:session_class].klass_name.underscore.pluralize
43
+ class_eval <<-"end_eval", __FILE__, __LINE__
44
+ def #{name}
45
+ find_options = #{options[:find_options].inspect} || #{options[:relationship_name]}.scoped
46
+ @#{name} ||= Authlogic::AuthenticatesMany::Association.new(#{options[:session_class]}, find_options, #{options[:scope_cookies] ? "self.class.model_name.underscore + '_' + self.send(self.class.primary_key).to_s" : "nil"})
47
+ end
48
+ end_eval
49
+ end
50
+ end
51
+
52
+ ::ActiveRecord::Base.extend(Base) if defined?(::ActiveRecord)
53
+ end
54
+ end