rodauth 1.20.0 → 2.1.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (180) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG +170 -0
  3. data/MIT-LICENSE +1 -1
  4. data/README.rdoc +211 -79
  5. data/doc/account_expiration.rdoc +12 -26
  6. data/doc/active_sessions.rdoc +49 -0
  7. data/doc/audit_logging.rdoc +44 -0
  8. data/doc/base.rdoc +75 -128
  9. data/doc/change_login.rdoc +7 -14
  10. data/doc/change_password.rdoc +9 -13
  11. data/doc/change_password_notify.rdoc +2 -2
  12. data/doc/close_account.rdoc +9 -16
  13. data/doc/confirm_password.rdoc +12 -5
  14. data/doc/create_account.rdoc +11 -22
  15. data/doc/disallow_password_reuse.rdoc +6 -13
  16. data/doc/email_auth.rdoc +15 -14
  17. data/doc/email_base.rdoc +6 -15
  18. data/doc/http_basic_auth.rdoc +10 -1
  19. data/doc/internals.rdoc +1 -1
  20. data/doc/jwt.rdoc +22 -22
  21. data/doc/jwt_cors.rdoc +22 -0
  22. data/doc/jwt_refresh.rdoc +12 -8
  23. data/doc/lockout.rdoc +17 -15
  24. data/doc/login.rdoc +10 -2
  25. data/doc/login_password_requirements_base.rdoc +15 -37
  26. data/doc/logout.rdoc +2 -2
  27. data/doc/otp.rdoc +24 -19
  28. data/doc/password_complexity.rdoc +10 -26
  29. data/doc/password_expiration.rdoc +11 -25
  30. data/doc/password_grace_period.rdoc +16 -2
  31. data/doc/recovery_codes.rdoc +18 -12
  32. data/doc/release_notes/1.21.0.txt +12 -0
  33. data/doc/release_notes/1.22.0.txt +11 -0
  34. data/doc/release_notes/1.23.0.txt +32 -0
  35. data/doc/release_notes/2.0.0.txt +361 -0
  36. data/doc/release_notes/2.1.0.txt +31 -0
  37. data/doc/remember.rdoc +40 -64
  38. data/doc/reset_password.rdoc +12 -9
  39. data/doc/session_expiration.rdoc +1 -0
  40. data/doc/single_session.rdoc +16 -25
  41. data/doc/sms_codes.rdoc +24 -14
  42. data/doc/two_factor_base.rdoc +60 -22
  43. data/doc/verify_account.rdoc +14 -12
  44. data/doc/verify_account_grace_period.rdoc +6 -2
  45. data/doc/verify_login_change.rdoc +9 -8
  46. data/doc/webauthn.rdoc +115 -0
  47. data/doc/webauthn_login.rdoc +15 -0
  48. data/doc/webauthn_verify_account.rdoc +9 -0
  49. data/javascript/webauthn_auth.js +45 -0
  50. data/javascript/webauthn_setup.js +35 -0
  51. data/lib/roda/plugins/rodauth.rb +1 -1
  52. data/lib/rodauth.rb +32 -24
  53. data/lib/rodauth/features/account_expiration.rb +5 -5
  54. data/lib/rodauth/features/active_sessions.rb +160 -0
  55. data/lib/rodauth/features/audit_logging.rb +96 -0
  56. data/lib/rodauth/features/base.rb +144 -43
  57. data/lib/rodauth/features/change_password_notify.rb +2 -2
  58. data/lib/rodauth/features/confirm_password.rb +40 -2
  59. data/lib/rodauth/features/create_account.rb +8 -13
  60. data/lib/rodauth/features/disallow_common_passwords.rb +1 -1
  61. data/lib/rodauth/features/disallow_password_reuse.rb +1 -1
  62. data/lib/rodauth/features/email_auth.rb +30 -29
  63. data/lib/rodauth/features/email_base.rb +9 -4
  64. data/lib/rodauth/features/http_basic_auth.rb +55 -35
  65. data/lib/rodauth/features/jwt.rb +58 -10
  66. data/lib/rodauth/features/jwt_cors.rb +53 -0
  67. data/lib/rodauth/features/jwt_refresh.rb +3 -3
  68. data/lib/rodauth/features/lockout.rb +12 -14
  69. data/lib/rodauth/features/login.rb +54 -10
  70. data/lib/rodauth/features/login_password_requirements_base.rb +4 -4
  71. data/lib/rodauth/features/otp.rb +72 -74
  72. data/lib/rodauth/features/password_complexity.rb +4 -11
  73. data/lib/rodauth/features/password_expiration.rb +2 -2
  74. data/lib/rodauth/features/password_grace_period.rb +17 -10
  75. data/lib/rodauth/features/recovery_codes.rb +49 -53
  76. data/lib/rodauth/features/remember.rb +11 -27
  77. data/lib/rodauth/features/reset_password.rb +26 -26
  78. data/lib/rodauth/features/session_expiration.rb +6 -4
  79. data/lib/rodauth/features/single_session.rb +7 -5
  80. data/lib/rodauth/features/sms_codes.rb +62 -71
  81. data/lib/rodauth/features/two_factor_base.rb +132 -28
  82. data/lib/rodauth/features/verify_account.rb +25 -21
  83. data/lib/rodauth/features/verify_account_grace_period.rb +20 -9
  84. data/lib/rodauth/features/verify_login_change.rb +12 -11
  85. data/lib/rodauth/features/webauthn.rb +507 -0
  86. data/lib/rodauth/features/webauthn_login.rb +70 -0
  87. data/lib/rodauth/features/webauthn_verify_account.rb +46 -0
  88. data/lib/rodauth/version.rb +2 -2
  89. data/templates/button.str +1 -3
  90. data/templates/change-login.str +1 -2
  91. data/templates/change-password.str +3 -5
  92. data/templates/close-account.str +2 -2
  93. data/templates/confirm-password.str +1 -1
  94. data/templates/create-account.str +1 -1
  95. data/templates/email-auth-email.str +1 -1
  96. data/templates/email-auth-request-form.str +2 -3
  97. data/templates/email-auth.str +1 -1
  98. data/templates/global-logout-field.str +6 -0
  99. data/templates/login-confirm-field.str +2 -4
  100. data/templates/login-display.str +3 -2
  101. data/templates/login-field.str +2 -4
  102. data/templates/login-form-footer.str +6 -0
  103. data/templates/login-form.str +7 -0
  104. data/templates/login.str +1 -9
  105. data/templates/logout.str +1 -1
  106. data/templates/multi-phase-login.str +3 -0
  107. data/templates/otp-auth-code-field.str +5 -3
  108. data/templates/otp-auth.str +1 -1
  109. data/templates/otp-disable.str +1 -1
  110. data/templates/otp-setup.str +3 -3
  111. data/templates/password-confirm-field.str +2 -4
  112. data/templates/password-field.str +2 -4
  113. data/templates/recovery-auth.str +3 -6
  114. data/templates/recovery-codes.str +1 -1
  115. data/templates/remember.str +15 -20
  116. data/templates/reset-password-email.str +1 -1
  117. data/templates/reset-password-request.str +3 -3
  118. data/templates/reset-password.str +1 -2
  119. data/templates/sms-auth.str +1 -1
  120. data/templates/sms-code-field.str +5 -3
  121. data/templates/sms-confirm.str +1 -2
  122. data/templates/sms-disable.str +1 -2
  123. data/templates/sms-request.str +1 -1
  124. data/templates/sms-setup.str +6 -4
  125. data/templates/two-factor-auth.str +5 -0
  126. data/templates/two-factor-disable.str +6 -0
  127. data/templates/two-factor-manage.str +16 -0
  128. data/templates/unlock-account-email.str +1 -1
  129. data/templates/unlock-account-request.str +4 -4
  130. data/templates/unlock-account.str +1 -1
  131. data/templates/verify-account-email.str +1 -1
  132. data/templates/verify-account-resend.str +3 -3
  133. data/templates/verify-account.str +1 -2
  134. data/templates/verify-login-change-email.str +2 -1
  135. data/templates/verify-login-change.str +1 -1
  136. data/templates/webauthn-auth.str +11 -0
  137. data/templates/webauthn-remove.str +14 -0
  138. data/templates/webauthn-setup.str +12 -0
  139. metadata +89 -50
  140. data/Rakefile +0 -179
  141. data/doc/verify_change_login.rdoc +0 -11
  142. data/lib/rodauth/features/verify_change_login.rb +0 -20
  143. data/spec/account_expiration_spec.rb +0 -225
  144. data/spec/all.rb +0 -1
  145. data/spec/change_login_spec.rb +0 -156
  146. data/spec/change_password_notify_spec.rb +0 -33
  147. data/spec/change_password_spec.rb +0 -202
  148. data/spec/close_account_spec.rb +0 -162
  149. data/spec/confirm_password_spec.rb +0 -70
  150. data/spec/create_account_spec.rb +0 -127
  151. data/spec/disallow_common_passwords_spec.rb +0 -93
  152. data/spec/disallow_password_reuse_spec.rb +0 -179
  153. data/spec/email_auth_spec.rb +0 -285
  154. data/spec/http_basic_auth_spec.rb +0 -143
  155. data/spec/jwt_refresh_spec.rb +0 -256
  156. data/spec/jwt_spec.rb +0 -235
  157. data/spec/lockout_spec.rb +0 -250
  158. data/spec/login_spec.rb +0 -328
  159. data/spec/migrate/001_tables.rb +0 -184
  160. data/spec/migrate/002_account_password_hash_column.rb +0 -11
  161. data/spec/migrate_password/001_tables.rb +0 -73
  162. data/spec/migrate_travis/001_tables.rb +0 -141
  163. data/spec/password_complexity_spec.rb +0 -109
  164. data/spec/password_expiration_spec.rb +0 -244
  165. data/spec/password_grace_period_spec.rb +0 -93
  166. data/spec/remember_spec.rb +0 -451
  167. data/spec/reset_password_spec.rb +0 -229
  168. data/spec/rodauth_spec.rb +0 -343
  169. data/spec/session_expiration_spec.rb +0 -58
  170. data/spec/single_session_spec.rb +0 -127
  171. data/spec/spec_helper.rb +0 -327
  172. data/spec/two_factor_spec.rb +0 -1423
  173. data/spec/update_password_hash_spec.rb +0 -40
  174. data/spec/verify_account_grace_period_spec.rb +0 -171
  175. data/spec/verify_account_spec.rb +0 -240
  176. data/spec/verify_change_login_spec.rb +0 -46
  177. data/spec/verify_login_change_spec.rb +0 -232
  178. data/spec/views/layout-other.str +0 -11
  179. data/spec/views/layout.str +0 -11
  180. data/spec/views/login.str +0 -21
@@ -1,229 +0,0 @@
1
- require File.expand_path("spec_helper", File.dirname(__FILE__))
2
-
3
- describe 'Rodauth reset_password feature' do
4
- it "should support resetting passwords for accounts" do
5
- last_sent_column = nil
6
- rodauth do
7
- enable :login, :reset_password
8
- reset_password_email_last_sent_column{last_sent_column}
9
- end
10
- roda do |r|
11
- r.rodauth
12
- r.root{view :content=>""}
13
- end
14
-
15
- login(:login=>'foo@example2.com', :pass=>'01234567')
16
- page.html.wont_match(/notice_flash/)
17
-
18
- login(:pass=>'01234567', :visit=>false)
19
-
20
- click_button 'Request Password Reset'
21
- page.find('#notice_flash').text.must_equal "An email has been sent to you with a link to reset the password for your account"
22
- page.current_path.must_equal '/'
23
- link = email_link(/(\/reset-password\?key=.+)$/)
24
-
25
- visit link[0...-1]
26
- page.find('#error_flash').text.must_equal "There was an error resetting your password: invalid or expired password reset key"
27
-
28
- visit '/login'
29
- click_link 'Forgot Password?'
30
- fill_in 'Login', :with=>'foo@example.com'
31
- click_button 'Request Password Reset'
32
- email_link(/(\/reset-password\?key=.+)$/).must_equal link
33
-
34
- login(:pass=>'01234567')
35
- click_button 'Request Password Reset'
36
- email_link(/(\/reset-password\?key=.+)$/).must_equal link
37
-
38
- last_sent_column = :email_last_sent
39
- login(:pass=>'01234567')
40
- click_button 'Request Password Reset'
41
- page.find('#error_flash').text.must_equal "An email has recently been sent to you with a link to reset your password"
42
- Mail::TestMailer.deliveries.must_equal []
43
-
44
- DB[:account_password_reset_keys].update(:email_last_sent => Time.now - 250).must_equal 1
45
- login(:pass=>'01234567')
46
- click_button 'Request Password Reset'
47
- page.find('#error_flash').text.must_equal "An email has recently been sent to you with a link to reset your password"
48
- Mail::TestMailer.deliveries.must_equal []
49
-
50
- DB[:account_password_reset_keys].update(:email_last_sent => Time.now - 350).must_equal 1
51
- login(:pass=>'01234567')
52
- click_button 'Request Password Reset'
53
- email_link(/(\/reset-password\?key=.+)$/).must_equal link
54
-
55
- visit link
56
- page.title.must_equal 'Reset Password'
57
-
58
- fill_in 'Password', :with=>'0123456'
59
- fill_in 'Confirm Password', :with=>'0123456789'
60
- click_button 'Reset Password'
61
- page.html.must_include("passwords do not match")
62
- page.find('#error_flash').text.must_equal "There was an error resetting your password"
63
- page.current_path.must_equal '/reset-password'
64
-
65
- fill_in 'Password', :with=>'0123456789'
66
- fill_in 'Confirm Password', :with=>'0123456789'
67
- click_button 'Reset Password'
68
- page.body.must_include 'invalid password, same as current password'
69
- page.find('#error_flash').text.must_equal "There was an error resetting your password"
70
- page.current_path.must_equal '/reset-password'
71
-
72
- fill_in 'Password', :with=>'012'
73
- fill_in 'Confirm Password', :with=>'012'
74
- click_button 'Reset Password'
75
- page.html.must_include("invalid password, does not meet requirements")
76
- page.find('#error_flash').text.must_equal "There was an error resetting your password"
77
- page.current_path.must_equal '/reset-password'
78
-
79
- fill_in 'Password', :with=>'0123456'
80
- fill_in 'Confirm Password', :with=>'0123456'
81
- click_button 'Reset Password'
82
- page.find('#notice_flash').text.must_equal "Your password has been reset"
83
- page.current_path.must_equal '/'
84
-
85
- login(:pass=>'0123456')
86
- page.current_path.must_equal '/'
87
-
88
- login(:pass=>'bad')
89
- click_link "Forgot Password?"
90
- fill_in "Login", :with=>"foo@example.com"
91
- click_button "Request Password Reset"
92
- DB[:account_password_reset_keys].update(:deadline => Time.now - 60).must_equal 1
93
- link = email_link(/(\/reset-password\?key=.+)$/)
94
- visit link
95
- page.find('#error_flash').text.must_equal "There was an error resetting your password: invalid or expired password reset key"
96
- end
97
-
98
- it "should support resetting passwords for accounts without confirmation" do
99
- rodauth do
100
- enable :login, :reset_password
101
- require_password_confirmation? false
102
- end
103
- roda do |r|
104
- r.rodauth
105
- r.root{view :content=>""}
106
- end
107
-
108
- visit '/login'
109
- login(:pass=>'01234567', :visit=>false)
110
- click_button 'Request Password Reset'
111
- page.find('#notice_flash').text.must_equal "An email has been sent to you with a link to reset the password for your account"
112
-
113
- link = email_link(/(\/reset-password\?key=.+)$/)
114
- visit link
115
- fill_in 'Password', :with=>'0123456'
116
- click_button 'Reset Password'
117
- page.find('#notice_flash').text.must_equal "Your password has been reset"
118
- end
119
-
120
- it "should support autologin when resetting passwords for accounts" do
121
- rodauth do
122
- enable :login, :reset_password
123
- reset_password_autologin? true
124
- end
125
- roda do |r|
126
- r.rodauth
127
- r.root{view :content=>rodauth.logged_in? ? "Logged In" : "Not Logged"}
128
- end
129
-
130
- login(:pass=>'01234567')
131
-
132
- click_button 'Request Password Reset'
133
- link = email_link(/(\/reset-password\?key=.+)$/)
134
- visit link
135
- fill_in 'Password', :with=>'0123456'
136
- fill_in 'Confirm Password', :with=>'0123456'
137
- click_button 'Reset Password'
138
- page.find('#notice_flash').text.must_equal "Your password has been reset"
139
- page.body.must_include("Logged In")
140
- end
141
-
142
- it "should clear reset password token when closing account" do
143
- rodauth do
144
- enable :login, :reset_password, :close_account
145
- reset_password_autologin? true
146
- end
147
- roda do |r|
148
- r.rodauth
149
- r.root{view :content=>rodauth.logged_in? ? "Logged In" : "Not Logged"}
150
- end
151
-
152
- login(:pass=>'01234567')
153
- click_button 'Request Password Reset'
154
- email_link(/(\/reset-password\?key=.+)$/)
155
-
156
- login
157
-
158
- DB[:account_password_reset_keys].count.must_equal 1
159
- visit '/close-account'
160
- fill_in 'Password', :with=>'0123456789'
161
- click_button 'Close Account'
162
- DB[:account_password_reset_keys].count.must_equal 0
163
- end
164
-
165
- it "should handle uniqueness errors raised when inserting password reset token" do
166
- rodauth do
167
- enable :login, :reset_password
168
- end
169
- roda do |r|
170
- def rodauth.raised_uniqueness_violation(*) super; true; end
171
- r.rodauth
172
- r.root{view :content=>""}
173
- end
174
-
175
- login(:pass=>'01234567')
176
-
177
- click_button 'Request Password Reset'
178
- link = email_link(/(\/reset-password\?key=.+)$/)
179
- visit link
180
-
181
- fill_in 'Password', :with=>'0123456'
182
- fill_in 'Confirm Password', :with=>'0123456'
183
- click_button 'Reset Password'
184
- page.find('#notice_flash').text.must_equal "Your password has been reset"
185
- end
186
-
187
- it "should support resetting passwords for accounts via jwt" do
188
- rodauth do
189
- enable :login, :reset_password
190
- reset_password_email_body{reset_password_email_link}
191
- end
192
- roda(:jwt) do |r|
193
- r.rodauth
194
- end
195
-
196
- res = json_login(:pass=>'1', :no_check=>true)
197
- res.must_equal [401, {"field-error"=>["password", "invalid password"], "error"=>"There was an error logging in"}]
198
-
199
- res = json_request('/reset-password')
200
- res.must_equal [401, {"error"=>"There was an error resetting your password"}]
201
-
202
- res = json_request('/reset-password-request', :login=>'foo@example2.com')
203
- res.must_equal [401, {"error"=>"There was an error requesting a password reset"}]
204
-
205
- res = json_request('/reset-password-request', :login=>'foo@example.com')
206
- res.must_equal [200, {"success"=>"An email has been sent to you with a link to reset the password for your account"}]
207
-
208
- link = email_link(/key=.+$/)
209
- res = json_request('/reset-password', :key=>link[4...-1])
210
- res.must_equal [401, {"error"=>"There was an error resetting your password"}]
211
-
212
- res = json_request('/reset-password', :key=>link[4..-1], :password=>'1', "password-confirm"=>'2')
213
- res.must_equal [422, {"error"=>"There was an error resetting your password", "field-error"=>["password", 'passwords do not match']}]
214
-
215
- res = json_request('/reset-password', :key=>link[4..-1], :password=>'0123456789', "password-confirm"=>'0123456789')
216
- res.must_equal [422, {"error"=>"There was an error resetting your password", "field-error"=>["password", 'invalid password, same as current password']}]
217
-
218
- res = json_request('/reset-password', :key=>link[4..-1], :password=>'1', "password-confirm"=>'1')
219
- res.must_equal [422, {"error"=>"There was an error resetting your password", "field-error"=>["password", "invalid password, does not meet requirements (minimum 6 characters)"]}]
220
-
221
- res = json_request('/reset-password', :key=>link[4..-1], :password=>"\0ab123456", "password-confirm"=>"\0ab123456")
222
- res.must_equal [422, {"error"=>"There was an error resetting your password", "field-error"=>["password", "invalid password, does not meet requirements (contains null byte)"]}]
223
-
224
- res = json_request('/reset-password', :key=>link[4..-1], :password=>'0123456', "password-confirm"=>'0123456')
225
- res.must_equal [200, {"success"=>"Your password has been reset"}]
226
-
227
- json_login(:pass=>'0123456')
228
- end
229
- end
@@ -1,343 +0,0 @@
1
- require File.expand_path("spec_helper", File.dirname(__FILE__))
2
-
3
- describe 'Rodauth' do
4
- it "should keep private methods private when overridden" do
5
- rodauth do
6
- use_database_authentication_functions? false
7
- end
8
- roda do |r|
9
- rodauth.use_database_authentication_functions?.to_s
10
- end
11
-
12
- proc{visit '/'}.must_raise NoMethodError
13
- end
14
-
15
- it "should support template_opts" do
16
- rodauth do
17
- enable :login
18
- template_opts(:layout_opts=>{:path=>'spec/views/layout-other.str'})
19
- end
20
- roda do |r|
21
- r.rodauth
22
- end
23
-
24
- visit '/login'
25
- page.title.must_equal 'Foo Login'
26
- end
27
-
28
- it "should support flash_error_key and flash_notice_key" do
29
- rodauth do
30
- enable :login
31
- template_opts(:layout_opts=>{:path=>'spec/views/layout-other.str'})
32
- flash_error_key 'error2'
33
- flash_notice_key 'notice2'
34
- end
35
- roda do |r|
36
- r.rodauth
37
- rodauth.require_login
38
- view(:content=>'', :layout_opts=>{:path=>'spec/views/layout-other.str'})
39
- end
40
-
41
- visit '/'
42
- page.html.must_include 'Please login to continue'
43
- login(:visit=>false)
44
- page.html.must_include 'You have been logged in'
45
- end
46
-
47
- it "should work without preloading the templates" do
48
- @no_precompile = true
49
- rodauth do
50
- enable :login
51
- end
52
- roda do |r|
53
- r.rodauth
54
- end
55
-
56
- visit '/login'
57
- page.title.must_equal 'Login'
58
- end
59
-
60
- it "should warn when using deprecated configuration methods" do
61
- warning = nil
62
- rodauth do
63
- enable :email_auth
64
- (class << self; self end).send(:define_method, :warn) do |*a|
65
- warning = a.first
66
- end
67
- auth_class_eval do
68
- define_method(:warn) do |*a|
69
- warning = a.first
70
- end
71
- end
72
- no_matching_email_auth_key_message 'foo'
73
- end
74
- roda do |r|
75
- rodauth.no_matching_email_auth_key_message
76
- end
77
-
78
- warning.must_equal "Deprecated no_matching_email_auth_key_message method used during configuration, switch to using no_matching_email_auth_key_error_flash"
79
- visit '/'
80
- body.must_equal 'foo'
81
- warning.must_equal "Deprecated no_matching_email_auth_key_message method called at runtime, switch to using no_matching_email_auth_key_error_flash"
82
- end
83
-
84
- it "should pick up template changes if not caching templates" do
85
- begin
86
- @no_freeze = true
87
- cache = true
88
- rodauth do
89
- enable :login
90
- cache_templates{cache}
91
- end
92
- roda do |r|
93
- r.rodauth
94
- end
95
- dir = 'spec/views2'
96
- file = "#{dir}/login.str"
97
- app.plugin :render, :views=>dir, :engine=>'str'
98
- Dir.mkdir(dir) unless File.directory?(dir)
99
-
100
- text = File.read('spec/views/login.str')
101
- File.open(file, 'wb'){|f| f.write text}
102
- visit '/login'
103
- page.all('label').first.text.must_equal 'Login'
104
-
105
- File.open(file, 'wb'){|f| f.write text.gsub('Login', 'Banana')}
106
- visit '/login'
107
- page.all('label').first.text.must_equal 'Login'
108
-
109
- cache = false
110
- visit '/login'
111
- page.all('label').first.text.must_equal 'Banana'
112
- ensure
113
- File.delete(file) if File.file?(file)
114
- Dir.rmdir(dir) if File.directory?(dir)
115
- end
116
- end
117
-
118
- it "should require login to perform certain actions" do
119
- rodauth do
120
- enable :login, :change_password, :change_login, :close_account
121
- end
122
- roda do |r|
123
- r.rodauth
124
-
125
- r.is "a" do
126
- rodauth.require_login
127
- end
128
- end
129
-
130
- visit '/change-password'
131
- page.current_path.must_equal '/login'
132
-
133
- visit '/change-login'
134
- page.current_path.must_equal '/login'
135
-
136
- visit '/close-account'
137
- page.current_path.must_equal '/login'
138
-
139
- visit '/a'
140
- page.current_path.must_equal '/login'
141
- end
142
-
143
- it "should handle case where account is no longer valid during session" do
144
- rodauth do
145
- enable :login, :change_password
146
- already_logged_in{request.redirect '/'}
147
- skip_status_checks? false
148
- end
149
- roda do |r|
150
- r.rodauth
151
-
152
- r.root do
153
- view :content=>(rodauth.logged_in? ? "Logged In" : "Not Logged")
154
- end
155
- end
156
-
157
- login
158
- page.body.must_include("Logged In")
159
-
160
- DB[:accounts].update(:status_id=>3)
161
- visit '/change-password'
162
- page.current_path.must_equal '/login'
163
- visit '/'
164
- page.body.must_include("Not Logged")
165
- end
166
-
167
- it "should handle cases where you are already logged in on pages that don't expect a login" do
168
- rodauth do
169
- enable :login, :logout, :create_account, :reset_password, :verify_account
170
- already_logged_in{request.redirect '/'}
171
- end
172
- roda do |r|
173
- r.rodauth
174
-
175
- r.root do
176
- view :content=>''
177
- end
178
- end
179
-
180
- login
181
-
182
- visit '/login'
183
- page.current_path.must_equal '/'
184
-
185
- visit '/create-account'
186
- page.current_path.must_equal '/'
187
-
188
- visit '/reset-password'
189
- page.current_path.must_equal '/'
190
-
191
- visit '/verify-account'
192
- page.current_path.must_equal '/'
193
-
194
- visit '/logout'
195
- page.current_path.must_equal '/logout'
196
- end
197
-
198
- it "should have rodauth.features and rodauth.session_value work when not logged in" do
199
- rodauth do
200
- enable :login
201
- end
202
- roda do |r|
203
- "#{rodauth.features.first.inspect}#{rodauth.session_value.inspect}"
204
- end
205
-
206
- visit '/'
207
- page.body.must_equal ':loginnil'
208
- end
209
-
210
- it "should support auth_class_eval for evaluation inside Auth class" do
211
- rodauth do
212
- enable :login
213
- login_label{foo}
214
- auth_class_eval do
215
- def foo
216
- 'Lonig'
217
- end
218
- end
219
- end
220
- roda do |r|
221
- r.rodauth
222
- end
223
-
224
- visit '/login'
225
- fill_in 'Lonig', :with=>'foo@example.com'
226
- end
227
-
228
- it "should support multiple rodauth configurations in an app" do
229
- app = Class.new(Base)
230
- app.plugin(:rodauth, rodauth_opts) do
231
- enable :login
232
- if ENV['RODAUTH_SEPARATE_SCHEMA']
233
- password_hash_table Sequel[:rodauth_test_password][:account_password_hashes]
234
- function_name do |name|
235
- "rodauth_test_password.#{name}"
236
- end
237
- end
238
- end
239
- app.plugin(:rodauth, rodauth_opts.merge(:name=>:r2)) do
240
- enable :logout
241
- end
242
-
243
- if Minitest::HooksSpec::USE_ROUTE_CSRF
244
- app.plugin :route_csrf, Minitest::HooksSpec::ROUTE_CSRF_OPTS
245
- end
246
-
247
- app.route do |r|
248
- if Minitest::HooksSpec::USE_ROUTE_CSRF
249
- check_csrf!
250
- end
251
- r.on 'r1' do
252
- r.rodauth
253
- 'r1'
254
- end
255
- r.on 'r2' do
256
- r.rodauth(:r2)
257
- 'r2'
258
- end
259
- rodauth.session_value.inspect
260
- end
261
- app.freeze
262
- self.app = app
263
-
264
- login(:path=>'/r1/login')
265
- page.body.must_equal DB[:accounts].get(:id).to_s
266
-
267
- visit '/r2/logout'
268
- click_button 'Logout'
269
- page.body.must_equal 'nil'
270
-
271
- visit '/r1/logout'
272
- page.body.must_equal 'r1'
273
- visit '/r2/login'
274
- page.body.must_equal 'r2'
275
- end
276
-
277
- it "should support account_model setting for backwards compatibility" do
278
- warning = nil
279
- rodauth do
280
- enable :login
281
- (class << self; self end).send(:define_method, :warn){|msg| warning = msg}
282
- account_model Sequel::Model(DB[:accounts].select(:id))
283
- end
284
- roda do |r|
285
- "#{rodauth.accounts_table}#{rodauth.account_select.length}"
286
- end
287
-
288
- visit '/'
289
- page.body.must_equal 'accounts1'
290
- warning.must_equal "account_model is deprecated, use db and accounts_table settings"
291
- end
292
-
293
- it "should support account_select setting for choosing account columns" do
294
- rodauth do
295
- enable :login
296
- account_select [:id, :email]
297
- end
298
- roda do |r|
299
- r.rodauth
300
- rodauth.account_from_session
301
- rodauth.account.keys.map(&:to_s).sort.join(' ')
302
- end
303
-
304
- login
305
- page.body.must_equal 'email id'
306
- end
307
-
308
- it "should support :csrf=>false and :flash=>false plugin options" do
309
- c = Class.new(Roda)
310
- c.plugin(:rodauth, :csrf=>false, :flash=>false){}
311
- c.route{}
312
- c.instance_variable_get(:@middleware).length.must_equal 0
313
- c.ancestors.map(&:to_s).wont_include 'Roda::RodaPlugins::Flash::InstanceMethods'
314
- c.ancestors.map(&:to_s).wont_include 'Roda::RodaPlugins::RouteCsrf::InstanceMethods'
315
- end
316
-
317
- it "should inherit rodauth configuration in subclass" do
318
- auth_class = nil
319
- no_freeze!
320
- rodauth{auth_class = auth}
321
- roda(:csrf=>false, :flash=>false){|r|}
322
- Class.new(app).rodauth.must_equal auth_class
323
- end
324
-
325
- it "should use subclass of rodauth configuration if modifying rodauth configuration in subclass" do
326
- auth_class = nil
327
- no_freeze!
328
- rodauth{auth_class = auth; auth_class_eval{def foo; 'foo' end}}
329
- roda{|r| rodauth.foo}
330
- visit '/'
331
- page.html.must_equal 'foo'
332
-
333
- a = Class.new(app)
334
- a.plugin(:rodauth, rodauth_opts){auth_class_eval{def foo; "#{super}bar" end}}
335
- a.rodauth.superclass.must_equal auth_class
336
-
337
- visit '/'
338
- page.html.must_equal 'foo'
339
- self.app = a
340
- visit '/'
341
- page.html.must_equal 'foobar'
342
- end
343
- end