sorcery 0.9.1 → 0.16.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/.github/FUNDING.yml +1 -0
- data/.github/ISSUE_TEMPLATE.md +24 -0
- data/.github/PULL_REQUEST_TEMPLATE.md +7 -0
- data/.github/workflows/ruby.yml +70 -0
- data/.gitignore +3 -0
- data/.rubocop.yml +55 -0
- data/.rubocop_todo.yml +163 -0
- data/CHANGELOG.md +132 -34
- data/CODE_OF_CONDUCT.md +14 -0
- data/Gemfile +3 -17
- data/{LICENSE.txt → LICENSE.md} +1 -1
- data/MAINTAINING.md +64 -0
- data/README.md +146 -269
- data/Rakefile +4 -2
- data/SECURITY.md +19 -0
- data/gemfiles/rails_52.gemfile +7 -0
- data/gemfiles/rails_60.gemfile +7 -0
- data/gemfiles/rails_61.gemfile +7 -0
- data/gemfiles/rails_70.gemfile +7 -0
- data/lib/generators/sorcery/USAGE +1 -1
- data/lib/generators/sorcery/helpers.rb +8 -4
- data/lib/generators/sorcery/install_generator.rb +41 -35
- data/lib/generators/sorcery/templates/initializer.rb +216 -112
- data/lib/generators/sorcery/templates/migration/activity_logging.rb +7 -7
- data/lib/generators/sorcery/templates/migration/brute_force_protection.rb +5 -5
- data/lib/generators/sorcery/templates/migration/core.rb +5 -7
- data/lib/generators/sorcery/templates/migration/external.rb +4 -4
- data/lib/generators/sorcery/templates/migration/magic_login.rb +9 -0
- data/lib/generators/sorcery/templates/migration/remember_me.rb +5 -5
- data/lib/generators/sorcery/templates/migration/reset_password.rb +7 -6
- data/lib/generators/sorcery/templates/migration/user_activation.rb +6 -6
- data/lib/sorcery/adapters/active_record_adapter.rb +11 -21
- data/lib/sorcery/adapters/mongoid_adapter.rb +23 -11
- data/lib/sorcery/controller/config.rb +27 -23
- data/lib/sorcery/controller/submodules/activity_logging.rb +16 -18
- data/lib/sorcery/controller/submodules/brute_force_protection.rb +1 -2
- data/lib/sorcery/controller/submodules/external.rb +69 -44
- data/lib/sorcery/controller/submodules/http_basic_auth.rb +18 -19
- data/lib/sorcery/controller/submodules/remember_me.rb +16 -16
- data/lib/sorcery/controller/submodules/session_timeout.rb +33 -11
- data/lib/sorcery/controller.rb +50 -35
- data/lib/sorcery/crypto_providers/aes256.rb +17 -16
- data/lib/sorcery/crypto_providers/bcrypt.rb +26 -22
- data/lib/sorcery/crypto_providers/common.rb +1 -1
- data/lib/sorcery/crypto_providers/md5.rb +5 -5
- data/lib/sorcery/crypto_providers/sha1.rb +5 -5
- data/lib/sorcery/crypto_providers/sha256.rb +2 -2
- data/lib/sorcery/crypto_providers/sha512.rb +3 -3
- data/lib/sorcery/engine.rb +19 -11
- data/lib/sorcery/model/config.rb +73 -50
- data/lib/sorcery/model/submodules/activity_logging.rb +31 -12
- data/lib/sorcery/model/submodules/brute_force_protection.rb +38 -31
- data/lib/sorcery/model/submodules/external.rb +22 -10
- data/lib/sorcery/model/submodules/magic_login.rb +130 -0
- data/lib/sorcery/model/submodules/remember_me.rb +19 -7
- data/lib/sorcery/model/submodules/reset_password.rb +64 -42
- data/lib/sorcery/model/submodules/user_activation.rb +52 -54
- data/lib/sorcery/model/temporary_token.rb +30 -7
- data/lib/sorcery/model.rb +65 -40
- data/lib/sorcery/protocols/oauth.rb +4 -9
- data/lib/sorcery/protocols/oauth2.rb +0 -2
- data/lib/sorcery/providers/auth0.rb +46 -0
- data/lib/sorcery/providers/base.rb +4 -4
- data/lib/sorcery/providers/battlenet.rb +51 -0
- data/lib/sorcery/providers/discord.rb +52 -0
- data/lib/sorcery/providers/facebook.rb +8 -11
- data/lib/sorcery/providers/github.rb +5 -7
- data/lib/sorcery/providers/google.rb +3 -5
- data/lib/sorcery/providers/heroku.rb +7 -8
- data/lib/sorcery/providers/instagram.rb +73 -0
- data/lib/sorcery/providers/jira.rb +12 -17
- data/lib/sorcery/providers/line.rb +63 -0
- data/lib/sorcery/providers/linkedin.rb +44 -35
- data/lib/sorcery/providers/liveid.rb +4 -7
- data/lib/sorcery/providers/microsoft.rb +59 -0
- data/lib/sorcery/providers/paypal.rb +60 -0
- data/lib/sorcery/providers/salesforce.rb +3 -5
- data/lib/sorcery/providers/slack.rb +45 -0
- data/lib/sorcery/providers/twitter.rb +4 -6
- data/lib/sorcery/providers/vk.rb +8 -9
- data/lib/sorcery/providers/wechat.rb +81 -0
- data/lib/sorcery/providers/xing.rb +7 -10
- data/lib/sorcery/test_helpers/internal/rails.rb +25 -17
- data/lib/sorcery/test_helpers/internal.rb +15 -14
- data/lib/sorcery/test_helpers/rails/controller.rb +1 -1
- data/lib/sorcery/test_helpers/rails/integration.rb +5 -6
- data/lib/sorcery/test_helpers/rails/request.rb +20 -0
- data/lib/sorcery/version.rb +1 -1
- data/lib/sorcery.rb +4 -17
- data/sorcery.gemspec +43 -28
- data/spec/active_record/user_activation_spec.rb +4 -5
- data/spec/active_record/user_activity_logging_spec.rb +4 -6
- data/spec/active_record/user_brute_force_protection_spec.rb +5 -6
- data/spec/active_record/user_magic_login_spec.rb +15 -0
- data/spec/active_record/user_oauth_spec.rb +5 -6
- data/spec/active_record/user_remember_me_spec.rb +5 -6
- data/spec/active_record/user_reset_password_spec.rb +4 -5
- data/spec/active_record/user_spec.rb +7 -17
- data/spec/controllers/controller_activity_logging_spec.rb +13 -24
- data/spec/controllers/controller_brute_force_protection_spec.rb +8 -10
- data/spec/controllers/controller_http_basic_auth_spec.rb +20 -21
- data/spec/controllers/controller_oauth2_spec.rb +297 -158
- data/spec/controllers/controller_oauth_spec.rb +97 -71
- data/spec/controllers/controller_remember_me_spec.rb +49 -36
- data/spec/controllers/controller_session_timeout_spec.rb +106 -20
- data/spec/controllers/controller_spec.rb +87 -111
- data/spec/orm/active_record.rb +3 -3
- data/spec/providers/example_provider_spec.rb +17 -0
- data/spec/providers/example_spec.rb +17 -0
- data/spec/providers/examples_spec.rb +17 -0
- data/spec/providers/vk_spec.rb +42 -0
- data/spec/rails_app/app/active_record/authentication.rb +1 -1
- data/spec/rails_app/app/active_record/user.rb +2 -2
- data/spec/rails_app/app/assets/config/manifest.js +1 -0
- data/spec/rails_app/app/controllers/application_controller.rb +2 -0
- data/spec/rails_app/app/controllers/sorcery_controller.rb +250 -46
- data/spec/rails_app/app/mailers/sorcery_mailer.rb +23 -17
- data/spec/rails_app/app/views/sorcery_mailer/magic_login_email.html.erb +13 -0
- data/spec/rails_app/app/views/sorcery_mailer/magic_login_email.text.erb +6 -0
- data/spec/rails_app/config/application.rb +14 -9
- data/spec/rails_app/config/boot.rb +2 -2
- data/spec/rails_app/config/environment.rb +1 -1
- data/spec/rails_app/config/environments/test.rb +1 -1
- data/spec/rails_app/config/initializers/compatible_legacy_migration.rb +11 -0
- data/spec/rails_app/config/initializers/session_store.rb +3 -3
- data/spec/rails_app/config/routes.rb +31 -1
- data/spec/rails_app/config/secrets.yml +4 -0
- data/spec/rails_app/config.ru +1 -1
- data/spec/rails_app/db/migrate/activation/20101224223622_add_activation_to_users.rb +4 -4
- data/spec/rails_app/db/migrate/activity_logging/20101224223624_add_activity_logging_to_users.rb +10 -10
- data/spec/rails_app/db/migrate/brute_force_protection/20101224223626_add_brute_force_protection_to_users.rb +5 -5
- data/spec/rails_app/db/migrate/core/20101224223620_create_users.rb +5 -5
- data/spec/rails_app/db/migrate/external/20101224223628_create_authentications_and_user_providers.rb +3 -3
- data/spec/rails_app/db/migrate/invalidate_active_sessions/20180221093235_add_invalidate_active_sessions_before_to_users.rb +9 -0
- data/spec/rails_app/db/migrate/magic_login/20170924151831_add_magic_login_to_users.rb +17 -0
- data/spec/rails_app/db/migrate/remember_me/20101224223623_add_remember_me_token_to_users.rb +6 -6
- data/spec/rails_app/db/migrate/reset_password/20101224223622_add_reset_password_to_users.rb +7 -5
- data/spec/rails_app/db/schema.rb +7 -9
- data/spec/shared_examples/user_activation_shared_examples.rb +177 -58
- data/spec/shared_examples/user_activity_logging_shared_examples.rb +47 -41
- data/spec/shared_examples/user_brute_force_protection_shared_examples.rb +19 -24
- data/spec/shared_examples/user_magic_login_shared_examples.rb +150 -0
- data/spec/shared_examples/user_oauth_shared_examples.rb +7 -10
- data/spec/shared_examples/user_remember_me_shared_examples.rb +91 -22
- data/spec/shared_examples/user_reset_password_shared_examples.rb +153 -58
- data/spec/shared_examples/user_shared_examples.rb +328 -145
- data/spec/sorcery_crypto_providers_spec.rb +122 -75
- data/spec/sorcery_temporary_token_spec.rb +27 -0
- data/spec/spec.opts +1 -1
- data/spec/spec_helper.rb +19 -14
- data/spec/support/migration_helper.rb +29 -0
- data/spec/support/providers/example.rb +11 -0
- data/spec/support/providers/example_provider.rb +11 -0
- data/spec/support/providers/examples.rb +11 -0
- metadata +119 -89
- data/.travis.yml +0 -132
- data/gemfiles/active_record-rails40.gemfile +0 -7
- data/gemfiles/active_record-rails41.gemfile +0 -7
- data/gemfiles/mongo_mapper-rails40.gemfile +0 -9
- data/gemfiles/mongo_mapper-rails41.gemfile +0 -9
- data/gemfiles/mongoid-rails40.gemfile +0 -9
- data/gemfiles/mongoid-rails41.gemfile +0 -9
- data/gemfiles/mongoid3-rails32.gemfile +0 -9
- data/lib/sorcery/adapters/data_mapper_adapter.rb +0 -176
- data/lib/sorcery/adapters/mongo_mapper_adapter.rb +0 -110
- data/lib/sorcery/railties/tasks.rake +0 -6
- data/spec/data_mapper/user_activation_spec.rb +0 -10
- data/spec/data_mapper/user_activity_logging_spec.rb +0 -14
- data/spec/data_mapper/user_brute_force_protection_spec.rb +0 -9
- data/spec/data_mapper/user_oauth_spec.rb +0 -9
- data/spec/data_mapper/user_remember_me_spec.rb +0 -8
- data/spec/data_mapper/user_reset_password_spec.rb +0 -8
- data/spec/data_mapper/user_spec.rb +0 -27
- data/spec/mongo_mapper/user_activation_spec.rb +0 -9
- data/spec/mongo_mapper/user_activity_logging_spec.rb +0 -8
- data/spec/mongo_mapper/user_brute_force_protection_spec.rb +0 -8
- data/spec/mongo_mapper/user_oauth_spec.rb +0 -8
- data/spec/mongo_mapper/user_remember_me_spec.rb +0 -8
- data/spec/mongo_mapper/user_reset_password_spec.rb +0 -8
- data/spec/mongo_mapper/user_spec.rb +0 -37
- data/spec/mongoid/user_activation_spec.rb +0 -9
- data/spec/mongoid/user_activity_logging_spec.rb +0 -8
- data/spec/mongoid/user_brute_force_protection_spec.rb +0 -8
- data/spec/mongoid/user_oauth_spec.rb +0 -8
- data/spec/mongoid/user_remember_me_spec.rb +0 -8
- data/spec/mongoid/user_reset_password_spec.rb +0 -8
- data/spec/mongoid/user_spec.rb +0 -51
- data/spec/orm/data_mapper.rb +0 -48
- data/spec/orm/mongo_mapper.rb +0 -10
- data/spec/orm/mongoid.rb +0 -22
- data/spec/rails_app/app/data_mapper/authentication.rb +0 -8
- data/spec/rails_app/app/data_mapper/user.rb +0 -7
- data/spec/rails_app/app/mongo_mapper/authentication.rb +0 -6
- data/spec/rails_app/app/mongo_mapper/user.rb +0 -7
- data/spec/rails_app/app/mongoid/authentication.rb +0 -7
- data/spec/rails_app/app/mongoid/user.rb +0 -7
- data/spec/rails_app/config/initializers/secret_token.rb +0 -7
- data/spec/rails_app/log/development.log +0 -1791
@@ -1,14 +1,13 @@
|
|
1
1
|
require 'spec_helper'
|
2
2
|
|
3
|
-
describe SorceryController do
|
4
|
-
|
3
|
+
describe SorceryController, type: :controller do
|
5
4
|
let!(:user) { double('user', id: 42) }
|
6
5
|
|
7
6
|
# ----------------- SESSION TIMEOUT -----------------------
|
8
|
-
context
|
7
|
+
context 'with session timeout features' do
|
9
8
|
before(:all) do
|
10
9
|
sorcery_reload!([:session_timeout])
|
11
|
-
sorcery_controller_property_set(:session_timeout,0.5)
|
10
|
+
sorcery_controller_property_set(:session_timeout, 0.5)
|
12
11
|
end
|
13
12
|
|
14
13
|
after(:each) do
|
@@ -20,61 +19,148 @@ describe SorceryController do
|
|
20
19
|
allow(user).to receive_message_chain(:sorcery_config, :username_attribute_names, :first) { :username }
|
21
20
|
end
|
22
21
|
|
23
|
-
it
|
22
|
+
it 'does not reset session before session timeout' do
|
24
23
|
login_user user
|
25
24
|
get :test_should_be_logged_in
|
26
25
|
|
27
26
|
expect(session[:user_id]).not_to be_nil
|
28
|
-
expect(response).to
|
27
|
+
expect(response).to be_successful
|
29
28
|
end
|
30
29
|
|
31
|
-
it
|
30
|
+
it 'resets session after session timeout' do
|
32
31
|
login_user user
|
33
|
-
Timecop.travel(Time.now.in_time_zone+0.6)
|
32
|
+
Timecop.travel(Time.now.in_time_zone + 0.6)
|
34
33
|
get :test_should_be_logged_in
|
35
34
|
|
36
35
|
expect(session[:user_id]).to be_nil
|
37
36
|
expect(response).to be_a_redirect
|
38
37
|
end
|
39
38
|
|
40
|
-
|
39
|
+
context "with 'invalidate_active_sessions_enabled'" do
|
40
|
+
it 'does not reset the session if invalidate_sessions_before is nil' do
|
41
|
+
sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
|
42
|
+
login_user user
|
43
|
+
allow(user).to receive(:invalidate_sessions_before) { nil }
|
44
|
+
|
45
|
+
get :test_should_be_logged_in
|
46
|
+
|
47
|
+
expect(session[:user_id]).not_to be_nil
|
48
|
+
expect(response).to be_successful
|
49
|
+
end
|
50
|
+
|
51
|
+
it 'does not reset the session if it was not created before invalidate_sessions_before' do
|
52
|
+
sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
|
53
|
+
login_user user
|
54
|
+
allow(user).to receive(:invalidate_sessions_before) { Time.now.in_time_zone - 10.minutes }
|
55
|
+
|
56
|
+
get :test_should_be_logged_in
|
57
|
+
|
58
|
+
expect(session[:user_id]).not_to be_nil
|
59
|
+
expect(response).to be_successful
|
60
|
+
end
|
61
|
+
|
62
|
+
it 'resets the session if the session was created before invalidate_sessions_before' do
|
63
|
+
sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
|
64
|
+
login_user user
|
65
|
+
allow(user).to receive(:invalidate_sessions_before) { Time.now.in_time_zone }
|
66
|
+
get :test_should_be_logged_in
|
67
|
+
|
68
|
+
expect(session[:user_id]).to be_nil
|
69
|
+
expect(response).to be_a_redirect
|
70
|
+
end
|
71
|
+
|
72
|
+
it 'resets active sessions on next action if invalidate_active_sessions! is called' do
|
73
|
+
sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
|
74
|
+
# precondition that the user is logged in
|
75
|
+
login_user user
|
76
|
+
get :test_should_be_logged_in
|
77
|
+
expect(response).to be_successful
|
78
|
+
|
79
|
+
allow(user).to receive(:send) { |_method, value| allow(user).to receive(:invalidate_sessions_before) { value } }
|
80
|
+
allow(user).to receive(:save)
|
81
|
+
get :test_invalidate_active_session
|
82
|
+
expect(response).to be_successful
|
83
|
+
|
84
|
+
get :test_should_be_logged_in
|
85
|
+
expect(session[:user_id]).to be_nil
|
86
|
+
expect(response).to be_a_redirect
|
87
|
+
end
|
88
|
+
|
89
|
+
it 'allows login after invalidate_active_sessions! is called' do
|
90
|
+
sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
|
91
|
+
# precondition that the user is logged in
|
92
|
+
login_user user
|
93
|
+
get :test_should_be_logged_in
|
94
|
+
expect(response).to be_successful
|
95
|
+
|
96
|
+
allow(user).to receive(:send) { |_method, value| allow(user).to receive(:invalidate_sessions_before) { value } }
|
97
|
+
allow(user).to receive(:save)
|
98
|
+
# Call to invalidate
|
99
|
+
get :test_invalidate_active_session
|
100
|
+
expect(response).to be_successful
|
101
|
+
|
102
|
+
# Check that existing sessions were logged out
|
103
|
+
get :test_should_be_logged_in
|
104
|
+
expect(session[:user_id]).to be_nil
|
105
|
+
expect(response).to be_a_redirect
|
106
|
+
|
107
|
+
# Check that new session is allowed to login
|
108
|
+
login_user user
|
109
|
+
get :test_should_be_logged_in
|
110
|
+
expect(response).to be_successful
|
111
|
+
expect(session[:user_id]).not_to be_nil
|
112
|
+
|
113
|
+
# Check an additional request to make sure not logged out on next request
|
114
|
+
get :test_should_be_logged_in
|
115
|
+
expect(response).to be_successful
|
116
|
+
expect(session[:user_id]).not_to be_nil
|
117
|
+
end
|
118
|
+
end
|
119
|
+
|
120
|
+
it 'works if the session is stored as a string or a Time' do
|
41
121
|
session[:login_time] = Time.now.to_s
|
42
122
|
# TODO: ???
|
43
|
-
expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').
|
123
|
+
expect(User).to receive(:authenticate).with('bla@bla.com', 'secret') { |&block| block.call(user, nil) }
|
44
124
|
|
45
|
-
get :test_login, :email
|
125
|
+
get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
|
46
126
|
|
47
127
|
expect(session[:user_id]).not_to be_nil
|
48
|
-
expect(response).to
|
128
|
+
expect(response).to be_successful
|
49
129
|
end
|
50
130
|
|
51
131
|
context "with 'session_timeout_from_last_action'" do
|
52
|
-
it
|
132
|
+
it 'does not logout if there was activity' do
|
53
133
|
sorcery_controller_property_set(:session_timeout_from_last_action, true)
|
54
|
-
expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').
|
134
|
+
expect(User).to receive(:authenticate).with('bla@bla.com', 'secret') { |&block| block.call(user, nil) }
|
55
135
|
|
56
|
-
get :test_login, :email
|
57
|
-
Timecop.travel(Time.now.in_time_zone+0.3)
|
136
|
+
get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
|
137
|
+
Timecop.travel(Time.now.in_time_zone + 0.3)
|
58
138
|
get :test_should_be_logged_in
|
59
139
|
|
60
140
|
expect(session[:user_id]).not_to be_nil
|
61
141
|
|
62
|
-
Timecop.travel(Time.now.in_time_zone+0.3)
|
142
|
+
Timecop.travel(Time.now.in_time_zone + 0.3)
|
63
143
|
get :test_should_be_logged_in
|
64
144
|
|
65
145
|
expect(session[:user_id]).not_to be_nil
|
66
|
-
expect(response).to
|
146
|
+
expect(response).to be_successful
|
67
147
|
end
|
68
148
|
|
69
149
|
it "with 'session_timeout_from_last_action' logs out if there was no activity" do
|
70
150
|
sorcery_controller_property_set(:session_timeout_from_last_action, true)
|
71
|
-
get :test_login, :email
|
72
|
-
Timecop.travel(Time.now.in_time_zone+0.6)
|
151
|
+
get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
|
152
|
+
Timecop.travel(Time.now.in_time_zone + 0.6)
|
73
153
|
get :test_should_be_logged_in
|
74
154
|
|
75
155
|
expect(session[:user_id]).to be_nil
|
76
156
|
expect(response).to be_a_redirect
|
77
157
|
end
|
78
158
|
end
|
159
|
+
|
160
|
+
it 'registers login time on remember_me callback' do
|
161
|
+
expect(subject).to receive(:register_login_time).with(user)
|
162
|
+
|
163
|
+
subject.send(:after_remember_me!, user)
|
164
|
+
end
|
79
165
|
end
|
80
166
|
end
|
@@ -1,7 +1,7 @@
|
|
1
1
|
require 'spec_helper'
|
2
2
|
|
3
|
-
describe SorceryController do
|
4
|
-
describe
|
3
|
+
describe SorceryController, type: :controller do
|
4
|
+
describe 'plugin configuration' do
|
5
5
|
before(:all) do
|
6
6
|
sorcery_reload!
|
7
7
|
end
|
@@ -12,9 +12,9 @@ describe SorceryController do
|
|
12
12
|
end
|
13
13
|
|
14
14
|
it "enables configuration option 'user_class'" do
|
15
|
-
sorcery_controller_property_set(:user_class,
|
15
|
+
sorcery_controller_property_set(:user_class, 'TestUser')
|
16
16
|
|
17
|
-
expect(Sorcery::Controller::Config.user_class).to eq
|
17
|
+
expect(Sorcery::Controller::Config.user_class).to eq 'TestUser'
|
18
18
|
end
|
19
19
|
|
20
20
|
it "enables configuration option 'not_authenticated_action'" do
|
@@ -22,11 +22,10 @@ describe SorceryController do
|
|
22
22
|
|
23
23
|
expect(Sorcery::Controller::Config.not_authenticated_action).to eq :my_action
|
24
24
|
end
|
25
|
-
|
26
25
|
end
|
27
26
|
|
28
27
|
# ----------------- PLUGIN ACTIVATED -----------------------
|
29
|
-
context
|
28
|
+
context 'when activated with sorcery' do
|
30
29
|
let(:user) { double('user', id: 42) }
|
31
30
|
|
32
31
|
before(:all) do
|
@@ -48,160 +47,138 @@ describe SorceryController do
|
|
48
47
|
|
49
48
|
specify { should respond_to(:current_user) }
|
50
49
|
|
51
|
-
|
52
|
-
expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').and_return(user)
|
53
|
-
|
54
|
-
get :test_login, :email => 'bla@bla.com', :password => 'secret'
|
55
|
-
|
56
|
-
expect(assigns[:user]).to eq user
|
57
|
-
expect(session[:user_id]).to eq "42"
|
58
|
-
end
|
59
|
-
|
60
|
-
it "login(email,password) returns the user when success and set the session with user.id" do
|
61
|
-
expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').and_return(user)
|
62
|
-
|
63
|
-
get :test_login, :email => 'bla@bla.com', :password => 'secret'
|
64
|
-
|
65
|
-
expect(assigns[:user]).to eq user
|
66
|
-
expect(session[:user_id]).to eq user.id.to_s
|
67
|
-
end
|
68
|
-
|
69
|
-
it "login(username,password) returns nil and not set the session when failure" do
|
70
|
-
expect(User).to receive(:authenticate).with('bla@bla.com', 'opensesame!').and_return(nil)
|
71
|
-
|
72
|
-
get :test_login, :email => 'bla@bla.com', :password => 'opensesame!'
|
73
|
-
|
74
|
-
expect(assigns[:user]).to be_nil
|
75
|
-
expect(session[:user_id]).to be_nil
|
76
|
-
end
|
50
|
+
specify { should respond_to(:require_login) }
|
77
51
|
|
78
|
-
|
79
|
-
|
80
|
-
|
52
|
+
describe '#login' do
|
53
|
+
context 'when succeeds' do
|
54
|
+
before do
|
55
|
+
expect(User).to receive(:authenticate).with('bla@bla.com', 'secret') { |&block| block.call(user, nil) }
|
56
|
+
get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
|
57
|
+
end
|
81
58
|
|
82
|
-
|
83
|
-
|
59
|
+
it 'assigns user to @user variable' do
|
60
|
+
expect(assigns[:user]).to eq user
|
61
|
+
end
|
84
62
|
|
85
|
-
|
86
|
-
|
87
|
-
|
63
|
+
it 'writes user id in session' do
|
64
|
+
expect(session[:user_id]).to eq user.id.to_s
|
65
|
+
end
|
88
66
|
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
# TODO: move test to model
|
94
|
-
it "login(username,password) returns the user and set the session with user.id when upper case username and config is downcase before authenticating" do
|
95
|
-
sorcery_model_property_set(:downcase_username_before_authenticating, true)
|
96
|
-
expect(User).to receive(:authenticate).with('BLA@BLA.COM', 'secret').and_return(user)
|
97
|
-
get :test_login, :email => 'BLA@BLA.COM', :password => 'secret'
|
67
|
+
it 'sets csrf token in session' do
|
68
|
+
expect(session[:_csrf_token]).not_to be_nil
|
69
|
+
end
|
70
|
+
end
|
98
71
|
|
99
|
-
|
100
|
-
|
101
|
-
|
72
|
+
context 'when fails' do
|
73
|
+
before do
|
74
|
+
expect(User).to receive(:authenticate).with('bla@bla.com', 'opensesame!').and_return(nil)
|
75
|
+
get :test_login, params: { email: 'bla@bla.com', password: 'opensesame!' }
|
76
|
+
end
|
102
77
|
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
expect(User).to receive(:authenticate).with('bla1@bla.com', 'secret1').and_return(nil)
|
107
|
-
get :test_login, :email => 'bla1@bla.com', :password => 'secret1'
|
78
|
+
it 'sets @user variable to nil' do
|
79
|
+
expect(assigns[:user]).to be_nil
|
80
|
+
end
|
108
81
|
|
109
|
-
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
# TODO: move test to model
|
114
|
-
it "login(username,password) returns the user and set the session with user.id when user was created with upper case username and config is downcase before authenticating" do
|
115
|
-
skip('DM Adapter dependant') if SORCERY_ORM == :data_mapper
|
116
|
-
sorcery_model_property_set(:downcase_username_before_authenticating, true)
|
117
|
-
expect(User).to receive(:authenticate).with('bla1@bla.com', 'secret1').and_return(user)
|
118
|
-
get :test_login, :email => 'bla1@bla.com', :password => 'secret1'
|
119
|
-
|
120
|
-
expect(assigns[:user]).to eq user
|
121
|
-
expect(session[:user_id]).to eq user.id.to_s
|
82
|
+
it 'sets user_id in session to nil' do
|
83
|
+
expect(session[:user_id]).to be_nil
|
84
|
+
end
|
85
|
+
end
|
122
86
|
end
|
123
87
|
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
|
88
|
+
describe '#logout' do
|
89
|
+
it 'clears the session' do
|
90
|
+
cookies[:remember_me_token] = nil
|
91
|
+
session[:user_id] = user.id.to_s
|
92
|
+
expect(User.sorcery_adapter).to receive(:find_by_id).with('42') { user }
|
93
|
+
get :test_logout
|
129
94
|
|
130
|
-
|
95
|
+
expect(session[:user_id]).to be_nil
|
96
|
+
end
|
131
97
|
end
|
132
98
|
|
133
|
-
|
134
|
-
|
135
|
-
|
99
|
+
describe '#logged_in?' do
|
100
|
+
it 'returns true when user is logged in' do
|
101
|
+
session[:user_id] = user.id.to_s
|
102
|
+
expect(User.sorcery_adapter).to receive(:find_by_id).with('42') { user }
|
136
103
|
|
137
|
-
|
138
|
-
|
104
|
+
expect(subject.logged_in?).to be true
|
105
|
+
end
|
139
106
|
|
140
|
-
|
141
|
-
|
107
|
+
it 'returns false when user is not logged in' do
|
108
|
+
session[:user_id] = nil
|
142
109
|
|
143
|
-
|
110
|
+
expect(subject.logged_in?).to be false
|
111
|
+
end
|
144
112
|
end
|
145
113
|
|
146
|
-
|
147
|
-
|
148
|
-
|
114
|
+
describe '#current_user' do
|
115
|
+
it 'current_user returns the user instance if logged in' do
|
116
|
+
session[:user_id] = user.id.to_s
|
117
|
+
expect(User.sorcery_adapter).to receive(:find_by_id).once.with('42') { user }
|
149
118
|
|
150
|
-
|
151
|
-
|
119
|
+
2.times { expect(subject.current_user).to eq user } # memoized!
|
120
|
+
end
|
152
121
|
|
153
|
-
|
154
|
-
|
155
|
-
|
122
|
+
it 'current_user returns false if not logged in' do
|
123
|
+
session[:user_id] = nil
|
124
|
+
expect(User.sorcery_adapter).to_not receive(:find_by_id)
|
156
125
|
|
157
|
-
|
126
|
+
2.times { expect(subject.current_user).to be_nil } # memoized!
|
127
|
+
end
|
158
128
|
end
|
159
129
|
|
160
|
-
|
161
|
-
|
162
|
-
it "calls the configured 'not_authenticated_action' when authenticate before_filter fails" do
|
130
|
+
it "calls the configured 'not_authenticated_action' when authenticate before_action fails" do
|
163
131
|
session[:user_id] = nil
|
164
132
|
sorcery_controller_property_set(:not_authenticated_action, :test_not_authenticated_action)
|
165
133
|
get :test_logout
|
166
134
|
|
167
|
-
expect(response
|
135
|
+
expect(response).to be_successful
|
168
136
|
end
|
169
137
|
|
170
|
-
it
|
138
|
+
it 'require_login before_action saves the url that the user originally wanted' do
|
171
139
|
get :some_action
|
172
140
|
|
173
|
-
expect(session[:return_to_url]).to eq
|
174
|
-
expect(response).to redirect_to(
|
141
|
+
expect(session[:return_to_url]).to eq 'http://test.host/some_action'
|
142
|
+
expect(response).to redirect_to('http://test.host/')
|
175
143
|
end
|
176
144
|
|
177
|
-
it
|
178
|
-
[
|
179
|
-
|
145
|
+
it 'require_login before_action does not save the url that the user originally wanted upon all non-get http methods' do
|
146
|
+
%i[post put delete].each do |m|
|
147
|
+
send(m, :some_action)
|
180
148
|
|
181
149
|
expect(session[:return_to_url]).to be_nil
|
182
150
|
end
|
183
151
|
end
|
184
152
|
|
185
|
-
it
|
186
|
-
|
187
|
-
|
153
|
+
it 'require_login before_action does not save the url for JSON requests' do
|
154
|
+
get :some_action, format: :json
|
155
|
+
expect(session[:return_to_url]).to be_nil
|
156
|
+
end
|
188
157
|
|
189
|
-
|
190
|
-
|
158
|
+
it 'require_login before_action does not save the url for XHR requests' do
|
159
|
+
get :some_action, xhr: true
|
160
|
+
expect(session[:return_to_url]).to be_nil
|
191
161
|
end
|
192
162
|
|
163
|
+
it 'on successful login the user is redirected to the url he originally wanted' do
|
164
|
+
session[:return_to_url] = 'http://test.host/some_action'
|
165
|
+
post :test_return_to, params: { email: 'bla@bla.com', password: 'secret' }
|
166
|
+
|
167
|
+
expect(response).to redirect_to('http://test.host/some_action')
|
168
|
+
expect(flash[:notice]).to eq 'haha!'
|
169
|
+
end
|
193
170
|
|
194
171
|
# --- auto_login(user) ---
|
195
172
|
specify { should respond_to(:auto_login) }
|
196
173
|
|
197
|
-
it
|
174
|
+
it 'auto_login(user) logs in a user instance' do
|
198
175
|
session[:user_id] = nil
|
199
176
|
subject.auto_login(user)
|
200
177
|
|
201
178
|
expect(subject.logged_in?).to be true
|
202
179
|
end
|
203
180
|
|
204
|
-
it
|
181
|
+
it 'auto_login(user) works even if current_user was already set to false' do
|
205
182
|
get :test_logout
|
206
183
|
|
207
184
|
expect(session[:user_id]).to be_nil
|
@@ -214,5 +191,4 @@ describe SorceryController do
|
|
214
191
|
expect(assigns[:result]).to eq user
|
215
192
|
end
|
216
193
|
end
|
217
|
-
|
218
194
|
end
|
data/spec/orm/active_record.rb
CHANGED
@@ -9,13 +9,13 @@ class TestUser < ActiveRecord::Base
|
|
9
9
|
end
|
10
10
|
|
11
11
|
def setup_orm
|
12
|
-
|
12
|
+
MigrationHelper.migrate(migrations_path)
|
13
13
|
end
|
14
14
|
|
15
15
|
def teardown_orm
|
16
|
-
|
16
|
+
MigrationHelper.rollback(migrations_path)
|
17
17
|
end
|
18
18
|
|
19
19
|
def migrations_path
|
20
|
-
Rails.root.join(
|
20
|
+
Rails.root.join('db', 'migrate', 'core')
|
21
21
|
end
|
@@ -0,0 +1,17 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'spec_helper'
|
4
|
+
require 'sorcery/providers/base'
|
5
|
+
|
6
|
+
describe Sorcery::Providers::ExampleProvider do
|
7
|
+
before(:all) do
|
8
|
+
sorcery_reload!([:external])
|
9
|
+
sorcery_controller_property_set(:external_providers, [:example_provider])
|
10
|
+
end
|
11
|
+
|
12
|
+
context 'fetching a multi-word custom provider' do
|
13
|
+
it 'returns the provider' do
|
14
|
+
expect(Sorcery::Controller::Config.example_provider).to be_a(Sorcery::Providers::ExampleProvider)
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
@@ -0,0 +1,17 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'spec_helper'
|
4
|
+
require 'sorcery/providers/base'
|
5
|
+
|
6
|
+
describe Sorcery::Providers::Example do
|
7
|
+
before(:all) do
|
8
|
+
sorcery_reload!([:external])
|
9
|
+
sorcery_controller_property_set(:external_providers, [:example])
|
10
|
+
end
|
11
|
+
|
12
|
+
context 'fetching a single-word custom provider' do
|
13
|
+
it 'returns the provider' do
|
14
|
+
expect(Sorcery::Controller::Config.example).to be_a(Sorcery::Providers::Example)
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
@@ -0,0 +1,17 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'spec_helper'
|
4
|
+
require 'sorcery/providers/base'
|
5
|
+
|
6
|
+
describe Sorcery::Providers::Examples do
|
7
|
+
before(:all) do
|
8
|
+
sorcery_reload!([:external])
|
9
|
+
sorcery_controller_property_set(:external_providers, [:examples])
|
10
|
+
end
|
11
|
+
|
12
|
+
context 'fetching a plural custom provider' do
|
13
|
+
it 'returns the provider' do
|
14
|
+
expect(Sorcery::Controller::Config.examples).to be_a(Sorcery::Providers::Examples)
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
@@ -0,0 +1,42 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
require 'sorcery/providers/base'
|
3
|
+
require 'sorcery/providers/vk'
|
4
|
+
require 'webmock/rspec'
|
5
|
+
|
6
|
+
describe Sorcery::Providers::Vk do
|
7
|
+
include WebMock::API
|
8
|
+
|
9
|
+
let(:provider) { Sorcery::Controller::Config.vk }
|
10
|
+
|
11
|
+
before(:all) do
|
12
|
+
sorcery_reload!([:external])
|
13
|
+
sorcery_controller_property_set(:external_providers, [:vk])
|
14
|
+
sorcery_controller_external_property_set(:vk, :key, 'KEY')
|
15
|
+
sorcery_controller_external_property_set(:vk, :secret, 'SECRET')
|
16
|
+
end
|
17
|
+
|
18
|
+
def stub_vk_authorize
|
19
|
+
stub_request(:post, %r{https\:\/\/oauth\.vk\.com\/access_token}).to_return(
|
20
|
+
status: 200,
|
21
|
+
body: '{"access_token":"TOKEN","expires_in":86329,"user_id":1}',
|
22
|
+
headers: { 'content-type' => 'application/json' }
|
23
|
+
)
|
24
|
+
end
|
25
|
+
|
26
|
+
context 'getting user info hash' do
|
27
|
+
it 'should provide VK API version' do
|
28
|
+
stub_vk_authorize
|
29
|
+
sorcery_controller_external_property_set(:vk, :api_version, '5.71')
|
30
|
+
|
31
|
+
get_user = stub_request(
|
32
|
+
:get,
|
33
|
+
'https://api.vk.com/method/getProfiles?access_token=TOKEN&fields=&scope=email&uids=1&v=5.71'
|
34
|
+
).to_return(body: '{"response":[{"id":1}]}')
|
35
|
+
|
36
|
+
token = provider.process_callback({ code: 'CODE' }, nil)
|
37
|
+
provider.get_user_hash(token)
|
38
|
+
|
39
|
+
expect(get_user).to have_been_requested
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
@@ -1,5 +1,5 @@
|
|
1
1
|
class User < ActiveRecord::Base
|
2
|
-
has_many :authentications, :
|
3
|
-
has_many :user_providers, :
|
2
|
+
has_many :authentications, dependent: :destroy
|
3
|
+
has_many :user_providers, dependent: :destroy
|
4
4
|
accepts_nested_attributes_for :authentications
|
5
5
|
end
|
@@ -0,0 +1 @@
|
|
1
|
+
{}
|