sorcery 0.9.1 → 0.16.3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (199) hide show
  1. checksums.yaml +5 -5
  2. data/.github/FUNDING.yml +1 -0
  3. data/.github/ISSUE_TEMPLATE.md +24 -0
  4. data/.github/PULL_REQUEST_TEMPLATE.md +7 -0
  5. data/.github/workflows/ruby.yml +70 -0
  6. data/.gitignore +3 -0
  7. data/.rubocop.yml +55 -0
  8. data/.rubocop_todo.yml +163 -0
  9. data/CHANGELOG.md +132 -34
  10. data/CODE_OF_CONDUCT.md +14 -0
  11. data/Gemfile +3 -17
  12. data/{LICENSE.txt → LICENSE.md} +1 -1
  13. data/MAINTAINING.md +64 -0
  14. data/README.md +146 -269
  15. data/Rakefile +4 -2
  16. data/SECURITY.md +19 -0
  17. data/gemfiles/rails_52.gemfile +7 -0
  18. data/gemfiles/rails_60.gemfile +7 -0
  19. data/gemfiles/rails_61.gemfile +7 -0
  20. data/gemfiles/rails_70.gemfile +7 -0
  21. data/lib/generators/sorcery/USAGE +1 -1
  22. data/lib/generators/sorcery/helpers.rb +8 -4
  23. data/lib/generators/sorcery/install_generator.rb +41 -35
  24. data/lib/generators/sorcery/templates/initializer.rb +216 -112
  25. data/lib/generators/sorcery/templates/migration/activity_logging.rb +7 -7
  26. data/lib/generators/sorcery/templates/migration/brute_force_protection.rb +5 -5
  27. data/lib/generators/sorcery/templates/migration/core.rb +5 -7
  28. data/lib/generators/sorcery/templates/migration/external.rb +4 -4
  29. data/lib/generators/sorcery/templates/migration/magic_login.rb +9 -0
  30. data/lib/generators/sorcery/templates/migration/remember_me.rb +5 -5
  31. data/lib/generators/sorcery/templates/migration/reset_password.rb +7 -6
  32. data/lib/generators/sorcery/templates/migration/user_activation.rb +6 -6
  33. data/lib/sorcery/adapters/active_record_adapter.rb +11 -21
  34. data/lib/sorcery/adapters/mongoid_adapter.rb +23 -11
  35. data/lib/sorcery/controller/config.rb +27 -23
  36. data/lib/sorcery/controller/submodules/activity_logging.rb +16 -18
  37. data/lib/sorcery/controller/submodules/brute_force_protection.rb +1 -2
  38. data/lib/sorcery/controller/submodules/external.rb +69 -44
  39. data/lib/sorcery/controller/submodules/http_basic_auth.rb +18 -19
  40. data/lib/sorcery/controller/submodules/remember_me.rb +16 -16
  41. data/lib/sorcery/controller/submodules/session_timeout.rb +33 -11
  42. data/lib/sorcery/controller.rb +50 -35
  43. data/lib/sorcery/crypto_providers/aes256.rb +17 -16
  44. data/lib/sorcery/crypto_providers/bcrypt.rb +26 -22
  45. data/lib/sorcery/crypto_providers/common.rb +1 -1
  46. data/lib/sorcery/crypto_providers/md5.rb +5 -5
  47. data/lib/sorcery/crypto_providers/sha1.rb +5 -5
  48. data/lib/sorcery/crypto_providers/sha256.rb +2 -2
  49. data/lib/sorcery/crypto_providers/sha512.rb +3 -3
  50. data/lib/sorcery/engine.rb +19 -11
  51. data/lib/sorcery/model/config.rb +73 -50
  52. data/lib/sorcery/model/submodules/activity_logging.rb +31 -12
  53. data/lib/sorcery/model/submodules/brute_force_protection.rb +38 -31
  54. data/lib/sorcery/model/submodules/external.rb +22 -10
  55. data/lib/sorcery/model/submodules/magic_login.rb +130 -0
  56. data/lib/sorcery/model/submodules/remember_me.rb +19 -7
  57. data/lib/sorcery/model/submodules/reset_password.rb +64 -42
  58. data/lib/sorcery/model/submodules/user_activation.rb +52 -54
  59. data/lib/sorcery/model/temporary_token.rb +30 -7
  60. data/lib/sorcery/model.rb +65 -40
  61. data/lib/sorcery/protocols/oauth.rb +4 -9
  62. data/lib/sorcery/protocols/oauth2.rb +0 -2
  63. data/lib/sorcery/providers/auth0.rb +46 -0
  64. data/lib/sorcery/providers/base.rb +4 -4
  65. data/lib/sorcery/providers/battlenet.rb +51 -0
  66. data/lib/sorcery/providers/discord.rb +52 -0
  67. data/lib/sorcery/providers/facebook.rb +8 -11
  68. data/lib/sorcery/providers/github.rb +5 -7
  69. data/lib/sorcery/providers/google.rb +3 -5
  70. data/lib/sorcery/providers/heroku.rb +7 -8
  71. data/lib/sorcery/providers/instagram.rb +73 -0
  72. data/lib/sorcery/providers/jira.rb +12 -17
  73. data/lib/sorcery/providers/line.rb +63 -0
  74. data/lib/sorcery/providers/linkedin.rb +44 -35
  75. data/lib/sorcery/providers/liveid.rb +4 -7
  76. data/lib/sorcery/providers/microsoft.rb +59 -0
  77. data/lib/sorcery/providers/paypal.rb +60 -0
  78. data/lib/sorcery/providers/salesforce.rb +3 -5
  79. data/lib/sorcery/providers/slack.rb +45 -0
  80. data/lib/sorcery/providers/twitter.rb +4 -6
  81. data/lib/sorcery/providers/vk.rb +8 -9
  82. data/lib/sorcery/providers/wechat.rb +81 -0
  83. data/lib/sorcery/providers/xing.rb +7 -10
  84. data/lib/sorcery/test_helpers/internal/rails.rb +25 -17
  85. data/lib/sorcery/test_helpers/internal.rb +15 -14
  86. data/lib/sorcery/test_helpers/rails/controller.rb +1 -1
  87. data/lib/sorcery/test_helpers/rails/integration.rb +5 -6
  88. data/lib/sorcery/test_helpers/rails/request.rb +20 -0
  89. data/lib/sorcery/version.rb +1 -1
  90. data/lib/sorcery.rb +4 -17
  91. data/sorcery.gemspec +43 -28
  92. data/spec/active_record/user_activation_spec.rb +4 -5
  93. data/spec/active_record/user_activity_logging_spec.rb +4 -6
  94. data/spec/active_record/user_brute_force_protection_spec.rb +5 -6
  95. data/spec/active_record/user_magic_login_spec.rb +15 -0
  96. data/spec/active_record/user_oauth_spec.rb +5 -6
  97. data/spec/active_record/user_remember_me_spec.rb +5 -6
  98. data/spec/active_record/user_reset_password_spec.rb +4 -5
  99. data/spec/active_record/user_spec.rb +7 -17
  100. data/spec/controllers/controller_activity_logging_spec.rb +13 -24
  101. data/spec/controllers/controller_brute_force_protection_spec.rb +8 -10
  102. data/spec/controllers/controller_http_basic_auth_spec.rb +20 -21
  103. data/spec/controllers/controller_oauth2_spec.rb +297 -158
  104. data/spec/controllers/controller_oauth_spec.rb +97 -71
  105. data/spec/controllers/controller_remember_me_spec.rb +49 -36
  106. data/spec/controllers/controller_session_timeout_spec.rb +106 -20
  107. data/spec/controllers/controller_spec.rb +87 -111
  108. data/spec/orm/active_record.rb +3 -3
  109. data/spec/providers/example_provider_spec.rb +17 -0
  110. data/spec/providers/example_spec.rb +17 -0
  111. data/spec/providers/examples_spec.rb +17 -0
  112. data/spec/providers/vk_spec.rb +42 -0
  113. data/spec/rails_app/app/active_record/authentication.rb +1 -1
  114. data/spec/rails_app/app/active_record/user.rb +2 -2
  115. data/spec/rails_app/app/assets/config/manifest.js +1 -0
  116. data/spec/rails_app/app/controllers/application_controller.rb +2 -0
  117. data/spec/rails_app/app/controllers/sorcery_controller.rb +250 -46
  118. data/spec/rails_app/app/mailers/sorcery_mailer.rb +23 -17
  119. data/spec/rails_app/app/views/sorcery_mailer/magic_login_email.html.erb +13 -0
  120. data/spec/rails_app/app/views/sorcery_mailer/magic_login_email.text.erb +6 -0
  121. data/spec/rails_app/config/application.rb +14 -9
  122. data/spec/rails_app/config/boot.rb +2 -2
  123. data/spec/rails_app/config/environment.rb +1 -1
  124. data/spec/rails_app/config/environments/test.rb +1 -1
  125. data/spec/rails_app/config/initializers/compatible_legacy_migration.rb +11 -0
  126. data/spec/rails_app/config/initializers/session_store.rb +3 -3
  127. data/spec/rails_app/config/routes.rb +31 -1
  128. data/spec/rails_app/config/secrets.yml +4 -0
  129. data/spec/rails_app/config.ru +1 -1
  130. data/spec/rails_app/db/migrate/activation/20101224223622_add_activation_to_users.rb +4 -4
  131. data/spec/rails_app/db/migrate/activity_logging/20101224223624_add_activity_logging_to_users.rb +10 -10
  132. data/spec/rails_app/db/migrate/brute_force_protection/20101224223626_add_brute_force_protection_to_users.rb +5 -5
  133. data/spec/rails_app/db/migrate/core/20101224223620_create_users.rb +5 -5
  134. data/spec/rails_app/db/migrate/external/20101224223628_create_authentications_and_user_providers.rb +3 -3
  135. data/spec/rails_app/db/migrate/invalidate_active_sessions/20180221093235_add_invalidate_active_sessions_before_to_users.rb +9 -0
  136. data/spec/rails_app/db/migrate/magic_login/20170924151831_add_magic_login_to_users.rb +17 -0
  137. data/spec/rails_app/db/migrate/remember_me/20101224223623_add_remember_me_token_to_users.rb +6 -6
  138. data/spec/rails_app/db/migrate/reset_password/20101224223622_add_reset_password_to_users.rb +7 -5
  139. data/spec/rails_app/db/schema.rb +7 -9
  140. data/spec/shared_examples/user_activation_shared_examples.rb +177 -58
  141. data/spec/shared_examples/user_activity_logging_shared_examples.rb +47 -41
  142. data/spec/shared_examples/user_brute_force_protection_shared_examples.rb +19 -24
  143. data/spec/shared_examples/user_magic_login_shared_examples.rb +150 -0
  144. data/spec/shared_examples/user_oauth_shared_examples.rb +7 -10
  145. data/spec/shared_examples/user_remember_me_shared_examples.rb +91 -22
  146. data/spec/shared_examples/user_reset_password_shared_examples.rb +153 -58
  147. data/spec/shared_examples/user_shared_examples.rb +328 -145
  148. data/spec/sorcery_crypto_providers_spec.rb +122 -75
  149. data/spec/sorcery_temporary_token_spec.rb +27 -0
  150. data/spec/spec.opts +1 -1
  151. data/spec/spec_helper.rb +19 -14
  152. data/spec/support/migration_helper.rb +29 -0
  153. data/spec/support/providers/example.rb +11 -0
  154. data/spec/support/providers/example_provider.rb +11 -0
  155. data/spec/support/providers/examples.rb +11 -0
  156. metadata +119 -89
  157. data/.travis.yml +0 -132
  158. data/gemfiles/active_record-rails40.gemfile +0 -7
  159. data/gemfiles/active_record-rails41.gemfile +0 -7
  160. data/gemfiles/mongo_mapper-rails40.gemfile +0 -9
  161. data/gemfiles/mongo_mapper-rails41.gemfile +0 -9
  162. data/gemfiles/mongoid-rails40.gemfile +0 -9
  163. data/gemfiles/mongoid-rails41.gemfile +0 -9
  164. data/gemfiles/mongoid3-rails32.gemfile +0 -9
  165. data/lib/sorcery/adapters/data_mapper_adapter.rb +0 -176
  166. data/lib/sorcery/adapters/mongo_mapper_adapter.rb +0 -110
  167. data/lib/sorcery/railties/tasks.rake +0 -6
  168. data/spec/data_mapper/user_activation_spec.rb +0 -10
  169. data/spec/data_mapper/user_activity_logging_spec.rb +0 -14
  170. data/spec/data_mapper/user_brute_force_protection_spec.rb +0 -9
  171. data/spec/data_mapper/user_oauth_spec.rb +0 -9
  172. data/spec/data_mapper/user_remember_me_spec.rb +0 -8
  173. data/spec/data_mapper/user_reset_password_spec.rb +0 -8
  174. data/spec/data_mapper/user_spec.rb +0 -27
  175. data/spec/mongo_mapper/user_activation_spec.rb +0 -9
  176. data/spec/mongo_mapper/user_activity_logging_spec.rb +0 -8
  177. data/spec/mongo_mapper/user_brute_force_protection_spec.rb +0 -8
  178. data/spec/mongo_mapper/user_oauth_spec.rb +0 -8
  179. data/spec/mongo_mapper/user_remember_me_spec.rb +0 -8
  180. data/spec/mongo_mapper/user_reset_password_spec.rb +0 -8
  181. data/spec/mongo_mapper/user_spec.rb +0 -37
  182. data/spec/mongoid/user_activation_spec.rb +0 -9
  183. data/spec/mongoid/user_activity_logging_spec.rb +0 -8
  184. data/spec/mongoid/user_brute_force_protection_spec.rb +0 -8
  185. data/spec/mongoid/user_oauth_spec.rb +0 -8
  186. data/spec/mongoid/user_remember_me_spec.rb +0 -8
  187. data/spec/mongoid/user_reset_password_spec.rb +0 -8
  188. data/spec/mongoid/user_spec.rb +0 -51
  189. data/spec/orm/data_mapper.rb +0 -48
  190. data/spec/orm/mongo_mapper.rb +0 -10
  191. data/spec/orm/mongoid.rb +0 -22
  192. data/spec/rails_app/app/data_mapper/authentication.rb +0 -8
  193. data/spec/rails_app/app/data_mapper/user.rb +0 -7
  194. data/spec/rails_app/app/mongo_mapper/authentication.rb +0 -6
  195. data/spec/rails_app/app/mongo_mapper/user.rb +0 -7
  196. data/spec/rails_app/app/mongoid/authentication.rb +0 -7
  197. data/spec/rails_app/app/mongoid/user.rb +0 -7
  198. data/spec/rails_app/config/initializers/secret_token.rb +0 -7
  199. data/spec/rails_app/log/development.log +0 -1791
@@ -1,14 +1,13 @@
1
1
  require 'spec_helper'
2
2
 
3
- describe SorceryController do
4
-
3
+ describe SorceryController, type: :controller do
5
4
  let!(:user) { double('user', id: 42) }
6
5
 
7
6
  # ----------------- SESSION TIMEOUT -----------------------
8
- context "with session timeout features" do
7
+ context 'with session timeout features' do
9
8
  before(:all) do
10
9
  sorcery_reload!([:session_timeout])
11
- sorcery_controller_property_set(:session_timeout,0.5)
10
+ sorcery_controller_property_set(:session_timeout, 0.5)
12
11
  end
13
12
 
14
13
  after(:each) do
@@ -20,61 +19,148 @@ describe SorceryController do
20
19
  allow(user).to receive_message_chain(:sorcery_config, :username_attribute_names, :first) { :username }
21
20
  end
22
21
 
23
- it "does not reset session before session timeout" do
22
+ it 'does not reset session before session timeout' do
24
23
  login_user user
25
24
  get :test_should_be_logged_in
26
25
 
27
26
  expect(session[:user_id]).not_to be_nil
28
- expect(response).to be_a_success
27
+ expect(response).to be_successful
29
28
  end
30
29
 
31
- it "resets session after session timeout" do
30
+ it 'resets session after session timeout' do
32
31
  login_user user
33
- Timecop.travel(Time.now.in_time_zone+0.6)
32
+ Timecop.travel(Time.now.in_time_zone + 0.6)
34
33
  get :test_should_be_logged_in
35
34
 
36
35
  expect(session[:user_id]).to be_nil
37
36
  expect(response).to be_a_redirect
38
37
  end
39
38
 
40
- it "works if the session is stored as a string or a Time" do
39
+ context "with 'invalidate_active_sessions_enabled'" do
40
+ it 'does not reset the session if invalidate_sessions_before is nil' do
41
+ sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
42
+ login_user user
43
+ allow(user).to receive(:invalidate_sessions_before) { nil }
44
+
45
+ get :test_should_be_logged_in
46
+
47
+ expect(session[:user_id]).not_to be_nil
48
+ expect(response).to be_successful
49
+ end
50
+
51
+ it 'does not reset the session if it was not created before invalidate_sessions_before' do
52
+ sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
53
+ login_user user
54
+ allow(user).to receive(:invalidate_sessions_before) { Time.now.in_time_zone - 10.minutes }
55
+
56
+ get :test_should_be_logged_in
57
+
58
+ expect(session[:user_id]).not_to be_nil
59
+ expect(response).to be_successful
60
+ end
61
+
62
+ it 'resets the session if the session was created before invalidate_sessions_before' do
63
+ sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
64
+ login_user user
65
+ allow(user).to receive(:invalidate_sessions_before) { Time.now.in_time_zone }
66
+ get :test_should_be_logged_in
67
+
68
+ expect(session[:user_id]).to be_nil
69
+ expect(response).to be_a_redirect
70
+ end
71
+
72
+ it 'resets active sessions on next action if invalidate_active_sessions! is called' do
73
+ sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
74
+ # precondition that the user is logged in
75
+ login_user user
76
+ get :test_should_be_logged_in
77
+ expect(response).to be_successful
78
+
79
+ allow(user).to receive(:send) { |_method, value| allow(user).to receive(:invalidate_sessions_before) { value } }
80
+ allow(user).to receive(:save)
81
+ get :test_invalidate_active_session
82
+ expect(response).to be_successful
83
+
84
+ get :test_should_be_logged_in
85
+ expect(session[:user_id]).to be_nil
86
+ expect(response).to be_a_redirect
87
+ end
88
+
89
+ it 'allows login after invalidate_active_sessions! is called' do
90
+ sorcery_controller_property_set(:session_timeout_invalidate_active_sessions_enabled, true)
91
+ # precondition that the user is logged in
92
+ login_user user
93
+ get :test_should_be_logged_in
94
+ expect(response).to be_successful
95
+
96
+ allow(user).to receive(:send) { |_method, value| allow(user).to receive(:invalidate_sessions_before) { value } }
97
+ allow(user).to receive(:save)
98
+ # Call to invalidate
99
+ get :test_invalidate_active_session
100
+ expect(response).to be_successful
101
+
102
+ # Check that existing sessions were logged out
103
+ get :test_should_be_logged_in
104
+ expect(session[:user_id]).to be_nil
105
+ expect(response).to be_a_redirect
106
+
107
+ # Check that new session is allowed to login
108
+ login_user user
109
+ get :test_should_be_logged_in
110
+ expect(response).to be_successful
111
+ expect(session[:user_id]).not_to be_nil
112
+
113
+ # Check an additional request to make sure not logged out on next request
114
+ get :test_should_be_logged_in
115
+ expect(response).to be_successful
116
+ expect(session[:user_id]).not_to be_nil
117
+ end
118
+ end
119
+
120
+ it 'works if the session is stored as a string or a Time' do
41
121
  session[:login_time] = Time.now.to_s
42
122
  # TODO: ???
43
- expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').and_return(user)
123
+ expect(User).to receive(:authenticate).with('bla@bla.com', 'secret') { |&block| block.call(user, nil) }
44
124
 
45
- get :test_login, :email => 'bla@bla.com', :password => 'secret'
125
+ get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
46
126
 
47
127
  expect(session[:user_id]).not_to be_nil
48
- expect(response).to be_a_success
128
+ expect(response).to be_successful
49
129
  end
50
130
 
51
131
  context "with 'session_timeout_from_last_action'" do
52
- it "does not logout if there was activity" do
132
+ it 'does not logout if there was activity' do
53
133
  sorcery_controller_property_set(:session_timeout_from_last_action, true)
54
- expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').and_return(user)
134
+ expect(User).to receive(:authenticate).with('bla@bla.com', 'secret') { |&block| block.call(user, nil) }
55
135
 
56
- get :test_login, :email => 'bla@bla.com', :password => 'secret'
57
- Timecop.travel(Time.now.in_time_zone+0.3)
136
+ get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
137
+ Timecop.travel(Time.now.in_time_zone + 0.3)
58
138
  get :test_should_be_logged_in
59
139
 
60
140
  expect(session[:user_id]).not_to be_nil
61
141
 
62
- Timecop.travel(Time.now.in_time_zone+0.3)
142
+ Timecop.travel(Time.now.in_time_zone + 0.3)
63
143
  get :test_should_be_logged_in
64
144
 
65
145
  expect(session[:user_id]).not_to be_nil
66
- expect(response).to be_a_success
146
+ expect(response).to be_successful
67
147
  end
68
148
 
69
149
  it "with 'session_timeout_from_last_action' logs out if there was no activity" do
70
150
  sorcery_controller_property_set(:session_timeout_from_last_action, true)
71
- get :test_login, :email => 'bla@bla.com', :password => 'secret'
72
- Timecop.travel(Time.now.in_time_zone+0.6)
151
+ get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
152
+ Timecop.travel(Time.now.in_time_zone + 0.6)
73
153
  get :test_should_be_logged_in
74
154
 
75
155
  expect(session[:user_id]).to be_nil
76
156
  expect(response).to be_a_redirect
77
157
  end
78
158
  end
159
+
160
+ it 'registers login time on remember_me callback' do
161
+ expect(subject).to receive(:register_login_time).with(user)
162
+
163
+ subject.send(:after_remember_me!, user)
164
+ end
79
165
  end
80
166
  end
@@ -1,7 +1,7 @@
1
1
  require 'spec_helper'
2
2
 
3
- describe SorceryController do
4
- describe "plugin configuration" do
3
+ describe SorceryController, type: :controller do
4
+ describe 'plugin configuration' do
5
5
  before(:all) do
6
6
  sorcery_reload!
7
7
  end
@@ -12,9 +12,9 @@ describe SorceryController do
12
12
  end
13
13
 
14
14
  it "enables configuration option 'user_class'" do
15
- sorcery_controller_property_set(:user_class, "TestUser")
15
+ sorcery_controller_property_set(:user_class, 'TestUser')
16
16
 
17
- expect(Sorcery::Controller::Config.user_class).to eq "TestUser"
17
+ expect(Sorcery::Controller::Config.user_class).to eq 'TestUser'
18
18
  end
19
19
 
20
20
  it "enables configuration option 'not_authenticated_action'" do
@@ -22,11 +22,10 @@ describe SorceryController do
22
22
 
23
23
  expect(Sorcery::Controller::Config.not_authenticated_action).to eq :my_action
24
24
  end
25
-
26
25
  end
27
26
 
28
27
  # ----------------- PLUGIN ACTIVATED -----------------------
29
- context "when activated with sorcery" do
28
+ context 'when activated with sorcery' do
30
29
  let(:user) { double('user', id: 42) }
31
30
 
32
31
  before(:all) do
@@ -48,160 +47,138 @@ describe SorceryController do
48
47
 
49
48
  specify { should respond_to(:current_user) }
50
49
 
51
- it "login(username,password) returns the user when success and set the session with user.id" do
52
- expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').and_return(user)
53
-
54
- get :test_login, :email => 'bla@bla.com', :password => 'secret'
55
-
56
- expect(assigns[:user]).to eq user
57
- expect(session[:user_id]).to eq "42"
58
- end
59
-
60
- it "login(email,password) returns the user when success and set the session with user.id" do
61
- expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').and_return(user)
62
-
63
- get :test_login, :email => 'bla@bla.com', :password => 'secret'
64
-
65
- expect(assigns[:user]).to eq user
66
- expect(session[:user_id]).to eq user.id.to_s
67
- end
68
-
69
- it "login(username,password) returns nil and not set the session when failure" do
70
- expect(User).to receive(:authenticate).with('bla@bla.com', 'opensesame!').and_return(nil)
71
-
72
- get :test_login, :email => 'bla@bla.com', :password => 'opensesame!'
73
-
74
- expect(assigns[:user]).to be_nil
75
- expect(session[:user_id]).to be_nil
76
- end
50
+ specify { should respond_to(:require_login) }
77
51
 
78
- it "login(email,password) returns the user when success and set the session with the _csrf_token" do
79
- expect(User).to receive(:authenticate).with('bla@bla.com', 'secret').and_return(user)
80
- get :test_login, :email => 'bla@bla.com', :password => 'secret'
52
+ describe '#login' do
53
+ context 'when succeeds' do
54
+ before do
55
+ expect(User).to receive(:authenticate).with('bla@bla.com', 'secret') { |&block| block.call(user, nil) }
56
+ get :test_login, params: { email: 'bla@bla.com', password: 'secret' }
57
+ end
81
58
 
82
- expect(session[:_csrf_token]).not_to be_nil
83
- end
59
+ it 'assigns user to @user variable' do
60
+ expect(assigns[:user]).to eq user
61
+ end
84
62
 
85
- it "login(username,password) returns nil and not set the session when upper case username" do
86
- skip('DM Adapter dependant') if SORCERY_ORM == :data_mapper
87
- get :test_login, :email => 'BLA@BLA.COM', :password => 'secret'
63
+ it 'writes user id in session' do
64
+ expect(session[:user_id]).to eq user.id.to_s
65
+ end
88
66
 
89
- expect(assigns[:user]).to be_nil
90
- expect(session[:user_id]).to be_nil
91
- end
92
-
93
- # TODO: move test to model
94
- it "login(username,password) returns the user and set the session with user.id when upper case username and config is downcase before authenticating" do
95
- sorcery_model_property_set(:downcase_username_before_authenticating, true)
96
- expect(User).to receive(:authenticate).with('BLA@BLA.COM', 'secret').and_return(user)
97
- get :test_login, :email => 'BLA@BLA.COM', :password => 'secret'
67
+ it 'sets csrf token in session' do
68
+ expect(session[:_csrf_token]).not_to be_nil
69
+ end
70
+ end
98
71
 
99
- expect(assigns[:user]).to eq user
100
- expect(session[:user_id]).to eq user.id.to_s
101
- end
72
+ context 'when fails' do
73
+ before do
74
+ expect(User).to receive(:authenticate).with('bla@bla.com', 'opensesame!').and_return(nil)
75
+ get :test_login, params: { email: 'bla@bla.com', password: 'opensesame!' }
76
+ end
102
77
 
103
- # TODO: move test to model
104
- it "login(username,password) returns nil and not set the session when user was created with upper case username, config is default, and log in username is lower case" do
105
- skip('DM Adapter dependant') if SORCERY_ORM == :data_mapper
106
- expect(User).to receive(:authenticate).with('bla1@bla.com', 'secret1').and_return(nil)
107
- get :test_login, :email => 'bla1@bla.com', :password => 'secret1'
78
+ it 'sets @user variable to nil' do
79
+ expect(assigns[:user]).to be_nil
80
+ end
108
81
 
109
- expect(assigns[:user]).to be_nil
110
- expect(session[:user_id]).to be_nil
111
- end
112
-
113
- # TODO: move test to model
114
- it "login(username,password) returns the user and set the session with user.id when user was created with upper case username and config is downcase before authenticating" do
115
- skip('DM Adapter dependant') if SORCERY_ORM == :data_mapper
116
- sorcery_model_property_set(:downcase_username_before_authenticating, true)
117
- expect(User).to receive(:authenticate).with('bla1@bla.com', 'secret1').and_return(user)
118
- get :test_login, :email => 'bla1@bla.com', :password => 'secret1'
119
-
120
- expect(assigns[:user]).to eq user
121
- expect(session[:user_id]).to eq user.id.to_s
82
+ it 'sets user_id in session to nil' do
83
+ expect(session[:user_id]).to be_nil
84
+ end
85
+ end
122
86
  end
123
87
 
124
- it "logout clears the session" do
125
- cookies[:remember_me_token] = nil
126
- session[:user_id] = user.id.to_s
127
- expect(User.sorcery_adapter).to receive(:find_by_id).with("42") { user }
128
- get :test_logout
88
+ describe '#logout' do
89
+ it 'clears the session' do
90
+ cookies[:remember_me_token] = nil
91
+ session[:user_id] = user.id.to_s
92
+ expect(User.sorcery_adapter).to receive(:find_by_id).with('42') { user }
93
+ get :test_logout
129
94
 
130
- expect(session[:user_id]).to be_nil
95
+ expect(session[:user_id]).to be_nil
96
+ end
131
97
  end
132
98
 
133
- it "logged_in? returns true if logged in" do
134
- session[:user_id] = user.id.to_s
135
- expect(User.sorcery_adapter).to receive(:find_by_id).with("42") { user }
99
+ describe '#logged_in?' do
100
+ it 'returns true when user is logged in' do
101
+ session[:user_id] = user.id.to_s
102
+ expect(User.sorcery_adapter).to receive(:find_by_id).with('42') { user }
136
103
 
137
- expect(subject.logged_in?).to be true
138
- end
104
+ expect(subject.logged_in?).to be true
105
+ end
139
106
 
140
- it "logged_in? returns false if not logged in" do
141
- session[:user_id] = nil
107
+ it 'returns false when user is not logged in' do
108
+ session[:user_id] = nil
142
109
 
143
- expect(subject.logged_in?).to be false
110
+ expect(subject.logged_in?).to be false
111
+ end
144
112
  end
145
113
 
146
- it "current_user returns the user instance if logged in" do
147
- session[:user_id] = user.id.to_s
148
- expect(User.sorcery_adapter).to receive(:find_by_id).with("42") { user }
114
+ describe '#current_user' do
115
+ it 'current_user returns the user instance if logged in' do
116
+ session[:user_id] = user.id.to_s
117
+ expect(User.sorcery_adapter).to receive(:find_by_id).once.with('42') { user }
149
118
 
150
- 2.times { expect(subject.current_user).to eq user } # memoized!
151
- end
119
+ 2.times { expect(subject.current_user).to eq user } # memoized!
120
+ end
152
121
 
153
- it "current_user returns false if not logged in" do
154
- session[:user_id] = nil
155
- expect(User.sorcery_adapter).to_not receive(:find_by_id)
122
+ it 'current_user returns false if not logged in' do
123
+ session[:user_id] = nil
124
+ expect(User.sorcery_adapter).to_not receive(:find_by_id)
156
125
 
157
- 2.times { expect(subject.current_user).to be_nil } # memoized!
126
+ 2.times { expect(subject.current_user).to be_nil } # memoized!
127
+ end
158
128
  end
159
129
 
160
- specify { should respond_to(:require_login) }
161
-
162
- it "calls the configured 'not_authenticated_action' when authenticate before_filter fails" do
130
+ it "calls the configured 'not_authenticated_action' when authenticate before_action fails" do
163
131
  session[:user_id] = nil
164
132
  sorcery_controller_property_set(:not_authenticated_action, :test_not_authenticated_action)
165
133
  get :test_logout
166
134
 
167
- expect(response.body).to eq "test_not_authenticated_action"
135
+ expect(response).to be_successful
168
136
  end
169
137
 
170
- it "require_login before_filter saves the url that the user originally wanted" do
138
+ it 'require_login before_action saves the url that the user originally wanted' do
171
139
  get :some_action
172
140
 
173
- expect(session[:return_to_url]).to eq "http://test.host/some_action"
174
- expect(response).to redirect_to("http://test.host/")
141
+ expect(session[:return_to_url]).to eq 'http://test.host/some_action'
142
+ expect(response).to redirect_to('http://test.host/')
175
143
  end
176
144
 
177
- it "require_login before_filter does not save the url that the user originally wanted upon all non-get http methods" do
178
- [:post, :put, :delete].each do |m|
179
- self.send(m, :some_action)
145
+ it 'require_login before_action does not save the url that the user originally wanted upon all non-get http methods' do
146
+ %i[post put delete].each do |m|
147
+ send(m, :some_action)
180
148
 
181
149
  expect(session[:return_to_url]).to be_nil
182
150
  end
183
151
  end
184
152
 
185
- it "on successful login the user is redirected to the url he originally wanted" do
186
- session[:return_to_url] = "http://test.host/some_action"
187
- post :test_return_to, :email => 'bla@bla.com', :password => 'secret'
153
+ it 'require_login before_action does not save the url for JSON requests' do
154
+ get :some_action, format: :json
155
+ expect(session[:return_to_url]).to be_nil
156
+ end
188
157
 
189
- expect(response).to redirect_to("http://test.host/some_action")
190
- expect(flash[:notice]).to eq "haha!"
158
+ it 'require_login before_action does not save the url for XHR requests' do
159
+ get :some_action, xhr: true
160
+ expect(session[:return_to_url]).to be_nil
191
161
  end
192
162
 
163
+ it 'on successful login the user is redirected to the url he originally wanted' do
164
+ session[:return_to_url] = 'http://test.host/some_action'
165
+ post :test_return_to, params: { email: 'bla@bla.com', password: 'secret' }
166
+
167
+ expect(response).to redirect_to('http://test.host/some_action')
168
+ expect(flash[:notice]).to eq 'haha!'
169
+ end
193
170
 
194
171
  # --- auto_login(user) ---
195
172
  specify { should respond_to(:auto_login) }
196
173
 
197
- it "auto_login(user) los in a user instance" do
174
+ it 'auto_login(user) logs in a user instance' do
198
175
  session[:user_id] = nil
199
176
  subject.auto_login(user)
200
177
 
201
178
  expect(subject.logged_in?).to be true
202
179
  end
203
180
 
204
- it "auto_login(user) works even if current_user was already set to false" do
181
+ it 'auto_login(user) works even if current_user was already set to false' do
205
182
  get :test_logout
206
183
 
207
184
  expect(session[:user_id]).to be_nil
@@ -214,5 +191,4 @@ describe SorceryController do
214
191
  expect(assigns[:result]).to eq user
215
192
  end
216
193
  end
217
-
218
194
  end
@@ -9,13 +9,13 @@ class TestUser < ActiveRecord::Base
9
9
  end
10
10
 
11
11
  def setup_orm
12
- ActiveRecord::Migrator.migrate(migrations_path)
12
+ MigrationHelper.migrate(migrations_path)
13
13
  end
14
14
 
15
15
  def teardown_orm
16
- ActiveRecord::Migrator.rollback(migrations_path)
16
+ MigrationHelper.rollback(migrations_path)
17
17
  end
18
18
 
19
19
  def migrations_path
20
- Rails.root.join("db", "migrate", "core")
20
+ Rails.root.join('db', 'migrate', 'core')
21
21
  end
@@ -0,0 +1,17 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'spec_helper'
4
+ require 'sorcery/providers/base'
5
+
6
+ describe Sorcery::Providers::ExampleProvider do
7
+ before(:all) do
8
+ sorcery_reload!([:external])
9
+ sorcery_controller_property_set(:external_providers, [:example_provider])
10
+ end
11
+
12
+ context 'fetching a multi-word custom provider' do
13
+ it 'returns the provider' do
14
+ expect(Sorcery::Controller::Config.example_provider).to be_a(Sorcery::Providers::ExampleProvider)
15
+ end
16
+ end
17
+ end
@@ -0,0 +1,17 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'spec_helper'
4
+ require 'sorcery/providers/base'
5
+
6
+ describe Sorcery::Providers::Example do
7
+ before(:all) do
8
+ sorcery_reload!([:external])
9
+ sorcery_controller_property_set(:external_providers, [:example])
10
+ end
11
+
12
+ context 'fetching a single-word custom provider' do
13
+ it 'returns the provider' do
14
+ expect(Sorcery::Controller::Config.example).to be_a(Sorcery::Providers::Example)
15
+ end
16
+ end
17
+ end
@@ -0,0 +1,17 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'spec_helper'
4
+ require 'sorcery/providers/base'
5
+
6
+ describe Sorcery::Providers::Examples do
7
+ before(:all) do
8
+ sorcery_reload!([:external])
9
+ sorcery_controller_property_set(:external_providers, [:examples])
10
+ end
11
+
12
+ context 'fetching a plural custom provider' do
13
+ it 'returns the provider' do
14
+ expect(Sorcery::Controller::Config.examples).to be_a(Sorcery::Providers::Examples)
15
+ end
16
+ end
17
+ end
@@ -0,0 +1,42 @@
1
+ require 'spec_helper'
2
+ require 'sorcery/providers/base'
3
+ require 'sorcery/providers/vk'
4
+ require 'webmock/rspec'
5
+
6
+ describe Sorcery::Providers::Vk do
7
+ include WebMock::API
8
+
9
+ let(:provider) { Sorcery::Controller::Config.vk }
10
+
11
+ before(:all) do
12
+ sorcery_reload!([:external])
13
+ sorcery_controller_property_set(:external_providers, [:vk])
14
+ sorcery_controller_external_property_set(:vk, :key, 'KEY')
15
+ sorcery_controller_external_property_set(:vk, :secret, 'SECRET')
16
+ end
17
+
18
+ def stub_vk_authorize
19
+ stub_request(:post, %r{https\:\/\/oauth\.vk\.com\/access_token}).to_return(
20
+ status: 200,
21
+ body: '{"access_token":"TOKEN","expires_in":86329,"user_id":1}',
22
+ headers: { 'content-type' => 'application/json' }
23
+ )
24
+ end
25
+
26
+ context 'getting user info hash' do
27
+ it 'should provide VK API version' do
28
+ stub_vk_authorize
29
+ sorcery_controller_external_property_set(:vk, :api_version, '5.71')
30
+
31
+ get_user = stub_request(
32
+ :get,
33
+ 'https://api.vk.com/method/getProfiles?access_token=TOKEN&fields=&scope=email&uids=1&v=5.71'
34
+ ).to_return(body: '{"response":[{"id":1}]}')
35
+
36
+ token = provider.process_callback({ code: 'CODE' }, nil)
37
+ provider.get_user_hash(token)
38
+
39
+ expect(get_user).to have_been_requested
40
+ end
41
+ end
42
+ end
@@ -1,3 +1,3 @@
1
1
  class Authentication < ActiveRecord::Base
2
2
  belongs_to :user
3
- end
3
+ end
@@ -1,5 +1,5 @@
1
1
  class User < ActiveRecord::Base
2
- has_many :authentications, :dependent => :destroy
3
- has_many :user_providers, :dependent => :destroy
2
+ has_many :authentications, dependent: :destroy
3
+ has_many :user_providers, dependent: :destroy
4
4
  accepts_nested_attributes_for :authentications
5
5
  end
@@ -0,0 +1,2 @@
1
+ class ApplicationController < ActionController::Base
2
+ end