wulffeld_authlogic 2.1.3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (129) hide show
  1. data/CHANGELOG.rdoc +345 -0
  2. data/LICENSE +20 -0
  3. data/README.rdoc +246 -0
  4. data/Rakefile +41 -0
  5. data/VERSION.yml +5 -0
  6. data/generators/session/session_generator.rb +9 -0
  7. data/generators/session/templates/session.rb +2 -0
  8. data/init.rb +1 -0
  9. data/lib/authlogic.rb +64 -0
  10. data/lib/authlogic/acts_as_authentic/base.rb +107 -0
  11. data/lib/authlogic/acts_as_authentic/email.rb +110 -0
  12. data/lib/authlogic/acts_as_authentic/logged_in_status.rb +60 -0
  13. data/lib/authlogic/acts_as_authentic/login.rb +141 -0
  14. data/lib/authlogic/acts_as_authentic/magic_columns.rb +24 -0
  15. data/lib/authlogic/acts_as_authentic/password.rb +355 -0
  16. data/lib/authlogic/acts_as_authentic/perishable_token.rb +105 -0
  17. data/lib/authlogic/acts_as_authentic/persistence_token.rb +68 -0
  18. data/lib/authlogic/acts_as_authentic/restful_authentication.rb +61 -0
  19. data/lib/authlogic/acts_as_authentic/session_maintenance.rb +139 -0
  20. data/lib/authlogic/acts_as_authentic/single_access_token.rb +65 -0
  21. data/lib/authlogic/acts_as_authentic/validations_scope.rb +32 -0
  22. data/lib/authlogic/authenticates_many/association.rb +42 -0
  23. data/lib/authlogic/authenticates_many/base.rb +55 -0
  24. data/lib/authlogic/controller_adapters/abstract_adapter.rb +67 -0
  25. data/lib/authlogic/controller_adapters/merb_adapter.rb +30 -0
  26. data/lib/authlogic/controller_adapters/rails_adapter.rb +52 -0
  27. data/lib/authlogic/controller_adapters/sinatra_adapter.rb +61 -0
  28. data/lib/authlogic/crypto_providers/aes256.rb +43 -0
  29. data/lib/authlogic/crypto_providers/bcrypt.rb +90 -0
  30. data/lib/authlogic/crypto_providers/md5.rb +34 -0
  31. data/lib/authlogic/crypto_providers/sha1.rb +35 -0
  32. data/lib/authlogic/crypto_providers/sha256.rb +50 -0
  33. data/lib/authlogic/crypto_providers/sha512.rb +50 -0
  34. data/lib/authlogic/crypto_providers/wordpress.rb +43 -0
  35. data/lib/authlogic/i18n.rb +83 -0
  36. data/lib/authlogic/i18n/translator.rb +15 -0
  37. data/lib/authlogic/random.rb +33 -0
  38. data/lib/authlogic/regex.rb +25 -0
  39. data/lib/authlogic/session/activation.rb +58 -0
  40. data/lib/authlogic/session/active_record_trickery.rb +64 -0
  41. data/lib/authlogic/session/base.rb +39 -0
  42. data/lib/authlogic/session/brute_force_protection.rb +96 -0
  43. data/lib/authlogic/session/callbacks.rb +99 -0
  44. data/lib/authlogic/session/cookies.rb +130 -0
  45. data/lib/authlogic/session/existence.rb +93 -0
  46. data/lib/authlogic/session/foundation.rb +65 -0
  47. data/lib/authlogic/session/http_auth.rb +58 -0
  48. data/lib/authlogic/session/id.rb +41 -0
  49. data/lib/authlogic/session/klass.rb +78 -0
  50. data/lib/authlogic/session/magic_columns.rb +95 -0
  51. data/lib/authlogic/session/magic_states.rb +59 -0
  52. data/lib/authlogic/session/params.rb +101 -0
  53. data/lib/authlogic/session/password.rb +240 -0
  54. data/lib/authlogic/session/perishable_token.rb +18 -0
  55. data/lib/authlogic/session/persistence.rb +70 -0
  56. data/lib/authlogic/session/priority_record.rb +34 -0
  57. data/lib/authlogic/session/scopes.rb +101 -0
  58. data/lib/authlogic/session/session.rb +62 -0
  59. data/lib/authlogic/session/timeout.rb +82 -0
  60. data/lib/authlogic/session/unauthorized_record.rb +50 -0
  61. data/lib/authlogic/session/validation.rb +82 -0
  62. data/lib/authlogic/test_case.rb +120 -0
  63. data/lib/authlogic/test_case/mock_controller.rb +45 -0
  64. data/lib/authlogic/test_case/mock_cookie_jar.rb +14 -0
  65. data/lib/authlogic/test_case/mock_logger.rb +10 -0
  66. data/lib/authlogic/test_case/mock_request.rb +19 -0
  67. data/lib/authlogic/test_case/rails_request_adapter.rb +30 -0
  68. data/lib/generators/authlogic/session/USAGE +5 -0
  69. data/lib/generators/authlogic/session/session_generator.rb +14 -0
  70. data/lib/generators/authlogic/session/templates/session.rb +2 -0
  71. data/rails/init.rb +1 -0
  72. data/shoulda_macros/authlogic.rb +69 -0
  73. data/test/acts_as_authentic_test/base_test.rb +18 -0
  74. data/test/acts_as_authentic_test/email_test.rb +97 -0
  75. data/test/acts_as_authentic_test/logged_in_status_test.rb +36 -0
  76. data/test/acts_as_authentic_test/login_test.rb +109 -0
  77. data/test/acts_as_authentic_test/magic_columns_test.rb +27 -0
  78. data/test/acts_as_authentic_test/password_test.rb +236 -0
  79. data/test/acts_as_authentic_test/perishable_token_test.rb +90 -0
  80. data/test/acts_as_authentic_test/persistence_token_test.rb +55 -0
  81. data/test/acts_as_authentic_test/restful_authentication_test.rb +40 -0
  82. data/test/acts_as_authentic_test/session_maintenance_test.rb +84 -0
  83. data/test/acts_as_authentic_test/single_access_test.rb +44 -0
  84. data/test/authenticates_many_test.rb +16 -0
  85. data/test/crypto_provider_test/aes256_test.rb +14 -0
  86. data/test/crypto_provider_test/bcrypt_test.rb +14 -0
  87. data/test/crypto_provider_test/sha1_test.rb +23 -0
  88. data/test/crypto_provider_test/sha256_test.rb +14 -0
  89. data/test/crypto_provider_test/sha512_test.rb +14 -0
  90. data/test/fixtures/companies.yml +5 -0
  91. data/test/fixtures/employees.yml +17 -0
  92. data/test/fixtures/projects.yml +3 -0
  93. data/test/fixtures/users.yml +24 -0
  94. data/test/i18n_test.rb +33 -0
  95. data/test/libs/affiliate.rb +7 -0
  96. data/test/libs/company.rb +6 -0
  97. data/test/libs/employee.rb +7 -0
  98. data/test/libs/employee_session.rb +2 -0
  99. data/test/libs/ldaper.rb +3 -0
  100. data/test/libs/ordered_hash.rb +9 -0
  101. data/test/libs/project.rb +3 -0
  102. data/test/libs/user.rb +5 -0
  103. data/test/libs/user_session.rb +6 -0
  104. data/test/random_test.rb +49 -0
  105. data/test/session_test/activation_test.rb +43 -0
  106. data/test/session_test/active_record_trickery_test.rb +36 -0
  107. data/test/session_test/brute_force_protection_test.rb +101 -0
  108. data/test/session_test/callbacks_test.rb +6 -0
  109. data/test/session_test/cookies_test.rb +112 -0
  110. data/test/session_test/credentials_test.rb +0 -0
  111. data/test/session_test/existence_test.rb +64 -0
  112. data/test/session_test/http_auth_test.rb +28 -0
  113. data/test/session_test/id_test.rb +17 -0
  114. data/test/session_test/klass_test.rb +40 -0
  115. data/test/session_test/lint_test.rb +9 -0
  116. data/test/session_test/magic_columns_test.rb +62 -0
  117. data/test/session_test/magic_states_test.rb +60 -0
  118. data/test/session_test/params_test.rb +53 -0
  119. data/test/session_test/password_test.rb +106 -0
  120. data/test/session_test/perishability_test.rb +15 -0
  121. data/test/session_test/persistence_test.rb +21 -0
  122. data/test/session_test/scopes_test.rb +60 -0
  123. data/test/session_test/session_test.rb +59 -0
  124. data/test/session_test/timeout_test.rb +52 -0
  125. data/test/session_test/unauthorized_record_test.rb +13 -0
  126. data/test/session_test/validation_test.rb +23 -0
  127. data/test/test_helper.rb +183 -0
  128. data/wulffeld_authlogic.gemspec +220 -0
  129. metadata +258 -0
@@ -0,0 +1,68 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # Maintains the persistence token, the token responsible for persisting sessions. This token
4
+ # gets stores in the session and the cookie.
5
+ module PersistenceToken
6
+ def self.included(klass)
7
+ klass.class_eval do
8
+ add_acts_as_authentic_module(Methods)
9
+ end
10
+ end
11
+
12
+ # Methods for the persistence token.
13
+ module Methods
14
+ def self.included(klass)
15
+ klass.class_eval do
16
+ extend ClassMethods
17
+ include InstanceMethods
18
+
19
+ if respond_to?(:after_password_set) && respond_to?(:after_password_verification)
20
+ after_password_set :reset_persistence_token
21
+ after_password_verification :reset_persistence_token!, :if => :reset_persistence_token?
22
+ end
23
+
24
+ validates_presence_of :persistence_token
25
+ validates_uniqueness_of :persistence_token, :if => :persistence_token_changed?
26
+
27
+ before_validation :reset_persistence_token, :if => :reset_persistence_token?
28
+ end
29
+ end
30
+
31
+ # Class level methods for the persistence token.
32
+ module ClassMethods
33
+ # Resets ALL persistence tokens in the database, which will require all users to reauthenticate.
34
+ def forget_all
35
+ # Paginate these to save on memory
36
+ records = nil
37
+ i = 0
38
+ begin
39
+ records = find(:all, :limit => 50, :offset => i)
40
+ records.each { |record| record.forget! }
41
+ i += 50
42
+ end while !records.blank?
43
+ end
44
+ end
45
+
46
+ # Instance level methods for the persistence token.
47
+ module InstanceMethods
48
+ # Resets the persistence_token field to a random hex value.
49
+ def reset_persistence_token
50
+ self.persistence_token = Authlogic::Random.hex_token
51
+ end
52
+
53
+ # Same as reset_persistence_token, but then saves the record.
54
+ def reset_persistence_token!
55
+ reset_persistence_token
56
+ save_without_session_maintenance(:validate => false)
57
+ end
58
+ alias_method :forget!, :reset_persistence_token!
59
+
60
+ private
61
+ def reset_persistence_token?
62
+ persistence_token.blank?
63
+ end
64
+ end
65
+ end
66
+ end
67
+ end
68
+ end
@@ -0,0 +1,61 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # This module is responsible for transitioning existing applications from the restful_authentication plugin.
4
+ module RestfulAuthentication
5
+ def self.included(klass)
6
+ klass.class_eval do
7
+ extend Config
8
+ include InstanceMethods
9
+ end
10
+ end
11
+
12
+ module Config
13
+ # Switching an existing app to Authlogic from restful_authentication? No problem, just set this true and your users won't know
14
+ # anything changed. From your database perspective nothing will change at all. Authlogic will continue to encrypt passwords
15
+ # just like restful_authentication, so your app won't skip a beat. Although, might consider transitioning your users to a newer
16
+ # and stronger algorithm. Checkout the transition_from_restful_authentication option.
17
+ #
18
+ # * <tt>Default:</tt> false
19
+ # * <tt>Accepts:</tt> Boolean
20
+ def act_like_restful_authentication(value = nil)
21
+ r = rw_config(:act_like_restful_authentication, value, false)
22
+ set_restful_authentication_config if value
23
+ r
24
+ end
25
+ alias_method :act_like_restful_authentication=, :act_like_restful_authentication
26
+
27
+ # This works just like act_like_restful_authentication except that it will start transitioning your users to the algorithm you
28
+ # specify with the crypto provider option. The next time they log in it will resave their password with the new algorithm
29
+ # and any new record will use the new algorithm as well. Make sure to update your users table if you are using the default
30
+ # migration since it will set crypted_password and salt columns to a maximum width of 40 characters which is not enough.
31
+ def transition_from_restful_authentication(value = nil)
32
+ r = rw_config(:transition_from_restful_authentication, value, false)
33
+ set_restful_authentication_config if value
34
+ r
35
+ end
36
+ alias_method :transition_from_restful_authentication=, :transition_from_restful_authentication
37
+
38
+ private
39
+ def set_restful_authentication_config
40
+ crypto_provider_key = act_like_restful_authentication ? :crypto_provider : :transition_from_crypto_providers
41
+ self.send("#{crypto_provider_key}=", CryptoProviders::Sha1)
42
+ if !defined?(::REST_AUTH_SITE_KEY) || ::REST_AUTH_SITE_KEY.nil?
43
+ class_eval("::REST_AUTH_SITE_KEY = ''") if !defined?(::REST_AUTH_SITE_KEY)
44
+ CryptoProviders::Sha1.stretches = 1
45
+ end
46
+ end
47
+ end
48
+
49
+ module InstanceMethods
50
+ private
51
+ def act_like_restful_authentication?
52
+ self.class.act_like_restful_authentication == true
53
+ end
54
+
55
+ def transition_from_restful_authentication?
56
+ self.class.transition_from_restful_authentication == true
57
+ end
58
+ end
59
+ end
60
+ end
61
+ end
@@ -0,0 +1,139 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # This is one of my favorite features that I think is pretty cool. It's things like this that make a library great
4
+ # and let you know you are on the right track.
5
+ #
6
+ # Just to clear up any confusion, Authlogic stores both the record id and the persistence token in the session.
7
+ # Why? So stale sessions can not be persisted. It stores the id so it can quickly find the record, and the
8
+ # persistence token to ensure no sessions are stale. So if the persistence token changes, the user must log
9
+ # back in.
10
+ #
11
+ # Well, the persistence token changes with the password. What happens if the user changes his own password?
12
+ # He shouldn't have to log back in, he's the one that made the change.
13
+ #
14
+ # That being said, wouldn't it be nice if their session and cookie information was automatically updated?
15
+ # Instead of cluttering up your controller with redundant session code. The same thing goes for new
16
+ # registrations.
17
+ #
18
+ # That's what this module is all about. This will automatically maintain the cookie and session values as
19
+ # records are saved.
20
+ module SessionMaintenance
21
+ def self.included(klass)
22
+ klass.class_eval do
23
+ extend Config
24
+ add_acts_as_authentic_module(Methods)
25
+ end
26
+ end
27
+
28
+ module Config
29
+ # This is more of a convenience method. In order to turn off automatic maintenance of sessions just
30
+ # set this to false, or you can also set the session_ids method to a blank array. Both accomplish
31
+ # the same thing. This method is a little clearer in it's intentions though.
32
+ #
33
+ # * <tt>Default:</tt> true
34
+ # * <tt>Accepts:</tt> Boolean
35
+ def maintain_sessions(value = nil)
36
+ rw_config(:maintain_sessions, value, true)
37
+ end
38
+ alias_method :maintain_sessions=, :maintain_sessions
39
+
40
+ # As you may know, authlogic sessions can be separate by id (See Authlogic::Session::Base#id). You can
41
+ # specify here what session ids you want auto maintained. By default it is the main session, which has
42
+ # an id of nil.
43
+ #
44
+ # * <tt>Default:</tt> [nil]
45
+ # * <tt>Accepts:</tt> Array
46
+ def session_ids(value = nil)
47
+ rw_config(:session_ids, value, [nil])
48
+ end
49
+ alias_method :session_ids=, :session_ids
50
+
51
+ # The name of the associated session class. This is inferred by the name of the model.
52
+ #
53
+ # * <tt>Default:</tt> "#{klass.name}Session".constantize
54
+ # * <tt>Accepts:</tt> Class
55
+ def session_class(value = nil)
56
+ const = "#{base_class.name}Session".constantize rescue nil
57
+ rw_config(:session_class, value, const)
58
+ end
59
+ alias_method :session_class=, :session_class
60
+ end
61
+
62
+ module Methods
63
+ def self.included(klass)
64
+ klass.class_eval do
65
+ before_save :get_session_information, :if => :update_sessions?
66
+ before_save :maintain_sessions, :if => :update_sessions?
67
+ end
68
+ end
69
+
70
+ # Save the record and skip session maintenance all together.
71
+ def save_without_session_maintenance(*args)
72
+ self.skip_session_maintenance = true
73
+ result = save(*args)
74
+ self.skip_session_maintenance = false
75
+ result
76
+ end
77
+
78
+ private
79
+ def skip_session_maintenance=(value)
80
+ @skip_session_maintenance = value
81
+ end
82
+
83
+ def skip_session_maintenance
84
+ @skip_session_maintenance ||= false
85
+ end
86
+
87
+ def update_sessions?
88
+ !skip_session_maintenance && session_class && session_class.activated? && self.class.maintain_sessions == true && !session_ids.blank? && persistence_token_changed?
89
+ end
90
+
91
+ def get_session_information
92
+ # Need to determine if we are completely logged out, or logged in as another user
93
+ @_sessions = []
94
+
95
+ session_ids.each do |session_id|
96
+ session = session_class.find(session_id, self)
97
+ @_sessions << session if session && session.record
98
+ end
99
+ end
100
+
101
+ def maintain_sessions
102
+ if @_sessions.empty?
103
+ create_session
104
+ else
105
+ update_sessions
106
+ end
107
+ end
108
+
109
+ def create_session
110
+ # We only want to automatically login into the first session, since this is the main session. The other sessions are sessions
111
+ # that need to be created after logging into the main session.
112
+ session_id = session_ids.first
113
+ session_class.create(*[self, self, session_id].compact)
114
+
115
+ return true
116
+ end
117
+
118
+ def update_sessions
119
+ # We found sessions above, let's update them with the new info
120
+ @_sessions.each do |stale_session|
121
+ next if stale_session.record != self
122
+ stale_session.unauthorized_record = self
123
+ stale_session.save
124
+ end
125
+
126
+ return true
127
+ end
128
+
129
+ def session_ids
130
+ self.class.session_ids
131
+ end
132
+
133
+ def session_class
134
+ self.class.session_class
135
+ end
136
+ end
137
+ end
138
+ end
139
+ end
@@ -0,0 +1,65 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # This module is responsible for maintaining the single_access token. For more information the single access token and how to use it,
4
+ # see the Authlogic::Session::Params module.
5
+ module SingleAccessToken
6
+ def self.included(klass)
7
+ klass.class_eval do
8
+ extend Config
9
+ add_acts_as_authentic_module(Methods)
10
+ end
11
+ end
12
+
13
+ # All configuration for the single_access token aspect of acts_as_authentic.
14
+ module Config
15
+ # The single access token is used for authentication via URLs, such as a private feed. That being said,
16
+ # if the user changes their password, that token probably shouldn't change. If it did, the user would have
17
+ # to update all of their URLs. So be default this is option is disabled, if you need it, feel free to turn
18
+ # it on.
19
+ #
20
+ # * <tt>Default:</tt> false
21
+ # * <tt>Accepts:</tt> Boolean
22
+ def change_single_access_token_with_password(value = nil)
23
+ rw_config(:change_single_access_token_with_password, value, false)
24
+ end
25
+ alias_method :change_single_access_token_with_password=, :change_single_access_token_with_password
26
+ end
27
+
28
+ # All method, for the single_access token aspect of acts_as_authentic.
29
+ module Methods
30
+ def self.included(klass)
31
+ return if !klass.column_names.include?("single_access_token")
32
+
33
+ klass.class_eval do
34
+ include InstanceMethods
35
+ validates_uniqueness_of :single_access_token, :if => :single_access_token_changed?
36
+ before_validation :reset_single_access_token, :if => :reset_single_access_token?
37
+ after_password_set(:reset_single_access_token, :if => :change_single_access_token_with_password?) if respond_to?(:after_password_set)
38
+ end
39
+ end
40
+
41
+ module InstanceMethods
42
+ # Resets the single_access_token to a random friendly token.
43
+ def reset_single_access_token
44
+ self.single_access_token = Authlogic::Random.friendly_token
45
+ end
46
+
47
+ # same as reset_single_access_token, but then saves the record.
48
+ def reset_single_access_token!
49
+ reset_single_access_token
50
+ save_without_session_maintenance
51
+ end
52
+
53
+ protected
54
+ def reset_single_access_token?
55
+ single_access_token.blank?
56
+ end
57
+
58
+ def change_single_access_token_with_password?
59
+ self.class.change_single_access_token_with_password == true
60
+ end
61
+ end
62
+ end
63
+ end
64
+ end
65
+ end
@@ -0,0 +1,32 @@
1
+ module Authlogic
2
+ module ActsAsAuthentic
3
+ # Allows you to scope everything to specific fields.
4
+ # See the Config submodule for more info.
5
+ # For information on how to scope off of a parent object see Authlogic::AuthenticatesMany
6
+ module ValidationsScope
7
+ def self.included(klass)
8
+ klass.class_eval do
9
+ extend Config
10
+ end
11
+ end
12
+
13
+ # All configuration for the scope feature.
14
+ module Config
15
+ # Allows you to scope everything to specific field(s). Works just like validates_uniqueness_of.
16
+ # For example, let's say a user belongs to a company, and you want to scope everything to the
17
+ # company:
18
+ #
19
+ # acts_as_authentic do |c|
20
+ # c.validations_scope = :company_id
21
+ # end
22
+ #
23
+ # * <tt>Default:</tt> nil
24
+ # * <tt>Accepts:</tt> Symbol or Array of symbols
25
+ def validations_scope(value = nil)
26
+ rw_config(:validations_scope, value)
27
+ end
28
+ alias_method :validations_scope=, :validations_scope
29
+ end
30
+ end
31
+ end
32
+ end
@@ -0,0 +1,42 @@
1
+ module Authlogic
2
+ module AuthenticatesMany
3
+ # An object of this class is used as a proxy for the authenticates_many relationship. It basically allows you to "save" scope details
4
+ # and call them on an object, which allows you to do the following:
5
+ #
6
+ # @account.user_sessions.new
7
+ # @account.user_sessions.find
8
+ # # ... etc
9
+ #
10
+ # You can call all of the class level methods off of an object with a saved scope, so that calling the above methods scopes the user
11
+ # sessions down to that specific account. To implement this via ActiveRecord do something like:
12
+ #
13
+ # class User < ActiveRecord::Base
14
+ # authenticates_many :user_sessions
15
+ # end
16
+ class Association
17
+ attr_accessor :klass, :find_options, :id
18
+
19
+ def initialize(klass, find_options, id)
20
+ self.klass = klass
21
+ self.find_options = find_options
22
+ self.id = id
23
+ end
24
+
25
+ [:create, :create!, :find, :new].each do |method|
26
+ class_eval <<-"end_eval", __FILE__, __LINE__
27
+ def #{method}(*args)
28
+ klass.with_scope(scope_options) do
29
+ klass.#{method}(*args)
30
+ end
31
+ end
32
+ end_eval
33
+ end
34
+ alias_method :build, :new
35
+
36
+ private
37
+ def scope_options
38
+ {:find_options => find_options, :id => id}
39
+ end
40
+ end
41
+ end
42
+ end
@@ -0,0 +1,55 @@
1
+ module Authlogic
2
+ # This allows you to scope your authentication. For example, let's say all users belong to an account, you want to make sure only users
3
+ # that belong to that account can actually login into that account. Simple, just do:
4
+ #
5
+ # class Account < ActiveRecord::Base
6
+ # authenticates_many :user_sessions
7
+ # end
8
+ #
9
+ # Now you can scope sessions just like everything else in ActiveRecord:
10
+ #
11
+ # @account.user_sessions.new(*args)
12
+ # @account.user_sessions.create(*args)
13
+ # @account.user_sessions.find(*args)
14
+ # # ... etc
15
+ #
16
+ # Checkout the authenticates_many method for a list of options.
17
+ # You may also want to checkout Authlogic::ActsAsAuthentic::Scope to scope your model.
18
+ module AuthenticatesMany
19
+ module Base
20
+ # Allows you set essentially set up a relationship with your sessions. See module definition above for more details.
21
+ #
22
+ # === Options
23
+ #
24
+ # * <tt>session_class:</tt> default: "#{name}Session",
25
+ # This is the related session class.
26
+ #
27
+ # * <tt>relationship_name:</tt> default: options[:session_class].klass_name.underscore.pluralize,
28
+ # This is the name of the relationship you want to use to scope everything. For example an Account has many Users. There should be a relationship
29
+ # called :users that you defined with a has_many. The reason we use the relationship is so you don't have to repeat yourself. The relatonship
30
+ # could have all kinds of custom options. So instead of repeating yourself we essentially use the scope that the relationship creates.
31
+ #
32
+ # * <tt>find_options:</tt> default: nil,
33
+ # By default the find options are created from the relationship you specify with :relationship_name. But if you want to override this and
34
+ # manually specify find_options you can do it here. Specify options just as you would in ActiveRecord::Base.find.
35
+ #
36
+ # * <tt>scope_cookies:</tt> default: false
37
+ # By the nature of cookies they scope theirself if you are using subdomains to access accounts. If you aren't using subdomains you need to have
38
+ # separate cookies for each account, assuming a user is logging into mroe than one account. Authlogic can take care of this for you by
39
+ # prefixing the name of the cookie and sessin with the model id. You just need to tell Authlogic to do this by passing this option.
40
+ def authenticates_many(name, options = {})
41
+ options[:session_class] ||= name.to_s.classify.constantize
42
+ options[:relationship_name] ||= options[:session_class].klass_name.underscore.pluralize
43
+ class_eval <<-"end_eval", __FILE__, __LINE__
44
+ def #{name}
45
+ find_options = #{options[:find_options].inspect} || #{options[:relationship_name]}.scope(:find)
46
+ find_options.delete_if { |key, value| ![:conditions, :include, :joins].include?(key.to_sym) || value.nil? }
47
+ @#{name} ||= Authlogic::AuthenticatesMany::Association.new(#{options[:session_class]}, find_options, #{options[:scope_cookies] ? "self.class.model_name.underscore + '_' + self.send(self.class.primary_key).to_s" : "nil"})
48
+ end
49
+ end_eval
50
+ end
51
+ end
52
+
53
+ ::ActiveRecord::Base.extend(Base) if defined?(::ActiveRecord)
54
+ end
55
+ end