Preventing timeoutable from interfering with stateless tokens.

Signed-off-by: José Valim <jose.valim@gmail.com>
This commit is contained in:
Nate Todd 2011-02-14 10:45:00 -05:00 committed by José Valim
parent 3109b0924b
commit 2d0f887ba7
2 changed files with 24 additions and 1 deletions

View File

@ -6,7 +6,7 @@
Warden::Manager.after_set_user do |record, warden, options|
scope = options[:scope]
if record && record.respond_to?(:timedout?) && warden.authenticated?(scope)
if record && record.respond_to?(:timedout?) && warden.authenticated?(scope) && options[:store] != false
last_request_at = warden.session(scope)['last_request_at']
if record.timedout?(last_request_at)

View File

@ -76,6 +76,18 @@ class TokenAuthenticationTest < ActionController::IntegrationTest
end
end
test 'authenticate with valid authentication token key and do not store if stateless and timeoutable are enabled' do
swap Devise, :token_authentication_key => :secret_token, :stateless_token => true, :timeout_in => 1.second do
user = sign_in_as_new_user_with_token
assert warden.authenticated?(:user)
# TODO: replace sleep
sleep 2
get_users_path_as_existing_user(user)
assert warden.authenticated?(:user)
end
end
private
def sign_in_as_new_user_with_token(options = {})
@ -96,4 +108,15 @@ class TokenAuthenticationTest < ActionController::IntegrationTest
user
end
def get_users_path_as_existing_user(user, options = {})
options[:auth_token_key] ||= Devise.token_authentication_key
if options[:http_auth]
header = "Basic #{ActiveSupport::Base64.encode64("#{VALID_AUTHENTICATION_TOKEN}:X")}"
get users_path(:format => :xml), {}, "HTTP_AUTHORIZATION" => header
else
get users_path(options[:auth_token_key].to_sym => user.authentication_token)
end
end
end