mirror of
https://github.com/heartcombo/devise.git
synced 2022-11-09 12:18:31 -05:00
226 lines
8.3 KiB
Ruby
226 lines
8.3 KiB
Ruby
require 'test_helper'
|
|
require 'test_models'
|
|
require 'digest/sha1'
|
|
|
|
class DatabaseAuthenticatableTest < ActiveSupport::TestCase
|
|
test 'should downcase case insensitive keys when saving' do
|
|
# case_insensitive_keys is set to :email by default.
|
|
email = 'Foo@Bar.com'
|
|
user = new_user(:email => email)
|
|
|
|
assert_equal email, user.email
|
|
user.save!
|
|
assert_equal email.downcase, user.email
|
|
end
|
|
|
|
test 'should downcase case insensitive keys that refer to virtual attributes when saving' do
|
|
email = 'Foo@Bar1.com'
|
|
confirmation = 'Foo@Bar1.com'
|
|
attributes = valid_attributes(:email => email, :email_confirmation => confirmation)
|
|
user = UserWithVirtualAttributes.new(attributes)
|
|
|
|
assert_equal confirmation, user.email_confirmation
|
|
user.save!
|
|
assert_equal confirmation.downcase, user.email_confirmation
|
|
end
|
|
|
|
test 'should remove whitespace from strip whitespace keys when saving' do
|
|
# strip_whitespace_keys is set to :email by default.
|
|
email = ' foo@bar.com '
|
|
user = new_user(:email => email)
|
|
|
|
assert_equal email, user.email
|
|
user.save!
|
|
assert_equal email.strip, user.email
|
|
end
|
|
|
|
test "doesn't throw exception when globally configured strip_whitespace_keys are not present on a model" do
|
|
swap Devise, :strip_whitespace_keys => [:fake_key] do
|
|
assert_nothing_raised { create_user }
|
|
end
|
|
end
|
|
|
|
test "doesn't throw exception when globally configured case_insensitive_keys are not present on a model" do
|
|
swap Devise, :case_insensitive_keys => [:fake_key] do
|
|
assert_nothing_raised { create_user }
|
|
end
|
|
end
|
|
|
|
test "param filter should not convert booleans and integer to strings" do
|
|
conditions = { "login" => "foo@bar.com", "bool1" => true, "bool2" => false, "fixnum" => 123, "will_be_converted" => (1..10) }
|
|
conditions = Devise::ParameterFilter.new([], []).filter(conditions)
|
|
assert_equal( { "login" => "foo@bar.com", "bool1" => "true", "bool2" => "false", "fixnum" => "123", "will_be_converted" => "1..10" }, conditions)
|
|
end
|
|
|
|
test 'param filter should filter case_insensitive_keys as insensitive' do
|
|
conditions = {'insensitive' => 'insensitive_VAL', 'sensitive' => 'sensitive_VAL'}
|
|
conditions = Devise::ParameterFilter.new(['insensitive'], []).filter(conditions)
|
|
assert_equal( {'insensitive' => 'insensitive_val', 'sensitive' => 'sensitive_VAL'}, conditions )
|
|
end
|
|
|
|
test 'param filter should filter strip_whitespace_keys stripping whitespaces' do
|
|
conditions = {'strip_whitespace' => ' strip_whitespace_val ', 'do_not_strip_whitespace' => ' do_not_strip_whitespace_val '}
|
|
conditions = Devise::ParameterFilter.new([], ['strip_whitespace']).filter(conditions)
|
|
assert_equal( {'strip_whitespace' => 'strip_whitespace_val', 'do_not_strip_whitespace' => ' do_not_strip_whitespace_val '}, conditions )
|
|
end
|
|
|
|
test 'should respond to password and password confirmation' do
|
|
user = new_user
|
|
assert user.respond_to?(:password)
|
|
assert user.respond_to?(:password_confirmation)
|
|
end
|
|
|
|
test 'should generate encrypted password while setting password' do
|
|
user = new_user
|
|
assert_present user.encrypted_password
|
|
end
|
|
|
|
test 'allow authenticatable_salt to work even with nil encrypted password' do
|
|
user = User.new
|
|
user.encrypted_password = nil
|
|
assert_nil user.authenticatable_salt
|
|
end
|
|
|
|
test 'should not generate encrypted password if password is blank' do
|
|
assert_blank new_user(:password => nil).encrypted_password
|
|
assert_blank new_user(:password => '').encrypted_password
|
|
end
|
|
|
|
test 'should encrypt password again if password has changed' do
|
|
user = create_user
|
|
encrypted_password = user.encrypted_password
|
|
user.password = user.password_confirmation = 'new_password'
|
|
user.save!
|
|
assert_not_equal encrypted_password, user.encrypted_password
|
|
end
|
|
|
|
test 'should test for a valid password' do
|
|
user = create_user
|
|
assert user.valid_password?('12345678')
|
|
assert_not user.valid_password?('654321')
|
|
end
|
|
|
|
test 'should not raise error with an empty password' do
|
|
user = create_user
|
|
user.encrypted_password = ''
|
|
assert_nothing_raised { user.valid_password?('12345678') }
|
|
end
|
|
|
|
test 'should be an invalid password if the user has an empty password' do
|
|
user = create_user
|
|
user.encrypted_password = ''
|
|
assert_not user.valid_password?('654321')
|
|
end
|
|
|
|
test 'should respond to current password' do
|
|
assert new_user.respond_to?(:current_password)
|
|
end
|
|
|
|
test 'should update password with valid current password' do
|
|
user = create_user
|
|
assert user.update_with_password(:current_password => '12345678',
|
|
:password => 'pass4321', :password_confirmation => 'pass4321')
|
|
assert user.reload.valid_password?('pass4321')
|
|
end
|
|
|
|
test 'should add an error to current password when it is invalid' do
|
|
user = create_user
|
|
assert_not user.update_with_password(:current_password => 'other',
|
|
:password => 'pass4321', :password_confirmation => 'pass4321')
|
|
assert user.reload.valid_password?('12345678')
|
|
assert_match "is invalid", user.errors[:current_password].join
|
|
end
|
|
|
|
test 'should add an error to current password when it is blank' do
|
|
user = create_user
|
|
assert_not user.update_with_password(:password => 'pass4321',
|
|
:password_confirmation => 'pass4321')
|
|
assert user.reload.valid_password?('12345678')
|
|
assert_match "can't be blank", user.errors[:current_password].join
|
|
end
|
|
|
|
test 'should run validations even when current password is invalid or blank' do
|
|
user = UserWithValidation.create!(valid_attributes)
|
|
user.save
|
|
assert user.persisted?
|
|
assert_not user.update_with_password(:username => "")
|
|
assert_match "usertest", user.reload.username
|
|
assert_match "can't be blank", user.errors[:username].join
|
|
end
|
|
|
|
test 'should ignore password and its confirmation if they are blank' do
|
|
user = create_user
|
|
assert user.update_with_password(:current_password => '12345678', :email => "new@example.com")
|
|
assert_equal "new@example.com", user.email
|
|
end
|
|
|
|
test 'should not update password with invalid confirmation' do
|
|
user = create_user
|
|
assert_not user.update_with_password(:current_password => '12345678',
|
|
:password => 'pass4321', :password_confirmation => 'other')
|
|
assert user.reload.valid_password?('12345678')
|
|
end
|
|
|
|
test 'should clean up password fields on failure' do
|
|
user = create_user
|
|
assert_not user.update_with_password(:current_password => '12345678',
|
|
:password => 'pass4321', :password_confirmation => 'other')
|
|
assert user.password.blank?
|
|
assert user.password_confirmation.blank?
|
|
end
|
|
|
|
test 'should update the user without password' do
|
|
user = create_user
|
|
user.update_without_password(:email => 'new@example.com')
|
|
assert_equal 'new@example.com', user.email
|
|
end
|
|
|
|
test 'should not update password without password' do
|
|
user = create_user
|
|
user.update_without_password(:password => 'pass4321', :password_confirmation => 'pass4321')
|
|
assert !user.reload.valid_password?('pass4321')
|
|
assert user.valid_password?('12345678')
|
|
end
|
|
|
|
test 'should destroy user if current password is valid' do
|
|
user = create_user
|
|
assert user.destroy_with_password('12345678')
|
|
assert !user.persisted?
|
|
end
|
|
|
|
test 'should not destroy user with invalid password' do
|
|
user = create_user
|
|
assert_not user.destroy_with_password('other')
|
|
assert user.persisted?
|
|
assert_match "is invalid", user.errors[:current_password].join
|
|
end
|
|
|
|
test 'should not destroy user with blank password' do
|
|
user = create_user
|
|
assert_not user.destroy_with_password(nil)
|
|
assert user.persisted?
|
|
assert_match "can't be blank", user.errors[:current_password].join
|
|
end
|
|
|
|
test 'downcase_keys with validation' do
|
|
user = User.create(:email => "HEllO@example.com", :password => "123456")
|
|
user = User.create(:email => "HEllO@example.com", :password => "123456")
|
|
assert !user.valid?
|
|
end
|
|
|
|
test 'required_fiels should be encryptable_password and the email field by default' do
|
|
assert_same_content Devise::Models::DatabaseAuthenticatable.required_fields(User), [
|
|
:email,
|
|
:encrypted_password
|
|
]
|
|
end
|
|
|
|
test 'required_fields should be encryptable_password and the login when the login is on authentication_keys' do
|
|
swap Devise, :authentication_keys => [:login] do
|
|
assert_same_content Devise::Models::DatabaseAuthenticatable.required_fields(User), [
|
|
:encrypted_password,
|
|
:login
|
|
]
|
|
end
|
|
end
|
|
end
|