Sha256: 299e739023ce72520d7ba7c2c7ac863b385d5e7490f7d0f9b980caec50b8e0d4
Contents?: true
Size: 1.76 KB
Versions: 5
Compression:
Stored size: 1.76 KB
Contents
require "test_helper" class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest setup do @user = users(:lazaro_nixon) @sid = @user.signed_id(purpose: :password_reset, expires_in: 20.minutes) @sid_exp = @user.signed_id(purpose: :password_reset, expires_in: 0.minutes) end test "should send a password reset email" do assert_enqueued_email_with UserMailer, :password_reset_provision, args: { user: @user } do post identity_password_reset_url, params: { email: @user.email } end assert_response :no_content end test "should not send a password reset email to a nonexistent email" do assert_no_enqueued_emails do post identity_password_reset_url, params: { email: "invalid_email@hey.com" } end assert_response :not_found assert_equal "You can't reset your password until you verify your email", response.parsed_body["error"] end test "should not send a password reset email to a unverified email" do @user.update! verified: false assert_no_enqueued_emails do post identity_password_reset_url, params: { email: @user.email } end assert_response :not_found assert_equal "You can't reset your password until you verify your email", response.parsed_body["error"] end test "should update password" do patch identity_password_reset_url, params: { token: @sid, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" } assert_response :success end test "should not update password with expired token" do patch identity_password_reset_url, params: { token: @sid_exp, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" } assert_response :bad_request assert_equal "That password reset link is invalid", response.parsed_body["error"] end end
Version data entries
5 entries across 5 versions & 1 rubygems