require "test_helper" class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest setup do @<%= singular_table_name %> = <%= table_name %>(:lazaro_nixon) @sid = @<%= singular_table_name %>.signed_id(purpose: :password_reset, expires_in: 20.minutes) @sid_exp = @<%= singular_table_name %>.signed_id(purpose: :password_reset, expires_in: 0.minutes) end <% if options.lockable? %> teardown { Kredis.clear_all } <% end -%> test "should send a password reset email" do assert_enqueued_email_with IdentityMailer, :password_reset_provision, args: { <%= singular_table_name %>: @<%= singular_table_name %> } do post identity_password_reset_url, params: { email: @<%= singular_table_name %>.email } end assert_response :no_content end test "should not send a password reset email to a nonexistent email" do assert_no_enqueued_emails do post identity_password_reset_url, params: { email: "invalid_email@hey.com" } end assert_response :not_found assert_equal "You can't reset your password until you verify your email", response.parsed_body["error"] end test "should not send a password reset email to a unverified email" do @<%= singular_table_name %>.update! verified: false assert_no_enqueued_emails do post identity_password_reset_url, params: { email: @<%= singular_table_name %>.email } end assert_response :not_found assert_equal "You can't reset your password until you verify your email", response.parsed_body["error"] end test "should update password" do patch identity_password_reset_url, params: { token: @sid, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" } assert_response :success end test "should not update password with expired token" do patch identity_password_reset_url, params: { token: @sid_exp, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" } assert_response :bad_request assert_equal "That password reset link is invalid", response.parsed_body["error"] end end