Sha256: 9ba6197910f76ef7e4bc6324c069575980d31db8ff65e1625b35e0dcec1be09b
Contents?: true
Size: 1.74 KB
Versions: 4
Compression:
Stored size: 1.74 KB
Contents
require "test_helper" class EmailVerificationsControllerTest < ActionDispatch::IntegrationTest setup do @<%= singular_table_name %> = sign_in_as(<%= table_name %>(:lazaro_nixon)) @sid = @<%= singular_table_name %>.signed_id(purpose: @<%= singular_table_name %>.email, expires_in: 20.minutes) @sid_exp = @<%= singular_table_name %>.signed_id(purpose: @<%= singular_table_name %>.email, expires_in: 0.minutes) @<%= singular_table_name %>.update! verified: false end test "should send a verification email" do assert_enqueued_email_with IdentityMailer, :email_verify_confirmation, args: { <%= singular_table_name %>: @<%= singular_table_name %> } do post email_verification_url end assert_redirected_to root_path end test "should verify email" do get edit_email_verification_url(token: @sid, email: @<%= singular_table_name %>.email) assert_redirected_to root_path end test "should not verify email with expired token" do get edit_email_verification_url(token: @sid_exp, email: @<%= singular_table_name %>.email) assert_redirected_to edit_email_path assert_equal "That email verification link is invalid", flash[:alert] end test "should not verify email with previous token" do @<%= singular_table_name %>.update! email: "other_email@hey.com" get edit_email_verification_url(token: @sid, email: @<%= singular_table_name %>.email_previously_was) assert_redirected_to edit_email_path assert_equal "That email verification link is invalid", flash[:alert] end def sign_in_as(<%= singular_table_name %>) post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret1*3*5*" }, headers: { "User-Agent" => "Firefox" }); <%= singular_table_name %> end end
Version data entries
4 entries across 4 versions & 1 rubygems