Sha256: a9f2bc058d4a5027081a47b877cba2659020bc6d886e308689d087ecb9b33c2f
Contents?: true
Size: 1.69 KB
Versions: 4
Compression:
Stored size: 1.69 KB
Contents
require "test_helper" class EmailVerificationsControllerTest < ActionDispatch::IntegrationTest setup do @<%= singular_table_name %> = sign_in_as(<%= table_name %>(:lazaro_nixon)) @sid = @<%= singular_table_name %>.signed_id(purpose: @<%= singular_table_name %>.email, expires_in: 20.minutes) @sid_exp = @<%= singular_table_name %>.signed_id(purpose: @<%= singular_table_name %>.email, expires_in: 0.minutes) @<%= singular_table_name %>.update! verified: false end test "should send a verification email" do assert_enqueued_email_with IdentityMailer, :email_verify_confirmation, args: { <%= singular_table_name %>: @<%= singular_table_name %> } do post email_verification_url end assert_redirected_to root_path end test "should verify email" do get edit_email_verification_url(token: @sid, email: @<%= singular_table_name %>.email) assert_redirected_to root_path end test "should not verify email with expired token" do get edit_email_verification_url(token: @sid_exp, email: @<%= singular_table_name %>.email) assert_redirected_to edit_email_path assert_equal "That email verification link is invalid", flash[:alert] end test "should not verify email with previous token" do @<%= singular_table_name %>.update! email: "other_email@hey.com" get edit_email_verification_url(token: @sid, email: @<%= singular_table_name %>.email_previously_was) assert_redirected_to edit_email_path assert_equal "That email verification link is invalid", flash[:alert] end def sign_in_as(<%= singular_table_name %>) post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "secret123" }); <%= singular_table_name %> end end
Version data entries
4 entries across 4 versions & 1 rubygems