2015-11-04 17:27:01 +01:00
|
|
|
require 'spec_helper'
|
2015-10-23 16:19:55 +02:00
|
|
|
|
2015-11-04 17:27:01 +01:00
|
|
|
describe Administrateur, type: :model do
|
2015-11-10 10:23:15 +01:00
|
|
|
describe 'assocations' do
|
2016-05-20 15:39:17 +02:00
|
|
|
it { is_expected.to have_and_belong_to_many(:gestionnaires) }
|
2015-11-10 10:23:15 +01:00
|
|
|
it { is_expected.to have_many(:procedures) }
|
|
|
|
end
|
|
|
|
|
2015-12-14 17:28:36 +01:00
|
|
|
describe 'after_save' do
|
|
|
|
subject { described_class.new(email: 'toto@tps.com', password: 'password') }
|
|
|
|
before do
|
|
|
|
subject.save
|
|
|
|
end
|
|
|
|
it { expect(subject.api_token).not_to be_blank }
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'generate_api_token' do
|
|
|
|
let(:token) { 'bullshit' }
|
|
|
|
let(:new_token) { 'pocket_master' }
|
2017-06-12 16:12:03 +02:00
|
|
|
let!(:admin_1) { create(:administrateur, email: 'toto@tps.com', password: 'password', api_token: token) }
|
2015-12-14 17:28:36 +01:00
|
|
|
before do
|
|
|
|
allow(SecureRandom).to receive(:hex).and_return(token, new_token)
|
|
|
|
admin_1.renew_api_token
|
|
|
|
end
|
|
|
|
it 'generate a token who does not already exist' do
|
|
|
|
expect(admin_1.api_token).to eq(new_token)
|
|
|
|
end
|
|
|
|
end
|
2016-12-07 17:24:01 +01:00
|
|
|
|
|
|
|
context 'unified login' do
|
|
|
|
it 'syncs credentials to associated user' do
|
|
|
|
administrateur = create(:administrateur)
|
|
|
|
user = create(:user, email: administrateur.email)
|
|
|
|
|
2018-03-02 16:27:03 +01:00
|
|
|
administrateur.update(email: 'whoami@plop.com', password: 'super secret')
|
2016-12-07 17:24:01 +01:00
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email).to eq('whoami@plop.com')
|
|
|
|
expect(user.valid_password?('super secret')).to be(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'syncs credentials to associated administrateur' do
|
|
|
|
administrateur = create(:administrateur)
|
|
|
|
gestionnaire = create(:gestionnaire, email: administrateur.email)
|
|
|
|
|
2018-03-02 16:27:03 +01:00
|
|
|
administrateur.update(email: 'whoami@plop.com', password: 'super secret')
|
2016-12-07 17:24:01 +01:00
|
|
|
|
|
|
|
gestionnaire.reload
|
|
|
|
expect(gestionnaire.email).to eq('whoami@plop.com')
|
|
|
|
expect(gestionnaire.valid_password?('super secret')).to be(true)
|
|
|
|
end
|
|
|
|
end
|
2018-01-11 14:17:50 +01:00
|
|
|
|
|
|
|
describe '#find_inactive_by_token' do
|
|
|
|
let(:administrateur) { create(:administration).invite_admin('paul@tps.fr') }
|
|
|
|
let(:reset_password_token) { administrateur.invite! }
|
|
|
|
|
|
|
|
it { expect(Administrateur.find_inactive_by_token(reset_password_token)).not_to be_nil }
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#reset_password' do
|
|
|
|
let(:administrateur) { create(:administration).invite_admin('paul@tps.fr') }
|
|
|
|
let(:reset_password_token) { administrateur.invite! }
|
|
|
|
|
|
|
|
it { expect(Administrateur.reset_password(reset_password_token, '12345678').errors).to be_empty }
|
|
|
|
it { expect(Administrateur.reset_password('123', '12345678').errors).not_to be_empty }
|
|
|
|
it { expect(Administrateur.reset_password(reset_password_token, '').errors).not_to be_empty }
|
|
|
|
end
|
2018-03-27 15:43:59 +02:00
|
|
|
|
|
|
|
describe '#feature_enabled?' do
|
|
|
|
let(:administrateur) { create(:administrateur) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(Features).to receive(:champ_pj_allowed_for_admin_ids)
|
|
|
|
.and_return([administrateur.id])
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect(administrateur.feature_enabled?(:yolo)).to be_falsey }
|
|
|
|
it { expect(administrateur.feature_enabled?(:champ_pj_allowed)).to be_truthy }
|
|
|
|
end
|
2015-10-23 16:19:55 +02:00
|
|
|
end
|