change passwords in specs

This commit is contained in:
Lisa Durand 2024-09-03 17:45:37 +02:00
parent 71e03203aa
commit 0b0e47b7cd
No known key found for this signature in database
GPG key ID: 0DF91F2CA1E8B816
14 changed files with 23 additions and 20 deletions

View file

@ -61,7 +61,7 @@ end
RSpec.describe "CSRF cleanup", type: :request do
describe 'csrf_cleaner hook', :allow_forgery_protection do
let(:user) { create(:user, password: password) }
let(:password) { 'my-very-secure-password' }
let(:password) { SECURE_PASSWORD }
it 'refreshes the long-lived cookie after authentication' do
get new_user_session_path

View file

@ -598,7 +598,7 @@ describe Experts::AvisController, type: :controller do
context 'with a random avis, procedure and user' do
let(:avis_id) { create(:avis).id }
let(:random_user) { create(:user) }
let(:random_user) { create(:user, password: '{Another-$3cure-p4ssWord}') }
let(:email) { random_user.email }
it 'doesnt change the random user password' do
@ -613,7 +613,7 @@ describe Experts::AvisController, type: :controller do
let(:avis) { create(:avis) }
let(:avis_id) { avis.id }
let(:procedure_id) { avis.procedure.id }
let(:random_user) { create(:user) }
let(:random_user) { create(:user, password: '{Another-$3cure-p4ssWord}') }
let(:email) { random_user.email }
it 'doesnt change the random user password' do
@ -629,7 +629,7 @@ describe Experts::AvisController, type: :controller do
it 'doesnt change the expert password' do
subject
expect(expert.user.reload.valid_password?(SECURE_PASSWORD)).to be false
expect(expert.user.reload.valid_password?('{Another-$3cure-p4ssWord}')).to be false
end
it { is_expected.to redirect_to new_user_session_url }

View file

@ -394,7 +394,7 @@ describe FranceConnect::ParticulierController, type: :controller do
fci.update!(requested_email: email.downcase)
end
let!(:user) { create(:user, email:, password: 'abcdefgh') }
let!(:user) { create(:user, email:, password: SECURE_PASSWORD) }
it 'merges the account, signs in, and delete the merge token' do
subject
@ -408,7 +408,7 @@ describe FranceConnect::ParticulierController, type: :controller do
end
context 'but the targeted user is an instructeur' do
let!(:user) { create(:instructeur, email: email, password: 'abcdefgh').user }
let!(:user) { create(:instructeur, email: email, password: SECURE_PASSWORD).user }
it 'redirects to the new session' do
subject

View file

@ -23,7 +23,7 @@ describe Gestionnaires::ActivateController, type: :controller do
describe '#create' do
let!(:gestionnaire) { create(:gestionnaire) }
let(:token) { gestionnaire.user.send(:set_reset_password_token) }
let(:password) { 'another-password-ok?' }
let(:password) { '{another-password-ok?}' }
before { post :create, params: { gestionnaire: { reset_password_token: token, password: password } } }

View file

@ -23,7 +23,7 @@ describe Users::ActivateController, type: :controller do
describe '#create' do
let!(:user) { create(:user) }
let(:token) { user.send(:set_reset_password_token) }
let(:password) { 'another-password-ok?' }
let(:password) { '{another-password-ok?}' }
before { post :create, params: { user: { reset_password_token: token, password: password } } }

View file

@ -8,7 +8,7 @@ FactoryBot.define do
transient do
email { generate(:expert_email) }
password { 'somethingverycomplated!' }
password { '{My-$3cure-p4ssWord}' }
end
end
end

View file

@ -8,7 +8,7 @@ FactoryBot.define do
transient do
email { generate(:gestionnaire_email) }
password { 'somethingverycomplated!' }
password { '{My-$3cure-p4ssWord}' }
end
end
end

View file

@ -10,7 +10,7 @@ FactoryBot.define do
transient do
email { generate(:instructeur_email) }
password { '{my-%s3cure[]-p4$$w0rd' }
password { '{My-$3cure-p4ssWord}' }
end
trait :email_verified do

View file

@ -103,7 +103,7 @@ describe User, type: :model do
describe '.create_or_promote_to_instructeur' do
let(:email) { 'inst1@gmail.com' }
let(:password) { 'un super password !' }
let(:password) { SECURE_PASSWORD }
let(:admins) { [] }
subject { User.create_or_promote_to_instructeur(email, password, administrateurs: admins) }
@ -437,10 +437,13 @@ describe User, type: :model do
context 'when the password is long enough, but simple' do
let(:password) { 'simple-password' }
it 'doesnt enforce the password complexity' do
expect(subject).to be_empty
it { expect(subject).to eq(["Le champ « Mot de passe » nest pas assez complexe. Saisir un mot de passe plus complexe"]) }
end
context 'when the password is long and complex' do
let(:password) { passwords[min_complexity] }
it { expect(subject).to be_empty }
end
end
end

View file

@ -24,7 +24,7 @@ require 'simplecov' if ENV["CI"] || ENV["COVERAGE"] # see config in .simplecov f
require 'rspec/retry'
SECURE_PASSWORD = 'my-s3cure-p4ssword'
SECURE_PASSWORD = '{My-$3cure-p4ssWord}'
RSpec.configure do |config|
config.filter_run_excluding disable: true

View file

@ -2,7 +2,7 @@
describe 'wcag rules for usager', chrome: true do
let(:procedure) { create(:procedure, :published, :with_service, :for_individual) }
let(:password) { 'a very complicated password' }
let(:password) { SECURE_PASSWORD }
let(:litteraire_user) { create(:user, password: password) }
def test_external_links_have_title_says_it_opens_in_a_new_tab

View file

@ -2,7 +2,7 @@
describe 'Protecting against request forgeries:', :allow_forgery_protection, :show_exception_pages do
let(:user) { create(:user, password: password) }
let(:password) { 'ThisIsTheUserPassword' }
let(:password) { SECURE_PASSWORD }
before do
visit new_user_session_path

View file

@ -1,7 +1,7 @@
# frozen_string_literal: true
describe 'The routing with rules', js: true do
let(:password) { 'a very complicated password' }
let(:password) { SECURE_PASSWORD }
let(:procedure) do
create(:procedure, :with_service, :for_individual, :with_zone, types_de_champ_public: [

View file

@ -3,7 +3,7 @@
describe 'Managing password:', js: true do
context 'for simple users' do
let(:user) { create(:user) }
let(:new_password) { 'a simple password' }
let(:new_password) { 'a new, long, and complicated password!' }
scenario 'a simple user can reset their password' do
visit root_path