describe Users::SessionsController, type: :controller do let(:email) { 'unique@plop.com' } let(:password) { 'démarches-simplifiées-pwd' } let(:loged_in_with_france_connect) { User.loged_in_with_france_connects.fetch(:particulier) } let!(:user) { create(:user, email: email, password: password, loged_in_with_france_connect: loged_in_with_france_connect) } before do @request.env["devise.mapping"] = Devise.mappings[:user] end describe '#create' do context "when the user is also a instructeur and an administrateur" do let!(:administrateur) { create(:administrateur, email: email, password: password) } let(:instructeur) { administrateur.instructeur } let(:user) { instructeur.user } let(:trusted_device) { true } let(:send_password) { password } before do Flipflop::FeatureSet.current.test!.switch!(:enable_email_login_token, true) allow(controller).to receive(:trusted_device?).and_return(trusted_device) allow(InstructeurMailer).to receive(:send_login_token).and_return(double(deliver_later: true)) end subject do post :create, params: { user: { email: email, password: send_password } } user.reload end context 'when the device is not trusted' do let(:trusted_device) { false } it 'redirects to the send_linked_path' do subject expect(controller).to redirect_to(link_sent_path(email: user.email)) expect(controller.current_user).to eq(user) expect(controller.current_instructeur).to eq(instructeur) # WTF? # expect(controller.current_administrateur).to eq(administrateur) expect(user.loged_in_with_france_connect).to eq(nil) end end context 'when the device is trusted' do it 'signs in as user, instructeur and adminstrateur' do subject expect(response.redirect?).to be(true) expect(controller).not_to redirect_to link_sent_path(email: email) # TODO when signing in as non-administrateur, and not starting a demarche, log in to instructeur path # expect(controller).to redirect_to instructeur_procedures_path expect(controller.current_user).to eq(user) expect(controller.current_instructeur).to eq(instructeur) expect(controller.current_administrateur).to eq(administrateur) expect(user.loged_in_with_france_connect).to be(nil) end end context 'when the credentials are wrong' do let(:send_password) { 'wrong_password' } it 'fails to sign in with bad credentials' do subject expect(response.unauthorized?).to be(true) expect(controller.current_user).to be(nil) expect(controller.current_instructeur).to be(nil) expect(controller.current_administrateur).to be(nil) end end end end describe '#destroy' do let!(:user) { create(:user, email: email, password: password, loged_in_with_france_connect: loged_in_with_france_connect) } before do sign_in user delete :destroy end it 'user is sign out' do expect(subject.current_user).to be_nil end it 'loged_in_with_france_connect current_user attribut is nil' do user.reload expect(user.loged_in_with_france_connect.present?).to be_falsey end context 'when user is connect with france connect particulier' do let(:loged_in_with_france_connect) { User.loged_in_with_france_connects.fetch(:particulier) } it 'redirect to france connect logout page' do expect(response).to redirect_to(FRANCE_CONNECT[:particulier][:logout_endpoint]) end end context 'when user is not connect with france connect' do let(:loged_in_with_france_connect) { '' } it 'redirect to root page' do expect(response).to redirect_to(root_path) end end context "when associated administrateur" do let(:administrateur) { create(:administrateur, user: user) } it 'signs user + instructeur + administrateur out' do sign_in user sign_in administrateur delete :destroy expect(@response.redirect?).to be(true) expect(subject.current_user).to be(nil) expect(subject.current_instructeur).to be(nil) expect(subject.current_administrateur).to be(nil) end end end describe '#new' do subject { get :new } it { expect(subject.status).to eq 200 } context 'when a procedure location has been stored' do let(:procedure) { create :procedure, :published } before do controller.store_location_for(:user, commencer_path(path: procedure.path)) end it 'makes the saved procedure available' do expect(subject.status).to eq 200 expect(assigns(:procedure)).to eq procedure end end end describe '#sign_in_by_link' do context 'when the instructeur has non other account' do let(:instructeur) { create(:instructeur) } let!(:good_jeton) { instructeur.create_trusted_device_token } let(:logged) { false } before do if logged sign_in(instructeur.user) end allow(controller).to receive(:trust_device) allow(controller).to receive(:send_login_token_or_bufferize) post :sign_in_by_link, params: { id: instructeur.id, jeton: jeton } end context 'when the instructeur is not logged in' do context 'when the token is valid' do let(:jeton) { good_jeton } it { is_expected.to redirect_to new_user_session_path } it { expect(controller.current_instructeur).to be_nil } it { expect(controller).to have_received(:trust_device) } end context 'when the token is invalid' do let(:jeton) { 'invalid_token' } it { is_expected.to redirect_to link_sent_path(email: instructeur.email) } it { expect(controller.current_instructeur).to be_nil } it { expect(controller).not_to have_received(:trust_device) } it { expect(controller).to have_received(:send_login_token_or_bufferize) } end end context 'when the instructeur is logged in' do let(:logged) { true } context 'when the token is valid' do let(:jeton) { good_jeton } # redirect to root_path, then redirect to instructeur_procedures_path (see root_controller) it { is_expected.to redirect_to root_path } it { expect(controller.current_instructeur).to eq(instructeur) } it { expect(controller).to have_received(:trust_device) } end context 'when the token is invalid' do let(:jeton) { 'invalid_token' } it { is_expected.to redirect_to link_sent_path(email: instructeur.email) } it { expect(controller.current_instructeur).to eq(instructeur) } it { expect(controller).not_to have_received(:trust_device) } it { expect(controller).to have_received(:send_login_token_or_bufferize) } end end end end describe '#trust_device and #trusted_device?' do subject { controller.trusted_device? } context 'when the trusted cookie is not present' do it { is_expected.to be false } end context 'when the cookie is outdated' do before do emission_date = Time.zone.now - TrustedDeviceConcern::TRUSTED_DEVICE_PERIOD - 1.minute controller.trust_device(emission_date) end it { is_expected.to be false } end context 'when the cookie is ok' do before { controller.trust_device(Time.zone.now) } it { is_expected.to be true } end end end