212 lines
7.1 KiB
Ruby
212 lines
7.1 KiB
Ruby
describe Users::SessionsController, type: :controller do
|
|
let(:email) { 'unique@plop.com' }
|
|
let(:password) { 'démarches-simplifiées-pwd' }
|
|
let(:loged_in_with_france_connect) { User.loged_in_with_france_connects.fetch(:particulier) }
|
|
let!(:user) { create(:user, email: email, password: password, loged_in_with_france_connect: loged_in_with_france_connect) }
|
|
|
|
before do
|
|
@request.env["devise.mapping"] = Devise.mappings[:user]
|
|
end
|
|
|
|
describe '#create' do
|
|
context "when the user is also a instructeur and an administrateur" do
|
|
let!(:administrateur) { create(:administrateur, email: email, password: password) }
|
|
let(:instructeur) { administrateur.instructeur }
|
|
let(:user) { instructeur.user }
|
|
let(:trusted_device) { true }
|
|
let(:send_password) { password }
|
|
|
|
before do
|
|
allow(controller).to receive(:trusted_device?).and_return(trusted_device)
|
|
allow(InstructeurMailer).to receive(:send_login_token).and_return(double(deliver_later: true))
|
|
end
|
|
|
|
subject do
|
|
post :create, params: { user: { email: email, password: send_password } }
|
|
user.reload
|
|
end
|
|
|
|
context 'when the device is not trusted' do
|
|
before do
|
|
Flipflop::FeatureSet.current.test!.switch!(:bypass_email_login_token, false)
|
|
end
|
|
let(:trusted_device) { false }
|
|
|
|
it 'redirects to the send_linked_path' do
|
|
subject
|
|
|
|
expect(controller).to redirect_to(link_sent_path(email: user.email))
|
|
|
|
expect(controller.current_user).to eq(user)
|
|
expect(controller.current_instructeur).to eq(instructeur)
|
|
# WTF?
|
|
# expect(controller.current_administrateur).to eq(administrateur)
|
|
expect(user.loged_in_with_france_connect).to eq(nil)
|
|
end
|
|
end
|
|
|
|
context 'when the device is trusted' do
|
|
it 'signs in as user, instructeur and adminstrateur' do
|
|
subject
|
|
|
|
expect(response.redirect?).to be(true)
|
|
expect(controller).not_to redirect_to link_sent_path(email: email)
|
|
# TODO when signing in as non-administrateur, and not starting a demarche, log in to instructeur path
|
|
# expect(controller).to redirect_to instructeur_procedures_path
|
|
|
|
expect(controller.current_user).to eq(user)
|
|
expect(controller.current_instructeur).to eq(instructeur)
|
|
expect(controller.current_administrateur).to eq(administrateur)
|
|
expect(user.loged_in_with_france_connect).to be(nil)
|
|
end
|
|
end
|
|
|
|
context 'when the credentials are wrong' do
|
|
let(:send_password) { 'wrong_password' }
|
|
|
|
it 'fails to sign in with bad credentials' do
|
|
subject
|
|
|
|
expect(response.unauthorized?).to be(true)
|
|
expect(controller.current_user).to be(nil)
|
|
expect(controller.current_instructeur).to be(nil)
|
|
expect(controller.current_administrateur).to be(nil)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#destroy' do
|
|
let!(:user) { create(:user, email: email, password: password, loged_in_with_france_connect: loged_in_with_france_connect) }
|
|
|
|
before do
|
|
sign_in user
|
|
delete :destroy
|
|
end
|
|
|
|
it 'user is sign out' do
|
|
expect(subject.current_user).to be_nil
|
|
end
|
|
|
|
it 'loged_in_with_france_connect current_user attribut is nil' do
|
|
user.reload
|
|
expect(user.loged_in_with_france_connect.present?).to be_falsey
|
|
end
|
|
|
|
context 'when user is connect with france connect particulier' do
|
|
let(:loged_in_with_france_connect) { User.loged_in_with_france_connects.fetch(:particulier) }
|
|
|
|
it 'redirect to france connect logout page' do
|
|
expect(response).to redirect_to(FRANCE_CONNECT[:particulier][:logout_endpoint])
|
|
end
|
|
end
|
|
|
|
context 'when user is not connect with france connect' do
|
|
let(:loged_in_with_france_connect) { '' }
|
|
|
|
it 'redirect to root page' do
|
|
expect(response).to redirect_to(root_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#new' do
|
|
subject { get :new }
|
|
|
|
it { expect(subject.status).to eq 200 }
|
|
|
|
context 'when a procedure location has been stored' do
|
|
let(:procedure) { create :procedure, :published }
|
|
|
|
before do
|
|
controller.store_location_for(:user, commencer_path(path: procedure.path))
|
|
end
|
|
|
|
it 'makes the saved procedure available' do
|
|
expect(subject.status).to eq 200
|
|
expect(assigns(:procedure)).to eq procedure
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#sign_in_by_link' do
|
|
context 'when the instructeur has non other account' do
|
|
let(:instructeur) { create(:instructeur) }
|
|
let!(:good_jeton) { instructeur.create_trusted_device_token }
|
|
let(:logged) { false }
|
|
|
|
before do
|
|
if logged
|
|
sign_in(instructeur.user)
|
|
end
|
|
allow(controller).to receive(:trust_device)
|
|
allow(controller).to receive(:send_login_token_or_bufferize)
|
|
post :sign_in_by_link, params: { id: instructeur.id, jeton: jeton }
|
|
end
|
|
|
|
context 'when the instructeur is not logged in' do
|
|
context 'when the token is valid' do
|
|
let(:jeton) { good_jeton }
|
|
|
|
it { is_expected.to redirect_to new_user_session_path }
|
|
it { expect(controller.current_instructeur).to be_nil }
|
|
it { expect(controller).to have_received(:trust_device) }
|
|
end
|
|
|
|
context 'when the token is invalid' do
|
|
let(:jeton) { 'invalid_token' }
|
|
|
|
it { is_expected.to redirect_to link_sent_path(email: instructeur.email) }
|
|
it { expect(controller.current_instructeur).to be_nil }
|
|
it { expect(controller).not_to have_received(:trust_device) }
|
|
it { expect(controller).to have_received(:send_login_token_or_bufferize) }
|
|
end
|
|
end
|
|
|
|
context 'when the instructeur is logged in' do
|
|
let(:logged) { true }
|
|
|
|
context 'when the token is valid' do
|
|
let(:jeton) { good_jeton }
|
|
|
|
# redirect to root_path, then redirect to instructeur_procedures_path (see root_controller)
|
|
it { is_expected.to redirect_to root_path }
|
|
it { expect(controller.current_instructeur).to eq(instructeur) }
|
|
it { expect(controller).to have_received(:trust_device) }
|
|
end
|
|
|
|
context 'when the token is invalid' do
|
|
let(:jeton) { 'invalid_token' }
|
|
|
|
it { is_expected.to redirect_to link_sent_path(email: instructeur.email) }
|
|
it { expect(controller.current_instructeur).to eq(instructeur) }
|
|
it { expect(controller).not_to have_received(:trust_device) }
|
|
it { expect(controller).to have_received(:send_login_token_or_bufferize) }
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#trust_device and #trusted_device?' do
|
|
subject { controller.trusted_device? }
|
|
|
|
context 'when the trusted cookie is not present' do
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when the cookie is outdated' do
|
|
before do
|
|
emission_date = Time.zone.now - TrustedDeviceConcern::TRUSTED_DEVICE_PERIOD - 1.minute
|
|
controller.trust_device(emission_date)
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when the cookie is ok' do
|
|
before { controller.trust_device(Time.zone.now) }
|
|
|
|
it { is_expected.to be true }
|
|
end
|
|
end
|
|
end
|