mirror of
https://github.com/heartcombo/devise.git
synced 2022-11-09 12:18:31 -05:00
6d31e368bf
In order to be more ActiveModel compliant, lets use persisted? whereever we can. Particularly for datamapper, new_record? causes api warnings. Better to stick to the ActiveModel api I think.
138 lines
4.7 KiB
Ruby
138 lines
4.7 KiB
Ruby
require 'test_helper'
|
|
|
|
class RecoverableTest < ActiveSupport::TestCase
|
|
|
|
def setup
|
|
setup_mailer
|
|
end
|
|
|
|
test 'should not generate reset password token after creating a record' do
|
|
assert_nil new_user.reset_password_token
|
|
end
|
|
|
|
test 'should regenerate reset password token each time' do
|
|
user = create_user
|
|
3.times do
|
|
token = user.reset_password_token
|
|
user.send_reset_password_instructions
|
|
assert_not_equal token, user.reset_password_token
|
|
end
|
|
end
|
|
|
|
test 'should never generate the same reset password token for different users' do
|
|
reset_password_tokens = []
|
|
3.times do
|
|
user = create_user
|
|
user.send_reset_password_instructions
|
|
token = user.reset_password_token
|
|
assert !reset_password_tokens.include?(token)
|
|
reset_password_tokens << token
|
|
end
|
|
end
|
|
|
|
test 'should reset password and password confirmation from params' do
|
|
user = create_user
|
|
user.reset_password!('123456789', '987654321')
|
|
assert_equal '123456789', user.password
|
|
assert_equal '987654321', user.password_confirmation
|
|
end
|
|
|
|
test 'should reset password and save the record' do
|
|
assert create_user.reset_password!('123456789', '123456789')
|
|
end
|
|
|
|
test 'should clear reset password token while reseting the password' do
|
|
user = create_user
|
|
assert_nil user.reset_password_token
|
|
|
|
user.send_reset_password_instructions
|
|
assert_present user.reset_password_token
|
|
assert user.reset_password!('123456789', '123456789')
|
|
assert_nil user.reset_password_token
|
|
end
|
|
|
|
test 'should not clear reset password token if record is invalid' do
|
|
user = create_user
|
|
user.send_reset_password_instructions
|
|
assert_present user.reset_password_token
|
|
assert_not user.reset_password!('123456789', '987654321')
|
|
assert_present user.reset_password_token
|
|
end
|
|
|
|
test 'should not reset password with invalid data' do
|
|
user = create_user
|
|
user.stubs(:valid?).returns(false)
|
|
assert_not user.reset_password!('123456789', '987654321')
|
|
end
|
|
|
|
test 'should reset reset password token and send instructions by email' do
|
|
user = create_user
|
|
assert_email_sent do
|
|
token = user.reset_password_token
|
|
user.send_reset_password_instructions
|
|
assert_not_equal token, user.reset_password_token
|
|
end
|
|
end
|
|
|
|
test 'should find a user to send instructions by email' do
|
|
user = create_user
|
|
reset_password_user = User.send_reset_password_instructions(:email => user.email)
|
|
assert_equal reset_password_user, user
|
|
end
|
|
|
|
test 'should return a new record with errors if user was not found by e-mail' do
|
|
reset_password_user = User.send_reset_password_instructions(:email => "invalid@email.com")
|
|
assert_not reset_password_user.persisted?
|
|
assert_equal "not found", reset_password_user.errors[:email].join
|
|
end
|
|
|
|
test 'should reset reset_password_token before send the reset instructions email' do
|
|
user = create_user
|
|
token = user.reset_password_token
|
|
reset_password_user = User.send_reset_password_instructions(:email => user.email)
|
|
assert_not_equal token, user.reload.reset_password_token
|
|
end
|
|
|
|
test 'should send email instructions to the user reset his password' do
|
|
user = create_user
|
|
assert_email_sent do
|
|
User.send_reset_password_instructions(:email => user.email)
|
|
end
|
|
end
|
|
|
|
test 'should find a user to reset his password based on reset_password_token' do
|
|
user = create_user
|
|
user.send :generate_reset_password_token!
|
|
|
|
reset_password_user = User.reset_password_by_token(:reset_password_token => user.reset_password_token)
|
|
assert_equal reset_password_user, user
|
|
end
|
|
|
|
test 'should a new record with errors if no reset_password_token is found' do
|
|
reset_password_user = User.reset_password_by_token(:reset_password_token => 'invalid_token')
|
|
assert_not reset_password_user.persisted?
|
|
assert_equal "is invalid", reset_password_user.errors[:reset_password_token].join
|
|
end
|
|
|
|
test 'should a new record with errors if reset_password_token is blank' do
|
|
reset_password_user = User.reset_password_by_token(:reset_password_token => '')
|
|
assert_not reset_password_user.persisted?
|
|
assert_match "can't be blank", reset_password_user.errors[:reset_password_token].join
|
|
end
|
|
|
|
test 'should reset successfully user password given the new password and confirmation' do
|
|
user = create_user
|
|
old_password = user.password
|
|
user.send :generate_reset_password_token!
|
|
|
|
reset_password_user = User.reset_password_by_token(
|
|
:reset_password_token => user.reset_password_token,
|
|
:password => 'new_password',
|
|
:password_confirmation => 'new_password'
|
|
)
|
|
user.reload
|
|
|
|
assert_not user.valid_password?(old_password)
|
|
assert user.valid_password?('new_password')
|
|
end
|
|
end
|