64 lines
2.1 KiB
Ruby
64 lines
2.1 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe 'Sessions', feature_category: :system_access do
|
|
include SessionHelpers
|
|
|
|
let_it_be(:user) { create(:user) }
|
|
|
|
it_behaves_like 'Base action controller' do
|
|
subject(:request) { get new_user_session_path }
|
|
end
|
|
|
|
context 'for authentication', :allow_forgery_protection do
|
|
it 'logout does not require a csrf token' do
|
|
login_as(user)
|
|
|
|
post(destroy_user_session_path, headers: { 'X-CSRF-Token' => 'invalid' })
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
|
|
context 'when user has pending invitations' do
|
|
it 'accepts the invitations and stores a user location' do
|
|
create(:group_member, :invited, invite_email: user.email)
|
|
member = create(:group_member, :invited, invite_email: user.email)
|
|
|
|
post user_session_path(user: { login: user.username, password: user.password })
|
|
|
|
expect(response).to redirect_to(group_path(member.source))
|
|
end
|
|
end
|
|
|
|
context 'when using two-factor authentication via OTP' do
|
|
let_it_be(:user) { create(:user, :two_factor, :invalid) }
|
|
let(:user_params) { { login: user.username, password: user.password } }
|
|
|
|
context 'with an invalid user' do
|
|
it 'raises StandardError when ActiveRecord::RecordInvalid is raised to return 500 instead of 422' do
|
|
otp = user.current_otp
|
|
|
|
expect { authenticate_2fa(otp_attempt: otp) }.to raise_error(StandardError)
|
|
end
|
|
end
|
|
|
|
context 'with an invalid record other than user' do
|
|
it 'raises ActiveRecord::RecordInvalid for invalid record to return 422f' do
|
|
otp = user.current_otp
|
|
allow_next_instance_of(ActiveRecord::RecordInvalid) do |instance|
|
|
allow(instance).to receive(:record).and_return(nil) # Simulate it's not a user
|
|
end
|
|
|
|
expect { authenticate_2fa(otp_attempt: otp) }.to raise_error(ActiveRecord::RecordInvalid)
|
|
end
|
|
end
|
|
|
|
def authenticate_2fa(otp_attempt:)
|
|
post(user_session_path(params: { user: user_params })) # First sign-in request for password, second for OTP
|
|
post(user_session_path(params: { user: user_params.merge(otp_attempt: otp_attempt) }))
|
|
end
|
|
end
|
|
end
|