42 lines
1.3 KiB
Ruby
42 lines
1.3 KiB
Ruby
|
# frozen_string_literal: true
|
||
|
|
||
|
require 'rails_helper'
|
||
|
|
||
|
RSpec.describe 'Settings TwoFactorAuthenticationMethods' do
|
||
|
context 'when signed in' do
|
||
|
let(:user) { Fabricate(:user) }
|
||
|
|
||
|
before { sign_in user }
|
||
|
|
||
|
describe 'Managing 2FA methods' do
|
||
|
before { user.update(otp_required_for_login: true) }
|
||
|
|
||
|
it 'disables 2FA with challenge confirmation', :inline_jobs do
|
||
|
visit settings_two_factor_authentication_methods_path
|
||
|
expect(page)
|
||
|
.to have_content(I18n.t('settings.two_factor_authentication'))
|
||
|
.and have_private_cache_control
|
||
|
|
||
|
# Attempt to disable
|
||
|
click_on I18n.t('two_factor_authentication.disable')
|
||
|
expect(page)
|
||
|
.to have_title(I18n.t('challenge.prompt'))
|
||
|
|
||
|
# Fill in challenge form
|
||
|
fill_in 'form_challenge_current_password', with: user.password
|
||
|
emails = capture_emails do
|
||
|
expect { click_on I18n.t('challenge.confirm') }
|
||
|
.to change { user.reload.otp_required_for_login }.to(false)
|
||
|
end
|
||
|
|
||
|
expect(page)
|
||
|
.to have_content(I18n.t('two_factor_authentication.disabled_success'))
|
||
|
expect(emails.first)
|
||
|
.to be_present
|
||
|
.and(deliver_to(user.email))
|
||
|
.and(have_subject(I18n.t('devise.mailer.two_factor_disabled.subject')))
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|