diff options
author | Azul <azul@leap.se> | 2013-08-30 10:44:15 +0200 |
---|---|---|
committer | Azul <azul@leap.se> | 2013-09-03 08:54:25 +0200 |
commit | 0d44e39d2ec591c9ab98464b93a0c867ca96e02a (patch) | |
tree | 9bd972cd0260d3011fa41084feb211ac99e6c443 /users/test/integration/browser/account_test.rb | |
parent | 83068449b1c874bb5d09a3e189fe7d7669c25780 (diff) |
cleanup records after running user integration tests
Diffstat (limited to 'users/test/integration/browser/account_test.rb')
-rw-r--r-- | users/test/integration/browser/account_test.rb | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/users/test/integration/browser/account_test.rb b/users/test/integration/browser/account_test.rb index b412980..3df0794 100644 --- a/users/test/integration/browser/account_test.rb +++ b/users/test/integration/browser/account_test.rb @@ -18,6 +18,10 @@ class AccountTest < BrowserIntegrationTest click_on 'Logout' assert page.has_content?("Sign Up") assert_equal '/', current_path + assert user = User.find_by_login(username) + assert id = user.identity + id.destroy + user.destroy end # trying to seed an invalid A for srp login @@ -30,6 +34,7 @@ class AccountTest < BrowserIntegrationTest click_on 'Log In' assert page.has_content?("Invalid random key") assert page.has_no_content?("Welcome") + user.destroy end def inject_malicious_js |