diff options
author | jessib <jessib@riseup.net> | 2013-09-19 10:41:58 -0700 |
---|---|---|
committer | jessib <jessib@riseup.net> | 2013-09-19 10:41:58 -0700 |
commit | 16b8966a0df0104390ce95e35f1bb17f173f8d4d (patch) | |
tree | 58d277ef2dc9d3b8731501b91773cee04272bd26 /users/test/integration/browser | |
parent | 9e451421420abf520622e779443fb113ea3c4ce7 (diff) | |
parent | 165e417bc6ba66d51d74764db7b59279fb6a923f (diff) |
Merge pull request #82 from azul/feature/sessions-expire
Feature/sessions expire
Diffstat (limited to 'users/test/integration/browser')
-rw-r--r-- | users/test/integration/browser/account_test.rb | 11 | ||||
-rw-r--r-- | users/test/integration/browser/session_test.rb | 28 |
2 files changed, 28 insertions, 11 deletions
diff --git a/users/test/integration/browser/account_test.rb b/users/test/integration/browser/account_test.rb index 06f2401..8c2c997 100644 --- a/users/test/integration/browser/account_test.rb +++ b/users/test/integration/browser/account_test.rb @@ -45,17 +45,6 @@ class AccountTest < BrowserIntegrationTest assert page.has_content?("server failed") end - def submit_signup - username = "test_#{SecureRandom.urlsafe_base64}".downcase - password = SecureRandom.base64 - visit '/users/new' - fill_in 'Username', with: username - fill_in 'Password', with: password - fill_in 'Password confirmation', with: password - click_on 'Sign Up' - return username, password - end - def inject_malicious_js page.execute_script <<-EOJS var calc = new srp.Calculate(); diff --git a/users/test/integration/browser/session_test.rb b/users/test/integration/browser/session_test.rb new file mode 100644 index 0000000..bb4e8c9 --- /dev/null +++ b/users/test/integration/browser/session_test.rb @@ -0,0 +1,28 @@ +require 'test_helper' + +class SessionTest < BrowserIntegrationTest + + setup do + Capybara.current_driver = Capybara.javascript_driver + @username, password = submit_signup + end + + teardown do + user = User.find_by_login(@username) + id = user.identity + id.destroy + user.destroy + end + + test "valid session" do + assert page.has_content?("Welcome #{@username}") + end + + test "expired session" do + assert page.has_content?("Welcome #{@username}") + pretend_now_is(Time.now + 40.minutes) do + visit '/' + assert page.has_no_content?("Welcome #{@username}") + end + end +end |