diff options
author | jessib <jessib@riseup.net> | 2013-09-09 13:54:29 -0700 |
---|---|---|
committer | jessib <jessib@riseup.net> | 2013-09-09 13:54:29 -0700 |
commit | e8a2db42813dc3f5d1ebb95eb896455d7a922505 (patch) | |
tree | 8b97e98adb5c7c2a6c093faf2cbc6bf014cb52cc /users/test | |
parent | 3ef22b5a856e1f576fb0a6a589b6b7ab41e1dd18 (diff) | |
parent | e11c158a15d54aea0eaefe698e7466634bacf204 (diff) |
Merge branch 'develop' into feature/only_lower_case_aliases
Diffstat (limited to 'users/test')
-rw-r--r-- | users/test/integration/browser/account_test.rb | 12 |
1 files changed, 11 insertions, 1 deletions
diff --git a/users/test/integration/browser/account_test.rb b/users/test/integration/browser/account_test.rb index 8b214a4..a5ec2c5 100644 --- a/users/test/integration/browser/account_test.rb +++ b/users/test/integration/browser/account_test.rb @@ -18,10 +18,20 @@ class AccountTest < BrowserIntegrationTest user.destroy end + test "successful login" do + username, password = submit_signup + click_on 'Logout' + click_on 'Log In' + fill_in 'Username', with: username + fill_in 'Password', with: password + click_on 'Log In' + assert page.has_content?("Welcome #{username}") + end + # trying to seed an invalid A for srp login test "detects attempt to circumvent SRP" do user = FactoryGirl.create :user - visit '/sessions/new' + visit '/login' fill_in 'Username', with: user.login fill_in 'Password', with: "password" inject_malicious_js |