summaryrefslogtreecommitdiff
path: root/users/test
diff options
context:
space:
mode:
authorjessib <jessib@riseup.net>2013-09-09 13:54:29 -0700
committerjessib <jessib@riseup.net>2013-09-09 13:54:29 -0700
commite8a2db42813dc3f5d1ebb95eb896455d7a922505 (patch)
tree8b97e98adb5c7c2a6c093faf2cbc6bf014cb52cc /users/test
parent3ef22b5a856e1f576fb0a6a589b6b7ab41e1dd18 (diff)
parente11c158a15d54aea0eaefe698e7466634bacf204 (diff)
Merge branch 'develop' into feature/only_lower_case_aliases
Diffstat (limited to 'users/test')
-rw-r--r--users/test/integration/browser/account_test.rb12
1 files changed, 11 insertions, 1 deletions
diff --git a/users/test/integration/browser/account_test.rb b/users/test/integration/browser/account_test.rb
index 8b214a4..a5ec2c5 100644
--- a/users/test/integration/browser/account_test.rb
+++ b/users/test/integration/browser/account_test.rb
@@ -18,10 +18,20 @@ class AccountTest < BrowserIntegrationTest
user.destroy
end
+ test "successful login" do
+ username, password = submit_signup
+ click_on 'Logout'
+ click_on 'Log In'
+ fill_in 'Username', with: username
+ fill_in 'Password', with: password
+ click_on 'Log In'
+ assert page.has_content?("Welcome #{username}")
+ end
+
# trying to seed an invalid A for srp login
test "detects attempt to circumvent SRP" do
user = FactoryGirl.create :user
- visit '/sessions/new'
+ visit '/login'
fill_in 'Username', with: user.login
fill_in 'Password', with: "password"
inject_malicious_js