sessions_controller_spec.rb 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284
  1. # frozen_string_literal: true
  2. require 'rails_helper'
  3. RSpec.describe Auth::SessionsController, type: :controller do
  4. render_views
  5. describe 'GET #new' do
  6. before do
  7. request.env['devise.mapping'] = Devise.mappings[:user]
  8. end
  9. it 'returns http success' do
  10. get :new
  11. expect(response).to have_http_status(200)
  12. end
  13. end
  14. describe 'DELETE #destroy' do
  15. let(:user) { Fabricate(:user) }
  16. before do
  17. request.env['devise.mapping'] = Devise.mappings[:user]
  18. end
  19. context 'with a regular user' do
  20. it 'redirects to home after sign out' do
  21. sign_in(user, scope: :user)
  22. delete :destroy
  23. expect(response).to redirect_to(new_user_session_path)
  24. end
  25. it 'does not delete redirect location with continue=true' do
  26. sign_in(user, scope: :user)
  27. controller.store_location_for(:user, '/authorize')
  28. delete :destroy, params: { continue: 'true' }
  29. expect(controller.stored_location_for(:user)).to eq '/authorize'
  30. end
  31. end
  32. context 'with a suspended user' do
  33. it 'redirects to home after sign out' do
  34. Fabricate(:account, user: user, suspended: true)
  35. sign_in(user, scope: :user)
  36. delete :destroy
  37. expect(response).to redirect_to(new_user_session_path)
  38. end
  39. end
  40. end
  41. describe 'POST #create' do
  42. before do
  43. request.env['devise.mapping'] = Devise.mappings[:user]
  44. end
  45. if ENV['PAM_ENABLED'] == 'true'
  46. context 'using PAM authentication' do
  47. context 'using a valid password' do
  48. before do
  49. post :create, params: { user: { email: "pam_user1", password: '123456' } }
  50. end
  51. it 'redirects to home' do
  52. expect(response).to redirect_to(root_path)
  53. end
  54. it 'logs the user in' do
  55. expect(controller.current_user).to be_instance_of(User)
  56. end
  57. end
  58. context 'using an invalid password' do
  59. before do
  60. post :create, params: { user: { email: "pam_user1", password: 'WRONGPW' } }
  61. end
  62. it 'shows a login error' do
  63. expect(flash[:alert]).to match I18n.t('devise.failure.invalid', authentication_keys: 'Email')
  64. end
  65. it "doesn't log the user in" do
  66. expect(controller.current_user).to be_nil
  67. end
  68. end
  69. context 'using a valid email and existing user' do
  70. let(:user) do
  71. account = Fabricate.build(:account, username: 'pam_user1')
  72. account.save!(validate: false)
  73. user = Fabricate(:user, email: 'pam@example.com', password: nil, account: account)
  74. user
  75. end
  76. before do
  77. post :create, params: { user: { email: user.email, password: '123456' } }
  78. end
  79. it 'redirects to home' do
  80. expect(response).to redirect_to(root_path)
  81. end
  82. it 'logs the user in' do
  83. expect(controller.current_user).to eq user
  84. end
  85. end
  86. end
  87. end
  88. context 'using password authentication' do
  89. let(:user) { Fabricate(:user, email: 'foo@bar.com', password: 'abcdefgh') }
  90. context 'using a valid password' do
  91. before do
  92. post :create, params: { user: { email: user.email, password: user.password } }
  93. end
  94. it 'redirects to home' do
  95. expect(response).to redirect_to(root_path)
  96. end
  97. it 'logs the user in' do
  98. expect(controller.current_user).to eq user
  99. end
  100. end
  101. context 'using email with uppercase letters' do
  102. before do
  103. post :create, params: { user: { email: user.email.upcase, password: user.password } }
  104. end
  105. it 'redirects to home' do
  106. expect(response).to redirect_to(root_path)
  107. end
  108. it 'logs the user in' do
  109. expect(controller.current_user).to eq user
  110. end
  111. end
  112. context 'using an invalid password' do
  113. before do
  114. post :create, params: { user: { email: user.email, password: 'wrongpw' } }
  115. end
  116. it 'shows a login error' do
  117. expect(flash[:alert]).to match I18n.t('devise.failure.invalid', authentication_keys: 'Email')
  118. end
  119. it "doesn't log the user in" do
  120. expect(controller.current_user).to be_nil
  121. end
  122. end
  123. context 'using an unconfirmed password' do
  124. before do
  125. request.headers['Accept-Language'] = accept_language
  126. post :create, params: { user: { email: unconfirmed_user.email, password: unconfirmed_user.password } }
  127. end
  128. let(:unconfirmed_user) { user.tap { |u| u.update!(confirmed_at: nil) } }
  129. let(:accept_language) { 'fr' }
  130. it 'shows a translated login error' do
  131. expect(flash[:alert]).to eq(I18n.t('devise.failure.unconfirmed', locale: accept_language))
  132. end
  133. end
  134. context "logging in from the user's page" do
  135. before do
  136. allow(controller).to receive(:single_user_mode?).and_return(single_user_mode)
  137. allow(controller).to receive(:stored_location_for).with(:user).and_return("/@#{user.account.username}")
  138. post :create, params: { user: { email: user.email, password: user.password } }
  139. end
  140. context "in single user mode" do
  141. let(:single_user_mode) { true }
  142. it 'redirects to home' do
  143. expect(response).to redirect_to(root_path)
  144. end
  145. end
  146. context "in non-single user mode" do
  147. let(:single_user_mode) { false }
  148. it "redirects back to the user's page" do
  149. expect(response).to redirect_to(short_account_path(username: user.account))
  150. end
  151. end
  152. end
  153. end
  154. context 'using two-factor authentication' do
  155. let(:user) do
  156. Fabricate(:user, email: 'x@y.com', password: 'abcdefgh',
  157. otp_required_for_login: true, otp_secret: User.generate_otp_secret(32))
  158. end
  159. let(:recovery_codes) do
  160. codes = user.generate_otp_backup_codes!
  161. user.save
  162. return codes
  163. end
  164. context 'using email and password' do
  165. before do
  166. post :create, params: { user: { email: user.email, password: user.password } }
  167. end
  168. it 'renders two factor authentication page' do
  169. expect(controller).to render_template("two_factor")
  170. end
  171. end
  172. context 'using upcase email and password' do
  173. before do
  174. post :create, params: { user: { email: user.email.upcase, password: user.password } }
  175. end
  176. it 'renders two factor authentication page' do
  177. expect(controller).to render_template("two_factor")
  178. end
  179. end
  180. context 'using a valid OTP' do
  181. before do
  182. post :create, params: { user: { otp_attempt: user.current_otp } }, session: { otp_user_id: user.id }
  183. end
  184. it 'redirects to home' do
  185. expect(response).to redirect_to(root_path)
  186. end
  187. it 'logs the user in' do
  188. expect(controller.current_user).to eq user
  189. end
  190. end
  191. context 'when the server has an decryption error' do
  192. before do
  193. allow_any_instance_of(User).to receive(:validate_and_consume_otp!).and_raise(OpenSSL::Cipher::CipherError)
  194. post :create, params: { user: { otp_attempt: user.current_otp } }, session: { otp_user_id: user.id }
  195. end
  196. it 'shows a login error' do
  197. expect(flash[:alert]).to match I18n.t('users.invalid_otp_token')
  198. end
  199. it "doesn't log the user in" do
  200. expect(controller.current_user).to be_nil
  201. end
  202. end
  203. context 'using a valid recovery code' do
  204. before do
  205. post :create, params: { user: { otp_attempt: recovery_codes.first } }, session: { otp_user_id: user.id }
  206. end
  207. it 'redirects to home' do
  208. expect(response).to redirect_to(root_path)
  209. end
  210. it 'logs the user in' do
  211. expect(controller.current_user).to eq user
  212. end
  213. end
  214. context 'using an invalid OTP' do
  215. before do
  216. post :create, params: { user: { otp_attempt: 'wrongotp' } }, session: { otp_user_id: user.id }
  217. end
  218. it 'shows a login error' do
  219. expect(flash[:alert]).to match I18n.t('users.invalid_otp_token')
  220. end
  221. it "doesn't log the user in" do
  222. expect(controller.current_user).to be_nil
  223. end
  224. end
  225. end
  226. end
  227. end