about summary refs log tree commit diff
path: root/spec/controllers/admin/two_factor_authentications_controller_spec.rb
diff options
context:
space:
mode:
authorEugen Rochko <eugen@zeonfederated.com>2022-07-05 02:41:40 +0200
committerGitHub <noreply@github.com>2022-07-05 02:41:40 +0200
commit44b2ee3485ba0845e5910cefcb4b1e2f84f34470 (patch)
treecc91189c9b36aaf0a04d339455c6d238992753a9 /spec/controllers/admin/two_factor_authentications_controller_spec.rb
parent1b4054256f9d3302b44f71627a23bb0902578867 (diff)
Add customizable user roles (#18641)
* Add customizable user roles

* Various fixes and improvements

* Add migration for old settings and fix tootctl role management
Diffstat (limited to 'spec/controllers/admin/two_factor_authentications_controller_spec.rb')
-rw-r--r--spec/controllers/admin/two_factor_authentications_controller_spec.rb51
1 files changed, 0 insertions, 51 deletions
diff --git a/spec/controllers/admin/two_factor_authentications_controller_spec.rb b/spec/controllers/admin/two_factor_authentications_controller_spec.rb
deleted file mode 100644
index c65095729..000000000
--- a/spec/controllers/admin/two_factor_authentications_controller_spec.rb
+++ /dev/null
@@ -1,51 +0,0 @@
-require 'rails_helper'
-require 'webauthn/fake_client'
-
-describe Admin::TwoFactorAuthenticationsController do
-  render_views
-
-  let(:user) { Fabricate(:user) }
-  before do
-    sign_in Fabricate(:user, admin: true), scope: :user
-  end
-
-  describe 'DELETE #destroy' do
-    context 'when user has OTP enabled' do
-      before do
-        user.update(otp_required_for_login: true)
-      end
-
-      it 'redirects to admin account page' do
-        delete :destroy, params: { user_id: user.id }
-
-        user.reload
-        expect(user.otp_enabled?).to eq false
-        expect(response).to redirect_to(admin_account_path(user.account_id))
-      end
-    end
-
-    context 'when user has OTP and WebAuthn enabled' do
-      let(:fake_client) { WebAuthn::FakeClient.new('http://test.host') }
-
-      before do
-        user.update(otp_required_for_login: true, webauthn_id: WebAuthn.generate_user_id)
-
-        public_key_credential = WebAuthn::Credential.from_create(fake_client.create)
-        Fabricate(:webauthn_credential,
-                  user_id: user.id,
-                  external_id: public_key_credential.id,
-                  public_key: public_key_credential.public_key,
-                  nickname: 'Security Key')
-      end
-
-      it 'redirects to admin account page' do
-        delete :destroy, params: { user_id: user.id }
-
-        user.reload
-        expect(user.otp_enabled?).to eq false
-        expect(user.webauthn_enabled?).to eq false
-        expect(response).to redirect_to(admin_account_path(user.account_id))
-      end
-    end
-  end
-end