diff options
author | Robert Speicher <rspeicher@gmail.com> | 2015-07-10 16:08:39 -0400 |
---|---|---|
committer | Robert Speicher <rspeicher@gmail.com> | 2015-07-10 16:18:30 -0400 |
commit | 22724418d350001e2683b68fad65186af783d3f2 (patch) | |
tree | de5038198d8ab98bc9d592ce4a1437493010d30a /spec/controllers/profiles | |
parent | 526813581b042bc6abad60eb4e582be81620be77 (diff) | |
download | gitlab-ce-22724418d350001e2683b68fad65186af783d3f2.tar.gz |
Add User#disable_two_factor!rs-disable-2fa
This method encapsulates all the logic for disabling 2FA on a specific
User model.
Diffstat (limited to 'spec/controllers/profiles')
-rw-r--r-- | spec/controllers/profiles/two_factor_auths_controller_spec.rb | 13 |
1 files changed, 3 insertions, 10 deletions
diff --git a/spec/controllers/profiles/two_factor_auths_controller_spec.rb b/spec/controllers/profiles/two_factor_auths_controller_spec.rb index aa09f1a758d..f54706e3aa3 100644 --- a/spec/controllers/profiles/two_factor_auths_controller_spec.rb +++ b/spec/controllers/profiles/two_factor_auths_controller_spec.rb @@ -105,19 +105,12 @@ describe Profiles::TwoFactorAuthsController do end describe 'DELETE destroy' do - let(:user) { create(:user, :two_factor) } - let!(:codes) { user.generate_otp_backup_codes! } + let(:user) { create(:user, :two_factor) } - it 'clears all 2FA-related fields' do - expect(user).to be_two_factor_enabled - expect(user.otp_backup_codes).not_to be_nil - expect(user.encrypted_otp_secret).not_to be_nil + it 'disables two factor' do + expect(user).to receive(:disable_two_factor!) delete :destroy - - expect(user).not_to be_two_factor_enabled - expect(user.otp_backup_codes).to be_nil - expect(user.encrypted_otp_secret).to be_nil end it 'redirects to profile_account_path' do |