Ghost/ghost/admin/tests/acceptance/signup-test.js
Sanne de Vries 3ae3e8142a 🎨 Redesigned user authentication pages (#2286)
Refs https://www.notion.so/ghost/Invite-staff-users-steps-in-setup-guide-367737e13d97450a98a0f39ec6b68181

* Simplified the selfhoster setup flow to one setup page only
* Redesigned the reset password pages and the signup page for new staff members

Co-authored-by: Daniel Lockyer <hi@daniellockyer.com>
2022-03-08 17:30:46 +00:00

214 lines
8.5 KiB
JavaScript

import {authenticateSession, invalidateSession} from 'ember-simple-auth/test-support';
import {blur, click, currentRouteName, fillIn, find} from '@ember/test-helpers';
import {describe, it} from 'mocha';
import {expect} from 'chai';
import {setupApplicationTest} from 'ember-mocha';
import {setupMirage} from 'ember-cli-mirage/test-support';
import {visit} from '../helpers/visit';
describe('Acceptance: Signup', function () {
let hooks = setupApplicationTest();
setupMirage(hooks);
it('can signup successfully', async function () {
let server = this.server;
server.get('/authentication/invitation', function () {
return {
invitation: [{valid: true}]
};
});
server.post('/authentication/invitation/', function ({users}, {requestBody}) {
let params = JSON.parse(requestBody);
expect(params.invitation[0].name).to.equal('Test User');
expect(params.invitation[0].email).to.equal('kevin+test2@ghost.org');
expect(params.invitation[0].password).to.equal('thisissupersafe');
expect(params.invitation[0].token).to.equal('MTQ3MDM0NjAxNzkyOXxrZXZpbit0ZXN0MkBnaG9zdC5vcmd8MmNEblFjM2c3ZlFUajluTks0aUdQU0dmdm9ta0xkWGY2OEZ1V2dTNjZVZz0');
// ensure that `/users/me/` request returns a user
let role = server.create('role', {name: 'Author'});
users.create({email: 'kevin@test2@ghost.org', roles: [role]});
return {
invitation: [{
message: 'Invitation accepted.'
}]
};
});
// token details:
// "1470346017929|kevin+test2@ghost.org|2cDnQc3g7fQTj9nNK4iGPSGfvomkLdXf68FuWgS66Ug="
await visit('/signup/MTQ3MDM0NjAxNzkyOXxrZXZpbit0ZXN0MkBnaG9zdC5vcmd8MmNEblFjM2c3ZlFUajluTks0aUdQU0dmdm9ta0xkWGY2OEZ1V2dTNjZVZz0');
expect(currentRouteName()).to.equal('signup');
// focus out in Name field triggers inline error
await blur('[data-test-input="name"]');
expect(
find('[data-test-input="name"]').closest('.form-group'),
'name field group has error class when empty'
).to.have.class('error');
expect(
find('[data-test-input="name"]').closest('.form-group').querySelector('.response').textContent,
'name inline-error text'
).to.have.string('Please enter a name');
// entering text in Name field clears error
await fillIn('[data-test-input="name"]', 'Test User');
await blur('[data-test-input="name"]');
expect(
find('[data-test-input="name"]').closest('.form-group'),
'name field loses error class after text input'
).to.not.have.class('error');
expect(
find('[data-test-input="name"]').closest('.form-group').querySelector('.response').textContent.trim(),
'name field error is removed after text input'
).to.be.empty;
// focus out in Email field triggers inline error
await click('[data-test-input="email"]');
await blur('[data-test-input="email"]');
expect(
find('[data-test-input="email"]').closest('.form-group'),
'email field group has error class when empty'
).to.have.class('error');
expect(
find('[data-test-input="email"]').closest('.form-group').querySelector('.response').textContent,
'email inline-error text'
).to.have.string('Please enter an email');
// entering text in email field clears error
await fillIn('[data-test-input="email"]', 'kevin+test2@ghost.org');
await blur('[data-test-input="email"]');
expect(
find('[data-test-input="email"]').closest('.form-group'),
'email field loses error class after text input'
).to.not.have.class('error');
expect(
find('[data-test-input="email"]').closest('.form-group').querySelector('.response').textContent.trim(),
'email field error is removed after text input'
).to.be.empty;
// check password validation
// focus out in password field triggers inline error
// no password
await click('[data-test-input="password"]');
await blur();
expect(
find('[data-test-input="password"]').closest('.form-group'),
'password field group has error class when empty'
).to.have.class('error');
expect(
find('[data-test-input="password"]').closest('.form-group').querySelector('.response').textContent,
'password field error text'
).to.have.string('must be at least 10 characters');
// password too short
await fillIn('[data-test-input="password"]', 'short');
await blur('[data-test-input="password"]');
expect(
find('[data-test-input="password"]').closest('.form-group').querySelector('.response').textContent,
'password field error text'
).to.have.string('must be at least 10 characters');
// password must not be a bad password
await fillIn('[data-test-input="password"]', '1234567890');
await blur('[data-test-input="password"]');
expect(
find('[data-test-input="password"]').closest('.form-group').querySelector('.response').textContent,
'password field error text'
).to.have.string('you cannot use an insecure password');
// password must not be a disallowed password
await fillIn('[data-test-input="password"]', 'password99');
await blur('[data-test-input="password"]');
expect(
find('[data-test-input="password"]').closest('.form-group').querySelector('.response').textContent,
'password field error text'
).to.have.string('you cannot use an insecure password');
// password must not have repeating characters
await fillIn('[data-test-input="password"]', '2222222222');
await blur('[data-test-input="password"]');
expect(
find('[data-test-input="password"]').closest('.form-group').querySelector('.response').textContent,
'password field error text'
).to.have.string('you cannot use an insecure password');
// entering valid text in Password field clears error
await fillIn('[data-test-input="password"]', 'thisissupersafe');
await blur('[data-test-input="password"]');
expect(
find('[data-test-input="password"]').closest('.form-group'),
'password field loses error class after text input'
).to.not.have.class('error');
expect(
find('[data-test-input="password"]').closest('.form-group').querySelector('.response').textContent.trim(),
'password field error is removed after text input'
).to.equal('');
// submitting sends correct details and redirects to content screen
await click('[data-test-button="signup"]');
expect(currentRouteName()).to.equal('site');
});
it('redirects if already logged in', async function () {
this.server.get('/authentication/invitation', function () {
return {
invitation: [{valid: true}]
};
});
let role = this.server.create('role', {name: 'Author'});
this.server.create('user', {roles: [role], slug: 'test-user'});
await authenticateSession();
// token details:
// "1470346017929|kevin+test2@ghost.org|2cDnQc3g7fQTj9nNK4iGPSGfvomkLdXf68FuWgS66Ug="
await visit('/signup/MTQ3MDM0NjAxNzkyOXxrZXZpbit0ZXN0MkBnaG9zdC5vcmd8MmNEblFjM2c3ZlFUajluTks0aUdQU0dmdm9ta0xkWGY2OEZ1V2dTNjZVZz0');
expect(currentRouteName()).to.equal('site');
expect(find('.gh-alert-content').textContent).to.have.string('sign out to register');
});
it('redirects with alert on invalid token', async function () {
await invalidateSession();
await visit('/signup/---invalid---');
expect(currentRouteName()).to.equal('signin');
expect(find('.gh-alert-content').textContent).to.have.string('Invalid token');
});
it('redirects with alert on non-existant or expired token', async function () {
this.server.get('/authentication/invitation', function () {
return {
invitation: [{valid: false}]
};
});
await invalidateSession();
await visit('/signup/expired');
expect(currentRouteName()).to.equal('signin');
expect(find('.gh-alert-content').textContent).to.have.string('not exist');
});
});