Skip to content
Snippets Groups Projects
Unverified Commit 83db3f72 authored by Ahmad Farhat's avatar Ahmad Farhat Committed by GitHub
Browse files

Mark migrated users as verified (#4896)

parent da254662
Branches
No related tags found
No related merge requests found
...@@ -88,7 +88,7 @@ module Api ...@@ -88,7 +88,7 @@ module Api
user_hash[:password] = generate_secure_pwd if user_hash[:external_id].blank? user_hash[:password] = generate_secure_pwd if user_hash[:external_id].blank?
user = User.new(user_hash.merge(provider: 'greenlight', role:)) user = User.new(user_hash.merge(verified: true, provider: 'greenlight', role:))
return render_error(status: :bad_request, errors: user&.errors&.to_a) unless user.save return render_error(status: :bad_request, errors: user&.errors&.to_a) unless user.save
......
...@@ -235,6 +235,17 @@ RSpec.describe Api::V1::Migrations::ExternalController, type: :controller do ...@@ -235,6 +235,17 @@ RSpec.describe Api::V1::Migrations::ExternalController, type: :controller do
expect(user.authenticate('Password1!')).to be_falsy expect(user.authenticate('Password1!')).to be_falsy
end end
end end
it 'sets user to verified' do
encrypted_params = encrypt_params({ user: valid_user_params }, expires_in: 10.seconds)
expect_any_instance_of(described_class).to receive(:generate_secure_pwd).and_call_original
expect { post :create_user, params: { v2: { encrypted_params: } } }.to change(User, :count).from(0).to(1)
expect(ActionMailer::MailDeliveryJob).not_to have_been_enqueued
user = User.take
expect(user.verified?).to be true
end
end end
describe 'when decrypted params encapsulation is not conform' do describe 'when decrypted params encapsulation is not conform' do
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment