1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Plugs.AdminSecretAuthenticationPlugTest do
6 use Pleroma.Web.ConnCase, async: true
9 alias Pleroma.Plugs.AdminSecretAuthenticationPlug
10 alias Pleroma.Plugs.OAuthScopesPlug
11 alias Pleroma.Plugs.PlugHelper
13 test "does nothing if a user is assigned", %{conn: conn} do
18 |> assign(:user, user)
22 |> AdminSecretAuthenticationPlug.call(%{})
24 assert conn == ret_conn
27 describe "when secret set it assigns an admin user" do
28 setup do: clear_config([:admin_token])
30 test "with `admin_token` query parameter", %{conn: conn} do
31 Pleroma.Config.put(:admin_token, "password123")
34 %{conn | params: %{"admin_token" => "wrong_password"}}
35 |> AdminSecretAuthenticationPlug.call(%{})
37 refute conn.assigns[:user]
40 %{conn | params: %{"admin_token" => "password123"}}
41 |> AdminSecretAuthenticationPlug.call(%{})
43 assert conn.assigns[:user].is_admin
44 assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
47 test "with `x-admin-token` HTTP header", %{conn: conn} do
48 Pleroma.Config.put(:admin_token, "☕️")
52 |> put_req_header("x-admin-token", "🥛")
53 |> AdminSecretAuthenticationPlug.call(%{})
55 refute conn.assigns[:user]
59 |> put_req_header("x-admin-token", "☕️")
60 |> AdminSecretAuthenticationPlug.call(%{})
62 assert conn.assigns[:user].is_admin
63 assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)