[#1940] Reinstated OAuth-less `admin_token` authentication. Refactored UserIsAdminPlu...
[akkoma] / test / plugs / admin_secret_authentication_plug_test.exs
1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
4
5 defmodule Pleroma.Plugs.AdminSecretAuthenticationPlugTest do
6 use Pleroma.Web.ConnCase, async: true
7 import Pleroma.Factory
8
9 alias Pleroma.Plugs.AdminSecretAuthenticationPlug
10 alias Pleroma.Plugs.OAuthScopesPlug
11 alias Pleroma.Plugs.PlugHelper
12
13 test "does nothing if a user is assigned", %{conn: conn} do
14 user = insert(:user)
15
16 conn =
17 conn
18 |> assign(:user, user)
19
20 ret_conn =
21 conn
22 |> AdminSecretAuthenticationPlug.call(%{})
23
24 assert conn == ret_conn
25 end
26
27 describe "when secret set it assigns an admin user" do
28 setup do: clear_config([:admin_token])
29
30 test "with `admin_token` query parameter", %{conn: conn} do
31 Pleroma.Config.put(:admin_token, "password123")
32
33 conn =
34 %{conn | params: %{"admin_token" => "wrong_password"}}
35 |> AdminSecretAuthenticationPlug.call(%{})
36
37 refute conn.assigns[:user]
38
39 conn =
40 %{conn | params: %{"admin_token" => "password123"}}
41 |> AdminSecretAuthenticationPlug.call(%{})
42
43 assert conn.assigns[:user].is_admin
44 assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
45 end
46
47 test "with `x-admin-token` HTTP header", %{conn: conn} do
48 Pleroma.Config.put(:admin_token, "☕️")
49
50 conn =
51 conn
52 |> put_req_header("x-admin-token", "🥛")
53 |> AdminSecretAuthenticationPlug.call(%{})
54
55 refute conn.assigns[:user]
56
57 conn =
58 conn
59 |> put_req_header("x-admin-token", "☕️")
60 |> AdminSecretAuthenticationPlug.call(%{})
61
62 assert conn.assigns[:user].is_admin
63 assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
64 end
65 end
66 end