projects
/
akkoma
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
CommonAPI Tests: Check that undoing objects federates them as embeds.
[akkoma]
/
test
/
web
/
oauth
/
ldap_authorization_test.exs
diff --git
a/test/web/oauth/ldap_authorization_test.exs
b/test/web/oauth/ldap_authorization_test.exs
index 570e41f3e440bb10ec896c42d70882229568d3cf..011642c0874d13dc31e0455bffd1ab5022d73e4c 100644
(file)
--- a/
test/web/oauth/ldap_authorization_test.exs
+++ b/
test/web/oauth/ldap_authorization_test.exs
@@
-1,5
+1,5
@@
# Pleroma: A lightweight social networking server
# Pleroma: A lightweight social networking server
-# Copyright © 2017-20
19
Pleroma Authors <https://pleroma.social/>
+# Copyright © 2017-20
20
Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do
@@
-10,24
+10,16
@@
defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do
import ExUnit.CaptureLog
import Mock
import ExUnit.CaptureLog
import Mock
- setup_all do
- ldap_authenticator = Pleroma.Config.get([Pleroma.Web.Auth.Authenticator])
- ldap_enabled = Pleroma.Config.get([:ldap, :enabled])
+ @skip if !Code.ensure_loaded?(:eldap), do: :skip
- on_exit(fn ->
- Pleroma.Config.put([Pleroma.Web.Auth.Authenticator], ldap_authenticator)
- Pleroma.Config.put([:ldap, :enabled], ldap_enabled)
- end)
+ setup_all do: clear_config([:ldap, :enabled], true)
- Pleroma.Config.put([Pleroma.Web.Auth.Authenticator], Pleroma.Web.Auth.LDAPAuthenticator)
- Pleroma.Config.put([:ldap, :enabled], true)
-
- :ok
- end
+ setup_all do: clear_config(Pleroma.Web.Auth.Authenticator, Pleroma.Web.Auth.LDAPAuthenticator)
+ @tag @skip
test "authorizes the existing user using LDAP credentials" do
password = "testpassword"
test "authorizes the existing user using LDAP credentials" do
password = "testpassword"
- user = insert(:user, password_hash:
Comeonin.Pbkdf2.hashpw
salt(password))
+ user = insert(:user, password_hash:
Pbkdf2.hash_pwd_
salt(password))
app = insert(:oauth_app, scopes: ["read", "write"])
host = Pleroma.Config.get([:ldap, :host]) |> to_charlist
app = insert(:oauth_app, scopes: ["read", "write"])
host = Pleroma.Config.get([:ldap, :host]) |> to_charlist
@@
-63,6
+55,7
@@
defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do
end
end
end
end
+ @tag @skip
test "creates a new user after successful LDAP authorization" do
password = "testpassword"
user = build(:user)
test "creates a new user after successful LDAP authorization" do
password = "testpassword"
user = build(:user)
@@
-108,9
+101,10
@@
defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do
end
end
end
end
+ @tag @skip
test "falls back to the default authorization when LDAP is unavailable" do
password = "testpassword"
test "falls back to the default authorization when LDAP is unavailable" do
password = "testpassword"
- user = insert(:user, password_hash:
Comeonin.Pbkdf2.hashpw
salt(password))
+ user = insert(:user, password_hash:
Pbkdf2.hash_pwd_
salt(password))
app = insert(:oauth_app, scopes: ["read", "write"])
host = Pleroma.Config.get([:ldap, :host]) |> to_charlist
app = insert(:oauth_app, scopes: ["read", "write"])
host = Pleroma.Config.get([:ldap, :host]) |> to_charlist
@@
-151,9
+145,10
@@
defmodule Pleroma.Web.OAuth.LDAPAuthorizationTest do
end
end
end
end
+ @tag @skip
test "disallow authorization for wrong LDAP credentials" do
password = "testpassword"
test "disallow authorization for wrong LDAP credentials" do
password = "testpassword"
- user = insert(:user, password_hash:
Comeonin.Pbkdf2.hashpw
salt(password))
+ user = insert(:user, password_hash:
Pbkdf2.hash_pwd_
salt(password))
app = insert(:oauth_app, scopes: ["read", "write"])
host = Pleroma.Config.get([:ldap, :host]) |> to_charlist
app = insert(:oauth_app, scopes: ["read", "write"])
host = Pleroma.Config.get([:ldap, :host]) |> to_charlist