mirror of
https://akkoma.dev/AkkomaGang/akkoma.git
synced 2024-12-28 11:13:57 +00:00
98cb255d12
OTP builds to 1.15
Changelog entry
Ensure policies are fully loaded
Fix :warn
use main branch for linkify
Fix warn in tests
Migrations for phoenix 1.17
Revert "Migrations for phoenix 1.17"
This reverts commit 6a3b2f15b7
.
Oban upgrade
Add default empty whitelist
mix format
limit test to amd64
OTP 26 tests for 1.15
use OTP_VERSION tag
baka
just 1.15
Massive deps update
Update locale, deps
Mix format
shell????
multiline???
?
max cases 1
use assert_recieve
don't put_env in async tests
don't async conn/fs tests
mix format
FIx some uploader issues
Fix tests
97 lines
3.2 KiB
Elixir
97 lines
3.2 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.Plugs.EnsureAuthenticatedPlugTest do
|
|
use Pleroma.Web.ConnCase, async: false
|
|
|
|
alias Pleroma.User
|
|
alias Pleroma.Web.Plugs.EnsureAuthenticatedPlug
|
|
|
|
describe "without :if_func / :unless_func options" do
|
|
test "it halts if user is NOT assigned", %{conn: conn} do
|
|
conn = EnsureAuthenticatedPlug.call(conn, %{})
|
|
|
|
assert conn.status == 403
|
|
assert conn.halted == true
|
|
end
|
|
|
|
test "it continues if a user is assigned", %{conn: conn} do
|
|
conn = assign(conn, :user, %User{})
|
|
ret_conn = EnsureAuthenticatedPlug.call(conn, %{})
|
|
|
|
refute ret_conn.halted
|
|
end
|
|
end
|
|
|
|
test "it halts if user is assigned and MFA enabled", %{conn: conn} do
|
|
conn =
|
|
conn
|
|
|> assign(:user, %User{multi_factor_authentication_settings: %{enabled: true}})
|
|
|> assign(:auth_credentials, %{password: "xd-42"})
|
|
|> EnsureAuthenticatedPlug.call(%{})
|
|
|
|
assert conn.status == 403
|
|
assert conn.halted == true
|
|
|
|
assert conn.resp_body ==
|
|
"{\"error\":\"Two-factor authentication enabled, you must use a access token.\"}"
|
|
end
|
|
|
|
test "it continues if user is assigned and MFA disabled", %{conn: conn} do
|
|
conn =
|
|
conn
|
|
|> assign(:user, %User{multi_factor_authentication_settings: %{enabled: false}})
|
|
|> assign(:auth_credentials, %{password: "xd-42"})
|
|
|> EnsureAuthenticatedPlug.call(%{})
|
|
|
|
refute conn.status == 403
|
|
refute conn.halted
|
|
end
|
|
|
|
describe "with :if_func / :unless_func options" do
|
|
setup do
|
|
%{
|
|
true_fn: fn _conn -> true end,
|
|
false_fn: fn _conn -> false end
|
|
}
|
|
end
|
|
|
|
test "it continues if a user is assigned", %{conn: conn, true_fn: true_fn, false_fn: false_fn} do
|
|
conn = assign(conn, :user, %User{})
|
|
refute EnsureAuthenticatedPlug.call(conn, if_func: true_fn).halted
|
|
refute EnsureAuthenticatedPlug.call(conn, if_func: false_fn).halted
|
|
refute EnsureAuthenticatedPlug.call(conn, unless_func: true_fn).halted
|
|
refute EnsureAuthenticatedPlug.call(conn, unless_func: false_fn).halted
|
|
end
|
|
|
|
test "it continues if a user is NOT assigned but :if_func evaluates to `false`",
|
|
%{conn: conn, false_fn: false_fn} do
|
|
ret_conn = EnsureAuthenticatedPlug.call(conn, if_func: false_fn)
|
|
refute ret_conn.halted
|
|
end
|
|
|
|
test "it continues if a user is NOT assigned but :unless_func evaluates to `true`",
|
|
%{conn: conn, true_fn: true_fn} do
|
|
ret_conn = EnsureAuthenticatedPlug.call(conn, unless_func: true_fn)
|
|
refute ret_conn.halted
|
|
end
|
|
|
|
test "it halts if a user is NOT assigned and :if_func evaluates to `true`",
|
|
%{conn: conn, true_fn: true_fn} do
|
|
conn = EnsureAuthenticatedPlug.call(conn, if_func: true_fn)
|
|
|
|
assert conn.status == 403
|
|
assert conn.halted == true
|
|
end
|
|
|
|
test "it halts if a user is NOT assigned and :unless_func evaluates to `false`",
|
|
%{conn: conn, false_fn: false_fn} do
|
|
conn = EnsureAuthenticatedPlug.call(conn, unless_func: false_fn)
|
|
|
|
assert conn.status == 403
|
|
assert conn.halted == true
|
|
end
|
|
end
|
|
end
|