2018-12-23 13:11:29 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-12 23:49:20 -07:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 13:11:29 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2020-06-23 09:16:47 -06:00
|
|
|
defmodule Pleroma.Web.Plugs.AdminSecretAuthenticationPlugTest do
|
2023-08-01 04:43:50 -06:00
|
|
|
use Pleroma.Web.ConnCase, async: false
|
2023-08-04 05:50:50 -06:00
|
|
|
@moduletag :mocked
|
2020-07-14 02:58:41 -06:00
|
|
|
|
|
|
|
import Mock
|
2018-12-18 13:08:52 -07:00
|
|
|
import Pleroma.Factory
|
|
|
|
|
2020-06-24 02:18:42 -06:00
|
|
|
alias Pleroma.Web.Plugs.AdminSecretAuthenticationPlug
|
|
|
|
alias Pleroma.Web.Plugs.OAuthScopesPlug
|
|
|
|
alias Pleroma.Web.Plugs.PlugHelper
|
|
|
|
alias Pleroma.Web.Plugs.RateLimiter
|
2018-12-18 13:08:52 -07:00
|
|
|
|
|
|
|
test "does nothing if a user is assigned", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|
|
|
|
ret_conn =
|
|
|
|
conn
|
|
|
|
|> AdminSecretAuthenticationPlug.call(%{})
|
|
|
|
|
|
|
|
assert conn == ret_conn
|
|
|
|
end
|
|
|
|
|
2019-11-19 01:58:20 -07:00
|
|
|
describe "when secret set it assigns an admin user" do
|
2020-03-20 09:33:00 -06:00
|
|
|
setup do: clear_config([:admin_token])
|
2020-02-13 11:55:47 -07:00
|
|
|
|
2020-07-14 02:58:41 -06:00
|
|
|
setup_with_mocks([{RateLimiter, [:passthrough], []}]) do
|
|
|
|
:ok
|
|
|
|
end
|
|
|
|
|
2019-11-19 01:58:20 -07:00
|
|
|
test "with `admin_token` query parameter", %{conn: conn} do
|
2021-01-26 10:58:43 -07:00
|
|
|
clear_config(:admin_token, "password123")
|
2018-12-18 13:08:52 -07:00
|
|
|
|
2019-11-19 01:58:20 -07:00
|
|
|
conn =
|
|
|
|
%{conn | params: %{"admin_token" => "wrong_password"}}
|
|
|
|
|> AdminSecretAuthenticationPlug.call(%{})
|
2018-12-18 13:08:52 -07:00
|
|
|
|
2019-11-19 01:58:20 -07:00
|
|
|
refute conn.assigns[:user]
|
2020-07-14 02:58:41 -06:00
|
|
|
assert called(RateLimiter.call(conn, name: :authentication))
|
2018-12-18 13:08:52 -07:00
|
|
|
|
2019-11-19 01:58:20 -07:00
|
|
|
conn =
|
|
|
|
%{conn | params: %{"admin_token" => "password123"}}
|
|
|
|
|> AdminSecretAuthenticationPlug.call(%{})
|
|
|
|
|
|
|
|
assert conn.assigns[:user].is_admin
|
2020-10-31 04:38:35 -06:00
|
|
|
assert conn.assigns[:token] == nil
|
2020-07-19 12:35:57 -06:00
|
|
|
assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
|
2019-11-19 01:58:20 -07:00
|
|
|
end
|
|
|
|
|
|
|
|
test "with `x-admin-token` HTTP header", %{conn: conn} do
|
2021-01-26 10:58:43 -07:00
|
|
|
clear_config(:admin_token, "☕️")
|
2019-11-19 01:58:20 -07:00
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("x-admin-token", "🥛")
|
|
|
|
|> AdminSecretAuthenticationPlug.call(%{})
|
|
|
|
|
|
|
|
refute conn.assigns[:user]
|
2020-07-14 02:58:41 -06:00
|
|
|
assert called(RateLimiter.call(conn, name: :authentication))
|
2019-11-19 01:58:20 -07:00
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("x-admin-token", "☕️")
|
|
|
|
|> AdminSecretAuthenticationPlug.call(%{})
|
2018-12-18 13:08:52 -07:00
|
|
|
|
2019-11-19 01:58:20 -07:00
|
|
|
assert conn.assigns[:user].is_admin
|
2020-10-31 04:38:35 -06:00
|
|
|
assert conn.assigns[:token] == nil
|
2020-07-19 12:35:57 -06:00
|
|
|
assert PlugHelper.plug_skipped?(conn, OAuthScopesPlug)
|
2019-11-19 01:58:20 -07:00
|
|
|
end
|
2018-12-18 13:08:52 -07:00
|
|
|
end
|
|
|
|
end
|