mitgliederverwaltung/test/support/conn_case.ex
Moritz 075a06ba6f
Refactor test setup: use global setup and fix MembershipFees domain alias
- Remove redundant setup blocks from member_live tests
- Add build_unauthenticated_conn helper for AuthController tests
- Add global setup in conn_case.ex
2026-01-13 15:15:56 +01:00

164 lines
5.3 KiB
Elixir

defmodule MvWeb.ConnCase do
@moduledoc """
This module defines the test case to be used by
tests that require setting up a connection.
Such tests rely on `Phoenix.ConnTest` and also
import other functionality to make it easier
to build common data structures and query the data layer.
Finally, if the test case interacts with the database,
we enable the SQL sandbox, so changes done to the database
are reverted at the end of every test. If you are using
PostgreSQL, you can even run database tests asynchronously
by setting `use MvWeb.ConnCase, async: true`, although
this option is not recommended for other databases.
"""
use ExUnit.CaseTemplate
using do
quote do
# The default endpoint for testing
@endpoint MvWeb.Endpoint
use MvWeb, :verified_routes
# Import conveniences for testing with connections
import Plug.Conn
import Phoenix.ConnTest
import MvWeb.ConnCase
end
end
@doc """
Creates a test user and returns the user struct.
Accepts attrs to override default values.
Password handling:
- If `hashed_password` is provided in attrs, it's used directly
- If `password` is provided in attrs, it gets hashed automatically
- If neither is provided, uses default password "password"
## Examples
create_test_user() # Default user with unique email
create_test_user(%{email: "custom@example.com"}) # Custom email
create_test_user(%{password: "secret123"}) # Custom password (gets hashed)
create_test_user(%{hashed_password: "$2b$..."}) # Pre-hashed password
"""
def create_test_user(attrs \\ %{}) do
# Generate unique values to avoid conflicts
unique_id = System.unique_integer([:positive])
default_attrs = %{
email: "user#{unique_id}@example.com",
oidc_id: "oidc#{unique_id}"
}
# Merge provided attrs with defaults
user_attrs = Map.merge(default_attrs, attrs)
# Handle password/hashed_password
final_attrs =
cond do
# If hashed_password is already provided, use it as-is
Map.has_key?(user_attrs, :hashed_password) ->
user_attrs
# If password is provided, hash it
Map.has_key?(user_attrs, :password) ->
password = Map.get(user_attrs, :password)
{:ok, hashed_password} = AshAuthentication.BcryptProvider.hash(password)
user_attrs
# Remove plain password
|> Map.delete(:password)
|> Map.put(:hashed_password, hashed_password)
# Neither provided, use default password
true ->
password = "password"
{:ok, hashed_password} = AshAuthentication.BcryptProvider.hash(password)
Map.put(user_attrs, :hashed_password, hashed_password)
end
Ash.Seed.seed!(Mv.Accounts.User, final_attrs)
end
@doc """
Signs in a user via OIDC for testing by creating a session with the user's token.
"""
def sign_in_user_via_oidc(conn, user) do
# Mock OIDC sign-in by creating a token directly
conn
|> Phoenix.ConnTest.init_test_session(%{})
|> AshAuthentication.Plug.Helpers.store_in_session(user)
end
@doc """
Signs in a user via OIDC and returns a connection with the user authenticated.
By default creates a user with "user@example.com" for consistency.
The user will have an admin role for authorization.
"""
def conn_with_oidc_user(conn, user_attrs \\ %{}) do
# Ensure unique email for OIDC users
unique_id = System.unique_integer([:positive])
default_attrs = %{
email: "oidc.user#{unique_id}@example.com",
oidc_id: "oidc_#{unique_id}"
}
# Create user using Ash.Seed (supports oidc_id)
user = create_test_user(Map.merge(default_attrs, user_attrs))
# Create admin role and assign it
admin_role = Mv.Fixtures.role_fixture("admin")
{:ok, user} =
user
|> Ash.Changeset.for_update(:update, %{})
|> Ash.Changeset.manage_relationship(:role, admin_role, type: :append_and_remove)
|> Ash.update()
# Load role for authorization
user_with_role = Ash.load!(user, :role, domain: Mv.Accounts)
sign_in_user_via_oidc(conn, user_with_role)
end
@doc """
Signs in a user via password authentication and returns a connection with the user authenticated.
"""
def conn_with_password_user(conn, user) do
conn
|> Phoenix.ConnTest.init_test_session(%{})
|> AshAuthentication.Plug.Helpers.store_in_session(user)
end
@doc """
Creates a connection with an authenticated user that has an admin role.
This is useful for tests that need full access to resources.
"""
def conn_with_admin_user(conn) do
admin_user = Mv.Fixtures.user_with_role_fixture("admin")
conn_with_password_user(conn, admin_user)
end
setup tags do
pid = Mv.DataCase.setup_sandbox(tags)
conn = Phoenix.ConnTest.build_conn()
# Set metadata for Phoenix.Ecto.SQL.Sandbox plug to allow LiveView processes
# to share the test's database connection in async tests
conn = Plug.Conn.put_private(conn, :ecto_sandbox, pid)
# Create admin user with role for all tests (unless test overrides with its own user)
# This ensures all tests have an authenticated user with proper authorization
admin_user = Mv.Fixtures.user_with_role_fixture("admin")
authenticated_conn = conn_with_password_user(conn, admin_user)
{:ok, conn: authenticated_conn, current_user: admin_user}
end
end