Testing protected Phoenix controller endpoints
Bypassing your own authorization can be a bit tricky. Here’s a short guide on easily writing phoenix controller tests for endpoints requiring authorization, without simulating a user login every time.
Read next Registration for SpawnFest is open!