mirror of
https://github.com/samsonjs/rack-attack.git
synced 2026-04-27 15:07:41 +00:00
Merge commit '8fcd6c855915c802adeeb1784c503fc74115f5a3' into 6-stable
This commit is contained in:
commit
64f879395d
10 changed files with 237 additions and 150 deletions
|
|
@ -342,6 +342,11 @@ end
|
||||||
While Rack::Attack's primary focus is minimizing harm from abusive clients, it
|
While Rack::Attack's primary focus is minimizing harm from abusive clients, it
|
||||||
can also be used to return rate limit data that's helpful for well-behaved clients.
|
can also be used to return rate limit data that's helpful for well-behaved clients.
|
||||||
|
|
||||||
|
If you want to return to user how many seconds to wait until he can start sending requests again, this can be done through enabling `Retry-After` header:
|
||||||
|
```ruby
|
||||||
|
Rack::Attack.throttled_response_retry_after_header = true
|
||||||
|
```
|
||||||
|
|
||||||
Here's an example response that includes conventional `RateLimit-*` headers:
|
Here's an example response that includes conventional `RateLimit-*` headers:
|
||||||
|
|
||||||
```ruby
|
```ruby
|
||||||
|
|
|
||||||
|
|
@ -2,9 +2,10 @@
|
||||||
|
|
||||||
require 'rack'
|
require 'rack'
|
||||||
require 'forwardable'
|
require 'forwardable'
|
||||||
|
require 'rack/attack/cache'
|
||||||
|
require 'rack/attack/configuration'
|
||||||
require 'rack/attack/path_normalizer'
|
require 'rack/attack/path_normalizer'
|
||||||
require 'rack/attack/request'
|
require 'rack/attack/request'
|
||||||
require "ipaddr"
|
|
||||||
|
|
||||||
require 'rack/attack/railtie' if defined?(::Rails)
|
require 'rack/attack/railtie' if defined?(::Rails)
|
||||||
|
|
||||||
|
|
@ -14,7 +15,6 @@ module Rack
|
||||||
class MisconfiguredStoreError < Error; end
|
class MisconfiguredStoreError < Error; end
|
||||||
class MissingStoreError < Error; end
|
class MissingStoreError < Error; end
|
||||||
|
|
||||||
autoload :Cache, 'rack/attack/cache'
|
|
||||||
autoload :Check, 'rack/attack/check'
|
autoload :Check, 'rack/attack/check'
|
||||||
autoload :Throttle, 'rack/attack/throttle'
|
autoload :Throttle, 'rack/attack/throttle'
|
||||||
autoload :Safelist, 'rack/attack/safelist'
|
autoload :Safelist, 'rack/attack/safelist'
|
||||||
|
|
@ -31,82 +31,8 @@ module Rack
|
||||||
autoload :Allow2Ban, 'rack/attack/allow2ban'
|
autoload :Allow2Ban, 'rack/attack/allow2ban'
|
||||||
|
|
||||||
class << self
|
class << self
|
||||||
attr_accessor :enabled, :notifier, :blocklisted_response, :throttled_response,
|
attr_accessor :enabled, :notifier
|
||||||
:anonymous_blocklists, :anonymous_safelists
|
attr_reader :configuration
|
||||||
|
|
||||||
def safelist(name = nil, &block)
|
|
||||||
safelist = Safelist.new(name, &block)
|
|
||||||
|
|
||||||
if name
|
|
||||||
safelists[name] = safelist
|
|
||||||
else
|
|
||||||
anonymous_safelists << safelist
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
def blocklist(name = nil, &block)
|
|
||||||
blocklist = Blocklist.new(name, &block)
|
|
||||||
|
|
||||||
if name
|
|
||||||
blocklists[name] = blocklist
|
|
||||||
else
|
|
||||||
anonymous_blocklists << blocklist
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
def blocklist_ip(ip_address)
|
|
||||||
anonymous_blocklists << Blocklist.new { |request| IPAddr.new(ip_address).include?(IPAddr.new(request.ip)) }
|
|
||||||
end
|
|
||||||
|
|
||||||
def safelist_ip(ip_address)
|
|
||||||
anonymous_safelists << Safelist.new { |request| IPAddr.new(ip_address).include?(IPAddr.new(request.ip)) }
|
|
||||||
end
|
|
||||||
|
|
||||||
def throttle(name, options, &block)
|
|
||||||
throttles[name] = Throttle.new(name, options, &block)
|
|
||||||
end
|
|
||||||
|
|
||||||
def track(name, options = {}, &block)
|
|
||||||
tracks[name] = Track.new(name, options, &block)
|
|
||||||
end
|
|
||||||
|
|
||||||
def safelists
|
|
||||||
@safelists ||= {}
|
|
||||||
end
|
|
||||||
|
|
||||||
def blocklists
|
|
||||||
@blocklists ||= {}
|
|
||||||
end
|
|
||||||
|
|
||||||
def throttles
|
|
||||||
@throttles ||= {}
|
|
||||||
end
|
|
||||||
|
|
||||||
def tracks
|
|
||||||
@tracks ||= {}
|
|
||||||
end
|
|
||||||
|
|
||||||
def safelisted?(request)
|
|
||||||
anonymous_safelists.any? { |safelist| safelist.matched_by?(request) } ||
|
|
||||||
safelists.any? { |_name, safelist| safelist.matched_by?(request) }
|
|
||||||
end
|
|
||||||
|
|
||||||
def blocklisted?(request)
|
|
||||||
anonymous_blocklists.any? { |blocklist| blocklist.matched_by?(request) } ||
|
|
||||||
blocklists.any? { |_name, blocklist| blocklist.matched_by?(request) }
|
|
||||||
end
|
|
||||||
|
|
||||||
def throttled?(request)
|
|
||||||
throttles.any? do |_name, throttle|
|
|
||||||
throttle.matched_by?(request)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
def tracked?(request)
|
|
||||||
tracks.each_value do |track|
|
|
||||||
track.matched_by?(request)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
def instrument(request)
|
def instrument(request)
|
||||||
if notifier
|
if notifier
|
||||||
|
|
@ -122,34 +48,44 @@ module Rack
|
||||||
@cache ||= Cache.new
|
@cache ||= Cache.new
|
||||||
end
|
end
|
||||||
|
|
||||||
def clear_configuration
|
|
||||||
@safelists = {}
|
|
||||||
@blocklists = {}
|
|
||||||
@throttles = {}
|
|
||||||
@tracks = {}
|
|
||||||
self.anonymous_blocklists = []
|
|
||||||
self.anonymous_safelists = []
|
|
||||||
end
|
|
||||||
|
|
||||||
def clear!
|
def clear!
|
||||||
warn "[DEPRECATION] Rack::Attack.clear! is deprecated. Please use Rack::Attack.clear_configuration instead"
|
warn "[DEPRECATION] Rack::Attack.clear! is deprecated. Please use Rack::Attack.clear_configuration instead"
|
||||||
clear_configuration
|
@configuration.clear_configuration
|
||||||
end
|
end
|
||||||
|
|
||||||
|
extend Forwardable
|
||||||
|
def_delegators(
|
||||||
|
:@configuration,
|
||||||
|
:safelist,
|
||||||
|
:blocklist,
|
||||||
|
:blocklist_ip,
|
||||||
|
:safelist_ip,
|
||||||
|
:throttle,
|
||||||
|
:track,
|
||||||
|
:blocklisted_response,
|
||||||
|
:blocklisted_response=,
|
||||||
|
:throttled_response,
|
||||||
|
:throttled_response=,
|
||||||
|
:throttled_response_retry_after_header,
|
||||||
|
:throttled_response_retry_after_header=,
|
||||||
|
:clear_configuration,
|
||||||
|
:safelists,
|
||||||
|
:blocklists,
|
||||||
|
:throttles,
|
||||||
|
:tracks
|
||||||
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
# Set defaults
|
# Set defaults
|
||||||
@enabled = true
|
@enabled = true
|
||||||
@anonymous_blocklists = []
|
|
||||||
@anonymous_safelists = []
|
|
||||||
@notifier = ActiveSupport::Notifications if defined?(ActiveSupport::Notifications)
|
@notifier = ActiveSupport::Notifications if defined?(ActiveSupport::Notifications)
|
||||||
@blocklisted_response = lambda { |_env| [403, { 'Content-Type' => 'text/plain' }, ["Forbidden\n"]] }
|
@configuration = Configuration.new
|
||||||
@throttled_response = lambda do |env|
|
|
||||||
retry_after = (env['rack.attack.match_data'] || {})[:period]
|
attr_reader :configuration
|
||||||
[429, { 'Content-Type' => 'text/plain', 'Retry-After' => retry_after.to_s }, ["Retry later\n"]]
|
|
||||||
end
|
|
||||||
|
|
||||||
def initialize(app)
|
def initialize(app)
|
||||||
@app = app
|
@app = app
|
||||||
|
@configuration = self.class.configuration
|
||||||
end
|
end
|
||||||
|
|
||||||
def call(env)
|
def call(env)
|
||||||
|
|
@ -159,19 +95,16 @@ module Rack
|
||||||
env['PATH_INFO'] = PathNormalizer.normalize_path(env['PATH_INFO'])
|
env['PATH_INFO'] = PathNormalizer.normalize_path(env['PATH_INFO'])
|
||||||
request = Rack::Attack::Request.new(env)
|
request = Rack::Attack::Request.new(env)
|
||||||
|
|
||||||
if safelisted?(request)
|
if configuration.safelisted?(request)
|
||||||
@app.call(env)
|
@app.call(env)
|
||||||
elsif blocklisted?(request)
|
elsif configuration.blocklisted?(request)
|
||||||
self.class.blocklisted_response.call(env)
|
configuration.blocklisted_response.call(env)
|
||||||
elsif throttled?(request)
|
elsif configuration.throttled?(request)
|
||||||
self.class.throttled_response.call(env)
|
configuration.throttled_response.call(env)
|
||||||
else
|
else
|
||||||
tracked?(request)
|
configuration.tracked?(request)
|
||||||
@app.call(env)
|
@app.call(env)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
extend Forwardable
|
|
||||||
def_delegators self, :safelisted?, :blocklisted?, :throttled?, :tracked?
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
||||||
107
lib/rack/attack/configuration.rb
Normal file
107
lib/rack/attack/configuration.rb
Normal file
|
|
@ -0,0 +1,107 @@
|
||||||
|
# frozen_string_literal: true
|
||||||
|
|
||||||
|
require "ipaddr"
|
||||||
|
|
||||||
|
module Rack
|
||||||
|
class Attack
|
||||||
|
class Configuration
|
||||||
|
DEFAULT_BLOCKLISTED_RESPONSE = lambda { |_env| [403, { 'Content-Type' => 'text/plain' }, ["Forbidden\n"]] }
|
||||||
|
|
||||||
|
DEFAULT_THROTTLED_RESPONSE = lambda do |env|
|
||||||
|
if Rack::Attack.configuration.throttled_response_retry_after_header
|
||||||
|
match_data = env['rack.attack.match_data']
|
||||||
|
now = match_data[:epoch_time]
|
||||||
|
retry_after = match_data[:period] - (now % match_data[:period])
|
||||||
|
|
||||||
|
[429, { 'Content-Type' => 'text/plain', 'Retry-After' => retry_after.to_s }, ["Retry later\n"]]
|
||||||
|
else
|
||||||
|
[429, { 'Content-Type' => 'text/plain' }, ["Retry later\n"]]
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
attr_reader :safelists, :blocklists, :throttles, :anonymous_blocklists, :anonymous_safelists
|
||||||
|
attr_accessor :blocklisted_response, :throttled_response, :throttled_response_retry_after_header
|
||||||
|
|
||||||
|
def initialize
|
||||||
|
set_defaults
|
||||||
|
end
|
||||||
|
|
||||||
|
def safelist(name = nil, &block)
|
||||||
|
safelist = Safelist.new(name, &block)
|
||||||
|
|
||||||
|
if name
|
||||||
|
@safelists[name] = safelist
|
||||||
|
else
|
||||||
|
@anonymous_safelists << safelist
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def blocklist(name = nil, &block)
|
||||||
|
blocklist = Blocklist.new(name, &block)
|
||||||
|
|
||||||
|
if name
|
||||||
|
@blocklists[name] = blocklist
|
||||||
|
else
|
||||||
|
@anonymous_blocklists << blocklist
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def blocklist_ip(ip_address)
|
||||||
|
@anonymous_blocklists << Blocklist.new { |request| IPAddr.new(ip_address).include?(IPAddr.new(request.ip)) }
|
||||||
|
end
|
||||||
|
|
||||||
|
def safelist_ip(ip_address)
|
||||||
|
@anonymous_safelists << Safelist.new { |request| IPAddr.new(ip_address).include?(IPAddr.new(request.ip)) }
|
||||||
|
end
|
||||||
|
|
||||||
|
def throttle(name, options, &block)
|
||||||
|
@throttles[name] = Throttle.new(name, options, &block)
|
||||||
|
end
|
||||||
|
|
||||||
|
def track(name, options = {}, &block)
|
||||||
|
@tracks[name] = Track.new(name, options, &block)
|
||||||
|
end
|
||||||
|
|
||||||
|
def safelisted?(request)
|
||||||
|
@anonymous_safelists.any? { |safelist| safelist.matched_by?(request) } ||
|
||||||
|
@safelists.any? { |_name, safelist| safelist.matched_by?(request) }
|
||||||
|
end
|
||||||
|
|
||||||
|
def blocklisted?(request)
|
||||||
|
@anonymous_blocklists.any? { |blocklist| blocklist.matched_by?(request) } ||
|
||||||
|
@blocklists.any? { |_name, blocklist| blocklist.matched_by?(request) }
|
||||||
|
end
|
||||||
|
|
||||||
|
def throttled?(request)
|
||||||
|
@throttles.any? do |_name, throttle|
|
||||||
|
throttle.matched_by?(request)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def tracked?(request)
|
||||||
|
@tracks.each_value do |track|
|
||||||
|
track.matched_by?(request)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def clear_configuration
|
||||||
|
set_defaults
|
||||||
|
end
|
||||||
|
|
||||||
|
private
|
||||||
|
|
||||||
|
def set_defaults
|
||||||
|
@safelists = {}
|
||||||
|
@blocklists = {}
|
||||||
|
@throttles = {}
|
||||||
|
@tracks = {}
|
||||||
|
@anonymous_blocklists = []
|
||||||
|
@anonymous_safelists = []
|
||||||
|
@throttled_response_retry_after_header = false
|
||||||
|
|
||||||
|
@blocklisted_response = DEFAULT_BLOCKLISTED_RESPONSE
|
||||||
|
@throttled_response = DEFAULT_THROTTLED_RESPONSE
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
@ -15,33 +15,17 @@ module Rack
|
||||||
#
|
#
|
||||||
# So in order to workaround this we use RedisCacheStore#write (which sets expiration) to initialize
|
# So in order to workaround this we use RedisCacheStore#write (which sets expiration) to initialize
|
||||||
# the counter. After that we continue using the original RedisCacheStore#increment.
|
# the counter. After that we continue using the original RedisCacheStore#increment.
|
||||||
rescuing do
|
if options[:expires_in] && !read(name)
|
||||||
if options[:expires_in] && !read(name)
|
write(name, amount, options)
|
||||||
write(name, amount, options)
|
|
||||||
|
|
||||||
amount
|
amount
|
||||||
else
|
else
|
||||||
super
|
super
|
||||||
end
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
def read(*_args)
|
|
||||||
rescuing { super }
|
|
||||||
end
|
|
||||||
|
|
||||||
def write(name, value, options = {})
|
def write(name, value, options = {})
|
||||||
rescuing do
|
super(name, value, options.merge!(raw: true))
|
||||||
super(name, value, options.merge!(raw: true))
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
private
|
|
||||||
|
|
||||||
def rescuing
|
|
||||||
yield
|
|
||||||
rescue Redis::BaseError
|
|
||||||
nil
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
||||||
|
|
@ -47,7 +47,7 @@ module Rack
|
||||||
|
|
||||||
def rescuing
|
def rescuing
|
||||||
yield
|
yield
|
||||||
rescue Redis::BaseError
|
rescue Redis::BaseConnectionError
|
||||||
nil
|
nil
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
||||||
|
|
@ -23,34 +23,50 @@ module Rack
|
||||||
|
|
||||||
def matched_by?(request)
|
def matched_by?(request)
|
||||||
discriminator = block.call(request)
|
discriminator = block.call(request)
|
||||||
|
|
||||||
return false unless discriminator
|
return false unless discriminator
|
||||||
|
|
||||||
current_period = period.respond_to?(:call) ? period.call(request) : period
|
current_period = period_for(request)
|
||||||
current_limit = limit.respond_to?(:call) ? limit.call(request) : limit
|
current_limit = limit_for(request)
|
||||||
key = "#{name}:#{discriminator}"
|
count = cache.count("#{name}:#{discriminator}", current_period)
|
||||||
count = cache.count(key, current_period)
|
|
||||||
epoch_time = cache.last_epoch_time
|
|
||||||
|
|
||||||
data = {
|
data = {
|
||||||
discriminator: discriminator,
|
discriminator: discriminator,
|
||||||
count: count,
|
count: count,
|
||||||
period: current_period,
|
period: current_period,
|
||||||
limit: current_limit,
|
limit: current_limit,
|
||||||
epoch_time: epoch_time
|
epoch_time: cache.last_epoch_time
|
||||||
}
|
}
|
||||||
|
|
||||||
(request.env['rack.attack.throttle_data'] ||= {})[name] = data
|
|
||||||
|
|
||||||
(count > current_limit).tap do |throttled|
|
(count > current_limit).tap do |throttled|
|
||||||
|
annotate_request_with_throttle_data(request, data)
|
||||||
if throttled
|
if throttled
|
||||||
request.env['rack.attack.matched'] = name
|
annotate_request_with_matched_data(request, data)
|
||||||
request.env['rack.attack.match_discriminator'] = discriminator
|
|
||||||
request.env['rack.attack.match_type'] = type
|
|
||||||
request.env['rack.attack.match_data'] = data
|
|
||||||
Rack::Attack.instrument(request)
|
Rack::Attack.instrument(request)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
private
|
||||||
|
|
||||||
|
def period_for(request)
|
||||||
|
period.respond_to?(:call) ? period.call(request) : period
|
||||||
|
end
|
||||||
|
|
||||||
|
def limit_for(request)
|
||||||
|
limit.respond_to?(:call) ? limit.call(request) : limit
|
||||||
|
end
|
||||||
|
|
||||||
|
def annotate_request_with_throttle_data(request, data)
|
||||||
|
(request.env['rack.attack.throttle_data'] ||= {})[name] = data
|
||||||
|
end
|
||||||
|
|
||||||
|
def annotate_request_with_matched_data(request, data)
|
||||||
|
request.env['rack.attack.matched'] = name
|
||||||
|
request.env['rack.attack.match_discriminator'] = data[:discriminator]
|
||||||
|
request.env['rack.attack.match_type'] = type
|
||||||
|
request.env['rack.attack.match_data'] = data
|
||||||
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
||||||
|
|
@ -20,7 +20,7 @@ describe "#throttle" do
|
||||||
get "/", {}, "REMOTE_ADDR" => "1.2.3.4"
|
get "/", {}, "REMOTE_ADDR" => "1.2.3.4"
|
||||||
|
|
||||||
assert_equal 429, last_response.status
|
assert_equal 429, last_response.status
|
||||||
assert_equal "60", last_response.headers["Retry-After"]
|
assert_nil last_response.headers["Retry-After"]
|
||||||
assert_equal "Retry later\n", last_response.body
|
assert_equal "Retry later\n", last_response.body
|
||||||
|
|
||||||
get "/", {}, "REMOTE_ADDR" => "5.6.7.8"
|
get "/", {}, "REMOTE_ADDR" => "5.6.7.8"
|
||||||
|
|
@ -34,6 +34,24 @@ describe "#throttle" do
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
it "returns correct Retry-After header if enabled" do
|
||||||
|
Rack::Attack.throttled_response_retry_after_header = true
|
||||||
|
|
||||||
|
Rack::Attack.throttle("by ip", limit: 1, period: 60) do |request|
|
||||||
|
request.ip
|
||||||
|
end
|
||||||
|
|
||||||
|
Timecop.freeze(Time.at(0)) do
|
||||||
|
get "/", {}, "REMOTE_ADDR" => "1.2.3.4"
|
||||||
|
assert_equal 200, last_response.status
|
||||||
|
end
|
||||||
|
|
||||||
|
Timecop.freeze(Time.at(25)) do
|
||||||
|
get "/", {}, "REMOTE_ADDR" => "1.2.3.4"
|
||||||
|
assert_equal "35", last_response.headers["Retry-After"]
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
it "supports limit to be dynamic" do
|
it "supports limit to be dynamic" do
|
||||||
# Could be used to have different rate limits for authorized
|
# Could be used to have different rate limits for authorized
|
||||||
# vs general requests
|
# vs general requests
|
||||||
|
|
|
||||||
|
|
@ -13,7 +13,11 @@ OfflineExamples = Minitest::SharedExamples.new do
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'should count' do
|
it 'should count' do
|
||||||
@cache.send(:do_count, 'rack::attack::cache-test-key', 1)
|
@cache.count('cache-test-key', 1)
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'should delete' do
|
||||||
|
@cache.delete('cache-test-key')
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
@ -29,6 +33,18 @@ if defined?(::ActiveSupport::Cache::RedisStore)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
if defined?(Redis) && defined?(ActiveSupport::Cache::RedisCacheStore) && Redis::VERSION >= '4'
|
||||||
|
describe 'when Redis is offline' do
|
||||||
|
include OfflineExamples
|
||||||
|
|
||||||
|
before do
|
||||||
|
@cache = Rack::Attack::Cache.new
|
||||||
|
# Use presumably unused port for Redis client
|
||||||
|
@cache.store = ActiveSupport::Cache::RedisCacheStore.new(host: '127.0.0.1', port: 3333)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
if defined?(::Dalli)
|
if defined?(::Dalli)
|
||||||
describe 'when Memcached is offline' do
|
describe 'when Memcached is offline' do
|
||||||
include OfflineExamples
|
include OfflineExamples
|
||||||
|
|
@ -46,6 +62,23 @@ if defined?(::Dalli)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
if defined?(::Dalli) && defined?(::ActiveSupport::Cache::MemCacheStore)
|
||||||
|
describe 'when Memcached is offline' do
|
||||||
|
include OfflineExamples
|
||||||
|
|
||||||
|
before do
|
||||||
|
Dalli.logger.level = Logger::FATAL
|
||||||
|
|
||||||
|
@cache = Rack::Attack::Cache.new
|
||||||
|
@cache.store = ActiveSupport::Cache::MemCacheStore.new('127.0.0.1:22122')
|
||||||
|
end
|
||||||
|
|
||||||
|
after do
|
||||||
|
Dalli.logger.level = Logger::INFO
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
if defined?(Redis)
|
if defined?(Redis)
|
||||||
describe 'when Redis is offline' do
|
describe 'when Redis is offline' do
|
||||||
include OfflineExamples
|
include OfflineExamples
|
||||||
|
|
|
||||||
|
|
@ -57,10 +57,6 @@ describe 'Rack::Attack.throttle' do
|
||||||
|
|
||||||
_(last_request.env['rack.attack.match_discriminator']).must_equal('1.2.3.4')
|
_(last_request.env['rack.attack.match_discriminator']).must_equal('1.2.3.4')
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'should set a Retry-After header' do
|
|
||||||
_(last_response.headers['Retry-After']).must_equal @period.to_s
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -30,16 +30,11 @@ class MiniTest::Spec
|
||||||
|
|
||||||
before do
|
before do
|
||||||
Rails.cache = nil
|
Rails.cache = nil
|
||||||
@_original_throttled_response = Rack::Attack.throttled_response
|
|
||||||
@_original_blocklisted_response = Rack::Attack.blocklisted_response
|
|
||||||
end
|
end
|
||||||
|
|
||||||
after do
|
after do
|
||||||
Rack::Attack.clear_configuration
|
Rack::Attack.clear_configuration
|
||||||
Rack::Attack.instance_variable_set(:@cache, nil)
|
Rack::Attack.instance_variable_set(:@cache, nil)
|
||||||
|
|
||||||
Rack::Attack.throttled_response = @_original_throttled_response
|
|
||||||
Rack::Attack.blocklisted_response = @_original_blocklisted_response
|
|
||||||
end
|
end
|
||||||
|
|
||||||
def app
|
def app
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue