Provide shorthand to safelist an entire IP subnet

This commit is contained in:
Gonzalo Rodriguez 2018-03-26 18:00:02 -03:00
parent 27aab72d49
commit e907cc6b83
No known key found for this signature in database
GPG key ID: 5DB8B81B049B8AB1
3 changed files with 51 additions and 2 deletions

View file

@ -6,8 +6,9 @@ All notable changes to this project will be documented in this file.
### Added
- Shorthand for blocking an IP address `Rack::Attack.blocklist_ip("1.2.3.4")`
- Shorthand for blocking IP subnets `Rack::Attack.blocklist_ip("1.2.0.0/16")`
- Shorthand for blocking an IP subnet `Rack::Attack.blocklist_ip("1.2.0.0/16")`
- Shorthand for safelisting an IP address `Rack::Attack.safelist_ip("5.6.7.8")`
- Shorthand for safelisting an IP subnet `Rack::Attack.safelist_ip("5.6.0.0/16")`
- Throw helpful error message when using `allow2ban` but cache store is misconfigured ([#315](https://github.com/kickstarter/rack-attack/issues/315))
- Throw helpful error message when using `fail2ban` but cache store is misconfigured ([#315](https://github.com/kickstarter/rack-attack/issues/315))

View file

@ -45,7 +45,7 @@ class Rack::Attack
def safelist_ip(ip)
@ip_safelists ||= []
ip_safelist_proc = lambda { |request| ip == request.ip }
ip_safelist_proc = lambda { |request| IPAddr.new(ip).include?(IPAddr.new(request.ip)) }
@ip_safelists << Safelist.new(nil, ip_safelist_proc)
end

View file

@ -0,0 +1,48 @@
require_relative "../spec_helper"
describe "Safelisting an IP subnet" do
before do
Rack::Attack.blocklist("admin") do |request|
request.path == "/admin"
end
Rack::Attack.safelist_ip("5.6.0.0/16")
end
it "forbids request if blocklist condition is true and safelist is false" do
get "/admin", {}, "REMOTE_ADDR" => "5.7.0.0"
assert_equal 403, last_response.status
end
it "succeeds if blocklist condition is false and safelist is false" do
get "/", {}, "REMOTE_ADDR" => "5.7.0.0"
assert_equal 200, last_response.status
end
it "succeeds request if blocklist condition is false and safelist is true" do
get "/", {}, "REMOTE_ADDR" => "5.6.0.0"
assert_equal 200, last_response.status
end
it "succeeds request if both blocklist and safelist conditions are true" do
get "/admin", {}, "REMOTE_ADDR" => "5.6.255.255"
assert_equal 200, last_response.status
end
it "notifies when the request is safe" do
notification_type = nil
ActiveSupport::Notifications.subscribe("rack.attack") do |_name, _start, _finish, _id, request|
notification_type = request.env["rack.attack.match_type"]
end
get "/admin", {}, "REMOTE_ADDR" => "5.6.0.0"
assert_equal 200, last_response.status
assert_equal :safelist, notification_type
end
end