mirror of
https://github.com/samsonjs/rack-attack.git
synced 2026-03-25 09:25:49 +00:00
107 lines
3 KiB
Ruby
107 lines
3 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require_relative "../spec_helper"
|
|
|
|
describe "#safelist" do
|
|
let(:notifications) { [] }
|
|
|
|
before do
|
|
Rack::Attack.blocklist do |request|
|
|
request.ip == "1.2.3.4"
|
|
end
|
|
|
|
Rack::Attack.safelist do |request|
|
|
request.path == "/safe_space"
|
|
end
|
|
end
|
|
|
|
it "forbids request if blocklist condition is true and safelist is false" do
|
|
get "/", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 403, last_response.status
|
|
end
|
|
|
|
it "succeeds if blocklist condition is false and safelist is false" do
|
|
get "/", {}, "REMOTE_ADDR" => "5.6.7.8"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "succeeds request if blocklist condition is false and safelist is true" do
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "5.6.7.8"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "succeeds request if both blocklist and safelist conditions are true" do
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "notifies when the request is safe" do
|
|
ActiveSupport::Notifications.subscribe("rack.attack") do |_name, _start, _finish, _id, payload|
|
|
notifications.push(payload)
|
|
end
|
|
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 200, last_response.status
|
|
assert_equal 1, notifications.size
|
|
notification = notifications.pop
|
|
assert_nil notification[:request].env["rack.attack.matched"]
|
|
assert_equal :safelist, notification[:request].env["rack.attack.match_type"]
|
|
end
|
|
end
|
|
|
|
describe "#safelist with name" do
|
|
let(:notifications) { [] }
|
|
|
|
before do
|
|
Rack::Attack.blocklist("block 1.2.3.4") do |request|
|
|
request.ip == "1.2.3.4"
|
|
end
|
|
|
|
Rack::Attack.safelist("safe path") do |request|
|
|
request.path == "/safe_space"
|
|
end
|
|
end
|
|
|
|
it "forbids request if blocklist condition is true and safelist is false" do
|
|
get "/", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 403, last_response.status
|
|
end
|
|
|
|
it "succeeds if blocklist condition is false and safelist is false" do
|
|
get "/", {}, "REMOTE_ADDR" => "5.6.7.8"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "succeeds request if blocklist condition is false and safelist is true" do
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "5.6.7.8"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "succeeds request if both blocklist and safelist conditions are true" do
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "notifies when the request is safe" do
|
|
ActiveSupport::Notifications.subscribe("safelist.rack_attack") do |_name, _start, _finish, _id, payload|
|
|
notifications.push(payload)
|
|
end
|
|
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 200, last_response.status
|
|
assert_equal 1, notifications.size
|
|
notification = notifications.pop
|
|
assert_equal "safe path", notification[:request].env["rack.attack.matched"]
|
|
assert_equal :safelist, notification[:request].env["rack.attack.match_type"]
|
|
end
|
|
end
|