mirror of
https://github.com/samsonjs/rack-attack.git
synced 2026-03-25 09:25:49 +00:00
146 lines
4.2 KiB
Ruby
146 lines
4.2 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require_relative 'spec_helper'
|
|
|
|
describe 'Rack::Attack.throttle' do
|
|
before do
|
|
@period = 60 # Use a long period; failures due to cache key rotation less likely
|
|
Rack::Attack.cache.store = ActiveSupport::Cache::MemoryStore.new
|
|
Rack::Attack.throttle('ip/sec', limit: 1, period: @period) { |req| req.ip }
|
|
end
|
|
|
|
it('should have a throttle') { Rack::Attack.throttles.key?('ip/sec') }
|
|
|
|
it_allows_ok_requests
|
|
|
|
describe 'a single request' do
|
|
before { get '/', {}, 'REMOTE_ADDR' => '1.2.3.4' }
|
|
|
|
it 'should set the counter for one request' do
|
|
key = "rack::attack:#{Time.now.to_i / @period}:ip/sec:1.2.3.4"
|
|
_(Rack::Attack.cache.store.read(key)).must_equal 1
|
|
end
|
|
|
|
it 'should populate throttle data' do
|
|
data = {
|
|
count: 1,
|
|
limit: 1,
|
|
period: @period,
|
|
epoch_time: Rack::Attack.cache.last_epoch_time.to_i,
|
|
discriminator: "1.2.3.4"
|
|
}
|
|
|
|
_(last_request.env['rack.attack.throttle_data']['ip/sec']).must_equal data
|
|
end
|
|
end
|
|
|
|
describe "with 2 requests" do
|
|
before do
|
|
2.times { get '/', {}, 'REMOTE_ADDR' => '1.2.3.4' }
|
|
end
|
|
|
|
it 'should block the last request' do
|
|
_(last_response.status).must_equal 429
|
|
end
|
|
|
|
it 'should tag the env' do
|
|
_(last_request.env['rack.attack.matched']).must_equal 'ip/sec'
|
|
_(last_request.env['rack.attack.match_type']).must_equal :throttle
|
|
|
|
_(last_request.env['rack.attack.match_data']).must_equal(
|
|
count: 2,
|
|
limit: 1,
|
|
period: @period,
|
|
epoch_time: Rack::Attack.cache.last_epoch_time.to_i,
|
|
discriminator: "1.2.3.4"
|
|
)
|
|
|
|
_(last_request.env['rack.attack.match_discriminator']).must_equal('1.2.3.4')
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'Rack::Attack.throttle with limit as proc' do
|
|
before do
|
|
@period = 60 # Use a long period; failures due to cache key rotation less likely
|
|
Rack::Attack.cache.store = ActiveSupport::Cache::MemoryStore.new
|
|
Rack::Attack.throttle('ip/sec', limit: lambda { |_req| 1 }, period: @period) { |req| req.ip }
|
|
end
|
|
|
|
it_allows_ok_requests
|
|
|
|
describe 'a single request' do
|
|
before { get '/', {}, 'REMOTE_ADDR' => '1.2.3.4' }
|
|
|
|
it 'should set the counter for one request' do
|
|
key = "rack::attack:#{Time.now.to_i / @period}:ip/sec:1.2.3.4"
|
|
_(Rack::Attack.cache.store.read(key)).must_equal 1
|
|
end
|
|
|
|
it 'should populate throttle data' do
|
|
data = {
|
|
count: 1,
|
|
limit: 1,
|
|
period: @period,
|
|
epoch_time: Rack::Attack.cache.last_epoch_time.to_i,
|
|
discriminator: "1.2.3.4"
|
|
}
|
|
|
|
_(last_request.env['rack.attack.throttle_data']['ip/sec']).must_equal data
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'Rack::Attack.throttle with period as proc' do
|
|
before do
|
|
@period = 60 # Use a long period; failures due to cache key rotation less likely
|
|
Rack::Attack.cache.store = ActiveSupport::Cache::MemoryStore.new
|
|
Rack::Attack.throttle('ip/sec', limit: lambda { |_req| 1 }, period: lambda { |_req| @period }) { |req| req.ip }
|
|
end
|
|
|
|
it_allows_ok_requests
|
|
|
|
describe 'a single request' do
|
|
before { get '/', {}, 'REMOTE_ADDR' => '1.2.3.4' }
|
|
|
|
it 'should set the counter for one request' do
|
|
key = "rack::attack:#{Time.now.to_i / @period}:ip/sec:1.2.3.4"
|
|
_(Rack::Attack.cache.store.read(key)).must_equal 1
|
|
end
|
|
|
|
it 'should populate throttle data' do
|
|
data = {
|
|
count: 1,
|
|
limit: 1,
|
|
period: @period,
|
|
epoch_time: Rack::Attack.cache.last_epoch_time.to_i,
|
|
discriminator: "1.2.3.4"
|
|
}
|
|
|
|
_(last_request.env['rack.attack.throttle_data']['ip/sec']).must_equal data
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'Rack::Attack.throttle with block retuning nil' do
|
|
before do
|
|
@period = 60
|
|
Rack::Attack.cache.store = ActiveSupport::Cache::MemoryStore.new
|
|
Rack::Attack.throttle('ip/sec', limit: 1, period: @period) { |_| nil }
|
|
end
|
|
|
|
it_allows_ok_requests
|
|
|
|
describe 'a single request' do
|
|
before { get '/', {}, 'REMOTE_ADDR' => '1.2.3.4' }
|
|
|
|
it 'should not set the counter' do
|
|
key = "rack::attack:#{Time.now.to_i / @period}:ip/sec:1.2.3.4"
|
|
assert_nil Rack::Attack.cache.store.read(key)
|
|
end
|
|
|
|
it 'should not populate throttle data' do
|
|
assert_nil last_request.env['rack.attack.throttle_data']
|
|
end
|
|
end
|
|
end
|