mirror of
https://github.com/samsonjs/rack-attack.git
synced 2026-03-25 09:25:49 +00:00
55 lines
1.5 KiB
Ruby
55 lines
1.5 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require_relative "../spec_helper"
|
|
|
|
describe "#safelist" do
|
|
before do
|
|
Rack::Attack.blocklist("block 1.2.3.4") do |request|
|
|
request.ip == "1.2.3.4"
|
|
end
|
|
|
|
Rack::Attack.safelist("safe path") do |request|
|
|
request.path == "/safe_space"
|
|
end
|
|
end
|
|
|
|
it "forbids request if blocklist condition is true and safelist is false" do
|
|
get "/", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 403, last_response.status
|
|
end
|
|
|
|
it "succeeds if blocklist condition is false and safelist is false" do
|
|
get "/", {}, "REMOTE_ADDR" => "5.6.7.8"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "succeeds request if blocklist condition is false and safelist is true" do
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "5.6.7.8"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "succeeds request if both blocklist and safelist conditions are true" do
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 200, last_response.status
|
|
end
|
|
|
|
it "notifies when the request is safe" do
|
|
notification_matched = nil
|
|
notification_type = nil
|
|
|
|
ActiveSupport::Notifications.subscribe("safelist.rack_attack") do |_name, _start, _finish, _id, payload|
|
|
notification_matched = payload[:request].env["rack.attack.matched"]
|
|
notification_type = payload[:request].env["rack.attack.match_type"]
|
|
end
|
|
|
|
get "/safe_space", {}, "REMOTE_ADDR" => "1.2.3.4"
|
|
|
|
assert_equal 200, last_response.status
|
|
assert_equal "safe path", notification_matched
|
|
assert_equal :safelist, notification_type
|
|
end
|
|
end
|