|
2 | 2 |
|
3 | 3 | require_relative "../spec_helper" |
4 | 4 |
|
5 | | -if defined?(::ActiveSupport::Notifications) |
6 | | - describe "#blocklist" do |
7 | | - let(:notifications) { [] } |
| 5 | +describe "#blocklist" do |
| 6 | + let(:notifications) { [] } |
8 | 7 |
|
9 | | - before do |
10 | | - Rack::Attack.blocklist do |request| |
11 | | - request.ip == "1.2.3.4" |
12 | | - end |
| 8 | + before do |
| 9 | + Rack::Attack.blocklist do |request| |
| 10 | + request.ip == "1.2.3.4" |
13 | 11 | end |
| 12 | + end |
14 | 13 |
|
15 | | - it "forbids request if blocklist condition is true" do |
16 | | - get "/", {}, "REMOTE_ADDR" => "1.2.3.4" |
| 14 | + it "forbids request if blocklist condition is true" do |
| 15 | + get "/", {}, "REMOTE_ADDR" => "1.2.3.4" |
17 | 16 |
|
18 | | - assert_equal 403, last_response.status |
19 | | - end |
| 17 | + assert_equal 403, last_response.status |
| 18 | + end |
20 | 19 |
|
21 | | - it "succeeds if blocklist condition is false" do |
22 | | - get "/", {}, "REMOTE_ADDR" => "5.6.7.8" |
| 20 | + it "succeeds if blocklist condition is false" do |
| 21 | + get "/", {}, "REMOTE_ADDR" => "5.6.7.8" |
23 | 22 |
|
24 | | - assert_equal 200, last_response.status |
25 | | - end |
| 23 | + assert_equal 200, last_response.status |
| 24 | + end |
26 | 25 |
|
| 26 | + if defined?(::ActiveSupport::Notifications) |
27 | 27 | it "notifies when the request is blocked" do |
28 | 28 | ActiveSupport::Notifications.subscribe("rack.attack") do |_name, _start, _finish, _id, payload| |
29 | 29 | notifications.push(payload) |
|
41 | 41 | assert_equal :blocklist, notification[:request].env["rack.attack.match_type"] |
42 | 42 | end |
43 | 43 | end |
| 44 | +end |
44 | 45 |
|
45 | | - describe "#blocklist with name" do |
46 | | - let(:notifications) { [] } |
| 46 | +describe "#blocklist with name" do |
| 47 | + let(:notifications) { [] } |
47 | 48 |
|
48 | | - before do |
49 | | - Rack::Attack.blocklist("block 1.2.3.4") do |request| |
50 | | - request.ip == "1.2.3.4" |
51 | | - end |
| 49 | + before do |
| 50 | + Rack::Attack.blocklist("block 1.2.3.4") do |request| |
| 51 | + request.ip == "1.2.3.4" |
52 | 52 | end |
| 53 | + end |
53 | 54 |
|
54 | | - it "forbids request if blocklist condition is true" do |
55 | | - get "/", {}, "REMOTE_ADDR" => "1.2.3.4" |
| 55 | + it "forbids request if blocklist condition is true" do |
| 56 | + get "/", {}, "REMOTE_ADDR" => "1.2.3.4" |
56 | 57 |
|
57 | | - assert_equal 403, last_response.status |
58 | | - end |
| 58 | + assert_equal 403, last_response.status |
| 59 | + end |
59 | 60 |
|
60 | | - it "succeeds if blocklist condition is false" do |
61 | | - get "/", {}, "REMOTE_ADDR" => "5.6.7.8" |
| 61 | + it "succeeds if blocklist condition is false" do |
| 62 | + get "/", {}, "REMOTE_ADDR" => "5.6.7.8" |
62 | 63 |
|
63 | | - assert_equal 200, last_response.status |
64 | | - end |
| 64 | + assert_equal 200, last_response.status |
| 65 | + end |
65 | 66 |
|
| 67 | + if defined?(::ActiveSupport::Notifications) |
66 | 68 | it "notifies when the request is blocked" do |
67 | 69 | ActiveSupport::Notifications.subscribe("blocklist.rack_attack") do |_name, _start, _finish, _id, payload| |
68 | 70 | notifications.push(payload) |
|
0 commit comments