discourse/spec/lib/rate_limiter_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

245 lines
7.1 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2013-02-05 14:16:51 -05:00
require 'rate_limiter'
RSpec.describe RateLimiter do
2013-02-05 14:16:51 -05:00
fab!(:user) { Fabricate(:user) }
fab!(:admin) { Fabricate(:admin) }
2013-02-05 14:16:51 -05:00
let(:rate_limiter) { RateLimiter.new(user, "peppermint-butler", 2, 60) }
let(:apply_staff_rate_limiter) { RateLimiter.new(admin, "peppermint-servant", 5, 40, apply_limit_to_staff: true) }
let(:staff_rate_limiter) { RateLimiter.new(user, "peppermind-servant", 5, 40, staff_limit: { max: 10, secs: 80 }) }
let(:admin_staff_rate_limiter) { RateLimiter.new(admin, "peppermind-servant", 5, 40, staff_limit: { max: 10, secs: 80 }) }
2013-02-05 14:16:51 -05:00
context 'disabled' do
before do
rate_limiter.performed!
2013-02-25 11:42:20 -05:00
rate_limiter.performed!
2013-02-05 14:16:51 -05:00
end
it "should be disabled" do
expect(RateLimiter.disabled?).to eq(true)
end
2013-02-05 14:16:51 -05:00
it "returns true for can_perform?" do
2015-01-09 11:34:37 -05:00
expect(rate_limiter.can_perform?).to eq(true)
2013-02-05 14:16:51 -05:00
end
it "doesn't raise an error on performed!" do
2015-01-09 11:34:37 -05:00
expect { rate_limiter.performed! }.not_to raise_error
2013-02-05 14:16:51 -05:00
end
end
context 'enabled' do
before do
RateLimiter.enable
2013-02-25 11:42:20 -05:00
rate_limiter.clear!
staff_rate_limiter.clear!
admin_staff_rate_limiter.clear!
2013-02-05 14:16:51 -05:00
end
context 'aggressive rate limiter' do
it 'can operate correctly and totally stop limiting' do
freeze_time
# 2 requests every 30 seconds
limiter = RateLimiter.new(nil, "test", 2, 30, global: true, aggressive: true)
limiter.clear!
limiter.performed!
limiter.performed!
freeze_time 29.seconds.from_now
expect do
limiter.performed!
end.to raise_error(RateLimiter::LimitExceeded)
expect do
limiter.performed!
end.to raise_error(RateLimiter::LimitExceeded)
# in aggressive mode both these ^^^ count as an attempt
freeze_time 29.seconds.from_now
expect do
limiter.performed!
end.to raise_error(RateLimiter::LimitExceeded)
expect do
limiter.performed!
end.to raise_error(RateLimiter::LimitExceeded)
freeze_time 30.seconds.from_now
expect { limiter.performed! }.not_to raise_error
expect { limiter.performed! }.not_to raise_error
end
end
context 'global rate limiter' do
it 'can operate in global mode' do
2017-12-04 05:44:16 -05:00
limiter = RateLimiter.new(nil, "test", 2, 30, global: true)
limiter.clear!
2017-12-04 05:44:16 -05:00
thrown = false
limiter.performed!
limiter.performed!
2017-12-04 05:44:16 -05:00
begin
limiter.performed!
rescue RateLimiter::LimitExceeded => e
2017-12-04 15:04:41 -05:00
expect(Integer === e.available_in).to eq(true)
2017-12-04 05:44:16 -05:00
expect(e.available_in).to be > 28
expect(e.available_in).to be < 32
thrown = true
end
expect(thrown).to be(true)
end
end
context 'handles readonly' do
before do
# random IP address in the ULA range that does not exist
Discourse.redis.without_namespace.slaveof 'fdec:3f5d:d0b7:4c4b:472b:636a:4370:7ac5', '49999'
end
after do
Discourse.redis.without_namespace.slaveof 'no', 'one'
end
it 'does not explode' do
expect { rate_limiter.performed! }.not_to raise_error
end
end
2013-02-05 14:16:51 -05:00
context 'never done' do
it "should perform right away" do
2015-01-09 11:34:37 -05:00
expect(rate_limiter.can_perform?).to eq(true)
2013-02-05 14:16:51 -05:00
end
it "performs without an error" do
2015-01-09 11:34:37 -05:00
expect { rate_limiter.performed! }.not_to raise_error
2013-02-05 14:16:51 -05:00
end
end
context "remaining" do
it "updates correctly" do
expect(rate_limiter.remaining).to eq(2)
rate_limiter.performed!
expect(rate_limiter.remaining).to eq(1)
rate_limiter.performed!
expect(rate_limiter.remaining).to eq(0)
end
end
context 'max is less than or equal to zero' do
it 'should raise the right error' do
[-1, 0, nil].each do |max|
expect do
RateLimiter.new(user, "a", max, 60).performed!
end.to raise_error(RateLimiter::LimitExceeded)
end
end
end
2013-02-05 14:16:51 -05:00
context "multiple calls" do
before do
freeze_time
2013-02-05 14:16:51 -05:00
rate_limiter.performed!
rate_limiter.performed!
end
it "returns false for can_perform when the limit has been hit" do
2015-01-09 11:34:37 -05:00
expect(rate_limiter.can_perform?).to eq(false)
expect(rate_limiter.remaining).to eq(0)
2013-02-05 14:16:51 -05:00
end
it "raises an error the third time called" do
expect { rate_limiter.performed! }.to raise_error do |error|
expect(error).to be_a(RateLimiter::LimitExceeded)
expect(error).to having_attributes(available_in: 60)
end
end
it 'raises no error when the sliding window ended' do
freeze_time 60.seconds.from_now
expect { rate_limiter.performed! }.not_to raise_error
2013-02-05 14:16:51 -05:00
end
context "as an admin/moderator" do
it "returns true for can_perform if the user is an admin" do
user.admin = true
2015-01-09 11:34:37 -05:00
expect(rate_limiter.can_perform?).to eq(true)
expect(rate_limiter.remaining).to eq(2)
2013-02-05 14:16:51 -05:00
end
it "doesn't raise an error when an admin performs the task" do
user.admin = true
2015-01-09 11:34:37 -05:00
expect { rate_limiter.performed! }.not_to raise_error
2013-02-05 14:16:51 -05:00
end
it "returns true for can_perform if the user is a mod" do
user.moderator = true
2015-01-09 11:34:37 -05:00
expect(rate_limiter.can_perform?).to eq(true)
2013-02-05 14:16:51 -05:00
end
it "doesn't raise an error when a moderator performs the task" do
user.moderator = true
2015-01-09 11:34:37 -05:00
expect { rate_limiter.performed! }.not_to raise_error
2013-02-05 14:16:51 -05:00
end
it "applies max / secs to staff when apply_limit_to_staff flag is true" do
5.times { apply_staff_rate_limiter.performed! }
freeze_time 10.seconds.from_now
expect { apply_staff_rate_limiter.performed! }.to raise_error do |error|
expect(error).to be_a(RateLimiter::LimitExceeded)
expect(error).to having_attributes(available_in: 30)
end
end
it "applies staff_limit max when present for staff" do
expect(admin_staff_rate_limiter.can_perform?).to eq(true)
expect(admin_staff_rate_limiter.remaining).to eq(10)
end
it "applies staff_limit secs when present for staff" do
10.times { admin_staff_rate_limiter.performed! }
freeze_time 10.seconds.from_now
expect { admin_staff_rate_limiter.performed! }.to raise_error do |error|
expect(error).to be_a(RateLimiter::LimitExceeded)
expect(error).to having_attributes(available_in: 70)
end
end
it "applies standard max to non-staff users when staff_limit values are present" do
expect(staff_rate_limiter.can_perform?).to eq(true)
expect(staff_rate_limiter.remaining).to eq(5)
end
2013-02-05 14:16:51 -05:00
end
context "rollback!" do
before do
rate_limiter.rollback!
end
it "returns true for can_perform since there is now room" do
2015-01-09 11:34:37 -05:00
expect(rate_limiter.can_perform?).to eq(true)
2013-02-05 14:16:51 -05:00
end
it "raises no error now that there is room" do
2015-01-09 11:34:37 -05:00
expect { rate_limiter.performed! }.not_to raise_error
2013-02-05 14:16:51 -05:00
end
end
2013-02-25 11:42:20 -05:00
end
2013-02-05 14:16:51 -05:00
end
end