fc85b07a27
Fetches user based on the value of 'rack.attack.match_discriminator' Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/62756
433 lines
14 KiB
Ruby
433 lines
14 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe 'Rack Attack global throttles' do
|
|
let(:settings) { Gitlab::CurrentSettings.current_application_settings }
|
|
|
|
# Start with really high limits and override them with low limits to ensure
|
|
# the right settings are being exercised
|
|
let(:settings_to_set) do
|
|
{
|
|
throttle_unauthenticated_requests_per_period: 100,
|
|
throttle_unauthenticated_period_in_seconds: 1,
|
|
throttle_authenticated_api_requests_per_period: 100,
|
|
throttle_authenticated_api_period_in_seconds: 1,
|
|
throttle_authenticated_web_requests_per_period: 100,
|
|
throttle_authenticated_web_period_in_seconds: 1
|
|
}
|
|
end
|
|
|
|
let(:requests_per_period) { 1 }
|
|
let(:period_in_seconds) { 10000 }
|
|
let(:period) { period_in_seconds.seconds }
|
|
|
|
let(:url_that_does_not_require_authentication) { '/users/sign_in' }
|
|
let(:url_that_requires_authentication) { '/dashboard/snippets' }
|
|
let(:url_api_internal) { '/api/v4/internal/check' }
|
|
let(:api_partial_url) { '/todos' }
|
|
|
|
around do |example|
|
|
# Instead of test environment's :null_store so the throttles can increment
|
|
Rack::Attack.cache.store = ActiveSupport::Cache::MemoryStore.new
|
|
|
|
# Make time-dependent tests deterministic
|
|
Timecop.freeze { example.run }
|
|
|
|
Rack::Attack.cache.store = Rails.cache
|
|
end
|
|
|
|
# Requires let variables:
|
|
# * throttle_setting_prefix (e.g. "throttle_authenticated_api" or "throttle_authenticated_web")
|
|
# * get_args
|
|
# * other_user_get_args
|
|
shared_examples_for 'rate-limited token-authenticated requests' do
|
|
before do
|
|
# Set low limits
|
|
settings_to_set[:"#{throttle_setting_prefix}_requests_per_period"] = requests_per_period
|
|
settings_to_set[:"#{throttle_setting_prefix}_period_in_seconds"] = period_in_seconds
|
|
end
|
|
|
|
context 'when the throttle is enabled' do
|
|
before do
|
|
settings_to_set[:"#{throttle_setting_prefix}_enabled"] = true
|
|
stub_application_setting(settings_to_set)
|
|
end
|
|
|
|
it 'rejects requests over the rate limit' do
|
|
# At first, allow requests under the rate limit.
|
|
requests_per_period.times do
|
|
get(*get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
# the last straw
|
|
expect_rejection { get(*get_args) }
|
|
end
|
|
|
|
it 'allows requests after throttling and then waiting for the next period' do
|
|
requests_per_period.times do
|
|
get(*get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_rejection { get(*get_args) }
|
|
|
|
Timecop.travel(period.from_now) do
|
|
requests_per_period.times do
|
|
get(*get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_rejection { get(*get_args) }
|
|
end
|
|
end
|
|
|
|
it 'counts requests from different users separately, even from the same IP' do
|
|
requests_per_period.times do
|
|
get(*get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
# would be over the limit if this wasn't a different user
|
|
get(*other_user_get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
it 'counts all requests from the same user, even via different IPs' do
|
|
requests_per_period.times do
|
|
get(*get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_any_instance_of(Rack::Attack::Request).to receive(:ip).and_return('1.2.3.4')
|
|
|
|
expect_rejection { get(*get_args) }
|
|
end
|
|
|
|
it 'logs RackAttack info into structured logs' do
|
|
requests_per_period.times do
|
|
get(*get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
arguments = {
|
|
message: 'Rack_Attack',
|
|
env: :throttle,
|
|
ip: '127.0.0.1',
|
|
request_method: 'GET',
|
|
fullpath: get_args.first,
|
|
user_id: user.id,
|
|
username: user.username
|
|
}
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(arguments).once
|
|
|
|
expect_rejection { get(*get_args) }
|
|
end
|
|
end
|
|
|
|
context 'when the throttle is disabled' do
|
|
before do
|
|
settings_to_set[:"#{throttle_setting_prefix}_enabled"] = false
|
|
stub_application_setting(settings_to_set)
|
|
end
|
|
|
|
it 'allows requests over the rate limit' do
|
|
(1 + requests_per_period).times do
|
|
get(*get_args)
|
|
expect(response).to have_http_status 200
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'unauthenticated requests' do
|
|
before do
|
|
# Set low limits
|
|
settings_to_set[:throttle_unauthenticated_requests_per_period] = requests_per_period
|
|
settings_to_set[:throttle_unauthenticated_period_in_seconds] = period_in_seconds
|
|
end
|
|
|
|
context 'when the throttle is enabled' do
|
|
before do
|
|
settings_to_set[:throttle_unauthenticated_enabled] = true
|
|
stub_application_setting(settings_to_set)
|
|
end
|
|
|
|
it 'rejects requests over the rate limit' do
|
|
# At first, allow requests under the rate limit.
|
|
requests_per_period.times do
|
|
get url_that_does_not_require_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
# the last straw
|
|
expect_rejection { get url_that_does_not_require_authentication }
|
|
end
|
|
|
|
it 'allows requests after throttling and then waiting for the next period' do
|
|
requests_per_period.times do
|
|
get url_that_does_not_require_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_rejection { get url_that_does_not_require_authentication }
|
|
|
|
Timecop.travel(period.from_now) do
|
|
requests_per_period.times do
|
|
get url_that_does_not_require_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_rejection { get url_that_does_not_require_authentication }
|
|
end
|
|
end
|
|
|
|
it 'counts requests from different IPs separately' do
|
|
requests_per_period.times do
|
|
get url_that_does_not_require_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_any_instance_of(Rack::Attack::Request).to receive(:ip).and_return('1.2.3.4')
|
|
|
|
# would be over limit for the same IP
|
|
get url_that_does_not_require_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
context 'when the request is to the api internal endpoints' do
|
|
it 'allows requests over the rate limit' do
|
|
(1 + requests_per_period).times do
|
|
get url_api_internal, params: { secret_token: Gitlab::Shell.secret_token }
|
|
expect(response).to have_http_status 200
|
|
end
|
|
end
|
|
end
|
|
|
|
it 'logs RackAttack info into structured logs' do
|
|
requests_per_period.times do
|
|
get url_that_does_not_require_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
arguments = {
|
|
message: 'Rack_Attack',
|
|
env: :throttle,
|
|
ip: '127.0.0.1',
|
|
request_method: 'GET',
|
|
fullpath: '/users/sign_in'
|
|
}
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(arguments)
|
|
|
|
get url_that_does_not_require_authentication
|
|
end
|
|
end
|
|
|
|
context 'when the throttle is disabled' do
|
|
before do
|
|
settings_to_set[:throttle_unauthenticated_enabled] = false
|
|
stub_application_setting(settings_to_set)
|
|
end
|
|
|
|
it 'allows requests over the rate limit' do
|
|
(1 + requests_per_period).times do
|
|
get url_that_does_not_require_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'API requests authenticated with personal access token', :api do
|
|
let(:user) { create(:user) }
|
|
let(:token) { create(:personal_access_token, user: user) }
|
|
let(:other_user) { create(:user) }
|
|
let(:other_user_token) { create(:personal_access_token, user: other_user) }
|
|
let(:throttle_setting_prefix) { 'throttle_authenticated_api' }
|
|
|
|
context 'with the token in the query string' do
|
|
let(:get_args) { [api(api_partial_url, personal_access_token: token)] }
|
|
let(:other_user_get_args) { [api(api_partial_url, personal_access_token: other_user_token)] }
|
|
|
|
it_behaves_like 'rate-limited token-authenticated requests'
|
|
end
|
|
|
|
context 'with the token in the headers' do
|
|
let(:get_args) { api_get_args_with_token_headers(api_partial_url, personal_access_token_headers(token)) }
|
|
let(:other_user_get_args) { api_get_args_with_token_headers(api_partial_url, personal_access_token_headers(other_user_token)) }
|
|
|
|
it_behaves_like 'rate-limited token-authenticated requests'
|
|
end
|
|
end
|
|
|
|
describe 'API requests authenticated with OAuth token', :api do
|
|
let(:user) { create(:user) }
|
|
let(:application) { Doorkeeper::Application.create!(name: "MyApp", redirect_uri: "https://app.com", owner: user) }
|
|
let(:token) { Doorkeeper::AccessToken.create!(application_id: application.id, resource_owner_id: user.id, scopes: "api") }
|
|
let(:other_user) { create(:user) }
|
|
let(:other_user_application) { Doorkeeper::Application.create!(name: "MyApp", redirect_uri: "https://app.com", owner: other_user) }
|
|
let(:other_user_token) { Doorkeeper::AccessToken.create!(application_id: application.id, resource_owner_id: other_user.id, scopes: "api") }
|
|
let(:throttle_setting_prefix) { 'throttle_authenticated_api' }
|
|
|
|
context 'with the token in the query string' do
|
|
let(:get_args) { [api(api_partial_url, oauth_access_token: token)] }
|
|
let(:other_user_get_args) { [api(api_partial_url, oauth_access_token: other_user_token)] }
|
|
|
|
it_behaves_like 'rate-limited token-authenticated requests'
|
|
end
|
|
|
|
context 'with the token in the headers' do
|
|
let(:get_args) { api_get_args_with_token_headers(api_partial_url, oauth_token_headers(token)) }
|
|
let(:other_user_get_args) { api_get_args_with_token_headers(api_partial_url, oauth_token_headers(other_user_token)) }
|
|
|
|
it_behaves_like 'rate-limited token-authenticated requests'
|
|
end
|
|
end
|
|
|
|
describe '"web" (non-API) requests authenticated with RSS token' do
|
|
let(:user) { create(:user) }
|
|
let(:other_user) { create(:user) }
|
|
let(:throttle_setting_prefix) { 'throttle_authenticated_web' }
|
|
|
|
context 'with the token in the query string' do
|
|
let(:get_args) { [rss_url(user), params: nil] }
|
|
let(:other_user_get_args) { [rss_url(other_user), params: nil] }
|
|
|
|
it_behaves_like 'rate-limited token-authenticated requests'
|
|
end
|
|
end
|
|
|
|
describe 'web requests authenticated with regular login' do
|
|
let(:user) { create(:user) }
|
|
|
|
before do
|
|
login_as(user)
|
|
|
|
# Set low limits
|
|
settings_to_set[:throttle_authenticated_web_requests_per_period] = requests_per_period
|
|
settings_to_set[:throttle_authenticated_web_period_in_seconds] = period_in_seconds
|
|
end
|
|
|
|
context 'when the throttle is enabled' do
|
|
before do
|
|
settings_to_set[:throttle_authenticated_web_enabled] = true
|
|
stub_application_setting(settings_to_set)
|
|
end
|
|
|
|
it 'rejects requests over the rate limit' do
|
|
# At first, allow requests under the rate limit.
|
|
requests_per_period.times do
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
# the last straw
|
|
expect_rejection { get url_that_requires_authentication }
|
|
end
|
|
|
|
it 'allows requests after throttling and then waiting for the next period' do
|
|
requests_per_period.times do
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_rejection { get url_that_requires_authentication }
|
|
|
|
Timecop.travel(period.from_now) do
|
|
requests_per_period.times do
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_rejection { get url_that_requires_authentication }
|
|
end
|
|
end
|
|
|
|
it 'counts requests from different users separately, even from the same IP' do
|
|
requests_per_period.times do
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
# would be over the limit if this wasn't a different user
|
|
login_as(create(:user))
|
|
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
it 'counts all requests from the same user, even via different IPs' do
|
|
requests_per_period.times do
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
expect_any_instance_of(Rack::Attack::Request).to receive(:ip).and_return('1.2.3.4')
|
|
|
|
expect_rejection { get url_that_requires_authentication }
|
|
end
|
|
|
|
it 'logs RackAttack info into structured logs' do
|
|
requests_per_period.times do
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
|
|
arguments = {
|
|
message: 'Rack_Attack',
|
|
env: :throttle,
|
|
ip: '127.0.0.1',
|
|
request_method: 'GET',
|
|
fullpath: '/dashboard/snippets',
|
|
user_id: user.id,
|
|
username: user.username
|
|
}
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(arguments).once
|
|
|
|
get url_that_requires_authentication
|
|
end
|
|
end
|
|
|
|
context 'when the throttle is disabled' do
|
|
before do
|
|
settings_to_set[:throttle_authenticated_web_enabled] = false
|
|
stub_application_setting(settings_to_set)
|
|
end
|
|
|
|
it 'allows requests over the rate limit' do
|
|
(1 + requests_per_period).times do
|
|
get url_that_requires_authentication
|
|
expect(response).to have_http_status 200
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
def api_get_args_with_token_headers(partial_url, token_headers)
|
|
["/api/#{API::API.version}#{partial_url}", params: nil, headers: token_headers]
|
|
end
|
|
|
|
def rss_url(user)
|
|
"/dashboard/projects.atom?feed_token=#{user.feed_token}"
|
|
end
|
|
|
|
def private_token_headers(user)
|
|
{ 'HTTP_PRIVATE_TOKEN' => user.private_token }
|
|
end
|
|
|
|
def personal_access_token_headers(personal_access_token)
|
|
{ 'HTTP_PRIVATE_TOKEN' => personal_access_token.token }
|
|
end
|
|
|
|
def oauth_token_headers(oauth_access_token)
|
|
{ 'AUTHORIZATION' => "Bearer #{oauth_access_token.token}" }
|
|
end
|
|
|
|
def expect_rejection(&block)
|
|
yield
|
|
|
|
expect(response).to have_http_status(429)
|
|
end
|
|
end
|