debian-mirror-gitlab/spec/initializers/trusted_proxies_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

70 lines
2.1 KiB
Ruby
Raw Normal View History

2019-12-26 22:10:19 +05:30
# frozen_string_literal: true
2016-06-02 11:05:42 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe 'trusted_proxies' do
2016-06-02 11:05:42 +05:30
context 'with default config' do
before do
set_trusted_proxies([])
end
2016-08-24 12:49:21 +05:30
it 'preserves private IPs' do
2016-06-02 11:05:42 +05:30
request = stub_request('HTTP_X_FORWARDED_FOR' => '10.1.5.89')
expect(request.remote_ip).to eq('10.1.5.89')
2016-08-24 12:49:21 +05:30
expect(request.ip).to eq('10.1.5.89')
2016-06-02 11:05:42 +05:30
end
2016-08-24 12:49:21 +05:30
it 'filters out localhost' do
2016-06-02 11:05:42 +05:30
request = stub_request('HTTP_X_FORWARDED_FOR' => '1.1.1.1, 10.1.5.89, 127.0.0.1')
expect(request.remote_ip).to eq('10.1.5.89')
2016-08-24 12:49:21 +05:30
expect(request.ip).to eq('10.1.5.89')
end
it 'filters out bad values' do
request = stub_request('HTTP_X_FORWARDED_FOR' => '(null), 10.1.5.89')
expect(request.remote_ip).to eq('10.1.5.89')
expect(request.ip).to eq('10.1.5.89')
2016-06-02 11:05:42 +05:30
end
end
context 'with private IP ranges added' do
before do
2017-08-17 22:00:37 +05:30
set_trusted_proxies(["10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16"])
2016-06-02 11:05:42 +05:30
end
2016-08-24 12:49:21 +05:30
it 'filters out private and local IPs' do
2016-06-02 11:05:42 +05:30
request = stub_request('HTTP_X_FORWARDED_FOR' => '1.2.3.6, 1.1.1.1, 10.1.5.89, 127.0.0.1')
expect(request.remote_ip).to eq('1.1.1.1')
2016-08-24 12:49:21 +05:30
expect(request.ip).to eq('1.1.1.1')
2016-06-02 11:05:42 +05:30
end
end
context 'with proxy IP added' do
before do
2017-08-17 22:00:37 +05:30
set_trusted_proxies(["60.98.25.47"])
2016-06-02 11:05:42 +05:30
end
2016-08-24 12:49:21 +05:30
it 'filters out proxy IP' do
2016-06-02 11:05:42 +05:30
request = stub_request('HTTP_X_FORWARDED_FOR' => '1.2.3.6, 1.1.1.1, 60.98.25.47, 127.0.0.1')
expect(request.remote_ip).to eq('1.1.1.1')
2016-08-24 12:49:21 +05:30
expect(request.ip).to eq('1.1.1.1')
end
it 'handles invalid ip addresses' do
request = stub_request('HTTP_X_FORWARDED_FOR' => '(null), 1.1.1.1:12345, 1.1.1.1')
expect(request.remote_ip).to eq('1.1.1.1')
expect(request.ip).to eq('1.1.1.1')
2016-06-02 11:05:42 +05:30
end
end
def stub_request(headers = {})
2017-08-17 22:00:37 +05:30
ActionDispatch::RemoteIp.new(proc { }, false, Rails.application.config.action_dispatch.trusted_proxies).call(headers)
2016-06-02 11:05:42 +05:30
ActionDispatch::Request.new(headers)
end
def set_trusted_proxies(proxies = [])
stub_config_setting('trusted_proxies' => proxies)
load File.join(__dir__, '../../config/initializers/trusted_proxies.rb')
end
end