Merge branch 'feature/mrf-anti-link-spam' into 'develop'
[akkoma] / test / plugs / rate_limiter_test.exs
1 defmodule Pleroma.Plugs.RateLimiterTest do
2 use ExUnit.Case, async: true
3 use Plug.Test
4
5 alias Pleroma.Plugs.RateLimiter
6
7 import Pleroma.Factory
8
9 @limiter_name :testing
10
11 test "init/1" do
12 Pleroma.Config.put([:rate_limit, @limiter_name], {1, 1})
13
14 assert {@limiter_name, {1, 1}} == RateLimiter.init(@limiter_name)
15 assert nil == RateLimiter.init(:foo)
16 end
17
18 test "ip/1" do
19 assert "127.0.0.1" == RateLimiter.ip(%{remote_ip: {127, 0, 0, 1}})
20 end
21
22 test "it restricts by opts" do
23 scale = 1000
24 limit = 5
25
26 Pleroma.Config.put([:rate_limit, @limiter_name], {scale, limit})
27
28 opts = RateLimiter.init(@limiter_name)
29 conn = conn(:get, "/")
30 bucket_name = "#{@limiter_name}:#{RateLimiter.ip(conn)}"
31
32 conn = RateLimiter.call(conn, opts)
33 assert {1, 4, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
34
35 conn = RateLimiter.call(conn, opts)
36 assert {2, 3, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
37
38 conn = RateLimiter.call(conn, opts)
39 assert {3, 2, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
40
41 conn = RateLimiter.call(conn, opts)
42 assert {4, 1, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
43
44 conn = RateLimiter.call(conn, opts)
45 assert {5, 0, to_reset, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
46
47 conn = RateLimiter.call(conn, opts)
48
49 assert %{"error" => "Throttled"} = Phoenix.ConnTest.json_response(conn, :too_many_requests)
50 assert conn.halted
51
52 Process.sleep(to_reset)
53
54 conn = conn(:get, "/")
55
56 conn = RateLimiter.call(conn, opts)
57 assert {1, 4, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
58
59 refute conn.status == Plug.Conn.Status.code(:too_many_requests)
60 refute conn.resp_body
61 refute conn.halted
62 end
63
64 test "optional limits for authenticated users" do
65 Ecto.Adapters.SQL.Sandbox.checkout(Pleroma.Repo)
66
67 scale = 1000
68 limit = 5
69 Pleroma.Config.put([:rate_limit, @limiter_name], [{1, 10}, {scale, limit}])
70
71 opts = RateLimiter.init(@limiter_name)
72
73 user = insert(:user)
74 conn = conn(:get, "/") |> assign(:user, user)
75 bucket_name = "#{@limiter_name}:#{user.id}"
76
77 conn = RateLimiter.call(conn, opts)
78 assert {1, 4, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
79
80 conn = RateLimiter.call(conn, opts)
81 assert {2, 3, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
82
83 conn = RateLimiter.call(conn, opts)
84 assert {3, 2, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
85
86 conn = RateLimiter.call(conn, opts)
87 assert {4, 1, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
88
89 conn = RateLimiter.call(conn, opts)
90 assert {5, 0, to_reset, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
91
92 conn = RateLimiter.call(conn, opts)
93
94 assert %{"error" => "Throttled"} = Phoenix.ConnTest.json_response(conn, :too_many_requests)
95 assert conn.halted
96
97 Process.sleep(to_reset)
98
99 conn = conn(:get, "/") |> assign(:user, user)
100
101 conn = RateLimiter.call(conn, opts)
102 assert {1, 4, _, _, _} = ExRated.inspect_bucket(bucket_name, scale, limit)
103
104 refute conn.status == Plug.Conn.Status.code(:too_many_requests)
105 refute conn.resp_body
106 refute conn.halted
107 end
108 end