Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2021-10-20 11:43:02 +0300
committerGitLab Bot <gitlab-bot@gitlab.com>2021-10-20 11:43:02 +0300
commitd9ab72d6080f594d0b3cae15f14b3ef2c6c638cb (patch)
tree2341ef426af70ad1e289c38036737e04b0aa5007 /spec/services/concerns
parentd6e514dd13db8947884cd58fe2a9c2a063400a9b (diff)
Add latest changes from gitlab-org/gitlab@14-4-stable-eev14.4.0-rc42
Diffstat (limited to 'spec/services/concerns')
-rw-r--r--spec/services/concerns/rate_limited_service_spec.rb196
1 files changed, 196 insertions, 0 deletions
diff --git a/spec/services/concerns/rate_limited_service_spec.rb b/spec/services/concerns/rate_limited_service_spec.rb
new file mode 100644
index 00000000000..f73871b7e44
--- /dev/null
+++ b/spec/services/concerns/rate_limited_service_spec.rb
@@ -0,0 +1,196 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe RateLimitedService do
+ let(:key) { :issues_create }
+ let(:scope) { [:project, :current_user] }
+ let(:opts) { { scope: scope, users_allowlist: -> { [User.support_bot.username] } } }
+ let(:rate_limiter_klass) { ::Gitlab::ApplicationRateLimiter }
+ let(:rate_limiter_instance) { rate_limiter_klass.new(key, **opts) }
+
+ describe 'RateLimitedError' do
+ subject { described_class::RateLimitedError.new(key: key, rate_limiter: rate_limiter_instance) }
+
+ describe '#headers' do
+ it 'returns a Hash of HTTP headers' do
+ # TODO: This will be fleshed out in https://gitlab.com/gitlab-org/gitlab/-/issues/342370
+ expected_headers = {}
+
+ expect(subject.headers).to eq(expected_headers)
+ end
+ end
+
+ describe '#log_request' do
+ it 'logs the request' do
+ request = instance_double(Grape::Request)
+ user = instance_double(User)
+
+ expect(rate_limiter_klass).to receive(:log_request).with(request, "#{key}_request_limit".to_sym, user)
+
+ subject.log_request(request, user)
+ end
+ end
+ end
+
+ describe 'RateLimiterScopedAndKeyed' do
+ subject { described_class::RateLimiterScopedAndKeyed.new(key: key, opts: opts, rate_limiter_klass: rate_limiter_klass) }
+
+ describe '#rate_limit!' do
+ let(:project_with_feature_enabled) { create(:project) }
+ let(:project_without_feature_enabled) { create(:project) }
+
+ let(:project) { nil }
+
+ let(:current_user) { create(:user) }
+ let(:service) { instance_double(Issues::CreateService, project: project, current_user: current_user) }
+ let(:evaluated_scope) { [project, current_user] }
+ let(:evaluated_opts) { { scope: evaluated_scope, users_allowlist: %w[support-bot] } }
+ let(:rate_limited_service_issues_create_feature_enabled) { nil }
+
+ before do
+ allow(rate_limiter_klass).to receive(:new).with(key, **evaluated_opts).and_return(rate_limiter_instance)
+ stub_feature_flags(rate_limited_service_issues_create: rate_limited_service_issues_create_feature_enabled)
+ end
+
+ shared_examples 'a service that does not attempt to throttle' do
+ it 'does not attempt to throttle' do
+ expect(rate_limiter_instance).not_to receive(:throttled?)
+
+ expect(subject.rate_limit!(service)).to be_nil
+ end
+ end
+
+ shared_examples 'a service that does attempt to throttle' do
+ before do
+ allow(rate_limiter_instance).to receive(:throttled?).and_return(throttled)
+ end
+
+ context 'when rate limiting is not in effect' do
+ let(:throttled) { false }
+
+ it 'does not raise an exception' do
+ expect(subject.rate_limit!(service)).to be_nil
+ end
+ end
+
+ context 'when rate limiting is in effect' do
+ let(:throttled) { true }
+
+ it 'raises a RateLimitedError exception' do
+ expect { subject.rate_limit!(service) }.to raise_error(described_class::RateLimitedError, 'This endpoint has been requested too many times. Try again later.')
+ end
+ end
+ end
+
+ context 'when :rate_limited_service_issues_create feature is globally disabled' do
+ let(:rate_limited_service_issues_create_feature_enabled) { false }
+
+ it_behaves_like 'a service that does not attempt to throttle'
+ end
+
+ context 'when :rate_limited_service_issues_create feature is globally enabled' do
+ let(:throttled) { nil }
+ let(:rate_limited_service_issues_create_feature_enabled) { true }
+ let(:project) { project_without_feature_enabled }
+
+ it_behaves_like 'a service that does attempt to throttle'
+ end
+
+ context 'when :rate_limited_service_issues_create feature is enabled for project_with_feature_enabled' do
+ let(:throttled) { nil }
+ let(:rate_limited_service_issues_create_feature_enabled) { project_with_feature_enabled }
+
+ context 'for project_without_feature_enabled' do
+ let(:project) { project_without_feature_enabled }
+
+ it_behaves_like 'a service that does not attempt to throttle'
+ end
+
+ context 'for project_with_feature_enabled' do
+ let(:project) { project_with_feature_enabled }
+
+ it_behaves_like 'a service that does attempt to throttle'
+ end
+ end
+ end
+ end
+
+ describe '#execute_without_rate_limiting' do
+ let(:rate_limiter_scoped_and_keyed) { instance_double(RateLimitedService::RateLimiterScopedAndKeyed) }
+ let(:subject) do
+ local_key = key
+ local_opts = opts
+
+ Class.new do
+ prepend RateLimitedService
+
+ rate_limit key: local_key, opts: local_opts
+
+ def execute(*args, **kwargs)
+ 'main logic here'
+ end
+ end.new
+ end
+
+ before do
+ allow(RateLimitedService::RateLimiterScopedAndKeyed).to receive(:new).with(key: key, opts: opts, rate_limiter_klass: rate_limiter_klass).and_return(rate_limiter_scoped_and_keyed)
+ end
+
+ context 'bypasses rate limiting' do
+ it 'calls super' do
+ expect(rate_limiter_scoped_and_keyed).not_to receive(:rate_limit!).with(subject)
+
+ expect(subject.execute_without_rate_limiting).to eq('main logic here')
+ end
+ end
+ end
+
+ describe '#execute' do
+ context 'when rate_limit has not been called' do
+ let(:subject) { Class.new { prepend RateLimitedService }.new }
+
+ it 'raises an RateLimitedNotSetupError exception' do
+ expect { subject.execute }.to raise_error(described_class::RateLimitedNotSetupError)
+ end
+ end
+
+ context 'when rate_limit has been called' do
+ let(:rate_limiter_scoped_and_keyed) { instance_double(RateLimitedService::RateLimiterScopedAndKeyed) }
+ let(:subject) do
+ local_key = key
+ local_opts = opts
+
+ Class.new do
+ prepend RateLimitedService
+
+ rate_limit key: local_key, opts: local_opts
+
+ def execute(*args, **kwargs)
+ 'main logic here'
+ end
+ end.new
+ end
+
+ before do
+ allow(RateLimitedService::RateLimiterScopedAndKeyed).to receive(:new).with(key: key, opts: opts, rate_limiter_klass: rate_limiter_klass).and_return(rate_limiter_scoped_and_keyed)
+ end
+
+ context 'and applies rate limiting' do
+ it 'raises an RateLimitedService::RateLimitedError exception' do
+ expect(rate_limiter_scoped_and_keyed).to receive(:rate_limit!).with(subject).and_raise(RateLimitedService::RateLimitedError.new(key: key, rate_limiter: rate_limiter_instance))
+
+ expect { subject.execute }.to raise_error(RateLimitedService::RateLimitedError)
+ end
+ end
+
+ context 'but does not apply rate limiting' do
+ it 'calls super' do
+ expect(rate_limiter_scoped_and_keyed).to receive(:rate_limit!).with(subject).and_return(nil)
+
+ expect(subject.execute).to eq('main logic here')
+ end
+ end
+ end
+ end
+end