Skip to content

Commit

Permalink
Added test for rate limit with autz
Browse files Browse the repository at this point in the history
  • Loading branch information
jsmolar committed Nov 6, 2023
1 parent 65a2be5 commit 9b2b00d
Show file tree
Hide file tree
Showing 2 changed files with 49 additions and 19 deletions.
22 changes: 3 additions & 19 deletions testsuite/openshift/objects/rate_limit.py
Original file line number Diff line number Diff line change
Expand Up @@ -38,32 +38,16 @@ def create_instance(cls, openshift: OpenShiftClient, name, route: Referencable,

return cls(model, context=openshift.context)

@staticmethod
def _user_id_variable(user_id):
"""Add configuration for rate limit."""
return {
"actions": [
{
"metadata": {
"descriptor_key": user_id,
"default_value": "no-user",
"metadata_key": {
"key": "envoy.filters.http.ext_authz",
"path": [{"segment": {"key": "ext_auth_data"}}, {"segment": {"key": user_id}}],
},
}
}
]
}

@modify
def add_limit(self, name, limits: Iterable[Limit], when: Iterable[Rule] = None):
def add_limit(self, name, limits: Iterable[Limit], when: Iterable[Rule] = None, counters: list[str] = None):
"""Add another limit"""
limit = {
"rates": [asdict(limit) for limit in limits],
}
if when:
limit["when"] = [asdict(rule) for rule in when]
if counters:
limit["counters"] = counters
self.model.spec.limits[name] = limit

def commit(self):
Expand Down
46 changes: 46 additions & 0 deletions testsuite/tests/kuadrant/test_rate_limit_authz.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
"""Tests for basic authenticated rate limiting"""

import pytest

from testsuite.httpx.auth import HttpxOidcClientAuth
from testsuite.objects import ValueFrom
from testsuite.openshift.objects.rate_limit import Limit


@pytest.fixture(scope="module")
def rate_limit(rate_limit):
"""Add limit to the policy"""
rate_limit.add_limit(
"basic", [Limit(5, 60)], counters=[r"metadata.filter_metadata.envoy\.filters\.http\.ext_authz.identity.user"]
)
return rate_limit


@pytest.fixture(scope="module")
def authorization(authorization):
"""Adds JSON injection, that wraps the response as Envoy Dynamic Metadata for rate limit"""
authorization.responses.add_json("identity", {"user": ValueFrom("auth.identity.email")}, wrapper="dynamicMetadata")
return authorization


@pytest.fixture(scope="module")
def auth(oidc_provider):
"""Returns RHSSO authentication object for HTTPX"""
return HttpxOidcClientAuth(oidc_provider.get_token, "authorization")


@pytest.fixture(scope="module")
def auth2(rhsso):
"""Creates new RHSSO user and returns its authentication object for HTTPX"""
user = rhsso.realm.create_user("user2", "password", email="[email protected]")
return HttpxOidcClientAuth.from_user(rhsso.get_token, user=user)


def test_authz_limit(client, auth, auth2):
"""Tests that rate limit is applied for two users independently"""
responses = client.get_many("/get", 5, auth=auth)
assert all(
r.status_code == 200 for r in responses
), f"Rate Limited resource unexpectedly rejected requests {responses}"
assert client.get("/get", auth=auth).status_code == 429
assert client.get("/get", auth=auth2).status_code == 200

0 comments on commit 9b2b00d

Please sign in to comment.