-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
49 additions
and
19 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
"""Tests for basic authenticated rate limiting""" | ||
|
||
import pytest | ||
|
||
from testsuite.httpx.auth import HttpxOidcClientAuth | ||
from testsuite.objects import ValueFrom | ||
from testsuite.openshift.objects.rate_limit import Limit | ||
|
||
|
||
@pytest.fixture(scope="module") | ||
def rate_limit(rate_limit): | ||
"""Add limit to the policy""" | ||
rate_limit.add_limit( | ||
"basic", [Limit(5, 60)], counters=[r"metadata.filter_metadata.envoy\.filters\.http\.ext_authz.identity.user"] | ||
) | ||
return rate_limit | ||
|
||
|
||
@pytest.fixture(scope="module") | ||
def authorization(authorization): | ||
"""Adds JSON injection, that wraps the response as Envoy Dynamic Metadata for rate limit""" | ||
authorization.responses.add_json("identity", {"user": ValueFrom("auth.identity.email")}, wrapper="dynamicMetadata") | ||
return authorization | ||
|
||
|
||
@pytest.fixture(scope="module") | ||
def auth(oidc_provider): | ||
"""Returns RHSSO authentication object for HTTPX""" | ||
return HttpxOidcClientAuth(oidc_provider.get_token, "authorization") | ||
|
||
|
||
@pytest.fixture(scope="module") | ||
def auth2(rhsso): | ||
"""Creates new RHSSO user and returns its authentication object for HTTPX""" | ||
user = rhsso.realm.create_user("user2", "password", email="[email protected]") | ||
return HttpxOidcClientAuth.from_user(rhsso.get_token, user=user) | ||
|
||
|
||
def test_authz_limit(client, auth, auth2): | ||
"""Tests that rate limit is applied for two users independently""" | ||
responses = client.get_many("/get", 5, auth=auth) | ||
assert all( | ||
r.status_code == 200 for r in responses | ||
), f"Rate Limited resource unexpectedly rejected requests {responses}" | ||
assert client.get("/get", auth=auth).status_code == 429 | ||
assert client.get("/get", auth=auth2).status_code == 200 |