Files
nairobi/spec/lib/restrict_admin_ips_spec.rb
CoslaJohn 424cedc0c8 Restrict access to admin functions by IP
There are many possible ways to implement this feature:

* Adding a custom middleware
* Using rack-attack with a blocklist
* Using routes constraints

We're choosing to use a controller concern with a redirect because it's
what we do to handle unauthorized cancancan exceptions.
2024-10-30 15:59:50 +01:00

82 lines
2.7 KiB
Ruby

require "rails_helper"
describe RestrictAdminIps do
it "allows any IP when allowed_admin_ips isn't configured" do
stub_secrets(security: {})
expect(RestrictAdminIps.new("1.2.3.4")).to be_allowed
expect(RestrictAdminIps.new("whatever")).to be_allowed
end
it "allows any IP when allowed_admin_ips is empty" do
stub_secrets(security: { allowed_admin_ips: [] })
expect(RestrictAdminIps.new("1.2.3.4")).to be_allowed
expect(RestrictAdminIps.new("whatever")).to be_allowed
end
it "only allows IPs present in allowed_admin_ips" do
stub_secrets(security: { allowed_admin_ips: ["1.2.3.4", "5.6.7.8"] })
expect(RestrictAdminIps.new("1.2.3.4")).to be_allowed
expect(RestrictAdminIps.new("5.6.7.8")).to be_allowed
expect(RestrictAdminIps.new("9.9.9.9")).not_to be_allowed
expect(RestrictAdminIps.new("whatever")).not_to be_allowed
end
it "restricts every IP when there are only malformed IPs on the list" do
stub_secrets(security: { allowed_admin_ips: ["not_an_ip"] })
expect(RestrictAdminIps.new("1.2.3.4")).not_to be_allowed
expect(RestrictAdminIps.new("not_an_ip")).not_to be_allowed
end
it "ignores malformed IPs in the allowed_admin_ips list" do
stub_secrets(security: { allowed_admin_ips: ["1.2.3.4", "not_an_ip"] })
expect(RestrictAdminIps.new("1.2.3.4")).to be_allowed
expect(RestrictAdminIps.new("not_an_ip")).not_to be_allowed
end
it "supports ranges of IPs" do
stub_secrets(security: { allowed_admin_ips: ["1.2.3.0/16"] })
expect(RestrictAdminIps.new("1.2.3.4")).to be_allowed
expect(RestrictAdminIps.new("1.2.3.5")).to be_allowed
expect(RestrictAdminIps.new("5.6.7.8")).not_to be_allowed
end
context "tenant overwriting secrets" do
before do
stub_secrets({
security: {
allowed_admin_ips: ["1.2.3.4", "5.6.7.8"]
},
tenants: {
private: {
security: {
allowed_admin_ips: ["127.0.0.1", "192.168.1.1"]
}
}
}
})
end
it "uses the general secrets for the main tenant" do
expect(RestrictAdminIps.new("1.2.3.4")).to be_allowed
expect(RestrictAdminIps.new("5.6.7.8")).to be_allowed
expect(RestrictAdminIps.new("127.0.0.1")).not_to be_allowed
expect(RestrictAdminIps.new("192.168.1.1")).not_to be_allowed
end
it "uses the tenant secrets for a tenant" do
allow(Tenant).to receive(:current_schema).and_return("private")
expect(RestrictAdminIps.new("127.0.0.1")).to be_allowed
expect(RestrictAdminIps.new("192.168.1.1")).to be_allowed
expect(RestrictAdminIps.new("1.2.3.4")).not_to be_allowed
expect(RestrictAdminIps.new("5.6.7.8")).not_to be_allowed
end
end
end