2023-02-21 19:55:31 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2020-10-12 10:33:49 -04:00
|
|
|
require 'rails_helper'
|
|
|
|
|
2024-09-04 01:12:25 -04:00
|
|
|
RSpec.describe IpBlock do
|
2024-03-01 11:17:40 -05:00
|
|
|
describe 'validations' do
|
2024-09-05 11:36:05 -04:00
|
|
|
it { is_expected.to validate_presence_of(:ip) }
|
|
|
|
it { is_expected.to validate_presence_of(:severity) }
|
2024-03-01 11:17:40 -05:00
|
|
|
|
|
|
|
it 'validates ip uniqueness', :aggregate_failures do
|
|
|
|
described_class.create!(ip: '127.0.0.1', severity: :no_access)
|
|
|
|
|
|
|
|
ip_block = described_class.new(ip: '127.0.0.1', severity: :no_access)
|
|
|
|
|
|
|
|
expect(ip_block).to_not be_valid
|
|
|
|
expect(ip_block).to model_have_error_on_field(:ip)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#to_log_human_identifier' do
|
2023-03-04 11:16:45 -05:00
|
|
|
let(:ip_block) { described_class.new(ip: '192.168.0.1') }
|
|
|
|
|
|
|
|
it 'combines the IP and prefix into a string' do
|
|
|
|
result = ip_block.to_log_human_identifier
|
|
|
|
|
|
|
|
expect(result).to eq('192.168.0.1/32')
|
|
|
|
end
|
|
|
|
end
|
2024-03-01 11:17:40 -05:00
|
|
|
|
|
|
|
describe '.blocked?' do
|
|
|
|
context 'when the IP is blocked' do
|
|
|
|
it 'returns true' do
|
|
|
|
described_class.create!(ip: '127.0.0.1', severity: :no_access)
|
|
|
|
|
|
|
|
expect(described_class.blocked?('127.0.0.1')).to be true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the IP is not blocked' do
|
|
|
|
it 'returns false' do
|
|
|
|
expect(described_class.blocked?('127.0.0.1')).to be false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'after_commit' do
|
|
|
|
it 'resets the cache' do
|
|
|
|
allow(Rails.cache).to receive(:delete)
|
|
|
|
|
|
|
|
described_class.create!(ip: '127.0.0.1', severity: :no_access)
|
|
|
|
|
|
|
|
expect(Rails.cache).to have_received(:delete).with(described_class::CACHE_KEY)
|
|
|
|
end
|
|
|
|
end
|
2020-10-12 10:33:49 -04:00
|
|
|
end
|