Files
Moltbot/src/gateway/auth-rate-limit.test.ts
2026-02-22 08:40:49 +01:00

220 lines
7.9 KiB
TypeScript

import { afterEach, describe, expect, it, vi } from "vitest";
import {
AUTH_RATE_LIMIT_SCOPE_DEVICE_TOKEN,
AUTH_RATE_LIMIT_SCOPE_SHARED_SECRET,
createAuthRateLimiter,
type AuthRateLimiter,
} from "./auth-rate-limit.js";
describe("auth rate limiter", () => {
let limiter: AuthRateLimiter;
afterEach(() => {
limiter?.dispose();
});
// ---------- basic sliding window ----------
it("allows requests when no failures have been recorded", () => {
limiter = createAuthRateLimiter({ maxAttempts: 5, windowMs: 60_000, lockoutMs: 300_000 });
const result = limiter.check("192.168.1.1");
expect(result.allowed).toBe(true);
expect(result.remaining).toBe(5);
expect(result.retryAfterMs).toBe(0);
});
it("decrements remaining count after each failure", () => {
limiter = createAuthRateLimiter({ maxAttempts: 3, windowMs: 60_000, lockoutMs: 300_000 });
limiter.recordFailure("10.0.0.1");
expect(limiter.check("10.0.0.1").remaining).toBe(2);
limiter.recordFailure("10.0.0.1");
expect(limiter.check("10.0.0.1").remaining).toBe(1);
});
it("blocks the IP once maxAttempts is reached", () => {
limiter = createAuthRateLimiter({ maxAttempts: 2, windowMs: 60_000, lockoutMs: 10_000 });
limiter.recordFailure("10.0.0.2");
limiter.recordFailure("10.0.0.2");
const result = limiter.check("10.0.0.2");
expect(result.allowed).toBe(false);
expect(result.remaining).toBe(0);
expect(result.retryAfterMs).toBeGreaterThan(0);
expect(result.retryAfterMs).toBeLessThanOrEqual(10_000);
});
// ---------- lockout expiry ----------
it("unblocks after the lockout period expires", () => {
vi.useFakeTimers();
try {
limiter = createAuthRateLimiter({ maxAttempts: 2, windowMs: 60_000, lockoutMs: 5_000 });
limiter.recordFailure("10.0.0.3");
limiter.recordFailure("10.0.0.3");
expect(limiter.check("10.0.0.3").allowed).toBe(false);
// Advance just past the lockout.
vi.advanceTimersByTime(5_001);
const result = limiter.check("10.0.0.3");
expect(result.allowed).toBe(true);
expect(result.remaining).toBe(2);
} finally {
vi.useRealTimers();
}
});
// ---------- sliding window expiry ----------
it("expires old failures outside the window", () => {
vi.useFakeTimers();
try {
limiter = createAuthRateLimiter({ maxAttempts: 3, windowMs: 10_000, lockoutMs: 60_000 });
limiter.recordFailure("10.0.0.4");
limiter.recordFailure("10.0.0.4");
expect(limiter.check("10.0.0.4").remaining).toBe(1);
// Move past the window so the two old failures expire.
vi.advanceTimersByTime(11_000);
expect(limiter.check("10.0.0.4").remaining).toBe(3);
} finally {
vi.useRealTimers();
}
});
// ---------- per-IP isolation ----------
it("tracks IPs independently", () => {
limiter = createAuthRateLimiter({ maxAttempts: 2, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("10.0.0.10");
limiter.recordFailure("10.0.0.10");
expect(limiter.check("10.0.0.10").allowed).toBe(false);
// A different IP should be unaffected.
expect(limiter.check("10.0.0.11").allowed).toBe(true);
expect(limiter.check("10.0.0.11").remaining).toBe(2);
});
it("treats ipv4 and ipv4-mapped ipv6 forms as the same client", () => {
limiter = createAuthRateLimiter({ maxAttempts: 1, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("1.2.3.4");
expect(limiter.check("::ffff:1.2.3.4").allowed).toBe(false);
});
it("tracks scopes independently for the same IP", () => {
limiter = createAuthRateLimiter({ maxAttempts: 1, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("10.0.0.12", AUTH_RATE_LIMIT_SCOPE_SHARED_SECRET);
expect(limiter.check("10.0.0.12", AUTH_RATE_LIMIT_SCOPE_SHARED_SECRET).allowed).toBe(false);
expect(limiter.check("10.0.0.12", AUTH_RATE_LIMIT_SCOPE_DEVICE_TOKEN).allowed).toBe(true);
});
// ---------- loopback exemption ----------
it("exempts loopback addresses by default", () => {
limiter = createAuthRateLimiter({ maxAttempts: 1, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("127.0.0.1");
// Should still be allowed even though maxAttempts is 1.
expect(limiter.check("127.0.0.1").allowed).toBe(true);
});
it("exempts IPv6 loopback by default", () => {
limiter = createAuthRateLimiter({ maxAttempts: 1, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("::1");
expect(limiter.check("::1").allowed).toBe(true);
});
it("rate-limits loopback when exemptLoopback is false", () => {
limiter = createAuthRateLimiter({
maxAttempts: 1,
windowMs: 60_000,
lockoutMs: 60_000,
exemptLoopback: false,
});
limiter.recordFailure("127.0.0.1");
expect(limiter.check("127.0.0.1").allowed).toBe(false);
});
// ---------- reset ----------
it("clears tracking state when reset is called", () => {
limiter = createAuthRateLimiter({ maxAttempts: 2, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("10.0.0.20");
limiter.recordFailure("10.0.0.20");
expect(limiter.check("10.0.0.20").allowed).toBe(false);
limiter.reset("10.0.0.20");
expect(limiter.check("10.0.0.20").allowed).toBe(true);
expect(limiter.check("10.0.0.20").remaining).toBe(2);
});
it("reset only clears the requested scope for an IP", () => {
limiter = createAuthRateLimiter({ maxAttempts: 1, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("10.0.0.21", AUTH_RATE_LIMIT_SCOPE_SHARED_SECRET);
limiter.recordFailure("10.0.0.21", AUTH_RATE_LIMIT_SCOPE_DEVICE_TOKEN);
expect(limiter.check("10.0.0.21", AUTH_RATE_LIMIT_SCOPE_SHARED_SECRET).allowed).toBe(false);
expect(limiter.check("10.0.0.21", AUTH_RATE_LIMIT_SCOPE_DEVICE_TOKEN).allowed).toBe(false);
limiter.reset("10.0.0.21", AUTH_RATE_LIMIT_SCOPE_SHARED_SECRET);
expect(limiter.check("10.0.0.21", AUTH_RATE_LIMIT_SCOPE_SHARED_SECRET).allowed).toBe(true);
expect(limiter.check("10.0.0.21", AUTH_RATE_LIMIT_SCOPE_DEVICE_TOKEN).allowed).toBe(false);
});
// ---------- prune ----------
it("prune removes stale entries", () => {
vi.useFakeTimers();
try {
limiter = createAuthRateLimiter({ maxAttempts: 5, windowMs: 5_000, lockoutMs: 5_000 });
limiter.recordFailure("10.0.0.30");
expect(limiter.size()).toBe(1);
vi.advanceTimersByTime(6_000);
limiter.prune();
expect(limiter.size()).toBe(0);
} finally {
vi.useRealTimers();
}
});
it("prune keeps entries that are still locked out", () => {
vi.useFakeTimers();
try {
limiter = createAuthRateLimiter({ maxAttempts: 1, windowMs: 5_000, lockoutMs: 30_000 });
limiter.recordFailure("10.0.0.31");
expect(limiter.check("10.0.0.31").allowed).toBe(false);
// Move past the window but NOT past the lockout.
vi.advanceTimersByTime(6_000);
limiter.prune();
expect(limiter.size()).toBe(1); // Still locked-out, not pruned.
} finally {
vi.useRealTimers();
}
});
// ---------- undefined / empty IP ----------
it("normalizes undefined IP to 'unknown'", () => {
limiter = createAuthRateLimiter({ maxAttempts: 2, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure(undefined);
limiter.recordFailure(undefined);
expect(limiter.check(undefined).allowed).toBe(false);
expect(limiter.size()).toBe(1);
});
it("normalizes empty-string IP to 'unknown'", () => {
limiter = createAuthRateLimiter({ maxAttempts: 2, windowMs: 60_000, lockoutMs: 60_000 });
limiter.recordFailure("");
limiter.recordFailure("");
expect(limiter.check("").allowed).toBe(false);
});
// ---------- dispose ----------
it("dispose clears all entries", () => {
limiter = createAuthRateLimiter();
limiter.recordFailure("10.0.0.40");
expect(limiter.size()).toBe(1);
limiter.dispose();
expect(limiter.size()).toBe(0);
});
});