Skip to content

Commit

Permalink
Add tests on IPWhiteLister.
Browse files Browse the repository at this point in the history
  • Loading branch information
ldez authored and traefiker committed Apr 3, 2018
1 parent 1537861 commit 5921909
Show file tree
Hide file tree
Showing 2 changed files with 130 additions and 1 deletion.
2 changes: 1 addition & 1 deletion middlewares/ip_whitelister.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ func NewIPWhiteLister(whiteList []string, useXForwardedFor bool) (*IPWhiteLister
whiteLister.whiteLister = ip

whiteLister.handler = negroni.HandlerFunc(whiteLister.handle)
log.Debugf("configured %u IP white list: %s", len(whiteList), whiteList)
log.Debugf("configured IP white list: %s", whiteList)

return &whiteLister, nil
}
Expand Down
129 changes: 129 additions & 0 deletions middlewares/ip_whitelister_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,129 @@
package middlewares

import (
"net/http"
"net/http/httptest"
"testing"

"github.com/containous/traefik/whitelist"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)

func TestNewIPWhiteLister(t *testing.T) {
testCases := []struct {
desc string
whiteList []string
useXForwardedFor bool
expectedError string
}{
{
desc: "invalid IP",
whiteList: []string{"foo"},
useXForwardedFor: false,
expectedError: "parsing CIDR whitelist [foo]: parsing CIDR white list <nil>: invalid CIDR address: foo",
},
{
desc: "valid IP",
whiteList: []string{"10.10.10.10"},
useXForwardedFor: false,
expectedError: "",
},
}

for _, test := range testCases {
test := test
t.Run(test.desc, func(t *testing.T) {
t.Parallel()

whiteLister, err := NewIPWhiteLister(test.whiteList, test.useXForwardedFor)

if len(test.expectedError) > 0 {
assert.EqualError(t, err, test.expectedError)
} else {
require.NoError(t, err)
assert.NotNil(t, whiteLister)
}
})
}
}

func TestIPWhiteLister_ServeHTTP(t *testing.T) {
testCases := []struct {
desc string
whiteList []string
useXForwardedFor bool
remoteAddr string
xForwardedFor []string
expected int
}{
{
desc: "authorized with remote address",
whiteList: []string{"20.20.20.20"},
useXForwardedFor: false,
remoteAddr: "20.20.20.20:1234",
xForwardedFor: nil,
expected: 200,
},
{
desc: "non authorized with remote address",
whiteList: []string{"20.20.20.20"},
useXForwardedFor: false,
remoteAddr: "20.20.20.21:1234",
xForwardedFor: nil,
expected: 403,
},
{
desc: "non authorized with remote address (X-Forwarded-For possible)",
whiteList: []string{"20.20.20.20"},
useXForwardedFor: false,
remoteAddr: "20.20.20.21:1234",
xForwardedFor: []string{"20.20.20.20", "40.40.40.40"},
expected: 403,
},
{
desc: "authorized with X-Forwarded-For",
whiteList: []string{"30.30.30.30"},
useXForwardedFor: true,
xForwardedFor: []string{"30.30.30.30", "40.40.40.40"},
expected: 200,
},
{
desc: "non authorized with X-Forwarded-For",
whiteList: []string{"30.30.30.30"},
useXForwardedFor: true,
xForwardedFor: []string{"30.30.30.31", "40.40.40.40"},
expected: 403,
},
}

for _, test := range testCases {
test := test
t.Run(test.desc, func(t *testing.T) {
t.Parallel()

whiteLister, err := NewIPWhiteLister(test.whiteList, test.useXForwardedFor)
require.NoError(t, err)

recorder := httptest.NewRecorder()

req := httptest.NewRequest(http.MethodGet, "http://10.10.10.10", nil)

if len(test.remoteAddr) > 0 {
req.RemoteAddr = test.remoteAddr
}

if len(test.xForwardedFor) > 0 {
for _, xff := range test.xForwardedFor {
req.Header.Add(whitelist.XForwardedFor, xff)
}
}

next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {})

whiteLister.ServeHTTP(recorder, req, next)

assert.Equal(t, test.expected, recorder.Code)
})
}
}

0 comments on commit 5921909

Please sign in to comment.