castle-rb 4.3.0 → 7.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +148 -49
- data/lib/castle.rb +49 -28
- data/lib/castle/api.rb +21 -14
- data/lib/castle/api/approve_device.rb +20 -0
- data/lib/castle/api/authenticate.rb +37 -0
- data/lib/castle/api/end_impersonation.rb +24 -0
- data/lib/castle/api/filter.rb +37 -0
- data/lib/castle/api/get_device.rb +20 -0
- data/lib/castle/api/get_devices_for_user.rb +20 -0
- data/lib/castle/api/log.rb +37 -0
- data/lib/castle/api/report_device.rb +20 -0
- data/lib/castle/api/risk.rb +37 -0
- data/lib/castle/api/start_impersonation.rb +24 -0
- data/lib/castle/api/track.rb +21 -0
- data/lib/castle/client.rb +78 -51
- data/lib/castle/{extractors/client_id.rb → client_id/extract.rb} +2 -2
- data/lib/castle/commands/approve_device.rb +17 -0
- data/lib/castle/commands/authenticate.rb +13 -13
- data/lib/castle/commands/end_impersonation.rb +25 -0
- data/lib/castle/commands/filter.rb +22 -0
- data/lib/castle/commands/get_device.rb +17 -0
- data/lib/castle/commands/get_devices_for_user.rb +17 -0
- data/lib/castle/commands/log.rb +22 -0
- data/lib/castle/commands/report_device.rb +17 -0
- data/lib/castle/commands/risk.rb +22 -0
- data/lib/castle/commands/start_impersonation.rb +25 -0
- data/lib/castle/commands/track.rb +12 -13
- data/lib/castle/configuration.rb +49 -32
- data/lib/castle/context/{default.rb → get_default.rb} +5 -6
- data/lib/castle/context/{merger.rb → merge.rb} +3 -3
- data/lib/castle/context/prepare.rb +18 -0
- data/lib/castle/context/{sanitizer.rb → sanitize.rb} +1 -1
- data/lib/castle/core/get_connection.rb +27 -0
- data/lib/castle/{api/response.rb → core/process_response.rb} +8 -3
- data/lib/castle/core/process_webhook.rb +25 -0
- data/lib/castle/core/send_request.rb +42 -0
- data/lib/castle/errors.rb +38 -12
- data/lib/castle/failover/prepare_response.rb +18 -0
- data/lib/castle/failover/strategy.rb +23 -0
- data/lib/castle/headers/extract.rb +47 -0
- data/lib/castle/headers/filter.rb +40 -0
- data/lib/castle/headers/format.rb +24 -0
- data/lib/castle/{extractors/ip.rb → ips/extract.rb} +11 -7
- data/lib/castle/logger.rb +19 -0
- data/lib/castle/payload/prepare.rb +26 -0
- data/lib/castle/secure_mode.rb +7 -2
- data/lib/castle/session.rb +18 -0
- data/lib/castle/singleton_configuration.rb +9 -0
- data/lib/castle/support/hanami.rb +2 -6
- data/lib/castle/support/rails.rb +1 -3
- data/lib/castle/utils/clean_invalid_chars.rb +22 -0
- data/lib/castle/utils/clone.rb +15 -0
- data/lib/castle/utils/deep_symbolize_keys.rb +45 -0
- data/lib/castle/utils/get_timestamp.rb +15 -0
- data/lib/castle/utils/{merger.rb → merge.rb} +3 -3
- data/lib/castle/utils/secure_compare.rb +22 -0
- data/lib/castle/validators/not_supported.rb +1 -0
- data/lib/castle/validators/present.rb +1 -0
- data/lib/castle/verdict.rb +15 -0
- data/lib/castle/version.rb +1 -1
- data/lib/castle/webhooks/verify.rb +45 -0
- data/spec/integration/rails/rails_spec.rb +42 -14
- data/spec/integration/rails/support/application.rb +3 -1
- data/spec/integration/rails/support/home_controller.rb +50 -6
- data/spec/lib/castle/api/approve_device_spec.rb +21 -0
- data/spec/lib/castle/api/authenticate_spec.rb +136 -0
- data/spec/lib/castle/api/end_impersonation_spec.rb +65 -0
- data/spec/lib/castle/api/filter_spec.rb +5 -0
- data/spec/lib/castle/api/get_device_spec.rb +19 -0
- data/spec/lib/castle/api/get_devices_for_user_spec.rb +19 -0
- data/spec/lib/castle/api/log_spec.rb +5 -0
- data/spec/lib/castle/api/report_device_spec.rb +21 -0
- data/spec/lib/castle/api/risk_spec.rb +5 -0
- data/spec/lib/castle/api/start_impersonation_spec.rb +65 -0
- data/spec/lib/castle/api/track_spec.rb +72 -0
- data/spec/lib/castle/api_spec.rb +14 -15
- data/spec/lib/castle/{extractors/client_id_spec.rb → client_id/extract_spec.rb} +6 -15
- data/spec/lib/castle/client_spec.rb +108 -93
- data/spec/lib/castle/commands/approve_device_spec.rb +24 -0
- data/spec/lib/castle/commands/authenticate_spec.rb +15 -31
- data/spec/lib/castle/commands/end_impersonation_spec.rb +79 -0
- data/spec/lib/castle/commands/filter_spec.rb +72 -0
- data/spec/lib/castle/commands/get_device_spec.rb +24 -0
- data/spec/lib/castle/commands/{review_spec.rb → get_devices_for_user_spec.rb} +7 -7
- data/spec/lib/castle/commands/log_spec.rb +73 -0
- data/spec/lib/castle/commands/report_device_spec.rb +24 -0
- data/spec/lib/castle/commands/risk_spec.rb +73 -0
- data/spec/lib/castle/commands/start_impersonation_spec.rb +79 -0
- data/spec/lib/castle/commands/track_spec.rb +14 -34
- data/spec/lib/castle/configuration_spec.rb +8 -141
- data/spec/lib/castle/context/{default_spec.rb → get_default_spec.rb} +9 -10
- data/spec/lib/castle/context/{merger_spec.rb → merge_spec.rb} +1 -1
- data/spec/lib/castle/context/prepare_spec.rb +43 -0
- data/spec/lib/castle/context/{sanitizer_spec.rb → sanitize_spec.rb} +1 -1
- data/spec/lib/castle/core/get_connection_spec.rb +43 -0
- data/spec/lib/castle/{api/response_spec.rb → core/process_response_spec.rb} +49 -1
- data/spec/lib/castle/core/process_webhook_spec.rb +46 -0
- data/spec/lib/castle/core/send_request_spec.rb +77 -0
- data/spec/lib/castle/failover/strategy_spec.rb +12 -0
- data/spec/lib/castle/{extractors/headers_spec.rb → headers/extract_spec.rb} +18 -20
- data/spec/lib/castle/headers/filter_spec.rb +39 -0
- data/spec/lib/castle/headers/format_spec.rb +25 -0
- data/spec/lib/castle/{extractors/ip_spec.rb → ips/extract_spec.rb} +5 -14
- data/spec/lib/castle/logger_spec.rb +38 -0
- data/spec/lib/castle/payload/prepare_spec.rb +55 -0
- data/spec/lib/castle/session_spec.rb +65 -0
- data/spec/lib/castle/singleton_configuration_spec.rb +14 -0
- data/spec/lib/castle/utils/clean_invalid_chars_spec.rb +69 -0
- data/spec/lib/castle/utils/{cloner_spec.rb → clone_spec.rb} +3 -3
- data/spec/lib/castle/utils/deep_symbolize_keys_spec.rb +50 -0
- data/spec/lib/castle/utils/{timestamp_spec.rb → get_timestamp_spec.rb} +1 -1
- data/spec/lib/castle/utils/merge_spec.rb +15 -0
- data/spec/lib/castle/validators/present_spec.rb +5 -6
- data/spec/lib/castle/verdict_spec.rb +9 -0
- data/spec/lib/castle/webhooks/verify_spec.rb +53 -0
- data/spec/lib/castle_spec.rb +4 -10
- data/spec/spec_helper.rb +3 -3
- data/spec/support/shared_examples/action_request.rb +152 -0
- data/spec/support/shared_examples/configuration.rb +101 -0
- metadata +147 -67
- data/lib/castle/api/request.rb +0 -42
- data/lib/castle/api/session.rb +0 -39
- data/lib/castle/commands/identify.rb +0 -23
- data/lib/castle/commands/impersonate.rb +0 -26
- data/lib/castle/commands/review.rb +0 -14
- data/lib/castle/events.rb +0 -49
- data/lib/castle/extractors/headers.rb +0 -45
- data/lib/castle/failover_auth_response.rb +0 -21
- data/lib/castle/headers_filter.rb +0 -35
- data/lib/castle/headers_formatter.rb +0 -22
- data/lib/castle/review.rb +0 -11
- data/lib/castle/utils.rb +0 -55
- data/lib/castle/utils/cloner.rb +0 -11
- data/lib/castle/utils/timestamp.rb +0 -12
- data/spec/lib/castle/api/request_spec.rb +0 -72
- data/spec/lib/castle/api/session_spec.rb +0 -47
- data/spec/lib/castle/commands/identify_spec.rb +0 -88
- data/spec/lib/castle/commands/impersonate_spec.rb +0 -107
- data/spec/lib/castle/events_spec.rb +0 -5
- data/spec/lib/castle/headers_filter_spec.rb +0 -38
- data/spec/lib/castle/headers_formatter_spec.rb +0 -25
- data/spec/lib/castle/review_spec.rb +0 -19
- data/spec/lib/castle/utils/merger_spec.rb +0 -13
- data/spec/lib/castle/utils_spec.rb +0 -156
@@ -0,0 +1,55 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::Payload::Prepare do
|
4
|
+
let(:ip) { '1.2.3.4' }
|
5
|
+
let(:cookie_id) { 'abcd' }
|
6
|
+
let(:ua) { 'Chrome' }
|
7
|
+
let(:env) do
|
8
|
+
Rack::MockRequest.env_for(
|
9
|
+
'/',
|
10
|
+
'HTTP_USER_AGENT' => ua,
|
11
|
+
'HTTP_X_FORWARDED_FOR' => ip,
|
12
|
+
'HTTP_COOKIE' => "__cid=#{cookie_id};other=efgh"
|
13
|
+
)
|
14
|
+
end
|
15
|
+
let(:request) { Rack::Request.new(env) }
|
16
|
+
|
17
|
+
let(:headers) do
|
18
|
+
{ 'Content-Length': '0', 'User-Agent': ua, 'X-Forwarded-For': ip.to_s, 'Cookie': true }
|
19
|
+
end
|
20
|
+
let(:context) do
|
21
|
+
{
|
22
|
+
client_id: 'abcd',
|
23
|
+
active: true,
|
24
|
+
user_agent: ua,
|
25
|
+
headers: headers,
|
26
|
+
ip: ip,
|
27
|
+
library: {
|
28
|
+
name: 'castle-rb',
|
29
|
+
version: '2.2.0'
|
30
|
+
}
|
31
|
+
}
|
32
|
+
end
|
33
|
+
|
34
|
+
let(:time_now) { Time.now }
|
35
|
+
let(:time_formatted) { time_now.utc.iso8601(3) }
|
36
|
+
let(:payload_options) { { user_id: '1234', user_traits: { name: 'Jo' } } }
|
37
|
+
let(:result) do
|
38
|
+
{ user_id: '1234', user_traits: { name: 'Jo' }, timestamp: time_formatted, context: context }
|
39
|
+
end
|
40
|
+
|
41
|
+
before do
|
42
|
+
Timecop.freeze(time_now)
|
43
|
+
stub_const('Castle::VERSION', '2.2.0')
|
44
|
+
end
|
45
|
+
|
46
|
+
after { Timecop.return }
|
47
|
+
|
48
|
+
describe '#call' do
|
49
|
+
subject(:generated) { described_class.call(payload_options, request) }
|
50
|
+
|
51
|
+
context 'when active true' do
|
52
|
+
it { is_expected.to eql(result) }
|
53
|
+
end
|
54
|
+
end
|
55
|
+
end
|
@@ -0,0 +1,65 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::Session do
|
4
|
+
describe '.call' do
|
5
|
+
context 'when ssl false' do
|
6
|
+
let(:localhost) { 'localhost' }
|
7
|
+
let(:port) { 3002 }
|
8
|
+
|
9
|
+
before do
|
10
|
+
Castle.config.base_url = 'http://localhost:3002'
|
11
|
+
stub_request(:get, 'localhost:3002/test').to_return(status: 200, body: '{}', headers: {})
|
12
|
+
end
|
13
|
+
|
14
|
+
context 'with block' do
|
15
|
+
let(:api_url) { '/test' }
|
16
|
+
let(:request) { Net::HTTP::Get.new(api_url) }
|
17
|
+
|
18
|
+
before do
|
19
|
+
allow(Net::HTTP).to receive(:new).with(localhost, port).and_call_original
|
20
|
+
|
21
|
+
described_class.call { |http| http.request(request) }
|
22
|
+
end
|
23
|
+
|
24
|
+
it { expect(Net::HTTP).to have_received(:new).with(localhost, port) }
|
25
|
+
|
26
|
+
it { expect(a_request(:get, 'localhost:3002/test')).to have_been_made.once }
|
27
|
+
end
|
28
|
+
|
29
|
+
context 'without block' do
|
30
|
+
before { described_class.call }
|
31
|
+
|
32
|
+
it { expect(a_request(:get, 'localhost:3002/test')).not_to have_been_made }
|
33
|
+
end
|
34
|
+
end
|
35
|
+
|
36
|
+
context 'when ssl true' do
|
37
|
+
let(:localhost) { 'localhost' }
|
38
|
+
let(:port) { 443 }
|
39
|
+
|
40
|
+
before do
|
41
|
+
Castle.config.base_url = 'https://localhost'
|
42
|
+
stub_request(:get, 'https://localhost/test').to_return(
|
43
|
+
status: 200,
|
44
|
+
body: '{}',
|
45
|
+
headers: {}
|
46
|
+
)
|
47
|
+
end
|
48
|
+
|
49
|
+
context 'with block' do
|
50
|
+
let(:api_url) { '/test' }
|
51
|
+
let(:request) { Net::HTTP::Get.new(api_url) }
|
52
|
+
|
53
|
+
before do
|
54
|
+
allow(Net::HTTP).to receive(:new).with(localhost, port).and_call_original
|
55
|
+
|
56
|
+
allow(Net::HTTP).to receive(:start)
|
57
|
+
|
58
|
+
described_class.call { |http| http.request(request) }
|
59
|
+
end
|
60
|
+
|
61
|
+
it { expect(Net::HTTP).to have_received(:new).with(localhost, port) }
|
62
|
+
end
|
63
|
+
end
|
64
|
+
end
|
65
|
+
end
|
@@ -0,0 +1,14 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::SingletonConfiguration do
|
4
|
+
subject(:config) { described_class.instance }
|
5
|
+
|
6
|
+
it_behaves_like 'configuration_host'
|
7
|
+
it_behaves_like 'configuration_request_timeout'
|
8
|
+
it_behaves_like 'configuration_allowlisted'
|
9
|
+
it_behaves_like 'configuration_denylisted'
|
10
|
+
it_behaves_like 'configuration_failover_strategy'
|
11
|
+
it_behaves_like 'configuration_api_secret'
|
12
|
+
|
13
|
+
it { expect(config.api_secret).to be_eql('secret') }
|
14
|
+
end
|
@@ -0,0 +1,69 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::Utils::CleanInvalidChars do
|
4
|
+
describe '::call' do
|
5
|
+
subject { described_class.call(input) }
|
6
|
+
|
7
|
+
context 'when input is a string' do
|
8
|
+
let(:input) { '1234' }
|
9
|
+
|
10
|
+
it { is_expected.to eq input }
|
11
|
+
end
|
12
|
+
|
13
|
+
context 'when input is an array' do
|
14
|
+
let(:input) { [1, 2, 3, '4'] }
|
15
|
+
|
16
|
+
it { is_expected.to eq input }
|
17
|
+
end
|
18
|
+
|
19
|
+
context 'when input is a hash' do
|
20
|
+
let(:input) { { user_id: 1 } }
|
21
|
+
|
22
|
+
it { is_expected.to eq input }
|
23
|
+
end
|
24
|
+
|
25
|
+
context 'when input is nil' do
|
26
|
+
let(:input) { nil }
|
27
|
+
|
28
|
+
it { is_expected.to eq input }
|
29
|
+
end
|
30
|
+
|
31
|
+
context 'when input is a nested hash' do
|
32
|
+
let(:input) { { user: { id: 1 } } }
|
33
|
+
|
34
|
+
it { is_expected.to eq input }
|
35
|
+
end
|
36
|
+
|
37
|
+
context 'with invalid UTF-8 characters' do
|
38
|
+
context 'when input is a hash' do
|
39
|
+
let(:input) { { user_id: "inv\xC4lid" } }
|
40
|
+
|
41
|
+
it { is_expected.to eq(user_id: 'inv�lid') }
|
42
|
+
end
|
43
|
+
|
44
|
+
context 'when input is a nested hash' do
|
45
|
+
let(:input) { { user: { id: "inv\xC4lid" } } }
|
46
|
+
|
47
|
+
it { is_expected.to eq(user: { id: 'inv�lid' }) }
|
48
|
+
end
|
49
|
+
|
50
|
+
context 'when input is an array of hashes' do
|
51
|
+
let(:input) { [{ user: "inv\xC4lid" }] * 2 }
|
52
|
+
|
53
|
+
it { is_expected.to eq([{ user: 'inv�lid' }, { user: 'inv�lid' }]) }
|
54
|
+
end
|
55
|
+
|
56
|
+
context 'when input is an array' do
|
57
|
+
let(:input) { ["inv\xC4lid"] * 2 }
|
58
|
+
|
59
|
+
it { is_expected.to eq(%w[inv�lid inv�lid]) }
|
60
|
+
end
|
61
|
+
|
62
|
+
context 'when input is a hash with array in key' do
|
63
|
+
let(:input) { { items: ["inv\xC4lid"] * 2 } }
|
64
|
+
|
65
|
+
it { is_expected.to eq(items: %w[inv�lid inv�lid]) }
|
66
|
+
end
|
67
|
+
end
|
68
|
+
end
|
69
|
+
end
|
@@ -1,13 +1,13 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
-
describe Castle::Utils::
|
4
|
-
subject(:
|
3
|
+
describe Castle::Utils::Clone do
|
4
|
+
subject(:clone) { described_class }
|
5
5
|
|
6
6
|
describe 'call' do
|
7
7
|
let(:nested) { { c: '3' } }
|
8
8
|
let(:first) { { test: { test1: { c: '4' }, test2: nested, a: '1', b: '2' } } }
|
9
9
|
let(:result) { { test: { test1: { c: '4' }, test2: { c: '3' }, a: '1', b: '2' } } }
|
10
|
-
let(:cloned) {
|
10
|
+
let(:cloned) { clone.call(first) }
|
11
11
|
|
12
12
|
before { cloned }
|
13
13
|
|
@@ -0,0 +1,50 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::Utils::DeepSymbolizeKeys do
|
4
|
+
let(:nested_strings) { { 'a' => { 'b' => { 'c' => 3 } } } }
|
5
|
+
let(:nested_symbols) { { a: { b: { c: 3 } } } }
|
6
|
+
let(:nested_mixed) { { 'a' => { b: { 'c' => 3 } } } }
|
7
|
+
let(:string_array_of_hashes) { { 'a' => [{ 'b' => 2 }, { 'c' => 3 }, 4] } }
|
8
|
+
let(:symbol_array_of_hashes) { { a: [{ b: 2 }, { c: 3 }, 4] } }
|
9
|
+
let(:mixed_array_of_hashes) { { a: [{ b: 2 }, { 'c' => 3 }, 4] } }
|
10
|
+
|
11
|
+
describe '::call' do
|
12
|
+
subject { described_class.call(hash) }
|
13
|
+
|
14
|
+
context 'when nested_symbols' do
|
15
|
+
let(:hash) { nested_symbols }
|
16
|
+
|
17
|
+
it { is_expected.to eq(nested_symbols) }
|
18
|
+
end
|
19
|
+
|
20
|
+
context 'when nested_strings' do
|
21
|
+
let(:hash) { nested_strings }
|
22
|
+
|
23
|
+
it { is_expected.to eq(nested_symbols) }
|
24
|
+
end
|
25
|
+
|
26
|
+
context 'when nested_mixed' do
|
27
|
+
let(:hash) { nested_mixed }
|
28
|
+
|
29
|
+
it { is_expected.to eq(nested_symbols) }
|
30
|
+
end
|
31
|
+
|
32
|
+
context 'when string_array_of_hashes' do
|
33
|
+
let(:hash) { string_array_of_hashes }
|
34
|
+
|
35
|
+
it { is_expected.to eq(symbol_array_of_hashes) }
|
36
|
+
end
|
37
|
+
|
38
|
+
context 'when symbol_array_of_hashes' do
|
39
|
+
let(:hash) { symbol_array_of_hashes }
|
40
|
+
|
41
|
+
it { is_expected.to eq(symbol_array_of_hashes) }
|
42
|
+
end
|
43
|
+
|
44
|
+
context 'when mixed_array_of_hashes' do
|
45
|
+
let(:hash) { mixed_array_of_hashes }
|
46
|
+
|
47
|
+
it { is_expected.to eq(symbol_array_of_hashes) }
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::Utils::Merge do
|
4
|
+
subject(:merge) { described_class }
|
5
|
+
|
6
|
+
describe 'call' do
|
7
|
+
let(:first) { { test: { test1: { c: '4' }, test2: { c: '3' }, a: '1', b: '2' } } }
|
8
|
+
let(:second) do
|
9
|
+
{ test2: '2', test: { 'test1' => { d: '5' }, :test2 => '6', :a => nil, :b => '3' } }
|
10
|
+
end
|
11
|
+
let(:result) { { test2: '2', test: { test1: { c: '4', d: '5' }, test2: '6', b: '3' } } }
|
12
|
+
|
13
|
+
it { expect(merge.call(first, second)).to be_eql(result) }
|
14
|
+
end
|
15
|
+
end
|
@@ -8,9 +8,7 @@ describe Castle::Validators::Present do
|
|
8
8
|
let(:keys) { %i[second third] }
|
9
9
|
|
10
10
|
it do
|
11
|
-
expect
|
12
|
-
call
|
13
|
-
end.to raise_error(Castle::InvalidParametersError, 'third is missing or empty')
|
11
|
+
expect { call }.to raise_error(Castle::InvalidParametersError, 'third is missing or empty')
|
14
12
|
end
|
15
13
|
end
|
16
14
|
|
@@ -18,9 +16,10 @@ describe Castle::Validators::Present do
|
|
18
16
|
let(:keys) { %i[second invalid] }
|
19
17
|
|
20
18
|
it do
|
21
|
-
expect
|
22
|
-
|
23
|
-
|
19
|
+
expect { call }.to raise_error(
|
20
|
+
Castle::InvalidParametersError,
|
21
|
+
'invalid is missing or empty'
|
22
|
+
)
|
24
23
|
end
|
25
24
|
end
|
26
25
|
|
@@ -0,0 +1,9 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::Verdict do
|
4
|
+
subject(:verdict) { described_class }
|
5
|
+
|
6
|
+
it { expect(verdict::ALLOW).to be_eql('allow') }
|
7
|
+
it { expect(verdict::DENY).to be_eql('deny') }
|
8
|
+
it { expect(verdict::CHALLENGE).to be_eql('challenge') }
|
9
|
+
end
|
@@ -0,0 +1,53 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
describe Castle::Webhooks::Verify do
|
4
|
+
describe '#call' do
|
5
|
+
subject(:call) { described_class.call(webhook) }
|
6
|
+
|
7
|
+
let(:env) { Rack::MockRequest.env_for('/', 'HTTP_X_CASTLE_SIGNATURE' => signature) }
|
8
|
+
|
9
|
+
let(:webhook) { Rack::Request.new(env) }
|
10
|
+
let(:user_id) { '12345' }
|
11
|
+
let(:webhook_body) do
|
12
|
+
{
|
13
|
+
api_version: 'v1',
|
14
|
+
app_id: '12345',
|
15
|
+
type: '$incident.confirmed',
|
16
|
+
created_at: '2020-12-18T12:55:21.779Z',
|
17
|
+
data: {
|
18
|
+
id: 'test',
|
19
|
+
device_token: 'token',
|
20
|
+
user_id: user_id,
|
21
|
+
trigger: '$login.succeeded',
|
22
|
+
context: {},
|
23
|
+
location: {},
|
24
|
+
user_agent: {}
|
25
|
+
},
|
26
|
+
user_traits: {},
|
27
|
+
properties: {},
|
28
|
+
policy: {}
|
29
|
+
}.to_json
|
30
|
+
end
|
31
|
+
|
32
|
+
context 'when success' do
|
33
|
+
let(:signature) { '3ptx3rUOBnGEqPjMrbcJn2UUfzwTKP54dFyP5uyPY+Y=' }
|
34
|
+
|
35
|
+
before { allow(Castle::Core::ProcessWebhook).to receive(:call).and_return(webhook_body) }
|
36
|
+
|
37
|
+
it { expect { call }.not_to raise_error }
|
38
|
+
end
|
39
|
+
|
40
|
+
context 'when signature is malformed' do
|
41
|
+
let(:signature) { '123' }
|
42
|
+
|
43
|
+
before { allow(Castle::Core::ProcessWebhook).to receive(:call).and_return(webhook_body) }
|
44
|
+
|
45
|
+
it do
|
46
|
+
expect { call }.to raise_error(
|
47
|
+
Castle::WebhookVerificationError,
|
48
|
+
'Signature not matching the expected signature'
|
49
|
+
)
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
data/spec/lib/castle_spec.rb
CHANGED
@@ -42,11 +42,7 @@ describe Castle do
|
|
42
42
|
end
|
43
43
|
|
44
44
|
context 'with block and options' do
|
45
|
-
before
|
46
|
-
castle.configure(request_timeout: timeout) do |config|
|
47
|
-
config.api_secret = value
|
48
|
-
end
|
49
|
-
end
|
45
|
+
before { castle.configure(request_timeout: timeout) { |config| config.api_secret = value } }
|
50
46
|
|
51
47
|
it_behaves_like 'config_setup'
|
52
48
|
end
|
@@ -56,11 +52,9 @@ describe Castle do
|
|
56
52
|
let(:value) { 'new_secret' }
|
57
53
|
|
58
54
|
it do
|
59
|
-
expect
|
60
|
-
|
61
|
-
|
62
|
-
end
|
63
|
-
end.to raise_error(Castle::ConfigurationError)
|
55
|
+
expect { castle.configure { |config| config.wrong_config = value } }.to raise_error(
|
56
|
+
Castle::ConfigurationError
|
57
|
+
)
|
64
58
|
end
|
65
59
|
end
|
66
60
|
end
|
data/spec/spec_helper.rb
CHANGED
@@ -14,11 +14,11 @@ require 'castle'
|
|
14
14
|
|
15
15
|
WebMock.disable_net_connect!(allow_localhost: true)
|
16
16
|
|
17
|
+
Dir['./spec/support/**/*.rb'].sort.each { |f| require f }
|
18
|
+
|
17
19
|
RSpec.configure do |config|
|
18
20
|
config.before do
|
19
21
|
Castle.config.reset
|
20
|
-
Castle.configure
|
21
|
-
cfg.api_secret = 'secret'
|
22
|
-
end
|
22
|
+
Castle.configure { |cfg| cfg.api_secret = 'secret' }
|
23
23
|
end
|
24
24
|
end
|
@@ -0,0 +1,152 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
RSpec.shared_examples_for 'action request' do |action|
|
4
|
+
subject(:request_response) { client.send(action.to_sym, options) }
|
5
|
+
|
6
|
+
let(:options) do
|
7
|
+
{
|
8
|
+
request_token: request_token,
|
9
|
+
event: event,
|
10
|
+
status: status,
|
11
|
+
user: user,
|
12
|
+
context: context,
|
13
|
+
properties: properties
|
14
|
+
}
|
15
|
+
end
|
16
|
+
let(:request_token) { '7e51335b-f4bc-4bc7-875d-b713fb61eb23-bf021a3022a1a302' }
|
17
|
+
let(:event) { '$login' }
|
18
|
+
let(:status) { '$succeeded' }
|
19
|
+
let(:user) { { id: '1234', email: 'foobar@mail.com' } }
|
20
|
+
let(:properties) { {} }
|
21
|
+
let(:request_body) do
|
22
|
+
{
|
23
|
+
request_token: request_token,
|
24
|
+
event: event,
|
25
|
+
status: status,
|
26
|
+
user: user,
|
27
|
+
context: context,
|
28
|
+
properties: properties,
|
29
|
+
timestamp: time_auto,
|
30
|
+
sent_at: time_auto
|
31
|
+
}
|
32
|
+
end
|
33
|
+
|
34
|
+
context 'when used with symbol keys' do
|
35
|
+
it do
|
36
|
+
request_response
|
37
|
+
|
38
|
+
assert_requested :post, "https://api.castle.io/v1/#{action}", times: 1 do |req|
|
39
|
+
JSON.parse(req.body) == JSON.parse(request_body.to_json)
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
context 'when passed timestamp in options and no defined timestamp' do
|
44
|
+
let(:client) { client_with_no_timestamp }
|
45
|
+
|
46
|
+
before do
|
47
|
+
options[:timestamp] = time_user
|
48
|
+
request_body[:timestamp] = time_user
|
49
|
+
|
50
|
+
request_response
|
51
|
+
end
|
52
|
+
|
53
|
+
it do
|
54
|
+
assert_requested :post, "https://api.castle.io/v1/#{action}", times: 1 do |req|
|
55
|
+
JSON.parse(req.body) == JSON.parse(request_body.to_json)
|
56
|
+
end
|
57
|
+
end
|
58
|
+
end
|
59
|
+
|
60
|
+
context 'with client initialized with timestamp' do
|
61
|
+
let(:client) { client_with_user_timestamp }
|
62
|
+
|
63
|
+
before do
|
64
|
+
request_body[:timestamp] = time_user
|
65
|
+
|
66
|
+
request_response
|
67
|
+
end
|
68
|
+
|
69
|
+
it do
|
70
|
+
assert_requested :post, "https://api.castle.io/v1/#{action}", times: 1 do |req|
|
71
|
+
JSON.parse(req.body) == JSON.parse(request_body.to_json)
|
72
|
+
end
|
73
|
+
end
|
74
|
+
end
|
75
|
+
end
|
76
|
+
|
77
|
+
context 'when used with string keys' do
|
78
|
+
before { request_response }
|
79
|
+
|
80
|
+
it do
|
81
|
+
assert_requested :post, "https://api.castle.io/v1/#{action}", times: 1 do |req|
|
82
|
+
JSON.parse(req.body) == JSON.parse(request_body.to_json)
|
83
|
+
end
|
84
|
+
end
|
85
|
+
end
|
86
|
+
|
87
|
+
context 'when tracking enabled' do
|
88
|
+
before { request_response }
|
89
|
+
|
90
|
+
it do
|
91
|
+
assert_requested :post, "https://api.castle.io/v1/#{action}", times: 1 do |req|
|
92
|
+
JSON.parse(req.body) == JSON.parse(request_body.to_json)
|
93
|
+
end
|
94
|
+
end
|
95
|
+
|
96
|
+
it { expect(request_response[:failover]).to be false }
|
97
|
+
it { expect(request_response[:failover_reason]).to be_nil }
|
98
|
+
end
|
99
|
+
|
100
|
+
context 'when tracking disabled' do
|
101
|
+
before do
|
102
|
+
client.disable_tracking
|
103
|
+
request_response
|
104
|
+
end
|
105
|
+
|
106
|
+
it { assert_not_requested :post, "https://api.castle.io/v1/#{action}" }
|
107
|
+
it { expect(request_response[:action]).to be_eql(Castle::Verdict::ALLOW) }
|
108
|
+
it { expect(request_response[:user_id]).to be_eql('1234') }
|
109
|
+
it { expect(request_response[:failover]).to be true }
|
110
|
+
it { expect(request_response[:failover_reason]).to be_eql('Castle is set to do not track.') }
|
111
|
+
end
|
112
|
+
|
113
|
+
context 'when request with fail' do
|
114
|
+
before do
|
115
|
+
allow(Castle::API).to receive(:send_request).and_raise(
|
116
|
+
Castle::RequestError.new(Timeout::Error)
|
117
|
+
)
|
118
|
+
end
|
119
|
+
|
120
|
+
context 'with request error and throw strategy' do
|
121
|
+
before { allow(Castle.config).to receive(:failover_strategy).and_return(:throw) }
|
122
|
+
|
123
|
+
it { expect { request_response }.to raise_error(Castle::RequestError) }
|
124
|
+
end
|
125
|
+
|
126
|
+
context 'with request error and not throw on eg deny strategy' do
|
127
|
+
it { assert_not_requested :post, "https:/:secret@api.castle.io/v1/#{action}" }
|
128
|
+
it { expect(request_response[:action]).to be_eql('allow') }
|
129
|
+
it { expect(request_response[:user_id]).to be_eql('1234') }
|
130
|
+
it { expect(request_response[:failover]).to be true }
|
131
|
+
it { expect(request_response[:failover_reason]).to be_eql('Castle::RequestError') }
|
132
|
+
end
|
133
|
+
end
|
134
|
+
|
135
|
+
context 'when request is internal server error' do
|
136
|
+
before { allow(Castle::API).to receive(:send_request).and_raise(Castle::InternalServerError) }
|
137
|
+
|
138
|
+
describe 'throw strategy' do
|
139
|
+
before { allow(Castle.config).to receive(:failover_strategy).and_return(:throw) }
|
140
|
+
|
141
|
+
it { expect { request_response }.to raise_error(Castle::InternalServerError) }
|
142
|
+
end
|
143
|
+
|
144
|
+
describe 'not throw on eg deny strategy' do
|
145
|
+
it { assert_not_requested :post, "https:/:secret@api.castle.io/v1/#{action}" }
|
146
|
+
it { expect(request_response[:action]).to be_eql('allow') }
|
147
|
+
it { expect(request_response[:user_id]).to be_eql('1234') }
|
148
|
+
it { expect(request_response[:failover]).to be true }
|
149
|
+
it { expect(request_response[:failover_reason]).to be_eql('Castle::InternalServerError') }
|
150
|
+
end
|
151
|
+
end
|
152
|
+
end
|