No need to disable rate limiter after running tests (#13093)

We disable rate limiter before running every test here 90ab3b1c75/spec/rails_helper.rb (L109-L109)
This commit is contained in:
Andrei Prigorshnev 2021-05-19 16:04:35 +04:00 committed by GitHub
parent 9e4288a4ab
commit 075cd07a07
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
11 changed files with 0 additions and 37 deletions

View File

@ -195,10 +195,6 @@ describe Auth::DefaultCurrentUserProvider do
RateLimiter.enable RateLimiter.enable
end end
after do
RateLimiter.disable
end
it "rate limits api requests per api key" do it "rate limits api requests per api key" do
global_setting :max_admin_api_reqs_per_key_per_minute, 3 global_setting :max_admin_api_reqs_per_key_per_minute, 3
@ -424,10 +420,6 @@ describe Auth::DefaultCurrentUserProvider do
RateLimiter.enable RateLimiter.enable
end end
after do
RateLimiter.disable
end
it "can only try 10 bad cookies a minute" do it "can only try 10 bad cookies a minute" do
token = UserAuthToken.generate!(user_id: user.id) token = UserAuthToken.generate!(user_id: user.id)
@ -627,10 +619,6 @@ describe Auth::DefaultCurrentUserProvider do
RateLimiter.enable RateLimiter.enable
end end
after do
RateLimiter.disable
end
it "rate limits api usage" do it "rate limits api usage" do
limiter1 = RateLimiter.new(nil, "user_api_day_#{api_key.key}", 10, 60) limiter1 = RateLimiter.new(nil, "user_api_day_#{api_key.key}", 10, 60)
limiter2 = RateLimiter.new(nil, "user_api_min_#{api_key.key}", 10, 60) limiter2 = RateLimiter.new(nil, "user_api_min_#{api_key.key}", 10, 60)

View File

@ -178,10 +178,6 @@ describe Middleware::AnonymousCache do
RateLimiter.enable RateLimiter.enable
end end
after do
RateLimiter.disable
end
it 'will revert to anonymous once we reach the limit' do it 'will revert to anonymous once we reach the limit' do
RateLimiter.clear_all! RateLimiter.clear_all!

View File

@ -205,7 +205,6 @@ describe Middleware::RequestTracker do
end end
after do after do
RateLimiter.disable
Rails.logger = @old_logger Rails.logger = @old_logger
end end

View File

@ -34,10 +34,6 @@ describe RateLimiter do
rate_limiter.clear! rate_limiter.clear!
end end
after do
RateLimiter.disable
end
context 'aggressive rate limiter' do context 'aggressive rate limiter' do
it 'can operate correctly and totally stop limiting' do it 'can operate correctly and totally stop limiting' do

View File

@ -10,10 +10,6 @@ describe 'rate limiter integration' do
RateLimiter.clear_all! RateLimiter.clear_all!
end end
after do
RateLimiter.disable
end
it "will rate limit message bus requests once queueing" do it "will rate limit message bus requests once queueing" do
freeze_time freeze_time

View File

@ -875,10 +875,6 @@ describe Category do
end end
describe 'auto bump' do describe 'auto bump' do
after do
RateLimiter.disable
end
it 'should correctly automatically bump topics' do it 'should correctly automatically bump topics' do
freeze_time freeze_time
category = Fabricate(:category_with_definition, created_at: 1.minute.ago) category = Fabricate(:category_with_definition, created_at: 1.minute.ago)

View File

@ -629,7 +629,6 @@ describe Topic do
after do after do
RateLimiter.clear_all! RateLimiter.clear_all!
RateLimiter.disable
end end
it "rate limits topic invitations" do it "rate limits topic invitations" do
@ -2296,7 +2295,6 @@ describe Topic do
after do after do
RateLimiter.clear_all! RateLimiter.clear_all!
RateLimiter.disable
end end
it "limits according to max_personal_messages_per_day" do it "limits according to max_personal_messages_per_day" do

View File

@ -692,8 +692,6 @@ RSpec.describe ApplicationController do
RateLimiter.enable RateLimiter.enable
end end
after { RateLimiter.disable }
it "serves a LimitExceeded error in the preferred locale" do it "serves a LimitExceeded error in the preferred locale" do
SiteSetting.max_likes_per_day = 1 SiteSetting.max_likes_per_day = 1
post1 = Fabricate(:post) post1 = Fabricate(:post)

View File

@ -320,8 +320,6 @@ describe InvitesController do
.to change { RateLimiter.new(user, 'resend-invite-per-hour', 10, 1.hour).remaining }.by(-1) .to change { RateLimiter.new(user, 'resend-invite-per-hour', 10, 1.hour).remaining }.by(-1)
expect(response.status).to eq(200) expect(response.status).to eq(200)
expect(Jobs::InviteEmail.jobs.size).to eq(1) expect(Jobs::InviteEmail.jobs.size).to eq(1)
ensure
RateLimiter.disable
end end
it 'cannot create duplicated invites' do it 'cannot create duplicated invites' do

View File

@ -324,7 +324,6 @@ describe UsersController do
context "rate limiting" do context "rate limiting" do
before { RateLimiter.clear_all!; RateLimiter.enable } before { RateLimiter.clear_all!; RateLimiter.enable }
after { RateLimiter.disable }
it "rate limits reset passwords" do it "rate limits reset passwords" do
freeze_time freeze_time

View File

@ -134,7 +134,6 @@ describe UsersEmailController do
context "rate limiting" do context "rate limiting" do
before { RateLimiter.clear_all!; RateLimiter.enable } before { RateLimiter.clear_all!; RateLimiter.enable }
after { RateLimiter.disable }
it "rate limits by IP" do it "rate limits by IP" do
freeze_time freeze_time