use http::Method;
use parlov_core::{NormativeStrength, OracleClass, Technique, Vector};
use crate::strategy::Strategy;
use crate::types::{ProbeSpec, RiskLevel, StrategyMetadata};
use crate::util::build_pair;
use crate::ScanContext;
fn metadata() -> StrategyMetadata {
StrategyMetadata {
strategy_id: "rate-limit-headers-elicit",
strategy_name: "Rate Limit Headers Elicitation",
risk: RiskLevel::Safe,
}
}
fn technique() -> Technique {
Technique {
id: "rate-limit-headers",
name: "Rate-limit header differential",
oracle_class: OracleClass::Existence,
vector: Vector::StatusCodeDiff,
strength: NormativeStrength::May,
}
}
pub struct RateLimitHeadersElicitation;
impl Strategy for RateLimitHeadersElicitation {
fn id(&self) -> &'static str {
"rate-limit-headers-elicit"
}
fn name(&self) -> &'static str {
"Rate Limit Headers Elicitation"
}
fn risk(&self) -> RiskLevel {
RiskLevel::Safe
}
fn methods(&self) -> &[Method] {
&[Method::GET, Method::HEAD]
}
fn is_applicable(&self, _ctx: &ScanContext) -> bool {
true
}
fn generate(&self, ctx: &ScanContext) -> Vec<ProbeSpec> {
let mut specs = Vec::with_capacity(2);
for method in [Method::GET, Method::HEAD] {
let pair = build_pair(
ctx, method,
ctx.headers.clone(), ctx.headers.clone(),
None, metadata(), technique(),
);
specs.push(ProbeSpec::HeaderDiff(pair));
}
specs
}
}
#[cfg(test)]
mod tests {
use super::*;
use http::{HeaderMap, HeaderValue};
fn make_ctx() -> ScanContext {
ScanContext {
target: "https://api.example.com/users/{id}".to_string(),
baseline_id: "1001".to_string(),
probe_id: "9999".to_string(),
headers: HeaderMap::new(),
max_risk: RiskLevel::Safe,
known_duplicate: None,
state_field: None,
alt_credential: None,
body_template: None,
}
}
fn make_ctx_with_auth() -> ScanContext {
let mut headers = HeaderMap::new();
headers.insert(
http::header::AUTHORIZATION,
HeaderValue::from_static("Bearer token123"),
);
ScanContext { headers, ..make_ctx() }
}
#[test]
fn risk_is_safe() {
assert_eq!(RateLimitHeadersElicitation.risk(), RiskLevel::Safe);
}
#[test]
fn is_applicable_always_true() {
assert!(RateLimitHeadersElicitation.is_applicable(&make_ctx()));
}
#[test]
fn generate_returns_two_items() {
assert_eq!(RateLimitHeadersElicitation.generate(&make_ctx()).len(), 2);
}
#[test]
fn all_items_are_header_diff_variants() {
for spec in &RateLimitHeadersElicitation.generate(&make_ctx()) {
assert!(matches!(spec, ProbeSpec::HeaderDiff(_)));
}
}
#[test]
fn baseline_and_probe_use_ctx_headers_unmodified() {
let ctx = make_ctx_with_auth();
let specs = RateLimitHeadersElicitation.generate(&ctx);
let ProbeSpec::HeaderDiff(pair) = &specs[0] else { panic!("expected HeaderDiff") };
assert_eq!(
pair.baseline.headers.get(http::header::AUTHORIZATION),
pair.probe.headers.get(http::header::AUTHORIZATION),
);
}
#[test]
fn technique_strength_is_may() {
let specs = RateLimitHeadersElicitation.generate(&make_ctx());
assert_eq!(specs[0].technique().strength, NormativeStrength::May);
}
}