You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_upstream_test.c 6.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "rspamd.h"
  18. #include "ottery.h"
  19. #include <math.h>
  20. const char *test_upstream_list = "microsoft.com:443:1,google.com:80:2,kernel.org:443:3";
  21. const char *new_upstream_list = "freebsd.org:80";
  22. char test_key[32];
  23. static void
  24. rspamd_upstream_test_method (struct upstream_list *ls,
  25. enum rspamd_upstream_rotation rot, const gchar *expected)
  26. {
  27. struct upstream *up;
  28. if (rot != RSPAMD_UPSTREAM_HASHED) {
  29. up = rspamd_upstream_get (ls, rot, NULL, 0);
  30. g_assert (up != NULL);
  31. g_assert (strcmp (rspamd_upstream_name (up), expected) == 0);
  32. }
  33. else {
  34. up = rspamd_upstream_get (ls, RSPAMD_UPSTREAM_HASHED, test_key,
  35. sizeof (test_key));
  36. g_assert (up != NULL);
  37. g_assert (strcmp (rspamd_upstream_name (up), expected) == 0);
  38. }
  39. }
  40. static void
  41. rspamd_upstream_timeout_handler (int fd, short what, void *arg)
  42. {
  43. struct rspamd_dns_resolver *resolver = (struct rspamd_dns_resolver *)arg;
  44. rdns_resolver_release (resolver->r);
  45. }
  46. void
  47. rspamd_upstream_test_func (void)
  48. {
  49. struct upstream_list *ls, *nls;
  50. struct upstream *up, *upn;
  51. struct event_base *ev_base = event_init ();
  52. struct rspamd_dns_resolver *resolver;
  53. struct rspamd_config *cfg;
  54. gint i, success = 0;
  55. const gint assumptions = 100500;
  56. gdouble p;
  57. struct event ev;
  58. struct timeval tv;
  59. rspamd_inet_addr_t *addr, *next_addr, *paddr;
  60. cfg = rspamd_config_new (RSPAMD_CONFIG_INIT_SKIP_LUA);
  61. cfg->dns_retransmits = 2;
  62. cfg->dns_timeout = 0.5;
  63. cfg->upstream_max_errors = 1;
  64. cfg->upstream_revive_time = 0.5;
  65. cfg->upstream_error_time = 2;
  66. resolver = dns_resolver_init (NULL, ev_base, cfg);
  67. rspamd_upstreams_library_config (cfg, cfg->ups_ctx, ev_base, resolver->r);
  68. /*
  69. * Test v4/v6 priorities
  70. */
  71. nls = rspamd_upstreams_create (cfg->ups_ctx);
  72. g_assert (rspamd_upstreams_add_upstream (nls, "127.0.0.1", 0,
  73. RSPAMD_UPSTREAM_PARSE_DEFAULT,
  74. NULL));
  75. up = rspamd_upstream_get (nls, RSPAMD_UPSTREAM_RANDOM, NULL, 0);
  76. rspamd_parse_inet_address (&paddr, "127.0.0.2", 0);
  77. g_assert (rspamd_upstream_add_addr (up, paddr));
  78. rspamd_parse_inet_address (&paddr, "::1", 0);
  79. g_assert (rspamd_upstream_add_addr (up, paddr));
  80. /* Rewind to start */
  81. addr = rspamd_upstream_addr (up);
  82. addr = rspamd_upstream_addr (up);
  83. /* cur should be zero here */
  84. addr = rspamd_upstream_addr (up);
  85. next_addr = rspamd_upstream_addr (up);
  86. g_assert (rspamd_inet_address_get_af (addr) == AF_INET);
  87. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  88. next_addr = rspamd_upstream_addr (up);
  89. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET6);
  90. next_addr = rspamd_upstream_addr (up);
  91. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  92. next_addr = rspamd_upstream_addr (up);
  93. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  94. next_addr = rspamd_upstream_addr (up);
  95. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET6);
  96. /* Test errors with IPv6 */
  97. rspamd_upstream_fail (up, TRUE);
  98. /* Now we should have merely IPv4 addresses in rotation */
  99. addr = rspamd_upstream_addr (up);
  100. for (i = 0; i < 256; i++) {
  101. next_addr = rspamd_upstream_addr (up);
  102. g_assert (rspamd_inet_address_get_af (addr) == AF_INET);
  103. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  104. g_assert (rspamd_inet_address_compare (addr, next_addr) != 0);
  105. addr = next_addr;
  106. }
  107. rspamd_upstreams_destroy (nls);
  108. ls = rspamd_upstreams_create (cfg->ups_ctx);
  109. g_assert (rspamd_upstreams_parse_line (ls, test_upstream_list, 443, NULL));
  110. g_assert (rspamd_upstreams_count (ls) == 3);
  111. /* Test master-slave rotation */
  112. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org");
  113. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org");
  114. /* Test round-robin rotation */
  115. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  116. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  117. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com");
  118. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  119. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com");
  120. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "microsoft.com");
  121. /* Test stable hashing */
  122. nls = rspamd_upstreams_create (cfg->ups_ctx);
  123. g_assert (rspamd_upstreams_parse_line (nls, test_upstream_list, 443, NULL));
  124. g_assert (rspamd_upstreams_parse_line (nls, new_upstream_list, 443, NULL));
  125. for (i = 0; i < assumptions; i ++) {
  126. ottery_rand_bytes (test_key, sizeof (test_key));
  127. up = rspamd_upstream_get (ls, RSPAMD_UPSTREAM_HASHED, test_key,
  128. sizeof (test_key));
  129. upn = rspamd_upstream_get (nls, RSPAMD_UPSTREAM_HASHED, test_key,
  130. sizeof (test_key));
  131. if (strcmp (rspamd_upstream_name (up), rspamd_upstream_name (upn)) == 0) {
  132. success ++;
  133. }
  134. }
  135. p = 1.0 - fabs (3.0 / 4.0 - (gdouble)success / (gdouble)assumptions);
  136. /*
  137. * P value is calculated as following:
  138. * when we add/remove M upstreams from the list, the probability of hash
  139. * miss should be close to the relation N / (N + M), where N is the size of
  140. * the previous upstreams list.
  141. */
  142. msg_debug ("p value for hash consistency: %.6f", p);
  143. g_assert (p > 0.9);
  144. rspamd_upstreams_destroy (nls);
  145. /* Upstream fail test */
  146. evtimer_set (&ev, rspamd_upstream_timeout_handler, resolver);
  147. event_base_set (ev_base, &ev);
  148. up = rspamd_upstream_get (ls, RSPAMD_UPSTREAM_MASTER_SLAVE, NULL, 0);
  149. for (i = 0; i < 100; i ++) {
  150. rspamd_upstream_fail (up, TRUE);
  151. }
  152. g_assert (rspamd_upstreams_alive (ls) == 2);
  153. tv.tv_sec = 2;
  154. tv.tv_usec = 0;
  155. event_add (&ev, &tv);
  156. event_base_loop (ev_base, 0);
  157. g_assert (rspamd_upstreams_alive (ls) == 3);
  158. rspamd_upstreams_destroy (ls);
  159. REF_RELEASE (cfg);
  160. }