Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

rspamd_upstream_test.c 6.1KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "rspamd.h"
  18. #include "ottery.h"
  19. #include <math.h>
  20. const char *test_upstream_list = "microsoft.com:443:1,google.com:80:2,kernel.org:443:3";
  21. const char *new_upstream_list = "freebsd.org:80";
  22. char test_key[32];
  23. static void
  24. rspamd_upstream_test_method (struct upstream_list *ls,
  25. enum rspamd_upstream_rotation rot, const gchar *expected)
  26. {
  27. struct upstream *up;
  28. if (rot != RSPAMD_UPSTREAM_HASHED) {
  29. up = rspamd_upstream_get (ls, rot, NULL, 0);
  30. g_assert (up != NULL);
  31. g_assert (strcmp (rspamd_upstream_name (up), expected) == 0);
  32. }
  33. else {
  34. up = rspamd_upstream_get (ls, RSPAMD_UPSTREAM_HASHED, test_key,
  35. sizeof (test_key));
  36. g_assert (up != NULL);
  37. g_assert (strcmp (rspamd_upstream_name (up), expected) == 0);
  38. }
  39. }
  40. static void
  41. rspamd_upstream_timeout_handler (int fd, short what, void *arg)
  42. {
  43. struct rspamd_dns_resolver *resolver = (struct rspamd_dns_resolver *)arg;
  44. rdns_resolver_release (resolver->r);
  45. }
  46. void
  47. rspamd_upstream_test_func (void)
  48. {
  49. struct upstream_list *ls, *nls;
  50. struct upstream *up, *upn;
  51. struct event_base *ev_base = event_init ();
  52. struct rspamd_dns_resolver *resolver;
  53. struct rspamd_config *cfg;
  54. gint i, success = 0;
  55. const gint assumptions = 100500;
  56. gdouble p;
  57. struct event ev;
  58. struct timeval tv;
  59. rspamd_inet_addr_t *addr, *next_addr, *paddr;
  60. cfg = rspamd_config_new ();
  61. cfg->dns_retransmits = 2;
  62. cfg->dns_timeout = 0.5;
  63. cfg->upstream_max_errors = 1;
  64. cfg->upstream_revive_time = 0.5;
  65. cfg->upstream_error_time = 2;
  66. resolver = dns_resolver_init (NULL, ev_base, cfg);
  67. rspamd_upstreams_library_config (cfg, cfg->ups_ctx, ev_base, resolver->r);
  68. /*
  69. * Test v4/v6 priorities
  70. */
  71. nls = rspamd_upstreams_create (cfg->ups_ctx);
  72. g_assert (rspamd_upstreams_add_upstream (nls, "127.0.0.1", 0, NULL));
  73. up = rspamd_upstream_get (nls, RSPAMD_UPSTREAM_RANDOM, NULL, 0);
  74. rspamd_parse_inet_address (&paddr, "127.0.0.2", 0);
  75. g_assert (rspamd_upstream_add_addr (up, paddr));
  76. rspamd_parse_inet_address (&paddr, "::1", 0);
  77. g_assert (rspamd_upstream_add_addr (up, paddr));
  78. /* Rewind to start */
  79. addr = rspamd_upstream_addr (up);
  80. addr = rspamd_upstream_addr (up);
  81. /* cur should be zero here */
  82. addr = rspamd_upstream_addr (up);
  83. next_addr = rspamd_upstream_addr (up);
  84. g_assert (rspamd_inet_address_get_af (addr) == AF_INET);
  85. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  86. next_addr = rspamd_upstream_addr (up);
  87. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET6);
  88. next_addr = rspamd_upstream_addr (up);
  89. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  90. next_addr = rspamd_upstream_addr (up);
  91. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  92. next_addr = rspamd_upstream_addr (up);
  93. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET6);
  94. /* Test errors with IPv6 */
  95. rspamd_upstream_fail (up);
  96. /* Now we should have merely IPv4 addresses in rotation */
  97. addr = rspamd_upstream_addr (up);
  98. for (i = 0; i < 256; i++) {
  99. next_addr = rspamd_upstream_addr (up);
  100. g_assert (rspamd_inet_address_get_af (addr) == AF_INET);
  101. g_assert (rspamd_inet_address_get_af (next_addr) == AF_INET);
  102. g_assert (rspamd_inet_address_compare (addr, next_addr) != 0);
  103. addr = next_addr;
  104. }
  105. rspamd_upstreams_destroy (nls);
  106. ls = rspamd_upstreams_create (cfg->ups_ctx);
  107. g_assert (rspamd_upstreams_parse_line (ls, test_upstream_list, 443, NULL));
  108. g_assert (rspamd_upstreams_count (ls) == 3);
  109. /* Test master-slave rotation */
  110. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org");
  111. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org");
  112. /* Test round-robin rotation */
  113. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  114. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  115. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com");
  116. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  117. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com");
  118. rspamd_upstream_test_method (ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "microsoft.com");
  119. /* Test stable hashing */
  120. nls = rspamd_upstreams_create (cfg->ups_ctx);
  121. g_assert (rspamd_upstreams_parse_line (nls, test_upstream_list, 443, NULL));
  122. g_assert (rspamd_upstreams_parse_line (nls, new_upstream_list, 443, NULL));
  123. for (i = 0; i < assumptions; i ++) {
  124. ottery_rand_bytes (test_key, sizeof (test_key));
  125. up = rspamd_upstream_get (ls, RSPAMD_UPSTREAM_HASHED, test_key,
  126. sizeof (test_key));
  127. upn = rspamd_upstream_get (nls, RSPAMD_UPSTREAM_HASHED, test_key,
  128. sizeof (test_key));
  129. if (strcmp (rspamd_upstream_name (up), rspamd_upstream_name (upn)) == 0) {
  130. success ++;
  131. }
  132. }
  133. p = 1.0 - fabs (3.0 / 4.0 - (gdouble)success / (gdouble)assumptions);
  134. /*
  135. * P value is calculated as following:
  136. * when we add/remove M upstreams from the list, the probability of hash
  137. * miss should be close to the relation N / (N + M), where N is the size of
  138. * the previous upstreams list.
  139. */
  140. msg_debug ("p value for hash consistency: %.6f", p);
  141. g_assert (p > 0.9);
  142. rspamd_upstreams_destroy (nls);
  143. /* Upstream fail test */
  144. evtimer_set (&ev, rspamd_upstream_timeout_handler, resolver);
  145. event_base_set (ev_base, &ev);
  146. up = rspamd_upstream_get (ls, RSPAMD_UPSTREAM_MASTER_SLAVE, NULL, 0);
  147. for (i = 0; i < 100; i ++) {
  148. rspamd_upstream_fail (up);
  149. }
  150. g_assert (rspamd_upstreams_alive (ls) == 2);
  151. tv.tv_sec = 2;
  152. tv.tv_usec = 0;
  153. event_add (&ev, &tv);
  154. event_base_loop (ev_base, 0);
  155. g_assert (rspamd_upstreams_alive (ls) == 3);
  156. rspamd_upstreams_destroy (ls);
  157. REF_RELEASE (cfg);
  158. }