You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rspamd_upstream_test.c 6.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "rspamd.h"
  18. #include "ottery.h"
  19. #include "contrib/libev/ev.h"
  20. #include <math.h>
  21. const char *test_upstream_list = "microsoft.com:443:1,google.com:80:2,kernel.org:443:3";
  22. const char *new_upstream_list = "freebsd.org:80";
  23. char test_key[32];
  24. extern struct ev_loop *event_loop;
  25. static void
  26. rspamd_upstream_test_method(struct upstream_list *ls,
  27. enum rspamd_upstream_rotation rot, const gchar *expected)
  28. {
  29. struct upstream *up;
  30. if (rot != RSPAMD_UPSTREAM_HASHED) {
  31. up = rspamd_upstream_get(ls, rot, NULL, 0);
  32. g_assert(up != NULL);
  33. g_assert(strcmp(rspamd_upstream_name(up), expected) == 0);
  34. }
  35. else {
  36. up = rspamd_upstream_get(ls, RSPAMD_UPSTREAM_HASHED, test_key,
  37. sizeof(test_key));
  38. g_assert(up != NULL);
  39. g_assert(strcmp(rspamd_upstream_name(up), expected) == 0);
  40. }
  41. }
  42. static void
  43. rspamd_upstream_timeout_handler(EV_P_ ev_timer *w, int revents)
  44. {
  45. struct rspamd_dns_resolver *resolver = (struct rspamd_dns_resolver *) w->data;
  46. rdns_resolver_release(resolver->r);
  47. }
  48. void rspamd_upstream_test_func(void)
  49. {
  50. struct upstream_list *ls, *nls;
  51. struct upstream *up, *upn;
  52. struct rspamd_dns_resolver *resolver;
  53. struct rspamd_config *cfg;
  54. gint i, success = 0;
  55. const gint assumptions = 100500;
  56. gdouble p;
  57. static ev_timer ev;
  58. rspamd_inet_addr_t *addr, *next_addr, *paddr;
  59. cfg = rspamd_config_new(RSPAMD_CONFIG_INIT_SKIP_LUA);
  60. cfg->dns_retransmits = 2;
  61. cfg->dns_timeout = 0.5;
  62. cfg->upstream_max_errors = 1;
  63. cfg->upstream_revive_time = 0.5;
  64. cfg->upstream_error_time = 2;
  65. resolver = rspamd_dns_resolver_init(NULL, event_loop, cfg);
  66. rspamd_upstreams_library_config(cfg, cfg->ups_ctx, event_loop, resolver->r);
  67. /*
  68. * Test v4/v6 priorities
  69. */
  70. nls = rspamd_upstreams_create(cfg->ups_ctx);
  71. g_assert(rspamd_upstreams_add_upstream(nls, "127.0.0.1", 0,
  72. RSPAMD_UPSTREAM_PARSE_DEFAULT,
  73. NULL));
  74. up = rspamd_upstream_get(nls, RSPAMD_UPSTREAM_RANDOM, NULL, 0);
  75. rspamd_parse_inet_address(&paddr, "127.0.0.2", strlen("127.0.0.2"),
  76. RSPAMD_INET_ADDRESS_PARSE_DEFAULT);
  77. g_assert(rspamd_upstream_add_addr(up, paddr));
  78. rspamd_parse_inet_address(&paddr, "::1", strlen("::1"),
  79. RSPAMD_INET_ADDRESS_PARSE_DEFAULT);
  80. g_assert(rspamd_upstream_add_addr(up, paddr));
  81. /* Rewind to start */
  82. addr = rspamd_upstream_addr_next(up);
  83. addr = rspamd_upstream_addr_next(up);
  84. /* cur should be zero here */
  85. addr = rspamd_upstream_addr_next(up);
  86. next_addr = rspamd_upstream_addr_next(up);
  87. g_assert(rspamd_inet_address_get_af(addr) == AF_INET);
  88. g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET);
  89. next_addr = rspamd_upstream_addr_next(up);
  90. g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET6);
  91. next_addr = rspamd_upstream_addr_next(up);
  92. g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET);
  93. next_addr = rspamd_upstream_addr_next(up);
  94. g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET);
  95. next_addr = rspamd_upstream_addr_next(up);
  96. g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET6);
  97. /* Test errors with IPv6 */
  98. rspamd_upstream_fail(up, TRUE, NULL);
  99. /* Now we should have merely IPv4 addresses in rotation */
  100. addr = rspamd_upstream_addr_next(up);
  101. for (i = 0; i < 256; i++) {
  102. next_addr = rspamd_upstream_addr_next(up);
  103. g_assert(rspamd_inet_address_get_af(addr) == AF_INET);
  104. g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET);
  105. g_assert(rspamd_inet_address_compare(addr, next_addr, FALSE) != 0);
  106. addr = next_addr;
  107. }
  108. rspamd_upstreams_destroy(nls);
  109. ls = rspamd_upstreams_create(cfg->ups_ctx);
  110. g_assert(rspamd_upstreams_parse_line(ls, test_upstream_list, 443, NULL));
  111. g_assert(rspamd_upstreams_count(ls) == 3);
  112. /* Test master-slave rotation */
  113. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org");
  114. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org");
  115. /* Test round-robin rotation */
  116. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  117. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  118. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com");
  119. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org");
  120. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com");
  121. rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "microsoft.com");
  122. /* Test stable hashing */
  123. nls = rspamd_upstreams_create(cfg->ups_ctx);
  124. g_assert(rspamd_upstreams_parse_line(nls, test_upstream_list, 443, NULL));
  125. g_assert(rspamd_upstreams_parse_line(nls, new_upstream_list, 443, NULL));
  126. for (i = 0; i < assumptions; i++) {
  127. ottery_rand_bytes(test_key, sizeof(test_key));
  128. up = rspamd_upstream_get(ls, RSPAMD_UPSTREAM_HASHED, test_key,
  129. sizeof(test_key));
  130. upn = rspamd_upstream_get(nls, RSPAMD_UPSTREAM_HASHED, test_key,
  131. sizeof(test_key));
  132. if (strcmp(rspamd_upstream_name(up), rspamd_upstream_name(upn)) == 0) {
  133. success++;
  134. }
  135. }
  136. p = 1.0 - fabs(3.0 / 4.0 - (gdouble) success / (gdouble) assumptions);
  137. /*
  138. * P value is calculated as following:
  139. * when we add/remove M upstreams from the list, the probability of hash
  140. * miss should be close to the relation N / (N + M), where N is the size of
  141. * the previous upstreams list.
  142. */
  143. msg_debug("p value for hash consistency: %.6f", p);
  144. g_assert(p > 0.9);
  145. rspamd_upstreams_destroy(nls);
  146. /* Upstream fail test */
  147. ev.data = resolver;
  148. ev_timer_init(&ev, rspamd_upstream_timeout_handler, 2.0, 0.0);
  149. up = rspamd_upstream_get(ls, RSPAMD_UPSTREAM_MASTER_SLAVE, NULL, 0);
  150. for (i = 0; i < 100; i++) {
  151. rspamd_upstream_fail(up, TRUE, NULL);
  152. }
  153. g_assert(rspamd_upstreams_alive(ls) == 2);
  154. ev_timer_start(event_loop, &ev);
  155. ev_run(event_loop, 0);
  156. g_assert(rspamd_upstreams_alive(ls) == 3);
  157. rspamd_upstreams_destroy(ls);
  158. REF_RELEASE(cfg);
  159. }