summaryrefslogtreecommitdiffstats
path: root/debian/vendor-h2o/t/50mruby-dos-detector.t
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-13 21:12:02 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-13 21:12:02 +0000
commit77e50caaf2ef81cd91075cf836fed0e75718ffb4 (patch)
tree53b7b411290b63192fc9e924a3b6b65cdf67e9d0 /debian/vendor-h2o/t/50mruby-dos-detector.t
parentAdding upstream version 1.8.3. (diff)
downloaddnsdist-77e50caaf2ef81cd91075cf836fed0e75718ffb4.tar.xz
dnsdist-77e50caaf2ef81cd91075cf836fed0e75718ffb4.zip
Adding debian version 1.8.3-2.debian/1.8.3-2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r--debian/vendor-h2o/t/50mruby-dos-detector.t111
1 files changed, 111 insertions, 0 deletions
diff --git a/debian/vendor-h2o/t/50mruby-dos-detector.t b/debian/vendor-h2o/t/50mruby-dos-detector.t
new file mode 100644
index 0000000..6b7cdc5
--- /dev/null
+++ b/debian/vendor-h2o/t/50mruby-dos-detector.t
@@ -0,0 +1,111 @@
+use strict;
+use warnings;
+use Digest::MD5 qw(md5_hex);
+use Test::More;
+use t::Util;
+
+plan skip_all => 'mruby support is off'
+ unless server_features()->{mruby};
+
+plan skip_all => 'curl not found'
+ unless prog_exists('curl');
+
+subtest "default callback" => sub {
+ my $server = spawn_h2o(<< 'EOT');
+num-threads: 1
+hosts:
+ default:
+ paths:
+ /:
+ mruby.handler: |
+ require "share/h2o/mruby/dos_detector.rb"
+ DoSDetector.new({
+ :strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
+ })
+ mruby.handler:
+ Proc.new do |env|
+ [200, {}, []]
+ end
+EOT
+ subtest "forbidden" => sub {
+ {
+ my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
+ like $headers, qr{^HTTP/1\.1 200 }s, "status";
+ }
+ {
+ my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
+ like $headers, qr{^HTTP/1\.1 403 }s, "status";
+ is $body, "Forbidden", "content";
+ }
+ };
+};
+
+subtest "fallthrough callback" => sub {
+ my $server = spawn_h2o(<< 'EOT');
+num-threads: 1
+hosts:
+ default:
+ paths:
+ /:
+ mruby.handler: |
+ require "share/h2o/mruby/dos_detector.rb"
+ DoSDetector.new({
+ :strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
+ :callback => DoSDetector.fallthrough_callback,
+ })
+ mruby.handler:
+ Proc.new do |env|
+ [200, {}, ["DOS_COUNT is ", env["DOS_COUNT"], ", DOS_IP is ", env["DOS_IP"]]]
+ end
+EOT
+ subtest "success" => sub {
+ {
+ my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
+ like $headers, qr{^HTTP/1\.1 200 }s, "status";
+ }
+ {
+ my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
+ like $headers, qr{^HTTP/1\.1 200 }s, "status";
+ is $body, "DOS_COUNT is 2, DOS_IP is 127.0.0.1", "content";
+ }
+ };
+};
+
+subtest "customized callback" => sub {
+ my $server = spawn_h2o(<< 'EOT');
+num-threads: 1
+hosts:
+ default:
+ paths:
+ /:
+ mruby.handler: |
+ require "share/h2o/mruby/dos_detector.rb"
+ DoSDetector.new({
+ :strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
+ :callback => Proc.new do |env, detected, ip|
+ if detected
+ [503, {}, ["Service Unavailable"]]
+ else
+ [399, {}, []]
+ end
+ end
+ })
+ mruby.handler:
+ Proc.new do |env|
+ [200, {}, []]
+ end
+EOT
+ subtest "success" => sub {
+ {
+ my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
+ like $headers, qr{^HTTP/1\.1 200 }s, "status";
+ }
+ {
+ my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
+ like $headers, qr{^HTTP/1\.1 503 }s, "status";
+ is $body, "Service Unavailable", "content";
+ }
+ };
+};
+
+done_testing();