1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
use strict;
use warnings;
use Digest::MD5 qw(md5_hex);
use Test::More;
use t::Util;
plan skip_all => 'mruby support is off'
unless server_features()->{mruby};
plan skip_all => 'curl not found'
unless prog_exists('curl');
subtest "default callback" => sub {
my $server = spawn_h2o(<< 'EOT');
num-threads: 1
hosts:
default:
paths:
/:
mruby.handler: |
require "share/h2o/mruby/dos_detector.rb"
DoSDetector.new({
:strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
})
mruby.handler:
Proc.new do |env|
[200, {}, []]
end
EOT
subtest "forbidden" => sub {
{
my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
like $headers, qr{^HTTP/1\.1 200 }s, "status";
}
{
my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
like $headers, qr{^HTTP/1\.1 403 }s, "status";
is $body, "Forbidden", "content";
}
};
};
subtest "fallthrough callback" => sub {
my $server = spawn_h2o(<< 'EOT');
num-threads: 1
hosts:
default:
paths:
/:
mruby.handler: |
require "share/h2o/mruby/dos_detector.rb"
DoSDetector.new({
:strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
:callback => DoSDetector.fallthrough_callback,
})
mruby.handler:
Proc.new do |env|
[200, {}, ["DOS_COUNT is ", env["DOS_COUNT"], ", DOS_IP is ", env["DOS_IP"]]]
end
EOT
subtest "success" => sub {
{
my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
like $headers, qr{^HTTP/1\.1 200 }s, "status";
}
{
my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
like $headers, qr{^HTTP/1\.1 200 }s, "status";
is $body, "DOS_COUNT is 2, DOS_IP is 127.0.0.1", "content";
}
};
};
subtest "customized callback" => sub {
my $server = spawn_h2o(<< 'EOT');
num-threads: 1
hosts:
default:
paths:
/:
mruby.handler: |
require "share/h2o/mruby/dos_detector.rb"
DoSDetector.new({
:strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
:callback => Proc.new do |env, detected, ip|
if detected
[503, {}, ["Service Unavailable"]]
else
[399, {}, []]
end
end
})
mruby.handler:
Proc.new do |env|
[200, {}, []]
end
EOT
subtest "success" => sub {
{
my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
like $headers, qr{^HTTP/1\.1 200 }s, "status";
}
{
my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
like $headers, qr{^HTTP/1\.1 503 }s, "status";
is $body, "Service Unavailable", "content";
}
};
};
done_testing();
|