summaryrefslogtreecommitdiffstats
path: root/web/server/h2o/libh2o/t/50mruby-dos-detector.t
blob: 6b7cdc5619dff24b685d52c13cc84029fd709c80 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
use strict;
use warnings;
use Digest::MD5 qw(md5_hex);
use Test::More;
use t::Util;

plan skip_all => 'mruby support is off'
    unless server_features()->{mruby};

plan skip_all => 'curl not found'
    unless prog_exists('curl');

subtest "default callback" => sub {
    my $server = spawn_h2o(<< 'EOT');
num-threads: 1
hosts:
  default:
    paths:
      /:
        mruby.handler: |
          require "share/h2o/mruby/dos_detector.rb"
          DoSDetector.new({
            :strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
          })
        mruby.handler:
          Proc.new do |env|
            [200, {}, []]
          end
EOT
    subtest "forbidden" => sub {
        {
            my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
            like $headers, qr{^HTTP/1\.1 200 }s, "status";
        }
        {
            my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
            like $headers, qr{^HTTP/1\.1 403 }s, "status";
            is $body, "Forbidden", "content";
        }
    };
};

subtest "fallthrough callback" => sub {
    my $server = spawn_h2o(<< 'EOT');
num-threads: 1
hosts:
  default:
    paths:
      /:
        mruby.handler: |
          require "share/h2o/mruby/dos_detector.rb"
          DoSDetector.new({
            :strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
            :callback => DoSDetector.fallthrough_callback,
          })
        mruby.handler:
          Proc.new do |env|
            [200, {}, ["DOS_COUNT is ", env["DOS_COUNT"], ", DOS_IP is ", env["DOS_IP"]]]
          end
EOT
    subtest "success" => sub {
        {
            my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
            like $headers, qr{^HTTP/1\.1 200 }s, "status";
        }
        {
            my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
            like $headers, qr{^HTTP/1\.1 200 }s, "status";
            is $body, "DOS_COUNT is 2, DOS_IP is 127.0.0.1", "content";
        }
    };
};

subtest "customized callback" => sub {
    my $server = spawn_h2o(<< 'EOT');
num-threads: 1
hosts:
  default:
    paths:
      /:
        mruby.handler: |
          require "share/h2o/mruby/dos_detector.rb"
          DoSDetector.new({
            :strategy => DoSDetector::CountingStrategy.new({ :period => 1000, :threshold => 2, :ban_period => 1 << 32 }),
            :callback => Proc.new do |env, detected, ip|
              if detected
                [503, {}, ["Service Unavailable"]]
              else
                [399, {}, []]
              end
            end
          })
        mruby.handler:
          Proc.new do |env|
            [200, {}, []]
          end
EOT
    subtest "success" => sub {
        {
            my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
            like $headers, qr{^HTTP/1\.1 200 }s, "status";
        }
        {
            my ($headers, $body) = run_prog("curl --silent --dump-header /dev/stderr http://127.0.0.1:$server->{port}/");
            like $headers, qr{^HTTP/1\.1 503 }s, "status";
            is $body, "Service Unavailable", "content";
        }
    };
};

done_testing();