diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 21:30:40 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 21:30:40 +0000 |
commit | 133a45c109da5310add55824db21af5239951f93 (patch) | |
tree | ba6ac4c0a950a0dda56451944315d66409923918 /test/rspamd_upstream_test.c | |
parent | Initial commit. (diff) | |
download | rspamd-133a45c109da5310add55824db21af5239951f93.tar.xz rspamd-133a45c109da5310add55824db21af5239951f93.zip |
Adding upstream version 3.8.1.upstream/3.8.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'test/rspamd_upstream_test.c')
-rw-r--r-- | test/rspamd_upstream_test.c | 182 |
1 files changed, 182 insertions, 0 deletions
diff --git a/test/rspamd_upstream_test.c b/test/rspamd_upstream_test.c new file mode 100644 index 0000000..1f4e27d --- /dev/null +++ b/test/rspamd_upstream_test.c @@ -0,0 +1,182 @@ +/*- + * Copyright 2016 Vsevolod Stakhov + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include "config.h" +#include "rspamd.h" +#include "ottery.h" +#include "contrib/libev/ev.h" + +#include <math.h> + +const char *test_upstream_list = "microsoft.com:443:1,google.com:80:2,kernel.org:443:3"; +const char *new_upstream_list = "freebsd.org:80"; +char test_key[32]; +extern struct ev_loop *event_loop; + +static void +rspamd_upstream_test_method(struct upstream_list *ls, + enum rspamd_upstream_rotation rot, const gchar *expected) +{ + struct upstream *up; + + if (rot != RSPAMD_UPSTREAM_HASHED) { + up = rspamd_upstream_get(ls, rot, NULL, 0); + g_assert(up != NULL); + g_assert(strcmp(rspamd_upstream_name(up), expected) == 0); + } + else { + up = rspamd_upstream_get(ls, RSPAMD_UPSTREAM_HASHED, test_key, + sizeof(test_key)); + g_assert(up != NULL); + g_assert(strcmp(rspamd_upstream_name(up), expected) == 0); + } +} + +static void +rspamd_upstream_timeout_handler(EV_P_ ev_timer *w, int revents) +{ + struct rspamd_dns_resolver *resolver = (struct rspamd_dns_resolver *) w->data; + + rdns_resolver_release(resolver->r); +} + +void rspamd_upstream_test_func(void) +{ + struct upstream_list *ls, *nls; + struct upstream *up, *upn; + struct rspamd_dns_resolver *resolver; + struct rspamd_config *cfg; + gint i, success = 0; + const gint assumptions = 100500; + gdouble p; + static ev_timer ev; + rspamd_inet_addr_t *addr, *next_addr, *paddr; + + cfg = rspamd_config_new(RSPAMD_CONFIG_INIT_SKIP_LUA); + cfg->dns_retransmits = 2; + cfg->dns_timeout = 0.5; + cfg->upstream_max_errors = 1; + cfg->upstream_revive_time = 0.5; + cfg->upstream_error_time = 2; + + resolver = rspamd_dns_resolver_init(NULL, event_loop, cfg); + rspamd_upstreams_library_config(cfg, cfg->ups_ctx, event_loop, resolver->r); + + /* + * Test v4/v6 priorities + */ + nls = rspamd_upstreams_create(cfg->ups_ctx); + g_assert(rspamd_upstreams_add_upstream(nls, "127.0.0.1", 0, + RSPAMD_UPSTREAM_PARSE_DEFAULT, + NULL)); + up = rspamd_upstream_get(nls, RSPAMD_UPSTREAM_RANDOM, NULL, 0); + rspamd_parse_inet_address(&paddr, "127.0.0.2", strlen("127.0.0.2"), + RSPAMD_INET_ADDRESS_PARSE_DEFAULT); + g_assert(rspamd_upstream_add_addr(up, paddr)); + rspamd_parse_inet_address(&paddr, "::1", strlen("::1"), + RSPAMD_INET_ADDRESS_PARSE_DEFAULT); + g_assert(rspamd_upstream_add_addr(up, paddr)); + /* Rewind to start */ + addr = rspamd_upstream_addr_next(up); + addr = rspamd_upstream_addr_next(up); + /* cur should be zero here */ + addr = rspamd_upstream_addr_next(up); + next_addr = rspamd_upstream_addr_next(up); + g_assert(rspamd_inet_address_get_af(addr) == AF_INET); + g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET); + next_addr = rspamd_upstream_addr_next(up); + g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET6); + next_addr = rspamd_upstream_addr_next(up); + g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET); + next_addr = rspamd_upstream_addr_next(up); + g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET); + next_addr = rspamd_upstream_addr_next(up); + g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET6); + /* Test errors with IPv6 */ + rspamd_upstream_fail(up, TRUE, NULL); + /* Now we should have merely IPv4 addresses in rotation */ + addr = rspamd_upstream_addr_next(up); + for (i = 0; i < 256; i++) { + next_addr = rspamd_upstream_addr_next(up); + g_assert(rspamd_inet_address_get_af(addr) == AF_INET); + g_assert(rspamd_inet_address_get_af(next_addr) == AF_INET); + g_assert(rspamd_inet_address_compare(addr, next_addr, FALSE) != 0); + addr = next_addr; + } + rspamd_upstreams_destroy(nls); + + ls = rspamd_upstreams_create(cfg->ups_ctx); + g_assert(rspamd_upstreams_parse_line(ls, test_upstream_list, 443, NULL)); + g_assert(rspamd_upstreams_count(ls) == 3); + + /* Test master-slave rotation */ + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org"); + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_MASTER_SLAVE, "kernel.org"); + + /* Test round-robin rotation */ + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org"); + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org"); + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com"); + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "kernel.org"); + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "google.com"); + rspamd_upstream_test_method(ls, RSPAMD_UPSTREAM_ROUND_ROBIN, "microsoft.com"); + + /* Test stable hashing */ + nls = rspamd_upstreams_create(cfg->ups_ctx); + g_assert(rspamd_upstreams_parse_line(nls, test_upstream_list, 443, NULL)); + g_assert(rspamd_upstreams_parse_line(nls, new_upstream_list, 443, NULL)); + for (i = 0; i < assumptions; i++) { + ottery_rand_bytes(test_key, sizeof(test_key)); + up = rspamd_upstream_get(ls, RSPAMD_UPSTREAM_HASHED, test_key, + sizeof(test_key)); + upn = rspamd_upstream_get(nls, RSPAMD_UPSTREAM_HASHED, test_key, + sizeof(test_key)); + + if (strcmp(rspamd_upstream_name(up), rspamd_upstream_name(upn)) == 0) { + success++; + } + } + + p = 1.0 - fabs(3.0 / 4.0 - (gdouble) success / (gdouble) assumptions); + /* + * P value is calculated as following: + * when we add/remove M upstreams from the list, the probability of hash + * miss should be close to the relation N / (N + M), where N is the size of + * the previous upstreams list. + */ + msg_debug("p value for hash consistency: %.6f", p); + g_assert(p > 0.9); + + rspamd_upstreams_destroy(nls); + + + /* Upstream fail test */ + ev.data = resolver; + ev_timer_init(&ev, rspamd_upstream_timeout_handler, 2.0, 0.0); + + up = rspamd_upstream_get(ls, RSPAMD_UPSTREAM_MASTER_SLAVE, NULL, 0); + for (i = 0; i < 100; i++) { + rspamd_upstream_fail(up, TRUE, NULL); + } + g_assert(rspamd_upstreams_alive(ls) == 2); + + ev_timer_start(event_loop, &ev); + + ev_run(event_loop, 0); + g_assert(rspamd_upstreams_alive(ls) == 3); + + rspamd_upstreams_destroy(ls); + REF_RELEASE(cfg); +} |