2019-10-31 09:27:28 +08:00
#
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
2019-10-08 13:15:48 +08:00
BEGIN {
if ( $ ENV { TEST_NGINX_CHECK_LEAK } ) {
$ SkipReason = "unavailable for the hup tests" ;
} else {
$ ENV { TEST_NGINX_USE_HUP } = 1 ;
undef $ ENV { TEST_NGINX_USE_STAP } ;
}
}
use t::APISIX 'no_plan' ;
repeat_each ( 1 ) ;
no_long_string ( ) ;
no_shuffle ( ) ;
no_root_location ( ) ;
run_tests ;
__DATA__
=== TEST 1 : set route , missing redis host
- - - config
location / t {
content_by_lua_block {
local t = require ( "lib.test_admin" ) . test
local code , body = t ( '/apisix/admin/routes/1' ,
ngx . HTTP_PUT ,
[ [ {
"plugins" : {
"limit-count" : {
"count" : 2 ,
"time_window" : 60 ,
"rejected_code" : 503 ,
"key" : "remote_addr" ,
"policy" : "redis"
}
} ,
"upstream" : {
"nodes" : {
"127.0.0.1:1980" : 1
} ,
"type" : "roundrobin"
} ,
"uri" : "/hello"
} ] ]
)
if code >= 300 then
ngx . status = code
end
ngx . print ( body )
}
}
- - - request
GET / t
- - - error_code: 400
- - - response_body
2020-08-24 09:17:31 +08:00
{ "error_msg" : "failed to check the configuration of plugin limit-count err: failed to validate dependent schema for \"policy\": value should match only one schema, but matches none" }
2019-10-08 13:15:48 +08:00
- - - no_error_log
[ error ]
=== TEST 2 : set route , with redis host and port
- - - config
location / t {
content_by_lua_block {
local t = require ( "lib.test_admin" ) . test
local code , body = t ( '/apisix/admin/routes/1' ,
ngx . HTTP_PUT ,
[ [ {
"uri" : "/hello" ,
"plugins" : {
"limit-count" : {
"count" : 2 ,
"time_window" : 60 ,
"rejected_code" : 503 ,
"key" : "remote_addr" ,
"policy" : "redis" ,
2019-10-23 12:54:05 +08:00
"redis_host" : "127.0.0.1" ,
"redis_port" : 6379 ,
"redis_timeout" : 1001
2019-10-08 13:15:48 +08:00
}
} ,
"upstream" : {
"nodes" : {
"127.0.0.1:1980" : 1
} ,
"type" : "roundrobin"
}
} ] ]
)
if code >= 300 then
ngx . status = code
end
ngx . say ( body )
}
}
- - - request
GET / t
- - - response_body
passed
- - - no_error_log
[ error ]
=== TEST 3 : set route ( default value: port and timeout )
- - - config
location / t {
content_by_lua_block {
local t = require ( "lib.test_admin" ) . test
local code , body = t ( '/apisix/admin/routes/1' ,
ngx . HTTP_PUT ,
[ [ {
"uri" : "/hello" ,
"plugins" : {
"limit-count" : {
"count" : 2 ,
"time_window" : 60 ,
"rejected_code" : 503 ,
"key" : "remote_addr" ,
"policy" : "redis" ,
2019-10-23 12:54:05 +08:00
"redis_host" : "127.0.0.1"
2019-10-08 13:15:48 +08:00
}
} ,
"upstream" : {
"nodes" : {
"127.0.0.1:1980" : 1
} ,
"type" : "roundrobin"
}
} ] ] ,
[ [ {
"node" : {
"value" : {
"plugins" : {
"limit-count" : {
"count" : 2 ,
"time_window" : 60 ,
"rejected_code" : 503 ,
"key" : "remote_addr" ,
"policy" : "redis" ,
2019-10-23 12:54:05 +08:00
"redis_host" : "127.0.0.1" ,
"redis_port" : 6379 ,
"redis_timeout" : 1000
2019-10-08 13:15:48 +08:00
}
} ,
"upstream" : {
"nodes" : {
"127.0.0.1:1980" : 1
} ,
"type" : "roundrobin"
} ,
"uri" : "/hello"
} ,
"key" : "/apisix/routes/1"
} ,
"action" : "set"
} ] ]
)
if code >= 300 then
ngx . status = code
end
ngx . say ( body )
}
}
- - - request
GET / t
- - - response_body
passed
- - - no_error_log
[ error ]
=== TEST 4 : up the limit
2020-11-02 16:47:32 +08:00
- - - request
GET / hello
- - - no_error_log
[ error ]
- - - error_log
try to lock with key route #1#redis
unlock with key route #1#redis
=== TEST 5 : up the limit
2019-10-08 13:15:48 +08:00
- - - pipelined_requests eval
2020-11-02 16:47:32 +08:00
[ "GET /hello" , "GET /hello" , "GET /hello" ]
2019-10-08 13:15:48 +08:00
- - - error_code eval
2020-11-02 16:47:32 +08:00
[ 200 , 503 , 503 ]
2019-10-08 13:15:48 +08:00
- - - no_error_log
[ error ]
2020-11-02 16:47:32 +08:00
=== TEST 6 : up the limit
2019-10-08 13:15:48 +08:00
- - - pipelined_requests eval
[ "GET /hello1" , "GET /hello" , "GET /hello2" , "GET /hello" , "GET /hello" ]
- - - error_code eval
[ 404 , 503 , 404 , 503 , 503 ]
- - - no_error_log
[ error ]
2020-02-24 10:54:48 +08:00
2020-11-02 16:47:32 +08:00
=== TEST 7 : set route , with redis host , port and right password
2020-02-24 10:54:48 +08:00
- - - config
location / t {
content_by_lua_block {
local t = require ( "lib.test_admin" ) . test
- - set redis password
local redis = require "resty.redis"
local red = redis:new ( )
red:set_timeout ( 1000 ) - - 1 sec
local ok , err = red:connect ( "127.0.0.1" , 6379 )
if not ok then
ngx . say ( "failed to connect: " , err )
return
end
- - for get_reused_times works
- - local ok , err = red:set_keepalive ( 10000 , 100 )
- - if not ok then
- - ngx . say ( "failed to set keepalive: " , err )
- - return
- - end
local count
count , err = red:get_reused_times ( )
if 0 == count then
local res , err = red:eval ( [ [
local key = 'requirepass'
local value = "foobared"
- - redis . replicate_commands ( )
local val = redis . pcall ( 'CONFIG' , 'SET' , key , value )
return val
] ] , 0 )
2020-04-22 13:27:00 +08:00
- -
2020-02-24 10:54:48 +08:00
if not res then
ngx . say ( "failed to set: " , err )
return
end
elseif err then
- - ngx . say ( "already set requirepass done: " , err )
return
end
local code , body = t ( '/apisix/admin/routes/1' ,
ngx . HTTP_PUT ,
[ [ {
"uri" : "/hello" ,
"plugins" : {
"limit-count" : {
"count" : 2 ,
"time_window" : 60 ,
"rejected_code" : 503 ,
"key" : "remote_addr" ,
"policy" : "redis" ,
"redis_host" : "127.0.0.1" ,
"redis_port" : 6379 ,
"redis_timeout" : 1001 ,
"redis_password" : "foobared"
}
} ,
"upstream" : {
"nodes" : {
"127.0.0.1:1980" : 1
} ,
"type" : "roundrobin"
}
} ] ]
)
if code >= 300 then
ngx . status = code
end
ngx . say ( body )
}
}
- - - request
GET / t
- - - response_body
passed
- - - no_error_log
[ error ]
2020-11-02 16:47:32 +08:00
=== TEST 8 : up the limit
2020-02-24 10:54:48 +08:00
- - - pipelined_requests eval
[ "GET /hello" , "GET /hello" , "GET /hello" , "GET /hello" ]
- - - error_code eval
[ 200 , 200 , 503 , 503 ]
- - - no_error_log
[ error ]
2020-11-02 16:47:32 +08:00
=== TEST 9 : up the limit
2020-02-24 10:54:48 +08:00
- - - pipelined_requests eval
[ "GET /hello1" , "GET /hello" , "GET /hello2" , "GET /hello" , "GET /hello" ]
- - - error_code eval
[ 404 , 503 , 404 , 503 , 503 ]
- - - no_error_log
[ error ]
2020-11-02 16:47:32 +08:00
=== TEST 10 : set route , with redis host , port and wrong password
2020-02-24 10:54:48 +08:00
- - - config
location / t {
content_by_lua_block {
local t = require ( "lib.test_admin" ) . test
local code , body = t ( '/apisix/admin/routes/1' ,
ngx . HTTP_PUT ,
[ [ {
"plugins" : {
"limit-count" : {
"count" : 2 ,
"time_window" : 60 ,
"rejected_code" : 503 ,
"key" : "remote_addr" ,
"policy" : "redis" ,
"redis_host" : "127.0.0.1" ,
"redis_port" : 6379 ,
"redis_timeout" : 1001 ,
"redis_password" : "WRONG_foobared"
}
} ,
"upstream" : {
"nodes" : {
"127.0.0.1:1980" : 1
} ,
"type" : "roundrobin"
} ,
"uri" : "/hello_new"
} ] ]
)
if code >= 300 then
ngx . status = code
end
ngx . print ( body )
}
}
- - - request
GET / t
- - - error_code eval
200
- - - no_error_log
[ error ]
2020-11-02 16:47:32 +08:00
=== TEST 11 : request for TEST 10
2020-02-24 10:54:48 +08:00
- - - request
GET / hello_new
- - - error_code eval
500
- - - response_body
2020-04-22 13:27:00 +08:00
{ "error_msg" : "failed to limit count: ERR invalid password" }
2020-02-24 10:54:48 +08:00
- - - error_log
failed to limit req: ERR invalid password
2020-11-02 16:47:32 +08:00
=== TEST 12 : multi request for TEST 10
2020-02-24 10:54:48 +08:00
- - - pipelined_requests eval
[ "GET /hello_new" , "GET /hello1" , "GET /hello1" , "GET /hello_new" ]
- - - error_code eval
[ 500 , 404 , 404 , 500 ]
2020-11-02 16:47:32 +08:00
=== TEST 13 : restore redis password to ''
2020-02-24 10:54:48 +08:00
- - - config
location / t {
content_by_lua_block {
local t = require ( "lib.test_admin" ) . test
- - set redis password
local redis = require "resty.redis"
local red = redis:new ( )
red:set_timeout ( 1000 ) - - 1 sec
local ok , err = red:connect ( "127.0.0.1" , 6379 )
if not ok then
ngx . say ( "failed to connect: " , err )
return
end
- - for get_reused_times works
- - local ok , err = red:set_keepalive ( 10000 , 100 )
- - if not ok then
- - ngx . say ( "failed to set keepalive: " , err )
- - return
- - end
local count
count , err = red:get_reused_times ( )
if 0 == count then
local redis_password = "foobared"
if redis_password and redis_password ~= '' then
local ok , err = red:auth ( redis_password )
if not ok then
return nil , err
end
end
local res , err = red:eval ( [ [
local key = 'requirepass'
local value = ''
- - redis . replicate_commands ( )
local val = redis . pcall ( 'CONFIG' , 'SET' , key , value )
return val
] ] , 0 )
2020-04-22 13:27:00 +08:00
- -
2020-02-24 10:54:48 +08:00
if not res then
ngx . say ( "failed to set: " , err )
return
end
elseif err then
- - ngx . say ( "already set requirepass done: " , err )
return
end
}
}
- - - request
GET / t
- - - error_code eval
200
- - - no_error_log
[ error ]