Mercurial > hg > nginx-tests
view limit_conn.t @ 423:1ac74b568503
Tests: unbreak ssl_password_file.t with upcoming OpenSSL 1.0.2.
The 512-bit keys, as generated by default by "openssl genrsa" in older
versions, are rejected by OpenSSL library built from master branch (and
upcoming OpenSSL 1.0.2). This brokes the test if the "openssl" binary
is old (e.g., system one), but nginx is compiled against new OpenSSL.
Fix is to explicitly generate 2048 bit keys. This is also consistent to
what we generate in other places.
author | Maxim Dounin <mdounin@mdounin.ru> |
---|---|
date | Thu, 03 Jul 2014 05:47:37 +0400 |
parents | 1b205a3332de |
children | 60888e2c3f5a |
line wrap: on
line source
#!/usr/bin/perl # (C) Sergey Kandaurov # limit_req based tests for nginx limit_conn module. ############################################################################### use warnings; use strict; use Test::More; use Socket qw/ CRLF /; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; plan(skip_all => 'win32') if $^O eq 'MSWin32'; my $t = Test::Nginx->new()->has(qw/http proxy limit_conn limit_req/)->plan(10); $t->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } http { %%TEST_GLOBALS_HTTP%% limit_req_zone $binary_remote_addr zone=req:1m rate=30r/m; limit_conn_zone $binary_remote_addr zone=zone:1m; limit_conn_zone $binary_remote_addr zone=zone2:1m; limit_conn_zone $binary_remote_addr zone=custom:1m; limit_zone legacy $binary_remote_addr 1m; server { listen 127.0.0.1:8081; server_name localhost; location /w { limit_req zone=req burst=10; } } server { listen 127.0.0.1:8080; server_name localhost; location / { proxy_pass http://127.0.0.1:8081; limit_conn zone 1; } location /1 { limit_conn zone 1; } location /zone { limit_conn zone2 1; } location /unlim { limit_conn zone 5; } location /custom { proxy_pass http://127.0.0.1:8081/; limit_conn_log_level info; limit_conn_status 501; limit_conn custom 1; } location /legacy { proxy_pass http://127.0.0.1:8081/; limit_conn legacy 1; } } } EOF open OLDERR, ">&", \*STDERR; close STDERR; $t->run(); open STDERR, ">&", \*OLDERR; ############################################################################### # charge limit_req http_get('/w'); # same and other zones in different locations my $s = http_start('/w'); like(http_get('/'), qr/^HTTP\/1.. 503 /, 'rejected'); like(http_get('/1'), qr/^HTTP\/1.. 503 /, 'rejected different location'); unlike(http_get('/zone'), qr/^HTTP\/1.. 503 /, 'passed different zone'); close $s; unlike(http_get('/1'), qr/^HTTP\/1.. 503 /, 'passed'); # custom error code and log level $s = http_start('/custom/w'); like(http_get('/custom'), qr/^HTTP\/1.. 501 /, 'limit_conn_status'); like(`grep -F '[info]' ${\($t->testdir())}/error.log`, qr/limiting connections by zone "custom"/s, 'limit_conn_log_level'); # limit_zone $s = http_start('/legacy/w'); like(http_get('/legacy'), qr/^HTTP\/1.. 503 /, 'legacy rejected'); $s->close; unlike(http_get('/legacy'), qr/^HTTP\/.. 503 /, 'legacy passed'); # limited after unlimited $s = http_start('/w'); like(http_get('/unlim'), qr/404 Not Found/, 'unlimited passed'); like(http_get('/'), qr/503 Service/, 'limited rejected'); ############################################################################### sub http_start { my ($uri) = @_; my $s; my $request = "GET $uri HTTP/1.0" . CRLF . CRLF; eval { local $SIG{ALRM} = sub { die "timeout\n" }; local $SIG{PIPE} = sub { die "sigpipe\n" }; alarm(3); $s = IO::Socket::INET->new( Proto => 'tcp', PeerAddr => '127.0.0.1:8080' ); log_out($request); $s->print($request); alarm(0); }; alarm(0); if ($@) { log_in("died: $@"); return undef; } return $s; } ###############################################################################