mirror of
https://github.com/TeaOSLab/EdgeNode.git
synced 2025-11-03 23:20:25 +08:00
105 lines
3.4 KiB
Go
105 lines
3.4 KiB
Go
// Copyright 2021 Liuxiangchao iwind.liu@gmail.com. All rights reserved.
|
|
|
|
package waf
|
|
|
|
import (
|
|
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
|
|
"github.com/iwind/TeaGo/assert"
|
|
"github.com/iwind/TeaGo/logs"
|
|
timeutil "github.com/iwind/TeaGo/utils/time"
|
|
"runtime"
|
|
"strconv"
|
|
"testing"
|
|
"time"
|
|
)
|
|
|
|
func TestNewIPList(t *testing.T) {
|
|
var list = NewIPList(IPListTypeDeny)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix())
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.2", time.Now().Unix()+1)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix()+2)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeService, 1, "127.0.0.3", time.Now().Unix()+3)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.10", time.Now().Unix()+10)
|
|
|
|
list.RemoveIP("127.0.0.1", 1, false)
|
|
|
|
logs.PrintAsJSON(list.ipMap, t)
|
|
logs.PrintAsJSON(list.idMap, t)
|
|
}
|
|
|
|
func TestIPList_Expire(t *testing.T) {
|
|
var list = NewIPList(IPListTypeDeny)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix())
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.2", time.Now().Unix()+1)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.1", time.Now().Unix()+2)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.3", time.Now().Unix()+3)
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "127.0.0.10", time.Now().Unix()+6)
|
|
|
|
var ticker = time.NewTicker(1 * time.Second)
|
|
for range ticker.C {
|
|
t.Log("====")
|
|
list.locker.Lock()
|
|
logs.PrintAsJSON(list.ipMap, t)
|
|
logs.PrintAsJSON(list.idMap, t)
|
|
list.locker.Unlock()
|
|
if len(list.idMap) == 0 {
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestIPList_Contains(t *testing.T) {
|
|
var a = assert.NewAssertion(t)
|
|
|
|
var list = NewIPList(IPListTypeDeny)
|
|
|
|
for i := 0; i < 1_0000; i++ {
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
|
}
|
|
//list.RemoveIP("192.168.1.100")
|
|
{
|
|
a.IsTrue(list.Contains(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100"))
|
|
}
|
|
{
|
|
a.IsFalse(list.Contains(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.2.100"))
|
|
}
|
|
}
|
|
|
|
func TestIPList_ContainsExpires(t *testing.T) {
|
|
var list = NewIPList(IPListTypeDeny)
|
|
|
|
for i := 0; i < 1_0000; i++ {
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
|
}
|
|
// list.RemoveIP("192.168.1.100", 1, false)
|
|
for _, ip := range []string{"192.168.1.100", "192.168.2.100"} {
|
|
expiresAt, ok := list.ContainsExpires(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, ip)
|
|
t.Log(ok, expiresAt, timeutil.FormatTime("Y-m-d H:i:s", expiresAt))
|
|
}
|
|
}
|
|
|
|
func BenchmarkIPList_Add(b *testing.B) {
|
|
runtime.GOMAXPROCS(1)
|
|
|
|
var list = NewIPList(IPListTypeDeny)
|
|
for i := 0; i < b.N; i++ {
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
|
}
|
|
b.Log(len(list.ipMap))
|
|
}
|
|
|
|
func BenchmarkIPList_Has(b *testing.B) {
|
|
runtime.GOMAXPROCS(1)
|
|
|
|
var list = NewIPList(IPListTypeDeny)
|
|
b.ResetTimer()
|
|
|
|
for i := 0; i < 1_0000; i++ {
|
|
list.Add(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1."+strconv.Itoa(i), time.Now().Unix()+3600)
|
|
}
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
list.Contains(IPTypeAll, firewallconfigs.FirewallScopeGlobal, 1, "192.168.1.100")
|
|
}
|
|
}
|