mirror of
https://github.com/TecharoHQ/anubis.git
synced 2026-04-09 18:18:49 +00:00
Compare commits
7 Commits
fix/nilpoi
...
fix/CVE202
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
4ec2abec5f | ||
|
|
24e6f152d3 | ||
|
|
9dd4de6f1f | ||
|
|
da1890380e | ||
|
|
6c8629e3ac | ||
|
|
f6bf98fa28 | ||
|
|
97ba84e26d |
@@ -83,7 +83,7 @@ var (
|
|||||||
versionFlag = flag.Bool("version", false, "print Anubis version")
|
versionFlag = flag.Bool("version", false, "print Anubis version")
|
||||||
publicUrl = flag.String("public-url", "", "the externally accessible URL for this Anubis instance, used for constructing redirect URLs (e.g., for forwardAuth).")
|
publicUrl = flag.String("public-url", "", "the externally accessible URL for this Anubis instance, used for constructing redirect URLs (e.g., for forwardAuth).")
|
||||||
xffStripPrivate = flag.Bool("xff-strip-private", true, "if set, strip private addresses from X-Forwarded-For")
|
xffStripPrivate = flag.Bool("xff-strip-private", true, "if set, strip private addresses from X-Forwarded-For")
|
||||||
customRealIPHeader = flag.String("custom-real-ip-header", "", "if set, read remote IP from header of this name (in case your environment doesn't set X-Real-IP header)")
|
customRealIPHeader = flag.String("custom-real-ip-header", "", "if set, read remote IP from header of this name (in case your environment doesn't set X-Real-IP header)")
|
||||||
|
|
||||||
thothInsecure = flag.Bool("thoth-insecure", false, "if set, connect to Thoth over plain HTTP/2, don't enable this unless support told you to")
|
thothInsecure = flag.Bool("thoth-insecure", false, "if set, connect to Thoth over plain HTTP/2, don't enable this unless support told you to")
|
||||||
thothURL = flag.String("thoth-url", "", "if set, URL for Thoth, the IP reputation database for Anubis")
|
thothURL = flag.String("thoth-url", "", "if set, URL for Thoth, the IP reputation database for Anubis")
|
||||||
@@ -145,19 +145,19 @@ func parseBindNetFromAddr(address string) (string, string) {
|
|||||||
return "", address
|
return "", address
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseSameSite(s string) (http.SameSite) {
|
func parseSameSite(s string) http.SameSite {
|
||||||
switch strings.ToLower(s) {
|
switch strings.ToLower(s) {
|
||||||
case "none":
|
case "none":
|
||||||
return http.SameSiteNoneMode
|
return http.SameSiteNoneMode
|
||||||
case "lax":
|
case "lax":
|
||||||
return http.SameSiteLaxMode
|
return http.SameSiteLaxMode
|
||||||
case "strict":
|
case "strict":
|
||||||
return http.SameSiteStrictMode
|
return http.SameSiteStrictMode
|
||||||
case "default":
|
case "default":
|
||||||
return http.SameSiteDefaultMode
|
return http.SameSiteDefaultMode
|
||||||
default:
|
default:
|
||||||
log.Fatalf("invalid cookie same-site mode: %s, valid values are None, Lax, Strict, and Default", s)
|
log.Fatalf("invalid cookie same-site mode: %s, valid values are None, Lax, Strict, and Default", s)
|
||||||
}
|
}
|
||||||
return http.SameSiteDefaultMode
|
return http.SameSiteDefaultMode
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -22,9 +22,9 @@ type TestCase struct {
|
|||||||
type TestOptions struct {
|
type TestOptions struct {
|
||||||
format string
|
format string
|
||||||
action string
|
action string
|
||||||
crawlDelayWeight int
|
|
||||||
policyName string
|
policyName string
|
||||||
deniedAction string
|
deniedAction string
|
||||||
|
crawlDelayWeight int
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestDataFileConversion(t *testing.T) {
|
func TestDataFileConversion(t *testing.T) {
|
||||||
|
|||||||
@@ -13,13 +13,13 @@ func Zilch[T any]() T {
|
|||||||
// Impl is a lazy key->value map. It's a wrapper around a map and a mutex. If values exceed their time-to-live, they are pruned at Get time.
|
// Impl is a lazy key->value map. It's a wrapper around a map and a mutex. If values exceed their time-to-live, they are pruned at Get time.
|
||||||
type Impl[K comparable, V any] struct {
|
type Impl[K comparable, V any] struct {
|
||||||
data map[K]decayMapEntry[V]
|
data map[K]decayMapEntry[V]
|
||||||
lock sync.RWMutex
|
|
||||||
|
|
||||||
// deleteCh receives decay-deletion requests from readers.
|
// deleteCh receives decay-deletion requests from readers.
|
||||||
deleteCh chan deleteReq[K]
|
deleteCh chan deleteReq[K]
|
||||||
// stopCh stops the background cleanup worker.
|
// stopCh stops the background cleanup worker.
|
||||||
stopCh chan struct{}
|
stopCh chan struct{}
|
||||||
wg sync.WaitGroup
|
wg sync.WaitGroup
|
||||||
|
lock sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
type decayMapEntry[V any] struct {
|
type decayMapEntry[V any] struct {
|
||||||
|
|||||||
@@ -13,6 +13,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|||||||
|
|
||||||
<!-- This changes the project to: -->
|
<!-- This changes the project to: -->
|
||||||
|
|
||||||
|
- Fix panic when validating challenges after privacy-mode browsers strip headers and the follow-up request matches an `ALLOW` threshold.
|
||||||
- Expose WEIGHT rule matches as Prometheus metrics.
|
- Expose WEIGHT rule matches as Prometheus metrics.
|
||||||
- Allow more OCI registry clients [based on feedback](https://github.com/TecharoHQ/anubis/pull/1253#issuecomment-3506744184).
|
- Allow more OCI registry clients [based on feedback](https://github.com/TecharoHQ/anubis/pull/1253#issuecomment-3506744184).
|
||||||
- Expose services directory in the embedded `(data)` filesystem.
|
- Expose services directory in the embedded `(data)` filesystem.
|
||||||
@@ -20,6 +21,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|||||||
- Allow Renovate as an OCI registry client.
|
- Allow Renovate as an OCI registry client.
|
||||||
- Properly handle 4in6 addresses so that IP matching works with those addresses.
|
- Properly handle 4in6 addresses so that IP matching works with those addresses.
|
||||||
- Add support to simple Valkey/Redis cluster mode
|
- Add support to simple Valkey/Redis cluster mode
|
||||||
|
- Stabilize the CVE-2025-24369 regression test by always submitting an invalid proof instead of relying on random POW failures.
|
||||||
|
|
||||||
## v1.23.1: Lyse Hext - Echo 1
|
## v1.23.1: Lyse Hext - Echo 1
|
||||||
|
|
||||||
|
|||||||
@@ -55,8 +55,9 @@ server {
|
|||||||
# proxy all traffic to the target via Anubis.
|
# proxy all traffic to the target via Anubis.
|
||||||
server {
|
server {
|
||||||
# Listen on TCP port 443 with TLS (https) and HTTP/2
|
# Listen on TCP port 443 with TLS (https) and HTTP/2
|
||||||
listen 443 ssl http2;
|
listen 443 ssl;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl;
|
||||||
|
http2 on;
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
@@ -113,8 +114,9 @@ Then in a server block:
|
|||||||
|
|
||||||
server {
|
server {
|
||||||
# Listen on 443 with SSL
|
# Listen on 443 with SSL
|
||||||
listen 443 ssl http2;
|
listen 443 ssl;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl;
|
||||||
|
http2 on;
|
||||||
|
|
||||||
# Slipstream via Anubis
|
# Slipstream via Anubis
|
||||||
include "conf-anubis.inc";
|
include "conf-anubis.inc";
|
||||||
|
|||||||
@@ -87,7 +87,7 @@ func XForwardedForToXRealIP(next http.Handler) http.Handler {
|
|||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
if xffHeader := r.Header.Get("X-Forwarded-For"); r.Header.Get("X-Real-Ip") == "" && xffHeader != "" {
|
if xffHeader := r.Header.Get("X-Forwarded-For"); r.Header.Get("X-Real-Ip") == "" && xffHeader != "" {
|
||||||
ip := xff.Parse(xffHeader)
|
ip := xff.Parse(xffHeader)
|
||||||
slog.Debug("setting x-real-ip", "val", ip)
|
slog.Debug("setting X-Real-Ip from X-Forwarded-For", "to", ip, "x-forwarded-for", xffHeader)
|
||||||
r.Header.Set("X-Real-Ip", ip)
|
r.Header.Set("X-Real-Ip", ip)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -129,6 +129,8 @@ func XForwardedForUpdate(stripPrivate bool, next http.Handler) http.Handler {
|
|||||||
} else {
|
} else {
|
||||||
r.Header.Set("X-Forwarded-For", xffHeaderString)
|
r.Header.Set("X-Forwarded-For", xffHeaderString)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
slog.Debug("updating X-Forwarded-For", "original", origXFFHeader, "new", xffHeaderString)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -22,9 +22,10 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type OGTagCache struct {
|
type OGTagCache struct {
|
||||||
cache store.JSON[map[string]string]
|
targetURL *url.URL
|
||||||
targetURL *url.URL
|
client *http.Client
|
||||||
client *http.Client
|
ogOverride map[string]string
|
||||||
|
cache store.JSON[map[string]string]
|
||||||
|
|
||||||
// Pre-built strings for optimization
|
// Pre-built strings for optimization
|
||||||
unixPrefix string // "http://unix"
|
unixPrefix string // "http://unix"
|
||||||
@@ -33,7 +34,6 @@ type OGTagCache struct {
|
|||||||
ogTimeToLive time.Duration
|
ogTimeToLive time.Duration
|
||||||
ogCacheConsiderHost bool
|
ogCacheConsiderHost bool
|
||||||
ogPassthrough bool
|
ogPassthrough bool
|
||||||
ogOverride map[string]string
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewOGTagCache(target string, conf config.OpenGraph, backend store.Interface) *OGTagCache {
|
func NewOGTagCache(target string, conf config.OpenGraph, backend store.Interface) *OGTagCache {
|
||||||
|
|||||||
@@ -68,14 +68,14 @@ var (
|
|||||||
|
|
||||||
type Server struct {
|
type Server struct {
|
||||||
next http.Handler
|
next http.Handler
|
||||||
|
store store.Interface
|
||||||
mux *http.ServeMux
|
mux *http.ServeMux
|
||||||
policy *policy.ParsedConfig
|
policy *policy.ParsedConfig
|
||||||
OGTags *ogtags.OGTagCache
|
OGTags *ogtags.OGTagCache
|
||||||
|
logger *slog.Logger
|
||||||
|
opts Options
|
||||||
ed25519Priv ed25519.PrivateKey
|
ed25519Priv ed25519.PrivateKey
|
||||||
hs512Secret []byte
|
hs512Secret []byte
|
||||||
opts Options
|
|
||||||
store store.Interface
|
|
||||||
logger *slog.Logger
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) getTokenKeyfunc() jwt.Keyfunc {
|
func (s *Server) getTokenKeyfunc() jwt.Keyfunc {
|
||||||
@@ -117,10 +117,12 @@ func (s *Server) issueChallenge(ctx context.Context, r *http.Request, lg *slog.L
|
|||||||
}
|
}
|
||||||
|
|
||||||
chall := challenge.Challenge{
|
chall := challenge.Challenge{
|
||||||
ID: id.String(),
|
ID: id.String(),
|
||||||
Method: rule.Challenge.Algorithm,
|
Method: rule.Challenge.Algorithm,
|
||||||
RandomData: fmt.Sprintf("%x", randomData),
|
RandomData: fmt.Sprintf("%x", randomData),
|
||||||
IssuedAt: time.Now(),
|
IssuedAt: time.Now(),
|
||||||
|
Difficulty: rule.Challenge.Difficulty,
|
||||||
|
PolicyRuleHash: rule.Hash(),
|
||||||
Metadata: map[string]string{
|
Metadata: map[string]string{
|
||||||
"User-Agent": r.Header.Get("User-Agent"),
|
"User-Agent": r.Header.Get("User-Agent"),
|
||||||
"X-Real-Ip": r.Header.Get("X-Real-Ip"),
|
"X-Real-Ip": r.Header.Get("X-Real-Ip"),
|
||||||
@@ -137,6 +139,44 @@ func (s *Server) issueChallenge(ctx context.Context, r *http.Request, lg *slog.L
|
|||||||
return &chall, err
|
return &chall, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s *Server) hydrateChallengeRule(rule *policy.Bot, chall *challenge.Challenge, lg *slog.Logger) *policy.Bot {
|
||||||
|
if chall == nil {
|
||||||
|
return rule
|
||||||
|
}
|
||||||
|
|
||||||
|
if rule == nil {
|
||||||
|
rule = &policy.Bot{
|
||||||
|
Rules: &checker.List{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if chall.Difficulty == 0 {
|
||||||
|
// fall back to whatever the policy currently says or the global default
|
||||||
|
if rule.Challenge != nil && rule.Challenge.Difficulty != 0 {
|
||||||
|
chall.Difficulty = rule.Challenge.Difficulty
|
||||||
|
} else {
|
||||||
|
chall.Difficulty = s.policy.DefaultDifficulty
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if rule.Challenge == nil {
|
||||||
|
lg.Warn("rule missing challenge configuration; using stored challenge metadata", "rule", rule.Name)
|
||||||
|
rule.Challenge = &config.ChallengeRules{}
|
||||||
|
}
|
||||||
|
|
||||||
|
if rule.Challenge.Difficulty == 0 {
|
||||||
|
rule.Challenge.Difficulty = chall.Difficulty
|
||||||
|
}
|
||||||
|
if rule.Challenge.ReportAs == 0 {
|
||||||
|
rule.Challenge.ReportAs = chall.Difficulty
|
||||||
|
}
|
||||||
|
if rule.Challenge.Algorithm == "" {
|
||||||
|
rule.Challenge.Algorithm = chall.Method
|
||||||
|
}
|
||||||
|
|
||||||
|
return rule
|
||||||
|
}
|
||||||
|
|
||||||
func (s *Server) maybeReverseProxyHttpStatusOnly(w http.ResponseWriter, r *http.Request) {
|
func (s *Server) maybeReverseProxyHttpStatusOnly(w http.ResponseWriter, r *http.Request) {
|
||||||
s.maybeReverseProxy(w, r, true)
|
s.maybeReverseProxy(w, r, true)
|
||||||
}
|
}
|
||||||
@@ -461,6 +501,8 @@ func (s *Server) PassChallenge(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
rule = s.hydrateChallengeRule(rule, chall, lg)
|
||||||
|
|
||||||
impl, ok := challenge.Get(chall.Method)
|
impl, ok := challenge.Get(chall.Method)
|
||||||
if !ok {
|
if !ok {
|
||||||
lg.Error("check failed", "err", err)
|
lg.Error("check failed", "err", err)
|
||||||
|
|||||||
@@ -2,6 +2,7 @@ package lib
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
@@ -18,8 +19,10 @@ import (
|
|||||||
"github.com/TecharoHQ/anubis"
|
"github.com/TecharoHQ/anubis"
|
||||||
"github.com/TecharoHQ/anubis/data"
|
"github.com/TecharoHQ/anubis/data"
|
||||||
"github.com/TecharoHQ/anubis/internal"
|
"github.com/TecharoHQ/anubis/internal"
|
||||||
|
"github.com/TecharoHQ/anubis/lib/challenge"
|
||||||
"github.com/TecharoHQ/anubis/lib/policy"
|
"github.com/TecharoHQ/anubis/lib/policy"
|
||||||
"github.com/TecharoHQ/anubis/lib/policy/config"
|
"github.com/TecharoHQ/anubis/lib/policy/config"
|
||||||
|
"github.com/TecharoHQ/anubis/lib/store"
|
||||||
"github.com/TecharoHQ/anubis/lib/thoth/thothmock"
|
"github.com/TecharoHQ/anubis/lib/thoth/thothmock"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -149,10 +152,34 @@ func handleChallengeZeroDifficulty(t *testing.T, ts *httptest.Server, cli *http.
|
|||||||
return resp
|
return resp
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func handleChallengeInvalidProof(t *testing.T, ts *httptest.Server, cli *http.Client, chall challengeResp) *http.Response {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
req, err := http.NewRequest(http.MethodGet, ts.URL+"/.within.website/x/cmd/anubis/api/pass-challenge", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("can't make request: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
q := req.URL.Query()
|
||||||
|
q.Set("response", strings.Repeat("f", 64)) // "hash" that never starts with the nonce
|
||||||
|
q.Set("nonce", "0")
|
||||||
|
q.Set("redir", "/")
|
||||||
|
q.Set("elapsedTime", "0")
|
||||||
|
q.Set("id", chall.ID)
|
||||||
|
req.URL.RawQuery = q.Encode()
|
||||||
|
|
||||||
|
resp, err := cli.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("can't do request: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return resp
|
||||||
|
}
|
||||||
|
|
||||||
type loggingCookieJar struct {
|
type loggingCookieJar struct {
|
||||||
t *testing.T
|
t *testing.T
|
||||||
lock sync.Mutex
|
|
||||||
cookies map[string][]*http.Cookie
|
cookies map[string][]*http.Cookie
|
||||||
|
lock sync.Mutex
|
||||||
}
|
}
|
||||||
|
|
||||||
func (lcj *loggingCookieJar) Cookies(u *url.URL) []*http.Cookie {
|
func (lcj *loggingCookieJar) Cookies(u *url.URL) []*http.Cookie {
|
||||||
@@ -244,7 +271,7 @@ func TestCVE2025_24369(t *testing.T) {
|
|||||||
|
|
||||||
cli := httpClient(t)
|
cli := httpClient(t)
|
||||||
chall := makeChallenge(t, ts, cli)
|
chall := makeChallenge(t, ts, cli)
|
||||||
resp := handleChallengeZeroDifficulty(t, ts, cli, chall)
|
resp := handleChallengeInvalidProof(t, ts, cli, chall)
|
||||||
|
|
||||||
if resp.StatusCode == http.StatusFound {
|
if resp.StatusCode == http.StatusFound {
|
||||||
t.Log("Regression on CVE-2025-24369")
|
t.Log("Regression on CVE-2025-24369")
|
||||||
@@ -744,9 +771,9 @@ func TestStripBasePrefixFromRequest(t *testing.T) {
|
|||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
name string
|
name string
|
||||||
basePrefix string
|
basePrefix string
|
||||||
stripBasePrefix bool
|
|
||||||
requestPath string
|
requestPath string
|
||||||
expectedPath string
|
expectedPath string
|
||||||
|
stripBasePrefix bool
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "strip disabled - no change",
|
name: "strip disabled - no change",
|
||||||
@@ -1027,6 +1054,59 @@ func TestPassChallengeXSS(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestPassChallengeNilRuleChallengeFallback(t *testing.T) {
|
||||||
|
pol := loadPolicies(t, "testdata/zero_difficulty.yaml", 0)
|
||||||
|
|
||||||
|
srv := spawnAnubis(t, Options{
|
||||||
|
Next: http.NewServeMux(),
|
||||||
|
Policy: pol,
|
||||||
|
})
|
||||||
|
|
||||||
|
allowThreshold, err := policy.ParsedThresholdFromConfig(config.Threshold{
|
||||||
|
Name: "allow-all",
|
||||||
|
Expression: &config.ExpressionOrList{
|
||||||
|
Expression: "true",
|
||||||
|
},
|
||||||
|
Action: config.RuleAllow,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("can't compile test threshold: %v", err)
|
||||||
|
}
|
||||||
|
srv.policy.Thresholds = []*policy.Threshold{allowThreshold}
|
||||||
|
srv.policy.Bots = nil
|
||||||
|
|
||||||
|
chall := challenge.Challenge{
|
||||||
|
ID: "test-challenge",
|
||||||
|
Method: "metarefresh",
|
||||||
|
RandomData: "apple cider",
|
||||||
|
IssuedAt: time.Now().Add(-5 * time.Second),
|
||||||
|
Difficulty: 1,
|
||||||
|
}
|
||||||
|
|
||||||
|
j := store.JSON[challenge.Challenge]{Underlying: srv.store}
|
||||||
|
if err := j.Set(context.Background(), "challenge:"+chall.ID, chall, time.Minute); err != nil {
|
||||||
|
t.Fatalf("can't insert challenge into store: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req := httptest.NewRequest(http.MethodGet, "https://example.com"+anubis.APIPrefix+"pass-challenge", nil)
|
||||||
|
q := req.URL.Query()
|
||||||
|
q.Set("redir", "/")
|
||||||
|
q.Set("id", chall.ID)
|
||||||
|
q.Set("challenge", chall.RandomData)
|
||||||
|
req.URL.RawQuery = q.Encode()
|
||||||
|
req.Header.Set("X-Real-Ip", "203.0.113.4")
|
||||||
|
req.Header.Set("User-Agent", "NilChallengeTester/1.0")
|
||||||
|
req.AddCookie(&http.Cookie{Name: anubis.TestCookieName, Value: chall.ID})
|
||||||
|
|
||||||
|
rr := httptest.NewRecorder()
|
||||||
|
|
||||||
|
srv.PassChallenge(rr, req)
|
||||||
|
|
||||||
|
if rr.Code != http.StatusFound {
|
||||||
|
t.Fatalf("expected redirect when validating challenge, got %d", rr.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestXForwardedForNoDoubleComma(t *testing.T) {
|
func TestXForwardedForNoDoubleComma(t *testing.T) {
|
||||||
var h http.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
var h http.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
w.Header().Set("X-Forwarded-For", r.Header.Get("X-Forwarded-For"))
|
w.Header().Set("X-Forwarded-For", r.Header.Get("X-Forwarded-For"))
|
||||||
|
|||||||
@@ -4,10 +4,12 @@ import "time"
|
|||||||
|
|
||||||
// Challenge is the metadata about a single challenge issuance.
|
// Challenge is the metadata about a single challenge issuance.
|
||||||
type Challenge struct {
|
type Challenge struct {
|
||||||
ID string `json:"id"` // UUID identifying the challenge
|
IssuedAt time.Time `json:"issuedAt"`
|
||||||
Method string `json:"method"` // Challenge method
|
Metadata map[string]string `json:"metadata"`
|
||||||
RandomData string `json:"randomData"` // The random data the client processes
|
ID string `json:"id"`
|
||||||
IssuedAt time.Time `json:"issuedAt"` // When the challenge was issued
|
Method string `json:"method"`
|
||||||
Metadata map[string]string `json:"metadata"` // Challenge metadata such as IP address and user agent
|
RandomData string `json:"randomData"`
|
||||||
Spent bool `json:"spent"` // Has the challenge already been solved?
|
PolicyRuleHash string `json:"policyRuleHash,omitempty"`
|
||||||
|
Difficulty int `json:"difficulty,omitempty"`
|
||||||
|
Spent bool `json:"spent"`
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,6 +4,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/TecharoHQ/anubis"
|
||||||
"github.com/TecharoHQ/anubis/internal"
|
"github.com/TecharoHQ/anubis/internal"
|
||||||
"github.com/TecharoHQ/anubis/lib/challenge"
|
"github.com/TecharoHQ/anubis/lib/challenge"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
@@ -19,5 +20,6 @@ func New(t *testing.T) *challenge.Challenge {
|
|||||||
ID: id.String(),
|
ID: id.String(),
|
||||||
RandomData: randomData,
|
RandomData: randomData,
|
||||||
IssuedAt: time.Now(),
|
IssuedAt: time.Now(),
|
||||||
|
Difficulty: anubis.DefaultDifficulty,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -29,24 +29,24 @@ import (
|
|||||||
type Options struct {
|
type Options struct {
|
||||||
Next http.Handler
|
Next http.Handler
|
||||||
Policy *policy.ParsedConfig
|
Policy *policy.ParsedConfig
|
||||||
Target string
|
Logger *slog.Logger
|
||||||
CookieDynamicDomain bool
|
OpenGraph config.OpenGraph
|
||||||
|
PublicUrl string
|
||||||
CookieDomain string
|
CookieDomain string
|
||||||
CookieExpiration time.Duration
|
JWTRestrictionHeader string
|
||||||
CookiePartitioned bool
|
|
||||||
BasePrefix string
|
BasePrefix string
|
||||||
WebmasterEmail string
|
WebmasterEmail string
|
||||||
|
Target string
|
||||||
RedirectDomains []string
|
RedirectDomains []string
|
||||||
ED25519PrivateKey ed25519.PrivateKey
|
ED25519PrivateKey ed25519.PrivateKey
|
||||||
HS512Secret []byte
|
HS512Secret []byte
|
||||||
StripBasePrefix bool
|
CookieExpiration time.Duration
|
||||||
OpenGraph config.OpenGraph
|
CookieSameSite http.SameSite
|
||||||
ServeRobotsTXT bool
|
ServeRobotsTXT bool
|
||||||
CookieSecure bool
|
CookieSecure bool
|
||||||
CookieSameSite http.SameSite
|
StripBasePrefix bool
|
||||||
Logger *slog.Logger
|
CookiePartitioned bool
|
||||||
PublicUrl string
|
CookieDynamicDomain bool
|
||||||
JWTRestrictionHeader string
|
|
||||||
DifficultyInJWT bool
|
DifficultyInJWT bool
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -13,9 +13,9 @@ import (
|
|||||||
func TestSetCookie(t *testing.T) {
|
func TestSetCookie(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
name string
|
||||||
options Options
|
|
||||||
host string
|
host string
|
||||||
cookieName string
|
cookieName string
|
||||||
|
options Options
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "basic",
|
name: "basic",
|
||||||
|
|||||||
@@ -31,7 +31,7 @@ func TestLocalizationService(t *testing.T) {
|
|||||||
"vi": "Đang nạp...",
|
"vi": "Đang nạp...",
|
||||||
"zh-CN": "加载中...",
|
"zh-CN": "加载中...",
|
||||||
"zh-TW": "載入中...",
|
"zh-TW": "載入中...",
|
||||||
"sv" : "Laddar...",
|
"sv": "Laddar...",
|
||||||
}
|
}
|
||||||
|
|
||||||
var keys []string
|
var keys []string
|
||||||
|
|||||||
@@ -8,9 +8,9 @@ import (
|
|||||||
|
|
||||||
func TestASNsValid(t *testing.T) {
|
func TestASNsValid(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
|
||||||
input *ASNs
|
|
||||||
err error
|
err error
|
||||||
|
input *ASNs
|
||||||
|
name string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "basic valid",
|
name: "basic valid",
|
||||||
|
|||||||
@@ -62,13 +62,11 @@ type BotConfig struct {
|
|||||||
Expression *ExpressionOrList `json:"expression,omitempty" yaml:"expression,omitempty"`
|
Expression *ExpressionOrList `json:"expression,omitempty" yaml:"expression,omitempty"`
|
||||||
Challenge *ChallengeRules `json:"challenge,omitempty" yaml:"challenge,omitempty"`
|
Challenge *ChallengeRules `json:"challenge,omitempty" yaml:"challenge,omitempty"`
|
||||||
Weight *Weight `json:"weight,omitempty" yaml:"weight,omitempty"`
|
Weight *Weight `json:"weight,omitempty" yaml:"weight,omitempty"`
|
||||||
|
GeoIP *GeoIP `json:"geoip,omitempty"`
|
||||||
|
ASNs *ASNs `json:"asns,omitempty"`
|
||||||
Name string `json:"name" yaml:"name"`
|
Name string `json:"name" yaml:"name"`
|
||||||
Action Rule `json:"action" yaml:"action"`
|
Action Rule `json:"action" yaml:"action"`
|
||||||
RemoteAddr []string `json:"remote_addresses,omitempty" yaml:"remote_addresses,omitempty"`
|
RemoteAddr []string `json:"remote_addresses,omitempty" yaml:"remote_addresses,omitempty"`
|
||||||
|
|
||||||
// Thoth features
|
|
||||||
GeoIP *GeoIP `json:"geoip,omitempty"`
|
|
||||||
ASNs *ASNs `json:"asns,omitempty"`
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b BotConfig) Zero() bool {
|
func (b BotConfig) Zero() bool {
|
||||||
@@ -324,13 +322,13 @@ func (sc StatusCodes) Valid() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type fileConfig struct {
|
type fileConfig struct {
|
||||||
Bots []BotOrImport `json:"bots"`
|
|
||||||
DNSBL bool `json:"dnsbl"`
|
|
||||||
OpenGraph openGraphFileConfig `json:"openGraph,omitempty"`
|
OpenGraph openGraphFileConfig `json:"openGraph,omitempty"`
|
||||||
Impressum *Impressum `json:"impressum,omitempty"`
|
Impressum *Impressum `json:"impressum,omitempty"`
|
||||||
StatusCodes StatusCodes `json:"status_codes"`
|
|
||||||
Store *Store `json:"store"`
|
Store *Store `json:"store"`
|
||||||
|
Bots []BotOrImport `json:"bots"`
|
||||||
Thresholds []Threshold `json:"thresholds"`
|
Thresholds []Threshold `json:"thresholds"`
|
||||||
|
StatusCodes StatusCodes `json:"status_codes"`
|
||||||
|
DNSBL bool `json:"dnsbl"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *fileConfig) Valid() error {
|
func (c *fileConfig) Valid() error {
|
||||||
@@ -462,13 +460,13 @@ func Load(fin io.Reader, fname string) (*Config, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type Config struct {
|
type Config struct {
|
||||||
|
Impressum *Impressum
|
||||||
|
Store *Store
|
||||||
|
OpenGraph OpenGraph
|
||||||
Bots []BotConfig
|
Bots []BotConfig
|
||||||
Thresholds []Threshold
|
Thresholds []Threshold
|
||||||
DNSBL bool
|
|
||||||
Impressum *Impressum
|
|
||||||
OpenGraph OpenGraph
|
|
||||||
StatusCodes StatusCodes
|
StatusCodes StatusCodes
|
||||||
Store *Store
|
DNSBL bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c Config) Valid() error {
|
func (c Config) Valid() error {
|
||||||
|
|||||||
@@ -15,9 +15,9 @@ func p[V any](v V) *V { return &v }
|
|||||||
|
|
||||||
func TestBotValid(t *testing.T) {
|
func TestBotValid(t *testing.T) {
|
||||||
var tests = []struct {
|
var tests = []struct {
|
||||||
|
bot BotConfig
|
||||||
err error
|
err error
|
||||||
name string
|
name string
|
||||||
bot BotConfig
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "simple user agent",
|
name: "simple user agent",
|
||||||
|
|||||||
@@ -11,10 +11,10 @@ import (
|
|||||||
|
|
||||||
func TestExpressionOrListMarshalJSON(t *testing.T) {
|
func TestExpressionOrListMarshalJSON(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
|
||||||
input *ExpressionOrList
|
|
||||||
output []byte
|
|
||||||
err error
|
err error
|
||||||
|
input *ExpressionOrList
|
||||||
|
name string
|
||||||
|
output []byte
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "single expression",
|
name: "single expression",
|
||||||
@@ -74,10 +74,10 @@ func TestExpressionOrListMarshalJSON(t *testing.T) {
|
|||||||
|
|
||||||
func TestExpressionOrListMarshalYAML(t *testing.T) {
|
func TestExpressionOrListMarshalYAML(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
|
||||||
input *ExpressionOrList
|
|
||||||
output []byte
|
|
||||||
err error
|
err error
|
||||||
|
input *ExpressionOrList
|
||||||
|
name string
|
||||||
|
output []byte
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "single expression",
|
name: "single expression",
|
||||||
@@ -217,8 +217,8 @@ func TestExpressionOrListUnmarshalJSON(t *testing.T) {
|
|||||||
func TestExpressionOrListString(t *testing.T) {
|
func TestExpressionOrListString(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
name string
|
||||||
in ExpressionOrList
|
|
||||||
out string
|
out string
|
||||||
|
in ExpressionOrList
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "single expression",
|
name: "single expression",
|
||||||
|
|||||||
@@ -7,9 +7,9 @@ import (
|
|||||||
|
|
||||||
func TestGeoIPValid(t *testing.T) {
|
func TestGeoIPValid(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
|
||||||
input *GeoIP
|
|
||||||
err error
|
err error
|
||||||
|
input *GeoIP
|
||||||
|
name string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "basic valid",
|
name: "basic valid",
|
||||||
|
|||||||
@@ -8,9 +8,9 @@ import (
|
|||||||
|
|
||||||
func TestImpressumValid(t *testing.T) {
|
func TestImpressumValid(t *testing.T) {
|
||||||
for _, cs := range []struct {
|
for _, cs := range []struct {
|
||||||
name string
|
|
||||||
inp Impressum
|
|
||||||
err error
|
err error
|
||||||
|
inp Impressum
|
||||||
|
name string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "basic happy path",
|
name: "basic happy path",
|
||||||
|
|||||||
@@ -13,17 +13,17 @@ var (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type openGraphFileConfig struct {
|
type openGraphFileConfig struct {
|
||||||
|
Override map[string]string `json:"override,omitempty" yaml:"override,omitempty"`
|
||||||
|
TimeToLive string `json:"ttl" yaml:"ttl"`
|
||||||
Enabled bool `json:"enabled" yaml:"enabled"`
|
Enabled bool `json:"enabled" yaml:"enabled"`
|
||||||
ConsiderHost bool `json:"considerHost" yaml:"enabled"`
|
ConsiderHost bool `json:"considerHost" yaml:"enabled"`
|
||||||
TimeToLive string `json:"ttl" yaml:"ttl"`
|
|
||||||
Override map[string]string `json:"override,omitempty" yaml:"override,omitempty"`
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type OpenGraph struct {
|
type OpenGraph struct {
|
||||||
Enabled bool `json:"enabled" yaml:"enabled"`
|
|
||||||
ConsiderHost bool `json:"considerHost" yaml:"enabled"`
|
|
||||||
Override map[string]string `json:"override,omitempty" yaml:"override,omitempty"`
|
Override map[string]string `json:"override,omitempty" yaml:"override,omitempty"`
|
||||||
TimeToLive time.Duration `json:"ttl" yaml:"ttl"`
|
TimeToLive time.Duration `json:"ttl" yaml:"ttl"`
|
||||||
|
Enabled bool `json:"enabled" yaml:"enabled"`
|
||||||
|
ConsiderHost bool `json:"considerHost" yaml:"enabled"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (og *openGraphFileConfig) Valid() error {
|
func (og *openGraphFileConfig) Valid() error {
|
||||||
|
|||||||
@@ -7,9 +7,9 @@ import (
|
|||||||
|
|
||||||
func TestOpenGraphFileConfigValid(t *testing.T) {
|
func TestOpenGraphFileConfigValid(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
|
||||||
input *openGraphFileConfig
|
|
||||||
err error
|
err error
|
||||||
|
input *openGraphFileConfig
|
||||||
|
name string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "basic happy path",
|
name: "basic happy path",
|
||||||
|
|||||||
@@ -12,9 +12,9 @@ import (
|
|||||||
|
|
||||||
func TestStoreValid(t *testing.T) {
|
func TestStoreValid(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
|
err error
|
||||||
name string
|
name string
|
||||||
input config.Store
|
input config.Store
|
||||||
err error
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "no backend",
|
name: "no backend",
|
||||||
|
|||||||
@@ -31,10 +31,10 @@ var (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Threshold struct {
|
type Threshold struct {
|
||||||
Name string `json:"name" yaml:"name"`
|
|
||||||
Expression *ExpressionOrList `json:"expression" yaml:"expression"`
|
Expression *ExpressionOrList `json:"expression" yaml:"expression"`
|
||||||
Action Rule `json:"action" yaml:"action"`
|
|
||||||
Challenge *ChallengeRules `json:"challenge" yaml:"challenge"`
|
Challenge *ChallengeRules `json:"challenge" yaml:"challenge"`
|
||||||
|
Name string `json:"name" yaml:"name"`
|
||||||
|
Action Rule `json:"action" yaml:"action"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (t Threshold) Valid() error {
|
func (t Threshold) Valid() error {
|
||||||
|
|||||||
@@ -10,9 +10,9 @@ import (
|
|||||||
|
|
||||||
func TestThresholdValid(t *testing.T) {
|
func TestThresholdValid(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
|
||||||
input *Threshold
|
|
||||||
err error
|
err error
|
||||||
|
input *Threshold
|
||||||
|
name string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "basic allow",
|
name: "basic allow",
|
||||||
|
|||||||
@@ -14,11 +14,11 @@ func TestBotEnvironment(t *testing.T) {
|
|||||||
|
|
||||||
t.Run("missingHeader", func(t *testing.T) {
|
t.Run("missingHeader", func(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
|
headers map[string]string
|
||||||
name string
|
name string
|
||||||
expression string
|
expression string
|
||||||
headers map[string]string
|
|
||||||
expected types.Bool
|
|
||||||
description string
|
description string
|
||||||
|
expected types.Bool
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "missing-header",
|
name: "missing-header",
|
||||||
@@ -167,10 +167,10 @@ func TestBotEnvironment(t *testing.T) {
|
|||||||
|
|
||||||
t.Run("invalid", func(t *testing.T) {
|
t.Run("invalid", func(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
|
env any
|
||||||
name string
|
name string
|
||||||
description string
|
description string
|
||||||
expression string
|
expression string
|
||||||
env any
|
|
||||||
wantFailCompile bool
|
wantFailCompile bool
|
||||||
wantFailEval bool
|
wantFailEval bool
|
||||||
}{
|
}{
|
||||||
@@ -244,11 +244,11 @@ func TestThresholdEnvironment(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
|
variables map[string]interface{}
|
||||||
name string
|
name string
|
||||||
expression string
|
expression string
|
||||||
variables map[string]interface{}
|
|
||||||
expected types.Bool
|
|
||||||
description string
|
description string
|
||||||
|
expected types.Bool
|
||||||
shouldCompile bool
|
shouldCompile bool
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -10,8 +10,8 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type loadAvg struct {
|
type loadAvg struct {
|
||||||
lock sync.RWMutex
|
|
||||||
data *load.AvgStat
|
data *load.AvgStat
|
||||||
|
lock sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *loadAvg) updateThread(ctx context.Context) {
|
func (l *loadAvg) updateThread(ctx context.Context) {
|
||||||
|
|||||||
@@ -29,16 +29,15 @@ var (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type ParsedConfig struct {
|
type ParsedConfig struct {
|
||||||
orig *config.Config
|
Store store.Interface
|
||||||
|
orig *config.Config
|
||||||
Bots []Bot
|
|
||||||
Thresholds []*Threshold
|
|
||||||
DNSBL bool
|
|
||||||
Impressum *config.Impressum
|
Impressum *config.Impressum
|
||||||
OpenGraph config.OpenGraph
|
OpenGraph config.OpenGraph
|
||||||
DefaultDifficulty int
|
Bots []Bot
|
||||||
|
Thresholds []*Threshold
|
||||||
StatusCodes config.StatusCodes
|
StatusCodes config.StatusCodes
|
||||||
Store store.Interface
|
DefaultDifficulty int
|
||||||
|
DNSBL bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func newParsedConfig(orig *config.Config) *ParsedConfig {
|
func newParsedConfig(orig *config.Config) *ParsedConfig {
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ import (
|
|||||||
|
|
||||||
func TestRedirectSecurity(t *testing.T) {
|
func TestRedirectSecurity(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
reqHost string
|
||||||
testType string // "constructRedirectURL", "serveHTTPNext", "renderIndex"
|
testType string // "constructRedirectURL", "serveHTTPNext", "renderIndex"
|
||||||
|
|
||||||
// For constructRedirectURL tests
|
// For constructRedirectURL tests
|
||||||
@@ -23,17 +23,16 @@ func TestRedirectSecurity(t *testing.T) {
|
|||||||
|
|
||||||
// For serveHTTPNext tests
|
// For serveHTTPNext tests
|
||||||
redirParam string
|
redirParam string
|
||||||
reqHost string
|
name string
|
||||||
|
|
||||||
|
errorContains string
|
||||||
|
expectedStatus int
|
||||||
|
|
||||||
// For renderIndex tests
|
// For renderIndex tests
|
||||||
returnHTTPStatusOnly bool
|
returnHTTPStatusOnly bool
|
||||||
|
shouldError bool
|
||||||
// Expected results
|
shouldNotRedirect bool
|
||||||
expectedStatus int
|
shouldBlock bool
|
||||||
shouldError bool
|
|
||||||
shouldNotRedirect bool
|
|
||||||
shouldBlock bool
|
|
||||||
errorContains string
|
|
||||||
}{
|
}{
|
||||||
// constructRedirectURL tests - X-Forwarded-Proto validation
|
// constructRedirectURL tests - X-Forwarded-Proto validation
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -17,9 +17,9 @@ func TestFactoryValid(t *testing.T) {
|
|||||||
|
|
||||||
t.Run("invalid config", func(t *testing.T) {
|
t.Run("invalid config", func(t *testing.T) {
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
|
err error
|
||||||
name string
|
name string
|
||||||
cfg Config
|
cfg Config
|
||||||
err error
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "missing path",
|
name: "missing path",
|
||||||
|
|||||||
@@ -88,8 +88,8 @@ func (Factory) Valid(data json.RawMessage) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type Config struct {
|
type Config struct {
|
||||||
PathStyle bool `json:"pathStyle"`
|
|
||||||
BucketName string `json:"bucketName"`
|
BucketName string `json:"bucketName"`
|
||||||
|
PathStyle bool `json:"pathStyle"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c Config) Valid() error {
|
func (c Config) Valid() error {
|
||||||
|
|||||||
@@ -17,10 +17,10 @@ import (
|
|||||||
|
|
||||||
// mockS3 is an in-memory mock of the methods we use.
|
// mockS3 is an in-memory mock of the methods we use.
|
||||||
type mockS3 struct {
|
type mockS3 struct {
|
||||||
mu sync.RWMutex
|
|
||||||
bucket string
|
|
||||||
data map[string][]byte
|
data map[string][]byte
|
||||||
meta map[string]map[string]string
|
meta map[string]map[string]string
|
||||||
|
bucket string
|
||||||
|
mu sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *mockS3) PutObject(ctx context.Context, in *s3.PutObjectInput, _ ...func(*s3.Options)) (*s3.PutObjectOutput, error) {
|
func (m *mockS3) PutObject(ctx context.Context, in *s3.PutObjectInput, _ ...func(*s3.Options)) (*s3.PutObjectOutput, error) {
|
||||||
|
|||||||
@@ -21,9 +21,9 @@ func Common(t *testing.T, f store.Factory, config json.RawMessage) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, tt := range []struct {
|
for _, tt := range []struct {
|
||||||
name string
|
|
||||||
doer func(t *testing.T, s store.Interface) error
|
|
||||||
err error
|
err error
|
||||||
|
doer func(t *testing.T, s store.Interface) error
|
||||||
|
name string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "basic get set delete",
|
name: "basic get set delete",
|
||||||
|
|||||||
@@ -2,20 +2,14 @@ package valkey
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
|
||||||
"os"
|
"os"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/TecharoHQ/anubis/internal"
|
|
||||||
"github.com/TecharoHQ/anubis/lib/store/storetest"
|
"github.com/TecharoHQ/anubis/lib/store/storetest"
|
||||||
"github.com/testcontainers/testcontainers-go"
|
"github.com/testcontainers/testcontainers-go"
|
||||||
"github.com/testcontainers/testcontainers-go/wait"
|
"github.com/testcontainers/testcontainers-go/wait"
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
|
||||||
internal.UnbreakDocker()
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestImpl(t *testing.T) {
|
func TestImpl(t *testing.T) {
|
||||||
if os.Getenv("DONT_USE_NETWORK") != "" {
|
if os.Getenv("DONT_USE_NETWORK") != "" {
|
||||||
t.Skip("test requires network egress")
|
t.Skip("test requires network egress")
|
||||||
@@ -24,26 +18,26 @@ func TestImpl(t *testing.T) {
|
|||||||
|
|
||||||
testcontainers.SkipIfProviderIsNotHealthy(t)
|
testcontainers.SkipIfProviderIsNotHealthy(t)
|
||||||
|
|
||||||
req := testcontainers.ContainerRequest{
|
valkeyC, err := testcontainers.Run(
|
||||||
Image: "valkey/valkey:8",
|
t.Context(), "valkey/valkey:8",
|
||||||
WaitingFor: wait.ForLog("Ready to accept connections"),
|
testcontainers.WithExposedPorts("6379/tcp"),
|
||||||
}
|
testcontainers.WithWaitStrategy(
|
||||||
valkeyC, err := testcontainers.GenericContainer(t.Context(), testcontainers.GenericContainerRequest{
|
wait.ForListeningPort("6379/tcp"),
|
||||||
ContainerRequest: req,
|
wait.ForLog("Ready to accept connections"),
|
||||||
Started: true,
|
),
|
||||||
})
|
)
|
||||||
testcontainers.CleanupContainer(t, valkeyC)
|
testcontainers.CleanupContainer(t, valkeyC)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
containerIP, err := valkeyC.ContainerIP(t.Context())
|
endpoint, err := valkeyC.PortEndpoint(t.Context(), "6379/tcp", "redis")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
data, err := json.Marshal(Config{
|
data, err := json.Marshal(Config{
|
||||||
URL: fmt.Sprintf("redis://%s:6379/0", containerIP),
|
URL: endpoint,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
|
|||||||
Reference in New Issue
Block a user