/* * Licensed to Elasticsearch under one or more contributor * license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright * ownership. Elasticsearch licenses this file to you under * the Apache License, Version 2.0 (the "License"); you may * not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.elasticsearch.http.netty; import org.elasticsearch.common.collect.Tuple; import org.elasticsearch.common.settings.Settings; import org.elasticsearch.common.transport.InetSocketTransportAddress; import org.elasticsearch.common.unit.ByteSizeUnit; import org.elasticsearch.common.unit.ByteSizeValue; import org.elasticsearch.http.HttpServerTransport; import org.elasticsearch.indices.breaker.HierarchyCircuitBreakerService; import org.elasticsearch.node.Node; import org.elasticsearch.test.ESIntegTestCase; import org.elasticsearch.test.ESIntegTestCase.ClusterScope; import org.elasticsearch.test.ESIntegTestCase.Scope; import org.jboss.netty.handler.codec.http.HttpResponse; import org.jboss.netty.handler.codec.http.HttpResponseStatus; import org.junit.Test; import java.util.Collection; import static org.hamcrest.Matchers.equalTo; import static org.hamcrest.Matchers.greaterThan; import static org.hamcrest.Matchers.hasSize; /** * This test checks that in-flight requests are limited on HTTP level and that requests that are excluded from limiting can pass. * * As the same setting is also used to limit in-flight requests on transport level, we avoid transport messages by forcing * a single node "cluster". We also force test infrastructure to use the node client instead of the transport client for the same reason. */ @ClusterScope(scope = Scope.TEST, numClientNodes = 0, numDataNodes = 1, transportClientRatio = 0) public class NettyHttpRequestSizeLimitIT extends ESIntegTestCase { private static final ByteSizeValue LIMIT = new ByteSizeValue(2, ByteSizeUnit.KB); @Override protected Settings nodeSettings(int nodeOrdinal) { return Settings.builder() .put(super.nodeSettings(nodeOrdinal)) .put(Node.HTTP_ENABLED, true) .put(HierarchyCircuitBreakerService.IN_FLIGHT_REQUESTS_CIRCUIT_BREAKER_LIMIT_SETTING, LIMIT) .build(); } @Test public void testLimitsInFlightRequests() throws Exception { ensureGreen(); // we use the limit size as a (very) rough indication on how many requests we should sent to hit the limit int numRequests = LIMIT.bytesAsInt() / 100; StringBuilder bulkRequest = new StringBuilder(); for (int i = 0; i < numRequests; i++) { bulkRequest.append("{\"index\": {}}"); bulkRequest.append(System.lineSeparator()); bulkRequest.append("{ \"field\" : \"value\" }"); bulkRequest.append(System.lineSeparator()); } @SuppressWarnings("unchecked") Tuple<String, CharSequence>[] requests = new Tuple[1000]; for (int i = 0; i < requests.length; i++) { requests[i] = Tuple.tuple("/index/type/_bulk", (CharSequence) bulkRequest); } HttpServerTransport httpServerTransport = internalCluster().getInstance(HttpServerTransport.class); InetSocketTransportAddress inetSocketTransportAddress = (InetSocketTransportAddress) randomFrom(httpServerTransport.boundAddress ().boundAddresses()); try (NettyHttpClient nettyHttpClient = new NettyHttpClient()) { Collection<HttpResponse> singleResponse = nettyHttpClient.post(inetSocketTransportAddress.address(), requests[0]); assertThat(singleResponse, hasSize(1)); assertAtLeastOnceExpectedStatus(singleResponse, HttpResponseStatus.OK); Collection<HttpResponse> multipleResponses = nettyHttpClient.post(inetSocketTransportAddress.address(), requests); assertThat(multipleResponses, hasSize(requests.length)); assertAtLeastOnceExpectedStatus(multipleResponses, HttpResponseStatus.SERVICE_UNAVAILABLE); } } public void testDoesNotLimitExcludedRequests() throws Exception { ensureGreen(); @SuppressWarnings("unchecked") Tuple<String, CharSequence>[] requestUris = new Tuple[1500]; for (int i = 0; i < requestUris.length; i++) { requestUris[i] = Tuple.tuple("/_cluster/settings", (CharSequence) "{ \"transient\": {\"indices.ttl.interval\": \"40s\" } }"); } HttpServerTransport httpServerTransport = internalCluster().getInstance(HttpServerTransport.class); InetSocketTransportAddress inetSocketTransportAddress = (InetSocketTransportAddress) randomFrom(httpServerTransport.boundAddress ().boundAddresses()); try (NettyHttpClient nettyHttpClient = new NettyHttpClient()) { Collection<HttpResponse> responses = nettyHttpClient.put(inetSocketTransportAddress.address(), requestUris); assertThat(responses, hasSize(requestUris.length)); assertAllInExpectedStatus(responses, HttpResponseStatus.OK); } } private void assertAtLeastOnceExpectedStatus(Collection<HttpResponse> responses, HttpResponseStatus expectedStatus) { long countResponseErrors = 0; for (HttpResponse response : responses) { if (response.getStatus().equals(expectedStatus)) { countResponseErrors++; } } assertThat("Expected at least one request with status [" + expectedStatus + "]", countResponseErrors, greaterThan(0L)); } private void assertAllInExpectedStatus(Collection<HttpResponse> responses, HttpResponseStatus expectedStatus) { long countUnexpectedStatus = 0; for (HttpResponse response : responses) { if (response.getStatus().equals(expectedStatus) == false) { countUnexpectedStatus++; } } assertThat("Expected all requests with status [" + expectedStatus + "] but [" + countUnexpectedStatus + "] requests had a different one", countUnexpectedStatus, equalTo(0L)); } }