mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-09-30 03:34:29 +03:00
Renames examples/multithread_c to multiprocess_c
This commit is contained in:
24
examples/multiprocess_c/Makefile.am
Normal file
24
examples/multiprocess_c/Makefile.am
Normal file
@@ -0,0 +1,24 @@
|
||||
|
||||
|
||||
noinst_PROGRAMS = multi
|
||||
|
||||
multi_SOURCES = \
|
||||
multi.c
|
||||
|
||||
multi_LDADD = \
|
||||
-L$(top_builddir)/src/.libs/ \
|
||||
-lmodsecurity \
|
||||
-lpthread \
|
||||
$(YAJL_LDFLAGS) \
|
||||
$(GEOIP_LDFLAGS) \
|
||||
$(GLOBAL_LDADD)
|
||||
|
||||
multi_CFLAGS = \
|
||||
-I$(top_builddir)/headers \
|
||||
-I$(top_builddir) \
|
||||
$(GLOBAL_CFLAGS)
|
||||
|
||||
MAINTAINERCLEANFILES = \
|
||||
Makefile.in
|
||||
|
||||
|
14
examples/multiprocess_c/basic_rules.conf
Normal file
14
examples/multiprocess_c/basic_rules.conf
Normal file
@@ -0,0 +1,14 @@
|
||||
SecDebugLog /dev/stdout
|
||||
SecDebugLogLevel 9
|
||||
|
||||
|
||||
SecRule REQUEST_HEADERS:User-Agent ".*" "id:1,phase:1,t:sha1,t:hexEncode,setvar:tx.ua_hash=%{MATCHED_VAR}"
|
||||
|
||||
SecAction "phase:2,initcol:ip=%{REMOTE_ADDR}_%{tx.ua_hash}"
|
||||
|
||||
SecRule REQUEST_HEADERS:User-Agent ".*" "id:2,phase:2,setvar:ip.auth_attempt=+1"
|
||||
|
||||
SecRule ARGS:foo "herewego" "id:3,phase:2,setvar:ip.foo=bar"
|
||||
SecRule IP "bar" "id:4,phase:2"
|
||||
SecRule IP:auth_attempt "bar" "id:5,phase:2"
|
||||
|
135
examples/multiprocess_c/multi.c
Normal file
135
examples/multiprocess_c/multi.c
Normal file
@@ -0,0 +1,135 @@
|
||||
/*
|
||||
* ModSecurity, http://www.modsecurity.org/
|
||||
* Copyright (c) 2015 Trustwave Holdings, Inc. (http://www.trustwave.com/)
|
||||
*
|
||||
* You may not use this file except in compliance with
|
||||
* the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* If any of the files related to licensing are missing or if you have any
|
||||
* other questions related to licensing please contact Trustwave Holdings, Inc.
|
||||
* directly using the email address security@modsecurity.org.
|
||||
*
|
||||
*/
|
||||
|
||||
#include <modsecurity/modsecurity.h>
|
||||
#include <modsecurity/transaction.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
|
||||
|
||||
#define FORKS 5
|
||||
#define REQUESTS_PER_PROCESS 100
|
||||
|
||||
|
||||
char main_rule_uri[] = "basic_rules.conf";
|
||||
Rules *rules = NULL;
|
||||
ModSecurity *modsec = NULL;
|
||||
|
||||
|
||||
void process_special_request (int j) {
|
||||
Transaction *transaction = NULL;
|
||||
transaction = msc_new_transaction(modsec, rules, NULL);
|
||||
|
||||
msc_process_connection(transaction, "127.0.0.1", 12345, "127.0.0.1", 80);
|
||||
msc_process_uri(transaction,
|
||||
"http://www.modsecurity.org/test?foo=herewego",
|
||||
"GET", "1.1");
|
||||
msc_add_request_header(transaction, "User-Agent",
|
||||
"Basic ModSecurity example");
|
||||
msc_process_request_headers(transaction);
|
||||
msc_process_request_body(transaction);
|
||||
msc_add_response_header(transaction, "Content-type", "text/html");
|
||||
msc_process_response_headers(transaction, 200, "HTTP 1.0");
|
||||
msc_process_response_body(transaction);
|
||||
msc_process_logging(transaction);
|
||||
msc_transaction_cleanup(transaction);
|
||||
}
|
||||
|
||||
void process_request (int j) {
|
||||
for (int i = 0; i < REQUESTS_PER_PROCESS; i++) {
|
||||
if (i == 1 && j == 1) {
|
||||
process_special_request(j);
|
||||
continue;
|
||||
}
|
||||
struct timeval tv;
|
||||
|
||||
Transaction *transaction = NULL;
|
||||
transaction = msc_new_transaction(modsec, rules, NULL);
|
||||
|
||||
msc_process_connection(transaction, "127.0.0.1", 12345, "127.0.0.1", 80);
|
||||
msc_process_uri(transaction,
|
||||
"http://www.modsecurity.org/test?key1=value1&key2=value2&key3=value3",
|
||||
"GET", "1.1");
|
||||
msc_add_request_header(transaction, "User-Agent",
|
||||
"Basic ModSecurity example");
|
||||
msc_process_request_headers(transaction);
|
||||
msc_process_request_body(transaction);
|
||||
msc_add_response_header(transaction, "Content-type", "text/html");
|
||||
msc_process_response_headers(transaction, 200, "HTTP 1.0");
|
||||
msc_process_response_body(transaction);
|
||||
msc_process_logging(transaction);
|
||||
msc_transaction_cleanup(transaction);
|
||||
|
||||
tv.tv_sec = 1;
|
||||
tv.tv_usec = 500;
|
||||
select(0, NULL, NULL, NULL, &tv);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
int main (int argc, char **argv)
|
||||
{
|
||||
int ret = 1;
|
||||
const char *error = NULL;
|
||||
int i = 0;
|
||||
pid_t pid;
|
||||
int f;
|
||||
|
||||
modsec = msc_init();
|
||||
|
||||
msc_set_connector_info(modsec, "ModSecurity-test v0.0.1-alpha (Simple " \
|
||||
"example on how to use ModSecurity API");
|
||||
|
||||
rules = msc_create_rules_set();
|
||||
|
||||
ret = msc_rules_add_file(rules, main_rule_uri, &error);
|
||||
if (ret < 0) {
|
||||
fprintf(stderr, "Problems loading the rules --\n");
|
||||
fprintf(stderr, "%s\n", error);
|
||||
goto end;
|
||||
}
|
||||
|
||||
msc_rules_dump(rules);
|
||||
|
||||
for (f = 0; f < FORKS; f++) {
|
||||
pid = fork();
|
||||
if (pid == 0) {
|
||||
process_request(f);
|
||||
goto child;
|
||||
}
|
||||
struct timeval tv;
|
||||
|
||||
tv.tv_sec = 0;
|
||||
tv.tv_usec = 500;
|
||||
select(0, NULL, NULL, NULL, &tv);
|
||||
}
|
||||
|
||||
wait(NULL);
|
||||
|
||||
child:
|
||||
|
||||
if (pid == 0) {
|
||||
return 0;
|
||||
}
|
||||
end:
|
||||
msc_rules_cleanup(rules);
|
||||
msc_cleanup(modsec);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user