mirror of https://github.com/chaos-mesh/chaosd.git
144 lines
4.3 KiB
Go
144 lines
4.3 KiB
Go
// Copyright 2022 Chaos Mesh Authors.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package attack
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/spf13/cobra"
|
|
"go.uber.org/fx"
|
|
|
|
"github.com/chaos-mesh/chaosd/cmd/server"
|
|
"github.com/chaos-mesh/chaosd/pkg/core"
|
|
"github.com/chaos-mesh/chaosd/pkg/server/chaosd"
|
|
"github.com/chaos-mesh/chaosd/pkg/utils"
|
|
)
|
|
|
|
func NewHTTPAttackCommand(uid *string) *cobra.Command {
|
|
option := core.NewHTTPAttackOption()
|
|
dep := fx.Options(
|
|
server.Module,
|
|
fx.Provide(func() *core.HTTPAttackOption {
|
|
option.UID = *uid
|
|
return option
|
|
}),
|
|
)
|
|
|
|
cmd := &cobra.Command{
|
|
Use: "http <subcommand>",
|
|
Short: "HTTP attack related commands",
|
|
}
|
|
|
|
cmd.AddCommand(
|
|
NewHTTPAbortCommand(dep, option),
|
|
NewHTTPDelayCommand(dep, option),
|
|
NewHTTPConfigCommand(dep, option),
|
|
NewHTTPRequestCommand(dep, option),
|
|
)
|
|
|
|
return cmd
|
|
}
|
|
|
|
func NewHTTPAbortCommand(dep fx.Option, o *core.HTTPAttackOption) *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "abort",
|
|
Short: "abort selected HTTP connection",
|
|
Run: func(*cobra.Command, []string) {
|
|
o.Action = core.HTTPAbortAction
|
|
o.Abort = true
|
|
utils.FxNewAppWithoutLog(dep, fx.Invoke(processHTTPAttack)).Run()
|
|
},
|
|
}
|
|
|
|
setTarget(cmd, o)
|
|
setSelector(cmd, o)
|
|
return cmd
|
|
}
|
|
|
|
func NewHTTPDelayCommand(dep fx.Option, o *core.HTTPAttackOption) *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "delay",
|
|
Short: "delay selected HTTP Package",
|
|
Run: func(*cobra.Command, []string) {
|
|
o.Action = core.HTTPDelayAction
|
|
utils.FxNewAppWithoutLog(dep, fx.Invoke(processHTTPAttack)).Run()
|
|
},
|
|
}
|
|
|
|
setTarget(cmd, o)
|
|
setSelector(cmd, o)
|
|
|
|
cmd.Flags().StringVarP(&o.Delay, "delay time", "d", "", "Delay represents the delay of the target request/response.")
|
|
return cmd
|
|
}
|
|
|
|
func setTarget(cmd *cobra.Command, o *core.HTTPAttackOption) {
|
|
cmd.Flags().UintSliceVarP(&o.ProxyPorts, "proxy-ports", "p", nil,
|
|
"composed with one of the port of HTTP connection, "+
|
|
"we will only attack HTTP connection with port inside proxy_ports")
|
|
cmd.Flags().StringVarP(&o.Target, "target", "t", "",
|
|
"HTTP target: Request or Response")
|
|
}
|
|
|
|
func setSelector(cmd *cobra.Command, c *core.HTTPAttackOption) {
|
|
cmd.Flags().Int32Var(&c.Port, "port", 0, "The TCP port that the target service listens on.")
|
|
cmd.Flags().StringVar(&c.Path, "path", "",
|
|
"Match path of Uri with wildcard matches.")
|
|
cmd.Flags().StringVarP(&c.Method, "method", "m", "", "HTTP method")
|
|
cmd.Flags().StringVarP(&c.Code, "code", "c", "", "Code is a rule to select target by http status code in response.")
|
|
}
|
|
|
|
func NewHTTPConfigCommand(dep fx.Option, o *core.HTTPAttackOption) *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "config",
|
|
Short: "attack with config file",
|
|
Run: func(*cobra.Command, []string) {
|
|
o.Action = core.HTTPConfigAction
|
|
utils.FxNewAppWithoutLog(dep, fx.Invoke(processHTTPAttack)).Run()
|
|
},
|
|
}
|
|
cmd.Flags().StringVarP(&o.FilePath, "file path", "p", "", "Config file path.")
|
|
return cmd
|
|
}
|
|
|
|
func NewHTTPRequestCommand(dep fx.Option, o *core.HTTPAttackOption) *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "request",
|
|
Short: "request specific URL, only support GET",
|
|
Run: func(*cobra.Command, []string) {
|
|
o.Action = core.HTTPRequestAction
|
|
utils.FxNewAppWithoutLog(dep, fx.Invoke(processHTTPAttack)).Run()
|
|
},
|
|
}
|
|
|
|
cmd.Flags().StringVarP(&o.HTTPRequestConfig.URL, "url", "", "", "Request to send")
|
|
cmd.Flags().IntVarP(&o.HTTPRequestConfig.Count, "count", "c", 1, "Number of requests to send")
|
|
cmd.Flags().BoolVarP(&o.HTTPRequestConfig.EnableConnPool, "enable-conn-pool", "p", false, "Enable connection pool")
|
|
return cmd
|
|
}
|
|
|
|
func processHTTPAttack(o *core.HTTPAttackOption, chaos *chaosd.Server) {
|
|
attackConfig, err := o.PreProcess()
|
|
if err != nil {
|
|
utils.ExitWithError(utils.ExitBadArgs, err)
|
|
}
|
|
|
|
uid, err := chaos.ExecuteAttack(chaosd.HTTPAttack, attackConfig, core.CommandMode)
|
|
if err != nil {
|
|
utils.ExitWithError(utils.ExitError, err)
|
|
}
|
|
|
|
utils.NormalExit(fmt.Sprintf("HTTP attack successfully, uid: %s", uid))
|
|
}
|