origin_proxy_test.go 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240
  1. package ingress
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "fmt"
  6. "net"
  7. "net/http"
  8. "net/http/httptest"
  9. "net/url"
  10. "sync"
  11. "testing"
  12. "github.com/stretchr/testify/assert"
  13. "github.com/stretchr/testify/require"
  14. "github.com/cloudflare/cloudflared/carrier"
  15. "github.com/cloudflare/cloudflared/websocket"
  16. )
  17. // TestEstablishConnectionResponse ensures each implementation of StreamBasedOriginProxy returns
  18. // the expected response
  19. func assertEstablishConnectionResponse(t *testing.T,
  20. originProxy StreamBasedOriginProxy,
  21. req *http.Request,
  22. expectHeader http.Header,
  23. ) {
  24. _, resp, err := originProxy.EstablishConnection(req)
  25. assert.NoError(t, err)
  26. assert.Equal(t, switchingProtocolText, resp.Status)
  27. assert.Equal(t, http.StatusSwitchingProtocols, resp.StatusCode)
  28. assert.Equal(t, expectHeader, resp.Header)
  29. }
  30. func TestHTTPServiceEstablishConnection(t *testing.T) {
  31. origin := echoWSOrigin(t, false)
  32. defer origin.Close()
  33. originURL, err := url.Parse(origin.URL)
  34. require.NoError(t, err)
  35. httpService := &httpService{
  36. url: originURL,
  37. hostHeader: origin.URL,
  38. transport: &http.Transport{
  39. TLSClientConfig: &tls.Config{
  40. InsecureSkipVerify: true,
  41. },
  42. },
  43. }
  44. req, err := http.NewRequest(http.MethodGet, origin.URL, nil)
  45. require.NoError(t, err)
  46. req.Header.Set("Sec-Websocket-Key", "dGhlIHNhbXBsZSBub25jZQ==")
  47. req.Header.Set("Test-Cloudflared-Echo", t.Name())
  48. expectHeader := http.Header{
  49. "Connection": {"Upgrade"},
  50. "Sec-Websocket-Accept": {"s3pPLMBiTxaQ9kYGzzhZRbK+xOo="},
  51. "Upgrade": {"websocket"},
  52. "Test-Cloudflared-Echo": {t.Name()},
  53. }
  54. assertEstablishConnectionResponse(t, httpService, req, expectHeader)
  55. }
  56. func TestHelloWorldEstablishConnection(t *testing.T) {
  57. var wg sync.WaitGroup
  58. shutdownC := make(chan struct{})
  59. errC := make(chan error)
  60. helloWorldSerivce := &helloWorld{}
  61. helloWorldSerivce.start(&wg, testLogger, shutdownC, errC, OriginRequestConfig{})
  62. // Scheme and Host of URL will be override by the Scheme and Host of the helloWorld service
  63. req, err := http.NewRequest(http.MethodGet, "https://place-holder/ws", nil)
  64. require.NoError(t, err)
  65. req.Header.Set("Sec-Websocket-Key", "dGhlIHNhbXBsZSBub25jZQ==")
  66. expectHeader := http.Header{
  67. "Connection": {"Upgrade"},
  68. "Sec-Websocket-Accept": {"s3pPLMBiTxaQ9kYGzzhZRbK+xOo="},
  69. "Upgrade": {"websocket"},
  70. }
  71. assertEstablishConnectionResponse(t, helloWorldSerivce, req, expectHeader)
  72. close(shutdownC)
  73. }
  74. func TestRawTCPServiceEstablishConnection(t *testing.T) {
  75. originListener, err := net.Listen("tcp", "127.0.0.1:0")
  76. require.NoError(t, err)
  77. listenerClosed := make(chan struct{})
  78. tcpListenRoutine(originListener, listenerClosed)
  79. rawTCPService := &rawTCPService{name: ServiceWarpRouting}
  80. req, err := http.NewRequest(http.MethodGet, fmt.Sprintf("http://%s", originListener.Addr()), nil)
  81. require.NoError(t, err)
  82. assertEstablishConnectionResponse(t, rawTCPService, req, nil)
  83. originListener.Close()
  84. <-listenerClosed
  85. req, err = http.NewRequest(http.MethodGet, fmt.Sprintf("http://%s", originListener.Addr()), nil)
  86. require.NoError(t, err)
  87. // Origin not listening for new connection, should return an error
  88. _, resp, err := rawTCPService.EstablishConnection(req)
  89. require.Error(t, err)
  90. require.Nil(t, resp)
  91. }
  92. func TestTCPOverWSServiceEstablishConnection(t *testing.T) {
  93. originListener, err := net.Listen("tcp", "127.0.0.1:0")
  94. require.NoError(t, err)
  95. listenerClosed := make(chan struct{})
  96. tcpListenRoutine(originListener, listenerClosed)
  97. originURL := &url.URL{
  98. Scheme: "tcp",
  99. Host: originListener.Addr().String(),
  100. }
  101. baseReq, err := http.NewRequest(http.MethodGet, "https://place-holder", nil)
  102. require.NoError(t, err)
  103. baseReq.Header.Set("Sec-Websocket-Key", "dGhlIHNhbXBsZSBub25jZQ==")
  104. bastionReq := baseReq.Clone(context.Background())
  105. carrier.SetBastionDest(bastionReq.Header, originListener.Addr().String())
  106. expectHeader := http.Header{
  107. "Connection": {"Upgrade"},
  108. "Sec-Websocket-Accept": {"s3pPLMBiTxaQ9kYGzzhZRbK+xOo="},
  109. "Upgrade": {"websocket"},
  110. }
  111. tests := []struct {
  112. testCase string
  113. service *tcpOverWSService
  114. req *http.Request
  115. expectErr bool
  116. }{
  117. {
  118. testCase: "specific TCP service",
  119. service: newTCPOverWSService(originURL),
  120. req: baseReq,
  121. },
  122. {
  123. testCase: "bastion service",
  124. service: newBastionService(),
  125. req: bastionReq,
  126. },
  127. {
  128. testCase: "invalid bastion request",
  129. service: newBastionService(),
  130. req: baseReq,
  131. expectErr: true,
  132. },
  133. }
  134. for _, test := range tests {
  135. t.Run(test.testCase, func(t *testing.T) {
  136. if test.expectErr {
  137. _, resp, err := test.service.EstablishConnection(test.req)
  138. assert.Error(t, err)
  139. assert.Nil(t, resp)
  140. } else {
  141. assertEstablishConnectionResponse(t, test.service, test.req, expectHeader)
  142. }
  143. })
  144. }
  145. originListener.Close()
  146. <-listenerClosed
  147. for _, service := range []*tcpOverWSService{newTCPOverWSService(originURL), newBastionService()} {
  148. // Origin not listening for new connection, should return an error
  149. _, resp, err := service.EstablishConnection(bastionReq)
  150. assert.Error(t, err)
  151. assert.Nil(t, resp)
  152. }
  153. }
  154. func TestHTTPServiceHostHeaderOverride(t *testing.T) {
  155. cfg := OriginRequestConfig{
  156. HTTPHostHeader: t.Name(),
  157. }
  158. handler := func(w http.ResponseWriter, r *http.Request) {
  159. require.Equal(t, r.Host, t.Name())
  160. if websocket.IsWebSocketUpgrade(r) {
  161. respHeaders := websocket.NewResponseHeader(r)
  162. for k, v := range respHeaders {
  163. w.Header().Set(k, v[0])
  164. }
  165. w.WriteHeader(http.StatusSwitchingProtocols)
  166. return
  167. }
  168. w.Write([]byte("ok"))
  169. }
  170. origin := httptest.NewServer(http.HandlerFunc(handler))
  171. defer origin.Close()
  172. originURL, err := url.Parse(origin.URL)
  173. require.NoError(t, err)
  174. httpService := &httpService{
  175. url: originURL,
  176. }
  177. var wg sync.WaitGroup
  178. shutdownC := make(chan struct{})
  179. errC := make(chan error)
  180. require.NoError(t, httpService.start(&wg, testLogger, shutdownC, errC, cfg))
  181. req, err := http.NewRequest(http.MethodGet, originURL.String(), nil)
  182. require.NoError(t, err)
  183. resp, err := httpService.RoundTrip(req)
  184. require.NoError(t, err)
  185. require.Equal(t, http.StatusOK, resp.StatusCode)
  186. req = req.Clone(context.Background())
  187. _, resp, err = httpService.EstablishConnection(req)
  188. require.NoError(t, err)
  189. require.Equal(t, http.StatusSwitchingProtocols, resp.StatusCode)
  190. }
  191. func tcpListenRoutine(listener net.Listener, closeChan chan struct{}) {
  192. go func() {
  193. for {
  194. conn, err := listener.Accept()
  195. if err != nil {
  196. close(closeChan)
  197. return
  198. }
  199. // Close immediately, this test is not about testing read/write on connection
  200. conn.Close()
  201. }
  202. }()
  203. }