http2_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624
  1. package connection
  2. import (
  3. "bytes"
  4. "context"
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "net/http"
  10. "net/http/httptest"
  11. "sync"
  12. "testing"
  13. "time"
  14. "github.com/gobwas/ws/wsutil"
  15. "github.com/google/uuid"
  16. "github.com/rs/zerolog"
  17. "github.com/stretchr/testify/assert"
  18. "github.com/stretchr/testify/require"
  19. "golang.org/x/net/http2"
  20. "github.com/cloudflare/cloudflared/tracing"
  21. "github.com/cloudflare/cloudflared/tunnelrpc"
  22. "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
  23. )
  24. var (
  25. testTransport = http2.Transport{}
  26. )
  27. func newTestHTTP2Connection() (*HTTP2Connection, net.Conn) {
  28. edgeConn, cfdConn := net.Pipe()
  29. var connIndex = uint8(0)
  30. log := zerolog.Nop()
  31. obs := NewObserver(&log, &log)
  32. controlStream := NewControlStream(
  33. obs,
  34. mockConnectedFuse{},
  35. &TunnelProperties{},
  36. connIndex,
  37. nil,
  38. nil,
  39. 1*time.Second,
  40. nil,
  41. 1*time.Second,
  42. HTTP2,
  43. )
  44. return NewHTTP2Connection(
  45. cfdConn,
  46. // OriginProxy is set in testConfigManager
  47. testOrchestrator,
  48. &pogs.ConnectionOptions{},
  49. obs,
  50. connIndex,
  51. controlStream,
  52. &log,
  53. ), edgeConn
  54. }
  55. func TestHTTP2ConfigurationSet(t *testing.T) {
  56. http2Conn, edgeConn := newTestHTTP2Connection()
  57. ctx, cancel := context.WithCancel(context.Background())
  58. var wg sync.WaitGroup
  59. wg.Add(1)
  60. go func() {
  61. defer wg.Done()
  62. _ = http2Conn.Serve(ctx)
  63. }()
  64. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  65. require.NoError(t, err)
  66. reqBody := []byte(`{
  67. "version": 2,
  68. "config": {"warp-routing": {"enabled": true}, "originRequest" : {"connectTimeout": 10}, "ingress" : [ {"hostname": "test", "service": "https://localhost:8000" } , {"service": "http_status:404"} ]}}
  69. `)
  70. reader := bytes.NewReader(reqBody)
  71. req, err := http.NewRequestWithContext(ctx, http.MethodPut, "http://localhost:8080/ok", reader)
  72. require.NoError(t, err)
  73. req.Header.Set(InternalUpgradeHeader, ConfigurationUpdate)
  74. resp, err := edgeHTTP2Conn.RoundTrip(req)
  75. require.NoError(t, err)
  76. require.Equal(t, http.StatusOK, resp.StatusCode)
  77. bdy, err := io.ReadAll(resp.Body)
  78. defer resp.Body.Close()
  79. require.NoError(t, err)
  80. assert.Equal(t, `{"lastAppliedVersion":2,"err":null}`, string(bdy))
  81. cancel()
  82. wg.Wait()
  83. }
  84. func TestServeHTTP(t *testing.T) {
  85. tests := []testRequest{
  86. {
  87. name: "ok",
  88. endpoint: "ok",
  89. expectedStatus: http.StatusOK,
  90. expectedBody: []byte(http.StatusText(http.StatusOK)),
  91. },
  92. {
  93. name: "large_file",
  94. endpoint: "large_file",
  95. expectedStatus: http.StatusOK,
  96. expectedBody: testLargeResp,
  97. },
  98. {
  99. name: "Bad request",
  100. endpoint: "400",
  101. expectedStatus: http.StatusBadRequest,
  102. expectedBody: []byte(http.StatusText(http.StatusBadRequest)),
  103. },
  104. {
  105. name: "Internal server error",
  106. endpoint: "500",
  107. expectedStatus: http.StatusInternalServerError,
  108. expectedBody: []byte(http.StatusText(http.StatusInternalServerError)),
  109. },
  110. {
  111. name: "Proxy error",
  112. endpoint: "error",
  113. expectedStatus: http.StatusBadGateway,
  114. expectedBody: nil,
  115. isProxyError: true,
  116. },
  117. }
  118. http2Conn, edgeConn := newTestHTTP2Connection()
  119. ctx, cancel := context.WithCancel(context.Background())
  120. var wg sync.WaitGroup
  121. wg.Add(1)
  122. go func() {
  123. defer wg.Done()
  124. _ = http2Conn.Serve(ctx)
  125. }()
  126. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  127. require.NoError(t, err)
  128. for _, test := range tests {
  129. endpoint := fmt.Sprintf("http://localhost:8080/%s", test.endpoint)
  130. req, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil)
  131. require.NoError(t, err)
  132. resp, err := edgeHTTP2Conn.RoundTrip(req)
  133. require.NoError(t, err)
  134. require.Equal(t, test.expectedStatus, resp.StatusCode)
  135. if test.expectedBody != nil {
  136. respBody, err := io.ReadAll(resp.Body)
  137. require.NoError(t, err)
  138. require.Equal(t, test.expectedBody, respBody)
  139. }
  140. _ = resp.Body.Close()
  141. if test.isProxyError {
  142. require.Equal(t, responseMetaHeaderCfd, resp.Header.Get(ResponseMetaHeader))
  143. } else {
  144. require.Equal(t, responseMetaHeaderOrigin, resp.Header.Get(ResponseMetaHeader))
  145. }
  146. }
  147. cancel()
  148. wg.Wait()
  149. }
  150. type mockNamedTunnelRPCClient struct {
  151. shouldFail error
  152. registered chan struct{}
  153. unregistered chan struct{}
  154. }
  155. func (mc mockNamedTunnelRPCClient) SendLocalConfiguration(c context.Context, config []byte) error {
  156. return nil
  157. }
  158. func (mc mockNamedTunnelRPCClient) RegisterConnection(
  159. ctx context.Context,
  160. auth pogs.TunnelAuth,
  161. tunnelID uuid.UUID,
  162. options *pogs.ConnectionOptions,
  163. connIndex uint8,
  164. edgeAddress net.IP,
  165. ) (*pogs.ConnectionDetails, error) {
  166. if mc.shouldFail != nil {
  167. return nil, mc.shouldFail
  168. }
  169. close(mc.registered)
  170. return &pogs.ConnectionDetails{
  171. Location: "LIS",
  172. UUID: uuid.New(),
  173. TunnelIsRemotelyManaged: false,
  174. }, nil
  175. }
  176. func (mc mockNamedTunnelRPCClient) GracefulShutdown(ctx context.Context, gracePeriod time.Duration) error {
  177. close(mc.unregistered)
  178. return nil
  179. }
  180. func (mockNamedTunnelRPCClient) Close() {}
  181. type mockRPCClientFactory struct {
  182. shouldFail error
  183. registered chan struct{}
  184. unregistered chan struct{}
  185. }
  186. func (mf *mockRPCClientFactory) newMockRPCClient(context.Context, io.ReadWriteCloser, time.Duration) tunnelrpc.RegistrationClient {
  187. return &mockNamedTunnelRPCClient{
  188. shouldFail: mf.shouldFail,
  189. registered: mf.registered,
  190. unregistered: mf.unregistered,
  191. }
  192. }
  193. type wsRespWriter struct {
  194. *httptest.ResponseRecorder
  195. readPipe *io.PipeReader
  196. writePipe *io.PipeWriter
  197. closed bool
  198. panicked bool
  199. }
  200. func newWSRespWriter() *wsRespWriter {
  201. readPipe, writePipe := io.Pipe()
  202. return &wsRespWriter{
  203. httptest.NewRecorder(),
  204. readPipe,
  205. writePipe,
  206. false,
  207. false,
  208. }
  209. }
  210. type nowriter struct {
  211. io.Reader
  212. }
  213. func (nowriter) Write(_ []byte) (int, error) {
  214. return 0, fmt.Errorf("writer not implemented")
  215. }
  216. func (w *wsRespWriter) RespBody() io.ReadWriter {
  217. return nowriter{w.readPipe}
  218. }
  219. func (w *wsRespWriter) Write(data []byte) (n int, err error) {
  220. if w.closed {
  221. w.panicked = true
  222. return 0, errors.New("wsRespWriter panicked")
  223. }
  224. return w.writePipe.Write(data)
  225. }
  226. func (w *wsRespWriter) close() {
  227. w.closed = true
  228. }
  229. func TestServeWS(t *testing.T) {
  230. http2Conn, _ := newTestHTTP2Connection()
  231. ctx, cancel := context.WithCancel(context.Background())
  232. respWriter := newWSRespWriter()
  233. readPipe, writePipe := io.Pipe()
  234. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/ws/echo", readPipe)
  235. require.NoError(t, err)
  236. req.Header.Set(InternalUpgradeHeader, WebsocketUpgrade)
  237. serveDone := make(chan struct{})
  238. go func() {
  239. defer close(serveDone)
  240. http2Conn.ServeHTTP(respWriter, req)
  241. respWriter.close()
  242. }()
  243. data := []byte("test websocket")
  244. err = wsutil.WriteClientBinary(writePipe, data)
  245. require.NoError(t, err)
  246. respBody, err := wsutil.ReadServerBinary(respWriter.RespBody())
  247. require.NoError(t, err)
  248. require.Equal(t, data, respBody, "expect %s, got %s", string(data), string(respBody))
  249. cancel()
  250. resp := respWriter.Result()
  251. defer resp.Body.Close()
  252. // http2RespWriter should rewrite status 101 to 200
  253. require.Equal(t, http.StatusOK, resp.StatusCode)
  254. require.Equal(t, responseMetaHeaderOrigin, resp.Header.Get(ResponseMetaHeader))
  255. <-serveDone
  256. require.False(t, respWriter.panicked)
  257. }
  258. // TestNoWriteAfterServeHTTPReturns is a regression test of https://jira.cfops.it/browse/TUN-5184
  259. // to make sure we don't write to the ResponseWriter after the ServeHTTP method returns
  260. func TestNoWriteAfterServeHTTPReturns(t *testing.T) {
  261. cfdHTTP2Conn, edgeTCPConn := newTestHTTP2Connection()
  262. ctx, cancel := context.WithCancel(context.Background())
  263. var wg sync.WaitGroup
  264. serverDone := make(chan struct{})
  265. go func() {
  266. defer close(serverDone)
  267. _ = cfdHTTP2Conn.Serve(ctx)
  268. }()
  269. edgeTransport := http2.Transport{}
  270. edgeHTTP2Conn, err := edgeTransport.NewClientConn(edgeTCPConn)
  271. require.NoError(t, err)
  272. message := []byte(t.Name())
  273. for i := 0; i < 100; i++ {
  274. wg.Add(1)
  275. go func() {
  276. defer wg.Done()
  277. readPipe, writePipe := io.Pipe()
  278. reqCtx, reqCancel := context.WithCancel(ctx)
  279. req, err := http.NewRequestWithContext(reqCtx, http.MethodGet, "http://localhost:8080/ws/flaky", readPipe)
  280. assert.NoError(t, err)
  281. req.Header.Set(InternalUpgradeHeader, WebsocketUpgrade)
  282. resp, err := edgeHTTP2Conn.RoundTrip(req)
  283. assert.NoError(t, err)
  284. _ = resp.Body.Close()
  285. // http2RespWriter should rewrite status 101 to 200
  286. assert.Equal(t, http.StatusOK, resp.StatusCode)
  287. wg.Add(1)
  288. go func() {
  289. defer wg.Done()
  290. for {
  291. select {
  292. case <-reqCtx.Done():
  293. return
  294. default:
  295. }
  296. _ = wsutil.WriteClientBinary(writePipe, message)
  297. }
  298. }()
  299. time.Sleep(time.Millisecond * 100)
  300. reqCancel()
  301. }()
  302. }
  303. wg.Wait()
  304. cancel()
  305. <-serverDone
  306. }
  307. func TestServeControlStream(t *testing.T) {
  308. http2Conn, edgeConn := newTestHTTP2Connection()
  309. rpcClientFactory := mockRPCClientFactory{
  310. registered: make(chan struct{}),
  311. unregistered: make(chan struct{}),
  312. }
  313. obs := NewObserver(&log, &log)
  314. controlStream := NewControlStream(
  315. obs,
  316. mockConnectedFuse{},
  317. &TunnelProperties{},
  318. 1,
  319. nil,
  320. rpcClientFactory.newMockRPCClient,
  321. 1*time.Second,
  322. nil,
  323. 1*time.Second,
  324. HTTP2,
  325. )
  326. http2Conn.controlStreamHandler = controlStream
  327. ctx, cancel := context.WithCancel(context.Background())
  328. var wg sync.WaitGroup
  329. wg.Add(1)
  330. go func() {
  331. defer wg.Done()
  332. _ = http2Conn.Serve(ctx)
  333. }()
  334. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/", nil)
  335. require.NoError(t, err)
  336. req.Header.Set(InternalUpgradeHeader, ControlStreamUpgrade)
  337. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  338. require.NoError(t, err)
  339. wg.Add(1)
  340. go func() {
  341. defer wg.Done()
  342. // nolint: bodyclose
  343. _, _ = edgeHTTP2Conn.RoundTrip(req)
  344. }()
  345. <-rpcClientFactory.registered
  346. cancel()
  347. <-rpcClientFactory.unregistered
  348. assert.False(t, http2Conn.stoppedGracefully)
  349. wg.Wait()
  350. }
  351. func TestFailRegistration(t *testing.T) {
  352. http2Conn, edgeConn := newTestHTTP2Connection()
  353. rpcClientFactory := mockRPCClientFactory{
  354. shouldFail: errDuplicationConnection,
  355. registered: make(chan struct{}),
  356. unregistered: make(chan struct{}),
  357. }
  358. obs := NewObserver(&log, &log)
  359. controlStream := NewControlStream(
  360. obs,
  361. mockConnectedFuse{},
  362. &TunnelProperties{},
  363. http2Conn.connIndex,
  364. nil,
  365. rpcClientFactory.newMockRPCClient,
  366. 1*time.Second,
  367. nil,
  368. 1*time.Second,
  369. HTTP2,
  370. )
  371. http2Conn.controlStreamHandler = controlStream
  372. ctx, cancel := context.WithCancel(context.Background())
  373. var wg sync.WaitGroup
  374. wg.Add(1)
  375. go func() {
  376. defer wg.Done()
  377. _ = http2Conn.Serve(ctx)
  378. }()
  379. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/", nil)
  380. require.NoError(t, err)
  381. req.Header.Set(InternalUpgradeHeader, ControlStreamUpgrade)
  382. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  383. require.NoError(t, err)
  384. resp, err := edgeHTTP2Conn.RoundTrip(req)
  385. require.NoError(t, err)
  386. defer resp.Body.Close()
  387. require.Equal(t, http.StatusBadGateway, resp.StatusCode)
  388. require.Error(t, http2Conn.controlStreamErr)
  389. cancel()
  390. wg.Wait()
  391. }
  392. func TestGracefulShutdownHTTP2(t *testing.T) {
  393. http2Conn, edgeConn := newTestHTTP2Connection()
  394. rpcClientFactory := mockRPCClientFactory{
  395. registered: make(chan struct{}),
  396. unregistered: make(chan struct{}),
  397. }
  398. events := &eventCollectorSink{}
  399. shutdownC := make(chan struct{})
  400. obs := NewObserver(&log, &log)
  401. obs.RegisterSink(events)
  402. controlStream := NewControlStream(
  403. obs,
  404. mockConnectedFuse{},
  405. &TunnelProperties{},
  406. http2Conn.connIndex,
  407. nil,
  408. rpcClientFactory.newMockRPCClient,
  409. 1*time.Second,
  410. shutdownC,
  411. 1*time.Second,
  412. HTTP2,
  413. )
  414. http2Conn.controlStreamHandler = controlStream
  415. ctx, cancel := context.WithCancel(context.Background())
  416. var wg sync.WaitGroup
  417. wg.Add(1)
  418. go func() {
  419. defer wg.Done()
  420. _ = http2Conn.Serve(ctx)
  421. }()
  422. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/", nil)
  423. require.NoError(t, err)
  424. req.Header.Set(InternalUpgradeHeader, ControlStreamUpgrade)
  425. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  426. require.NoError(t, err)
  427. wg.Add(1)
  428. go func() {
  429. defer wg.Done()
  430. // nolint: bodyclose
  431. _, _ = edgeHTTP2Conn.RoundTrip(req)
  432. }()
  433. select {
  434. case <-rpcClientFactory.registered:
  435. break // ok
  436. case <-time.Tick(time.Second):
  437. t.Fatal("timeout out waiting for registration")
  438. }
  439. // signal graceful shutdown
  440. close(shutdownC)
  441. select {
  442. case <-rpcClientFactory.unregistered:
  443. break // ok
  444. case <-time.Tick(time.Second):
  445. t.Fatal("timeout out waiting for unregistered signal")
  446. }
  447. assert.True(t, controlStream.IsStopped())
  448. cancel()
  449. wg.Wait()
  450. events.assertSawEvent(t, Event{
  451. Index: http2Conn.connIndex,
  452. EventType: Unregistering,
  453. })
  454. }
  455. func TestServeTCP_RateLimited(t *testing.T) {
  456. ctx, cancel := context.WithCancel(context.Background())
  457. http2Conn, edgeConn := newTestHTTP2Connection()
  458. var wg sync.WaitGroup
  459. wg.Add(1)
  460. go func() {
  461. defer wg.Done()
  462. _ = http2Conn.Serve(ctx)
  463. }()
  464. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  465. require.NoError(t, err)
  466. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080", nil)
  467. require.NoError(t, err)
  468. req.Header.Set(InternalTCPProxySrcHeader, "tcp")
  469. req.Header.Set(tracing.TracerContextName, "flow-rate-limited")
  470. resp, err := edgeHTTP2Conn.RoundTrip(req)
  471. require.NoError(t, err)
  472. defer resp.Body.Close()
  473. require.Equal(t, http.StatusBadGateway, resp.StatusCode)
  474. require.Equal(t, responseMetaHeaderCfdFlowRateLimited, resp.Header.Get(ResponseMetaHeader))
  475. cancel()
  476. wg.Wait()
  477. }
  478. func benchmarkServeHTTP(b *testing.B, test testRequest) {
  479. http2Conn, edgeConn := newTestHTTP2Connection()
  480. ctx, cancel := context.WithCancel(context.Background())
  481. var wg sync.WaitGroup
  482. wg.Add(1)
  483. go func() {
  484. defer wg.Done()
  485. _ = http2Conn.Serve(ctx)
  486. }()
  487. endpoint := fmt.Sprintf("http://localhost:8080/%s", test.endpoint)
  488. req, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil)
  489. require.NoError(b, err)
  490. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  491. require.NoError(b, err)
  492. b.ResetTimer()
  493. for i := 0; i < b.N; i++ {
  494. b.StartTimer()
  495. resp, err := edgeHTTP2Conn.RoundTrip(req)
  496. b.StopTimer()
  497. require.NoError(b, err)
  498. require.Equal(b, test.expectedStatus, resp.StatusCode)
  499. if test.expectedBody != nil {
  500. respBody, err := io.ReadAll(resp.Body)
  501. require.NoError(b, err)
  502. require.Equal(b, test.expectedBody, respBody)
  503. }
  504. resp.Body.Close()
  505. }
  506. cancel()
  507. wg.Wait()
  508. }
  509. func BenchmarkServeHTTPSimple(b *testing.B) {
  510. test := testRequest{
  511. name: "ok",
  512. endpoint: "ok",
  513. expectedStatus: http.StatusOK,
  514. expectedBody: []byte(http.StatusText(http.StatusOK)),
  515. }
  516. benchmarkServeHTTP(b, test)
  517. }
  518. func BenchmarkServeHTTPLargeFile(b *testing.B) {
  519. test := testRequest{
  520. name: "large_file",
  521. endpoint: "large_file",
  522. expectedStatus: http.StatusOK,
  523. expectedBody: testLargeResp,
  524. }
  525. benchmarkServeHTTP(b, test)
  526. }