2020-10-09 00:12:29 +00:00
|
|
|
package ingress
|
2020-10-06 17:12:52 +00:00
|
|
|
|
|
|
|
import (
|
2020-11-04 15:44:15 +00:00
|
|
|
"fmt"
|
2020-10-06 17:12:52 +00:00
|
|
|
"net/url"
|
2020-11-04 15:44:15 +00:00
|
|
|
"regexp"
|
2020-10-06 17:12:52 +00:00
|
|
|
"testing"
|
|
|
|
|
2020-11-04 15:44:15 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2020-10-06 17:12:52 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2020-10-20 14:29:13 +00:00
|
|
|
"gopkg.in/yaml.v2"
|
2020-10-20 17:00:34 +00:00
|
|
|
|
|
|
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/config"
|
2020-10-06 17:12:52 +00:00
|
|
|
)
|
|
|
|
|
2020-10-15 21:41:03 +00:00
|
|
|
func TestParseUnixSocket(t *testing.T) {
|
|
|
|
rawYAML := `
|
|
|
|
ingress:
|
|
|
|
- service: unix:/tmp/echo.sock
|
|
|
|
`
|
2020-10-30 21:37:40 +00:00
|
|
|
ing, err := ParseIngress(MustReadIngress(rawYAML))
|
2020-10-15 21:41:03 +00:00
|
|
|
require.NoError(t, err)
|
2020-10-30 21:37:40 +00:00
|
|
|
_, ok := ing.Rules[0].Service.(*unixSocketPath)
|
2020-10-15 21:41:03 +00:00
|
|
|
require.True(t, ok)
|
|
|
|
}
|
|
|
|
|
2020-10-20 14:29:13 +00:00
|
|
|
func Test_parseIngress(t *testing.T) {
|
|
|
|
localhost8000 := MustParseURL(t, "https://localhost:8000")
|
|
|
|
localhost8001 := MustParseURL(t, "https://localhost:8001")
|
2020-11-04 18:22:21 +00:00
|
|
|
fourOhFour := newStatusCode(404)
|
2020-10-30 21:37:40 +00:00
|
|
|
defaultConfig := setConfig(originRequestFromYAML(config.OriginRequestConfig{}), config.OriginRequestConfig{})
|
2020-10-15 21:41:03 +00:00
|
|
|
require.Equal(t, defaultKeepAliveConnections, defaultConfig.KeepAliveConnections)
|
2020-10-20 14:29:13 +00:00
|
|
|
type args struct {
|
|
|
|
rawYAML string
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
2020-10-15 21:41:03 +00:00
|
|
|
want []Rule
|
2020-10-20 14:29:13 +00:00
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "Empty file",
|
|
|
|
args: args{rawYAML: ""},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Multiple rules",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- hostname: tunnel1.example.com
|
|
|
|
service: https://localhost:8000
|
|
|
|
- hostname: "*"
|
|
|
|
service: https://localhost:8001
|
|
|
|
`},
|
2020-10-15 21:41:03 +00:00
|
|
|
want: []Rule{
|
2020-10-20 14:29:13 +00:00
|
|
|
{
|
|
|
|
Hostname: "tunnel1.example.com",
|
2020-10-30 21:37:40 +00:00
|
|
|
Service: &localService{URL: localhost8000},
|
2020-10-15 21:41:03 +00:00
|
|
|
Config: defaultConfig,
|
2020-10-20 14:29:13 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Hostname: "*",
|
2020-10-30 21:37:40 +00:00
|
|
|
Service: &localService{URL: localhost8001},
|
2020-10-15 21:41:03 +00:00
|
|
|
Config: defaultConfig,
|
2020-10-20 14:29:13 +00:00
|
|
|
},
|
2020-10-15 21:41:03 +00:00
|
|
|
},
|
2020-10-20 14:29:13 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Extra keys",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- hostname: "*"
|
|
|
|
service: https://localhost:8000
|
|
|
|
extraKey: extraValue
|
|
|
|
`},
|
2020-10-15 21:41:03 +00:00
|
|
|
want: []Rule{
|
2020-10-20 14:29:13 +00:00
|
|
|
{
|
|
|
|
Hostname: "*",
|
2020-10-30 21:37:40 +00:00
|
|
|
Service: &localService{URL: localhost8000},
|
2020-10-15 21:41:03 +00:00
|
|
|
Config: defaultConfig,
|
2020-10-20 14:29:13 +00:00
|
|
|
},
|
2020-10-15 21:41:03 +00:00
|
|
|
},
|
2020-10-20 14:29:13 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Hostname can be omitted",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: https://localhost:8000
|
|
|
|
`},
|
2020-10-15 21:41:03 +00:00
|
|
|
want: []Rule{
|
2020-10-20 14:29:13 +00:00
|
|
|
{
|
2020-10-30 21:37:40 +00:00
|
|
|
Service: &localService{URL: localhost8000},
|
2020-10-15 21:41:03 +00:00
|
|
|
Config: defaultConfig,
|
2020-10-20 14:29:13 +00:00
|
|
|
},
|
2020-10-15 21:41:03 +00:00
|
|
|
},
|
2020-10-20 14:29:13 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid service",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- hostname: "*"
|
|
|
|
service: https://local host:8000
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Last rule isn't catchall",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- hostname: example.com
|
|
|
|
service: https://localhost:8000
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "First rule is catchall",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: https://localhost:8000
|
|
|
|
- hostname: example.com
|
|
|
|
service: https://localhost:8000
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Catch-all rule can't have a path",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: https://localhost:8001
|
|
|
|
path: /subpath1/(.*)/subpath2
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Invalid regex",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- hostname: example.com
|
|
|
|
service: https://localhost:8000
|
|
|
|
path: "*/subpath2"
|
|
|
|
- service: https://localhost:8001
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Service must have a scheme",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: localhost:8000
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Wildcard not at start",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- hostname: "test.*.example.com"
|
|
|
|
service: https://localhost:8000
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Service can't have a path",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: https://localhost:8000/static/
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
2020-10-30 21:37:40 +00:00
|
|
|
{
|
|
|
|
name: "Invalid HTTP status",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: http_status:asdf
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
2020-11-04 18:22:21 +00:00
|
|
|
{
|
|
|
|
name: "Valid HTTP status",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: http_status:404
|
|
|
|
`},
|
|
|
|
want: []Rule{
|
|
|
|
{
|
|
|
|
Hostname: "",
|
|
|
|
Service: &fourOhFour,
|
|
|
|
Config: defaultConfig,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-10-30 21:37:40 +00:00
|
|
|
{
|
|
|
|
name: "Valid hello world service",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- service: hello_world
|
|
|
|
`},
|
|
|
|
want: []Rule{
|
|
|
|
{
|
|
|
|
Hostname: "",
|
|
|
|
Service: new(helloWorld),
|
|
|
|
Config: defaultConfig,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-11-04 15:44:15 +00:00
|
|
|
{
|
|
|
|
name: "Hostname contains port",
|
|
|
|
args: args{rawYAML: `
|
|
|
|
ingress:
|
|
|
|
- hostname: "test.example.com:443"
|
|
|
|
service: https://localhost:8000
|
|
|
|
- hostname: "*"
|
|
|
|
service: https://localhost:8001
|
|
|
|
`},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
2020-10-20 14:29:13 +00:00
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
2020-10-30 21:37:40 +00:00
|
|
|
got, err := ParseIngress(MustReadIngress(tt.args.rawYAML))
|
2020-10-20 14:29:13 +00:00
|
|
|
if (err != nil) != tt.wantErr {
|
2020-10-30 21:37:40 +00:00
|
|
|
t.Errorf("ParseIngress() error = %v, wantErr %v", err, tt.wantErr)
|
2020-10-20 14:29:13 +00:00
|
|
|
return
|
|
|
|
}
|
2020-10-30 21:37:40 +00:00
|
|
|
require.Equal(t, tt.want, got.Rules)
|
2020-10-20 14:29:13 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2020-10-07 21:34:53 +00:00
|
|
|
|
2020-11-04 15:44:15 +00:00
|
|
|
func TestFindMatchingRule(t *testing.T) {
|
|
|
|
ingress := Ingress{
|
|
|
|
Rules: []Rule{
|
|
|
|
{
|
|
|
|
Hostname: "tunnel-a.example.com",
|
|
|
|
Path: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Hostname: "tunnel-b.example.com",
|
|
|
|
Path: mustParsePath(t, "/health"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Hostname: "*",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
host string
|
|
|
|
path string
|
|
|
|
wantRuleIndex int
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
host: "tunnel-a.example.com",
|
|
|
|
path: "/",
|
|
|
|
wantRuleIndex: 0,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
host: "tunnel-a.example.com",
|
|
|
|
path: "/pages/about",
|
|
|
|
wantRuleIndex: 0,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
host: "tunnel-a.example.com:443",
|
|
|
|
path: "/pages/about",
|
|
|
|
wantRuleIndex: 0,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
host: "tunnel-b.example.com",
|
|
|
|
path: "/health",
|
|
|
|
wantRuleIndex: 1,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
host: "tunnel-b.example.com",
|
|
|
|
path: "/index.html",
|
|
|
|
wantRuleIndex: 2,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
host: "tunnel-c.example.com",
|
|
|
|
path: "/",
|
|
|
|
wantRuleIndex: 2,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, test := range tests {
|
|
|
|
_, ruleIndex := ingress.FindMatchingRule(test.host, test.path)
|
|
|
|
assert.Equal(t, test.wantRuleIndex, ruleIndex, fmt.Sprintf("Expect host=%s, path=%s to match rule %d, got %d", test.host, test.path, test.wantRuleIndex, i))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func mustParsePath(t *testing.T, path string) *regexp.Regexp {
|
|
|
|
regexp, err := regexp.Compile(path)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
return regexp
|
|
|
|
}
|
|
|
|
|
2020-10-20 14:29:13 +00:00
|
|
|
func MustParseURL(t *testing.T, rawURL string) *url.URL {
|
2020-10-07 21:34:53 +00:00
|
|
|
u, err := url.Parse(rawURL)
|
|
|
|
require.NoError(t, err)
|
|
|
|
return u
|
|
|
|
}
|
|
|
|
|
2020-10-20 14:29:13 +00:00
|
|
|
func BenchmarkFindMatch(b *testing.B) {
|
|
|
|
rulesYAML := `
|
|
|
|
ingress:
|
|
|
|
- hostname: tunnel1.example.com
|
|
|
|
service: https://localhost:8000
|
|
|
|
- hostname: tunnel2.example.com
|
|
|
|
service: https://localhost:8001
|
|
|
|
- hostname: "*"
|
|
|
|
service: https://localhost:8002
|
|
|
|
`
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
ing, err := ParseIngress(MustReadIngress(rulesYAML))
|
2020-10-20 14:29:13 +00:00
|
|
|
if err != nil {
|
|
|
|
b.Error(err)
|
|
|
|
}
|
|
|
|
for n := 0; n < b.N; n++ {
|
|
|
|
ing.FindMatchingRule("tunnel1.example.com", "")
|
|
|
|
ing.FindMatchingRule("tunnel2.example.com", "")
|
|
|
|
ing.FindMatchingRule("tunnel3.example.com", "")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-20 17:00:34 +00:00
|
|
|
func MustReadIngress(s string) *config.Configuration {
|
|
|
|
var conf config.Configuration
|
|
|
|
err := yaml.Unmarshal([]byte(s), &conf)
|
2020-10-20 14:29:13 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2020-10-20 17:00:34 +00:00
|
|
|
return &conf
|
2020-10-20 14:29:13 +00:00
|
|
|
}
|