2020-10-27 22:27:15 +00:00
|
|
|
package connection
|
|
|
|
|
|
|
|
import (
|
2021-07-16 15:14:37 +00:00
|
|
|
"context"
|
2020-10-27 22:27:15 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
2021-10-19 19:01:17 +00:00
|
|
|
"math/rand"
|
2020-10-27 22:27:15 +00:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2020-11-18 11:53:59 +00:00
|
|
|
"testing"
|
2020-10-27 22:27:15 +00:00
|
|
|
"time"
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
"github.com/rs/zerolog"
|
2020-11-18 11:53:59 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2021-07-16 15:14:37 +00:00
|
|
|
|
|
|
|
"github.com/cloudflare/cloudflared/ingress"
|
2022-02-07 09:42:07 +00:00
|
|
|
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
2021-10-19 19:01:17 +00:00
|
|
|
"github.com/cloudflare/cloudflared/websocket"
|
2020-10-27 22:27:15 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2022-02-07 09:42:07 +00:00
|
|
|
largeFileSize = 2 * 1024 * 1024
|
|
|
|
testGracePeriod = time.Millisecond * 100
|
2020-10-27 22:27:15 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2021-07-16 15:14:37 +00:00
|
|
|
unusedWarpRoutingService = (*ingress.WarpRoutingService)(nil)
|
2022-02-07 09:42:07 +00:00
|
|
|
testConfigManager = &mockConfigManager{
|
|
|
|
originProxy: &mockOriginProxy{},
|
2020-10-27 22:27:15 +00:00
|
|
|
}
|
2020-11-25 06:55:13 +00:00
|
|
|
log = zerolog.Nop()
|
2020-10-27 22:27:15 +00:00
|
|
|
testOriginURL = &url.URL{
|
|
|
|
Scheme: "https",
|
|
|
|
Host: "connectiontest.argotunnel.com",
|
|
|
|
}
|
|
|
|
testLargeResp = make([]byte, largeFileSize)
|
|
|
|
)
|
|
|
|
|
|
|
|
type testRequest struct {
|
|
|
|
name string
|
|
|
|
endpoint string
|
|
|
|
expectedStatus int
|
|
|
|
expectedBody []byte
|
|
|
|
isProxyError bool
|
|
|
|
}
|
|
|
|
|
2022-02-07 09:42:07 +00:00
|
|
|
type mockConfigManager struct {
|
|
|
|
originProxy OriginProxy
|
|
|
|
}
|
|
|
|
|
|
|
|
func (*mockConfigManager) Update(version int32, config []byte) *tunnelpogs.UpdateConfigurationResponse {
|
|
|
|
return &tunnelpogs.UpdateConfigurationResponse{
|
|
|
|
LastAppliedVersion: version,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mcr *mockConfigManager) GetOriginProxy() OriginProxy {
|
|
|
|
return mcr.originProxy
|
|
|
|
}
|
|
|
|
|
2021-07-16 15:14:37 +00:00
|
|
|
type mockOriginProxy struct{}
|
2020-10-27 22:27:15 +00:00
|
|
|
|
2021-07-16 15:14:37 +00:00
|
|
|
func (moc *mockOriginProxy) ProxyHTTP(
|
|
|
|
w ResponseWriter,
|
|
|
|
req *http.Request,
|
|
|
|
isWebsocket bool,
|
|
|
|
) error {
|
|
|
|
if isWebsocket {
|
2021-10-19 19:01:17 +00:00
|
|
|
switch req.URL.Path {
|
|
|
|
case "/ws/echo":
|
|
|
|
return wsEchoEndpoint(w, req)
|
|
|
|
case "/ws/flaky":
|
|
|
|
return wsFlakyEndpoint(w, req)
|
|
|
|
default:
|
|
|
|
originRespEndpoint(w, http.StatusNotFound, []byte("ws endpoint not found"))
|
|
|
|
return fmt.Errorf("Unknwon websocket endpoint %s", req.URL.Path)
|
|
|
|
}
|
2020-10-27 22:27:15 +00:00
|
|
|
}
|
2021-07-16 15:14:37 +00:00
|
|
|
switch req.URL.Path {
|
2020-10-27 22:27:15 +00:00
|
|
|
case "/ok":
|
|
|
|
originRespEndpoint(w, http.StatusOK, []byte(http.StatusText(http.StatusOK)))
|
|
|
|
case "/large_file":
|
|
|
|
originRespEndpoint(w, http.StatusOK, testLargeResp)
|
|
|
|
case "/400":
|
|
|
|
originRespEndpoint(w, http.StatusBadRequest, []byte(http.StatusText(http.StatusBadRequest)))
|
|
|
|
case "/500":
|
|
|
|
originRespEndpoint(w, http.StatusInternalServerError, []byte(http.StatusText(http.StatusInternalServerError)))
|
|
|
|
case "/error":
|
|
|
|
return fmt.Errorf("Failed to proxy to origin")
|
|
|
|
default:
|
|
|
|
originRespEndpoint(w, http.StatusNotFound, []byte("page not found"))
|
|
|
|
}
|
|
|
|
return nil
|
2021-07-16 15:14:37 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func (moc *mockOriginProxy) ProxyTCP(
|
|
|
|
ctx context.Context,
|
|
|
|
rwa ReadWriteAcker,
|
|
|
|
r *TCPRequest,
|
|
|
|
) error {
|
|
|
|
return nil
|
2020-10-27 22:27:15 +00:00
|
|
|
}
|
|
|
|
|
2021-10-19 19:01:17 +00:00
|
|
|
type echoPipe struct {
|
|
|
|
reader *io.PipeReader
|
|
|
|
writer *io.PipeWriter
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ep *echoPipe) Read(p []byte) (int, error) {
|
|
|
|
return ep.reader.Read(p)
|
2020-10-27 22:27:15 +00:00
|
|
|
}
|
|
|
|
|
2021-10-19 19:01:17 +00:00
|
|
|
func (ep *echoPipe) Write(p []byte) (int, error) {
|
|
|
|
return ep.writer.Write(p)
|
2020-10-27 22:27:15 +00:00
|
|
|
}
|
|
|
|
|
2021-10-19 19:01:17 +00:00
|
|
|
// A mock origin that echos data by streaming like a tcpOverWSConnection
|
|
|
|
// https://github.com/cloudflare/cloudflared/blob/master/ingress/origin_connection.go
|
|
|
|
func wsEchoEndpoint(w ResponseWriter, r *http.Request) error {
|
2020-10-27 22:27:15 +00:00
|
|
|
resp := &http.Response{
|
|
|
|
StatusCode: http.StatusSwitchingProtocols,
|
|
|
|
}
|
2021-10-19 19:01:17 +00:00
|
|
|
if err := w.WriteRespHeaders(resp.StatusCode, resp.Header); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
wsCtx, cancel := context.WithCancel(r.Context())
|
|
|
|
readPipe, writePipe := io.Pipe()
|
|
|
|
wsConn := websocket.NewConn(wsCtx, NewHTTPResponseReadWriterAcker(w, r), &log)
|
2020-10-27 22:27:15 +00:00
|
|
|
go func() {
|
2021-10-19 19:01:17 +00:00
|
|
|
select {
|
|
|
|
case <-wsCtx.Done():
|
|
|
|
case <-r.Context().Done():
|
2020-10-27 22:27:15 +00:00
|
|
|
}
|
2021-10-19 19:01:17 +00:00
|
|
|
readPipe.Close()
|
|
|
|
writePipe.Close()
|
2020-10-27 22:27:15 +00:00
|
|
|
}()
|
2021-10-19 19:01:17 +00:00
|
|
|
|
|
|
|
originConn := &echoPipe{reader: readPipe, writer: writePipe}
|
|
|
|
websocket.Stream(wsConn, originConn, &log)
|
|
|
|
cancel()
|
|
|
|
wsConn.Close()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type flakyConn struct {
|
|
|
|
closeAt time.Time
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fc *flakyConn) Read(p []byte) (int, error) {
|
|
|
|
if time.Now().After(fc.closeAt) {
|
|
|
|
return 0, io.EOF
|
|
|
|
}
|
|
|
|
n := copy(p, "Read from flaky connection")
|
|
|
|
return n, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fc *flakyConn) Write(p []byte) (int, error) {
|
|
|
|
if time.Now().After(fc.closeAt) {
|
|
|
|
return 0, fmt.Errorf("flaky connection closed")
|
|
|
|
}
|
|
|
|
return len(p), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func wsFlakyEndpoint(w ResponseWriter, r *http.Request) error {
|
|
|
|
resp := &http.Response{
|
|
|
|
StatusCode: http.StatusSwitchingProtocols,
|
|
|
|
}
|
|
|
|
if err := w.WriteRespHeaders(resp.StatusCode, resp.Header); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
wsCtx, cancel := context.WithCancel(r.Context())
|
|
|
|
|
|
|
|
wsConn := websocket.NewConn(wsCtx, NewHTTPResponseReadWriterAcker(w, r), &log)
|
|
|
|
|
|
|
|
closedAfter := time.Millisecond * time.Duration(rand.Intn(50))
|
|
|
|
originConn := &flakyConn{closeAt: time.Now().Add(closedAfter)}
|
|
|
|
websocket.Stream(wsConn, originConn, &log)
|
|
|
|
cancel()
|
|
|
|
wsConn.Close()
|
2020-10-27 22:27:15 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func originRespEndpoint(w ResponseWriter, status int, data []byte) {
|
|
|
|
resp := &http.Response{
|
|
|
|
StatusCode: status,
|
|
|
|
}
|
2020-12-09 21:46:53 +00:00
|
|
|
_ = w.WriteRespHeaders(resp.StatusCode, resp.Header)
|
2020-11-25 06:55:13 +00:00
|
|
|
_, _ = w.Write(data)
|
2020-10-27 22:27:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type mockConnectedFuse struct{}
|
|
|
|
|
|
|
|
func (mcf mockConnectedFuse) Connected() {}
|
|
|
|
|
|
|
|
func (mcf mockConnectedFuse) IsConnected() bool {
|
|
|
|
return true
|
|
|
|
}
|
2020-11-18 11:53:59 +00:00
|
|
|
|
|
|
|
func TestIsEventStream(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
headers http.Header
|
|
|
|
isEventStream bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
headers: newHeader("Content-Type", "text/event-stream"),
|
|
|
|
isEventStream: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
headers: newHeader("content-type", "text/event-stream"),
|
|
|
|
isEventStream: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
headers: newHeader("Content-Type", "text/event-stream; charset=utf-8"),
|
|
|
|
isEventStream: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
headers: newHeader("Content-Type", "application/json"),
|
|
|
|
isEventStream: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
headers: http.Header{},
|
|
|
|
isEventStream: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, test := range tests {
|
|
|
|
assert.Equal(t, test.isEventStream, IsServerSentEvent(test.headers))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func newHeader(key, value string) http.Header {
|
|
|
|
header := http.Header{}
|
|
|
|
header.Add(key, value)
|
|
|
|
return header
|
|
|
|
}
|