Merge branch 'cloudflare:master' into master
This commit is contained in:
commit
79f0d3f0ba
10
CHANGES.md
10
CHANGES.md
|
@ -1,5 +1,15 @@
|
||||||
**Experimental**: This is a new format for release notes. The format and availability is subject to change.
|
**Experimental**: This is a new format for release notes. The format and availability is subject to change.
|
||||||
|
|
||||||
|
## 2021.6.0
|
||||||
|
### Bug Fixes
|
||||||
|
- Fixes a http2 transport (the new default for Named Tunnels) to work with unix socket origins.
|
||||||
|
|
||||||
|
|
||||||
|
## 2021.5.10
|
||||||
|
### Bug Fixes
|
||||||
|
- Fixes a memory leak in h2mux transport that connects cloudflared to Cloudflare edge.
|
||||||
|
|
||||||
|
|
||||||
## 2021.5.9
|
## 2021.5.9
|
||||||
### New Features
|
### New Features
|
||||||
- Uses new Worker based login helper service to facilitate token exchange in cloudflared flows.
|
- Uses new Worker based login helper service to facilitate token exchange in cloudflared flows.
|
||||||
|
|
|
@ -1,3 +1,10 @@
|
||||||
|
2021.6.0
|
||||||
|
- 2021-06-21 TUN-4571: Changelog for 2021.6.0
|
||||||
|
- 2021-06-18 TUN-4571: Fix proxying to unix sockets when using HTTP2 transport to Cloudflare Edge
|
||||||
|
- 2021-06-07 TUN-4502: Make `cloudflared tunnel route` subcommands described consistently
|
||||||
|
- 2021-06-08 TUN-4504: Fix component tests in windows
|
||||||
|
- 2021-05-27 TUN-4461: Log resulting DNS hostname if one is received from Cloudflare API
|
||||||
|
|
||||||
2021.5.10
|
2021.5.10
|
||||||
- 2021-05-25 TUN-4456: Replaced instances of Tick() with Ticker() in h2mux paths
|
- 2021-05-25 TUN-4456: Replaced instances of Tick() with Ticker() in h2mux paths
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,9 @@
|
||||||
#!/usr/bin/env python
|
#!/usr/bin/env python
|
||||||
import copy
|
import copy
|
||||||
|
import platform
|
||||||
from time import sleep
|
from time import sleep
|
||||||
|
|
||||||
|
import pytest
|
||||||
from flaky import flaky
|
from flaky import flaky
|
||||||
|
|
||||||
from util import start_cloudflared, wait_tunnel_ready, check_tunnel_not_connected
|
from util import start_cloudflared, wait_tunnel_ready, check_tunnel_not_connected
|
||||||
|
@ -15,6 +17,7 @@ class TestReconnect:
|
||||||
"stdin-control": True,
|
"stdin-control": True,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@pytest.mark.skipif(platform.system() == "Windows", reason=f"Currently buggy on Windows TUN-4584")
|
||||||
def test_named_reconnect(self, tmp_path, component_tests_config):
|
def test_named_reconnect(self, tmp_path, component_tests_config):
|
||||||
config = component_tests_config(self.extra_config)
|
config = component_tests_config(self.extra_config)
|
||||||
with start_cloudflared(tmp_path, config, new_process=True, allow_input=True, capture_output=False) as cloudflared:
|
with start_cloudflared(tmp_path, config, new_process=True, allow_input=True, capture_output=False) as cloudflared:
|
||||||
|
|
|
@ -98,6 +98,8 @@ func (c *http2Connection) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
defer c.activeRequestsWG.Done()
|
defer c.activeRequestsWG.Done()
|
||||||
|
|
||||||
connType := determineHTTP2Type(r)
|
connType := determineHTTP2Type(r)
|
||||||
|
handleMissingRequestParts(connType, r)
|
||||||
|
|
||||||
respWriter, err := newHTTP2RespWriter(r, w, connType)
|
respWriter, err := newHTTP2RespWriter(r, w, connType)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.observer.log.Error().Msg(err.Error())
|
c.observer.log.Error().Msg(err.Error())
|
||||||
|
@ -255,6 +257,20 @@ func determineHTTP2Type(r *http.Request) Type {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func handleMissingRequestParts(connType Type, r *http.Request) {
|
||||||
|
if connType == TypeHTTP {
|
||||||
|
// http library has no guarantees that we receive a filled URL. If not, then we fill it, as we reuse the request
|
||||||
|
// for proxying. We use the same values as we used to in h2mux. For proxying they should not matter since we
|
||||||
|
// control the dialer on every egress proxied.
|
||||||
|
if len(r.URL.Scheme) == 0 {
|
||||||
|
r.URL.Scheme = "http"
|
||||||
|
}
|
||||||
|
if len(r.URL.Host) == 0 {
|
||||||
|
r.URL.Host = "localhost:8080"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func isControlStreamUpgrade(r *http.Request) bool {
|
func isControlStreamUpgrade(r *http.Request) bool {
|
||||||
return r.Header.Get(InternalUpgradeHeader) == ControlStreamUpgrade
|
return r.Header.Get(InternalUpgradeHeader) == ControlStreamUpgrade
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,9 +6,11 @@ import (
|
||||||
"flag"
|
"flag"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
|
"os"
|
||||||
"sync"
|
"sync"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
@ -273,26 +275,7 @@ func TestProxyMultipleOrigins(t *testing.T) {
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
ingress, err := ingress.ParseIngress(&config.Configuration{
|
tests := []MultipleIngressTest{
|
||||||
TunnelID: t.Name(),
|
|
||||||
Ingress: unvalidatedIngress,
|
|
||||||
})
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
log := zerolog.Nop()
|
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
|
||||||
errC := make(chan error)
|
|
||||||
var wg sync.WaitGroup
|
|
||||||
require.NoError(t, ingress.StartOrigins(&wg, &log, ctx.Done(), errC))
|
|
||||||
|
|
||||||
proxy := NewOriginProxy(ingress, unusedWarpRoutingService, testTags, &log)
|
|
||||||
|
|
||||||
tests := []struct {
|
|
||||||
url string
|
|
||||||
expectedStatus int
|
|
||||||
expectedBody []byte
|
|
||||||
}{
|
|
||||||
{
|
{
|
||||||
url: "http://api.example.com",
|
url: "http://api.example.com",
|
||||||
expectedStatus: http.StatusCreated,
|
expectedStatus: http.StatusCreated,
|
||||||
|
@ -317,6 +300,31 @@ func TestProxyMultipleOrigins(t *testing.T) {
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
runIngressTestScenarios(t, unvalidatedIngress, tests)
|
||||||
|
}
|
||||||
|
|
||||||
|
type MultipleIngressTest struct {
|
||||||
|
url string
|
||||||
|
expectedStatus int
|
||||||
|
expectedBody []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func runIngressTestScenarios(t *testing.T, unvalidatedIngress []config.UnvalidatedIngressRule, tests []MultipleIngressTest) {
|
||||||
|
ingress, err := ingress.ParseIngress(&config.Configuration{
|
||||||
|
TunnelID: t.Name(),
|
||||||
|
Ingress: unvalidatedIngress,
|
||||||
|
})
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
log := zerolog.Nop()
|
||||||
|
|
||||||
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
errC := make(chan error)
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
require.NoError(t, ingress.StartOrigins(&wg, &log, ctx.Done(), errC))
|
||||||
|
|
||||||
|
proxy := NewOriginProxy(ingress, unusedWarpRoutingService, testTags, &log)
|
||||||
|
|
||||||
for _, test := range tests {
|
for _, test := range tests {
|
||||||
responseWriter := newMockHTTPRespWriter()
|
responseWriter := newMockHTTPRespWriter()
|
||||||
req, err := http.NewRequest(http.MethodGet, test.url, nil)
|
req, err := http.NewRequest(http.MethodGet, test.url, nil)
|
||||||
|
@ -633,6 +641,45 @@ func TestConnections(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestUnixSocketOrigin(t *testing.T) {
|
||||||
|
file, err := ioutil.TempFile("", "unix.sock")
|
||||||
|
require.NoError(t, err)
|
||||||
|
os.Remove(file.Name()) // remove the file since binding the socket expects to create it
|
||||||
|
|
||||||
|
l, err := net.Listen("unix", file.Name())
|
||||||
|
require.NoError(t, err)
|
||||||
|
defer l.Close()
|
||||||
|
defer os.Remove(file.Name())
|
||||||
|
|
||||||
|
api := &httptest.Server{
|
||||||
|
Listener: l,
|
||||||
|
Config: &http.Server{Handler: mockAPI{}},
|
||||||
|
}
|
||||||
|
api.Start()
|
||||||
|
defer api.Close()
|
||||||
|
|
||||||
|
unvalidatedIngress := []config.UnvalidatedIngressRule{
|
||||||
|
{
|
||||||
|
Hostname: "unix.example.com",
|
||||||
|
Service: "unix:" + file.Name(),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Hostname: "*",
|
||||||
|
Service: "http_status:404",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
tests := []MultipleIngressTest{
|
||||||
|
{
|
||||||
|
url: "http://unix.example.com",
|
||||||
|
expectedStatus: http.StatusCreated,
|
||||||
|
expectedBody: []byte("Created"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
runIngressTestScenarios(t, unvalidatedIngress, tests)
|
||||||
|
}
|
||||||
|
|
||||||
type requestBody struct {
|
type requestBody struct {
|
||||||
pw *io.PipeWriter
|
pw *io.PipeWriter
|
||||||
pr *io.PipeReader
|
pr *io.PipeReader
|
||||||
|
|
|
@ -278,7 +278,7 @@ func GetAppInfo(reqURL *url.URL) (*AppInfo, error) {
|
||||||
// 403/401 from the edge will have aud in a header
|
// 403/401 from the edge will have aud in a header
|
||||||
aud = audHeader
|
aud = audHeader
|
||||||
} else {
|
} else {
|
||||||
return nil, fmt.Errorf("failed to get Access app info for %s", reqURL.String())
|
return nil, fmt.Errorf("failed to find Access application at %s", reqURL.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
domain := resp.Header.Get(appDomainHeader)
|
domain := resp.Header.Get(appDomainHeader)
|
||||||
|
|
Loading…
Reference in New Issue