2018-05-19 17:47:30 +00:00
|
|
|
package proxy
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-03-26 11:34:47 +00:00
|
|
|
"crypto/tls"
|
2018-05-19 17:47:30 +00:00
|
|
|
"net"
|
|
|
|
"testing"
|
|
|
|
|
2020-11-11 18:15:33 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2018-08-27 15:45:07 +00:00
|
|
|
|
2018-05-19 17:47:30 +00:00
|
|
|
"github.com/hashicorp/consul/agent"
|
|
|
|
agConnect "github.com/hashicorp/consul/agent/connect"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
|
|
"github.com/hashicorp/consul/connect"
|
2019-03-27 12:54:56 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/freeport"
|
2020-01-28 23:50:41 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil"
|
2019-03-27 12:54:56 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil/retry"
|
2020-11-11 18:15:33 +00:00
|
|
|
"github.com/hashicorp/consul/testrpc"
|
2018-05-19 17:47:30 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestProxy_public(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-05-19 17:47:30 +00:00
|
|
|
require := require.New(t)
|
2019-08-27 21:16:41 +00:00
|
|
|
|
|
|
|
ports := freeport.MustTake(1)
|
|
|
|
defer freeport.Return(ports)
|
2018-05-19 17:47:30 +00:00
|
|
|
|
2020-03-31 19:59:56 +00:00
|
|
|
a := agent.NewTestAgent(t, "")
|
2018-05-19 17:47:30 +00:00
|
|
|
defer a.Shutdown()
|
2018-09-04 11:31:51 +00:00
|
|
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1")
|
2018-05-19 17:47:30 +00:00
|
|
|
client := a.Client()
|
|
|
|
|
|
|
|
// Register the service so we can get a leaf cert
|
|
|
|
_, err := client.Catalog().Register(&api.CatalogRegistration{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Node: "local",
|
|
|
|
Address: "127.0.0.1",
|
|
|
|
Service: &api.AgentService{
|
|
|
|
Service: "echo",
|
|
|
|
},
|
|
|
|
}, nil)
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start the backend service that is being proxied
|
|
|
|
testApp := NewTestTCPServer(t)
|
|
|
|
defer testApp.Close()
|
|
|
|
|
|
|
|
// Start the proxy
|
|
|
|
p, err := New(client, NewStaticConfigWatcher(&Config{
|
|
|
|
ProxiedServiceName: "echo",
|
|
|
|
PublicListener: PublicListenerConfig{
|
|
|
|
BindAddress: "127.0.0.1",
|
|
|
|
BindPort: ports[0],
|
|
|
|
LocalServiceAddress: testApp.Addr().String(),
|
|
|
|
},
|
2020-01-28 23:50:41 +00:00
|
|
|
}), testutil.Logger(t))
|
2018-05-19 17:47:30 +00:00
|
|
|
require.NoError(err)
|
|
|
|
defer p.Close()
|
|
|
|
go p.Serve()
|
|
|
|
|
2021-03-26 11:34:47 +00:00
|
|
|
// We create this client with an explicit ServerNextProtos here which will use `h2`
|
|
|
|
// if the proxy supports it. This is so we can verify below that the proxy _doesn't_
|
|
|
|
// advertise `h2` support as it's only a L4 proxy.
|
|
|
|
svc, err := connect.NewServiceWithConfig("echo", connect.Config{Client: client, ServerNextProtos: []string{"h2"}})
|
|
|
|
require.NoError(err)
|
|
|
|
|
2018-05-19 17:47:30 +00:00
|
|
|
// Create a test connection to the proxy. We retry here a few times
|
|
|
|
// since this is dependent on the agent actually starting up and setting
|
|
|
|
// up the CA.
|
|
|
|
var conn net.Conn
|
|
|
|
retry.Run(t, func(r *retry.R) {
|
|
|
|
conn, err = svc.Dial(context.Background(), &connect.StaticResolver{
|
|
|
|
Addr: TestLocalAddr(ports[0]),
|
|
|
|
CertURI: agConnect.TestSpiffeIDService(t, "echo"),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
r.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2021-03-26 11:34:47 +00:00
|
|
|
// Verify that we did not select h2 via ALPN since the proxy is layer 4 only
|
|
|
|
tlsConn := conn.(*tls.Conn)
|
|
|
|
require.Equal("", tlsConn.ConnectionState().NegotiatedProtocol)
|
|
|
|
|
2018-05-19 17:47:30 +00:00
|
|
|
// Connection works, test it is the right one
|
|
|
|
TestEchoConn(t, conn, "")
|
|
|
|
}
|