1285 lines
45 KiB
Go
1285 lines
45 KiB
Go
package integration
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/BurntSushi/toml"
|
|
"github.com/go-check/check"
|
|
"github.com/traefik/traefik/v2/integration/try"
|
|
"github.com/traefik/traefik/v2/pkg/config/dynamic"
|
|
traefiktls "github.com/traefik/traefik/v2/pkg/tls"
|
|
checker "github.com/vdemeester/shakers"
|
|
)
|
|
|
|
// HTTPSSuite tests suite.
|
|
type HTTPSSuite struct{ BaseSuite }
|
|
|
|
// TestWithSNIConfigHandshake involves a client sending a SNI hostname of
|
|
// "snitest.com", which happens to match the CN of 'snitest.com.crt'. The test
|
|
// verifies that traefik presents the correct certificate.
|
|
func (s *HTTPSSuite) TestWithSNIConfigHandshake(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_sni.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.org`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
defer conn.Close()
|
|
err = conn.Handshake()
|
|
c.Assert(err, checker.IsNil, check.Commentf("TLS handshake error"))
|
|
|
|
cs := conn.ConnectionState()
|
|
err = cs.PeerCertificates[0].VerifyHostname("snitest.com")
|
|
c.Assert(err, checker.IsNil, check.Commentf("certificate did not match SNI servername"))
|
|
|
|
proto := conn.ConnectionState().NegotiatedProtocol
|
|
c.Assert(proto, checker.Equals, "h2")
|
|
}
|
|
|
|
// TestWithSNIConfigRoute involves a client sending HTTPS requests with
|
|
// SNI hostnames of "snitest.org" and "snitest.com". The test verifies
|
|
// that traefik routes the requests to the expected backends.
|
|
func (s *HTTPSSuite) TestWithSNIConfigRoute(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_sni.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`snitest.org`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
backend1 := startTestServer("9010", http.StatusNoContent, "")
|
|
backend2 := startTestServer("9020", http.StatusResetContent, "")
|
|
defer backend1.Close()
|
|
defer backend2.Close()
|
|
|
|
err = try.GetRequest(backend1.URL, 1*time.Second, try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
err = try.GetRequest(backend2.URL, 1*time.Second, try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tr1 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
},
|
|
}
|
|
tr2 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.org",
|
|
},
|
|
}
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr1.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr1.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr1, try.HasCn(tr1.TLSClientConfig.ServerName), try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
req, err = http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr2.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr2.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr2, try.HasCn(tr2.TLSClientConfig.ServerName), try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
// TestWithTLSOptions verifies that traefik routes the requests with the associated tls options.
|
|
func (s *HTTPSSuite) TestWithTLSOptions(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_tls_options.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`snitest.org`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
backend1 := startTestServer("9010", http.StatusNoContent, "")
|
|
backend2 := startTestServer("9020", http.StatusResetContent, "")
|
|
defer backend1.Close()
|
|
defer backend2.Close()
|
|
|
|
err = try.GetRequest(backend1.URL, 1*time.Second, try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
err = try.GetRequest(backend2.URL, 1*time.Second, try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tr1 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
MaxVersion: tls.VersionTLS12,
|
|
ServerName: "snitest.com",
|
|
},
|
|
}
|
|
|
|
tr2 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
MaxVersion: tls.VersionTLS12,
|
|
ServerName: "snitest.org",
|
|
},
|
|
}
|
|
|
|
tr3 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
MaxVersion: tls.VersionTLS11,
|
|
ServerName: "snitest.org",
|
|
},
|
|
}
|
|
|
|
// With valid TLS options and request
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr1.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr1.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr1, try.HasCn(tr1.TLSClientConfig.ServerName), try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// With a valid TLS version
|
|
req, err = http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr2.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr2.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 3*time.Second, tr2, try.HasCn(tr2.TLSClientConfig.ServerName), try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// With a bad TLS version
|
|
req, err = http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr3.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr3.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
client := http.Client{
|
|
Transport: tr3,
|
|
}
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.NotNil)
|
|
c.Assert(err.Error(), checker.Contains, "tls: no supported versions satisfy MinVersion and MaxVersion")
|
|
|
|
// with unknown tls option
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("unknown TLS options: unknown@file"))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
// TestWithConflictingTLSOptions checks that routers with same SNI but different TLS options get fallbacked to the default TLS options.
|
|
func (s *HTTPSSuite) TestWithConflictingTLSOptions(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_tls_options.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`snitest.net`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
backend1 := startTestServer("9010", http.StatusNoContent, "")
|
|
backend2 := startTestServer("9020", http.StatusResetContent, "")
|
|
defer backend1.Close()
|
|
defer backend2.Close()
|
|
|
|
err = try.GetRequest(backend1.URL, 1*time.Second, try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
err = try.GetRequest(backend2.URL, 1*time.Second, try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tr4 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
MaxVersion: tls.VersionTLS11,
|
|
ServerName: "snitest.net",
|
|
},
|
|
}
|
|
|
|
trDefault := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
MaxVersion: tls.VersionTLS12,
|
|
ServerName: "snitest.net",
|
|
},
|
|
}
|
|
|
|
// With valid TLS options and request
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = trDefault.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", trDefault.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, trDefault, try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// With a bad TLS version
|
|
req, err = http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr4.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr4.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
client := http.Client{
|
|
Transport: tr4,
|
|
}
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.NotNil)
|
|
c.Assert(err.Error(), checker.Contains, "tls: no supported versions satisfy MinVersion and MaxVersion")
|
|
|
|
// with unknown tls option
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains(fmt.Sprintf("found different TLS options for routers on the same host %v, so using the default TLS options instead", tr4.TLSClientConfig.ServerName)))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
// TestWithSNIStrictNotMatchedRequest involves a client sending a SNI hostname of
|
|
// "snitest.org", which does not match the CN of 'snitest.com.crt'. The test
|
|
// verifies that traefik closes the connection.
|
|
func (s *HTTPSSuite) TestWithSNIStrictNotMatchedRequest(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_sni_strict.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.org",
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
// Connection with no matching certificate should fail
|
|
_, err = tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.NotNil, check.Commentf("failed to connect to server"))
|
|
}
|
|
|
|
// TestWithDefaultCertificate involves a client sending a SNI hostname of
|
|
// "snitest.org", which does not match the CN of 'snitest.com.crt'. The test
|
|
// verifies that traefik returns the default certificate.
|
|
func (s *HTTPSSuite) TestWithDefaultCertificate(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_sni_default_cert.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.org",
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
defer conn.Close()
|
|
err = conn.Handshake()
|
|
c.Assert(err, checker.IsNil, check.Commentf("TLS handshake error"))
|
|
|
|
cs := conn.ConnectionState()
|
|
err = cs.PeerCertificates[0].VerifyHostname("snitest.com")
|
|
c.Assert(err, checker.IsNil, check.Commentf("server did not serve correct default certificate"))
|
|
|
|
proto := cs.NegotiatedProtocol
|
|
c.Assert(proto, checker.Equals, "h2")
|
|
}
|
|
|
|
// TestWithDefaultCertificateNoSNI involves a client sending a request with no ServerName
|
|
// which does not match the CN of 'snitest.com.crt'. The test
|
|
// verifies that traefik returns the default certificate.
|
|
func (s *HTTPSSuite) TestWithDefaultCertificateNoSNI(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_sni_default_cert.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
defer conn.Close()
|
|
err = conn.Handshake()
|
|
c.Assert(err, checker.IsNil, check.Commentf("TLS handshake error"))
|
|
|
|
cs := conn.ConnectionState()
|
|
err = cs.PeerCertificates[0].VerifyHostname("snitest.com")
|
|
c.Assert(err, checker.IsNil, check.Commentf("server did not serve correct default certificate"))
|
|
|
|
proto := cs.NegotiatedProtocol
|
|
c.Assert(proto, checker.Equals, "h2")
|
|
}
|
|
|
|
// TestWithOverlappingCertificate involves a client sending a SNI hostname of
|
|
// "www.snitest.com", which matches the CN of two static certificates:
|
|
// 'wildcard.snitest.com.crt', and `www.snitest.com.crt`. The test
|
|
// verifies that traefik returns the non-wildcard certificate.
|
|
func (s *HTTPSSuite) TestWithOverlappingStaticCertificate(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_sni_default_cert.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "www.snitest.com",
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
defer conn.Close()
|
|
err = conn.Handshake()
|
|
c.Assert(err, checker.IsNil, check.Commentf("TLS handshake error"))
|
|
|
|
cs := conn.ConnectionState()
|
|
err = cs.PeerCertificates[0].VerifyHostname("www.snitest.com")
|
|
c.Assert(err, checker.IsNil, check.Commentf("server did not serve correct default certificate"))
|
|
|
|
proto := cs.NegotiatedProtocol
|
|
c.Assert(proto, checker.Equals, "h2")
|
|
}
|
|
|
|
// TestWithOverlappingCertificate involves a client sending a SNI hostname of
|
|
// "www.snitest.com", which matches the CN of two dynamic certificates:
|
|
// 'wildcard.snitest.com.crt', and `www.snitest.com.crt`. The test
|
|
// verifies that traefik returns the non-wildcard certificate.
|
|
func (s *HTTPSSuite) TestWithOverlappingDynamicCertificate(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/dynamic_https_sni_default_cert.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "www.snitest.com",
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
defer conn.Close()
|
|
err = conn.Handshake()
|
|
c.Assert(err, checker.IsNil, check.Commentf("TLS handshake error"))
|
|
|
|
cs := conn.ConnectionState()
|
|
err = cs.PeerCertificates[0].VerifyHostname("www.snitest.com")
|
|
c.Assert(err, checker.IsNil, check.Commentf("server did not serve correct default certificate"))
|
|
|
|
proto := cs.NegotiatedProtocol
|
|
c.Assert(proto, checker.Equals, "h2")
|
|
}
|
|
|
|
// TestWithClientCertificateAuthentication
|
|
// The client can send a certificate signed by a CA trusted by the server but it's optional.
|
|
func (s *HTTPSSuite) TestWithClientCertificateAuthentication(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/clientca/https_1ca1config.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.org`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
// Connection without client certificate should fail
|
|
_, err = tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("should be allowed to connect to server"))
|
|
|
|
// Connect with client certificate signed by ca1
|
|
cert, err := tls.LoadX509KeyPair("fixtures/https/clientca/client1.crt", "fixtures/https/clientca/client1.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
conn.Close()
|
|
|
|
// Connect with client certificate not signed by ca1
|
|
cert, err = tls.LoadX509KeyPair("fixtures/https/snitest.org.cert", "fixtures/https/snitest.org.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
conn, err = tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
conn.Close()
|
|
|
|
// Connect with client signed by ca2 should fail
|
|
tlsConfig = &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
cert, err = tls.LoadX509KeyPair("fixtures/https/clientca/client2.crt", "fixtures/https/clientca/client2.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
_, err = tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("should be allowed to connect to server"))
|
|
}
|
|
|
|
// TestWithClientCertificateAuthentication
|
|
// Use two CA:s and test that clients with client signed by either of them can connect.
|
|
func (s *HTTPSSuite) TestWithClientCertificateAuthenticationMultipleCAs(c *check.C) {
|
|
server1 := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, _ *http.Request) { _, _ = rw.Write([]byte("server1")) }))
|
|
server2 := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, _ *http.Request) { _, _ = rw.Write([]byte("server2")) }))
|
|
defer func() {
|
|
server1.Close()
|
|
server2.Close()
|
|
}()
|
|
|
|
file := s.adaptFile(c, "fixtures/https/clientca/https_2ca1config.toml", struct {
|
|
Server1 string
|
|
Server2 string
|
|
}{
|
|
Server1: server1.URL,
|
|
Server2: server2.URL,
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`snitest.org`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = "snitest.com"
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
|
|
client := http.Client{
|
|
Transport: &http.Transport{TLSClientConfig: tlsConfig},
|
|
Timeout: 1 * time.Second,
|
|
}
|
|
|
|
// Connection without client certificate should fail
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.NotNil)
|
|
|
|
cert, err := tls.LoadX509KeyPair("fixtures/https/clientca/client1.crt", "fixtures/https/clientca/client1.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
// Connect with client signed by ca1
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// Connect with client signed by ca2
|
|
tlsConfig = &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
|
|
cert, err = tls.LoadX509KeyPair("fixtures/https/clientca/client2.crt", "fixtures/https/clientca/client2.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
client = http.Client{
|
|
Transport: &http.Transport{TLSClientConfig: tlsConfig},
|
|
Timeout: 1 * time.Second,
|
|
}
|
|
|
|
// Connect with client signed by ca1
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// Connect with client signed by ca3 should fail
|
|
tlsConfig = &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
|
|
cert, err = tls.LoadX509KeyPair("fixtures/https/clientca/client3.crt", "fixtures/https/clientca/client3.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
client = http.Client{
|
|
Transport: &http.Transport{TLSClientConfig: tlsConfig},
|
|
Timeout: 1 * time.Second,
|
|
}
|
|
|
|
// Connect with client signed by ca1
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.NotNil)
|
|
}
|
|
|
|
// TestWithClientCertificateAuthentication
|
|
// Use two CA:s in two different files and test that clients with client signed by either of them can connect.
|
|
func (s *HTTPSSuite) TestWithClientCertificateAuthenticationMultipleCAsMultipleFiles(c *check.C) {
|
|
server1 := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, _ *http.Request) { _, _ = rw.Write([]byte("server1")) }))
|
|
server2 := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, _ *http.Request) { _, _ = rw.Write([]byte("server2")) }))
|
|
defer func() {
|
|
server1.Close()
|
|
server2.Close()
|
|
}()
|
|
|
|
file := s.adaptFile(c, "fixtures/https/clientca/https_2ca2config.toml", struct {
|
|
Server1 string
|
|
Server2 string
|
|
}{
|
|
Server1: server1.URL,
|
|
Server2: server2.URL,
|
|
})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`snitest.org`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = "snitest.com"
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
|
|
client := http.Client{
|
|
Transport: &http.Transport{TLSClientConfig: tlsConfig},
|
|
Timeout: 1 * time.Second,
|
|
}
|
|
|
|
// Connection without client certificate should fail
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.NotNil)
|
|
|
|
// Connect with client signed by ca1
|
|
cert, err := tls.LoadX509KeyPair("fixtures/https/clientca/client1.crt", "fixtures/https/clientca/client1.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// Connect with client signed by ca2
|
|
tlsConfig = &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
|
|
cert, err = tls.LoadX509KeyPair("fixtures/https/clientca/client2.crt", "fixtures/https/clientca/client2.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
client = http.Client{
|
|
Transport: &http.Transport{TLSClientConfig: tlsConfig},
|
|
Timeout: 1 * time.Second,
|
|
}
|
|
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// Connect with client signed by ca3 should fail
|
|
tlsConfig = &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
Certificates: []tls.Certificate{},
|
|
}
|
|
|
|
cert, err = tls.LoadX509KeyPair("fixtures/https/clientca/client3.crt", "fixtures/https/clientca/client3.key")
|
|
c.Assert(err, checker.IsNil, check.Commentf("unable to load client certificate and key"))
|
|
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
|
|
|
|
client = http.Client{
|
|
Transport: &http.Transport{TLSClientConfig: tlsConfig},
|
|
Timeout: 1 * time.Second,
|
|
}
|
|
|
|
_, err = client.Do(req)
|
|
c.Assert(err, checker.NotNil)
|
|
}
|
|
|
|
func (s *HTTPSSuite) TestWithRootCAsContentForHTTPSOnBackend(c *check.C) {
|
|
backend := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
}))
|
|
defer backend.Close()
|
|
|
|
file := s.adaptFile(c, "fixtures/https/rootcas/https.toml", struct{ BackendHost string }{backend.URL})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains(backend.URL))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8081/ping", 1*time.Second, try.StatusCodeIs(http.StatusOK))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
func (s *HTTPSSuite) TestWithRootCAsFileForHTTPSOnBackend(c *check.C) {
|
|
backend := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
}))
|
|
defer backend.Close()
|
|
|
|
file := s.adaptFile(c, "fixtures/https/rootcas/https_with_file.toml", struct{ BackendHost string }{backend.URL})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains(backend.URL))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8081/ping", 1*time.Second, try.StatusCodeIs(http.StatusOK))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
func startTestServer(port string, statusCode int, textContent string) (ts *httptest.Server) {
|
|
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(statusCode)
|
|
if textContent != "" {
|
|
_, _ = w.Write([]byte(textContent))
|
|
}
|
|
})
|
|
listener, err := net.Listen("tcp", "127.0.0.1:"+port)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
ts = &httptest.Server{
|
|
Listener: listener,
|
|
Config: &http.Server{Handler: handler},
|
|
}
|
|
ts.Start()
|
|
return ts
|
|
}
|
|
|
|
// TestWithSNIDynamicConfigRouteWithNoChange involves a client sending HTTPS requests with
|
|
// SNI hostnames of "snitest.org" and "snitest.com". The test verifies
|
|
// that traefik routes the requests to the expected backends thanks to given certificate if possible
|
|
// otherwise thanks to the default one.
|
|
func (s *HTTPSSuite) TestWithSNIDynamicConfigRouteWithNoChange(c *check.C) {
|
|
dynamicConfFileName := s.adaptFile(c, "fixtures/https/dynamic_https.toml", struct{}{})
|
|
defer os.Remove(dynamicConfFileName)
|
|
confFileName := s.adaptFile(c, "fixtures/https/dynamic_https_sni.toml", struct {
|
|
DynamicConfFileName string
|
|
}{
|
|
DynamicConfFileName: dynamicConfFileName,
|
|
})
|
|
defer os.Remove(confFileName)
|
|
cmd, display := s.traefikCmd(withConfigFile(confFileName))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
tr1 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.org",
|
|
},
|
|
}
|
|
|
|
tr2 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
},
|
|
}
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`"+tr1.TLSClientConfig.ServerName+"`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
backend1 := startTestServer("9010", http.StatusNoContent, "")
|
|
backend2 := startTestServer("9020", http.StatusResetContent, "")
|
|
defer backend1.Close()
|
|
defer backend2.Close()
|
|
|
|
err = try.GetRequest(backend1.URL, 500*time.Millisecond, try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
err = try.GetRequest(backend2.URL, 500*time.Millisecond, try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr1.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr1.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
// snitest.org certificate must be used yet && Expected a 204 (from backend1)
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr1, try.HasCn(tr1.TLSClientConfig.ServerName), try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
req, err = http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr2.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr2.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
// snitest.com certificate does not exist, default certificate has to be used && Expected a 205 (from backend2)
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr2, try.HasCn("TRAEFIK DEFAULT CERT"), try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
// TestWithSNIDynamicConfigRouteWithChange involves a client sending HTTPS requests with
|
|
// SNI hostnames of "snitest.org" and "snitest.com". The test verifies
|
|
// that traefik updates its configuration when the HTTPS configuration is modified and
|
|
// it routes the requests to the expected backends thanks to given certificate if possible
|
|
// otherwise thanks to the default one.
|
|
func (s *HTTPSSuite) TestWithSNIDynamicConfigRouteWithChange(c *check.C) {
|
|
dynamicConfFileName := s.adaptFile(c, "fixtures/https/dynamic_https.toml", struct{}{})
|
|
defer os.Remove(dynamicConfFileName)
|
|
confFileName := s.adaptFile(c, "fixtures/https/dynamic_https_sni.toml", struct {
|
|
DynamicConfFileName string
|
|
}{
|
|
DynamicConfFileName: dynamicConfFileName,
|
|
})
|
|
defer os.Remove(confFileName)
|
|
cmd, display := s.traefikCmd(withConfigFile(confFileName))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
tr1 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.com",
|
|
},
|
|
}
|
|
|
|
tr2 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.org",
|
|
},
|
|
}
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`"+tr2.TLSClientConfig.ServerName+"`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
backend1 := startTestServer("9010", http.StatusNoContent, "")
|
|
backend2 := startTestServer("9020", http.StatusResetContent, "")
|
|
defer backend1.Close()
|
|
defer backend2.Close()
|
|
|
|
err = try.GetRequest(backend1.URL, 500*time.Millisecond, try.StatusCodeIs(http.StatusNoContent))
|
|
c.Assert(err, checker.IsNil)
|
|
err = try.GetRequest(backend2.URL, 500*time.Millisecond, try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// Change certificates configuration file content
|
|
modifyCertificateConfFileContent(c, tr1.TLSClientConfig.ServerName, dynamicConfFileName)
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr1.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr1.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr1, try.HasCn(tr1.TLSClientConfig.ServerName), try.StatusCodeIs(http.StatusNotFound))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
req, err = http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr2.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr2.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr2, try.HasCn("TRAEFIK DEFAULT CERT"), try.StatusCodeIs(http.StatusNotFound))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
// TestWithSNIDynamicConfigRouteWithTlsConfigurationDeletion involves a client sending HTTPS requests with
|
|
// SNI hostnames of "snitest.org" and "snitest.com". The test verifies
|
|
// that traefik updates its configuration when the HTTPS configuration is modified, even if it totally deleted, and
|
|
// it routes the requests to the expected backends thanks to given certificate if possible
|
|
// otherwise thanks to the default one.
|
|
func (s *HTTPSSuite) TestWithSNIDynamicConfigRouteWithTlsConfigurationDeletion(c *check.C) {
|
|
dynamicConfFileName := s.adaptFile(c, "fixtures/https/dynamic_https.toml", struct{}{})
|
|
defer os.Remove(dynamicConfFileName)
|
|
confFileName := s.adaptFile(c, "fixtures/https/dynamic_https_sni.toml", struct {
|
|
DynamicConfFileName string
|
|
}{
|
|
DynamicConfFileName: dynamicConfFileName,
|
|
})
|
|
defer os.Remove(confFileName)
|
|
cmd, display := s.traefikCmd(withConfigFile(confFileName))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
tr2 := &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "snitest.org",
|
|
},
|
|
}
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 1*time.Second, try.BodyContains("Host(`"+tr2.TLSClientConfig.ServerName+"`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
backend2 := startTestServer("9020", http.StatusResetContent, "")
|
|
|
|
defer backend2.Close()
|
|
|
|
err = try.GetRequest(backend2.URL, 500*time.Millisecond, try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443/", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = tr2.TLSClientConfig.ServerName
|
|
req.Header.Set("Host", tr2.TLSClientConfig.ServerName)
|
|
req.Header.Set("Accept", "*/*")
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr2, try.HasCn(tr2.TLSClientConfig.ServerName), try.StatusCodeIs(http.StatusResetContent))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// Change certificates configuration file content
|
|
modifyCertificateConfFileContent(c, "", dynamicConfFileName)
|
|
|
|
err = try.RequestWithTransport(req, 30*time.Second, tr2, try.HasCn("TRAEFIK DEFAULT CERT"), try.StatusCodeIs(http.StatusNotFound))
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
|
|
// modifyCertificateConfFileContent replaces the content of a HTTPS configuration file.
|
|
func modifyCertificateConfFileContent(c *check.C, certFileName, confFileName string) {
|
|
file, err := os.OpenFile("./"+confFileName, os.O_WRONLY, os.ModeExclusive)
|
|
c.Assert(err, checker.IsNil)
|
|
defer func() {
|
|
file.Close()
|
|
}()
|
|
err = file.Truncate(0)
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
// If certificate file is not provided, just truncate the configuration file
|
|
if len(certFileName) > 0 {
|
|
tlsConf := dynamic.Configuration{
|
|
TLS: &dynamic.TLSConfiguration{
|
|
Certificates: []*traefiktls.CertAndStores{
|
|
{
|
|
Certificate: traefiktls.Certificate{
|
|
CertFile: traefiktls.FileOrContent("fixtures/https/" + certFileName + ".cert"),
|
|
KeyFile: traefiktls.FileOrContent("fixtures/https/" + certFileName + ".key"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
var confBuffer bytes.Buffer
|
|
err := toml.NewEncoder(&confBuffer).Encode(tlsConf)
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
_, err = file.Write(confBuffer.Bytes())
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
}
|
|
|
|
func (s *HTTPSSuite) TestEntryPointHttpsRedirectAndPathModification(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_redirect.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 5*time.Second, try.BodyContains("Host(`example.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
client := &http.Client{
|
|
CheckRedirect: func(req *http.Request, via []*http.Request) error {
|
|
return http.ErrUseLastResponse
|
|
},
|
|
}
|
|
|
|
testCases := []struct {
|
|
desc string
|
|
hosts []string
|
|
path string
|
|
}{
|
|
{
|
|
desc: "Stripped URL redirect",
|
|
hosts: []string{"example.com", "foo.com", "bar.com"},
|
|
path: "/api",
|
|
},
|
|
{
|
|
desc: "Stripped URL with trailing slash redirect",
|
|
hosts: []string{"example.com", "example2.com", "foo.com", "foo2.com", "bar.com", "bar2.com"},
|
|
path: "/api/",
|
|
},
|
|
{
|
|
desc: "Stripped URL with double trailing slash redirect",
|
|
hosts: []string{"example.com", "example2.com", "foo.com", "foo2.com", "bar.com", "bar2.com"},
|
|
path: "/api//",
|
|
},
|
|
{
|
|
desc: "Stripped URL with path redirect",
|
|
hosts: []string{"example.com", "example2.com", "foo.com", "foo2.com", "bar.com", "bar2.com"},
|
|
path: "/api/bacon",
|
|
},
|
|
{
|
|
desc: "Stripped URL with path and trailing slash redirect",
|
|
hosts: []string{"example.com", "example2.com", "foo.com", "foo2.com", "bar.com", "bar2.com"},
|
|
path: "/api/bacon/",
|
|
},
|
|
{
|
|
desc: "Stripped URL with path and double trailing slash redirect",
|
|
hosts: []string{"example.com", "example2.com", "foo.com", "foo2.com", "bar.com", "bar2.com"},
|
|
path: "/api/bacon//",
|
|
},
|
|
{
|
|
desc: "Root Path with redirect",
|
|
hosts: []string{"test.com", "test2.com", "pow.com", "pow2.com"},
|
|
path: "/",
|
|
},
|
|
{
|
|
desc: "Root Path with double trailing slash redirect",
|
|
hosts: []string{"test.com", "test2.com", "pow.com", "pow2.com"},
|
|
path: "//",
|
|
},
|
|
{
|
|
desc: "Path modify with redirect",
|
|
hosts: []string{"test.com", "test2.com", "pow.com", "pow2.com"},
|
|
path: "/wtf",
|
|
},
|
|
{
|
|
desc: "Path modify with trailing slash redirect",
|
|
hosts: []string{"test.com", "test2.com", "pow.com", "pow2.com"},
|
|
path: "/wtf/",
|
|
},
|
|
{
|
|
desc: "Path modify with matching path segment redirect",
|
|
hosts: []string{"test.com", "test2.com", "pow.com", "pow2.com"},
|
|
path: "/wtf/foo",
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
sourceURL := fmt.Sprintf("http://127.0.0.1:8888%s", test.path)
|
|
for _, host := range test.hosts {
|
|
req, err := http.NewRequest(http.MethodGet, sourceURL, nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = host
|
|
|
|
resp, err := client.Do(req)
|
|
c.Assert(err, checker.IsNil)
|
|
resp.Body.Close()
|
|
|
|
location := resp.Header.Get("Location")
|
|
expected := "https://" + net.JoinHostPort(host, "8443") + test.path
|
|
|
|
c.Assert(location, checker.Equals, expected)
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestWithSNIDynamicCaseInsensitive involves a client sending a SNI hostname of
|
|
// "bar.www.snitest.com", which matches the DNS SAN of '*.WWW.SNITEST.COM'. The test
|
|
// verifies that traefik presents the correct certificate.
|
|
func (s *HTTPSSuite) TestWithSNIDynamicCaseInsensitive(c *check.C) {
|
|
file := s.adaptFile(c, "fixtures/https/https_sni_case_insensitive_dynamic.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("HostRegexp(`{subdomain:[a-z1-9-]+}.www.snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
ServerName: "bar.www.snitest.com",
|
|
NextProtos: []string{"h2", "http/1.1"},
|
|
}
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to connect to server"))
|
|
|
|
defer conn.Close()
|
|
err = conn.Handshake()
|
|
c.Assert(err, checker.IsNil, check.Commentf("TLS handshake error"))
|
|
|
|
cs := conn.ConnectionState()
|
|
err = cs.PeerCertificates[0].VerifyHostname("*.WWW.SNITEST.COM")
|
|
c.Assert(err, checker.IsNil, check.Commentf("certificate did not match SNI servername"))
|
|
|
|
proto := conn.ConnectionState().NegotiatedProtocol
|
|
c.Assert(proto, checker.Equals, "h2")
|
|
}
|
|
|
|
// TestWithDomainFronting verify the domain fronting behavior
|
|
func (s *HTTPSSuite) TestWithDomainFronting(c *check.C) {
|
|
backend := startTestServer("9010", http.StatusOK, "server1")
|
|
defer backend.Close()
|
|
backend2 := startTestServer("9020", http.StatusOK, "server2")
|
|
defer backend2.Close()
|
|
backend3 := startTestServer("9030", http.StatusOK, "server3")
|
|
defer backend3.Close()
|
|
|
|
file := s.adaptFile(c, "fixtures/https/https_domain_fronting.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`site1.www.snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
testCases := []struct {
|
|
desc string
|
|
hostHeader string
|
|
serverName string
|
|
expectedError bool
|
|
expectedContent string
|
|
expectedStatusCode int
|
|
}{
|
|
{
|
|
desc: "SimpleCase",
|
|
hostHeader: "site1.www.snitest.com",
|
|
serverName: "site1.www.snitest.com",
|
|
expectedContent: "server1",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
{
|
|
desc: "Simple case with port in the Host Header",
|
|
hostHeader: "site3.www.snitest.com:4443",
|
|
serverName: "site3.www.snitest.com",
|
|
expectedContent: "server3",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
{
|
|
desc: "Spaces after the host header",
|
|
hostHeader: "site3.www.snitest.com ",
|
|
serverName: "site3.www.snitest.com",
|
|
expectedError: true,
|
|
expectedContent: "server3",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
{
|
|
desc: "Spaces after the servername",
|
|
hostHeader: "site3.www.snitest.com",
|
|
serverName: "site3.www.snitest.com ",
|
|
expectedContent: "server3",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
{
|
|
desc: "Spaces after the servername and host header",
|
|
hostHeader: "site3.www.snitest.com ",
|
|
serverName: "site3.www.snitest.com ",
|
|
expectedError: true,
|
|
expectedContent: "server3",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
{
|
|
desc: "Domain Fronting with same tlsOptions should follow header",
|
|
hostHeader: "site1.www.snitest.com",
|
|
serverName: "site2.www.snitest.com",
|
|
expectedContent: "server1",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
{
|
|
desc: "Domain Fronting with same tlsOptions should follow header (2)",
|
|
hostHeader: "site2.www.snitest.com",
|
|
serverName: "site1.www.snitest.com",
|
|
expectedContent: "server2",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
{
|
|
desc: "Domain Fronting with different tlsOptions should produce a 421",
|
|
hostHeader: "site2.www.snitest.com",
|
|
serverName: "site3.www.snitest.com",
|
|
expectedContent: "",
|
|
expectedStatusCode: http.StatusMisdirectedRequest,
|
|
},
|
|
{
|
|
desc: "Domain Fronting with different tlsOptions should produce a 421 (2)",
|
|
hostHeader: "site3.www.snitest.com",
|
|
serverName: "site1.www.snitest.com",
|
|
expectedContent: "",
|
|
expectedStatusCode: http.StatusMisdirectedRequest,
|
|
},
|
|
{
|
|
desc: "Case insensitive",
|
|
hostHeader: "sIte1.www.snitest.com",
|
|
serverName: "sitE1.www.snitest.com",
|
|
expectedContent: "server1",
|
|
expectedStatusCode: http.StatusOK,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "https://127.0.0.1:4443", nil)
|
|
c.Assert(err, checker.IsNil)
|
|
req.Host = test.hostHeader
|
|
|
|
err = try.RequestWithTransport(req, 500*time.Millisecond, &http.Transport{TLSClientConfig: &tls.Config{InsecureSkipVerify: true, ServerName: test.serverName}}, try.StatusCodeIs(test.expectedStatusCode), try.BodyContains(test.expectedContent))
|
|
if test.expectedError {
|
|
c.Assert(err, checker.NotNil)
|
|
} else {
|
|
c.Assert(err, checker.IsNil)
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestWithInvalidTLSOption verifies the behavior when using an invalid tlsOption configuration.
|
|
func (s *HTTPSSuite) TestWithInvalidTLSOption(c *check.C) {
|
|
backend := startTestServer("9010", http.StatusOK, "server1")
|
|
defer backend.Close()
|
|
|
|
file := s.adaptFile(c, "fixtures/https/https_invalid_tls_options.toml", struct{}{})
|
|
defer os.Remove(file)
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
defer display(c)
|
|
err := cmd.Start()
|
|
c.Assert(err, checker.IsNil)
|
|
defer s.killCmd(cmd)
|
|
|
|
// wait for Traefik
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", 500*time.Millisecond, try.BodyContains("Host(`snitest.com`)"))
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
testCases := []struct {
|
|
desc string
|
|
serverName string
|
|
}{
|
|
{
|
|
desc: "With invalid TLS Options specified",
|
|
serverName: "snitest.com",
|
|
},
|
|
{
|
|
desc: "With invalid Default TLS Options",
|
|
serverName: "snitest.org",
|
|
},
|
|
{
|
|
desc: "With TLS Options without servername (fallback to default)",
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
|
|
tlsConfig := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
}
|
|
if test.serverName != "" {
|
|
tlsConfig.ServerName = test.serverName
|
|
}
|
|
|
|
conn, err := tls.Dial("tcp", "127.0.0.1:4443", tlsConfig)
|
|
c.Assert(err, checker.NotNil, check.Commentf("connected to server successfully"))
|
|
c.Assert(conn, checker.IsNil)
|
|
}
|
|
}
|