]> git.ipfire.org Git - thirdparty/haproxy.git/commitdiff
REGTESTS: provide a reverse-server test with name argument
authorAmaury Denoyelle <adenoyelle@haproxy.com>
Tue, 22 Aug 2023 15:01:57 +0000 (17:01 +0200)
committerAmaury Denoyelle <adenoyelle@haproxy.com>
Thu, 24 Aug 2023 15:02:37 +0000 (17:02 +0200)
This regtest is similar to the previous one, except the optional name
argument is specified.

An extra haproxy instance is used as a gateway for clear/TLS as vtest
does not support TLS natively.

A first request is done by specifying a name which does not match the
idle connection SNI. This must result in a HTTP 503. Then the correct
name is used which must result in a 200.

reg-tests/connection/ca-auth.crt [new symlink]
reg-tests/connection/client1.pem [new symlink]
reg-tests/connection/reverse_server_name.vtc [new file with mode: 0644]

diff --git a/reg-tests/connection/ca-auth.crt b/reg-tests/connection/ca-auth.crt
new file mode 120000 (symlink)
index 0000000..815a970
--- /dev/null
@@ -0,0 +1 @@
+../ssl/ca-auth.crt
\ No newline at end of file
diff --git a/reg-tests/connection/client1.pem b/reg-tests/connection/client1.pem
new file mode 120000 (symlink)
index 0000000..c4d14f0
--- /dev/null
@@ -0,0 +1 @@
+../ssl/client1.pem
\ No newline at end of file
diff --git a/reg-tests/connection/reverse_server_name.vtc b/reg-tests/connection/reverse_server_name.vtc
new file mode 100644 (file)
index 0000000..b8d5cf8
--- /dev/null
@@ -0,0 +1,84 @@
+varnishtest "Reverse server with a name parameter test"
+feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL)'"
+feature ignore_unknown_macro
+
+#REQUIRE_VERSION=2.9
+
+barrier b1 cond 2
+
+haproxy h_edge -conf {
+defaults
+       log global
+       timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
+       timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
+       timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
+       mode http
+
+frontend pub
+       bind "fd@${pub}"
+       use_backend be-reverse
+
+backend be-reverse
+       server dev @reverse ssl sni hdr(x-name) verify none
+
+frontend priv
+       bind "fd@${priv}" ssl crt ${testdir}/common.pem verify required ca-verify-file ${testdir}/ca-auth.crt alpn h2
+       tcp-request session attach-srv be-reverse/dev name ssl_c_s_dn(CN)
+} -start
+
+# Simple clear <-> SSL bridge between clients and h_edge haproxy
+# Used certificate has the name "client1"
+haproxy h_ssl_bridge -conf {
+defaults
+       log global
+       timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
+       timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
+       timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
+       mode tcp
+
+listen li
+       bind "fd@${li}"
+       server h_edge "${h_edge_priv_addr}:${h_edge_priv_port}" ssl crt ${testdir}/client1.pem verify none alpn h2
+} -start
+
+# Run a client through private endpoint
+# Connection will be attached to the reverse server
+client c_dev -connect ${h_ssl_bridge_li_sock} {
+       txpri
+
+       stream 0 {
+               txsettings
+               rxsettings
+               txsettings -ack
+               rxsettings
+               expect settings.ack == true
+       } -run
+
+       barrier b1 sync
+       stream 1 {
+               rxhdrs
+       } -run
+
+       sendhex "000004 01 05 00000001 88 5c 01 30"
+} -start
+
+# Wait for dev client to be ready to process connection
+barrier b1 sync
+
+# Run a client through public endpoint
+# Use a different name than the client certificate thus resulting in a 503
+client c1 -connect ${h_edge_pub_sock} {
+       txreq -url "/" \
+             -hdr "x-name: client99"
+       rxresp
+       expect resp.status == 503
+} -run
+
+# Run a client through public endpoint
+# Use the correct name
+client c2 -connect ${h_edge_pub_sock} {
+       txreq -url "/" \
+             -hdr "x-name: client1"
+       rxresp
+       expect resp.status == 200
+} -run