Skip to content

Commit 630cefc

Browse files
committed
Refactor test, fix yaml
1 parent 0a929ad commit 630cefc

13 files changed

+253
-133
lines changed

conformance/base/manifests.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ spec:
277277
spec:
278278
containers:
279279
- name: tls-backend
280-
image: gcr.io/k8s-staging-gateway-api/echo-basic:v20241007-v1.2.0-6-g9f820af9
280+
image: echo-basic:2.7
281281
volumeMounts:
282282
- name: secret-volume
283283
mountPath: /etc/secret-volume
@@ -346,7 +346,7 @@ spec:
346346
spec:
347347
containers:
348348
- name: tls-backend
349-
image: gcr.io/k8s-staging-gateway-api/echo-basic:v20241007-v1.2.0-6-g9f820af9
349+
image: echo-basic:2.7
350350
volumeMounts:
351351
- name: secret-volume
352352
mountPath: /etc/secret-volume

conformance/echo-basic/.go.mod

-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ module sigs.k8s.io/gateway-api/conformance/echo-basic
33
go 1.21
44

55
require (
6-
github.com/paultag/sniff v0.0.0-20200207005214-cf7e4d167732
76
golang.org/x/net v0.21.0
87
google.golang.org/grpc v1.53.0
98
google.golang.org/protobuf v1.28.1

conformance/echo-basic/.go.sum

-2
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@ github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiu
44
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
55
github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38=
66
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
7-
github.com/paultag/sniff v0.0.0-20200207005214-cf7e4d167732 h1:nkseUkzjazCNyGhkRwnJ1OiHSwMXazsJQx+Ci+oVLEM=
8-
github.com/paultag/sniff v0.0.0-20200207005214-cf7e4d167732/go.mod h1:J3XXNGJINXLa4yIivdUT0Ad/srv2q0pSOWbbm6El2EY=
97
golang.org/x/net v0.21.0 h1:AQyQV4dYCvJ7vGmJyKki9+PBdyvhkSd8EIx/qb0AYv4=
108
golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
119
golang.org/x/sys v0.17.0 h1:25cE3gD+tdBA7lp7QfhuV+rJiE9YXTcS3VG1SqssI/Y=

conformance/echo-basic/echo-basic.go

+112-93
Original file line numberDiff line numberDiff line change
@@ -18,28 +18,36 @@ package main
1818

1919
import (
2020
"crypto/tls"
21-
"crypto/x509"
2221
"encoding/json"
2322
"encoding/pem"
2423
"fmt"
2524
"io"
26-
"net"
2725
"net/http"
2826
"os"
2927
"regexp"
3028
"strconv"
3129
"strings"
3230
"time"
3331

34-
"github.com/paultag/sniff/parser"
3532
"golang.org/x/net/http2"
3633
"golang.org/x/net/http2/h2c"
3734
"golang.org/x/net/websocket"
3835

3936
g "sigs.k8s.io/gateway-api/conformance/echo-basic/grpc"
4037
)
4138

42-
// RequestAssertions contains information about the request and the Ingress
39+
type preserveSlashes struct {
40+
mux http.Handler
41+
}
42+
43+
func (s *preserveSlashes) ServeHTTP(w http.ResponseWriter, r *http.Request) {
44+
r.URL.Path = strings.ReplaceAll(r.URL.Path, "//", "/")
45+
s.mux.ServeHTTP(w, r)
46+
}
47+
48+
var context Context
49+
50+
// RequestAssertions contains information about the request and the Ingress.
4351
type RequestAssertions struct {
4452
Path string `json:"path"`
4553
Host string `json:"host"`
@@ -63,25 +71,14 @@ type TLSAssertions struct {
6371
CipherSuite string `json:"cipherSuite"`
6472
}
6573

66-
type preserveSlashes struct {
67-
mux http.Handler
68-
}
69-
70-
func (s *preserveSlashes) ServeHTTP(w http.ResponseWriter, r *http.Request) {
71-
r.URL.Path = strings.ReplaceAll(r.URL.Path, "//", "/")
72-
s.mux.ServeHTTP(w, r)
73-
}
74-
75-
// Context contains information about the context where the echoserver is running
74+
// Context contains information about the context where the echoserver is running.
7675
type Context struct {
7776
Namespace string `json:"namespace"`
7877
Ingress string `json:"ingress"`
7978
Service string `json:"service"`
8079
Pod string `json:"pod"`
8180
}
8281

83-
var context Context
84-
8582
func main() {
8683
if os.Getenv("GRPC_ECHO_SERVER") != "" {
8784
g.Main()
@@ -92,6 +89,7 @@ func main() {
9289
if httpPort == "" {
9390
httpPort = "3000"
9491
}
92+
9593
h2cPort := os.Getenv("H2C_PORT")
9694
if h2cPort == "" {
9795
h2cPort = "3001"
@@ -113,7 +111,6 @@ func main() {
113111
httpMux.HandleFunc("/health", healthHandler)
114112
httpMux.HandleFunc("/status/", statusHandler)
115113
httpMux.HandleFunc("/", echoHandler)
116-
httpMux.HandleFunc("/backendTLS", echoHandler)
117114
httpMux.Handle("/ws", websocket.Handler(wsHandler))
118115
httpHandler := &preserveSlashes{httpMux}
119116

@@ -130,18 +127,22 @@ func main() {
130127
go runH2CServer(h2cPort, errchan)
131128

132129
// Enable HTTPS if server certificate and private key are given. (TLS_SERVER_CERT, TLS_SERVER_PRIVKEY)
133-
// Enable secure backend if CA certificate and key are given. (CA_CERT, CA_CERT_KEY)
134-
if os.Getenv("TLS_SERVER_CERT") != "" && os.Getenv("TLS_SERVER_PRIVKEY") != "" ||
135-
os.Getenv("CA_CERT") != "" && os.Getenv("CA_CERT_KEY") != "" {
130+
if os.Getenv("TLS_SERVER_CERT") != "" && os.Getenv("TLS_SERVER_PRIVKEY") != "" {
136131
go func() {
137132
fmt.Printf("Starting server, listening on port %s (https)\n", httpsPort)
138-
err := listenAndServeTLS(fmt.Sprintf(":%s", httpsPort), os.Getenv("TLS_SERVER_CERT"), os.Getenv("TLS_SERVER_PRIVKEY"), os.Getenv("CA_CERT"), httpHandler)
133+
err := listenAndServeTLS(fmt.Sprintf(":%s", httpsPort), os.Getenv("TLS_SERVER_CERT"), os.Getenv("TLS_SERVER_PRIVKEY"), httpHandler)
139134
if err != nil {
140135
errchan <- err
141136
}
142137
}()
143138
}
144139

140+
// Enable secure backend if CA certificate is given. (CA_CERT)
141+
if os.Getenv("CA_CERT") != "" {
142+
// Start the backend server and listen on port 9443.
143+
go runBackendTLSServer("9443", errchan)
144+
}
145+
145146
if err := <-errchan; err != nil {
146147
panic(fmt.Sprintf("Failed to start listening: %s\n", err.Error()))
147148
}
@@ -207,30 +208,100 @@ func runH2CServer(h2cPort string, errchan chan<- error) {
207208
}
208209
}
209210

210-
func echoHandler(w http.ResponseWriter, r *http.Request) {
211-
var sni string
211+
// Global variable to store the SNI retrieved at a different level.
212+
var globalsni string
212213

214+
func runBackendTLSServer(port string, errchan chan<- error) {
215+
// This handler function runs within the backend server to find the SNI
216+
// and return it in the RequestAssertions.
217+
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
218+
if strings.Contains(r.RequestURI, "backendTLS") {
219+
// Find the sni in the global (or if needed, a channel/mutex?).
220+
if globalsni == "" {
221+
err := fmt.Errorf("error finding SNI: SNI is empty")
222+
// If there are some test cases without SNI, then they must handle this error properly.
223+
processError(w, err, http.StatusBadRequest)
224+
}
225+
requestAssertions := RequestAssertions{
226+
r.RequestURI,
227+
r.Host,
228+
r.Method,
229+
r.Proto,
230+
r.Header,
231+
232+
context,
233+
234+
tlsStateToAssertions(r.TLS),
235+
globalsni,
236+
}
237+
processRequestAssertions(requestAssertions, w, r)
238+
} else {
239+
// This should never happen, but just in case.
240+
processError(w, fmt.Errorf("backend server called without correct uri"), http.StatusBadRequest)
241+
}
242+
})
243+
244+
config, err := makeTLSConfig(os.Getenv("CA_CERT"))
245+
if err != nil {
246+
errchan <- err
247+
}
248+
btlsServer := &http.Server{
249+
Addr: fmt.Sprintf(":%s", port),
250+
Handler: handler,
251+
ReadHeaderTimeout: time.Second,
252+
TLSConfig: config,
253+
}
254+
fmt.Printf("Starting server, listening on port %s (btls)\n", port)
255+
err = btlsServer.ListenAndServeTLS(os.Getenv("CA_CERT"), os.Getenv("CA_CERT_KEY"))
256+
if err != nil {
257+
fmt.Printf("Failed to start server: %v\n", err)
258+
errchan <- err
259+
}
260+
}
261+
262+
func makeTLSConfig(cacert string) (*tls.Config, error) {
263+
var config tls.Config
264+
265+
if cacert == "" {
266+
return &config, fmt.Errorf("empty CA cert specified")
267+
}
268+
cert, err := tls.LoadX509KeyPair(cacert, os.Getenv("CA_CERT_KEY"))
269+
if err != nil {
270+
return &config, fmt.Errorf("failed to load key pair: %v", err)
271+
}
272+
certs := []tls.Certificate{cert}
273+
274+
// Verify certificate against given CA but also allow unauthenticated connections.
275+
config.ClientAuth = tls.VerifyClientCertIfGiven
276+
config.Certificates = certs
277+
config.GetConfigForClient = func(info *tls.ClientHelloInfo) (*tls.Config, error) {
278+
if info != nil {
279+
// Store the SNI from the ClientHello into a global variable.
280+
globalsni = info.ServerName
281+
if globalsni == "" {
282+
return nil, fmt.Errorf("no SNI specified")
283+
}
284+
return nil, nil
285+
} else {
286+
return nil, fmt.Errorf("no client hello available")
287+
}
288+
}
289+
290+
return &config, nil
291+
}
292+
293+
func echoHandler(w http.ResponseWriter, r *http.Request) {
213294
fmt.Printf("Echoing back request made to %s to client (%s)\n", r.RequestURI, r.RemoteAddr)
214295

215296
// If the request has form ?delay=[:duration] wait for duration
216297
// For example, ?delay=10s will cause the response to wait 10s before responding
217298
err := delayResponse(r)
218299
if err != nil {
300+
fmt.Printf("error : %v\n", err)
219301
processError(w, err, http.StatusInternalServerError)
220302
return
221303
}
222304

223-
// If the request was made to URI backendTLS, then get the server name indication and
224-
// add it to the RequestAssertions. It will be echoed back later.
225-
if strings.Contains(r.RequestURI, "backendTLS") {
226-
sni, err = sniffForSNI(r.RemoteAddr)
227-
if err != nil {
228-
// TODO: research if for some test cases there won't be SNI available.
229-
processError(w, err, http.StatusBadGateway)
230-
return
231-
}
232-
}
233-
234305
requestAssertions := RequestAssertions{
235306
r.RequestURI,
236307
r.Host,
@@ -241,9 +312,12 @@ func echoHandler(w http.ResponseWriter, r *http.Request) {
241312
context,
242313

243314
tlsStateToAssertions(r.TLS),
244-
sni,
315+
"",
245316
}
317+
processRequestAssertions(requestAssertions, w, r)
318+
}
246319

320+
func processRequestAssertions(requestAssertions RequestAssertions, w http.ResponseWriter, r *http.Request) {
247321
js, err := json.MarshalIndent(requestAssertions, "", " ")
248322
if err != nil {
249323
processError(w, err, http.StatusInternalServerError)
@@ -289,70 +363,15 @@ func processError(w http.ResponseWriter, err error, code int) { //nolint:unparam
289363
_, _ = w.Write(body)
290364
}
291365

292-
func listenAndServeTLS(addr string, serverCert string, serverPrivKey string, clientCA string, handler http.Handler) error {
293-
var config tls.Config
294-
295-
// Optionally enable client certificate validation when client CA certificates are given.
296-
if clientCA != "" {
297-
ca, err := os.ReadFile(clientCA)
298-
if err != nil {
299-
return err
300-
}
301-
302-
certPool := x509.NewCertPool()
303-
if ok := certPool.AppendCertsFromPEM(ca); !ok {
304-
return fmt.Errorf("unable to append certificate in %q to CA pool", clientCA)
305-
}
306-
307-
// Verify certificate against given CA but also allow unauthenticated connections.
308-
config.ClientAuth = tls.VerifyClientCertIfGiven
309-
config.ClientCAs = certPool
310-
}
311-
366+
func listenAndServeTLS(addr string, serverCert, serverPrivKey string, handler http.Handler) error {
312367
srv := &http.Server{ //nolint:gosec
313-
Addr: addr,
314-
Handler: handler,
315-
TLSConfig: &config,
368+
Addr: addr,
369+
Handler: handler,
316370
}
317371

318372
return srv.ListenAndServeTLS(serverCert, serverPrivKey)
319373
}
320374

321-
// sniffForSNI uses the request address to listen for the incoming TLS connection,
322-
// and tries to find the server name indication from that connection.
323-
func sniffForSNI(addr string) (string, error) {
324-
var sni string
325-
326-
// Listen to get the SNI, and store in config.
327-
listener, err := net.Listen("tcp", addr)
328-
if err != nil {
329-
return "", err
330-
}
331-
defer listener.Close()
332-
333-
for {
334-
conn, err := listener.Accept()
335-
if err != nil {
336-
return "", err
337-
}
338-
data := make([]byte, 4096)
339-
_, err = conn.Read(data)
340-
if err != nil {
341-
return "", fmt.Errorf("could not read socket: %v", err)
342-
}
343-
// Take an incoming TLS Client Hello and return the SNI name.
344-
sni, err = parser.GetHostname(data)
345-
if err != nil {
346-
return "", fmt.Errorf("error getting SNI: %v", err)
347-
}
348-
if sni == "" {
349-
return "", fmt.Errorf("no server name indication found")
350-
} else { //nolint:revive
351-
return sni, nil
352-
}
353-
}
354-
}
355-
356375
func tlsStateToAssertions(connectionState *tls.ConnectionState) *TLSAssertions {
357376
if connectionState != nil {
358377
var state TLSAssertions

0 commit comments

Comments
 (0)