http2_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623
  1. package connection
  2. import (
  3. "bytes"
  4. "context"
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "net/http"
  10. "net/http/httptest"
  11. "sync"
  12. "testing"
  13. "time"
  14. "github.com/gobwas/ws/wsutil"
  15. "github.com/google/uuid"
  16. "github.com/rs/zerolog"
  17. "github.com/stretchr/testify/assert"
  18. "github.com/stretchr/testify/require"
  19. "golang.org/x/net/http2"
  20. "github.com/cloudflare/cloudflared/client"
  21. "github.com/cloudflare/cloudflared/tracing"
  22. "github.com/cloudflare/cloudflared/tunnelrpc"
  23. "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
  24. )
  25. var testTransport = http2.Transport{}
  26. func newTestHTTP2Connection() (*HTTP2Connection, net.Conn) {
  27. edgeConn, cfdConn := net.Pipe()
  28. connIndex := uint8(0)
  29. log := zerolog.Nop()
  30. obs := NewObserver(&log, &log)
  31. controlStream := NewControlStream(
  32. obs,
  33. mockConnectedFuse{},
  34. &TunnelProperties{},
  35. connIndex,
  36. nil,
  37. nil,
  38. 1*time.Second,
  39. nil,
  40. 1*time.Second,
  41. HTTP2,
  42. )
  43. return NewHTTP2Connection(
  44. cfdConn,
  45. // OriginProxy is set in testConfigManager
  46. testOrchestrator,
  47. &client.ConnectionOptionsSnapshot{},
  48. obs,
  49. connIndex,
  50. controlStream,
  51. &log,
  52. ), edgeConn
  53. }
  54. func TestHTTP2ConfigurationSet(t *testing.T) {
  55. http2Conn, edgeConn := newTestHTTP2Connection()
  56. ctx, cancel := context.WithCancel(t.Context())
  57. var wg sync.WaitGroup
  58. wg.Add(1)
  59. go func() {
  60. defer wg.Done()
  61. _ = http2Conn.Serve(ctx)
  62. }()
  63. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  64. require.NoError(t, err)
  65. reqBody := []byte(`{
  66. "version": 2,
  67. "config": {"warp-routing": {"enabled": true}, "originRequest" : {"connectTimeout": 10}, "ingress" : [ {"hostname": "test", "service": "https://localhost:8000" } , {"service": "http_status:404"} ]}}
  68. `)
  69. reader := bytes.NewReader(reqBody)
  70. req, err := http.NewRequestWithContext(ctx, http.MethodPut, "http://localhost:8080/ok", reader)
  71. require.NoError(t, err)
  72. req.Header.Set(InternalUpgradeHeader, ConfigurationUpdate)
  73. resp, err := edgeHTTP2Conn.RoundTrip(req)
  74. require.NoError(t, err)
  75. require.Equal(t, http.StatusOK, resp.StatusCode)
  76. bdy, err := io.ReadAll(resp.Body)
  77. defer resp.Body.Close()
  78. require.NoError(t, err)
  79. assert.Equal(t, `{"lastAppliedVersion":2,"err":null}`, string(bdy))
  80. cancel()
  81. wg.Wait()
  82. }
  83. func TestServeHTTP(t *testing.T) {
  84. tests := []testRequest{
  85. {
  86. name: "ok",
  87. endpoint: "ok",
  88. expectedStatus: http.StatusOK,
  89. expectedBody: []byte(http.StatusText(http.StatusOK)),
  90. },
  91. {
  92. name: "large_file",
  93. endpoint: "large_file",
  94. expectedStatus: http.StatusOK,
  95. expectedBody: testLargeResp,
  96. },
  97. {
  98. name: "Bad request",
  99. endpoint: "400",
  100. expectedStatus: http.StatusBadRequest,
  101. expectedBody: []byte(http.StatusText(http.StatusBadRequest)),
  102. },
  103. {
  104. name: "Internal server error",
  105. endpoint: "500",
  106. expectedStatus: http.StatusInternalServerError,
  107. expectedBody: []byte(http.StatusText(http.StatusInternalServerError)),
  108. },
  109. {
  110. name: "Proxy error",
  111. endpoint: "error",
  112. expectedStatus: http.StatusBadGateway,
  113. expectedBody: nil,
  114. isProxyError: true,
  115. },
  116. }
  117. http2Conn, edgeConn := newTestHTTP2Connection()
  118. ctx, cancel := context.WithCancel(t.Context())
  119. var wg sync.WaitGroup
  120. wg.Add(1)
  121. go func() {
  122. defer wg.Done()
  123. _ = http2Conn.Serve(ctx)
  124. }()
  125. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  126. require.NoError(t, err)
  127. for _, test := range tests {
  128. endpoint := fmt.Sprintf("http://localhost:8080/%s", test.endpoint)
  129. req, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil)
  130. require.NoError(t, err)
  131. resp, err := edgeHTTP2Conn.RoundTrip(req)
  132. require.NoError(t, err)
  133. require.Equal(t, test.expectedStatus, resp.StatusCode)
  134. if test.expectedBody != nil {
  135. respBody, err := io.ReadAll(resp.Body)
  136. require.NoError(t, err)
  137. require.Equal(t, test.expectedBody, respBody)
  138. }
  139. _ = resp.Body.Close()
  140. if test.isProxyError {
  141. require.Equal(t, responseMetaHeaderCfd, resp.Header.Get(ResponseMetaHeader))
  142. } else {
  143. require.Equal(t, responseMetaHeaderOrigin, resp.Header.Get(ResponseMetaHeader))
  144. }
  145. }
  146. cancel()
  147. wg.Wait()
  148. }
  149. type mockNamedTunnelRPCClient struct {
  150. shouldFail error
  151. registered chan struct{}
  152. unregistered chan struct{}
  153. }
  154. func (mc mockNamedTunnelRPCClient) SendLocalConfiguration(c context.Context, config []byte) error {
  155. return nil
  156. }
  157. func (mc mockNamedTunnelRPCClient) RegisterConnection(
  158. ctx context.Context,
  159. auth pogs.TunnelAuth,
  160. tunnelID uuid.UUID,
  161. options *pogs.ConnectionOptions,
  162. connIndex uint8,
  163. edgeAddress net.IP,
  164. ) (*pogs.ConnectionDetails, error) {
  165. if mc.shouldFail != nil {
  166. return nil, mc.shouldFail
  167. }
  168. close(mc.registered)
  169. return &pogs.ConnectionDetails{
  170. Location: "LIS",
  171. UUID: uuid.New(),
  172. TunnelIsRemotelyManaged: false,
  173. }, nil
  174. }
  175. func (mc mockNamedTunnelRPCClient) GracefulShutdown(ctx context.Context, gracePeriod time.Duration) error {
  176. close(mc.unregistered)
  177. return nil
  178. }
  179. func (mockNamedTunnelRPCClient) Close() {}
  180. type mockRPCClientFactory struct {
  181. shouldFail error
  182. registered chan struct{}
  183. unregistered chan struct{}
  184. }
  185. func (mf *mockRPCClientFactory) newMockRPCClient(context.Context, io.ReadWriteCloser, time.Duration) tunnelrpc.RegistrationClient {
  186. return &mockNamedTunnelRPCClient{
  187. shouldFail: mf.shouldFail,
  188. registered: mf.registered,
  189. unregistered: mf.unregistered,
  190. }
  191. }
  192. type wsRespWriter struct {
  193. *httptest.ResponseRecorder
  194. readPipe *io.PipeReader
  195. writePipe *io.PipeWriter
  196. closed bool
  197. panicked bool
  198. }
  199. func newWSRespWriter() *wsRespWriter {
  200. readPipe, writePipe := io.Pipe()
  201. return &wsRespWriter{
  202. httptest.NewRecorder(),
  203. readPipe,
  204. writePipe,
  205. false,
  206. false,
  207. }
  208. }
  209. type nowriter struct {
  210. io.Reader
  211. }
  212. func (nowriter) Write(_ []byte) (int, error) {
  213. return 0, fmt.Errorf("writer not implemented")
  214. }
  215. func (w *wsRespWriter) RespBody() io.ReadWriter {
  216. return nowriter{w.readPipe}
  217. }
  218. func (w *wsRespWriter) Write(data []byte) (n int, err error) {
  219. if w.closed {
  220. w.panicked = true
  221. return 0, errors.New("wsRespWriter panicked")
  222. }
  223. return w.writePipe.Write(data)
  224. }
  225. func (w *wsRespWriter) close() {
  226. w.closed = true
  227. }
  228. func TestServeWS(t *testing.T) {
  229. http2Conn, _ := newTestHTTP2Connection()
  230. ctx, cancel := context.WithCancel(t.Context())
  231. respWriter := newWSRespWriter()
  232. readPipe, writePipe := io.Pipe()
  233. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/ws/echo", readPipe)
  234. require.NoError(t, err)
  235. req.Header.Set(InternalUpgradeHeader, WebsocketUpgrade)
  236. serveDone := make(chan struct{})
  237. go func() {
  238. defer close(serveDone)
  239. http2Conn.ServeHTTP(respWriter, req)
  240. respWriter.close()
  241. }()
  242. data := []byte("test websocket")
  243. err = wsutil.WriteClientBinary(writePipe, data)
  244. require.NoError(t, err)
  245. respBody, err := wsutil.ReadServerBinary(respWriter.RespBody())
  246. require.NoError(t, err)
  247. require.Equal(t, data, respBody, "expect %s, got %s", string(data), string(respBody))
  248. cancel()
  249. resp := respWriter.Result()
  250. defer resp.Body.Close()
  251. // http2RespWriter should rewrite status 101 to 200
  252. require.Equal(t, http.StatusOK, resp.StatusCode)
  253. require.Equal(t, responseMetaHeaderOrigin, resp.Header.Get(ResponseMetaHeader))
  254. <-serveDone
  255. require.False(t, respWriter.panicked)
  256. }
  257. // TestNoWriteAfterServeHTTPReturns is a regression test of https://jira.cfops.it/browse/TUN-5184
  258. // to make sure we don't write to the ResponseWriter after the ServeHTTP method returns
  259. func TestNoWriteAfterServeHTTPReturns(t *testing.T) {
  260. cfdHTTP2Conn, edgeTCPConn := newTestHTTP2Connection()
  261. ctx, cancel := context.WithCancel(t.Context())
  262. var wg sync.WaitGroup
  263. serverDone := make(chan struct{})
  264. go func() {
  265. defer close(serverDone)
  266. _ = cfdHTTP2Conn.Serve(ctx)
  267. }()
  268. edgeTransport := http2.Transport{}
  269. edgeHTTP2Conn, err := edgeTransport.NewClientConn(edgeTCPConn)
  270. require.NoError(t, err)
  271. message := []byte(t.Name())
  272. for i := 0; i < 100; i++ {
  273. wg.Add(1)
  274. go func() {
  275. defer wg.Done()
  276. readPipe, writePipe := io.Pipe()
  277. reqCtx, reqCancel := context.WithCancel(ctx)
  278. req, err := http.NewRequestWithContext(reqCtx, http.MethodGet, "http://localhost:8080/ws/flaky", readPipe)
  279. assert.NoError(t, err)
  280. req.Header.Set(InternalUpgradeHeader, WebsocketUpgrade)
  281. resp, err := edgeHTTP2Conn.RoundTrip(req)
  282. assert.NoError(t, err)
  283. _ = resp.Body.Close()
  284. // http2RespWriter should rewrite status 101 to 200
  285. assert.Equal(t, http.StatusOK, resp.StatusCode)
  286. wg.Add(1)
  287. go func() {
  288. defer wg.Done()
  289. for {
  290. select {
  291. case <-reqCtx.Done():
  292. return
  293. default:
  294. }
  295. _ = wsutil.WriteClientBinary(writePipe, message)
  296. }
  297. }()
  298. time.Sleep(time.Millisecond * 100)
  299. reqCancel()
  300. }()
  301. }
  302. wg.Wait()
  303. cancel()
  304. <-serverDone
  305. }
  306. func TestServeControlStream(t *testing.T) {
  307. http2Conn, edgeConn := newTestHTTP2Connection()
  308. rpcClientFactory := mockRPCClientFactory{
  309. registered: make(chan struct{}),
  310. unregistered: make(chan struct{}),
  311. }
  312. obs := NewObserver(&log, &log)
  313. controlStream := NewControlStream(
  314. obs,
  315. mockConnectedFuse{},
  316. &TunnelProperties{},
  317. 1,
  318. nil,
  319. rpcClientFactory.newMockRPCClient,
  320. 1*time.Second,
  321. nil,
  322. 1*time.Second,
  323. HTTP2,
  324. )
  325. http2Conn.controlStreamHandler = controlStream
  326. ctx, cancel := context.WithCancel(t.Context())
  327. var wg sync.WaitGroup
  328. wg.Add(1)
  329. go func() {
  330. defer wg.Done()
  331. _ = http2Conn.Serve(ctx)
  332. }()
  333. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/", nil)
  334. require.NoError(t, err)
  335. req.Header.Set(InternalUpgradeHeader, ControlStreamUpgrade)
  336. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  337. require.NoError(t, err)
  338. wg.Add(1)
  339. go func() {
  340. defer wg.Done()
  341. // nolint: bodyclose
  342. _, _ = edgeHTTP2Conn.RoundTrip(req)
  343. }()
  344. <-rpcClientFactory.registered
  345. cancel()
  346. <-rpcClientFactory.unregistered
  347. assert.False(t, http2Conn.stoppedGracefully)
  348. wg.Wait()
  349. }
  350. func TestFailRegistration(t *testing.T) {
  351. http2Conn, edgeConn := newTestHTTP2Connection()
  352. rpcClientFactory := mockRPCClientFactory{
  353. shouldFail: errDuplicationConnection,
  354. registered: make(chan struct{}),
  355. unregistered: make(chan struct{}),
  356. }
  357. obs := NewObserver(&log, &log)
  358. controlStream := NewControlStream(
  359. obs,
  360. mockConnectedFuse{},
  361. &TunnelProperties{},
  362. http2Conn.connIndex,
  363. nil,
  364. rpcClientFactory.newMockRPCClient,
  365. 1*time.Second,
  366. nil,
  367. 1*time.Second,
  368. HTTP2,
  369. )
  370. http2Conn.controlStreamHandler = controlStream
  371. ctx, cancel := context.WithCancel(t.Context())
  372. var wg sync.WaitGroup
  373. wg.Add(1)
  374. go func() {
  375. defer wg.Done()
  376. _ = http2Conn.Serve(ctx)
  377. }()
  378. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/", nil)
  379. require.NoError(t, err)
  380. req.Header.Set(InternalUpgradeHeader, ControlStreamUpgrade)
  381. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  382. require.NoError(t, err)
  383. resp, err := edgeHTTP2Conn.RoundTrip(req)
  384. require.NoError(t, err)
  385. defer resp.Body.Close()
  386. require.Equal(t, http.StatusBadGateway, resp.StatusCode)
  387. require.Error(t, http2Conn.controlStreamErr)
  388. cancel()
  389. wg.Wait()
  390. }
  391. func TestGracefulShutdownHTTP2(t *testing.T) {
  392. http2Conn, edgeConn := newTestHTTP2Connection()
  393. rpcClientFactory := mockRPCClientFactory{
  394. registered: make(chan struct{}),
  395. unregistered: make(chan struct{}),
  396. }
  397. events := &eventCollectorSink{}
  398. shutdownC := make(chan struct{})
  399. obs := NewObserver(&log, &log)
  400. obs.RegisterSink(events)
  401. controlStream := NewControlStream(
  402. obs,
  403. mockConnectedFuse{},
  404. &TunnelProperties{},
  405. http2Conn.connIndex,
  406. nil,
  407. rpcClientFactory.newMockRPCClient,
  408. 1*time.Second,
  409. shutdownC,
  410. 1*time.Second,
  411. HTTP2,
  412. )
  413. http2Conn.controlStreamHandler = controlStream
  414. ctx, cancel := context.WithCancel(t.Context())
  415. var wg sync.WaitGroup
  416. wg.Add(1)
  417. go func() {
  418. defer wg.Done()
  419. _ = http2Conn.Serve(ctx)
  420. }()
  421. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080/", nil)
  422. require.NoError(t, err)
  423. req.Header.Set(InternalUpgradeHeader, ControlStreamUpgrade)
  424. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  425. require.NoError(t, err)
  426. wg.Add(1)
  427. go func() {
  428. defer wg.Done()
  429. // nolint: bodyclose
  430. _, _ = edgeHTTP2Conn.RoundTrip(req)
  431. }()
  432. select {
  433. case <-rpcClientFactory.registered:
  434. break // ok
  435. case <-time.Tick(time.Second):
  436. t.Fatal("timeout out waiting for registration")
  437. }
  438. // signal graceful shutdown
  439. close(shutdownC)
  440. select {
  441. case <-rpcClientFactory.unregistered:
  442. break // ok
  443. case <-time.Tick(time.Second):
  444. t.Fatal("timeout out waiting for unregistered signal")
  445. }
  446. assert.True(t, controlStream.IsStopped())
  447. cancel()
  448. wg.Wait()
  449. events.assertSawEvent(t, Event{
  450. Index: http2Conn.connIndex,
  451. EventType: Unregistering,
  452. })
  453. }
  454. func TestServeTCP_RateLimited(t *testing.T) {
  455. ctx, cancel := context.WithCancel(t.Context())
  456. http2Conn, edgeConn := newTestHTTP2Connection()
  457. var wg sync.WaitGroup
  458. wg.Add(1)
  459. go func() {
  460. defer wg.Done()
  461. _ = http2Conn.Serve(ctx)
  462. }()
  463. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  464. require.NoError(t, err)
  465. req, err := http.NewRequestWithContext(ctx, http.MethodGet, "http://localhost:8080", nil)
  466. require.NoError(t, err)
  467. req.Header.Set(InternalTCPProxySrcHeader, "tcp")
  468. req.Header.Set(tracing.TracerContextName, "flow-rate-limited")
  469. resp, err := edgeHTTP2Conn.RoundTrip(req)
  470. require.NoError(t, err)
  471. defer resp.Body.Close()
  472. require.Equal(t, http.StatusBadGateway, resp.StatusCode)
  473. require.Equal(t, responseMetaHeaderCfdFlowRateLimited, resp.Header.Get(ResponseMetaHeader))
  474. cancel()
  475. wg.Wait()
  476. }
  477. func benchmarkServeHTTP(b *testing.B, test testRequest) {
  478. http2Conn, edgeConn := newTestHTTP2Connection()
  479. ctx, cancel := context.WithCancel(b.Context())
  480. var wg sync.WaitGroup
  481. wg.Add(1)
  482. go func() {
  483. defer wg.Done()
  484. _ = http2Conn.Serve(ctx)
  485. }()
  486. endpoint := fmt.Sprintf("http://localhost:8080/%s", test.endpoint)
  487. req, err := http.NewRequestWithContext(ctx, http.MethodGet, endpoint, nil)
  488. require.NoError(b, err)
  489. edgeHTTP2Conn, err := testTransport.NewClientConn(edgeConn)
  490. require.NoError(b, err)
  491. b.ResetTimer()
  492. for i := 0; i < b.N; i++ {
  493. b.StartTimer()
  494. resp, err := edgeHTTP2Conn.RoundTrip(req)
  495. b.StopTimer()
  496. require.NoError(b, err)
  497. require.Equal(b, test.expectedStatus, resp.StatusCode)
  498. if test.expectedBody != nil {
  499. respBody, err := io.ReadAll(resp.Body)
  500. require.NoError(b, err)
  501. require.Equal(b, test.expectedBody, respBody)
  502. }
  503. resp.Body.Close()
  504. }
  505. cancel()
  506. wg.Wait()
  507. }
  508. func BenchmarkServeHTTPSimple(b *testing.B) {
  509. test := testRequest{
  510. name: "ok",
  511. endpoint: "ok",
  512. expectedStatus: http.StatusOK,
  513. expectedBody: []byte(http.StatusText(http.StatusOK)),
  514. }
  515. benchmarkServeHTTP(b, test)
  516. }
  517. func BenchmarkServeHTTPLargeFile(b *testing.B) {
  518. test := testRequest{
  519. name: "large_file",
  520. endpoint: "large_file",
  521. expectedStatus: http.StatusOK,
  522. expectedBody: testLargeResp,
  523. }
  524. benchmarkServeHTTP(b, test)
  525. }