/* Copyright 2014 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package proxy import ( "bytes" "compress/flate" "compress/gzip" "fmt" "io/ioutil" "net/http" "net/http/httptest" "net/url" "strings" "testing" ) func parseURLOrDie(inURL string) *url.URL { parsed, err := url.Parse(inURL) if err != nil { panic(err) } return parsed } func TestProxyTransport(t *testing.T) { testTransport := &Transport{ Scheme: "http", Host: "foo.com", PathPrepend: "/proxy/node/node1:10250", } testTransport2 := &Transport{ Scheme: "https", Host: "foo.com", PathPrepend: "/proxy/node/node1:8080", } emptyHostTransport := &Transport{ Scheme: "https", PathPrepend: "/proxy/node/node1:10250", } emptySchemeTransport := &Transport{ Host: "foo.com", PathPrepend: "/proxy/node/node1:10250", } emptyHostAndSchemeTransport := &Transport{ PathPrepend: "/proxy/node/node1:10250", } type Item struct { input string sourceURL string transport *Transport output string contentType string forwardedURI string redirect string redirectWant string reqHost string } table := map[string]Item{ "normal": { input: `
kubelet.loggoogle.log
`, sourceURL: "http://mynode.com/logs/log.log", transport: testTransport, output: `
kubelet.loggoogle.log
`, contentType: "text/html", forwardedURI: "/proxy/node/node1:10250/logs/log.log", }, "full document": { input: `
kubelet.loggoogle.log
`, sourceURL: "http://mynode.com/logs/log.log", transport: testTransport, output: `
kubelet.loggoogle.log
`, contentType: "text/html", forwardedURI: "/proxy/node/node1:10250/logs/log.log", }, "trailing slash": { input: `
kubelet.loggoogle.log
`, sourceURL: "http://mynode.com/logs/log.log", transport: testTransport, output: `
kubelet.loggoogle.log
`, contentType: "text/html", forwardedURI: "/proxy/node/node1:10250/logs/log.log", }, "content-type charset": { input: `
kubelet.loggoogle.log
`, sourceURL: "http://mynode.com/logs/log.log", transport: testTransport, output: `
kubelet.loggoogle.log
`, contentType: "text/html; charset=utf-8", forwardedURI: "/proxy/node/node1:10250/logs/log.log", }, "content-type passthrough": { input: `
kubelet.loggoogle.log
`, sourceURL: "http://mynode.com/logs/log.log", transport: testTransport, output: `
kubelet.loggoogle.log
`, contentType: "text/plain", forwardedURI: "/proxy/node/node1:10250/logs/log.log", }, "subdir": { input: `kubelet.loggoogle.log`, sourceURL: "http://mynode.com/whatever/apt/somelog.log", transport: testTransport2, output: `kubelet.loggoogle.log`, contentType: "text/html", forwardedURI: "/proxy/node/node1:8080/whatever/apt/somelog.log", }, "image": { input: `
`, sourceURL: "http://mynode.com/", transport: testTransport, output: `
`, contentType: "text/html", forwardedURI: "/proxy/node/node1:10250/", }, "abs": { input: `", transport: testTransport, output: "", contentType: "text/html", forwardedURI: "/proxy/node/node1:10250/logs/log.log%00%3Cscript%3Ealert%281%29%3C/script%3E", }, "redirect rel must be escaped": { sourceURL: "http://mynode.com/redirect", transport: testTransport, redirect: "/redirected/target/%00/", redirectWant: "http://foo.com/proxy/node/node1:10250/redirected/target/%00%3Cscript%3Ealert%281%29%3C/script%3E/", forwardedURI: "/proxy/node/node1:10250/redirect", }, "redirect abs same host must be escaped": { sourceURL: "http://mynode.com/redirect", transport: testTransport, redirect: "http://mynode.com/redirected/target/%00/", redirectWant: "http://foo.com/proxy/node/node1:10250/redirected/target/%00%3Cscript%3Ealert%281%29%3C/script%3E/", forwardedURI: "/proxy/node/node1:10250/redirect", }, "redirect abs other host must be escaped": { sourceURL: "http://mynode.com/redirect", transport: testTransport, redirect: "http://example.com/redirected/target/%00/", redirectWant: "http://example.com/redirected/target/%00%3Cscript%3Ealert%281%29%3C/script%3E/", forwardedURI: "/proxy/node/node1:10250/redirect", }, "redirect abs use reqHost no host no scheme must be escaped": { sourceURL: "http://mynode.com/redirect", transport: emptyHostAndSchemeTransport, redirect: "http://10.0.0.1:8001/redirected/target/%00/", redirectWant: "http://10.0.0.1:8001/proxy/node/node1:10250/redirected/target/%00%3Cscript%3Ealert%281%29%3C/script%3E/", forwardedURI: "/proxy/node/node1:10250/redirect", reqHost: "10.0.0.1:8001", }, } testItem := func(name string, item *Item) { server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { // Check request headers. if got, want := r.Header.Get("X-Forwarded-Uri"), item.forwardedURI; got != want { t.Errorf("%v: X-Forwarded-Uri = %q, want %q", name, got, want) } if len(item.transport.Host) == 0 { _, present := r.Header["X-Forwarded-Host"] if present { t.Errorf("%v: X-Forwarded-Host header should not be present", name) } } else { if got, want := r.Header.Get("X-Forwarded-Host"), item.transport.Host; got != want { t.Errorf("%v: X-Forwarded-Host = %q, want %q", name, got, want) } } if len(item.transport.Scheme) == 0 { _, present := r.Header["X-Forwarded-Proto"] if present { t.Errorf("%v: X-Forwarded-Proto header should not be present", name) } } else { if got, want := r.Header.Get("X-Forwarded-Proto"), item.transport.Scheme; got != want { t.Errorf("%v: X-Forwarded-Proto = %q, want %q", name, got, want) } } // Send response. if item.redirect != "" { http.Redirect(w, r, item.redirect, http.StatusMovedPermanently) return } w.Header().Set("Content-Type", item.contentType) fmt.Fprint(w, item.input) })) defer server.Close() // Replace source URL with our test server address. sourceURL := parseURLOrDie(item.sourceURL) serverURL := parseURLOrDie(server.URL) item.input = strings.Replace(item.input, sourceURL.Host, serverURL.Host, -1) item.redirect = strings.Replace(item.redirect, sourceURL.Host, serverURL.Host, -1) sourceURL.Host = serverURL.Host req, err := http.NewRequest("GET", sourceURL.String(), nil) if err != nil { t.Errorf("%v: Unexpected error: %v", name, err) return } if item.reqHost != "" { req.Host = item.reqHost } resp, err := item.transport.RoundTrip(req) if err != nil { t.Errorf("%v: Unexpected error: %v", name, err) return } if item.redirect != "" { // Check that redirect URLs get rewritten properly. if got, want := resp.Header.Get("Location"), item.redirectWant; got != want { t.Errorf("%v: Location header = %q, want %q", name, got, want) } return } body, err := ioutil.ReadAll(resp.Body) if err != nil { t.Errorf("%v: Unexpected error: %v", name, err) return } if e, a := item.output, string(body); e != a { t.Errorf("%v: expected %v, but got %v", name, e, a) } } for name, item := range table { testItem(name, &item) } } func TestRewriteResponse(t *testing.T) { gzipbuf := bytes.NewBuffer(nil) flatebuf := bytes.NewBuffer(nil) testTransport := &Transport{ Scheme: "http", Host: "foo.com", PathPrepend: "/proxy/node/node1:10250", } expected := []string{ "short body test", strings.Repeat("long body test", 4097), } test := []struct { encodeType string writer func(string) *http.Response reader func(*http.Response) string }{ { encodeType: "gzip", writer: func(ept string) *http.Response { gzw := gzip.NewWriter(gzipbuf) defer gzw.Close() gzw.Write([]byte(ept)) gzw.Flush() return &http.Response{ Body: ioutil.NopCloser(gzipbuf), } }, reader: func(rep *http.Response) string { reader, _ := gzip.NewReader(rep.Body) s, _ := ioutil.ReadAll(reader) return string(s) }, }, { encodeType: "deflate", writer: func(ept string) *http.Response { flw, _ := flate.NewWriter(flatebuf, flate.BestCompression) defer flw.Close() flw.Write([]byte(ept)) flw.Flush() return &http.Response{ Body: ioutil.NopCloser(flatebuf), } }, reader: func(rep *http.Response) string { reader := flate.NewReader(rep.Body) s, _ := ioutil.ReadAll(reader) return string(s) }, }, } errFn := func(encode string, err error) { t.Errorf("%s failed to read and write: %v", encode, err) } for _, v := range test { request, _ := http.NewRequest("GET", "http://mynode.com/", nil) request.Header.Set("Content-Encoding", v.encodeType) request.Header.Add("Accept-Encoding", v.encodeType) for _, exp := range expected { resp := v.writer(exp) gotResponse, err := testTransport.rewriteResponse(request, resp) if err != nil { errFn(v.encodeType, err) } result := v.reader(gotResponse) if result != exp { errFn(v.encodeType, fmt.Errorf("expected %s, get %s", exp, result)) } } } }