2020-03-05 21:55:20 +00:00
|
|
|
varnishtest "Check that the TLVs are properly validated"
|
|
|
|
|
2020-10-20 07:10:25 +00:00
|
|
|
#REQUIRE_VERSION=2.4
|
2020-03-31 14:36:20 +00:00
|
|
|
|
2020-03-05 21:55:20 +00:00
|
|
|
feature ignore_unknown_macro
|
|
|
|
|
|
|
|
# We need one HAProxy for each test, because apparently the connection by
|
|
|
|
# the client is reused, leading to connection resets.
|
|
|
|
|
2024-11-19 15:51:30 +00:00
|
|
|
haproxy h1 -conf {
|
2020-03-05 21:55:20 +00:00
|
|
|
defaults
|
|
|
|
mode http
|
2021-11-18 16:46:22 +00:00
|
|
|
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
|
2020-03-05 21:55:20 +00:00
|
|
|
|
|
|
|
frontend a
|
|
|
|
bind "fd@${fe1}" accept-proxy
|
|
|
|
http-after-response set-header echo %[fc_pp_authority,hex]
|
|
|
|
http-request return status 200
|
|
|
|
} -start
|
|
|
|
|
|
|
|
# Validate that a correct header passes
|
|
|
|
client c1 -connect ${h1_fe1_sock} {
|
|
|
|
# PROXY v2 signature
|
|
|
|
sendhex "0d 0a 0d 0a 00 0d 0a 51 55 49 54 0a"
|
|
|
|
# version + PROXY
|
|
|
|
sendhex "21"
|
|
|
|
# TCP4
|
|
|
|
sendhex "11"
|
|
|
|
# length of the address (12) + length of the TLV (8)
|
|
|
|
sendhex "00 14"
|
|
|
|
# 127.0.0.1 42 127.0.0.1 1337
|
|
|
|
sendhex "7F 00 00 01 7F 00 00 01 00 2A 05 39"
|
|
|
|
# PP2_TYPE_AUTHORITY + length of the value + "12345"
|
|
|
|
sendhex "02 00 05 31 32 33 34 35"
|
|
|
|
|
|
|
|
txreq -url "/"
|
|
|
|
rxresp
|
|
|
|
expect resp.http.echo == "3132333435"
|
|
|
|
} -run
|
|
|
|
|
2024-11-19 15:51:30 +00:00
|
|
|
haproxy h2 -conf {
|
2020-03-05 21:55:20 +00:00
|
|
|
defaults
|
|
|
|
mode http
|
2021-11-18 16:46:22 +00:00
|
|
|
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
|
2020-03-05 21:55:20 +00:00
|
|
|
|
|
|
|
frontend a
|
|
|
|
bind "fd@${fe1}" accept-proxy
|
|
|
|
http-after-response set-header echo %[fc_pp_authority,hex]
|
|
|
|
http-request return status 200
|
|
|
|
} -start
|
|
|
|
|
2020-10-20 07:10:25 +00:00
|
|
|
# Validate that a TLV after the end of the PROXYv2 header is not parsed
|
|
|
|
# and handle by the HTTP parser, leading to a 400 bad request error
|
2020-03-05 21:55:20 +00:00
|
|
|
client c2 -connect ${h2_fe1_sock} {
|
|
|
|
# PROXY v2 signature
|
|
|
|
sendhex "0d 0a 0d 0a 00 0d 0a 51 55 49 54 0a"
|
|
|
|
# version + PROXY
|
|
|
|
sendhex "21"
|
|
|
|
# TCP4
|
|
|
|
sendhex "11"
|
|
|
|
# length of the address (12) + length of the TLV (8)
|
|
|
|
sendhex "00 14"
|
|
|
|
# 127.0.0.1 42 127.0.0.1 1337
|
|
|
|
sendhex "7F 00 00 01 7F 00 00 01 00 2A 05 39"
|
|
|
|
# PP2_TYPE_AUTHORITY + length of the value + "12345"
|
|
|
|
sendhex "02 00 05 31 32 33 34 35"
|
|
|
|
# after the end of the PROXYv2 header: PP2_TYPE_AUTHORITY + length of the value + "54321"
|
|
|
|
sendhex "02 00 05 35 34 33 32 31"
|
|
|
|
|
|
|
|
txreq -url "/"
|
|
|
|
rxresp
|
2020-10-20 07:10:25 +00:00
|
|
|
expect resp.status == 400
|
|
|
|
expect resp.http.echo == <undef>
|
2020-03-05 21:55:20 +00:00
|
|
|
} -run
|
|
|
|
|
2024-11-19 15:51:30 +00:00
|
|
|
haproxy h3 -conf {
|
2020-03-05 21:55:20 +00:00
|
|
|
defaults
|
|
|
|
mode http
|
2021-11-18 16:46:22 +00:00
|
|
|
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
|
2020-03-05 21:55:20 +00:00
|
|
|
|
|
|
|
frontend a
|
|
|
|
bind "fd@${fe1}" accept-proxy
|
|
|
|
http-after-response set-header echo %[fc_pp_authority,hex]
|
|
|
|
http-request return status 200
|
|
|
|
} -start
|
|
|
|
|
|
|
|
# Validate that a TLV length exceeding the PROXYv2 length fails
|
|
|
|
client c3 -connect ${h3_fe1_sock} {
|
|
|
|
# PROXY v2 signature
|
|
|
|
sendhex "0d 0a 0d 0a 00 0d 0a 51 55 49 54 0a"
|
|
|
|
# version + PROXY
|
|
|
|
sendhex "21"
|
|
|
|
# TCP4
|
|
|
|
sendhex "11"
|
|
|
|
# length of the address (12) + too small length of the TLV (8)
|
|
|
|
sendhex "00 14"
|
|
|
|
# 127.0.0.1 42 127.0.0.1 1337
|
|
|
|
sendhex "7F 00 00 01 7F 00 00 01 00 2A 05 39"
|
|
|
|
# PP2_TYPE_AUTHORITY + length of the value + "1234512345"
|
|
|
|
sendhex "02 00 0A 31 32 33 34 35 31 32 33 34 35"
|
|
|
|
|
|
|
|
txreq -url "/"
|
|
|
|
expect_close
|
|
|
|
} -run
|
|
|
|
|
2024-11-19 15:51:30 +00:00
|
|
|
haproxy h4 -conf {
|
2020-03-05 21:55:20 +00:00
|
|
|
defaults
|
|
|
|
mode http
|
2021-11-18 16:46:22 +00:00
|
|
|
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
|
2020-03-05 21:55:20 +00:00
|
|
|
|
|
|
|
frontend a
|
|
|
|
bind "fd@${fe1}" accept-proxy
|
|
|
|
http-after-response set-header echo %[fc_pp_authority,hex]
|
|
|
|
http-request return status 200
|
|
|
|
} -start
|
|
|
|
|
|
|
|
# Validate that TLVs not ending with the PROXYv2 header fail
|
|
|
|
client c4 -connect ${h4_fe1_sock} {
|
|
|
|
# PROXY v2 signature
|
|
|
|
sendhex "0d 0a 0d 0a 00 0d 0a 51 55 49 54 0a"
|
|
|
|
# version + PROXY
|
|
|
|
sendhex "21"
|
|
|
|
# TCP4
|
|
|
|
sendhex "11"
|
|
|
|
# length of the address (12) + too big length of the TLV (8)
|
|
|
|
sendhex "00 14"
|
|
|
|
# 127.0.0.1 42 127.0.0.1 1337
|
|
|
|
sendhex "7F 00 00 01 7F 00 00 01 00 2A 05 39"
|
|
|
|
# PP2_TYPE_AUTHORITY + length of the value + "1234"
|
|
|
|
sendhex "02 00 04 31 32 33 34"
|
|
|
|
|
|
|
|
txreq -url "/"
|
|
|
|
expect_close
|
|
|
|
} -run
|