2023-08-22 15:01:57 +00:00
|
|
|
varnishtest "Reverse server with a name parameter test"
|
|
|
|
feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL)'"
|
|
|
|
feature ignore_unknown_macro
|
|
|
|
|
2024-03-29 16:12:47 +00:00
|
|
|
feature cmd "$HAPROXY_PROGRAM -cc 'version_atleast(2.9-dev0)'"
|
2023-08-22 15:01:57 +00:00
|
|
|
|
|
|
|
barrier b1 cond 2
|
|
|
|
|
2024-11-19 15:51:30 +00:00
|
|
|
haproxy h_edge -conf {
|
2023-11-30 13:28:47 +00:00
|
|
|
global
|
|
|
|
expose-experimental-directives
|
|
|
|
|
2023-08-22 15:01:57 +00:00
|
|
|
defaults
|
|
|
|
log global
|
|
|
|
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
mode http
|
|
|
|
|
|
|
|
frontend pub
|
|
|
|
bind "fd@${pub}"
|
|
|
|
use_backend be-reverse
|
|
|
|
|
|
|
|
backend be-reverse
|
2023-10-20 09:34:46 +00:00
|
|
|
server dev rhttp@ ssl sni hdr(x-name) verify none
|
2023-08-22 15:01:57 +00:00
|
|
|
|
|
|
|
frontend priv
|
|
|
|
bind "fd@${priv}" ssl crt ${testdir}/common.pem verify required ca-verify-file ${testdir}/ca-auth.crt alpn h2
|
|
|
|
tcp-request session attach-srv be-reverse/dev name ssl_c_s_dn(CN)
|
|
|
|
} -start
|
|
|
|
|
|
|
|
# Simple clear <-> SSL bridge between clients and h_edge haproxy
|
|
|
|
# Used certificate has the name "client1"
|
2024-11-19 15:51:30 +00:00
|
|
|
haproxy h_ssl_bridge -conf {
|
2023-08-22 15:01:57 +00:00
|
|
|
defaults
|
|
|
|
log global
|
|
|
|
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
|
|
|
|
mode tcp
|
|
|
|
|
|
|
|
listen li
|
|
|
|
bind "fd@${li}"
|
|
|
|
server h_edge "${h_edge_priv_addr}:${h_edge_priv_port}" ssl crt ${testdir}/client1.pem verify none alpn h2
|
|
|
|
} -start
|
|
|
|
|
|
|
|
# Run a client through private endpoint
|
|
|
|
# Connection will be attached to the reverse server
|
|
|
|
client c_dev -connect ${h_ssl_bridge_li_sock} {
|
|
|
|
txpri
|
|
|
|
|
|
|
|
stream 0 {
|
|
|
|
txsettings
|
|
|
|
rxsettings
|
|
|
|
txsettings -ack
|
|
|
|
rxsettings
|
|
|
|
expect settings.ack == true
|
|
|
|
} -run
|
|
|
|
|
|
|
|
barrier b1 sync
|
|
|
|
stream 1 {
|
|
|
|
rxhdrs
|
|
|
|
} -run
|
|
|
|
|
|
|
|
sendhex "000004 01 05 00000001 88 5c 01 30"
|
|
|
|
} -start
|
|
|
|
|
|
|
|
# Wait for dev client to be ready to process connection
|
|
|
|
barrier b1 sync
|
|
|
|
|
|
|
|
# Run a client through public endpoint
|
|
|
|
# Use a different name than the client certificate thus resulting in a 503
|
|
|
|
client c1 -connect ${h_edge_pub_sock} {
|
|
|
|
txreq -url "/" \
|
|
|
|
-hdr "x-name: client99"
|
|
|
|
rxresp
|
|
|
|
expect resp.status == 503
|
|
|
|
} -run
|
|
|
|
|
|
|
|
# Run a client through public endpoint
|
|
|
|
# Use the correct name
|
|
|
|
client c2 -connect ${h_edge_pub_sock} {
|
|
|
|
txreq -url "/" \
|
|
|
|
-hdr "x-name: client1"
|
|
|
|
rxresp
|
|
|
|
expect resp.status == 200
|
|
|
|
} -run
|