mirror of
https://github.com/caddyserver/caddy.git
synced 2026-04-24 01:49:32 -04:00
Some checks failed
Tests / test (./cmd/caddy/caddy, ~1.26.0, ubuntu-latest, 0, 1.26, linux) (push) Failing after 15m2s
Tests / test (s390x on IBM Z) (push) Has been skipped
Tests / goreleaser-check (push) Has been skipped
Cross-Build / build (~1.26.0, 1.26, aix) (push) Failing after 11m36s
Cross-Build / build (~1.26.0, 1.26, darwin) (push) Successful in 1m32s
Cross-Build / build (~1.26.0, 1.26, dragonfly) (push) Failing after 2m3s
Cross-Build / build (~1.26.0, 1.26, freebsd) (push) Failing after 2m2s
Cross-Build / build (~1.26.0, 1.26, illumos) (push) Failing after 11m12s
Cross-Build / build (~1.26.0, 1.26, linux) (push) Successful in 6m45s
Cross-Build / build (~1.26.0, 1.26, netbsd) (push) Failing after 2m3s
Cross-Build / build (~1.26.0, 1.26, openbsd) (push) Successful in 1m57s
Cross-Build / build (~1.26.0, 1.26, solaris) (push) Failing after 56s
Cross-Build / build (~1.26.0, 1.26, windows) (push) Failing after 51s
Lint / lint (ubuntu-latest, linux) (push) Failing after 1m24s
Lint / govulncheck (push) Failing after 1m51s
Lint / dependency-review (push) Failing after 3m55s
OpenSSF Scorecard supply-chain security / Scorecard analysis (push) Failing after 20s
Tests / test (./cmd/caddy/caddy, ~1.26.0, macos-14, 0, 1.26, mac) (push) Has been cancelled
Tests / test (./cmd/caddy/caddy.exe, ~1.26.0, windows-latest, True, 1.26, windows) (push) Has been cancelled
Lint / lint (macos-14, mac) (push) Has been cancelled
Lint / lint (windows-latest, windows) (push) Has been cancelled
796 lines
18 KiB
Go
796 lines
18 KiB
Go
package integration
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"runtime"
|
|
"strings"
|
|
"sync/atomic"
|
|
"testing"
|
|
|
|
"github.com/caddyserver/caddy/v2/caddytest"
|
|
)
|
|
|
|
func TestSRVReverseProxy(t *testing.T) {
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(`
|
|
{
|
|
"admin": {
|
|
"listen": "localhost:2999"
|
|
},
|
|
"apps": {
|
|
"pki": {
|
|
"certificate_authorities": {
|
|
"local": {
|
|
"install_trust": false
|
|
}
|
|
}
|
|
},
|
|
"http": {
|
|
"grace_period": 1,
|
|
"servers": {
|
|
"srv0": {
|
|
"listen": [
|
|
":18080"
|
|
],
|
|
"routes": [
|
|
{
|
|
"handle": [
|
|
{
|
|
"handler": "reverse_proxy",
|
|
"dynamic_upstreams": {
|
|
"source": "srv",
|
|
"name": "srv.host.service.consul"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
`, "json")
|
|
}
|
|
|
|
func TestDialWithPlaceholderUnix(t *testing.T) {
|
|
if runtime.GOOS == "windows" {
|
|
t.SkipNow()
|
|
}
|
|
|
|
f, err := os.CreateTemp("", "*.sock")
|
|
if err != nil {
|
|
t.Errorf("failed to create TempFile: %s", err)
|
|
return
|
|
}
|
|
// a hack to get a file name within a valid path to use as socket
|
|
socketName := f.Name()
|
|
os.Remove(f.Name())
|
|
|
|
server := http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
w.Write([]byte("Hello, World!"))
|
|
}),
|
|
}
|
|
|
|
unixListener, err := net.Listen("unix", socketName)
|
|
if err != nil {
|
|
t.Errorf("failed to listen on the socket: %s", err)
|
|
return
|
|
}
|
|
go server.Serve(unixListener)
|
|
t.Cleanup(func() {
|
|
server.Close()
|
|
})
|
|
runtime.Gosched() // Allow other goroutines to run
|
|
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(`
|
|
{
|
|
"admin": {
|
|
"listen": "localhost:2999"
|
|
},
|
|
"apps": {
|
|
"pki": {
|
|
"certificate_authorities": {
|
|
"local": {
|
|
"install_trust": false
|
|
}
|
|
}
|
|
},
|
|
"http": {
|
|
"grace_period": 1,
|
|
"servers": {
|
|
"srv0": {
|
|
"listen": [
|
|
":18080"
|
|
],
|
|
"routes": [
|
|
{
|
|
"handle": [
|
|
{
|
|
"handler": "reverse_proxy",
|
|
"upstreams": [
|
|
{
|
|
"dial": "unix/{http.request.header.X-Caddy-Upstream-Dial}"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
`, "json")
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "http://localhost:18080", nil)
|
|
if err != nil {
|
|
t.Fail()
|
|
return
|
|
}
|
|
req.Header.Set("X-Caddy-Upstream-Dial", socketName)
|
|
tester.AssertResponse(req, 200, "Hello, World!")
|
|
}
|
|
|
|
func TestReverseProxyWithPlaceholderDialAddress(t *testing.T) {
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(`
|
|
{
|
|
"admin": {
|
|
"listen": "localhost:2999"
|
|
},
|
|
"apps": {
|
|
"pki": {
|
|
"certificate_authorities": {
|
|
"local": {
|
|
"install_trust": false
|
|
}
|
|
}
|
|
},
|
|
"http": {
|
|
"grace_period": 1,
|
|
"servers": {
|
|
"srv0": {
|
|
"listen": [
|
|
":18080"
|
|
],
|
|
"routes": [
|
|
{
|
|
"match": [
|
|
{
|
|
"host": [
|
|
"localhost"
|
|
]
|
|
}
|
|
],
|
|
"handle": [
|
|
{
|
|
"handler": "static_response",
|
|
"body": "Hello, World!"
|
|
}
|
|
],
|
|
"terminal": true
|
|
}
|
|
],
|
|
"automatic_https": {
|
|
"skip": [
|
|
"localhost"
|
|
]
|
|
}
|
|
},
|
|
"srv1": {
|
|
"listen": [
|
|
":9080"
|
|
],
|
|
"routes": [
|
|
{
|
|
"match": [
|
|
{
|
|
"host": [
|
|
"localhost"
|
|
]
|
|
}
|
|
],
|
|
"handle": [
|
|
{
|
|
|
|
"handler": "reverse_proxy",
|
|
"upstreams": [
|
|
{
|
|
"dial": "{http.request.header.X-Caddy-Upstream-Dial}"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"terminal": true
|
|
}
|
|
],
|
|
"automatic_https": {
|
|
"skip": [
|
|
"localhost"
|
|
]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
`, "json")
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "http://localhost:9080", nil)
|
|
if err != nil {
|
|
t.Fail()
|
|
return
|
|
}
|
|
req.Header.Set("X-Caddy-Upstream-Dial", "localhost:18080")
|
|
tester.AssertResponse(req, 200, "Hello, World!")
|
|
}
|
|
|
|
func TestReverseProxyWithPlaceholderTCPDialAddress(t *testing.T) {
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(`
|
|
{
|
|
"admin": {
|
|
"listen": "localhost:2999"
|
|
},
|
|
"apps": {
|
|
"pki": {
|
|
"certificate_authorities": {
|
|
"local": {
|
|
"install_trust": false
|
|
}
|
|
}
|
|
},
|
|
"http": {
|
|
"grace_period": 1,
|
|
"servers": {
|
|
"srv0": {
|
|
"listen": [
|
|
":18080"
|
|
],
|
|
"routes": [
|
|
{
|
|
"match": [
|
|
{
|
|
"host": [
|
|
"localhost"
|
|
]
|
|
}
|
|
],
|
|
"handle": [
|
|
{
|
|
"handler": "static_response",
|
|
"body": "Hello, World!"
|
|
}
|
|
],
|
|
"terminal": true
|
|
}
|
|
],
|
|
"automatic_https": {
|
|
"skip": [
|
|
"localhost"
|
|
]
|
|
}
|
|
},
|
|
"srv1": {
|
|
"listen": [
|
|
":9080"
|
|
],
|
|
"routes": [
|
|
{
|
|
"match": [
|
|
{
|
|
"host": [
|
|
"localhost"
|
|
]
|
|
}
|
|
],
|
|
"handle": [
|
|
{
|
|
|
|
"handler": "reverse_proxy",
|
|
"upstreams": [
|
|
{
|
|
"dial": "tcp/{http.request.header.X-Caddy-Upstream-Dial}:18080"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"terminal": true
|
|
}
|
|
],
|
|
"automatic_https": {
|
|
"skip": [
|
|
"localhost"
|
|
]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
`, "json")
|
|
|
|
req, err := http.NewRequest(http.MethodGet, "http://localhost:9080", nil)
|
|
if err != nil {
|
|
t.Fail()
|
|
return
|
|
}
|
|
req.Header.Set("X-Caddy-Upstream-Dial", "localhost")
|
|
tester.AssertResponse(req, 200, "Hello, World!")
|
|
}
|
|
|
|
func TestReverseProxyHealthCheck(t *testing.T) {
|
|
// Start lightweight backend servers so they're ready before Caddy's
|
|
// active health checker runs; this avoids a startup race where the
|
|
// health checker probes backends that haven't yet begun accepting
|
|
// connections and marks them unhealthy.
|
|
//
|
|
// This mirrors how health checks are typically used in practice (to a separate
|
|
// backend service) and avoids probing the same Caddy instance while it's still
|
|
// provisioning and not ready to accept connections.
|
|
|
|
// backend server that responds to proxied requests
|
|
helloSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
_, _ = w.Write([]byte("Hello, World!"))
|
|
}),
|
|
}
|
|
ln0, err := net.Listen("tcp", "127.0.0.1:2020")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen on 127.0.0.1:2020: %v", err)
|
|
}
|
|
go helloSrv.Serve(ln0)
|
|
t.Cleanup(func() { helloSrv.Close(); ln0.Close() })
|
|
|
|
// backend server that serves health checks
|
|
healthSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
_, _ = w.Write([]byte("ok"))
|
|
}),
|
|
}
|
|
ln1, err := net.Listen("tcp", "127.0.0.1:2021")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen on 127.0.0.1:2021: %v", err)
|
|
}
|
|
go healthSrv.Serve(ln1)
|
|
t.Cleanup(func() { healthSrv.Close(); ln1.Close() })
|
|
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy {
|
|
to localhost:2020
|
|
|
|
health_uri /health
|
|
health_port 2021
|
|
health_interval 10ms
|
|
health_timeout 100ms
|
|
health_passes 1
|
|
health_fails 1
|
|
}
|
|
}
|
|
`, "caddyfile")
|
|
tester.AssertGetResponse("http://localhost:9080/", 200, "Hello, World!")
|
|
}
|
|
|
|
// TestReverseProxyHealthCheckPortUsed verifies that health_port is actually
|
|
// used for active health checks and not the upstream's main port. This is a
|
|
// regression test for https://github.com/caddyserver/caddy/issues/7524.
|
|
func TestReverseProxyHealthCheckPortUsed(t *testing.T) {
|
|
// upstream server: serves proxied requests normally, but returns 503 for
|
|
// /health so that if health checks mistakenly hit this port the upstream
|
|
// gets marked unhealthy and the proxy returns 503.
|
|
upstreamSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
if req.URL.Path == "/health" {
|
|
w.WriteHeader(http.StatusServiceUnavailable)
|
|
return
|
|
}
|
|
_, _ = w.Write([]byte("Hello, World!"))
|
|
}),
|
|
}
|
|
ln0, err := net.Listen("tcp", "127.0.0.1:2022")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen on 127.0.0.1:2022: %v", err)
|
|
}
|
|
go upstreamSrv.Serve(ln0)
|
|
t.Cleanup(func() { upstreamSrv.Close(); ln0.Close() })
|
|
|
|
// separate health check server on the configured health_port: returns 200
|
|
// so the upstream is marked healthy only if health checks go to this port.
|
|
healthSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
_, _ = w.Write([]byte("ok"))
|
|
}),
|
|
}
|
|
ln1, err := net.Listen("tcp", "127.0.0.1:2023")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen on 127.0.0.1:2023: %v", err)
|
|
}
|
|
go healthSrv.Serve(ln1)
|
|
t.Cleanup(func() { healthSrv.Close(); ln1.Close() })
|
|
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy {
|
|
to localhost:2022
|
|
|
|
health_uri /health
|
|
health_port 2023
|
|
health_interval 10ms
|
|
health_timeout 100ms
|
|
health_passes 1
|
|
health_fails 1
|
|
}
|
|
}
|
|
`, "caddyfile")
|
|
tester.AssertGetResponse("http://localhost:9080/", 200, "Hello, World!")
|
|
}
|
|
|
|
func TestReverseProxyHealthCheckUnixSocket(t *testing.T) {
|
|
if runtime.GOOS == "windows" {
|
|
t.SkipNow()
|
|
}
|
|
tester := caddytest.NewTester(t)
|
|
f, err := os.CreateTemp("", "*.sock")
|
|
if err != nil {
|
|
t.Errorf("failed to create TempFile: %s", err)
|
|
return
|
|
}
|
|
// a hack to get a file name within a valid path to use as socket
|
|
socketName := f.Name()
|
|
os.Remove(f.Name())
|
|
|
|
server := http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
if strings.HasPrefix(req.URL.Path, "/health") {
|
|
w.Write([]byte("ok"))
|
|
return
|
|
}
|
|
w.Write([]byte("Hello, World!"))
|
|
}),
|
|
}
|
|
|
|
unixListener, err := net.Listen("unix", socketName)
|
|
if err != nil {
|
|
t.Errorf("failed to listen on the socket: %s", err)
|
|
return
|
|
}
|
|
go server.Serve(unixListener)
|
|
t.Cleanup(func() {
|
|
server.Close()
|
|
})
|
|
runtime.Gosched() // Allow other goroutines to run
|
|
|
|
tester.InitServer(fmt.Sprintf(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy {
|
|
to unix/%s
|
|
|
|
health_uri /health
|
|
health_port 2021
|
|
health_interval 2s
|
|
health_timeout 5s
|
|
}
|
|
}
|
|
`, socketName), "caddyfile")
|
|
|
|
tester.AssertGetResponse("http://localhost:9080/", 200, "Hello, World!")
|
|
}
|
|
|
|
func TestReverseProxyHealthCheckUnixSocketWithoutPort(t *testing.T) {
|
|
if runtime.GOOS == "windows" {
|
|
t.SkipNow()
|
|
}
|
|
tester := caddytest.NewTester(t)
|
|
f, err := os.CreateTemp("", "*.sock")
|
|
if err != nil {
|
|
t.Errorf("failed to create TempFile: %s", err)
|
|
return
|
|
}
|
|
// a hack to get a file name within a valid path to use as socket
|
|
socketName := f.Name()
|
|
os.Remove(f.Name())
|
|
|
|
server := http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
if strings.HasPrefix(req.URL.Path, "/health") {
|
|
w.Write([]byte("ok"))
|
|
return
|
|
}
|
|
w.Write([]byte("Hello, World!"))
|
|
}),
|
|
}
|
|
|
|
unixListener, err := net.Listen("unix", socketName)
|
|
if err != nil {
|
|
t.Errorf("failed to listen on the socket: %s", err)
|
|
return
|
|
}
|
|
go server.Serve(unixListener)
|
|
t.Cleanup(func() {
|
|
server.Close()
|
|
})
|
|
runtime.Gosched() // Allow other goroutines to run
|
|
|
|
tester.InitServer(fmt.Sprintf(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy {
|
|
to unix/%s
|
|
|
|
health_uri /health
|
|
health_interval 2s
|
|
health_timeout 5s
|
|
}
|
|
}
|
|
`, socketName), "caddyfile")
|
|
|
|
tester.AssertGetResponse("http://localhost:9080/", 200, "Hello, World!")
|
|
}
|
|
|
|
// TestReverseProxyRetryMatchStatusCode verifies that lb_retry_match with a
|
|
// CEL expression matching on {rp.status_code} causes the request to be
|
|
// retried on the next upstream when the first upstream returns a matching
|
|
// status code
|
|
func TestReverseProxyRetryMatchStatusCode(t *testing.T) {
|
|
// Bad upstream: returns 502
|
|
badSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusBadGateway)
|
|
}),
|
|
}
|
|
badLn, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
go badSrv.Serve(badLn)
|
|
t.Cleanup(func() { badSrv.Close(); badLn.Close() })
|
|
|
|
// Good upstream: returns 200
|
|
goodSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Write([]byte("ok"))
|
|
}),
|
|
}
|
|
goodLn, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
go goodSrv.Serve(goodLn)
|
|
t.Cleanup(func() { goodSrv.Close(); goodLn.Close() })
|
|
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(fmt.Sprintf(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy %s %s {
|
|
lb_policy round_robin
|
|
lb_retries 1
|
|
lb_retry_match {
|
|
expression `+"`{rp.status_code} in [502, 503]`"+`
|
|
}
|
|
}
|
|
}
|
|
`, goodLn.Addr().String(), badLn.Addr().String()), "caddyfile")
|
|
|
|
tester.AssertGetResponse("http://localhost:9080/", 200, "ok")
|
|
}
|
|
|
|
// TestReverseProxyRetryMatchHeader verifies that lb_retry_match with a CEL
|
|
// expression matching on {rp.header.*} causes the request to be retried when
|
|
// the upstream sets a matching response header
|
|
func TestReverseProxyRetryMatchHeader(t *testing.T) {
|
|
var badHits atomic.Int32
|
|
|
|
// Bad upstream: returns 200 but signals retry via header
|
|
badSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
badHits.Add(1)
|
|
w.Header().Set("X-Upstream-Retry", "true")
|
|
w.Write([]byte("bad"))
|
|
}),
|
|
}
|
|
badLn, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
go badSrv.Serve(badLn)
|
|
t.Cleanup(func() { badSrv.Close(); badLn.Close() })
|
|
|
|
// Good upstream: returns 200 without retry header
|
|
goodSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Write([]byte("good"))
|
|
}),
|
|
}
|
|
goodLn, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
go goodSrv.Serve(goodLn)
|
|
t.Cleanup(func() { goodSrv.Close(); goodLn.Close() })
|
|
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(fmt.Sprintf(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy %s %s {
|
|
lb_policy round_robin
|
|
lb_retries 1
|
|
lb_retry_match {
|
|
expression `+"`{rp.header.X-Upstream-Retry} == \"true\"`"+`
|
|
}
|
|
}
|
|
}
|
|
`, goodLn.Addr().String(), badLn.Addr().String()), "caddyfile")
|
|
|
|
tester.AssertGetResponse("http://localhost:9080/", 200, "good")
|
|
|
|
if badHits.Load() != 1 {
|
|
t.Errorf("bad upstream hits: got %d, want 1", badHits.Load())
|
|
}
|
|
}
|
|
|
|
// TestReverseProxyRetryMatchCombined verifies that a CEL expression combining
|
|
// request path matching with response status code matching works correctly -
|
|
// only retrying when both conditions are met
|
|
func TestReverseProxyRetryMatchCombined(t *testing.T) {
|
|
// Upstream: returns 502 for all requests
|
|
srv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusBadGateway)
|
|
}),
|
|
}
|
|
ln, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
go srv.Serve(ln)
|
|
t.Cleanup(func() { srv.Close(); ln.Close() })
|
|
|
|
// Good upstream
|
|
goodSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Write([]byte("ok"))
|
|
}),
|
|
}
|
|
goodLn, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
go goodSrv.Serve(goodLn)
|
|
t.Cleanup(func() { goodSrv.Close(); goodLn.Close() })
|
|
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(fmt.Sprintf(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy %s %s {
|
|
lb_policy round_robin
|
|
lb_retries 1
|
|
lb_retry_match {
|
|
expression `+"`path('/retry*') && {rp.status_code} in [502, 503]`"+`
|
|
}
|
|
}
|
|
}
|
|
`, goodLn.Addr().String(), ln.Addr().String()), "caddyfile")
|
|
|
|
// /retry path matches the expression - should retry to good upstream
|
|
tester.AssertGetResponse("http://localhost:9080/retry", 200, "ok")
|
|
|
|
// /other path does NOT match - should return the 502
|
|
req, _ := http.NewRequest(http.MethodGet, "http://localhost:9080/other", nil)
|
|
tester.AssertResponse(req, 502, "")
|
|
}
|
|
|
|
// TestReverseProxyRetryMatchIsTransportError verifies that the
|
|
// {rp.is_transport_error} == true CEL function correctly identifies transport errors
|
|
// and allows retrying them alongside response-based matching
|
|
func TestReverseProxyRetryMatchIsTransportError(t *testing.T) {
|
|
// Good upstream: returns 200
|
|
goodSrv := &http.Server{
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.Write([]byte("ok"))
|
|
}),
|
|
}
|
|
goodLn, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
go goodSrv.Serve(goodLn)
|
|
t.Cleanup(func() { goodSrv.Close(); goodLn.Close() })
|
|
|
|
// Broken upstream: accepts connections but closes immediately
|
|
brokenLn, err := net.Listen("tcp", "127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatalf("failed to listen: %v", err)
|
|
}
|
|
t.Cleanup(func() { brokenLn.Close() })
|
|
go func() {
|
|
for {
|
|
conn, err := brokenLn.Accept()
|
|
if err != nil {
|
|
return
|
|
}
|
|
conn.Close()
|
|
}
|
|
}()
|
|
|
|
tester := caddytest.NewTester(t)
|
|
tester.InitServer(fmt.Sprintf(`
|
|
{
|
|
skip_install_trust
|
|
admin localhost:2999
|
|
http_port 9080
|
|
https_port 9443
|
|
grace_period 1ns
|
|
}
|
|
http://localhost:9080 {
|
|
reverse_proxy %s %s {
|
|
lb_policy round_robin
|
|
lb_retries 1
|
|
lb_retry_match {
|
|
expression `+"`{rp.is_transport_error} || {rp.status_code} in [502, 503]`"+`
|
|
}
|
|
}
|
|
}
|
|
`, goodLn.Addr().String(), brokenLn.Addr().String()), "caddyfile")
|
|
|
|
// Transport error on broken upstream should be retried to good upstream
|
|
tester.AssertGetResponse("http://localhost:9080/", 200, "ok")
|
|
}
|