Skip to content

Commit 76c8e10

Browse files
committed
WIP Issue 3138 - Conformance Tests for BackendTLSPolicy - normative
1 parent 9787352 commit 76c8e10

File tree

5 files changed

+150
-10
lines changed

5 files changed

+150
-10
lines changed

conformance/echo-basic/echo-basic.go

+69-10
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,16 @@ import (
2323
"encoding/pem"
2424
"fmt"
2525
"io"
26+
"net"
2627
"net/http"
2728
"os"
2829
"regexp"
2930
"strconv"
3031
"strings"
3132
"time"
3233

34+
"github.com/paultag/sniff/parser"
35+
3336
"golang.org/x/net/http2"
3437
"golang.org/x/net/http2/h2c"
3538
"golang.org/x/net/websocket"
@@ -48,15 +51,19 @@ type RequestAssertions struct {
4851
Context `json:",inline"`
4952

5053
TLS *TLSAssertions `json:"tls,omitempty"`
54+
SNI string `json:"sni"`
5155
}
5256

5357
// TLSAssertions contains information about the TLS connection.
5458
type TLSAssertions struct {
55-
Version string `json:"version"`
56-
PeerCertificates []string `json:"peerCertificates,omitempty"`
57-
ServerName string `json:"serverName"`
58-
NegotiatedProtocol string `json:"negotiatedProtocol,omitempty"`
59-
CipherSuite string `json:"cipherSuite"`
59+
Version string `json:"version"`
60+
PeerCertificates []string `json:"peerCertificates,omitempty"`
61+
// ClientCertificates are used by the gateway to authorize itself to the backend.
62+
ClientCertificates []string `json:"clientCertificates,omitempty"`
63+
// ServerName is the SNI.
64+
ServerName string `json:"serverName"`
65+
NegotiatedProtocol string `json:"negotiatedProtocol,omitempty"`
66+
CipherSuite string `json:"cipherSuite"`
6067
}
6168

6269
type preserveSlashes struct {
@@ -109,6 +116,7 @@ func main() {
109116
httpMux.HandleFunc("/health", healthHandler)
110117
httpMux.HandleFunc("/status/", statusHandler)
111118
httpMux.HandleFunc("/", echoHandler)
119+
httpMux.HandleFunc("/backendTLS", echoHandler)
112120
httpMux.Handle("/ws", websocket.Handler(wsHandler))
113121
httpHandler := &preserveSlashes{httpMux}
114122

@@ -124,11 +132,14 @@ func main() {
124132

125133
go runH2CServer(h2cPort, errchan)
126134

127-
// Enable HTTPS if certificate and private key are given.
128-
if os.Getenv("TLS_SERVER_CERT") != "" && os.Getenv("TLS_SERVER_PRIVKEY") != "" {
135+
// Enable HTTPS if server certificate and private key are given. Enable secure backend if client certificate and key are given.
136+
if os.Getenv("TLS_SERVER_CERT") != "" && os.Getenv("TLS_SERVER_PRIVKEY") != "" ||
137+
os.Getenv("TLS_CLIENT_CERT") != "" && os.Getenv("TLS_CLIENT_KEY") != "" {
129138
go func() {
130139
fmt.Printf("Starting server, listening on port %s (https)\n", httpsPort)
131-
err := listenAndServeTLS(fmt.Sprintf(":%s", httpsPort), os.Getenv("TLS_SERVER_CERT"), os.Getenv("TLS_SERVER_PRIVKEY"), os.Getenv("TLS_CLIENT_CACERTS"), httpHandler)
140+
// TODO - probably don't need to pass these in.
141+
err := listenAndServeTLS(fmt.Sprintf(":%s", httpsPort), os.Getenv("TLS_SERVER_CERT"), os.Getenv("TLS_SERVER_PRIVKEY"),
142+
os.Getenv("TLS_CLIENT_CACERTS"), os.Getenv("TLS_CLIENT_CERT"), os.Getenv("TLS_CLIENT_KEY"), httpHandler)
132143
if err != nil {
133144
errchan <- err
134145
}
@@ -201,15 +212,27 @@ func runH2CServer(h2cPort string, errchan chan<- error) {
201212
}
202213

203214
func echoHandler(w http.ResponseWriter, r *http.Request) {
215+
var sni string
216+
204217
fmt.Printf("Echoing back request made to %s to client (%s)\n", r.RequestURI, r.RemoteAddr)
205218

206219
// If the request has form ?delay=[:duration] wait for duration
207220
// For example, ?delay=10s will cause the response to wait 10s before responding
208-
if err := delayResponse(r); err != nil {
221+
err := delayResponse(r)
222+
if err != nil {
209223
processError(w, err, http.StatusInternalServerError)
210224
return
211225
}
212226

227+
// If the request was made to URI backendTLS, then get the server name indication and
228+
// add it to the RequestAssertions. It will be echoed back later.
229+
if strings.Contains(r.RequestURI, "backendTLS") {
230+
sni, err = sniffForSNI(r.RemoteAddr)
231+
if err != nil {
232+
// Todo: research if for some test cases there won't be one
233+
}
234+
}
235+
213236
requestAssertions := RequestAssertions{
214237
r.RequestURI,
215238
r.Host,
@@ -220,6 +243,7 @@ func echoHandler(w http.ResponseWriter, r *http.Request) {
220243
context,
221244

222245
tlsStateToAssertions(r.TLS),
246+
sni,
223247
}
224248

225249
js, err := json.MarshalIndent(requestAssertions, "", " ")
@@ -232,6 +256,7 @@ func echoHandler(w http.ResponseWriter, r *http.Request) {
232256
w.Header().Set("Content-Type", "application/json")
233257
w.Header().Set("X-Content-Type-Options", "nosniff")
234258
_, _ = w.Write(js)
259+
235260
}
236261

237262
func writeEchoResponseHeaders(w http.ResponseWriter, headers http.Header) {
@@ -267,7 +292,7 @@ func processError(w http.ResponseWriter, err error, code int) { //nolint:unparam
267292
_, _ = w.Write(body)
268293
}
269294

270-
func listenAndServeTLS(addr string, serverCert string, serverPrivKey string, clientCA string, handler http.Handler) error {
295+
func listenAndServeTLS(addr string, serverCert string, serverPrivKey string, clientCA string, clientCert string, clientPrivKey string, handler http.Handler) error {
271296
var config tls.Config
272297

273298
// Optionally enable client certificate validation when client CA certificates are given.
@@ -296,6 +321,40 @@ func listenAndServeTLS(addr string, serverCert string, serverPrivKey string, cli
296321
return srv.ListenAndServeTLS(serverCert, serverPrivKey)
297322
}
298323

324+
// sniffForSNI uses the request address to listen for the incoming TLS connection,
325+
// and tries to find the server name indication from that connection.
326+
func sniffForSNI(addr string) (string, error) {
327+
var sni string
328+
329+
// Listen to get the SNI, and store in config.
330+
listener, err := net.Listen("tcp", addr)
331+
if err != nil {
332+
return "", err
333+
}
334+
defer listener.Close()
335+
336+
for {
337+
conn, err := listener.Accept()
338+
if err != nil {
339+
return "", err
340+
}
341+
data := make([]byte, 4096)
342+
_, err = conn.Read(data)
343+
if err != nil {
344+
return "", fmt.Errorf("could not read socket: %v", err)
345+
}
346+
// Take an incoming TLS Client Hello and return the SNI name.
347+
sni, err = parser.GetHostname(data[:])
348+
if err != nil {
349+
return "", fmt.Errorf("error getting SNI: %v", err)
350+
}
351+
if sni == "" {
352+
return "", fmt.Errorf("no server name indication found")
353+
}
354+
return sni, nil
355+
}
356+
}
357+
299358
func tlsStateToAssertions(connectionState *tls.ConnectionState) *TLSAssertions {
300359
if connectionState != nil {
301360
var state TLSAssertions

conformance/utils/kubernetes/certificate.go

+76
Original file line numberDiff line numberDiff line change
@@ -117,3 +117,79 @@ func generateRSACert(hosts []string, keyOut, certOut io.Writer) error {
117117

118118
return nil
119119
}
120+
121+
// MustCreateCASignedCertSecret will create a secret using a CA Certificate, and public and private key for that certificate.
122+
func MustCreateCASignedCertSecret(t *testing.T, namespace, secretName string, hosts []string) *corev1.Secret {
123+
require.NotEmpty(t, hosts, "require a non-empty hosts for Subject Alternate Name values")
124+
125+
var serverKey, serverCert bytes.Buffer
126+
127+
require.NoError(t, generateCACert(hosts, &serverKey, &serverCert), "failed to generate CA certificate")
128+
129+
data := map[string][]byte{
130+
corev1.TLSCertKey: serverCert.Bytes(),
131+
corev1.TLSPrivateKeyKey: serverKey.Bytes(),
132+
}
133+
134+
newSecret := &corev1.Secret{
135+
ObjectMeta: metav1.ObjectMeta{
136+
Namespace: namespace,
137+
Name: secretName,
138+
},
139+
Type: corev1.SecretTypeTLS,
140+
Data: data,
141+
}
142+
143+
return newSecret
144+
}
145+
146+
// generateCACert generates a CA Certificate signed certificate valid for a year.
147+
func generateCACert(hosts []string, keyOut, certOut io.Writer) error {
148+
// Create the CA certificate.
149+
ca := &x509.Certificate{
150+
SerialNumber: big.NewInt(2024),
151+
Subject: pkix.Name{
152+
Organization: []string{"Kubernetes Gateway API"},
153+
Country: []string{"US"},
154+
Province: []string{""},
155+
Locality: []string{"Boston"},
156+
StreetAddress: []string{"Melnea Cass Blvd"},
157+
PostalCode: []string{"02120"},
158+
},
159+
NotBefore: time.Now(),
160+
NotAfter: time.Now().AddDate(1, 0, 0),
161+
IsCA: true, // Indicates this is a CA Certificate.
162+
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
163+
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
164+
BasicConstraintsValid: true,
165+
}
166+
167+
for _, h := range hosts {
168+
if ip := net.ParseIP(h); ip != nil {
169+
ca.IPAddresses = append(ca.IPAddresses, ip)
170+
} else {
171+
ca.DNSNames = append(ca.DNSNames, h)
172+
}
173+
}
174+
175+
// Generate the private key.
176+
caPrivKey, err := rsa.GenerateKey(rand.Reader, rsaBits)
177+
if err != nil {
178+
return err
179+
}
180+
181+
// Generate the certificate using the CA certificate.
182+
caBytes, err := x509.CreateCertificate(rand.Reader, ca, ca, &caPrivKey.PublicKey, caPrivKey)
183+
if err != nil {
184+
return err
185+
}
186+
187+
if err := pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: caBytes}); err != nil {
188+
return fmt.Errorf("failed creating cert: %w", err)
189+
}
190+
191+
if err := pem.Encode(keyOut, &pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(caPrivKey)}); err != nil {
192+
return fmt.Errorf("failed creating key: %w", err)
193+
}
194+
return nil
195+
}

conformance/utils/suite/suite.go

+2
Original file line numberDiff line numberDiff line change
@@ -353,6 +353,8 @@ func (suite *ConformanceTestSuite) Setup(t *testing.T, tests []ConformanceTest)
353353
suite.Applier.MustApplyObjectsWithCleanup(t, suite.Client, suite.TimeoutConfig, []client.Object{secret}, suite.Cleanup)
354354
secret = kubernetes.MustCreateSelfSignedCertSecret(t, "gateway-conformance-app-backend", "tls-passthrough-checks-certificate", []string{"abc.example.com"})
355355
suite.Applier.MustApplyObjectsWithCleanup(t, suite.Client, suite.TimeoutConfig, []client.Object{secret}, suite.Cleanup)
356+
caSecret := kubernetes.MustCreateCASignedCertSecret(t, "gateway-conformance-infra", "backend-tls-checks-certificate", []string{"abc.example.com"})
357+
suite.Applier.MustApplyObjectsWithCleanup(t, suite.Client, suite.TimeoutConfig, []client.Object{caSecret}, suite.Cleanup)
356358

357359
tlog.Logf(t, "Test Setup: Ensuring Gateways and Pods from base manifests are ready")
358360
namespaces := []string{

go.mod

+1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ go 1.22.0
55
require (
66
github.com/ahmetb/gen-crd-api-reference-docs v0.3.0
77
github.com/miekg/dns v1.1.58
8+
github.com/paultag/sniff v0.0.0-20200207005214-cf7e4d167732
89
github.com/stretchr/testify v1.9.0
910
golang.org/x/net v0.24.0
1011
golang.org/x/sync v0.7.0

go.sum

+2
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,8 @@ github.com/onsi/ginkgo/v2 v2.17.1 h1:V++EzdbhI4ZV4ev0UTIj0PzhzOcReJFyJaLjtSF55M8
9797
github.com/onsi/ginkgo/v2 v2.17.1/go.mod h1:llBI3WDLL9Z6taip6f33H76YcWtJv+7R3HigUjbIBOs=
9898
github.com/onsi/gomega v1.33.0 h1:snPCflnZrpMsy94p4lXVEkHo12lmPnc3vY5XBbreexE=
9999
github.com/onsi/gomega v1.33.0/go.mod h1:+925n5YtiFsLzzafLUHzVMBpvvRAzrydIBiSIxjX3wY=
100+
github.com/paultag/sniff v0.0.0-20200207005214-cf7e4d167732 h1:nkseUkzjazCNyGhkRwnJ1OiHSwMXazsJQx+Ci+oVLEM=
101+
github.com/paultag/sniff v0.0.0-20200207005214-cf7e4d167732/go.mod h1:J3XXNGJINXLa4yIivdUT0Ad/srv2q0pSOWbbm6El2EY=
100102
github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
101103
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
102104
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=

0 commit comments

Comments
 (0)