etcd_tls_test.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270
  1. // +build ignore
  2. package test
  3. import (
  4. "crypto/tls"
  5. "crypto/x509"
  6. "errors"
  7. "fmt"
  8. "io/ioutil"
  9. "net/http"
  10. "net/url"
  11. "os"
  12. "strings"
  13. "testing"
  14. "time"
  15. )
  16. // TestTLSOff asserts that non-TLS-encrypted communication between the
  17. // etcd server and an unauthenticated client works
  18. func TestTLSOff(t *testing.T) {
  19. proc, err := startServer([]string{})
  20. if err != nil {
  21. t.Fatal(err.Error())
  22. }
  23. defer stopServer(proc)
  24. client := buildClient()
  25. err = assertServerFunctional(client, "http")
  26. if err != nil {
  27. t.Fatal(err.Error())
  28. }
  29. }
  30. // TestTLSAnonymousClient asserts that TLS-encrypted communication between the etcd
  31. // server and an anonymous client works
  32. func TestTLSAnonymousClient(t *testing.T) {
  33. proc, err := startServer([]string{
  34. "-cert-file=../../fixtures/ca/server.crt",
  35. "-key-file=../../fixtures/ca/server.key.insecure",
  36. })
  37. if err != nil {
  38. t.Fatal(err.Error())
  39. }
  40. defer stopServer(proc)
  41. cacertfile := "../../fixtures/ca/ca.crt"
  42. cp := x509.NewCertPool()
  43. bytes, err := ioutil.ReadFile(cacertfile)
  44. if err != nil {
  45. panic(err)
  46. }
  47. cp.AppendCertsFromPEM(bytes)
  48. cfg := tls.Config{}
  49. cfg.RootCAs = cp
  50. client := buildTLSClient(&cfg)
  51. err = assertServerFunctional(client, "https")
  52. if err != nil {
  53. t.Fatal(err)
  54. }
  55. }
  56. // TestTLSAuthenticatedClient asserts that TLS-encrypted communication
  57. // between the etcd server and an authenticated client works
  58. func TestTLSAuthenticatedClient(t *testing.T) {
  59. proc, err := startServer([]string{
  60. "-cert-file=../../fixtures/ca/server.crt",
  61. "-key-file=../../fixtures/ca/server.key.insecure",
  62. "-ca-file=../../fixtures/ca/ca.crt",
  63. })
  64. if err != nil {
  65. t.Fatal(err.Error())
  66. }
  67. defer stopServer(proc)
  68. cacertfile := "../../fixtures/ca/ca.crt"
  69. certfile := "../../fixtures/ca/server2.crt"
  70. keyfile := "../../fixtures/ca/server2.key.insecure"
  71. cert, err := tls.LoadX509KeyPair(certfile, keyfile)
  72. if err != nil {
  73. panic(err)
  74. }
  75. cp := x509.NewCertPool()
  76. bytes, err := ioutil.ReadFile(cacertfile)
  77. if err != nil {
  78. panic(err)
  79. }
  80. cp.AppendCertsFromPEM(bytes)
  81. cfg := tls.Config{}
  82. cfg.Certificates = []tls.Certificate{cert}
  83. cfg.RootCAs = cp
  84. time.Sleep(time.Second)
  85. client := buildTLSClient(&cfg)
  86. err = assertServerFunctional(client, "https")
  87. if err != nil {
  88. t.Fatal(err)
  89. }
  90. }
  91. // TestTLSUnathenticatedClient asserts that TLS-encrypted communication
  92. // between the etcd server and an unauthenticated client fails
  93. func TestTLSUnauthenticatedClient(t *testing.T) {
  94. proc, err := startServer([]string{
  95. "-cert-file=../../fixtures/ca/server.crt",
  96. "-key-file=../../fixtures/ca/server.key.insecure",
  97. "-ca-file=../../fixtures/ca/ca.crt",
  98. })
  99. if err != nil {
  100. t.Fatal(err.Error())
  101. }
  102. defer stopServer(proc)
  103. cacertfile := "../../fixtures/ca/ca.crt"
  104. certfile := "../../fixtures/ca/broken_server.crt"
  105. keyfile := "../../fixtures/ca/broken_server.key.insecure"
  106. cert, err := tls.LoadX509KeyPair(certfile, keyfile)
  107. if err != nil {
  108. panic(err)
  109. }
  110. cp := x509.NewCertPool()
  111. bytes, err := ioutil.ReadFile(cacertfile)
  112. if err != nil {
  113. panic(err)
  114. }
  115. cp.AppendCertsFromPEM(bytes)
  116. cfg := tls.Config{}
  117. cfg.Certificates = []tls.Certificate{cert}
  118. cfg.RootCAs = cp
  119. time.Sleep(time.Second)
  120. client := buildTLSClient(&cfg)
  121. err = assertServerNotFunctional(client, "https")
  122. if err != nil {
  123. t.Fatal(err)
  124. }
  125. }
  126. func buildClient() http.Client {
  127. return http.Client{}
  128. }
  129. func buildTLSClient(tlsConf *tls.Config) http.Client {
  130. tr := http.Transport{TLSClientConfig: tlsConf}
  131. return http.Client{Transport: &tr}
  132. }
  133. func startServer(extra []string) (*os.Process, error) {
  134. procAttr := new(os.ProcAttr)
  135. procAttr.Files = []*os.File{nil, os.Stdout, os.Stderr}
  136. cmd := []string{"etcd", "-f", "-data-dir=/tmp/node1", "-name=node1"}
  137. cmd = append(cmd, extra...)
  138. println(strings.Join(cmd, " "))
  139. return os.StartProcess(EtcdBinPath, cmd, procAttr)
  140. }
  141. // TODO(yichengq): refactor these helper functions in #645
  142. func startServer2(extra []string) (*os.Process, error) {
  143. procAttr := new(os.ProcAttr)
  144. procAttr.Files = []*os.File{nil, os.Stdout, os.Stderr}
  145. cmd := []string{"etcd", "-f", "-data-dir=/tmp/node2", "-name=node2"}
  146. cmd = append(cmd, extra...)
  147. fmt.Println(strings.Join(cmd, " "))
  148. return os.StartProcess(EtcdBinPath, cmd, procAttr)
  149. }
  150. func startServerWithDataDir(extra []string) (*os.Process, error) {
  151. procAttr := new(os.ProcAttr)
  152. procAttr.Files = []*os.File{nil, os.Stdout, os.Stderr}
  153. cmd := []string{"etcd", "-data-dir=/tmp/node1", "-name=node1"}
  154. cmd = append(cmd, extra...)
  155. fmt.Println(strings.Join(cmd, " "))
  156. return os.StartProcess(EtcdBinPath, cmd, procAttr)
  157. }
  158. func startServer2WithDataDir(extra []string) (*os.Process, error) {
  159. procAttr := new(os.ProcAttr)
  160. procAttr.Files = []*os.File{nil, os.Stdout, os.Stderr}
  161. cmd := []string{"etcd", "-data-dir=/tmp/node2", "-name=node2"}
  162. cmd = append(cmd, extra...)
  163. println(strings.Join(cmd, " "))
  164. return os.StartProcess(EtcdBinPath, cmd, procAttr)
  165. }
  166. func stopServer(proc *os.Process) {
  167. err := proc.Kill()
  168. if err != nil {
  169. panic(err.Error())
  170. }
  171. proc.Release()
  172. }
  173. func assertServerFunctional(client http.Client, scheme string) error {
  174. path := fmt.Sprintf("%s://127.0.0.1:4001/v2/keys/foo", scheme)
  175. fields := url.Values(map[string][]string{"value": {"bar"}})
  176. for i := 0; i < 10; i++ {
  177. time.Sleep(1 * time.Second)
  178. resp, err := client.PostForm(path, fields)
  179. // If the status is Temporary Redirect, we should follow the
  180. // new location, because the request did not go to the leader yet.
  181. // TODO(yichengq): the difference between Temporary Redirect(307)
  182. // and Created(201) could distinguish between leader and followers
  183. for err == nil && resp.StatusCode == http.StatusTemporaryRedirect {
  184. loc, _ := resp.Location()
  185. newPath := loc.String()
  186. resp, err = client.PostForm(newPath, fields)
  187. }
  188. if err == nil {
  189. // Internal error may mean that servers are in leader election
  190. if resp.StatusCode != http.StatusCreated && resp.StatusCode != http.StatusInternalServerError {
  191. return errors.New(fmt.Sprintf("resp.StatusCode == %s", resp.Status))
  192. } else {
  193. return nil
  194. }
  195. }
  196. }
  197. return errors.New("etcd server was not reachable in time / had internal error")
  198. }
  199. func assertServerNotFunctional(client http.Client, scheme string) error {
  200. path := fmt.Sprintf("%s://127.0.0.1:4001/v2/keys/foo", scheme)
  201. fields := url.Values(map[string][]string{"value": {"bar"}})
  202. for i := 0; i < 10; i++ {
  203. time.Sleep(1 * time.Second)
  204. _, err := client.PostForm(path, fields)
  205. if err == nil {
  206. return errors.New("Expected error during POST, got nil")
  207. } else {
  208. errString := err.Error()
  209. if strings.Contains(errString, "connection refused") {
  210. continue
  211. } else if strings.Contains(errString, "bad certificate") {
  212. return nil
  213. } else {
  214. return err
  215. }
  216. }
  217. }
  218. return errors.New("Expected server to fail with 'bad certificate'")
  219. }