mirror of
				https://github.com/traefik/traefik.git
				synced 2025-10-31 00:11:38 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			529 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			529 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package integration
 | |
| 
 | |
| import (
 | |
| 	"crypto/tls"
 | |
| 	"crypto/x509"
 | |
| 	"fmt"
 | |
| 	"net"
 | |
| 	"net/http"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/miekg/dns"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| 	"github.com/stretchr/testify/suite"
 | |
| 	"github.com/traefik/traefik/v2/integration/try"
 | |
| 	"github.com/traefik/traefik/v2/pkg/config/static"
 | |
| 	"github.com/traefik/traefik/v2/pkg/log"
 | |
| 	"github.com/traefik/traefik/v2/pkg/provider/acme"
 | |
| 	"github.com/traefik/traefik/v2/pkg/testhelpers"
 | |
| 	"github.com/traefik/traefik/v2/pkg/types"
 | |
| )
 | |
| 
 | |
| // ACME test suites.
 | |
| type AcmeSuite struct {
 | |
| 	BaseSuite
 | |
| 	pebbleIP      string
 | |
| 	fakeDNSServer *dns.Server
 | |
| }
 | |
| 
 | |
| func TestAcmeSuite(t *testing.T) {
 | |
| 	suite.Run(t, new(AcmeSuite))
 | |
| }
 | |
| 
 | |
| type subCases struct {
 | |
| 	host               string
 | |
| 	expectedCommonName string
 | |
| 	expectedAlgorithm  x509.PublicKeyAlgorithm
 | |
| }
 | |
| 
 | |
| type acmeTestCase struct {
 | |
| 	template            templateModel
 | |
| 	traefikConfFilePath string
 | |
| 	subCases            []subCases
 | |
| }
 | |
| 
 | |
| type templateModel struct {
 | |
| 	Domain    types.Domain
 | |
| 	Domains   []types.Domain
 | |
| 	PortHTTP  string
 | |
| 	PortHTTPS string
 | |
| 	Acme      map[string]static.CertificateResolver
 | |
| }
 | |
| 
 | |
| const (
 | |
| 	// Domain to check
 | |
| 	acmeDomain = "traefik.acme.wtf"
 | |
| 
 | |
| 	// Wildcard domain to check
 | |
| 	wildcardDomain = "*.acme.wtf"
 | |
| )
 | |
| 
 | |
| func (s *AcmeSuite) getAcmeURL() string {
 | |
| 	return fmt.Sprintf("https://%s/dir",
 | |
| 		net.JoinHostPort(s.pebbleIP, "14000"))
 | |
| }
 | |
| 
 | |
| func setupPebbleRootCA() (*http.Transport, error) {
 | |
| 	path, err := filepath.Abs("fixtures/acme/ssl/pebble.minica.pem")
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	os.Setenv("LEGO_CA_CERTIFICATES", path)
 | |
| 	os.Setenv("LEGO_CA_SERVER_NAME", "pebble")
 | |
| 
 | |
| 	customCAs, err := os.ReadFile(path)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	certPool := x509.NewCertPool()
 | |
| 	if ok := certPool.AppendCertsFromPEM(customCAs); !ok {
 | |
| 		return nil, fmt.Errorf("error creating x509 cert pool from %q: %w", path, err)
 | |
| 	}
 | |
| 
 | |
| 	return &http.Transport{
 | |
| 		TLSClientConfig: &tls.Config{
 | |
| 			ServerName: "pebble",
 | |
| 			RootCAs:    certPool,
 | |
| 		},
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) SetupSuite() {
 | |
| 	s.BaseSuite.SetupSuite()
 | |
| 
 | |
| 	s.createComposeProject("pebble")
 | |
| 	s.composeUp()
 | |
| 
 | |
| 	// Retrieving the Docker host ip.
 | |
| 	s.fakeDNSServer = startFakeDNSServer(s.hostIP)
 | |
| 	s.pebbleIP = s.getComposeServiceIP("pebble")
 | |
| 
 | |
| 	pebbleTransport, err := setupPebbleRootCA()
 | |
| 	require.NoError(s.T(), err)
 | |
| 
 | |
| 	// wait for pebble
 | |
| 	req := testhelpers.MustNewRequest(http.MethodGet, s.getAcmeURL(), nil)
 | |
| 
 | |
| 	client := &http.Client{
 | |
| 		Transport: pebbleTransport,
 | |
| 	}
 | |
| 
 | |
| 	err = try.Do(5*time.Second, func() error {
 | |
| 		resp, errGet := client.Do(req)
 | |
| 		if errGet != nil {
 | |
| 			return errGet
 | |
| 		}
 | |
| 		return try.StatusCodeIs(http.StatusOK)(resp)
 | |
| 	})
 | |
| 
 | |
| 	require.NoError(s.T(), err)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TearDownSuite() {
 | |
| 	s.BaseSuite.TearDownSuite()
 | |
| 
 | |
| 	if s.fakeDNSServer != nil {
 | |
| 		err := s.fakeDNSServer.Shutdown()
 | |
| 		if err != nil {
 | |
| 			log.WithoutContext().Info(err.Error())
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	s.composeDown()
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01Domains() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_domains.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Domains: []types.Domain{{
 | |
| 				Main: "traefik.acme.wtf",
 | |
| 			}},
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01StoreDomains() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_store_domains.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Domain: types.Domain{
 | |
| 				Main: "traefik.acme.wtf",
 | |
| 			},
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01DomainsInSAN() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_domains.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: "acme.wtf",
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Domains: []types.Domain{{
 | |
| 				Main: "acme.wtf",
 | |
| 				SANs: []string{"traefik.acme.wtf"},
 | |
| 			}},
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01OnHostRule() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_base.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestMultipleResolver() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_multiple_resolvers.toml",
 | |
| 		subCases: []subCases{
 | |
| 			{
 | |
| 				host:               acmeDomain,
 | |
| 				expectedCommonName: acmeDomain,
 | |
| 				expectedAlgorithm:  x509.RSA,
 | |
| 			},
 | |
| 			{
 | |
| 				host:               "tchouk.acme.wtf",
 | |
| 				expectedCommonName: "tchouk.acme.wtf",
 | |
| 				expectedAlgorithm:  x509.ECDSA,
 | |
| 			},
 | |
| 		},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 				}},
 | |
| 				"tchouk": {ACME: &acme.Configuration{
 | |
| 					TLSChallenge: &acme.TLSChallenge{},
 | |
| 					KeyType:      "EC256",
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01OnHostRuleECDSA() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_base.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.ECDSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 					KeyType:       "EC384",
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01OnHostRuleInvalidAlgo() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_base.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 					KeyType:       "INVALID",
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01OnHostRuleDefaultDynamicCertificatesWithWildcard() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_tls.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: wildcardDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestHTTP01OnHostRuleDynamicCertificatesWithWildcard() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_tls_dynamic.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: wildcardDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestTLSALPN01OnHostRuleTCP() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_tcp.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					TLSChallenge: &acme.TLSChallenge{},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestTLSALPN01OnHostRule() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_base.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					TLSChallenge: &acme.TLSChallenge{},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestTLSALPN01Domains() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_domains.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: acmeDomain,
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Domains: []types.Domain{{
 | |
| 				Main: "traefik.acme.wtf",
 | |
| 			}},
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					TLSChallenge: &acme.TLSChallenge{},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| func (s *AcmeSuite) TestTLSALPN01DomainsInSAN() {
 | |
| 	testCase := acmeTestCase{
 | |
| 		traefikConfFilePath: "fixtures/acme/acme_domains.toml",
 | |
| 		subCases: []subCases{{
 | |
| 			host:               acmeDomain,
 | |
| 			expectedCommonName: "acme.wtf",
 | |
| 			expectedAlgorithm:  x509.RSA,
 | |
| 		}},
 | |
| 		template: templateModel{
 | |
| 			Domains: []types.Domain{{
 | |
| 				Main: "acme.wtf",
 | |
| 				SANs: []string{"traefik.acme.wtf"},
 | |
| 			}},
 | |
| 			Acme: map[string]static.CertificateResolver{
 | |
| 				"default": {ACME: &acme.Configuration{
 | |
| 					TLSChallenge: &acme.TLSChallenge{},
 | |
| 				}},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	s.retrieveAcmeCertificate(testCase)
 | |
| }
 | |
| 
 | |
| // Test Let's encrypt down.
 | |
| func (s *AcmeSuite) TestNoValidLetsEncryptServer() {
 | |
| 	file := s.adaptFile("fixtures/acme/acme_base.toml", templateModel{
 | |
| 		Acme: map[string]static.CertificateResolver{
 | |
| 			"default": {ACME: &acme.Configuration{
 | |
| 				CAServer:      "http://wrongurl:4001/directory",
 | |
| 				HTTPChallenge: &acme.HTTPChallenge{EntryPoint: "web"},
 | |
| 			}},
 | |
| 		},
 | |
| 	})
 | |
| 
 | |
| 	s.traefikCmd(withConfigFile(file))
 | |
| 
 | |
| 	// Expected traefik works
 | |
| 	err := try.GetRequest("http://127.0.0.1:8080/api/rawdata", 10*time.Second, try.StatusCodeIs(http.StatusOK))
 | |
| 	require.NoError(s.T(), err)
 | |
| }
 | |
| 
 | |
| // Doing an HTTPS request and test the response certificate.
 | |
| func (s *AcmeSuite) retrieveAcmeCertificate(testCase acmeTestCase) {
 | |
| 	if len(testCase.template.PortHTTP) == 0 {
 | |
| 		testCase.template.PortHTTP = ":5002"
 | |
| 	}
 | |
| 
 | |
| 	if len(testCase.template.PortHTTPS) == 0 {
 | |
| 		testCase.template.PortHTTPS = ":5001"
 | |
| 	}
 | |
| 
 | |
| 	for _, value := range testCase.template.Acme {
 | |
| 		if len(value.ACME.CAServer) == 0 {
 | |
| 			value.ACME.CAServer = s.getAcmeURL()
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	file := s.adaptFile(testCase.traefikConfFilePath, testCase.template)
 | |
| 
 | |
| 	s.traefikCmd(withConfigFile(file))
 | |
| 
 | |
| 	// A real file is needed to have the right mode on acme.json file
 | |
| 	defer os.Remove("/tmp/acme.json")
 | |
| 
 | |
| 	backend := startTestServer("9010", http.StatusOK, "")
 | |
| 	defer backend.Close()
 | |
| 
 | |
| 	client := &http.Client{
 | |
| 		Transport: &http.Transport{
 | |
| 			TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// wait for traefik (generating acme account take some seconds)
 | |
| 	err := try.Do(60*time.Second, func() error {
 | |
| 		_, errGet := client.Get("https://127.0.0.1:5001")
 | |
| 		return errGet
 | |
| 	})
 | |
| 	require.NoError(s.T(), err)
 | |
| 
 | |
| 	for _, sub := range testCase.subCases {
 | |
| 		client = &http.Client{
 | |
| 			Transport: &http.Transport{
 | |
| 				TLSClientConfig: &tls.Config{
 | |
| 					InsecureSkipVerify: true,
 | |
| 					ServerName:         sub.host,
 | |
| 				},
 | |
| 				// Needed so that each subcase redoes the SSL handshake
 | |
| 				DisableKeepAlives: true,
 | |
| 			},
 | |
| 		}
 | |
| 
 | |
| 		req := testhelpers.MustNewRequest(http.MethodGet, "https://127.0.0.1:5001/", nil)
 | |
| 		req.Host = sub.host
 | |
| 		req.Header.Set("Host", sub.host)
 | |
| 		req.Header.Set("Accept", "*/*")
 | |
| 
 | |
| 		var resp *http.Response
 | |
| 
 | |
| 		// Retry to send a Request which uses the LE generated certificate
 | |
| 		err := try.Do(60*time.Second, func() error {
 | |
| 			resp, err = client.Do(req)
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 
 | |
| 			cn := resp.TLS.PeerCertificates[0].Subject.CommonName
 | |
| 			if cn != sub.expectedCommonName {
 | |
| 				return fmt.Errorf("domain %s found instead of %s", cn, sub.expectedCommonName)
 | |
| 			}
 | |
| 
 | |
| 			return nil
 | |
| 		})
 | |
| 
 | |
| 		require.NoError(s.T(), err)
 | |
| 		assert.Equal(s.T(), http.StatusOK, resp.StatusCode)
 | |
| 		// Check Domain into response certificate
 | |
| 		assert.Equal(s.T(), sub.expectedCommonName, resp.TLS.PeerCertificates[0].Subject.CommonName)
 | |
| 		assert.Equal(s.T(), sub.expectedAlgorithm, resp.TLS.PeerCertificates[0].PublicKeyAlgorithm)
 | |
| 	}
 | |
| }
 |