Skip to content

Commit 6f13ba0

Browse files
authored
Merge pull request kubernetes#129872 from seans3/websocket-https-proxy
WebSocket HTTPS Proxy support
2 parents b0d6079 + f73945a commit 6f13ba0

File tree

39 files changed

+491
-804
lines changed

39 files changed

+491
-804
lines changed

Diff for: go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ require (
159159
github.com/google/btree v1.1.3 // indirect
160160
github.com/google/pprof v0.0.0-20241029153458-d1b30febd7db // indirect
161161
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
162-
github.com/gorilla/websocket v1.5.3 // indirect
162+
github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 // indirect
163163
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect
164164
github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 // indirect
165165
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 // indirect

Diff for: go.sum

+2-2
Original file line numberDiff line numberDiff line change
@@ -302,8 +302,8 @@ github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+
302302
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
303303
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
304304
github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
305-
github.com/gorilla/websocket v1.5.3 h1:saDtZ6Pbx/0u+bgYQ3q96pZgCzfhKXGPqt7kZ72aNNg=
306-
github.com/gorilla/websocket v1.5.3/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
305+
github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 h1:JeSE6pjso5THxAzdVpqr6/geYxZytqFMBCOtn/ujyeo=
306+
github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674/go.mod h1:r4w70xmWCQKmi1ONH4KIaBptdivuRPyosB9RmPlGEwA=
307307
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 h1:+ngKgrYPPJrOjhax5N+uePQ0Fh1Z7PheYoUI/0nzkPA=
308308
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
309309
github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 h1:+9834+KizmvFV7pXQGSXQTsaWhq2GjuNUt0aUU0YBYw=

Diff for: staging/src/k8s.io/apiextensions-apiserver/go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ require (
6262
github.com/golang-jwt/jwt/v4 v4.5.1 // indirect
6363
github.com/golang/protobuf v1.5.4 // indirect
6464
github.com/google/btree v1.1.3 // indirect
65-
github.com/gorilla/websocket v1.5.3 // indirect
65+
github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 // indirect
6666
github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 // indirect
6767
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 // indirect
6868
github.com/grpc-ecosystem/grpc-gateway v1.16.0 // indirect

Diff for: staging/src/k8s.io/apiextensions-apiserver/go.sum

+2-2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: staging/src/k8s.io/apiserver/go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ require (
1919
github.com/google/gnostic-models v0.6.9
2020
github.com/google/go-cmp v0.7.0
2121
github.com/google/uuid v1.6.0
22-
github.com/gorilla/websocket v1.5.3
22+
github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674
2323
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0
2424
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822
2525
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f

Diff for: staging/src/k8s.io/apiserver/go.sum

+2-2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: staging/src/k8s.io/cli-runtime/go.sum

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: staging/src/k8s.io/client-go/go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ require (
1212
github.com/google/gnostic-models v0.6.9
1313
github.com/google/go-cmp v0.7.0
1414
github.com/google/uuid v1.6.0
15-
github.com/gorilla/websocket v1.5.3
15+
github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674
1616
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79
1717
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822
1818
github.com/peterbourgon/diskv v2.0.1+incompatible

Diff for: staging/src/k8s.io/client-go/go.sum

+2-2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: staging/src/k8s.io/client-go/tools/remotecommand/fallback_test.go

+21-23
Original file line numberDiff line numberDiff line change
@@ -288,7 +288,7 @@ KR8NJEkK99Vh/tew6jAMll70xFrE7aF8VLXJVE7w4sQzuvHxl9Q=
288288
`)
289289

290290
// See (https://github.com/kubernetes/kubernetes/issues/126134).
291-
func TestFallbackClient_WebSocketHTTPSProxyCausesSPDYFallback(t *testing.T) {
291+
func TestFallbackClient_WebSocketHTTPSProxyNoFallback(t *testing.T) {
292292
cert, err := tls.X509KeyPair(localhostCert, localhostKey)
293293
if err != nil {
294294
t.Errorf("https (valid hostname): proxy_test: %v", err)
@@ -309,42 +309,40 @@ func TestFallbackClient_WebSocketHTTPSProxyCausesSPDYFallback(t *testing.T) {
309309
proxyLocation, err := url.Parse(proxyServer.URL)
310310
require.NoError(t, err)
311311

312-
// Create fake SPDY server. Copy received STDIN data back onto STDOUT stream.
313-
spdyServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
314-
var stdin, stdout bytes.Buffer
315-
ctx, err := createHTTPStreams(w, req, &StreamOptions{
316-
Stdin: &stdin,
317-
Stdout: &stdout,
318-
})
312+
// Create fake WebSocket server. Copy received STDIN data back onto STDOUT stream.
313+
websocketServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
314+
conns, err := webSocketServerStreams(req, w, streamOptionsFromRequest(req))
319315
if err != nil {
320316
w.WriteHeader(http.StatusForbidden)
321317
return
322318
}
323-
defer ctx.conn.Close() //nolint:errcheck
324-
_, err = io.Copy(ctx.stdoutStream, ctx.stdinStream)
319+
defer conns.conn.Close() //nolint:errcheck
320+
// Loopback the STDIN stream onto the STDOUT stream.
321+
_, err = io.Copy(conns.stdoutStream, conns.stdinStream)
325322
if err != nil {
326-
t.Fatalf("error copying STDIN to STDOUT: %v", err)
323+
t.Fatalf("websocket copy error: %v", err)
327324
}
328325
}))
329-
defer spdyServer.Close() //nolint:errcheck
326+
defer websocketServer.Close() //nolint:errcheck
330327

331-
backendLocation, err := url.Parse(spdyServer.URL)
328+
// Now create the WebSocket client (executor), and point it to the TLS proxy server.
329+
// The proxy server should open a websocket connection to the fake websocket server.
330+
websocketServer.URL = websocketServer.URL + "?" + "stdin=true" + "&" + "stdout=true"
331+
websocketLocation, err := url.Parse(websocketServer.URL)
332332
require.NoError(t, err)
333-
334333
clientConfig := &rest.Config{
335-
Host: spdyServer.URL,
334+
Host: websocketLocation.Host,
336335
TLSClientConfig: rest.TLSClientConfig{CAData: localhostCert},
337336
Proxy: func(req *http.Request) (*url.URL, error) {
338337
return proxyLocation, nil
339338
},
340339
}
341-
342-
// Websocket with https proxy will fail in dialing (falling back to SPDY).
343-
websocketExecutor, err := NewWebSocketExecutor(clientConfig, "GET", backendLocation.String())
340+
websocketExecutor, err := NewWebSocketExecutor(clientConfig, "GET", websocketServer.URL)
344341
require.NoError(t, err)
345-
spdyExecutor, err := NewSPDYExecutor(clientConfig, "POST", backendLocation)
342+
emptyURL, _ := url.Parse("")
343+
spdyExecutor, err := NewSPDYExecutor(clientConfig, "POST", emptyURL)
346344
require.NoError(t, err)
347-
// Fallback to spdyExecutor with websocket https proxy error; spdyExecutor succeeds against fake spdy server.
345+
// No fallback to spdyExecutor with websocket.
348346
sawHTTPSProxyError := false
349347
exec, err := NewFallbackExecutor(websocketExecutor, spdyExecutor, func(err error) bool {
350348
if httpstream.IsUpgradeFailure(err) {
@@ -396,9 +394,9 @@ func TestFallbackClient_WebSocketHTTPSProxyCausesSPDYFallback(t *testing.T) {
396394
t.Errorf("unexpected data received: %d sent: %d", len(data), len(randomData))
397395
}
398396

399-
// Ensure the https proxy error was observed
400-
if !sawHTTPSProxyError {
401-
t.Errorf("expected to see https proxy error")
397+
// Ensure the https proxy error was *not* observed
398+
if sawHTTPSProxyError {
399+
t.Errorf("expected to *not* see https proxy error")
402400
}
403401
// Ensure the proxy was called once
404402
if e, a := int64(1), proxyCalled.Load(); e != a {

Diff for: staging/src/k8s.io/client-go/tools/remotecommand/websocket_test.go

+106-31
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ import (
2020
"bytes"
2121
"context"
2222
"crypto/rand"
23+
"crypto/tls"
2324
"encoding/json"
2425
"fmt"
2526
"io"
@@ -31,16 +32,18 @@ import (
3132
"reflect"
3233
"strings"
3334
"sync"
35+
"sync/atomic"
3436
"testing"
3537
"time"
3638

3739
gwebsocket "github.com/gorilla/websocket"
40+
"github.com/stretchr/testify/require"
3841

3942
v1 "k8s.io/api/core/v1"
4043
apierrors "k8s.io/apimachinery/pkg/api/errors"
4144
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
42-
"k8s.io/apimachinery/pkg/util/httpstream"
4345
"k8s.io/apimachinery/pkg/util/httpstream/wsstream"
46+
utilnettesting "k8s.io/apimachinery/pkg/util/net/testing"
4447
"k8s.io/apimachinery/pkg/util/remotecommand"
4548
"k8s.io/apimachinery/pkg/util/wait"
4649
"k8s.io/client-go/rest"
@@ -1342,38 +1345,110 @@ func createWebSocketStreams(req *http.Request, w http.ResponseWriter, opts *opti
13421345
return wsStreams, nil
13431346
}
13441347

1345-
// See (https://github.com/kubernetes/kubernetes/issues/126134).
1346-
func TestWebSocketClient_HTTPSProxyErrorExpected(t *testing.T) {
1347-
urlStr := "http://127.0.0.1/never-used" + "?" + "stdin=true" + "&" + "stdout=true"
1348-
websocketLocation, err := url.Parse(urlStr)
1349-
if err != nil {
1350-
t.Fatalf("Unable to parse WebSocket server URL: %s", urlStr)
1351-
}
1352-
// proxy url with https scheme will trigger websocket dialing error.
1353-
httpsProxyFunc := func(req *http.Request) (*url.URL, error) { return url.Parse("https://127.0.0.1") }
1354-
exec, err := NewWebSocketExecutor(&rest.Config{Host: websocketLocation.Host, Proxy: httpsProxyFunc}, "GET", urlStr)
1355-
if err != nil {
1356-
t.Errorf("unexpected error creating websocket executor: %v", err)
1357-
}
1358-
var stdout bytes.Buffer
1359-
options := &StreamOptions{
1360-
Stdout: &stdout,
1361-
}
1362-
errorChan := make(chan error)
1363-
go func() {
1364-
// Start the streaming on the WebSocket "exec" client.
1365-
errorChan <- exec.StreamWithContext(context.Background(), *options)
1366-
}()
1348+
func TestWebSocketClient_ProxySucceeds(t *testing.T) {
1349+
// Validate websocket proxy succeeds for each of the enumerated schemes.
1350+
proxySchemes := []string{"http", "https"}
1351+
for _, proxyScheme := range proxySchemes {
1352+
// Create the proxy handler, keeping track of how many times it was called.
1353+
var proxyCalled atomic.Int64
1354+
proxyHandler := utilnettesting.NewHTTPProxyHandler(t, func(req *http.Request) bool {
1355+
proxyCalled.Add(1)
1356+
return true
1357+
})
1358+
defer proxyHandler.Wait()
1359+
// Create/Start the proxy server, adding TLS functionality depending on scheme.
1360+
proxyServer := httptest.NewUnstartedServer(proxyHandler)
1361+
if proxyScheme == "https" {
1362+
cert, err := tls.X509KeyPair(localhostCert, localhostKey)
1363+
if err != nil {
1364+
t.Errorf("https (valid hostname): proxy_test: %v", err)
1365+
}
1366+
proxyServer.TLS = &tls.Config{Certificates: []tls.Certificate{cert}}
1367+
proxyServer.StartTLS()
1368+
} else {
1369+
proxyServer.Start()
1370+
}
1371+
defer proxyServer.Close() //nolint:errcheck
1372+
proxyLocation, err := url.Parse(proxyServer.URL)
1373+
require.NoError(t, err)
1374+
t.Logf("Proxy URL: %s", proxyLocation.String())
13671375

1368-
select {
1369-
case <-time.After(wait.ForeverTestTimeout):
1370-
t.Fatalf("expect stream to be closed after connection is closed.")
1371-
case err := <-errorChan:
1372-
if err == nil {
1373-
t.Errorf("expected error but received none")
1376+
// Create fake WebSocket server. Copy received STDIN data back onto STDOUT stream.
1377+
websocketServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
1378+
conns, err := webSocketServerStreams(req, w, streamOptionsFromRequest(req))
1379+
if err != nil {
1380+
t.Fatalf("error on webSocketServerStreams: %v", err)
1381+
}
1382+
defer conns.conn.Close() //nolint:errcheck
1383+
// Loopback the STDIN stream onto the STDOUT stream.
1384+
_, err = io.Copy(conns.stdoutStream, conns.stdinStream)
1385+
if err != nil {
1386+
t.Fatalf("error copying STDIN to STDOUT: %v", err)
1387+
}
1388+
}))
1389+
defer websocketServer.Close() //nolint:errcheck
1390+
1391+
// Now create the WebSocket client (executor), and point it to the TLS proxy server.
1392+
// The proxy server should open a websocket connection to the fake websocket server.
1393+
websocketServer.URL = websocketServer.URL + "?" + "stdin=true" + "&" + "stdout=true"
1394+
websocketLocation, err := url.Parse(websocketServer.URL)
1395+
require.NoError(t, err)
1396+
clientConfig := &rest.Config{
1397+
Host: websocketLocation.Host,
1398+
// Unused if "http" scheme.
1399+
TLSClientConfig: rest.TLSClientConfig{CAData: localhostCert},
1400+
Proxy: func(req *http.Request) (*url.URL, error) {
1401+
return proxyLocation, nil
1402+
},
1403+
}
1404+
exec, err := NewWebSocketExecutor(clientConfig, "GET", websocketServer.URL)
1405+
require.NoError(t, err)
1406+
1407+
// Generate random data, and set it up to stream on STDIN. The data will be
1408+
// returned on the STDOUT buffer.
1409+
randomSize := 1024 * 1024
1410+
randomData := make([]byte, randomSize)
1411+
if _, err := rand.Read(randomData); err != nil {
1412+
t.Errorf("unexpected error reading random data: %v", err)
1413+
}
1414+
var stdout bytes.Buffer
1415+
options := &StreamOptions{
1416+
Stdin: bytes.NewReader(randomData),
1417+
Stdout: &stdout,
1418+
}
1419+
errorChan := make(chan error)
1420+
go func() {
1421+
// Start the streaming on the WebSocket "exec" client.
1422+
errorChan <- exec.StreamWithContext(context.Background(), *options)
1423+
}()
1424+
1425+
select {
1426+
case <-time.After(wait.ForeverTestTimeout):
1427+
t.Fatalf("expect stream to be closed after connection is closed.")
1428+
case err := <-errorChan:
1429+
if err != nil {
1430+
t.Fatalf("unexpected error: %v", err)
1431+
}
1432+
// Validate remote command v5 protocol was negotiated.
1433+
streamExec := exec.(*wsStreamExecutor)
1434+
if remotecommand.StreamProtocolV5Name != streamExec.negotiated {
1435+
t.Fatalf("expected remote command v5 protocol, got (%s)", streamExec.negotiated)
1436+
}
1437+
}
1438+
data, err := io.ReadAll(bytes.NewReader(stdout.Bytes()))
1439+
if err != nil {
1440+
t.Fatalf("error reading the stream: %v", err)
1441+
}
1442+
// Check the random data sent on STDIN was the same returned on STDOUT.
1443+
t.Logf("comparing %d random bytes sent data versus received", len(randomData))
1444+
if !bytes.Equal(randomData, data) {
1445+
t.Errorf("unexpected data received: %d sent: %d", len(data), len(randomData))
1446+
} else {
1447+
t.Log("success--random bytes are the same")
13741448
}
1375-
if !httpstream.IsHTTPSProxyError(err) {
1376-
t.Errorf("expected https proxy error, got (%s)", err)
1449+
// Ensure the proxy was called once
1450+
if e, a := int64(1), proxyCalled.Load(); e != a {
1451+
t.Errorf("expected %d proxy call, got %d", e, a)
13771452
}
13781453
}
13791454
}

Diff for: staging/src/k8s.io/cloud-provider/go.sum

+2-2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: staging/src/k8s.io/component-base/go.sum

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: staging/src/k8s.io/component-helpers/go.sum

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)