145 lines
4.5 KiB
Go
145 lines
4.5 KiB
Go
![]() |
/*
|
||
|
Copyright 2017 The Kubernetes Authors.
|
||
|
|
||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
you may not use this file except in compliance with the License.
|
||
|
You may obtain a copy of the License at
|
||
|
|
||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
||
|
Unless required by applicable law or agreed to in writing, software
|
||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
See the License for the specific language governing permissions and
|
||
|
limitations under the License.
|
||
|
*/
|
||
|
|
||
|
package settings
|
||
|
|
||
|
import (
|
||
|
"net/http"
|
||
|
"strings"
|
||
|
|
||
|
. "github.com/onsi/ginkgo"
|
||
|
. "github.com/onsi/gomega"
|
||
|
"github.com/parnurzeal/gorequest"
|
||
|
|
||
|
"k8s.io/ingress-nginx/test/e2e/framework"
|
||
|
)
|
||
|
|
||
|
var _ = framework.IngressNginxDescribe("Global access block", func() {
|
||
|
f := framework.NewDefaultFramework("global-access-block")
|
||
|
|
||
|
host := "global-access-block"
|
||
|
|
||
|
BeforeEach(func() {
|
||
|
err := f.NewEchoDeploymentWithReplicas(1)
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
|
||
|
ing, err := f.EnsureIngress(framework.NewSingleIngress(host, "/", host, f.IngressController.Namespace, "http-svc", 80, nil))
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
Expect(ing).NotTo(BeNil())
|
||
|
})
|
||
|
|
||
|
AfterEach(func() {
|
||
|
})
|
||
|
|
||
|
It("should block CIDRs defined in the ConfigMap", func() {
|
||
|
err := f.UpdateNginxConfigMapData("block-cidrs", "172.16.0.0/12,192.168.0.0/16,10.0.0.0/8")
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
|
||
|
err = f.WaitForNginxConfiguration(
|
||
|
func(cfg string) bool {
|
||
|
return strings.Contains(cfg, "deny 172.16.0.0/12;") &&
|
||
|
strings.Contains(cfg, "deny 192.168.0.0/16;") &&
|
||
|
strings.Contains(cfg, "deny 10.0.0.0/8;")
|
||
|
})
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
|
||
|
// This test works for minikube, but may have problems with real kubernetes clusters,
|
||
|
// especially if connection is done via Internet. In this case, the test should be disabled/removed.
|
||
|
resp, _, errs := gorequest.New().
|
||
|
Get(f.IngressController.HTTPURL).
|
||
|
Set("Host", host).
|
||
|
End()
|
||
|
Expect(errs).To(BeNil())
|
||
|
Expect(resp.StatusCode).Should(Equal(http.StatusForbidden))
|
||
|
})
|
||
|
|
||
|
It("should block User-Agents defined in the ConfigMap", func() {
|
||
|
err := f.UpdateNginxConfigMapData("block-user-agents", "~*chrome\\/68\\.0\\.3440\\.106\\ safari\\/537\\.36,AlphaBot")
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
|
||
|
err = f.WaitForNginxConfiguration(
|
||
|
func(cfg string) bool {
|
||
|
return strings.Contains(cfg, "~*chrome\\/68\\.0\\.3440\\.106\\ safari\\/537\\.36 1;") &&
|
||
|
strings.Contains(cfg, "AlphaBot 1;")
|
||
|
})
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
|
||
|
// Should be blocked
|
||
|
resp, _, errs := gorequest.New().
|
||
|
Get(f.IngressController.HTTPURL).
|
||
|
Set("Host", host).
|
||
|
Set("User-Agent", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36").
|
||
|
End()
|
||
|
Expect(errs).To(BeNil())
|
||
|
Expect(resp.StatusCode).Should(Equal(http.StatusForbidden))
|
||
|
|
||
|
resp, _, errs = gorequest.New().
|
||
|
Get(f.IngressController.HTTPURL).
|
||
|
Set("Host", host).
|
||
|
Set("User-Agent", "AlphaBot").
|
||
|
End()
|
||
|
Expect(errs).To(BeNil())
|
||
|
Expect(resp.StatusCode).Should(Equal(http.StatusForbidden))
|
||
|
|
||
|
// Shouldn't be blocked
|
||
|
resp, _, errs = gorequest.New().
|
||
|
Get(f.IngressController.HTTPURL).
|
||
|
Set("Host", host).
|
||
|
Set("User-Agent", "Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1").
|
||
|
End()
|
||
|
Expect(errs).To(BeNil())
|
||
|
Expect(resp.StatusCode).Should(Equal(http.StatusOK))
|
||
|
})
|
||
|
|
||
|
It("should block Referers defined in the ConfigMap", func() {
|
||
|
err := f.UpdateNginxConfigMapData("block-referers", "~*example\\.com,qwerty")
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
|
||
|
err = f.WaitForNginxConfiguration(
|
||
|
func(cfg string) bool {
|
||
|
return strings.Contains(cfg, "~*example\\.com 1;") &&
|
||
|
strings.Contains(cfg, "qwerty 1;")
|
||
|
})
|
||
|
Expect(err).NotTo(HaveOccurred())
|
||
|
|
||
|
// Should be blocked
|
||
|
resp, _, errs := gorequest.New().
|
||
|
Get(f.IngressController.HTTPURL).
|
||
|
Set("Host", host).
|
||
|
Set("Referer", "example.com").
|
||
|
End()
|
||
|
Expect(errs).To(BeNil())
|
||
|
Expect(resp.StatusCode).Should(Equal(http.StatusForbidden))
|
||
|
|
||
|
resp, _, errs = gorequest.New().
|
||
|
Get(f.IngressController.HTTPURL).
|
||
|
Set("Host", host).
|
||
|
Set("Referer", "qwerty").
|
||
|
End()
|
||
|
Expect(errs).To(BeNil())
|
||
|
Expect(resp.StatusCode).Should(Equal(http.StatusForbidden))
|
||
|
|
||
|
// Shouldn't be blocked
|
||
|
resp, _, errs = gorequest.New().
|
||
|
Get(f.IngressController.HTTPURL).
|
||
|
Set("Host", host).
|
||
|
Set("Referer", "qwerty123").
|
||
|
End()
|
||
|
Expect(errs).To(BeNil())
|
||
|
Expect(resp.StatusCode).Should(Equal(http.StatusOK))
|
||
|
})
|
||
|
})
|