mirror of
https://gitlab.com/openstapps/openstapps.git
synced 2025-12-27 08:36:14 +00:00
Compare commits
29 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
4133ff36b7 | ||
|
|
25e506f54d | ||
|
|
cbbcc2e5e4 | ||
|
|
3f030fd50f | ||
|
|
5f77877bb4 | ||
|
|
6aea21e81f | ||
|
|
2982c8598e | ||
|
|
0486d733a1 | ||
|
|
8c49c31760 | ||
|
|
8ec8fb3386 | ||
|
|
f432d57004 | ||
|
|
26a4e6dcf1 | ||
|
|
54dc63d848 | ||
|
|
949063eff8 | ||
|
|
9832b0395a | ||
|
|
1515e7778f | ||
|
|
139e405bd3 | ||
|
|
5522ac55ac | ||
|
|
39e710e685 | ||
|
|
4bb46d8a06 | ||
|
|
ac144095bf | ||
|
|
1fcf7340d4 | ||
|
|
ed7b5eaf65 | ||
|
|
6756f6ccd4 | ||
|
|
9990759de0 | ||
|
|
dcb56f7721 | ||
|
|
20f281a544 | ||
|
|
712f204ade | ||
|
|
86535bb1bb |
3
.eslintrc.json
Normal file
3
.eslintrc.json
Normal file
@@ -0,0 +1,3 @@
|
||||
{
|
||||
"extends": "@openstapps"
|
||||
}
|
||||
3
.gitignore
vendored
3
.gitignore
vendored
@@ -92,4 +92,5 @@ docs/
|
||||
|
||||
# Certificates
|
||||
*.crt
|
||||
*.key
|
||||
*.key
|
||||
test/certs
|
||||
|
||||
@@ -21,6 +21,12 @@ unit:
|
||||
stage: test
|
||||
script:
|
||||
- npm test
|
||||
coverage: '/Statements[^:]*\:[^:]*\s+([\d\.]+)%/'
|
||||
artifacts:
|
||||
reports:
|
||||
coverage_report:
|
||||
coverage_format: cobertura
|
||||
path: coverage/cobertura-coverage.xml
|
||||
|
||||
audit:
|
||||
allow_failure: true
|
||||
@@ -37,8 +43,7 @@ scheduled-audit:
|
||||
- npm audit --audit-level=high
|
||||
stage: audit
|
||||
|
||||
image-test:
|
||||
before_script: []
|
||||
docker image build:
|
||||
image: registry.gitlab.com/openstapps/projectmanagement/builder
|
||||
stage: test
|
||||
dependencies:
|
||||
@@ -48,14 +53,11 @@ image-test:
|
||||
services:
|
||||
- docker:dind
|
||||
script:
|
||||
- docker login -u gitlab-ci-token -p $CI_BUILD_TOKEN $CI_REGISTRY
|
||||
- docker build -t $CI_REGISTRY_IMAGE/$REGISTRY_BRANCH$CI_COMMIT_REF_NAME:latest .
|
||||
except:
|
||||
- /(^v[0-9]+\.[0-9]+\.[0-9]+$|^master$|^develop$)/
|
||||
tags:
|
||||
- docker
|
||||
|
||||
image-build:
|
||||
docker image:
|
||||
image: registry.gitlab.com/openstapps/projectmanagement/builder
|
||||
stage: publish
|
||||
dependencies:
|
||||
|
||||
46
CHANGELOG.md
46
CHANGELOG.md
@@ -1,3 +1,49 @@
|
||||
## [1.4.1](https://gitlab.com/openstapps/proxy/compare/v1.4.0...v1.4.1) (2022-11-09)
|
||||
|
||||
|
||||
### Bug Fixes
|
||||
|
||||
* include uri path in json log verbatim ([5f77877](https://gitlab.com/openstapps/proxy/commit/5f77877bb4239a437ff3f2eea1c0dfd51c7d4818))
|
||||
|
||||
|
||||
|
||||
# [1.4.0](https://gitlab.com/openstapps/proxy/compare/v1.3.0...v1.4.0) (2022-11-09)
|
||||
|
||||
|
||||
### Features
|
||||
|
||||
* add support for log aggregators ([8c49c31](https://gitlab.com/openstapps/proxy/commit/8c49c317603b1a2964708ed377a5a7c687f829cd))
|
||||
|
||||
|
||||
|
||||
# [1.3.0](https://gitlab.com/openstapps/proxy/compare/v1.2.0...v1.3.0) (2022-08-22)
|
||||
|
||||
|
||||
|
||||
# [1.2.0](https://gitlab.com/openstapps/proxy/compare/v1.1.0...v1.2.0) (2022-06-08)
|
||||
|
||||
|
||||
### Features
|
||||
|
||||
* added prometheus metrics support ([5522ac5](https://gitlab.com/openstapps/proxy/commit/5522ac55ac00d4b809d942d0a8c58d15b0432fb8))
|
||||
* reload nginx on proxyconfig change ([1fcf734](https://gitlab.com/openstapps/proxy/commit/1fcf7340d49bde993b3acc7bdc90e6a637a05321))
|
||||
* support docker swarm deployments ([4bb46d8](https://gitlab.com/openstapps/proxy/commit/4bb46d8a06ff7829b6908bd03c1cf4240767fcc2))
|
||||
|
||||
|
||||
|
||||
# [1.1.0](https://gitlab.com/openstapps/proxy/compare/v1.0.1...v1.1.0) (2022-03-10)
|
||||
|
||||
|
||||
|
||||
## [1.0.1](https://gitlab.com/openstapps/proxy/compare/v1.0.0...v1.0.1) (2022-03-10)
|
||||
|
||||
|
||||
### Bug Fixes
|
||||
|
||||
* nginx deleting its own conifg ([edbd739](https://gitlab.com/openstapps/proxy/commit/edbd739db995b72fd3f5b5bec7558442a329f719))
|
||||
|
||||
|
||||
|
||||
# [1.0.0](https://gitlab.com/openstapps/proxy/compare/v0.4.0...v1.0.0) (2022-03-09)
|
||||
|
||||
|
||||
|
||||
@@ -6,6 +6,7 @@ RUN apk update && \
|
||||
apk upgrade && \
|
||||
apk add openssl && \
|
||||
apk add nginx && \
|
||||
apk add nginx-mod-http-vts && \
|
||||
rm -rf /var/cache/apk/*
|
||||
|
||||
ADD . /app
|
||||
|
||||
@@ -16,10 +16,12 @@
|
||||
import {ConfigFile} from '../src/common';
|
||||
|
||||
const config: ConfigFile = {
|
||||
activeVersions: ['1\\.0\\.\\d+','2\\.0\\.\\d+'],
|
||||
activeVersions: ['1\\.0\\.\\d+', '2\\.0\\.\\d+'],
|
||||
hiddenRoutes: ['/bulk'],
|
||||
logFormat: 'default',
|
||||
metrics: false,
|
||||
outdatedVersions: ['0\\.8\\.\\d+', '0\\.5\\.\\d+', '0\\.6\\.\\d+', '0\\.7\\.\\d+'],
|
||||
output: '/etc/nginx/conf.d/default.conf',
|
||||
output: '/etc/nginx/http.d/default.conf',
|
||||
rateLimitAllowList: ['127.0.0.1/32'],
|
||||
sslFilePaths: {
|
||||
certificate: '/etc/nginx/certs/ssl.crt',
|
||||
|
||||
@@ -3,4 +3,3 @@ add_header 'Access-Control-Allow-Credentials' 'true';
|
||||
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||
add_header 'Access-Control-Allow-Headers' 'DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-StApps-Version';
|
||||
add_header 'Access-Control-Max-Age' 1728000;
|
||||
add_header 'Content-Type' 'text/plain charset=UTF-8';
|
||||
|
||||
32
fixtures/logFormatters.template
Normal file
32
fixtures/logFormatters.template
Normal file
@@ -0,0 +1,32 @@
|
||||
map $time_iso8601 $time_iso8601_dateTime {
|
||||
~([^+]+) $1;
|
||||
}
|
||||
map $time_iso8601 $time_iso8601_TZ {
|
||||
~\+([0-9:]+)$ $1;
|
||||
}
|
||||
map $msec $millisec {
|
||||
~\.([0-9]+)$ $1;
|
||||
}
|
||||
|
||||
log_format json escape=json '{ "nginx_timestamp": "$time_iso8601_dateTime.$millisec+$time_iso8601_TZ", '
|
||||
'"remote_addr": "$remote_addr", '
|
||||
'"connection": "$connection", '
|
||||
'"connection_requests": $connection_requests, '
|
||||
'"pipe": "$pipe", '
|
||||
'"body_bytes_sent": $body_bytes_sent, '
|
||||
'"request_length": $request_length, '
|
||||
'"request_time": $request_time, '
|
||||
'"response_status": $status, '
|
||||
'"request_uri": "$request_uri", '
|
||||
'"request_method": "$request_method", '
|
||||
'"host": "$host", '
|
||||
'"upstream_cache_status": "$upstream_cache_status", '
|
||||
'"upstream_addr": "$upstream_addr", '
|
||||
'"http_x_forwarded_for": "$http_x_forwarded_for", '
|
||||
'"http_referrer": "$http_referer", '
|
||||
'"http_user_agent": "$http_user_agent", '
|
||||
'"http_version": "$server_protocol", '
|
||||
'"remote_user": "$remote_user", '
|
||||
'"http_x_forwarded_proto": "$http_x_forwarded_proto", '
|
||||
'"upstream_response_time": "$upstream_response_time", '
|
||||
'"nginx_access": true }';
|
||||
14
fixtures/metrics.template
Normal file
14
fixtures/metrics.template
Normal file
@@ -0,0 +1,14 @@
|
||||
map $status $omitOKs {
|
||||
default 1;
|
||||
~^[2][0][0] 0;
|
||||
}
|
||||
|
||||
server {
|
||||
listen 8080;
|
||||
error_log stderr;
|
||||
access_log /dev/stdout {{{ logFormat }}} if=$omitOKs;
|
||||
location /metrics {
|
||||
vhost_traffic_status_display;
|
||||
vhost_traffic_status_display_format prometheus;
|
||||
}
|
||||
}
|
||||
@@ -1,3 +1,5 @@
|
||||
load_module modules/ngx_http_vhost_traffic_status_module.so;
|
||||
|
||||
worker_processes 1;
|
||||
|
||||
error_log stderr;
|
||||
@@ -9,6 +11,7 @@ events {
|
||||
}
|
||||
|
||||
http {
|
||||
vhost_traffic_status_zone;
|
||||
include mime.types;
|
||||
default_type application/octet-stream;
|
||||
access_log /dev/stdout;
|
||||
@@ -22,5 +25,5 @@ http {
|
||||
gzip on;
|
||||
keepalive_timeout 65;
|
||||
|
||||
include /etc/nginx/conf.d/*;
|
||||
include /etc/nginx/http.d/*;
|
||||
}
|
||||
|
||||
@@ -1,3 +1,7 @@
|
||||
{{{ logFormatters }}}
|
||||
|
||||
{{{ metrics }}}
|
||||
|
||||
{{{ dockerVersionMap }}}
|
||||
|
||||
# create a custom request limit zone which can handle 160,000 IP-Addresses at the same time
|
||||
@@ -17,6 +21,10 @@ map $isRateLimited $rateLimit {
|
||||
limit_req_zone $rateLimit zone=customstappslimit:10m rate=20r/s;
|
||||
|
||||
server {
|
||||
charset utf-8;
|
||||
error_log stderr;
|
||||
access_log /dev/stdout {{{ logFormat }}};
|
||||
|
||||
{{{ listener }}}
|
||||
|
||||
{{{ visibleRoutes }}}
|
||||
|
||||
2297
package-lock.json
generated
2297
package-lock.json
generated
File diff suppressed because it is too large
Load Diff
52
package.json
52
package.json
@@ -1,49 +1,60 @@
|
||||
{
|
||||
"name": "@openstapps/proxy",
|
||||
"version": "1.0.1",
|
||||
"version": "1.5.0",
|
||||
"description": "NGINX proxy that is dynamically configured by a Node.js script",
|
||||
"main": "./lib/cli.js",
|
||||
"dependencies": {
|
||||
"@openstapps/logger": "0.8.0",
|
||||
"@types/config": "0.0.41",
|
||||
"@types/dockerode": "3.3.3",
|
||||
"@types/node": "14.18.12",
|
||||
"@openstapps/logger": "1.1.1",
|
||||
"@types/config": "3.3.0",
|
||||
"@types/dockerode": "3.3.12",
|
||||
"@types/node": "14.18.24",
|
||||
"@types/sha1": "1.1.3",
|
||||
"config": "3.3.7",
|
||||
"dockerode": "3.3.1",
|
||||
"config": "3.3.8",
|
||||
"dockerode": "3.3.4",
|
||||
"is-cidr": "4.0.2",
|
||||
"mustache": "4.2.0",
|
||||
"semver": "7.3.5"
|
||||
"node-port-scanner": "3.0.1",
|
||||
"semver": "7.3.8"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@openstapps/configuration": "0.29.0",
|
||||
"@testdeck/mocha": "0.2.0",
|
||||
"@types/chai": "4.3.0",
|
||||
"@openstapps/configuration": "0.33.0",
|
||||
"@openstapps/eslint-config": "1.1.0",
|
||||
"@testdeck/mocha": "0.3.0",
|
||||
"@types/chai": "4.3.4",
|
||||
"@types/chai-spies": "1.0.3",
|
||||
"@types/mustache": "4.1.2",
|
||||
"chai": "4.3.6",
|
||||
"@types/mustache": "4.2.1",
|
||||
"@types/proxyquire": "1.3.28",
|
||||
"@typescript-eslint/eslint-plugin": "5.42.1",
|
||||
"@typescript-eslint/parser": "5.42.1",
|
||||
"chai": "4.3.7",
|
||||
"chai-spies": "1.0.0",
|
||||
"conventional-changelog-cli": "2.2.2",
|
||||
"mocha": "9.2.1",
|
||||
"eslint": "8.27.0",
|
||||
"eslint-config-prettier": "8.5.0",
|
||||
"eslint-plugin-jsdoc": "39.6.2",
|
||||
"eslint-plugin-prettier": "4.2.1",
|
||||
"eslint-plugin-unicorn": "44.0.2",
|
||||
"mocha": "10.1.0",
|
||||
"nyc": "15.1.0",
|
||||
"prepend-file-cli": "1.0.6",
|
||||
"prettier": "2.7.1",
|
||||
"proxyquire": "2.1.3",
|
||||
"rimraf": "3.0.2",
|
||||
"ts-node": "10.6.0",
|
||||
"tslint": "6.1.3",
|
||||
"typedoc": "0.22.12",
|
||||
"typescript": "4.4.2"
|
||||
"ts-node": "10.9.1",
|
||||
"typedoc": "0.22.18",
|
||||
"typescript": "4.4.4"
|
||||
},
|
||||
"scripts": {
|
||||
"build": "npm run tslint && npm run compile",
|
||||
"build": "npm run lint && npm run compile",
|
||||
"changelog": "conventional-changelog -p angular -i CHANGELOG.md -s -r 0 && git add CHANGELOG.md && git commit -m 'docs: update changelog'",
|
||||
"check-configuration": "openstapps-configuration",
|
||||
"compile": "rimraf lib && tsc && prepend lib/cli.js '#!/usr/bin/env node\n'",
|
||||
"documentation": "typedoc --includeVersion --out docs --readme README.md --entryPointStrategy expand src",
|
||||
"lint": "eslint --ext .ts src/",
|
||||
"postversion": "npm run changelog",
|
||||
"prepublishOnly": "npm ci && npm run build",
|
||||
"preversion": "npm run prepublishOnly",
|
||||
"push": "git push && git push origin \"v$npm_package_version\"",
|
||||
"tslint": "tslint -p tsconfig.json -c tslint.json 'src/**/*.ts'",
|
||||
"test": "nyc mocha --require ts-node/register 'test/**/*.spec.ts'"
|
||||
},
|
||||
"repository": {
|
||||
@@ -83,6 +94,7 @@
|
||||
"lines": 95,
|
||||
"per-file": true,
|
||||
"reporter": [
|
||||
"cobertura",
|
||||
"html",
|
||||
"text-summary"
|
||||
],
|
||||
|
||||
34
src/cli.ts
34
src/cli.ts
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2019 StApps
|
||||
* Copyright (C) 2022 StApps
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Affero General Public License as
|
||||
* published by the Free Software Foundation, either version 3 of the
|
||||
@@ -17,16 +17,20 @@ import {Logger} from '@openstapps/logger';
|
||||
import {execSync} from 'child_process';
|
||||
import * as Dockerode from 'dockerode';
|
||||
import {render} from 'mustache';
|
||||
import {asyncReadFile, asyncWriteFile, configFile} from './common';
|
||||
import {asyncReadFile, asyncWriteFile} from './common';
|
||||
import {getContainers, getTemplateView} from './main';
|
||||
|
||||
/* eslint-disable unicorn/prefer-module */
|
||||
|
||||
// handle unhandled promise rejections
|
||||
process.on('unhandledRejection', async (error) => {
|
||||
process.on('unhandledRejection', async error => {
|
||||
await Logger.error(error);
|
||||
process.exit(1);
|
||||
});
|
||||
|
||||
let containerHashCache = '';
|
||||
let configHashCache = '';
|
||||
const delay = (ms: number) => new Promise(resolve => setTimeout(resolve, ms));
|
||||
|
||||
/**
|
||||
* Reads the container information from the docker socket and updates the nginx config if necessary
|
||||
@@ -40,16 +44,25 @@ async function updateNginxConfig() {
|
||||
})
|
||||
.join(',');
|
||||
|
||||
delete require.cache[require.resolve('config')];
|
||||
// eslint-disable-next-line @typescript-eslint/no-var-requires
|
||||
const configFile = require('config');
|
||||
const configHash = JSON.stringify(configFile);
|
||||
|
||||
// if containers changed -> write config file, reload nginx
|
||||
if (containerHash !== containerHashCache) {
|
||||
if (containerHash !== containerHashCache || configHash !== configHashCache) {
|
||||
Logger.log('Generating new NGINX configuration');
|
||||
Logger.log('Waiting for Docker network to settle...');
|
||||
await delay(10_000);
|
||||
|
||||
// render nginx config file
|
||||
const nginxConfig = render(await asyncReadFile('nginx.conf.template', 'utf8'), await getTemplateView(containers));
|
||||
|
||||
Logger.log(`containers (${containerHash}) matched the configuration.`);
|
||||
const nginxConfig = render(
|
||||
await asyncReadFile('nginx.conf.template', 'utf8'),
|
||||
await getTemplateView(containers),
|
||||
);
|
||||
|
||||
containerHashCache = containerHash;
|
||||
configHashCache = configHash;
|
||||
|
||||
Logger.log(`Writing new config file "${configFile.output}"`);
|
||||
|
||||
@@ -61,9 +74,10 @@ async function updateNginxConfig() {
|
||||
execSync('nginx -s reload');
|
||||
}
|
||||
|
||||
// tslint:disable-next-line:no-magic-numbers - set timeout to update configuration again in 30s
|
||||
setTimeout(updateNginxConfig, 30000);
|
||||
// set timeout to update configuration again in 30s
|
||||
setTimeout(updateNginxConfig, 30_000);
|
||||
}
|
||||
|
||||
// tslint:disable-next-line:no-floating-promises - start the process that checks the docker socket periodically
|
||||
// start the process that checks the docker socket periodically
|
||||
// eslint-disable-next-line unicorn/prefer-top-level-await
|
||||
updateNginxConfig();
|
||||
|
||||
@@ -47,6 +47,20 @@ export interface SSLFilePaths {
|
||||
dhparam: string;
|
||||
}
|
||||
|
||||
/**
|
||||
* Supported log formats for config
|
||||
*/
|
||||
type SupportedLogFormatsKeys = 'default' | 'combined' | 'json';
|
||||
|
||||
/**
|
||||
* Map supported formats to stings used in template view
|
||||
*/
|
||||
export const SupportedLogFormats: {[key in SupportedLogFormatsKeys]: string} = {
|
||||
default: 'combined',
|
||||
combined: 'combined',
|
||||
json: 'json',
|
||||
};
|
||||
|
||||
/**
|
||||
* A representation of the config file
|
||||
*/
|
||||
@@ -59,12 +73,20 @@ export interface ConfigFile {
|
||||
* List of hidden routes
|
||||
*/
|
||||
hiddenRoutes: string[];
|
||||
/**
|
||||
* Sets log format (default or json)
|
||||
*/
|
||||
logFormat: SupportedLogFormatsKeys;
|
||||
/**
|
||||
* Enables metrics on /metrics route
|
||||
*/
|
||||
metrics?: boolean;
|
||||
/**
|
||||
* List of outdated versions
|
||||
*/
|
||||
outdatedVersions: string[];
|
||||
/**
|
||||
* Output?! TODO
|
||||
* Path the generated config will be written to
|
||||
*/
|
||||
output: string;
|
||||
/**
|
||||
@@ -93,6 +115,18 @@ export interface TemplateView {
|
||||
* Listener
|
||||
*/
|
||||
listener: string;
|
||||
/**
|
||||
* Log format to use
|
||||
*/
|
||||
logFormat: string;
|
||||
/**
|
||||
* Custom Log formatters
|
||||
*/
|
||||
logFormatters: string;
|
||||
/**
|
||||
* Local server with listener for /metrics route
|
||||
*/
|
||||
metrics: string;
|
||||
/**
|
||||
* Allow list for rate limiting
|
||||
*/
|
||||
|
||||
201
src/main.ts
201
src/main.ts
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2019 StApps
|
||||
* Copyright (C) 2022 StApps
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Affero General Public License as
|
||||
* published by the Free Software Foundation, either version 3 of the
|
||||
@@ -17,18 +17,25 @@ import {Logger} from '@openstapps/logger';
|
||||
import Dockerode from 'dockerode';
|
||||
import isCidr from 'is-cidr';
|
||||
import {render} from 'mustache';
|
||||
import {join} from 'path';
|
||||
import path from 'path';
|
||||
import * as semver from 'semver';
|
||||
import {
|
||||
asyncReadFile,
|
||||
configFile,
|
||||
ConfigFile,
|
||||
isFileType,
|
||||
protocolHardeningParameters,
|
||||
SSLFilePaths,
|
||||
sslHardeningParameters,
|
||||
SupportedLogFormats,
|
||||
TemplateView,
|
||||
} from './common';
|
||||
|
||||
/* eslint-disable unicorn/prefer-module */
|
||||
/* eslint-disable unicorn/no-await-expression-member */
|
||||
|
||||
// eslint-disable-next-line @typescript-eslint/no-var-requires
|
||||
const nodePortScanner = require('node-port-scanner');
|
||||
|
||||
/**
|
||||
* Checks if a ContainerInfo matches a name and version regex
|
||||
*
|
||||
@@ -36,11 +43,20 @@ import {
|
||||
* @param versionRegex Version regex to check
|
||||
* @param container Container info for check
|
||||
*/
|
||||
export function containerMatchesRegex(name: string, versionRegex: RegExp, container: Dockerode.ContainerInfo): boolean {
|
||||
return typeof container.Labels['stapps.version'] === 'string'
|
||||
&& container.Labels['stapps.version'].match(versionRegex) !== null
|
||||
&& typeof container.Labels['com.docker.compose.service'] === 'string'
|
||||
&& container.Labels['com.docker.compose.service'] === name;
|
||||
export function containerMatchesRegex(
|
||||
name: string,
|
||||
versionRegex: RegExp,
|
||||
container: Dockerode.ContainerInfo,
|
||||
): boolean {
|
||||
return (
|
||||
typeof container.Labels['stapps.version'] === 'string' &&
|
||||
container.Labels['stapps.version'].match(versionRegex) !== null &&
|
||||
((typeof container.Labels['com.docker.compose.service'] === 'string' &&
|
||||
container.Labels['com.docker.compose.service'] === name) ||
|
||||
(typeof container.Labels['com.docker.stack.namespace'] === 'string' &&
|
||||
container.Labels['com.docker.swarm.service.name'] ===
|
||||
`${container.Labels['com.docker.stack.namespace']}_${name}`))
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -53,14 +69,44 @@ export function containerMatchesRegex(name: string, versionRegex: RegExp, contai
|
||||
*/
|
||||
export async function getGatewayOfStAppsBackend(container: Dockerode.ContainerInfo): Promise<string> {
|
||||
if (container.Ports.length === 0) {
|
||||
await Logger.error(`Container ${container.Id} does not advertise any port.
|
||||
await Logger.error(`Container ${container.Names[0]} does not advertise any port.
|
||||
Please expose a port if the container should be accessible by NGINX.`);
|
||||
|
||||
return '';
|
||||
}
|
||||
|
||||
// ip:port
|
||||
return `${container.Ports[0].IP}:${container.Ports[0].PublicPort}`;
|
||||
// Basic Docker network
|
||||
if (typeof container.Ports[0].IP !== 'undefined' && typeof container.Ports[0].PublicPort !== 'undefined') {
|
||||
// ip:port
|
||||
return `${container.Ports[0].IP}:${container.Ports[0].PublicPort}`;
|
||||
}
|
||||
|
||||
// Docker Swarm network
|
||||
if (
|
||||
/* istanbul ignore next */
|
||||
typeof container.NetworkSettings?.Networks?.ingress?.IPAddress !== 'undefined' &&
|
||||
typeof container.Ports[0].PrivatePort !== 'undefined'
|
||||
) {
|
||||
const port = container.Ports[0].PrivatePort;
|
||||
|
||||
// Get a routable network connection
|
||||
for (const network in container.NetworkSettings.Networks) {
|
||||
const scan = await nodePortScanner(container.NetworkSettings.Networks[network].IPAddress, [port]);
|
||||
|
||||
if ((scan.ports.open as Array<number>).includes(port)) {
|
||||
Logger.info(
|
||||
`${container.Names[0]} reachable via ${container.NetworkSettings.Networks[network].IPAddress}:${port}`,
|
||||
);
|
||||
return `${container.NetworkSettings.Networks[network].IPAddress}:${port}`;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
await Logger.error(
|
||||
`Couldn't infer ${container.Names[0]} network reachability. It's possible your current Docker network setup isn't supported yet.`,
|
||||
);
|
||||
|
||||
return '';
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -82,56 +128,71 @@ export async function generateUpstreamMap(
|
||||
|
||||
let foundMatchingContainer = false;
|
||||
|
||||
// const backendContainer = containers.filter(container => container.Image.includes('backend'));
|
||||
// // eslint-disable-next-line no-console
|
||||
//console.log(JSON.stringify(backendContainer, undefined, 2));
|
||||
|
||||
// active versions
|
||||
result += (await Promise.all(
|
||||
activeVersions
|
||||
.map(async (activeVersionRegex) => {
|
||||
result += (
|
||||
await Promise.all(
|
||||
activeVersions.map(async activeVersionRegex => {
|
||||
const upstreamName = activeVersionRegex.replace(/[\\|.+]/g, '_');
|
||||
|
||||
let activeBackends = containers.filter((container) => {
|
||||
let activeBackends = containers.filter(container => {
|
||||
return containerMatchesRegex('backend', new RegExp(activeVersionRegex), container);
|
||||
});
|
||||
|
||||
// .Labels['stapps.version'] is available
|
||||
if (activeBackends.length > 0) {
|
||||
|
||||
activeBackends = activeBackends.sort((a, b) => semver.rcompare(a.Labels['stapps.version'],b.Labels['stapps.version']));
|
||||
const activeBackendsVersions = activeBackends.map((container) => container.Labels['stapps.version'])
|
||||
// tslint:disable-next-line: strict-boolean-expressions
|
||||
.reduce((map, e) => map.set(e, (map.get(e) || 0) + 1), new Map<string, number>());
|
||||
activeBackends = activeBackends.sort((a, b) =>
|
||||
semver.rcompare(a.Labels['stapps.version'], b.Labels['stapps.version']),
|
||||
);
|
||||
const activeBackendsVersions = activeBackends
|
||||
.map(container => container.Labels['stapps.version'])
|
||||
// eslint-disable-next-line unicorn/no-array-reduce
|
||||
.reduce(
|
||||
(map, element) => map.set(element, (map.get(element) || 0) + 1),
|
||||
new Map<string, number>(),
|
||||
);
|
||||
for (const [version, occurrences] of activeBackendsVersions) {
|
||||
if (occurrences > 1) {
|
||||
await Logger.error(`Omitting running version ${version} ! Multiple backends with this exact version are running`);
|
||||
activeBackends = activeBackends.filter((container) => container.Labels['stapps.version'] !== version);
|
||||
await Logger.error(
|
||||
`Omitting running version ${version} ! Multiple backends with this exact version are running.`,
|
||||
);
|
||||
activeBackends = activeBackends.filter(
|
||||
container => container.Labels['stapps.version'] !== version,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
if (activeBackends.length !== 0) {
|
||||
// not only dublicates
|
||||
if (activeBackends.length > 0) {
|
||||
// not only duplicates
|
||||
foundMatchingContainer = true;
|
||||
|
||||
const gateWayOfContainer = await getGatewayOfStAppsBackend(activeBackends[0]);
|
||||
const gatewayOfContainer = await getGatewayOfStAppsBackend(activeBackends[0]);
|
||||
|
||||
if (gateWayOfContainer.length !== 0) {
|
||||
upstreams += `\nupstream ${upstreamName} {\n server ${gateWayOfContainer};\n}`;
|
||||
if (gatewayOfContainer.length > 0) {
|
||||
upstreams += `\nupstream ${upstreamName} {\n server ${gatewayOfContainer};\n}`;
|
||||
|
||||
return ` \"~${activeVersionRegex}\" ${upstreamName};\n`;
|
||||
}
|
||||
}
|
||||
}
|
||||
await Logger.error('No backend for version', activeVersionRegex, 'found');
|
||||
Logger.warn('No backend for version', activeVersionRegex, 'found');
|
||||
|
||||
return ` \"~${activeVersionRegex}\" unavailable;\n`;
|
||||
}),
|
||||
)).join('');
|
||||
)
|
||||
).join('');
|
||||
|
||||
// outdated versions
|
||||
result += outdatedVersions
|
||||
.map((outdatedVersionRegex) => {
|
||||
.map(outdatedVersionRegex => {
|
||||
return ` \"~${outdatedVersionRegex}\" outdated;`;
|
||||
})
|
||||
.join('');
|
||||
.join('\n');
|
||||
|
||||
// eslint-disable-next-line prettier/prettier
|
||||
result += '\n\}';
|
||||
|
||||
if (!foundMatchingContainer) {
|
||||
@@ -149,19 +210,24 @@ export async function generateUpstreamMap(
|
||||
export function generateListener(sslFilePaths: SSLFilePaths) {
|
||||
let listener = '';
|
||||
|
||||
if (typeof sslFilePaths !== 'undefined' &&
|
||||
typeof sslFilePaths.certificate !== 'undefined' && isFileType(sslFilePaths.certificate,'crt') &&
|
||||
typeof sslFilePaths.certificateChain !== 'undefined' && isFileType(sslFilePaths.certificateChain,'crt') &&
|
||||
typeof sslFilePaths.certificateKey !== 'undefined' && isFileType(sslFilePaths.certificateKey,'key') &&
|
||||
typeof sslFilePaths.dhparam !== 'undefined' && isFileType(sslFilePaths.dhparam,'pem')
|
||||
if (
|
||||
typeof sslFilePaths !== 'undefined' &&
|
||||
typeof sslFilePaths.certificate !== 'undefined' &&
|
||||
isFileType(sslFilePaths.certificate, 'crt') &&
|
||||
typeof sslFilePaths.certificateChain !== 'undefined' &&
|
||||
isFileType(sslFilePaths.certificateChain, 'crt') &&
|
||||
typeof sslFilePaths.certificateKey !== 'undefined' &&
|
||||
isFileType(sslFilePaths.certificateKey, 'key') &&
|
||||
typeof sslFilePaths.dhparam !== 'undefined' &&
|
||||
isFileType(sslFilePaths.dhparam, 'pem')
|
||||
) {
|
||||
// https listener
|
||||
listener = `listen 443 ssl default_server;
|
||||
ssl_certificate ${sslFilePaths.certificate};
|
||||
ssl_certificate_key ${sslFilePaths.certificateKey};
|
||||
ssl_trusted_certificate ${sslFilePaths.certificateChain};
|
||||
ssl_dhparam ${sslFilePaths.dhparam};
|
||||
${sslHardeningParameters}`;
|
||||
listener = ` listen 443 ssl default_server;
|
||||
ssl_certificate ${sslFilePaths.certificate};
|
||||
ssl_certificate_key ${sslFilePaths.certificateKey};
|
||||
ssl_trusted_certificate ${sslFilePaths.certificateChain};
|
||||
ssl_dhparam ${sslFilePaths.dhparam};
|
||||
${sslHardeningParameters}`;
|
||||
} else {
|
||||
// default http listener
|
||||
listener = 'listen 80 default_server;';
|
||||
@@ -176,6 +242,19 @@ ${protocolHardeningParameters}
|
||||
return listener;
|
||||
}
|
||||
|
||||
/**
|
||||
* Reads predefined server entry with metrics location
|
||||
*/
|
||||
export async function generateMetricsServer(logFormat: string, enableMetrics?: boolean): Promise<string> {
|
||||
if (!enableMetrics) {
|
||||
return '';
|
||||
}
|
||||
|
||||
return renderTemplate(path.join('fixtures', 'metrics.template'), {
|
||||
logFormat: logFormat,
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Render a mustache template file with given view object
|
||||
*
|
||||
@@ -194,7 +273,8 @@ async function renderTemplate(path: string, view: unknown): Promise<string> {
|
||||
* @param entries Allow list entries that should be in CIDR notation
|
||||
*/
|
||||
function generateRateLimitAllowList(entries: string[]): string {
|
||||
return entries.filter(entry => isCidr(entry))
|
||||
return entries
|
||||
.filter(entry => isCidr(entry))
|
||||
.map(entry => `${entry} 0;`)
|
||||
.join('\n');
|
||||
}
|
||||
@@ -205,28 +285,47 @@ function generateRateLimitAllowList(entries: string[]): string {
|
||||
* @param containers List of container info
|
||||
*/
|
||||
export async function getTemplateView(containers: Dockerode.ContainerInfo[]): Promise<TemplateView> {
|
||||
delete require.cache[require.resolve('config')];
|
||||
// eslint-disable-next-line @typescript-eslint/no-var-requires
|
||||
const config = require('config');
|
||||
const configFile = config as ConfigFile;
|
||||
|
||||
const cors = await asyncReadFile('./fixtures/cors.template', 'utf8');
|
||||
|
||||
const visibleRoutesPromises = ['/'].map(async (route) => {
|
||||
return renderTemplate(join('fixtures', 'visibleRoute.template'), {
|
||||
const visibleRoutesPromises = ['/'].map(async route => {
|
||||
return renderTemplate(path.join('fixtures', 'visibleRoute.template'), {
|
||||
cors,
|
||||
route,
|
||||
});
|
||||
});
|
||||
|
||||
const hiddenRoutesPromises = configFile.hiddenRoutes.map(async (route) => {
|
||||
return renderTemplate(join('fixtures', 'hiddenRoute.template'), {
|
||||
const hiddenRoutesPromises = configFile.hiddenRoutes.map(async route => {
|
||||
return renderTemplate(path.join('fixtures', 'hiddenRoute.template'), {
|
||||
cors,
|
||||
route,
|
||||
});
|
||||
});
|
||||
|
||||
const logFormattingPromise = renderTemplate(path.join('fixtures', 'logFormatters.template'), {});
|
||||
|
||||
const logFormat =
|
||||
configFile.logFormat in SupportedLogFormats
|
||||
? SupportedLogFormats[configFile.logFormat]
|
||||
: SupportedLogFormats.default;
|
||||
|
||||
return {
|
||||
dockerVersionMap: await generateUpstreamMap(configFile.activeVersions, configFile.outdatedVersions, containers),
|
||||
dockerVersionMap: await generateUpstreamMap(
|
||||
configFile.activeVersions,
|
||||
configFile.outdatedVersions,
|
||||
containers,
|
||||
),
|
||||
hiddenRoutes: (await Promise.all(hiddenRoutesPromises)).join(''),
|
||||
listener: generateListener(configFile.sslFilePaths),
|
||||
logFormat: logFormat,
|
||||
logFormatters: await logFormattingPromise,
|
||||
metrics: await generateMetricsServer(logFormat, configFile.metrics),
|
||||
rateLimitAllowList: generateRateLimitAllowList(configFile.rateLimitAllowList),
|
||||
staticRoute: await renderTemplate(join('fixtures', 'staticRoute.template'), {cors}),
|
||||
staticRoute: await renderTemplate(path.join('fixtures', 'staticRoute.template'), {cors}),
|
||||
visibleRoutes: (await Promise.all(visibleRoutesPromises)).join(''),
|
||||
};
|
||||
}
|
||||
@@ -236,7 +335,9 @@ export async function getTemplateView(containers: Dockerode.ContainerInfo[]): Pr
|
||||
*
|
||||
* @param pathToDockerSocket Path to docker socket
|
||||
*/
|
||||
export async function getContainers(pathToDockerSocket = '/var/run/docker.sock'): Promise<Dockerode.ContainerInfo[]> {
|
||||
export async function getContainers(
|
||||
pathToDockerSocket = '/var/run/docker.sock',
|
||||
): Promise<Dockerode.ContainerInfo[]> {
|
||||
const docker = new Dockerode({
|
||||
socketPath: pathToDockerSocket,
|
||||
});
|
||||
|
||||
@@ -24,12 +24,23 @@ import {expect} from 'chai';
|
||||
import chaiSpies from 'chai-spies';
|
||||
import {ContainerInfo} from 'dockerode';
|
||||
import {slow, suite, test, timeout} from '@testdeck/mocha';
|
||||
import {sslHardeningParameters, protocolHardeningParameters, SSLFilePaths } from './../src/common';
|
||||
import {containerMatchesRegex, generateUpstreamMap, getGatewayOfStAppsBackend, getTemplateView, generateListener, getContainers} from '../src/main';
|
||||
import { resolve } from 'path';
|
||||
import { mkdirSync, writeFileSync, unlinkSync, rmdirSync } from 'fs';
|
||||
import {sslHardeningParameters, protocolHardeningParameters, SSLFilePaths} from './../src/common';
|
||||
import {
|
||||
containerMatchesRegex,
|
||||
generateUpstreamMap,
|
||||
getGatewayOfStAppsBackend,
|
||||
getTemplateView,
|
||||
generateListener,
|
||||
generateMetricsServer,
|
||||
getContainers,
|
||||
} from '../src/main';
|
||||
import {resolve} from 'path';
|
||||
import {mkdirSync, writeFileSync, unlinkSync, rmdirSync} from 'fs';
|
||||
import proxyquire from 'proxyquire';
|
||||
|
||||
process.on('unhandledRejection', async (error) => {
|
||||
proxyquire.callThru().preserveCache();
|
||||
|
||||
process.on('unhandledRejection', async error => {
|
||||
await Logger.error(error);
|
||||
|
||||
process.exit(1);
|
||||
@@ -40,9 +51,9 @@ chai.use(chaiSpies);
|
||||
|
||||
@suite(timeout(1000), slow(500))
|
||||
export class MainSpec {
|
||||
static anyContainerWithExposedPorts: ContainerInfo = {
|
||||
static 'anyContainerWithExposedPorts': ContainerInfo = {
|
||||
Command: 'sh',
|
||||
Created: 1524669882,
|
||||
Created: 1_524_669_882,
|
||||
HostConfig: {
|
||||
NetworkMode: 'default',
|
||||
},
|
||||
@@ -51,9 +62,7 @@ export class MainSpec {
|
||||
ImageID: 'sha256:ef9f0c8c4b6f99dd208948c7aae1d042590aa18e05ebeae4f586e4b4beebeac9',
|
||||
Labels: {},
|
||||
Mounts: [],
|
||||
Names: [
|
||||
'/container_name_1',
|
||||
],
|
||||
Names: ['/container_name_1'],
|
||||
NetworkSettings: {
|
||||
Networks: {
|
||||
bridge: {
|
||||
@@ -84,7 +93,7 @@ export class MainSpec {
|
||||
Status: 'Up 3 minutes',
|
||||
};
|
||||
|
||||
static backendContainerWithExposedPorts: ContainerInfo = {
|
||||
static 'backendContainerWithExposedPorts': ContainerInfo = {
|
||||
Command: 'node ./bin/www',
|
||||
Created: 1524669882,
|
||||
HostConfig: {
|
||||
@@ -103,9 +112,7 @@ export class MainSpec {
|
||||
'stapps.version': '1.0.0',
|
||||
},
|
||||
Mounts: [],
|
||||
Names: [
|
||||
'/deployment_backend_1',
|
||||
],
|
||||
Names: ['/deployment_backend_1'],
|
||||
NetworkSettings: {
|
||||
Networks: {
|
||||
deployment_default: {
|
||||
@@ -136,36 +143,87 @@ export class MainSpec {
|
||||
Status: 'Up 3 minutes',
|
||||
};
|
||||
|
||||
static sandbox = chai.spy.sandbox();
|
||||
static 'swarmBackendContainerWithExposedPorts': ContainerInfo = {
|
||||
Command: 'node ./bin/www',
|
||||
Created: 1524669882,
|
||||
HostConfig: {
|
||||
NetworkMode: 'swarm_default',
|
||||
},
|
||||
Id: 'e3d3f4d18aceac2780bdb95523845d066ed25c04fc65168a5ddbd37a85671bb7',
|
||||
Image: 'registry.gitlab.com/openstapps/backend/b-tu-typescript-refactor-for-new-tslint-config',
|
||||
ImageID: 'sha256:ef9f0c8c4b6f99dd208948c7aae1d042590aa18e05ebeae4f586e4b4beebeac9',
|
||||
Labels: {
|
||||
'com.docker.compose.config-hash': '91c6e0cebad15951824162c93392b6880b69599692f07798ae8de659c1616a03',
|
||||
'com.docker.compose.container-number': '1',
|
||||
'com.docker.compose.oneoff': 'False',
|
||||
'com.docker.stack.namespace': 'deployment',
|
||||
'com.docker.swarm.service.name': 'deployment_backend',
|
||||
'com.docker.compose.version': '1.21.0',
|
||||
'stapps.version': '1.0.0',
|
||||
},
|
||||
Mounts: [],
|
||||
Names: ['/deployment_backend_1'],
|
||||
NetworkSettings: {
|
||||
Networks: {
|
||||
ingress: {
|
||||
Aliases: null,
|
||||
EndpointID: 'da17549a086ff2c9f622e80de833e6f334afda52c8f07080428640c1716dcd14',
|
||||
Gateway: '172.18.0.1',
|
||||
GlobalIPv6Address: '',
|
||||
GlobalIPv6PrefixLen: 0,
|
||||
IPAMConfig: null,
|
||||
IPAddress: '172.18.0.3',
|
||||
IPPrefixLen: 16,
|
||||
IPv6Gateway: '',
|
||||
Links: null,
|
||||
MacAddress: '03:41:ac:11:00:23',
|
||||
NetworkID: '947ea5247cc7429e1fdebd5404fa4d15f7c05e6765f2b93ddb3bdb6aaffd1193',
|
||||
},
|
||||
},
|
||||
},
|
||||
Ports: [
|
||||
{
|
||||
IP: 'delete me',
|
||||
PrivatePort: 3000,
|
||||
PublicPort: 3000,
|
||||
Type: 'tcp',
|
||||
},
|
||||
],
|
||||
State: 'running',
|
||||
Status: 'Up 3 minutes',
|
||||
};
|
||||
|
||||
before() {
|
||||
static 'sandbox' = chai.spy.sandbox();
|
||||
|
||||
'before'() {
|
||||
MainSpec.sandbox.restore();
|
||||
}
|
||||
|
||||
@test
|
||||
'check if container does not match any container'() {
|
||||
expect(containerMatchesRegex(
|
||||
'anyName',
|
||||
new RegExp('d+'),
|
||||
MainSpec.anyContainerWithExposedPorts),
|
||||
expect(
|
||||
containerMatchesRegex('anyName', new RegExp('d+'), MainSpec.anyContainerWithExposedPorts),
|
||||
).to.be.equal(false);
|
||||
}
|
||||
|
||||
@test
|
||||
'check if container does not match if version is incorrect'() {
|
||||
expect(containerMatchesRegex(
|
||||
'backend',
|
||||
new RegExp('1\\.4\\.\\d+'),
|
||||
MainSpec.backendContainerWithExposedPorts),
|
||||
expect(
|
||||
containerMatchesRegex('backend', new RegExp('1\\.4\\.\\d+'), MainSpec.backendContainerWithExposedPorts),
|
||||
).to.be.equal(false);
|
||||
}
|
||||
|
||||
@test
|
||||
'check if container matches'() {
|
||||
expect(containerMatchesRegex(
|
||||
'backend',
|
||||
new RegExp('1\\.0\\.\\d+'),
|
||||
MainSpec.backendContainerWithExposedPorts),
|
||||
expect(
|
||||
containerMatchesRegex('backend', new RegExp('1\\.0\\.\\d+'), MainSpec.backendContainerWithExposedPorts),
|
||||
).to.be.equal(true);
|
||||
expect(
|
||||
containerMatchesRegex(
|
||||
'backend',
|
||||
new RegExp('1\\.0\\.\\d+'),
|
||||
MainSpec.swarmBackendContainerWithExposedPorts,
|
||||
),
|
||||
).to.be.equal(true);
|
||||
}
|
||||
|
||||
@@ -183,27 +241,98 @@ export class MainSpec {
|
||||
const containerWithoutPorts: Partial<ContainerInfo> = {
|
||||
Id: 'Foo',
|
||||
Ports: [],
|
||||
Names: ['/container_name_1'],
|
||||
};
|
||||
|
||||
expect(await getGatewayOfStAppsBackend(containerWithoutPorts as ContainerInfo)).to.be.equal('');
|
||||
expect(spy.__spy.calls[0][0]).to.contain('Container Foo does not advertise any port.');
|
||||
expect(spy.__spy.calls[0][0]).to.contain('Container /container_name_1 does not advertise any port.');
|
||||
}
|
||||
|
||||
@test
|
||||
async 'get gateway of backend container without ports'() {
|
||||
expect(await getGatewayOfStAppsBackend(MainSpec.backendContainerWithExposedPorts)).to.be.equal('127.0.0.1:3000');
|
||||
expect(await getGatewayOfStAppsBackend(MainSpec.backendContainerWithExposedPorts)).to.be.equal(
|
||||
'127.0.0.1:3000',
|
||||
);
|
||||
}
|
||||
|
||||
@test
|
||||
async 'get gateway of backend container within docker swarm'() {
|
||||
const backendContainer = MainSpec.swarmBackendContainerWithExposedPorts as any;
|
||||
delete backendContainer.Ports[0].IP;
|
||||
|
||||
const main = proxyquire('../src/main', {
|
||||
'node-port-scanner': (_host: unknown, _ports: unknown) => {
|
||||
return new Promise((resolve, _reject) => {
|
||||
resolve({
|
||||
ports: {
|
||||
open: [3000],
|
||||
},
|
||||
});
|
||||
});
|
||||
},
|
||||
});
|
||||
expect(await main.getGatewayOfStAppsBackend(backendContainer)).to.be.equal('172.18.0.3:3000');
|
||||
}
|
||||
|
||||
@test
|
||||
async 'fail to get gateway of backend container if unreachable'() {
|
||||
const backendContainer = MainSpec.swarmBackendContainerWithExposedPorts as any;
|
||||
delete backendContainer.Ports[0].IP;
|
||||
|
||||
const spy = MainSpec.sandbox.on(console, 'error', () => {
|
||||
// noop
|
||||
});
|
||||
|
||||
const main = proxyquire('../src/main', {
|
||||
'node-port-scanner': (_host: unknown, _ports: unknown) => {
|
||||
return new Promise((resolve, _reject) => {
|
||||
resolve({
|
||||
ports: {
|
||||
open: [],
|
||||
},
|
||||
});
|
||||
});
|
||||
},
|
||||
});
|
||||
|
||||
expect(await main.getGatewayOfStAppsBackend(MainSpec.swarmBackendContainerWithExposedPorts)).to.be.equal(
|
||||
'',
|
||||
);
|
||||
expect(spy.__spy.calls[0][0]).to.contain(
|
||||
"It's possible your current Docker network setup isn't supported yet.",
|
||||
);
|
||||
}
|
||||
|
||||
@test
|
||||
async 'fail to get gateway of backend container network mode is unsupported'() {
|
||||
const backendContainer = MainSpec.swarmBackendContainerWithExposedPorts as any;
|
||||
delete backendContainer.Ports[0].IP;
|
||||
delete backendContainer.Ports[0].PublicPort;
|
||||
delete backendContainer.Ports[0].PrivatePort;
|
||||
|
||||
const spy = MainSpec.sandbox.on(console, 'error', () => {
|
||||
// noop
|
||||
});
|
||||
|
||||
expect(await getGatewayOfStAppsBackend(MainSpec.swarmBackendContainerWithExposedPorts)).to.be.equal('');
|
||||
expect(spy.__spy.calls[0][0]).to.contain(
|
||||
"It's possible your current Docker network setup isn't supported yet.",
|
||||
);
|
||||
}
|
||||
|
||||
@test
|
||||
async 'upstream map calls logger error when no matching container is found'() {
|
||||
const spy = MainSpec.sandbox.on(console, 'error', () => {
|
||||
const spy = MainSpec.sandbox.on(console, 'warn', () => {
|
||||
// noop
|
||||
});
|
||||
|
||||
expect(await generateUpstreamMap(
|
||||
['0\\.8\\.\\d+'],
|
||||
['1\\.1\\.\\d+'],
|
||||
[MainSpec.backendContainerWithExposedPorts],
|
||||
)).to.be.equal(`map $http_x_stapps_version $proxyurl {
|
||||
expect(
|
||||
await generateUpstreamMap(
|
||||
['0\\.8\\.\\d+'],
|
||||
['1\\.1\\.\\d+'],
|
||||
[MainSpec.backendContainerWithExposedPorts],
|
||||
),
|
||||
).to.be.equal(`map $http_x_stapps_version $proxyurl {
|
||||
default unsupported;
|
||||
"~0\\.8\\.\\d+" unavailable;
|
||||
"~1\\.1\\.\\d+" outdated;
|
||||
@@ -215,11 +344,13 @@ export class MainSpec {
|
||||
|
||||
@test
|
||||
async 'upstream map with one active version and no outdated ones'() {
|
||||
expect(await generateUpstreamMap(
|
||||
['1\\.0\\.\\d+'],
|
||||
['0\\.8\\.\\d+'],
|
||||
[MainSpec.backendContainerWithExposedPorts],
|
||||
)).to.be.equal(`map $http_x_stapps_version $proxyurl {
|
||||
expect(
|
||||
await generateUpstreamMap(
|
||||
['1\\.0\\.\\d+'],
|
||||
['0\\.8\\.\\d+'],
|
||||
[MainSpec.backendContainerWithExposedPorts],
|
||||
),
|
||||
).to.be.equal(`map $http_x_stapps_version $proxyurl {
|
||||
default unsupported;
|
||||
"~1\\.0\\.\\d+" 1__0___d_;
|
||||
"~0\\.8\\.\\d+" outdated;
|
||||
@@ -255,33 +386,43 @@ Please check if docker is running and Node.js can access the docker socket (/var
|
||||
|
||||
@test
|
||||
async 'get template view'() {
|
||||
|
||||
try {
|
||||
let containersWithSameVersion = [MainSpec.backendContainerWithExposedPorts, MainSpec.backendContainerWithExposedPorts];
|
||||
let containersWithSameVersion = [
|
||||
MainSpec.backendContainerWithExposedPorts,
|
||||
MainSpec.backendContainerWithExposedPorts,
|
||||
];
|
||||
await getTemplateView(containersWithSameVersion);
|
||||
return false;
|
||||
} catch (e) {
|
||||
expect((e as Error).message).to.equal(
|
||||
`Multiple backends for one version found.`);
|
||||
expect((e as Error).message).to.equal(`Multiple backends for one version found.`);
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
@test
|
||||
'create listener faulty config'() {
|
||||
async 'include metrics config'() {
|
||||
expect(await generateMetricsServer('test', true)).length.to.be.greaterThan(1);
|
||||
}
|
||||
|
||||
expect(generateListener({
|
||||
certificate: 'faultyTest',
|
||||
certificateChain: 'faultyTest',
|
||||
certificateKey: 'faultyTest',
|
||||
dhparam: 'faultyTest',
|
||||
})).to
|
||||
.equal(`listen 80 default_server;
|
||||
@test
|
||||
async 'omit metrics config'() {
|
||||
expect(await generateMetricsServer('test', false)).to.equal('');
|
||||
}
|
||||
|
||||
@test
|
||||
'create listener faulty config'() {
|
||||
expect(
|
||||
generateListener({
|
||||
certificate: 'faultyTest',
|
||||
certificateChain: 'faultyTest',
|
||||
certificateKey: 'faultyTest',
|
||||
dhparam: 'faultyTest',
|
||||
}),
|
||||
).to.equal(`listen 80 default_server;
|
||||
|
||||
${protocolHardeningParameters}
|
||||
`);
|
||||
|
||||
}
|
||||
|
||||
@test
|
||||
@@ -294,10 +435,10 @@ ${protocolHardeningParameters}
|
||||
const certificateChainFile = resolve(testCertDir, 'chain.crt');
|
||||
const dhparamFile = resolve(testCertDir, 'dhparam.pem');
|
||||
|
||||
writeFileSync(certificateFile,'Test');
|
||||
writeFileSync(certificateKeyFile,'Test');
|
||||
writeFileSync(certificateChainFile,'Test');
|
||||
writeFileSync(dhparamFile,'Test');
|
||||
writeFileSync(certificateFile, 'Test');
|
||||
writeFileSync(certificateKeyFile, 'Test');
|
||||
writeFileSync(certificateChainFile, 'Test');
|
||||
writeFileSync(dhparamFile, 'Test');
|
||||
|
||||
const sslFilePaths: SSLFilePaths = {
|
||||
certificate: certificateFile,
|
||||
@@ -306,12 +447,12 @@ ${protocolHardeningParameters}
|
||||
dhparam: dhparamFile,
|
||||
};
|
||||
|
||||
expect(generateListener(sslFilePaths)).to.equal(`listen 443 ssl default_server;
|
||||
ssl_certificate ${sslFilePaths.certificate};
|
||||
ssl_certificate_key ${sslFilePaths.certificateKey};
|
||||
ssl_trusted_certificate ${sslFilePaths.certificateChain};
|
||||
ssl_dhparam ${sslFilePaths.dhparam};
|
||||
${sslHardeningParameters}
|
||||
expect(generateListener(sslFilePaths)).to.equal(` listen 443 ssl default_server;
|
||||
ssl_certificate ${sslFilePaths.certificate};
|
||||
ssl_certificate_key ${sslFilePaths.certificateKey};
|
||||
ssl_trusted_certificate ${sslFilePaths.certificateChain};
|
||||
ssl_dhparam ${sslFilePaths.dhparam};
|
||||
${sslHardeningParameters}
|
||||
|
||||
${protocolHardeningParameters}
|
||||
`);
|
||||
|
||||
@@ -1,3 +0,0 @@
|
||||
{
|
||||
"extends": "./node_modules/@openstapps/configuration/tslint.json"
|
||||
}
|
||||
Reference in New Issue
Block a user