diff --git a/core/dnsserver/config.go b/core/dnsserver/config.go index d928326be..c46b2fb77 100644 --- a/core/dnsserver/config.go +++ b/core/dnsserver/config.go @@ -73,6 +73,22 @@ type Config struct { // If nil, PROXY protocol is disabled. ProxyProtoConnPolicy proxyproto.ConnPolicyFunc + // ProxyProtoUDPSessionTrackingTTL enables per-UDP-session source address + // caching on the PacketConn listener when set to a positive duration. + // The first datagram of a Cloudflare Spectrum PPv2 session (which contains + // only the PROXY Protocol header and no DNS payload) is used to populate a + // short-lived cache keyed by the Spectrum-side remote address. Subsequent + // datagrams from the same remote address that carry no PROXY Protocol header + // are associated with the cached real client address for up to this duration + // (refreshed on each matching packet). A zero or negative value disables + // session tracking. Has no effect unless ProxyProtoConnPolicy is also set. + ProxyProtoUDPSessionTrackingTTL time.Duration + + // ProxyProtoUDPSessionTrackingMaxSessions is the maximum number of concurrent + // UDP sessions held in the LRU cache. Zero means use the default (udpSessionMaxEntries). + // Has no effect unless ProxyProtoUDPSessionTrackingTTL is positive. + ProxyProtoUDPSessionTrackingMaxSessions int + // MaxGRPCStreams defines the maximum number of concurrent streams per gRPC connection. // This is nil if not specified, allowing for a default to be used. MaxGRPCStreams *int diff --git a/core/dnsserver/server.go b/core/dnsserver/server.go index aaefa9476..20e677fc8 100644 --- a/core/dnsserver/server.go +++ b/core/dnsserver/server.go @@ -39,7 +39,9 @@ type Server struct { ReadTimeout time.Duration // Read timeout for TCP WriteTimeout time.Duration // Write timeout for TCP - connPolicy proxyproto.ConnPolicyFunc // Proxy Protocol connection policy function + connPolicy proxyproto.ConnPolicyFunc // Proxy Protocol connection policy function + udpSessionTrackingTTL time.Duration // TTL for UDP PPv2 session tracking (0 = disabled) + udpSessionTrackingMaxSessions int // LRU cap for UDP session tracking (0 = default) server [2]*dns.Server // 0 is a net.Listener, 1 is a net.PacketConn (a *UDPConn) in our case. m sync.Mutex // protects the servers @@ -130,6 +132,12 @@ func NewServer(addr string, group []*Config) (*Server, error) { if site.ProxyProtoConnPolicy != nil { s.connPolicy = site.ProxyProtoConnPolicy } + if site.ProxyProtoUDPSessionTrackingTTL > 0 { + s.udpSessionTrackingTTL = site.ProxyProtoUDPSessionTrackingTTL + } + if site.ProxyProtoUDPSessionTrackingMaxSessions > 0 { + s.udpSessionTrackingMaxSessions = site.ProxyProtoUDPSessionTrackingMaxSessions + } } if !s.debug { @@ -206,7 +214,7 @@ func (s *Server) ListenPacket() (net.PacketConn, error) { return nil, err } if s.connPolicy != nil { - p = &cproxyproto.PacketConn{PacketConn: p, ConnPolicy: s.connPolicy} + p = &cproxyproto.PacketConn{PacketConn: p, ConnPolicy: s.connPolicy, UDPSessionTrackingTTL: s.udpSessionTrackingTTL, UDPSessionTrackingMaxSessions: s.udpSessionTrackingMaxSessions} } return p, nil } diff --git a/go.mod b/go.mod index db2740aa0..2f29cddbd 100644 --- a/go.mod +++ b/go.mod @@ -50,6 +50,7 @@ require ( ) require ( + github.com/hashicorp/golang-lru/v2 v2.0.7 github.com/pires/go-proxyproto v0.11.0 github.com/prometheus/exporter-toolkit v0.15.1 golang.org/x/net v0.52.0 diff --git a/go.sum b/go.sum index 0caa47f13..3bf606fc2 100644 --- a/go.sum +++ b/go.sum @@ -228,6 +228,8 @@ github.com/hashicorp/go-rootcerts v1.0.2 h1:jzhAVGtqPKbwpyCPELlgNWhE1znq+qwJtW5O github.com/hashicorp/go-rootcerts v1.0.2/go.mod h1:pqUvnprVnM5bf7AOirdbb01K4ccR319Vf4pU3K5EGc8= github.com/hashicorp/go-version v1.8.0 h1:KAkNb1HAiZd1ukkxDFGmokVZe1Xy9HG6NUp+bPle2i4= github.com/hashicorp/go-version v1.8.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA= +github.com/hashicorp/golang-lru/v2 v2.0.7 h1:a+bsQ5rvGLjzHuww6tVxozPZFVghXaHOwFs4luLUK2k= +github.com/hashicorp/golang-lru/v2 v2.0.7/go.mod h1:QeFd9opnmA6QUJc5vARoKUSoFhyfM2/ZepoAG6RGpeM= github.com/hashicorp/nomad/api v0.0.0-20250909143645-a3b86c697f38 h1:1LTbcTpGdSdbj0ee7YZHNe4R2XqxfyWwIkSGWRhgkfM= github.com/hashicorp/nomad/api v0.0.0-20250909143645-a3b86c697f38/go.mod h1:0Tdp+9HbvwrxprXv/LfYZ8P21bOl4oA8Afyet1kUvhI= github.com/infobloxopen/go-trees v0.0.0-20200715205103-96a057b8dfb9 h1:w66aaP3c6SIQ0pi3QH1Tb4AMO3aWoEPxd1CNvLphbkA= diff --git a/plugin/pkg/proxyproto/proxyproto.go b/plugin/pkg/proxyproto/proxyproto.go index 5f9bea063..b8db1a53e 100644 --- a/plugin/pkg/proxyproto/proxyproto.go +++ b/plugin/pkg/proxyproto/proxyproto.go @@ -10,6 +10,7 @@ import ( clog "github.com/coredns/coredns/plugin/pkg/log" + "github.com/hashicorp/golang-lru/v2/expirable" "github.com/pires/go-proxyproto" ) @@ -18,11 +19,49 @@ var ( _ net.Addr = (*Addr)(nil) ) +// errHeaderOnly is a sentinel used internally to signal that the datagram +// contained only a PROXY Protocol header with no DNS payload. It is never +// returned to callers of ReadFrom. +var errHeaderOnly = errors.New("header-only datagram; no payload") + +// PacketConn wraps a net.PacketConn and strips PROXY Protocol v2 headers from +// incoming UDP datagrams. +// +// When UDPSessionTrackingTTL is greater than zero the connection implements +// Cloudflare Spectrum's PPv2-over-UDP behavior: the PROXY header arrives in +// the very first datagram of a session (which may carries an empty payload) +// while all subsequent datagrams carry real DNS payload without any header. +// The real source address parsed from the first datagram is cached keyed by +// the Spectrum-side remote address and applied to every headerless datagram +// that arrives from the same remote address within UDPSessionTrackingTTL. +// +// The session cache is a fixed-capacity LRU (capped at udpSessionMaxEntries) +// so that memory usage is bounded regardless of the number of distinct remote +// addresses seen. type PacketConn struct { net.PacketConn ConnPolicy proxyproto.ConnPolicyFunc ValidateHeader proxyproto.Validator ReadHeaderTimeout time.Duration + + // UDPSessionTrackingTTL enables per-remote-address session state for UDP + // when set to a positive duration. A header-only datagram (valid PPv2 + // header with or without payload) causes the parsed source address to be + // cached for this duration. Subsequent datagrams from the same remote + // address that carry no PPv2 header are assigned the cached source + // address. The TTL is refreshed on every matching packet. A zero or + // negative value disables session tracking entirely. + UDPSessionTrackingTTL time.Duration + + // UDPSessionTrackingMaxSessions is the maximum number of concurrent UDP + // sessions held in the LRU cache. Zero or negative means use the default + // (udpSessionMaxEntries). Has no effect unless UDPSessionTrackingTTL is + // positive. + UDPSessionTrackingMaxSessions int + + // sessionCache is a thread-safe expirable LRU; lazily initialized on + // first use when UDPSessionTrackingTTL > 0. + sessionCache *expirable.LRU[string, *proxyproto.Header] } func (c *PacketConn) ReadFrom(p []byte) (n int, addr net.Addr, err error) { @@ -33,6 +72,12 @@ func (c *PacketConn) ReadFrom(p []byte) (n int, addr net.Addr, err error) { } n, addr, err = c.readFrom(p[:n], addr) if err != nil { + if errors.Is(err, errHeaderOnly) { + // Header-only datagram with no DNS payload (Spectrum PPv2 UDP + // session establishment). Silently discard and wait for the + // next datagram. + continue + } // drop invalid packet as returning error would cause the ReadFrom caller to exit // which could result in DoS if an attacker sends intentional invalid packets clog.Warningf("dropping invalid Proxy Protocol packet from %s: %v", addr.String(), err) @@ -84,8 +129,26 @@ func (c *PacketConn) readFrom(p []byte, addr net.Addr) (_ int, _ net.Addr, err e fallthrough case proxyproto.USE: if header != nil { - srcAddr, _, _ := header.UDPAddrs() - addr = &Addr{u: addr, r: srcAddr} + addr = &Addr{u: addr, r: header.SourceAddr} + + if c.UDPSessionTrackingTTL > 0 { + // Cache the real source address for subsequent headerless datagrams. + // Spectrum sends the header in a standalone datagram with no DNS + // payload; refresh or insert the entry either way so that the TTL + // resets on every header packet. + c.storeSession(addr.(*Addr).u, header) + + if len(payload) == 0 { + // Header-only datagram: no DNS payload to return; loop back + // to read the next datagram. + return 0, nil, errHeaderOnly + } + } + } else if c.UDPSessionTrackingTTL > 0 { + // No header present – look for a cached header for this remote. + if cachedHeader, ok := c.lookupSession(addr); ok { + addr = &Addr{u: addr, r: cachedHeader.SourceAddr} + } } default: } diff --git a/plugin/pkg/proxyproto/udp_session.go b/plugin/pkg/proxyproto/udp_session.go new file mode 100644 index 000000000..0c15ec265 --- /dev/null +++ b/plugin/pkg/proxyproto/udp_session.go @@ -0,0 +1,63 @@ +package proxyproto + +import ( + "net" + "sync" + + "github.com/hashicorp/golang-lru/v2/expirable" + "github.com/pires/go-proxyproto" +) + +// udpSessionMaxEntries is the default maximum number of concurrent UDP +// sessions that the LRU cache will track. When the cache is full the +// least-recently-used entry is evicted. +const udpSessionMaxEntries = 10_240 + +// sessionInitMu serializes lazy initialization of PacketConn.sessionCache. +var sessionInitMu sync.Mutex + +// ensureSessionCache lazily creates the expirable LRU if it hasn't been +// created yet. The expirable.LRU itself is thread-safe once constructed. +func (c *PacketConn) ensureSessionCache() { + if c.sessionCache != nil { + return + } + sessionInitMu.Lock() + defer sessionInitMu.Unlock() + if c.sessionCache != nil { + return // double-check after acquiring lock + } + cap := c.UDPSessionTrackingMaxSessions + if cap <= 0 { + cap = udpSessionMaxEntries + } + c.sessionCache = expirable.NewLRU[string, *proxyproto.Header](cap, nil, c.UDPSessionTrackingTTL) +} + +// storeSession inserts or refreshes the session entry for remoteAddr. +// Calling Add on an existing key resets its TTL. +func (c *PacketConn) storeSession(remoteAddr net.Addr, header *proxyproto.Header) { + c.ensureSessionCache() + c.sessionCache.Add(sessionKey(remoteAddr), header) +} + +// lookupSession returns the cached source address for remoteAddr, if one +// exists and has not expired. Looking up a key refreshes its TTL by +// re-adding it. +func (c *PacketConn) lookupSession(remoteAddr net.Addr) (*proxyproto.Header, bool) { + if c.sessionCache == nil { + return nil, false + } + key := sessionKey(remoteAddr) + header, ok := c.sessionCache.Get(key) + if !ok { + return nil, false + } + // Refresh TTL by re-adding. + c.sessionCache.Add(key, header) + return header, true +} + +func sessionKey(addr net.Addr) string { + return addr.Network() + "://" + addr.String() +} diff --git a/plugin/pkg/proxyproto/udp_session_test.go b/plugin/pkg/proxyproto/udp_session_test.go new file mode 100644 index 000000000..2580be41f --- /dev/null +++ b/plugin/pkg/proxyproto/udp_session_test.go @@ -0,0 +1,134 @@ +package proxyproto + +import ( + "net" + "testing" + "time" + + proxyproto "github.com/pires/go-proxyproto" +) + +func udpAddr(host string, port int) *net.UDPAddr { + return &net.UDPAddr{IP: net.ParseIP(host), Port: port} +} + +// testHeader builds a minimal PPv2 header with the given source address. +func testHeader(src *net.UDPAddr) *proxyproto.Header { + return &proxyproto.Header{ + Version: 2, + SourceAddr: src, + } +} + +func TestSessionKey(t *testing.T) { + addr := &net.UDPAddr{IP: net.ParseIP("10.0.0.1"), Port: 5000} + got := sessionKey(addr) + want := "udp://10.0.0.1:5000" + if got != want { + t.Fatalf("sessionKey = %q, want %q", got, want) + } +} + +func newTestPacketConn(ttl time.Duration, maxSessions int) *PacketConn { + return &PacketConn{ + UDPSessionTrackingTTL: ttl, + UDPSessionTrackingMaxSessions: maxSessions, + } +} + +func TestStoreAndLookupSession(t *testing.T) { + pc := newTestPacketConn(time.Second, 0) + remote := udpAddr("10.0.0.1", 5000) + src := udpAddr("192.168.1.1", 12345) + + pc.storeSession(remote, testHeader(src)) + + got, ok := pc.lookupSession(remote) + if !ok { + t.Fatal("expected session to be found") + } + if got.SourceAddr.String() != src.String() { + t.Fatalf("expected SourceAddr %s, got %s", src, got.SourceAddr) + } +} + +func TestLookupSessionMiss(t *testing.T) { + pc := newTestPacketConn(time.Second, 0) + _, ok := pc.lookupSession(udpAddr("10.0.0.1", 5000)) + if ok { + t.Fatal("expected miss on empty cache") + } +} + +func TestLookupSessionExpired(t *testing.T) { + pc := newTestPacketConn(50*time.Millisecond, 0) + remote := udpAddr("10.0.0.1", 5000) + src := udpAddr("192.168.1.1", 12345) + + pc.storeSession(remote, testHeader(src)) + time.Sleep(100 * time.Millisecond) + + _, ok := pc.lookupSession(remote) + if ok { + t.Fatal("expected expired entry to be missing") + } +} + +func TestLookupSessionRefreshesTTL(t *testing.T) { + ttl := 50 * time.Millisecond + pc := newTestPacketConn(ttl, 0) + remote := udpAddr("10.0.0.1", 5000) + src := udpAddr("192.168.1.1", 12345) + + pc.storeSession(remote, testHeader(src)) + + // Wait past half the TTL, then look up (which should refresh). + time.Sleep(30 * time.Millisecond) + _, ok := pc.lookupSession(remote) + if !ok { + t.Fatal("expected session to be found before TTL") + } + + // Wait another 30ms. Original TTL would have expired (60ms > 50ms), + // but the refresh from lookupSession should keep it alive. + time.Sleep(30 * time.Millisecond) + _, ok = pc.lookupSession(remote) + if !ok { + t.Fatal("expected session to survive after TTL refresh") + } +} + +func TestStoreSessionCustomMaxSessions(t *testing.T) { + pc := newTestPacketConn(time.Second, 5) + + // Fill beyond custom cap. + for i := range 10 { + pc.storeSession(udpAddr("10.0.0.1", i), testHeader(udpAddr("1.1.1.1", i))) + } + + if pc.sessionCache.Len() != 5 { + t.Fatalf("expected cache capped at 5, got %d", pc.sessionCache.Len()) + } +} + +func TestStoreSessionEvictsOldest(t *testing.T) { + pc := newTestPacketConn(time.Minute, 2) + r1 := udpAddr("10.0.0.1", 1) + r2 := udpAddr("10.0.0.2", 2) + r3 := udpAddr("10.0.0.3", 3) + + pc.storeSession(r1, testHeader(udpAddr("1.1.1.1", 1))) + pc.storeSession(r2, testHeader(udpAddr("2.2.2.2", 2))) + // Cache is full (cap=2). Storing r3 evicts r1. + pc.storeSession(r3, testHeader(udpAddr("3.3.3.3", 3))) + + if _, ok := pc.lookupSession(r1); ok { + t.Fatal("expected r1 to be evicted") + } + if _, ok := pc.lookupSession(r2); !ok { + t.Fatal("expected r2 to be present") + } + if _, ok := pc.lookupSession(r3); !ok { + t.Fatal("expected r3 to be present") + } +} diff --git a/plugin/proxyproto/README.md b/plugin/proxyproto/README.md index 1e8d9c1ec..c2c4c5f39 100644 --- a/plugin/proxyproto/README.md +++ b/plugin/proxyproto/README.md @@ -16,6 +16,7 @@ client's IP address and port information. proxyproto { allow default + udp_session_tracking [max_sessions] } ~~~ @@ -23,15 +24,26 @@ If `allow` is unspecified, PROXY protocol headers are accepted from all IP addre The `default` option controls how connections from sources not listed in `allow` are handled. If `default` is unspecified, it defaults to `ignore`. The possible values are: + - `use`: accept and use PROXY protocol headers from these sources - `ignore`: accept and ignore PROXY protocol headers from other sources - `reject`: reject connections with PROXY protocol headers from other sources - `skip`: skip PROXY protocol processing for connections from other sources, treating them as normal connections preserving the PROXY protocol headers. +The `udp_session_tracking [max_sessions]` option enables UDP session state tracking +for Cloudflare Spectrum's PROXY Protocol v2 over UDP. Spectrum sends the PPv2 header as a +standalone first datagram (with no DNS payload). Subsequent datagrams from the same client arrive +without any header. When this option is set to a positive duration, the real client address from +the header-only datagram is cached (keyed by the Spectrum-side remote address) for that duration +and automatically applied to all subsequent headerless datagrams within that window. The TTL is +refreshed on each matching packet. The optional `max_sessions` argument caps the number of +concurrent sessions in the LRU cache (default: 10240). This option has no effect for TCP +connections. ## Examples In this configuration, we allow PROXY protocol connections from all IP addresses: + ~~~ corefile . { proxyproto @@ -41,6 +53,7 @@ In this configuration, we allow PROXY protocol connections from all IP addresses In this configuration, we only allow PROXY protocol connections from the specified CIDR ranges and ignore proxy protocol headers from other sources: + ~~~ corefile . { proxyproto { @@ -52,6 +65,7 @@ and ignore proxy protocol headers from other sources: In this configuration, we only allow PROXY protocol headers from the specified CIDR ranges and reject connections without valid PROXY protocol headers from those sources: + ~~~ corefile . { proxyproto { @@ -61,3 +75,29 @@ connections without valid PROXY protocol headers from those sources: forward . /etc/resolv.conf } ~~~ + +In this configuration, we enable UDP session tracking for Cloudflare Spectrum's PPv2-over-UDP +with a 28-second TTL (slightly shorter than Spectrum's 30-second UDP idle timeout) and the +default session cap of 10240: + +~~~ corefile +. { + proxyproto { + allow 192.168.1.1/32 + udp_session_tracking 28s + } + forward . /etc/resolv.conf +} +~~~ + +In this configuration, the session cap is raised to 20480: + +~~~ corefile +. { + proxyproto { + allow 192.168.1.1/32 + udp_session_tracking 28s 20000 + } + forward . /etc/resolv.conf +} +~~~ diff --git a/plugin/proxyproto/setup.go b/plugin/proxyproto/setup.go index 1a94c4eb1..fd4a3a7bb 100644 --- a/plugin/proxyproto/setup.go +++ b/plugin/proxyproto/setup.go @@ -4,7 +4,9 @@ import ( "errors" "fmt" "net" + "strconv" "strings" + "time" "github.com/coredns/caddy" "github.com/coredns/coredns/core/dnsserver" @@ -21,8 +23,10 @@ func setup(c *caddy.Controller) error { return plugin.Error("proxyproto", errors.New("proxy protocol already configured for this server instance")) } var ( - allowedIPNets []*net.IPNet - policy = proxyproto.IGNORE + allowedIPNets []*net.IPNet + policy = proxyproto.IGNORE + sessionTrackingTTL time.Duration + sessionTrackingMaxSessions int ) for c.Next() { args := c.RemainingArgs() @@ -56,6 +60,23 @@ func setup(c *caddy.Controller) error { default: return plugin.Error("proxyproto", c.ArgErr()) } + case "udp_session_tracking": + v := c.RemainingArgs() + if len(v) < 1 || len(v) > 2 { + return plugin.Error("proxyproto", c.ArgErr()) + } + d, err := time.ParseDuration(v[0]) + if err != nil { + return plugin.Error("proxyproto", fmt.Errorf("udp_session_tracking: invalid duration %q: %w", v[0], err)) + } + sessionTrackingTTL = d + if len(v) == 2 { + n, err := strconv.Atoi(v[1]) + if err != nil || n <= 0 { + return plugin.Error("proxyproto", fmt.Errorf("udp_session_tracking: invalid max sessions %q: must be a positive integer", v[1])) + } + sessionTrackingMaxSessions = n + } default: return c.Errf("unknown option '%s'", c.Val()) } @@ -77,5 +98,7 @@ func setup(c *caddy.Controller) error { } return policy, nil } + config.ProxyProtoUDPSessionTrackingTTL = sessionTrackingTTL + config.ProxyProtoUDPSessionTrackingMaxSessions = sessionTrackingMaxSessions return nil } diff --git a/plugin/proxyproto/setup_test.go b/plugin/proxyproto/setup_test.go index f4acea2d6..455748534 100644 --- a/plugin/proxyproto/setup_test.go +++ b/plugin/proxyproto/setup_test.go @@ -3,6 +3,7 @@ package proxyproto import ( "strings" "testing" + "time" "github.com/coredns/caddy" "github.com/coredns/coredns/core/dnsserver" @@ -10,23 +11,41 @@ import ( func TestSetup(t *testing.T) { tests := []struct { - input string - shouldErr bool - expectedRoot string // expected root, set to the controller. Empty for negative cases. - expectedErrContent string // substring from the expected error. Empty for positive cases. - config bool + input string + shouldErr bool + expectedRoot string // expected root, set to the controller. Empty for negative cases. + expectedErrContent string // substring from the expected error. Empty for positive cases. + config bool + sessionTrackingTTL time.Duration + sessionTrackingMaxSessions int }{ // positive - {"proxyproto", false, "", "", true}, - {"proxyproto {\nallow 127.0.0.1/8 ::1/128\n}", false, "", "", true}, - {"proxyproto {\nallow 127.0.0.1/8 ::1/128\ndefault ignore\n}", false, "", "", true}, + {"proxyproto", false, "", "", true, 0, 0}, + {"proxyproto {\nallow 127.0.0.1/8 ::1/128\n}", false, "", "", true, 0, 0}, + {"proxyproto {\nallow 127.0.0.1/8 ::1/128\ndefault ignore\n}", false, "", "", true, 0, 0}, // Allow without any IPs is also valid - {"proxyproto {\nallow\n}", false, "", "", true}, + {"proxyproto {\nallow\n}", false, "", "", true, 0, 0}, + // udp_session_tracking with TTL only (max sessions gonna use package default) + {"proxyproto {\nudp_session_tracking 28s\n}", false, "", "", true, 28 * time.Second, 0}, + {"proxyproto {\nallow 10.0.0.0/8\nudp_session_tracking 1m\n}", false, "", "", true, time.Minute, 0}, + // udp_session_tracking with explicit max sessions + {"proxyproto {\nudp_session_tracking 28s 20000\n}", false, "", "", true, 28 * time.Second, 20000}, + {"proxyproto {\nallow 10.0.0.0/8\nudp_session_tracking 1m 500\n}", false, "", "", true, time.Minute, 500}, // negative - {"proxyproto {\nunknown\n}", true, "", "unknown option", false}, - {"proxyproto extra_arg", true, "", "Wrong argument", false}, - {"proxyproto {\nallow invalid_ip\n}", true, "", "invalid CIDR address", false}, - {"proxyproto {\nallow 127.0.0.1/8\ndefault invalid_policy\n}", true, "", "Wrong argument", false}, + {"proxyproto {\nunknown\n}", true, "", "unknown option", false, 0, 0}, + {"proxyproto extra_arg", true, "", "Wrong argument", false, 0, 0}, + {"proxyproto {\nallow invalid_ip\n}", true, "", "invalid CIDR address", false, 0, 0}, + {"proxyproto {\nallow 127.0.0.1/8\ndefault invalid_policy\n}", true, "", "Wrong argument", false, 0, 0}, + // udp_session_tracking: missing TTL + {"proxyproto {\nudp_session_tracking\n}", true, "", "Wrong argument", false, 0, 0}, + // udp_session_tracking: too many arguments + {"proxyproto {\nudp_session_tracking 28s 100 extra\n}", true, "", "Wrong argument", false, 0, 0}, + // udp_session_tracking: bad TTL + {"proxyproto {\nudp_session_tracking notaduration\n}", true, "", "invalid duration", false, 0, 0}, + // udp_session_tracking: bad max sessions + {"proxyproto {\nudp_session_tracking 28s notanumber\n}", true, "", "invalid max sessions", false, 0, 0}, + {"proxyproto {\nudp_session_tracking 28s 0\n}", true, "", "invalid max sessions", false, 0, 0}, + {"proxyproto {\nudp_session_tracking 28s -1\n}", true, "", "invalid max sessions", false, 0, 0}, } for i, test := range tests { c := caddy.NewTestController("dns", test.input) @@ -40,6 +59,16 @@ func TestSetup(t *testing.T) { t.Errorf("Test %d: Expected ProxyProtoConnPolicy to NOT be configured for input %s", i, test.input) } + if cfg.ProxyProtoUDPSessionTrackingTTL != test.sessionTrackingTTL { + t.Errorf("Test %d: Expected ProxyProtoUDPSessionTrackingTTL %v, got %v for input %s", + i, test.sessionTrackingTTL, cfg.ProxyProtoUDPSessionTrackingTTL, test.input) + } + + if cfg.ProxyProtoUDPSessionTrackingMaxSessions != test.sessionTrackingMaxSessions { + t.Errorf("Test %d: Expected ProxyProtoUDPSessionTrackingMaxSessions %d, got %d for input %s", + i, test.sessionTrackingMaxSessions, cfg.ProxyProtoUDPSessionTrackingMaxSessions, test.input) + } + if test.shouldErr && err == nil { t.Errorf("Test %d: Expected error but found %s for input %s", i, err, test.input) }