diff options
| -rw-r--r-- | .github/workflows/build-package.yml | 17 | ||||
| -rw-r--r-- | Makefile | 1 | ||||
| -rw-r--r-- | data/templates/load-balancing/haproxy.cfg.j2 | 7 | ||||
| -rw-r--r-- | interface-definitions/load-balancing_reverse-proxy.xml.in | 31 | ||||
| -rw-r--r-- | op-mode-definitions/mtr.xml.in | 4 | ||||
| -rwxr-xr-x | smoketest/scripts/cli/test_load-balancing_reverse-proxy.py | 53 | ||||
| -rwxr-xr-x | src/conf_mode/load-balancing_reverse-proxy.py | 13 | ||||
| -rwxr-xr-x | src/conf_mode/nat64.py | 10 | ||||
| -rwxr-xr-x | src/conf_mode/protocols_bfd.py | 2 | 
9 files changed, 131 insertions, 7 deletions
diff --git a/.github/workflows/build-package.yml b/.github/workflows/build-package.yml new file mode 100644 index 000000000..0200aceb4 --- /dev/null +++ b/.github/workflows/build-package.yml @@ -0,0 +1,17 @@ +name: Debian Package Build +on: +  pull_request: +    branches: +      - current + +jobs: +  package-build: +    runs-on: ubuntu-latest +    container: +      image: vyos/vyos-build:current +      options: --sysctl net.ipv6.conf.lo.disable_ipv6=0 +    steps: +      - name: Checkout +        uses: actions/checkout@v4 +      - name: Build Debian package +        run: dpkg-buildpackage -uc -us -tc -b @@ -66,6 +66,7 @@ op_mode_definitions: $(op_xml_obj)  	ln -s ../node.tag $(OP_TMPL_DIR)/ping/node.tag/node.tag/  	ln -s ../node.tag $(OP_TMPL_DIR)/traceroute/node.tag/node.tag/  	ln -s ../node.tag $(OP_TMPL_DIR)/mtr/node.tag/node.tag/ +	ln -s ../node.tag $(OP_TMPL_DIR)/monitor/traceroute/node.tag/node.tag/  	# XXX: test if there are empty node.def files - this is not allowed as these  	# could mask help strings or mandatory priority statements diff --git a/data/templates/load-balancing/haproxy.cfg.j2 b/data/templates/load-balancing/haproxy.cfg.j2 index b786a58f8..c6027e09b 100644 --- a/data/templates/load-balancing/haproxy.cfg.j2 +++ b/data/templates/load-balancing/haproxy.cfg.j2 @@ -131,6 +131,13 @@ frontend {{ front }}  {% if backend is vyos_defined %}  {%     for back, back_config in backend.items() %}  backend {{ back }} +{%         if back_config.health_check is vyos_defined %} +{%             if back_config.health_check == 'smtp' %} +    option smtpchk +{%             else  %} +    option {{ back_config.health_check }}-check +{%             endif %} +{%         endif %}  {%         if back_config.http_check is vyos_defined %}      option httpchk  {%         endif %} diff --git a/interface-definitions/load-balancing_reverse-proxy.xml.in b/interface-definitions/load-balancing_reverse-proxy.xml.in index e50e6e579..ce757a5d6 100644 --- a/interface-definitions/load-balancing_reverse-proxy.xml.in +++ b/interface-definitions/load-balancing_reverse-proxy.xml.in @@ -151,6 +151,37 @@                    </node>                  </children>                </node> +              <leafNode name="health-check"> +                <properties> +                  <help>Non HTTP health check options</help> +                  <completionHelp> +                    <list>ldap mysql pgsql redis smtp</list> +                  </completionHelp> +                  <valueHelp> +                    <format>ldap</format> +                    <description>LDAP protocol check</description> +                  </valueHelp> +                  <valueHelp> +                    <format>mysql</format> +                    <description>MySQL protocol check</description> +                  </valueHelp> +                  <valueHelp> +                    <format>pgsql</format> +                    <description>PostgreSQL protocol check</description> +                  </valueHelp> +                  <valueHelp> +                    <format>redis</format> +                    <description>Redis protocol check</description> +                  </valueHelp> +                  <valueHelp> +                    <format>smtp</format> +                    <description>SMTP protocol check</description> +                  </valueHelp> +                  <constraint> +                    <regex>(ldap|mysql|redis|pgsql|smtp)</regex> +                  </constraint> +                </properties> +              </leafNode>                #include <include/haproxy/rule-backend.xml.i>                <tagNode name="server">                  <properties> diff --git a/op-mode-definitions/mtr.xml.in b/op-mode-definitions/mtr.xml.in index 8239aec4c..66729e2bc 100644 --- a/op-mode-definitions/mtr.xml.in +++ b/op-mode-definitions/mtr.xml.in @@ -13,7 +13,7 @@          <children>            <leafNode name="node.tag">              <properties> -              <help>mtr options</help> +              <help>Traceroute options</help>                <completionHelp>                  <script>${vyos_op_scripts_dir}/mtr.py --get-options-nested "${COMP_WORDS[@]}"</script>                </completionHelp> @@ -35,7 +35,7 @@      <children>        <leafNode name="node.tag">          <properties> -          <help>Traceroute options</help> +          <help>mtr options</help>            <completionHelp>              <script>${vyos_op_scripts_dir}/mtr.py --get-options "${COMP_WORDS[@]}"</script>            </completionHelp> diff --git a/smoketest/scripts/cli/test_load-balancing_reverse-proxy.py b/smoketest/scripts/cli/test_load-balancing_reverse-proxy.py index 2b2f93cdf..aa796f59f 100755 --- a/smoketest/scripts/cli/test_load-balancing_reverse-proxy.py +++ b/smoketest/scripts/cli/test_load-balancing_reverse-proxy.py @@ -338,6 +338,11 @@ class TestLoadBalancingReverseProxy(VyOSUnitTestSHIM.TestCase):          self.assertIn('http-check send meth GET uri /health', config)          self.assertIn('http-check expect string success', config) +        # Test configuring both http-check & health-check fails validation script +        self.cli_set(base_path + ['backend', 'bk-01', 'health-check', 'ldap']) +        with self.assertRaises(ConfigSessionError) as e: +            self.cli_commit() +      def test_06_lb_reverse_proxy_tcp_mode(self):          frontend = 'tcp_8443'          mode = 'tcp' @@ -405,6 +410,54 @@ class TestLoadBalancingReverseProxy(VyOSUnitTestSHIM.TestCase):          with self.assertRaises(ConfigSessionError) as e:              self.cli_commit() +    def test_08_lb_reverse_proxy_tcp_health_checks(self): +        # Setup PKI +        self.configure_pki() + +        # Define variables +        frontend = 'fe_ldaps' +        mode = 'tcp' +        health_check = 'ldap' +        front_port = '636' +        bk_name = 'bk_ldap' +        bk_servers = ['192.0.2.11', '192.0.2.12'] +        bk_server_port = '389' + +        # Configure frontend +        self.cli_set(base_path + ['service', frontend, 'mode', mode]) +        self.cli_set(base_path + ['service', frontend, 'port', front_port]) +        self.cli_set(base_path + ['service', frontend, 'ssl', 'certificate', 'smoketest']) + +        # Configure backend +        self.cli_set(base_path + ['backend', bk_name, 'mode', mode]) +        self.cli_set(base_path + ['backend', bk_name, 'health-check', health_check]) +        for index, bk_server in enumerate(bk_servers): +            self.cli_set(base_path + ['backend', bk_name, 'server', f'srv-{index}', 'address', bk_server]) +            self.cli_set(base_path + ['backend', bk_name, 'server', f'srv-{index}', 'port', bk_server_port]) + +        # Commit & read config +        self.cli_commit() +        config = read_file(HAPROXY_CONF) + +        # Validate Frontend +        self.assertIn(f'frontend {frontend}', config) +        self.assertIn(f'bind [::]:{front_port} v4v6 ssl crt /run/haproxy/smoketest.pem', config) +        self.assertIn(f'mode {mode}', config) +        self.assertIn(f'backend {bk_name}', config) + +        # Validate Backend +        self.assertIn(f'backend {bk_name}', config) +        self.assertIn(f'option {health_check}-check', config) +        self.assertIn(f'mode {mode}', config) +        for index, bk_server in enumerate(bk_servers): +            self.assertIn(f'server srv-{index} {bk_server}:{bk_server_port}', config) + +        # Validate SMTP option renders correctly +        self.cli_set(base_path + ['backend', bk_name, 'health-check', 'smtp']) +        self.cli_commit() +        config = read_file(HAPROXY_CONF) +        self.assertIn(f'option smtpchk', config) +  if __name__ == '__main__':      unittest.main(verbosity=2) diff --git a/src/conf_mode/load-balancing_reverse-proxy.py b/src/conf_mode/load-balancing_reverse-proxy.py index 1c1252df0..09c68dadd 100755 --- a/src/conf_mode/load-balancing_reverse-proxy.py +++ b/src/conf_mode/load-balancing_reverse-proxy.py @@ -79,12 +79,21 @@ def verify(lb):              raise ConfigError(f'"TCP" port "{tmp_port}" is used by another service')      for back, back_config in lb['backend'].items(): -        if 'http-check' in back_config: -            http_check = back_config['http-check'] +        if 'http_check' in back_config: +            http_check = back_config['http_check']              if 'expect' in http_check and 'status' in http_check['expect'] and 'string' in http_check['expect']:                  raise ConfigError(f'"expect status" and "expect string" can not be configured together!') + +        if 'health_check' in back_config: +            if 'mode' not in back_config or back_config['mode'] != 'tcp': +                raise ConfigError(f'backend "{back}" can only be configured with {back_config["health_check"]} ' + +                                  f'health-check whilst in TCP mode!') +            if 'http_check' in back_config: +                raise ConfigError(f'backend "{back}" cannot be configured with both http-check and health-check!') +          if 'server' not in back_config:              raise ConfigError(f'"{back} server" must be configured!') +          for bk_server, bk_server_conf in back_config['server'].items():              if 'address' not in bk_server_conf or 'port' not in bk_server_conf:                  raise ConfigError(f'"backend {back} server {bk_server} address and port" must be configured!') diff --git a/src/conf_mode/nat64.py b/src/conf_mode/nat64.py index c1e7ebf85..32a1c47d1 100755 --- a/src/conf_mode/nat64.py +++ b/src/conf_mode/nat64.py @@ -20,7 +20,7 @@ import csv  import os  import re -from ipaddress import IPv6Network +from ipaddress import IPv6Network, IPv6Address  from json import dumps as json_write  from vyos import ConfigError @@ -103,8 +103,14 @@ def verify(nat64) -> None:              # Verify that source.prefix is set and is a /96              if not dict_search("source.prefix", instance):                  raise ConfigError(f"Source NAT64 rule {rule} missing source prefix") -            if IPv6Network(instance["source"]["prefix"]).prefixlen != 96: +            src_prefix = IPv6Network(instance["source"]["prefix"]) +            if src_prefix.prefixlen != 96:                  raise ConfigError(f"Source NAT64 rule {rule} source prefix must be /96") +            if (int(src_prefix[0]) & int(IPv6Address('0:0:0:0:ff00::'))) != 0: +                raise ConfigError( +                    f'Source NAT64 rule {rule} source prefix is not RFC6052-compliant: ' +                    'bits 64 to 71 (9th octet) must be zeroed' +                )              pools = dict_search("translation.pool", instance)              if pools: diff --git a/src/conf_mode/protocols_bfd.py b/src/conf_mode/protocols_bfd.py index 1c01a9013..1361bb1a9 100755 --- a/src/conf_mode/protocols_bfd.py +++ b/src/conf_mode/protocols_bfd.py @@ -49,7 +49,7 @@ def verify(bfd):          for peer, peer_config in bfd['peer'].items():              # IPv6 link local peers require an explicit local address/interface              if is_ipv6_link_local(peer): -                if 'source' not in peer_config or len(peer_config['source'] < 2): +                if 'source' not in peer_config or len(peer_config['source']) < 2:                      raise ConfigError('BFD IPv6 link-local peers require explicit local address and interface setting')              # IPv6 peers require an explicit local address  | 
