dialParameters_test.go 36 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/json"
  24. "fmt"
  25. "io/ioutil"
  26. "os"
  27. "reflect"
  28. "testing"
  29. "time"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  36. lrucache "github.com/cognusion/go-cache-lru"
  37. )
  38. func TestDialParametersAndReplay(t *testing.T) {
  39. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  40. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  41. runDialParametersAndReplay(t, tunnelProtocol)
  42. }
  43. }
  44. }
  45. var testNetworkID = prng.HexString(8)
  46. type testNetworkGetter struct {
  47. }
  48. func (t *testNetworkGetter) GetNetworkID() string {
  49. return testNetworkID
  50. }
  51. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  52. t.Logf("Test %s...", tunnelProtocol)
  53. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  54. if err != nil {
  55. t.Fatalf("TempDir failed: %s", err)
  56. }
  57. defer os.RemoveAll(testDataDirName)
  58. SetNoticeWriter(ioutil.Discard)
  59. clientConfig := &Config{
  60. PropagationChannelId: "0",
  61. SponsorId: "0",
  62. DataRootDirectory: testDataDirName,
  63. NetworkIDGetter: new(testNetworkGetter),
  64. }
  65. err = clientConfig.Commit(false)
  66. if err != nil {
  67. t.Fatalf("error committing configuration file: %s", err)
  68. }
  69. holdOffTunnelProtocols := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  70. providerID := prng.HexString(8)
  71. frontingProviderID := prng.HexString(8)
  72. var holdOffDirectServerEntryRegions []string
  73. if tunnelProtocol == protocol.TUNNEL_PROTOCOL_TLS_OBFUSCATED_SSH {
  74. holdOffDirectServerEntryRegions = []string{"CA"}
  75. }
  76. var holdOffDirectServerEntryProviderRegions parameters.KeyStrings
  77. if tunnelProtocol == protocol.TUNNEL_PROTOCOL_UNFRONTED_MEEK {
  78. holdOffDirectServerEntryProviderRegions = map[string][]string{providerID: {""}}
  79. }
  80. applyParameters := make(map[string]interface{})
  81. applyParameters[parameters.TransformHostNameProbability] = 1.0
  82. applyParameters[parameters.PickUserAgentProbability] = 1.0
  83. applyParameters[parameters.HoldOffTunnelMinDuration] = "1ms"
  84. applyParameters[parameters.HoldOffTunnelMaxDuration] = "10ms"
  85. applyParameters[parameters.HoldOffTunnelProtocols] = holdOffTunnelProtocols
  86. applyParameters[parameters.HoldOffTunnelFrontingProviderIDs] = []string{frontingProviderID}
  87. applyParameters[parameters.HoldOffTunnelProbability] = 1.0
  88. applyParameters[parameters.HoldOffDirectTunnelMinDuration] = "1ms"
  89. applyParameters[parameters.HoldOffDirectTunnelMaxDuration] = "10ms"
  90. applyParameters[parameters.HoldOffDirectServerEntryRegions] = holdOffDirectServerEntryRegions
  91. applyParameters[parameters.HoldOffDirectServerEntryProviderRegions] = holdOffDirectServerEntryProviderRegions
  92. applyParameters[parameters.HoldOffDirectTunnelProbability] = 1.0
  93. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  94. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  95. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  96. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  97. applyParameters[parameters.OSSHObfuscatorSeedTransformProbability] = 1.0
  98. applyParameters[parameters.OSSHObfuscatorSeedTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  99. applyParameters[parameters.OSSHObfuscatorSeedTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  100. applyParameters[parameters.ObfuscatedQUICNonceTransformProbability] = 1.0
  101. applyParameters[parameters.ObfuscatedQUICNonceTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  102. applyParameters[parameters.ObfuscatedQUICNonceTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  103. err = clientConfig.SetParameters("tag1", false, applyParameters)
  104. if err != nil {
  105. t.Fatalf("SetParameters failed: %s", err)
  106. }
  107. resolver := NewResolver(clientConfig, true)
  108. defer resolver.Stop()
  109. clientConfig.SetResolver(resolver)
  110. err = OpenDataStore(clientConfig)
  111. if err != nil {
  112. t.Fatalf("error initializing client datastore: %s", err)
  113. }
  114. defer CloseDataStore()
  115. serverEntries := makeMockServerEntries(tunnelProtocol, "CA", providerID, frontingProviderID, 100)
  116. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  117. return replayProtocol == tunnelProtocol
  118. }
  119. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  120. return tunnelProtocol, true
  121. }
  122. values.SetSSHClientVersionsSpec(
  123. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  124. values.SetUserAgentsSpec(
  125. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  126. // Test: expected dial parameter fields set
  127. steeringIPCache := lrucache.NewWithLRU(1*time.Hour, 1*time.Hour, 0)
  128. upstreamProxyErrorCallback := func(_ error) {}
  129. dialParams, err := MakeDialParameters(
  130. clientConfig, steeringIPCache, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  131. if err != nil {
  132. t.Fatalf("MakeDialParameters failed: %s", err)
  133. }
  134. if dialParams.ServerEntry != serverEntries[0] {
  135. t.Fatalf("unexpected server entry")
  136. }
  137. if dialParams.NetworkID != testNetworkID {
  138. t.Fatalf("unexpected network ID")
  139. }
  140. if dialParams.IsReplay {
  141. t.Fatalf("unexpected replay")
  142. }
  143. if dialParams.TunnelProtocol != tunnelProtocol {
  144. t.Fatalf("unexpected tunnel protocol")
  145. }
  146. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  147. dialParams.DirectDialAddress == "" {
  148. t.Fatalf("missing direct dial fields")
  149. }
  150. if dialParams.DialPortNumber == "" {
  151. t.Fatalf("missing port number fields")
  152. }
  153. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  154. t.Fatalf("missing SSH fields")
  155. }
  156. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  157. dialParams.ObfuscatorPaddingSeed == nil {
  158. t.Fatalf("missing obfuscator fields")
  159. }
  160. if dialParams.FragmentorSeed == nil {
  161. t.Fatalf("missing fragmentor field")
  162. }
  163. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  164. (dialParams.MeekDialAddress == "" ||
  165. dialParams.MeekHostHeader == "" ||
  166. dialParams.MeekObfuscatorPaddingSeed == nil) {
  167. t.Fatalf("missing meek fields")
  168. }
  169. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  170. (dialParams.MeekFrontingDialAddress == "" ||
  171. dialParams.MeekFrontingHost == "" ||
  172. dialParams.ResolveParameters == nil) {
  173. t.Fatalf("missing meek fronting fields")
  174. }
  175. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  176. dialParams.UserAgent == "" {
  177. t.Fatalf("missing meek HTTP fields")
  178. }
  179. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  180. (dialParams.MeekSNIServerName == "" ||
  181. !dialParams.SelectedTLSProfile ||
  182. dialParams.TLSProfile == "") {
  183. t.Fatalf("missing meek HTTPS fields")
  184. }
  185. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  186. if dialParams.QUICVersion == "" {
  187. t.Fatalf("missing QUIC version field")
  188. }
  189. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  190. if dialParams.MeekFrontingDialAddress == "" ||
  191. dialParams.MeekFrontingHost == "" ||
  192. dialParams.MeekSNIServerName == "" {
  193. t.Fatalf("missing fronted QUIC fields")
  194. }
  195. } else {
  196. if dialParams.QUICDialSNIAddress == "" {
  197. t.Fatalf("missing QUIC SNI field")
  198. }
  199. }
  200. }
  201. if dialParams.LivenessTestSeed == nil {
  202. t.Fatalf("missing liveness test fields")
  203. }
  204. if dialParams.APIRequestPaddingSeed == nil {
  205. t.Fatalf("missing API request fields")
  206. }
  207. expectHoldOffTunnelProtocols := common.Contains(holdOffTunnelProtocols, tunnelProtocol)
  208. expectHoldOffTunnelFrontingProviderIDs := protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol)
  209. expectHoldOffDirectServerEntryRegions := protocol.TunnelProtocolIsDirect(tunnelProtocol) &&
  210. common.Contains(holdOffDirectServerEntryRegions, dialParams.ServerEntry.Region)
  211. expectHoldOffDirectServerEntryProviderRegion := protocol.TunnelProtocolIsDirect(tunnelProtocol) &&
  212. common.ContainsAny(
  213. holdOffDirectServerEntryProviderRegions[dialParams.ServerEntry.ProviderID],
  214. []string{"", dialParams.ServerEntry.Region})
  215. if expectHoldOffTunnelProtocols ||
  216. expectHoldOffTunnelFrontingProviderIDs ||
  217. expectHoldOffDirectServerEntryRegions ||
  218. expectHoldOffDirectServerEntryProviderRegion {
  219. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  220. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  221. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  222. }
  223. } else {
  224. if dialParams.HoldOffTunnelDuration != 0 {
  225. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  226. }
  227. }
  228. dialConfig := dialParams.GetDialConfig()
  229. if dialConfig.UpstreamProxyErrorCallback == nil {
  230. t.Fatalf("missing upstreamProxyErrorCallback")
  231. }
  232. // Test: no replay after dial reported to fail
  233. dialParams.Failed(clientConfig)
  234. dialParams, err = MakeDialParameters(
  235. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  236. if err != nil {
  237. t.Fatalf("MakeDialParameters failed: %s", err)
  238. }
  239. if dialParams.IsReplay {
  240. t.Fatalf("unexpected replay")
  241. }
  242. // Test: no replay after network ID changes
  243. dialParams.Succeeded()
  244. testNetworkID = prng.HexString(8)
  245. dialParams, err = MakeDialParameters(
  246. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  247. if err != nil {
  248. t.Fatalf("MakeDialParameters failed: %s", err)
  249. }
  250. if dialParams.NetworkID != testNetworkID {
  251. t.Fatalf("unexpected network ID")
  252. }
  253. if dialParams.IsReplay {
  254. t.Fatalf("unexpected replay")
  255. }
  256. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  257. dialParams.Succeeded()
  258. replayDialParams, err := MakeDialParameters(
  259. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  260. if err != nil {
  261. t.Fatalf("MakeDialParameters failed: %s", err)
  262. }
  263. if !replayDialParams.IsReplay {
  264. t.Fatalf("unexpected non-replay")
  265. }
  266. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  267. t.Fatalf("unexpected non-updated timestamp")
  268. }
  269. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  270. t.Fatalf("mismatching tunnel protocol")
  271. }
  272. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  273. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  274. t.Fatalf("mismatching dial fields")
  275. }
  276. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  277. if seed1 == nil {
  278. return seed2 == nil
  279. }
  280. return bytes.Equal(seed1[:], seed2[:])
  281. }
  282. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  283. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  284. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  285. t.Fatalf("mismatching SSH fields")
  286. }
  287. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  288. t.Fatalf("mismatching obfuscator fields")
  289. }
  290. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  291. t.Fatalf("mismatching fragmentor fields")
  292. }
  293. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  294. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  295. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  296. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  297. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  298. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  299. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  300. t.Fatalf("mismatching meek fields")
  301. }
  302. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  303. replayDialParams.UserAgent != dialParams.UserAgent {
  304. t.Fatalf("mismatching user agent fields")
  305. }
  306. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  307. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  308. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  309. t.Fatalf("mismatching TLS fields")
  310. }
  311. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  312. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  313. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  314. t.Fatalf("mismatching QUIC fields")
  315. }
  316. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  317. t.Fatalf("mismatching liveness test fields")
  318. }
  319. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  320. t.Fatalf("mismatching API request fields")
  321. }
  322. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  323. (replayDialParams.ResolveParameters != nil &&
  324. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  325. t.Fatalf("mismatching ResolveParameters fields")
  326. }
  327. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  328. (replayDialParams.HTTPTransformerParameters != nil &&
  329. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  330. t.Fatalf("mismatching HTTPTransformerParameters fields")
  331. }
  332. if (replayDialParams.OSSHObfuscatorSeedTransformerParameters == nil) != (dialParams.OSSHObfuscatorSeedTransformerParameters == nil) ||
  333. (replayDialParams.OSSHObfuscatorSeedTransformerParameters != nil &&
  334. !reflect.DeepEqual(replayDialParams.OSSHObfuscatorSeedTransformerParameters, dialParams.OSSHObfuscatorSeedTransformerParameters)) {
  335. t.Fatalf("mismatching ObfuscatorSeedTransformerParameters fields")
  336. }
  337. if (replayDialParams.ObfuscatedQUICNonceTransformerParameters == nil) != (dialParams.ObfuscatedQUICNonceTransformerParameters == nil) ||
  338. (replayDialParams.ObfuscatedQUICNonceTransformerParameters != nil &&
  339. !reflect.DeepEqual(replayDialParams.ObfuscatedQUICNonceTransformerParameters, dialParams.ObfuscatedQUICNonceTransformerParameters)) {
  340. t.Fatalf("mismatching ObfuscatedQUICNonceTransformerParameters fields")
  341. }
  342. // Test: replay after change tactics, with ReplayIgnoreChangedClientState = true
  343. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  344. applyParameters[parameters.ReplayIgnoreChangedConfigState] = true
  345. err = clientConfig.SetParameters("tag2a", false, applyParameters)
  346. if err != nil {
  347. t.Fatalf("SetParameters failed: %s", err)
  348. }
  349. dialParams, err = MakeDialParameters(
  350. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  351. if err != nil {
  352. t.Fatalf("MakeDialParameters failed: %s", err)
  353. }
  354. if !replayDialParams.IsReplay {
  355. t.Fatalf("unexpected non-replay")
  356. }
  357. // Test: no replay after change tactics
  358. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  359. applyParameters[parameters.ReplayIgnoreChangedConfigState] = false
  360. err = clientConfig.SetParameters("tag2", false, applyParameters)
  361. if err != nil {
  362. t.Fatalf("SetParameters failed: %s", err)
  363. }
  364. dialParams, err = MakeDialParameters(
  365. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  366. if err != nil {
  367. t.Fatalf("MakeDialParameters failed: %s", err)
  368. }
  369. if dialParams.IsReplay {
  370. t.Fatalf("unexpected replay")
  371. }
  372. // Test: no replay after dial parameters expired
  373. dialParams.Succeeded()
  374. time.Sleep(1 * time.Second)
  375. dialParams, err = MakeDialParameters(
  376. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  377. if err != nil {
  378. t.Fatalf("MakeDialParameters failed: %s", err)
  379. }
  380. if dialParams.IsReplay {
  381. t.Fatalf("unexpected replay")
  382. }
  383. // Test: no replay after server entry changes
  384. dialParams.Succeeded()
  385. serverEntries[0].ConfigurationVersion += 1
  386. dialParams, err = MakeDialParameters(
  387. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  388. if err != nil {
  389. t.Fatalf("MakeDialParameters failed: %s", err)
  390. }
  391. if dialParams.IsReplay {
  392. t.Fatalf("unexpected replay")
  393. }
  394. // Test: disable replay elements (partial coverage)
  395. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  396. applyParameters[parameters.ReplaySSH] = false
  397. applyParameters[parameters.ReplayObfuscatorPadding] = false
  398. applyParameters[parameters.ReplayFragmentor] = false
  399. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  400. applyParameters[parameters.ReplayLivenessTest] = false
  401. applyParameters[parameters.ReplayAPIRequestPadding] = false
  402. err = clientConfig.SetParameters("tag3", false, applyParameters)
  403. if err != nil {
  404. t.Fatalf("SetParameters failed: %s", err)
  405. }
  406. dialParams, err = MakeDialParameters(
  407. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  408. if err != nil {
  409. t.Fatalf("MakeDialParameters failed: %s", err)
  410. }
  411. dialParams.Succeeded()
  412. replayDialParams, err = MakeDialParameters(
  413. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  414. if err != nil {
  415. t.Fatalf("MakeDialParameters failed: %s", err)
  416. }
  417. if !replayDialParams.IsReplay {
  418. t.Fatalf("unexpected non-replay")
  419. }
  420. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  421. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  422. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  423. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  424. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  425. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  426. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  427. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  428. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  429. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  430. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  431. t.Fatalf("unexpected replayed fields")
  432. }
  433. // Test: client-side restrict fronting provider ID
  434. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  435. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  436. err = clientConfig.SetParameters("tag4", false, applyParameters)
  437. if err != nil {
  438. t.Fatalf("SetParameters failed: %s", err)
  439. }
  440. dialParams, err = MakeDialParameters(
  441. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  442. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  443. if err == nil {
  444. if dialParams != nil {
  445. t.Fatalf("unexpected MakeDialParameters success")
  446. }
  447. }
  448. } else {
  449. if err != nil {
  450. t.Fatalf("MakeDialParameters failed: %s", err)
  451. }
  452. }
  453. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  454. err = clientConfig.SetParameters("tag5", false, applyParameters)
  455. if err != nil {
  456. t.Fatalf("SetParameters failed: %s", err)
  457. }
  458. // Test: client-side restrict provider ID
  459. applyParameters[parameters.RestrictDirectProviderIDs] = []string{providerID}
  460. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 1.0
  461. err = clientConfig.SetParameters("tag6", false, applyParameters)
  462. if err != nil {
  463. t.Fatalf("SetParameters failed: %s", err)
  464. }
  465. dialParams, err = MakeDialParameters(
  466. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  467. if protocol.TunnelProtocolIsDirect(tunnelProtocol) {
  468. if err == nil {
  469. if dialParams != nil {
  470. t.Fatalf("unexpected MakeDialParameters success")
  471. }
  472. }
  473. } else {
  474. if err != nil {
  475. t.Fatalf("MakeDialParameters failed: %s", err)
  476. }
  477. }
  478. applyParameters[parameters.RestrictDirectProviderIDs] = []string{}
  479. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 0.0
  480. err = clientConfig.SetParameters("tag7", false, applyParameters)
  481. if err != nil {
  482. t.Fatalf("SetParameters failed: %s", err)
  483. }
  484. // Test: client-side restrict provider ID by region
  485. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{providerID: {"CA"}}
  486. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 1.0
  487. err = clientConfig.SetParameters("tag6", false, applyParameters)
  488. if err != nil {
  489. t.Fatalf("SetParameters failed: %s", err)
  490. }
  491. dialParams, err = MakeDialParameters(
  492. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  493. if protocol.TunnelProtocolIsDirect(tunnelProtocol) {
  494. if err == nil {
  495. if dialParams != nil {
  496. t.Fatalf("unexpected MakeDialParameters success")
  497. }
  498. }
  499. } else {
  500. if err != nil {
  501. t.Fatalf("MakeDialParameters failed: %s", err)
  502. }
  503. }
  504. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{}
  505. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 0.0
  506. err = clientConfig.SetParameters("tag7", false, applyParameters)
  507. if err != nil {
  508. t.Fatalf("SetParameters failed: %s", err)
  509. }
  510. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  511. steeringIPCache.Flush()
  512. // Test: steering IP used in non-replay case
  513. dialParams, err = MakeDialParameters(
  514. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  515. dialParams.Failed(clientConfig)
  516. getCacheKey := func() string {
  517. return fmt.Sprintf("%s %s %s", testNetworkID, frontingProviderID, tunnelProtocol)
  518. }
  519. setCacheEntry := func(steeringIP string) {
  520. steeringIPCache.Set(getCacheKey(), steeringIP, lrucache.DefaultExpiration)
  521. }
  522. setCacheEntry("127.0.0.1")
  523. dialParams, err = MakeDialParameters(
  524. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  525. if err != nil {
  526. t.Fatalf("MakeDialParameters failed: %s", err)
  527. }
  528. if dialParams.IsReplay {
  529. t.Fatalf("unexpected replay")
  530. }
  531. checkSteeringIP := func(expectedSteeringIP string) {
  532. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Microsecond)
  533. defer cancelFunc()
  534. IPs, err := dialParams.dialConfig.ResolveIP(ctx, "example.com")
  535. if err != nil {
  536. t.Fatalf("ResolveIP failed: %s", err)
  537. }
  538. if IPs[0].String() != expectedSteeringIP {
  539. t.Fatalf("missing expected steering IP")
  540. }
  541. }
  542. checkSteeringIP("127.0.0.1")
  543. // Test: steering IP used in replay case
  544. dialParams.Succeeded()
  545. dialParams, err = MakeDialParameters(
  546. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  547. if err != nil {
  548. t.Fatalf("MakeDialParameters failed: %s", err)
  549. }
  550. if !dialParams.IsReplay {
  551. t.Fatalf("unexpected non-replay")
  552. }
  553. checkSteeringIP("127.0.0.1")
  554. // Test: different steering IP clears replay flag
  555. dialParams.Succeeded()
  556. setCacheEntry("127.0.0.2")
  557. dialParams, err = MakeDialParameters(
  558. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  559. if err != nil {
  560. t.Fatalf("MakeDialParameters failed: %s", err)
  561. }
  562. if dialParams.IsReplay {
  563. t.Fatalf("unexpected replay")
  564. }
  565. checkSteeringIP("127.0.0.2")
  566. // Test: newly present steering IP clears replay flag
  567. steeringIPCache.Flush()
  568. dialParams, err = MakeDialParameters(
  569. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  570. if err != nil {
  571. t.Fatalf("MakeDialParameters failed: %s", err)
  572. }
  573. dialParams.Succeeded()
  574. setCacheEntry("127.0.0.3")
  575. dialParams, err = MakeDialParameters(
  576. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  577. if err != nil {
  578. t.Fatalf("MakeDialParameters failed: %s", err)
  579. }
  580. if dialParams.IsReplay {
  581. t.Fatalf("unexpected replay")
  582. }
  583. // Test: steering IP cleared from cache after failure
  584. dialParams.Failed(clientConfig)
  585. _, ok := steeringIPCache.Get(getCacheKey())
  586. if ok {
  587. t.Fatalf("unexpected steering IP cache entry")
  588. }
  589. }
  590. // Test: iterator shuffles
  591. for i, serverEntry := range serverEntries {
  592. data, err := json.Marshal(serverEntry)
  593. if err != nil {
  594. t.Fatalf("json.Marshal failed: %s", err)
  595. }
  596. var serverEntryFields protocol.ServerEntryFields
  597. err = json.Unmarshal(data, &serverEntryFields)
  598. if err != nil {
  599. t.Fatalf("json.Unmarshal failed: %s", err)
  600. }
  601. err = StoreServerEntry(serverEntryFields, false)
  602. if err != nil {
  603. t.Fatalf("StoreServerEntry failed: %s", err)
  604. }
  605. if i%10 == 0 {
  606. dialParams, err := MakeDialParameters(
  607. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  608. if err != nil {
  609. t.Fatalf("MakeDialParameters failed: %s", err)
  610. }
  611. dialParams.Succeeded()
  612. }
  613. }
  614. for i := 0; i < 5; i++ {
  615. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  616. if err != nil {
  617. t.Fatalf("NewServerEntryIterator failed: %s", err)
  618. }
  619. if hasAffinity {
  620. t.Fatalf("unexpected affinity server")
  621. }
  622. // Test: the first shuffle should move the replay candidates to the front
  623. for j := 0; j < 10; j++ {
  624. serverEntry, err := iterator.Next()
  625. if err != nil {
  626. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  627. }
  628. dialParams, err := MakeDialParameters(
  629. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  630. if err != nil {
  631. t.Fatalf("MakeDialParameters failed: %s", err)
  632. }
  633. if !dialParams.IsReplay {
  634. t.Fatalf("unexpected non-replay")
  635. }
  636. }
  637. iterator.Reset()
  638. // Test: subsequent shuffles should not move the replay candidates
  639. allReplay := true
  640. for j := 0; j < 10; j++ {
  641. serverEntry, err := iterator.Next()
  642. if err != nil {
  643. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  644. }
  645. dialParams, err := MakeDialParameters(
  646. clientConfig, steeringIPCache, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  647. if err != nil {
  648. t.Fatalf("MakeDialParameters failed: %s", err)
  649. }
  650. if !dialParams.IsReplay {
  651. allReplay = false
  652. }
  653. }
  654. if allReplay {
  655. t.Fatalf("unexpected all replay")
  656. }
  657. iterator.Close()
  658. }
  659. }
  660. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  661. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  662. if err != nil {
  663. t.Fatalf("TempDir failed: %s", err)
  664. }
  665. defer os.RemoveAll(testDataDirName)
  666. SetNoticeWriter(ioutil.Discard)
  667. clientConfig := &Config{
  668. PropagationChannelId: "0",
  669. SponsorId: "0",
  670. DataRootDirectory: testDataDirName,
  671. NetworkIDGetter: new(testNetworkGetter),
  672. }
  673. err = clientConfig.Commit(false)
  674. if err != nil {
  675. t.Fatalf("error committing configuration file: %s", err)
  676. }
  677. jsonLimitDialPortNumbers := `
  678. {
  679. "SSH" : [[10,11]],
  680. "OSSH" : [[20,21]],
  681. "QUIC-OSSH" : [[30,31]],
  682. "TAPDANCE-OSSH" : [[40,41]],
  683. "CONJURE-OSSH" : [[50,51]],
  684. "All" : [[60,61],80,443]
  685. }
  686. `
  687. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  688. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  689. if err != nil {
  690. t.Fatalf("Unmarshal failed: %s", err)
  691. }
  692. applyParameters := make(map[string]interface{})
  693. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  694. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  695. err = clientConfig.SetParameters("tag1", false, applyParameters)
  696. if err != nil {
  697. t.Fatalf("SetParameters failed: %s", err)
  698. }
  699. constraints := &protocolSelectionConstraints{
  700. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  701. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  702. }
  703. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  704. return constraints.selectProtocol(0, false, serverEntry)
  705. }
  706. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  707. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  708. continue
  709. }
  710. serverEntries := makeMockServerEntries(tunnelProtocol, "", "", "", 100)
  711. selected := false
  712. skipped := false
  713. for _, serverEntry := range serverEntries {
  714. selectedProtocol, ok := selectProtocol(serverEntry)
  715. if ok {
  716. if selectedProtocol != tunnelProtocol {
  717. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  718. }
  719. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  720. if err != nil {
  721. t.Fatalf("GetDialPortNumber failed: %s", err)
  722. }
  723. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  724. t.Fatalf("unexpected dial port number: %d", port)
  725. }
  726. selected = true
  727. } else {
  728. skipped = true
  729. }
  730. }
  731. if !selected {
  732. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  733. }
  734. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  735. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  736. }
  737. }
  738. }
  739. func makeMockServerEntries(
  740. tunnelProtocol string,
  741. region string,
  742. providerID string,
  743. frontingProviderID string,
  744. count int) []*protocol.ServerEntry {
  745. serverEntries := make([]*protocol.ServerEntry, count)
  746. for i := 0; i < count; i++ {
  747. serverEntries[i] = &protocol.ServerEntry{
  748. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  749. SshPort: prng.Range(10, 19),
  750. SshObfuscatedPort: prng.Range(20, 29),
  751. SshObfuscatedQUICPort: prng.Range(30, 39),
  752. SshObfuscatedTapDancePort: prng.Range(40, 49),
  753. SshObfuscatedConjurePort: prng.Range(50, 59),
  754. MeekServerPort: prng.Range(60, 69),
  755. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  756. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  757. Region: region,
  758. ProviderID: providerID,
  759. FrontingProviderID: frontingProviderID,
  760. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  761. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  762. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  763. }
  764. }
  765. return serverEntries
  766. }
  767. func TestMakeHTTPTransformerParameters(t *testing.T) {
  768. type test struct {
  769. name string
  770. frontingProviderID string
  771. isFronted bool
  772. paramValues map[string]interface{}
  773. expectedTransformName string
  774. expectedTransformSpec transforms.Spec
  775. }
  776. tests := []test{
  777. {
  778. name: "unfronted",
  779. frontingProviderID: "",
  780. isFronted: false,
  781. paramValues: map[string]interface{}{
  782. "DirectHTTPProtocolTransformProbability": 1,
  783. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  784. "spec1": {{"A", "B"}},
  785. },
  786. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  787. "": {"spec1"},
  788. },
  789. },
  790. expectedTransformName: "spec1",
  791. expectedTransformSpec: [][2]string{{"A", "B"}},
  792. },
  793. {
  794. name: "fronted",
  795. frontingProviderID: "frontingProvider",
  796. isFronted: true,
  797. paramValues: map[string]interface{}{
  798. "FrontedHTTPProtocolTransformProbability": 1,
  799. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  800. "spec1": {{"A", "B"}},
  801. },
  802. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  803. "frontingProvider": {"spec1"},
  804. },
  805. },
  806. expectedTransformName: "spec1",
  807. expectedTransformSpec: [][2]string{{"A", "B"}},
  808. },
  809. {
  810. name: "no transform, coinflip false",
  811. frontingProviderID: "frontingProvider",
  812. isFronted: false,
  813. paramValues: map[string]interface{}{
  814. "DirectHTTPProtocolTransformProbability": 0,
  815. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  816. "spec1": {{"A", "B"}},
  817. },
  818. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  819. "frontingProvider": {"spec1"},
  820. },
  821. },
  822. expectedTransformName: "",
  823. expectedTransformSpec: nil,
  824. },
  825. }
  826. for _, tt := range tests {
  827. t.Run(tt.name, func(t *testing.T) {
  828. params, err := parameters.NewParameters(nil)
  829. if err != nil {
  830. t.Fatalf("parameters.NewParameters failed %v", err)
  831. }
  832. _, err = params.Set("", false, tt.paramValues)
  833. if err != nil {
  834. t.Fatalf("params.Set failed %v", err)
  835. }
  836. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  837. if err != nil {
  838. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  839. }
  840. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  841. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  842. }
  843. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  844. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  845. }
  846. if httpTransformerParams.ProtocolTransformSpec != nil {
  847. if httpTransformerParams.ProtocolTransformSeed == nil {
  848. t.Fatalf("expected non-nil seed")
  849. }
  850. }
  851. })
  852. }
  853. }
  854. func TestMakeOSSHObfuscatorSeedTranformerParameters(t *testing.T) {
  855. type test struct {
  856. name string
  857. paramValues map[string]interface{}
  858. expectedTransformName string
  859. expectedTransformSpec transforms.Spec
  860. }
  861. tests := []test{
  862. {
  863. name: "transform",
  864. paramValues: map[string]interface{}{
  865. "OSSHObfuscatorSeedTransformProbability": 1,
  866. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  867. "spec1": {{"A", "B"}},
  868. },
  869. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  870. "": {"spec1"},
  871. },
  872. },
  873. expectedTransformName: "spec1",
  874. expectedTransformSpec: [][2]string{{"A", "B"}},
  875. },
  876. {
  877. name: "no transform, coinflip false",
  878. paramValues: map[string]interface{}{
  879. "OSSHObfuscatorSeedTransformProbability": 0,
  880. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  881. "spec1": {{"A", "B"}},
  882. },
  883. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  884. "": {"spec1"},
  885. },
  886. },
  887. expectedTransformName: "",
  888. expectedTransformSpec: nil,
  889. },
  890. }
  891. for _, tt := range tests {
  892. t.Run(tt.name, func(t *testing.T) {
  893. params, err := parameters.NewParameters(nil)
  894. if err != nil {
  895. t.Fatalf("parameters.NewParameters failed: %v", err)
  896. }
  897. _, err = params.Set("", false, tt.paramValues)
  898. if err != nil {
  899. t.Fatalf("params.Set failed: %v", err)
  900. }
  901. transformerParams, err := makeSeedTransformerParameters(
  902. params.Get(),
  903. parameters.OSSHObfuscatorSeedTransformProbability,
  904. parameters.OSSHObfuscatorSeedTransformSpecs,
  905. parameters.OSSHObfuscatorSeedTransformScopedSpecNames)
  906. if err != nil {
  907. t.Fatalf("makeSeedTransformerParameters failed: %v", err)
  908. }
  909. if transformerParams.TransformName != tt.expectedTransformName {
  910. t.Fatalf("expected TransformName \"%s\" but got \"%s\"", tt.expectedTransformName, transformerParams.TransformName)
  911. }
  912. if !reflect.DeepEqual(transformerParams.TransformSpec, tt.expectedTransformSpec) {
  913. t.Fatalf("expected TransformSpec %v but got %v", tt.expectedTransformSpec, transformerParams.TransformSpec)
  914. }
  915. if transformerParams.TransformSpec != nil {
  916. if transformerParams.TransformSeed == nil {
  917. t.Fatalf("expected non-nil seed")
  918. }
  919. }
  920. })
  921. }
  922. }