dialParameters_test.go 37 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/json"
  24. "fmt"
  25. "io/ioutil"
  26. "os"
  27. "reflect"
  28. "testing"
  29. "time"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  36. lrucache "github.com/cognusion/go-cache-lru"
  37. )
  38. func TestDialParametersAndReplay(t *testing.T) {
  39. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  40. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  41. runDialParametersAndReplay(t, tunnelProtocol)
  42. }
  43. }
  44. }
  45. var testNetworkID = prng.HexString(8)
  46. type testNetworkGetter struct {
  47. }
  48. func (t *testNetworkGetter) GetNetworkID() string {
  49. return testNetworkID
  50. }
  51. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  52. t.Logf("Test %s...", tunnelProtocol)
  53. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  54. if err != nil {
  55. t.Fatalf("TempDir failed: %s", err)
  56. }
  57. defer os.RemoveAll(testDataDirName)
  58. SetNoticeWriter(ioutil.Discard)
  59. clientConfig := &Config{
  60. PropagationChannelId: "0",
  61. SponsorId: "0",
  62. DataRootDirectory: testDataDirName,
  63. NetworkIDGetter: new(testNetworkGetter),
  64. }
  65. err = clientConfig.Commit(false)
  66. if err != nil {
  67. t.Fatalf("error committing configuration file: %s", err)
  68. }
  69. holdOffTunnelProtocolNames := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  70. providerID := prng.HexString(8)
  71. frontingProviderID := prng.HexString(8)
  72. var holdOffDirectTunnelProviderRegions parameters.KeyStrings
  73. if tunnelProtocol == protocol.TUNNEL_PROTOCOL_UNFRONTED_MEEK {
  74. holdOffDirectTunnelProviderRegions = map[string][]string{providerID: {""}}
  75. }
  76. var holdOffInproxyTunnelProviderRegions parameters.KeyStrings
  77. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  78. protocol.TunnelProtocolMinusInproxy(tunnelProtocol) == protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH {
  79. holdOffInproxyTunnelProviderRegions = map[string][]string{providerID: {""}}
  80. }
  81. applyParameters := make(map[string]interface{})
  82. applyParameters[parameters.TransformHostNameProbability] = 1.0
  83. applyParameters[parameters.PickUserAgentProbability] = 1.0
  84. applyParameters[parameters.HoldOffTunnelProtocolMinDuration] = "1ms"
  85. applyParameters[parameters.HoldOffTunnelProtocolMaxDuration] = "10ms"
  86. applyParameters[parameters.HoldOffTunnelProtocolNames] = holdOffTunnelProtocolNames
  87. applyParameters[parameters.HoldOffTunnelProtocolProbability] = 1.0
  88. applyParameters[parameters.HoldOffFrontingTunnelMinDuration] = "1ms"
  89. applyParameters[parameters.HoldOffFrontingTunnelMaxDuration] = "10ms"
  90. applyParameters[parameters.HoldOffFrontingTunnelProviderIDs] = []string{frontingProviderID}
  91. applyParameters[parameters.HoldOffFrontingTunnelProbability] = 1.0
  92. applyParameters[parameters.HoldOffDirectTunnelMinDuration] = "1ms"
  93. applyParameters[parameters.HoldOffDirectTunnelMaxDuration] = "10ms"
  94. applyParameters[parameters.HoldOffDirectTunnelProviderRegions] = holdOffDirectTunnelProviderRegions
  95. applyParameters[parameters.HoldOffInproxyTunnelProbability] = 1.0
  96. applyParameters[parameters.HoldOffInproxyTunnelMinDuration] = "1ms"
  97. applyParameters[parameters.HoldOffInproxyTunnelMaxDuration] = "10ms"
  98. applyParameters[parameters.HoldOffInproxyTunnelProviderRegions] = holdOffInproxyTunnelProviderRegions
  99. applyParameters[parameters.HoldOffDirectTunnelProbability] = 1.0
  100. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  101. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  102. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  103. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  104. applyParameters[parameters.OSSHObfuscatorSeedTransformProbability] = 1.0
  105. applyParameters[parameters.OSSHObfuscatorSeedTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  106. applyParameters[parameters.OSSHObfuscatorSeedTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  107. applyParameters[parameters.ObfuscatedQUICNonceTransformProbability] = 1.0
  108. applyParameters[parameters.ObfuscatedQUICNonceTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  109. applyParameters[parameters.ObfuscatedQUICNonceTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  110. err = clientConfig.SetParameters("tag1", false, applyParameters)
  111. if err != nil {
  112. t.Fatalf("SetParameters failed: %s", err)
  113. }
  114. resolver := NewResolver(clientConfig, true)
  115. defer resolver.Stop()
  116. clientConfig.SetResolver(resolver)
  117. err = OpenDataStore(clientConfig)
  118. if err != nil {
  119. t.Fatalf("error initializing client datastore: %s", err)
  120. }
  121. defer CloseDataStore()
  122. serverEntries := makeMockServerEntries(tunnelProtocol, "CA", providerID, frontingProviderID, 100)
  123. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  124. return replayProtocol == tunnelProtocol
  125. }
  126. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  127. return tunnelProtocol, true
  128. }
  129. values.SetSSHClientVersionsSpec(
  130. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  131. values.SetUserAgentsSpec(
  132. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  133. // Test: expected dial parameter fields set
  134. steeringIPCache := lrucache.NewWithLRU(1*time.Hour, 1*time.Hour, 0)
  135. upstreamProxyErrorCallback := func(_ error) {}
  136. dialParams, err := MakeDialParameters(
  137. clientConfig, steeringIPCache, nil, nil, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  138. if err != nil {
  139. t.Fatalf("MakeDialParameters failed: %s", err)
  140. }
  141. if dialParams.ServerEntry != serverEntries[0] {
  142. t.Fatalf("unexpected server entry")
  143. }
  144. if dialParams.NetworkID != testNetworkID {
  145. t.Fatalf("unexpected network ID")
  146. }
  147. if dialParams.IsReplay {
  148. t.Fatalf("unexpected replay")
  149. }
  150. if dialParams.TunnelProtocol != tunnelProtocol {
  151. t.Fatalf("unexpected tunnel protocol")
  152. }
  153. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  154. dialParams.DirectDialAddress == "" {
  155. t.Fatalf("missing direct dial fields")
  156. }
  157. if dialParams.DialPortNumber == "" {
  158. t.Fatalf("missing port number fields")
  159. }
  160. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  161. t.Fatalf("missing SSH fields")
  162. }
  163. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  164. dialParams.ObfuscatorPaddingSeed == nil {
  165. t.Fatalf("missing obfuscator fields")
  166. }
  167. if dialParams.FragmentorSeed == nil {
  168. t.Fatalf("missing fragmentor field")
  169. }
  170. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  171. (dialParams.MeekDialAddress == "" ||
  172. dialParams.MeekHostHeader == "" ||
  173. dialParams.MeekObfuscatorPaddingSeed == nil) {
  174. t.Fatalf("missing meek fields")
  175. }
  176. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  177. (dialParams.MeekFrontingDialAddress == "" ||
  178. dialParams.MeekFrontingHost == "" ||
  179. dialParams.ResolveParameters == nil) {
  180. t.Fatalf("missing meek fronting fields")
  181. }
  182. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  183. dialParams.UserAgent == "" {
  184. t.Fatalf("missing meek HTTP fields")
  185. }
  186. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  187. (dialParams.MeekSNIServerName == "" ||
  188. !dialParams.SelectedTLSProfile ||
  189. dialParams.TLSProfile == "") {
  190. t.Fatalf("missing meek HTTPS fields")
  191. }
  192. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  193. if dialParams.QUICVersion == "" {
  194. t.Fatalf("missing QUIC version field")
  195. }
  196. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  197. if dialParams.MeekFrontingDialAddress == "" ||
  198. dialParams.MeekFrontingHost == "" ||
  199. dialParams.MeekSNIServerName == "" {
  200. t.Fatalf("missing fronted QUIC fields")
  201. }
  202. } else {
  203. if dialParams.QUICDialSNIAddress == "" {
  204. t.Fatalf("missing QUIC SNI field")
  205. }
  206. }
  207. }
  208. if dialParams.LivenessTestSeed == nil {
  209. t.Fatalf("missing liveness test fields")
  210. }
  211. if dialParams.APIRequestPaddingSeed == nil {
  212. t.Fatalf("missing API request fields")
  213. }
  214. expectHoldOffTunnelProtocolNames := common.Contains(holdOffTunnelProtocolNames, tunnelProtocol)
  215. expectHoldOffFrontingTunnelProviderIDs := protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol)
  216. expectHoldOffDirectTunnelProviderRegion := protocol.TunnelProtocolIsDirect(tunnelProtocol) &&
  217. common.ContainsAny(
  218. holdOffDirectTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  219. []string{"", dialParams.ServerEntry.Region})
  220. expectHoldOffInproxyTunnelProviderRegion := protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  221. common.ContainsAny(
  222. holdOffInproxyTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  223. []string{"", dialParams.ServerEntry.Region})
  224. if expectHoldOffTunnelProtocolNames ||
  225. expectHoldOffFrontingTunnelProviderIDs ||
  226. expectHoldOffDirectTunnelProviderRegion ||
  227. expectHoldOffInproxyTunnelProviderRegion {
  228. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  229. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  230. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  231. }
  232. } else {
  233. if dialParams.HoldOffTunnelDuration != 0 {
  234. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  235. }
  236. }
  237. dialConfig := dialParams.GetDialConfig()
  238. if dialConfig.UpstreamProxyErrorCallback == nil {
  239. t.Fatalf("missing upstreamProxyErrorCallback")
  240. }
  241. // Test: no replay after dial reported to fail
  242. dialParams.Failed(clientConfig)
  243. dialParams, err = MakeDialParameters(
  244. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  245. if err != nil {
  246. t.Fatalf("MakeDialParameters failed: %s", err)
  247. }
  248. if dialParams.IsReplay {
  249. t.Fatalf("unexpected replay")
  250. }
  251. // Test: no replay after network ID changes
  252. dialParams.Succeeded()
  253. testNetworkID = prng.HexString(8)
  254. clientConfig.networkIDGetter.FlushCache()
  255. dialParams, err = MakeDialParameters(
  256. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  257. if err != nil {
  258. t.Fatalf("MakeDialParameters failed: %s", err)
  259. }
  260. if dialParams.NetworkID != testNetworkID {
  261. t.Fatalf("unexpected network ID")
  262. }
  263. if dialParams.IsReplay {
  264. t.Fatalf("unexpected replay")
  265. }
  266. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  267. dialParams.Succeeded()
  268. replayDialParams, err := MakeDialParameters(
  269. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  270. if err != nil {
  271. t.Fatalf("MakeDialParameters failed: %s", err)
  272. }
  273. if !replayDialParams.IsReplay {
  274. t.Fatalf("unexpected non-replay")
  275. }
  276. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  277. t.Fatalf("unexpected non-updated timestamp")
  278. }
  279. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  280. t.Fatalf("mismatching tunnel protocol")
  281. }
  282. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  283. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  284. t.Fatalf("mismatching dial fields")
  285. }
  286. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  287. if seed1 == nil {
  288. return seed2 == nil
  289. }
  290. return bytes.Equal(seed1[:], seed2[:])
  291. }
  292. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  293. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  294. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  295. t.Fatalf("mismatching SSH fields")
  296. }
  297. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  298. t.Fatalf("mismatching obfuscator fields")
  299. }
  300. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  301. t.Fatalf("mismatching fragmentor fields")
  302. }
  303. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  304. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  305. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  306. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  307. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  308. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  309. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  310. t.Fatalf("mismatching meek fields")
  311. }
  312. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  313. replayDialParams.UserAgent != dialParams.UserAgent {
  314. t.Fatalf("mismatching user agent fields")
  315. }
  316. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  317. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  318. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  319. t.Fatalf("mismatching TLS fields")
  320. }
  321. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  322. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  323. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  324. t.Fatalf("mismatching QUIC fields")
  325. }
  326. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  327. t.Fatalf("mismatching liveness test fields")
  328. }
  329. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  330. t.Fatalf("mismatching API request fields")
  331. }
  332. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  333. (replayDialParams.ResolveParameters != nil &&
  334. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  335. t.Fatalf("mismatching ResolveParameters fields")
  336. }
  337. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  338. (replayDialParams.HTTPTransformerParameters != nil &&
  339. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  340. t.Fatalf("mismatching HTTPTransformerParameters fields")
  341. }
  342. if (replayDialParams.OSSHObfuscatorSeedTransformerParameters == nil) != (dialParams.OSSHObfuscatorSeedTransformerParameters == nil) ||
  343. (replayDialParams.OSSHObfuscatorSeedTransformerParameters != nil &&
  344. !reflect.DeepEqual(replayDialParams.OSSHObfuscatorSeedTransformerParameters, dialParams.OSSHObfuscatorSeedTransformerParameters)) {
  345. t.Fatalf("mismatching ObfuscatorSeedTransformerParameters fields")
  346. }
  347. if (replayDialParams.ObfuscatedQUICNonceTransformerParameters == nil) != (dialParams.ObfuscatedQUICNonceTransformerParameters == nil) ||
  348. (replayDialParams.ObfuscatedQUICNonceTransformerParameters != nil &&
  349. !reflect.DeepEqual(replayDialParams.ObfuscatedQUICNonceTransformerParameters, dialParams.ObfuscatedQUICNonceTransformerParameters)) {
  350. t.Fatalf("mismatching ObfuscatedQUICNonceTransformerParameters fields")
  351. }
  352. // Test: replay after change tactics, with ReplayIgnoreChangedClientState = true
  353. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  354. applyParameters[parameters.ReplayIgnoreChangedConfigState] = true
  355. err = clientConfig.SetParameters("tag2a", false, applyParameters)
  356. if err != nil {
  357. t.Fatalf("SetParameters failed: %s", err)
  358. }
  359. dialParams, err = MakeDialParameters(
  360. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  361. if err != nil {
  362. t.Fatalf("MakeDialParameters failed: %s", err)
  363. }
  364. if !replayDialParams.IsReplay {
  365. t.Fatalf("unexpected non-replay")
  366. }
  367. // Test: no replay after change tactics
  368. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  369. applyParameters[parameters.ReplayIgnoreChangedConfigState] = false
  370. err = clientConfig.SetParameters("tag2", false, applyParameters)
  371. if err != nil {
  372. t.Fatalf("SetParameters failed: %s", err)
  373. }
  374. dialParams, err = MakeDialParameters(
  375. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  376. if err != nil {
  377. t.Fatalf("MakeDialParameters failed: %s", err)
  378. }
  379. if dialParams.IsReplay {
  380. t.Fatalf("unexpected replay")
  381. }
  382. // Test: no replay after dial parameters expired
  383. dialParams.Succeeded()
  384. time.Sleep(1 * time.Second)
  385. dialParams, err = MakeDialParameters(
  386. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  387. if err != nil {
  388. t.Fatalf("MakeDialParameters failed: %s", err)
  389. }
  390. if dialParams.IsReplay {
  391. t.Fatalf("unexpected replay")
  392. }
  393. // Test: no replay after server entry changes
  394. dialParams.Succeeded()
  395. serverEntries[0].ConfigurationVersion += 1
  396. dialParams, err = MakeDialParameters(
  397. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  398. if err != nil {
  399. t.Fatalf("MakeDialParameters failed: %s", err)
  400. }
  401. if dialParams.IsReplay {
  402. t.Fatalf("unexpected replay")
  403. }
  404. // Test: disable replay elements (partial coverage)
  405. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  406. applyParameters[parameters.ReplaySSH] = false
  407. applyParameters[parameters.ReplayObfuscatorPadding] = false
  408. applyParameters[parameters.ReplayFragmentor] = false
  409. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  410. applyParameters[parameters.ReplayLivenessTest] = false
  411. applyParameters[parameters.ReplayAPIRequestPadding] = false
  412. err = clientConfig.SetParameters("tag3", false, applyParameters)
  413. if err != nil {
  414. t.Fatalf("SetParameters failed: %s", err)
  415. }
  416. dialParams, err = MakeDialParameters(
  417. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  418. if err != nil {
  419. t.Fatalf("MakeDialParameters failed: %s", err)
  420. }
  421. dialParams.Succeeded()
  422. replayDialParams, err = MakeDialParameters(
  423. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  424. if err != nil {
  425. t.Fatalf("MakeDialParameters failed: %s", err)
  426. }
  427. if !replayDialParams.IsReplay {
  428. t.Fatalf("unexpected non-replay")
  429. }
  430. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  431. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  432. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  433. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  434. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  435. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  436. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  437. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  438. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  439. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  440. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  441. t.Fatalf("unexpected replayed fields")
  442. }
  443. // Test: client-side restrict fronting provider ID
  444. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  445. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  446. err = clientConfig.SetParameters("tag4", false, applyParameters)
  447. if err != nil {
  448. t.Fatalf("SetParameters failed: %s", err)
  449. }
  450. dialParams, err = MakeDialParameters(
  451. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  452. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  453. if err == nil {
  454. if dialParams != nil {
  455. t.Fatalf("unexpected MakeDialParameters success")
  456. }
  457. }
  458. } else {
  459. if err != nil {
  460. t.Fatalf("MakeDialParameters failed: %s", err)
  461. }
  462. }
  463. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  464. err = clientConfig.SetParameters("tag5", false, applyParameters)
  465. if err != nil {
  466. t.Fatalf("SetParameters failed: %s", err)
  467. }
  468. // Test: client-side restrict provider ID by region for direct protocols
  469. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{providerID: {"CA"}}
  470. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 1.0
  471. err = clientConfig.SetParameters("tag6", false, applyParameters)
  472. if err != nil {
  473. t.Fatalf("SetParameters failed: %s", err)
  474. }
  475. dialParams, err = MakeDialParameters(
  476. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  477. if protocol.TunnelProtocolIsDirect(tunnelProtocol) {
  478. if err == nil {
  479. if dialParams != nil {
  480. t.Fatalf("unexpected MakeDialParameters success")
  481. }
  482. }
  483. } else {
  484. if err != nil {
  485. t.Fatalf("MakeDialParameters failed: %s", err)
  486. }
  487. }
  488. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{}
  489. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 0.0
  490. err = clientConfig.SetParameters("tag7", false, applyParameters)
  491. if err != nil {
  492. t.Fatalf("SetParameters failed: %s", err)
  493. }
  494. // Test: client-side restrict provider ID by region for inproxy protocols
  495. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{providerID: {"CA"}}
  496. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 1.0
  497. err = clientConfig.SetParameters("tag8", false, applyParameters)
  498. if err != nil {
  499. t.Fatalf("SetParameters failed: %s", err)
  500. }
  501. dialParams, err = MakeDialParameters(
  502. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  503. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) {
  504. if err == nil {
  505. if dialParams != nil {
  506. t.Fatalf("unexpected MakeDialParameters success")
  507. }
  508. }
  509. } else {
  510. if err != nil {
  511. t.Fatalf("MakeDialParameters failed: %s", err)
  512. }
  513. }
  514. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{}
  515. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 0.0
  516. err = clientConfig.SetParameters("tag9", false, applyParameters)
  517. if err != nil {
  518. t.Fatalf("SetParameters failed: %s", err)
  519. }
  520. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  521. steeringIPCache.Flush()
  522. // Test: steering IP used in non-replay case
  523. dialParams, err = MakeDialParameters(
  524. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  525. if err != nil {
  526. t.Fatalf("MakeDialParameters failed: %s", err)
  527. }
  528. dialParams.Failed(clientConfig)
  529. getCacheKey := func() string {
  530. return fmt.Sprintf("%s %s %s", testNetworkID, frontingProviderID, tunnelProtocol)
  531. }
  532. setCacheEntry := func(steeringIP string) {
  533. steeringIPCache.Set(getCacheKey(), steeringIP, lrucache.DefaultExpiration)
  534. }
  535. setCacheEntry("127.0.0.1")
  536. dialParams, err = MakeDialParameters(
  537. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  538. if err != nil {
  539. t.Fatalf("MakeDialParameters failed: %s", err)
  540. }
  541. if dialParams.IsReplay {
  542. t.Fatalf("unexpected replay")
  543. }
  544. checkSteeringIP := func(expectedSteeringIP string) {
  545. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Microsecond)
  546. defer cancelFunc()
  547. IPs, err := dialParams.dialConfig.ResolveIP(ctx, "example.com")
  548. if err != nil {
  549. t.Fatalf("ResolveIP failed: %s", err)
  550. }
  551. if IPs[0].String() != expectedSteeringIP {
  552. t.Fatalf("missing expected steering IP")
  553. }
  554. }
  555. checkSteeringIP("127.0.0.1")
  556. // Test: steering IP used in replay case
  557. dialParams.Succeeded()
  558. dialParams, err = MakeDialParameters(
  559. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  560. if err != nil {
  561. t.Fatalf("MakeDialParameters failed: %s", err)
  562. }
  563. if !dialParams.IsReplay {
  564. t.Fatalf("unexpected non-replay")
  565. }
  566. checkSteeringIP("127.0.0.1")
  567. // Test: different steering IP clears replay flag
  568. dialParams.Succeeded()
  569. setCacheEntry("127.0.0.2")
  570. dialParams, err = MakeDialParameters(
  571. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  572. if err != nil {
  573. t.Fatalf("MakeDialParameters failed: %s", err)
  574. }
  575. if dialParams.IsReplay {
  576. t.Fatalf("unexpected replay")
  577. }
  578. checkSteeringIP("127.0.0.2")
  579. // Test: newly present steering IP clears replay flag
  580. steeringIPCache.Flush()
  581. dialParams, err = MakeDialParameters(
  582. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  583. if err != nil {
  584. t.Fatalf("MakeDialParameters failed: %s", err)
  585. }
  586. dialParams.Succeeded()
  587. setCacheEntry("127.0.0.3")
  588. dialParams, err = MakeDialParameters(
  589. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  590. if err != nil {
  591. t.Fatalf("MakeDialParameters failed: %s", err)
  592. }
  593. if dialParams.IsReplay {
  594. t.Fatalf("unexpected replay")
  595. }
  596. // Test: steering IP cleared from cache after failure
  597. dialParams.Failed(clientConfig)
  598. _, ok := steeringIPCache.Get(getCacheKey())
  599. if ok {
  600. t.Fatalf("unexpected steering IP cache entry")
  601. }
  602. }
  603. // Test: iterator shuffles
  604. for i, serverEntry := range serverEntries {
  605. data, err := json.Marshal(serverEntry)
  606. if err != nil {
  607. t.Fatalf("json.Marshal failed: %s", err)
  608. }
  609. var serverEntryFields protocol.ServerEntryFields
  610. err = json.Unmarshal(data, &serverEntryFields)
  611. if err != nil {
  612. t.Fatalf("json.Unmarshal failed: %s", err)
  613. }
  614. err = StoreServerEntry(serverEntryFields, false)
  615. if err != nil {
  616. t.Fatalf("StoreServerEntry failed: %s", err)
  617. }
  618. if i%10 == 0 {
  619. dialParams, err := MakeDialParameters(
  620. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  621. if err != nil {
  622. t.Fatalf("MakeDialParameters failed: %s", err)
  623. }
  624. dialParams.Succeeded()
  625. }
  626. }
  627. for i := 0; i < 5; i++ {
  628. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  629. if err != nil {
  630. t.Fatalf("NewServerEntryIterator failed: %s", err)
  631. }
  632. if hasAffinity {
  633. t.Fatalf("unexpected affinity server")
  634. }
  635. // Test: the first shuffle should move the replay candidates to the front
  636. for j := 0; j < 10; j++ {
  637. serverEntry, err := iterator.Next()
  638. if err != nil {
  639. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  640. }
  641. dialParams, err := MakeDialParameters(
  642. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  643. if err != nil {
  644. t.Fatalf("MakeDialParameters failed: %s", err)
  645. }
  646. if !dialParams.IsReplay {
  647. t.Fatalf("unexpected non-replay")
  648. }
  649. }
  650. iterator.Reset()
  651. // Test: subsequent shuffles should not move the replay candidates
  652. allReplay := true
  653. for j := 0; j < 10; j++ {
  654. serverEntry, err := iterator.Next()
  655. if err != nil {
  656. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  657. }
  658. dialParams, err := MakeDialParameters(
  659. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  660. if err != nil {
  661. t.Fatalf("MakeDialParameters failed: %s", err)
  662. }
  663. if !dialParams.IsReplay {
  664. allReplay = false
  665. }
  666. }
  667. if allReplay {
  668. t.Fatalf("unexpected all replay")
  669. }
  670. iterator.Close()
  671. }
  672. }
  673. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  674. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  675. if err != nil {
  676. t.Fatalf("TempDir failed: %s", err)
  677. }
  678. defer os.RemoveAll(testDataDirName)
  679. SetNoticeWriter(ioutil.Discard)
  680. clientConfig := &Config{
  681. PropagationChannelId: "0",
  682. SponsorId: "0",
  683. DataRootDirectory: testDataDirName,
  684. NetworkIDGetter: new(testNetworkGetter),
  685. }
  686. err = clientConfig.Commit(false)
  687. if err != nil {
  688. t.Fatalf("error committing configuration file: %s", err)
  689. }
  690. jsonLimitDialPortNumbers := `
  691. {
  692. "SSH" : [[10,11]],
  693. "OSSH" : [[20,21]],
  694. "QUIC-OSSH" : [[30,31]],
  695. "TAPDANCE-OSSH" : [[40,41]],
  696. "CONJURE-OSSH" : [[50,51]],
  697. "All" : [[60,61],80,443]
  698. }
  699. `
  700. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  701. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  702. if err != nil {
  703. t.Fatalf("Unmarshal failed: %s", err)
  704. }
  705. applyParameters := make(map[string]interface{})
  706. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  707. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  708. err = clientConfig.SetParameters("tag1", false, applyParameters)
  709. if err != nil {
  710. t.Fatalf("SetParameters failed: %s", err)
  711. }
  712. constraints := &protocolSelectionConstraints{
  713. config: clientConfig,
  714. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  715. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  716. }
  717. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  718. protocol, _, ok := constraints.selectProtocol(0, false, false, serverEntry)
  719. return protocol, ok
  720. }
  721. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  722. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  723. continue
  724. }
  725. serverEntries := makeMockServerEntries(tunnelProtocol, "", "", "", 100)
  726. selected := false
  727. skipped := false
  728. for _, serverEntry := range serverEntries {
  729. selectedProtocol, ok := selectProtocol(serverEntry)
  730. if ok {
  731. if selectedProtocol != tunnelProtocol {
  732. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  733. }
  734. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  735. if err != nil {
  736. t.Fatalf("GetDialPortNumber failed: %s", err)
  737. }
  738. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  739. t.Fatalf("unexpected dial port number: %d", port)
  740. }
  741. selected = true
  742. } else {
  743. skipped = true
  744. }
  745. }
  746. if !selected {
  747. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  748. }
  749. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  750. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  751. }
  752. }
  753. }
  754. func makeMockServerEntries(
  755. tunnelProtocol string,
  756. region string,
  757. providerID string,
  758. frontingProviderID string,
  759. count int) []*protocol.ServerEntry {
  760. serverEntries := make([]*protocol.ServerEntry, count)
  761. for i := 0; i < count; i++ {
  762. serverEntries[i] = &protocol.ServerEntry{
  763. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  764. SshPort: prng.Range(10, 19),
  765. SshObfuscatedPort: prng.Range(20, 29),
  766. SshObfuscatedQUICPort: prng.Range(30, 39),
  767. SshObfuscatedTapDancePort: prng.Range(40, 49),
  768. SshObfuscatedConjurePort: prng.Range(50, 59),
  769. MeekServerPort: prng.Range(60, 69),
  770. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  771. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  772. Region: region,
  773. ProviderID: providerID,
  774. FrontingProviderID: frontingProviderID,
  775. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  776. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  777. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  778. }
  779. }
  780. return serverEntries
  781. }
  782. func TestMakeHTTPTransformerParameters(t *testing.T) {
  783. type test struct {
  784. name string
  785. frontingProviderID string
  786. isFronted bool
  787. paramValues map[string]interface{}
  788. expectedTransformName string
  789. expectedTransformSpec transforms.Spec
  790. }
  791. tests := []test{
  792. {
  793. name: "unfronted",
  794. frontingProviderID: "",
  795. isFronted: false,
  796. paramValues: map[string]interface{}{
  797. "DirectHTTPProtocolTransformProbability": 1,
  798. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  799. "spec1": {{"A", "B"}},
  800. },
  801. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  802. "": {"spec1"},
  803. },
  804. },
  805. expectedTransformName: "spec1",
  806. expectedTransformSpec: [][2]string{{"A", "B"}},
  807. },
  808. {
  809. name: "fronted",
  810. frontingProviderID: "frontingProvider",
  811. isFronted: true,
  812. paramValues: map[string]interface{}{
  813. "FrontedHTTPProtocolTransformProbability": 1,
  814. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  815. "spec1": {{"A", "B"}},
  816. },
  817. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  818. "frontingProvider": {"spec1"},
  819. },
  820. },
  821. expectedTransformName: "spec1",
  822. expectedTransformSpec: [][2]string{{"A", "B"}},
  823. },
  824. {
  825. name: "no transform, coinflip false",
  826. frontingProviderID: "frontingProvider",
  827. isFronted: false,
  828. paramValues: map[string]interface{}{
  829. "DirectHTTPProtocolTransformProbability": 0,
  830. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  831. "spec1": {{"A", "B"}},
  832. },
  833. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  834. "frontingProvider": {"spec1"},
  835. },
  836. },
  837. expectedTransformName: "",
  838. expectedTransformSpec: nil,
  839. },
  840. }
  841. for _, tt := range tests {
  842. t.Run(tt.name, func(t *testing.T) {
  843. params, err := parameters.NewParameters(nil)
  844. if err != nil {
  845. t.Fatalf("parameters.NewParameters failed %v", err)
  846. }
  847. _, err = params.Set("", 0, tt.paramValues)
  848. if err != nil {
  849. t.Fatalf("params.Set failed %v", err)
  850. }
  851. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  852. if err != nil {
  853. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  854. }
  855. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  856. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  857. }
  858. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  859. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  860. }
  861. if httpTransformerParams.ProtocolTransformSpec != nil {
  862. if httpTransformerParams.ProtocolTransformSeed == nil {
  863. t.Fatalf("expected non-nil seed")
  864. }
  865. }
  866. })
  867. }
  868. }
  869. func TestMakeOSSHObfuscatorSeedTranformerParameters(t *testing.T) {
  870. type test struct {
  871. name string
  872. paramValues map[string]interface{}
  873. expectedTransformName string
  874. expectedTransformSpec transforms.Spec
  875. }
  876. tests := []test{
  877. {
  878. name: "transform",
  879. paramValues: map[string]interface{}{
  880. "OSSHObfuscatorSeedTransformProbability": 1,
  881. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  882. "spec1": {{"A", "B"}},
  883. },
  884. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  885. "": {"spec1"},
  886. },
  887. },
  888. expectedTransformName: "spec1",
  889. expectedTransformSpec: [][2]string{{"A", "B"}},
  890. },
  891. {
  892. name: "no transform, coinflip false",
  893. paramValues: map[string]interface{}{
  894. "OSSHObfuscatorSeedTransformProbability": 0,
  895. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  896. "spec1": {{"A", "B"}},
  897. },
  898. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  899. "": {"spec1"},
  900. },
  901. },
  902. expectedTransformName: "",
  903. expectedTransformSpec: nil,
  904. },
  905. }
  906. for _, tt := range tests {
  907. t.Run(tt.name, func(t *testing.T) {
  908. params, err := parameters.NewParameters(nil)
  909. if err != nil {
  910. t.Fatalf("parameters.NewParameters failed: %v", err)
  911. }
  912. _, err = params.Set("", 0, tt.paramValues)
  913. if err != nil {
  914. t.Fatalf("params.Set failed: %v", err)
  915. }
  916. transformerParams, err := makeSeedTransformerParameters(
  917. params.Get(),
  918. parameters.OSSHObfuscatorSeedTransformProbability,
  919. parameters.OSSHObfuscatorSeedTransformSpecs,
  920. parameters.OSSHObfuscatorSeedTransformScopedSpecNames)
  921. if err != nil {
  922. t.Fatalf("makeSeedTransformerParameters failed: %v", err)
  923. }
  924. if transformerParams.TransformName != tt.expectedTransformName {
  925. t.Fatalf("expected TransformName \"%s\" but got \"%s\"", tt.expectedTransformName, transformerParams.TransformName)
  926. }
  927. if !reflect.DeepEqual(transformerParams.TransformSpec, tt.expectedTransformSpec) {
  928. t.Fatalf("expected TransformSpec %v but got %v", tt.expectedTransformSpec, transformerParams.TransformSpec)
  929. }
  930. if transformerParams.TransformSpec != nil {
  931. if transformerParams.TransformSeed == nil {
  932. t.Fatalf("expected non-nil seed")
  933. }
  934. }
  935. })
  936. }
  937. }