dialParameters_test.go 38 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/json"
  24. "fmt"
  25. "io/ioutil"
  26. "os"
  27. "reflect"
  28. "testing"
  29. "time"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  36. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  37. lrucache "github.com/cognusion/go-cache-lru"
  38. )
  39. func TestDialParametersAndReplay(t *testing.T) {
  40. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  41. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  42. runDialParametersAndReplay(t, tunnelProtocol)
  43. }
  44. }
  45. }
  46. var testNetworkID = prng.HexString(8)
  47. type testNetworkGetter struct {
  48. }
  49. func (t *testNetworkGetter) GetNetworkID() string {
  50. return testNetworkID
  51. }
  52. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  53. t.Logf("Test %s...", tunnelProtocol)
  54. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  55. if err != nil {
  56. t.Fatalf("TempDir failed: %s", err)
  57. }
  58. defer os.RemoveAll(testDataDirName)
  59. SetNoticeWriter(ioutil.Discard)
  60. clientConfig := &Config{
  61. PropagationChannelId: "0",
  62. SponsorId: "0",
  63. DataRootDirectory: testDataDirName,
  64. NetworkIDGetter: new(testNetworkGetter),
  65. }
  66. err = clientConfig.Commit(false)
  67. if err != nil {
  68. t.Fatalf("error committing configuration file: %s", err)
  69. }
  70. holdOffTunnelProtocolNames := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  71. providerID := prng.HexString(8)
  72. frontingProviderID := prng.HexString(8)
  73. var holdOffDirectTunnelProviderRegions parameters.KeyStrings
  74. if tunnelProtocol == protocol.TUNNEL_PROTOCOL_UNFRONTED_MEEK {
  75. holdOffDirectTunnelProviderRegions = map[string][]string{providerID: {""}}
  76. }
  77. var holdOffInproxyTunnelProviderRegions parameters.KeyStrings
  78. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  79. protocol.TunnelProtocolMinusInproxy(tunnelProtocol) == protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH {
  80. holdOffInproxyTunnelProviderRegions = map[string][]string{providerID: {""}}
  81. }
  82. applyParameters := make(map[string]interface{})
  83. applyParameters[parameters.TransformHostNameProbability] = 1.0
  84. applyParameters[parameters.PickUserAgentProbability] = 1.0
  85. applyParameters[parameters.HoldOffTunnelProtocolMinDuration] = "1ms"
  86. applyParameters[parameters.HoldOffTunnelProtocolMaxDuration] = "10ms"
  87. applyParameters[parameters.HoldOffTunnelProtocolNames] = holdOffTunnelProtocolNames
  88. applyParameters[parameters.HoldOffTunnelProtocolProbability] = 1.0
  89. applyParameters[parameters.HoldOffFrontingTunnelMinDuration] = "1ms"
  90. applyParameters[parameters.HoldOffFrontingTunnelMaxDuration] = "10ms"
  91. applyParameters[parameters.HoldOffFrontingTunnelProviderIDs] = []string{frontingProviderID}
  92. applyParameters[parameters.HoldOffFrontingTunnelProbability] = 1.0
  93. applyParameters[parameters.HoldOffDirectTunnelMinDuration] = "1ms"
  94. applyParameters[parameters.HoldOffDirectTunnelMaxDuration] = "10ms"
  95. applyParameters[parameters.HoldOffDirectTunnelProviderRegions] = holdOffDirectTunnelProviderRegions
  96. applyParameters[parameters.HoldOffInproxyTunnelProbability] = 1.0
  97. applyParameters[parameters.HoldOffInproxyTunnelMinDuration] = "1ms"
  98. applyParameters[parameters.HoldOffInproxyTunnelMaxDuration] = "10ms"
  99. applyParameters[parameters.HoldOffInproxyTunnelProviderRegions] = holdOffInproxyTunnelProviderRegions
  100. applyParameters[parameters.HoldOffDirectTunnelProbability] = 1.0
  101. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  102. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  103. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  104. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  105. applyParameters[parameters.OSSHObfuscatorSeedTransformProbability] = 1.0
  106. applyParameters[parameters.OSSHObfuscatorSeedTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  107. applyParameters[parameters.OSSHObfuscatorSeedTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  108. applyParameters[parameters.ObfuscatedQUICNonceTransformProbability] = 1.0
  109. applyParameters[parameters.ObfuscatedQUICNonceTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  110. applyParameters[parameters.ObfuscatedQUICNonceTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  111. applyParameters[parameters.ShadowsocksPrefixProbability] = 1.0
  112. applyParameters[parameters.ShadowsocksPrefixSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  113. applyParameters[parameters.ShadowsocksPrefixScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  114. err = clientConfig.SetParameters("tag1", false, applyParameters)
  115. if err != nil {
  116. t.Fatalf("SetParameters failed: %s", err)
  117. }
  118. resolver := NewResolver(clientConfig, true)
  119. defer resolver.Stop()
  120. clientConfig.SetResolver(resolver)
  121. err = OpenDataStore(clientConfig)
  122. if err != nil {
  123. t.Fatalf("error initializing client datastore: %s", err)
  124. }
  125. defer CloseDataStore()
  126. serverEntries := makeMockServerEntries(tunnelProtocol, "CA", providerID, frontingProviderID, 100)
  127. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  128. return replayProtocol == tunnelProtocol
  129. }
  130. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  131. return tunnelProtocol, true
  132. }
  133. values.SetSSHClientVersionsSpec(
  134. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  135. values.SetUserAgentsSpec(
  136. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  137. // Test: expected dial parameter fields set
  138. steeringIPCache := lrucache.NewWithLRU(1*time.Hour, 1*time.Hour, 0)
  139. upstreamProxyErrorCallback := func(_ error) {}
  140. dialParams, err := MakeDialParameters(
  141. clientConfig, steeringIPCache, nil, nil, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  142. if err != nil {
  143. t.Fatalf("MakeDialParameters failed: %s", err)
  144. }
  145. if dialParams.ServerEntry != serverEntries[0] {
  146. t.Fatalf("unexpected server entry")
  147. }
  148. if dialParams.NetworkID != testNetworkID {
  149. t.Fatalf("unexpected network ID")
  150. }
  151. if dialParams.IsReplay {
  152. t.Fatalf("unexpected replay")
  153. }
  154. if dialParams.TunnelProtocol != tunnelProtocol {
  155. t.Fatalf("unexpected tunnel protocol")
  156. }
  157. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  158. dialParams.DirectDialAddress == "" {
  159. t.Fatalf("missing direct dial fields")
  160. }
  161. if dialParams.DialPortNumber == "" {
  162. t.Fatalf("missing port number fields")
  163. }
  164. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  165. t.Fatalf("missing SSH fields")
  166. }
  167. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  168. dialParams.ObfuscatorPaddingSeed == nil {
  169. t.Fatalf("missing obfuscator fields")
  170. }
  171. if dialParams.FragmentorSeed == nil {
  172. t.Fatalf("missing fragmentor field")
  173. }
  174. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  175. (dialParams.MeekDialAddress == "" ||
  176. dialParams.MeekHostHeader == "" ||
  177. dialParams.MeekObfuscatorPaddingSeed == nil) {
  178. t.Fatalf("missing meek fields")
  179. }
  180. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  181. (dialParams.MeekFrontingDialAddress == "" ||
  182. dialParams.MeekFrontingHost == "" ||
  183. dialParams.ResolveParameters == nil) {
  184. t.Fatalf("missing meek fronting fields")
  185. }
  186. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  187. dialParams.UserAgent == "" {
  188. t.Fatalf("missing meek HTTP fields")
  189. }
  190. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  191. (dialParams.MeekSNIServerName == "" ||
  192. !dialParams.SelectedTLSProfile ||
  193. dialParams.TLSProfile == "") {
  194. t.Fatalf("missing meek HTTPS fields")
  195. }
  196. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  197. if dialParams.QUICVersion == "" {
  198. t.Fatalf("missing QUIC version field")
  199. }
  200. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  201. if dialParams.MeekFrontingDialAddress == "" ||
  202. dialParams.MeekFrontingHost == "" ||
  203. dialParams.MeekSNIServerName == "" {
  204. t.Fatalf("missing fronted QUIC fields")
  205. }
  206. } else {
  207. if dialParams.QUICDialSNIAddress == "" {
  208. t.Fatalf("missing QUIC SNI field")
  209. }
  210. }
  211. }
  212. if dialParams.LivenessTestSeed == nil {
  213. t.Fatalf("missing liveness test fields")
  214. }
  215. if dialParams.APIRequestPaddingSeed == nil {
  216. t.Fatalf("missing API request fields")
  217. }
  218. expectHoldOffTunnelProtocolNames := common.Contains(holdOffTunnelProtocolNames, tunnelProtocol)
  219. expectHoldOffFrontingTunnelProviderIDs := protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol)
  220. expectHoldOffDirectTunnelProviderRegion := protocol.TunnelProtocolIsDirect(tunnelProtocol) &&
  221. common.ContainsAny(
  222. holdOffDirectTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  223. []string{"", dialParams.ServerEntry.Region})
  224. expectHoldOffInproxyTunnelProviderRegion := protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  225. common.ContainsAny(
  226. holdOffInproxyTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  227. []string{"", dialParams.ServerEntry.Region})
  228. if expectHoldOffTunnelProtocolNames ||
  229. expectHoldOffFrontingTunnelProviderIDs ||
  230. expectHoldOffDirectTunnelProviderRegion ||
  231. expectHoldOffInproxyTunnelProviderRegion {
  232. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  233. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  234. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  235. }
  236. } else {
  237. if dialParams.HoldOffTunnelDuration != 0 {
  238. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  239. }
  240. }
  241. dialConfig := dialParams.GetDialConfig()
  242. if dialConfig.UpstreamProxyErrorCallback == nil {
  243. t.Fatalf("missing upstreamProxyErrorCallback")
  244. }
  245. // Test: no replay after dial reported to fail
  246. dialErr := errors.TraceNew("dial error")
  247. dialParams.Failed(clientConfig, dialErr)
  248. dialParams, err = MakeDialParameters(
  249. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  250. if err != nil {
  251. t.Fatalf("MakeDialParameters failed: %s", err)
  252. }
  253. if dialParams.IsReplay {
  254. t.Fatalf("unexpected replay")
  255. }
  256. // Test: no replay after network ID changes
  257. dialParams.Succeeded()
  258. testNetworkID = prng.HexString(8)
  259. clientConfig.networkIDGetter.FlushCache()
  260. dialParams, err = MakeDialParameters(
  261. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  262. if err != nil {
  263. t.Fatalf("MakeDialParameters failed: %s", err)
  264. }
  265. if dialParams.NetworkID != testNetworkID {
  266. t.Fatalf("unexpected network ID")
  267. }
  268. if dialParams.IsReplay {
  269. t.Fatalf("unexpected replay")
  270. }
  271. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  272. dialParams.Succeeded()
  273. replayDialParams, err := MakeDialParameters(
  274. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  275. if err != nil {
  276. t.Fatalf("MakeDialParameters failed: %s", err)
  277. }
  278. if !replayDialParams.IsReplay {
  279. t.Fatalf("unexpected non-replay")
  280. }
  281. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  282. t.Fatalf("unexpected non-updated timestamp")
  283. }
  284. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  285. t.Fatalf("mismatching tunnel protocol")
  286. }
  287. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  288. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  289. t.Fatalf("mismatching dial fields")
  290. }
  291. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  292. if seed1 == nil {
  293. return seed2 == nil
  294. }
  295. return bytes.Equal(seed1[:], seed2[:])
  296. }
  297. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  298. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  299. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  300. t.Fatalf("mismatching SSH fields")
  301. }
  302. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  303. t.Fatalf("mismatching obfuscator fields")
  304. }
  305. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  306. t.Fatalf("mismatching fragmentor fields")
  307. }
  308. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  309. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  310. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  311. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  312. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  313. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  314. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  315. t.Fatalf("mismatching meek fields")
  316. }
  317. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  318. replayDialParams.UserAgent != dialParams.UserAgent {
  319. t.Fatalf("mismatching user agent fields")
  320. }
  321. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  322. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  323. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  324. t.Fatalf("mismatching TLS fields")
  325. }
  326. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  327. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  328. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  329. t.Fatalf("mismatching QUIC fields")
  330. }
  331. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  332. t.Fatalf("mismatching liveness test fields")
  333. }
  334. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  335. t.Fatalf("mismatching API request fields")
  336. }
  337. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  338. (replayDialParams.ResolveParameters != nil &&
  339. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  340. t.Fatalf("mismatching ResolveParameters fields")
  341. }
  342. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  343. (replayDialParams.HTTPTransformerParameters != nil &&
  344. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  345. t.Fatalf("mismatching HTTPTransformerParameters fields")
  346. }
  347. if (replayDialParams.OSSHObfuscatorSeedTransformerParameters == nil) != (dialParams.OSSHObfuscatorSeedTransformerParameters == nil) ||
  348. (replayDialParams.OSSHObfuscatorSeedTransformerParameters != nil &&
  349. !reflect.DeepEqual(replayDialParams.OSSHObfuscatorSeedTransformerParameters, dialParams.OSSHObfuscatorSeedTransformerParameters)) {
  350. t.Fatalf("mismatching ObfuscatorSeedTransformerParameters fields")
  351. }
  352. if (replayDialParams.ObfuscatedQUICNonceTransformerParameters == nil) != (dialParams.ObfuscatedQUICNonceTransformerParameters == nil) ||
  353. (replayDialParams.ObfuscatedQUICNonceTransformerParameters != nil &&
  354. !reflect.DeepEqual(replayDialParams.ObfuscatedQUICNonceTransformerParameters, dialParams.ObfuscatedQUICNonceTransformerParameters)) {
  355. t.Fatalf("mismatching ObfuscatedQUICNonceTransformerParameters fields")
  356. }
  357. if (replayDialParams.ShadowsocksPrefixSpec == nil) != (dialParams.ShadowsocksPrefixSpec == nil) ||
  358. (replayDialParams.ShadowsocksPrefixSpec != nil &&
  359. !reflect.DeepEqual(replayDialParams.ShadowsocksPrefixSpec, dialParams.ShadowsocksPrefixSpec)) {
  360. t.Fatalf("mismatching ShadowsocksPrefixSpec fields")
  361. }
  362. // Test: replay after change tactics, with ReplayIgnoreChangedClientState = true
  363. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  364. applyParameters[parameters.ReplayIgnoreChangedConfigState] = true
  365. err = clientConfig.SetParameters("tag2a", false, applyParameters)
  366. if err != nil {
  367. t.Fatalf("SetParameters failed: %s", err)
  368. }
  369. dialParams, err = MakeDialParameters(
  370. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  371. if err != nil {
  372. t.Fatalf("MakeDialParameters failed: %s", err)
  373. }
  374. if !replayDialParams.IsReplay {
  375. t.Fatalf("unexpected non-replay")
  376. }
  377. // Test: no replay after change tactics
  378. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  379. applyParameters[parameters.ReplayIgnoreChangedConfigState] = false
  380. err = clientConfig.SetParameters("tag2", false, applyParameters)
  381. if err != nil {
  382. t.Fatalf("SetParameters failed: %s", err)
  383. }
  384. dialParams, err = MakeDialParameters(
  385. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  386. if err != nil {
  387. t.Fatalf("MakeDialParameters failed: %s", err)
  388. }
  389. if dialParams.IsReplay {
  390. t.Fatalf("unexpected replay")
  391. }
  392. // Test: no replay after dial parameters expired
  393. dialParams.Succeeded()
  394. time.Sleep(1 * time.Second)
  395. dialParams, err = MakeDialParameters(
  396. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  397. if err != nil {
  398. t.Fatalf("MakeDialParameters failed: %s", err)
  399. }
  400. if dialParams.IsReplay {
  401. t.Fatalf("unexpected replay")
  402. }
  403. // Test: no replay after server entry changes
  404. dialParams.Succeeded()
  405. serverEntries[0].ConfigurationVersion += 1
  406. dialParams, err = MakeDialParameters(
  407. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  408. if err != nil {
  409. t.Fatalf("MakeDialParameters failed: %s", err)
  410. }
  411. if dialParams.IsReplay {
  412. t.Fatalf("unexpected replay")
  413. }
  414. // Test: disable replay elements (partial coverage)
  415. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  416. applyParameters[parameters.ReplaySSH] = false
  417. applyParameters[parameters.ReplayObfuscatorPadding] = false
  418. applyParameters[parameters.ReplayFragmentor] = false
  419. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  420. applyParameters[parameters.ReplayLivenessTest] = false
  421. applyParameters[parameters.ReplayAPIRequestPadding] = false
  422. err = clientConfig.SetParameters("tag3", false, applyParameters)
  423. if err != nil {
  424. t.Fatalf("SetParameters failed: %s", err)
  425. }
  426. dialParams, err = MakeDialParameters(
  427. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  428. if err != nil {
  429. t.Fatalf("MakeDialParameters failed: %s", err)
  430. }
  431. dialParams.Succeeded()
  432. replayDialParams, err = MakeDialParameters(
  433. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  434. if err != nil {
  435. t.Fatalf("MakeDialParameters failed: %s", err)
  436. }
  437. if !replayDialParams.IsReplay {
  438. t.Fatalf("unexpected non-replay")
  439. }
  440. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  441. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  442. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  443. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  444. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  445. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  446. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  447. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  448. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  449. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  450. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  451. t.Fatalf("unexpected replayed fields")
  452. }
  453. // Test: client-side restrict fronting provider ID
  454. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  455. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  456. err = clientConfig.SetParameters("tag4", false, applyParameters)
  457. if err != nil {
  458. t.Fatalf("SetParameters failed: %s", err)
  459. }
  460. dialParams, err = MakeDialParameters(
  461. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  462. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  463. if err == nil {
  464. if dialParams != nil {
  465. t.Fatalf("unexpected MakeDialParameters success")
  466. }
  467. }
  468. } else {
  469. if err != nil {
  470. t.Fatalf("MakeDialParameters failed: %s", err)
  471. }
  472. }
  473. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  474. err = clientConfig.SetParameters("tag5", false, applyParameters)
  475. if err != nil {
  476. t.Fatalf("SetParameters failed: %s", err)
  477. }
  478. // Test: client-side restrict provider ID by region for direct protocols
  479. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{providerID: {"CA"}}
  480. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 1.0
  481. err = clientConfig.SetParameters("tag6", false, applyParameters)
  482. if err != nil {
  483. t.Fatalf("SetParameters failed: %s", err)
  484. }
  485. dialParams, err = MakeDialParameters(
  486. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  487. if protocol.TunnelProtocolIsDirect(tunnelProtocol) {
  488. if err == nil {
  489. if dialParams != nil {
  490. t.Fatalf("unexpected MakeDialParameters success")
  491. }
  492. }
  493. } else {
  494. if err != nil {
  495. t.Fatalf("MakeDialParameters failed: %s", err)
  496. }
  497. }
  498. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{}
  499. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 0.0
  500. err = clientConfig.SetParameters("tag7", false, applyParameters)
  501. if err != nil {
  502. t.Fatalf("SetParameters failed: %s", err)
  503. }
  504. // Test: client-side restrict provider ID by region for inproxy protocols
  505. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{providerID: {"CA"}}
  506. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 1.0
  507. err = clientConfig.SetParameters("tag8", false, applyParameters)
  508. if err != nil {
  509. t.Fatalf("SetParameters failed: %s", err)
  510. }
  511. dialParams, err = MakeDialParameters(
  512. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  513. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) {
  514. if err == nil {
  515. if dialParams != nil {
  516. t.Fatalf("unexpected MakeDialParameters success")
  517. }
  518. }
  519. } else {
  520. if err != nil {
  521. t.Fatalf("MakeDialParameters failed: %s", err)
  522. }
  523. }
  524. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{}
  525. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 0.0
  526. err = clientConfig.SetParameters("tag9", false, applyParameters)
  527. if err != nil {
  528. t.Fatalf("SetParameters failed: %s", err)
  529. }
  530. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  531. steeringIPCache.Flush()
  532. // Test: steering IP used in non-replay case
  533. dialParams, err = MakeDialParameters(
  534. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  535. if err != nil {
  536. t.Fatalf("MakeDialParameters failed: %s", err)
  537. }
  538. dialParams.Failed(clientConfig, dialErr)
  539. getCacheKey := func() string {
  540. return fmt.Sprintf("%s %s %s", testNetworkID, frontingProviderID, tunnelProtocol)
  541. }
  542. setCacheEntry := func(steeringIP string) {
  543. steeringIPCache.Set(getCacheKey(), steeringIP, lrucache.DefaultExpiration)
  544. }
  545. setCacheEntry("127.0.0.1")
  546. dialParams, err = MakeDialParameters(
  547. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  548. if err != nil {
  549. t.Fatalf("MakeDialParameters failed: %s", err)
  550. }
  551. if dialParams.IsReplay {
  552. t.Fatalf("unexpected replay")
  553. }
  554. checkSteeringIP := func(expectedSteeringIP string) {
  555. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Microsecond)
  556. defer cancelFunc()
  557. IPs, err := dialParams.dialConfig.ResolveIP(ctx, "example.com")
  558. if err != nil {
  559. t.Fatalf("ResolveIP failed: %s", err)
  560. }
  561. if IPs[0].String() != expectedSteeringIP {
  562. t.Fatalf("missing expected steering IP")
  563. }
  564. }
  565. checkSteeringIP("127.0.0.1")
  566. // Test: steering IP used in replay case
  567. dialParams.Succeeded()
  568. dialParams, err = MakeDialParameters(
  569. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  570. if err != nil {
  571. t.Fatalf("MakeDialParameters failed: %s", err)
  572. }
  573. if !dialParams.IsReplay {
  574. t.Fatalf("unexpected non-replay")
  575. }
  576. checkSteeringIP("127.0.0.1")
  577. // Test: different steering IP clears replay flag
  578. dialParams.Succeeded()
  579. setCacheEntry("127.0.0.2")
  580. dialParams, err = MakeDialParameters(
  581. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  582. if err != nil {
  583. t.Fatalf("MakeDialParameters failed: %s", err)
  584. }
  585. if dialParams.IsReplay {
  586. t.Fatalf("unexpected replay")
  587. }
  588. checkSteeringIP("127.0.0.2")
  589. // Test: newly present steering IP clears replay flag
  590. steeringIPCache.Flush()
  591. dialParams, err = MakeDialParameters(
  592. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  593. if err != nil {
  594. t.Fatalf("MakeDialParameters failed: %s", err)
  595. }
  596. dialParams.Succeeded()
  597. setCacheEntry("127.0.0.3")
  598. dialParams, err = MakeDialParameters(
  599. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  600. if err != nil {
  601. t.Fatalf("MakeDialParameters failed: %s", err)
  602. }
  603. if dialParams.IsReplay {
  604. t.Fatalf("unexpected replay")
  605. }
  606. // Test: steering IP cleared from cache after failure
  607. dialParams.Failed(clientConfig, dialErr)
  608. _, ok := steeringIPCache.Get(getCacheKey())
  609. if ok {
  610. t.Fatalf("unexpected steering IP cache entry")
  611. }
  612. }
  613. // Test: iterator shuffles
  614. for i, serverEntry := range serverEntries {
  615. data, err := json.Marshal(serverEntry)
  616. if err != nil {
  617. t.Fatalf("json.Marshal failed: %s", err)
  618. }
  619. var serverEntryFields protocol.ServerEntryFields
  620. err = json.Unmarshal(data, &serverEntryFields)
  621. if err != nil {
  622. t.Fatalf("json.Unmarshal failed: %s", err)
  623. }
  624. err = StoreServerEntry(serverEntryFields, false)
  625. if err != nil {
  626. t.Fatalf("StoreServerEntry failed: %s", err)
  627. }
  628. if i%10 == 0 {
  629. dialParams, err := MakeDialParameters(
  630. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  631. if err != nil {
  632. t.Fatalf("MakeDialParameters failed: %s", err)
  633. }
  634. dialParams.Succeeded()
  635. }
  636. }
  637. for i := 0; i < 5; i++ {
  638. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  639. if err != nil {
  640. t.Fatalf("NewServerEntryIterator failed: %s", err)
  641. }
  642. if hasAffinity {
  643. t.Fatalf("unexpected affinity server")
  644. }
  645. // Test: the first shuffle should move the replay candidates to the front
  646. for j := 0; j < 10; j++ {
  647. serverEntry, err := iterator.Next()
  648. if err != nil {
  649. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  650. }
  651. dialParams, err := MakeDialParameters(
  652. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  653. if err != nil {
  654. t.Fatalf("MakeDialParameters failed: %s", err)
  655. }
  656. if !dialParams.IsReplay {
  657. t.Fatalf("unexpected non-replay")
  658. }
  659. }
  660. iterator.Reset()
  661. // Test: subsequent shuffles should not move the replay candidates
  662. allReplay := true
  663. for j := 0; j < 10; j++ {
  664. serverEntry, err := iterator.Next()
  665. if err != nil {
  666. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  667. }
  668. dialParams, err := MakeDialParameters(
  669. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  670. if err != nil {
  671. t.Fatalf("MakeDialParameters failed: %s", err)
  672. }
  673. if !dialParams.IsReplay {
  674. allReplay = false
  675. }
  676. }
  677. if allReplay {
  678. t.Fatalf("unexpected all replay")
  679. }
  680. iterator.Close()
  681. }
  682. }
  683. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  684. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  685. if err != nil {
  686. t.Fatalf("TempDir failed: %s", err)
  687. }
  688. defer os.RemoveAll(testDataDirName)
  689. SetNoticeWriter(ioutil.Discard)
  690. clientConfig := &Config{
  691. PropagationChannelId: "0",
  692. SponsorId: "0",
  693. DataRootDirectory: testDataDirName,
  694. NetworkIDGetter: new(testNetworkGetter),
  695. }
  696. err = clientConfig.Commit(false)
  697. if err != nil {
  698. t.Fatalf("error committing configuration file: %s", err)
  699. }
  700. jsonLimitDialPortNumbers := `
  701. {
  702. "SSH" : [[10,11]],
  703. "OSSH" : [[20,21]],
  704. "QUIC-OSSH" : [[30,31]],
  705. "TAPDANCE-OSSH" : [[40,41]],
  706. "CONJURE-OSSH" : [[50,51]],
  707. "SHADOWSOCKS-OSSH" : [[60,61]],
  708. "All" : [[70,71],80,443]
  709. }
  710. `
  711. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  712. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  713. if err != nil {
  714. t.Fatalf("Unmarshal failed: %s", err)
  715. }
  716. applyParameters := make(map[string]interface{})
  717. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  718. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  719. err = clientConfig.SetParameters("tag1", false, applyParameters)
  720. if err != nil {
  721. t.Fatalf("SetParameters failed: %s", err)
  722. }
  723. constraints := &protocolSelectionConstraints{
  724. config: clientConfig,
  725. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  726. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  727. }
  728. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  729. protocol, _, ok := constraints.selectProtocol(0, false, false, serverEntry)
  730. return protocol, ok
  731. }
  732. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  733. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  734. continue
  735. }
  736. serverEntries := makeMockServerEntries(tunnelProtocol, "", "", "", 100)
  737. selected := false
  738. skipped := false
  739. for _, serverEntry := range serverEntries {
  740. selectedProtocol, ok := selectProtocol(serverEntry)
  741. if ok {
  742. if selectedProtocol != tunnelProtocol {
  743. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  744. }
  745. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  746. if err != nil {
  747. t.Fatalf("GetDialPortNumber failed: %s", err)
  748. }
  749. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  750. t.Fatalf("unexpected dial port number: %d", port)
  751. }
  752. selected = true
  753. } else {
  754. skipped = true
  755. }
  756. }
  757. if !selected {
  758. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  759. }
  760. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  761. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  762. }
  763. }
  764. }
  765. func makeMockServerEntries(
  766. tunnelProtocol string,
  767. region string,
  768. providerID string,
  769. frontingProviderID string,
  770. count int) []*protocol.ServerEntry {
  771. serverEntries := make([]*protocol.ServerEntry, count)
  772. for i := 0; i < count; i++ {
  773. serverEntries[i] = &protocol.ServerEntry{
  774. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  775. SshPort: prng.Range(10, 19),
  776. SshObfuscatedPort: prng.Range(20, 29),
  777. SshObfuscatedQUICPort: prng.Range(30, 39),
  778. SshObfuscatedTapDancePort: prng.Range(40, 49),
  779. SshObfuscatedConjurePort: prng.Range(50, 59),
  780. SshShadowsocksPort: prng.Range(60, 69),
  781. MeekServerPort: prng.Range(70, 79),
  782. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  783. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  784. Region: region,
  785. ProviderID: providerID,
  786. FrontingProviderID: frontingProviderID,
  787. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  788. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  789. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  790. }
  791. }
  792. return serverEntries
  793. }
  794. func TestMakeHTTPTransformerParameters(t *testing.T) {
  795. type test struct {
  796. name string
  797. frontingProviderID string
  798. isFronted bool
  799. paramValues map[string]interface{}
  800. expectedTransformName string
  801. expectedTransformSpec transforms.Spec
  802. }
  803. tests := []test{
  804. {
  805. name: "unfronted",
  806. frontingProviderID: "",
  807. isFronted: false,
  808. paramValues: map[string]interface{}{
  809. "DirectHTTPProtocolTransformProbability": 1,
  810. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  811. "spec1": {{"A", "B"}},
  812. },
  813. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  814. "": {"spec1"},
  815. },
  816. },
  817. expectedTransformName: "spec1",
  818. expectedTransformSpec: [][2]string{{"A", "B"}},
  819. },
  820. {
  821. name: "fronted",
  822. frontingProviderID: "frontingProvider",
  823. isFronted: true,
  824. paramValues: map[string]interface{}{
  825. "FrontedHTTPProtocolTransformProbability": 1,
  826. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  827. "spec1": {{"A", "B"}},
  828. },
  829. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  830. "frontingProvider": {"spec1"},
  831. },
  832. },
  833. expectedTransformName: "spec1",
  834. expectedTransformSpec: [][2]string{{"A", "B"}},
  835. },
  836. {
  837. name: "no transform, coinflip false",
  838. frontingProviderID: "frontingProvider",
  839. isFronted: false,
  840. paramValues: map[string]interface{}{
  841. "DirectHTTPProtocolTransformProbability": 0,
  842. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  843. "spec1": {{"A", "B"}},
  844. },
  845. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  846. "frontingProvider": {"spec1"},
  847. },
  848. },
  849. expectedTransformName: "",
  850. expectedTransformSpec: nil,
  851. },
  852. }
  853. for _, tt := range tests {
  854. t.Run(tt.name, func(t *testing.T) {
  855. params, err := parameters.NewParameters(nil)
  856. if err != nil {
  857. t.Fatalf("parameters.NewParameters failed %v", err)
  858. }
  859. _, err = params.Set("", 0, tt.paramValues)
  860. if err != nil {
  861. t.Fatalf("params.Set failed %v", err)
  862. }
  863. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  864. if err != nil {
  865. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  866. }
  867. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  868. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  869. }
  870. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  871. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  872. }
  873. if httpTransformerParams.ProtocolTransformSpec != nil {
  874. if httpTransformerParams.ProtocolTransformSeed == nil {
  875. t.Fatalf("expected non-nil seed")
  876. }
  877. }
  878. })
  879. }
  880. }
  881. func TestMakeOSSHObfuscatorSeedTranformerParameters(t *testing.T) {
  882. type test struct {
  883. name string
  884. paramValues map[string]interface{}
  885. expectedTransformName string
  886. expectedTransformSpec transforms.Spec
  887. }
  888. tests := []test{
  889. {
  890. name: "transform",
  891. paramValues: map[string]interface{}{
  892. "OSSHObfuscatorSeedTransformProbability": 1,
  893. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  894. "spec1": {{"A", "B"}},
  895. },
  896. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  897. "": {"spec1"},
  898. },
  899. },
  900. expectedTransformName: "spec1",
  901. expectedTransformSpec: [][2]string{{"A", "B"}},
  902. },
  903. {
  904. name: "no transform, coinflip false",
  905. paramValues: map[string]interface{}{
  906. "OSSHObfuscatorSeedTransformProbability": 0,
  907. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  908. "spec1": {{"A", "B"}},
  909. },
  910. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  911. "": {"spec1"},
  912. },
  913. },
  914. expectedTransformName: "",
  915. expectedTransformSpec: nil,
  916. },
  917. }
  918. for _, tt := range tests {
  919. t.Run(tt.name, func(t *testing.T) {
  920. params, err := parameters.NewParameters(nil)
  921. if err != nil {
  922. t.Fatalf("parameters.NewParameters failed: %v", err)
  923. }
  924. _, err = params.Set("", 0, tt.paramValues)
  925. if err != nil {
  926. t.Fatalf("params.Set failed: %v", err)
  927. }
  928. transformerParams, err := makeSeedTransformerParameters(
  929. params.Get(),
  930. parameters.OSSHObfuscatorSeedTransformProbability,
  931. parameters.OSSHObfuscatorSeedTransformSpecs,
  932. parameters.OSSHObfuscatorSeedTransformScopedSpecNames)
  933. if err != nil {
  934. t.Fatalf("makeSeedTransformerParameters failed: %v", err)
  935. }
  936. if transformerParams.TransformName != tt.expectedTransformName {
  937. t.Fatalf("expected TransformName \"%s\" but got \"%s\"", tt.expectedTransformName, transformerParams.TransformName)
  938. }
  939. if !reflect.DeepEqual(transformerParams.TransformSpec, tt.expectedTransformSpec) {
  940. t.Fatalf("expected TransformSpec %v but got %v", tt.expectedTransformSpec, transformerParams.TransformSpec)
  941. }
  942. if transformerParams.TransformSpec != nil {
  943. if transformerParams.TransformSeed == nil {
  944. t.Fatalf("expected non-nil seed")
  945. }
  946. }
  947. })
  948. }
  949. }