meekConn_test.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. /*
  2. * Copyright (c) 2021, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "context"
  22. "io/ioutil"
  23. "net/http"
  24. "os"
  25. "testing"
  26. "time"
  27. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  28. )
  29. // MeekModeRelay and MeekModeObfuscatedRoundTrip are tested via meek protocol
  30. // and tactics test cases.
  31. func TestMeekModePlaintextRoundTrip(t *testing.T) {
  32. testDataDirName, err := ioutil.TempDir("", "psiphon-meek-mode-plaintext-round-trip-test")
  33. if err != nil {
  34. t.Fatalf("TempDir failed: %v", err)
  35. }
  36. defer os.RemoveAll(testDataDirName)
  37. serverName := "example.org"
  38. rootCAsFileName,
  39. rootCACertificatePin,
  40. serverCertificatePin,
  41. shutdown,
  42. serverAddr,
  43. dialer := initTestCertificatesAndWebServer(
  44. t, testDataDirName, serverName)
  45. defer shutdown()
  46. params, err := parameters.NewParameters(nil)
  47. if err != nil {
  48. t.Fatalf("parameters.NewParameters failed: %v", err)
  49. }
  50. testCases := []struct {
  51. description string
  52. meekMode MeekMode
  53. verifyServerName string
  54. verifyPins []string
  55. }{
  56. {
  57. meekMode: MeekModePlaintextRoundTrip,
  58. verifyServerName: serverName,
  59. verifyPins: []string{rootCACertificatePin, serverCertificatePin},
  60. },
  61. {
  62. meekMode: MeekModeWrappedPlaintextRoundTrip,
  63. verifyServerName: "",
  64. verifyPins: nil,
  65. },
  66. }
  67. for _, testCase := range testCases {
  68. t.Run(testCase.description, func(t *testing.T) {
  69. meekConfig := &MeekConfig{
  70. Parameters: params,
  71. Mode: testCase.meekMode,
  72. DialAddress: serverAddr,
  73. UseHTTPS: true,
  74. SNIServerName: "not-" + serverName,
  75. VerifyServerName: testCase.verifyServerName,
  76. VerifyPins: testCase.verifyPins,
  77. }
  78. dialConfig := &DialConfig{
  79. TrustedCACertificatesFilename: rootCAsFileName,
  80. CustomDialer: dialer,
  81. }
  82. for _, tlsFragmentClientHello := range []bool{false, true} {
  83. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Second)
  84. defer cancelFunc()
  85. meekConfig.TLSFragmentClientHello = tlsFragmentClientHello
  86. meekConn, err := DialMeek(ctx, meekConfig, dialConfig)
  87. if err != nil {
  88. t.Fatalf("DialMeek failed: %v", err)
  89. }
  90. client := &http.Client{
  91. Transport: meekConn,
  92. }
  93. response, err := client.Get("https://" + serverAddr + "/")
  94. if err != nil {
  95. t.Fatalf("http.Client.Get failed: %v", err)
  96. }
  97. response.Body.Close()
  98. if response.StatusCode != http.StatusOK {
  99. t.Fatalf("unexpected response code: %v", response.StatusCode)
  100. }
  101. err = meekConn.Close()
  102. if err != nil {
  103. t.Fatalf("MeekConn.Close failed: %v", err)
  104. }
  105. }
  106. })
  107. }
  108. }