tactics_test.go 29 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package tactics
  20. import (
  21. "bytes"
  22. "context"
  23. "fmt"
  24. "io/ioutil"
  25. "net"
  26. "net/http"
  27. "os"
  28. "reflect"
  29. "strings"
  30. "testing"
  31. "time"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/stacktrace"
  36. )
  37. func TestTactics(t *testing.T) {
  38. // Server tactics configuration
  39. // Long and short region lists test both map and slice lookups.
  40. //
  41. // Repeated median aggregation tests aggregation memoization.
  42. //
  43. // The test-packetman-spec tests a reference between a filter tactics
  44. // and default tactics.
  45. tacticsConfigTemplate := `
  46. {
  47. "RequestPublicKey" : "%s",
  48. "RequestPrivateKey" : "%s",
  49. "RequestObfuscatedKey" : "%s",
  50. "DefaultTactics" : {
  51. "TTL" : "1s",
  52. "Parameters" : {
  53. "NetworkLatencyMultiplier" : %0.1f,
  54. "ServerPacketManipulationSpecs" : [{"Name": "test-packetman-spec", "PacketSpecs": [["TCP-flags S"]]}]
  55. }
  56. },
  57. "FilteredTactics" : [
  58. {
  59. "Filter" : {
  60. "Regions": ["R1", "R2", "R3", "R4", "R5", "R6"],
  61. "APIParameters" : {"client_platform" : ["P1"]},
  62. "SpeedTestRTTMilliseconds" : {
  63. "Aggregation" : "Median",
  64. "AtLeast" : 1
  65. }
  66. },
  67. "Tactics" : {
  68. "Parameters" : {
  69. "ConnectionWorkerPoolSize" : %d
  70. }
  71. }
  72. },
  73. {
  74. "Filter" : {
  75. "Regions": ["R1"],
  76. "ASNs": ["1"],
  77. "APIParameters" : {"client_platform" : ["P1"], "client_version": ["V1"]},
  78. "SpeedTestRTTMilliseconds" : {
  79. "Aggregation" : "Median",
  80. "AtLeast" : 1
  81. }
  82. },
  83. "Tactics" : {
  84. "Parameters" : {
  85. %s
  86. }
  87. }
  88. },
  89. {
  90. "Filter" : {
  91. "APIParameters" : {"client_platform" : ["P2"], "client_version": ["V2"]}
  92. },
  93. "Tactics" : {
  94. "Parameters" : {
  95. "ConnectionWorkerPoolSize" : 1
  96. }
  97. }
  98. },
  99. {
  100. "Filter" : {
  101. "Regions": ["R2"]
  102. },
  103. "Tactics" : {
  104. "Parameters" : {
  105. "ConnectionWorkerPoolSize" : %d
  106. }
  107. }
  108. },
  109. {
  110. "Filter" : {
  111. "Regions": ["R7"]
  112. },
  113. "Tactics" : {
  114. "Parameters" : {
  115. "ServerProtocolPacketManipulations": {"All" : ["test-packetman-spec"]}
  116. }
  117. }
  118. }
  119. ]
  120. }
  121. `
  122. if stringLookupThreshold != 5 {
  123. t.Fatalf("unexpected stringLookupThreshold")
  124. }
  125. encodedRequestPublicKey, encodedRequestPrivateKey, encodedObfuscatedKey, err := GenerateKeys()
  126. if err != nil {
  127. t.Fatalf("GenerateKeys failed: %s", err)
  128. }
  129. tacticsNetworkLatencyMultiplier := 2.0
  130. tacticsConnectionWorkerPoolSize := 5
  131. tacticsLimitTunnelProtocols := protocol.TunnelProtocols{"OSSH", "SSH"}
  132. jsonTacticsLimitTunnelProtocols := `"LimitTunnelProtocols" : ["OSSH", "SSH"]`
  133. expectedApplyCount := 3
  134. tacticsConfig := fmt.Sprintf(
  135. tacticsConfigTemplate,
  136. encodedRequestPublicKey,
  137. encodedRequestPrivateKey,
  138. encodedObfuscatedKey,
  139. tacticsNetworkLatencyMultiplier,
  140. tacticsConnectionWorkerPoolSize,
  141. jsonTacticsLimitTunnelProtocols,
  142. tacticsConnectionWorkerPoolSize+1)
  143. file, err := ioutil.TempFile("", "tactics.config")
  144. if err != nil {
  145. t.Fatalf("TempFile create failed: %s", err)
  146. }
  147. _, err = file.Write([]byte(tacticsConfig))
  148. if err != nil {
  149. t.Fatalf("TempFile write failed: %s", err)
  150. }
  151. file.Close()
  152. configFileName := file.Name()
  153. defer os.Remove(configFileName)
  154. // Configure and run server
  155. // Mock server uses an insecure HTTP transport that exposes endpoint names
  156. clientGeoIPData := common.GeoIPData{Country: "R1", ASN: "1"}
  157. logger := newTestLogger()
  158. validator := func(
  159. apiParams common.APIParameters) error {
  160. expectedParams := []string{"client_platform", "client_version"}
  161. for _, name := range expectedParams {
  162. value, ok := apiParams[name]
  163. if !ok {
  164. return fmt.Errorf("missing param: %s", name)
  165. }
  166. _, ok = value.(string)
  167. if !ok {
  168. return fmt.Errorf("invalid param type: %s", name)
  169. }
  170. }
  171. return nil
  172. }
  173. formatter := func(
  174. _ string,
  175. _ common.GeoIPData,
  176. apiParams common.APIParameters) common.LogFields {
  177. return common.LogFields(apiParams)
  178. }
  179. server, err := NewServer(
  180. logger,
  181. formatter,
  182. validator,
  183. configFileName)
  184. if err != nil {
  185. t.Fatalf("NewServer failed: %s", err)
  186. }
  187. listener, err := net.Listen("tcp", "127.0.0.1:0")
  188. if err != nil {
  189. t.Fatalf("Listen failed: %s", err)
  190. }
  191. serverAddress := listener.Addr().String()
  192. go func() {
  193. serveMux := http.NewServeMux()
  194. serveMux.HandleFunc(
  195. "/",
  196. func(w http.ResponseWriter, r *http.Request) {
  197. // Ensure RTT takes at least 1 millisecond for speed test
  198. time.Sleep(1 * time.Millisecond)
  199. endPoint := strings.Trim(r.URL.Path, "/")
  200. if !server.HandleEndPoint(endPoint, clientGeoIPData, w, r) {
  201. http.NotFound(w, r)
  202. }
  203. })
  204. httpServer := &http.Server{
  205. Addr: serverAddress,
  206. Handler: serveMux,
  207. }
  208. httpServer.Serve(listener)
  209. }()
  210. // Configure client
  211. params, err := parameters.NewParameters(
  212. func(err error) {
  213. t.Fatalf("Parameters getValue failed: %s", err)
  214. })
  215. if err != nil {
  216. t.Fatalf("NewParameters failed: %s", err)
  217. }
  218. networkID := "NETWORK1"
  219. getNetworkID := func() string { return networkID }
  220. apiParams := common.APIParameters{
  221. "client_platform": "P1",
  222. "client_version": "V1"}
  223. storer := newTestStorer()
  224. endPointRegion := "R0"
  225. endPointProtocol := "OSSH"
  226. differentEndPointProtocol := "SSH"
  227. obfuscatedRoundTripper := func(
  228. ctx context.Context,
  229. endPoint string,
  230. requestBody []byte) ([]byte, error) {
  231. // This mock ObfuscatedRoundTripper does not actually obfuscate the endpoint
  232. // value.
  233. request, err := http.NewRequest(
  234. "POST",
  235. fmt.Sprintf("http://%s/%s", serverAddress, endPoint),
  236. bytes.NewReader(requestBody))
  237. if err != nil {
  238. return nil, err
  239. }
  240. request = request.WithContext(ctx)
  241. response, err := http.DefaultClient.Do(request)
  242. if err != nil {
  243. return nil, err
  244. }
  245. defer response.Body.Close()
  246. if response.StatusCode != http.StatusOK {
  247. return nil, fmt.Errorf("HTTP request failed: %d", response.StatusCode)
  248. }
  249. body, err := ioutil.ReadAll(response.Body)
  250. if err != nil {
  251. return nil, err
  252. }
  253. return body, nil
  254. }
  255. // There should be no local tactics
  256. tacticsRecord, err := UseStoredTactics(storer, networkID)
  257. if err != nil {
  258. t.Fatalf("UseStoredTactics failed: %s", err)
  259. }
  260. if tacticsRecord != nil {
  261. t.Fatalf("unexpected tactics record")
  262. }
  263. // Helper to check that expected tactics parameters are returned
  264. checkParameters := func(r *Record) {
  265. p, err := parameters.NewParameters(nil)
  266. if err != nil {
  267. t.Fatalf("NewParameters failed: %s", err)
  268. }
  269. // ValidationSkipOnError is set for Psiphon clients
  270. counts, err := p.Set(r.Tag, parameters.ValidationSkipOnError, r.Tactics.Parameters)
  271. if err != nil {
  272. t.Fatalf("Apply failed: %s", err)
  273. }
  274. if counts[0] != expectedApplyCount {
  275. t.Fatalf("Unexpected apply count: %d", counts[0])
  276. }
  277. multipler := p.Get().Float(parameters.NetworkLatencyMultiplier)
  278. if multipler != tacticsNetworkLatencyMultiplier {
  279. t.Fatalf("Unexpected NetworkLatencyMultiplier: %v", multipler)
  280. }
  281. connectionWorkerPoolSize := p.Get().Int(parameters.ConnectionWorkerPoolSize)
  282. if connectionWorkerPoolSize != tacticsConnectionWorkerPoolSize {
  283. t.Fatalf("Unexpected ConnectionWorkerPoolSize: %v", connectionWorkerPoolSize)
  284. }
  285. limitTunnelProtocols := p.Get().TunnelProtocols(parameters.LimitTunnelProtocols)
  286. if !reflect.DeepEqual(limitTunnelProtocols, tacticsLimitTunnelProtocols) {
  287. t.Fatalf("Unexpected LimitTunnelProtocols: %v", limitTunnelProtocols)
  288. }
  289. }
  290. // Helper to check server-side cachedTacticsData state
  291. checkServerCache := func(cacheEntryFilterMatches ...[]bool) {
  292. cacheItems := server.cachedTacticsData.Items()
  293. if len(cacheItems) != len(cacheEntryFilterMatches) {
  294. t.Fatalf("Unexpected cachedTacticsData size: %v", len(cacheItems))
  295. }
  296. for _, filterMatches := range cacheEntryFilterMatches {
  297. includeServerSizeOnly := false
  298. hasFilterMatches := true
  299. cacheKey := getCacheKey(includeServerSizeOnly, hasFilterMatches, filterMatches)
  300. _, ok := server.cachedTacticsData.Get(cacheKey)
  301. if !ok {
  302. t.Fatalf("Unexpected missing cachedTacticsData entry: %v", filterMatches)
  303. }
  304. }
  305. }
  306. // Initial tactics request; will also run a speed test
  307. // Request should complete in < 1 second
  308. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Second)
  309. initialFetchTacticsRecord, err := FetchTactics(
  310. ctx,
  311. params,
  312. storer,
  313. getNetworkID,
  314. apiParams,
  315. endPointProtocol,
  316. endPointRegion,
  317. encodedRequestPublicKey,
  318. encodedObfuscatedKey,
  319. obfuscatedRoundTripper)
  320. cancelFunc()
  321. if err != nil {
  322. t.Fatalf("FetchTactics failed: %s", err)
  323. }
  324. if initialFetchTacticsRecord == nil {
  325. t.Fatalf("expected tactics record")
  326. }
  327. checkParameters(initialFetchTacticsRecord)
  328. // Server should be caching tactics data for tactics matching first two
  329. // filters.
  330. checkServerCache([]bool{true, true, false, false, false})
  331. // There should now be cached local tactics
  332. storedTacticsRecord, err := UseStoredTactics(storer, networkID)
  333. if err != nil {
  334. t.Fatalf("UseStoredTactics failed: %s", err)
  335. }
  336. if storedTacticsRecord == nil {
  337. t.Fatalf("expected stored tactics record")
  338. }
  339. // Strip monotonic component so comparisons will work
  340. initialFetchTacticsRecord.Expiry = initialFetchTacticsRecord.Expiry.Round(0)
  341. if !reflect.DeepEqual(initialFetchTacticsRecord, storedTacticsRecord) {
  342. t.Fatalf("tactics records are not identical:\n\n%#v\n\n%#v\n\n",
  343. initialFetchTacticsRecord, storedTacticsRecord)
  344. }
  345. checkParameters(storedTacticsRecord)
  346. // There should now be a speed test sample
  347. speedTestSamples, err := getSpeedTestSamples(storer, networkID)
  348. if err != nil {
  349. t.Fatalf("getSpeedTestSamples failed: %s", err)
  350. }
  351. if len(speedTestSamples) != 1 {
  352. t.Fatalf("unexpected speed test samples count")
  353. }
  354. // Wait for tactics to expire
  355. time.Sleep(1 * time.Second)
  356. storedTacticsRecord, err = UseStoredTactics(storer, networkID)
  357. if err != nil {
  358. t.Fatalf("UseStoredTactics failed: %s", err)
  359. }
  360. if storedTacticsRecord != nil {
  361. t.Fatalf("unexpected stored tactics record")
  362. }
  363. // Next fetch should merge empty payload as tag matches
  364. // TODO: inspect tactics response payload
  365. fetchTacticsRecord, err := FetchTactics(
  366. context.Background(),
  367. params,
  368. storer,
  369. getNetworkID,
  370. apiParams,
  371. endPointProtocol,
  372. endPointRegion,
  373. encodedRequestPublicKey,
  374. encodedObfuscatedKey,
  375. obfuscatedRoundTripper)
  376. if err != nil {
  377. t.Fatalf("FetchTactics failed: %s", err)
  378. }
  379. if fetchTacticsRecord == nil {
  380. t.Fatalf("expected tactics record")
  381. }
  382. if initialFetchTacticsRecord.Tag != fetchTacticsRecord.Tag {
  383. t.Fatalf("tags are not identical")
  384. }
  385. if initialFetchTacticsRecord.Expiry.Equal(fetchTacticsRecord.Expiry) {
  386. t.Fatalf("expiries unexpectedly identical")
  387. }
  388. if !reflect.DeepEqual(initialFetchTacticsRecord.Tactics, fetchTacticsRecord.Tactics) {
  389. t.Fatalf("tactics are not identical:\n\n%#v\n\n%#v\n\n",
  390. initialFetchTacticsRecord.Tactics, fetchTacticsRecord.Tactics)
  391. }
  392. checkParameters(fetchTacticsRecord)
  393. // Server cache should be the same
  394. checkServerCache([]bool{true, true, false, false, false})
  395. // Modify tactics configuration to change payload
  396. tacticsConnectionWorkerPoolSize = 6
  397. tacticsLimitTunnelProtocols = protocol.TunnelProtocols{}
  398. jsonTacticsLimitTunnelProtocols = ``
  399. expectedApplyCount = 2
  400. // Omitting LimitTunnelProtocols entirely tests this bug fix: When a new
  401. // tactics payload is obtained, all previous parameters should be cleared.
  402. //
  403. // In the bug, any previous parameters not in the new tactics were
  404. // incorrectly retained. In this test case, LimitTunnelProtocols is
  405. // omitted in the new tactics; if FetchTactics fails to clear the old
  406. // LimitTunnelProtocols then the test will fail.
  407. tacticsConfig = fmt.Sprintf(
  408. tacticsConfigTemplate,
  409. encodedRequestPublicKey,
  410. encodedRequestPrivateKey,
  411. encodedObfuscatedKey,
  412. tacticsNetworkLatencyMultiplier,
  413. tacticsConnectionWorkerPoolSize,
  414. jsonTacticsLimitTunnelProtocols,
  415. tacticsConnectionWorkerPoolSize+1)
  416. err = ioutil.WriteFile(configFileName, []byte(tacticsConfig), 0600)
  417. if err != nil {
  418. t.Fatalf("WriteFile failed: %s", err)
  419. }
  420. reloaded, err := server.Reload()
  421. if err != nil {
  422. t.Fatalf("Reload failed: %s", err)
  423. }
  424. if !reloaded {
  425. t.Fatalf("Server config failed to reload")
  426. }
  427. // Server cache should be flushed
  428. checkServerCache()
  429. // Next fetch should return a different payload
  430. fetchTacticsRecord, err = FetchTactics(
  431. context.Background(),
  432. params,
  433. storer,
  434. getNetworkID,
  435. apiParams,
  436. endPointProtocol,
  437. endPointRegion,
  438. encodedRequestPublicKey,
  439. encodedObfuscatedKey,
  440. obfuscatedRoundTripper)
  441. if err != nil {
  442. t.Fatalf("FetchTactics failed: %s", err)
  443. }
  444. if fetchTacticsRecord == nil {
  445. t.Fatalf("expected tactics record")
  446. }
  447. if initialFetchTacticsRecord.Tag == fetchTacticsRecord.Tag {
  448. t.Fatalf("tags unexpectedly identical")
  449. }
  450. if initialFetchTacticsRecord.Expiry.Equal(fetchTacticsRecord.Expiry) {
  451. t.Fatalf("expires unexpectedly identical")
  452. }
  453. if reflect.DeepEqual(initialFetchTacticsRecord.Tactics, fetchTacticsRecord.Tactics) {
  454. t.Fatalf("tactics unexpectedly identical")
  455. }
  456. checkParameters(fetchTacticsRecord)
  457. checkServerCache([]bool{true, true, false, false, false})
  458. // Exercise handshake transport of tactics
  459. // Wait for tactics to expire; handshake should renew
  460. time.Sleep(1 * time.Second)
  461. handshakeParams := common.APIParameters{
  462. "client_platform": "P1",
  463. "client_version": "V1"}
  464. err = SetTacticsAPIParameters(storer, networkID, handshakeParams)
  465. if err != nil {
  466. t.Fatalf("SetTacticsAPIParameters failed: %s", err)
  467. }
  468. tacticsPayload, err := server.GetTacticsPayload(clientGeoIPData, handshakeParams)
  469. if err != nil {
  470. t.Fatalf("GetTacticsPayload failed: %s", err)
  471. }
  472. handshakeTacticsRecord, err := HandleTacticsPayload(storer, networkID, tacticsPayload)
  473. if err != nil {
  474. t.Fatalf("HandleTacticsPayload failed: %s", err)
  475. }
  476. // When tactic parameters are unchanged, HandleTacticsPayload returns nil,
  477. // so that callers do not apply tactics unnecessarily.
  478. //
  479. // Check that nil is returned, but then directly load the record stored by
  480. // HandleTacticsPayload in order to check metadata including the updated
  481. // TTL.
  482. if handshakeTacticsRecord != nil {
  483. t.Fatalf("unexpected tactics record")
  484. }
  485. handshakeTacticsRecord, err = getStoredTacticsRecord(storer, networkID)
  486. if err != nil {
  487. t.Fatalf("getStoredTacticsRecord failed: %s", err)
  488. }
  489. if fetchTacticsRecord.Tag != handshakeTacticsRecord.Tag {
  490. t.Fatalf("tags are not identical")
  491. }
  492. if fetchTacticsRecord.Expiry.Equal(handshakeTacticsRecord.Expiry) {
  493. t.Fatalf("expiries unexpectedly identical")
  494. }
  495. if !reflect.DeepEqual(fetchTacticsRecord.Tactics, handshakeTacticsRecord.Tactics) {
  496. t.Fatalf("tactics are not identical:\n\n%#v\n\n%#v\n\n",
  497. fetchTacticsRecord.Tactics, handshakeTacticsRecord.Tactics)
  498. }
  499. checkParameters(handshakeTacticsRecord)
  500. checkServerCache([]bool{true, true, false, false, false})
  501. // Now there should be stored tactics
  502. storedTacticsRecord, err = UseStoredTactics(storer, networkID)
  503. if err != nil {
  504. t.Fatalf("UseStoredTactics failed: %s", err)
  505. }
  506. if storedTacticsRecord == nil {
  507. t.Fatalf("expected stored tactics record")
  508. }
  509. handshakeTacticsRecord.Expiry = handshakeTacticsRecord.Expiry.Round(0)
  510. if !reflect.DeepEqual(handshakeTacticsRecord, storedTacticsRecord) {
  511. t.Fatalf("tactics records are not identical:\n\n%#v\n\n%#v\n\n",
  512. handshakeTacticsRecord, storedTacticsRecord)
  513. }
  514. checkParameters(storedTacticsRecord)
  515. // Change network ID, should be no stored tactics
  516. networkID = "NETWORK2"
  517. storedTacticsRecord, err = UseStoredTactics(storer, networkID)
  518. if err != nil {
  519. t.Fatalf("UseStoredTactics failed: %s", err)
  520. }
  521. if storedTacticsRecord != nil {
  522. t.Fatalf("unexpected stored tactics record")
  523. }
  524. // Server should cache a new entry for different filter matches
  525. apiParams2 := common.APIParameters{
  526. "client_platform": "P2",
  527. "client_version": "V2"}
  528. fetchTacticsRecord, err = FetchTactics(
  529. context.Background(),
  530. params,
  531. storer,
  532. getNetworkID,
  533. apiParams2,
  534. endPointProtocol,
  535. endPointRegion,
  536. encodedRequestPublicKey,
  537. encodedObfuscatedKey,
  538. obfuscatedRoundTripper)
  539. if err != nil {
  540. t.Fatalf("FetchTactics failed: %s", err)
  541. }
  542. if fetchTacticsRecord == nil {
  543. t.Fatalf("expected tactics record")
  544. }
  545. checkServerCache(
  546. []bool{true, true, false, false, false},
  547. []bool{false, false, true, false, false})
  548. // Exercise speed test sample truncation
  549. maxSamples := params.Get().Int(parameters.SpeedTestMaxSampleCount)
  550. for i := 0; i < maxSamples*2; i++ {
  551. response, err := MakeSpeedTestResponse(0, 0)
  552. if err != nil {
  553. t.Fatalf("MakeSpeedTestResponse failed: %s", err)
  554. }
  555. err = AddSpeedTestSample(
  556. params,
  557. storer,
  558. networkID,
  559. "",
  560. differentEndPointProtocol,
  561. 100*time.Millisecond,
  562. nil,
  563. response)
  564. if err != nil {
  565. t.Fatalf("AddSpeedTestSample failed: %s", err)
  566. }
  567. }
  568. speedTestSamples, err = getSpeedTestSamples(storer, networkID)
  569. if err != nil {
  570. t.Fatalf("getSpeedTestSamples failed: %s", err)
  571. }
  572. if len(speedTestSamples) != maxSamples {
  573. t.Fatalf("unexpected speed test samples count")
  574. }
  575. for _, sample := range speedTestSamples {
  576. if sample.EndPointProtocol == endPointProtocol {
  577. t.Fatalf("unexpected old speed test sample")
  578. }
  579. }
  580. // Fetch should fail when using incorrect keys
  581. encodedIncorrectRequestPublicKey, _, encodedIncorrectObfuscatedKey, err := GenerateKeys()
  582. if err != nil {
  583. t.Fatalf("GenerateKeys failed: %s", err)
  584. }
  585. _, err = FetchTactics(
  586. context.Background(),
  587. params,
  588. storer,
  589. getNetworkID,
  590. apiParams,
  591. endPointProtocol,
  592. endPointRegion,
  593. encodedIncorrectRequestPublicKey,
  594. encodedObfuscatedKey,
  595. obfuscatedRoundTripper)
  596. if err == nil {
  597. t.Fatalf("FetchTactics succeeded unexpectedly with incorrect request key")
  598. }
  599. _, err = FetchTactics(
  600. context.Background(),
  601. params,
  602. storer,
  603. getNetworkID,
  604. apiParams,
  605. endPointProtocol,
  606. endPointRegion,
  607. encodedRequestPublicKey,
  608. encodedIncorrectObfuscatedKey,
  609. obfuscatedRoundTripper)
  610. if err == nil {
  611. t.Fatalf("FetchTactics succeeded unexpectedly with incorrect obfuscated key")
  612. }
  613. // When no keys are supplied, untunneled tactics requests are not supported, but
  614. // handshake tactics (GetTacticsPayload) should still work.
  615. tacticsConfig = fmt.Sprintf(
  616. tacticsConfigTemplate,
  617. "",
  618. "",
  619. "",
  620. tacticsNetworkLatencyMultiplier,
  621. tacticsConnectionWorkerPoolSize,
  622. jsonTacticsLimitTunnelProtocols,
  623. tacticsConnectionWorkerPoolSize+1)
  624. err = ioutil.WriteFile(configFileName, []byte(tacticsConfig), 0600)
  625. if err != nil {
  626. t.Fatalf("WriteFile failed: %s", err)
  627. }
  628. reloaded, err = server.Reload()
  629. if err != nil {
  630. t.Fatalf("Reload failed: %s", err)
  631. }
  632. if !reloaded {
  633. t.Fatalf("Server config failed to reload")
  634. }
  635. _, err = server.GetTacticsPayload(clientGeoIPData, handshakeParams)
  636. if err != nil {
  637. t.Fatalf("GetTacticsPayload failed: %s", err)
  638. }
  639. handled := server.HandleEndPoint(TACTICS_END_POINT, clientGeoIPData, nil, nil)
  640. if handled {
  641. t.Fatalf("HandleEndPoint unexpectedly handled request")
  642. }
  643. handled = server.HandleEndPoint(SPEED_TEST_END_POINT, clientGeoIPData, nil, nil)
  644. if handled {
  645. t.Fatalf("HandleEndPoint unexpectedly handled request")
  646. }
  647. // TODO: test replay attack defence
  648. // TODO: test Server.Validate with invalid tactics configurations
  649. }
  650. func TestTacticsFilterGeoIPScope(t *testing.T) {
  651. encodedRequestPublicKey, encodedRequestPrivateKey, encodedObfuscatedKey, err := GenerateKeys()
  652. if err != nil {
  653. t.Fatalf("GenerateKeys failed: %s", err)
  654. }
  655. tacticsConfigTemplate := fmt.Sprintf(`
  656. {
  657. "RequestPublicKey" : "%s",
  658. "RequestPrivateKey" : "%s",
  659. "RequestObfuscatedKey" : "%s",
  660. "DefaultTactics" : {
  661. "TTL" : "60s"
  662. },
  663. %%s
  664. }
  665. `, encodedRequestPublicKey, encodedRequestPrivateKey, encodedObfuscatedKey)
  666. // Test: region-only scope
  667. filteredTactics := `
  668. "FilteredTactics" : [
  669. {
  670. "Filter" : {
  671. "Regions": ["R1", "R2", "R3"]
  672. }
  673. },
  674. {
  675. "Filter" : {
  676. "Regions": ["R4", "R5", "R6"]
  677. }
  678. }
  679. ]
  680. `
  681. tacticsConfig := fmt.Sprintf(tacticsConfigTemplate, filteredTactics)
  682. file, err := ioutil.TempFile("", "tactics.config")
  683. if err != nil {
  684. t.Fatalf("TempFile create failed: %s", err)
  685. }
  686. _, err = file.Write([]byte(tacticsConfig))
  687. if err != nil {
  688. t.Fatalf("TempFile write failed: %s", err)
  689. }
  690. file.Close()
  691. configFileName := file.Name()
  692. defer os.Remove(configFileName)
  693. server, err := NewServer(
  694. nil,
  695. nil,
  696. nil,
  697. configFileName)
  698. if err != nil {
  699. t.Fatalf("NewServer failed: %s", err)
  700. }
  701. reload := func() {
  702. tacticsConfig = fmt.Sprintf(tacticsConfigTemplate, filteredTactics)
  703. err = ioutil.WriteFile(configFileName, []byte(tacticsConfig), 0600)
  704. if err != nil {
  705. t.Fatalf("WriteFile failed: %s", err)
  706. }
  707. reloaded, err := server.Reload()
  708. if err != nil {
  709. t.Fatalf("Reload failed: %s", err)
  710. }
  711. if !reloaded {
  712. t.Fatalf("Server config failed to reload")
  713. }
  714. }
  715. geoIPData := common.GeoIPData{
  716. Country: "R0",
  717. ISP: "I0",
  718. ASN: "0",
  719. City: "C0",
  720. }
  721. scope := server.GetFilterGeoIPScope(geoIPData)
  722. if scope != GeoIPScopeRegion {
  723. t.Fatalf("unexpected scope: %b", scope)
  724. }
  725. // Test: ISP-only scope
  726. filteredTactics = `
  727. "FilteredTactics" : [
  728. {
  729. "Filter" : {
  730. "ISPs": ["I1", "I2", "I3"]
  731. }
  732. },
  733. {
  734. "Filter" : {
  735. "ISPs": ["I4", "I5", "I6"]
  736. }
  737. }
  738. ]
  739. `
  740. reload()
  741. scope = server.GetFilterGeoIPScope(geoIPData)
  742. if scope != GeoIPScopeISP {
  743. t.Fatalf("unexpected scope: %b", scope)
  744. }
  745. // Test: ASN-only scope
  746. filteredTactics = `
  747. "FilteredTactics" : [
  748. {
  749. "Filter" : {
  750. "ASNs": ["1", "2", "3"]
  751. }
  752. },
  753. {
  754. "Filter" : {
  755. "ASNs": ["4", "5", "6"]
  756. }
  757. }
  758. ]
  759. `
  760. reload()
  761. scope = server.GetFilterGeoIPScope(geoIPData)
  762. if scope != GeoIPScopeASN {
  763. t.Fatalf("unexpected scope: %b", scope)
  764. }
  765. // Test: City-only scope
  766. filteredTactics = `
  767. "FilteredTactics" : [
  768. {
  769. "Filter" : {
  770. "Cities": ["C1", "C2", "C3"]
  771. }
  772. },
  773. {
  774. "Filter" : {
  775. "Cities": ["C4", "C5", "C6"]
  776. }
  777. }
  778. ]
  779. `
  780. reload()
  781. scope = server.GetFilterGeoIPScope(geoIPData)
  782. if scope != GeoIPScopeCity {
  783. t.Fatalf("unexpected scope: %b", scope)
  784. }
  785. // Test: full scope
  786. filteredTactics = `
  787. "FilteredTactics" : [
  788. {
  789. "Filter" : {
  790. "Regions": ["R1", "R2", "R3"]
  791. }
  792. },
  793. {
  794. "Filter" : {
  795. "ISPs": ["I1", "I2", "I3"]
  796. }
  797. },
  798. {
  799. "Filter" : {
  800. "ASNs": ["1", "2", "3"]
  801. }
  802. },
  803. {
  804. "Filter" : {
  805. "Cities": ["C4", "C5", "C6"]
  806. }
  807. }
  808. ]
  809. `
  810. reload()
  811. scope = server.GetFilterGeoIPScope(geoIPData)
  812. if scope != GeoIPScopeRegion|GeoIPScopeISP|GeoIPScopeASN|GeoIPScopeCity {
  813. t.Fatalf("unexpected scope: %b", scope)
  814. }
  815. // Test: conditional scopes
  816. filteredTactics = `
  817. "FilteredTactics" : [
  818. {
  819. "Filter" : {
  820. "Regions": ["R1"]
  821. }
  822. },
  823. {
  824. "Filter" : {
  825. "Regions": ["R2"],
  826. "ISPs": ["I2a"]
  827. }
  828. },
  829. {
  830. "Filter" : {
  831. "Regions": ["R2"],
  832. "ISPs": ["I2b"]
  833. }
  834. },
  835. {
  836. "Filter" : {
  837. "Regions": ["R3"],
  838. "ISPs": ["I3a"],
  839. "Cities": ["C3a"]
  840. }
  841. },
  842. {
  843. "Filter" : {
  844. "Regions": ["R3"],
  845. "ISPs": ["I3b"],
  846. "Cities": ["C3b"]
  847. }
  848. },
  849. {
  850. "Filter" : {
  851. "Regions": ["R4"],
  852. "ASNs": ["4"]
  853. }
  854. },
  855. {
  856. "Filter" : {
  857. "Regions": ["R4"],
  858. "ASNs": ["4"]
  859. }
  860. },
  861. {
  862. "Filter" : {
  863. "Regions": ["R5"],
  864. "ASNs": ["5"],
  865. "Cities": ["C3a"]
  866. }
  867. },
  868. {
  869. "Filter" : {
  870. "Regions": ["R5"],
  871. "ASNs": ["5"],
  872. "Cities": ["C3b"]
  873. }
  874. }
  875. ]
  876. `
  877. reload()
  878. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R0"})
  879. if scope != GeoIPScopeRegion {
  880. t.Fatalf("unexpected scope: %b", scope)
  881. }
  882. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R1"})
  883. if scope != GeoIPScopeRegion {
  884. t.Fatalf("unexpected scope: %b", scope)
  885. }
  886. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R2"})
  887. if scope != GeoIPScopeRegion|GeoIPScopeISP {
  888. t.Fatalf("unexpected scope: %b", scope)
  889. }
  890. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R3"})
  891. if scope != GeoIPScopeRegion|GeoIPScopeISP|GeoIPScopeCity {
  892. t.Fatalf("unexpected scope: %b", scope)
  893. }
  894. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R4"})
  895. if scope != GeoIPScopeRegion|GeoIPScopeASN {
  896. t.Fatalf("unexpected scope: %b", scope)
  897. }
  898. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R5"})
  899. if scope != GeoIPScopeRegion|GeoIPScopeASN|GeoIPScopeCity {
  900. t.Fatalf("unexpected scope: %b", scope)
  901. }
  902. // Test: reset regional map optimization
  903. filteredTactics = `
  904. "FilteredTactics" : [
  905. {
  906. "Filter" : {
  907. "Regions": ["R1"],
  908. "ISPs": ["I1"]
  909. }
  910. },
  911. {
  912. "Filter" : {
  913. "Cities": ["C1"]
  914. }
  915. }
  916. ]
  917. `
  918. reload()
  919. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R0"})
  920. if scope != GeoIPScopeRegion|GeoIPScopeISP|GeoIPScopeCity {
  921. t.Fatalf("unexpected scope: %b", scope)
  922. }
  923. filteredTactics = `
  924. "FilteredTactics" : [
  925. {
  926. "Filter" : {
  927. "Regions": ["R1"],
  928. "Cities": ["C1"]
  929. }
  930. },
  931. {
  932. "Filter" : {
  933. "ISPs": ["I1"]
  934. }
  935. }
  936. ]
  937. `
  938. reload()
  939. scope = server.GetFilterGeoIPScope(common.GeoIPData{Country: "R0"})
  940. if scope != GeoIPScopeRegion|GeoIPScopeISP|GeoIPScopeCity {
  941. t.Fatalf("unexpected scope: %b", scope)
  942. }
  943. }
  944. type testStorer struct {
  945. tacticsRecords map[string][]byte
  946. speedTestSampleRecords map[string][]byte
  947. }
  948. func newTestStorer() *testStorer {
  949. return &testStorer{
  950. tacticsRecords: make(map[string][]byte),
  951. speedTestSampleRecords: make(map[string][]byte),
  952. }
  953. }
  954. func (s *testStorer) SetTacticsRecord(networkID string, record []byte) error {
  955. s.tacticsRecords[networkID] = record
  956. return nil
  957. }
  958. func (s *testStorer) GetTacticsRecord(networkID string) ([]byte, error) {
  959. return s.tacticsRecords[networkID], nil
  960. }
  961. func (s *testStorer) SetSpeedTestSamplesRecord(networkID string, record []byte) error {
  962. s.speedTestSampleRecords[networkID] = record
  963. return nil
  964. }
  965. func (s *testStorer) GetSpeedTestSamplesRecord(networkID string) ([]byte, error) {
  966. return s.speedTestSampleRecords[networkID], nil
  967. }
  968. type testLogger struct {
  969. }
  970. func newTestLogger() *testLogger {
  971. return &testLogger{}
  972. }
  973. func (l *testLogger) WithTrace() common.LogTrace {
  974. return &testLoggerTrace{trace: stacktrace.GetParentFunctionName()}
  975. }
  976. func (l *testLogger) WithTraceFields(fields common.LogFields) common.LogTrace {
  977. return &testLoggerTrace{
  978. trace: stacktrace.GetParentFunctionName(),
  979. fields: fields,
  980. }
  981. }
  982. func (l *testLogger) LogMetric(metric string, fields common.LogFields) {
  983. fmt.Printf("METRIC: %s: fields=%+v\n", metric, fields)
  984. }
  985. func (l *testLogger) IsLogLevelDebug() bool {
  986. return true
  987. }
  988. type testLoggerTrace struct {
  989. trace string
  990. fields common.LogFields
  991. }
  992. func (l *testLoggerTrace) log(priority, message string) {
  993. fmt.Printf("%s: %s: %s fields=%+v\n", priority, l.trace, message, l.fields)
  994. }
  995. func (l *testLoggerTrace) Debug(args ...interface{}) {
  996. l.log("DEBUG", fmt.Sprint(args...))
  997. }
  998. func (l *testLoggerTrace) Info(args ...interface{}) {
  999. l.log("INFO", fmt.Sprint(args...))
  1000. }
  1001. func (l *testLoggerTrace) Warning(args ...interface{}) {
  1002. l.log("WARNING", fmt.Sprint(args...))
  1003. }
  1004. func (l *testLoggerTrace) Error(args ...interface{}) {
  1005. l.log("ERROR", fmt.Sprint(args...))
  1006. }