dialParameters_test.go 38 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/json"
  24. "fmt"
  25. "io/ioutil"
  26. "os"
  27. "reflect"
  28. "testing"
  29. "time"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  36. lrucache "github.com/cognusion/go-cache-lru"
  37. )
  38. func TestDialParametersAndReplay(t *testing.T) {
  39. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  40. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  41. runDialParametersAndReplay(t, tunnelProtocol)
  42. }
  43. }
  44. }
  45. var testNetworkID = prng.HexString(8)
  46. type testNetworkGetter struct {
  47. }
  48. func (t *testNetworkGetter) GetNetworkID() string {
  49. return testNetworkID
  50. }
  51. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  52. t.Logf("Test %s...", tunnelProtocol)
  53. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  54. if err != nil {
  55. t.Fatalf("TempDir failed: %s", err)
  56. }
  57. defer os.RemoveAll(testDataDirName)
  58. SetNoticeWriter(ioutil.Discard)
  59. clientConfig := &Config{
  60. PropagationChannelId: "0",
  61. SponsorId: "0",
  62. DataRootDirectory: testDataDirName,
  63. NetworkIDGetter: new(testNetworkGetter),
  64. }
  65. err = clientConfig.Commit(false)
  66. if err != nil {
  67. t.Fatalf("error committing configuration file: %s", err)
  68. }
  69. holdOffTunnelProtocolNames := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  70. providerID := prng.HexString(8)
  71. frontingProviderID := prng.HexString(8)
  72. var holdOffDirectTunnelProviderRegions parameters.KeyStrings
  73. if tunnelProtocol == protocol.TUNNEL_PROTOCOL_UNFRONTED_MEEK {
  74. holdOffDirectTunnelProviderRegions = map[string][]string{providerID: {""}}
  75. }
  76. var holdOffInproxyTunnelProviderRegions parameters.KeyStrings
  77. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  78. protocol.TunnelProtocolMinusInproxy(tunnelProtocol) == protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH {
  79. holdOffInproxyTunnelProviderRegions = map[string][]string{providerID: {""}}
  80. }
  81. applyParameters := make(map[string]interface{})
  82. applyParameters[parameters.TransformHostNameProbability] = 1.0
  83. applyParameters[parameters.PickUserAgentProbability] = 1.0
  84. applyParameters[parameters.HoldOffTunnelProtocolMinDuration] = "1ms"
  85. applyParameters[parameters.HoldOffTunnelProtocolMaxDuration] = "10ms"
  86. applyParameters[parameters.HoldOffTunnelProtocolNames] = holdOffTunnelProtocolNames
  87. applyParameters[parameters.HoldOffTunnelProtocolProbability] = 1.0
  88. applyParameters[parameters.HoldOffFrontingTunnelMinDuration] = "1ms"
  89. applyParameters[parameters.HoldOffFrontingTunnelMaxDuration] = "10ms"
  90. applyParameters[parameters.HoldOffFrontingTunnelProviderIDs] = []string{frontingProviderID}
  91. applyParameters[parameters.HoldOffFrontingTunnelProbability] = 1.0
  92. applyParameters[parameters.HoldOffDirectTunnelMinDuration] = "1ms"
  93. applyParameters[parameters.HoldOffDirectTunnelMaxDuration] = "10ms"
  94. applyParameters[parameters.HoldOffDirectTunnelProviderRegions] = holdOffDirectTunnelProviderRegions
  95. applyParameters[parameters.HoldOffInproxyTunnelProbability] = 1.0
  96. applyParameters[parameters.HoldOffInproxyTunnelMinDuration] = "1ms"
  97. applyParameters[parameters.HoldOffInproxyTunnelMaxDuration] = "10ms"
  98. applyParameters[parameters.HoldOffInproxyTunnelProviderRegions] = holdOffInproxyTunnelProviderRegions
  99. applyParameters[parameters.HoldOffDirectTunnelProbability] = 1.0
  100. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  101. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  102. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  103. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  104. applyParameters[parameters.OSSHObfuscatorSeedTransformProbability] = 1.0
  105. applyParameters[parameters.OSSHObfuscatorSeedTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  106. applyParameters[parameters.OSSHObfuscatorSeedTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  107. applyParameters[parameters.ObfuscatedQUICNonceTransformProbability] = 1.0
  108. applyParameters[parameters.ObfuscatedQUICNonceTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  109. applyParameters[parameters.ObfuscatedQUICNonceTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  110. applyParameters[parameters.ShadowsocksPrefixProbability] = 1.0
  111. applyParameters[parameters.ShadowsocksPrefixSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  112. applyParameters[parameters.ShadowsocksPrefixScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  113. err = clientConfig.SetParameters("tag1", false, applyParameters)
  114. if err != nil {
  115. t.Fatalf("SetParameters failed: %s", err)
  116. }
  117. resolver := NewResolver(clientConfig, true)
  118. defer resolver.Stop()
  119. clientConfig.SetResolver(resolver)
  120. err = OpenDataStore(clientConfig)
  121. if err != nil {
  122. t.Fatalf("error initializing client datastore: %s", err)
  123. }
  124. defer CloseDataStore()
  125. serverEntries := makeMockServerEntries(tunnelProtocol, "CA", providerID, frontingProviderID, 100)
  126. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  127. return replayProtocol == tunnelProtocol
  128. }
  129. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  130. return tunnelProtocol, true
  131. }
  132. values.SetSSHClientVersionsSpec(
  133. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  134. values.SetUserAgentsSpec(
  135. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  136. // Test: expected dial parameter fields set
  137. steeringIPCache := lrucache.NewWithLRU(1*time.Hour, 1*time.Hour, 0)
  138. upstreamProxyErrorCallback := func(_ error) {}
  139. dialParams, err := MakeDialParameters(
  140. clientConfig, steeringIPCache, nil, nil, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  141. if err != nil {
  142. t.Fatalf("MakeDialParameters failed: %s", err)
  143. }
  144. if dialParams.ServerEntry != serverEntries[0] {
  145. t.Fatalf("unexpected server entry")
  146. }
  147. if dialParams.NetworkID != testNetworkID {
  148. t.Fatalf("unexpected network ID")
  149. }
  150. if dialParams.IsReplay {
  151. t.Fatalf("unexpected replay")
  152. }
  153. if dialParams.TunnelProtocol != tunnelProtocol {
  154. t.Fatalf("unexpected tunnel protocol")
  155. }
  156. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  157. dialParams.DirectDialAddress == "" {
  158. t.Fatalf("missing direct dial fields")
  159. }
  160. if dialParams.DialPortNumber == "" {
  161. t.Fatalf("missing port number fields")
  162. }
  163. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  164. t.Fatalf("missing SSH fields")
  165. }
  166. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  167. dialParams.ObfuscatorPaddingSeed == nil {
  168. t.Fatalf("missing obfuscator fields")
  169. }
  170. if dialParams.FragmentorSeed == nil {
  171. t.Fatalf("missing fragmentor field")
  172. }
  173. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  174. (dialParams.MeekDialAddress == "" ||
  175. dialParams.MeekHostHeader == "" ||
  176. dialParams.MeekObfuscatorPaddingSeed == nil) {
  177. t.Fatalf("missing meek fields")
  178. }
  179. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  180. (dialParams.MeekFrontingDialAddress == "" ||
  181. dialParams.MeekFrontingHost == "" ||
  182. dialParams.ResolveParameters == nil) {
  183. t.Fatalf("missing meek fronting fields")
  184. }
  185. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  186. dialParams.UserAgent == "" {
  187. t.Fatalf("missing meek HTTP fields")
  188. }
  189. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  190. (dialParams.MeekSNIServerName == "" ||
  191. !dialParams.SelectedTLSProfile ||
  192. dialParams.TLSProfile == "") {
  193. t.Fatalf("missing meek HTTPS fields")
  194. }
  195. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  196. if dialParams.QUICVersion == "" {
  197. t.Fatalf("missing QUIC version field")
  198. }
  199. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  200. if dialParams.MeekFrontingDialAddress == "" ||
  201. dialParams.MeekFrontingHost == "" ||
  202. dialParams.MeekSNIServerName == "" {
  203. t.Fatalf("missing fronted QUIC fields")
  204. }
  205. } else {
  206. if dialParams.QUICDialSNIAddress == "" {
  207. t.Fatalf("missing QUIC SNI field")
  208. }
  209. }
  210. }
  211. if dialParams.LivenessTestSeed == nil {
  212. t.Fatalf("missing liveness test fields")
  213. }
  214. if dialParams.APIRequestPaddingSeed == nil {
  215. t.Fatalf("missing API request fields")
  216. }
  217. expectHoldOffTunnelProtocolNames := common.Contains(holdOffTunnelProtocolNames, tunnelProtocol)
  218. expectHoldOffFrontingTunnelProviderIDs := protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol)
  219. expectHoldOffDirectTunnelProviderRegion := protocol.TunnelProtocolIsDirect(tunnelProtocol) &&
  220. common.ContainsAny(
  221. holdOffDirectTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  222. []string{"", dialParams.ServerEntry.Region})
  223. expectHoldOffInproxyTunnelProviderRegion := protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  224. common.ContainsAny(
  225. holdOffInproxyTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  226. []string{"", dialParams.ServerEntry.Region})
  227. if expectHoldOffTunnelProtocolNames ||
  228. expectHoldOffFrontingTunnelProviderIDs ||
  229. expectHoldOffDirectTunnelProviderRegion ||
  230. expectHoldOffInproxyTunnelProviderRegion {
  231. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  232. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  233. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  234. }
  235. } else {
  236. if dialParams.HoldOffTunnelDuration != 0 {
  237. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  238. }
  239. }
  240. dialConfig := dialParams.GetDialConfig()
  241. if dialConfig.UpstreamProxyErrorCallback == nil {
  242. t.Fatalf("missing upstreamProxyErrorCallback")
  243. }
  244. // Test: no replay after dial reported to fail
  245. dialParams.Failed(clientConfig)
  246. dialParams, err = MakeDialParameters(
  247. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  248. if err != nil {
  249. t.Fatalf("MakeDialParameters failed: %s", err)
  250. }
  251. if dialParams.IsReplay {
  252. t.Fatalf("unexpected replay")
  253. }
  254. // Test: no replay after network ID changes
  255. dialParams.Succeeded()
  256. testNetworkID = prng.HexString(8)
  257. clientConfig.networkIDGetter.FlushCache()
  258. dialParams, err = MakeDialParameters(
  259. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  260. if err != nil {
  261. t.Fatalf("MakeDialParameters failed: %s", err)
  262. }
  263. if dialParams.NetworkID != testNetworkID {
  264. t.Fatalf("unexpected network ID")
  265. }
  266. if dialParams.IsReplay {
  267. t.Fatalf("unexpected replay")
  268. }
  269. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  270. dialParams.Succeeded()
  271. replayDialParams, err := MakeDialParameters(
  272. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  273. if err != nil {
  274. t.Fatalf("MakeDialParameters failed: %s", err)
  275. }
  276. if !replayDialParams.IsReplay {
  277. t.Fatalf("unexpected non-replay")
  278. }
  279. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  280. t.Fatalf("unexpected non-updated timestamp")
  281. }
  282. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  283. t.Fatalf("mismatching tunnel protocol")
  284. }
  285. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  286. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  287. t.Fatalf("mismatching dial fields")
  288. }
  289. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  290. if seed1 == nil {
  291. return seed2 == nil
  292. }
  293. return bytes.Equal(seed1[:], seed2[:])
  294. }
  295. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  296. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  297. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  298. t.Fatalf("mismatching SSH fields")
  299. }
  300. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  301. t.Fatalf("mismatching obfuscator fields")
  302. }
  303. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  304. t.Fatalf("mismatching fragmentor fields")
  305. }
  306. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  307. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  308. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  309. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  310. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  311. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  312. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  313. t.Fatalf("mismatching meek fields")
  314. }
  315. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  316. replayDialParams.UserAgent != dialParams.UserAgent {
  317. t.Fatalf("mismatching user agent fields")
  318. }
  319. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  320. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  321. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  322. t.Fatalf("mismatching TLS fields")
  323. }
  324. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  325. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  326. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  327. t.Fatalf("mismatching QUIC fields")
  328. }
  329. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  330. t.Fatalf("mismatching liveness test fields")
  331. }
  332. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  333. t.Fatalf("mismatching API request fields")
  334. }
  335. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  336. (replayDialParams.ResolveParameters != nil &&
  337. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  338. t.Fatalf("mismatching ResolveParameters fields")
  339. }
  340. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  341. (replayDialParams.HTTPTransformerParameters != nil &&
  342. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  343. t.Fatalf("mismatching HTTPTransformerParameters fields")
  344. }
  345. if (replayDialParams.OSSHObfuscatorSeedTransformerParameters == nil) != (dialParams.OSSHObfuscatorSeedTransformerParameters == nil) ||
  346. (replayDialParams.OSSHObfuscatorSeedTransformerParameters != nil &&
  347. !reflect.DeepEqual(replayDialParams.OSSHObfuscatorSeedTransformerParameters, dialParams.OSSHObfuscatorSeedTransformerParameters)) {
  348. t.Fatalf("mismatching ObfuscatorSeedTransformerParameters fields")
  349. }
  350. if (replayDialParams.ObfuscatedQUICNonceTransformerParameters == nil) != (dialParams.ObfuscatedQUICNonceTransformerParameters == nil) ||
  351. (replayDialParams.ObfuscatedQUICNonceTransformerParameters != nil &&
  352. !reflect.DeepEqual(replayDialParams.ObfuscatedQUICNonceTransformerParameters, dialParams.ObfuscatedQUICNonceTransformerParameters)) {
  353. t.Fatalf("mismatching ObfuscatedQUICNonceTransformerParameters fields")
  354. }
  355. if (replayDialParams.ShadowsocksPrefixSpec == nil) != (dialParams.ShadowsocksPrefixSpec == nil) ||
  356. (replayDialParams.ShadowsocksPrefixSpec != nil &&
  357. !reflect.DeepEqual(replayDialParams.ShadowsocksPrefixSpec, dialParams.ShadowsocksPrefixSpec)) {
  358. t.Fatalf("mismatching ShadowsocksPrefixSpec fields")
  359. }
  360. // Test: replay after change tactics, with ReplayIgnoreChangedClientState = true
  361. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  362. applyParameters[parameters.ReplayIgnoreChangedConfigState] = true
  363. err = clientConfig.SetParameters("tag2a", false, applyParameters)
  364. if err != nil {
  365. t.Fatalf("SetParameters failed: %s", err)
  366. }
  367. dialParams, err = MakeDialParameters(
  368. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  369. if err != nil {
  370. t.Fatalf("MakeDialParameters failed: %s", err)
  371. }
  372. if !replayDialParams.IsReplay {
  373. t.Fatalf("unexpected non-replay")
  374. }
  375. // Test: no replay after change tactics
  376. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  377. applyParameters[parameters.ReplayIgnoreChangedConfigState] = false
  378. err = clientConfig.SetParameters("tag2", false, applyParameters)
  379. if err != nil {
  380. t.Fatalf("SetParameters failed: %s", err)
  381. }
  382. dialParams, err = MakeDialParameters(
  383. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  384. if err != nil {
  385. t.Fatalf("MakeDialParameters failed: %s", err)
  386. }
  387. if dialParams.IsReplay {
  388. t.Fatalf("unexpected replay")
  389. }
  390. // Test: no replay after dial parameters expired
  391. dialParams.Succeeded()
  392. time.Sleep(1 * time.Second)
  393. dialParams, err = MakeDialParameters(
  394. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  395. if err != nil {
  396. t.Fatalf("MakeDialParameters failed: %s", err)
  397. }
  398. if dialParams.IsReplay {
  399. t.Fatalf("unexpected replay")
  400. }
  401. // Test: no replay after server entry changes
  402. dialParams.Succeeded()
  403. serverEntries[0].ConfigurationVersion += 1
  404. dialParams, err = MakeDialParameters(
  405. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  406. if err != nil {
  407. t.Fatalf("MakeDialParameters failed: %s", err)
  408. }
  409. if dialParams.IsReplay {
  410. t.Fatalf("unexpected replay")
  411. }
  412. // Test: disable replay elements (partial coverage)
  413. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  414. applyParameters[parameters.ReplaySSH] = false
  415. applyParameters[parameters.ReplayObfuscatorPadding] = false
  416. applyParameters[parameters.ReplayFragmentor] = false
  417. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  418. applyParameters[parameters.ReplayLivenessTest] = false
  419. applyParameters[parameters.ReplayAPIRequestPadding] = false
  420. err = clientConfig.SetParameters("tag3", false, applyParameters)
  421. if err != nil {
  422. t.Fatalf("SetParameters failed: %s", err)
  423. }
  424. dialParams, err = MakeDialParameters(
  425. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  426. if err != nil {
  427. t.Fatalf("MakeDialParameters failed: %s", err)
  428. }
  429. dialParams.Succeeded()
  430. replayDialParams, err = MakeDialParameters(
  431. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  432. if err != nil {
  433. t.Fatalf("MakeDialParameters failed: %s", err)
  434. }
  435. if !replayDialParams.IsReplay {
  436. t.Fatalf("unexpected non-replay")
  437. }
  438. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  439. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  440. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  441. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  442. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  443. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  444. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  445. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  446. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  447. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  448. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  449. t.Fatalf("unexpected replayed fields")
  450. }
  451. // Test: client-side restrict fronting provider ID
  452. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  453. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  454. err = clientConfig.SetParameters("tag4", false, applyParameters)
  455. if err != nil {
  456. t.Fatalf("SetParameters failed: %s", err)
  457. }
  458. dialParams, err = MakeDialParameters(
  459. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  460. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  461. if err == nil {
  462. if dialParams != nil {
  463. t.Fatalf("unexpected MakeDialParameters success")
  464. }
  465. }
  466. } else {
  467. if err != nil {
  468. t.Fatalf("MakeDialParameters failed: %s", err)
  469. }
  470. }
  471. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  472. err = clientConfig.SetParameters("tag5", false, applyParameters)
  473. if err != nil {
  474. t.Fatalf("SetParameters failed: %s", err)
  475. }
  476. // Test: client-side restrict provider ID by region for direct protocols
  477. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{providerID: {"CA"}}
  478. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 1.0
  479. err = clientConfig.SetParameters("tag6", false, applyParameters)
  480. if err != nil {
  481. t.Fatalf("SetParameters failed: %s", err)
  482. }
  483. dialParams, err = MakeDialParameters(
  484. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  485. if protocol.TunnelProtocolIsDirect(tunnelProtocol) {
  486. if err == nil {
  487. if dialParams != nil {
  488. t.Fatalf("unexpected MakeDialParameters success")
  489. }
  490. }
  491. } else {
  492. if err != nil {
  493. t.Fatalf("MakeDialParameters failed: %s", err)
  494. }
  495. }
  496. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{}
  497. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 0.0
  498. err = clientConfig.SetParameters("tag7", false, applyParameters)
  499. if err != nil {
  500. t.Fatalf("SetParameters failed: %s", err)
  501. }
  502. // Test: client-side restrict provider ID by region for inproxy protocols
  503. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{providerID: {"CA"}}
  504. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 1.0
  505. err = clientConfig.SetParameters("tag8", false, applyParameters)
  506. if err != nil {
  507. t.Fatalf("SetParameters failed: %s", err)
  508. }
  509. dialParams, err = MakeDialParameters(
  510. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  511. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) {
  512. if err == nil {
  513. if dialParams != nil {
  514. t.Fatalf("unexpected MakeDialParameters success")
  515. }
  516. }
  517. } else {
  518. if err != nil {
  519. t.Fatalf("MakeDialParameters failed: %s", err)
  520. }
  521. }
  522. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{}
  523. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 0.0
  524. err = clientConfig.SetParameters("tag9", false, applyParameters)
  525. if err != nil {
  526. t.Fatalf("SetParameters failed: %s", err)
  527. }
  528. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  529. steeringIPCache.Flush()
  530. // Test: steering IP used in non-replay case
  531. dialParams, err = MakeDialParameters(
  532. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  533. if err != nil {
  534. t.Fatalf("MakeDialParameters failed: %s", err)
  535. }
  536. dialParams.Failed(clientConfig)
  537. getCacheKey := func() string {
  538. return fmt.Sprintf("%s %s %s", testNetworkID, frontingProviderID, tunnelProtocol)
  539. }
  540. setCacheEntry := func(steeringIP string) {
  541. steeringIPCache.Set(getCacheKey(), steeringIP, lrucache.DefaultExpiration)
  542. }
  543. setCacheEntry("127.0.0.1")
  544. dialParams, err = MakeDialParameters(
  545. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  546. if err != nil {
  547. t.Fatalf("MakeDialParameters failed: %s", err)
  548. }
  549. if dialParams.IsReplay {
  550. t.Fatalf("unexpected replay")
  551. }
  552. checkSteeringIP := func(expectedSteeringIP string) {
  553. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Microsecond)
  554. defer cancelFunc()
  555. IPs, err := dialParams.dialConfig.ResolveIP(ctx, "example.com")
  556. if err != nil {
  557. t.Fatalf("ResolveIP failed: %s", err)
  558. }
  559. if IPs[0].String() != expectedSteeringIP {
  560. t.Fatalf("missing expected steering IP")
  561. }
  562. }
  563. checkSteeringIP("127.0.0.1")
  564. // Test: steering IP used in replay case
  565. dialParams.Succeeded()
  566. dialParams, err = MakeDialParameters(
  567. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  568. if err != nil {
  569. t.Fatalf("MakeDialParameters failed: %s", err)
  570. }
  571. if !dialParams.IsReplay {
  572. t.Fatalf("unexpected non-replay")
  573. }
  574. checkSteeringIP("127.0.0.1")
  575. // Test: different steering IP clears replay flag
  576. dialParams.Succeeded()
  577. setCacheEntry("127.0.0.2")
  578. dialParams, err = MakeDialParameters(
  579. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  580. if err != nil {
  581. t.Fatalf("MakeDialParameters failed: %s", err)
  582. }
  583. if dialParams.IsReplay {
  584. t.Fatalf("unexpected replay")
  585. }
  586. checkSteeringIP("127.0.0.2")
  587. // Test: newly present steering IP clears replay flag
  588. steeringIPCache.Flush()
  589. dialParams, err = MakeDialParameters(
  590. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  591. if err != nil {
  592. t.Fatalf("MakeDialParameters failed: %s", err)
  593. }
  594. dialParams.Succeeded()
  595. setCacheEntry("127.0.0.3")
  596. dialParams, err = MakeDialParameters(
  597. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  598. if err != nil {
  599. t.Fatalf("MakeDialParameters failed: %s", err)
  600. }
  601. if dialParams.IsReplay {
  602. t.Fatalf("unexpected replay")
  603. }
  604. // Test: steering IP cleared from cache after failure
  605. dialParams.Failed(clientConfig)
  606. _, ok := steeringIPCache.Get(getCacheKey())
  607. if ok {
  608. t.Fatalf("unexpected steering IP cache entry")
  609. }
  610. }
  611. // Test: iterator shuffles
  612. for i, serverEntry := range serverEntries {
  613. data, err := json.Marshal(serverEntry)
  614. if err != nil {
  615. t.Fatalf("json.Marshal failed: %s", err)
  616. }
  617. var serverEntryFields protocol.ServerEntryFields
  618. err = json.Unmarshal(data, &serverEntryFields)
  619. if err != nil {
  620. t.Fatalf("json.Unmarshal failed: %s", err)
  621. }
  622. err = StoreServerEntry(serverEntryFields, false)
  623. if err != nil {
  624. t.Fatalf("StoreServerEntry failed: %s", err)
  625. }
  626. if i%10 == 0 {
  627. dialParams, err := MakeDialParameters(
  628. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  629. if err != nil {
  630. t.Fatalf("MakeDialParameters failed: %s", err)
  631. }
  632. dialParams.Succeeded()
  633. }
  634. }
  635. for i := 0; i < 5; i++ {
  636. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  637. if err != nil {
  638. t.Fatalf("NewServerEntryIterator failed: %s", err)
  639. }
  640. if hasAffinity {
  641. t.Fatalf("unexpected affinity server")
  642. }
  643. // Test: the first shuffle should move the replay candidates to the front
  644. for j := 0; j < 10; j++ {
  645. serverEntry, err := iterator.Next()
  646. if err != nil {
  647. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  648. }
  649. dialParams, err := MakeDialParameters(
  650. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  651. if err != nil {
  652. t.Fatalf("MakeDialParameters failed: %s", err)
  653. }
  654. if !dialParams.IsReplay {
  655. t.Fatalf("unexpected non-replay")
  656. }
  657. }
  658. iterator.Reset()
  659. // Test: subsequent shuffles should not move the replay candidates
  660. allReplay := true
  661. for j := 0; j < 10; j++ {
  662. serverEntry, err := iterator.Next()
  663. if err != nil {
  664. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  665. }
  666. dialParams, err := MakeDialParameters(
  667. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  668. if err != nil {
  669. t.Fatalf("MakeDialParameters failed: %s", err)
  670. }
  671. if !dialParams.IsReplay {
  672. allReplay = false
  673. }
  674. }
  675. if allReplay {
  676. t.Fatalf("unexpected all replay")
  677. }
  678. iterator.Close()
  679. }
  680. }
  681. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  682. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  683. if err != nil {
  684. t.Fatalf("TempDir failed: %s", err)
  685. }
  686. defer os.RemoveAll(testDataDirName)
  687. SetNoticeWriter(ioutil.Discard)
  688. clientConfig := &Config{
  689. PropagationChannelId: "0",
  690. SponsorId: "0",
  691. DataRootDirectory: testDataDirName,
  692. NetworkIDGetter: new(testNetworkGetter),
  693. }
  694. err = clientConfig.Commit(false)
  695. if err != nil {
  696. t.Fatalf("error committing configuration file: %s", err)
  697. }
  698. jsonLimitDialPortNumbers := `
  699. {
  700. "SSH" : [[10,11]],
  701. "OSSH" : [[20,21]],
  702. "QUIC-OSSH" : [[30,31]],
  703. "TAPDANCE-OSSH" : [[40,41]],
  704. "CONJURE-OSSH" : [[50,51]],
  705. "SHADOWSOCKS-OSSH" : [[60,61]],
  706. "All" : [[70,71],80,443]
  707. }
  708. `
  709. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  710. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  711. if err != nil {
  712. t.Fatalf("Unmarshal failed: %s", err)
  713. }
  714. applyParameters := make(map[string]interface{})
  715. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  716. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  717. err = clientConfig.SetParameters("tag1", false, applyParameters)
  718. if err != nil {
  719. t.Fatalf("SetParameters failed: %s", err)
  720. }
  721. constraints := &protocolSelectionConstraints{
  722. config: clientConfig,
  723. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  724. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  725. }
  726. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  727. protocol, _, ok := constraints.selectProtocol(0, false, false, serverEntry)
  728. return protocol, ok
  729. }
  730. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  731. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  732. continue
  733. }
  734. serverEntries := makeMockServerEntries(tunnelProtocol, "", "", "", 100)
  735. selected := false
  736. skipped := false
  737. for _, serverEntry := range serverEntries {
  738. selectedProtocol, ok := selectProtocol(serverEntry)
  739. if ok {
  740. if selectedProtocol != tunnelProtocol {
  741. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  742. }
  743. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  744. if err != nil {
  745. t.Fatalf("GetDialPortNumber failed: %s", err)
  746. }
  747. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  748. t.Fatalf("unexpected dial port number: %d", port)
  749. }
  750. selected = true
  751. } else {
  752. skipped = true
  753. }
  754. }
  755. if !selected {
  756. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  757. }
  758. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  759. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  760. }
  761. }
  762. }
  763. func makeMockServerEntries(
  764. tunnelProtocol string,
  765. region string,
  766. providerID string,
  767. frontingProviderID string,
  768. count int) []*protocol.ServerEntry {
  769. serverEntries := make([]*protocol.ServerEntry, count)
  770. for i := 0; i < count; i++ {
  771. serverEntries[i] = &protocol.ServerEntry{
  772. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  773. SshPort: prng.Range(10, 19),
  774. SshObfuscatedPort: prng.Range(20, 29),
  775. SshObfuscatedQUICPort: prng.Range(30, 39),
  776. SshObfuscatedTapDancePort: prng.Range(40, 49),
  777. SshObfuscatedConjurePort: prng.Range(50, 59),
  778. SshShadowsocksPort: prng.Range(60, 69),
  779. MeekServerPort: prng.Range(70, 79),
  780. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  781. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  782. Region: region,
  783. ProviderID: providerID,
  784. FrontingProviderID: frontingProviderID,
  785. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  786. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  787. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  788. }
  789. }
  790. return serverEntries
  791. }
  792. func TestMakeHTTPTransformerParameters(t *testing.T) {
  793. type test struct {
  794. name string
  795. frontingProviderID string
  796. isFronted bool
  797. paramValues map[string]interface{}
  798. expectedTransformName string
  799. expectedTransformSpec transforms.Spec
  800. }
  801. tests := []test{
  802. {
  803. name: "unfronted",
  804. frontingProviderID: "",
  805. isFronted: false,
  806. paramValues: map[string]interface{}{
  807. "DirectHTTPProtocolTransformProbability": 1,
  808. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  809. "spec1": {{"A", "B"}},
  810. },
  811. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  812. "": {"spec1"},
  813. },
  814. },
  815. expectedTransformName: "spec1",
  816. expectedTransformSpec: [][2]string{{"A", "B"}},
  817. },
  818. {
  819. name: "fronted",
  820. frontingProviderID: "frontingProvider",
  821. isFronted: true,
  822. paramValues: map[string]interface{}{
  823. "FrontedHTTPProtocolTransformProbability": 1,
  824. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  825. "spec1": {{"A", "B"}},
  826. },
  827. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  828. "frontingProvider": {"spec1"},
  829. },
  830. },
  831. expectedTransformName: "spec1",
  832. expectedTransformSpec: [][2]string{{"A", "B"}},
  833. },
  834. {
  835. name: "no transform, coinflip false",
  836. frontingProviderID: "frontingProvider",
  837. isFronted: false,
  838. paramValues: map[string]interface{}{
  839. "DirectHTTPProtocolTransformProbability": 0,
  840. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  841. "spec1": {{"A", "B"}},
  842. },
  843. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  844. "frontingProvider": {"spec1"},
  845. },
  846. },
  847. expectedTransformName: "",
  848. expectedTransformSpec: nil,
  849. },
  850. }
  851. for _, tt := range tests {
  852. t.Run(tt.name, func(t *testing.T) {
  853. params, err := parameters.NewParameters(nil)
  854. if err != nil {
  855. t.Fatalf("parameters.NewParameters failed %v", err)
  856. }
  857. _, err = params.Set("", 0, tt.paramValues)
  858. if err != nil {
  859. t.Fatalf("params.Set failed %v", err)
  860. }
  861. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  862. if err != nil {
  863. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  864. }
  865. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  866. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  867. }
  868. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  869. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  870. }
  871. if httpTransformerParams.ProtocolTransformSpec != nil {
  872. if httpTransformerParams.ProtocolTransformSeed == nil {
  873. t.Fatalf("expected non-nil seed")
  874. }
  875. }
  876. })
  877. }
  878. }
  879. func TestMakeOSSHObfuscatorSeedTranformerParameters(t *testing.T) {
  880. type test struct {
  881. name string
  882. paramValues map[string]interface{}
  883. expectedTransformName string
  884. expectedTransformSpec transforms.Spec
  885. }
  886. tests := []test{
  887. {
  888. name: "transform",
  889. paramValues: map[string]interface{}{
  890. "OSSHObfuscatorSeedTransformProbability": 1,
  891. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  892. "spec1": {{"A", "B"}},
  893. },
  894. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  895. "": {"spec1"},
  896. },
  897. },
  898. expectedTransformName: "spec1",
  899. expectedTransformSpec: [][2]string{{"A", "B"}},
  900. },
  901. {
  902. name: "no transform, coinflip false",
  903. paramValues: map[string]interface{}{
  904. "OSSHObfuscatorSeedTransformProbability": 0,
  905. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  906. "spec1": {{"A", "B"}},
  907. },
  908. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  909. "": {"spec1"},
  910. },
  911. },
  912. expectedTransformName: "",
  913. expectedTransformSpec: nil,
  914. },
  915. }
  916. for _, tt := range tests {
  917. t.Run(tt.name, func(t *testing.T) {
  918. params, err := parameters.NewParameters(nil)
  919. if err != nil {
  920. t.Fatalf("parameters.NewParameters failed: %v", err)
  921. }
  922. _, err = params.Set("", 0, tt.paramValues)
  923. if err != nil {
  924. t.Fatalf("params.Set failed: %v", err)
  925. }
  926. transformerParams, err := makeSeedTransformerParameters(
  927. params.Get(),
  928. parameters.OSSHObfuscatorSeedTransformProbability,
  929. parameters.OSSHObfuscatorSeedTransformSpecs,
  930. parameters.OSSHObfuscatorSeedTransformScopedSpecNames)
  931. if err != nil {
  932. t.Fatalf("makeSeedTransformerParameters failed: %v", err)
  933. }
  934. if transformerParams.TransformName != tt.expectedTransformName {
  935. t.Fatalf("expected TransformName \"%s\" but got \"%s\"", tt.expectedTransformName, transformerParams.TransformName)
  936. }
  937. if !reflect.DeepEqual(transformerParams.TransformSpec, tt.expectedTransformSpec) {
  938. t.Fatalf("expected TransformSpec %v but got %v", tt.expectedTransformSpec, transformerParams.TransformSpec)
  939. }
  940. if transformerParams.TransformSpec != nil {
  941. if transformerParams.TransformSeed == nil {
  942. t.Fatalf("expected non-nil seed")
  943. }
  944. }
  945. })
  946. }
  947. }