dialParameters_test.go 38 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/json"
  24. "fmt"
  25. "io"
  26. "io/ioutil"
  27. "os"
  28. "reflect"
  29. "testing"
  30. "time"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  36. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  37. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  38. lrucache "github.com/cognusion/go-cache-lru"
  39. )
  40. func TestDialParametersAndReplay(t *testing.T) {
  41. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  42. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  43. runDialParametersAndReplay(t, tunnelProtocol)
  44. }
  45. }
  46. }
  47. var testNetworkID = prng.HexString(8)
  48. type testNetworkGetter struct {
  49. }
  50. func (t *testNetworkGetter) GetNetworkID() string {
  51. return testNetworkID
  52. }
  53. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  54. t.Logf("Test %s...", tunnelProtocol)
  55. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  56. if err != nil {
  57. t.Fatalf("TempDir failed: %s", err)
  58. }
  59. defer os.RemoveAll(testDataDirName)
  60. err = SetNoticeWriter(io.Discard)
  61. if err != nil {
  62. t.Fatalf("error setting notice writer: %s", err)
  63. }
  64. defer ResetNoticeWriter()
  65. clientConfig := &Config{
  66. PropagationChannelId: "0",
  67. SponsorId: "0",
  68. DataRootDirectory: testDataDirName,
  69. NetworkIDGetter: new(testNetworkGetter),
  70. }
  71. err = clientConfig.Commit(false)
  72. if err != nil {
  73. t.Fatalf("error committing configuration file: %s", err)
  74. }
  75. holdOffTunnelProtocolNames := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  76. providerID := prng.HexString(8)
  77. frontingProviderID := prng.HexString(8)
  78. var holdOffDirectTunnelProviderRegions parameters.KeyStrings
  79. if tunnelProtocol == protocol.TUNNEL_PROTOCOL_UNFRONTED_MEEK {
  80. holdOffDirectTunnelProviderRegions = map[string][]string{providerID: {""}}
  81. }
  82. var holdOffInproxyTunnelProviderRegions parameters.KeyStrings
  83. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  84. protocol.TunnelProtocolMinusInproxy(tunnelProtocol) == protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH {
  85. holdOffInproxyTunnelProviderRegions = map[string][]string{providerID: {""}}
  86. }
  87. applyParameters := make(map[string]interface{})
  88. applyParameters[parameters.TransformHostNameProbability] = 1.0
  89. applyParameters[parameters.PickUserAgentProbability] = 1.0
  90. applyParameters[parameters.HoldOffTunnelProtocolMinDuration] = "1ms"
  91. applyParameters[parameters.HoldOffTunnelProtocolMaxDuration] = "10ms"
  92. applyParameters[parameters.HoldOffTunnelProtocolNames] = holdOffTunnelProtocolNames
  93. applyParameters[parameters.HoldOffTunnelProtocolProbability] = 1.0
  94. applyParameters[parameters.HoldOffFrontingTunnelMinDuration] = "1ms"
  95. applyParameters[parameters.HoldOffFrontingTunnelMaxDuration] = "10ms"
  96. applyParameters[parameters.HoldOffFrontingTunnelProviderIDs] = []string{frontingProviderID}
  97. applyParameters[parameters.HoldOffFrontingTunnelProbability] = 1.0
  98. applyParameters[parameters.HoldOffDirectTunnelMinDuration] = "1ms"
  99. applyParameters[parameters.HoldOffDirectTunnelMaxDuration] = "10ms"
  100. applyParameters[parameters.HoldOffDirectTunnelProviderRegions] = holdOffDirectTunnelProviderRegions
  101. applyParameters[parameters.HoldOffInproxyTunnelProbability] = 1.0
  102. applyParameters[parameters.HoldOffInproxyTunnelMinDuration] = "1ms"
  103. applyParameters[parameters.HoldOffInproxyTunnelMaxDuration] = "10ms"
  104. applyParameters[parameters.HoldOffInproxyTunnelProviderRegions] = holdOffInproxyTunnelProviderRegions
  105. applyParameters[parameters.HoldOffDirectTunnelProbability] = 1.0
  106. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  107. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  108. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  109. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  110. applyParameters[parameters.OSSHObfuscatorSeedTransformProbability] = 1.0
  111. applyParameters[parameters.OSSHObfuscatorSeedTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  112. applyParameters[parameters.OSSHObfuscatorSeedTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  113. applyParameters[parameters.ObfuscatedQUICNonceTransformProbability] = 1.0
  114. applyParameters[parameters.ObfuscatedQUICNonceTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  115. applyParameters[parameters.ObfuscatedQUICNonceTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  116. applyParameters[parameters.ShadowsocksPrefixProbability] = 1.0
  117. applyParameters[parameters.ShadowsocksPrefixSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  118. applyParameters[parameters.ShadowsocksPrefixScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  119. err = clientConfig.SetParameters("tag1", false, applyParameters)
  120. if err != nil {
  121. t.Fatalf("SetParameters failed: %s", err)
  122. }
  123. resolver := NewResolver(clientConfig, true)
  124. defer resolver.Stop()
  125. clientConfig.SetResolver(resolver)
  126. err = OpenDataStore(clientConfig)
  127. if err != nil {
  128. t.Fatalf("error initializing client datastore: %s", err)
  129. }
  130. defer CloseDataStore()
  131. serverEntries := makeMockServerEntries(tunnelProtocol, "CA", providerID, frontingProviderID, 100)
  132. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  133. return replayProtocol == tunnelProtocol
  134. }
  135. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  136. return tunnelProtocol, true
  137. }
  138. values.SetSSHClientVersionsSpec(
  139. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  140. values.SetUserAgentsSpec(
  141. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  142. // Test: expected dial parameter fields set
  143. steeringIPCache := lrucache.NewWithLRU(1*time.Hour, 1*time.Hour, 0)
  144. upstreamProxyErrorCallback := func(_ error) {}
  145. dialParams, err := MakeDialParameters(
  146. clientConfig, steeringIPCache, nil, nil, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  147. if err != nil {
  148. t.Fatalf("MakeDialParameters failed: %s", err)
  149. }
  150. if dialParams.ServerEntry != serverEntries[0] {
  151. t.Fatalf("unexpected server entry")
  152. }
  153. if dialParams.NetworkID != testNetworkID {
  154. t.Fatalf("unexpected network ID")
  155. }
  156. if dialParams.IsReplay {
  157. t.Fatalf("unexpected replay")
  158. }
  159. if dialParams.TunnelProtocol != tunnelProtocol {
  160. t.Fatalf("unexpected tunnel protocol")
  161. }
  162. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  163. dialParams.DirectDialAddress == "" {
  164. t.Fatalf("missing direct dial fields")
  165. }
  166. if dialParams.DialPortNumber == "" {
  167. t.Fatalf("missing port number fields")
  168. }
  169. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  170. t.Fatalf("missing SSH fields")
  171. }
  172. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  173. dialParams.ObfuscatorPaddingSeed == nil {
  174. t.Fatalf("missing obfuscator fields")
  175. }
  176. if dialParams.FragmentorSeed == nil {
  177. t.Fatalf("missing fragmentor field")
  178. }
  179. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  180. (dialParams.MeekDialAddress == "" ||
  181. dialParams.MeekHostHeader == "" ||
  182. dialParams.MeekObfuscatorPaddingSeed == nil) {
  183. t.Fatalf("missing meek fields")
  184. }
  185. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  186. (dialParams.MeekFrontingDialAddress == "" ||
  187. dialParams.MeekFrontingHost == "" ||
  188. dialParams.ResolveParameters == nil) {
  189. t.Fatalf("missing meek fronting fields")
  190. }
  191. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  192. dialParams.UserAgent == "" {
  193. t.Fatalf("missing meek HTTP fields")
  194. }
  195. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  196. (dialParams.MeekSNIServerName == "" ||
  197. !dialParams.SelectedTLSProfile ||
  198. dialParams.TLSProfile == "") {
  199. t.Fatalf("missing meek HTTPS fields")
  200. }
  201. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  202. if dialParams.QUICVersion == "" {
  203. t.Fatalf("missing QUIC version field")
  204. }
  205. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  206. if dialParams.MeekFrontingDialAddress == "" ||
  207. dialParams.MeekFrontingHost == "" ||
  208. dialParams.MeekSNIServerName == "" {
  209. t.Fatalf("missing fronted QUIC fields")
  210. }
  211. } else {
  212. if dialParams.QUICDialSNIAddress == "" {
  213. t.Fatalf("missing QUIC SNI field")
  214. }
  215. }
  216. }
  217. if dialParams.LivenessTestSeed == nil {
  218. t.Fatalf("missing liveness test fields")
  219. }
  220. if dialParams.APIRequestPaddingSeed == nil {
  221. t.Fatalf("missing API request fields")
  222. }
  223. expectHoldOffTunnelProtocolNames := common.Contains(holdOffTunnelProtocolNames, tunnelProtocol)
  224. expectHoldOffFrontingTunnelProviderIDs := protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol)
  225. expectHoldOffDirectTunnelProviderRegion := protocol.TunnelProtocolIsDirect(tunnelProtocol) &&
  226. common.ContainsAny(
  227. holdOffDirectTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  228. []string{"", dialParams.ServerEntry.Region})
  229. expectHoldOffInproxyTunnelProviderRegion := protocol.TunnelProtocolUsesInproxy(tunnelProtocol) &&
  230. common.ContainsAny(
  231. holdOffInproxyTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  232. []string{"", dialParams.ServerEntry.Region})
  233. if expectHoldOffTunnelProtocolNames ||
  234. expectHoldOffFrontingTunnelProviderIDs ||
  235. expectHoldOffDirectTunnelProviderRegion ||
  236. expectHoldOffInproxyTunnelProviderRegion {
  237. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  238. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  239. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  240. }
  241. } else {
  242. if dialParams.HoldOffTunnelDuration != 0 {
  243. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  244. }
  245. }
  246. dialConfig := dialParams.GetDialConfig()
  247. if dialConfig.UpstreamProxyErrorCallback == nil {
  248. t.Fatalf("missing upstreamProxyErrorCallback")
  249. }
  250. // Test: no replay after dial reported to fail
  251. dialErr := errors.TraceNew("dial error")
  252. dialParams.Failed(clientConfig, dialErr)
  253. dialParams, err = MakeDialParameters(
  254. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  255. if err != nil {
  256. t.Fatalf("MakeDialParameters failed: %s", err)
  257. }
  258. if dialParams.IsReplay {
  259. t.Fatalf("unexpected replay")
  260. }
  261. // Test: no replay after network ID changes
  262. dialParams.Succeeded()
  263. testNetworkID = prng.HexString(8)
  264. clientConfig.networkIDGetter.FlushCache()
  265. dialParams, err = MakeDialParameters(
  266. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  267. if err != nil {
  268. t.Fatalf("MakeDialParameters failed: %s", err)
  269. }
  270. if dialParams.NetworkID != testNetworkID {
  271. t.Fatalf("unexpected network ID")
  272. }
  273. if dialParams.IsReplay {
  274. t.Fatalf("unexpected replay")
  275. }
  276. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  277. dialParams.Succeeded()
  278. replayDialParams, err := MakeDialParameters(
  279. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  280. if err != nil {
  281. t.Fatalf("MakeDialParameters failed: %s", err)
  282. }
  283. if !replayDialParams.IsReplay {
  284. t.Fatalf("unexpected non-replay")
  285. }
  286. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  287. t.Fatalf("unexpected non-updated timestamp")
  288. }
  289. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  290. t.Fatalf("mismatching tunnel protocol")
  291. }
  292. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  293. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  294. t.Fatalf("mismatching dial fields")
  295. }
  296. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  297. if seed1 == nil {
  298. return seed2 == nil
  299. }
  300. return bytes.Equal(seed1[:], seed2[:])
  301. }
  302. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  303. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  304. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  305. t.Fatalf("mismatching SSH fields")
  306. }
  307. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  308. t.Fatalf("mismatching obfuscator fields")
  309. }
  310. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  311. t.Fatalf("mismatching fragmentor fields")
  312. }
  313. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  314. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  315. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  316. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  317. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  318. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  319. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  320. t.Fatalf("mismatching meek fields")
  321. }
  322. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  323. replayDialParams.UserAgent != dialParams.UserAgent {
  324. t.Fatalf("mismatching user agent fields")
  325. }
  326. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  327. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  328. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  329. t.Fatalf("mismatching TLS fields")
  330. }
  331. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  332. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  333. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  334. t.Fatalf("mismatching QUIC fields")
  335. }
  336. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  337. t.Fatalf("mismatching liveness test fields")
  338. }
  339. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  340. t.Fatalf("mismatching API request fields")
  341. }
  342. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  343. (replayDialParams.ResolveParameters != nil &&
  344. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  345. t.Fatalf("mismatching ResolveParameters fields")
  346. }
  347. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  348. (replayDialParams.HTTPTransformerParameters != nil &&
  349. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  350. t.Fatalf("mismatching HTTPTransformerParameters fields")
  351. }
  352. if (replayDialParams.OSSHObfuscatorSeedTransformerParameters == nil) != (dialParams.OSSHObfuscatorSeedTransformerParameters == nil) ||
  353. (replayDialParams.OSSHObfuscatorSeedTransformerParameters != nil &&
  354. !reflect.DeepEqual(replayDialParams.OSSHObfuscatorSeedTransformerParameters, dialParams.OSSHObfuscatorSeedTransformerParameters)) {
  355. t.Fatalf("mismatching ObfuscatorSeedTransformerParameters fields")
  356. }
  357. if (replayDialParams.ObfuscatedQUICNonceTransformerParameters == nil) != (dialParams.ObfuscatedQUICNonceTransformerParameters == nil) ||
  358. (replayDialParams.ObfuscatedQUICNonceTransformerParameters != nil &&
  359. !reflect.DeepEqual(replayDialParams.ObfuscatedQUICNonceTransformerParameters, dialParams.ObfuscatedQUICNonceTransformerParameters)) {
  360. t.Fatalf("mismatching ObfuscatedQUICNonceTransformerParameters fields")
  361. }
  362. if (replayDialParams.ShadowsocksPrefixSpec == nil) != (dialParams.ShadowsocksPrefixSpec == nil) ||
  363. (replayDialParams.ShadowsocksPrefixSpec != nil &&
  364. !reflect.DeepEqual(replayDialParams.ShadowsocksPrefixSpec, dialParams.ShadowsocksPrefixSpec)) {
  365. t.Fatalf("mismatching ShadowsocksPrefixSpec fields")
  366. }
  367. // Test: replay after change tactics, with ReplayIgnoreChangedClientState = true
  368. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  369. applyParameters[parameters.ReplayIgnoreChangedConfigState] = true
  370. err = clientConfig.SetParameters("tag2a", false, applyParameters)
  371. if err != nil {
  372. t.Fatalf("SetParameters failed: %s", err)
  373. }
  374. dialParams, err = MakeDialParameters(
  375. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  376. if err != nil {
  377. t.Fatalf("MakeDialParameters failed: %s", err)
  378. }
  379. if !replayDialParams.IsReplay {
  380. t.Fatalf("unexpected non-replay")
  381. }
  382. // Test: no replay after change tactics
  383. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  384. applyParameters[parameters.ReplayIgnoreChangedConfigState] = false
  385. err = clientConfig.SetParameters("tag2", false, applyParameters)
  386. if err != nil {
  387. t.Fatalf("SetParameters failed: %s", err)
  388. }
  389. dialParams, err = MakeDialParameters(
  390. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  391. if err != nil {
  392. t.Fatalf("MakeDialParameters failed: %s", err)
  393. }
  394. if dialParams.IsReplay {
  395. t.Fatalf("unexpected replay")
  396. }
  397. // Test: no replay after dial parameters expired
  398. dialParams.Succeeded()
  399. time.Sleep(1 * time.Second)
  400. dialParams, err = MakeDialParameters(
  401. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  402. if err != nil {
  403. t.Fatalf("MakeDialParameters failed: %s", err)
  404. }
  405. if dialParams.IsReplay {
  406. t.Fatalf("unexpected replay")
  407. }
  408. // Test: no replay after server entry changes
  409. dialParams.Succeeded()
  410. serverEntries[0].ConfigurationVersion += 1
  411. dialParams, err = MakeDialParameters(
  412. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  413. if err != nil {
  414. t.Fatalf("MakeDialParameters failed: %s", err)
  415. }
  416. if dialParams.IsReplay {
  417. t.Fatalf("unexpected replay")
  418. }
  419. // Test: disable replay elements (partial coverage)
  420. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  421. applyParameters[parameters.ReplaySSH] = false
  422. applyParameters[parameters.ReplayObfuscatorPadding] = false
  423. applyParameters[parameters.ReplayFragmentor] = false
  424. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  425. applyParameters[parameters.ReplayLivenessTest] = false
  426. applyParameters[parameters.ReplayAPIRequestPadding] = false
  427. err = clientConfig.SetParameters("tag3", false, applyParameters)
  428. if err != nil {
  429. t.Fatalf("SetParameters failed: %s", err)
  430. }
  431. dialParams, err = MakeDialParameters(
  432. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  433. if err != nil {
  434. t.Fatalf("MakeDialParameters failed: %s", err)
  435. }
  436. dialParams.Succeeded()
  437. replayDialParams, err = MakeDialParameters(
  438. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  439. if err != nil {
  440. t.Fatalf("MakeDialParameters failed: %s", err)
  441. }
  442. if !replayDialParams.IsReplay {
  443. t.Fatalf("unexpected non-replay")
  444. }
  445. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  446. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  447. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  448. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  449. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  450. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  451. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  452. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  453. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  454. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  455. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  456. t.Fatalf("unexpected replayed fields")
  457. }
  458. // Test: client-side restrict fronting provider ID
  459. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  460. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  461. err = clientConfig.SetParameters("tag4", false, applyParameters)
  462. if err != nil {
  463. t.Fatalf("SetParameters failed: %s", err)
  464. }
  465. dialParams, err = MakeDialParameters(
  466. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  467. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  468. if err == nil {
  469. if dialParams != nil {
  470. t.Fatalf("unexpected MakeDialParameters success")
  471. }
  472. }
  473. } else {
  474. if err != nil {
  475. t.Fatalf("MakeDialParameters failed: %s", err)
  476. }
  477. }
  478. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  479. err = clientConfig.SetParameters("tag5", false, applyParameters)
  480. if err != nil {
  481. t.Fatalf("SetParameters failed: %s", err)
  482. }
  483. // Test: client-side restrict provider ID by region for direct protocols
  484. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{providerID: {"CA"}}
  485. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 1.0
  486. err = clientConfig.SetParameters("tag6", false, applyParameters)
  487. if err != nil {
  488. t.Fatalf("SetParameters failed: %s", err)
  489. }
  490. dialParams, err = MakeDialParameters(
  491. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  492. if protocol.TunnelProtocolIsDirect(tunnelProtocol) {
  493. if err == nil {
  494. if dialParams != nil {
  495. t.Fatalf("unexpected MakeDialParameters success")
  496. }
  497. }
  498. } else {
  499. if err != nil {
  500. t.Fatalf("MakeDialParameters failed: %s", err)
  501. }
  502. }
  503. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{}
  504. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 0.0
  505. err = clientConfig.SetParameters("tag7", false, applyParameters)
  506. if err != nil {
  507. t.Fatalf("SetParameters failed: %s", err)
  508. }
  509. // Test: client-side restrict provider ID by region for inproxy protocols
  510. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{providerID: {"CA"}}
  511. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 1.0
  512. err = clientConfig.SetParameters("tag8", false, applyParameters)
  513. if err != nil {
  514. t.Fatalf("SetParameters failed: %s", err)
  515. }
  516. dialParams, err = MakeDialParameters(
  517. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  518. if protocol.TunnelProtocolUsesInproxy(tunnelProtocol) {
  519. if err == nil {
  520. if dialParams != nil {
  521. t.Fatalf("unexpected MakeDialParameters success")
  522. }
  523. }
  524. } else {
  525. if err != nil {
  526. t.Fatalf("MakeDialParameters failed: %s", err)
  527. }
  528. }
  529. applyParameters[parameters.RestrictInproxyProviderRegions] = map[string][]string{}
  530. applyParameters[parameters.RestrictInproxyProviderIDsClientProbability] = 0.0
  531. err = clientConfig.SetParameters("tag9", false, applyParameters)
  532. if err != nil {
  533. t.Fatalf("SetParameters failed: %s", err)
  534. }
  535. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  536. steeringIPCache.Flush()
  537. // Test: steering IP used in non-replay case
  538. dialParams, err = MakeDialParameters(
  539. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  540. if err != nil {
  541. t.Fatalf("MakeDialParameters failed: %s", err)
  542. }
  543. dialParams.Failed(clientConfig, dialErr)
  544. getCacheKey := func() string {
  545. return fmt.Sprintf("%s %s %s", testNetworkID, frontingProviderID, tunnelProtocol)
  546. }
  547. setCacheEntry := func(steeringIP string) {
  548. steeringIPCache.Set(getCacheKey(), steeringIP, lrucache.DefaultExpiration)
  549. }
  550. setCacheEntry("127.0.0.1")
  551. dialParams, err = MakeDialParameters(
  552. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  553. if err != nil {
  554. t.Fatalf("MakeDialParameters failed: %s", err)
  555. }
  556. if dialParams.IsReplay {
  557. t.Fatalf("unexpected replay")
  558. }
  559. checkSteeringIP := func(expectedSteeringIP string) {
  560. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Microsecond)
  561. defer cancelFunc()
  562. IPs, err := dialParams.dialConfig.ResolveIP(ctx, "example.com")
  563. if err != nil {
  564. t.Fatalf("ResolveIP failed: %s", err)
  565. }
  566. if IPs[0].String() != expectedSteeringIP {
  567. t.Fatalf("missing expected steering IP")
  568. }
  569. }
  570. checkSteeringIP("127.0.0.1")
  571. // Test: steering IP used in replay case
  572. dialParams.Succeeded()
  573. dialParams, err = MakeDialParameters(
  574. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  575. if err != nil {
  576. t.Fatalf("MakeDialParameters failed: %s", err)
  577. }
  578. if !dialParams.IsReplay {
  579. t.Fatalf("unexpected non-replay")
  580. }
  581. checkSteeringIP("127.0.0.1")
  582. // Test: different steering IP clears replay flag
  583. dialParams.Succeeded()
  584. setCacheEntry("127.0.0.2")
  585. dialParams, err = MakeDialParameters(
  586. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  587. if err != nil {
  588. t.Fatalf("MakeDialParameters failed: %s", err)
  589. }
  590. if dialParams.IsReplay {
  591. t.Fatalf("unexpected replay")
  592. }
  593. checkSteeringIP("127.0.0.2")
  594. // Test: newly present steering IP clears replay flag
  595. steeringIPCache.Flush()
  596. dialParams, err = MakeDialParameters(
  597. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  598. if err != nil {
  599. t.Fatalf("MakeDialParameters failed: %s", err)
  600. }
  601. dialParams.Succeeded()
  602. setCacheEntry("127.0.0.3")
  603. dialParams, err = MakeDialParameters(
  604. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  605. if err != nil {
  606. t.Fatalf("MakeDialParameters failed: %s", err)
  607. }
  608. if dialParams.IsReplay {
  609. t.Fatalf("unexpected replay")
  610. }
  611. // Test: steering IP cleared from cache after failure
  612. dialParams.Failed(clientConfig, dialErr)
  613. _, ok := steeringIPCache.Get(getCacheKey())
  614. if ok {
  615. t.Fatalf("unexpected steering IP cache entry")
  616. }
  617. }
  618. // Test: iterator shuffles
  619. for i, serverEntry := range serverEntries {
  620. data, err := json.Marshal(serverEntry)
  621. if err != nil {
  622. t.Fatalf("json.Marshal failed: %s", err)
  623. }
  624. var serverEntryFields protocol.ServerEntryFields
  625. err = json.Unmarshal(data, &serverEntryFields)
  626. if err != nil {
  627. t.Fatalf("json.Unmarshal failed: %s", err)
  628. }
  629. err = StoreServerEntry(serverEntryFields, false)
  630. if err != nil {
  631. t.Fatalf("StoreServerEntry failed: %s", err)
  632. }
  633. if i%10 == 0 {
  634. dialParams, err := MakeDialParameters(
  635. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  636. if err != nil {
  637. t.Fatalf("MakeDialParameters failed: %s", err)
  638. }
  639. dialParams.Succeeded()
  640. }
  641. }
  642. for i := 0; i < 5; i++ {
  643. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  644. if err != nil {
  645. t.Fatalf("NewServerEntryIterator failed: %s", err)
  646. }
  647. if hasAffinity {
  648. t.Fatalf("unexpected affinity server")
  649. }
  650. // Test: the first shuffle should move the replay candidates to the front
  651. for j := 0; j < 10; j++ {
  652. serverEntry, err := iterator.Next()
  653. if err != nil {
  654. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  655. }
  656. dialParams, err := MakeDialParameters(
  657. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  658. if err != nil {
  659. t.Fatalf("MakeDialParameters failed: %s", err)
  660. }
  661. if !dialParams.IsReplay {
  662. t.Fatalf("unexpected non-replay")
  663. }
  664. }
  665. iterator.Reset()
  666. // Test: subsequent shuffles should not move the replay candidates
  667. allReplay := true
  668. for j := 0; j < 10; j++ {
  669. serverEntry, err := iterator.Next()
  670. if err != nil {
  671. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  672. }
  673. dialParams, err := MakeDialParameters(
  674. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  675. if err != nil {
  676. t.Fatalf("MakeDialParameters failed: %s", err)
  677. }
  678. if !dialParams.IsReplay {
  679. allReplay = false
  680. }
  681. }
  682. if allReplay {
  683. t.Fatalf("unexpected all replay")
  684. }
  685. iterator.Close()
  686. }
  687. }
  688. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  689. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  690. if err != nil {
  691. t.Fatalf("TempDir failed: %s", err)
  692. }
  693. defer os.RemoveAll(testDataDirName)
  694. err = SetNoticeWriter(io.Discard)
  695. if err != nil {
  696. t.Fatalf("error setting notice writer: %s", err)
  697. }
  698. defer ResetNoticeWriter()
  699. clientConfig := &Config{
  700. PropagationChannelId: "0",
  701. SponsorId: "0",
  702. DataRootDirectory: testDataDirName,
  703. NetworkIDGetter: new(testNetworkGetter),
  704. }
  705. err = clientConfig.Commit(false)
  706. if err != nil {
  707. t.Fatalf("error committing configuration file: %s", err)
  708. }
  709. jsonLimitDialPortNumbers := `
  710. {
  711. "SSH" : [[10,11]],
  712. "OSSH" : [[20,21]],
  713. "QUIC-OSSH" : [[30,31]],
  714. "TAPDANCE-OSSH" : [[40,41]],
  715. "CONJURE-OSSH" : [[50,51]],
  716. "SHADOWSOCKS-OSSH" : [[60,61]],
  717. "All" : [[70,71],80,443]
  718. }
  719. `
  720. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  721. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  722. if err != nil {
  723. t.Fatalf("Unmarshal failed: %s", err)
  724. }
  725. applyParameters := make(map[string]interface{})
  726. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  727. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  728. err = clientConfig.SetParameters("tag1", false, applyParameters)
  729. if err != nil {
  730. t.Fatalf("SetParameters failed: %s", err)
  731. }
  732. constraints := &protocolSelectionConstraints{
  733. config: clientConfig,
  734. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  735. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  736. }
  737. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  738. protocol, _, ok := constraints.selectProtocol(0, false, false, serverEntry)
  739. return protocol, ok
  740. }
  741. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  742. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  743. continue
  744. }
  745. serverEntries := makeMockServerEntries(tunnelProtocol, "", "", "", 100)
  746. selected := false
  747. skipped := false
  748. for _, serverEntry := range serverEntries {
  749. selectedProtocol, ok := selectProtocol(serverEntry)
  750. if ok {
  751. if selectedProtocol != tunnelProtocol {
  752. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  753. }
  754. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  755. if err != nil {
  756. t.Fatalf("GetDialPortNumber failed: %s", err)
  757. }
  758. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  759. t.Fatalf("unexpected dial port number: %d", port)
  760. }
  761. selected = true
  762. } else {
  763. skipped = true
  764. }
  765. }
  766. if !selected {
  767. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  768. }
  769. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  770. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  771. }
  772. }
  773. }
  774. func makeMockServerEntries(
  775. tunnelProtocol string,
  776. region string,
  777. providerID string,
  778. frontingProviderID string,
  779. count int) []*protocol.ServerEntry {
  780. serverEntries := make([]*protocol.ServerEntry, count)
  781. for i := 0; i < count; i++ {
  782. serverEntries[i] = &protocol.ServerEntry{
  783. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  784. SshPort: prng.Range(10, 19),
  785. SshObfuscatedPort: prng.Range(20, 29),
  786. SshObfuscatedQUICPort: prng.Range(30, 39),
  787. SshObfuscatedTapDancePort: prng.Range(40, 49),
  788. SshObfuscatedConjurePort: prng.Range(50, 59),
  789. SshShadowsocksPort: prng.Range(60, 69),
  790. MeekServerPort: prng.Range(70, 79),
  791. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  792. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  793. Region: region,
  794. ProviderID: providerID,
  795. FrontingProviderID: frontingProviderID,
  796. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  797. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  798. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  799. }
  800. }
  801. return serverEntries
  802. }
  803. func TestMakeHTTPTransformerParameters(t *testing.T) {
  804. type test struct {
  805. name string
  806. frontingProviderID string
  807. isFronted bool
  808. paramValues map[string]interface{}
  809. expectedTransformName string
  810. expectedTransformSpec transforms.Spec
  811. }
  812. tests := []test{
  813. {
  814. name: "unfronted",
  815. frontingProviderID: "",
  816. isFronted: false,
  817. paramValues: map[string]interface{}{
  818. "DirectHTTPProtocolTransformProbability": 1,
  819. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  820. "spec1": {{"A", "B"}},
  821. },
  822. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  823. "": {"spec1"},
  824. },
  825. },
  826. expectedTransformName: "spec1",
  827. expectedTransformSpec: [][2]string{{"A", "B"}},
  828. },
  829. {
  830. name: "fronted",
  831. frontingProviderID: "frontingProvider",
  832. isFronted: true,
  833. paramValues: map[string]interface{}{
  834. "FrontedHTTPProtocolTransformProbability": 1,
  835. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  836. "spec1": {{"A", "B"}},
  837. },
  838. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  839. "frontingProvider": {"spec1"},
  840. },
  841. },
  842. expectedTransformName: "spec1",
  843. expectedTransformSpec: [][2]string{{"A", "B"}},
  844. },
  845. {
  846. name: "no transform, coinflip false",
  847. frontingProviderID: "frontingProvider",
  848. isFronted: false,
  849. paramValues: map[string]interface{}{
  850. "DirectHTTPProtocolTransformProbability": 0,
  851. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  852. "spec1": {{"A", "B"}},
  853. },
  854. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  855. "frontingProvider": {"spec1"},
  856. },
  857. },
  858. expectedTransformName: "",
  859. expectedTransformSpec: nil,
  860. },
  861. }
  862. for _, tt := range tests {
  863. t.Run(tt.name, func(t *testing.T) {
  864. params, err := parameters.NewParameters(nil)
  865. if err != nil {
  866. t.Fatalf("parameters.NewParameters failed %v", err)
  867. }
  868. _, err = params.Set("", 0, tt.paramValues)
  869. if err != nil {
  870. t.Fatalf("params.Set failed %v", err)
  871. }
  872. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  873. if err != nil {
  874. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  875. }
  876. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  877. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  878. }
  879. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  880. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  881. }
  882. if httpTransformerParams.ProtocolTransformSpec != nil {
  883. if httpTransformerParams.ProtocolTransformSeed == nil {
  884. t.Fatalf("expected non-nil seed")
  885. }
  886. }
  887. })
  888. }
  889. }
  890. func TestMakeOSSHObfuscatorSeedTranformerParameters(t *testing.T) {
  891. type test struct {
  892. name string
  893. paramValues map[string]interface{}
  894. expectedTransformName string
  895. expectedTransformSpec transforms.Spec
  896. }
  897. tests := []test{
  898. {
  899. name: "transform",
  900. paramValues: map[string]interface{}{
  901. "OSSHObfuscatorSeedTransformProbability": 1,
  902. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  903. "spec1": {{"A", "B"}},
  904. },
  905. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  906. "": {"spec1"},
  907. },
  908. },
  909. expectedTransformName: "spec1",
  910. expectedTransformSpec: [][2]string{{"A", "B"}},
  911. },
  912. {
  913. name: "no transform, coinflip false",
  914. paramValues: map[string]interface{}{
  915. "OSSHObfuscatorSeedTransformProbability": 0,
  916. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  917. "spec1": {{"A", "B"}},
  918. },
  919. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  920. "": {"spec1"},
  921. },
  922. },
  923. expectedTransformName: "",
  924. expectedTransformSpec: nil,
  925. },
  926. }
  927. for _, tt := range tests {
  928. t.Run(tt.name, func(t *testing.T) {
  929. params, err := parameters.NewParameters(nil)
  930. if err != nil {
  931. t.Fatalf("parameters.NewParameters failed: %v", err)
  932. }
  933. _, err = params.Set("", 0, tt.paramValues)
  934. if err != nil {
  935. t.Fatalf("params.Set failed: %v", err)
  936. }
  937. transformerParams, err := makeSeedTransformerParameters(
  938. params.Get(),
  939. parameters.OSSHObfuscatorSeedTransformProbability,
  940. parameters.OSSHObfuscatorSeedTransformSpecs,
  941. parameters.OSSHObfuscatorSeedTransformScopedSpecNames)
  942. if err != nil {
  943. t.Fatalf("makeSeedTransformerParameters failed: %v", err)
  944. }
  945. if transformerParams.TransformName != tt.expectedTransformName {
  946. t.Fatalf("expected TransformName \"%s\" but got \"%s\"", tt.expectedTransformName, transformerParams.TransformName)
  947. }
  948. if !reflect.DeepEqual(transformerParams.TransformSpec, tt.expectedTransformSpec) {
  949. t.Fatalf("expected TransformSpec %v but got %v", tt.expectedTransformSpec, transformerParams.TransformSpec)
  950. }
  951. if transformerParams.TransformSpec != nil {
  952. if transformerParams.TransformSeed == nil {
  953. t.Fatalf("expected non-nil seed")
  954. }
  955. }
  956. })
  957. }
  958. }