2022-05-13 17:36:58 +02:00
|
|
|
package netxlite
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
|
|
|
"errors"
|
2022-05-16 10:46:53 +02:00
|
|
|
"net"
|
2022-05-13 17:36:58 +02:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/miekg/dns"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/model"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/model/mocks"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestParallelResolver(t *testing.T) {
|
|
|
|
t.Run("transport okay", func(t *testing.T) {
|
2022-06-01 11:10:08 +02:00
|
|
|
txp := NewUnwrappedDNSOverTLSTransport((&tls.Dialer{}).DialContext, "8.8.8.8:853")
|
2022-05-13 17:36:58 +02:00
|
|
|
r := NewUnwrappedParallelResolver(txp)
|
|
|
|
rtx := r.Transport()
|
|
|
|
if rtx.Network() != "dot" || rtx.Address() != "8.8.8.8:853" {
|
|
|
|
t.Fatal("not the transport we expected")
|
|
|
|
}
|
|
|
|
if r.Network() != rtx.Network() {
|
|
|
|
t.Fatal("invalid network seen from the resolver")
|
|
|
|
}
|
|
|
|
if r.Address() != rtx.Address() {
|
|
|
|
t.Fatal("invalid address seen from the resolver")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("LookupHost", func(t *testing.T) {
|
|
|
|
t.Run("RoundTrip error", func(t *testing.T) {
|
|
|
|
mocked := errors.New("mocked error")
|
|
|
|
txp := &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
2022-05-13 17:36:58 +02:00
|
|
|
return nil, mocked
|
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return true
|
|
|
|
},
|
|
|
|
}
|
|
|
|
r := NewUnwrappedParallelResolver(txp)
|
|
|
|
addrs, err := r.LookupHost(context.Background(), "www.gogle.com")
|
|
|
|
if !errors.Is(err, mocked) {
|
|
|
|
t.Fatal("not the error we expected")
|
|
|
|
}
|
|
|
|
if addrs != nil {
|
|
|
|
t.Fatal("expected nil address here")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("empty reply", func(t *testing.T) {
|
|
|
|
txp := &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
|
|
|
response := &mocks.DNSResponse{
|
|
|
|
MockDecodeLookupHost: func() ([]string, error) {
|
|
|
|
return nil, nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return response, nil
|
2022-05-13 17:36:58 +02:00
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return true
|
|
|
|
},
|
|
|
|
}
|
|
|
|
r := NewUnwrappedParallelResolver(txp)
|
|
|
|
addrs, err := r.LookupHost(context.Background(), "www.gogle.com")
|
|
|
|
if !errors.Is(err, ErrOODNSNoAnswer) {
|
|
|
|
t.Fatal("not the error we expected", err)
|
|
|
|
}
|
|
|
|
if addrs != nil {
|
|
|
|
t.Fatal("expected nil address here")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("with A reply", func(t *testing.T) {
|
|
|
|
txp := &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
|
|
|
response := &mocks.DNSResponse{
|
|
|
|
MockDecodeLookupHost: func() ([]string, error) {
|
|
|
|
if query.Type() != dns.TypeA {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return []string{"8.8.8.8"}, nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return response, nil
|
2022-05-13 17:36:58 +02:00
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return true
|
|
|
|
},
|
|
|
|
}
|
|
|
|
r := NewUnwrappedParallelResolver(txp)
|
|
|
|
addrs, err := r.LookupHost(context.Background(), "www.gogle.com")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(addrs) != 1 || addrs[0] != "8.8.8.8" {
|
2022-05-14 19:38:46 +02:00
|
|
|
t.Fatal("not the result we expected", addrs)
|
2022-05-13 17:36:58 +02:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("with AAAA reply", func(t *testing.T) {
|
|
|
|
txp := &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
|
|
|
response := &mocks.DNSResponse{
|
|
|
|
MockDecodeLookupHost: func() ([]string, error) {
|
|
|
|
if query.Type() != dns.TypeAAAA {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return []string{"::1"}, nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return response, nil
|
2022-05-13 17:36:58 +02:00
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return true
|
|
|
|
},
|
|
|
|
}
|
|
|
|
r := NewUnwrappedParallelResolver(txp)
|
|
|
|
addrs, err := r.LookupHost(context.Background(), "www.gogle.com")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(addrs) != 1 || addrs[0] != "::1" {
|
2022-05-14 19:38:46 +02:00
|
|
|
t.Fatal("not the result we expected", addrs)
|
2022-05-13 17:36:58 +02:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("A failure takes precedence over AAAA failure", func(t *testing.T) {
|
|
|
|
afailure := errors.New("a failure")
|
|
|
|
aaaafailure := errors.New("aaaa failure")
|
|
|
|
txp := &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
|
|
|
switch query.Type() {
|
|
|
|
case dns.TypeA:
|
2022-05-13 17:36:58 +02:00
|
|
|
return nil, afailure
|
2022-05-25 17:03:58 +02:00
|
|
|
case dns.TypeAAAA:
|
2022-05-13 17:36:58 +02:00
|
|
|
return nil, aaaafailure
|
2022-05-25 17:03:58 +02:00
|
|
|
default:
|
|
|
|
return nil, errors.New("unexpected query")
|
2022-05-13 17:36:58 +02:00
|
|
|
}
|
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return true
|
|
|
|
},
|
|
|
|
}
|
|
|
|
r := NewUnwrappedParallelResolver(txp)
|
|
|
|
addrs, err := r.LookupHost(context.Background(), "www.gogle.com")
|
|
|
|
if !errors.Is(err, afailure) {
|
|
|
|
t.Fatal("unexpected error", err)
|
|
|
|
}
|
|
|
|
if len(addrs) != 0 {
|
|
|
|
t.Fatal("not the result we expected")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("CloseIdleConnections", func(t *testing.T) {
|
|
|
|
var called bool
|
|
|
|
r := &ParallelResolver{
|
|
|
|
Txp: &mocks.DNSTransport{
|
|
|
|
MockCloseIdleConnections: func() {
|
|
|
|
called = true
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
r.CloseIdleConnections()
|
|
|
|
if !called {
|
|
|
|
t.Fatal("not called")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("LookupHTTPS", func(t *testing.T) {
|
|
|
|
t.Run("for round-trip error", func(t *testing.T) {
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
r := &ParallelResolver{
|
|
|
|
Txp: &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
2022-05-13 17:36:58 +02:00
|
|
|
return nil, expected
|
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return false
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
https, err := r.LookupHTTPS(ctx, "example.com")
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("unexpected err", err)
|
|
|
|
}
|
|
|
|
if https != nil {
|
|
|
|
t.Fatal("unexpected result")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2022-05-25 17:03:58 +02:00
|
|
|
t.Run("for DecodeHTTPS error", func(t *testing.T) {
|
2022-05-13 17:36:58 +02:00
|
|
|
expected := errors.New("mocked error")
|
|
|
|
r := &ParallelResolver{
|
|
|
|
Txp: &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
|
|
|
response := &mocks.DNSResponse{
|
|
|
|
MockDecodeHTTPS: func() (*model.HTTPSSvc, error) {
|
|
|
|
return nil, expected
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return response, nil
|
2022-05-13 17:36:58 +02:00
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return false
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
https, err := r.LookupHTTPS(ctx, "example.com")
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("unexpected err", err)
|
|
|
|
}
|
|
|
|
if https != nil {
|
|
|
|
t.Fatal("unexpected result")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
2022-05-16 10:46:53 +02:00
|
|
|
|
|
|
|
t.Run("LookupNS", func(t *testing.T) {
|
|
|
|
t.Run("for round-trip error", func(t *testing.T) {
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
r := &ParallelResolver{
|
|
|
|
Txp: &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
2022-05-16 10:46:53 +02:00
|
|
|
return nil, expected
|
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return false
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
ns, err := r.LookupNS(ctx, "example.com")
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("unexpected err", err)
|
|
|
|
}
|
|
|
|
if ns != nil {
|
|
|
|
t.Fatal("unexpected result")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("for decode error", func(t *testing.T) {
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
r := &ParallelResolver{
|
|
|
|
Txp: &mocks.DNSTransport{
|
2022-05-25 17:03:58 +02:00
|
|
|
MockRoundTrip: func(ctx context.Context, query model.DNSQuery) (model.DNSResponse, error) {
|
|
|
|
response := &mocks.DNSResponse{
|
|
|
|
MockDecodeNS: func() ([]*net.NS, error) {
|
|
|
|
return nil, expected
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return response, nil
|
2022-05-16 10:46:53 +02:00
|
|
|
},
|
|
|
|
MockRequiresPadding: func() bool {
|
|
|
|
return false
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
https, err := r.LookupNS(ctx, "example.com")
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("unexpected err", err)
|
|
|
|
}
|
|
|
|
if https != nil {
|
|
|
|
t.Fatal("unexpected result")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
2022-05-13 17:36:58 +02:00
|
|
|
}
|