2021-02-02 12:05:47 +01:00
|
|
|
// Package whatsapp contains the WhatsApp network experiment.
|
|
|
|
//
|
|
|
|
// See https://github.com/ooni/spec/blob/master/nettests/ts-018-whatsapp.md.
|
|
|
|
package whatsapp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"math/rand"
|
|
|
|
"net/url"
|
|
|
|
"regexp"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/engine/experiment/urlgetter"
|
2022-01-03 13:53:23 +01:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/model"
|
refactor: flatten and separate (#353)
* refactor(atomicx): move outside the engine package
After merging probe-engine into probe-cli, my impression is that we have
too much unnecessary nesting of packages in this repository.
The idea of this commit and of a bunch of following commits will instead
be to reduce the nesting and simplify the structure.
While there, improve the documentation.
* fix: always use the atomicx package
For consistency, never use sync/atomic and always use ./internal/atomicx
so we can just grep and make sure we're not risking to crash if we make
a subtle mistake on a 32 bit platform.
While there, mention in the contributing guidelines that we want to
always prefer the ./internal/atomicx package over sync/atomic.
* fix(atomicx): remove unnecessary constructor
We don't need a constructor here. The default constructed `&Int64{}`
instance is already usable and the constructor does not add anything to
what we are doing, rather it just creates extra confusion.
* cleanup(atomicx): we are not using Float64
Because atomicx.Float64 is unused, we can safely zap it.
* cleanup(atomicx): simplify impl and improve tests
We can simplify the implementation by using defer and by letting
the Load() method call Add(0).
We can improve tests by making many goroutines updated the
atomic int64 value concurrently.
* refactor(fsx): can live in the ./internal pkg
Let us reduce the amount of nesting. While there, ensure that the
package only exports the bare minimum, and improve the documentation
of the tests, to ease reading the code.
* refactor: move runtimex to ./internal
* refactor: move shellx into the ./internal package
While there, remove unnecessary dependency between packages.
While there, specify in the contributing guidelines that
one should use x/sys/execabs instead of os/exec.
* refactor: move ooapi into the ./internal pkg
* refactor(humanize): move to ./internal and better docs
* refactor: move platform to ./internal
* refactor(randx): move to ./internal
* refactor(multierror): move into the ./internal pkg
* refactor(kvstore): all kvstores in ./internal
Rather than having part of the kvstore inside ./internal/engine/kvstore
and part in ./internal/engine/kvstore.go, let us put every piece of code
that is kvstore related into the ./internal/kvstore package.
* fix(kvstore): always return ErrNoSuchKey on Get() error
It should help to use the kvstore everywhere removing all the
copies that are lingering around the tree.
* sessionresolver: make KVStore mandatory
Simplifies implementation. While there, use the ./internal/kvstore
package rather than having our private implementation.
* fix(ooapi): use the ./internal/kvstore package
* fix(platform): better documentation
2021-06-04 10:34:18 +02:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/runtimex"
|
2021-02-02 12:05:47 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// RegistrationServiceURL is the URL used by WhatsApp registration service
|
|
|
|
RegistrationServiceURL = "https://v.whatsapp.net/v2/register"
|
|
|
|
|
|
|
|
// WebHTTPURL is WhatsApp web's HTTP URL
|
|
|
|
WebHTTPURL = "http://web.whatsapp.com/"
|
|
|
|
|
|
|
|
// WebHTTPSURL is WhatsApp web's HTTPS URL
|
|
|
|
WebHTTPSURL = "https://web.whatsapp.com/"
|
|
|
|
|
|
|
|
testName = "whatsapp"
|
|
|
|
testVersion = "0.9.0"
|
|
|
|
)
|
|
|
|
|
|
|
|
var endpointPattern = regexp.MustCompile(`^tcpconnect://e[0-9]{1,2}\.whatsapp\.net:[0-9]{3,5}$`)
|
|
|
|
|
|
|
|
// Config contains the experiment config.
|
|
|
|
type Config struct{}
|
|
|
|
|
|
|
|
// TestKeys contains the experiment results
|
|
|
|
type TestKeys struct {
|
|
|
|
urlgetter.TestKeys
|
|
|
|
RegistrationServerFailure *string `json:"registration_server_failure"`
|
|
|
|
RegistrationServerStatus string `json:"registration_server_status"`
|
|
|
|
WhatsappEndpointsBlocked []string `json:"whatsapp_endpoints_blocked"`
|
|
|
|
WhatsappEndpointsDNSInconsistent []string `json:"whatsapp_endpoints_dns_inconsistent"`
|
|
|
|
WhatsappEndpointsStatus string `json:"whatsapp_endpoints_status"`
|
|
|
|
WhatsappWebFailure *string `json:"whatsapp_web_failure"`
|
|
|
|
WhatsappWebStatus string `json:"whatsapp_web_status"`
|
|
|
|
WhatsappEndpointsCount map[string]int `json:"-"`
|
|
|
|
WhatsappHTTPFailure *string `json:"-"`
|
|
|
|
WhatsappHTTPSFailure *string `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewTestKeys returns a new instance of the test keys.
|
|
|
|
func NewTestKeys() *TestKeys {
|
|
|
|
failure := "unknown_failure"
|
|
|
|
return &TestKeys{
|
|
|
|
RegistrationServerFailure: &failure,
|
|
|
|
RegistrationServerStatus: "blocked",
|
|
|
|
WhatsappEndpointsBlocked: []string{},
|
|
|
|
WhatsappEndpointsDNSInconsistent: []string{},
|
|
|
|
WhatsappEndpointsStatus: "blocked",
|
|
|
|
WhatsappWebFailure: &failure,
|
|
|
|
WhatsappWebStatus: "blocked",
|
|
|
|
WhatsappEndpointsCount: make(map[string]int),
|
|
|
|
WhatsappHTTPFailure: &failure,
|
|
|
|
WhatsappHTTPSFailure: &failure,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update updates the TestKeys using the given MultiOutput result.
|
|
|
|
func (tk *TestKeys) Update(v urlgetter.MultiOutput) {
|
|
|
|
// Update the easy to update entries first
|
|
|
|
tk.NetworkEvents = append(tk.NetworkEvents, v.TestKeys.NetworkEvents...)
|
|
|
|
tk.Queries = append(tk.Queries, v.TestKeys.Queries...)
|
|
|
|
tk.Requests = append(tk.Requests, v.TestKeys.Requests...)
|
|
|
|
tk.TCPConnect = append(tk.TCPConnect, v.TestKeys.TCPConnect...)
|
|
|
|
tk.TLSHandshakes = append(tk.TLSHandshakes, v.TestKeys.TLSHandshakes...)
|
|
|
|
// Set the status of WhatsApp endpoints
|
|
|
|
if endpointPattern.MatchString(v.Input.Target) {
|
|
|
|
if v.TestKeys.Failure != nil {
|
|
|
|
parsed, err := url.Parse(v.Input.Target)
|
|
|
|
runtimex.PanicOnError(err, "url.Parse should not fail here")
|
|
|
|
hostname := parsed.Hostname()
|
|
|
|
tk.WhatsappEndpointsCount[hostname]++
|
|
|
|
if tk.WhatsappEndpointsCount[hostname] >= 2 {
|
|
|
|
tk.WhatsappEndpointsBlocked = append(tk.WhatsappEndpointsBlocked, hostname)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
tk.WhatsappEndpointsStatus = "ok"
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Set the status of the registration service
|
|
|
|
if v.Input.Target == RegistrationServiceURL {
|
|
|
|
tk.RegistrationServerFailure = v.TestKeys.Failure
|
|
|
|
if v.TestKeys.Failure == nil {
|
|
|
|
tk.RegistrationServerStatus = "ok"
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Track result of accessing the web interface.
|
|
|
|
switch v.Input.Target {
|
|
|
|
case WebHTTPSURL:
|
|
|
|
tk.WhatsappHTTPSFailure = v.TestKeys.Failure
|
|
|
|
case WebHTTPURL:
|
|
|
|
failure := v.TestKeys.Failure
|
|
|
|
if failure != nil {
|
|
|
|
// nothing to do here
|
|
|
|
} else if v.TestKeys.HTTPResponseStatus != 302 {
|
2022-05-25 09:54:50 +02:00
|
|
|
failure = &model.HTTPUnexpectedStatusCode
|
2021-02-02 12:05:47 +01:00
|
|
|
} else if len(v.TestKeys.HTTPResponseLocations) != 1 {
|
2022-05-25 09:54:50 +02:00
|
|
|
failure = &model.HTTPUnexpectedRedirectURL
|
2021-02-02 12:05:47 +01:00
|
|
|
} else if v.TestKeys.HTTPResponseLocations[0] != WebHTTPSURL {
|
2022-05-25 09:54:50 +02:00
|
|
|
failure = &model.HTTPUnexpectedRedirectURL
|
2021-02-02 12:05:47 +01:00
|
|
|
}
|
|
|
|
tk.WhatsappHTTPFailure = failure
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ComputeWebStatus sets the web status fields.
|
|
|
|
func (tk *TestKeys) ComputeWebStatus() {
|
|
|
|
if tk.WhatsappHTTPFailure == nil && tk.WhatsappHTTPSFailure == nil {
|
|
|
|
tk.WhatsappWebFailure = nil
|
|
|
|
tk.WhatsappWebStatus = "ok"
|
|
|
|
return
|
|
|
|
}
|
|
|
|
tk.WhatsappWebStatus = "blocked" // must be here because of unit tests
|
|
|
|
if tk.WhatsappHTTPSFailure != nil {
|
|
|
|
tk.WhatsappWebFailure = tk.WhatsappHTTPSFailure
|
|
|
|
return
|
|
|
|
}
|
|
|
|
tk.WhatsappWebFailure = tk.WhatsappHTTPFailure
|
|
|
|
}
|
|
|
|
|
|
|
|
// Measurer performs the measurement
|
|
|
|
type Measurer struct {
|
|
|
|
// Config contains the experiment settings. If empty we
|
|
|
|
// will be using default settings.
|
|
|
|
Config Config
|
|
|
|
|
|
|
|
// Getter is an optional getter to be used for testing.
|
|
|
|
Getter urlgetter.MultiGetter
|
|
|
|
}
|
|
|
|
|
|
|
|
// ExperimentName implements ExperimentMeasurer.ExperimentName
|
|
|
|
func (m Measurer) ExperimentName() string {
|
|
|
|
return testName
|
|
|
|
}
|
|
|
|
|
|
|
|
// ExperimentVersion implements ExperimentMeasurer.ExperimentVersion
|
|
|
|
func (m Measurer) ExperimentVersion() string {
|
|
|
|
return testVersion
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run implements ExperimentMeasurer.Run
|
|
|
|
func (m Measurer) Run(
|
|
|
|
ctx context.Context, sess model.ExperimentSession,
|
|
|
|
measurement *model.Measurement, callbacks model.ExperimentCallbacks,
|
|
|
|
) error {
|
|
|
|
ctx, cancel := context.WithTimeout(ctx, 60*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
urlgetter.RegisterExtensions(measurement)
|
|
|
|
// generate all the inputs
|
|
|
|
var inputs []urlgetter.MultiInput
|
|
|
|
for idx := 1; idx <= 16; idx++ {
|
|
|
|
for _, port := range []string{"443", "5222"} {
|
|
|
|
inputs = append(inputs, urlgetter.MultiInput{
|
|
|
|
Target: fmt.Sprintf("tcpconnect://e%d.whatsapp.net:%s", idx, port),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
inputs = append(inputs, urlgetter.MultiInput{
|
|
|
|
Config: urlgetter.Config{FailOnHTTPError: true},
|
|
|
|
Target: RegistrationServiceURL,
|
|
|
|
})
|
|
|
|
inputs = append(inputs, urlgetter.MultiInput{
|
|
|
|
// We consider this check successful if we can establish a TLS
|
|
|
|
// connection and we don't see any socket/TLS errors. Hence, we
|
|
|
|
// don't care about the HTTP response code.
|
|
|
|
Target: WebHTTPSURL,
|
|
|
|
})
|
|
|
|
inputs = append(inputs, urlgetter.MultiInput{
|
|
|
|
// We consider this check successful if we get a valid redirect
|
|
|
|
// for the HTTPS web interface. No need to follow redirects.
|
|
|
|
Config: urlgetter.Config{NoFollowRedirects: true},
|
|
|
|
Target: WebHTTPURL,
|
|
|
|
})
|
|
|
|
rnd := rand.New(rand.NewSource(time.Now().UnixNano()))
|
|
|
|
rnd.Shuffle(len(inputs), func(i, j int) {
|
|
|
|
inputs[i], inputs[j] = inputs[j], inputs[i]
|
|
|
|
})
|
|
|
|
// measure in parallel
|
|
|
|
multi := urlgetter.Multi{Begin: time.Now(), Getter: m.Getter, Session: sess}
|
|
|
|
testkeys := NewTestKeys()
|
|
|
|
testkeys.Agent = "redirect"
|
|
|
|
measurement.TestKeys = testkeys
|
|
|
|
for entry := range multi.Collect(ctx, inputs, "whatsapp", callbacks) {
|
|
|
|
testkeys.Update(entry)
|
|
|
|
}
|
|
|
|
testkeys.ComputeWebStatus()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewExperimentMeasurer creates a new ExperimentMeasurer.
|
|
|
|
func NewExperimentMeasurer(config Config) model.ExperimentMeasurer {
|
|
|
|
return Measurer{Config: config}
|
|
|
|
}
|
|
|
|
|
|
|
|
// SummaryKeys contains summary keys for this experiment.
|
|
|
|
//
|
2022-05-09 09:33:18 +02:00
|
|
|
// Note that this structure is part of the ABI contract with ooniprobe
|
2021-02-02 12:05:47 +01:00
|
|
|
// therefore we should be careful when changing it.
|
|
|
|
type SummaryKeys struct {
|
|
|
|
RegistrationServerBlocking bool `json:"registration_server_blocking"`
|
|
|
|
WebBlocking bool `json:"whatsapp_web_blocking"`
|
|
|
|
EndpointsBlocking bool `json:"whatsapp_endpoints_blocking"`
|
|
|
|
IsAnomaly bool `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetSummaryKeys implements model.ExperimentMeasurer.GetSummaryKeys.
|
|
|
|
func (m Measurer) GetSummaryKeys(measurement *model.Measurement) (interface{}, error) {
|
|
|
|
sk := SummaryKeys{IsAnomaly: false}
|
|
|
|
tk, ok := measurement.TestKeys.(*TestKeys)
|
|
|
|
if !ok {
|
|
|
|
return sk, errors.New("invalid test keys type")
|
|
|
|
}
|
|
|
|
blocking := func(value string) bool {
|
|
|
|
return value == "blocked"
|
|
|
|
}
|
|
|
|
sk.RegistrationServerBlocking = blocking(tk.RegistrationServerStatus)
|
|
|
|
sk.WebBlocking = blocking(tk.WhatsappWebStatus)
|
|
|
|
sk.EndpointsBlocking = blocking(tk.WhatsappEndpointsStatus)
|
|
|
|
sk.IsAnomaly = (sk.RegistrationServerBlocking || sk.WebBlocking || sk.EndpointsBlocking)
|
|
|
|
return sk, nil
|
|
|
|
}
|