2022-05-31 21:53:01 +02:00
|
|
|
package tracex
|
2021-02-02 12:05:47 +01:00
|
|
|
|
|
|
|
import (
|
2022-06-01 19:27:47 +02:00
|
|
|
"bytes"
|
2021-06-15 11:57:40 +02:00
|
|
|
"context"
|
2021-02-02 12:05:47 +01:00
|
|
|
"errors"
|
2021-06-15 14:01:45 +02:00
|
|
|
"io"
|
2021-02-02 12:05:47 +01:00
|
|
|
"net/http"
|
fix(netxlite): do not mutate outgoing requests (#508)
I have recently seen a data race related our way of
mutating the outgoing request to set the host header.
Unfortunately, I've lost track of the race output,
because I rebooted my Linux box before saving it.
Though, after inspecting why and and where we're mutating
outgoing requets, I've found that:
1. we add the host header when logging to have it logged,
which is not a big deal since we already emit the URL
rather than just the URL path when logging a request, and
so we can safely zap this piece of code;
2. as a result, in measurements we may omit the host header
but again this is pretty much obvious from the URL itself
and so it should not be very important (nonetheless,
avoid surprises and keep the existing behavior);
3. when the User-Agent header is not set, we default to
a `miniooni/0.1.0-dev` user agent, which is probably not
very useful anyway, so we can actually remove it.
Part of https://github.com/ooni/probe/issues/1733 (this diff
has been extracted from https://github.com/ooni/probe-cli/pull/506).
2021-09-27 13:35:47 +02:00
|
|
|
"net/url"
|
2021-02-02 12:05:47 +01:00
|
|
|
"testing"
|
|
|
|
|
feature: merge measurex and netx archival layer (1/N) (#663)
This diff introduces a new package called `./internal/archival`. This package collects data from `./internal/model` network interfaces (e.g., `Dialer`, `QUICDialer`, `HTTPTransport`), saves such data into an internal tabular data format suitable for on-line processing and analysis, and allows exporting data into the OONI data format.
The code for collecting and the internal tabular data formats are adapted from `measurex`. The code for formatting and exporting OONI data-format-compliant structures is adapted from `netx/archival`.
My original objective was to _also_ (1) fully replace `netx/archival` with this package and (2) adapt `measurex` to use this package rather than its own code. Both operations seem easily feasible because: (a) this code is `measurex` code without extensions that are `measurex` related, which will need to be added back as part of the process; (b) the API provided by this code allows for trivially converting from using `netx/archival` to using this code.
Yet, both changes should not be taken lightly. After implementing them, there's need to spend some time doing QA and ensuring all nettests work as intended. However, I am planning a release in the next two weeks, and this QA task is likely going to defer the release. For this reason, I have chosen to commit the work done so far into the tree and defer the second part of this refactoring for a later moment in time. (This explains why the title mentions "1/N").
On a more high-level perspective, it would also be beneficial, I guess, to explain _why_ I am doing these changes. There are two intertwined reasons. The first reason is that `netx/archival` has shortcomings deriving from its original https://github.com/ooni/netx legacy. The most relevant shortcoming is that it saves all kind of data into the same tabular structure named `Event`. This design choice is unfortunate because it does not allow one to apply data-type specific logic when processing the results. In turn, this choice results in complex processing code. Therefore, I believe that replacing the code with event-specific data structures is clearly an improvement in terms of code maintainability and would quite likely lead us to more confidently change and evolve the codebase.
The second reason why I would like to move forward these changes is to unify the codepaths used for measuring. At this point in time, we basically have two codepaths: `./internal/engine/netx` and `./internal/measurex`. They both have pros and cons and I don't think we want to rewrite whole experiments using `netx`. Rather, what we probably want is to gradually merge these two codepaths such that `netx` is a set of abstractions on top of `measurex` (which is more low-level and has a more-easily-testable design). Because saving events and generating an archival data format out of them consists of at least 50% of the complexity of both `netx` and `measurex`, it seems reasonable to unify this archival-related part of the two codebases as the first step.
At the highest level of abstraction, these changes are part of the train of changes which will eventually lead us to bless `websteps` as a first class citizen in OONI land. Because `websteps` requires different underlying primitives, I chose to develop these primitives from scratch rather than wrestling with `netx`, which used another model. The model used by `websteps` is that we perform each operation in isolation and immediately we save the results, while `netx` creates whole data structures and collects all the events happening via tracing. We believe the model used by `websteps` to be better because it does not require your code to figure out everything that happened after the measurement, which is a source of subtle bugs in the current implementation. So, when I started implementing websteps I extracted the bits of `netx` that could also be beneficial to `websteps` into a separate library, thus `netxlite` was born.
The reference issue describing merging the archival of `netx` and `measurex` is https://github.com/ooni/probe/issues/1957. As of this writing the issue still references the original plan, which I could not complete by the end of this Sprint, so I am going to adapt the text of the issue to only refer to what was done in here next. Of course, I also need follow-up issues.
2022-01-14 12:13:10 +01:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/model"
|
2022-06-01 19:27:47 +02:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/model/mocks"
|
2021-09-28 12:42:01 +02:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite"
|
2022-06-01 19:27:47 +02:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite/filtering"
|
2021-02-02 12:05:47 +01:00
|
|
|
)
|
|
|
|
|
2022-06-05 21:22:27 +02:00
|
|
|
func TestMaybeWrapHTTPTransport(t *testing.T) {
|
|
|
|
const snapshotSize = 1024
|
|
|
|
|
|
|
|
t.Run("with non-nil saver", func(t *testing.T) {
|
|
|
|
saver := &Saver{}
|
|
|
|
underlying := &mocks.HTTPTransport{}
|
|
|
|
txp := saver.MaybeWrapHTTPTransport(underlying, snapshotSize)
|
|
|
|
realTxp := txp.(*HTTPTransportSaver)
|
|
|
|
if realTxp.HTTPTransport != underlying {
|
|
|
|
t.Fatal("unexpected result")
|
|
|
|
}
|
|
|
|
if realTxp.SnapshotSize != snapshotSize {
|
|
|
|
t.Fatal("did not set snapshotSize correctly")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("with nil saver", func(t *testing.T) {
|
|
|
|
var saver *Saver
|
|
|
|
underlying := &mocks.HTTPTransport{}
|
|
|
|
txp := saver.MaybeWrapHTTPTransport(underlying, snapshotSize)
|
|
|
|
if txp != underlying {
|
|
|
|
t.Fatal("unexpected result")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
func TestHTTPTransportSaver(t *testing.T) {
|
2021-02-02 12:05:47 +01:00
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
t.Run("CloseIdleConnections", func(t *testing.T) {
|
|
|
|
var called bool
|
|
|
|
child := &mocks.HTTPTransport{
|
|
|
|
MockCloseIdleConnections: func() {
|
|
|
|
called = true
|
2022-06-01 19:27:47 +02:00
|
|
|
},
|
|
|
|
}
|
2022-06-01 23:15:47 +02:00
|
|
|
dialer := &HTTPTransportSaver{
|
|
|
|
HTTPTransport: child,
|
|
|
|
Saver: &Saver{},
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
2022-06-01 23:15:47 +02:00
|
|
|
dialer.CloseIdleConnections()
|
|
|
|
if !called {
|
|
|
|
t.Fatal("not called")
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
2022-06-01 23:15:47 +02:00
|
|
|
})
|
2021-02-02 12:05:47 +01:00
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
t.Run("Network", func(t *testing.T) {
|
|
|
|
expected := "antani"
|
|
|
|
child := &mocks.HTTPTransport{
|
|
|
|
MockNetwork: func() string {
|
|
|
|
return expected
|
|
|
|
},
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
2022-06-01 23:15:47 +02:00
|
|
|
dialer := &HTTPTransportSaver{
|
|
|
|
HTTPTransport: child,
|
|
|
|
Saver: &Saver{},
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
2022-06-01 23:15:47 +02:00
|
|
|
if dialer.Network() != expected {
|
|
|
|
t.Fatal("unexpected Network")
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
2022-06-01 23:15:47 +02:00
|
|
|
})
|
2021-02-02 12:05:47 +01:00
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
t.Run("RoundTrip", func(t *testing.T) {
|
2021-02-02 12:05:47 +01:00
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
measureHTTP := func(t *testing.T, URL *url.URL) (*http.Response, *Saver, error) {
|
|
|
|
saver := &Saver{}
|
|
|
|
txp := &HTTPTransportSaver{
|
|
|
|
HTTPTransport: netxlite.NewHTTPTransportStdlib(model.DiscardLogger),
|
|
|
|
Saver: saver,
|
|
|
|
}
|
|
|
|
req, err := http.NewRequest("GET", URL.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
req.Header.Add("User-Agent", "miniooni")
|
|
|
|
resp, err := txp.RoundTrip(req)
|
|
|
|
return resp, saver, err
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
2021-02-02 12:05:47 +01:00
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
validateRequestFields := func(t *testing.T, value *EventValue, URL *url.URL) {
|
|
|
|
if value.HTTPMethod != "GET" {
|
|
|
|
t.Fatal("invalid method")
|
|
|
|
}
|
|
|
|
if value.HTTPRequestHeaders.Get("Host") != URL.Host {
|
|
|
|
t.Fatal("invalid Host header")
|
|
|
|
}
|
|
|
|
if value.HTTPRequestHeaders.Get("User-Agent") != "miniooni" {
|
|
|
|
t.Fatal("invalid User-Agent header")
|
|
|
|
}
|
|
|
|
if value.HTTPURL != URL.String() {
|
|
|
|
t.Fatal("invalid URL")
|
|
|
|
}
|
|
|
|
if value.Time.IsZero() {
|
|
|
|
t.Fatal("expected nonzero Time")
|
|
|
|
}
|
|
|
|
if value.Transport != "tcp" {
|
|
|
|
t.Fatal("expected Transport to be tcp")
|
|
|
|
}
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
validateRequest := func(t *testing.T, ev Event, URL *url.URL) {
|
|
|
|
if _, good := ev.(*EventHTTPTransactionStart); !good {
|
|
|
|
t.Fatal("invalid event type")
|
|
|
|
}
|
|
|
|
if ev.Name() != "http_transaction_start" {
|
|
|
|
t.Fatal("invalid event name")
|
|
|
|
}
|
|
|
|
value := ev.Value()
|
|
|
|
validateRequestFields(t, value, URL)
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
2021-02-02 12:05:47 +01:00
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
validateResponseSuccess := func(t *testing.T, ev Event, URL *url.URL) {
|
|
|
|
if _, good := ev.(*EventHTTPTransactionDone); !good {
|
|
|
|
t.Fatal("invalid event type")
|
|
|
|
}
|
|
|
|
if ev.Name() != "http_transaction_done" {
|
|
|
|
t.Fatal("invalid event name")
|
|
|
|
}
|
|
|
|
value := ev.Value()
|
|
|
|
validateRequestFields(t, value, URL)
|
|
|
|
if value.Duration <= 0 {
|
|
|
|
t.Fatal("expected nonzero duration")
|
|
|
|
}
|
|
|
|
if len(value.HTTPResponseHeaders) <= 0 {
|
|
|
|
t.Fatal("expected at least one response header")
|
|
|
|
}
|
|
|
|
if !bytes.Equal(value.HTTPResponseBody, filtering.HTTPBlockpage451) {
|
|
|
|
t.Fatal("unexpected value for response body")
|
|
|
|
}
|
|
|
|
if value.HTTPStatusCode != 451 {
|
|
|
|
t.Fatal("unexpected status code")
|
|
|
|
}
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
t.Run("on success", func(t *testing.T) {
|
2022-06-02 22:25:37 +02:00
|
|
|
server := filtering.NewHTTPServerCleartext(filtering.HTTPAction451)
|
|
|
|
defer server.Close()
|
|
|
|
resp, saver, err := measureHTTP(t, server.URL())
|
2022-06-01 23:15:47 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != 451 {
|
|
|
|
t.Fatal("unexpected status code", resp.StatusCode)
|
|
|
|
}
|
|
|
|
events := saver.Read()
|
|
|
|
if len(events) != 2 {
|
|
|
|
t.Fatal("unexpected number of events")
|
|
|
|
}
|
2022-06-02 22:25:37 +02:00
|
|
|
validateRequest(t, events[0], server.URL())
|
|
|
|
validateResponseSuccess(t, events[1], server.URL())
|
2022-06-01 23:15:47 +02:00
|
|
|
data, err := netxlite.ReadAllContext(context.Background(), resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !bytes.Equal(data, filtering.HTTPBlockpage451) {
|
|
|
|
t.Fatal("we cannot re-read the same body")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
validateResponseFailure := func(t *testing.T, ev Event, URL *url.URL) {
|
|
|
|
if _, good := ev.(*EventHTTPTransactionDone); !good {
|
|
|
|
t.Fatal("invalid event type")
|
|
|
|
}
|
|
|
|
if ev.Name() != "http_transaction_done" {
|
|
|
|
t.Fatal("invalid event name")
|
|
|
|
}
|
|
|
|
value := ev.Value()
|
|
|
|
validateRequestFields(t, value, URL)
|
|
|
|
if value.Duration <= 0 {
|
|
|
|
t.Fatal("expected nonzero duration")
|
|
|
|
}
|
refactor(tracex): internally represent errors as strings (#786)
There are two reasons why this is beneficial:
1. github.com/google/go-cmp is more annoying to use for comparing
data structures when there are interfaces to compare. Sure, there's
a recipe for teaching it to compare errors, but how about making
the errors trivially comparable instead?
2. if we want to send errors over the network, JSON serialization
works but we cannot unmarshal the resulting string back to an error,
so how about making this representation trivial to serialize (we
are not going this now, but we need this property for websteps and
it may be sensible to try to avoid to have duplicate code because
of that -- measurex currently duplicates many tracex functionality
and this is quite unfortunate because it slows development down)
Additionally, if an error is a string:
3. we can very easily use a switch for comparing its possible
values with "" representing the absence of errors, while it is
more complex to do the same when using a nullable string or even
an error (i.e., an interface)
4. if a type is not nullable, it's easier to write safe code for
it and we may want to refactor experiments to use the internal
representation of measurements for more robust processing code
For all these reasons, let's internally use strings in tracex.
The overall aim here is to reduce the duplicated code between pre
and post-measurex measurements (see https://github.com/ooni/probe/issues/2035).
2022-06-02 10:37:07 +02:00
|
|
|
if value.Err != netxlite.FailureConnectionReset {
|
2022-06-01 23:15:47 +02:00
|
|
|
t.Fatal("unexpected Err value")
|
|
|
|
}
|
|
|
|
if len(value.HTTPResponseHeaders) > 0 {
|
|
|
|
t.Fatal("expected zero response headers")
|
|
|
|
}
|
|
|
|
if !bytes.Equal(value.HTTPResponseBody, nil) {
|
|
|
|
t.Fatal("unexpected value for response body")
|
|
|
|
}
|
|
|
|
if value.HTTPStatusCode != 0 {
|
|
|
|
t.Fatal("unexpected status code")
|
|
|
|
}
|
2022-06-01 19:27:47 +02:00
|
|
|
}
|
|
|
|
|
2022-06-01 23:15:47 +02:00
|
|
|
t.Run("on round trip failure", func(t *testing.T) {
|
2022-06-02 22:25:37 +02:00
|
|
|
server := filtering.NewHTTPServerCleartext(filtering.HTTPActionReset)
|
|
|
|
defer server.Close()
|
|
|
|
resp, saver, err := measureHTTP(t, server.URL())
|
2022-06-01 23:15:47 +02:00
|
|
|
if err == nil || err.Error() != "connection_reset" {
|
|
|
|
t.Fatal("unexpected err", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("expected nil response")
|
|
|
|
}
|
|
|
|
events := saver.Read()
|
|
|
|
if len(events) != 2 {
|
|
|
|
t.Fatal("unexpected number of events")
|
|
|
|
}
|
2022-06-02 22:25:37 +02:00
|
|
|
validateRequest(t, events[0], server.URL())
|
|
|
|
validateResponseFailure(t, events[1], server.URL())
|
2022-06-01 23:15:47 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
// Sometimes useful for testing
|
|
|
|
/*
|
|
|
|
dump := func(t *testing.T, ev Event) {
|
|
|
|
data, _ := json.MarshalIndent(ev.Value(), " ", " ")
|
|
|
|
t.Log(string(data))
|
|
|
|
t.Fail()
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
|
|
|
t.Run("on error reading the response body", func(t *testing.T) {
|
|
|
|
saver := &Saver{}
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
txp := HTTPTransportSaver{
|
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockRoundTrip: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return &http.Response{
|
|
|
|
Header: http.Header{
|
|
|
|
"Server": {"antani"},
|
2022-06-01 19:27:47 +02:00
|
|
|
},
|
2022-06-01 23:15:47 +02:00
|
|
|
StatusCode: 200,
|
|
|
|
Body: io.NopCloser(&mocks.Reader{
|
|
|
|
MockRead: func(b []byte) (int, error) {
|
|
|
|
return 0, expected
|
|
|
|
},
|
|
|
|
}),
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
MockNetwork: func() string {
|
|
|
|
return "tcp"
|
|
|
|
},
|
2022-06-01 19:27:47 +02:00
|
|
|
},
|
2022-06-01 23:15:47 +02:00
|
|
|
SnapshotSize: 4,
|
|
|
|
Saver: saver,
|
|
|
|
}
|
|
|
|
URL := &url.URL{
|
|
|
|
Scheme: "http",
|
|
|
|
Host: "127.0.0.1:9050",
|
|
|
|
}
|
|
|
|
req, err := http.NewRequest("GET", URL.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
req.Header.Add("User-Agent", "miniooni")
|
|
|
|
resp, err := txp.RoundTrip(req)
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("not the error we expected")
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("expected nil response")
|
|
|
|
}
|
|
|
|
ev := saver.Read()
|
|
|
|
validateRequest(t, ev[0], URL)
|
|
|
|
if ev[1].Value().HTTPStatusCode != 200 {
|
|
|
|
t.Fatal("invalid status code")
|
|
|
|
}
|
|
|
|
if ev[1].Value().HTTPResponseHeaders.Get("Server") != "antani" {
|
|
|
|
t.Fatal("invalid Server header")
|
|
|
|
}
|
refactor(tracex): internally represent errors as strings (#786)
There are two reasons why this is beneficial:
1. github.com/google/go-cmp is more annoying to use for comparing
data structures when there are interfaces to compare. Sure, there's
a recipe for teaching it to compare errors, but how about making
the errors trivially comparable instead?
2. if we want to send errors over the network, JSON serialization
works but we cannot unmarshal the resulting string back to an error,
so how about making this representation trivial to serialize (we
are not going this now, but we need this property for websteps and
it may be sensible to try to avoid to have duplicate code because
of that -- measurex currently duplicates many tracex functionality
and this is quite unfortunate because it slows development down)
Additionally, if an error is a string:
3. we can very easily use a switch for comparing its possible
values with "" representing the absence of errors, while it is
more complex to do the same when using a nullable string or even
an error (i.e., an interface)
4. if a type is not nullable, it's easier to write safe code for
it and we may want to refactor experiments to use the internal
representation of measurements for more robust processing code
For all these reasons, let's internally use strings in tracex.
The overall aim here is to reduce the duplicated code between pre
and post-measurex measurements (see https://github.com/ooni/probe/issues/2035).
2022-06-02 10:37:07 +02:00
|
|
|
if ev[1].Value().Err != "unknown_failure: mocked error" {
|
2022-06-01 23:15:47 +02:00
|
|
|
t.Fatal("invalid error")
|
|
|
|
}
|
|
|
|
})
|
2022-06-01 19:27:47 +02:00
|
|
|
})
|
2021-02-02 12:05:47 +01:00
|
|
|
}
|
fix(netxlite): do not mutate outgoing requests (#508)
I have recently seen a data race related our way of
mutating the outgoing request to set the host header.
Unfortunately, I've lost track of the race output,
because I rebooted my Linux box before saving it.
Though, after inspecting why and and where we're mutating
outgoing requets, I've found that:
1. we add the host header when logging to have it logged,
which is not a big deal since we already emit the URL
rather than just the URL path when logging a request, and
so we can safely zap this piece of code;
2. as a result, in measurements we may omit the host header
but again this is pretty much obvious from the URL itself
and so it should not be very important (nonetheless,
avoid surprises and keep the existing behavior);
3. when the User-Agent header is not set, we default to
a `miniooni/0.1.0-dev` user agent, which is probably not
very useful anyway, so we can actually remove it.
Part of https://github.com/ooni/probe/issues/1733 (this diff
has been extracted from https://github.com/ooni/probe-cli/pull/506).
2021-09-27 13:35:47 +02:00
|
|
|
|
2022-06-01 19:27:47 +02:00
|
|
|
func TestHTTPCloneRequestHeaders(t *testing.T) {
|
fix(netxlite): do not mutate outgoing requests (#508)
I have recently seen a data race related our way of
mutating the outgoing request to set the host header.
Unfortunately, I've lost track of the race output,
because I rebooted my Linux box before saving it.
Though, after inspecting why and and where we're mutating
outgoing requets, I've found that:
1. we add the host header when logging to have it logged,
which is not a big deal since we already emit the URL
rather than just the URL path when logging a request, and
so we can safely zap this piece of code;
2. as a result, in measurements we may omit the host header
but again this is pretty much obvious from the URL itself
and so it should not be very important (nonetheless,
avoid surprises and keep the existing behavior);
3. when the User-Agent header is not set, we default to
a `miniooni/0.1.0-dev` user agent, which is probably not
very useful anyway, so we can actually remove it.
Part of https://github.com/ooni/probe/issues/1733 (this diff
has been extracted from https://github.com/ooni/probe-cli/pull/506).
2021-09-27 13:35:47 +02:00
|
|
|
t.Run("with req.Host set", func(t *testing.T) {
|
|
|
|
req := &http.Request{
|
|
|
|
Host: "www.example.com",
|
|
|
|
URL: &url.URL{
|
|
|
|
Host: "www.kernel.org",
|
|
|
|
},
|
|
|
|
Header: http.Header{},
|
|
|
|
}
|
2022-06-01 15:20:28 +02:00
|
|
|
header := httpCloneRequestHeaders(req)
|
fix(netxlite): do not mutate outgoing requests (#508)
I have recently seen a data race related our way of
mutating the outgoing request to set the host header.
Unfortunately, I've lost track of the race output,
because I rebooted my Linux box before saving it.
Though, after inspecting why and and where we're mutating
outgoing requets, I've found that:
1. we add the host header when logging to have it logged,
which is not a big deal since we already emit the URL
rather than just the URL path when logging a request, and
so we can safely zap this piece of code;
2. as a result, in measurements we may omit the host header
but again this is pretty much obvious from the URL itself
and so it should not be very important (nonetheless,
avoid surprises and keep the existing behavior);
3. when the User-Agent header is not set, we default to
a `miniooni/0.1.0-dev` user agent, which is probably not
very useful anyway, so we can actually remove it.
Part of https://github.com/ooni/probe/issues/1733 (this diff
has been extracted from https://github.com/ooni/probe-cli/pull/506).
2021-09-27 13:35:47 +02:00
|
|
|
if header.Get("Host") != "www.example.com" {
|
|
|
|
t.Fatal("did not set Host header correctly")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("with only req.URL.Host set", func(t *testing.T) {
|
|
|
|
req := &http.Request{
|
|
|
|
Host: "",
|
|
|
|
URL: &url.URL{
|
|
|
|
Host: "www.kernel.org",
|
|
|
|
},
|
|
|
|
Header: http.Header{},
|
|
|
|
}
|
2022-06-01 15:20:28 +02:00
|
|
|
header := httpCloneRequestHeaders(req)
|
fix(netxlite): do not mutate outgoing requests (#508)
I have recently seen a data race related our way of
mutating the outgoing request to set the host header.
Unfortunately, I've lost track of the race output,
because I rebooted my Linux box before saving it.
Though, after inspecting why and and where we're mutating
outgoing requets, I've found that:
1. we add the host header when logging to have it logged,
which is not a big deal since we already emit the URL
rather than just the URL path when logging a request, and
so we can safely zap this piece of code;
2. as a result, in measurements we may omit the host header
but again this is pretty much obvious from the URL itself
and so it should not be very important (nonetheless,
avoid surprises and keep the existing behavior);
3. when the User-Agent header is not set, we default to
a `miniooni/0.1.0-dev` user agent, which is probably not
very useful anyway, so we can actually remove it.
Part of https://github.com/ooni/probe/issues/1733 (this diff
has been extracted from https://github.com/ooni/probe-cli/pull/506).
2021-09-27 13:35:47 +02:00
|
|
|
if header.Get("Host") != "www.kernel.org" {
|
|
|
|
t.Fatal("did not set Host header correctly")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|