refactor(tracex): internally store just the raw certificate (#787)
By just storing the raw certificate we simplify the internal data structure we use. In turn, this enables us to write better unit tests using github.com/google/go-cmp where we can construct the expected result and compare with that. (Yeah, in principle we could also construct the full certificate but I'm not sure it's worth the effort since we basically only care about the raw certificate.) The general idea here is to make tracex more tested. Once it's more tested, I will create separate structs for each event, which is something that measurex also does. Once that is done, we can start ensuring that the code in measurex and the code in tracex do the same thing in terms of storing observations. When also this is done, we can then rewrite measurex to use tracex directly. The overall goal is https://github.com/ooni/probe/issues/2035.
This commit is contained in:
parent
83e3167ce2
commit
9354191b85
|
@ -5,7 +5,6 @@ package tracex
|
||||||
//
|
//
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/x509"
|
|
||||||
"errors"
|
"errors"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
@ -303,9 +302,9 @@ func NewTLSHandshakesList(begin time.Time, events []Event) (out []TLSHandshake)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func tlsMakePeerCerts(in []*x509.Certificate) (out []MaybeBinaryValue) {
|
func tlsMakePeerCerts(in [][]byte) (out []MaybeBinaryValue) {
|
||||||
for _, entry := range in {
|
for _, entry := range in {
|
||||||
out = append(out, MaybeBinaryValue{Value: string(entry.Raw)})
|
out = append(out, MaybeBinaryValue{Value: string(entry)})
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,7 +2,6 @@ package tracex
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"crypto/x509"
|
|
||||||
"errors"
|
"errors"
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
@ -533,11 +532,10 @@ func TestNewTLSHandshakesList(t *testing.T) {
|
||||||
Proto: "tcp",
|
Proto: "tcp",
|
||||||
TLSCipherSuite: "SUITE",
|
TLSCipherSuite: "SUITE",
|
||||||
TLSNegotiatedProto: "h2",
|
TLSNegotiatedProto: "h2",
|
||||||
TLSPeerCerts: []*x509.Certificate{{
|
TLSPeerCerts: [][]byte{
|
||||||
Raw: []byte("deadbeef"),
|
[]byte("deadbeef"),
|
||||||
}, {
|
[]byte("abad1dea"),
|
||||||
Raw: []byte("abad1dea"),
|
},
|
||||||
}},
|
|
||||||
TLSServerName: "x.org",
|
TLSServerName: "x.org",
|
||||||
TLSVersion: "TLSv1.3",
|
TLSVersion: "TLSv1.3",
|
||||||
Time: begin.Add(55 * time.Millisecond),
|
Time: begin.Add(55 * time.Millisecond),
|
||||||
|
@ -569,11 +567,10 @@ func TestNewTLSHandshakesList(t *testing.T) {
|
||||||
Proto: "quic",
|
Proto: "quic",
|
||||||
TLSCipherSuite: "SUITE",
|
TLSCipherSuite: "SUITE",
|
||||||
TLSNegotiatedProto: "h3",
|
TLSNegotiatedProto: "h3",
|
||||||
TLSPeerCerts: []*x509.Certificate{{
|
TLSPeerCerts: [][]byte{
|
||||||
Raw: []byte("deadbeef"),
|
[]byte("deadbeef"),
|
||||||
}, {
|
[]byte("abad1dea"),
|
||||||
Raw: []byte("abad1dea"),
|
},
|
||||||
}},
|
|
||||||
TLSServerName: "x.org",
|
TLSServerName: "x.org",
|
||||||
TLSVersion: "TLSv1.3",
|
TLSVersion: "TLSv1.3",
|
||||||
Time: begin.Add(55 * time.Millisecond),
|
Time: begin.Add(55 * time.Millisecond),
|
||||||
|
|
|
@ -5,7 +5,6 @@ package tracex
|
||||||
//
|
//
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/x509"
|
|
||||||
"errors"
|
"errors"
|
||||||
"net/http"
|
"net/http"
|
||||||
"time"
|
"time"
|
||||||
|
@ -275,30 +274,30 @@ func (ev *EventWriteOperation) Name() string {
|
||||||
|
|
||||||
// Event is one of the events within a trace
|
// Event is one of the events within a trace
|
||||||
type EventValue struct {
|
type EventValue struct {
|
||||||
Addresses []string `json:",omitempty"`
|
Addresses []string `json:",omitempty"`
|
||||||
Address string `json:",omitempty"`
|
Address string `json:",omitempty"`
|
||||||
DNSQuery []byte `json:",omitempty"`
|
DNSQuery []byte `json:",omitempty"`
|
||||||
DNSResponse []byte `json:",omitempty"`
|
DNSResponse []byte `json:",omitempty"`
|
||||||
Data []byte `json:",omitempty"`
|
Data []byte `json:",omitempty"`
|
||||||
Duration time.Duration `json:",omitempty"`
|
Duration time.Duration `json:",omitempty"`
|
||||||
Err FailureStr `json:",omitempty"`
|
Err FailureStr `json:",omitempty"`
|
||||||
HTTPMethod string `json:",omitempty"`
|
HTTPMethod string `json:",omitempty"`
|
||||||
HTTPRequestHeaders http.Header `json:",omitempty"`
|
HTTPRequestHeaders http.Header `json:",omitempty"`
|
||||||
HTTPResponseHeaders http.Header `json:",omitempty"`
|
HTTPResponseHeaders http.Header `json:",omitempty"`
|
||||||
HTTPResponseBody []byte `json:",omitempty"`
|
HTTPResponseBody []byte `json:",omitempty"`
|
||||||
HTTPResponseBodyIsTruncated bool `json:",omitempty"`
|
HTTPResponseBodyIsTruncated bool `json:",omitempty"`
|
||||||
HTTPStatusCode int `json:",omitempty"`
|
HTTPStatusCode int `json:",omitempty"`
|
||||||
HTTPURL string `json:",omitempty"`
|
HTTPURL string `json:",omitempty"`
|
||||||
Hostname string `json:",omitempty"`
|
Hostname string `json:",omitempty"`
|
||||||
NoTLSVerify bool `json:",omitempty"`
|
NoTLSVerify bool `json:",omitempty"`
|
||||||
NumBytes int `json:",omitempty"`
|
NumBytes int `json:",omitempty"`
|
||||||
Proto string `json:",omitempty"`
|
Proto string `json:",omitempty"`
|
||||||
TLSServerName string `json:",omitempty"`
|
TLSServerName string `json:",omitempty"`
|
||||||
TLSCipherSuite string `json:",omitempty"`
|
TLSCipherSuite string `json:",omitempty"`
|
||||||
TLSNegotiatedProto string `json:",omitempty"`
|
TLSNegotiatedProto string `json:",omitempty"`
|
||||||
TLSNextProtos []string `json:",omitempty"`
|
TLSNextProtos []string `json:",omitempty"`
|
||||||
TLSPeerCerts []*x509.Certificate `json:",omitempty"`
|
TLSPeerCerts [][]byte `json:",omitempty"`
|
||||||
TLSVersion string `json:",omitempty"`
|
TLSVersion string `json:",omitempty"`
|
||||||
Time time.Time `json:",omitempty"`
|
Time time.Time `json:",omitempty"`
|
||||||
Transport string `json:",omitempty"`
|
Transport string `json:",omitempty"`
|
||||||
}
|
}
|
||||||
|
|
|
@ -64,6 +64,7 @@ func (h *QUICDialerSaver) DialContext(ctx context.Context, network string,
|
||||||
NoTLSVerify: tlsCfg.InsecureSkipVerify,
|
NoTLSVerify: tlsCfg.InsecureSkipVerify,
|
||||||
Proto: network,
|
Proto: network,
|
||||||
TLSNextProtos: tlsCfg.NextProtos,
|
TLSNextProtos: tlsCfg.NextProtos,
|
||||||
|
TLSPeerCerts: [][]byte{},
|
||||||
TLSServerName: tlsCfg.ServerName,
|
TLSServerName: tlsCfg.ServerName,
|
||||||
Time: stop,
|
Time: stop,
|
||||||
}})
|
}})
|
||||||
|
|
|
@ -59,7 +59,7 @@ func TestQUICDialerSaver(t *testing.T) {
|
||||||
if value.TLSNegotiatedProto != "h3" {
|
if value.TLSNegotiatedProto != "h3" {
|
||||||
t.Fatal("invalid negotiated protocol")
|
t.Fatal("invalid negotiated protocol")
|
||||||
}
|
}
|
||||||
if diff := cmp.Diff(value.TLSPeerCerts, []*x509.Certificate{}); diff != "" {
|
if diff := cmp.Diff(value.TLSPeerCerts, [][]byte{{1, 2, 3, 4}}); diff != "" {
|
||||||
t.Fatal(diff)
|
t.Fatal(diff)
|
||||||
}
|
}
|
||||||
if value.TLSVersion != "TLSv1.3" {
|
if value.TLSVersion != "TLSv1.3" {
|
||||||
|
@ -83,7 +83,9 @@ func TestQUICDialerSaver(t *testing.T) {
|
||||||
cs := quic.ConnectionState{}
|
cs := quic.ConnectionState{}
|
||||||
cs.TLS.ConnectionState.CipherSuite = tls.TLS_RSA_WITH_RC4_128_SHA
|
cs.TLS.ConnectionState.CipherSuite = tls.TLS_RSA_WITH_RC4_128_SHA
|
||||||
cs.TLS.NegotiatedProtocol = "h3"
|
cs.TLS.NegotiatedProtocol = "h3"
|
||||||
cs.TLS.PeerCertificates = []*x509.Certificate{}
|
cs.TLS.PeerCertificates = []*x509.Certificate{{
|
||||||
|
Raw: []byte{1, 2, 3, 4},
|
||||||
|
}}
|
||||||
cs.TLS.Version = tls.VersionTLS13
|
cs.TLS.Version = tls.VersionTLS13
|
||||||
return cs
|
return cs
|
||||||
},
|
},
|
||||||
|
|
|
@ -77,22 +77,25 @@ var _ model.TLSHandshaker = &TLSHandshakerSaver{}
|
||||||
|
|
||||||
// tlsPeerCerts returns the certificates presented by the peer regardless
|
// tlsPeerCerts returns the certificates presented by the peer regardless
|
||||||
// of whether the TLS handshake was successful
|
// of whether the TLS handshake was successful
|
||||||
func tlsPeerCerts(state tls.ConnectionState, err error) []*x509.Certificate {
|
func tlsPeerCerts(state tls.ConnectionState, err error) (out [][]byte) {
|
||||||
var x509HostnameError x509.HostnameError
|
var x509HostnameError x509.HostnameError
|
||||||
if errors.As(err, &x509HostnameError) {
|
if errors.As(err, &x509HostnameError) {
|
||||||
// Test case: https://wrong.host.badssl.com/
|
// Test case: https://wrong.host.badssl.com/
|
||||||
return []*x509.Certificate{x509HostnameError.Certificate}
|
return [][]byte{x509HostnameError.Certificate.Raw}
|
||||||
}
|
}
|
||||||
var x509UnknownAuthorityError x509.UnknownAuthorityError
|
var x509UnknownAuthorityError x509.UnknownAuthorityError
|
||||||
if errors.As(err, &x509UnknownAuthorityError) {
|
if errors.As(err, &x509UnknownAuthorityError) {
|
||||||
// Test case: https://self-signed.badssl.com/. This error has
|
// Test case: https://self-signed.badssl.com/. This error has
|
||||||
// never been among the ones returned by MK.
|
// never been among the ones returned by MK.
|
||||||
return []*x509.Certificate{x509UnknownAuthorityError.Cert}
|
return [][]byte{x509UnknownAuthorityError.Cert.Raw}
|
||||||
}
|
}
|
||||||
var x509CertificateInvalidError x509.CertificateInvalidError
|
var x509CertificateInvalidError x509.CertificateInvalidError
|
||||||
if errors.As(err, &x509CertificateInvalidError) {
|
if errors.As(err, &x509CertificateInvalidError) {
|
||||||
// Test case: https://expired.badssl.com/
|
// Test case: https://expired.badssl.com/
|
||||||
return []*x509.Certificate{x509CertificateInvalidError.Cert}
|
return [][]byte{x509CertificateInvalidError.Cert.Raw}
|
||||||
}
|
}
|
||||||
return state.PeerCertificates
|
for _, cert := range state.PeerCertificates {
|
||||||
|
out = append(out, cert.Raw)
|
||||||
|
}
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
|
@ -57,7 +57,7 @@ func TestTLSHandshakerSaver(t *testing.T) {
|
||||||
if value.TLSNegotiatedProto != "h2" {
|
if value.TLSNegotiatedProto != "h2" {
|
||||||
t.Fatal("invalid negotiated protocol")
|
t.Fatal("invalid negotiated protocol")
|
||||||
}
|
}
|
||||||
if diff := cmp.Diff(value.TLSPeerCerts, []*x509.Certificate{}); diff != "" {
|
if diff := cmp.Diff(value.TLSPeerCerts, [][]byte{{1, 2, 3, 4}}); diff != "" {
|
||||||
t.Fatal(diff)
|
t.Fatal(diff)
|
||||||
}
|
}
|
||||||
if value.TLSVersion != "TLSv1.3" {
|
if value.TLSVersion != "TLSv1.3" {
|
||||||
|
@ -79,8 +79,10 @@ func TestTLSHandshakerSaver(t *testing.T) {
|
||||||
returnedConnState := tls.ConnectionState{
|
returnedConnState := tls.ConnectionState{
|
||||||
CipherSuite: tls.TLS_RSA_WITH_RC4_128_SHA,
|
CipherSuite: tls.TLS_RSA_WITH_RC4_128_SHA,
|
||||||
NegotiatedProtocol: "h2",
|
NegotiatedProtocol: "h2",
|
||||||
PeerCertificates: []*x509.Certificate{},
|
PeerCertificates: []*x509.Certificate{{
|
||||||
Version: tls.VersionTLS13,
|
Raw: []byte{1, 2, 3, 4},
|
||||||
|
}},
|
||||||
|
Version: tls.VersionTLS13,
|
||||||
}
|
}
|
||||||
returnedConn := &mocks.TLSConn{
|
returnedConn := &mocks.TLSConn{
|
||||||
MockConnectionState: func() tls.ConnectionState {
|
MockConnectionState: func() tls.ConnectionState {
|
||||||
|
@ -200,7 +202,7 @@ func Test_tlsPeerCerts(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
args args
|
args args
|
||||||
want []*x509.Certificate
|
want [][]byte
|
||||||
}{{
|
}{{
|
||||||
name: "no error",
|
name: "no error",
|
||||||
args: args{
|
args: args{
|
||||||
|
@ -208,7 +210,7 @@ func Test_tlsPeerCerts(t *testing.T) {
|
||||||
PeerCertificates: []*x509.Certificate{cert0},
|
PeerCertificates: []*x509.Certificate{cert0},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
want: []*x509.Certificate{cert0},
|
want: [][]byte{cert0.Raw},
|
||||||
}, {
|
}, {
|
||||||
name: "all empty",
|
name: "all empty",
|
||||||
args: args{},
|
args: args{},
|
||||||
|
@ -221,7 +223,7 @@ func Test_tlsPeerCerts(t *testing.T) {
|
||||||
Certificate: cert0,
|
Certificate: cert0,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
want: []*x509.Certificate{cert0},
|
want: [][]byte{cert0.Raw},
|
||||||
}, {
|
}, {
|
||||||
name: "x509.UnknownAuthorityError",
|
name: "x509.UnknownAuthorityError",
|
||||||
args: args{
|
args: args{
|
||||||
|
@ -230,7 +232,7 @@ func Test_tlsPeerCerts(t *testing.T) {
|
||||||
Cert: cert0,
|
Cert: cert0,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
want: []*x509.Certificate{cert0},
|
want: [][]byte{cert0.Raw},
|
||||||
}, {
|
}, {
|
||||||
name: "x509.CertificateInvalidError",
|
name: "x509.CertificateInvalidError",
|
||||||
args: args{
|
args: args{
|
||||||
|
@ -239,7 +241,7 @@ func Test_tlsPeerCerts(t *testing.T) {
|
||||||
Cert: cert0,
|
Cert: cert0,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
want: []*x509.Certificate{cert0},
|
want: [][]byte{cert0.Raw},
|
||||||
}}
|
}}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
|
Loading…
Reference in New Issue
Block a user