7df25795c0
See https://github.com/ooni/probe/issues/2147. Note that this PR also tries to reduce usage of legacy names inside unit/integration tests.
131 lines
3.4 KiB
Go
131 lines
3.4 KiB
Go
package httpproxy
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"net"
|
|
"net/http"
|
|
"testing"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/cmd/jafar/uncensored"
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite"
|
|
)
|
|
|
|
func TestPass(t *testing.T) {
|
|
server, addr := newproxy(t, "ooni.io")
|
|
// We're filtering ooni.io, so we expect example.com to pass
|
|
// through the proxy with 200 and we also expect to see the
|
|
// Via header in the responses we receive, of course.
|
|
checkrequest(t, addr.String(), "example.com", 200, true)
|
|
killproxy(t, server)
|
|
}
|
|
|
|
func TestBlock(t *testing.T) {
|
|
server, addr := newproxy(t, "ooni.io")
|
|
// Here we're filtering any domain containing ooni.io, so we
|
|
// expect the proxy to send 451 without actually proxing, thus
|
|
// there should not be any Via header in the output.
|
|
checkrequest(t, addr.String(), "api.ooni.io", 451, false)
|
|
killproxy(t, server)
|
|
}
|
|
|
|
func TestLoop(t *testing.T) {
|
|
server, addr := newproxy(t, "ooni.io")
|
|
// Here we're forcing the proxy to connect to itself. It does
|
|
// does that and recognizes itself because of the Via header
|
|
// being set in the request generated by the connection to itself,
|
|
// which should cause a 400. The response should have the Via
|
|
// header set because the 400 is received by the connection that
|
|
// this code has made to the proxy.
|
|
checkrequest(t, addr.String(), addr.String(), 400, true)
|
|
killproxy(t, server)
|
|
}
|
|
|
|
func TestListenError(t *testing.T) {
|
|
proxy := NewCensoringProxy([]string{""}, uncensored.NewClient("https://1.1.1.1/dns-query"))
|
|
server, addr, err := proxy.Start("8.8.8.8:80")
|
|
if err == nil {
|
|
t.Fatal("expected an error here")
|
|
}
|
|
if server != nil {
|
|
t.Fatal("expected nil server here")
|
|
}
|
|
if addr != nil {
|
|
t.Fatal("expected nil addr here")
|
|
}
|
|
}
|
|
|
|
func newproxy(t *testing.T, blocked string) (*http.Server, net.Addr) {
|
|
proxy := NewCensoringProxy([]string{blocked}, uncensored.NewClient("https://1.1.1.1/dns-query"))
|
|
server, addr, err := proxy.Start("127.0.0.1:0")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
return server, addr
|
|
}
|
|
|
|
func killproxy(t *testing.T, server *http.Server) {
|
|
err := server.Shutdown(context.Background())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func checkrequest(
|
|
t *testing.T, proxyAddr, host string,
|
|
expectStatus int, expectVia bool,
|
|
) {
|
|
req, err := http.NewRequest("GET", "http://"+proxyAddr, nil)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
req.Host = host
|
|
resp, err := http.DefaultClient.Do(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != expectStatus {
|
|
t.Fatal("unexpected value of status code")
|
|
}
|
|
t.Log(resp)
|
|
values := resp.Header["Via"]
|
|
var foundProduct bool
|
|
for _, value := range values {
|
|
if value == product {
|
|
foundProduct = true
|
|
}
|
|
}
|
|
if foundProduct && !expectVia {
|
|
t.Fatal("unexpectedly found Via header")
|
|
}
|
|
if !foundProduct && expectVia {
|
|
t.Fatal("Via header not found")
|
|
}
|
|
proxiedData, err := netxlite.ReadAllContext(context.Background(), resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if expectStatus == 200 {
|
|
checkbody(t, proxiedData, host)
|
|
}
|
|
}
|
|
|
|
func checkbody(t *testing.T, proxiedData []byte, host string) {
|
|
resp, err := http.Get("http://" + host)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.StatusCode != 200 {
|
|
t.Fatal("unexpected status code")
|
|
}
|
|
defer resp.Body.Close()
|
|
data, err := netxlite.ReadAllContext(context.Background(), resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if bytes.Equal(data, proxiedData) == false {
|
|
t.Fatal("body mismatch")
|
|
}
|
|
}
|