5ebdeb56ca
## Checklist - [x] I have read the [contribution guidelines](https://github.com/ooni/probe-cli/blob/master/CONTRIBUTING.md) - [x] reference issue for this pull request: https://github.com/ooni/probe/issues/2158 - [x] if you changed anything related how experiments work and you need to reflect these changes in the ooni/spec repository, please link to the related ooni/spec pull request: https://github.com/ooni/spec/pull/250 ## Description This diff refactors the codebase to reimplement tlsping and tcpping to use the step-by-step measurements style. See docs/design/dd-003-step-by-step.md for more information on the step-by-step measurement style.
241 lines
6.6 KiB
Go
241 lines
6.6 KiB
Go
package netxlite
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"testing"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/atomicx"
|
|
)
|
|
|
|
func TestErrWrapper(t *testing.T) {
|
|
t.Run("Error", func(t *testing.T) {
|
|
err := &ErrWrapper{Failure: FailureDNSNXDOMAINError}
|
|
if err.Error() != FailureDNSNXDOMAINError {
|
|
t.Fatal("invalid return value")
|
|
}
|
|
})
|
|
|
|
t.Run("Unwrap", func(t *testing.T) {
|
|
err := &ErrWrapper{
|
|
Failure: FailureEOFError,
|
|
WrappedErr: io.EOF,
|
|
}
|
|
if !errors.Is(err, io.EOF) {
|
|
t.Fatal("cannot unwrap error")
|
|
}
|
|
})
|
|
|
|
t.Run("MarshalJSON", func(t *testing.T) {
|
|
wrappedErr := &ErrWrapper{
|
|
Failure: FailureEOFError,
|
|
WrappedErr: io.EOF,
|
|
}
|
|
data, err := json.Marshal(wrappedErr)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
s := string(data)
|
|
if s != "\""+FailureEOFError+"\"" {
|
|
t.Fatal("invalid serialization", s)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestNewErrWrapper(t *testing.T) {
|
|
t.Run("panics if the classifier is nil", func(t *testing.T) {
|
|
recovered := &atomicx.Int64{}
|
|
func() {
|
|
defer func() {
|
|
if recover() != nil {
|
|
recovered.Add(1)
|
|
}
|
|
}()
|
|
NewErrWrapper(nil, CloseOperation, io.EOF)
|
|
}()
|
|
if recovered.Load() != 1 {
|
|
t.Fatal("did not panic")
|
|
}
|
|
})
|
|
|
|
t.Run("panics if the operation is empty", func(t *testing.T) {
|
|
recovered := &atomicx.Int64{}
|
|
func() {
|
|
defer func() {
|
|
if recover() != nil {
|
|
recovered.Add(1)
|
|
}
|
|
}()
|
|
NewErrWrapper(ClassifyGenericError, "", io.EOF)
|
|
}()
|
|
if recovered.Load() != 1 {
|
|
t.Fatal("did not panic")
|
|
}
|
|
})
|
|
|
|
t.Run("panics if the error is nil", func(t *testing.T) {
|
|
recovered := &atomicx.Int64{}
|
|
func() {
|
|
defer func() {
|
|
if recover() != nil {
|
|
recovered.Add(1)
|
|
}
|
|
}()
|
|
NewErrWrapper(ClassifyGenericError, CloseOperation, nil)
|
|
}()
|
|
if recovered.Load() != 1 {
|
|
t.Fatal("did not panic")
|
|
}
|
|
})
|
|
|
|
t.Run("otherwise, works as intended", func(t *testing.T) {
|
|
ew := NewErrWrapper(ClassifyGenericError, CloseOperation, io.EOF)
|
|
if ew.Failure != FailureEOFError {
|
|
t.Fatal("unexpected failure")
|
|
}
|
|
if ew.Operation != CloseOperation {
|
|
t.Fatal("unexpected operation")
|
|
}
|
|
if ew.WrappedErr != io.EOF {
|
|
t.Fatal("unexpected WrappedErr")
|
|
}
|
|
})
|
|
|
|
t.Run("when the underlying error is already a wrapped error", func(t *testing.T) {
|
|
ew := NewErrWrapper(classifySyscallError, ReadOperation, ECONNRESET)
|
|
var err1 error = ew
|
|
err2 := fmt.Errorf("cannot read: %w", err1)
|
|
ew2 := NewErrWrapper(ClassifyGenericError, HTTPRoundTripOperation, err2)
|
|
if ew2.Failure != ew.Failure {
|
|
t.Fatal("not the same failure")
|
|
}
|
|
if ew2.Operation != HTTPRoundTripOperation {
|
|
t.Fatal("not the same operation")
|
|
}
|
|
if ew2.WrappedErr != err2 {
|
|
t.Fatal("invalid underlying error")
|
|
}
|
|
// Make sure we can still use errors.Is with two layers of wrapping
|
|
if !errors.Is(ew2, ECONNRESET) {
|
|
t.Fatal("we cannot use errors.Is to retrieve the real syscall error")
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestMaybeNewErrWrapper(t *testing.T) {
|
|
// TODO(https://github.com/ooni/probe/issues/2163): we can really
|
|
// simplify the error wrapping situation here by just dropping
|
|
// NewErrWrapper and always using MaybeNewErrWrapper.
|
|
|
|
t.Run("when we pass a nil error to this function", func(t *testing.T) {
|
|
err := MaybeNewErrWrapper(classifySyscallError, ReadOperation, nil)
|
|
if err != nil {
|
|
t.Fatal("unexpected output", err)
|
|
}
|
|
})
|
|
|
|
t.Run("when we pass a non-nil error to this function", func(t *testing.T) {
|
|
err := MaybeNewErrWrapper(classifySyscallError, ReadOperation, ECONNRESET)
|
|
if !errors.Is(err, ECONNRESET) {
|
|
t.Fatal("unexpected output", err)
|
|
}
|
|
var ew *ErrWrapper
|
|
if !errors.As(err, &ew) {
|
|
t.Fatal("not an instance of ErrWrapper")
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestNewTopLevelGenericErrWrapper(t *testing.T) {
|
|
out := NewTopLevelGenericErrWrapper(io.EOF)
|
|
if out.Failure != FailureEOFError {
|
|
t.Fatal("invalid failure")
|
|
}
|
|
if out.Operation != TopLevelOperation {
|
|
t.Fatal("invalid operation")
|
|
}
|
|
if !errors.Is(out, io.EOF) {
|
|
t.Fatal("invalid underlying error using errors.Is")
|
|
}
|
|
if !errors.Is(out.WrappedErr, io.EOF) {
|
|
t.Fatal("invalid WrappedErr")
|
|
}
|
|
}
|
|
|
|
func TestClassifyOperation(t *testing.T) {
|
|
t.Run("for connect", func(t *testing.T) {
|
|
// You're doing HTTP and connect fails. You want to know
|
|
// that connect failed not that HTTP failed.
|
|
err := &ErrWrapper{Operation: ConnectOperation}
|
|
if classifyOperation(err, HTTPRoundTripOperation) != ConnectOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
|
|
t.Run("for http_round_trip", func(t *testing.T) {
|
|
// You're doing DoH and something fails inside HTTP. You want
|
|
// to know about the internal HTTP error, not resolve.
|
|
err := &ErrWrapper{Operation: HTTPRoundTripOperation}
|
|
if classifyOperation(err, ResolveOperation) != HTTPRoundTripOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
|
|
t.Run("for resolve", func(t *testing.T) {
|
|
// You're doing HTTP and the DNS fails. You want to
|
|
// know that resolve failed.
|
|
err := &ErrWrapper{Operation: ResolveOperation}
|
|
if classifyOperation(err, HTTPRoundTripOperation) != ResolveOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
|
|
t.Run("for tls_handshake", func(t *testing.T) {
|
|
// You're doing HTTP and the TLS handshake fails. You want
|
|
// to know about a TLS handshake error.
|
|
err := &ErrWrapper{Operation: TLSHandshakeOperation}
|
|
if classifyOperation(err, HTTPRoundTripOperation) != TLSHandshakeOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
|
|
t.Run("for minor operation", func(t *testing.T) {
|
|
// You just noticed that TLS handshake failed and you
|
|
// have a child error telling you that read failed. Here
|
|
// you want to know about a TLS handshake error.
|
|
err := &ErrWrapper{Operation: ReadOperation}
|
|
if classifyOperation(err, TLSHandshakeOperation) != TLSHandshakeOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
|
|
t.Run("for quic_handshake", func(t *testing.T) {
|
|
// You're doing HTTP and the QUIC handshake fails. You want
|
|
// to know about a QUIC handshake error.
|
|
err := &ErrWrapper{Operation: QUICHandshakeOperation}
|
|
if classifyOperation(err, HTTPRoundTripOperation) != QUICHandshakeOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
|
|
t.Run("for quic_handshake_start", func(t *testing.T) {
|
|
// You're doing HTTP and the QUIC handshake fails. You want
|
|
// to know about a QUIC handshake error.
|
|
err := &ErrWrapper{Operation: "quic_handshake_start"}
|
|
if classifyOperation(err, HTTPRoundTripOperation) != QUICHandshakeOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
|
|
t.Run("for quic_handshake_done", func(t *testing.T) {
|
|
// You're doing HTTP and the QUIC handshake fails. You want
|
|
// to know about a QUIC handshake error.
|
|
err := &ErrWrapper{Operation: "quic_handshake_done"}
|
|
if classifyOperation(err, HTTPRoundTripOperation) != QUICHandshakeOperation {
|
|
t.Fatal("unexpected result")
|
|
}
|
|
})
|
|
}
|