f4f3ed7c42
The code that is now into the tracex package was written a long time ago, so let's start to make it more in line with the coding style of packages that were written more recently. I didn't apply all the changes I'd like to apply in a single diff and for now I am committing just this diff. Broadly, what we need to do is: 1. improve documentation 2. ~always use pointer receivers (object receives have the issue that they are not mutable by accident meaning that you can mutate them but their state do not change after the call returns, which is potentially a source of bugs in case you later refactor to use a pointer receiver, so always use pointer receivers) 3. ~always avoid embedding (let's say we want to avoid embedding for types we define and it's instead fine to embed types that are defined in the stdlib: if later we add a new method, we will not see a broken build and we'll probably forget to add the new method to all wrappers -- conversely, if we're wrapping rather than embedding, we'll see a broken build and act accordingly) 4. prefer unit tests and group tests by type being tested rather than using a flat structure for tests There's a coverage slippage that I'll compensate in a follow-up diff where I'll focus on unit testing. Reference issue: https://github.com/ooni/probe/issues/2121
333 lines
9.3 KiB
Go
333 lines
9.3 KiB
Go
package tracex
|
|
|
|
import (
|
|
"crypto/x509"
|
|
"errors"
|
|
"net"
|
|
"net/http"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/engine/geolocate"
|
|
"github.com/ooni/probe-cli/v3/internal/model"
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite"
|
|
)
|
|
|
|
// Compatibility types. Most experiments still use these names.
|
|
type (
|
|
ExtSpec = model.ArchivalExtSpec
|
|
TCPConnectEntry = model.ArchivalTCPConnectResult
|
|
TCPConnectStatus = model.ArchivalTCPConnectStatus
|
|
MaybeBinaryValue = model.ArchivalMaybeBinaryData
|
|
DNSQueryEntry = model.ArchivalDNSLookupResult
|
|
DNSAnswerEntry = model.ArchivalDNSAnswer
|
|
TLSHandshake = model.ArchivalTLSOrQUICHandshakeResult
|
|
HTTPBody = model.ArchivalHTTPBody
|
|
HTTPHeader = model.ArchivalHTTPHeader
|
|
RequestEntry = model.ArchivalHTTPRequestResult
|
|
HTTPRequest = model.ArchivalHTTPRequest
|
|
HTTPResponse = model.ArchivalHTTPResponse
|
|
NetworkEvent = model.ArchivalNetworkEvent
|
|
)
|
|
|
|
// Compatibility variables. Most experiments still use these names.
|
|
var (
|
|
ExtDNS = model.ArchivalExtDNS
|
|
ExtNetevents = model.ArchivalExtNetevents
|
|
ExtHTTP = model.ArchivalExtHTTP
|
|
ExtTCPConnect = model.ArchivalExtTCPConnect
|
|
ExtTLSHandshake = model.ArchivalExtTLSHandshake
|
|
ExtTunnel = model.ArchivalExtTunnel
|
|
)
|
|
|
|
// NewTCPConnectList creates a new TCPConnectList
|
|
func NewTCPConnectList(begin time.Time, events []Event) []TCPConnectEntry {
|
|
var out []TCPConnectEntry
|
|
for _, event := range events {
|
|
if event.Name != netxlite.ConnectOperation {
|
|
continue
|
|
}
|
|
if event.Proto != "tcp" {
|
|
continue
|
|
}
|
|
// We assume Go is passing us legit data structures
|
|
ip, sport, _ := net.SplitHostPort(event.Address)
|
|
iport, _ := strconv.Atoi(sport)
|
|
out = append(out, TCPConnectEntry{
|
|
IP: ip,
|
|
Port: iport,
|
|
Status: TCPConnectStatus{
|
|
Failure: NewFailure(event.Err),
|
|
Success: event.Err == nil,
|
|
},
|
|
T: event.Time.Sub(begin).Seconds(),
|
|
})
|
|
}
|
|
return out
|
|
}
|
|
|
|
// NewFailure creates a failure nullable string from the given error
|
|
func NewFailure(err error) *string {
|
|
if err == nil {
|
|
return nil
|
|
}
|
|
// The following code guarantees that the error is always wrapped even
|
|
// when we could not actually hit our code that does the wrapping. A case
|
|
// in which this happen is with context deadline for HTTP.
|
|
err = netxlite.NewTopLevelGenericErrWrapper(err)
|
|
errWrapper := err.(*netxlite.ErrWrapper)
|
|
s := errWrapper.Failure
|
|
if s == "" {
|
|
s = "unknown_failure: errWrapper.Failure is empty"
|
|
}
|
|
return &s
|
|
}
|
|
|
|
// NewFailedOperation creates a failed operation string from the given error.
|
|
func NewFailedOperation(err error) *string {
|
|
if err == nil {
|
|
return nil
|
|
}
|
|
var (
|
|
errWrapper *netxlite.ErrWrapper
|
|
s = netxlite.UnknownOperation
|
|
)
|
|
if errors.As(err, &errWrapper) && errWrapper.Operation != "" {
|
|
s = errWrapper.Operation
|
|
}
|
|
return &s
|
|
}
|
|
|
|
func httpAddHeaders(
|
|
source http.Header,
|
|
destList *[]HTTPHeader,
|
|
destMap *map[string]MaybeBinaryValue,
|
|
) {
|
|
for key, values := range source {
|
|
for index, value := range values {
|
|
value := MaybeBinaryValue{Value: value}
|
|
// With the map representation we can only represent a single
|
|
// value for every key. Hence the list representation.
|
|
if index == 0 {
|
|
(*destMap)[key] = value
|
|
}
|
|
*destList = append(*destList, HTTPHeader{
|
|
Key: key,
|
|
Value: value,
|
|
})
|
|
}
|
|
}
|
|
sort.Slice(*destList, func(i, j int) bool {
|
|
return (*destList)[i].Key < (*destList)[j].Key
|
|
})
|
|
}
|
|
|
|
// NewRequestList returns the list for "requests"
|
|
func NewRequestList(begin time.Time, events []Event) []RequestEntry {
|
|
// OONI wants the last request to appear first
|
|
var out []RequestEntry
|
|
tmp := newRequestList(begin, events)
|
|
for i := len(tmp) - 1; i >= 0; i-- {
|
|
out = append(out, tmp[i])
|
|
}
|
|
return out
|
|
}
|
|
|
|
func newRequestList(begin time.Time, events []Event) []RequestEntry {
|
|
var (
|
|
out []RequestEntry
|
|
entry RequestEntry
|
|
)
|
|
for _, ev := range events {
|
|
switch ev.Name {
|
|
case "http_transaction_start":
|
|
entry = RequestEntry{}
|
|
entry.T = ev.Time.Sub(begin).Seconds()
|
|
case "http_request_body_snapshot":
|
|
entry.Request.Body.Value = string(ev.Data)
|
|
entry.Request.BodyIsTruncated = ev.DataIsTruncated
|
|
case "http_request_metadata":
|
|
entry.Request.Headers = make(map[string]MaybeBinaryValue)
|
|
httpAddHeaders(
|
|
ev.HTTPHeaders, &entry.Request.HeadersList, &entry.Request.Headers)
|
|
entry.Request.Method = ev.HTTPMethod
|
|
entry.Request.URL = ev.HTTPURL
|
|
entry.Request.Transport = ev.Transport
|
|
case "http_response_metadata":
|
|
entry.Response.Headers = make(map[string]MaybeBinaryValue)
|
|
httpAddHeaders(
|
|
ev.HTTPHeaders, &entry.Response.HeadersList, &entry.Response.Headers)
|
|
entry.Response.Code = int64(ev.HTTPStatusCode)
|
|
entry.Response.Locations = ev.HTTPHeaders.Values("Location")
|
|
case "http_response_body_snapshot":
|
|
entry.Response.Body.Value = string(ev.Data)
|
|
entry.Response.BodyIsTruncated = ev.DataIsTruncated
|
|
case "http_transaction_done":
|
|
entry.Failure = NewFailure(ev.Err)
|
|
out = append(out, entry)
|
|
}
|
|
}
|
|
return out
|
|
}
|
|
|
|
type dnsQueryType string
|
|
|
|
// NewDNSQueriesList returns a list of DNS queries.
|
|
func NewDNSQueriesList(begin time.Time, events []Event) []DNSQueryEntry {
|
|
// TODO(bassosimone): add support for CNAME lookups.
|
|
var out []DNSQueryEntry
|
|
for _, ev := range events {
|
|
if ev.Name != "resolve_done" {
|
|
continue
|
|
}
|
|
for _, qtype := range []dnsQueryType{"A", "AAAA"} {
|
|
entry := qtype.makeQueryEntry(begin, ev)
|
|
for _, addr := range ev.Addresses {
|
|
if qtype.ipOfType(addr) {
|
|
entry.Answers = append(
|
|
entry.Answers, qtype.makeAnswerEntry(addr))
|
|
}
|
|
}
|
|
if len(entry.Answers) <= 0 && ev.Err == nil {
|
|
// This allows us to skip cases where the server does not have
|
|
// an IPv6 address but has an IPv4 address. Instead, when we
|
|
// receive an error, we want to track its existence. The main
|
|
// issue here is that we are cheating, because we are creating
|
|
// entries representing queries, but we don't know what the
|
|
// resolver actually did, especially the system resolver. So,
|
|
// this output is just our best guess.
|
|
continue
|
|
}
|
|
out = append(out, entry)
|
|
}
|
|
}
|
|
return out
|
|
}
|
|
|
|
func (qtype dnsQueryType) ipOfType(addr string) bool {
|
|
switch qtype {
|
|
case "A":
|
|
return !strings.Contains(addr, ":")
|
|
case "AAAA":
|
|
return strings.Contains(addr, ":")
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (qtype dnsQueryType) makeAnswerEntry(addr string) DNSAnswerEntry {
|
|
answer := DNSAnswerEntry{AnswerType: string(qtype)}
|
|
asn, org, _ := geolocate.LookupASN(addr)
|
|
answer.ASN = int64(asn)
|
|
answer.ASOrgName = org
|
|
switch qtype {
|
|
case "A":
|
|
answer.IPv4 = addr
|
|
case "AAAA":
|
|
answer.IPv6 = addr
|
|
}
|
|
return answer
|
|
}
|
|
|
|
func (qtype dnsQueryType) makeQueryEntry(begin time.Time, ev Event) DNSQueryEntry {
|
|
return DNSQueryEntry{
|
|
Engine: ev.Proto,
|
|
Failure: NewFailure(ev.Err),
|
|
Hostname: ev.Hostname,
|
|
QueryType: string(qtype),
|
|
ResolverAddress: ev.Address,
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
}
|
|
}
|
|
|
|
// NewNetworkEventsList returns a list of DNS queries.
|
|
func NewNetworkEventsList(begin time.Time, events []Event) []NetworkEvent {
|
|
var out []NetworkEvent
|
|
for _, ev := range events {
|
|
if ev.Name == netxlite.ConnectOperation {
|
|
out = append(out, NetworkEvent{
|
|
Address: ev.Address,
|
|
Failure: NewFailure(ev.Err),
|
|
Operation: ev.Name,
|
|
Proto: ev.Proto,
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
})
|
|
continue
|
|
}
|
|
if ev.Name == netxlite.ReadOperation {
|
|
out = append(out, NetworkEvent{
|
|
Failure: NewFailure(ev.Err),
|
|
Operation: ev.Name,
|
|
NumBytes: int64(ev.NumBytes),
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
})
|
|
continue
|
|
}
|
|
if ev.Name == netxlite.WriteOperation {
|
|
out = append(out, NetworkEvent{
|
|
Failure: NewFailure(ev.Err),
|
|
Operation: ev.Name,
|
|
NumBytes: int64(ev.NumBytes),
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
})
|
|
continue
|
|
}
|
|
if ev.Name == netxlite.ReadFromOperation {
|
|
out = append(out, NetworkEvent{
|
|
Address: ev.Address,
|
|
Failure: NewFailure(ev.Err),
|
|
Operation: ev.Name,
|
|
NumBytes: int64(ev.NumBytes),
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
})
|
|
continue
|
|
}
|
|
if ev.Name == netxlite.WriteToOperation {
|
|
out = append(out, NetworkEvent{
|
|
Address: ev.Address,
|
|
Failure: NewFailure(ev.Err),
|
|
Operation: ev.Name,
|
|
NumBytes: int64(ev.NumBytes),
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
})
|
|
continue
|
|
}
|
|
out = append(out, NetworkEvent{
|
|
Failure: NewFailure(ev.Err),
|
|
Operation: ev.Name,
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
})
|
|
}
|
|
return out
|
|
}
|
|
|
|
// NewTLSHandshakesList creates a new TLSHandshakesList
|
|
func NewTLSHandshakesList(begin time.Time, events []Event) []TLSHandshake {
|
|
var out []TLSHandshake
|
|
for _, ev := range events {
|
|
if !strings.Contains(ev.Name, "_handshake_done") {
|
|
continue
|
|
}
|
|
out = append(out, TLSHandshake{
|
|
Address: ev.Address,
|
|
CipherSuite: ev.TLSCipherSuite,
|
|
Failure: NewFailure(ev.Err),
|
|
NegotiatedProtocol: ev.TLSNegotiatedProto,
|
|
NoTLSVerify: ev.NoTLSVerify,
|
|
PeerCertificates: tlsMakePeerCerts(ev.TLSPeerCerts),
|
|
ServerName: ev.TLSServerName,
|
|
T: ev.Time.Sub(begin).Seconds(),
|
|
TLSVersion: ev.TLSVersion,
|
|
})
|
|
}
|
|
return out
|
|
}
|
|
|
|
func tlsMakePeerCerts(in []*x509.Certificate) (out []MaybeBinaryValue) {
|
|
for _, e := range in {
|
|
out = append(out, MaybeBinaryValue{Value: string(e.Raw)})
|
|
}
|
|
return
|
|
}
|