83440cf110
The legacy part for now is internal/errorsx. It will stay there until I figure out whether it also needs some extra bug fixing. The good part is now in internal/netxlite/errorsx and contains all the logic for mapping errors. We need to further improve upon this logic by writing more thorough integration tests for QUIC. We also need to copy the various dialer, conn, etc adapters that set errors. We will put them inside netxlite and we will generate errors in a way that is less crazy with respect to the major operation. (The idea is to always wrap, given that now we measure in an incremental way and we don't measure every operation together.) Part of https://github.com/ooni/probe/issues/1591
130 lines
3.7 KiB
Go
130 lines
3.7 KiB
Go
package urlgetter
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/http/cookiejar"
|
|
"net/url"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/engine/httpheader"
|
|
"github.com/ooni/probe-cli/v3/internal/engine/netx"
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite/errorsx"
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite/iox"
|
|
"github.com/ooni/probe-cli/v3/internal/runtimex"
|
|
)
|
|
|
|
const httpRequestFailed = "http_request_failed"
|
|
|
|
// ErrHTTPRequestFailed indicates that the HTTP request failed.
|
|
var ErrHTTPRequestFailed = &errorsx.ErrWrapper{
|
|
Failure: httpRequestFailed,
|
|
Operation: errorsx.TopLevelOperation,
|
|
WrappedErr: errors.New(httpRequestFailed),
|
|
}
|
|
|
|
// The Runner job is to run a single measurement
|
|
type Runner struct {
|
|
Config Config
|
|
HTTPConfig netx.Config
|
|
Target string
|
|
}
|
|
|
|
// Run runs a measurement and returns the measurement result
|
|
func (r Runner) Run(ctx context.Context) error {
|
|
targetURL, err := url.Parse(r.Target)
|
|
if err != nil {
|
|
return fmt.Errorf("urlgetter: invalid target URL: %w", err)
|
|
}
|
|
switch targetURL.Scheme {
|
|
case "http", "https":
|
|
return r.httpGet(ctx, r.Target)
|
|
case "dnslookup":
|
|
return r.dnsLookup(ctx, targetURL.Hostname())
|
|
case "tlshandshake":
|
|
return r.tlsHandshake(ctx, targetURL.Host)
|
|
case "tcpconnect":
|
|
return r.tcpConnect(ctx, targetURL.Host)
|
|
default:
|
|
return errors.New("unknown targetURL scheme")
|
|
}
|
|
}
|
|
|
|
// MaybeUserAgent returns ua if ua is not empty. Otherwise it
|
|
// returns httpheader.RandomUserAgent().
|
|
func MaybeUserAgent(ua string) string {
|
|
if ua == "" {
|
|
ua = httpheader.UserAgent()
|
|
}
|
|
return ua
|
|
}
|
|
|
|
func (r Runner) httpGet(ctx context.Context, url string) error {
|
|
// Implementation note: empty Method implies using the GET method
|
|
req, err := http.NewRequest(r.Config.Method, url, nil)
|
|
runtimex.PanicOnError(err, "http.NewRequest failed")
|
|
req = req.WithContext(ctx)
|
|
req.Header.Set("Accept", httpheader.Accept())
|
|
req.Header.Set("Accept-Language", httpheader.AcceptLanguage())
|
|
req.Header.Set("User-Agent", MaybeUserAgent(r.Config.UserAgent))
|
|
if r.Config.HTTPHost != "" {
|
|
req.Host = r.Config.HTTPHost
|
|
}
|
|
// Implementation note: the following cookiejar accepts all cookies
|
|
// from all domains. As such, would not be safe for usage where cookies
|
|
// matter, but it's totally fine for performing measurements.
|
|
jar, err := cookiejar.New(nil)
|
|
runtimex.PanicOnError(err, "cookiejar.New failed")
|
|
httpClient := &http.Client{
|
|
Jar: jar,
|
|
Transport: netx.NewHTTPTransport(r.HTTPConfig),
|
|
}
|
|
if r.Config.NoFollowRedirects {
|
|
httpClient.CheckRedirect = func(*http.Request, []*http.Request) error {
|
|
return http.ErrUseLastResponse
|
|
}
|
|
}
|
|
defer httpClient.CloseIdleConnections()
|
|
resp, err := httpClient.Do(req)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
if _, err = iox.CopyContext(ctx, io.Discard, resp.Body); err != nil {
|
|
return err
|
|
}
|
|
// Implementation note: we shall check for this error once we have read the
|
|
// whole body. Even though we discard the body, we want to know whether we
|
|
// see any error when reading the body before inspecting the HTTP status code.
|
|
if resp.StatusCode >= 400 && r.Config.FailOnHTTPError {
|
|
return ErrHTTPRequestFailed
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r Runner) dnsLookup(ctx context.Context, hostname string) error {
|
|
resolver := netx.NewResolver(r.HTTPConfig)
|
|
_, err := resolver.LookupHost(ctx, hostname)
|
|
return err
|
|
}
|
|
|
|
func (r Runner) tlsHandshake(ctx context.Context, address string) error {
|
|
tlsDialer := netx.NewTLSDialer(r.HTTPConfig)
|
|
conn, err := tlsDialer.DialTLSContext(ctx, "tcp", address)
|
|
if conn != nil {
|
|
conn.Close()
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (r Runner) tcpConnect(ctx context.Context, address string) error {
|
|
dialer := netx.NewDialer(r.HTTPConfig)
|
|
conn, err := dialer.DialContext(ctx, "tcp", address)
|
|
if conn != nil {
|
|
conn.Close()
|
|
}
|
|
return err
|
|
}
|