ooni-probe-cli/internal/tutorial/netxlite/chapter04/main.go
Simone Basso 9ffa124511
chore: upgrade deps and attempt to enable using go1.19 (#869)
* upgrade to our go.mod enabled of psiphon-tunnel-core such that
we're now using v2.0.24 of the tunnel-core;

* upgrade to the latest lucas-clemente/quic-go release;

* upgrade to the latest ooni/oohttp release (which is based on go1.19
but the diff seems good enough to continue using go1.18.x as well);

* upgrade to the latest ooni/oocrypto release (for which we can make the
same remarks regarding using go1.18.x);

* deal with changes in lucas-clemente/quic-go API as well as changes
in what a go1.19 *tls.Conn compatible type should look like.

Unfortunately, we cannot switch to go1.19 because psiphon forks quic-go
and their fork's still not building using such a version of go.

Part of ooni/probe#2211.
2022-08-19 11:26:50 +02:00

163 lines
4.5 KiB
Go

// -=-=- StartHere -=-=-
//
// # Chapter I: Using QUIC
//
// In this chapter we will write together a `main.go` file that
// uses netxlite to establish a new QUIC connection with an UDP endpoint.
//
// Conceptually, this program is very similar to the ones presented
// in chapters 2 and 3, except that here we use QUIC.
//
// (This file is auto-generated from the corresponding source file,
// so make sure you don't edit it manually.)
//
// ## The main.go file
//
// We define `main.go` file using `package main`.
//
// The beginning of the program is equal to the previous chapters,
// so there is not much to say about it.
//
// ```Go
package main
import (
"context"
"crypto/tls"
"errors"
"flag"
"os"
"time"
"github.com/apex/log"
"github.com/lucas-clemente/quic-go"
"github.com/ooni/probe-cli/v3/internal/netxlite"
)
func main() {
log.SetLevel(log.DebugLevel)
address := flag.String("address", "8.8.4.4:443", "Remote endpoint address")
sni := flag.String("sni", "dns.google", "SNI to use")
timeout := flag.Duration("timeout", 60*time.Second, "Timeout")
flag.Parse()
ctx, cancel := context.WithTimeout(context.Background(), *timeout)
defer cancel()
// ```
//
// The main difference is that we set the ALPN correctly for
// QUIC/HTTP3 by using `"h3"` here.
//
// ```Go
config := &tls.Config{
ServerName: *sni,
NextProtos: []string{"h3"},
RootCAs: netxlite.NewDefaultCertPool(),
}
// ```
//
// Also, where previously we called `dialTLS` now we call
// a function with a similar API called `dialQUIC`.
//
// ```
qconn, state, err := dialQUIC(ctx, *address, config)
// ```
//
// The rest of the main function is pretty much the same.
//
// ```Go
if err != nil {
fatal(err)
}
log.Infof("Connection type : %T", qconn)
log.Infof("Cipher suite : %s", netxlite.TLSCipherSuiteString(state.CipherSuite))
log.Infof("Negotiated protocol: %s", state.NegotiatedProtocol)
log.Infof("TLS version : %s", netxlite.TLSVersionString(state.Version))
qconn.CloseWithError(0, "")
}
// ```
//
// The dialQUIC function is new. We need to create a QUIC listener
// and, using it, a QUICDialer. These two steps are separated so
// higher level code can wrap the QUICDialer and collect stats on
// the returned connections. Also, as previously, this dialer is
// not attached to a resolver, so it will fail if provided a domain
// name. The rationale for doing that is similar to before: we
// are focusing on step-by-step measurements where each operation
// is performed independently. (That is, we assume that before
// the code written in this main we have already resolved the
// domain name of interest using a resolver, which we will investigate
// in the next two chapters.)
//
// ```Go
func dialQUIC(ctx context.Context, address string,
config *tls.Config) (quic.EarlyConnection, tls.ConnectionState, error) {
ql := netxlite.NewQUICListener()
d := netxlite.NewQUICDialerWithoutResolver(ql, log.Log)
qconn, err := d.DialContext(ctx, address, config, &quic.Config{})
if err != nil {
return nil, tls.ConnectionState{}, err
}
// ```
//
// The following line unwraps the connection state returned by
// QUIC code to be of the same type of the ConnectionState that
// we returned in the previous chapters.
//
// ```Go
return qconn, qconn.ConnectionState().TLS.ConnectionState, nil
}
// ```
//
// The rest of the program is equal to the previous chapters.
//
// ```Go
func fatal(err error) {
var ew *netxlite.ErrWrapper
if !errors.As(err, &ew) {
log.Fatal("cannot get ErrWrapper")
}
log.Warnf("error string : %s", err.Error())
log.Warnf("OONI failure : %s", ew.Failure)
log.Warnf("failed operation: %s", ew.Operation)
log.Warnf("underlying error: %+v", ew.WrappedErr)
os.Exit(1)
}
// ```
//
// ## Running the code
//
// ### Vanilla run
//
// You can now run this code as follows:
//
// ```bash
// go run -race ./internal/tutorial/netxlite/chapter04
// ```
//
// You will see debug logs describing what is happening along with timing info.
//
// ### QUIC handshake timeout
//
// ```bash
// go run -race ./internal/tutorial/netxlite/chapter04 -address 8.8.4.4:1
// ```
//
// should cause a QUIC timeout error. Try lowering the timout adding, e.g.,
// the `-timeout 5s` flag to the command line.
//
// ### SNI mismatch
//
// ```bash
// go run -race ./internal/tutorial/netxlite/chapter04 -sni example.com
// ```
//
// should give you a TLS error mentioning that the certificate is invalid.
//
// ## Conclusions
//
// We have seen how to use netxlite to establish a QUIC connection
// with a remote UDP endpoint speaking QUIC.