bbcd2e2280
This diff creates a new package under netx called tracex that contains everything we need to perform measurements using events tracing and postprocessing (which is the technique with which we implement most network experiments). The general idea here is to (1) create a unique package out of all of these packages; (2) clean up the code a bit (improve tests, docs, apply more recent code patterns); (3) move the resulting code as a toplevel package inside of internal. Once this is done, netx can be further refactored to avoid subpackages and we can search for more code to salvage/refactor. See https://github.com/ooni/probe/issues/2121
281 lines
8.9 KiB
Go
281 lines
8.9 KiB
Go
package webconnectivity
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net"
|
|
"net/url"
|
|
"strconv"
|
|
"time"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/engine/experiment/webconnectivity/internal"
|
|
"github.com/ooni/probe-cli/v3/internal/engine/netx/tracex"
|
|
"github.com/ooni/probe-cli/v3/internal/model"
|
|
)
|
|
|
|
const (
|
|
testName = "web_connectivity"
|
|
testVersion = "0.4.1"
|
|
)
|
|
|
|
// Config contains the experiment config.
|
|
type Config struct{}
|
|
|
|
// TestKeys contains webconnectivity test keys.
|
|
type TestKeys struct {
|
|
Agent string `json:"agent"`
|
|
ClientResolver string `json:"client_resolver"`
|
|
Retries *int64 `json:"retries"` // unused
|
|
SOCKSProxy *string `json:"socksproxy"` // unused
|
|
|
|
// For now mostly TCP/TLS "connect" experiment but we are
|
|
// considering adding more events. An open question is
|
|
// currently how to properly tag these events so that it
|
|
// is rather obvious where they come from.
|
|
//
|
|
// See https://github.com/ooni/probe/issues/1413.
|
|
NetworkEvents []tracex.NetworkEvent `json:"network_events"`
|
|
TLSHandshakes []tracex.TLSHandshake `json:"tls_handshakes"`
|
|
|
|
// DNS experiment
|
|
Queries []tracex.DNSQueryEntry `json:"queries"`
|
|
DNSExperimentFailure *string `json:"dns_experiment_failure"`
|
|
DNSAnalysisResult
|
|
|
|
// Control experiment
|
|
ControlFailure *string `json:"control_failure"`
|
|
ControlRequest ControlRequest `json:"-"`
|
|
Control ControlResponse `json:"control"`
|
|
|
|
// TCP/TLS "connect" experiment
|
|
TCPConnect []tracex.TCPConnectEntry `json:"tcp_connect"`
|
|
TCPConnectSuccesses int `json:"-"`
|
|
TCPConnectAttempts int `json:"-"`
|
|
|
|
// HTTP experiment
|
|
Requests []tracex.RequestEntry `json:"requests"`
|
|
HTTPExperimentFailure *string `json:"http_experiment_failure"`
|
|
HTTPAnalysisResult
|
|
|
|
// Top-level analysis
|
|
Summary
|
|
|
|
// DNSRuntime is the time to run all DNS checks.
|
|
DNSRuntime time.Duration `json:"x_dns_runtime"`
|
|
|
|
// THRuntime is the total time to invoke all test helpers.
|
|
THRuntime time.Duration `json:"x_th_runtime"`
|
|
|
|
// TCPTLSRuntime is the total time to perform TCP/TLS "connects".
|
|
TCPTLSRuntime time.Duration `json:"x_tcptls_runtime"`
|
|
|
|
// HTTPRuntime is the total time to perform the HTTP GET.
|
|
HTTPRuntime time.Duration `json:"x_http_runtime"`
|
|
}
|
|
|
|
// Measurer performs the measurement.
|
|
type Measurer struct {
|
|
Config Config
|
|
}
|
|
|
|
// NewExperimentMeasurer creates a new ExperimentMeasurer.
|
|
func NewExperimentMeasurer(config Config) model.ExperimentMeasurer {
|
|
return Measurer{Config: config}
|
|
}
|
|
|
|
// ExperimentName implements ExperimentMeasurer.ExperExperimentName.
|
|
func (m Measurer) ExperimentName() string {
|
|
return testName
|
|
}
|
|
|
|
// ExperimentVersion implements ExperimentMeasurer.ExperExperimentVersion.
|
|
func (m Measurer) ExperimentVersion() string {
|
|
return testVersion
|
|
}
|
|
|
|
var (
|
|
// ErrNoAvailableTestHelpers is emitted when there are no available test helpers.
|
|
ErrNoAvailableTestHelpers = errors.New("no available helpers")
|
|
|
|
// ErrNoInput indicates that no input was provided
|
|
ErrNoInput = errors.New("no input provided")
|
|
|
|
// ErrInputIsNotAnURL indicates that the input is not an URL.
|
|
ErrInputIsNotAnURL = errors.New("input is not an URL")
|
|
|
|
// ErrUnsupportedInput indicates that the input URL scheme is unsupported.
|
|
ErrUnsupportedInput = errors.New("unsupported input scheme")
|
|
)
|
|
|
|
// Tags describing the section of this experiment in which
|
|
// the data has been collected.
|
|
const (
|
|
// DNSExperimentTag is a tag indicating the DNS experiment.
|
|
DNSExperimentTag = "dns_experiment"
|
|
|
|
// TCPTLSExperimentTag is a tag indicating the connect experiment.
|
|
TCPTLSExperimentTag = "tcptls_experiment"
|
|
|
|
// HTTPExperimentTag is a tag indicating the HTTP experiment.
|
|
HTTPExperimentTag = "http_experiment"
|
|
)
|
|
|
|
// Run implements ExperimentMeasurer.Run.
|
|
func (m Measurer) Run(
|
|
ctx context.Context,
|
|
sess model.ExperimentSession,
|
|
measurement *model.Measurement,
|
|
callbacks model.ExperimentCallbacks,
|
|
) error {
|
|
ctx, cancel := context.WithTimeout(ctx, 60*time.Second)
|
|
defer cancel()
|
|
tk := new(TestKeys)
|
|
measurement.TestKeys = tk
|
|
tk.Agent = "redirect"
|
|
tk.ClientResolver = sess.ResolverIP()
|
|
if measurement.Input == "" {
|
|
return ErrNoInput
|
|
}
|
|
URL, err := url.Parse(string(measurement.Input))
|
|
if err != nil {
|
|
return ErrInputIsNotAnURL
|
|
}
|
|
if URL.Scheme != "http" && URL.Scheme != "https" {
|
|
return ErrUnsupportedInput
|
|
}
|
|
// 1. find test helper
|
|
testhelpers, _ := sess.GetTestHelpersByName("web-connectivity")
|
|
var testhelper *model.OOAPIService
|
|
for _, th := range testhelpers {
|
|
if th.Type == "https" {
|
|
testhelper = &th
|
|
break
|
|
}
|
|
}
|
|
if testhelper == nil {
|
|
return ErrNoAvailableTestHelpers
|
|
}
|
|
measurement.TestHelpers = map[string]interface{}{
|
|
"backend": testhelper,
|
|
}
|
|
// 2. perform the DNS lookup step
|
|
dnsBegin := time.Now()
|
|
dnsResult := DNSLookup(ctx, DNSLookupConfig{
|
|
Begin: measurement.MeasurementStartTimeSaved,
|
|
Session: sess, URL: URL})
|
|
tk.DNSRuntime = time.Since(dnsBegin)
|
|
tk.Queries = append(tk.Queries, dnsResult.TestKeys.Queries...)
|
|
tk.DNSExperimentFailure = dnsResult.Failure
|
|
epnts := NewEndpoints(URL, dnsResult.Addresses())
|
|
sess.Logger().Infof("using control: %s", testhelper.Address)
|
|
// 3. perform the control measurement
|
|
thBegin := time.Now()
|
|
tk.Control, err = Control(ctx, sess, testhelper.Address, ControlRequest{
|
|
HTTPRequest: URL.String(),
|
|
HTTPRequestHeaders: map[string][]string{
|
|
"Accept": {model.HTTPHeaderAccept},
|
|
"Accept-Language": {model.HTTPHeaderAcceptLanguage},
|
|
"User-Agent": {model.HTTPHeaderUserAgent},
|
|
},
|
|
TCPConnect: epnts.Endpoints(),
|
|
})
|
|
tk.THRuntime = time.Since(thBegin)
|
|
tk.ControlFailure = tracex.NewFailure(err)
|
|
// 4. analyze DNS results
|
|
if tk.ControlFailure == nil {
|
|
tk.DNSAnalysisResult = DNSAnalysis(URL, dnsResult, tk.Control)
|
|
}
|
|
sess.Logger().Infof("DNS analysis result: %+v", internal.StringPointerToString(
|
|
tk.DNSAnalysisResult.DNSConsistency))
|
|
// 5. perform TCP/TLS connects
|
|
//
|
|
// TODO(bassosimone): here we should also follow the IP addresses
|
|
// returned by the control experiment.
|
|
//
|
|
// See https://github.com/ooni/probe/issues/1414
|
|
tcptlsBegin := time.Now()
|
|
connectsResult := Connects(ctx, ConnectsConfig{
|
|
Begin: measurement.MeasurementStartTimeSaved,
|
|
Session: sess,
|
|
TargetURL: URL,
|
|
URLGetterURLs: epnts.URLs(),
|
|
})
|
|
tk.TCPTLSRuntime = time.Since(tcptlsBegin)
|
|
sess.Logger().Infof(
|
|
"TCP/TLS endpoints: %d/%d reachable", connectsResult.Successes, connectsResult.Total)
|
|
for _, tcpkeys := range connectsResult.AllKeys {
|
|
// rewrite TCPConnect to include blocking information - it is very
|
|
// sad that we're storing analysis result inside the measurement
|
|
tk.TCPConnect = append(tk.TCPConnect, ComputeTCPBlocking(
|
|
tcpkeys.TCPConnect, tk.Control.TCPConnect)...)
|
|
for _, ev := range tcpkeys.NetworkEvents {
|
|
ev.Tags = []string{TCPTLSExperimentTag}
|
|
tk.NetworkEvents = append(tk.NetworkEvents, ev)
|
|
}
|
|
for _, ev := range tcpkeys.TLSHandshakes {
|
|
ev.Tags = []string{TCPTLSExperimentTag}
|
|
tk.TLSHandshakes = append(tk.TLSHandshakes, ev)
|
|
}
|
|
}
|
|
tk.TCPConnectAttempts = connectsResult.Total
|
|
tk.TCPConnectSuccesses = connectsResult.Successes
|
|
// 6. perform HTTP/HTTPS measurement
|
|
httpBegin := time.Now()
|
|
httpResult := HTTPGet(ctx, HTTPGetConfig{
|
|
Addresses: dnsResult.Addresses(),
|
|
Begin: measurement.MeasurementStartTimeSaved,
|
|
Session: sess,
|
|
TargetURL: URL,
|
|
})
|
|
tk.HTTPRuntime = time.Since(httpBegin)
|
|
tk.HTTPExperimentFailure = httpResult.Failure
|
|
tk.Requests = append(tk.Requests, httpResult.TestKeys.Requests...)
|
|
// 7. compare HTTP measurement to control
|
|
tk.HTTPAnalysisResult = HTTPAnalysis(httpResult.TestKeys, tk.Control)
|
|
tk.HTTPAnalysisResult.Log(sess.Logger())
|
|
tk.Summary = Summarize(tk)
|
|
tk.Summary.Log(sess.Logger())
|
|
return nil
|
|
}
|
|
|
|
// ComputeTCPBlocking will return a copy of the input TCPConnect structure
|
|
// where we set the Blocking value depending on the control results.
|
|
func ComputeTCPBlocking(measurement []tracex.TCPConnectEntry,
|
|
control map[string]ControlTCPConnectResult) (out []tracex.TCPConnectEntry) {
|
|
out = []tracex.TCPConnectEntry{}
|
|
for _, me := range measurement {
|
|
epnt := net.JoinHostPort(me.IP, strconv.Itoa(me.Port))
|
|
if ce, ok := control[epnt]; ok {
|
|
v := ce.Failure == nil && me.Status.Failure != nil
|
|
me.Status.Blocked = &v
|
|
}
|
|
out = append(out, me)
|
|
}
|
|
return
|
|
}
|
|
|
|
// SummaryKeys contains summary keys for this experiment.
|
|
//
|
|
// Note that this structure is part of the ABI contract with ooniprobe
|
|
// therefore we should be careful when changing it.
|
|
type SummaryKeys struct {
|
|
Accessible bool `json:"accessible"`
|
|
Blocking string `json:"blocking"`
|
|
IsAnomaly bool `json:"-"`
|
|
}
|
|
|
|
// GetSummaryKeys implements model.ExperimentMeasurer.GetSummaryKeys.
|
|
func (m Measurer) GetSummaryKeys(measurement *model.Measurement) (interface{}, error) {
|
|
sk := SummaryKeys{IsAnomaly: false}
|
|
tk, ok := measurement.TestKeys.(*TestKeys)
|
|
if !ok {
|
|
return sk, errors.New("invalid test keys type")
|
|
}
|
|
sk.IsAnomaly = tk.BlockingReason != nil
|
|
if tk.BlockingReason != nil {
|
|
sk.Blocking = *tk.BlockingReason
|
|
}
|
|
sk.Accessible = tk.Accessible != nil && *tk.Accessible
|
|
return sk, nil
|
|
}
|