c5ad5eedeb
* feat: create tunnel inside NewSession We want to create the tunnel when we create the session. This change allows us to nicely ignore the problem of creating a tunnel when we already have a proxy, as well as the problem of locking. Everything is happening, in fact, inside of the NewSession factory. Modify miniooni such that --tunnel is just syntactic sugar for --proxy, at least for now. We want, in the future, to teach the tunnel to possibly use a socks5 proxy. Because starting a tunnel is a slow operation, we need a context in NewSession. This causes a bunch of places to change. Not really a big deal except we need to propagate the changes. Make sure that the mobile code can create a new session using a proxy for all the APIs we support. Make sure all tests are still green and we don't loose coverage of the various ways in which this code could be used. This change is part of https://github.com/ooni/probe/issues/985. * changes after merge * fix: only keep tests that can hopefully work While there, identify other places where we should add more tests or fix integration tests. Part of https://github.com/ooni/probe/issues/985
781 lines
21 KiB
Go
781 lines
21 KiB
Go
package urlgetter_test
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/http"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/apex/log"
|
|
"github.com/ooni/probe-cli/v3/internal/engine/experiment/urlgetter"
|
|
"github.com/ooni/probe-cli/v3/internal/engine/internal/mockable"
|
|
"github.com/ooni/probe-cli/v3/internal/engine/netx/errorx"
|
|
)
|
|
|
|
func TestGetterWithVeryShortTimeout(t *testing.T) {
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{
|
|
Timeout: 1,
|
|
},
|
|
Session: &mockable.Session{},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(context.Background())
|
|
if !errors.Is(err, context.DeadlineExceeded) {
|
|
t.Fatal("not the error we expected")
|
|
}
|
|
if tk.Agent != "redirect" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation == nil || *tk.FailedOperation != errorx.TopLevelOperation {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure == nil || *tk.Failure != "generic_timeout_error" {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
if len(tk.NetworkEvents) != 3 {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if tk.NetworkEvents[0].Operation != "http_transaction_start" {
|
|
t.Fatal("not the NetworkEvents[0].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[1].Operation != "http_request_metadata" {
|
|
t.Fatal("not the NetworkEvents[1].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[2].Operation != "http_transaction_done" {
|
|
t.Fatal("not the NetworkEvents[2].Operation we expected")
|
|
}
|
|
if len(tk.Queries) != 0 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 0 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 1 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.Requests[0].Request.Method != "GET" {
|
|
t.Fatal("not the Method we expected")
|
|
}
|
|
if tk.Requests[0].Request.URL != "https://www.google.com" {
|
|
t.Fatal("not the URL we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 0 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 0 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if tk.HTTPResponseBody != "" {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterWithCancelledContextVanilla(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel() // faily immediately
|
|
g := urlgetter.Getter{
|
|
Session: &mockable.Session{},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if !errors.Is(err, context.Canceled) {
|
|
t.Fatal("not the error we expected")
|
|
}
|
|
if tk.Agent != "redirect" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation == nil || *tk.FailedOperation != errorx.TopLevelOperation {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure == nil || !strings.HasSuffix(*tk.Failure, "interrupted") {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
if len(tk.NetworkEvents) != 3 {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if tk.NetworkEvents[0].Operation != "http_transaction_start" {
|
|
t.Fatal("not the NetworkEvents[0].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[1].Operation != "http_request_metadata" {
|
|
t.Fatal("not the NetworkEvents[1].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[2].Operation != "http_transaction_done" {
|
|
t.Fatal("not the NetworkEvents[2].Operation we expected")
|
|
}
|
|
if len(tk.Queries) != 0 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 0 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 1 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.Requests[0].Request.Method != "GET" {
|
|
t.Fatal("not the Method we expected")
|
|
}
|
|
if tk.Requests[0].Request.URL != "https://www.google.com" {
|
|
t.Fatal("not the URL we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 0 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 0 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if tk.HTTPResponseBody != "" {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterWithCancelledContextAndMethod(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel() // faily immediately
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{Method: "POST"},
|
|
Session: &mockable.Session{},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if !errors.Is(err, context.Canceled) {
|
|
t.Fatal("not the error we expected")
|
|
}
|
|
if tk.Agent != "redirect" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation == nil || *tk.FailedOperation != errorx.TopLevelOperation {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure == nil || !strings.HasSuffix(*tk.Failure, "interrupted") {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
if len(tk.NetworkEvents) != 3 {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if tk.NetworkEvents[0].Operation != "http_transaction_start" {
|
|
t.Fatal("not the NetworkEvents[0].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[1].Operation != "http_request_metadata" {
|
|
t.Fatal("not the NetworkEvents[1].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[2].Operation != "http_transaction_done" {
|
|
t.Fatal("not the NetworkEvents[2].Operation we expected")
|
|
}
|
|
if len(tk.Queries) != 0 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 0 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 1 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.Requests[0].Request.Method != "POST" {
|
|
t.Fatal("not the Method we expected")
|
|
}
|
|
if tk.Requests[0].Request.URL != "https://www.google.com" {
|
|
t.Fatal("not the URL we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 0 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 0 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if tk.HTTPResponseBody != "" {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterWithCancelledContextNoFollowRedirects(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel() // faily immediately
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{
|
|
NoFollowRedirects: true,
|
|
},
|
|
Session: &mockable.Session{},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if !errors.Is(err, context.Canceled) {
|
|
t.Fatal("not the error we expected")
|
|
}
|
|
if tk.Agent != "agent" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation == nil || *tk.FailedOperation != errorx.TopLevelOperation {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure == nil || !strings.HasSuffix(*tk.Failure, "interrupted") {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
if len(tk.NetworkEvents) != 3 {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if tk.NetworkEvents[0].Operation != "http_transaction_start" {
|
|
t.Fatal("not the NetworkEvents[0].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[1].Operation != "http_request_metadata" {
|
|
t.Fatal("not the NetworkEvents[1].Operation we expected")
|
|
}
|
|
if tk.NetworkEvents[2].Operation != "http_transaction_done" {
|
|
t.Fatal("not the NetworkEvents[2].Operation we expected")
|
|
}
|
|
if len(tk.Queries) != 0 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 0 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 1 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.Requests[0].Request.Method != "GET" {
|
|
t.Fatal("not the Method we expected")
|
|
}
|
|
if tk.Requests[0].Request.URL != "https://www.google.com" {
|
|
t.Fatal("not the URL we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 0 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 0 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if tk.HTTPResponseBody != "" {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterWithCancelledContextCannotStartTunnel(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel() // fail immediately
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{
|
|
Tunnel: "psiphon",
|
|
},
|
|
Session: &mockable.Session{MockableLogger: log.Log},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if !errors.Is(err, context.Canceled) {
|
|
t.Fatalf("not the error we expected: %+v", err)
|
|
}
|
|
if tk.Agent != "redirect" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation == nil || *tk.FailedOperation != errorx.TopLevelOperation {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure == nil || *tk.Failure != "interrupted" {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
if len(tk.NetworkEvents) != 0 {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if len(tk.Queries) != 0 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 0 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 0 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 0 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "psiphon" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 0 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if tk.HTTPResponseBody != "" {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterWithCancelledContextUnknownResolverURL(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel() // faily immediately
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{
|
|
ResolverURL: "antani://8.8.8.8:53",
|
|
},
|
|
Session: &mockable.Session{},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if err == nil || err.Error() != "unknown_failure: unsupported resolver scheme" {
|
|
t.Fatal("not the error we expected")
|
|
}
|
|
if tk.Agent != "redirect" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation == nil || *tk.FailedOperation != errorx.TopLevelOperation {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure == nil || *tk.Failure != "unknown_failure: unsupported resolver scheme" {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
if len(tk.NetworkEvents) != 0 {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if len(tk.Queries) != 0 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 0 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 0 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 0 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 0 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if tk.HTTPResponseBody != "" {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterIntegrationHTTPS(t *testing.T) {
|
|
ctx := context.Background()
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{
|
|
NoFollowRedirects: true, // reduce number of events
|
|
},
|
|
Session: &mockable.Session{},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if tk.Agent != "agent" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation != nil {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure != nil {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
var (
|
|
httpTransactionStart bool
|
|
httpRequestMetadata bool
|
|
resolveStart bool
|
|
resolveDone bool
|
|
connect bool
|
|
tlsHandshakeStart bool
|
|
tlsHandshakeDone bool
|
|
httpWroteHeaders bool
|
|
httpWroteRequest bool
|
|
httpFirstResponseByte bool
|
|
httpResponseMetadata bool
|
|
httpResponseBodySnapshot bool
|
|
httpTransactionDone bool
|
|
)
|
|
for _, ev := range tk.NetworkEvents {
|
|
switch ev.Operation {
|
|
case "http_transaction_start":
|
|
httpTransactionStart = true
|
|
case "http_request_metadata":
|
|
httpRequestMetadata = true
|
|
case "resolve_start":
|
|
resolveStart = true
|
|
case "resolve_done":
|
|
resolveDone = true
|
|
case errorx.ConnectOperation:
|
|
connect = true
|
|
case "tls_handshake_start":
|
|
tlsHandshakeStart = true
|
|
case "tls_handshake_done":
|
|
tlsHandshakeDone = true
|
|
case "http_wrote_headers":
|
|
httpWroteHeaders = true
|
|
case "http_wrote_request":
|
|
httpWroteRequest = true
|
|
case "http_first_response_byte":
|
|
httpFirstResponseByte = true
|
|
case "http_response_metadata":
|
|
httpResponseMetadata = true
|
|
case "http_response_body_snapshot":
|
|
httpResponseBodySnapshot = true
|
|
case "http_transaction_done":
|
|
httpTransactionDone = true
|
|
}
|
|
}
|
|
ok := true
|
|
ok = ok && httpTransactionStart
|
|
ok = ok && httpRequestMetadata
|
|
ok = ok && resolveStart
|
|
ok = ok && resolveDone
|
|
ok = ok && connect
|
|
ok = ok && tlsHandshakeStart
|
|
ok = ok && tlsHandshakeDone
|
|
ok = ok && httpWroteHeaders
|
|
ok = ok && httpWroteRequest
|
|
ok = ok && httpFirstResponseByte
|
|
ok = ok && httpResponseMetadata
|
|
ok = ok && httpResponseBodySnapshot
|
|
ok = ok && httpTransactionDone
|
|
if !ok {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if len(tk.Queries) != 2 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 1 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 1 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.Requests[0].Request.Method != "GET" {
|
|
t.Fatal("not the Method we expected")
|
|
}
|
|
if tk.Requests[0].Request.URL != "https://www.google.com" {
|
|
t.Fatal("not the URL we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 1 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 200 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if len(tk.HTTPResponseBody) <= 0 {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterIntegrationRedirect(t *testing.T) {
|
|
ctx := context.Background()
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{NoFollowRedirects: true},
|
|
Session: &mockable.Session{},
|
|
Target: "http://web.whatsapp.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if tk.HTTPResponseStatus != 302 {
|
|
t.Fatal("unexpected status code")
|
|
}
|
|
if len(tk.HTTPResponseLocations) != 1 {
|
|
t.Fatal("missing redirect URL")
|
|
}
|
|
if tk.HTTPResponseLocations[0] != "https://web.whatsapp.com/" {
|
|
t.Fatal("invalid redirect URL")
|
|
}
|
|
}
|
|
|
|
func TestGetterIntegrationTLSHandshake(t *testing.T) {
|
|
ctx := context.Background()
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{
|
|
NoFollowRedirects: true, // reduce number of events
|
|
},
|
|
Session: &mockable.Session{},
|
|
Target: "tlshandshake://www.google.com:443",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if tk.Agent != "agent" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime != 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation != nil {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure != nil {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
var (
|
|
httpTransactionStart bool
|
|
httpRequestMetadata bool
|
|
resolveStart bool
|
|
resolveDone bool
|
|
connect bool
|
|
tlsHandshakeStart bool
|
|
tlsHandshakeDone bool
|
|
httpWroteHeaders bool
|
|
httpWroteRequest bool
|
|
httpFirstResponseByte bool
|
|
httpResponseMetadata bool
|
|
httpResponseBodySnapshot bool
|
|
httpTransactionDone bool
|
|
)
|
|
for _, ev := range tk.NetworkEvents {
|
|
switch ev.Operation {
|
|
case "http_transaction_start":
|
|
httpTransactionStart = true
|
|
case "http_request_metadata":
|
|
httpRequestMetadata = true
|
|
case "resolve_start":
|
|
resolveStart = true
|
|
case "resolve_done":
|
|
resolveDone = true
|
|
case errorx.ConnectOperation:
|
|
connect = true
|
|
case "tls_handshake_start":
|
|
tlsHandshakeStart = true
|
|
case "tls_handshake_done":
|
|
tlsHandshakeDone = true
|
|
case "http_wrote_headers":
|
|
httpWroteHeaders = true
|
|
case "http_wrote_request":
|
|
httpWroteRequest = true
|
|
case "http_first_response_byte":
|
|
httpFirstResponseByte = true
|
|
case "http_response_metadata":
|
|
httpResponseMetadata = true
|
|
case "http_response_body_snapshot":
|
|
httpResponseBodySnapshot = true
|
|
case "http_transaction_done":
|
|
httpTransactionDone = true
|
|
}
|
|
}
|
|
ok := true
|
|
ok = ok && !httpTransactionStart
|
|
ok = ok && !httpRequestMetadata
|
|
ok = ok && resolveStart
|
|
ok = ok && resolveDone
|
|
ok = ok && connect
|
|
ok = ok && tlsHandshakeStart
|
|
ok = ok && tlsHandshakeDone
|
|
ok = ok && !httpWroteHeaders
|
|
ok = ok && !httpWroteRequest
|
|
ok = ok && !httpFirstResponseByte
|
|
ok = ok && !httpResponseMetadata
|
|
ok = ok && !httpResponseBodySnapshot
|
|
ok = ok && !httpTransactionDone
|
|
if !ok {
|
|
t.Fatal("not the NetworkEvents we expected")
|
|
}
|
|
if len(tk.Queries) != 2 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 1 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 0 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.SOCKSProxy != "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 1 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 0 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if tk.HTTPResponseBody != "" {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|
|
|
|
func TestGetterIntegrationHTTPSWithTunnel(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("skip test in short mode")
|
|
}
|
|
// TODO(bassosimone): this test is broken. It now requires a
|
|
// real Session to work as intended. We didn't notice until now
|
|
// because integration tests do not run for every PR.
|
|
ctx := context.Background()
|
|
g := urlgetter.Getter{
|
|
Config: urlgetter.Config{
|
|
NoFollowRedirects: true, // reduce number of events
|
|
Tunnel: "psiphon",
|
|
},
|
|
Session: &mockable.Session{
|
|
MockableHTTPClient: http.DefaultClient,
|
|
MockableLogger: log.Log,
|
|
},
|
|
Target: "https://www.google.com",
|
|
}
|
|
tk, err := g.Get(ctx)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if tk.Agent != "agent" {
|
|
t.Fatal("not the Agent we expected")
|
|
}
|
|
if tk.BootstrapTime <= 0 {
|
|
t.Fatal("not the BootstrapTime we expected")
|
|
}
|
|
if tk.FailedOperation != nil {
|
|
t.Fatal("not the FailedOperation we expected")
|
|
}
|
|
if tk.Failure != nil {
|
|
t.Fatal("not the Failure we expected")
|
|
}
|
|
var (
|
|
httpTransactionStart bool
|
|
httpRequestMetadata bool
|
|
resolveStart bool
|
|
resolveDone bool
|
|
connect bool
|
|
tlsHandshakeStart bool
|
|
tlsHandshakeDone bool
|
|
httpWroteHeaders bool
|
|
httpWroteRequest bool
|
|
httpFirstResponseByte bool
|
|
httpResponseMetadata bool
|
|
httpResponseBodySnapshot bool
|
|
httpTransactionDone bool
|
|
)
|
|
for _, ev := range tk.NetworkEvents {
|
|
switch ev.Operation {
|
|
case "http_transaction_start":
|
|
httpTransactionStart = true
|
|
case "http_request_metadata":
|
|
httpRequestMetadata = true
|
|
case "resolve_start":
|
|
resolveStart = true
|
|
case "resolve_done":
|
|
resolveDone = true
|
|
case errorx.ConnectOperation:
|
|
connect = true
|
|
case "tls_handshake_start":
|
|
tlsHandshakeStart = true
|
|
case "tls_handshake_done":
|
|
tlsHandshakeDone = true
|
|
case "http_wrote_headers":
|
|
httpWroteHeaders = true
|
|
case "http_wrote_request":
|
|
httpWroteRequest = true
|
|
case "http_first_response_byte":
|
|
httpFirstResponseByte = true
|
|
case "http_response_metadata":
|
|
httpResponseMetadata = true
|
|
case "http_response_body_snapshot":
|
|
httpResponseBodySnapshot = true
|
|
case "http_transaction_done":
|
|
httpTransactionDone = true
|
|
}
|
|
}
|
|
ok := true
|
|
ok = ok && httpTransactionStart
|
|
ok = ok && httpRequestMetadata
|
|
ok = ok && resolveStart == false
|
|
ok = ok && resolveDone == false
|
|
ok = ok && connect
|
|
ok = ok && tlsHandshakeStart
|
|
ok = ok && tlsHandshakeDone
|
|
ok = ok && httpWroteHeaders
|
|
ok = ok && httpWroteRequest
|
|
ok = ok && httpFirstResponseByte
|
|
ok = ok && httpResponseMetadata
|
|
ok = ok && httpResponseBodySnapshot
|
|
ok = ok && httpTransactionDone
|
|
if !ok {
|
|
t.Fatalf("not the NetworkEvents we expected: %+v", tk.NetworkEvents)
|
|
}
|
|
if len(tk.Queries) != 0 {
|
|
t.Fatal("not the Queries we expected")
|
|
}
|
|
if len(tk.TCPConnect) != 1 {
|
|
t.Fatal("not the TCPConnect we expected")
|
|
}
|
|
if len(tk.Requests) != 1 {
|
|
t.Fatal("not the Requests we expected")
|
|
}
|
|
if tk.Requests[0].Request.Method != "GET" {
|
|
t.Fatal("not the Method we expected")
|
|
}
|
|
if tk.Requests[0].Request.URL != "https://www.google.com" {
|
|
t.Fatal("not the URL we expected")
|
|
}
|
|
if tk.SOCKSProxy == "" {
|
|
t.Fatal("not the SOCKSProxy we expected")
|
|
}
|
|
if len(tk.TLSHandshakes) != 1 {
|
|
t.Fatal("not the TLSHandshakes we expected")
|
|
}
|
|
if tk.Tunnel != "psiphon" {
|
|
t.Fatal("not the Tunnel we expected")
|
|
}
|
|
if tk.HTTPResponseStatus != 200 {
|
|
t.Fatal("not the HTTPResponseStatus we expected")
|
|
}
|
|
if len(tk.HTTPResponseBody) <= 0 {
|
|
t.Fatal("not the HTTPResponseBody we expected")
|
|
}
|
|
}
|