github.com/Psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/server/passthrough_test.go (about)

     1  /*
     2   * Copyright (c) 2020, Psiphon Inc.
     3   * All rights reserved.
     4   *
     5   * This program is free software: you can redistribute it and/or modify
     6   * it under the terms of the GNU General Public License as published by
     7   * the Free Software Foundation, either version 3 of the License, or
     8   * (at your option) any later version.
     9   *
    10   * This program is distributed in the hope that it will be useful,
    11   * but WITHOUT ANY WARRANTY; without even the implied warranty of
    12   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    13   * GNU General Public License for more details.
    14   *
    15   * You should have received a copy of the GNU General Public License
    16   * along with this program.  If not, see <http://www.gnu.org/licenses/>.
    17   *
    18   */
    19  
    20  package server
    21  
    22  import (
    23  	"bytes"
    24  	"context"
    25  	"crypto/tls"
    26  	"crypto/x509"
    27  	"encoding/json"
    28  	"errors"
    29  	"fmt"
    30  	"io/ioutil"
    31  	"net"
    32  	"net/http"
    33  	"os"
    34  	"path/filepath"
    35  	"sync"
    36  	"sync/atomic"
    37  	"testing"
    38  	"time"
    39  
    40  	"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon"
    41  	"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
    42  	"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
    43  	"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
    44  )
    45  
    46  func TestPassthrough(t *testing.T) {
    47  	testPassthrough(t, false)
    48  }
    49  
    50  func TestLegacyPassthrough(t *testing.T) {
    51  	testPassthrough(t, true)
    52  }
    53  
    54  func testPassthrough(t *testing.T, legacy bool) {
    55  
    56  	psiphon.SetEmitDiagnosticNotices(true, true)
    57  
    58  	// Run passthrough web server
    59  
    60  	webServerCertificate, webServerPrivateKey, err := common.GenerateWebServerCertificate("example.org")
    61  	if err != nil {
    62  		t.Fatalf("common.GenerateWebServerCertificate failed: %s", err)
    63  	}
    64  
    65  	webListener, err := net.Listen("tcp", "127.0.0.1:0")
    66  	if err != nil {
    67  		t.Fatalf("net.Listen failed: %s", err)
    68  	}
    69  	defer webListener.Close()
    70  
    71  	webCertificate, err := tls.X509KeyPair(
    72  		[]byte(webServerCertificate),
    73  		[]byte(webServerPrivateKey))
    74  	if err != nil {
    75  		t.Fatalf("tls.X509KeyPair failed: %s", err)
    76  	}
    77  
    78  	webListener = tls.NewListener(webListener, &tls.Config{
    79  		Certificates: []tls.Certificate{webCertificate},
    80  	})
    81  
    82  	webServerAddress := webListener.Addr().String()
    83  
    84  	webResponseBody := []byte(prng.HexString(32))
    85  
    86  	webServer := http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
    87  		w.Write(webResponseBody)
    88  	})
    89  
    90  	go func() {
    91  		http.Serve(webListener, webServer)
    92  	}()
    93  
    94  	// Run Psiphon server
    95  
    96  	tunnelProtocol := protocol.TUNNEL_PROTOCOL_UNFRONTED_MEEK_SESSION_TICKET
    97  
    98  	generateConfigParams := &GenerateConfigParams{
    99  		ServerIPAddress:      "127.0.0.1",
   100  		EnableSSHAPIRequests: true,
   101  		WebServerPort:        8000,
   102  		TunnelProtocolPorts:  map[string]int{tunnelProtocol: 4000},
   103  		Passthrough:          true,
   104  		LegacyPassthrough:    legacy,
   105  	}
   106  
   107  	serverConfigJSON, _, _, _, encodedServerEntry, err := GenerateConfig(generateConfigParams)
   108  	if err != nil {
   109  		t.Fatalf("error generating server config: %s", err)
   110  	}
   111  
   112  	var serverConfig map[string]interface{}
   113  	json.Unmarshal(serverConfigJSON, &serverConfig)
   114  
   115  	serverConfig["LogFilename"] = filepath.Join(testDataDirName, "psiphond.log")
   116  	serverConfig["LogLevel"] = "debug"
   117  	serverConfig["TunnelProtocolPassthroughAddresses"] = map[string]string{tunnelProtocol: webServerAddress}
   118  
   119  	serverConfigJSON, _ = json.Marshal(serverConfig)
   120  
   121  	serverWaitGroup := new(sync.WaitGroup)
   122  	serverWaitGroup.Add(1)
   123  	go func() {
   124  		defer serverWaitGroup.Done()
   125  		err := RunServices(serverConfigJSON)
   126  		if err != nil {
   127  			t.Errorf("error running server: %s", err)
   128  		}
   129  	}()
   130  
   131  	defer func() {
   132  		p, _ := os.FindProcess(os.Getpid())
   133  		p.Signal(os.Interrupt)
   134  		serverWaitGroup.Wait()
   135  	}()
   136  
   137  	// TODO: monitor logs for more robust wait-until-loaded.
   138  	time.Sleep(1 * time.Second)
   139  
   140  	// Test: normal client connects successfully
   141  
   142  	clientConfigJSON := fmt.Sprintf(`
   143  		    {
   144  		    	"DataRootDirectory" : "%s",
   145  		        "ClientPlatform" : "Windows",
   146  		        "ClientVersion" : "0",
   147  		        "SponsorId" : "0",
   148  		        "PropagationChannelId" : "0",
   149  		        "TargetServerEntry" : "%s"
   150  		    }`, testDataDirName, string(encodedServerEntry))
   151  
   152  	clientConfig, err := psiphon.LoadConfig([]byte(clientConfigJSON))
   153  	if err != nil {
   154  		t.Fatalf("error processing configuration file: %s", err)
   155  	}
   156  
   157  	err = clientConfig.Commit(false)
   158  	if err != nil {
   159  		t.Fatalf("error committing configuration file: %s", err)
   160  	}
   161  
   162  	err = psiphon.OpenDataStore(clientConfig)
   163  	if err != nil {
   164  		t.Fatalf("error initializing client datastore: %s", err)
   165  	}
   166  	defer psiphon.CloseDataStore()
   167  
   168  	controller, err := psiphon.NewController(clientConfig)
   169  	if err != nil {
   170  		t.Fatalf("error creating client controller: %s", err)
   171  	}
   172  
   173  	tunnelEstablished := make(chan struct{}, 1)
   174  
   175  	psiphon.SetNoticeWriter(psiphon.NewNoticeReceiver(
   176  		func(notice []byte) {
   177  			noticeType, payload, err := psiphon.GetNotice(notice)
   178  			if err != nil {
   179  				return
   180  			}
   181  			if noticeType == "Tunnels" {
   182  				count := int(payload["count"].(float64))
   183  				if count >= 1 {
   184  					tunnelEstablished <- struct{}{}
   185  				}
   186  			}
   187  		}))
   188  
   189  	ctx, cancelFunc := context.WithCancel(context.Background())
   190  	controllerWaitGroup := new(sync.WaitGroup)
   191  	controllerWaitGroup.Add(1)
   192  	go func() {
   193  		defer controllerWaitGroup.Done()
   194  		controller.Run(ctx)
   195  	}()
   196  	<-tunnelEstablished
   197  	cancelFunc()
   198  	controllerWaitGroup.Wait()
   199  
   200  	// Test: passthrough
   201  
   202  	// Non-psiphon HTTPS request routed to passthrough web server
   203  
   204  	verifiedCertificate := int32(0)
   205  
   206  	httpClient := &http.Client{
   207  		Transport: &http.Transport{
   208  			TLSClientConfig: &tls.Config{
   209  				InsecureSkipVerify: true,
   210  				VerifyPeerCertificate: func(rawCerts [][]byte, _ [][]*x509.Certificate) error {
   211  					if len(rawCerts) < 1 {
   212  						return errors.New("no certificate to verify")
   213  					}
   214  					if !bytes.Equal(rawCerts[0], []byte(webCertificate.Certificate[0])) {
   215  						return errors.New("unexpected certificate")
   216  					}
   217  					atomic.StoreInt32(&verifiedCertificate, 1)
   218  					return nil
   219  				},
   220  			},
   221  		},
   222  	}
   223  
   224  	response, err := httpClient.Get("https://" + webServerAddress)
   225  	if err != nil {
   226  		t.Fatalf("http.Get failed: %s", err)
   227  	}
   228  	defer response.Body.Close()
   229  
   230  	if atomic.LoadInt32(&verifiedCertificate) != 1 {
   231  		t.Fatalf("certificate not verified")
   232  	}
   233  
   234  	if response.StatusCode != http.StatusOK {
   235  		t.Fatalf("unexpected response.StatusCode: %d", response.StatusCode)
   236  	}
   237  
   238  	responseBody, err := ioutil.ReadAll(response.Body)
   239  	if err != nil {
   240  		t.Fatalf("ioutil.ReadAll failed: %s", err)
   241  	}
   242  
   243  	if !bytes.Equal(responseBody, webResponseBody) {
   244  		t.Fatalf("unexpected responseBody: %s", string(responseBody))
   245  	}
   246  }