You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
go-mitmproxy/proxy/proxy_test.go

485 lines
13 KiB
Go

2 years ago
package proxy
import (
"context"
2 years ago
"crypto/tls"
2 years ago
"io"
2 years ago
"io/ioutil"
"net"
"net/http"
"net/url"
"strconv"
"strings"
"sync"
2 years ago
"testing"
"time"
"github.com/lqqyt2423/go-mitmproxy/cert"
)
func handleError(t *testing.T, err error) {
t.Helper()
if err != nil {
t.Fatal(err)
}
}
2 years ago
func testSendRequest(t *testing.T, endpoint string, client *http.Client, bodyWant string) {
t.Helper()
req, err := http.NewRequest("GET", endpoint, nil)
handleError(t, err)
if client == nil {
client = http.DefaultClient
}
resp, err := client.Do(req)
handleError(t, err)
defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
handleError(t, err)
if string(body) != bodyWant {
t.Fatalf("expected %s, but got %s", bodyWant, body)
}
}
// addon for test intercept
type interceptAddon struct {
BaseAddon
}
func (addon *interceptAddon) Request(f *Flow) {
// intercept request, should not send request to real endpoint
if f.Request.URL.Path == "/intercept-request" {
f.Response = &Response{
StatusCode: 200,
Body: []byte("intercept-request"),
}
}
}
func (addon *interceptAddon) Response(f *Flow) {
if f.Request.URL.Path == "/intercept-response" {
f.Response = &Response{
StatusCode: 200,
Body: []byte("intercept-response"),
}
}
}
// addon for test functions' execute order
type testOrderAddon struct {
BaseAddon
orders []string
mu sync.Mutex
}
func (addon *testOrderAddon) reset() {
addon.mu.Lock()
defer addon.mu.Unlock()
addon.orders = make([]string, 0)
}
func (addon *testOrderAddon) contains(t *testing.T, name string) {
t.Helper()
addon.mu.Lock()
defer addon.mu.Unlock()
for _, n := range addon.orders {
if name == n {
return
}
}
t.Fatalf("expected contains %s, but not", name)
}
func (addon *testOrderAddon) before(t *testing.T, a, b string) {
t.Helper()
addon.mu.Lock()
defer addon.mu.Unlock()
aIndex, bIndex := -1, -1
for i, n := range addon.orders {
if a == n {
aIndex = i
} else if b == n {
bIndex = i
}
}
if aIndex == -1 {
t.Fatalf("expected contains %s, but not", a)
}
if bIndex == -1 {
t.Fatalf("expected contains %s, but not", b)
}
if aIndex > bIndex {
t.Fatalf("expected %s executed before %s, but not", a, b)
}
2 years ago
}
func (addon *testOrderAddon) ClientConnected(*ClientConn) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "ClientConnected")
}
func (addon *testOrderAddon) ClientDisconnected(*ClientConn) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "ClientDisconnected")
}
func (addon *testOrderAddon) ServerConnected(*ConnContext) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "ServerConnected")
}
func (addon *testOrderAddon) ServerDisconnected(*ConnContext) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "ServerDisconnected")
}
func (addon *testOrderAddon) TlsEstablishedServer(*ConnContext) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "TlsEstablishedServer")
}
func (addon *testOrderAddon) Requestheaders(*Flow) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "Requestheaders")
}
func (addon *testOrderAddon) Request(*Flow) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "Request")
}
func (addon *testOrderAddon) Responseheaders(*Flow) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "Responseheaders")
}
func (addon *testOrderAddon) Response(*Flow) {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "Response")
}
func (addon *testOrderAddon) StreamRequestModifier(f *Flow, in io.Reader) io.Reader {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "StreamRequestModifier")
return in
}
func (addon *testOrderAddon) StreamResponseModifier(f *Flow, in io.Reader) io.Reader {
addon.mu.Lock()
defer addon.mu.Unlock()
2 years ago
addon.orders = append(addon.orders, "StreamResponseModifier")
return in
}
2 years ago
func TestProxy(t *testing.T) {
// start http server
ln, err := net.Listen("tcp", "127.0.0.1:0")
handleError(t, err)
defer ln.Close()
go http.Serve(ln, nil)
// start https server
tlsLn, err := net.Listen("tcp", "127.0.0.1:0")
handleError(t, err)
defer tlsLn.Close()
ca, err := cert.NewCAMemory()
handleError(t, err)
cert, err := ca.GetCert("localhost")
handleError(t, err)
tlsConfig := &tls.Config{
Certificates: []tls.Certificate{*cert},
}
go http.Serve(tls.NewListener(tlsLn, tlsConfig), nil)
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
w.Write([]byte("ok"))
})
httpEndpoint := "http://" + ln.Addr().String() + "/"
httpsPort := tlsLn.Addr().(*net.TCPAddr).Port
httpsEndpoint := "https://localhost:" + strconv.Itoa(httpsPort) + "/"
t.Run("test http server", func(t *testing.T) {
2 years ago
testSendRequest(t, httpEndpoint, nil, "ok")
2 years ago
})
t.Run("test https server", func(t *testing.T) {
t.Run("should generate not trusted error", func(t *testing.T) {
_, err := http.Get(httpsEndpoint)
if err == nil {
t.Fatal("should have error")
}
if !strings.Contains(err.Error(), "certificate is not trusted") {
t.Fatal("should get not trusted error, but got", err.Error())
}
})
t.Run("should get ok when InsecureSkipVerify", func(t *testing.T) {
client := &http.Client{
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
},
},
}
2 years ago
testSendRequest(t, httpsEndpoint, client, "ok")
2 years ago
})
})
// start proxy
testProxy, err := NewProxy(&Options{
Addr: ":29080", // some random port
SslInsecure: true,
})
handleError(t, err)
2 years ago
testProxy.AddAddon(&interceptAddon{})
testOrderAddonInstance := &testOrderAddon{
orders: make([]string, 0),
}
testProxy.AddAddon(testOrderAddonInstance)
2 years ago
go testProxy.Start()
time.Sleep(time.Millisecond * 10) // wait for test proxy startup
2 years ago
getProxyClient := func() *http.Client {
return &http.Client{
2 years ago
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
},
Proxy: func(r *http.Request) (*url.URL, error) {
return url.Parse("http://127.0.0.1:29080")
},
},
}
2 years ago
}
t.Run("test proxy", func(t *testing.T) {
proxyClient := getProxyClient()
2 years ago
t.Run("can proxy http", func(t *testing.T) {
2 years ago
testSendRequest(t, httpEndpoint, proxyClient, "ok")
2 years ago
})
t.Run("can proxy https", func(t *testing.T) {
2 years ago
testSendRequest(t, httpsEndpoint, proxyClient, "ok")
})
t.Run("can intercept request", func(t *testing.T) {
t.Run("http", func(t *testing.T) {
testSendRequest(t, httpEndpoint+"intercept-request", proxyClient, "intercept-request")
})
t.Run("https", func(t *testing.T) {
testSendRequest(t, httpsEndpoint+"intercept-request", proxyClient, "intercept-request")
})
})
t.Run("can intercept request with wrong host", func(t *testing.T) {
t.Run("http", func(t *testing.T) {
httpEndpoint := "http://some-wrong-host/"
testSendRequest(t, httpEndpoint+"intercept-request", proxyClient, "intercept-request")
})
t.Run("https can't", func(t *testing.T) {
2 years ago
httpsEndpoint := "https://some-wrong-host/"
_, err := http.Get(httpsEndpoint + "intercept-request")
if err == nil {
t.Fatal("should have error")
}
if !strings.Contains(err.Error(), "dial tcp") {
t.Fatal("should get dial error, but got", err.Error())
}
2 years ago
})
})
t.Run("can intercept response", func(t *testing.T) {
t.Run("http", func(t *testing.T) {
testSendRequest(t, httpEndpoint+"intercept-response", proxyClient, "intercept-response")
})
t.Run("https", func(t *testing.T) {
testSendRequest(t, httpsEndpoint+"intercept-response", proxyClient, "intercept-response")
})
})
})
t.Run("test proxy when DisableKeepAlives", func(t *testing.T) {
proxyClient := getProxyClient()
proxyClient.Transport.(*http.Transport).DisableKeepAlives = true
t.Run("http", func(t *testing.T) {
testSendRequest(t, httpEndpoint, proxyClient, "ok")
})
t.Run("https", func(t *testing.T) {
testSendRequest(t, httpsEndpoint, proxyClient, "ok")
})
})
t.Run("should trigger disconnect functions when DisableKeepAlives", func(t *testing.T) {
2 years ago
proxyClient := getProxyClient()
proxyClient.Transport.(*http.Transport).DisableKeepAlives = true
t.Run("http", func(t *testing.T) {
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.reset()
2 years ago
testSendRequest(t, httpEndpoint, proxyClient, "ok")
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.contains(t, "ClientDisconnected")
testOrderAddonInstance.contains(t, "ServerDisconnected")
2 years ago
})
t.Run("https", func(t *testing.T) {
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.reset()
2 years ago
testSendRequest(t, httpsEndpoint, proxyClient, "ok")
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.contains(t, "ClientDisconnected")
testOrderAddonInstance.contains(t, "ServerDisconnected")
2 years ago
})
})
t.Run("should not have eof error when DisableKeepAlives", func(t *testing.T) {
2 years ago
proxyClient := getProxyClient()
proxyClient.Transport.(*http.Transport).DisableKeepAlives = true
t.Run("http", func(t *testing.T) {
for i := 0; i < 10; i++ {
testSendRequest(t, httpEndpoint, proxyClient, "ok")
}
})
t.Run("https", func(t *testing.T) {
for i := 0; i < 10; i++ {
testSendRequest(t, httpsEndpoint, proxyClient, "ok")
}
})
})
t.Run("should trigger disconnect functions when client side trigger off", func(t *testing.T) {
proxyClient := getProxyClient()
var clientConn net.Conn
proxyClient.Transport.(*http.Transport).DialContext = func(ctx context.Context, network, addr string) (net.Conn, error) {
c, err := (&net.Dialer{}).DialContext(ctx, network, addr)
clientConn = c
return c, err
}
2 years ago
t.Run("http", func(t *testing.T) {
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.reset()
2 years ago
testSendRequest(t, httpEndpoint, proxyClient, "ok")
clientConn.Close()
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.contains(t, "ClientDisconnected")
testOrderAddonInstance.contains(t, "ServerDisconnected")
testOrderAddonInstance.before(t, "ClientDisconnected", "ServerDisconnected")
})
t.Run("https", func(t *testing.T) {
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.reset()
testSendRequest(t, httpsEndpoint, proxyClient, "ok")
clientConn.Close()
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.contains(t, "ClientDisconnected")
testOrderAddonInstance.contains(t, "ServerDisconnected")
testOrderAddonInstance.before(t, "ClientDisconnected", "ServerDisconnected")
})
})
}
func TestProxyWhenServerNotKeepAlive(t *testing.T) {
mux := http.NewServeMux()
mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
w.Write([]byte("ok"))
})
server := &http.Server{
Handler: mux,
}
server.SetKeepAlivesEnabled(false)
// start http server
ln, err := net.Listen("tcp", "127.0.0.1:0")
handleError(t, err)
defer ln.Close()
go server.Serve(ln)
// start https server
tlsLn, err := net.Listen("tcp", "127.0.0.1:0")
handleError(t, err)
defer tlsLn.Close()
ca, err := cert.NewCAMemory()
handleError(t, err)
cert, err := ca.GetCert("localhost")
handleError(t, err)
tlsConfig := &tls.Config{
Certificates: []tls.Certificate{*cert},
}
go server.Serve(tls.NewListener(tlsLn, tlsConfig))
httpEndpoint := "http://" + ln.Addr().String() + "/"
httpsPort := tlsLn.Addr().(*net.TCPAddr).Port
httpsEndpoint := "https://localhost:" + strconv.Itoa(httpsPort) + "/"
// start proxy
testProxy, err := NewProxy(&Options{
Addr: ":29081", // some random port
SslInsecure: true,
})
handleError(t, err)
testProxy.AddAddon(&interceptAddon{})
testOrderAddonInstance := &testOrderAddon{
orders: make([]string, 0),
}
testProxy.AddAddon(testOrderAddonInstance)
go testProxy.Start()
time.Sleep(time.Millisecond * 10) // wait for test proxy startup
getProxyClient := func() *http.Client {
return &http.Client{
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
},
Proxy: func(r *http.Request) (*url.URL, error) {
return url.Parse("http://127.0.0.1:29081")
},
},
}
}
t.Run("should not have eof error when server side DisableKeepAlives", func(t *testing.T) {
proxyClient := getProxyClient()
t.Run("http", func(t *testing.T) {
for i := 0; i < 10; i++ {
testSendRequest(t, httpEndpoint, proxyClient, "ok")
2 years ago
}
})
t.Run("https", func(t *testing.T) {
for i := 0; i < 10; i++ {
testSendRequest(t, httpsEndpoint, proxyClient, "ok")
2 years ago
}
})
})
t.Run("should trigger disconnect functions when server DisableKeepAlives", func(t *testing.T) {
proxyClient := getProxyClient()
t.Run("http", func(t *testing.T) {
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.reset()
testSendRequest(t, httpEndpoint, proxyClient, "ok")
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.contains(t, "ClientDisconnected")
testOrderAddonInstance.contains(t, "ServerDisconnected")
testOrderAddonInstance.before(t, "ServerDisconnected", "ClientDisconnected")
})
t.Run("https", func(t *testing.T) {
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.reset()
testSendRequest(t, httpsEndpoint, proxyClient, "ok")
time.Sleep(time.Millisecond * 10)
testOrderAddonInstance.contains(t, "ClientDisconnected")
testOrderAddonInstance.contains(t, "ServerDisconnected")
testOrderAddonInstance.before(t, "ServerDisconnected", "ClientDisconnected")
})
})
2 years ago
}