mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
crypto/tls: replace net.Pipe in tests with real TCP connections
crypto/tls is meant to work over network connections with buffering, not synchronous connections, as explained in #24198. Tests based on net.Pipe are unrealistic as reads and writes are matched one to one. Such tests worked just thanks to the implementation details of the tls.Conn internal buffering, and would break if for example the flush of the first flight of the server was not entirely assimilated by the client rawInput buffer before the client attempted to reply to the ServerHello. Note that this might run into the Darwin network issues at #25696. Fixed a few test races that were either hidden or synchronized by the use of the in-memory net.Pipe. Also, this gets us slightly more realistic benchmarks, reflecting some syscall cost of Read and Write operations. Change-Id: I5a597b3d7a81b8ccc776030cc837133412bf50f8 Reviewed-on: https://go-review.googlesource.com/c/142817 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
This commit is contained in:
parent
db3edf68fa
commit
1b72cce3de
4 changed files with 107 additions and 58 deletions
|
@ -179,7 +179,7 @@ func (test *clientTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
|||
var pemOut bytes.Buffer
|
||||
pem.Encode(&pemOut, &pem.Block{Type: pemType + " PRIVATE KEY", Bytes: derBytes})
|
||||
|
||||
keyPath := tempFile(string(pemOut.Bytes()))
|
||||
keyPath := tempFile(pemOut.String())
|
||||
defer os.Remove(keyPath)
|
||||
|
||||
var command []string
|
||||
|
@ -293,7 +293,7 @@ func (test *clientTest) run(t *testing.T, write bool) {
|
|||
}
|
||||
clientConn = recordingConn
|
||||
} else {
|
||||
clientConn, serverConn = net.Pipe()
|
||||
clientConn, serverConn = localPipe(t)
|
||||
}
|
||||
|
||||
config := test.config
|
||||
|
@ -682,7 +682,7 @@ func TestClientResumption(t *testing.T) {
|
|||
}
|
||||
|
||||
testResumeState := func(test string, didResume bool) {
|
||||
_, hs, err := testHandshake(clientConfig, serverConfig)
|
||||
_, hs, err := testHandshake(t, clientConfig, serverConfig)
|
||||
if err != nil {
|
||||
t.Fatalf("%s: handshake failed: %s", test, err)
|
||||
}
|
||||
|
@ -800,7 +800,7 @@ func TestKeyLog(t *testing.T) {
|
|||
serverConfig := testConfig.Clone()
|
||||
serverConfig.KeyLogWriter = &serverBuf
|
||||
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
done := make(chan bool)
|
||||
|
||||
go func() {
|
||||
|
@ -838,8 +838,8 @@ func TestKeyLog(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
checkKeylogLine("client", string(clientBuf.Bytes()))
|
||||
checkKeylogLine("server", string(serverBuf.Bytes()))
|
||||
checkKeylogLine("client", clientBuf.String())
|
||||
checkKeylogLine("server", serverBuf.String())
|
||||
}
|
||||
|
||||
func TestHandshakeClientALPNMatch(t *testing.T) {
|
||||
|
@ -1021,7 +1021,7 @@ var hostnameInSNITests = []struct {
|
|||
|
||||
func TestHostnameInSNI(t *testing.T) {
|
||||
for _, tt := range hostnameInSNITests {
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
|
||||
go func(host string) {
|
||||
Client(c, &Config{ServerName: host, InsecureSkipVerify: true}).Handshake()
|
||||
|
@ -1059,7 +1059,7 @@ func TestServerSelectingUnconfiguredCipherSuite(t *testing.T) {
|
|||
// This checks that the server can't select a cipher suite that the
|
||||
// client didn't offer. See #13174.
|
||||
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
errChan := make(chan error, 1)
|
||||
|
||||
go func() {
|
||||
|
@ -1228,7 +1228,7 @@ func TestVerifyPeerCertificate(t *testing.T) {
|
|||
}
|
||||
|
||||
for i, test := range tests {
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
done := make(chan error)
|
||||
|
||||
var clientCalled, serverCalled bool
|
||||
|
@ -1287,7 +1287,7 @@ func (b *brokenConn) Write(data []byte) (int, error) {
|
|||
func TestFailedWrite(t *testing.T) {
|
||||
// Test that a write error during the handshake is returned.
|
||||
for _, breakAfter := range []int{0, 1} {
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
done := make(chan bool)
|
||||
|
||||
go func() {
|
||||
|
@ -1321,7 +1321,7 @@ func (wcc *writeCountingConn) Write(data []byte) (int, error) {
|
|||
}
|
||||
|
||||
func TestBuffering(t *testing.T) {
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
done := make(chan bool)
|
||||
|
||||
clientWCC := &writeCountingConn{Conn: c}
|
||||
|
@ -1350,7 +1350,7 @@ func TestBuffering(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestAlertFlushing(t *testing.T) {
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
done := make(chan bool)
|
||||
|
||||
clientWCC := &writeCountingConn{Conn: c}
|
||||
|
@ -1399,7 +1399,7 @@ func TestHandshakeRace(t *testing.T) {
|
|||
// order to provide some evidence that there are no races or deadlocks
|
||||
// in the handshake locking.
|
||||
for i := 0; i < 32; i++ {
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
|
||||
go func() {
|
||||
server := Server(s, testConfig)
|
||||
|
@ -1430,7 +1430,7 @@ func TestHandshakeRace(t *testing.T) {
|
|||
go func() {
|
||||
<-startRead
|
||||
var reply [1]byte
|
||||
if n, err := client.Read(reply[:]); err != nil || n != 1 {
|
||||
if _, err := io.ReadFull(client, reply[:]); err != nil {
|
||||
panic(err)
|
||||
}
|
||||
c.Close()
|
||||
|
@ -1559,7 +1559,7 @@ func TestGetClientCertificate(t *testing.T) {
|
|||
err error
|
||||
}
|
||||
|
||||
c, s := net.Pipe()
|
||||
c, s := localPipe(t)
|
||||
done := make(chan serverResult)
|
||||
|
||||
go func() {
|
||||
|
@ -1637,7 +1637,7 @@ RwBA9Xk1KBNF
|
|||
}
|
||||
|
||||
func TestCloseClientConnectionOnIdleServer(t *testing.T) {
|
||||
clientConn, serverConn := net.Pipe()
|
||||
clientConn, serverConn := localPipe(t)
|
||||
client := Client(clientConn, testConfig.Clone())
|
||||
go func() {
|
||||
var b [1]byte
|
||||
|
@ -1647,8 +1647,8 @@ func TestCloseClientConnectionOnIdleServer(t *testing.T) {
|
|||
client.SetWriteDeadline(time.Now().Add(time.Second))
|
||||
err := client.Handshake()
|
||||
if err != nil {
|
||||
if !strings.Contains(err.Error(), "read/write on closed pipe") {
|
||||
t.Errorf("Error expected containing 'read/write on closed pipe' but got '%s'", err.Error())
|
||||
if err, ok := err.(net.Error); ok && err.Timeout() {
|
||||
t.Errorf("Expected a closed network connection error but got '%s'", err.Error())
|
||||
}
|
||||
} else {
|
||||
t.Errorf("Error expected, but no error returned")
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue