e2e_lossy_test.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. package e2e
  2. import (
  3. "crypto/tls"
  4. "fmt"
  5. "math/rand"
  6. "testing"
  7. "time"
  8. "github.com/pion/dtls/v2"
  9. "github.com/pion/dtls/v2/pkg/crypto/selfsign"
  10. transportTest "github.com/pion/transport/test"
  11. )
  12. const (
  13. flightInterval = time.Millisecond * 100
  14. lossyTestTimeout = 30 * time.Second
  15. )
  16. /*
  17. DTLS Client/Server over a lossy transport, just asserts it can handle at increasing increments
  18. */
  19. func TestPionE2ELossy(t *testing.T) {
  20. // Check for leaking routines
  21. report := transportTest.CheckRoutines(t)
  22. defer report()
  23. type runResult struct {
  24. dtlsConn *dtls.Conn
  25. err error
  26. }
  27. serverCert, err := selfsign.GenerateSelfSigned()
  28. if err != nil {
  29. t.Fatal(err)
  30. }
  31. clientCert, err := selfsign.GenerateSelfSigned()
  32. if err != nil {
  33. t.Fatal(err)
  34. }
  35. for _, test := range []struct {
  36. LossChanceRange int
  37. DoClientAuth bool
  38. CipherSuites []dtls.CipherSuiteID
  39. MTU int
  40. }{
  41. {
  42. LossChanceRange: 0,
  43. },
  44. {
  45. LossChanceRange: 10,
  46. },
  47. {
  48. LossChanceRange: 20,
  49. },
  50. {
  51. LossChanceRange: 50,
  52. },
  53. {
  54. LossChanceRange: 0,
  55. DoClientAuth: true,
  56. },
  57. {
  58. LossChanceRange: 10,
  59. DoClientAuth: true,
  60. },
  61. {
  62. LossChanceRange: 20,
  63. DoClientAuth: true,
  64. },
  65. {
  66. LossChanceRange: 50,
  67. DoClientAuth: true,
  68. },
  69. {
  70. LossChanceRange: 0,
  71. CipherSuites: []dtls.CipherSuiteID{dtls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA},
  72. },
  73. {
  74. LossChanceRange: 10,
  75. CipherSuites: []dtls.CipherSuiteID{dtls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA},
  76. },
  77. {
  78. LossChanceRange: 20,
  79. CipherSuites: []dtls.CipherSuiteID{dtls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA},
  80. },
  81. {
  82. LossChanceRange: 50,
  83. CipherSuites: []dtls.CipherSuiteID{dtls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA},
  84. },
  85. {
  86. LossChanceRange: 10,
  87. MTU: 100,
  88. DoClientAuth: true,
  89. },
  90. {
  91. LossChanceRange: 20,
  92. MTU: 100,
  93. DoClientAuth: true,
  94. },
  95. {
  96. LossChanceRange: 50,
  97. MTU: 100,
  98. DoClientAuth: true,
  99. },
  100. } {
  101. name := fmt.Sprintf("Loss%d_MTU%d", test.LossChanceRange, test.MTU)
  102. if test.DoClientAuth {
  103. name += "_WithCliAuth"
  104. }
  105. for _, ciph := range test.CipherSuites {
  106. name += "_With" + ciph.String()
  107. }
  108. test := test
  109. t.Run(name, func(t *testing.T) {
  110. // Limit runtime in case of deadlocks
  111. lim := transportTest.TimeOut(lossyTestTimeout + time.Second)
  112. defer lim.Stop()
  113. rand.Seed(time.Now().UTC().UnixNano())
  114. chosenLoss := rand.Intn(9) + test.LossChanceRange //nolint:gosec
  115. serverDone := make(chan runResult)
  116. clientDone := make(chan runResult)
  117. br := transportTest.NewBridge()
  118. if err = br.SetLossChance(chosenLoss); err != nil {
  119. t.Fatal(err)
  120. }
  121. go func() {
  122. cfg := &dtls.Config{
  123. FlightInterval: flightInterval,
  124. CipherSuites: test.CipherSuites,
  125. InsecureSkipVerify: true,
  126. MTU: test.MTU,
  127. }
  128. if test.DoClientAuth {
  129. cfg.Certificates = []tls.Certificate{clientCert}
  130. }
  131. client, startupErr := dtls.Client(br.GetConn0(), cfg)
  132. clientDone <- runResult{client, startupErr}
  133. }()
  134. go func() {
  135. cfg := &dtls.Config{
  136. Certificates: []tls.Certificate{serverCert},
  137. FlightInterval: flightInterval,
  138. MTU: test.MTU,
  139. }
  140. if test.DoClientAuth {
  141. cfg.ClientAuth = dtls.RequireAnyClientCert
  142. }
  143. server, startupErr := dtls.Server(br.GetConn1(), cfg)
  144. serverDone <- runResult{server, startupErr}
  145. }()
  146. testTimer := time.NewTimer(lossyTestTimeout)
  147. var serverConn, clientConn *dtls.Conn
  148. defer func() {
  149. if serverConn != nil {
  150. if err = serverConn.Close(); err != nil {
  151. t.Error(err)
  152. }
  153. }
  154. if clientConn != nil {
  155. if err = clientConn.Close(); err != nil {
  156. t.Error(err)
  157. }
  158. }
  159. }()
  160. for {
  161. if serverConn != nil && clientConn != nil {
  162. break
  163. }
  164. br.Tick()
  165. select {
  166. case serverResult := <-serverDone:
  167. if serverResult.err != nil {
  168. t.Errorf("Fail, serverError: clientComplete(%t) serverComplete(%t) LossChance(%d) error(%v)", clientConn != nil, serverConn != nil, chosenLoss, serverResult.err)
  169. return
  170. }
  171. serverConn = serverResult.dtlsConn
  172. case clientResult := <-clientDone:
  173. if clientResult.err != nil {
  174. t.Errorf("Fail, clientError: clientComplete(%t) serverComplete(%t) LossChance(%d) error(%v)", clientConn != nil, serverConn != nil, chosenLoss, clientResult.err)
  175. return
  176. }
  177. clientConn = clientResult.dtlsConn
  178. case <-testTimer.C:
  179. t.Errorf("Test expired: clientComplete(%t) serverComplete(%t) LossChance(%d)", clientConn != nil, serverConn != nil, chosenLoss)
  180. return
  181. case <-time.After(10 * time.Millisecond):
  182. }
  183. }
  184. })
  185. }
  186. }