mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-29 02:18:51 +03:00
99af7f46de
Squashed commit of the following:
commit 099a2eb11609a07a1cb72d9e15da3e668042de1d
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Tue Dec 5 17:25:49 2023 +0300
all: upd proxy
commit db07130df80ed06b867f6ce6878908b1eb93a934
Merge: 9e6e8e7cf 75cb9d412
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Tue Dec 5 14:44:44 2023 +0300
Merge branch 'master' into AG-27616-upd-proxy-ratelimit-whitelist
commit 9e6e8e7cfc80507cff81761dd3964cf7777ac58b
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Wed Nov 29 19:46:17 2023 +0300
all: imp tests
commit e753bb53880c2a0791d97079a12960e0b1d667ed
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Wed Nov 29 13:35:21 2023 +0300
all: upd proxy ratelimit whitelist
238 lines
6.7 KiB
Go
238 lines
6.7 KiB
Go
package dnsforward
|
|
|
|
import (
|
|
"net/netip"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/filtering"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/querylog"
|
|
"github.com/AdguardTeam/AdGuardHome/internal/stats"
|
|
"github.com/AdguardTeam/dnsproxy/proxy"
|
|
"github.com/AdguardTeam/dnsproxy/upstream"
|
|
"github.com/miekg/dns"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
// testQueryLog is a simple [querylog.QueryLog] implementation for tests.
|
|
type testQueryLog struct {
|
|
// QueryLog is embedded here simply to make testQueryLog
|
|
// a [querylog.QueryLog] without actually implementing all methods.
|
|
querylog.QueryLog
|
|
|
|
lastParams *querylog.AddParams
|
|
}
|
|
|
|
// Add implements the [querylog.QueryLog] interface for *testQueryLog.
|
|
func (l *testQueryLog) Add(p *querylog.AddParams) {
|
|
l.lastParams = p
|
|
}
|
|
|
|
// ShouldLog implements the [querylog.QueryLog] interface for *testQueryLog.
|
|
func (l *testQueryLog) ShouldLog(string, uint16, uint16, []string) bool {
|
|
return true
|
|
}
|
|
|
|
// testStats is a simple [stats.Interface] implementation for tests.
|
|
type testStats struct {
|
|
// Stats is embedded here simply to make testStats a [stats.Interface]
|
|
// without actually implementing all methods.
|
|
stats.Interface
|
|
|
|
lastEntry *stats.Entry
|
|
}
|
|
|
|
// Update implements the [stats.Interface] interface for *testStats.
|
|
func (l *testStats) Update(e *stats.Entry) {
|
|
if e.Domain == "" {
|
|
return
|
|
}
|
|
|
|
l.lastEntry = e
|
|
}
|
|
|
|
// ShouldCount implements the [stats.Interface] interface for *testStats.
|
|
func (l *testStats) ShouldCount(string, uint16, uint16, []string) bool {
|
|
return true
|
|
}
|
|
|
|
func TestServer_ProcessQueryLogsAndStats(t *testing.T) {
|
|
const domain = "example.com."
|
|
|
|
testCases := []struct {
|
|
name string
|
|
domain string
|
|
proto proxy.Proto
|
|
addr netip.AddrPort
|
|
clientID string
|
|
wantLogProto querylog.ClientProto
|
|
wantStatClient string
|
|
wantCode resultCode
|
|
reason filtering.Reason
|
|
wantStatResult stats.Result
|
|
}{{
|
|
name: "success_udp",
|
|
domain: domain,
|
|
proto: proxy.ProtoUDP,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: "",
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.NotFilteredNotFound,
|
|
wantStatResult: stats.RNotFiltered,
|
|
}, {
|
|
name: "success_tls_clientid",
|
|
domain: domain,
|
|
proto: proxy.ProtoTLS,
|
|
addr: testClientAddrPort,
|
|
clientID: "cli42",
|
|
wantLogProto: querylog.ClientProtoDoT,
|
|
wantStatClient: "cli42",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.NotFilteredNotFound,
|
|
wantStatResult: stats.RNotFiltered,
|
|
}, {
|
|
name: "success_tls",
|
|
domain: domain,
|
|
proto: proxy.ProtoTLS,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: querylog.ClientProtoDoT,
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.NotFilteredNotFound,
|
|
wantStatResult: stats.RNotFiltered,
|
|
}, {
|
|
name: "success_quic",
|
|
domain: domain,
|
|
proto: proxy.ProtoQUIC,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: querylog.ClientProtoDoQ,
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.NotFilteredNotFound,
|
|
wantStatResult: stats.RNotFiltered,
|
|
}, {
|
|
name: "success_https",
|
|
domain: domain,
|
|
proto: proxy.ProtoHTTPS,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: querylog.ClientProtoDoH,
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.NotFilteredNotFound,
|
|
wantStatResult: stats.RNotFiltered,
|
|
}, {
|
|
name: "success_dnscrypt",
|
|
domain: domain,
|
|
proto: proxy.ProtoDNSCrypt,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: querylog.ClientProtoDNSCrypt,
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.NotFilteredNotFound,
|
|
wantStatResult: stats.RNotFiltered,
|
|
}, {
|
|
name: "success_udp_filtered",
|
|
domain: domain,
|
|
proto: proxy.ProtoUDP,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: "",
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.FilteredBlockList,
|
|
wantStatResult: stats.RFiltered,
|
|
}, {
|
|
name: "success_udp_sb",
|
|
domain: domain,
|
|
proto: proxy.ProtoUDP,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: "",
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.FilteredSafeBrowsing,
|
|
wantStatResult: stats.RSafeBrowsing,
|
|
}, {
|
|
name: "success_udp_ss",
|
|
domain: domain,
|
|
proto: proxy.ProtoUDP,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: "",
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.FilteredSafeSearch,
|
|
wantStatResult: stats.RSafeSearch,
|
|
}, {
|
|
name: "success_udp_pc",
|
|
domain: domain,
|
|
proto: proxy.ProtoUDP,
|
|
addr: testClientAddrPort,
|
|
clientID: "",
|
|
wantLogProto: "",
|
|
wantStatClient: "1.2.3.4",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.FilteredParental,
|
|
wantStatResult: stats.RParental,
|
|
}, {
|
|
name: "success_udp_pc_empty_fqdn",
|
|
domain: ".",
|
|
proto: proxy.ProtoUDP,
|
|
addr: netip.MustParseAddrPort("4.3.2.1:1234"),
|
|
clientID: "",
|
|
wantLogProto: "",
|
|
wantStatClient: "4.3.2.1",
|
|
wantCode: resultCodeSuccess,
|
|
reason: filtering.FilteredParental,
|
|
wantStatResult: stats.RParental,
|
|
}}
|
|
|
|
ups, err := upstream.AddressToUpstream("1.1.1.1", nil)
|
|
require.NoError(t, err)
|
|
|
|
for _, tc := range testCases {
|
|
ql := &testQueryLog{}
|
|
st := &testStats{}
|
|
srv := &Server{
|
|
queryLog: ql,
|
|
stats: st,
|
|
anonymizer: aghnet.NewIPMut(nil),
|
|
}
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
req := &dns.Msg{
|
|
Question: []dns.Question{{
|
|
Name: tc.domain,
|
|
}},
|
|
}
|
|
pctx := &proxy.DNSContext{
|
|
Proto: tc.proto,
|
|
Req: req,
|
|
Res: &dns.Msg{},
|
|
Addr: tc.addr,
|
|
Upstream: ups,
|
|
}
|
|
dctx := &dnsContext{
|
|
proxyCtx: pctx,
|
|
startTime: time.Now(),
|
|
result: &filtering.Result{
|
|
Reason: tc.reason,
|
|
},
|
|
clientID: tc.clientID,
|
|
}
|
|
|
|
code := srv.processQueryLogsAndStats(dctx)
|
|
assert.Equal(t, tc.wantCode, code)
|
|
assert.Equal(t, tc.wantLogProto, ql.lastParams.ClientProto)
|
|
assert.Equal(t, tc.wantStatClient, st.lastEntry.Client)
|
|
assert.Equal(t, tc.wantStatResult, st.lastEntry.Result)
|
|
})
|
|
}
|
|
}
|