Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an end to end test for UDP-over-TCP on port 80 #7668

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ extension ConnectionView {
connectionDetailRow(
title: LocalizedStringKey("Out IPv6"),
value: outAddressIpv6,
accessibilityId: .connectionPanelOutAddressRow
accessibilityId: .connectionPanelOutIpv6AddressRow
)
}
}
Expand Down
9 changes: 8 additions & 1 deletion ios/MullvadVPNUITests/Networking/TrafficGenerator.swift
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,6 @@ class TrafficGenerator {
port: NWEndpoint.Port(integerLiteral: UInt16(port)),
using: params
)
setupConnection()
setupOtherHandlers()
}

Expand Down Expand Up @@ -100,7 +99,13 @@ class TrafficGenerator {
XCTWaiter().wait(for: [doneAttemptingConnectExpecation], timeout: 10.0)
}

func stopConnection() {
connection.stateUpdateHandler = { @Sendable _ in }
connection.cancel()
}

public func startGeneratingUDPTraffic(interval: TimeInterval) {
setupConnection()
sendDataTimer.schedule(deadline: .now(), repeating: interval)

sendDataTimer.setEventHandler {
Expand All @@ -125,7 +130,9 @@ class TrafficGenerator {
}

public func stopGeneratingUDPTraffic() {
sendDataTimer.setEventHandler(handler: {})
sendDataTimer.cancel()
stopConnection()
}
}

Expand Down
6 changes: 5 additions & 1 deletion ios/MullvadVPNUITests/Pages/TunnelControlPage.swift
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,10 @@ class TunnelControlPage: Page {
return connectionAttempts
}

func getInIPv4AddressLabel() -> String {
app.staticTexts[AccessibilityIdentifier.connectionPanelInAddressRow].label.components(separatedBy: ":")[0]
}

@discardableResult override init(_ app: XCUIApplication) {
super.init(app)

Expand Down Expand Up @@ -121,7 +125,7 @@ class TunnelControlPage: Page {
}

@discardableResult func tapRelayStatusExpandCollapseButton() -> Self {
app.images[AccessibilityIdentifier.relayStatusCollapseButton].press(forDuration: .leastNonzeroMagnitude)
app.buttons[AccessibilityIdentifier.relayStatusCollapseButton].tap()
return self
}

Expand Down
28 changes: 0 additions & 28 deletions ios/MullvadVPNUITests/Pages/VPNSettingsPage.swift
Original file line number Diff line number Diff line change
Expand Up @@ -76,34 +76,6 @@ class VPNSettingsPage: Page {
return self
}

// this button no longer exists
@discardableResult func tapUDPOverTCPPortExpandButton() -> Self {
cellExpandButton(AccessibilityIdentifier.udpOverTCPPortCell).tap()

return self
}

// this button no longer exists
@discardableResult func tapUDPOverTCPPortAutomaticCell() -> Self {
app.cells["\(AccessibilityIdentifier.wireGuardObfuscationPort)Automatic"]
.tap()
return self
}

// this button no longer exists
@discardableResult func tapUDPOverTCPPort80Cell() -> Self {
app.cells["\(AccessibilityIdentifier.wireGuardObfuscationPort)80"]
.tap()
return self
}

// this button no longer exists
@discardableResult func tapUDPOverTCPPort5001Cell() -> Self {
app.cells["\(AccessibilityIdentifier.wireGuardObfuscationPort)5001"]
.tap()
return self
}

@discardableResult func tapQuantumResistantTunnelExpandButton() -> Self {
cellExpandButton(AccessibilityIdentifier.quantumResistantTunnelCell).tap()

Expand Down
72 changes: 72 additions & 0 deletions ios/MullvadVPNUITests/RelayTests.swift
Original file line number Diff line number Diff line change
Expand Up @@ -131,6 +131,78 @@
.tapCancelButton()
}

func testWireGuardOverTCPCustomPort80() throws {
addTeardownBlock {
HeaderBar(self.app)
.tapSettingsButton()

SettingsPage(self.app)
.tapVPNSettingsCell()

VPNSettingsPage(self.app)
.tapWireGuardObfuscationExpandButton()
.tapWireGuardObfuscationOffCell()
}

HeaderBar(app)
.tapSettingsButton()

SettingsPage(app)
.tapVPNSettingsCell()

VPNSettingsPage(app)
.tapWireGuardObfuscationExpandButton()
.tapWireGuardObfuscationUdpOverTcpCell()
.tapUDPOverTCPPortSelectorButton()

UDPOverTCPObfuscationSettingsPage(app)
.tapPort80Cell()
.tapBackButton()

VPNSettingsPage(app)
.tapBackButton()

SettingsPage(app)
.tapDoneButton()

// The packet capture has to start before the tunnel is up,
// otherwise the device cannot reach the in-house router anymore
startPacketCapture()

TunnelControlPage(app)
.tapConnectButton()

allowAddVPNConfigurationsIfAsked()

TunnelControlPage(app)
.waitForConnectedLabel()

let connectedToIPAddress = TunnelControlPage(app)
.tapRelayStatusExpandCollapseButton()
.getInIPv4AddressLabel()

try Networking.verifyCanAccessInternet()

let targetIPAddress = Networking.getAlwaysReachableIPAddress()
let trafficGenerator = TrafficGenerator(destinationHost: targetIPAddress, port: 80)
trafficGenerator.startGeneratingUDPTraffic(interval: 0.1)

RunLoop.current.run(until: .now + 1)
trafficGenerator.stopGeneratingUDPTraffic()

TunnelControlPage(app)
.tapDisconnectButton()
let capturedStreams = stopPacketCapture()

let streamFromPeeerToRelay = try XCTUnwrap(
capturedStreams
.filter { $0.destinationAddress == connectedToIPAddress }.first
)

XCTAssertTrue(streamFromPeeerToRelay.destinationPort == 80)

Check failure on line 202 in ios/MullvadVPNUITests/RelayTests.swift

View workflow job for this annotation

GitHub Actions / reuse-e2e-workflow / Run tests (RelayTests)

testWireGuardOverTCPCustomPort80, XCTAssertTrue failed
XCTAssertTrue(streamFromPeeerToRelay.transportProtocol == .TCP)
}

func testWireGuardOverTCPManually() throws {
addTeardownBlock {
HeaderBar(self.app)
Expand Down
Loading