2010-08-02 21:09:37 +02:00
|
|
|
/* Copyright (c) 2001-2004, Roger Dingledine.
|
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
2013-01-16 07:54:56 +01:00
|
|
|
* Copyright (c) 2007-2013, The Tor Project, Inc. */
|
2010-08-02 21:09:37 +02:00
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
|
|
|
|
#include "orconfig.h"
|
2013-09-03 19:35:44 +02:00
|
|
|
|
|
|
|
#define CONFIG_PRIVATE
|
2010-08-02 21:09:37 +02:00
|
|
|
#include "or.h"
|
2012-10-28 21:13:58 +01:00
|
|
|
#include "addressmap.h"
|
2010-08-02 21:09:37 +02:00
|
|
|
#include "config.h"
|
2012-09-12 23:34:50 +02:00
|
|
|
#include "confparse.h"
|
2010-08-02 21:09:37 +02:00
|
|
|
#include "connection_edge.h"
|
|
|
|
#include "test.h"
|
2013-02-11 23:45:18 +01:00
|
|
|
#include "util.h"
|
|
|
|
#include "address.h"
|
2010-08-02 21:09:37 +02:00
|
|
|
|
|
|
|
static void
|
2011-09-08 17:19:06 +02:00
|
|
|
test_config_addressmap(void *arg)
|
2010-08-02 21:09:37 +02:00
|
|
|
{
|
|
|
|
char buf[1024];
|
|
|
|
char address[256];
|
|
|
|
time_t expires = TIME_MAX;
|
2011-09-08 17:19:06 +02:00
|
|
|
(void)arg;
|
|
|
|
|
2010-12-27 18:35:16 +01:00
|
|
|
strlcpy(buf, "MapAddress .invalidwildcard.com *.torserver.exit\n" // invalid
|
|
|
|
"MapAddress *invalidasterisk.com *.torserver.exit\n" // invalid
|
|
|
|
"MapAddress *.google.com *.torserver.exit\n"
|
2010-12-13 23:13:01 +01:00
|
|
|
"MapAddress *.yahoo.com *.google.com.torserver.exit\n"
|
2010-12-27 18:35:16 +01:00
|
|
|
"MapAddress *.cn.com www.cnn.com\n"
|
2010-12-13 23:13:01 +01:00
|
|
|
"MapAddress *.cnn.com www.cnn.com\n"
|
|
|
|
"MapAddress ex.com www.cnn.com\n"
|
|
|
|
"MapAddress ey.com *.cnn.com\n"
|
2010-08-02 21:09:37 +02:00
|
|
|
"MapAddress www.torproject.org 1.1.1.1\n"
|
|
|
|
"MapAddress other.torproject.org "
|
|
|
|
"this.torproject.org.otherserver.exit\n"
|
|
|
|
"MapAddress test.torproject.org 2.2.2.2\n"
|
|
|
|
"MapAddress www.google.com 3.3.3.3\n"
|
|
|
|
"MapAddress www.example.org 4.4.4.4\n"
|
2010-12-27 18:35:16 +01:00
|
|
|
"MapAddress 4.4.4.4 7.7.7.7\n"
|
2010-08-02 21:09:37 +02:00
|
|
|
"MapAddress 4.4.4.4 5.5.5.5\n"
|
|
|
|
"MapAddress www.infiniteloop.org 6.6.6.6\n"
|
|
|
|
"MapAddress 6.6.6.6 www.infiniteloop.org\n"
|
|
|
|
, sizeof(buf));
|
|
|
|
|
2011-11-30 20:10:22 +01:00
|
|
|
config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
|
2010-08-02 21:09:37 +02:00
|
|
|
config_register_addressmaps(get_options());
|
|
|
|
|
2012-11-25 19:45:36 +01:00
|
|
|
/* Use old interface for now, so we don't need to rewrite the unit tests */
|
|
|
|
#define addressmap_rewrite(a,s,eo,ao) \
|
|
|
|
addressmap_rewrite((a),(s),AMR_FLAG_USE_IPV4_DNS|AMR_FLAG_USE_IPV6_DNS, \
|
|
|
|
(eo),(ao))
|
|
|
|
|
2010-12-27 18:35:16 +01:00
|
|
|
/* MapAddress .invalidwildcard.com .torserver.exit - no match */
|
|
|
|
strlcpy(address, "www.invalidwildcard.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-27 18:35:16 +01:00
|
|
|
|
|
|
|
/* MapAddress *invalidasterisk.com .torserver.exit - no match */
|
|
|
|
strlcpy(address, "www.invalidasterisk.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-27 18:35:16 +01:00
|
|
|
|
2010-08-02 21:09:37 +02:00
|
|
|
/* Where no mapping for FQDN match on top-level domain */
|
2010-12-13 23:13:01 +01:00
|
|
|
/* MapAddress .google.com .torserver.exit */
|
2010-08-02 21:09:37 +02:00
|
|
|
strlcpy(address, "reader.google.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-13 23:13:01 +01:00
|
|
|
test_streq(address, "reader.torserver.exit");
|
|
|
|
|
|
|
|
/* MapAddress *.yahoo.com *.google.com.torserver.exit */
|
|
|
|
strlcpy(address, "reader.yahoo.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "reader.google.com.torserver.exit");
|
|
|
|
|
2010-12-13 23:13:01 +01:00
|
|
|
/*MapAddress *.cnn.com www.cnn.com */
|
|
|
|
strlcpy(address, "cnn.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-13 23:13:01 +01:00
|
|
|
test_streq(address, "www.cnn.com");
|
|
|
|
|
|
|
|
/* MapAddress .cn.com www.cnn.com */
|
|
|
|
strlcpy(address, "www.cn.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-13 23:13:01 +01:00
|
|
|
test_streq(address, "www.cnn.com");
|
|
|
|
|
|
|
|
/* MapAddress ex.com www.cnn.com - no match */
|
|
|
|
strlcpy(address, "www.ex.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-13 23:13:01 +01:00
|
|
|
|
|
|
|
/* MapAddress ey.com *.cnn.com - invalid expression */
|
|
|
|
strlcpy(address, "ey.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-13 23:13:01 +01:00
|
|
|
|
2010-08-02 21:09:37 +02:00
|
|
|
/* Where mapping for FQDN match on FQDN */
|
|
|
|
strlcpy(address, "www.google.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "3.3.3.3");
|
|
|
|
|
|
|
|
strlcpy(address, "www.torproject.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "1.1.1.1");
|
|
|
|
|
|
|
|
strlcpy(address, "other.torproject.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "this.torproject.org.otherserver.exit");
|
|
|
|
|
|
|
|
strlcpy(address, "test.torproject.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "2.2.2.2");
|
|
|
|
|
2010-12-27 18:35:16 +01:00
|
|
|
/* Test a chain of address mappings and the order in which they were added:
|
|
|
|
"MapAddress www.example.org 4.4.4.4"
|
|
|
|
"MapAddress 4.4.4.4 7.7.7.7"
|
|
|
|
"MapAddress 4.4.4.4 5.5.5.5"
|
|
|
|
*/
|
2010-08-02 21:09:37 +02:00
|
|
|
strlcpy(address, "www.example.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "5.5.5.5");
|
|
|
|
|
|
|
|
/* Test infinite address mapping results in no change */
|
|
|
|
strlcpy(address, "www.infiniteloop.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "www.infiniteloop.org");
|
|
|
|
|
|
|
|
/* Test we don't find false positives */
|
|
|
|
strlcpy(address, "www.example.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
|
|
|
|
/* Test top-level-domain matching a bit harder */
|
|
|
|
addressmap_clear_configured();
|
2010-12-27 18:35:16 +01:00
|
|
|
strlcpy(buf, "MapAddress *.com *.torserver.exit\n"
|
|
|
|
"MapAddress *.torproject.org 1.1.1.1\n"
|
|
|
|
"MapAddress *.net 2.2.2.2\n"
|
2010-08-02 21:09:37 +02:00
|
|
|
, sizeof(buf));
|
2011-11-30 20:10:22 +01:00
|
|
|
config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
|
2010-08-02 21:09:37 +02:00
|
|
|
config_register_addressmaps(get_options());
|
|
|
|
|
|
|
|
strlcpy(address, "www.abc.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-13 23:13:01 +01:00
|
|
|
test_streq(address, "www.abc.torserver.exit");
|
2010-08-02 21:09:37 +02:00
|
|
|
|
|
|
|
strlcpy(address, "www.def.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-12-13 23:13:01 +01:00
|
|
|
test_streq(address, "www.def.torserver.exit");
|
2010-08-02 21:09:37 +02:00
|
|
|
|
|
|
|
strlcpy(address, "www.torproject.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "1.1.1.1");
|
|
|
|
|
|
|
|
strlcpy(address, "test.torproject.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "1.1.1.1");
|
|
|
|
|
|
|
|
strlcpy(address, "torproject.net", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
test_streq(address, "2.2.2.2");
|
|
|
|
|
2010-12-27 18:35:16 +01:00
|
|
|
/* We don't support '*' as a mapping directive */
|
2010-08-02 21:09:37 +02:00
|
|
|
addressmap_clear_configured();
|
2010-12-27 18:35:16 +01:00
|
|
|
strlcpy(buf, "MapAddress * *.torserver.exit\n", sizeof(buf));
|
2011-11-30 20:10:22 +01:00
|
|
|
config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
|
2010-08-02 21:09:37 +02:00
|
|
|
config_register_addressmaps(get_options());
|
|
|
|
|
|
|
|
strlcpy(address, "www.abc.com", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
|
|
|
|
strlcpy(address, "www.def.net", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
|
|
|
|
strlcpy(address, "www.torproject.org", sizeof(address));
|
2012-05-11 23:00:41 +02:00
|
|
|
test_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
|
2010-08-02 21:09:37 +02:00
|
|
|
|
2012-11-25 19:45:36 +01:00
|
|
|
#undef addressmap_rewrite
|
|
|
|
|
2011-12-02 06:16:47 +01:00
|
|
|
done:
|
2010-08-02 21:09:37 +02:00
|
|
|
;
|
|
|
|
}
|
2013-05-24 19:31:10 +02:00
|
|
|
|
2013-02-02 01:40:41 +01:00
|
|
|
static int
|
|
|
|
is_private_dir(const char* path)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
int r = stat(path, &st);
|
|
|
|
if (r) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#if !defined (_WIN32) || defined (WINCE)
|
2013-05-24 19:31:10 +02:00
|
|
|
if ((st.st_mode & (S_IFDIR | 0777)) != (S_IFDIR | 0700)) {
|
2013-02-02 01:40:41 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
test_config_check_or_create_data_subdir(void *arg)
|
|
|
|
{
|
2013-05-24 19:31:10 +02:00
|
|
|
or_options_t *options = get_options_mutable();
|
|
|
|
char *datadir = options->DataDirectory = tor_strdup(get_fname("datadir-0"));
|
|
|
|
const char *subdir = "test_stats";
|
2013-06-18 17:28:30 +02:00
|
|
|
char *subpath = get_datadir_fname(subdir);
|
2013-02-02 01:40:41 +01:00
|
|
|
struct stat st;
|
2013-05-24 19:31:10 +02:00
|
|
|
int r;
|
2013-05-29 18:08:28 +02:00
|
|
|
#if !defined (_WIN32) || defined (WINCE)
|
2013-05-24 19:31:10 +02:00
|
|
|
unsigned group_permission;
|
2013-05-29 18:08:28 +02:00
|
|
|
#endif
|
2013-05-24 19:31:10 +02:00
|
|
|
(void)arg;
|
2013-02-02 01:40:41 +01:00
|
|
|
|
|
|
|
#if defined (_WIN32) && !defined (WINCE)
|
2013-06-18 18:31:03 +02:00
|
|
|
tt_int_op(mkdir(options->DataDirectory), ==, 0);
|
2013-02-02 01:40:41 +01:00
|
|
|
#else
|
2013-06-18 18:31:03 +02:00
|
|
|
tt_int_op(mkdir(options->DataDirectory, 0700), ==, 0);
|
2013-02-02 01:40:41 +01:00
|
|
|
#endif
|
|
|
|
|
2013-05-24 19:31:10 +02:00
|
|
|
r = stat(subpath, &st);
|
2013-02-02 01:40:41 +01:00
|
|
|
|
|
|
|
// The subdirectory shouldn't exist yet,
|
|
|
|
// but should be created by the call to check_or_create_data_subdir.
|
|
|
|
test_assert(r && (errno == ENOENT));
|
|
|
|
test_assert(!check_or_create_data_subdir(subdir));
|
|
|
|
test_assert(is_private_dir(subpath));
|
|
|
|
|
|
|
|
// The check should return 0, if the directory already exists
|
|
|
|
// and is private to the user.
|
|
|
|
test_assert(!check_or_create_data_subdir(subdir));
|
|
|
|
|
2014-02-15 11:48:58 +01:00
|
|
|
r = stat(subpath, &st);
|
|
|
|
if (r) {
|
|
|
|
tt_abort_perror("stat");
|
|
|
|
}
|
|
|
|
|
2013-02-02 01:40:41 +01:00
|
|
|
#if !defined (_WIN32) || defined (WINCE)
|
2013-05-24 19:31:10 +02:00
|
|
|
group_permission = st.st_mode | 0070;
|
2013-02-02 01:40:41 +01:00
|
|
|
r = chmod(subpath, group_permission);
|
|
|
|
|
|
|
|
if (r) {
|
2014-02-15 11:48:58 +01:00
|
|
|
tt_abort_perror("chmod");
|
2013-02-02 01:40:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// If the directory exists, but its mode is too permissive
|
|
|
|
// a call to check_or_create_data_subdir should reset the mode.
|
|
|
|
test_assert(!is_private_dir(subpath));
|
|
|
|
test_assert(!check_or_create_data_subdir(subdir));
|
|
|
|
test_assert(is_private_dir(subpath));
|
|
|
|
#endif
|
|
|
|
|
2013-05-24 19:31:10 +02:00
|
|
|
done:
|
|
|
|
rmdir(subpath);
|
|
|
|
tor_free(datadir);
|
2013-06-18 17:28:30 +02:00
|
|
|
tor_free(subpath);
|
2013-02-02 01:40:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2013-05-24 19:31:10 +02:00
|
|
|
test_config_write_to_data_subdir(void *arg)
|
2013-02-02 01:40:41 +01:00
|
|
|
{
|
|
|
|
or_options_t* options = get_options_mutable();
|
2013-05-24 19:31:10 +02:00
|
|
|
char *datadir = options->DataDirectory = tor_strdup(get_fname("datadir-1"));
|
2014-02-12 00:10:33 +01:00
|
|
|
char *cp = NULL;
|
2013-02-02 01:40:41 +01:00
|
|
|
const char* subdir = "test_stats";
|
|
|
|
const char* fname = "test_file";
|
|
|
|
const char* str =
|
|
|
|
"Lorem ipsum dolor sit amet, consetetur sadipscing\n"
|
|
|
|
"elitr, sed diam nonumy eirmod\n"
|
|
|
|
"tempor invidunt ut labore et dolore magna aliquyam\n"
|
|
|
|
"erat, sed diam voluptua.\n"
|
|
|
|
"At vero eos et accusam et justo duo dolores et ea\n"
|
|
|
|
"rebum. Stet clita kasd gubergren,\n"
|
|
|
|
"no sea takimata sanctus est Lorem ipsum dolor sit amet.\n"
|
|
|
|
"Lorem ipsum dolor sit amet,\n"
|
|
|
|
"consetetur sadipscing elitr, sed diam nonumy eirmod\n"
|
|
|
|
"tempor invidunt ut labore et dolore\n"
|
|
|
|
"magna aliquyam erat, sed diam voluptua. At vero eos et\n"
|
|
|
|
"accusam et justo duo dolores et\n"
|
|
|
|
"ea rebum. Stet clita kasd gubergren, no sea takimata\n"
|
|
|
|
"sanctus est Lorem ipsum dolor sit amet.";
|
2013-06-18 17:28:30 +02:00
|
|
|
char* filepath = get_datadir_fname2(subdir, fname);
|
2013-05-24 19:31:10 +02:00
|
|
|
(void)arg;
|
2013-02-02 01:40:41 +01:00
|
|
|
|
|
|
|
#if defined (_WIN32) && !defined (WINCE)
|
2013-06-18 18:31:03 +02:00
|
|
|
tt_int_op(mkdir(options->DataDirectory), ==, 0);
|
2013-02-02 01:40:41 +01:00
|
|
|
#else
|
2013-06-18 18:31:03 +02:00
|
|
|
tt_int_op(mkdir(options->DataDirectory, 0700), ==, 0);
|
2013-02-02 01:40:41 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
// Write attempt shoudl fail, if subdirectory doesn't exist.
|
|
|
|
test_assert(write_to_data_subdir(subdir, fname, str, NULL));
|
2013-06-18 18:31:03 +02:00
|
|
|
test_assert(! check_or_create_data_subdir(subdir));
|
2013-02-02 01:40:41 +01:00
|
|
|
|
|
|
|
// Content of file after write attempt should be
|
|
|
|
// equal to the original string.
|
|
|
|
test_assert(!write_to_data_subdir(subdir, fname, str, NULL));
|
2014-02-12 00:10:33 +01:00
|
|
|
cp = read_file_to_str(filepath, 0, NULL);
|
|
|
|
test_streq(cp, str);
|
|
|
|
tor_free(cp);
|
2013-02-02 01:40:41 +01:00
|
|
|
|
|
|
|
// A second write operation should overwrite the old content.
|
|
|
|
test_assert(!write_to_data_subdir(subdir, fname, str, NULL));
|
2014-02-12 00:10:33 +01:00
|
|
|
cp = read_file_to_str(filepath, 0, NULL);
|
|
|
|
test_streq(cp, str);
|
|
|
|
tor_free(cp);
|
|
|
|
|
2013-02-02 01:40:41 +01:00
|
|
|
done:
|
2013-06-18 18:31:03 +02:00
|
|
|
(void) unlink(filepath);
|
2013-02-02 01:40:41 +01:00
|
|
|
rmdir(options->DataDirectory);
|
2013-05-24 19:31:10 +02:00
|
|
|
tor_free(datadir);
|
2013-06-18 17:28:30 +02:00
|
|
|
tor_free(filepath);
|
2014-02-12 00:10:33 +01:00
|
|
|
tor_free(cp);
|
2013-02-02 01:40:41 +01:00
|
|
|
}
|
2010-08-02 21:09:37 +02:00
|
|
|
|
2013-02-11 23:45:18 +01:00
|
|
|
/* Test helper function: Make sure that a bridge line gets parsed
|
|
|
|
* properly. Also make sure that the resulting bridge_line_t structure
|
|
|
|
* has its fields set correctly. */
|
|
|
|
static void
|
|
|
|
good_bridge_line_test(const char *string, const char *test_addrport,
|
|
|
|
const char *test_digest, const char *test_transport,
|
|
|
|
const smartlist_t *test_socks_args)
|
|
|
|
{
|
|
|
|
char *tmp = NULL;
|
|
|
|
bridge_line_t *bridge_line = parse_bridge_line(string);
|
|
|
|
test_assert(bridge_line);
|
|
|
|
|
|
|
|
/* test addrport */
|
|
|
|
tmp = tor_strdup(fmt_addrport(&bridge_line->addr, bridge_line->port));
|
|
|
|
test_streq(test_addrport, tmp);
|
|
|
|
tor_free(tmp);
|
|
|
|
|
|
|
|
/* If we were asked to validate a digest, but we did not get a
|
|
|
|
digest after parsing, we failed. */
|
|
|
|
if (test_digest && tor_digest_is_zero(bridge_line->digest))
|
|
|
|
test_assert(0);
|
|
|
|
|
|
|
|
/* If we were not asked to validate a digest, and we got a digest
|
|
|
|
after parsing, we failed again. */
|
|
|
|
if (!test_digest && !tor_digest_is_zero(bridge_line->digest))
|
|
|
|
test_assert(0);
|
|
|
|
|
|
|
|
/* If we were asked to validate a digest, and we got a digest after
|
|
|
|
parsing, make sure it's correct. */
|
|
|
|
if (test_digest) {
|
|
|
|
tmp = tor_strdup(hex_str(bridge_line->digest, DIGEST_LEN));
|
|
|
|
tor_strlower(tmp);
|
|
|
|
test_streq(test_digest, tmp);
|
|
|
|
tor_free(tmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If we were asked to validate a transport name, make sure tha it
|
|
|
|
matches with the transport name that was parsed. */
|
|
|
|
if (test_transport && !bridge_line->transport_name)
|
|
|
|
test_assert(0);
|
|
|
|
if (!test_transport && bridge_line->transport_name)
|
|
|
|
test_assert(0);
|
|
|
|
if (test_transport)
|
|
|
|
test_streq(test_transport, bridge_line->transport_name);
|
|
|
|
|
|
|
|
/* Validate the SOCKS argument smartlist. */
|
|
|
|
if (test_socks_args && !bridge_line->socks_args)
|
|
|
|
test_assert(0);
|
|
|
|
if (!test_socks_args && bridge_line->socks_args)
|
|
|
|
test_assert(0);
|
|
|
|
if (test_socks_args)
|
|
|
|
test_assert(smartlist_strings_eq(test_socks_args,
|
|
|
|
bridge_line->socks_args));
|
|
|
|
|
|
|
|
done:
|
|
|
|
tor_free(tmp);
|
|
|
|
bridge_line_free(bridge_line);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Test helper function: Make sure that a bridge line is
|
|
|
|
* unparseable. */
|
|
|
|
static void
|
|
|
|
bad_bridge_line_test(const char *string)
|
|
|
|
{
|
|
|
|
bridge_line_t *bridge_line = parse_bridge_line(string);
|
2014-02-03 22:21:32 +01:00
|
|
|
if (bridge_line)
|
|
|
|
TT_FAIL(("%s was supposed to fail, but it didn't.", string));
|
2013-02-11 23:45:18 +01:00
|
|
|
test_assert(!bridge_line);
|
|
|
|
|
|
|
|
done:
|
|
|
|
bridge_line_free(bridge_line);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
test_config_parse_bridge_line(void *arg)
|
|
|
|
{
|
|
|
|
(void) arg;
|
|
|
|
good_bridge_line_test("192.0.2.1:4123",
|
|
|
|
"192.0.2.1:4123", NULL, NULL, NULL);
|
|
|
|
|
|
|
|
good_bridge_line_test("192.0.2.1",
|
|
|
|
"192.0.2.1:443", NULL, NULL, NULL);
|
|
|
|
|
|
|
|
good_bridge_line_test("transport [::1]",
|
|
|
|
"[::1]:443", NULL, "transport", NULL);
|
|
|
|
|
|
|
|
good_bridge_line_test("transport 192.0.2.1:12 "
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349413",
|
|
|
|
"192.0.2.1:12",
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349413",
|
|
|
|
"transport", NULL);
|
|
|
|
|
|
|
|
{
|
|
|
|
smartlist_t *sl_tmp = smartlist_new();
|
|
|
|
smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
|
|
|
|
|
|
|
|
good_bridge_line_test("transport 192.0.2.1:12 "
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349413 twoandtwo=five",
|
|
|
|
"192.0.2.1:12", "4352e58420e68f5e40bf7c74faddccd9d1349413",
|
|
|
|
"transport", sl_tmp);
|
|
|
|
|
|
|
|
SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
|
|
|
|
smartlist_free(sl_tmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
smartlist_t *sl_tmp = smartlist_new();
|
|
|
|
smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
|
|
|
|
smartlist_add_asprintf(sl_tmp, "z=z");
|
|
|
|
|
|
|
|
good_bridge_line_test("transport 192.0.2.1:12 twoandtwo=five z=z",
|
|
|
|
"192.0.2.1:12", NULL, "transport", sl_tmp);
|
|
|
|
|
|
|
|
SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
|
|
|
|
smartlist_free(sl_tmp);
|
2014-04-11 20:06:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
smartlist_t *sl_tmp = smartlist_new();
|
|
|
|
smartlist_add_asprintf(sl_tmp, "dub=come");
|
|
|
|
smartlist_add_asprintf(sl_tmp, "save=me");
|
|
|
|
|
|
|
|
good_bridge_line_test("transport 192.0.2.1:12 "
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349666 "
|
|
|
|
"dub=come save=me",
|
|
|
|
|
|
|
|
"192.0.2.1:12",
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349666",
|
|
|
|
"transport", sl_tmp);
|
|
|
|
|
|
|
|
SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
|
|
|
|
smartlist_free(sl_tmp);
|
2013-02-11 23:45:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
good_bridge_line_test("192.0.2.1:1231 "
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349413",
|
|
|
|
"192.0.2.1:1231",
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349413",
|
|
|
|
NULL, NULL);
|
|
|
|
|
|
|
|
/* Empty line */
|
|
|
|
bad_bridge_line_test("");
|
|
|
|
/* bad transport name */
|
|
|
|
bad_bridge_line_test("tr$n_sp0r7 190.20.2.2");
|
|
|
|
/* weird ip address */
|
|
|
|
bad_bridge_line_test("a.b.c.d");
|
|
|
|
/* invalid fpr */
|
|
|
|
bad_bridge_line_test("2.2.2.2:1231 4352e58420e68f5e40bf7c74faddccd9d1349");
|
|
|
|
/* no k=v in the end */
|
|
|
|
bad_bridge_line_test("obfs2 2.2.2.2:1231 "
|
|
|
|
"4352e58420e68f5e40bf7c74faddccd9d1349413 what");
|
|
|
|
/* no addrport */
|
|
|
|
bad_bridge_line_test("asdw");
|
|
|
|
/* huge k=v value that can't fit in SOCKS fields */
|
|
|
|
bad_bridge_line_test(
|
|
|
|
"obfs2 2.2.2.2:1231 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
|
|
|
"aa=b");
|
|
|
|
}
|
|
|
|
|
2013-06-12 14:28:48 +02:00
|
|
|
static void
|
|
|
|
test_config_parse_transport_options_line(void *arg)
|
|
|
|
{
|
2013-07-15 19:26:47 +02:00
|
|
|
smartlist_t *options_sl = NULL, *sl_tmp = NULL;
|
2013-06-12 14:28:48 +02:00
|
|
|
|
|
|
|
(void) arg;
|
|
|
|
|
|
|
|
{ /* too small line */
|
|
|
|
options_sl = get_options_from_transport_options_line("valley", NULL);
|
|
|
|
test_assert(!options_sl);
|
|
|
|
}
|
|
|
|
|
|
|
|
{ /* no k=v values */
|
|
|
|
options_sl = get_options_from_transport_options_line("hit it!", NULL);
|
|
|
|
test_assert(!options_sl);
|
|
|
|
}
|
|
|
|
|
|
|
|
{ /* correct line, but wrong transport specified */
|
|
|
|
options_sl =
|
|
|
|
get_options_from_transport_options_line("trebuchet k=v", "rook");
|
|
|
|
test_assert(!options_sl);
|
|
|
|
}
|
|
|
|
|
|
|
|
{ /* correct -- no transport specified */
|
2013-07-15 19:26:47 +02:00
|
|
|
sl_tmp = smartlist_new();
|
2013-06-12 14:28:48 +02:00
|
|
|
smartlist_add_asprintf(sl_tmp, "ladi=dadi");
|
|
|
|
smartlist_add_asprintf(sl_tmp, "weliketo=party");
|
|
|
|
|
|
|
|
options_sl =
|
|
|
|
get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
|
|
|
|
NULL);
|
|
|
|
test_assert(options_sl);
|
|
|
|
test_assert(smartlist_strings_eq(options_sl, sl_tmp));
|
|
|
|
|
|
|
|
SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
|
|
|
|
smartlist_free(sl_tmp);
|
2013-07-15 19:26:47 +02:00
|
|
|
sl_tmp = NULL;
|
2013-06-12 14:28:48 +02:00
|
|
|
SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
|
|
|
|
smartlist_free(options_sl);
|
2013-07-15 19:26:47 +02:00
|
|
|
options_sl = NULL;
|
2013-06-12 14:28:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
{ /* correct -- correct transport specified */
|
2013-07-15 19:26:47 +02:00
|
|
|
sl_tmp = smartlist_new();
|
2013-06-12 14:28:48 +02:00
|
|
|
smartlist_add_asprintf(sl_tmp, "ladi=dadi");
|
|
|
|
smartlist_add_asprintf(sl_tmp, "weliketo=party");
|
|
|
|
|
|
|
|
options_sl =
|
|
|
|
get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
|
|
|
|
"rook");
|
|
|
|
test_assert(options_sl);
|
|
|
|
test_assert(smartlist_strings_eq(options_sl, sl_tmp));
|
|
|
|
SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
|
|
|
|
smartlist_free(sl_tmp);
|
2013-07-15 19:26:47 +02:00
|
|
|
sl_tmp = NULL;
|
2013-06-12 14:28:48 +02:00
|
|
|
SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
|
|
|
|
smartlist_free(options_sl);
|
2013-07-15 19:26:47 +02:00
|
|
|
options_sl = NULL;
|
2013-06-12 14:28:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2013-07-15 19:26:47 +02:00
|
|
|
if (options_sl) {
|
|
|
|
SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
|
|
|
|
smartlist_free(options_sl);
|
|
|
|
}
|
|
|
|
if (sl_tmp) {
|
|
|
|
SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
|
|
|
|
smartlist_free(sl_tmp);
|
|
|
|
}
|
2013-06-12 14:28:48 +02:00
|
|
|
}
|
|
|
|
|
2013-08-31 05:49:04 +02:00
|
|
|
// Tests if an options with MyFamily fingerprints missing '$' normalises
|
|
|
|
// them correctly and also ensure it also works with multiple fingerprints
|
|
|
|
static void
|
|
|
|
test_config_fix_my_family(void *arg)
|
|
|
|
{
|
|
|
|
char *err = NULL;
|
2013-09-03 19:35:44 +02:00
|
|
|
const char *family = "$1111111111111111111111111111111111111111, "
|
|
|
|
"1111111111111111111111111111111111111112, "
|
|
|
|
"$1111111111111111111111111111111111111113";
|
2013-08-31 05:49:04 +02:00
|
|
|
|
|
|
|
or_options_t* options = options_new();
|
|
|
|
or_options_t* defaults = options_new();
|
2013-09-03 19:35:44 +02:00
|
|
|
(void) arg;
|
|
|
|
|
2013-08-31 05:49:04 +02:00
|
|
|
options_init(options);
|
|
|
|
options_init(defaults);
|
|
|
|
options->MyFamily = tor_strdup(family);
|
|
|
|
|
|
|
|
options_validate(NULL, options, defaults, 0, &err) ;
|
|
|
|
|
|
|
|
if (err != NULL) {
|
2013-09-03 19:35:44 +02:00
|
|
|
TT_FAIL(("options_validate failed: %s", err));
|
2013-08-31 05:49:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
test_streq(options->MyFamily, "$1111111111111111111111111111111111111111, "
|
|
|
|
"$1111111111111111111111111111111111111112, "
|
|
|
|
"$1111111111111111111111111111111111111113");
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (err != NULL) {
|
|
|
|
tor_free(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
or_options_free(options);
|
|
|
|
or_options_free(defaults);
|
|
|
|
}
|
|
|
|
|
2014-04-28 22:20:58 +02:00
|
|
|
static int n_hostname_01010101 = 0;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace tor_lookup_hostname().
|
|
|
|
* It answers with 1.1.1.1 as IP adddress that resulted from lookup.
|
|
|
|
* This function increments <b>n_hostname_01010101</b> counter by one
|
|
|
|
* every time it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
tor_lookup_hostname_01010101(const char *name, uint32_t *addr)
|
|
|
|
{
|
|
|
|
n_hostname_01010101++;
|
|
|
|
|
|
|
|
if (name && addr) {
|
|
|
|
*addr = ntohl(0x01010101);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_hostname_localhost = 0;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace tor_lookup_hostname().
|
|
|
|
* It answers with 127.0.0.1 as IP adddress that resulted from lookup.
|
|
|
|
* This function increments <b>n_hostname_localhost</b> counter by one
|
|
|
|
* every time it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
tor_lookup_hostname_localhost(const char *name, uint32_t *addr)
|
|
|
|
{
|
|
|
|
n_hostname_localhost++;
|
|
|
|
|
|
|
|
if (name && addr) {
|
|
|
|
*addr = 0x7f000001;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_hostname_failure = 0;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace tor_lookup_hostname().
|
|
|
|
* It pretends to fail by returning -1 to caller. Also, this function
|
|
|
|
* increments <b>n_hostname_failure</b> every time it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
tor_lookup_hostname_failure(const char *name, uint32_t *addr)
|
|
|
|
{
|
|
|
|
(void)name;
|
|
|
|
(void)addr;
|
|
|
|
|
|
|
|
n_hostname_failure++;
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_gethostname_replacement = 0;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace tor_gethostname(). It
|
|
|
|
* responds with string "onionrouter" as hostname. This function
|
|
|
|
* increments <b>n_gethostname_replacement</b> by one every time
|
|
|
|
* it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
tor_gethostname_replacement(char *name, size_t namelen)
|
|
|
|
{
|
|
|
|
n_gethostname_replacement++;
|
|
|
|
|
|
|
|
if (name && namelen) {
|
|
|
|
strlcpy(name,"onionrouter",namelen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_gethostname_localhost = 0;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace tor_gethostname(). It
|
|
|
|
* responds with string "127.0.0.1" as hostname. This function
|
|
|
|
* increments <b>n_gethostname_localhost</b> by one every time
|
|
|
|
* it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
tor_gethostname_localhost(char *name, size_t namelen)
|
|
|
|
{
|
|
|
|
n_gethostname_localhost++;
|
|
|
|
|
|
|
|
if (name && namelen) {
|
|
|
|
strlcpy(name,"127.0.0.1",namelen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_gethostname_failure = 0;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace tor_gethostname.
|
|
|
|
* It pretends to fail by returning -1. This function increments
|
|
|
|
* <b>n_gethostname_failure</b> by one every time it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
tor_gethostname_failure(char *name, size_t namelen)
|
|
|
|
{
|
2014-12-29 15:29:32 +01:00
|
|
|
(void)name;
|
|
|
|
(void)namelen;
|
2014-04-28 22:20:58 +02:00
|
|
|
n_gethostname_failure++;
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_get_interface_address = 0;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace get_interface_address().
|
|
|
|
* It answers with address 8.8.8.8. This function increments
|
|
|
|
* <b>n_get_interface_address</b> by one every time it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
get_interface_address_08080808(int severity, uint32_t *addr)
|
|
|
|
{
|
|
|
|
(void)severity;
|
|
|
|
|
|
|
|
n_get_interface_address++;
|
|
|
|
|
|
|
|
if (addr) {
|
|
|
|
*addr = ntohl(0x08080808);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_get_interface_address6 = 0;
|
|
|
|
static sa_family_t last_address6_family;
|
|
|
|
|
|
|
|
/** This mock function is meant to replace get_interface_address6().
|
|
|
|
* It answers with IP address 9.9.9.9 iff both of the following are true:
|
|
|
|
* - <b>family</b> is AF_INET
|
|
|
|
* - <b>addr</b> pointer is not NULL.
|
|
|
|
* This function increments <b>n_get_interface_address6</b> by one every
|
|
|
|
* time it is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
get_interface_address6_replacement(int severity, sa_family_t family,
|
|
|
|
tor_addr_t *addr)
|
|
|
|
{
|
|
|
|
(void)severity;
|
|
|
|
|
|
|
|
last_address6_family = family;
|
|
|
|
n_get_interface_address6++;
|
|
|
|
|
|
|
|
if ((family != AF_INET) || !addr) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
tor_addr_from_ipv4h(addr,0x09090909);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_get_interface_address_failure = 0;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This mock function is meant to replace get_interface_address().
|
|
|
|
* It pretends to fail getting interface address by returning -1.
|
|
|
|
* <b>n_get_interface_address_failure</b> is incremented by one
|
|
|
|
* every time this function is called.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
get_interface_address_failure(int severity, uint32_t *addr)
|
|
|
|
{
|
|
|
|
(void)severity;
|
|
|
|
(void)addr;
|
|
|
|
|
|
|
|
n_get_interface_address_failure++;
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int n_get_interface_address6_failure = 0;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This mock function is meant to replace get_interface_addres6().
|
|
|
|
* It will pretent to fail by return -1.
|
|
|
|
* <b>n_get_interface_address6_failure</b> is incremented by one
|
|
|
|
* every time this function is called and <b>last_address6_family</b>
|
|
|
|
* is assigned the value of <b>family</b> argument.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
get_interface_address6_failure(int severity, sa_family_t family,
|
|
|
|
tor_addr_t *addr)
|
|
|
|
{
|
2014-12-29 15:29:32 +01:00
|
|
|
(void)severity;
|
|
|
|
(void)addr;
|
2014-04-28 22:20:58 +02:00
|
|
|
n_get_interface_address6_failure++;
|
|
|
|
last_address6_family = family;
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
test_config_resolve_my_address(void *arg)
|
|
|
|
{
|
|
|
|
or_options_t *options;
|
|
|
|
uint32_t resolved_addr;
|
|
|
|
const char *method_used;
|
|
|
|
char *hostname_out;
|
|
|
|
int retval;
|
|
|
|
int prev_n_hostname_01010101;
|
|
|
|
int prev_n_hostname_localhost;
|
|
|
|
int prev_n_hostname_failure;
|
|
|
|
int prev_n_gethostname_replacement;
|
|
|
|
int prev_n_gethostname_failure;
|
|
|
|
int prev_n_gethostname_localhost;
|
|
|
|
int prev_n_get_interface_address;
|
|
|
|
int prev_n_get_interface_address_failure;
|
|
|
|
int prev_n_get_interface_address6;
|
|
|
|
int prev_n_get_interface_address6_failure;
|
|
|
|
|
2014-12-29 15:29:32 +01:00
|
|
|
(void)arg;
|
|
|
|
|
2014-04-28 22:20:58 +02:00
|
|
|
options = options_new();
|
|
|
|
|
|
|
|
options_init(options);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 1:
|
|
|
|
* If options->Address is a valid IPv4 address string, we want
|
|
|
|
* the corresponding address to be parsed and returned.
|
|
|
|
*/
|
|
|
|
|
|
|
|
options->Address = tor_strdup("128.52.128.105");
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(retval == 0);
|
|
|
|
tt_want_str_op(method_used,==,"CONFIGURED");
|
|
|
|
tt_want(hostname_out == NULL);
|
|
|
|
tt_assert(htonl(resolved_addr) == 0x69803480);
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 2:
|
|
|
|
* If options->Address is a valid DNS address, we want resolve_my_address()
|
|
|
|
* function to ask tor_lookup_hostname() for help with resolving it
|
|
|
|
* and return the address that was resolved (in host order).
|
|
|
|
*/
|
|
|
|
|
|
|
|
MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = tor_strdup("www.torproject.org");
|
|
|
|
|
|
|
|
prev_n_hostname_01010101 = n_hostname_01010101;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(retval == 0);
|
|
|
|
tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
|
|
|
|
tt_want_str_op(method_used,==,"RESOLVED");
|
|
|
|
tt_want_str_op(hostname_out,==,"www.torproject.org");
|
|
|
|
tt_assert(htonl(resolved_addr) == 0x01010101);
|
|
|
|
|
|
|
|
UNMOCK(tor_lookup_hostname);
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 3:
|
|
|
|
* Given that options->Address is NULL, we want resolve_my_address()
|
|
|
|
* to try and use tor_gethostname() to get hostname AND use
|
|
|
|
* tor_lookup_hostname() to get IP address.
|
|
|
|
*/
|
|
|
|
|
|
|
|
resolved_addr = 0;
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = NULL;
|
|
|
|
|
|
|
|
MOCK(tor_gethostname,tor_gethostname_replacement);
|
|
|
|
MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
|
|
|
|
|
|
|
|
prev_n_gethostname_replacement = n_gethostname_replacement;
|
|
|
|
prev_n_hostname_01010101 = n_hostname_01010101;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(retval == 0);
|
|
|
|
tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
|
|
|
|
tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
|
|
|
|
tt_want_str_op(method_used,==,"GETHOSTNAME");
|
|
|
|
tt_want_str_op(hostname_out,==,"onionrouter");
|
|
|
|
tt_assert(htonl(resolved_addr) == 0x01010101);
|
|
|
|
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
UNMOCK(tor_lookup_hostname);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 4:
|
|
|
|
* Given that options->Address is a local host address, we want
|
|
|
|
* resolve_my_address() function to fail.
|
|
|
|
*/
|
|
|
|
|
|
|
|
resolved_addr = 0;
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = tor_strdup("127.0.0.1");
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(resolved_addr == 0);
|
|
|
|
tt_assert(retval == -1);
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 5:
|
|
|
|
* We want resolve_my_address() to fail if DNS address in options->Address
|
|
|
|
* cannot be resolved.
|
|
|
|
*/
|
|
|
|
|
|
|
|
MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
|
|
|
|
|
|
|
|
prev_n_hostname_failure = n_hostname_failure;
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = tor_strdup("www.tor-project.org");
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
|
|
|
|
tt_assert(retval == -1);
|
|
|
|
|
|
|
|
UNMOCK(tor_lookup_hostname);
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = NULL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 6:
|
|
|
|
* If options->Address is NULL AND gettting local hostname fails, we want
|
|
|
|
* resolve_my_address() to fail as well.
|
|
|
|
*/
|
|
|
|
|
|
|
|
MOCK(tor_gethostname,tor_gethostname_failure);
|
|
|
|
|
|
|
|
prev_n_gethostname_failure = n_gethostname_failure;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(n_gethostname_failure == prev_n_gethostname_failure + 1);
|
|
|
|
tt_assert(retval == -1);
|
|
|
|
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 7:
|
|
|
|
* We want resolve_my_address() to try and get network interface address via
|
|
|
|
* get_interface_address() if hostname returned by tor_gethostname() cannot be
|
|
|
|
* resolved into IP address.
|
|
|
|
*/
|
|
|
|
|
|
|
|
MOCK(tor_gethostname,tor_gethostname_replacement);
|
|
|
|
MOCK(get_interface_address,get_interface_address_08080808);
|
|
|
|
|
|
|
|
prev_n_gethostname_replacement = n_gethostname_replacement;
|
|
|
|
prev_n_get_interface_address = n_get_interface_address;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(retval == 0);
|
|
|
|
tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
|
|
|
|
tt_want(n_get_interface_address == prev_n_get_interface_address + 1);
|
|
|
|
tt_want_str_op(method_used,==,"INTERFACE");
|
|
|
|
tt_want(hostname_out == NULL);
|
|
|
|
tt_assert(resolved_addr == ntohl(0x08080808));
|
|
|
|
|
|
|
|
UNMOCK(get_interface_address);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 8:
|
|
|
|
* Suppose options->Address is NULL AND hostname returned by tor_gethostname()
|
|
|
|
* is unresolvable. We want resolve_my_address to fail if
|
|
|
|
* get_interface_address() fails.
|
|
|
|
*/
|
|
|
|
|
|
|
|
MOCK(get_interface_address,get_interface_address_failure);
|
|
|
|
|
|
|
|
prev_n_get_interface_address_failure = n_get_interface_address_failure;
|
|
|
|
prev_n_gethostname_replacement = n_gethostname_replacement;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(n_get_interface_address_failure ==
|
|
|
|
prev_n_get_interface_address_failure + 1);
|
|
|
|
tt_want(n_gethostname_replacement ==
|
|
|
|
prev_n_gethostname_replacement + 1);
|
|
|
|
tt_assert(retval == -1);
|
|
|
|
|
|
|
|
UNMOCK(get_interface_address);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 9:
|
|
|
|
* Given that options->Address is NULL AND tor_lookup_hostname()
|
|
|
|
* fails AND hostname returned by gethostname() resolves
|
|
|
|
* to local IP address, we want resolve_my_address() function to
|
|
|
|
* call get_interface_address6(.,AF_INET,.) and return IP address
|
|
|
|
* the latter function has found.
|
|
|
|
*/
|
|
|
|
|
|
|
|
MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
|
|
|
|
MOCK(tor_gethostname,tor_gethostname_replacement);
|
|
|
|
MOCK(get_interface_address6,get_interface_address6_replacement);
|
|
|
|
|
|
|
|
prev_n_gethostname_replacement = n_gethostname_replacement;
|
|
|
|
prev_n_hostname_failure = n_hostname_failure;
|
|
|
|
prev_n_get_interface_address6 = n_get_interface_address6;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(last_address6_family == AF_INET);
|
|
|
|
tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
|
|
|
|
tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
|
|
|
|
tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
|
|
|
|
tt_want(retval == 0);
|
|
|
|
tt_want_str_op(method_used,==,"INTERFACE");
|
|
|
|
tt_assert(htonl(resolved_addr) == 0x09090909);
|
|
|
|
|
|
|
|
UNMOCK(tor_lookup_hostname);
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
UNMOCK(get_interface_address6);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 10: We want resolve_my_address() to fail if all of the following
|
|
|
|
* are true:
|
|
|
|
* 1. options->Address is not NULL
|
|
|
|
* 2. ... but it cannot be converted to struct in_addr by
|
|
|
|
* tor_inet_aton()
|
|
|
|
* 3. ... and tor_lookup_hostname() fails to resolve the
|
|
|
|
* options->Address
|
|
|
|
*/
|
|
|
|
|
|
|
|
MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
|
|
|
|
|
|
|
|
prev_n_hostname_failure = n_hostname_failure;
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = tor_strdup("some_hostname");
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_NOTICE, options, &resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
|
|
|
|
tt_assert(retval == -1);
|
|
|
|
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
UNMOCK(tor_lookup_hostname);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 11:
|
|
|
|
* Suppose the following sequence of events:
|
|
|
|
* 1. options->Address is NULL
|
|
|
|
* 2. tor_gethostname() succeeds to get hostname of machine Tor
|
|
|
|
* if running on.
|
|
|
|
* 3. Hostname from previous step cannot be converted to
|
|
|
|
* address by using tor_inet_aton() function.
|
|
|
|
* 4. However, tor_lookup_hostname() succeds in resolving the
|
|
|
|
* hostname from step 2.
|
|
|
|
* 5. Unfortunately, tor_addr_is_internal() deems this address
|
|
|
|
* to be internal.
|
|
|
|
* 6. get_interface_address6(.,AF_INET,.) returns non-internal
|
|
|
|
* IPv4
|
|
|
|
*
|
|
|
|
* We want resolve_my_addr() to succeed with method "INTERFACE"
|
|
|
|
* and address from step 6.
|
|
|
|
*/
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = NULL;
|
|
|
|
|
|
|
|
MOCK(tor_gethostname,tor_gethostname_replacement);
|
|
|
|
MOCK(tor_lookup_hostname,tor_lookup_hostname_localhost);
|
|
|
|
MOCK(get_interface_address6,get_interface_address6_replacement);
|
|
|
|
|
|
|
|
prev_n_gethostname_replacement = n_gethostname_replacement;
|
|
|
|
prev_n_hostname_localhost = n_hostname_localhost;
|
|
|
|
prev_n_get_interface_address6 = n_get_interface_address6;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
|
|
|
|
tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
|
|
|
|
tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
|
|
|
|
|
|
|
|
tt_str_op(method_used,==,"INTERFACE");
|
|
|
|
tt_assert(!hostname_out);
|
|
|
|
tt_assert(retval == 0);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CASE 11b:
|
|
|
|
* 1-5 as above.
|
|
|
|
* 6. get_interface_address6() fails.
|
|
|
|
*
|
|
|
|
* In this subcase, we want resolve_my_address() to fail.
|
|
|
|
*/
|
|
|
|
|
|
|
|
UNMOCK(get_interface_address6);
|
|
|
|
MOCK(get_interface_address6,get_interface_address6_failure);
|
|
|
|
|
|
|
|
prev_n_gethostname_replacement = n_gethostname_replacement;
|
|
|
|
prev_n_hostname_localhost = n_hostname_localhost;
|
|
|
|
prev_n_get_interface_address6_failure = n_get_interface_address6_failure;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
|
|
|
|
tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
|
|
|
|
tt_want(n_get_interface_address6_failure ==
|
|
|
|
prev_n_get_interface_address6_failure + 1);
|
|
|
|
|
|
|
|
tt_assert(retval == -1);
|
|
|
|
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
UNMOCK(tor_lookup_hostname);
|
|
|
|
UNMOCK(get_interface_address6);
|
|
|
|
|
|
|
|
/* CASE 12:
|
|
|
|
* Suppose the following happens:
|
|
|
|
* 1. options->Address is NULL AND options->DirAuthorities is 1.
|
|
|
|
* 2. tor_gethostname() succeeds in getting hostname of a machine ...
|
|
|
|
* 3. ... which is successfully parsed by tor_inet_aton() ...
|
|
|
|
* 4. into IPv4 address that tor_addr_is_inernal() considers to be
|
|
|
|
* internal.
|
|
|
|
*
|
|
|
|
* In this case, we want resolve_my_address() to fail.
|
|
|
|
*/
|
|
|
|
|
|
|
|
tor_free(options->Address);
|
|
|
|
options->Address = NULL;
|
|
|
|
options->DirAuthorities = tor_malloc_zero(sizeof(config_line_t));
|
|
|
|
|
|
|
|
MOCK(tor_gethostname,tor_gethostname_localhost);
|
|
|
|
|
|
|
|
prev_n_gethostname_localhost = n_gethostname_localhost;
|
|
|
|
|
|
|
|
retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
|
|
|
|
&method_used,&hostname_out);
|
|
|
|
|
|
|
|
tt_want(n_gethostname_localhost == prev_n_gethostname_localhost + 1);
|
|
|
|
tt_assert(retval == -1);
|
|
|
|
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
|
|
|
|
done:
|
|
|
|
tor_free(options->Address);
|
|
|
|
tor_free(options->DirAuthorities);
|
|
|
|
or_options_free(options);
|
|
|
|
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
UNMOCK(tor_lookup_hostname);
|
|
|
|
UNMOCK(get_interface_address);
|
|
|
|
UNMOCK(get_interface_address6);
|
|
|
|
UNMOCK(tor_gethostname);
|
|
|
|
}
|
|
|
|
|
2010-08-02 21:09:37 +02:00
|
|
|
#define CONFIG_TEST(name, flags) \
|
|
|
|
{ #name, test_config_ ## name, flags, NULL, NULL }
|
|
|
|
|
|
|
|
struct testcase_t config_tests[] = {
|
2014-04-28 22:20:58 +02:00
|
|
|
CONFIG_TEST(resolve_my_address, TT_FORK),
|
2011-09-08 17:19:06 +02:00
|
|
|
CONFIG_TEST(addressmap, 0),
|
2013-02-11 23:45:18 +01:00
|
|
|
CONFIG_TEST(parse_bridge_line, 0),
|
2013-06-12 14:28:48 +02:00
|
|
|
CONFIG_TEST(parse_transport_options_line, 0),
|
2013-05-24 19:31:10 +02:00
|
|
|
CONFIG_TEST(check_or_create_data_subdir, TT_FORK),
|
|
|
|
CONFIG_TEST(write_to_data_subdir, TT_FORK),
|
2013-08-31 05:49:04 +02:00
|
|
|
CONFIG_TEST(fix_my_family, 0),
|
2010-08-02 21:09:37 +02:00
|
|
|
END_OF_TESTCASES
|
|
|
|
};
|
|
|
|
|