/* Copyright (c) 2001-2004, Roger Dingledine. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson. * Copyright (c) 2007-2020, The Tor Project, Inc. */ /* See LICENSE for licensing information */ #include "orconfig.h" #define CONFIG_PRIVATE #define RELAY_CONFIG_PRIVATE #define RELAY_TRANSPORT_CONFIG_PRIVATE #define PT_PRIVATE #define ROUTERSET_PRIVATE #include "core/or/or.h" #include "lib/net/address.h" #include "lib/net/resolve.h" #include "feature/client/addressmap.h" #include "feature/client/bridges.h" #include "core/or/circuitmux_ewma.h" #include "core/or/circuitbuild.h" #include "app/config/config.h" #include "app/config/resolve_addr.h" #include "feature/relay/relay_config.h" #include "feature/relay/transport_config.h" #include "lib/confmgt/confmgt.h" #include "core/mainloop/connection.h" #include "core/or/connection_edge.h" #include "test/test.h" #include "core/or/connection_or.h" #include "feature/control/control.h" #include "core/mainloop/cpuworker.h" #include "feature/dircache/dirserv.h" #include "feature/dirclient/dirclient_modes.h" #include "feature/dirauth/dirvote.h" #include "feature/relay/dns.h" #include "feature/client/entrynodes.h" #include "feature/client/transports.h" #include "feature/relay/ext_orport.h" #include "lib/geoip/geoip.h" #include "feature/hibernate/hibernate.h" #include "core/mainloop/mainloop.h" #include "feature/nodelist/networkstatus.h" #include "feature/nodelist/nodelist.h" #include "core/or/policies.h" #include "feature/rend/rendclient.h" #include "feature/rend/rendservice.h" #include "feature/relay/relay_find_addr.h" #include "feature/relay/router.h" #include "feature/relay/routermode.h" #include "feature/nodelist/dirlist.h" #include "feature/nodelist/routerlist.h" #include "feature/nodelist/routerset.h" #include "app/config/statefile.h" #include "test/test_helpers.h" #include "test/resolve_test_helpers.h" #include "test/log_test_helpers.h" #include "feature/dirclient/dir_server_st.h" #include "core/or/port_cfg_st.h" #include "feature/nodelist/routerinfo_st.h" #include "lib/fs/conffile.h" #include "lib/meminfo/meminfo.h" #include "lib/net/gethostname.h" #include "lib/encoding/confline.h" #include "lib/encoding/kvline.h" #ifdef HAVE_UNISTD_H #include #endif #ifdef HAVE_SYS_STAT_H #include #endif static void test_config_addressmap(void *arg) { char buf[1024]; char address[256]; time_t expires = TIME_MAX; (void)arg; strlcpy(buf, "MapAddress .invalidwildcard.com *.torserver.exit\n" // invalid "MapAddress *invalidasterisk.com *.torserver.exit\n" // invalid "MapAddress *.google.com *.torserver.exit\n" "MapAddress *.yahoo.com *.google.com.torserver.exit\n" "MapAddress *.cn.com www.cnn.com\n" "MapAddress *.cnn.com www.cnn.com\n" "MapAddress ex.com www.cnn.com\n" "MapAddress ey.com *.cnn.com\n" "MapAddress www.torproject.org 1.1.1.1\n" "MapAddress other.torproject.org " "this.torproject.org.otherserver.exit\n" "MapAddress test.torproject.org 2.2.2.2\n" "MapAddress www.google.com 3.3.3.3\n" "MapAddress www.example.org 4.4.4.4\n" "MapAddress 4.4.4.4 7.7.7.7\n" "MapAddress 4.4.4.4 5.5.5.5\n" "MapAddress www.infiniteloop.org 6.6.6.6\n" "MapAddress 6.6.6.6 www.infiniteloop.org\n" , sizeof(buf)); config_get_lines(buf, &(get_options_mutable()->AddressMap), 0); config_register_addressmaps(get_options()); /* Use old interface for now, so we don't need to rewrite the unit tests */ #define addressmap_rewrite(a,s,eo,ao) \ addressmap_rewrite((a),(s), ~0, (eo),(ao)) /* MapAddress .invalidwildcard.com .torserver.exit - no match */ strlcpy(address, "www.invalidwildcard.com", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); /* MapAddress *invalidasterisk.com .torserver.exit - no match */ strlcpy(address, "www.invalidasterisk.com", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); /* Where no mapping for FQDN match on top-level domain */ /* MapAddress .google.com .torserver.exit */ strlcpy(address, "reader.google.com", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "reader.torserver.exit"); /* MapAddress *.yahoo.com *.google.com.torserver.exit */ strlcpy(address, "reader.yahoo.com", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "reader.google.com.torserver.exit"); /*MapAddress *.cnn.com www.cnn.com */ strlcpy(address, "cnn.com", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "www.cnn.com"); /* MapAddress .cn.com www.cnn.com */ strlcpy(address, "www.cn.com", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "www.cnn.com"); /* MapAddress ex.com www.cnn.com - no match */ strlcpy(address, "www.ex.com", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); /* MapAddress ey.com *.cnn.com - invalid expression */ strlcpy(address, "ey.com", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); /* Where mapping for FQDN match on FQDN */ strlcpy(address, "www.google.com", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "3.3.3.3"); strlcpy(address, "www.torproject.org", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "1.1.1.1"); strlcpy(address, "other.torproject.org", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "this.torproject.org.otherserver.exit"); strlcpy(address, "test.torproject.org", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "2.2.2.2"); /* Test a chain of address mappings and the order in which they were added: "MapAddress www.example.org 4.4.4.4" "MapAddress 4.4.4.4 7.7.7.7" "MapAddress 4.4.4.4 5.5.5.5" */ strlcpy(address, "www.example.org", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "5.5.5.5"); /* Test infinite address mapping results in no change */ strlcpy(address, "www.infiniteloop.org", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "www.infiniteloop.org"); /* Test we don't find false positives */ strlcpy(address, "www.example.com", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); /* Test top-level-domain matching a bit harder */ config_free_lines(get_options_mutable()->AddressMap); addressmap_clear_configured(); strlcpy(buf, "MapAddress *.com *.torserver.exit\n" "MapAddress *.torproject.org 1.1.1.1\n" "MapAddress *.net 2.2.2.2\n" , sizeof(buf)); config_get_lines(buf, &(get_options_mutable()->AddressMap), 0); config_register_addressmaps(get_options()); strlcpy(address, "www.abc.com", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "www.abc.torserver.exit"); strlcpy(address, "www.def.com", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "www.def.torserver.exit"); strlcpy(address, "www.torproject.org", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "1.1.1.1"); strlcpy(address, "test.torproject.org", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "1.1.1.1"); strlcpy(address, "torproject.net", sizeof(address)); tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL)); tt_str_op(address,OP_EQ, "2.2.2.2"); /* We don't support '*' as a mapping directive */ config_free_lines(get_options_mutable()->AddressMap); addressmap_clear_configured(); strlcpy(buf, "MapAddress * *.torserver.exit\n", sizeof(buf)); config_get_lines(buf, &(get_options_mutable()->AddressMap), 0); config_register_addressmaps(get_options()); strlcpy(address, "www.abc.com", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); strlcpy(address, "www.def.net", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); strlcpy(address, "www.torproject.org", sizeof(address)); tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL)); #undef addressmap_rewrite done: config_free_lines(get_options_mutable()->AddressMap); get_options_mutable()->AddressMap = NULL; addressmap_free_all(); } static int is_private_dir(const char* path) { struct stat st; int r = stat(path, &st); if (r) { return 0; } #if !defined (_WIN32) if ((st.st_mode & (S_IFDIR | 0777)) != (S_IFDIR | 0700)) { return 0; } #endif return 1; } static void test_config_check_or_create_data_subdir(void *arg) { or_options_t *options = get_options_mutable(); char *datadir; const char *subdir = "test_stats"; char *subpath; struct stat st; int r; #if !defined (_WIN32) unsigned group_permission; #endif (void)arg; tor_free(options->DataDirectory); datadir = options->DataDirectory = tor_strdup(get_fname("datadir-0")); subpath = get_datadir_fname(subdir); #if defined (_WIN32) tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0); #else tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0); #endif r = stat(subpath, &st); // The subdirectory shouldn't exist yet, // but should be created by the call to check_or_create_data_subdir. tt_assert(r && (errno == ENOENT)); tt_assert(!check_or_create_data_subdir(subdir)); tt_assert(is_private_dir(subpath)); // The check should return 0, if the directory already exists // and is private to the user. tt_assert(!check_or_create_data_subdir(subdir)); r = stat(subpath, &st); if (r) { tt_abort_perror("stat"); } #if !defined (_WIN32) group_permission = st.st_mode | 0070; r = chmod(subpath, group_permission); if (r) { tt_abort_perror("chmod"); } // If the directory exists, but its mode is too permissive // a call to check_or_create_data_subdir should reset the mode. tt_assert(!is_private_dir(subpath)); tt_assert(!check_or_create_data_subdir(subdir)); tt_assert(is_private_dir(subpath)); #endif /* !defined (_WIN32) */ done: rmdir(subpath); tor_free(datadir); tor_free(subpath); } static void test_config_write_to_data_subdir(void *arg) { or_options_t* options = get_options_mutable(); char *datadir; char *cp = NULL; const char* subdir = "test_stats"; const char* fname = "test_file"; const char* str = "Lorem ipsum dolor sit amet, consetetur sadipscing\n" "elitr, sed diam nonumy eirmod\n" "tempor invidunt ut labore et dolore magna aliquyam\n" "erat, sed diam voluptua.\n" "At vero eos et accusam et justo duo dolores et ea\n" "rebum. Stet clita kasd gubergren,\n" "no sea takimata sanctus est Lorem ipsum dolor sit amet.\n" "Lorem ipsum dolor sit amet,\n" "consetetur sadipscing elitr, sed diam nonumy eirmod\n" "tempor invidunt ut labore et dolore\n" "magna aliquyam erat, sed diam voluptua. At vero eos et\n" "accusam et justo duo dolores et\n" "ea rebum. Stet clita kasd gubergren, no sea takimata\n" "sanctus est Lorem ipsum dolor sit amet."; char* filepath = NULL; (void)arg; tor_free(options->DataDirectory); datadir = options->DataDirectory = tor_strdup(get_fname("datadir-1")); filepath = get_datadir_fname2(subdir, fname); #if defined (_WIN32) tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0); #else tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0); #endif // Write attempt should fail, if subdirectory doesn't exist. tt_assert(write_to_data_subdir(subdir, fname, str, NULL)); tt_assert(! check_or_create_data_subdir(subdir)); // Content of file after write attempt should be // equal to the original string. tt_assert(!write_to_data_subdir(subdir, fname, str, NULL)); cp = read_file_to_str(filepath, 0, NULL); tt_str_op(cp,OP_EQ, str); tor_free(cp); // A second write operation should overwrite the old content. tt_assert(!write_to_data_subdir(subdir, fname, str, NULL)); cp = read_file_to_str(filepath, 0, NULL); tt_str_op(cp,OP_EQ, str); tor_free(cp); done: (void) unlink(filepath); rmdir(options->DataDirectory); tor_free(datadir); tor_free(filepath); tor_free(cp); } /* Test helper function: Make sure that a bridge line gets parsed * properly. Also make sure that the resulting bridge_line_t structure * has its fields set correctly. */ static void good_bridge_line_test(const char *string, const char *test_addrport, const char *test_digest, const char *test_transport, const smartlist_t *test_socks_args) { char *tmp = NULL; bridge_line_t *bridge_line = parse_bridge_line(string); tt_assert(bridge_line); /* test addrport */ tmp = tor_strdup(fmt_addrport(&bridge_line->addr, bridge_line->port)); tt_str_op(test_addrport,OP_EQ, tmp); tor_free(tmp); /* If we were asked to validate a digest, but we did not get a digest after parsing, we failed. */ if (test_digest && tor_digest_is_zero(bridge_line->digest)) tt_abort(); /* If we were not asked to validate a digest, and we got a digest after parsing, we failed again. */ if (!test_digest && !tor_digest_is_zero(bridge_line->digest)) tt_abort(); /* If we were asked to validate a digest, and we got a digest after parsing, make sure it's correct. */ if (test_digest) { tmp = tor_strdup(hex_str(bridge_line->digest, DIGEST_LEN)); tor_strlower(tmp); tt_str_op(test_digest,OP_EQ, tmp); tor_free(tmp); } /* If we were asked to validate a transport name, make sure tha it matches with the transport name that was parsed. */ if (test_transport && !bridge_line->transport_name) tt_abort(); if (!test_transport && bridge_line->transport_name) tt_abort(); if (test_transport) tt_str_op(test_transport,OP_EQ, bridge_line->transport_name); /* Validate the SOCKS argument smartlist. */ if (test_socks_args && !bridge_line->socks_args) tt_abort(); if (!test_socks_args && bridge_line->socks_args) tt_abort(); if (test_socks_args) tt_assert(smartlist_strings_eq(test_socks_args, bridge_line->socks_args)); done: tor_free(tmp); bridge_line_free(bridge_line); } /* Test helper function: Make sure that a bridge line is * unparseable. */ static void bad_bridge_line_test(const char *string) { bridge_line_t *bridge_line = parse_bridge_line(string); if (bridge_line) TT_FAIL(("%s was supposed to fail, but it didn't.", string)); tt_ptr_op(bridge_line, OP_EQ, NULL); done: bridge_line_free(bridge_line); } static void test_config_parse_bridge_line(void *arg) { (void) arg; good_bridge_line_test("192.0.2.1:4123", "192.0.2.1:4123", NULL, NULL, NULL); good_bridge_line_test("192.0.2.1", "192.0.2.1:443", NULL, NULL, NULL); good_bridge_line_test("transport [::1]", "[::1]:443", NULL, "transport", NULL); good_bridge_line_test("transport 192.0.2.1:12 " "4352e58420e68f5e40bf7c74faddccd9d1349413", "192.0.2.1:12", "4352e58420e68f5e40bf7c74faddccd9d1349413", "transport", NULL); { smartlist_t *sl_tmp = smartlist_new(); smartlist_add_asprintf(sl_tmp, "twoandtwo=five"); good_bridge_line_test("transport 192.0.2.1:12 " "4352e58420e68f5e40bf7c74faddccd9d1349413 twoandtwo=five", "192.0.2.1:12", "4352e58420e68f5e40bf7c74faddccd9d1349413", "transport", sl_tmp); SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s)); smartlist_free(sl_tmp); } { smartlist_t *sl_tmp = smartlist_new(); smartlist_add_asprintf(sl_tmp, "twoandtwo=five"); smartlist_add_asprintf(sl_tmp, "z=z"); good_bridge_line_test("transport 192.0.2.1:12 twoandtwo=five z=z", "192.0.2.1:12", NULL, "transport", sl_tmp); SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s)); smartlist_free(sl_tmp); } { smartlist_t *sl_tmp = smartlist_new(); smartlist_add_asprintf(sl_tmp, "dub=come"); smartlist_add_asprintf(sl_tmp, "save=me"); good_bridge_line_test("transport 192.0.2.1:12 " "4352e58420e68f5e40bf7c74faddccd9d1349666 " "dub=come save=me", "192.0.2.1:12", "4352e58420e68f5e40bf7c74faddccd9d1349666", "transport", sl_tmp); SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s)); smartlist_free(sl_tmp); } good_bridge_line_test("192.0.2.1:1231 " "4352e58420e68f5e40bf7c74faddccd9d1349413", "192.0.2.1:1231", "4352e58420e68f5e40bf7c74faddccd9d1349413", NULL, NULL); /* Empty line */ bad_bridge_line_test(""); /* bad transport name */ bad_bridge_line_test("tr$n_sp0r7 190.20.2.2"); /* weird ip address */ bad_bridge_line_test("a.b.c.d"); /* invalid fpr */ bad_bridge_line_test("2.2.2.2:1231 4352e58420e68f5e40bf7c74faddccd9d1349"); /* no k=v in the end */ bad_bridge_line_test("obfs2 2.2.2.2:1231 " "4352e58420e68f5e40bf7c74faddccd9d1349413 what"); /* no addrport */ bad_bridge_line_test("asdw"); /* huge k=v value that can't fit in SOCKS fields */ bad_bridge_line_test( "obfs2 2.2.2.2:1231 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" "aa=b"); } static void test_config_parse_transport_options_line(void *arg) { smartlist_t *options_sl = NULL, *sl_tmp = NULL; (void) arg; { /* too small line */ options_sl = get_options_from_transport_options_line("valley", NULL); tt_ptr_op(options_sl, OP_EQ, NULL); } { /* no k=v values */ options_sl = get_options_from_transport_options_line("hit it!", NULL); tt_ptr_op(options_sl, OP_EQ, NULL); } { /* correct line, but wrong transport specified */ options_sl = get_options_from_transport_options_line("trebuchet k=v", "rook"); tt_ptr_op(options_sl, OP_EQ, NULL); } { /* correct -- no transport specified */ sl_tmp = smartlist_new(); smartlist_add_asprintf(sl_tmp, "ladi=dadi"); smartlist_add_asprintf(sl_tmp, "weliketo=party"); options_sl = get_options_from_transport_options_line("rook ladi=dadi weliketo=party", NULL); tt_assert(options_sl); tt_assert(smartlist_strings_eq(options_sl, sl_tmp)); SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s)); smartlist_free(sl_tmp); sl_tmp = NULL; SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s)); smartlist_free(options_sl); options_sl = NULL; } { /* correct -- correct transport specified */ sl_tmp = smartlist_new(); smartlist_add_asprintf(sl_tmp, "ladi=dadi"); smartlist_add_asprintf(sl_tmp, "weliketo=party"); options_sl = get_options_from_transport_options_line("rook ladi=dadi weliketo=party", "rook"); tt_assert(options_sl); tt_assert(smartlist_strings_eq(options_sl, sl_tmp)); SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s)); smartlist_free(sl_tmp); sl_tmp = NULL; SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s)); smartlist_free(options_sl); options_sl = NULL; } done: if (options_sl) { SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s)); smartlist_free(options_sl); } if (sl_tmp) { SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s)); smartlist_free(sl_tmp); } } /* Mocks needed for the compute_max_mem_in_queues test */ static int get_total_system_memory_mock(size_t *mem_out); static size_t total_system_memory_output = 0; static int total_system_memory_return = 0; static int get_total_system_memory_mock(size_t *mem_out) { if (! mem_out) return -1; *mem_out = total_system_memory_output; return total_system_memory_return; } /* Mocks needed for the transport plugin line test */ static void pt_kickstart_proxy_mock(const smartlist_t *transport_list, char **proxy_argv, int is_server); static int transport_add_from_config_mock(const tor_addr_t *addr, uint16_t port, const char *name, int socks_ver); static int transport_is_needed_mock(const char *transport_name); static int pt_kickstart_proxy_mock_call_count = 0; static int transport_add_from_config_mock_call_count = 0; static int transport_is_needed_mock_call_count = 0; static int transport_is_needed_mock_return = 0; static void pt_kickstart_proxy_mock(const smartlist_t *transport_list, char **proxy_argv, int is_server) { (void) transport_list; (void) proxy_argv; (void) is_server; /* XXXX check that args are as expected. */ ++pt_kickstart_proxy_mock_call_count; free_execve_args(proxy_argv); } static int transport_add_from_config_mock(const tor_addr_t *addr, uint16_t port, const char *name, int socks_ver) { (void) addr; (void) port; (void) name; (void) socks_ver; /* XXXX check that args are as expected. */ ++transport_add_from_config_mock_call_count; return 0; } static int transport_is_needed_mock(const char *transport_name) { (void) transport_name; /* XXXX check that arg is as expected. */ ++transport_is_needed_mock_call_count; return transport_is_needed_mock_return; } static void test_config_parse_tcp_proxy_line(void *arg) { (void)arg; int ret; char *msg = NULL; or_options_t *options = get_options_mutable(); /* Bad TCPProxy line - too short. */ ret = parse_tcp_proxy_line("haproxy", options, &msg); /* Return error. */ tt_int_op(ret, OP_EQ, -1); /* Correct error message. */ tt_str_op(msg, OP_EQ, "TCPProxy has no address/port. Please fix."); /* Free error message. */ tor_free(msg); /* Bad TCPProxy line - unsupported protocol. */ ret = parse_tcp_proxy_line("unsupported 95.216.163.36:443", options, &msg); tt_int_op(ret, OP_EQ, -1); tt_str_op(msg, OP_EQ, "TCPProxy protocol is not supported. Currently the " "only supported protocol is 'haproxy'. Please fix."); tor_free(msg); /* Bad TCPProxy line - unparsable address/port. */ ret = parse_tcp_proxy_line("haproxy 95.216.163.36/443", options, &msg); tt_int_op(ret, OP_EQ, -1); tt_str_op(msg, OP_EQ, "TCPProxy address/port failed to parse or resolve. " "Please fix."); tor_free(msg); /* Good TCPProxy line - ipv4. */ ret = parse_tcp_proxy_line("haproxy 95.216.163.36:443", options, &msg); tt_int_op(ret, OP_EQ, 0); tt_ptr_op(msg, OP_EQ, NULL); tt_int_op(options->TCPProxyProtocol, OP_EQ, TCP_PROXY_PROTOCOL_HAPROXY); /* Correct the address. */ tt_assert(tor_addr_eq_ipv4h(&options->TCPProxyAddr, 0x5fd8a324)); tt_int_op(options->TCPProxyPort, OP_EQ, 443); tor_free(msg); done: ; } /** * Test parsing for the ClientTransportPlugin and ServerTransportPlugin config * options. */ static void test_config_parse_transport_plugin_line(void *arg) { (void)arg; or_options_t *options = get_options_mutable(); int r, tmp; int old_pt_kickstart_proxy_mock_call_count; int old_transport_add_from_config_mock_call_count; int old_transport_is_needed_mock_call_count; /* Bad transport lines - too short */ r = pt_parse_transport_line(options, "bad", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "bad", 1, 1); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "bad bad", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "bad bad", 1, 1); tt_int_op(r, OP_LT, 0); /* Test transport list parsing */ r = pt_parse_transport_line(options, "transport_1 exec /usr/bin/fake-transport", 1, 0); tt_int_op(r, OP_EQ, 0); r = pt_parse_transport_line(options, "transport_1 exec /usr/bin/fake-transport", 1, 1); tt_int_op(r, OP_EQ, 0); r = pt_parse_transport_line(options, "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 0); tt_int_op(r, OP_EQ, 0); r = pt_parse_transport_line(options, "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 1); tt_int_op(r, OP_EQ, 0); /* Bad transport identifiers */ r = pt_parse_transport_line(options, "transport_* exec /usr/bin/fake-transport", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "transport_* exec /usr/bin/fake-transport", 1, 1); tt_int_op(r, OP_LT, 0); /* Check SOCKS cases for client transport */ r = pt_parse_transport_line(options, "transport_1 socks4 1.2.3.4:567", 1, 0); tt_int_op(r, OP_EQ, 0); r = pt_parse_transport_line(options, "transport_1 socks5 1.2.3.4:567", 1, 0); tt_int_op(r, OP_EQ, 0); /* Proxy case for server transport */ r = pt_parse_transport_line(options, "transport_1 proxy 1.2.3.4:567", 1, 1); tt_int_op(r, OP_EQ, 0); /* Multiple-transport error exit */ r = pt_parse_transport_line(options, "transport_1,transport_2 socks5 1.2.3.4:567", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "transport_1,transport_2 proxy 1.2.3.4:567", 1, 1); tt_int_op(r, OP_LT, 0); /* No port error exit */ r = pt_parse_transport_line(options, "transport_1 socks5 1.2.3.4", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "transport_1 proxy 1.2.3.4", 1, 1); tt_int_op(r, OP_LT, 0); /* Unparsable address error exit */ r = pt_parse_transport_line(options, "transport_1 socks5 1.2.3:6x7", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "transport_1 proxy 1.2.3:6x7", 1, 1); tt_int_op(r, OP_LT, 0); /* "Strange {Client|Server}TransportPlugin field" error exit */ r = pt_parse_transport_line(options, "transport_1 foo bar", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "transport_1 foo bar", 1, 1); tt_int_op(r, OP_LT, 0); /* No sandbox mode error exit */ tmp = options->Sandbox; options->Sandbox = 1; r = pt_parse_transport_line(options, "transport_1 exec /usr/bin/fake-transport", 1, 0); tt_int_op(r, OP_LT, 0); r = pt_parse_transport_line(options, "transport_1 exec /usr/bin/fake-transport", 1, 1); tt_int_op(r, OP_LT, 0); options->Sandbox = tmp; /* * These final test cases cover code paths that only activate without * validate_only, so they need mocks in place. */ MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock); old_pt_kickstart_proxy_mock_call_count = pt_kickstart_proxy_mock_call_count; r = pt_parse_transport_line(options, "transport_1 exec /usr/bin/fake-transport", 0, 1); tt_int_op(r, OP_EQ, 0); tt_assert(pt_kickstart_proxy_mock_call_count == old_pt_kickstart_proxy_mock_call_count + 1); UNMOCK(pt_kickstart_proxy); /* This one hits a log line in the !validate_only case only */ r = pt_parse_transport_line(options, "transport_1 proxy 1.2.3.4:567", 0, 1); tt_int_op(r, OP_EQ, 0); /* Check mocked client transport cases */ MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock); MOCK(transport_add_from_config, transport_add_from_config_mock); MOCK(transport_is_needed, transport_is_needed_mock); /* Unnecessary transport case */ transport_is_needed_mock_return = 0; old_pt_kickstart_proxy_mock_call_count = pt_kickstart_proxy_mock_call_count; old_transport_add_from_config_mock_call_count = transport_add_from_config_mock_call_count; old_transport_is_needed_mock_call_count = transport_is_needed_mock_call_count; r = pt_parse_transport_line(options, "transport_1 exec /usr/bin/fake-transport", 0, 0); /* Should have succeeded */ tt_int_op(r, OP_EQ, 0); /* transport_is_needed() should have been called */ tt_assert(transport_is_needed_mock_call_count == old_transport_is_needed_mock_call_count + 1); /* * pt_kickstart_proxy() and transport_add_from_config() should * not have been called. */ tt_assert(pt_kickstart_proxy_mock_call_count == old_pt_kickstart_proxy_mock_call_count); tt_assert(transport_add_from_config_mock_call_count == old_transport_add_from_config_mock_call_count); /* Necessary transport case */ transport_is_needed_mock_return = 1; old_pt_kickstart_proxy_mock_call_count = pt_kickstart_proxy_mock_call_count; old_transport_add_from_config_mock_call_count = transport_add_from_config_mock_call_count; old_transport_is_needed_mock_call_count = transport_is_needed_mock_call_count; r = pt_parse_transport_line(options, "transport_1 exec /usr/bin/fake-transport", 0, 0); /* Should have succeeded */ tt_int_op(r, OP_EQ, 0); /* * transport_is_needed() and pt_kickstart_proxy() should have been * called. */ tt_assert(pt_kickstart_proxy_mock_call_count == old_pt_kickstart_proxy_mock_call_count + 1); tt_assert(transport_is_needed_mock_call_count == old_transport_is_needed_mock_call_count + 1); /* transport_add_from_config() should not have been called. */ tt_assert(transport_add_from_config_mock_call_count == old_transport_add_from_config_mock_call_count); /* proxy case */ transport_is_needed_mock_return = 1; old_pt_kickstart_proxy_mock_call_count = pt_kickstart_proxy_mock_call_count; old_transport_add_from_config_mock_call_count = transport_add_from_config_mock_call_count; old_transport_is_needed_mock_call_count = transport_is_needed_mock_call_count; r = pt_parse_transport_line(options, "transport_1 socks5 1.2.3.4:567", 0, 0); /* Should have succeeded */ tt_int_op(r, OP_EQ, 0); /* * transport_is_needed() and transport_add_from_config() should have * been called. */ tt_assert(transport_add_from_config_mock_call_count == old_transport_add_from_config_mock_call_count + 1); tt_assert(transport_is_needed_mock_call_count == old_transport_is_needed_mock_call_count + 1); /* pt_kickstart_proxy() should not have been called. */ tt_assert(pt_kickstart_proxy_mock_call_count == old_pt_kickstart_proxy_mock_call_count); /* Done with mocked client transport cases */ UNMOCK(transport_is_needed); UNMOCK(transport_add_from_config); UNMOCK(pt_kickstart_proxy); done: /* Make sure we undo all mocks */ UNMOCK(pt_kickstart_proxy); UNMOCK(transport_add_from_config); UNMOCK(transport_is_needed); return; } // Tests if an options with MyFamily fingerprints missing '$' normalises // them correctly and also ensure it also works with multiple fingerprints static void test_config_fix_my_family(void *arg) { char *err = NULL; config_line_t *family = tor_malloc_zero(sizeof(config_line_t)); family->key = tor_strdup("MyFamily"); family->value = tor_strdup("$1111111111111111111111111111111111111111, " "1111111111111111111111111111111111111112, " "$1111111111111111111111111111111111111113"); config_line_t *family2 = tor_malloc_zero(sizeof(config_line_t)); family2->key = tor_strdup("MyFamily"); family2->value = tor_strdup("1111111111111111111111111111111111111114"); config_line_t *family3 = tor_malloc_zero(sizeof(config_line_t)); family3->key = tor_strdup("MyFamily"); family3->value = tor_strdup("$1111111111111111111111111111111111111115"); family->next = family2; family2->next = family3; family3->next = NULL; or_options_t* options = options_new(); (void) arg; options_init(options); options->MyFamily_lines = family; options_validate(NULL, options, &err) ; if (err != NULL) { TT_FAIL(("options_validate failed: %s", err)); } const char *valid[] = { "$1111111111111111111111111111111111111111", "$1111111111111111111111111111111111111112", "$1111111111111111111111111111111111111113", "$1111111111111111111111111111111111111114", "$1111111111111111111111111111111111111115" }; int ret_size = 0; config_line_t *ret; for (ret = options->MyFamily; ret && ret_size < 5; ret = ret->next) { tt_str_op(ret->value, OP_EQ, valid[ret_size]); ret_size++; } tt_int_op(ret_size, OP_EQ, 5); done: tor_free(err); or_options_free(options); } static int n_hostname_01010101 = 0; static const char *ret_addr_lookup_01010101[2] = { "1.1.1.1", "0101::0101", }; /** This mock function is meant to replace tor_addr_lookup(). * It answers with 1.1.1.1 as IP adddress that resulted from lookup. * This function increments n_hostname_01010101 counter by one * every time it is called. */ static int tor_addr_lookup_01010101(const char *name, uint16_t family, tor_addr_t *addr) { n_hostname_01010101++; if (family == AF_INET) { if (name && addr) { int ret = tor_addr_parse(addr, ret_addr_lookup_01010101[0]); tt_int_op(ret, OP_EQ, family); } } else if (family == AF_INET6) { if (name && addr) { int ret = tor_addr_parse(addr, ret_addr_lookup_01010101[1]); tt_int_op(ret, OP_EQ, family); } } done: return 0; } static int n_hostname_localhost = 0; /** This mock function is meant to replace tor_addr_lookup(). * It answers with 127.0.0.1 as IP adddress that resulted from lookup. * This function increments n_hostname_localhost counter by one * every time it is called. */ static int tor_addr_lookup_localhost(const char *name, uint16_t family, tor_addr_t *addr) { n_hostname_localhost++; if (family == AF_INET) { if (name && addr) { tor_addr_from_ipv4h(addr, 0x7f000001); } } else if (family == AF_INET6) { if (name && addr) { int ret = tor_addr_parse(addr, "::1"); tt_int_op(ret, OP_EQ, AF_INET6); } } done: return 0; } static int n_hostname_failure = 0; /** This mock function is meant to replace tor_addr_lookup(). * It pretends to fail by returning -1 to caller. Also, this function * increments n_hostname_failure every time it is called. */ static int tor_addr_lookup_failure(const char *name, uint16_t family, tor_addr_t *addr) { (void)name; (void)family; (void)addr; n_hostname_failure++; return -1; } /** Mock function for tor_addr_lookup(). * * Depending on the given hostname and family, resolve either to IPv4 or IPv6. * * If the requested hostname family is not the same as the family provided, an * error is returned. * * Possible hostnames: * - www.torproject.org.v4 for IPv4 -> 1.1.1.1 * - www.torproject.org.v6 for IPv6 -> [0101::0101] */ static int tor_addr_lookup_mixed(const char *name, uint16_t family, tor_addr_t *addr) { tt_assert(addr); tt_assert(name); if (!strcmp(name, "www.torproject.org.v4")) { if (family == AF_INET) { tor_addr_from_ipv4h(addr, 0x01010101); return 0; } /* Resolving AF_INET but the asked family is different. Failure. */ return -1; } if (!strcmp(name, "www.torproject.org.v6")) { if (family == AF_INET6) { int ret = tor_addr_parse(addr, "0101::0101"); tt_int_op(ret, OP_EQ, AF_INET6); return 0; } /* Resolving AF_INET6 but the asked family is not. Failure. */ return -1; } done: return 0; } static int n_gethostname_replacement = 0; /** This mock function is meant to replace tor_gethostname(). It * responds with string "onionrouter!" as hostname. This function * increments n_gethostname_replacement by one every time * it is called. */ static int tor_gethostname_replacement(char *name, size_t namelen) { n_gethostname_replacement++; if (name && namelen) { strlcpy(name,"onionrouter!",namelen); } return 0; } static int n_gethostname_localhost = 0; /** This mock function is meant to replace tor_gethostname(). It * responds with string "127.0.0.1" as hostname. This function * increments n_gethostname_localhost by one every time * it is called. */ static int tor_gethostname_localhost(char *name, size_t namelen) { n_gethostname_localhost++; if (name && namelen) { strlcpy(name,"127.0.0.1",namelen); } return 0; } static int n_gethostname_failure = 0; /** This mock function is meant to replace tor_gethostname. * It pretends to fail by returning -1. This function increments * n_gethostname_failure by one every time it is called. */ static int tor_gethostname_failure(char *name, size_t namelen) { (void)name; (void)namelen; n_gethostname_failure++; return -1; } static int n_get_interface_address6 = 0; static sa_family_t last_address6_family; static const char *ret_get_interface_address6_08080808[2] = { "8.8.8.8", "0808::0808", }; /** This mock function is meant to replace get_interface_address(). * It answers with address 8.8.8.8. This function increments * n_get_interface_address by one every time it is called. */ static int get_interface_address6_08080808(int severity, sa_family_t family, tor_addr_t *addr) { (void)severity; n_get_interface_address6++; if (family == AF_INET) { if (addr) { int ret = tor_addr_parse(addr, ret_get_interface_address6_08080808[0]); tt_int_op(ret, OP_EQ, AF_INET); } } else if (family == AF_INET6) { if (addr) { int ret = tor_addr_parse(addr, ret_get_interface_address6_08080808[1]); tt_int_op(ret, OP_EQ, AF_INET6); } } done: return 0; } /** This mock function is meant to replace get_interface_address6(). * It answers with IP address 9.9.9.9 iff both of the following are true: * - family is AF_INET * - addr pointer is not NULL. * This function increments n_get_interface_address6 by one every * time it is called. */ #if 0 static int get_interface_address6_replacement(int severity, sa_family_t family, tor_addr_t *addr) { (void)severity; last_address6_family = family; n_get_interface_address6++; if ((family != AF_INET) || !addr) { return -1; } tor_addr_from_ipv4h(addr,0x09090909); return 0; } #endif static int n_get_interface_address6_failure = 0; /** * This mock function is meant to replace get_interface_addres6(). * It will pretend to fail by return -1. * n_get_interface_address6_failure is incremented by one * every time this function is called and last_address6_family * is assigned the value of family argument. */ static int get_interface_address6_failure(int severity, sa_family_t family, tor_addr_t *addr) { (void)severity; (void)addr; n_get_interface_address6_failure++; last_address6_family = family; return -1; } /** Helper macro: to validate the returned value from find_my_address() so we * don't copy those all the time. */ #undef VALIDATE_FOUND_ADDRESS #define VALIDATE_FOUND_ADDRESS(ret, method, hostname) \ do { \ tt_int_op(retval, OP_EQ, ret); \ if (method == NULL) tt_assert(!method_used); \ else tt_str_op(method_used, OP_EQ, method); \ if (hostname == NULL) tt_assert(!hostname_out); \ else tt_str_op(hostname_out, OP_EQ, hostname); \ if (ret == true) { \ tt_assert(tor_addr_eq(&resolved_addr, &test_addr)); \ } \ } while (0) /** Helper macro: Cleanup the address and variables used after a * find_my_address() call. */ #undef CLEANUP_FOUND_ADDRESS #define CLEANUP_FOUND_ADDRESS \ do { \ config_free_lines(options->Address); \ tor_free(options->DirAuthorities); \ tor_free(hostname_out); \ tor_addr_make_unspec(&resolved_addr); \ tor_addr_make_unspec(&test_addr); \ } while (0) /** Test both IPv4 and IPv6 coexisting together in the configuration. */ static void test_config_find_my_address_mixed(void *arg) { or_options_t *options; tor_addr_t resolved_addr, test_addr; const char *method_used; char *hostname_out = NULL; bool retval; (void)arg; options = options_new(); options_init(options); /* * CASE 1: Only IPv6 address. Accepted. */ config_line_append(&options->Address, "Address", "2a01:4f8:fff0:4f:266:37ff:fe2c:5d19"); tor_addr_parse(&test_addr, "2a01:4f8:fff0:4f:266:37ff:fe2c:5d19"); /* IPv4 address not guessed since one Address statement exists. */ retval = find_my_address(options, AF_INET, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); /* IPv6 address should be found and considered configured. */ retval = find_my_address(options, AF_INET6, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "CONFIGURED", NULL); CLEANUP_FOUND_ADDRESS; /* * Case 2: IPv4 _and_ IPv6 given. Accepted. */ config_line_append(&options->Address, "Address", "2a01:4f8:fff0:4f:266:37ff:fe2c:5d19"); config_line_append(&options->Address, "Address", "1.1.1.1"); tor_addr_parse(&test_addr, "1.1.1.1"); /* IPv4 address should be found and considered configured. */ retval = find_my_address(options, AF_INET, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "CONFIGURED", NULL); /* IPv6 address should be found and considered configured. */ tor_addr_parse(&test_addr, "2a01:4f8:fff0:4f:266:37ff:fe2c:5d19"); retval = find_my_address(options, AF_INET6, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "CONFIGURED", NULL); CLEANUP_FOUND_ADDRESS; /* * Case 3: Two hostnames, IPv4 and IPv6. */ config_line_append(&options->Address, "Address", "www.torproject.org.v4"); config_line_append(&options->Address, "Address", "www.torproject.org.v6"); /* Looks at specific hostname to learn which address family to use. */ MOCK(tor_addr_lookup, tor_addr_lookup_mixed); /* IPv4 address should be found and considered resolved. */ tor_addr_parse(&test_addr, "1.1.1.1"); retval = find_my_address(options, AF_INET, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "RESOLVED", "www.torproject.org.v4"); /* IPv6 address should be found and considered resolved. */ tor_addr_parse(&test_addr, "0101::0101"); retval = find_my_address(options, AF_INET6, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "RESOLVED", "www.torproject.org.v6"); CLEANUP_FOUND_ADDRESS; UNMOCK(tor_addr_lookup); /* * Case 4: IPv4 address and a hostname resolving to IPV6. */ config_line_append(&options->Address, "Address", "1.1.1.1"); config_line_append(&options->Address, "Address", "www.torproject.org.v6"); /* Looks at specific hostname to learn which address family to use. */ MOCK(tor_addr_lookup, tor_addr_lookup_mixed); /* IPv4 address should be found and configured. */ tor_addr_parse(&test_addr, "1.1.1.1"); retval = find_my_address(options, AF_INET, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "CONFIGURED", NULL); /* IPv6 address should be found and considered resolved. */ tor_addr_parse(&test_addr, "0101::0101"); retval = find_my_address(options, AF_INET6, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "RESOLVED", "www.torproject.org.v6"); CLEANUP_FOUND_ADDRESS; UNMOCK(tor_addr_lookup); /* * Case 5: Hostname resolving to IPv4 and an IPv6 address. */ config_line_append(&options->Address, "Address", "0101::0101"); config_line_append(&options->Address, "Address", "www.torproject.org.v4"); /* Looks at specific hostname to learn which address family to use. */ MOCK(tor_addr_lookup, tor_addr_lookup_mixed); /* IPv4 address should be found and resolved. */ tor_addr_parse(&test_addr, "1.1.1.1"); retval = find_my_address(options, AF_INET, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "RESOLVED", "www.torproject.org.v4"); /* IPv6 address should be found and considered resolved. */ tor_addr_parse(&test_addr, "0101::0101"); retval = find_my_address(options, AF_INET6, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "CONFIGURED", NULL); CLEANUP_FOUND_ADDRESS; UNMOCK(tor_addr_lookup); done: config_free_lines(options->Address); or_options_free(options); tor_free(hostname_out); UNMOCK(tor_addr_lookup); } /** Parameters for the find_my_address() test. We test both AF_INET and * AF_INET6 but we have one interface to do so thus we run the same exact unit * tests for both without copying them. */ typedef struct find_my_address_params_t { /* Index where the mock function results are located. For intance, * tor_addr_lookup_01010101() will have its returned value depending on the * family in ret_addr_lookup_01010101[]. * * Values that can be found: * AF_INET : index 0. * AF_INET6: index 1. */ int idx; int family; const char *public_ip; const char *internal_ip; } find_my_address_params_t; static find_my_address_params_t addr_param_v4 = { .idx = 0, .family = AF_INET, .public_ip = "128.52.128.105", .internal_ip = "127.0.0.1", }; static find_my_address_params_t addr_param_v6 = { .idx = 1, .family = AF_INET6, .public_ip = "4242::4242", .internal_ip = "::1", }; static void test_config_find_my_address(void *arg) { or_options_t *options; tor_addr_t resolved_addr, test_addr; const char *method_used; char *hostname_out = NULL; bool retval; int prev_n_hostname_01010101; int prev_n_hostname_failure; int prev_n_hostname_localhost; int prev_n_gethostname_replacement; int prev_n_gethostname_failure; int prev_n_gethostname_localhost; int prev_n_get_interface_address6; int prev_n_get_interface_address6_failure; const find_my_address_params_t *p = arg; options = options_new(); options_init(options); /* * Case 1: * 1. Address is a valid address. * * Expected to succeed. */ config_line_append(&options->Address, "Address", p->public_ip); tor_addr_parse(&test_addr, p->public_ip); retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "CONFIGURED", NULL); CLEANUP_FOUND_ADDRESS; /* * Case 2: Address is a resolvable address. Expected to succeed. */ MOCK(tor_addr_lookup, tor_addr_lookup_01010101); config_line_append(&options->Address, "Address", "www.torproject.org"); tor_addr_parse(&test_addr, ret_addr_lookup_01010101[p->idx]); prev_n_hostname_01010101 = n_hostname_01010101; retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); tt_int_op(n_hostname_01010101, OP_EQ, ++prev_n_hostname_01010101); VALIDATE_FOUND_ADDRESS(true, "RESOLVED", "www.torproject.org"); CLEANUP_FOUND_ADDRESS; UNMOCK(tor_addr_lookup); /* * Case 3: Address is a local addressi (internal). Expected to fail. */ config_line_append(&options->Address, "Address", p->internal_ip); setup_full_capture_of_logs(LOG_NOTICE); retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); expect_log_msg_containing("is a private IP address. Tor relays that " "use the default DirAuthorities must have " "public IP addresses."); teardown_capture_of_logs(); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); CLEANUP_FOUND_ADDRESS; /* * Case 4: Address is a local address but custom authorities. Expected to * succeed. */ config_line_append(&options->Address, "Address", p->internal_ip); options->DirAuthorities = tor_malloc_zero(sizeof(config_line_t)); tor_addr_parse(&test_addr, p->internal_ip); retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); VALIDATE_FOUND_ADDRESS(true, "CONFIGURED", NULL); CLEANUP_FOUND_ADDRESS; /* * Case 5: Multiple address in Address. Expected to fail. */ config_line_append(&options->Address, "Address", p->public_ip); config_line_append(&options->Address, "Address", p->public_ip); setup_full_capture_of_logs(LOG_NOTICE); retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); expect_log_msg_containing("Found 2 Address statement of address family"); teardown_capture_of_logs(); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); CLEANUP_FOUND_ADDRESS; /* * Case 6: Another address family is configured. Expected to fail. */ if (p->family == AF_INET) { config_line_append(&options->Address, "Address", "4242::4242"); } else { config_line_append(&options->Address, "Address", "1.1.1.1"); } setup_full_capture_of_logs(LOG_NOTICE); retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); expect_log_msg_containing("No Address option found for family"); teardown_capture_of_logs(); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); CLEANUP_FOUND_ADDRESS; /* * Case 7: Address is a non resolvable hostname. Expected to fail. */ MOCK(tor_addr_lookup, tor_addr_lookup_failure); config_line_append(&options->Address, "Address", "www.torproject.org"); prev_n_hostname_failure = n_hostname_failure; setup_full_capture_of_logs(LOG_NOTICE); retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); expect_log_msg_containing("Could not resolve local Address " "'www.torproject.org'. Failing."); teardown_capture_of_logs(); tt_int_op(n_hostname_failure, OP_EQ, ++prev_n_hostname_failure); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); CLEANUP_FOUND_ADDRESS; UNMOCK(tor_addr_lookup); /* * Case 8: * 1. Address is NULL * 2. Interface address is a valid address. * * Expected to succeed. */ options->Address = NULL; tor_addr_parse(&test_addr, ret_get_interface_address6_08080808[p->idx]); MOCK(get_interface_address6, get_interface_address6_08080808); prev_n_get_interface_address6 = n_get_interface_address6; retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); tt_int_op(n_get_interface_address6, OP_EQ, ++prev_n_get_interface_address6); VALIDATE_FOUND_ADDRESS(true, "INTERFACE", NULL); CLEANUP_FOUND_ADDRESS; UNMOCK(get_interface_address6); /* * Case 9: * 1. Address is NULL * 2. Interface address fails to be found. * 3. Local hostname resolves to a valid address. * * Expected to succeed. */ options->Address = NULL; tor_addr_parse(&test_addr, ret_addr_lookup_01010101[p->idx]); MOCK(get_interface_address6, get_interface_address6_failure); MOCK(tor_gethostname, tor_gethostname_replacement); MOCK(tor_addr_lookup, tor_addr_lookup_01010101); prev_n_get_interface_address6_failure = n_get_interface_address6_failure; prev_n_hostname_01010101 = n_hostname_01010101; prev_n_gethostname_replacement = n_gethostname_replacement; retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); tt_int_op(n_get_interface_address6_failure, OP_EQ, ++prev_n_get_interface_address6_failure); tt_int_op(n_hostname_01010101, OP_EQ, ++prev_n_hostname_01010101); tt_int_op(n_gethostname_replacement, OP_EQ, ++prev_n_gethostname_replacement); VALIDATE_FOUND_ADDRESS(true, "GETHOSTNAME", "onionrouter!"); CLEANUP_FOUND_ADDRESS; UNMOCK(get_interface_address6); UNMOCK(tor_gethostname); UNMOCK(tor_addr_lookup); /* * Case 10: * 1. Address is NULL * 2. Interface address fails to be found. * 3. Local hostname resolves to an internal address. * * Expected to fail. */ options->Address = NULL; MOCK(get_interface_address6, get_interface_address6_failure); MOCK(tor_gethostname, tor_gethostname_localhost); MOCK(tor_addr_lookup, tor_addr_lookup_localhost); prev_n_get_interface_address6_failure = n_get_interface_address6_failure; prev_n_hostname_localhost = n_hostname_localhost; prev_n_gethostname_localhost = n_gethostname_localhost; retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); tt_int_op(n_get_interface_address6_failure, OP_EQ, ++prev_n_get_interface_address6_failure); tt_int_op(n_hostname_localhost, OP_EQ, ++prev_n_hostname_localhost); tt_int_op(n_gethostname_localhost, OP_EQ, ++prev_n_gethostname_localhost); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); CLEANUP_FOUND_ADDRESS; UNMOCK(get_interface_address6); UNMOCK(tor_gethostname); UNMOCK(tor_addr_lookup); /* * Case 11: * 1. Address is NULL * 2. Interface address fails to be found. * 3. Local hostname fails to be found. * * Expected to fail. */ options->Address = NULL; MOCK(get_interface_address6, get_interface_address6_failure); MOCK(tor_gethostname, tor_gethostname_failure); prev_n_get_interface_address6_failure = n_get_interface_address6_failure; prev_n_gethostname_failure = n_gethostname_failure; retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); tt_int_op(n_get_interface_address6_failure, OP_EQ, ++prev_n_get_interface_address6_failure); tt_int_op(n_gethostname_failure, OP_EQ, ++prev_n_gethostname_failure); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); CLEANUP_FOUND_ADDRESS; UNMOCK(get_interface_address6); UNMOCK(tor_gethostname); /* * Case 12: * 1. Address is NULL * 2. Interface address fails to be found. * 3. Local hostname can't be resolved. * * Expected to fail. */ options->Address = NULL; MOCK(get_interface_address6, get_interface_address6_failure); MOCK(tor_gethostname, tor_gethostname_replacement); MOCK(tor_addr_lookup, tor_addr_lookup_failure); prev_n_get_interface_address6_failure = n_get_interface_address6_failure; prev_n_gethostname_replacement = n_gethostname_replacement; prev_n_hostname_failure = n_hostname_failure; retval = find_my_address(options, p->family, LOG_NOTICE, &resolved_addr, &method_used, &hostname_out); tt_int_op(n_get_interface_address6_failure, OP_EQ, ++prev_n_get_interface_address6_failure); tt_int_op(n_gethostname_replacement, OP_EQ, ++prev_n_gethostname_replacement); tt_int_op(n_hostname_failure, OP_EQ, ++prev_n_hostname_failure); VALIDATE_FOUND_ADDRESS(false, NULL, NULL); CLEANUP_FOUND_ADDRESS; UNMOCK(get_interface_address6); UNMOCK(tor_gethostname); UNMOCK(tor_addr_lookup); done: or_options_free(options); UNMOCK(tor_gethostname); UNMOCK(tor_addr_lookup); UNMOCK(get_interface_address6); } static void test_config_adding_trusted_dir_server(void *arg) { (void)arg; const char digest[DIGEST_LEN] = ""; dir_server_t *ds = NULL; tor_addr_port_t ipv6; int rv = -1; clear_dir_servers(); routerlist_free_all(); /* create a trusted ds without an IPv6 address and port */ ds = trusted_dir_server_new("ds", "127.0.0.1", 9059, 9060, NULL, digest, NULL, V3_DIRINFO, 1.0); tt_assert(ds); dir_server_add(ds); tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 1); tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 1); /* create a trusted ds with an IPv6 address and port */ rv = tor_addr_port_parse(LOG_WARN, "[::1]:9061", &ipv6.addr, &ipv6.port, -1); tt_int_op(rv, OP_EQ, 0); ds = trusted_dir_server_new("ds", "127.0.0.1", 9059, 9060, &ipv6, digest, NULL, V3_DIRINFO, 1.0); tt_assert(ds); dir_server_add(ds); tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 2); tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 2); done: clear_dir_servers(); routerlist_free_all(); } static void test_config_adding_fallback_dir_server(void *arg) { (void)arg; const char digest[DIGEST_LEN] = ""; dir_server_t *ds = NULL; tor_addr_t ipv4; tor_addr_port_t ipv6; int rv = -1; clear_dir_servers(); routerlist_free_all(); rv = tor_addr_parse(&ipv4, "127.0.0.1"); tt_int_op(rv, OP_EQ, AF_INET); /* create a trusted ds without an IPv6 address and port */ ds = fallback_dir_server_new(&ipv4, 9059, 9060, NULL, digest, 1.0); tt_assert(ds); dir_server_add(ds); tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 1); /* create a trusted ds with an IPv6 address and port */ rv = tor_addr_port_parse(LOG_WARN, "[::1]:9061", &ipv6.addr, &ipv6.port, -1); tt_int_op(rv, OP_EQ, 0); ds = fallback_dir_server_new(&ipv4, 9059, 9060, &ipv6, digest, 1.0); tt_assert(ds); dir_server_add(ds); tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 2); done: clear_dir_servers(); routerlist_free_all(); } /* No secrets here: * v3ident is `echo "onion" | shasum | cut -d" " -f1 | tr "a-f" "A-F"` * fingerprint is `echo "unionem" | shasum | cut -d" " -f1 | tr "a-f" "A-F"` * with added spaces */ #define TEST_DIR_AUTH_LINE_START \ "foobar orport=12345 " \ "v3ident=14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4 " #define TEST_DIR_AUTH_LINE_END \ "1.2.3.4:54321 " \ "FDB2 FBD2 AAA5 25FA 2999 E617 5091 5A32 C777 3B17" #define TEST_DIR_AUTH_IPV6_FLAG \ "ipv6=[feed::beef]:9 " static void test_config_parsing_trusted_dir_server(void *arg) { (void)arg; int rv = -1; /* parse a trusted dir server without an IPv6 address and port */ rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START TEST_DIR_AUTH_LINE_END, V3_DIRINFO, 1); tt_int_op(rv, OP_EQ, 0); /* parse a trusted dir server with an IPv6 address and port */ rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START TEST_DIR_AUTH_IPV6_FLAG TEST_DIR_AUTH_LINE_END, V3_DIRINFO, 1); tt_int_op(rv, OP_EQ, 0); /* Since we are only validating, there is no cleanup. */ done: ; } #undef TEST_DIR_AUTH_LINE_START #undef TEST_DIR_AUTH_LINE_END #undef TEST_DIR_AUTH_IPV6_FLAG #define TEST_DIR_AUTH_LINE_START \ "foobar orport=12345 " \ "v3ident=14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4 " #define TEST_DIR_AUTH_LINE_END_BAD_IP \ "0.256.3.4:54321 " \ "FDB2 FBD2 AAA5 25FA 2999 E617 5091 5A32 C777 3B17" #define TEST_DIR_AUTH_LINE_END_WITH_DNS_ADDR \ "torproject.org:54321 " \ "FDB2 FBD2 AAA5 25FA 2999 E617 5091 5A32 C777 3B17" static void test_config_parsing_invalid_dir_address(void *arg) { (void)arg; int rv; rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START TEST_DIR_AUTH_LINE_END_BAD_IP, V3_DIRINFO, 1); tt_int_op(rv, OP_EQ, -1); rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START TEST_DIR_AUTH_LINE_END_WITH_DNS_ADDR, V3_DIRINFO, 1); tt_int_op(rv, OP_EQ, -1); done: return; } #undef TEST_DIR_AUTH_LINE_START #undef TEST_DIR_AUTH_LINE_END_BAD_IP #undef TEST_DIR_AUTH_LINE_END_WITH_DNS_ADDR /* No secrets here: * id is `echo "syn-propanethial-S-oxide" | shasum | cut -d" " -f1` */ #define TEST_DIR_FALLBACK_LINE \ "1.2.3.4:54321 orport=12345 " \ "id=50e643986f31ea1235bcc1af17a1c5c5cfc0ee54 " #define TEST_DIR_FALLBACK_IPV6_FLAG \ "ipv6=[2015:c0de::deed]:9" static void test_config_parsing_fallback_dir_server(void *arg) { (void)arg; int rv = -1; /* parse a trusted dir server without an IPv6 address and port */ rv = parse_dir_fallback_line(TEST_DIR_FALLBACK_LINE, 1); tt_int_op(rv, OP_EQ, 0); /* parse a trusted dir server with an IPv6 address and port */ rv = parse_dir_fallback_line(TEST_DIR_FALLBACK_LINE TEST_DIR_FALLBACK_IPV6_FLAG, 1); tt_int_op(rv, OP_EQ, 0); /* Since we are only validating, there is no cleanup. */ done: ; } #undef TEST_DIR_FALLBACK_LINE #undef TEST_DIR_FALLBACK_IPV6_FLAG static void test_config_adding_default_trusted_dir_servers(void *arg) { (void)arg; clear_dir_servers(); routerlist_free_all(); /* Assume we only have one bridge authority */ add_default_trusted_dir_authorities(BRIDGE_DIRINFO); tt_int_op(get_n_authorities(BRIDGE_DIRINFO), OP_EQ, 1); tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 1); /* Assume we have eight V3 authorities */ add_default_trusted_dir_authorities(V3_DIRINFO); tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 9); tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 10); done: clear_dir_servers(); routerlist_free_all(); } static int n_add_default_fallback_dir_servers_known_default = 0; /** * This mock function is meant to replace add_default_fallback_dir_servers(). * It will parse and add one known default fallback dir server, * which has a dir_port of 99. * n_add_default_fallback_dir_servers_known_default is incremented by * one every time this function is called. */ static void add_default_fallback_dir_servers_known_default(void) { int i; const char *fallback[] = { "127.0.0.1:60099 orport=9009 " "id=0923456789012345678901234567890123456789", NULL }; for (i=0; fallback[i]; i++) { if (parse_dir_fallback_line(fallback[i], 0)<0) { log_err(LD_BUG, "Couldn't parse internal FallbackDir line %s", fallback[i]); } } n_add_default_fallback_dir_servers_known_default++; } /* Helper for test_config_adding_dir_servers(), which should be * refactored: clear the fields in the options which the options object * does not really own. */ static void ads_clear_helper(or_options_t *options) { options->DirAuthorities = NULL; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = NULL; options->FallbackDir = NULL; } /* Test all the different combinations of adding dir servers */ static void test_config_adding_dir_servers(void *arg) { (void)arg; /* allocate options */ or_options_t *options = options_new(); /* Allocate and populate configuration lines: * * Use the same format as the hard-coded directories in * add_default_trusted_dir_authorities(). * Zeroing the structure has the same effect as initialising to: * { NULL, NULL, NULL, CONFIG_LINE_NORMAL, 0}; */ config_line_t *test_dir_authority = tor_malloc_zero(sizeof(config_line_t)); test_dir_authority->key = tor_strdup("DirAuthority"); test_dir_authority->value = tor_strdup( "D0 orport=9000 " "v3ident=0023456789012345678901234567890123456789 " "127.0.0.1:60090 0123 4567 8901 2345 6789 0123 4567 8901 2345 6789" ); config_line_t *test_alt_bridge_authority = tor_malloc_zero( sizeof(config_line_t)); test_alt_bridge_authority->key = tor_strdup("AlternateBridgeAuthority"); test_alt_bridge_authority->value = tor_strdup( "B1 orport=9001 bridge " "127.0.0.1:60091 1123 4567 8901 2345 6789 0123 4567 8901 2345 6789" ); config_line_t *test_alt_dir_authority = tor_malloc_zero( sizeof(config_line_t)); test_alt_dir_authority->key = tor_strdup("AlternateDirAuthority"); test_alt_dir_authority->value = tor_strdup( "A2 orport=9002 " "v3ident=0223456789012345678901234567890123456789 " "127.0.0.1:60092 2123 4567 8901 2345 6789 0123 4567 8901 2345 6789" ); /* Use the format specified in the manual page */ config_line_t *test_fallback_directory = tor_malloc_zero( sizeof(config_line_t)); test_fallback_directory->key = tor_strdup("FallbackDir"); test_fallback_directory->value = tor_strdup( "127.0.0.1:60093 orport=9003 id=0323456789012345678901234567890123456789" ); /* We need to know if add_default_fallback_dir_servers is called, * whatever the size of the list in fallback_dirs.inc, * so we use a version of add_default_fallback_dir_servers that adds * one known default fallback directory. */ MOCK(add_default_fallback_dir_servers, add_default_fallback_dir_servers_known_default); /* There are 16 different cases, covering each combination of set/NULL for: * DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority & * FallbackDir. (We always set UseDefaultFallbackDirs to 1.) * But validate_dir_servers() ensures that: * "You cannot set both DirAuthority and Alternate*Authority." * This reduces the number of cases to 10. * * Let's count these cases using binary, with 1 meaning set & 0 meaning NULL * So 1001 or case 9 is: * DirAuthorities set, * AlternateBridgeAuthority NULL, * AlternateDirAuthority NULL * FallbackDir set * The valid cases are cases 0-9 counting using this method, as every case * greater than or equal to 10 = 1010 is invalid. * * 1. Outcome: Use Set Directory Authorities * - No Default Authorities * - Use AlternateBridgeAuthority, AlternateDirAuthority, and FallbackDir * if they are set * Cases expected to yield this outcome: * 8 & 9 (the 2 valid cases where DirAuthorities is set) * 6 & 7 (the 2 cases where DirAuthorities is NULL, and * AlternateBridgeAuthority and AlternateDirAuthority are both set) * * 2. Outcome: Use Set Bridge Authority * - Use Default Non-Bridge Directory Authorities * - Use FallbackDir if it is set, otherwise use default FallbackDir * Cases expected to yield this outcome: * 4 & 5 (the 2 cases where DirAuthorities is NULL, * AlternateBridgeAuthority is set, and * AlternateDirAuthority is NULL) * * 3. Outcome: Use Set Alternate Directory Authority * - Use Default Bridge Authorities * - Use FallbackDir if it is set, otherwise No Default Fallback Directories * Cases expected to yield this outcome: * 2 & 3 (the 2 cases where DirAuthorities and AlternateBridgeAuthority * are both NULL, but AlternateDirAuthority is set) * * 4. Outcome: Use Set Custom Fallback Directory * - Use Default Bridge & Directory Authorities * Cases expected to yield this outcome: * 1 (DirAuthorities, AlternateBridgeAuthority and AlternateDirAuthority * are all NULL, but FallbackDir is set) * * 5. Outcome: Use All Defaults * - Use Default Bridge & Directory Authorities, and * Default Fallback Directories * Cases expected to yield this outcome: * 0 (DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority * and FallbackDir are all NULL) */ /* * Find out how many default Bridge, Non-Bridge and Fallback Directories * are hard-coded into this build. * This code makes some assumptions about the implementation. * If they are wrong, one or more of cases 0-5 could fail. */ int n_default_alt_bridge_authority = 0; int n_default_alt_dir_authority = 0; int n_default_fallback_dir = 0; #define n_default_authorities ((n_default_alt_bridge_authority) \ + (n_default_alt_dir_authority)) /* Pre-Count Number of Authorities of Each Type * Use 0000: No Directory Authorities or Fallback Directories Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0000 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = NULL; options->FallbackDir = NULL; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 1); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* Count Bridge Authorities */ SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if it's a bridge auth */ n_default_alt_bridge_authority += ((ds->is_authority && (ds->type & BRIDGE_DIRINFO)) ? 1 : 0) ); /* If we have no default bridge authority, something has gone wrong */ tt_int_op(n_default_alt_bridge_authority, OP_GE, 1); /* Count v3 Authorities */ SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment found counter if it's a v3 auth */ n_default_alt_dir_authority += ((ds->is_authority && (ds->type & V3_DIRINFO)) ? 1 : 0) ); /* If we have no default authorities, something has gone really wrong */ tt_int_op(n_default_alt_dir_authority, OP_GE, 1); /* Calculate Fallback Directory Count */ n_default_fallback_dir = (smartlist_len(fallback_servers) - n_default_alt_bridge_authority - n_default_alt_dir_authority); /* If we have a negative count, something has gone really wrong, * or some authorities aren't being added as fallback directories. * (networkstatus_consensus_can_use_extra_fallbacks depends on all * authorities being fallback directories.) */ tt_int_op(n_default_fallback_dir, OP_GE, 0); } } /* * 1. Outcome: Use Set Directory Authorities * - No Default Authorities * - Use AlternateBridgeAuthority, AlternateDirAuthority, and FallbackDir * if they are set * Cases expected to yield this outcome: * 8 & 9 (the 2 valid cases where DirAuthorities is set) * 6 & 7 (the 2 cases where DirAuthorities is NULL, and * AlternateBridgeAuthority and AlternateDirAuthority are both set) */ /* Case 9: 1001 - DirAuthorities Set, AlternateBridgeAuthority Not Set, AlternateDirAuthority Not Set, FallbackDir Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 1001 */ options->DirAuthorities = test_dir_authority; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = NULL; options->FallbackDir = test_fallback_directory; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* D0, (No B1), (No A2) */ tt_int_op(smartlist_len(dir_servers), OP_EQ, 1); /* DirAuthority - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 1); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* D0, (No B1), (No A2), Custom Fallback */ tt_int_op(smartlist_len(fallback_servers), OP_EQ, 2); /* DirAuthority - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 1); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* Custom FallbackDir - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 1); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); } } /* Case 8: 1000 - DirAuthorities Set, Others Not Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 1000 */ options->DirAuthorities = test_dir_authority; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = NULL; options->FallbackDir = NULL; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we just have the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* D0, (No B1), (No A2) */ tt_int_op(smartlist_len(dir_servers), OP_EQ, 1); /* DirAuthority - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 1); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* D0, (No B1), (No A2), (No Fallback) */ tt_int_op(smartlist_len(fallback_servers), OP_EQ, 1); /* DirAuthority - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 1); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 0); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); } } /* Case 7: 0111 - DirAuthorities Not Set, Others Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0111 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = test_alt_bridge_authority; options->AlternateDirAuthority = test_alt_dir_authority; options->FallbackDir = test_fallback_directory; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), B1, A2 */ tt_int_op(smartlist_len(dir_servers), OP_EQ, 2); /* (No DirAuthority) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), B1, A2, Custom Fallback */ tt_int_op(smartlist_len(fallback_servers), OP_EQ, 3); /* (No DirAuthority) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); /* Custom FallbackDir - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 1); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); } } /* Case 6: 0110 - DirAuthorities Not Set, AlternateBridgeAuthority & AlternateDirAuthority Set, FallbackDir Not Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0110 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = test_alt_bridge_authority; options->AlternateDirAuthority = test_alt_dir_authority; options->FallbackDir = NULL; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), B1, A2 */ tt_int_op(smartlist_len(dir_servers), OP_EQ, 2); /* (No DirAuthority) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), B1, A2, (No Fallback) */ tt_int_op(smartlist_len(fallback_servers), OP_EQ, 2); /* (No DirAuthority) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 0); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); } } /* 2. Outcome: Use Set Bridge Authority - Use Default Non-Bridge Directory Authorities - Use FallbackDir if it is set, otherwise use default FallbackDir Cases expected to yield this outcome: 4 & 5 (the 2 cases where DirAuthorities is NULL, AlternateBridgeAuthority is set, and AlternateDirAuthority is NULL) */ /* Case 5: 0101 - DirAuthorities Not Set, AlternateBridgeAuthority Set, AlternateDirAuthority Not Set, FallbackDir Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0101 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = test_alt_bridge_authority; options->AlternateDirAuthority = NULL; options->FallbackDir = test_fallback_directory; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities */ tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_dir_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default v3 non-Bridge directory authorities, so let's assume that * if the total count above is correct, we have the right ones. */ } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities, * Custom Fallback */ tt_assert(smartlist_len(fallback_servers) == 2 + n_default_alt_dir_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* Custom FallbackDir - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 1); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default v3 non-Bridge directory authorities, so let's assume that * if the total count above is correct, we have the right ones. */ } } /* Case 4: 0100 - DirAuthorities Not Set, AlternateBridgeAuthority Set, AlternateDirAuthority & FallbackDir Not Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0100 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = test_alt_bridge_authority; options->AlternateDirAuthority = NULL; options->FallbackDir = NULL; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 1); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities */ tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_dir_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default v3 non-Bridge directory authorities, so let's assume that * if the total count above is correct, we have the right ones. */ } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities, * Default Fallback */ tt_assert(smartlist_len(fallback_servers) == 2 + n_default_alt_dir_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* AlternateBridgeAuthority - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 1); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 0); /* Default FallbackDir - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 1); /* There's no easy way of checking that we have included all the * default v3 non-Bridge directory authorities, so let's assume that * if the total count above is correct, we have the right ones. */ } } /* 3. Outcome: Use Set Alternate Directory Authority - Use Default Bridge Authorities - Use FallbackDir if it is set, otherwise No Default Fallback Directories Cases expected to yield this outcome: 2 & 3 (the 2 cases where DirAuthorities and AlternateBridgeAuthority are both NULL, but AlternateDirAuthority is set) */ /* Case 3: 0011 - DirAuthorities & AlternateBridgeAuthority Not Set, AlternateDirAuthority & FallbackDir Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0011 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = test_alt_dir_authority; options->FallbackDir = test_fallback_directory; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, A2 */ tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_bridge_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); /* There's no easy way of checking that we have included all the * default Bridge authorities (except for hard-coding tonga's details), * so let's assume that if the total count above is correct, * we have the right ones. */ } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, A2, * Custom Fallback Directory, (No Default Fallback Directories) */ tt_assert(smartlist_len(fallback_servers) == 2 + n_default_alt_bridge_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); /* Custom FallbackDir - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 1); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default Bridge authorities (except for hard-coding tonga's details), * so let's assume that if the total count above is correct, * we have the right ones. */ } } /* Case 2: 0010 - DirAuthorities & AlternateBridgeAuthority Not Set, AlternateDirAuthority Set, FallbackDir Not Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0010 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = test_alt_dir_authority; options->FallbackDir = NULL; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we just have the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, A2, * No Default or Custom Fallback Directories */ tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_bridge_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); /* There's no easy way of checking that we have included all the * default Bridge authorities (except for hard-coding tonga's details), * so let's assume that if the total count above is correct, * we have the right ones. */ } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, A2, * No Custom or Default Fallback Directories */ tt_assert(smartlist_len(fallback_servers) == 1 + n_default_alt_bridge_authority); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* AlternateDirAuthority - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 1); /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 0); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default Bridge authorities (except for hard-coding tonga's details), * so let's assume that if the total count above is correct, * we have the right ones. */ } } /* 4. Outcome: Use Set Custom Fallback Directory - Use Default Bridge & Directory Authorities Cases expected to yield this outcome: 1 (DirAuthorities, AlternateBridgeAuthority and AlternateDirAuthority are all NULL, but FallbackDir is set) */ /* Case 1: 0001 - DirAuthorities, AlternateBridgeAuthority & AlternateDirAuthority Not Set, FallbackDir Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0001 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = NULL; options->FallbackDir = test_fallback_directory; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must not have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, * (No A2), Default v3 Directory Authorities */ tt_assert(smartlist_len(dir_servers) == n_default_authorities); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default Bridge & V3 Directory authorities, so let's assume that * if the total count above is correct, we have the right ones. */ } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, * (No A2), Default v3 Directory Authorities, * Custom Fallback Directory, (No Default Fallback Directories) */ tt_assert(smartlist_len(fallback_servers) == 1 + n_default_authorities); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* Custom FallbackDir - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 1); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default Bridge & V3 Directory authorities, so let's assume that * if the total count above is correct, we have the right ones. */ } } /* 5. Outcome: Use All Defaults - Use Default Bridge & Directory Authorities, Default Fallback Directories Cases expected to yield this outcome: 0 (DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority and FallbackDir are all NULL) */ /* Case 0: 0000 - All Not Set */ { /* clear fallback dirs counter */ n_add_default_fallback_dir_servers_known_default = 0; /* clear options*/ ads_clear_helper(options); or_options_free(options); options = options_new(); /* clear any previous dir servers: consider_adding_dir_servers() should do this anyway */ clear_dir_servers(); /* assign options: 0001 */ options->DirAuthorities = NULL; options->AlternateBridgeAuthority = NULL; options->AlternateDirAuthority = NULL; options->FallbackDir = NULL; options->UseDefaultFallbackDirs = 1; /* parse options - ensure we always update by passing NULL old_options */ consider_adding_dir_servers(options, NULL); /* check outcome */ /* we must have added the default fallback dirs */ tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 1); /* we have more fallbacks than just the authorities */ tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1); { /* trusted_dir_servers */ const smartlist_t *dir_servers = router_get_trusted_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, * (No A2), Default v3 Directory Authorities */ tt_assert(smartlist_len(dir_servers) == n_default_authorities); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(dir_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* There's no easy way of checking that we have included all the * default Bridge & V3 Directory authorities, so let's assume that * if the total count above is correct, we have the right ones. */ } { /* fallback_dir_servers */ const smartlist_t *fallback_servers = router_get_fallback_dir_servers(); /* (No D0), (No B1), Default Bridge Authorities, * (No A2), Default v3 Directory Authorities, * (No Custom Fallback Directory), Default Fallback Directories */ tt_assert(smartlist_len(fallback_servers) == n_default_authorities + n_default_fallback_dir); /* (No DirAuthorities) - D0 - dir_port: 60090 */ int found_D0 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_D0 += (ds->dir_port == 60090 ? 1 : 0) ); tt_int_op(found_D0, OP_EQ, 0); /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */ int found_B1 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_B1 += (ds->dir_port == 60091 ? 1 : 0) ); tt_int_op(found_B1, OP_EQ, 0); /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */ int found_A2 = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_A2 += (ds->dir_port == 60092 ? 1 : 0) ); tt_int_op(found_A2, OP_EQ, 0); /* Custom FallbackDir - No Nickname - dir_port: 60093 */ int found_non_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_non_default_fallback += (ds->dir_port == 60093 ? 1 : 0) ); tt_int_op(found_non_default_fallback, OP_EQ, 0); /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */ int found_default_fallback = 0; SMARTLIST_FOREACH(fallback_servers, dir_server_t *, ds, /* increment the found counter if dir_port matches */ found_default_fallback += (ds->dir_port == 60099 ? 1 : 0) ); tt_int_op(found_default_fallback, OP_EQ, 1); /* There's no easy way of checking that we have included all the * default Bridge & V3 Directory authorities, and the default * Fallback Directories, so let's assume that if the total count * above is correct, we have the right ones. */ } } done: clear_dir_servers(); tor_free(test_dir_authority->key); tor_free(test_dir_authority->value); tor_free(test_dir_authority); tor_free(test_alt_dir_authority->key); tor_free(test_alt_dir_authority->value); tor_free(test_alt_dir_authority); tor_free(test_alt_bridge_authority->key); tor_free(test_alt_bridge_authority->value); tor_free(test_alt_bridge_authority); tor_free(test_fallback_directory->key); tor_free(test_fallback_directory->value); tor_free(test_fallback_directory); ads_clear_helper(options); or_options_free(options); UNMOCK(add_default_fallback_dir_servers); } static void test_config_default_dir_servers(void *arg) { or_options_t *opts = NULL; (void)arg; int trusted_count = 0; int fallback_count = 0; /* new set of options should stop fallback parsing */ opts = options_new(); opts->UseDefaultFallbackDirs = 0; /* set old_options to NULL to force dir update */ consider_adding_dir_servers(opts, NULL); trusted_count = smartlist_len(router_get_trusted_dir_servers()); fallback_count = smartlist_len(router_get_fallback_dir_servers()); or_options_free(opts); opts = NULL; /* assume a release will never go out with less than 7 authorities */ tt_int_op(trusted_count, OP_GE, 7); /* if we disable the default fallbacks, there must not be any extra */ tt_assert(fallback_count == trusted_count); opts = options_new(); opts->UseDefaultFallbackDirs = 1; consider_adding_dir_servers(opts, opts); trusted_count = smartlist_len(router_get_trusted_dir_servers()); fallback_count = smartlist_len(router_get_fallback_dir_servers()); or_options_free(opts); opts = NULL; /* assume a release will never go out with less than 7 authorities */ tt_int_op(trusted_count, OP_GE, 7); /* XX/teor - allow for default fallbacks to be added without breaking * the unit tests. Set a minimum fallback count once the list is stable. */ tt_assert(fallback_count >= trusted_count); done: or_options_free(opts); } static int mock_router_pick_published_address_result = 0; static int mock_router_pick_published_address(const or_options_t *options, uint32_t *addr, int cache_only) { (void)options; (void)addr; (void)cache_only; return mock_router_pick_published_address_result; } static int mock_router_my_exit_policy_is_reject_star_result = 0; static int mock_router_my_exit_policy_is_reject_star(void) { return mock_router_my_exit_policy_is_reject_star_result; } static int mock_advertised_server_mode_result = 0; static int mock_advertised_server_mode(void) { return mock_advertised_server_mode_result; } static routerinfo_t *mock_router_get_my_routerinfo_result = NULL; static const routerinfo_t * mock_router_get_my_routerinfo(void) { return mock_router_get_my_routerinfo_result; } static void test_config_directory_fetch(void *arg) { (void)arg; /* Test Setup */ or_options_t *options = options_new(); routerinfo_t routerinfo; memset(&routerinfo, 0, sizeof(routerinfo)); mock_router_pick_published_address_result = -1; mock_router_my_exit_policy_is_reject_star_result = 1; mock_advertised_server_mode_result = 0; mock_router_get_my_routerinfo_result = NULL; MOCK(router_pick_published_address, mock_router_pick_published_address); MOCK(router_my_exit_policy_is_reject_star, mock_router_my_exit_policy_is_reject_star); MOCK(advertised_server_mode, mock_advertised_server_mode); MOCK(router_get_my_routerinfo, mock_router_get_my_routerinfo); or_options_free(options); options = options_new(); /* Clients can use multiple directory mirrors for bootstrap */ options->ClientOnly = 1; tt_assert(server_mode(options) == 0); tt_assert(public_server_mode(options) == 0); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 1); /* Bridge Clients can use multiple directory mirrors for bootstrap */ or_options_free(options); options = options_new(); options->UseBridges = 1; tt_assert(server_mode(options) == 0); tt_assert(public_server_mode(options) == 0); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 1); /* Bridge Relays (Bridges) must act like clients, and use multiple * directory mirrors for bootstrap */ or_options_free(options); options = options_new(); options->BridgeRelay = 1; options->ORPort_set = 1; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 0); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 1); /* Clients set to FetchDirInfoEarly must fetch it from the authorities, * but can use multiple authorities for bootstrap */ or_options_free(options); options = options_new(); options->FetchDirInfoEarly = 1; tt_assert(server_mode(options) == 0); tt_assert(public_server_mode(options) == 0); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 1); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 1); /* OR servers only fetch the consensus from the authorities when they don't * know their own address, but never use multiple directories for bootstrap */ or_options_free(options); options = options_new(); options->ORPort_set = 1; mock_router_pick_published_address_result = -1; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 1); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); mock_router_pick_published_address_result = 0; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); /* Exit OR servers only fetch the consensus from the authorities when they * refuse unknown exits, but never use multiple directories for bootstrap */ or_options_free(options); options = options_new(); options->ORPort_set = 1; options->ExitRelay = 1; mock_router_pick_published_address_result = 0; mock_router_my_exit_policy_is_reject_star_result = 0; mock_advertised_server_mode_result = 1; mock_router_get_my_routerinfo_result = &routerinfo; routerinfo.supports_tunnelled_dir_requests = 1; options->RefuseUnknownExits = 1; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 1); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); options->RefuseUnknownExits = 0; mock_router_pick_published_address_result = 0; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); /* Dir servers fetch the consensus from the authorities, unless they are not * advertising themselves (hibernating) or have no routerinfo or are not * advertising their dirport, and never use multiple directories for * bootstrap. This only applies if they are also OR servers. * (We don't care much about the behaviour of non-OR directory servers.) */ or_options_free(options); options = options_new(); options->DirPort_set = 1; options->ORPort_set = 1; options->DirCache = 1; mock_router_pick_published_address_result = 0; mock_router_my_exit_policy_is_reject_star_result = 1; mock_advertised_server_mode_result = 1; routerinfo.dir_port = 1; mock_router_get_my_routerinfo_result = &routerinfo; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 1); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); mock_advertised_server_mode_result = 0; routerinfo.dir_port = 1; mock_router_get_my_routerinfo_result = &routerinfo; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); mock_advertised_server_mode_result = 1; mock_router_get_my_routerinfo_result = NULL; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); mock_advertised_server_mode_result = 1; routerinfo.dir_port = 0; routerinfo.supports_tunnelled_dir_requests = 0; mock_router_get_my_routerinfo_result = &routerinfo; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 0); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); mock_advertised_server_mode_result = 1; routerinfo.dir_port = 1; routerinfo.supports_tunnelled_dir_requests = 1; mock_router_get_my_routerinfo_result = &routerinfo; tt_assert(server_mode(options) == 1); tt_assert(public_server_mode(options) == 1); tt_int_op(dirclient_fetches_from_authorities(options), OP_EQ, 1); tt_int_op(networkstatus_consensus_can_use_multiple_directories(options), OP_EQ, 0); done: or_options_free(options); UNMOCK(router_pick_published_address); UNMOCK(router_get_my_routerinfo); UNMOCK(advertised_server_mode); UNMOCK(router_my_exit_policy_is_reject_star); } static void test_config_default_fallback_dirs(void *arg) { const char *fallback[] = { #ifndef COCCI #include "app/config/fallback_dirs.inc" #endif NULL }; int n_included_fallback_dirs = 0; int n_added_fallback_dirs = 0; (void)arg; clear_dir_servers(); while (fallback[n_included_fallback_dirs]) n_included_fallback_dirs++; add_default_fallback_dir_servers(); n_added_fallback_dirs = smartlist_len(router_get_fallback_dir_servers()); tt_assert(n_included_fallback_dirs == n_added_fallback_dirs); done: clear_dir_servers(); } static void test_config_port_cfg_line_extract_addrport(void *arg) { (void)arg; int unixy = 0; const char *rest = NULL; char *a = NULL; tt_int_op(port_cfg_line_extract_addrport("", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, ""); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("hello", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, "hello"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport(" flipperwalt gersplut", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, "flipperwalt"); tt_str_op(rest, OP_EQ, "gersplut"); tor_free(a); tt_int_op(port_cfg_line_extract_addrport(" flipperwalt \t gersplut", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, "flipperwalt"); tt_str_op(rest, OP_EQ, "gersplut"); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("flipperwalt \t gersplut", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, "flipperwalt"); tt_str_op(rest, OP_EQ, "gersplut"); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:flipperwalt \t gersplut", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "flipperwalt"); tt_str_op(rest, OP_EQ, "gersplut"); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("lolol", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, "lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:lolol", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:lolol ", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport(" unix:lolol", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("foobar:lolol", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, "foobar:lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport(":lolol", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 0); tt_str_op(a, OP_EQ, ":lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\"", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\" ", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lolol"); tt_str_op(rest, OP_EQ, ""); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\" foo ", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lolol"); tt_str_op(rest, OP_EQ, "foo "); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:\"lol ol\" foo ", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lol ol"); tt_str_op(rest, OP_EQ, "foo "); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\\" ol\" foo ", &a, &unixy, &rest), OP_EQ, 0); tt_int_op(unixy, OP_EQ, 1); tt_str_op(a, OP_EQ, "lol\" ol"); tt_str_op(rest, OP_EQ, "foo "); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\\" ol foo ", &a, &unixy, &rest), OP_EQ, -1); tor_free(a); tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\0\" ol foo ", &a, &unixy, &rest), OP_EQ, -1); tor_free(a); done: tor_free(a); } static config_line_t * mock_config_line(const char *key, const char *val) { config_line_t *config_line = tor_malloc(sizeof(config_line_t)); memset(config_line, 0, sizeof(config_line_t)); config_line->key = tor_strdup(key); config_line->value = tor_strdup(val); return config_line; } static void test_config_parse_port_config__ports__no_ports_given(void *data) { (void)data; int ret; smartlist_t *slout = NULL; port_cfg_t *port_cfg = NULL; slout = smartlist_new(); // Test no defaultport, no defaultaddress and no out ret = port_parse_config(NULL, NULL, "DNS", 0, NULL, 0, 0); tt_int_op(ret, OP_EQ, 0); // Test with defaultport, no defaultaddress and no out ret = port_parse_config(NULL, NULL, "DNS", 0, NULL, 42, 0); tt_int_op(ret, OP_EQ, 0); // Test no defaultport, with defaultaddress and no out ret = port_parse_config(NULL, NULL, "DNS", 0, "127.0.0.2", 0, 0); tt_int_op(ret, OP_EQ, 0); // Test with defaultport, with defaultaddress and no out ret = port_parse_config(NULL, NULL, "DNS", 0, "127.0.0.2", 42, 0); tt_int_op(ret, OP_EQ, 0); // Test no defaultport, no defaultaddress and with out ret = port_parse_config(slout, NULL, "DNS", 0, NULL, 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 0); // Test with defaultport, no defaultaddress and with out ret = port_parse_config(slout, NULL, "DNS", 0, NULL, 42, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 0); // Test no defaultport, with defaultaddress and with out ret = port_parse_config(slout, NULL, "DNS", 0, "127.0.0.2", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 0); // Test with defaultport, with defaultaddress and out, adds a new port cfg SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); ret = port_parse_config(slout, NULL, "DNS", 0, "127.0.0.2", 42, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->port, OP_EQ, 42); tt_int_op(port_cfg->is_unix_addr, OP_EQ, 0); // Test with defaultport, with defaultaddress and out, adds a new port cfg // for a unix address SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); ret = port_parse_config(slout, NULL, "DNS", 0, "/foo/bar/unixdomain", 42, CL_PORT_IS_UNIXSOCKET); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->port, OP_EQ, 0); tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1); tt_str_op(port_cfg->unix_addr, OP_EQ, "/foo/bar/unixdomain"); done: if (slout) SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_free(slout); } static void test_config_parse_port_config__ports__ports_given(void *data) { (void)data; int ret; smartlist_t *slout = NULL; port_cfg_t *port_cfg = NULL; config_line_t *config_port_invalid = NULL, *config_port_valid = NULL; tor_addr_t addr; slout = smartlist_new(); mock_hostname_resolver(); // Test error when encounters an invalid Port specification config_port_invalid = mock_config_line("DNSPort", ""); ret = port_parse_config(NULL, config_port_invalid, "DNS", 0, NULL, 0, 0); tt_int_op(ret, OP_EQ, -1); // Test error when encounters an empty unix domain specification config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("DNSPort", "unix:"); ret = port_parse_config(NULL, config_port_invalid, "DNS", 0, NULL, 0, 0); tt_int_op(ret, OP_EQ, -1); // Test error when encounters a unix domain specification but the listener // doesn't support domain sockets config_port_valid = mock_config_line("DNSPort", "unix:/tmp/foo/bar"); ret = port_parse_config(NULL, config_port_valid, "DNS", CONN_TYPE_AP_DNS_LISTENER, NULL, 0, 0); tt_int_op(ret, OP_EQ, -1); // Test valid unix domain SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, 0); #ifdef _WIN32 tt_int_op(ret, OP_EQ, -1); #else tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->port, OP_EQ, 0); tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1); tt_str_op(port_cfg->unix_addr, OP_EQ, "/tmp/foo/bar"); /* Test entry port defaults as initialised in port_parse_config */ tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.prefer_ipv6, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.prefer_ipv6_virtaddr, OP_EQ, 1); #endif /* defined(_WIN32) */ // Test failure if we have no ipv4 and no ipv6 and no onion (DNS only) config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar NoIPv4Traffic " "NoIPv6Traffic " "NoOnionTraffic"); ret = port_parse_config(NULL, config_port_invalid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, -1); // Test failure if we have no DNS and we're a DNSPort config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("DNSPort", "127.0.0.1:80 NoDNSRequest"); ret = port_parse_config(NULL, config_port_invalid, "DNS", CONN_TYPE_AP_DNS_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, -1); // If we're a DNSPort, DNS only is ok // Use a port because DNSPort doesn't support sockets config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "127.0.0.1:80 " "NoIPv6Traffic " "NoIPv4Traffic NoOnionTraffic"); ret = port_parse_config(slout, config_port_valid, "DNS", CONN_TYPE_AP_DNS_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 0); // Test failure if we have DNS but no ipv4 and no ipv6 config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("SOCKSPort", "NoIPv6Traffic " "unix:/tmp/foo/bar NoIPv4Traffic"); ret = port_parse_config(NULL, config_port_invalid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, -1); // Test success with no DNS, no ipv4, no ipv6 (only onion, using separate // options) config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar " "NoIPv6Traffic " "NoDNSRequest NoIPv4Traffic"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); #ifdef _WIN32 tt_int_op(ret, OP_EQ, -1); #else tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1); #endif /* defined(_WIN32) */ // Test success with quoted unix: address. config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:\"/tmp/foo/ bar\" " "NoIPv6Traffic " "NoDNSRequest NoIPv4Traffic"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); #ifdef _WIN32 tt_int_op(ret, OP_EQ, -1); #else tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1); #endif /* defined(_WIN32) */ // Test failure with broken quoted unix: address. config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:\"/tmp/foo/ bar " "NoIPv6Traffic " "NoDNSRequest NoIPv4Traffic"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, -1); // Test failure with empty quoted unix: address. config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:\"\" " "NoIPv6Traffic " "NoDNSRequest NoIPv4Traffic"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, -1); // Test success with OnionTrafficOnly (no DNS, no ipv4, no ipv6) config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar " "OnionTrafficOnly"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); #ifdef _WIN32 tt_int_op(ret, OP_EQ, -1); #else tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1); #endif /* defined(_WIN32) */ // Test success with no ipv4 but take ipv6 config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar " "NoIPv4Traffic IPv6Traffic"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); #ifdef _WIN32 tt_int_op(ret, OP_EQ, -1); #else tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1); #endif /* defined(_WIN32) */ // Test success with both ipv4 and ipv6 config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar " "IPv4Traffic IPv6Traffic"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, NULL, 0, CL_PORT_TAKES_HOSTNAMES); #ifdef _WIN32 tt_int_op(ret, OP_EQ, -1); #else tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1); #endif /* defined(_WIN32) */ // Test failure if we specify world writable for an IP Port config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("DNSPort", "42 WorldWritable"); ret = port_parse_config(NULL, config_port_invalid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, -1); // Test failure if we specify group writable for an IP Port config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("DNSPort", "42 GroupWritable"); ret = port_parse_config(NULL, config_port_invalid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, -1); // Test failure if we specify group writable for an IP Port config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("DNSPort", "42 RelaxDirModeCheck"); ret = port_parse_config(NULL, config_port_invalid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, -1); // Test success with only a port (this will fail without a default address) config_free_lines(config_port_valid); config_port_valid = NULL; config_port_valid = mock_config_line("DNSPort", "42"); ret = port_parse_config(NULL, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); // Test success with only a port and isolate destination port config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 IsolateDestPort"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ, ISO_DEFAULT | ISO_DESTPORT); // Test success with a negative isolate destination port, and plural config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 NoIsolateDestPorts"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ, ISO_DEFAULT & ~ISO_DESTPORT); // Test success with isolate destination address config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 IsolateDestAddr"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ, ISO_DEFAULT | ISO_DESTADDR); // Test success with isolate socks AUTH config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 IsolateSOCKSAuth"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ, ISO_DEFAULT | ISO_SOCKSAUTH); // Test success with isolate client protocol config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 IsolateClientProtocol"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ, ISO_DEFAULT | ISO_CLIENTPROTO); // Test success with isolate client address config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 IsolateClientAddr"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ, ISO_DEFAULT | ISO_CLIENTADDR); // Test success with ignored unknown options config_free_lines(config_port_valid); config_port_valid = NULL; config_port_valid = mock_config_line("DNSPort", "42 ThisOptionDoesntExist"); ret = port_parse_config(NULL, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); // Test success with no isolate socks AUTH config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 NoIsolateSOCKSAuth"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.3", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.socks_prefer_no_auth, OP_EQ, 1); // Test success with prefer ipv6 config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "42 IPv6Traffic PreferIPv6"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, "127.0.0.42", 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.prefer_ipv6, OP_EQ, 1); // Test success with cache ipv4 DNS config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 CacheIPv4DNS"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 0); // Test success with cache ipv6 DNS config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 CacheIPv6DNS"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 1); // Test success with no cache ipv4 DNS config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 NoCacheIPv4DNS"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 0); // Test success with cache DNS config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 CacheDNS"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, CL_PORT_TAKES_HOSTNAMES); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 1); // Test success with use cached ipv4 DNS config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 UseIPv4Cache"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 0); // Test success with use cached ipv6 DNS config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 UseIPv6Cache"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 0); tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 1); // Test success with use cached DNS config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 UseDNSCache"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 1); // Test success with not preferring ipv6 automap config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 NoPreferIPv6Automap"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.prefer_ipv6_virtaddr, OP_EQ, 0); // Test success with prefer SOCKS no auth config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 PreferSOCKSNoAuth"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.socks_prefer_no_auth, OP_EQ, 1); // Test failure with both a zero port and a non-zero port config_free_lines(config_port_invalid); config_port_invalid = NULL; config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "0"); config_port_valid = mock_config_line("DNSPort", "42"); config_port_invalid->next = config_port_valid; ret = port_parse_config(slout, config_port_invalid, "DNS", 0, "127.0.0.42", 0, 0); tt_int_op(ret, OP_EQ, -1); // Test success with warn non-local control SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); ret = port_parse_config(slout, config_port_valid, "Control", CONN_TYPE_CONTROL_LISTENER, "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL); tt_int_op(ret, OP_EQ, 0); // Test success with warn non-local listener SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); ret = port_parse_config(slout, config_port_valid, "ExtOR", CONN_TYPE_EXT_OR_LISTENER, "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL); tt_int_op(ret, OP_EQ, 0); // Test success with warn non-local other SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL); tt_int_op(ret, OP_EQ, 0); // Test success with warn non-local other without out ret = port_parse_config(NULL, config_port_valid, "DNS", 0, "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL); tt_int_op(ret, OP_EQ, 0); // Test success with both ipv4 and ipv6 but without stream options config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 IPv4Traffic " "IPv6Traffic"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.44", 0, CL_PORT_TAKES_HOSTNAMES | CL_PORT_NO_STREAM_OPTIONS); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1); tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1); // Test failure for a SessionGroup argument with invalid value config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=invalid"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, "127.0.0.44", 0, CL_PORT_NO_STREAM_OPTIONS); tt_int_op(ret, OP_EQ, -1); // Test failure for a SessionGroup argument with valid value but with no // stream options allowed config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=123"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, "127.0.0.44", 0, CL_PORT_NO_STREAM_OPTIONS); tt_int_op(ret, OP_EQ, -1); // Test failure for more than one SessionGroup argument config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=123 " "SessionGroup=321"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, "127.0.0.44", 0, 0); tt_int_op(ret, OP_EQ, -1); // Test success with a sessiongroup options config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "42 SessionGroup=1111122"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.44", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->entry_cfg.session_group, OP_EQ, 1111122); // Test success with a zero unix domain socket, and doesnt add it to out config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "0"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.45", 0, CL_PORT_IS_UNIXSOCKET); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 0); // Test success with a one unix domain socket, and doesnt add it to out config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "something"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.45", 0, CL_PORT_IS_UNIXSOCKET); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1); tt_str_op(port_cfg->unix_addr, OP_EQ, "something"); // Test success with a port of auto - it uses the default address config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "auto"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.46", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT); tor_addr_parse(&addr, "127.0.0.46"); tt_assert(tor_addr_eq(&port_cfg->addr, &addr)); // Test success with a port of auto in mixed case config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "AuTo"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.46", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT); tor_addr_parse(&addr, "127.0.0.46"); tt_assert(tor_addr_eq(&port_cfg->addr, &addr)); // Test success with parsing both an address and an auto port config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "127.0.0.122:auto"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.46", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT); tor_addr_parse(&addr, "127.0.0.122"); tt_assert(tor_addr_eq(&port_cfg->addr, &addr)); // Test failure when asked to parse an invalid address followed by auto config_free_lines(config_port_invalid); config_port_invalid = NULL; config_port_invalid = mock_config_line("DNSPort", "invalidstuff!!:auto"); MOCK(tor_addr_lookup, mock_tor_addr_lookup__fail_on_bad_addrs); ret = port_parse_config(NULL, config_port_invalid, "DNS", 0, "127.0.0.46", 0, 0); UNMOCK(tor_addr_lookup); tt_int_op(ret, OP_EQ, -1); // Test success with parsing both an address and a real port config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "127.0.0.123:656"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, "127.0.0.46", 0, 0); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->port, OP_EQ, 656); tor_addr_parse(&addr, "127.0.0.123"); tt_assert(tor_addr_eq(&port_cfg->addr, &addr)); // Test failure if we can't parse anything at all config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "something wrong"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, "127.0.0.46", 0, 0); tt_int_op(ret, OP_EQ, -1); // Test failure if we find both an address, a port and an auto config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "127.0.1.0:123:auto"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, "127.0.0.46", 0, 0); tt_int_op(ret, OP_EQ, -1); // Test that default to group writeable default sets group writeable for // domain socket config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/somewhere"); ret = port_parse_config(slout, config_port_valid, "SOCKS", CONN_TYPE_AP_LISTENER, "127.0.0.46", 0, CL_PORT_DFLT_GROUP_WRITABLE); #ifdef _WIN32 tt_int_op(ret, OP_EQ, -1); #else tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->is_group_writable, OP_EQ, 1); #endif /* defined(_WIN32) */ done: unmock_hostname_resolver(); if (slout) SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_free(slout); config_free_lines(config_port_invalid); config_port_invalid = NULL; config_free_lines(config_port_valid); config_port_valid = NULL; } static void test_config_parse_port_config__ports__server_options(void *data) { (void)data; int ret; smartlist_t *slout = NULL; port_cfg_t *port_cfg = NULL; config_line_t *config_port_invalid = NULL, *config_port_valid = NULL; slout = smartlist_new(); // Test success with NoAdvertise option config_free_lines(config_port_valid); config_port_valid = NULL; config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 NoAdvertise"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->server_cfg.no_advertise, OP_EQ, 1); tt_int_op(port_cfg->server_cfg.no_listen, OP_EQ, 0); // Test success with NoListen option config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 NoListen"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->server_cfg.no_advertise, OP_EQ, 0); tt_int_op(port_cfg->server_cfg.no_listen, OP_EQ, 1); // Test failure with both NoAdvertise and NoListen option config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "127.0.0.124:656 NoListen " "NoAdvertise"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, -1); // Test success with IPv4Only config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 IPv4Only"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->server_cfg.bind_ipv4_only, OP_EQ, 1); tt_int_op(port_cfg->server_cfg.bind_ipv6_only, OP_EQ, 0); // Test success with IPv6Only config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "[::1]:656 IPv6Only"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); port_cfg = (port_cfg_t *)smartlist_get(slout, 0); tt_int_op(port_cfg->server_cfg.bind_ipv4_only, OP_EQ, 0); tt_int_op(port_cfg->server_cfg.bind_ipv6_only, OP_EQ, 1); // Test failure with both IPv4Only and IPv6Only config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "127.0.0.124:656 IPv6Only " "IPv4Only"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, -1); // Test success with invalid parameter config_free_lines(config_port_valid); config_port_valid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 unknown"); ret = port_parse_config(slout, config_port_valid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, 0); tt_int_op(smartlist_len(slout), OP_EQ, 1); // Test failure when asked to bind only to ipv6 but gets an ipv4 address config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "127.0.0.124:656 IPv6Only"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, -1); // Test failure when asked to bind only to ipv4 but gets an ipv6 address config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("DNSPort", "[::1]:656 IPv4Only"); ret = port_parse_config(slout, config_port_invalid, "DNS", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, -1); // Check for failure with empty unix: address. config_free_lines(config_port_invalid); config_port_invalid = NULL; SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_clear(slout); config_port_invalid = mock_config_line("ORPort", "unix:\"\""); ret = port_parse_config(slout, config_port_invalid, "ORPort", 0, NULL, 0, CL_PORT_SERVER_OPTIONS); tt_int_op(ret, OP_EQ, -1); done: if (slout) SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf)); smartlist_free(slout); config_free_lines(config_port_invalid); config_port_invalid = NULL; config_free_lines(config_port_valid); config_port_valid = NULL; } static void test_config_get_first_advertised(void *data) { (void)data; int r, w=0, n=0; char *msg=NULL; or_options_t *opts = options_new(); int port; const tor_addr_t *addr; // no ports are configured? We get NULL. port = get_first_advertised_port_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET); tt_int_op(port, OP_EQ, 0); addr = get_first_advertised_addr_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET); tt_ptr_op(addr, OP_EQ, NULL); port = get_first_advertised_port_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET6); tt_int_op(port, OP_EQ, 0); addr = get_first_advertised_addr_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET6); tt_ptr_op(addr, OP_EQ, NULL); config_line_append(&opts->ORPort_lines, "ORPort", "[1234::5678]:8080"); config_line_append(&opts->ORPort_lines, "ORPort", "1.2.3.4:9999 noadvertise"); config_line_append(&opts->ORPort_lines, "ORPort", "5.6.7.8:9911 nolisten"); r = parse_ports(opts, 0, &msg, &n, &w); tt_assert(r == 0); // UNSPEC gets us nothing. port = get_first_advertised_port_by_type_af(CONN_TYPE_OR_LISTENER, AF_UNSPEC); tt_int_op(port, OP_EQ, 0); addr = get_first_advertised_addr_by_type_af(CONN_TYPE_OR_LISTENER, AF_UNSPEC); tt_ptr_op(addr, OP_EQ, NULL); // Try AF_INET. port = get_first_advertised_port_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET); tt_int_op(port, OP_EQ, 9911); addr = get_first_advertised_addr_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET); tt_ptr_op(addr, OP_NE, NULL); tt_str_op(fmt_addrport(addr,port), OP_EQ, "5.6.7.8:9911"); // Try AF_INET6 port = get_first_advertised_port_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET6); tt_int_op(port, OP_EQ, 8080); addr = get_first_advertised_addr_by_type_af(CONN_TYPE_OR_LISTENER, AF_INET6); tt_ptr_op(addr, OP_NE, NULL); tt_str_op(fmt_addrport(addr,port), OP_EQ, "[1234::5678]:8080"); done: or_options_free(opts); config_free_all(); } static void test_config_parse_log_severity(void *data) { int ret; const char *severity_log_lines[] = { "debug file /tmp/debug.log", "debug\tfile /tmp/debug.log", "[handshake]debug [~net,~mm]info notice stdout", "[handshake]debug\t[~net,~mm]info\tnotice\tstdout", NULL }; int i; log_severity_list_t *severity; (void) data; severity = tor_malloc(sizeof(log_severity_list_t)); for (i = 0; severity_log_lines[i]; i++) { memset(severity, 0, sizeof(log_severity_list_t)); ret = parse_log_severity_config(&severity_log_lines[i], severity); tt_int_op(ret, OP_EQ, 0); } done: tor_free(severity); } static void test_config_include_limit(void *data) { (void)data; config_line_t *result = NULL; char *torrc_path = NULL; char *dir = tor_strdup(get_fname("test_include_limit")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&torrc_path, "%s"PATH_SEPARATOR"torrc", dir); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s", torrc_path); tt_int_op(write_str_to_file(torrc_path, torrc_contents, 0), OP_EQ, 0); tt_int_op(config_get_lines_include(torrc_contents, &result, 0, NULL, NULL), OP_EQ, -1); done: config_free_lines(result); tor_free(torrc_path); tor_free(dir); } static void test_config_include_does_not_exist(void *data) { (void)data; config_line_t *result = NULL; char *dir = tor_strdup(get_fname("test_include_does_not_exist")); char *missing_path = NULL; tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&missing_path, "%s"PATH_SEPARATOR"missing", dir); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s", missing_path); tt_int_op(config_get_lines_include(torrc_contents, &result, 0, NULL, NULL), OP_EQ, -1); done: config_free_lines(result); tor_free(dir); tor_free(missing_path); } static void test_config_include_error_in_included_file(void *data) { (void)data; config_line_t *result = NULL; char *dir = tor_strdup(get_fname("test_error_in_included_file")); char *invalid_path = NULL; tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&invalid_path, "%s"PATH_SEPARATOR"invalid", dir); tt_int_op(write_str_to_file(invalid_path, "unclosed \"", 0), OP_EQ, 0); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s", invalid_path); tt_int_op(config_get_lines_include(torrc_contents, &result, 0, NULL, NULL), OP_EQ, -1); done: config_free_lines(result); tor_free(dir); tor_free(invalid_path); } static void test_config_include_empty_file_folder(void *data) { (void)data; config_line_t *result = NULL; char *folder_path = NULL; char *file_path = NULL; char *dir = tor_strdup(get_fname("test_include_empty_file_folder")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&folder_path, "%s"PATH_SEPARATOR"empty_dir", dir); #ifdef _WIN32 tt_int_op(mkdir(folder_path), OP_EQ, 0); #else tt_int_op(mkdir(folder_path, 0700), OP_EQ, 0); #endif tor_asprintf(&file_path, "%s"PATH_SEPARATOR"empty_file", dir); tt_int_op(write_str_to_file(file_path, "", 0), OP_EQ, 0); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s\n" "%%include %s\n", folder_path, file_path); int include_used; tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used, NULL), OP_EQ, 0); tt_ptr_op(result, OP_EQ, NULL); tt_int_op(include_used, OP_EQ, 1); done: config_free_lines(result); tor_free(folder_path); tor_free(file_path); tor_free(dir); } #ifndef _WIN32 static void test_config_include_no_permission(void *data) { (void)data; config_line_t *result = NULL; char *folder_path = NULL; char *dir = NULL; if (geteuid() == 0) tt_skip(); dir = tor_strdup(get_fname("test_include_forbidden_folder")); tt_ptr_op(dir, OP_NE, NULL); tt_int_op(mkdir(dir, 0700), OP_EQ, 0); tor_asprintf(&folder_path, "%s"PATH_SEPARATOR"forbidden_dir", dir); tt_int_op(mkdir(folder_path, 0100), OP_EQ, 0); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s\n", folder_path); int include_used; tt_int_op(config_get_lines_include(torrc_contents, &result, 0, &include_used, NULL), OP_EQ, -1); tt_ptr_op(result, OP_EQ, NULL); done: config_free_lines(result); tor_free(folder_path); if (dir) chmod(dir, 0700); tor_free(dir); } #endif /* !defined(_WIN32) */ static void test_config_include_recursion_before_after(void *data) { (void)data; config_line_t *result = NULL; char *torrc_path = NULL; char *dir = tor_strdup(get_fname("test_include_recursion_before_after")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&torrc_path, "%s"PATH_SEPARATOR"torrc", dir); char file_contents[1000]; const int limit = MAX_INCLUDE_RECURSION_LEVEL; int i; // Loop backwards so file_contents has the contents of the first file by the // end of the loop for (i = limit; i > 0; i--) { if (i < limit) { tor_snprintf(file_contents, sizeof(file_contents), "Test %d\n" "%%include %s%d\n" "Test %d\n", i, torrc_path, i + 1, 2 * limit - i); } else { tor_snprintf(file_contents, sizeof(file_contents), "Test %d\n", i); } if (i > 1) { char *file_path = NULL; tor_asprintf(&file_path, "%s%d", torrc_path, i); tt_int_op(write_str_to_file(file_path, file_contents, 0), OP_EQ, 0); tor_free(file_path); } } int include_used; tt_int_op(config_get_lines_include(file_contents, &result, 0, &include_used, NULL), OP_EQ, 0); tt_ptr_op(result, OP_NE, NULL); tt_int_op(include_used, OP_EQ, 1); int len = 0; config_line_t *next; for (next = result; next != NULL; next = next->next) { char expected[10]; tor_snprintf(expected, sizeof(expected), "%d", len + 1); tt_str_op(next->key, OP_EQ, "Test"); tt_str_op(next->value, OP_EQ, expected); len++; } tt_int_op(len, OP_EQ, 2 * limit - 1); done: config_free_lines(result); tor_free(dir); tor_free(torrc_path); } static void test_config_include_recursion_after_only(void *data) { (void)data; config_line_t *result = NULL; char *torrc_path = NULL; char *dir = tor_strdup(get_fname("test_include_recursion_after_only")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&torrc_path, "%s"PATH_SEPARATOR"torrc", dir); char file_contents[1000]; const int limit = MAX_INCLUDE_RECURSION_LEVEL; int i; // Loop backwards so file_contents has the contents of the first file by the // end of the loop for (i = limit; i > 0; i--) { int n = (i - limit - 1) * -1; if (i < limit) { tor_snprintf(file_contents, sizeof(file_contents), "%%include %s%d\n" "Test %d\n", torrc_path, i + 1, n); } else { tor_snprintf(file_contents, sizeof(file_contents), "Test %d\n", n); } if (i > 1) { char *file_path = NULL; tor_asprintf(&file_path, "%s%d", torrc_path, i); tt_int_op(write_str_to_file(file_path, file_contents, 0), OP_EQ, 0); tor_free(file_path); } } int include_used; tt_int_op(config_get_lines_include(file_contents, &result, 0, &include_used, NULL), OP_EQ, 0); tt_ptr_op(result, OP_NE, NULL); tt_int_op(include_used, OP_EQ, 1); int len = 0; config_line_t *next; for (next = result; next != NULL; next = next->next) { char expected[10]; tor_snprintf(expected, sizeof(expected), "%d", len + 1); tt_str_op(next->key, OP_EQ, "Test"); tt_str_op(next->value, OP_EQ, expected); len++; } tt_int_op(len, OP_EQ, limit); done: config_free_lines(result); tor_free(dir); tor_free(torrc_path); } static void test_config_include_folder_order(void *data) { (void)data; config_line_t *result = NULL; char *torrcd = NULL; char *path = NULL; char *path2 = NULL; char *dir = tor_strdup(get_fname("test_include_folder_order")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&torrcd, "%s"PATH_SEPARATOR"%s", dir, "torrc.d"); #ifdef _WIN32 tt_int_op(mkdir(torrcd), OP_EQ, 0); #else tt_int_op(mkdir(torrcd, 0700), OP_EQ, 0); #endif // test that files in subfolders are ignored tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "subfolder"); #ifdef _WIN32 tt_int_op(mkdir(path), OP_EQ, 0); #else tt_int_op(mkdir(path, 0700), OP_EQ, 0); #endif tor_asprintf(&path2, "%s"PATH_SEPARATOR"%s", path, "01_ignore"); tt_int_op(write_str_to_file(path2, "ShouldNotSee 1\n", 0), OP_EQ, 0); tor_free(path); // test that files starting with . are ignored tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, ".dot"); tt_int_op(write_str_to_file(path, "ShouldNotSee 2\n", 0), OP_EQ, 0); tor_free(path); // test file order tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "01_1st"); tt_int_op(write_str_to_file(path, "Test 1\n", 0), OP_EQ, 0); tor_free(path); tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "02_2nd"); tt_int_op(write_str_to_file(path, "Test 2\n", 0), OP_EQ, 0); tor_free(path); tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "aa_3rd"); tt_int_op(write_str_to_file(path, "Test 3\n", 0), OP_EQ, 0); tor_free(path); tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "ab_4th"); tt_int_op(write_str_to_file(path, "Test 4\n", 0), OP_EQ, 0); tor_free(path); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s\n", torrcd); int include_used; tt_int_op(config_get_lines_include(torrc_contents, &result, 0, &include_used, NULL), OP_EQ, 0); tt_ptr_op(result, OP_NE, NULL); tt_int_op(include_used, OP_EQ, 1); int len = 0; config_line_t *next; for (next = result; next != NULL; next = next->next) { char expected[10]; tor_snprintf(expected, sizeof(expected), "%d", len + 1); tt_str_op(next->key, OP_EQ, "Test"); tt_str_op(next->value, OP_EQ, expected); len++; } tt_int_op(len, OP_EQ, 4); done: config_free_lines(result); tor_free(torrcd); tor_free(path); tor_free(path2); tor_free(dir); } static void test_config_include_blank_file_last(void *data) { (void)data; config_line_t *result = NULL; char *torrcd = NULL; char *path = NULL; char *dir = tor_strdup(get_fname("test_include_blank_file_last")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&torrcd, "%s"PATH_SEPARATOR"%s", dir, "torrc.d"); #ifdef _WIN32 tt_int_op(mkdir(torrcd), OP_EQ, 0); #else tt_int_op(mkdir(torrcd, 0700), OP_EQ, 0); #endif tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "aa_1st"); tt_int_op(write_str_to_file(path, "Test 1\n", 0), OP_EQ, 0); tor_free(path); tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "bb_2nd"); tt_int_op(write_str_to_file(path, "Test 2\n", 0), OP_EQ, 0); tor_free(path); tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "cc_comment"); tt_int_op(write_str_to_file(path, "# comment only\n", 0), OP_EQ, 0); tor_free(path); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s\n" "Test 3\n", torrcd); int include_used; tt_int_op(config_get_lines_include(torrc_contents, &result, 0, &include_used, NULL), OP_EQ, 0); tt_ptr_op(result, OP_NE, NULL); tt_int_op(include_used, OP_EQ, 1); int len = 0; config_line_t *next; for (next = result; next != NULL; next = next->next) { char expected[10]; tor_snprintf(expected, sizeof(expected), "%d", len + 1); tt_str_op(next->key, OP_EQ, "Test"); tt_str_op(next->value, OP_EQ, expected); len++; } tt_int_op(len, OP_EQ, 3); done: config_free_lines(result); tor_free(torrcd); tor_free(path); tor_free(dir); } static void test_config_include_path_syntax(void *data) { (void)data; config_line_t *result = NULL; char *dir = tor_strdup(get_fname("test_include_path_syntax")); char *esc_dir = NULL, *dir_with_pathsep = NULL, *esc_dir_with_pathsep = NULL, *torrc_contents = NULL; tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif esc_dir = esc_for_log(dir); tor_asprintf(&dir_with_pathsep, "%s%s", dir, PATH_SEPARATOR); esc_dir_with_pathsep = esc_for_log(dir_with_pathsep); tor_asprintf(&torrc_contents, "%%include %s\n" "%%include %s%s \n" // space to avoid suppressing newline "%%include %s\n", esc_dir, dir, PATH_SEPARATOR, esc_dir_with_pathsep); int include_used; tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used, NULL), OP_EQ, 0); tt_ptr_op(result, OP_EQ, NULL); tt_int_op(include_used, OP_EQ, 1); done: config_free_lines(result); tor_free(dir); tor_free(torrc_contents); tor_free(esc_dir); tor_free(dir_with_pathsep); tor_free(esc_dir_with_pathsep); } static void test_config_include_not_processed(void *data) { (void)data; char torrc_contents[1000] = "%include does_not_exist\n"; config_line_t *result = NULL; tt_int_op(config_get_lines(torrc_contents, &result, 0),OP_EQ, 0); tt_ptr_op(result, OP_NE, NULL); int len = 0; config_line_t *next; for (next = result; next != NULL; next = next->next) { tt_str_op(next->key, OP_EQ, "%include"); tt_str_op(next->value, OP_EQ, "does_not_exist"); len++; } tt_int_op(len, OP_EQ, 1); done: config_free_lines(result); } static void test_config_include_has_include(void *data) { (void)data; config_line_t *result = NULL; char *dir = tor_strdup(get_fname("test_include_has_include")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif char torrc_contents[1000] = "Test 1\n"; int include_used; tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used, NULL), OP_EQ, 0); tt_int_op(include_used, OP_EQ, 0); config_free_lines(result); tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s\n", dir); tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used, NULL), OP_EQ, 0); tt_int_op(include_used, OP_EQ, 1); done: config_free_lines(result); tor_free(dir); } static void test_config_include_flag_both_without(void *data) { (void)data; char *errmsg = NULL; char conf_empty[1000]; tor_snprintf(conf_empty, sizeof(conf_empty), "DataDirectory %s\n", get_fname(NULL)); // test with defaults-torrc and torrc without include int ret = options_init_from_string(conf_empty, conf_empty, CMD_RUN_UNITTESTS, NULL, &errmsg); tt_int_op(ret, OP_EQ, 0); const or_options_t *options = get_options(); tt_int_op(options->IncludeUsed, OP_EQ, 0); done: tor_free(errmsg); } static void test_config_include_flag_torrc_only(void *data) { (void)data; char *errmsg = NULL; char *path = NULL; char *dir = tor_strdup(get_fname("test_include_flag_torrc_only")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", dir, "dummy"); tt_int_op(write_str_to_file(path, "\n", 0), OP_EQ, 0); char conf_empty[1000]; tor_snprintf(conf_empty, sizeof(conf_empty), "DataDirectory %s\n", get_fname(NULL)); char conf_include[1000]; tor_snprintf(conf_include, sizeof(conf_include), "%%include %s", path); // test with defaults-torrc without include and torrc with include int ret = options_init_from_string(conf_empty, conf_include, CMD_RUN_UNITTESTS, NULL, &errmsg); tt_int_op(ret, OP_EQ, 0); const or_options_t *options = get_options(); tt_int_op(options->IncludeUsed, OP_EQ, 1); done: tor_free(errmsg); tor_free(path); tor_free(dir); } static void test_config_include_flag_defaults_only(void *data) { (void)data; char *errmsg = NULL; char *path = NULL; char *dir = tor_strdup(get_fname("test_include_flag_defaults_only")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", dir, "dummy"); tt_int_op(write_str_to_file(path, "\n", 0), OP_EQ, 0); char conf_empty[1000]; tor_snprintf(conf_empty, sizeof(conf_empty), "DataDirectory %s\n", get_fname(NULL)); char conf_include[1000]; tor_snprintf(conf_include, sizeof(conf_include), "%%include %s", path); // test with defaults-torrc with include and torrc without include int ret = options_init_from_string(conf_include, conf_empty, CMD_RUN_UNITTESTS, NULL, &errmsg); tt_int_op(ret, OP_EQ, 0); const or_options_t *options = get_options(); tt_int_op(options->IncludeUsed, OP_EQ, 0); done: tor_free(errmsg); tor_free(path); tor_free(dir); } static void test_config_dup_and_filter(void *arg) { (void)arg; /* Test normal input. */ config_line_t *line = NULL; config_line_append(&line, "abc", "def"); config_line_append(&line, "ghi", "jkl"); config_line_append(&line, "ABCD", "mno"); config_line_t *line_dup = config_lines_dup_and_filter(line, "aBc"); tt_ptr_op(line_dup, OP_NE, NULL); tt_ptr_op(line_dup->next, OP_NE, NULL); tt_ptr_op(line_dup->next->next, OP_EQ, NULL); tt_str_op(line_dup->key, OP_EQ, "abc"); tt_str_op(line_dup->value, OP_EQ, "def"); tt_str_op(line_dup->next->key, OP_EQ, "ABCD"); tt_str_op(line_dup->next->value, OP_EQ, "mno"); /* empty output */ config_free_lines(line_dup); line_dup = config_lines_dup_and_filter(line, "skdjfsdkljf"); tt_ptr_op(line_dup, OP_EQ, NULL); /* empty input */ config_free_lines(line_dup); line_dup = config_lines_dup_and_filter(NULL, "abc"); tt_ptr_op(line_dup, OP_EQ, NULL); done: config_free_lines(line); config_free_lines(line_dup); } /* If we're not configured to be a bridge, but we set * BridgeDistribution, then options_validate () should return -1. */ static void test_config_check_bridge_distribution_setting_not_a_bridge(void *arg) { or_options_t* options = get_options_mutable(); or_options_t* old_options = options; char* message = NULL; int ret; (void)arg; options->BridgeRelay = 0; options->BridgeDistribution = (char*)("https"); ret = options_validate(old_options, options, &message); tt_int_op(ret, OP_EQ, -1); tt_str_op(message, OP_EQ, "You set BridgeDistribution, but you " "didn't set BridgeRelay!"); done: tor_free(message); options->BridgeDistribution = NULL; } /* If the BridgeDistribution setting was valid, 0 should be returned. */ static void test_config_check_bridge_distribution_setting_valid(void *arg) { (void)arg; // Check all the possible values we support right now. tt_int_op(check_bridge_distribution_setting("none"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("any"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("https"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("email"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("moat"), OP_EQ, 0); // Check all the possible values we support right now with weird casing. tt_int_op(check_bridge_distribution_setting("NoNe"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("anY"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("hTTps"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("emAIl"), OP_EQ, 0); tt_int_op(check_bridge_distribution_setting("moAt"), OP_EQ, 0); // Invalid values. tt_int_op(check_bridge_distribution_setting("x\rx"), OP_EQ, -1); tt_int_op(check_bridge_distribution_setting("x\nx"), OP_EQ, -1); tt_int_op(check_bridge_distribution_setting("\t\t\t"), OP_EQ, -1); done: return; } /* If the BridgeDistribution setting was invalid, -1 should be returned. */ static void test_config_check_bridge_distribution_setting_invalid(void *arg) { int ret = check_bridge_distribution_setting("hyphens-are-allowed"); (void)arg; tt_int_op(ret, OP_EQ, 0); ret = check_bridge_distribution_setting("asterisks*are*forbidden"); tt_int_op(ret, OP_EQ, -1); done: return; } /* If the BridgeDistribution setting was unrecognised, a warning should be * logged and 0 should be returned. */ static void test_config_check_bridge_distribution_setting_unrecognised(void *arg) { int ret = check_bridge_distribution_setting("unicorn"); (void)arg; tt_int_op(ret, OP_EQ, 0); done: return; } static void test_config_include_opened_file_list(void *data) { (void)data; config_line_t *result = NULL; smartlist_t *opened_files = smartlist_new(); char *torrcd = NULL; char *subfolder = NULL; char *path = NULL; char *empty = NULL; char *file = NULL; char *dot = NULL; char *dir = tor_strdup(get_fname("test_include_opened_file_list")); tt_ptr_op(dir, OP_NE, NULL); #ifdef _WIN32 tt_int_op(mkdir(dir), OP_EQ, 0); #else tt_int_op(mkdir(dir, 0700), OP_EQ, 0); #endif tor_asprintf(&torrcd, "%s"PATH_SEPARATOR"%s", dir, "torrc.d"); #ifdef _WIN32 tt_int_op(mkdir(torrcd), OP_EQ, 0); #else tt_int_op(mkdir(torrcd, 0700), OP_EQ, 0); #endif tor_asprintf(&subfolder, "%s"PATH_SEPARATOR"%s", torrcd, "subfolder"); #ifdef _WIN32 tt_int_op(mkdir(subfolder), OP_EQ, 0); #else tt_int_op(mkdir(subfolder, 0700), OP_EQ, 0); #endif tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", subfolder, "01_file_in_subfolder"); tt_int_op(write_str_to_file(path, "Test 1\n", 0), OP_EQ, 0); tor_asprintf(&empty, "%s"PATH_SEPARATOR"%s", torrcd, "empty"); tt_int_op(write_str_to_file(empty, "", 0), OP_EQ, 0); tor_asprintf(&file, "%s"PATH_SEPARATOR"%s", torrcd, "file"); tt_int_op(write_str_to_file(file, "Test 2\n", 0), OP_EQ, 0); tor_asprintf(&dot, "%s"PATH_SEPARATOR"%s", torrcd, ".dot"); tt_int_op(write_str_to_file(dot, "Test 3\n", 0), OP_EQ, 0); char torrc_contents[1000]; tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s\n", torrcd); int include_used; tt_int_op(config_get_lines_include(torrc_contents, &result, 0, &include_used, opened_files), OP_EQ, 0); tt_ptr_op(result, OP_NE, NULL); tt_int_op(include_used, OP_EQ, 1); tt_int_op(smartlist_len(opened_files), OP_EQ, 4); tt_int_op(smartlist_contains_string(opened_files, torrcd), OP_EQ, 1); tt_int_op(smartlist_contains_string(opened_files, subfolder), OP_EQ, 1); // files inside subfolders are not opended, only the subfolder is opened tt_int_op(smartlist_contains_string(opened_files, empty), OP_EQ, 1); tt_int_op(smartlist_contains_string(opened_files, file), OP_EQ, 1); // dot files are not opened as we ignore them when we get their name from // their parent folder done: SMARTLIST_FOREACH(opened_files, char *, f, tor_free(f)); smartlist_free(opened_files); config_free_lines(result); tor_free(torrcd); tor_free(subfolder); tor_free(path); tor_free(empty); tor_free(file); tor_free(dot); tor_free(dir); } static void test_config_compute_max_mem_in_queues(void *data) { #define GIGABYTE(x) (UINT64_C(x) << 30) #define MEGABYTE(x) (UINT64_C(x) << 20) (void)data; MOCK(get_total_system_memory, get_total_system_memory_mock); /* We are unable to detect the amount of memory on the system. Tor will try * to use some sensible default values for 64-bit and 32-bit systems. */ total_system_memory_return = -1; #if SIZEOF_VOID_P >= 8 /* We are on a 64-bit system. */ tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, GIGABYTE(8)); #else /* We are on a 32-bit system. */ tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, GIGABYTE(1)); #endif /* SIZEOF_VOID_P >= 8 */ /* We are able to detect the amount of RAM on the system. */ total_system_memory_return = 0; /* We are running on a system with one gigabyte of RAM. */ total_system_memory_output = GIGABYTE(1); /* We have 0.75 * RAM available. */ tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, 3 * (GIGABYTE(1) / 4)); /* We are running on a tiny machine with 256 MB of RAM. */ total_system_memory_output = MEGABYTE(256); /* We will now enforce a minimum of 256 MB of RAM available for the * MaxMemInQueues here, even though we should only have had 0.75 * 256 = 192 * MB available. */ tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, MEGABYTE(256)); #if SIZEOF_SIZE_T > 4 /* We are running on a machine with 8 GB of RAM. */ total_system_memory_output = GIGABYTE(8); /* We will have 0.4 * RAM available. */ tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, 2 * (GIGABYTE(8) / 5)); /* We are running on a machine with 16 GB of RAM. */ total_system_memory_output = GIGABYTE(16); /* We will have 0.4 * RAM available. */ tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, 2 * (GIGABYTE(16) / 5)); /* We are running on a machine with 32 GB of RAM. */ total_system_memory_output = GIGABYTE(32); /* We will at maximum get MAX_DEFAULT_MEMORY_QUEUE_SIZE here. */ tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, MAX_DEFAULT_MEMORY_QUEUE_SIZE); #endif /* SIZEOF_SIZE_T > 4 */ done: UNMOCK(get_total_system_memory); #undef GIGABYTE #undef MEGABYTE } static void test_config_extended_fmt(void *arg) { (void)arg; config_line_t *lines = NULL, *lp; const char string1[] = "thing1 is here\n" "+thing2 is over here\n" "/thing3\n" "/thing4 is back here\n"; /* Try with the "extended" flag disabled. */ int r = config_get_lines(string1, &lines, 0); tt_int_op(r, OP_EQ, 0); lp = lines; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "thing1"); tt_str_op(lp->value, OP_EQ, "is here"); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL); lp = lp->next; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "+thing2"); tt_str_op(lp->value, OP_EQ, "is over here"); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL); lp = lp->next; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "/thing3"); tt_str_op(lp->value, OP_EQ, ""); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL); lp = lp->next; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "/thing4"); tt_str_op(lp->value, OP_EQ, "is back here"); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL); lp = lp->next; tt_assert(!lp); config_free_lines(lines); /* Try with the "extended" flag enabled. */ r = config_get_lines(string1, &lines, 1); tt_int_op(r, OP_EQ, 0); lp = lines; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "thing1"); tt_str_op(lp->value, OP_EQ, "is here"); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL); lp = lp->next; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "thing2"); tt_str_op(lp->value, OP_EQ, "is over here"); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_APPEND); lp = lp->next; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "thing3"); tt_str_op(lp->value, OP_EQ, ""); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_CLEAR); lp = lp->next; tt_ptr_op(lp, OP_NE, NULL); tt_str_op(lp->key, OP_EQ, "thing4"); tt_str_op(lp->value, OP_EQ, ""); tt_int_op(lp->command, OP_EQ, CONFIG_LINE_CLEAR); lp = lp->next; tt_assert(!lp); done: config_free_lines(lines); } static void test_config_kvline_parse(void *arg) { (void)arg; config_line_t *lines = NULL; char *enc = NULL; lines = kvline_parse("A=B CD=EF", 0); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "A"); tt_str_op(lines->value, OP_EQ, "B"); tt_str_op(lines->next->key, OP_EQ, "CD"); tt_str_op(lines->next->value, OP_EQ, "EF"); enc = kvline_encode(lines, 0); tt_str_op(enc, OP_EQ, "A=B CD=EF"); tor_free(enc); enc = kvline_encode(lines, KV_QUOTED|KV_OMIT_KEYS); tt_str_op(enc, OP_EQ, "A=B CD=EF"); tor_free(enc); config_free_lines(lines); lines = kvline_parse("AB CDE=F", 0); tt_assert(! lines); lines = kvline_parse("AB CDE=F", KV_OMIT_KEYS); tt_assert(lines); tt_str_op(lines->key, OP_EQ, ""); tt_str_op(lines->value, OP_EQ, "AB"); tt_str_op(lines->next->key, OP_EQ, "CDE"); tt_str_op(lines->next->value, OP_EQ, "F"); tt_assert(lines); enc = kvline_encode(lines, 0); tt_assert(!enc); enc = kvline_encode(lines, KV_QUOTED|KV_OMIT_KEYS); tt_str_op(enc, OP_EQ, "AB CDE=F"); tor_free(enc); config_free_lines(lines); lines = kvline_parse("AB=C CDE=\"F G\"", 0); tt_assert(!lines); lines = kvline_parse("AB=C CDE=\"F G\" \"GHI\" ", KV_QUOTED|KV_OMIT_KEYS); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, "C"); tt_str_op(lines->next->key, OP_EQ, "CDE"); tt_str_op(lines->next->value, OP_EQ, "F G"); tt_str_op(lines->next->next->key, OP_EQ, ""); tt_str_op(lines->next->next->value, OP_EQ, "GHI"); enc = kvline_encode(lines, 0); tt_assert(!enc); enc = kvline_encode(lines, KV_QUOTED|KV_OMIT_KEYS); tt_str_op(enc, OP_EQ, "AB=C CDE=\"F G\" GHI"); tor_free(enc); config_free_lines(lines); lines = kvline_parse("A\"B=C CDE=\"F\" \"GHI\" ", KV_QUOTED|KV_OMIT_KEYS); tt_assert(! lines); lines = kvline_parse("AB=", KV_QUOTED); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, ""); config_free_lines(lines); lines = kvline_parse("AB=", 0); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, ""); config_free_lines(lines); lines = kvline_parse("AB=", KV_OMIT_VALS); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, ""); config_free_lines(lines); lines = kvline_parse(" AB ", KV_OMIT_VALS); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, ""); config_free_lines(lines); lines = kvline_parse("AB", KV_OMIT_VALS); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, ""); enc = kvline_encode(lines, KV_OMIT_VALS); tt_str_op(enc, OP_EQ, "AB"); tor_free(enc); config_free_lines(lines); lines = kvline_parse("AB=CD", KV_OMIT_VALS); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, "CD"); enc = kvline_encode(lines, KV_OMIT_VALS); tt_str_op(enc, OP_EQ, "AB=CD"); tor_free(enc); config_free_lines(lines); lines = kvline_parse("AB=CD DE FGH=I", KV_OMIT_VALS); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, "CD"); tt_str_op(lines->next->key, OP_EQ, "DE"); tt_str_op(lines->next->value, OP_EQ, ""); tt_str_op(lines->next->next->key, OP_EQ, "FGH"); tt_str_op(lines->next->next->value, OP_EQ, "I"); enc = kvline_encode(lines, KV_OMIT_VALS); tt_str_op(enc, OP_EQ, "AB=CD DE FGH=I"); tor_free(enc); config_free_lines(lines); lines = kvline_parse("AB=\"CD E\" DE FGH=\"I\"", KV_OMIT_VALS|KV_QUOTED); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, "CD E"); tt_str_op(lines->next->key, OP_EQ, "DE"); tt_str_op(lines->next->value, OP_EQ, ""); tt_str_op(lines->next->next->key, OP_EQ, "FGH"); tt_str_op(lines->next->next->value, OP_EQ, "I"); enc = kvline_encode(lines, KV_OMIT_VALS|KV_QUOTED); tt_str_op(enc, OP_EQ, "AB=\"CD E\" DE FGH=I"); tor_free(enc); config_free_lines(lines); lines = kvline_parse("AB=CD \"EF=GH\"", KV_OMIT_KEYS|KV_QUOTED); tt_assert(lines); tt_str_op(lines->key, OP_EQ, "AB"); tt_str_op(lines->value, OP_EQ, "CD"); tt_str_op(lines->next->key, OP_EQ, ""); tt_str_op(lines->next->value, OP_EQ, "EF=GH"); enc = kvline_encode(lines, KV_OMIT_KEYS); tt_assert(!enc); enc = kvline_encode(lines, KV_OMIT_KEYS|KV_QUOTED); tt_assert(enc); tt_str_op(enc, OP_EQ, "AB=CD \"EF=GH\""); tor_free(enc); config_free_lines(lines); lines = tor_malloc_zero(sizeof(*lines)); lines->key = tor_strdup("A=B"); lines->value = tor_strdup("CD"); enc = kvline_encode(lines, 0); tt_assert(!enc); config_free_lines(lines); config_line_append(&lines, "A", "B C"); enc = kvline_encode(lines, 0); tt_assert(!enc); enc = kvline_encode(lines, KV_RAW); tt_assert(enc); tt_str_op(enc, OP_EQ, "A=B C"); done: config_free_lines(lines); tor_free(enc); } static void test_config_getinfo_config_names(void *arg) { (void)arg; char *answer = NULL; const char *error = NULL; int rv; rv = getinfo_helper_config(NULL, "config/names", &answer, &error); tt_int_op(rv, OP_EQ, 0); tt_ptr_op(error, OP_EQ, NULL); // ContactInfo should be listed. tt_assert(strstr(answer, "\nContactInfo String\n")); // V1AuthoritativeDirectory should not be listed, since it is obsolete. tt_assert(! strstr(answer, "V1AuthoritativeDirectory")); // ___UsingTestNetworkDefaults should not be listed, since it is invisible. tt_assert(! strstr(answer, "UsingTestNetworkDefaults")); done: tor_free(answer); } #define CONFIG_TEST(name, flags) \ { #name, test_config_ ## name, flags, NULL, NULL } #define CONFIG_TEST_SETUP(suffix, name, flags, setup, setup_data) \ { #name#suffix, test_config_ ## name, flags, setup, setup_data } struct testcase_t config_tests[] = { CONFIG_TEST(adding_trusted_dir_server, TT_FORK), CONFIG_TEST(adding_fallback_dir_server, TT_FORK), CONFIG_TEST(parsing_trusted_dir_server, 0), CONFIG_TEST(parsing_invalid_dir_address, 0), CONFIG_TEST(parsing_fallback_dir_server, 0), CONFIG_TEST(adding_default_trusted_dir_servers, TT_FORK), CONFIG_TEST(adding_dir_servers, TT_FORK), CONFIG_TEST(default_dir_servers, TT_FORK), CONFIG_TEST(default_fallback_dirs, 0), CONFIG_TEST_SETUP(_v4, find_my_address, TT_FORK, &passthrough_setup, &addr_param_v4), CONFIG_TEST_SETUP(_v6, find_my_address, TT_FORK, &passthrough_setup, &addr_param_v6), CONFIG_TEST(find_my_address_mixed, TT_FORK), CONFIG_TEST(addressmap, 0), CONFIG_TEST(parse_bridge_line, 0), CONFIG_TEST(parse_transport_options_line, 0), CONFIG_TEST(parse_transport_plugin_line, TT_FORK), CONFIG_TEST(parse_tcp_proxy_line, TT_FORK), CONFIG_TEST(check_or_create_data_subdir, TT_FORK), CONFIG_TEST(write_to_data_subdir, TT_FORK), CONFIG_TEST(fix_my_family, 0), CONFIG_TEST(directory_fetch, 0), CONFIG_TEST(port_cfg_line_extract_addrport, 0), CONFIG_TEST(parse_port_config__ports__no_ports_given, 0), CONFIG_TEST(parse_port_config__ports__server_options, 0), CONFIG_TEST(parse_port_config__ports__ports_given, 0), CONFIG_TEST(get_first_advertised, TT_FORK), CONFIG_TEST(parse_log_severity, 0), CONFIG_TEST(include_limit, 0), CONFIG_TEST(include_does_not_exist, 0), CONFIG_TEST(include_error_in_included_file, 0), CONFIG_TEST(include_empty_file_folder, 0), #ifndef _WIN32 CONFIG_TEST(include_no_permission, 0), #endif CONFIG_TEST(include_recursion_before_after, 0), CONFIG_TEST(include_recursion_after_only, 0), CONFIG_TEST(include_folder_order, 0), CONFIG_TEST(include_blank_file_last, 0), CONFIG_TEST(include_path_syntax, 0), CONFIG_TEST(include_not_processed, 0), CONFIG_TEST(include_has_include, 0), CONFIG_TEST(include_flag_both_without, TT_FORK), CONFIG_TEST(include_flag_torrc_only, TT_FORK), CONFIG_TEST(include_flag_defaults_only, TT_FORK), CONFIG_TEST(dup_and_filter, 0), CONFIG_TEST(check_bridge_distribution_setting_not_a_bridge, TT_FORK), CONFIG_TEST(check_bridge_distribution_setting_valid, 0), CONFIG_TEST(check_bridge_distribution_setting_invalid, 0), CONFIG_TEST(check_bridge_distribution_setting_unrecognised, 0), CONFIG_TEST(include_opened_file_list, 0), CONFIG_TEST(compute_max_mem_in_queues, 0), CONFIG_TEST(extended_fmt, 0), CONFIG_TEST(kvline_parse, 0), CONFIG_TEST(getinfo_config_names, 0), END_OF_TESTCASES };