|
@@ -4,7 +4,10 @@
|
|
|
#define CONTROL_PRIVATE
|
|
|
#include "or.h"
|
|
|
#include "control.h"
|
|
|
+#include "entrynodes.h"
|
|
|
+#include "networkstatus.h"
|
|
|
#include "rendservice.h"
|
|
|
+#include "routerlist.h"
|
|
|
#include "test.h"
|
|
|
|
|
|
static void
|
|
@@ -203,12 +206,1090 @@ test_add_onion_helper_clientauth(void *arg)
|
|
|
tor_free(err_msg);
|
|
|
}
|
|
|
|
|
|
+
|
|
|
+
|
|
|
+static const download_status_t dl_status_default =
|
|
|
+ { 0, 0, 0, DL_SCHED_CONSENSUS, DL_WANT_ANY_DIRSERVER,
|
|
|
+ DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 0, 0 };
|
|
|
+static download_status_t ns_dl_status[N_CONSENSUS_FLAVORS];
|
|
|
+static download_status_t ns_dl_status_bootstrap[N_CONSENSUS_FLAVORS];
|
|
|
+static download_status_t ns_dl_status_running[N_CONSENSUS_FLAVORS];
|
|
|
+
|
|
|
+
|
|
|
+ * These should explore all the possible cases of download_status_to_string()
|
|
|
+ * in control.c
|
|
|
+ */
|
|
|
+static const download_status_t dls_sample_1 =
|
|
|
+ { 1467163900, 0, 0, DL_SCHED_GENERIC, DL_WANT_ANY_DIRSERVER,
|
|
|
+ DL_SCHED_INCREMENT_FAILURE, DL_SCHED_DETERMINISTIC, 0, 0 };
|
|
|
+static const char * dls_sample_1_str =
|
|
|
+ "next-attempt-at 2016-06-29 01:31:40\n"
|
|
|
+ "n-download-failures 0\n"
|
|
|
+ "n-download-attempts 0\n"
|
|
|
+ "schedule DL_SCHED_GENERIC\n"
|
|
|
+ "want-authority DL_WANT_ANY_DIRSERVER\n"
|
|
|
+ "increment-on DL_SCHED_INCREMENT_FAILURE\n"
|
|
|
+ "backoff DL_SCHED_DETERMINISTIC\n";
|
|
|
+static const download_status_t dls_sample_2 =
|
|
|
+ { 1467164400, 1, 2, DL_SCHED_CONSENSUS, DL_WANT_AUTHORITY,
|
|
|
+ DL_SCHED_INCREMENT_FAILURE, DL_SCHED_DETERMINISTIC, 0, 0 };
|
|
|
+static const char * dls_sample_2_str =
|
|
|
+ "next-attempt-at 2016-06-29 01:40:00\n"
|
|
|
+ "n-download-failures 1\n"
|
|
|
+ "n-download-attempts 2\n"
|
|
|
+ "schedule DL_SCHED_CONSENSUS\n"
|
|
|
+ "want-authority DL_WANT_AUTHORITY\n"
|
|
|
+ "increment-on DL_SCHED_INCREMENT_FAILURE\n"
|
|
|
+ "backoff DL_SCHED_DETERMINISTIC\n";
|
|
|
+static const download_status_t dls_sample_3 =
|
|
|
+ { 1467154400, 12, 25, DL_SCHED_BRIDGE, DL_WANT_ANY_DIRSERVER,
|
|
|
+ DL_SCHED_INCREMENT_ATTEMPT, DL_SCHED_DETERMINISTIC, 0, 0 };
|
|
|
+static const char * dls_sample_3_str =
|
|
|
+ "next-attempt-at 2016-06-28 22:53:20\n"
|
|
|
+ "n-download-failures 12\n"
|
|
|
+ "n-download-attempts 25\n"
|
|
|
+ "schedule DL_SCHED_BRIDGE\n"
|
|
|
+ "want-authority DL_WANT_ANY_DIRSERVER\n"
|
|
|
+ "increment-on DL_SCHED_INCREMENT_ATTEMPT\n"
|
|
|
+ "backoff DL_SCHED_DETERMINISTIC\n";
|
|
|
+static const download_status_t dls_sample_4 =
|
|
|
+ { 1467166600, 3, 0, DL_SCHED_GENERIC, DL_WANT_ANY_DIRSERVER,
|
|
|
+ DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 0, 0 };
|
|
|
+static const char * dls_sample_4_str =
|
|
|
+ "next-attempt-at 2016-06-29 02:16:40\n"
|
|
|
+ "n-download-failures 3\n"
|
|
|
+ "n-download-attempts 0\n"
|
|
|
+ "schedule DL_SCHED_GENERIC\n"
|
|
|
+ "want-authority DL_WANT_ANY_DIRSERVER\n"
|
|
|
+ "increment-on DL_SCHED_INCREMENT_FAILURE\n"
|
|
|
+ "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
|
|
|
+ "last-backoff-position 0\n"
|
|
|
+ "last-delay-used 0\n";
|
|
|
+static const download_status_t dls_sample_5 =
|
|
|
+ { 1467164600, 3, 7, DL_SCHED_CONSENSUS, DL_WANT_ANY_DIRSERVER,
|
|
|
+ DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 1, 2112, };
|
|
|
+static const char * dls_sample_5_str =
|
|
|
+ "next-attempt-at 2016-06-29 01:43:20\n"
|
|
|
+ "n-download-failures 3\n"
|
|
|
+ "n-download-attempts 7\n"
|
|
|
+ "schedule DL_SCHED_CONSENSUS\n"
|
|
|
+ "want-authority DL_WANT_ANY_DIRSERVER\n"
|
|
|
+ "increment-on DL_SCHED_INCREMENT_FAILURE\n"
|
|
|
+ "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
|
|
|
+ "last-backoff-position 1\n"
|
|
|
+ "last-delay-used 2112\n";
|
|
|
+static const download_status_t dls_sample_6 =
|
|
|
+ { 1467164200, 4, 9, DL_SCHED_CONSENSUS, DL_WANT_AUTHORITY,
|
|
|
+ DL_SCHED_INCREMENT_ATTEMPT, DL_SCHED_RANDOM_EXPONENTIAL, 3, 432 };
|
|
|
+static const char * dls_sample_6_str =
|
|
|
+ "next-attempt-at 2016-06-29 01:36:40\n"
|
|
|
+ "n-download-failures 4\n"
|
|
|
+ "n-download-attempts 9\n"
|
|
|
+ "schedule DL_SCHED_CONSENSUS\n"
|
|
|
+ "want-authority DL_WANT_AUTHORITY\n"
|
|
|
+ "increment-on DL_SCHED_INCREMENT_ATTEMPT\n"
|
|
|
+ "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
|
|
|
+ "last-backoff-position 3\n"
|
|
|
+ "last-delay-used 432\n";
|
|
|
+
|
|
|
+
|
|
|
+static const char *auth_id_digest_1_str =
|
|
|
+ "63CDD326DFEF0CA020BDD3FEB45A3286FE13A061";
|
|
|
+static download_status_t auth_def_cert_download_status_1;
|
|
|
+static const char *auth_id_digest_2_str =
|
|
|
+ "2C209FCDD8D48DC049777B8DC2C0F94A0408BE99";
|
|
|
+static download_status_t auth_def_cert_download_status_2;
|
|
|
+
|
|
|
+static const char *auth_id_digest_expected_list =
|
|
|
+ "63CDD326DFEF0CA020BDD3FEB45A3286FE13A061\n"
|
|
|
+ "2C209FCDD8D48DC049777B8DC2C0F94A0408BE99\n";
|
|
|
+
|
|
|
+
|
|
|
+static const char *auth_1_sk_1_str =
|
|
|
+ "AA69566029B1F023BA09451B8F1B10952384EB58";
|
|
|
+static download_status_t auth_1_sk_1_dls;
|
|
|
+static const char *auth_1_sk_2_str =
|
|
|
+ "710865C7F06B73C5292695A8C34F1C94F769FF72";
|
|
|
+static download_status_t auth_1_sk_2_dls;
|
|
|
+
|
|
|
+ * Expected form of sk digest list for
|
|
|
+ * GETINFO downloads/cert/<auth_id_digest_1_str>/sks
|
|
|
+ */
|
|
|
+static const char *auth_1_sk_digest_expected_list =
|
|
|
+ "AA69566029B1F023BA09451B8F1B10952384EB58\n"
|
|
|
+ "710865C7F06B73C5292695A8C34F1C94F769FF72\n";
|
|
|
+
|
|
|
+
|
|
|
+static const char *auth_2_sk_1_str =
|
|
|
+ "4299047E00D070AD6703FE00BE7AA756DB061E62";
|
|
|
+static download_status_t auth_2_sk_1_dls;
|
|
|
+static const char *auth_2_sk_2_str =
|
|
|
+ "9451B8F1B10952384EB58B5F230C0BB701626C9B";
|
|
|
+static download_status_t auth_2_sk_2_dls;
|
|
|
+
|
|
|
+ * Expected form of sk digest list for
|
|
|
+ * GETINFO downloads/cert/<auth_id_digest_2_str>/sks
|
|
|
+ */
|
|
|
+static const char *auth_2_sk_digest_expected_list =
|
|
|
+ "4299047E00D070AD6703FE00BE7AA756DB061E62\n"
|
|
|
+ "9451B8F1B10952384EB58B5F230C0BB701626C9B\n";
|
|
|
+
|
|
|
+
|
|
|
+static const char *descbr_digest_1_str =
|
|
|
+ "616408544C7345822696074A1A3DFA16AB381CBD";
|
|
|
+static download_status_t descbr_digest_1_dl;
|
|
|
+static const char *descbr_digest_2_str =
|
|
|
+ "06E8067246967265DBCB6641631B530EFEC12DC3";
|
|
|
+static download_status_t descbr_digest_2_dl;
|
|
|
+
|
|
|
+static const char *descbr_expected_list =
|
|
|
+ "616408544C7345822696074A1A3DFA16AB381CBD\n"
|
|
|
+ "06E8067246967265DBCB6641631B530EFEC12DC3\n";
|
|
|
+
|
|
|
+ * Flag to make all descbr queries fail, to simulate not being
|
|
|
+ * configured such that such queries make sense.
|
|
|
+ */
|
|
|
+static int disable_descbr = 0;
|
|
|
+
|
|
|
+static void
|
|
|
+reset_mocked_dl_statuses(void)
|
|
|
+{
|
|
|
+ int i;
|
|
|
+
|
|
|
+ for (i = 0; i < N_CONSENSUS_FLAVORS; ++i) {
|
|
|
+ memcpy(&(ns_dl_status[i]), &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&(ns_dl_status_bootstrap[i]), &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&(ns_dl_status_running[i]), &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ }
|
|
|
+
|
|
|
+ memcpy(&auth_def_cert_download_status_1, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&auth_def_cert_download_status_2, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&auth_1_sk_1_dls, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&auth_1_sk_2_dls, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&auth_2_sk_1_dls, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&auth_2_sk_2_dls, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+
|
|
|
+ memcpy(&descbr_digest_1_dl, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ memcpy(&descbr_digest_2_dl, &dl_status_default,
|
|
|
+ sizeof(download_status_t));
|
|
|
+}
|
|
|
+
|
|
|
+static download_status_t *
|
|
|
+ns_dl_status_mock(consensus_flavor_t flavor)
|
|
|
+{
|
|
|
+ return &(ns_dl_status[flavor]);
|
|
|
+}
|
|
|
+
|
|
|
+static download_status_t *
|
|
|
+ns_dl_status_bootstrap_mock(consensus_flavor_t flavor)
|
|
|
+{
|
|
|
+ return &(ns_dl_status_bootstrap[flavor]);
|
|
|
+}
|
|
|
+
|
|
|
+static download_status_t *
|
|
|
+ns_dl_status_running_mock(consensus_flavor_t flavor)
|
|
|
+{
|
|
|
+ return &(ns_dl_status_running[flavor]);
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+setup_ns_mocks(void)
|
|
|
+{
|
|
|
+ MOCK(networkstatus_get_dl_status_by_flavor, ns_dl_status_mock);
|
|
|
+ MOCK(networkstatus_get_dl_status_by_flavor_bootstrap,
|
|
|
+ ns_dl_status_bootstrap_mock);
|
|
|
+ MOCK(networkstatus_get_dl_status_by_flavor_running,
|
|
|
+ ns_dl_status_running_mock);
|
|
|
+ reset_mocked_dl_statuses();
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+clear_ns_mocks(void)
|
|
|
+{
|
|
|
+ UNMOCK(networkstatus_get_dl_status_by_flavor);
|
|
|
+ UNMOCK(networkstatus_get_dl_status_by_flavor_bootstrap);
|
|
|
+ UNMOCK(networkstatus_get_dl_status_by_flavor_running);
|
|
|
+}
|
|
|
+
|
|
|
+static smartlist_t *
|
|
|
+cert_dl_status_auth_ids_mock(void)
|
|
|
+{
|
|
|
+ char digest[DIGEST_LEN], *tmp;
|
|
|
+ int len;
|
|
|
+ smartlist_t *list = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ list = smartlist_new();
|
|
|
+ len = base16_decode(digest, DIGEST_LEN,
|
|
|
+ auth_id_digest_1_str, strlen(auth_id_digest_1_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, digest, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+ len = base16_decode(digest, DIGEST_LEN,
|
|
|
+ auth_id_digest_2_str, strlen(auth_id_digest_2_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, digest, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+
|
|
|
+ done:
|
|
|
+ return list;
|
|
|
+}
|
|
|
+
|
|
|
+static download_status_t *
|
|
|
+cert_dl_status_def_for_auth_mock(const char *digest)
|
|
|
+{
|
|
|
+ download_status_t *dl = NULL;
|
|
|
+ char digest_str[HEX_DIGEST_LEN+1];
|
|
|
+
|
|
|
+ tt_assert(digest != NULL);
|
|
|
+ base16_encode(digest_str, HEX_DIGEST_LEN + 1,
|
|
|
+ digest, DIGEST_LEN);
|
|
|
+ digest_str[HEX_DIGEST_LEN] = '\0';
|
|
|
+
|
|
|
+ if (strcmp(digest_str, auth_id_digest_1_str) == 0) {
|
|
|
+ dl = &auth_def_cert_download_status_1;
|
|
|
+ } else if (strcmp(digest_str, auth_id_digest_2_str) == 0) {
|
|
|
+ dl = &auth_def_cert_download_status_2;
|
|
|
+ }
|
|
|
+
|
|
|
+ done:
|
|
|
+ return dl;
|
|
|
+}
|
|
|
+
|
|
|
+static smartlist_t *
|
|
|
+cert_dl_status_sks_for_auth_id_mock(const char *digest)
|
|
|
+{
|
|
|
+ smartlist_t *list = NULL;
|
|
|
+ char sk[DIGEST_LEN];
|
|
|
+ char digest_str[HEX_DIGEST_LEN+1];
|
|
|
+ char *tmp;
|
|
|
+ int len;
|
|
|
+
|
|
|
+ tt_assert(digest != NULL);
|
|
|
+ base16_encode(digest_str, HEX_DIGEST_LEN + 1,
|
|
|
+ digest, DIGEST_LEN);
|
|
|
+ digest_str[HEX_DIGEST_LEN] = '\0';
|
|
|
+
|
|
|
+
|
|
|
+ * Build a list of two hard-coded digests, depending on what we
|
|
|
+ * were just passed.
|
|
|
+ */
|
|
|
+ if (strcmp(digest_str, auth_id_digest_1_str) == 0) {
|
|
|
+ list = smartlist_new();
|
|
|
+ len = base16_decode(sk, DIGEST_LEN,
|
|
|
+ auth_1_sk_1_str, strlen(auth_1_sk_1_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, sk, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+ len = base16_decode(sk, DIGEST_LEN,
|
|
|
+ auth_1_sk_2_str, strlen(auth_1_sk_2_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, sk, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+ } else if (strcmp(digest_str, auth_id_digest_2_str) == 0) {
|
|
|
+ list = smartlist_new();
|
|
|
+ len = base16_decode(sk, DIGEST_LEN,
|
|
|
+ auth_2_sk_1_str, strlen(auth_2_sk_1_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, sk, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+ len = base16_decode(sk, DIGEST_LEN,
|
|
|
+ auth_2_sk_2_str, strlen(auth_2_sk_2_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, sk, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+ }
|
|
|
+
|
|
|
+ done:
|
|
|
+ return list;
|
|
|
+}
|
|
|
+
|
|
|
+static download_status_t *
|
|
|
+cert_dl_status_fp_sk_mock(const char *fp_digest, const char *sk_digest)
|
|
|
+{
|
|
|
+ download_status_t *dl = NULL;
|
|
|
+ char fp_digest_str[HEX_DIGEST_LEN+1], sk_digest_str[HEX_DIGEST_LEN+1];
|
|
|
+
|
|
|
+
|
|
|
+ * Unpack the digests so we can compare them and figure out which
|
|
|
+ * dl status we want.
|
|
|
+ */
|
|
|
+
|
|
|
+ tt_assert(fp_digest != NULL);
|
|
|
+ base16_encode(fp_digest_str, HEX_DIGEST_LEN + 1,
|
|
|
+ fp_digest, DIGEST_LEN);
|
|
|
+ fp_digest_str[HEX_DIGEST_LEN] = '\0';
|
|
|
+ tt_assert(sk_digest != NULL);
|
|
|
+ base16_encode(sk_digest_str, HEX_DIGEST_LEN + 1,
|
|
|
+ sk_digest, DIGEST_LEN);
|
|
|
+ sk_digest_str[HEX_DIGEST_LEN] = '\0';
|
|
|
+
|
|
|
+ if (strcmp(fp_digest_str, auth_id_digest_1_str) == 0) {
|
|
|
+ if (strcmp(sk_digest_str, auth_1_sk_1_str) == 0) {
|
|
|
+ dl = &auth_1_sk_1_dls;
|
|
|
+ } else if (strcmp(sk_digest_str, auth_1_sk_2_str) == 0) {
|
|
|
+ dl = &auth_1_sk_2_dls;
|
|
|
+ }
|
|
|
+ } else if (strcmp(fp_digest_str, auth_id_digest_2_str) == 0) {
|
|
|
+ if (strcmp(sk_digest_str, auth_2_sk_1_str) == 0) {
|
|
|
+ dl = &auth_2_sk_1_dls;
|
|
|
+ } else if (strcmp(sk_digest_str, auth_2_sk_2_str) == 0) {
|
|
|
+ dl = &auth_2_sk_2_dls;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ done:
|
|
|
+ return dl;
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+setup_cert_mocks(void)
|
|
|
+{
|
|
|
+ MOCK(list_authority_ids_with_downloads, cert_dl_status_auth_ids_mock);
|
|
|
+ MOCK(id_only_download_status_for_authority_id,
|
|
|
+ cert_dl_status_def_for_auth_mock);
|
|
|
+ MOCK(list_sk_digests_for_authority_id,
|
|
|
+ cert_dl_status_sks_for_auth_id_mock);
|
|
|
+ MOCK(download_status_for_authority_id_and_sk,
|
|
|
+ cert_dl_status_fp_sk_mock);
|
|
|
+ reset_mocked_dl_statuses();
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+clear_cert_mocks(void)
|
|
|
+{
|
|
|
+ UNMOCK(list_authority_ids_with_downloads);
|
|
|
+ UNMOCK(id_only_download_status_for_authority_id);
|
|
|
+ UNMOCK(list_sk_digests_for_authority_id);
|
|
|
+ UNMOCK(download_status_for_authority_id_and_sk);
|
|
|
+}
|
|
|
+
|
|
|
+static smartlist_t *
|
|
|
+descbr_get_digests_mock(void)
|
|
|
+{
|
|
|
+ char digest[DIGEST_LEN], *tmp;
|
|
|
+ int len;
|
|
|
+ smartlist_t *list = NULL;
|
|
|
+
|
|
|
+ if (!disable_descbr) {
|
|
|
+
|
|
|
+ list = smartlist_new();
|
|
|
+ len = base16_decode(digest, DIGEST_LEN,
|
|
|
+ descbr_digest_1_str, strlen(descbr_digest_1_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, digest, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+ len = base16_decode(digest, DIGEST_LEN,
|
|
|
+ descbr_digest_2_str, strlen(descbr_digest_2_str));
|
|
|
+ tt_int_op(len, OP_EQ, DIGEST_LEN);
|
|
|
+ tmp = tor_malloc(DIGEST_LEN);
|
|
|
+ memcpy(tmp, digest, DIGEST_LEN);
|
|
|
+ smartlist_add(list, tmp);
|
|
|
+ }
|
|
|
+
|
|
|
+ done:
|
|
|
+ return list;
|
|
|
+}
|
|
|
+
|
|
|
+static download_status_t *
|
|
|
+descbr_get_dl_by_digest_mock(const char *digest)
|
|
|
+{
|
|
|
+ download_status_t *dl = NULL;
|
|
|
+ char digest_str[HEX_DIGEST_LEN+1];
|
|
|
+
|
|
|
+ if (!disable_descbr) {
|
|
|
+ tt_assert(digest != NULL);
|
|
|
+ base16_encode(digest_str, HEX_DIGEST_LEN + 1,
|
|
|
+ digest, DIGEST_LEN);
|
|
|
+ digest_str[HEX_DIGEST_LEN] = '\0';
|
|
|
+
|
|
|
+ if (strcmp(digest_str, descbr_digest_1_str) == 0) {
|
|
|
+ dl = &descbr_digest_1_dl;
|
|
|
+ } else if (strcmp(digest_str, descbr_digest_2_str) == 0) {
|
|
|
+ dl = &descbr_digest_2_dl;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ done:
|
|
|
+ return dl;
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+setup_desc_mocks(void)
|
|
|
+{
|
|
|
+ MOCK(router_get_descriptor_digests,
|
|
|
+ descbr_get_digests_mock);
|
|
|
+ MOCK(router_get_dl_status_by_descriptor_digest,
|
|
|
+ descbr_get_dl_by_digest_mock);
|
|
|
+ reset_mocked_dl_statuses();
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+clear_desc_mocks(void)
|
|
|
+{
|
|
|
+ UNMOCK(router_get_descriptor_digests);
|
|
|
+ UNMOCK(router_get_dl_status_by_descriptor_digest);
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+setup_bridge_mocks(void)
|
|
|
+{
|
|
|
+ disable_descbr = 0;
|
|
|
+
|
|
|
+ MOCK(list_bridge_identities,
|
|
|
+ descbr_get_digests_mock);
|
|
|
+ MOCK(get_bridge_dl_status_by_id,
|
|
|
+ descbr_get_dl_by_digest_mock);
|
|
|
+ reset_mocked_dl_statuses();
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+clear_bridge_mocks(void)
|
|
|
+{
|
|
|
+ UNMOCK(list_bridge_identities);
|
|
|
+ UNMOCK(get_bridge_dl_status_by_id);
|
|
|
+
|
|
|
+ disable_descbr = 0;
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+test_download_status_consensus(void *arg)
|
|
|
+{
|
|
|
+
|
|
|
+ control_connection_t dummy;
|
|
|
+
|
|
|
+ char *answer = NULL;
|
|
|
+ const char *errmsg = NULL;
|
|
|
+
|
|
|
+ (void)arg;
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/foo", &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "Unknown download status query");
|
|
|
+
|
|
|
+ setup_ns_mocks();
|
|
|
+
|
|
|
+
|
|
|
+ * Check returning serialized dlstatuses, and implicitly also test
|
|
|
+ * download_status_to_string().
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&(ns_dl_status[FLAV_NS]), &dls_sample_1,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/networkstatus/ns",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_1_str);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&(ns_dl_status[FLAV_MICRODESC]), &dls_sample_2,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/networkstatus/microdesc",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_2_str);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&(ns_dl_status_bootstrap[FLAV_NS]), &dls_sample_3,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/networkstatus/ns/bootstrap",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_3_str);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&(ns_dl_status_bootstrap[FLAV_MICRODESC]), &dls_sample_4,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/networkstatus/microdesc/bootstrap",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_4_str);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&(ns_dl_status_running[FLAV_NS]), &dls_sample_5,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/networkstatus/ns/running",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_5_str);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&(ns_dl_status_running[FLAV_MICRODESC]), &dls_sample_6,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/networkstatus/microdesc/running",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_6_str);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/networkstatus/foo",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "Unknown flavor");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+ done:
|
|
|
+ clear_ns_mocks();
|
|
|
+ tor_free(answer);
|
|
|
+
|
|
|
+ return;
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+test_download_status_cert(void *arg)
|
|
|
+{
|
|
|
+
|
|
|
+ control_connection_t dummy;
|
|
|
+
|
|
|
+ char *question = NULL;
|
|
|
+ char *answer = NULL;
|
|
|
+ const char *errmsg = NULL;
|
|
|
+
|
|
|
+ (void)arg;
|
|
|
+
|
|
|
+ setup_cert_mocks();
|
|
|
+
|
|
|
+
|
|
|
+ * Check returning serialized dlstatuses and digest lists, and implicitly
|
|
|
+ * also test download_status_to_string() and digest_list_to_string().
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fps",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, auth_id_digest_expected_list);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&auth_def_cert_download_status_1, &dls_sample_1,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s", auth_id_digest_1_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_1_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&auth_def_cert_download_status_2, &dls_sample_2,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s", auth_id_digest_2_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_2_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s/sks", auth_id_digest_1_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, auth_1_sk_digest_expected_list);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s/sks", auth_id_digest_2_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, auth_2_sk_digest_expected_list);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&auth_1_sk_1_dls, &dls_sample_3,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s/%s",
|
|
|
+ auth_id_digest_1_str, auth_1_sk_1_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_3_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&auth_1_sk_2_dls, &dls_sample_4,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s/%s",
|
|
|
+ auth_id_digest_1_str, auth_1_sk_2_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_4_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&auth_2_sk_1_dls, &dls_sample_5,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s/%s",
|
|
|
+ auth_id_digest_2_str, auth_2_sk_1_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_5_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&auth_2_sk_2_dls, &dls_sample_6,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/cert/fp/%s/%s",
|
|
|
+ auth_id_digest_2_str, auth_2_sk_2_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_6_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/cert/blahdeblah",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "Unknown certificate download status query");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 2 - looks like downloads/cert/fp/<fp>, but <fp> isn't even
|
|
|
+ * the right length for a digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/cert/fp/2B1D36D32B2942406",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 3 - looks like downloads/cert/fp/<fp>, and <fp> is digest-sized,
|
|
|
+ * but not parseable as one.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/82F52AF55D250115FE44D3GC81D49643241D56A1",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 4 - downloads/cert/fp/<fp>, and <fp> is not a known authority
|
|
|
+ * identity digest
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ,
|
|
|
+ "Failed to get download status for this authority identity digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 5 - looks like downloads/cert/fp/<fp>/<anything>, but <fp> doesn't
|
|
|
+ * parse as a sensible digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/82F52AF55D250115FE44D3GC81D49643241D56A1/blah",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like an identity digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 6 - looks like downloads/cert/fp/<fp>/<anything>, but <fp> doesn't
|
|
|
+ * parse as a sensible digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/82F52AF55D25/blah",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like an identity digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 7 - downloads/cert/fp/<fp>/sks, and <fp> is not a known authority
|
|
|
+ * digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/sks",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ,
|
|
|
+ "Failed to get list of signing key digests for this authority "
|
|
|
+ "identity digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 8 - looks like downloads/cert/fp/<fp>/<sk>, but <sk> doesn't
|
|
|
+ * parse as a signing key digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/"
|
|
|
+ "82F52AF55D250115FE44D3GC81D49643241D56A1",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like a signing key digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 9 - looks like downloads/cert/fp/<fp>/<sk>, but <sk> doesn't
|
|
|
+ * parse as a signing key digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/"
|
|
|
+ "82F52AF55D250115FE44D",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like a signing key digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 10 - downloads/cert/fp/<fp>/<sk>, but <fp> isn't a known
|
|
|
+ * authority identity digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/C6B05DF332F74DB9A13498EE3BBC7AA2F69FCB45/"
|
|
|
+ "3A214FC21AE25B012C2ECCB5F4EC8A3602D0545D",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ,
|
|
|
+ "Failed to get download status for this identity/"
|
|
|
+ "signing key digest pair");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 11 - downloads/cert/fp/<fp>/<sk>, but <sk> isn't a known
|
|
|
+ * signing key digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/63CDD326DFEF0CA020BDD3FEB45A3286FE13A061/"
|
|
|
+ "3A214FC21AE25B012C2ECCB5F4EC8A3602D0545D",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ,
|
|
|
+ "Failed to get download status for this identity/"
|
|
|
+ "signing key digest pair");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ * Case 12 - downloads/cert/fp/<fp>/<sk>, but <sk> is on the list for
|
|
|
+ * a different authority identity digest.
|
|
|
+ */
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/cert/fp/63CDD326DFEF0CA020BDD3FEB45A3286FE13A061/"
|
|
|
+ "9451B8F1B10952384EB58B5F230C0BB701626C9B",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ,
|
|
|
+ "Failed to get download status for this identity/"
|
|
|
+ "signing key digest pair");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+ done:
|
|
|
+ clear_cert_mocks();
|
|
|
+ tor_free(answer);
|
|
|
+
|
|
|
+ return;
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+test_download_status_desc(void *arg)
|
|
|
+{
|
|
|
+
|
|
|
+ control_connection_t dummy;
|
|
|
+
|
|
|
+ char *question = NULL;
|
|
|
+ char *answer = NULL;
|
|
|
+ const char *errmsg = NULL;
|
|
|
+
|
|
|
+ (void)arg;
|
|
|
+
|
|
|
+ setup_desc_mocks();
|
|
|
+
|
|
|
+
|
|
|
+ * Check returning serialized dlstatuses and digest lists, and implicitly
|
|
|
+ * also test download_status_to_string() and digest_list_to_string().
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/desc/descs",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, descbr_expected_list);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&descbr_digest_1_dl, &dls_sample_1,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/desc/%s", descbr_digest_1_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_1_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&descbr_digest_2_dl, &dls_sample_2,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/desc/%s", descbr_digest_2_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_2_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/desc/blahdeblah",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "Unknown router descriptor download status query");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(
|
|
|
+ &dummy,
|
|
|
+ "downloads/desc/774EC52FD9A5B80A6FACZE536616E8022E3470AG",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(
|
|
|
+ &dummy,
|
|
|
+ "downloads/desc/B05B46135B0B2C04EBE1DD6A6AE4B12D7CD2226A",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "No such descriptor digest found");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ disable_descbr = 1;
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/desc/descs",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ,
|
|
|
+ "We don't seem to have a networkstatus-flavored consensus");
|
|
|
+ errmsg = NULL;
|
|
|
+ disable_descbr = 0;
|
|
|
+
|
|
|
+ done:
|
|
|
+ clear_desc_mocks();
|
|
|
+ tor_free(answer);
|
|
|
+
|
|
|
+ return;
|
|
|
+}
|
|
|
+
|
|
|
+static void
|
|
|
+test_download_status_bridge(void *arg)
|
|
|
+{
|
|
|
+
|
|
|
+ control_connection_t dummy;
|
|
|
+
|
|
|
+ char *question = NULL;
|
|
|
+ char *answer = NULL;
|
|
|
+ const char *errmsg = NULL;
|
|
|
+
|
|
|
+ (void)arg;
|
|
|
+
|
|
|
+ setup_bridge_mocks();
|
|
|
+
|
|
|
+
|
|
|
+ * Check returning serialized dlstatuses and digest lists, and implicitly
|
|
|
+ * also test download_status_to_string() and digest_list_to_string().
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/bridge/bridges",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, descbr_expected_list);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&descbr_digest_1_dl, &dls_sample_3,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/bridge/%s", descbr_digest_1_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_3_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&descbr_digest_2_dl, &dls_sample_4,
|
|
|
+ sizeof(download_status_t));
|
|
|
+ tor_asprintf(&question, "downloads/bridge/%s", descbr_digest_2_str);
|
|
|
+ tt_assert(question != NULL);
|
|
|
+ getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
|
|
|
+ tt_assert(answer != NULL);
|
|
|
+ tt_assert(errmsg == NULL);
|
|
|
+ tt_str_op(answer, OP_EQ, dls_sample_4_str);
|
|
|
+ tor_free(question);
|
|
|
+ tor_free(answer);
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(&dummy, "downloads/bridge/blahdeblah",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "Unknown bridge descriptor download status query");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(
|
|
|
+ &dummy,
|
|
|
+ "downloads/bridge/774EC52FD9A5B80A6FACZE536616E8022E3470AG",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ getinfo_helper_downloads(
|
|
|
+ &dummy,
|
|
|
+ "downloads/bridge/B05B46135B0B2C04EBE1DD6A6AE4B12D7CD2226A",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "No such bridge identity digest found");
|
|
|
+ errmsg = NULL;
|
|
|
+
|
|
|
+
|
|
|
+ disable_descbr = 1;
|
|
|
+ getinfo_helper_downloads(&dummy,
|
|
|
+ "downloads/bridge/bridges",
|
|
|
+ &answer, &errmsg);
|
|
|
+ tt_assert(answer == NULL);
|
|
|
+ tt_assert(errmsg != NULL);
|
|
|
+ tt_str_op(errmsg, OP_EQ, "We don't seem to be using bridges");
|
|
|
+ errmsg = NULL;
|
|
|
+ disable_descbr = 0;
|
|
|
+
|
|
|
+ done:
|
|
|
+ clear_bridge_mocks();
|
|
|
+ tor_free(answer);
|
|
|
+
|
|
|
+ return;
|
|
|
+}
|
|
|
+
|
|
|
struct testcase_t controller_tests[] = {
|
|
|
{ "add_onion_helper_keyarg", test_add_onion_helper_keyarg, 0, NULL, NULL },
|
|
|
{ "rend_service_parse_port_config", test_rend_service_parse_port_config, 0,
|
|
|
NULL, NULL },
|
|
|
{ "add_onion_helper_clientauth", test_add_onion_helper_clientauth, 0, NULL,
|
|
|
NULL },
|
|
|
+ { "download_status_consensus", test_download_status_consensus, 0, NULL,
|
|
|
+ NULL },
|
|
|
+ { "download_status_cert", test_download_status_cert, 0, NULL,
|
|
|
+ NULL },
|
|
|
+ { "download_status_desc", test_download_status_desc, 0, NULL, NULL },
|
|
|
+ { "download_status_bridge", test_download_status_bridge, 0, NULL, NULL },
|
|
|
END_OF_TESTCASES
|
|
|
};
|
|
|
|