123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950 |
- /* Copyright (c) 2001-2004, Roger Dingledine.
- * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
- * Copyright (c) 2007-2016, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- #include "orconfig.h"
- #define CONFIG_PRIVATE
- #define PT_PRIVATE
- #define ROUTERSET_PRIVATE
- #include "or.h"
- #include "address.h"
- #include "addressmap.h"
- #include "bridges.h"
- #include "circuitmux_ewma.h"
- #include "circuitbuild.h"
- #include "config.h"
- #include "confparse.h"
- #include "connection.h"
- #include "connection_edge.h"
- #include "test.h"
- #include "util.h"
- #include "address.h"
- #include "connection_or.h"
- #include "control.h"
- #include "cpuworker.h"
- #include "dirserv.h"
- #include "dirvote.h"
- #include "dns.h"
- #include "entrynodes.h"
- #include "transports.h"
- #include "ext_orport.h"
- #include "geoip.h"
- #include "hibernate.h"
- #include "main.h"
- #include "networkstatus.h"
- #include "nodelist.h"
- #include "policies.h"
- #include "rendclient.h"
- #include "rendservice.h"
- #include "router.h"
- #include "routerlist.h"
- #include "routerset.h"
- #include "statefile.h"
- #include "test.h"
- #include "transports.h"
- #include "util.h"
- static void
- test_config_addressmap(void *arg)
- {
- char buf[1024];
- char address[256];
- time_t expires = TIME_MAX;
- (void)arg;
- strlcpy(buf, "MapAddress .invalidwildcard.com *.torserver.exit\n" // invalid
- "MapAddress *invalidasterisk.com *.torserver.exit\n" // invalid
- "MapAddress *.google.com *.torserver.exit\n"
- "MapAddress *.yahoo.com *.google.com.torserver.exit\n"
- "MapAddress *.cn.com www.cnn.com\n"
- "MapAddress *.cnn.com www.cnn.com\n"
- "MapAddress ex.com www.cnn.com\n"
- "MapAddress ey.com *.cnn.com\n"
- "MapAddress www.torproject.org 1.1.1.1\n"
- "MapAddress other.torproject.org "
- "this.torproject.org.otherserver.exit\n"
- "MapAddress test.torproject.org 2.2.2.2\n"
- "MapAddress www.google.com 3.3.3.3\n"
- "MapAddress www.example.org 4.4.4.4\n"
- "MapAddress 4.4.4.4 7.7.7.7\n"
- "MapAddress 4.4.4.4 5.5.5.5\n"
- "MapAddress www.infiniteloop.org 6.6.6.6\n"
- "MapAddress 6.6.6.6 www.infiniteloop.org\n"
- , sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- /* Use old interface for now, so we don't need to rewrite the unit tests */
- #define addressmap_rewrite(a,s,eo,ao) \
- addressmap_rewrite((a),(s), ~0, (eo),(ao))
- /* MapAddress .invalidwildcard.com .torserver.exit - no match */
- strlcpy(address, "www.invalidwildcard.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* MapAddress *invalidasterisk.com .torserver.exit - no match */
- strlcpy(address, "www.invalidasterisk.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Where no mapping for FQDN match on top-level domain */
- /* MapAddress .google.com .torserver.exit */
- strlcpy(address, "reader.google.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "reader.torserver.exit");
- /* MapAddress *.yahoo.com *.google.com.torserver.exit */
- strlcpy(address, "reader.yahoo.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "reader.google.com.torserver.exit");
- /*MapAddress *.cnn.com www.cnn.com */
- strlcpy(address, "cnn.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.cnn.com");
- /* MapAddress .cn.com www.cnn.com */
- strlcpy(address, "www.cn.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.cnn.com");
- /* MapAddress ex.com www.cnn.com - no match */
- strlcpy(address, "www.ex.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* MapAddress ey.com *.cnn.com - invalid expression */
- strlcpy(address, "ey.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Where mapping for FQDN match on FQDN */
- strlcpy(address, "www.google.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "3.3.3.3");
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "other.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "this.torproject.org.otherserver.exit");
- strlcpy(address, "test.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "2.2.2.2");
- /* Test a chain of address mappings and the order in which they were added:
- "MapAddress www.example.org 4.4.4.4"
- "MapAddress 4.4.4.4 7.7.7.7"
- "MapAddress 4.4.4.4 5.5.5.5"
- */
- strlcpy(address, "www.example.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "5.5.5.5");
- /* Test infinite address mapping results in no change */
- strlcpy(address, "www.infiniteloop.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.infiniteloop.org");
- /* Test we don't find false positives */
- strlcpy(address, "www.example.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Test top-level-domain matching a bit harder */
- config_free_lines(get_options_mutable()->AddressMap);
- addressmap_clear_configured();
- strlcpy(buf, "MapAddress *.com *.torserver.exit\n"
- "MapAddress *.torproject.org 1.1.1.1\n"
- "MapAddress *.net 2.2.2.2\n"
- , sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- strlcpy(address, "www.abc.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.abc.torserver.exit");
- strlcpy(address, "www.def.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.def.torserver.exit");
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "test.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "torproject.net", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "2.2.2.2");
- /* We don't support '*' as a mapping directive */
- config_free_lines(get_options_mutable()->AddressMap);
- addressmap_clear_configured();
- strlcpy(buf, "MapAddress * *.torserver.exit\n", sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- strlcpy(address, "www.abc.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- strlcpy(address, "www.def.net", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- #undef addressmap_rewrite
- done:
- config_free_lines(get_options_mutable()->AddressMap);
- get_options_mutable()->AddressMap = NULL;
- addressmap_free_all();
- }
- static int
- is_private_dir(const char* path)
- {
- struct stat st;
- int r = stat(path, &st);
- if (r) {
- return 0;
- }
- #if !defined (_WIN32)
- if ((st.st_mode & (S_IFDIR | 0777)) != (S_IFDIR | 0700)) {
- return 0;
- }
- #endif
- return 1;
- }
- static void
- test_config_check_or_create_data_subdir(void *arg)
- {
- or_options_t *options = get_options_mutable();
- char *datadir;
- const char *subdir = "test_stats";
- char *subpath;
- struct stat st;
- int r;
- #if !defined (_WIN32)
- unsigned group_permission;
- #endif
- (void)arg;
- tor_free(options->DataDirectory);
- datadir = options->DataDirectory = tor_strdup(get_fname("datadir-0"));
- subpath = get_datadir_fname(subdir);
- #if defined (_WIN32)
- tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0);
- #else
- tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0);
- #endif
- r = stat(subpath, &st);
- // The subdirectory shouldn't exist yet,
- // but should be created by the call to check_or_create_data_subdir.
- tt_assert(r && (errno == ENOENT));
- tt_assert(!check_or_create_data_subdir(subdir));
- tt_assert(is_private_dir(subpath));
- // The check should return 0, if the directory already exists
- // and is private to the user.
- tt_assert(!check_or_create_data_subdir(subdir));
- r = stat(subpath, &st);
- if (r) {
- tt_abort_perror("stat");
- }
- #if !defined (_WIN32)
- group_permission = st.st_mode | 0070;
- r = chmod(subpath, group_permission);
- if (r) {
- tt_abort_perror("chmod");
- }
- // If the directory exists, but its mode is too permissive
- // a call to check_or_create_data_subdir should reset the mode.
- tt_assert(!is_private_dir(subpath));
- tt_assert(!check_or_create_data_subdir(subdir));
- tt_assert(is_private_dir(subpath));
- #endif
- done:
- rmdir(subpath);
- tor_free(datadir);
- tor_free(subpath);
- }
- static void
- test_config_write_to_data_subdir(void *arg)
- {
- or_options_t* options = get_options_mutable();
- char *datadir;
- char *cp = NULL;
- const char* subdir = "test_stats";
- const char* fname = "test_file";
- const char* str =
- "Lorem ipsum dolor sit amet, consetetur sadipscing\n"
- "elitr, sed diam nonumy eirmod\n"
- "tempor invidunt ut labore et dolore magna aliquyam\n"
- "erat, sed diam voluptua.\n"
- "At vero eos et accusam et justo duo dolores et ea\n"
- "rebum. Stet clita kasd gubergren,\n"
- "no sea takimata sanctus est Lorem ipsum dolor sit amet.\n"
- "Lorem ipsum dolor sit amet,\n"
- "consetetur sadipscing elitr, sed diam nonumy eirmod\n"
- "tempor invidunt ut labore et dolore\n"
- "magna aliquyam erat, sed diam voluptua. At vero eos et\n"
- "accusam et justo duo dolores et\n"
- "ea rebum. Stet clita kasd gubergren, no sea takimata\n"
- "sanctus est Lorem ipsum dolor sit amet.";
- char* filepath = NULL;
- (void)arg;
- tor_free(options->DataDirectory);
- datadir = options->DataDirectory = tor_strdup(get_fname("datadir-1"));
- filepath = get_datadir_fname2(subdir, fname);
- #if defined (_WIN32)
- tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0);
- #else
- tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0);
- #endif
- // Write attempt shoudl fail, if subdirectory doesn't exist.
- tt_assert(write_to_data_subdir(subdir, fname, str, NULL));
- tt_assert(! check_or_create_data_subdir(subdir));
- // Content of file after write attempt should be
- // equal to the original string.
- tt_assert(!write_to_data_subdir(subdir, fname, str, NULL));
- cp = read_file_to_str(filepath, 0, NULL);
- tt_str_op(cp,OP_EQ, str);
- tor_free(cp);
- // A second write operation should overwrite the old content.
- tt_assert(!write_to_data_subdir(subdir, fname, str, NULL));
- cp = read_file_to_str(filepath, 0, NULL);
- tt_str_op(cp,OP_EQ, str);
- tor_free(cp);
- done:
- (void) unlink(filepath);
- rmdir(options->DataDirectory);
- tor_free(datadir);
- tor_free(filepath);
- tor_free(cp);
- }
- /* Test helper function: Make sure that a bridge line gets parsed
- * properly. Also make sure that the resulting bridge_line_t structure
- * has its fields set correctly. */
- static void
- good_bridge_line_test(const char *string, const char *test_addrport,
- const char *test_digest, const char *test_transport,
- const smartlist_t *test_socks_args)
- {
- char *tmp = NULL;
- bridge_line_t *bridge_line = parse_bridge_line(string);
- tt_assert(bridge_line);
- /* test addrport */
- tmp = tor_strdup(fmt_addrport(&bridge_line->addr, bridge_line->port));
- tt_str_op(test_addrport,OP_EQ, tmp);
- tor_free(tmp);
- /* If we were asked to validate a digest, but we did not get a
- digest after parsing, we failed. */
- if (test_digest && tor_digest_is_zero(bridge_line->digest))
- tt_assert(0);
- /* If we were not asked to validate a digest, and we got a digest
- after parsing, we failed again. */
- if (!test_digest && !tor_digest_is_zero(bridge_line->digest))
- tt_assert(0);
- /* If we were asked to validate a digest, and we got a digest after
- parsing, make sure it's correct. */
- if (test_digest) {
- tmp = tor_strdup(hex_str(bridge_line->digest, DIGEST_LEN));
- tor_strlower(tmp);
- tt_str_op(test_digest,OP_EQ, tmp);
- tor_free(tmp);
- }
- /* If we were asked to validate a transport name, make sure tha it
- matches with the transport name that was parsed. */
- if (test_transport && !bridge_line->transport_name)
- tt_assert(0);
- if (!test_transport && bridge_line->transport_name)
- tt_assert(0);
- if (test_transport)
- tt_str_op(test_transport,OP_EQ, bridge_line->transport_name);
- /* Validate the SOCKS argument smartlist. */
- if (test_socks_args && !bridge_line->socks_args)
- tt_assert(0);
- if (!test_socks_args && bridge_line->socks_args)
- tt_assert(0);
- if (test_socks_args)
- tt_assert(smartlist_strings_eq(test_socks_args,
- bridge_line->socks_args));
- done:
- tor_free(tmp);
- bridge_line_free(bridge_line);
- }
- /* Test helper function: Make sure that a bridge line is
- * unparseable. */
- static void
- bad_bridge_line_test(const char *string)
- {
- bridge_line_t *bridge_line = parse_bridge_line(string);
- if (bridge_line)
- TT_FAIL(("%s was supposed to fail, but it didn't.", string));
- tt_assert(!bridge_line);
- done:
- bridge_line_free(bridge_line);
- }
- static void
- test_config_parse_bridge_line(void *arg)
- {
- (void) arg;
- good_bridge_line_test("192.0.2.1:4123",
- "192.0.2.1:4123", NULL, NULL, NULL);
- good_bridge_line_test("192.0.2.1",
- "192.0.2.1:443", NULL, NULL, NULL);
- good_bridge_line_test("transport [::1]",
- "[::1]:443", NULL, "transport", NULL);
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "192.0.2.1:12",
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "transport", NULL);
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413 twoandtwo=five",
- "192.0.2.1:12", "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
- smartlist_add_asprintf(sl_tmp, "z=z");
- good_bridge_line_test("transport 192.0.2.1:12 twoandtwo=five z=z",
- "192.0.2.1:12", NULL, "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "dub=come");
- smartlist_add_asprintf(sl_tmp, "save=me");
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349666 "
- "dub=come save=me",
- "192.0.2.1:12",
- "4352e58420e68f5e40bf7c74faddccd9d1349666",
- "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- good_bridge_line_test("192.0.2.1:1231 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "192.0.2.1:1231",
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- NULL, NULL);
- /* Empty line */
- bad_bridge_line_test("");
- /* bad transport name */
- bad_bridge_line_test("tr$n_sp0r7 190.20.2.2");
- /* weird ip address */
- bad_bridge_line_test("a.b.c.d");
- /* invalid fpr */
- bad_bridge_line_test("2.2.2.2:1231 4352e58420e68f5e40bf7c74faddccd9d1349");
- /* no k=v in the end */
- bad_bridge_line_test("obfs2 2.2.2.2:1231 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413 what");
- /* no addrport */
- bad_bridge_line_test("asdw");
- /* huge k=v value that can't fit in SOCKS fields */
- bad_bridge_line_test(
- "obfs2 2.2.2.2:1231 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aa=b");
- }
- static void
- test_config_parse_transport_options_line(void *arg)
- {
- smartlist_t *options_sl = NULL, *sl_tmp = NULL;
- (void) arg;
- { /* too small line */
- options_sl = get_options_from_transport_options_line("valley", NULL);
- tt_assert(!options_sl);
- }
- { /* no k=v values */
- options_sl = get_options_from_transport_options_line("hit it!", NULL);
- tt_assert(!options_sl);
- }
- { /* correct line, but wrong transport specified */
- options_sl =
- get_options_from_transport_options_line("trebuchet k=v", "rook");
- tt_assert(!options_sl);
- }
- { /* correct -- no transport specified */
- sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "ladi=dadi");
- smartlist_add_asprintf(sl_tmp, "weliketo=party");
- options_sl =
- get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
- NULL);
- tt_assert(options_sl);
- tt_assert(smartlist_strings_eq(options_sl, sl_tmp));
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- sl_tmp = NULL;
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- options_sl = NULL;
- }
- { /* correct -- correct transport specified */
- sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "ladi=dadi");
- smartlist_add_asprintf(sl_tmp, "weliketo=party");
- options_sl =
- get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
- "rook");
- tt_assert(options_sl);
- tt_assert(smartlist_strings_eq(options_sl, sl_tmp));
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- sl_tmp = NULL;
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- options_sl = NULL;
- }
- done:
- if (options_sl) {
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- }
- if (sl_tmp) {
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- }
- /* Mocks needed for the transport plugin line test */
- static void pt_kickstart_proxy_mock(const smartlist_t *transport_list,
- char **proxy_argv, int is_server);
- static int transport_add_from_config_mock(const tor_addr_t *addr,
- uint16_t port, const char *name,
- int socks_ver);
- static int transport_is_needed_mock(const char *transport_name);
- static int pt_kickstart_proxy_mock_call_count = 0;
- static int transport_add_from_config_mock_call_count = 0;
- static int transport_is_needed_mock_call_count = 0;
- static int transport_is_needed_mock_return = 0;
- static void
- pt_kickstart_proxy_mock(const smartlist_t *transport_list,
- char **proxy_argv, int is_server)
- {
- (void) transport_list;
- (void) proxy_argv;
- (void) is_server;
- /* XXXX check that args are as expected. */
- ++pt_kickstart_proxy_mock_call_count;
- free_execve_args(proxy_argv);
- }
- static int
- transport_add_from_config_mock(const tor_addr_t *addr,
- uint16_t port, const char *name,
- int socks_ver)
- {
- (void) addr;
- (void) port;
- (void) name;
- (void) socks_ver;
- /* XXXX check that args are as expected. */
- ++transport_add_from_config_mock_call_count;
- return 0;
- }
- static int
- transport_is_needed_mock(const char *transport_name)
- {
- (void) transport_name;
- /* XXXX check that arg is as expected. */
- ++transport_is_needed_mock_call_count;
- return transport_is_needed_mock_return;
- }
- /**
- * Test parsing for the ClientTransportPlugin and ServerTransportPlugin config
- * options.
- */
- static void
- test_config_parse_transport_plugin_line(void *arg)
- {
- (void)arg;
- or_options_t *options = get_options_mutable();
- int r, tmp;
- int old_pt_kickstart_proxy_mock_call_count;
- int old_transport_add_from_config_mock_call_count;
- int old_transport_is_needed_mock_call_count;
- /* Bad transport lines - too short */
- r = parse_transport_line(options, "bad", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options, "bad", 1, 1);
- tt_assert(r < 0);
- r = parse_transport_line(options, "bad bad", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options, "bad bad", 1, 1);
- tt_assert(r < 0);
- /* Test transport list parsing */
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r == 0);
- /* Bad transport identifiers */
- r = parse_transport_line(options,
- "transport_* exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_* exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r < 0);
- /* Check SOCKS cases for client transport */
- r = parse_transport_line(options,
- "transport_1 socks4 1.2.3.4:567", 1, 0);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4:567", 1, 0);
- tt_assert(r == 0);
- /* Proxy case for server transport */
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4:567", 1, 1);
- tt_assert(r == 0);
- /* Multiple-transport error exit */
- r = parse_transport_line(options,
- "transport_1,transport_2 socks5 1.2.3.4:567", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 proxy 1.2.3.4:567", 1, 1);
- /* No port error exit */
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4", 1, 1);
- tt_assert(r < 0);
- /* Unparsable address error exit */
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3:6x7", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3:6x7", 1, 1);
- tt_assert(r < 0);
- /* "Strange {Client|Server}TransportPlugin field" error exit */
- r = parse_transport_line(options,
- "transport_1 foo bar", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 foo bar", 1, 1);
- tt_assert(r < 0);
- /* No sandbox mode error exit */
- tmp = options->Sandbox;
- options->Sandbox = 1;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r < 0);
- options->Sandbox = tmp;
- /*
- * These final test cases cover code paths that only activate without
- * validate_only, so they need mocks in place.
- */
- MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock);
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 1);
- tt_assert(r == 0);
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count + 1);
- UNMOCK(pt_kickstart_proxy);
- /* This one hits a log line in the !validate_only case only */
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4:567", 0, 1);
- tt_assert(r == 0);
- /* Check mocked client transport cases */
- MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock);
- MOCK(transport_add_from_config, transport_add_from_config_mock);
- MOCK(transport_is_needed, transport_is_needed_mock);
- /* Unnecessary transport case */
- transport_is_needed_mock_return = 0;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 0);
- /* Should have succeeded */
- tt_assert(r == 0);
- /* transport_is_needed() should have been called */
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /*
- * pt_kickstart_proxy() and transport_add_from_config() should
- * not have been called.
- */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count);
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count);
- /* Necessary transport case */
- transport_is_needed_mock_return = 1;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 0);
- /* Should have succeeded */
- tt_assert(r == 0);
- /*
- * transport_is_needed() and pt_kickstart_proxy() should have been
- * called.
- */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count + 1);
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /* transport_add_from_config() should not have been called. */
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count);
- /* proxy case */
- transport_is_needed_mock_return = 1;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4:567", 0, 0);
- /* Should have succeeded */
- tt_assert(r == 0);
- /*
- * transport_is_needed() and transport_add_from_config() should have
- * been called.
- */
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count + 1);
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /* pt_kickstart_proxy() should not have been called. */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count);
- /* Done with mocked client transport cases */
- UNMOCK(transport_is_needed);
- UNMOCK(transport_add_from_config);
- UNMOCK(pt_kickstart_proxy);
- done:
- /* Make sure we undo all mocks */
- UNMOCK(pt_kickstart_proxy);
- UNMOCK(transport_add_from_config);
- UNMOCK(transport_is_needed);
- return;
- }
- // Tests if an options with MyFamily fingerprints missing '$' normalises
- // them correctly and also ensure it also works with multiple fingerprints
- static void
- test_config_fix_my_family(void *arg)
- {
- char *err = NULL;
- const char *family = "$1111111111111111111111111111111111111111, "
- "1111111111111111111111111111111111111112, "
- "$1111111111111111111111111111111111111113";
- or_options_t* options = options_new();
- or_options_t* defaults = options_new();
- (void) arg;
- options_init(options);
- options_init(defaults);
- options->MyFamily = tor_strdup(family);
- options_validate(NULL, options, defaults, 0, &err) ;
- if (err != NULL) {
- TT_FAIL(("options_validate failed: %s", err));
- }
- tt_str_op(options->MyFamily,OP_EQ,
- "$1111111111111111111111111111111111111111, "
- "$1111111111111111111111111111111111111112, "
- "$1111111111111111111111111111111111111113");
- done:
- if (err != NULL) {
- tor_free(err);
- }
- or_options_free(options);
- or_options_free(defaults);
- }
- static int n_hostname_01010101 = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It answers with 1.1.1.1 as IP adddress that resulted from lookup.
- * This function increments <b>n_hostname_01010101</b> counter by one
- * every time it is called.
- */
- static int
- tor_lookup_hostname_01010101(const char *name, uint32_t *addr)
- {
- n_hostname_01010101++;
- if (name && addr) {
- *addr = ntohl(0x01010101);
- }
- return 0;
- }
- static int n_hostname_localhost = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It answers with 127.0.0.1 as IP adddress that resulted from lookup.
- * This function increments <b>n_hostname_localhost</b> counter by one
- * every time it is called.
- */
- static int
- tor_lookup_hostname_localhost(const char *name, uint32_t *addr)
- {
- n_hostname_localhost++;
- if (name && addr) {
- *addr = 0x7f000001;
- }
- return 0;
- }
- static int n_hostname_failure = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It pretends to fail by returning -1 to caller. Also, this function
- * increments <b>n_hostname_failure</b> every time it is called.
- */
- static int
- tor_lookup_hostname_failure(const char *name, uint32_t *addr)
- {
- (void)name;
- (void)addr;
- n_hostname_failure++;
- return -1;
- }
- static int n_gethostname_replacement = 0;
- /** This mock function is meant to replace tor_gethostname(). It
- * responds with string "onionrouter!" as hostname. This function
- * increments <b>n_gethostname_replacement</b> by one every time
- * it is called.
- */
- static int
- tor_gethostname_replacement(char *name, size_t namelen)
- {
- n_gethostname_replacement++;
- if (name && namelen) {
- strlcpy(name,"onionrouter!",namelen);
- }
- return 0;
- }
- static int n_gethostname_localhost = 0;
- /** This mock function is meant to replace tor_gethostname(). It
- * responds with string "127.0.0.1" as hostname. This function
- * increments <b>n_gethostname_localhost</b> by one every time
- * it is called.
- */
- static int
- tor_gethostname_localhost(char *name, size_t namelen)
- {
- n_gethostname_localhost++;
- if (name && namelen) {
- strlcpy(name,"127.0.0.1",namelen);
- }
- return 0;
- }
- static int n_gethostname_failure = 0;
- /** This mock function is meant to replace tor_gethostname.
- * It pretends to fail by returning -1. This function increments
- * <b>n_gethostname_failure</b> by one every time it is called.
- */
- static int
- tor_gethostname_failure(char *name, size_t namelen)
- {
- (void)name;
- (void)namelen;
- n_gethostname_failure++;
- return -1;
- }
- static int n_get_interface_address = 0;
- /** This mock function is meant to replace get_interface_address().
- * It answers with address 8.8.8.8. This function increments
- * <b>n_get_interface_address</b> by one every time it is called.
- */
- static int
- get_interface_address_08080808(int severity, uint32_t *addr)
- {
- (void)severity;
- n_get_interface_address++;
- if (addr) {
- *addr = ntohl(0x08080808);
- }
- return 0;
- }
- static int n_get_interface_address6 = 0;
- static sa_family_t last_address6_family;
- /** This mock function is meant to replace get_interface_address6().
- * It answers with IP address 9.9.9.9 iff both of the following are true:
- * - <b>family</b> is AF_INET
- * - <b>addr</b> pointer is not NULL.
- * This function increments <b>n_get_interface_address6</b> by one every
- * time it is called.
- */
- static int
- get_interface_address6_replacement(int severity, sa_family_t family,
- tor_addr_t *addr)
- {
- (void)severity;
- last_address6_family = family;
- n_get_interface_address6++;
- if ((family != AF_INET) || !addr) {
- return -1;
- }
- tor_addr_from_ipv4h(addr,0x09090909);
- return 0;
- }
- static int n_get_interface_address_failure = 0;
- /**
- * This mock function is meant to replace get_interface_address().
- * It pretends to fail getting interface address by returning -1.
- * <b>n_get_interface_address_failure</b> is incremented by one
- * every time this function is called.
- */
- static int
- get_interface_address_failure(int severity, uint32_t *addr)
- {
- (void)severity;
- (void)addr;
- n_get_interface_address_failure++;
- return -1;
- }
- static int n_get_interface_address6_failure = 0;
- /**
- * This mock function is meant to replace get_interface_addres6().
- * It will pretend to fail by return -1.
- * <b>n_get_interface_address6_failure</b> is incremented by one
- * every time this function is called and <b>last_address6_family</b>
- * is assigned the value of <b>family</b> argument.
- */
- static int
- get_interface_address6_failure(int severity, sa_family_t family,
- tor_addr_t *addr)
- {
- (void)severity;
- (void)addr;
- n_get_interface_address6_failure++;
- last_address6_family = family;
- return -1;
- }
- static void
- test_config_resolve_my_address(void *arg)
- {
- or_options_t *options;
- uint32_t resolved_addr;
- const char *method_used;
- char *hostname_out = NULL;
- int retval;
- int prev_n_hostname_01010101;
- int prev_n_hostname_localhost;
- int prev_n_hostname_failure;
- int prev_n_gethostname_replacement;
- int prev_n_gethostname_failure;
- int prev_n_gethostname_localhost;
- int prev_n_get_interface_address;
- int prev_n_get_interface_address_failure;
- int prev_n_get_interface_address6;
- int prev_n_get_interface_address6_failure;
- (void)arg;
- options = options_new();
- options_init(options);
- /*
- * CASE 1:
- * If options->Address is a valid IPv4 address string, we want
- * the corresponding address to be parsed and returned.
- */
- options->Address = tor_strdup("128.52.128.105");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want_str_op(method_used,==,"CONFIGURED");
- tt_want(hostname_out == NULL);
- tt_assert(resolved_addr == 0x80348069);
- tor_free(options->Address);
- /*
- * CASE 2:
- * If options->Address is a valid DNS address, we want resolve_my_address()
- * function to ask tor_lookup_hostname() for help with resolving it
- * and return the address that was resolved (in host order).
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
- tor_free(options->Address);
- options->Address = tor_strdup("www.torproject.org");
- prev_n_hostname_01010101 = n_hostname_01010101;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
- tt_want_str_op(method_used,==,"RESOLVED");
- tt_want_str_op(hostname_out,==,"www.torproject.org");
- tt_assert(resolved_addr == 0x01010101);
- UNMOCK(tor_lookup_hostname);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 3:
- * Given that options->Address is NULL, we want resolve_my_address()
- * to try and use tor_gethostname() to get hostname AND use
- * tor_lookup_hostname() to get IP address.
- */
- resolved_addr = 0;
- tor_free(options->Address);
- options->Address = NULL;
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_01010101 = n_hostname_01010101;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
- tt_want_str_op(method_used,==,"GETHOSTNAME");
- tt_want_str_op(hostname_out,==,"onionrouter!");
- tt_assert(resolved_addr == 0x01010101);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- tor_free(hostname_out);
- /*
- * CASE 4:
- * Given that options->Address is a local host address, we want
- * resolve_my_address() function to fail.
- */
- resolved_addr = 0;
- tor_free(options->Address);
- options->Address = tor_strdup("127.0.0.1");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(resolved_addr == 0);
- tt_assert(retval == -1);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 5:
- * We want resolve_my_address() to fail if DNS address in options->Address
- * cannot be resolved.
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- prev_n_hostname_failure = n_hostname_failure;
- tor_free(options->Address);
- options->Address = tor_strdup("www.tor-project.org");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_lookup_hostname);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 6:
- * If options->Address is NULL AND gettting local hostname fails, we want
- * resolve_my_address() to fail as well.
- */
- MOCK(tor_gethostname,tor_gethostname_failure);
- prev_n_gethostname_failure = n_gethostname_failure;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_failure == prev_n_gethostname_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- tor_free(hostname_out);
- /*
- * CASE 7:
- * We want resolve_my_address() to try and get network interface address via
- * get_interface_address() if hostname returned by tor_gethostname() cannot be
- * resolved into IP address.
- */
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- MOCK(get_interface_address,get_interface_address_08080808);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_get_interface_address = n_get_interface_address;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want_int_op(n_gethostname_replacement, ==,
- prev_n_gethostname_replacement + 1);
- tt_want_int_op(n_get_interface_address, ==,
- prev_n_get_interface_address + 1);
- tt_want_str_op(method_used,==,"INTERFACE");
- tt_want(hostname_out == NULL);
- tt_assert(resolved_addr == 0x08080808);
- UNMOCK(get_interface_address);
- tor_free(hostname_out);
- /*
- * CASE 8:
- * Suppose options->Address is NULL AND hostname returned by tor_gethostname()
- * is unresolvable. We want resolve_my_address to fail if
- * get_interface_address() fails.
- */
- MOCK(get_interface_address,get_interface_address_failure);
- prev_n_get_interface_address_failure = n_get_interface_address_failure;
- prev_n_gethostname_replacement = n_gethostname_replacement;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_get_interface_address_failure ==
- prev_n_get_interface_address_failure + 1);
- tt_want(n_gethostname_replacement ==
- prev_n_gethostname_replacement + 1);
- tt_assert(retval == -1);
- UNMOCK(get_interface_address);
- tor_free(hostname_out);
- /*
- * CASE 9:
- * Given that options->Address is NULL AND tor_lookup_hostname()
- * fails AND hostname returned by gethostname() resolves
- * to local IP address, we want resolve_my_address() function to
- * call get_interface_address6(.,AF_INET,.) and return IP address
- * the latter function has found.
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(get_interface_address6,get_interface_address6_replacement);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_failure = n_hostname_failure;
- prev_n_get_interface_address6 = n_get_interface_address6;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(last_address6_family == AF_INET);
- tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(retval == 0);
- tt_want_str_op(method_used,==,"INTERFACE");
- tt_assert(resolved_addr == 0x09090909);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(tor_gethostname);
- UNMOCK(get_interface_address6);
- tor_free(hostname_out);
- /*
- * CASE 10: We want resolve_my_address() to fail if all of the following
- * are true:
- * 1. options->Address is not NULL
- * 2. ... but it cannot be converted to struct in_addr by
- * tor_inet_aton()
- * 3. ... and tor_lookup_hostname() fails to resolve the
- * options->Address
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- prev_n_hostname_failure = n_hostname_failure;
- tor_free(options->Address);
- options->Address = tor_strdup("some_hostname");
- retval = resolve_my_address(LOG_NOTICE, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- tor_free(hostname_out);
- /*
- * CASE 11:
- * Suppose the following sequence of events:
- * 1. options->Address is NULL
- * 2. tor_gethostname() succeeds to get hostname of machine Tor
- * if running on.
- * 3. Hostname from previous step cannot be converted to
- * address by using tor_inet_aton() function.
- * 4. However, tor_lookup_hostname() succeds in resolving the
- * hostname from step 2.
- * 5. Unfortunately, tor_addr_is_internal() deems this address
- * to be internal.
- * 6. get_interface_address6(.,AF_INET,.) returns non-internal
- * IPv4
- *
- * We want resolve_my_addr() to succeed with method "INTERFACE"
- * and address from step 6.
- */
- tor_free(options->Address);
- options->Address = NULL;
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_localhost);
- MOCK(get_interface_address6,get_interface_address6_replacement);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_localhost = n_hostname_localhost;
- prev_n_get_interface_address6 = n_get_interface_address6;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
- tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
- tt_str_op(method_used,==,"INTERFACE");
- tt_assert(!hostname_out);
- tt_assert(retval == 0);
- /*
- * CASE 11b:
- * 1-5 as above.
- * 6. get_interface_address6() fails.
- *
- * In this subcase, we want resolve_my_address() to fail.
- */
- UNMOCK(get_interface_address6);
- MOCK(get_interface_address6,get_interface_address6_failure);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_localhost = n_hostname_localhost;
- prev_n_get_interface_address6_failure = n_get_interface_address6_failure;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
- tt_want(n_get_interface_address6_failure ==
- prev_n_get_interface_address6_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(get_interface_address6);
- /* CASE 12:
- * Suppose the following happens:
- * 1. options->Address is NULL AND options->DirAuthorities is non-NULL
- * 2. tor_gethostname() succeeds in getting hostname of a machine ...
- * 3. ... which is successfully parsed by tor_inet_aton() ...
- * 4. into IPv4 address that tor_addr_is_inernal() considers to be
- * internal.
- *
- * In this case, we want resolve_my_address() to fail.
- */
- tor_free(options->Address);
- options->Address = NULL;
- options->DirAuthorities = tor_malloc_zero(sizeof(config_line_t));
- MOCK(tor_gethostname,tor_gethostname_localhost);
- prev_n_gethostname_localhost = n_gethostname_localhost;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_localhost == prev_n_gethostname_localhost + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- done:
- tor_free(options->Address);
- tor_free(options->DirAuthorities);
- or_options_free(options);
- tor_free(hostname_out);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(get_interface_address);
- UNMOCK(get_interface_address6);
- UNMOCK(tor_gethostname);
- }
- static void
- test_config_adding_trusted_dir_server(void *arg)
- {
- (void)arg;
- const char digest[DIGEST_LEN] = "";
- dir_server_t *ds = NULL;
- tor_addr_port_t ipv6;
- int rv = -1;
- clear_dir_servers();
- routerlist_free_all();
- /* create a trusted ds without an IPv6 address and port */
- ds = trusted_dir_server_new("ds", "127.0.0.1", 9059, 9060, NULL, digest,
- NULL, V3_DIRINFO, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_assert(get_n_authorities(V3_DIRINFO) == 1);
- tt_assert(smartlist_len(router_get_fallback_dir_servers()) == 1);
- /* create a trusted ds with an IPv6 address and port */
- rv = tor_addr_port_parse(LOG_WARN, "[::1]:9061", &ipv6.addr, &ipv6.port, -1);
- tt_assert(rv == 0);
- ds = trusted_dir_server_new("ds", "127.0.0.1", 9059, 9060, &ipv6, digest,
- NULL, V3_DIRINFO, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_assert(get_n_authorities(V3_DIRINFO) == 2);
- tt_assert(smartlist_len(router_get_fallback_dir_servers()) == 2);
- done:
- clear_dir_servers();
- routerlist_free_all();
- }
- static void
- test_config_adding_fallback_dir_server(void *arg)
- {
- (void)arg;
- const char digest[DIGEST_LEN] = "";
- dir_server_t *ds = NULL;
- tor_addr_t ipv4;
- tor_addr_port_t ipv6;
- int rv = -1;
- clear_dir_servers();
- routerlist_free_all();
- rv = tor_addr_parse(&ipv4, "127.0.0.1");
- tt_assert(rv == AF_INET);
- /* create a trusted ds without an IPv6 address and port */
- ds = fallback_dir_server_new(&ipv4, 9059, 9060, NULL, digest, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_assert(smartlist_len(router_get_fallback_dir_servers()) == 1);
- /* create a trusted ds with an IPv6 address and port */
- rv = tor_addr_port_parse(LOG_WARN, "[::1]:9061", &ipv6.addr, &ipv6.port, -1);
- tt_assert(rv == 0);
- ds = fallback_dir_server_new(&ipv4, 9059, 9060, &ipv6, digest, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_assert(smartlist_len(router_get_fallback_dir_servers()) == 2);
- done:
- clear_dir_servers();
- routerlist_free_all();
- }
- /* No secrets here:
- * v3ident is `echo "onion" | shasum | cut -d" " -f1 | tr "a-f" "A-F"`
- * fingerprint is `echo "unionem" | shasum | cut -d" " -f1 | tr "a-f" "A-F"`
- * with added spaces
- */
- #define TEST_DIR_AUTH_LINE_START \
- "foobar orport=12345 " \
- "v3ident=14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4 "
- #define TEST_DIR_AUTH_LINE_END \
- "1.2.3.4:54321 " \
- "FDB2 FBD2 AAA5 25FA 2999 E617 5091 5A32 C777 3B17"
- #define TEST_DIR_AUTH_IPV6_FLAG \
- "ipv6=[feed::beef]:9 "
- static void
- test_config_parsing_trusted_dir_server(void *arg)
- {
- (void)arg;
- int rv = -1;
- /* parse a trusted dir server without an IPv6 address and port */
- rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START
- TEST_DIR_AUTH_LINE_END,
- V3_DIRINFO, 1);
- tt_assert(rv == 0);
- /* parse a trusted dir server with an IPv6 address and port */
- rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START
- TEST_DIR_AUTH_IPV6_FLAG
- TEST_DIR_AUTH_LINE_END,
- V3_DIRINFO, 1);
- tt_assert(rv == 0);
- /* Since we are only validating, there is no cleanup. */
- done:
- ;
- }
- #undef TEST_DIR_AUTH_LINE_START
- #undef TEST_DIR_AUTH_LINE_END
- #undef TEST_DIR_AUTH_IPV6_FLAG
- /* No secrets here:
- * id is `echo "syn-propanethial-S-oxide" | shasum | cut -d" " -f1`
- */
- #define TEST_DIR_FALLBACK_LINE \
- "1.2.3.4:54321 orport=12345 " \
- "id=50e643986f31ea1235bcc1af17a1c5c5cfc0ee54 "
- #define TEST_DIR_FALLBACK_IPV6_FLAG \
- "ipv6=[2015:c0de::deed]:9"
- static void
- test_config_parsing_fallback_dir_server(void *arg)
- {
- (void)arg;
- int rv = -1;
- /* parse a trusted dir server without an IPv6 address and port */
- rv = parse_dir_fallback_line(TEST_DIR_FALLBACK_LINE, 1);
- tt_assert(rv == 0);
- /* parse a trusted dir server with an IPv6 address and port */
- rv = parse_dir_fallback_line(TEST_DIR_FALLBACK_LINE
- TEST_DIR_FALLBACK_IPV6_FLAG,
- 1);
- tt_assert(rv == 0);
- /* Since we are only validating, there is no cleanup. */
- done:
- ;
- }
- #undef TEST_DIR_FALLBACK_LINE
- #undef TEST_DIR_FALLBACK_IPV6_FLAG
- static void
- test_config_adding_default_trusted_dir_servers(void *arg)
- {
- (void)arg;
- clear_dir_servers();
- routerlist_free_all();
- /* Assume we only have one bridge authority */
- add_default_trusted_dir_authorities(BRIDGE_DIRINFO);
- tt_assert(get_n_authorities(BRIDGE_DIRINFO) == 1);
- tt_assert(smartlist_len(router_get_fallback_dir_servers()) == 1);
- /* Assume we have eight V3 authorities */
- add_default_trusted_dir_authorities(V3_DIRINFO);
- tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 8);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 9);
- done:
- clear_dir_servers();
- routerlist_free_all();
- }
- static int n_add_default_fallback_dir_servers_known_default = 0;
- /**
- * This mock function is meant to replace add_default_fallback_dir_servers().
- * It will parse and add one known default fallback dir server,
- * which has a dir_port of 99.
- * <b>n_add_default_fallback_dir_servers_known_default</b> is incremented by
- * one every time this function is called.
- */
- static void
- add_default_fallback_dir_servers_known_default(void)
- {
- int i;
- const char *fallback[] = {
- "127.0.0.1:60099 orport=9009 "
- "id=0923456789012345678901234567890123456789",
- NULL
- };
- for (i=0; fallback[i]; i++) {
- if (parse_dir_fallback_line(fallback[i], 0)<0) {
- log_err(LD_BUG, "Couldn't parse internal FallbackDir line %s",
- fallback[i]);
- }
- }
- n_add_default_fallback_dir_servers_known_default++;
- }
- /* Test all the different combinations of adding dir servers */
- static void
- test_config_adding_dir_servers(void *arg)
- {
- (void)arg;
- /* allocate options */
- or_options_t *options = tor_malloc_zero(sizeof(or_options_t));
- /* Allocate and populate configuration lines:
- *
- * Use the same format as the hard-coded directories in
- * add_default_trusted_dir_authorities().
- * Zeroing the structure has the same effect as initialising to:
- * { NULL, NULL, NULL, CONFIG_LINE_NORMAL, 0};
- */
- config_line_t *test_dir_authority = tor_malloc_zero(sizeof(config_line_t));
- test_dir_authority->key = tor_strdup("DirAuthority");
- test_dir_authority->value = tor_strdup(
- "D0 orport=9000 "
- "v3ident=0023456789012345678901234567890123456789 "
- "127.0.0.1:60090 0123 4567 8901 2345 6789 0123 4567 8901 2345 6789"
- );
- config_line_t *test_alt_bridge_authority = tor_malloc_zero(
- sizeof(config_line_t));
- test_alt_bridge_authority->key = tor_strdup("AlternateBridgeAuthority");
- test_alt_bridge_authority->value = tor_strdup(
- "B1 orport=9001 bridge "
- "127.0.0.1:60091 1123 4567 8901 2345 6789 0123 4567 8901 2345 6789"
- );
- config_line_t *test_alt_dir_authority = tor_malloc_zero(
- sizeof(config_line_t));
- test_alt_dir_authority->key = tor_strdup("AlternateDirAuthority");
- test_alt_dir_authority->value = tor_strdup(
- "A2 orport=9002 "
- "v3ident=0223456789012345678901234567890123456789 "
- "127.0.0.1:60092 2123 4567 8901 2345 6789 0123 4567 8901 2345 6789"
- );
- /* Use the format specified in the manual page */
- config_line_t *test_fallback_directory = tor_malloc_zero(
- sizeof(config_line_t));
- test_fallback_directory->key = tor_strdup("FallbackDir");
- test_fallback_directory->value = tor_strdup(
- "127.0.0.1:60093 orport=9003 id=0323456789012345678901234567890123456789"
- );
- /* We need to know if add_default_fallback_dir_servers is called,
- * whatever the size of the list in fallback_dirs.inc,
- * so we use a version of add_default_fallback_dir_servers that adds
- * one known default fallback directory. */
- MOCK(add_default_fallback_dir_servers,
- add_default_fallback_dir_servers_known_default);
- /* There are 16 different cases, covering each combination of set/NULL for:
- * DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority &
- * FallbackDir. (We always set UseDefaultFallbackDirs to 1.)
- * But validate_dir_servers() ensures that:
- * "You cannot set both DirAuthority and Alternate*Authority."
- * This reduces the number of cases to 10.
- *
- * Let's count these cases using binary, with 1 meaning set & 0 meaning NULL
- * So 1001 or case 9 is:
- * DirAuthorities set,
- * AlternateBridgeAuthority NULL,
- * AlternateDirAuthority NULL
- * FallbackDir set
- * The valid cases are cases 0-9 counting using this method, as every case
- * greater than or equal to 10 = 1010 is invalid.
- *
- * 1. Outcome: Use Set Directory Authorities
- * - No Default Authorities
- * - Use AlternateBridgeAuthority, AlternateDirAuthority, and FallbackDir
- * if they are set
- * Cases expected to yield this outcome:
- * 8 & 9 (the 2 valid cases where DirAuthorities is set)
- * 6 & 7 (the 2 cases where DirAuthorities is NULL, and
- * AlternateBridgeAuthority and AlternateDirAuthority are both set)
- *
- * 2. Outcome: Use Set Bridge Authority
- * - Use Default Non-Bridge Directory Authorities
- * - Use FallbackDir if it is set, otherwise use default FallbackDir
- * Cases expected to yield this outcome:
- * 4 & 5 (the 2 cases where DirAuthorities is NULL,
- * AlternateBridgeAuthority is set, and
- * AlternateDirAuthority is NULL)
- *
- * 3. Outcome: Use Set Alternate Directory Authority
- * - Use Default Bridge Authorities
- * - Use FallbackDir if it is set, otherwise No Default Fallback Directories
- * Cases expected to yield this outcome:
- * 2 & 3 (the 2 cases where DirAuthorities and AlternateBridgeAuthority
- * are both NULL, but AlternateDirAuthority is set)
- *
- * 4. Outcome: Use Set Custom Fallback Directory
- * - Use Default Bridge & Directory Authorities
- * Cases expected to yield this outcome:
- * 1 (DirAuthorities, AlternateBridgeAuthority and AlternateDirAuthority
- * are all NULL, but FallbackDir is set)
- *
- * 5. Outcome: Use All Defaults
- * - Use Default Bridge & Directory Authorities, and
- * Default Fallback Directories
- * Cases expected to yield this outcome:
- * 0 (DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority
- * and FallbackDir are all NULL)
- */
- /*
- * Find out how many default Bridge, Non-Bridge and Fallback Directories
- * are hard-coded into this build.
- * This code makes some assumptions about the implementation.
- * If they are wrong, one or more of cases 0-5 could fail.
- */
- int n_default_alt_bridge_authority = 0;
- int n_default_alt_dir_authority = 0;
- int n_default_fallback_dir = 0;
- #define n_default_authorities ((n_default_alt_bridge_authority) \
- + (n_default_alt_dir_authority))
- /* Pre-Count Number of Authorities of Each Type
- * Use 0000: No Directory Authorities or Fallback Directories Set
- */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0000 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 1);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* Count Bridge Authorities */
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if it's a bridge auth */
- n_default_alt_bridge_authority +=
- ((ds->is_authority && (ds->type & BRIDGE_DIRINFO)) ?
- 1 : 0)
- );
- /* If we have no default bridge authority, something has gone wrong */
- tt_assert(n_default_alt_bridge_authority >= 1);
- /* Count v3 Authorities */
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment found counter if it's a v3 auth */
- n_default_alt_dir_authority +=
- ((ds->is_authority && (ds->type & V3_DIRINFO)) ?
- 1 : 0)
- );
- /* If we have no default authorities, something has gone really wrong */
- tt_assert(n_default_alt_dir_authority >= 1);
- /* Calculate Fallback Directory Count */
- n_default_fallback_dir = (smartlist_len(fallback_servers) -
- n_default_alt_bridge_authority -
- n_default_alt_dir_authority);
- /* If we have a negative count, something has gone really wrong,
- * or some authorities aren't being added as fallback directories.
- * (networkstatus_consensus_can_use_extra_fallbacks depends on all
- * authorities being fallback directories.) */
- tt_assert(n_default_fallback_dir >= 0);
- }
- }
- /*
- * 1. Outcome: Use Set Directory Authorities
- * - No Default Authorities
- * - Use AlternateBridgeAuthority, AlternateDirAuthority, and FallbackDir
- * if they are set
- * Cases expected to yield this outcome:
- * 8 & 9 (the 2 valid cases where DirAuthorities is set)
- * 6 & 7 (the 2 cases where DirAuthorities is NULL, and
- * AlternateBridgeAuthority and AlternateDirAuthority are both set)
- */
- /* Case 9: 1001 - DirAuthorities Set, AlternateBridgeAuthority Not Set,
- AlternateDirAuthority Not Set, FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 1001 */
- options->DirAuthorities = test_dir_authority;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* D0, (No B1), (No A2) */
- tt_assert(smartlist_len(dir_servers) == 1);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* D0, (No B1), (No A2), Custom Fallback */
- tt_assert(smartlist_len(fallback_servers) == 2);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- }
- }
- /* Case 8: 1000 - DirAuthorities Set, Others Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 1000 */
- options->DirAuthorities = test_dir_authority;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we just have the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* D0, (No B1), (No A2) */
- tt_assert(smartlist_len(dir_servers) == 1);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* D0, (No B1), (No A2), (No Fallback) */
- tt_assert(smartlist_len(fallback_servers) == 1);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- }
- }
- /* Case 7: 0111 - DirAuthorities Not Set, Others Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0111 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, A2 */
- tt_assert(smartlist_len(dir_servers) == 2);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, A2, Custom Fallback */
- tt_assert(smartlist_len(fallback_servers) == 3);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- }
- }
- /* Case 6: 0110 - DirAuthorities Not Set, AlternateBridgeAuthority &
- AlternateDirAuthority Set, FallbackDir Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0110 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, A2 */
- tt_assert(smartlist_len(dir_servers) == 2);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, A2, (No Fallback) */
- tt_assert(smartlist_len(fallback_servers) == 2);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- }
- }
- /*
- 2. Outcome: Use Set Bridge Authority
- - Use Default Non-Bridge Directory Authorities
- - Use FallbackDir if it is set, otherwise use default FallbackDir
- Cases expected to yield this outcome:
- 4 & 5 (the 2 cases where DirAuthorities is NULL,
- AlternateBridgeAuthority is set, and
- AlternateDirAuthority is NULL)
- */
- /* Case 5: 0101 - DirAuthorities Not Set, AlternateBridgeAuthority Set,
- AlternateDirAuthority Not Set, FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0101 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities */
- tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities,
- * Custom Fallback */
- tt_assert(smartlist_len(fallback_servers) ==
- 2 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- }
- /* Case 4: 0100 - DirAuthorities Not Set, AlternateBridgeAuthority Set,
- AlternateDirAuthority & FallbackDir Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0100 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 1);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities */
- tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities,
- * Default Fallback */
- tt_assert(smartlist_len(fallback_servers) ==
- 2 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 0);
- /* Default FallbackDir - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 1);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- }
- /*
- 3. Outcome: Use Set Alternate Directory Authority
- - Use Default Bridge Authorities
- - Use FallbackDir if it is set, otherwise No Default Fallback Directories
- Cases expected to yield this outcome:
- 2 & 3 (the 2 cases where DirAuthorities and AlternateBridgeAuthority
- are both NULL, but AlternateDirAuthority is set)
- */
- /* Case 3: 0011 - DirAuthorities & AlternateBridgeAuthority Not Set,
- AlternateDirAuthority & FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0011 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2 */
- tt_assert(smartlist_len(dir_servers) ==
- 1 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2,
- * Custom Fallback Directory, (No Default Fallback Directories) */
- tt_assert(smartlist_len(fallback_servers) ==
- 2 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- }
- /* Case 2: 0010 - DirAuthorities & AlternateBridgeAuthority Not Set,
- AlternateDirAuthority Set, FallbackDir Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0010 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we just have the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2,
- * No Default or Custom Fallback Directories */
- tt_assert(smartlist_len(dir_servers) ==
- 1 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2,
- * No Custom or Default Fallback Directories */
- tt_assert(smartlist_len(fallback_servers) ==
- 1 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 1);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- }
- /*
- 4. Outcome: Use Set Custom Fallback Directory
- - Use Default Bridge & Directory Authorities
- Cases expected to yield this outcome:
- 1 (DirAuthorities, AlternateBridgeAuthority and AlternateDirAuthority
- are all NULL, but FallbackDir is set)
- */
- /* Case 1: 0001 - DirAuthorities, AlternateBridgeAuthority
- & AlternateDirAuthority Not Set, FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0001 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities */
- tt_assert(smartlist_len(dir_servers) == n_default_authorities);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities,
- * Custom Fallback Directory, (No Default Fallback Directories) */
- tt_assert(smartlist_len(fallback_servers) ==
- 1 + n_default_authorities);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- }
- /*
- 5. Outcome: Use All Defaults
- - Use Default Bridge & Directory Authorities, Default Fallback Directories
- Cases expected to yield this outcome:
- 0 (DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority
- and FallbackDir are all NULL)
- */
- /* Case 0: 0000 - All Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- memset(options, 0, sizeof(or_options_t));
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0001 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must have added the default fallback dirs */
- tt_assert(n_add_default_fallback_dir_servers_known_default == 1);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities */
- tt_assert(smartlist_len(dir_servers) == n_default_authorities);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities,
- * (No Custom Fallback Directory), Default Fallback Directories */
- tt_assert(smartlist_len(fallback_servers) ==
- n_default_authorities + n_default_fallback_dir);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_assert(found_D0 == 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_assert(found_B1 == 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_assert(found_A2 == 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_assert(found_non_default_fallback == 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_assert(found_default_fallback == 1);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, and the default
- * Fallback Directories, so let's assume that if the total count
- * above is correct, we have the right ones.
- */
- }
- }
- done:
- clear_dir_servers();
- tor_free(test_dir_authority->key);
- tor_free(test_dir_authority->value);
- tor_free(test_dir_authority);
- tor_free(test_alt_dir_authority->key);
- tor_free(test_alt_dir_authority->value);
- tor_free(test_alt_dir_authority);
- tor_free(test_alt_bridge_authority->key);
- tor_free(test_alt_bridge_authority->value);
- tor_free(test_alt_bridge_authority);
- tor_free(test_fallback_directory->key);
- tor_free(test_fallback_directory->value);
- tor_free(test_fallback_directory);
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- or_options_free(options);
- UNMOCK(add_default_fallback_dir_servers);
- }
- static void
- test_config_default_dir_servers(void *arg)
- {
- or_options_t *opts = NULL;
- (void)arg;
- int trusted_count = 0;
- int fallback_count = 0;
- /* new set of options should stop fallback parsing */
- opts = tor_malloc_zero(sizeof(or_options_t));
- opts->UseDefaultFallbackDirs = 0;
- /* set old_options to NULL to force dir update */
- consider_adding_dir_servers(opts, NULL);
- trusted_count = smartlist_len(router_get_trusted_dir_servers());
- fallback_count = smartlist_len(router_get_fallback_dir_servers());
- or_options_free(opts);
- opts = NULL;
- /* assume a release will never go out with less than 7 authorities */
- tt_assert(trusted_count >= 7);
- /* if we disable the default fallbacks, there must not be any extra */
- tt_assert(fallback_count == trusted_count);
- opts = tor_malloc_zero(sizeof(or_options_t));
- opts->UseDefaultFallbackDirs = 1;
- consider_adding_dir_servers(opts, opts);
- trusted_count = smartlist_len(router_get_trusted_dir_servers());
- fallback_count = smartlist_len(router_get_fallback_dir_servers());
- or_options_free(opts);
- opts = NULL;
- /* assume a release will never go out with less than 7 authorities */
- tt_assert(trusted_count >= 7);
- /* XX/teor - allow for default fallbacks to be added without breaking
- * the unit tests. Set a minimum fallback count once the list is stable. */
- tt_assert(fallback_count >= trusted_count);
- done:
- or_options_free(opts);
- }
- static int mock_router_pick_published_address_result = 0;
- static int
- mock_router_pick_published_address(const or_options_t *options,
- uint32_t *addr, int cache_only)
- {
- (void)options;
- (void)addr;
- (void)cache_only;
- return mock_router_pick_published_address_result;
- }
- static int mock_router_my_exit_policy_is_reject_star_result = 0;
- static int
- mock_router_my_exit_policy_is_reject_star(void)
- {
- return mock_router_my_exit_policy_is_reject_star_result;
- }
- static int mock_advertised_server_mode_result = 0;
- static int
- mock_advertised_server_mode(void)
- {
- return mock_advertised_server_mode_result;
- }
- static routerinfo_t *mock_router_get_my_routerinfo_result = NULL;
- static const routerinfo_t *
- mock_router_get_my_routerinfo(void)
- {
- return mock_router_get_my_routerinfo_result;
- }
- static void
- test_config_directory_fetch(void *arg)
- {
- (void)arg;
- /* Test Setup */
- or_options_t *options = tor_malloc_zero(sizeof(or_options_t));
- routerinfo_t routerinfo;
- memset(&routerinfo, 0, sizeof(routerinfo));
- mock_router_pick_published_address_result = -1;
- mock_router_my_exit_policy_is_reject_star_result = 1;
- mock_advertised_server_mode_result = 0;
- mock_router_get_my_routerinfo_result = NULL;
- MOCK(router_pick_published_address, mock_router_pick_published_address);
- MOCK(router_my_exit_policy_is_reject_star,
- mock_router_my_exit_policy_is_reject_star);
- MOCK(advertised_server_mode, mock_advertised_server_mode);
- MOCK(router_get_my_routerinfo, mock_router_get_my_routerinfo);
- /* Clients can use multiple directory mirrors for bootstrap */
- memset(options, 0, sizeof(or_options_t));
- options->ClientOnly = 1;
- tt_assert(server_mode(options) == 0);
- tt_assert(public_server_mode(options) == 0);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 1);
- /* Bridge Clients can use multiple directory mirrors for bootstrap */
- memset(options, 0, sizeof(or_options_t));
- options->UseBridges = 1;
- tt_assert(server_mode(options) == 0);
- tt_assert(public_server_mode(options) == 0);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 1);
- /* Bridge Relays (Bridges) must act like clients, and use multiple
- * directory mirrors for bootstrap */
- memset(options, 0, sizeof(or_options_t));
- options->BridgeRelay = 1;
- options->ORPort_set = 1;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 0);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 1);
- /* Clients set to FetchDirInfoEarly must fetch it from the authorities,
- * but can use multiple authorities for bootstrap */
- memset(options, 0, sizeof(or_options_t));
- options->FetchDirInfoEarly = 1;
- tt_assert(server_mode(options) == 0);
- tt_assert(public_server_mode(options) == 0);
- tt_assert(directory_fetches_from_authorities(options) == 1);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 1);
- /* OR servers only fetch the consensus from the authorities when they don't
- * know their own address, but never use multiple directories for bootstrap
- */
- memset(options, 0, sizeof(or_options_t));
- options->ORPort_set = 1;
- mock_router_pick_published_address_result = -1;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 1);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- mock_router_pick_published_address_result = 0;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- /* Exit OR servers only fetch the consensus from the authorities when they
- * refuse unknown exits, but never use multiple directories for bootstrap
- */
- memset(options, 0, sizeof(or_options_t));
- options->ORPort_set = 1;
- options->ExitRelay = 1;
- mock_router_pick_published_address_result = 0;
- mock_router_my_exit_policy_is_reject_star_result = 0;
- mock_advertised_server_mode_result = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- routerinfo.supports_tunnelled_dir_requests = 1;
- options->RefuseUnknownExits = 1;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 1);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- options->RefuseUnknownExits = 0;
- mock_router_pick_published_address_result = 0;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- /* Dir servers fetch the consensus from the authorities, unless they are not
- * advertising themselves (hibernating) or have no routerinfo or are not
- * advertising their dirport, and never use multiple directories for
- * bootstrap. This only applies if they are also OR servers.
- * (We don't care much about the behaviour of non-OR directory servers.) */
- memset(options, 0, sizeof(or_options_t));
- options->DirPort_set = 1;
- options->ORPort_set = 1;
- options->DirCache = 1;
- mock_router_pick_published_address_result = 0;
- mock_router_my_exit_policy_is_reject_star_result = 1;
- mock_advertised_server_mode_result = 1;
- routerinfo.dir_port = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 1);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- mock_advertised_server_mode_result = 0;
- routerinfo.dir_port = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- mock_advertised_server_mode_result = 1;
- mock_router_get_my_routerinfo_result = NULL;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- mock_advertised_server_mode_result = 1;
- routerinfo.dir_port = 0;
- routerinfo.supports_tunnelled_dir_requests = 0;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 0);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- mock_advertised_server_mode_result = 1;
- routerinfo.dir_port = 1;
- routerinfo.supports_tunnelled_dir_requests = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_assert(directory_fetches_from_authorities(options) == 1);
- tt_assert(networkstatus_consensus_can_use_multiple_directories(options)
- == 0);
- done:
- tor_free(options);
- UNMOCK(router_pick_published_address);
- UNMOCK(router_get_my_routerinfo);
- UNMOCK(advertised_server_mode);
- UNMOCK(router_my_exit_policy_is_reject_star);
- }
- static void
- test_config_default_fallback_dirs(void *arg)
- {
- const char *fallback[] = {
- #include "../or/fallback_dirs.inc"
- NULL
- };
- int n_included_fallback_dirs = 0;
- int n_added_fallback_dirs = 0;
- (void)arg;
- clear_dir_servers();
- while (fallback[n_included_fallback_dirs])
- n_included_fallback_dirs++;
- add_default_fallback_dir_servers();
- n_added_fallback_dirs = smartlist_len(router_get_fallback_dir_servers());
- tt_assert(n_included_fallback_dirs == n_added_fallback_dirs);
- done:
- clear_dir_servers();
- }
- static void
- test_config_port_cfg_line_extract_addrport(void *arg)
- {
- (void)arg;
- int unixy = 0;
- const char *rest = NULL;
- char *a = NULL;
- tt_int_op(port_cfg_line_extract_addrport("", &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("hello", &a, &unixy, &rest),
- OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "hello");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(" flipperwalt gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "flipperwalt");;
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(" flipperwalt \t gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "flipperwalt");;
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("flipperwalt \t gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "flipperwalt");;
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:flipperwalt \t gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "flipperwalt");;
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:lolol ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(" unix:lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("foobar:lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "foobar:lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(":lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, ":lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\"",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\" ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");;
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\" foo ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");;
- tt_str_op(rest, OP_EQ, "foo ");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol ol\" foo ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lol ol");;
- tt_str_op(rest, OP_EQ, "foo ");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\\" ol\" foo ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lol\" ol");;
- tt_str_op(rest, OP_EQ, "foo ");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\\" ol foo ",
- &a, &unixy, &rest), OP_EQ, -1);
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\0\" ol foo ",
- &a, &unixy, &rest), OP_EQ, -1);
- tor_free(a);
- done:
- tor_free(a);
- }
- static config_line_t *
- mock_config_line(const char *key, const char *val)
- {
- config_line_t *config_line = tor_malloc(sizeof(config_line_t));
- memset(config_line, 0, sizeof(config_line_t));
- config_line->key = tor_strdup(key);
- config_line->value = tor_strdup(val);
- return config_line;
- }
- static void
- test_config_parse_port_config__listenaddress(void *data)
- {
- (void)data;
- int ret;
- config_line_t *config_listen_address = NULL, *config_listen_address2 = NULL,
- *config_listen_address3 = NULL;
- config_line_t *config_port1 = NULL, *config_port2 = NULL,
- *config_port3 = NULL, *config_port4 = NULL, *config_port5 = NULL;
- smartlist_t *slout = NULL;
- port_cfg_t *port_cfg = NULL;
- // Test basic invocation with no arguments
- ret = parse_port_config(NULL, NULL, NULL, NULL, 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Setup some test data
- config_listen_address = mock_config_line("DNSListenAddress", "127.0.0.1");
- config_listen_address2 = mock_config_line("DNSListenAddress", "x$$$:::345");
- config_listen_address3 = mock_config_line("DNSListenAddress",
- "127.0.0.1:1442");
- config_port1 = mock_config_line("DNSPort", "42");
- config_port2 = mock_config_line("DNSPort", "43");
- config_port1->next = config_port2;
- config_port3 = mock_config_line("DNSPort", "auto");
- config_port4 = mock_config_line("DNSPort", "55542");
- config_port5 = mock_config_line("DNSPort", "666777");
- // Test failure when we have a ListenAddress line and several
- // Port lines for the same portname
- ret = parse_port_config(NULL, config_port1, config_listen_address, "DNS", 0,
- NULL, 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test case when we have a listen address, no default port and allow
- // spurious listen address lines
- ret = parse_port_config(NULL, NULL, config_listen_address, "DNS", 0, NULL,
- 0, CL_PORT_ALLOW_EXTRA_LISTENADDR);
- tt_int_op(ret, OP_EQ, 1);
- // Test case when we have a listen address, no default port but doesn't
- // allow spurious listen address lines
- ret = parse_port_config(NULL, NULL, config_listen_address, "DNS", 0, NULL,
- 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test case when we have a listen address, and a port that points to auto,
- // should use the AUTO port
- slout = smartlist_new();
- ret = parse_port_config(slout, config_port3, config_listen_address, "DNS",
- 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT);
- // Test when we have a listen address and a custom port
- ret = parse_port_config(slout, config_port4, config_listen_address, "DNS",
- 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 2);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 1);
- tt_int_op(port_cfg->port, OP_EQ, 55542);
- // Test when we have a listen address and an invalid custom port
- ret = parse_port_config(slout, config_port5, config_listen_address, "DNS",
- 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test we get a server port configuration when asked for it
- ret = parse_port_config(slout, NULL, config_listen_address, "DNS", 0, NULL,
- 123, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 4);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 2);
- tt_int_op(port_cfg->port, OP_EQ, 123);
- tt_int_op(port_cfg->server_cfg.no_listen, OP_EQ, 1);
- tt_int_op(port_cfg->server_cfg.bind_ipv4_only, OP_EQ, 1);
- // Test an invalid ListenAddress configuration
- ret = parse_port_config(NULL, NULL, config_listen_address2, "DNS", 0, NULL,
- 222, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test default to the port in the listen address if available
- ret = parse_port_config(slout, config_port2, config_listen_address3, "DNS",
- 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 5);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 4);
- tt_int_op(port_cfg->port, OP_EQ, 1442);
- // Test we work correctly without an out, but with a listen address
- // and a port
- ret = parse_port_config(NULL, config_port2, config_listen_address, "DNS",
- 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test warning nonlocal control
- ret = parse_port_config(slout, config_port2, config_listen_address, "DNS",
- CONN_TYPE_CONTROL_LISTENER, NULL, 0,
- CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test warning nonlocal ext or listener
- ret = parse_port_config(slout, config_port2, config_listen_address, "DNS",
- CONN_TYPE_EXT_OR_LISTENER, NULL, 0,
- CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test warning nonlocal other
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port2, config_listen_address, "DNS",
- 0, NULL, 0, CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test warning nonlocal control without an out
- ret = parse_port_config(NULL, config_port2, config_listen_address, "DNS",
- CONN_TYPE_CONTROL_LISTENER, NULL, 0,
- CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- done:
- config_free_lines(config_listen_address);
- config_free_lines(config_listen_address2);
- config_free_lines(config_listen_address3);
- config_free_lines(config_port1);
- /* 2 was linked from 1. */
- config_free_lines(config_port3);
- config_free_lines(config_port4);
- config_free_lines(config_port5);
- if (slout)
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_free(slout);
- }
- static void
- test_config_parse_port_config__ports__no_ports_given(void *data)
- {
- (void)data;
- int ret;
- smartlist_t *slout = NULL;
- port_cfg_t *port_cfg = NULL;
- slout = smartlist_new();
- // Test no defaultport, no defaultaddress and no out
- ret = parse_port_config(NULL, NULL, NULL, "DNS", 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test with defaultport, no defaultaddress and no out
- ret = parse_port_config(NULL, NULL, NULL, "DNS", 0, NULL, 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test no defaultport, with defaultaddress and no out
- ret = parse_port_config(NULL, NULL, NULL, "DNS", 0, "127.0.0.2", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test with defaultport, with defaultaddress and no out
- ret = parse_port_config(NULL, NULL, NULL, "DNS", 0, "127.0.0.2", 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test no defaultport, no defaultaddress and with out
- ret = parse_port_config(slout, NULL, NULL, "DNS", 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test with defaultport, no defaultaddress and with out
- ret = parse_port_config(slout, NULL, NULL, "DNS", 0, NULL, 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test no defaultport, with defaultaddress and with out
- ret = parse_port_config(slout, NULL, NULL, "DNS", 0, "127.0.0.2", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test with defaultport, with defaultaddress and out, adds a new port cfg
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, NULL, NULL, "DNS", 0, "127.0.0.2", 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 42);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 0);
- // Test with defaultport, with defaultaddress and out, adds a new port cfg
- // for a unix address
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, NULL, NULL, "DNS", 0, "/foo/bar/unixdomain",
- 42, CL_PORT_IS_UNIXSOCKET);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 0);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1);
- tt_str_op(port_cfg->unix_addr, OP_EQ, "/foo/bar/unixdomain");
- done:
- if (slout)
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_free(slout);
- }
- static void
- test_config_parse_port_config__ports__ports_given(void *data)
- {
- (void)data;
- int ret;
- smartlist_t *slout = NULL;
- port_cfg_t *port_cfg = NULL;
- config_line_t *config_port_invalid = NULL, *config_port_valid = NULL;
- tor_addr_t addr;
- slout = smartlist_new();
- // Test error when encounters an invalid Port specification
- config_port_invalid = mock_config_line("DNSPort", "");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "DNS", 0, NULL,
- 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test error when encounters an empty unix domain specification
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "unix:");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "DNS", 0, NULL,
- 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test error when encounters a unix domain specification but the listener
- // doesn't support domain sockets
- config_port_valid = mock_config_line("DNSPort", "unix:/tmp/foo/bar");
- ret = parse_port_config(NULL, config_port_valid, NULL, "DNS",
- CONN_TYPE_AP_DNS_LISTENER, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test valid unix domain
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0, 0);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 0);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1);
- tt_str_op(port_cfg->unix_addr, OP_EQ, "/tmp/foo/bar");
- /* Test entry port defaults as initialised in parse_port_config */
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.prefer_ipv6_virtaddr, OP_EQ, 1);
- #endif
- // Test failure if we have no ipv4 and no ipv6 and no onion (DNS only)
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("SOCKSPort",
- "unix:/tmp/foo/bar NoIPv4Traffic "
- "NoOnionTraffic");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we have no DNS and we're a DNSPort
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort",
- "127.0.0.1:80 NoDNSRequest");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "DNS",
- CONN_TYPE_AP_DNS_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // If we're a DNSPort, DNS only is ok
- // Use a port because DNSPort doesn't support sockets
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.1:80 "
- "NoIPv4Traffic NoOnionTraffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS",
- CONN_TYPE_AP_DNS_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 0);
- // Test failure if we have DNS but no ipv4 and no ipv6
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("SOCKSPort",
- "unix:/tmp/foo/bar NoIPv4Traffic");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with no DNS, no ipv4, no ipv6 (only onion, using separate
- // options)
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- #endif
- // Test success with quoted unix: address.
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:\"/tmp/foo/ bar\" "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- #endif
- // Test failure with broken quoted unix: address.
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:\"/tmp/foo/ bar "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure with empty quoted unix: address.
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:\"\" "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with OnionTrafficOnly (no DNS, no ipv4, no ipv6)
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "OnionTrafficOnly");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- #endif
- // Test success with no ipv4 but take ipv6
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "NoIPv4Traffic IPv6Traffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1);
- #endif
- // Test success with both ipv4 and ipv6
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "IPv4Traffic IPv6Traffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1);
- #endif
- // Test failure if we specify world writable for an IP Port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "42 WorldWritable");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we specify group writable for an IP Port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "42 GroupWritable");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we specify group writable for an IP Port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "42 RelaxDirModeCheck");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with only a port (this will fail without a default address)
- config_free_lines(config_port_valid); config_port_valid = NULL;
- config_port_valid = mock_config_line("DNSPort", "42");
- ret = parse_port_config(NULL, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with only a port and isolate destination port
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateDestPort");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_DESTPORT);
- // Test success with a negative isolate destination port, and plural
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoIsolateDestPorts");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT & ~ISO_DESTPORT);
- // Test success with isolate destination address
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateDestAddr");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_DESTADDR);
- // Test success with isolate socks AUTH
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateSOCKSAuth");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_SOCKSAUTH);
- // Test success with isolate client protocol
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateClientProtocol");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_CLIENTPROTO);
- // Test success with isolate client address
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateClientAddr");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_CLIENTADDR);
- // Test success with ignored unknown options
- config_free_lines(config_port_valid); config_port_valid = NULL;
- config_port_valid = mock_config_line("DNSPort", "42 ThisOptionDoesntExist");
- ret = parse_port_config(NULL, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with no isolate socks AUTH
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoIsolateSOCKSAuth");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.socks_prefer_no_auth, OP_EQ, 1);
- // Test success with prefer ipv6
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort",
- "42 IPv6Traffic PreferIPv6");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, "127.0.0.42", 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.prefer_ipv6, OP_EQ, 1);
- // Test success with cache ipv4 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 CacheIPv4DNS");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 0);
- // Test success with cache ipv6 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 CacheIPv6DNS");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 1);
- // Test success with no cache ipv4 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoCacheIPv4DNS");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 0);
- // Test success with cache DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 CacheDNS");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 1);
- // Test success with use cached ipv4 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 UseIPv4Cache");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 0);
- // Test success with use cached ipv6 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 UseIPv6Cache");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 1);
- // Test success with use cached DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 UseDNSCache");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 1);
- // Test success with not preferring ipv6 automap
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoPreferIPv6Automap");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.prefer_ipv6_virtaddr, OP_EQ, 0);
- // Test success with prefer SOCKS no auth
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 PreferSOCKSNoAuth");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.socks_prefer_no_auth, OP_EQ, 1);
- // Test failure with both a zero port and a non-zero port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "0");
- config_port_valid = mock_config_line("DNSPort", "42");
- config_port_invalid->next = config_port_valid;
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with warn non-local control
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, NULL, "Control",
- CONN_TYPE_CONTROL_LISTENER, "127.0.0.42", 0,
- CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with warn non-local listener
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, NULL, "ExtOR",
- CONN_TYPE_EXT_OR_LISTENER, "127.0.0.42", 0,
- CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with warn non-local other
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with warn non-local other without out
- ret = parse_port_config(NULL, config_port_valid, NULL, "DNS", 0,
- "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with both ipv4 and ipv6 but without stream options
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IPv4Traffic "
- "IPv6Traffic");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.44", 0,
- CL_PORT_TAKES_HOSTNAMES |
- CL_PORT_NO_STREAM_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- // Test failure for a SessionGroup argument with invalid value
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=invalid");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.44", 0, CL_PORT_NO_STREAM_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // TODO: this seems wrong. Shouldn't it be the other way around?
- // Potential bug.
- // Test failure for a SessionGroup argument with valid value but with stream
- // options allowed
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=123");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.44", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure for more than one SessionGroup argument
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=123 "
- "SessionGroup=321");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.44", 0, CL_PORT_NO_STREAM_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with a sessiongroup options
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 SessionGroup=1111122");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.44", 0, CL_PORT_NO_STREAM_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.session_group, OP_EQ, 1111122);
- // Test success with a zero unix domain socket, and doesnt add it to out
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "0");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.45", 0, CL_PORT_IS_UNIXSOCKET);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test success with a one unix domain socket, and doesnt add it to out
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "something");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.45", 0, CL_PORT_IS_UNIXSOCKET);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1);
- tt_str_op(port_cfg->unix_addr, OP_EQ, "something");
- // Test success with a port of auto - it uses the default address
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "auto");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT);
- tor_addr_parse(&addr, "127.0.0.46");
- tt_assert(tor_addr_eq(&port_cfg->addr, &addr))
- // Test success with parsing both an address and an auto port
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.122:auto");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT);
- tor_addr_parse(&addr, "127.0.0.122");
- tt_assert(tor_addr_eq(&port_cfg->addr, &addr))
- // Test failure when asked to parse an invalid address followed by auto
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "invalidstuff!!:auto");
- ret = parse_port_config(NULL, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with parsing both an address and a real port
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.123:656");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 656);
- tor_addr_parse(&addr, "127.0.0.123");
- tt_assert(tor_addr_eq(&port_cfg->addr, &addr))
- // Test failure if we can't parse anything at all
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "something wrong");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we find both an address, a port and an auto
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "127.0.1.0:123:auto");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test that default to group writeable default sets group writeable for
- // domain socket
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/somewhere");
- ret = parse_port_config(slout, config_port_valid, NULL, "SOCKS",
- CONN_TYPE_AP_LISTENER, "127.0.0.46", 0,
- CL_PORT_DFLT_GROUP_WRITABLE);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->is_group_writable, OP_EQ, 1);
- #endif
- done:
- if (slout)
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_free(slout);
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_free_lines(config_port_valid); config_port_valid = NULL;
- }
- static void
- test_config_parse_port_config__ports__server_options(void *data)
- {
- (void)data;
- int ret;
- smartlist_t *slout = NULL;
- port_cfg_t *port_cfg = NULL;
- config_line_t *config_port_invalid = NULL, *config_port_valid = NULL;
- slout = smartlist_new();
- // Test success with NoAdvertise option
- config_free_lines(config_port_valid); config_port_valid = NULL;
- config_port_valid = mock_config_line("DNSPort",
- "127.0.0.124:656 NoAdvertise");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.no_advertise, OP_EQ, 1);
- tt_int_op(port_cfg->server_cfg.no_listen, OP_EQ, 0);
- // Test success with NoListen option
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 NoListen");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.no_advertise, OP_EQ, 0);
- tt_int_op(port_cfg->server_cfg.no_listen, OP_EQ, 1);
- // Test failure with both NoAdvertise and NoListen option
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "127.0.0.124:656 NoListen "
- "NoAdvertise");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with IPv4Only
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 IPv4Only");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.bind_ipv4_only, OP_EQ, 1);
- tt_int_op(port_cfg->server_cfg.bind_ipv6_only, OP_EQ, 0);
- // Test success with IPv6Only
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "[::1]:656 IPv6Only");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.bind_ipv4_only, OP_EQ, 0);
- tt_int_op(port_cfg->server_cfg.bind_ipv6_only, OP_EQ, 1);
- // Test failure with both IPv4Only and IPv6Only
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "127.0.0.124:656 IPv6Only "
- "IPv4Only");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with invalid parameter
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 unknown");
- ret = parse_port_config(slout, config_port_valid, NULL, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- // Test failure when asked to bind only to ipv6 but gets an ipv4 address
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort",
- "127.0.0.124:656 IPv6Only");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure when asked to bind only to ipv4 but gets an ipv6 address
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "[::1]:656 IPv4Only");
- ret = parse_port_config(slout, config_port_invalid, NULL, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Check for failure with empty unix: address.
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("ORPort", "unix:\"\"");
- ret = parse_port_config(slout, config_port_invalid, NULL, "ORPort", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- done:
- if (slout)
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_free(slout);
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_free_lines(config_port_valid); config_port_valid = NULL;
- }
- static void
- test_config_parse_log_severity(void *data)
- {
- int ret;
- const char *severity_log_lines[] = {
- "debug file /tmp/debug.log",
- "debug\tfile /tmp/debug.log",
- "[handshake]debug [~net,~mm]info notice stdout",
- "[handshake]debug\t[~net,~mm]info\tnotice\tstdout",
- NULL
- };
- int i;
- log_severity_list_t *severity;
- (void) data;
- severity = tor_malloc(sizeof(log_severity_list_t));
- for (i = 0; severity_log_lines[i]; i++) {
- memset(severity, 0, sizeof(log_severity_list_t));
- ret = parse_log_severity_config(&severity_log_lines[i], severity);
- tt_int_op(ret, OP_EQ, 0);
- }
- done:
- tor_free(severity);
- }
- #define CONFIG_TEST(name, flags) \
- { #name, test_config_ ## name, flags, NULL, NULL }
- struct testcase_t config_tests[] = {
- CONFIG_TEST(adding_trusted_dir_server, TT_FORK),
- CONFIG_TEST(adding_fallback_dir_server, TT_FORK),
- CONFIG_TEST(parsing_trusted_dir_server, 0),
- CONFIG_TEST(parsing_fallback_dir_server, 0),
- CONFIG_TEST(adding_default_trusted_dir_servers, TT_FORK),
- CONFIG_TEST(adding_dir_servers, TT_FORK),
- CONFIG_TEST(default_dir_servers, TT_FORK),
- CONFIG_TEST(default_fallback_dirs, 0),
- CONFIG_TEST(resolve_my_address, TT_FORK),
- CONFIG_TEST(addressmap, 0),
- CONFIG_TEST(parse_bridge_line, 0),
- CONFIG_TEST(parse_transport_options_line, 0),
- CONFIG_TEST(parse_transport_plugin_line, TT_FORK),
- CONFIG_TEST(check_or_create_data_subdir, TT_FORK),
- CONFIG_TEST(write_to_data_subdir, TT_FORK),
- CONFIG_TEST(fix_my_family, 0),
- CONFIG_TEST(directory_fetch, 0),
- CONFIG_TEST(port_cfg_line_extract_addrport, 0),
- CONFIG_TEST(parse_port_config__listenaddress, 0),
- CONFIG_TEST(parse_port_config__ports__no_ports_given, 0),
- CONFIG_TEST(parse_port_config__ports__server_options, 0),
- CONFIG_TEST(parse_port_config__ports__ports_given, 0),
- CONFIG_TEST(parse_log_severity, 0),
- END_OF_TESTCASES
- };
|