123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461 |
- /* Copyright (c) 2001-2004, Roger Dingledine.
- * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
- * Copyright (c) 2007-2014, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- #include "orconfig.h"
- #define CONFIG_PRIVATE
- #define PT_PRIVATE
- #include "or.h"
- #include "addressmap.h"
- #include "config.h"
- #include "confparse.h"
- #include "connection_edge.h"
- #include "test.h"
- #include "util.h"
- #include "address.h"
- #include "entrynodes.h"
- #include "transports.h"
- static void
- test_config_addressmap(void *arg)
- {
- char buf[1024];
- char address[256];
- time_t expires = TIME_MAX;
- (void)arg;
- strlcpy(buf, "MapAddress .invalidwildcard.com *.torserver.exit\n" // invalid
- "MapAddress *invalidasterisk.com *.torserver.exit\n" // invalid
- "MapAddress *.google.com *.torserver.exit\n"
- "MapAddress *.yahoo.com *.google.com.torserver.exit\n"
- "MapAddress *.cn.com www.cnn.com\n"
- "MapAddress *.cnn.com www.cnn.com\n"
- "MapAddress ex.com www.cnn.com\n"
- "MapAddress ey.com *.cnn.com\n"
- "MapAddress www.torproject.org 1.1.1.1\n"
- "MapAddress other.torproject.org "
- "this.torproject.org.otherserver.exit\n"
- "MapAddress test.torproject.org 2.2.2.2\n"
- "MapAddress www.google.com 3.3.3.3\n"
- "MapAddress www.example.org 4.4.4.4\n"
- "MapAddress 4.4.4.4 7.7.7.7\n"
- "MapAddress 4.4.4.4 5.5.5.5\n"
- "MapAddress www.infiniteloop.org 6.6.6.6\n"
- "MapAddress 6.6.6.6 www.infiniteloop.org\n"
- , sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- /* Use old interface for now, so we don't need to rewrite the unit tests */
- #define addressmap_rewrite(a,s,eo,ao) \
- addressmap_rewrite((a),(s),AMR_FLAG_USE_IPV4_DNS|AMR_FLAG_USE_IPV6_DNS, \
- (eo),(ao))
- /* MapAddress .invalidwildcard.com .torserver.exit - no match */
- strlcpy(address, "www.invalidwildcard.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* MapAddress *invalidasterisk.com .torserver.exit - no match */
- strlcpy(address, "www.invalidasterisk.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Where no mapping for FQDN match on top-level domain */
- /* MapAddress .google.com .torserver.exit */
- strlcpy(address, "reader.google.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "reader.torserver.exit");
- /* MapAddress *.yahoo.com *.google.com.torserver.exit */
- strlcpy(address, "reader.yahoo.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "reader.google.com.torserver.exit");
- /*MapAddress *.cnn.com www.cnn.com */
- strlcpy(address, "cnn.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.cnn.com");
- /* MapAddress .cn.com www.cnn.com */
- strlcpy(address, "www.cn.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.cnn.com");
- /* MapAddress ex.com www.cnn.com - no match */
- strlcpy(address, "www.ex.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* MapAddress ey.com *.cnn.com - invalid expression */
- strlcpy(address, "ey.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Where mapping for FQDN match on FQDN */
- strlcpy(address, "www.google.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "3.3.3.3");
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "other.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "this.torproject.org.otherserver.exit");
- strlcpy(address, "test.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "2.2.2.2");
- /* Test a chain of address mappings and the order in which they were added:
- "MapAddress www.example.org 4.4.4.4"
- "MapAddress 4.4.4.4 7.7.7.7"
- "MapAddress 4.4.4.4 5.5.5.5"
- */
- strlcpy(address, "www.example.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "5.5.5.5");
- /* Test infinite address mapping results in no change */
- strlcpy(address, "www.infiniteloop.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.infiniteloop.org");
- /* Test we don't find false positives */
- strlcpy(address, "www.example.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Test top-level-domain matching a bit harder */
- config_free_lines(get_options_mutable()->AddressMap);
- addressmap_clear_configured();
- strlcpy(buf, "MapAddress *.com *.torserver.exit\n"
- "MapAddress *.torproject.org 1.1.1.1\n"
- "MapAddress *.net 2.2.2.2\n"
- , sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- strlcpy(address, "www.abc.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.abc.torserver.exit");
- strlcpy(address, "www.def.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.def.torserver.exit");
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "test.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "torproject.net", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "2.2.2.2");
- /* We don't support '*' as a mapping directive */
- config_free_lines(get_options_mutable()->AddressMap);
- addressmap_clear_configured();
- strlcpy(buf, "MapAddress * *.torserver.exit\n", sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- strlcpy(address, "www.abc.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- strlcpy(address, "www.def.net", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- #undef addressmap_rewrite
- done:
- config_free_lines(get_options_mutable()->AddressMap);
- get_options_mutable()->AddressMap = NULL;
- }
- static int
- is_private_dir(const char* path)
- {
- struct stat st;
- int r = stat(path, &st);
- if (r) {
- return 0;
- }
- #if !defined (_WIN32)
- if ((st.st_mode & (S_IFDIR | 0777)) != (S_IFDIR | 0700)) {
- return 0;
- }
- #endif
- return 1;
- }
- static void
- test_config_check_or_create_data_subdir(void *arg)
- {
- or_options_t *options = get_options_mutable();
- char *datadir;
- const char *subdir = "test_stats";
- char *subpath;
- struct stat st;
- int r;
- #if !defined (_WIN32)
- unsigned group_permission;
- #endif
- (void)arg;
- tor_free(options->DataDirectory);
- datadir = options->DataDirectory = tor_strdup(get_fname("datadir-0"));
- subpath = get_datadir_fname(subdir);
- #if defined (_WIN32)
- tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0);
- #else
- tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0);
- #endif
- r = stat(subpath, &st);
- // The subdirectory shouldn't exist yet,
- // but should be created by the call to check_or_create_data_subdir.
- tt_assert(r && (errno == ENOENT));
- tt_assert(!check_or_create_data_subdir(subdir));
- tt_assert(is_private_dir(subpath));
- // The check should return 0, if the directory already exists
- // and is private to the user.
- tt_assert(!check_or_create_data_subdir(subdir));
- r = stat(subpath, &st);
- if (r) {
- tt_abort_perror("stat");
- }
- #if !defined (_WIN32)
- group_permission = st.st_mode | 0070;
- r = chmod(subpath, group_permission);
- if (r) {
- tt_abort_perror("chmod");
- }
- // If the directory exists, but its mode is too permissive
- // a call to check_or_create_data_subdir should reset the mode.
- tt_assert(!is_private_dir(subpath));
- tt_assert(!check_or_create_data_subdir(subdir));
- tt_assert(is_private_dir(subpath));
- #endif
- done:
- rmdir(subpath);
- tor_free(datadir);
- tor_free(subpath);
- }
- static void
- test_config_write_to_data_subdir(void *arg)
- {
- or_options_t* options = get_options_mutable();
- char *datadir;
- char *cp = NULL;
- const char* subdir = "test_stats";
- const char* fname = "test_file";
- const char* str =
- "Lorem ipsum dolor sit amet, consetetur sadipscing\n"
- "elitr, sed diam nonumy eirmod\n"
- "tempor invidunt ut labore et dolore magna aliquyam\n"
- "erat, sed diam voluptua.\n"
- "At vero eos et accusam et justo duo dolores et ea\n"
- "rebum. Stet clita kasd gubergren,\n"
- "no sea takimata sanctus est Lorem ipsum dolor sit amet.\n"
- "Lorem ipsum dolor sit amet,\n"
- "consetetur sadipscing elitr, sed diam nonumy eirmod\n"
- "tempor invidunt ut labore et dolore\n"
- "magna aliquyam erat, sed diam voluptua. At vero eos et\n"
- "accusam et justo duo dolores et\n"
- "ea rebum. Stet clita kasd gubergren, no sea takimata\n"
- "sanctus est Lorem ipsum dolor sit amet.";
- char* filepath = NULL;
- (void)arg;
- tor_free(options->DataDirectory);
- datadir = options->DataDirectory = tor_strdup(get_fname("datadir-1"));
- filepath = get_datadir_fname2(subdir, fname);
- #if defined (_WIN32)
- tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0);
- #else
- tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0);
- #endif
- // Write attempt shoudl fail, if subdirectory doesn't exist.
- tt_assert(write_to_data_subdir(subdir, fname, str, NULL));
- tt_assert(! check_or_create_data_subdir(subdir));
- // Content of file after write attempt should be
- // equal to the original string.
- tt_assert(!write_to_data_subdir(subdir, fname, str, NULL));
- cp = read_file_to_str(filepath, 0, NULL);
- tt_str_op(cp,OP_EQ, str);
- tor_free(cp);
- // A second write operation should overwrite the old content.
- tt_assert(!write_to_data_subdir(subdir, fname, str, NULL));
- cp = read_file_to_str(filepath, 0, NULL);
- tt_str_op(cp,OP_EQ, str);
- tor_free(cp);
- done:
- (void) unlink(filepath);
- rmdir(options->DataDirectory);
- tor_free(datadir);
- tor_free(filepath);
- tor_free(cp);
- }
- /* Test helper function: Make sure that a bridge line gets parsed
- * properly. Also make sure that the resulting bridge_line_t structure
- * has its fields set correctly. */
- static void
- good_bridge_line_test(const char *string, const char *test_addrport,
- const char *test_digest, const char *test_transport,
- const smartlist_t *test_socks_args)
- {
- char *tmp = NULL;
- bridge_line_t *bridge_line = parse_bridge_line(string);
- tt_assert(bridge_line);
- /* test addrport */
- tmp = tor_strdup(fmt_addrport(&bridge_line->addr, bridge_line->port));
- tt_str_op(test_addrport,OP_EQ, tmp);
- tor_free(tmp);
- /* If we were asked to validate a digest, but we did not get a
- digest after parsing, we failed. */
- if (test_digest && tor_digest_is_zero(bridge_line->digest))
- tt_assert(0);
- /* If we were not asked to validate a digest, and we got a digest
- after parsing, we failed again. */
- if (!test_digest && !tor_digest_is_zero(bridge_line->digest))
- tt_assert(0);
- /* If we were asked to validate a digest, and we got a digest after
- parsing, make sure it's correct. */
- if (test_digest) {
- tmp = tor_strdup(hex_str(bridge_line->digest, DIGEST_LEN));
- tor_strlower(tmp);
- tt_str_op(test_digest,OP_EQ, tmp);
- tor_free(tmp);
- }
- /* If we were asked to validate a transport name, make sure tha it
- matches with the transport name that was parsed. */
- if (test_transport && !bridge_line->transport_name)
- tt_assert(0);
- if (!test_transport && bridge_line->transport_name)
- tt_assert(0);
- if (test_transport)
- tt_str_op(test_transport,OP_EQ, bridge_line->transport_name);
- /* Validate the SOCKS argument smartlist. */
- if (test_socks_args && !bridge_line->socks_args)
- tt_assert(0);
- if (!test_socks_args && bridge_line->socks_args)
- tt_assert(0);
- if (test_socks_args)
- tt_assert(smartlist_strings_eq(test_socks_args,
- bridge_line->socks_args));
- done:
- tor_free(tmp);
- bridge_line_free(bridge_line);
- }
- /* Test helper function: Make sure that a bridge line is
- * unparseable. */
- static void
- bad_bridge_line_test(const char *string)
- {
- bridge_line_t *bridge_line = parse_bridge_line(string);
- if (bridge_line)
- TT_FAIL(("%s was supposed to fail, but it didn't.", string));
- tt_assert(!bridge_line);
- done:
- bridge_line_free(bridge_line);
- }
- static void
- test_config_parse_bridge_line(void *arg)
- {
- (void) arg;
- good_bridge_line_test("192.0.2.1:4123",
- "192.0.2.1:4123", NULL, NULL, NULL);
- good_bridge_line_test("192.0.2.1",
- "192.0.2.1:443", NULL, NULL, NULL);
- good_bridge_line_test("transport [::1]",
- "[::1]:443", NULL, "transport", NULL);
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "192.0.2.1:12",
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "transport", NULL);
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413 twoandtwo=five",
- "192.0.2.1:12", "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
- smartlist_add_asprintf(sl_tmp, "z=z");
- good_bridge_line_test("transport 192.0.2.1:12 twoandtwo=five z=z",
- "192.0.2.1:12", NULL, "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "dub=come");
- smartlist_add_asprintf(sl_tmp, "save=me");
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349666 "
- "dub=come save=me",
- "192.0.2.1:12",
- "4352e58420e68f5e40bf7c74faddccd9d1349666",
- "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- good_bridge_line_test("192.0.2.1:1231 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "192.0.2.1:1231",
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- NULL, NULL);
- /* Empty line */
- bad_bridge_line_test("");
- /* bad transport name */
- bad_bridge_line_test("tr$n_sp0r7 190.20.2.2");
- /* weird ip address */
- bad_bridge_line_test("a.b.c.d");
- /* invalid fpr */
- bad_bridge_line_test("2.2.2.2:1231 4352e58420e68f5e40bf7c74faddccd9d1349");
- /* no k=v in the end */
- bad_bridge_line_test("obfs2 2.2.2.2:1231 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413 what");
- /* no addrport */
- bad_bridge_line_test("asdw");
- /* huge k=v value that can't fit in SOCKS fields */
- bad_bridge_line_test(
- "obfs2 2.2.2.2:1231 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aa=b");
- }
- static void
- test_config_parse_transport_options_line(void *arg)
- {
- smartlist_t *options_sl = NULL, *sl_tmp = NULL;
- (void) arg;
- { /* too small line */
- options_sl = get_options_from_transport_options_line("valley", NULL);
- tt_assert(!options_sl);
- }
- { /* no k=v values */
- options_sl = get_options_from_transport_options_line("hit it!", NULL);
- tt_assert(!options_sl);
- }
- { /* correct line, but wrong transport specified */
- options_sl =
- get_options_from_transport_options_line("trebuchet k=v", "rook");
- tt_assert(!options_sl);
- }
- { /* correct -- no transport specified */
- sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "ladi=dadi");
- smartlist_add_asprintf(sl_tmp, "weliketo=party");
- options_sl =
- get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
- NULL);
- tt_assert(options_sl);
- tt_assert(smartlist_strings_eq(options_sl, sl_tmp));
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- sl_tmp = NULL;
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- options_sl = NULL;
- }
- { /* correct -- correct transport specified */
- sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "ladi=dadi");
- smartlist_add_asprintf(sl_tmp, "weliketo=party");
- options_sl =
- get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
- "rook");
- tt_assert(options_sl);
- tt_assert(smartlist_strings_eq(options_sl, sl_tmp));
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- sl_tmp = NULL;
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- options_sl = NULL;
- }
- done:
- if (options_sl) {
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- }
- if (sl_tmp) {
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- }
- /* Mocks needed for the transport plugin line test */
- static void pt_kickstart_proxy_mock(const smartlist_t *transport_list,
- char **proxy_argv, int is_server);
- static int transport_add_from_config_mock(const tor_addr_t *addr,
- uint16_t port, const char *name,
- int socks_ver);
- static int transport_is_needed_mock(const char *transport_name);
- static int pt_kickstart_proxy_mock_call_count = 0;
- static int transport_add_from_config_mock_call_count = 0;
- static int transport_is_needed_mock_call_count = 0;
- static int transport_is_needed_mock_return = 0;
- static void
- pt_kickstart_proxy_mock(const smartlist_t *transport_list,
- char **proxy_argv, int is_server)
- {
- (void) transport_list;
- (void) proxy_argv;
- (void) is_server;
- /* XXXX check that args are as expected. */
- ++pt_kickstart_proxy_mock_call_count;
- free_execve_args(proxy_argv);
- }
- static int
- transport_add_from_config_mock(const tor_addr_t *addr,
- uint16_t port, const char *name,
- int socks_ver)
- {
- (void) addr;
- (void) port;
- (void) name;
- (void) socks_ver;
- /* XXXX check that args are as expected. */
- ++transport_add_from_config_mock_call_count;
- return 0;
- }
- static int
- transport_is_needed_mock(const char *transport_name)
- {
- (void) transport_name;
- /* XXXX check that arg is as expected. */
- ++transport_is_needed_mock_call_count;
- return transport_is_needed_mock_return;
- }
- /**
- * Test parsing for the ClientTransportPlugin and ServerTransportPlugin config
- * options.
- */
- static void
- test_config_parse_transport_plugin_line(void *arg)
- {
- (void)arg;
- or_options_t *options = get_options_mutable();
- int r, tmp;
- int old_pt_kickstart_proxy_mock_call_count;
- int old_transport_add_from_config_mock_call_count;
- int old_transport_is_needed_mock_call_count;
- /* Bad transport lines - too short */
- r = parse_transport_line(options, "bad", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options, "bad", 1, 1);
- tt_assert(r < 0);
- r = parse_transport_line(options, "bad bad", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options, "bad bad", 1, 1);
- tt_assert(r < 0);
- /* Test transport list parsing */
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r == 0);
- /* Bad transport identifiers */
- r = parse_transport_line(options,
- "transport_* exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_* exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r < 0);
- /* Check SOCKS cases for client transport */
- r = parse_transport_line(options,
- "transport_1 socks4 1.2.3.4:567", 1, 0);
- tt_assert(r == 0);
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4:567", 1, 0);
- tt_assert(r == 0);
- /* Proxy case for server transport */
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4:567", 1, 1);
- tt_assert(r == 0);
- /* Multiple-transport error exit */
- r = parse_transport_line(options,
- "transport_1,transport_2 socks5 1.2.3.4:567", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 proxy 1.2.3.4:567", 1, 1);
- /* No port error exit */
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4", 1, 1);
- tt_assert(r < 0);
- /* Unparsable address error exit */
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3:6x7", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3:6x7", 1, 1);
- tt_assert(r < 0);
- /* "Strange {Client|Server}TransportPlugin field" error exit */
- r = parse_transport_line(options,
- "transport_1 foo bar", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 foo bar", 1, 1);
- tt_assert(r < 0);
- /* No sandbox mode error exit */
- tmp = options->Sandbox;
- options->Sandbox = 1;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 0);
- tt_assert(r < 0);
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 1);
- tt_assert(r < 0);
- options->Sandbox = tmp;
- /*
- * These final test cases cover code paths that only activate without
- * validate_only, so they need mocks in place.
- */
- MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock);
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 1);
- tt_assert(r == 0);
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count + 1);
- UNMOCK(pt_kickstart_proxy);
- /* This one hits a log line in the !validate_only case only */
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4:567", 0, 1);
- tt_assert(r == 0);
- /* Check mocked client transport cases */
- MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock);
- MOCK(transport_add_from_config, transport_add_from_config_mock);
- MOCK(transport_is_needed, transport_is_needed_mock);
- /* Unnecessary transport case */
- transport_is_needed_mock_return = 0;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 0);
- /* Should have succeeded */
- tt_assert(r == 0);
- /* transport_is_needed() should have been called */
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /*
- * pt_kickstart_proxy() and transport_add_from_config() should
- * not have been called.
- */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count);
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count);
- /* Necessary transport case */
- transport_is_needed_mock_return = 1;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 0);
- /* Should have succeeded */
- tt_assert(r == 0);
- /*
- * transport_is_needed() and pt_kickstart_proxy() should have been
- * called.
- */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count + 1);
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /* transport_add_from_config() should not have been called. */
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count);
- /* proxy case */
- transport_is_needed_mock_return = 1;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4:567", 0, 0);
- /* Should have succeeded */
- tt_assert(r == 0);
- /*
- * transport_is_needed() and transport_add_from_config() should have
- * been called.
- */
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count + 1);
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /* pt_kickstart_proxy() should not have been called. */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count);
- /* Done with mocked client transport cases */
- UNMOCK(transport_is_needed);
- UNMOCK(transport_add_from_config);
- UNMOCK(pt_kickstart_proxy);
- done:
- /* Make sure we undo all mocks */
- UNMOCK(pt_kickstart_proxy);
- UNMOCK(transport_add_from_config);
- UNMOCK(transport_is_needed);
- return;
- }
- // Tests if an options with MyFamily fingerprints missing '$' normalises
- // them correctly and also ensure it also works with multiple fingerprints
- static void
- test_config_fix_my_family(void *arg)
- {
- char *err = NULL;
- const char *family = "$1111111111111111111111111111111111111111, "
- "1111111111111111111111111111111111111112, "
- "$1111111111111111111111111111111111111113";
- or_options_t* options = options_new();
- or_options_t* defaults = options_new();
- (void) arg;
- options_init(options);
- options_init(defaults);
- options->MyFamily = tor_strdup(family);
- options_validate(NULL, options, defaults, 0, &err) ;
- if (err != NULL) {
- TT_FAIL(("options_validate failed: %s", err));
- }
- tt_str_op(options->MyFamily,OP_EQ,
- "$1111111111111111111111111111111111111111, "
- "$1111111111111111111111111111111111111112, "
- "$1111111111111111111111111111111111111113");
- done:
- if (err != NULL) {
- tor_free(err);
- }
- or_options_free(options);
- or_options_free(defaults);
- }
- static int n_hostname_01010101 = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It answers with 1.1.1.1 as IP adddress that resulted from lookup.
- * This function increments <b>n_hostname_01010101</b> counter by one
- * every time it is called.
- */
- static int
- tor_lookup_hostname_01010101(const char *name, uint32_t *addr)
- {
- n_hostname_01010101++;
- if (name && addr) {
- *addr = ntohl(0x01010101);
- }
- return 0;
- }
- static int n_hostname_localhost = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It answers with 127.0.0.1 as IP adddress that resulted from lookup.
- * This function increments <b>n_hostname_localhost</b> counter by one
- * every time it is called.
- */
- static int
- tor_lookup_hostname_localhost(const char *name, uint32_t *addr)
- {
- n_hostname_localhost++;
- if (name && addr) {
- *addr = 0x7f000001;
- }
- return 0;
- }
- static int n_hostname_failure = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It pretends to fail by returning -1 to caller. Also, this function
- * increments <b>n_hostname_failure</b> every time it is called.
- */
- static int
- tor_lookup_hostname_failure(const char *name, uint32_t *addr)
- {
- (void)name;
- (void)addr;
- n_hostname_failure++;
- return -1;
- }
- static int n_gethostname_replacement = 0;
- /** This mock function is meant to replace tor_gethostname(). It
- * responds with string "onionrouter!" as hostname. This function
- * increments <b>n_gethostname_replacement</b> by one every time
- * it is called.
- */
- static int
- tor_gethostname_replacement(char *name, size_t namelen)
- {
- n_gethostname_replacement++;
- if (name && namelen) {
- strlcpy(name,"onionrouter!",namelen);
- }
- return 0;
- }
- static int n_gethostname_localhost = 0;
- /** This mock function is meant to replace tor_gethostname(). It
- * responds with string "127.0.0.1" as hostname. This function
- * increments <b>n_gethostname_localhost</b> by one every time
- * it is called.
- */
- static int
- tor_gethostname_localhost(char *name, size_t namelen)
- {
- n_gethostname_localhost++;
- if (name && namelen) {
- strlcpy(name,"127.0.0.1",namelen);
- }
- return 0;
- }
- static int n_gethostname_failure = 0;
- /** This mock function is meant to replace tor_gethostname.
- * It pretends to fail by returning -1. This function increments
- * <b>n_gethostname_failure</b> by one every time it is called.
- */
- static int
- tor_gethostname_failure(char *name, size_t namelen)
- {
- (void)name;
- (void)namelen;
- n_gethostname_failure++;
- return -1;
- }
- static int n_get_interface_address = 0;
- /** This mock function is meant to replace get_interface_address().
- * It answers with address 8.8.8.8. This function increments
- * <b>n_get_interface_address</b> by one every time it is called.
- */
- static int
- get_interface_address_08080808(int severity, uint32_t *addr)
- {
- (void)severity;
- n_get_interface_address++;
- if (addr) {
- *addr = ntohl(0x08080808);
- }
- return 0;
- }
- static int n_get_interface_address6 = 0;
- static sa_family_t last_address6_family;
- /** This mock function is meant to replace get_interface_address6().
- * It answers with IP address 9.9.9.9 iff both of the following are true:
- * - <b>family</b> is AF_INET
- * - <b>addr</b> pointer is not NULL.
- * This function increments <b>n_get_interface_address6</b> by one every
- * time it is called.
- */
- static int
- get_interface_address6_replacement(int severity, sa_family_t family,
- tor_addr_t *addr)
- {
- (void)severity;
- last_address6_family = family;
- n_get_interface_address6++;
- if ((family != AF_INET) || !addr) {
- return -1;
- }
- tor_addr_from_ipv4h(addr,0x09090909);
- return 0;
- }
- static int n_get_interface_address_failure = 0;
- /**
- * This mock function is meant to replace get_interface_address().
- * It pretends to fail getting interface address by returning -1.
- * <b>n_get_interface_address_failure</b> is incremented by one
- * every time this function is called.
- */
- static int
- get_interface_address_failure(int severity, uint32_t *addr)
- {
- (void)severity;
- (void)addr;
- n_get_interface_address_failure++;
- return -1;
- }
- static int n_get_interface_address6_failure = 0;
- /**
- * This mock function is meant to replace get_interface_addres6().
- * It will pretent to fail by return -1.
- * <b>n_get_interface_address6_failure</b> is incremented by one
- * every time this function is called and <b>last_address6_family</b>
- * is assigned the value of <b>family</b> argument.
- */
- static int
- get_interface_address6_failure(int severity, sa_family_t family,
- tor_addr_t *addr)
- {
- (void)severity;
- (void)addr;
- n_get_interface_address6_failure++;
- last_address6_family = family;
- return -1;
- }
- static void
- test_config_resolve_my_address(void *arg)
- {
- or_options_t *options;
- uint32_t resolved_addr;
- const char *method_used;
- char *hostname_out = NULL;
- int retval;
- int prev_n_hostname_01010101;
- int prev_n_hostname_localhost;
- int prev_n_hostname_failure;
- int prev_n_gethostname_replacement;
- int prev_n_gethostname_failure;
- int prev_n_gethostname_localhost;
- int prev_n_get_interface_address;
- int prev_n_get_interface_address_failure;
- int prev_n_get_interface_address6;
- int prev_n_get_interface_address6_failure;
- (void)arg;
- options = options_new();
- options_init(options);
- /*
- * CASE 1:
- * If options->Address is a valid IPv4 address string, we want
- * the corresponding address to be parsed and returned.
- */
- options->Address = tor_strdup("128.52.128.105");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want_str_op(method_used,==,"CONFIGURED");
- tt_want(hostname_out == NULL);
- tt_assert(htonl(resolved_addr) == 0x69803480);
- tor_free(options->Address);
- /*
- * CASE 2:
- * If options->Address is a valid DNS address, we want resolve_my_address()
- * function to ask tor_lookup_hostname() for help with resolving it
- * and return the address that was resolved (in host order).
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
- tor_free(options->Address);
- options->Address = tor_strdup("www.torproject.org");
- prev_n_hostname_01010101 = n_hostname_01010101;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
- tt_want_str_op(method_used,==,"RESOLVED");
- tt_want_str_op(hostname_out,==,"www.torproject.org");
- tt_assert(htonl(resolved_addr) == 0x01010101);
- UNMOCK(tor_lookup_hostname);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 3:
- * Given that options->Address is NULL, we want resolve_my_address()
- * to try and use tor_gethostname() to get hostname AND use
- * tor_lookup_hostname() to get IP address.
- */
- resolved_addr = 0;
- tor_free(options->Address);
- options->Address = NULL;
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_01010101 = n_hostname_01010101;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
- tt_want_str_op(method_used,==,"GETHOSTNAME");
- tt_want_str_op(hostname_out,==,"onionrouter!");
- tt_assert(htonl(resolved_addr) == 0x01010101);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- tor_free(hostname_out);
- /*
- * CASE 4:
- * Given that options->Address is a local host address, we want
- * resolve_my_address() function to fail.
- */
- resolved_addr = 0;
- tor_free(options->Address);
- options->Address = tor_strdup("127.0.0.1");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(resolved_addr == 0);
- tt_assert(retval == -1);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 5:
- * We want resolve_my_address() to fail if DNS address in options->Address
- * cannot be resolved.
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- prev_n_hostname_failure = n_hostname_failure;
- tor_free(options->Address);
- options->Address = tor_strdup("www.tor-project.org");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_lookup_hostname);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 6:
- * If options->Address is NULL AND gettting local hostname fails, we want
- * resolve_my_address() to fail as well.
- */
- MOCK(tor_gethostname,tor_gethostname_failure);
- prev_n_gethostname_failure = n_gethostname_failure;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_failure == prev_n_gethostname_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- tor_free(hostname_out);
- /*
- * CASE 7:
- * We want resolve_my_address() to try and get network interface address via
- * get_interface_address() if hostname returned by tor_gethostname() cannot be
- * resolved into IP address.
- */
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- MOCK(get_interface_address,get_interface_address_08080808);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_get_interface_address = n_get_interface_address;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want_int_op(n_gethostname_replacement, ==,
- prev_n_gethostname_replacement + 1);
- tt_want_int_op(n_get_interface_address, ==,
- prev_n_get_interface_address + 1);
- tt_want_str_op(method_used,==,"INTERFACE");
- tt_want(hostname_out == NULL);
- tt_assert(resolved_addr == ntohl(0x08080808));
- UNMOCK(get_interface_address);
- tor_free(hostname_out);
- /*
- * CASE 8:
- * Suppose options->Address is NULL AND hostname returned by tor_gethostname()
- * is unresolvable. We want resolve_my_address to fail if
- * get_interface_address() fails.
- */
- MOCK(get_interface_address,get_interface_address_failure);
- prev_n_get_interface_address_failure = n_get_interface_address_failure;
- prev_n_gethostname_replacement = n_gethostname_replacement;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_get_interface_address_failure ==
- prev_n_get_interface_address_failure + 1);
- tt_want(n_gethostname_replacement ==
- prev_n_gethostname_replacement + 1);
- tt_assert(retval == -1);
- UNMOCK(get_interface_address);
- tor_free(hostname_out);
- /*
- * CASE 9:
- * Given that options->Address is NULL AND tor_lookup_hostname()
- * fails AND hostname returned by gethostname() resolves
- * to local IP address, we want resolve_my_address() function to
- * call get_interface_address6(.,AF_INET,.) and return IP address
- * the latter function has found.
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(get_interface_address6,get_interface_address6_replacement);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_failure = n_hostname_failure;
- prev_n_get_interface_address6 = n_get_interface_address6;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(last_address6_family == AF_INET);
- tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(retval == 0);
- tt_want_str_op(method_used,==,"INTERFACE");
- tt_assert(htonl(resolved_addr) == 0x09090909);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(tor_gethostname);
- UNMOCK(get_interface_address6);
- tor_free(hostname_out);
- /*
- * CASE 10: We want resolve_my_address() to fail if all of the following
- * are true:
- * 1. options->Address is not NULL
- * 2. ... but it cannot be converted to struct in_addr by
- * tor_inet_aton()
- * 3. ... and tor_lookup_hostname() fails to resolve the
- * options->Address
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- prev_n_hostname_failure = n_hostname_failure;
- tor_free(options->Address);
- options->Address = tor_strdup("some_hostname");
- retval = resolve_my_address(LOG_NOTICE, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- tor_free(hostname_out);
- /*
- * CASE 11:
- * Suppose the following sequence of events:
- * 1. options->Address is NULL
- * 2. tor_gethostname() succeeds to get hostname of machine Tor
- * if running on.
- * 3. Hostname from previous step cannot be converted to
- * address by using tor_inet_aton() function.
- * 4. However, tor_lookup_hostname() succeds in resolving the
- * hostname from step 2.
- * 5. Unfortunately, tor_addr_is_internal() deems this address
- * to be internal.
- * 6. get_interface_address6(.,AF_INET,.) returns non-internal
- * IPv4
- *
- * We want resolve_my_addr() to succeed with method "INTERFACE"
- * and address from step 6.
- */
- tor_free(options->Address);
- options->Address = NULL;
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_localhost);
- MOCK(get_interface_address6,get_interface_address6_replacement);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_localhost = n_hostname_localhost;
- prev_n_get_interface_address6 = n_get_interface_address6;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
- tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
- tt_str_op(method_used,==,"INTERFACE");
- tt_assert(!hostname_out);
- tt_assert(retval == 0);
- /*
- * CASE 11b:
- * 1-5 as above.
- * 6. get_interface_address6() fails.
- *
- * In this subcase, we want resolve_my_address() to fail.
- */
- UNMOCK(get_interface_address6);
- MOCK(get_interface_address6,get_interface_address6_failure);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_localhost = n_hostname_localhost;
- prev_n_get_interface_address6_failure = n_get_interface_address6_failure;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
- tt_want(n_get_interface_address6_failure ==
- prev_n_get_interface_address6_failure + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(get_interface_address6);
- /* CASE 12:
- * Suppose the following happens:
- * 1. options->Address is NULL AND options->DirAuthorities is 1.
- * 2. tor_gethostname() succeeds in getting hostname of a machine ...
- * 3. ... which is successfully parsed by tor_inet_aton() ...
- * 4. into IPv4 address that tor_addr_is_inernal() considers to be
- * internal.
- *
- * In this case, we want resolve_my_address() to fail.
- */
- tor_free(options->Address);
- options->Address = NULL;
- options->DirAuthorities = tor_malloc_zero(sizeof(config_line_t));
- MOCK(tor_gethostname,tor_gethostname_localhost);
- prev_n_gethostname_localhost = n_gethostname_localhost;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_localhost == prev_n_gethostname_localhost + 1);
- tt_assert(retval == -1);
- UNMOCK(tor_gethostname);
- done:
- tor_free(options->Address);
- tor_free(options->DirAuthorities);
- or_options_free(options);
- tor_free(hostname_out);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(get_interface_address);
- UNMOCK(get_interface_address6);
- UNMOCK(tor_gethostname);
- }
- #define CONFIG_TEST(name, flags) \
- { #name, test_config_ ## name, flags, NULL, NULL }
- struct testcase_t config_tests[] = {
- CONFIG_TEST(resolve_my_address, TT_FORK),
- CONFIG_TEST(addressmap, 0),
- CONFIG_TEST(parse_bridge_line, 0),
- CONFIG_TEST(parse_transport_options_line, 0),
- CONFIG_TEST(parse_transport_plugin_line, TT_FORK),
- CONFIG_TEST(check_or_create_data_subdir, TT_FORK),
- CONFIG_TEST(write_to_data_subdir, TT_FORK),
- CONFIG_TEST(fix_my_family, 0),
- END_OF_TESTCASES
- };
|