12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065 |
- /* Copyright (c) 2001-2004, Roger Dingledine.
- * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
- * Copyright (c) 2007-2019, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- #include "orconfig.h"
- #define CONFIG_PRIVATE
- #define PT_PRIVATE
- #define ROUTERSET_PRIVATE
- #include "core/or/or.h"
- #include "lib/net/address.h"
- #include "lib/net/resolve.h"
- #include "feature/client/addressmap.h"
- #include "feature/client/bridges.h"
- #include "core/or/circuitmux_ewma.h"
- #include "core/or/circuitbuild.h"
- #include "app/config/config.h"
- #include "lib/confmgt/confparse.h"
- #include "core/mainloop/connection.h"
- #include "core/or/connection_edge.h"
- #include "test/test.h"
- #include "core/or/connection_or.h"
- #include "feature/control/control.h"
- #include "core/mainloop/cpuworker.h"
- #include "feature/dircache/dirserv.h"
- #include "feature/dirauth/dirvote.h"
- #include "feature/relay/dns.h"
- #include "feature/client/entrynodes.h"
- #include "feature/client/transports.h"
- #include "feature/relay/ext_orport.h"
- #include "lib/geoip/geoip.h"
- #include "feature/hibernate/hibernate.h"
- #include "core/mainloop/mainloop.h"
- #include "feature/nodelist/networkstatus.h"
- #include "feature/nodelist/nodelist.h"
- #include "core/or/policies.h"
- #include "feature/rend/rendclient.h"
- #include "feature/rend/rendservice.h"
- #include "feature/relay/router.h"
- #include "feature/relay/routermode.h"
- #include "feature/nodelist/dirlist.h"
- #include "feature/nodelist/routerlist.h"
- #include "feature/nodelist/routerset.h"
- #include "app/config/statefile.h"
- #include "test/test_helpers.h"
- #include "feature/dirclient/dir_server_st.h"
- #include "core/or/port_cfg_st.h"
- #include "feature/nodelist/routerinfo_st.h"
- #include "lib/fs/conffile.h"
- #include "lib/meminfo/meminfo.h"
- #include "lib/net/gethostname.h"
- #include "lib/encoding/confline.h"
- #include "lib/encoding/kvline.h"
- #ifdef HAVE_UNISTD_H
- #include <unistd.h>
- #endif
- #ifdef HAVE_SYS_STAT_H
- #include <sys/stat.h>
- #endif
- static void
- test_config_addressmap(void *arg)
- {
- char buf[1024];
- char address[256];
- time_t expires = TIME_MAX;
- (void)arg;
- strlcpy(buf, "MapAddress .invalidwildcard.com *.torserver.exit\n" // invalid
- "MapAddress *invalidasterisk.com *.torserver.exit\n" // invalid
- "MapAddress *.google.com *.torserver.exit\n"
- "MapAddress *.yahoo.com *.google.com.torserver.exit\n"
- "MapAddress *.cn.com www.cnn.com\n"
- "MapAddress *.cnn.com www.cnn.com\n"
- "MapAddress ex.com www.cnn.com\n"
- "MapAddress ey.com *.cnn.com\n"
- "MapAddress www.torproject.org 1.1.1.1\n"
- "MapAddress other.torproject.org "
- "this.torproject.org.otherserver.exit\n"
- "MapAddress test.torproject.org 2.2.2.2\n"
- "MapAddress www.google.com 3.3.3.3\n"
- "MapAddress www.example.org 4.4.4.4\n"
- "MapAddress 4.4.4.4 7.7.7.7\n"
- "MapAddress 4.4.4.4 5.5.5.5\n"
- "MapAddress www.infiniteloop.org 6.6.6.6\n"
- "MapAddress 6.6.6.6 www.infiniteloop.org\n"
- , sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- /* Use old interface for now, so we don't need to rewrite the unit tests */
- #define addressmap_rewrite(a,s,eo,ao) \
- addressmap_rewrite((a),(s), ~0, (eo),(ao))
- /* MapAddress .invalidwildcard.com .torserver.exit - no match */
- strlcpy(address, "www.invalidwildcard.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* MapAddress *invalidasterisk.com .torserver.exit - no match */
- strlcpy(address, "www.invalidasterisk.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Where no mapping for FQDN match on top-level domain */
- /* MapAddress .google.com .torserver.exit */
- strlcpy(address, "reader.google.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "reader.torserver.exit");
- /* MapAddress *.yahoo.com *.google.com.torserver.exit */
- strlcpy(address, "reader.yahoo.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "reader.google.com.torserver.exit");
- /*MapAddress *.cnn.com www.cnn.com */
- strlcpy(address, "cnn.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.cnn.com");
- /* MapAddress .cn.com www.cnn.com */
- strlcpy(address, "www.cn.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.cnn.com");
- /* MapAddress ex.com www.cnn.com - no match */
- strlcpy(address, "www.ex.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* MapAddress ey.com *.cnn.com - invalid expression */
- strlcpy(address, "ey.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Where mapping for FQDN match on FQDN */
- strlcpy(address, "www.google.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "3.3.3.3");
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "other.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "this.torproject.org.otherserver.exit");
- strlcpy(address, "test.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "2.2.2.2");
- /* Test a chain of address mappings and the order in which they were added:
- "MapAddress www.example.org 4.4.4.4"
- "MapAddress 4.4.4.4 7.7.7.7"
- "MapAddress 4.4.4.4 5.5.5.5"
- */
- strlcpy(address, "www.example.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "5.5.5.5");
- /* Test infinite address mapping results in no change */
- strlcpy(address, "www.infiniteloop.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.infiniteloop.org");
- /* Test we don't find false positives */
- strlcpy(address, "www.example.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- /* Test top-level-domain matching a bit harder */
- config_free_lines(get_options_mutable()->AddressMap);
- addressmap_clear_configured();
- strlcpy(buf, "MapAddress *.com *.torserver.exit\n"
- "MapAddress *.torproject.org 1.1.1.1\n"
- "MapAddress *.net 2.2.2.2\n"
- , sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- strlcpy(address, "www.abc.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.abc.torserver.exit");
- strlcpy(address, "www.def.com", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "www.def.torserver.exit");
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "test.torproject.org", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "1.1.1.1");
- strlcpy(address, "torproject.net", sizeof(address));
- tt_assert(addressmap_rewrite(address, sizeof(address), &expires, NULL));
- tt_str_op(address,OP_EQ, "2.2.2.2");
- /* We don't support '*' as a mapping directive */
- config_free_lines(get_options_mutable()->AddressMap);
- addressmap_clear_configured();
- strlcpy(buf, "MapAddress * *.torserver.exit\n", sizeof(buf));
- config_get_lines(buf, &(get_options_mutable()->AddressMap), 0);
- config_register_addressmaps(get_options());
- strlcpy(address, "www.abc.com", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- strlcpy(address, "www.def.net", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- strlcpy(address, "www.torproject.org", sizeof(address));
- tt_assert(!addressmap_rewrite(address, sizeof(address), &expires, NULL));
- #undef addressmap_rewrite
- done:
- config_free_lines(get_options_mutable()->AddressMap);
- get_options_mutable()->AddressMap = NULL;
- addressmap_free_all();
- }
- static int
- is_private_dir(const char* path)
- {
- struct stat st;
- int r = stat(path, &st);
- if (r) {
- return 0;
- }
- #if !defined (_WIN32)
- if ((st.st_mode & (S_IFDIR | 0777)) != (S_IFDIR | 0700)) {
- return 0;
- }
- #endif
- return 1;
- }
- static void
- test_config_check_or_create_data_subdir(void *arg)
- {
- or_options_t *options = get_options_mutable();
- char *datadir;
- const char *subdir = "test_stats";
- char *subpath;
- struct stat st;
- int r;
- #if !defined (_WIN32)
- unsigned group_permission;
- #endif
- (void)arg;
- tor_free(options->DataDirectory);
- datadir = options->DataDirectory = tor_strdup(get_fname("datadir-0"));
- subpath = get_datadir_fname(subdir);
- #if defined (_WIN32)
- tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0);
- #else
- tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0);
- #endif
- r = stat(subpath, &st);
- // The subdirectory shouldn't exist yet,
- // but should be created by the call to check_or_create_data_subdir.
- tt_assert(r && (errno == ENOENT));
- tt_assert(!check_or_create_data_subdir(subdir));
- tt_assert(is_private_dir(subpath));
- // The check should return 0, if the directory already exists
- // and is private to the user.
- tt_assert(!check_or_create_data_subdir(subdir));
- r = stat(subpath, &st);
- if (r) {
- tt_abort_perror("stat");
- }
- #if !defined (_WIN32)
- group_permission = st.st_mode | 0070;
- r = chmod(subpath, group_permission);
- if (r) {
- tt_abort_perror("chmod");
- }
- // If the directory exists, but its mode is too permissive
- // a call to check_or_create_data_subdir should reset the mode.
- tt_assert(!is_private_dir(subpath));
- tt_assert(!check_or_create_data_subdir(subdir));
- tt_assert(is_private_dir(subpath));
- #endif /* !defined (_WIN32) */
- done:
- rmdir(subpath);
- tor_free(datadir);
- tor_free(subpath);
- }
- static void
- test_config_write_to_data_subdir(void *arg)
- {
- or_options_t* options = get_options_mutable();
- char *datadir;
- char *cp = NULL;
- const char* subdir = "test_stats";
- const char* fname = "test_file";
- const char* str =
- "Lorem ipsum dolor sit amet, consetetur sadipscing\n"
- "elitr, sed diam nonumy eirmod\n"
- "tempor invidunt ut labore et dolore magna aliquyam\n"
- "erat, sed diam voluptua.\n"
- "At vero eos et accusam et justo duo dolores et ea\n"
- "rebum. Stet clita kasd gubergren,\n"
- "no sea takimata sanctus est Lorem ipsum dolor sit amet.\n"
- "Lorem ipsum dolor sit amet,\n"
- "consetetur sadipscing elitr, sed diam nonumy eirmod\n"
- "tempor invidunt ut labore et dolore\n"
- "magna aliquyam erat, sed diam voluptua. At vero eos et\n"
- "accusam et justo duo dolores et\n"
- "ea rebum. Stet clita kasd gubergren, no sea takimata\n"
- "sanctus est Lorem ipsum dolor sit amet.";
- char* filepath = NULL;
- (void)arg;
- tor_free(options->DataDirectory);
- datadir = options->DataDirectory = tor_strdup(get_fname("datadir-1"));
- filepath = get_datadir_fname2(subdir, fname);
- #if defined (_WIN32)
- tt_int_op(mkdir(options->DataDirectory), OP_EQ, 0);
- #else
- tt_int_op(mkdir(options->DataDirectory, 0700), OP_EQ, 0);
- #endif
- // Write attempt should fail, if subdirectory doesn't exist.
- tt_assert(write_to_data_subdir(subdir, fname, str, NULL));
- tt_assert(! check_or_create_data_subdir(subdir));
- // Content of file after write attempt should be
- // equal to the original string.
- tt_assert(!write_to_data_subdir(subdir, fname, str, NULL));
- cp = read_file_to_str(filepath, 0, NULL);
- tt_str_op(cp,OP_EQ, str);
- tor_free(cp);
- // A second write operation should overwrite the old content.
- tt_assert(!write_to_data_subdir(subdir, fname, str, NULL));
- cp = read_file_to_str(filepath, 0, NULL);
- tt_str_op(cp,OP_EQ, str);
- tor_free(cp);
- done:
- (void) unlink(filepath);
- rmdir(options->DataDirectory);
- tor_free(datadir);
- tor_free(filepath);
- tor_free(cp);
- }
- /* Test helper function: Make sure that a bridge line gets parsed
- * properly. Also make sure that the resulting bridge_line_t structure
- * has its fields set correctly. */
- static void
- good_bridge_line_test(const char *string, const char *test_addrport,
- const char *test_digest, const char *test_transport,
- const smartlist_t *test_socks_args)
- {
- char *tmp = NULL;
- bridge_line_t *bridge_line = parse_bridge_line(string);
- tt_assert(bridge_line);
- /* test addrport */
- tmp = tor_strdup(fmt_addrport(&bridge_line->addr, bridge_line->port));
- tt_str_op(test_addrport,OP_EQ, tmp);
- tor_free(tmp);
- /* If we were asked to validate a digest, but we did not get a
- digest after parsing, we failed. */
- if (test_digest && tor_digest_is_zero(bridge_line->digest))
- tt_abort();
- /* If we were not asked to validate a digest, and we got a digest
- after parsing, we failed again. */
- if (!test_digest && !tor_digest_is_zero(bridge_line->digest))
- tt_abort();
- /* If we were asked to validate a digest, and we got a digest after
- parsing, make sure it's correct. */
- if (test_digest) {
- tmp = tor_strdup(hex_str(bridge_line->digest, DIGEST_LEN));
- tor_strlower(tmp);
- tt_str_op(test_digest,OP_EQ, tmp);
- tor_free(tmp);
- }
- /* If we were asked to validate a transport name, make sure tha it
- matches with the transport name that was parsed. */
- if (test_transport && !bridge_line->transport_name)
- tt_abort();
- if (!test_transport && bridge_line->transport_name)
- tt_abort();
- if (test_transport)
- tt_str_op(test_transport,OP_EQ, bridge_line->transport_name);
- /* Validate the SOCKS argument smartlist. */
- if (test_socks_args && !bridge_line->socks_args)
- tt_abort();
- if (!test_socks_args && bridge_line->socks_args)
- tt_abort();
- if (test_socks_args)
- tt_assert(smartlist_strings_eq(test_socks_args,
- bridge_line->socks_args));
- done:
- tor_free(tmp);
- bridge_line_free(bridge_line);
- }
- /* Test helper function: Make sure that a bridge line is
- * unparseable. */
- static void
- bad_bridge_line_test(const char *string)
- {
- bridge_line_t *bridge_line = parse_bridge_line(string);
- if (bridge_line)
- TT_FAIL(("%s was supposed to fail, but it didn't.", string));
- tt_ptr_op(bridge_line, OP_EQ, NULL);
- done:
- bridge_line_free(bridge_line);
- }
- static void
- test_config_parse_bridge_line(void *arg)
- {
- (void) arg;
- good_bridge_line_test("192.0.2.1:4123",
- "192.0.2.1:4123", NULL, NULL, NULL);
- good_bridge_line_test("192.0.2.1",
- "192.0.2.1:443", NULL, NULL, NULL);
- good_bridge_line_test("transport [::1]",
- "[::1]:443", NULL, "transport", NULL);
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "192.0.2.1:12",
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "transport", NULL);
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413 twoandtwo=five",
- "192.0.2.1:12", "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "twoandtwo=five");
- smartlist_add_asprintf(sl_tmp, "z=z");
- good_bridge_line_test("transport 192.0.2.1:12 twoandtwo=five z=z",
- "192.0.2.1:12", NULL, "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- {
- smartlist_t *sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "dub=come");
- smartlist_add_asprintf(sl_tmp, "save=me");
- good_bridge_line_test("transport 192.0.2.1:12 "
- "4352e58420e68f5e40bf7c74faddccd9d1349666 "
- "dub=come save=me",
- "192.0.2.1:12",
- "4352e58420e68f5e40bf7c74faddccd9d1349666",
- "transport", sl_tmp);
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- good_bridge_line_test("192.0.2.1:1231 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- "192.0.2.1:1231",
- "4352e58420e68f5e40bf7c74faddccd9d1349413",
- NULL, NULL);
- /* Empty line */
- bad_bridge_line_test("");
- /* bad transport name */
- bad_bridge_line_test("tr$n_sp0r7 190.20.2.2");
- /* weird ip address */
- bad_bridge_line_test("a.b.c.d");
- /* invalid fpr */
- bad_bridge_line_test("2.2.2.2:1231 4352e58420e68f5e40bf7c74faddccd9d1349");
- /* no k=v in the end */
- bad_bridge_line_test("obfs2 2.2.2.2:1231 "
- "4352e58420e68f5e40bf7c74faddccd9d1349413 what");
- /* no addrport */
- bad_bridge_line_test("asdw");
- /* huge k=v value that can't fit in SOCKS fields */
- bad_bridge_line_test(
- "obfs2 2.2.2.2:1231 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aa=b");
- }
- static void
- test_config_parse_transport_options_line(void *arg)
- {
- smartlist_t *options_sl = NULL, *sl_tmp = NULL;
- (void) arg;
- { /* too small line */
- options_sl = get_options_from_transport_options_line("valley", NULL);
- tt_ptr_op(options_sl, OP_EQ, NULL);
- }
- { /* no k=v values */
- options_sl = get_options_from_transport_options_line("hit it!", NULL);
- tt_ptr_op(options_sl, OP_EQ, NULL);
- }
- { /* correct line, but wrong transport specified */
- options_sl =
- get_options_from_transport_options_line("trebuchet k=v", "rook");
- tt_ptr_op(options_sl, OP_EQ, NULL);
- }
- { /* correct -- no transport specified */
- sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "ladi=dadi");
- smartlist_add_asprintf(sl_tmp, "weliketo=party");
- options_sl =
- get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
- NULL);
- tt_assert(options_sl);
- tt_assert(smartlist_strings_eq(options_sl, sl_tmp));
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- sl_tmp = NULL;
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- options_sl = NULL;
- }
- { /* correct -- correct transport specified */
- sl_tmp = smartlist_new();
- smartlist_add_asprintf(sl_tmp, "ladi=dadi");
- smartlist_add_asprintf(sl_tmp, "weliketo=party");
- options_sl =
- get_options_from_transport_options_line("rook ladi=dadi weliketo=party",
- "rook");
- tt_assert(options_sl);
- tt_assert(smartlist_strings_eq(options_sl, sl_tmp));
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- sl_tmp = NULL;
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- options_sl = NULL;
- }
- done:
- if (options_sl) {
- SMARTLIST_FOREACH(options_sl, char *, s, tor_free(s));
- smartlist_free(options_sl);
- }
- if (sl_tmp) {
- SMARTLIST_FOREACH(sl_tmp, char *, s, tor_free(s));
- smartlist_free(sl_tmp);
- }
- }
- /* Mocks needed for the compute_max_mem_in_queues test */
- static int get_total_system_memory_mock(size_t *mem_out);
- static size_t total_system_memory_output = 0;
- static int total_system_memory_return = 0;
- static int
- get_total_system_memory_mock(size_t *mem_out)
- {
- if (! mem_out)
- return -1;
- *mem_out = total_system_memory_output;
- return total_system_memory_return;
- }
- /* Mocks needed for the transport plugin line test */
- static void pt_kickstart_proxy_mock(const smartlist_t *transport_list,
- char **proxy_argv, int is_server);
- static int transport_add_from_config_mock(const tor_addr_t *addr,
- uint16_t port, const char *name,
- int socks_ver);
- static int transport_is_needed_mock(const char *transport_name);
- static int pt_kickstart_proxy_mock_call_count = 0;
- static int transport_add_from_config_mock_call_count = 0;
- static int transport_is_needed_mock_call_count = 0;
- static int transport_is_needed_mock_return = 0;
- static void
- pt_kickstart_proxy_mock(const smartlist_t *transport_list,
- char **proxy_argv, int is_server)
- {
- (void) transport_list;
- (void) proxy_argv;
- (void) is_server;
- /* XXXX check that args are as expected. */
- ++pt_kickstart_proxy_mock_call_count;
- free_execve_args(proxy_argv);
- }
- static int
- transport_add_from_config_mock(const tor_addr_t *addr,
- uint16_t port, const char *name,
- int socks_ver)
- {
- (void) addr;
- (void) port;
- (void) name;
- (void) socks_ver;
- /* XXXX check that args are as expected. */
- ++transport_add_from_config_mock_call_count;
- return 0;
- }
- static int
- transport_is_needed_mock(const char *transport_name)
- {
- (void) transport_name;
- /* XXXX check that arg is as expected. */
- ++transport_is_needed_mock_call_count;
- return transport_is_needed_mock_return;
- }
- /**
- * Test parsing for the ClientTransportPlugin and ServerTransportPlugin config
- * options.
- */
- static void
- test_config_parse_transport_plugin_line(void *arg)
- {
- (void)arg;
- or_options_t *options = get_options_mutable();
- int r, tmp;
- int old_pt_kickstart_proxy_mock_call_count;
- int old_transport_add_from_config_mock_call_count;
- int old_transport_is_needed_mock_call_count;
- /* Bad transport lines - too short */
- r = parse_transport_line(options, "bad", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options, "bad", 1, 1);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options, "bad bad", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options, "bad bad", 1, 1);
- tt_int_op(r, OP_LT, 0);
- /* Test transport list parsing */
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 0);
- tt_int_op(r, OP_EQ, 0);
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 1);
- tt_int_op(r, OP_EQ, 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 0);
- tt_int_op(r, OP_EQ, 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 exec /usr/bin/fake-transport", 1, 1);
- tt_int_op(r, OP_EQ, 0);
- /* Bad transport identifiers */
- r = parse_transport_line(options,
- "transport_* exec /usr/bin/fake-transport", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options,
- "transport_* exec /usr/bin/fake-transport", 1, 1);
- tt_int_op(r, OP_LT, 0);
- /* Check SOCKS cases for client transport */
- r = parse_transport_line(options,
- "transport_1 socks4 1.2.3.4:567", 1, 0);
- tt_int_op(r, OP_EQ, 0);
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4:567", 1, 0);
- tt_int_op(r, OP_EQ, 0);
- /* Proxy case for server transport */
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4:567", 1, 1);
- tt_int_op(r, OP_EQ, 0);
- /* Multiple-transport error exit */
- r = parse_transport_line(options,
- "transport_1,transport_2 socks5 1.2.3.4:567", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options,
- "transport_1,transport_2 proxy 1.2.3.4:567", 1, 1);
- tt_int_op(r, OP_LT, 0);
- /* No port error exit */
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4", 1, 1);
- tt_int_op(r, OP_LT, 0);
- /* Unparsable address error exit */
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3:6x7", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3:6x7", 1, 1);
- tt_int_op(r, OP_LT, 0);
- /* "Strange {Client|Server}TransportPlugin field" error exit */
- r = parse_transport_line(options,
- "transport_1 foo bar", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options,
- "transport_1 foo bar", 1, 1);
- tt_int_op(r, OP_LT, 0);
- /* No sandbox mode error exit */
- tmp = options->Sandbox;
- options->Sandbox = 1;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 0);
- tt_int_op(r, OP_LT, 0);
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 1, 1);
- tt_int_op(r, OP_LT, 0);
- options->Sandbox = tmp;
- /*
- * These final test cases cover code paths that only activate without
- * validate_only, so they need mocks in place.
- */
- MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock);
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 1);
- tt_int_op(r, OP_EQ, 0);
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count + 1);
- UNMOCK(pt_kickstart_proxy);
- /* This one hits a log line in the !validate_only case only */
- r = parse_transport_line(options,
- "transport_1 proxy 1.2.3.4:567", 0, 1);
- tt_int_op(r, OP_EQ, 0);
- /* Check mocked client transport cases */
- MOCK(pt_kickstart_proxy, pt_kickstart_proxy_mock);
- MOCK(transport_add_from_config, transport_add_from_config_mock);
- MOCK(transport_is_needed, transport_is_needed_mock);
- /* Unnecessary transport case */
- transport_is_needed_mock_return = 0;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 0);
- /* Should have succeeded */
- tt_int_op(r, OP_EQ, 0);
- /* transport_is_needed() should have been called */
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /*
- * pt_kickstart_proxy() and transport_add_from_config() should
- * not have been called.
- */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count);
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count);
- /* Necessary transport case */
- transport_is_needed_mock_return = 1;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 exec /usr/bin/fake-transport", 0, 0);
- /* Should have succeeded */
- tt_int_op(r, OP_EQ, 0);
- /*
- * transport_is_needed() and pt_kickstart_proxy() should have been
- * called.
- */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count + 1);
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /* transport_add_from_config() should not have been called. */
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count);
- /* proxy case */
- transport_is_needed_mock_return = 1;
- old_pt_kickstart_proxy_mock_call_count =
- pt_kickstart_proxy_mock_call_count;
- old_transport_add_from_config_mock_call_count =
- transport_add_from_config_mock_call_count;
- old_transport_is_needed_mock_call_count =
- transport_is_needed_mock_call_count;
- r = parse_transport_line(options,
- "transport_1 socks5 1.2.3.4:567", 0, 0);
- /* Should have succeeded */
- tt_int_op(r, OP_EQ, 0);
- /*
- * transport_is_needed() and transport_add_from_config() should have
- * been called.
- */
- tt_assert(transport_add_from_config_mock_call_count ==
- old_transport_add_from_config_mock_call_count + 1);
- tt_assert(transport_is_needed_mock_call_count ==
- old_transport_is_needed_mock_call_count + 1);
- /* pt_kickstart_proxy() should not have been called. */
- tt_assert(pt_kickstart_proxy_mock_call_count ==
- old_pt_kickstart_proxy_mock_call_count);
- /* Done with mocked client transport cases */
- UNMOCK(transport_is_needed);
- UNMOCK(transport_add_from_config);
- UNMOCK(pt_kickstart_proxy);
- done:
- /* Make sure we undo all mocks */
- UNMOCK(pt_kickstart_proxy);
- UNMOCK(transport_add_from_config);
- UNMOCK(transport_is_needed);
- return;
- }
- // Tests if an options with MyFamily fingerprints missing '$' normalises
- // them correctly and also ensure it also works with multiple fingerprints
- static void
- test_config_fix_my_family(void *arg)
- {
- char *err = NULL;
- config_line_t *family = tor_malloc_zero(sizeof(config_line_t));
- family->key = tor_strdup("MyFamily");
- family->value = tor_strdup("$1111111111111111111111111111111111111111, "
- "1111111111111111111111111111111111111112, "
- "$1111111111111111111111111111111111111113");
- config_line_t *family2 = tor_malloc_zero(sizeof(config_line_t));
- family2->key = tor_strdup("MyFamily");
- family2->value = tor_strdup("1111111111111111111111111111111111111114");
- config_line_t *family3 = tor_malloc_zero(sizeof(config_line_t));
- family3->key = tor_strdup("MyFamily");
- family3->value = tor_strdup("$1111111111111111111111111111111111111115");
- family->next = family2;
- family2->next = family3;
- family3->next = NULL;
- or_options_t* options = options_new();
- or_options_t* defaults = options_new();
- (void) arg;
- options_init(options);
- options_init(defaults);
- options->MyFamily_lines = family;
- options_validate(NULL, options, defaults, 0, &err) ;
- if (err != NULL) {
- TT_FAIL(("options_validate failed: %s", err));
- }
- const char *valid[] = { "$1111111111111111111111111111111111111111",
- "$1111111111111111111111111111111111111112",
- "$1111111111111111111111111111111111111113",
- "$1111111111111111111111111111111111111114",
- "$1111111111111111111111111111111111111115" };
- int ret_size = 0;
- config_line_t *ret;
- for (ret = options->MyFamily; ret && ret_size < 5; ret = ret->next) {
- tt_str_op(ret->value, OP_EQ, valid[ret_size]);
- ret_size++;
- }
- tt_int_op(ret_size, OP_EQ, 5);
- done:
- tor_free(err);
- or_options_free(options);
- or_options_free(defaults);
- }
- static int n_hostname_01010101 = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It answers with 1.1.1.1 as IP adddress that resulted from lookup.
- * This function increments <b>n_hostname_01010101</b> counter by one
- * every time it is called.
- */
- static int
- tor_lookup_hostname_01010101(const char *name, uint32_t *addr)
- {
- n_hostname_01010101++;
- if (name && addr) {
- *addr = ntohl(0x01010101);
- }
- return 0;
- }
- static int n_hostname_localhost = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It answers with 127.0.0.1 as IP adddress that resulted from lookup.
- * This function increments <b>n_hostname_localhost</b> counter by one
- * every time it is called.
- */
- static int
- tor_lookup_hostname_localhost(const char *name, uint32_t *addr)
- {
- n_hostname_localhost++;
- if (name && addr) {
- *addr = 0x7f000001;
- }
- return 0;
- }
- static int n_hostname_failure = 0;
- /** This mock function is meant to replace tor_lookup_hostname().
- * It pretends to fail by returning -1 to caller. Also, this function
- * increments <b>n_hostname_failure</b> every time it is called.
- */
- static int
- tor_lookup_hostname_failure(const char *name, uint32_t *addr)
- {
- (void)name;
- (void)addr;
- n_hostname_failure++;
- return -1;
- }
- static int n_gethostname_replacement = 0;
- /** This mock function is meant to replace tor_gethostname(). It
- * responds with string "onionrouter!" as hostname. This function
- * increments <b>n_gethostname_replacement</b> by one every time
- * it is called.
- */
- static int
- tor_gethostname_replacement(char *name, size_t namelen)
- {
- n_gethostname_replacement++;
- if (name && namelen) {
- strlcpy(name,"onionrouter!",namelen);
- }
- return 0;
- }
- static int n_gethostname_localhost = 0;
- /** This mock function is meant to replace tor_gethostname(). It
- * responds with string "127.0.0.1" as hostname. This function
- * increments <b>n_gethostname_localhost</b> by one every time
- * it is called.
- */
- static int
- tor_gethostname_localhost(char *name, size_t namelen)
- {
- n_gethostname_localhost++;
- if (name && namelen) {
- strlcpy(name,"127.0.0.1",namelen);
- }
- return 0;
- }
- static int n_gethostname_failure = 0;
- /** This mock function is meant to replace tor_gethostname.
- * It pretends to fail by returning -1. This function increments
- * <b>n_gethostname_failure</b> by one every time it is called.
- */
- static int
- tor_gethostname_failure(char *name, size_t namelen)
- {
- (void)name;
- (void)namelen;
- n_gethostname_failure++;
- return -1;
- }
- static int n_get_interface_address = 0;
- /** This mock function is meant to replace get_interface_address().
- * It answers with address 8.8.8.8. This function increments
- * <b>n_get_interface_address</b> by one every time it is called.
- */
- static int
- get_interface_address_08080808(int severity, uint32_t *addr)
- {
- (void)severity;
- n_get_interface_address++;
- if (addr) {
- *addr = ntohl(0x08080808);
- }
- return 0;
- }
- static int n_get_interface_address6 = 0;
- static sa_family_t last_address6_family;
- /** This mock function is meant to replace get_interface_address6().
- * It answers with IP address 9.9.9.9 iff both of the following are true:
- * - <b>family</b> is AF_INET
- * - <b>addr</b> pointer is not NULL.
- * This function increments <b>n_get_interface_address6</b> by one every
- * time it is called.
- */
- static int
- get_interface_address6_replacement(int severity, sa_family_t family,
- tor_addr_t *addr)
- {
- (void)severity;
- last_address6_family = family;
- n_get_interface_address6++;
- if ((family != AF_INET) || !addr) {
- return -1;
- }
- tor_addr_from_ipv4h(addr,0x09090909);
- return 0;
- }
- static int n_get_interface_address_failure = 0;
- /**
- * This mock function is meant to replace get_interface_address().
- * It pretends to fail getting interface address by returning -1.
- * <b>n_get_interface_address_failure</b> is incremented by one
- * every time this function is called.
- */
- static int
- get_interface_address_failure(int severity, uint32_t *addr)
- {
- (void)severity;
- (void)addr;
- n_get_interface_address_failure++;
- return -1;
- }
- static int n_get_interface_address6_failure = 0;
- /**
- * This mock function is meant to replace get_interface_addres6().
- * It will pretend to fail by return -1.
- * <b>n_get_interface_address6_failure</b> is incremented by one
- * every time this function is called and <b>last_address6_family</b>
- * is assigned the value of <b>family</b> argument.
- */
- static int
- get_interface_address6_failure(int severity, sa_family_t family,
- tor_addr_t *addr)
- {
- (void)severity;
- (void)addr;
- n_get_interface_address6_failure++;
- last_address6_family = family;
- return -1;
- }
- static void
- test_config_resolve_my_address(void *arg)
- {
- or_options_t *options;
- uint32_t resolved_addr;
- const char *method_used;
- char *hostname_out = NULL;
- int retval;
- int prev_n_hostname_01010101;
- int prev_n_hostname_localhost;
- int prev_n_hostname_failure;
- int prev_n_gethostname_replacement;
- int prev_n_gethostname_failure;
- int prev_n_gethostname_localhost;
- int prev_n_get_interface_address;
- int prev_n_get_interface_address_failure;
- int prev_n_get_interface_address6;
- int prev_n_get_interface_address6_failure;
- (void)arg;
- options = options_new();
- options_init(options);
- /*
- * CASE 1:
- * If options->Address is a valid IPv4 address string, we want
- * the corresponding address to be parsed and returned.
- */
- options->Address = tor_strdup("128.52.128.105");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want_str_op(method_used,OP_EQ,"CONFIGURED");
- tt_want(hostname_out == NULL);
- tt_assert(resolved_addr == 0x80348069);
- tor_free(options->Address);
- /*
- * CASE 2:
- * If options->Address is a valid DNS address, we want resolve_my_address()
- * function to ask tor_lookup_hostname() for help with resolving it
- * and return the address that was resolved (in host order).
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
- tor_free(options->Address);
- options->Address = tor_strdup("www.torproject.org");
- prev_n_hostname_01010101 = n_hostname_01010101;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
- tt_want_str_op(method_used,OP_EQ,"RESOLVED");
- tt_want_str_op(hostname_out,OP_EQ,"www.torproject.org");
- tt_assert(resolved_addr == 0x01010101);
- UNMOCK(tor_lookup_hostname);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 3:
- * Given that options->Address is NULL, we want resolve_my_address()
- * to try and use tor_gethostname() to get hostname AND use
- * tor_lookup_hostname() to get IP address.
- */
- resolved_addr = 0;
- tor_free(options->Address);
- options->Address = NULL;
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_01010101);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_01010101 = n_hostname_01010101;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_01010101 == prev_n_hostname_01010101 + 1);
- tt_want_str_op(method_used,OP_EQ,"GETHOSTNAME");
- tt_want_str_op(hostname_out,OP_EQ,"onionrouter!");
- tt_assert(resolved_addr == 0x01010101);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- tor_free(hostname_out);
- /*
- * CASE 4:
- * Given that options->Address is a local host address, we want
- * resolve_my_address() function to fail.
- */
- resolved_addr = 0;
- tor_free(options->Address);
- options->Address = tor_strdup("127.0.0.1");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(resolved_addr == 0);
- tt_int_op(retval, OP_EQ, -1);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 5:
- * We want resolve_my_address() to fail if DNS address in options->Address
- * cannot be resolved.
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- prev_n_hostname_failure = n_hostname_failure;
- tor_free(options->Address);
- options->Address = tor_strdup("www.tor-project.org");
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_int_op(retval, OP_EQ, -1);
- UNMOCK(tor_lookup_hostname);
- tor_free(options->Address);
- tor_free(hostname_out);
- /*
- * CASE 6:
- * If options->Address is NULL AND gettting local hostname fails, we want
- * resolve_my_address() to fail as well.
- */
- MOCK(tor_gethostname,tor_gethostname_failure);
- prev_n_gethostname_failure = n_gethostname_failure;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_failure == prev_n_gethostname_failure + 1);
- tt_int_op(retval, OP_EQ, -1);
- UNMOCK(tor_gethostname);
- tor_free(hostname_out);
- /*
- * CASE 7:
- * We want resolve_my_address() to try and get network interface address via
- * get_interface_address() if hostname returned by tor_gethostname() cannot be
- * resolved into IP address.
- */
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- MOCK(get_interface_address,get_interface_address_08080808);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_get_interface_address = n_get_interface_address;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(retval == 0);
- tt_want_int_op(n_gethostname_replacement, OP_EQ,
- prev_n_gethostname_replacement + 1);
- tt_want_int_op(n_get_interface_address, OP_EQ,
- prev_n_get_interface_address + 1);
- tt_want_str_op(method_used,OP_EQ,"INTERFACE");
- tt_want(hostname_out == NULL);
- tt_assert(resolved_addr == 0x08080808);
- UNMOCK(get_interface_address);
- tor_free(hostname_out);
- /*
- * CASE 8:
- * Suppose options->Address is NULL AND hostname returned by tor_gethostname()
- * is unresolvable. We want resolve_my_address to fail if
- * get_interface_address() fails.
- */
- MOCK(get_interface_address,get_interface_address_failure);
- prev_n_get_interface_address_failure = n_get_interface_address_failure;
- prev_n_gethostname_replacement = n_gethostname_replacement;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_get_interface_address_failure ==
- prev_n_get_interface_address_failure + 1);
- tt_want(n_gethostname_replacement ==
- prev_n_gethostname_replacement + 1);
- tt_int_op(retval, OP_EQ, -1);
- UNMOCK(get_interface_address);
- tor_free(hostname_out);
- /*
- * CASE 9:
- * Given that options->Address is NULL AND tor_lookup_hostname()
- * fails AND hostname returned by gethostname() resolves
- * to local IP address, we want resolve_my_address() function to
- * call get_interface_address6(.,AF_INET,.) and return IP address
- * the latter function has found.
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(get_interface_address6,get_interface_address6_replacement);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_failure = n_hostname_failure;
- prev_n_get_interface_address6 = n_get_interface_address6;
- retval = resolve_my_address(LOG_NOTICE,options,&resolved_addr,
- &method_used,&hostname_out);
- tt_want(last_address6_family == AF_INET);
- tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(retval == 0);
- tt_want_str_op(method_used,OP_EQ,"INTERFACE");
- tt_assert(resolved_addr == 0x09090909);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(tor_gethostname);
- UNMOCK(get_interface_address6);
- tor_free(hostname_out);
- /*
- * CASE 10: We want resolve_my_address() to fail if all of the following
- * are true:
- * 1. options->Address is not NULL
- * 2. ... but it cannot be converted to struct in_addr by
- * tor_inet_aton()
- * 3. ... and tor_lookup_hostname() fails to resolve the
- * options->Address
- */
- MOCK(tor_lookup_hostname,tor_lookup_hostname_failure);
- prev_n_hostname_failure = n_hostname_failure;
- tor_free(options->Address);
- options->Address = tor_strdup("some_hostname");
- retval = resolve_my_address(LOG_NOTICE, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_hostname_failure == prev_n_hostname_failure + 1);
- tt_int_op(retval, OP_EQ, -1);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- tor_free(hostname_out);
- /*
- * CASE 11:
- * Suppose the following sequence of events:
- * 1. options->Address is NULL
- * 2. tor_gethostname() succeeds to get hostname of machine Tor
- * if running on.
- * 3. Hostname from previous step cannot be converted to
- * address by using tor_inet_aton() function.
- * 4. However, tor_lookup_hostname() succeeds in resolving the
- * hostname from step 2.
- * 5. Unfortunately, tor_addr_is_internal() deems this address
- * to be internal.
- * 6. get_interface_address6(.,AF_INET,.) returns non-internal
- * IPv4
- *
- * We want resolve_my_addr() to succeed with method "INTERFACE"
- * and address from step 6.
- */
- tor_free(options->Address);
- options->Address = NULL;
- MOCK(tor_gethostname,tor_gethostname_replacement);
- MOCK(tor_lookup_hostname,tor_lookup_hostname_localhost);
- MOCK(get_interface_address6,get_interface_address6_replacement);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_localhost = n_hostname_localhost;
- prev_n_get_interface_address6 = n_get_interface_address6;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
- tt_want(n_get_interface_address6 == prev_n_get_interface_address6 + 1);
- tt_str_op(method_used,OP_EQ,"INTERFACE");
- tt_ptr_op(hostname_out, OP_EQ, NULL);
- tt_int_op(retval, OP_EQ, 0);
- /*
- * CASE 11b:
- * 1-5 as above.
- * 6. get_interface_address6() fails.
- *
- * In this subcase, we want resolve_my_address() to fail.
- */
- UNMOCK(get_interface_address6);
- MOCK(get_interface_address6,get_interface_address6_failure);
- prev_n_gethostname_replacement = n_gethostname_replacement;
- prev_n_hostname_localhost = n_hostname_localhost;
- prev_n_get_interface_address6_failure = n_get_interface_address6_failure;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_replacement == prev_n_gethostname_replacement + 1);
- tt_want(n_hostname_localhost == prev_n_hostname_localhost + 1);
- tt_want(n_get_interface_address6_failure ==
- prev_n_get_interface_address6_failure + 1);
- tt_int_op(retval, OP_EQ, -1);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(get_interface_address6);
- /* CASE 12:
- * Suppose the following happens:
- * 1. options->Address is NULL AND options->DirAuthorities is non-NULL
- * 2. tor_gethostname() succeeds in getting hostname of a machine ...
- * 3. ... which is successfully parsed by tor_inet_aton() ...
- * 4. into IPv4 address that tor_addr_is_inernal() considers to be
- * internal.
- *
- * In this case, we want resolve_my_address() to fail.
- */
- tor_free(options->Address);
- options->Address = NULL;
- options->DirAuthorities = tor_malloc_zero(sizeof(config_line_t));
- MOCK(tor_gethostname,tor_gethostname_localhost);
- prev_n_gethostname_localhost = n_gethostname_localhost;
- retval = resolve_my_address(LOG_DEBUG, options, &resolved_addr,
- &method_used,&hostname_out);
- tt_want(n_gethostname_localhost == prev_n_gethostname_localhost + 1);
- tt_int_op(retval, OP_EQ, -1);
- UNMOCK(tor_gethostname);
- done:
- tor_free(options->Address);
- tor_free(options->DirAuthorities);
- or_options_free(options);
- tor_free(hostname_out);
- UNMOCK(tor_gethostname);
- UNMOCK(tor_lookup_hostname);
- UNMOCK(get_interface_address);
- UNMOCK(get_interface_address6);
- UNMOCK(tor_gethostname);
- }
- static void
- test_config_adding_trusted_dir_server(void *arg)
- {
- (void)arg;
- const char digest[DIGEST_LEN] = "";
- dir_server_t *ds = NULL;
- tor_addr_port_t ipv6;
- int rv = -1;
- clear_dir_servers();
- routerlist_free_all();
- /* create a trusted ds without an IPv6 address and port */
- ds = trusted_dir_server_new("ds", "127.0.0.1", 9059, 9060, NULL, digest,
- NULL, V3_DIRINFO, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 1);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 1);
- /* create a trusted ds with an IPv6 address and port */
- rv = tor_addr_port_parse(LOG_WARN, "[::1]:9061", &ipv6.addr, &ipv6.port, -1);
- tt_int_op(rv, OP_EQ, 0);
- ds = trusted_dir_server_new("ds", "127.0.0.1", 9059, 9060, &ipv6, digest,
- NULL, V3_DIRINFO, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 2);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 2);
- done:
- clear_dir_servers();
- routerlist_free_all();
- }
- static void
- test_config_adding_fallback_dir_server(void *arg)
- {
- (void)arg;
- const char digest[DIGEST_LEN] = "";
- dir_server_t *ds = NULL;
- tor_addr_t ipv4;
- tor_addr_port_t ipv6;
- int rv = -1;
- clear_dir_servers();
- routerlist_free_all();
- rv = tor_addr_parse(&ipv4, "127.0.0.1");
- tt_int_op(rv, OP_EQ, AF_INET);
- /* create a trusted ds without an IPv6 address and port */
- ds = fallback_dir_server_new(&ipv4, 9059, 9060, NULL, digest, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 1);
- /* create a trusted ds with an IPv6 address and port */
- rv = tor_addr_port_parse(LOG_WARN, "[::1]:9061", &ipv6.addr, &ipv6.port, -1);
- tt_int_op(rv, OP_EQ, 0);
- ds = fallback_dir_server_new(&ipv4, 9059, 9060, &ipv6, digest, 1.0);
- tt_assert(ds);
- dir_server_add(ds);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 2);
- done:
- clear_dir_servers();
- routerlist_free_all();
- }
- /* No secrets here:
- * v3ident is `echo "onion" | shasum | cut -d" " -f1 | tr "a-f" "A-F"`
- * fingerprint is `echo "unionem" | shasum | cut -d" " -f1 | tr "a-f" "A-F"`
- * with added spaces
- */
- #define TEST_DIR_AUTH_LINE_START \
- "foobar orport=12345 " \
- "v3ident=14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4 "
- #define TEST_DIR_AUTH_LINE_END \
- "1.2.3.4:54321 " \
- "FDB2 FBD2 AAA5 25FA 2999 E617 5091 5A32 C777 3B17"
- #define TEST_DIR_AUTH_IPV6_FLAG \
- "ipv6=[feed::beef]:9 "
- static void
- test_config_parsing_trusted_dir_server(void *arg)
- {
- (void)arg;
- int rv = -1;
- /* parse a trusted dir server without an IPv6 address and port */
- rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START
- TEST_DIR_AUTH_LINE_END,
- V3_DIRINFO, 1);
- tt_int_op(rv, OP_EQ, 0);
- /* parse a trusted dir server with an IPv6 address and port */
- rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START
- TEST_DIR_AUTH_IPV6_FLAG
- TEST_DIR_AUTH_LINE_END,
- V3_DIRINFO, 1);
- tt_int_op(rv, OP_EQ, 0);
- /* Since we are only validating, there is no cleanup. */
- done:
- ;
- }
- #undef TEST_DIR_AUTH_LINE_START
- #undef TEST_DIR_AUTH_LINE_END
- #undef TEST_DIR_AUTH_IPV6_FLAG
- #define TEST_DIR_AUTH_LINE_START \
- "foobar orport=12345 " \
- "v3ident=14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4 "
- #define TEST_DIR_AUTH_LINE_END_BAD_IP \
- "0.256.3.4:54321 " \
- "FDB2 FBD2 AAA5 25FA 2999 E617 5091 5A32 C777 3B17"
- #define TEST_DIR_AUTH_LINE_END_WITH_DNS_ADDR \
- "torproject.org:54321 " \
- "FDB2 FBD2 AAA5 25FA 2999 E617 5091 5A32 C777 3B17"
- static void
- test_config_parsing_invalid_dir_address(void *arg)
- {
- (void)arg;
- int rv;
- rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START
- TEST_DIR_AUTH_LINE_END_BAD_IP,
- V3_DIRINFO, 1);
- tt_int_op(rv, OP_EQ, -1);
- rv = parse_dir_authority_line(TEST_DIR_AUTH_LINE_START
- TEST_DIR_AUTH_LINE_END_WITH_DNS_ADDR,
- V3_DIRINFO, 1);
- tt_int_op(rv, OP_EQ, -1);
- done:
- return;
- }
- #undef TEST_DIR_AUTH_LINE_START
- #undef TEST_DIR_AUTH_LINE_END_BAD_IP
- #undef TEST_DIR_AUTH_LINE_END_WITH_DNS_ADDR
- /* No secrets here:
- * id is `echo "syn-propanethial-S-oxide" | shasum | cut -d" " -f1`
- */
- #define TEST_DIR_FALLBACK_LINE \
- "1.2.3.4:54321 orport=12345 " \
- "id=50e643986f31ea1235bcc1af17a1c5c5cfc0ee54 "
- #define TEST_DIR_FALLBACK_IPV6_FLAG \
- "ipv6=[2015:c0de::deed]:9"
- static void
- test_config_parsing_fallback_dir_server(void *arg)
- {
- (void)arg;
- int rv = -1;
- /* parse a trusted dir server without an IPv6 address and port */
- rv = parse_dir_fallback_line(TEST_DIR_FALLBACK_LINE, 1);
- tt_int_op(rv, OP_EQ, 0);
- /* parse a trusted dir server with an IPv6 address and port */
- rv = parse_dir_fallback_line(TEST_DIR_FALLBACK_LINE
- TEST_DIR_FALLBACK_IPV6_FLAG,
- 1);
- tt_int_op(rv, OP_EQ, 0);
- /* Since we are only validating, there is no cleanup. */
- done:
- ;
- }
- #undef TEST_DIR_FALLBACK_LINE
- #undef TEST_DIR_FALLBACK_IPV6_FLAG
- static void
- test_config_adding_default_trusted_dir_servers(void *arg)
- {
- (void)arg;
- clear_dir_servers();
- routerlist_free_all();
- /* Assume we only have one bridge authority */
- add_default_trusted_dir_authorities(BRIDGE_DIRINFO);
- tt_int_op(get_n_authorities(BRIDGE_DIRINFO), OP_EQ, 1);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 1);
- /* Assume we have eight V3 authorities */
- add_default_trusted_dir_authorities(V3_DIRINFO);
- tt_int_op(get_n_authorities(V3_DIRINFO), OP_EQ, 9);
- tt_int_op(smartlist_len(router_get_fallback_dir_servers()), OP_EQ, 10);
- done:
- clear_dir_servers();
- routerlist_free_all();
- }
- static int n_add_default_fallback_dir_servers_known_default = 0;
- /**
- * This mock function is meant to replace add_default_fallback_dir_servers().
- * It will parse and add one known default fallback dir server,
- * which has a dir_port of 99.
- * <b>n_add_default_fallback_dir_servers_known_default</b> is incremented by
- * one every time this function is called.
- */
- static void
- add_default_fallback_dir_servers_known_default(void)
- {
- int i;
- const char *fallback[] = {
- "127.0.0.1:60099 orport=9009 "
- "id=0923456789012345678901234567890123456789",
- NULL
- };
- for (i=0; fallback[i]; i++) {
- if (parse_dir_fallback_line(fallback[i], 0)<0) {
- log_err(LD_BUG, "Couldn't parse internal FallbackDir line %s",
- fallback[i]);
- }
- }
- n_add_default_fallback_dir_servers_known_default++;
- }
- /* Helper for test_config_adding_dir_servers(), which should be
- * refactored: clear the fields in the options which the options object
- * does not really own. */
- static void
- ads_clear_helper(or_options_t *options)
- {
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- }
- /* Test all the different combinations of adding dir servers */
- static void
- test_config_adding_dir_servers(void *arg)
- {
- (void)arg;
- /* allocate options */
- or_options_t *options = options_new();
- /* Allocate and populate configuration lines:
- *
- * Use the same format as the hard-coded directories in
- * add_default_trusted_dir_authorities().
- * Zeroing the structure has the same effect as initialising to:
- * { NULL, NULL, NULL, CONFIG_LINE_NORMAL, 0};
- */
- config_line_t *test_dir_authority = tor_malloc_zero(sizeof(config_line_t));
- test_dir_authority->key = tor_strdup("DirAuthority");
- test_dir_authority->value = tor_strdup(
- "D0 orport=9000 "
- "v3ident=0023456789012345678901234567890123456789 "
- "127.0.0.1:60090 0123 4567 8901 2345 6789 0123 4567 8901 2345 6789"
- );
- config_line_t *test_alt_bridge_authority = tor_malloc_zero(
- sizeof(config_line_t));
- test_alt_bridge_authority->key = tor_strdup("AlternateBridgeAuthority");
- test_alt_bridge_authority->value = tor_strdup(
- "B1 orport=9001 bridge "
- "127.0.0.1:60091 1123 4567 8901 2345 6789 0123 4567 8901 2345 6789"
- );
- config_line_t *test_alt_dir_authority = tor_malloc_zero(
- sizeof(config_line_t));
- test_alt_dir_authority->key = tor_strdup("AlternateDirAuthority");
- test_alt_dir_authority->value = tor_strdup(
- "A2 orport=9002 "
- "v3ident=0223456789012345678901234567890123456789 "
- "127.0.0.1:60092 2123 4567 8901 2345 6789 0123 4567 8901 2345 6789"
- );
- /* Use the format specified in the manual page */
- config_line_t *test_fallback_directory = tor_malloc_zero(
- sizeof(config_line_t));
- test_fallback_directory->key = tor_strdup("FallbackDir");
- test_fallback_directory->value = tor_strdup(
- "127.0.0.1:60093 orport=9003 id=0323456789012345678901234567890123456789"
- );
- /* We need to know if add_default_fallback_dir_servers is called,
- * whatever the size of the list in fallback_dirs.inc,
- * so we use a version of add_default_fallback_dir_servers that adds
- * one known default fallback directory. */
- MOCK(add_default_fallback_dir_servers,
- add_default_fallback_dir_servers_known_default);
- /* There are 16 different cases, covering each combination of set/NULL for:
- * DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority &
- * FallbackDir. (We always set UseDefaultFallbackDirs to 1.)
- * But validate_dir_servers() ensures that:
- * "You cannot set both DirAuthority and Alternate*Authority."
- * This reduces the number of cases to 10.
- *
- * Let's count these cases using binary, with 1 meaning set & 0 meaning NULL
- * So 1001 or case 9 is:
- * DirAuthorities set,
- * AlternateBridgeAuthority NULL,
- * AlternateDirAuthority NULL
- * FallbackDir set
- * The valid cases are cases 0-9 counting using this method, as every case
- * greater than or equal to 10 = 1010 is invalid.
- *
- * 1. Outcome: Use Set Directory Authorities
- * - No Default Authorities
- * - Use AlternateBridgeAuthority, AlternateDirAuthority, and FallbackDir
- * if they are set
- * Cases expected to yield this outcome:
- * 8 & 9 (the 2 valid cases where DirAuthorities is set)
- * 6 & 7 (the 2 cases where DirAuthorities is NULL, and
- * AlternateBridgeAuthority and AlternateDirAuthority are both set)
- *
- * 2. Outcome: Use Set Bridge Authority
- * - Use Default Non-Bridge Directory Authorities
- * - Use FallbackDir if it is set, otherwise use default FallbackDir
- * Cases expected to yield this outcome:
- * 4 & 5 (the 2 cases where DirAuthorities is NULL,
- * AlternateBridgeAuthority is set, and
- * AlternateDirAuthority is NULL)
- *
- * 3. Outcome: Use Set Alternate Directory Authority
- * - Use Default Bridge Authorities
- * - Use FallbackDir if it is set, otherwise No Default Fallback Directories
- * Cases expected to yield this outcome:
- * 2 & 3 (the 2 cases where DirAuthorities and AlternateBridgeAuthority
- * are both NULL, but AlternateDirAuthority is set)
- *
- * 4. Outcome: Use Set Custom Fallback Directory
- * - Use Default Bridge & Directory Authorities
- * Cases expected to yield this outcome:
- * 1 (DirAuthorities, AlternateBridgeAuthority and AlternateDirAuthority
- * are all NULL, but FallbackDir is set)
- *
- * 5. Outcome: Use All Defaults
- * - Use Default Bridge & Directory Authorities, and
- * Default Fallback Directories
- * Cases expected to yield this outcome:
- * 0 (DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority
- * and FallbackDir are all NULL)
- */
- /*
- * Find out how many default Bridge, Non-Bridge and Fallback Directories
- * are hard-coded into this build.
- * This code makes some assumptions about the implementation.
- * If they are wrong, one or more of cases 0-5 could fail.
- */
- int n_default_alt_bridge_authority = 0;
- int n_default_alt_dir_authority = 0;
- int n_default_fallback_dir = 0;
- #define n_default_authorities ((n_default_alt_bridge_authority) \
- + (n_default_alt_dir_authority))
- /* Pre-Count Number of Authorities of Each Type
- * Use 0000: No Directory Authorities or Fallback Directories Set
- */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0000 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 1);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* Count Bridge Authorities */
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if it's a bridge auth */
- n_default_alt_bridge_authority +=
- ((ds->is_authority && (ds->type & BRIDGE_DIRINFO)) ?
- 1 : 0)
- );
- /* If we have no default bridge authority, something has gone wrong */
- tt_int_op(n_default_alt_bridge_authority, OP_GE, 1);
- /* Count v3 Authorities */
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment found counter if it's a v3 auth */
- n_default_alt_dir_authority +=
- ((ds->is_authority && (ds->type & V3_DIRINFO)) ?
- 1 : 0)
- );
- /* If we have no default authorities, something has gone really wrong */
- tt_int_op(n_default_alt_dir_authority, OP_GE, 1);
- /* Calculate Fallback Directory Count */
- n_default_fallback_dir = (smartlist_len(fallback_servers) -
- n_default_alt_bridge_authority -
- n_default_alt_dir_authority);
- /* If we have a negative count, something has gone really wrong,
- * or some authorities aren't being added as fallback directories.
- * (networkstatus_consensus_can_use_extra_fallbacks depends on all
- * authorities being fallback directories.) */
- tt_int_op(n_default_fallback_dir, OP_GE, 0);
- }
- }
- /*
- * 1. Outcome: Use Set Directory Authorities
- * - No Default Authorities
- * - Use AlternateBridgeAuthority, AlternateDirAuthority, and FallbackDir
- * if they are set
- * Cases expected to yield this outcome:
- * 8 & 9 (the 2 valid cases where DirAuthorities is set)
- * 6 & 7 (the 2 cases where DirAuthorities is NULL, and
- * AlternateBridgeAuthority and AlternateDirAuthority are both set)
- */
- /* Case 9: 1001 - DirAuthorities Set, AlternateBridgeAuthority Not Set,
- AlternateDirAuthority Not Set, FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 1001 */
- options->DirAuthorities = test_dir_authority;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* D0, (No B1), (No A2) */
- tt_int_op(smartlist_len(dir_servers), OP_EQ, 1);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* D0, (No B1), (No A2), Custom Fallback */
- tt_int_op(smartlist_len(fallback_servers), OP_EQ, 2);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- }
- }
- /* Case 8: 1000 - DirAuthorities Set, Others Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 1000 */
- options->DirAuthorities = test_dir_authority;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we just have the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* D0, (No B1), (No A2) */
- tt_int_op(smartlist_len(dir_servers), OP_EQ, 1);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* D0, (No B1), (No A2), (No Fallback) */
- tt_int_op(smartlist_len(fallback_servers), OP_EQ, 1);
- /* DirAuthority - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 1);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- }
- }
- /* Case 7: 0111 - DirAuthorities Not Set, Others Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0111 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, A2 */
- tt_int_op(smartlist_len(dir_servers), OP_EQ, 2);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, A2, Custom Fallback */
- tt_int_op(smartlist_len(fallback_servers), OP_EQ, 3);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- }
- }
- /* Case 6: 0110 - DirAuthorities Not Set, AlternateBridgeAuthority &
- AlternateDirAuthority Set, FallbackDir Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0110 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, A2 */
- tt_int_op(smartlist_len(dir_servers), OP_EQ, 2);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, A2, (No Fallback) */
- tt_int_op(smartlist_len(fallback_servers), OP_EQ, 2);
- /* (No DirAuthority) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- }
- }
- /*
- 2. Outcome: Use Set Bridge Authority
- - Use Default Non-Bridge Directory Authorities
- - Use FallbackDir if it is set, otherwise use default FallbackDir
- Cases expected to yield this outcome:
- 4 & 5 (the 2 cases where DirAuthorities is NULL,
- AlternateBridgeAuthority is set, and
- AlternateDirAuthority is NULL)
- */
- /* Case 5: 0101 - DirAuthorities Not Set, AlternateBridgeAuthority Set,
- AlternateDirAuthority Not Set, FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0101 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities */
- tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities,
- * Custom Fallback */
- tt_assert(smartlist_len(fallback_servers) ==
- 2 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- }
- /* Case 4: 0100 - DirAuthorities Not Set, AlternateBridgeAuthority Set,
- AlternateDirAuthority & FallbackDir Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0100 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = test_alt_bridge_authority;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 1);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities */
- tt_assert(smartlist_len(dir_servers) == 1 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), B1, (No A2), Default v3 Non-Bridge Authorities,
- * Default Fallback */
- tt_assert(smartlist_len(fallback_servers) ==
- 2 + n_default_alt_dir_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* AlternateBridgeAuthority - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 1);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 0);
- /* Default FallbackDir - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 1);
- /* There's no easy way of checking that we have included all the
- * default v3 non-Bridge directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- }
- /*
- 3. Outcome: Use Set Alternate Directory Authority
- - Use Default Bridge Authorities
- - Use FallbackDir if it is set, otherwise No Default Fallback Directories
- Cases expected to yield this outcome:
- 2 & 3 (the 2 cases where DirAuthorities and AlternateBridgeAuthority
- are both NULL, but AlternateDirAuthority is set)
- */
- /* Case 3: 0011 - DirAuthorities & AlternateBridgeAuthority Not Set,
- AlternateDirAuthority & FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0011 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2 */
- tt_assert(smartlist_len(dir_servers) ==
- 1 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2,
- * Custom Fallback Directory, (No Default Fallback Directories) */
- tt_assert(smartlist_len(fallback_servers) ==
- 2 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- }
- /* Case 2: 0010 - DirAuthorities & AlternateBridgeAuthority Not Set,
- AlternateDirAuthority Set, FallbackDir Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0010 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = test_alt_dir_authority;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we just have the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 0);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2,
- * No Default or Custom Fallback Directories */
- tt_assert(smartlist_len(dir_servers) ==
- 1 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities, A2,
- * No Custom or Default Fallback Directories */
- tt_assert(smartlist_len(fallback_servers) ==
- 1 + n_default_alt_bridge_authority);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* AlternateDirAuthority - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 1);
- /* (No Custom FallbackDir) - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge authorities (except for hard-coding tonga's details),
- * so let's assume that if the total count above is correct,
- * we have the right ones.
- */
- }
- }
- /*
- 4. Outcome: Use Set Custom Fallback Directory
- - Use Default Bridge & Directory Authorities
- Cases expected to yield this outcome:
- 1 (DirAuthorities, AlternateBridgeAuthority and AlternateDirAuthority
- are all NULL, but FallbackDir is set)
- */
- /* Case 1: 0001 - DirAuthorities, AlternateBridgeAuthority
- & AlternateDirAuthority Not Set, FallbackDir Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0001 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = test_fallback_directory;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must not have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 0);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities */
- tt_assert(smartlist_len(dir_servers) == n_default_authorities);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities,
- * Custom Fallback Directory, (No Default Fallback Directories) */
- tt_assert(smartlist_len(fallback_servers) ==
- 1 + n_default_authorities);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 1);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- }
- /*
- 5. Outcome: Use All Defaults
- - Use Default Bridge & Directory Authorities, Default Fallback Directories
- Cases expected to yield this outcome:
- 0 (DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority
- and FallbackDir are all NULL)
- */
- /* Case 0: 0000 - All Not Set */
- {
- /* clear fallback dirs counter */
- n_add_default_fallback_dir_servers_known_default = 0;
- /* clear options*/
- ads_clear_helper(options);
- or_options_free(options);
- options = options_new();
- /* clear any previous dir servers:
- consider_adding_dir_servers() should do this anyway */
- clear_dir_servers();
- /* assign options: 0001 */
- options->DirAuthorities = NULL;
- options->AlternateBridgeAuthority = NULL;
- options->AlternateDirAuthority = NULL;
- options->FallbackDir = NULL;
- options->UseDefaultFallbackDirs = 1;
- /* parse options - ensure we always update by passing NULL old_options */
- consider_adding_dir_servers(options, NULL);
- /* check outcome */
- /* we must have added the default fallback dirs */
- tt_int_op(n_add_default_fallback_dir_servers_known_default, OP_EQ, 1);
- /* we have more fallbacks than just the authorities */
- tt_assert(networkstatus_consensus_can_use_extra_fallbacks(options) == 1);
- {
- /* trusted_dir_servers */
- const smartlist_t *dir_servers = router_get_trusted_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities */
- tt_assert(smartlist_len(dir_servers) == n_default_authorities);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(dir_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, so let's assume that
- * if the total count above is correct, we have the right ones.
- */
- }
- {
- /* fallback_dir_servers */
- const smartlist_t *fallback_servers = router_get_fallback_dir_servers();
- /* (No D0), (No B1), Default Bridge Authorities,
- * (No A2), Default v3 Directory Authorities,
- * (No Custom Fallback Directory), Default Fallback Directories */
- tt_assert(smartlist_len(fallback_servers) ==
- n_default_authorities + n_default_fallback_dir);
- /* (No DirAuthorities) - D0 - dir_port: 60090 */
- int found_D0 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_D0 +=
- (ds->dir_port == 60090 ?
- 1 : 0)
- );
- tt_int_op(found_D0, OP_EQ, 0);
- /* (No AlternateBridgeAuthority) - B1 - dir_port: 60091 */
- int found_B1 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_B1 +=
- (ds->dir_port == 60091 ?
- 1 : 0)
- );
- tt_int_op(found_B1, OP_EQ, 0);
- /* (No AlternateDirAuthority) - A2 - dir_port: 60092 */
- int found_A2 = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_A2 +=
- (ds->dir_port == 60092 ?
- 1 : 0)
- );
- tt_int_op(found_A2, OP_EQ, 0);
- /* Custom FallbackDir - No Nickname - dir_port: 60093 */
- int found_non_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_non_default_fallback +=
- (ds->dir_port == 60093 ?
- 1 : 0)
- );
- tt_int_op(found_non_default_fallback, OP_EQ, 0);
- /* (No Default FallbackDir) - No Nickname - dir_port: 60099 */
- int found_default_fallback = 0;
- SMARTLIST_FOREACH(fallback_servers,
- dir_server_t *,
- ds,
- /* increment the found counter if dir_port matches */
- found_default_fallback +=
- (ds->dir_port == 60099 ?
- 1 : 0)
- );
- tt_int_op(found_default_fallback, OP_EQ, 1);
- /* There's no easy way of checking that we have included all the
- * default Bridge & V3 Directory authorities, and the default
- * Fallback Directories, so let's assume that if the total count
- * above is correct, we have the right ones.
- */
- }
- }
- done:
- clear_dir_servers();
- tor_free(test_dir_authority->key);
- tor_free(test_dir_authority->value);
- tor_free(test_dir_authority);
- tor_free(test_alt_dir_authority->key);
- tor_free(test_alt_dir_authority->value);
- tor_free(test_alt_dir_authority);
- tor_free(test_alt_bridge_authority->key);
- tor_free(test_alt_bridge_authority->value);
- tor_free(test_alt_bridge_authority);
- tor_free(test_fallback_directory->key);
- tor_free(test_fallback_directory->value);
- tor_free(test_fallback_directory);
- ads_clear_helper(options);
- or_options_free(options);
- UNMOCK(add_default_fallback_dir_servers);
- }
- static void
- test_config_default_dir_servers(void *arg)
- {
- or_options_t *opts = NULL;
- (void)arg;
- int trusted_count = 0;
- int fallback_count = 0;
- /* new set of options should stop fallback parsing */
- opts = options_new();
- opts->UseDefaultFallbackDirs = 0;
- /* set old_options to NULL to force dir update */
- consider_adding_dir_servers(opts, NULL);
- trusted_count = smartlist_len(router_get_trusted_dir_servers());
- fallback_count = smartlist_len(router_get_fallback_dir_servers());
- or_options_free(opts);
- opts = NULL;
- /* assume a release will never go out with less than 7 authorities */
- tt_int_op(trusted_count, OP_GE, 7);
- /* if we disable the default fallbacks, there must not be any extra */
- tt_assert(fallback_count == trusted_count);
- opts = options_new();
- opts->UseDefaultFallbackDirs = 1;
- consider_adding_dir_servers(opts, opts);
- trusted_count = smartlist_len(router_get_trusted_dir_servers());
- fallback_count = smartlist_len(router_get_fallback_dir_servers());
- or_options_free(opts);
- opts = NULL;
- /* assume a release will never go out with less than 7 authorities */
- tt_int_op(trusted_count, OP_GE, 7);
- /* XX/teor - allow for default fallbacks to be added without breaking
- * the unit tests. Set a minimum fallback count once the list is stable. */
- tt_assert(fallback_count >= trusted_count);
- done:
- or_options_free(opts);
- }
- static int mock_router_pick_published_address_result = 0;
- static int
- mock_router_pick_published_address(const or_options_t *options,
- uint32_t *addr, int cache_only)
- {
- (void)options;
- (void)addr;
- (void)cache_only;
- return mock_router_pick_published_address_result;
- }
- static int mock_router_my_exit_policy_is_reject_star_result = 0;
- static int
- mock_router_my_exit_policy_is_reject_star(void)
- {
- return mock_router_my_exit_policy_is_reject_star_result;
- }
- static int mock_advertised_server_mode_result = 0;
- static int
- mock_advertised_server_mode(void)
- {
- return mock_advertised_server_mode_result;
- }
- static routerinfo_t *mock_router_get_my_routerinfo_result = NULL;
- static const routerinfo_t *
- mock_router_get_my_routerinfo(void)
- {
- return mock_router_get_my_routerinfo_result;
- }
- static void
- test_config_directory_fetch(void *arg)
- {
- (void)arg;
- /* Test Setup */
- or_options_t *options = options_new();
- routerinfo_t routerinfo;
- memset(&routerinfo, 0, sizeof(routerinfo));
- mock_router_pick_published_address_result = -1;
- mock_router_my_exit_policy_is_reject_star_result = 1;
- mock_advertised_server_mode_result = 0;
- mock_router_get_my_routerinfo_result = NULL;
- MOCK(router_pick_published_address, mock_router_pick_published_address);
- MOCK(router_my_exit_policy_is_reject_star,
- mock_router_my_exit_policy_is_reject_star);
- MOCK(advertised_server_mode, mock_advertised_server_mode);
- MOCK(router_get_my_routerinfo, mock_router_get_my_routerinfo);
- or_options_free(options);
- options = options_new();
- /* Clients can use multiple directory mirrors for bootstrap */
- options->ClientOnly = 1;
- tt_assert(server_mode(options) == 0);
- tt_assert(public_server_mode(options) == 0);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 1);
- /* Bridge Clients can use multiple directory mirrors for bootstrap */
- or_options_free(options);
- options = options_new();
- options->UseBridges = 1;
- tt_assert(server_mode(options) == 0);
- tt_assert(public_server_mode(options) == 0);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 1);
- /* Bridge Relays (Bridges) must act like clients, and use multiple
- * directory mirrors for bootstrap */
- or_options_free(options);
- options = options_new();
- options->BridgeRelay = 1;
- options->ORPort_set = 1;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 0);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 1);
- /* Clients set to FetchDirInfoEarly must fetch it from the authorities,
- * but can use multiple authorities for bootstrap */
- or_options_free(options);
- options = options_new();
- options->FetchDirInfoEarly = 1;
- tt_assert(server_mode(options) == 0);
- tt_assert(public_server_mode(options) == 0);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 1);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 1);
- /* OR servers only fetch the consensus from the authorities when they don't
- * know their own address, but never use multiple directories for bootstrap
- */
- or_options_free(options);
- options = options_new();
- options->ORPort_set = 1;
- mock_router_pick_published_address_result = -1;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 1);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- mock_router_pick_published_address_result = 0;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- /* Exit OR servers only fetch the consensus from the authorities when they
- * refuse unknown exits, but never use multiple directories for bootstrap
- */
- or_options_free(options);
- options = options_new();
- options->ORPort_set = 1;
- options->ExitRelay = 1;
- mock_router_pick_published_address_result = 0;
- mock_router_my_exit_policy_is_reject_star_result = 0;
- mock_advertised_server_mode_result = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- routerinfo.supports_tunnelled_dir_requests = 1;
- options->RefuseUnknownExits = 1;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 1);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- options->RefuseUnknownExits = 0;
- mock_router_pick_published_address_result = 0;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- /* Dir servers fetch the consensus from the authorities, unless they are not
- * advertising themselves (hibernating) or have no routerinfo or are not
- * advertising their dirport, and never use multiple directories for
- * bootstrap. This only applies if they are also OR servers.
- * (We don't care much about the behaviour of non-OR directory servers.) */
- or_options_free(options);
- options = options_new();
- options->DirPort_set = 1;
- options->ORPort_set = 1;
- options->DirCache = 1;
- mock_router_pick_published_address_result = 0;
- mock_router_my_exit_policy_is_reject_star_result = 1;
- mock_advertised_server_mode_result = 1;
- routerinfo.dir_port = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 1);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- mock_advertised_server_mode_result = 0;
- routerinfo.dir_port = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- mock_advertised_server_mode_result = 1;
- mock_router_get_my_routerinfo_result = NULL;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- mock_advertised_server_mode_result = 1;
- routerinfo.dir_port = 0;
- routerinfo.supports_tunnelled_dir_requests = 0;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 0);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- mock_advertised_server_mode_result = 1;
- routerinfo.dir_port = 1;
- routerinfo.supports_tunnelled_dir_requests = 1;
- mock_router_get_my_routerinfo_result = &routerinfo;
- tt_assert(server_mode(options) == 1);
- tt_assert(public_server_mode(options) == 1);
- tt_int_op(directory_fetches_from_authorities(options), OP_EQ, 1);
- tt_int_op(networkstatus_consensus_can_use_multiple_directories(options),
- OP_EQ, 0);
- done:
- or_options_free(options);
- UNMOCK(router_pick_published_address);
- UNMOCK(router_get_my_routerinfo);
- UNMOCK(advertised_server_mode);
- UNMOCK(router_my_exit_policy_is_reject_star);
- }
- static void
- test_config_default_fallback_dirs(void *arg)
- {
- const char *fallback[] = {
- #include "app/config/fallback_dirs.inc"
- NULL
- };
- int n_included_fallback_dirs = 0;
- int n_added_fallback_dirs = 0;
- (void)arg;
- clear_dir_servers();
- while (fallback[n_included_fallback_dirs])
- n_included_fallback_dirs++;
- add_default_fallback_dir_servers();
- n_added_fallback_dirs = smartlist_len(router_get_fallback_dir_servers());
- tt_assert(n_included_fallback_dirs == n_added_fallback_dirs);
- done:
- clear_dir_servers();
- }
- static void
- test_config_port_cfg_line_extract_addrport(void *arg)
- {
- (void)arg;
- int unixy = 0;
- const char *rest = NULL;
- char *a = NULL;
- tt_int_op(port_cfg_line_extract_addrport("", &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("hello", &a, &unixy, &rest),
- OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "hello");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(" flipperwalt gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "flipperwalt");
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(" flipperwalt \t gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "flipperwalt");
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("flipperwalt \t gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "flipperwalt");
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:flipperwalt \t gersplut",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "flipperwalt");
- tt_str_op(rest, OP_EQ, "gersplut");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:lolol ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(" unix:lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("foobar:lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, "foobar:lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport(":lolol",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 0);
- tt_str_op(a, OP_EQ, ":lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\"",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\" ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");
- tt_str_op(rest, OP_EQ, "");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lolol\" foo ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lolol");
- tt_str_op(rest, OP_EQ, "foo ");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol ol\" foo ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lol ol");
- tt_str_op(rest, OP_EQ, "foo ");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\\" ol\" foo ",
- &a, &unixy, &rest), OP_EQ, 0);
- tt_int_op(unixy, OP_EQ, 1);
- tt_str_op(a, OP_EQ, "lol\" ol");
- tt_str_op(rest, OP_EQ, "foo ");
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\\" ol foo ",
- &a, &unixy, &rest), OP_EQ, -1);
- tor_free(a);
- tt_int_op(port_cfg_line_extract_addrport("unix:\"lol\\0\" ol foo ",
- &a, &unixy, &rest), OP_EQ, -1);
- tor_free(a);
- done:
- tor_free(a);
- }
- static config_line_t *
- mock_config_line(const char *key, const char *val)
- {
- config_line_t *config_line = tor_malloc(sizeof(config_line_t));
- memset(config_line, 0, sizeof(config_line_t));
- config_line->key = tor_strdup(key);
- config_line->value = tor_strdup(val);
- return config_line;
- }
- static void
- test_config_parse_port_config__ports__no_ports_given(void *data)
- {
- (void)data;
- int ret;
- smartlist_t *slout = NULL;
- port_cfg_t *port_cfg = NULL;
- slout = smartlist_new();
- // Test no defaultport, no defaultaddress and no out
- ret = parse_port_config(NULL, NULL, "DNS", 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test with defaultport, no defaultaddress and no out
- ret = parse_port_config(NULL, NULL, "DNS", 0, NULL, 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test no defaultport, with defaultaddress and no out
- ret = parse_port_config(NULL, NULL, "DNS", 0, "127.0.0.2", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test with defaultport, with defaultaddress and no out
- ret = parse_port_config(NULL, NULL, "DNS", 0, "127.0.0.2", 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test no defaultport, no defaultaddress and with out
- ret = parse_port_config(slout, NULL, "DNS", 0, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test with defaultport, no defaultaddress and with out
- ret = parse_port_config(slout, NULL, "DNS", 0, NULL, 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test no defaultport, with defaultaddress and with out
- ret = parse_port_config(slout, NULL, "DNS", 0, "127.0.0.2", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test with defaultport, with defaultaddress and out, adds a new port cfg
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, NULL, "DNS", 0, "127.0.0.2", 42, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 42);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 0);
- // Test with defaultport, with defaultaddress and out, adds a new port cfg
- // for a unix address
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, NULL, "DNS", 0, "/foo/bar/unixdomain",
- 42, CL_PORT_IS_UNIXSOCKET);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 0);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1);
- tt_str_op(port_cfg->unix_addr, OP_EQ, "/foo/bar/unixdomain");
- done:
- if (slout)
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_free(slout);
- }
- static void
- test_config_parse_port_config__ports__ports_given(void *data)
- {
- (void)data;
- int ret;
- smartlist_t *slout = NULL;
- port_cfg_t *port_cfg = NULL;
- config_line_t *config_port_invalid = NULL, *config_port_valid = NULL;
- tor_addr_t addr;
- slout = smartlist_new();
- // Test error when encounters an invalid Port specification
- config_port_invalid = mock_config_line("DNSPort", "");
- ret = parse_port_config(NULL, config_port_invalid, "DNS", 0, NULL,
- 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test error when encounters an empty unix domain specification
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "unix:");
- ret = parse_port_config(NULL, config_port_invalid, "DNS", 0, NULL,
- 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test error when encounters a unix domain specification but the listener
- // doesn't support domain sockets
- config_port_valid = mock_config_line("DNSPort", "unix:/tmp/foo/bar");
- ret = parse_port_config(NULL, config_port_valid, "DNS",
- CONN_TYPE_AP_DNS_LISTENER, NULL, 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test valid unix domain
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0, 0);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 0);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1);
- tt_str_op(port_cfg->unix_addr, OP_EQ, "/tmp/foo/bar");
- /* Test entry port defaults as initialised in parse_port_config */
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.prefer_ipv6_virtaddr, OP_EQ, 1);
- #endif /* defined(_WIN32) */
- // Test failure if we have no ipv4 and no ipv6 and no onion (DNS only)
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("SOCKSPort",
- "unix:/tmp/foo/bar NoIPv4Traffic "
- "NoIPv6Traffic "
- "NoOnionTraffic");
- ret = parse_port_config(NULL, config_port_invalid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we have no DNS and we're a DNSPort
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort",
- "127.0.0.1:80 NoDNSRequest");
- ret = parse_port_config(NULL, config_port_invalid, "DNS",
- CONN_TYPE_AP_DNS_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // If we're a DNSPort, DNS only is ok
- // Use a port because DNSPort doesn't support sockets
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.1:80 "
- "NoIPv6Traffic "
- "NoIPv4Traffic NoOnionTraffic");
- ret = parse_port_config(slout, config_port_valid, "DNS",
- CONN_TYPE_AP_DNS_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 0);
- // Test failure if we have DNS but no ipv4 and no ipv6
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("SOCKSPort",
- "NoIPv6Traffic "
- "unix:/tmp/foo/bar NoIPv4Traffic");
- ret = parse_port_config(NULL, config_port_invalid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with no DNS, no ipv4, no ipv6 (only onion, using separate
- // options)
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "NoIPv6Traffic "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- #endif /* defined(_WIN32) */
- // Test success with quoted unix: address.
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:\"/tmp/foo/ bar\" "
- "NoIPv6Traffic "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- #endif /* defined(_WIN32) */
- // Test failure with broken quoted unix: address.
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:\"/tmp/foo/ bar "
- "NoIPv6Traffic "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure with empty quoted unix: address.
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:\"\" "
- "NoIPv6Traffic "
- "NoDNSRequest NoIPv4Traffic");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with OnionTrafficOnly (no DNS, no ipv4, no ipv6)
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "OnionTrafficOnly");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.dns_request, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.onion_traffic, OP_EQ, 1);
- #endif /* defined(_WIN32) */
- // Test success with no ipv4 but take ipv6
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "NoIPv4Traffic IPv6Traffic");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1);
- #endif /* defined(_WIN32) */
- // Test success with both ipv4 and ipv6
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/foo/bar "
- "IPv4Traffic IPv6Traffic");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, NULL, 0,
- CL_PORT_TAKES_HOSTNAMES);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1);
- #endif /* defined(_WIN32) */
- // Test failure if we specify world writable for an IP Port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "42 WorldWritable");
- ret = parse_port_config(NULL, config_port_invalid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we specify group writable for an IP Port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "42 GroupWritable");
- ret = parse_port_config(NULL, config_port_invalid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we specify group writable for an IP Port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "42 RelaxDirModeCheck");
- ret = parse_port_config(NULL, config_port_invalid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with only a port (this will fail without a default address)
- config_free_lines(config_port_valid); config_port_valid = NULL;
- config_port_valid = mock_config_line("DNSPort", "42");
- ret = parse_port_config(NULL, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with only a port and isolate destination port
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateDestPort");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_DESTPORT);
- // Test success with a negative isolate destination port, and plural
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoIsolateDestPorts");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT & ~ISO_DESTPORT);
- // Test success with isolate destination address
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateDestAddr");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_DESTADDR);
- // Test success with isolate socks AUTH
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateSOCKSAuth");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_SOCKSAUTH);
- // Test success with isolate client protocol
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateClientProtocol");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_CLIENTPROTO);
- // Test success with isolate client address
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IsolateClientAddr");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.isolation_flags, OP_EQ,
- ISO_DEFAULT | ISO_CLIENTADDR);
- // Test success with ignored unknown options
- config_free_lines(config_port_valid); config_port_valid = NULL;
- config_port_valid = mock_config_line("DNSPort", "42 ThisOptionDoesntExist");
- ret = parse_port_config(NULL, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with no isolate socks AUTH
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoIsolateSOCKSAuth");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.3", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.socks_prefer_no_auth, OP_EQ, 1);
- // Test success with prefer ipv6
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort",
- "42 IPv6Traffic PreferIPv6");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, "127.0.0.42", 0,
- CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.prefer_ipv6, OP_EQ, 1);
- // Test success with cache ipv4 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 CacheIPv4DNS");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 0);
- // Test success with cache ipv6 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 CacheIPv6DNS");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 1);
- // Test success with no cache ipv4 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoCacheIPv4DNS");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 0);
- // Test success with cache DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 CacheDNS");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, CL_PORT_TAKES_HOSTNAMES);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.cache_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.cache_ipv6_answers, OP_EQ, 1);
- // Test success with use cached ipv4 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 UseIPv4Cache");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 0);
- // Test success with use cached ipv6 DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 UseIPv6Cache");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 1);
- // Test success with use cached DNS
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 UseDNSCache");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv4_answers, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.use_cached_ipv6_answers, OP_EQ, 1);
- // Test success with not preferring ipv6 automap
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 NoPreferIPv6Automap");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.prefer_ipv6_virtaddr, OP_EQ, 0);
- // Test success with prefer SOCKS no auth
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 PreferSOCKSNoAuth");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.socks_prefer_no_auth, OP_EQ, 1);
- // Test failure with both a zero port and a non-zero port
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "0");
- config_port_valid = mock_config_line("DNSPort", "42");
- config_port_invalid->next = config_port_valid;
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0,
- "127.0.0.42", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with warn non-local control
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, "Control",
- CONN_TYPE_CONTROL_LISTENER, "127.0.0.42", 0,
- CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with warn non-local listener
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, "ExtOR",
- CONN_TYPE_EXT_OR_LISTENER, "127.0.0.42", 0,
- CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with warn non-local other
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with warn non-local other without out
- ret = parse_port_config(NULL, config_port_valid, "DNS", 0,
- "127.0.0.42", 0, CL_PORT_WARN_NONLOCAL);
- tt_int_op(ret, OP_EQ, 0);
- // Test success with both ipv4 and ipv6 but without stream options
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 IPv4Traffic "
- "IPv6Traffic");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.44", 0,
- CL_PORT_TAKES_HOSTNAMES |
- CL_PORT_NO_STREAM_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.ipv4_traffic, OP_EQ, 1);
- tt_int_op(port_cfg->entry_cfg.ipv6_traffic, OP_EQ, 1);
- // Test failure for a SessionGroup argument with invalid value
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=invalid");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0,
- "127.0.0.44", 0, CL_PORT_NO_STREAM_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure for a SessionGroup argument with valid value but with no
- // stream options allowed
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=123");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0,
- "127.0.0.44", 0, CL_PORT_NO_STREAM_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure for more than one SessionGroup argument
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "42 SessionGroup=123 "
- "SessionGroup=321");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0,
- "127.0.0.44", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with a sessiongroup options
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "42 SessionGroup=1111122");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.44", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->entry_cfg.session_group, OP_EQ, 1111122);
- // Test success with a zero unix domain socket, and doesnt add it to out
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "0");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.45", 0, CL_PORT_IS_UNIXSOCKET);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 0);
- // Test success with a one unix domain socket, and doesnt add it to out
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "something");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.45", 0, CL_PORT_IS_UNIXSOCKET);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->is_unix_addr, OP_EQ, 1);
- tt_str_op(port_cfg->unix_addr, OP_EQ, "something");
- // Test success with a port of auto - it uses the default address
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "auto");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT);
- tor_addr_parse(&addr, "127.0.0.46");
- tt_assert(tor_addr_eq(&port_cfg->addr, &addr))
- // Test success with a port of auto in mixed case
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "AuTo");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT);
- tor_addr_parse(&addr, "127.0.0.46");
- tt_assert(tor_addr_eq(&port_cfg->addr, &addr))
- // Test success with parsing both an address and an auto port
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.122:auto");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, CFG_AUTO_PORT);
- tor_addr_parse(&addr, "127.0.0.122");
- tt_assert(tor_addr_eq(&port_cfg->addr, &addr))
- // Test failure when asked to parse an invalid address followed by auto
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_port_invalid = mock_config_line("DNSPort", "invalidstuff!!:auto");
- MOCK(tor_addr_lookup, mock_tor_addr_lookup__fail_on_bad_addrs);
- ret = parse_port_config(NULL, config_port_invalid, "DNS", 0,
- "127.0.0.46", 0, 0);
- UNMOCK(tor_addr_lookup);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with parsing both an address and a real port
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.123:656");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->port, OP_EQ, 656);
- tor_addr_parse(&addr, "127.0.0.123");
- tt_assert(tor_addr_eq(&port_cfg->addr, &addr))
- // Test failure if we can't parse anything at all
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "something wrong");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure if we find both an address, a port and an auto
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "127.0.1.0:123:auto");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0,
- "127.0.0.46", 0, 0);
- tt_int_op(ret, OP_EQ, -1);
- // Test that default to group writeable default sets group writeable for
- // domain socket
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("SOCKSPort", "unix:/tmp/somewhere");
- ret = parse_port_config(slout, config_port_valid, "SOCKS",
- CONN_TYPE_AP_LISTENER, "127.0.0.46", 0,
- CL_PORT_DFLT_GROUP_WRITABLE);
- #ifdef _WIN32
- tt_int_op(ret, OP_EQ, -1);
- #else
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->is_group_writable, OP_EQ, 1);
- #endif /* defined(_WIN32) */
- done:
- if (slout)
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_free(slout);
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_free_lines(config_port_valid); config_port_valid = NULL;
- }
- static void
- test_config_parse_port_config__ports__server_options(void *data)
- {
- (void)data;
- int ret;
- smartlist_t *slout = NULL;
- port_cfg_t *port_cfg = NULL;
- config_line_t *config_port_invalid = NULL, *config_port_valid = NULL;
- slout = smartlist_new();
- // Test success with NoAdvertise option
- config_free_lines(config_port_valid); config_port_valid = NULL;
- config_port_valid = mock_config_line("DNSPort",
- "127.0.0.124:656 NoAdvertise");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.no_advertise, OP_EQ, 1);
- tt_int_op(port_cfg->server_cfg.no_listen, OP_EQ, 0);
- // Test success with NoListen option
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 NoListen");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.no_advertise, OP_EQ, 0);
- tt_int_op(port_cfg->server_cfg.no_listen, OP_EQ, 1);
- // Test failure with both NoAdvertise and NoListen option
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "127.0.0.124:656 NoListen "
- "NoAdvertise");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with IPv4Only
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 IPv4Only");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.bind_ipv4_only, OP_EQ, 1);
- tt_int_op(port_cfg->server_cfg.bind_ipv6_only, OP_EQ, 0);
- // Test success with IPv6Only
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "[::1]:656 IPv6Only");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- port_cfg = (port_cfg_t *)smartlist_get(slout, 0);
- tt_int_op(port_cfg->server_cfg.bind_ipv4_only, OP_EQ, 0);
- tt_int_op(port_cfg->server_cfg.bind_ipv6_only, OP_EQ, 1);
- // Test failure with both IPv4Only and IPv6Only
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "127.0.0.124:656 IPv6Only "
- "IPv4Only");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test success with invalid parameter
- config_free_lines(config_port_valid); config_port_valid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_valid = mock_config_line("DNSPort", "127.0.0.124:656 unknown");
- ret = parse_port_config(slout, config_port_valid, "DNS", 0, NULL, 0,
- CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, 0);
- tt_int_op(smartlist_len(slout), OP_EQ, 1);
- // Test failure when asked to bind only to ipv6 but gets an ipv4 address
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort",
- "127.0.0.124:656 IPv6Only");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Test failure when asked to bind only to ipv4 but gets an ipv6 address
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("DNSPort", "[::1]:656 IPv4Only");
- ret = parse_port_config(slout, config_port_invalid, "DNS", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- // Check for failure with empty unix: address.
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_clear(slout);
- config_port_invalid = mock_config_line("ORPort", "unix:\"\"");
- ret = parse_port_config(slout, config_port_invalid, "ORPort", 0, NULL,
- 0, CL_PORT_SERVER_OPTIONS);
- tt_int_op(ret, OP_EQ, -1);
- done:
- if (slout)
- SMARTLIST_FOREACH(slout,port_cfg_t *,pf,port_cfg_free(pf));
- smartlist_free(slout);
- config_free_lines(config_port_invalid); config_port_invalid = NULL;
- config_free_lines(config_port_valid); config_port_valid = NULL;
- }
- static void
- test_config_parse_log_severity(void *data)
- {
- int ret;
- const char *severity_log_lines[] = {
- "debug file /tmp/debug.log",
- "debug\tfile /tmp/debug.log",
- "[handshake]debug [~net,~mm]info notice stdout",
- "[handshake]debug\t[~net,~mm]info\tnotice\tstdout",
- NULL
- };
- int i;
- log_severity_list_t *severity;
- (void) data;
- severity = tor_malloc(sizeof(log_severity_list_t));
- for (i = 0; severity_log_lines[i]; i++) {
- memset(severity, 0, sizeof(log_severity_list_t));
- ret = parse_log_severity_config(&severity_log_lines[i], severity);
- tt_int_op(ret, OP_EQ, 0);
- }
- done:
- tor_free(severity);
- }
- static void
- test_config_include_limit(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *torrc_path = NULL;
- char *dir = tor_strdup(get_fname("test_include_limit"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&torrc_path, "%s"PATH_SEPARATOR"torrc", dir);
- char torrc_contents[1000];
- tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s",
- torrc_path);
- tt_int_op(write_str_to_file(torrc_path, torrc_contents, 0), OP_EQ, 0);
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0, NULL, NULL),
- OP_EQ, -1);
- done:
- config_free_lines(result);
- tor_free(torrc_path);
- tor_free(dir);
- }
- static void
- test_config_include_does_not_exist(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *dir = tor_strdup(get_fname("test_include_does_not_exist"));
- char *missing_path = NULL;
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&missing_path, "%s"PATH_SEPARATOR"missing", dir);
- char torrc_contents[1000];
- tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s",
- missing_path);
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0, NULL, NULL),
- OP_EQ, -1);
- done:
- config_free_lines(result);
- tor_free(dir);
- tor_free(missing_path);
- }
- static void
- test_config_include_error_in_included_file(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *dir = tor_strdup(get_fname("test_error_in_included_file"));
- char *invalid_path = NULL;
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&invalid_path, "%s"PATH_SEPARATOR"invalid", dir);
- tt_int_op(write_str_to_file(invalid_path, "unclosed \"", 0), OP_EQ, 0);
- char torrc_contents[1000];
- tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s",
- invalid_path);
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0, NULL, NULL),
- OP_EQ, -1);
- done:
- config_free_lines(result);
- tor_free(dir);
- tor_free(invalid_path);
- }
- static void
- test_config_include_empty_file_folder(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *folder_path = NULL;
- char *file_path = NULL;
- char *dir = tor_strdup(get_fname("test_include_empty_file_folder"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&folder_path, "%s"PATH_SEPARATOR"empty_dir", dir);
- #ifdef _WIN32
- tt_int_op(mkdir(folder_path), OP_EQ, 0);
- #else
- tt_int_op(mkdir(folder_path, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&file_path, "%s"PATH_SEPARATOR"empty_file", dir);
- tt_int_op(write_str_to_file(file_path, "", 0), OP_EQ, 0);
- char torrc_contents[1000];
- tor_snprintf(torrc_contents, sizeof(torrc_contents),
- "%%include %s\n"
- "%%include %s\n",
- folder_path, file_path);
- int include_used;
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used,
- NULL), OP_EQ, 0);
- tt_ptr_op(result, OP_EQ, NULL);
- tt_int_op(include_used, OP_EQ, 1);
- done:
- config_free_lines(result);
- tor_free(folder_path);
- tor_free(file_path);
- tor_free(dir);
- }
- #ifndef _WIN32
- static void
- test_config_include_no_permission(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *folder_path = NULL;
- char *dir = NULL;
- if (geteuid() == 0)
- tt_skip();
- dir = tor_strdup(get_fname("test_include_forbidden_folder"));
- tt_ptr_op(dir, OP_NE, NULL);
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- tor_asprintf(&folder_path, "%s"PATH_SEPARATOR"forbidden_dir", dir);
- tt_int_op(mkdir(folder_path, 0100), OP_EQ, 0);
- char torrc_contents[1000];
- tor_snprintf(torrc_contents, sizeof(torrc_contents),
- "%%include %s\n",
- folder_path);
- int include_used;
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0,
- &include_used, NULL),
- OP_EQ, -1);
- tt_ptr_op(result, OP_EQ, NULL);
- done:
- config_free_lines(result);
- tor_free(folder_path);
- if (dir)
- chmod(dir, 0700);
- tor_free(dir);
- }
- #endif /* !defined(_WIN32) */
- static void
- test_config_include_recursion_before_after(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *torrc_path = NULL;
- char *dir = tor_strdup(get_fname("test_include_recursion_before_after"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&torrc_path, "%s"PATH_SEPARATOR"torrc", dir);
- char file_contents[1000];
- const int limit = MAX_INCLUDE_RECURSION_LEVEL;
- int i;
- // Loop backwards so file_contents has the contents of the first file by the
- // end of the loop
- for (i = limit; i > 0; i--) {
- if (i < limit) {
- tor_snprintf(file_contents, sizeof(file_contents),
- "Test %d\n"
- "%%include %s%d\n"
- "Test %d\n",
- i, torrc_path, i + 1, 2 * limit - i);
- } else {
- tor_snprintf(file_contents, sizeof(file_contents), "Test %d\n", i);
- }
- if (i > 1) {
- char *file_path = NULL;
- tor_asprintf(&file_path, "%s%d", torrc_path, i);
- tt_int_op(write_str_to_file(file_path, file_contents, 0), OP_EQ, 0);
- tor_free(file_path);
- }
- }
- int include_used;
- tt_int_op(config_get_lines_include(file_contents, &result, 0, &include_used,
- NULL), OP_EQ, 0);
- tt_ptr_op(result, OP_NE, NULL);
- tt_int_op(include_used, OP_EQ, 1);
- int len = 0;
- config_line_t *next;
- for (next = result; next != NULL; next = next->next) {
- char expected[10];
- tor_snprintf(expected, sizeof(expected), "%d", len + 1);
- tt_str_op(next->key, OP_EQ, "Test");
- tt_str_op(next->value, OP_EQ, expected);
- len++;
- }
- tt_int_op(len, OP_EQ, 2 * limit - 1);
- done:
- config_free_lines(result);
- tor_free(dir);
- tor_free(torrc_path);
- }
- static void
- test_config_include_recursion_after_only(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *torrc_path = NULL;
- char *dir = tor_strdup(get_fname("test_include_recursion_after_only"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&torrc_path, "%s"PATH_SEPARATOR"torrc", dir);
- char file_contents[1000];
- const int limit = MAX_INCLUDE_RECURSION_LEVEL;
- int i;
- // Loop backwards so file_contents has the contents of the first file by the
- // end of the loop
- for (i = limit; i > 0; i--) {
- int n = (i - limit - 1) * -1;
- if (i < limit) {
- tor_snprintf(file_contents, sizeof(file_contents),
- "%%include %s%d\n"
- "Test %d\n",
- torrc_path, i + 1, n);
- } else {
- tor_snprintf(file_contents, sizeof(file_contents), "Test %d\n", n);
- }
- if (i > 1) {
- char *file_path = NULL;
- tor_asprintf(&file_path, "%s%d", torrc_path, i);
- tt_int_op(write_str_to_file(file_path, file_contents, 0), OP_EQ, 0);
- tor_free(file_path);
- }
- }
- int include_used;
- tt_int_op(config_get_lines_include(file_contents, &result, 0, &include_used,
- NULL), OP_EQ, 0);
- tt_ptr_op(result, OP_NE, NULL);
- tt_int_op(include_used, OP_EQ, 1);
- int len = 0;
- config_line_t *next;
- for (next = result; next != NULL; next = next->next) {
- char expected[10];
- tor_snprintf(expected, sizeof(expected), "%d", len + 1);
- tt_str_op(next->key, OP_EQ, "Test");
- tt_str_op(next->value, OP_EQ, expected);
- len++;
- }
- tt_int_op(len, OP_EQ, limit);
- done:
- config_free_lines(result);
- tor_free(dir);
- tor_free(torrc_path);
- }
- static void
- test_config_include_folder_order(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *torrcd = NULL;
- char *path = NULL;
- char *path2 = NULL;
- char *dir = tor_strdup(get_fname("test_include_folder_order"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&torrcd, "%s"PATH_SEPARATOR"%s", dir, "torrc.d");
- #ifdef _WIN32
- tt_int_op(mkdir(torrcd), OP_EQ, 0);
- #else
- tt_int_op(mkdir(torrcd, 0700), OP_EQ, 0);
- #endif
- // test that files in subfolders are ignored
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "subfolder");
- #ifdef _WIN32
- tt_int_op(mkdir(path), OP_EQ, 0);
- #else
- tt_int_op(mkdir(path, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&path2, "%s"PATH_SEPARATOR"%s", path, "01_ignore");
- tt_int_op(write_str_to_file(path2, "ShouldNotSee 1\n", 0), OP_EQ, 0);
- tor_free(path);
- // test that files starting with . are ignored
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, ".dot");
- tt_int_op(write_str_to_file(path, "ShouldNotSee 2\n", 0), OP_EQ, 0);
- tor_free(path);
- // test file order
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "01_1st");
- tt_int_op(write_str_to_file(path, "Test 1\n", 0), OP_EQ, 0);
- tor_free(path);
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "02_2nd");
- tt_int_op(write_str_to_file(path, "Test 2\n", 0), OP_EQ, 0);
- tor_free(path);
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "aa_3rd");
- tt_int_op(write_str_to_file(path, "Test 3\n", 0), OP_EQ, 0);
- tor_free(path);
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", torrcd, "ab_4th");
- tt_int_op(write_str_to_file(path, "Test 4\n", 0), OP_EQ, 0);
- tor_free(path);
- char torrc_contents[1000];
- tor_snprintf(torrc_contents, sizeof(torrc_contents),
- "%%include %s\n",
- torrcd);
- int include_used;
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0, &include_used,
- NULL), OP_EQ, 0);
- tt_ptr_op(result, OP_NE, NULL);
- tt_int_op(include_used, OP_EQ, 1);
- int len = 0;
- config_line_t *next;
- for (next = result; next != NULL; next = next->next) {
- char expected[10];
- tor_snprintf(expected, sizeof(expected), "%d", len + 1);
- tt_str_op(next->key, OP_EQ, "Test");
- tt_str_op(next->value, OP_EQ, expected);
- len++;
- }
- tt_int_op(len, OP_EQ, 4);
- done:
- config_free_lines(result);
- tor_free(torrcd);
- tor_free(path);
- tor_free(path2);
- tor_free(dir);
- }
- static void
- test_config_include_path_syntax(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *dir = tor_strdup(get_fname("test_include_path_syntax"));
- char *esc_dir = NULL, *dir_with_pathsep = NULL,
- *esc_dir_with_pathsep = NULL, *torrc_contents = NULL;
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- esc_dir = esc_for_log(dir);
- tor_asprintf(&dir_with_pathsep, "%s%s", dir, PATH_SEPARATOR);
- esc_dir_with_pathsep = esc_for_log(dir_with_pathsep);
- tor_asprintf(&torrc_contents,
- "%%include %s\n"
- "%%include %s%s \n" // space to avoid suppressing newline
- "%%include %s\n",
- esc_dir,
- dir, PATH_SEPARATOR,
- esc_dir_with_pathsep);
- int include_used;
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used,
- NULL), OP_EQ, 0);
- tt_ptr_op(result, OP_EQ, NULL);
- tt_int_op(include_used, OP_EQ, 1);
- done:
- config_free_lines(result);
- tor_free(dir);
- tor_free(torrc_contents);
- tor_free(esc_dir);
- tor_free(dir_with_pathsep);
- tor_free(esc_dir_with_pathsep);
- }
- static void
- test_config_include_not_processed(void *data)
- {
- (void)data;
- char torrc_contents[1000] = "%include does_not_exist\n";
- config_line_t *result = NULL;
- tt_int_op(config_get_lines(torrc_contents, &result, 0),OP_EQ, 0);
- tt_ptr_op(result, OP_NE, NULL);
- int len = 0;
- config_line_t *next;
- for (next = result; next != NULL; next = next->next) {
- tt_str_op(next->key, OP_EQ, "%include");
- tt_str_op(next->value, OP_EQ, "does_not_exist");
- len++;
- }
- tt_int_op(len, OP_EQ, 1);
- done:
- config_free_lines(result);
- }
- static void
- test_config_include_has_include(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- char *dir = tor_strdup(get_fname("test_include_has_include"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- char torrc_contents[1000] = "Test 1\n";
- int include_used;
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used,
- NULL), OP_EQ, 0);
- tt_int_op(include_used, OP_EQ, 0);
- config_free_lines(result);
- tor_snprintf(torrc_contents, sizeof(torrc_contents), "%%include %s\n", dir);
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0,&include_used,
- NULL), OP_EQ, 0);
- tt_int_op(include_used, OP_EQ, 1);
- done:
- config_free_lines(result);
- tor_free(dir);
- }
- static void
- test_config_include_flag_both_without(void *data)
- {
- (void)data;
- char *errmsg = NULL;
- char conf_empty[1000];
- tor_snprintf(conf_empty, sizeof(conf_empty),
- "DataDirectory %s\n",
- get_fname(NULL));
- // test with defaults-torrc and torrc without include
- int ret = options_init_from_string(conf_empty, conf_empty, CMD_RUN_UNITTESTS,
- NULL, &errmsg);
- tt_int_op(ret, OP_EQ, 0);
- const or_options_t *options = get_options();
- tt_int_op(options->IncludeUsed, OP_EQ, 0);
- done:
- tor_free(errmsg);
- }
- static void
- test_config_include_flag_torrc_only(void *data)
- {
- (void)data;
- char *errmsg = NULL;
- char *path = NULL;
- char *dir = tor_strdup(get_fname("test_include_flag_torrc_only"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", dir, "dummy");
- tt_int_op(write_str_to_file(path, "\n", 0), OP_EQ, 0);
- char conf_empty[1000];
- tor_snprintf(conf_empty, sizeof(conf_empty),
- "DataDirectory %s\n",
- get_fname(NULL));
- char conf_include[1000];
- tor_snprintf(conf_include, sizeof(conf_include), "%%include %s", path);
- // test with defaults-torrc without include and torrc with include
- int ret = options_init_from_string(conf_empty, conf_include,
- CMD_RUN_UNITTESTS, NULL, &errmsg);
- tt_int_op(ret, OP_EQ, 0);
- const or_options_t *options = get_options();
- tt_int_op(options->IncludeUsed, OP_EQ, 1);
- done:
- tor_free(errmsg);
- tor_free(path);
- tor_free(dir);
- }
- static void
- test_config_include_flag_defaults_only(void *data)
- {
- (void)data;
- char *errmsg = NULL;
- char *path = NULL;
- char *dir = tor_strdup(get_fname("test_include_flag_defaults_only"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", dir, "dummy");
- tt_int_op(write_str_to_file(path, "\n", 0), OP_EQ, 0);
- char conf_empty[1000];
- tor_snprintf(conf_empty, sizeof(conf_empty),
- "DataDirectory %s\n",
- get_fname(NULL));
- char conf_include[1000];
- tor_snprintf(conf_include, sizeof(conf_include), "%%include %s", path);
- // test with defaults-torrc with include and torrc without include
- int ret = options_init_from_string(conf_include, conf_empty,
- CMD_RUN_UNITTESTS, NULL, &errmsg);
- tt_int_op(ret, OP_EQ, 0);
- const or_options_t *options = get_options();
- tt_int_op(options->IncludeUsed, OP_EQ, 0);
- done:
- tor_free(errmsg);
- tor_free(path);
- tor_free(dir);
- }
- static void
- test_config_dup_and_filter(void *arg)
- {
- (void)arg;
- /* Test normal input. */
- config_line_t *line = NULL;
- config_line_append(&line, "abc", "def");
- config_line_append(&line, "ghi", "jkl");
- config_line_append(&line, "ABCD", "mno");
- config_line_t *line_dup = config_lines_dup_and_filter(line, "aBc");
- tt_ptr_op(line_dup, OP_NE, NULL);
- tt_ptr_op(line_dup->next, OP_NE, NULL);
- tt_ptr_op(line_dup->next->next, OP_EQ, NULL);
- tt_str_op(line_dup->key, OP_EQ, "abc");
- tt_str_op(line_dup->value, OP_EQ, "def");
- tt_str_op(line_dup->next->key, OP_EQ, "ABCD");
- tt_str_op(line_dup->next->value, OP_EQ, "mno");
- /* empty output */
- config_free_lines(line_dup);
- line_dup = config_lines_dup_and_filter(line, "skdjfsdkljf");
- tt_ptr_op(line_dup, OP_EQ, NULL);
- /* empty input */
- config_free_lines(line_dup);
- line_dup = config_lines_dup_and_filter(NULL, "abc");
- tt_ptr_op(line_dup, OP_EQ, NULL);
- done:
- config_free_lines(line);
- config_free_lines(line_dup);
- }
- /* If we're not configured to be a bridge, but we set
- * BridgeDistribution, then options_validate () should return -1. */
- static void
- test_config_check_bridge_distribution_setting_not_a_bridge(void *arg)
- {
- or_options_t* options = get_options_mutable();
- or_options_t* old_options = options;
- or_options_t* default_options = options;
- char* message = NULL;
- int ret;
- (void)arg;
- options->BridgeRelay = 0;
- options->BridgeDistribution = (char*)("https");
- ret = options_validate(old_options, options, default_options, 0, &message);
- tt_int_op(ret, OP_EQ, -1);
- tt_str_op(message, OP_EQ, "You set BridgeDistribution, but you "
- "didn't set BridgeRelay!");
- done:
- tor_free(message);
- options->BridgeDistribution = NULL;
- }
- /* If the BridgeDistribution setting was valid, 0 should be returned. */
- static void
- test_config_check_bridge_distribution_setting_valid(void *arg)
- {
- int ret = check_bridge_distribution_setting("https");
- (void)arg;
- tt_int_op(ret, OP_EQ, 0);
- done:
- return;
- }
- /* If the BridgeDistribution setting was invalid, -1 should be returned. */
- static void
- test_config_check_bridge_distribution_setting_invalid(void *arg)
- {
- int ret = check_bridge_distribution_setting("hyphens-are-allowed");
- (void)arg;
- tt_int_op(ret, OP_EQ, 0);
- ret = check_bridge_distribution_setting("asterisks*are*forbidden");
- tt_int_op(ret, OP_EQ, -1);
- done:
- return;
- }
- /* If the BridgeDistribution setting was unrecognised, a warning should be
- * logged and 0 should be returned. */
- static void
- test_config_check_bridge_distribution_setting_unrecognised(void *arg)
- {
- int ret = check_bridge_distribution_setting("unicorn");
- (void)arg;
- tt_int_op(ret, OP_EQ, 0);
- done:
- return;
- }
- static void
- test_config_include_opened_file_list(void *data)
- {
- (void)data;
- config_line_t *result = NULL;
- smartlist_t *opened_files = smartlist_new();
- char *torrcd = NULL;
- char *subfolder = NULL;
- char *path = NULL;
- char *empty = NULL;
- char *file = NULL;
- char *dot = NULL;
- char *dir = tor_strdup(get_fname("test_include_opened_file_list"));
- tt_ptr_op(dir, OP_NE, NULL);
- #ifdef _WIN32
- tt_int_op(mkdir(dir), OP_EQ, 0);
- #else
- tt_int_op(mkdir(dir, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&torrcd, "%s"PATH_SEPARATOR"%s", dir, "torrc.d");
- #ifdef _WIN32
- tt_int_op(mkdir(torrcd), OP_EQ, 0);
- #else
- tt_int_op(mkdir(torrcd, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&subfolder, "%s"PATH_SEPARATOR"%s", torrcd, "subfolder");
- #ifdef _WIN32
- tt_int_op(mkdir(subfolder), OP_EQ, 0);
- #else
- tt_int_op(mkdir(subfolder, 0700), OP_EQ, 0);
- #endif
- tor_asprintf(&path, "%s"PATH_SEPARATOR"%s", subfolder,
- "01_file_in_subfolder");
- tt_int_op(write_str_to_file(path, "Test 1\n", 0), OP_EQ, 0);
- tor_asprintf(&empty, "%s"PATH_SEPARATOR"%s", torrcd, "empty");
- tt_int_op(write_str_to_file(empty, "", 0), OP_EQ, 0);
- tor_asprintf(&file, "%s"PATH_SEPARATOR"%s", torrcd, "file");
- tt_int_op(write_str_to_file(file, "Test 2\n", 0), OP_EQ, 0);
- tor_asprintf(&dot, "%s"PATH_SEPARATOR"%s", torrcd, ".dot");
- tt_int_op(write_str_to_file(dot, "Test 3\n", 0), OP_EQ, 0);
- char torrc_contents[1000];
- tor_snprintf(torrc_contents, sizeof(torrc_contents),
- "%%include %s\n",
- torrcd);
- int include_used;
- tt_int_op(config_get_lines_include(torrc_contents, &result, 0, &include_used,
- opened_files), OP_EQ, 0);
- tt_ptr_op(result, OP_NE, NULL);
- tt_int_op(include_used, OP_EQ, 1);
- tt_int_op(smartlist_len(opened_files), OP_EQ, 4);
- tt_int_op(smartlist_contains_string(opened_files, torrcd), OP_EQ, 1);
- tt_int_op(smartlist_contains_string(opened_files, subfolder), OP_EQ, 1);
- // files inside subfolders are not opended, only the subfolder is opened
- tt_int_op(smartlist_contains_string(opened_files, empty), OP_EQ, 1);
- tt_int_op(smartlist_contains_string(opened_files, file), OP_EQ, 1);
- // dot files are not opened as we ignore them when we get their name from
- // their parent folder
- done:
- SMARTLIST_FOREACH(opened_files, char *, f, tor_free(f));
- smartlist_free(opened_files);
- config_free_lines(result);
- tor_free(torrcd);
- tor_free(subfolder);
- tor_free(path);
- tor_free(empty);
- tor_free(file);
- tor_free(dot);
- tor_free(dir);
- }
- static void
- test_config_compute_max_mem_in_queues(void *data)
- {
- #define GIGABYTE(x) (UINT64_C(x) << 30)
- #define MEGABYTE(x) (UINT64_C(x) << 20)
- (void)data;
- MOCK(get_total_system_memory, get_total_system_memory_mock);
- /* We are unable to detect the amount of memory on the system. Tor will try
- * to use some sensible default values for 64-bit and 32-bit systems. */
- total_system_memory_return = -1;
- #if SIZEOF_VOID_P >= 8
- /* We are on a 64-bit system. */
- tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, GIGABYTE(8));
- #else
- /* We are on a 32-bit system. */
- tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, GIGABYTE(1));
- #endif /* SIZEOF_VOID_P >= 8 */
- /* We are able to detect the amount of RAM on the system. */
- total_system_memory_return = 0;
- /* We are running on a system with one gigabyte of RAM. */
- total_system_memory_output = GIGABYTE(1);
- /* We have 0.75 * RAM available. */
- tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ,
- 3 * (GIGABYTE(1) / 4));
- /* We are running on a tiny machine with 256 MB of RAM. */
- total_system_memory_output = MEGABYTE(256);
- /* We will now enforce a minimum of 256 MB of RAM available for the
- * MaxMemInQueues here, even though we should only have had 0.75 * 256 = 192
- * MB available. */
- tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ, MEGABYTE(256));
- #if SIZEOF_SIZE_T > 4
- /* We are running on a machine with 8 GB of RAM. */
- total_system_memory_output = GIGABYTE(8);
- /* We will have 0.4 * RAM available. */
- tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ,
- 2 * (GIGABYTE(8) / 5));
- /* We are running on a machine with 16 GB of RAM. */
- total_system_memory_output = GIGABYTE(16);
- /* We will have 0.4 * RAM available. */
- tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ,
- 2 * (GIGABYTE(16) / 5));
- /* We are running on a machine with 32 GB of RAM. */
- total_system_memory_output = GIGABYTE(32);
- /* We will at maximum get MAX_DEFAULT_MEMORY_QUEUE_SIZE here. */
- tt_u64_op(compute_real_max_mem_in_queues(0, 0), OP_EQ,
- MAX_DEFAULT_MEMORY_QUEUE_SIZE);
- #endif /* SIZEOF_SIZE_T > 4 */
- done:
- UNMOCK(get_total_system_memory);
- #undef GIGABYTE
- #undef MEGABYTE
- }
- static void
- test_config_extended_fmt(void *arg)
- {
- (void)arg;
- config_line_t *lines = NULL, *lp;
- const char string1[] =
- "thing1 is here\n"
- "+thing2 is over here\n"
- "/thing3\n"
- "/thing4 is back here\n";
- /* Try with the "extended" flag disabled. */
- int r = config_get_lines(string1, &lines, 0);
- tt_int_op(r, OP_EQ, 0);
- lp = lines;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "thing1");
- tt_str_op(lp->value, OP_EQ, "is here");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL);
- lp = lp->next;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "+thing2");
- tt_str_op(lp->value, OP_EQ, "is over here");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL);
- lp = lp->next;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "/thing3");
- tt_str_op(lp->value, OP_EQ, "");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL);
- lp = lp->next;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "/thing4");
- tt_str_op(lp->value, OP_EQ, "is back here");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL);
- lp = lp->next;
- tt_assert(!lp);
- config_free_lines(lines);
- /* Try with the "extended" flag enabled. */
- r = config_get_lines(string1, &lines, 1);
- tt_int_op(r, OP_EQ, 0);
- lp = lines;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "thing1");
- tt_str_op(lp->value, OP_EQ, "is here");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_NORMAL);
- lp = lp->next;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "thing2");
- tt_str_op(lp->value, OP_EQ, "is over here");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_APPEND);
- lp = lp->next;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "thing3");
- tt_str_op(lp->value, OP_EQ, "");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_CLEAR);
- lp = lp->next;
- tt_ptr_op(lp, OP_NE, NULL);
- tt_str_op(lp->key, OP_EQ, "thing4");
- tt_str_op(lp->value, OP_EQ, "");
- tt_int_op(lp->command, OP_EQ, CONFIG_LINE_CLEAR);
- lp = lp->next;
- tt_assert(!lp);
- done:
- config_free_lines(lines);
- }
- static void
- test_config_kvline_parse(void *arg)
- {
- (void)arg;
- config_line_t *lines = NULL;
- char *enc = NULL;
- lines = kvline_parse("A=B CD=EF", 0);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "A");
- tt_str_op(lines->value, OP_EQ, "B");
- tt_str_op(lines->next->key, OP_EQ, "CD");
- tt_str_op(lines->next->value, OP_EQ, "EF");
- enc = kvline_encode(lines, 0);
- tt_str_op(enc, OP_EQ, "A=B CD=EF");
- tor_free(enc);
- enc = kvline_encode(lines, KV_QUOTED|KV_OMIT_KEYS);
- tt_str_op(enc, OP_EQ, "A=B CD=EF");
- tor_free(enc);
- config_free_lines(lines);
- lines = kvline_parse("AB CDE=F", 0);
- tt_assert(! lines);
- lines = kvline_parse("AB CDE=F", KV_OMIT_KEYS);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "");
- tt_str_op(lines->value, OP_EQ, "AB");
- tt_str_op(lines->next->key, OP_EQ, "CDE");
- tt_str_op(lines->next->value, OP_EQ, "F");
- tt_assert(lines);
- enc = kvline_encode(lines, 0);
- tt_assert(!enc);
- enc = kvline_encode(lines, KV_QUOTED|KV_OMIT_KEYS);
- tt_str_op(enc, OP_EQ, "AB CDE=F");
- tor_free(enc);
- config_free_lines(lines);
- lines = kvline_parse("AB=C CDE=\"F G\"", 0);
- tt_assert(!lines);
- lines = kvline_parse("AB=C CDE=\"F G\" \"GHI\" ", KV_QUOTED|KV_OMIT_KEYS);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "C");
- tt_str_op(lines->next->key, OP_EQ, "CDE");
- tt_str_op(lines->next->value, OP_EQ, "F G");
- tt_str_op(lines->next->next->key, OP_EQ, "");
- tt_str_op(lines->next->next->value, OP_EQ, "GHI");
- enc = kvline_encode(lines, 0);
- tt_assert(!enc);
- enc = kvline_encode(lines, KV_QUOTED|KV_OMIT_KEYS);
- tt_str_op(enc, OP_EQ, "AB=C CDE=\"F G\" GHI");
- tor_free(enc);
- config_free_lines(lines);
- lines = kvline_parse("A\"B=C CDE=\"F\" \"GHI\" ", KV_QUOTED|KV_OMIT_KEYS);
- tt_assert(! lines);
- lines = kvline_parse("AB=", KV_QUOTED);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "");
- config_free_lines(lines);
- lines = kvline_parse("AB=", 0);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "");
- config_free_lines(lines);
- lines = kvline_parse("AB=", KV_OMIT_VALS);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "");
- config_free_lines(lines);
- lines = kvline_parse(" AB ", KV_OMIT_VALS);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "");
- config_free_lines(lines);
- lines = kvline_parse("AB", KV_OMIT_VALS);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "");
- enc = kvline_encode(lines, KV_OMIT_VALS);
- tt_str_op(enc, OP_EQ, "AB");
- tor_free(enc);
- config_free_lines(lines);
- lines = kvline_parse("AB=CD", KV_OMIT_VALS);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "CD");
- enc = kvline_encode(lines, KV_OMIT_VALS);
- tt_str_op(enc, OP_EQ, "AB=CD");
- tor_free(enc);
- config_free_lines(lines);
- lines = kvline_parse("AB=CD DE FGH=I", KV_OMIT_VALS);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "CD");
- tt_str_op(lines->next->key, OP_EQ, "DE");
- tt_str_op(lines->next->value, OP_EQ, "");
- tt_str_op(lines->next->next->key, OP_EQ, "FGH");
- tt_str_op(lines->next->next->value, OP_EQ, "I");
- enc = kvline_encode(lines, KV_OMIT_VALS);
- tt_str_op(enc, OP_EQ, "AB=CD DE FGH=I");
- tor_free(enc);
- config_free_lines(lines);
- lines = kvline_parse("AB=\"CD E\" DE FGH=\"I\"", KV_OMIT_VALS|KV_QUOTED);
- tt_assert(lines);
- tt_str_op(lines->key, OP_EQ, "AB");
- tt_str_op(lines->value, OP_EQ, "CD E");
- tt_str_op(lines->next->key, OP_EQ, "DE");
- tt_str_op(lines->next->value, OP_EQ, "");
- tt_str_op(lines->next->next->key, OP_EQ, "FGH");
- tt_str_op(lines->next->next->value, OP_EQ, "I");
- enc = kvline_encode(lines, KV_OMIT_VALS|KV_QUOTED);
- tt_str_op(enc, OP_EQ, "AB=\"CD E\" DE FGH=I");
- done:
- config_free_lines(lines);
- tor_free(enc);
- }
- static void
- test_config_getinfo_config_names(void *arg)
- {
- (void)arg;
- char *answer = NULL;
- const char *error = NULL;
- int rv;
- rv = getinfo_helper_config(NULL, "config/names", &answer, &error);
- tt_int_op(rv, OP_EQ, 0);
- tt_ptr_op(error, OP_EQ, NULL);
- // ContactInfo should be listed.
- tt_assert(strstr(answer, "\nContactInfo String\n"));
- // V1AuthoritativeDirectory should not be listed, since it is obsolete.
- tt_assert(! strstr(answer, "V1AuthoritativeDirectory"));
- // ___UsingTestNetworkDefaults should not be listed, since it is invisible.
- tt_assert(! strstr(answer, "UsingTestNetworkDefaults"));
- done:
- tor_free(answer);
- }
- #define CONFIG_TEST(name, flags) \
- { #name, test_config_ ## name, flags, NULL, NULL }
- struct testcase_t config_tests[] = {
- CONFIG_TEST(adding_trusted_dir_server, TT_FORK),
- CONFIG_TEST(adding_fallback_dir_server, TT_FORK),
- CONFIG_TEST(parsing_trusted_dir_server, 0),
- CONFIG_TEST(parsing_invalid_dir_address, 0),
- CONFIG_TEST(parsing_fallback_dir_server, 0),
- CONFIG_TEST(adding_default_trusted_dir_servers, TT_FORK),
- CONFIG_TEST(adding_dir_servers, TT_FORK),
- CONFIG_TEST(default_dir_servers, TT_FORK),
- CONFIG_TEST(default_fallback_dirs, 0),
- CONFIG_TEST(resolve_my_address, TT_FORK),
- CONFIG_TEST(addressmap, 0),
- CONFIG_TEST(parse_bridge_line, 0),
- CONFIG_TEST(parse_transport_options_line, 0),
- CONFIG_TEST(parse_transport_plugin_line, TT_FORK),
- CONFIG_TEST(check_or_create_data_subdir, TT_FORK),
- CONFIG_TEST(write_to_data_subdir, TT_FORK),
- CONFIG_TEST(fix_my_family, 0),
- CONFIG_TEST(directory_fetch, 0),
- CONFIG_TEST(port_cfg_line_extract_addrport, 0),
- CONFIG_TEST(parse_port_config__ports__no_ports_given, 0),
- CONFIG_TEST(parse_port_config__ports__server_options, 0),
- CONFIG_TEST(parse_port_config__ports__ports_given, 0),
- CONFIG_TEST(parse_log_severity, 0),
- CONFIG_TEST(include_limit, 0),
- CONFIG_TEST(include_does_not_exist, 0),
- CONFIG_TEST(include_error_in_included_file, 0),
- CONFIG_TEST(include_empty_file_folder, 0),
- #ifndef _WIN32
- CONFIG_TEST(include_no_permission, 0),
- #endif
- CONFIG_TEST(include_recursion_before_after, 0),
- CONFIG_TEST(include_recursion_after_only, 0),
- CONFIG_TEST(include_folder_order, 0),
- CONFIG_TEST(include_path_syntax, 0),
- CONFIG_TEST(include_not_processed, 0),
- CONFIG_TEST(include_has_include, 0),
- CONFIG_TEST(include_flag_both_without, TT_FORK),
- CONFIG_TEST(include_flag_torrc_only, TT_FORK),
- CONFIG_TEST(include_flag_defaults_only, TT_FORK),
- CONFIG_TEST(dup_and_filter, 0),
- CONFIG_TEST(check_bridge_distribution_setting_not_a_bridge, TT_FORK),
- CONFIG_TEST(check_bridge_distribution_setting_valid, 0),
- CONFIG_TEST(check_bridge_distribution_setting_invalid, 0),
- CONFIG_TEST(check_bridge_distribution_setting_unrecognised, 0),
- CONFIG_TEST(include_opened_file_list, 0),
- CONFIG_TEST(compute_max_mem_in_queues, 0),
- CONFIG_TEST(extended_fmt, 0),
- CONFIG_TEST(kvline_parse, 0),
- CONFIG_TEST(getinfo_config_names, 0),
- END_OF_TESTCASES
- };
|