X-Git-Url: http://www.git.stargrave.org/?a=blobdiff_plain;f=client_test.go;h=c86243956ab5e8a9b93184c5561490c890b7a52f;hb=12db16c478cac89d0767cceac5dfc2fa75f7abb1;hp=a385521a1f89258e776bdddecbbb6d47254fa535;hpb=841a702e344c936dc0e4130c365c95a170f2ec84;p=btrtrc.git diff --git a/client_test.go b/client_test.go index a385521a..c8624395 100644 --- a/client_test.go +++ b/client_test.go @@ -4,6 +4,8 @@ import ( "encoding/binary" "fmt" "io" + "net" + "net/netip" "os" "path/filepath" "reflect" @@ -15,6 +17,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" + "github.com/anacrolix/log" + "github.com/anacrolix/dht/v2" "github.com/anacrolix/missinggo/v2" "github.com/anacrolix/missinggo/v2/filecache" @@ -250,6 +254,50 @@ func TestResponsive(t *testing.T) { assert.EqualValues(t, "d\n", string(b)) } +// TestResponsive was the first test to fail if uTP is disabled and TCP sockets dial from the +// listening port. +func TestResponsiveTcpOnly(t *testing.T) { + seederDataDir, mi := testutil.GreetingTestTorrent() + defer os.RemoveAll(seederDataDir) + cfg := TestingConfig(t) + cfg.DisableUTP = true + cfg.Seed = true + cfg.DataDir = seederDataDir + seeder, err := NewClient(cfg) + require.Nil(t, err) + defer seeder.Close() + seederTorrent, _, _ := seeder.AddTorrentSpec(TorrentSpecFromMetaInfo(mi)) + seederTorrent.VerifyData() + leecherDataDir := t.TempDir() + cfg = TestingConfig(t) + cfg.DataDir = leecherDataDir + leecher, err := NewClient(cfg) + require.Nil(t, err) + defer leecher.Close() + leecherTorrent, _, _ := leecher.AddTorrentSpec(func() (ret *TorrentSpec) { + ret = TorrentSpecFromMetaInfo(mi) + ret.ChunkSize = 2 + return + }()) + leecherTorrent.AddClientPeer(seeder) + reader := leecherTorrent.NewReader() + defer reader.Close() + reader.SetReadahead(0) + reader.SetResponsive() + b := make([]byte, 2) + _, err = reader.Seek(3, io.SeekStart) + require.NoError(t, err) + _, err = io.ReadFull(reader, b) + assert.Nil(t, err) + assert.EqualValues(t, "lo", string(b)) + _, err = reader.Seek(11, io.SeekStart) + require.NoError(t, err) + n, err := io.ReadFull(reader, b) + assert.Nil(t, err) + assert.EqualValues(t, 2, n) + assert.EqualValues(t, "d\n", string(b)) +} + func TestTorrentDroppedDuringResponsiveRead(t *testing.T) { seederDataDir, mi := testutil.GreetingTestTorrent() defer os.RemoveAll(seederDataDir) @@ -489,8 +537,7 @@ func testDownloadCancel(t *testing.T, ps testDownloadCancelParams) { } }() for !reflect.DeepEqual(completes, expected) { - _v := <-psc.Values - v := _v.(PieceStateChange) + v := <-psc.Values completes[v.Index] = v.Complete } } @@ -741,11 +788,12 @@ func TestObfuscatedHeaderFallbackSeederRequiresLeecherPrefersNot(t *testing.T) { } func TestClientAddressInUse(t *testing.T) { - s, _ := NewUtpSocket("udp", ":50007", nil) + s, _ := NewUtpSocket("udp", ":50007", nil, log.Default) if s != nil { defer s.Close() } cfg := TestingConfig(t).SetListenAddr(":50007") + cfg.DisableUTP = false cl, err := NewClient(cfg) require.Error(t, err) require.Nil(t, cl) @@ -772,3 +820,74 @@ func TestClientDisabledImplicitNetworksButDhtEnabled(t *testing.T) { assert.Empty(t, cl.listeners) assert.NotEmpty(t, cl.DhtServers()) } + +func TestBadPeerIpPort(t *testing.T) { + for _, tc := range []struct { + title string + ip net.IP + port int + expectedOk bool + setup func(*Client) + }{ + {"empty both", nil, 0, true, func(*Client) {}}, + {"empty/nil ip", nil, 6666, true, func(*Client) {}}, + { + "empty port", + net.ParseIP("127.0.0.1/32"), + 0, true, + func(*Client) {}, + }, + { + "in doppleganger addresses", + net.ParseIP("127.0.0.1/32"), + 2322, + true, + func(cl *Client) { + cl.dopplegangerAddrs["10.0.0.1:2322"] = struct{}{} + }, + }, + { + "in IP block list", + net.ParseIP("10.0.0.1"), + 2322, + true, + func(cl *Client) { + cl.ipBlockList = iplist.New([]iplist.Range{ + {First: net.ParseIP("10.0.0.1"), Last: net.ParseIP("10.0.0.255")}, + }) + }, + }, + { + "in bad peer IPs", + net.ParseIP("10.0.0.1"), + 2322, + true, + func(cl *Client) { + ipAddr, ok := netip.AddrFromSlice(net.ParseIP("10.0.0.1")) + require.True(t, ok) + cl.badPeerIPs = map[netip.Addr]struct{}{} + cl.badPeerIPs[ipAddr] = struct{}{} + }, + }, + { + "good", + net.ParseIP("10.0.0.1"), + 2322, + false, + func(cl *Client) {}, + }, + } { + t.Run(tc.title, func(t *testing.T) { + cfg := TestingConfig(t) + cfg.DisableTCP = true + cfg.DisableUTP = true + cfg.NoDHT = false + cl, err := NewClient(cfg) + require.NoError(t, err) + defer cl.Close() + + tc.setup(cl) + require.Equal(t, tc.expectedOk, cl.badPeerIPPort(tc.ip, tc.port)) + }) + } +}