forked from I2P_Developers/i2p.i2p
Compare commits
12 Commits
test-conte
...
test-socks
| Author | SHA1 | Date | |
|---|---|---|---|
| 8b38d4481b | |||
| cce39bb35c | |||
| 6a841fced5 | |||
| d614fa6cbd | |||
| 472f2776fb | |||
| 3cdffcfa4c | |||
| 0273ecaa9c | |||
| a79a98f1d0 | |||
| f71e59a049 | |||
| 169fb59d7d | |||
|
|
922178b2c7 | ||
|
|
74a9193ba5 |
@@ -46,7 +46,7 @@
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<th id="upnpconfig"><%=intl._t("UPnP Configuration")%> <a href="peers#upnp">[<%=intl._t("UPnP Status")%>]</a></th>
|
||||
<th id="upnpconfig"><%=intl._t("UPnP Configuration")%> <a href="peers?tx=upnp">[<%=intl._t("UPnP Status")%>]</a></th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
|
||||
164
core/java/test/junit/net/i2p/socks/SOCKS4ClientTest.java
Normal file
164
core/java/test/junit/net/i2p/socks/SOCKS4ClientTest.java
Normal file
@@ -0,0 +1,164 @@
|
||||
package net.i2p.socks;
|
||||
|
||||
import org.junit.Test;
|
||||
import org.mockito.Mockito;
|
||||
import sun.net.util.IPAddressUtil;
|
||||
|
||||
import java.io.ByteArrayInputStream;
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.io.DataOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.net.Socket;
|
||||
import java.nio.charset.StandardCharsets;
|
||||
|
||||
import static net.i2p.socks.SOCKS4Constants.SOCKS_VERSION_4;
|
||||
import static org.junit.Assert.assertArrayEquals;
|
||||
import static org.junit.Assert.assertThrows;
|
||||
|
||||
public class SOCKS4ClientTest {
|
||||
|
||||
/**
|
||||
* A successful connection to an IPv4 host
|
||||
*/
|
||||
@Test
|
||||
public void connect() throws IOException {
|
||||
_testConnect(false);
|
||||
}
|
||||
/**
|
||||
* A successful connection to an IPv4 host using a socket
|
||||
*/
|
||||
@Test
|
||||
public void connect__withSocket() throws IOException {
|
||||
_testConnect(true);
|
||||
}
|
||||
|
||||
private void _testConnect(boolean useSocket) throws IOException {
|
||||
String hostIPv4 = "11.22.33.44";
|
||||
int connectionPort = 8080;
|
||||
byte[] hostIPv4Bin = IPAddressUtil.textToNumericFormatV4(hostIPv4);
|
||||
|
||||
// Build sequence of bytes to be expected
|
||||
ByteArrayOutputStream expectedByteStream = new ByteArrayOutputStream();
|
||||
DataOutputStream writerStream = new DataOutputStream(expectedByteStream);
|
||||
writerStream.writeByte(SOCKS_VERSION_4);
|
||||
writerStream.writeByte(SOCKS4Constants.Command.CONNECT);
|
||||
writerStream.writeShort(connectionPort);
|
||||
writerStream.write(hostIPv4Bin);
|
||||
writerStream.write((byte) 0);
|
||||
|
||||
ByteArrayInputStream ips = new ByteArrayInputStream(new byte[]{
|
||||
0, // dummy
|
||||
SOCKS4Constants.Reply.SUCCEEDED, // Connection succeeded
|
||||
0, 0, 0, 0, 0, 0 // filler
|
||||
});
|
||||
ByteArrayOutputStream ops = new ByteArrayOutputStream();
|
||||
|
||||
// Test overloaded function
|
||||
if (useSocket) {
|
||||
Socket socket = Mockito.mock(Socket.class);
|
||||
Mockito.when(socket.getInputStream()).thenReturn(ips);
|
||||
Mockito.when(socket.getOutputStream()).thenReturn(ops);
|
||||
|
||||
SOCKS4Client.connect(socket, hostIPv4, connectionPort);
|
||||
} else {
|
||||
SOCKS4Client.connect(ips, ops, hostIPv4, connectionPort);
|
||||
}
|
||||
assertArrayEquals(expectedByteStream.toByteArray(), ops.toByteArray());
|
||||
}
|
||||
|
||||
/**
|
||||
* Connect proxy with a domain name
|
||||
*/
|
||||
@Test
|
||||
public void connect__host() throws IOException {
|
||||
String host = "stats.i2p";
|
||||
int connectionPort = 80;
|
||||
|
||||
// Build sequence of bytes to be expected
|
||||
ByteArrayOutputStream expectedByteStream = new ByteArrayOutputStream();
|
||||
DataOutputStream writerStream = new DataOutputStream(expectedByteStream);
|
||||
writerStream.writeByte(SOCKS_VERSION_4);
|
||||
writerStream.writeByte(SOCKS4Constants.Command.CONNECT);
|
||||
writerStream.writeShort(connectionPort);
|
||||
writerStream.write(new byte[]{0,0,0,1}); // 0.0.0.1
|
||||
writerStream.write((byte) 0); // empty userID
|
||||
writerStream.write(host.getBytes(StandardCharsets.ISO_8859_1));
|
||||
writerStream.write((byte) 0);
|
||||
|
||||
ByteArrayInputStream ips = new ByteArrayInputStream(new byte[]{
|
||||
0, // dummy
|
||||
SOCKS4Constants.Reply.SUCCEEDED, // Connection succeeded
|
||||
0, 0, 0, 0, 0, 0 // filler
|
||||
});
|
||||
ByteArrayOutputStream ops = new ByteArrayOutputStream();
|
||||
|
||||
SOCKS4Client.connect(ips, ops, host, connectionPort);
|
||||
assertArrayEquals(expectedByteStream.toByteArray(), ops.toByteArray());
|
||||
}
|
||||
|
||||
/**
|
||||
* Run into IOException while trying to connect due to no input/response
|
||||
*/
|
||||
@Test
|
||||
public void connect__ioException() {
|
||||
assertThrows(IOException.class, () -> {
|
||||
SOCKS4Client.connect(
|
||||
new ByteArrayInputStream(new byte[]{}),
|
||||
new ByteArrayOutputStream(),
|
||||
"127.0.0.1",
|
||||
80);
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Run into IOException while trying to connect due to closed input stream
|
||||
*/
|
||||
@Test
|
||||
public void connect__ioExceptionWithSocket() {
|
||||
assertThrows(IOException.class, () -> {
|
||||
// Create an IOException by closing input stream before it can used
|
||||
ByteArrayInputStream inputStream = new ByteArrayInputStream(new byte[]{});
|
||||
inputStream.close();
|
||||
|
||||
Socket socket = Mockito.mock(Socket.class);
|
||||
Mockito.when(socket.getInputStream()).thenReturn(inputStream);
|
||||
Mockito.when(socket.getOutputStream()).thenReturn(new ByteArrayOutputStream());
|
||||
|
||||
SOCKS4Client.connect(
|
||||
socket,
|
||||
"127.0.0.1",
|
||||
80
|
||||
);
|
||||
});
|
||||
}
|
||||
/**
|
||||
* Check that CONNECTION_REFUSED throws exception
|
||||
*/
|
||||
@Test
|
||||
public void connect__responseCONNECTION_REFUSED() {
|
||||
assertThrows(SOCKSException.class, () -> {
|
||||
SOCKS4Client.connect(new ByteArrayInputStream(new byte[]{
|
||||
0, // dummy
|
||||
SOCKS4Constants.Reply.CONNECTION_REFUSED, // Connection succeeded
|
||||
}),
|
||||
new ByteArrayOutputStream(),
|
||||
"1.1.1.1",
|
||||
80
|
||||
);
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* IPv6 is not supported by this SOCKS client so it just throws an exception
|
||||
*/
|
||||
@Test
|
||||
public void connect__IPv6() {
|
||||
assertThrows(SOCKSException.class, () -> {
|
||||
SOCKS4Client.connect(
|
||||
new ByteArrayInputStream(new byte[]{}),
|
||||
new ByteArrayOutputStream(),
|
||||
"::1",
|
||||
80);
|
||||
});
|
||||
}
|
||||
}
|
||||
69
core/java/test/junit/net/i2p/util/ConvertToHashTest.java
Normal file
69
core/java/test/junit/net/i2p/util/ConvertToHashTest.java
Normal file
@@ -0,0 +1,69 @@
|
||||
package net.i2p.util;
|
||||
|
||||
import net.i2p.data.Hash;
|
||||
import org.junit.Test;
|
||||
|
||||
import static org.junit.Assert.*;
|
||||
|
||||
public class ConvertToHashTest {
|
||||
private static final String zzzDotI2pBase32Hash = "lhbd7ojcaiofbfku7ixh47qj537g572zmhdc4oilvugzxdpdghua";
|
||||
private static final String zzzDotI2pBase64Hash = "WcI~uSICHFCVVPoufn4J7v5u~1lhxi45C60Nm43jMeg=";
|
||||
private static final String zzzDotI2pBase64Dest = "GKapJ8koUcBj~jmQzHsTYxDg2tpfWj0xjQTzd8BhfC9c3OS5fwPBNajgF-eOD6eCjFTqTlorlh7Hnd8kXj1qblUGXT-tDoR9~YV8dmXl51cJn9MVTRrEqRWSJVXbUUz9t5Po6Xa247Vr0sJn27R4KoKP8QVj1GuH6dB3b6wTPbOamC3dkO18vkQkfZWUdRMDXk0d8AdjB0E0864nOT~J9Fpnd2pQE5uoFT6P0DqtQR2jsFvf9ME61aqLvKPPWpkgdn4z6Zkm-NJOcDz2Nv8Si7hli94E9SghMYRsdjU-knObKvxiagn84FIwcOpepxuG~kFXdD5NfsH0v6Uri3usE3XWD7Pw6P8qVYF39jUIq4OiNMwPnNYzy2N4mDMQdsdHO3LUVh~DEppOy9AAmEoHDjjJxt2BFBbGxfdpZCpENkwvmZeYUyNCCzASqTOOlNzdpne8cuesn3NDXIpNnqEE6Oe5Qm5YOJykrX~Vx~cFFT3QzDGkIjjxlFBsjUJyYkFjBQAEAAcAAA==";
|
||||
|
||||
|
||||
@Test
|
||||
public void getHashNullPeer() {
|
||||
assertNull(ConvertToHash.getHash(null));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getHashB64() {
|
||||
Hash hash = ConvertToHash.getHash(zzzDotI2pBase64Hash);
|
||||
assertNotNull(hash);
|
||||
assertEquals(hash.toBase64(), zzzDotI2pBase64Hash);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getHashB64DotI2P() {
|
||||
Hash hash = ConvertToHash.getHash(zzzDotI2pBase64Hash + ".i2p");
|
||||
assertNotNull(hash);
|
||||
assertEquals(hash.toBase64(), zzzDotI2pBase64Hash);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getHashDestinationB64() {
|
||||
Hash hash = ConvertToHash.getHash(zzzDotI2pBase64Dest);
|
||||
assertNotNull(hash);
|
||||
assertEquals(hash.toBase64(), zzzDotI2pBase64Hash);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getHashDestinationB64DotI2P() {
|
||||
Hash hash = ConvertToHash.getHash(zzzDotI2pBase64Dest + ".i2p");
|
||||
assertNotNull(hash);
|
||||
assertEquals(hash.toBase64(), zzzDotI2pBase64Hash);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getHashB32() {
|
||||
Hash hash = ConvertToHash.getHash(zzzDotI2pBase32Hash);
|
||||
assertNotNull(hash);
|
||||
assertEquals(hash.toBase32(), zzzDotI2pBase32Hash + ".b32.i2p");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getHashB32DotI2P() {
|
||||
String zzzB32I2P = zzzDotI2pBase32Hash + ".b32.i2p";
|
||||
Hash hash = ConvertToHash.getHash(zzzB32I2P);
|
||||
assertNotNull(hash);
|
||||
assertEquals(hash.toBase32(), zzzB32I2P);
|
||||
}
|
||||
|
||||
/**
|
||||
* The case where a destination cannot be resolved at all
|
||||
*/
|
||||
@Test
|
||||
public void getHashResolveDestinationFail() {
|
||||
assertNull(ConvertToHash.getHash("unknown.i2p"));
|
||||
}
|
||||
}
|
||||
19
history.txt
19
history.txt
@@ -1,3 +1,22 @@
|
||||
2021-01-20 zzz
|
||||
* Console: Fix link to UPnP status
|
||||
* SSU: Fix deadlock with router restart
|
||||
|
||||
2021-01-14 zzz
|
||||
* Router:
|
||||
- Change default encryption type to ECIES-X25519 (proposal 156)
|
||||
- Move Sybil subsystem from console to router
|
||||
- Limit max addresses in RI
|
||||
|
||||
2021-01-13 zzz
|
||||
* Jetty: Fix URI in request logs
|
||||
|
||||
2021-01-12 zzz
|
||||
* i2psnark: Don't decrement downloaded counter after receiving bad piece
|
||||
|
||||
2021-01-11 zzz
|
||||
* Console: Delete rrd files for no-longer-configured stats at startup
|
||||
|
||||
2021-01-08 zzz
|
||||
* i2ptunnel: Disable shared clients (DSA) (part 2)
|
||||
* SSU: Fix bandwidth estimator deadlock (ticket #2798)
|
||||
|
||||
@@ -18,7 +18,7 @@ public class RouterVersion {
|
||||
/** deprecated */
|
||||
public final static String ID = "Monotone";
|
||||
public final static String VERSION = CoreVersion.VERSION;
|
||||
public final static long BUILD = 13;
|
||||
public final static long BUILD = 14;
|
||||
|
||||
/** for example "-test" */
|
||||
public final static String EXTRA = "";
|
||||
|
||||
@@ -2455,7 +2455,7 @@ public class UDPTransport extends TransportImpl implements TimedWeightedPriority
|
||||
// warning, this calls back into us with allowRebuildRouterInfo = false,
|
||||
// via CSFI.createAddresses->TM.getAddresses()->updateAddress()->REA
|
||||
if (allowRebuildRouterInfo)
|
||||
_context.router().rebuildRouterInfo();
|
||||
rebuildRouterInfo();
|
||||
} else {
|
||||
addr = null;
|
||||
}
|
||||
@@ -2510,11 +2510,35 @@ public class UDPTransport extends TransportImpl implements TimedWeightedPriority
|
||||
// warning, this calls back into us with allowRebuildRouterInfo = false,
|
||||
// via CSFI.createAddresses->TM.getAddresses()->updateAddress()->REA
|
||||
if (allowRebuildRouterInfo)
|
||||
_context.router().rebuildRouterInfo();
|
||||
rebuildRouterInfo();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Avoid deadlocks part 999
|
||||
* @since 0.9.49
|
||||
*/
|
||||
private void rebuildRouterInfo() {
|
||||
(new RebuildEvent()).schedule(0);
|
||||
}
|
||||
|
||||
/**
|
||||
* @since 0.9.49
|
||||
*/
|
||||
private class RebuildEvent extends SimpleTimer2.TimedEvent {
|
||||
/**
|
||||
* Caller must schedule
|
||||
*/
|
||||
public RebuildEvent() {
|
||||
super(_context.simpleTimer2());
|
||||
}
|
||||
public void timeReached() {
|
||||
_context.router().rebuildRouterInfo(true);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Simple fetch of stored IP and port, since
|
||||
* we don't put them in the real, published RouterAddress anymore
|
||||
|
||||
Reference in New Issue
Block a user