breakwa11
9 years ago
8 changed files with 144 additions and 29 deletions
@ -0,0 +1,83 @@ |
|||||
|
#!/usr/bin/python |
||||
|
|
||||
|
import socket |
||||
|
import socks |
||||
|
|
||||
|
|
||||
|
SERVER_IP = '127.0.0.1' |
||||
|
SERVER_PORT = 1081 |
||||
|
|
||||
|
|
||||
|
if __name__ == '__main__': |
||||
|
# Test 1: same source port IPv4 |
||||
|
sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) |
||||
|
sock_out.bind(('127.0.0.1', 9000)) |
||||
|
|
||||
|
sock_in1 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
sock_in2 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
|
||||
|
sock_in1.bind(('127.0.0.1', 9001)) |
||||
|
sock_in2.bind(('127.0.0.1', 9002)) |
||||
|
|
||||
|
sock_out.sendto(b'data', ('127.0.0.1', 9001)) |
||||
|
result1 = sock_in1.recvfrom(8) |
||||
|
|
||||
|
sock_out.sendto(b'data', ('127.0.0.1', 9002)) |
||||
|
result2 = sock_in2.recvfrom(8) |
||||
|
|
||||
|
sock_out.close() |
||||
|
sock_in1.close() |
||||
|
sock_in2.close() |
||||
|
|
||||
|
# make sure they're from the same source port |
||||
|
assert result1 == result2 |
||||
|
|
||||
|
# Test 2: same source port IPv6 |
||||
|
# try again from the same port but IPv6 |
||||
|
sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) |
||||
|
sock_out.bind(('127.0.0.1', 9000)) |
||||
|
|
||||
|
sock_in1 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
sock_in2 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
|
||||
|
sock_in1.bind(('::1', 9001)) |
||||
|
sock_in2.bind(('::1', 9002)) |
||||
|
|
||||
|
sock_out.sendto(b'data', ('::1', 9001)) |
||||
|
result1 = sock_in1.recvfrom(8) |
||||
|
|
||||
|
sock_out.sendto(b'data', ('::1', 9002)) |
||||
|
result2 = sock_in2.recvfrom(8) |
||||
|
|
||||
|
sock_out.close() |
||||
|
sock_in1.close() |
||||
|
sock_in2.close() |
||||
|
|
||||
|
# make sure they're from the same source port |
||||
|
assert result1 == result2 |
||||
|
|
||||
|
# Test 3: different source ports IPv6 |
||||
|
sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) |
||||
|
sock_out.bind(('127.0.0.1', 9003)) |
||||
|
|
||||
|
sock_in1 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, |
||||
|
socket.SOL_UDP) |
||||
|
sock_in1.bind(('::1', 9001)) |
||||
|
sock_out.sendto(b'data', ('::1', 9001)) |
||||
|
result3 = sock_in1.recvfrom(8) |
||||
|
|
||||
|
# make sure they're from different source ports |
||||
|
assert result1 != result3 |
||||
|
|
||||
|
sock_out.close() |
||||
|
sock_in1.close() |
@ -0,0 +1,23 @@ |
|||||
|
#!/bin/bash |
||||
|
|
||||
|
PYTHON="coverage run -p -a" |
||||
|
|
||||
|
mkdir -p tmp |
||||
|
|
||||
|
$PYTHON shadowsocks/local.py -c tests/aes.json -v & |
||||
|
LOCAL=$! |
||||
|
|
||||
|
$PYTHON shadowsocks/server.py -c tests/aes.json --forbidden-ip "" -v & |
||||
|
SERVER=$! |
||||
|
|
||||
|
sleep 3 |
||||
|
|
||||
|
python tests/test_udp_src.py |
||||
|
r=$? |
||||
|
|
||||
|
kill -s SIGINT $LOCAL |
||||
|
kill -s SIGINT $SERVER |
||||
|
|
||||
|
sleep 2 |
||||
|
|
||||
|
exit $r |
@ -0,0 +1,5 @@ |
|||||
|
[Definition] |
||||
|
|
||||
|
_daemon = shadowsocks |
||||
|
|
||||
|
failregex = ^\s+ERROR\s+can not parse header when handling connection from <HOST>:\d+$ |
Loading…
Reference in new issue