8 changed files with 144 additions and 29 deletions
			
			
		@ -0,0 +1,83 @@ | 
				
			|||
#!/usr/bin/python | 
				
			|||
 | 
				
			|||
import socket | 
				
			|||
import socks | 
				
			|||
 | 
				
			|||
 | 
				
			|||
SERVER_IP = '127.0.0.1' | 
				
			|||
SERVER_PORT = 1081 | 
				
			|||
 | 
				
			|||
 | 
				
			|||
if __name__ == '__main__': | 
				
			|||
    # Test 1: same source port IPv4 | 
				
			|||
    sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, | 
				
			|||
                                socket.SOL_UDP) | 
				
			|||
    sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) | 
				
			|||
    sock_out.bind(('127.0.0.1', 9000)) | 
				
			|||
 | 
				
			|||
    sock_in1 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, | 
				
			|||
                             socket.SOL_UDP) | 
				
			|||
    sock_in2 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, | 
				
			|||
                             socket.SOL_UDP) | 
				
			|||
 | 
				
			|||
    sock_in1.bind(('127.0.0.1', 9001)) | 
				
			|||
    sock_in2.bind(('127.0.0.1', 9002)) | 
				
			|||
 | 
				
			|||
    sock_out.sendto(b'data', ('127.0.0.1', 9001)) | 
				
			|||
    result1 = sock_in1.recvfrom(8) | 
				
			|||
 | 
				
			|||
    sock_out.sendto(b'data', ('127.0.0.1', 9002)) | 
				
			|||
    result2 = sock_in2.recvfrom(8) | 
				
			|||
 | 
				
			|||
    sock_out.close() | 
				
			|||
    sock_in1.close() | 
				
			|||
    sock_in2.close() | 
				
			|||
 | 
				
			|||
    # make sure they're from the same source port | 
				
			|||
    assert result1 == result2 | 
				
			|||
 | 
				
			|||
    # Test 2: same source port IPv6 | 
				
			|||
    # try again from the same port but IPv6 | 
				
			|||
    sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, | 
				
			|||
                                socket.SOL_UDP) | 
				
			|||
    sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) | 
				
			|||
    sock_out.bind(('127.0.0.1', 9000)) | 
				
			|||
 | 
				
			|||
    sock_in1 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, | 
				
			|||
                             socket.SOL_UDP) | 
				
			|||
    sock_in2 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, | 
				
			|||
                             socket.SOL_UDP) | 
				
			|||
 | 
				
			|||
    sock_in1.bind(('::1', 9001)) | 
				
			|||
    sock_in2.bind(('::1', 9002)) | 
				
			|||
 | 
				
			|||
    sock_out.sendto(b'data', ('::1', 9001)) | 
				
			|||
    result1 = sock_in1.recvfrom(8) | 
				
			|||
 | 
				
			|||
    sock_out.sendto(b'data', ('::1', 9002)) | 
				
			|||
    result2 = sock_in2.recvfrom(8) | 
				
			|||
 | 
				
			|||
    sock_out.close() | 
				
			|||
    sock_in1.close() | 
				
			|||
    sock_in2.close() | 
				
			|||
 | 
				
			|||
    # make sure they're from the same source port | 
				
			|||
    assert result1 == result2 | 
				
			|||
 | 
				
			|||
    # Test 3: different source ports IPv6 | 
				
			|||
    sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, | 
				
			|||
                                socket.SOL_UDP) | 
				
			|||
    sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) | 
				
			|||
    sock_out.bind(('127.0.0.1', 9003)) | 
				
			|||
 | 
				
			|||
    sock_in1 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, | 
				
			|||
                             socket.SOL_UDP) | 
				
			|||
    sock_in1.bind(('::1', 9001)) | 
				
			|||
    sock_out.sendto(b'data', ('::1', 9001)) | 
				
			|||
    result3 = sock_in1.recvfrom(8) | 
				
			|||
 | 
				
			|||
    # make sure they're from different source ports | 
				
			|||
    assert result1 != result3 | 
				
			|||
 | 
				
			|||
    sock_out.close() | 
				
			|||
    sock_in1.close() | 
				
			|||
@ -0,0 +1,23 @@ | 
				
			|||
#!/bin/bash | 
				
			|||
 | 
				
			|||
PYTHON="coverage run -p -a" | 
				
			|||
 | 
				
			|||
mkdir -p tmp | 
				
			|||
 | 
				
			|||
$PYTHON shadowsocks/local.py -c tests/aes.json -v & | 
				
			|||
LOCAL=$! | 
				
			|||
 | 
				
			|||
$PYTHON shadowsocks/server.py -c tests/aes.json --forbidden-ip "" -v & | 
				
			|||
SERVER=$! | 
				
			|||
 | 
				
			|||
sleep 3 | 
				
			|||
 | 
				
			|||
python tests/test_udp_src.py | 
				
			|||
r=$? | 
				
			|||
 | 
				
			|||
kill -s SIGINT $LOCAL | 
				
			|||
kill -s SIGINT $SERVER | 
				
			|||
 | 
				
			|||
sleep 2 | 
				
			|||
 | 
				
			|||
exit $r | 
				
			|||
@ -0,0 +1,5 @@ | 
				
			|||
[Definition] | 
				
			|||
 | 
				
			|||
_daemon = shadowsocks | 
				
			|||
 | 
				
			|||
failregex = ^\s+ERROR\s+can not parse header when handling connection from <HOST>:\d+$ | 
				
			|||
					Loading…
					
					
				
		Reference in new issue