breakwa11
9 years ago
8 changed files with 144 additions and 29 deletions
@ -0,0 +1,83 @@ |
|||
#!/usr/bin/python |
|||
|
|||
import socket |
|||
import socks |
|||
|
|||
|
|||
SERVER_IP = '127.0.0.1' |
|||
SERVER_PORT = 1081 |
|||
|
|||
|
|||
if __name__ == '__main__': |
|||
# Test 1: same source port IPv4 |
|||
sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) |
|||
sock_out.bind(('127.0.0.1', 9000)) |
|||
|
|||
sock_in1 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
sock_in2 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
|
|||
sock_in1.bind(('127.0.0.1', 9001)) |
|||
sock_in2.bind(('127.0.0.1', 9002)) |
|||
|
|||
sock_out.sendto(b'data', ('127.0.0.1', 9001)) |
|||
result1 = sock_in1.recvfrom(8) |
|||
|
|||
sock_out.sendto(b'data', ('127.0.0.1', 9002)) |
|||
result2 = sock_in2.recvfrom(8) |
|||
|
|||
sock_out.close() |
|||
sock_in1.close() |
|||
sock_in2.close() |
|||
|
|||
# make sure they're from the same source port |
|||
assert result1 == result2 |
|||
|
|||
# Test 2: same source port IPv6 |
|||
# try again from the same port but IPv6 |
|||
sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) |
|||
sock_out.bind(('127.0.0.1', 9000)) |
|||
|
|||
sock_in1 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
sock_in2 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
|
|||
sock_in1.bind(('::1', 9001)) |
|||
sock_in2.bind(('::1', 9002)) |
|||
|
|||
sock_out.sendto(b'data', ('::1', 9001)) |
|||
result1 = sock_in1.recvfrom(8) |
|||
|
|||
sock_out.sendto(b'data', ('::1', 9002)) |
|||
result2 = sock_in2.recvfrom(8) |
|||
|
|||
sock_out.close() |
|||
sock_in1.close() |
|||
sock_in2.close() |
|||
|
|||
# make sure they're from the same source port |
|||
assert result1 == result2 |
|||
|
|||
# Test 3: different source ports IPv6 |
|||
sock_out = socks.socksocket(socket.AF_INET, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
sock_out.set_proxy(socks.SOCKS5, SERVER_IP, SERVER_PORT) |
|||
sock_out.bind(('127.0.0.1', 9003)) |
|||
|
|||
sock_in1 = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, |
|||
socket.SOL_UDP) |
|||
sock_in1.bind(('::1', 9001)) |
|||
sock_out.sendto(b'data', ('::1', 9001)) |
|||
result3 = sock_in1.recvfrom(8) |
|||
|
|||
# make sure they're from different source ports |
|||
assert result1 != result3 |
|||
|
|||
sock_out.close() |
|||
sock_in1.close() |
@ -0,0 +1,23 @@ |
|||
#!/bin/bash |
|||
|
|||
PYTHON="coverage run -p -a" |
|||
|
|||
mkdir -p tmp |
|||
|
|||
$PYTHON shadowsocks/local.py -c tests/aes.json -v & |
|||
LOCAL=$! |
|||
|
|||
$PYTHON shadowsocks/server.py -c tests/aes.json --forbidden-ip "" -v & |
|||
SERVER=$! |
|||
|
|||
sleep 3 |
|||
|
|||
python tests/test_udp_src.py |
|||
r=$? |
|||
|
|||
kill -s SIGINT $LOCAL |
|||
kill -s SIGINT $SERVER |
|||
|
|||
sleep 2 |
|||
|
|||
exit $r |
@ -0,0 +1,5 @@ |
|||
[Definition] |
|||
|
|||
_daemon = shadowsocks |
|||
|
|||
failregex = ^\s+ERROR\s+can not parse header when handling connection from <HOST>:\d+$ |
Loading…
Reference in new issue