2021-06-22 21:32:27 +08:00
|
|
|
package udp
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2023-02-20 12:49:55 +08:00
|
|
|
"context"
|
|
|
|
"crypto/rand"
|
2021-06-22 21:32:27 +08:00
|
|
|
"encoding/binary"
|
|
|
|
"io"
|
|
|
|
"net"
|
2023-02-20 12:49:55 +08:00
|
|
|
"sync"
|
2021-06-22 21:32:27 +08:00
|
|
|
"testing"
|
2023-02-20 12:49:55 +08:00
|
|
|
"time"
|
2021-06-22 21:32:27 +08:00
|
|
|
|
|
|
|
"github.com/anacrolix/dht/v2/krpc"
|
2023-02-20 12:49:55 +08:00
|
|
|
_ "github.com/anacrolix/envpprof"
|
|
|
|
"github.com/anacrolix/missinggo/v2/iter"
|
2021-12-28 08:02:14 +08:00
|
|
|
qt "github.com/frankban/quicktest"
|
2021-06-22 21:32:27 +08:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Ensure net.IPs are stored big-endian, to match the way they're read from
|
|
|
|
// the wire.
|
|
|
|
func TestNetIPv4Bytes(t *testing.T) {
|
|
|
|
ip := net.IP([]byte{127, 0, 0, 1})
|
|
|
|
if ip.String() != "127.0.0.1" {
|
|
|
|
t.FailNow()
|
|
|
|
}
|
|
|
|
if string(ip) != "\x7f\x00\x00\x01" {
|
|
|
|
t.Fatal([]byte(ip))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMarshalAnnounceResponse(t *testing.T) {
|
|
|
|
peers := krpc.CompactIPv4NodeAddrs{
|
|
|
|
{[]byte{127, 0, 0, 1}, 2},
|
|
|
|
{[]byte{255, 0, 0, 3}, 4},
|
|
|
|
}
|
|
|
|
b, err := peers.MarshalBinary()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.EqualValues(t,
|
|
|
|
"\x7f\x00\x00\x01\x00\x02\xff\x00\x00\x03\x00\x04",
|
|
|
|
b)
|
|
|
|
require.EqualValues(t, 12, binary.Size(AnnounceResponseHeader{}))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Failure to write an entire packet to UDP is expected to given an error.
|
|
|
|
func TestLongWriteUDP(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
l, err := net.ListenUDP("udp4", nil)
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer l.Close()
|
|
|
|
c, err := net.DialUDP("udp", nil, l.LocalAddr().(*net.UDPAddr))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer c.Close()
|
|
|
|
for msgLen := 1; ; msgLen *= 2 {
|
|
|
|
n, err := c.Write(make([]byte, msgLen))
|
|
|
|
if err != nil {
|
|
|
|
require.Contains(t, err.Error(), "message too long")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if n < msgLen {
|
|
|
|
t.FailNow()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestShortBinaryRead(t *testing.T) {
|
|
|
|
var data ResponseHeader
|
|
|
|
err := binary.Read(bytes.NewBufferString("\x00\x00\x00\x01"), binary.BigEndian, &data)
|
|
|
|
if err != io.ErrUnexpectedEOF {
|
|
|
|
t.FailNow()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestConvertInt16ToInt(t *testing.T) {
|
|
|
|
i := 50000
|
|
|
|
if int(uint16(int16(i))) != 50000 {
|
|
|
|
t.FailNow()
|
|
|
|
}
|
|
|
|
}
|
2021-12-28 08:02:14 +08:00
|
|
|
|
|
|
|
func TestConnClientLogDispatchUnknownTransactionId(t *testing.T) {
|
|
|
|
const network = "udp"
|
|
|
|
cc, err := NewConnClient(NewConnClientOpts{
|
|
|
|
Network: network,
|
|
|
|
})
|
|
|
|
c := qt.New(t)
|
|
|
|
c.Assert(err, qt.IsNil)
|
|
|
|
defer cc.Close()
|
|
|
|
pc, err := net.ListenPacket(network, ":0")
|
|
|
|
c.Assert(err, qt.IsNil)
|
|
|
|
defer pc.Close()
|
|
|
|
ccAddr := *cc.LocalAddr().(*net.UDPAddr)
|
|
|
|
ccAddr.IP = net.IPv6loopback
|
|
|
|
_, err = pc.WriteTo(make([]byte, 30), &ccAddr)
|
|
|
|
c.Assert(err, qt.IsNil)
|
|
|
|
}
|
2023-02-20 12:49:55 +08:00
|
|
|
|
|
|
|
func TestConnectionIdMismatch(t *testing.T) {
|
|
|
|
t.Skip("Server host returns consistent connection ID in limited tests and so isn't effective.")
|
|
|
|
cl, err := NewConnClient(NewConnClientOpts{
|
|
|
|
// This host seems to return `Connection ID missmatch.\x00` every 2 minutes or so under
|
|
|
|
// heavy use.
|
|
|
|
Host: "tracker.torrent.eu.org:451",
|
|
|
|
//Host: "tracker.opentrackr.org:1337",
|
|
|
|
Network: "udp",
|
|
|
|
})
|
|
|
|
c := qt.New(t)
|
|
|
|
c.Assert(err, qt.IsNil)
|
|
|
|
defer cl.Close()
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
// Force every request to use a different connection ID. It's racey, but we want to get a
|
|
|
|
// different ID issued before a request can be sent with an old ID.
|
|
|
|
cl.Client.shouldReconnectOverride = func() bool { return true }
|
|
|
|
started := time.Now()
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
for range iter.N(2) {
|
|
|
|
ar := AnnounceRequest{
|
|
|
|
NumWant: -1,
|
|
|
|
Event: 2,
|
|
|
|
}
|
|
|
|
rand.Read(ar.InfoHash[:])
|
|
|
|
rand.Read(ar.PeerId[:])
|
|
|
|
//spew.Dump(ar)
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
_, _, err := cl.Announce(ctx, ar, Options{})
|
|
|
|
// I'm looking for `error response: "Connection ID missmatch.\x00"`.
|
|
|
|
t.Logf("announce error after %v: %v", time.Since(started), err)
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
wg.Wait()
|
|
|
|
}
|