summaryrefslogtreecommitdiff
path: root/vendor/golang.org/x/net/internal/socks/dial_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/golang.org/x/net/internal/socks/dial_test.go')
-rw-r--r--vendor/golang.org/x/net/internal/socks/dial_test.go170
1 files changed, 0 insertions, 170 deletions
diff --git a/vendor/golang.org/x/net/internal/socks/dial_test.go b/vendor/golang.org/x/net/internal/socks/dial_test.go
deleted file mode 100644
index 3a7a31b..0000000
--- a/vendor/golang.org/x/net/internal/socks/dial_test.go
+++ /dev/null
@@ -1,170 +0,0 @@
-// Copyright 2018 The Go Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style
-// license that can be found in the LICENSE file.
-
-package socks_test
-
-import (
- "context"
- "io"
- "math/rand"
- "net"
- "os"
- "testing"
- "time"
-
- "golang.org/x/net/internal/socks"
- "golang.org/x/net/internal/sockstest"
-)
-
-func TestDial(t *testing.T) {
- t.Run("Connect", func(t *testing.T) {
- ss, err := sockstest.NewServer(sockstest.NoAuthRequired, sockstest.NoProxyRequired)
- if err != nil {
- t.Fatal(err)
- }
- defer ss.Close()
- d := socks.NewDialer(ss.Addr().Network(), ss.Addr().String())
- d.AuthMethods = []socks.AuthMethod{
- socks.AuthMethodNotRequired,
- socks.AuthMethodUsernamePassword,
- }
- d.Authenticate = (&socks.UsernamePassword{
- Username: "username",
- Password: "password",
- }).Authenticate
- c, err := d.DialContext(context.Background(), ss.TargetAddr().Network(), ss.TargetAddr().String())
- if err != nil {
- t.Fatal(err)
- }
- c.(*socks.Conn).BoundAddr()
- c.Close()
- })
- t.Run("ConnectWithConn", func(t *testing.T) {
- ss, err := sockstest.NewServer(sockstest.NoAuthRequired, sockstest.NoProxyRequired)
- if err != nil {
- t.Fatal(err)
- }
- defer ss.Close()
- c, err := net.Dial(ss.Addr().Network(), ss.Addr().String())
- if err != nil {
- t.Fatal(err)
- }
- defer c.Close()
- d := socks.NewDialer(ss.Addr().Network(), ss.Addr().String())
- d.AuthMethods = []socks.AuthMethod{
- socks.AuthMethodNotRequired,
- socks.AuthMethodUsernamePassword,
- }
- d.Authenticate = (&socks.UsernamePassword{
- Username: "username",
- Password: "password",
- }).Authenticate
- a, err := d.DialWithConn(context.Background(), c, ss.TargetAddr().Network(), ss.TargetAddr().String())
- if err != nil {
- t.Fatal(err)
- }
- if _, ok := a.(*socks.Addr); !ok {
- t.Fatalf("got %+v; want socks.Addr", a)
- }
- })
- t.Run("Cancel", func(t *testing.T) {
- ss, err := sockstest.NewServer(sockstest.NoAuthRequired, blackholeCmdFunc)
- if err != nil {
- t.Fatal(err)
- }
- defer ss.Close()
- d := socks.NewDialer(ss.Addr().Network(), ss.Addr().String())
- ctx, cancel := context.WithCancel(context.Background())
- defer cancel()
- dialErr := make(chan error)
- go func() {
- c, err := d.DialContext(ctx, ss.TargetAddr().Network(), ss.TargetAddr().String())
- if err == nil {
- c.Close()
- }
- dialErr <- err
- }()
- time.Sleep(100 * time.Millisecond)
- cancel()
- err = <-dialErr
- if perr, nerr := parseDialError(err); perr != context.Canceled && nerr == nil {
- t.Fatalf("got %v; want context.Canceled or equivalent", err)
- }
- })
- t.Run("Deadline", func(t *testing.T) {
- ss, err := sockstest.NewServer(sockstest.NoAuthRequired, blackholeCmdFunc)
- if err != nil {
- t.Fatal(err)
- }
- defer ss.Close()
- d := socks.NewDialer(ss.Addr().Network(), ss.Addr().String())
- ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(100*time.Millisecond))
- defer cancel()
- c, err := d.DialContext(ctx, ss.TargetAddr().Network(), ss.TargetAddr().String())
- if err == nil {
- c.Close()
- }
- if perr, nerr := parseDialError(err); perr != context.DeadlineExceeded && nerr == nil {
- t.Fatalf("got %v; want context.DeadlineExceeded or equivalent", err)
- }
- })
- t.Run("WithRogueServer", func(t *testing.T) {
- ss, err := sockstest.NewServer(sockstest.NoAuthRequired, rogueCmdFunc)
- if err != nil {
- t.Fatal(err)
- }
- defer ss.Close()
- d := socks.NewDialer(ss.Addr().Network(), ss.Addr().String())
- for i := 0; i < 2*len(rogueCmdList); i++ {
- ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(100*time.Millisecond))
- defer cancel()
- c, err := d.DialContext(ctx, ss.TargetAddr().Network(), ss.TargetAddr().String())
- if err == nil {
- t.Log(c.(*socks.Conn).BoundAddr())
- c.Close()
- t.Error("should fail")
- }
- }
- })
-}
-
-func blackholeCmdFunc(rw io.ReadWriter, b []byte) error {
- if _, err := sockstest.ParseCmdRequest(b); err != nil {
- return err
- }
- var bb [1]byte
- for {
- if _, err := rw.Read(bb[:]); err != nil {
- return err
- }
- }
-}
-
-func rogueCmdFunc(rw io.ReadWriter, b []byte) error {
- if _, err := sockstest.ParseCmdRequest(b); err != nil {
- return err
- }
- rw.Write(rogueCmdList[rand.Intn(len(rogueCmdList))])
- return nil
-}
-
-var rogueCmdList = [][]byte{
- {0x05},
- {0x06, 0x00, 0x00, 0x01, 192, 0, 2, 1, 0x17, 0x4b},
- {0x05, 0x00, 0xff, 0x01, 192, 0, 2, 2, 0x17, 0x4b},
- {0x05, 0x00, 0x00, 0x01, 192, 0, 2, 3},
- {0x05, 0x00, 0x00, 0x03, 0x04, 'F', 'Q', 'D', 'N'},
-}
-
-func parseDialError(err error) (perr, nerr error) {
- if e, ok := err.(*net.OpError); ok {
- err = e.Err
- nerr = e
- }
- if e, ok := err.(*os.SyscallError); ok {
- err = e.Err
- }
- perr = err
- return
-}