mirror of
https://github.com/yt-dlp/yt-dlp.git
synced 2024-11-23 19:33:59 +01:00
parent
7cccab79e7
commit
fcd6a76adc
21
test/conftest.py
Normal file
21
test/conftest.py
Normal file
|
@ -0,0 +1,21 @@
|
||||||
|
import functools
|
||||||
|
import inspect
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
from yt_dlp.networking import RequestHandler
|
||||||
|
from yt_dlp.networking.common import _REQUEST_HANDLERS
|
||||||
|
from yt_dlp.utils._utils import _YDLLogger as FakeLogger
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture
|
||||||
|
def handler(request):
|
||||||
|
RH_KEY = request.param
|
||||||
|
if inspect.isclass(RH_KEY) and issubclass(RH_KEY, RequestHandler):
|
||||||
|
handler = RH_KEY
|
||||||
|
elif RH_KEY in _REQUEST_HANDLERS:
|
||||||
|
handler = _REQUEST_HANDLERS[RH_KEY]
|
||||||
|
else:
|
||||||
|
pytest.skip(f'{RH_KEY} request handler is not available')
|
||||||
|
|
||||||
|
return functools.partial(handler, logger=FakeLogger)
|
|
@ -8,12 +8,10 @@
|
||||||
|
|
||||||
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
||||||
|
|
||||||
import functools
|
|
||||||
import gzip
|
import gzip
|
||||||
import http.client
|
import http.client
|
||||||
import http.cookiejar
|
import http.cookiejar
|
||||||
import http.server
|
import http.server
|
||||||
import inspect
|
|
||||||
import io
|
import io
|
||||||
import pathlib
|
import pathlib
|
||||||
import random
|
import random
|
||||||
|
@ -40,7 +38,6 @@
|
||||||
Response,
|
Response,
|
||||||
)
|
)
|
||||||
from yt_dlp.networking._urllib import UrllibRH
|
from yt_dlp.networking._urllib import UrllibRH
|
||||||
from yt_dlp.networking.common import _REQUEST_HANDLERS
|
|
||||||
from yt_dlp.networking.exceptions import (
|
from yt_dlp.networking.exceptions import (
|
||||||
CertificateVerifyError,
|
CertificateVerifyError,
|
||||||
HTTPError,
|
HTTPError,
|
||||||
|
@ -307,19 +304,6 @@ def setup_class(cls):
|
||||||
cls.https_server_thread.start()
|
cls.https_server_thread.start()
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
|
||||||
def handler(request):
|
|
||||||
RH_KEY = request.param
|
|
||||||
if inspect.isclass(RH_KEY) and issubclass(RH_KEY, RequestHandler):
|
|
||||||
handler = RH_KEY
|
|
||||||
elif RH_KEY in _REQUEST_HANDLERS:
|
|
||||||
handler = _REQUEST_HANDLERS[RH_KEY]
|
|
||||||
else:
|
|
||||||
pytest.skip(f'{RH_KEY} request handler is not available')
|
|
||||||
|
|
||||||
return functools.partial(handler, logger=FakeLogger)
|
|
||||||
|
|
||||||
|
|
||||||
class TestHTTPRequestHandler(TestRequestHandlerBase):
|
class TestHTTPRequestHandler(TestRequestHandlerBase):
|
||||||
@pytest.mark.parametrize('handler', ['Urllib'], indirect=True)
|
@pytest.mark.parametrize('handler', ['Urllib'], indirect=True)
|
||||||
def test_verify_cert(self, handler):
|
def test_verify_cert(self, handler):
|
||||||
|
|
|
@ -1,113 +1,470 @@
|
||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
# Allow direct execution
|
# Allow direct execution
|
||||||
import os
|
import os
|
||||||
import sys
|
import sys
|
||||||
|
import threading
|
||||||
import unittest
|
import unittest
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
|
||||||
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
|
||||||
|
|
||||||
|
import abc
|
||||||
|
import contextlib
|
||||||
|
import enum
|
||||||
|
import functools
|
||||||
|
import http.server
|
||||||
|
import json
|
||||||
import random
|
import random
|
||||||
import subprocess
|
import socket
|
||||||
import urllib.request
|
import struct
|
||||||
|
import time
|
||||||
|
from socketserver import (
|
||||||
|
BaseRequestHandler,
|
||||||
|
StreamRequestHandler,
|
||||||
|
ThreadingTCPServer,
|
||||||
|
)
|
||||||
|
|
||||||
from test.helper import FakeYDL, get_params, is_download_test
|
from test.helper import http_server_port
|
||||||
|
from yt_dlp.networking import Request
|
||||||
|
from yt_dlp.networking.exceptions import ProxyError, TransportError
|
||||||
|
from yt_dlp.socks import (
|
||||||
|
SOCKS4_REPLY_VERSION,
|
||||||
|
SOCKS4_VERSION,
|
||||||
|
SOCKS5_USER_AUTH_SUCCESS,
|
||||||
|
SOCKS5_USER_AUTH_VERSION,
|
||||||
|
SOCKS5_VERSION,
|
||||||
|
Socks5AddressType,
|
||||||
|
Socks5Auth,
|
||||||
|
)
|
||||||
|
|
||||||
|
SOCKS5_USER_AUTH_FAILURE = 0x1
|
||||||
|
|
||||||
|
|
||||||
@is_download_test
|
class Socks4CD(enum.IntEnum):
|
||||||
class TestMultipleSocks(unittest.TestCase):
|
REQUEST_GRANTED = 90
|
||||||
@staticmethod
|
REQUEST_REJECTED_OR_FAILED = 91
|
||||||
def _check_params(attrs):
|
REQUEST_REJECTED_CANNOT_CONNECT_TO_IDENTD = 92
|
||||||
params = get_params()
|
REQUEST_REJECTED_DIFFERENT_USERID = 93
|
||||||
for attr in attrs:
|
|
||||||
if attr not in params:
|
|
||||||
print('Missing %s. Skipping.' % attr)
|
|
||||||
return
|
|
||||||
return params
|
|
||||||
|
|
||||||
def test_proxy_http(self):
|
|
||||||
params = self._check_params(['primary_proxy', 'primary_server_ip'])
|
|
||||||
if params is None:
|
|
||||||
return
|
|
||||||
ydl = FakeYDL({
|
|
||||||
'proxy': params['primary_proxy']
|
|
||||||
})
|
|
||||||
self.assertEqual(
|
|
||||||
ydl.urlopen('http://yt-dl.org/ip').read().decode(),
|
|
||||||
params['primary_server_ip'])
|
|
||||||
|
|
||||||
def test_proxy_https(self):
|
|
||||||
params = self._check_params(['primary_proxy', 'primary_server_ip'])
|
|
||||||
if params is None:
|
|
||||||
return
|
|
||||||
ydl = FakeYDL({
|
|
||||||
'proxy': params['primary_proxy']
|
|
||||||
})
|
|
||||||
self.assertEqual(
|
|
||||||
ydl.urlopen('https://yt-dl.org/ip').read().decode(),
|
|
||||||
params['primary_server_ip'])
|
|
||||||
|
|
||||||
def test_secondary_proxy_http(self):
|
|
||||||
params = self._check_params(['secondary_proxy', 'secondary_server_ip'])
|
|
||||||
if params is None:
|
|
||||||
return
|
|
||||||
ydl = FakeYDL()
|
|
||||||
req = urllib.request.Request('http://yt-dl.org/ip')
|
|
||||||
req.add_header('Ytdl-request-proxy', params['secondary_proxy'])
|
|
||||||
self.assertEqual(
|
|
||||||
ydl.urlopen(req).read().decode(),
|
|
||||||
params['secondary_server_ip'])
|
|
||||||
|
|
||||||
def test_secondary_proxy_https(self):
|
|
||||||
params = self._check_params(['secondary_proxy', 'secondary_server_ip'])
|
|
||||||
if params is None:
|
|
||||||
return
|
|
||||||
ydl = FakeYDL()
|
|
||||||
req = urllib.request.Request('https://yt-dl.org/ip')
|
|
||||||
req.add_header('Ytdl-request-proxy', params['secondary_proxy'])
|
|
||||||
self.assertEqual(
|
|
||||||
ydl.urlopen(req).read().decode(),
|
|
||||||
params['secondary_server_ip'])
|
|
||||||
|
|
||||||
|
|
||||||
@is_download_test
|
class Socks5Reply(enum.IntEnum):
|
||||||
class TestSocks(unittest.TestCase):
|
SUCCEEDED = 0x0
|
||||||
_SKIP_SOCKS_TEST = True
|
GENERAL_FAILURE = 0x1
|
||||||
|
CONNECTION_NOT_ALLOWED = 0x2
|
||||||
|
NETWORK_UNREACHABLE = 0x3
|
||||||
|
HOST_UNREACHABLE = 0x4
|
||||||
|
CONNECTION_REFUSED = 0x5
|
||||||
|
TTL_EXPIRED = 0x6
|
||||||
|
COMMAND_NOT_SUPPORTED = 0x7
|
||||||
|
ADDRESS_TYPE_NOT_SUPPORTED = 0x8
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
if self._SKIP_SOCKS_TEST:
|
class SocksTestRequestHandler(BaseRequestHandler):
|
||||||
|
|
||||||
|
def __init__(self, *args, socks_info=None, **kwargs):
|
||||||
|
self.socks_info = socks_info
|
||||||
|
super().__init__(*args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
class SocksProxyHandler(BaseRequestHandler):
|
||||||
|
def __init__(self, request_handler_class, socks_server_kwargs, *args, **kwargs):
|
||||||
|
self.socks_kwargs = socks_server_kwargs or {}
|
||||||
|
self.request_handler_class = request_handler_class
|
||||||
|
super().__init__(*args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
class Socks5ProxyHandler(StreamRequestHandler, SocksProxyHandler):
|
||||||
|
|
||||||
|
# SOCKS5 protocol https://tools.ietf.org/html/rfc1928
|
||||||
|
# SOCKS5 username/password authentication https://tools.ietf.org/html/rfc1929
|
||||||
|
|
||||||
|
def handle(self):
|
||||||
|
sleep = self.socks_kwargs.get('sleep')
|
||||||
|
if sleep:
|
||||||
|
time.sleep(sleep)
|
||||||
|
version, nmethods = self.connection.recv(2)
|
||||||
|
assert version == SOCKS5_VERSION
|
||||||
|
methods = list(self.connection.recv(nmethods))
|
||||||
|
|
||||||
|
auth = self.socks_kwargs.get('auth')
|
||||||
|
|
||||||
|
if auth is not None and Socks5Auth.AUTH_USER_PASS not in methods:
|
||||||
|
self.connection.sendall(struct.pack('!BB', SOCKS5_VERSION, Socks5Auth.AUTH_NO_ACCEPTABLE))
|
||||||
|
self.server.close_request(self.request)
|
||||||
return
|
return
|
||||||
|
|
||||||
self.port = random.randint(20000, 30000)
|
elif Socks5Auth.AUTH_USER_PASS in methods:
|
||||||
self.server_process = subprocess.Popen([
|
self.connection.sendall(struct.pack("!BB", SOCKS5_VERSION, Socks5Auth.AUTH_USER_PASS))
|
||||||
'srelay', '-f', '-i', '127.0.0.1:%d' % self.port],
|
|
||||||
stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
|
||||||
|
|
||||||
def tearDown(self):
|
_, user_len = struct.unpack('!BB', self.connection.recv(2))
|
||||||
if self._SKIP_SOCKS_TEST:
|
username = self.connection.recv(user_len).decode()
|
||||||
|
pass_len = ord(self.connection.recv(1))
|
||||||
|
password = self.connection.recv(pass_len).decode()
|
||||||
|
|
||||||
|
if username == auth[0] and password == auth[1]:
|
||||||
|
self.connection.sendall(struct.pack('!BB', SOCKS5_USER_AUTH_VERSION, SOCKS5_USER_AUTH_SUCCESS))
|
||||||
|
else:
|
||||||
|
self.connection.sendall(struct.pack('!BB', SOCKS5_USER_AUTH_VERSION, SOCKS5_USER_AUTH_FAILURE))
|
||||||
|
self.server.close_request(self.request)
|
||||||
return
|
return
|
||||||
|
|
||||||
self.server_process.terminate()
|
elif Socks5Auth.AUTH_NONE in methods:
|
||||||
self.server_process.communicate()
|
self.connection.sendall(struct.pack('!BB', SOCKS5_VERSION, Socks5Auth.AUTH_NONE))
|
||||||
|
else:
|
||||||
|
self.connection.sendall(struct.pack('!BB', SOCKS5_VERSION, Socks5Auth.AUTH_NO_ACCEPTABLE))
|
||||||
|
self.server.close_request(self.request)
|
||||||
|
return
|
||||||
|
|
||||||
def _get_ip(self, protocol):
|
version, command, _, address_type = struct.unpack('!BBBB', self.connection.recv(4))
|
||||||
if self._SKIP_SOCKS_TEST:
|
socks_info = {
|
||||||
return '127.0.0.1'
|
'version': version,
|
||||||
|
'auth_methods': methods,
|
||||||
|
'command': command,
|
||||||
|
'client_address': self.client_address,
|
||||||
|
'ipv4_address': None,
|
||||||
|
'domain_address': None,
|
||||||
|
'ipv6_address': None,
|
||||||
|
}
|
||||||
|
if address_type == Socks5AddressType.ATYP_IPV4:
|
||||||
|
socks_info['ipv4_address'] = socket.inet_ntoa(self.connection.recv(4))
|
||||||
|
elif address_type == Socks5AddressType.ATYP_DOMAINNAME:
|
||||||
|
socks_info['domain_address'] = self.connection.recv(ord(self.connection.recv(1))).decode()
|
||||||
|
elif address_type == Socks5AddressType.ATYP_IPV6:
|
||||||
|
socks_info['ipv6_address'] = socket.inet_ntop(socket.AF_INET6, self.connection.recv(16))
|
||||||
|
else:
|
||||||
|
self.server.close_request(self.request)
|
||||||
|
|
||||||
ydl = FakeYDL({
|
socks_info['port'] = struct.unpack('!H', self.connection.recv(2))[0]
|
||||||
'proxy': '%s://127.0.0.1:%d' % (protocol, self.port),
|
|
||||||
})
|
|
||||||
return ydl.urlopen('http://yt-dl.org/ip').read().decode()
|
|
||||||
|
|
||||||
def test_socks4(self):
|
# dummy response, the returned IP is just a placeholder
|
||||||
self.assertTrue(isinstance(self._get_ip('socks4'), str))
|
self.connection.sendall(struct.pack(
|
||||||
|
'!BBBBIH', SOCKS5_VERSION, self.socks_kwargs.get('reply', Socks5Reply.SUCCEEDED), 0x0, 0x1, 0x7f000001, 40000))
|
||||||
|
|
||||||
def test_socks4a(self):
|
self.request_handler_class(self.request, self.client_address, self.server, socks_info=socks_info)
|
||||||
self.assertTrue(isinstance(self._get_ip('socks4a'), str))
|
|
||||||
|
|
||||||
def test_socks5(self):
|
|
||||||
self.assertTrue(isinstance(self._get_ip('socks5'), str))
|
class Socks4ProxyHandler(StreamRequestHandler, SocksProxyHandler):
|
||||||
|
|
||||||
|
# SOCKS4 protocol http://www.openssh.com/txt/socks4.protocol
|
||||||
|
# SOCKS4A protocol http://www.openssh.com/txt/socks4a.protocol
|
||||||
|
|
||||||
|
def _read_until_null(self):
|
||||||
|
return b''.join(iter(functools.partial(self.connection.recv, 1), b'\x00'))
|
||||||
|
|
||||||
|
def handle(self):
|
||||||
|
sleep = self.socks_kwargs.get('sleep')
|
||||||
|
if sleep:
|
||||||
|
time.sleep(sleep)
|
||||||
|
socks_info = {
|
||||||
|
'version': SOCKS4_VERSION,
|
||||||
|
'command': None,
|
||||||
|
'client_address': self.client_address,
|
||||||
|
'ipv4_address': None,
|
||||||
|
'port': None,
|
||||||
|
'domain_address': None,
|
||||||
|
}
|
||||||
|
version, command, dest_port, dest_ip = struct.unpack('!BBHI', self.connection.recv(8))
|
||||||
|
socks_info['port'] = dest_port
|
||||||
|
socks_info['command'] = command
|
||||||
|
if version != SOCKS4_VERSION:
|
||||||
|
self.server.close_request(self.request)
|
||||||
|
return
|
||||||
|
use_remote_dns = False
|
||||||
|
if 0x0 < dest_ip <= 0xFF:
|
||||||
|
use_remote_dns = True
|
||||||
|
else:
|
||||||
|
socks_info['ipv4_address'] = socket.inet_ntoa(struct.pack("!I", dest_ip))
|
||||||
|
|
||||||
|
user_id = self._read_until_null().decode()
|
||||||
|
if user_id != (self.socks_kwargs.get('user_id') or ''):
|
||||||
|
self.connection.sendall(struct.pack(
|
||||||
|
'!BBHI', SOCKS4_REPLY_VERSION, Socks4CD.REQUEST_REJECTED_DIFFERENT_USERID, 0x00, 0x00000000))
|
||||||
|
self.server.close_request(self.request)
|
||||||
|
return
|
||||||
|
|
||||||
|
if use_remote_dns:
|
||||||
|
socks_info['domain_address'] = self._read_until_null().decode()
|
||||||
|
|
||||||
|
# dummy response, the returned IP is just a placeholder
|
||||||
|
self.connection.sendall(
|
||||||
|
struct.pack(
|
||||||
|
'!BBHI', SOCKS4_REPLY_VERSION,
|
||||||
|
self.socks_kwargs.get('cd_reply', Socks4CD.REQUEST_GRANTED), 40000, 0x7f000001))
|
||||||
|
|
||||||
|
self.request_handler_class(self.request, self.client_address, self.server, socks_info=socks_info)
|
||||||
|
|
||||||
|
|
||||||
|
class IPv6ThreadingTCPServer(ThreadingTCPServer):
|
||||||
|
address_family = socket.AF_INET6
|
||||||
|
|
||||||
|
|
||||||
|
class SocksHTTPTestRequestHandler(http.server.BaseHTTPRequestHandler, SocksTestRequestHandler):
|
||||||
|
def do_GET(self):
|
||||||
|
if self.path == '/socks_info':
|
||||||
|
payload = json.dumps(self.socks_info.copy())
|
||||||
|
self.send_response(200)
|
||||||
|
self.send_header('Content-Type', 'application/json; charset=utf-8')
|
||||||
|
self.send_header('Content-Length', str(len(payload)))
|
||||||
|
self.end_headers()
|
||||||
|
self.wfile.write(payload.encode())
|
||||||
|
|
||||||
|
|
||||||
|
@contextlib.contextmanager
|
||||||
|
def socks_server(socks_server_class, request_handler, bind_ip=None, **socks_server_kwargs):
|
||||||
|
server = server_thread = None
|
||||||
|
try:
|
||||||
|
bind_address = bind_ip or '127.0.0.1'
|
||||||
|
server_type = ThreadingTCPServer if '.' in bind_address else IPv6ThreadingTCPServer
|
||||||
|
server = server_type(
|
||||||
|
(bind_address, 0), functools.partial(socks_server_class, request_handler, socks_server_kwargs))
|
||||||
|
server_port = http_server_port(server)
|
||||||
|
server_thread = threading.Thread(target=server.serve_forever)
|
||||||
|
server_thread.daemon = True
|
||||||
|
server_thread.start()
|
||||||
|
if '.' not in bind_address:
|
||||||
|
yield f'[{bind_address}]:{server_port}'
|
||||||
|
else:
|
||||||
|
yield f'{bind_address}:{server_port}'
|
||||||
|
finally:
|
||||||
|
server.shutdown()
|
||||||
|
server.server_close()
|
||||||
|
server_thread.join(2.0)
|
||||||
|
|
||||||
|
|
||||||
|
class SocksProxyTestContext(abc.ABC):
|
||||||
|
REQUEST_HANDLER_CLASS = None
|
||||||
|
|
||||||
|
def socks_server(self, server_class, *args, **kwargs):
|
||||||
|
return socks_server(server_class, self.REQUEST_HANDLER_CLASS, *args, **kwargs)
|
||||||
|
|
||||||
|
@abc.abstractmethod
|
||||||
|
def socks_info_request(self, handler, target_domain=None, target_port=None, **req_kwargs) -> dict:
|
||||||
|
"""return a dict of socks_info"""
|
||||||
|
|
||||||
|
|
||||||
|
class HTTPSocksTestProxyContext(SocksProxyTestContext):
|
||||||
|
REQUEST_HANDLER_CLASS = SocksHTTPTestRequestHandler
|
||||||
|
|
||||||
|
def socks_info_request(self, handler, target_domain=None, target_port=None, **req_kwargs):
|
||||||
|
request = Request(f'http://{target_domain or "127.0.0.1"}:{target_port or "40000"}/socks_info', **req_kwargs)
|
||||||
|
handler.validate(request)
|
||||||
|
return json.loads(handler.send(request).read().decode())
|
||||||
|
|
||||||
|
|
||||||
|
CTX_MAP = {
|
||||||
|
'http': HTTPSocksTestProxyContext,
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.fixture(scope='module')
|
||||||
|
def ctx(request):
|
||||||
|
return CTX_MAP[request.param]()
|
||||||
|
|
||||||
|
|
||||||
|
class TestSocks4Proxy:
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks4_no_auth(self, handler, ctx):
|
||||||
|
with handler() as rh:
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler) as server_address:
|
||||||
|
response = ctx.socks_info_request(
|
||||||
|
rh, proxies={'all': f'socks4://{server_address}'})
|
||||||
|
assert response['version'] == 4
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks4_auth(self, handler, ctx):
|
||||||
|
with handler() as rh:
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler, user_id='user') as server_address:
|
||||||
|
with pytest.raises(ProxyError):
|
||||||
|
ctx.socks_info_request(rh, proxies={'all': f'socks4://{server_address}'})
|
||||||
|
response = ctx.socks_info_request(
|
||||||
|
rh, proxies={'all': f'socks4://user:@{server_address}'})
|
||||||
|
assert response['version'] == 4
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [
|
||||||
|
pytest.param('Urllib', 'http', marks=pytest.mark.xfail(
|
||||||
|
reason='socks4a implementation currently broken when destination is not a domain name'))
|
||||||
|
], indirect=True)
|
||||||
|
def test_socks4a_ipv4_target(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks4a://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='127.0.0.1')
|
||||||
|
assert response['version'] == 4
|
||||||
|
assert response['ipv4_address'] == '127.0.0.1'
|
||||||
|
assert response['domain_address'] is None
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks4a_domain_target(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks4a://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='localhost')
|
||||||
|
assert response['version'] == 4
|
||||||
|
assert response['ipv4_address'] is None
|
||||||
|
assert response['domain_address'] == 'localhost'
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [
|
||||||
|
pytest.param('Urllib', 'http', marks=pytest.mark.xfail(
|
||||||
|
reason='source_address is not yet supported for socks4 proxies'))
|
||||||
|
], indirect=True)
|
||||||
|
def test_ipv4_client_source_address(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler) as server_address:
|
||||||
|
source_address = f'127.0.0.{random.randint(5, 255)}'
|
||||||
|
with handler(proxies={'all': f'socks4://{server_address}'},
|
||||||
|
source_address=source_address) as rh:
|
||||||
|
response = ctx.socks_info_request(rh)
|
||||||
|
assert response['client_address'][0] == source_address
|
||||||
|
assert response['version'] == 4
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
@pytest.mark.parametrize('reply_code', [
|
||||||
|
Socks4CD.REQUEST_REJECTED_OR_FAILED,
|
||||||
|
Socks4CD.REQUEST_REJECTED_CANNOT_CONNECT_TO_IDENTD,
|
||||||
|
Socks4CD.REQUEST_REJECTED_DIFFERENT_USERID,
|
||||||
|
])
|
||||||
|
def test_socks4_errors(self, handler, ctx, reply_code):
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler, cd_reply=reply_code) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks4://{server_address}'}) as rh:
|
||||||
|
with pytest.raises(ProxyError):
|
||||||
|
ctx.socks_info_request(rh)
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [
|
||||||
|
pytest.param('Urllib', 'http', marks=pytest.mark.xfail(
|
||||||
|
reason='IPv6 socks4 proxies are not yet supported'))
|
||||||
|
], indirect=True)
|
||||||
|
def test_ipv6_socks4_proxy(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler, bind_ip='::1') as server_address:
|
||||||
|
with handler(proxies={'all': f'socks4://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='127.0.0.1')
|
||||||
|
assert response['client_address'][0] == '::1'
|
||||||
|
assert response['ipv4_address'] == '127.0.0.1'
|
||||||
|
assert response['version'] == 4
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_timeout(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks4ProxyHandler, sleep=2) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks4://{server_address}'}, timeout=1) as rh:
|
||||||
|
with pytest.raises(TransportError):
|
||||||
|
ctx.socks_info_request(rh)
|
||||||
|
|
||||||
|
|
||||||
|
class TestSocks5Proxy:
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks5_no_auth(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh)
|
||||||
|
assert response['auth_methods'] == [0x0]
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks5_user_pass(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler, auth=('test', 'testpass')) as server_address:
|
||||||
|
with handler() as rh:
|
||||||
|
with pytest.raises(ProxyError):
|
||||||
|
ctx.socks_info_request(rh, proxies={'all': f'socks5://{server_address}'})
|
||||||
|
|
||||||
|
response = ctx.socks_info_request(
|
||||||
|
rh, proxies={'all': f'socks5://test:testpass@{server_address}'})
|
||||||
|
|
||||||
|
assert response['auth_methods'] == [Socks5Auth.AUTH_NONE, Socks5Auth.AUTH_USER_PASS]
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks5_ipv4_target(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='127.0.0.1')
|
||||||
|
assert response['ipv4_address'] == '127.0.0.1'
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks5_domain_target(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='localhost')
|
||||||
|
assert response['ipv4_address'] == '127.0.0.1'
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks5h_domain_target(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5h://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='localhost')
|
||||||
|
assert response['ipv4_address'] is None
|
||||||
|
assert response['domain_address'] == 'localhost'
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_socks5h_ip_target(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5h://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='127.0.0.1')
|
||||||
|
assert response['ipv4_address'] == '127.0.0.1'
|
||||||
|
assert response['domain_address'] is None
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [
|
||||||
|
pytest.param('Urllib', 'http', marks=pytest.mark.xfail(
|
||||||
|
reason='IPv6 destination addresses are not yet supported'))
|
||||||
|
], indirect=True)
|
||||||
|
def test_socks5_ipv6_destination(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='[::1]')
|
||||||
|
assert response['ipv6_address'] == '::1'
|
||||||
|
assert response['port'] == 80
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [
|
||||||
|
pytest.param('Urllib', 'http', marks=pytest.mark.xfail(
|
||||||
|
reason='IPv6 socks5 proxies are not yet supported'))
|
||||||
|
], indirect=True)
|
||||||
|
def test_ipv6_socks5_proxy(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler, bind_ip='::1') as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}) as rh:
|
||||||
|
response = ctx.socks_info_request(rh, target_domain='127.0.0.1')
|
||||||
|
assert response['client_address'][0] == '::1'
|
||||||
|
assert response['ipv4_address'] == '127.0.0.1'
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
# XXX: is there any feasible way of testing IPv6 source addresses?
|
||||||
|
# Same would go for non-proxy source_address test...
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [
|
||||||
|
pytest.param('Urllib', 'http', marks=pytest.mark.xfail(
|
||||||
|
reason='source_address is not yet supported for socks5 proxies'))
|
||||||
|
], indirect=True)
|
||||||
|
def test_ipv4_client_source_address(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler) as server_address:
|
||||||
|
source_address = f'127.0.0.{random.randint(5, 255)}'
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}, source_address=source_address) as rh:
|
||||||
|
response = ctx.socks_info_request(rh)
|
||||||
|
assert response['client_address'][0] == source_address
|
||||||
|
assert response['version'] == 5
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
@pytest.mark.parametrize('reply_code', [
|
||||||
|
Socks5Reply.GENERAL_FAILURE,
|
||||||
|
Socks5Reply.CONNECTION_NOT_ALLOWED,
|
||||||
|
Socks5Reply.NETWORK_UNREACHABLE,
|
||||||
|
Socks5Reply.HOST_UNREACHABLE,
|
||||||
|
Socks5Reply.CONNECTION_REFUSED,
|
||||||
|
Socks5Reply.TTL_EXPIRED,
|
||||||
|
Socks5Reply.COMMAND_NOT_SUPPORTED,
|
||||||
|
Socks5Reply.ADDRESS_TYPE_NOT_SUPPORTED,
|
||||||
|
])
|
||||||
|
def test_socks5_errors(self, handler, ctx, reply_code):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler, reply=reply_code) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}) as rh:
|
||||||
|
with pytest.raises(ProxyError):
|
||||||
|
ctx.socks_info_request(rh)
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('handler,ctx', [('Urllib', 'http')], indirect=True)
|
||||||
|
def test_timeout(self, handler, ctx):
|
||||||
|
with ctx.socks_server(Socks5ProxyHandler, sleep=2) as server_address:
|
||||||
|
with handler(proxies={'all': f'socks5://{server_address}'}, timeout=1) as rh:
|
||||||
|
with pytest.raises(TransportError):
|
||||||
|
ctx.socks_info_request(rh)
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
|
Loading…
Reference in New Issue
Block a user