2016-06-04 06:07:50 +00:00
|
|
|
from __future__ import print_function, unicode_literals
|
2016-06-03 23:04:12 +00:00
|
|
|
import os, sys, re, io, zipfile, six, stat
|
2016-11-12 03:01:21 +00:00
|
|
|
from humanize import naturalsize
|
2016-06-03 22:38:49 +00:00
|
|
|
import mock
|
2015-09-27 01:00:09 +00:00
|
|
|
from twisted.trial import unittest
|
|
|
|
from twisted.python import procutils, log
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
from twisted.internet import defer, endpoints, reactor
|
2015-09-27 01:00:09 +00:00
|
|
|
from twisted.internet.utils import getProcessOutputAndValue
|
2016-04-26 00:11:52 +00:00
|
|
|
from twisted.internet.defer import gatherResults, inlineCallbacks
|
2016-04-21 01:54:10 +00:00
|
|
|
from .. import __version__
|
2016-07-15 04:22:01 +00:00
|
|
|
from .common import ServerBase, config
|
2016-06-03 22:17:47 +00:00
|
|
|
from ..cli import cmd_send, cmd_receive
|
2016-05-26 22:37:24 +00:00
|
|
|
from ..errors import TransferError, WrongPasswordError, WelcomeError
|
2016-06-03 22:17:47 +00:00
|
|
|
|
2016-02-17 18:35:59 +00:00
|
|
|
|
2016-05-25 00:43:17 +00:00
|
|
|
def build_offer(args):
|
|
|
|
s = cmd_send.Sender(args, None)
|
|
|
|
return s._build_offer()
|
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
|
2016-05-24 23:41:13 +00:00
|
|
|
class OfferData(unittest.TestCase):
|
2016-04-20 17:41:38 +00:00
|
|
|
def setUp(self):
|
|
|
|
self._things_to_delete = []
|
2016-07-15 04:22:01 +00:00
|
|
|
self.cfg = cfg = config("send")
|
2016-06-03 22:17:47 +00:00
|
|
|
cfg.stdout = io.StringIO()
|
|
|
|
cfg.stderr = io.StringIO()
|
2016-04-20 17:41:38 +00:00
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
for fn in self._things_to_delete:
|
|
|
|
if os.path.exists(fn):
|
|
|
|
os.unlink(fn)
|
2016-06-03 22:17:47 +00:00
|
|
|
del self.cfg
|
2016-04-20 17:41:38 +00:00
|
|
|
|
2016-02-17 18:35:59 +00:00
|
|
|
def test_text(self):
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.text = message = "blah blah blah ponies"
|
|
|
|
d, fd_to_send = build_offer(self.cfg)
|
2016-02-17 18:35:59 +00:00
|
|
|
|
|
|
|
self.assertIn("message", d)
|
|
|
|
self.assertNotIn("file", d)
|
|
|
|
self.assertNotIn("directory", d)
|
|
|
|
self.assertEqual(d["message"], message)
|
|
|
|
self.assertEqual(fd_to_send, None)
|
|
|
|
|
|
|
|
def test_file(self):
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.what = filename = "my file"
|
2016-02-17 18:35:59 +00:00
|
|
|
message = b"yay ponies\n"
|
|
|
|
send_dir = self.mktemp()
|
|
|
|
os.mkdir(send_dir)
|
|
|
|
abs_filename = os.path.join(send_dir, filename)
|
|
|
|
with open(abs_filename, "wb") as f:
|
|
|
|
f.write(message)
|
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.cwd = send_dir
|
|
|
|
d, fd_to_send = build_offer(self.cfg)
|
2016-02-17 18:35:59 +00:00
|
|
|
|
|
|
|
self.assertNotIn("message", d)
|
|
|
|
self.assertIn("file", d)
|
|
|
|
self.assertNotIn("directory", d)
|
|
|
|
self.assertEqual(d["file"]["filesize"], len(message))
|
|
|
|
self.assertEqual(d["file"]["filename"], filename)
|
|
|
|
self.assertEqual(fd_to_send.tell(), 0)
|
|
|
|
self.assertEqual(fd_to_send.read(), message)
|
|
|
|
|
|
|
|
def test_missing_file(self):
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.what = filename = "missing"
|
2016-02-17 18:35:59 +00:00
|
|
|
send_dir = self.mktemp()
|
|
|
|
os.mkdir(send_dir)
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.cwd = send_dir
|
2016-02-17 18:35:59 +00:00
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
e = self.assertRaises(TransferError, build_offer, self.cfg)
|
2016-02-17 18:35:59 +00:00
|
|
|
self.assertEqual(str(e),
|
|
|
|
"Cannot send: no file/directory named '%s'" % filename)
|
|
|
|
|
2016-03-24 15:46:29 +00:00
|
|
|
def _do_test_directory(self, addslash):
|
2016-02-17 18:35:59 +00:00
|
|
|
parent_dir = self.mktemp()
|
|
|
|
os.mkdir(parent_dir)
|
|
|
|
send_dir = "dirname"
|
|
|
|
os.mkdir(os.path.join(parent_dir, send_dir))
|
|
|
|
ponies = [str(i) for i in range(5)]
|
|
|
|
for p in ponies:
|
|
|
|
with open(os.path.join(parent_dir, send_dir, p), "wb") as f:
|
|
|
|
f.write(("%s ponies\n" % p).encode("ascii"))
|
|
|
|
|
2016-03-24 15:46:29 +00:00
|
|
|
send_dir_arg = send_dir
|
|
|
|
if addslash:
|
|
|
|
send_dir_arg += os.sep
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.what = send_dir_arg
|
|
|
|
self.cfg.cwd = parent_dir
|
2016-02-17 18:35:59 +00:00
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
d, fd_to_send = build_offer(self.cfg)
|
2016-02-17 18:35:59 +00:00
|
|
|
|
|
|
|
self.assertNotIn("message", d)
|
|
|
|
self.assertNotIn("file", d)
|
|
|
|
self.assertIn("directory", d)
|
|
|
|
self.assertEqual(d["directory"]["dirname"], send_dir)
|
|
|
|
self.assertEqual(d["directory"]["mode"], "zipfile/deflated")
|
|
|
|
self.assertEqual(d["directory"]["numfiles"], 5)
|
|
|
|
self.assertIn("numbytes", d["directory"])
|
2016-02-27 22:46:38 +00:00
|
|
|
self.assertIsInstance(d["directory"]["numbytes"], six.integer_types)
|
2016-02-17 18:35:59 +00:00
|
|
|
|
|
|
|
self.assertEqual(fd_to_send.tell(), 0)
|
|
|
|
zdata = fd_to_send.read()
|
|
|
|
self.assertEqual(len(zdata), d["directory"]["zipsize"])
|
|
|
|
fd_to_send.seek(0, 0)
|
|
|
|
with zipfile.ZipFile(fd_to_send, "r", zipfile.ZIP_DEFLATED) as zf:
|
|
|
|
zipnames = zf.namelist()
|
|
|
|
self.assertEqual(list(sorted(ponies)), list(sorted(zipnames)))
|
|
|
|
for name in zipnames:
|
|
|
|
contents = zf.open(name, "r").read()
|
|
|
|
self.assertEqual(("%s ponies\n" % name).encode("ascii"),
|
|
|
|
contents)
|
|
|
|
|
2016-03-24 15:46:29 +00:00
|
|
|
def test_directory(self):
|
|
|
|
return self._do_test_directory(addslash=False)
|
|
|
|
|
|
|
|
def test_directory_addslash(self):
|
|
|
|
return self._do_test_directory(addslash=True)
|
|
|
|
|
2016-02-17 18:35:59 +00:00
|
|
|
def test_unknown(self):
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.what = filename = "unknown"
|
2016-02-17 18:35:59 +00:00
|
|
|
send_dir = self.mktemp()
|
|
|
|
os.mkdir(send_dir)
|
|
|
|
abs_filename = os.path.abspath(os.path.join(send_dir, filename))
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.cwd = send_dir
|
2016-02-17 18:35:59 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
os.mkfifo(abs_filename)
|
2016-02-27 22:46:38 +00:00
|
|
|
except AttributeError:
|
2016-02-17 18:35:59 +00:00
|
|
|
raise unittest.SkipTest("is mkfifo supported on this platform?")
|
2016-04-20 17:41:38 +00:00
|
|
|
|
|
|
|
# Delete the named pipe for the sake of users who might run "pip
|
|
|
|
# wheel ." in this directory later. That command wants to copy
|
|
|
|
# everything into a tempdir before building a wheel, and the
|
|
|
|
# shutil.copy_tree() is uses can't handle the named pipe.
|
|
|
|
self._things_to_delete.append(abs_filename)
|
|
|
|
|
2016-02-17 18:35:59 +00:00
|
|
|
self.assertFalse(os.path.isfile(abs_filename))
|
|
|
|
self.assertFalse(os.path.isdir(abs_filename))
|
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
e = self.assertRaises(TypeError, build_offer, self.cfg)
|
2016-02-17 18:35:59 +00:00
|
|
|
self.assertEqual(str(e),
|
|
|
|
"'%s' is neither file nor directory" % filename)
|
|
|
|
|
2015-09-27 01:00:09 +00:00
|
|
|
|
2015-09-27 17:43:25 +00:00
|
|
|
class ScriptsBase:
|
2015-09-27 01:00:09 +00:00
|
|
|
def find_executable(self):
|
2015-09-27 01:29:46 +00:00
|
|
|
# to make sure we're running the right executable (in a virtualenv),
|
|
|
|
# we require that our "wormhole" lives in the same directory as our
|
|
|
|
# "python"
|
2015-09-27 01:00:09 +00:00
|
|
|
locations = procutils.which("wormhole")
|
|
|
|
if not locations:
|
|
|
|
raise unittest.SkipTest("unable to find 'wormhole' in $PATH")
|
|
|
|
wormhole = locations[0]
|
2015-09-27 01:29:46 +00:00
|
|
|
if (os.path.dirname(os.path.abspath(wormhole)) !=
|
|
|
|
os.path.dirname(sys.executable)):
|
2015-09-27 01:00:09 +00:00
|
|
|
log.msg("locations: %s" % (locations,))
|
2015-09-27 01:29:46 +00:00
|
|
|
log.msg("sys.executable: %s" % (sys.executable,))
|
2015-09-27 01:17:50 +00:00
|
|
|
raise unittest.SkipTest("found the wrong 'wormhole' in $PATH: %s %s"
|
2015-09-27 01:29:46 +00:00
|
|
|
% (wormhole, sys.executable))
|
2015-09-27 01:00:09 +00:00
|
|
|
return wormhole
|
|
|
|
|
2015-09-27 17:43:25 +00:00
|
|
|
def is_runnable(self):
|
|
|
|
# One property of Versioneer is that many changes to the source tree
|
|
|
|
# (making a commit, dirtying a previously-clean tree) will change the
|
|
|
|
# version string. Entrypoint scripts frequently insist upon importing
|
|
|
|
# a library version that matches the script version (whatever was
|
|
|
|
# reported when 'pip install' was run), and throw a
|
|
|
|
# DistributionNotFound error when they don't match. This is really
|
|
|
|
# annoying in a workspace created with "pip install -e .", as you
|
|
|
|
# must re-run pip after each commit.
|
|
|
|
|
|
|
|
# So let's report just one error in this case (from test_version),
|
|
|
|
# and skip the other tests that we know will fail.
|
|
|
|
|
2016-06-23 02:28:17 +00:00
|
|
|
# Setting LANG/LC_ALL to a unicode-capable locale is necessary to
|
|
|
|
# convince Click to not complain about a forced-ascii locale. My
|
|
|
|
# apologies to folks who want to run tests on a machine that doesn't
|
|
|
|
# have the en_US.UTF-8 locale installed.
|
2015-09-27 17:43:25 +00:00
|
|
|
wormhole = self.find_executable()
|
2016-06-23 02:28:17 +00:00
|
|
|
d = getProcessOutputAndValue(wormhole, ["--version"],
|
|
|
|
env=dict(LC_ALL="en_US.UTF-8",
|
|
|
|
LANG="en_US.UTF-8"))
|
2015-09-27 17:43:25 +00:00
|
|
|
def _check(res):
|
|
|
|
out, err, rc = res
|
|
|
|
if rc != 0:
|
2016-06-23 02:28:17 +00:00
|
|
|
log.msg("wormhole not runnable in this tree:")
|
|
|
|
log.msg("out", out)
|
|
|
|
log.msg("err", err)
|
|
|
|
log.msg("rc", rc)
|
2015-09-27 17:43:25 +00:00
|
|
|
raise unittest.SkipTest("wormhole is not runnable in this tree")
|
|
|
|
d.addCallback(_check)
|
|
|
|
return d
|
|
|
|
|
|
|
|
class ScriptVersion(ServerBase, ScriptsBase, unittest.TestCase):
|
|
|
|
# we need Twisted to run the server, but we run the sender and receiver
|
|
|
|
# with deferToThread()
|
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
@inlineCallbacks
|
2015-09-27 01:00:09 +00:00
|
|
|
def test_version(self):
|
|
|
|
# "wormhole" must be on the path, so e.g. "pip install -e ." in a
|
2015-09-28 23:31:35 +00:00
|
|
|
# virtualenv. This guards against an environment where the tests
|
|
|
|
# below might run the wrong executable.
|
2016-06-03 22:17:47 +00:00
|
|
|
self.maxDiff = None
|
2015-09-27 01:00:09 +00:00
|
|
|
wormhole = self.find_executable()
|
2016-06-03 22:17:47 +00:00
|
|
|
# we must pass on the environment so that "something" doesn't
|
|
|
|
# get sad about UTF8 vs. ascii encodings
|
|
|
|
out, err, rc = yield getProcessOutputAndValue(wormhole, ["--version"], env=os.environ)
|
|
|
|
err = err.decode("utf-8")
|
|
|
|
if "DistributionNotFound" in err:
|
|
|
|
log.msg("stderr was %s" % err)
|
|
|
|
last = err.strip().split("\n")[-1]
|
|
|
|
self.fail("wormhole not runnable: %s" % last)
|
|
|
|
ver = out.decode("utf-8") or err
|
|
|
|
self.failUnlessEqual(ver.strip(), "magic-wormhole {}".format(__version__))
|
|
|
|
self.failUnlessEqual(rc, 0)
|
2015-09-27 01:00:09 +00:00
|
|
|
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
class FakeTorManager:
|
|
|
|
# use normal endpoints, but record the fact that we were asked
|
|
|
|
def __init__(self):
|
|
|
|
self.endpoints = []
|
|
|
|
def tor_available(self):
|
|
|
|
return True
|
|
|
|
def start(self):
|
|
|
|
return defer.succeed(None)
|
|
|
|
def get_endpoint_for(self, host, port):
|
|
|
|
self.endpoints.append((host, port))
|
|
|
|
return endpoints.HostnameEndpoint(reactor, host, port)
|
|
|
|
|
2016-02-17 18:22:31 +00:00
|
|
|
class PregeneratedCode(ServerBase, ScriptsBase, unittest.TestCase):
|
2015-09-27 17:43:25 +00:00
|
|
|
# we need Twisted to run the server, but we run the sender and receiver
|
|
|
|
# with deferToThread()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
d = self.is_runnable()
|
|
|
|
d.addCallback(lambda _: ServerBase.setUp(self))
|
|
|
|
return d
|
|
|
|
|
2016-02-17 18:22:31 +00:00
|
|
|
@inlineCallbacks
|
2016-02-17 20:22:56 +00:00
|
|
|
def _do_test(self, as_subprocess=False,
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
mode="text", addslash=False, override_filename=False,
|
2017-02-05 03:27:09 +00:00
|
|
|
fake_tor=False, overwrite=False):
|
2017-01-16 22:29:40 +00:00
|
|
|
assert mode in ("text", "file", "empty-file", "directory", "slow-text")
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
if fake_tor:
|
|
|
|
assert not as_subprocess
|
2016-08-16 09:40:47 +00:00
|
|
|
send_cfg = config("send")
|
|
|
|
recv_cfg = config("receive")
|
2016-06-03 22:17:47 +00:00
|
|
|
message = "blah blah blah ponies"
|
2016-02-17 18:22:31 +00:00
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
for cfg in [send_cfg, recv_cfg]:
|
|
|
|
cfg.hide_progress = True
|
|
|
|
cfg.relay_url = self.relayurl
|
|
|
|
cfg.transit_helper = ""
|
|
|
|
cfg.listen = True
|
|
|
|
cfg.code = "1-abc"
|
|
|
|
cfg.stdout = io.StringIO()
|
|
|
|
cfg.stderr = io.StringIO()
|
2015-09-27 01:00:09 +00:00
|
|
|
|
|
|
|
send_dir = self.mktemp()
|
|
|
|
os.mkdir(send_dir)
|
|
|
|
receive_dir = self.mktemp()
|
|
|
|
os.mkdir(receive_dir)
|
2016-02-17 18:22:31 +00:00
|
|
|
|
2017-01-16 22:29:40 +00:00
|
|
|
if mode in ("text", "slow-text"):
|
2016-06-03 22:17:47 +00:00
|
|
|
send_cfg.text = message
|
2016-02-17 18:22:31 +00:00
|
|
|
|
2017-01-16 22:29:40 +00:00
|
|
|
elif mode in ("file", "empty-file"):
|
|
|
|
if mode == "empty-file":
|
|
|
|
message = ""
|
2016-02-17 18:22:31 +00:00
|
|
|
send_filename = "testfile"
|
|
|
|
with open(os.path.join(send_dir, send_filename), "w") as f:
|
|
|
|
f.write(message)
|
2016-06-03 22:17:47 +00:00
|
|
|
send_cfg.what = send_filename
|
2016-02-17 18:22:31 +00:00
|
|
|
receive_filename = send_filename
|
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
recv_cfg.accept_file = True
|
2016-02-17 18:22:31 +00:00
|
|
|
if override_filename:
|
2016-06-03 22:17:47 +00:00
|
|
|
recv_cfg.output_file = receive_filename = "outfile"
|
2017-02-05 03:27:09 +00:00
|
|
|
if overwrite:
|
|
|
|
recv_cfg.output_file = receive_filename
|
|
|
|
existing_file = os.path.join(receive_dir, receive_filename)
|
|
|
|
with open(existing_file, 'w') as f:
|
|
|
|
f.write('pls overwrite me')
|
2016-02-17 18:22:31 +00:00
|
|
|
|
|
|
|
elif mode == "directory":
|
|
|
|
# $send_dir/
|
|
|
|
# $send_dir/middle/
|
|
|
|
# $send_dir/middle/$dirname/
|
|
|
|
# $send_dir/middle/$dirname/[12345]
|
|
|
|
# cd $send_dir && wormhole send middle/$dirname
|
|
|
|
# cd $receive_dir && wormhole receive
|
|
|
|
# expect: $receive_dir/$dirname/[12345]
|
|
|
|
|
|
|
|
send_dirname = "testdir"
|
|
|
|
def message(i):
|
|
|
|
return "test message %d\n" % i
|
|
|
|
os.mkdir(os.path.join(send_dir, "middle"))
|
|
|
|
source_dir = os.path.join(send_dir, "middle", send_dirname)
|
|
|
|
os.mkdir(source_dir)
|
2016-06-03 23:04:12 +00:00
|
|
|
modes = {}
|
2016-02-17 18:22:31 +00:00
|
|
|
for i in range(5):
|
2016-06-03 23:04:12 +00:00
|
|
|
path = os.path.join(source_dir, str(i))
|
|
|
|
with open(path, "w") as f:
|
2016-02-17 18:22:31 +00:00
|
|
|
f.write(message(i))
|
2016-06-03 23:04:12 +00:00
|
|
|
if i == 3:
|
|
|
|
os.chmod(path, 0o755)
|
|
|
|
modes[i] = stat.S_IMODE(os.stat(path).st_mode)
|
2016-03-24 15:46:29 +00:00
|
|
|
send_dirname_arg = os.path.join("middle", send_dirname)
|
|
|
|
if addslash:
|
|
|
|
send_dirname_arg += os.sep
|
2016-06-03 22:17:47 +00:00
|
|
|
send_cfg.what = send_dirname_arg
|
2016-02-17 18:22:31 +00:00
|
|
|
receive_dirname = send_dirname
|
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
recv_cfg.accept_file = True
|
2016-02-17 18:22:31 +00:00
|
|
|
if override_filename:
|
2016-06-03 22:17:47 +00:00
|
|
|
recv_cfg.output_file = receive_dirname = "outdir"
|
2017-02-05 03:27:09 +00:00
|
|
|
if overwrite:
|
|
|
|
recv_cfg.output_file = receive_dirname
|
|
|
|
os.mkdir(os.path.join(receive_dir, receive_dirname))
|
2015-11-29 07:40:25 +00:00
|
|
|
|
2016-02-17 20:22:56 +00:00
|
|
|
if as_subprocess:
|
|
|
|
wormhole_bin = self.find_executable()
|
2016-06-03 22:17:47 +00:00
|
|
|
if send_cfg.text:
|
|
|
|
content_args = ['--text', send_cfg.text]
|
|
|
|
elif send_cfg.what:
|
|
|
|
content_args = [send_cfg.what]
|
|
|
|
|
|
|
|
send_args = [
|
|
|
|
'--relay-url', self.relayurl,
|
|
|
|
'--transit-helper', '',
|
|
|
|
'send',
|
2016-07-28 00:52:21 +00:00
|
|
|
'--hide-progress',
|
2016-06-03 22:17:47 +00:00
|
|
|
'--code', send_cfg.code,
|
|
|
|
] + content_args
|
|
|
|
|
|
|
|
send_d = getProcessOutputAndValue(
|
|
|
|
wormhole_bin, send_args,
|
|
|
|
path=send_dir,
|
2016-06-23 02:28:17 +00:00
|
|
|
env=dict(LC_ALL="en_US.UTF-8", LANG="en_US.UTF-8"),
|
2016-06-03 22:17:47 +00:00
|
|
|
)
|
|
|
|
recv_args = [
|
|
|
|
'--relay-url', self.relayurl,
|
|
|
|
'--transit-helper', '',
|
|
|
|
'receive',
|
2016-07-28 00:52:21 +00:00
|
|
|
'--hide-progress',
|
2016-06-03 22:17:47 +00:00
|
|
|
'--accept-file',
|
|
|
|
recv_cfg.code,
|
|
|
|
]
|
|
|
|
if override_filename:
|
|
|
|
recv_args.extend(['-o', receive_filename])
|
|
|
|
|
|
|
|
receive_d = getProcessOutputAndValue(
|
|
|
|
wormhole_bin, recv_args,
|
|
|
|
path=receive_dir,
|
2016-06-23 02:28:17 +00:00
|
|
|
env=dict(LC_ALL="en_US.UTF-8", LANG="en_US.UTF-8"),
|
2016-06-03 22:17:47 +00:00
|
|
|
)
|
|
|
|
|
2016-04-26 00:11:52 +00:00
|
|
|
(send_res, receive_res) = yield gatherResults([send_d, receive_d],
|
|
|
|
True)
|
2016-02-17 20:22:56 +00:00
|
|
|
send_stdout = send_res[0].decode("utf-8")
|
|
|
|
send_stderr = send_res[1].decode("utf-8")
|
|
|
|
send_rc = send_res[2]
|
|
|
|
receive_stdout = receive_res[0].decode("utf-8")
|
|
|
|
receive_stderr = receive_res[1].decode("utf-8")
|
|
|
|
receive_rc = receive_res[2]
|
2016-02-27 22:46:38 +00:00
|
|
|
NL = os.linesep
|
2016-04-26 00:11:52 +00:00
|
|
|
self.assertEqual((send_rc, receive_rc), (0, 0),
|
|
|
|
(send_res, receive_res))
|
2016-02-17 20:22:56 +00:00
|
|
|
else:
|
2016-06-03 22:17:47 +00:00
|
|
|
send_cfg.cwd = send_dir
|
|
|
|
recv_cfg.cwd = receive_dir
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
|
|
|
|
if fake_tor:
|
|
|
|
send_cfg.tor = True
|
|
|
|
send_cfg.transit_helper = self.transit
|
|
|
|
tx_tm = FakeTorManager()
|
|
|
|
with mock.patch("wormhole.tor_manager.TorManager",
|
|
|
|
return_value=tx_tm,
|
|
|
|
) as mtx_tm:
|
|
|
|
send_d = cmd_send.send(send_cfg)
|
|
|
|
|
|
|
|
recv_cfg.tor = True
|
|
|
|
recv_cfg.transit_helper = self.transit
|
|
|
|
rx_tm = FakeTorManager()
|
|
|
|
with mock.patch("wormhole.tor_manager.TorManager",
|
|
|
|
return_value=rx_tm,
|
|
|
|
) as mrx_tm:
|
|
|
|
receive_d = cmd_receive.receive(recv_cfg)
|
|
|
|
else:
|
|
|
|
send_d = cmd_send.send(send_cfg)
|
|
|
|
receive_d = cmd_receive.receive(recv_cfg)
|
2016-02-17 20:22:56 +00:00
|
|
|
|
2016-03-02 00:57:57 +00:00
|
|
|
# The sender might fail, leaving the receiver hanging, or vice
|
2016-04-26 00:11:52 +00:00
|
|
|
# versa. Make sure we don't wait on one side exclusively
|
2016-12-16 09:33:45 +00:00
|
|
|
if mode == "slow-text":
|
2016-06-18 05:03:58 +00:00
|
|
|
with mock.patch.object(cmd_send, "VERIFY_TIMER", 0), \
|
|
|
|
mock.patch.object(cmd_receive, "VERIFY_TIMER", 0):
|
|
|
|
yield gatherResults([send_d, receive_d], True)
|
|
|
|
else:
|
|
|
|
yield gatherResults([send_d, receive_d], True)
|
|
|
|
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
if fake_tor:
|
|
|
|
expected_endpoints = [("127.0.0.1", self.relayport)]
|
|
|
|
if mode in ("file", "directory"):
|
|
|
|
expected_endpoints.append(("127.0.0.1", self.transitport))
|
|
|
|
tx_timing = mtx_tm.call_args[1]["timing"]
|
|
|
|
self.assertEqual(tx_tm.endpoints, expected_endpoints)
|
|
|
|
self.assertEqual(mtx_tm.mock_calls,
|
|
|
|
[mock.call(reactor, False, None,
|
|
|
|
timing=tx_timing)])
|
|
|
|
rx_timing = mrx_tm.call_args[1]["timing"]
|
|
|
|
self.assertEqual(rx_tm.endpoints, expected_endpoints)
|
|
|
|
self.assertEqual(mrx_tm.mock_calls,
|
|
|
|
[mock.call(reactor, False, None,
|
|
|
|
timing=rx_timing)])
|
2016-04-26 00:11:52 +00:00
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
send_stdout = send_cfg.stdout.getvalue()
|
|
|
|
send_stderr = send_cfg.stderr.getvalue()
|
|
|
|
receive_stdout = recv_cfg.stdout.getvalue()
|
|
|
|
receive_stderr = recv_cfg.stderr.getvalue()
|
2016-02-17 18:22:31 +00:00
|
|
|
|
2016-02-27 22:46:38 +00:00
|
|
|
# all output here comes from a StringIO, which uses \n for
|
|
|
|
# newlines, even if we're on windows
|
|
|
|
NL = "\n"
|
|
|
|
|
2016-02-17 18:22:31 +00:00
|
|
|
self.maxDiff = None # show full output for assertion failures
|
|
|
|
|
2016-12-24 05:03:32 +00:00
|
|
|
key_established = ""
|
|
|
|
if mode == "slow-text":
|
|
|
|
key_established = "Key established, waiting for confirmation...\n"
|
|
|
|
|
|
|
|
self.assertEqual(send_stdout, "")
|
2016-02-18 01:22:54 +00:00
|
|
|
|
|
|
|
# check sender
|
2016-12-16 09:33:45 +00:00
|
|
|
if mode == "text" or mode == "slow-text":
|
2016-11-17 16:36:00 +00:00
|
|
|
expected = ("Sending text message ({bytes:d} Bytes){NL}"
|
2016-02-17 18:22:31 +00:00
|
|
|
"On the other computer, please run: "
|
2016-02-27 22:46:38 +00:00
|
|
|
"wormhole receive{NL}"
|
|
|
|
"Wormhole code is: {code}{NL}{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
"{KE}"
|
2016-02-27 22:46:38 +00:00
|
|
|
"text message sent{NL}").format(bytes=len(message),
|
2016-06-03 22:17:47 +00:00
|
|
|
code=send_cfg.code,
|
2016-12-24 05:03:32 +00:00
|
|
|
NL=NL,
|
|
|
|
KE=key_established)
|
|
|
|
self.failUnlessEqual(send_stderr, expected)
|
2016-02-17 18:22:31 +00:00
|
|
|
elif mode == "file":
|
2016-11-09 20:14:01 +00:00
|
|
|
self.failUnlessIn("Sending {size:s} file named '{name}'{NL}"
|
2016-11-12 03:01:21 +00:00
|
|
|
.format(size=naturalsize(len(message)),
|
2016-11-09 20:14:01 +00:00
|
|
|
name=send_filename,
|
2016-12-24 05:03:32 +00:00
|
|
|
NL=NL), send_stderr)
|
2015-09-27 01:00:09 +00:00
|
|
|
self.failUnlessIn("On the other computer, please run: "
|
2016-02-27 22:46:38 +00:00
|
|
|
"wormhole receive{NL}"
|
|
|
|
"Wormhole code is: {code}{NL}{NL}"
|
2016-06-03 22:17:47 +00:00
|
|
|
.format(code=send_cfg.code, NL=NL),
|
2016-12-24 05:03:32 +00:00
|
|
|
send_stderr)
|
2016-02-27 22:46:38 +00:00
|
|
|
self.failUnlessIn("File sent.. waiting for confirmation{NL}"
|
|
|
|
"Confirmation received. Transfer complete.{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL), send_stderr)
|
2016-02-17 18:22:31 +00:00
|
|
|
elif mode == "directory":
|
2016-12-24 05:03:32 +00:00
|
|
|
self.failUnlessIn("Sending directory", send_stderr)
|
|
|
|
self.failUnlessIn("named 'testdir'", send_stderr)
|
2015-11-29 07:33:15 +00:00
|
|
|
self.failUnlessIn("On the other computer, please run: "
|
2016-02-27 22:46:38 +00:00
|
|
|
"wormhole receive{NL}"
|
|
|
|
"Wormhole code is: {code}{NL}{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(code=send_cfg.code, NL=NL), send_stderr)
|
2016-02-27 22:46:38 +00:00
|
|
|
self.failUnlessIn("File sent.. waiting for confirmation{NL}"
|
|
|
|
"Confirmation received. Transfer complete.{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL), send_stderr)
|
2016-02-17 18:22:31 +00:00
|
|
|
|
|
|
|
# check receiver
|
2016-12-16 09:33:45 +00:00
|
|
|
if mode == "text" or mode == "slow-text":
|
2016-12-24 05:03:32 +00:00
|
|
|
self.assertEqual(receive_stdout, message+NL)
|
|
|
|
self.assertEqual(receive_stderr, key_established)
|
2016-02-17 18:22:31 +00:00
|
|
|
elif mode == "file":
|
2016-12-24 05:03:32 +00:00
|
|
|
self.failUnlessEqual(receive_stdout, "")
|
2016-11-09 20:14:01 +00:00
|
|
|
self.failUnlessIn("Receiving file ({size:s}) into: {name}"
|
2016-11-12 03:01:21 +00:00
|
|
|
.format(size=naturalsize(len(message)),
|
2016-12-24 05:03:32 +00:00
|
|
|
name=receive_filename), receive_stderr)
|
|
|
|
self.failUnlessIn("Received file written to ", receive_stderr)
|
2016-02-17 18:22:31 +00:00
|
|
|
fn = os.path.join(receive_dir, receive_filename)
|
|
|
|
self.failUnless(os.path.exists(fn))
|
|
|
|
with open(fn, "r") as f:
|
|
|
|
self.failUnlessEqual(f.read(), message)
|
|
|
|
elif mode == "directory":
|
2016-12-24 05:03:32 +00:00
|
|
|
self.failUnlessEqual(receive_stdout, "")
|
2016-11-09 20:14:01 +00:00
|
|
|
want = (r"Receiving directory \(\d+ \w+\) into: {name}/"
|
2016-02-28 08:52:49 +00:00
|
|
|
.format(name=receive_dirname))
|
2016-12-24 05:03:32 +00:00
|
|
|
self.failUnless(re.search(want, receive_stderr),
|
|
|
|
(want, receive_stderr))
|
2016-02-27 22:46:38 +00:00
|
|
|
self.failUnlessIn("Received files written to {name}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(name=receive_dirname), receive_stderr)
|
2016-02-17 18:22:31 +00:00
|
|
|
fn = os.path.join(receive_dir, receive_dirname)
|
2016-02-17 21:19:48 +00:00
|
|
|
self.failUnless(os.path.exists(fn), fn)
|
2015-11-29 07:33:15 +00:00
|
|
|
for i in range(5):
|
2016-02-17 18:22:31 +00:00
|
|
|
fn = os.path.join(receive_dir, receive_dirname, str(i))
|
2015-11-29 07:33:15 +00:00
|
|
|
with open(fn, "r") as f:
|
|
|
|
self.failUnlessEqual(f.read(), message(i))
|
2016-06-03 23:04:12 +00:00
|
|
|
self.failUnlessEqual(modes[i],
|
|
|
|
stat.S_IMODE(os.stat(fn).st_mode))
|
2016-02-18 01:22:54 +00:00
|
|
|
|
2016-06-25 19:31:50 +00:00
|
|
|
# check server stats
|
|
|
|
self._rendezvous.get_stats()
|
|
|
|
|
2016-02-17 18:22:31 +00:00
|
|
|
def test_text(self):
|
|
|
|
return self._do_test()
|
2016-02-17 20:22:56 +00:00
|
|
|
def test_text_subprocess(self):
|
|
|
|
return self._do_test(as_subprocess=True)
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
def test_text_tor(self):
|
|
|
|
return self._do_test(fake_tor=True)
|
2016-02-17 18:22:31 +00:00
|
|
|
|
|
|
|
def test_file(self):
|
|
|
|
return self._do_test(mode="file")
|
|
|
|
def test_file_override(self):
|
|
|
|
return self._do_test(mode="file", override_filename=True)
|
2017-02-05 03:27:09 +00:00
|
|
|
def test_file_overwrite(self):
|
|
|
|
return self._do_test(mode="file", overwrite=True)
|
rewrite Tor support (py2 only)
The new TorManager adds --launch-tor and --tor-control-port= arguments
(requiring the user to explicitly request a new Tor process, if that's what
they want). The default (when --tor is enabled) looks for a control port in
the usual places (/var/run/tor/control, localhost:9051, localhost:9151), then
falls back to hoping there's a SOCKS port in the usual
place (localhost:9050). (closes #64)
The ssh utilities should now accept the same tor arguments as ordinary
send/receive commands. There are now full tests for TorManager, and basic
tests for how send/receive use it. (closes #97)
Note that Tor is only supported on python2.7 for now, since txsocksx (and
therefore txtorcon) doesn't work on py3. You need to do "pip install
magic-wormhole[tor]" to get Tor support, and that will get you an inscrutable
error on py3 (referencing vcversioner, "install_requires must be a string or
list of strings", and "int object not iterable").
To run tests, you must install with the [dev] extra (to get "mock" and other
libraries). Our setup.py only includes "txtorcon" in the [dev] extra when on
py2, not on py3. Unit tests tolerate the lack of txtorcon (they mock out
everything txtorcon would provide), so they should provide the same coverage
on both py2 and py3.
2017-01-16 03:24:23 +00:00
|
|
|
def test_file_tor(self):
|
|
|
|
return self._do_test(mode="file", fake_tor=True)
|
2017-01-16 22:29:40 +00:00
|
|
|
def test_empty_file(self):
|
|
|
|
return self._do_test(mode="empty-file")
|
2016-02-17 18:22:31 +00:00
|
|
|
|
|
|
|
def test_directory(self):
|
|
|
|
return self._do_test(mode="directory")
|
2016-03-24 15:46:29 +00:00
|
|
|
def test_directory_addslash(self):
|
|
|
|
return self._do_test(mode="directory", addslash=True)
|
2016-02-17 18:22:31 +00:00
|
|
|
def test_directory_override(self):
|
|
|
|
return self._do_test(mode="directory", override_filename=True)
|
2017-02-05 03:27:09 +00:00
|
|
|
def test_directory_overwrite(self):
|
|
|
|
return self._do_test(mode="directory", overwrite=True)
|
2016-04-25 23:49:04 +00:00
|
|
|
|
2016-12-16 09:33:45 +00:00
|
|
|
def test_slow_text(self):
|
|
|
|
return self._do_test(mode="slow-text")
|
2016-06-18 05:03:58 +00:00
|
|
|
|
2016-05-26 05:44:18 +00:00
|
|
|
@inlineCallbacks
|
2016-12-10 23:30:51 +00:00
|
|
|
def _do_test_fail(self, mode, failmode):
|
|
|
|
assert mode in ("file", "directory")
|
|
|
|
assert failmode in ("noclobber", "toobig")
|
2016-07-15 04:22:01 +00:00
|
|
|
send_cfg = config("send")
|
|
|
|
recv_cfg = config("receive")
|
2016-06-03 22:17:47 +00:00
|
|
|
|
|
|
|
for cfg in [send_cfg, recv_cfg]:
|
|
|
|
cfg.hide_progress = True
|
|
|
|
cfg.relay_url = self.relayurl
|
|
|
|
cfg.transit_helper = ""
|
|
|
|
cfg.listen = False
|
2016-12-10 23:30:51 +00:00
|
|
|
cfg.code = "1-abc"
|
2016-06-03 22:17:47 +00:00
|
|
|
cfg.stdout = io.StringIO()
|
|
|
|
cfg.stderr = io.StringIO()
|
|
|
|
|
2016-05-26 05:44:18 +00:00
|
|
|
send_dir = self.mktemp()
|
|
|
|
os.mkdir(send_dir)
|
|
|
|
receive_dir = self.mktemp()
|
|
|
|
os.mkdir(receive_dir)
|
2016-12-10 23:30:51 +00:00
|
|
|
recv_cfg.accept_file = True # don't ask for permission
|
2016-05-26 05:44:18 +00:00
|
|
|
|
2016-12-10 23:30:51 +00:00
|
|
|
if mode == "file":
|
|
|
|
message = "test message\n"
|
|
|
|
send_cfg.what = receive_name = send_filename = "testfile"
|
2016-12-11 00:14:54 +00:00
|
|
|
fn = os.path.join(send_dir, send_filename)
|
|
|
|
with open(fn, "w") as f:
|
2016-12-10 23:30:51 +00:00
|
|
|
f.write(message)
|
2016-12-11 00:14:54 +00:00
|
|
|
size = os.stat(fn).st_size
|
2016-12-10 23:30:51 +00:00
|
|
|
|
|
|
|
elif mode == "directory":
|
|
|
|
# $send_dir/
|
|
|
|
# $send_dir/$dirname/
|
|
|
|
# $send_dir/$dirname/[12345]
|
|
|
|
# cd $send_dir && wormhole send $dirname
|
|
|
|
# cd $receive_dir && wormhole receive
|
|
|
|
# expect: $receive_dir/$dirname/[12345]
|
2016-05-26 05:44:18 +00:00
|
|
|
|
2016-12-11 00:14:54 +00:00
|
|
|
size = 0
|
2016-12-10 23:30:51 +00:00
|
|
|
send_cfg.what = receive_name = send_dirname = "testdir"
|
|
|
|
os.mkdir(os.path.join(send_dir, send_dirname))
|
|
|
|
for i in range(5):
|
|
|
|
path = os.path.join(send_dir, send_dirname, str(i))
|
|
|
|
with open(path, "w") as f:
|
|
|
|
f.write("test message %d\n" % i)
|
2016-12-11 00:14:54 +00:00
|
|
|
size += os.stat(path).st_size
|
2016-12-10 23:30:51 +00:00
|
|
|
|
|
|
|
if failmode == "noclobber":
|
|
|
|
PRESERVE = "don't clobber me\n"
|
|
|
|
clobberable = os.path.join(receive_dir, receive_name)
|
|
|
|
with open(clobberable, "w") as f:
|
|
|
|
f.write(PRESERVE)
|
2016-05-26 05:44:18 +00:00
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
send_cfg.cwd = send_dir
|
|
|
|
send_d = cmd_send.send(send_cfg)
|
|
|
|
|
|
|
|
recv_cfg.cwd = receive_dir
|
|
|
|
receive_d = cmd_receive.receive(recv_cfg)
|
2016-05-26 05:44:18 +00:00
|
|
|
|
2016-12-10 23:30:51 +00:00
|
|
|
# both sides will fail
|
|
|
|
if failmode == "noclobber":
|
|
|
|
free_space = 10000000
|
|
|
|
else:
|
|
|
|
free_space = 0
|
|
|
|
with mock.patch("wormhole.cli.cmd_receive.estimate_free_space",
|
|
|
|
return_value=free_space):
|
|
|
|
f = yield self.assertFailure(send_d, TransferError)
|
|
|
|
self.assertEqual(str(f), "remote error, transfer abandoned: transfer rejected")
|
|
|
|
f = yield self.assertFailure(receive_d, TransferError)
|
|
|
|
self.assertEqual(str(f), "transfer rejected")
|
2016-05-26 05:44:18 +00:00
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
send_stdout = send_cfg.stdout.getvalue()
|
|
|
|
send_stderr = send_cfg.stderr.getvalue()
|
|
|
|
receive_stdout = recv_cfg.stdout.getvalue()
|
|
|
|
receive_stderr = recv_cfg.stderr.getvalue()
|
2016-05-26 05:44:18 +00:00
|
|
|
|
|
|
|
# all output here comes from a StringIO, which uses \n for
|
|
|
|
# newlines, even if we're on windows
|
|
|
|
NL = "\n"
|
|
|
|
|
|
|
|
self.maxDiff = None # show full output for assertion failures
|
|
|
|
|
2016-12-24 05:03:32 +00:00
|
|
|
self.assertEqual(send_stdout, "")
|
|
|
|
self.assertEqual(receive_stdout, "")
|
2016-05-26 05:44:18 +00:00
|
|
|
|
|
|
|
# check sender
|
2016-12-10 23:30:51 +00:00
|
|
|
if mode == "file":
|
|
|
|
self.failUnlessIn("Sending {size:s} file named '{name}'{NL}"
|
2016-12-11 00:14:54 +00:00
|
|
|
.format(size=naturalsize(size),
|
2016-12-10 23:30:51 +00:00
|
|
|
name=send_filename,
|
2016-12-24 05:03:32 +00:00
|
|
|
NL=NL), send_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
self.failUnlessIn("On the other computer, please run: "
|
|
|
|
"wormhole receive{NL}"
|
|
|
|
"Wormhole code is: {code}{NL}{NL}"
|
|
|
|
.format(code=send_cfg.code, NL=NL),
|
2016-12-24 05:03:32 +00:00
|
|
|
send_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
self.failIfIn("File sent.. waiting for confirmation{NL}"
|
|
|
|
"Confirmation received. Transfer complete.{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL), send_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
elif mode == "directory":
|
2016-12-24 05:03:32 +00:00
|
|
|
self.failUnlessIn("Sending directory", send_stderr)
|
|
|
|
self.failUnlessIn("named 'testdir'", send_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
self.failUnlessIn("On the other computer, please run: "
|
|
|
|
"wormhole receive{NL}"
|
|
|
|
"Wormhole code is: {code}{NL}{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(code=send_cfg.code, NL=NL), send_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
self.failIfIn("File sent.. waiting for confirmation{NL}"
|
|
|
|
"Confirmation received. Transfer complete.{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL), send_stderr)
|
2016-05-26 05:44:18 +00:00
|
|
|
|
|
|
|
# check receiver
|
2016-12-10 23:30:51 +00:00
|
|
|
if mode == "file":
|
2016-12-24 05:03:32 +00:00
|
|
|
self.failIfIn("Received file written to ", receive_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
if failmode == "noclobber":
|
|
|
|
self.failUnlessIn("Error: "
|
|
|
|
"refusing to overwrite existing 'testfile'{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL), receive_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
else:
|
|
|
|
self.failUnlessIn("Error: "
|
2016-12-11 00:14:54 +00:00
|
|
|
"insufficient free space (0B) for file ({size:d}B){NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL, size=size), receive_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
elif mode == "directory":
|
|
|
|
self.failIfIn("Received files written to {name}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(name=receive_name), receive_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
#want = (r"Receiving directory \(\d+ \w+\) into: {name}/"
|
|
|
|
# .format(name=receive_name))
|
2016-12-24 05:03:32 +00:00
|
|
|
#self.failUnless(re.search(want, receive_stderr),
|
|
|
|
# (want, receive_stderr))
|
2016-12-10 23:30:51 +00:00
|
|
|
if failmode == "noclobber":
|
|
|
|
self.failUnlessIn("Error: "
|
|
|
|
"refusing to overwrite existing 'testdir'{NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL), receive_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
else:
|
|
|
|
self.failUnlessIn("Error: "
|
2016-12-11 00:14:54 +00:00
|
|
|
"insufficient free space (0B) for directory ({size:d}B){NL}"
|
2016-12-24 05:03:32 +00:00
|
|
|
.format(NL=NL, size=size), receive_stderr)
|
2016-12-10 23:30:51 +00:00
|
|
|
|
|
|
|
if failmode == "noclobber":
|
|
|
|
fn = os.path.join(receive_dir, receive_name)
|
|
|
|
self.failUnless(os.path.exists(fn))
|
|
|
|
with open(fn, "r") as f:
|
|
|
|
self.failUnlessEqual(f.read(), PRESERVE)
|
|
|
|
|
|
|
|
# check server stats
|
|
|
|
self._rendezvous.get_stats()
|
|
|
|
|
|
|
|
def test_fail_file_noclobber(self):
|
|
|
|
return self._do_test_fail("file", "noclobber")
|
|
|
|
def test_fail_directory_noclobber(self):
|
|
|
|
return self._do_test_fail("directory", "noclobber")
|
|
|
|
def test_fail_file_toobig(self):
|
|
|
|
return self._do_test_fail("file", "toobig")
|
|
|
|
def test_fail_directory_toobig(self):
|
|
|
|
return self._do_test_fail("directory", "toobig")
|
2016-05-26 05:44:18 +00:00
|
|
|
|
2016-05-26 22:37:24 +00:00
|
|
|
class NotWelcome(ServerBase, unittest.TestCase):
|
|
|
|
def setUp(self):
|
2016-06-04 21:03:05 +00:00
|
|
|
self._setup_relay(error="please upgrade XYZ")
|
2016-07-15 04:22:01 +00:00
|
|
|
self.cfg = cfg = config("send")
|
2016-06-03 22:17:47 +00:00
|
|
|
cfg.hide_progress = True
|
|
|
|
cfg.listen = False
|
|
|
|
cfg.relay_url = self.relayurl
|
|
|
|
cfg.transit_helper = ""
|
|
|
|
cfg.stdout = io.StringIO()
|
|
|
|
cfg.stderr = io.StringIO()
|
2016-05-26 22:37:24 +00:00
|
|
|
|
|
|
|
@inlineCallbacks
|
|
|
|
def test_sender(self):
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.text = "hi"
|
|
|
|
self.cfg.code = "1-abc"
|
|
|
|
|
|
|
|
send_d = cmd_send.send(self.cfg)
|
2016-05-26 22:37:24 +00:00
|
|
|
f = yield self.assertFailure(send_d, WelcomeError)
|
|
|
|
self.assertEqual(str(f), "please upgrade XYZ")
|
|
|
|
|
|
|
|
@inlineCallbacks
|
|
|
|
def test_receiver(self):
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.code = "1-abc"
|
|
|
|
|
|
|
|
receive_d = cmd_receive.receive(self.cfg)
|
2016-05-26 22:37:24 +00:00
|
|
|
f = yield self.assertFailure(receive_d, WelcomeError)
|
|
|
|
self.assertEqual(str(f), "please upgrade XYZ")
|
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
|
2016-04-25 23:49:04 +00:00
|
|
|
class Cleanup(ServerBase, unittest.TestCase):
|
2016-06-03 22:17:47 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
d = super(Cleanup, self).setUp()
|
2016-07-15 04:22:01 +00:00
|
|
|
self.cfg = cfg = config("send")
|
2016-06-03 22:17:47 +00:00
|
|
|
# common options for all tests in this suite
|
|
|
|
cfg.hide_progress = True
|
|
|
|
cfg.relay_url = self.relayurl
|
|
|
|
cfg.transit_helper = ""
|
|
|
|
cfg.stdout = io.StringIO()
|
|
|
|
cfg.stderr = io.StringIO()
|
|
|
|
return d
|
|
|
|
|
2016-04-25 23:49:04 +00:00
|
|
|
@inlineCallbacks
|
2016-06-03 22:17:47 +00:00
|
|
|
@mock.patch('sys.stdout')
|
|
|
|
def test_text(self, stdout):
|
2016-04-25 23:49:04 +00:00
|
|
|
# the rendezvous channel should be deleted after success
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.text = "hello"
|
|
|
|
self.cfg.code = "1-abc"
|
2016-04-25 23:49:04 +00:00
|
|
|
|
2016-06-03 22:17:47 +00:00
|
|
|
send_d = cmd_send.send(self.cfg)
|
|
|
|
receive_d = cmd_receive.receive(self.cfg)
|
|
|
|
|
2016-04-25 23:49:04 +00:00
|
|
|
yield send_d
|
|
|
|
yield receive_d
|
|
|
|
|
2016-05-24 07:00:44 +00:00
|
|
|
cids = self._rendezvous.get_app(cmd_send.APPID).get_nameplate_ids()
|
2016-04-25 23:49:04 +00:00
|
|
|
self.assertEqual(len(cids), 0)
|
|
|
|
|
|
|
|
@inlineCallbacks
|
|
|
|
def test_text_wrong_password(self):
|
|
|
|
# if the password was wrong, the rendezvous channel should still be
|
|
|
|
# deleted
|
2016-06-03 22:17:47 +00:00
|
|
|
self.cfg.text = "secret message"
|
|
|
|
self.cfg.code = "1-abc"
|
|
|
|
send_d = cmd_send.send(self.cfg)
|
|
|
|
|
|
|
|
self.cfg.code = "1-WRONG"
|
|
|
|
receive_d = cmd_receive.receive(self.cfg)
|
2016-04-25 23:49:04 +00:00
|
|
|
|
|
|
|
# both sides should be capable of detecting the mismatch
|
|
|
|
yield self.assertFailure(send_d, WrongPasswordError)
|
|
|
|
yield self.assertFailure(receive_d, WrongPasswordError)
|
|
|
|
|
2016-05-24 07:00:44 +00:00
|
|
|
cids = self._rendezvous.get_app(cmd_send.APPID).get_nameplate_ids()
|
2016-04-25 23:49:04 +00:00
|
|
|
self.assertEqual(len(cids), 0)
|
2016-05-24 07:00:44 +00:00
|
|
|
self.flushLoggedErrors(WrongPasswordError)
|
2016-04-25 23:49:04 +00:00
|
|
|
|
2016-06-03 22:38:49 +00:00
|
|
|
class ExtractFile(unittest.TestCase):
|
|
|
|
def test_filenames(self):
|
|
|
|
args = mock.Mock()
|
2016-06-04 21:03:05 +00:00
|
|
|
args.relay_url = ""
|
2016-06-03 22:38:49 +00:00
|
|
|
ef = cmd_receive.TwistedReceiver(args)._extract_file
|
|
|
|
extract_dir = os.path.abspath(self.mktemp())
|
|
|
|
|
|
|
|
zf = mock.Mock()
|
|
|
|
zi = mock.Mock()
|
|
|
|
zi.filename = "ok"
|
|
|
|
zi.external_attr = 5 << 16
|
|
|
|
expected = os.path.join(extract_dir, "ok")
|
|
|
|
with mock.patch.object(cmd_receive.os, "chmod") as chmod:
|
|
|
|
ef(zf, zi, extract_dir)
|
|
|
|
self.assertEqual(zf.extract.mock_calls,
|
|
|
|
[mock.call(zi.filename, path=extract_dir)])
|
|
|
|
self.assertEqual(chmod.mock_calls, [mock.call(expected, 5)])
|
|
|
|
|
|
|
|
zf = mock.Mock()
|
|
|
|
zi = mock.Mock()
|
|
|
|
zi.filename = "../haha"
|
|
|
|
e = self.assertRaises(ValueError, ef, zf, zi, extract_dir)
|
|
|
|
self.assertIn("malicious zipfile", str(e))
|
|
|
|
|
|
|
|
zf = mock.Mock()
|
|
|
|
zi = mock.Mock()
|
|
|
|
zi.filename = "haha//root" # abspath squashes this, hopefully zipfile
|
|
|
|
# does too
|
|
|
|
zi.external_attr = 5 << 16
|
2016-06-03 23:43:22 +00:00
|
|
|
expected = os.path.join(extract_dir, "haha", "root")
|
2016-06-03 22:38:49 +00:00
|
|
|
with mock.patch.object(cmd_receive.os, "chmod") as chmod:
|
|
|
|
ef(zf, zi, extract_dir)
|
|
|
|
self.assertEqual(zf.extract.mock_calls,
|
|
|
|
[mock.call(zi.filename, path=extract_dir)])
|
|
|
|
self.assertEqual(chmod.mock_calls, [mock.call(expected, 5)])
|
|
|
|
|
|
|
|
zf = mock.Mock()
|
|
|
|
zi = mock.Mock()
|
|
|
|
zi.filename = "/etc/passwd"
|
|
|
|
e = self.assertRaises(ValueError, ef, zf, zi, extract_dir)
|
|
|
|
self.assertIn("malicious zipfile", str(e))
|
2016-12-22 20:44:13 +00:00
|
|
|
|
|
|
|
class AppID(ServerBase, unittest.TestCase):
|
|
|
|
def setUp(self):
|
|
|
|
d = super(AppID, self).setUp()
|
|
|
|
self.cfg = cfg = config("send")
|
|
|
|
# common options for all tests in this suite
|
|
|
|
cfg.hide_progress = True
|
|
|
|
cfg.relay_url = self.relayurl
|
|
|
|
cfg.transit_helper = ""
|
|
|
|
cfg.stdout = io.StringIO()
|
|
|
|
cfg.stderr = io.StringIO()
|
|
|
|
return d
|
|
|
|
|
|
|
|
@inlineCallbacks
|
|
|
|
def test_override(self):
|
|
|
|
# make sure we use the overridden appid, not the default
|
|
|
|
self.cfg.text = "hello"
|
|
|
|
self.cfg.appid = "appid2"
|
|
|
|
self.cfg.code = "1-abc"
|
|
|
|
|
|
|
|
send_d = cmd_send.send(self.cfg)
|
|
|
|
receive_d = cmd_receive.receive(self.cfg)
|
|
|
|
|
|
|
|
yield send_d
|
|
|
|
yield receive_d
|
|
|
|
|
|
|
|
used = self._rendezvous._db.execute("SELECT DISTINCT `app_id`"
|
|
|
|
" FROM `nameplate_usage`"
|
|
|
|
).fetchall()
|
|
|
|
self.assertEqual(len(used), 1, used)
|
|
|
|
self.assertEqual(used[0]["app_id"], u"appid2")
|