summaryrefslogtreecommitdiff
path: root/xS/main_test.go
diff options
context:
space:
mode:
authorPřemysl Eric Janouch <p@janouch.name>2022-09-26 12:26:49 +0200
committerPřemysl Eric Janouch <p@janouch.name>2022-09-26 12:41:47 +0200
commitf891e5ca638ead13485cc490320e74d698641623 (patch)
tree50c063589ed2b5aba130e87149c97f9ed487911b /xS/main_test.go
parent4d50ed111ad4f3172c4c186a2ca19b638c709a70 (diff)
parent8344b09c4f9989370691c71b1145b09348e0a6d3 (diff)
downloadxK-f891e5ca638ead13485cc490320e74d698641623.tar.gz
xK-f891e5ca638ead13485cc490320e74d698641623.tar.xz
xK-f891e5ca638ead13485cc490320e74d698641623.zip
Merge hid IRCd from haven as xS
Given that this project already contains a Go binary, it only makes sense to put the IRCds back together.
Diffstat (limited to 'xS/main_test.go')
-rw-r--r--xS/main_test.go168
1 files changed, 168 insertions, 0 deletions
diff --git a/xS/main_test.go b/xS/main_test.go
new file mode 100644
index 0000000..8241b4e
--- /dev/null
+++ b/xS/main_test.go
@@ -0,0 +1,168 @@
+//
+// Copyright (c) 2015 - 2018, Přemysl Eric Janouch <p@janouch.name>
+//
+// Permission to use, copy, modify, and/or distribute this software for any
+// purpose with or without fee is hereby granted.
+//
+// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
+// SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
+// OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
+// CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
+//
+
+package main
+
+import (
+ "crypto/tls"
+ "net"
+ "os"
+ "reflect"
+ "syscall"
+ "testing"
+)
+
+func TestSplitString(t *testing.T) {
+ var splitStringTests = []struct {
+ s, delims string
+ ignoreEmpty bool
+ result []string
+ }{
+ {",a,,bc", ",", false, []string{"", "a", "", "bc"}},
+ {",a,,bc", ",", true, []string{"a", "bc"}},
+ {"a,;bc,", ",;", false, []string{"a", "", "bc", ""}},
+ {"a,;bc,", ",;", true, []string{"a", "bc"}},
+ {"", ",", false, []string{""}},
+ {"", ",", true, nil},
+ }
+
+ for i, d := range splitStringTests {
+ got := splitString(d.s, d.delims, d.ignoreEmpty)
+ if !reflect.DeepEqual(got, d.result) {
+ t.Errorf("case %d: %v should be %v\n", i, got, d.result)
+ }
+ }
+}
+
+func socketpair() (*os.File, *os.File, error) {
+ pair, err := syscall.Socketpair(syscall.AF_UNIX, syscall.SOCK_STREAM, 0)
+ if err != nil {
+ return nil, nil, err
+ }
+
+ // See go #24331, this makes 1.11 use the internal poller
+ // while there wasn't a way to achieve that before.
+ if err := syscall.SetNonblock(int(pair[0]), true); err != nil {
+ return nil, nil, err
+ }
+ if err := syscall.SetNonblock(int(pair[1]), true); err != nil {
+ return nil, nil, err
+ }
+
+ fa := os.NewFile(uintptr(pair[0]), "a")
+ if fa == nil {
+ return nil, nil, os.ErrInvalid
+ }
+
+ fb := os.NewFile(uintptr(pair[1]), "b")
+ if fb == nil {
+ fa.Close()
+ return nil, nil, os.ErrInvalid
+ }
+
+ return fa, fb, nil
+}
+
+func TestDetectTLS(t *testing.T) {
+ detectTLSFromFunc := func(t *testing.T, writer func(net.Conn)) bool {
+ // net.Pipe doesn't use file descriptors, we need a socketpair.
+ sockA, sockB, err := socketpair()
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer sockA.Close()
+ defer sockB.Close()
+
+ fcB, err := net.FileConn(sockB)
+ if err != nil {
+ t.Fatal(err)
+ }
+ go writer(fcB)
+
+ fcA, err := net.FileConn(sockA)
+ if err != nil {
+ t.Fatal(err)
+ }
+ sc, err := fcA.(syscall.Conn).SyscallConn()
+ if err != nil {
+ t.Fatal(err)
+ }
+ return detectTLS(sc)
+ }
+
+ t.Run("SSL_2.0", func(t *testing.T) {
+ if !detectTLSFromFunc(t, func(fc net.Conn) {
+ // The obsolete, useless, unsupported SSL 2.0 record format.
+ _, _ = fc.Write([]byte{0x80, 0x01, 0x01})
+ }) {
+ t.Error("could not detect SSL")
+ }
+ })
+ t.Run("crypto_tls", func(t *testing.T) {
+ if !detectTLSFromFunc(t, func(fc net.Conn) {
+ conn := tls.Client(fc, &tls.Config{InsecureSkipVerify: true})
+ _ = conn.Handshake()
+ }) {
+ t.Error("could not detect TLS")
+ }
+ })
+ t.Run("text", func(t *testing.T) {
+ if detectTLSFromFunc(t, func(fc net.Conn) {
+ _, _ = fc.Write([]byte("ПРЕВЕД"))
+ }) {
+ t.Error("detected UTF-8 as TLS")
+ }
+ })
+ t.Run("EOF", func(t *testing.T) {
+ type connCloseWriter interface {
+ net.Conn
+ CloseWrite() error
+ }
+ if detectTLSFromFunc(t, func(fc net.Conn) {
+ _ = fc.(connCloseWriter).CloseWrite()
+ }) {
+ t.Error("detected EOF as TLS")
+ }
+ })
+}
+
+func TestIRC(t *testing.T) {
+ msg := ircParseMessage(
+ `@first=a\:\s\r\n\\;2nd :srv hi there :good m8 :how are you?`)
+
+ if !reflect.DeepEqual(msg.tags, map[string]string{
+ "first": "a; \r\n\\",
+ "2nd": "",
+ }) {
+ t.Error("tags parsed incorrectly")
+ }
+
+ if msg.nick != "srv" || msg.user != "" || msg.host != "" {
+ t.Error("server name parsed incorrectly")
+ }
+ if msg.command != "hi" {
+ t.Error("command name parsed incorrectly")
+ }
+ if !reflect.DeepEqual(msg.params,
+ []string{"there", "good m8 :how are you?"}) {
+ t.Error("params parsed incorrectly")
+ }
+
+ if !ircEqual("[fag]^", "{FAG}~") {
+ t.Error("string case comparison not according to RFC 2812")
+ }
+
+ // TODO: More tests.
+}