def test_udpsession_response_wrong_transaction_id(self):
     session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5)
     session.scraper = FakeScraper()
     self.assertFalse(session.is_failed)
     packet = struct.pack("!ii", 0, 1337)
     session.handle_response(packet)
     self.assertTrue(session.is_failed)
 def test_udpsession_response_too_short(self):
     session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5)
     session.scraper = FakeScraper()
     self.assertFalse(session.is_failed)
     packet = struct.pack("!i", 123)
     session.handle_response(packet)
     self.assertTrue(session.is_failed)
Exemple #3
0
 def test_udpsession_udp_tracker_timeout(self):
     session = UdpTrackerSession("localhost", ("localhost", 4782),
                                 "/announce", 5)
     session.scraper = ClockedUDPCrawler(session, "127.0.0.1", 4782, 5)
     # Advance 16 seconds so the timeout triggered
     session.scraper._reactor.advance(session.scraper.timeout + 1)
     self.assertFalse(session.scraper.timeout_call.active(),
                      "timeout was active while should've canceled")
Exemple #4
0
 def test_udpsession_udp_tracker_connection_refused(self):
     session = UdpTrackerSession("localhost", ("localhost", 4782),
                                 "/announce", 5)
     session.scraper = UDPScraper(session, "127.0.0.1", 4782, 5)
     session.scraper.connectionRefused()
     self.assertTrue(session.is_failed,
                     "Session did not fail while it should")
     return session.scraper.stop()
 def test_udpsession_on_error(self):
     test_deferred = Deferred()
     session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5)
     session.result_deferred = Deferred().addErrback(
         lambda failure: test_deferred.callback(failure.getErrorMessage()))
     session.scraper = FakeScraper()
     session.on_error(Failure(RuntimeError("test")))
     return test_deferred
 def test_udpsession_handle_packet(self):
     session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5)
     session.scraper = FakeScraper()
     session._action = 123
     session._transaction_id = 124
     self.assertFalse(session.is_failed)
     packet = struct.pack("!iiq", 123, 124, 126)
     session.handle_connection_response(packet)
     self.assertFalse(session.is_failed)
 def test_udpsession_mismatch(self):
     session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5)
     session.scraper = FakeScraper()
     session._action = 123
     session._transaction_id = 124
     session._infohash_list = [1337]
     self.assertFalse(session.is_failed)
     packet = struct.pack("!ii", 123, 124)
     session.handle_response(packet)
     self.assertTrue(session.is_failed)
    def test_udpsession_response_list_len_mismatch(self):
        session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5)
        session.scraper = FakeScraper()
        session.result_deferred = Deferred()

        def on_error(_):
            pass

        session.result_deferred.addErrback(on_error)
        session._action = 123
        session._transaction_id = 123
        self.assertFalse(session.is_failed)
        session._infohash_list = ["test", "test2"]
        packet = struct.pack("!iiiii", 123, 123, 0, 1, 2)
        session.handle_response(packet)
        self.assertTrue(session.is_failed)
 def test_udpsession_udp_tracker_timeout(self):
     session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5)
     session.scraper = ClockedUDPCrawler(session, "127.0.0.1", 4782, 5)
     # Advance 16 seconds so the timeout triggered
     session.scraper._reactor.advance(session.scraper.timeout + 1)
     self.assertIsNone(session.scraper)