def test_udpsession_response_wrong_transaction_id(self): session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5) session.scraper = FakeScraper() self.assertFalse(session.is_failed) packet = struct.pack("!ii", 0, 1337) session.handle_response(packet) self.assertTrue(session.is_failed)
def test_udpsession_response_too_short(self): session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5) session.scraper = FakeScraper() self.assertFalse(session.is_failed) packet = struct.pack("!i", 123) session.handle_response(packet) self.assertTrue(session.is_failed)
def test_udpsession_correct_handle(self): session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5) session.on_ip_address_resolved("127.0.0.1", start_scraper=False) session.result_deferred = Deferred() self.assertFalse(session.is_failed) session._infohash_list = ["test"] packet = struct.pack("!iiiii", session._action, session._transaction_id, 0, 1, 2) session.handle_response(packet) return session.result_deferred.addCallback(lambda *_: session.cleanup())
def test_udpsession_mismatch(self): session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5) session.scraper = FakeScraper() session._action = 123 session._transaction_id = 124 session._infohash_list = [1337] self.assertFalse(session.is_failed) packet = struct.pack("!ii", 123, 124) session.handle_response(packet) self.assertTrue(session.is_failed)
def test_big_correct_run(self): session = UdpTrackerSession("localhost", ("192.168.1.1", 1234), "/announce", 0, self.socket_mgr) session.on_ip_address_resolved("192.168.1.1") session.transport = self.mock_transport session.result_deferred = Deferred() self.assertFalse(session.is_failed) packet = struct.pack("!iiq", session.action, session.transaction_id, 126) session.handle_response(packet) session._infohash_list = ["test"] packet = struct.pack("!iiiii", session.action, session.transaction_id, 0, 1, 2) session.handle_response(packet) self.assertTrue(session.is_finished) return session.result_deferred
def test_udpsession_handle_response_wrong_len(self): session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 0, self.socket_mgr) session.on_ip_address_resolved("127.0.0.1") self.assertFalse(session.is_failed) session.handle_connection_response("too short") self.assertTrue(session.is_failed) # After receiving a correct packet, it session should still be in a failed state session.action = 123 session.transaction_id = 124 packet = struct.pack("!iiq", 123, 124, 126) session.handle_response(packet) self.assertTrue(session.expect_connection_response) self.assertTrue(session.is_failed)
def test_udpsession_response_list_len_mismatch(self): session = UdpTrackerSession("localhost", ("localhost", 4782), "/announce", 5) session.scraper = FakeScraper() session.result_deferred = Deferred() def on_error(_): pass session.result_deferred.addErrback(on_error) session._action = 123 session._transaction_id = 123 self.assertFalse(session.is_failed) session._infohash_list = ["test", "test2"] packet = struct.pack("!iiiii", 123, 123, 0, 1, 2) session.handle_response(packet) self.assertTrue(session.is_failed)