|
@@ -0,0 +1,511 @@
|
|
|
|
+/*
|
|
|
|
+ Copyright 2021 Jeroen van Rijn <[email protected]>.
|
|
|
|
+ Made available under Odin's BSD-3 license.
|
|
|
|
+
|
|
|
|
+ List of contributors:
|
|
|
|
+ Jeroen van Rijn: Initial implementation.
|
|
|
|
+ graphitemaster: pton/ntop IANA test vectors
|
|
|
|
+
|
|
|
|
+ A test suite for `core:net`
|
|
|
|
+*/
|
|
|
|
+package test_core_net
|
|
|
|
+
|
|
|
|
+import "core:testing"
|
|
|
|
+import "core:mem"
|
|
|
|
+import "core:fmt"
|
|
|
|
+import "core:net"
|
|
|
|
+import "core:strconv"
|
|
|
|
+import "core:time"
|
|
|
|
+import "core:thread"
|
|
|
|
+
|
|
|
|
+_, _ :: time, thread
|
|
|
|
+
|
|
|
|
+TEST_count := 0
|
|
|
|
+TEST_fail := 0
|
|
|
|
+
|
|
|
|
+t := &testing.T{}
|
|
|
|
+
|
|
|
|
+when ODIN_TEST {
|
|
|
|
+ expect :: testing.expect
|
|
|
|
+ log :: testing.log
|
|
|
|
+} else {
|
|
|
|
+ expect :: proc(t: ^testing.T, condition: bool, message: string, loc := #caller_location) {
|
|
|
|
+ TEST_count += 1
|
|
|
|
+ if !condition {
|
|
|
|
+ TEST_fail += 1
|
|
|
|
+ fmt.printf("[%v] %v\n", loc, message)
|
|
|
|
+ return
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ log :: proc(t: ^testing.T, v: any, loc := #caller_location) {
|
|
|
|
+ fmt.printf("[%v] ", loc)
|
|
|
|
+ fmt.printf("log: %v\n", v)
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+_tracking_allocator := mem.Tracking_Allocator{}
|
|
|
|
+
|
|
|
|
+print_tracking_allocator_report :: proc() {
|
|
|
|
+ for _, leak in _tracking_allocator.allocation_map {
|
|
|
|
+ fmt.printf("%v leaked %v bytes\n", leak.location, leak.size)
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ for bf in _tracking_allocator.bad_free_array {
|
|
|
|
+ fmt.printf("%v allocation %p was freed badly\n", bf.location, bf.memory)
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+main :: proc() {
|
|
|
|
+ mem.tracking_allocator_init(&_tracking_allocator, context.allocator)
|
|
|
|
+ context.allocator = mem.tracking_allocator(&_tracking_allocator)
|
|
|
|
+
|
|
|
|
+ address_parsing_test(t)
|
|
|
|
+
|
|
|
|
+ when ODIN_OS != .Windows {
|
|
|
|
+ fmt.printf("IMPORTANT: `core:thread` seems to still be a bit wonky on Linux and MacOS, so we can't run tests relying on them.\n", ODIN_OS)
|
|
|
|
+ } else {
|
|
|
|
+ tcp_tests(t)
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ fmt.printf("%v/%v tests successful.\n", TEST_count - TEST_fail, TEST_count)
|
|
|
|
+
|
|
|
|
+ print_tracking_allocator_report()
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+@test
|
|
|
|
+address_parsing_test :: proc(t: ^testing.T) {
|
|
|
|
+ for vector in IP_Address_Parsing_Test_Vectors {
|
|
|
|
+ kind := ""
|
|
|
|
+ switch vector.family {
|
|
|
|
+ case .IP4: kind = "[IPv4]"
|
|
|
|
+ case .IP4_Alt: kind = "[IPv4 Non-Decimal]"
|
|
|
|
+ case .IP6: kind = "[IPv6]"
|
|
|
|
+ case: panic("Add support to the test for this type.")
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ valid := len(vector.binstr) > 0
|
|
|
|
+
|
|
|
|
+ fmt.printf("%v %v\n", kind, vector.input)
|
|
|
|
+
|
|
|
|
+ msg := "-set a proper message-"
|
|
|
|
+ switch vector.family {
|
|
|
|
+ case .IP4, .IP4_Alt:
|
|
|
|
+ /*
|
|
|
|
+ Does `net.parse_ip4_address` think we parsed the address properly?
|
|
|
|
+ */
|
|
|
|
+ non_decimal := vector.family == .IP4_Alt
|
|
|
|
+
|
|
|
|
+ any_addr := net.parse_address(vector.input, non_decimal)
|
|
|
|
+ parsed_ok := any_addr != nil
|
|
|
|
+ parsed: net.IP4_Address
|
|
|
|
+
|
|
|
|
+ /*
|
|
|
|
+ Ensure that `parse_address` doesn't parse IPv4 addresses into IPv6 addreses by mistake.
|
|
|
|
+ */
|
|
|
|
+ switch addr in any_addr {
|
|
|
|
+ case net.IP4_Address:
|
|
|
|
+ parsed = addr
|
|
|
|
+ case net.IP6_Address:
|
|
|
|
+ parsed_ok = false
|
|
|
|
+ msg = fmt.tprintf("parse_address mistook %v as IPv6 address %04x", vector.input, addr)
|
|
|
|
+ expect(t, false, msg)
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if !parsed_ok && valid {
|
|
|
|
+ msg = fmt.tprintf("parse_ip4_address failed to parse %v, expected %v", vector.input, binstr_to_address(vector.binstr))
|
|
|
|
+
|
|
|
|
+ } else if parsed_ok && !valid {
|
|
|
|
+ msg = fmt.tprintf("parse_ip4_address parsed %v into %v, expected failure", vector.input, parsed)
|
|
|
|
+ }
|
|
|
|
+ expect(t, parsed_ok == valid, msg)
|
|
|
|
+
|
|
|
|
+ if valid && parsed_ok {
|
|
|
|
+ actual_binary := address_to_binstr(parsed)
|
|
|
|
+ msg = fmt.tprintf("parse_ip4_address parsed %v into %v, expected %v", vector.input, actual_binary, vector.binstr)
|
|
|
|
+ expect(t, actual_binary == vector.binstr, msg)
|
|
|
|
+
|
|
|
|
+ /*
|
|
|
|
+ Do we turn an address back into the same string properly?
|
|
|
|
+ No point in testing the roundtrip if the first part failed.
|
|
|
|
+ */
|
|
|
|
+ if len(vector.output) > 0 && actual_binary == vector.binstr {
|
|
|
|
+ stringified := net.address_to_string(parsed)
|
|
|
|
+ msg = fmt.tprintf("address_to_string turned %v into %v, expected %v", parsed, stringified, vector.output)
|
|
|
|
+ expect(t, stringified == vector.output, msg)
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ case .IP6:
|
|
|
|
+ /*
|
|
|
|
+ Do we parse the address properly?
|
|
|
|
+ */
|
|
|
|
+ parsed, parsed_ok := net.parse_ip6_address(vector.input)
|
|
|
|
+
|
|
|
|
+ if !parsed_ok && valid {
|
|
|
|
+ msg = fmt.tprintf("parse_ip6_address failed to parse %v, expected %04x", vector.input, binstr_to_address(vector.binstr))
|
|
|
|
+
|
|
|
|
+ } else if parsed_ok && !valid {
|
|
|
|
+ msg = fmt.tprintf("parse_ip6_address parsed %v into %04x, expected failure", vector.input, parsed)
|
|
|
|
+ }
|
|
|
|
+ expect(t, parsed_ok == valid, msg)
|
|
|
|
+
|
|
|
|
+ if valid && parsed_ok {
|
|
|
|
+ actual_binary := address_to_binstr(parsed)
|
|
|
|
+ msg = fmt.tprintf("parse_ip6_address parsed %v into %v, expected %v", vector.input, actual_binary, vector.binstr)
|
|
|
|
+ expect(t, actual_binary == vector.binstr, msg)
|
|
|
|
+
|
|
|
|
+ /*
|
|
|
|
+ Do we turn an address back into the same string properly?
|
|
|
|
+ No point in testing the roundtrip if the first part failed.
|
|
|
|
+ */
|
|
|
|
+ if len(vector.output) > 0 && actual_binary == vector.binstr {
|
|
|
|
+ stringified := net.address_to_string(parsed)
|
|
|
|
+ msg = fmt.tprintf("address_to_string turned %v into %v, expected %v", parsed, stringified, vector.output)
|
|
|
|
+ expect(t, stringified == vector.output, msg)
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+address_to_binstr :: proc(address: net.Address) -> (binstr: string) {
|
|
|
|
+ switch t in address {
|
|
|
|
+ case net.IP4_Address:
|
|
|
|
+ b := transmute(u32be)t
|
|
|
|
+ return fmt.tprintf("%08x", b)
|
|
|
|
+ case net.IP6_Address:
|
|
|
|
+ b := transmute(u128be)t
|
|
|
|
+ return fmt.tprintf("%32x", b)
|
|
|
|
+ case:
|
|
|
|
+ return ""
|
|
|
|
+ }
|
|
|
|
+ unreachable()
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+binstr_to_address :: proc(binstr: string) -> (address: net.Address) {
|
|
|
|
+ switch len(binstr) {
|
|
|
|
+ case 8: // IPv4
|
|
|
|
+ a, ok := strconv.parse_u64_of_base(binstr, 16)
|
|
|
|
+ expect(t, ok, "failed to parse test case bin string")
|
|
|
|
+
|
|
|
|
+ ipv4 := u32be(a)
|
|
|
|
+ return net.IP4_Address(transmute([4]u8)ipv4)
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ case 32: // IPv6
|
|
|
|
+ a, ok := strconv.parse_u128_of_base(binstr, 16)
|
|
|
|
+ expect(t, ok, "failed to parse test case bin string")
|
|
|
|
+
|
|
|
|
+ ipv4 := u128be(a)
|
|
|
|
+ return net.IP6_Address(transmute([8]u16be)ipv4)
|
|
|
|
+
|
|
|
|
+ case 0:
|
|
|
|
+ return nil
|
|
|
|
+ }
|
|
|
|
+ panic("Invalid test case")
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+Kind :: enum {
|
|
|
|
+ IP4, // Decimal IPv4
|
|
|
|
+ IP4_Alt, // Non-decimal address
|
|
|
|
+ IP6, // Hex IPv6 or mixed IPv4/IPv6.
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+IP_Address_Parsing_Test_Vector :: struct {
|
|
|
|
+ // Give it to the IPv4 or IPv6 parser?
|
|
|
|
+ family: Kind,
|
|
|
|
+
|
|
|
|
+ // Input address to try and parse.
|
|
|
|
+ input: string,
|
|
|
|
+
|
|
|
|
+ /*
|
|
|
|
+ Hexadecimal representation of the expected numeric value of the address.
|
|
|
|
+ Zero length means input is invalid and the parser should report failure.
|
|
|
|
+ */
|
|
|
|
+ binstr: string,
|
|
|
|
+
|
|
|
|
+ // Expected `address_to_string` output, if a valid input and this string is non-empty.
|
|
|
|
+ output: string,
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+IP_Address_Parsing_Test_Vectors :: []IP_Address_Parsing_Test_Vector{
|
|
|
|
+ // dotted-decimal notation
|
|
|
|
+ { .IP4, "0.0.0.0", "00000000", "0.0.0.0" },
|
|
|
|
+ { .IP4, "127.0.0.1", "7f000001", "127.0.0.1" },
|
|
|
|
+ { .IP4, "10.0.128.31", "0a00801f", "10.0.128.31" },
|
|
|
|
+ { .IP4, "255.255.255.255", "ffffffff", "255.255.255.255"},
|
|
|
|
+
|
|
|
|
+ // Odin custom: Address + port, valid
|
|
|
|
+ { .IP4, "0.0.0.0:80", "00000000", "0.0.0.0" },
|
|
|
|
+ { .IP4, "127.0.0.1:80", "7f000001", "127.0.0.1" },
|
|
|
|
+ { .IP4, "10.0.128.31:80", "0a00801f", "10.0.128.31" },
|
|
|
|
+ { .IP4, "255.255.255.255:80", "ffffffff", "255.255.255.255"},
|
|
|
|
+
|
|
|
|
+ { .IP4, "[0.0.0.0]:80", "00000000", "0.0.0.0" },
|
|
|
|
+ { .IP4, "[127.0.0.1]:80", "7f000001", "127.0.0.1" },
|
|
|
|
+ { .IP4, "[10.0.128.31]:80", "0a00801f", "10.0.128.31" },
|
|
|
|
+ { .IP4, "[255.255.255.255]:80", "ffffffff", "255.255.255.255"},
|
|
|
|
+
|
|
|
|
+ // Odin custom: Address + port, invalid
|
|
|
|
+ { .IP4, "[]:80", "", ""},
|
|
|
|
+ { .IP4, "[0.0.0.0]", "", ""},
|
|
|
|
+ { .IP4, "[127.0.0.1]:", "", ""},
|
|
|
|
+ { .IP4, "[10.0.128.31] :80", "", ""},
|
|
|
|
+ { .IP4, "[255.255.255.255]:65536", "", ""},
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ // numbers-and-dots notation, but not dotted-decimal
|
|
|
|
+ { .IP4_Alt, "1.2.03.4", "01020304", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.0x33.4", "01023304", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.0XAB.4", "0102ab04", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.0xabcd", "0102abcd", ""},
|
|
|
|
+ { .IP4_Alt, "1.0xabcdef", "01abcdef", ""},
|
|
|
|
+ { .IP4_Alt, "0x01abcdef", "01abcdef", ""},
|
|
|
|
+ { .IP4_Alt, "00377.0x0ff.65534", "fffffffe", ""},
|
|
|
|
+
|
|
|
|
+ // invalid as decimal address
|
|
|
|
+ { .IP4, "", "", ""},
|
|
|
|
+ { .IP4, ".1.2.3", "", ""},
|
|
|
|
+ { .IP4, "1..2.3", "", ""},
|
|
|
|
+ { .IP4, "1.2.3.", "", ""},
|
|
|
|
+ { .IP4, "1.2.3.4.5", "", ""},
|
|
|
|
+ { .IP4, "1.2.3.a", "", ""},
|
|
|
|
+ { .IP4, "1.256.2.3", "", ""},
|
|
|
|
+ { .IP4, "1.2.4294967296.3", "", ""},
|
|
|
|
+ { .IP4, "1.2.-4294967295.3", "", ""},
|
|
|
|
+ { .IP4, "1.2. 3.4", "", ""},
|
|
|
|
+
|
|
|
|
+ // invalid as non-decimal address
|
|
|
|
+ { .IP4_Alt, "", "", ""},
|
|
|
|
+ { .IP4_Alt, ".1.2.3", "", ""},
|
|
|
|
+ { .IP4_Alt, "1..2.3", "", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.3.", "", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.3.4.5", "", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.3.a", "", ""},
|
|
|
|
+ { .IP4_Alt, "1.256.2.3", "", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.4294967296.3", "", ""},
|
|
|
|
+ { .IP4_Alt, "1.2.-4294967295.3", "", ""},
|
|
|
|
+ { .IP4_Alt, "1.2. 3.4", "", ""},
|
|
|
|
+
|
|
|
|
+ // Valid IPv6 addresses
|
|
|
|
+ { .IP6, "::", "00000000000000000000000000000000", "::"},
|
|
|
|
+ { .IP6, "::1", "00000000000000000000000000000001", "::1"},
|
|
|
|
+ { .IP6, "::192.168.1.1", "000000000000000000000000c0a80101", "::c0a8:101"},
|
|
|
|
+ { .IP6, "0000:0000:0000:0000:0000:ffff:255.255.255.255", "00000000000000000000ffffffffffff", "::ffff:ffff:ffff"},
|
|
|
|
+
|
|
|
|
+ { .IP6, "0:0:0:0:0:0:192.168.1.1", "000000000000000000000000c0a80101", "::c0a8:101"},
|
|
|
|
+ { .IP6, "0:0::0:0:0:192.168.1.1", "000000000000000000000000c0a80101", "::c0a8:101"},
|
|
|
|
+ { .IP6, "::ffff:192.168.1.1", "00000000000000000000ffffc0a80101", "::ffff:c0a8:101"},
|
|
|
|
+ { .IP6, "a:0b:00c:000d:E:F::", "000a000b000c000d000e000f00000000", "a:b:c:d:e:f::"},
|
|
|
|
+ { .IP6, "1:2:3:4:5:6::", "00010002000300040005000600000000", "1:2:3:4:5:6::"},
|
|
|
|
+ { .IP6, "1:2:3:4:5:6:7::", "00010002000300040005000600070000", "1:2:3:4:5:6:7:0"},
|
|
|
|
+ { .IP6, "::1:2:3:4:5:6", "00000000000100020003000400050006", "::1:2:3:4:5:6"},
|
|
|
|
+ { .IP6, "::1:2:3:4:5:6:7", "00000001000200030004000500060007", "0:1:2:3:4:5:6:7"},
|
|
|
|
+ { .IP6, "a:b::c:d:e:f", "000a000b00000000000c000d000e000f", "a:b::c:d:e:f"},
|
|
|
|
+ { .IP6, "0:0:0:0:0:ffff:c0a8:5e4", "00000000000000000000ffffc0a805e4", "::ffff:c0a8:5e4"},
|
|
|
|
+ { .IP6, "0::ffff:c0a8:5e4", "00000000000000000000ffffc0a805e4", "::ffff:c0a8:5e4"},
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ // If multiple zero runs are present, shorten the longest one.
|
|
|
|
+ { .IP6, "1:0:0:2:0:0:0:3", "00010000000000020000000000000003", "1:0:0:2::3"},
|
|
|
|
+
|
|
|
|
+ // Invalid IPv6 addresses
|
|
|
|
+ { .IP6, "", "", ""},
|
|
|
|
+ { .IP6, ":", "", ""},
|
|
|
|
+ { .IP6, ":::", "", ""},
|
|
|
|
+ { .IP6, "192.168.1.1", "", ""},
|
|
|
|
+ { .IP6, ":192.168.1.1", "", ""},
|
|
|
|
+ { .IP6, "::012.34.56.78", "", ""},
|
|
|
|
+ { .IP6, ":ffff:192.168.1.1", "", ""},
|
|
|
|
+ { .IP6, ".192.168.1.1", "", ""},
|
|
|
|
+ { .IP6, ":.192.168.1.1", "", ""},
|
|
|
|
+ { .IP6, "a:0b:00c:000d:0000e:f::", "", ""},
|
|
|
|
+ { .IP6, "1:2:3:4:5:6:7:8::", "", ""},
|
|
|
|
+ { .IP6, "1:2:3:4:5:6:7::9", "", ""},
|
|
|
|
+ { .IP6, "::1:2:3:4:5:6:7:8", "", ""},
|
|
|
|
+ { .IP6, "ffff:c0a8:5e4", "", ""},
|
|
|
|
+ { .IP6, ":ffff:c0a8:5e4", "", ""},
|
|
|
|
+ { .IP6, "0:0:0:0:ffff:c0a8:5e4", "", ""},
|
|
|
|
+ { .IP6, "::0::ffff:c0a8:5e4", "", ""},
|
|
|
|
+ { .IP6, "c0a8", "", ""},
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ENDPOINT := net.Endpoint{
|
|
|
|
+ net.IP4_Address{127, 0, 0, 1},
|
|
|
|
+ 9999,
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+CONTENT := "Hellope!"
|
|
|
|
+
|
|
|
|
+SEND_TIMEOUT :: time.Duration(1 * time.Second)
|
|
|
|
+RECV_TIMEOUT :: time.Duration(1 * time.Second)
|
|
|
|
+
|
|
|
|
+Thread_Data :: struct {
|
|
|
|
+ skt: net.Any_Socket,
|
|
|
|
+ err: net.Network_Error,
|
|
|
|
+ tid: ^thread.Thread,
|
|
|
|
+
|
|
|
|
+ no_accept: bool, // Tell the server proc not to accept.
|
|
|
|
+
|
|
|
|
+ data: [1024]u8, // Received data and its length
|
|
|
|
+ length: int,
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+thread_data := [3]Thread_Data{}
|
|
|
|
+
|
|
|
|
+/*
|
|
|
|
+ This runs a bunch of socket tests using threads:
|
|
|
|
+ - two servers trying to bind the same endpoint
|
|
|
|
+ - client trying to connect to closed port
|
|
|
|
+ - client trying to connect to an open port with a non-accepting server
|
|
|
|
+ - client sending server data and server sending client data
|
|
|
|
+ - etc.
|
|
|
|
+*/
|
|
|
|
+tcp_tests :: proc(t: ^testing.T) {
|
|
|
|
+ fmt.println("Testing two servers trying to bind to the same endpoint...")
|
|
|
|
+ two_servers_binding_same_endpoint(t)
|
|
|
|
+ fmt.println("Testing client connecting to a closed port...")
|
|
|
|
+ client_connects_to_closed_port(t)
|
|
|
|
+ fmt.println("Testing client connecting to port that doesn't accept...")
|
|
|
|
+ client_connects_to_open_but_non_accepting_port(t)
|
|
|
|
+ fmt.println("Testing client sending server data...")
|
|
|
|
+ client_sends_server_data(t)
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+tcp_client :: proc(retval: rawptr) {
|
|
|
|
+ send :: proc(content: []u8) -> (err: net.Network_Error) {
|
|
|
|
+ skt := net.dial_tcp(ENDPOINT) or_return
|
|
|
|
+ defer net.close(skt)
|
|
|
|
+
|
|
|
|
+ net.set_option(skt, .Send_Timeout, SEND_TIMEOUT)
|
|
|
|
+ net.set_option(skt, .Receive_Timeout, RECV_TIMEOUT)
|
|
|
|
+
|
|
|
|
+ _, err = net.send(skt, content)
|
|
|
|
+ return
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ r := transmute(^Thread_Data)retval
|
|
|
|
+ r.err = send(transmute([]u8)CONTENT)
|
|
|
|
+ return
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+tcp_server :: proc(retval: rawptr) {
|
|
|
|
+ r := transmute(^Thread_Data)retval
|
|
|
|
+
|
|
|
|
+ if r.skt, r.err = net.listen_tcp(ENDPOINT); r.err != nil {
|
|
|
|
+ return
|
|
|
|
+ }
|
|
|
|
+ defer net.close(r.skt)
|
|
|
|
+
|
|
|
|
+ if r.no_accept {
|
|
|
|
+ // Don't accept any connections, just listen.
|
|
|
|
+ return
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ client: net.TCP_Socket
|
|
|
|
+ if client, _, r.err = net.accept_tcp(r.skt.(net.TCP_Socket)); r.err != nil {
|
|
|
|
+ return
|
|
|
|
+ }
|
|
|
|
+ defer net.close(client)
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ r.length, r.err = net.recv_tcp(client, r.data[:])
|
|
|
|
+ return
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+cleanup_thread :: proc(data: Thread_Data) {
|
|
|
|
+ net.close(data.skt)
|
|
|
|
+
|
|
|
|
+ thread.terminate(data.tid, 1)
|
|
|
|
+ thread.destroy(data.tid)
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+two_servers_binding_same_endpoint :: proc(t: ^testing.T) {
|
|
|
|
+ thread_data = {}
|
|
|
|
+
|
|
|
|
+ thread_data[0].tid = thread.create_and_start_with_data(&thread_data[0], tcp_server, context)
|
|
|
|
+ thread_data[1].tid = thread.create_and_start_with_data(&thread_data[1], tcp_server, context)
|
|
|
|
+
|
|
|
|
+ defer {
|
|
|
|
+ cleanup_thread(thread_data[0])
|
|
|
|
+ cleanup_thread(thread_data[1])
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ // Give the two servers enough time to try and bind the same endpoint
|
|
|
|
+ time.sleep(1 * time.Second)
|
|
|
|
+
|
|
|
|
+ first_won := thread_data[0].err == nil && thread_data[1].err == net.Bind_Error.Address_In_Use
|
|
|
|
+ second_won := thread_data[1].err == nil && thread_data[0].err == net.Bind_Error.Address_In_Use
|
|
|
|
+
|
|
|
|
+ okay := first_won || second_won
|
|
|
|
+ msg := fmt.tprintf("Expected servers to return `nil` and `Address_In_Use`, got %v and %v", thread_data[0].err, thread_data[1].err)
|
|
|
|
+ expect(t, okay, msg)
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+client_connects_to_closed_port :: proc(t: ^testing.T) {
|
|
|
|
+ thread_data = {}
|
|
|
|
+
|
|
|
|
+ thread_data[0].tid = thread.create_and_start_with_data(&thread_data[0], tcp_client, context)
|
|
|
|
+
|
|
|
|
+ defer {
|
|
|
|
+ cleanup_thread(thread_data[0])
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ // Give the socket enough time to return `Refused`
|
|
|
|
+ time.sleep(4 * time.Second)
|
|
|
|
+
|
|
|
|
+ okay := thread_data[0].err == net.Dial_Error.Refused
|
|
|
|
+ msg := fmt.tprintf("Expected client to return `Refused` connecting to closed port, got %v", thread_data[0].err)
|
|
|
|
+ expect(t, okay, msg)
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+client_connects_to_open_but_non_accepting_port :: proc(t: ^testing.T) {
|
|
|
|
+ thread_data = {}
|
|
|
|
+
|
|
|
|
+ // Tell server proc not to accept
|
|
|
|
+ thread_data[0].no_accept = true
|
|
|
|
+
|
|
|
|
+ thread_data[0].tid = thread.create_and_start_with_data(&thread_data[0], tcp_server, context)
|
|
|
|
+ thread_data[1].tid = thread.create_and_start_with_data(&thread_data[1], tcp_client, context)
|
|
|
|
+
|
|
|
|
+ defer {
|
|
|
|
+ cleanup_thread(thread_data[0])
|
|
|
|
+ cleanup_thread(thread_data[1])
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ // Give the two servers enough time to try and bind the same endpoint
|
|
|
|
+ time.sleep(4 * time.Second)
|
|
|
|
+
|
|
|
|
+ okay := thread_data[0].err == nil && thread_data[1].err == net.Dial_Error.Refused
|
|
|
|
+ msg := fmt.tprintf("Expected server and client to return `nil` and `Refused`, got %v and %v", thread_data[0].err, thread_data[1].err)
|
|
|
|
+ expect(t, okay, msg)
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+client_sends_server_data :: proc(t: ^testing.T) {
|
|
|
|
+ thread_data = {}
|
|
|
|
+
|
|
|
|
+ // Tell server proc not to accept
|
|
|
|
+ // thread_data[0].no_accept = true
|
|
|
|
+
|
|
|
|
+ thread_data[0].tid = thread.create_and_start_with_data(&thread_data[0], tcp_server, context)
|
|
|
|
+ thread_data[1].tid = thread.create_and_start_with_data(&thread_data[1], tcp_client, context)
|
|
|
|
+
|
|
|
|
+ defer {
|
|
|
|
+ cleanup_thread(thread_data[0])
|
|
|
|
+ cleanup_thread(thread_data[1])
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ // Give the two servers enough time to try and bind the same endpoint
|
|
|
|
+ time.sleep(1 * time.Second)
|
|
|
|
+
|
|
|
|
+ okay := thread_data[0].err == nil && thread_data[1].err == nil
|
|
|
|
+ msg := fmt.tprintf("Expected client and server to return `nil`, got %v and %v", thread_data[0].err, thread_data[1].err)
|
|
|
|
+ expect(t, okay, msg)
|
|
|
|
+
|
|
|
|
+ received := string(thread_data[0].data[:thread_data[0].length])
|
|
|
|
+
|
|
|
|
+ okay = received == CONTENT
|
|
|
|
+ msg = fmt.tprintf("Expected client to send \"{}\", got \"{}\"", CONTENT, received)
|
|
|
|
+ expect(t, okay, msg)
|
|
|
|
+}
|