github.com/Psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/server/server_packetman_test.go (about) 1 // +build PSIPHON_RUN_PACKET_MANIPULATOR_TEST 2 3 /* 4 * Copyright (c) 2020, Psiphon Inc. 5 * All rights reserved. 6 * 7 * This program is free software: you can redistribute it and/or modify 8 * it under the terms of the GNU General Public License as published by 9 * the Free Software Foundation, either version 3 of the License, or 10 * (at your option) any later version. 11 * 12 * This program is distributed in the hope that it will be useful, 13 * but WITHOUT ANY WARRANTY; without even the implied warranty of 14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 15 * GNU General Public License for more details. 16 * 17 * You should have received a copy of the GNU General Public License 18 * along with this program. If not, see <http://www.gnu.org/licenses/>. 19 * 20 */ 21 22 package server 23 24 import ( 25 "testing" 26 ) 27 28 func TestServerPacketManipulation(t *testing.T) { 29 runServer(t, 30 &runServerConfig{ 31 tunnelProtocol: "UNFRONTED-MEEK-SESSION-TICKET-OSSH", 32 enableSSHAPIRequests: true, 33 doHotReload: false, 34 doDefaultSponsorID: false, 35 denyTrafficRules: false, 36 requireAuthorization: true, 37 omitAuthorization: false, 38 doTunneledWebRequest: true, 39 doTunneledNTPRequest: true, 40 forceFragmenting: false, 41 forceLivenessTest: false, 42 doPruneServerEntries: false, 43 doDanglingTCPConn: true, 44 doPacketManipulation: true, 45 }) 46 } 47 48 func TestServerPacketManipulationReplay(t *testing.T) { 49 runServerReplayTests(t, true) 50 }