github.com/Psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/server/server_packetman_test.go (about)

     1  // +build PSIPHON_RUN_PACKET_MANIPULATOR_TEST
     2  
     3  /*
     4   * Copyright (c) 2020, Psiphon Inc.
     5   * All rights reserved.
     6   *
     7   * This program is free software: you can redistribute it and/or modify
     8   * it under the terms of the GNU General Public License as published by
     9   * the Free Software Foundation, either version 3 of the License, or
    10   * (at your option) any later version.
    11   *
    12   * This program is distributed in the hope that it will be useful,
    13   * but WITHOUT ANY WARRANTY; without even the implied warranty of
    14   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    15   * GNU General Public License for more details.
    16   *
    17   * You should have received a copy of the GNU General Public License
    18   * along with this program.  If not, see <http://www.gnu.org/licenses/>.
    19   *
    20   */
    21  
    22  package server
    23  
    24  import (
    25  	"testing"
    26  )
    27  
    28  func TestServerPacketManipulation(t *testing.T) {
    29  	runServer(t,
    30  		&runServerConfig{
    31  			tunnelProtocol:       "UNFRONTED-MEEK-SESSION-TICKET-OSSH",
    32  			enableSSHAPIRequests: true,
    33  			doHotReload:          false,
    34  			doDefaultSponsorID:   false,
    35  			denyTrafficRules:     false,
    36  			requireAuthorization: true,
    37  			omitAuthorization:    false,
    38  			doTunneledWebRequest: true,
    39  			doTunneledNTPRequest: true,
    40  			forceFragmenting:     false,
    41  			forceLivenessTest:    false,
    42  			doPruneServerEntries: false,
    43  			doDanglingTCPConn:    true,
    44  			doPacketManipulation: true,
    45  		})
    46  }
    47  
    48  func TestServerPacketManipulationReplay(t *testing.T) {
    49  	runServerReplayTests(t, true)
    50  }