06-bridge-fail-persist-resend-qos2.py 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. #!/usr/bin/env python3
  2. # Test whether a bridge can cope with an unknown PUBACK
  3. from mosq_test_helper import *
  4. def write_config(filename, port1, port2, protocol_version):
  5. with open(filename, 'w') as f:
  6. f.write("port %d\n" % (port2))
  7. f.write("\n")
  8. f.write("connection bridge-u-test\n")
  9. f.write("remote_clientid bridge-u-test\n")
  10. f.write("address 127.0.0.1:%d\n" % (port1))
  11. f.write("topic bridge/# out\n")
  12. f.write("\n")
  13. f.write("cleansession true\n")
  14. f.write("notifications false\n")
  15. f.write("restart_timeout 5\n")
  16. f.write("try_private false\n")
  17. f.write("bridge_protocol_version %s\n" % (protocol_version))
  18. def do_test(proto_ver):
  19. if proto_ver == 4:
  20. bridge_protocol = "mqttv311"
  21. proto_ver_connect = 4
  22. else:
  23. bridge_protocol = "mqttv50"
  24. proto_ver_connect = 5
  25. (port1, port2) = mosq_test.get_port(2)
  26. conf_file = os.path.basename(__file__).replace('.py', '.conf')
  27. write_config(conf_file, port1, port2, bridge_protocol)
  28. rc = 1
  29. keepalive = 60
  30. connect_packet = mosq_test.gen_connect("bridge-u-test", keepalive=keepalive, proto_ver=proto_ver_connect)
  31. connack_packet = mosq_test.gen_connack(rc=0, proto_ver=proto_ver)
  32. mid = 180
  33. mid_unknown = 2000
  34. publish_packet = mosq_test.gen_publish("bridge/unknown/qos2", qos=1, payload="bridge-message", mid=mid, proto_ver=proto_ver)
  35. puback_packet = mosq_test.gen_puback(mid, proto_ver=proto_ver)
  36. pubrec_packet_unknown1 = mosq_test.gen_pubrec(mid_unknown+1, proto_ver=proto_ver)
  37. pubrel_packet_unknown1 = mosq_test.gen_pubrel(mid_unknown+1, proto_ver=proto_ver)
  38. pubrel_packet_unknown2 = mosq_test.gen_pubrel(mid_unknown+2, proto_ver=proto_ver)
  39. pubcomp_packet_unknown2 = mosq_test.gen_pubcomp(mid_unknown+2, proto_ver=proto_ver)
  40. pubcomp_packet_unknown3 = mosq_test.gen_pubcomp(mid_unknown+3, proto_ver=proto_ver)
  41. unsubscribe_packet = mosq_test.gen_unsubscribe(1, "bridge/#", proto_ver=proto_ver)
  42. unsuback_packet = mosq_test.gen_unsuback(1, proto_ver=proto_ver)
  43. if os.environ.get('MOSQ_USE_VALGRIND') is not None:
  44. sleep_time = 5
  45. else:
  46. sleep_time = 0.5
  47. sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  48. sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
  49. sock.settimeout(10)
  50. sock.bind(('', port1))
  51. sock.listen(5)
  52. broker = mosq_test.start_broker(filename=os.path.basename(__file__), port=port2, use_conf=True)
  53. time.sleep(sleep_time)
  54. try:
  55. (conn, address) = sock.accept()
  56. conn.settimeout(20)
  57. mosq_test.expect_packet(conn, "connect", connect_packet)
  58. conn.send(connack_packet)
  59. mosq_test.expect_packet(conn, "unsubscribe", unsubscribe_packet)
  60. conn.send(unsuback_packet)
  61. # Send the unexpected pubrec packet
  62. conn.send(pubrec_packet_unknown1)
  63. mosq_test.expect_packet(conn, "pubrel", pubrel_packet_unknown1)
  64. conn.send(pubrel_packet_unknown2)
  65. mosq_test.expect_packet(conn, "pubcomp", pubcomp_packet_unknown2)
  66. conn.send(pubcomp_packet_unknown3)
  67. # Send a legitimate publish packet to verify everything is still ok
  68. conn.send(publish_packet)
  69. mosq_test.expect_packet(conn, "puback", puback_packet)
  70. rc = 0
  71. except mosq_test.TestError:
  72. pass
  73. finally:
  74. os.remove(conf_file)
  75. broker.terminate()
  76. broker.wait()
  77. (stdo, stde) = broker.communicate()
  78. sock.close()
  79. if rc:
  80. print(stde.decode('utf-8'))
  81. exit(rc)
  82. do_test(proto_ver=4)
  83. do_test(proto_ver=5)
  84. exit(0)