From f1331b5323025194e226e664a109fe644e8884d0 Mon Sep 17 00:00:00 2001 From: kenzok8 Date: Wed, 27 Nov 2024 12:25:35 +0800 Subject: [PATCH] update 2024-11-27 12:25:35 --- UA2F/scripts/test.py | 26 +++++++++++++++----------- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/UA2F/scripts/test.py b/UA2F/scripts/test.py index 6e936649e..6cdcb2449 100644 --- a/UA2F/scripts/test.py +++ b/UA2F/scripts/test.py @@ -3,6 +3,7 @@ import http.server import json import logging import os +import socket import socketserver import subprocess import sys @@ -37,7 +38,11 @@ class MyHandler(http.server.SimpleHTTPRequestHandler): def start_server(): - with socketserver.TCPServer(("", PORT), MyHandler, True) as httpd: + with socketserver.TCPServer(('', PORT), MyHandler, bind_and_activate=False) as httpd: + httpd.socket.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_V6ONLY, 0) + httpd.server_bind() + httpd.server_activate() + print(f"Serving on port {PORT}") httpd.serve_forever() atexit.register(httpd.shutdown) @@ -47,15 +52,14 @@ def start_ua2f(u: str): atexit.register(lambda: p.kill()) -# iptables 设置函数 def setup_iptables(): os.system(f"sudo iptables -A OUTPUT -p tcp --dport {PORT} -j NFQUEUE --queue-num 10010") - # os.system(f"sudo ip6tables -A OUTPUT -p tcp --dport {PORT} -j NFQUEUE --queue-num 10010") + os.system(f"sudo ip6tables -A OUTPUT -p tcp --dport {PORT} -j NFQUEUE --queue-num 10010") def cleanup_iptables(): os.system(f"sudo iptables -D OUTPUT -p tcp --dport {PORT} -j NFQUEUE --queue-num 10010") - # os.system(f"sudo ip6tables -D OUTPUT -p tcp --dport {PORT} -j NFQUEUE --queue-num 10010") + os.system(f"sudo ip6tables -D OUTPUT -p tcp --dport {PORT} -j NFQUEUE --queue-num 10010") if __name__ == "__main__": @@ -91,13 +95,13 @@ if __name__ == "__main__": assert response.ok assert response.text == str(len(nxt)) - # for i in tqdm(range(2000)): - # nxt = ua.random - # response = requests.get(f"http://[::1]:{PORT}", headers={ - # "User-Agent": nxt - # }) - # assert response.ok - # assert response.text == str(len(nxt)) + for i in tqdm(range(2000)): + nxt = ua.random + response = requests.get(f"http://[::1]:{PORT}", headers={ + "User-Agent": nxt + }) + assert response.ok + assert response.text == str(len(nxt)) # clean cleanup_iptables()