2 This file is part of GNUnet.
3 (C) 2009 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
21 * @file gns/test_gns_dht_threepeer.c
22 * @brief tests dht lookup over 3 peers
25 * alice <----> bob <-----> dave
27 * alice queries for www.buddy.bob.gads
31 #include "gnunet_common.h"
32 #include "gnunet_disk_lib.h"
33 #include "gnunet_testing_lib.h"
34 #include "gnunet_testbed_service.h"
35 #include "gnunet_core_service.h"
36 #include "gnunet_dht_service.h"
37 #include "block_dns.h"
38 #include "gnunet_signatures.h"
39 #include "gnunet_namestore_service.h"
40 #include "gnunet_dnsparser_lib.h"
41 #include "gnunet_gns_service.h"
43 #define ZONE_PUT_WAIT_TIME GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 10)
45 #define TEST_DOMAIN "www.buddy.bob.gads"
46 #define TEST_IP "1.1.1.1"
47 #define TEST_DAVE_PSEU "hagbard"
50 /* Timeout for entire testcase */
51 #define TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 60)
52 #define SETUP_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 60)
54 /* Global return value (0 for success, anything else for failure) */
57 /* Task handle to use to schedule test failure */
58 static GNUNET_SCHEDULER_TaskIdentifier die_task;
60 static GNUNET_SCHEDULER_TaskIdentifier wait_task;
62 static GNUNET_SCHEDULER_TaskIdentifier setup_task;
64 static struct GNUNET_CRYPTO_ShortHashCode dave_hash;
66 static struct GNUNET_CRYPTO_ShortHashCode bob_hash;
68 static struct GNUNET_TESTBED_Peer **cpeers;
70 static struct GNUNET_GNS_Handle *gh;
71 static struct GNUNET_GNS_LookupRequest *lookup_handle;
73 static struct GNUNET_TESTBED_Operation *get_cfg_ops[3];
74 static struct GNUNET_TESTBED_Operation *topology_op;
75 static struct GNUNET_CONFIGURATION_Handle *cfg_handles[3];
76 static struct GNUNET_NAMESTORE_Handle *nh[3];
78 static int dave_is_setup;
79 static int bob_is_setup;
80 static int alice_is_setup;
83 * Check if the get_handle is being used, if so stop the request. Either
84 * way, schedule the end_badly_cont function which actually shuts down the
88 end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
90 die_task = GNUNET_SCHEDULER_NO_TASK;
93 if (GNUNET_SCHEDULER_NO_TASK != wait_task)
95 GNUNET_SCHEDULER_cancel (wait_task);
96 wait_task = GNUNET_SCHEDULER_NO_TASK;
99 for (c = 0; c < 3; c++)
103 GNUNET_NAMESTORE_disconnect(nh[c]);
107 if (NULL != get_cfg_ops[c])
109 GNUNET_TESTBED_operation_done(get_cfg_ops[c]);
110 get_cfg_ops[c] = NULL;
112 if (NULL != cfg_handles[c])
114 GNUNET_CONFIGURATION_destroy (cfg_handles[c]);
115 cfg_handles[c] = NULL;
118 if (NULL != topology_op)
120 GNUNET_TESTBED_operation_done (topology_op);
123 if (NULL != lookup_handle)
125 GNUNET_GNS_cancel_lookup_request (lookup_handle);
126 lookup_handle = NULL;
130 GNUNET_GNS_disconnect(gh);
134 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Test failed \n");
135 GNUNET_SCHEDULER_shutdown ();
140 end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
142 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Finished\n");
144 if (GNUNET_SCHEDULER_NO_TASK != die_task)
146 GNUNET_SCHEDULER_cancel (die_task);
147 die_task = GNUNET_SCHEDULER_NO_TASK;
150 for (c = 0; c < 3; c++)
154 GNUNET_NAMESTORE_disconnect(nh[c]);
157 if (NULL != cfg_handles[c])
159 GNUNET_CONFIGURATION_destroy (cfg_handles[c]);
160 cfg_handles[c] = NULL;
166 GNUNET_GNS_disconnect(gh);
171 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Test ended successful\n");
173 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Test failed\n");
174 GNUNET_SCHEDULER_shutdown ();
178 setup_end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
180 setup_task = GNUNET_SCHEDULER_NO_TASK;
181 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Timeout during setup, test failed\n");
183 if (NULL != topology_op)
185 GNUNET_TESTBED_operation_done (topology_op);
188 GNUNET_SCHEDULER_shutdown ();
195 GNUNET_SCHEDULER_add_now (&end, NULL);
200 disconnect_ns (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
203 GNUNET_NAMESTORE_disconnect (cls);
214 cont_ns (void* cls, int32_t s, const char* emsg)
216 GNUNET_SCHEDULER_add_now (&disconnect_ns, cls);
220 on_lookup_result(void *cls, uint32_t rd_count,
221 const struct GNUNET_NAMESTORE_RecordData *rd)
228 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
235 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "name: %s\n", (char*)cls);
236 for (i=0; i<rd_count; i++)
238 string_val = GNUNET_NAMESTORE_value_to_string(rd[i].record_type,
241 if (0 == strcmp(string_val, TEST_IP))
243 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
244 "%s correctly resolved to %s!\n", TEST_DOMAIN, string_val);
247 GNUNET_free (string_val);
254 commence_testing(void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
258 if ((ZONE_PUT_WAIT_TIME.rel_value / 1000) == wait)
260 fprintf (stderr, "\n");
261 wait_task = GNUNET_SCHEDULER_NO_TASK;
262 lookup_handle = GNUNET_GNS_lookup(gh, TEST_DOMAIN, GNUNET_GNS_RECORD_A,
265 &on_lookup_result, TEST_DOMAIN);
266 if (GNUNET_SCHEDULER_NO_TASK != die_task)
267 GNUNET_SCHEDULER_cancel(die_task);
268 die_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT, &end_badly, "from lookup");
272 fprintf (stderr, ".");
273 wait_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_SECONDS, &commence_testing, NULL);
280 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Created all connections! Waiting for PUTs\n");
281 if (GNUNET_SCHEDULER_NO_TASK != setup_task)
283 GNUNET_SCHEDULER_cancel (setup_task);
284 setup_task = GNUNET_SCHEDULER_NO_TASK;
286 wait_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_SECONDS, &commence_testing, NULL);
290 static void connect_peers ()
296 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "All peers started\n");
299 GNUNET_TESTBED_overlay_configure_topology (NULL, 3, cpeers, NULL,
302 GNUNET_TESTBED_TOPOLOGY_RING,
303 GNUNET_TESTBED_TOPOLOGY_OPTION_END);
308 setup_dave (const struct GNUNET_CONFIGURATION_Handle * cfg)
311 struct GNUNET_CRYPTO_RsaPrivateKey *key;
312 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
314 struct GNUNET_NAMESTORE_RecordData rd;
316 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up dave\n");
317 cfg_handles[0] = GNUNET_CONFIGURATION_dup (cfg);
318 GNUNET_assert (NULL != cfg_handles[0]);
319 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
323 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
324 return GNUNET_SYSERR;
327 key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
331 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
332 GNUNET_free (keyfile);
333 return GNUNET_SYSERR;
335 nh[0] = GNUNET_NAMESTORE_connect (cfg_handles[0]);
338 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
339 GNUNET_CRYPTO_rsa_key_free (key);
340 GNUNET_free (keyfile);
341 return GNUNET_SYSERR;
344 GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
345 GNUNET_CRYPTO_short_hash(&pkey, sizeof(pkey), &dave_hash);
347 rd.expiration_time = UINT64_MAX;
349 web = GNUNET_malloc(sizeof(struct in_addr));
350 GNUNET_assert(1 == inet_pton (AF_INET, TEST_IP, web));
351 rd.data_size = sizeof(struct in_addr);
353 rd.record_type = GNUNET_GNS_RECORD_A;
354 rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY;
356 GNUNET_NAMESTORE_record_create (nh[0], key, "www", &rd, NULL, NULL);
358 rd.data_size = strlen(TEST_DAVE_PSEU);
359 rd.data = TEST_DAVE_PSEU;
360 rd.record_type = GNUNET_GNS_RECORD_PSEU;
363 GNUNET_NAMESTORE_record_create (nh[0], key, GNUNET_GNS_MASTERZONE_STR, &rd, &cont_ns, nh[0]);
365 GNUNET_CRYPTO_rsa_key_free(key);
366 GNUNET_free(keyfile);
368 dave_is_setup = GNUNET_YES;
369 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up dave done\n");
374 setup_bob (const struct GNUNET_CONFIGURATION_Handle * cfg)
377 struct GNUNET_CRYPTO_RsaPrivateKey *key;
378 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
379 struct GNUNET_NAMESTORE_RecordData rd;
381 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up bob\n");
382 cfg_handles[1] = GNUNET_CONFIGURATION_dup (cfg);
383 GNUNET_assert (NULL != cfg_handles[1]);
384 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
388 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
389 return GNUNET_SYSERR;
392 key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
396 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
397 GNUNET_free (keyfile);
398 return GNUNET_SYSERR;
401 nh[1] = GNUNET_NAMESTORE_connect (cfg_handles[1]);
404 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
405 GNUNET_CRYPTO_rsa_key_free (key);
406 GNUNET_free (keyfile);
407 return GNUNET_SYSERR;
410 GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
411 GNUNET_CRYPTO_short_hash(&pkey, sizeof(pkey), &bob_hash);
413 rd.expiration_time = UINT64_MAX;
414 rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode);
415 rd.data = &dave_hash;
416 rd.record_type = GNUNET_GNS_RECORD_PKEY;
417 rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY;
419 GNUNET_NAMESTORE_record_create (nh[1], key, "buddy", &rd, &cont_ns, nh[1]);
421 GNUNET_CRYPTO_rsa_key_free(key);
422 GNUNET_free(keyfile);
423 bob_is_setup = GNUNET_YES;
424 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up bob done\n");
429 setup_alice (const struct GNUNET_CONFIGURATION_Handle * cfg)
432 struct GNUNET_CRYPTO_RsaPrivateKey *key;
433 struct GNUNET_NAMESTORE_RecordData rd;
435 cfg_handles[2] = GNUNET_CONFIGURATION_dup (cfg);
436 GNUNET_assert (NULL != cfg);
437 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
441 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
442 return GNUNET_SYSERR;
445 key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
449 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
450 GNUNET_free (keyfile);
451 return GNUNET_SYSERR;
454 nh[2] = GNUNET_NAMESTORE_connect (cfg_handles[2]);
457 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
458 GNUNET_CRYPTO_rsa_key_free (key);
459 GNUNET_free (keyfile);
460 return GNUNET_SYSERR;
463 rd.expiration_time = UINT64_MAX;
464 rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode);
466 rd.record_type = GNUNET_GNS_RECORD_PKEY;
467 rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY;
469 GNUNET_NAMESTORE_record_create (nh[2], key, "bob", &rd, &cont_ns, nh[2]);
471 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up alice gns\n");
472 gh = GNUNET_GNS_connect (cfg_handles[2]);
475 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to gns\n");
476 GNUNET_CRYPTO_rsa_key_free (key);
477 GNUNET_free (keyfile);
478 return GNUNET_SYSERR;
481 GNUNET_CRYPTO_rsa_key_free (key);
482 GNUNET_free (keyfile);
483 alice_is_setup = GNUNET_YES;
484 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up alice done\n");
491 if (GNUNET_SCHEDULER_NO_TASK != die_task)
492 GNUNET_SCHEDULER_cancel (die_task);
493 die_task = GNUNET_SCHEDULER_add_now (&end_badly, NULL);
498 * Callback to be called when the requested peer information is available
500 * @param cb_cls the closure from GNUNET_TETSBED_peer_get_information()
501 * @param op the operation this callback corresponds to
502 * @param pinfo the result; will be NULL if the operation has failed
503 * @param emsg error message if the operation has failed; will be NULL if the
504 * operation is successfull
507 peerinfo_cb (void *cb_cls, struct GNUNET_TESTBED_Operation *op,
508 const struct GNUNET_TESTBED_PeerInformation *pinfo,
512 GNUNET_assert (GNUNET_TESTBED_PIT_CONFIGURATION == pinfo->pit);
513 if (GNUNET_NO == dave_is_setup)
514 res = setup_dave (pinfo->result.cfg);
515 else if (GNUNET_NO == bob_is_setup)
516 res = setup_bob (pinfo->result.cfg);
518 res = setup_alice (pinfo->result.cfg);
520 if (get_cfg_ops[0] == op)
521 get_cfg_ops[0] = NULL;
522 else if (get_cfg_ops[1] == op)
523 get_cfg_ops[1] = NULL;
525 get_cfg_ops[2] = NULL;
526 GNUNET_TESTBED_operation_done (op);
528 if (GNUNET_SYSERR == res)
530 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to setup peer \n");
535 /*if (get_cfg_ops[0] == op)
537 GNUNET_assert (GNUNET_TESTBED_PIT_CONFIGURATION == pinfo->pit);
538 res = setup_dave (pinfo->result.cfg);
539 GNUNET_TESTBED_operation_done (get_cfg_ops[0]);
540 get_cfg_ops[0] = NULL;
541 if (GNUNET_SYSERR == res)
543 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to setup dave \n");
551 else if (get_cfg_ops[1] == op)
553 GNUNET_assert (GNUNET_TESTBED_PIT_CONFIGURATION == pinfo->pit);
554 res = setup_bob (pinfo->result.cfg);
555 GNUNET_TESTBED_operation_done (get_cfg_ops[1]);
556 get_cfg_ops[1] = NULL;
557 if (GNUNET_SYSERR == res)
559 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to setup dave \n");
567 else if (get_cfg_ops[2] == op)
569 GNUNET_assert (GNUNET_TESTBED_PIT_CONFIGURATION == pinfo->pit);
570 res = setup_alice (pinfo->result.cfg);
571 GNUNET_TESTBED_operation_done (get_cfg_ops[2]);
572 get_cfg_ops[2] = NULL;
573 if (GNUNET_SYSERR == res)
575 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to setup dave \n");
586 void testbed_master (void *cls,
587 unsigned int num_peers,
588 struct GNUNET_TESTBED_Peer **peers,
589 unsigned int links_succeeded,
590 unsigned int links_failed)
592 GNUNET_assert (NULL != peers);
595 setup_task = GNUNET_SCHEDULER_add_delayed (SETUP_TIMEOUT, &setup_end_badly, NULL);
598 GNUNET_assert (NULL != peers[0]);
599 get_cfg_ops[0] = GNUNET_TESTBED_peer_get_information (peers[0],
600 GNUNET_TESTBED_PIT_CONFIGURATION,
604 GNUNET_assert (NULL != peers[1]);
605 get_cfg_ops[1] = GNUNET_TESTBED_peer_get_information (peers[1],
606 GNUNET_TESTBED_PIT_CONFIGURATION,
607 &peerinfo_cb, NULL );
610 GNUNET_assert (NULL != peers[2]);
611 get_cfg_ops[2] = GNUNET_TESTBED_peer_get_information (peers[2],
612 GNUNET_TESTBED_PIT_CONFIGURATION,
617 void testbed_controller_cb (void *cls, const struct GNUNET_TESTBED_EventInformation *event)
619 static int connections = 0;
623 case GNUNET_TESTBED_ET_OPERATION_FINISHED:
624 /* This part will still be called when
625 GNUNET_TESTBED_peer_get_information() succeeds. However, the code is
626 now more relevant in operation completion callback */
628 case GNUNET_TESTBED_ET_CONNECT:
630 if (connections == 3)
632 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "All peers connected\n");
633 GNUNET_TESTBED_operation_done (topology_op);
645 main (int argc, char *argv[])
650 event_mask |= (1LL << GNUNET_TESTBED_ET_CONNECT);
651 event_mask |= (1LL << GNUNET_TESTBED_ET_OPERATION_FINISHED);
652 (void) GNUNET_TESTBED_test_run ("test_gns_dht_three_peers", "test_gns_dht_default.conf",
654 &testbed_controller_cb, NULL,
655 &testbed_master, NULL);
656 if (GNUNET_SYSERR == ok)
661 /* end of test_gns_dht_three_peers.c */