uncrustify as demanded.
[oweals/gnunet.git] / src / gns / test_gns_proxy.c
1 /*
2      This file is part of GNUnet
3      Copyright (C) 2007, 2009, 2011, 2012 Christian Grothoff
4
5      GNUnet is free software: you can redistribute it and/or modify it
6      under the terms of the GNU Affero General Public License as published
7      by the Free Software Foundation, either version 3 of the License,
8      or (at your option) any later version.
9
10      GNUnet is distributed in the hope that it will be useful, but
11      WITHOUT ANY WARRANTY; without even the implied warranty of
12      MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13      Affero General Public License for more details.
14
15      You should have received a copy of the GNU Affero General Public License
16      along with this program.  If not, see <http://www.gnu.org/licenses/>.
17
18      SPDX-License-Identifier: AGPL3.0-or-later
19  */
20
21 /**
22  * @file test_gns_proxy.c
23  * @brief testcase for accessing SOCKS5 GNS proxy
24  * @author Martin Schanzenbach
25  */
26 #include "platform.h"
27 /* Just included for the right curl.h */
28 #include "gnunet_curl_lib.h"
29 #include <microhttpd.h>
30 #include "gnunet_util_lib.h"
31 #include "gnutls/x509.h"
32
33 /**
34  * Largest allowed size for a PEM certificate.
35  */
36 #define MAX_PEM_SIZE (10 * 1024)
37
38 #define TEST_DOMAIN "www.test"
39
40 #define TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 300)
41
42 /**
43  * Return value for 'main'.
44  */
45 static int global_ret;
46
47
48 static struct MHD_Daemon *mhd;
49
50 static struct GNUNET_SCHEDULER_Task *mhd_task_id;
51
52 static struct GNUNET_SCHEDULER_Task *curl_task_id;
53
54 static CURL *curl;
55
56 static CURLM *multi;
57
58 static char *url;
59
60 static struct GNUNET_OS_Process *proxy_proc;
61
62 static char* cafile_opt;
63
64 static char* cafile_srv;
65
66 static uint16_t port;
67
68 static gnutls_x509_crt_t proxy_cert;
69
70 static gnutls_x509_privkey_t proxy_key;
71
72 struct CBC {
73   char buf[1024];
74   size_t pos;
75 };
76
77 static struct CBC cbc;
78
79 /**
80  * Read file in filename
81  *
82  * @param filename file to read
83  * @param size pointer where filesize is stored
84  * @return NULL on error
85  */
86 static void*
87 load_file(const char* filename,
88           unsigned int* size)
89 {
90   void *buffer;
91   uint64_t fsize;
92
93   if (GNUNET_OK !=
94       GNUNET_DISK_file_size(filename,
95                             &fsize,
96                             GNUNET_YES,
97                             GNUNET_YES))
98     return NULL;
99   if (fsize > MAX_PEM_SIZE)
100     return NULL;
101   *size = (unsigned int)fsize;
102   buffer = GNUNET_malloc(*size);
103   if (fsize !=
104       GNUNET_DISK_fn_read(filename,
105                           buffer,
106                           (size_t)fsize))
107     {
108       GNUNET_free(buffer);
109       return NULL;
110     }
111   return buffer;
112 }
113
114 /**
115  * Load PEM key from file
116  *
117  * @param key where to store the data
118  * @param keyfile path to the PEM file
119  * @return #GNUNET_OK on success
120  */
121 static int
122 load_key_from_file(gnutls_x509_privkey_t key,
123                    const char* keyfile)
124 {
125   gnutls_datum_t key_data;
126   int ret;
127
128   key_data.data = load_file(keyfile,
129                             &key_data.size);
130   if (NULL == key_data.data)
131     return GNUNET_SYSERR;
132   ret = gnutls_x509_privkey_import(key, &key_data,
133                                    GNUTLS_X509_FMT_PEM);
134   if (GNUTLS_E_SUCCESS != ret)
135     {
136       GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
137                  _("Unable to import private key from file `%s'\n"),
138                  keyfile);
139     }
140   GNUNET_free_non_null(key_data.data);
141   return (GNUTLS_E_SUCCESS != ret) ? GNUNET_SYSERR : GNUNET_OK;
142 }
143
144 /**
145  * Load cert from file
146  *
147  * @param crt struct to store data in
148  * @param certfile path to pem file
149  * @return #GNUNET_OK on success
150  */
151 static int
152 load_cert_from_file(gnutls_x509_crt_t crt,
153                     const char* certfile)
154 {
155   gnutls_datum_t cert_data;
156   int ret;
157
158   cert_data.data = load_file(certfile,
159                              &cert_data.size);
160   if (NULL == cert_data.data)
161     return GNUNET_SYSERR;
162   ret = gnutls_x509_crt_import(crt,
163                                &cert_data,
164                                GNUTLS_X509_FMT_PEM);
165   if (GNUTLS_E_SUCCESS != ret)
166     {
167       GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
168                  _("Unable to import certificate from `%s'\n"),
169                  certfile);
170     }
171   GNUNET_free_non_null(cert_data.data);
172   return (GNUTLS_E_SUCCESS != ret) ? GNUNET_SYSERR : GNUNET_OK;
173 }
174
175 static size_t
176 copy_buffer(void *ptr, size_t size, size_t nmemb, void *ctx)
177 {
178   struct CBC *cbc = ctx;
179
180   if (cbc->pos + size * nmemb > sizeof(cbc->buf))
181     return 0;                   /* overflow */
182   GNUNET_memcpy(&cbc->buf[cbc->pos], ptr, size * nmemb);
183   cbc->pos += size * nmemb;
184   return size * nmemb;
185 }
186
187
188 static int
189 mhd_ahc(void *cls,
190         struct MHD_Connection *connection,
191         const char *url,
192         const char *method,
193         const char *version,
194         const char *upload_data, size_t *upload_data_size,
195         void **unused)
196 {
197   static int ptr;
198   struct MHD_Response *response;
199   int ret;
200
201   if (0 != strcmp("GET", method))
202     return MHD_NO;              /* unexpected method */
203   if (&ptr != *unused)
204     {
205       *unused = &ptr;
206       return MHD_YES;
207     }
208   *unused = NULL;
209   GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "MHD sends respose for request to URL `%s'\n", url);
210   response = MHD_create_response_from_buffer(strlen(url),
211                                              (void *)url,
212                                              MHD_RESPMEM_MUST_COPY);
213   ret = MHD_queue_response(connection, MHD_HTTP_OK, response);
214   MHD_destroy_response(response);
215   if (ret == MHD_NO)
216     {
217       global_ret = 1;
218       abort();
219     }
220   global_ret = 0;
221   return ret;
222 }
223
224
225 static void
226 do_shutdown()
227 {
228   if (mhd_task_id != NULL)
229     {
230       GNUNET_SCHEDULER_cancel(mhd_task_id);
231       mhd_task_id = NULL;
232     }
233   if (curl_task_id != NULL)
234     {
235       GNUNET_SCHEDULER_cancel(curl_task_id);
236       curl_task_id = NULL;
237     }
238   if (NULL != mhd)
239     {
240       MHD_stop_daemon(mhd);
241       mhd = NULL;
242     }
243   GNUNET_free_non_null(url);
244
245   if (NULL != proxy_proc)
246     {
247       (void)GNUNET_OS_process_kill(proxy_proc, SIGKILL);
248       GNUNET_assert(GNUNET_OK == GNUNET_OS_process_wait(proxy_proc));
249       GNUNET_OS_process_destroy(proxy_proc);
250       proxy_proc = NULL;
251     }
252   url = NULL;
253   GNUNET_SCHEDULER_shutdown();
254 }
255
256
257 /**
258  * Function to run the HTTP client.
259  */
260 static void
261 curl_main(void);
262
263
264 static void
265 curl_task(void *cls)
266 {
267   curl_task_id = NULL;
268   curl_main();
269 }
270
271
272 static void
273 curl_main()
274 {
275   fd_set rs;
276   fd_set ws;
277   fd_set es;
278   int max;
279   struct GNUNET_NETWORK_FDSet nrs;
280   struct GNUNET_NETWORK_FDSet nws;
281   struct GNUNET_TIME_Relative delay;
282   long timeout;
283   int running;
284   struct CURLMsg *msg;
285
286   max = 0;
287   FD_ZERO(&rs);
288   FD_ZERO(&ws);
289   FD_ZERO(&es);
290   curl_multi_perform(multi, &running);
291   if (running == 0)
292     {
293       GNUNET_assert(NULL != (msg = curl_multi_info_read(multi, &running)));
294       if (msg->msg == CURLMSG_DONE)
295         {
296           if (msg->data.result != CURLE_OK)
297             {
298               fprintf(stderr,
299                       "%s failed at %s:%d: `%s'\n",
300                       "curl_multi_perform",
301                       __FILE__,
302                       __LINE__, curl_easy_strerror(msg->data.result));
303               global_ret = 1;
304             }
305         }
306       curl_multi_remove_handle(multi, curl);
307       curl_multi_cleanup(multi);
308       curl_easy_cleanup(curl);
309       curl = NULL;
310       multi = NULL;
311       if (cbc.pos != strlen("/hello_world"))
312         {
313           GNUNET_break(0);
314           global_ret = 2;
315         }
316       if (0 != strncmp("/hello_world", cbc.buf, strlen("/hello_world")))
317         {
318           GNUNET_break(0);
319           global_ret = 3;
320         }
321       GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Download complete, shutting down!\n");
322       do_shutdown();
323       return;
324     }
325   GNUNET_assert(CURLM_OK == curl_multi_fdset(multi, &rs, &ws, &es, &max));
326   if ((CURLM_OK != curl_multi_timeout(multi, &timeout)) ||
327       (-1 == timeout))
328     delay = GNUNET_TIME_UNIT_SECONDS;
329   else
330     delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS, (unsigned int)timeout);
331   GNUNET_NETWORK_fdset_copy_native(&nrs,
332                                    &rs,
333                                    max + 1);
334   GNUNET_NETWORK_fdset_copy_native(&nws,
335                                    &ws,
336                                    max + 1);
337   curl_task_id = GNUNET_SCHEDULER_add_select(GNUNET_SCHEDULER_PRIORITY_DEFAULT,
338                                              delay,
339                                              &nrs,
340                                              &nws,
341                                              &curl_task,
342                                              NULL);
343 }
344
345
346 static void
347 start_curl(void *cls)
348 {
349   curl_task_id = NULL;
350   GNUNET_asprintf(&url,
351                   "https://%s:%d/hello_world",
352                   TEST_DOMAIN, port);
353   curl = curl_easy_init();
354   curl_easy_setopt(curl, CURLOPT_URL, url);
355   //curl_easy_setopt (curl, CURLOPT_URL, "https://127.0.0.1:8443/hello_world");
356   curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, &copy_buffer);
357   curl_easy_setopt(curl, CURLOPT_WRITEDATA, &cbc);
358   curl_easy_setopt(curl, CURLOPT_FAILONERROR, 1);
359   curl_easy_setopt(curl, CURLOPT_TIMEOUT, 150L);
360   curl_easy_setopt(curl, CURLOPT_CONNECTTIMEOUT, 15L);
361   curl_easy_setopt(curl, CURLOPT_NOSIGNAL, 1);
362   curl_easy_setopt(curl, CURLOPT_CAINFO, cafile_opt);
363   //curl_easy_setopt (curl, CURLOPT_SSL_VERIFYPEER, 0L);
364   //curl_easy_setopt (curl, CURLOPT_SSL_VERIFYHOST, 0L);
365   curl_easy_setopt(curl, CURLOPT_PROXY, "socks5h://127.0.0.1:7777");
366
367   multi = curl_multi_init();
368   GNUNET_assert(multi != NULL);
369   GNUNET_assert(CURLM_OK == curl_multi_add_handle(multi, curl));
370   GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
371              "Beginning HTTP download from `%s'\n",
372              url);
373   curl_main();
374 }
375
376
377 /**
378  * Callback invoked from the namestore service once record is
379  * created.
380  *
381  * @param cls closure
382  * @param af address family, AF_INET or AF_INET6; AF_UNSPEC on error;
383  *                will match 'result_af' from the request
384  * @param address IP address (struct in_addr or struct in_addr6, depending on 'af')
385  *                that the VPN allocated for the redirection;
386  *                traffic to this IP will now be redirected to the
387  *                specified target peer; NULL on error
388  */
389 static void
390 commence_testing(void *cls)
391 {
392   curl_task_id =
393     GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_UNIT_SECONDS,
394                                  &start_curl,
395                                  NULL);
396 }
397
398
399 /**
400  * Function to keep the HTTP server running.
401  */
402 static void
403 mhd_main(void);
404
405
406 static void
407 mhd_task(void *cls)
408 {
409   mhd_task_id = NULL;
410   MHD_run(mhd);
411   mhd_main();
412 }
413
414
415 static void
416 mhd_main()
417 {
418   struct GNUNET_NETWORK_FDSet nrs;
419   struct GNUNET_NETWORK_FDSet nws;
420   fd_set rs;
421   fd_set ws;
422   fd_set es;
423   int max_fd;
424   unsigned MHD_LONG_LONG timeout;
425   struct GNUNET_TIME_Relative delay;
426
427   GNUNET_assert(NULL == mhd_task_id);
428   FD_ZERO(&rs);
429   FD_ZERO(&ws);
430   FD_ZERO(&es);
431   max_fd = -1;
432   GNUNET_assert(MHD_YES ==
433                 MHD_get_fdset(mhd, &rs, &ws, &es, &max_fd));
434   if (MHD_YES == MHD_get_timeout(mhd, &timeout))
435     delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS,
436                                           (unsigned int)timeout);
437   else
438     delay = GNUNET_TIME_UNIT_FOREVER_REL;
439   GNUNET_NETWORK_fdset_copy_native(&nrs,
440                                    &rs,
441                                    max_fd + 1);
442   GNUNET_NETWORK_fdset_copy_native(&nws,
443                                    &ws,
444                                    max_fd + 1);
445   mhd_task_id = GNUNET_SCHEDULER_add_select(GNUNET_SCHEDULER_PRIORITY_DEFAULT,
446                                             delay,
447                                             &nrs,
448                                             &nws,
449                                             &mhd_task,
450                                             NULL);
451 }
452
453
454 /**
455  * Main function that will be run
456  *
457  * @param cls closure
458  * @param args remaining command-line arguments
459  * @param cfgfile name of the configuration file used (for saving, can be NULL!)
460  * @param c configuration
461  */
462 static void
463 run(void *cls,
464     char *const *args,
465     const char *cfgfile,
466     const struct GNUNET_CONFIGURATION_Handle *c)
467 {
468   GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
469              "Using `%s' as CA\n",
470              cafile_srv);
471   char cert[MAX_PEM_SIZE];
472   char key[MAX_PEM_SIZE];
473   size_t key_buf_size;
474   size_t cert_buf_size;
475
476   gnutls_global_init();
477   gnutls_x509_crt_init(&proxy_cert);
478   gnutls_x509_privkey_init(&proxy_key);
479
480   if ((GNUNET_OK !=
481        load_cert_from_file(proxy_cert,
482                            cafile_srv)) ||
483       (GNUNET_OK !=
484        load_key_from_file(proxy_key,
485                           cafile_srv)))
486     {
487       GNUNET_log(GNUNET_ERROR_TYPE_ERROR,
488                  _("Failed to load X.509 key and certificate from `%s'\n"),
489                  cafile_srv);
490       gnutls_x509_crt_deinit(proxy_cert);
491       gnutls_x509_privkey_deinit(proxy_key);
492       gnutls_global_deinit();
493       return;
494     }
495   GNUNET_SCHEDULER_add_shutdown(&do_shutdown,
496                                 NULL);
497   key_buf_size = sizeof(key);
498   cert_buf_size = sizeof(cert);
499   gnutls_x509_crt_export(proxy_cert,
500                          GNUTLS_X509_FMT_PEM,
501                          cert,
502                          &cert_buf_size);
503   gnutls_x509_privkey_export(proxy_key,
504                              GNUTLS_X509_FMT_PEM,
505                              key,
506                              &key_buf_size);
507   mhd = MHD_start_daemon(MHD_USE_DEBUG | MHD_USE_SSL | MHD_ALLOW_SUSPEND_RESUME, port,
508                          NULL, NULL,
509                          &mhd_ahc, NULL,
510                          MHD_OPTION_HTTPS_MEM_KEY, key,
511                          MHD_OPTION_HTTPS_MEM_CERT, cert,
512                          MHD_OPTION_END);
513   GNUNET_assert(NULL != mhd);
514   mhd_main();
515
516   GNUNET_SCHEDULER_add_now(&commence_testing,
517                            NULL);
518 }
519
520 int
521 main(int argc, char *const *argv)
522 {
523   struct GNUNET_GETOPT_CommandLineOption options[] = {
524     GNUNET_GETOPT_option_uint16('p',
525                                 "port",
526                                 NULL,
527                                 gettext_noop("listen on specified port (default: 7777)"),
528                                 &port),
529     GNUNET_GETOPT_option_string('A',
530                                 "curlcert",
531                                 NULL,
532                                 gettext_noop("pem file to use as CA"),
533                                 &cafile_opt),
534     GNUNET_GETOPT_option_string('S',
535                                 "servercert",
536                                 NULL,
537                                 gettext_noop("pem file to use for the server"),
538                                 &cafile_srv),
539
540     GNUNET_GETOPT_OPTION_END
541   };
542
543   if (0 != curl_global_init(CURL_GLOBAL_WIN32))
544     {
545       fprintf(stderr, "failed to initialize curl\n");
546       return 2;
547     }
548   if (GNUNET_OK !=
549       GNUNET_STRINGS_get_utf8_args(argc, argv,
550                                    &argc, &argv))
551     return 2;
552   GNUNET_log_setup("gnunet-gns-proxy-test",
553                    "WARNING",
554                    NULL);
555   if (GNUNET_OK != GNUNET_PROGRAM_run(argc, argv,
556                                       "gnunet-gns-proxy-test",
557                                       _("GNUnet GNS proxy test"),
558                                       options,
559                                       &run, NULL))
560     return 1;
561   GNUNET_free_non_null((char *)argv);
562   return global_ret;
563 }
564
565 /* end of test_gns_proxy.c */