-fix for #688590: allow user to specify how to install nsslibs
[oweals/gnunet.git] / src / gns / test_gns_simple_get_authority.c
1 /*
2      This file is part of GNUnet.
3      (C) 2009 Christian Grothoff (and other contributing authors)
4
5      GNUnet is free software; you can redistribute it and/or modify
6      it under the terms of the GNU General Public License as published
7      by the Free Software Foundation; either version 3, or (at your
8      option) any later version.
9
10      GNUnet is distributed in the hope that it will be useful, but
11      WITHOUT ANY WARRANTY; without even the implied warranty of
12      MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13      General Public License for more details.
14
15      You should have received a copy of the GNU General Public License
16      along with GNUnet; see the file COPYING.  If not, write to the
17      Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18      Boston, MA 02111-1307, USA.
19 */
20 /**
21  * @file gns/test_gns_simple_shorten.c
22  * @brief basic shorten test for gns api
23  *
24  */
25 #include "platform.h"
26 #include "gnunet_testing_lib-new.h"
27 #include "gnunet_core_service.h"
28 #include "block_dns.h"
29 #include "gnunet_signatures.h"
30 #include "gnunet_namestore_service.h"
31 #include "../namestore/namestore.h"
32 #include "gnunet_dnsparser_lib.h"
33 #include "gnunet_gns_service.h"
34
35 /* DEFINES */
36 #define VERBOSE GNUNET_YES
37
38 /* Timeout for entire testcase */
39 #define TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 20)
40
41 /* If number of peers not in config file, use this number */
42 #define DEFAULT_NUM_PEERS 2
43
44 /* test records to resolve */
45 #define TEST_DOMAIN "www.alice.bob.gads"
46 #define TEST_IP "127.0.0.1"
47 #define TEST_RECORD_NAME "www"
48
49 #define TEST_AUTHORITY_BOB "bob"
50 #define TEST_AUTHORITY_ALICE "alice"
51 #define TEST_ALICE_PSEU "carol"
52 #define TEST_EXPECTED_RESULT "alice.bob.gads"
53
54 #define KEYFILE_BOB "../namestore/zonefiles/HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"
55 #define KEYFILE_ALICE "../namestore/zonefiles/N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"
56
57 /* Globals */
58
59 /* Task handle to use to schedule test failure */
60 GNUNET_SCHEDULER_TaskIdentifier die_task;
61
62 /* Global return value (0 for success, anything else for failure) */
63 static int ok;
64
65 static struct GNUNET_NAMESTORE_Handle *namestore_handle;
66
67 static struct GNUNET_GNS_Handle *gns_handle;
68
69 const struct GNUNET_CONFIGURATION_Handle *cfg;
70
71
72 /**
73  * Check if the get_handle is being used, if so stop the request.  Either
74  * way, schedule the end_badly_cont function which actually shuts down the
75  * test.
76  */
77 static void
78 end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
79 {
80   die_task = GNUNET_SCHEDULER_NO_TASK;
81   if (NULL != gns_handle)
82   {
83     GNUNET_GNS_disconnect(gns_handle);
84     gns_handle = NULL;
85   }
86
87   if (NULL != namestore_handle)
88   {
89     GNUNET_NAMESTORE_disconnect (namestore_handle);
90     namestore_handle = NULL;
91   }
92   GNUNET_break (0);
93   GNUNET_SCHEDULER_shutdown ();
94   ok = 1;
95 }
96
97 void end_badly_now ()
98 {
99   GNUNET_SCHEDULER_cancel (die_task);
100   die_task = GNUNET_SCHEDULER_add_now (&end_badly, NULL);
101 }
102
103 static void shutdown_task (void *cls,
104                            const struct GNUNET_SCHEDULER_TaskContext *tc)
105 {
106   GNUNET_GNS_disconnect(gns_handle);
107   GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Shutting down peer!\n");
108   GNUNET_SCHEDULER_shutdown ();
109 }
110
111 /**
112  * Called when gns_get_authority finishes
113  */
114 static void
115 process_auth_result(void* cls, const char* aname)
116 {
117
118   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
119               "Disconnecting from namestore\n");
120   GNUNET_NAMESTORE_disconnect (namestore_handle);
121
122   if (GNUNET_SCHEDULER_NO_TASK != die_task)
123   {
124       GNUNET_SCHEDULER_cancel (die_task);
125       die_task = GNUNET_SCHEDULER_NO_TASK;
126   }
127
128   if (aname == NULL)
129   {
130     GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
131                 "get_authority test failed!\n");
132     ok = 1;
133   }
134   else
135   {
136     GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
137                 "%s authority is %s\n", (char*)cls, aname);
138     if (0 != strcmp(aname, TEST_EXPECTED_RESULT))
139     {
140       GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
141                   "get_authority test failed! (wanted: %s got: %s\n",
142                   TEST_EXPECTED_RESULT, aname);
143       ok = 1;
144     }
145     else
146     {
147       ok = 0;
148     }
149
150     GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "get_authority test finished!\n");
151
152   }
153
154   GNUNET_SCHEDULER_add_now (&shutdown_task, NULL);
155 }
156
157
158 /**
159  * Function scheduled to be run on the successful start of services
160  * tries to shorten the name TEST_DOMAIN using gns
161  */
162 static void
163 commence_testing (void *cls, int32_t success, const char *emsg)
164 {
165
166   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
167               "Connecting to gns\n");
168   gns_handle = GNUNET_GNS_connect(cfg);
169   if (NULL == gns_handle)
170   {
171     GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
172                 "Failed to connect to gns\n");
173     end_badly_now();
174     return;
175   }
176
177   GNUNET_GNS_get_authority(gns_handle, TEST_DOMAIN, &process_auth_result,
178                      TEST_DOMAIN);
179 }
180
181
182
183 void do_check (void *cls,
184               const struct GNUNET_CONFIGURATION_Handle *ccfg,
185               struct GNUNET_TESTING_Peer *peer)
186 {
187   struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded our_pkey;
188   struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
189   struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
190   struct GNUNET_CRYPTO_RsaPrivateKey *our_key;
191   struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
192   struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
193   struct GNUNET_CRYPTO_ShortHashCode bob_hash;
194   struct GNUNET_CRYPTO_ShortHashCode alice_hash;
195   struct GNUNET_CRYPTO_RsaSignature *sig;
196   char* our_keyfile;
197
198   cfg = ccfg;
199   die_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT, &end_badly, NULL);
200   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Running test\n");
201
202   /* put records into namestore */
203   namestore_handle = GNUNET_NAMESTORE_connect(cfg);
204   if (NULL == namestore_handle)
205   {
206     GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
207     end_badly_now();
208     return;
209   }
210
211   if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
212                                                           "ZONEKEY",
213                                                           &our_keyfile))
214   {
215     GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
216     end_badly_now();
217     return;
218   }
219
220   our_key = GNUNET_CRYPTO_rsa_key_create_from_file (our_keyfile);
221   GNUNET_free(our_keyfile);
222
223   bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
224   alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_ALICE);
225
226   GNUNET_CRYPTO_rsa_key_get_public (our_key, &our_pkey);
227   GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
228   GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
229
230   struct GNUNET_NAMESTORE_RecordData rd;
231   char* ip = TEST_IP;
232   struct in_addr *web = GNUNET_malloc (sizeof(struct in_addr));
233   rd.expiration_time = UINT64_MAX;
234   GNUNET_assert (1 == inet_pton (AF_INET, ip, web));
235
236   GNUNET_CRYPTO_short_hash(&bob_pkey, sizeof(bob_pkey), &bob_hash);
237
238   rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode);
239   rd.data = &bob_hash;
240   rd.record_type = GNUNET_GNS_RECORD_PKEY;
241   rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY;
242
243   /* put bob into our zone */
244   GNUNET_NAMESTORE_record_create (namestore_handle,
245                                   our_key,
246                                   TEST_AUTHORITY_BOB,
247                                   &rd,
248                                   NULL,
249                                   NULL);
250
251   /* put alice into bobs zone */
252   GNUNET_CRYPTO_short_hash(&alice_pkey, sizeof(alice_pkey), &alice_hash);
253   rd.data = &alice_hash;
254   sig = GNUNET_NAMESTORE_create_signature(bob_key, GNUNET_TIME_UNIT_FOREVER_ABS, TEST_AUTHORITY_ALICE,
255                                           &rd, 1);
256
257   GNUNET_NAMESTORE_record_put (namestore_handle,
258                                &bob_pkey,
259                                TEST_AUTHORITY_ALICE,
260                                GNUNET_TIME_UNIT_FOREVER_ABS,
261                                1,
262                                &rd,
263                                sig,
264                                NULL,
265                                NULL);
266
267   GNUNET_free (sig);
268
269   /* put www A record and PSEU into alice's zone */
270
271   rd.data_size = sizeof(struct in_addr);
272   rd.data = web;
273   rd.record_type = GNUNET_DNSPARSER_TYPE_A;
274   sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS,  TEST_RECORD_NAME,
275                                           &rd, 1);
276
277   GNUNET_NAMESTORE_record_put (namestore_handle,
278                                &alice_pkey,
279                                TEST_RECORD_NAME,
280                                GNUNET_TIME_UNIT_FOREVER_ABS,
281                                1,
282                                &rd,
283                                sig,
284                                NULL,
285                                NULL);
286
287   rd.data_size = strlen(TEST_ALICE_PSEU);
288   rd.data = TEST_ALICE_PSEU;
289   rd.record_type = GNUNET_GNS_RECORD_PSEU;
290   GNUNET_free(sig);
291
292   sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS,  "",
293                                           &rd, 1);
294
295   GNUNET_NAMESTORE_record_put (namestore_handle,
296                                &alice_pkey,
297                                "",
298                                GNUNET_TIME_UNIT_FOREVER_ABS,
299                                1,
300                                &rd,
301                                sig,
302                                &commence_testing,
303                                NULL);
304
305   GNUNET_free (web);
306   GNUNET_free (sig);
307   GNUNET_CRYPTO_rsa_key_free (alice_key);
308   GNUNET_CRYPTO_rsa_key_free (bob_key);
309   GNUNET_CRYPTO_rsa_key_free (our_key);
310 }
311
312 int
313 main (int argc, char *argv[])
314 {
315   ok = 1;
316
317   GNUNET_log_setup ("test-gns-simple-get-authority",
318 #if VERBOSE
319                     "DEBUG",
320 #else
321                     "WARNING",
322 #endif
323                     NULL);
324
325   GNUNET_TESTING_peer_run ("test-gns-simple-get-authority", "test_gns_simple_lookup.conf", &do_check, NULL);
326
327   return ok;
328 }
329
330 /* end of test-gns-simple-get-authority.c */
331