-fix uninit and fix leak
[oweals/gnunet.git] / src / gns / test_gns_simple_get_authority.c
1 /*
2      This file is part of GNUnet.
3      (C) 2009 Christian Grothoff (and other contributing authors)
4
5      GNUnet is free software; you can redistribute it and/or modify
6      it under the terms of the GNU General Public License as published
7      by the Free Software Foundation; either version 3, or (at your
8      option) any later version.
9
10      GNUnet is distributed in the hope that it will be useful, but
11      WITHOUT ANY WARRANTY; without even the implied warranty of
12      MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13      General Public License for more details.
14
15      You should have received a copy of the GNU General Public License
16      along with GNUnet; see the file COPYING.  If not, write to the
17      Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18      Boston, MA 02111-1307, USA.
19 */
20 /**
21  * @file gns/test_gns_simple_get_authority.c
22  * @brief basic shorten test for gns api
23  *
24  */
25 #include "platform.h"
26 #include "gnunet_testing_lib.h"
27 #include "gnunet_core_service.h"
28 #include "block_dns.h"
29 #include "gnunet_signatures.h"
30 #include "gnunet_namestore_service.h"
31 #include "../namestore/namestore.h"
32 #include "gnunet_dnsparser_lib.h"
33 #include "gnunet_gns_service.h"
34
35 /* Timeout for entire testcase */
36 #define TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 20)
37
38 /* test records to resolve */
39 #define TEST_DOMAIN "www.alice.bob.gads"
40 #define TEST_IP "127.0.0.1"
41 #define TEST_RECORD_NAME "www"
42
43 #define TEST_AUTHORITY_BOB "bob"
44 #define TEST_AUTHORITY_ALICE "alice"
45 #define TEST_ALICE_PSEU "carol"
46 #define TEST_EXPECTED_RESULT "alice.bob.gads"
47
48 #define KEYFILE_BOB "../namestore/zonefiles/HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"
49 #define KEYFILE_ALICE "../namestore/zonefiles/N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"
50
51 /* Globals */
52
53 /* Task handle to use to schedule test failure */
54 GNUNET_SCHEDULER_TaskIdentifier die_task;
55
56 /* Global return value (0 for success, anything else for failure) */
57 static int ok;
58
59 static struct GNUNET_NAMESTORE_Handle *namestore_handle;
60
61 static struct GNUNET_GNS_Handle *gns_handle;
62
63 const struct GNUNET_CONFIGURATION_Handle *cfg;
64
65
66 /**
67  * Check if the get_handle is being used, if so stop the request.  Either
68  * way, schedule the end_badly_cont function which actually shuts down the
69  * test.
70  */
71 static void
72 end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
73 {
74   die_task = GNUNET_SCHEDULER_NO_TASK;
75   if (NULL != gns_handle)
76   {
77     GNUNET_GNS_disconnect(gns_handle);
78     gns_handle = NULL;
79   }
80
81   if (NULL != namestore_handle)
82   {
83     GNUNET_NAMESTORE_disconnect (namestore_handle);
84     namestore_handle = NULL;
85   }
86   GNUNET_break (0);
87   GNUNET_SCHEDULER_shutdown ();
88   ok = 1;
89 }
90
91 void end_badly_now ()
92 {
93   GNUNET_SCHEDULER_cancel (die_task);
94   die_task = GNUNET_SCHEDULER_add_now (&end_badly, NULL);
95 }
96
97 static void shutdown_task (void *cls,
98                            const struct GNUNET_SCHEDULER_TaskContext *tc)
99 {
100   GNUNET_GNS_disconnect(gns_handle);
101   GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Shutting down peer!\n");
102   GNUNET_SCHEDULER_shutdown ();
103 }
104
105 /**
106  * Called when gns_get_authority finishes
107  */
108 static void
109 process_auth_result(void* cls, const char* aname)
110 {
111
112   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
113               "Disconnecting from namestore\n");
114   GNUNET_NAMESTORE_disconnect (namestore_handle);
115
116   if (GNUNET_SCHEDULER_NO_TASK != die_task)
117   {
118       GNUNET_SCHEDULER_cancel (die_task);
119       die_task = GNUNET_SCHEDULER_NO_TASK;
120   }
121
122   if (aname == NULL)
123   {
124     GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
125                 "get_authority test failed!\n");
126     ok = 1;
127   }
128   else
129   {
130     GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
131                 "%s authority is %s\n", (char*)cls, aname);
132     if (0 != strcmp(aname, TEST_EXPECTED_RESULT))
133     {
134       GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
135                   "get_authority test failed! (wanted: %s got: %s\n",
136                   TEST_EXPECTED_RESULT, aname);
137       ok = 1;
138     }
139     else
140     {
141       ok = 0;
142     }
143
144     GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "get_authority test finished!\n");
145
146   }
147
148   GNUNET_SCHEDULER_add_now (&shutdown_task, NULL);
149 }
150
151
152 /**
153  * Function scheduled to be run on the successful start of services
154  * tries to shorten the name TEST_DOMAIN using gns
155  */
156 static void
157 commence_testing (void *cls, int32_t success, const char *emsg)
158 {
159
160   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
161               "Connecting to gns\n");
162   gns_handle = GNUNET_GNS_connect(cfg);
163   if (NULL == gns_handle)
164   {
165     GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
166                 "Failed to connect to gns\n");
167     end_badly_now();
168     return;
169   }
170
171   GNUNET_GNS_get_authority(gns_handle, TEST_DOMAIN, &process_auth_result,
172                      TEST_DOMAIN);
173 }
174
175
176
177 void do_check (void *cls,
178               const struct GNUNET_CONFIGURATION_Handle *ccfg,
179               struct GNUNET_TESTING_Peer *peer)
180 {
181   struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded our_pkey;
182   struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
183   struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
184   struct GNUNET_CRYPTO_EccPrivateKey *our_key;
185   struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
186   struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
187   struct GNUNET_CRYPTO_ShortHashCode bob_hash;
188   struct GNUNET_CRYPTO_ShortHashCode alice_hash;
189   struct GNUNET_CRYPTO_EccSignature *sig;
190   char* our_keyfile;
191
192   cfg = ccfg;
193   die_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT, &end_badly, NULL);
194   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Running test\n");
195
196   /* put records into namestore */
197   namestore_handle = GNUNET_NAMESTORE_connect(cfg);
198   if (NULL == namestore_handle)
199   {
200     GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
201     end_badly_now();
202     return;
203   }
204
205   if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
206                                                           "ZONEKEY",
207                                                           &our_keyfile))
208   {
209     GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
210     end_badly_now();
211     return;
212   }
213
214   our_key = GNUNET_CRYPTO_ecc_key_create_from_file (our_keyfile);
215   GNUNET_free(our_keyfile);
216
217   bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
218   alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_ALICE);
219
220   GNUNET_CRYPTO_ecc_key_get_public (our_key, &our_pkey);
221   GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
222   GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
223
224   struct GNUNET_NAMESTORE_RecordData rd;
225   char* ip = TEST_IP;
226   struct in_addr *web = GNUNET_malloc (sizeof(struct in_addr));
227   rd.expiration_time = UINT64_MAX;
228   GNUNET_assert (1 == inet_pton (AF_INET, ip, web));
229
230   GNUNET_CRYPTO_short_hash(&bob_pkey, sizeof(bob_pkey), &bob_hash);
231
232   rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode);
233   rd.data = &bob_hash;
234   rd.record_type = GNUNET_GNS_RECORD_PKEY;
235   rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY;
236
237   /* put bob into our zone */
238   GNUNET_NAMESTORE_record_put_by_authority (namestore_handle,
239                                             our_key,
240                                             TEST_AUTHORITY_BOB,
241                                             1, &rd,
242                                             NULL,
243                                             NULL);
244
245   /* put alice into bobs zone */
246   GNUNET_CRYPTO_short_hash(&alice_pkey, sizeof(alice_pkey), &alice_hash);
247   rd.data = &alice_hash;
248   sig = GNUNET_NAMESTORE_create_signature(bob_key, GNUNET_TIME_UNIT_FOREVER_ABS, TEST_AUTHORITY_ALICE,
249                                           &rd, 1);
250
251   GNUNET_NAMESTORE_record_put (namestore_handle,
252                                &bob_pkey,
253                                TEST_AUTHORITY_ALICE,
254                                GNUNET_TIME_UNIT_FOREVER_ABS,
255                                1,
256                                &rd,
257                                sig,
258                                NULL,
259                                NULL);
260
261   GNUNET_free (sig);
262
263   /* put www A record and PSEU into alice's zone */
264
265   rd.data_size = sizeof(struct in_addr);
266   rd.data = web;
267   rd.record_type = GNUNET_DNSPARSER_TYPE_A;
268   sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS,  TEST_RECORD_NAME,
269                                           &rd, 1);
270
271   GNUNET_NAMESTORE_record_put (namestore_handle,
272                                &alice_pkey,
273                                TEST_RECORD_NAME,
274                                GNUNET_TIME_UNIT_FOREVER_ABS,
275                                1,
276                                &rd,
277                                sig,
278                                NULL,
279                                NULL);
280
281   rd.data_size = strlen(TEST_ALICE_PSEU);
282   rd.data = TEST_ALICE_PSEU;
283   rd.record_type = GNUNET_GNS_RECORD_PSEU;
284   GNUNET_free(sig);
285
286   sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS,  "",
287                                           &rd, 1);
288
289   GNUNET_NAMESTORE_record_put (namestore_handle,
290                                &alice_pkey,
291                                "",
292                                GNUNET_TIME_UNIT_FOREVER_ABS,
293                                1,
294                                &rd,
295                                sig,
296                                &commence_testing,
297                                NULL);
298
299   GNUNET_free (web);
300   GNUNET_free (sig);
301   GNUNET_CRYPTO_ecc_key_free (alice_key);
302   GNUNET_CRYPTO_ecc_key_free (bob_key);
303   GNUNET_CRYPTO_ecc_key_free (our_key);
304 }
305
306
307 int
308 main (int argc, char *argv[])
309 {
310   ok = 1;
311   GNUNET_log_setup ("test-gns-simple-get-authority",
312                     "WARNING",
313                     NULL);
314   GNUNET_TESTING_peer_run ("test-gns-simple-get-authority",
315                            "test_gns_simple_lookup.conf", 
316                            &do_check, NULL);
317   return ok;
318 }
319
320 /* end of test-gns-simple-get-authority.c */
321