2 This file is part of GNUnet
\r
3 (C) 2007, 2009, 2011, 2012 Christian Grothoff
\r
5 GNUnet is free software; you can redistribute it and/or modify
\r
6 it under the terms of the GNU General Public License as published
\r
7 by the Free Software Foundation; either version 2, or (at your
\r
8 option) any later version.
\r
10 GNUnet is distributed in the hope that it will be useful, but
\r
11 WITHOUT ANY WARRANTY; without even the implied warranty of
\r
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
\r
13 General Public License for more details.
\r
15 You should have received a copy of the GNU General Public License
\r
16 along with GNUnet; see the file COPYING. If not, write to the
\r
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
\r
18 Boston, MA 02111-1307, USA.
\r
22 * @file test_gnunet_vpn.c
\r
23 * @brief testcase for tunneling HTTP over the GNUnet VPN
\r
24 * @author Christian Grothoff
\r
26 #include "platform.h"
\r
27 #include <curl/curl.h>
\r
28 #include <microhttpd.h>
\r
29 #include "gnunet_vpn_service.h"
\r
30 #include "gnunet_testing_lib.h"
\r
34 #define TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 300)
\r
38 * Return value for 'main'.
\r
40 static int global_ret;
\r
42 static struct GNUNET_VPN_Handle *vpn;
\r
44 static struct MHD_Daemon *mhd;
\r
46 static GNUNET_SCHEDULER_TaskIdentifier mhd_task_id;
\r
48 static GNUNET_SCHEDULER_TaskIdentifier curl_task_id;
\r
50 static GNUNET_SCHEDULER_TaskIdentifier ctrl_c_task_id;
\r
52 static struct GNUNET_VPN_RedirectionRequest *rr;
\r
56 static CURLM *multi;
\r
61 * IP address of the ultimate destination.
\r
63 static const char *dest_ip;
\r
66 * Address family of the dest_ip.
\r
71 * Address family to use by the curl client.
\r
82 static struct CBC cbc;
\r
86 copy_buffer (void *ptr, size_t size, size_t nmemb, void *ctx)
\r
88 struct CBC *cbc = ctx;
\r
90 if (cbc->pos + size * nmemb > sizeof (cbc->buf))
\r
91 return 0; /* overflow */
\r
92 memcpy (&cbc->buf[cbc->pos], ptr, size * nmemb);
\r
93 cbc->pos += size * nmemb;
\r
94 return size * nmemb;
\r
99 mhd_ahc (void *cls, struct MHD_Connection *connection, const char *url,
\r
100 const char *method, const char *version, const char *upload_data,
\r
101 size_t * upload_data_size, void **unused)
\r
104 struct MHD_Response *response;
\r
107 if (0 != strcmp ("GET", method))
\r
108 return MHD_NO; /* unexpected method */
\r
109 if (&ptr != *unused)
\r
115 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
\r
116 "MHD sends respose for request to URL `%s'\n", url);
\r
118 MHD_create_response_from_buffer (strlen (url), (void *) url,
\r
119 MHD_RESPMEM_MUST_COPY);
\r
120 ret = MHD_queue_response (connection, MHD_HTTP_OK, response);
\r
121 MHD_destroy_response (response);
\r
131 if (mhd_task_id != GNUNET_SCHEDULER_NO_TASK)
\r
133 GNUNET_SCHEDULER_cancel (mhd_task_id);
\r
134 mhd_task_id = GNUNET_SCHEDULER_NO_TASK;
\r
136 if (curl_task_id != GNUNET_SCHEDULER_NO_TASK)
\r
138 GNUNET_SCHEDULER_cancel (curl_task_id);
\r
139 curl_task_id = GNUNET_SCHEDULER_NO_TASK;
\r
141 if (ctrl_c_task_id != GNUNET_SCHEDULER_NO_TASK)
\r
143 GNUNET_SCHEDULER_cancel (ctrl_c_task_id);
\r
144 ctrl_c_task_id = GNUNET_SCHEDULER_NO_TASK;
\r
148 MHD_stop_daemon (mhd);
\r
153 GNUNET_VPN_cancel_request (rr);
\r
158 GNUNET_VPN_disconnect (vpn);
\r
161 GNUNET_free_non_null (url);
\r
167 * Function to run the HTTP client.
\r
174 curl_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
\r
176 curl_task_id = GNUNET_SCHEDULER_NO_TASK;
\r
188 struct GNUNET_NETWORK_FDSet nrs;
\r
189 struct GNUNET_NETWORK_FDSet nws;
\r
190 struct GNUNET_TIME_Relative delay;
\r
193 struct CURLMsg *msg;
\r
199 curl_multi_perform (multi, &running);
\r
202 GNUNET_assert (NULL != (msg = curl_multi_info_read (multi, &running)));
\r
203 if (msg->msg == CURLMSG_DONE)
\r
205 if (msg->data.result != CURLE_OK)
\r
207 fprintf (stderr, "%s failed at %s:%d: `%s'\n", "curl_multi_perform",
\r
208 __FILE__, __LINE__, curl_easy_strerror (msg->data.result));
\r
212 curl_multi_remove_handle (multi, curl);
\r
213 curl_multi_cleanup (multi);
\r
214 curl_easy_cleanup (curl);
\r
217 if (cbc.pos != strlen ("/hello_world"))
\r
222 if (0 != strncmp ("/hello_world", cbc.buf, strlen ("/hello_world")))
\r
225 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
\r
226 "You might want to check if your host-based firewall is blocking the connections.\n");
\r
229 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Download complete, shutting down!\n");
\r
233 GNUNET_assert (CURLM_OK == curl_multi_fdset (multi, &rs, &ws, &es, &max));
\r
234 if ((CURLM_OK != curl_multi_timeout (multi, &timeout)) || (-1 == timeout))
\r
235 delay = GNUNET_TIME_UNIT_SECONDS;
\r
238 GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS,
\r
239 (unsigned int) timeout);
\r
240 GNUNET_NETWORK_fdset_copy_native (&nrs, &rs, max + 1);
\r
241 GNUNET_NETWORK_fdset_copy_native (&nws, &ws, max + 1);
\r
243 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT, delay,
\r
244 &nrs, &nws, &curl_task, NULL);
\r
249 * Callback invoked from the VPN service once a redirection is
\r
250 * available. Provides the IP address that can now be used to
\r
251 * reach the requested destination (in our case, the MHD server)
\r
253 * @param cls closure
\r
254 * @param af address family, AF_INET or AF_INET6; AF_UNSPEC on error;
\r
255 * will match 'result_af' from the request
\r
256 * @param address IP address (struct in_addr or struct in_addr6, depending on 'af')
\r
257 * that the VPN allocated for the redirection;
\r
258 * traffic to this IP will now be redirected to the
\r
259 * specified target peer; NULL on error
\r
262 allocation_cb (void *cls, int af, const void *address)
\r
264 char ips[INET6_ADDRSTRLEN];
\r
269 fprintf (stderr, "VPN failed to allocate appropriate address\n");
\r
270 GNUNET_SCHEDULER_shutdown ();
\r
273 GNUNET_asprintf (&url, "http://%s:%u/hello_world",
\r
274 inet_ntop (af, address, ips, sizeof (ips)),
\r
275 (unsigned int) PORT);
\r
276 curl = curl_easy_init ();
\r
277 curl_easy_setopt (curl, CURLOPT_URL, url);
\r
278 curl_easy_setopt (curl, CURLOPT_WRITEFUNCTION, ©_buffer);
\r
279 curl_easy_setopt (curl, CURLOPT_WRITEDATA, &cbc);
\r
280 curl_easy_setopt (curl, CURLOPT_FAILONERROR, 1);
\r
281 curl_easy_setopt (curl, CURLOPT_TIMEOUT, 150L);
\r
282 curl_easy_setopt (curl, CURLOPT_CONNECTTIMEOUT, 15L);
\r
283 curl_easy_setopt (curl, CURLOPT_NOSIGNAL, 1);
\r
285 multi = curl_multi_init ();
\r
286 GNUNET_assert (multi != NULL);
\r
287 GNUNET_assert (CURLM_OK == curl_multi_add_handle (multi, curl));
\r
288 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Beginning HTTP download from `%s'\n",
\r
295 * Function to keep the HTTP server running.
\r
302 mhd_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
\r
304 mhd_task_id = GNUNET_SCHEDULER_NO_TASK;
\r
311 ctrl_c_shutdown (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
\r
313 ctrl_c_task_id = GNUNET_SCHEDULER_NO_TASK;
\r
323 struct GNUNET_NETWORK_FDSet nrs;
\r
324 struct GNUNET_NETWORK_FDSet nws;
\r
329 unsigned MHD_LONG_LONG timeout;
\r
330 struct GNUNET_TIME_Relative delay;
\r
332 GNUNET_assert (GNUNET_SCHEDULER_NO_TASK == mhd_task_id);
\r
337 GNUNET_assert (MHD_YES == MHD_get_fdset (mhd, &rs, &ws, &es, &max_fd));
\r
338 if (MHD_YES == MHD_get_timeout (mhd, &timeout))
\r
340 GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS,
\r
341 (unsigned int) timeout);
\r
343 delay = GNUNET_TIME_UNIT_FOREVER_REL;
\r
344 GNUNET_NETWORK_fdset_copy_native (&nrs, &rs, max_fd + 1);
\r
345 GNUNET_NETWORK_fdset_copy_native (&nws, &ws, max_fd + 1);
\r
347 GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT, delay,
\r
348 &nrs, &nws, &mhd_task, NULL);
\r
353 run (void *cls, const struct GNUNET_CONFIGURATION_Handle *cfg,
\r
354 struct GNUNET_TESTING_Peer *peer)
\r
357 struct in6_addr v6;
\r
359 enum MHD_FLAG flags;
\r
361 vpn = GNUNET_VPN_connect (cfg);
\r
362 GNUNET_assert (NULL != vpn);
\r
363 flags = MHD_USE_DEBUG;
\r
364 if (AF_INET6 == dest_af)
\r
365 flags |= MHD_USE_IPv6;
\r
367 MHD_start_daemon (flags, PORT, NULL, NULL, &mhd_ahc, NULL,
\r
371 GNUNET_assert (NULL != mhd);
\r
377 GNUNET_assert (1 == inet_pton (dest_af, dest_ip, &v4));
\r
381 GNUNET_assert (1 == inet_pton (dest_af, dest_ip, &v6));
\r
387 rr = GNUNET_VPN_redirect_to_ip (vpn, src_af, dest_af, addr, GNUNET_YES,
\r
388 GNUNET_TIME_UNIT_FOREVER_ABS, &allocation_cb,
\r
391 GNUNET_SCHEDULER_add_delayed (TIMEOUT, &ctrl_c_shutdown, NULL);
\r
396 main (int argc, char *const *argv)
\r
404 if (0 != ACCESS ("/dev/net/tun", R_OK))
\r
406 GNUNET_log_strerror_file (GNUNET_ERROR_TYPE_ERROR, "access",
\r
408 fprintf (stderr, "WARNING: System unable to run test, skipping.\n");
\r
412 vpn_binary = GNUNET_OS_get_libexec_binary_path ("gnunet-helper-vpn");
\r
413 exit_binary = GNUNET_OS_get_libexec_binary_path ("gnunet-helper-exit");
\r
414 if ((GNUNET_YES != GNUNET_OS_check_helper_binary (vpn_binary)) ||
\r
415 (GNUNET_YES != GNUNET_OS_check_helper_binary (exit_binary)))
\r
417 GNUNET_free (vpn_binary);
\r
418 GNUNET_free (exit_binary);
\r
420 "WARNING: gnunet-helper-{exit,vpn} binaries are not SUID, refusing to run test (as it would have to fail).\n");
\r
424 GNUNET_free (vpn_binary);
\r
425 GNUNET_free (exit_binary);
\r
426 GNUNET_CRYPTO_rsa_setup_hostkey ("test_gnunet_vpn.conf");
\r
428 if (NULL != strstr (bin, "lt-"))
\r
429 bin = strstr (bin, "lt-") + 4;
\r
430 type = strstr (bin, "-");
\r
433 fprintf (stderr, "invalid binary name\n");
\r
437 /* on Windows, .exe is suffixed to these binaries,
\r
438 * thus cease comparison after the 6th char.
\r
440 if (0 == strncmp (type, "4_to_6",6))
\r
442 dest_ip = "FC5A:04E1:C2BA::1";
\r
443 dest_af = AF_INET6;
\r
446 else if (0 == strncmp (type, "6_to_4",6))
\r
448 dest_ip = "169.254.86.1";
\r
452 else if (0 == strncmp (type, "4_over",6))
\r
454 dest_ip = "169.254.86.1";
\r
458 else if (0 == strncmp (type, "6_over",6))
\r
460 dest_ip = "FC5A:04E1:C2BA::1";
\r
461 dest_af = AF_INET6;
\r
466 fprintf (stderr, "invalid binary suffix `%s'\n", type);
\r
469 if ((GNUNET_OK != GNUNET_NETWORK_test_pf (src_af)) ||
\r
470 (GNUNET_OK != GNUNET_NETWORK_test_pf (dest_af)))
\r
473 "Required address families not supported by this system, skipping test.\n");
\r
476 if (0 != curl_global_init (CURL_GLOBAL_WIN32))
\r
478 fprintf (stderr, "failed to initialize curl\n");
\r
482 GNUNET_TESTING_peer_run ("test-gnunet-vpn", "test_gnunet_vpn.conf", &run,
\r
485 GNUNET_DISK_directory_remove ("/tmp/gnunet-test-vpn");
\r
489 /* end of test_gnunet_vpn.c */
\r