more hacking on nat test code
authorChristian Grothoff <christian@grothoff.org>
Fri, 1 Jul 2011 14:17:34 +0000 (14:17 +0000)
committerChristian Grothoff <christian@grothoff.org>
Fri, 1 Jul 2011 14:17:34 +0000 (14:17 +0000)
src/include/gnunet_nat_lib.h
src/nat/nat.c
src/nat/nat_test.c

index 07f6ca5e83c21a5693807cb283d502c92b929c84..1eb8b57034f36ba071535668dee21fe70c2332d2 100644 (file)
@@ -162,7 +162,7 @@ typedef void (*GNUNET_NAT_TestCallback)(void *cls,
  *
  * @param cfg configuration for the NAT traversal
  * @param is_tcp GNUNET_YES to test TCP, GNUNET_NO to test UDP
- * @param bnd_port port to bind to
+ * @param bnd_port port to bind to, 0 for connection reversal
  * @param adv_port externally advertised port to use
  * @param report function to call with the result of the test
  * @param report_cls closure for report
index e708cdabf154244ec5eb03b7e4d9017716f416f2..4e78c5d24743e694d7fd173b57b81c3a52c1f737 100644 (file)
@@ -331,10 +331,11 @@ remove_from_address_list_by_source (struct GNUNET_NAT_Handle *h,
       GNUNET_CONTAINER_DLL_remove (h->lal_head,
                                   h->lal_tail,
                                   pos);
-      h->address_callback (h->callback_cls,
-                          GNUNET_NO,
-                          (const struct sockaddr* ) &pos[1],
-                          pos->addrlen);
+      if (NULL != h->address_callback)
+       h->address_callback (h->callback_cls,
+                            GNUNET_NO,
+                            (const struct sockaddr* ) &pos[1],
+                            pos->addrlen);
       GNUNET_free (pos);
     }
 }
@@ -369,10 +370,11 @@ add_to_address_list_as_is (struct GNUNET_NAT_Handle *h,
                   "Adding address `%s' from source %d\n",
                   GNUNET_a2s (arg, arg_size),
                   src);
-  h->address_callback (h->callback_cls,
-                      GNUNET_YES,
-                      arg,
-                      arg_size);
+  if (NULL != h->address_callback)
+    h->address_callback (h->callback_cls,
+                        GNUNET_YES,
+                        arg,
+                        arg_size);
 }
 
 
@@ -1273,10 +1275,11 @@ GNUNET_NAT_unregister (struct GNUNET_NAT_Handle *h)
       GNUNET_CONTAINER_DLL_remove (h->lal_head,
                                   h->lal_tail,
                                   lal);
-      h->address_callback (h->callback_cls,
-                          GNUNET_NO,
-                          (const struct sockaddr*) &lal[1],
-                          lal->addrlen);
+      if (NULL != h->address_callback)
+       h->address_callback (h->callback_cls,
+                            GNUNET_NO,
+                            (const struct sockaddr*) &lal[1],
+                            lal->addrlen);
       GNUNET_free (lal);
     }
   for (i=0;i<h->num_local_addrs;i++)   
index f31c5059d3be71b7f0d48abdb8095a97ea646642..a8bf227a03422cccec4396aa7c3eb994c605cb0b 100644 (file)
 #include "gnunet_nat_lib.h"
 #include "nat.h"
 
+/**
+ *
+ */
+struct NatActivity
+{
+  /**
+   *
+   */
+  struct NatActivity *next;
+
+  /**
+   *
+   */
+  struct NatActivity *prev;
+
+  /**
+   *
+   */
+  struct GNUNET_NETWORK_Handle *sock;
+
+  /**
+   *
+   */
+  struct GNUNET_NAT_Test *h;
+
+  /**
+   *
+   */
+  GNUNET_SCHEDULER_TaskIdentifier rtask;
+};
 
 /**
  * Handle to a NAT test.
  */
 struct GNUNET_NAT_Test
 {
+
+  /**
+   *
+   */
+  const struct GNUNET_CONFIGURATION_Handle *cfg;
+
+  /**
+   *
+   */
   GNUNET_NAT_TestCallback report;
   
+  /**
+   *
+   */
   void *report_cls;
+
+  /**
+   *
+   */
+  struct GNUNET_NAT_Handle *nat;
+
+  /**
+   *
+   */
+  struct GNUNET_NETWORK_Handle *lsock;
+
+  /**
+   *
+   */
+  struct NatActivity *head;
+
+  /**
+   *
+   */
+  struct NatActivity *tail;
+
+  /**
+   *
+   */
+  GNUNET_SCHEDULER_TaskIdentifier ltask;
+
+  /**
+   *
+   */
+  int is_tcp;
+
+  /**
+   *
+   */
+  uint16_t data;
+
+  /**
+   *
+   */
+  uint16_t adv_port;
+
 };
 
 
+/**
+ * Function called from GNUNET_NAT_register
+ * whenever someone asks us to do connection
+ * reversal.
+ *
+ * @param cls closure, our 'struct GNUNET_NAT_Handle'
+ * @param addr public IP address of the other peer
+ * @param addrlen actual lenght of the address
+ */
+static void
+reversal_cb (void *cls, 
+            const struct sockaddr *addr,
+            socklen_t addrlen)
+{
+  struct GNUNET_NAT_Test *h = cls;
+  const struct sockaddr_in *sa;
+
+  if (addrlen != sizeof (struct sockaddr_in))
+    return;
+  sa = (const struct sockaddr_in *) addr;
+  if (h->data != sa->sin_port)
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+                 "Received connection reversal request for wrong port\n");
+      return; /* wrong port */
+    }
+  /* report success */
+  h->report (h->report_cls, GNUNET_OK);
+}
+
+
+/**
+ * Activity on our incoming socket.  Read data from the
+ * incoming connection.
+ *
+ * @param cls the 'struct NatActivity'
+ * @param tc scheduler context
+ */
+static void
+do_read (void *cls,
+        const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct NatActivity *na = cls;
+  struct GNUNET_NAT_Test *tst;
+
+  na->rtask = GNUNET_SCHEDULER_NO_TASK;
+  tst = na->h;
+  GNUNET_CONTAINER_DLL_remove (tst->head,
+                              tst->tail,
+                              na);
+  if (1)
+    {
+      // fimxe: read from socket...
+    }
+  GNUNET_NETWORK_socket_close (na->sock);
+  GNUNET_free (na);
+}
+
+
+/**
+ * Activity on our listen socket. Accept the
+ * incoming connection.
+ *
+ * @param cls the 'struct GNUNET_NAT_Test'
+ * @param tc scheduler context
+ */
+static void
+do_accept (void *cls,
+          const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct GNUNET_NAT_Test *tst = cls;
+  struct GNUNET_NETWORK_Handle *s;
+  struct NatActivity *wl;
+
+  tst->ltask = GNUNET_SCHEDULER_NO_TASK;
+  if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
+    return; 
+  tst->ltask = GNUNET_SCHEDULER_add_read_net (GNUNET_TIME_UNIT_FOREVER_REL,
+                                             tst->lsock,
+                                             &do_accept,
+                                             tst);
+  s = GNUNET_NETWORK_socket_accept (tst->lsock, NULL, NULL);
+  if (NULL == s)
+    return; /* odd error */
+  wl = GNUNET_malloc (sizeof (struct NatActivity));
+  wl->sock = s;
+  wl->h = tst;
+  wl->rtask = GNUNET_SCHEDULER_add_read_net (GNUNET_TIME_UNIT_FOREVER_REL,
+                                            wl->sock,
+                                            &do_read,
+                                            wl);
+  GNUNET_CONTAINER_DLL_insert (tst->head,
+                              tst->tail,
+                              wl);
+}
+
+
+/**
+ * Address-callback, used to send message to gnunet-nat-server.
+ *
+ * @param cls closure
+ * @param add_remove GNUNET_YES to mean the new public IP address, GNUNET_NO to mean
+ *     the previous (now invalid) one
+ * @param addr either the previous or the new public IP address
+ * @param addrlen actual lenght of the address
+ */
+static void 
+addr_cb (void *cls,
+        int add_remove,
+        const struct sockaddr *addr,
+        socklen_t addrlen)
+{
+  struct GNUNET_NAT_Test *h = cls;
+  struct GNUNET_CLIENT_Connection *client;
+  struct GNUNET_NAT_TestMessage msg;
+  const struct sockaddr_in *sa;
+
+  if (GNUNET_YES != add_remove)
+    return;
+  if (addrlen != sizeof (struct sockaddr_in))
+    return; /* ignore IPv6 here */
+  sa = (const struct sockaddr_in*) addr;
+  msg.header.size = htons (sizeof(struct GNUNET_NAT_TestMessage));
+  msg.header.type = htons (GNUNET_MESSAGE_TYPE_NAT_TEST);
+  msg.dst_ipv4 = sa->sin_addr.s_addr;
+  msg.dport = sa->sin_port;
+  msg.data = h->data;
+  msg.is_tcp = htonl ((uint32_t) h->is_tcp);
+
+  client = GNUNET_CLIENT_connect ("gnunet-nat-server",
+                                 h->cfg);
+  GNUNET_break (GNUNET_OK ==
+               GNUNET_CLIENT_transmit_and_get_response (client,
+                                                        &msg.header,
+                                                        GNUNET_TIME_UNIT_SECONDS,
+                                                        GNUNET_YES,
+                                                        NULL, NULL));
+  GNUNET_CLIENT_disconnect (client, GNUNET_YES);  
+}
+
+
 /**
  * Start testing if NAT traversal works using the
  * given configuration (IPv4-only).
  *
  * @param cfg configuration for the NAT traversal
  * @param is_tcp GNUNET_YES to test TCP, GNUNET_NO to test UDP
- * @param bnd_port port to bind to
+ * @param bnd_port port to bind to, 0 for connection reversal
  * @param adv_port externally advertised port to use
  * @param report function to call with the result of the test
  * @param report_cls closure for report
@@ -60,7 +284,59 @@ GNUNET_NAT_test_start (const struct GNUNET_CONFIGURATION_Handle *cfg,
                       GNUNET_NAT_TestCallback report,
                       void *report_cls)
 {
-  return NULL;
+  struct GNUNET_NAT_Test *ret;
+  struct sockaddr_in sa;
+  const struct sockaddr *addrs[] = { (const struct sockaddr*) &sa };
+  const socklen_t addrlens[] = { sizeof (sa) };
+
+  memset (&sa, 0, sizeof (sa));
+  sa.sin_port = htons (bnd_port);
+#if HAVE_SOCKADDR_IN_SIN_LEN
+  sa.sin_len = sizeof (sa);
+#endif
+  
+  ret = GNUNET_malloc (sizeof (struct GNUNET_NAT_Test));
+  ret->cfg = cfg;
+  ret->is_tcp = is_tcp;
+  ret->data = bnd_port;
+  ret->adv_port = adv_port;
+  ret->report = report;
+  ret->report_cls = report_cls;
+  if (bnd_port == 0)
+    {      
+      ret->nat = GNUNET_NAT_register (cfg, is_tcp,
+                                     0, 
+                                     0, NULL, NULL,
+                                     &addr_cb, &reversal_cb, ret);
+    }
+  else
+    {
+      ret->lsock = GNUNET_NETWORK_socket_create (AF_INET, 
+                                                (is_tcp==GNUNET_YES) ? SOCK_STREAM : SOCK_DGRAM, 0);
+      if ( (ret->lsock == NULL) ||
+          (GNUNET_OK != GNUNET_NETWORK_socket_bind (ret->lsock,
+                                                    (const struct sockaddr*) &sa,
+                                                    sizeof (sa))) )
+       {
+         GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
+                     _("Failed to create listen socket for NAT test\n"));
+         if (NULL != ret->lsock)
+           GNUNET_NETWORK_socket_close (ret->lsock);
+         GNUNET_free (ret);
+         return NULL;
+       }
+      GNUNET_break (GNUNET_OK ==
+                   GNUNET_NETWORK_socket_listen (ret->lsock, 5));
+      ret->ltask = GNUNET_SCHEDULER_add_read_net (GNUNET_TIME_UNIT_FOREVER_REL,
+                                                 ret->lsock,
+                                                 &do_accept,
+                                                 ret);
+      ret->nat = GNUNET_NAT_register (cfg, is_tcp,
+                                     adv_port, 
+                                     1, addrs, addrlens,
+                                     &addr_cb, NULL, ret);
+    }
+  return ret;
 }
 
 
@@ -72,6 +348,22 @@ GNUNET_NAT_test_start (const struct GNUNET_CONFIGURATION_Handle *cfg,
 void
 GNUNET_NAT_test_stop (struct GNUNET_NAT_Test *tst)
 {
+  struct NatActivity *pos;
+
+  while (NULL != (pos = tst->head))
+    {
+      GNUNET_CONTAINER_DLL_remove (tst->head,
+                                  tst->tail,
+                                  pos);
+      GNUNET_SCHEDULER_cancel (pos->rtask);
+      GNUNET_NETWORK_socket_close (pos->sock);
+      GNUNET_free (pos);
+    }
+  if (GNUNET_SCHEDULER_NO_TASK != tst->ltask)
+    GNUNET_SCHEDULER_cancel (tst->ltask);
+  if (NULL != tst->lsock)
+    GNUNET_NETWORK_socket_close (tst->lsock);
+  GNUNET_NAT_unregister (tst->nat);
   GNUNET_free (tst);
 }