aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2013-08-13 17:49:45 +0000
committerChristian Grothoff <christian@grothoff.org>2013-08-13 17:49:45 +0000
commitadc6e4a5804d4cb43516383ff1d97065df0d0fd9 (patch)
tree248e5fc07ac9c2b9d845fa08e86f4fbaad0db61d
parentbc7d219460d5ef0511164eb90039710940d905dd (diff)
downloadgnunet-adc6e4a5804d4cb43516383ff1d97065df0d0fd9.tar.gz
gnunet-adc6e4a5804d4cb43516383ff1d97065df0d0fd9.zip
-removing test for dead functionality
-rw-r--r--src/gns/Makefile.am14
-rw-r--r--src/gns/test_gns_simple_get_authority.c321
2 files changed, 0 insertions, 335 deletions
diff --git a/src/gns/Makefile.am b/src/gns/Makefile.am
index 67e1a2917..6fde83578 100644
--- a/src/gns/Makefile.am
+++ b/src/gns/Makefile.am
@@ -211,7 +211,6 @@ libgnunet_plugin_block_gns_la_DEPENDENCIES = \
211if HAVE_TESTING 211if HAVE_TESTING
212check_PROGRAMS = \ 212check_PROGRAMS = \
213 test_gns_simple_shorten \ 213 test_gns_simple_shorten \
214 test_gns_simple_get_authority \
215 test_gns_simple_lookup \ 214 test_gns_simple_lookup \
216 test_gns_simple_delegated_lookup \ 215 test_gns_simple_delegated_lookup \
217 test_gns_simple_mx_lookup \ 216 test_gns_simple_mx_lookup \
@@ -357,19 +356,6 @@ test_gns_simple_shorten_DEPENDENCIES = \
357 libgnunetgns.la \ 356 libgnunetgns.la \
358 $(top_builddir)/src/testing/libgnunettesting.la 357 $(top_builddir)/src/testing/libgnunettesting.la
359 358
360test_gns_simple_get_authority_SOURCES = \
361 test_gns_simple_get_authority.c
362test_gns_simple_get_authority_LDADD = \
363 $(top_builddir)/src/util/libgnunetutil.la \
364 $(top_builddir)/src/namestore/libgnunetnamestore.la \
365 $(top_builddir)/src/gns/libgnunetgns.la \
366 $(top_builddir)/src/testing/libgnunettesting.la
367test_gns_simple_get_authority_DEPENDENCIES = \
368 $(top_builddir)/src/util/libgnunetutil.la \
369 $(top_builddir)/src/namestore/libgnunetnamestore.la \
370 libgnunetgns.la \
371 $(top_builddir)/src/testing/libgnunettesting.la
372
373 359
374test_gns_pseu_shorten_SOURCES = \ 360test_gns_pseu_shorten_SOURCES = \
375 test_gns_pseu_shorten.c 361 test_gns_pseu_shorten.c
diff --git a/src/gns/test_gns_simple_get_authority.c b/src/gns/test_gns_simple_get_authority.c
deleted file mode 100644
index b87455857..000000000
--- a/src/gns/test_gns_simple_get_authority.c
+++ /dev/null
@@ -1,321 +0,0 @@
1/*
2 This file is part of GNUnet.
3 (C) 2009 Christian Grothoff (and other contributing authors)
4
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
9
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
19*/
20/**
21 * @file gns/test_gns_simple_get_authority.c
22 * @brief basic shorten test for gns api
23 *
24 */
25#include "platform.h"
26#include "gnunet_testing_lib.h"
27#include "gnunet_core_service.h"
28#include "block_dns.h"
29#include "gnunet_signatures.h"
30#include "gnunet_namestore_service.h"
31#include "../namestore/namestore.h"
32#include "gnunet_dnsparser_lib.h"
33#include "gnunet_gns_service.h"
34
35/* Timeout for entire testcase */
36#define TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 20)
37
38/* test records to resolve */
39#define TEST_DOMAIN "www.alice.bob.gads"
40#define TEST_IP "127.0.0.1"
41#define TEST_RECORD_NAME "www"
42
43#define TEST_AUTHORITY_BOB "bob"
44#define TEST_AUTHORITY_ALICE "alice"
45#define TEST_ALICE_PSEU "carol"
46#define TEST_EXPECTED_RESULT "alice.bob.gads"
47
48#define KEYFILE_BOB "../namestore/zonefiles/HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"
49#define KEYFILE_ALICE "../namestore/zonefiles/N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"
50
51/* Globals */
52
53/* Task handle to use to schedule test failure */
54GNUNET_SCHEDULER_TaskIdentifier die_task;
55
56/* Global return value (0 for success, anything else for failure) */
57static int ok;
58
59static struct GNUNET_NAMESTORE_Handle *namestore_handle;
60
61static struct GNUNET_GNS_Handle *gns_handle;
62
63const struct GNUNET_CONFIGURATION_Handle *cfg;
64
65
66/**
67 * Check if the get_handle is being used, if so stop the request. Either
68 * way, schedule the end_badly_cont function which actually shuts down the
69 * test.
70 */
71static void
72end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
73{
74 die_task = GNUNET_SCHEDULER_NO_TASK;
75 if (NULL != gns_handle)
76 {
77 GNUNET_GNS_disconnect(gns_handle);
78 gns_handle = NULL;
79 }
80
81 if (NULL != namestore_handle)
82 {
83 GNUNET_NAMESTORE_disconnect (namestore_handle);
84 namestore_handle = NULL;
85 }
86 GNUNET_break (0);
87 GNUNET_SCHEDULER_shutdown ();
88 ok = 1;
89}
90
91void end_badly_now ()
92{
93 GNUNET_SCHEDULER_cancel (die_task);
94 die_task = GNUNET_SCHEDULER_add_now (&end_badly, NULL);
95}
96
97static void shutdown_task (void *cls,
98 const struct GNUNET_SCHEDULER_TaskContext *tc)
99{
100 GNUNET_GNS_disconnect(gns_handle);
101 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Shutting down peer!\n");
102 GNUNET_SCHEDULER_shutdown ();
103}
104
105/**
106 * Called when gns_get_authority finishes
107 */
108static void
109process_auth_result(void* cls, const char* aname)
110{
111
112 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
113 "Disconnecting from namestore\n");
114 GNUNET_NAMESTORE_disconnect (namestore_handle);
115
116 if (GNUNET_SCHEDULER_NO_TASK != die_task)
117 {
118 GNUNET_SCHEDULER_cancel (die_task);
119 die_task = GNUNET_SCHEDULER_NO_TASK;
120 }
121
122 if (aname == NULL)
123 {
124 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
125 "get_authority test failed!\n");
126 ok = 1;
127 }
128 else
129 {
130 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
131 "%s authority is %s\n", (char*)cls, aname);
132 if (0 != strcmp(aname, TEST_EXPECTED_RESULT))
133 {
134 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
135 "get_authority test failed! (wanted: %s got: %s\n",
136 TEST_EXPECTED_RESULT, aname);
137 ok = 1;
138 }
139 else
140 {
141 ok = 0;
142 }
143
144 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "get_authority test finished!\n");
145
146 }
147
148 GNUNET_SCHEDULER_add_now (&shutdown_task, NULL);
149}
150
151
152/**
153 * Function scheduled to be run on the successful start of services
154 * tries to shorten the name TEST_DOMAIN using gns
155 */
156static void
157commence_testing (void *cls, int32_t success, const char *emsg)
158{
159
160 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
161 "Connecting to gns\n");
162 gns_handle = GNUNET_GNS_connect(cfg);
163 if (NULL == gns_handle)
164 {
165 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
166 "Failed to connect to gns\n");
167 end_badly_now();
168 return;
169 }
170
171 GNUNET_GNS_get_authority(gns_handle, TEST_DOMAIN, &process_auth_result,
172 TEST_DOMAIN);
173}
174
175
176
177void do_check (void *cls,
178 const struct GNUNET_CONFIGURATION_Handle *ccfg,
179 struct GNUNET_TESTING_Peer *peer)
180{
181 struct GNUNET_CRYPTO_EccPublicKey our_pkey;
182 struct GNUNET_CRYPTO_EccPublicKey alice_pkey;
183 struct GNUNET_CRYPTO_EccPublicKey bob_pkey;
184 struct GNUNET_CRYPTO_EccPrivateKey *our_key;
185 struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
186 struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
187 struct GNUNET_CRYPTO_ShortHashCode bob_hash;
188 struct GNUNET_CRYPTO_ShortHashCode alice_hash;
189 struct GNUNET_CRYPTO_EccSignature *sig;
190 char* our_keyfile;
191
192 cfg = ccfg;
193 die_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT, &end_badly, NULL);
194 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Running test\n");
195
196 /* put records into namestore */
197 namestore_handle = GNUNET_NAMESTORE_connect(cfg);
198 if (NULL == namestore_handle)
199 {
200 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
201 end_badly_now();
202 return;
203 }
204
205 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
206 "ZONEKEY",
207 &our_keyfile))
208 {
209 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n");
210 end_badly_now();
211 return;
212 }
213
214 our_key = GNUNET_CRYPTO_ecc_key_create_from_file (our_keyfile);
215 GNUNET_free(our_keyfile);
216
217 bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
218 alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_ALICE);
219
220 GNUNET_CRYPTO_ecc_key_get_public (our_key, &our_pkey);
221 GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
222 GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
223
224 struct GNUNET_NAMESTORE_RecordData rd;
225 char* ip = TEST_IP;
226 struct in_addr *web = GNUNET_malloc (sizeof(struct in_addr));
227 rd.expiration_time = UINT64_MAX;
228 GNUNET_assert (1 == inet_pton (AF_INET, ip, web));
229
230 GNUNET_CRYPTO_short_hash(&bob_pkey, sizeof(bob_pkey), &bob_hash);
231
232 rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode);
233 rd.data = &bob_hash;
234 rd.record_type = GNUNET_NAMESTORE_TYPE_PKEY;
235 rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY;
236
237 /* put bob into our zone */
238 GNUNET_NAMESTORE_record_put_by_authority (namestore_handle,
239 our_key,
240 TEST_AUTHORITY_BOB,
241 1, &rd,
242 NULL,
243 NULL);
244
245 /* put alice into bobs zone */
246 GNUNET_CRYPTO_short_hash(&alice_pkey, sizeof(alice_pkey), &alice_hash);
247 rd.data = &alice_hash;
248 sig = GNUNET_NAMESTORE_create_signature(bob_key, GNUNET_TIME_UNIT_FOREVER_ABS, TEST_AUTHORITY_ALICE,
249 &rd, 1);
250
251 GNUNET_NAMESTORE_record_put (namestore_handle,
252 &bob_pkey,
253 TEST_AUTHORITY_ALICE,
254 GNUNET_TIME_UNIT_FOREVER_ABS,
255 1,
256 &rd,
257 sig,
258 NULL,
259 NULL);
260
261 GNUNET_free (sig);
262
263 /* put www A record and PSEU into alice's zone */
264
265 rd.data_size = sizeof(struct in_addr);
266 rd.data = web;
267 rd.record_type = GNUNET_DNSPARSER_TYPE_A;
268 sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS, TEST_RECORD_NAME,
269 &rd, 1);
270
271 GNUNET_NAMESTORE_record_put (namestore_handle,
272 &alice_pkey,
273 TEST_RECORD_NAME,
274 GNUNET_TIME_UNIT_FOREVER_ABS,
275 1,
276 &rd,
277 sig,
278 NULL,
279 NULL);
280
281 rd.data_size = strlen(TEST_ALICE_PSEU);
282 rd.data = TEST_ALICE_PSEU;
283 rd.record_type = GNUNET_NAMESTORE_TYPE_PSEU;
284 GNUNET_free(sig);
285
286 sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS, "",
287 &rd, 1);
288
289 GNUNET_NAMESTORE_record_put (namestore_handle,
290 &alice_pkey,
291 "",
292 GNUNET_TIME_UNIT_FOREVER_ABS,
293 1,
294 &rd,
295 sig,
296 &commence_testing,
297 NULL);
298
299 GNUNET_free (web);
300 GNUNET_free (sig);
301 GNUNET_CRYPTO_ecc_key_free (alice_key);
302 GNUNET_CRYPTO_ecc_key_free (bob_key);
303 GNUNET_CRYPTO_ecc_key_free (our_key);
304}
305
306
307int
308main (int argc, char *argv[])
309{
310 ok = 1;
311 GNUNET_log_setup ("test-gns-simple-get-authority",
312 "WARNING",
313 NULL);
314 GNUNET_TESTING_peer_run ("test-gns-simple-get-authority",
315 "test_gns_simple_lookup.conf",
316 &do_check, NULL);
317 return ok;
318}
319
320/* end of test-gns-simple-get-authority.c */
321