diff options
author | Christian Grothoff <christian@grothoff.org> | 2013-08-13 17:49:45 +0000 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2013-08-13 17:49:45 +0000 |
commit | adc6e4a5804d4cb43516383ff1d97065df0d0fd9 (patch) | |
tree | 248e5fc07ac9c2b9d845fa08e86f4fbaad0db61d | |
parent | bc7d219460d5ef0511164eb90039710940d905dd (diff) | |
download | gnunet-adc6e4a5804d4cb43516383ff1d97065df0d0fd9.tar.gz gnunet-adc6e4a5804d4cb43516383ff1d97065df0d0fd9.zip |
-removing test for dead functionality
-rw-r--r-- | src/gns/Makefile.am | 14 | ||||
-rw-r--r-- | src/gns/test_gns_simple_get_authority.c | 321 |
2 files changed, 0 insertions, 335 deletions
diff --git a/src/gns/Makefile.am b/src/gns/Makefile.am index 67e1a2917..6fde83578 100644 --- a/src/gns/Makefile.am +++ b/src/gns/Makefile.am | |||
@@ -211,7 +211,6 @@ libgnunet_plugin_block_gns_la_DEPENDENCIES = \ | |||
211 | if HAVE_TESTING | 211 | if HAVE_TESTING |
212 | check_PROGRAMS = \ | 212 | check_PROGRAMS = \ |
213 | test_gns_simple_shorten \ | 213 | test_gns_simple_shorten \ |
214 | test_gns_simple_get_authority \ | ||
215 | test_gns_simple_lookup \ | 214 | test_gns_simple_lookup \ |
216 | test_gns_simple_delegated_lookup \ | 215 | test_gns_simple_delegated_lookup \ |
217 | test_gns_simple_mx_lookup \ | 216 | test_gns_simple_mx_lookup \ |
@@ -357,19 +356,6 @@ test_gns_simple_shorten_DEPENDENCIES = \ | |||
357 | libgnunetgns.la \ | 356 | libgnunetgns.la \ |
358 | $(top_builddir)/src/testing/libgnunettesting.la | 357 | $(top_builddir)/src/testing/libgnunettesting.la |
359 | 358 | ||
360 | test_gns_simple_get_authority_SOURCES = \ | ||
361 | test_gns_simple_get_authority.c | ||
362 | test_gns_simple_get_authority_LDADD = \ | ||
363 | $(top_builddir)/src/util/libgnunetutil.la \ | ||
364 | $(top_builddir)/src/namestore/libgnunetnamestore.la \ | ||
365 | $(top_builddir)/src/gns/libgnunetgns.la \ | ||
366 | $(top_builddir)/src/testing/libgnunettesting.la | ||
367 | test_gns_simple_get_authority_DEPENDENCIES = \ | ||
368 | $(top_builddir)/src/util/libgnunetutil.la \ | ||
369 | $(top_builddir)/src/namestore/libgnunetnamestore.la \ | ||
370 | libgnunetgns.la \ | ||
371 | $(top_builddir)/src/testing/libgnunettesting.la | ||
372 | |||
373 | 359 | ||
374 | test_gns_pseu_shorten_SOURCES = \ | 360 | test_gns_pseu_shorten_SOURCES = \ |
375 | test_gns_pseu_shorten.c | 361 | test_gns_pseu_shorten.c |
diff --git a/src/gns/test_gns_simple_get_authority.c b/src/gns/test_gns_simple_get_authority.c deleted file mode 100644 index b87455857..000000000 --- a/src/gns/test_gns_simple_get_authority.c +++ /dev/null | |||
@@ -1,321 +0,0 @@ | |||
1 | /* | ||
2 | This file is part of GNUnet. | ||
3 | (C) 2009 Christian Grothoff (and other contributing authors) | ||
4 | |||
5 | GNUnet is free software; you can redistribute it and/or modify | ||
6 | it under the terms of the GNU General Public License as published | ||
7 | by the Free Software Foundation; either version 3, or (at your | ||
8 | option) any later version. | ||
9 | |||
10 | GNUnet is distributed in the hope that it will be useful, but | ||
11 | WITHOUT ANY WARRANTY; without even the implied warranty of | ||
12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
13 | General Public License for more details. | ||
14 | |||
15 | You should have received a copy of the GNU General Public License | ||
16 | along with GNUnet; see the file COPYING. If not, write to the | ||
17 | Free Software Foundation, Inc., 59 Temple Place - Suite 330, | ||
18 | Boston, MA 02111-1307, USA. | ||
19 | */ | ||
20 | /** | ||
21 | * @file gns/test_gns_simple_get_authority.c | ||
22 | * @brief basic shorten test for gns api | ||
23 | * | ||
24 | */ | ||
25 | #include "platform.h" | ||
26 | #include "gnunet_testing_lib.h" | ||
27 | #include "gnunet_core_service.h" | ||
28 | #include "block_dns.h" | ||
29 | #include "gnunet_signatures.h" | ||
30 | #include "gnunet_namestore_service.h" | ||
31 | #include "../namestore/namestore.h" | ||
32 | #include "gnunet_dnsparser_lib.h" | ||
33 | #include "gnunet_gns_service.h" | ||
34 | |||
35 | /* Timeout for entire testcase */ | ||
36 | #define TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 20) | ||
37 | |||
38 | /* test records to resolve */ | ||
39 | #define TEST_DOMAIN "www.alice.bob.gads" | ||
40 | #define TEST_IP "127.0.0.1" | ||
41 | #define TEST_RECORD_NAME "www" | ||
42 | |||
43 | #define TEST_AUTHORITY_BOB "bob" | ||
44 | #define TEST_AUTHORITY_ALICE "alice" | ||
45 | #define TEST_ALICE_PSEU "carol" | ||
46 | #define TEST_EXPECTED_RESULT "alice.bob.gads" | ||
47 | |||
48 | #define KEYFILE_BOB "../namestore/zonefiles/HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey" | ||
49 | #define KEYFILE_ALICE "../namestore/zonefiles/N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey" | ||
50 | |||
51 | /* Globals */ | ||
52 | |||
53 | /* Task handle to use to schedule test failure */ | ||
54 | GNUNET_SCHEDULER_TaskIdentifier die_task; | ||
55 | |||
56 | /* Global return value (0 for success, anything else for failure) */ | ||
57 | static int ok; | ||
58 | |||
59 | static struct GNUNET_NAMESTORE_Handle *namestore_handle; | ||
60 | |||
61 | static struct GNUNET_GNS_Handle *gns_handle; | ||
62 | |||
63 | const struct GNUNET_CONFIGURATION_Handle *cfg; | ||
64 | |||
65 | |||
66 | /** | ||
67 | * Check if the get_handle is being used, if so stop the request. Either | ||
68 | * way, schedule the end_badly_cont function which actually shuts down the | ||
69 | * test. | ||
70 | */ | ||
71 | static void | ||
72 | end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) | ||
73 | { | ||
74 | die_task = GNUNET_SCHEDULER_NO_TASK; | ||
75 | if (NULL != gns_handle) | ||
76 | { | ||
77 | GNUNET_GNS_disconnect(gns_handle); | ||
78 | gns_handle = NULL; | ||
79 | } | ||
80 | |||
81 | if (NULL != namestore_handle) | ||
82 | { | ||
83 | GNUNET_NAMESTORE_disconnect (namestore_handle); | ||
84 | namestore_handle = NULL; | ||
85 | } | ||
86 | GNUNET_break (0); | ||
87 | GNUNET_SCHEDULER_shutdown (); | ||
88 | ok = 1; | ||
89 | } | ||
90 | |||
91 | void end_badly_now () | ||
92 | { | ||
93 | GNUNET_SCHEDULER_cancel (die_task); | ||
94 | die_task = GNUNET_SCHEDULER_add_now (&end_badly, NULL); | ||
95 | } | ||
96 | |||
97 | static void shutdown_task (void *cls, | ||
98 | const struct GNUNET_SCHEDULER_TaskContext *tc) | ||
99 | { | ||
100 | GNUNET_GNS_disconnect(gns_handle); | ||
101 | GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Shutting down peer!\n"); | ||
102 | GNUNET_SCHEDULER_shutdown (); | ||
103 | } | ||
104 | |||
105 | /** | ||
106 | * Called when gns_get_authority finishes | ||
107 | */ | ||
108 | static void | ||
109 | process_auth_result(void* cls, const char* aname) | ||
110 | { | ||
111 | |||
112 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | ||
113 | "Disconnecting from namestore\n"); | ||
114 | GNUNET_NAMESTORE_disconnect (namestore_handle); | ||
115 | |||
116 | if (GNUNET_SCHEDULER_NO_TASK != die_task) | ||
117 | { | ||
118 | GNUNET_SCHEDULER_cancel (die_task); | ||
119 | die_task = GNUNET_SCHEDULER_NO_TASK; | ||
120 | } | ||
121 | |||
122 | if (aname == NULL) | ||
123 | { | ||
124 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
125 | "get_authority test failed!\n"); | ||
126 | ok = 1; | ||
127 | } | ||
128 | else | ||
129 | { | ||
130 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | ||
131 | "%s authority is %s\n", (char*)cls, aname); | ||
132 | if (0 != strcmp(aname, TEST_EXPECTED_RESULT)) | ||
133 | { | ||
134 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
135 | "get_authority test failed! (wanted: %s got: %s\n", | ||
136 | TEST_EXPECTED_RESULT, aname); | ||
137 | ok = 1; | ||
138 | } | ||
139 | else | ||
140 | { | ||
141 | ok = 0; | ||
142 | } | ||
143 | |||
144 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "get_authority test finished!\n"); | ||
145 | |||
146 | } | ||
147 | |||
148 | GNUNET_SCHEDULER_add_now (&shutdown_task, NULL); | ||
149 | } | ||
150 | |||
151 | |||
152 | /** | ||
153 | * Function scheduled to be run on the successful start of services | ||
154 | * tries to shorten the name TEST_DOMAIN using gns | ||
155 | */ | ||
156 | static void | ||
157 | commence_testing (void *cls, int32_t success, const char *emsg) | ||
158 | { | ||
159 | |||
160 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | ||
161 | "Connecting to gns\n"); | ||
162 | gns_handle = GNUNET_GNS_connect(cfg); | ||
163 | if (NULL == gns_handle) | ||
164 | { | ||
165 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
166 | "Failed to connect to gns\n"); | ||
167 | end_badly_now(); | ||
168 | return; | ||
169 | } | ||
170 | |||
171 | GNUNET_GNS_get_authority(gns_handle, TEST_DOMAIN, &process_auth_result, | ||
172 | TEST_DOMAIN); | ||
173 | } | ||
174 | |||
175 | |||
176 | |||
177 | void do_check (void *cls, | ||
178 | const struct GNUNET_CONFIGURATION_Handle *ccfg, | ||
179 | struct GNUNET_TESTING_Peer *peer) | ||
180 | { | ||
181 | struct GNUNET_CRYPTO_EccPublicKey our_pkey; | ||
182 | struct GNUNET_CRYPTO_EccPublicKey alice_pkey; | ||
183 | struct GNUNET_CRYPTO_EccPublicKey bob_pkey; | ||
184 | struct GNUNET_CRYPTO_EccPrivateKey *our_key; | ||
185 | struct GNUNET_CRYPTO_EccPrivateKey *alice_key; | ||
186 | struct GNUNET_CRYPTO_EccPrivateKey *bob_key; | ||
187 | struct GNUNET_CRYPTO_ShortHashCode bob_hash; | ||
188 | struct GNUNET_CRYPTO_ShortHashCode alice_hash; | ||
189 | struct GNUNET_CRYPTO_EccSignature *sig; | ||
190 | char* our_keyfile; | ||
191 | |||
192 | cfg = ccfg; | ||
193 | die_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT, &end_badly, NULL); | ||
194 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Running test\n"); | ||
195 | |||
196 | /* put records into namestore */ | ||
197 | namestore_handle = GNUNET_NAMESTORE_connect(cfg); | ||
198 | if (NULL == namestore_handle) | ||
199 | { | ||
200 | GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n"); | ||
201 | end_badly_now(); | ||
202 | return; | ||
203 | } | ||
204 | |||
205 | if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns", | ||
206 | "ZONEKEY", | ||
207 | &our_keyfile)) | ||
208 | { | ||
209 | GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to get key from cfg\n"); | ||
210 | end_badly_now(); | ||
211 | return; | ||
212 | } | ||
213 | |||
214 | our_key = GNUNET_CRYPTO_ecc_key_create_from_file (our_keyfile); | ||
215 | GNUNET_free(our_keyfile); | ||
216 | |||
217 | bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB); | ||
218 | alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_ALICE); | ||
219 | |||
220 | GNUNET_CRYPTO_ecc_key_get_public (our_key, &our_pkey); | ||
221 | GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey); | ||
222 | GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey); | ||
223 | |||
224 | struct GNUNET_NAMESTORE_RecordData rd; | ||
225 | char* ip = TEST_IP; | ||
226 | struct in_addr *web = GNUNET_malloc (sizeof(struct in_addr)); | ||
227 | rd.expiration_time = UINT64_MAX; | ||
228 | GNUNET_assert (1 == inet_pton (AF_INET, ip, web)); | ||
229 | |||
230 | GNUNET_CRYPTO_short_hash(&bob_pkey, sizeof(bob_pkey), &bob_hash); | ||
231 | |||
232 | rd.data_size = sizeof(struct GNUNET_CRYPTO_ShortHashCode); | ||
233 | rd.data = &bob_hash; | ||
234 | rd.record_type = GNUNET_NAMESTORE_TYPE_PKEY; | ||
235 | rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY; | ||
236 | |||
237 | /* put bob into our zone */ | ||
238 | GNUNET_NAMESTORE_record_put_by_authority (namestore_handle, | ||
239 | our_key, | ||
240 | TEST_AUTHORITY_BOB, | ||
241 | 1, &rd, | ||
242 | NULL, | ||
243 | NULL); | ||
244 | |||
245 | /* put alice into bobs zone */ | ||
246 | GNUNET_CRYPTO_short_hash(&alice_pkey, sizeof(alice_pkey), &alice_hash); | ||
247 | rd.data = &alice_hash; | ||
248 | sig = GNUNET_NAMESTORE_create_signature(bob_key, GNUNET_TIME_UNIT_FOREVER_ABS, TEST_AUTHORITY_ALICE, | ||
249 | &rd, 1); | ||
250 | |||
251 | GNUNET_NAMESTORE_record_put (namestore_handle, | ||
252 | &bob_pkey, | ||
253 | TEST_AUTHORITY_ALICE, | ||
254 | GNUNET_TIME_UNIT_FOREVER_ABS, | ||
255 | 1, | ||
256 | &rd, | ||
257 | sig, | ||
258 | NULL, | ||
259 | NULL); | ||
260 | |||
261 | GNUNET_free (sig); | ||
262 | |||
263 | /* put www A record and PSEU into alice's zone */ | ||
264 | |||
265 | rd.data_size = sizeof(struct in_addr); | ||
266 | rd.data = web; | ||
267 | rd.record_type = GNUNET_DNSPARSER_TYPE_A; | ||
268 | sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS, TEST_RECORD_NAME, | ||
269 | &rd, 1); | ||
270 | |||
271 | GNUNET_NAMESTORE_record_put (namestore_handle, | ||
272 | &alice_pkey, | ||
273 | TEST_RECORD_NAME, | ||
274 | GNUNET_TIME_UNIT_FOREVER_ABS, | ||
275 | 1, | ||
276 | &rd, | ||
277 | sig, | ||
278 | NULL, | ||
279 | NULL); | ||
280 | |||
281 | rd.data_size = strlen(TEST_ALICE_PSEU); | ||
282 | rd.data = TEST_ALICE_PSEU; | ||
283 | rd.record_type = GNUNET_NAMESTORE_TYPE_PSEU; | ||
284 | GNUNET_free(sig); | ||
285 | |||
286 | sig = GNUNET_NAMESTORE_create_signature(alice_key,GNUNET_TIME_UNIT_FOREVER_ABS, "", | ||
287 | &rd, 1); | ||
288 | |||
289 | GNUNET_NAMESTORE_record_put (namestore_handle, | ||
290 | &alice_pkey, | ||
291 | "", | ||
292 | GNUNET_TIME_UNIT_FOREVER_ABS, | ||
293 | 1, | ||
294 | &rd, | ||
295 | sig, | ||
296 | &commence_testing, | ||
297 | NULL); | ||
298 | |||
299 | GNUNET_free (web); | ||
300 | GNUNET_free (sig); | ||
301 | GNUNET_CRYPTO_ecc_key_free (alice_key); | ||
302 | GNUNET_CRYPTO_ecc_key_free (bob_key); | ||
303 | GNUNET_CRYPTO_ecc_key_free (our_key); | ||
304 | } | ||
305 | |||
306 | |||
307 | int | ||
308 | main (int argc, char *argv[]) | ||
309 | { | ||
310 | ok = 1; | ||
311 | GNUNET_log_setup ("test-gns-simple-get-authority", | ||
312 | "WARNING", | ||
313 | NULL); | ||
314 | GNUNET_TESTING_peer_run ("test-gns-simple-get-authority", | ||
315 | "test_gns_simple_lookup.conf", | ||
316 | &do_check, NULL); | ||
317 | return ok; | ||
318 | } | ||
319 | |||
320 | /* end of test-gns-simple-get-authority.c */ | ||
321 | |||