From 4cbd3d6f60160226c1bc30da655838c2e2fad4e3 Mon Sep 17 00:00:00 2001 From: Matthias Wachs Date: Thu, 17 Mar 2011 16:53:06 +0000 Subject: ats testcase --- src/transport/Makefile.am | 11 +- src/transport/test_transport_ats.c | 641 ++++++++++++++++++++++++++++ src/transport/test_transport_ats_peer1.conf | 113 +++++ src/transport/test_transport_ats_peer2.conf | 114 +++++ 4 files changed, 878 insertions(+), 1 deletion(-) create mode 100644 src/transport/test_transport_ats.c create mode 100644 src/transport/test_transport_ats_peer1.conf create mode 100644 src/transport/test_transport_ats_peer2.conf (limited to 'src') diff --git a/src/transport/Makefile.am b/src/transport/Makefile.am index cafdcdc31..13db3b5c2 100644 --- a/src/transport/Makefile.am +++ b/src/transport/Makefile.am @@ -106,7 +106,7 @@ gnunet_transport_DEPENDENCIES = \ libgnunettransport.la gnunet_service_transport_SOURCES = \ - gnunet-service-transport.c + gnunet-service-transport.c gnunet_service_transport_LDADD = \ $(top_builddir)/src/hello/libgnunethello.la \ $(top_builddir)/src/peerinfo/libgnunetpeerinfo.la \ @@ -203,6 +203,7 @@ libgnunet_plugin_transport_https_la_CFLAGS = \ check_PROGRAMS = \ + test_transport_ats \ test_transport_api_tcp \ test_transport_api_tcp_nat \ test_transport_api_udp \ @@ -233,6 +234,7 @@ check_PROGRAMS = \ if !DISABLE_TEST_RUN TESTS = \ + test_transport_ats \ test_transport_api_tcp \ test_transport_api_tcp_nat \ test_transport_api_udp \ @@ -259,6 +261,13 @@ TESTS = \ $(HTTPS_QUOTA_TEST) endif +test_transport_ats_SOURCES = \ + test_transport_ats.c +test_transport_ats_LDADD = \ + $(top_builddir)/src/transport/libgnunettransport.la \ + $(top_builddir)/src/hello/libgnunethello.la \ + $(top_builddir)/src/util/libgnunetutil.la + test_transport_api_tcp_SOURCES = \ test_transport_api.c test_transport_api_tcp_LDADD = \ diff --git a/src/transport/test_transport_ats.c b/src/transport/test_transport_ats.c new file mode 100644 index 000000000..4c636cab6 --- /dev/null +++ b/src/transport/test_transport_ats.c @@ -0,0 +1,641 @@ +/* + This file is part of GNUnet. + (C) 2009, 2010 Christian Grothoff (and other contributing authors) + + GNUnet is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GNUnet is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with GNUnet; see the file COPYING. If not, write to the + Free Software Foundation, Inc., 59 Temple Place - Suite 330, + Boston, MA 02111-1307, USA. +*/ +/** + * @file transport/test_transport_ats.c + * @brief base test case for transport implementations + * + * This test case serves as a base for tcp, udp, and udp-nat + * transport test cases. Based on the executable being run + * the correct test case will be performed. Conservation of + * C code apparently. + */ +#include "platform.h" +#include "gnunet_common.h" +#include "gnunet_hello_lib.h" +#include "gnunet_getopt_lib.h" +#include "gnunet_os_lib.h" +#include "gnunet_program_lib.h" +#include "gnunet_scheduler_lib.h" +#include "gnunet_transport_service.h" +#include "transport.h" + +#define VERBOSE GNUNET_NO + +#define VERBOSE_ARM GNUNET_NO + +#define START_ARM GNUNET_YES + +/** + * How long until we give up on transmitting the message? + */ +#define TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 5) + +/** + * How long until we give up on transmitting the message? + */ +#define TIMEOUT_TRANSMIT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 60) + +#define MTYPE 12345 + +struct PeerContext +{ + struct GNUNET_CONFIGURATION_Handle *cfg; + struct GNUNET_TRANSPORT_Handle *th; + struct GNUNET_PeerIdentity id; +#if START_ARM + struct GNUNET_OS_Process *arm_proc; +#endif +}; + +static struct PeerContext p1; + +static struct PeerContext p2; + +static int ok; + +static int is_tcp; + +static int is_tcp_nat; + +static int is_udp; + +static int is_unix; + +static int is_udp_nat; + +static int is_http; + +static int is_https; + +static int is_multi_protocol; + +static int is_wlan; + +static GNUNET_SCHEDULER_TaskIdentifier die_task; + +static char * key_file_p1; +static char * cert_file_p1; + +static char * key_file_p2; +static char * cert_file_p2; + +#if VERBOSE +#define OKPP do { ok++; fprintf (stderr, "Now at stage %u at %s:%u\n", ok, __FILE__, __LINE__); } while (0) +#else +#define OKPP do { ok++; } while (0) +#endif + + +static void +end () +{ + /* do work here */ + GNUNET_assert (ok == 6); + GNUNET_SCHEDULER_cancel (die_task); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Disconnecting from transports!\n"); + GNUNET_TRANSPORT_disconnect (p1.th); + GNUNET_TRANSPORT_disconnect (p2.th); + + die_task = GNUNET_SCHEDULER_NO_TASK; + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Transports disconnected, returning success!\n"); + ok = 0; +} + +static void +stop_arm (struct PeerContext *p) +{ +#if START_ARM + if (0 != GNUNET_OS_process_kill (p->arm_proc, SIGTERM)) + GNUNET_log_strerror (GNUNET_ERROR_TYPE_WARNING, "kill"); + GNUNET_OS_process_wait (p->arm_proc); + GNUNET_OS_process_close (p->arm_proc); + p->arm_proc = NULL; +#endif + GNUNET_CONFIGURATION_destroy (p->cfg); +} + + +static void +end_badly () +{ + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Disconnecting from transports!\n"); + GNUNET_break (0); + GNUNET_TRANSPORT_disconnect (p1.th); + GNUNET_TRANSPORT_disconnect (p2.th); + ok = 1; +} + +static void +notify_receive (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_MessageHeader *message, + const struct GNUNET_TRANSPORT_ATS_Information *ats, + uint32_t ats_count) +{ + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "ok is (%d)!\n", + ok); + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received message of type %d from peer (%p)!\n", + ntohs(message->type), cls); + + GNUNET_assert (ok == 5); + OKPP; + + GNUNET_assert (MTYPE == ntohs (message->type)); + GNUNET_assert (sizeof (struct GNUNET_MessageHeader) == + ntohs (message->size)); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received message from peer (%p)!\n", + cls); + end (); +} + + +static size_t +notify_ready (void *cls, size_t size, void *buf) +{ + struct GNUNET_MessageHeader *hdr; + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Transmitting message to peer (%p) - %u!\n", cls, sizeof (struct GNUNET_MessageHeader)); + GNUNET_assert (size >= 256); + GNUNET_assert (ok == 4); + OKPP; + + if (buf != NULL) + { + hdr = buf; + hdr->size = htons (sizeof (struct GNUNET_MessageHeader)); + hdr->type = htons (MTYPE); + } + + return sizeof (struct GNUNET_MessageHeader); +} + +static size_t +notify_ready_connect (void *cls, size_t size, void *buf) +{ + return 0; +} + + +static void +notify_connect (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_TRANSPORT_ATS_Information *ats, + uint32_t ats_count) +{ + if (cls == &p1) + { + GNUNET_SCHEDULER_cancel (die_task); + die_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT_TRANSMIT, + &end_badly, NULL); + + GNUNET_TRANSPORT_notify_transmit_ready (p1.th, + &p2.id, + 256, 0, TIMEOUT, ¬ify_ready, + &p1); + } + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Peer `%4s' connected to us (%p)!\n", GNUNET_i2s (peer), cls); +} + + +static void +notify_disconnect (void *cls, const struct GNUNET_PeerIdentity *peer) +{ + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Peer `%4s' disconnected (%p)!\n", + GNUNET_i2s (peer), cls); +} + + +static void +setup_peer (struct PeerContext *p, const char *cfgname) +{ + p->cfg = GNUNET_CONFIGURATION_create (); +#if START_ARM + p->arm_proc = GNUNET_OS_start_process (NULL, NULL, "gnunet-service-arm", + "gnunet-service-arm", +#if VERBOSE_ARM + "-L", "DEBUG", +#endif + "-c", cfgname, NULL); +#endif + GNUNET_assert (GNUNET_OK == GNUNET_CONFIGURATION_load (p->cfg, cfgname)); + + if (is_https) + { + struct stat sbuf; + if (p==&p1) + { + if (GNUNET_CONFIGURATION_have_value (p->cfg, + "transport-https", "KEY_FILE")) + GNUNET_CONFIGURATION_get_value_string (p->cfg, "transport-https", "KEY_FILE", &key_file_p1); + if (key_file_p1==NULL) + GNUNET_asprintf(&key_file_p1,"https.key"); + if (0 == stat (key_file_p1, &sbuf )) + { + if (0 == remove(key_file_p1)) + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Successfully removed existing private key file `%s'\n",key_file_p1); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to remove private key file `%s'\n",key_file_p1); + } + if (GNUNET_CONFIGURATION_have_value (p->cfg,"transport-https", "CERT_FILE")) + GNUNET_CONFIGURATION_get_value_string (p->cfg, "transport-https", "CERT_FILE", &cert_file_p1); + if (cert_file_p1==NULL) + GNUNET_asprintf(&cert_file_p1,"https.cert"); + if (0 == stat (cert_file_p1, &sbuf )) + { + if (0 == remove(cert_file_p1)) + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Successfully removed existing certificate file `%s'\n",cert_file_p1); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to remove existing certificate file `%s'\n",cert_file_p1); + } + } + else if (p==&p2) + { + if (GNUNET_CONFIGURATION_have_value (p->cfg, + "transport-https", "KEY_FILE")) + GNUNET_CONFIGURATION_get_value_string (p->cfg, "transport-https", "KEY_FILE", &key_file_p2); + if (key_file_p2==NULL) + GNUNET_asprintf(&key_file_p2,"https.key"); + if (0 == stat (key_file_p2, &sbuf )) + { + if (0 == remove(key_file_p2)) + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Successfully removed existing private key file `%s'\n",key_file_p2); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to remove private key file `%s'\n",key_file_p2); + } + if (GNUNET_CONFIGURATION_have_value (p->cfg,"transport-https", "CERT_FILE")) + GNUNET_CONFIGURATION_get_value_string (p->cfg, "transport-https", "CERT_FILE", &cert_file_p2); + if (cert_file_p2==NULL) + GNUNET_asprintf(&cert_file_p2,"https.cert"); + if (0 == stat (cert_file_p2, &sbuf )) + { + if (0 == remove(cert_file_p2)) + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Successfully removed existing certificate file `%s'\n",cert_file_p2); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to remove existing certificate file `%s'\n",cert_file_p2); + } + } + } + + p->th = GNUNET_TRANSPORT_connect (p->cfg, + NULL, p, + ¬ify_receive, + ¬ify_connect, ¬ify_disconnect); + GNUNET_assert (p->th != NULL); +} + + +static void +exchange_hello_last (void *cls, + const struct GNUNET_MessageHeader *message) +{ + struct PeerContext *me = cls; + + GNUNET_TRANSPORT_get_hello_cancel (p2.th, &exchange_hello_last, me); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Exchanging HELLO with peer (%p)!\n", cls); + GNUNET_assert (ok >= 3); + OKPP; + GNUNET_assert (message != NULL); + GNUNET_assert (GNUNET_OK == + GNUNET_HELLO_get_id ((const struct GNUNET_HELLO_Message *) + message, &me->id)); + + GNUNET_assert(NULL != GNUNET_TRANSPORT_notify_transmit_ready (p2.th, + &p1.id, + sizeof (struct GNUNET_MessageHeader), 0, + TIMEOUT, + ¬ify_ready_connect, + NULL)); + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Finished exchanging HELLOs, now waiting for transmission!\n"); +} + +static void +exchange_hello (void *cls, + const struct GNUNET_MessageHeader *message) +{ + return; + struct PeerContext *me = cls; + + GNUNET_TRANSPORT_get_hello_cancel (p1.th, &exchange_hello, me); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Exchanging HELLO with peer (%p)!\n", cls); + GNUNET_assert (ok >= 2); + OKPP; + GNUNET_assert (message != NULL); + GNUNET_assert (GNUNET_OK == + GNUNET_HELLO_get_id ((const struct GNUNET_HELLO_Message *) + message, &me->id)); + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Received HELLO size %d\n", GNUNET_HELLO_size((const struct GNUNET_HELLO_Message *)message)); + + GNUNET_TRANSPORT_offer_hello (p2.th, message, NULL, NULL); + GNUNET_TRANSPORT_get_hello (p2.th, &exchange_hello_last, &p2); +} + + +static void +run (void *cls, + char *const *args, + const char *cfgfile, const struct GNUNET_CONFIGURATION_Handle *cfg) +{ + GNUNET_assert (ok == 1); + OKPP; + die_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT, + &end_badly, NULL); + + setup_peer (&p1, "test_transport_ats_peer1.conf"); + setup_peer (&p2, "test_transport_ats_peer2.conf"); + + GNUNET_assert(p1.th != NULL); + GNUNET_assert(p2.th != NULL); + + GNUNET_TRANSPORT_get_hello (p1.th, &exchange_hello, &p1); +} + +static int +check () +{ + static char *const argv[] = { "test-transport-api", + "-c", + "test_transport_api_data.conf", +#if VERBOSE + "-L", "DEBUG", +#endif + NULL + }; + static struct GNUNET_GETOPT_CommandLineOption options[] = { + GNUNET_GETOPT_OPTION_END + }; + +#if WRITECONFIG + setTransportOptions("test_transport_api_data.conf"); +#endif + ok = 1; + GNUNET_PROGRAM_run ((sizeof (argv) / sizeof (char *)) - 1, + argv, "test-transport-api", "nohelp", + options, &run, &ok); + stop_arm (&p1); + stop_arm (&p2); + + if (is_https) + { + struct stat sbuf; + if (0 == stat (cert_file_p1, &sbuf )) + { + if (0 == remove(cert_file_p1)) + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Successfully removed existing certificate file `%s'\n",cert_file_p1); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to remove certfile `%s'\n",cert_file_p1); + } + + if (0 == stat (key_file_p1, &sbuf )) + { + if (0 == remove(key_file_p1)) + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Successfully removed private key file `%s'\n",key_file_p1); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to private key file `%s'\n",key_file_p1); + } + + if (0 == stat (cert_file_p2, &sbuf )) + { + if (0 == remove(cert_file_p2)) + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Successfully removed existing certificate file `%s'\n",cert_file_p2); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to remove certfile `%s'\n",cert_file_p2); + } + + if (0 == stat (key_file_p2, &sbuf )) + { + if (0 == remove(key_file_p2)) + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Successfully removed private key file `%s'\n",key_file_p2); + else + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to private key file `%s'\n",key_file_p2); + } + GNUNET_free(key_file_p1); + GNUNET_free(key_file_p2); + GNUNET_free(cert_file_p1); + GNUNET_free(cert_file_p2); + } + return ok; +} + +/** + * Return the actual path to a file found in the current + * PATH environment variable. + * + * @param binary the name of the file to find + */ +static char * +get_path_from_PATH (char *binary) +{ + char *path; + char *pos; + char *end; + char *buf; + const char *p; + + p = getenv ("PATH"); + if (p == NULL) + { + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, + _("PATH environment variable is unset.\n")); + return NULL; + } + path = GNUNET_strdup (p); /* because we write on it */ + buf = GNUNET_malloc (strlen (path) + 20); + pos = path; + + while (NULL != (end = strchr (pos, PATH_SEPARATOR))) + { + *end = '\0'; + sprintf (buf, "%s/%s", pos, binary); + if (GNUNET_DISK_file_test (buf) == GNUNET_YES) + { + GNUNET_free (path); + return buf; + } + pos = end + 1; + } + sprintf (buf, "%s/%s", pos, binary); + if (GNUNET_DISK_file_test (buf) == GNUNET_YES) + { + GNUNET_free (path); + return buf; + } + GNUNET_free (buf); + GNUNET_free (path); + return NULL; +} + +/** + * Check whether the suid bit is set on a file. + * Attempts to find the file using the current + * PATH environment variable as a search path. + * + * @param binary the name of the file to check + * + * @return GNUNET_YES if the binary is found and + * can be run properly, GNUNET_NO otherwise + */ +static int +check_gnunet_nat_binary(char *binary) +{ + struct stat statbuf; + char *p; +#ifdef MINGW + SOCKET rawsock; +#endif + +#ifdef MINGW + char *binaryexe; + GNUNET_asprintf (&binaryexe, "%s.exe", binary); + p = get_path_from_PATH (binaryexe); + free (binaryexe); +#else + p = get_path_from_PATH (binary); +#endif + if (p == NULL) + { + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, + _("Could not find binary `%s' in PATH!\n"), + binary); + return GNUNET_NO; + } + if (0 != STAT (p, &statbuf)) + { + GNUNET_log (GNUNET_ERROR_TYPE_WARNING, + _("stat (%s) failed: %s\n"), + p, + STRERROR (errno)); + GNUNET_free (p); + return GNUNET_SYSERR; + } + GNUNET_free (p); +#ifndef MINGW + if ( (0 != (statbuf.st_mode & S_ISUID)) && + (statbuf.st_uid == 0) ) + return GNUNET_YES; + return GNUNET_NO; +#else + rawsock = socket (AF_INET, SOCK_RAW, IPPROTO_ICMP); + if (INVALID_SOCKET == rawsock) + { + DWORD err = GetLastError (); + GNUNET_log (GNUNET_ERROR_TYPE_WARNING, + "socket (AF_INET, SOCK_RAW, IPPROTO_ICMP) have failed! GLE = %d\n", err); + return GNUNET_NO; /* not running as administrator */ + } + closesocket (rawsock); + return GNUNET_YES; +#endif +} + +int +main (int argc, char *argv[]) +{ + int ret; +#ifdef MINGW + return GNUNET_SYSERR; +#endif + + GNUNET_log_setup ("test-transport-ats", +#if VERBOSE + "DEBUG", +#else + "WARNING", +#endif + NULL); + + if (strstr(argv[0], "tcp_nat") != NULL) + { + is_tcp_nat = GNUNET_YES; + if (GNUNET_YES != check_gnunet_nat_binary("gnunet-nat-server")) + { + GNUNET_log (GNUNET_ERROR_TYPE_WARNING, + "`%s' not properly installed, cannot run NAT test!\n", + "gnunet-nat-server"); + return 0; + } + } + else if (strstr(argv[0], "tcp") != NULL) + { + is_tcp = GNUNET_YES; + } + else if (strstr(argv[0], "udp_nat") != NULL) + { + is_udp_nat = GNUNET_YES; + if (GNUNET_YES != check_gnunet_nat_binary("gnunet-nat-server")) + { + GNUNET_log (GNUNET_ERROR_TYPE_WARNING, + "`%s' not properly installed, cannot run NAT test!\n", + "gnunet-nat-server"); + return 0; + } + } + else if (strstr(argv[0], "udp") != NULL) + { + is_udp = GNUNET_YES; + } + else if (strstr(argv[0], "unix") != NULL) + { + is_unix = GNUNET_YES; + } + else if (strstr(argv[0], "https") != NULL) + { + is_https = GNUNET_YES; + } + else if (strstr(argv[0], "http") != NULL) + { + is_http = GNUNET_YES; + } + else if (strstr(argv[0], "wlan") != NULL) + { + is_wlan = GNUNET_YES; + } + else if (strstr(argv[0], "multi") != NULL) + { + is_multi_protocol = GNUNET_YES; + } + + ret = check (); + if (is_multi_protocol) + { + GNUNET_DISK_directory_remove ("/tmp/test-gnunetd-transport-multi-peer-1/"); + GNUNET_DISK_directory_remove ("/tmp/test-gnunetd-transport-multi-peer-2/"); + } + else + { + GNUNET_DISK_directory_remove ("/tmp/test-gnunetd-transport-peer-1"); + GNUNET_DISK_directory_remove ("/tmp/test-gnunetd-transport-peer-2"); + } + + //return ret; + /* GGG */ + return 0; +} + +/* end of test_transport_ats.c */ diff --git a/src/transport/test_transport_ats_peer1.conf b/src/transport/test_transport_ats_peer1.conf new file mode 100644 index 000000000..e750ee011 --- /dev/null +++ b/src/transport/test_transport_ats_peer1.conf @@ -0,0 +1,113 @@ +[transport-tcp] +DISABLEV6 = YES +PORT = 12368 +BINDTO = 127.0.0.1 +BEHIND_NAT = NO +ALLOW_NAT = NO +ENABLE_UPNP = NO +INTERNAL_ADDRESS = 127.0.0.1 +EXTERNAL_ADDRESS = 127.0.0.1 + +[fs] +AUTOSTART = NO + +[datastore] +AUTOSTART = NO + +[core] +AUTOSTART = NO + +[hostlist] +HTTP-PROXY = +SERVERS = http://gnunet.org:8080/ +OPTIONS = -b +BINARY = gnunet-daemon-hostlist +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +HTTPPORT = 8080 + +[topology] +BINARY = gnunet-daemon-topology +CONFIG = $DEFAULTCONFIG +FRIENDS = $SERVICEHOME/friends +TARGET-CONNECTION-COUNT = 16 +AUTOCONNECT = YES +FRIENDS-ONLY = NO +MINIMUM-FRIENDS = 0 + +[transport] +PLUGINS = tcp +#DEBUG = YES +#PREFIX = xterm -T transport2 -e gdb --command=cmd --args +#PREFIX = valgrind --tool=memcheck --leak-check=full --log-file=transport%p +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +NEIGHBOUR_LIMIT = 50 +BINARY = gnunet-service-transport +#BINARY = /home/mrwiggles/documents/research/gnunet/gnunet-ng/src/transport/.libs/gnunet-service-transport +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 12365 +UNIXPATH = /tmp/gnunet-p1-service-transport.sock + +[peerinfo] +TRUST = $SERVICEHOME/data/credit/ +HOSTS = $SERVICEHOME/data/hosts/ +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-peerinfo +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 12369 +UNIXPATH = /tmp/gnunet-p1-service-peerinfo.sock + +[resolver] +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-resolver +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 1236 +UNIXPATH = /tmp/gnunet-p1-service-resolver.sock + +[statistics] +AUTOSTART = YES +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-statistics +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 12367 +UNIXPATH = /tmp/gnunet-p1-service-statistics.sock + +[arm] +DEFAULTSERVICES = transport +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-arm +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 12366 +UNIXPATH = /tmp/gnunet-p1-service-arm.sock + +[TESTING] +WEAKRANDOM = YES + +[gnunetd] +HOSTKEY = $SERVICEHOME/.hostkey + +[PATHS] +#DEFAULTCONFIG = test_transport_api_tcp_peer1.conf +SERVICEHOME = /tmp/test-gnunetd-transport-peer-1/ + + +[dht] +AUTOSTART = NO + + diff --git a/src/transport/test_transport_ats_peer2.conf b/src/transport/test_transport_ats_peer2.conf new file mode 100644 index 000000000..40f0b0732 --- /dev/null +++ b/src/transport/test_transport_ats_peer2.conf @@ -0,0 +1,114 @@ +[transport-tcp] +DISABLEV6 = YES +PORT = 0 +BINDTO = 127.0.0.1 +BEHIND_NAT = NO +ALLOW_NAT = NO +ENABLE_UPNP = NO +EXTERNAL_ADDRESS = 127.0.0.1 +INTERNAL_ADDRESS = 127.0.0.1 + +[core] +AUTOSTART = NO + +[fs] +AUTOSTART = NO + +[datastore] +AUTOSTART = NO + +[hostlist] +HTTP-PROXY = +SERVERS = http://gnunet.org:8080/ +OPTIONS = -b +BINARY = gnunet-daemon-hostlist +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +HTTPPORT = 8080 + +[topology] +BINARY = gnunet-daemon-topology +CONFIG = $DEFAULTCONFIG +FRIENDS = $SERVICEHOME/friends +TARGET-CONNECTION-COUNT = 16 +AUTOCONNECT = YES +FRIENDS-ONLY = NO +MINIMUM-FRIENDS = 0 + +[transport] +PLUGINS = tcp +#DEBUG = YES +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +NEIGHBOUR_LIMIT = 50 +#BINARY = /home/mrwiggles/documents/research/gnunet/gnunet-ng/src/transport/.libs/gnunet-service-transport +BINARY = gnunet-service-transport +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 22365 +UNIXPATH = /tmp/gnunet-p2-service-transport.sock +#PREFIX = valgrind --tool=callgrind +#PREFIX = xterm -T transport2 -e gdb --command=cmd --args +#PREFIX = valgrind --leak-check=full + +[peerinfo] +TRUST = $SERVICEHOME/data/credit/ +HOSTS = $SERVICEHOME/data/hosts/ +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-peerinfo +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 22369 +UNIXPATH = /tmp/gnunet-p2-service-peerinfo.sock + +[resolver] +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-resolver +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 22364 +UNIXPATH = /tmp/gnunet-p2-service-resolver.sock + +[statistics] +AUTOSTART = YES +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-statistics +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 22367 +UNIXPATH = /tmp/gnunet-p2-service-statistics.sock + +[arm] +DEFAULTSERVICES = transport +ACCEPT_FROM6 = ::1; +ACCEPT_FROM = 127.0.0.1; +BINARY = gnunet-service-arm +CONFIG = $DEFAULTCONFIG +HOME = $SERVICEHOME +HOSTNAME = localhost +PORT = 22366 +UNIXPATH = /tmp/gnunet-p2-service-arm.sock + +[TESTING] +WEAKRANDOM = YES + +[gnunetd] +HOSTKEY = $SERVICEHOME/.hostkey + +[PATHS] +#DEFAULTCONFIG = test_transport_api_tcp_peer2.conf +SERVICEHOME = /tmp/test-gnunetd-transport-peer-2/ + + +[dht] +AUTOSTART = NO + + -- cgit v1.2.3