mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-19 13:17:56 +00:00
39fc4ce6de
Replace the main-loop scheduled periodic alarm with an "activate" alarm that is scheduled whenever a fetch candidate is added to any queue, unless the alarm is already scheduled. Replace the "rhizome.fetch_interval_ms" config item with "rhizome.fetch_delay_ms" [default 50], which is the number of milliseconds between adding a fetch candidate and firing the "activate" alarm. This allows time for a few more Rhizome advertisment packets to arrive after the first one, before deciding which fetches to start first. Add new `is_scheduled()` alarm primitive.
305 lines
9.7 KiB
Bash
Executable File
305 lines
9.7 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
# Tests for Serval rhizome protocol.
|
|
#
|
|
# Copyright 2012 Serval Project Inc.
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
source "${0%/*}/../testframework.sh"
|
|
source "${0%/*}/../testdefs.sh"
|
|
source "${0%/*}/../testdefs_rhizome.sh"
|
|
|
|
shopt -s extglob
|
|
|
|
finally() {
|
|
stop_all_servald_servers
|
|
}
|
|
|
|
teardown() {
|
|
kill_all_servald_processes
|
|
assert_no_servald_processes
|
|
report_all_servald_servers
|
|
}
|
|
|
|
# Called by start_servald_instances for each instance.
|
|
configure_servald_server() {
|
|
executeOk_servald config set log.show_pid on
|
|
executeOk_servald config set log.show_time on
|
|
executeOk_servald config set debug.rhizome on
|
|
executeOk_servald config set debug.rhizometx on
|
|
executeOk_servald config set debug.rhizomerx on
|
|
executeOk_servald config set server.respawn_on_signal off
|
|
executeOk_servald config set mdp.wifi.tick_ms 500
|
|
executeOk_servald config set mdp.selfannounce.ticks_per_full_address 1
|
|
}
|
|
|
|
setup_curl_7() {
|
|
case "$(curl --version | tr '\n' ' ')" in
|
|
curl\ @(7|8|9|[1-9][0-1]).*\ Protocols:*\ http\ *) ;;
|
|
'') fail "curl(1) command is not present";;
|
|
*) fail "curl(1) version is not adequate (expecting 7 or higher)";;
|
|
esac
|
|
unset http_proxy
|
|
unset HTTP_PROXY
|
|
unset HTTPS_PROXY
|
|
unset ALL_PROXY
|
|
}
|
|
|
|
setup_common() {
|
|
setup_servald
|
|
assert_no_servald_processes
|
|
foreach_instance +A +B create_single_identity
|
|
set_instance +B
|
|
}
|
|
|
|
doc_FileTransfer="New bundle and update transfer to one node"
|
|
setup_FileTransfer() {
|
|
setup_common
|
|
set_instance +A
|
|
rhizome_add_file file1
|
|
start_servald_instances +A +B
|
|
foreach_instance +A assert_peers_are_instances +B
|
|
foreach_instance +B assert_peers_are_instances +A
|
|
}
|
|
test_FileTransfer() {
|
|
wait_until bundle_received_by $BID:$VERSION +B
|
|
set_instance +B
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 file1
|
|
assert_rhizome_received file1
|
|
set_instance +A
|
|
rhizome_update_file file1 file2
|
|
set_instance +B
|
|
wait_until bundle_received_by $BID:$VERSION +B
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 file2
|
|
assert_rhizome_received file2
|
|
}
|
|
|
|
doc_FileTransferBig="Big new bundle transfers to one node"
|
|
setup_FileTransferBig() {
|
|
setup_common
|
|
set_instance +A
|
|
dd if=/dev/urandom of=file1 bs=1k count=1k 2>&1
|
|
echo x >>file1
|
|
ls -l file1
|
|
rhizome_add_file file1
|
|
start_servald_instances +A +B
|
|
foreach_instance +A assert_peers_are_instances +B
|
|
foreach_instance +B assert_peers_are_instances +A
|
|
}
|
|
test_FileTransferBig() {
|
|
wait_until bundle_received_by $BID:$VERSION +B
|
|
set_instance +B
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 file1
|
|
assert_rhizome_received file1
|
|
}
|
|
|
|
doc_FileTransferMulti="New bundle transfers to four nodes"
|
|
setup_FileTransferMulti() {
|
|
setup_common
|
|
set_instance +A
|
|
rhizome_add_file file1
|
|
start_servald_instances +A +B +C +D +E
|
|
foreach_instance +A assert_peers_are_instances +B +C +D +E
|
|
foreach_instance +B assert_peers_are_instances +A +C +D +E
|
|
foreach_instance +C assert_peers_are_instances +A +B +D +E
|
|
foreach_instance +D assert_peers_are_instances +A +B +C +E
|
|
}
|
|
test_FileTransferMulti() {
|
|
wait_until bundle_received_by $BID:$VERSION +B +C +D +E
|
|
for i in B C D E; do
|
|
set_instance +$i
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 file1
|
|
assert_rhizome_received file1
|
|
done
|
|
}
|
|
|
|
doc_FileTransferDelete="Payload deletion transfers to one node"
|
|
setup_FileTransferDelete() {
|
|
setup_common
|
|
set_instance +A
|
|
rhizome_add_file file1
|
|
start_servald_instances +A +B
|
|
foreach_instance +A assert_peers_are_instances +B
|
|
foreach_instance +B assert_peers_are_instances +A
|
|
wait_until bundle_received_by $BID:$VERSION +B
|
|
set_instance +A
|
|
>file1_2
|
|
rhizome_update_file file1 file1_2
|
|
}
|
|
test_FileTransferDelete() {
|
|
wait_until bundle_received_by $BID:$VERSION +B
|
|
set_instance +B
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 file1_2
|
|
assert_rhizome_received file1_2
|
|
}
|
|
|
|
doc_HttpImport="Import bundle using HTTP POST multi-part form."
|
|
setup_HttpImport() {
|
|
setup_curl_7
|
|
setup_common
|
|
cat >README.WHYNOTSIPS <<'EOF'
|
|
When we were looking at implementing secure calls for OpenBTS it was suggested
|
|
that we configure Asterisk to use SIPS/ZRTP. This would have been relatively
|
|
easy to setup, however there are a few problems.
|
|
.
|
|
Number one is that when Asterisk checks the certificates it will either
|
|
validate the certificate (checking the chain of trust and so on) and then
|
|
check that the common name attribute on the certificate matches the hostname
|
|
of the peer, or it will do none of these checks. This code is in main/tcptls.c
|
|
line 206 (in version 1.8.14.1).
|
|
.
|
|
This is undesirable in a setup where there is limited or no infrastructure as
|
|
there is not likely to be a DNS server setup, or even rigid IP assignments
|
|
that would allow a static hosts file based setup. This situation would force
|
|
the administrator to disable the checks completely which would allow a trivial
|
|
man in the middle attack.
|
|
.
|
|
It would be possible to modify Asterisk to have a third way where it validates
|
|
the certificate and checks the chain of trust but does not look at the common
|
|
name. We decided against this approach as the VOMP channel driver was written
|
|
in time to avoid it.
|
|
EOF
|
|
set_instance +B
|
|
executeOk_servald rhizome add file $SIDB '' README.WHYNOTSIPS README.WHYNOTSIPS.manifest
|
|
assert_manifest_complete README.WHYNOTSIPS.manifest
|
|
assert_stdout_add_file README.WHYNOTSIPS
|
|
set_instance +A
|
|
start_servald_instances +A
|
|
wait_until rhizome_http_server_started +A
|
|
get_rhizome_server_port PORTA +A
|
|
}
|
|
test_HttpImport() {
|
|
executeOk curl \
|
|
--silent --fail --show-error \
|
|
--output http.output \
|
|
--dump-header http.headers \
|
|
--write-out '%{http_code}\n' \
|
|
--form 'data=@README.WHYNOTSIPS' \
|
|
--form 'manifest=@README.WHYNOTSIPS.manifest' \
|
|
"$addr_localhost:$PORTA/rhizome/import"
|
|
tfw_cat http.headers http.output
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 README.WHYNOTSIPS
|
|
assert_rhizome_received README.WHYNOTSIPS
|
|
}
|
|
|
|
doc_HttpAddLocal="Add file locally using HTTP, returns manifest"
|
|
setup_HttpAddLocal() {
|
|
setup_curl_7
|
|
setup_common
|
|
set_instance +A
|
|
executeOk_servald config set rhizome.api.addfile.uri "/rhizome/secretaddfile"
|
|
executeOk_servald config set rhizome.api.addfile.author $SIDA
|
|
start_servald_instances +A
|
|
wait_until rhizome_http_server_started +A
|
|
get_rhizome_server_port PORTA +A
|
|
}
|
|
test_HttpAddLocal() {
|
|
echo 'File file1' >file1
|
|
executeOk curl --silent --form 'data=@file1' "http://$addr_localhost:$PORTA/rhizome/secretaddfile" --output file1.manifest
|
|
assert_manifest_complete file1.manifest
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=1 file1
|
|
extract_manifest_name name file1.manifest
|
|
assert [ "$name" = file1 ]
|
|
assert_rhizome_received file1
|
|
}
|
|
|
|
setup_sync() {
|
|
set_instance +A
|
|
rhizome_add_file file1
|
|
BID1=$BID
|
|
VERSION1=$VERSION
|
|
start_servald_instances dummy1 +A
|
|
wait_until rhizome_http_server_started +A
|
|
get_rhizome_server_port PORTA +A
|
|
set_instance +B
|
|
executeOk_servald config set log.show_time on
|
|
executeOk_servald config set debug.rhizome on
|
|
executeOk_servald config set debug.rhizometx on
|
|
executeOk_servald config set debug.rhizomerx on
|
|
executeOk_servald config set rhizome.direct.peer.count "1"
|
|
executeOk_servald config set rhizome.direct.peer.0 "http://${addr_localhost}:${PORTA}"
|
|
rhizome_add_file file2
|
|
BID2=$BID
|
|
VERSION2=$VERSION
|
|
}
|
|
|
|
doc_DirectPush="One way push bundle to unconnected node"
|
|
setup_DirectPush() {
|
|
setup_common
|
|
setup_sync
|
|
}
|
|
test_DirectPush() {
|
|
set_instance +B
|
|
executeOk_servald rhizome direct push
|
|
tfw_cat --stdout --stderr
|
|
assert bundle_received_by $BID2:$VERSION2 +A
|
|
set_instance +A
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=1 file1 --fromhere=0 file2
|
|
assert_rhizome_received file2
|
|
set_instance +B
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=1 file2
|
|
}
|
|
|
|
doc_DirectPull="One way pull bundle from unconnected node"
|
|
setup_DirectPull() {
|
|
setup_common
|
|
setup_sync
|
|
}
|
|
test_DirectPull() {
|
|
set_instance +B
|
|
executeOk_servald rhizome direct pull
|
|
tfw_cat --stdout --stderr
|
|
assert bundle_received_by $BID1:$VERSION1 --stderr
|
|
set_instance +A
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=1 file1
|
|
set_instance +B
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 file1 --fromhere=1 file2
|
|
assert_rhizome_received file1
|
|
}
|
|
|
|
doc_DirectSync="Two-way sync bundles between unconnected nodes"
|
|
setup_DirectSync() {
|
|
setup_common
|
|
setup_sync
|
|
}
|
|
test_DirectSync() {
|
|
set_instance +B
|
|
executeOk_servald rhizome direct sync
|
|
tfw_cat --stdout --stderr
|
|
assert bundle_received_by $BID1:$VERSION1 --stderr $BID2:$VERSION2 +A
|
|
set_instance +A
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=1 file1 --fromhere=0 file2
|
|
assert_rhizome_received file2
|
|
set_instance +B
|
|
executeOk_servald rhizome list ''
|
|
assert_rhizome_list --fromhere=0 file1 --fromhere=1 file2
|
|
assert_rhizome_received file1
|
|
}
|
|
|
|
runTests "$@"
|