123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838 |
- /*
- This file is part of GNUnet
- Copyright (C) 2007, 2009, 2011, 2012, 2015 Christian Grothoff
- GNUnet is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published
- by the Free Software Foundation; either version 3, or (at your
- option) any later version.
- GNUnet is distributed in the hope that it will be useful, but
- WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- General Public License for more details.
- You should have received a copy of the GNU General Public License
- along with GNUnet; see the file COPYING. If not, write to the
- Free Software Foundation, Inc., 59 Temple Place - Suite 330,
- Boston, MA 02111-1307, USA.
- */
- /**
- * @file test_gns_vpn.c
- * @brief testcase for accessing VPN services via GNS
- * @author Martin Schanzenbach
- */
- #include "platform.h"
- #if HAVE_CURL_CURL_H
- #include <curl/curl.h>
- #elif HAVE_GNURL_CURL_H
- #include <gnurl/curl.h>
- #endif
- #include <microhttpd.h>
- #include "gnunet_identity_service.h"
- #include "gnunet_namestore_service.h"
- #include "gnunet_gnsrecord_lib.h"
- #include "gnunet_gns_service.h"
- #include "gnunet_testing_lib.h"
- #define PORT 8080
- #define TEST_DOMAIN "www.gnu"
- #define TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 300)
- /**
- * Return value for #main().
- */
- static int global_ret;
- static struct GNUNET_NAMESTORE_Handle *namestore;
- static struct MHD_Daemon *mhd;
- static struct GNUNET_SCHEDULER_Task *mhd_task_id;
- static struct GNUNET_SCHEDULER_Task *curl_task_id;
- static struct GNUNET_IDENTITY_Handle *identity;
- static struct GNUNET_NAMESTORE_QueueEntry *qe;
- static CURL *curl;
- static CURLM *multi;
- static char *url;
- static struct GNUNET_PeerIdentity id;
- /**
- * IP address of the ultimate destination.
- */
- static const char *dest_ip;
- /**
- * Address family of the dest_ip.
- */
- static int dest_af;
- /**
- * Address family to use by the curl client.
- */
- static int src_af;
- static int use_v6;
- struct CBC
- {
- char buf[1024];
- size_t pos;
- };
- static struct CBC cbc;
- static size_t
- copy_buffer (void *ptr, size_t size, size_t nmemb, void *ctx)
- {
- struct CBC *cbc = ctx;
- if (cbc->pos + size * nmemb > sizeof(cbc->buf))
- return 0; /* overflow */
- memcpy (&cbc->buf[cbc->pos], ptr, size * nmemb);
- cbc->pos += size * nmemb;
- return size * nmemb;
- }
- static int
- mhd_ahc (void *cls,
- struct MHD_Connection *connection,
- const char *url,
- const char *method,
- const char *version,
- const char *upload_data, size_t *upload_data_size,
- void **unused)
- {
- static int ptr;
- struct MHD_Response *response;
- int ret;
- if (0 != strcmp ("GET", method))
- return MHD_NO; /* unexpected method */
- if (&ptr != *unused)
- {
- *unused = &ptr;
- return MHD_YES;
- }
- *unused = NULL;
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "MHD sends respose for request to URL `%s'\n", url);
- response = MHD_create_response_from_buffer (strlen (url),
- (void *) url,
- MHD_RESPMEM_MUST_COPY);
- ret = MHD_queue_response (connection, MHD_HTTP_OK, response);
- MHD_destroy_response (response);
- if (ret == MHD_NO)
- abort ();
- return ret;
- }
- static void
- do_shutdown (void *cls,
- const struct GNUNET_SCHEDULER_TaskContext *c)
- {
- if (mhd_task_id != NULL)
- {
- GNUNET_SCHEDULER_cancel (mhd_task_id);
- mhd_task_id = NULL;
- }
- if (curl_task_id != NULL)
- {
- GNUNET_SCHEDULER_cancel (curl_task_id);
- curl_task_id = NULL;
- }
- if (NULL != mhd)
- {
- MHD_stop_daemon (mhd);
- mhd = NULL;
- }
- if (NULL != identity)
- {
- GNUNET_IDENTITY_disconnect (identity);
- identity = NULL;
- }
- if (NULL != qe)
- {
- GNUNET_NAMESTORE_cancel (qe);
- qe = NULL;
- }
- GNUNET_free_non_null (url);
- url = NULL;
- }
- /**
- * Function to run the HTTP client.
- */
- static void
- curl_main (void);
- static void
- curl_task (void *cls,
- const struct GNUNET_SCHEDULER_TaskContext *tc)
- {
- curl_task_id = NULL;
- curl_main ();
- }
- static void
- curl_main ()
- {
- fd_set rs;
- fd_set ws;
- fd_set es;
- int max;
- struct GNUNET_NETWORK_FDSet nrs;
- struct GNUNET_NETWORK_FDSet nws;
- struct GNUNET_TIME_Relative delay;
- long timeout;
- int running;
- struct CURLMsg *msg;
- max = 0;
- FD_ZERO (&rs);
- FD_ZERO (&ws);
- FD_ZERO (&es);
- curl_multi_perform (multi, &running);
- if (running == 0)
- {
- GNUNET_assert (NULL != (msg = curl_multi_info_read (multi, &running)));
- if (msg->msg == CURLMSG_DONE)
- {
- if (msg->data.result != CURLE_OK)
- {
- fprintf (stderr,
- "%s failed at %s:%d: `%s'\n",
- "curl_multi_perform",
- __FILE__,
- __LINE__, curl_easy_strerror (msg->data.result));
- global_ret = 1;
- }
- }
- curl_multi_remove_handle (multi, curl);
- curl_multi_cleanup (multi);
- curl_easy_cleanup (curl);
- curl = NULL;
- multi = NULL;
- if (cbc.pos != strlen ("/hello_world"))
- {
- GNUNET_break (0);
- global_ret = 2;
- }
- if (0 != strncmp ("/hello_world", cbc.buf, strlen ("/hello_world")))
- {
- GNUNET_break (0);
- global_ret = 3;
- }
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Download complete, shutting down!\n");
- GNUNET_SCHEDULER_shutdown ();
- return;
- }
- GNUNET_assert (CURLM_OK == curl_multi_fdset (multi, &rs, &ws, &es, &max));
- if ( (CURLM_OK != curl_multi_timeout (multi, &timeout)) ||
- (-1 == timeout) )
- delay = GNUNET_TIME_UNIT_SECONDS;
- else
- delay = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS, (unsigned int) timeout);
- GNUNET_NETWORK_fdset_copy_native (&nrs,
- &rs,
- max + 1);
- GNUNET_NETWORK_fdset_copy_native (&nws,
- &ws,
- max + 1);
- curl_task_id = GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
- delay,
- &nrs,
- &nws,
- &curl_task,
- NULL);
- }
- static void
- start_curl (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
- {
- GNUNET_asprintf (&url,
- "http://%s/hello_world",
- TEST_DOMAIN);
- curl = curl_easy_init ();
- curl_easy_setopt (curl, CURLOPT_URL, url);
- curl_easy_setopt (curl, CURLOPT_WRITEFUNCTION, ©_buffer);
- curl_easy_setopt (curl, CURLOPT_WRITEDATA, &cbc);
- curl_easy_setopt (curl, CURLOPT_FAILONERROR, 1);
- curl_easy_setopt (curl, CURLOPT_TIMEOUT, 150L);
- curl_easy_setopt (curl, CURLOPT_CONNECTTIMEOUT, 150L);
- curl_easy_setopt (curl, CURLOPT_NOSIGNAL, 1);
- multi = curl_multi_init ();
- GNUNET_assert (multi != NULL);
- GNUNET_assert (CURLM_OK == curl_multi_add_handle (multi, curl));
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
- "Beginning HTTP download from `%s'\n",
- url);
- curl_main ();
- }
- static void
- disco_ns (void* cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
- {
- GNUNET_NAMESTORE_disconnect (namestore);
- namestore = NULL;
- }
- /**
- * Callback invoked from the namestore service once record is
- * created.
- *
- * @param cls closure
- * @param af address family, AF_INET or AF_INET6; AF_UNSPEC on error;
- * will match 'result_af' from the request
- * @param address IP address (struct in_addr or struct in_addr6, depending on 'af')
- * that the VPN allocated for the redirection;
- * traffic to this IP will now be redirected to the
- * specified target peer; NULL on error
- */
- static void
- commence_testing (void *cls,
- int32_t success,
- const char *emsg)
- {
- qe = NULL;
- GNUNET_SCHEDULER_add_now (&disco_ns, NULL);
- if ((emsg != NULL) && (GNUNET_YES != success))
- {
- fprintf (stderr,
- "NS failed to create record %s\n",
- emsg);
- GNUNET_SCHEDULER_shutdown ();
- return;
- }
- /* wait a little bit before downloading, as we just created the record */
- GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply
- (GNUNET_TIME_UNIT_SECONDS, 1),
- &start_curl,
- NULL);
- }
- /**
- * Function to keep the HTTP server running.
- */
- static void
- mhd_main (void);
- static void
- mhd_task (void *cls,
- const struct GNUNET_SCHEDULER_TaskContext *tc)
- {
- mhd_task_id = NULL;
- MHD_run (mhd);
- mhd_main ();
- }
- static void
- mhd_main ()
- {
- struct GNUNET_NETWORK_FDSet nrs;
- struct GNUNET_NETWORK_FDSet nws;
- fd_set rs;
- fd_set ws;
- fd_set es;
- int max_fd;
- unsigned MHD_LONG_LONG timeout;
- struct GNUNET_TIME_Relative delay;
- GNUNET_assert (NULL == mhd_task_id);
- FD_ZERO (&rs);
- FD_ZERO (&ws);
- FD_ZERO (&es);
- max_fd = -1;
- GNUNET_assert (MHD_YES ==
- MHD_get_fdset (mhd, &rs, &ws, &es, &max_fd));
- if (MHD_YES == MHD_get_timeout (mhd, &timeout))
- delay = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS,
- (unsigned int) timeout);
- else
- delay = GNUNET_TIME_UNIT_FOREVER_REL;
- GNUNET_NETWORK_fdset_copy_native (&nrs,
- &rs,
- max_fd + 1);
- GNUNET_NETWORK_fdset_copy_native (&nws,
- &ws,
- max_fd + 1);
- mhd_task_id = GNUNET_SCHEDULER_add_select (GNUNET_SCHEDULER_PRIORITY_DEFAULT,
- delay,
- &nrs,
- &nws,
- &mhd_task,
- NULL);
- }
- /**
- * Open '/dev/null' and make the result the given
- * file descriptor.
- *
- * @param target_fd desired FD to point to /dev/null
- * @param flags open flags (O_RDONLY, O_WRONLY)
- */
- static void
- open_dev_null (int target_fd,
- int flags)
- {
- int fd;
- fd = open ("/dev/null", flags);
- if (-1 == fd)
- abort ();
- if (fd == target_fd)
- return;
- if (-1 == dup2 (fd, target_fd))
- {
- (void) close (fd);
- abort ();
- }
- (void) close (fd);
- }
- /**
- * Run the given command and wait for it to complete.
- *
- * @param file name of the binary to run
- * @param cmd command line arguments (as given to 'execv')
- * @return 0 on success, 1 on any error
- */
- static int
- fork_and_exec (const char *file,
- char *const cmd[])
- {
- int status;
- pid_t pid;
- pid_t ret;
- pid = fork ();
- if (-1 == pid)
- {
- fprintf (stderr,
- "fork failed: %s\n",
- strerror (errno));
- return 1;
- }
- if (0 == pid)
- {
- /* we are the child process */
- /* close stdin/stdout to not cause interference
- with the helper's main protocol! */
- (void) close (0);
- open_dev_null (0, O_RDONLY);
- (void) close (1);
- open_dev_null (1, O_WRONLY);
- (void) execv (file, cmd);
- /* can only get here on error */
- fprintf (stderr,
- "exec `%s' failed: %s\n",
- file,
- strerror (errno));
- _exit (1);
- }
- /* keep running waitpid as long as the only error we get is 'EINTR' */
- while ( (-1 == (ret = waitpid (pid, &status, 0))) &&
- (errno == EINTR) );
- if (-1 == ret)
- {
- fprintf (stderr,
- "waitpid failed: %s\n",
- strerror (errno));
- return 1;
- }
- if (! (WIFEXITED (status) && (0 == WEXITSTATUS (status))))
- return 1;
- /* child process completed and returned success, we're happy */
- return 0;
- }
- /**
- * Method called to inform about the egos of this peer.
- *
- * When used with #GNUNET_IDENTITY_connect, this function is
- * initially called for all egos and then again whenever a
- * ego's name changes or if it is deleted. At the end of
- * the initial pass over all egos, the function is once called
- * with 'NULL' for @a ego. That does NOT mean that the callback won't
- * be invoked in the future or that there was an error.
- *
- * When used with #GNUNET_IDENTITY_create or #GNUNET_IDENTITY_get,
- * this function is only called ONCE, and 'NULL' being passed in
- * @a ego does indicate an error (i.e. name is taken or no default
- * value is known). If @a ego is non-NULL and if '*ctx'
- * is set in those callbacks, the value WILL be passed to a subsequent
- * call to the identity callback of #GNUNET_IDENTITY_connect (if
- * that one was not NULL).
- *
- * When an identity is renamed, this function is called with the
- * (known) @a ego but the NEW @a name.
- *
- * When an identity is deleted, this function is called with the
- * (known) ego and "NULL" for the @a name. In this case,
- * the @a ego is henceforth invalid (and the @a ctx should also be
- * cleaned up).
- *
- * @param cls closure
- * @param ego ego handle
- * @param ctx context for application to store data for this ego
- * (during the lifetime of this process, initially NULL)
- * @param name name assigned by the user for this ego,
- * NULL if the user just deleted the ego and it
- * must thus no longer be used
- */
- static void
- identity_cb (void *cls,
- struct GNUNET_IDENTITY_Ego *ego,
- void **ctx,
- const char *name)
- {
- const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key;
- struct GNUNET_GNSRECORD_Data rd;
- char *rd_string;
- char *peername;
- if (NULL == name)
- return;
- if (NULL == ego)
- {
- if (NULL == qe)
- {
- fprintf (stderr,
- "Failed to find master-zone ego\n");
- GNUNET_SCHEDULER_shutdown ();
- return;
- }
- GNUNET_IDENTITY_disconnect (identity);
- identity = NULL;
- return;
- }
- GNUNET_assert (NULL != name);
- if (0 != strcmp (name,
- "master-zone"))
- {
- fprintf (stderr,
- "Unexpected name %s\n",
- name);
- return;
- }
- zone_key = GNUNET_IDENTITY_ego_get_private_key (ego);
- rd.expiration_time = GNUNET_TIME_UNIT_FOREVER_ABS.abs_value_us;
- peername = GNUNET_strdup (GNUNET_i2s_full (&id));
- GNUNET_asprintf (&rd_string,
- "6 %s %s",
- peername,
- "www");
- GNUNET_free (peername);
- GNUNET_assert (GNUNET_OK ==
- GNUNET_GNSRECORD_string_to_value (GNUNET_GNSRECORD_TYPE_VPN,
- rd_string,
- (void**) &rd.data,
- &rd.data_size));
- rd.record_type = GNUNET_GNSRECORD_TYPE_VPN;
- qe = GNUNET_NAMESTORE_records_store (namestore,
- zone_key,
- "www",
- 1, &rd,
- &commence_testing,
- NULL);
- GNUNET_free ((void**)rd.data);
- GNUNET_free (rd_string);
- }
- static void
- run (void *cls,
- const struct GNUNET_CONFIGURATION_Handle *cfg,
- struct GNUNET_TESTING_Peer *peer)
- {
- enum MHD_FLAG flags;
- char *bin;
- char *bin_identity;
- char *bin_gns;
- char *config;
- if (GNUNET_OK !=
- GNUNET_CONFIGURATION_get_value_string (cfg,
- "arm",
- "CONFIG",
- &config))
- {
- fprintf (stderr,
- "Failed to locate configuration file. Skipping test.\n");
- GNUNET_SCHEDULER_shutdown ();
- return;
- }
- char *const identity_args[] =
- {
- "gnunet-identity",
- "-C", "master-zone",
- "-c", config,
- NULL
- };
- char *const identity2_args[] =
- {
- "gnunet-identity",
- "-e", "master-zone",
- "-s", "gns-master",
- "-c", config,
- NULL
- };
- char *const identity3_args[] =
- {
- "gnunet-identity",
- "-e", "master-zone",
- "-s", "gns-intercept",
- "-c", config,
- NULL
- };
- char *const gns_args[] =
- {
- "gnunet-gns",
- "-u", "www.gns",
- "-c", config,
- NULL
- };
- GNUNET_TESTING_peer_get_identity (peer, &id);
- GNUNET_SCHEDULER_add_delayed (TIMEOUT,
- &do_shutdown,
- NULL);
- bin = GNUNET_OS_installation_get_path (GNUNET_OS_IPK_BINDIR);
- GNUNET_asprintf (&bin_identity,
- "%s/%s",
- bin,
- "gnunet-identity");
- if (0 != fork_and_exec (bin_identity, identity_args))
- {
- fprintf (stderr,
- "Failed to run `gnunet-identity -C. Skipping test.\n");
- GNUNET_SCHEDULER_shutdown ();
- GNUNET_free (bin_identity);
- GNUNET_free (config);
- GNUNET_free (bin);
- return;
- }
- if (0 != fork_and_exec (bin_identity, identity2_args))
- {
- fprintf (stderr,
- "Failed to run `gnunet-identity -e. Skipping test.\n");
- GNUNET_SCHEDULER_shutdown ();
- GNUNET_free (bin_identity);
- GNUNET_free (config);
- GNUNET_free (bin);
- return;
- }
- if (0 != fork_and_exec (bin_identity, identity3_args))
- {
- fprintf (stderr,
- "Failed to run `gnunet-identity -e. Skipping test.\n");
- GNUNET_SCHEDULER_shutdown ();
- GNUNET_free (bin_identity);
- GNUNET_free (config);
- GNUNET_free (bin);
- return;
- }
- GNUNET_free (bin_identity);
- /* do lookup just to launch GNS service */
- GNUNET_asprintf (&bin_gns,
- "%s/%s",
- bin,
- "gnunet-gns");
- if (0 != fork_and_exec (bin_gns, gns_args))
- {
- fprintf (stderr,
- "Failed to run `gnunet-gns -u. Skipping test.\n");
- GNUNET_SCHEDULER_shutdown ();
- GNUNET_free (bin_gns);
- GNUNET_free (config);
- GNUNET_free (bin);
- return;
- }
- GNUNET_free (bin_gns);
- GNUNET_free (config);
- GNUNET_free (bin);
- namestore = GNUNET_NAMESTORE_connect (cfg);
- GNUNET_assert (NULL != namestore);
- flags = MHD_USE_DEBUG;
- if (GNUNET_YES == use_v6)
- flags |= MHD_USE_DUAL_STACK;
- mhd = MHD_start_daemon (flags,
- PORT,
- NULL, NULL,
- &mhd_ahc, NULL,
- MHD_OPTION_END);
- GNUNET_assert (NULL != mhd);
- mhd_main ();
- identity = GNUNET_IDENTITY_connect (cfg,
- &identity_cb,
- NULL);
- }
- int
- main (int argc, char *const *argv)
- {
- char *sbin_iptables;
- char *bin_vpn;
- char *bin_exit;
- char *bin_dns;
- char *srv_dns;
- struct stat s;
- gid_t my_gid;
- char *const iptables_args[] =
- {
- "iptables", "-t", "mangle", "-L", "-v", NULL
- };
- if (0 == access ("/sbin/iptables", X_OK))
- sbin_iptables = "/sbin/iptables";
- else if (0 == access ("/usr/sbin/iptables", X_OK))
- sbin_iptables = "/usr/sbin/iptables";
- else
- {
- fprintf (stderr,
- "Executable iptables not found in approved directories: %s, skipping\n",
- strerror (errno));
- return 0;
- }
- if (0 != fork_and_exec (sbin_iptables, iptables_args))
- {
- fprintf (stderr,
- "Failed to run `iptables -t mangle -L -v'. Skipping test.\n");
- return 0;
- }
- if (0 != ACCESS ("/dev/net/tun", R_OK))
- {
- GNUNET_log_strerror_file (GNUNET_ERROR_TYPE_ERROR,
- "access",
- "/dev/net/tun");
- fprintf (stderr,
- "WARNING: System unable to run test, skipping.\n");
- return 0;
- }
- bin_vpn = GNUNET_OS_get_libexec_binary_path ("gnunet-helper-vpn");
- bin_exit = GNUNET_OS_get_libexec_binary_path ("gnunet-helper-exit");
- bin_dns = GNUNET_OS_get_libexec_binary_path ("gnunet-helper-dns");
- srv_dns = GNUNET_OS_get_libexec_binary_path ("gnunet-service-dns");
- if ( (0 != geteuid ()) &&
- ( (GNUNET_YES !=
- GNUNET_OS_check_helper_binary (bin_vpn, GNUNET_YES, "-d gnunet-vpn - - 169.1.3.3.7 255.255.255.0")) || //ipv4 only please!
- (GNUNET_YES !=
- GNUNET_OS_check_helper_binary (bin_exit, GNUNET_YES, "-d gnunet-vpn - - - 169.1.3.3.7 255.255.255.0")) || //no nat, ipv4 only
- (GNUNET_YES !=
- GNUNET_OS_check_helper_binary (bin_dns, GNUNET_YES, NULL))) ) // TODO: once we have a windows-testcase, add test parameters here
- {
- fprintf (stderr,
- "WARNING: gnunet-helper-{exit,vpn,dns} binaries in $PATH are not SUID, refusing to run test (as it would have to fail).\n");
- fprintf (stderr,
- "Change $PATH ('.' in $PATH before $GNUNET_PREFIX/bin is problematic) or permissions (run 'make install' as root) to fix this!\n");
- GNUNET_free (bin_vpn);
- GNUNET_free (bin_exit);
- GNUNET_free (bin_dns);
- GNUNET_free (srv_dns);
- return 0;
- }
- GNUNET_free (bin_vpn);
- GNUNET_free (bin_exit);
- my_gid = getgid ();
- if ( (0 != stat (bin_dns, &s)) ||
- (my_gid == s.st_gid) ||
- ( (0 == (S_ISUID & s.st_mode)) && (0 != getuid()) ) )
- {
- fprintf (stderr,
- "WARNING: %s has wrong permissions (%d, %d, %d), refusing to run test (as it would have to fail).\n",
- bin_dns,
- (0 != stat (bin_dns, &s)),
- (my_gid == s.st_gid),
- (0 == (S_ISUID & s.st_mode)) || (0 != getuid()) );
- GNUNET_free (bin_dns);
- GNUNET_free (srv_dns);
- return 0;
- }
- if ( (0 != stat (srv_dns, &s)) ||
- (my_gid == s.st_gid) ||
- (0 == (S_ISGID & s.st_mode)) )
- {
- fprintf (stderr,
- "WARNING: %s has wrong permissions (%d, %d, %d), refusing to run test (as it would have to fail).\n",
- srv_dns,
- (0 != stat (bin_dns, &s)),
- (my_gid == s.st_gid),
- (0 == (S_ISGID & s.st_mode)) );
- GNUNET_free (bin_dns);
- GNUNET_free (srv_dns);
- return 0;
- }
- GNUNET_free (bin_dns);
- GNUNET_free (srv_dns);
- dest_ip = "169.254.86.1";
- dest_af = AF_INET;
- src_af = AF_INET;
- if (GNUNET_OK == GNUNET_NETWORK_test_pf (PF_INET6))
- use_v6 = GNUNET_YES;
- else
- use_v6 = GNUNET_NO;
- if ( (GNUNET_OK != GNUNET_NETWORK_test_pf (src_af)) ||
- (GNUNET_OK != GNUNET_NETWORK_test_pf (dest_af)) )
- {
- fprintf (stderr,
- "Required address families not supported by this system, skipping test.\n");
- return 0;
- }
- if (0 != curl_global_init (CURL_GLOBAL_WIN32))
- {
- fprintf (stderr, "failed to initialize curl\n");
- return 2;
- }
- if (0 != GNUNET_TESTING_peer_run ("test-gnunet-vpn",
- "test_gns_vpn.conf",
- &run, NULL))
- return 1;
- GNUNET_DISK_directory_remove ("/tmp/gnunet-test-vpn");
- return global_ret;
- }
- /* end of test_gns_vpn.c */
|