2018-02-18 08:57:45 +08:00
|
|
|
/* Tests that we can save and load Tox data.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2018-07-17 06:46:02 +08:00
|
|
|
#include <string.h>
|
2018-02-18 08:57:45 +08:00
|
|
|
#include <time.h>
|
|
|
|
|
2018-07-17 06:46:02 +08:00
|
|
|
#include "../testing/misc_tools.h"
|
2018-02-18 08:57:45 +08:00
|
|
|
#include "../toxcore/ccompat.h"
|
|
|
|
#include "../toxcore/tox.h"
|
|
|
|
#include "../toxcore/util.h"
|
2018-07-17 06:46:02 +08:00
|
|
|
#include "check_compat.h"
|
2018-02-18 08:57:45 +08:00
|
|
|
|
2018-09-26 03:37:21 +08:00
|
|
|
/* The Travis-CI container responds poorly to ::1 as a localhost address
|
|
|
|
* You're encouraged to -D FORCE_TESTS_IPV6 on a local test */
|
|
|
|
#ifdef TOX_LOCALHOST
|
|
|
|
#undef TOX_LOCALHOST
|
|
|
|
#endif
|
|
|
|
#ifdef FORCE_TESTS_IPV6
|
|
|
|
#define TOX_LOCALHOST "::1"
|
|
|
|
#else
|
|
|
|
#define TOX_LOCALHOST "127.0.0.1"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef TCP_RELAY_PORT
|
|
|
|
#undef TCP_RELAY_PORT
|
|
|
|
#endif
|
|
|
|
#define TCP_RELAY_PORT 33430
|
|
|
|
|
2018-02-18 08:57:45 +08:00
|
|
|
static void accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, size_t length, void *userdata)
|
|
|
|
{
|
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
|
|
|
tox_friend_add_norequest(m, public_key, nullptr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned int connected_t1;
|
2018-10-09 05:05:14 +08:00
|
|
|
static void tox_connection_status(Tox *tox, Tox_Connection connection_status, void *user_data)
|
2018-02-18 08:57:45 +08:00
|
|
|
{
|
|
|
|
if (connected_t1 && !connection_status) {
|
|
|
|
ck_abort_msg("Tox went offline");
|
|
|
|
}
|
|
|
|
|
2021-11-26 04:32:29 +08:00
|
|
|
ck_assert_msg(connection_status != TOX_CONNECTION_NONE, "wrong status %d", connection_status);
|
2018-02-18 08:57:45 +08:00
|
|
|
|
|
|
|
connected_t1 = connection_status;
|
|
|
|
}
|
|
|
|
|
2018-09-26 03:37:21 +08:00
|
|
|
/* validate that:
|
|
|
|
* a) saving stays within the confined space
|
|
|
|
* b) a saved state can be loaded back successfully
|
|
|
|
* c) a second save is of equal size
|
|
|
|
* d) the second save is of equal content */
|
|
|
|
static void reload_tox(Tox **tox, struct Tox_Options *const in_opts, void *user_data)
|
|
|
|
{
|
|
|
|
const size_t extra = 64;
|
|
|
|
const size_t save_size1 = tox_get_savedata_size(*tox);
|
|
|
|
ck_assert_msg(save_size1 != 0, "save is invalid size %u", (unsigned)save_size1);
|
|
|
|
printf("%u\n", (unsigned)save_size1);
|
|
|
|
|
|
|
|
uint8_t *buffer = (uint8_t *)malloc(save_size1 + 2 * extra);
|
|
|
|
ck_assert_msg(buffer != nullptr, "malloc failed");
|
|
|
|
memset(buffer, 0xCD, extra);
|
|
|
|
memset(buffer + extra + save_size1, 0xCD, extra);
|
|
|
|
tox_get_savedata(*tox, buffer + extra);
|
|
|
|
tox_kill(*tox);
|
|
|
|
|
|
|
|
for (size_t i = 0; i < extra; ++i) {
|
|
|
|
ck_assert_msg(buffer[i] == 0xCD, "Buffer underwritten from tox_get_savedata() @%u", (unsigned)i);
|
|
|
|
ck_assert_msg(buffer[extra + save_size1 + i] == 0xCD, "Buffer overwritten from tox_get_savedata() @%u", (unsigned)i);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct Tox_Options *const options = (in_opts == nullptr) ? tox_options_new(nullptr) : in_opts;
|
|
|
|
|
|
|
|
tox_options_set_savedata_type(options, TOX_SAVEDATA_TYPE_TOX_SAVE);
|
|
|
|
|
|
|
|
tox_options_set_savedata_data(options, buffer + extra, save_size1);
|
|
|
|
|
|
|
|
*tox = tox_new_log(options, nullptr, user_data);
|
|
|
|
|
|
|
|
if (in_opts == nullptr) {
|
|
|
|
tox_options_free(options);
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(*tox != nullptr, "Failed to load back stored buffer");
|
|
|
|
|
|
|
|
const size_t save_size2 = tox_get_savedata_size(*tox);
|
|
|
|
|
|
|
|
ck_assert_msg(save_size1 == save_size2, "Tox save data changed in size from a store/load cycle: %u -> %u",
|
|
|
|
(unsigned)save_size1, (unsigned)save_size2);
|
|
|
|
|
|
|
|
uint8_t *buffer2 = (uint8_t *)malloc(save_size2);
|
|
|
|
|
|
|
|
ck_assert_msg(buffer2 != nullptr, "malloc failed");
|
|
|
|
|
|
|
|
tox_get_savedata(*tox, buffer2);
|
|
|
|
|
|
|
|
ck_assert_msg(!memcmp(buffer + extra, buffer2, save_size2), "Tox state changed by store/load/store cycle");
|
|
|
|
|
|
|
|
free(buffer2);
|
|
|
|
|
|
|
|
free(buffer);
|
|
|
|
}
|
|
|
|
|
2018-02-18 08:57:45 +08:00
|
|
|
static void test_few_clients(void)
|
|
|
|
{
|
|
|
|
uint32_t index[] = { 1, 2, 3 };
|
|
|
|
time_t con_time = 0, cur_time = time(nullptr);
|
2018-09-26 03:37:21 +08:00
|
|
|
|
|
|
|
struct Tox_Options *opts1 = tox_options_new(nullptr);
|
|
|
|
tox_options_set_tcp_port(opts1, TCP_RELAY_PORT);
|
2021-12-07 02:37:49 +08:00
|
|
|
Tox_Err_New t_n_error;
|
|
|
|
Tox *tox1 = tox_new_log(opts1, &t_n_error, &index[0]);
|
|
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "Failed to create tox instance: %d", t_n_error);
|
2018-09-26 03:37:21 +08:00
|
|
|
tox_options_free(opts1);
|
|
|
|
|
|
|
|
struct Tox_Options *opts2 = tox_options_new(nullptr);
|
|
|
|
tox_options_set_udp_enabled(opts2, false);
|
|
|
|
tox_options_set_local_discovery_enabled(opts2, false);
|
2021-12-07 02:37:49 +08:00
|
|
|
Tox *tox2 = tox_new_log(opts2, &t_n_error, &index[1]);
|
|
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "Failed to create tox instance: %d", t_n_error);
|
2018-09-26 03:37:21 +08:00
|
|
|
|
|
|
|
struct Tox_Options *opts3 = tox_options_new(nullptr);
|
|
|
|
tox_options_set_local_discovery_enabled(opts3, false);
|
2021-12-07 02:37:49 +08:00
|
|
|
Tox *tox3 = tox_new_log(opts3, &t_n_error, &index[2]);
|
|
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "Failed to create tox instance: %d", t_n_error);
|
2018-02-18 08:57:45 +08:00
|
|
|
|
|
|
|
ck_assert_msg(tox1 && tox2 && tox3, "Failed to create 3 tox instances");
|
|
|
|
|
|
|
|
uint8_t dht_key[TOX_PUBLIC_KEY_SIZE];
|
|
|
|
tox_self_get_dht_id(tox1, dht_key);
|
|
|
|
const uint16_t dht_port = tox_self_get_udp_port(tox1, nullptr);
|
|
|
|
|
2018-09-26 03:37:21 +08:00
|
|
|
printf("using tox1 as tcp relay for tox2\n");
|
|
|
|
tox_add_tcp_relay(tox2, TOX_LOCALHOST, TCP_RELAY_PORT, dht_key, nullptr);
|
|
|
|
|
|
|
|
printf("bootstrapping toxes off tox1\n");
|
2018-02-18 08:57:45 +08:00
|
|
|
tox_bootstrap(tox2, "localhost", dht_port, dht_key, nullptr);
|
|
|
|
tox_bootstrap(tox3, "localhost", dht_port, dht_key, nullptr);
|
|
|
|
|
|
|
|
connected_t1 = 0;
|
|
|
|
tox_callback_self_connection_status(tox1, tox_connection_status);
|
|
|
|
tox_callback_friend_request(tox2, accept_friend_request);
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
tox_self_get_address(tox2, address);
|
|
|
|
uint32_t test = tox_friend_add(tox3, address, (const uint8_t *)"Gentoo", 7, nullptr);
|
2021-12-09 19:07:45 +08:00
|
|
|
ck_assert_msg(test == 0, "Failed to add friend error code: %u", test);
|
2018-02-18 08:57:45 +08:00
|
|
|
|
|
|
|
uint8_t off = 1;
|
|
|
|
|
2018-08-25 20:16:54 +08:00
|
|
|
while (true) {
|
2018-02-18 08:57:45 +08:00
|
|
|
tox_iterate(tox1, nullptr);
|
|
|
|
tox_iterate(tox2, nullptr);
|
|
|
|
tox_iterate(tox3, nullptr);
|
|
|
|
|
|
|
|
if (tox_self_get_connection_status(tox1) && tox_self_get_connection_status(tox2)
|
|
|
|
&& tox_self_get_connection_status(tox3)) {
|
|
|
|
if (off) {
|
2018-08-16 15:09:12 +08:00
|
|
|
printf("Toxes are online, took %lu seconds\n", (unsigned long)(time(nullptr) - cur_time));
|
2018-02-18 08:57:45 +08:00
|
|
|
con_time = time(nullptr);
|
|
|
|
off = 0;
|
|
|
|
}
|
|
|
|
|
2018-09-26 03:37:21 +08:00
|
|
|
if (tox_friend_get_connection_status(tox2, 0, nullptr) == TOX_CONNECTION_TCP
|
|
|
|
&& tox_friend_get_connection_status(tox3, 0, nullptr) == TOX_CONNECTION_TCP) {
|
2018-02-18 08:57:45 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(ITERATION_INTERVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(connected_t1, "Tox1 isn't connected. %u", connected_t1);
|
2018-08-16 15:09:12 +08:00
|
|
|
printf("tox clients connected took %lu seconds\n", (unsigned long)(time(nullptr) - con_time));
|
2018-02-18 08:57:45 +08:00
|
|
|
|
2018-09-26 03:37:21 +08:00
|
|
|
reload_tox(&tox2, opts2, &index[1]);
|
|
|
|
|
|
|
|
reload_tox(&tox3, opts3, &index[2]);
|
2018-02-18 08:57:45 +08:00
|
|
|
|
|
|
|
cur_time = time(nullptr);
|
2018-09-26 03:37:21 +08:00
|
|
|
|
2018-02-18 08:57:45 +08:00
|
|
|
off = 1;
|
|
|
|
|
2018-08-25 20:16:54 +08:00
|
|
|
while (true) {
|
2018-02-18 08:57:45 +08:00
|
|
|
tox_iterate(tox1, nullptr);
|
|
|
|
tox_iterate(tox2, nullptr);
|
|
|
|
tox_iterate(tox3, nullptr);
|
|
|
|
|
|
|
|
if (tox_self_get_connection_status(tox1) && tox_self_get_connection_status(tox2)
|
|
|
|
&& tox_self_get_connection_status(tox3)) {
|
|
|
|
if (off) {
|
2018-08-16 15:09:12 +08:00
|
|
|
printf("Toxes are online again after reloading, took %lu seconds\n", (unsigned long)(time(nullptr) - cur_time));
|
2018-02-18 08:57:45 +08:00
|
|
|
con_time = time(nullptr);
|
|
|
|
off = 0;
|
|
|
|
}
|
|
|
|
|
2018-09-26 03:37:21 +08:00
|
|
|
if (tox_friend_get_connection_status(tox2, 0, nullptr) == TOX_CONNECTION_TCP
|
|
|
|
&& tox_friend_get_connection_status(tox3, 0, nullptr) == TOX_CONNECTION_TCP) {
|
2018-02-18 08:57:45 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(ITERATION_INTERVAL);
|
|
|
|
}
|
|
|
|
|
2018-08-16 15:09:12 +08:00
|
|
|
printf("tox clients connected took %lu seconds\n", (unsigned long)(time(nullptr) - con_time));
|
2018-02-18 08:57:45 +08:00
|
|
|
|
2018-08-16 15:09:12 +08:00
|
|
|
printf("test_few_clients succeeded, took %lu seconds\n", (unsigned long)(time(nullptr) - cur_time));
|
2018-02-18 08:57:45 +08:00
|
|
|
|
|
|
|
tox_kill(tox1);
|
|
|
|
tox_kill(tox2);
|
|
|
|
tox_kill(tox3);
|
2018-09-26 03:37:21 +08:00
|
|
|
|
|
|
|
tox_options_free(opts2);
|
|
|
|
tox_options_free(opts3);
|
2018-02-18 08:57:45 +08:00
|
|
|
}
|
|
|
|
|
2018-02-23 10:22:38 +08:00
|
|
|
int main(void)
|
2018-02-18 08:57:45 +08:00
|
|
|
{
|
|
|
|
setvbuf(stdout, nullptr, _IONBF, 0);
|
|
|
|
|
|
|
|
test_few_clients();
|
|
|
|
return 0;
|
|
|
|
}
|