mongoose/test/mip_tap_test.c

405 lines
14 KiB
C
Raw Permalink Normal View History

#define MG_ENABLE_TCPIP 1
2024-03-13 01:03:29 +08:00
#define MG_ENABLE_TCPIP_DRIVER_INIT 0
2024-07-23 04:14:10 +08:00
#define MIPTAPTEST_USING_DHCP 1
#define FETCH_BUF_SIZE (8 * 1024)
#include <sys/socket.h>
#ifndef __OpenBSD__
#include <linux/if.h>
#include <linux/if_tun.h>
#else
#include <net/if.h>
#include <net/if_tun.h>
#include <net/if_types.h>
#endif
#include <sys/ioctl.h>
2023-08-22 04:15:21 +08:00
#include "mongoose.c"
2023-08-22 04:15:21 +08:00
#include "driver_mock.c"
2024-09-28 05:33:26 +08:00
#define MQTT_URL "mqtt://broker.hivemq.com:1883" // MQTT broker URL
#if MG_TLS == MG_TLS_BUILTIN
#define MQTTS_URL "mqtts://mongoose.ws:8883" // HiveMQ does not do TLS1.3
#define MQTTS_CA mg_str(s_ca_cert)
static const char *s_ca_cert =
"-----BEGIN CERTIFICATE-----\n"
"MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw\n"
"TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh\n"
"cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4\n"
"WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu\n"
"ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY\n"
"MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc\n"
"h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+\n"
"0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U\n"
"A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW\n"
"T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH\n"
"B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC\n"
"B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv\n"
"KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn\n"
"OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn\n"
"jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw\n"
"qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI\n"
"rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV\n"
"HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq\n"
"hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL\n"
"ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ\n"
"3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK\n"
"NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5\n"
"ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur\n"
"TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC\n"
"jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc\n"
"oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq\n"
"4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA\n"
"mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d\n"
"emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc=\n"
"-----END CERTIFICATE-----\n";
#elif MG_TLS
#define MQTTS_URL "mqtts://broker.hivemq.com:8883" // MQTT broker URL
#define MQTTS_CA mg_unpacked("/data/ca.pem")
#endif
static int s_num_tests = 0;
2024-10-04 00:46:50 +08:00
#define ABORT() \
usleep(500000); /* 500 ms, GH print reason */ \
abort();
#define ASSERT(expr) \
do { \
s_num_tests++; \
if (!(expr)) { \
printf("FAILURE %s:%d: %s\n", __FILE__, __LINE__, #expr); \
2024-10-04 00:46:50 +08:00
ABORT(); \
} \
} while (0)
// MIP TUNTAP driver
static size_t tap_rx(void *buf, size_t len, struct mg_tcpip_if *ifp) {
2022-12-19 19:43:25 +08:00
ssize_t received = read(*(int *) ifp->driver_data, buf, len);
usleep(1); // This is to avoid 100% CPU
if (received < 0) return 0;
return (size_t) received;
}
static size_t tap_tx(const void *buf, size_t len, struct mg_tcpip_if *ifp) {
2022-12-19 19:43:25 +08:00
ssize_t res = write(*(int *) ifp->driver_data, buf, len);
if (res < 0) {
MG_ERROR(("tap_tx failed: %d", errno));
return 0;
}
return (size_t) res;
}
static bool tap_up(struct mg_tcpip_if *ifp) {
2022-12-19 19:43:25 +08:00
return ifp->driver_data ? true : false;
}
2024-07-23 04:14:10 +08:00
static void eh1(struct mg_connection *c, int ev, void *ev_data) {
struct mg_tls_opts *topts = (struct mg_tls_opts *) c->fn_data;
if (ev == MG_EV_ACCEPT && topts != NULL) mg_tls_init(c, topts);
if (ev == MG_EV_HTTP_MSG) {
struct mg_http_message *hm = (struct mg_http_message *) ev_data;
2024-07-23 04:14:10 +08:00
MG_DEBUG(("[%.*s %.*s] message len %d", (int) hm->method.len, hm->method.buf,
(int) hm->uri.len, hm->uri.buf, (int) hm->message.len));
if (mg_match(hm->uri, mg_str("/foo/*"), NULL)) {
mg_http_reply(c, 200, "", "uri: %.*s", hm->uri.len - 5, hm->uri.buf + 5);
} else if (mg_match(hm->uri, mg_str("/ws"), NULL)) {
mg_ws_upgrade(c, hm, NULL);
} else if (mg_match(hm->uri, mg_str("/body"), NULL)) {
mg_http_reply(c, 200, "", "%.*s", (int) hm->body.len, hm->body.buf);
} else {
struct mg_http_serve_opts sopts;
memset(&sopts, 0, sizeof(sopts));
sopts.root_dir = "./data";
mg_http_serve_dir(c, hm, &sopts);
}
2024-07-23 04:14:10 +08:00
} else if (ev == MG_EV_WS_OPEN) {
struct mg_http_message *hm = (struct mg_http_message *) ev_data;
ASSERT(mg_strcmp(hm->uri, mg_str("/ws")) == 0);
mg_ws_send(c, "opened", 6, WEBSOCKET_OP_BINARY);
} else if (ev == MG_EV_WS_MSG) {
struct mg_ws_message *wm = (struct mg_ws_message *) ev_data;
mg_ws_send(c, wm->data.buf, wm->data.len, WEBSOCKET_OP_BINARY);
}
}
2024-07-23 04:14:10 +08:00
struct fetch_data {
char *buf;
2024-07-25 05:30:08 +08:00
const char *url;
int code, closed;
2024-07-23 04:14:10 +08:00
};
2024-07-23 04:14:10 +08:00
static void fcb(struct mg_connection *c, int ev, void *ev_data) {
struct fetch_data *fd = (struct fetch_data *) c->fn_data;
2024-07-24 01:35:32 +08:00
if (ev == MG_EV_CONNECT) {
MG_DEBUG(("CONNECT"));
2024-07-25 05:30:08 +08:00
if (mg_url_is_ssl(fd->url)) {
struct mg_tls_opts opts;
memset(&opts, 0, sizeof(opts)); // read CA from packed_fs
opts.name = mg_url_host(fd->url);
opts.ca = mg_unpacked("/data/ca.pem");
mg_tls_init(c, &opts);
}
2024-07-24 01:35:32 +08:00
} else if (ev == MG_EV_HTTP_MSG) {
2024-07-23 04:14:10 +08:00
struct mg_http_message *hm = (struct mg_http_message *) ev_data;
snprintf(fd->buf, FETCH_BUF_SIZE, "%.*s", (int) hm->message.len, hm->message.buf);
fd->code = atoi(hm->uri.buf);
fd->closed = 1;
c->is_closing = 1;
MG_DEBUG(("CODE: %d, MSG: %.*s", fd->code, (int) hm->message.len, hm->message.buf));
(void) c;
} else if (ev == MG_EV_CLOSE) {
MG_DEBUG(("CLOSE"));
fd->closed = 1;
2024-07-25 05:30:08 +08:00
} else if (ev == MG_EV_READ) {
long bytes = *(long *) ev_data;
MG_DEBUG(("READ %d: %.*s", (int) bytes, (int) bytes, c->recv.buf));
}
2024-07-23 04:14:10 +08:00
}
2023-08-14 22:42:25 +08:00
2024-07-23 04:14:10 +08:00
static int fetch(struct mg_mgr *mgr, char *buf, const char *url,
const char *fmt, ...) {
2024-07-25 05:30:08 +08:00
struct fetch_data fd = {buf, url, 0, 0};
2024-07-23 04:14:10 +08:00
int i;
struct mg_connection *c = NULL;
va_list ap;
c = mg_http_connect(mgr, url, fcb, &fd);
ASSERT(c != NULL);
va_start(ap, fmt);
mg_vprintf(c, fmt, &ap);
va_end(ap);
buf[0] = '\0';
for (i = 0; i < 500 && buf[0] == '\0' && !fd.closed; i++) {
mg_mgr_poll(mgr, 0);
2024-07-23 04:14:10 +08:00
usleep(10000); // 10 ms. Slow down poll loop to ensure packet transit
}
2024-07-23 04:14:10 +08:00
if (!fd.closed) c->is_closing = 1;
mg_mgr_poll(mgr, 0);
2024-07-23 04:14:10 +08:00
return fd.code;
}
2024-07-23 04:14:10 +08:00
static void test_http_client(struct mg_mgr *mgr) {
char buf[FETCH_BUF_SIZE];
int rc = 0;
const bool ipv6 = 0;
#if MG_TLS
if (ipv6) {
rc = fetch(mgr, buf, "https://ipv6.google.com", "GET / HTTP/1.0\r\nHost: ipv6.google.com\r\n\r\n");
} else {
2024-07-23 04:14:10 +08:00
rc = fetch(mgr, buf, "https://cesanta.com", "GET /robots.txt HTTP/1.0\r\nHost: cesanta.com\r\n\r\n");
}
2024-07-23 04:14:10 +08:00
ASSERT(rc == 200); // OK
#else
2023-08-22 04:15:21 +08:00
if (ipv6) {
2024-07-23 04:14:10 +08:00
rc = fetch(mgr, buf, "http://ipv6.google.com", "GET / HTTP/1.0\r\nHost: ipv6.google.com\r\n\r\n");
2023-08-22 04:15:21 +08:00
} else {
2024-07-23 04:14:10 +08:00
rc = fetch(mgr, buf, "http://cesanta.com", "GET /robots.txt HTTP/1.0\r\nHost: cesanta.com\r\n\r\n");
2023-08-22 04:15:21 +08:00
}
2024-07-23 04:14:10 +08:00
ASSERT(rc == 301); // OK: Permanently moved (HTTP->HTTPS redirect)
2023-08-22 04:15:21 +08:00
2024-07-23 04:14:10 +08:00
#endif
2023-08-22 04:15:21 +08:00
}
static struct mg_connection *s_conn;
static char s_topic[16];
static void mqtt_fn(struct mg_connection *c, int ev, void *ev_data) {
2024-07-25 05:30:08 +08:00
if (ev == MG_EV_CONNECT) {
MG_DEBUG(("CONNECT"));
#if MG_TLS
2024-09-28 05:33:26 +08:00
struct mg_tls_opts opts;
memset(&opts, 0, sizeof(opts));
opts.ca = MQTTS_CA;
opts.name = mg_url_host(MQTTS_URL);
2024-07-25 05:30:08 +08:00
mg_tls_init(c, &opts);
#endif
} else if (ev == MG_EV_MQTT_OPEN) {
MG_DEBUG(("MQTT CONNECT"));
2023-08-22 04:15:21 +08:00
struct mg_mqtt_opts sub_opts;
memset(&sub_opts, 0, sizeof(sub_opts));
sub_opts.topic = mg_str(mg_random_str(s_topic, sizeof(s_topic)));
sub_opts.qos = 1;
mg_mqtt_sub(c, &sub_opts);
struct mg_mqtt_opts pub_opts;
memset(&pub_opts, 0, sizeof(pub_opts));
pub_opts.topic = sub_opts.topic;
pub_opts.message = mg_str("hi");
pub_opts.qos = 1, pub_opts.retain = false;
mg_mqtt_pub(c, &pub_opts);
} else if (ev == MG_EV_MQTT_MSG) {
struct mg_mqtt_message *mm = (struct mg_mqtt_message *) ev_data;
2024-07-23 04:14:10 +08:00
MG_DEBUG(("TOPIC: %.*s, MSG: %.*s", (int) mm->topic.len, mm->topic.buf, (int) mm->data.len, mm->data.buf));
ASSERT(mm->topic.len == strlen(s_topic) && strcmp(mm->topic.buf, s_topic) == 0);
ASSERT(mm->data.len == 2 && strcmp(mm->data.buf, "hi") == 0);
2023-08-22 04:15:21 +08:00
mg_mqtt_disconnect(c, NULL);
*(bool *) c->fn_data = true;
2023-08-22 04:15:21 +08:00
} else if (ev == MG_EV_CLOSE) {
2024-07-23 04:14:10 +08:00
MG_DEBUG(("CLOSE"));
2023-08-22 04:15:21 +08:00
s_conn = NULL;
2024-07-25 05:30:08 +08:00
} else if (ev == MG_EV_ERROR) {
MG_ERROR(("%lu ERROR %s", c->id, (char *) ev_data));
2023-08-22 04:15:21 +08:00
}
}
static void test_mqtt_connsubpub(struct mg_mgr *mgr) {
bool passed = false;
struct mg_mqtt_opts opts;
memset(&opts, 0, sizeof(opts));
opts.clean = true, opts.version = 4;
2024-07-25 05:30:08 +08:00
#if MG_TLS
s_conn = mg_mqtt_connect(mgr, MQTTS_URL, &opts, mqtt_fn, &passed);
#else
s_conn = mg_mqtt_connect(mgr, MQTT_URL, &opts, mqtt_fn, &passed);
#endif
2023-08-22 04:15:21 +08:00
ASSERT(s_conn != NULL);
for (int i = 0; i < 500 && s_conn != NULL && !s_conn->is_closing; i++) {
mg_mgr_poll(mgr, 0);
usleep(10000); // 10 ms. Slow down poll loop to ensure packets transit
}
ASSERT(passed);
mg_mgr_poll(mgr, 0);
}
2024-07-23 04:14:10 +08:00
#include <pthread.h>
static void *poll_thread(void *p) {
struct mg_mgr *mgr = (struct mg_mgr *) p;
int i;
2024-07-24 01:35:32 +08:00
for (i = 0; i < 300; i++) {
2024-07-23 04:14:10 +08:00
mg_mgr_poll(mgr, 0);
usleep(10000); // 10 ms. Slow down poll loop to ensure packet transit
}
return NULL;
}
static void test_http_server(struct mg_mgr *mgr, uint32_t ip) {
struct mg_connection *c;
char *cmd;
pthread_t thread_id = (pthread_t) 0;
#if MG_TLS
struct mg_tls_opts opts;
memset(&opts, 0, sizeof(opts));
// opts.ca = mg_str(s_tls_ca);
opts.cert = mg_unpacked("/certs/server.crt");
opts.key = mg_unpacked("/certs/server.key");
c = mg_http_listen(mgr, "https://0.0.0.0:12347", eh1, &opts);
cmd = mg_mprintf("./mip_curl.sh --insecure https://%M:12347", mg_print_ip4, &ip);
#else
c = mg_http_listen(mgr, "http://0.0.0.0:12347", eh1, NULL);
cmd = mg_mprintf("./mip_curl.sh http://%M:12347", mg_print_ip4, &ip);
#endif
ASSERT(c != NULL);
pthread_create(&thread_id, NULL, poll_thread, mgr); // simpler this way, no concurrency anyway
MG_DEBUG(("CURL"));
ASSERT(system(cmd) == 0); // wait for curl
MG_DEBUG(("MONGOOSE"));
pthread_join(thread_id, NULL); // wait for Mongoose
MG_DEBUG(("DONE"));
free(cmd);
}
2023-08-22 04:15:21 +08:00
int main(void) {
// Setup interface
const char *iface = "tap0"; // Network iface
const char *mac = "00:00:01:02:03:78"; // MAC address
#ifndef __OpenBSD__
2023-08-22 04:15:21 +08:00
const char *tuntap_device = "/dev/net/tun";
#else
2023-08-22 04:15:21 +08:00
const char *tuntap_device = "/dev/tap0";
#endif
int fd = open(tuntap_device, O_RDWR);
struct ifreq ifr;
memset(&ifr, 0, sizeof(ifr));
strncpy(ifr.ifr_name, iface, IFNAMSIZ);
#ifndef __OpenBSD__
ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
if (ioctl(fd, TUNSETIFF, (void *) &ifr) < 0) {
MG_ERROR(("Failed to setup TAP interface: %s", ifr.ifr_name));
2024-10-04 00:46:50 +08:00
ABORT(); // return EXIT_FAILURE;
}
#else
2023-08-22 04:15:21 +08:00
ifr.ifr_flags = (short) (IFF_UP | IFF_BROADCAST | IFF_MULTICAST);
if (ioctl(fd, TUNSIFMODE, (void *) &ifr) < 0) {
MG_ERROR(("Failed to setup TAP interface: %s", ifr.ifr_name));
2024-10-04 00:46:50 +08:00
ABORT(); // return EXIT_FAILURE;
}
#endif
fcntl(fd, F_SETFL, fcntl(fd, F_GETFL, 0) | O_NONBLOCK); // Non-blocking mode
MG_INFO(("Opened TAP interface: %s", iface));
2024-10-04 00:46:50 +08:00
usleep(200000); // 200 ms
// Events
struct mg_mgr mgr; // Event manager
2024-07-23 04:14:10 +08:00
mg_log_set(MG_LL_DEBUG);
mg_mgr_init(&mgr); // Initialise event manager
// MIP driver
struct mg_tcpip_driver driver;
memset(&driver, 0, sizeof(driver));
driver.tx = tap_tx;
driver.up = tap_up;
driver.rx = tap_rx;
struct mg_tcpip_if mif;
memset(&mif, 0, sizeof(mif));
mif.driver = &driver;
mif.driver_data = &fd;
2024-07-23 04:14:10 +08:00
#if MIPTAPTEST_USING_DHCP == 1
#else
2023-08-22 04:15:21 +08:00
mif.ip = mg_htonl(MG_U32(192, 168, 32, 2)); // Triggering a network failure
2023-08-14 22:42:25 +08:00
mif.mask = mg_htonl(MG_U32(255, 255, 255, 0));
mif.gw = mg_htonl(MG_U32(192, 168, 32, 1));
#endif
sscanf(mac, "%hhx:%hhx:%hhx:%hhx:%hhx:%hhx", &mif.mac[0], &mif.mac[1],
&mif.mac[2], &mif.mac[3], &mif.mac[4], &mif.mac[5]);
mg_tcpip_init(&mgr, &mif);
MG_INFO(("Init done, starting main loop"));
2024-10-04 00:46:50 +08:00
usleep(200000); // 200 ms
// Stack initialization, Network configuration (DHCP lease, ...)
2024-07-23 04:14:10 +08:00
#if MIPTAPTEST_USING_DHCP == 0
2023-08-22 04:15:21 +08:00
MG_INFO(("MIF configuration: Static IP"));
ASSERT(mif.ip != 0); // Check we have a satic IP assigned
mg_mgr_poll(&mgr, 100); // For initialisation
#else
2023-08-22 04:15:21 +08:00
MG_INFO(("MIF configuration: DHCP"));
ASSERT(!mif.ip); // Check we are set for DHCP
2024-07-23 04:14:10 +08:00
int pc = 500; // Timeout on DHCP lease 500 ~ approx 5s (typical delay <1s)
2023-08-22 04:15:21 +08:00
while (((pc--) > 0) && !mif.ip) {
mg_mgr_poll(&mgr, 100);
usleep(10000); // 10 ms
}
2023-08-22 04:15:21 +08:00
if (!mif.ip) MG_ERROR(("No ip assigned (DHCP lease may have failed).\n"));
ASSERT(mif.ip); // We have an IP (lease or static)
#endif
2023-08-22 04:15:21 +08:00
// RUN TESTS
2024-09-28 05:33:26 +08:00
usleep(500000); // 500 ms
2024-07-23 04:14:10 +08:00
test_http_client(&mgr);
2024-09-28 05:33:26 +08:00
usleep(500000); // 500 ms
2024-07-25 05:30:08 +08:00
test_http_server(&mgr, mif.ip);
2024-09-28 05:33:26 +08:00
usleep(500000); // 500 ms
2023-08-22 04:15:21 +08:00
test_mqtt_connsubpub(&mgr);
2024-09-28 05:33:26 +08:00
usleep(500000); // 500 ms
2024-07-23 04:14:10 +08:00
2023-08-22 04:15:21 +08:00
printf("SUCCESS. Total tests: %d\n", s_num_tests);
// Clear
mg_mgr_free(&mgr);
2023-08-22 04:15:21 +08:00
mg_tcpip_free(&mif); // Release after mg_mgr
ASSERT(mgr.conns == NULL); // Deconstruction OK
close(fd);
return 0;
}