2023-07-25 11:53:09 +02:00
|
|
|
/* Auto Tests: Many clients.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
#include "../testing/misc_tools.h"
|
|
|
|
#include "../toxcore/tox.h"
|
|
|
|
#include "../toxcore/tox_dispatch.h"
|
|
|
|
#include "../toxcore/tox_events.h"
|
2023-12-24 12:21:34 +01:00
|
|
|
#include "../toxcore/tox_unpack.h"
|
2023-07-25 11:53:09 +02:00
|
|
|
#include "auto_test_support.h"
|
|
|
|
#include "check_compat.h"
|
|
|
|
|
|
|
|
// Set to true to produce an msgpack file at /tmp/test.mp.
|
|
|
|
static const bool want_dump_events = false;
|
|
|
|
|
|
|
|
static void handle_events_friend_message(Tox *tox, const Tox_Event_Friend_Message *event, void *user_data)
|
|
|
|
{
|
|
|
|
bool *success = (bool *)user_data;
|
|
|
|
|
|
|
|
ck_assert(tox_event_friend_message_get_message_length(event) == sizeof("hello"));
|
|
|
|
const uint8_t *msg = tox_event_friend_message_get_message(event);
|
|
|
|
ck_assert_msg(memcmp(msg, "hello", sizeof("hello")) == 0,
|
|
|
|
"message was not expected 'hello' but '%s'", (const char *)msg);
|
|
|
|
|
|
|
|
*success = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dump_events(const char *path, const Tox_Events *events)
|
|
|
|
{
|
2023-12-27 12:37:22 +01:00
|
|
|
FILE *fh = fopen(path, "w");
|
|
|
|
ck_assert(fh != nullptr);
|
|
|
|
const uint32_t len = tox_events_bytes_size(events);
|
|
|
|
uint8_t *buf = (uint8_t *)malloc(len);
|
|
|
|
ck_assert(buf != nullptr);
|
|
|
|
ck_assert(tox_events_get_bytes(events, buf));
|
|
|
|
fwrite(buf, 1, len, fh);
|
|
|
|
free(buf);
|
|
|
|
fclose(fh);
|
2023-07-25 11:53:09 +02:00
|
|
|
}
|
|
|
|
|
2023-10-10 19:37:39 +02:00
|
|
|
static void print_events(const Tox_System *sys, Tox_Events *events)
|
2023-07-25 11:53:09 +02:00
|
|
|
{
|
|
|
|
const uint32_t size = tox_events_bytes_size(events);
|
|
|
|
|
2023-12-27 12:37:22 +01:00
|
|
|
uint8_t *bytes1 = (uint8_t *)malloc(size);
|
|
|
|
uint8_t *bytes2 = (uint8_t *)malloc(size);
|
|
|
|
ck_assert(bytes1 != nullptr);
|
|
|
|
ck_assert(bytes2 != nullptr);
|
|
|
|
|
|
|
|
ck_assert(tox_events_get_bytes(events, bytes1));
|
|
|
|
ck_assert(tox_events_get_bytes(events, bytes2));
|
2023-07-25 11:53:09 +02:00
|
|
|
|
2023-12-27 12:37:22 +01:00
|
|
|
// Make sure get_bytes is deterministic.
|
|
|
|
ck_assert(memcmp(bytes1, bytes2, size) == 0);
|
2023-07-25 11:53:09 +02:00
|
|
|
|
2023-12-27 12:37:22 +01:00
|
|
|
Tox_Events *events_copy = tox_events_load(sys, bytes1, size);
|
2023-07-25 11:53:09 +02:00
|
|
|
ck_assert(events_copy != nullptr);
|
2023-12-27 12:37:22 +01:00
|
|
|
free(bytes1);
|
|
|
|
free(bytes2);
|
2023-07-25 11:53:09 +02:00
|
|
|
|
2023-10-10 19:37:39 +02:00
|
|
|
ck_assert(tox_events_equal(sys, events, events_copy));
|
2023-07-25 11:53:09 +02:00
|
|
|
|
|
|
|
tox_events_free(events_copy);
|
|
|
|
tox_events_free(events);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool await_message(Tox **toxes, const Tox_Dispatch *dispatch)
|
|
|
|
{
|
2023-10-10 19:37:39 +02:00
|
|
|
const Tox_System *sys = tox_get_system(toxes[0]);
|
|
|
|
|
2023-07-25 11:53:09 +02:00
|
|
|
for (uint32_t i = 0; i < 100; ++i) {
|
|
|
|
// Ignore events on tox 1.
|
2023-10-10 19:37:39 +02:00
|
|
|
print_events(sys, tox_events_iterate(toxes[0], false, nullptr));
|
2023-07-25 11:53:09 +02:00
|
|
|
// Check if tox 2 got the message from tox 1.
|
|
|
|
Tox_Events *events = tox_events_iterate(toxes[1], false, nullptr);
|
|
|
|
|
2023-12-27 12:37:22 +01:00
|
|
|
if (want_dump_events) {
|
|
|
|
dump_events("/tmp/test.mp", events);
|
|
|
|
}
|
2023-07-25 11:53:09 +02:00
|
|
|
|
|
|
|
bool success = false;
|
|
|
|
tox_dispatch_invoke(dispatch, events, toxes[1], &success);
|
2023-10-10 19:37:39 +02:00
|
|
|
print_events(sys, events);
|
2023-07-25 11:53:09 +02:00
|
|
|
|
|
|
|
if (success) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(tox_iteration_interval(toxes[0]));
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_tox_events(void)
|
|
|
|
{
|
|
|
|
uint8_t message[sizeof("hello")];
|
|
|
|
memcpy(message, "hello", sizeof(message));
|
|
|
|
|
|
|
|
Tox *toxes[2];
|
|
|
|
uint32_t index[2];
|
|
|
|
|
|
|
|
for (uint32_t i = 0; i < 2; ++i) {
|
|
|
|
index[i] = i + 1;
|
|
|
|
toxes[i] = tox_new_log(nullptr, nullptr, &index[i]);
|
|
|
|
tox_events_init(toxes[i]);
|
|
|
|
ck_assert_msg(toxes[i] != nullptr, "failed to create tox instances %u", i);
|
|
|
|
}
|
|
|
|
|
2023-10-10 19:37:39 +02:00
|
|
|
const Tox_System *sys = tox_get_system(toxes[0]);
|
|
|
|
|
2023-07-25 11:53:09 +02:00
|
|
|
Tox_Err_Dispatch_New err_new;
|
|
|
|
Tox_Dispatch *dispatch = tox_dispatch_new(&err_new);
|
|
|
|
ck_assert_msg(dispatch != nullptr, "failed to create event dispatcher");
|
|
|
|
ck_assert(err_new == TOX_ERR_DISPATCH_NEW_OK);
|
|
|
|
|
|
|
|
tox_events_callback_friend_message(dispatch, handle_events_friend_message);
|
|
|
|
|
|
|
|
uint8_t pk[TOX_PUBLIC_KEY_SIZE];
|
|
|
|
tox_self_get_dht_id(toxes[0], pk);
|
|
|
|
tox_bootstrap(toxes[1], "localhost", tox_self_get_udp_port(toxes[0], nullptr), pk, nullptr);
|
|
|
|
|
|
|
|
tox_self_get_public_key(toxes[0], pk);
|
|
|
|
tox_friend_add_norequest(toxes[1], pk, nullptr);
|
|
|
|
|
|
|
|
tox_self_get_public_key(toxes[1], pk);
|
|
|
|
tox_friend_add_norequest(toxes[0], pk, nullptr);
|
|
|
|
|
|
|
|
printf("bootstrapping and connecting 2 toxes\n");
|
|
|
|
|
|
|
|
while (tox_self_get_connection_status(toxes[0]) == TOX_CONNECTION_NONE ||
|
|
|
|
tox_self_get_connection_status(toxes[1]) == TOX_CONNECTION_NONE) {
|
|
|
|
// Ignore connection events for now.
|
2023-10-10 19:37:39 +02:00
|
|
|
print_events(sys, tox_events_iterate(toxes[0], false, nullptr));
|
|
|
|
print_events(sys, tox_events_iterate(toxes[1], false, nullptr));
|
2023-07-25 11:53:09 +02:00
|
|
|
|
|
|
|
c_sleep(tox_iteration_interval(toxes[0]));
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("toxes online, waiting for friend connection\n");
|
|
|
|
|
|
|
|
while (tox_friend_get_connection_status(toxes[0], 0, nullptr) == TOX_CONNECTION_NONE ||
|
|
|
|
tox_friend_get_connection_status(toxes[1], 0, nullptr) == TOX_CONNECTION_NONE) {
|
|
|
|
// Ignore connection events for now.
|
2023-10-10 19:37:39 +02:00
|
|
|
print_events(sys, tox_events_iterate(toxes[0], false, nullptr));
|
|
|
|
print_events(sys, tox_events_iterate(toxes[1], false, nullptr));
|
2023-07-25 11:53:09 +02:00
|
|
|
|
|
|
|
c_sleep(tox_iteration_interval(toxes[0]));
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("friends are connected via %s, now sending message\n",
|
|
|
|
tox_friend_get_connection_status(toxes[0], 0, nullptr) == TOX_CONNECTION_TCP ? "TCP" : "UDP");
|
|
|
|
|
|
|
|
Tox_Err_Friend_Send_Message err;
|
|
|
|
tox_friend_send_message(toxes[0], 0, TOX_MESSAGE_TYPE_NORMAL, message, sizeof(message), &err);
|
|
|
|
ck_assert(err == TOX_ERR_FRIEND_SEND_MESSAGE_OK);
|
|
|
|
|
|
|
|
ck_assert(await_message(toxes, dispatch));
|
|
|
|
|
|
|
|
tox_dispatch_free(dispatch);
|
|
|
|
|
|
|
|
for (uint32_t i = 0; i < 2; ++i) {
|
|
|
|
tox_kill(toxes[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-12-24 12:21:34 +01:00
|
|
|
static void fake_test_unpack(void)
|
|
|
|
{
|
|
|
|
// TODO(Green-Sky): add proper unpack tests and/or implement ngc events
|
2023-12-27 12:37:22 +01:00
|
|
|
(void)tox_group_privacy_state_unpack;
|
|
|
|
(void)tox_group_privacy_state_unpack;
|
|
|
|
(void)tox_group_voice_state_unpack;
|
|
|
|
(void)tox_group_topic_lock_unpack;
|
|
|
|
(void)tox_group_join_fail_unpack;
|
|
|
|
(void)tox_group_mod_event_unpack;
|
|
|
|
(void)tox_group_exit_type_unpack;
|
2023-12-24 12:21:34 +01:00
|
|
|
}
|
|
|
|
|
2023-07-25 11:53:09 +02:00
|
|
|
int main(void)
|
|
|
|
{
|
|
|
|
setvbuf(stdout, nullptr, _IONBF, 0);
|
|
|
|
test_tox_events();
|
2023-12-24 12:21:34 +01:00
|
|
|
fake_test_unpack();
|
2023-07-25 11:53:09 +02:00
|
|
|
return 0;
|
|
|
|
}
|