2020-05-08 20:10:06 +00:00
|
|
|
{.used.}
|
|
|
|
|
2020-11-11 19:20:14 +00:00
|
|
|
import unittest, options, sequtils
|
2019-12-04 04:44:54 +00:00
|
|
|
import chronos
|
2020-05-23 19:26:25 +00:00
|
|
|
import stew/byteutils
|
2020-03-26 06:06:47 +00:00
|
|
|
import nimcrypto/sysrand
|
2020-04-21 01:24:42 +00:00
|
|
|
import ../libp2p/[errors,
|
|
|
|
switch,
|
2019-09-30 15:48:40 +00:00
|
|
|
multistream,
|
2020-05-23 19:26:25 +00:00
|
|
|
standard_setup,
|
2020-04-21 01:24:42 +00:00
|
|
|
stream/bufferstream,
|
2020-06-19 17:29:43 +00:00
|
|
|
stream/connection,
|
2019-10-29 18:51:48 +00:00
|
|
|
multiaddress,
|
2019-09-30 15:48:40 +00:00
|
|
|
peerinfo,
|
2019-10-29 18:51:48 +00:00
|
|
|
crypto/crypto,
|
|
|
|
protocols/protocol,
|
2020-11-05 03:52:54 +00:00
|
|
|
protocols/secure/secure,
|
2019-09-30 15:48:40 +00:00
|
|
|
muxers/muxer,
|
2020-11-05 03:52:54 +00:00
|
|
|
muxers/mplex/lpchannel,
|
2020-11-28 08:05:12 +00:00
|
|
|
stream/lpstream,
|
|
|
|
stream/chronosstream,
|
|
|
|
transports/tcptransport]
|
2020-05-08 20:10:06 +00:00
|
|
|
import ./helpers
|
2019-10-29 18:51:48 +00:00
|
|
|
|
2020-04-21 01:24:42 +00:00
|
|
|
const
|
|
|
|
TestCodec = "/test/proto/1.0.0"
|
2019-08-31 17:58:49 +00:00
|
|
|
|
|
|
|
type
|
|
|
|
TestProto = ref object of LPProtocol
|
|
|
|
|
2019-12-23 18:44:51 +00:00
|
|
|
suite "Switch":
|
2020-04-21 01:24:42 +00:00
|
|
|
teardown:
|
2020-09-21 17:48:19 +00:00
|
|
|
checkTrackers()
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e use switch dial proto string":
|
|
|
|
let done = newFuture[void]()
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
done.complete()
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch1 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
switch1.mount(testProto)
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let conn = await switch2.dial(switch1.peerInfo, TestCodec)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.close()
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
done.wait(5.seconds),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
# this needs to go at end
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e use switch dial proto string with custom matcher":
|
|
|
|
let done = newFuture[void]()
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
done.complete()
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let callProto = TestCodec & "/pew"
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
proc match(proto: string): bool {.gcsafe.} =
|
|
|
|
return proto == callProto
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch1 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
switch1.mount(testProto, match)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let conn = await switch2.dial(switch1.peerInfo, callProto)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.close()
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
done.wait(5.seconds),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
# this needs to go at end
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should not leak bufferstreams and connections on channel close":
|
|
|
|
let done = newFuture[void]()
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
done.complete()
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
2020-11-13 03:44:02 +00:00
|
|
|
switch1.mount(testProto)
|
2020-03-27 14:25:52 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch2 = newStandardSwitch()
|
2020-11-13 03:44:02 +00:00
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let conn = await switch2.dial(switch1.peerInfo, TestCodec)
|
2020-03-27 14:25:52 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-03-27 14:25:52 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.close()
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
done.wait(5.seconds),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop(),
|
|
|
|
)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
# this needs to go at end
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e use connect then dial":
|
|
|
|
var awaiters: seq[Future[void]]
|
2019-08-31 17:58:49 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
finally:
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
await conn.close()
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2019-12-23 18:44:51 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch1 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
switch1.mount(testProto)
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.connect(switch1.peerInfo)
|
|
|
|
let conn = await switch2.dial(switch1.peerInfo, TestCodec)
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
conn.close(),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop()
|
|
|
|
)
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should not leak on peer disconnect":
|
|
|
|
var awaiters: seq[Future[void]]
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-11-13 03:44:02 +00:00
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.connect(switch1.peerInfo)
|
2020-03-26 06:06:47 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo)
|
2020-06-19 17:29:43 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2021-01-12 01:26:48 +00:00
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo))))
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-06-02 17:32:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger connection events (remote)":
|
|
|
|
var awaiters: seq[Future[void]]
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-06-02 17:32:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
|
|
|
var kinds: set[ConnEventKind]
|
|
|
|
proc hook(peerId: PeerID, event: ConnEvent) {.async, gcsafe.} =
|
|
|
|
kinds = kinds + {event.kind}
|
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Connected
|
|
|
|
peerId == switch1.peerInfo.peerId
|
|
|
|
of 1:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Disconnected
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check peerId == switch1.peerInfo.peerId
|
|
|
|
else:
|
|
|
|
check false
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
step.inc()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switch2.addConnEventHandler(hook, ConnEventKind.Connected)
|
|
|
|
switch2.addConnEventHandler(hook, ConnEventKind.Disconnected)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.connect(switch1.peerInfo)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2021-01-12 01:26:48 +00:00
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo))))
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check:
|
|
|
|
kinds == {
|
|
|
|
ConnEventKind.Connected,
|
|
|
|
ConnEventKind.Disconnected
|
|
|
|
}
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger connection events (local)":
|
|
|
|
var awaiters: seq[Future[void]]
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
|
|
|
var kinds: set[ConnEventKind]
|
|
|
|
proc hook(peerId: PeerID, event: ConnEvent) {.async, gcsafe.} =
|
|
|
|
kinds = kinds + {event.kind}
|
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Connected
|
|
|
|
peerId == switch2.peerInfo.peerId
|
|
|
|
of 1:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Disconnected
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check peerId == switch2.peerInfo.peerId
|
|
|
|
else:
|
|
|
|
check false
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
step.inc()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switch1.addConnEventHandler(hook, ConnEventKind.Connected)
|
|
|
|
switch1.addConnEventHandler(hook, ConnEventKind.Disconnected)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.connect(switch1.peerInfo)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2021-01-12 01:26:48 +00:00
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo))))
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check:
|
|
|
|
kinds == {
|
|
|
|
ConnEventKind.Connected,
|
|
|
|
ConnEventKind.Disconnected
|
|
|
|
}
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger peer events (remote)":
|
|
|
|
var awaiters: seq[Future[void]]
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
2020-11-28 16:59:47 +00:00
|
|
|
var kinds: set[PeerEventKind]
|
2020-11-13 03:44:02 +00:00
|
|
|
proc handler(peerId: PeerID, event: PeerEvent) {.async, gcsafe.} =
|
2020-11-28 16:59:47 +00:00
|
|
|
kinds = kinds + {event.kind}
|
2020-11-13 03:44:02 +00:00
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Joined
|
2020-11-13 03:44:02 +00:00
|
|
|
peerId == switch2.peerInfo.peerId
|
|
|
|
of 1:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
peerId == switch2.peerInfo.peerId
|
|
|
|
else:
|
|
|
|
check false
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
step.inc()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-28 16:59:47 +00:00
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Joined)
|
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Left)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.connect(switch1.peerInfo)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2021-01-12 01:26:48 +00:00
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo))))
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check:
|
|
|
|
kinds == {
|
2020-11-28 16:59:47 +00:00
|
|
|
PeerEventKind.Joined,
|
|
|
|
PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
}
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
await allFuturesThrowing(awaiters)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger peer events (local)":
|
|
|
|
var awaiters: seq[Future[void]]
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
2020-11-28 16:59:47 +00:00
|
|
|
var kinds: set[PeerEventKind]
|
2020-11-13 03:44:02 +00:00
|
|
|
proc handler(peerId: PeerID, event: PeerEvent) {.async, gcsafe.} =
|
2020-11-28 16:59:47 +00:00
|
|
|
kinds = kinds + {event.kind}
|
2020-11-13 03:44:02 +00:00
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Joined
|
2020-11-13 03:44:02 +00:00
|
|
|
peerId == switch1.peerInfo.peerId
|
|
|
|
of 1:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
peerId == switch1.peerInfo.peerId
|
|
|
|
else:
|
|
|
|
check false
|
|
|
|
|
|
|
|
step.inc()
|
|
|
|
|
2020-11-28 16:59:47 +00:00
|
|
|
switch2.addPeerEventHandler(handler, PeerEventKind.Joined)
|
|
|
|
switch2.addPeerEventHandler(handler, PeerEventKind.Left)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
|
|
|
|
|
|
|
await switch2.connect(switch1.peerInfo)
|
|
|
|
|
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
|
|
|
|
|
|
|
await switch2.disconnect(switch1.peerInfo)
|
|
|
|
|
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
2021-01-12 01:26:48 +00:00
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo))))
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
check:
|
|
|
|
kinds == {
|
2020-11-28 16:59:47 +00:00
|
|
|
PeerEventKind.Joined,
|
|
|
|
PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
|
|
|
asyncTest "e2e should trigger peer events only once per peer":
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
let rng = newRng()
|
|
|
|
# use same private keys to emulate two connection from same peer
|
|
|
|
let privKey = PrivateKey.random(rng[]).tryGet()
|
|
|
|
let switch2 = newStandardSwitch(
|
|
|
|
privKey = some(privKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
let switch3 = newStandardSwitch(
|
|
|
|
privKey = some(privKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
var step = 0
|
2020-11-28 16:59:47 +00:00
|
|
|
var kinds: set[PeerEventKind]
|
2020-11-13 03:44:02 +00:00
|
|
|
proc handler(peerId: PeerID, event: PeerEvent) {.async, gcsafe.} =
|
2020-11-28 16:59:47 +00:00
|
|
|
kinds = kinds + {event.kind}
|
2020-11-13 03:44:02 +00:00
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Joined
|
2020-11-13 03:44:02 +00:00
|
|
|
of 1:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
else:
|
|
|
|
check false # should not trigger this
|
|
|
|
|
|
|
|
step.inc()
|
|
|
|
|
2020-11-28 16:59:47 +00:00
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Joined)
|
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Left)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
awaiters.add(await switch2.start())
|
|
|
|
awaiters.add(await switch3.start())
|
|
|
|
|
|
|
|
await switch2.connect(switch1.peerInfo) # should trigger 1st Join event
|
|
|
|
await switch3.connect(switch1.peerInfo) # should trigger 2nd Join event
|
|
|
|
|
|
|
|
check switch1.isConnected(switch2.peerInfo)
|
|
|
|
check switch2.isConnected(switch1.peerInfo)
|
|
|
|
check switch3.isConnected(switch1.peerInfo)
|
|
|
|
|
|
|
|
await switch2.disconnect(switch1.peerInfo) # should trigger 1st Left event
|
|
|
|
await switch3.disconnect(switch1.peerInfo) # should trigger 2nd Left event
|
|
|
|
|
|
|
|
check not switch2.isConnected(switch1.peerInfo)
|
|
|
|
check not switch3.isConnected(switch1.peerInfo)
|
2021-01-12 01:26:48 +00:00
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo))))
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch3.peerInfo))))
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
check:
|
|
|
|
kinds == {
|
2020-11-28 16:59:47 +00:00
|
|
|
PeerEventKind.Joined,
|
|
|
|
PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop(),
|
|
|
|
switch3.stop())
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
|
|
|
asyncTest "e2e should allow dropping peer from connection events":
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
|
|
|
|
let rng = newRng()
|
|
|
|
# use same private keys to emulate two connection from same peer
|
|
|
|
let peerInfo = PeerInfo.init(PrivateKey.random(rng[]).tryGet())
|
|
|
|
|
|
|
|
var switches: seq[Switch]
|
|
|
|
var done = newFuture[void]()
|
|
|
|
var onConnect: Future[void]
|
|
|
|
proc hook(peerId: PeerID, event: ConnEvent) {.async, gcsafe.} =
|
|
|
|
case event.kind:
|
|
|
|
of ConnEventKind.Connected:
|
|
|
|
await onConnect
|
|
|
|
await switches[0].disconnect(peerInfo.peerId) # trigger disconnect
|
|
|
|
of ConnEventKind.Disconnected:
|
|
|
|
check not switches[0].isConnected(peerInfo.peerId)
|
|
|
|
await sleepAsync(1.millis)
|
|
|
|
done.complete()
|
|
|
|
|
|
|
|
switches.add(newStandardSwitch(
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
switches[0].addConnEventHandler(hook, ConnEventKind.Connected)
|
|
|
|
switches[0].addConnEventHandler(hook, ConnEventKind.Disconnected)
|
|
|
|
awaiters.add(await switches[0].start())
|
|
|
|
|
|
|
|
switches.add(newStandardSwitch(
|
|
|
|
privKey = some(peerInfo.privateKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2020-11-13 03:44:02 +00:00
|
|
|
onConnect = switches[1].connect(switches[0].peerInfo)
|
|
|
|
await onConnect
|
|
|
|
|
|
|
|
await done
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switches.mapIt( it.stop() ))
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
|
|
|
asyncTest "e2e should allow dropping multiple connections for peer from connection events":
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
|
|
|
|
let rng = newRng()
|
|
|
|
# use same private keys to emulate two connection from same peer
|
|
|
|
let peerInfo = PeerInfo.init(PrivateKey.random(rng[]).tryGet())
|
|
|
|
|
|
|
|
var conns = 1
|
|
|
|
var switches: seq[Switch]
|
|
|
|
var done = newFuture[void]()
|
|
|
|
var onConnect: Future[void]
|
|
|
|
proc hook(peerId: PeerID, event: ConnEvent) {.async, gcsafe.} =
|
|
|
|
case event.kind:
|
|
|
|
of ConnEventKind.Connected:
|
|
|
|
if conns == 5:
|
2020-11-11 19:20:14 +00:00
|
|
|
await onConnect
|
|
|
|
await switches[0].disconnect(peerInfo.peerId) # trigger disconnect
|
2020-11-13 03:44:02 +00:00
|
|
|
return
|
|
|
|
|
|
|
|
conns.inc
|
|
|
|
of ConnEventKind.Disconnected:
|
|
|
|
if conns == 1:
|
2020-11-11 19:20:14 +00:00
|
|
|
check not switches[0].isConnected(peerInfo.peerId)
|
|
|
|
done.complete()
|
2020-11-13 03:44:02 +00:00
|
|
|
conns.dec
|
2020-11-11 19:20:14 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switches.add(newStandardSwitch(
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2020-11-11 19:20:14 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switches[0].addConnEventHandler(hook, ConnEventKind.Connected)
|
|
|
|
switches[0].addConnEventHandler(hook, ConnEventKind.Disconnected)
|
|
|
|
awaiters.add(await switches[0].start())
|
2020-11-11 19:20:14 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
for i in 1..5:
|
2020-11-11 19:20:14 +00:00
|
|
|
switches.add(newStandardSwitch(
|
|
|
|
privKey = some(peerInfo.privateKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2020-11-13 03:44:02 +00:00
|
|
|
onConnect = switches[i].connect(switches[0].peerInfo)
|
2020-11-11 19:20:14 +00:00
|
|
|
await onConnect
|
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await done
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switches.mapIt( it.stop() ))
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
2020-11-28 08:05:12 +00:00
|
|
|
# TODO: we should be able to test cancellation
|
|
|
|
# for most of the steps in the upgrade flow -
|
|
|
|
# this is just a basic test for dials
|
|
|
|
asyncTest "e2e canceling dial should not leak":
|
|
|
|
let ma: MultiAddress = Multiaddress.init("/ip4/0.0.0.0/tcp/0").tryGet()
|
|
|
|
|
|
|
|
let transport = TcpTransport.init()
|
|
|
|
await transport.start(ma)
|
|
|
|
|
|
|
|
proc acceptHandler() {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let conn = await transport.accept()
|
|
|
|
discard await conn.readLp(100)
|
|
|
|
except CatchableError as exc:
|
|
|
|
discard
|
|
|
|
|
|
|
|
let handlerWait = acceptHandler()
|
|
|
|
let switch = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
awaiters.add(await switch.start())
|
|
|
|
|
|
|
|
var peerId = PeerID.init(PrivateKey.random(ECDSA, rng[]).get()).get()
|
|
|
|
let connectFut = switch.connect(peerId, @[transport.ma])
|
|
|
|
await sleepAsync(500.millis)
|
|
|
|
connectFut.cancel()
|
|
|
|
await handlerWait
|
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
checkTracker(ChronosStreamTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
transport.stop(),
|
|
|
|
switch.stop())
|
|
|
|
|
|
|
|
# this needs to go at end
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
|
|
|
asyncTest "e2e closing remote conn should not leak":
|
|
|
|
let ma: MultiAddress = Multiaddress.init("/ip4/0.0.0.0/tcp/0").tryGet()
|
|
|
|
|
|
|
|
let transport = TcpTransport.init()
|
|
|
|
await transport.start(ma)
|
|
|
|
|
|
|
|
proc acceptHandler() {.async, gcsafe.} =
|
|
|
|
let conn = await transport.accept()
|
2020-12-03 01:24:48 +00:00
|
|
|
await conn.closeWithEOF()
|
2020-11-28 08:05:12 +00:00
|
|
|
|
|
|
|
let handlerWait = acceptHandler()
|
|
|
|
let switch = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
awaiters.add(await switch.start())
|
|
|
|
|
|
|
|
var peerId = PeerID.init(PrivateKey.random(ECDSA, rng[]).get()).get()
|
|
|
|
expect LPStreamClosedError:
|
|
|
|
await switch.connect(peerId, @[transport.ma])
|
|
|
|
|
|
|
|
await handlerWait
|
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
checkTracker(ChronosStreamTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
transport.stop(),
|
|
|
|
switch.stop())
|
|
|
|
|
|
|
|
# this needs to go at end
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
2020-12-01 08:44:21 +00:00
|
|
|
asyncTest "e2e calling closeWithEOF on the same stream should not assert":
|
|
|
|
let ma: MultiAddress = Multiaddress.init("/ip4/0.0.0.0/tcp/0").tryGet()
|
|
|
|
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
discard await conn.readLp(100)
|
|
|
|
|
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
|
|
|
|
|
|
|
let switch1 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
switch1.mount(testProto)
|
|
|
|
|
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
awaiters.add(await switch1.start())
|
|
|
|
|
|
|
|
var peerId = PeerID.init(PrivateKey.random(ECDSA, rng[]).get()).get()
|
|
|
|
let conn = await switch2.dial(switch1.peerInfo, TestCodec)
|
|
|
|
|
|
|
|
proc closeReader() {.async.} =
|
|
|
|
await conn.closeWithEOF()
|
|
|
|
|
|
|
|
var readers: seq[Future[void]]
|
|
|
|
for i in 0..10:
|
|
|
|
readers.add(closeReader())
|
|
|
|
|
|
|
|
await allFuturesThrowing(readers)
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
checkTracker(ChronosStreamTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
|
|
|
|
# this needs to go at end
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "connect to inexistent peer":
|
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
let sfut = await switch2.start()
|
|
|
|
let someAddr = MultiAddress.init("/ip4/127.128.0.99").get()
|
|
|
|
let seckey = PrivateKey.random(ECDSA, rng[]).get()
|
|
|
|
let somePeer = PeerInfo.init(secKey, [someAddr])
|
|
|
|
expect(DialFailedError):
|
|
|
|
let conn = await switch2.dial(somePeer, TestCodec)
|
|
|
|
await switch2.stop()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
asyncTest "e2e total connection limits on incoming connections":
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
|
|
|
|
var switches: seq[Switch]
|
|
|
|
let destSwitch = newStandardSwitch(maxConnections = 3)
|
|
|
|
switches.add(destSwitch)
|
|
|
|
awaiters.add(await destSwitch.start())
|
|
|
|
|
|
|
|
let destPeerInfo = destSwitch.peerInfo
|
|
|
|
for i in 0..<3:
|
|
|
|
let switch = newStandardSwitch()
|
|
|
|
switches.add(switch)
|
|
|
|
awaiters.add(await switch.start())
|
|
|
|
|
|
|
|
check await switch.connect(destPeerInfo)
|
|
|
|
.withTimeout(100.millis)
|
|
|
|
|
|
|
|
let switchFail = newStandardSwitch()
|
|
|
|
switches.add(switchFail)
|
|
|
|
awaiters.add(await switchFail.start())
|
|
|
|
|
|
|
|
check not(await switchFail.connect(destPeerInfo)
|
|
|
|
.withTimeout(100.millis))
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
|
|
|
asyncTest "e2e total connection limits on incoming connections":
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
|
|
|
|
var switches: seq[Switch]
|
|
|
|
for i in 0..<3:
|
|
|
|
switches.add(newStandardSwitch())
|
|
|
|
awaiters.add(await switches[i].start())
|
|
|
|
|
|
|
|
let srcSwitch = newStandardSwitch(maxConnections = 3)
|
|
|
|
awaiters.add(await srcSwitch.start())
|
|
|
|
|
|
|
|
let dstSwitch = newStandardSwitch()
|
|
|
|
awaiters.add(await dstSwitch.start())
|
|
|
|
|
|
|
|
for s in switches:
|
|
|
|
check await srcSwitch.connect(s.peerInfo)
|
|
|
|
.withTimeout(100.millis)
|
|
|
|
|
|
|
|
expect TooManyConnectionsError:
|
|
|
|
await srcSwitch.connect(dstSwitch.peerInfo)
|
|
|
|
|
|
|
|
switches.add(srcSwitch)
|
|
|
|
switches.add(dstSwitch)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
|
|
|
asyncTest "e2e max incoming connection limits":
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
|
|
|
|
var switches: seq[Switch]
|
|
|
|
let destSwitch = newStandardSwitch(maxIn = 3)
|
|
|
|
switches.add(destSwitch)
|
|
|
|
awaiters.add(await destSwitch.start())
|
|
|
|
|
|
|
|
let destPeerInfo = destSwitch.peerInfo
|
|
|
|
for i in 0..<3:
|
|
|
|
let switch = newStandardSwitch()
|
|
|
|
switches.add(switch)
|
|
|
|
awaiters.add(await switch.start())
|
|
|
|
|
|
|
|
check await switch.connect(destPeerInfo)
|
|
|
|
.withTimeout(100.millis)
|
|
|
|
|
|
|
|
let switchFail = newStandardSwitch()
|
|
|
|
switches.add(switchFail)
|
|
|
|
awaiters.add(await switchFail.start())
|
|
|
|
|
|
|
|
check not(await switchFail.connect(destPeerInfo)
|
|
|
|
.withTimeout(100.millis))
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
|
|
|
await allFuturesThrowing(awaiters)
|
|
|
|
|
|
|
|
asyncTest "e2e max outgoing connection limits":
|
|
|
|
var awaiters: seq[Future[void]]
|
|
|
|
|
|
|
|
var switches: seq[Switch]
|
|
|
|
for i in 0..<3:
|
|
|
|
switches.add(newStandardSwitch())
|
|
|
|
awaiters.add(await switches[i].start())
|
|
|
|
|
|
|
|
let srcSwitch = newStandardSwitch(maxOut = 3)
|
|
|
|
awaiters.add(await srcSwitch.start())
|
|
|
|
|
|
|
|
let dstSwitch = newStandardSwitch()
|
|
|
|
awaiters.add(await dstSwitch.start())
|
|
|
|
|
|
|
|
for s in switches:
|
|
|
|
check await srcSwitch.connect(s.peerInfo)
|
|
|
|
.withTimeout(100.millis)
|
|
|
|
|
|
|
|
expect TooManyConnectionsError:
|
|
|
|
await srcSwitch.connect(dstSwitch.peerInfo)
|
|
|
|
|
|
|
|
switches.add(srcSwitch)
|
|
|
|
switches.add(dstSwitch)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
|
|
|
await allFuturesThrowing(awaiters)
|