2021-10-28 09:41:43 +00:00
|
|
|
# Copyright (c) 2020-2021 Status Research & Development GmbH
|
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
|
|
|
{.used.}
|
|
|
|
|
|
|
|
import
|
2022-01-24 10:58:35 +00:00
|
|
|
std/options,
|
2021-10-28 09:41:43 +00:00
|
|
|
chronos, bearssl,
|
|
|
|
stew/shims/net, stew/byteutils,
|
|
|
|
testutils/unittests,
|
|
|
|
../../eth/p2p/discoveryv5/[enr, node, routing_table],
|
|
|
|
../../eth/p2p/discoveryv5/protocol as discv5_protocol,
|
2021-12-10 10:12:24 +00:00
|
|
|
../../eth/utp/utp_discv5_protocol,
|
2022-02-02 14:29:45 +00:00
|
|
|
../../eth/keys,
|
|
|
|
../p2p/discv5_test_helper
|
2021-10-28 09:41:43 +00:00
|
|
|
|
|
|
|
proc generateByteArray(rng: var BrHmacDrbgContext, length: int): seq[byte] =
|
|
|
|
var bytes = newSeq[byte](length)
|
|
|
|
brHmacDrbgGenerate(rng, bytes)
|
|
|
|
return bytes
|
|
|
|
|
|
|
|
procSuite "Utp protocol over discovery v5 tests":
|
|
|
|
let rng = newRng()
|
|
|
|
let utpProtId = "test-utp".toBytes()
|
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
proc registerIncomingSocketCallback(serverSockets: AsyncQueue): AcceptConnectionCallback[NodeAddress] =
|
2021-10-28 09:41:43 +00:00
|
|
|
return (
|
2022-01-24 10:58:35 +00:00
|
|
|
proc(server: UtpRouter[NodeAddress], client: UtpSocket[NodeAddress]): Future[void] =
|
2021-10-28 09:41:43 +00:00
|
|
|
serverSockets.addLast(client)
|
|
|
|
)
|
2021-12-11 18:12:55 +00:00
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
proc allowOneIdCallback(allowedId: uint16): AllowConnectionCallback[NodeAddress] =
|
2021-11-18 09:05:56 +00:00
|
|
|
return (
|
2022-01-24 10:58:35 +00:00
|
|
|
proc(r: UtpRouter[NodeAddress], remoteAddress: NodeAddress, connectionId: uint16): bool =
|
2021-11-18 09:05:56 +00:00
|
|
|
connectionId == allowedId
|
|
|
|
)
|
|
|
|
|
2021-10-28 09:41:43 +00:00
|
|
|
# TODO Add more tests to discovery v5 suite, especially those which will differ
|
|
|
|
# from standard utp case
|
|
|
|
asyncTest "Success connect to remote host":
|
|
|
|
let
|
2022-01-24 10:58:35 +00:00
|
|
|
queue = newAsyncQueue[UtpSocket[NodeAddress]]()
|
2021-10-28 09:41:43 +00:00
|
|
|
node1 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
|
|
node2 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
|
|
|
|
utp1 = UtpDiscv5Protocol.new(node1, utpProtId, registerIncomingSocketCallback(queue))
|
|
|
|
utp2 = UtpDiscv5Protocol.new(node2, utpProtId, registerIncomingSocketCallback(queue))
|
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
# nodes must have session between each other
|
2021-10-28 09:41:43 +00:00
|
|
|
check:
|
2022-01-24 10:58:35 +00:00
|
|
|
(await node1.ping(node2.localNode)).isOk()
|
2021-10-28 09:41:43 +00:00
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
let clientSocketResult = await utp1.connectTo(NodeAddress.init(node2.localNode).unsafeGet())
|
2021-11-18 09:05:56 +00:00
|
|
|
let clientSocket = clientSocketResult.get()
|
2021-11-19 10:36:46 +00:00
|
|
|
let serverSocket = await queue.get()
|
2021-11-18 09:05:56 +00:00
|
|
|
|
2021-10-28 09:41:43 +00:00
|
|
|
check:
|
|
|
|
clientSocket.isConnected()
|
2021-11-19 10:36:46 +00:00
|
|
|
# in this test we do not configure the socket to be connected just after
|
|
|
|
# accepting incoming connection
|
|
|
|
not serverSocket.isConnected()
|
2021-10-28 09:41:43 +00:00
|
|
|
|
2021-11-09 14:29:59 +00:00
|
|
|
await clientSocket.destroyWait()
|
2021-11-19 10:36:46 +00:00
|
|
|
await serverSocket.destroyWait()
|
2021-10-28 09:41:43 +00:00
|
|
|
await node1.closeWait()
|
|
|
|
await node2.closeWait()
|
|
|
|
|
|
|
|
asyncTest "Success write data over packet size to remote host":
|
|
|
|
let
|
2022-01-24 10:58:35 +00:00
|
|
|
queue = newAsyncQueue[UtpSocket[NodeAddress]]()
|
2021-10-28 09:41:43 +00:00
|
|
|
node1 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
|
|
node2 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
|
|
|
|
utp1 = UtpDiscv5Protocol.new(node1, utpProtId, registerIncomingSocketCallback(queue))
|
|
|
|
utp2 = UtpDiscv5Protocol.new(node2, utpProtId, registerIncomingSocketCallback(queue))
|
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
# nodes must have session between each other
|
2021-10-28 09:41:43 +00:00
|
|
|
check:
|
2022-01-24 10:58:35 +00:00
|
|
|
(await node1.ping(node2.localNode)).isOk()
|
2021-10-28 09:41:43 +00:00
|
|
|
|
2021-12-11 18:12:55 +00:00
|
|
|
let numOfBytes = 5000
|
2022-01-24 10:58:35 +00:00
|
|
|
let clientSocketResult = await utp1.connectTo(NodeAddress.init(node2.localNode).unsafeGet())
|
2021-11-18 09:05:56 +00:00
|
|
|
let clientSocket = clientSocketResult.get()
|
|
|
|
|
2021-10-28 09:41:43 +00:00
|
|
|
let serverSocket = await queue.get()
|
|
|
|
|
|
|
|
let bytesToTransfer = generateByteArray(rng[], numOfBytes)
|
|
|
|
let written = await clientSocket.write(bytesToTransfer)
|
|
|
|
|
|
|
|
let received = await serverSocket.read(numOfBytes)
|
|
|
|
|
|
|
|
check:
|
2021-11-09 14:29:59 +00:00
|
|
|
written.get() == numOfBytes
|
2021-10-28 09:41:43 +00:00
|
|
|
bytesToTransfer == received
|
|
|
|
clientSocket.isConnected()
|
|
|
|
serverSocket.isConnected()
|
|
|
|
|
2021-11-09 14:29:59 +00:00
|
|
|
await clientSocket.destroyWait()
|
|
|
|
await serverSocket.destroyWait()
|
2021-10-28 09:41:43 +00:00
|
|
|
await node1.closeWait()
|
|
|
|
await node2.closeWait()
|
2021-11-18 09:05:56 +00:00
|
|
|
|
|
|
|
asyncTest "Accept connection only from allowed peers":
|
|
|
|
let
|
|
|
|
allowedId: uint16 = 10
|
|
|
|
lowSynTimeout = milliseconds(500)
|
2022-01-24 10:58:35 +00:00
|
|
|
queue = newAsyncQueue[UtpSocket[NodeAddress]]()
|
2021-11-18 09:05:56 +00:00
|
|
|
node1 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
|
|
node2 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
|
|
|
|
utp1 = UtpDiscv5Protocol.new(
|
|
|
|
node1,
|
|
|
|
utpProtId,
|
|
|
|
registerIncomingSocketCallback(queue),
|
2022-01-10 12:49:36 +00:00
|
|
|
socketConfig = SocketConfig.init(lowSynTimeout))
|
2021-12-11 18:12:55 +00:00
|
|
|
utp2 =
|
2021-11-18 09:05:56 +00:00
|
|
|
UtpDiscv5Protocol.new(
|
|
|
|
node2,
|
|
|
|
utpProtId,
|
|
|
|
registerIncomingSocketCallback(queue),
|
2022-01-10 12:49:36 +00:00
|
|
|
allowOneIdCallback(allowedId),
|
|
|
|
SocketConfig.init())
|
2021-11-18 09:05:56 +00:00
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
# nodes must have session between each other
|
2021-11-18 09:05:56 +00:00
|
|
|
check:
|
2022-01-24 10:58:35 +00:00
|
|
|
(await node1.ping(node2.localNode)).isOk()
|
2021-11-18 09:05:56 +00:00
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
let clientSocketResult1 = await utp1.connectTo(NodeAddress.init(node2.localNode).unsafeGet(), allowedId)
|
|
|
|
let clientSocketResult2 = await utp1.connectTo(NodeAddress.init(node2.localNode).unsafeGet(), allowedId + 1)
|
2021-12-11 18:12:55 +00:00
|
|
|
|
2021-11-18 09:05:56 +00:00
|
|
|
check:
|
|
|
|
clientSocketResult1.isOk()
|
|
|
|
clientSocketResult2.isErr()
|
|
|
|
|
|
|
|
let clientSocket = clientSocketResult1.get()
|
|
|
|
let serverSocket = await queue.get()
|
2021-12-11 18:12:55 +00:00
|
|
|
|
2021-11-18 09:05:56 +00:00
|
|
|
check:
|
|
|
|
clientSocket.connectionId() == allowedId
|
|
|
|
serverSocket.connectionId() == allowedId
|
|
|
|
|
2021-11-19 10:36:46 +00:00
|
|
|
await clientSocket.destroyWait()
|
|
|
|
await serverSocket.destroyWait()
|
|
|
|
await node1.closeWait()
|
|
|
|
await node2.closeWait()
|
|
|
|
|
|
|
|
asyncTest "Configure incoming connections to be in connected state":
|
|
|
|
let
|
2022-01-24 10:58:35 +00:00
|
|
|
queue = newAsyncQueue[UtpSocket[NodeAddress]]()
|
2021-11-19 10:36:46 +00:00
|
|
|
node1 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
|
|
node2 = initDiscoveryNode(
|
|
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
|
|
|
|
utp1 = UtpDiscv5Protocol.new(node1, utpProtId, registerIncomingSocketCallback(queue))
|
|
|
|
utp2 = UtpDiscv5Protocol.new(
|
|
|
|
node2,
|
|
|
|
utpProtId,
|
|
|
|
registerIncomingSocketCallback(queue),
|
2022-01-10 12:49:36 +00:00
|
|
|
socketConfig = SocketConfig.init(incomingSocketReceiveTimeout = none[Duration]())
|
2021-11-19 10:36:46 +00:00
|
|
|
)
|
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
# nodes must have session between each other
|
2021-11-19 10:36:46 +00:00
|
|
|
check:
|
2022-01-24 10:58:35 +00:00
|
|
|
(await node1.ping(node2.localNode)).isOk()
|
2021-11-19 10:36:46 +00:00
|
|
|
|
2022-01-24 10:58:35 +00:00
|
|
|
let clientSocketResult = await utp1.connectTo(NodeAddress.init(node2.localNode).unsafeGet())
|
2021-11-19 10:36:46 +00:00
|
|
|
let clientSocket = clientSocketResult.get()
|
|
|
|
let serverSocket = await queue.get()
|
|
|
|
|
|
|
|
check:
|
|
|
|
clientSocket.isConnected()
|
|
|
|
serverSocket.isConnected()
|
|
|
|
|
|
|
|
let serverData = @[1'u8]
|
|
|
|
|
|
|
|
let wResult = await serverSocket.write(serverData)
|
|
|
|
|
|
|
|
check:
|
|
|
|
wResult.isOk()
|
2021-12-20 12:14:50 +00:00
|
|
|
|
2021-11-19 10:36:46 +00:00
|
|
|
let readData = await clientSocket.read(len(serverData))
|
|
|
|
|
|
|
|
check:
|
|
|
|
readData == serverData
|
|
|
|
|
|
|
|
await clientSocket.destroyWait()
|
|
|
|
await serverSocket.destroyWait()
|
2021-11-18 09:05:56 +00:00
|
|
|
await node1.closeWait()
|
|
|
|
await node2.closeWait()
|