mirror of https://github.com/status-im/nim-eth.git
226 lines
7.2 KiB
Nim
226 lines
7.2 KiB
Nim
# Copyright (c) 2020-2021 Status Research & Development GmbH
|
|
# Licensed and distributed under either of
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
{.used.}
|
|
|
|
import
|
|
chronos, bearssl,
|
|
stew/shims/net, stew/byteutils,
|
|
testutils/unittests,
|
|
../../eth/p2p/discoveryv5/[enr, node, routing_table],
|
|
../../eth/p2p/discoveryv5/protocol as discv5_protocol,
|
|
../../eth/utp/utp_discv5_protocol,
|
|
../../eth/keys
|
|
|
|
proc localAddress*(port: int): Address =
|
|
Address(ip: ValidIpAddress.init("127.0.0.1"), port: Port(port))
|
|
|
|
proc initDiscoveryNode*(rng: ref BrHmacDrbgContext,
|
|
privKey: PrivateKey,
|
|
address: Address,
|
|
bootstrapRecords: openArray[Record] = [],
|
|
localEnrFields: openArray[(string, seq[byte])] = [],
|
|
previousRecord = none[enr.Record]()): discv5_protocol.Protocol =
|
|
# set bucketIpLimit to allow bucket split
|
|
let tableIpLimits = TableIpLimits(tableIpLimit: 1000, bucketIpLimit: 24)
|
|
|
|
result = newProtocol(privKey,
|
|
some(address.ip),
|
|
some(address.port), some(address.port),
|
|
bindPort = address.port,
|
|
bootstrapRecords = bootstrapRecords,
|
|
localEnrFields = localEnrFields,
|
|
previousRecord = previousRecord,
|
|
tableIpLimits = tableIpLimits,
|
|
rng = rng)
|
|
|
|
result.open()
|
|
|
|
proc generateByteArray(rng: var BrHmacDrbgContext, length: int): seq[byte] =
|
|
var bytes = newSeq[byte](length)
|
|
brHmacDrbgGenerate(rng, bytes)
|
|
return bytes
|
|
|
|
procSuite "Utp protocol over discovery v5 tests":
|
|
let rng = newRng()
|
|
let utpProtId = "test-utp".toBytes()
|
|
|
|
proc registerIncomingSocketCallback(serverSockets: AsyncQueue): AcceptConnectionCallback[Node] =
|
|
return (
|
|
proc(server: UtpRouter[Node], client: UtpSocket[Node]): Future[void] =
|
|
serverSockets.addLast(client)
|
|
)
|
|
|
|
proc allowOneIdCallback(allowedId: uint16): AllowConnectionCallback[Node] =
|
|
return (
|
|
proc(r: UtpRouter[Node], remoteAddress: Node, connectionId: uint16): bool =
|
|
connectionId == allowedId
|
|
)
|
|
|
|
# TODO Add more tests to discovery v5 suite, especially those which will differ
|
|
# from standard utp case
|
|
asyncTest "Success connect to remote host":
|
|
let
|
|
queue = newAsyncQueue[UtpSocket[Node]]()
|
|
node1 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
node2 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
utp1 = UtpDiscv5Protocol.new(node1, utpProtId, registerIncomingSocketCallback(queue))
|
|
utp2 = UtpDiscv5Protocol.new(node2, utpProtId, registerIncomingSocketCallback(queue))
|
|
|
|
# nodes must know about each other
|
|
check:
|
|
node1.addNode(node2.localNode)
|
|
node2.addNode(node1.localNode)
|
|
|
|
let clientSocketResult = await utp1.connectTo(node2.localNode)
|
|
let clientSocket = clientSocketResult.get()
|
|
let serverSocket = await queue.get()
|
|
|
|
check:
|
|
clientSocket.isConnected()
|
|
# in this test we do not configure the socket to be connected just after
|
|
# accepting incoming connection
|
|
not serverSocket.isConnected()
|
|
|
|
await clientSocket.destroyWait()
|
|
await serverSocket.destroyWait()
|
|
await node1.closeWait()
|
|
await node2.closeWait()
|
|
|
|
asyncTest "Success write data over packet size to remote host":
|
|
let
|
|
queue = newAsyncQueue[UtpSocket[Node]]()
|
|
node1 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
node2 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
utp1 = UtpDiscv5Protocol.new(node1, utpProtId, registerIncomingSocketCallback(queue))
|
|
utp2 = UtpDiscv5Protocol.new(node2, utpProtId, registerIncomingSocketCallback(queue))
|
|
|
|
# nodes must know about each other
|
|
check:
|
|
node1.addNode(node2.localNode)
|
|
node2.addNode(node1.localNode)
|
|
|
|
let numOfBytes = 5000
|
|
let clientSocketResult = await utp1.connectTo(node2.localNode)
|
|
let clientSocket = clientSocketResult.get()
|
|
|
|
let serverSocket = await queue.get()
|
|
|
|
let bytesToTransfer = generateByteArray(rng[], numOfBytes)
|
|
let written = await clientSocket.write(bytesToTransfer)
|
|
|
|
let received = await serverSocket.read(numOfBytes)
|
|
|
|
check:
|
|
written.get() == numOfBytes
|
|
bytesToTransfer == received
|
|
clientSocket.isConnected()
|
|
serverSocket.isConnected()
|
|
|
|
await clientSocket.destroyWait()
|
|
await serverSocket.destroyWait()
|
|
await node1.closeWait()
|
|
await node2.closeWait()
|
|
|
|
asyncTest "Accept connection only from allowed peers":
|
|
let
|
|
allowedId: uint16 = 10
|
|
lowSynTimeout = milliseconds(500)
|
|
queue = newAsyncQueue[UtpSocket[Node]]()
|
|
node1 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
node2 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
utp1 = UtpDiscv5Protocol.new(
|
|
node1,
|
|
utpProtId,
|
|
registerIncomingSocketCallback(queue),
|
|
SocketConfig.init(lowSynTimeout))
|
|
utp2 =
|
|
UtpDiscv5Protocol.new(
|
|
node2,
|
|
utpProtId,
|
|
registerIncomingSocketCallback(queue),
|
|
SocketConfig.init(),
|
|
allowOneIdCallback(allowedId))
|
|
|
|
# nodes must know about each other
|
|
check:
|
|
node1.addNode(node2.localNode)
|
|
node2.addNode(node1.localNode)
|
|
|
|
let clientSocketResult1 = await utp1.connectTo(node2.localNode, allowedId)
|
|
let clientSocketResult2 = await utp1.connectTo(node2.localNode, allowedId + 1)
|
|
|
|
check:
|
|
clientSocketResult1.isOk()
|
|
clientSocketResult2.isErr()
|
|
|
|
let clientSocket = clientSocketResult1.get()
|
|
let serverSocket = await queue.get()
|
|
|
|
check:
|
|
clientSocket.connectionId() == allowedId
|
|
serverSocket.connectionId() == allowedId
|
|
|
|
await clientSocket.destroyWait()
|
|
await serverSocket.destroyWait()
|
|
await node1.closeWait()
|
|
await node2.closeWait()
|
|
|
|
asyncTest "Configure incoming connections to be in connected state":
|
|
let
|
|
queue = newAsyncQueue[UtpSocket[Node]]()
|
|
node1 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20302))
|
|
node2 = initDiscoveryNode(
|
|
rng, PrivateKey.random(rng[]), localAddress(20303))
|
|
|
|
utp1 = UtpDiscv5Protocol.new(node1, utpProtId, registerIncomingSocketCallback(queue))
|
|
utp2 = UtpDiscv5Protocol.new(
|
|
node2,
|
|
utpProtId,
|
|
registerIncomingSocketCallback(queue),
|
|
SocketConfig.init(incomingSocketReceiveTimeout = none[Duration]())
|
|
)
|
|
|
|
# nodes must know about each other
|
|
check:
|
|
node1.addNode(node2.localNode)
|
|
node2.addNode(node1.localNode)
|
|
|
|
let clientSocketResult = await utp1.connectTo(node2.localNode)
|
|
let clientSocket = clientSocketResult.get()
|
|
let serverSocket = await queue.get()
|
|
|
|
check:
|
|
clientSocket.isConnected()
|
|
serverSocket.isConnected()
|
|
|
|
let serverData = @[1'u8]
|
|
|
|
let wResult = await serverSocket.write(serverData)
|
|
|
|
check:
|
|
wResult.isOk()
|
|
|
|
let readData = await clientSocket.read(len(serverData))
|
|
|
|
check:
|
|
readData == serverData
|
|
|
|
await clientSocket.destroyWait()
|
|
await serverSocket.destroyWait()
|
|
await node1.closeWait()
|
|
await node2.closeWait()
|