2020-07-07 11:14:11 +00:00
|
|
|
import unittest, options, bearssl
|
2020-05-06 16:31:47 +00:00
|
|
|
import chronos, strutils
|
2019-10-29 18:51:48 +00:00
|
|
|
import ../libp2p/[protocols/identify,
|
|
|
|
multiaddress,
|
|
|
|
peerinfo,
|
2020-07-01 06:25:09 +00:00
|
|
|
peerid,
|
2020-06-19 17:29:43 +00:00
|
|
|
stream/connection,
|
2019-10-29 18:51:48 +00:00
|
|
|
multistream,
|
2019-10-03 19:30:22 +00:00
|
|
|
transports/transport,
|
2019-10-29 18:51:48 +00:00
|
|
|
transports/tcptransport,
|
2019-10-03 19:30:22 +00:00
|
|
|
crypto/crypto]
|
2020-05-08 20:10:06 +00:00
|
|
|
import ./helpers
|
2019-08-30 05:16:30 +00:00
|
|
|
|
2019-10-29 18:51:48 +00:00
|
|
|
when defined(nimHasUsed): {.used.}
|
|
|
|
|
2019-08-30 05:16:30 +00:00
|
|
|
suite "Identify":
|
2020-04-21 01:24:42 +00:00
|
|
|
teardown:
|
2020-09-21 17:48:19 +00:00
|
|
|
checkTrackers()
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-11-25 13:42:02 +00:00
|
|
|
suite "handle identify message":
|
|
|
|
var
|
|
|
|
ma {.threadvar.}: MultiAddress
|
|
|
|
remoteSecKey {.threadvar.}: PrivateKey
|
|
|
|
remotePeerInfo {.threadvar.}: PeerInfo
|
|
|
|
serverFut {.threadvar.}: Future[void]
|
|
|
|
acceptFut {.threadvar.}: Future[void]
|
|
|
|
identifyProto1 {.threadvar.}: Identify
|
|
|
|
identifyProto2 {.threadvar.}: Identify
|
|
|
|
transport1 {.threadvar.}: Transport
|
|
|
|
transport2 {.threadvar.}: Transport
|
|
|
|
msListen {.threadvar.}: MultistreamSelect
|
|
|
|
msDial {.threadvar.}: MultistreamSelect
|
|
|
|
conn {.threadvar.}: Connection
|
2021-04-01 01:08:40 +00:00
|
|
|
exposedAddr {.threadvar.}: MultiAddress
|
2020-11-25 13:42:02 +00:00
|
|
|
|
|
|
|
asyncSetup:
|
|
|
|
ma = Multiaddress.init("/ip4/0.0.0.0/tcp/0").tryGet()
|
|
|
|
remoteSecKey = PrivateKey.random(ECDSA, rng[]).get()
|
|
|
|
remotePeerInfo = PeerInfo.init(
|
|
|
|
remoteSecKey, [ma], ["/test/proto1/1.0.0", "/test/proto2/1.0.0"])
|
|
|
|
|
|
|
|
transport1 = TcpTransport.init()
|
|
|
|
transport2 = TcpTransport.init()
|
|
|
|
|
2021-04-01 01:08:40 +00:00
|
|
|
exposedAddr = Multiaddress.init("/ip4/192.168.1.1/tcp/1337").get()
|
|
|
|
|
|
|
|
identifyProto1 = newIdentify(remotePeerInfo, proc(): MultiAddress = exposedAddr)
|
2020-11-25 13:42:02 +00:00
|
|
|
identifyProto2 = newIdentify(remotePeerInfo)
|
|
|
|
|
|
|
|
msListen = newMultistream()
|
|
|
|
msDial = newMultistream()
|
|
|
|
|
|
|
|
asyncTeardown:
|
|
|
|
await conn.close()
|
|
|
|
await acceptFut
|
|
|
|
await transport1.stop()
|
|
|
|
await serverFut
|
|
|
|
await transport2.stop()
|
|
|
|
|
|
|
|
asyncTest "default agent version":
|
|
|
|
msListen.addHandler(IdentifyCodec, identifyProto1)
|
|
|
|
serverFut = transport1.start(ma)
|
|
|
|
proc acceptHandler(): Future[void] {.async, gcsafe.} =
|
|
|
|
let c = await transport1.accept()
|
|
|
|
await msListen.handle(c)
|
|
|
|
|
|
|
|
acceptFut = acceptHandler()
|
|
|
|
conn = await transport2.dial(transport1.ma)
|
|
|
|
|
2020-11-19 02:06:42 +00:00
|
|
|
discard await msDial.select(conn, IdentifyCodec)
|
2020-11-25 13:42:02 +00:00
|
|
|
let id = await identifyProto2.identify(conn, remotePeerInfo)
|
|
|
|
|
|
|
|
check id.pubKey.get() == remoteSecKey.getKey().get()
|
|
|
|
check id.addrs[0] == ma
|
|
|
|
check id.protoVersion.get() == ProtoVersion
|
|
|
|
check id.agentVersion.get() == AgentVersion
|
|
|
|
check id.protos == @["/test/proto1/1.0.0", "/test/proto2/1.0.0"]
|
|
|
|
|
|
|
|
asyncTest "custom agent version":
|
|
|
|
const customAgentVersion = "MY CUSTOM AGENT STRING"
|
|
|
|
remotePeerInfo.agentVersion = customAgentVersion
|
|
|
|
msListen.addHandler(IdentifyCodec, identifyProto1)
|
|
|
|
|
|
|
|
serverFut = transport1.start(ma)
|
2020-11-19 02:06:42 +00:00
|
|
|
|
2020-11-25 13:42:02 +00:00
|
|
|
proc acceptHandler(): Future[void] {.async, gcsafe.} =
|
|
|
|
let c = await transport1.accept()
|
|
|
|
await msListen.handle(c)
|
|
|
|
|
|
|
|
acceptFut = acceptHandler()
|
|
|
|
conn = await transport2.dial(transport1.ma)
|
|
|
|
|
|
|
|
discard await msDial.select(conn, IdentifyCodec)
|
|
|
|
let id = await identifyProto2.identify(conn, remotePeerInfo)
|
|
|
|
|
|
|
|
check id.pubKey.get() == remoteSecKey.getKey().get()
|
|
|
|
check id.addrs[0] == ma
|
2021-04-01 01:08:40 +00:00
|
|
|
check id.observedAddr.get() == exposedAddr
|
2020-11-25 13:42:02 +00:00
|
|
|
check id.protoVersion.get() == ProtoVersion
|
|
|
|
check id.agentVersion.get() == customAgentVersion
|
|
|
|
check id.protos == @["/test/proto1/1.0.0", "/test/proto2/1.0.0"]
|
|
|
|
|
|
|
|
asyncTest "handle failed identify":
|
|
|
|
msListen.addHandler(IdentifyCodec, identifyProto1)
|
|
|
|
asyncCheck transport1.start(ma)
|
|
|
|
|
|
|
|
proc acceptHandler() {.async.} =
|
|
|
|
var conn: Connection
|
|
|
|
try:
|
|
|
|
conn = await transport1.accept()
|
|
|
|
await msListen.handle(conn)
|
|
|
|
except CatchableError:
|
|
|
|
discard
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
|
|
|
|
acceptFut = acceptHandler()
|
|
|
|
conn = await transport2.dial(transport1.ma)
|
|
|
|
|
|
|
|
expect IdentityNoMatchError:
|
|
|
|
let pi2 = PeerInfo.init(PrivateKey.random(ECDSA, rng[]).get())
|
|
|
|
discard await msDial.select(conn, IdentifyCodec)
|
|
|
|
discard await identifyProto2.identify(conn, pi2)
|
2021-04-01 01:08:40 +00:00
|
|
|
|
|
|
|
asyncTest "external address provider":
|
|
|
|
msListen.addHandler(IdentifyCodec, identifyProto1)
|
|
|
|
serverFut = transport1.start(ma)
|
|
|
|
proc acceptHandler(): Future[void] {.async, gcsafe.} =
|
|
|
|
let c = await transport1.accept()
|
|
|
|
await msListen.handle(c)
|
|
|
|
|
|
|
|
acceptFut = acceptHandler()
|
|
|
|
conn = await transport2.dial(transport1.ma)
|
|
|
|
|
|
|
|
discard await msDial.select(conn, IdentifyCodec)
|
|
|
|
let id = await identifyProto2.identify(conn, remotePeerInfo)
|
|
|
|
|
|
|
|
check id.pubKey.get() == remoteSecKey.getKey().get()
|
|
|
|
check id.addrs[0] == ma
|
|
|
|
check id.observedAddr.get() == exposedAddr
|
|
|
|
check id.protoVersion.get() == ProtoVersion
|
|
|
|
check id.agentVersion.get() == AgentVersion
|
|
|
|
check id.protos == @["/test/proto1/1.0.0", "/test/proto2/1.0.0"]
|