// Copyright 2019 The Waku Library Authors. // // The Waku library is free software: you can redistribute it and/or modify // it under the terms of the GNU Lesser General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // The Waku library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty off // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with the Waku library. If not, see . // // This software uses the go-ethereum library, which is licensed // under the GNU Lesser General Public Library, version 3 or any later. package waku import ( "bytes" "crypto/ecdsa" "crypto/sha256" mrand "math/rand" "testing" "time" "golang.org/x/crypto/pbkdf2" "github.com/stretchr/testify/require" "github.com/ethereum/go-ethereum/crypto" "github.com/ethereum/go-ethereum/p2p" "github.com/ethereum/go-ethereum/p2p/enode" "github.com/status-im/status-go/eth-node/types" "github.com/status-im/status-go/waku/common" v0 "github.com/status-im/status-go/waku/v0" v1 "github.com/status-im/status-go/waku/v1" ) var seed int64 // InitSingleTest should be called in the beginning of every // test, which uses RNG, in order to make the tests // reproducibility independent of their sequence. func InitSingleTest() { seed = time.Now().Unix() mrand.Seed(seed) } func TestBasic(t *testing.T) { w := New(nil, nil) p := w.Protocols() waku0 := p[0] waku1 := p[1] if waku0.Name != v0.Name { t.Fatalf("failed Peer Name: %v.", waku0.Name) } if uint64(waku0.Version) != v0.Version { t.Fatalf("failed Peer Version: %v.", waku0.Version) } if waku0.Length != v0.NumberOfMessageCodes { t.Fatalf("failed Peer Length: %v.", waku0.Length) } if waku0.Run == nil { t.Fatalf("failed waku.Run.") } if waku1.Name != v1.Name { t.Fatalf("failed Peer Name: %v.", waku1.Name) } if uint64(waku1.Version) != v1.Version { t.Fatalf("failed Peer Version: %v.", waku1.Version) } if waku1.Length != v1.NumberOfMessageCodes { t.Fatalf("failed Peer Length: %v.", waku1.Length) } if waku1.Run == nil { t.Fatalf("failed waku.Run.") } if w.GetFilter("non-existent") != nil { t.Fatalf("failed GetFilter.") } peerID := make([]byte, 64) mrand.Read(peerID) // nolint: gosec peer, _ := w.getPeer(peerID) if peer != nil { t.Fatal("found peer for random key.") } if err := w.AllowP2PMessagesFromPeer(peerID); err == nil { t.Fatalf("failed MarkPeerTrusted.") } exist := w.HasSymKey("non-existing") if exist { t.Fatalf("failed HasSymKey.") } key, err := w.GetSymKey("non-existing") if err == nil { t.Fatalf("failed GetSymKey(non-existing): false positive.") } if key != nil { t.Fatalf("failed GetSymKey: false positive.") } mail := w.Envelopes() if len(mail) != 0 { t.Fatalf("failed w.Envelopes().") } derived := pbkdf2.Key(peerID, nil, 65356, common.AESKeyLength, sha256.New) if !common.ValidateDataIntegrity(derived, common.AESKeyLength) { t.Fatalf("failed validateSymmetricKey with param = %v.", derived) } if common.ContainsOnlyZeros(derived) { t.Fatalf("failed containsOnlyZeros with param = %v.", derived) } buf := []byte{0xFF, 0xE5, 0x80, 0x2, 0} le := common.BytesToUintLittleEndian(buf) be := common.BytesToUintBigEndian(buf) if le != uint64(0x280e5ff) { t.Fatalf("failed bytesToIntLittleEndian: %d.", le) } if be != uint64(0xffe5800200) { t.Fatalf("failed BytesToIntBigEndian: %d.", be) } id, err := w.NewKeyPair() if err != nil { t.Fatalf("failed to generate new key pair: %s.", err) } pk, err := w.GetPrivateKey(id) if err != nil { t.Fatalf("failed to retrieve new key pair: %s.", err) } if !validatePrivateKey(pk) { t.Fatalf("failed validatePrivateKey: %v.", pk) } if !common.ValidatePublicKey(&pk.PublicKey) { t.Fatalf("failed ValidatePublicKey: %v.", pk) } } func TestAsymmetricKeyImport(t *testing.T) { var ( w = New(nil, nil) privateKeys []*ecdsa.PrivateKey ) for i := 0; i < 50; i++ { id, err := w.NewKeyPair() if err != nil { t.Fatalf("could not generate key: %v", err) } pk, err := w.GetPrivateKey(id) if err != nil { t.Fatalf("could not export private key: %v", err) } privateKeys = append(privateKeys, pk) if !w.DeleteKeyPair(id) { t.Fatalf("could not delete private key") } } for _, pk := range privateKeys { if _, err := w.AddKeyPair(pk); err != nil { t.Fatalf("could not import private key: %v", err) } } } func TestWakuIdentityManagement(t *testing.T) { w := New(nil, nil) id1, err := w.NewKeyPair() if err != nil { t.Fatalf("failed to generate new key pair: %s.", err) } id2, err := w.NewKeyPair() if err != nil { t.Fatalf("failed to generate new key pair: %s.", err) } pk1, err := w.GetPrivateKey(id1) if err != nil { t.Fatalf("failed to retrieve the key pair: %s.", err) } pk2, err := w.GetPrivateKey(id2) if err != nil { t.Fatalf("failed to retrieve the key pair: %s.", err) } if !w.HasKeyPair(id1) { t.Fatalf("failed HasIdentity(pk1).") } if !w.HasKeyPair(id2) { t.Fatalf("failed HasIdentity(pk2).") } if pk1 == nil { t.Fatalf("failed GetIdentity(pk1).") } if pk2 == nil { t.Fatalf("failed GetIdentity(pk2).") } if !validatePrivateKey(pk1) { t.Fatalf("pk1 is invalid.") } if !validatePrivateKey(pk2) { t.Fatalf("pk2 is invalid.") } // Delete one identity done := w.DeleteKeyPair(id1) if !done { t.Fatalf("failed to delete id1.") } pk1, err = w.GetPrivateKey(id1) if err == nil { t.Fatalf("retrieve the key pair: false positive.") } pk2, err = w.GetPrivateKey(id2) if err != nil { t.Fatalf("failed to retrieve the key pair: %s.", err) } if w.HasKeyPair(id1) { t.Fatalf("failed DeleteIdentity(pub1): still exist.") } if !w.HasKeyPair(id2) { t.Fatalf("failed DeleteIdentity(pub1): pub2 does not exist.") } if pk1 != nil { t.Fatalf("failed DeleteIdentity(pub1): first key still exist.") } if pk2 == nil { t.Fatalf("failed DeleteIdentity(pub1): second key does not exist.") } // Delete again non-existing identity done = w.DeleteKeyPair(id1) if done { t.Fatalf("delete id1: false positive.") } pk1, err = w.GetPrivateKey(id1) if err == nil { t.Fatalf("retrieve the key pair: false positive.") } pk2, err = w.GetPrivateKey(id2) if err != nil { t.Fatalf("failed to retrieve the key pair: %s.", err) } if w.HasKeyPair(id1) { t.Fatalf("failed delete non-existing identity: exist.") } if !w.HasKeyPair(id2) { t.Fatalf("failed delete non-existing identity: pub2 does not exist.") } if pk1 != nil { t.Fatalf("failed delete non-existing identity: first key exist.") } if pk2 == nil { t.Fatalf("failed delete non-existing identity: second key does not exist.") } // Delete second identity done = w.DeleteKeyPair(id2) if !done { t.Fatalf("failed to delete id2.") } pk1, err = w.GetPrivateKey(id1) if err == nil { t.Fatalf("retrieve the key pair: false positive.") } pk2, err = w.GetPrivateKey(id2) if err == nil { t.Fatalf("retrieve the key pair: false positive.") } if w.HasKeyPair(id1) { t.Fatalf("failed delete second identity: first identity exist.") } if w.HasKeyPair(id2) { t.Fatalf("failed delete second identity: still exist.") } if pk1 != nil { t.Fatalf("failed delete second identity: first key exist.") } if pk2 != nil { t.Fatalf("failed delete second identity: second key exist.") } } func TestSymKeyManagement(t *testing.T) { InitSingleTest() var err error var k1, k2 []byte w := New(nil, nil) id2 := "arbitrary-string-2" id1, err := w.GenerateSymKey() if err != nil { t.Fatalf("failed GenerateSymKey with seed %d: %s.", seed, err) } k1, err = w.GetSymKey(id1) if err != nil { t.Fatalf("failed GetSymKey(id1).") } k2, err = w.GetSymKey(id2) if err == nil { t.Fatalf("failed GetSymKey(id2): false positive.") } if !w.HasSymKey(id1) { t.Fatalf("failed HasSymKey(id1).") } if w.HasSymKey(id2) { t.Fatalf("failed HasSymKey(id2): false positive.") } if k1 == nil { t.Fatalf("first key does not exist.") } if k2 != nil { t.Fatalf("second key still exist.") } // add existing id, nothing should change randomKey := make([]byte, common.AESKeyLength) mrand.Read(randomKey) // nolint: gosec id1, err = w.AddSymKeyDirect(randomKey) if err != nil { t.Fatalf("failed AddSymKey with seed %d: %s.", seed, err) } k1, err = w.GetSymKey(id1) if err != nil { t.Fatalf("failed w.GetSymKey(id1).") } k2, err = w.GetSymKey(id2) if err == nil { t.Fatalf("failed w.GetSymKey(id2): false positive.") } if !w.HasSymKey(id1) { t.Fatalf("failed w.HasSymKey(id1).") } if w.HasSymKey(id2) { t.Fatalf("failed w.HasSymKey(id2): false positive.") } if k1 == nil { t.Fatalf("first key does not exist.") } if !bytes.Equal(k1, randomKey) { t.Fatalf("k1 != randomKey.") } if k2 != nil { t.Fatalf("second key already exist.") } id2, err = w.AddSymKeyDirect(randomKey) if err != nil { t.Fatalf("failed AddSymKey(id2) with seed %d: %s.", seed, err) } k1, err = w.GetSymKey(id1) if err != nil { t.Fatalf("failed w.GetSymKey(id1).") } k2, err = w.GetSymKey(id2) if err != nil { t.Fatalf("failed w.GetSymKey(id2).") } if !w.HasSymKey(id1) { t.Fatalf("HasSymKey(id1) failed.") } if !w.HasSymKey(id2) { t.Fatalf("HasSymKey(id2) failed.") } if k1 == nil { t.Fatalf("k1 does not exist.") } if k2 == nil { t.Fatalf("k2 does not exist.") } if !bytes.Equal(k1, k2) { t.Fatalf("k1 != k2.") } if !bytes.Equal(k1, randomKey) { t.Fatalf("k1 != randomKey.") } if len(k1) != common.AESKeyLength { t.Fatalf("wrong length of k1.") } if len(k2) != common.AESKeyLength { t.Fatalf("wrong length of k2.") } w.DeleteSymKey(id1) k1, err = w.GetSymKey(id1) if err == nil { t.Fatalf("failed w.GetSymKey(id1): false positive.") } if k1 != nil { t.Fatalf("failed GetSymKey(id1): false positive.") } k2, err = w.GetSymKey(id2) if err != nil { t.Fatalf("failed w.GetSymKey(id2).") } if w.HasSymKey(id1) { t.Fatalf("failed to delete first key: still exist.") } if !w.HasSymKey(id2) { t.Fatalf("failed to delete first key: second key does not exist.") } if k2 == nil { t.Fatalf("failed to delete first key: second key is nil.") } w.DeleteSymKey(id1) w.DeleteSymKey(id2) k1, err = w.GetSymKey(id1) if err == nil { t.Fatalf("failed w.GetSymKey(id1): false positive.") } k2, err = w.GetSymKey(id2) if err == nil { t.Fatalf("failed w.GetSymKey(id2): false positive.") } if k1 != nil || k2 != nil { t.Fatalf("k1 or k2 is not nil") } if w.HasSymKey(id1) { t.Fatalf("failed to delete second key: first key exist.") } if w.HasSymKey(id2) { t.Fatalf("failed to delete second key: still exist.") } randomKey = make([]byte, common.AESKeyLength+1) mrand.Read(randomKey) // nolint: gosec _, err = w.AddSymKeyDirect(randomKey) if err == nil { t.Fatalf("added the key with wrong size, seed %d.", seed) } const password = "arbitrary data here" id1, err = w.AddSymKeyFromPassword(password) if err != nil { t.Fatalf("failed AddSymKeyFromPassword(id1) with seed %d: %s.", seed, err) } id2, err = w.AddSymKeyFromPassword(password) if err != nil { t.Fatalf("failed AddSymKeyFromPassword(id2) with seed %d: %s.", seed, err) } k1, err = w.GetSymKey(id1) if err != nil { t.Fatalf("failed w.GetSymKey(id1).") } k2, err = w.GetSymKey(id2) if err != nil { t.Fatalf("failed w.GetSymKey(id2).") } if !w.HasSymKey(id1) { t.Fatalf("HasSymKey(id1) failed.") } if !w.HasSymKey(id2) { t.Fatalf("HasSymKey(id2) failed.") } if !common.ValidateDataIntegrity(k2, common.AESKeyLength) { t.Fatalf("key validation failed.") } if !bytes.Equal(k1, k2) { t.Fatalf("k1 != k2.") } } func TestExpiry(t *testing.T) { InitSingleTest() w := New(nil, nil) if err := w.SetMinimumPoW(0.0000001, false); err != nil { t.Fatal("failed to set min pow") } defer func() { handleError(t, w.SetMinimumPoW(common.DefaultMinimumPoW, false)) }() if err := w.Start(); err != nil { t.Fatal("failed to start waku") } defer func() { handleError(t, w.Stop()) }() params, err := generateMessageParams() if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } params.TTL = 1 messagesCount := 5 // Send a few messages one after another. Due to low PoW and expiration buckets // with one second resolution, it covers a case when there are multiple items // in a single expiration bucket. for i := 0; i < messagesCount; i++ { msg, err := common.NewSentMessage(params) if err != nil { t.Fatalf("failed to create new message with seed %d: %s.", seed, err) } env, err := msg.Wrap(params, time.Now()) if err != nil { t.Fatalf("failed Wrap with seed %d: %s.", seed, err) } err = w.Send(env) if err != nil { t.Fatalf("failed to send envelope with seed %d: %s.", seed, err) } } // wait till received or timeout var received, expired bool for j := 0; j < 20; j++ { time.Sleep(100 * time.Millisecond) if len(w.Envelopes()) == messagesCount { received = true break } } if !received { t.Fatalf("did not receive the sent envelope, seed: %d.", seed) } // wait till expired or timeout for j := 0; j < 20; j++ { time.Sleep(100 * time.Millisecond) if len(w.Envelopes()) == 0 { expired = true break } } if !expired { t.Fatalf("expire failed, seed: %d.", seed) } } func TestCustomization(t *testing.T) { InitSingleTest() w := New(nil, nil) defer func() { handleError(t, w.SetMinimumPoW(common.DefaultMinimumPoW, false)) }() defer func() { handleError(t, w.SetMaxMessageSize(common.DefaultMaxMessageSize)) }() if err := w.Start(); err != nil { t.Fatal("failed to start node") } defer func() { handleError(t, w.Stop()) }() const smallPoW = 0.00001 f, err := generateFilter(t, true) if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } params, err := generateMessageParams() if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } params.KeySym = f.KeySym params.Topic = common.BytesToTopic(f.Topics[2]) params.PoW = smallPoW params.TTL = 3600 * 24 // one day msg, err := common.NewSentMessage(params) if err != nil { t.Fatalf("failed to create new message with seed %d: %s.", seed, err) } env, err := msg.Wrap(params, time.Now()) if err != nil { t.Fatalf("failed Wrap with seed %d: %s.", seed, err) } err = w.Send(env) if err == nil { t.Fatalf("successfully sent envelope with PoW %.06f, false positive (seed %d).", env.PoW(), seed) } _ = w.SetMinimumPoW(smallPoW/2, true) err = w.Send(env) if err != nil { t.Fatalf("failed to send envelope with seed %d: %s.", seed, err) } params.TTL++ msg, err = common.NewSentMessage(params) if err != nil { t.Fatalf("failed to create new message with seed %d: %s.", seed, err) } env, err = msg.Wrap(params, time.Now()) if err != nil { t.Fatalf("failed Wrap with seed %d: %s.", seed, err) } _ = w.SetMaxMessageSize(uint32(env.Size() - 1)) err = w.Send(env) if err == nil { t.Fatalf("successfully sent oversized envelope (seed %d): false positive.", seed) } _ = w.SetMaxMessageSize(common.DefaultMaxMessageSize) err = w.Send(env) if err != nil { t.Fatalf("failed to send second envelope with seed %d: %s.", seed, err) } // wait till received or timeout var received bool for j := 0; j < 20; j++ { time.Sleep(100 * time.Millisecond) if len(w.Envelopes()) > 1 { received = true break } } if !received { t.Fatalf("did not receive the sent envelope, seed: %d.", seed) } // check w.messages() _, err = w.Subscribe(f) if err != nil { t.Fatalf("failed subscribe with seed %d: %s.", seed, err) } time.Sleep(5 * time.Millisecond) mail := f.Retrieve() if len(mail) > 0 { t.Fatalf("received premature mail") } } func TestSymmetricSendCycle(t *testing.T) { InitSingleTest() w := New(nil, nil) defer func() { handleError(t, w.SetMinimumPoW(common.DefaultMinimumPoW, false)) }() defer func() { handleError(t, w.SetMaxMessageSize(common.DefaultMaxMessageSize)) }() if err := w.Start(); err != nil { t.Fatal("failed to start node") } defer func() { handleError(t, w.Stop()) }() filter1, err := generateFilter(t, true) if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } filter1.PoW = common.DefaultMinimumPoW // Copy the first filter since some of its fields // are randomly generated. filter2 := &common.Filter{ KeySym: filter1.KeySym, Topics: filter1.Topics, PoW: filter1.PoW, AllowP2P: filter1.AllowP2P, Messages: common.NewMemoryMessageStore(), } params, err := generateMessageParams() if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } filter1.Src = ¶ms.Src.PublicKey filter2.Src = ¶ms.Src.PublicKey params.KeySym = filter1.KeySym params.Topic = common.BytesToTopic(filter1.Topics[2]) params.PoW = filter1.PoW params.WorkTime = 10 params.TTL = 50 msg, err := common.NewSentMessage(params) if err != nil { t.Fatalf("failed to create new message with seed %d: %s.", seed, err) } env, err := msg.Wrap(params, time.Now()) if err != nil { t.Fatalf("failed Wrap with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter1) if err != nil { t.Fatalf("failed subscribe 1 with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter2) if err != nil { t.Fatalf("failed subscribe 2 with seed %d: %s.", seed, err) } err = w.Send(env) if err != nil { t.Fatalf("Failed sending envelope with PoW %.06f (seed %d): %s", env.PoW(), seed, err) } // wait till received or timeout var received bool for j := 0; j < 200; j++ { time.Sleep(10 * time.Millisecond) if len(w.Envelopes()) > 0 { received = true break } } if !received { t.Fatalf("did not receive the sent envelope, seed: %d.", seed) } // check w.messages() time.Sleep(5 * time.Millisecond) mail1 := filter1.Retrieve() mail2 := filter2.Retrieve() if len(mail2) == 0 { t.Fatalf("did not receive any email for filter 2") } if len(mail1) == 0 { t.Fatalf("did not receive any email for filter 1") } } func TestSymmetricSendCycleWithTopicInterest(t *testing.T) { InitSingleTest() w := New(nil, nil) defer func() { handleError(t, w.SetMinimumPoW(common.DefaultMinimumPoW, false)) }() defer func() { handleError(t, w.SetMaxMessageSize(common.DefaultMaxMessageSize)) }() if err := w.Start(); err != nil { t.Fatal("could not start node") } defer func() { handleError(t, w.Stop()) }() filter1, err := generateFilter(t, true) if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } filter1.PoW = common.DefaultMinimumPoW // Copy the first filter since some of its fields // are randomly generated. filter2 := &common.Filter{ KeySym: filter1.KeySym, Topics: filter1.Topics, PoW: filter1.PoW, AllowP2P: filter1.AllowP2P, Messages: common.NewMemoryMessageStore(), } params, err := generateMessageParams() if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } filter1.Src = ¶ms.Src.PublicKey filter2.Src = ¶ms.Src.PublicKey params.KeySym = filter1.KeySym params.Topic = common.BytesToTopic(filter1.Topics[2]) params.PoW = filter1.PoW params.WorkTime = 10 params.TTL = 50 msg, err := common.NewSentMessage(params) if err != nil { t.Fatalf("failed to create new message with seed %d: %s.", seed, err) } env, err := msg.Wrap(params, time.Now()) if err != nil { t.Fatalf("failed Wrap with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter1) if err != nil { t.Fatalf("failed subscribe 1 with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter2) if err != nil { t.Fatalf("failed subscribe 2 with seed %d: %s.", seed, err) } err = w.Send(env) if err != nil { t.Fatalf("Failed sending envelope with PoW %.06f (seed %d): %s", env.PoW(), seed, err) } // wait till received or timeout var received bool for j := 0; j < 200; j++ { time.Sleep(10 * time.Millisecond) if len(w.Envelopes()) > 0 { received = true break } } if !received { t.Fatalf("did not receive the sent envelope, seed: %d.", seed) } // check w.messages() time.Sleep(5 * time.Millisecond) mail1 := filter1.Retrieve() mail2 := filter2.Retrieve() if len(mail2) == 0 { t.Fatalf("did not receive any email for filter 2") } if len(mail1) == 0 { t.Fatalf("did not receive any email for filter 1") } } func TestSymmetricSendWithoutAKey(t *testing.T) { InitSingleTest() w := New(nil, nil) if err := w.Start(); err != nil { t.Errorf("failed to start waku: '%s'", err) } defer func() { handleError(t, w.SetMinimumPoW(common.DefaultMinimumPoW, false)) }() defer func() { handleError(t, w.SetMaxMessageSize(common.DefaultMaxMessageSize)) }() defer func() { handleError(t, w.Stop()) }() filter, err := generateFilter(t, true) if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } filter.PoW = common.DefaultMinimumPoW params, err := generateMessageParams() if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } filter.Src = nil params.KeySym = filter.KeySym params.Topic = common.BytesToTopic(filter.Topics[2]) params.PoW = filter.PoW params.WorkTime = 10 params.TTL = 50 msg, err := common.NewSentMessage(params) if err != nil { t.Fatalf("failed to create new message with seed %d: %s.", seed, err) } env, err := msg.Wrap(params, time.Now()) if err != nil { t.Fatalf("failed Wrap with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter) if err != nil { t.Fatalf("failed subscribe 1 with seed %d: %s.", seed, err) } err = w.Send(env) if err != nil { t.Fatalf("Failed sending envelope with PoW %.06f (seed %d): %s", env.PoW(), seed, err) } // wait till received or timeout var received bool for j := 0; j < 200; j++ { time.Sleep(10 * time.Millisecond) if len(w.Envelopes()) > 0 { received = true break } } if !received { t.Fatalf("did not receive the sent envelope, seed: %d.", seed) } // check w.messages() time.Sleep(5 * time.Millisecond) mail := filter.Retrieve() if len(mail) == 0 { t.Fatalf("did not receive message in spite of not setting a public key") } } func TestSymmetricSendKeyMismatch(t *testing.T) { InitSingleTest() w := New(nil, nil) if err := w.Start(); err != nil { t.Errorf("failed to start waku: '%s'", err) } defer func() { handleError(t, w.SetMinimumPoW(common.DefaultMinimumPoW, false)) }() defer func() { handleError(t, w.SetMaxMessageSize(common.DefaultMaxMessageSize)) }() defer func() { handleError(t, w.Stop()) }() filter, err := generateFilter(t, true) if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } filter.PoW = common.DefaultMinimumPoW params, err := generateMessageParams() if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } params.KeySym = filter.KeySym params.Topic = common.BytesToTopic(filter.Topics[2]) params.PoW = filter.PoW params.WorkTime = 10 params.TTL = 50 msg, err := common.NewSentMessage(params) if err != nil { t.Fatalf("failed to create new message with seed %d: %s.", seed, err) } env, err := msg.Wrap(params, time.Now()) if err != nil { t.Fatalf("failed Wrap with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter) if err != nil { t.Fatalf("failed subscribe 1 with seed %d: %s.", seed, err) } err = w.Send(env) if err != nil { t.Fatalf("Failed sending envelope with PoW %.06f (seed %d): %s", env.PoW(), seed, err) } // wait till received or timeout var received bool for j := 0; j < 200; j++ { time.Sleep(10 * time.Millisecond) if len(w.Envelopes()) > 0 { received = true break } } if !received { t.Fatalf("did not receive the sent envelope, seed: %d.", seed) } // check w.messages() time.Sleep(5 * time.Millisecond) mail := filter.Retrieve() if len(mail) > 0 { t.Fatalf("received a message when keys weren't matching") } } func TestFullNode(t *testing.T) { config := &Config{FullNode: true} w := New(config, nil) require.True(t, w.FullNode(), "full node should be true") require.True(t, common.IsFullNode(w.BloomFilter()), "bloom filter should be full") require.True(t, common.IsFullNode(w.BloomFilterTolerance()), "bloom filter tolerance should be full") require.Nil(t, w.TopicInterest(), "topic interest should be nil") // Set a topic require.NoError(t, w.SetTopicInterest([]common.TopicType{common.BytesToTopic([]byte("a"))})) // Make sure everything is the same require.True(t, w.FullNode(), "full node should be true") require.True(t, common.IsFullNode(w.BloomFilter()), "bloom filter should be full") require.True(t, common.IsFullNode(w.BloomFilterTolerance()), "bloom filter tolerance should be full") require.Nil(t, w.TopicInterest(), "topic interest should be nil") // unset full node w.SetFullNode(false) require.False(t, w.FullNode(), "full node should be false") require.NotNil(t, w.TopicInterest(), "topic interest should not be nil") } func TestBloom(t *testing.T) { topic := common.TopicType{0, 0, 255, 6} b := topic.ToBloom() x := make([]byte, common.BloomFilterSize) x[0] = byte(1) x[32] = byte(1) x[common.BloomFilterSize-1] = byte(128) if !common.BloomFilterMatch(x, b) || !common.BloomFilterMatch(b, x) { t.Fatalf("bloom filter does not match the mask") } _, err := mrand.Read(b) // nolint: gosec if err != nil { t.Fatalf("math rand error") } _, err = mrand.Read(x) // nolint: gosec if err != nil { t.Fatalf("math rand error") } if !common.BloomFilterMatch(b, b) { t.Fatalf("bloom filter does not match self") } x = addBloom(x, b) if !common.BloomFilterMatch(x, b) { t.Fatalf("bloom filter does not match combined bloom") } if !common.IsFullNode(nil) { t.Fatalf("common.IsFullNode did not recognize nil as full node") } x[17] = 254 if common.IsFullNode(x) { t.Fatalf("common.IsFullNode false positive") } for i := 0; i < common.BloomFilterSize; i++ { b[i] = byte(255) } if !common.IsFullNode(b) { t.Fatalf("common.IsFullNode false negative") } if common.BloomFilterMatch(x, b) { t.Fatalf("bloomFilterMatch false positive") } if !common.BloomFilterMatch(b, x) { t.Fatalf("bloomFilterMatch false negative") } w := New(nil, nil) f := w.BloomFilter() if f != nil { t.Fatalf("wrong bloom on creation") } err = w.SetBloomFilter(x) if err != nil { t.Fatalf("failed to set bloom filter: %s", err) } f = w.BloomFilter() if !common.BloomFilterMatch(f, x) || !common.BloomFilterMatch(x, f) { t.Fatalf("retireved wrong bloom filter") } } func TestTopicInterest(t *testing.T) { w := New(nil, nil) topicInterest := w.TopicInterest() if topicInterest != nil { t.Fatalf("wrong topic on creation") } filter1, err := generateFilter(t, true) if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter1) if err != nil { t.Fatalf("failed subscribe with seed %d: %s.", seed, err) } topicInterest = w.TopicInterest() if len(topicInterest) != len(filter1.Topics) { t.Fatalf("wrong number of topics created") } filter2, err := generateFilter(t, true) if err != nil { t.Fatalf("failed generateMessageParams with seed %d: %s.", seed, err) } _, err = w.Subscribe(filter2) if err != nil { t.Fatalf("failed subscribe with seed %d: %s.", seed, err) } topicInterest = w.TopicInterest() if len(topicInterest) != len(filter1.Topics)+len(filter2.Topics) { t.Fatalf("wrong number of topics created") } } func TestOnNewEnvelopesSoftBlacklist(t *testing.T) { w1 := New(nil, nil) envelope := &common.Envelope{} p2pPeer := p2p.NewPeer(enode.ID{0x4}, "test", []p2p.Cap{}) peer := v1.NewPeer(w1, p2pPeer, nil, nil) // Pre-condition, we need to make sure this envelope returns an EnvelopeError envelopeError, err := w1.OnNewEnvelopes([]*common.Envelope{envelope}, peer) require.NoError(t, err) // Make sure this envelope returns an error require.NotNil(t, envelopeError) // build black listed waku cfg := &Config{ SoftBlacklistedPeerIDs: []string{types.EncodeHex(peer.ID())}, } w2 := New(cfg, nil) envelopeError, err = w2.OnNewEnvelopes([]*common.Envelope{envelope}, peer) require.NoError(t, err) // Since it's blacklisted, it will just drop envelopes, keep the connection open require.Nil(t, envelopeError) } func handleError(t *testing.T, err error) { if err != nil { t.Logf("deferred function error: '%s'", err) } } func generateFilter(t *testing.T, symmetric bool) (*common.Filter, error) { var f common.Filter f.Messages = common.NewMemoryMessageStore() const topicNum = 8 f.Topics = make([][]byte, topicNum) for i := 0; i < topicNum; i++ { f.Topics[i] = make([]byte, 4) mrand.Read(f.Topics[i]) // nolint: gosec f.Topics[i][0] = 0x01 } key, err := crypto.GenerateKey() if err != nil { t.Fatalf("generateFilter 1 failed with seed %d.", seed) return nil, err } f.Src = &key.PublicKey if symmetric { f.KeySym = make([]byte, common.AESKeyLength) mrand.Read(f.KeySym) // nolint: gosec f.SymKeyHash = crypto.Keccak256Hash(f.KeySym) } else { f.KeyAsym, err = crypto.GenerateKey() if err != nil { t.Fatalf("generateFilter 2 failed with seed %d.", seed) return nil, err } } // AcceptP2P & PoW are not set return &f, nil }