419 lines
13 KiB
Go
419 lines
13 KiB
Go
// node-canary tests whether a P2P peer is responding correctly.
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"flag"
|
|
"fmt"
|
|
stdlog "log"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"golang.org/x/crypto/sha3"
|
|
"golang.org/x/crypto/ssh/terminal"
|
|
|
|
"github.com/ethereum/go-ethereum/log"
|
|
"github.com/ethereum/go-ethereum/p2p"
|
|
"github.com/ethereum/go-ethereum/p2p/enode"
|
|
|
|
"github.com/status-im/status-go/api"
|
|
gethbridge "github.com/status-im/status-go/eth-node/bridge/geth"
|
|
"github.com/status-im/status-go/eth-node/types"
|
|
"github.com/status-im/status-go/logutils"
|
|
"github.com/status-im/status-go/params"
|
|
"github.com/status-im/status-go/rpc"
|
|
"github.com/status-im/status-go/services/ext"
|
|
"github.com/status-im/status-go/services/shhext"
|
|
"github.com/status-im/status-go/t/helpers"
|
|
)
|
|
|
|
const (
|
|
mailboxPassword = "status-offline-inbox"
|
|
)
|
|
|
|
// All general log messages in this package should be routed through this logger.
|
|
var logger = log.New("package", "status-go/cmd/node-canary")
|
|
|
|
var (
|
|
staticEnodeAddr = flag.String("staticnode", "", "checks if static node talks whisper protocol (e.g. enode://abc123@1.2.3.4:30303)")
|
|
mailserverEnodeAddr = flag.String("mailserver", "", "queries mail server for historic messages (e.g. enode://123abc@4.3.2.1:30504)")
|
|
publicChannel = flag.String("channel", "status", "The public channel name to retrieve historic messages from (used with 'mailserver' flag)")
|
|
timeout = flag.Int("timeout", 10, "Timeout when connecting to node or fetching messages from mailserver, in seconds")
|
|
period = flag.Int("period", 24*60*60, "How far in the past to request messages from mailserver, in seconds")
|
|
minPow = flag.Float64("shh.pow", params.WhisperMinimumPoW, "PoW for messages to be added to queue, in float format")
|
|
ttl = flag.Int("shh.ttl", params.WhisperTTL, "Time to live for messages, in seconds")
|
|
homePath = flag.String("home-dir", ".", "Home directory where state is stored")
|
|
logLevel = flag.String("log", "INFO", `Log level, one of: "ERROR", "WARN", "INFO", "DEBUG", and "TRACE"`)
|
|
logFile = flag.String("logfile", "", "Path to the log file")
|
|
logWithoutColors = flag.Bool("log-without-color", false, "Disables log colors")
|
|
)
|
|
|
|
func main() {
|
|
var err error
|
|
var staticParsedNode, mailserverParsedNode *enode.Node
|
|
if *staticEnodeAddr != "" {
|
|
staticParsedNode, err = enode.ParseV4(*staticEnodeAddr)
|
|
if err != nil {
|
|
logger.Crit("Invalid static address specified", "staticEnodeAddr", *staticEnodeAddr, "error", err)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
if *mailserverEnodeAddr != "" {
|
|
mailserverParsedNode, err = enode.ParseV4(*mailserverEnodeAddr)
|
|
if err != nil {
|
|
logger.Crit("Invalid mailserver address specified", "mailserverEnodeAddr", *mailserverEnodeAddr, "error", err)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
if staticParsedNode != nil {
|
|
verifyStaticNodeBehavior(staticParsedNode)
|
|
logger.Info("Connected to static node correctly", "address", *staticEnodeAddr)
|
|
os.Exit(0)
|
|
}
|
|
|
|
if mailserverParsedNode != nil {
|
|
verifyMailserverBehavior(mailserverParsedNode)
|
|
logger.Info("Mailserver responded correctly", "address", *mailserverEnodeAddr)
|
|
os.Exit(0)
|
|
}
|
|
|
|
logger.Crit("No address specified")
|
|
os.Exit(1)
|
|
}
|
|
|
|
func init() {
|
|
flag.Parse()
|
|
|
|
colors := !(*logWithoutColors)
|
|
if colors {
|
|
colors = terminal.IsTerminal(int(os.Stdin.Fd()))
|
|
}
|
|
|
|
if err := logutils.OverrideRootLog(*logLevel != "", *logLevel, logutils.FileOptions{Filename: *logFile}, colors); err != nil {
|
|
stdlog.Fatalf("Error initializing logger: %s", err)
|
|
}
|
|
}
|
|
|
|
func verifyMailserverBehavior(mailserverNode *enode.Node) {
|
|
clientBackend, err := startClientNode()
|
|
if err != nil {
|
|
logger.Error("Node start failed", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
defer func() { _ = clientBackend.StopNode() }()
|
|
|
|
clientNode := clientBackend.StatusNode()
|
|
clientGethWhisperService, err := clientNode.WhisperService()
|
|
if err != nil {
|
|
logger.Error("Could not retrieve Whisper service", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
clientWhisperService := gethbridge.NewGethWhisperWrapper(clientGethWhisperService)
|
|
clientShhExtService, err := clientNode.ShhExtService()
|
|
if err != nil {
|
|
logger.Error("Could not retrieve shhext service", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
// add mailserver peer to client
|
|
clientErrCh := helpers.WaitForPeerAsync(clientNode.Server(), *mailserverEnodeAddr, p2p.PeerEventTypeAdd, time.Duration(*timeout)*time.Second)
|
|
|
|
err = clientNode.AddPeer(*mailserverEnodeAddr)
|
|
if err != nil {
|
|
logger.Error("Failed to add mailserver peer to client", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
err = <-clientErrCh
|
|
if err != nil {
|
|
logger.Error("Error detected while waiting for mailserver peer to be added", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
// add mailserver sym key
|
|
mailServerKeyID, err := clientWhisperService.AddSymKeyFromPassword(mailboxPassword)
|
|
if err != nil {
|
|
logger.Error("Error adding mailserver sym key to client peer", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
mailboxPeer := mailserverNode.ID().Bytes()
|
|
err = clientGethWhisperService.AllowP2PMessagesFromPeer(mailboxPeer)
|
|
if err != nil {
|
|
logger.Error("Failed to allow P2P messages from mailserver peer", "error", err, mailserverNode.String())
|
|
os.Exit(1)
|
|
}
|
|
|
|
clientRPCClient := clientNode.RPCClient()
|
|
|
|
_, topic, _, err := joinPublicChat(clientWhisperService, clientRPCClient, *publicChannel)
|
|
if err != nil {
|
|
logger.Error("Failed to join public chat", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
// watch for envelopes to be available in filters in the client
|
|
envelopeAvailableWatcher := make(chan types.EnvelopeEvent, 1024)
|
|
sub := clientWhisperService.SubscribeEnvelopeEvents(envelopeAvailableWatcher)
|
|
defer sub.Unsubscribe()
|
|
|
|
// watch for mailserver responses in the client
|
|
mailServerResponseWatcher := make(chan types.EnvelopeEvent, 1024)
|
|
sub = clientWhisperService.SubscribeEnvelopeEvents(mailServerResponseWatcher)
|
|
defer sub.Unsubscribe()
|
|
|
|
// request messages from mailbox
|
|
shhextAPI := shhext.NewPublicAPI(clientShhExtService)
|
|
requestIDBytes, err := shhextAPI.RequestMessages(context.TODO(),
|
|
ext.MessagesRequest{
|
|
MailServerPeer: mailserverNode.String(),
|
|
From: uint32(clientWhisperService.GetCurrentTime().Add(-time.Duration(*period) * time.Second).Unix()),
|
|
Limit: 1,
|
|
Topic: topic,
|
|
SymKeyID: mailServerKeyID,
|
|
Timeout: time.Duration(*timeout),
|
|
})
|
|
if err != nil {
|
|
logger.Error("Error requesting historic messages from mailserver", "error", err)
|
|
os.Exit(2)
|
|
}
|
|
requestID := types.BytesToHash(requestIDBytes)
|
|
|
|
// wait for mailserver request sent event
|
|
err = waitForMailServerRequestSent(mailServerResponseWatcher, requestID, time.Duration(*timeout)*time.Second)
|
|
if err != nil {
|
|
logger.Error("Error waiting for mailserver request sent event", "error", err)
|
|
os.Exit(3)
|
|
}
|
|
|
|
// wait for mailserver response
|
|
resp, err := waitForMailServerResponse(mailServerResponseWatcher, requestID, time.Duration(*timeout)*time.Second)
|
|
if err != nil {
|
|
logger.Error("Error waiting for mailserver response", "error", err)
|
|
os.Exit(3)
|
|
}
|
|
|
|
// if last envelope is empty there are no messages to receive
|
|
if isEmptyEnvelope(resp.LastEnvelopeHash) {
|
|
logger.Warn("No messages available from mailserver")
|
|
return
|
|
}
|
|
|
|
// wait for last envelope sent by the mailserver to be available for filters
|
|
err = waitForEnvelopeEvents(envelopeAvailableWatcher, []string{resp.LastEnvelopeHash.String()}, types.EventEnvelopeAvailable)
|
|
if err != nil {
|
|
logger.Error("Error waiting for envelopes to be available to client filter", "error", err)
|
|
os.Exit(4)
|
|
}
|
|
}
|
|
|
|
func verifyStaticNodeBehavior(staticNode *enode.Node) {
|
|
clientBackend, err := startClientNode()
|
|
if err != nil {
|
|
logger.Error("Node start failed", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
defer func() { _ = clientBackend.StopNode() }()
|
|
|
|
clientNode := clientBackend.StatusNode()
|
|
|
|
// wait for peer to be added to client
|
|
clientErrCh := helpers.WaitForPeerAsync(clientNode.Server(), *staticEnodeAddr, p2p.PeerEventTypeAdd, 5*time.Second)
|
|
err = <-clientErrCh
|
|
if err != nil {
|
|
logger.Error("Error detected while waiting for static peer to be added", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
// wait to check if peer remains connected to client
|
|
clientErrCh = helpers.WaitForPeerAsync(clientNode.Server(), *staticEnodeAddr, p2p.PeerEventTypeDrop, 5*time.Second)
|
|
err = <-clientErrCh
|
|
peers := clientNode.GethNode().Server().Peers()
|
|
if len(peers) != 1 {
|
|
logger.Error("Failed to add static peer", "error", err)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
// makeNodeConfig parses incoming CLI options and returns node configuration object
|
|
func makeNodeConfig() (*params.NodeConfig, error) {
|
|
err := error(nil)
|
|
|
|
workDir := ""
|
|
if path.IsAbs(*homePath) {
|
|
workDir = *homePath
|
|
} else {
|
|
workDir, err = filepath.Abs(filepath.Dir(os.Args[0]))
|
|
if err == nil {
|
|
workDir = path.Join(workDir, *homePath)
|
|
}
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
nodeConfig, err := params.NewNodeConfigWithDefaults(path.Join(workDir, ".ethereum"), uint64(params.RopstenNetworkID))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if *logLevel != "" {
|
|
nodeConfig.LogLevel = *logLevel
|
|
nodeConfig.LogEnabled = true
|
|
}
|
|
|
|
if *logFile != "" {
|
|
nodeConfig.LogFile = *logFile
|
|
}
|
|
|
|
nodeConfig.EnableNTPSync = true
|
|
nodeConfig.NoDiscovery = true
|
|
nodeConfig.ListenAddr = ""
|
|
if *staticEnodeAddr != "" {
|
|
nodeConfig.ClusterConfig.Enabled = true
|
|
nodeConfig.ClusterConfig.Fleet = params.FleetUndefined
|
|
nodeConfig.ClusterConfig.StaticNodes = []string{
|
|
*staticEnodeAddr,
|
|
}
|
|
}
|
|
|
|
return whisperConfig(nodeConfig)
|
|
}
|
|
|
|
// whisperConfig creates node configuration object from flags
|
|
func whisperConfig(nodeConfig *params.NodeConfig) (*params.NodeConfig, error) {
|
|
whisperConfig := &nodeConfig.WhisperConfig
|
|
whisperConfig.Enabled = true
|
|
whisperConfig.LightClient = true
|
|
whisperConfig.MinimumPoW = *minPow
|
|
whisperConfig.TTL = *ttl
|
|
|
|
return nodeConfig, nil
|
|
}
|
|
|
|
func startClientNode() (*api.GethStatusBackend, error) {
|
|
config, err := makeNodeConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
clientBackend := api.NewGethStatusBackend()
|
|
err = clientBackend.AccountManager().InitKeystore(config.KeyStoreDir)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
err = clientBackend.StartNode(config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return clientBackend, err
|
|
}
|
|
|
|
func joinPublicChat(w types.Whisper, rpcClient *rpc.Client, name string) (string, types.TopicType, string, error) {
|
|
keyID, err := w.AddSymKeyFromPassword(name)
|
|
if err != nil {
|
|
return "", types.TopicType{}, "", err
|
|
}
|
|
|
|
h := sha3.NewLegacyKeccak256()
|
|
_, err = h.Write([]byte(name))
|
|
if err != nil {
|
|
return "", types.TopicType{}, "", err
|
|
}
|
|
fullTopic := h.Sum(nil)
|
|
topic := types.BytesToTopic(fullTopic)
|
|
|
|
whisperAPI := w.PublicWhisperAPI()
|
|
filterID, err := whisperAPI.NewMessageFilter(types.Criteria{SymKeyID: keyID, Topics: []types.TopicType{topic}})
|
|
|
|
return keyID, topic, filterID, err
|
|
}
|
|
|
|
func waitForMailServerRequestSent(events chan types.EnvelopeEvent, requestID types.Hash, timeout time.Duration) error {
|
|
timeoutTimer := time.NewTimer(timeout)
|
|
for {
|
|
select {
|
|
case event := <-events:
|
|
if event.Hash == requestID && event.Event == types.EventMailServerRequestSent {
|
|
timeoutTimer.Stop()
|
|
return nil
|
|
}
|
|
case <-timeoutTimer.C:
|
|
return errors.New("timed out waiting for mailserver request sent")
|
|
}
|
|
}
|
|
}
|
|
|
|
func waitForMailServerResponse(events chan types.EnvelopeEvent, requestID types.Hash, timeout time.Duration) (*types.MailServerResponse, error) {
|
|
timeoutTimer := time.NewTimer(timeout)
|
|
for {
|
|
select {
|
|
case event := <-events:
|
|
if event.Hash == requestID {
|
|
resp, err := decodeMailServerResponse(event)
|
|
if resp != nil || err != nil {
|
|
timeoutTimer.Stop()
|
|
return resp, err
|
|
}
|
|
}
|
|
case <-timeoutTimer.C:
|
|
return nil, errors.New("timed out waiting for mailserver response")
|
|
}
|
|
}
|
|
}
|
|
|
|
func decodeMailServerResponse(event types.EnvelopeEvent) (*types.MailServerResponse, error) {
|
|
switch event.Event {
|
|
case types.EventMailServerRequestSent:
|
|
return nil, nil
|
|
case types.EventMailServerRequestCompleted:
|
|
resp, ok := event.Data.(*types.MailServerResponse)
|
|
if !ok {
|
|
return nil, errors.New("failed to convert event to a *MailServerResponse")
|
|
}
|
|
|
|
return resp, nil
|
|
case types.EventMailServerRequestExpired:
|
|
return nil, errors.New("no messages available from mailserver")
|
|
default:
|
|
return nil, fmt.Errorf("unexpected event type: %v", event.Event)
|
|
}
|
|
}
|
|
|
|
func waitForEnvelopeEvents(events chan types.EnvelopeEvent, hashes []string, event types.EventType) error {
|
|
check := make(map[string]struct{})
|
|
for _, hash := range hashes {
|
|
check[hash] = struct{}{}
|
|
}
|
|
|
|
timeout := time.NewTimer(time.Second * 5)
|
|
for {
|
|
select {
|
|
case e := <-events:
|
|
if e.Event == event {
|
|
delete(check, e.Hash.String())
|
|
if len(check) == 0 {
|
|
timeout.Stop()
|
|
return nil
|
|
}
|
|
}
|
|
case <-timeout.C:
|
|
return fmt.Errorf("timed out while waiting for event on envelopes. event: %s", event)
|
|
}
|
|
}
|
|
}
|
|
|
|
// helper for checking LastEnvelopeHash
|
|
func isEmptyEnvelope(hash types.Hash) bool {
|
|
for _, b := range hash {
|
|
if b != 0 {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|