2020-05-08 20:10:06 +00:00
|
|
|
{.used.}
|
|
|
|
|
2021-06-08 16:55:24 +00:00
|
|
|
import options, sequtils, sets
|
2019-12-04 04:44:54 +00:00
|
|
|
import chronos
|
2020-05-23 19:26:25 +00:00
|
|
|
import stew/byteutils
|
2020-03-26 06:06:47 +00:00
|
|
|
import nimcrypto/sysrand
|
2020-04-21 01:24:42 +00:00
|
|
|
import ../libp2p/[errors,
|
|
|
|
switch,
|
2019-09-30 15:48:40 +00:00
|
|
|
multistream,
|
2021-04-02 01:20:51 +00:00
|
|
|
builders,
|
2020-04-21 01:24:42 +00:00
|
|
|
stream/bufferstream,
|
2020-06-19 17:29:43 +00:00
|
|
|
stream/connection,
|
2019-10-29 18:51:48 +00:00
|
|
|
multiaddress,
|
2019-09-30 15:48:40 +00:00
|
|
|
peerinfo,
|
2019-10-29 18:51:48 +00:00
|
|
|
crypto/crypto,
|
|
|
|
protocols/protocol,
|
2020-11-05 03:52:54 +00:00
|
|
|
protocols/secure/secure,
|
2019-09-30 15:48:40 +00:00
|
|
|
muxers/muxer,
|
2020-11-05 03:52:54 +00:00
|
|
|
muxers/mplex/lpchannel,
|
2020-11-28 08:05:12 +00:00
|
|
|
stream/lpstream,
|
2021-08-18 07:40:12 +00:00
|
|
|
nameresolving/nameresolver,
|
|
|
|
nameresolving/mockresolver,
|
2020-11-28 08:05:12 +00:00
|
|
|
stream/chronosstream,
|
2021-11-08 12:02:03 +00:00
|
|
|
transports/tcptransport,
|
|
|
|
transports/wstransport]
|
2020-05-08 20:10:06 +00:00
|
|
|
import ./helpers
|
2019-10-29 18:51:48 +00:00
|
|
|
|
2020-04-21 01:24:42 +00:00
|
|
|
const
|
|
|
|
TestCodec = "/test/proto/1.0.0"
|
2019-08-31 17:58:49 +00:00
|
|
|
|
|
|
|
type
|
|
|
|
TestProto = ref object of LPProtocol
|
|
|
|
|
2019-12-23 18:44:51 +00:00
|
|
|
suite "Switch":
|
2020-04-21 01:24:42 +00:00
|
|
|
teardown:
|
2020-09-21 17:48:19 +00:00
|
|
|
checkTrackers()
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e use switch dial proto string":
|
|
|
|
let done = newFuture[void]()
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
done.complete()
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2021-03-18 15:20:36 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
2020-11-13 03:44:02 +00:00
|
|
|
switch1.mount(testProto)
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2021-03-18 15:20:36 +00:00
|
|
|
let switch2 = newStandardSwitch()
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
let conn = await switch2.dial(switch1.peerInfo.peerId, switch1.peerInfo.addrs, TestCodec)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.close()
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
done.wait(5.seconds),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e use switch dial proto string with custom matcher":
|
|
|
|
let done = newFuture[void]()
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
done.complete()
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let callProto = TestCodec & "/pew"
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
proc match(proto: string): bool {.gcsafe.} =
|
|
|
|
return proto == callProto
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch1 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
switch1.mount(testProto, match)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
let conn = await switch2.dial(switch1.peerInfo.peerId, switch1.peerInfo.addrs, callProto)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.close()
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
done.wait(5.seconds),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
2020-10-02 14:59:15 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should not leak bufferstreams and connections on channel close":
|
|
|
|
let done = newFuture[void]()
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
done.complete()
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2020-05-25 14:40:39 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
2020-11-13 03:44:02 +00:00
|
|
|
switch1.mount(testProto)
|
2020-03-27 14:25:52 +00:00
|
|
|
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch2 = newStandardSwitch()
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
let conn = await switch2.dial(switch1.peerInfo.peerId, switch1.peerInfo.addrs, TestCodec)
|
2020-03-27 14:25:52 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-03-27 14:25:52 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.close()
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
done.wait(5.seconds),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop(),
|
|
|
|
)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e use connect then dial":
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
finally:
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
await conn.close()
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
2019-12-23 18:44:51 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch1 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
switch1.mount(testProto)
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs)
|
|
|
|
let conn = await switch2.dial(switch1.peerInfo.peerId, switch1.peerInfo.addrs, TestCodec)
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
conn.close(),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop()
|
|
|
|
)
|
2020-05-14 15:19:03 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should not leak on peer disconnect":
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs)
|
2020-03-26 06:06:47 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo.peerId)
|
2020-06-19 17:29:43 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo.peerId))))
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-06-02 17:32:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-07-17 15:36:48 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger connection events (remote)":
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-06-02 17:32:42 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
|
|
|
var kinds: set[ConnEventKind]
|
2021-09-08 09:07:46 +00:00
|
|
|
proc hook(peerId: PeerId, event: ConnEvent) {.async, gcsafe.} =
|
2020-11-13 03:44:02 +00:00
|
|
|
kinds = kinds + {event.kind}
|
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Connected
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId == switch1.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
of 1:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Disconnected
|
2020-05-23 19:26:25 +00:00
|
|
|
|
2021-09-08 09:07:46 +00:00
|
|
|
check peerId == switch1.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
else:
|
|
|
|
check false
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
step.inc()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switch2.addConnEventHandler(hook, ConnEventKind.Connected)
|
|
|
|
switch2.addConnEventHandler(hook, ConnEventKind.Disconnected)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo.peerId)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo.peerId))))
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check:
|
|
|
|
kinds == {
|
|
|
|
ConnEventKind.Connected,
|
|
|
|
ConnEventKind.Disconnected
|
|
|
|
}
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger connection events (local)":
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
|
|
|
var kinds: set[ConnEventKind]
|
2021-09-08 09:07:46 +00:00
|
|
|
proc hook(peerId: PeerId, event: ConnEvent) {.async, gcsafe.} =
|
2020-11-13 03:44:02 +00:00
|
|
|
kinds = kinds + {event.kind}
|
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Connected
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId == switch2.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
of 1:
|
|
|
|
check:
|
|
|
|
event.kind == ConnEventKind.Disconnected
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-09-08 09:07:46 +00:00
|
|
|
check peerId == switch2.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
else:
|
|
|
|
check false
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
step.inc()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switch1.addConnEventHandler(hook, ConnEventKind.Connected)
|
|
|
|
switch1.addConnEventHandler(hook, ConnEventKind.Disconnected)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo.peerId)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo.peerId))))
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-07-24 19:24:31 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check:
|
|
|
|
kinds == {
|
|
|
|
ConnEventKind.Connected,
|
|
|
|
ConnEventKind.Disconnected
|
|
|
|
}
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger peer events (remote)":
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
2020-11-28 16:59:47 +00:00
|
|
|
var kinds: set[PeerEventKind]
|
2021-09-08 09:07:46 +00:00
|
|
|
proc handler(peerId: PeerId, event: PeerEvent) {.async, gcsafe.} =
|
2020-11-28 16:59:47 +00:00
|
|
|
kinds = kinds + {event.kind}
|
2020-11-13 03:44:02 +00:00
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Joined
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId == switch2.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
of 1:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Left
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId == switch2.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
else:
|
|
|
|
check false
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
step.inc()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-28 16:59:47 +00:00
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Joined)
|
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Left)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo.peerId)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo.peerId))))
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
check:
|
|
|
|
kinds == {
|
2020-11-28 16:59:47 +00:00
|
|
|
PeerEventKind.Joined,
|
|
|
|
PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
}
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "e2e should trigger peer events (local)":
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
let switch2 = newStandardSwitch()
|
2020-09-15 20:19:22 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
var step = 0
|
2020-11-28 16:59:47 +00:00
|
|
|
var kinds: set[PeerEventKind]
|
2021-09-08 09:07:46 +00:00
|
|
|
proc handler(peerId: PeerId, event: PeerEvent) {.async, gcsafe.} =
|
2020-11-28 16:59:47 +00:00
|
|
|
kinds = kinds + {event.kind}
|
2020-11-13 03:44:02 +00:00
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Joined
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId == switch1.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
of 1:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Left
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId == switch1.peerInfo.peerId
|
2020-11-13 03:44:02 +00:00
|
|
|
else:
|
|
|
|
check false
|
|
|
|
|
|
|
|
step.inc()
|
|
|
|
|
2020-11-28 16:59:47 +00:00
|
|
|
switch2.addPeerEventHandler(handler, PeerEventKind.Joined)
|
|
|
|
switch2.addPeerEventHandler(handler, PeerEventKind.Left)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo.peerId)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo.peerId))))
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
check:
|
|
|
|
kinds == {
|
2020-11-28 16:59:47 +00:00
|
|
|
PeerEventKind.Joined,
|
|
|
|
PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
|
|
|
|
asyncTest "e2e should trigger peer events only once per peer":
|
2021-02-08 20:33:34 +00:00
|
|
|
let switch1 = newStandardSwitch()
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-11-08 12:02:03 +00:00
|
|
|
let rng = crypto.newRng()
|
2020-11-13 03:44:02 +00:00
|
|
|
# use same private keys to emulate two connection from same peer
|
|
|
|
let privKey = PrivateKey.random(rng[]).tryGet()
|
|
|
|
let switch2 = newStandardSwitch(
|
|
|
|
privKey = some(privKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
let switch3 = newStandardSwitch(
|
|
|
|
privKey = some(privKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
var step = 0
|
2020-11-28 16:59:47 +00:00
|
|
|
var kinds: set[PeerEventKind]
|
2021-09-08 09:07:46 +00:00
|
|
|
proc handler(peerId: PeerId, event: PeerEvent) {.async, gcsafe.} =
|
2020-11-28 16:59:47 +00:00
|
|
|
kinds = kinds + {event.kind}
|
2020-11-13 03:44:02 +00:00
|
|
|
case step:
|
|
|
|
of 0:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Joined
|
2020-11-13 03:44:02 +00:00
|
|
|
of 1:
|
|
|
|
check:
|
2020-11-28 16:59:47 +00:00
|
|
|
event.kind == PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
else:
|
|
|
|
check false # should not trigger this
|
|
|
|
|
|
|
|
step.inc()
|
|
|
|
|
2020-11-28 16:59:47 +00:00
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Joined)
|
|
|
|
switch1.addPeerEventHandler(handler, PeerEventKind.Left)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
|
|
|
await switch3.start()
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs) # should trigger 1st Join event
|
|
|
|
await switch3.connect(switch1.peerInfo.peerId, switch1.peerInfo.addrs) # should trigger 2nd Join event
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check switch3.isConnected(switch1.peerInfo.peerId)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
await switch2.disconnect(switch1.peerInfo.peerId) # should trigger 1st Left event
|
|
|
|
await switch3.disconnect(switch1.peerInfo.peerId) # should trigger 2nd Left event
|
2020-11-13 03:44:02 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check not switch3.isConnected(switch1.peerInfo.peerId)
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch2.peerInfo.peerId))))
|
|
|
|
check await(checkExpiring((not switch1.isConnected(switch3.peerInfo.peerId))))
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
check:
|
|
|
|
kinds == {
|
2020-11-28 16:59:47 +00:00
|
|
|
PeerEventKind.Joined,
|
|
|
|
PeerEventKind.Left
|
2020-11-13 03:44:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop(),
|
|
|
|
switch3.stop())
|
|
|
|
|
|
|
|
asyncTest "e2e should allow dropping peer from connection events":
|
2021-11-08 12:02:03 +00:00
|
|
|
let rng = crypto.newRng()
|
2020-11-13 03:44:02 +00:00
|
|
|
# use same private keys to emulate two connection from same peer
|
2021-09-08 09:07:46 +00:00
|
|
|
let
|
|
|
|
privateKey = PrivateKey.random(rng[]).tryGet()
|
2021-10-25 08:26:32 +00:00
|
|
|
peerInfo = PeerInfo.new(privateKey)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
var switches: seq[Switch]
|
|
|
|
var done = newFuture[void]()
|
|
|
|
var onConnect: Future[void]
|
2021-09-08 09:07:46 +00:00
|
|
|
proc hook(peerId: PeerId, event: ConnEvent) {.async, gcsafe.} =
|
2020-11-13 03:44:02 +00:00
|
|
|
case event.kind:
|
|
|
|
of ConnEventKind.Connected:
|
|
|
|
await onConnect
|
|
|
|
await switches[0].disconnect(peerInfo.peerId) # trigger disconnect
|
|
|
|
of ConnEventKind.Disconnected:
|
|
|
|
check not switches[0].isConnected(peerInfo.peerId)
|
|
|
|
await sleepAsync(1.millis)
|
|
|
|
done.complete()
|
|
|
|
|
|
|
|
switches.add(newStandardSwitch(
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
switches[0].addConnEventHandler(hook, ConnEventKind.Connected)
|
|
|
|
switches[0].addConnEventHandler(hook, ConnEventKind.Disconnected)
|
2021-12-03 18:23:12 +00:00
|
|
|
await switches[0].start()
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
switches.add(newStandardSwitch(
|
2021-09-08 09:07:46 +00:00
|
|
|
privKey = some(privateKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2021-02-25 15:24:49 +00:00
|
|
|
onConnect = switches[1].connect(switches[0].peerInfo.peerId, switches[0].peerInfo.addrs)
|
2020-11-13 03:44:02 +00:00
|
|
|
await onConnect
|
|
|
|
|
|
|
|
await done
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switches.mapIt( it.stop() ))
|
|
|
|
|
|
|
|
asyncTest "e2e should allow dropping multiple connections for peer from connection events":
|
2021-11-08 12:02:03 +00:00
|
|
|
let rng = crypto.newRng()
|
2020-11-13 03:44:02 +00:00
|
|
|
# use same private keys to emulate two connection from same peer
|
2021-09-08 09:07:46 +00:00
|
|
|
let
|
|
|
|
privateKey = PrivateKey.random(rng[]).tryGet()
|
2021-10-25 08:26:32 +00:00
|
|
|
peerInfo = PeerInfo.new(privateKey)
|
2020-11-13 03:44:02 +00:00
|
|
|
|
|
|
|
var conns = 1
|
|
|
|
var switches: seq[Switch]
|
|
|
|
var done = newFuture[void]()
|
|
|
|
var onConnect: Future[void]
|
2021-09-08 09:07:46 +00:00
|
|
|
proc hook(peerId2: PeerId, event: ConnEvent) {.async, gcsafe.} =
|
2020-11-13 03:44:02 +00:00
|
|
|
case event.kind:
|
|
|
|
of ConnEventKind.Connected:
|
|
|
|
if conns == 5:
|
2020-11-11 19:20:14 +00:00
|
|
|
await onConnect
|
|
|
|
await switches[0].disconnect(peerInfo.peerId) # trigger disconnect
|
2020-11-13 03:44:02 +00:00
|
|
|
return
|
|
|
|
|
|
|
|
conns.inc
|
|
|
|
of ConnEventKind.Disconnected:
|
|
|
|
if conns == 1:
|
2020-11-11 19:20:14 +00:00
|
|
|
check not switches[0].isConnected(peerInfo.peerId)
|
|
|
|
done.complete()
|
2020-11-13 03:44:02 +00:00
|
|
|
conns.dec
|
2020-11-11 19:20:14 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switches.add(newStandardSwitch(
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2020-11-11 19:20:14 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
switches[0].addConnEventHandler(hook, ConnEventKind.Connected)
|
2021-12-03 18:23:12 +00:00
|
|
|
await switches[0].start()
|
2020-11-11 19:20:14 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
for i in 1..5:
|
2020-11-11 19:20:14 +00:00
|
|
|
switches.add(newStandardSwitch(
|
2021-09-08 09:07:46 +00:00
|
|
|
privKey = some(privateKey),
|
2021-02-08 20:33:34 +00:00
|
|
|
rng = rng))
|
2021-06-14 08:26:11 +00:00
|
|
|
switches[i].addConnEventHandler(hook, ConnEventKind.Disconnected)
|
2021-02-25 15:24:49 +00:00
|
|
|
onConnect = switches[i].connect(switches[0].peerInfo.peerId, switches[0].peerInfo.addrs)
|
2020-11-11 19:20:14 +00:00
|
|
|
await onConnect
|
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
await done
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switches.mapIt( it.stop() ))
|
|
|
|
|
2020-11-28 08:05:12 +00:00
|
|
|
# TODO: we should be able to test cancellation
|
|
|
|
# for most of the steps in the upgrade flow -
|
|
|
|
# this is just a basic test for dials
|
|
|
|
asyncTest "e2e canceling dial should not leak":
|
2021-11-24 20:01:12 +00:00
|
|
|
let ma = @[Multiaddress.init("/ip4/0.0.0.0/tcp/0").tryGet()]
|
2020-11-28 08:05:12 +00:00
|
|
|
|
2021-06-30 08:59:30 +00:00
|
|
|
let transport = TcpTransport.new(upgrade = Upgrade())
|
2020-11-28 08:05:12 +00:00
|
|
|
await transport.start(ma)
|
|
|
|
|
|
|
|
proc acceptHandler() {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let conn = await transport.accept()
|
|
|
|
discard await conn.readLp(100)
|
2021-06-14 08:26:11 +00:00
|
|
|
await conn.close()
|
2021-02-25 15:24:49 +00:00
|
|
|
except CatchableError:
|
2020-11-28 08:05:12 +00:00
|
|
|
discard
|
|
|
|
|
|
|
|
let handlerWait = acceptHandler()
|
|
|
|
let switch = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch.start()
|
2020-11-28 08:05:12 +00:00
|
|
|
|
|
|
|
var peerId = PeerID.init(PrivateKey.random(ECDSA, rng[]).get()).get()
|
2021-11-24 20:01:12 +00:00
|
|
|
let connectFut = switch.connect(peerId, transport.addrs)
|
2020-11-28 08:05:12 +00:00
|
|
|
await sleepAsync(500.millis)
|
|
|
|
connectFut.cancel()
|
|
|
|
await handlerWait
|
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
checkTracker(ChronosStreamTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
transport.stop(),
|
|
|
|
switch.stop())
|
|
|
|
|
|
|
|
asyncTest "e2e closing remote conn should not leak":
|
2021-11-24 20:01:12 +00:00
|
|
|
let ma = @[Multiaddress.init("/ip4/0.0.0.0/tcp/0").tryGet()]
|
2020-11-28 08:05:12 +00:00
|
|
|
|
2021-06-30 08:59:30 +00:00
|
|
|
let transport = TcpTransport.new(upgrade = Upgrade())
|
2020-11-28 08:05:12 +00:00
|
|
|
await transport.start(ma)
|
|
|
|
|
|
|
|
proc acceptHandler() {.async, gcsafe.} =
|
|
|
|
let conn = await transport.accept()
|
2020-12-03 01:24:48 +00:00
|
|
|
await conn.closeWithEOF()
|
2020-11-28 08:05:12 +00:00
|
|
|
|
|
|
|
let handlerWait = acceptHandler()
|
|
|
|
let switch = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch.start()
|
2020-11-28 08:05:12 +00:00
|
|
|
|
|
|
|
var peerId = PeerID.init(PrivateKey.random(ECDSA, rng[]).get()).get()
|
2021-12-13 10:25:33 +00:00
|
|
|
expect LPStreamClosedError, LPStreamEOFError:
|
2021-11-24 20:01:12 +00:00
|
|
|
await switch.connect(peerId, transport.addrs)
|
2020-11-28 08:05:12 +00:00
|
|
|
|
|
|
|
await handlerWait
|
|
|
|
|
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
checkTracker(ChronosStreamTrackerName)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
transport.stop(),
|
|
|
|
switch.stop())
|
|
|
|
|
2020-12-01 08:44:21 +00:00
|
|
|
asyncTest "e2e calling closeWithEOF on the same stream should not assert":
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
discard await conn.readLp(100)
|
|
|
|
|
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
|
|
|
|
|
|
|
let switch1 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
switch1.mount(testProto)
|
|
|
|
|
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
2020-12-01 08:44:21 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
let conn = await switch2.dial(switch1.peerInfo.peerId, switch1.peerInfo.addrs, TestCodec)
|
2020-12-01 08:44:21 +00:00
|
|
|
|
|
|
|
proc closeReader() {.async.} =
|
|
|
|
await conn.closeWithEOF()
|
|
|
|
|
|
|
|
var readers: seq[Future[void]]
|
|
|
|
for i in 0..10:
|
|
|
|
readers.add(closeReader())
|
|
|
|
|
|
|
|
await allFuturesThrowing(readers)
|
2021-06-23 15:27:52 +00:00
|
|
|
await switch2.stop() #Otherwise this leaks
|
|
|
|
check await checkExpiring(not switch1.isConnected(switch2.peerInfo.peerID))
|
|
|
|
|
2020-12-01 08:44:21 +00:00
|
|
|
checkTracker(LPChannelTrackerName)
|
|
|
|
checkTracker(SecureConnTrackerName)
|
|
|
|
checkTracker(ChronosStreamTrackerName)
|
|
|
|
|
2021-06-14 08:26:11 +00:00
|
|
|
await switch1.stop()
|
2020-12-01 08:44:21 +00:00
|
|
|
|
2020-11-13 03:44:02 +00:00
|
|
|
asyncTest "connect to inexistent peer":
|
|
|
|
let switch2 = newStandardSwitch(secureManagers = [SecureProtocol.Noise])
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch2.start()
|
2020-11-13 03:44:02 +00:00
|
|
|
let someAddr = MultiAddress.init("/ip4/127.128.0.99").get()
|
|
|
|
let seckey = PrivateKey.random(ECDSA, rng[]).get()
|
2021-10-25 08:26:32 +00:00
|
|
|
let somePeer = PeerInfo.new(secKey, [someAddr])
|
2020-11-13 03:44:02 +00:00
|
|
|
expect(DialFailedError):
|
2021-02-25 15:24:49 +00:00
|
|
|
discard await switch2.dial(somePeer.peerId, somePeer.addrs, TestCodec)
|
2020-11-13 03:44:02 +00:00
|
|
|
await switch2.stop()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
asyncTest "e2e total connection limits on incoming connections":
|
|
|
|
var switches: seq[Switch]
|
|
|
|
let destSwitch = newStandardSwitch(maxConnections = 3)
|
|
|
|
switches.add(destSwitch)
|
2021-12-03 18:23:12 +00:00
|
|
|
await destSwitch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let destPeerInfo = destSwitch.peerInfo
|
|
|
|
for i in 0..<3:
|
|
|
|
let switch = newStandardSwitch()
|
|
|
|
switches.add(switch)
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check await switch.connect(destPeerInfo.peerId, destPeerInfo.addrs)
|
|
|
|
.withTimeout(1000.millis)
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let switchFail = newStandardSwitch()
|
|
|
|
switches.add(switchFail)
|
2021-12-03 18:23:12 +00:00
|
|
|
await switchFail.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not(await switchFail.connect(destPeerInfo.peerId, destPeerInfo.addrs)
|
|
|
|
.withTimeout(1000.millis))
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
|
|
|
|
|
|
|
asyncTest "e2e total connection limits on incoming connections":
|
|
|
|
var switches: seq[Switch]
|
|
|
|
for i in 0..<3:
|
|
|
|
switches.add(newStandardSwitch())
|
2021-12-03 18:23:12 +00:00
|
|
|
await switches[i].start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let srcSwitch = newStandardSwitch(maxConnections = 3)
|
2021-12-03 18:23:12 +00:00
|
|
|
await srcSwitch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let dstSwitch = newStandardSwitch()
|
2021-12-03 18:23:12 +00:00
|
|
|
await dstSwitch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
for s in switches:
|
2021-02-25 15:24:49 +00:00
|
|
|
check await srcSwitch.connect(s.peerInfo.peerId, s.peerInfo.addrs)
|
|
|
|
.withTimeout(1000.millis)
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
expect TooManyConnectionsError:
|
2021-02-25 15:24:49 +00:00
|
|
|
await srcSwitch.connect(dstSwitch.peerInfo.peerId, dstSwitch.peerInfo.addrs)
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
switches.add(srcSwitch)
|
|
|
|
switches.add(dstSwitch)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
asyncTest "e2e max incoming connection limits":
|
2021-01-28 03:27:33 +00:00
|
|
|
var switches: seq[Switch]
|
|
|
|
let destSwitch = newStandardSwitch(maxIn = 3)
|
|
|
|
switches.add(destSwitch)
|
2021-12-03 18:23:12 +00:00
|
|
|
await destSwitch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let destPeerInfo = destSwitch.peerInfo
|
|
|
|
for i in 0..<3:
|
|
|
|
let switch = newStandardSwitch()
|
|
|
|
switches.add(switch)
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check await switch.connect(destPeerInfo.peerId, destPeerInfo.addrs)
|
|
|
|
.withTimeout(1000.millis)
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let switchFail = newStandardSwitch()
|
|
|
|
switches.add(switchFail)
|
2021-12-03 18:23:12 +00:00
|
|
|
await switchFail.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
2021-02-25 15:24:49 +00:00
|
|
|
check not(await switchFail.connect(destPeerInfo.peerId, destPeerInfo.addrs)
|
|
|
|
.withTimeout(1000.millis))
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
|
|
|
|
|
|
|
asyncTest "e2e max outgoing connection limits":
|
|
|
|
|
|
|
|
var switches: seq[Switch]
|
|
|
|
for i in 0..<3:
|
|
|
|
switches.add(newStandardSwitch())
|
2021-12-03 18:23:12 +00:00
|
|
|
await switches[i].start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let srcSwitch = newStandardSwitch(maxOut = 3)
|
2021-12-03 18:23:12 +00:00
|
|
|
await srcSwitch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
let dstSwitch = newStandardSwitch()
|
2021-12-03 18:23:12 +00:00
|
|
|
await dstSwitch.start()
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
for s in switches:
|
2021-02-25 15:24:49 +00:00
|
|
|
check await srcSwitch.connect(s.peerInfo.peerId, s.peerInfo.addrs)
|
|
|
|
.withTimeout(1000.millis)
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
expect TooManyConnectionsError:
|
2021-02-25 15:24:49 +00:00
|
|
|
await srcSwitch.connect(dstSwitch.peerInfo.peerId, dstSwitch.peerInfo.addrs)
|
2021-01-28 03:27:33 +00:00
|
|
|
|
|
|
|
switches.add(srcSwitch)
|
|
|
|
switches.add(dstSwitch)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
allFutures(switches.mapIt( it.stop() )))
|
2021-06-08 16:55:24 +00:00
|
|
|
|
|
|
|
asyncTest "e2e peer store":
|
|
|
|
let done = newFuture[void]()
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
done.complete()
|
|
|
|
|
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
|
|
|
|
|
|
|
let switch1 = newStandardSwitch()
|
|
|
|
switch1.mount(testProto)
|
|
|
|
|
|
|
|
let switch2 = newStandardSwitch()
|
2021-12-03 18:23:12 +00:00
|
|
|
await switch1.start()
|
|
|
|
await switch2.start()
|
2021-06-08 16:55:24 +00:00
|
|
|
|
|
|
|
let conn = await switch2.dial(switch1.peerInfo.peerId, switch1.peerInfo.addrs, TestCodec)
|
|
|
|
|
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.close()
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
done.wait(5.seconds),
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop())
|
|
|
|
|
|
|
|
check not switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
|
|
|
|
check:
|
2021-09-08 09:07:46 +00:00
|
|
|
switch1.peerStore.addressBook.get(switch2.peerInfo.peerId) == switch2.peerInfo.addrs.toHashSet()
|
|
|
|
switch2.peerStore.addressBook.get(switch1.peerInfo.peerId) == switch1.peerInfo.addrs.toHashSet()
|
2021-06-08 16:55:24 +00:00
|
|
|
|
2021-11-08 12:02:03 +00:00
|
|
|
switch1.peerStore.protoBook.get(switch2.peerInfo.peerId) == switch2.peerInfo.protocols.toHashSet()
|
|
|
|
switch2.peerStore.protoBook.get(switch1.peerInfo.peerId) == switch1.peerInfo.protocols.toHashSet()
|
|
|
|
|
2021-11-24 20:01:12 +00:00
|
|
|
asyncTest "e2e should allow multiple local addresses":
|
|
|
|
proc handle(conn: Connection, proto: string) {.async, gcsafe.} =
|
|
|
|
try:
|
|
|
|
let msg = string.fromBytes(await conn.readLp(1024))
|
|
|
|
check "Hello!" == msg
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
finally:
|
|
|
|
await conn.close()
|
|
|
|
|
|
|
|
let testProto = new TestProto
|
|
|
|
testProto.codec = TestCodec
|
|
|
|
testProto.handler = handle
|
|
|
|
|
|
|
|
let addrs = @[MultiAddress.init("/ip4/127.0.0.1/tcp/0").tryGet(),
|
|
|
|
MultiAddress.init("/ip6/::1/tcp/0").tryGet()]
|
|
|
|
|
|
|
|
let switch1 = newStandardSwitch(
|
|
|
|
addrs = addrs,
|
|
|
|
transportFlags = {ServerFlags.ReuseAddr, ServerFlags.ReusePort})
|
|
|
|
|
|
|
|
switch1.mount(testProto)
|
|
|
|
|
|
|
|
let switch2 = newStandardSwitch()
|
|
|
|
let switch3 = newStandardSwitch(
|
|
|
|
addrs = MultiAddress.init("/ip4/127.0.0.1/tcp/0").tryGet()
|
|
|
|
)
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.start(),
|
|
|
|
switch2.start(),
|
|
|
|
switch3.start())
|
|
|
|
|
|
|
|
check IP4.matchPartial(switch1.peerInfo.addrs[0])
|
|
|
|
check IP6.matchPartial(switch1.peerInfo.addrs[1])
|
|
|
|
|
|
|
|
let conn = await switch2.dial(
|
|
|
|
switch1.peerInfo.peerId,
|
|
|
|
@[switch1.peerInfo.addrs[0]],
|
|
|
|
TestCodec)
|
|
|
|
|
|
|
|
check switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
|
|
|
|
await conn.writeLp("Hello!")
|
|
|
|
check "Hello!" == string.fromBytes(await conn.readLp(1024))
|
|
|
|
await conn.close()
|
|
|
|
|
|
|
|
let connv6 = await switch3.dial(
|
|
|
|
switch1.peerInfo.peerId,
|
|
|
|
@[switch1.peerInfo.addrs[1]],
|
|
|
|
TestCodec)
|
|
|
|
|
|
|
|
check switch1.isConnected(switch3.peerInfo.peerId)
|
|
|
|
check switch3.isConnected(switch1.peerInfo.peerId)
|
|
|
|
|
|
|
|
await connv6.writeLp("Hello!")
|
|
|
|
check "Hello!" == string.fromBytes(await connv6.readLp(1024))
|
|
|
|
await connv6.close()
|
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
switch1.stop(),
|
|
|
|
switch2.stop(),
|
|
|
|
switch3.stop())
|
|
|
|
|
|
|
|
check not switch1.isConnected(switch2.peerInfo.peerId)
|
|
|
|
check not switch2.isConnected(switch1.peerInfo.peerId)
|
|
|
|
|
2021-11-08 12:02:03 +00:00
|
|
|
asyncTest "e2e dial dns4 address":
|
|
|
|
let resolver = MockResolver.new()
|
|
|
|
resolver.ipResponses[("localhost", false)] = @["127.0.0.1"]
|
|
|
|
resolver.ipResponses[("localhost", true)] = @["::1"]
|
|
|
|
|
|
|
|
let
|
|
|
|
srcSwitch = newStandardSwitch(nameResolver = resolver)
|
|
|
|
destSwitch = newStandardSwitch()
|
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await destSwitch.start()
|
|
|
|
await srcSwitch.start()
|
2021-11-08 12:02:03 +00:00
|
|
|
|
|
|
|
let testAddr = MultiAddress.init("/dns4/localhost/").tryGet() &
|
|
|
|
destSwitch.peerInfo.addrs[0][1].tryGet()
|
|
|
|
|
|
|
|
await srcSwitch.connect(destSwitch.peerInfo.peerId, @[testAddr])
|
|
|
|
check srcSwitch.isConnected(destSwitch.peerInfo.peerId)
|
|
|
|
|
|
|
|
await destSwitch.stop()
|
|
|
|
await srcSwitch.stop()
|
|
|
|
|
|
|
|
asyncTest "e2e dial dnsaddr with multiple transports":
|
|
|
|
let resolver = MockResolver.new()
|
|
|
|
|
|
|
|
let
|
|
|
|
wsAddress = MultiAddress.init("/ip4/127.0.0.1/tcp/0/ws").tryGet()
|
|
|
|
tcpAddress = MultiAddress.init("/ip4/127.0.0.1/tcp/0").tryGet()
|
|
|
|
|
|
|
|
srcTcpSwitch = newStandardSwitch(nameResolver = resolver)
|
|
|
|
srcWsSwitch =
|
|
|
|
SwitchBuilder.new()
|
|
|
|
.withAddress(wsAddress)
|
|
|
|
.withRng(crypto.newRng())
|
|
|
|
.withMplex()
|
|
|
|
.withTransport(proc (upgr: Upgrade): Transport = WsTransport.new(upgr))
|
|
|
|
.withNameResolver(resolver)
|
|
|
|
.withNoise()
|
|
|
|
.build()
|
|
|
|
|
|
|
|
destSwitch =
|
|
|
|
SwitchBuilder.new()
|
|
|
|
.withAddresses(@[tcpAddress, wsAddress])
|
|
|
|
.withRng(crypto.newRng())
|
|
|
|
.withMplex()
|
|
|
|
.withTransport(proc (upgr: Upgrade): Transport = WsTransport.new(upgr))
|
|
|
|
.withTcpTransport()
|
|
|
|
.withNoise()
|
|
|
|
.build()
|
|
|
|
|
2021-12-03 18:23:12 +00:00
|
|
|
await destSwitch.start()
|
|
|
|
await srcWsSwitch.start()
|
2021-11-08 12:02:03 +00:00
|
|
|
|
|
|
|
resolver.txtResponses["_dnsaddr.test.io"] = @[
|
2021-11-24 20:01:12 +00:00
|
|
|
"dnsaddr=" & $destSwitch.peerInfo.addrs[0],
|
|
|
|
"dnsaddr=" & $destSwitch.peerInfo.addrs[1]
|
2021-11-08 12:02:03 +00:00
|
|
|
]
|
|
|
|
|
|
|
|
let testAddr = MultiAddress.init("/dnsaddr/test.io/").tryGet()
|
|
|
|
|
|
|
|
await srcTcpSwitch.connect(destSwitch.peerInfo.peerId, @[testAddr])
|
|
|
|
check srcTcpSwitch.isConnected(destSwitch.peerInfo.peerId)
|
|
|
|
|
|
|
|
await srcWsSwitch.connect(destSwitch.peerInfo.peerId, @[testAddr])
|
|
|
|
check srcWsSwitch.isConnected(destSwitch.peerInfo.peerId)
|
|
|
|
|
|
|
|
await destSwitch.stop()
|
|
|
|
await srcWsSwitch.stop()
|
|
|
|
await srcTcpSwitch.stop()
|