mirror of https://github.com/vacp2p/nim-libp2p.git
128 lines
4.2 KiB
Nim
128 lines
4.2 KiB
Nim
import unittest2
|
|
|
|
{.used.}
|
|
|
|
import options, strutils
|
|
import stew/byteutils
|
|
import ../../libp2p/[peerid, peerinfo,
|
|
crypto/crypto as crypto,
|
|
protocols/pubsub/errors,
|
|
protocols/pubsub/rpc/message,
|
|
protocols/pubsub/rpc/messages]
|
|
|
|
let rng = newRng()
|
|
|
|
suite "Message":
|
|
test "signature":
|
|
var seqno = 11'u64
|
|
let
|
|
peer = PeerInfo.new(PrivateKey.random(ECDSA, rng[]).get())
|
|
msg = Message.init(some(peer), @[], "topic", some(seqno), sign = true)
|
|
|
|
check verify(msg)
|
|
|
|
test "defaultMsgIdProvider success":
|
|
let
|
|
seqno = 11'u64
|
|
pkHex =
|
|
"""08011240B9EA7F0357B5C1247E4FCB5AD09C46818ECB07318CA84711875F4C6C
|
|
E6B946186A4EB44E0D714B2A2D48263D75CF52D30BEF9D9AE2A9FEB7DAF1775F
|
|
E731065A"""
|
|
seckey = PrivateKey.init(crypto.fromHex(stripSpaces(pkHex)))
|
|
.expect("valid private key bytes")
|
|
peer = PeerInfo.new(seckey)
|
|
msg = Message.init(some(peer), @[], "topic", some(seqno), sign = true)
|
|
msgIdResult = msg.defaultMsgIdProvider()
|
|
|
|
check:
|
|
msgIdResult.isOk
|
|
string.fromBytes(msgIdResult.get) ==
|
|
"000000000000000b12D3KooWGyLzSt9g4U9TdHYDvVWAs5Ht4WrocgoyqPxxvnqAL8qw"
|
|
|
|
test "defaultMsgIdProvider error - no source peer id":
|
|
let
|
|
seqno = 11'u64
|
|
pkHex =
|
|
"""08011240B9EA7F0357B5C1247E4FCB5AD09C46818ECB07318CA84711875F4C6C
|
|
E6B946186A4EB44E0D714B2A2D48263D75CF52D30BEF9D9AE2A9FEB7DAF1775F
|
|
E731065A"""
|
|
seckey = PrivateKey.init(crypto.fromHex(stripSpaces(pkHex)))
|
|
.expect("valid private key bytes")
|
|
peer = PeerInfo.new(seckey)
|
|
|
|
var msg = Message.init(peer.some, @[], "topic", some(seqno), sign = true)
|
|
msg.fromPeer = PeerId()
|
|
let msgIdResult = msg.defaultMsgIdProvider()
|
|
|
|
check:
|
|
msgIdResult.isErr
|
|
msgIdResult.error == ValidationResult.Reject
|
|
|
|
test "defaultMsgIdProvider error - no source seqno":
|
|
let
|
|
pkHex =
|
|
"""08011240B9EA7F0357B5C1247E4FCB5AD09C46818ECB07318CA84711875F4C6C
|
|
E6B946186A4EB44E0D714B2A2D48263D75CF52D30BEF9D9AE2A9FEB7DAF1775F
|
|
E731065A"""
|
|
seckey = PrivateKey.init(crypto.fromHex(stripSpaces(pkHex)))
|
|
.expect("valid private key bytes")
|
|
peer = PeerInfo.new(seckey)
|
|
msg = Message.init(some(peer), @[], "topic", uint64.none, sign = true)
|
|
msgIdResult = msg.defaultMsgIdProvider()
|
|
|
|
check:
|
|
msgIdResult.isErr
|
|
msgIdResult.error == ValidationResult.Reject
|
|
|
|
test "byteSize for RPCMsg":
|
|
var msg = Message(
|
|
fromPeer: PeerId(data: @['a'.byte, 'b'.byte]), # 2 bytes
|
|
data: @[1'u8, 2, 3], # 3 bytes
|
|
seqno: @[4'u8, 5], # 2 bytes
|
|
signature: @['c'.byte, 'd'.byte], # 2 bytes
|
|
key: @[6'u8, 7], # 2 bytes
|
|
topicIds: @["abc", "defgh"] # 3 + 5 = 8 bytes
|
|
)
|
|
|
|
var peerInfo = PeerInfoMsg(
|
|
peerId: PeerId(data: @['e'.byte]), # 1 byte
|
|
signedPeerRecord: @['f'.byte, 'g'.byte] # 2 bytes
|
|
)
|
|
|
|
var controlIHave = ControlIHave(
|
|
topicId: "ijk", # 3 bytes
|
|
messageIds: @[ @['l'.byte], @['m'.byte, 'n'.byte] ] # 1 + 2 = 3 bytes
|
|
)
|
|
|
|
var controlIWant = ControlIWant(
|
|
messageIds: @[ @['o'.byte, 'p'.byte], @['q'.byte] ] # 2 + 1 = 3 bytes
|
|
)
|
|
|
|
var controlGraft = ControlGraft(
|
|
topicId: "rst" # 3 bytes
|
|
)
|
|
|
|
var controlPrune = ControlPrune(
|
|
topicId: "uvw", # 3 bytes
|
|
peers: @[peerInfo, peerInfo], # (1 + 2) * 2 = 6 bytes
|
|
backoff: 12345678 # 8 bytes for uint64
|
|
)
|
|
|
|
var control = ControlMessage(
|
|
ihave: @[controlIHave, controlIHave], # (3 + 3) * 2 = 12 bytes
|
|
iwant: @[controlIWant], # 3 bytes
|
|
graft: @[controlGraft], # 3 bytes
|
|
prune: @[controlPrune], # 3 + 6 + 8 = 17 bytes
|
|
idontwant: @[controlIWant] # 3 bytes
|
|
)
|
|
|
|
var rpcMsg = RPCMsg(
|
|
subscriptions: @[SubOpts(subscribe: true, topic: "a".repeat(12)), SubOpts(subscribe: false, topic: "b".repeat(14))], # 1 + 12 + 1 + 14 = 28 bytes
|
|
messages: @[msg, msg], # 19 * 2 = 38 bytes
|
|
ping: @[1'u8, 2], # 2 bytes
|
|
pong: @[3'u8, 4], # 2 bytes
|
|
control: some(control) # 12 + 3 + 3 + 17 + 3 = 38 bytes
|
|
)
|
|
|
|
check byteSize(rpcMsg) == 28 + 38 + 2 + 2 + 38 # Total: 108 bytes
|