mirror of https://github.com/waku-org/nwaku.git
test(rln): Implement some rln unit tests (#2356)
* Fix sanity check location. * Implement some rln tests.
This commit is contained in:
parent
585755858c
commit
f86baa01a7
|
@ -0,0 +1,336 @@
|
||||||
|
{.used.}
|
||||||
|
|
||||||
|
import
|
||||||
|
std/[sequtils, tempfiles],
|
||||||
|
stew/byteutils,
|
||||||
|
stew/shims/net as stewNet,
|
||||||
|
testutils/unittests,
|
||||||
|
chronos,
|
||||||
|
libp2p/switch,
|
||||||
|
libp2p/protocols/pubsub/pubsub
|
||||||
|
|
||||||
|
from std/times import epochTime
|
||||||
|
|
||||||
|
import
|
||||||
|
../../../waku/[
|
||||||
|
node/waku_node,
|
||||||
|
node/peer_manager,
|
||||||
|
waku_core,
|
||||||
|
waku_node,
|
||||||
|
waku_rln_relay,
|
||||||
|
],
|
||||||
|
../waku_store/store_utils,
|
||||||
|
../waku_archive/archive_utils,
|
||||||
|
../testlib/[wakucore, wakunode, testasync, futures],
|
||||||
|
../resources/payloads
|
||||||
|
|
||||||
|
proc setupRln(node: WakuNode, identifier: uint) {.async.} =
|
||||||
|
await node.mountRlnRelay(
|
||||||
|
WakuRlnConfig(
|
||||||
|
rlnRelayDynamic: false,
|
||||||
|
rlnRelayCredIndex: some(identifier),
|
||||||
|
rlnRelayTreePath: genTempPath("rln_tree", "wakunode_" & $identifier),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
proc setupRelayWithRln(
|
||||||
|
node: WakuNode, identifier: uint, pubsubTopics: seq[string]
|
||||||
|
) {.async.} =
|
||||||
|
await node.mountRelay(pubsubTopics)
|
||||||
|
await setupRln(node, identifier)
|
||||||
|
|
||||||
|
proc subscribeCompletionHandler(node: WakuNode, pubsubTopic: string): Future[bool] =
|
||||||
|
var completionFut = newFuture[bool]()
|
||||||
|
proc relayHandler(
|
||||||
|
topic: PubsubTopic, msg: WakuMessage
|
||||||
|
): Future[void] {.async, gcsafe.} =
|
||||||
|
if topic == pubsubTopic:
|
||||||
|
completionFut.complete(true)
|
||||||
|
|
||||||
|
node.subscribe((kind: PubsubSub, topic: pubsubTopic), some(relayHandler))
|
||||||
|
return completionFut
|
||||||
|
|
||||||
|
proc sendRlnMessage(
|
||||||
|
client: WakuNode,
|
||||||
|
pubsubTopic: string,
|
||||||
|
contentTopic: string,
|
||||||
|
completionFuture: Future[bool],
|
||||||
|
payload: seq[byte] = "Hello".toBytes(),
|
||||||
|
): Future[bool] {.async.} =
|
||||||
|
var message = WakuMessage(payload: payload, contentTopic: contentTopic)
|
||||||
|
doAssert(client.wakuRlnRelay.appendRLNProof(message, epochTime()))
|
||||||
|
discard await client.publish(some(pubsubTopic), message)
|
||||||
|
let isCompleted = await completionFuture.withTimeout(FUTURE_TIMEOUT)
|
||||||
|
return isCompleted
|
||||||
|
|
||||||
|
proc sendRlnMessageWithInvalidProof(
|
||||||
|
client: WakuNode,
|
||||||
|
pubsubTopic: string,
|
||||||
|
contentTopic: string,
|
||||||
|
completionFuture: Future[bool],
|
||||||
|
payload: seq[byte] = "Hello".toBytes(),
|
||||||
|
): Future[bool] {.async.} =
|
||||||
|
let
|
||||||
|
extraBytes: seq[byte] = @[byte(1), 2, 3]
|
||||||
|
rateLimitProofRes =
|
||||||
|
client.wakuRlnRelay.groupManager.generateProof(
|
||||||
|
concat(payload, extraBytes),
|
||||||
|
# we add extra bytes to invalidate proof verification against original payload
|
||||||
|
getCurrentEpoch()
|
||||||
|
)
|
||||||
|
rateLimitProof = rateLimitProofRes.get().encode().buffer
|
||||||
|
message =
|
||||||
|
WakuMessage(payload: @payload, contentTopic: contentTopic, proof: rateLimitProof)
|
||||||
|
|
||||||
|
discard await client.publish(some(pubsubTopic), message)
|
||||||
|
let isCompleted = await completionFuture.withTimeout(FUTURE_TIMEOUT)
|
||||||
|
return isCompleted
|
||||||
|
|
||||||
|
suite "Waku RlnRelay - End to End":
|
||||||
|
var
|
||||||
|
pubsubTopic {.threadvar.}: PubsubTopic
|
||||||
|
contentTopic {.threadvar.}: ContentTopic
|
||||||
|
|
||||||
|
var
|
||||||
|
server {.threadvar.}: WakuNode
|
||||||
|
client {.threadvar.}: WakuNode
|
||||||
|
|
||||||
|
var
|
||||||
|
serverRemotePeerInfo {.threadvar.}: RemotePeerInfo
|
||||||
|
clientPeerId {.threadvar.}: PeerId
|
||||||
|
|
||||||
|
asyncSetup:
|
||||||
|
pubsubTopic = DefaultPubsubTopic
|
||||||
|
contentTopic = DefaultContentTopic
|
||||||
|
|
||||||
|
let
|
||||||
|
serverKey = generateSecp256k1Key()
|
||||||
|
clientKey = generateSecp256k1Key()
|
||||||
|
|
||||||
|
server = newTestWakuNode(serverKey, ValidIpAddress.init("0.0.0.0"), Port(0))
|
||||||
|
client = newTestWakuNode(clientKey, ValidIpAddress.init("0.0.0.0"), Port(0))
|
||||||
|
|
||||||
|
await allFutures(server.start(), client.start())
|
||||||
|
|
||||||
|
serverRemotePeerInfo = server.switch.peerInfo.toRemotePeerInfo()
|
||||||
|
clientPeerId = client.switch.peerInfo.toRemotePeerInfo().peerId
|
||||||
|
|
||||||
|
asyncTeardown:
|
||||||
|
await allFutures(client.stop(), server.stop())
|
||||||
|
|
||||||
|
suite "Mount":
|
||||||
|
asyncTest "Can't mount if relay is not mounted":
|
||||||
|
# Given Relay and RLN are not mounted
|
||||||
|
check:
|
||||||
|
server.wakuRelay == nil
|
||||||
|
server.wakuRlnRelay == nil
|
||||||
|
|
||||||
|
# When RlnRelay is mounted
|
||||||
|
let
|
||||||
|
catchRes =
|
||||||
|
catch:
|
||||||
|
await server.setupRln(1)
|
||||||
|
|
||||||
|
# Then Relay and RLN are not mounted,and the process fails
|
||||||
|
check:
|
||||||
|
server.wakuRelay == nil
|
||||||
|
server.wakuRlnRelay == nil
|
||||||
|
catchRes.error()[].msg ==
|
||||||
|
"WakuRelay protocol is not mounted, cannot mount WakuRlnRelay"
|
||||||
|
|
||||||
|
asyncTest "Pubsub topics subscribed before mounting RlnRelay are added to it":
|
||||||
|
# Given the node enables Relay and Rln while subscribing to a pubsub topic
|
||||||
|
await server.setupRelayWithRln(1.uint, @[pubsubTopic])
|
||||||
|
await client.setupRelayWithRln(2.uint, @[pubsubTopic])
|
||||||
|
check:
|
||||||
|
server.wakuRelay != nil
|
||||||
|
server.wakuRlnRelay != nil
|
||||||
|
client.wakuRelay != nil
|
||||||
|
client.wakuRlnRelay != nil
|
||||||
|
|
||||||
|
# And the nodes are connected
|
||||||
|
await client.connectToNodes(@[serverRemotePeerInfo])
|
||||||
|
|
||||||
|
# And the node registers the completion handler
|
||||||
|
var completionFuture = subscribeCompletionHandler(server, pubsubTopic)
|
||||||
|
|
||||||
|
# When the client sends a valid RLN message
|
||||||
|
let
|
||||||
|
isCompleted1 =
|
||||||
|
await sendRlnMessage(client, pubsubTopic, contentTopic, completionFuture)
|
||||||
|
|
||||||
|
# Then the valid RLN message is relayed
|
||||||
|
check:
|
||||||
|
isCompleted1
|
||||||
|
completionFuture.read()
|
||||||
|
|
||||||
|
# When the client sends an invalid RLN message
|
||||||
|
completionFuture = newBoolFuture()
|
||||||
|
let
|
||||||
|
isCompleted2 =
|
||||||
|
await sendRlnMessageWithInvalidProof(
|
||||||
|
client, pubsubTopic, contentTopic, completionFuture
|
||||||
|
)
|
||||||
|
|
||||||
|
# Then the invalid RLN message is not relayed
|
||||||
|
check:
|
||||||
|
not isCompleted2
|
||||||
|
|
||||||
|
asyncTest "Pubsub topics subscribed after mounting RlnRelay are added to it":
|
||||||
|
# Given the node enables Relay and Rln without subscribing to a pubsub topic
|
||||||
|
await server.setupRelayWithRln(1.uint, @[])
|
||||||
|
await client.setupRelayWithRln(2.uint, @[])
|
||||||
|
|
||||||
|
# And the nodes are connected
|
||||||
|
await client.connectToNodes(@[serverRemotePeerInfo])
|
||||||
|
|
||||||
|
# await sleepAsync(FUTURE_TIMEOUT)
|
||||||
|
# And the node registers the completion handler
|
||||||
|
var completionFuture = subscribeCompletionHandler(server, pubsubTopic)
|
||||||
|
|
||||||
|
await sleepAsync(FUTURE_TIMEOUT)
|
||||||
|
# When the client sends a valid RLN message
|
||||||
|
let
|
||||||
|
isCompleted1 =
|
||||||
|
await sendRlnMessage(client, pubsubTopic, contentTopic, completionFuture)
|
||||||
|
|
||||||
|
# Then the valid RLN message is relayed
|
||||||
|
check:
|
||||||
|
isCompleted1
|
||||||
|
completionFuture.read()
|
||||||
|
|
||||||
|
# When the client sends an invalid RLN message
|
||||||
|
completionFuture = newBoolFuture()
|
||||||
|
let
|
||||||
|
isCompleted2 =
|
||||||
|
await sendRlnMessageWithInvalidProof(
|
||||||
|
client, pubsubTopic, contentTopic, completionFuture
|
||||||
|
)
|
||||||
|
|
||||||
|
# Then the invalid RLN message is not relayed
|
||||||
|
check:
|
||||||
|
not isCompleted2
|
||||||
|
|
||||||
|
suite "Analysis of Bandwith Limitations":
|
||||||
|
asyncTest "Valid Payload Sizes":
|
||||||
|
# Given the node enables Relay and Rln while subscribing to a pubsub topic
|
||||||
|
await server.setupRelayWithRln(1.uint, @[pubsubTopic])
|
||||||
|
await client.setupRelayWithRln(2.uint, @[pubsubTopic])
|
||||||
|
|
||||||
|
# And the nodes are connected
|
||||||
|
await client.connectToNodes(@[serverRemotePeerInfo])
|
||||||
|
|
||||||
|
# Register Relay Handler
|
||||||
|
var completionFut = newPushHandlerFuture()
|
||||||
|
proc relayHandler(
|
||||||
|
topic: PubsubTopic, msg: WakuMessage
|
||||||
|
): Future[void] {.async, gcsafe.} =
|
||||||
|
if topic == pubsubTopic:
|
||||||
|
completionFut.complete((topic, msg))
|
||||||
|
|
||||||
|
let subscriptionEvent = (kind: PubsubSub, topic: pubsubTopic)
|
||||||
|
server.subscribe(subscriptionEvent, some(relayHandler))
|
||||||
|
await sleepAsync(FUTURE_TIMEOUT)
|
||||||
|
|
||||||
|
# Generate Messages
|
||||||
|
let
|
||||||
|
epoch = epochTime()
|
||||||
|
payload1b = getByteSequence(1)
|
||||||
|
payload1kib = getByteSequence(1024)
|
||||||
|
overhead: uint64 = 419
|
||||||
|
payload150kib = getByteSequence((150 * 1024) - overhead)
|
||||||
|
payload150kibPlus = getByteSequence((150 * 1024) - overhead + 1)
|
||||||
|
|
||||||
|
var
|
||||||
|
message1b = WakuMessage(payload: @payload1b, contentTopic: contentTopic)
|
||||||
|
message1kib = WakuMessage(payload: @payload1kib, contentTopic: contentTopic)
|
||||||
|
message150kib = WakuMessage(payload: @payload150kib, contentTopic: contentTopic)
|
||||||
|
message151kibPlus =
|
||||||
|
WakuMessage(payload: @payload150kibPlus, contentTopic: contentTopic)
|
||||||
|
|
||||||
|
doAssert(
|
||||||
|
client.wakuRlnRelay.appendRLNProof(message1b, epoch + EpochUnitSeconds * 0)
|
||||||
|
)
|
||||||
|
doAssert(
|
||||||
|
client.wakuRlnRelay.appendRLNProof(message1kib, epoch + EpochUnitSeconds * 1)
|
||||||
|
)
|
||||||
|
doAssert(
|
||||||
|
client.wakuRlnRelay.appendRLNProof(message150kib, epoch + EpochUnitSeconds * 2)
|
||||||
|
)
|
||||||
|
doAssert(
|
||||||
|
client.wakuRlnRelay.appendRLNProof(
|
||||||
|
message151kibPlus, epoch + EpochUnitSeconds * 3
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
# When sending the 1B message
|
||||||
|
discard await client.publish(some(pubsubTopic), message1b)
|
||||||
|
discard await completionFut.withTimeout(FUTURE_TIMEOUT_LONG)
|
||||||
|
|
||||||
|
# Then the message is relayed
|
||||||
|
check completionFut.read() == (pubsubTopic, message1b)
|
||||||
|
# When sending the 1KiB message
|
||||||
|
completionFut = newPushHandlerFuture() # Reset Future
|
||||||
|
discard await client.publish(some(pubsubTopic), message1kib)
|
||||||
|
discard await completionFut.withTimeout(FUTURE_TIMEOUT_LONG)
|
||||||
|
|
||||||
|
# Then the message is relayed
|
||||||
|
check completionFut.read() == (pubsubTopic, message1kib)
|
||||||
|
|
||||||
|
# When sending the 150KiB message
|
||||||
|
completionFut = newPushHandlerFuture() # Reset Future
|
||||||
|
discard await client.publish(some(pubsubTopic), message150kib)
|
||||||
|
discard await completionFut.withTimeout(FUTURE_TIMEOUT_LONG)
|
||||||
|
|
||||||
|
# Then the message is relayed
|
||||||
|
check completionFut.read() == (pubsubTopic, message150kib)
|
||||||
|
|
||||||
|
# When sending the 150KiB plus message
|
||||||
|
completionFut = newPushHandlerFuture() # Reset Future
|
||||||
|
discard await client.publish(some(pubsubTopic), message151kibPlus)
|
||||||
|
|
||||||
|
# Then the message is not relayed
|
||||||
|
check not await completionFut.withTimeout(FUTURE_TIMEOUT_LONG)
|
||||||
|
|
||||||
|
asyncTest "Invalid Payload Sizes":
|
||||||
|
# Given the node enables Relay and Rln while subscribing to a pubsub topic
|
||||||
|
await server.setupRelayWithRln(1.uint, @[pubsubTopic])
|
||||||
|
await client.setupRelayWithRln(2.uint, @[pubsubTopic])
|
||||||
|
|
||||||
|
# And the nodes are connected
|
||||||
|
await client.connectToNodes(@[serverRemotePeerInfo])
|
||||||
|
|
||||||
|
# Register Relay Handler
|
||||||
|
var completionFut = newPushHandlerFuture()
|
||||||
|
proc relayHandler(
|
||||||
|
topic: PubsubTopic, msg: WakuMessage
|
||||||
|
): Future[void] {.async, gcsafe.} =
|
||||||
|
if topic == pubsubTopic:
|
||||||
|
completionFut.complete((topic, msg))
|
||||||
|
|
||||||
|
let subscriptionEvent = (kind: PubsubSub, topic: pubsubTopic)
|
||||||
|
server.subscribe(subscriptionEvent, some(relayHandler))
|
||||||
|
await sleepAsync(FUTURE_TIMEOUT)
|
||||||
|
|
||||||
|
# Generate Messages
|
||||||
|
let
|
||||||
|
epoch = epochTime()
|
||||||
|
overhead: uint64 = 419
|
||||||
|
payload150kibPlus = getByteSequence((150 * 1024) - overhead + 1)
|
||||||
|
|
||||||
|
var
|
||||||
|
message151kibPlus =
|
||||||
|
WakuMessage(payload: @payload150kibPlus, contentTopic: contentTopic)
|
||||||
|
|
||||||
|
doAssert(
|
||||||
|
client.wakuRlnRelay.appendRLNProof(
|
||||||
|
message151kibPlus, epoch + EpochUnitSeconds * 3
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
# When sending the 150KiB plus message
|
||||||
|
completionFut = newPushHandlerFuture() # Reset Future
|
||||||
|
discard await client.publish(some(pubsubTopic), message151kibPlus)
|
||||||
|
|
||||||
|
# Then the message is not relayed
|
||||||
|
check not await completionFut.withTimeout(FUTURE_TIMEOUT_LONG)
|
|
@ -1,14 +1,10 @@
|
||||||
import
|
import chronos
|
||||||
chronos
|
|
||||||
|
|
||||||
import
|
import ../../../waku/[waku_core/message, waku_store]
|
||||||
../../../waku/[
|
|
||||||
waku_core/message,
|
|
||||||
waku_store
|
|
||||||
]
|
|
||||||
|
|
||||||
|
const
|
||||||
let FUTURE_TIMEOUT* = 1.seconds
|
FUTURE_TIMEOUT* = 1.seconds
|
||||||
|
FUTURE_TIMEOUT_LONG* = 10.seconds
|
||||||
|
|
||||||
proc newPushHandlerFuture*(): Future[(string, WakuMessage)] =
|
proc newPushHandlerFuture*(): Future[(string, WakuMessage)] =
|
||||||
newFuture[(string, WakuMessage)]()
|
newFuture[(string, WakuMessage)]()
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
import ../../../../waku/waku_rln_relay/rln/rln_interface
|
||||||
|
|
||||||
|
proc `==`*(a: Buffer, b: seq[uint8]): bool =
|
||||||
|
if a.len != uint(b.len):
|
||||||
|
return false
|
||||||
|
|
||||||
|
let bufferArray = cast[ptr UncheckedArray[uint8]](a.ptr)
|
||||||
|
for i in 0..<b.len:
|
||||||
|
if bufferArray[i] != b[i]:
|
||||||
|
return false
|
||||||
|
return true
|
|
@ -0,0 +1,17 @@
|
||||||
|
import testutils/unittests
|
||||||
|
|
||||||
|
import ../../../../waku/waku_rln_relay/rln/rln_interface, ./buffer_utils
|
||||||
|
|
||||||
|
suite "Buffer":
|
||||||
|
suite "toBuffer":
|
||||||
|
test "valid":
|
||||||
|
# Given
|
||||||
|
let bytes: seq[byte] = @[0x01, 0x02, 0x03]
|
||||||
|
|
||||||
|
# When
|
||||||
|
let buffer = bytes.toBuffer()
|
||||||
|
|
||||||
|
# Then
|
||||||
|
let expectedBuffer: seq[uint8] = @[1, 2, 3]
|
||||||
|
check:
|
||||||
|
buffer == expectedBuffer
|
|
@ -0,0 +1,131 @@
|
||||||
|
import
|
||||||
|
std/options,
|
||||||
|
testutils/unittests,
|
||||||
|
chronicles,
|
||||||
|
chronos,
|
||||||
|
stew/shims/net as stewNet,
|
||||||
|
eth/keys,
|
||||||
|
bearssl,
|
||||||
|
stew/[results],
|
||||||
|
metrics,
|
||||||
|
metrics/chronos_httpserver
|
||||||
|
|
||||||
|
import
|
||||||
|
../../../waku/[waku_rln_relay, waku_rln_relay/rln, waku_rln_relay/rln/wrappers],
|
||||||
|
./waku_rln_relay_utils,
|
||||||
|
../../testlib/[simple_mock]
|
||||||
|
|
||||||
|
const Empty32Array = default(array[32, byte])
|
||||||
|
|
||||||
|
proc valid(x: seq[byte]): bool =
|
||||||
|
if x.len != 32:
|
||||||
|
error "Length should be 32", length = x.len
|
||||||
|
return false
|
||||||
|
|
||||||
|
if x == Empty32Array:
|
||||||
|
error "Should not be empty array", array = x
|
||||||
|
return false
|
||||||
|
|
||||||
|
return true
|
||||||
|
|
||||||
|
suite "membershipKeyGen":
|
||||||
|
var rlnRes {.threadvar.}: RLNResult
|
||||||
|
|
||||||
|
setup:
|
||||||
|
rlnRes = createRLNInstanceWrapper()
|
||||||
|
|
||||||
|
test "ok":
|
||||||
|
# Given we generate valid membership keys
|
||||||
|
let identityCredentialsRes = membershipKeyGen(rlnRes.get())
|
||||||
|
|
||||||
|
# Then it contains valid identity credentials
|
||||||
|
let identityCredentials = identityCredentialsRes.get()
|
||||||
|
|
||||||
|
check:
|
||||||
|
identityCredentials.idTrapdoor.valid()
|
||||||
|
identityCredentials.idNullifier.valid()
|
||||||
|
identityCredentials.idSecretHash.valid()
|
||||||
|
identityCredentials.idCommitment.valid()
|
||||||
|
|
||||||
|
test "done is false":
|
||||||
|
# Given the key_gen function fails
|
||||||
|
let backup = key_gen
|
||||||
|
mock(key_gen):
|
||||||
|
proc keyGenMock(ctx: ptr RLN, output_buffer: ptr Buffer): bool =
|
||||||
|
return false
|
||||||
|
|
||||||
|
keyGenMock
|
||||||
|
|
||||||
|
# When we generate the membership keys
|
||||||
|
let identityCredentialsRes = membershipKeyGen(rlnRes.get())
|
||||||
|
|
||||||
|
# Then it fails
|
||||||
|
check:
|
||||||
|
identityCredentialsRes.error() == "error in key generation"
|
||||||
|
|
||||||
|
# Cleanup
|
||||||
|
mock(key_gen):
|
||||||
|
backup
|
||||||
|
|
||||||
|
test "generatedKeys length is not 128":
|
||||||
|
# Given the key_gen function succeeds with wrong values
|
||||||
|
let backup = key_gen
|
||||||
|
mock(key_gen):
|
||||||
|
proc keyGenMock(ctx: ptr RLN, output_buffer: ptr Buffer): bool =
|
||||||
|
echo "# RUNNING MOCK"
|
||||||
|
output_buffer.len = 0
|
||||||
|
output_buffer.ptr = cast[ptr uint8](newSeq[byte](0))
|
||||||
|
return true
|
||||||
|
|
||||||
|
keyGenMock
|
||||||
|
|
||||||
|
# When we generate the membership keys
|
||||||
|
let identityCredentialsRes = membershipKeyGen(rlnRes.get())
|
||||||
|
|
||||||
|
# Then it fails
|
||||||
|
check:
|
||||||
|
identityCredentialsRes.error() == "keysBuffer is of invalid length"
|
||||||
|
|
||||||
|
# Cleanup
|
||||||
|
mock(key_gen):
|
||||||
|
backup
|
||||||
|
|
||||||
|
suite "RlnConfig":
|
||||||
|
suite "createRLNInstance":
|
||||||
|
test "ok":
|
||||||
|
# When we create the RLN instance
|
||||||
|
let rlnRes: RLNResult = createRLNInstance(15, "my.db")
|
||||||
|
|
||||||
|
# Then it succeeds
|
||||||
|
check:
|
||||||
|
rlnRes.isOk()
|
||||||
|
|
||||||
|
test "default":
|
||||||
|
# When we create the RLN instance
|
||||||
|
let rlnRes: RLNResult = createRLNInstance()
|
||||||
|
|
||||||
|
# Then it succeeds
|
||||||
|
check:
|
||||||
|
rlnRes.isOk()
|
||||||
|
|
||||||
|
test "new_circuit fails":
|
||||||
|
# Given the new_circuit function fails
|
||||||
|
let backup = new_circuit
|
||||||
|
mock(new_circuit):
|
||||||
|
proc newCircuitMock(
|
||||||
|
tree_height: uint, input_buffer: ptr Buffer, ctx: ptr (ptr RLN)
|
||||||
|
): bool =
|
||||||
|
return false
|
||||||
|
|
||||||
|
newCircuitMock
|
||||||
|
|
||||||
|
# When we create the RLN instance
|
||||||
|
let rlnRes: RLNResult = createRLNInstance(15, "my.db")
|
||||||
|
|
||||||
|
# Then it fails
|
||||||
|
check:
|
||||||
|
rlnRes.error() == "error in parameters generation"
|
||||||
|
|
||||||
|
# Cleanup
|
||||||
|
mock(new_circuit):
|
||||||
|
backup
|
|
@ -0,0 +1,6 @@
|
||||||
|
import std/tempfiles
|
||||||
|
|
||||||
|
import ../../../waku/waku_rln_relay/[rln, protocol_types]
|
||||||
|
|
||||||
|
proc createRLNInstanceWrapper*(): RLNResult =
|
||||||
|
return createRlnInstance(tree_path = genTempPath("rln_tree", "waku_rln_relay"))
|
|
@ -16,10 +16,8 @@ import
|
||||||
../../../waku/waku_rln_relay/rln,
|
../../../waku/waku_rln_relay/rln,
|
||||||
../../../waku/waku_rln_relay/protocol_metrics,
|
../../../waku/waku_rln_relay/protocol_metrics,
|
||||||
../../../waku/waku_keystore,
|
../../../waku/waku_keystore,
|
||||||
../testlib/common
|
../testlib/common,
|
||||||
|
./rln/waku_rln_relay_utils
|
||||||
proc createRLNInstanceWrapper(): RLNResult =
|
|
||||||
return createRlnInstance(tree_path = genTempPath("rln_tree", "waku_rln_relay"))
|
|
||||||
|
|
||||||
suite "Waku rln relay":
|
suite "Waku rln relay":
|
||||||
|
|
||||||
|
|
|
@ -34,10 +34,11 @@ proc membershipKeyGen*(ctxPtr: ptr RLN): RlnRelayResult[IdentityCredential] =
|
||||||
if(done == false):
|
if(done == false):
|
||||||
return err("error in key generation")
|
return err("error in key generation")
|
||||||
|
|
||||||
|
if (keysBuffer.len != 4*32):
|
||||||
|
return err("keysBuffer is of invalid length")
|
||||||
|
|
||||||
var generatedKeys = cast[ptr array[4*32, byte]](keysBufferPtr.`ptr`)[]
|
var generatedKeys = cast[ptr array[4*32, byte]](keysBufferPtr.`ptr`)[]
|
||||||
# the public and secret keys together are 64 bytes
|
# the public and secret keys together are 64 bytes
|
||||||
if (generatedKeys.len != 4*32):
|
|
||||||
return err("generated keys are of invalid length")
|
|
||||||
|
|
||||||
# TODO define a separate proc to decode the generated keys to the secret and public components
|
# TODO define a separate proc to decode the generated keys to the secret and public components
|
||||||
var
|
var
|
||||||
|
|
Loading…
Reference in New Issue