github.com/FUSIONFoundation/efsn@v3.6.2-0.20200916075423-dbb5dd5d2cc7+incompatible/whisper/whisperv6/peer_test.go (about)

     1  // Copyright 2016 The go-ethereum Authors
     2  // This file is part of the go-ethereum library.
     3  //
     4  // The go-ethereum library is free software: you can redistribute it and/or modify
     5  // it under the terms of the GNU Lesser General Public License as published by
     6  // the Free Software Foundation, either version 3 of the License, or
     7  // (at your option) any later version.
     8  //
     9  // The go-ethereum library is distributed in the hope that it will be useful,
    10  // but WITHOUT ANY WARRANTY; without even the implied warranty of
    11  // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    12  // GNU Lesser General Public License for more details.
    13  //
    14  // You should have received a copy of the GNU Lesser General Public License
    15  // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
    16  
    17  package whisperv6
    18  
    19  import (
    20  	"bytes"
    21  	"crypto/ecdsa"
    22  	"fmt"
    23  	mrand "math/rand"
    24  	"sync"
    25  	"sync/atomic"
    26  	"testing"
    27  	"time"
    28  
    29  	"net"
    30  
    31  	"github.com/FusionFoundation/efsn/common"
    32  	"github.com/FusionFoundation/efsn/common/hexutil"
    33  	"github.com/FusionFoundation/efsn/crypto"
    34  	"github.com/FusionFoundation/efsn/p2p"
    35  	"github.com/FusionFoundation/efsn/p2p/discover"
    36  	"github.com/FusionFoundation/efsn/p2p/nat"
    37  	"github.com/FusionFoundation/efsn/rlp"
    38  )
    39  
    40  var keys = []string{
    41  	"d49dcf37238dc8a7aac57dc61b9fee68f0a97f062968978b9fafa7d1033d03a9",
    42  	"73fd6143c48e80ed3c56ea159fe7494a0b6b393a392227b422f4c3e8f1b54f98",
    43  	"119dd32adb1daa7a4c7bf77f847fb28730785aa92947edf42fdd997b54de40dc",
    44  	"deeda8709dea935bb772248a3144dea449ffcc13e8e5a1fd4ef20ce4e9c87837",
    45  	"5bd208a079633befa349441bdfdc4d85ba9bd56081525008380a63ac38a407cf",
    46  	"1d27fb4912002d58a2a42a50c97edb05c1b3dffc665dbaa42df1fe8d3d95c9b5",
    47  	"15def52800c9d6b8ca6f3066b7767a76afc7b611786c1276165fbc61636afb68",
    48  	"51be6ab4b2dc89f251ff2ace10f3c1cc65d6855f3e083f91f6ff8efdfd28b48c",
    49  	"ef1ef7441bf3c6419b162f05da6037474664f198b58db7315a6f4de52414b4a0",
    50  	"09bdf6985aabc696dc1fbeb5381aebd7a6421727343872eb2fadfc6d82486fd9",
    51  	"15d811bf2e01f99a224cdc91d0cf76cea08e8c67905c16fee9725c9be71185c4",
    52  	"2f83e45cf1baaea779789f755b7da72d8857aeebff19362dd9af31d3c9d14620",
    53  	"73f04e34ac6532b19c2aae8f8e52f38df1ac8f5cd10369f92325b9b0494b0590",
    54  	"1e2e07b69e5025537fb73770f483dc8d64f84ae3403775ef61cd36e3faf162c1",
    55  	"8963d9bbb3911aac6d30388c786756b1c423c4fbbc95d1f96ddbddf39809e43a",
    56  	"0422da85abc48249270b45d8de38a4cc3c02032ede1fcf0864a51092d58a2f1f",
    57  	"8ae5c15b0e8c7cade201fdc149831aa9b11ff626a7ffd27188886cc108ad0fa8",
    58  	"acd8f5a71d4aecfcb9ad00d32aa4bcf2a602939b6a9dd071bab443154184f805",
    59  	"a285a922125a7481600782ad69debfbcdb0316c1e97c267aff29ef50001ec045",
    60  	"28fd4eee78c6cd4bf78f39f8ab30c32c67c24a6223baa40e6f9c9a0e1de7cef5",
    61  	"c5cca0c9e6f043b288c6f1aef448ab59132dab3e453671af5d0752961f013fc7",
    62  	"46df99b051838cb6f8d1b73f232af516886bd8c4d0ee07af9a0a033c391380fd",
    63  	"c6a06a53cbaadbb432884f36155c8f3244e244881b5ee3e92e974cfa166d793f",
    64  	"783b90c75c63dc72e2f8d11b6f1b4de54d63825330ec76ee8db34f06b38ea211",
    65  	"9450038f10ca2c097a8013e5121b36b422b95b04892232f930a29292d9935611",
    66  	"e215e6246ed1cfdcf7310d4d8cdbe370f0d6a8371e4eb1089e2ae05c0e1bc10f",
    67  	"487110939ed9d64ebbc1f300adeab358bc58875faf4ca64990fbd7fe03b78f2b",
    68  	"824a70ea76ac81366da1d4f4ac39de851c8ac49dca456bb3f0a186ceefa269a5",
    69  	"ba8f34fa40945560d1006a328fe70c42e35cc3d1017e72d26864cd0d1b150f15",
    70  	"30a5dfcfd144997f428901ea88a43c8d176b19c79dde54cc58eea001aa3d246c",
    71  	"de59f7183aca39aa245ce66a05245fecfc7e2c75884184b52b27734a4a58efa2",
    72  	"92629e2ff5f0cb4f5f08fffe0f64492024d36f045b901efb271674b801095c5a",
    73  	"7184c1701569e3a4c4d2ddce691edd983b81e42e09196d332e1ae2f1e062cff4",
    74  }
    75  
    76  type TestData struct {
    77  	started int64
    78  	counter [NumNodes]int
    79  	mutex   sync.RWMutex
    80  }
    81  
    82  type TestNode struct {
    83  	shh     *Whisper
    84  	id      *ecdsa.PrivateKey
    85  	server  *p2p.Server
    86  	filerID string
    87  }
    88  
    89  const NumNodes = 8 // must not exceed the number of keys (32)
    90  
    91  var result TestData
    92  var nodes [NumNodes]*TestNode
    93  var sharedKey = hexutil.MustDecode("0x03ca634cae0d49acb401d8a4c6b6fe8c55b70d115bf400769cc1400f3258cd31")
    94  var wrongKey = hexutil.MustDecode("0xf91156714d7ec88d3edc1c652c2181dbb3044e8771c683f3b30d33c12b986b11")
    95  var sharedTopic = TopicType{0xF, 0x1, 0x2, 0}
    96  var wrongTopic = TopicType{0, 0, 0, 0}
    97  var expectedMessage = []byte("per aspera ad astra")
    98  var unexpectedMessage = []byte("per rectum ad astra")
    99  var masterBloomFilter []byte
   100  var masterPow = 0.00000001
   101  var round = 1
   102  var debugMode = false
   103  var prevTime time.Time
   104  var cntPrev int
   105  
   106  func TestSimulation(t *testing.T) {
   107  	// create a chain of whisper nodes,
   108  	// installs the filters with shared (predefined) parameters
   109  	initialize(t)
   110  
   111  	// each node sends one random (not decryptable) message
   112  	for i := 0; i < NumNodes; i++ {
   113  		sendMsg(t, false, i)
   114  	}
   115  
   116  	// node #0 sends one expected (decryptable) message
   117  	sendMsg(t, true, 0)
   118  
   119  	// check if each node have received and decrypted exactly one message
   120  	checkPropagation(t, true)
   121  
   122  	// check if Status message was correctly decoded
   123  	checkBloomFilterExchange(t)
   124  	checkPowExchange(t)
   125  
   126  	// send new pow and bloom exchange messages
   127  	resetParams(t)
   128  
   129  	// node #1 sends one expected (decryptable) message
   130  	sendMsg(t, true, 1)
   131  
   132  	// check if each node (except node #0) have received and decrypted exactly one message
   133  	checkPropagation(t, false)
   134  
   135  	// check if corresponding protocol-level messages were correctly decoded
   136  	checkPowExchangeForNodeZero(t)
   137  	checkBloomFilterExchange(t)
   138  
   139  	stopServers()
   140  }
   141  
   142  func resetParams(t *testing.T) {
   143  	// change pow only for node zero
   144  	masterPow = 7777777.0
   145  	nodes[0].shh.SetMinimumPoW(masterPow)
   146  
   147  	// change bloom for all nodes
   148  	masterBloomFilter = TopicToBloom(sharedTopic)
   149  	for i := 0; i < NumNodes; i++ {
   150  		nodes[i].shh.SetBloomFilter(masterBloomFilter)
   151  	}
   152  
   153  	round++
   154  }
   155  
   156  func initBloom(t *testing.T) {
   157  	masterBloomFilter = make([]byte, BloomFilterSize)
   158  	_, err := mrand.Read(masterBloomFilter)
   159  	if err != nil {
   160  		t.Fatalf("rand failed: %s.", err)
   161  	}
   162  
   163  	msgBloom := TopicToBloom(sharedTopic)
   164  	masterBloomFilter = addBloom(masterBloomFilter, msgBloom)
   165  	for i := 0; i < 32; i++ {
   166  		masterBloomFilter[i] = 0xFF
   167  	}
   168  
   169  	if !BloomFilterMatch(masterBloomFilter, msgBloom) {
   170  		t.Fatalf("bloom mismatch on initBloom.")
   171  	}
   172  }
   173  
   174  func initialize(t *testing.T) {
   175  	initBloom(t)
   176  
   177  	var err error
   178  
   179  	for i := 0; i < NumNodes; i++ {
   180  		var node TestNode
   181  		b := make([]byte, BloomFilterSize)
   182  		copy(b, masterBloomFilter)
   183  		node.shh = New(&DefaultConfig)
   184  		node.shh.SetMinimumPoW(masterPow)
   185  		node.shh.SetBloomFilter(b)
   186  		if !bytes.Equal(node.shh.BloomFilter(), masterBloomFilter) {
   187  			t.Fatalf("bloom mismatch on init.")
   188  		}
   189  		node.shh.Start(nil)
   190  		topics := make([]TopicType, 0)
   191  		topics = append(topics, sharedTopic)
   192  		f := Filter{KeySym: sharedKey}
   193  		f.Topics = [][]byte{topics[0][:]}
   194  		node.filerID, err = node.shh.Subscribe(&f)
   195  		if err != nil {
   196  			t.Fatalf("failed to install the filter: %s.", err)
   197  		}
   198  		node.id, err = crypto.HexToECDSA(keys[i])
   199  		if err != nil {
   200  			t.Fatalf("failed convert the key: %s.", keys[i])
   201  		}
   202  		name := common.MakeName("whisper-go", "2.0")
   203  
   204  		node.server = &p2p.Server{
   205  			Config: p2p.Config{
   206  				PrivateKey: node.id,
   207  				MaxPeers:   NumNodes/2 + 1,
   208  				Name:       name,
   209  				Protocols:  node.shh.Protocols(),
   210  				ListenAddr: "127.0.0.1:0",
   211  				NAT:        nat.Any(),
   212  			},
   213  		}
   214  
   215  		go startServer(t, node.server)
   216  
   217  		nodes[i] = &node
   218  	}
   219  
   220  	waitForServersToStart(t)
   221  
   222  	for i := 0; i < NumNodes; i++ {
   223  		for j := 0; j < i; j++ {
   224  			peerNodeId := nodes[j].id
   225  			address, _ := net.ResolveTCPAddr("tcp", nodes[j].server.ListenAddr)
   226  			peerPort := uint16(address.Port)
   227  			peerNode := discover.PubkeyID(&peerNodeId.PublicKey)
   228  			peer := discover.NewNode(peerNode, address.IP, peerPort, peerPort)
   229  			nodes[i].server.AddPeer(peer)
   230  		}
   231  	}
   232  }
   233  
   234  func startServer(t *testing.T, s *p2p.Server) {
   235  	err := s.Start()
   236  	if err != nil {
   237  		t.Fatalf("failed to start the fisrt server.")
   238  	}
   239  
   240  	atomic.AddInt64(&result.started, 1)
   241  }
   242  
   243  func stopServers() {
   244  	for i := 0; i < NumNodes; i++ {
   245  		n := nodes[i]
   246  		if n != nil {
   247  			n.shh.Unsubscribe(n.filerID)
   248  			n.shh.Stop()
   249  			n.server.Stop()
   250  		}
   251  	}
   252  }
   253  
   254  func checkPropagation(t *testing.T, includingNodeZero bool) {
   255  	if t.Failed() {
   256  		return
   257  	}
   258  
   259  	prevTime = time.Now()
   260  	// (cycle * iterations) should not exceed 50 seconds, since TTL=50
   261  	const cycle = 200 // time in milliseconds
   262  	const iterations = 250
   263  
   264  	first := 0
   265  	if !includingNodeZero {
   266  		first = 1
   267  	}
   268  
   269  	for j := 0; j < iterations; j++ {
   270  		for i := first; i < NumNodes; i++ {
   271  			f := nodes[i].shh.GetFilter(nodes[i].filerID)
   272  			if f == nil {
   273  				t.Fatalf("failed to get filterId %s from node %d, round %d.", nodes[i].filerID, i, round)
   274  			}
   275  
   276  			mail := f.Retrieve()
   277  			validateMail(t, i, mail)
   278  
   279  			if isTestComplete() {
   280  				checkTestStatus()
   281  				return
   282  			}
   283  		}
   284  
   285  		checkTestStatus()
   286  		time.Sleep(cycle * time.Millisecond)
   287  	}
   288  
   289  	if !includingNodeZero {
   290  		f := nodes[0].shh.GetFilter(nodes[0].filerID)
   291  		if f != nil {
   292  			t.Fatalf("node zero received a message with low PoW.")
   293  		}
   294  	}
   295  
   296  	t.Fatalf("Test was not complete (%d round): timeout %d seconds. nodes=%v", round, iterations*cycle/1000, nodes)
   297  }
   298  
   299  func validateMail(t *testing.T, index int, mail []*ReceivedMessage) {
   300  	var cnt int
   301  	for _, m := range mail {
   302  		if bytes.Equal(m.Payload, expectedMessage) {
   303  			cnt++
   304  		}
   305  	}
   306  
   307  	if cnt == 0 {
   308  		// no messages received yet: nothing is wrong
   309  		return
   310  	}
   311  	if cnt > 1 {
   312  		t.Fatalf("node %d received %d.", index, cnt)
   313  	}
   314  
   315  	if cnt == 1 {
   316  		result.mutex.Lock()
   317  		defer result.mutex.Unlock()
   318  		result.counter[index] += cnt
   319  		if result.counter[index] > 1 {
   320  			t.Fatalf("node %d accumulated %d.", index, result.counter[index])
   321  		}
   322  	}
   323  }
   324  
   325  func checkTestStatus() {
   326  	var cnt int
   327  	var arr [NumNodes]int
   328  
   329  	for i := 0; i < NumNodes; i++ {
   330  		arr[i] = nodes[i].server.PeerCount()
   331  		envelopes := nodes[i].shh.Envelopes()
   332  		if len(envelopes) >= NumNodes {
   333  			cnt++
   334  		}
   335  	}
   336  
   337  	if debugMode {
   338  		if cntPrev != cnt {
   339  			fmt.Printf(" %v \t number of nodes that have received all msgs: %d, number of peers per node: %v \n",
   340  				time.Since(prevTime), cnt, arr)
   341  			prevTime = time.Now()
   342  			cntPrev = cnt
   343  		}
   344  	}
   345  }
   346  
   347  func isTestComplete() bool {
   348  	result.mutex.RLock()
   349  	defer result.mutex.RUnlock()
   350  
   351  	for i := 0; i < NumNodes; i++ {
   352  		if result.counter[i] < 1 {
   353  			return false
   354  		}
   355  	}
   356  
   357  	for i := 0; i < NumNodes; i++ {
   358  		envelopes := nodes[i].shh.Envelopes()
   359  		if len(envelopes) < NumNodes+1 {
   360  			return false
   361  		}
   362  	}
   363  
   364  	return true
   365  }
   366  
   367  func sendMsg(t *testing.T, expected bool, id int) {
   368  	if t.Failed() {
   369  		return
   370  	}
   371  
   372  	opt := MessageParams{KeySym: sharedKey, Topic: sharedTopic, Payload: expectedMessage, PoW: 0.00000001, WorkTime: 1}
   373  	if !expected {
   374  		opt.KeySym = wrongKey
   375  		opt.Topic = wrongTopic
   376  		opt.Payload = unexpectedMessage
   377  		opt.Payload[0] = byte(id)
   378  	}
   379  
   380  	msg, err := NewSentMessage(&opt)
   381  	if err != nil {
   382  		t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
   383  	}
   384  	envelope, err := msg.Wrap(&opt)
   385  	if err != nil {
   386  		t.Fatalf("failed to seal message: %s", err)
   387  	}
   388  
   389  	err = nodes[id].shh.Send(envelope)
   390  	if err != nil {
   391  		t.Fatalf("failed to send message: %s", err)
   392  	}
   393  }
   394  
   395  func TestPeerBasic(t *testing.T) {
   396  	InitSingleTest()
   397  
   398  	params, err := generateMessageParams()
   399  	if err != nil {
   400  		t.Fatalf("failed generateMessageParams with seed %d.", seed)
   401  	}
   402  
   403  	params.PoW = 0.001
   404  	msg, err := NewSentMessage(params)
   405  	if err != nil {
   406  		t.Fatalf("failed to create new message with seed %d: %s.", seed, err)
   407  	}
   408  	env, err := msg.Wrap(params)
   409  	if err != nil {
   410  		t.Fatalf("failed Wrap with seed %d.", seed)
   411  	}
   412  
   413  	p := newPeer(nil, nil, nil)
   414  	p.mark(env)
   415  	if !p.marked(env) {
   416  		t.Fatalf("failed mark with seed %d.", seed)
   417  	}
   418  }
   419  
   420  func checkPowExchangeForNodeZero(t *testing.T) {
   421  	const iterations = 200
   422  	for j := 0; j < iterations; j++ {
   423  		lastCycle := (j == iterations-1)
   424  		ok := checkPowExchangeForNodeZeroOnce(t, lastCycle)
   425  		if ok {
   426  			break
   427  		}
   428  		time.Sleep(50 * time.Millisecond)
   429  	}
   430  }
   431  
   432  func checkPowExchangeForNodeZeroOnce(t *testing.T, mustPass bool) bool {
   433  	cnt := 0
   434  	for i, node := range nodes {
   435  		for peer := range node.shh.peers {
   436  			if peer.peer.ID() == discover.PubkeyID(&nodes[0].id.PublicKey) {
   437  				cnt++
   438  				if peer.powRequirement != masterPow {
   439  					if mustPass {
   440  						t.Fatalf("node %d: failed to set the new pow requirement for node zero.", i)
   441  					} else {
   442  						return false
   443  					}
   444  				}
   445  			}
   446  		}
   447  	}
   448  	if cnt == 0 {
   449  		t.Fatalf("looking for node zero: no matching peers found.")
   450  	}
   451  	return true
   452  }
   453  
   454  func checkPowExchange(t *testing.T) {
   455  	for i, node := range nodes {
   456  		for peer := range node.shh.peers {
   457  			if peer.peer.ID() != discover.PubkeyID(&nodes[0].id.PublicKey) {
   458  				if peer.powRequirement != masterPow {
   459  					t.Fatalf("node %d: failed to exchange pow requirement in round %d; expected %f, got %f",
   460  						i, round, masterPow, peer.powRequirement)
   461  				}
   462  			}
   463  		}
   464  	}
   465  }
   466  
   467  func checkBloomFilterExchangeOnce(t *testing.T, mustPass bool) bool {
   468  	for i, node := range nodes {
   469  		for peer := range node.shh.peers {
   470  			peer.bloomMu.Lock()
   471  			equals := bytes.Equal(peer.bloomFilter, masterBloomFilter)
   472  			peer.bloomMu.Unlock()
   473  			if !equals {
   474  				if mustPass {
   475  					t.Fatalf("node %d: failed to exchange bloom filter requirement in round %d. \n%x expected \n%x got",
   476  						i, round, masterBloomFilter, peer.bloomFilter)
   477  				} else {
   478  					return false
   479  				}
   480  			}
   481  		}
   482  	}
   483  
   484  	return true
   485  }
   486  
   487  func checkBloomFilterExchange(t *testing.T) {
   488  	const iterations = 200
   489  	for j := 0; j < iterations; j++ {
   490  		lastCycle := (j == iterations-1)
   491  		ok := checkBloomFilterExchangeOnce(t, lastCycle)
   492  		if ok {
   493  			break
   494  		}
   495  		time.Sleep(50 * time.Millisecond)
   496  	}
   497  }
   498  
   499  func waitForServersToStart(t *testing.T) {
   500  	const iterations = 200
   501  	var started int64
   502  	for j := 0; j < iterations; j++ {
   503  		time.Sleep(50 * time.Millisecond)
   504  		started = atomic.LoadInt64(&result.started)
   505  		if started == NumNodes {
   506  			return
   507  		}
   508  	}
   509  	t.Fatalf("Failed to start all the servers, running: %d", started)
   510  }
   511  
   512  //two generic whisper node handshake
   513  func TestPeerHandshakeWithTwoFullNode(t *testing.T) {
   514  	w1 := Whisper{}
   515  	p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize), false}})
   516  	err := p1.handshake()
   517  	if err != nil {
   518  		t.Fatal()
   519  	}
   520  }
   521  
   522  //two generic whisper node handshake. one don't send light flag
   523  func TestHandshakeWithOldVersionWithoutLightModeFlag(t *testing.T) {
   524  	w1 := Whisper{}
   525  	p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize)}})
   526  	err := p1.handshake()
   527  	if err != nil {
   528  		t.Fatal()
   529  	}
   530  }
   531  
   532  //two light nodes handshake. restriction disabled
   533  func TestTwoLightPeerHandshakeRestrictionOff(t *testing.T) {
   534  	w1 := Whisper{}
   535  	w1.settings.Store(restrictConnectionBetweenLightClientsIdx, false)
   536  	w1.SetLightClientMode(true)
   537  	p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize), true}})
   538  	err := p1.handshake()
   539  	if err != nil {
   540  		t.FailNow()
   541  	}
   542  }
   543  
   544  //two light nodes handshake. restriction enabled
   545  func TestTwoLightPeerHandshakeError(t *testing.T) {
   546  	w1 := Whisper{}
   547  	w1.settings.Store(restrictConnectionBetweenLightClientsIdx, true)
   548  	w1.SetLightClientMode(true)
   549  	p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize), true}})
   550  	err := p1.handshake()
   551  	if err == nil {
   552  		t.FailNow()
   553  	}
   554  }
   555  
   556  type rwStub struct {
   557  	payload []interface{}
   558  }
   559  
   560  func (stub *rwStub) ReadMsg() (p2p.Msg, error) {
   561  	size, r, err := rlp.EncodeToReader(stub.payload)
   562  	if err != nil {
   563  		return p2p.Msg{}, err
   564  	}
   565  	return p2p.Msg{Code: statusCode, Size: uint32(size), Payload: r}, nil
   566  }
   567  
   568  func (stub *rwStub) WriteMsg(m p2p.Msg) error {
   569  	return nil
   570  }