github.com/FUSIONFoundation/efsn@v3.6.2-0.20200916075423-dbb5dd5d2cc7+incompatible/whisper/whisperv6/peer_test.go (about) 1 // Copyright 2016 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package whisperv6 18 19 import ( 20 "bytes" 21 "crypto/ecdsa" 22 "fmt" 23 mrand "math/rand" 24 "sync" 25 "sync/atomic" 26 "testing" 27 "time" 28 29 "net" 30 31 "github.com/FusionFoundation/efsn/common" 32 "github.com/FusionFoundation/efsn/common/hexutil" 33 "github.com/FusionFoundation/efsn/crypto" 34 "github.com/FusionFoundation/efsn/p2p" 35 "github.com/FusionFoundation/efsn/p2p/discover" 36 "github.com/FusionFoundation/efsn/p2p/nat" 37 "github.com/FusionFoundation/efsn/rlp" 38 ) 39 40 var keys = []string{ 41 "d49dcf37238dc8a7aac57dc61b9fee68f0a97f062968978b9fafa7d1033d03a9", 42 "73fd6143c48e80ed3c56ea159fe7494a0b6b393a392227b422f4c3e8f1b54f98", 43 "119dd32adb1daa7a4c7bf77f847fb28730785aa92947edf42fdd997b54de40dc", 44 "deeda8709dea935bb772248a3144dea449ffcc13e8e5a1fd4ef20ce4e9c87837", 45 "5bd208a079633befa349441bdfdc4d85ba9bd56081525008380a63ac38a407cf", 46 "1d27fb4912002d58a2a42a50c97edb05c1b3dffc665dbaa42df1fe8d3d95c9b5", 47 "15def52800c9d6b8ca6f3066b7767a76afc7b611786c1276165fbc61636afb68", 48 "51be6ab4b2dc89f251ff2ace10f3c1cc65d6855f3e083f91f6ff8efdfd28b48c", 49 "ef1ef7441bf3c6419b162f05da6037474664f198b58db7315a6f4de52414b4a0", 50 "09bdf6985aabc696dc1fbeb5381aebd7a6421727343872eb2fadfc6d82486fd9", 51 "15d811bf2e01f99a224cdc91d0cf76cea08e8c67905c16fee9725c9be71185c4", 52 "2f83e45cf1baaea779789f755b7da72d8857aeebff19362dd9af31d3c9d14620", 53 "73f04e34ac6532b19c2aae8f8e52f38df1ac8f5cd10369f92325b9b0494b0590", 54 "1e2e07b69e5025537fb73770f483dc8d64f84ae3403775ef61cd36e3faf162c1", 55 "8963d9bbb3911aac6d30388c786756b1c423c4fbbc95d1f96ddbddf39809e43a", 56 "0422da85abc48249270b45d8de38a4cc3c02032ede1fcf0864a51092d58a2f1f", 57 "8ae5c15b0e8c7cade201fdc149831aa9b11ff626a7ffd27188886cc108ad0fa8", 58 "acd8f5a71d4aecfcb9ad00d32aa4bcf2a602939b6a9dd071bab443154184f805", 59 "a285a922125a7481600782ad69debfbcdb0316c1e97c267aff29ef50001ec045", 60 "28fd4eee78c6cd4bf78f39f8ab30c32c67c24a6223baa40e6f9c9a0e1de7cef5", 61 "c5cca0c9e6f043b288c6f1aef448ab59132dab3e453671af5d0752961f013fc7", 62 "46df99b051838cb6f8d1b73f232af516886bd8c4d0ee07af9a0a033c391380fd", 63 "c6a06a53cbaadbb432884f36155c8f3244e244881b5ee3e92e974cfa166d793f", 64 "783b90c75c63dc72e2f8d11b6f1b4de54d63825330ec76ee8db34f06b38ea211", 65 "9450038f10ca2c097a8013e5121b36b422b95b04892232f930a29292d9935611", 66 "e215e6246ed1cfdcf7310d4d8cdbe370f0d6a8371e4eb1089e2ae05c0e1bc10f", 67 "487110939ed9d64ebbc1f300adeab358bc58875faf4ca64990fbd7fe03b78f2b", 68 "824a70ea76ac81366da1d4f4ac39de851c8ac49dca456bb3f0a186ceefa269a5", 69 "ba8f34fa40945560d1006a328fe70c42e35cc3d1017e72d26864cd0d1b150f15", 70 "30a5dfcfd144997f428901ea88a43c8d176b19c79dde54cc58eea001aa3d246c", 71 "de59f7183aca39aa245ce66a05245fecfc7e2c75884184b52b27734a4a58efa2", 72 "92629e2ff5f0cb4f5f08fffe0f64492024d36f045b901efb271674b801095c5a", 73 "7184c1701569e3a4c4d2ddce691edd983b81e42e09196d332e1ae2f1e062cff4", 74 } 75 76 type TestData struct { 77 started int64 78 counter [NumNodes]int 79 mutex sync.RWMutex 80 } 81 82 type TestNode struct { 83 shh *Whisper 84 id *ecdsa.PrivateKey 85 server *p2p.Server 86 filerID string 87 } 88 89 const NumNodes = 8 // must not exceed the number of keys (32) 90 91 var result TestData 92 var nodes [NumNodes]*TestNode 93 var sharedKey = hexutil.MustDecode("0x03ca634cae0d49acb401d8a4c6b6fe8c55b70d115bf400769cc1400f3258cd31") 94 var wrongKey = hexutil.MustDecode("0xf91156714d7ec88d3edc1c652c2181dbb3044e8771c683f3b30d33c12b986b11") 95 var sharedTopic = TopicType{0xF, 0x1, 0x2, 0} 96 var wrongTopic = TopicType{0, 0, 0, 0} 97 var expectedMessage = []byte("per aspera ad astra") 98 var unexpectedMessage = []byte("per rectum ad astra") 99 var masterBloomFilter []byte 100 var masterPow = 0.00000001 101 var round = 1 102 var debugMode = false 103 var prevTime time.Time 104 var cntPrev int 105 106 func TestSimulation(t *testing.T) { 107 // create a chain of whisper nodes, 108 // installs the filters with shared (predefined) parameters 109 initialize(t) 110 111 // each node sends one random (not decryptable) message 112 for i := 0; i < NumNodes; i++ { 113 sendMsg(t, false, i) 114 } 115 116 // node #0 sends one expected (decryptable) message 117 sendMsg(t, true, 0) 118 119 // check if each node have received and decrypted exactly one message 120 checkPropagation(t, true) 121 122 // check if Status message was correctly decoded 123 checkBloomFilterExchange(t) 124 checkPowExchange(t) 125 126 // send new pow and bloom exchange messages 127 resetParams(t) 128 129 // node #1 sends one expected (decryptable) message 130 sendMsg(t, true, 1) 131 132 // check if each node (except node #0) have received and decrypted exactly one message 133 checkPropagation(t, false) 134 135 // check if corresponding protocol-level messages were correctly decoded 136 checkPowExchangeForNodeZero(t) 137 checkBloomFilterExchange(t) 138 139 stopServers() 140 } 141 142 func resetParams(t *testing.T) { 143 // change pow only for node zero 144 masterPow = 7777777.0 145 nodes[0].shh.SetMinimumPoW(masterPow) 146 147 // change bloom for all nodes 148 masterBloomFilter = TopicToBloom(sharedTopic) 149 for i := 0; i < NumNodes; i++ { 150 nodes[i].shh.SetBloomFilter(masterBloomFilter) 151 } 152 153 round++ 154 } 155 156 func initBloom(t *testing.T) { 157 masterBloomFilter = make([]byte, BloomFilterSize) 158 _, err := mrand.Read(masterBloomFilter) 159 if err != nil { 160 t.Fatalf("rand failed: %s.", err) 161 } 162 163 msgBloom := TopicToBloom(sharedTopic) 164 masterBloomFilter = addBloom(masterBloomFilter, msgBloom) 165 for i := 0; i < 32; i++ { 166 masterBloomFilter[i] = 0xFF 167 } 168 169 if !BloomFilterMatch(masterBloomFilter, msgBloom) { 170 t.Fatalf("bloom mismatch on initBloom.") 171 } 172 } 173 174 func initialize(t *testing.T) { 175 initBloom(t) 176 177 var err error 178 179 for i := 0; i < NumNodes; i++ { 180 var node TestNode 181 b := make([]byte, BloomFilterSize) 182 copy(b, masterBloomFilter) 183 node.shh = New(&DefaultConfig) 184 node.shh.SetMinimumPoW(masterPow) 185 node.shh.SetBloomFilter(b) 186 if !bytes.Equal(node.shh.BloomFilter(), masterBloomFilter) { 187 t.Fatalf("bloom mismatch on init.") 188 } 189 node.shh.Start(nil) 190 topics := make([]TopicType, 0) 191 topics = append(topics, sharedTopic) 192 f := Filter{KeySym: sharedKey} 193 f.Topics = [][]byte{topics[0][:]} 194 node.filerID, err = node.shh.Subscribe(&f) 195 if err != nil { 196 t.Fatalf("failed to install the filter: %s.", err) 197 } 198 node.id, err = crypto.HexToECDSA(keys[i]) 199 if err != nil { 200 t.Fatalf("failed convert the key: %s.", keys[i]) 201 } 202 name := common.MakeName("whisper-go", "2.0") 203 204 node.server = &p2p.Server{ 205 Config: p2p.Config{ 206 PrivateKey: node.id, 207 MaxPeers: NumNodes/2 + 1, 208 Name: name, 209 Protocols: node.shh.Protocols(), 210 ListenAddr: "127.0.0.1:0", 211 NAT: nat.Any(), 212 }, 213 } 214 215 go startServer(t, node.server) 216 217 nodes[i] = &node 218 } 219 220 waitForServersToStart(t) 221 222 for i := 0; i < NumNodes; i++ { 223 for j := 0; j < i; j++ { 224 peerNodeId := nodes[j].id 225 address, _ := net.ResolveTCPAddr("tcp", nodes[j].server.ListenAddr) 226 peerPort := uint16(address.Port) 227 peerNode := discover.PubkeyID(&peerNodeId.PublicKey) 228 peer := discover.NewNode(peerNode, address.IP, peerPort, peerPort) 229 nodes[i].server.AddPeer(peer) 230 } 231 } 232 } 233 234 func startServer(t *testing.T, s *p2p.Server) { 235 err := s.Start() 236 if err != nil { 237 t.Fatalf("failed to start the fisrt server.") 238 } 239 240 atomic.AddInt64(&result.started, 1) 241 } 242 243 func stopServers() { 244 for i := 0; i < NumNodes; i++ { 245 n := nodes[i] 246 if n != nil { 247 n.shh.Unsubscribe(n.filerID) 248 n.shh.Stop() 249 n.server.Stop() 250 } 251 } 252 } 253 254 func checkPropagation(t *testing.T, includingNodeZero bool) { 255 if t.Failed() { 256 return 257 } 258 259 prevTime = time.Now() 260 // (cycle * iterations) should not exceed 50 seconds, since TTL=50 261 const cycle = 200 // time in milliseconds 262 const iterations = 250 263 264 first := 0 265 if !includingNodeZero { 266 first = 1 267 } 268 269 for j := 0; j < iterations; j++ { 270 for i := first; i < NumNodes; i++ { 271 f := nodes[i].shh.GetFilter(nodes[i].filerID) 272 if f == nil { 273 t.Fatalf("failed to get filterId %s from node %d, round %d.", nodes[i].filerID, i, round) 274 } 275 276 mail := f.Retrieve() 277 validateMail(t, i, mail) 278 279 if isTestComplete() { 280 checkTestStatus() 281 return 282 } 283 } 284 285 checkTestStatus() 286 time.Sleep(cycle * time.Millisecond) 287 } 288 289 if !includingNodeZero { 290 f := nodes[0].shh.GetFilter(nodes[0].filerID) 291 if f != nil { 292 t.Fatalf("node zero received a message with low PoW.") 293 } 294 } 295 296 t.Fatalf("Test was not complete (%d round): timeout %d seconds. nodes=%v", round, iterations*cycle/1000, nodes) 297 } 298 299 func validateMail(t *testing.T, index int, mail []*ReceivedMessage) { 300 var cnt int 301 for _, m := range mail { 302 if bytes.Equal(m.Payload, expectedMessage) { 303 cnt++ 304 } 305 } 306 307 if cnt == 0 { 308 // no messages received yet: nothing is wrong 309 return 310 } 311 if cnt > 1 { 312 t.Fatalf("node %d received %d.", index, cnt) 313 } 314 315 if cnt == 1 { 316 result.mutex.Lock() 317 defer result.mutex.Unlock() 318 result.counter[index] += cnt 319 if result.counter[index] > 1 { 320 t.Fatalf("node %d accumulated %d.", index, result.counter[index]) 321 } 322 } 323 } 324 325 func checkTestStatus() { 326 var cnt int 327 var arr [NumNodes]int 328 329 for i := 0; i < NumNodes; i++ { 330 arr[i] = nodes[i].server.PeerCount() 331 envelopes := nodes[i].shh.Envelopes() 332 if len(envelopes) >= NumNodes { 333 cnt++ 334 } 335 } 336 337 if debugMode { 338 if cntPrev != cnt { 339 fmt.Printf(" %v \t number of nodes that have received all msgs: %d, number of peers per node: %v \n", 340 time.Since(prevTime), cnt, arr) 341 prevTime = time.Now() 342 cntPrev = cnt 343 } 344 } 345 } 346 347 func isTestComplete() bool { 348 result.mutex.RLock() 349 defer result.mutex.RUnlock() 350 351 for i := 0; i < NumNodes; i++ { 352 if result.counter[i] < 1 { 353 return false 354 } 355 } 356 357 for i := 0; i < NumNodes; i++ { 358 envelopes := nodes[i].shh.Envelopes() 359 if len(envelopes) < NumNodes+1 { 360 return false 361 } 362 } 363 364 return true 365 } 366 367 func sendMsg(t *testing.T, expected bool, id int) { 368 if t.Failed() { 369 return 370 } 371 372 opt := MessageParams{KeySym: sharedKey, Topic: sharedTopic, Payload: expectedMessage, PoW: 0.00000001, WorkTime: 1} 373 if !expected { 374 opt.KeySym = wrongKey 375 opt.Topic = wrongTopic 376 opt.Payload = unexpectedMessage 377 opt.Payload[0] = byte(id) 378 } 379 380 msg, err := NewSentMessage(&opt) 381 if err != nil { 382 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 383 } 384 envelope, err := msg.Wrap(&opt) 385 if err != nil { 386 t.Fatalf("failed to seal message: %s", err) 387 } 388 389 err = nodes[id].shh.Send(envelope) 390 if err != nil { 391 t.Fatalf("failed to send message: %s", err) 392 } 393 } 394 395 func TestPeerBasic(t *testing.T) { 396 InitSingleTest() 397 398 params, err := generateMessageParams() 399 if err != nil { 400 t.Fatalf("failed generateMessageParams with seed %d.", seed) 401 } 402 403 params.PoW = 0.001 404 msg, err := NewSentMessage(params) 405 if err != nil { 406 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 407 } 408 env, err := msg.Wrap(params) 409 if err != nil { 410 t.Fatalf("failed Wrap with seed %d.", seed) 411 } 412 413 p := newPeer(nil, nil, nil) 414 p.mark(env) 415 if !p.marked(env) { 416 t.Fatalf("failed mark with seed %d.", seed) 417 } 418 } 419 420 func checkPowExchangeForNodeZero(t *testing.T) { 421 const iterations = 200 422 for j := 0; j < iterations; j++ { 423 lastCycle := (j == iterations-1) 424 ok := checkPowExchangeForNodeZeroOnce(t, lastCycle) 425 if ok { 426 break 427 } 428 time.Sleep(50 * time.Millisecond) 429 } 430 } 431 432 func checkPowExchangeForNodeZeroOnce(t *testing.T, mustPass bool) bool { 433 cnt := 0 434 for i, node := range nodes { 435 for peer := range node.shh.peers { 436 if peer.peer.ID() == discover.PubkeyID(&nodes[0].id.PublicKey) { 437 cnt++ 438 if peer.powRequirement != masterPow { 439 if mustPass { 440 t.Fatalf("node %d: failed to set the new pow requirement for node zero.", i) 441 } else { 442 return false 443 } 444 } 445 } 446 } 447 } 448 if cnt == 0 { 449 t.Fatalf("looking for node zero: no matching peers found.") 450 } 451 return true 452 } 453 454 func checkPowExchange(t *testing.T) { 455 for i, node := range nodes { 456 for peer := range node.shh.peers { 457 if peer.peer.ID() != discover.PubkeyID(&nodes[0].id.PublicKey) { 458 if peer.powRequirement != masterPow { 459 t.Fatalf("node %d: failed to exchange pow requirement in round %d; expected %f, got %f", 460 i, round, masterPow, peer.powRequirement) 461 } 462 } 463 } 464 } 465 } 466 467 func checkBloomFilterExchangeOnce(t *testing.T, mustPass bool) bool { 468 for i, node := range nodes { 469 for peer := range node.shh.peers { 470 peer.bloomMu.Lock() 471 equals := bytes.Equal(peer.bloomFilter, masterBloomFilter) 472 peer.bloomMu.Unlock() 473 if !equals { 474 if mustPass { 475 t.Fatalf("node %d: failed to exchange bloom filter requirement in round %d. \n%x expected \n%x got", 476 i, round, masterBloomFilter, peer.bloomFilter) 477 } else { 478 return false 479 } 480 } 481 } 482 } 483 484 return true 485 } 486 487 func checkBloomFilterExchange(t *testing.T) { 488 const iterations = 200 489 for j := 0; j < iterations; j++ { 490 lastCycle := (j == iterations-1) 491 ok := checkBloomFilterExchangeOnce(t, lastCycle) 492 if ok { 493 break 494 } 495 time.Sleep(50 * time.Millisecond) 496 } 497 } 498 499 func waitForServersToStart(t *testing.T) { 500 const iterations = 200 501 var started int64 502 for j := 0; j < iterations; j++ { 503 time.Sleep(50 * time.Millisecond) 504 started = atomic.LoadInt64(&result.started) 505 if started == NumNodes { 506 return 507 } 508 } 509 t.Fatalf("Failed to start all the servers, running: %d", started) 510 } 511 512 //two generic whisper node handshake 513 func TestPeerHandshakeWithTwoFullNode(t *testing.T) { 514 w1 := Whisper{} 515 p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize), false}}) 516 err := p1.handshake() 517 if err != nil { 518 t.Fatal() 519 } 520 } 521 522 //two generic whisper node handshake. one don't send light flag 523 func TestHandshakeWithOldVersionWithoutLightModeFlag(t *testing.T) { 524 w1 := Whisper{} 525 p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize)}}) 526 err := p1.handshake() 527 if err != nil { 528 t.Fatal() 529 } 530 } 531 532 //two light nodes handshake. restriction disabled 533 func TestTwoLightPeerHandshakeRestrictionOff(t *testing.T) { 534 w1 := Whisper{} 535 w1.settings.Store(restrictConnectionBetweenLightClientsIdx, false) 536 w1.SetLightClientMode(true) 537 p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize), true}}) 538 err := p1.handshake() 539 if err != nil { 540 t.FailNow() 541 } 542 } 543 544 //two light nodes handshake. restriction enabled 545 func TestTwoLightPeerHandshakeError(t *testing.T) { 546 w1 := Whisper{} 547 w1.settings.Store(restrictConnectionBetweenLightClientsIdx, true) 548 w1.SetLightClientMode(true) 549 p1 := newPeer(&w1, p2p.NewPeer(discover.NodeID{}, "test", []p2p.Cap{}), &rwStub{[]interface{}{ProtocolVersion, uint64(123), make([]byte, BloomFilterSize), true}}) 550 err := p1.handshake() 551 if err == nil { 552 t.FailNow() 553 } 554 } 555 556 type rwStub struct { 557 payload []interface{} 558 } 559 560 func (stub *rwStub) ReadMsg() (p2p.Msg, error) { 561 size, r, err := rlp.EncodeToReader(stub.payload) 562 if err != nil { 563 return p2p.Msg{}, err 564 } 565 return p2p.Msg{Code: statusCode, Size: uint32(size), Payload: r}, nil 566 } 567 568 func (stub *rwStub) WriteMsg(m p2p.Msg) error { 569 return nil 570 }