github.com/SmartMeshFoundation/Spectrum@v0.0.0-20220621030607-452a266fee1e/whisper/whisperv5/peer_test.go (about) 1 // Copyright 2016 The Spectrum Authors 2 // This file is part of the Spectrum library. 3 // 4 // The Spectrum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The Spectrum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the Spectrum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package whisperv5 18 19 import ( 20 "bytes" 21 "crypto/ecdsa" 22 "fmt" 23 "net" 24 "sync" 25 "testing" 26 "time" 27 28 "github.com/SmartMeshFoundation/Spectrum/common" 29 "github.com/SmartMeshFoundation/Spectrum/crypto" 30 "github.com/SmartMeshFoundation/Spectrum/p2p" 31 "github.com/SmartMeshFoundation/Spectrum/p2p/discover" 32 "github.com/SmartMeshFoundation/Spectrum/p2p/nat" 33 ) 34 35 var keys []string = []string{ 36 "d49dcf37238dc8a7aac57dc61b9fee68f0a97f062968978b9fafa7d1033d03a9", 37 "73fd6143c48e80ed3c56ea159fe7494a0b6b393a392227b422f4c3e8f1b54f98", 38 "119dd32adb1daa7a4c7bf77f847fb28730785aa92947edf42fdd997b54de40dc", 39 "deeda8709dea935bb772248a3144dea449ffcc13e8e5a1fd4ef20ce4e9c87837", 40 "5bd208a079633befa349441bdfdc4d85ba9bd56081525008380a63ac38a407cf", 41 "1d27fb4912002d58a2a42a50c97edb05c1b3dffc665dbaa42df1fe8d3d95c9b5", 42 "15def52800c9d6b8ca6f3066b7767a76afc7b611786c1276165fbc61636afb68", 43 "51be6ab4b2dc89f251ff2ace10f3c1cc65d6855f3e083f91f6ff8efdfd28b48c", 44 "ef1ef7441bf3c6419b162f05da6037474664f198b58db7315a6f4de52414b4a0", 45 "09bdf6985aabc696dc1fbeb5381aebd7a6421727343872eb2fadfc6d82486fd9", 46 "15d811bf2e01f99a224cdc91d0cf76cea08e8c67905c16fee9725c9be71185c4", 47 "2f83e45cf1baaea779789f755b7da72d8857aeebff19362dd9af31d3c9d14620", 48 "73f04e34ac6532b19c2aae8f8e52f38df1ac8f5cd10369f92325b9b0494b0590", 49 "1e2e07b69e5025537fb73770f483dc8d64f84ae3403775ef61cd36e3faf162c1", 50 "8963d9bbb3911aac6d30388c786756b1c423c4fbbc95d1f96ddbddf39809e43a", 51 "0422da85abc48249270b45d8de38a4cc3c02032ede1fcf0864a51092d58a2f1f", 52 "8ae5c15b0e8c7cade201fdc149831aa9b11ff626a7ffd27188886cc108ad0fa8", 53 "acd8f5a71d4aecfcb9ad00d32aa4bcf2a602939b6a9dd071bab443154184f805", 54 "a285a922125a7481600782ad69debfbcdb0316c1e97c267aff29ef50001ec045", 55 "28fd4eee78c6cd4bf78f39f8ab30c32c67c24a6223baa40e6f9c9a0e1de7cef5", 56 "c5cca0c9e6f043b288c6f1aef448ab59132dab3e453671af5d0752961f013fc7", 57 "46df99b051838cb6f8d1b73f232af516886bd8c4d0ee07af9a0a033c391380fd", 58 "c6a06a53cbaadbb432884f36155c8f3244e244881b5ee3e92e974cfa166d793f", 59 "783b90c75c63dc72e2f8d11b6f1b4de54d63825330ec76ee8db34f06b38ea211", 60 "9450038f10ca2c097a8013e5121b36b422b95b04892232f930a29292d9935611", 61 "e215e6246ed1cfdcf7310d4d8cdbe370f0d6a8371e4eb1089e2ae05c0e1bc10f", 62 "487110939ed9d64ebbc1f300adeab358bc58875faf4ca64990fbd7fe03b78f2b", 63 "824a70ea76ac81366da1d4f4ac39de851c8ac49dca456bb3f0a186ceefa269a5", 64 "ba8f34fa40945560d1006a328fe70c42e35cc3d1017e72d26864cd0d1b150f15", 65 "30a5dfcfd144997f428901ea88a43c8d176b19c79dde54cc58eea001aa3d246c", 66 "de59f7183aca39aa245ce66a05245fecfc7e2c75884184b52b27734a4a58efa2", 67 "92629e2ff5f0cb4f5f08fffe0f64492024d36f045b901efb271674b801095c5a", 68 "7184c1701569e3a4c4d2ddce691edd983b81e42e09196d332e1ae2f1e062cff4", 69 } 70 71 const NumNodes = 16 // must not exceed the number of keys (32) 72 73 type TestData struct { 74 counter [NumNodes]int 75 mutex sync.RWMutex 76 } 77 78 type TestNode struct { 79 shh *Whisper 80 id *ecdsa.PrivateKey 81 server *p2p.Server 82 filerId string 83 } 84 85 var result TestData 86 var nodes [NumNodes]*TestNode 87 var sharedKey []byte = []byte("some arbitrary data here") 88 var sharedTopic TopicType = TopicType{0xF, 0x1, 0x2, 0} 89 var expectedMessage []byte = []byte("per rectum ad astra") 90 91 // This test does the following: 92 // 1. creates a chain of whisper nodes, 93 // 2. installs the filters with shared (predefined) parameters, 94 // 3. each node sends a number of random (undecryptable) messages, 95 // 4. first node sends one expected (decryptable) message, 96 // 5. checks if each node have received and decrypted exactly one message. 97 func TestSimulation(t *testing.T) { 98 initialize(t) 99 100 for i := 0; i < NumNodes; i++ { 101 sendMsg(t, false, i) 102 } 103 104 sendMsg(t, true, 0) 105 checkPropagation(t) 106 stopServers() 107 } 108 109 func initialize(t *testing.T) { 110 var err error 111 ip := net.IPv4(127, 0, 0, 1) 112 port0 := 30303 113 114 for i := 0; i < NumNodes; i++ { 115 var node TestNode 116 node.shh = New(&DefaultConfig) 117 node.shh.SetMinimumPoW(0.00000001) 118 node.shh.Start(nil) 119 topics := make([]TopicType, 0) 120 topics = append(topics, sharedTopic) 121 f := Filter{KeySym: sharedKey} 122 f.Topics = [][]byte{topics[0][:]} 123 node.filerId, err = node.shh.Subscribe(&f) 124 if err != nil { 125 t.Fatalf("failed to install the filter: %s.", err) 126 } 127 node.id, err = crypto.HexToECDSA(keys[i]) 128 if err != nil { 129 t.Fatalf("failed convert the key: %s.", keys[i]) 130 } 131 port := port0 + i 132 addr := fmt.Sprintf(":%d", port) // e.g. ":30303" 133 name := common.MakeName("whisper-go", "2.0") 134 var peers []*discover.Node 135 if i > 0 { 136 peerNodeId := nodes[i-1].id 137 peerPort := uint16(port - 1) 138 peerNode := discover.PubkeyID(&peerNodeId.PublicKey) 139 peer := discover.NewNode(peerNode, ip, peerPort, peerPort) 140 peers = append(peers, peer) 141 } 142 143 node.server = &p2p.Server{ 144 Config: p2p.Config{ 145 PrivateKey: node.id, 146 MaxPeers: NumNodes/2 + 1, 147 Name: name, 148 Protocols: node.shh.Protocols(), 149 ListenAddr: addr, 150 NAT: nat.Any(), 151 BootstrapNodes: peers, 152 StaticNodes: peers, 153 TrustedNodes: peers, 154 }, 155 } 156 157 err = node.server.Start() 158 if err != nil { 159 t.Fatalf("failed to start server %d.", i) 160 } 161 162 nodes[i] = &node 163 } 164 } 165 166 func stopServers() { 167 for i := 0; i < NumNodes; i++ { 168 n := nodes[i] 169 if n != nil { 170 n.shh.Unsubscribe(n.filerId) 171 n.shh.Stop() 172 n.server.Stop() 173 } 174 } 175 } 176 177 func checkPropagation(t *testing.T) { 178 if t.Failed() { 179 return 180 } 181 182 const cycle = 100 183 const iterations = 100 184 185 for j := 0; j < iterations; j++ { 186 time.Sleep(cycle * time.Millisecond) 187 188 for i := 0; i < NumNodes; i++ { 189 f := nodes[i].shh.GetFilter(nodes[i].filerId) 190 if f == nil { 191 t.Fatalf("failed to get filterId %s from node %d.", nodes[i].filerId, i) 192 } 193 194 mail := f.Retrieve() 195 if !validateMail(t, i, mail) { 196 return 197 } 198 199 if isTestComplete() { 200 return 201 } 202 } 203 } 204 205 t.Fatalf("Test was not complete: timeout %d seconds.", iterations*cycle/1000) 206 } 207 208 func validateMail(t *testing.T, index int, mail []*ReceivedMessage) bool { 209 var cnt int 210 for _, m := range mail { 211 if bytes.Equal(m.Payload, expectedMessage) { 212 cnt++ 213 } 214 } 215 216 if cnt == 0 { 217 // no messages received yet: nothing is wrong 218 return true 219 } 220 if cnt > 1 { 221 t.Fatalf("node %d received %d.", index, cnt) 222 return false 223 } 224 225 if cnt > 0 { 226 result.mutex.Lock() 227 defer result.mutex.Unlock() 228 result.counter[index] += cnt 229 if result.counter[index] > 1 { 230 t.Fatalf("node %d accumulated %d.", index, result.counter[index]) 231 } 232 } 233 return true 234 } 235 236 func isTestComplete() bool { 237 result.mutex.RLock() 238 defer result.mutex.RUnlock() 239 240 for i := 0; i < NumNodes; i++ { 241 if result.counter[i] < 1 { 242 return false 243 } 244 } 245 246 for i := 0; i < NumNodes; i++ { 247 envelopes := nodes[i].shh.Envelopes() 248 if len(envelopes) < 2 { 249 return false 250 } 251 } 252 253 return true 254 } 255 256 func sendMsg(t *testing.T, expected bool, id int) { 257 if t.Failed() { 258 return 259 } 260 261 opt := MessageParams{KeySym: sharedKey, Topic: sharedTopic, Payload: expectedMessage, PoW: 0.00000001, WorkTime: 1} 262 if !expected { 263 opt.KeySym[0]++ 264 opt.Topic[0]++ 265 opt.Payload = opt.Payload[1:] 266 } 267 268 msg, err := NewSentMessage(&opt) 269 if err != nil { 270 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 271 } 272 envelope, err := msg.Wrap(&opt) 273 if err != nil { 274 t.Fatalf("failed to seal message: %s", err) 275 } 276 277 err = nodes[id].shh.Send(envelope) 278 if err != nil { 279 t.Fatalf("failed to send message: %s", err) 280 } 281 } 282 283 func TestPeerBasic(t *testing.T) { 284 InitSingleTest() 285 286 params, err := generateMessageParams() 287 if err != nil { 288 t.Fatalf("failed generateMessageParams with seed %d.", seed) 289 } 290 291 params.PoW = 0.001 292 msg, err := NewSentMessage(params) 293 if err != nil { 294 t.Fatalf("failed to create new message with seed %d: %s.", seed, err) 295 } 296 env, err := msg.Wrap(params) 297 if err != nil { 298 t.Fatalf("failed Wrap with seed %d.", seed) 299 } 300 301 p := newPeer(nil, nil, nil) 302 p.mark(env) 303 if !p.marked(env) { 304 t.Fatalf("failed mark with seed %d.", seed) 305 } 306 }