|
|
@@ -0,0 +1,382 @@
|
|
|
+// Copyright 2021 The go-ethereum Authors
|
|
|
+// This file is part of the go-ethereum library.
|
|
|
+//
|
|
|
+// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
+// it under the terms of the GNU Lesser General Public License as published by
|
|
|
+// the Free Software Foundation, either version 3 of the License, or
|
|
|
+// (at your option) any later version.
|
|
|
+//
|
|
|
+// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
+// GNU Lesser General Public License for more details.
|
|
|
+//
|
|
|
+// You should have received a copy of the GNU Lesser General Public License
|
|
|
+// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
+
|
|
|
+package ethtest
|
|
|
+
|
|
|
+import (
|
|
|
+ "time"
|
|
|
+
|
|
|
+ "github.com/ethereum/go-ethereum/core/types"
|
|
|
+ "github.com/ethereum/go-ethereum/crypto"
|
|
|
+ "github.com/ethereum/go-ethereum/eth/protocols/eth"
|
|
|
+ "github.com/ethereum/go-ethereum/internal/utesting"
|
|
|
+ "github.com/ethereum/go-ethereum/p2p"
|
|
|
+)
|
|
|
+
|
|
|
+// TestStatus_66 attempts to connect to the given node and exchange
|
|
|
+// a status message with it on the eth66 protocol, and then check to
|
|
|
+// make sure the chain head is correct.
|
|
|
+func (s *Suite) TestStatus_66(t *utesting.T) {
|
|
|
+ conn := s.dial66(t)
|
|
|
+ // get protoHandshake
|
|
|
+ conn.handshake(t)
|
|
|
+ // get status
|
|
|
+ switch msg := conn.statusExchange66(t, s.chain).(type) {
|
|
|
+ case *Status:
|
|
|
+ status := *msg
|
|
|
+ if status.ProtocolVersion != uint32(66) {
|
|
|
+ t.Fatalf("mismatch in version: wanted 66, got %d", status.ProtocolVersion)
|
|
|
+ }
|
|
|
+ t.Logf("got status message: %s", pretty.Sdump(msg))
|
|
|
+ default:
|
|
|
+ t.Fatalf("unexpected: %s", pretty.Sdump(msg))
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// TestGetBlockHeaders_66 tests whether the given node can respond to
|
|
|
+// an eth66 `GetBlockHeaders` request and that the response is accurate.
|
|
|
+func (s *Suite) TestGetBlockHeaders_66(t *utesting.T) {
|
|
|
+ conn := s.setupConnection66(t)
|
|
|
+ // get block headers
|
|
|
+ req := ð.GetBlockHeadersPacket66{
|
|
|
+ RequestId: 3,
|
|
|
+ GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
|
+ Origin: eth.HashOrNumber{
|
|
|
+ Hash: s.chain.blocks[1].Hash(),
|
|
|
+ },
|
|
|
+ Amount: 2,
|
|
|
+ Skip: 1,
|
|
|
+ Reverse: false,
|
|
|
+ },
|
|
|
+ }
|
|
|
+ // write message
|
|
|
+ headers := s.getBlockHeaders66(t, conn, req, req.RequestId)
|
|
|
+ // check for correct headers
|
|
|
+ headersMatch(t, s.chain, headers)
|
|
|
+}
|
|
|
+
|
|
|
+// TestSimultaneousRequests_66 sends two simultaneous `GetBlockHeader` requests
|
|
|
+// with different request IDs and checks to make sure the node responds with the correct
|
|
|
+// headers per request.
|
|
|
+func (s *Suite) TestSimultaneousRequests_66(t *utesting.T) {
|
|
|
+ // create two connections
|
|
|
+ conn1, conn2 := s.setupConnection66(t), s.setupConnection66(t)
|
|
|
+ // create two requests
|
|
|
+ req1 := ð.GetBlockHeadersPacket66{
|
|
|
+ RequestId: 111,
|
|
|
+ GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
|
+ Origin: eth.HashOrNumber{
|
|
|
+ Hash: s.chain.blocks[1].Hash(),
|
|
|
+ },
|
|
|
+ Amount: 2,
|
|
|
+ Skip: 1,
|
|
|
+ Reverse: false,
|
|
|
+ },
|
|
|
+ }
|
|
|
+ req2 := ð.GetBlockHeadersPacket66{
|
|
|
+ RequestId: 222,
|
|
|
+ GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
|
+ Origin: eth.HashOrNumber{
|
|
|
+ Hash: s.chain.blocks[1].Hash(),
|
|
|
+ },
|
|
|
+ Amount: 4,
|
|
|
+ Skip: 1,
|
|
|
+ Reverse: false,
|
|
|
+ },
|
|
|
+ }
|
|
|
+ // wait for headers for first request
|
|
|
+ headerChan := make(chan BlockHeaders, 1)
|
|
|
+ go func(headers chan BlockHeaders) {
|
|
|
+ headers <- s.getBlockHeaders66(t, conn1, req1, req1.RequestId)
|
|
|
+ }(headerChan)
|
|
|
+ // check headers of second request
|
|
|
+ headersMatch(t, s.chain, s.getBlockHeaders66(t, conn2, req2, req2.RequestId))
|
|
|
+ // check headers of first request
|
|
|
+ headersMatch(t, s.chain, <-headerChan)
|
|
|
+}
|
|
|
+
|
|
|
+// TestBroadcast_66 tests whether a block announcement is correctly
|
|
|
+// propagated to the given node's peer(s) on the eth66 protocol.
|
|
|
+func (s *Suite) TestBroadcast_66(t *utesting.T) {
|
|
|
+ sendConn, receiveConn := s.setupConnection66(t), s.setupConnection66(t)
|
|
|
+ nextBlock := len(s.chain.blocks)
|
|
|
+ blockAnnouncement := &NewBlock{
|
|
|
+ Block: s.fullChain.blocks[nextBlock],
|
|
|
+ TD: s.fullChain.TD(nextBlock + 1),
|
|
|
+ }
|
|
|
+ s.testAnnounce66(t, sendConn, receiveConn, blockAnnouncement)
|
|
|
+ // update test suite chain
|
|
|
+ s.chain.blocks = append(s.chain.blocks, s.fullChain.blocks[nextBlock])
|
|
|
+ // wait for client to update its chain
|
|
|
+ if err := receiveConn.waitForBlock66(s.chain.Head()); err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// TestGetBlockBodies_66 tests whether the given node can respond to
|
|
|
+// a `GetBlockBodies` request and that the response is accurate over
|
|
|
+// the eth66 protocol.
|
|
|
+func (s *Suite) TestGetBlockBodies_66(t *utesting.T) {
|
|
|
+ conn := s.setupConnection66(t)
|
|
|
+ // create block bodies request
|
|
|
+ id := uint64(55)
|
|
|
+ req := ð.GetBlockBodiesPacket66{
|
|
|
+ RequestId: id,
|
|
|
+ GetBlockBodiesPacket: eth.GetBlockBodiesPacket{
|
|
|
+ s.chain.blocks[54].Hash(),
|
|
|
+ s.chain.blocks[75].Hash(),
|
|
|
+ },
|
|
|
+ }
|
|
|
+ if err := conn.write66(req, GetBlockBodies{}.Code()); err != nil {
|
|
|
+ t.Fatalf("could not write to connection: %v", err)
|
|
|
+ }
|
|
|
+
|
|
|
+ reqID, msg := conn.readAndServe66(s.chain, timeout)
|
|
|
+ switch msg := msg.(type) {
|
|
|
+ case BlockBodies:
|
|
|
+ if reqID != req.RequestId {
|
|
|
+ t.Fatalf("request ID mismatch: wanted %d, got %d", req.RequestId, reqID)
|
|
|
+ }
|
|
|
+ t.Logf("received %d block bodies", len(msg))
|
|
|
+ default:
|
|
|
+ t.Fatalf("unexpected: %s", pretty.Sdump(msg))
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// TestLargeAnnounce_66 tests the announcement mechanism with a large block.
|
|
|
+func (s *Suite) TestLargeAnnounce_66(t *utesting.T) {
|
|
|
+ nextBlock := len(s.chain.blocks)
|
|
|
+ blocks := []*NewBlock{
|
|
|
+ {
|
|
|
+ Block: largeBlock(),
|
|
|
+ TD: s.fullChain.TD(nextBlock + 1),
|
|
|
+ },
|
|
|
+ {
|
|
|
+ Block: s.fullChain.blocks[nextBlock],
|
|
|
+ TD: largeNumber(2),
|
|
|
+ },
|
|
|
+ {
|
|
|
+ Block: largeBlock(),
|
|
|
+ TD: largeNumber(2),
|
|
|
+ },
|
|
|
+ {
|
|
|
+ Block: s.fullChain.blocks[nextBlock],
|
|
|
+ TD: s.fullChain.TD(nextBlock + 1),
|
|
|
+ },
|
|
|
+ }
|
|
|
+
|
|
|
+ for i, blockAnnouncement := range blocks[0:3] {
|
|
|
+ t.Logf("Testing malicious announcement: %v\n", i)
|
|
|
+ sendConn := s.setupConnection66(t)
|
|
|
+ if err := sendConn.Write(blockAnnouncement); err != nil {
|
|
|
+ t.Fatalf("could not write to connection: %v", err)
|
|
|
+ }
|
|
|
+ // Invalid announcement, check that peer disconnected
|
|
|
+ switch msg := sendConn.ReadAndServe(s.chain, timeout).(type) {
|
|
|
+ case *Disconnect:
|
|
|
+ case *Error:
|
|
|
+ break
|
|
|
+ default:
|
|
|
+ t.Fatalf("unexpected: %s wanted disconnect", pretty.Sdump(msg))
|
|
|
+ }
|
|
|
+ }
|
|
|
+ // Test the last block as a valid block
|
|
|
+ sendConn := s.setupConnection66(t)
|
|
|
+ receiveConn := s.setupConnection66(t)
|
|
|
+ s.testAnnounce66(t, sendConn, receiveConn, blocks[3])
|
|
|
+ // update test suite chain
|
|
|
+ s.chain.blocks = append(s.chain.blocks, s.fullChain.blocks[nextBlock])
|
|
|
+ // wait for client to update its chain
|
|
|
+ if err := receiveConn.waitForBlock66(s.fullChain.blocks[nextBlock]); err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// TestMaliciousHandshake_66 tries to send malicious data during the handshake.
|
|
|
+func (s *Suite) TestMaliciousHandshake_66(t *utesting.T) {
|
|
|
+ conn := s.dial66(t)
|
|
|
+ // write hello to client
|
|
|
+ pub0 := crypto.FromECDSAPub(&conn.ourKey.PublicKey)[1:]
|
|
|
+ handshakes := []*Hello{
|
|
|
+ {
|
|
|
+ Version: 5,
|
|
|
+ Caps: []p2p.Cap{
|
|
|
+ {Name: largeString(2), Version: 66},
|
|
|
+ },
|
|
|
+ ID: pub0,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ Version: 5,
|
|
|
+ Caps: []p2p.Cap{
|
|
|
+ {Name: "eth", Version: 64},
|
|
|
+ {Name: "eth", Version: 65},
|
|
|
+ {Name: "eth", Version: 66},
|
|
|
+ },
|
|
|
+ ID: append(pub0, byte(0)),
|
|
|
+ },
|
|
|
+ {
|
|
|
+ Version: 5,
|
|
|
+ Caps: []p2p.Cap{
|
|
|
+ {Name: "eth", Version: 64},
|
|
|
+ {Name: "eth", Version: 65},
|
|
|
+ {Name: "eth", Version: 66},
|
|
|
+ },
|
|
|
+ ID: append(pub0, pub0...),
|
|
|
+ },
|
|
|
+ {
|
|
|
+ Version: 5,
|
|
|
+ Caps: []p2p.Cap{
|
|
|
+ {Name: "eth", Version: 64},
|
|
|
+ {Name: "eth", Version: 65},
|
|
|
+ {Name: "eth", Version: 66},
|
|
|
+ },
|
|
|
+ ID: largeBuffer(2),
|
|
|
+ },
|
|
|
+ {
|
|
|
+ Version: 5,
|
|
|
+ Caps: []p2p.Cap{
|
|
|
+ {Name: largeString(2), Version: 66},
|
|
|
+ },
|
|
|
+ ID: largeBuffer(2),
|
|
|
+ },
|
|
|
+ }
|
|
|
+ for i, handshake := range handshakes {
|
|
|
+ t.Logf("Testing malicious handshake %v\n", i)
|
|
|
+ // Init the handshake
|
|
|
+ if err := conn.Write(handshake); err != nil {
|
|
|
+ t.Fatalf("could not write to connection: %v", err)
|
|
|
+ }
|
|
|
+ // check that the peer disconnected
|
|
|
+ timeout := 20 * time.Second
|
|
|
+ // Discard one hello
|
|
|
+ for i := 0; i < 2; i++ {
|
|
|
+ switch msg := conn.ReadAndServe(s.chain, timeout).(type) {
|
|
|
+ case *Disconnect:
|
|
|
+ case *Error:
|
|
|
+ case *Hello:
|
|
|
+ // Hello's are sent concurrently, so ignore them
|
|
|
+ continue
|
|
|
+ default:
|
|
|
+ t.Fatalf("unexpected: %s", pretty.Sdump(msg))
|
|
|
+ }
|
|
|
+ }
|
|
|
+ // Dial for the next round
|
|
|
+ conn = s.dial66(t)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// TestMaliciousStatus_66 sends a status package with a large total difficulty.
|
|
|
+func (s *Suite) TestMaliciousStatus_66(t *utesting.T) {
|
|
|
+ conn := s.dial66(t)
|
|
|
+ // get protoHandshake
|
|
|
+ conn.handshake(t)
|
|
|
+ status := &Status{
|
|
|
+ ProtocolVersion: uint32(66),
|
|
|
+ NetworkID: s.chain.chainConfig.ChainID.Uint64(),
|
|
|
+ TD: largeNumber(2),
|
|
|
+ Head: s.chain.blocks[s.chain.Len()-1].Hash(),
|
|
|
+ Genesis: s.chain.blocks[0].Hash(),
|
|
|
+ ForkID: s.chain.ForkID(),
|
|
|
+ }
|
|
|
+ // get status
|
|
|
+ switch msg := conn.statusExchange(t, s.chain, status).(type) {
|
|
|
+ case *Status:
|
|
|
+ t.Logf("%+v\n", msg)
|
|
|
+ default:
|
|
|
+ t.Fatalf("expected status, got: %#v ", msg)
|
|
|
+ }
|
|
|
+ // wait for disconnect
|
|
|
+ switch msg := conn.ReadAndServe(s.chain, timeout).(type) {
|
|
|
+ case *Disconnect:
|
|
|
+ case *Error:
|
|
|
+ return
|
|
|
+ default:
|
|
|
+ t.Fatalf("expected disconnect, got: %s", pretty.Sdump(msg))
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+func (s *Suite) TestTransaction_66(t *utesting.T) {
|
|
|
+ tests := []*types.Transaction{
|
|
|
+ getNextTxFromChain(t, s),
|
|
|
+ unknownTx(t, s),
|
|
|
+ }
|
|
|
+ for i, tx := range tests {
|
|
|
+ t.Logf("Testing tx propagation: %v\n", i)
|
|
|
+ sendSuccessfulTx66(t, s, tx)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+func (s *Suite) TestMaliciousTx_66(t *utesting.T) {
|
|
|
+ tests := []*types.Transaction{
|
|
|
+ getOldTxFromChain(t, s),
|
|
|
+ invalidNonceTx(t, s),
|
|
|
+ hugeAmount(t, s),
|
|
|
+ hugeGasPrice(t, s),
|
|
|
+ hugeData(t, s),
|
|
|
+ }
|
|
|
+ for i, tx := range tests {
|
|
|
+ t.Logf("Testing malicious tx propagation: %v\n", i)
|
|
|
+ sendFailingTx66(t, s, tx)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// TestZeroRequestID_66 checks that a request ID of zero is still handled
|
|
|
+// by the node.
|
|
|
+func (s *Suite) TestZeroRequestID_66(t *utesting.T) {
|
|
|
+ conn := s.setupConnection66(t)
|
|
|
+ req := ð.GetBlockHeadersPacket66{
|
|
|
+ RequestId: 0,
|
|
|
+ GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
|
+ Origin: eth.HashOrNumber{
|
|
|
+ Number: 0,
|
|
|
+ },
|
|
|
+ Amount: 2,
|
|
|
+ },
|
|
|
+ }
|
|
|
+ headersMatch(t, s.chain, s.getBlockHeaders66(t, conn, req, req.RequestId))
|
|
|
+}
|
|
|
+
|
|
|
+// TestSameRequestID_66 sends two requests with the same request ID
|
|
|
+// concurrently to a single node.
|
|
|
+func (s *Suite) TestSameRequestID_66(t *utesting.T) {
|
|
|
+ conn := s.setupConnection66(t)
|
|
|
+ // create two separate requests with same ID
|
|
|
+ reqID := uint64(1234)
|
|
|
+ req1 := ð.GetBlockHeadersPacket66{
|
|
|
+ RequestId: reqID,
|
|
|
+ GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
|
+ Origin: eth.HashOrNumber{
|
|
|
+ Number: 0,
|
|
|
+ },
|
|
|
+ Amount: 2,
|
|
|
+ },
|
|
|
+ }
|
|
|
+ req2 := ð.GetBlockHeadersPacket66{
|
|
|
+ RequestId: reqID,
|
|
|
+ GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
|
+ Origin: eth.HashOrNumber{
|
|
|
+ Number: 33,
|
|
|
+ },
|
|
|
+ Amount: 2,
|
|
|
+ },
|
|
|
+ }
|
|
|
+ // send requests concurrently
|
|
|
+ go func() {
|
|
|
+ headersMatch(t, s.chain, s.getBlockHeaders66(t, conn, req2, reqID))
|
|
|
+ }()
|
|
|
+ // check response from first request
|
|
|
+ headersMatch(t, s.chain, s.getBlockHeaders66(t, conn, req1, reqID))
|
|
|
+}
|