server_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522
  1. package p2p
  2. import (
  3. "bytes"
  4. "crypto/ecdsa"
  5. "io"
  6. "math/rand"
  7. "net"
  8. "sync"
  9. "testing"
  10. "time"
  11. "github.com/ethereum/go-ethereum/crypto"
  12. "github.com/ethereum/go-ethereum/crypto/sha3"
  13. "github.com/ethereum/go-ethereum/p2p/discover"
  14. )
  15. func startTestServer(t *testing.T, pf newPeerHook) *Server {
  16. server := &Server{
  17. Name: "test",
  18. MaxPeers: 10,
  19. ListenAddr: "127.0.0.1:0",
  20. PrivateKey: newkey(),
  21. newPeerHook: pf,
  22. setupFunc: func(fd net.Conn, prv *ecdsa.PrivateKey, our *protoHandshake, dial *discover.Node, keepconn func(discover.NodeID) bool) (*conn, error) {
  23. id := randomID()
  24. if !keepconn(id) {
  25. return nil, DiscAlreadyConnected
  26. }
  27. rw := newRlpxFrameRW(fd, secrets{
  28. MAC: zero16,
  29. AES: zero16,
  30. IngressMAC: sha3.NewKeccak256(),
  31. EgressMAC: sha3.NewKeccak256(),
  32. })
  33. return &conn{
  34. MsgReadWriter: rw,
  35. protoHandshake: &protoHandshake{ID: id, Version: baseProtocolVersion},
  36. }, nil
  37. },
  38. }
  39. if err := server.Start(); err != nil {
  40. t.Fatalf("Could not start server: %v", err)
  41. }
  42. return server
  43. }
  44. func TestServerListen(t *testing.T) {
  45. defer testlog(t).detach()
  46. // start the test server
  47. connected := make(chan *Peer)
  48. srv := startTestServer(t, func(p *Peer) {
  49. if p == nil {
  50. t.Error("peer func called with nil conn")
  51. }
  52. connected <- p
  53. })
  54. defer close(connected)
  55. defer srv.Stop()
  56. // dial the test server
  57. conn, err := net.DialTimeout("tcp", srv.ListenAddr, 5*time.Second)
  58. if err != nil {
  59. t.Fatalf("could not dial: %v", err)
  60. }
  61. defer conn.Close()
  62. select {
  63. case peer := <-connected:
  64. if peer.LocalAddr().String() != conn.RemoteAddr().String() {
  65. t.Errorf("peer started with wrong conn: got %v, want %v",
  66. peer.LocalAddr(), conn.RemoteAddr())
  67. }
  68. case <-time.After(1 * time.Second):
  69. t.Error("server did not accept within one second")
  70. }
  71. }
  72. func TestServerDial(t *testing.T) {
  73. defer testlog(t).detach()
  74. // run a one-shot TCP server to handle the connection.
  75. listener, err := net.Listen("tcp", "127.0.0.1:0")
  76. if err != nil {
  77. t.Fatalf("could not setup listener: %v")
  78. }
  79. defer listener.Close()
  80. accepted := make(chan net.Conn)
  81. go func() {
  82. conn, err := listener.Accept()
  83. if err != nil {
  84. t.Error("accept error:", err)
  85. return
  86. }
  87. conn.Close()
  88. accepted <- conn
  89. }()
  90. // start the server
  91. connected := make(chan *Peer)
  92. srv := startTestServer(t, func(p *Peer) { connected <- p })
  93. defer close(connected)
  94. defer srv.Stop()
  95. // tell the server to connect
  96. tcpAddr := listener.Addr().(*net.TCPAddr)
  97. srv.staticDial <- &discover.Node{IP: tcpAddr.IP, TCP: uint16(tcpAddr.Port)}
  98. select {
  99. case conn := <-accepted:
  100. select {
  101. case peer := <-connected:
  102. if peer.RemoteAddr().String() != conn.LocalAddr().String() {
  103. t.Errorf("peer started with wrong conn: got %v, want %v",
  104. peer.RemoteAddr(), conn.LocalAddr())
  105. }
  106. // TODO: validate more fields
  107. case <-time.After(1 * time.Second):
  108. t.Error("server did not launch peer within one second")
  109. }
  110. case <-time.After(1 * time.Second):
  111. t.Error("server did not connect within one second")
  112. }
  113. }
  114. func TestServerBroadcast(t *testing.T) {
  115. defer testlog(t).detach()
  116. var connected sync.WaitGroup
  117. srv := startTestServer(t, func(p *Peer) {
  118. p.running = matchProtocols([]Protocol{discard}, []Cap{discard.cap()}, p.rw)
  119. connected.Done()
  120. })
  121. defer srv.Stop()
  122. // create a few peers
  123. var conns = make([]net.Conn, 8)
  124. connected.Add(len(conns))
  125. deadline := time.Now().Add(3 * time.Second)
  126. dialer := &net.Dialer{Deadline: deadline}
  127. for i := range conns {
  128. conn, err := dialer.Dial("tcp", srv.ListenAddr)
  129. if err != nil {
  130. t.Fatalf("conn %d: dial error: %v", i, err)
  131. }
  132. defer conn.Close()
  133. conn.SetDeadline(deadline)
  134. conns[i] = conn
  135. }
  136. connected.Wait()
  137. // broadcast one message
  138. srv.Broadcast("discard", 0, []string{"foo"})
  139. golden := unhex("66e94d166f0a2c3b884cfa59ca34")
  140. // check that the message has been written everywhere
  141. for i, conn := range conns {
  142. buf := make([]byte, len(golden))
  143. if _, err := io.ReadFull(conn, buf); err != nil {
  144. t.Errorf("conn %d: read error: %v", i, err)
  145. } else if !bytes.Equal(buf, golden) {
  146. t.Errorf("conn %d: msg mismatch\ngot: %x\nwant: %x", i, buf, golden)
  147. }
  148. }
  149. }
  150. // This test checks that connections are disconnected
  151. // just after the encryption handshake when the server is
  152. // at capacity.
  153. //
  154. // It also serves as a light-weight integration test.
  155. func TestServerDisconnectAtCap(t *testing.T) {
  156. defer testlog(t).detach()
  157. started := make(chan *Peer)
  158. srv := &Server{
  159. ListenAddr: "127.0.0.1:0",
  160. PrivateKey: newkey(),
  161. MaxPeers: 10,
  162. NoDial: true,
  163. // This hook signals that the peer was actually started. We
  164. // need to wait for the peer to be started before dialing the
  165. // next connection to get a deterministic peer count.
  166. newPeerHook: func(p *Peer) { started <- p },
  167. }
  168. if err := srv.Start(); err != nil {
  169. t.Fatal(err)
  170. }
  171. defer srv.Stop()
  172. nconns := srv.MaxPeers + 1
  173. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  174. for i := 0; i < nconns; i++ {
  175. conn, err := dialer.Dial("tcp", srv.ListenAddr)
  176. if err != nil {
  177. t.Fatalf("conn %d: dial error: %v", i, err)
  178. }
  179. // Close the connection when the test ends, before
  180. // shutting down the server.
  181. defer conn.Close()
  182. // Run the handshakes just like a real peer would.
  183. key := newkey()
  184. hs := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  185. _, err = setupConn(conn, key, hs, srv.Self(), keepalways)
  186. if i == nconns-1 {
  187. // When handling the last connection, the server should
  188. // disconnect immediately instead of running the protocol
  189. // handshake.
  190. if err != DiscTooManyPeers {
  191. t.Errorf("conn %d: got error %q, expected %q", i, err, DiscTooManyPeers)
  192. }
  193. } else {
  194. // For all earlier connections, the handshake should go through.
  195. if err != nil {
  196. t.Fatalf("conn %d: unexpected error: %v", i, err)
  197. }
  198. // Wait for runPeer to be started.
  199. <-started
  200. }
  201. }
  202. }
  203. // Tests that static peers are (re)connected, and done so even above max peers.
  204. func TestServerStaticPeers(t *testing.T) {
  205. defer testlog(t).detach()
  206. // Create a test server with limited connection slots
  207. started := make(chan *Peer)
  208. server := &Server{
  209. ListenAddr: "127.0.0.1:0",
  210. PrivateKey: newkey(),
  211. MaxPeers: 3,
  212. newPeerHook: func(p *Peer) { started <- p },
  213. staticCycle: time.Second,
  214. }
  215. if err := server.Start(); err != nil {
  216. t.Fatal(err)
  217. }
  218. defer server.Stop()
  219. // Fill up all the slots on the server
  220. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  221. for i := 0; i < server.MaxPeers; i++ {
  222. // Establish a new connection
  223. conn, err := dialer.Dial("tcp", server.ListenAddr)
  224. if err != nil {
  225. t.Fatalf("conn %d: dial error: %v", i, err)
  226. }
  227. defer conn.Close()
  228. // Run the handshakes just like a real peer would, and wait for completion
  229. key := newkey()
  230. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  231. if _, err = setupConn(conn, key, shake, server.Self(), keepalways); err != nil {
  232. t.Fatalf("conn %d: unexpected error: %v", i, err)
  233. }
  234. <-started
  235. }
  236. // Open a TCP listener to accept static connections
  237. listener, err := net.Listen("tcp", "127.0.0.1:0")
  238. if err != nil {
  239. t.Fatalf("failed to setup listener: %v", err)
  240. }
  241. defer listener.Close()
  242. connected := make(chan net.Conn)
  243. go func() {
  244. for i := 0; i < 3; i++ {
  245. conn, err := listener.Accept()
  246. if err == nil {
  247. connected <- conn
  248. }
  249. }
  250. }()
  251. // Inject a static node and wait for a remote dial, then redial, then nothing
  252. addr := listener.Addr().(*net.TCPAddr)
  253. static := &discover.Node{
  254. ID: discover.PubkeyID(&newkey().PublicKey),
  255. IP: addr.IP,
  256. TCP: uint16(addr.Port),
  257. }
  258. server.AddPeer(static)
  259. select {
  260. case conn := <-connected:
  261. // Close the first connection, expect redial
  262. conn.Close()
  263. case <-time.After(2 * server.staticCycle):
  264. t.Fatalf("remote dial timeout")
  265. }
  266. select {
  267. case conn := <-connected:
  268. // Keep the second connection, don't expect redial
  269. defer conn.Close()
  270. case <-time.After(2 * server.staticCycle):
  271. t.Fatalf("remote re-dial timeout")
  272. }
  273. select {
  274. case <-time.After(2 * server.staticCycle):
  275. // Timeout as no dial occurred
  276. case <-connected:
  277. t.Fatalf("connected node dialed")
  278. }
  279. }
  280. // Tests that trusted peers and can connect above max peer caps.
  281. func TestServerTrustedPeers(t *testing.T) {
  282. defer testlog(t).detach()
  283. // Create a trusted peer to accept connections from
  284. key := newkey()
  285. trusted := &discover.Node{
  286. ID: discover.PubkeyID(&key.PublicKey),
  287. }
  288. // Create a test server with limited connection slots
  289. started := make(chan *Peer)
  290. server := &Server{
  291. ListenAddr: "127.0.0.1:0",
  292. PrivateKey: newkey(),
  293. MaxPeers: 3,
  294. NoDial: true,
  295. TrustedNodes: []*discover.Node{trusted},
  296. newPeerHook: func(p *Peer) { started <- p },
  297. }
  298. if err := server.Start(); err != nil {
  299. t.Fatal(err)
  300. }
  301. defer server.Stop()
  302. // Fill up all the slots on the server
  303. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  304. for i := 0; i < server.MaxPeers; i++ {
  305. // Establish a new connection
  306. conn, err := dialer.Dial("tcp", server.ListenAddr)
  307. if err != nil {
  308. t.Fatalf("conn %d: dial error: %v", i, err)
  309. }
  310. defer conn.Close()
  311. // Run the handshakes just like a real peer would, and wait for completion
  312. key := newkey()
  313. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  314. if _, err = setupConn(conn, key, shake, server.Self(), keepalways); err != nil {
  315. t.Fatalf("conn %d: unexpected error: %v", i, err)
  316. }
  317. <-started
  318. }
  319. // Dial from the trusted peer, ensure connection is accepted
  320. conn, err := dialer.Dial("tcp", server.ListenAddr)
  321. if err != nil {
  322. t.Fatalf("trusted node: dial error: %v", err)
  323. }
  324. defer conn.Close()
  325. shake := &protoHandshake{Version: baseProtocolVersion, ID: trusted.ID}
  326. if _, err = setupConn(conn, key, shake, server.Self(), keepalways); err != nil {
  327. t.Fatalf("trusted node: unexpected error: %v", err)
  328. }
  329. select {
  330. case <-started:
  331. // Ok, trusted peer accepted
  332. case <-time.After(100 * time.Millisecond):
  333. t.Fatalf("trusted node timeout")
  334. }
  335. }
  336. // Tests that a failed dial will temporarily throttle a peer.
  337. func TestServerMaxPendingDials(t *testing.T) {
  338. defer testlog(t).detach()
  339. // Start a simple test server
  340. server := &Server{
  341. ListenAddr: "127.0.0.1:0",
  342. PrivateKey: newkey(),
  343. MaxPeers: 10,
  344. MaxPendingPeers: 1,
  345. }
  346. if err := server.Start(); err != nil {
  347. t.Fatal("failed to start test server: %v", err)
  348. }
  349. defer server.Stop()
  350. // Simulate two separate remote peers
  351. peers := make(chan *discover.Node, 2)
  352. conns := make(chan net.Conn, 2)
  353. for i := 0; i < 2; i++ {
  354. listener, err := net.Listen("tcp", "127.0.0.1:0")
  355. if err != nil {
  356. t.Fatalf("listener %d: failed to setup: %v", i, err)
  357. }
  358. defer listener.Close()
  359. addr := listener.Addr().(*net.TCPAddr)
  360. peers <- &discover.Node{
  361. ID: discover.PubkeyID(&newkey().PublicKey),
  362. IP: addr.IP,
  363. TCP: uint16(addr.Port),
  364. }
  365. go func() {
  366. conn, err := listener.Accept()
  367. if err == nil {
  368. conns <- conn
  369. }
  370. }()
  371. }
  372. // Request a dial for both peers
  373. go func() {
  374. for i := 0; i < 2; i++ {
  375. server.staticDial <- <-peers // hack piggybacking the static implementation
  376. }
  377. }()
  378. // Make sure only one outbound connection goes through
  379. var conn net.Conn
  380. select {
  381. case conn = <-conns:
  382. case <-time.After(100 * time.Millisecond):
  383. t.Fatalf("first dial timeout")
  384. }
  385. select {
  386. case conn = <-conns:
  387. t.Fatalf("second dial completed prematurely")
  388. case <-time.After(100 * time.Millisecond):
  389. }
  390. // Finish the first dial, check the second
  391. conn.Close()
  392. select {
  393. case conn = <-conns:
  394. conn.Close()
  395. case <-time.After(100 * time.Millisecond):
  396. t.Fatalf("second dial timeout")
  397. }
  398. }
  399. func TestServerMaxPendingAccepts(t *testing.T) {
  400. defer testlog(t).detach()
  401. // Start a test server and a peer sink for synchronization
  402. started := make(chan *Peer)
  403. server := &Server{
  404. ListenAddr: "127.0.0.1:0",
  405. PrivateKey: newkey(),
  406. MaxPeers: 10,
  407. MaxPendingPeers: 1,
  408. NoDial: true,
  409. newPeerHook: func(p *Peer) { started <- p },
  410. }
  411. if err := server.Start(); err != nil {
  412. t.Fatal("failed to start test server: %v", err)
  413. }
  414. defer server.Stop()
  415. // Try and connect to the server on multiple threads concurrently
  416. conns := make([]net.Conn, 2)
  417. for i := 0; i < 2; i++ {
  418. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  419. conn, err := dialer.Dial("tcp", server.ListenAddr)
  420. if err != nil {
  421. t.Fatalf("failed to dial server: %v", err)
  422. }
  423. conns[i] = conn
  424. }
  425. // Check that a handshake on the second doesn't pass
  426. go func() {
  427. key := newkey()
  428. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  429. if _, err := setupConn(conns[1], key, shake, server.Self(), keepalways); err != nil {
  430. t.Fatalf("failed to run handshake: %v", err)
  431. }
  432. }()
  433. select {
  434. case <-started:
  435. t.Fatalf("handshake on second connection accepted")
  436. case <-time.After(time.Second):
  437. }
  438. // Shake on first, check that both go through
  439. go func() {
  440. key := newkey()
  441. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  442. if _, err := setupConn(conns[0], key, shake, server.Self(), keepalways); err != nil {
  443. t.Fatalf("failed to run handshake: %v", err)
  444. }
  445. }()
  446. for i := 0; i < 2; i++ {
  447. select {
  448. case <-started:
  449. case <-time.After(time.Second):
  450. t.Fatalf("peer %d: handshake timeout", i)
  451. }
  452. }
  453. }
  454. func newkey() *ecdsa.PrivateKey {
  455. key, err := crypto.GenerateKey()
  456. if err != nil {
  457. panic("couldn't generate key: " + err.Error())
  458. }
  459. return key
  460. }
  461. func randomID() (id discover.NodeID) {
  462. for i := range id {
  463. id[i] = byte(rand.Intn(255))
  464. }
  465. return id
  466. }
  467. func keepalways(id discover.NodeID) bool {
  468. return true
  469. }