server_test.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602
  1. // Copyright 2014 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package p2p
  17. import (
  18. "crypto/ecdsa"
  19. "errors"
  20. "math/rand"
  21. "net"
  22. "reflect"
  23. "testing"
  24. "time"
  25. "github.com/ethereum/go-ethereum/crypto"
  26. "github.com/ethereum/go-ethereum/crypto/sha3"
  27. "github.com/ethereum/go-ethereum/log"
  28. "github.com/ethereum/go-ethereum/p2p/discover"
  29. )
  30. func init() {
  31. // log.Root().SetHandler(log.LvlFilterHandler(log.LvlError, log.StreamHandler(os.Stderr, log.TerminalFormat(false))))
  32. }
  33. type testTransport struct {
  34. id discover.NodeID
  35. *rlpx
  36. closeErr error
  37. }
  38. func newTestTransport(id discover.NodeID, fd net.Conn) transport {
  39. wrapped := newRLPX(fd).(*rlpx)
  40. wrapped.rw = newRLPXFrameRW(fd, secrets{
  41. MAC: zero16,
  42. AES: zero16,
  43. IngressMAC: sha3.NewKeccak256(),
  44. EgressMAC: sha3.NewKeccak256(),
  45. })
  46. return &testTransport{id: id, rlpx: wrapped}
  47. }
  48. func (c *testTransport) doEncHandshake(prv *ecdsa.PrivateKey, dialDest *discover.Node) (discover.NodeID, error) {
  49. return c.id, nil
  50. }
  51. func (c *testTransport) doProtoHandshake(our *protoHandshake) (*protoHandshake, error) {
  52. return &protoHandshake{ID: c.id, Name: "test"}, nil
  53. }
  54. func (c *testTransport) close(err error) {
  55. c.rlpx.fd.Close()
  56. c.closeErr = err
  57. }
  58. func startTestServer(t *testing.T, id discover.NodeID, pf func(*Peer)) *Server {
  59. config := Config{
  60. Name: "test",
  61. MaxPeers: 10,
  62. ListenAddr: "127.0.0.1:0",
  63. PrivateKey: newkey(),
  64. }
  65. server := &Server{
  66. Config: config,
  67. newPeerHook: pf,
  68. newTransport: func(fd net.Conn) transport { return newTestTransport(id, fd) },
  69. }
  70. if err := server.Start(); err != nil {
  71. t.Fatalf("Could not start server: %v", err)
  72. }
  73. return server
  74. }
  75. func TestServerListen(t *testing.T) {
  76. // start the test server
  77. connected := make(chan *Peer)
  78. remid := randomID()
  79. srv := startTestServer(t, remid, func(p *Peer) {
  80. if p.ID() != remid {
  81. t.Error("peer func called with wrong node id")
  82. }
  83. if p == nil {
  84. t.Error("peer func called with nil conn")
  85. }
  86. connected <- p
  87. })
  88. defer close(connected)
  89. defer srv.Stop()
  90. // dial the test server
  91. conn, err := net.DialTimeout("tcp", srv.ListenAddr, 5*time.Second)
  92. if err != nil {
  93. t.Fatalf("could not dial: %v", err)
  94. }
  95. defer conn.Close()
  96. select {
  97. case peer := <-connected:
  98. if peer.LocalAddr().String() != conn.RemoteAddr().String() {
  99. t.Errorf("peer started with wrong conn: got %v, want %v",
  100. peer.LocalAddr(), conn.RemoteAddr())
  101. }
  102. peers := srv.Peers()
  103. if !reflect.DeepEqual(peers, []*Peer{peer}) {
  104. t.Errorf("Peers mismatch: got %v, want %v", peers, []*Peer{peer})
  105. }
  106. case <-time.After(1 * time.Second):
  107. t.Error("server did not accept within one second")
  108. }
  109. }
  110. func TestServerDial(t *testing.T) {
  111. // run a one-shot TCP server to handle the connection.
  112. listener, err := net.Listen("tcp", "127.0.0.1:0")
  113. if err != nil {
  114. t.Fatalf("could not setup listener: %v", err)
  115. }
  116. defer listener.Close()
  117. accepted := make(chan net.Conn)
  118. go func() {
  119. conn, err := listener.Accept()
  120. if err != nil {
  121. t.Error("accept error:", err)
  122. return
  123. }
  124. accepted <- conn
  125. }()
  126. // start the server
  127. connected := make(chan *Peer)
  128. remid := randomID()
  129. srv := startTestServer(t, remid, func(p *Peer) { connected <- p })
  130. defer close(connected)
  131. defer srv.Stop()
  132. // tell the server to connect
  133. tcpAddr := listener.Addr().(*net.TCPAddr)
  134. node := &discover.Node{ID: remid, IP: tcpAddr.IP, TCP: uint16(tcpAddr.Port)}
  135. srv.AddPeer(node)
  136. select {
  137. case conn := <-accepted:
  138. defer conn.Close()
  139. select {
  140. case peer := <-connected:
  141. if peer.ID() != remid {
  142. t.Errorf("peer has wrong id")
  143. }
  144. if peer.Name() != "test" {
  145. t.Errorf("peer has wrong name")
  146. }
  147. if peer.RemoteAddr().String() != conn.LocalAddr().String() {
  148. t.Errorf("peer started with wrong conn: got %v, want %v",
  149. peer.RemoteAddr(), conn.LocalAddr())
  150. }
  151. peers := srv.Peers()
  152. if !reflect.DeepEqual(peers, []*Peer{peer}) {
  153. t.Errorf("Peers mismatch: got %v, want %v", peers, []*Peer{peer})
  154. }
  155. // Test AddTrustedPeer/RemoveTrustedPeer and changing Trusted flags
  156. // Particularly for race conditions on changing the flag state.
  157. if peer := srv.Peers()[0]; peer.Info().Network.Trusted {
  158. t.Errorf("peer is trusted prematurely: %v", peer)
  159. }
  160. srv.AddTrustedPeer(node)
  161. if peer := srv.Peers()[0]; !peer.Info().Network.Trusted {
  162. t.Errorf("peer is not trusted after AddTrustedPeer: %v", peer)
  163. }
  164. srv.RemoveTrustedPeer(node)
  165. if peer := srv.Peers()[0]; peer.Info().Network.Trusted {
  166. t.Errorf("peer is trusted after RemoveTrustedPeer: %v", peer)
  167. }
  168. case <-time.After(1 * time.Second):
  169. t.Error("server did not launch peer within one second")
  170. }
  171. case <-time.After(1 * time.Second):
  172. t.Error("server did not connect within one second")
  173. }
  174. }
  175. // This test checks that tasks generated by dialstate are
  176. // actually executed and taskdone is called for them.
  177. func TestServerTaskScheduling(t *testing.T) {
  178. var (
  179. done = make(chan *testTask)
  180. quit, returned = make(chan struct{}), make(chan struct{})
  181. tc = 0
  182. tg = taskgen{
  183. newFunc: func(running int, peers map[discover.NodeID]*Peer) []task {
  184. tc++
  185. return []task{&testTask{index: tc - 1}}
  186. },
  187. doneFunc: func(t task) {
  188. select {
  189. case done <- t.(*testTask):
  190. case <-quit:
  191. }
  192. },
  193. }
  194. )
  195. // The Server in this test isn't actually running
  196. // because we're only interested in what run does.
  197. srv := &Server{
  198. Config: Config{MaxPeers: 10},
  199. quit: make(chan struct{}),
  200. ntab: fakeTable{},
  201. running: true,
  202. log: log.New(),
  203. }
  204. srv.loopWG.Add(1)
  205. go func() {
  206. srv.run(tg)
  207. close(returned)
  208. }()
  209. var gotdone []*testTask
  210. for i := 0; i < 100; i++ {
  211. gotdone = append(gotdone, <-done)
  212. }
  213. for i, task := range gotdone {
  214. if task.index != i {
  215. t.Errorf("task %d has wrong index, got %d", i, task.index)
  216. break
  217. }
  218. if !task.called {
  219. t.Errorf("task %d was not called", i)
  220. break
  221. }
  222. }
  223. close(quit)
  224. srv.Stop()
  225. select {
  226. case <-returned:
  227. case <-time.After(500 * time.Millisecond):
  228. t.Error("Server.run did not return within 500ms")
  229. }
  230. }
  231. // This test checks that Server doesn't drop tasks,
  232. // even if newTasks returns more than the maximum number of tasks.
  233. func TestServerManyTasks(t *testing.T) {
  234. alltasks := make([]task, 300)
  235. for i := range alltasks {
  236. alltasks[i] = &testTask{index: i}
  237. }
  238. var (
  239. srv = &Server{
  240. quit: make(chan struct{}),
  241. ntab: fakeTable{},
  242. running: true,
  243. log: log.New(),
  244. }
  245. done = make(chan *testTask)
  246. start, end = 0, 0
  247. )
  248. defer srv.Stop()
  249. srv.loopWG.Add(1)
  250. go srv.run(taskgen{
  251. newFunc: func(running int, peers map[discover.NodeID]*Peer) []task {
  252. start, end = end, end+maxActiveDialTasks+10
  253. if end > len(alltasks) {
  254. end = len(alltasks)
  255. }
  256. return alltasks[start:end]
  257. },
  258. doneFunc: func(tt task) {
  259. done <- tt.(*testTask)
  260. },
  261. })
  262. doneset := make(map[int]bool)
  263. timeout := time.After(2 * time.Second)
  264. for len(doneset) < len(alltasks) {
  265. select {
  266. case tt := <-done:
  267. if doneset[tt.index] {
  268. t.Errorf("task %d got done more than once", tt.index)
  269. } else {
  270. doneset[tt.index] = true
  271. }
  272. case <-timeout:
  273. t.Errorf("%d of %d tasks got done within 2s", len(doneset), len(alltasks))
  274. for i := 0; i < len(alltasks); i++ {
  275. if !doneset[i] {
  276. t.Logf("task %d not done", i)
  277. }
  278. }
  279. return
  280. }
  281. }
  282. }
  283. type taskgen struct {
  284. newFunc func(running int, peers map[discover.NodeID]*Peer) []task
  285. doneFunc func(task)
  286. }
  287. func (tg taskgen) newTasks(running int, peers map[discover.NodeID]*Peer, now time.Time) []task {
  288. return tg.newFunc(running, peers)
  289. }
  290. func (tg taskgen) taskDone(t task, now time.Time) {
  291. tg.doneFunc(t)
  292. }
  293. func (tg taskgen) addStatic(*discover.Node) {
  294. }
  295. func (tg taskgen) removeStatic(*discover.Node) {
  296. }
  297. type testTask struct {
  298. index int
  299. called bool
  300. }
  301. func (t *testTask) Do(srv *Server) {
  302. t.called = true
  303. }
  304. // This test checks that connections are disconnected
  305. // just after the encryption handshake when the server is
  306. // at capacity. Trusted connections should still be accepted.
  307. func TestServerAtCap(t *testing.T) {
  308. trustedID := randomID()
  309. srv := &Server{
  310. Config: Config{
  311. PrivateKey: newkey(),
  312. MaxPeers: 10,
  313. NoDial: true,
  314. TrustedNodes: []*discover.Node{{ID: trustedID}},
  315. },
  316. }
  317. if err := srv.Start(); err != nil {
  318. t.Fatalf("could not start: %v", err)
  319. }
  320. defer srv.Stop()
  321. newconn := func(id discover.NodeID) *conn {
  322. fd, _ := net.Pipe()
  323. tx := newTestTransport(id, fd)
  324. return &conn{fd: fd, transport: tx, flags: inboundConn, id: id, cont: make(chan error)}
  325. }
  326. // Inject a few connections to fill up the peer set.
  327. for i := 0; i < 10; i++ {
  328. c := newconn(randomID())
  329. if err := srv.checkpoint(c, srv.addpeer); err != nil {
  330. t.Fatalf("could not add conn %d: %v", i, err)
  331. }
  332. }
  333. // Try inserting a non-trusted connection.
  334. anotherID := randomID()
  335. c := newconn(anotherID)
  336. if err := srv.checkpoint(c, srv.posthandshake); err != DiscTooManyPeers {
  337. t.Error("wrong error for insert:", err)
  338. }
  339. // Try inserting a trusted connection.
  340. c = newconn(trustedID)
  341. if err := srv.checkpoint(c, srv.posthandshake); err != nil {
  342. t.Error("unexpected error for trusted conn @posthandshake:", err)
  343. }
  344. if !c.is(trustedConn) {
  345. t.Error("Server did not set trusted flag")
  346. }
  347. // Remove from trusted set and try again
  348. srv.RemoveTrustedPeer(&discover.Node{ID: trustedID})
  349. c = newconn(trustedID)
  350. if err := srv.checkpoint(c, srv.posthandshake); err != DiscTooManyPeers {
  351. t.Error("wrong error for insert:", err)
  352. }
  353. // Add anotherID to trusted set and try again
  354. srv.AddTrustedPeer(&discover.Node{ID: anotherID})
  355. c = newconn(anotherID)
  356. if err := srv.checkpoint(c, srv.posthandshake); err != nil {
  357. t.Error("unexpected error for trusted conn @posthandshake:", err)
  358. }
  359. if !c.is(trustedConn) {
  360. t.Error("Server did not set trusted flag")
  361. }
  362. }
  363. func TestServerPeerLimits(t *testing.T) {
  364. srvkey := newkey()
  365. clientid := randomID()
  366. clientnode := &discover.Node{ID: clientid}
  367. var tp *setupTransport = &setupTransport{
  368. id: clientid,
  369. phs: &protoHandshake{
  370. ID: clientid,
  371. // Force "DiscUselessPeer" due to unmatching caps
  372. // Caps: []Cap{discard.cap()},
  373. },
  374. }
  375. var flags connFlag = dynDialedConn
  376. var dialDest *discover.Node = &discover.Node{ID: clientid}
  377. srv := &Server{
  378. Config: Config{
  379. PrivateKey: srvkey,
  380. MaxPeers: 0,
  381. NoDial: true,
  382. Protocols: []Protocol{discard},
  383. },
  384. newTransport: func(fd net.Conn) transport { return tp },
  385. log: log.New(),
  386. }
  387. if err := srv.Start(); err != nil {
  388. t.Fatalf("couldn't start server: %v", err)
  389. }
  390. defer srv.Stop()
  391. // Check that server is full (MaxPeers=0)
  392. conn, _ := net.Pipe()
  393. srv.SetupConn(conn, flags, dialDest)
  394. if tp.closeErr != DiscTooManyPeers {
  395. t.Errorf("unexpected close error: %q", tp.closeErr)
  396. }
  397. conn.Close()
  398. srv.AddTrustedPeer(clientnode)
  399. // Check that server allows a trusted peer despite being full.
  400. conn, _ = net.Pipe()
  401. srv.SetupConn(conn, flags, dialDest)
  402. if tp.closeErr == DiscTooManyPeers {
  403. t.Errorf("failed to bypass MaxPeers with trusted node: %q", tp.closeErr)
  404. }
  405. if tp.closeErr != DiscUselessPeer {
  406. t.Errorf("unexpected close error: %q", tp.closeErr)
  407. }
  408. conn.Close()
  409. srv.RemoveTrustedPeer(clientnode)
  410. // Check that server is full again.
  411. conn, _ = net.Pipe()
  412. srv.SetupConn(conn, flags, dialDest)
  413. if tp.closeErr != DiscTooManyPeers {
  414. t.Errorf("unexpected close error: %q", tp.closeErr)
  415. }
  416. conn.Close()
  417. }
  418. func TestServerSetupConn(t *testing.T) {
  419. id := randomID()
  420. srvkey := newkey()
  421. srvid := discover.PubkeyID(&srvkey.PublicKey)
  422. tests := []struct {
  423. dontstart bool
  424. tt *setupTransport
  425. flags connFlag
  426. dialDest *discover.Node
  427. wantCloseErr error
  428. wantCalls string
  429. }{
  430. {
  431. dontstart: true,
  432. tt: &setupTransport{id: id},
  433. wantCalls: "close,",
  434. wantCloseErr: errServerStopped,
  435. },
  436. {
  437. tt: &setupTransport{id: id, encHandshakeErr: errors.New("read error")},
  438. flags: inboundConn,
  439. wantCalls: "doEncHandshake,close,",
  440. wantCloseErr: errors.New("read error"),
  441. },
  442. {
  443. tt: &setupTransport{id: id},
  444. dialDest: &discover.Node{ID: randomID()},
  445. flags: dynDialedConn,
  446. wantCalls: "doEncHandshake,close,",
  447. wantCloseErr: DiscUnexpectedIdentity,
  448. },
  449. {
  450. tt: &setupTransport{id: id, phs: &protoHandshake{ID: randomID()}},
  451. dialDest: &discover.Node{ID: id},
  452. flags: dynDialedConn,
  453. wantCalls: "doEncHandshake,doProtoHandshake,close,",
  454. wantCloseErr: DiscUnexpectedIdentity,
  455. },
  456. {
  457. tt: &setupTransport{id: id, protoHandshakeErr: errors.New("foo")},
  458. dialDest: &discover.Node{ID: id},
  459. flags: dynDialedConn,
  460. wantCalls: "doEncHandshake,doProtoHandshake,close,",
  461. wantCloseErr: errors.New("foo"),
  462. },
  463. {
  464. tt: &setupTransport{id: srvid, phs: &protoHandshake{ID: srvid}},
  465. flags: inboundConn,
  466. wantCalls: "doEncHandshake,close,",
  467. wantCloseErr: DiscSelf,
  468. },
  469. {
  470. tt: &setupTransport{id: id, phs: &protoHandshake{ID: id}},
  471. flags: inboundConn,
  472. wantCalls: "doEncHandshake,doProtoHandshake,close,",
  473. wantCloseErr: DiscUselessPeer,
  474. },
  475. }
  476. for i, test := range tests {
  477. srv := &Server{
  478. Config: Config{
  479. PrivateKey: srvkey,
  480. MaxPeers: 10,
  481. NoDial: true,
  482. Protocols: []Protocol{discard},
  483. },
  484. newTransport: func(fd net.Conn) transport { return test.tt },
  485. log: log.New(),
  486. }
  487. if !test.dontstart {
  488. if err := srv.Start(); err != nil {
  489. t.Fatalf("couldn't start server: %v", err)
  490. }
  491. }
  492. p1, _ := net.Pipe()
  493. srv.SetupConn(p1, test.flags, test.dialDest)
  494. if !reflect.DeepEqual(test.tt.closeErr, test.wantCloseErr) {
  495. t.Errorf("test %d: close error mismatch: got %q, want %q", i, test.tt.closeErr, test.wantCloseErr)
  496. }
  497. if test.tt.calls != test.wantCalls {
  498. t.Errorf("test %d: calls mismatch: got %q, want %q", i, test.tt.calls, test.wantCalls)
  499. }
  500. }
  501. }
  502. type setupTransport struct {
  503. id discover.NodeID
  504. encHandshakeErr error
  505. phs *protoHandshake
  506. protoHandshakeErr error
  507. calls string
  508. closeErr error
  509. }
  510. func (c *setupTransport) doEncHandshake(prv *ecdsa.PrivateKey, dialDest *discover.Node) (discover.NodeID, error) {
  511. c.calls += "doEncHandshake,"
  512. return c.id, c.encHandshakeErr
  513. }
  514. func (c *setupTransport) doProtoHandshake(our *protoHandshake) (*protoHandshake, error) {
  515. c.calls += "doProtoHandshake,"
  516. if c.protoHandshakeErr != nil {
  517. return nil, c.protoHandshakeErr
  518. }
  519. return c.phs, nil
  520. }
  521. func (c *setupTransport) close(err error) {
  522. c.calls += "close,"
  523. c.closeErr = err
  524. }
  525. // setupConn shouldn't write to/read from the connection.
  526. func (c *setupTransport) WriteMsg(Msg) error {
  527. panic("WriteMsg called on setupTransport")
  528. }
  529. func (c *setupTransport) ReadMsg() (Msg, error) {
  530. panic("ReadMsg called on setupTransport")
  531. }
  532. func newkey() *ecdsa.PrivateKey {
  533. key, err := crypto.GenerateKey()
  534. if err != nil {
  535. panic("couldn't generate key: " + err.Error())
  536. }
  537. return key
  538. }
  539. func randomID() (id discover.NodeID) {
  540. for i := range id {
  541. id[i] = byte(rand.Intn(255))
  542. }
  543. return id
  544. }