peer_test.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package p2p
  2. import (
  3. "bytes"
  4. "fmt"
  5. // "net"
  6. "testing"
  7. "time"
  8. )
  9. func TestPeer(t *testing.T) {
  10. handlers := make(Handlers)
  11. testProtocol := &TestProtocol{Msgs: []*Msg{}}
  12. handlers["aaa"] = func(p *Peer) Protocol { return testProtocol }
  13. handlers["ccc"] = func(p *Peer) Protocol { return testProtocol }
  14. addr := &TestAddr{"test:30"}
  15. conn := NewTestNetworkConnection(addr)
  16. _, server := SetupTestServer(handlers)
  17. server.Handshake()
  18. peer := NewPeer(conn, addr, true, server)
  19. // peer.Messenger().AddProtocols([]string{"aaa", "ccc"})
  20. peer.Start()
  21. defer peer.Stop()
  22. time.Sleep(2 * time.Millisecond)
  23. if len(conn.Out) != 1 {
  24. t.Errorf("handshake not sent")
  25. } else {
  26. out := conn.Out[0]
  27. packet := Packet(0, HandshakeMsg, P2PVersion, []byte(peer.server.identity.String()), []interface{}{peer.server.protocols}, peer.server.port, peer.server.identity.Pubkey()[1:])
  28. if bytes.Compare(out, packet) != 0 {
  29. t.Errorf("incorrect handshake packet %v != %v", out, packet)
  30. }
  31. }
  32. packet := Packet(0, HandshakeMsg, P2PVersion, []byte("peer"), []interface{}{"bbb", "aaa", "ccc"}, 30, []byte("0000000000000000000000000000000000000000000000000000000000000000"))
  33. conn.In(0, packet)
  34. time.Sleep(10 * time.Millisecond)
  35. pro, _ := peer.Messenger().protocols[0].(*BaseProtocol)
  36. if pro.state != handshakeReceived {
  37. t.Errorf("handshake not received")
  38. }
  39. if peer.Port != 30 {
  40. t.Errorf("port incorrectly set")
  41. }
  42. if peer.Id != "peer" {
  43. t.Errorf("id incorrectly set")
  44. }
  45. if string(peer.Pubkey) != "0000000000000000000000000000000000000000000000000000000000000000" {
  46. t.Errorf("pubkey incorrectly set")
  47. }
  48. fmt.Println(peer.Caps)
  49. if len(peer.Caps) != 3 || peer.Caps[0] != "aaa" || peer.Caps[1] != "bbb" || peer.Caps[2] != "ccc" {
  50. t.Errorf("protocols incorrectly set")
  51. }
  52. msg, _ := NewMsg(3)
  53. err := peer.Write("aaa", msg)
  54. if err != nil {
  55. t.Errorf("expect no error for known protocol: %v", err)
  56. } else {
  57. time.Sleep(1 * time.Millisecond)
  58. if len(conn.Out) != 2 {
  59. t.Errorf("msg not written")
  60. } else {
  61. out := conn.Out[1]
  62. packet := Packet(16, 3)
  63. if bytes.Compare(out, packet) != 0 {
  64. t.Errorf("incorrect packet %v != %v", out, packet)
  65. }
  66. }
  67. }
  68. msg, _ = NewMsg(2)
  69. err = peer.Write("ccc", msg)
  70. if err != nil {
  71. t.Errorf("expect no error for known protocol: %v", err)
  72. } else {
  73. time.Sleep(1 * time.Millisecond)
  74. if len(conn.Out) != 3 {
  75. t.Errorf("msg not written")
  76. } else {
  77. out := conn.Out[2]
  78. packet := Packet(21, 2)
  79. if bytes.Compare(out, packet) != 0 {
  80. t.Errorf("incorrect packet %v != %v", out, packet)
  81. }
  82. }
  83. }
  84. err = peer.Write("bbb", msg)
  85. time.Sleep(1 * time.Millisecond)
  86. if err == nil {
  87. t.Errorf("expect error for unknown protocol")
  88. }
  89. }