server_test.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507
  1. package p2p
  2. import (
  3. "bytes"
  4. "crypto/ecdsa"
  5. "io"
  6. "math/rand"
  7. "net"
  8. "sync"
  9. "testing"
  10. "time"
  11. "github.com/ethereum/go-ethereum/crypto"
  12. "github.com/ethereum/go-ethereum/crypto/sha3"
  13. "github.com/ethereum/go-ethereum/p2p/discover"
  14. )
  15. func startTestServer(t *testing.T, pf newPeerHook) *Server {
  16. server := &Server{
  17. Name: "test",
  18. MaxPeers: 10,
  19. ListenAddr: "127.0.0.1:0",
  20. PrivateKey: newkey(),
  21. newPeerHook: pf,
  22. setupFunc: func(fd net.Conn, prv *ecdsa.PrivateKey, our *protoHandshake, dial *discover.Node, keepconn func(discover.NodeID) bool) (*conn, error) {
  23. id := randomID()
  24. if !keepconn(id) {
  25. return nil, DiscAlreadyConnected
  26. }
  27. rw := newRlpxFrameRW(fd, secrets{
  28. MAC: zero16,
  29. AES: zero16,
  30. IngressMAC: sha3.NewKeccak256(),
  31. EgressMAC: sha3.NewKeccak256(),
  32. })
  33. return &conn{
  34. MsgReadWriter: rw,
  35. protoHandshake: &protoHandshake{ID: id, Version: baseProtocolVersion},
  36. }, nil
  37. },
  38. }
  39. if err := server.Start(); err != nil {
  40. t.Fatalf("Could not start server: %v", err)
  41. }
  42. return server
  43. }
  44. func TestServerListen(t *testing.T) {
  45. // start the test server
  46. connected := make(chan *Peer)
  47. srv := startTestServer(t, func(p *Peer) {
  48. if p == nil {
  49. t.Error("peer func called with nil conn")
  50. }
  51. connected <- p
  52. })
  53. defer close(connected)
  54. defer srv.Stop()
  55. // dial the test server
  56. conn, err := net.DialTimeout("tcp", srv.ListenAddr, 5*time.Second)
  57. if err != nil {
  58. t.Fatalf("could not dial: %v", err)
  59. }
  60. defer conn.Close()
  61. select {
  62. case peer := <-connected:
  63. if peer.LocalAddr().String() != conn.RemoteAddr().String() {
  64. t.Errorf("peer started with wrong conn: got %v, want %v",
  65. peer.LocalAddr(), conn.RemoteAddr())
  66. }
  67. case <-time.After(1 * time.Second):
  68. t.Error("server did not accept within one second")
  69. }
  70. }
  71. func TestServerDial(t *testing.T) {
  72. // run a one-shot TCP server to handle the connection.
  73. listener, err := net.Listen("tcp", "127.0.0.1:0")
  74. if err != nil {
  75. t.Fatalf("could not setup listener: %v")
  76. }
  77. defer listener.Close()
  78. accepted := make(chan net.Conn)
  79. go func() {
  80. conn, err := listener.Accept()
  81. if err != nil {
  82. t.Error("accept error:", err)
  83. return
  84. }
  85. conn.Close()
  86. accepted <- conn
  87. }()
  88. // start the server
  89. connected := make(chan *Peer)
  90. srv := startTestServer(t, func(p *Peer) { connected <- p })
  91. defer close(connected)
  92. defer srv.Stop()
  93. // tell the server to connect
  94. tcpAddr := listener.Addr().(*net.TCPAddr)
  95. srv.staticDial <- &discover.Node{IP: tcpAddr.IP, TCP: uint16(tcpAddr.Port)}
  96. select {
  97. case conn := <-accepted:
  98. select {
  99. case peer := <-connected:
  100. if peer.RemoteAddr().String() != conn.LocalAddr().String() {
  101. t.Errorf("peer started with wrong conn: got %v, want %v",
  102. peer.RemoteAddr(), conn.LocalAddr())
  103. }
  104. // TODO: validate more fields
  105. case <-time.After(1 * time.Second):
  106. t.Error("server did not launch peer within one second")
  107. }
  108. case <-time.After(1 * time.Second):
  109. t.Error("server did not connect within one second")
  110. }
  111. }
  112. func TestServerBroadcast(t *testing.T) {
  113. var connected sync.WaitGroup
  114. srv := startTestServer(t, func(p *Peer) {
  115. p.running = matchProtocols([]Protocol{discard}, []Cap{discard.cap()}, p.rw)
  116. connected.Done()
  117. })
  118. defer srv.Stop()
  119. // create a few peers
  120. var conns = make([]net.Conn, 8)
  121. connected.Add(len(conns))
  122. deadline := time.Now().Add(3 * time.Second)
  123. dialer := &net.Dialer{Deadline: deadline}
  124. for i := range conns {
  125. conn, err := dialer.Dial("tcp", srv.ListenAddr)
  126. if err != nil {
  127. t.Fatalf("conn %d: dial error: %v", i, err)
  128. }
  129. defer conn.Close()
  130. conn.SetDeadline(deadline)
  131. conns[i] = conn
  132. }
  133. connected.Wait()
  134. // broadcast one message
  135. srv.Broadcast("discard", 0, []string{"foo"})
  136. golden := unhex("66e94d166f0a2c3b884cfa59ca34")
  137. // check that the message has been written everywhere
  138. for i, conn := range conns {
  139. buf := make([]byte, len(golden))
  140. if _, err := io.ReadFull(conn, buf); err != nil {
  141. t.Errorf("conn %d: read error: %v", i, err)
  142. } else if !bytes.Equal(buf, golden) {
  143. t.Errorf("conn %d: msg mismatch\ngot: %x\nwant: %x", i, buf, golden)
  144. }
  145. }
  146. }
  147. // This test checks that connections are disconnected
  148. // just after the encryption handshake when the server is
  149. // at capacity.
  150. //
  151. // It also serves as a light-weight integration test.
  152. func TestServerDisconnectAtCap(t *testing.T) {
  153. started := make(chan *Peer)
  154. srv := &Server{
  155. ListenAddr: "127.0.0.1:0",
  156. PrivateKey: newkey(),
  157. MaxPeers: 10,
  158. NoDial: true,
  159. // This hook signals that the peer was actually started. We
  160. // need to wait for the peer to be started before dialing the
  161. // next connection to get a deterministic peer count.
  162. newPeerHook: func(p *Peer) { started <- p },
  163. }
  164. if err := srv.Start(); err != nil {
  165. t.Fatal(err)
  166. }
  167. defer srv.Stop()
  168. nconns := srv.MaxPeers + 1
  169. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  170. for i := 0; i < nconns; i++ {
  171. conn, err := dialer.Dial("tcp", srv.ListenAddr)
  172. if err != nil {
  173. t.Fatalf("conn %d: dial error: %v", i, err)
  174. }
  175. // Close the connection when the test ends, before
  176. // shutting down the server.
  177. defer conn.Close()
  178. // Run the handshakes just like a real peer would.
  179. key := newkey()
  180. hs := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  181. _, err = setupConn(conn, key, hs, srv.Self(), keepalways)
  182. if i == nconns-1 {
  183. // When handling the last connection, the server should
  184. // disconnect immediately instead of running the protocol
  185. // handshake.
  186. if err != DiscTooManyPeers {
  187. t.Errorf("conn %d: got error %q, expected %q", i, err, DiscTooManyPeers)
  188. }
  189. } else {
  190. // For all earlier connections, the handshake should go through.
  191. if err != nil {
  192. t.Fatalf("conn %d: unexpected error: %v", i, err)
  193. }
  194. // Wait for runPeer to be started.
  195. <-started
  196. }
  197. }
  198. }
  199. // Tests that static peers are (re)connected, and done so even above max peers.
  200. func TestServerStaticPeers(t *testing.T) {
  201. // Create a test server with limited connection slots
  202. started := make(chan *Peer)
  203. server := &Server{
  204. ListenAddr: "127.0.0.1:0",
  205. PrivateKey: newkey(),
  206. MaxPeers: 3,
  207. newPeerHook: func(p *Peer) { started <- p },
  208. staticCycle: time.Second,
  209. }
  210. if err := server.Start(); err != nil {
  211. t.Fatal(err)
  212. }
  213. defer server.Stop()
  214. // Fill up all the slots on the server
  215. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  216. for i := 0; i < server.MaxPeers; i++ {
  217. // Establish a new connection
  218. conn, err := dialer.Dial("tcp", server.ListenAddr)
  219. if err != nil {
  220. t.Fatalf("conn %d: dial error: %v", i, err)
  221. }
  222. defer conn.Close()
  223. // Run the handshakes just like a real peer would, and wait for completion
  224. key := newkey()
  225. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  226. if _, err = setupConn(conn, key, shake, server.Self(), keepalways); err != nil {
  227. t.Fatalf("conn %d: unexpected error: %v", i, err)
  228. }
  229. <-started
  230. }
  231. // Open a TCP listener to accept static connections
  232. listener, err := net.Listen("tcp", "127.0.0.1:0")
  233. if err != nil {
  234. t.Fatalf("failed to setup listener: %v", err)
  235. }
  236. defer listener.Close()
  237. connected := make(chan net.Conn)
  238. go func() {
  239. for i := 0; i < 3; i++ {
  240. conn, err := listener.Accept()
  241. if err == nil {
  242. connected <- conn
  243. }
  244. }
  245. }()
  246. // Inject a static node and wait for a remote dial, then redial, then nothing
  247. addr := listener.Addr().(*net.TCPAddr)
  248. static := &discover.Node{
  249. ID: discover.PubkeyID(&newkey().PublicKey),
  250. IP: addr.IP,
  251. TCP: uint16(addr.Port),
  252. }
  253. server.AddPeer(static)
  254. select {
  255. case conn := <-connected:
  256. // Close the first connection, expect redial
  257. conn.Close()
  258. case <-time.After(2 * server.staticCycle):
  259. t.Fatalf("remote dial timeout")
  260. }
  261. select {
  262. case conn := <-connected:
  263. // Keep the second connection, don't expect redial
  264. defer conn.Close()
  265. case <-time.After(2 * server.staticCycle):
  266. t.Fatalf("remote re-dial timeout")
  267. }
  268. select {
  269. case <-time.After(2 * server.staticCycle):
  270. // Timeout as no dial occurred
  271. case <-connected:
  272. t.Fatalf("connected node dialed")
  273. }
  274. }
  275. // Tests that trusted peers and can connect above max peer caps.
  276. func TestServerTrustedPeers(t *testing.T) {
  277. // Create a trusted peer to accept connections from
  278. key := newkey()
  279. trusted := &discover.Node{
  280. ID: discover.PubkeyID(&key.PublicKey),
  281. }
  282. // Create a test server with limited connection slots
  283. started := make(chan *Peer)
  284. server := &Server{
  285. ListenAddr: "127.0.0.1:0",
  286. PrivateKey: newkey(),
  287. MaxPeers: 3,
  288. NoDial: true,
  289. TrustedNodes: []*discover.Node{trusted},
  290. newPeerHook: func(p *Peer) { started <- p },
  291. }
  292. if err := server.Start(); err != nil {
  293. t.Fatal(err)
  294. }
  295. defer server.Stop()
  296. // Fill up all the slots on the server
  297. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  298. for i := 0; i < server.MaxPeers; i++ {
  299. // Establish a new connection
  300. conn, err := dialer.Dial("tcp", server.ListenAddr)
  301. if err != nil {
  302. t.Fatalf("conn %d: dial error: %v", i, err)
  303. }
  304. defer conn.Close()
  305. // Run the handshakes just like a real peer would, and wait for completion
  306. key := newkey()
  307. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  308. if _, err = setupConn(conn, key, shake, server.Self(), keepalways); err != nil {
  309. t.Fatalf("conn %d: unexpected error: %v", i, err)
  310. }
  311. <-started
  312. }
  313. // Dial from the trusted peer, ensure connection is accepted
  314. conn, err := dialer.Dial("tcp", server.ListenAddr)
  315. if err != nil {
  316. t.Fatalf("trusted node: dial error: %v", err)
  317. }
  318. defer conn.Close()
  319. shake := &protoHandshake{Version: baseProtocolVersion, ID: trusted.ID}
  320. if _, err = setupConn(conn, key, shake, server.Self(), keepalways); err != nil {
  321. t.Fatalf("trusted node: unexpected error: %v", err)
  322. }
  323. select {
  324. case <-started:
  325. // Ok, trusted peer accepted
  326. case <-time.After(100 * time.Millisecond):
  327. t.Fatalf("trusted node timeout")
  328. }
  329. }
  330. // Tests that a failed dial will temporarily throttle a peer.
  331. func TestServerMaxPendingDials(t *testing.T) {
  332. // Start a simple test server
  333. server := &Server{
  334. ListenAddr: "127.0.0.1:0",
  335. PrivateKey: newkey(),
  336. MaxPeers: 10,
  337. MaxPendingPeers: 1,
  338. }
  339. if err := server.Start(); err != nil {
  340. t.Fatal("failed to start test server: %v", err)
  341. }
  342. defer server.Stop()
  343. // Simulate two separate remote peers
  344. peers := make(chan *discover.Node, 2)
  345. conns := make(chan net.Conn, 2)
  346. for i := 0; i < 2; i++ {
  347. listener, err := net.Listen("tcp", "127.0.0.1:0")
  348. if err != nil {
  349. t.Fatalf("listener %d: failed to setup: %v", i, err)
  350. }
  351. defer listener.Close()
  352. addr := listener.Addr().(*net.TCPAddr)
  353. peers <- &discover.Node{
  354. ID: discover.PubkeyID(&newkey().PublicKey),
  355. IP: addr.IP,
  356. TCP: uint16(addr.Port),
  357. }
  358. go func() {
  359. conn, err := listener.Accept()
  360. if err == nil {
  361. conns <- conn
  362. }
  363. }()
  364. }
  365. // Request a dial for both peers
  366. go func() {
  367. for i := 0; i < 2; i++ {
  368. server.staticDial <- <-peers // hack piggybacking the static implementation
  369. }
  370. }()
  371. // Make sure only one outbound connection goes through
  372. var conn net.Conn
  373. select {
  374. case conn = <-conns:
  375. case <-time.After(100 * time.Millisecond):
  376. t.Fatalf("first dial timeout")
  377. }
  378. select {
  379. case conn = <-conns:
  380. t.Fatalf("second dial completed prematurely")
  381. case <-time.After(100 * time.Millisecond):
  382. }
  383. // Finish the first dial, check the second
  384. conn.Close()
  385. select {
  386. case conn = <-conns:
  387. conn.Close()
  388. case <-time.After(100 * time.Millisecond):
  389. t.Fatalf("second dial timeout")
  390. }
  391. }
  392. func TestServerMaxPendingAccepts(t *testing.T) {
  393. // Start a test server and a peer sink for synchronization
  394. started := make(chan *Peer)
  395. server := &Server{
  396. ListenAddr: "127.0.0.1:0",
  397. PrivateKey: newkey(),
  398. MaxPeers: 10,
  399. MaxPendingPeers: 1,
  400. NoDial: true,
  401. newPeerHook: func(p *Peer) { started <- p },
  402. }
  403. if err := server.Start(); err != nil {
  404. t.Fatal("failed to start test server: %v", err)
  405. }
  406. defer server.Stop()
  407. // Try and connect to the server on multiple threads concurrently
  408. conns := make([]net.Conn, 2)
  409. for i := 0; i < 2; i++ {
  410. dialer := &net.Dialer{Deadline: time.Now().Add(3 * time.Second)}
  411. conn, err := dialer.Dial("tcp", server.ListenAddr)
  412. if err != nil {
  413. t.Fatalf("failed to dial server: %v", err)
  414. }
  415. conns[i] = conn
  416. }
  417. // Check that a handshake on the second doesn't pass
  418. go func() {
  419. key := newkey()
  420. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  421. if _, err := setupConn(conns[1], key, shake, server.Self(), keepalways); err != nil {
  422. t.Fatalf("failed to run handshake: %v", err)
  423. }
  424. }()
  425. select {
  426. case <-started:
  427. t.Fatalf("handshake on second connection accepted")
  428. case <-time.After(time.Second):
  429. }
  430. // Shake on first, check that both go through
  431. go func() {
  432. key := newkey()
  433. shake := &protoHandshake{Version: baseProtocolVersion, ID: discover.PubkeyID(&key.PublicKey)}
  434. if _, err := setupConn(conns[0], key, shake, server.Self(), keepalways); err != nil {
  435. t.Fatalf("failed to run handshake: %v", err)
  436. }
  437. }()
  438. for i := 0; i < 2; i++ {
  439. select {
  440. case <-started:
  441. case <-time.After(time.Second):
  442. t.Fatalf("peer %d: handshake timeout", i)
  443. }
  444. }
  445. }
  446. func newkey() *ecdsa.PrivateKey {
  447. key, err := crypto.GenerateKey()
  448. if err != nil {
  449. panic("couldn't generate key: " + err.Error())
  450. }
  451. return key
  452. }
  453. func randomID() (id discover.NodeID) {
  454. for i := range id {
  455. id[i] = byte(rand.Intn(255))
  456. }
  457. return id
  458. }
  459. func keepalways(id discover.NodeID) bool {
  460. return true
  461. }