v5_udp_test.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622
  1. // Copyright 2019 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package discover
  17. import (
  18. "bytes"
  19. "crypto/ecdsa"
  20. "encoding/binary"
  21. "fmt"
  22. "math/rand"
  23. "net"
  24. "reflect"
  25. "testing"
  26. "time"
  27. "github.com/ethereum/go-ethereum/internal/testlog"
  28. "github.com/ethereum/go-ethereum/log"
  29. "github.com/ethereum/go-ethereum/p2p/enode"
  30. "github.com/ethereum/go-ethereum/p2p/enr"
  31. "github.com/ethereum/go-ethereum/rlp"
  32. )
  33. // Real sockets, real crypto: this test checks end-to-end connectivity for UDPv5.
  34. func TestEndToEndV5(t *testing.T) {
  35. t.Parallel()
  36. var nodes []*UDPv5
  37. for i := 0; i < 5; i++ {
  38. var cfg Config
  39. if len(nodes) > 0 {
  40. bn := nodes[0].Self()
  41. cfg.Bootnodes = []*enode.Node{bn}
  42. }
  43. node := startLocalhostV5(t, cfg)
  44. nodes = append(nodes, node)
  45. defer node.Close()
  46. }
  47. last := nodes[len(nodes)-1]
  48. target := nodes[rand.Intn(len(nodes)-2)].Self()
  49. results := last.Lookup(target.ID())
  50. if len(results) == 0 || results[0].ID() != target.ID() {
  51. t.Fatalf("lookup returned wrong results: %v", results)
  52. }
  53. }
  54. func startLocalhostV5(t *testing.T, cfg Config) *UDPv5 {
  55. cfg.PrivateKey = newkey()
  56. db, _ := enode.OpenDB("")
  57. ln := enode.NewLocalNode(db, cfg.PrivateKey)
  58. // Prefix logs with node ID.
  59. lprefix := fmt.Sprintf("(%s)", ln.ID().TerminalString())
  60. lfmt := log.TerminalFormat(false)
  61. cfg.Log = testlog.Logger(t, log.LvlTrace)
  62. cfg.Log.SetHandler(log.FuncHandler(func(r *log.Record) error {
  63. t.Logf("%s %s", lprefix, lfmt.Format(r))
  64. return nil
  65. }))
  66. // Listen.
  67. socket, err := net.ListenUDP("udp4", &net.UDPAddr{IP: net.IP{127, 0, 0, 1}})
  68. if err != nil {
  69. t.Fatal(err)
  70. }
  71. realaddr := socket.LocalAddr().(*net.UDPAddr)
  72. ln.SetStaticIP(realaddr.IP)
  73. ln.Set(enr.UDP(realaddr.Port))
  74. udp, err := ListenV5(socket, ln, cfg)
  75. if err != nil {
  76. t.Fatal(err)
  77. }
  78. return udp
  79. }
  80. // This test checks that incoming PING calls are handled correctly.
  81. func TestUDPv5_pingHandling(t *testing.T) {
  82. t.Parallel()
  83. test := newUDPV5Test(t)
  84. defer test.close()
  85. test.packetIn(&pingV5{ReqID: []byte("foo")})
  86. test.waitPacketOut(func(p *pongV5, addr *net.UDPAddr, authTag []byte) {
  87. if !bytes.Equal(p.ReqID, []byte("foo")) {
  88. t.Error("wrong request ID in response:", p.ReqID)
  89. }
  90. if p.ENRSeq != test.table.self().Seq() {
  91. t.Error("wrong ENR sequence number in response:", p.ENRSeq)
  92. }
  93. })
  94. }
  95. // This test checks that incoming 'unknown' packets trigger the handshake.
  96. func TestUDPv5_unknownPacket(t *testing.T) {
  97. t.Parallel()
  98. test := newUDPV5Test(t)
  99. defer test.close()
  100. authTag := [12]byte{1, 2, 3}
  101. check := func(p *whoareyouV5, wantSeq uint64) {
  102. t.Helper()
  103. if !bytes.Equal(p.AuthTag, authTag[:]) {
  104. t.Error("wrong token in WHOAREYOU:", p.AuthTag, authTag[:])
  105. }
  106. if p.IDNonce == ([32]byte{}) {
  107. t.Error("all zero ID nonce")
  108. }
  109. if p.RecordSeq != wantSeq {
  110. t.Errorf("wrong record seq %d in WHOAREYOU, want %d", p.RecordSeq, wantSeq)
  111. }
  112. }
  113. // Unknown packet from unknown node.
  114. test.packetIn(&unknownV5{AuthTag: authTag[:]})
  115. test.waitPacketOut(func(p *whoareyouV5, addr *net.UDPAddr, _ []byte) {
  116. check(p, 0)
  117. })
  118. // Make node known.
  119. n := test.getNode(test.remotekey, test.remoteaddr).Node()
  120. test.table.addSeenNode(wrapNode(n))
  121. test.packetIn(&unknownV5{AuthTag: authTag[:]})
  122. test.waitPacketOut(func(p *whoareyouV5, addr *net.UDPAddr, _ []byte) {
  123. check(p, n.Seq())
  124. })
  125. }
  126. // This test checks that incoming FINDNODE calls are handled correctly.
  127. func TestUDPv5_findnodeHandling(t *testing.T) {
  128. t.Parallel()
  129. test := newUDPV5Test(t)
  130. defer test.close()
  131. // Create test nodes and insert them into the table.
  132. nodes := nodesAtDistance(test.table.self().ID(), 253, 10)
  133. fillTable(test.table, wrapNodes(nodes))
  134. // Requesting with distance zero should return the node's own record.
  135. test.packetIn(&findnodeV5{ReqID: []byte{0}, Distance: 0})
  136. test.expectNodes([]byte{0}, 1, []*enode.Node{test.udp.Self()})
  137. // Requesting with distance > 256 caps it at 256.
  138. test.packetIn(&findnodeV5{ReqID: []byte{1}, Distance: 4234098})
  139. test.expectNodes([]byte{1}, 1, nil)
  140. // This request gets no nodes because the corresponding bucket is empty.
  141. test.packetIn(&findnodeV5{ReqID: []byte{2}, Distance: 254})
  142. test.expectNodes([]byte{2}, 1, nil)
  143. // This request gets all test nodes.
  144. test.packetIn(&findnodeV5{ReqID: []byte{3}, Distance: 253})
  145. test.expectNodes([]byte{3}, 4, nodes)
  146. }
  147. func (test *udpV5Test) expectNodes(wantReqID []byte, wantTotal uint8, wantNodes []*enode.Node) {
  148. nodeSet := make(map[enode.ID]*enr.Record)
  149. for _, n := range wantNodes {
  150. nodeSet[n.ID()] = n.Record()
  151. }
  152. for {
  153. test.waitPacketOut(func(p *nodesV5, addr *net.UDPAddr, authTag []byte) {
  154. if len(p.Nodes) > 3 {
  155. test.t.Fatalf("too many nodes in response")
  156. }
  157. if p.Total != wantTotal {
  158. test.t.Fatalf("wrong total response count %d", p.Total)
  159. }
  160. if !bytes.Equal(p.ReqID, wantReqID) {
  161. test.t.Fatalf("wrong request ID in response: %v", p.ReqID)
  162. }
  163. for _, record := range p.Nodes {
  164. n, _ := enode.New(enode.ValidSchemesForTesting, record)
  165. want := nodeSet[n.ID()]
  166. if want == nil {
  167. test.t.Fatalf("unexpected node in response: %v", n)
  168. }
  169. if !reflect.DeepEqual(record, want) {
  170. test.t.Fatalf("wrong record in response: %v", n)
  171. }
  172. delete(nodeSet, n.ID())
  173. }
  174. })
  175. if len(nodeSet) == 0 {
  176. return
  177. }
  178. }
  179. }
  180. // This test checks that outgoing PING calls work.
  181. func TestUDPv5_pingCall(t *testing.T) {
  182. t.Parallel()
  183. test := newUDPV5Test(t)
  184. defer test.close()
  185. remote := test.getNode(test.remotekey, test.remoteaddr).Node()
  186. done := make(chan error, 1)
  187. // This ping times out.
  188. go func() {
  189. _, err := test.udp.ping(remote)
  190. done <- err
  191. }()
  192. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {})
  193. if err := <-done; err != errTimeout {
  194. t.Fatalf("want errTimeout, got %q", err)
  195. }
  196. // This ping works.
  197. go func() {
  198. _, err := test.udp.ping(remote)
  199. done <- err
  200. }()
  201. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {
  202. test.packetInFrom(test.remotekey, test.remoteaddr, &pongV5{ReqID: p.ReqID})
  203. })
  204. if err := <-done; err != nil {
  205. t.Fatal(err)
  206. }
  207. // This ping gets a reply from the wrong endpoint.
  208. go func() {
  209. _, err := test.udp.ping(remote)
  210. done <- err
  211. }()
  212. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {
  213. wrongAddr := &net.UDPAddr{IP: net.IP{33, 44, 55, 22}, Port: 10101}
  214. test.packetInFrom(test.remotekey, wrongAddr, &pongV5{ReqID: p.ReqID})
  215. })
  216. if err := <-done; err != errTimeout {
  217. t.Fatalf("want errTimeout for reply from wrong IP, got %q", err)
  218. }
  219. }
  220. // This test checks that outgoing FINDNODE calls work and multiple NODES
  221. // replies are aggregated.
  222. func TestUDPv5_findnodeCall(t *testing.T) {
  223. t.Parallel()
  224. test := newUDPV5Test(t)
  225. defer test.close()
  226. // Launch the request:
  227. var (
  228. distance = 230
  229. remote = test.getNode(test.remotekey, test.remoteaddr).Node()
  230. nodes = nodesAtDistance(remote.ID(), distance, 8)
  231. done = make(chan error, 1)
  232. response []*enode.Node
  233. )
  234. go func() {
  235. var err error
  236. response, err = test.udp.findnode(remote, distance)
  237. done <- err
  238. }()
  239. // Serve the responses:
  240. test.waitPacketOut(func(p *findnodeV5, addr *net.UDPAddr, authTag []byte) {
  241. if p.Distance != uint(distance) {
  242. t.Fatalf("wrong bucket: %d", p.Distance)
  243. }
  244. test.packetIn(&nodesV5{
  245. ReqID: p.ReqID,
  246. Total: 2,
  247. Nodes: nodesToRecords(nodes[:4]),
  248. })
  249. test.packetIn(&nodesV5{
  250. ReqID: p.ReqID,
  251. Total: 2,
  252. Nodes: nodesToRecords(nodes[4:]),
  253. })
  254. })
  255. // Check results:
  256. if err := <-done; err != nil {
  257. t.Fatalf("unexpected error: %v", err)
  258. }
  259. if !reflect.DeepEqual(response, nodes) {
  260. t.Fatalf("wrong nodes in response")
  261. }
  262. // TODO: check invalid IPs
  263. // TODO: check invalid/unsigned record
  264. }
  265. // This test checks that pending calls are re-sent when a handshake happens.
  266. func TestUDPv5_callResend(t *testing.T) {
  267. t.Parallel()
  268. test := newUDPV5Test(t)
  269. defer test.close()
  270. remote := test.getNode(test.remotekey, test.remoteaddr).Node()
  271. done := make(chan error, 2)
  272. go func() {
  273. _, err := test.udp.ping(remote)
  274. done <- err
  275. }()
  276. go func() {
  277. _, err := test.udp.ping(remote)
  278. done <- err
  279. }()
  280. // Ping answered by WHOAREYOU.
  281. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {
  282. test.packetIn(&whoareyouV5{AuthTag: authTag})
  283. })
  284. // Ping should be re-sent.
  285. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {
  286. test.packetIn(&pongV5{ReqID: p.ReqID})
  287. })
  288. // Answer the other ping.
  289. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {
  290. test.packetIn(&pongV5{ReqID: p.ReqID})
  291. })
  292. if err := <-done; err != nil {
  293. t.Fatalf("unexpected ping error: %v", err)
  294. }
  295. if err := <-done; err != nil {
  296. t.Fatalf("unexpected ping error: %v", err)
  297. }
  298. }
  299. // This test ensures we don't allow multiple rounds of WHOAREYOU for a single call.
  300. func TestUDPv5_multipleHandshakeRounds(t *testing.T) {
  301. t.Parallel()
  302. test := newUDPV5Test(t)
  303. defer test.close()
  304. remote := test.getNode(test.remotekey, test.remoteaddr).Node()
  305. done := make(chan error, 1)
  306. go func() {
  307. _, err := test.udp.ping(remote)
  308. done <- err
  309. }()
  310. // Ping answered by WHOAREYOU.
  311. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {
  312. test.packetIn(&whoareyouV5{AuthTag: authTag})
  313. })
  314. // Ping answered by WHOAREYOU again.
  315. test.waitPacketOut(func(p *pingV5, addr *net.UDPAddr, authTag []byte) {
  316. test.packetIn(&whoareyouV5{AuthTag: authTag})
  317. })
  318. if err := <-done; err != errTimeout {
  319. t.Fatalf("unexpected ping error: %q", err)
  320. }
  321. }
  322. // This test checks that calls with n replies may take up to n * respTimeout.
  323. func TestUDPv5_callTimeoutReset(t *testing.T) {
  324. t.Parallel()
  325. test := newUDPV5Test(t)
  326. defer test.close()
  327. // Launch the request:
  328. var (
  329. distance = 230
  330. remote = test.getNode(test.remotekey, test.remoteaddr).Node()
  331. nodes = nodesAtDistance(remote.ID(), distance, 8)
  332. done = make(chan error, 1)
  333. )
  334. go func() {
  335. _, err := test.udp.findnode(remote, distance)
  336. done <- err
  337. }()
  338. // Serve two responses, slowly.
  339. test.waitPacketOut(func(p *findnodeV5, addr *net.UDPAddr, authTag []byte) {
  340. time.Sleep(respTimeout - 50*time.Millisecond)
  341. test.packetIn(&nodesV5{
  342. ReqID: p.ReqID,
  343. Total: 2,
  344. Nodes: nodesToRecords(nodes[:4]),
  345. })
  346. time.Sleep(respTimeout - 50*time.Millisecond)
  347. test.packetIn(&nodesV5{
  348. ReqID: p.ReqID,
  349. Total: 2,
  350. Nodes: nodesToRecords(nodes[4:]),
  351. })
  352. })
  353. if err := <-done; err != nil {
  354. t.Fatalf("unexpected error: %q", err)
  355. }
  356. }
  357. // This test checks that lookup works.
  358. func TestUDPv5_lookup(t *testing.T) {
  359. t.Parallel()
  360. test := newUDPV5Test(t)
  361. // Lookup on empty table returns no nodes.
  362. if results := test.udp.Lookup(lookupTestnet.target.id()); len(results) > 0 {
  363. t.Fatalf("lookup on empty table returned %d results: %#v", len(results), results)
  364. }
  365. // Ensure the tester knows all nodes in lookupTestnet by IP.
  366. for d, nn := range lookupTestnet.dists {
  367. for i, key := range nn {
  368. n := lookupTestnet.node(d, i)
  369. test.getNode(key, &net.UDPAddr{IP: n.IP(), Port: n.UDP()})
  370. }
  371. }
  372. // Seed table with initial node.
  373. fillTable(test.table, []*node{wrapNode(lookupTestnet.node(256, 0))})
  374. // Start the lookup.
  375. resultC := make(chan []*enode.Node, 1)
  376. go func() {
  377. resultC <- test.udp.Lookup(lookupTestnet.target.id())
  378. test.close()
  379. }()
  380. // Answer lookup packets.
  381. for done := false; !done; {
  382. done = test.waitPacketOut(func(p packetV5, to *net.UDPAddr, authTag []byte) {
  383. recipient, key := lookupTestnet.nodeByAddr(to)
  384. switch p := p.(type) {
  385. case *pingV5:
  386. test.packetInFrom(key, to, &pongV5{ReqID: p.ReqID})
  387. case *findnodeV5:
  388. nodes := lookupTestnet.neighborsAtDistance(recipient, p.Distance, 3)
  389. response := &nodesV5{ReqID: p.ReqID, Total: 1, Nodes: nodesToRecords(nodes)}
  390. test.packetInFrom(key, to, response)
  391. }
  392. })
  393. }
  394. // Verify result nodes.
  395. checkLookupResults(t, lookupTestnet, <-resultC)
  396. }
  397. // udpV5Test is the framework for all tests above.
  398. // It runs the UDPv5 transport on a virtual socket and allows testing outgoing packets.
  399. type udpV5Test struct {
  400. t *testing.T
  401. pipe *dgramPipe
  402. table *Table
  403. db *enode.DB
  404. udp *UDPv5
  405. localkey, remotekey *ecdsa.PrivateKey
  406. remoteaddr *net.UDPAddr
  407. nodesByID map[enode.ID]*enode.LocalNode
  408. nodesByIP map[string]*enode.LocalNode
  409. }
  410. type testCodec struct {
  411. test *udpV5Test
  412. id enode.ID
  413. ctr uint64
  414. }
  415. type testCodecFrame struct {
  416. NodeID enode.ID
  417. AuthTag []byte
  418. Ptype byte
  419. Packet rlp.RawValue
  420. }
  421. func (c *testCodec) encode(toID enode.ID, addr string, p packetV5, _ *whoareyouV5) ([]byte, []byte, error) {
  422. c.ctr++
  423. authTag := make([]byte, 8)
  424. binary.BigEndian.PutUint64(authTag, c.ctr)
  425. penc, _ := rlp.EncodeToBytes(p)
  426. frame, err := rlp.EncodeToBytes(testCodecFrame{c.id, authTag, p.kind(), penc})
  427. return frame, authTag, err
  428. }
  429. func (c *testCodec) decode(input []byte, addr string) (enode.ID, *enode.Node, packetV5, error) {
  430. frame, p, err := c.decodeFrame(input)
  431. if err != nil {
  432. return enode.ID{}, nil, nil, err
  433. }
  434. if p.kind() == p_whoareyouV5 {
  435. frame.NodeID = enode.ID{} // match wireCodec behavior
  436. }
  437. return frame.NodeID, nil, p, nil
  438. }
  439. func (c *testCodec) decodeFrame(input []byte) (frame testCodecFrame, p packetV5, err error) {
  440. if err = rlp.DecodeBytes(input, &frame); err != nil {
  441. return frame, nil, fmt.Errorf("invalid frame: %v", err)
  442. }
  443. switch frame.Ptype {
  444. case p_unknownV5:
  445. dec := new(unknownV5)
  446. err = rlp.DecodeBytes(frame.Packet, &dec)
  447. p = dec
  448. case p_whoareyouV5:
  449. dec := new(whoareyouV5)
  450. err = rlp.DecodeBytes(frame.Packet, &dec)
  451. p = dec
  452. default:
  453. p, err = decodePacketBodyV5(frame.Ptype, frame.Packet)
  454. }
  455. return frame, p, err
  456. }
  457. func newUDPV5Test(t *testing.T) *udpV5Test {
  458. test := &udpV5Test{
  459. t: t,
  460. pipe: newpipe(),
  461. localkey: newkey(),
  462. remotekey: newkey(),
  463. remoteaddr: &net.UDPAddr{IP: net.IP{10, 0, 1, 99}, Port: 30303},
  464. nodesByID: make(map[enode.ID]*enode.LocalNode),
  465. nodesByIP: make(map[string]*enode.LocalNode),
  466. }
  467. test.db, _ = enode.OpenDB("")
  468. ln := enode.NewLocalNode(test.db, test.localkey)
  469. ln.SetStaticIP(net.IP{10, 0, 0, 1})
  470. ln.Set(enr.UDP(30303))
  471. test.udp, _ = ListenV5(test.pipe, ln, Config{
  472. PrivateKey: test.localkey,
  473. Log: testlog.Logger(t, log.LvlTrace),
  474. ValidSchemes: enode.ValidSchemesForTesting,
  475. })
  476. test.udp.codec = &testCodec{test: test, id: ln.ID()}
  477. test.table = test.udp.tab
  478. test.nodesByID[ln.ID()] = ln
  479. // Wait for initial refresh so the table doesn't send unexpected findnode.
  480. <-test.table.initDone
  481. return test
  482. }
  483. // handles a packet as if it had been sent to the transport.
  484. func (test *udpV5Test) packetIn(packet packetV5) {
  485. test.t.Helper()
  486. test.packetInFrom(test.remotekey, test.remoteaddr, packet)
  487. }
  488. // handles a packet as if it had been sent to the transport by the key/endpoint.
  489. func (test *udpV5Test) packetInFrom(key *ecdsa.PrivateKey, addr *net.UDPAddr, packet packetV5) {
  490. test.t.Helper()
  491. ln := test.getNode(key, addr)
  492. codec := &testCodec{test: test, id: ln.ID()}
  493. enc, _, err := codec.encode(test.udp.Self().ID(), addr.String(), packet, nil)
  494. if err != nil {
  495. test.t.Errorf("%s encode error: %v", packet.name(), err)
  496. }
  497. if test.udp.dispatchReadPacket(addr, enc) {
  498. <-test.udp.readNextCh // unblock UDPv5.dispatch
  499. }
  500. }
  501. // getNode ensures the test knows about a node at the given endpoint.
  502. func (test *udpV5Test) getNode(key *ecdsa.PrivateKey, addr *net.UDPAddr) *enode.LocalNode {
  503. id := encodePubkey(&key.PublicKey).id()
  504. ln := test.nodesByID[id]
  505. if ln == nil {
  506. db, _ := enode.OpenDB("")
  507. ln = enode.NewLocalNode(db, key)
  508. ln.SetStaticIP(addr.IP)
  509. ln.Set(enr.UDP(addr.Port))
  510. test.nodesByID[id] = ln
  511. }
  512. test.nodesByIP[string(addr.IP)] = ln
  513. return ln
  514. }
  515. func (test *udpV5Test) waitPacketOut(validate interface{}) (closed bool) {
  516. test.t.Helper()
  517. fn := reflect.ValueOf(validate)
  518. exptype := fn.Type().In(0)
  519. dgram, err := test.pipe.receive()
  520. if err == errClosed {
  521. return true
  522. }
  523. if err == errTimeout {
  524. test.t.Fatalf("timed out waiting for %v", exptype)
  525. return false
  526. }
  527. ln := test.nodesByIP[string(dgram.to.IP)]
  528. if ln == nil {
  529. test.t.Fatalf("attempt to send to non-existing node %v", &dgram.to)
  530. return false
  531. }
  532. codec := &testCodec{test: test, id: ln.ID()}
  533. frame, p, err := codec.decodeFrame(dgram.data)
  534. if err != nil {
  535. test.t.Errorf("sent packet decode error: %v", err)
  536. return false
  537. }
  538. if !reflect.TypeOf(p).AssignableTo(exptype) {
  539. test.t.Errorf("sent packet type mismatch, got: %v, want: %v", reflect.TypeOf(p), exptype)
  540. return false
  541. }
  542. fn.Call([]reflect.Value{reflect.ValueOf(p), reflect.ValueOf(&dgram.to), reflect.ValueOf(frame.AuthTag)})
  543. return false
  544. }
  545. func (test *udpV5Test) close() {
  546. test.t.Helper()
  547. test.udp.Close()
  548. test.db.Close()
  549. for id, n := range test.nodesByID {
  550. if id != test.udp.Self().ID() {
  551. n.Database().Close()
  552. }
  553. }
  554. if len(test.pipe.queue) != 0 {
  555. test.t.Fatalf("%d unmatched UDP packets in queue", len(test.pipe.queue))
  556. }
  557. }