mirror of https://github.com/ethereum/go-ethereum
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
382 lines
11 KiB
382 lines
11 KiB
// Copyright 2021 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package ethtest
|
|
|
|
import (
|
|
"time"
|
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/eth/protocols/eth"
|
|
"github.com/ethereum/go-ethereum/internal/utesting"
|
|
"github.com/ethereum/go-ethereum/p2p"
|
|
)
|
|
|
|
// TestStatus_66 attempts to connect to the given node and exchange
|
|
// a status message with it on the eth66 protocol, and then check to
|
|
// make sure the chain head is correct.
|
|
func (s *Suite) TestStatus_66(t *utesting.T) {
|
|
conn := s.dial66(t)
|
|
// get protoHandshake
|
|
conn.handshake(t)
|
|
// get status
|
|
switch msg := conn.statusExchange66(t, s.chain).(type) {
|
|
case *Status:
|
|
status := *msg
|
|
if status.ProtocolVersion != uint32(66) {
|
|
t.Fatalf("mismatch in version: wanted 66, got %d", status.ProtocolVersion)
|
|
}
|
|
t.Logf("got status message: %s", pretty.Sdump(msg))
|
|
default:
|
|
t.Fatalf("unexpected: %s", pretty.Sdump(msg))
|
|
}
|
|
}
|
|
|
|
// TestGetBlockHeaders_66 tests whether the given node can respond to
|
|
// an eth66 `GetBlockHeaders` request and that the response is accurate.
|
|
func (s *Suite) TestGetBlockHeaders_66(t *utesting.T) {
|
|
conn := s.setupConnection66(t)
|
|
// get block headers
|
|
req := ð.GetBlockHeadersPacket66{
|
|
RequestId: 3,
|
|
GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
Origin: eth.HashOrNumber{
|
|
Hash: s.chain.blocks[1].Hash(),
|
|
},
|
|
Amount: 2,
|
|
Skip: 1,
|
|
Reverse: false,
|
|
},
|
|
}
|
|
// write message
|
|
headers := s.getBlockHeaders66(t, conn, req, req.RequestId)
|
|
// check for correct headers
|
|
headersMatch(t, s.chain, headers)
|
|
}
|
|
|
|
// TestSimultaneousRequests_66 sends two simultaneous `GetBlockHeader` requests
|
|
// with different request IDs and checks to make sure the node responds with the correct
|
|
// headers per request.
|
|
func (s *Suite) TestSimultaneousRequests_66(t *utesting.T) {
|
|
// create two connections
|
|
conn1, conn2 := s.setupConnection66(t), s.setupConnection66(t)
|
|
// create two requests
|
|
req1 := ð.GetBlockHeadersPacket66{
|
|
RequestId: 111,
|
|
GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
Origin: eth.HashOrNumber{
|
|
Hash: s.chain.blocks[1].Hash(),
|
|
},
|
|
Amount: 2,
|
|
Skip: 1,
|
|
Reverse: false,
|
|
},
|
|
}
|
|
req2 := ð.GetBlockHeadersPacket66{
|
|
RequestId: 222,
|
|
GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
Origin: eth.HashOrNumber{
|
|
Hash: s.chain.blocks[1].Hash(),
|
|
},
|
|
Amount: 4,
|
|
Skip: 1,
|
|
Reverse: false,
|
|
},
|
|
}
|
|
// wait for headers for first request
|
|
headerChan := make(chan BlockHeaders, 1)
|
|
go func(headers chan BlockHeaders) {
|
|
headers <- s.getBlockHeaders66(t, conn1, req1, req1.RequestId)
|
|
}(headerChan)
|
|
// check headers of second request
|
|
headersMatch(t, s.chain, s.getBlockHeaders66(t, conn2, req2, req2.RequestId))
|
|
// check headers of first request
|
|
headersMatch(t, s.chain, <-headerChan)
|
|
}
|
|
|
|
// TestBroadcast_66 tests whether a block announcement is correctly
|
|
// propagated to the given node's peer(s) on the eth66 protocol.
|
|
func (s *Suite) TestBroadcast_66(t *utesting.T) {
|
|
sendConn, receiveConn := s.setupConnection66(t), s.setupConnection66(t)
|
|
nextBlock := len(s.chain.blocks)
|
|
blockAnnouncement := &NewBlock{
|
|
Block: s.fullChain.blocks[nextBlock],
|
|
TD: s.fullChain.TD(nextBlock + 1),
|
|
}
|
|
s.testAnnounce66(t, sendConn, receiveConn, blockAnnouncement)
|
|
// update test suite chain
|
|
s.chain.blocks = append(s.chain.blocks, s.fullChain.blocks[nextBlock])
|
|
// wait for client to update its chain
|
|
if err := receiveConn.waitForBlock66(s.chain.Head()); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// TestGetBlockBodies_66 tests whether the given node can respond to
|
|
// a `GetBlockBodies` request and that the response is accurate over
|
|
// the eth66 protocol.
|
|
func (s *Suite) TestGetBlockBodies_66(t *utesting.T) {
|
|
conn := s.setupConnection66(t)
|
|
// create block bodies request
|
|
id := uint64(55)
|
|
req := ð.GetBlockBodiesPacket66{
|
|
RequestId: id,
|
|
GetBlockBodiesPacket: eth.GetBlockBodiesPacket{
|
|
s.chain.blocks[54].Hash(),
|
|
s.chain.blocks[75].Hash(),
|
|
},
|
|
}
|
|
if err := conn.write66(req, GetBlockBodies{}.Code()); err != nil {
|
|
t.Fatalf("could not write to connection: %v", err)
|
|
}
|
|
|
|
reqID, msg := conn.readAndServe66(s.chain, timeout)
|
|
switch msg := msg.(type) {
|
|
case BlockBodies:
|
|
if reqID != req.RequestId {
|
|
t.Fatalf("request ID mismatch: wanted %d, got %d", req.RequestId, reqID)
|
|
}
|
|
t.Logf("received %d block bodies", len(msg))
|
|
default:
|
|
t.Fatalf("unexpected: %s", pretty.Sdump(msg))
|
|
}
|
|
}
|
|
|
|
// TestLargeAnnounce_66 tests the announcement mechanism with a large block.
|
|
func (s *Suite) TestLargeAnnounce_66(t *utesting.T) {
|
|
nextBlock := len(s.chain.blocks)
|
|
blocks := []*NewBlock{
|
|
{
|
|
Block: largeBlock(),
|
|
TD: s.fullChain.TD(nextBlock + 1),
|
|
},
|
|
{
|
|
Block: s.fullChain.blocks[nextBlock],
|
|
TD: largeNumber(2),
|
|
},
|
|
{
|
|
Block: largeBlock(),
|
|
TD: largeNumber(2),
|
|
},
|
|
{
|
|
Block: s.fullChain.blocks[nextBlock],
|
|
TD: s.fullChain.TD(nextBlock + 1),
|
|
},
|
|
}
|
|
|
|
for i, blockAnnouncement := range blocks[0:3] {
|
|
t.Logf("Testing malicious announcement: %v\n", i)
|
|
sendConn := s.setupConnection66(t)
|
|
if err := sendConn.Write(blockAnnouncement); err != nil {
|
|
t.Fatalf("could not write to connection: %v", err)
|
|
}
|
|
// Invalid announcement, check that peer disconnected
|
|
switch msg := sendConn.ReadAndServe(s.chain, timeout).(type) {
|
|
case *Disconnect:
|
|
case *Error:
|
|
break
|
|
default:
|
|
t.Fatalf("unexpected: %s wanted disconnect", pretty.Sdump(msg))
|
|
}
|
|
}
|
|
// Test the last block as a valid block
|
|
sendConn := s.setupConnection66(t)
|
|
receiveConn := s.setupConnection66(t)
|
|
s.testAnnounce66(t, sendConn, receiveConn, blocks[3])
|
|
// update test suite chain
|
|
s.chain.blocks = append(s.chain.blocks, s.fullChain.blocks[nextBlock])
|
|
// wait for client to update its chain
|
|
if err := receiveConn.waitForBlock66(s.fullChain.blocks[nextBlock]); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// TestMaliciousHandshake_66 tries to send malicious data during the handshake.
|
|
func (s *Suite) TestMaliciousHandshake_66(t *utesting.T) {
|
|
conn := s.dial66(t)
|
|
// write hello to client
|
|
pub0 := crypto.FromECDSAPub(&conn.ourKey.PublicKey)[1:]
|
|
handshakes := []*Hello{
|
|
{
|
|
Version: 5,
|
|
Caps: []p2p.Cap{
|
|
{Name: largeString(2), Version: 66},
|
|
},
|
|
ID: pub0,
|
|
},
|
|
{
|
|
Version: 5,
|
|
Caps: []p2p.Cap{
|
|
{Name: "eth", Version: 64},
|
|
{Name: "eth", Version: 65},
|
|
{Name: "eth", Version: 66},
|
|
},
|
|
ID: append(pub0, byte(0)),
|
|
},
|
|
{
|
|
Version: 5,
|
|
Caps: []p2p.Cap{
|
|
{Name: "eth", Version: 64},
|
|
{Name: "eth", Version: 65},
|
|
{Name: "eth", Version: 66},
|
|
},
|
|
ID: append(pub0, pub0...),
|
|
},
|
|
{
|
|
Version: 5,
|
|
Caps: []p2p.Cap{
|
|
{Name: "eth", Version: 64},
|
|
{Name: "eth", Version: 65},
|
|
{Name: "eth", Version: 66},
|
|
},
|
|
ID: largeBuffer(2),
|
|
},
|
|
{
|
|
Version: 5,
|
|
Caps: []p2p.Cap{
|
|
{Name: largeString(2), Version: 66},
|
|
},
|
|
ID: largeBuffer(2),
|
|
},
|
|
}
|
|
for i, handshake := range handshakes {
|
|
t.Logf("Testing malicious handshake %v\n", i)
|
|
// Init the handshake
|
|
if err := conn.Write(handshake); err != nil {
|
|
t.Fatalf("could not write to connection: %v", err)
|
|
}
|
|
// check that the peer disconnected
|
|
timeout := 20 * time.Second
|
|
// Discard one hello
|
|
for i := 0; i < 2; i++ {
|
|
switch msg := conn.ReadAndServe(s.chain, timeout).(type) {
|
|
case *Disconnect:
|
|
case *Error:
|
|
case *Hello:
|
|
// Hello's are sent concurrently, so ignore them
|
|
continue
|
|
default:
|
|
t.Fatalf("unexpected: %s", pretty.Sdump(msg))
|
|
}
|
|
}
|
|
// Dial for the next round
|
|
conn = s.dial66(t)
|
|
}
|
|
}
|
|
|
|
// TestMaliciousStatus_66 sends a status package with a large total difficulty.
|
|
func (s *Suite) TestMaliciousStatus_66(t *utesting.T) {
|
|
conn := s.dial66(t)
|
|
// get protoHandshake
|
|
conn.handshake(t)
|
|
status := &Status{
|
|
ProtocolVersion: uint32(66),
|
|
NetworkID: s.chain.chainConfig.ChainID.Uint64(),
|
|
TD: largeNumber(2),
|
|
Head: s.chain.blocks[s.chain.Len()-1].Hash(),
|
|
Genesis: s.chain.blocks[0].Hash(),
|
|
ForkID: s.chain.ForkID(),
|
|
}
|
|
// get status
|
|
switch msg := conn.statusExchange(t, s.chain, status).(type) {
|
|
case *Status:
|
|
t.Logf("%+v\n", msg)
|
|
default:
|
|
t.Fatalf("expected status, got: %#v ", msg)
|
|
}
|
|
// wait for disconnect
|
|
switch msg := conn.ReadAndServe(s.chain, timeout).(type) {
|
|
case *Disconnect:
|
|
case *Error:
|
|
return
|
|
default:
|
|
t.Fatalf("expected disconnect, got: %s", pretty.Sdump(msg))
|
|
}
|
|
}
|
|
|
|
func (s *Suite) TestTransaction_66(t *utesting.T) {
|
|
tests := []*types.Transaction{
|
|
getNextTxFromChain(t, s),
|
|
unknownTx(t, s),
|
|
}
|
|
for i, tx := range tests {
|
|
t.Logf("Testing tx propagation: %v\n", i)
|
|
sendSuccessfulTx66(t, s, tx)
|
|
}
|
|
}
|
|
|
|
func (s *Suite) TestMaliciousTx_66(t *utesting.T) {
|
|
tests := []*types.Transaction{
|
|
getOldTxFromChain(t, s),
|
|
invalidNonceTx(t, s),
|
|
hugeAmount(t, s),
|
|
hugeGasPrice(t, s),
|
|
hugeData(t, s),
|
|
}
|
|
for i, tx := range tests {
|
|
t.Logf("Testing malicious tx propagation: %v\n", i)
|
|
sendFailingTx66(t, s, tx)
|
|
}
|
|
}
|
|
|
|
// TestZeroRequestID_66 checks that a request ID of zero is still handled
|
|
// by the node.
|
|
func (s *Suite) TestZeroRequestID_66(t *utesting.T) {
|
|
conn := s.setupConnection66(t)
|
|
req := ð.GetBlockHeadersPacket66{
|
|
RequestId: 0,
|
|
GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
Origin: eth.HashOrNumber{
|
|
Number: 0,
|
|
},
|
|
Amount: 2,
|
|
},
|
|
}
|
|
headersMatch(t, s.chain, s.getBlockHeaders66(t, conn, req, req.RequestId))
|
|
}
|
|
|
|
// TestSameRequestID_66 sends two requests with the same request ID
|
|
// concurrently to a single node.
|
|
func (s *Suite) TestSameRequestID_66(t *utesting.T) {
|
|
conn := s.setupConnection66(t)
|
|
// create two separate requests with same ID
|
|
reqID := uint64(1234)
|
|
req1 := ð.GetBlockHeadersPacket66{
|
|
RequestId: reqID,
|
|
GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
Origin: eth.HashOrNumber{
|
|
Number: 0,
|
|
},
|
|
Amount: 2,
|
|
},
|
|
}
|
|
req2 := ð.GetBlockHeadersPacket66{
|
|
RequestId: reqID,
|
|
GetBlockHeadersPacket: ð.GetBlockHeadersPacket{
|
|
Origin: eth.HashOrNumber{
|
|
Number: 33,
|
|
},
|
|
Amount: 2,
|
|
},
|
|
}
|
|
// send requests concurrently
|
|
go func() {
|
|
headersMatch(t, s.chain, s.getBlockHeaders66(t, conn, req2, reqID))
|
|
}()
|
|
// check response from first request
|
|
headersMatch(t, s.chain, s.getBlockHeaders66(t, conn, req1, reqID))
|
|
}
|
|
|