forked from dashpay/dash
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathevo_netinfo_tests.cpp
More file actions
241 lines (207 loc) · 9.38 KB
/
evo_netinfo_tests.cpp
File metadata and controls
241 lines (207 loc) · 9.38 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
// Copyright (c) 2025 The Dash Core developers
// Distributed under the MIT software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
#include <test/util/setup_common.h>
#include <chainparams.h>
#include <clientversion.h>
#include <evo/netinfo.h>
#include <netbase.h>
#include <streams.h>
#include <util/pointer.h>
#include <boost/test/unit_test.hpp>
BOOST_FIXTURE_TEST_SUITE(evo_netinfo_tests, BasicTestingSetup)
const std::vector<std::pair</*input=*/std::string, /*expected_ret=*/NetInfoStatus>> vals{
// Address and port specified
{"1.1.1.1:9999", NetInfoStatus::Success},
// Address specified, port should default to default P2P core
{"1.1.1.1", NetInfoStatus::Success},
// Non-mainnet port on mainnet
{"1.1.1.1:9998", NetInfoStatus::BadPort},
// Internal addresses not allowed on mainnet
{"127.0.0.1:9999", NetInfoStatus::NotRoutable},
// Valid IPv4 formatting but invalid IPv4 address
{"0.0.0.0:9999", NetInfoStatus::BadAddress},
// Port greater than uint16_t max
{"1.1.1.1:99999", NetInfoStatus::BadInput},
// Only IPv4 allowed
{"[2606:4700:4700::1111]:9999", NetInfoStatus::BadInput},
// Domains are not allowed
{"example.com:9999", NetInfoStatus::BadInput},
// Incorrect IPv4 address
{"1.1.1.256:9999", NetInfoStatus::BadInput},
// Missing address
{":9999", NetInfoStatus::BadInput},
};
void ValidateGetEntries(const NetInfoList& entries, const size_t expected_size)
{
BOOST_CHECK_EQUAL(entries.size(), expected_size);
for (const NetInfoEntry& entry : entries) {
BOOST_CHECK(entry.IsTriviallyValid());
}
}
BOOST_AUTO_TEST_CASE(mnnetinfo_rules)
{
// Validate AddEntry() rules enforcement
for (const auto& [input, expected_ret] : vals) {
MnNetInfo netInfo;
BOOST_CHECK_EQUAL(netInfo.AddEntry(input), expected_ret);
if (expected_ret != NetInfoStatus::Success) {
// An empty MnNetInfo is considered malformed
BOOST_CHECK_EQUAL(netInfo.Validate(), NetInfoStatus::Malformed);
BOOST_CHECK(netInfo.GetEntries().empty());
} else {
BOOST_CHECK_EQUAL(netInfo.Validate(), NetInfoStatus::Success);
ValidateGetEntries(netInfo.GetEntries(), /*expected_size=*/1);
}
}
{
// MnNetInfo only stores one value, overwriting prohibited
MnNetInfo netInfo;
BOOST_CHECK_EQUAL(netInfo.AddEntry("1.1.1.1:9999"), NetInfoStatus::Success);
BOOST_CHECK_EQUAL(netInfo.AddEntry("1.1.1.2:9999"), NetInfoStatus::MaxLimit);
ValidateGetEntries(netInfo.GetEntries(), /*expected_size=*/1);
}
}
BOOST_AUTO_TEST_CASE(netinfo_ser)
{
{
// An empty object should only store one byte to denote it is invalid
CDataStream ds(SER_DISK, CLIENT_VERSION);
NetInfoEntry entry{};
ds << entry;
BOOST_CHECK_EQUAL(ds.size(), sizeof(uint8_t));
}
{
// Reading a nonsense byte should return an empty object
CDataStream ds(SER_DISK, CLIENT_VERSION);
NetInfoEntry entry{};
ds << 0xfe;
ds >> entry;
BOOST_CHECK(entry.IsEmpty() && !entry.IsTriviallyValid());
}
{
// Reading an invalid CService should fail trivial validation and return an empty object
CDataStream ds(SER_DISK, CLIENT_VERSION);
NetInfoEntry entry{};
ds << NetInfoEntry::NetInfoType::Service << CService{};
ds >> entry;
BOOST_CHECK(entry.IsEmpty() && !entry.IsTriviallyValid());
}
{
// Reading an unrecognized type should fail trivial validation and return an empty object
CDataStream ds(SER_DISK, CLIENT_VERSION);
NetInfoEntry entry{};
ds << NetInfoEntry::NetInfoType::Service << uint256{};
ds >> entry;
BOOST_CHECK(entry.IsEmpty() && !entry.IsTriviallyValid());
}
{
// A valid CService should be constructable, readable and pass validation
CDataStream ds(SER_DISK, CLIENT_VERSION | ADDRV2_FORMAT);
CService service{LookupNumeric("1.1.1.1", Params().GetDefaultPort())};
BOOST_CHECK(service.IsValid());
NetInfoEntry entry{service}, entry2{};
ds << NetInfoEntry::NetInfoType::Service << service;
ds >> entry2;
BOOST_CHECK(entry == entry2);
BOOST_CHECK(!entry.IsEmpty() && entry.IsTriviallyValid());
BOOST_CHECK(entry.GetAddrPort().value() == service);
}
{
// NetInfoEntry should be able to read and write ADDRV2 addresses
CService service{};
service.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion");
BOOST_CHECK(service.IsValid() && service.IsTor());
CDataStream ds(SER_DISK, CLIENT_VERSION | ADDRV2_FORMAT);
ds << NetInfoEntry::NetInfoType::Service << service;
ds.SetVersion(CLIENT_VERSION); // Drop the explicit format flag
NetInfoEntry entry{};
ds >> entry;
BOOST_CHECK(!entry.IsEmpty() && entry.IsTriviallyValid());
BOOST_CHECK(entry.GetAddrPort().value() == service);
ds.clear();
NetInfoEntry entry2{};
ds << entry;
ds >> entry2;
BOOST_CHECK(entry == entry2 && entry2.GetAddrPort().value() == service);
}
}
BOOST_AUTO_TEST_CASE(netinfo_retvals)
{
uint16_t p2p_port{Params().GetDefaultPort()};
CService service{LookupNumeric("1.1.1.1", p2p_port)}, service2{LookupNumeric("1.1.1.2", p2p_port)};
NetInfoEntry entry{service}, entry2{service2}, entry_empty{};
// Check that values are correctly recorded and pass trivial validation
BOOST_CHECK(service.IsValid());
BOOST_CHECK(!entry.IsEmpty() && entry.IsTriviallyValid());
BOOST_CHECK(entry.GetAddrPort().value() == service);
BOOST_CHECK(!entry2.IsEmpty() && entry2.IsTriviallyValid());
BOOST_CHECK(entry2.GetAddrPort().value() == service2);
// Check that dispatch returns the expected values
BOOST_CHECK_EQUAL(entry.GetPort(), service.GetPort());
BOOST_CHECK_EQUAL(entry.ToString(), strprintf("CService(addr=%s, port=%u)", service.ToStringAddr(), service.GetPort()));
BOOST_CHECK_EQUAL(entry.ToStringAddr(), service.ToStringAddr());
BOOST_CHECK_EQUAL(entry.ToStringAddrPort(), service.ToStringAddrPort());
BOOST_CHECK_EQUAL(service < service2, entry < entry2);
// Check that empty/invalid entries return error messages
BOOST_CHECK_EQUAL(entry_empty.GetPort(), 0);
BOOST_CHECK_EQUAL(entry_empty.ToString(), "[invalid entry]");
BOOST_CHECK_EQUAL(entry_empty.ToStringAddr(), "[invalid entry]");
BOOST_CHECK_EQUAL(entry_empty.ToStringAddrPort(), "[invalid entry]");
// The invalid entry type code is 0xff (highest possible value) and therefore will return as greater
// in comparison to any valid entry
BOOST_CHECK(entry < entry_empty);
}
bool CheckIfSerSame(const CService& lhs, const MnNetInfo& rhs)
{
CHashWriter ss_lhs(SER_GETHASH, 0), ss_rhs(SER_GETHASH, 0);
ss_lhs << lhs;
ss_rhs << rhs;
return ss_lhs.GetSHA256() == ss_rhs.GetSHA256();
}
BOOST_AUTO_TEST_CASE(cservice_compatible)
{
// Empty values should be the same
CService service;
MnNetInfo netInfo;
BOOST_CHECK(CheckIfSerSame(service, netInfo));
// Valid IPv4 address, valid port
service = LookupNumeric("1.1.1.1", 9999);
netInfo.Clear();
BOOST_CHECK_EQUAL(netInfo.AddEntry("1.1.1.1:9999"), NetInfoStatus::Success);
BOOST_CHECK(CheckIfSerSame(service, netInfo));
// Valid IPv4 address, default P2P port implied
service = LookupNumeric("1.1.1.1", Params().GetDefaultPort());
netInfo.Clear();
BOOST_CHECK_EQUAL(netInfo.AddEntry("1.1.1.1"), NetInfoStatus::Success);
BOOST_CHECK(CheckIfSerSame(service, netInfo));
// Lookup() failure (domains not allowed), MnNetInfo should remain empty if Lookup() failed
service = CService();
netInfo.Clear();
BOOST_CHECK_EQUAL(netInfo.AddEntry("example.com"), NetInfoStatus::BadInput);
BOOST_CHECK(CheckIfSerSame(service, netInfo));
// Validation failure (non-IPv4 not allowed), MnNetInfo should remain empty if ValidateService() failed
service = CService();
netInfo.Clear();
BOOST_CHECK_EQUAL(netInfo.AddEntry("[2606:4700:4700::1111]:9999"), NetInfoStatus::BadInput);
BOOST_CHECK(CheckIfSerSame(service, netInfo));
}
BOOST_AUTO_TEST_CASE(interface_equality)
{
// We also check for symmetry as NetInfoInterface, MnNetInfo and NetInfoEntry
// define their operator!= as the inverse of operator==
std::shared_ptr<NetInfoInterface> ptr_lhs{nullptr}, ptr_rhs{nullptr};
// Equal initialization state (uninitialized)
BOOST_CHECK(util::shared_ptr_equal(ptr_lhs, ptr_rhs) && !util::shared_ptr_not_equal(ptr_lhs, ptr_rhs));
// Unequal initialization state (lhs initialized, rhs unchanged)
ptr_lhs = std::make_shared<MnNetInfo>();
BOOST_CHECK(!util::shared_ptr_equal(ptr_lhs, ptr_rhs) && util::shared_ptr_not_equal(ptr_lhs, ptr_rhs));
// Equal initialization state (lhs unchanged, rhs initialized), same values
ptr_rhs = std::make_shared<MnNetInfo>();
BOOST_CHECK(ptr_lhs->IsEmpty() && ptr_rhs->IsEmpty());
BOOST_CHECK(util::shared_ptr_equal(ptr_lhs, ptr_rhs) && !util::shared_ptr_not_equal(ptr_lhs, ptr_rhs));
// Equal initialization state, same type, differing values
BOOST_CHECK_EQUAL(ptr_rhs->AddEntry("1.1.1.1:9999"), NetInfoStatus::Success);
BOOST_CHECK(!util::shared_ptr_equal(ptr_lhs, ptr_rhs) && util::shared_ptr_not_equal(ptr_lhs, ptr_rhs));
}
BOOST_AUTO_TEST_SUITE_END()