You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

637 lines
16 KiB

p2p: file descriptor leaks (#3150) * close peer's connection to avoid fd leak Fixes #2967 * rename peer#Addr to RemoteAddr * fix test * fixes after Ethan's review * bring back the check * changelog entry * write a test for switch#acceptRoutine * increase timeouts? :( * remove extra assertNPeersWithTimeout * simplify test * assert number of peers (just to be safe) * Cleanup in OnStop * run tests with verbose flag on CircleCI * spawn a reading routine to prevent connection from closing * get port from the listener random port is faster, but often results in ``` panic: listen tcp 127.0.0.1:44068: bind: address already in use [recovered] panic: listen tcp 127.0.0.1:44068: bind: address already in use goroutine 79 [running]: testing.tRunner.func1(0xc0001bd600) /usr/local/go/src/testing/testing.go:792 +0x387 panic(0x974d20, 0xc0001b0500) /usr/local/go/src/runtime/panic.go:513 +0x1b9 github.com/tendermint/tendermint/p2p.MakeSwitch(0xc0000f42a0, 0x0, 0x9fb9cc, 0x9, 0x9fc346, 0xb, 0xb42128, 0x0, 0x0, 0x0, ...) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/test_util.go:182 +0xa28 github.com/tendermint/tendermint/p2p.MakeConnectedSwitches(0xc0000f42a0, 0x2, 0xb42128, 0xb41eb8, 0x4f1205, 0xc0001bed80, 0x4f16ed) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/test_util.go:75 +0xf9 github.com/tendermint/tendermint/p2p.MakeSwitchPair(0xbb8d20, 0xc0001bd600, 0xb42128, 0x2f7, 0x4f16c0) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/switch_test.go:94 +0x4c github.com/tendermint/tendermint/p2p.TestSwitches(0xc0001bd600) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/switch_test.go:117 +0x58 testing.tRunner(0xc0001bd600, 0xb42038) /usr/local/go/src/testing/testing.go:827 +0xbf created by testing.(*T).Run /usr/local/go/src/testing/testing.go:878 +0x353 exit status 2 FAIL github.com/tendermint/tendermint/p2p 0.350s ```
6 years ago
p2p: file descriptor leaks (#3150) * close peer's connection to avoid fd leak Fixes #2967 * rename peer#Addr to RemoteAddr * fix test * fixes after Ethan's review * bring back the check * changelog entry * write a test for switch#acceptRoutine * increase timeouts? :( * remove extra assertNPeersWithTimeout * simplify test * assert number of peers (just to be safe) * Cleanup in OnStop * run tests with verbose flag on CircleCI * spawn a reading routine to prevent connection from closing * get port from the listener random port is faster, but often results in ``` panic: listen tcp 127.0.0.1:44068: bind: address already in use [recovered] panic: listen tcp 127.0.0.1:44068: bind: address already in use goroutine 79 [running]: testing.tRunner.func1(0xc0001bd600) /usr/local/go/src/testing/testing.go:792 +0x387 panic(0x974d20, 0xc0001b0500) /usr/local/go/src/runtime/panic.go:513 +0x1b9 github.com/tendermint/tendermint/p2p.MakeSwitch(0xc0000f42a0, 0x0, 0x9fb9cc, 0x9, 0x9fc346, 0xb, 0xb42128, 0x0, 0x0, 0x0, ...) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/test_util.go:182 +0xa28 github.com/tendermint/tendermint/p2p.MakeConnectedSwitches(0xc0000f42a0, 0x2, 0xb42128, 0xb41eb8, 0x4f1205, 0xc0001bed80, 0x4f16ed) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/test_util.go:75 +0xf9 github.com/tendermint/tendermint/p2p.MakeSwitchPair(0xbb8d20, 0xc0001bd600, 0xb42128, 0x2f7, 0x4f16c0) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/switch_test.go:94 +0x4c github.com/tendermint/tendermint/p2p.TestSwitches(0xc0001bd600) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/switch_test.go:117 +0x58 testing.tRunner(0xc0001bd600, 0xb42038) /usr/local/go/src/testing/testing.go:827 +0xbf created by testing.(*T).Run /usr/local/go/src/testing/testing.go:878 +0x353 exit status 2 FAIL github.com/tendermint/tendermint/p2p 0.350s ```
6 years ago
p2p: file descriptor leaks (#3150) * close peer's connection to avoid fd leak Fixes #2967 * rename peer#Addr to RemoteAddr * fix test * fixes after Ethan's review * bring back the check * changelog entry * write a test for switch#acceptRoutine * increase timeouts? :( * remove extra assertNPeersWithTimeout * simplify test * assert number of peers (just to be safe) * Cleanup in OnStop * run tests with verbose flag on CircleCI * spawn a reading routine to prevent connection from closing * get port from the listener random port is faster, but often results in ``` panic: listen tcp 127.0.0.1:44068: bind: address already in use [recovered] panic: listen tcp 127.0.0.1:44068: bind: address already in use goroutine 79 [running]: testing.tRunner.func1(0xc0001bd600) /usr/local/go/src/testing/testing.go:792 +0x387 panic(0x974d20, 0xc0001b0500) /usr/local/go/src/runtime/panic.go:513 +0x1b9 github.com/tendermint/tendermint/p2p.MakeSwitch(0xc0000f42a0, 0x0, 0x9fb9cc, 0x9, 0x9fc346, 0xb, 0xb42128, 0x0, 0x0, 0x0, ...) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/test_util.go:182 +0xa28 github.com/tendermint/tendermint/p2p.MakeConnectedSwitches(0xc0000f42a0, 0x2, 0xb42128, 0xb41eb8, 0x4f1205, 0xc0001bed80, 0x4f16ed) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/test_util.go:75 +0xf9 github.com/tendermint/tendermint/p2p.MakeSwitchPair(0xbb8d20, 0xc0001bd600, 0xb42128, 0x2f7, 0x4f16c0) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/switch_test.go:94 +0x4c github.com/tendermint/tendermint/p2p.TestSwitches(0xc0001bd600) /home/vagrant/go/src/github.com/tendermint/tendermint/p2p/switch_test.go:117 +0x58 testing.tRunner(0xc0001bd600, 0xb42038) /usr/local/go/src/testing/testing.go:827 +0xbf created by testing.(*T).Run /usr/local/go/src/testing/testing.go:878 +0x353 exit status 2 FAIL github.com/tendermint/tendermint/p2p 0.350s ```
6 years ago
  1. package p2p
  2. import (
  3. "bytes"
  4. "errors"
  5. "fmt"
  6. "io"
  7. "io/ioutil"
  8. "net"
  9. "net/http"
  10. "net/http/httptest"
  11. "regexp"
  12. "strconv"
  13. "sync"
  14. "testing"
  15. "time"
  16. stdprometheus "github.com/prometheus/client_golang/prometheus"
  17. "github.com/stretchr/testify/assert"
  18. "github.com/stretchr/testify/require"
  19. "github.com/tendermint/tendermint/config"
  20. "github.com/tendermint/tendermint/crypto/ed25519"
  21. "github.com/tendermint/tendermint/libs/log"
  22. "github.com/tendermint/tendermint/p2p/conn"
  23. )
  24. var (
  25. cfg *config.P2PConfig
  26. )
  27. func init() {
  28. cfg = config.DefaultP2PConfig()
  29. cfg.PexReactor = true
  30. cfg.AllowDuplicateIP = true
  31. }
  32. type PeerMessage struct {
  33. PeerID ID
  34. Bytes []byte
  35. Counter int
  36. }
  37. type TestReactor struct {
  38. BaseReactor
  39. mtx sync.Mutex
  40. channels []*conn.ChannelDescriptor
  41. logMessages bool
  42. msgsCounter int
  43. msgsReceived map[byte][]PeerMessage
  44. }
  45. func NewTestReactor(channels []*conn.ChannelDescriptor, logMessages bool) *TestReactor {
  46. tr := &TestReactor{
  47. channels: channels,
  48. logMessages: logMessages,
  49. msgsReceived: make(map[byte][]PeerMessage),
  50. }
  51. tr.BaseReactor = *NewBaseReactor("TestReactor", tr)
  52. tr.SetLogger(log.TestingLogger())
  53. return tr
  54. }
  55. func (tr *TestReactor) GetChannels() []*conn.ChannelDescriptor {
  56. return tr.channels
  57. }
  58. func (tr *TestReactor) AddPeer(peer Peer) {}
  59. func (tr *TestReactor) RemovePeer(peer Peer, reason interface{}) {}
  60. func (tr *TestReactor) Receive(chID byte, peer Peer, msgBytes []byte) {
  61. if tr.logMessages {
  62. tr.mtx.Lock()
  63. defer tr.mtx.Unlock()
  64. //fmt.Printf("Received: %X, %X\n", chID, msgBytes)
  65. tr.msgsReceived[chID] = append(tr.msgsReceived[chID], PeerMessage{peer.ID(), msgBytes, tr.msgsCounter})
  66. tr.msgsCounter++
  67. }
  68. }
  69. func (tr *TestReactor) getMsgs(chID byte) []PeerMessage {
  70. tr.mtx.Lock()
  71. defer tr.mtx.Unlock()
  72. return tr.msgsReceived[chID]
  73. }
  74. //-----------------------------------------------------------------------------
  75. // convenience method for creating two switches connected to each other.
  76. // XXX: note this uses net.Pipe and not a proper TCP conn
  77. func MakeSwitchPair(t testing.TB, initSwitch func(int, *Switch) *Switch) (*Switch, *Switch) {
  78. // Create two switches that will be interconnected.
  79. switches := MakeConnectedSwitches(cfg, 2, initSwitch, Connect2Switches)
  80. return switches[0], switches[1]
  81. }
  82. func initSwitchFunc(i int, sw *Switch) *Switch {
  83. sw.SetAddrBook(&addrBookMock{
  84. addrs: make(map[string]struct{}),
  85. ourAddrs: make(map[string]struct{})})
  86. // Make two reactors of two channels each
  87. sw.AddReactor("foo", NewTestReactor([]*conn.ChannelDescriptor{
  88. {ID: byte(0x00), Priority: 10},
  89. {ID: byte(0x01), Priority: 10},
  90. }, true))
  91. sw.AddReactor("bar", NewTestReactor([]*conn.ChannelDescriptor{
  92. {ID: byte(0x02), Priority: 10},
  93. {ID: byte(0x03), Priority: 10},
  94. }, true))
  95. return sw
  96. }
  97. func TestSwitches(t *testing.T) {
  98. s1, s2 := MakeSwitchPair(t, initSwitchFunc)
  99. defer s1.Stop()
  100. defer s2.Stop()
  101. if s1.Peers().Size() != 1 {
  102. t.Errorf("Expected exactly 1 peer in s1, got %v", s1.Peers().Size())
  103. }
  104. if s2.Peers().Size() != 1 {
  105. t.Errorf("Expected exactly 1 peer in s2, got %v", s2.Peers().Size())
  106. }
  107. // Lets send some messages
  108. ch0Msg := []byte("channel zero")
  109. ch1Msg := []byte("channel foo")
  110. ch2Msg := []byte("channel bar")
  111. s1.Broadcast(byte(0x00), ch0Msg)
  112. s1.Broadcast(byte(0x01), ch1Msg)
  113. s1.Broadcast(byte(0x02), ch2Msg)
  114. assertMsgReceivedWithTimeout(t, ch0Msg, byte(0x00), s2.Reactor("foo").(*TestReactor), 10*time.Millisecond, 5*time.Second)
  115. assertMsgReceivedWithTimeout(t, ch1Msg, byte(0x01), s2.Reactor("foo").(*TestReactor), 10*time.Millisecond, 5*time.Second)
  116. assertMsgReceivedWithTimeout(t, ch2Msg, byte(0x02), s2.Reactor("bar").(*TestReactor), 10*time.Millisecond, 5*time.Second)
  117. }
  118. func assertMsgReceivedWithTimeout(t *testing.T, msgBytes []byte, channel byte, reactor *TestReactor, checkPeriod, timeout time.Duration) {
  119. ticker := time.NewTicker(checkPeriod)
  120. for {
  121. select {
  122. case <-ticker.C:
  123. msgs := reactor.getMsgs(channel)
  124. if len(msgs) > 0 {
  125. if !bytes.Equal(msgs[0].Bytes, msgBytes) {
  126. t.Fatalf("Unexpected message bytes. Wanted: %X, Got: %X", msgBytes, msgs[0].Bytes)
  127. }
  128. return
  129. }
  130. case <-time.After(timeout):
  131. t.Fatalf("Expected to have received 1 message in channel #%v, got zero", channel)
  132. }
  133. }
  134. }
  135. func TestSwitchFiltersOutItself(t *testing.T) {
  136. s1 := MakeSwitch(cfg, 1, "127.0.0.1", "123.123.123", initSwitchFunc)
  137. // addr := s1.NodeInfo().NetAddress()
  138. // // add ourselves like we do in node.go#427
  139. // s1.addrBook.AddOurAddress(addr)
  140. // simulate s1 having a public IP by creating a remote peer with the same ID
  141. rp := &remotePeer{PrivKey: s1.nodeKey.PrivKey, Config: cfg}
  142. rp.Start()
  143. // addr should be rejected in addPeer based on the same ID
  144. err := s1.DialPeerWithAddress(rp.Addr(), false)
  145. if assert.Error(t, err) {
  146. if err, ok := err.(ErrRejected); ok {
  147. if !err.IsSelf() {
  148. t.Errorf("expected self to be rejected")
  149. }
  150. } else {
  151. t.Errorf("expected ErrRejected")
  152. }
  153. }
  154. assert.True(t, s1.addrBook.OurAddress(rp.Addr()))
  155. assert.False(t, s1.addrBook.HasAddress(rp.Addr()))
  156. rp.Stop()
  157. assertNoPeersAfterTimeout(t, s1, 100*time.Millisecond)
  158. }
  159. func TestSwitchPeerFilter(t *testing.T) {
  160. var (
  161. filters = []PeerFilterFunc{
  162. func(_ IPeerSet, _ Peer) error { return nil },
  163. func(_ IPeerSet, _ Peer) error { return fmt.Errorf("denied!") },
  164. func(_ IPeerSet, _ Peer) error { return nil },
  165. }
  166. sw = MakeSwitch(
  167. cfg,
  168. 1,
  169. "testing",
  170. "123.123.123",
  171. initSwitchFunc,
  172. SwitchPeerFilters(filters...),
  173. )
  174. )
  175. defer sw.Stop()
  176. // simulate remote peer
  177. rp := &remotePeer{PrivKey: ed25519.GenPrivKey(), Config: cfg}
  178. rp.Start()
  179. defer rp.Stop()
  180. p, err := sw.transport.Dial(*rp.Addr(), peerConfig{
  181. chDescs: sw.chDescs,
  182. onPeerError: sw.StopPeerForError,
  183. reactorsByCh: sw.reactorsByCh,
  184. })
  185. if err != nil {
  186. t.Fatal(err)
  187. }
  188. err = sw.addPeer(p)
  189. if err, ok := err.(ErrRejected); ok {
  190. if !err.IsFiltered() {
  191. t.Errorf("expected peer to be filtered")
  192. }
  193. } else {
  194. t.Errorf("expected ErrRejected")
  195. }
  196. }
  197. func TestSwitchPeerFilterTimeout(t *testing.T) {
  198. var (
  199. filters = []PeerFilterFunc{
  200. func(_ IPeerSet, _ Peer) error {
  201. time.Sleep(10 * time.Millisecond)
  202. return nil
  203. },
  204. }
  205. sw = MakeSwitch(
  206. cfg,
  207. 1,
  208. "testing",
  209. "123.123.123",
  210. initSwitchFunc,
  211. SwitchFilterTimeout(5*time.Millisecond),
  212. SwitchPeerFilters(filters...),
  213. )
  214. )
  215. defer sw.Stop()
  216. // simulate remote peer
  217. rp := &remotePeer{PrivKey: ed25519.GenPrivKey(), Config: cfg}
  218. rp.Start()
  219. defer rp.Stop()
  220. p, err := sw.transport.Dial(*rp.Addr(), peerConfig{
  221. chDescs: sw.chDescs,
  222. onPeerError: sw.StopPeerForError,
  223. reactorsByCh: sw.reactorsByCh,
  224. })
  225. if err != nil {
  226. t.Fatal(err)
  227. }
  228. err = sw.addPeer(p)
  229. if _, ok := err.(ErrFilterTimeout); !ok {
  230. t.Errorf("expected ErrFilterTimeout")
  231. }
  232. }
  233. func TestSwitchPeerFilterDuplicate(t *testing.T) {
  234. sw := MakeSwitch(cfg, 1, "testing", "123.123.123", initSwitchFunc)
  235. sw.Start()
  236. defer sw.Stop()
  237. // simulate remote peer
  238. rp := &remotePeer{PrivKey: ed25519.GenPrivKey(), Config: cfg}
  239. rp.Start()
  240. defer rp.Stop()
  241. p, err := sw.transport.Dial(*rp.Addr(), peerConfig{
  242. chDescs: sw.chDescs,
  243. onPeerError: sw.StopPeerForError,
  244. reactorsByCh: sw.reactorsByCh,
  245. })
  246. if err != nil {
  247. t.Fatal(err)
  248. }
  249. if err := sw.addPeer(p); err != nil {
  250. t.Fatal(err)
  251. }
  252. err = sw.addPeer(p)
  253. if errRej, ok := err.(ErrRejected); ok {
  254. if !errRej.IsDuplicate() {
  255. t.Errorf("expected peer to be duplicate. got %v", errRej)
  256. }
  257. } else {
  258. t.Errorf("expected ErrRejected, got %v", err)
  259. }
  260. }
  261. func assertNoPeersAfterTimeout(t *testing.T, sw *Switch, timeout time.Duration) {
  262. time.Sleep(timeout)
  263. if sw.Peers().Size() != 0 {
  264. t.Fatalf("Expected %v to not connect to some peers, got %d", sw, sw.Peers().Size())
  265. }
  266. }
  267. func TestSwitchStopsNonPersistentPeerOnError(t *testing.T) {
  268. assert, require := assert.New(t), require.New(t)
  269. sw := MakeSwitch(cfg, 1, "testing", "123.123.123", initSwitchFunc)
  270. err := sw.Start()
  271. if err != nil {
  272. t.Error(err)
  273. }
  274. defer sw.Stop()
  275. // simulate remote peer
  276. rp := &remotePeer{PrivKey: ed25519.GenPrivKey(), Config: cfg}
  277. rp.Start()
  278. defer rp.Stop()
  279. p, err := sw.transport.Dial(*rp.Addr(), peerConfig{
  280. chDescs: sw.chDescs,
  281. onPeerError: sw.StopPeerForError,
  282. reactorsByCh: sw.reactorsByCh,
  283. })
  284. require.Nil(err)
  285. err = sw.addPeer(p)
  286. require.Nil(err)
  287. require.NotNil(sw.Peers().Get(rp.ID()))
  288. // simulate failure by closing connection
  289. p.(*peer).CloseConn()
  290. assertNoPeersAfterTimeout(t, sw, 100*time.Millisecond)
  291. assert.False(p.IsRunning())
  292. }
  293. func TestSwitchStopPeerForError(t *testing.T) {
  294. s := httptest.NewServer(stdprometheus.UninstrumentedHandler())
  295. defer s.Close()
  296. scrapeMetrics := func() string {
  297. resp, _ := http.Get(s.URL)
  298. buf, _ := ioutil.ReadAll(resp.Body)
  299. return string(buf)
  300. }
  301. namespace, subsystem, name := config.TestInstrumentationConfig().Namespace, MetricsSubsystem, "peers"
  302. re := regexp.MustCompile(namespace + `_` + subsystem + `_` + name + ` ([0-9\.]+)`)
  303. peersMetricValue := func() float64 {
  304. matches := re.FindStringSubmatch(scrapeMetrics())
  305. f, _ := strconv.ParseFloat(matches[1], 64)
  306. return f
  307. }
  308. p2pMetrics := PrometheusMetrics(namespace)
  309. // make two connected switches
  310. sw1, sw2 := MakeSwitchPair(t, func(i int, sw *Switch) *Switch {
  311. // set metrics on sw1
  312. if i == 0 {
  313. opt := WithMetrics(p2pMetrics)
  314. opt(sw)
  315. }
  316. return initSwitchFunc(i, sw)
  317. })
  318. assert.Equal(t, len(sw1.Peers().List()), 1)
  319. assert.EqualValues(t, 1, peersMetricValue())
  320. // send messages to the peer from sw1
  321. p := sw1.Peers().List()[0]
  322. p.Send(0x1, []byte("here's a message to send"))
  323. // stop sw2. this should cause the p to fail,
  324. // which results in calling StopPeerForError internally
  325. sw2.Stop()
  326. // now call StopPeerForError explicitly, eg. from a reactor
  327. sw1.StopPeerForError(p, fmt.Errorf("some err"))
  328. assert.Equal(t, len(sw1.Peers().List()), 0)
  329. assert.EqualValues(t, 0, peersMetricValue())
  330. }
  331. func TestSwitchReconnectsToPersistentPeer(t *testing.T) {
  332. assert, require := assert.New(t), require.New(t)
  333. sw := MakeSwitch(cfg, 1, "testing", "123.123.123", initSwitchFunc)
  334. err := sw.Start()
  335. if err != nil {
  336. t.Error(err)
  337. }
  338. defer sw.Stop()
  339. // simulate remote peer
  340. rp := &remotePeer{PrivKey: ed25519.GenPrivKey(), Config: cfg}
  341. rp.Start()
  342. defer rp.Stop()
  343. p, err := sw.transport.Dial(*rp.Addr(), peerConfig{
  344. chDescs: sw.chDescs,
  345. onPeerError: sw.StopPeerForError,
  346. persistent: true,
  347. reactorsByCh: sw.reactorsByCh,
  348. })
  349. require.Nil(err)
  350. require.Nil(sw.addPeer(p))
  351. require.NotNil(sw.Peers().Get(rp.ID()))
  352. // simulate failure by closing connection
  353. p.(*peer).CloseConn()
  354. // TODO: remove sleep, detect the disconnection, wait for reconnect
  355. npeers := sw.Peers().Size()
  356. for i := 0; i < 20; i++ {
  357. time.Sleep(250 * time.Millisecond)
  358. npeers = sw.Peers().Size()
  359. if npeers > 0 {
  360. break
  361. }
  362. }
  363. assert.NotZero(npeers)
  364. assert.False(p.IsRunning())
  365. // simulate another remote peer
  366. rp = &remotePeer{
  367. PrivKey: ed25519.GenPrivKey(),
  368. Config: cfg,
  369. // Use different interface to prevent duplicate IP filter, this will break
  370. // beyond two peers.
  371. listenAddr: "127.0.0.1:0",
  372. }
  373. rp.Start()
  374. defer rp.Stop()
  375. // simulate first time dial failure
  376. conf := config.DefaultP2PConfig()
  377. conf.TestDialFail = true
  378. err = sw.addOutboundPeerWithConfig(rp.Addr(), conf, true)
  379. require.NotNil(err)
  380. // DialPeerWithAddres - sw.peerConfig resets the dialer
  381. // TODO: same as above
  382. for i := 0; i < 20; i++ {
  383. time.Sleep(250 * time.Millisecond)
  384. npeers = sw.Peers().Size()
  385. if npeers > 1 {
  386. break
  387. }
  388. }
  389. assert.EqualValues(2, npeers)
  390. }
  391. func TestSwitchFullConnectivity(t *testing.T) {
  392. switches := MakeConnectedSwitches(cfg, 3, initSwitchFunc, Connect2Switches)
  393. defer func() {
  394. for _, sw := range switches {
  395. sw.Stop()
  396. }
  397. }()
  398. for i, sw := range switches {
  399. if sw.Peers().Size() != 2 {
  400. t.Fatalf("Expected each switch to be connected to 2 other, but %d switch only connected to %d", sw.Peers().Size(), i)
  401. }
  402. }
  403. }
  404. func TestSwitchAcceptRoutine(t *testing.T) {
  405. cfg.MaxNumInboundPeers = 5
  406. // make switch
  407. sw := MakeSwitch(cfg, 1, "testing", "123.123.123", initSwitchFunc)
  408. err := sw.Start()
  409. require.NoError(t, err)
  410. defer sw.Stop()
  411. remotePeers := make([]*remotePeer, 0)
  412. assert.Equal(t, 0, sw.Peers().Size())
  413. // 1. check we connect up to MaxNumInboundPeers
  414. for i := 0; i < cfg.MaxNumInboundPeers; i++ {
  415. rp := &remotePeer{PrivKey: ed25519.GenPrivKey(), Config: cfg}
  416. remotePeers = append(remotePeers, rp)
  417. rp.Start()
  418. c, err := rp.Dial(sw.NodeInfo().NetAddress())
  419. require.NoError(t, err)
  420. // spawn a reading routine to prevent connection from closing
  421. go func(c net.Conn) {
  422. for {
  423. one := make([]byte, 1)
  424. _, err := c.Read(one)
  425. if err != nil {
  426. return
  427. }
  428. }
  429. }(c)
  430. }
  431. time.Sleep(10 * time.Millisecond)
  432. assert.Equal(t, cfg.MaxNumInboundPeers, sw.Peers().Size())
  433. // 2. check we close new connections if we already have MaxNumInboundPeers peers
  434. rp := &remotePeer{PrivKey: ed25519.GenPrivKey(), Config: cfg}
  435. rp.Start()
  436. conn, err := rp.Dial(sw.NodeInfo().NetAddress())
  437. require.NoError(t, err)
  438. // check conn is closed
  439. one := make([]byte, 1)
  440. conn.SetReadDeadline(time.Now().Add(10 * time.Millisecond))
  441. _, err = conn.Read(one)
  442. assert.Equal(t, io.EOF, err)
  443. assert.Equal(t, cfg.MaxNumInboundPeers, sw.Peers().Size())
  444. rp.Stop()
  445. // stop remote peers
  446. for _, rp := range remotePeers {
  447. rp.Stop()
  448. }
  449. }
  450. type errorTransport struct {
  451. acceptErr error
  452. }
  453. func (et errorTransport) Accept(c peerConfig) (Peer, error) {
  454. return nil, et.acceptErr
  455. }
  456. func (errorTransport) Dial(NetAddress, peerConfig) (Peer, error) {
  457. panic("not implemented")
  458. }
  459. func (errorTransport) Cleanup(Peer) {
  460. panic("not implemented")
  461. }
  462. func TestSwitchAcceptRoutineErrorCases(t *testing.T) {
  463. sw := NewSwitch(cfg, errorTransport{ErrFilterTimeout{}})
  464. assert.NotPanics(t, func() {
  465. err := sw.Start()
  466. assert.NoError(t, err)
  467. sw.Stop()
  468. })
  469. sw = NewSwitch(cfg, errorTransport{ErrRejected{conn: nil, err: errors.New("filtered"), isFiltered: true}})
  470. assert.NotPanics(t, func() {
  471. err := sw.Start()
  472. assert.NoError(t, err)
  473. sw.Stop()
  474. })
  475. // TODO(melekes) check we remove our address from addrBook
  476. sw = NewSwitch(cfg, errorTransport{ErrTransportClosed{}})
  477. assert.NotPanics(t, func() {
  478. err := sw.Start()
  479. assert.NoError(t, err)
  480. sw.Stop()
  481. })
  482. }
  483. func BenchmarkSwitchBroadcast(b *testing.B) {
  484. s1, s2 := MakeSwitchPair(b, func(i int, sw *Switch) *Switch {
  485. // Make bar reactors of bar channels each
  486. sw.AddReactor("foo", NewTestReactor([]*conn.ChannelDescriptor{
  487. {ID: byte(0x00), Priority: 10},
  488. {ID: byte(0x01), Priority: 10},
  489. }, false))
  490. sw.AddReactor("bar", NewTestReactor([]*conn.ChannelDescriptor{
  491. {ID: byte(0x02), Priority: 10},
  492. {ID: byte(0x03), Priority: 10},
  493. }, false))
  494. return sw
  495. })
  496. defer s1.Stop()
  497. defer s2.Stop()
  498. // Allow time for goroutines to boot up
  499. time.Sleep(1 * time.Second)
  500. b.ResetTimer()
  501. numSuccess, numFailure := 0, 0
  502. // Send random message from foo channel to another
  503. for i := 0; i < b.N; i++ {
  504. chID := byte(i % 4)
  505. successChan := s1.Broadcast(chID, []byte("test data"))
  506. for s := range successChan {
  507. if s {
  508. numSuccess++
  509. } else {
  510. numFailure++
  511. }
  512. }
  513. }
  514. b.Logf("success: %v, failure: %v", numSuccess, numFailure)
  515. }
  516. type addrBookMock struct {
  517. addrs map[string]struct{}
  518. ourAddrs map[string]struct{}
  519. }
  520. var _ AddrBook = (*addrBookMock)(nil)
  521. func (book *addrBookMock) AddAddress(addr *NetAddress, src *NetAddress) error {
  522. book.addrs[addr.String()] = struct{}{}
  523. return nil
  524. }
  525. func (book *addrBookMock) AddOurAddress(addr *NetAddress) { book.ourAddrs[addr.String()] = struct{}{} }
  526. func (book *addrBookMock) OurAddress(addr *NetAddress) bool {
  527. _, ok := book.ourAddrs[addr.String()]
  528. return ok
  529. }
  530. func (book *addrBookMock) MarkGood(*NetAddress) {}
  531. func (book *addrBookMock) HasAddress(addr *NetAddress) bool {
  532. _, ok := book.addrs[addr.String()]
  533. return ok
  534. }
  535. func (book *addrBookMock) RemoveAddress(addr *NetAddress) {
  536. delete(book.addrs, addr.String())
  537. }
  538. func (book *addrBookMock) Save() {}