You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

374 lines
8.6 KiB

8 years ago
new pubsub package comment out failing consensus tests for now rewrite rpc httpclient to use new pubsub package import pubsub as tmpubsub, query as tmquery make event IDs constants EventKey -> EventTypeKey rename EventsPubsub to PubSub mempool does not use pubsub rename eventsSub to pubsub new subscribe API fix channel size issues and consensus tests bugs refactor rpc client add missing discardFromChan method add mutex rename pubsub to eventBus remove IsRunning from WSRPCConnection interface (not needed) add a comment in broadcastNewRoundStepsAndVotes rename registerEventCallbacks to broadcastNewRoundStepsAndVotes See https://dave.cheney.net/2014/03/19/channel-axioms stop eventBuses after reactor tests remove unnecessary Unsubscribe return subscribe helper function move discardFromChan to where it is used subscribe now returns an err this gives us ability to refuse to subscribe if pubsub is at its max capacity. use context for control overflow cache queries handle err when subscribing in replay_test rename testClientID to testSubscriber extract var set channel buffer capacity to 1 in replay_file fix byzantine_test unsubscribe from single event, not all events refactor httpclient to return events to appropriate channels return failing testReplayCrashBeforeWriteVote test fix TestValidatorSetChanges refactor code a bit fix testReplayCrashBeforeWriteVote add comment fix TestValidatorSetChanges fixes from Bucky's review update comment [ci skip] test TxEventBuffer update changelog fix TestValidatorSetChanges (2nd attempt) only do wg.Done when no errors benchmark event bus create pubsub server inside NewEventBus only expose config params (later if needed) set buffer capacity to 0 so we are not testing cache new tx event format: key = "Tx" plus a tag {"tx.hash": XYZ} This should allow to subscribe to all transactions! or a specific one using a query: "tm.events.type = Tx and tx.hash = '013ABF99434...'" use TimeoutCommit instead of afterPublishEventNewBlockTimeout TimeoutCommit is the time a node waits after committing a block, before it goes into the next height. So it will finish everything from the last block, but then wait a bit. The idea is this gives it time to hear more votes from other validators, to strengthen the commit it includes in the next block. But it also gives it time to hear about new transactions. waitForBlockWithUpdatedVals rewrite WAL crash tests Task: test that we can recover from any WAL crash. Solution: the old tests were relying on event hub being run in the same thread (we were injecting the private validator's last signature). when considering a rewrite, we considered two possible solutions: write a "fuzzy" testing system where WAL is crashing upon receiving a new message, or inject failures and trigger them in tests using something like https://github.com/coreos/gofail. remove sleep no cs.Lock around wal.Save test different cases (empty block, non-empty block, ...) comments add comments test 4 cases: empty block, non-empty block, non-empty block with smaller part size, many blocks fixes as per Bucky's last review reset subscriptions on UnsubscribeAll use a simple counter to track message for which we panicked also, set a smaller part size for all test cases
7 years ago
new pubsub package comment out failing consensus tests for now rewrite rpc httpclient to use new pubsub package import pubsub as tmpubsub, query as tmquery make event IDs constants EventKey -> EventTypeKey rename EventsPubsub to PubSub mempool does not use pubsub rename eventsSub to pubsub new subscribe API fix channel size issues and consensus tests bugs refactor rpc client add missing discardFromChan method add mutex rename pubsub to eventBus remove IsRunning from WSRPCConnection interface (not needed) add a comment in broadcastNewRoundStepsAndVotes rename registerEventCallbacks to broadcastNewRoundStepsAndVotes See https://dave.cheney.net/2014/03/19/channel-axioms stop eventBuses after reactor tests remove unnecessary Unsubscribe return subscribe helper function move discardFromChan to where it is used subscribe now returns an err this gives us ability to refuse to subscribe if pubsub is at its max capacity. use context for control overflow cache queries handle err when subscribing in replay_test rename testClientID to testSubscriber extract var set channel buffer capacity to 1 in replay_file fix byzantine_test unsubscribe from single event, not all events refactor httpclient to return events to appropriate channels return failing testReplayCrashBeforeWriteVote test fix TestValidatorSetChanges refactor code a bit fix testReplayCrashBeforeWriteVote add comment fix TestValidatorSetChanges fixes from Bucky's review update comment [ci skip] test TxEventBuffer update changelog fix TestValidatorSetChanges (2nd attempt) only do wg.Done when no errors benchmark event bus create pubsub server inside NewEventBus only expose config params (later if needed) set buffer capacity to 0 so we are not testing cache new tx event format: key = "Tx" plus a tag {"tx.hash": XYZ} This should allow to subscribe to all transactions! or a specific one using a query: "tm.events.type = Tx and tx.hash = '013ABF99434...'" use TimeoutCommit instead of afterPublishEventNewBlockTimeout TimeoutCommit is the time a node waits after committing a block, before it goes into the next height. So it will finish everything from the last block, but then wait a bit. The idea is this gives it time to hear more votes from other validators, to strengthen the commit it includes in the next block. But it also gives it time to hear about new transactions. waitForBlockWithUpdatedVals rewrite WAL crash tests Task: test that we can recover from any WAL crash. Solution: the old tests were relying on event hub being run in the same thread (we were injecting the private validator's last signature). when considering a rewrite, we considered two possible solutions: write a "fuzzy" testing system where WAL is crashing upon receiving a new message, or inject failures and trigger them in tests using something like https://github.com/coreos/gofail. remove sleep no cs.Lock around wal.Save test different cases (empty block, non-empty block, ...) comments add comments test 4 cases: empty block, non-empty block, non-empty block with smaller part size, many blocks fixes as per Bucky's last review reset subscriptions on UnsubscribeAll use a simple counter to track message for which we panicked also, set a smaller part size for all test cases
7 years ago
8 years ago
8 years ago
8 years ago
8 years ago
8 years ago
7 years ago
7 years ago
7 years ago
7 years ago
  1. package rpc
  2. import (
  3. "bytes"
  4. "context"
  5. crand "crypto/rand"
  6. "encoding/json"
  7. "fmt"
  8. "math/rand"
  9. "net/http"
  10. "os"
  11. "os/exec"
  12. "testing"
  13. "time"
  14. "github.com/go-kit/kit/log/term"
  15. "github.com/stretchr/testify/assert"
  16. "github.com/stretchr/testify/require"
  17. cmn "github.com/tendermint/tmlibs/common"
  18. "github.com/tendermint/tmlibs/log"
  19. client "github.com/tendermint/tendermint/rpc/lib/client"
  20. server "github.com/tendermint/tendermint/rpc/lib/server"
  21. types "github.com/tendermint/tendermint/rpc/lib/types"
  22. )
  23. // Client and Server should work over tcp or unix sockets
  24. const (
  25. tcpAddr = "tcp://0.0.0.0:47768"
  26. unixSocket = "/tmp/rpc_test.sock"
  27. unixAddr = "unix://" + unixSocket
  28. websocketEndpoint = "/websocket/endpoint"
  29. )
  30. type ResultEcho struct {
  31. Value string `json:"value"`
  32. }
  33. type ResultEchoInt struct {
  34. Value int `json:"value"`
  35. }
  36. type ResultEchoBytes struct {
  37. Value []byte `json:"value"`
  38. }
  39. type ResultEchoDataBytes struct {
  40. Value cmn.HexBytes `json:"value"`
  41. }
  42. // Define some routes
  43. var Routes = map[string]*server.RPCFunc{
  44. "echo": server.NewRPCFunc(EchoResult, "arg"),
  45. "echo_ws": server.NewWSRPCFunc(EchoWSResult, "arg"),
  46. "echo_bytes": server.NewRPCFunc(EchoBytesResult, "arg"),
  47. "echo_data_bytes": server.NewRPCFunc(EchoDataBytesResult, "arg"),
  48. "echo_int": server.NewRPCFunc(EchoIntResult, "arg"),
  49. }
  50. func EchoResult(v string) (*ResultEcho, error) {
  51. return &ResultEcho{v}, nil
  52. }
  53. func EchoWSResult(wsCtx types.WSRPCContext, v string) (*ResultEcho, error) {
  54. return &ResultEcho{v}, nil
  55. }
  56. func EchoIntResult(v int) (*ResultEchoInt, error) {
  57. return &ResultEchoInt{v}, nil
  58. }
  59. func EchoBytesResult(v []byte) (*ResultEchoBytes, error) {
  60. return &ResultEchoBytes{v}, nil
  61. }
  62. func EchoDataBytesResult(v cmn.HexBytes) (*ResultEchoDataBytes, error) {
  63. return &ResultEchoDataBytes{v}, nil
  64. }
  65. func TestMain(m *testing.M) {
  66. setup()
  67. code := m.Run()
  68. os.Exit(code)
  69. }
  70. var colorFn = func(keyvals ...interface{}) term.FgBgColor {
  71. for i := 0; i < len(keyvals)-1; i += 2 {
  72. if keyvals[i] == "socket" {
  73. if keyvals[i+1] == "tcp" {
  74. return term.FgBgColor{Fg: term.DarkBlue}
  75. } else if keyvals[i+1] == "unix" {
  76. return term.FgBgColor{Fg: term.DarkCyan}
  77. }
  78. }
  79. }
  80. return term.FgBgColor{}
  81. }
  82. // launch unix and tcp servers
  83. func setup() {
  84. logger := log.NewTMLoggerWithColorFn(log.NewSyncWriter(os.Stdout), colorFn)
  85. cmd := exec.Command("rm", "-f", unixSocket)
  86. err := cmd.Start()
  87. if err != nil {
  88. panic(err)
  89. }
  90. if err = cmd.Wait(); err != nil {
  91. panic(err)
  92. }
  93. tcpLogger := logger.With("socket", "tcp")
  94. mux := http.NewServeMux()
  95. server.RegisterRPCFuncs(mux, Routes, tcpLogger)
  96. wm := server.NewWebsocketManager(Routes, server.ReadWait(5*time.Second), server.PingPeriod(1*time.Second))
  97. wm.SetLogger(tcpLogger)
  98. mux.HandleFunc(websocketEndpoint, wm.WebsocketHandler)
  99. go func() {
  100. _, err := server.StartHTTPServer(tcpAddr, mux, tcpLogger)
  101. if err != nil {
  102. panic(err)
  103. }
  104. }()
  105. unixLogger := logger.With("socket", "unix")
  106. mux2 := http.NewServeMux()
  107. server.RegisterRPCFuncs(mux2, Routes, unixLogger)
  108. wm = server.NewWebsocketManager(Routes)
  109. wm.SetLogger(unixLogger)
  110. mux2.HandleFunc(websocketEndpoint, wm.WebsocketHandler)
  111. go func() {
  112. _, err := server.StartHTTPServer(unixAddr, mux2, unixLogger)
  113. if err != nil {
  114. panic(err)
  115. }
  116. }()
  117. // wait for servers to start
  118. time.Sleep(time.Second * 2)
  119. }
  120. func echoViaHTTP(cl client.HTTPClient, val string) (string, error) {
  121. params := map[string]interface{}{
  122. "arg": val,
  123. }
  124. result := new(ResultEcho)
  125. if _, err := cl.Call("echo", params, result); err != nil {
  126. return "", err
  127. }
  128. return result.Value, nil
  129. }
  130. func echoIntViaHTTP(cl client.HTTPClient, val int) (int, error) {
  131. params := map[string]interface{}{
  132. "arg": val,
  133. }
  134. result := new(ResultEchoInt)
  135. if _, err := cl.Call("echo_int", params, result); err != nil {
  136. return 0, err
  137. }
  138. return result.Value, nil
  139. }
  140. func echoBytesViaHTTP(cl client.HTTPClient, bytes []byte) ([]byte, error) {
  141. params := map[string]interface{}{
  142. "arg": bytes,
  143. }
  144. result := new(ResultEchoBytes)
  145. if _, err := cl.Call("echo_bytes", params, result); err != nil {
  146. return []byte{}, err
  147. }
  148. return result.Value, nil
  149. }
  150. func echoDataBytesViaHTTP(cl client.HTTPClient, bytes cmn.HexBytes) (cmn.HexBytes, error) {
  151. params := map[string]interface{}{
  152. "arg": bytes,
  153. }
  154. result := new(ResultEchoDataBytes)
  155. if _, err := cl.Call("echo_data_bytes", params, result); err != nil {
  156. return []byte{}, err
  157. }
  158. return result.Value, nil
  159. }
  160. func testWithHTTPClient(t *testing.T, cl client.HTTPClient) {
  161. val := "acbd"
  162. got, err := echoViaHTTP(cl, val)
  163. require.Nil(t, err)
  164. assert.Equal(t, got, val)
  165. val2 := randBytes(t)
  166. got2, err := echoBytesViaHTTP(cl, val2)
  167. require.Nil(t, err)
  168. assert.Equal(t, got2, val2)
  169. val3 := cmn.HexBytes(randBytes(t))
  170. got3, err := echoDataBytesViaHTTP(cl, val3)
  171. require.Nil(t, err)
  172. assert.Equal(t, got3, val3)
  173. val4 := rand.Intn(10000)
  174. got4, err := echoIntViaHTTP(cl, val4)
  175. require.Nil(t, err)
  176. assert.Equal(t, got4, val4)
  177. }
  178. func echoViaWS(cl *client.WSClient, val string) (string, error) {
  179. params := map[string]interface{}{
  180. "arg": val,
  181. }
  182. err := cl.Call(context.Background(), "echo", params)
  183. if err != nil {
  184. return "", err
  185. }
  186. msg := <-cl.ResponsesCh
  187. if msg.Error != nil {
  188. return "", err
  189. }
  190. result := new(ResultEcho)
  191. err = json.Unmarshal(msg.Result, result)
  192. if err != nil {
  193. return "", nil
  194. }
  195. return result.Value, nil
  196. }
  197. func echoBytesViaWS(cl *client.WSClient, bytes []byte) ([]byte, error) {
  198. params := map[string]interface{}{
  199. "arg": bytes,
  200. }
  201. err := cl.Call(context.Background(), "echo_bytes", params)
  202. if err != nil {
  203. return []byte{}, err
  204. }
  205. msg := <-cl.ResponsesCh
  206. if msg.Error != nil {
  207. return []byte{}, msg.Error
  208. }
  209. result := new(ResultEchoBytes)
  210. err = json.Unmarshal(msg.Result, result)
  211. if err != nil {
  212. return []byte{}, nil
  213. }
  214. return result.Value, nil
  215. }
  216. func testWithWSClient(t *testing.T, cl *client.WSClient) {
  217. val := "acbd"
  218. got, err := echoViaWS(cl, val)
  219. require.Nil(t, err)
  220. assert.Equal(t, got, val)
  221. val2 := randBytes(t)
  222. got2, err := echoBytesViaWS(cl, val2)
  223. require.Nil(t, err)
  224. assert.Equal(t, got2, val2)
  225. }
  226. //-------------
  227. func TestServersAndClientsBasic(t *testing.T) {
  228. serverAddrs := [...]string{tcpAddr, unixAddr}
  229. for _, addr := range serverAddrs {
  230. cl1 := client.NewURIClient(addr)
  231. fmt.Printf("=== testing server on %s using %v client", addr, cl1)
  232. testWithHTTPClient(t, cl1)
  233. cl2 := client.NewJSONRPCClient(addr)
  234. fmt.Printf("=== testing server on %s using %v client", addr, cl2)
  235. testWithHTTPClient(t, cl2)
  236. cl3 := client.NewWSClient(addr, websocketEndpoint)
  237. cl3.SetLogger(log.TestingLogger())
  238. err := cl3.Start()
  239. require.Nil(t, err)
  240. fmt.Printf("=== testing server on %s using %v client", addr, cl3)
  241. testWithWSClient(t, cl3)
  242. cl3.Stop()
  243. }
  244. }
  245. func TestHexStringArg(t *testing.T) {
  246. cl := client.NewURIClient(tcpAddr)
  247. // should NOT be handled as hex
  248. val := "0xabc"
  249. got, err := echoViaHTTP(cl, val)
  250. require.Nil(t, err)
  251. assert.Equal(t, got, val)
  252. }
  253. func TestQuotedStringArg(t *testing.T) {
  254. cl := client.NewURIClient(tcpAddr)
  255. // should NOT be unquoted
  256. val := "\"abc\""
  257. got, err := echoViaHTTP(cl, val)
  258. require.Nil(t, err)
  259. assert.Equal(t, got, val)
  260. }
  261. func TestWSNewWSRPCFunc(t *testing.T) {
  262. cl := client.NewWSClient(tcpAddr, websocketEndpoint)
  263. cl.SetLogger(log.TestingLogger())
  264. err := cl.Start()
  265. require.Nil(t, err)
  266. defer cl.Stop()
  267. val := "acbd"
  268. params := map[string]interface{}{
  269. "arg": val,
  270. }
  271. err = cl.Call(context.Background(), "echo_ws", params)
  272. require.Nil(t, err)
  273. msg := <-cl.ResponsesCh
  274. if msg.Error != nil {
  275. t.Fatal(err)
  276. }
  277. result := new(ResultEcho)
  278. err = json.Unmarshal(msg.Result, result)
  279. require.Nil(t, err)
  280. got := result.Value
  281. assert.Equal(t, got, val)
  282. }
  283. func TestWSHandlesArrayParams(t *testing.T) {
  284. cl := client.NewWSClient(tcpAddr, websocketEndpoint)
  285. cl.SetLogger(log.TestingLogger())
  286. err := cl.Start()
  287. require.Nil(t, err)
  288. defer cl.Stop()
  289. val := "acbd"
  290. params := []interface{}{val}
  291. err = cl.CallWithArrayParams(context.Background(), "echo_ws", params)
  292. require.Nil(t, err)
  293. msg := <-cl.ResponsesCh
  294. if msg.Error != nil {
  295. t.Fatalf("%+v", err)
  296. }
  297. result := new(ResultEcho)
  298. err = json.Unmarshal(msg.Result, result)
  299. require.Nil(t, err)
  300. got := result.Value
  301. assert.Equal(t, got, val)
  302. }
  303. // TestWSClientPingPong checks that a client & server exchange pings
  304. // & pongs so connection stays alive.
  305. func TestWSClientPingPong(t *testing.T) {
  306. cl := client.NewWSClient(tcpAddr, websocketEndpoint)
  307. cl.SetLogger(log.TestingLogger())
  308. err := cl.Start()
  309. require.Nil(t, err)
  310. defer cl.Stop()
  311. time.Sleep(6 * time.Second)
  312. }
  313. func randBytes(t *testing.T) []byte {
  314. n := rand.Intn(10) + 2
  315. buf := make([]byte, n)
  316. _, err := crand.Read(buf)
  317. require.Nil(t, err)
  318. return bytes.Replace(buf, []byte("="), []byte{100}, -1)
  319. }