Skip to content

Commit 2b43d31

Browse files
Test that do_attempt_write_data does not infinitely loop
when all the channel messages can't fit into the buffer. Adds a test for PR #550.
1 parent a5e0834 commit 2b43d31

File tree

1 file changed

+144
-6
lines changed

1 file changed

+144
-6
lines changed

lightning/src/ln/peer_handler.rs

Lines changed: 144 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1149,8 +1149,13 @@ impl<Descriptor: SocketDescriptor, CM: Deref> PeerManager<Descriptor, CM> where
11491149

11501150
#[cfg(test)]
11511151
mod tests {
1152+
use secp256k1::Signature;
1153+
use bitcoin::BitcoinHash;
1154+
use bitcoin::network::constants::Network;
1155+
use bitcoin::blockdata::constants::genesis_block;
11521156
use ln::peer_handler::{PeerManager, MessageHandler, SocketDescriptor};
11531157
use ln::msgs;
1158+
use ln::features::ChannelFeatures;
11541159
use util::events;
11551160
use util::test_utils;
11561161
use util::logger::Logger;
@@ -1162,6 +1167,7 @@ mod tests {
11621167

11631168
use std;
11641169
use std::sync::{Arc, Mutex};
1170+
use std::sync::atomic::{AtomicUsize, Ordering};
11651171

11661172
#[derive(Clone)]
11671173
struct FileDescriptor {
@@ -1199,7 +1205,7 @@ mod tests {
11991205
chan_handlers
12001206
}
12011207

1202-
fn create_network<'a>(peer_count: usize, chan_handlers: &'a Vec<test_utils::TestChannelMessageHandler>) -> Vec<PeerManager<FileDescriptor, &'a test_utils::TestChannelMessageHandler>> {
1208+
fn create_network<'a>(peer_count: usize, chan_handlers: &'a Vec<test_utils::TestChannelMessageHandler>, routing_handlers: Option<&'a Vec<Arc<msgs::RoutingMessageHandler>>>) -> Vec<PeerManager<FileDescriptor, &'a test_utils::TestChannelMessageHandler>> {
12031209
let mut peers = Vec::new();
12041210
let mut rng = thread_rng();
12051211
let logger : Arc<Logger> = Arc::new(test_utils::TestLogger::new());
@@ -1208,20 +1214,23 @@ mod tests {
12081214

12091215
for i in 0..peer_count {
12101216
let router = test_utils::TestRoutingMessageHandler::new();
1217+
let router = if let Some(routers) = routing_handlers { routers[i].clone() } else {
1218+
Arc::new(router)
1219+
};
12111220
let node_id = {
12121221
let mut key_slice = [0;32];
12131222
rng.fill_bytes(&mut key_slice);
12141223
SecretKey::from_slice(&key_slice).unwrap()
12151224
};
1216-
let msg_handler = MessageHandler { chan_handler: &chan_handlers[i], route_handler: Arc::new(router) };
1225+
let msg_handler = MessageHandler { chan_handler: &chan_handlers[i], route_handler: router };
12171226
let peer = PeerManager::new(msg_handler, node_id, &ephemeral_bytes, Arc::clone(&logger));
12181227
peers.push(peer);
12191228
}
12201229

12211230
peers
12221231
}
12231232

1224-
fn establish_connection<'a>(peer_a: &PeerManager<FileDescriptor, &'a test_utils::TestChannelMessageHandler>, peer_b: &PeerManager<FileDescriptor, &'a test_utils::TestChannelMessageHandler>) {
1233+
fn establish_connection<'a>(peer_a: &PeerManager<FileDescriptor, &'a test_utils::TestChannelMessageHandler>, peer_b: &PeerManager<FileDescriptor, &'a test_utils::TestChannelMessageHandler>) -> (FileDescriptor, FileDescriptor) {
12251234
let secp_ctx = Secp256k1::new();
12261235
let a_id = PublicKey::from_secret_key(&secp_ctx, &peer_a.our_node_secret);
12271236
let mut fd_a = FileDescriptor { fd: 1, outbound_data: Arc::new(Mutex::new(Vec::new())) };
@@ -1231,6 +1240,7 @@ mod tests {
12311240
assert_eq!(peer_a.read_event(&mut fd_a, &initial_data).unwrap(), false);
12321241
assert_eq!(peer_b.read_event(&mut fd_b, &fd_a.outbound_data.lock().unwrap().split_off(0)).unwrap(), false);
12331242
assert_eq!(peer_a.read_event(&mut fd_a, &fd_b.outbound_data.lock().unwrap().split_off(0)).unwrap(), false);
1243+
(fd_a.clone(), fd_b.clone())
12341244
}
12351245

12361246
#[test]
@@ -1239,7 +1249,7 @@ mod tests {
12391249
// push a DisconnectPeer event to remove the node flagged by id
12401250
let chan_handlers = create_chan_handlers(2);
12411251
let chan_handler = test_utils::TestChannelMessageHandler::new();
1242-
let mut peers = create_network(2, &chan_handlers);
1252+
let mut peers = create_network(2, &chan_handlers, None);
12431253
establish_connection(&peers[0], &peers[1]);
12441254
assert_eq!(peers[0].peers.lock().unwrap().peers.len(), 1);
12451255

@@ -1256,11 +1266,12 @@ mod tests {
12561266
peers[0].process_events();
12571267
assert_eq!(peers[0].peers.lock().unwrap().peers.len(), 0);
12581268
}
1269+
12591270
#[test]
1260-
fn test_timer_tick_occured(){
1271+
fn test_timer_tick_occurred() {
12611272
// Create peers, a vector of two peer managers, perform initial set up and check that peers[0] has one Peer.
12621273
let chan_handlers = create_chan_handlers(2);
1263-
let peers = create_network(2, &chan_handlers);
1274+
let peers = create_network(2, &chan_handlers, None);
12641275
establish_connection(&peers[0], &peers[1]);
12651276
assert_eq!(peers[0].peers.lock().unwrap().peers.len(), 1);
12661277

@@ -1272,4 +1283,131 @@ mod tests {
12721283
peers[0].timer_tick_occured();
12731284
assert_eq!(peers[0].peers.lock().unwrap().peers.len(), 0);
12741285
}
1286+
1287+
pub struct TestRoutingMessageHandler {
1288+
pub chan_upds_recvd: AtomicUsize,
1289+
pub chan_anns_recvd: AtomicUsize,
1290+
}
1291+
1292+
impl TestRoutingMessageHandler {
1293+
pub fn new() -> Self {
1294+
TestRoutingMessageHandler {
1295+
chan_upds_recvd: AtomicUsize::new(0),
1296+
chan_anns_recvd: AtomicUsize::new(0),
1297+
}
1298+
}
1299+
1300+
}
1301+
impl msgs::RoutingMessageHandler for TestRoutingMessageHandler {
1302+
fn handle_node_announcement(&self, _msg: &msgs::NodeAnnouncement) -> Result<bool, msgs::LightningError> {
1303+
Err(msgs::LightningError { err: "", action: msgs::ErrorAction::IgnoreError })
1304+
}
1305+
fn handle_channel_announcement(&self, _msg: &msgs::ChannelAnnouncement) -> Result<bool, msgs::LightningError> {
1306+
self.chan_anns_recvd.fetch_add(1, Ordering::AcqRel);
1307+
Err(msgs::LightningError { err: "", action: msgs::ErrorAction::IgnoreError })
1308+
}
1309+
fn handle_channel_update(&self, _msg: &msgs::ChannelUpdate) -> Result<bool, msgs::LightningError> {
1310+
self.chan_upds_recvd.fetch_add(1, Ordering::AcqRel);
1311+
Err(msgs::LightningError { err: "", action: msgs::ErrorAction::IgnoreError })
1312+
}
1313+
fn handle_htlc_fail_channel_update(&self, _update: &msgs::HTLCFailChannelUpdate) {}
1314+
fn get_next_channel_announcements(&self, starting_point: u64, batch_amount: u8) -> Vec<(msgs::ChannelAnnouncement, msgs::ChannelUpdate,msgs::ChannelUpdate)> {
1315+
let mut chan_anns = Vec::new();
1316+
let batch_amt = batch_amount as u64;
1317+
let end: u64 = if starting_point > 0 { starting_point + batch_amt - 1 } else { batch_amount.into() };
1318+
for j in starting_point..end {
1319+
let chan_upd_1 = get_dummy_channel_update(j);
1320+
let chan_upd_2 = get_dummy_channel_update(j);
1321+
let chan_ann = get_dummy_channel_announcement(j);
1322+
1323+
chan_anns.push((chan_ann, chan_upd_1, chan_upd_2));
1324+
}
1325+
1326+
chan_anns
1327+
}
1328+
1329+
fn get_next_node_announcements(&self, _starting_point: Option<&PublicKey>, _batch_amount: u8) -> Vec<msgs::NodeAnnouncement> {
1330+
Vec::new()
1331+
}
1332+
1333+
fn should_request_full_sync(&self, _node_id: &PublicKey) -> bool {
1334+
true
1335+
}
1336+
}
1337+
1338+
fn get_dummy_channel_announcement(short_chan_id: u64) -> msgs::ChannelAnnouncement {
1339+
use secp256k1::ffi::Signature as FFISignature;
1340+
let secp_ctx = Secp256k1::new();
1341+
let network = Network::Testnet;
1342+
let node_1_privkey = SecretKey::from_slice(&[42; 32]).unwrap();
1343+
let node_2_privkey = SecretKey::from_slice(&[41; 32]).unwrap();
1344+
let node_1_btckey = SecretKey::from_slice(&[40; 32]).unwrap();
1345+
let node_2_btckey = SecretKey::from_slice(&[39; 32]).unwrap();
1346+
let unsigned_ann = msgs::UnsignedChannelAnnouncement {
1347+
features: ChannelFeatures::supported(),
1348+
chain_hash: genesis_block(network).header.bitcoin_hash(),
1349+
short_channel_id: short_chan_id,
1350+
node_id_1: PublicKey::from_secret_key(&secp_ctx, &node_1_privkey),
1351+
node_id_2: PublicKey::from_secret_key(&secp_ctx, &node_2_privkey),
1352+
bitcoin_key_1: PublicKey::from_secret_key(&secp_ctx, &node_1_btckey),
1353+
bitcoin_key_2: PublicKey::from_secret_key(&secp_ctx, &node_2_btckey),
1354+
excess_data: Vec::new(),
1355+
};
1356+
1357+
msgs::ChannelAnnouncement {
1358+
node_signature_1: Signature::from(FFISignature::new()),
1359+
node_signature_2: Signature::from(FFISignature::new()),
1360+
bitcoin_signature_1: Signature::from(FFISignature::new()),
1361+
bitcoin_signature_2: Signature::from(FFISignature::new()),
1362+
contents: unsigned_ann,
1363+
}
1364+
}
1365+
1366+
fn get_dummy_channel_update(short_chan_id: u64) -> msgs::ChannelUpdate {
1367+
use secp256k1::ffi::Signature as FFISignature;
1368+
let network = Network::Testnet;
1369+
msgs::ChannelUpdate {
1370+
signature: Signature::from(FFISignature::new()),
1371+
contents: msgs::UnsignedChannelUpdate {
1372+
chain_hash: genesis_block(network).header.bitcoin_hash(),
1373+
short_channel_id: short_chan_id,
1374+
timestamp: 0,
1375+
flags: 0,
1376+
cltv_expiry_delta: 0,
1377+
htlc_minimum_msat: 0,
1378+
fee_base_msat: 0,
1379+
fee_proportional_millionths: 0,
1380+
excess_data: vec![],
1381+
}
1382+
}
1383+
}
1384+
1385+
#[test]
1386+
fn test_do_attempt_write_data() {
1387+
// Create 2 peers with custom TestRoutingMessageHandlers and connect them.
1388+
let chan_handlers = create_chan_handlers(2);
1389+
let mut routing_handlers: Vec<Arc<msgs::RoutingMessageHandler>> = Vec::new();
1390+
let mut routing_handlers_concrete: Vec<Arc<TestRoutingMessageHandler>> = Vec::new();
1391+
for _ in 0..2 {
1392+
let routing_handler = Arc::new(TestRoutingMessageHandler::new());
1393+
routing_handlers.push(routing_handler.clone());
1394+
routing_handlers_concrete.push(routing_handler.clone());
1395+
}
1396+
let peers = create_network(2, &chan_handlers, Some(&routing_handlers));
1397+
1398+
// By calling establish_connect, we trigger do_attempt_write_data between
1399+
// the peers. Previously this function would mistakenly enter an infinite loop
1400+
// when there were more channel messages available than could fit into a peer's
1401+
// buffer. This issue would now be detected by this test (because we use custom
1402+
// RoutingMessageHandlers that intentionally return more channel messages
1403+
// than can fit into a peer's buffer).
1404+
let (mut fd_a, mut fd_b) = establish_connection(&peers[0], &peers[1]);
1405+
peers[1].read_event(&mut fd_b, &fd_a.outbound_data.lock().unwrap().split_off(0)).unwrap();
1406+
peers[0].read_event(&mut fd_a, &fd_b.outbound_data.lock().unwrap().split_off(0)).unwrap();
1407+
1408+
assert_eq!(routing_handlers_concrete[0].clone().chan_upds_recvd.load(Ordering::Acquire), 8);
1409+
assert_eq!(routing_handlers_concrete[0].clone().chan_anns_recvd.load(Ordering::Acquire), 4);
1410+
assert_eq!(routing_handlers_concrete[1].clone().chan_upds_recvd.load(Ordering::Acquire), 6);
1411+
assert_eq!(routing_handlers_concrete[1].clone().chan_anns_recvd.load(Ordering::Acquire), 3);
1412+
}
12751413
}

0 commit comments

Comments
 (0)