The core protocol of WoopChain
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
woop/consensus/consensus_test.go

162 lines
5.2 KiB

package consensus
import (
"bytes"
"testing"
"github.com/harmony-one/harmony/crypto/bls"
msg_pb "github.com/harmony-one/harmony/api/proto/message"
"github.com/harmony-one/harmony/internal/utils"
"github.com/harmony-one/harmony/p2p"
"github.com/harmony-one/harmony/p2p/p2pimpl"
)
func TestNew(test *testing.T) {
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902"}
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905"}
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
host, err := p2pimpl.NewHost(&leader, priKey)
if err != nil {
test.Fatalf("newhost failure: %v", err)
}
consensus, err := New(host, 0, []p2p.Peer{leader, validator}, leader, bls.RandPrivateKey())
if err != nil {
test.Fatalf("Cannot craeate consensus: %v", err)
}
if consensus.consensusID != 0 {
test.Errorf("Consensus Id is initialized to the wrong value: %d", consensus.consensusID)
}
if !consensus.IsLeader {
test.Error("Consensus should belong to a leader")
}
if consensus.ReadySignal == nil {
test.Error("Consensus ReadySignal should be initialized")
}
}
func TestRemovePeers(t *testing.T) {
pk1 := bls.RandPrivateKey().GetPublicKey()
pk2 := bls.RandPrivateKey().GetPublicKey()
pk3 := bls.RandPrivateKey().GetPublicKey()
pk4 := bls.RandPrivateKey().GetPublicKey()
pk5 := bls.RandPrivateKey().GetPublicKey()
p1 := p2p.Peer{IP: "127.0.0.1", Port: "19901", ConsensusPubKey: pk1}
p2 := p2p.Peer{IP: "127.0.0.1", Port: "19902", ConsensusPubKey: pk2}
p3 := p2p.Peer{IP: "127.0.0.1", Port: "19903", ConsensusPubKey: pk3}
p4 := p2p.Peer{IP: "127.0.0.1", Port: "19904", ConsensusPubKey: pk4}
peers := []p2p.Peer{p1, p2, p3, p4}
peerRemove := []p2p.Peer{p1, p2}
leader := p2p.Peer{IP: "127.0.0.1", Port: "9000", ConsensusPubKey: pk5}
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
host, err := p2pimpl.NewHost(&leader, priKey)
if err != nil {
t.Fatalf("newhost failure: %v", err)
}
consensus, err := New(host, 0, peers, leader, nil)
if err != nil {
t.Fatalf("Cannot craeate consensus: %v", err)
}
// consensus.DebugPrintPublicKeys()
f := consensus.RemovePeers(peerRemove)
if f == 0 {
t.Errorf("consensus.RemovePeers return false")
consensus.DebugPrintPublicKeys()
}
}
func TestGetPeerFromID(t *testing.T) {
leaderPriKey := bls.RandPrivateKey()
leaderPubKey := leaderPriKey.GetPublicKey()
validatorPubKey := bls.RandPrivateKey().GetPublicKey()
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902", ConsensusPubKey: leaderPubKey}
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905", ConsensusPubKey: validatorPubKey}
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
host, err := p2pimpl.NewHost(&leader, priKey)
if err != nil {
t.Fatalf("newhost failure: %v", err)
}
consensus, err := New(host, 0, []p2p.Peer{leader, validator}, leader, leaderPriKey)
if err != nil {
t.Fatalf("Cannot craeate consensus: %v", err)
}
leaderAddress := utils.GetAddressFromBlsPubKey(leader.ConsensusPubKey)
validatorAddress := utils.GetAddressFromBlsPubKey(validator.ConsensusPubKey)
l := consensus.GetPeerByAddress(leaderAddress.Hex())
v := consensus.GetPeerByAddress(validatorAddress.Hex())
if l.IP != leader.IP || l.Port != leader.Port {
t.Errorf("leader IP not equal")
}
if v.IP != validator.IP || v.Port != validator.Port {
t.Errorf("validator IP not equal")
}
}
func TestPopulateMessageFields(t *testing.T) {
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902"}
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905"}
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
host, err := p2pimpl.NewHost(&leader, priKey)
if err != nil {
t.Fatalf("newhost failure: %v", err)
}
blsPriKey := bls.RandPrivateKey()
consensus, err := New(host, 0, []p2p.Peer{leader, validator}, leader, blsPriKey)
if err != nil {
t.Fatalf("Cannot craeate consensus: %v", err)
}
consensus.consensusID = 2
consensus.blockHash = blockHash
msg := &msg_pb.Message{
Request: &msg_pb.Message_Consensus{
Consensus: &msg_pb.ConsensusRequest{},
},
}
consensusMsg := msg.GetConsensus()
consensus.populateMessageFields(consensusMsg)
if consensusMsg.ConsensusId != 2 {
t.Errorf("Consensus ID is not populated correctly")
}
if !bytes.Equal(consensusMsg.BlockHash[:], blockHash[:]) {
t.Errorf("Block hash is not populated correctly")
}
if bytes.Compare(consensusMsg.SenderPubkey, blsPriKey.GetPublicKey().Serialize()) != 0 {
t.Errorf("Sender ID is not populated correctly")
}
}
func TestSignAndMarshalConsensusMessage(t *testing.T) {
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902"}
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905"}
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
host, err := p2pimpl.NewHost(&leader, priKey)
if err != nil {
t.Fatalf("newhost failure: %v", err)
}
consensus, err := New(host, 0, []p2p.Peer{leader, validator}, leader, bls.RandPrivateKey())
if err != nil {
t.Fatalf("Cannot craeate consensus: %v", err)
}
consensus.consensusID = 2
consensus.blockHash = blockHash
consensus.SelfAddress = "fake address"
msg := &msg_pb.Message{}
marshaledMessage, err := consensus.signAndMarshalConsensusMessage(msg)
if err != nil || len(marshaledMessage) == 0 {
t.Errorf("Failed to sign and marshal the message: %s", err)
}
if len(msg.Signature) == 0 {
t.Error("No signature is signed on the consensus message.")
}
}