|
|
|
@ -113,28 +113,35 @@ outer:
|
|
|
|
|
return strings.Join(out, ",")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *scenarioTest) syncBetween(n1, n2 *scenarioNode) {
|
|
|
|
|
func (s *scenarioTest) syncBetween(n1, n2 *scenarioNode) error {
|
|
|
|
|
o1, err := n1.A.SyncOffer()
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.t.Fatal(err)
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
o2, err := n2.A.SyncOffer()
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.t.Fatal(err)
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
aumsFrom1, err := n1.A.MissingAUMs(o2)
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.t.Fatal(err)
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
aumsFrom2, err := n2.A.MissingAUMs(o1)
|
|
|
|
|
if err != nil {
|
|
|
|
|
s.t.Fatal(err)
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
if err := n2.A.Inform(aumsFrom1); err != nil {
|
|
|
|
|
s.t.Fatal(err)
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
if err := n1.A.Inform(aumsFrom2); err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *scenarioTest) testSyncsBetween(n1, n2 *scenarioNode) {
|
|
|
|
|
if err := s.syncBetween(n1, n2); err != nil {
|
|
|
|
|
s.t.Fatal(err)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
@ -201,7 +208,7 @@ func TestScenarioHelpers(t *testing.T) {
|
|
|
|
|
t.Errorf("chained AUM was not signed: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
s.syncBetween(control, n)
|
|
|
|
|
s.testSyncsBetween(control, n)
|
|
|
|
|
s.checkHaveConsensus(control, n)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -217,13 +224,13 @@ func TestNormalPropergation(t *testing.T) {
|
|
|
|
|
"L2": newTestchain(t, `L3 -> L4`),
|
|
|
|
|
})
|
|
|
|
|
// Can control haz the updates?
|
|
|
|
|
s.syncBetween(control, n1)
|
|
|
|
|
s.testSyncsBetween(control, n1)
|
|
|
|
|
s.checkHaveConsensus(control, n1)
|
|
|
|
|
|
|
|
|
|
// A new node came online, can the new node learn everything
|
|
|
|
|
// just via control?
|
|
|
|
|
n2 := s.mkNode("n2")
|
|
|
|
|
s.syncBetween(control, n2)
|
|
|
|
|
s.testSyncsBetween(control, n2)
|
|
|
|
|
s.checkHaveConsensus(control, n2)
|
|
|
|
|
|
|
|
|
|
// So by virtue of syncing with control n2 should be at the same
|
|
|
|
@ -252,7 +259,7 @@ func TestForkingPropergation(t *testing.T) {
|
|
|
|
|
"L2": newTestchain(t, `L3 -> L4`),
|
|
|
|
|
})
|
|
|
|
|
// Can control haz the updates?
|
|
|
|
|
s.syncBetween(control, n1)
|
|
|
|
|
s.testSyncsBetween(control, n1)
|
|
|
|
|
s.checkHaveConsensus(control, n1)
|
|
|
|
|
|
|
|
|
|
// Ooooo what about a forking update?
|
|
|
|
@ -264,11 +271,11 @@ func TestForkingPropergation(t *testing.T) {
|
|
|
|
|
optKey("key2", key, priv),
|
|
|
|
|
optTemplate("removeKey1", AUM{MessageKind: AUMRemoveKey, KeyID: s.defaultKey.ID()})),
|
|
|
|
|
})
|
|
|
|
|
s.syncBetween(control, n2)
|
|
|
|
|
s.testSyncsBetween(control, n2)
|
|
|
|
|
s.checkHaveConsensus(control, n2)
|
|
|
|
|
|
|
|
|
|
// No wozzles propergating from n2->CTRL, what about CTRL->n1?
|
|
|
|
|
s.syncBetween(control, n1)
|
|
|
|
|
s.testSyncsBetween(control, n1)
|
|
|
|
|
s.checkHaveConsensus(n1, n2)
|
|
|
|
|
|
|
|
|
|
if _, err := n1.A.state.GetKey(s.defaultKey.ID()); err != ErrNoSuchKey {
|
|
|
|
@ -278,3 +285,104 @@ func TestForkingPropergation(t *testing.T) {
|
|
|
|
|
t.Errorf("key2 was not trusted: %v", err)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestInvalidAUMPropergationRejected(t *testing.T) {
|
|
|
|
|
s := testScenario(t, `
|
|
|
|
|
G -> L1 -> L2
|
|
|
|
|
G.template = genesis
|
|
|
|
|
`)
|
|
|
|
|
control := s.mkNode("control")
|
|
|
|
|
|
|
|
|
|
// Construct an invalid L4 AUM, and manually apply it to n1,
|
|
|
|
|
// resulting in a corrupted Authority.
|
|
|
|
|
n1 := s.mkNodeWithForks("n1", true, map[string]*testChain{
|
|
|
|
|
"L2": newTestchain(t, `L3`),
|
|
|
|
|
})
|
|
|
|
|
l3 := n1.AUMs["L3"]
|
|
|
|
|
l3H := l3.Hash()
|
|
|
|
|
l4 := AUM{MessageKind: AUMAddKey, PrevAUMHash: l3H[:]}
|
|
|
|
|
l4.sign25519(s.defaultPriv)
|
|
|
|
|
l4H := l4.Hash()
|
|
|
|
|
n1.A.storage.CommitVerifiedAUMs([]AUM{l4})
|
|
|
|
|
n1.A.state.LastAUMHash = &l4H
|
|
|
|
|
|
|
|
|
|
// Does control nope out with syncing?
|
|
|
|
|
if err := s.syncBetween(control, n1); err == nil {
|
|
|
|
|
t.Error("sync with invalid AUM was successful")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Control should not have accepted ANY of the updates, even
|
|
|
|
|
// though L3 was well-formed.
|
|
|
|
|
l2 := control.AUMs["L2"]
|
|
|
|
|
l2H := l2.Hash()
|
|
|
|
|
if control.A.Head() != l2H {
|
|
|
|
|
t.Errorf("head was %x, expected %x", control.A.Head(), l2H)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestUnsignedAUMPropergationRejected(t *testing.T) {
|
|
|
|
|
s := testScenario(t, `
|
|
|
|
|
G -> L1 -> L2
|
|
|
|
|
G.template = genesis
|
|
|
|
|
`)
|
|
|
|
|
control := s.mkNode("control")
|
|
|
|
|
|
|
|
|
|
// Construct an unsigned L4 AUM, and manually apply it to n1,
|
|
|
|
|
// resulting in a corrupted Authority.
|
|
|
|
|
n1 := s.mkNodeWithForks("n1", true, map[string]*testChain{
|
|
|
|
|
"L2": newTestchain(t, `L3`),
|
|
|
|
|
})
|
|
|
|
|
l3 := n1.AUMs["L3"]
|
|
|
|
|
l3H := l3.Hash()
|
|
|
|
|
l4 := AUM{MessageKind: AUMNoOp, PrevAUMHash: l3H[:]}
|
|
|
|
|
l4H := l4.Hash()
|
|
|
|
|
n1.A.storage.CommitVerifiedAUMs([]AUM{l4})
|
|
|
|
|
n1.A.state.LastAUMHash = &l4H
|
|
|
|
|
|
|
|
|
|
// Does control nope out with syncing?
|
|
|
|
|
if err := s.syncBetween(control, n1); err == nil || err.Error() != "update 1 invalid: unsigned AUM" {
|
|
|
|
|
t.Errorf("sync with unsigned AUM was successful (err = %v)", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Control should not have accepted ANY of the updates, even
|
|
|
|
|
// though L3 was well-formed.
|
|
|
|
|
l2 := control.AUMs["L2"]
|
|
|
|
|
l2H := l2.Hash()
|
|
|
|
|
if control.A.Head() != l2H {
|
|
|
|
|
t.Errorf("head was %x, expected %x", control.A.Head(), l2H)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestBadSigAUMPropergationRejected(t *testing.T) {
|
|
|
|
|
s := testScenario(t, `
|
|
|
|
|
G -> L1 -> L2
|
|
|
|
|
G.template = genesis
|
|
|
|
|
`)
|
|
|
|
|
control := s.mkNode("control")
|
|
|
|
|
|
|
|
|
|
// Construct a otherwise-valid L4 AUM but mess up the signature.
|
|
|
|
|
n1 := s.mkNodeWithForks("n1", true, map[string]*testChain{
|
|
|
|
|
"L2": newTestchain(t, `L3`),
|
|
|
|
|
})
|
|
|
|
|
l3 := n1.AUMs["L3"]
|
|
|
|
|
l3H := l3.Hash()
|
|
|
|
|
l4 := AUM{MessageKind: AUMNoOp, PrevAUMHash: l3H[:]}
|
|
|
|
|
l4.sign25519(s.defaultPriv)
|
|
|
|
|
l4.Signatures[0].Signature[3] = 42
|
|
|
|
|
l4H := l4.Hash()
|
|
|
|
|
n1.A.storage.CommitVerifiedAUMs([]AUM{l4})
|
|
|
|
|
n1.A.state.LastAUMHash = &l4H
|
|
|
|
|
|
|
|
|
|
// Does control nope out with syncing?
|
|
|
|
|
if err := s.syncBetween(control, n1); err == nil || err.Error() != "update 1 invalid: signature 0: invalid signature" {
|
|
|
|
|
t.Errorf("sync with unsigned AUM was successful (err = %v)", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Control should not have accepted ANY of the updates, even
|
|
|
|
|
// though L3 was well-formed.
|
|
|
|
|
l2 := control.AUMs["L2"]
|
|
|
|
|
l2H := l2.Hash()
|
|
|
|
|
if control.A.Head() != l2H {
|
|
|
|
|
t.Errorf("head was %x, expected %x", control.A.Head(), l2H)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|