mirror of
https://github.com/fluencelabs/tendermint
synced 2025-04-25 06:42:16 +00:00
comment out failing consensus tests for now rewrite rpc httpclient to use new pubsub package import pubsub as tmpubsub, query as tmquery make event IDs constants EventKey -> EventTypeKey rename EventsPubsub to PubSub mempool does not use pubsub rename eventsSub to pubsub new subscribe API fix channel size issues and consensus tests bugs refactor rpc client add missing discardFromChan method add mutex rename pubsub to eventBus remove IsRunning from WSRPCConnection interface (not needed) add a comment in broadcastNewRoundStepsAndVotes rename registerEventCallbacks to broadcastNewRoundStepsAndVotes See https://dave.cheney.net/2014/03/19/channel-axioms stop eventBuses after reactor tests remove unnecessary Unsubscribe return subscribe helper function move discardFromChan to where it is used subscribe now returns an err this gives us ability to refuse to subscribe if pubsub is at its max capacity. use context for control overflow cache queries handle err when subscribing in replay_test rename testClientID to testSubscriber extract var set channel buffer capacity to 1 in replay_file fix byzantine_test unsubscribe from single event, not all events refactor httpclient to return events to appropriate channels return failing testReplayCrashBeforeWriteVote test fix TestValidatorSetChanges refactor code a bit fix testReplayCrashBeforeWriteVote add comment fix TestValidatorSetChanges fixes from Bucky's review update comment [ci skip] test TxEventBuffer update changelog fix TestValidatorSetChanges (2nd attempt) only do wg.Done when no errors benchmark event bus create pubsub server inside NewEventBus only expose config params (later if needed) set buffer capacity to 0 so we are not testing cache new tx event format: key = "Tx" plus a tag {"tx.hash": XYZ} This should allow to subscribe to all transactions! or a specific one using a query: "tm.events.type = Tx and tx.hash = '013ABF99434...'" use TimeoutCommit instead of afterPublishEventNewBlockTimeout TimeoutCommit is the time a node waits after committing a block, before it goes into the next height. So it will finish everything from the last block, but then wait a bit. The idea is this gives it time to hear more votes from other validators, to strengthen the commit it includes in the next block. But it also gives it time to hear about new transactions. waitForBlockWithUpdatedVals rewrite WAL crash tests Task: test that we can recover from any WAL crash. Solution: the old tests were relying on event hub being run in the same thread (we were injecting the private validator's last signature). when considering a rewrite, we considered two possible solutions: write a "fuzzy" testing system where WAL is crashing upon receiving a new message, or inject failures and trigger them in tests using something like https://github.com/coreos/gofail. remove sleep no cs.Lock around wal.Save test different cases (empty block, non-empty block, ...) comments add comments test 4 cases: empty block, non-empty block, non-empty block with smaller part size, many blocks fixes as per Bucky's last review reset subscriptions on UnsubscribeAll use a simple counter to track message for which we panicked also, set a smaller part size for all test cases
295 lines
8.0 KiB
Go
295 lines
8.0 KiB
Go
package client_test
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/tendermint/iavl"
|
|
"github.com/tendermint/tendermint/rpc/client"
|
|
rpctest "github.com/tendermint/tendermint/rpc/test"
|
|
"github.com/tendermint/tendermint/types"
|
|
)
|
|
|
|
func getHTTPClient() *client.HTTP {
|
|
rpcAddr := rpctest.GetConfig().RPC.ListenAddress
|
|
return client.NewHTTP(rpcAddr, "/websocket")
|
|
}
|
|
|
|
func getLocalClient() *client.Local {
|
|
return client.NewLocal(node)
|
|
}
|
|
|
|
// GetClients returns a slice of clients for table-driven tests
|
|
func GetClients() []client.Client {
|
|
return []client.Client{
|
|
getHTTPClient(),
|
|
getLocalClient(),
|
|
}
|
|
}
|
|
|
|
// Make sure status is correct (we connect properly)
|
|
func TestStatus(t *testing.T) {
|
|
for i, c := range GetClients() {
|
|
moniker := rpctest.GetConfig().Moniker
|
|
status, err := c.Status()
|
|
require.Nil(t, err, "%d: %+v", i, err)
|
|
assert.Equal(t, moniker, status.NodeInfo.Moniker)
|
|
}
|
|
}
|
|
|
|
// Make sure info is correct (we connect properly)
|
|
func TestInfo(t *testing.T) {
|
|
for i, c := range GetClients() {
|
|
// status, err := c.Status()
|
|
// require.Nil(t, err, "%+v", err)
|
|
info, err := c.ABCIInfo()
|
|
require.Nil(t, err, "%d: %+v", i, err)
|
|
// TODO: this is not correct - fix merkleeyes!
|
|
// assert.EqualValues(t, status.LatestBlockHeight, info.Response.LastBlockHeight)
|
|
assert.True(t, strings.Contains(info.Response.Data, "size"))
|
|
}
|
|
}
|
|
|
|
func TestNetInfo(t *testing.T) {
|
|
for i, c := range GetClients() {
|
|
nc, ok := c.(client.NetworkClient)
|
|
require.True(t, ok, "%d", i)
|
|
netinfo, err := nc.NetInfo()
|
|
require.Nil(t, err, "%d: %+v", i, err)
|
|
assert.True(t, netinfo.Listening)
|
|
assert.Equal(t, 0, len(netinfo.Peers))
|
|
}
|
|
}
|
|
|
|
func TestDumpConsensusState(t *testing.T) {
|
|
for i, c := range GetClients() {
|
|
// FIXME: fix server so it doesn't panic on invalid input
|
|
nc, ok := c.(client.NetworkClient)
|
|
require.True(t, ok, "%d", i)
|
|
cons, err := nc.DumpConsensusState()
|
|
require.Nil(t, err, "%d: %+v", i, err)
|
|
assert.NotEmpty(t, cons.RoundState)
|
|
assert.Empty(t, cons.PeerRoundStates)
|
|
}
|
|
}
|
|
|
|
func TestGenesisAndValidators(t *testing.T) {
|
|
for i, c := range GetClients() {
|
|
|
|
// make sure this is the right genesis file
|
|
gen, err := c.Genesis()
|
|
require.Nil(t, err, "%d: %+v", i, err)
|
|
// get the genesis validator
|
|
require.Equal(t, 1, len(gen.Genesis.Validators))
|
|
gval := gen.Genesis.Validators[0]
|
|
|
|
// get the current validators
|
|
vals, err := c.Validators(nil)
|
|
require.Nil(t, err, "%d: %+v", i, err)
|
|
require.Equal(t, 1, len(vals.Validators))
|
|
val := vals.Validators[0]
|
|
|
|
// make sure the current set is also the genesis set
|
|
assert.Equal(t, gval.Power, val.VotingPower)
|
|
assert.Equal(t, gval.PubKey, val.PubKey)
|
|
}
|
|
}
|
|
|
|
func TestABCIQuery(t *testing.T) {
|
|
for i, c := range GetClients() {
|
|
// write something
|
|
k, v, tx := MakeTxKV()
|
|
bres, err := c.BroadcastTxCommit(tx)
|
|
require.Nil(t, err, "%d: %+v", i, err)
|
|
apph := bres.Height + 1 // this is where the tx will be applied to the state
|
|
|
|
// wait before querying
|
|
client.WaitForHeight(c, apph, nil)
|
|
qres, err := c.ABCIQuery("/key", k)
|
|
if assert.Nil(t, err) && assert.True(t, qres.Code.IsOK()) {
|
|
assert.EqualValues(t, v, qres.Value)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Make some app checks
|
|
func TestAppCalls(t *testing.T) {
|
|
assert, require := assert.New(t), require.New(t)
|
|
for i, c := range GetClients() {
|
|
|
|
// get an offset of height to avoid racing and guessing
|
|
s, err := c.Status()
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
// sh is start height or status height
|
|
sh := s.LatestBlockHeight
|
|
|
|
// look for the future
|
|
h := sh + 2
|
|
_, err = c.Block(&h)
|
|
assert.NotNil(err) // no block yet
|
|
|
|
// write something
|
|
k, v, tx := MakeTxKV()
|
|
bres, err := c.BroadcastTxCommit(tx)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
require.True(bres.DeliverTx.Code.IsOK())
|
|
txh := bres.Height
|
|
apph := txh + 1 // this is where the tx will be applied to the state
|
|
|
|
// wait before querying
|
|
client.WaitForHeight(c, apph, nil)
|
|
qres, err := c.ABCIQueryWithOptions("/key", k, client.ABCIQueryOptions{Trusted: true})
|
|
if assert.Nil(err) && assert.True(qres.Code.IsOK()) {
|
|
// assert.Equal(k, data.GetKey()) // only returned for proofs
|
|
assert.EqualValues(v, qres.Value)
|
|
}
|
|
|
|
// make sure we can lookup the tx with proof
|
|
// ptx, err := c.Tx(bres.Hash, true)
|
|
ptx, err := c.Tx(bres.Hash, true)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
assert.Equal(txh, ptx.Height)
|
|
assert.EqualValues(tx, ptx.Tx)
|
|
|
|
// and we can even check the block is added
|
|
block, err := c.Block(&apph)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
appHash := block.BlockMeta.Header.AppHash
|
|
assert.True(len(appHash) > 0)
|
|
assert.EqualValues(apph, block.BlockMeta.Header.Height)
|
|
|
|
// check blockchain info, now that we know there is info
|
|
// TODO: is this commented somewhere that they are returned
|
|
// in order of descending height???
|
|
info, err := c.BlockchainInfo(apph, apph)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
assert.True(info.LastHeight >= apph)
|
|
if assert.Equal(1, len(info.BlockMetas)) {
|
|
lastMeta := info.BlockMetas[0]
|
|
assert.EqualValues(apph, lastMeta.Header.Height)
|
|
bMeta := block.BlockMeta
|
|
assert.Equal(bMeta.Header.AppHash, lastMeta.Header.AppHash)
|
|
assert.Equal(bMeta.BlockID, lastMeta.BlockID)
|
|
}
|
|
|
|
// and get the corresponding commit with the same apphash
|
|
commit, err := c.Commit(&apph)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
cappHash := commit.Header.AppHash
|
|
assert.Equal(appHash, cappHash)
|
|
assert.NotNil(commit.Commit)
|
|
|
|
// compare the commits (note Commit(2) has commit from Block(3))
|
|
h = apph - 1
|
|
commit2, err := c.Commit(&h)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
assert.Equal(block.Block.LastCommit, commit2.Commit)
|
|
|
|
// and we got a proof that works!
|
|
pres, err := c.ABCIQueryWithOptions("/key", k, client.ABCIQueryOptions{Trusted: false})
|
|
if assert.Nil(err) && assert.True(pres.Code.IsOK()) {
|
|
proof, err := iavl.ReadKeyExistsProof(pres.Proof)
|
|
if assert.Nil(err) {
|
|
key := pres.Key
|
|
value := pres.Value
|
|
assert.EqualValues(appHash, proof.RootHash)
|
|
valid := proof.Verify(key, value, appHash)
|
|
assert.Nil(valid)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestBroadcastTxSync(t *testing.T) {
|
|
require := require.New(t)
|
|
|
|
mempool := node.MempoolReactor().Mempool
|
|
initMempoolSize := mempool.Size()
|
|
|
|
for i, c := range GetClients() {
|
|
_, _, tx := MakeTxKV()
|
|
bres, err := c.BroadcastTxSync(tx)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
require.True(bres.Code.IsOK())
|
|
|
|
require.Equal(initMempoolSize+1, mempool.Size())
|
|
|
|
txs := mempool.Reap(1)
|
|
require.EqualValues(tx, txs[0])
|
|
mempool.Flush()
|
|
}
|
|
}
|
|
|
|
func TestBroadcastTxCommit(t *testing.T) {
|
|
require := require.New(t)
|
|
|
|
mempool := node.MempoolReactor().Mempool
|
|
for i, c := range GetClients() {
|
|
_, _, tx := MakeTxKV()
|
|
bres, err := c.BroadcastTxCommit(tx)
|
|
require.Nil(err, "%d: %+v", i, err)
|
|
require.True(bres.CheckTx.Code.IsOK())
|
|
require.True(bres.DeliverTx.Code.IsOK())
|
|
|
|
require.Equal(0, mempool.Size())
|
|
}
|
|
}
|
|
|
|
func TestTx(t *testing.T) {
|
|
assert, require := assert.New(t), require.New(t)
|
|
|
|
// first we broadcast a tx
|
|
c := getHTTPClient()
|
|
_, _, tx := MakeTxKV()
|
|
bres, err := c.BroadcastTxCommit(tx)
|
|
require.Nil(err, "%+v", err)
|
|
|
|
txHeight := bres.Height
|
|
txHash := bres.Hash
|
|
|
|
anotherTxHash := types.Tx("a different tx").Hash()
|
|
|
|
cases := []struct {
|
|
valid bool
|
|
hash []byte
|
|
prove bool
|
|
}{
|
|
// only valid if correct hash provided
|
|
{true, txHash, false},
|
|
{true, txHash, true},
|
|
{false, anotherTxHash, false},
|
|
{false, anotherTxHash, true},
|
|
{false, nil, false},
|
|
{false, nil, true},
|
|
}
|
|
|
|
for i, c := range GetClients() {
|
|
for j, tc := range cases {
|
|
t.Logf("client %d, case %d", i, j)
|
|
|
|
// now we query for the tx.
|
|
// since there's only one tx, we know index=0.
|
|
ptx, err := c.Tx(tc.hash, tc.prove)
|
|
|
|
if !tc.valid {
|
|
require.NotNil(err)
|
|
} else {
|
|
require.Nil(err, "%+v", err)
|
|
assert.Equal(txHeight, ptx.Height)
|
|
assert.EqualValues(tx, ptx.Tx)
|
|
assert.Equal(0, ptx.Index)
|
|
assert.True(ptx.TxResult.Code.IsOK())
|
|
|
|
// time to verify the proof
|
|
proof := ptx.Proof
|
|
if tc.prove && assert.EqualValues(tx, proof.Data) {
|
|
assert.True(proof.Proof.Verify(proof.Index, proof.Total, txHash, proof.RootHash))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|