2017-03-09 01:30:00 +03:00
|
|
|
package routing
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"image/color"
|
|
|
|
"net"
|
|
|
|
"sync"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
prand "math/rand"
|
|
|
|
|
2017-03-30 04:01:28 +03:00
|
|
|
"github.com/go-errors/errors"
|
2017-03-09 01:30:00 +03:00
|
|
|
"github.com/lightningnetwork/lnd/channeldb"
|
2017-03-30 04:01:28 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwallet"
|
2017-03-09 01:30:00 +03:00
|
|
|
"github.com/lightningnetwork/lnd/lnwire"
|
2017-05-11 03:22:26 +03:00
|
|
|
"github.com/lightningnetwork/lnd/routing/chainview"
|
2017-03-09 01:30:00 +03:00
|
|
|
"github.com/roasbeef/btcd/btcec"
|
|
|
|
"github.com/roasbeef/btcd/chaincfg/chainhash"
|
|
|
|
"github.com/roasbeef/btcd/wire"
|
|
|
|
"github.com/roasbeef/btcutil"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2017-02-17 12:29:23 +03:00
|
|
|
testAddr = &net.TCPAddr{IP: (net.IP)([]byte{0xA, 0x0, 0x0, 0x1}),
|
|
|
|
Port: 9000}
|
|
|
|
testAddrs = []net.Addr{testAddr}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-03-20 12:24:55 +03:00
|
|
|
testFeatures = lnwire.NewFeatureVector([]lnwire.Feature{})
|
|
|
|
|
2017-03-09 01:30:00 +03:00
|
|
|
testHash = [32]byte{
|
|
|
|
0xb7, 0x94, 0x38, 0x5f, 0x2d, 0x1e, 0xf7, 0xab,
|
|
|
|
0x4d, 0x92, 0x73, 0xd1, 0x90, 0x63, 0x81, 0xb4,
|
|
|
|
0x4f, 0x2f, 0x6f, 0x25, 0x88, 0xa3, 0xef, 0xb9,
|
|
|
|
0x6a, 0x49, 0x18, 0x83, 0x31, 0x98, 0x47, 0x53,
|
|
|
|
}
|
2017-03-30 04:01:28 +03:00
|
|
|
|
|
|
|
priv1, _ = btcec.NewPrivateKey(btcec.S256())
|
|
|
|
bitcoinKey1 = priv1.PubKey()
|
|
|
|
|
|
|
|
priv2, _ = btcec.NewPrivateKey(btcec.S256())
|
|
|
|
bitcoinKey2 = priv2.PubKey()
|
2017-03-09 01:30:00 +03:00
|
|
|
)
|
|
|
|
|
2017-03-30 04:01:28 +03:00
|
|
|
func createTestNode() (*channeldb.LightningNode, error) {
|
2017-03-09 01:30:00 +03:00
|
|
|
updateTime := prand.Int63()
|
|
|
|
|
|
|
|
priv, err := btcec.NewPrivateKey(btcec.S256())
|
|
|
|
if err != nil {
|
2017-03-30 04:01:28 +03:00
|
|
|
return nil, errors.Errorf("unable create private key: %v", err)
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
pub := priv.PubKey().SerializeCompressed()
|
|
|
|
return &channeldb.LightningNode{
|
|
|
|
LastUpdate: time.Unix(updateTime, 0),
|
2017-02-17 12:29:23 +03:00
|
|
|
Addresses: testAddrs,
|
2017-03-09 01:30:00 +03:00
|
|
|
PubKey: priv.PubKey(),
|
|
|
|
Color: color.RGBA{1, 2, 3, 0},
|
|
|
|
Alias: "kek" + string(pub[:]),
|
2017-03-27 18:01:12 +03:00
|
|
|
AuthSig: testSig,
|
2017-03-20 12:24:55 +03:00
|
|
|
Features: testFeatures,
|
2017-03-09 01:30:00 +03:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2017-03-30 04:01:28 +03:00
|
|
|
func randEdgePolicy(chanID *lnwire.ShortChannelID,
|
2017-03-19 21:40:25 +03:00
|
|
|
node *channeldb.LightningNode) *channeldb.ChannelEdgePolicy {
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
return &channeldb.ChannelEdgePolicy{
|
2017-03-27 18:01:12 +03:00
|
|
|
Signature: testSig,
|
2017-03-19 21:40:25 +03:00
|
|
|
ChannelID: chanID.ToUint64(),
|
|
|
|
LastUpdate: time.Unix(int64(prand.Int31()), 0),
|
2017-03-09 01:30:00 +03:00
|
|
|
TimeLockDelta: uint16(prand.Int63()),
|
2017-03-19 21:40:25 +03:00
|
|
|
MinHTLC: btcutil.Amount(prand.Int31()),
|
|
|
|
FeeBaseMSat: btcutil.Amount(prand.Int31()),
|
|
|
|
FeeProportionalMillionths: btcutil.Amount(prand.Int31()),
|
|
|
|
Node: node,
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-30 04:01:28 +03:00
|
|
|
func createChannelEdge(ctx *testCtx, bitcoinKey1, bitcoinKey2 []byte,
|
|
|
|
chanValue int64, fundingHeight uint32) (*wire.MsgTx, *wire.OutPoint,
|
|
|
|
*lnwire.ShortChannelID, error) {
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
fundingTx := wire.NewMsgTx(2)
|
2017-03-30 04:01:28 +03:00
|
|
|
_, tx, err := lnwallet.GenFundingPkScript(
|
|
|
|
bitcoinKey1,
|
|
|
|
bitcoinKey2,
|
|
|
|
chanValue,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
fundingTx.TxOut = append(fundingTx.TxOut, tx)
|
2017-03-09 01:30:00 +03:00
|
|
|
chanUtxo := wire.OutPoint{
|
|
|
|
Hash: fundingTx.TxHash(),
|
|
|
|
Index: 0,
|
|
|
|
}
|
|
|
|
|
|
|
|
// With the utxo constructed, we'll mark it as closed.
|
2017-03-30 04:01:28 +03:00
|
|
|
ctx.chain.addUtxo(chanUtxo, tx)
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// Our fake channel will be "confirmed" at height 101.
|
2017-03-30 04:01:28 +03:00
|
|
|
chanID := &lnwire.ShortChannelID{
|
2017-03-09 01:30:00 +03:00
|
|
|
BlockHeight: fundingHeight,
|
|
|
|
TxIndex: 0,
|
|
|
|
TxPosition: 0,
|
|
|
|
}
|
|
|
|
|
2017-03-30 04:01:28 +03:00
|
|
|
return fundingTx, &chanUtxo, chanID, nil
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
type mockChain struct {
|
|
|
|
blocks map[chainhash.Hash]*wire.MsgBlock
|
|
|
|
blockIndex map[uint32]chainhash.Hash
|
|
|
|
|
|
|
|
utxos map[wire.OutPoint]wire.TxOut
|
|
|
|
|
|
|
|
bestHeight int32
|
|
|
|
bestHash *chainhash.Hash
|
|
|
|
|
|
|
|
sync.RWMutex
|
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
// A compile time check to ensure mockChain implements the
|
|
|
|
// lnwallet.BlockChainIO interface.
|
|
|
|
var _ lnwallet.BlockChainIO = (*mockChain)(nil)
|
|
|
|
|
2017-03-09 01:30:00 +03:00
|
|
|
func newMockChain(currentHeight uint32) *mockChain {
|
|
|
|
return &mockChain{
|
|
|
|
bestHeight: int32(currentHeight),
|
|
|
|
blocks: make(map[chainhash.Hash]*wire.MsgBlock),
|
|
|
|
utxos: make(map[wire.OutPoint]wire.TxOut),
|
|
|
|
blockIndex: make(map[uint32]chainhash.Hash),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mockChain) setBestBlock(height int32) {
|
|
|
|
m.Lock()
|
|
|
|
defer m.Unlock()
|
|
|
|
|
|
|
|
m.bestHeight = height
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mockChain) GetBestBlock() (*chainhash.Hash, int32, error) {
|
|
|
|
m.RLock()
|
|
|
|
defer m.RUnlock()
|
|
|
|
|
|
|
|
return nil, m.bestHeight, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mockChain) GetTransaction(txid *chainhash.Hash) (*wire.MsgTx, error) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mockChain) GetBlockHash(blockHeight int64) (*chainhash.Hash, error) {
|
|
|
|
m.RLock()
|
|
|
|
defer m.RUnlock()
|
|
|
|
|
|
|
|
hash, ok := m.blockIndex[uint32(blockHeight)]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("can't find block hash, for "+
|
|
|
|
"height %v", blockHeight)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return &hash, nil
|
|
|
|
}
|
|
|
|
|
2017-03-30 04:01:28 +03:00
|
|
|
func (m *mockChain) addUtxo(op wire.OutPoint, out *wire.TxOut) {
|
2017-03-09 01:30:00 +03:00
|
|
|
m.Lock()
|
2017-03-30 04:01:28 +03:00
|
|
|
m.utxos[op] = *out
|
2017-03-09 01:30:00 +03:00
|
|
|
m.Unlock()
|
|
|
|
}
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChain) GetUtxo(op *wire.OutPoint, _ uint32) (*wire.TxOut, error) {
|
2017-03-09 01:30:00 +03:00
|
|
|
m.RLock()
|
|
|
|
defer m.RUnlock()
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
utxo, ok := m.utxos[*op]
|
2017-03-09 01:30:00 +03:00
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("utxo not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
return &utxo, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mockChain) addBlock(block *wire.MsgBlock, height uint32) {
|
|
|
|
m.Lock()
|
|
|
|
block.Header.Nonce = height
|
|
|
|
hash := block.Header.BlockHash()
|
|
|
|
m.blocks[hash] = block
|
|
|
|
m.blockIndex[height] = hash
|
|
|
|
m.Unlock()
|
|
|
|
}
|
|
|
|
func (m *mockChain) GetBlock(blockHash *chainhash.Hash) (*wire.MsgBlock, error) {
|
|
|
|
m.RLock()
|
|
|
|
defer m.RUnlock()
|
|
|
|
|
|
|
|
block, ok := m.blocks[*blockHash]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("block not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
return block, nil
|
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
type mockChainView struct {
|
2017-03-09 01:30:00 +03:00
|
|
|
sync.RWMutex
|
2017-05-11 03:22:26 +03:00
|
|
|
|
|
|
|
newBlocks chan *chainview.FilteredBlock
|
|
|
|
staleBlocks chan *chainview.FilteredBlock
|
|
|
|
|
|
|
|
filter map[wire.OutPoint]struct{}
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
// A compile time check to ensure mockChainView implements the
|
|
|
|
// chainview.FilteredChainView.
|
|
|
|
var _ chainview.FilteredChainView = (*mockChainView)(nil)
|
|
|
|
|
|
|
|
func newMockChainView() *mockChainView {
|
|
|
|
return &mockChainView{
|
|
|
|
newBlocks: make(chan *chainview.FilteredBlock, 10),
|
|
|
|
staleBlocks: make(chan *chainview.FilteredBlock, 10),
|
|
|
|
filter: make(map[wire.OutPoint]struct{}),
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChainView) UpdateFilter(ops []wire.OutPoint, updateHeight uint32) error {
|
|
|
|
m.Lock()
|
|
|
|
defer m.Unlock()
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
for _, op := range ops {
|
|
|
|
m.filter[op] = struct{}{}
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
return nil
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChainView) notifyBlock(hash chainhash.Hash, height uint32,
|
|
|
|
txns []*wire.MsgTx) {
|
|
|
|
|
2017-03-09 01:30:00 +03:00
|
|
|
m.RLock()
|
|
|
|
defer m.RUnlock()
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
m.newBlocks <- &chainview.FilteredBlock{
|
|
|
|
Hash: hash,
|
|
|
|
Height: height,
|
|
|
|
Transactions: txns,
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChainView) FilteredBlocks() <-chan *chainview.FilteredBlock {
|
|
|
|
return m.newBlocks
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChainView) DisconnectedBlocks() <-chan *chainview.FilteredBlock {
|
|
|
|
return m.staleBlocks
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChainView) FilterBlock(blockHash *chainhash.Hash) (*chainview.FilteredBlock, error) {
|
|
|
|
return nil, nil
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChainView) Start() error {
|
2017-03-09 01:30:00 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-05-11 03:22:26 +03:00
|
|
|
func (m *mockChainView) Stop() error {
|
2017-03-09 01:30:00 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
// TestEdgeUpdateNotification tests that when edges are updated or added,
|
2017-03-09 01:30:00 +03:00
|
|
|
// a proper notification is sent of to all registered clients.
|
|
|
|
func TestEdgeUpdateNotification(t *testing.T) {
|
2017-06-17 01:59:20 +03:00
|
|
|
t.Parallel()
|
|
|
|
|
2017-03-30 04:01:28 +03:00
|
|
|
ctx, cleanUp, err := createTestCtx(0)
|
2017-03-09 01:30:00 +03:00
|
|
|
defer cleanUp()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create router: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// First we'll create the utxo for the channel to be "closed"
|
2017-03-30 04:01:28 +03:00
|
|
|
const chanValue = 10000
|
|
|
|
fundingTx, chanPoint, chanID, err := createChannelEdge(ctx,
|
|
|
|
bitcoinKey1.SerializeCompressed(), bitcoinKey2.SerializeCompressed(),
|
|
|
|
chanValue, 0)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unbale create channel edge: %v", err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// We'll also add a record for the block that included our funding
|
|
|
|
// transaction.
|
|
|
|
fundingBlock := &wire.MsgBlock{
|
|
|
|
Transactions: []*wire.MsgTx{fundingTx},
|
|
|
|
}
|
|
|
|
ctx.chain.addBlock(fundingBlock, chanID.BlockHeight)
|
|
|
|
|
|
|
|
// Next we'll create two test nodes that the fake channel will be open
|
|
|
|
// between and add then as members of the channel graph.
|
2017-03-19 21:40:25 +03:00
|
|
|
node1, err := createTestNode()
|
2017-03-09 01:30:00 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test node: %v", err)
|
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
node2, err := createTestNode()
|
2017-03-09 01:30:00 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test node: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
// Send the two node topology updates to the channel router so they
|
|
|
|
// can be validated and stored within the graph database.
|
|
|
|
if err := ctx.router.AddNode(node1); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if err := ctx.router.AddNode(node2); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// Finally, to conclude our test set up, we'll create a channel
|
2017-03-19 21:40:25 +03:00
|
|
|
// update to announce the created channel between the two nodes.
|
|
|
|
edge := &channeldb.ChannelEdgeInfo{
|
|
|
|
ChannelID: chanID.ToUint64(),
|
|
|
|
NodeKey1: node1.PubKey,
|
|
|
|
NodeKey2: node2.PubKey,
|
2017-03-30 04:01:28 +03:00
|
|
|
BitcoinKey1: bitcoinKey1,
|
|
|
|
BitcoinKey2: bitcoinKey2,
|
2017-03-19 21:40:25 +03:00
|
|
|
AuthProof: &channeldb.ChannelAuthProof{
|
|
|
|
NodeSig1: testSig,
|
|
|
|
NodeSig2: testSig,
|
|
|
|
BitcoinSig1: testSig,
|
|
|
|
BitcoinSig2: testSig,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := ctx.router.AddEdge(edge); err != nil {
|
2017-03-30 04:01:28 +03:00
|
|
|
t.Fatalf("unable to add edge: %v", err)
|
2017-03-19 21:40:25 +03:00
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// With the channel edge now in place, we'll subscribe for topology
|
|
|
|
// notifications.
|
|
|
|
ntfnClient, err := ctx.router.SubscribeTopology()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to subscribe for channel notifications: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create random policy edges that are stemmed to the channel id
|
|
|
|
// created above.
|
2017-03-19 21:40:25 +03:00
|
|
|
edge1 := randEdgePolicy(chanID, node1)
|
2017-03-09 01:30:00 +03:00
|
|
|
edge1.Flags = 0
|
2017-03-19 21:40:25 +03:00
|
|
|
edge2 := randEdgePolicy(chanID, node2)
|
2017-03-09 01:30:00 +03:00
|
|
|
edge2.Flags = 1
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
if err := ctx.router.UpdateEdge(edge1); err != nil {
|
|
|
|
t.Fatalf("unable to add edge update: %v", err)
|
|
|
|
}
|
|
|
|
if err := ctx.router.UpdateEdge(edge2); err != nil {
|
|
|
|
t.Fatalf("unable to add edge update: %v", err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
assertEdgeCorrect := func(t *testing.T, edgeUpdate *ChannelEdgeUpdate,
|
|
|
|
edgeAnn *channeldb.ChannelEdgePolicy) {
|
|
|
|
if edgeUpdate.ChanID != edgeAnn.ChannelID {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("channel ID of edge doesn't match: "+
|
|
|
|
"expected %v, got %v", chanID.ToUint64(), edgeUpdate.ChanID)
|
|
|
|
}
|
2017-03-30 04:01:28 +03:00
|
|
|
if edgeUpdate.ChanPoint != *chanPoint {
|
2017-03-14 06:32:59 +03:00
|
|
|
t.Fatalf("channel don't match: expected %v, got %v",
|
|
|
|
chanPoint, edgeUpdate.ChanPoint)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
// TODO(roasbeef): this is a hack, needs to be removed
|
|
|
|
// after commitment fees are dynamic.
|
2017-05-01 21:45:02 +03:00
|
|
|
if edgeUpdate.Capacity != chanValue {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("capacity of edge doesn't match: "+
|
|
|
|
"expected %v, got %v", chanValue, edgeUpdate.Capacity)
|
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
if edgeUpdate.MinHTLC != btcutil.Amount(edgeAnn.MinHTLC) {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("min HTLC of edge doesn't match: "+
|
2017-03-19 21:40:25 +03:00
|
|
|
"expected %v, got %v", btcutil.Amount(edgeAnn.MinHTLC),
|
2017-03-09 01:30:00 +03:00
|
|
|
edgeUpdate.MinHTLC)
|
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
if edgeUpdate.BaseFee != btcutil.Amount(edgeAnn.FeeBaseMSat) {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("base fee of edge doesn't match: "+
|
2017-03-19 21:40:25 +03:00
|
|
|
"expected %v, got %v", edgeAnn.FeeBaseMSat,
|
2017-03-09 01:30:00 +03:00
|
|
|
edgeUpdate.BaseFee)
|
|
|
|
}
|
|
|
|
if edgeUpdate.FeeRate != btcutil.Amount(edgeAnn.FeeProportionalMillionths) {
|
|
|
|
t.Fatalf("fee rate of edge doesn't match: "+
|
|
|
|
"expected %v, got %v", edgeAnn.FeeProportionalMillionths,
|
|
|
|
edgeUpdate.FeeRate)
|
|
|
|
}
|
|
|
|
if edgeUpdate.TimeLockDelta != edgeAnn.TimeLockDelta {
|
|
|
|
t.Fatalf("time lock delta of edge doesn't match: "+
|
|
|
|
"expected %v, got %v", edgeAnn.TimeLockDelta,
|
|
|
|
edgeUpdate.TimeLockDelta)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const numEdgePolicies = 2
|
|
|
|
for i := 0; i < numEdgePolicies; i++ {
|
|
|
|
select {
|
|
|
|
case ntfn := <-ntfnClient.TopologyChanges:
|
|
|
|
edgeUpdate := ntfn.ChannelEdgeUpdates[0]
|
|
|
|
if i == 0 {
|
2017-03-19 21:40:25 +03:00
|
|
|
assertEdgeCorrect(t, edgeUpdate, edge1)
|
|
|
|
if !edgeUpdate.AdvertisingNode.IsEqual(node1.PubKey) {
|
|
|
|
t.Fatal("advertising node mismatch")
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
if !edgeUpdate.ConnectingNode.IsEqual(node2.PubKey) {
|
|
|
|
t.Fatal("connecting node mismatch")
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
assertEdgeCorrect(t, edgeUpdate, edge2)
|
|
|
|
if !edgeUpdate.ConnectingNode.IsEqual(node1.PubKey) {
|
|
|
|
t.Fatal("connecting node mismatch")
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
if !edgeUpdate.AdvertisingNode.IsEqual(node2.PubKey) {
|
|
|
|
t.Fatal("advertising node mismatch")
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
case <-time.After(time.Second * 5):
|
2017-03-19 21:40:25 +03:00
|
|
|
t.Fatal("update not received")
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestNodeUpdateNotification tests that notifications are sent out when nodes
|
|
|
|
// either join the network for the first time, or update their authenticated
|
|
|
|
// attributes with new data.
|
|
|
|
func TestNodeUpdateNotification(t *testing.T) {
|
2017-06-17 01:59:20 +03:00
|
|
|
t.Parallel()
|
|
|
|
|
2017-03-09 01:30:00 +03:00
|
|
|
ctx, cleanUp, err := createTestCtx(1)
|
|
|
|
defer cleanUp()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create router: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new client to receive notifications.
|
|
|
|
ntfnClient, err := ctx.router.SubscribeTopology()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to subscribe for channel notifications: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create two random nodes to add to send as node announcement messages
|
|
|
|
// to trigger notifications.
|
2017-03-19 21:40:25 +03:00
|
|
|
node1, err := createTestNode()
|
2017-03-09 01:30:00 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test node: %v", err)
|
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
node2, err := createTestNode()
|
2017-03-09 01:30:00 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test node: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
// Change network topology by adding nodes to the channel router.
|
|
|
|
if err := ctx.router.AddNode(node1); err != nil {
|
|
|
|
t.Fatalf("unable to add node: %v", err)
|
|
|
|
}
|
|
|
|
if err := ctx.router.AddNode(node2); err != nil {
|
|
|
|
t.Fatalf("unable to add node: %v", err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
assertNodeNtfnCorrect := func(t *testing.T, ann *channeldb.LightningNode,
|
2017-03-09 01:30:00 +03:00
|
|
|
ntfns []*NetworkNodeUpdate) {
|
|
|
|
|
|
|
|
// For each processed announcement we should only receive a
|
|
|
|
// single announcement in a batch.
|
|
|
|
if len(ntfns) != 1 {
|
|
|
|
t.Fatalf("expected 1 notification, instead have %v",
|
|
|
|
len(ntfns))
|
|
|
|
}
|
|
|
|
|
|
|
|
// The notification received should directly map the
|
|
|
|
// announcement originally sent.
|
|
|
|
nodeNtfn := ntfns[0]
|
2017-02-17 12:29:23 +03:00
|
|
|
if nodeNtfn.Addresses[0] != ann.Addresses[0] {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("node address doesn't match: expected %v, got %v",
|
2017-02-17 12:29:23 +03:00
|
|
|
nodeNtfn.Addresses[0], ann.Addresses[0])
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
if !nodeNtfn.IdentityKey.IsEqual(ann.PubKey) {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("node identity keys don't match: expected %x, "+
|
2017-03-19 21:40:25 +03:00
|
|
|
"got %x", ann.PubKey.SerializeCompressed(),
|
2017-03-09 01:30:00 +03:00
|
|
|
nodeNtfn.IdentityKey.SerializeCompressed())
|
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
if nodeNtfn.Alias != ann.Alias {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("node alias doesn't match: expected %v, got %v",
|
2017-03-19 21:40:25 +03:00
|
|
|
ann.Alias, nodeNtfn.Alias)
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Exactly two notifications should be sent, each corresponding to the
|
|
|
|
// node announcement messages sent above.
|
|
|
|
const numAnns = 2
|
|
|
|
for i := 0; i < numAnns; i++ {
|
|
|
|
select {
|
|
|
|
case ntfn := <-ntfnClient.TopologyChanges:
|
|
|
|
if i == 0 {
|
2017-03-19 21:40:25 +03:00
|
|
|
assertNodeNtfnCorrect(t, node1, ntfn.NodeUpdates)
|
2017-03-09 01:30:00 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
assertNodeNtfnCorrect(t, node2, ntfn.NodeUpdates)
|
2017-03-09 01:30:00 +03:00
|
|
|
case <-time.After(time.Second * 5):
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we receive a new update from a node (with a higher timestamp),
|
|
|
|
// then it should trigger a new notification.
|
|
|
|
// TODO(roasbeef): assume monotonic time.
|
2017-03-19 21:40:25 +03:00
|
|
|
nodeUpdateAnn := *node1
|
|
|
|
nodeUpdateAnn.LastUpdate = node1.LastUpdate.Add(300 * time.Millisecond)
|
2017-03-09 01:30:00 +03:00
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
// Add new node topology update to the channel router.
|
|
|
|
if err := ctx.router.AddNode(&nodeUpdateAnn); err != nil {
|
|
|
|
t.Fatalf("unable to add node: %v", err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// Once again a notification should be received reflecting the up to
|
|
|
|
// date node announcement.
|
|
|
|
select {
|
|
|
|
case ntfn := <-ntfnClient.TopologyChanges:
|
|
|
|
assertNodeNtfnCorrect(t, &nodeUpdateAnn, ntfn.NodeUpdates)
|
|
|
|
case <-time.After(time.Second * 5):
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestNotificationCancellation tests that notifications are properly cancelled
|
|
|
|
// when the client wishes to exit.
|
|
|
|
func TestNotificationCancellation(t *testing.T) {
|
2017-06-17 01:59:20 +03:00
|
|
|
t.Parallel()
|
|
|
|
|
2017-03-09 01:30:00 +03:00
|
|
|
const startingBlockHeight = 101
|
|
|
|
ctx, cleanUp, err := createTestCtx(startingBlockHeight)
|
|
|
|
defer cleanUp()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create router: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new client to receive notifications.
|
|
|
|
ntfnClient, err := ctx.router.SubscribeTopology()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to subscribe for channel notifications: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
// We'll create a fresh new node topology update to feed to the channel
|
2017-03-09 01:30:00 +03:00
|
|
|
// router.
|
2017-03-19 21:40:25 +03:00
|
|
|
node, err := createTestNode()
|
2017-03-09 01:30:00 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test node: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Before we send the message to the channel router, we'll cancel the
|
|
|
|
// notifications for this client. As a result, the notification
|
|
|
|
// triggered by accepting this announcement shouldn't be sent to the
|
|
|
|
// client.
|
|
|
|
ntfnClient.Cancel()
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
if err := ctx.router.AddNode(node); err != nil {
|
|
|
|
t.Fatalf("unable to add node: %v", err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
select {
|
|
|
|
// The notification shouldn't be sent, however, the channel should be
|
|
|
|
// closed, causing the second read-value to be false.
|
|
|
|
case _, ok := <-ntfnClient.TopologyChanges:
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:40:25 +03:00
|
|
|
t.Fatal("notification sent but shouldn't have been")
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
case <-time.After(time.Second * 5):
|
2017-03-19 21:40:25 +03:00
|
|
|
t.Fatal("notification client never cancelled")
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestChannelCloseNotification tests that channel closure notifications are
|
|
|
|
// properly dispatched to all registered clients.
|
|
|
|
func TestChannelCloseNotification(t *testing.T) {
|
2017-06-17 01:59:20 +03:00
|
|
|
t.Parallel()
|
|
|
|
|
2017-03-09 01:30:00 +03:00
|
|
|
const startingBlockHeight = 101
|
|
|
|
ctx, cleanUp, err := createTestCtx(startingBlockHeight)
|
|
|
|
defer cleanUp()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create router: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// First we'll create the utxo for the channel to be "closed"
|
2017-03-30 04:01:28 +03:00
|
|
|
const chanValue = 10000
|
|
|
|
fundingTx, chanUtxo, chanID, err := createChannelEdge(ctx,
|
|
|
|
bitcoinKey1.SerializeCompressed(), bitcoinKey2.SerializeCompressed(),
|
|
|
|
chanValue, startingBlockHeight)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable create channel edge: %v", err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// We'll also add a record for the block that included our funding
|
|
|
|
// transaction.
|
|
|
|
fundingBlock := &wire.MsgBlock{
|
|
|
|
Transactions: []*wire.MsgTx{fundingTx},
|
|
|
|
}
|
|
|
|
ctx.chain.addBlock(fundingBlock, chanID.BlockHeight)
|
|
|
|
|
|
|
|
// Next we'll create two test nodes that the fake channel will be open
|
|
|
|
// between and add then as members of the channel graph.
|
2017-03-19 21:40:25 +03:00
|
|
|
node1, err := createTestNode()
|
2017-03-09 01:30:00 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test node: %v", err)
|
|
|
|
}
|
2017-05-15 05:27:14 +03:00
|
|
|
if err := ctx.router.AddNode(node1); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2017-03-19 21:40:25 +03:00
|
|
|
node2, err := createTestNode()
|
2017-03-09 01:30:00 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to create test node: %v", err)
|
|
|
|
}
|
2017-05-15 05:27:14 +03:00
|
|
|
if err := ctx.router.AddNode(node2); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// Finally, to conclude our test set up, we'll create a channel
|
|
|
|
// announcement to announce the created channel between the two nodes.
|
2017-03-19 21:40:25 +03:00
|
|
|
edge := &channeldb.ChannelEdgeInfo{
|
|
|
|
ChannelID: chanID.ToUint64(),
|
|
|
|
NodeKey1: node1.PubKey,
|
|
|
|
NodeKey2: node2.PubKey,
|
2017-03-30 04:01:28 +03:00
|
|
|
BitcoinKey1: bitcoinKey1,
|
|
|
|
BitcoinKey2: bitcoinKey2,
|
2017-03-19 21:40:25 +03:00
|
|
|
AuthProof: &channeldb.ChannelAuthProof{
|
|
|
|
NodeSig1: testSig,
|
|
|
|
NodeSig2: testSig,
|
|
|
|
BitcoinSig1: testSig,
|
|
|
|
BitcoinSig2: testSig,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if err := ctx.router.AddEdge(edge); err != nil {
|
|
|
|
t.Fatalf("unable to add edge: %v", err)
|
|
|
|
}
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// With the channel edge now in place, we'll subscribe for topology
|
|
|
|
// notifications.
|
|
|
|
ntfnClient, err := ctx.router.SubscribeTopology()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to subscribe for channel notifications: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, we'll simulate the closure of our channel by generating a new
|
|
|
|
// block at height 102 which spends the original multi-sig output of
|
|
|
|
// the channel.
|
|
|
|
blockHeight := uint32(102)
|
|
|
|
newBlock := &wire.MsgBlock{
|
|
|
|
Transactions: []*wire.MsgTx{
|
|
|
|
{
|
|
|
|
TxIn: []*wire.TxIn{
|
2017-03-09 07:44:32 +03:00
|
|
|
{
|
2017-03-30 04:01:28 +03:00
|
|
|
PreviousOutPoint: *chanUtxo,
|
2017-03-09 01:30:00 +03:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ctx.chain.addBlock(newBlock, blockHeight)
|
2017-05-11 03:22:26 +03:00
|
|
|
ctx.chainView.notifyBlock(newBlock.Header.BlockHash(), blockHeight,
|
|
|
|
newBlock.Transactions)
|
2017-03-09 01:30:00 +03:00
|
|
|
|
|
|
|
// The notification registered above should be sent, if not we'll time
|
|
|
|
// out and mark the test as failed.
|
|
|
|
select {
|
|
|
|
case ntfn := <-ntfnClient.TopologyChanges:
|
|
|
|
// We should have exactly a single notification for the channel
|
|
|
|
// "closed" above.
|
|
|
|
closedChans := ntfn.ClosedChannels
|
|
|
|
if len(closedChans) == 0 {
|
2017-03-19 21:40:25 +03:00
|
|
|
t.Fatal("close channel ntfn not populated")
|
2017-03-09 01:30:00 +03:00
|
|
|
} else if len(closedChans) != 1 {
|
|
|
|
t.Fatalf("only one should've been detected as closed, "+
|
|
|
|
"instead %v were", len(closedChans))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that the notification we received includes the proper
|
|
|
|
// update the for the channel that was closed in the generated
|
|
|
|
// block.
|
|
|
|
closedChan := closedChans[0]
|
|
|
|
if closedChan.ChanID != chanID.ToUint64() {
|
|
|
|
t.Fatalf("channel ID of closed channel doesn't match: "+
|
|
|
|
"expected %v, got %v", chanID.ToUint64(), closedChan.ChanID)
|
|
|
|
}
|
|
|
|
// TODO(roasbeef): this is a hack, needs to be removed
|
|
|
|
// after commitment fees are dynamic.
|
2017-05-01 21:45:02 +03:00
|
|
|
if closedChan.Capacity != chanValue {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("capacity of closed channel doesn't match: "+
|
|
|
|
"expected %v, got %v", chanValue, closedChan.Capacity)
|
|
|
|
}
|
|
|
|
if closedChan.ClosedHeight != blockHeight {
|
|
|
|
t.Fatalf("close height of closed channel doesn't match: "+
|
|
|
|
"expected %v, got %v", blockHeight, closedChan.ClosedHeight)
|
|
|
|
}
|
2017-03-30 04:01:28 +03:00
|
|
|
if closedChan.ChanPoint != *chanUtxo {
|
2017-03-09 01:30:00 +03:00
|
|
|
t.Fatalf("chan point of closed channel doesn't match: "+
|
|
|
|
"expected %v, got %v", chanUtxo, closedChan.ChanPoint)
|
|
|
|
}
|
|
|
|
|
|
|
|
case <-time.After(time.Second * 5):
|
2017-03-19 21:40:25 +03:00
|
|
|
t.Fatal("notification not sent")
|
2017-03-09 01:30:00 +03:00
|
|
|
}
|
|
|
|
}
|