2017-06-08 20:55:41 +03:00
|
|
|
package lnwire
|
|
|
|
|
|
|
|
import (
|
2018-09-01 03:24:20 +03:00
|
|
|
"bufio"
|
2017-06-08 20:55:41 +03:00
|
|
|
"bytes"
|
2018-09-01 03:24:20 +03:00
|
|
|
"encoding/binary"
|
2017-06-08 20:55:41 +03:00
|
|
|
"reflect"
|
|
|
|
"testing"
|
2018-09-01 05:33:05 +03:00
|
|
|
|
|
|
|
"github.com/davecgh/go-spew/spew"
|
2017-06-08 20:55:41 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
testOnionHash = []byte{}
|
2017-08-22 08:33:20 +03:00
|
|
|
testAmount = MilliSatoshi(1)
|
2017-06-08 20:55:41 +03:00
|
|
|
testCtlvExpiry = uint32(2)
|
|
|
|
testFlags = uint16(2)
|
2018-01-31 06:41:52 +03:00
|
|
|
sig, _ = NewSigFromSignature(testSig)
|
2017-06-08 20:55:41 +03:00
|
|
|
testChannelUpdate = ChannelUpdate{
|
2018-01-31 06:41:52 +03:00
|
|
|
Signature: sig,
|
2017-06-08 20:55:41 +03:00
|
|
|
ShortChannelID: NewShortChanIDFromInt(1),
|
|
|
|
Timestamp: 1,
|
|
|
|
Flags: 1,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
var onionFailures = []FailureMessage{
|
|
|
|
&FailInvalidRealm{},
|
|
|
|
&FailTemporaryNodeFailure{},
|
|
|
|
&FailPermanentNodeFailure{},
|
|
|
|
&FailRequiredNodeFeatureMissing{},
|
|
|
|
&FailPermanentChannelFailure{},
|
|
|
|
&FailRequiredChannelFeatureMissing{},
|
|
|
|
&FailUnknownNextPeer{},
|
|
|
|
&FailUnknownPaymentHash{},
|
|
|
|
&FailIncorrectPaymentAmount{},
|
|
|
|
&FailFinalExpiryTooSoon{},
|
|
|
|
|
|
|
|
NewInvalidOnionVersion(testOnionHash),
|
|
|
|
NewInvalidOnionHmac(testOnionHash),
|
|
|
|
NewInvalidOnionKey(testOnionHash),
|
|
|
|
NewTemporaryChannelFailure(&testChannelUpdate),
|
|
|
|
NewTemporaryChannelFailure(nil),
|
|
|
|
NewAmountBelowMinimum(testAmount, testChannelUpdate),
|
|
|
|
NewFeeInsufficient(testAmount, testChannelUpdate),
|
|
|
|
NewIncorrectCltvExpiry(testCtlvExpiry, testChannelUpdate),
|
|
|
|
NewExpiryTooSoon(testChannelUpdate),
|
|
|
|
NewChannelDisabled(testFlags, testChannelUpdate),
|
|
|
|
NewFinalIncorrectCltvExpiry(testCtlvExpiry),
|
|
|
|
NewFinalIncorrectHtlcAmount(testAmount),
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestEncodeDecodeCode tests the ability of onion errors to be properly encoded
|
|
|
|
// and decoded.
|
|
|
|
func TestEncodeDecodeCode(t *testing.T) {
|
|
|
|
for _, failure1 := range onionFailures {
|
|
|
|
var b bytes.Buffer
|
|
|
|
|
|
|
|
if err := EncodeFailure(&b, failure1, 0); err != nil {
|
|
|
|
t.Fatalf("unable to encode failure code(%v): %v",
|
|
|
|
failure1.Code(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
failure2, err := DecodeFailure(&b, 0)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to decode failure code(%v): %v",
|
|
|
|
failure1.Code(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(failure1, failure2) {
|
2018-09-01 05:33:05 +03:00
|
|
|
t.Fatalf("expected %v, got %v", spew.Sdump(failure1),
|
|
|
|
spew.Sdump(failure2))
|
2017-06-08 20:55:41 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-09-01 03:24:20 +03:00
|
|
|
|
|
|
|
// TestChannelUpdateCompatabilityParsing tests that we're able to properly read
|
|
|
|
// out channel update messages encoded in an onion error payload that was
|
|
|
|
// written in the legacy (type prefixed) format.
|
|
|
|
func TestChannelUpdateCompatabilityParsing(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
// We'll start by taking out test channel update, and encoding it into
|
|
|
|
// a set of raw bytes.
|
|
|
|
var b bytes.Buffer
|
|
|
|
if err := testChannelUpdate.Encode(&b, 0); err != nil {
|
|
|
|
t.Fatalf("unable to encode chan update: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now that we have the set of bytes encoded, we'll ensure that we're
|
|
|
|
// able to decode it using our compatibility method, as it's a regular
|
|
|
|
// encoded channel update message.
|
|
|
|
var newChanUpdate ChannelUpdate
|
|
|
|
err := parseChannelUpdateCompatabilityMode(
|
|
|
|
bufio.NewReader(&b), &newChanUpdate, 0,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to parse channel update: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this point, we'll ensure that we get the exact same failure out
|
|
|
|
// on the other side.
|
|
|
|
if !reflect.DeepEqual(testChannelUpdate, newChanUpdate) {
|
|
|
|
t.Fatalf("mismatched channel updates: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We'll now reset then re-encoded the same channel update to try it in
|
|
|
|
// the proper compatible mode.
|
|
|
|
b.Reset()
|
|
|
|
|
|
|
|
// Before we encode the update itself, we'll also write out the 2-byte
|
|
|
|
// type in order to simulate the compat mode.
|
|
|
|
var tByte [2]byte
|
|
|
|
binary.BigEndian.PutUint16(tByte[:], MsgChannelUpdate)
|
|
|
|
b.Write(tByte[:])
|
|
|
|
if err := testChannelUpdate.Encode(&b, 0); err != nil {
|
|
|
|
t.Fatalf("unable to encode chan update: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We should be able to properly parse the encoded channel update
|
|
|
|
// message even with the extra two bytes.
|
|
|
|
var newChanUpdate2 ChannelUpdate
|
|
|
|
err = parseChannelUpdateCompatabilityMode(
|
|
|
|
bufio.NewReader(&b), &newChanUpdate2, 0,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to parse channel update: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(newChanUpdate2, newChanUpdate) {
|
|
|
|
t.Fatalf("mismatched channel updates: %v", err)
|
|
|
|
}
|
|
|
|
}
|