2022-07-21 13:21:44 +00:00
|
|
|
package rpcsrv
|
2020-05-10 22:00:19 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
2024-04-02 12:13:13 +00:00
|
|
|
"sync"
|
2020-05-10 22:00:19 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/gorilla/websocket"
|
2020-11-23 11:09:00 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/internal/testchain"
|
2022-11-23 09:19:49 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/config"
|
2020-05-10 22:00:19 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/core"
|
2020-05-13 14:13:33 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/encoding/address"
|
2022-07-22 16:09:29 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/neorpc"
|
2022-11-16 09:35:26 +00:00
|
|
|
"github.com/nspcc-dev/neo-go/pkg/util"
|
2020-05-10 22:00:19 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
2021-05-12 15:20:48 +00:00
|
|
|
const testOverflow = false
|
|
|
|
|
2024-04-03 09:29:04 +00:00
|
|
|
func wsReader(t *testing.T, ws *websocket.Conn, msgCh chan<- []byte, readerStopCh chan struct{}, readerToExitCh chan struct{}) {
|
|
|
|
readLoop:
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-readerStopCh:
|
|
|
|
break readLoop
|
|
|
|
default:
|
|
|
|
err := ws.SetReadDeadline(time.Now().Add(5 * time.Second))
|
|
|
|
select {
|
|
|
|
case <-readerStopCh:
|
|
|
|
break readLoop
|
|
|
|
default:
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, body, err := ws.ReadMessage()
|
|
|
|
select {
|
|
|
|
case <-readerStopCh:
|
|
|
|
break readLoop
|
|
|
|
default:
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case msgCh <- body:
|
|
|
|
case <-time.After(10 * time.Second):
|
|
|
|
t.Log("exiting wsReader loop: unable to send response to receiver")
|
|
|
|
break readLoop
|
|
|
|
}
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
|
|
|
}
|
2024-04-01 14:50:25 +00:00
|
|
|
close(readerToExitCh)
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
|
|
|
|
2022-07-22 16:09:29 +00:00
|
|
|
func callWSGetRaw(t *testing.T, ws *websocket.Conn, msg string, respCh <-chan []byte) *neorpc.Response {
|
|
|
|
var resp = new(neorpc.Response)
|
2020-05-10 22:00:19 +00:00
|
|
|
|
2024-04-02 07:31:38 +00:00
|
|
|
require.NoError(t, ws.SetWriteDeadline(time.Now().Add(5*time.Second)))
|
2020-05-10 22:00:19 +00:00
|
|
|
require.NoError(t, ws.WriteMessage(websocket.TextMessage, []byte(msg)))
|
|
|
|
|
|
|
|
body := <-respCh
|
|
|
|
require.NoError(t, json.Unmarshal(body, resp))
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2022-07-22 16:09:29 +00:00
|
|
|
func getNotification(t *testing.T, respCh <-chan []byte) *neorpc.Notification {
|
|
|
|
var resp = new(neorpc.Notification)
|
2020-05-10 22:00:19 +00:00
|
|
|
body := <-respCh
|
|
|
|
require.NoError(t, json.Unmarshal(body, resp))
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2024-04-01 15:06:08 +00:00
|
|
|
func initCleanServerAndWSClient(t *testing.T, startNetworkServer ...bool) (*core.Blockchain, *Server, *websocket.Conn, chan []byte) {
|
2020-05-10 22:00:19 +00:00
|
|
|
chain, rpcSrv, httpSrv := initClearServerWithInMemoryChain(t)
|
|
|
|
|
2024-03-20 10:36:53 +00:00
|
|
|
dialer := websocket.Dialer{HandshakeTimeout: 5 * time.Second}
|
2020-05-10 22:00:19 +00:00
|
|
|
url := "ws" + strings.TrimPrefix(httpSrv.URL, "http") + "/ws"
|
2022-09-02 09:21:24 +00:00
|
|
|
ws, r, err := dialer.Dial(url, nil)
|
2020-05-10 22:00:19 +00:00
|
|
|
require.NoError(t, err)
|
2022-09-02 09:21:24 +00:00
|
|
|
defer r.Body.Close()
|
2020-05-10 22:00:19 +00:00
|
|
|
|
|
|
|
// Use buffered channel to read server's messages and then read expected
|
|
|
|
// responses from it.
|
|
|
|
respMsgs := make(chan []byte, 16)
|
2024-04-03 09:29:04 +00:00
|
|
|
readerStopCh := make(chan struct{})
|
2024-04-01 14:50:25 +00:00
|
|
|
readerToExitCh := make(chan struct{})
|
2024-04-03 09:29:04 +00:00
|
|
|
go wsReader(t, ws, respMsgs, readerStopCh, readerToExitCh)
|
2024-04-01 15:06:08 +00:00
|
|
|
if len(startNetworkServer) != 0 && startNetworkServer[0] {
|
|
|
|
rpcSrv.coreServer.Start()
|
|
|
|
}
|
2024-04-01 14:50:25 +00:00
|
|
|
t.Cleanup(func() {
|
2024-04-03 09:29:04 +00:00
|
|
|
drainLoop:
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-respMsgs:
|
|
|
|
default:
|
|
|
|
break drainLoop
|
|
|
|
}
|
|
|
|
}
|
|
|
|
close(readerStopCh)
|
2024-04-01 14:50:25 +00:00
|
|
|
ws.Close()
|
2024-04-04 08:55:42 +00:00
|
|
|
<-readerToExitCh
|
2024-04-01 15:06:08 +00:00
|
|
|
if len(startNetworkServer) != 0 && startNetworkServer[0] {
|
|
|
|
rpcSrv.coreServer.Shutdown()
|
|
|
|
}
|
2024-04-01 14:50:25 +00:00
|
|
|
})
|
|
|
|
return chain, rpcSrv, ws, respMsgs
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
|
|
|
|
2020-05-13 14:13:33 +00:00
|
|
|
func callSubscribe(t *testing.T, ws *websocket.Conn, msgs <-chan []byte, params string) string {
|
|
|
|
var s string
|
|
|
|
resp := callWSGetRaw(t, ws, fmt.Sprintf(`{"jsonrpc": "2.0","method": "subscribe","params": %s,"id": 1}`, params), msgs)
|
|
|
|
require.Nil(t, resp.Error)
|
|
|
|
require.NotNil(t, resp.Result)
|
|
|
|
require.NoError(t, json.Unmarshal(resp.Result, &s))
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
func callUnsubscribe(t *testing.T, ws *websocket.Conn, msgs <-chan []byte, id string) {
|
|
|
|
var b bool
|
|
|
|
resp := callWSGetRaw(t, ws, fmt.Sprintf(`{"jsonrpc": "2.0","method": "unsubscribe","params": ["%s"],"id": 1}`, id), msgs)
|
|
|
|
require.Nil(t, resp.Error)
|
|
|
|
require.NotNil(t, resp.Result)
|
|
|
|
require.NoError(t, json.Unmarshal(resp.Result, &b))
|
|
|
|
require.Equal(t, true, b)
|
|
|
|
}
|
|
|
|
|
2020-05-10 22:00:19 +00:00
|
|
|
func TestSubscriptions(t *testing.T) {
|
|
|
|
var subIDs = make([]string, 0)
|
2023-12-22 08:23:41 +00:00
|
|
|
var subFeeds = []string{"block_added", "transaction_added", "notification_from_execution", "transaction_executed", "notary_request_event", "header_of_added_block"}
|
2020-05-10 22:00:19 +00:00
|
|
|
|
2024-04-01 15:06:08 +00:00
|
|
|
chain, rpcSrv, c, respMsgs := initCleanServerAndWSClient(t, true)
|
2020-05-10 22:00:19 +00:00
|
|
|
|
|
|
|
for _, feed := range subFeeds {
|
2020-05-13 14:13:33 +00:00
|
|
|
s := callSubscribe(t, c, respMsgs, fmt.Sprintf(`["%s"]`, feed))
|
2020-05-10 22:00:19 +00:00
|
|
|
subIDs = append(subIDs, s)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, b := range getTestBlocks(t) {
|
|
|
|
require.NoError(t, chain.AddBlock(b))
|
2020-06-18 11:19:55 +00:00
|
|
|
resp := getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.ExecutionEventID, resp.Event)
|
2020-06-18 11:19:55 +00:00
|
|
|
for {
|
2020-09-23 08:47:10 +00:00
|
|
|
resp = getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
if resp.Event != neorpc.NotificationEventID {
|
2020-06-18 11:19:55 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for i := 0; i < len(b.Transactions); i++ {
|
|
|
|
if i > 0 {
|
|
|
|
resp = getNotification(t, respMsgs)
|
|
|
|
}
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.ExecutionEventID, resp.Event)
|
2020-05-10 22:00:19 +00:00
|
|
|
for {
|
|
|
|
resp := getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
if resp.Event == neorpc.NotificationEventID {
|
2020-05-10 22:00:19 +00:00
|
|
|
continue
|
|
|
|
}
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.TransactionEventID, resp.Event)
|
2020-05-10 22:00:19 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2020-06-18 11:19:55 +00:00
|
|
|
resp = getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.ExecutionEventID, resp.Event)
|
2020-09-23 08:48:31 +00:00
|
|
|
for {
|
|
|
|
resp = getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
if resp.Event != neorpc.NotificationEventID {
|
2020-09-23 08:48:31 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2023-12-22 08:23:41 +00:00
|
|
|
require.Equal(t, neorpc.HeaderOfAddedBlockEventID, resp.Event)
|
|
|
|
resp = getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.BlockEventID, resp.Event)
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
|
|
|
|
2021-05-28 11:55:06 +00:00
|
|
|
// We should manually add NotaryRequest to test notification.
|
|
|
|
sender := testchain.PrivateKeyByID(0)
|
2023-08-22 09:36:11 +00:00
|
|
|
err := rpcSrv.coreServer.RelayP2PNotaryRequest(createValidNotaryRequest(chain, sender, 1, 2_0000_0000, nil))
|
2021-05-28 11:55:06 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
for {
|
|
|
|
resp := getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
if resp.Event == neorpc.NotaryRequestEventID {
|
2021-05-28 11:55:06 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-10 22:00:19 +00:00
|
|
|
for _, id := range subIDs {
|
2020-05-13 14:13:33 +00:00
|
|
|
callUnsubscribe(t, c, respMsgs, id)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFilteredSubscriptions(t *testing.T) {
|
|
|
|
priv0 := testchain.PrivateKeyByID(0)
|
|
|
|
var goodSender = priv0.GetScriptHash()
|
|
|
|
|
|
|
|
var cases = map[string]struct {
|
|
|
|
params string
|
2022-07-22 16:09:29 +00:00
|
|
|
check func(*testing.T, *neorpc.Notification)
|
2020-05-13 14:13:33 +00:00
|
|
|
}{
|
|
|
|
"tx matching sender": {
|
|
|
|
params: `["transaction_added", {"sender":"` + goodSender.StringLE() + `"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.TransactionEventID, resp.Event)
|
2020-05-13 14:13:33 +00:00
|
|
|
sender := rmap["sender"].(string)
|
|
|
|
require.Equal(t, address.Uint160ToString(goodSender), sender)
|
|
|
|
},
|
|
|
|
},
|
2020-07-29 16:57:38 +00:00
|
|
|
"tx matching signer": {
|
|
|
|
params: `["transaction_added", {"signer":"` + goodSender.StringLE() + `"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.TransactionEventID, resp.Event)
|
2023-04-03 10:34:24 +00:00
|
|
|
signers := rmap["signers"].([]any)
|
|
|
|
signer0 := signers[0].(map[string]any)
|
2020-07-29 16:57:38 +00:00
|
|
|
signer0acc := signer0["account"].(string)
|
|
|
|
require.Equal(t, "0x"+goodSender.StringLE(), signer0acc)
|
2020-05-13 14:13:33 +00:00
|
|
|
},
|
|
|
|
},
|
2020-07-29 16:57:38 +00:00
|
|
|
"tx matching sender and signer": {
|
|
|
|
params: `["transaction_added", {"sender":"` + goodSender.StringLE() + `", "signer":"` + goodSender.StringLE() + `"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.TransactionEventID, resp.Event)
|
2020-05-13 14:13:33 +00:00
|
|
|
sender := rmap["sender"].(string)
|
|
|
|
require.Equal(t, address.Uint160ToString(goodSender), sender)
|
2023-04-03 10:34:24 +00:00
|
|
|
signers := rmap["signers"].([]any)
|
|
|
|
signer0 := signers[0].(map[string]any)
|
2020-07-29 16:57:38 +00:00
|
|
|
signer0acc := signer0["account"].(string)
|
|
|
|
require.Equal(t, "0x"+goodSender.StringLE(), signer0acc)
|
2020-05-13 14:13:33 +00:00
|
|
|
},
|
|
|
|
},
|
2020-08-04 13:24:32 +00:00
|
|
|
"notification matching contract hash": {
|
2020-05-13 14:13:33 +00:00
|
|
|
params: `["notification_from_execution", {"contract":"` + testContractHash + `"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.NotificationEventID, resp.Event)
|
2020-05-13 14:13:33 +00:00
|
|
|
c := rmap["contract"].(string)
|
|
|
|
require.Equal(t, "0x"+testContractHash, c)
|
|
|
|
},
|
|
|
|
},
|
2020-08-04 13:24:32 +00:00
|
|
|
"notification matching name": {
|
|
|
|
params: `["notification_from_execution", {"name":"my_pretty_notification"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.NotificationEventID, resp.Event)
|
2020-08-04 13:24:32 +00:00
|
|
|
n := rmap["name"].(string)
|
|
|
|
require.Equal(t, "my_pretty_notification", n)
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"notification matching contract hash and name": {
|
|
|
|
params: `["notification_from_execution", {"contract":"` + testContractHash + `", "name":"my_pretty_notification"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.NotificationEventID, resp.Event)
|
2020-08-04 13:24:32 +00:00
|
|
|
c := rmap["contract"].(string)
|
|
|
|
require.Equal(t, "0x"+testContractHash, c)
|
|
|
|
n := rmap["name"].(string)
|
|
|
|
require.Equal(t, "my_pretty_notification", n)
|
|
|
|
},
|
|
|
|
},
|
2022-11-16 10:32:39 +00:00
|
|
|
"execution matching state": {
|
2020-05-13 14:13:33 +00:00
|
|
|
params: `["transaction_executed", {"state":"HALT"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.ExecutionEventID, resp.Event)
|
2020-06-18 19:56:42 +00:00
|
|
|
st := rmap["vmstate"].(string)
|
2020-05-13 14:13:33 +00:00
|
|
|
require.Equal(t, "HALT", st)
|
|
|
|
},
|
|
|
|
},
|
2022-11-16 10:32:39 +00:00
|
|
|
"execution matching container": {
|
|
|
|
params: `["transaction_executed", {"container":"` + deploymentTxHash + `"}]`,
|
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-11-16 10:32:39 +00:00
|
|
|
require.Equal(t, neorpc.ExecutionEventID, resp.Event)
|
|
|
|
tx := rmap["container"].(string)
|
|
|
|
require.Equal(t, "0x"+deploymentTxHash, tx)
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"execution matching state and container": {
|
|
|
|
params: `["transaction_executed", {"state":"HALT", "container":"` + deploymentTxHash + `"}]`,
|
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-11-16 10:32:39 +00:00
|
|
|
require.Equal(t, neorpc.ExecutionEventID, resp.Event)
|
|
|
|
tx := rmap["container"].(string)
|
|
|
|
require.Equal(t, "0x"+deploymentTxHash, tx)
|
|
|
|
st := rmap["vmstate"].(string)
|
|
|
|
require.Equal(t, "HALT", st)
|
|
|
|
},
|
|
|
|
},
|
2020-05-13 14:13:33 +00:00
|
|
|
"tx non-matching": {
|
|
|
|
params: `["transaction_added", {"sender":"00112233445566778899aabbccddeeff00112233"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, _ *neorpc.Notification) {
|
2020-05-13 14:13:33 +00:00
|
|
|
t.Fatal("unexpected match for EnrollmentTransaction")
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"notification non-matching": {
|
|
|
|
params: `["notification_from_execution", {"contract":"00112233445566778899aabbccddeeff00112233"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, _ *neorpc.Notification) {
|
2020-05-13 14:13:33 +00:00
|
|
|
t.Fatal("unexpected match for contract 00112233445566778899aabbccddeeff00112233")
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"execution non-matching": {
|
2022-11-16 09:35:26 +00:00
|
|
|
// We have single FAULTed transaction in chain, this, use the wrong hash for this test instead of FAULT state.
|
|
|
|
params: `["transaction_executed", {"container":"0x` + util.Uint256{}.StringLE() + `"}]`,
|
|
|
|
check: func(t *testing.T, n *neorpc.Notification) {
|
2020-05-13 14:13:33 +00:00
|
|
|
t.Fatal("unexpected match for faulted execution")
|
|
|
|
},
|
|
|
|
},
|
2023-12-22 08:23:41 +00:00
|
|
|
"header of added block": {
|
|
|
|
params: `["header_of_added_block", {"primary": 0, "since": 5}]`,
|
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
|
|
|
require.Equal(t, neorpc.HeaderOfAddedBlockEventID, resp.Event)
|
|
|
|
primary := rmap["primary"].(float64)
|
|
|
|
require.Equal(t, 0, int(primary))
|
|
|
|
index := rmap["index"].(float64)
|
|
|
|
require.Less(t, 4, int(index))
|
|
|
|
},
|
|
|
|
},
|
2020-05-13 14:13:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for name, this := range cases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
2024-04-01 14:50:25 +00:00
|
|
|
chain, _, c, respMsgs := initCleanServerAndWSClient(t)
|
2020-05-13 14:13:33 +00:00
|
|
|
|
|
|
|
// It's used as an end-of-event-stream, so it's always present.
|
|
|
|
blockSubID := callSubscribe(t, c, respMsgs, `["block_added"]`)
|
|
|
|
subID := callSubscribe(t, c, respMsgs, this.params)
|
|
|
|
|
|
|
|
var lastBlock uint32
|
|
|
|
for _, b := range getTestBlocks(t) {
|
|
|
|
require.NoError(t, chain.AddBlock(b))
|
|
|
|
lastBlock = b.Index
|
|
|
|
}
|
|
|
|
|
|
|
|
for {
|
|
|
|
resp := getNotification(t, respMsgs)
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
if resp.Event == neorpc.BlockEventID {
|
2020-05-13 18:27:08 +00:00
|
|
|
index := rmap["index"].(float64)
|
2020-05-13 14:13:33 +00:00
|
|
|
if uint32(index) == lastBlock {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
this.check(t, resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
callUnsubscribe(t, c, respMsgs, subID)
|
|
|
|
callUnsubscribe(t, c, respMsgs, blockSubID)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-28 11:55:06 +00:00
|
|
|
func TestFilteredNotaryRequestSubscriptions(t *testing.T) {
|
|
|
|
// We can't fit this into TestFilteredSubscriptions, because notary requests
|
|
|
|
// event doesn't depend on blocks events.
|
|
|
|
priv0 := testchain.PrivateKeyByID(0)
|
|
|
|
var goodSender = priv0.GetScriptHash()
|
|
|
|
|
|
|
|
var cases = map[string]struct {
|
|
|
|
params string
|
2022-07-22 16:09:29 +00:00
|
|
|
check func(*testing.T, *neorpc.Notification)
|
2021-05-28 11:55:06 +00:00
|
|
|
}{
|
|
|
|
"matching sender": {
|
|
|
|
params: `["notary_request_event", {"sender":"` + goodSender.StringLE() + `"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.NotaryRequestEventID, resp.Event)
|
2021-05-28 11:55:06 +00:00
|
|
|
require.Equal(t, "added", rmap["type"].(string))
|
2023-04-03 10:34:24 +00:00
|
|
|
req := rmap["notaryrequest"].(map[string]any)
|
|
|
|
fbTx := req["fallbacktx"].(map[string]any)
|
|
|
|
sender := fbTx["signers"].([]any)[1].(map[string]any)["account"].(string)
|
2021-05-28 11:55:06 +00:00
|
|
|
require.Equal(t, "0x"+goodSender.StringLE(), sender)
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"matching signer": {
|
|
|
|
params: `["notary_request_event", {"signer":"` + goodSender.StringLE() + `"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.NotaryRequestEventID, resp.Event)
|
2021-05-28 11:55:06 +00:00
|
|
|
require.Equal(t, "added", rmap["type"].(string))
|
2023-04-03 10:34:24 +00:00
|
|
|
req := rmap["notaryrequest"].(map[string]any)
|
|
|
|
mainTx := req["maintx"].(map[string]any)
|
|
|
|
signers := mainTx["signers"].([]any)
|
|
|
|
signer0 := signers[0].(map[string]any)
|
2021-05-28 11:55:06 +00:00
|
|
|
signer0acc := signer0["account"].(string)
|
|
|
|
require.Equal(t, "0x"+goodSender.StringLE(), signer0acc)
|
|
|
|
},
|
|
|
|
},
|
2023-12-09 08:37:25 +00:00
|
|
|
"matching type": {
|
|
|
|
params: `["notary_request_event", {"type":"added"}]`,
|
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
|
|
|
require.Equal(t, neorpc.NotaryRequestEventID, resp.Event)
|
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
|
|
|
require.Equal(t, "added", rmap["type"].(string))
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"matching sender, signer and type": {
|
|
|
|
params: `["notary_request_event", {"sender":"` + goodSender.StringLE() + `", "signer":"` + goodSender.StringLE() + `","type":"added"}]`,
|
2022-07-22 16:09:29 +00:00
|
|
|
check: func(t *testing.T, resp *neorpc.Notification) {
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.NotaryRequestEventID, resp.Event)
|
2021-05-28 11:55:06 +00:00
|
|
|
require.Equal(t, "added", rmap["type"].(string))
|
2023-04-03 10:34:24 +00:00
|
|
|
req := rmap["notaryrequest"].(map[string]any)
|
|
|
|
mainTx := req["maintx"].(map[string]any)
|
|
|
|
fbTx := req["fallbacktx"].(map[string]any)
|
|
|
|
sender := fbTx["signers"].([]any)[1].(map[string]any)["account"].(string)
|
2021-05-28 11:55:06 +00:00
|
|
|
require.Equal(t, "0x"+goodSender.StringLE(), sender)
|
2023-04-03 10:34:24 +00:00
|
|
|
signers := mainTx["signers"].([]any)
|
|
|
|
signer0 := signers[0].(map[string]any)
|
2021-05-28 11:55:06 +00:00
|
|
|
signer0acc := signer0["account"].(string)
|
|
|
|
require.Equal(t, "0x"+goodSender.StringLE(), signer0acc)
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2024-04-01 15:06:08 +00:00
|
|
|
chain, rpcSrv, c, respMsgs := initCleanServerAndWSClient(t, true)
|
2021-05-28 11:55:06 +00:00
|
|
|
|
|
|
|
// blocks are needed to make GAS deposit for priv0
|
|
|
|
blocks := getTestBlocks(t)
|
|
|
|
for _, b := range blocks {
|
|
|
|
require.NoError(t, chain.AddBlock(b))
|
|
|
|
}
|
|
|
|
|
|
|
|
var nonce uint32 = 100
|
|
|
|
for name, this := range cases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
subID := callSubscribe(t, c, respMsgs, this.params)
|
|
|
|
|
2023-08-22 09:36:11 +00:00
|
|
|
err := rpcSrv.coreServer.RelayP2PNotaryRequest(createValidNotaryRequest(chain, priv0, nonce, 2_0000_0000, nil))
|
2021-05-28 11:55:06 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
nonce++
|
|
|
|
|
2022-07-22 16:09:29 +00:00
|
|
|
var resp = new(neorpc.Notification)
|
2021-05-28 11:55:06 +00:00
|
|
|
select {
|
|
|
|
case body := <-respMsgs:
|
|
|
|
require.NoError(t, json.Unmarshal(body, resp))
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Fatal("timeout waiting for event")
|
|
|
|
}
|
|
|
|
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.NotaryRequestEventID, resp.Event)
|
2021-05-28 11:55:06 +00:00
|
|
|
this.check(t, resp)
|
|
|
|
|
|
|
|
callUnsubscribe(t, c, respMsgs, subID)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-13 14:13:33 +00:00
|
|
|
func TestFilteredBlockSubscriptions(t *testing.T) {
|
|
|
|
// We can't fit this into TestFilteredSubscriptions, because it uses
|
|
|
|
// blocks as EOF events to wait for.
|
|
|
|
const numBlocks = 10
|
2024-04-01 14:50:25 +00:00
|
|
|
chain, _, c, respMsgs := initCleanServerAndWSClient(t)
|
2020-05-13 14:13:33 +00:00
|
|
|
|
|
|
|
blockSubID := callSubscribe(t, c, respMsgs, `["block_added", {"primary":3}]`)
|
|
|
|
|
|
|
|
var expectedCnt int
|
|
|
|
for i := 0; i < numBlocks; i++ {
|
|
|
|
primary := uint32(i % 4)
|
|
|
|
if primary == 3 {
|
|
|
|
expectedCnt++
|
|
|
|
}
|
2020-08-20 15:47:14 +00:00
|
|
|
b := testchain.NewBlock(t, chain, 1, primary)
|
2020-05-13 14:13:33 +00:00
|
|
|
require.NoError(t, chain.AddBlock(b))
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < expectedCnt; i++ {
|
2022-07-22 16:09:29 +00:00
|
|
|
var resp = new(neorpc.Notification)
|
2020-05-13 14:13:33 +00:00
|
|
|
select {
|
|
|
|
case body := <-respMsgs:
|
|
|
|
require.NoError(t, json.Unmarshal(body, resp))
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Fatal("timeout waiting for event")
|
|
|
|
}
|
|
|
|
|
2022-07-22 16:09:29 +00:00
|
|
|
require.Equal(t, neorpc.BlockEventID, resp.Event)
|
2023-04-03 10:34:24 +00:00
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
2021-03-01 12:20:27 +00:00
|
|
|
primary := rmap["primary"].(float64)
|
2020-05-13 14:13:33 +00:00
|
|
|
require.Equal(t, 3, int(primary))
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
2020-05-13 14:13:33 +00:00
|
|
|
callUnsubscribe(t, c, respMsgs, blockSubID)
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
|
|
|
|
2023-12-22 08:23:41 +00:00
|
|
|
func TestHeaderOfAddedBlockSubscriptions(t *testing.T) {
|
|
|
|
const numBlocks = 10
|
2024-04-01 14:50:25 +00:00
|
|
|
chain, _, c, respMsgs := initCleanServerAndWSClient(t)
|
2023-12-22 08:23:41 +00:00
|
|
|
|
|
|
|
headerSubID := callSubscribe(t, c, respMsgs, `["header_of_added_block", {"primary":3}]`)
|
|
|
|
|
|
|
|
var expectedCnt int
|
|
|
|
for i := 0; i < numBlocks; i++ {
|
|
|
|
primary := uint32(i % 4)
|
|
|
|
if primary == 3 {
|
|
|
|
expectedCnt++
|
|
|
|
}
|
|
|
|
b := testchain.NewBlock(t, chain, 1, primary)
|
|
|
|
require.NoError(t, chain.AddBlock(b))
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < expectedCnt; i++ {
|
|
|
|
var resp = new(neorpc.Notification)
|
|
|
|
select {
|
|
|
|
case body := <-respMsgs:
|
|
|
|
require.NoError(t, json.Unmarshal(body, resp))
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Fatal("timeout waiting for event")
|
|
|
|
}
|
|
|
|
|
|
|
|
require.Equal(t, neorpc.HeaderOfAddedBlockEventID, resp.Event)
|
|
|
|
rmap := resp.Payload[0].(map[string]any)
|
|
|
|
primary := rmap["primary"].(float64)
|
|
|
|
require.Equal(t, 3, int(primary))
|
|
|
|
}
|
|
|
|
callUnsubscribe(t, c, respMsgs, headerSubID)
|
|
|
|
}
|
|
|
|
|
2020-05-10 22:00:19 +00:00
|
|
|
func TestMaxSubscriptions(t *testing.T) {
|
|
|
|
var subIDs = make([]string, 0)
|
2024-04-01 14:50:25 +00:00
|
|
|
_, _, c, respMsgs := initCleanServerAndWSClient(t)
|
2020-05-10 22:00:19 +00:00
|
|
|
|
|
|
|
for i := 0; i < maxFeeds+1; i++ {
|
|
|
|
var s string
|
|
|
|
resp := callWSGetRaw(t, c, `{"jsonrpc": "2.0", "method": "subscribe", "params": ["block_added"], "id": 1}`, respMsgs)
|
|
|
|
if i < maxFeeds {
|
|
|
|
require.Nil(t, resp.Error)
|
|
|
|
require.NotNil(t, resp.Result)
|
|
|
|
require.NoError(t, json.Unmarshal(resp.Result, &s))
|
|
|
|
// Each ID must be unique.
|
|
|
|
for _, id := range subIDs {
|
|
|
|
require.NotEqual(t, id, s)
|
|
|
|
}
|
|
|
|
subIDs = append(subIDs, s)
|
|
|
|
} else {
|
|
|
|
require.NotNil(t, resp.Error)
|
|
|
|
require.Nil(t, resp.Result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestBadSubUnsub(t *testing.T) {
|
|
|
|
var subCases = map[string]string{
|
|
|
|
"no params": `{"jsonrpc": "2.0", "method": "subscribe", "params": [], "id": 1}`,
|
|
|
|
"bad (non-string) event": `{"jsonrpc": "2.0", "method": "subscribe", "params": [1], "id": 1}`,
|
|
|
|
"bad (wrong) event": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["block_removed"], "id": 1}`,
|
2020-05-12 19:38:29 +00:00
|
|
|
"missed event": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["event_missed"], "id": 1}`,
|
2020-05-13 14:13:33 +00:00
|
|
|
"block invalid filter": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["block_added", 1], "id": 1}`,
|
|
|
|
"tx filter 1": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["transaction_added", 1], "id": 1}`,
|
|
|
|
"tx filter 2": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["transaction_added", {"state": "HALT"}], "id": 1}`,
|
2020-08-04 13:24:32 +00:00
|
|
|
"notification filter 1": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["notification_from_execution", "contract"], "id": 1}`,
|
|
|
|
"notification filter 2": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["notification_from_execution", "name"], "id": 1}`,
|
2020-05-13 14:13:33 +00:00
|
|
|
"execution filter 1": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["transaction_executed", "FAULT"], "id": 1}`,
|
|
|
|
"execution filter 2": `{"jsonrpc": "2.0", "method": "subscribe", "params": ["transaction_executed", {"state": "STOP"}], "id": 1}`,
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
|
|
|
var unsubCases = map[string]string{
|
|
|
|
"no params": `{"jsonrpc": "2.0", "method": "unsubscribe", "params": [], "id": 1}`,
|
|
|
|
"bad id": `{"jsonrpc": "2.0", "method": "unsubscribe", "params": ["vasiliy"], "id": 1}`,
|
|
|
|
"not subscribed id": `{"jsonrpc": "2.0", "method": "unsubscribe", "params": ["7"], "id": 1}`,
|
|
|
|
}
|
2024-04-01 14:50:25 +00:00
|
|
|
_, _, c, respMsgs := initCleanServerAndWSClient(t)
|
2020-05-10 22:00:19 +00:00
|
|
|
|
|
|
|
testF := func(t *testing.T, cases map[string]string) func(t *testing.T) {
|
|
|
|
return func(t *testing.T) {
|
|
|
|
for n, s := range cases {
|
|
|
|
t.Run(n, func(t *testing.T) {
|
|
|
|
resp := callWSGetRaw(t, c, s, respMsgs)
|
|
|
|
require.NotNil(t, resp.Error)
|
|
|
|
require.Nil(t, resp.Result)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
t.Run("subscribe", testF(t, subCases))
|
|
|
|
t.Run("unsubscribe", testF(t, unsubCases))
|
|
|
|
}
|
|
|
|
|
|
|
|
func doSomeWSRequest(t *testing.T, ws *websocket.Conn) {
|
2024-04-02 07:31:38 +00:00
|
|
|
require.NoError(t, ws.SetWriteDeadline(time.Now().Add(5*time.Second)))
|
2020-05-10 22:00:19 +00:00
|
|
|
// It could be just about anything including invalid request,
|
|
|
|
// we only care about server handling being active.
|
|
|
|
require.NoError(t, ws.WriteMessage(websocket.TextMessage, []byte(`{"jsonrpc": "2.0", "method": "getversion", "params": [], "id": 1}`)))
|
2024-04-02 07:31:38 +00:00
|
|
|
err := ws.SetReadDeadline(time.Now().Add(5 * time.Second))
|
2021-05-12 18:34:07 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
_, _, err = ws.ReadMessage()
|
2020-05-10 22:00:19 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestWSClientsLimit(t *testing.T) {
|
2024-08-09 12:14:52 +00:00
|
|
|
for tname, limit := range map[string]int{"8": 8, "disabled": -1} {
|
2022-11-23 09:19:49 +00:00
|
|
|
effectiveClients := limit
|
2024-08-09 12:14:52 +00:00
|
|
|
if limit < 0 {
|
2022-11-23 09:19:49 +00:00
|
|
|
effectiveClients = 0
|
|
|
|
}
|
|
|
|
t.Run(tname, func(t *testing.T) {
|
2024-03-05 13:03:42 +00:00
|
|
|
_, _, httpSrv := initClearServerWithCustomConfig(t, func(cfg *config.Config) {
|
2022-11-23 09:19:49 +00:00
|
|
|
cfg.ApplicationConfiguration.RPC.MaxWebSocketClients = limit
|
|
|
|
})
|
2020-05-10 22:00:19 +00:00
|
|
|
|
rpcsrv: increase timeout in TestWSClientsLimit
Still not fast enough for connections to be alive for the default case
of 64+1 connections. Some of them are start to die after 5 seconds of
test:
```
2024-04-03T14:06:22.5504034Z === RUN TestWSClientsLimit
2024-04-03T14:06:22.5504142Z === RUN TestWSClientsLimit/default
2024-04-03T14:06:22.5504868Z logger.go:146: 2024-04-03T14:04:30.637Z
INFO initial gas supply is not set or wrong, setting default
value {"InitialGASSupply": "52000000"}
2024-04-03T14:06:22.5505730Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO P2PNotaryRequestPayloadPool size is not set or wrong,
setting default value {"P2PNotaryRequestPayloadPoolSize": 1000}
2024-04-03T14:06:22.5506373Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxBlockSize is not set or wrong, setting default
value {"MaxBlockSize": 262144}
2024-04-03T14:06:22.5507094Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxBlockSystemFee is not set or wrong, setting default
value {"MaxBlockSystemFee": 900000000000}
2024-04-03T14:06:22.5507843Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxTransactionsPerBlock is not set or wrong, using
default value {"MaxTransactionsPerBlock": 512}
2024-04-03T14:06:22.5508644Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxValidUntilBlockIncrement is not set or wrong, using
default value {"MaxValidUntilBlockIncrement": 5760}
2024-04-03T14:06:22.5509114Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO no storage version found! creating genesis block
2024-04-03T14:06:22.5509788Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO ExtensiblePoolSize is not set or wrong, using default
value {"ExtensiblePoolSize": 20}
2024-04-03T14:06:22.5510476Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO SessionPoolSize is not set or wrong, setting default
value {"SessionPoolSize": 20}
2024-04-03T14:06:22.5511258Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxIteratorResultItems is not set or wrong, setting
default value {"MaxIteratorResultItems": 100}
2024-04-03T14:06:22.5511951Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxFindResultItems is not set or wrong, setting
default value {"MaxFindResultItems": 100}
2024-04-03T14:06:22.5512598Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxNEP11Tokens is not set or wrong, setting default
value {"MaxNEP11Tokens": 100}
2024-04-03T14:06:22.5513316Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxRequestBodyBytes is not set or wong, setting
default value {"MaxRequestBodyBytes": 5242880}
2024-04-03T14:06:22.5514060Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxRequestHeaderBytes is not set or wong, setting
default value {"MaxRequestHeaderBytes": 1048576}
2024-04-03T14:06:22.5514755Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO MaxWebSocketClients is not set or wrong, setting
default value {"MaxWebSocketClients": 64}
2024-04-03T14:06:22.5515215Z logger.go:146: 2024-04-03T14:04:30
.637Z INFO starting rpc-server {"endpoint": "127.0.0.1:0"}
2024-04-03T14:06:22.5515874Z logger.go:146: 2024-04-03T14:04:31
.200Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5516442Z logger.go:146: 2024-04-03T14:04:31
.200Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5516973Z logger.go:146: 2024-04-03T14:04:31
.226Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5517502Z logger.go:146: 2024-04-03T14:04:31
.388Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5518027Z logger.go:146: 2024-04-03T14:04:31
.398Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5518551Z logger.go:146: 2024-04-03T14:04:31
.420Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5519082Z logger.go:146: 2024-04-03T14:04:31
.577Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5519606Z logger.go:146: 2024-04-03T14:04:31
.587Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5520133Z logger.go:146: 2024-04-03T14:04:31
.624Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5520850Z logger.go:146: 2024-04-03T14:04:31
.780Z INFO persisted to disk {"blocks": 0, "keys": 127,
"headerHeight": 0, "blockHeight": 0, "took": "121.8µs"}
2024-04-03T14:06:22.5521398Z logger.go:146: 2024-04-03T14:04:31
.780Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5521925Z logger.go:146: 2024-04-03T14:04:31
.812Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5522452Z logger.go:146: 2024-04-03T14:04:31
.969Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5522975Z logger.go:146: 2024-04-03T14:04:32
.016Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5523507Z logger.go:146: 2024-04-03T14:04:32
.172Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5524033Z logger.go:146: 2024-04-03T14:04:32
.219Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5524555Z logger.go:146: 2024-04-03T14:04:32
.273Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5525081Z logger.go:146: 2024-04-03T14:04:32
.376Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5525604Z logger.go:146: 2024-04-03T14:04:32
.423Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5526131Z logger.go:146: 2024-04-03T14:04:32
.563Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5526691Z logger.go:146: 2024-04-03T14:04:32
.627Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5527254Z logger.go:146: 2024-04-03T14:04:32
.767Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5527777Z logger.go:146: 2024-04-03T14:04:32
.830Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5528304Z logger.go:146: 2024-04-03T14:04:32
.955Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5528824Z logger.go:146: 2024-04-03T14:04:33
.033Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5529352Z logger.go:146: 2024-04-03T14:04:33
.158Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5529871Z logger.go:146: 2024-04-03T14:04:33
.237Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5530395Z logger.go:146: 2024-04-03T14:04:33
.322Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5530921Z logger.go:146: 2024-04-03T14:04:33
.348Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5531472Z logger.go:146: 2024-04-03T14:04:33
.444Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5532031Z logger.go:146: 2024-04-03T14:04:33
.535Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5532555Z logger.go:146: 2024-04-03T14:04:33
.645Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5533084Z logger.go:146: 2024-04-03T14:04:33
.724Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5533604Z logger.go:146: 2024-04-03T14:04:33
.848Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5534132Z logger.go:146: 2024-04-03T14:04:33
.926Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5534662Z logger.go:146: 2024-04-03T14:04:34
.036Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5535190Z logger.go:146: 2024-04-03T14:04:34
.130Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5535712Z logger.go:146: 2024-04-03T14:04:34
.224Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5536231Z logger.go:146: 2024-04-03T14:04:34
.318Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5536758Z logger.go:146: 2024-04-03T14:04:34
.413Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5537277Z logger.go:146: 2024-04-03T14:04:34
.423Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5537805Z logger.go:146: 2024-04-03T14:04:34
.423Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5538329Z logger.go:146: 2024-04-03T14:04:34
.523Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5538855Z logger.go:146: 2024-04-03T14:04:34
.602Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5539382Z logger.go:146: 2024-04-03T14:04:34
.612Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5539908Z logger.go:146: 2024-04-03T14:04:34
.712Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5540431Z logger.go:146: 2024-04-03T14:04:34
.805Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5540956Z logger.go:146: 2024-04-03T14:04:34
.915Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5541515Z logger.go:146: 2024-04-03T14:04:34
.993Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5542070Z logger.go:146: 2024-04-03T14:04:35
.118Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5542599Z logger.go:146: 2024-04-03T14:04:35
.181Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5543125Z logger.go:146: 2024-04-03T14:04:35
.307Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5543650Z logger.go:146: 2024-04-03T14:04:35
.385Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5544169Z logger.go:146: 2024-04-03T14:04:35
.426Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5544695Z logger.go:146: 2024-04-03T14:04:35
.510Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5545262Z logger.go:146: 2024-04-03T14:04:35
.589Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5545839Z logger.go:146: 2024-04-03T14:04:35
.698Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5546421Z logger.go:146: 2024-04-03T14:04:35
.777Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5547045Z logger.go:146: 2024-04-03T14:04:35
.902Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5547593Z logger.go:146: 2024-04-03T14:04:35
.980Z DEBUG processing rpc request {"method": "getversion",
"params": "[]"}
2024-04-03T14:06:22.5551421Z subscription_test.go:620:
2024-04-03T14:06:22.5551977Z Error Trace:
D:/a/neo-go/neo-go/pkg/services/rpcsrv/subscription_test.go:620
2024-04-03T14:06:22.5552611Z
C:/hostedtoolcache/windows/go/1.22.1/x64/src/runtime/asm_amd64.s:1695
2024-04-03T14:06:22.5552821Z Error: Received
unexpected error:
2024-04-03T14:06:22.5553328Z read tcp 127.0
.0.1:51969->127.0.0.1:51909: i/o timeout
2024-04-03T14:06:22.5553535Z Test:
TestWSClientsLimit/default
2024-04-03T14:06:22.5553676Z subscription_test.go:620:
2024-04-03T14:06:22.5554223Z Error Trace:
D:/a/neo-go/neo-go/pkg/services/rpcsrv/subscription_test.go:620
2024-04-03T14:06:22.5554831Z
C:/hostedtoolcache/windows/go/1.22.1/x64/src/runtime/asm_amd64.s:1695
2024-04-03T14:06:22.5555036Z Error: Received
unexpected error:
2024-04-03T14:06:22.5555521Z read tcp 127.0
.0.1:51970->127.0.0.1:51909: i/o timeout
2024-04-03T14:06:22.5555723Z Test:
TestWSClientsLimit/default
2024-04-03T14:06:22.5555860Z subscription_test.go:620:
2024-04-03T14:06:22.5556336Z Error Trace:
D:/a/neo-go/neo-go/pkg/services/rpcsrv/subscription_test.go:620
2024-04-03T14:06:22.5556953Z
C:/hostedtoolcache/windows/go/1.22.1/x64/src/runtime/asm_amd64.s:1695
2024-04-03T14:06:22.5557160Z Error: Received
unexpected error:
2024-04-03T14:06:22.5557636Z read tcp 127.0
.0.1:51973->127.0.0.1:51909: i/o timeout
2024-04-03T14:06:22.5557831Z Test:
TestWSClientsLimit/default
2024-04-03T14:06:22.5557967Z subscription_test.go:620:
2024-04-03T14:06:22.5558437Z Error Trace:
D:/a/neo-go/neo-go/pkg/services/rpcsrv/subscription_test.go:620
2024-04-03T14:06:22.5559028Z
C:/hostedtoolcache/windows/go/1.22.1/x64/src/runtime/asm_amd64.s:1695
2024-04-03T14:06:22.5559229Z Error: Received
unexpected error:
2024-04-03T14:06:22.5559696Z read tcp 127.0
.0.1:51971->127.0.0.1:51909: i/o timeout
2024-04-03T14:06:22.5559891Z Test:
TestWSClientsLimit/default
2024-04-03T14:06:22.5560024Z subscription_test.go:620:
2024-04-03T14:06:22.5560490Z Error Trace:
D:/a/neo-go/neo-go/pkg/services/rpcsrv/subscription_test.go:620
2024-04-03T14:06:22.5561142Z
C:/hostedtoolcache/windows/go/1.22.1/x64/src/runtime/asm_amd64.s:1695
2024-04-03T14:06:22.5561371Z Error: Received
unexpected error:
2024-04-03T14:06:22.5561849Z read tcp 127.0
.0.1:51972->127.0.0.1:51909: i/o timeout
2024-04-03T14:06:22.5562043Z Test:
TestWSClientsLimit/default
2024-04-03T14:06:22.5562179Z subscription_test.go:630:
2024-04-03T14:06:22.5562638Z Error Trace:
D:/a/neo-go/neo-go/pkg/services/rpcsrv/subscription_test.go:630
2024-04-03T14:06:22.5562879Z Error: An error is
expected but got nil.
2024-04-03T14:06:22.5563073Z Test:
TestWSClientsLimit/default
2024-04-03T14:06:22.5563361Z Messages: The connection
beyond the limit should fail
2024-04-03T14:06:22.5563886Z logger.go:146: 2024-04-03T14:04:36
.481Z INFO shutting down RPC server {"endpoint": "127.0.0
.1:51908"}
```
Close #3379
Signed-off-by: Ekaterina Pavlova <ekt@morphbits.io>
2024-04-03 14:41:40 +00:00
|
|
|
dialer := websocket.Dialer{HandshakeTimeout: 10 * time.Second}
|
2022-11-23 09:19:49 +00:00
|
|
|
url := "ws" + strings.TrimPrefix(httpSrv.URL, "http") + "/ws"
|
|
|
|
wss := make([]*websocket.Conn, effectiveClients)
|
2024-04-02 12:13:13 +00:00
|
|
|
var wg sync.WaitGroup
|
|
|
|
|
|
|
|
// Dial effectiveClients connections in parallel
|
|
|
|
for i := 0; i < effectiveClients; i++ {
|
|
|
|
wg.Add(1)
|
|
|
|
j := i
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
ws, r, err := dialer.Dial(url, nil)
|
|
|
|
if r != nil {
|
|
|
|
defer r.Body.Close()
|
|
|
|
}
|
2022-11-23 09:19:49 +00:00
|
|
|
require.NoError(t, err)
|
2024-04-02 12:13:13 +00:00
|
|
|
wss[j] = ws
|
2022-11-23 09:19:49 +00:00
|
|
|
doSomeWSRequest(t, ws)
|
2024-04-02 12:13:13 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
// Attempt one more connection, which should fail
|
|
|
|
_, r, err := dialer.Dial(url, nil)
|
|
|
|
require.Error(t, err, "The connection beyond the limit should fail")
|
|
|
|
if r != nil {
|
|
|
|
r.Body.Close()
|
2022-11-23 09:19:49 +00:00
|
|
|
}
|
|
|
|
// Check connections are still alive (it actually is necessary to add
|
|
|
|
// some use of wss to keep connections alive).
|
2024-04-02 12:13:13 +00:00
|
|
|
for _, ws := range wss {
|
|
|
|
doSomeWSRequest(t, ws)
|
|
|
|
ws.Close()
|
2022-11-23 09:19:49 +00:00
|
|
|
}
|
|
|
|
})
|
2020-05-10 22:00:19 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-12 19:38:29 +00:00
|
|
|
|
|
|
|
// The purpose of this test is to overflow buffers on server side to
|
|
|
|
// receive a 'missed' event. But it's actually hard to tell when exactly
|
|
|
|
// that's going to happen because of network-level buffering, typical
|
|
|
|
// number seen in tests is around ~3500 events, but it's not reliable enough,
|
|
|
|
// thus this test is disabled.
|
2021-05-12 15:20:48 +00:00
|
|
|
func TestSubscriptionOverflow(t *testing.T) {
|
|
|
|
if !testOverflow {
|
|
|
|
return
|
|
|
|
}
|
2020-05-12 19:38:29 +00:00
|
|
|
const blockCnt = notificationBufSize * 5
|
|
|
|
var receivedMiss bool
|
|
|
|
|
2024-04-01 14:50:25 +00:00
|
|
|
chain, _, c, respMsgs := initCleanServerAndWSClient(t)
|
2020-05-12 19:38:29 +00:00
|
|
|
|
|
|
|
resp := callWSGetRaw(t, c, `{"jsonrpc": "2.0","method": "subscribe","params": ["block_added"],"id": 1}`, respMsgs)
|
|
|
|
require.Nil(t, resp.Error)
|
|
|
|
require.NotNil(t, resp.Result)
|
|
|
|
|
|
|
|
// Push a lot of new blocks, but don't read events for them.
|
|
|
|
for i := 0; i < blockCnt; i++ {
|
2020-08-20 15:47:14 +00:00
|
|
|
b := testchain.NewBlock(t, chain, 1, 0)
|
2020-05-12 19:38:29 +00:00
|
|
|
require.NoError(t, chain.AddBlock(b))
|
|
|
|
}
|
|
|
|
for i := 0; i < blockCnt; i++ {
|
|
|
|
resp := getNotification(t, respMsgs)
|
2022-07-22 16:09:29 +00:00
|
|
|
if resp.Event != neorpc.BlockEventID {
|
|
|
|
require.Equal(t, neorpc.MissedEventID, resp.Event)
|
2020-05-12 19:38:29 +00:00
|
|
|
receivedMiss = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
require.Equal(t, true, receivedMiss)
|
|
|
|
// `Missed` is the last event and there is nothing afterwards.
|
|
|
|
require.Equal(t, 0, len(respMsgs))
|
|
|
|
}
|
2023-12-25 11:14:44 +00:00
|
|
|
|
|
|
|
func TestFilteredSubscriptions_InvalidFilter(t *testing.T) {
|
|
|
|
var cases = map[string]struct {
|
|
|
|
params string
|
|
|
|
}{
|
|
|
|
"notification with long name": {
|
|
|
|
params: `["notification_from_execution", {"name":"notification_from_execution_with_long_name"}]`,
|
|
|
|
},
|
|
|
|
"execution with invalid vm state": {
|
|
|
|
params: `["transaction_executed", {"state":"NOTHALT"}]`,
|
|
|
|
},
|
|
|
|
}
|
2024-04-01 14:50:25 +00:00
|
|
|
_, _, c, respMsgs := initCleanServerAndWSClient(t)
|
2023-12-25 11:14:44 +00:00
|
|
|
|
|
|
|
for name, this := range cases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
resp := callWSGetRaw(t, c, fmt.Sprintf(`{"jsonrpc": "2.0","method": "subscribe","params": %s,"id": 1}`, this.params), respMsgs)
|
|
|
|
require.NotNil(t, resp.Error)
|
|
|
|
require.Nil(t, resp.Result)
|
|
|
|
require.Contains(t, resp.Error.Error(), neorpc.ErrInvalidSubscriptionFilter.Error())
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|