forked from TrueCloudLab/neoneo-go
1ac60ada19
Refs. #2379, but not completely solves it, one package seriously outweights others: ? github.com/nspcc-dev/neo-go/cli [no test files] ok github.com/nspcc-dev/neo-go/cli/app 0.036s coverage: 100.0% of statements ok github.com/nspcc-dev/neo-go/cli/cmdargs 0.011s coverage: 60.8% of statements ok github.com/nspcc-dev/neo-go/cli/flags 0.009s coverage: 97.7% of statements ? github.com/nspcc-dev/neo-go/cli/input [no test files] ok github.com/nspcc-dev/neo-go/cli/options 0.033s coverage: 50.0% of statements ? github.com/nspcc-dev/neo-go/cli/paramcontext [no test files] ok github.com/nspcc-dev/neo-go/cli/query 2.155s coverage: 45.3% of statements ok github.com/nspcc-dev/neo-go/cli/server 1.373s coverage: 67.8% of statements ok github.com/nspcc-dev/neo-go/cli/smartcontract 8.819s coverage: 94.3% of statements ok github.com/nspcc-dev/neo-go/cli/util 0.006s coverage: 10.9% of statements ? github.com/nspcc-dev/neo-go/cli/vm [no test files] ok github.com/nspcc-dev/neo-go/cli/wallet 72.103s coverage: 88.2% of statements Still a nice thing to have.
131 lines
4.2 KiB
Go
131 lines
4.2 KiB
Go
package server_test
|
|
|
|
import (
|
|
"errors"
|
|
"io"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/nspcc-dev/neo-go/cli/server"
|
|
"github.com/nspcc-dev/neo-go/internal/testcli"
|
|
"github.com/nspcc-dev/neo-go/pkg/config"
|
|
"github.com/stretchr/testify/require"
|
|
"gopkg.in/yaml.v3"
|
|
)
|
|
|
|
func TestServerStart(t *testing.T) {
|
|
tmpDir := t.TempDir()
|
|
goodCfg, err := config.LoadFile(filepath.Join("..", "..", "config", "protocol.unit_testnet.yml"))
|
|
require.NoError(t, err, "could not load config")
|
|
ptr := &goodCfg
|
|
saveCfg := func(t *testing.T, f func(cfg *config.Config)) string {
|
|
cfg := *ptr
|
|
chainPath := filepath.Join(t.TempDir(), "neogotestchain")
|
|
cfg.ApplicationConfiguration.DBConfiguration.Type = "leveldb"
|
|
cfg.ApplicationConfiguration.DBConfiguration.LevelDBOptions.DataDirectoryPath = chainPath
|
|
f(&cfg)
|
|
out, err := yaml.Marshal(cfg)
|
|
require.NoError(t, err)
|
|
|
|
cfgPath := filepath.Join(tmpDir, "protocol.unit_testnet.yml")
|
|
require.NoError(t, os.WriteFile(cfgPath, out, os.ModePerm))
|
|
t.Cleanup(func() {
|
|
require.NoError(t, os.Remove(cfgPath))
|
|
})
|
|
return cfgPath
|
|
}
|
|
|
|
baseCmd := []string{"neo-go", "node", "--unittest", "--config-path", tmpDir}
|
|
e := testcli.NewExecutor(t, false)
|
|
|
|
t.Run("invalid config path", func(t *testing.T) {
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
t.Run("bad logger config", func(t *testing.T) {
|
|
badConfigDir := t.TempDir()
|
|
logfile := filepath.Join(badConfigDir, "logdir")
|
|
require.NoError(t, os.WriteFile(logfile, []byte{1, 2, 3}, os.ModePerm))
|
|
saveCfg(t, func(cfg *config.Config) {
|
|
cfg.ApplicationConfiguration.LogPath = filepath.Join(logfile, "file.log")
|
|
})
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
t.Run("invalid storage", func(t *testing.T) {
|
|
saveCfg(t, func(cfg *config.Config) {
|
|
cfg.ApplicationConfiguration.DBConfiguration.Type = ""
|
|
})
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
t.Run("stateroot service is on && StateRootInHeader=true", func(t *testing.T) {
|
|
saveCfg(t, func(cfg *config.Config) {
|
|
cfg.ApplicationConfiguration.StateRoot.Enabled = true
|
|
cfg.ProtocolConfiguration.StateRootInHeader = true
|
|
})
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
t.Run("invalid Oracle config", func(t *testing.T) {
|
|
saveCfg(t, func(cfg *config.Config) {
|
|
cfg.ApplicationConfiguration.Oracle.Enabled = true
|
|
cfg.ApplicationConfiguration.Oracle.UnlockWallet.Path = "bad_orc_wallet.json"
|
|
})
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
t.Run("invalid consensus config", func(t *testing.T) {
|
|
saveCfg(t, func(cfg *config.Config) {
|
|
cfg.ApplicationConfiguration.UnlockWallet.Path = "bad_consensus_wallet.json"
|
|
})
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
t.Run("invalid Notary config", func(t *testing.T) {
|
|
t.Run("malformed config", func(t *testing.T) {
|
|
saveCfg(t, func(cfg *config.Config) {
|
|
cfg.ProtocolConfiguration.P2PSigExtensions = false
|
|
cfg.ApplicationConfiguration.P2PNotary.Enabled = true
|
|
})
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
t.Run("invalid wallet", func(t *testing.T) {
|
|
saveCfg(t, func(cfg *config.Config) {
|
|
cfg.ProtocolConfiguration.P2PSigExtensions = true
|
|
cfg.ApplicationConfiguration.P2PNotary.Enabled = true
|
|
cfg.ApplicationConfiguration.P2PNotary.UnlockWallet.Path = "bad_notary_wallet.json"
|
|
})
|
|
e.RunWithError(t, baseCmd...)
|
|
})
|
|
})
|
|
// We can't properly shutdown server on windows and release the resources.
|
|
// Also, windows doesn't support SIGHUP and SIGINT.
|
|
if runtime.GOOS != "windows" {
|
|
saveCfg(t, func(cfg *config.Config) {})
|
|
t.Run("excessive parameters", func(t *testing.T) {
|
|
e.RunWithError(t, append(baseCmd, "something")...)
|
|
})
|
|
t.Run("good", func(t *testing.T) {
|
|
go func() {
|
|
e.Run(t, baseCmd...)
|
|
}()
|
|
|
|
var line string
|
|
require.Eventually(t, func() bool {
|
|
line, err = e.Out.ReadString('\n')
|
|
if err != nil && !errors.Is(err, io.EOF) {
|
|
t.Fatalf("unexpected error while reading CLI output: %s", err)
|
|
}
|
|
return err == nil
|
|
}, 2*time.Second, 100*time.Millisecond)
|
|
lines := strings.Split(server.Logo(), "\n")
|
|
for _, expected := range lines {
|
|
// It should be regexp, so escape all backslashes.
|
|
expected = strings.ReplaceAll(expected, `\`, `\\`)
|
|
e.CheckLine(t, line, expected)
|
|
line = e.GetNextLine(t)
|
|
}
|
|
e.CheckNextLine(t, "")
|
|
e.CheckEOF(t)
|
|
})
|
|
}
|
|
}
|