1476 lines
49 KiB
Rust
1476 lines
49 KiB
Rust
//! Acceptance test: runs zebrad as a subprocess and asserts its
|
|
//! output for given argument combinations matches what is expected.
|
|
//!
|
|
//! ## Note on port conflict
|
|
//!
|
|
//! If the test child has a cache or port conflict with another test, or a
|
|
//! running zebrad or zcashd, then it will panic. But the acceptance tests
|
|
//! expect it to run until it is killed.
|
|
//!
|
|
//! If these conflicts cause test failures:
|
|
//! - run the tests in an isolated environment,
|
|
//! - run zebrad on a custom cache path and port,
|
|
//! - run zcashd on a custom port.
|
|
//!
|
|
//! ## Failures due to Configured Network Interfaces or Network Connectivity
|
|
//!
|
|
//! If your test environment does not have any IPv6 interfaces configured, skip IPv6 tests
|
|
//! by setting the `ZEBRA_SKIP_IPV6_TESTS` environmental variable.
|
|
//!
|
|
//! If it does not have any IPv4 interfaces, IPv4 localhost is not on `127.0.0.1`,
|
|
//! or you have poor network connectivity,
|
|
//! skip all the network tests by setting the `ZEBRA_SKIP_NETWORK_TESTS` environmental variable.
|
|
|
|
use std::{collections::HashSet, convert::TryInto, env, path::PathBuf, time::Duration};
|
|
|
|
use color_eyre::{
|
|
eyre::{Result, WrapErr},
|
|
Help,
|
|
};
|
|
|
|
use zebra_chain::{
|
|
block::Height,
|
|
parameters::Network::{self, *},
|
|
};
|
|
use zebra_network::constants::PORT_IN_USE_ERROR;
|
|
use zebra_state::constants::LOCK_FILE_ERROR;
|
|
|
|
use zebra_test::{
|
|
args,
|
|
command::{ContextFrom, NO_MATCHES_REGEX_ITER},
|
|
net::random_known_port,
|
|
prelude::*,
|
|
};
|
|
|
|
mod common;
|
|
|
|
use common::{
|
|
check::{is_zebrad_version, EphemeralCheck, EphemeralConfig},
|
|
config::{default_test_config, persistent_test_config, testdir},
|
|
launch::{ZebradTestDirExt, BETWEEN_NODES_DELAY, LAUNCH_DELAY, LIGHTWALLETD_DELAY},
|
|
lightwalletd::{
|
|
random_known_rpc_port_config, zebra_skip_lightwalletd_tests, LightWalletdTestDirExt,
|
|
},
|
|
sync::{
|
|
create_cached_database_height, sync_until, MempoolBehavior, LARGE_CHECKPOINT_TEST_HEIGHT,
|
|
LARGE_CHECKPOINT_TIMEOUT, MEDIUM_CHECKPOINT_TEST_HEIGHT, STOP_AT_HEIGHT_REGEX,
|
|
STOP_ON_LOAD_TIMEOUT, SYNC_FINISHED_REGEX, TINY_CHECKPOINT_TEST_HEIGHT,
|
|
TINY_CHECKPOINT_TIMEOUT,
|
|
},
|
|
};
|
|
|
|
#[test]
|
|
fn generate_no_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let child = testdir()?
|
|
.with_config(&mut default_test_config()?)?
|
|
.spawn_child(args!["generate"])?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_success()?;
|
|
|
|
// First line
|
|
output.stdout_line_contains("# Default configuration for zebrad")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn generate_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?;
|
|
let testdir = &testdir;
|
|
|
|
// unexpected free argument `argument`
|
|
let child = testdir.spawn_child(args!["generate", "argument"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
// unrecognized option `-f`
|
|
let child = testdir.spawn_child(args!["generate", "-f"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
// missing argument to option `-o`
|
|
let child = testdir.spawn_child(args!["generate", "-o"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
// Add a config file name to tempdir path
|
|
let generated_config_path = testdir.path().join("zebrad.toml");
|
|
|
|
// Valid
|
|
let child =
|
|
testdir.spawn_child(args!["generate", "-o": generated_config_path.to_str().unwrap()])?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_success()?;
|
|
|
|
assert_with_context!(
|
|
testdir.path().exists(),
|
|
&output,
|
|
"test temp directory not found"
|
|
);
|
|
assert_with_context!(
|
|
generated_config_path.exists(),
|
|
&output,
|
|
"generated config file not found"
|
|
);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn help_no_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?.with_config(&mut default_test_config()?)?;
|
|
|
|
let child = testdir.spawn_child(args!["help"])?;
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_success()?;
|
|
|
|
// The first line should have the version
|
|
output.any_output_line(
|
|
is_zebrad_version,
|
|
&output.output.stdout,
|
|
"stdout",
|
|
"a valid zebrad semantic version",
|
|
)?;
|
|
|
|
// Make sure we are in help by looking usage string
|
|
output.stdout_line_contains("USAGE:")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn help_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?;
|
|
let testdir = &testdir;
|
|
|
|
// The subcommand "argument" wasn't recognized.
|
|
let child = testdir.spawn_child(args!["help", "argument"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
// option `-f` does not accept an argument
|
|
let child = testdir.spawn_child(args!["help", "-f"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn start_no_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
// start caches state, so run one of the start tests with persistent state
|
|
let testdir = testdir()?.with_config(&mut persistent_test_config()?)?;
|
|
|
|
let mut child = testdir.spawn_child(args!["-v", "start"])?;
|
|
|
|
// Run the program and kill it after a few seconds
|
|
std::thread::sleep(LAUNCH_DELAY);
|
|
child.kill()?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_failure()?;
|
|
|
|
output.stdout_line_contains("Starting zebrad")?;
|
|
|
|
// Make sure the command passed the legacy chain check
|
|
output.stdout_line_contains("starting legacy chain check")?;
|
|
output.stdout_line_contains("no legacy chain found")?;
|
|
|
|
// Make sure the command was killed
|
|
output.assert_was_killed()?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn start_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?.with_config(&mut default_test_config()?)?;
|
|
let testdir = &testdir;
|
|
|
|
let mut child = testdir.spawn_child(args!["start"])?;
|
|
// Run the program and kill it after a few seconds
|
|
std::thread::sleep(LAUNCH_DELAY);
|
|
child.kill()?;
|
|
let output = child.wait_with_output()?;
|
|
|
|
// Make sure the command was killed
|
|
output.assert_was_killed()?;
|
|
|
|
output.assert_failure()?;
|
|
|
|
// unrecognized option `-f`
|
|
let child = testdir.spawn_child(args!["start", "-f"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn persistent_mode() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?.with_config(&mut persistent_test_config()?)?;
|
|
let testdir = &testdir;
|
|
|
|
let mut child = testdir.spawn_child(args!["-v", "start"])?;
|
|
|
|
// Run the program and kill it after a few seconds
|
|
std::thread::sleep(LAUNCH_DELAY);
|
|
child.kill()?;
|
|
let output = child.wait_with_output()?;
|
|
|
|
// Make sure the command was killed
|
|
output.assert_was_killed()?;
|
|
|
|
let cache_dir = testdir.path().join("state");
|
|
assert_with_context!(
|
|
cache_dir.read_dir()?.count() > 0,
|
|
&output,
|
|
"state directory empty despite persistent state config"
|
|
);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn ephemeral_existing_directory() -> Result<()> {
|
|
ephemeral(EphemeralConfig::Default, EphemeralCheck::ExistingDirectory)
|
|
}
|
|
|
|
#[test]
|
|
fn ephemeral_missing_directory() -> Result<()> {
|
|
ephemeral(EphemeralConfig::Default, EphemeralCheck::MissingDirectory)
|
|
}
|
|
|
|
#[test]
|
|
fn misconfigured_ephemeral_existing_directory() -> Result<()> {
|
|
ephemeral(
|
|
EphemeralConfig::MisconfiguredCacheDir,
|
|
EphemeralCheck::ExistingDirectory,
|
|
)
|
|
}
|
|
|
|
#[test]
|
|
fn misconfigured_ephemeral_missing_directory() -> Result<()> {
|
|
ephemeral(
|
|
EphemeralConfig::MisconfiguredCacheDir,
|
|
EphemeralCheck::MissingDirectory,
|
|
)
|
|
}
|
|
|
|
fn ephemeral(cache_dir_config: EphemeralConfig, cache_dir_check: EphemeralCheck) -> Result<()> {
|
|
use std::fs;
|
|
use std::io::ErrorKind;
|
|
|
|
zebra_test::init();
|
|
|
|
let mut config = default_test_config()?;
|
|
let run_dir = testdir()?;
|
|
|
|
let ignored_cache_dir = run_dir.path().join("state");
|
|
if cache_dir_config == EphemeralConfig::MisconfiguredCacheDir {
|
|
// Write a configuration that sets both the cache_dir and ephemeral options
|
|
config.state.cache_dir = ignored_cache_dir.clone();
|
|
}
|
|
if cache_dir_check == EphemeralCheck::ExistingDirectory {
|
|
// We set the cache_dir config to a newly created empty temp directory,
|
|
// then make sure that it is empty after the test
|
|
fs::create_dir(&ignored_cache_dir)?;
|
|
}
|
|
|
|
let mut child = run_dir
|
|
.path()
|
|
.with_config(&mut config)?
|
|
.spawn_child(args!["start"])?;
|
|
// Run the program and kill it after a few seconds
|
|
std::thread::sleep(LAUNCH_DELAY);
|
|
child.kill()?;
|
|
let output = child.wait_with_output()?;
|
|
|
|
// Make sure the command was killed
|
|
output.assert_was_killed()?;
|
|
|
|
let expected_run_dir_file_names = match cache_dir_check {
|
|
// we created the state directory, so it should still exist
|
|
EphemeralCheck::ExistingDirectory => {
|
|
assert_with_context!(
|
|
ignored_cache_dir
|
|
.read_dir()
|
|
.expect("ignored_cache_dir should still exist")
|
|
.count()
|
|
== 0,
|
|
&output,
|
|
"ignored_cache_dir not empty for ephemeral {:?} {:?}: {:?}",
|
|
cache_dir_config,
|
|
cache_dir_check,
|
|
ignored_cache_dir.read_dir().unwrap().collect::<Vec<_>>()
|
|
);
|
|
|
|
["state", "zebrad.toml"].iter()
|
|
}
|
|
|
|
// we didn't create the state directory, so it should not exist
|
|
EphemeralCheck::MissingDirectory => {
|
|
assert_with_context!(
|
|
ignored_cache_dir
|
|
.read_dir()
|
|
.expect_err("ignored_cache_dir should not exist")
|
|
.kind()
|
|
== ErrorKind::NotFound,
|
|
&output,
|
|
"unexpected creation of ignored_cache_dir for ephemeral {:?} {:?}: the cache dir exists and contains these files: {:?}",
|
|
cache_dir_config,
|
|
cache_dir_check,
|
|
ignored_cache_dir.read_dir().unwrap().collect::<Vec<_>>()
|
|
);
|
|
|
|
["zebrad.toml"].iter()
|
|
}
|
|
};
|
|
|
|
let expected_run_dir_file_names = expected_run_dir_file_names.map(Into::into).collect();
|
|
let run_dir_file_names = run_dir
|
|
.path()
|
|
.read_dir()
|
|
.expect("run_dir should still exist")
|
|
.map(|dir_entry| dir_entry.expect("run_dir is readable").file_name())
|
|
// ignore directory list order, because it can vary based on the OS and filesystem
|
|
.collect::<HashSet<_>>();
|
|
|
|
assert_with_context!(
|
|
run_dir_file_names == expected_run_dir_file_names,
|
|
&output,
|
|
"run_dir not empty for ephemeral {:?} {:?}: expected {:?}, actual: {:?}",
|
|
cache_dir_config,
|
|
cache_dir_check,
|
|
expected_run_dir_file_names,
|
|
run_dir_file_names
|
|
);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn app_no_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?.with_config(&mut default_test_config()?)?;
|
|
|
|
let child = testdir.spawn_child(args![])?;
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_success()?;
|
|
|
|
output.stdout_line_contains("USAGE:")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn version_no_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?.with_config(&mut default_test_config()?)?;
|
|
|
|
let child = testdir.spawn_child(args!["version"])?;
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_success()?;
|
|
|
|
// The output should only contain the version
|
|
output.output_check(
|
|
is_zebrad_version,
|
|
&output.output.stdout,
|
|
"stdout",
|
|
"a valid zebrad semantic version",
|
|
)?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn version_args() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?.with_config(&mut default_test_config()?)?;
|
|
let testdir = &testdir;
|
|
|
|
// unexpected free argument `argument`
|
|
let child = testdir.spawn_child(args!["version", "argument"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
// unrecognized option `-f`
|
|
let child = testdir.spawn_child(args!["version", "-f"])?;
|
|
let output = child.wait_with_output()?;
|
|
output.assert_failure()?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn valid_generated_config_test() -> Result<()> {
|
|
// Unlike the other tests, these tests can not be run in parallel, because
|
|
// they use the generated config. So parallel execution can cause port and
|
|
// cache conflicts.
|
|
valid_generated_config("start", "Starting zebrad")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn valid_generated_config(command: &str, expect_stdout_line_contains: &str) -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
let testdir = testdir()?;
|
|
let testdir = &testdir;
|
|
|
|
// Add a config file name to tempdir path
|
|
let generated_config_path = testdir.path().join("zebrad.toml");
|
|
|
|
// Generate configuration in temp dir path
|
|
let child =
|
|
testdir.spawn_child(args!["generate", "-o": generated_config_path.to_str().unwrap()])?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_success()?;
|
|
|
|
assert_with_context!(
|
|
generated_config_path.exists(),
|
|
&output,
|
|
"generated config file not found"
|
|
);
|
|
|
|
// Run command using temp dir and kill it after a few seconds
|
|
let mut child = testdir.spawn_child(args![command])?;
|
|
std::thread::sleep(LAUNCH_DELAY);
|
|
child.kill()?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_failure()?;
|
|
|
|
output.stdout_line_contains(expect_stdout_line_contains)?;
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
output.assert_was_killed().wrap_err("Possible port or cache conflict. Are there other acceptance test, zebrad, or zcashd processes running?")?;
|
|
|
|
assert_with_context!(
|
|
testdir.path().exists(),
|
|
&output,
|
|
"test temp directory not found"
|
|
);
|
|
assert_with_context!(
|
|
generated_config_path.exists(),
|
|
&output,
|
|
"generated config file not found"
|
|
);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Test if `zebrad` can sync the first checkpoint on mainnet.
|
|
///
|
|
/// The first checkpoint contains a single genesis block.
|
|
#[test]
|
|
fn sync_one_checkpoint_mainnet() -> Result<()> {
|
|
sync_until(
|
|
TINY_CHECKPOINT_TEST_HEIGHT,
|
|
Mainnet,
|
|
STOP_AT_HEIGHT_REGEX,
|
|
TINY_CHECKPOINT_TIMEOUT,
|
|
None,
|
|
MempoolBehavior::ShouldNotActivate,
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
true,
|
|
)
|
|
.map(|_tempdir| ())
|
|
}
|
|
|
|
/// Test if `zebrad` can sync the first checkpoint on testnet.
|
|
///
|
|
/// The first checkpoint contains a single genesis block.
|
|
#[test]
|
|
fn sync_one_checkpoint_testnet() -> Result<()> {
|
|
sync_until(
|
|
TINY_CHECKPOINT_TEST_HEIGHT,
|
|
Testnet,
|
|
STOP_AT_HEIGHT_REGEX,
|
|
TINY_CHECKPOINT_TIMEOUT,
|
|
None,
|
|
MempoolBehavior::ShouldNotActivate,
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
true,
|
|
)
|
|
.map(|_tempdir| ())
|
|
}
|
|
|
|
/// Test if `zebrad` can sync the first checkpoint, restart, and stop on load.
|
|
#[test]
|
|
fn restart_stop_at_height() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
restart_stop_at_height_for_network(Network::Mainnet, TINY_CHECKPOINT_TEST_HEIGHT)?;
|
|
restart_stop_at_height_for_network(Network::Testnet, TINY_CHECKPOINT_TEST_HEIGHT)?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn restart_stop_at_height_for_network(network: Network, height: Height) -> Result<()> {
|
|
let reuse_tempdir = sync_until(
|
|
height,
|
|
network,
|
|
STOP_AT_HEIGHT_REGEX,
|
|
TINY_CHECKPOINT_TIMEOUT,
|
|
None,
|
|
MempoolBehavior::ShouldNotActivate,
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
true,
|
|
)?;
|
|
// if stopping corrupts the rocksdb database, zebrad might hang or crash here
|
|
// if stopping does not write the rocksdb database to disk, Zebra will
|
|
// sync, rather than stopping immediately at the configured height
|
|
sync_until(
|
|
height,
|
|
network,
|
|
"state is already at the configured height",
|
|
STOP_ON_LOAD_TIMEOUT,
|
|
reuse_tempdir,
|
|
MempoolBehavior::ShouldNotActivate,
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
false,
|
|
)?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Test if `zebrad` can activate the mempool on mainnet.
|
|
/// Debug activation happens after committing the genesis block.
|
|
#[test]
|
|
fn activate_mempool_mainnet() -> Result<()> {
|
|
sync_until(
|
|
Height(TINY_CHECKPOINT_TEST_HEIGHT.0 + 1),
|
|
Mainnet,
|
|
STOP_AT_HEIGHT_REGEX,
|
|
TINY_CHECKPOINT_TIMEOUT,
|
|
None,
|
|
MempoolBehavior::ForceActivationAt(TINY_CHECKPOINT_TEST_HEIGHT),
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
true,
|
|
)
|
|
.map(|_tempdir| ())
|
|
}
|
|
|
|
/// Test if `zebrad` can sync some larger checkpoints on mainnet.
|
|
///
|
|
/// This test might fail or timeout on slow or unreliable networks,
|
|
/// so we don't run it by default. It also takes a lot longer than
|
|
/// our 10 second target time for default tests.
|
|
#[test]
|
|
#[ignore]
|
|
fn sync_large_checkpoints_mainnet() -> Result<()> {
|
|
let reuse_tempdir = sync_until(
|
|
LARGE_CHECKPOINT_TEST_HEIGHT,
|
|
Mainnet,
|
|
STOP_AT_HEIGHT_REGEX,
|
|
LARGE_CHECKPOINT_TIMEOUT,
|
|
None,
|
|
MempoolBehavior::ShouldNotActivate,
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
true,
|
|
)?;
|
|
// if this sync fails, see the failure notes in `restart_stop_at_height`
|
|
sync_until(
|
|
(LARGE_CHECKPOINT_TEST_HEIGHT - 1).unwrap(),
|
|
Mainnet,
|
|
"previous state height is greater than the stop height",
|
|
STOP_ON_LOAD_TIMEOUT,
|
|
reuse_tempdir,
|
|
MempoolBehavior::ShouldNotActivate,
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
false,
|
|
)?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
// TODO: We had `sync_large_checkpoints_testnet` and `sync_large_checkpoints_mempool_testnet`,
|
|
// but they were removed because the testnet is unreliable (#1222).
|
|
// We should re-add them after we have more testnet instances (#1791).
|
|
|
|
/// Test if `zebrad` can run side by side with the mempool.
|
|
/// This is done by running the mempool and syncing some checkpoints.
|
|
#[test]
|
|
#[ignore]
|
|
fn sync_large_checkpoints_mempool_mainnet() -> Result<()> {
|
|
sync_until(
|
|
MEDIUM_CHECKPOINT_TEST_HEIGHT,
|
|
Mainnet,
|
|
STOP_AT_HEIGHT_REGEX,
|
|
LARGE_CHECKPOINT_TIMEOUT,
|
|
None,
|
|
MempoolBehavior::ForceActivationAt(TINY_CHECKPOINT_TEST_HEIGHT),
|
|
// checkpoint sync is irrelevant here - all tested checkpoints are mandatory
|
|
true,
|
|
true,
|
|
)
|
|
.map(|_tempdir| ())
|
|
}
|
|
|
|
/// Test if `zebrad` can fully sync the chain on mainnet.
|
|
///
|
|
/// This test takes a long time to run, so we don't run it by default. This test is only executed
|
|
/// if there is an environment variable named `FULL_SYNC_MAINNET_TIMEOUT_MINUTES` set with the number
|
|
/// of minutes to wait for synchronization to complete before considering that the test failed.
|
|
#[test]
|
|
#[ignore]
|
|
fn full_sync_mainnet() {
|
|
// TODO: add "ZEBRA" at the start of this env var, to avoid clashes
|
|
full_sync_test(Mainnet, "FULL_SYNC_MAINNET_TIMEOUT_MINUTES").expect("unexpected test failure");
|
|
}
|
|
|
|
/// Test if `zebrad` can fully sync the chain on testnet.
|
|
///
|
|
/// This test takes a long time to run, so we don't run it by default. This test is only executed
|
|
/// if there is an environment variable named `FULL_SYNC_TESTNET_TIMEOUT_MINUTES` set with the number
|
|
/// of minutes to wait for synchronization to complete before considering that the test failed.
|
|
#[test]
|
|
#[ignore]
|
|
fn full_sync_testnet() {
|
|
// TODO: add "ZEBRA" at the start of this env var, to avoid clashes
|
|
full_sync_test(Testnet, "FULL_SYNC_TESTNET_TIMEOUT_MINUTES").expect("unexpected test failure");
|
|
}
|
|
|
|
/// Sync `network` until the chain tip is reached, or a timeout elapses.
|
|
///
|
|
/// The timeout is specified using an environment variable, with the name configured by the
|
|
/// `timeout_argument_name` parameter. The value of the environment variable must the number of
|
|
/// minutes specified as an integer.
|
|
fn full_sync_test(network: Network, timeout_argument_name: &str) -> Result<()> {
|
|
let timeout_argument: Option<u64> = env::var(timeout_argument_name)
|
|
.ok()
|
|
.and_then(|timeout_string| timeout_string.parse().ok());
|
|
|
|
if let Some(timeout_minutes) = timeout_argument {
|
|
sync_until(
|
|
Height::MAX,
|
|
network,
|
|
SYNC_FINISHED_REGEX,
|
|
Duration::from_secs(60 * timeout_minutes),
|
|
None,
|
|
MempoolBehavior::ShouldAutomaticallyActivate,
|
|
// Use checkpoints to increase full sync performance, and test default Zebra behaviour.
|
|
// (After the changes to the default config in #2368.)
|
|
//
|
|
// TODO: if full validation performance improves, do another test with checkpoint_sync off
|
|
true,
|
|
true,
|
|
)?;
|
|
} else {
|
|
tracing::info!(
|
|
?network,
|
|
"skipped full sync test, \
|
|
set the {:?} environmental variable to run the test",
|
|
timeout_argument_name,
|
|
);
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn create_cached_database(network: Network) -> Result<()> {
|
|
let height = network.mandatory_checkpoint_height();
|
|
let checkpoint_stop_regex = format!("{}.*CommitFinalized request", STOP_AT_HEIGHT_REGEX);
|
|
|
|
create_cached_database_height(
|
|
network,
|
|
height,
|
|
true,
|
|
// Use checkpoints to increase sync performance while caching the database
|
|
true,
|
|
// Check that we're still using checkpoints when we finish the cached sync
|
|
&checkpoint_stop_regex,
|
|
)
|
|
}
|
|
|
|
fn sync_past_mandatory_checkpoint(network: Network) -> Result<()> {
|
|
let height = network.mandatory_checkpoint_height() + 1200;
|
|
let full_validation_stop_regex =
|
|
format!("{}.*best non-finalized chain root", STOP_AT_HEIGHT_REGEX);
|
|
|
|
create_cached_database_height(
|
|
network,
|
|
height.unwrap(),
|
|
false,
|
|
// Test full validation by turning checkpoints off
|
|
false,
|
|
&full_validation_stop_regex,
|
|
)
|
|
}
|
|
|
|
// These tests are ignored because they're too long running to run during our
|
|
// traditional CI, and they depend on persistent state that cannot be made
|
|
// available in github actions or google cloud build. Instead we run these tests
|
|
// directly in a vm we spin up on google compute engine, where we can mount
|
|
// drives populated by the first two tests, snapshot those drives, and then use
|
|
// those to more quickly run the second two tests.
|
|
|
|
/// Sync up to the mandatory checkpoint height on mainnet and stop.
|
|
#[allow(dead_code)]
|
|
#[cfg_attr(feature = "test_sync_to_mandatory_checkpoint_mainnet", test)]
|
|
fn sync_to_mandatory_checkpoint_mainnet() {
|
|
zebra_test::init();
|
|
let network = Mainnet;
|
|
create_cached_database(network).unwrap();
|
|
}
|
|
|
|
/// Sync to the mandatory checkpoint height testnet and stop.
|
|
#[allow(dead_code)]
|
|
#[cfg_attr(feature = "test_sync_to_mandatory_checkpoint_testnet", test)]
|
|
fn sync_to_mandatory_checkpoint_testnet() {
|
|
zebra_test::init();
|
|
let network = Testnet;
|
|
create_cached_database(network).unwrap();
|
|
}
|
|
|
|
/// Test syncing 1200 blocks (3 checkpoints) past the mandatory checkpoint on mainnet.
|
|
///
|
|
/// This assumes that the config'd state is already synced at or near the mandatory checkpoint
|
|
/// activation on mainnet. If the state has already synced past the mandatory checkpoint
|
|
/// activation by 1200 blocks, it will fail.
|
|
#[allow(dead_code)]
|
|
#[cfg_attr(feature = "test_sync_past_mandatory_checkpoint_mainnet", test)]
|
|
fn sync_past_mandatory_checkpoint_mainnet() {
|
|
zebra_test::init();
|
|
let network = Mainnet;
|
|
sync_past_mandatory_checkpoint(network).unwrap();
|
|
}
|
|
|
|
/// Test syncing 1200 blocks (3 checkpoints) past the mandatory checkpoint on testnet.
|
|
///
|
|
/// This assumes that the config'd state is already synced at or near the mandatory checkpoint
|
|
/// activation on testnet. If the state has already synced past the mandatory checkpoint
|
|
/// activation by 1200 blocks, it will fail.
|
|
#[allow(dead_code)]
|
|
#[cfg_attr(feature = "test_sync_past_mandatory_checkpoint_testnet", test)]
|
|
fn sync_past_mandatory_checkpoint_testnet() {
|
|
zebra_test::init();
|
|
let network = Testnet;
|
|
sync_past_mandatory_checkpoint(network).unwrap();
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn metrics_endpoint() -> Result<()> {
|
|
use hyper::Client;
|
|
|
|
zebra_test::init();
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let port = random_known_port();
|
|
let endpoint = format!("127.0.0.1:{}", port);
|
|
let url = format!("http://{}", endpoint);
|
|
|
|
// Write a configuration that has metrics endpoint_addr set
|
|
let mut config = default_test_config()?;
|
|
config.metrics.endpoint_addr = Some(endpoint.parse().unwrap());
|
|
|
|
let dir = testdir()?.with_config(&mut config)?;
|
|
let child = dir.spawn_child(args!["start"])?;
|
|
|
|
// Run `zebrad` for a few seconds before testing the endpoint
|
|
// Since we're an async function, we have to use a sleep future, not thread sleep.
|
|
tokio::time::sleep(LAUNCH_DELAY).await;
|
|
|
|
// Create an http client
|
|
let client = Client::new();
|
|
|
|
// Test metrics endpoint
|
|
let res = client.get(url.try_into().expect("url is valid")).await;
|
|
let (res, child) = child.kill_on_error(res)?;
|
|
assert!(res.status().is_success());
|
|
let body = hyper::body::to_bytes(res).await;
|
|
let (body, mut child) = child.kill_on_error(body)?;
|
|
child.kill()?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_failure()?;
|
|
|
|
output.any_output_line_contains(
|
|
"# TYPE zebrad_build_info counter",
|
|
&body,
|
|
"metrics exporter response",
|
|
"the metrics response header",
|
|
)?;
|
|
std::str::from_utf8(&body).expect("unexpected invalid UTF-8 in metrics exporter response");
|
|
|
|
// Make sure metrics was started
|
|
output.stdout_line_contains(format!("Opened metrics endpoint at {}", endpoint).as_str())?;
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
output
|
|
.assert_was_killed()
|
|
.wrap_err("Possible port conflict. Are there other acceptance tests running?")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn tracing_endpoint() -> Result<()> {
|
|
use hyper::{Body, Client, Request};
|
|
|
|
zebra_test::init();
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let port = random_known_port();
|
|
let endpoint = format!("127.0.0.1:{}", port);
|
|
let url_default = format!("http://{}", endpoint);
|
|
let url_filter = format!("{}/filter", url_default);
|
|
|
|
// Write a configuration that has tracing endpoint_addr option set
|
|
let mut config = default_test_config()?;
|
|
config.tracing.endpoint_addr = Some(endpoint.parse().unwrap());
|
|
|
|
let dir = testdir()?.with_config(&mut config)?;
|
|
let child = dir.spawn_child(args!["start"])?;
|
|
|
|
// Run `zebrad` for a few seconds before testing the endpoint
|
|
// Since we're an async function, we have to use a sleep future, not thread sleep.
|
|
tokio::time::sleep(LAUNCH_DELAY).await;
|
|
|
|
// Create an http client
|
|
let client = Client::new();
|
|
|
|
// Test tracing endpoint
|
|
let res = client
|
|
.get(url_default.try_into().expect("url_default is valid"))
|
|
.await;
|
|
let (res, child) = child.kill_on_error(res)?;
|
|
assert!(res.status().is_success());
|
|
let body = hyper::body::to_bytes(res).await;
|
|
let (body, child) = child.kill_on_error(body)?;
|
|
|
|
// Set a filter and make sure it was changed
|
|
let request = Request::post(url_filter.clone())
|
|
.body(Body::from("zebrad=debug"))
|
|
.unwrap();
|
|
let post = client.request(request).await;
|
|
let (_post, child) = child.kill_on_error(post)?;
|
|
|
|
let tracing_res = client
|
|
.get(url_filter.try_into().expect("url_filter is valid"))
|
|
.await;
|
|
let (tracing_res, child) = child.kill_on_error(tracing_res)?;
|
|
assert!(tracing_res.status().is_success());
|
|
let tracing_body = hyper::body::to_bytes(tracing_res).await;
|
|
let (tracing_body, mut child) = child.kill_on_error(tracing_body)?;
|
|
|
|
child.kill()?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_failure()?;
|
|
|
|
// Make sure tracing endpoint was started
|
|
output.stdout_line_contains(format!("Opened tracing endpoint at {}", endpoint).as_str())?;
|
|
// TODO: Match some trace level messages from output
|
|
|
|
// Make sure the endpoint header is correct
|
|
// The header is split over two lines. But we don't want to require line
|
|
// breaks at a specific word, so we run two checks for different substrings.
|
|
output.any_output_line_contains(
|
|
"HTTP endpoint allows dynamic control of the filter",
|
|
&body,
|
|
"tracing filter endpoint response",
|
|
"the tracing response header",
|
|
)?;
|
|
output.any_output_line_contains(
|
|
"tracing events",
|
|
&body,
|
|
"tracing filter endpoint response",
|
|
"the tracing response header",
|
|
)?;
|
|
std::str::from_utf8(&body).expect("unexpected invalid UTF-8 in tracing filter response");
|
|
|
|
// Make sure endpoint requests change the filter
|
|
output.any_output_line_contains(
|
|
"zebrad=debug",
|
|
&tracing_body,
|
|
"tracing filter endpoint response",
|
|
"the modified tracing filter",
|
|
)?;
|
|
std::str::from_utf8(&tracing_body)
|
|
.expect("unexpected invalid UTF-8 in modified tracing filter response");
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
output
|
|
.assert_was_killed()
|
|
.wrap_err("Possible port conflict. Are there other acceptance tests running?")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn rpc_endpoint() -> Result<()> {
|
|
use hyper::{body::to_bytes, Body, Client, Method, Request};
|
|
use serde_json::Value;
|
|
|
|
zebra_test::init();
|
|
if zebra_test::net::zebra_skip_network_tests() {
|
|
return Ok(());
|
|
}
|
|
|
|
// Write a configuration that has RPC listen_addr set
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let mut config = random_known_rpc_port_config()?;
|
|
let url = format!("http://{}", config.rpc.listen_addr.unwrap());
|
|
|
|
let dir = testdir()?.with_config(&mut config)?;
|
|
let mut child = dir.spawn_child(args!["start"])?;
|
|
|
|
// Wait until port is open.
|
|
child.expect_stdout_line_matches(
|
|
format!("Opened RPC endpoint at {}", config.rpc.listen_addr.unwrap()).as_str(),
|
|
)?;
|
|
|
|
// Create an http client
|
|
let client = Client::new();
|
|
|
|
// Create a request to call `getinfo` RPC method
|
|
let req = Request::builder()
|
|
.method(Method::POST)
|
|
.uri(url)
|
|
.header("content-type", "application/json")
|
|
.body(Body::from(
|
|
r#"{"jsonrpc":"1.0","method":"getinfo","params":[],"id":123}"#,
|
|
))?;
|
|
|
|
// Make the call to the RPC endpoint
|
|
let res = client.request(req).await?;
|
|
|
|
// Test rpc endpoint response
|
|
assert!(res.status().is_success());
|
|
|
|
let body = to_bytes(res).await;
|
|
let (body, mut child) = child.kill_on_error(body)?;
|
|
|
|
let parsed: Value = serde_json::from_slice(&body)?;
|
|
|
|
// Check that we have at least 4 characters in the `build` field.
|
|
let build = parsed["result"]["build"].as_str().unwrap();
|
|
assert!(build.len() > 4, "Got {}", build);
|
|
|
|
// Check that the `subversion` field has "Zebra" in it.
|
|
let subversion = parsed["result"]["subversion"].as_str().unwrap();
|
|
assert!(subversion.contains("Zebra"), "Got {}", subversion);
|
|
|
|
child.kill()?;
|
|
|
|
let output = child.wait_with_output()?;
|
|
let output = output.assert_failure()?;
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
output
|
|
.assert_was_killed()
|
|
.wrap_err("Possible port conflict. Are there other acceptance tests running?")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Failure log messages for any process, from the OS or shell.
|
|
///
|
|
/// These messages show that the child process has failed.
|
|
/// So when we see them in the logs, we make the test fail.
|
|
const PROCESS_FAILURE_MESSAGES: &[&str] = &[
|
|
// Linux
|
|
"Aborted",
|
|
// macOS / BSDs
|
|
"Abort trap",
|
|
// TODO: add other OS or C library errors?
|
|
];
|
|
|
|
/// Failure log messages from Zebra.
|
|
///
|
|
/// These `zebrad` messages show that the `lightwalletd` integration test has failed.
|
|
/// So when we see them in the logs, we make the test fail.
|
|
const ZEBRA_FAILURE_MESSAGES: &[&str] = &[
|
|
// Rust-specific panics
|
|
"The application panicked",
|
|
// RPC port errors
|
|
"Unable to start RPC server",
|
|
// TODO: disable if this actually happens during test zebrad shutdown
|
|
"Stopping RPC endpoint",
|
|
// Missing RPCs in zebrad logs (this log is from PR #3860)
|
|
//
|
|
// TODO: temporarily disable until enough RPCs are implemented, if needed
|
|
"Received unrecognized RPC request",
|
|
// RPC argument errors: parsing and data
|
|
//
|
|
// These logs are produced by jsonrpc_core inside Zebra,
|
|
// but it doesn't log them yet.
|
|
//
|
|
// TODO: log these errors in Zebra, and check for them in the Zebra logs?
|
|
"Invalid params",
|
|
"Method not found",
|
|
];
|
|
|
|
/// Failure log messages from lightwalletd.
|
|
///
|
|
/// These `lightwalletd` messages show that the `lightwalletd` integration test has failed.
|
|
/// So when we see them in the logs, we make the test fail.
|
|
const LIGHTWALLETD_FAILURE_MESSAGES: &[&str] = &[
|
|
// Go-specific panics
|
|
"panic:",
|
|
// Missing RPCs in lightwalletd logs
|
|
// TODO: temporarily disable until enough RPCs are implemented, if needed
|
|
"unable to issue RPC call",
|
|
// RPC response errors: parsing and data
|
|
//
|
|
// jsonrpc_core error messages from Zebra,
|
|
// received by lightwalletd and written to its logs
|
|
"Invalid params",
|
|
"Method not found",
|
|
// Early termination
|
|
//
|
|
// TODO: temporarily disable until enough RPCs are implemented, if needed
|
|
"Lightwalletd died with a Fatal error",
|
|
// Go json package error messages:
|
|
"json: cannot unmarshal",
|
|
"into Go value of type",
|
|
// lightwalletd custom RPC error messages from:
|
|
// https://github.com/adityapk00/lightwalletd/blob/master/common/common.go
|
|
"block requested is newer than latest block",
|
|
"Cache add failed",
|
|
"error decoding",
|
|
"error marshaling",
|
|
"error parsing JSON",
|
|
"error reading JSON response",
|
|
"error with",
|
|
// We expect these errors when lightwalletd reaches the end of the zebrad cached state
|
|
// "error requesting block: 0: Block not found",
|
|
// "error zcashd getblock rpc",
|
|
"received overlong message",
|
|
"received unexpected height block",
|
|
"Reorg exceeded max",
|
|
"unable to issue RPC call",
|
|
// Missing fields for each specific RPC
|
|
//
|
|
// get_block_chain_info
|
|
//
|
|
// invalid sapling height
|
|
"Got sapling height 0",
|
|
// missing BIP70 chain name, should be "main" or "test"
|
|
" chain ",
|
|
// missing branchID, should be 8 hex digits
|
|
" branchID \"",
|
|
// get_block
|
|
//
|
|
// a block error other than "-8: Block not found"
|
|
"error requesting block",
|
|
// a missing block with an incorrect error code
|
|
"Block not found",
|
|
//
|
|
// TODO: complete this list for each RPC with fields, if that RPC generates logs
|
|
// get_info - doesn't generate logs
|
|
// get_raw_transaction - might not generate logs
|
|
// z_get_tree_state
|
|
// get_address_txids
|
|
// get_address_balance
|
|
// get_address_utxos
|
|
];
|
|
|
|
/// Ignored failure logs for lightwalletd.
|
|
/// These regexes override the [`LIGHTWALLETD_FAILURE_MESSAGES`].
|
|
///
|
|
/// These `lightwalletd` messages look like failure messages, but they are actually ok.
|
|
/// So when we see them in the logs, we make the test continue.
|
|
const LIGHTWALLETD_IGNORE_MESSAGES: &[&str] = &[
|
|
// Exceptions to lightwalletd custom RPC error messages:
|
|
//
|
|
// This log matches the "error with" RPC error message,
|
|
// but we expect Zebra to start with an empty state.
|
|
//
|
|
// TODO: this exception should not be used for the cached state tests (#3511)
|
|
r#"No Chain tip available yet","level":"warning","msg":"error with getblockchaininfo rpc, retrying"#,
|
|
];
|
|
|
|
/// Launch `zebrad` with an RPC port, and make sure `lightwalletd` works with Zebra.
|
|
///
|
|
/// This test only runs when the `ZEBRA_TEST_LIGHTWALLETD` env var is set.
|
|
///
|
|
/// This test doesn't work on Windows, so it is always skipped on that platform.
|
|
#[test]
|
|
#[cfg(not(target_os = "windows"))]
|
|
fn lightwalletd_integration() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
// Skip the test unless the user specifically asked for it
|
|
if zebra_skip_lightwalletd_tests() {
|
|
return Ok(());
|
|
}
|
|
|
|
// Launch zebrad
|
|
|
|
// Write a configuration that has RPC listen_addr set
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let mut config = random_known_rpc_port_config()?;
|
|
|
|
let zdir = testdir()?.with_config(&mut config)?;
|
|
let mut zebrad = zdir
|
|
.spawn_child(args!["start"])?
|
|
.with_timeout(LAUNCH_DELAY)
|
|
.with_failure_regex_iter(
|
|
// TODO: replace with a function that returns the full list and correct return type
|
|
ZEBRA_FAILURE_MESSAGES
|
|
.iter()
|
|
.chain(PROCESS_FAILURE_MESSAGES)
|
|
.cloned(),
|
|
NO_MATCHES_REGEX_ITER.iter().cloned(),
|
|
);
|
|
|
|
// Wait until `zebrad` has opened the RPC endpoint
|
|
zebrad.expect_stdout_line_matches(
|
|
format!("Opened RPC endpoint at {}", config.rpc.listen_addr.unwrap()).as_str(),
|
|
)?;
|
|
|
|
// Launch lightwalletd
|
|
|
|
// Write a fake zcashd configuration that has the rpcbind and rpcport options set
|
|
let ldir = testdir()?;
|
|
let ldir = ldir.with_lightwalletd_config(config.rpc.listen_addr.unwrap())?;
|
|
|
|
// Launch the lightwalletd process
|
|
let result = ldir.spawn_lightwalletd_child(args![]);
|
|
let (lightwalletd, zebrad) = zebrad.kill_on_error(result)?;
|
|
let mut lightwalletd = lightwalletd
|
|
.with_timeout(LIGHTWALLETD_DELAY)
|
|
.with_failure_regex_iter(
|
|
// TODO: replace with a function that returns the full list and correct return type
|
|
LIGHTWALLETD_FAILURE_MESSAGES
|
|
.iter()
|
|
.chain(PROCESS_FAILURE_MESSAGES)
|
|
.cloned(),
|
|
// TODO: some exceptions do not apply to the cached state tests (#3511)
|
|
LIGHTWALLETD_IGNORE_MESSAGES.iter().cloned(),
|
|
);
|
|
|
|
// Wait until `lightwalletd` has launched
|
|
let result = lightwalletd.expect_stdout_line_matches("Starting gRPC server");
|
|
let (_, zebrad) = zebrad.kill_on_error(result)?;
|
|
|
|
// Check that `lightwalletd` is calling the expected Zebra RPCs
|
|
|
|
// getblockchaininfo
|
|
//
|
|
// TODO: update branchID when we're using cached state (#3511)
|
|
// add "Waiting for zcashd height to reach Sapling activation height"
|
|
let result = lightwalletd.expect_stdout_line_matches(
|
|
"Got sapling height 419200 block height [0-9]+ chain main branchID 00000000",
|
|
);
|
|
let (_, zebrad) = zebrad.kill_on_error(result)?;
|
|
|
|
let result = lightwalletd.expect_stdout_line_matches("Found 0 blocks in cache");
|
|
let (_, zebrad) = zebrad.kill_on_error(result)?;
|
|
|
|
// getblock with the first Sapling block in Zebra's state
|
|
//
|
|
// zcash/lightwalletd calls getbestblockhash here, but
|
|
// adityapk00/lightwalletd calls getblock
|
|
//
|
|
// The log also depends on what is in Zebra's state:
|
|
//
|
|
// # Empty Zebra State
|
|
//
|
|
// lightwalletd tries to download the Sapling activation block, but it's not in the state.
|
|
//
|
|
// Until the Sapling activation block has been downloaded, lightwalletd will log Zebra's RPC error:
|
|
// "error requesting block: 0: Block not found"
|
|
// We also get a similar log when lightwalletd reaches the end of Zebra's cache.
|
|
//
|
|
// # Cached Zebra State
|
|
//
|
|
// After the first successful getblock call, lightwalletd will log:
|
|
// "Block hash changed, clearing mempool clients"
|
|
// But we can't check for that, because it can come before or after the Ingestor log.
|
|
//
|
|
// TODO: expect Ingestor log when we're using cached state (#3511)
|
|
// "Ingestor adding block to cache"
|
|
let result = lightwalletd.expect_stdout_line_matches(regex::escape(
|
|
"Waiting for zcashd height to reach Sapling activation height (419200)",
|
|
));
|
|
let (_, zebrad) = zebrad.kill_on_error(result)?;
|
|
|
|
// (next RPC)
|
|
//
|
|
// TODO: add extra checks when we add new Zebra RPCs
|
|
|
|
// Cleanup both processes
|
|
let result = lightwalletd.kill();
|
|
let (_, mut zebrad) = zebrad.kill_on_error(result)?;
|
|
zebrad.kill()?;
|
|
|
|
let lightwalletd_output = lightwalletd.wait_with_output()?.assert_failure()?;
|
|
let zebrad_output = zebrad.wait_with_output()?.assert_failure()?;
|
|
|
|
// If the test fails here, see the [note on port conflict](#Note on port conflict)
|
|
//
|
|
// zcash/lightwalletd exits by itself, but
|
|
// adityapk00/lightwalletd keeps on going, so it gets killed by the test harness.
|
|
|
|
lightwalletd_output
|
|
.assert_was_killed()
|
|
.wrap_err("Possible port conflict. Are there other acceptance tests running?")?;
|
|
zebrad_output
|
|
.assert_was_killed()
|
|
.wrap_err("Possible port conflict. Are there other acceptance tests running?")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Test will start 2 zebrad nodes one after the other using the same Zcash listener.
|
|
/// It is expected that the first node spawned will get exclusive use of the port.
|
|
/// The second node will panic with the Zcash listener conflict hint added in #1535.
|
|
#[test]
|
|
fn zebra_zcash_listener_conflict() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let port = random_known_port();
|
|
let listen_addr = format!("127.0.0.1:{}", port);
|
|
|
|
// Write a configuration that has our created network listen_addr
|
|
let mut config = default_test_config()?;
|
|
config.network.listen_addr = listen_addr.parse().unwrap();
|
|
let dir1 = testdir()?.with_config(&mut config)?;
|
|
let regex1 = regex::escape(&format!(
|
|
"Opened Zcash protocol endpoint at {}",
|
|
listen_addr
|
|
));
|
|
|
|
// From another folder create a configuration with the same listener.
|
|
// `network.listen_addr` will be the same in the 2 nodes.
|
|
// (But since the config is ephemeral, they will have different state paths.)
|
|
let dir2 = testdir()?.with_config(&mut config)?;
|
|
|
|
check_config_conflict(dir1, regex1.as_str(), dir2, PORT_IN_USE_ERROR.as_str())?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Start 2 zebrad nodes using the same metrics listener port, but different
|
|
/// state directories and Zcash listener ports. The first node should get
|
|
/// exclusive use of the port. The second node will panic with the Zcash metrics
|
|
/// conflict hint added in #1535.
|
|
#[test]
|
|
fn zebra_metrics_conflict() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let port = random_known_port();
|
|
let listen_addr = format!("127.0.0.1:{}", port);
|
|
|
|
// Write a configuration that has our created metrics endpoint_addr
|
|
let mut config = default_test_config()?;
|
|
config.metrics.endpoint_addr = Some(listen_addr.parse().unwrap());
|
|
let dir1 = testdir()?.with_config(&mut config)?;
|
|
let regex1 = regex::escape(&format!(r"Opened metrics endpoint at {}", listen_addr));
|
|
|
|
// From another folder create a configuration with the same endpoint.
|
|
// `metrics.endpoint_addr` will be the same in the 2 nodes.
|
|
// But they will have different Zcash listeners (auto port) and states (ephemeral)
|
|
let dir2 = testdir()?.with_config(&mut config)?;
|
|
|
|
check_config_conflict(dir1, regex1.as_str(), dir2, PORT_IN_USE_ERROR.as_str())?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Start 2 zebrad nodes using the same tracing listener port, but different
|
|
/// state directories and Zcash listener ports. The first node should get
|
|
/// exclusive use of the port. The second node will panic with the Zcash tracing
|
|
/// conflict hint added in #1535.
|
|
#[test]
|
|
fn zebra_tracing_conflict() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let port = random_known_port();
|
|
let listen_addr = format!("127.0.0.1:{}", port);
|
|
|
|
// Write a configuration that has our created tracing endpoint_addr
|
|
let mut config = default_test_config()?;
|
|
config.tracing.endpoint_addr = Some(listen_addr.parse().unwrap());
|
|
let dir1 = testdir()?.with_config(&mut config)?;
|
|
let regex1 = regex::escape(&format!(r"Opened tracing endpoint at {}", listen_addr));
|
|
|
|
// From another folder create a configuration with the same endpoint.
|
|
// `tracing.endpoint_addr` will be the same in the 2 nodes.
|
|
// But they will have different Zcash listeners (auto port) and states (ephemeral)
|
|
let dir2 = testdir()?.with_config(&mut config)?;
|
|
|
|
check_config_conflict(dir1, regex1.as_str(), dir2, PORT_IN_USE_ERROR.as_str())?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Start 2 zebrad nodes using the same RPC listener port, but different
|
|
/// state directories and Zcash listener ports. The first node should get
|
|
/// exclusive use of the port. The second node will panic.
|
|
#[test]
|
|
#[cfg(not(target_os = "windows"))]
|
|
fn zebra_rpc_conflict() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
if zebra_test::net::zebra_skip_network_tests() {
|
|
return Ok(());
|
|
}
|
|
|
|
// Write a configuration that has RPC listen_addr set
|
|
// [Note on port conflict](#Note on port conflict)
|
|
let mut config = random_known_rpc_port_config()?;
|
|
|
|
let dir1 = testdir()?.with_config(&mut config)?;
|
|
let regex1 = regex::escape(&format!(
|
|
r"Opened RPC endpoint at {}",
|
|
config.rpc.listen_addr.unwrap(),
|
|
));
|
|
|
|
// From another folder create a configuration with the same endpoint.
|
|
// `rpc.listen_addr` will be the same in the 2 nodes.
|
|
// But they will have different Zcash listeners (auto port) and states (ephemeral)
|
|
let dir2 = testdir()?.with_config(&mut config)?;
|
|
|
|
check_config_conflict(dir1, regex1.as_str(), dir2, "Unable to start RPC server")?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Start 2 zebrad nodes using the same state directory, but different Zcash
|
|
/// listener ports. The first node should get exclusive access to the database.
|
|
/// The second node will panic with the Zcash state conflict hint added in #1535.
|
|
#[test]
|
|
fn zebra_state_conflict() -> Result<()> {
|
|
zebra_test::init();
|
|
|
|
// A persistent config has a fixed temp state directory, but asks the OS to
|
|
// automatically choose an unused port
|
|
let mut config = persistent_test_config()?;
|
|
let dir_conflict = testdir()?.with_config(&mut config)?;
|
|
|
|
// Windows problems with this match will be worked on at #1654
|
|
// We are matching the whole opened path only for unix by now.
|
|
let contains = if cfg!(unix) {
|
|
let mut dir_conflict_full = PathBuf::new();
|
|
dir_conflict_full.push(dir_conflict.path());
|
|
dir_conflict_full.push("state");
|
|
dir_conflict_full.push(format!(
|
|
"v{}",
|
|
zebra_state::constants::DATABASE_FORMAT_VERSION
|
|
));
|
|
dir_conflict_full.push(config.network.network.to_string().to_lowercase());
|
|
format!(
|
|
"Opened Zebra state cache at {}",
|
|
dir_conflict_full.display()
|
|
)
|
|
} else {
|
|
String::from("Opened Zebra state cache at ")
|
|
};
|
|
|
|
check_config_conflict(
|
|
dir_conflict.path(),
|
|
regex::escape(&contains).as_str(),
|
|
dir_conflict.path(),
|
|
LOCK_FILE_ERROR.as_str(),
|
|
)?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Launch a node in `first_dir`, wait a few seconds, then launch a node in
|
|
/// `second_dir`. Check that the first node's stdout contains
|
|
/// `first_stdout_regex`, and the second node's stderr contains
|
|
/// `second_stderr_regex`.
|
|
fn check_config_conflict<T, U>(
|
|
first_dir: T,
|
|
first_stdout_regex: &str,
|
|
second_dir: U,
|
|
second_stderr_regex: &str,
|
|
) -> Result<()>
|
|
where
|
|
T: ZebradTestDirExt,
|
|
U: ZebradTestDirExt,
|
|
{
|
|
// Start the first node
|
|
let mut node1 = first_dir.spawn_child(args!["start"])?;
|
|
|
|
// Wait until node1 has used the conflicting resource.
|
|
node1.expect_stdout_line_matches(first_stdout_regex)?;
|
|
|
|
// Wait a bit before launching the second node.
|
|
std::thread::sleep(BETWEEN_NODES_DELAY);
|
|
|
|
// Spawn the second node
|
|
let node2 = second_dir.spawn_child(args!["start"]);
|
|
let (node2, mut node1) = node1.kill_on_error(node2)?;
|
|
|
|
// Wait a few seconds and kill first node.
|
|
// Second node is terminated by panic, no need to kill.
|
|
std::thread::sleep(LAUNCH_DELAY);
|
|
let node1_kill_res = node1.kill();
|
|
let (_, mut node2) = node2.kill_on_error(node1_kill_res)?;
|
|
|
|
// node2 should have panicked due to a conflict. Kill it here anyway, so it
|
|
// doesn't outlive the test on error.
|
|
//
|
|
// This code doesn't work on Windows or macOS. It's cleanup code that only
|
|
// runs when node2 doesn't panic as expected. So it's ok to skip it.
|
|
// See #1781.
|
|
#[cfg(target_os = "linux")]
|
|
if node2.is_running() {
|
|
use color_eyre::eyre::eyre;
|
|
return node2
|
|
.kill_on_error::<(), _>(Err(eyre!(
|
|
"conflicted node2 was still running, but the test expected a panic"
|
|
)))
|
|
.context_from(&mut node1)
|
|
.map(|_| ());
|
|
}
|
|
|
|
// Now we're sure both nodes are dead, and we have both their outputs
|
|
let output1 = node1.wait_with_output().context_from(&mut node2)?;
|
|
let output2 = node2.wait_with_output().context_from(&output1)?;
|
|
|
|
// Make sure the first node was killed, rather than exiting with an error.
|
|
output1
|
|
.assert_was_killed()
|
|
.warning("Possible port conflict. Are there other acceptance tests running?")
|
|
.context_from(&output2)?;
|
|
|
|
// Make sure node2 has the expected resource conflict.
|
|
output2
|
|
.stderr_line_matches(second_stderr_regex)
|
|
.context_from(&output1)?;
|
|
output2
|
|
.assert_was_not_killed()
|
|
.warning("Possible port conflict. Are there other acceptance tests running?")
|
|
.context_from(&output1)?;
|
|
|
|
Ok(())
|
|
}
|