|
11 | 11 |
|
12 | 12 | use crate::blinded_path::BlindedPath;
|
13 | 13 | use crate::events::{Event, EventsProvider};
|
14 |
| -use crate::ln::features::InitFeatures; |
15 |
| -use crate::ln::msgs::{self, DecodeError, OnionMessageHandler, SocketAddress}; |
| 14 | +use crate::ln::features::{ChannelFeatures, InitFeatures}; |
| 15 | +use crate::ln::msgs::{self, DecodeError, OnionMessageHandler}; |
| 16 | +use crate::routing::gossip::{NetworkGraph, P2PGossipSync}; |
| 17 | +use crate::routing::test_utils::{add_channel, add_or_update_node}; |
16 | 18 | use crate::sign::{NodeSigner, Recipient};
|
17 | 19 | use crate::util::ser::{FixedLengthReader, LengthReadable, Writeable, Writer};
|
18 | 20 | use crate::util::test_utils;
|
19 |
| -use super::messenger::{CustomOnionMessageHandler, Destination, MessageRouter, OnionMessagePath, OnionMessenger, PendingOnionMessage, SendError}; |
| 21 | +use super::messenger::{CustomOnionMessageHandler, DefaultMessageRouter, Destination, OnionMessagePath, OnionMessenger, PendingOnionMessage, SendError}; |
20 | 22 | use super::offers::{OffersMessage, OffersMessageHandler};
|
21 | 23 | use super::packet::{OnionMessageContents, Packet};
|
22 | 24 |
|
23 | 25 | use bitcoin::network::constants::Network;
|
24 | 26 | use bitcoin::hashes::hex::FromHex;
|
25 |
| -use bitcoin::secp256k1::{PublicKey, Secp256k1, SecretKey, self}; |
| 27 | +use bitcoin::secp256k1::{All, PublicKey, Secp256k1, SecretKey}; |
26 | 28 |
|
27 | 29 | use crate::io;
|
28 | 30 | use crate::io_extras::read_to_end;
|
29 | 31 | use crate::sync::{Arc, Mutex};
|
30 | 32 |
|
| 33 | +use core::ops::Deref; |
| 34 | + |
31 | 35 | use crate::prelude::*;
|
32 | 36 |
|
33 | 37 | struct MessengerNode {
|
34 | 38 | node_id: PublicKey,
|
| 39 | + privkey: SecretKey, |
35 | 40 | entropy_source: Arc<test_utils::TestKeysInterface>,
|
36 | 41 | messenger: OnionMessenger<
|
37 | 42 | Arc<test_utils::TestKeysInterface>,
|
38 | 43 | Arc<test_utils::TestNodeSigner>,
|
39 | 44 | Arc<test_utils::TestLogger>,
|
40 |
| - Arc<TestMessageRouter>, |
| 45 | + Arc<DefaultMessageRouter< |
| 46 | + Arc<NetworkGraph<Arc<test_utils::TestLogger>>>, |
| 47 | + Arc<test_utils::TestLogger>, |
| 48 | + Arc<test_utils::TestKeysInterface> |
| 49 | + >>, |
41 | 50 | Arc<TestOffersMessageHandler>,
|
42 | 51 | Arc<TestCustomMessageHandler>
|
43 | 52 | >,
|
44 | 53 | custom_message_handler: Arc<TestCustomMessageHandler>,
|
45 |
| -} |
46 |
| - |
47 |
| -struct TestMessageRouter {} |
48 |
| - |
49 |
| -impl MessageRouter for TestMessageRouter { |
50 |
| - fn find_path( |
51 |
| - &self, _sender: PublicKey, _peers: Vec<PublicKey>, destination: Destination |
52 |
| - ) -> Result<OnionMessagePath, ()> { |
53 |
| - Ok(OnionMessagePath { |
54 |
| - intermediate_nodes: vec![], |
55 |
| - destination, |
56 |
| - first_node_addresses: |
57 |
| - Some(vec![SocketAddress::TcpIpV4 { addr: [127, 0, 0, 1], port: 1000 }]), |
58 |
| - }) |
59 |
| - } |
60 |
| - |
61 |
| - fn create_blinded_paths< |
62 |
| - T: secp256k1::Signing + secp256k1::Verification |
63 |
| - >( |
64 |
| - &self, _recipient: PublicKey, _peers: Vec<PublicKey>, _secp_ctx: &Secp256k1<T>, |
65 |
| - ) -> Result<Vec<BlindedPath>, ()> { |
66 |
| - unreachable!() |
67 |
| - } |
| 54 | + gossip_sync: Arc<P2PGossipSync< |
| 55 | + Arc<NetworkGraph<Arc<test_utils::TestLogger>>>, |
| 56 | + Arc<test_utils::TestChainSource>, |
| 57 | + Arc<test_utils::TestLogger> |
| 58 | + >> |
68 | 59 | }
|
69 | 60 |
|
70 | 61 | struct TestOffersMessageHandler {}
|
@@ -171,24 +162,34 @@ fn create_nodes(num_messengers: u8) -> Vec<MessengerNode> {
|
171 | 162 | }
|
172 | 163 |
|
173 | 164 | fn create_nodes_using_secrets(secrets: Vec<SecretKey>) -> Vec<MessengerNode> {
|
| 165 | + let gossip_logger = Arc::new(test_utils::TestLogger::with_id("gossip".to_string())); |
| 166 | + let network_graph = Arc::new(NetworkGraph::new(Network::Testnet, gossip_logger.clone())); |
| 167 | + let gossip_sync = Arc::new( |
| 168 | + P2PGossipSync::new(network_graph.clone(), None, gossip_logger) |
| 169 | + ); |
| 170 | + |
174 | 171 | let mut nodes = Vec::new();
|
175 | 172 | for (i, secret_key) in secrets.into_iter().enumerate() {
|
176 | 173 | let logger = Arc::new(test_utils::TestLogger::with_id(format!("node {}", i)));
|
177 | 174 | let seed = [i as u8; 32];
|
178 | 175 | let entropy_source = Arc::new(test_utils::TestKeysInterface::new(&seed, Network::Testnet));
|
179 | 176 | let node_signer = Arc::new(test_utils::TestNodeSigner::new(secret_key));
|
180 | 177 |
|
181 |
| - let message_router = Arc::new(TestMessageRouter {}); |
| 178 | + let message_router = Arc::new( |
| 179 | + DefaultMessageRouter::new(network_graph.clone(), entropy_source.clone()) |
| 180 | + ); |
182 | 181 | let offers_message_handler = Arc::new(TestOffersMessageHandler {});
|
183 | 182 | let custom_message_handler = Arc::new(TestCustomMessageHandler::new());
|
184 | 183 | nodes.push(MessengerNode {
|
| 184 | + privkey: secret_key, |
185 | 185 | node_id: node_signer.get_node_id(Recipient::Node).unwrap(),
|
186 | 186 | entropy_source: entropy_source.clone(),
|
187 | 187 | messenger: OnionMessenger::new(
|
188 | 188 | entropy_source, node_signer, logger.clone(), message_router,
|
189 | 189 | offers_message_handler, custom_message_handler.clone()
|
190 | 190 | ),
|
191 | 191 | custom_message_handler,
|
| 192 | + gossip_sync: gossip_sync.clone(), |
192 | 193 | });
|
193 | 194 | }
|
194 | 195 | for i in 0..nodes.len() - 1 {
|
@@ -216,6 +217,20 @@ fn release_events(node: &MessengerNode) -> Vec<Event> {
|
216 | 217 | events.into_inner()
|
217 | 218 | }
|
218 | 219 |
|
| 220 | +fn add_channel_to_graph( |
| 221 | + node_a: &MessengerNode, node_b: &MessengerNode, secp_ctx: &Secp256k1<All>, short_channel_id: u64 |
| 222 | +) { |
| 223 | + let gossip_sync = node_a.gossip_sync.deref(); |
| 224 | + let privkey_a = &node_a.privkey; |
| 225 | + let privkey_b = &node_b.privkey; |
| 226 | + let channel_features = ChannelFeatures::empty(); |
| 227 | + let node_features_a = node_a.messenger.provided_node_features(); |
| 228 | + let node_features_b = node_b.messenger.provided_node_features(); |
| 229 | + add_channel(gossip_sync, secp_ctx, privkey_a, privkey_b, channel_features, short_channel_id); |
| 230 | + add_or_update_node(gossip_sync, secp_ctx, privkey_a, node_features_a, 1); |
| 231 | + add_or_update_node(gossip_sync, secp_ctx, privkey_b, node_features_b, 1); |
| 232 | +} |
| 233 | + |
219 | 234 | fn pass_along_path(path: &Vec<MessengerNode>) {
|
220 | 235 | let mut prev_node = &path[0];
|
221 | 236 | for node in path.into_iter().skip(1) {
|
@@ -492,6 +507,8 @@ fn requests_peer_connection_for_buffered_messages() {
|
492 | 507 | let nodes = create_nodes(3);
|
493 | 508 | let message = TestCustomMessage::Request;
|
494 | 509 | let secp_ctx = Secp256k1::new();
|
| 510 | + add_channel_to_graph(&nodes[0], &nodes[1], &secp_ctx, 42); |
| 511 | + |
495 | 512 | let blinded_path = BlindedPath::new_for_message(
|
496 | 513 | &[nodes[1].node_id, nodes[2].node_id], &*nodes[0].entropy_source, &secp_ctx
|
497 | 514 | ).unwrap();
|
@@ -527,6 +544,8 @@ fn drops_buffered_messages_waiting_for_peer_connection() {
|
527 | 544 | let nodes = create_nodes(3);
|
528 | 545 | let message = TestCustomMessage::Request;
|
529 | 546 | let secp_ctx = Secp256k1::new();
|
| 547 | + add_channel_to_graph(&nodes[0], &nodes[1], &secp_ctx, 42); |
| 548 | + |
530 | 549 | let blinded_path = BlindedPath::new_for_message(
|
531 | 550 | &[nodes[1].node_id, nodes[2].node_id], &*nodes[0].entropy_source, &secp_ctx
|
532 | 551 | ).unwrap();
|
|
0 commit comments