2014-04-11 04:29:00 +02:00
|
|
|
// Copyright (c) 2014 Conformal Systems LLC.
|
|
|
|
// Use of this source code is governed by an ISC
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package btcwire_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"io"
|
2014-05-05 09:15:18 +02:00
|
|
|
"reflect"
|
2014-04-11 04:29:00 +02:00
|
|
|
"testing"
|
2014-07-03 02:43:33 +02:00
|
|
|
|
|
|
|
"github.com/conformal/btcwire"
|
2014-04-11 04:29:00 +02:00
|
|
|
)
|
|
|
|
|
2014-05-05 09:15:18 +02:00
|
|
|
// TestFilterAddLatest tests the MsgFilterAdd API against the latest protocol
|
|
|
|
// version.
|
2014-04-11 04:29:00 +02:00
|
|
|
func TestFilterAddLatest(t *testing.T) {
|
|
|
|
pver := btcwire.ProtocolVersion
|
|
|
|
|
|
|
|
data := []byte{0x01, 0x02}
|
|
|
|
msg := btcwire.NewMsgFilterAdd(data)
|
|
|
|
|
|
|
|
// Ensure the command is expected value.
|
|
|
|
wantCmd := "filteradd"
|
|
|
|
if cmd := msg.Command(); cmd != wantCmd {
|
|
|
|
t.Errorf("NewMsgFilterAdd: wrong command - got %v want %v",
|
|
|
|
cmd, wantCmd)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure max payload is expected value for latest protocol version.
|
2014-05-05 09:15:18 +02:00
|
|
|
wantPayload := uint32(523)
|
2014-04-11 04:29:00 +02:00
|
|
|
maxPayload := msg.MaxPayloadLength(pver)
|
|
|
|
if maxPayload != wantPayload {
|
|
|
|
t.Errorf("MaxPayloadLength: wrong max payload length for "+
|
|
|
|
"protocol version %d - got %v, want %v", pver,
|
|
|
|
maxPayload, wantPayload)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test encode with latest protocol version.
|
|
|
|
var buf bytes.Buffer
|
|
|
|
err := msg.BtcEncode(&buf, pver)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("encode of MsgFilterAdd failed %v err <%v>", msg, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test decode with latest protocol version.
|
2014-05-05 09:15:18 +02:00
|
|
|
var readmsg btcwire.MsgFilterAdd
|
2014-04-11 04:29:00 +02:00
|
|
|
err = readmsg.BtcDecode(&buf, pver)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("decode of MsgFilterAdd failed [%v] err <%v>", buf, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-05-05 09:15:18 +02:00
|
|
|
// TestFilterAddCrossProtocol tests the MsgFilterAdd API when encoding with the
|
|
|
|
// latest protocol version and decoding with BIP0031Version.
|
2014-04-11 04:29:00 +02:00
|
|
|
func TestFilterAddCrossProtocol(t *testing.T) {
|
|
|
|
data := []byte{0x01, 0x02}
|
|
|
|
msg := btcwire.NewMsgFilterAdd(data)
|
2014-05-05 09:15:18 +02:00
|
|
|
if !bytes.Equal(msg.Data, data) {
|
|
|
|
t.Errorf("should get same data back out")
|
|
|
|
}
|
2014-04-11 04:29:00 +02:00
|
|
|
|
2014-05-05 09:15:18 +02:00
|
|
|
// Encode with latest protocol version.
|
2014-04-11 04:29:00 +02:00
|
|
|
var buf bytes.Buffer
|
2014-05-05 09:15:18 +02:00
|
|
|
err := msg.BtcEncode(&buf, btcwire.ProtocolVersion)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("encode of MsgFilterAdd failed %v err <%v>", msg, err)
|
2014-04-11 04:29:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Decode with old protocol version.
|
2014-05-05 09:15:18 +02:00
|
|
|
var readmsg btcwire.MsgFilterAdd
|
2014-04-11 04:29:00 +02:00
|
|
|
err = readmsg.BtcDecode(&buf, btcwire.BIP0031Version)
|
|
|
|
if err == nil {
|
2014-05-05 09:15:18 +02:00
|
|
|
t.Errorf("decode of MsgFilterAdd succeeded when it shouldn't "+
|
|
|
|
"have %v", msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Since one of the protocol versions doesn't support the filteradd
|
|
|
|
// message, make sure the data didn't get encoded and decoded back out.
|
|
|
|
if bytes.Equal(msg.Data, readmsg.Data) {
|
|
|
|
t.Error("should not get same data for cross protocol")
|
2014-04-11 04:29:00 +02:00
|
|
|
}
|
2014-05-05 09:15:18 +02:00
|
|
|
|
2014-04-11 04:29:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// TestFilterAddMaxDataSize tests the MsgFilterAdd API maximum data size.
|
|
|
|
func TestFilterAddMaxDataSize(t *testing.T) {
|
|
|
|
data := bytes.Repeat([]byte{0xff}, 521)
|
|
|
|
msg := btcwire.NewMsgFilterAdd(data)
|
|
|
|
|
|
|
|
// Encode with latest protocol version.
|
|
|
|
var buf bytes.Buffer
|
|
|
|
err := msg.BtcEncode(&buf, btcwire.ProtocolVersion)
|
|
|
|
if err == nil {
|
2014-05-05 09:15:18 +02:00
|
|
|
t.Errorf("encode of MsgFilterAdd succeeded when it shouldn't "+
|
|
|
|
"have %v", msg)
|
2014-04-11 04:29:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Decode with latest protocol version.
|
|
|
|
readbuf := bytes.NewReader(data)
|
|
|
|
err = msg.BtcDecode(readbuf, btcwire.ProtocolVersion)
|
|
|
|
if err == nil {
|
2014-05-05 09:15:18 +02:00
|
|
|
t.Errorf("decode of MsgFilterAdd succeeded when it shouldn't "+
|
|
|
|
"have %v", msg)
|
2014-04-11 04:29:00 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestFilterAddWireErrors performs negative tests against wire encode and decode
|
|
|
|
// of MsgFilterAdd to confirm error paths work correctly.
|
|
|
|
func TestFilterAddWireErrors(t *testing.T) {
|
|
|
|
pver := btcwire.ProtocolVersion
|
2014-05-05 09:15:18 +02:00
|
|
|
pverNoFilterAdd := btcwire.BIP0037Version - 1
|
|
|
|
btcwireErr := &btcwire.MessageError{}
|
|
|
|
|
|
|
|
baseData := []byte{0x01, 0x02, 0x03, 0x04}
|
|
|
|
baseFilterAdd := btcwire.NewMsgFilterAdd(baseData)
|
|
|
|
baseFilterAddEncoded := append([]byte{0x04}, baseData...)
|
2014-04-11 04:29:00 +02:00
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
in *btcwire.MsgFilterAdd // Value to encode
|
|
|
|
buf []byte // Wire encoding
|
|
|
|
pver uint32 // Protocol version for wire encoding
|
|
|
|
max int // Max size of fixed buffer to induce errors
|
|
|
|
writeErr error // Expected write error
|
|
|
|
readErr error // Expected read error
|
|
|
|
}{
|
|
|
|
// Latest protocol version with intentional read/write errors.
|
2014-05-05 09:15:18 +02:00
|
|
|
// Force error in data size.
|
2014-04-11 04:29:00 +02:00
|
|
|
{
|
2014-05-05 09:15:18 +02:00
|
|
|
baseFilterAdd, baseFilterAddEncoded, pver, 0,
|
|
|
|
io.ErrShortWrite, io.EOF,
|
2014-04-11 04:29:00 +02:00
|
|
|
},
|
2014-05-05 09:15:18 +02:00
|
|
|
// Force error in data.
|
2014-04-11 04:29:00 +02:00
|
|
|
{
|
2014-05-05 09:15:18 +02:00
|
|
|
baseFilterAdd, baseFilterAddEncoded, pver, 1,
|
|
|
|
io.ErrShortWrite, io.EOF,
|
2014-04-11 04:29:00 +02:00
|
|
|
},
|
2014-05-05 09:15:18 +02:00
|
|
|
// Force error due to unsupported protocol version.
|
2014-04-11 04:29:00 +02:00
|
|
|
{
|
2014-05-05 09:15:18 +02:00
|
|
|
baseFilterAdd, baseFilterAddEncoded, pverNoFilterAdd, 5,
|
|
|
|
btcwireErr, btcwireErr,
|
2014-04-11 04:29:00 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("Running %d tests", len(tests))
|
|
|
|
for i, test := range tests {
|
|
|
|
// Encode to wire format.
|
|
|
|
w := newFixedWriter(test.max)
|
|
|
|
err := test.in.BtcEncode(w, test.pver)
|
2014-05-05 09:15:18 +02:00
|
|
|
if reflect.TypeOf(err) != reflect.TypeOf(test.writeErr) {
|
2014-04-11 04:29:00 +02:00
|
|
|
t.Errorf("BtcEncode #%d wrong error got: %v, want: %v",
|
|
|
|
i, err, test.writeErr)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2014-05-05 09:15:18 +02:00
|
|
|
// For errors which are not of type btcwire.MessageError, check
|
|
|
|
// them for equality.
|
|
|
|
if _, ok := err.(*btcwire.MessageError); !ok {
|
|
|
|
if err != test.writeErr {
|
|
|
|
t.Errorf("BtcEncode #%d wrong error got: %v, "+
|
|
|
|
"want: %v", i, err, test.writeErr)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-11 04:29:00 +02:00
|
|
|
// Decode from wire format.
|
|
|
|
var msg btcwire.MsgFilterAdd
|
|
|
|
r := newFixedReader(test.max, test.buf)
|
|
|
|
err = msg.BtcDecode(r, test.pver)
|
2014-05-05 09:15:18 +02:00
|
|
|
if reflect.TypeOf(err) != reflect.TypeOf(test.readErr) {
|
2014-04-11 04:29:00 +02:00
|
|
|
t.Errorf("BtcDecode #%d wrong error got: %v, want: %v",
|
|
|
|
i, err, test.readErr)
|
|
|
|
continue
|
|
|
|
}
|
2014-05-05 09:15:18 +02:00
|
|
|
|
|
|
|
// For errors which are not of type btcwire.MessageError, check
|
|
|
|
// them for equality.
|
|
|
|
if _, ok := err.(*btcwire.MessageError); !ok {
|
|
|
|
if err != test.readErr {
|
|
|
|
t.Errorf("BtcDecode #%d wrong error got: %v, "+
|
|
|
|
"want: %v", i, err, test.readErr)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2014-04-11 04:29:00 +02:00
|
|
|
}
|
|
|
|
}
|