|
|
|
@ -765,7 +765,7 @@ func createTestCtx(t *testing.T, startHeight uint32) (*testCtx, error) {
|
|
|
|
|
peerChan chan<- lnpeer.Peer) {
|
|
|
|
|
|
|
|
|
|
pk, _ := btcec.ParsePubKey(target[:])
|
|
|
|
|
peerChan <- &mockPeer{pk, nil, nil}
|
|
|
|
|
peerChan <- &mockPeer{pk, nil, nil, atomic.Bool{}}
|
|
|
|
|
},
|
|
|
|
|
NotifyWhenOffline: func(_ [33]byte) <-chan struct{} {
|
|
|
|
|
c := make(chan struct{})
|
|
|
|
@ -843,7 +843,7 @@ func TestProcessAnnouncement(t *testing.T) {
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nodePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
nodePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
// First, we'll craft a valid remote channel announcement and send it to
|
|
|
|
|
// the gossiper so that it can be processed.
|
|
|
|
@ -953,7 +953,7 @@ func TestPrematureAnnouncement(t *testing.T) {
|
|
|
|
|
_, err = createNodeAnnouncement(remoteKeyPriv1, timestamp)
|
|
|
|
|
require.NoError(t, err, "can't create node announcement")
|
|
|
|
|
|
|
|
|
|
nodePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
nodePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
// Pretending that we receive the valid channel announcement from
|
|
|
|
|
// remote side, but block height of this announcement is greater than
|
|
|
|
@ -990,7 +990,9 @@ func TestSignatureAnnouncementLocalFirst(t *testing.T) {
|
|
|
|
|
pk, _ := btcec.ParsePubKey(target[:])
|
|
|
|
|
|
|
|
|
|
select {
|
|
|
|
|
case peerChan <- &mockPeer{pk, sentMsgs, ctx.gossiper.quit}:
|
|
|
|
|
case peerChan <- &mockPeer{
|
|
|
|
|
pk, sentMsgs, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}:
|
|
|
|
|
case <-ctx.gossiper.quit:
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
@ -1000,7 +1002,9 @@ func TestSignatureAnnouncementLocalFirst(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
remoteKey, err := btcec.ParsePubKey(batch.nodeAnn2.NodeID[:])
|
|
|
|
|
require.NoError(t, err, "unable to parse pubkey")
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, sentMsgs, ctx.gossiper.quit}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKey, sentMsgs, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Recreate lightning network topology. Initialize router with channel
|
|
|
|
|
// between two nodes.
|
|
|
|
@ -1162,7 +1166,9 @@ func TestOrphanSignatureAnnouncement(t *testing.T) {
|
|
|
|
|
pk, _ := btcec.ParsePubKey(target[:])
|
|
|
|
|
|
|
|
|
|
select {
|
|
|
|
|
case peerChan <- &mockPeer{pk, sentMsgs, ctx.gossiper.quit}:
|
|
|
|
|
case peerChan <- &mockPeer{
|
|
|
|
|
pk, sentMsgs, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}:
|
|
|
|
|
case <-ctx.gossiper.quit:
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
@ -1172,7 +1178,9 @@ func TestOrphanSignatureAnnouncement(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
remoteKey, err := btcec.ParsePubKey(batch.nodeAnn2.NodeID[:])
|
|
|
|
|
require.NoError(t, err, "unable to parse pubkey")
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, sentMsgs, ctx.gossiper.quit}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKey, sentMsgs, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Pretending that we receive local channel announcement from funding
|
|
|
|
|
// manager, thereby kick off the announcement exchange process, in
|
|
|
|
@ -1344,7 +1352,9 @@ func TestSignatureAnnouncementRetryAtStartup(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
// Set up a channel to intercept the messages sent to the remote peer.
|
|
|
|
|
sentToPeer := make(chan lnwire.Message, 1)
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, sentToPeer, ctx.gossiper.quit}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKey, sentToPeer, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Since the reliable send to the remote peer of the local channel proof
|
|
|
|
|
// requires a notification when the peer comes online, we'll capture the
|
|
|
|
@ -1578,7 +1588,9 @@ func TestSignatureAnnouncementFullProofWhenRemoteProof(t *testing.T) {
|
|
|
|
|
// Set up a channel we can use to inspect messages sent by the
|
|
|
|
|
// gossiper to the remote peer.
|
|
|
|
|
sentToPeer := make(chan lnwire.Message, 1)
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, sentToPeer, ctx.gossiper.quit}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKey, sentToPeer, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Override NotifyWhenOnline to return the remote peer which we expect
|
|
|
|
|
// meesages to be sent to.
|
|
|
|
@ -1772,7 +1784,7 @@ func TestDeDuplicatedAnnouncements(t *testing.T) {
|
|
|
|
|
ca, err := createRemoteChannelAnnouncement(0)
|
|
|
|
|
require.NoError(t, err, "can't create remote channel announcement")
|
|
|
|
|
|
|
|
|
|
nodePeer := &mockPeer{bitcoinKeyPub2, nil, nil}
|
|
|
|
|
nodePeer := &mockPeer{bitcoinKeyPub2, nil, nil, atomic.Bool{}}
|
|
|
|
|
announcements.AddMsgs(networkMsg{
|
|
|
|
|
msg: ca,
|
|
|
|
|
peer: nodePeer,
|
|
|
|
@ -2058,7 +2070,7 @@ func TestForwardPrivateNodeAnnouncement(t *testing.T) {
|
|
|
|
|
// process it.
|
|
|
|
|
remoteChanAnn, err := createRemoteChannelAnnouncement(startingHeight - 1)
|
|
|
|
|
require.NoError(t, err, "unable to create remote channel announcement")
|
|
|
|
|
peer := &mockPeer{pubKey, nil, nil}
|
|
|
|
|
peer := &mockPeer{pubKey, nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
select {
|
|
|
|
|
case err := <-ctx.gossiper.ProcessRemoteAnnouncement(remoteChanAnn, peer):
|
|
|
|
@ -2373,7 +2385,9 @@ func TestReceiveRemoteChannelUpdateFirst(t *testing.T) {
|
|
|
|
|
// Set up a channel that we can use to inspect the messages sent
|
|
|
|
|
// directly from the gossiper.
|
|
|
|
|
sentMsgs := make(chan lnwire.Message, 10)
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, sentMsgs, ctx.gossiper.quit}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKey, sentMsgs, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Override NotifyWhenOnline to return the remote peer which we expect
|
|
|
|
|
// messages to be sent to.
|
|
|
|
@ -2561,7 +2575,9 @@ func TestExtraDataChannelAnnouncementValidation(t *testing.T) {
|
|
|
|
|
ctx, err := createTestCtx(t, 0)
|
|
|
|
|
require.NoError(t, err, "can't create context")
|
|
|
|
|
|
|
|
|
|
remotePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// We'll now create an announcement that contains an extra set of bytes
|
|
|
|
|
// that we don't know of ourselves, but should still include in the
|
|
|
|
@ -2592,7 +2608,9 @@ func TestExtraDataChannelUpdateValidation(t *testing.T) {
|
|
|
|
|
ctx, err := createTestCtx(t, 0)
|
|
|
|
|
require.NoError(t, err, "can't create context")
|
|
|
|
|
|
|
|
|
|
remotePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// In this scenario, we'll create two announcements, one regular
|
|
|
|
|
// channel announcement, and another channel update announcement, that
|
|
|
|
@ -2643,7 +2661,9 @@ func TestExtraDataNodeAnnouncementValidation(t *testing.T) {
|
|
|
|
|
ctx, err := createTestCtx(t, 0)
|
|
|
|
|
require.NoError(t, err, "can't create context")
|
|
|
|
|
|
|
|
|
|
remotePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
timestamp := testTimestamp
|
|
|
|
|
|
|
|
|
|
// We'll create a node announcement that includes a set of opaque data
|
|
|
|
@ -2716,7 +2736,7 @@ func TestRetransmit(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
remoteKey, err := btcec.ParsePubKey(batch.nodeAnn2.NodeID[:])
|
|
|
|
|
require.NoError(t, err, "unable to parse pubkey")
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil}
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
// Process a local channel announcement, channel update and node
|
|
|
|
|
// announcement. No messages should be broadcasted yet, since no proof
|
|
|
|
@ -2822,7 +2842,7 @@ func TestNodeAnnouncementNoChannels(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
remoteKey, err := btcec.ParsePubKey(batch.nodeAnn2.NodeID[:])
|
|
|
|
|
require.NoError(t, err, "unable to parse pubkey")
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil}
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
// Process the remote node announcement.
|
|
|
|
|
select {
|
|
|
|
@ -2906,7 +2926,7 @@ func TestOptionalFieldsChannelUpdateValidation(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
chanUpdateHeight := uint32(0)
|
|
|
|
|
timestamp := uint32(123456)
|
|
|
|
|
nodePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
nodePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
// In this scenario, we'll test whether the message flags field in a
|
|
|
|
|
// channel update is properly handled.
|
|
|
|
@ -3013,7 +3033,9 @@ func TestSendChannelUpdateReliably(t *testing.T) {
|
|
|
|
|
// Set up a channel we can use to inspect messages sent by the
|
|
|
|
|
// gossiper to the remote peer.
|
|
|
|
|
sentToPeer := make(chan lnwire.Message, 1)
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, sentToPeer, ctx.gossiper.quit}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKey, sentToPeer, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Since we first wait to be notified of the peer before attempting to
|
|
|
|
|
// send the message, we'll overwrite NotifyWhenOnline and
|
|
|
|
@ -3367,7 +3389,9 @@ func TestPropagateChanPolicyUpdate(t *testing.T) {
|
|
|
|
|
remoteKey := remoteKeyPriv1.PubKey()
|
|
|
|
|
|
|
|
|
|
sentMsgs := make(chan lnwire.Message, 10)
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, sentMsgs, ctx.gossiper.quit}
|
|
|
|
|
remotePeer := &mockPeer{
|
|
|
|
|
remoteKey, sentMsgs, ctx.gossiper.quit, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// The forced code path for sending the private ChannelUpdate to the
|
|
|
|
|
// remote peer will be hit, forcing it to request a notification that
|
|
|
|
@ -3715,7 +3739,9 @@ func TestBroadcastAnnsAfterGraphSynced(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
|
|
nodePeer := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
nodePeer := &mockPeer{
|
|
|
|
|
remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
var errChan chan error
|
|
|
|
|
if isRemote {
|
|
|
|
|
errChan = ctx.gossiper.ProcessRemoteAnnouncement(
|
|
|
|
@ -3791,7 +3817,9 @@ func TestRateLimitChannelUpdates(t *testing.T) {
|
|
|
|
|
batch, err := createRemoteAnnouncements(blockHeight)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
nodePeer1 := &mockPeer{remoteKeyPriv1.PubKey(), nil, nil}
|
|
|
|
|
nodePeer1 := &mockPeer{
|
|
|
|
|
remoteKeyPriv1.PubKey(), nil, nil, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
select {
|
|
|
|
|
case err := <-ctx.gossiper.ProcessRemoteAnnouncement(
|
|
|
|
|
batch.chanAnn, nodePeer1,
|
|
|
|
@ -3810,7 +3838,9 @@ func TestRateLimitChannelUpdates(t *testing.T) {
|
|
|
|
|
t.Fatal("remote announcement not processed")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nodePeer2 := &mockPeer{remoteKeyPriv2.PubKey(), nil, nil}
|
|
|
|
|
nodePeer2 := &mockPeer{
|
|
|
|
|
remoteKeyPriv2.PubKey(), nil, nil, atomic.Bool{},
|
|
|
|
|
}
|
|
|
|
|
select {
|
|
|
|
|
case err := <-ctx.gossiper.ProcessRemoteAnnouncement(
|
|
|
|
|
batch.chanUpdAnn2, nodePeer2,
|
|
|
|
@ -3929,7 +3959,7 @@ func TestIgnoreOwnAnnouncement(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
remoteKey, err := btcec.ParsePubKey(batch.nodeAnn2.NodeID[:])
|
|
|
|
|
require.NoError(t, err, "unable to parse pubkey")
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil}
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
// Try to let the remote peer tell us about the channel we are part of.
|
|
|
|
|
select {
|
|
|
|
@ -4075,7 +4105,7 @@ func TestRejectCacheChannelAnn(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
remoteKey, err := btcec.ParsePubKey(batch.nodeAnn2.NodeID[:])
|
|
|
|
|
require.NoError(t, err, "unable to parse pubkey")
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil}
|
|
|
|
|
remotePeer := &mockPeer{remoteKey, nil, nil, atomic.Bool{}}
|
|
|
|
|
|
|
|
|
|
// Before sending over the announcement, we'll modify it such that we
|
|
|
|
|
// know it will always fail.
|
|
|
|
|