mirror of
https://github.com/bitcoin/bitcoin.git
synced 2026-01-31 18:51:12 +00:00
fa4cb13b52030c2e55c6bea170649ab69d75f758 test: [doc] Manually unify stale headers (MarcoFalke)
fa5f29774872d18febc0df38831a6e45f3de69cc scripted-diff: [doc] Unify stale copyright headers (MarcoFalke)
Pull request description:
Historically, the upper year range in file headers was bumped manually
or with a script.
This has many issues:
* The script is causing churn. See for example commit 306ccd4, or
drive-by first-time contributions bumping them one-by-one. (A few from
this year: https://github.com/bitcoin/bitcoin/pull/32008,
https://github.com/bitcoin/bitcoin/pull/31642,
https://github.com/bitcoin/bitcoin/pull/32963, ...)
* Some, or likely most, upper year values were wrong. Reasons for
incorrect dates could be code moves, cherry-picks, or simply bugs in
the script.
* The upper range is not needed for anything.
* Anyone who wants to find the initial file creation date, or file
history, can use `git log` or `git blame` to get more accurate
results.
* Many places are already using the `-present` suffix, with the meaning
that the upper range is omitted.
To fix all issues, this bumps the upper range of the copyright headers
to `-present`.
Further notes:
* Obviously, the yearly 4-line bump commit for the build system (c.f.
b537a2c02a9921235d1ecf8c3c7dc1836ec68131) is fine and will remain.
* For new code, the date range can be fully omitted, as it is done
already by some developers. Obviously, developers are free to pick
whatever style they want. One can list the commits for each style.
* For example, to list all commits that use `-present`:
`git log --format='%an (%ae) [%h: %s]' -S 'present The Bitcoin'`.
* Alternatively, to list all commits that use no range at all:
`git log --format='%an (%ae) [%h: %s]' -S '(c) The Bitcoin'`.
<!--
* The lower range can be wrong as well, so it could be omitted as well,
but this is left for a follow-up. A previous attempt was in
https://github.com/bitcoin/bitcoin/pull/26817.
ACKs for top commit:
l0rinc:
ACK fa4cb13b52030c2e55c6bea170649ab69d75f758
rkrux:
re-ACK fa4cb13b52030c2e55c6bea170649ab69d75f758
janb84:
ACK fa4cb13b52030c2e55c6bea170649ab69d75f758
Tree-SHA512: e5132781bdc4417d1e2922809b27ef4cf0abb37ffb68c65aab8a5391d3c917b61a18928ec2ec2c75ef5184cb79a5b8c8290d63e949220dbeab3bd2c0dfbdc4c5
686 lines
29 KiB
C++
686 lines
29 KiB
C++
// Copyright (c) 2021-present The Bitcoin Core developers
|
|
// Distributed under the MIT software license, see the accompanying
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
#include <netaddress.h>
|
|
#include <net.h>
|
|
#include <test/util/net.h>
|
|
#include <test/util/setup_common.h>
|
|
|
|
#include <boost/test/unit_test.hpp>
|
|
|
|
#include <algorithm>
|
|
#include <functional>
|
|
#include <optional>
|
|
#include <unordered_set>
|
|
#include <vector>
|
|
|
|
BOOST_FIXTURE_TEST_SUITE(net_peer_eviction_tests, BasicTestingSetup)
|
|
|
|
// Create `num_peers` random nodes, apply setup function `candidate_setup_fn`,
|
|
// call ProtectEvictionCandidatesByRatio() to apply protection logic, and then
|
|
// return true if all of `protected_peer_ids` and none of `unprotected_peer_ids`
|
|
// are protected from eviction, i.e. removed from the eviction candidates.
|
|
bool IsProtected(int num_peers,
|
|
std::function<void(NodeEvictionCandidate&)> candidate_setup_fn,
|
|
const std::unordered_set<NodeId>& protected_peer_ids,
|
|
const std::unordered_set<NodeId>& unprotected_peer_ids,
|
|
FastRandomContext& random_context)
|
|
{
|
|
std::vector<NodeEvictionCandidate> candidates{GetRandomNodeEvictionCandidates(num_peers, random_context)};
|
|
for (NodeEvictionCandidate& candidate : candidates) {
|
|
candidate_setup_fn(candidate);
|
|
}
|
|
std::shuffle(candidates.begin(), candidates.end(), random_context);
|
|
|
|
const size_t size{candidates.size()};
|
|
const size_t expected{size - size / 2}; // Expect half the candidates will be protected.
|
|
ProtectEvictionCandidatesByRatio(candidates);
|
|
BOOST_CHECK_EQUAL(candidates.size(), expected);
|
|
|
|
size_t unprotected_count{0};
|
|
for (const NodeEvictionCandidate& candidate : candidates) {
|
|
if (protected_peer_ids.contains(candidate.id)) {
|
|
// this peer should have been removed from the eviction candidates
|
|
BOOST_TEST_MESSAGE(strprintf("expected candidate to be protected: %d", candidate.id));
|
|
return false;
|
|
}
|
|
if (unprotected_peer_ids.contains(candidate.id)) {
|
|
// this peer remains in the eviction candidates, as expected
|
|
++unprotected_count;
|
|
}
|
|
}
|
|
|
|
const bool is_protected{unprotected_count == unprotected_peer_ids.size()};
|
|
if (!is_protected) {
|
|
BOOST_TEST_MESSAGE(strprintf("unprotected: expected %d, actual %d",
|
|
unprotected_peer_ids.size(), unprotected_count));
|
|
}
|
|
return is_protected;
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(peer_protection_test)
|
|
{
|
|
FastRandomContext random_context{true};
|
|
int num_peers{12};
|
|
|
|
// Expect half of the peers with greatest uptime (the lowest m_connected)
|
|
// to be protected from eviction.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = false;
|
|
c.m_network = NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 4, 5},
|
|
/*unprotected_peer_ids=*/{6, 7, 8, 9, 10, 11},
|
|
random_context));
|
|
|
|
// Verify in the opposite direction.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [num_peers](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{num_peers - c.id};
|
|
c.m_is_local = false;
|
|
c.m_network = NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{6, 7, 8, 9, 10, 11},
|
|
/*unprotected_peer_ids=*/{0, 1, 2, 3, 4, 5},
|
|
random_context));
|
|
|
|
// Test protection of onion, localhost, and I2P peers...
|
|
|
|
// Expect 1/4 onion peers to be protected from eviction,
|
|
// if no localhost, I2P, or CJDNS peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_is_local = false;
|
|
c.m_network = (c.id == 3 || c.id == 8 || c.id == 9) ? NET_ONION : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{3, 8, 9},
|
|
/*unprotected_peer_ids=*/{},
|
|
random_context));
|
|
|
|
// Expect 1/4 onion peers and 1/4 of the other peers to be protected,
|
|
// sorted by longest uptime (lowest m_connected), if no localhost, I2P or CJDNS peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = false;
|
|
c.m_network = (c.id == 3 || c.id > 7) ? NET_ONION : NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 8, 9},
|
|
/*unprotected_peer_ids=*/{4, 5, 6, 7, 10, 11},
|
|
random_context));
|
|
|
|
// Expect 1/4 localhost peers to be protected from eviction,
|
|
// if no onion, I2P, or CJDNS peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_is_local = (c.id == 1 || c.id == 9 || c.id == 11);
|
|
c.m_network = NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{1, 9, 11},
|
|
/*unprotected_peer_ids=*/{},
|
|
random_context));
|
|
|
|
// Expect 1/4 localhost peers and 1/4 of the other peers to be protected,
|
|
// sorted by longest uptime (lowest m_connected), if no onion, I2P, or CJDNS peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id > 6);
|
|
c.m_network = NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 7, 8, 9},
|
|
/*unprotected_peer_ids=*/{3, 4, 5, 6, 10, 11},
|
|
random_context));
|
|
|
|
// Expect 1/4 I2P peers to be protected from eviction,
|
|
// if no onion, localhost, or CJDNS peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_is_local = false;
|
|
c.m_network = (c.id == 2 || c.id == 7 || c.id == 10) ? NET_I2P : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{2, 7, 10},
|
|
/*unprotected_peer_ids=*/{},
|
|
random_context));
|
|
|
|
// Expect 1/4 I2P peers and 1/4 of the other peers to be protected, sorted
|
|
// by longest uptime (lowest m_connected), if no onion, localhost, or CJDNS peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = false;
|
|
c.m_network = (c.id == 4 || c.id > 8) ? NET_I2P : NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 4, 9, 10},
|
|
/*unprotected_peer_ids=*/{3, 5, 6, 7, 8, 11},
|
|
random_context));
|
|
|
|
// Expect 1/4 CJDNS peers to be protected from eviction,
|
|
// if no onion, localhost, or I2P peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_is_local = false;
|
|
c.m_network = (c.id == 2 || c.id == 7 || c.id == 10) ? NET_CJDNS : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{2, 7, 10},
|
|
/*unprotected_peer_ids=*/{},
|
|
random_context));
|
|
|
|
// Expect 1/4 CJDNS peers and 1/4 of the other peers to be protected, sorted
|
|
// by longest uptime (lowest m_connected), if no onion, localhost, or I2P peers.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = false;
|
|
c.m_network = (c.id == 4 || c.id > 8) ? NET_CJDNS : NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 4, 9, 10},
|
|
/*unprotected_peer_ids=*/{3, 5, 6, 7, 8, 11},
|
|
random_context));
|
|
|
|
// Tests with 2 networks...
|
|
|
|
// Combined test: expect having 1 localhost and 1 onion peer out of 4 to
|
|
// protect 1 localhost, 0 onion and 1 other peer, sorted by longest uptime;
|
|
// stable sort breaks tie with array order of localhost first.
|
|
BOOST_CHECK(IsProtected(
|
|
4, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 4);
|
|
c.m_network = (c.id == 3) ? NET_ONION : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{0, 4},
|
|
/*unprotected_peer_ids=*/{1, 2},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost and 1 onion peer out of 7 to
|
|
// protect 1 localhost, 0 onion, and 2 other peers (3 total), sorted by
|
|
// uptime; stable sort breaks tie with array order of localhost first.
|
|
BOOST_CHECK(IsProtected(
|
|
7, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 6);
|
|
c.m_network = (c.id == 5) ? NET_ONION : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 6},
|
|
/*unprotected_peer_ids=*/{2, 3, 4, 5},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost and 1 onion peer out of 8 to
|
|
// protect protect 1 localhost, 1 onion and 2 other peers (4 total), sorted
|
|
// by uptime; stable sort breaks tie with array order of localhost first.
|
|
BOOST_CHECK(IsProtected(
|
|
8, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 6);
|
|
c.m_network = (c.id == 5) ? NET_ONION : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 5, 6},
|
|
/*unprotected_peer_ids=*/{2, 3, 4, 7},
|
|
random_context));
|
|
|
|
// Combined test: expect having 3 localhost and 3 onion peers out of 12 to
|
|
// protect 2 localhost and 1 onion, plus 3 other peers, sorted by longest
|
|
// uptime; stable sort breaks ties with the array order of localhost first.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 6 || c.id == 9 || c.id == 11);
|
|
c.m_network = (c.id == 7 || c.id == 8 || c.id == 10) ? NET_ONION : NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 6, 7, 9},
|
|
/*unprotected_peer_ids=*/{3, 4, 5, 8, 10, 11},
|
|
random_context));
|
|
|
|
// Combined test: expect having 4 localhost and 1 onion peer out of 12 to
|
|
// protect 2 localhost and 1 onion, plus 3 other peers, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id > 4 && c.id < 9);
|
|
c.m_network = (c.id == 10) ? NET_ONION : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 5, 6, 10},
|
|
/*unprotected_peer_ids=*/{3, 4, 7, 8, 9, 11},
|
|
random_context));
|
|
|
|
// Combined test: expect having 4 localhost and 2 onion peers out of 16 to
|
|
// protect 2 localhost and 2 onions, plus 4 other peers, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
16, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 6 || c.id == 9 || c.id == 11 || c.id == 12);
|
|
c.m_network = (c.id == 8 || c.id == 10) ? NET_ONION : NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 6, 8, 9, 10},
|
|
/*unprotected_peer_ids=*/{4, 5, 7, 11, 12, 13, 14, 15},
|
|
random_context));
|
|
|
|
// Combined test: expect having 5 localhost and 1 onion peer out of 16 to
|
|
// protect 3 localhost (recovering the unused onion slot), 1 onion, and 4
|
|
// others, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
16, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id > 10);
|
|
c.m_network = (c.id == 10) ? NET_ONION : NET_IPV4;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 10, 11, 12, 13},
|
|
/*unprotected_peer_ids=*/{4, 5, 6, 7, 8, 9, 14, 15},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost and 4 onion peers out of 16 to
|
|
// protect 1 localhost and 3 onions (recovering the unused localhost slot),
|
|
// plus 4 others, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
16, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 15);
|
|
c.m_network = (c.id > 6 && c.id < 11) ? NET_ONION : NET_IPV6;
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 7, 8, 9, 15},
|
|
/*unprotected_peer_ids=*/{5, 6, 10, 11, 12, 13, 14},
|
|
random_context));
|
|
|
|
// Combined test: expect having 2 onion and 4 I2P out of 12 peers to protect
|
|
// 2 onion (prioritized for having fewer candidates) and 1 I2P, plus 3
|
|
// others, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
num_peers, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = false;
|
|
if (c.id == 8 || c.id == 10) {
|
|
c.m_network = NET_ONION;
|
|
} else if (c.id == 6 || c.id == 9 || c.id == 11 || c.id == 12) {
|
|
c.m_network = NET_I2P;
|
|
} else {
|
|
c.m_network = NET_IPV4;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 6, 8, 10},
|
|
/*unprotected_peer_ids=*/{3, 4, 5, 7, 9, 11},
|
|
random_context));
|
|
|
|
// Tests with 3 networks...
|
|
|
|
// Combined test: expect having 1 localhost, 1 I2P and 1 onion peer out of 4
|
|
// to protect 1 I2P, 0 localhost, 0 onion and 1 other peer (2 total), sorted
|
|
// by longest uptime; stable sort breaks tie with array order of I2P first.
|
|
BOOST_CHECK(IsProtected(
|
|
4, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 2);
|
|
if (c.id == 3) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 1) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 3},
|
|
/*unprotected_peer_ids=*/{1, 2},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost, 1 I2P and 1 onion peer out of 7
|
|
// to protect 1 I2P, 0 localhost, 0 onion and 2 other peers (3 total) sorted
|
|
// by longest uptime; stable sort breaks tie with array order of I2P first.
|
|
BOOST_CHECK(IsProtected(
|
|
7, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 4);
|
|
if (c.id == 6) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 5) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 6},
|
|
/*unprotected_peer_ids=*/{2, 3, 4, 5},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost, 1 I2P and 1 onion peer out of 8
|
|
// to protect 1 I2P, 1 localhost, 0 onion and 2 other peers (4 total) sorted
|
|
// by uptime; stable sort breaks tie with array order of I2P then localhost.
|
|
BOOST_CHECK(IsProtected(
|
|
8, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 6);
|
|
if (c.id == 5) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 4) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 5, 6},
|
|
/*unprotected_peer_ids=*/{2, 3, 4, 7},
|
|
random_context));
|
|
|
|
// Combined test: expect having 4 localhost, 2 I2P, and 2 onion peers out of
|
|
// 16 to protect 1 localhost, 2 I2P, and 1 onion (4/16 total), plus 4 others
|
|
// for 8 total, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
16, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 6 || c.id > 11);
|
|
if (c.id == 7 || c.id == 11) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 9 || c.id == 10) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV4;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 6, 7, 9, 11},
|
|
/*unprotected_peer_ids=*/{4, 5, 8, 10, 12, 13, 14, 15},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost, 8 I2P and 1 onion peer out of
|
|
// 24 to protect 1, 4, and 1 (6 total), plus 6 others for 12/24 total,
|
|
// sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
24, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 12);
|
|
if (c.id > 14 && c.id < 23) { // 4 protected instead of usual 2
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 23) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 4, 5, 12, 15, 16, 17, 18, 23},
|
|
/*unprotected_peer_ids=*/{6, 7, 8, 9, 10, 11, 13, 14, 19, 20, 21, 22},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost, 3 I2P and 6 onion peers out of
|
|
// 24 to protect 1, 3, and 2 (6 total, I2P has fewer candidates and so gets the
|
|
// unused localhost slot), plus 6 others for 12/24 total, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
24, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 15);
|
|
if (c.id == 12 || c.id == 14 || c.id == 17) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id > 17) { // 4 protected instead of usual 2
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV4;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 4, 5, 12, 14, 15, 17, 18, 19},
|
|
/*unprotected_peer_ids=*/{6, 7, 8, 9, 10, 11, 13, 16, 20, 21, 22, 23},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 localhost, 7 I2P and 4 onion peers out of
|
|
// 24 to protect 1 localhost, 2 I2P, and 3 onions (6 total), plus 6 others
|
|
// for 12/24 total, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
24, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 13);
|
|
if (c.id > 16) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 12 || c.id == 14 || c.id == 15 || c.id == 16) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 4, 5, 12, 13, 14, 15, 17, 18},
|
|
/*unprotected_peer_ids=*/{6, 7, 8, 9, 10, 11, 16, 19, 20, 21, 22, 23},
|
|
random_context));
|
|
|
|
// Combined test: expect having 8 localhost, 4 CJDNS, and 3 onion peers out
|
|
// of 24 to protect 2 of each (6 total), plus 6 others for 12/24 total,
|
|
// sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
24, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id > 15);
|
|
if (c.id > 10 && c.id < 15) {
|
|
c.m_network = NET_CJDNS;
|
|
} else if (c.id > 6 && c.id < 10) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV4;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 4, 5, 7, 8, 11, 12, 16, 17},
|
|
/*unprotected_peer_ids=*/{6, 9, 10, 13, 14, 15, 18, 19, 20, 21, 22, 23},
|
|
random_context));
|
|
|
|
// Tests with 4 networks...
|
|
|
|
// Combined test: expect having 1 CJDNS, 1 I2P, 1 localhost and 1 onion peer
|
|
// out of 5 to protect 1 CJDNS, 0 I2P, 0 localhost, 0 onion and 1 other peer
|
|
// (2 total), sorted by longest uptime; stable sort breaks tie with array
|
|
// order of CJDNS first.
|
|
BOOST_CHECK(IsProtected(
|
|
5, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 3);
|
|
if (c.id == 4) {
|
|
c.m_network = NET_CJDNS;
|
|
} else if (c.id == 1) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 2) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 4},
|
|
/*unprotected_peer_ids=*/{1, 2, 3},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 CJDNS, 1 I2P, 1 localhost and 1 onion peer
|
|
// out of 7 to protect 1 CJDNS, 0, I2P, 0 localhost, 0 onion and 2 other
|
|
// peers (3 total) sorted by longest uptime; stable sort breaks tie with
|
|
// array order of CJDNS first.
|
|
BOOST_CHECK(IsProtected(
|
|
7, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 4);
|
|
if (c.id == 6) {
|
|
c.m_network = NET_CJDNS;
|
|
} else if (c.id == 5) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 3) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV4;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 6},
|
|
/*unprotected_peer_ids=*/{2, 3, 4, 5},
|
|
random_context));
|
|
|
|
// Combined test: expect having 1 CJDNS, 1 I2P, 1 localhost and 1 onion peer
|
|
// out of 8 to protect 1 CJDNS, 1 I2P, 0 localhost, 0 onion and 2 other
|
|
// peers (4 total) sorted by longest uptime; stable sort breaks tie with
|
|
// array order of CJDNS first.
|
|
BOOST_CHECK(IsProtected(
|
|
8, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 3);
|
|
if (c.id == 5) {
|
|
c.m_network = NET_CJDNS;
|
|
} else if (c.id == 6) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 3) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 5, 6},
|
|
/*unprotected_peer_ids=*/{2, 3, 4, 7},
|
|
random_context));
|
|
|
|
// Combined test: expect having 2 CJDNS, 2 I2P, 4 localhost, and 2 onion
|
|
// peers out of 16 to protect 1 CJDNS, 1 I2P, 1 localhost, 1 onion (4/16
|
|
// total), plus 4 others for 8 total, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
16, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id > 5);
|
|
if (c.id == 11 || c.id == 15) {
|
|
c.m_network = NET_CJDNS;
|
|
} else if (c.id == 10 || c.id == 14) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 8 || c.id == 9) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV4;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 6, 8, 10, 11},
|
|
/*unprotected_peer_ids=*/{4, 5, 7, 9, 12, 13, 14, 15},
|
|
random_context));
|
|
|
|
// Combined test: expect having 6 CJDNS, 1 I2P, 1 localhost, and 4 onion
|
|
// peers out of 24 to protect 2 CJDNS, 1 I2P, 1 localhost, and 2 onions (6
|
|
// total), plus 6 others for 12/24 total, sorted by longest uptime.
|
|
BOOST_CHECK(IsProtected(
|
|
24, [](NodeEvictionCandidate& c) {
|
|
c.m_connected = std::chrono::seconds{c.id};
|
|
c.m_is_local = (c.id == 13);
|
|
if (c.id > 17) {
|
|
c.m_network = NET_CJDNS;
|
|
} else if (c.id == 17) {
|
|
c.m_network = NET_I2P;
|
|
} else if (c.id == 12 || c.id == 14 || c.id == 15 || c.id == 16) {
|
|
c.m_network = NET_ONION;
|
|
} else {
|
|
c.m_network = NET_IPV6;
|
|
}
|
|
},
|
|
/*protected_peer_ids=*/{0, 1, 2, 3, 4, 5, 12, 13, 14, 17, 18, 19},
|
|
/*unprotected_peer_ids=*/{6, 7, 8, 9, 10, 11, 15, 16, 20, 21, 22, 23},
|
|
random_context));
|
|
}
|
|
|
|
// Returns true if any of the node ids in node_ids are selected for eviction.
|
|
bool IsEvicted(std::vector<NodeEvictionCandidate> candidates, const std::unordered_set<NodeId>& node_ids, FastRandomContext& random_context)
|
|
{
|
|
std::shuffle(candidates.begin(), candidates.end(), random_context);
|
|
const std::optional<NodeId> evicted_node_id = SelectNodeToEvict(std::move(candidates));
|
|
if (!evicted_node_id) {
|
|
return false;
|
|
}
|
|
return node_ids.contains(*evicted_node_id);
|
|
}
|
|
|
|
// Create number_of_nodes random nodes, apply setup function candidate_setup_fn,
|
|
// apply eviction logic and then return true if any of the node ids in node_ids
|
|
// are selected for eviction.
|
|
bool IsEvicted(const int number_of_nodes, std::function<void(NodeEvictionCandidate&)> candidate_setup_fn, const std::unordered_set<NodeId>& node_ids, FastRandomContext& random_context)
|
|
{
|
|
std::vector<NodeEvictionCandidate> candidates = GetRandomNodeEvictionCandidates(number_of_nodes, random_context);
|
|
for (NodeEvictionCandidate& candidate : candidates) {
|
|
candidate_setup_fn(candidate);
|
|
}
|
|
return IsEvicted(candidates, node_ids, random_context);
|
|
}
|
|
|
|
BOOST_AUTO_TEST_CASE(peer_eviction_test)
|
|
{
|
|
FastRandomContext random_context{true};
|
|
|
|
for (int number_of_nodes = 0; number_of_nodes < 200; ++number_of_nodes) {
|
|
// Four nodes with the highest keyed netgroup values should be
|
|
// protected from eviction.
|
|
BOOST_CHECK(!IsEvicted(
|
|
number_of_nodes, [number_of_nodes](NodeEvictionCandidate& candidate) {
|
|
candidate.nKeyedNetGroup = number_of_nodes - candidate.id;
|
|
},
|
|
{0, 1, 2, 3}, random_context));
|
|
|
|
// Eight nodes with the lowest minimum ping time should be protected
|
|
// from eviction.
|
|
BOOST_CHECK(!IsEvicted(
|
|
number_of_nodes, [](NodeEvictionCandidate& candidate) {
|
|
candidate.m_min_ping_time = std::chrono::microseconds{candidate.id};
|
|
},
|
|
{0, 1, 2, 3, 4, 5, 6, 7}, random_context));
|
|
|
|
// Four nodes that most recently sent us novel transactions accepted
|
|
// into our mempool should be protected from eviction.
|
|
BOOST_CHECK(!IsEvicted(
|
|
number_of_nodes, [number_of_nodes](NodeEvictionCandidate& candidate) {
|
|
candidate.m_last_tx_time = std::chrono::seconds{number_of_nodes - candidate.id};
|
|
},
|
|
{0, 1, 2, 3}, random_context));
|
|
|
|
// Up to eight non-tx-relay peers that most recently sent us novel
|
|
// blocks should be protected from eviction.
|
|
BOOST_CHECK(!IsEvicted(
|
|
number_of_nodes, [number_of_nodes](NodeEvictionCandidate& candidate) {
|
|
candidate.m_last_block_time = std::chrono::seconds{number_of_nodes - candidate.id};
|
|
if (candidate.id <= 7) {
|
|
candidate.m_relay_txs = false;
|
|
candidate.fRelevantServices = true;
|
|
}
|
|
},
|
|
{0, 1, 2, 3, 4, 5, 6, 7}, random_context));
|
|
|
|
// Four peers that most recently sent us novel blocks should be
|
|
// protected from eviction.
|
|
BOOST_CHECK(!IsEvicted(
|
|
number_of_nodes, [number_of_nodes](NodeEvictionCandidate& candidate) {
|
|
candidate.m_last_block_time = std::chrono::seconds{number_of_nodes - candidate.id};
|
|
},
|
|
{0, 1, 2, 3}, random_context));
|
|
|
|
// Combination of the previous two tests.
|
|
BOOST_CHECK(!IsEvicted(
|
|
number_of_nodes, [number_of_nodes](NodeEvictionCandidate& candidate) {
|
|
candidate.m_last_block_time = std::chrono::seconds{number_of_nodes - candidate.id};
|
|
if (candidate.id <= 7) {
|
|
candidate.m_relay_txs = false;
|
|
candidate.fRelevantServices = true;
|
|
}
|
|
},
|
|
{0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11}, random_context));
|
|
|
|
// Combination of all tests above.
|
|
BOOST_CHECK(!IsEvicted(
|
|
number_of_nodes, [number_of_nodes](NodeEvictionCandidate& candidate) {
|
|
candidate.nKeyedNetGroup = number_of_nodes - candidate.id; // 4 protected
|
|
candidate.m_min_ping_time = std::chrono::microseconds{candidate.id}; // 8 protected
|
|
candidate.m_last_tx_time = std::chrono::seconds{number_of_nodes - candidate.id}; // 4 protected
|
|
candidate.m_last_block_time = std::chrono::seconds{number_of_nodes - candidate.id}; // 4 protected
|
|
},
|
|
{0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19}, random_context));
|
|
|
|
// An eviction is expected given >= 29 random eviction candidates. The eviction logic protects at most
|
|
// four peers by net group, eight by lowest ping time, four by last time of novel tx, up to eight non-tx-relay
|
|
// peers by last novel block time, and four more peers by last novel block time.
|
|
if (number_of_nodes >= 29) {
|
|
BOOST_CHECK(SelectNodeToEvict(GetRandomNodeEvictionCandidates(number_of_nodes, random_context)));
|
|
}
|
|
|
|
// No eviction is expected given <= 20 random eviction candidates. The eviction logic protects at least
|
|
// four peers by net group, eight by lowest ping time, four by last time of novel tx and four peers by last
|
|
// novel block time.
|
|
if (number_of_nodes <= 20) {
|
|
BOOST_CHECK(!SelectNodeToEvict(GetRandomNodeEvictionCandidates(number_of_nodes, random_context)));
|
|
}
|
|
|
|
// Cases left to test:
|
|
// * "If any remaining peers are preferred for eviction consider only them. [...]"
|
|
// * "Identify the network group with the most connections and youngest member. [...]"
|
|
}
|
|
}
|
|
|
|
BOOST_AUTO_TEST_SUITE_END()
|