2020-04-10 16:10:23 +02:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
# Copyright (c) 2020 The Bitcoin Core developers
|
|
|
|
# Distributed under the MIT software license, see the accompanying
|
|
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
"""
|
|
|
|
Test addr relay
|
|
|
|
"""
|
|
|
|
|
|
|
|
from test_framework.messages import (
|
|
|
|
CAddress,
|
|
|
|
NODE_NETWORK,
|
|
|
|
msg_addr,
|
2024-04-12 18:34:32 +02:00
|
|
|
msg_getaddr,
|
|
|
|
msg_verack
|
2020-04-10 16:10:23 +02:00
|
|
|
)
|
2024-04-12 18:40:58 +02:00
|
|
|
from test_framework.p2p import (
|
|
|
|
P2PInterface,
|
|
|
|
p2p_lock,
|
2020-04-10 16:10:23 +02:00
|
|
|
)
|
2024-04-12 18:40:58 +02:00
|
|
|
from test_framework.test_framework import BitcoinTestFramework
|
2024-04-12 18:34:32 +02:00
|
|
|
from test_framework.util import assert_equal, assert_greater_than
|
2024-04-12 18:40:58 +02:00
|
|
|
import random
|
2020-04-10 16:10:23 +02:00
|
|
|
|
2024-04-02 17:28:22 +02:00
|
|
|
|
2020-04-10 16:10:23 +02:00
|
|
|
class AddrReceiver(P2PInterface):
|
2024-03-26 18:39:35 +01:00
|
|
|
num_ipv4_received = 0
|
2024-04-03 13:19:36 +02:00
|
|
|
test_addr_contents = False
|
2024-04-12 18:40:58 +02:00
|
|
|
_tokens = 1
|
2024-04-12 18:34:32 +02:00
|
|
|
send_getaddr = True
|
2024-03-26 18:39:35 +01:00
|
|
|
|
2024-04-12 18:34:32 +02:00
|
|
|
def __init__(self, test_addr_contents=False, send_getaddr=True):
|
2024-04-03 13:19:36 +02:00
|
|
|
super().__init__()
|
|
|
|
self.test_addr_contents = test_addr_contents
|
2024-04-12 18:34:32 +02:00
|
|
|
self.send_getaddr = send_getaddr
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
def on_addr(self, message):
|
|
|
|
for addr in message.addrs:
|
|
|
|
self.num_ipv4_received += 1
|
2024-04-03 13:19:36 +02:00
|
|
|
if(self.test_addr_contents):
|
|
|
|
# relay_tests checks the content of the addr messages match
|
|
|
|
# expectations based on the message creation in setup_addr_msg
|
|
|
|
assert_equal(addr.nServices, 1)
|
|
|
|
if not 8333 <= addr.port < 8343:
|
|
|
|
raise AssertionError("Invalid addr.port of {} (8333-8342 expected)".format(addr.port))
|
|
|
|
assert addr.ip.startswith('123.123.123.')
|
2024-04-02 18:15:27 +02:00
|
|
|
|
2024-04-12 18:40:58 +02:00
|
|
|
def on_getaddr(self, message):
|
|
|
|
# When the node sends us a getaddr, it increments the addr relay tokens for the connection by 1000
|
|
|
|
self._tokens += 1000
|
|
|
|
|
|
|
|
@property
|
|
|
|
def tokens(self):
|
|
|
|
with p2p_lock:
|
|
|
|
return self._tokens
|
|
|
|
|
|
|
|
def increment_tokens(self, n):
|
|
|
|
# When we move mocktime forward, the node increments the addr relay tokens for its peers
|
|
|
|
with p2p_lock:
|
|
|
|
self._tokens += n
|
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
def addr_received(self):
|
|
|
|
return self.num_ipv4_received != 0
|
|
|
|
|
2024-04-12 18:34:32 +02:00
|
|
|
def on_version(self, message):
|
|
|
|
self.send_message(msg_verack())
|
|
|
|
if (self.send_getaddr):
|
|
|
|
self.send_message(msg_getaddr())
|
|
|
|
|
2024-04-03 13:19:36 +02:00
|
|
|
def getaddr_received(self):
|
|
|
|
return self.message_count['getaddr'] > 0
|
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
|
2020-04-10 16:10:23 +02:00
|
|
|
class AddrTest(BitcoinTestFramework):
|
2024-04-02 18:15:27 +02:00
|
|
|
counter = 0
|
|
|
|
|
2020-04-10 16:10:23 +02:00
|
|
|
def set_test_params(self):
|
|
|
|
self.num_nodes = 1
|
2024-04-12 18:40:58 +02:00
|
|
|
self.extra_args = [["-whitelist=addr@127.0.0.1"]]
|
2020-04-10 16:10:23 +02:00
|
|
|
|
|
|
|
def run_test(self):
|
2024-04-02 18:15:27 +02:00
|
|
|
self.oversized_addr_test()
|
|
|
|
self.relay_tests()
|
2024-04-12 18:34:32 +02:00
|
|
|
self.inbound_blackhole_tests()
|
|
|
|
|
|
|
|
# This test populates the addrman, which can impact the node's behavior
|
|
|
|
# in subsequent tests
|
2024-04-02 18:15:27 +02:00
|
|
|
self.getaddr_tests()
|
|
|
|
self.blocksonly_mode_tests()
|
2024-04-12 18:40:58 +02:00
|
|
|
self.rate_limit_tests()
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
def setup_addr_msg(self, num):
|
|
|
|
addrs = []
|
|
|
|
for i in range(num):
|
2024-04-02 16:37:37 +02:00
|
|
|
addr = CAddress()
|
2024-04-02 18:15:27 +02:00
|
|
|
addr.time = self.mocktime + i
|
2024-04-02 16:37:37 +02:00
|
|
|
addr.nServices = NODE_NETWORK
|
2024-04-02 18:15:27 +02:00
|
|
|
addr.ip = f"123.123.123.{self.counter % 256}"
|
2024-04-02 16:37:37 +02:00
|
|
|
addr.port = 8333 + i
|
2024-04-02 18:15:27 +02:00
|
|
|
addrs.append(addr)
|
|
|
|
self.counter += 1
|
2024-04-02 16:37:37 +02:00
|
|
|
|
2020-04-10 16:10:23 +02:00
|
|
|
msg = msg_addr()
|
2024-04-02 18:15:27 +02:00
|
|
|
msg.addrs = addrs
|
|
|
|
return msg
|
|
|
|
|
2024-04-12 18:40:58 +02:00
|
|
|
def setup_rand_addr_msg(self, num):
|
|
|
|
addrs = []
|
|
|
|
for i in range(num):
|
|
|
|
addr = CAddress()
|
|
|
|
addr.time = self.mocktime + i
|
|
|
|
addr.nServices = NODE_NETWORK
|
|
|
|
addr.ip = f"{random.randrange(128,169)}.{random.randrange(1,255)}.{random.randrange(1,255)}.{random.randrange(1,255)}"
|
|
|
|
addr.port = 8333
|
|
|
|
addrs.append(addr)
|
|
|
|
msg = msg_addr()
|
|
|
|
msg.addrs = addrs
|
|
|
|
return msg
|
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
def send_addr_msg(self, source, msg, receivers):
|
|
|
|
source.send_and_ping(msg)
|
|
|
|
# pop m_next_addr_send timer
|
2024-04-03 13:19:36 +02:00
|
|
|
self.bump_mocktime(10 * 60)
|
2024-04-02 18:15:27 +02:00
|
|
|
for peer in receivers:
|
2024-04-03 13:19:36 +02:00
|
|
|
peer.sync_with_ping()
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
def oversized_addr_test(self):
|
|
|
|
self.log.info('Send an addr message that is too large')
|
|
|
|
addr_source = self.nodes[0].add_p2p_connection(P2PInterface())
|
2020-04-10 16:10:23 +02:00
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
msg = self.setup_addr_msg(1010)
|
2020-04-10 16:10:23 +02:00
|
|
|
with self.nodes[0].assert_debug_log(['addr message size = 1010']):
|
|
|
|
addr_source.send_and_ping(msg)
|
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
self.nodes[0].disconnect_p2ps()
|
|
|
|
|
|
|
|
def relay_tests(self):
|
|
|
|
self.log.info('Test address relay')
|
2020-04-10 16:10:23 +02:00
|
|
|
self.log.info('Check that addr message content is relayed and added to addrman')
|
2024-04-02 18:15:27 +02:00
|
|
|
addr_source = self.nodes[0].add_p2p_connection(P2PInterface())
|
2024-03-26 18:39:35 +01:00
|
|
|
num_receivers = 7
|
|
|
|
receivers = []
|
|
|
|
for _ in range(num_receivers):
|
2024-04-03 13:19:36 +02:00
|
|
|
receivers.append(self.nodes[0].add_p2p_connection(AddrReceiver(test_addr_contents=True)))
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
# Keep this with length <= 10. Addresses from larger messages are not
|
|
|
|
# relayed.
|
|
|
|
num_ipv4_addrs = 10
|
|
|
|
msg = self.setup_addr_msg(num_ipv4_addrs)
|
2024-03-26 18:39:35 +01:00
|
|
|
with self.nodes[0].assert_debug_log(
|
|
|
|
[
|
2024-04-02 18:15:27 +02:00
|
|
|
'received: addr (301 bytes) peer=1',
|
2024-03-26 18:39:35 +01:00
|
|
|
]
|
|
|
|
):
|
2024-04-02 18:15:27 +02:00
|
|
|
self.send_addr_msg(addr_source, msg, receivers)
|
2024-03-26 18:39:35 +01:00
|
|
|
|
|
|
|
total_ipv4_received = sum(r.num_ipv4_received for r in receivers)
|
|
|
|
|
|
|
|
# Every IPv4 address must be relayed to two peers, other than the
|
|
|
|
# originating node (addr_source).
|
|
|
|
ipv4_branching_factor = 2
|
|
|
|
assert_equal(total_ipv4_received, num_ipv4_addrs * ipv4_branching_factor)
|
2020-04-10 16:10:23 +02:00
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
self.nodes[0].disconnect_p2ps()
|
|
|
|
|
|
|
|
self.log.info('Check relay of addresses received from outbound peers')
|
2024-04-12 18:34:32 +02:00
|
|
|
inbound_peer = self.nodes[0].add_p2p_connection(AddrReceiver(test_addr_contents=True, send_getaddr=False))
|
2024-04-03 13:19:36 +02:00
|
|
|
full_outbound_peer = self.nodes[0].add_outbound_p2p_connection(AddrReceiver(), p2p_idx=0, connection_type="outbound-full-relay")
|
2024-04-02 18:15:27 +02:00
|
|
|
msg = self.setup_addr_msg(2)
|
|
|
|
self.send_addr_msg(full_outbound_peer, msg, [inbound_peer])
|
|
|
|
self.log.info('Check that the first addr message received from an outbound peer is not relayed')
|
|
|
|
# Currently, there is a flag that prevents the first addr message received
|
|
|
|
# from a new outbound peer to be relayed to others. Originally meant to prevent
|
|
|
|
# large GETADDR responses from being relayed, it now typically affects the self-announcement
|
|
|
|
# of the outbound peer which is often sent before the GETADDR response.
|
|
|
|
assert_equal(inbound_peer.num_ipv4_received, 0)
|
|
|
|
|
2021-08-03 18:25:38 +02:00
|
|
|
# Send an empty ADDR message to initialize address relay on this connection.
|
2024-04-12 18:34:32 +02:00
|
|
|
inbound_peer.send_and_ping(msg_addr())
|
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
self.log.info('Check that subsequent addr messages sent from an outbound peer are relayed')
|
|
|
|
msg2 = self.setup_addr_msg(2)
|
|
|
|
self.send_addr_msg(full_outbound_peer, msg2, [inbound_peer])
|
|
|
|
assert_equal(inbound_peer.num_ipv4_received, 2)
|
|
|
|
|
|
|
|
self.log.info('Check address relay to outbound peers')
|
2024-04-03 13:19:36 +02:00
|
|
|
block_relay_peer = self.nodes[0].add_outbound_p2p_connection(AddrReceiver(), p2p_idx=1, connection_type="block-relay-only")
|
2024-04-02 18:15:27 +02:00
|
|
|
msg3 = self.setup_addr_msg(2)
|
|
|
|
self.send_addr_msg(inbound_peer, msg3, [full_outbound_peer, block_relay_peer])
|
|
|
|
|
|
|
|
self.log.info('Check that addresses are relayed to full outbound peers')
|
|
|
|
assert_equal(full_outbound_peer.num_ipv4_received, 2)
|
|
|
|
self.log.info('Check that addresses are not relayed to block-relay-only outbound peers')
|
|
|
|
assert_equal(block_relay_peer.num_ipv4_received, 0)
|
|
|
|
|
|
|
|
self.nodes[0].disconnect_p2ps()
|
|
|
|
|
2024-04-12 18:34:32 +02:00
|
|
|
def sum_addr_messages(self, msgs_dict):
|
|
|
|
return sum(bytes_received for (msg, bytes_received) in msgs_dict.items() if msg in ['addr', 'addrv2', 'getaddr'])
|
|
|
|
|
|
|
|
def inbound_blackhole_tests(self):
|
|
|
|
self.log.info('Check that we only relay addresses to inbound peers who have previously sent us addr related messages')
|
|
|
|
|
|
|
|
addr_source = self.nodes[0].add_p2p_connection(P2PInterface())
|
|
|
|
receiver_peer = self.nodes[0].add_p2p_connection(AddrReceiver())
|
|
|
|
blackhole_peer = self.nodes[0].add_p2p_connection(AddrReceiver(send_getaddr=False))
|
|
|
|
initial_addrs_received = receiver_peer.num_ipv4_received
|
|
|
|
|
|
|
|
peerinfo = self.nodes[0].getpeerinfo()
|
|
|
|
assert_equal(peerinfo[0]['addr_relay_enabled'], True) # addr_source
|
|
|
|
assert_equal(peerinfo[1]['addr_relay_enabled'], True) # receiver_peer
|
|
|
|
assert_equal(peerinfo[2]['addr_relay_enabled'], False) # blackhole_peer
|
|
|
|
|
|
|
|
# addr_source sends 2 addresses to node0
|
|
|
|
msg = self.setup_addr_msg(2)
|
|
|
|
addr_source.send_and_ping(msg)
|
|
|
|
self.bump_mocktime(30 * 60)
|
|
|
|
receiver_peer.sync_with_ping()
|
|
|
|
blackhole_peer.sync_with_ping()
|
|
|
|
|
|
|
|
peerinfo = self.nodes[0].getpeerinfo()
|
|
|
|
|
|
|
|
# Confirm node received addr-related messages from receiver peer
|
|
|
|
assert_greater_than(self.sum_addr_messages(peerinfo[1]['bytesrecv_per_msg']), 0)
|
|
|
|
# And that peer received addresses
|
|
|
|
assert_equal(receiver_peer.num_ipv4_received - initial_addrs_received, 2)
|
|
|
|
|
|
|
|
# Confirm node has not received addr-related messages from blackhole peer
|
|
|
|
assert_equal(self.sum_addr_messages(peerinfo[2]['bytesrecv_per_msg']), 0)
|
|
|
|
# And that peer did not receive addresses
|
|
|
|
assert_equal(blackhole_peer.num_ipv4_received, 0)
|
|
|
|
|
|
|
|
self.log.info("After blackhole peer sends addr message, it becomes eligible for addr gossip")
|
|
|
|
blackhole_peer.send_and_ping(msg_addr())
|
|
|
|
|
|
|
|
# Confirm node has now received addr-related messages from blackhole peer
|
|
|
|
assert_greater_than(self.sum_addr_messages(peerinfo[1]['bytesrecv_per_msg']), 0)
|
|
|
|
assert_equal(self.nodes[0].getpeerinfo()[2]['addr_relay_enabled'], True)
|
|
|
|
|
|
|
|
msg = self.setup_addr_msg(2)
|
|
|
|
self.send_addr_msg(addr_source, msg, [receiver_peer, blackhole_peer])
|
|
|
|
|
|
|
|
# And that peer received addresses
|
|
|
|
assert_equal(blackhole_peer.num_ipv4_received, 2)
|
|
|
|
|
|
|
|
self.nodes[0].disconnect_p2ps()
|
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
def getaddr_tests(self):
|
2024-04-12 18:34:32 +02:00
|
|
|
# In the previous tests, the node answered GETADDR requests with an
|
|
|
|
# empty addrman. Due to GETADDR response caching (see
|
|
|
|
# CConnman::GetAddresses), the node would continue to provide 0 addrs
|
|
|
|
# in response until enough time has passed or the node is restarted.
|
|
|
|
self.restart_node(0)
|
|
|
|
|
2024-04-02 18:15:27 +02:00
|
|
|
self.log.info('Test getaddr behavior')
|
|
|
|
self.log.info('Check that we send a getaddr message upon connecting to an outbound-full-relay peer')
|
2024-04-03 13:19:36 +02:00
|
|
|
full_outbound_peer = self.nodes[0].add_outbound_p2p_connection(AddrReceiver(), p2p_idx=0, connection_type="outbound-full-relay")
|
2024-04-02 18:15:27 +02:00
|
|
|
full_outbound_peer.sync_with_ping()
|
2024-04-03 13:19:36 +02:00
|
|
|
assert full_outbound_peer.getaddr_received()
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
self.log.info('Check that we do not send a getaddr message upon connecting to a block-relay-only peer')
|
2024-04-03 13:19:36 +02:00
|
|
|
block_relay_peer = self.nodes[0].add_outbound_p2p_connection(AddrReceiver(), p2p_idx=1, connection_type="block-relay-only")
|
2024-04-02 18:15:27 +02:00
|
|
|
block_relay_peer.sync_with_ping()
|
2024-04-03 13:19:36 +02:00
|
|
|
assert_equal(block_relay_peer.getaddr_received(), False)
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
self.log.info('Check that we answer getaddr messages only from inbound peers')
|
2024-04-12 18:34:32 +02:00
|
|
|
inbound_peer = self.nodes[0].add_p2p_connection(AddrReceiver(send_getaddr=False))
|
2024-04-02 18:15:27 +02:00
|
|
|
inbound_peer.sync_with_ping()
|
|
|
|
|
|
|
|
# Add some addresses to addrman
|
|
|
|
for i in range(1000):
|
|
|
|
first_octet = i >> 8
|
|
|
|
second_octet = i % 256
|
|
|
|
a = f"{first_octet}.{second_octet}.1.1"
|
|
|
|
self.nodes[0].addpeeraddress(a, 8333)
|
|
|
|
|
|
|
|
full_outbound_peer.send_and_ping(msg_getaddr())
|
|
|
|
block_relay_peer.send_and_ping(msg_getaddr())
|
|
|
|
inbound_peer.send_and_ping(msg_getaddr())
|
|
|
|
|
|
|
|
self.bump_mocktime(5 * 60)
|
2024-04-03 13:19:36 +02:00
|
|
|
inbound_peer.wait_until(lambda: inbound_peer.addr_received() is True)
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
assert_equal(full_outbound_peer.num_ipv4_received, 0)
|
|
|
|
assert_equal(block_relay_peer.num_ipv4_received, 0)
|
|
|
|
assert inbound_peer.num_ipv4_received > 100
|
|
|
|
|
|
|
|
self.nodes[0].disconnect_p2ps()
|
|
|
|
|
|
|
|
def blocksonly_mode_tests(self):
|
|
|
|
self.log.info('Test addr relay in -blocksonly mode')
|
2024-04-12 18:40:58 +02:00
|
|
|
self.restart_node(0, ["-blocksonly", "-whitelist=addr@127.0.0.1"])
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
self.log.info('Check that we send getaddr messages')
|
2024-04-03 13:19:36 +02:00
|
|
|
full_outbound_peer = self.nodes[0].add_outbound_p2p_connection(AddrReceiver(), p2p_idx=0, connection_type="outbound-full-relay")
|
2024-04-02 18:15:27 +02:00
|
|
|
full_outbound_peer.sync_with_ping()
|
2024-04-03 13:19:36 +02:00
|
|
|
assert full_outbound_peer.getaddr_received()
|
2024-04-02 18:15:27 +02:00
|
|
|
|
|
|
|
self.log.info('Check that we relay address messages')
|
|
|
|
addr_source = self.nodes[0].add_p2p_connection(P2PInterface())
|
|
|
|
msg = self.setup_addr_msg(2)
|
2024-04-03 13:19:36 +02:00
|
|
|
addr_source.send_and_ping(msg)
|
|
|
|
self.bump_mocktime(5 * 60)
|
|
|
|
full_outbound_peer.sync_with_ping()
|
2024-04-02 18:15:27 +02:00
|
|
|
assert_equal(full_outbound_peer.num_ipv4_received, 2)
|
|
|
|
|
|
|
|
self.nodes[0].disconnect_p2ps()
|
|
|
|
|
2021-07-31 21:56:59 +02:00
|
|
|
def send_addrs_and_test_rate_limiting(self, peer, no_relay, *, new_addrs, total_addrs):
|
2024-04-12 18:40:58 +02:00
|
|
|
"""Send an addr message and check that the number of addresses processed and rate-limited is as expected"""
|
|
|
|
|
|
|
|
peer.send_and_ping(self.setup_rand_addr_msg(new_addrs))
|
|
|
|
|
|
|
|
peerinfo = self.nodes[0].getpeerinfo()[0]
|
|
|
|
addrs_processed = peerinfo['addr_processed']
|
|
|
|
addrs_rate_limited = peerinfo['addr_rate_limited']
|
|
|
|
self.log.debug(f"addrs_processed = {addrs_processed}, addrs_rate_limited = {addrs_rate_limited}")
|
|
|
|
|
|
|
|
if no_relay:
|
|
|
|
assert_equal(addrs_processed, 0)
|
|
|
|
assert_equal(addrs_rate_limited, 0)
|
|
|
|
else:
|
|
|
|
assert_equal(addrs_processed, min(total_addrs, peer.tokens))
|
|
|
|
assert_equal(addrs_rate_limited, max(0, total_addrs - peer.tokens))
|
|
|
|
|
|
|
|
def rate_limit_tests(self):
|
|
|
|
self.restart_node(0, [])
|
|
|
|
|
2021-07-31 21:56:59 +02:00
|
|
|
for conn_type, no_relay in [("outbound-full-relay", False), ("block-relay-only", True), ("inbound", False)]:
|
2024-08-30 14:33:15 +02:00
|
|
|
# Advance the time by 5 * 60 seconds, permitting syncing from the same peer.
|
|
|
|
self.bump_mocktime(5 * 60)
|
2021-07-31 21:56:59 +02:00
|
|
|
self.log.info(f'Test rate limiting of addr processing for {conn_type} peers')
|
|
|
|
if conn_type == "inbound":
|
2024-04-12 18:40:58 +02:00
|
|
|
peer = self.nodes[0].add_p2p_connection(AddrReceiver())
|
|
|
|
else:
|
2021-07-31 21:56:59 +02:00
|
|
|
peer = self.nodes[0].add_outbound_p2p_connection(AddrReceiver(), p2p_idx=0, connection_type=conn_type)
|
2024-04-12 18:40:58 +02:00
|
|
|
|
|
|
|
# Send 600 addresses. For all but the block-relay-only peer this should result in addresses being processed.
|
2021-07-31 21:56:59 +02:00
|
|
|
self.send_addrs_and_test_rate_limiting(peer, no_relay, new_addrs=600, total_addrs=600)
|
2024-04-12 18:40:58 +02:00
|
|
|
|
|
|
|
# Send 600 more addresses. For the outbound-full-relay peer (which we send a GETADDR, and thus will
|
|
|
|
# process up to 1001 incoming addresses), this means more addresses will be processed.
|
2021-07-31 21:56:59 +02:00
|
|
|
self.send_addrs_and_test_rate_limiting(peer, no_relay, new_addrs=600, total_addrs=1200)
|
2024-04-12 18:40:58 +02:00
|
|
|
|
|
|
|
# Send 10 more. As we reached the processing limit for all nodes, no more addresses should be procesesd.
|
2021-07-31 21:56:59 +02:00
|
|
|
self.send_addrs_and_test_rate_limiting(peer, no_relay, new_addrs=10, total_addrs=1210)
|
2024-04-12 18:40:58 +02:00
|
|
|
|
|
|
|
# Advance the time by 100 seconds, permitting the processing of 10 more addresses.
|
|
|
|
# Send 200 and verify that 10 are processed.
|
|
|
|
self.bump_mocktime(100)
|
|
|
|
peer.increment_tokens(10)
|
|
|
|
|
2021-07-31 21:56:59 +02:00
|
|
|
self.send_addrs_and_test_rate_limiting(peer, no_relay, new_addrs=200, total_addrs=1410)
|
2024-04-12 18:40:58 +02:00
|
|
|
|
|
|
|
# Advance the time by 1000 seconds, permitting the processing of 100 more addresses.
|
|
|
|
# Send 200 and verify that 100 are processed.
|
|
|
|
self.bump_mocktime(1000)
|
|
|
|
peer.increment_tokens(100)
|
|
|
|
|
2021-07-31 21:56:59 +02:00
|
|
|
self.send_addrs_and_test_rate_limiting(peer, no_relay, new_addrs=200, total_addrs=1610)
|
2024-04-12 18:40:58 +02:00
|
|
|
|
|
|
|
self.nodes[0].disconnect_p2ps()
|
2020-04-10 16:10:23 +02:00
|
|
|
|
2021-07-31 21:56:59 +02:00
|
|
|
|
2020-04-10 16:10:23 +02:00
|
|
|
if __name__ == '__main__':
|
|
|
|
AddrTest().main()
|