aboutsummaryrefslogtreecommitdiffstats
path: root/node/config_test.go
diff options
context:
space:
mode:
authorPéter Szilágyi <peterke@gmail.com>2015-11-06 05:57:57 +0800
committerPéter Szilágyi <peterke@gmail.com>2015-11-27 17:06:12 +0800
commit9e1d9bff3b18cfa09ba96cd027fa653daae10816 (patch)
tree95d74007caa613ba0c6a62962efcda2e96b273af /node/config_test.go
parent168d0e9e45939b7282204f3f52fe86fc8110cfc7 (diff)
downloaddexon-9e1d9bff3b18cfa09ba96cd027fa653daae10816.tar.gz
dexon-9e1d9bff3b18cfa09ba96cd027fa653daae10816.tar.zst
dexon-9e1d9bff3b18cfa09ba96cd027fa653daae10816.zip
node: customizable protocol and service stacks
Diffstat (limited to 'node/config_test.go')
-rw-r--r--node/config_test.go120
1 files changed, 120 insertions, 0 deletions
diff --git a/node/config_test.go b/node/config_test.go
new file mode 100644
index 000000000..f59f3c0fe
--- /dev/null
+++ b/node/config_test.go
@@ -0,0 +1,120 @@
+// Copyright 2015 The go-ethereum Authors
+// This file is part of the go-ethereum library.
+//
+// The go-ethereum library is free software: you can redistribute it and/or modify
+// it under the terms of the GNU Lesser General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+//
+// The go-ethereum library is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+// GNU Lesser General Public License for more details.
+//
+// You should have received a copy of the GNU Lesser General Public License
+// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
+
+package node
+
+import (
+ "bytes"
+ "io/ioutil"
+ "os"
+ "path/filepath"
+ "testing"
+
+ "github.com/ethereum/go-ethereum/crypto"
+)
+
+// Tests that datadirs can be successfully created, be them manually configured
+// ones or automatically generated temporary ones.
+func TestDatadirCreation(t *testing.T) {
+ // Create a temporary data dir and check that it can be used by a node
+ dir, err := ioutil.TempDir("", "")
+ if err != nil {
+ t.Fatalf("failed to create manual data dir: %v", err)
+ }
+ defer os.RemoveAll(dir)
+
+ if _, err := New(&Config{DataDir: dir}); err != nil {
+ t.Fatalf("failed to create stack with existing datadir: %v", err)
+ }
+ // Generate a long non-existing datadir path and check that it gets created by a node
+ dir = filepath.Join(dir, "a", "b", "c", "d", "e", "f")
+ if _, err := New(&Config{DataDir: dir}); err != nil {
+ t.Fatalf("failed to create stack with creatable datadir: %v", err)
+ }
+ if _, err := os.Stat(dir); err != nil {
+ t.Fatalf("freshly created datadir not accessible: %v", err)
+ }
+ // Verify that an impossible datadir fails creation
+ file, err := ioutil.TempFile("", "")
+ if err != nil {
+ t.Fatalf("failed to create temporary file: %v", err)
+ }
+ defer os.Remove(file.Name())
+
+ dir = filepath.Join(file.Name(), "invalid/path")
+ if _, err := New(&Config{DataDir: dir}); err == nil {
+ t.Fatalf("protocol stack created with an invalid datadir")
+ }
+}
+
+// Tests that node keys can be correctly created, persisted, loaded and/or made
+// ephemeral.
+func TestNodeKeyPersistency(t *testing.T) {
+ // Create a temporary folder and make sure no key is present
+ dir, err := ioutil.TempDir("", "")
+ if err != nil {
+ t.Fatalf("failed to create temporary data directory: %v", err)
+ }
+ defer os.RemoveAll(dir)
+
+ if _, err := os.Stat(filepath.Join(dir, datadirPrivateKey)); err == nil {
+ t.Fatalf("non-created node key already exists")
+ }
+ // Configure a node with a preset key and ensure it's not persisted
+ key, err := crypto.GenerateKey()
+ if err != nil {
+ t.Fatalf("failed to generate one-shot node key: %v", err)
+ }
+ if _, err := New(&Config{DataDir: dir, PrivateKey: key}); err != nil {
+ t.Fatalf("failed to create empty stack: %v", err)
+ }
+ if _, err := os.Stat(filepath.Join(dir, datadirPrivateKey)); err == nil {
+ t.Fatalf("one-shot node key persisted to data directory")
+ }
+ // Configure a node with no preset key and ensure it is persisted this time
+ if _, err := New(&Config{DataDir: dir}); err != nil {
+ t.Fatalf("failed to create newly keyed stack: %v", err)
+ }
+ if _, err := os.Stat(filepath.Join(dir, datadirPrivateKey)); err != nil {
+ t.Fatalf("node key not persisted to data directory: %v", err)
+ }
+ key, err = crypto.LoadECDSA(filepath.Join(dir, datadirPrivateKey))
+ if err != nil {
+ t.Fatalf("failed to load freshly persisted node key: %v", err)
+ }
+ blob1, err := ioutil.ReadFile(filepath.Join(dir, datadirPrivateKey))
+ if err != nil {
+ t.Fatalf("failed to read freshly persisted node key: %v", err)
+ }
+ // Configure a new node and ensure the previously persisted key is loaded
+ if _, err := New(&Config{DataDir: dir}); err != nil {
+ t.Fatalf("failed to create previously keyed stack: %v", err)
+ }
+ blob2, err := ioutil.ReadFile(filepath.Join(dir, datadirPrivateKey))
+ if err != nil {
+ t.Fatalf("failed to read previously persisted node key: %v", err)
+ }
+ if bytes.Compare(blob1, blob2) != 0 {
+ t.Fatalf("persisted node key mismatch: have %x, want %x", blob2, blob1)
+ }
+ // Configure ephemeral node and ensure no key is dumped locally
+ if _, err := New(&Config{DataDir: ""}); err != nil {
+ t.Fatalf("failed to create ephemeral stack: %v", err)
+ }
+ if _, err := os.Stat(filepath.Join(".", datadirPrivateKey)); err == nil {
+ t.Fatalf("ephemeral node key persisted to disk")
+ }
+}