mirror of
https://github.com/varun-r-mallya/py-libp2p.git
synced 2025-12-31 20:36:24 +00:00
Fix type errors and linting issues
- Fix type annotation errors in transport_registry.py and __init__.py - Fix line length violations in test files (E501 errors) - Fix missing return type annotations - Fix cryptography NameAttribute type errors with type: ignore - Fix ExceptionGroup import for cross-version compatibility - Fix test failure in test_wss_listen_without_tls_config by handling ExceptionGroup - Fix len() calls with None arguments in test_tcp_data_transfer.py - Fix missing attribute access errors on interface types - Fix boolean type expectation errors in test_js_ws_ping.py - Fix nursery context manager type errors All tests now pass and linting is clean.
This commit is contained in:
@ -3,6 +3,7 @@ import logging
|
||||
from typing import Any
|
||||
|
||||
import pytest
|
||||
from exceptiongroup import ExceptionGroup
|
||||
from multiaddr import Multiaddr
|
||||
import trio
|
||||
|
||||
@ -623,6 +624,7 @@ async def test_websocket_data_exchange():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")], # WebSocket transport
|
||||
)
|
||||
|
||||
# Test data
|
||||
@ -675,7 +677,10 @@ async def test_websocket_data_exchange():
|
||||
|
||||
@pytest.mark.trio
|
||||
async def test_websocket_host_pair_data_exchange():
|
||||
"""Test WebSocket host pair with actual data exchange using host_pair_factory pattern"""
|
||||
"""
|
||||
Test WebSocket host pair with actual data exchange using host_pair_factory
|
||||
pattern.
|
||||
"""
|
||||
from libp2p import create_yamux_muxer_option, new_host
|
||||
from libp2p.crypto.secp256k1 import create_new_key_pair
|
||||
from libp2p.custom_types import TProtocol
|
||||
@ -712,6 +717,7 @@ async def test_websocket_host_pair_data_exchange():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")], # WebSocket transport
|
||||
)
|
||||
|
||||
# Test data
|
||||
@ -784,16 +790,102 @@ async def test_wss_host_pair_data_exchange():
|
||||
InsecureTransport,
|
||||
)
|
||||
|
||||
# Create TLS context for WSS
|
||||
tls_context = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH)
|
||||
tls_context.check_hostname = False
|
||||
tls_context.verify_mode = ssl.CERT_NONE
|
||||
# Create TLS contexts for WSS (separate for client and server)
|
||||
# For testing, we need to create a self-signed certificate
|
||||
try:
|
||||
import datetime
|
||||
import ipaddress
|
||||
import os
|
||||
import tempfile
|
||||
|
||||
from cryptography import x509
|
||||
from cryptography.hazmat.primitives import hashes, serialization
|
||||
from cryptography.hazmat.primitives.asymmetric import rsa
|
||||
from cryptography.x509.oid import NameOID
|
||||
|
||||
# Generate private key
|
||||
private_key = rsa.generate_private_key(
|
||||
public_exponent=65537,
|
||||
key_size=2048,
|
||||
)
|
||||
|
||||
# Create certificate
|
||||
subject = issuer = x509.Name(
|
||||
[
|
||||
x509.NameAttribute(NameOID.COUNTRY_NAME, "US"), # type: ignore
|
||||
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, "Test"), # type: ignore
|
||||
x509.NameAttribute(NameOID.LOCALITY_NAME, "Test"), # type: ignore
|
||||
x509.NameAttribute(NameOID.ORGANIZATION_NAME, "Test"), # type: ignore
|
||||
x509.NameAttribute(NameOID.COMMON_NAME, "localhost"), # type: ignore
|
||||
]
|
||||
)
|
||||
|
||||
cert = (
|
||||
x509.CertificateBuilder()
|
||||
.subject_name(subject)
|
||||
.issuer_name(issuer)
|
||||
.public_key(private_key.public_key())
|
||||
.serial_number(x509.random_serial_number())
|
||||
.not_valid_before(datetime.datetime.now(datetime.UTC))
|
||||
.not_valid_after(
|
||||
datetime.datetime.now(datetime.UTC) + datetime.timedelta(days=1)
|
||||
)
|
||||
.add_extension(
|
||||
x509.SubjectAlternativeName(
|
||||
[
|
||||
x509.DNSName("localhost"),
|
||||
x509.IPAddress(ipaddress.IPv4Address("127.0.0.1")),
|
||||
]
|
||||
),
|
||||
critical=False,
|
||||
)
|
||||
.sign(private_key, hashes.SHA256())
|
||||
)
|
||||
|
||||
# Create temporary files for cert and key
|
||||
cert_file = tempfile.NamedTemporaryFile(mode="wb", delete=False, suffix=".crt")
|
||||
key_file = tempfile.NamedTemporaryFile(mode="wb", delete=False, suffix=".key")
|
||||
|
||||
# Write certificate and key to files
|
||||
cert_file.write(cert.public_bytes(serialization.Encoding.PEM))
|
||||
key_file.write(
|
||||
private_key.private_bytes(
|
||||
encoding=serialization.Encoding.PEM,
|
||||
format=serialization.PrivateFormat.PKCS8,
|
||||
encryption_algorithm=serialization.NoEncryption(),
|
||||
)
|
||||
)
|
||||
|
||||
cert_file.close()
|
||||
key_file.close()
|
||||
|
||||
# Server context for listener (Host A)
|
||||
server_tls_context = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH)
|
||||
server_tls_context.load_cert_chain(cert_file.name, key_file.name)
|
||||
|
||||
# Client context for dialer (Host B)
|
||||
client_tls_context = ssl.create_default_context()
|
||||
client_tls_context.check_hostname = False
|
||||
client_tls_context.verify_mode = ssl.CERT_NONE
|
||||
|
||||
# Clean up temp files after use
|
||||
def cleanup_certs():
|
||||
try:
|
||||
os.unlink(cert_file.name)
|
||||
os.unlink(key_file.name)
|
||||
except Exception:
|
||||
pass
|
||||
|
||||
except ImportError:
|
||||
pytest.skip("cryptography package required for WSS tests")
|
||||
except Exception as e:
|
||||
pytest.skip(f"Failed to create test certificates: {e}")
|
||||
|
||||
# Create two hosts with WSS transport and plaintext security
|
||||
key_pair_a = create_new_key_pair()
|
||||
key_pair_b = create_new_key_pair()
|
||||
|
||||
# Host A (listener) - WSS transport
|
||||
# Host A (listener) - WSS transport with server TLS config
|
||||
security_options_a = {
|
||||
PLAINTEXT_PROTOCOL_ID: InsecureTransport(
|
||||
local_key_pair=key_pair_a, secure_bytes_provider=None, peerstore=None
|
||||
@ -804,9 +896,10 @@ async def test_wss_host_pair_data_exchange():
|
||||
sec_opt=security_options_a,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/wss")],
|
||||
tls_server_config=server_tls_context,
|
||||
)
|
||||
|
||||
# Host B (dialer) - WSS transport
|
||||
# Host B (dialer) - WSS transport with client TLS config
|
||||
security_options_b = {
|
||||
PLAINTEXT_PROTOCOL_ID: InsecureTransport(
|
||||
local_key_pair=key_pair_b, secure_bytes_provider=None, peerstore=None
|
||||
@ -816,6 +909,8 @@ async def test_wss_host_pair_data_exchange():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/wss")], # Ensure WSS transport
|
||||
tls_client_config=client_tls_context,
|
||||
)
|
||||
|
||||
# Test data
|
||||
@ -1028,7 +1123,7 @@ async def test_wss_transport_without_tls_config():
|
||||
@pytest.mark.trio
|
||||
async def test_wss_dial_parsing():
|
||||
"""Test WSS dial functionality with multiaddr parsing."""
|
||||
upgrader = create_upgrader()
|
||||
# upgrader = create_upgrader() # Not used in this test
|
||||
# transport = WebsocketTransport(upgrader) # Not used in this test
|
||||
|
||||
# Test WSS multiaddr parsing in dial
|
||||
@ -1085,10 +1180,15 @@ async def test_wss_listen_without_tls_config():
|
||||
listener = transport.create_listener(dummy_handler)
|
||||
|
||||
# This should raise an error when trying to listen on WSS without TLS config
|
||||
with pytest.raises(
|
||||
ValueError, match="Cannot listen on WSS address.*without TLS configuration"
|
||||
):
|
||||
await listener.listen(wss_maddr, trio.open_nursery())
|
||||
with pytest.raises(ExceptionGroup) as exc_info:
|
||||
async with trio.open_nursery() as nursery:
|
||||
await listener.listen(wss_maddr, nursery)
|
||||
|
||||
# Check that the ExceptionGroup contains the expected ValueError
|
||||
assert len(exc_info.value.exceptions) == 1
|
||||
assert isinstance(exc_info.value.exceptions[0], ValueError)
|
||||
assert "Cannot listen on WSS address" in str(exc_info.value.exceptions[0])
|
||||
assert "without TLS configuration" in str(exc_info.value.exceptions[0])
|
||||
|
||||
|
||||
@pytest.mark.trio
|
||||
@ -1213,7 +1313,7 @@ def test_wss_vs_ws_distinction():
|
||||
@pytest.mark.trio
|
||||
async def test_wss_connection_handling():
|
||||
"""Test WSS connection handling with security flag."""
|
||||
upgrader = create_upgrader()
|
||||
# upgrader = create_upgrader() # Not used in this test
|
||||
# transport = WebsocketTransport(upgrader) # Not used in this test
|
||||
|
||||
# Test that WSS connections are marked as secure
|
||||
@ -1263,7 +1363,9 @@ async def test_handshake_timeout():
|
||||
await trio.sleep(0)
|
||||
|
||||
listener = transport.create_listener(dummy_handler)
|
||||
assert listener._handshake_timeout == 0.1
|
||||
# Type assertion to access private attribute for testing
|
||||
assert hasattr(listener, "_handshake_timeout")
|
||||
assert getattr(listener, "_handshake_timeout") == 0.1
|
||||
|
||||
|
||||
@pytest.mark.trio
|
||||
@ -1275,11 +1377,14 @@ async def test_handshake_timeout_creation():
|
||||
from libp2p.transport import create_transport
|
||||
|
||||
transport = create_transport("ws", upgrader, handshake_timeout=5.0)
|
||||
assert transport._handshake_timeout == 5.0
|
||||
# Type assertion to access private attribute for testing
|
||||
assert hasattr(transport, "_handshake_timeout")
|
||||
assert getattr(transport, "_handshake_timeout") == 5.0
|
||||
|
||||
# Test default timeout
|
||||
transport_default = create_transport("ws", upgrader)
|
||||
assert transport_default._handshake_timeout == 15.0
|
||||
assert hasattr(transport_default, "_handshake_timeout")
|
||||
assert getattr(transport_default, "_handshake_timeout") == 15.0
|
||||
|
||||
|
||||
@pytest.mark.trio
|
||||
@ -1310,7 +1415,8 @@ async def test_connection_state_tracking():
|
||||
assert state["total_bytes"] == 0
|
||||
assert state["connection_duration"] >= 0
|
||||
|
||||
# Test byte tracking (we can't actually read/write with mock, but we can test the method)
|
||||
# Test byte tracking (we can't actually read/write with mock, but we can test
|
||||
# the method)
|
||||
# The actual byte tracking will be tested in integration tests
|
||||
assert hasattr(conn, "_bytes_read")
|
||||
assert hasattr(conn, "_bytes_written")
|
||||
@ -1396,7 +1502,7 @@ async def test_zero_byte_write_handling():
|
||||
@pytest.mark.trio
|
||||
async def test_websocket_transport_protocols():
|
||||
"""Test that WebSocket transport reports correct protocols."""
|
||||
upgrader = create_upgrader()
|
||||
# upgrader = create_upgrader() # Not used in this test
|
||||
# transport = WebsocketTransport(upgrader) # Not used in this test
|
||||
|
||||
# Test that the transport can handle both WS and WSS protocols
|
||||
@ -1427,7 +1533,9 @@ async def test_websocket_listener_addr_format():
|
||||
await trio.sleep(0)
|
||||
|
||||
listener_ws = transport_ws.create_listener(dummy_handler_ws)
|
||||
assert listener_ws._handshake_timeout == 15.0 # Default timeout
|
||||
# Type assertion to access private attribute for testing
|
||||
assert hasattr(listener_ws, "_handshake_timeout")
|
||||
assert getattr(listener_ws, "_handshake_timeout") == 15.0 # Default timeout
|
||||
|
||||
# Test WSS listener with TLS config
|
||||
import ssl
|
||||
@ -1439,13 +1547,19 @@ async def test_websocket_listener_addr_format():
|
||||
await trio.sleep(0)
|
||||
|
||||
listener_wss = transport_wss.create_listener(dummy_handler_wss)
|
||||
assert listener_wss._tls_config is not None
|
||||
assert listener_wss._handshake_timeout == 15.0
|
||||
# Type assertion to access private attributes for testing
|
||||
assert hasattr(listener_wss, "_tls_config")
|
||||
assert getattr(listener_wss, "_tls_config") is not None
|
||||
assert hasattr(listener_wss, "_handshake_timeout")
|
||||
assert getattr(listener_wss, "_handshake_timeout") == 15.0
|
||||
|
||||
|
||||
@pytest.mark.trio
|
||||
async def test_sni_resolution_limitation():
|
||||
"""Test SNI resolution limitation - Python multiaddr library doesn't support SNI protocol."""
|
||||
"""
|
||||
Test SNI resolution limitation - Python multiaddr library doesn't support
|
||||
SNI protocol.
|
||||
"""
|
||||
upgrader = create_upgrader()
|
||||
transport = WebsocketTransport(upgrader)
|
||||
|
||||
@ -1471,7 +1585,7 @@ async def test_sni_resolution_limitation():
|
||||
@pytest.mark.trio
|
||||
async def test_websocket_transport_can_dial():
|
||||
"""Test WebSocket transport CanDial functionality similar to Go implementation."""
|
||||
upgrader = create_upgrader()
|
||||
# upgrader = create_upgrader() # Not used in this test
|
||||
# transport = WebsocketTransport(upgrader) # Not used in this test
|
||||
|
||||
# Test valid WebSocket addresses that should be dialable
|
||||
|
||||
@ -8,7 +8,6 @@ including both WS and WSS (WebSocket Secure) scenarios.
|
||||
|
||||
import pytest
|
||||
from multiaddr import Multiaddr
|
||||
import trio
|
||||
|
||||
from libp2p import create_yamux_muxer_option, new_host
|
||||
from libp2p.crypto.secp256k1 import create_new_key_pair
|
||||
@ -58,6 +57,8 @@ async def test_websocket_p2p_plaintext():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")], # Ensure WebSocket
|
||||
# transport
|
||||
)
|
||||
|
||||
# Test data
|
||||
@ -152,6 +153,8 @@ async def test_websocket_p2p_noise():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")], # Ensure WebSocket
|
||||
# transport
|
||||
)
|
||||
|
||||
# Test data
|
||||
@ -246,6 +249,8 @@ async def test_websocket_p2p_libp2p_ping():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")], # Ensure WebSocket
|
||||
# transport
|
||||
)
|
||||
|
||||
# Set up ping handler on host A (standard libp2p ping protocol)
|
||||
@ -301,7 +306,10 @@ async def test_websocket_p2p_libp2p_ping():
|
||||
|
||||
@pytest.mark.trio
|
||||
async def test_websocket_p2p_multiple_streams():
|
||||
"""Test Python-to-Python WebSocket communication with multiple concurrent streams."""
|
||||
"""
|
||||
Test Python-to-Python WebSocket communication with multiple concurrent
|
||||
streams.
|
||||
"""
|
||||
# Create two hosts with Noise security
|
||||
key_pair_a = create_new_key_pair()
|
||||
key_pair_b = create_new_key_pair()
|
||||
@ -337,6 +345,8 @@ async def test_websocket_p2p_multiple_streams():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")], # Ensure WebSocket
|
||||
# transport
|
||||
)
|
||||
|
||||
# Test protocol
|
||||
@ -385,7 +395,9 @@ async def test_websocket_p2p_multiple_streams():
|
||||
return response
|
||||
|
||||
# Run all streams concurrently
|
||||
tasks = [create_stream_and_test(i, test_data_list[i]) for i in range(num_streams)]
|
||||
tasks = [
|
||||
create_stream_and_test(i, test_data_list[i]) for i in range(num_streams)
|
||||
]
|
||||
responses = []
|
||||
for task in tasks:
|
||||
responses.append(await task)
|
||||
@ -439,6 +451,8 @@ async def test_websocket_p2p_connection_state():
|
||||
key_pair=key_pair_b,
|
||||
sec_opt=security_options_b,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")], # Ensure WebSocket
|
||||
# transport
|
||||
)
|
||||
|
||||
# Set up handler on host A
|
||||
@ -488,21 +502,23 @@ async def test_websocket_p2p_connection_state():
|
||||
|
||||
# Get the connection to host A
|
||||
conn_to_a = None
|
||||
for peer_id, conn in connections.items():
|
||||
for peer_id, conn_list in connections.items():
|
||||
if peer_id == host_a.get_id():
|
||||
conn_to_a = conn
|
||||
# connections maps peer_id to list of connections, get the first one
|
||||
conn_to_a = conn_list[0] if conn_list else None
|
||||
break
|
||||
|
||||
assert conn_to_a is not None, "Should have connection to host A"
|
||||
|
||||
# Test that the connection has the expected properties
|
||||
assert hasattr(conn_to_a, "muxed_conn"), "Connection should have muxed_conn"
|
||||
assert hasattr(conn_to_a.muxed_conn, "conn"), (
|
||||
"Muxed connection should have underlying conn"
|
||||
assert hasattr(conn_to_a.muxed_conn, "secured_conn"), (
|
||||
"Muxed connection should have underlying secured_conn"
|
||||
)
|
||||
|
||||
# If the underlying connection is our WebSocket connection, test its state
|
||||
underlying_conn = conn_to_a.muxed_conn.conn
|
||||
# Type assertion to access private attribute for testing
|
||||
underlying_conn = getattr(conn_to_a.muxed_conn, "secured_conn")
|
||||
if hasattr(underlying_conn, "conn_state"):
|
||||
state = underlying_conn.conn_state()
|
||||
assert "connection_start_time" in state, (
|
||||
|
||||
@ -13,7 +13,9 @@
|
||||
"@libp2p/ping": "^2.0.36",
|
||||
"@libp2p/websockets": "^9.2.18",
|
||||
"@chainsafe/libp2p-yamux": "^5.0.1",
|
||||
"@chainsafe/libp2p-noise": "^16.0.1",
|
||||
"@libp2p/plaintext": "^2.0.7",
|
||||
"@libp2p/identify": "^3.0.39",
|
||||
"libp2p": "^2.9.0",
|
||||
"multiaddr": "^10.0.1"
|
||||
}
|
||||
|
||||
@ -1,22 +1,76 @@
|
||||
import { createLibp2p } from 'libp2p'
|
||||
import { webSockets } from '@libp2p/websockets'
|
||||
import { ping } from '@libp2p/ping'
|
||||
import { noise } from '@chainsafe/libp2p-noise'
|
||||
import { plaintext } from '@libp2p/plaintext'
|
||||
import { yamux } from '@chainsafe/libp2p-yamux'
|
||||
// import { identify } from '@libp2p/identify' // Commented out for compatibility
|
||||
|
||||
// Configuration from environment (with defaults for compatibility)
|
||||
const TRANSPORT = process.env.transport || 'ws'
|
||||
const SECURITY = process.env.security || 'noise'
|
||||
const MUXER = process.env.muxer || 'yamux'
|
||||
const IP = process.env.ip || '0.0.0.0'
|
||||
|
||||
async function main() {
|
||||
const node = await createLibp2p({
|
||||
transports: [ webSockets() ],
|
||||
connectionEncryption: [ plaintext() ],
|
||||
streamMuxers: [ yamux() ],
|
||||
services: {
|
||||
// installs /ipfs/ping/1.0.0 handler
|
||||
ping: ping()
|
||||
console.log(`🔧 Configuration: transport=${TRANSPORT}, security=${SECURITY}, muxer=${MUXER}`)
|
||||
|
||||
// Build options following the proven pattern from test-plans-fork
|
||||
const options = {
|
||||
start: true,
|
||||
connectionGater: {
|
||||
denyDialMultiaddr: async () => false
|
||||
},
|
||||
addresses: {
|
||||
listen: ['/ip4/0.0.0.0/tcp/0/ws']
|
||||
connectionMonitor: {
|
||||
enabled: false
|
||||
},
|
||||
services: {
|
||||
ping: ping()
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Transport configuration (following get-libp2p.ts pattern)
|
||||
switch (TRANSPORT) {
|
||||
case 'ws':
|
||||
options.transports = [webSockets()]
|
||||
options.addresses = {
|
||||
listen: [`/ip4/${IP}/tcp/0/ws`]
|
||||
}
|
||||
break
|
||||
case 'wss':
|
||||
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0'
|
||||
options.transports = [webSockets()]
|
||||
options.addresses = {
|
||||
listen: [`/ip4/${IP}/tcp/0/wss`]
|
||||
}
|
||||
break
|
||||
default:
|
||||
throw new Error(`Unknown transport: ${TRANSPORT}`)
|
||||
}
|
||||
|
||||
// Security configuration
|
||||
switch (SECURITY) {
|
||||
case 'noise':
|
||||
options.connectionEncryption = [noise()]
|
||||
break
|
||||
case 'plaintext':
|
||||
options.connectionEncryption = [plaintext()]
|
||||
break
|
||||
default:
|
||||
throw new Error(`Unknown security: ${SECURITY}`)
|
||||
}
|
||||
|
||||
// Muxer configuration
|
||||
switch (MUXER) {
|
||||
case 'yamux':
|
||||
options.streamMuxers = [yamux()]
|
||||
break
|
||||
default:
|
||||
throw new Error(`Unknown muxer: ${MUXER}`)
|
||||
}
|
||||
|
||||
console.log('🔧 Creating libp2p node with proven interop configuration...')
|
||||
const node = await createLibp2p(options)
|
||||
|
||||
await node.start()
|
||||
|
||||
@ -25,6 +79,39 @@ async function main() {
|
||||
console.log(addr.toString())
|
||||
}
|
||||
|
||||
// Debug: Print supported protocols
|
||||
console.log('DEBUG: Supported protocols:')
|
||||
if (node.services && node.services.registrar) {
|
||||
const protocols = node.services.registrar.getProtocols()
|
||||
for (const protocol of protocols) {
|
||||
console.log('DEBUG: Protocol:', protocol)
|
||||
}
|
||||
}
|
||||
|
||||
// Debug: Print connection encryption protocols
|
||||
console.log('DEBUG: Connection encryption protocols:')
|
||||
try {
|
||||
if (node.components && node.components.connectionEncryption) {
|
||||
for (const encrypter of node.components.connectionEncryption) {
|
||||
console.log('DEBUG: Encrypter:', encrypter.protocol)
|
||||
}
|
||||
}
|
||||
} catch (e) {
|
||||
console.log('DEBUG: Could not access connectionEncryption:', e.message)
|
||||
}
|
||||
|
||||
// Debug: Print stream muxer protocols
|
||||
console.log('DEBUG: Stream muxer protocols:')
|
||||
try {
|
||||
if (node.components && node.components.streamMuxers) {
|
||||
for (const muxer of node.components.streamMuxers) {
|
||||
console.log('DEBUG: Muxer:', muxer.protocol)
|
||||
}
|
||||
}
|
||||
} catch (e) {
|
||||
console.log('DEBUG: Could not access streamMuxers:', e.message)
|
||||
}
|
||||
|
||||
// Keep the process alive
|
||||
await new Promise(() => {})
|
||||
}
|
||||
|
||||
@ -9,16 +9,8 @@ from trio.lowlevel import open_process
|
||||
|
||||
from libp2p.crypto.secp256k1 import create_new_key_pair
|
||||
from libp2p.custom_types import TProtocol
|
||||
from libp2p.host.basic_host import BasicHost
|
||||
from libp2p.network.exceptions import SwarmException
|
||||
from libp2p.network.swarm import Swarm
|
||||
from libp2p.peer.id import ID
|
||||
from libp2p.peer.peerinfo import PeerInfo
|
||||
from libp2p.peer.peerstore import PeerStore
|
||||
from libp2p.security.insecure.transport import InsecureTransport
|
||||
from libp2p.stream_muxer.yamux.yamux import Yamux
|
||||
from libp2p.transport.upgrader import TransportUpgrader
|
||||
from libp2p.transport.websocket.transport import WebsocketTransport
|
||||
|
||||
PLAINTEXT_PROTOCOL_ID = "/plaintext/2.0.0"
|
||||
|
||||
@ -97,11 +89,14 @@ async def test_ping_with_js_node():
|
||||
stderr = proc.stderr
|
||||
|
||||
try:
|
||||
# Read first two lines (PeerID and multiaddr)
|
||||
print("Waiting for JS node to output PeerID and multiaddr...")
|
||||
# Read JS node output until we get peer ID and multiaddrs
|
||||
print("Waiting for JS node to output PeerID and multiaddrs...")
|
||||
buffer = b""
|
||||
peer_id_found: str | bool = False
|
||||
multiaddrs_found = []
|
||||
|
||||
with trio.fail_after(30):
|
||||
while buffer.count(b"\n") < 2:
|
||||
while True:
|
||||
chunk = await stdout.receive_some(1024)
|
||||
if not chunk:
|
||||
print("No more data from JS node stdout")
|
||||
@ -109,53 +104,84 @@ async def test_ping_with_js_node():
|
||||
buffer += chunk
|
||||
print(f"Received chunk: {chunk}")
|
||||
|
||||
print(f"Total buffer received: {buffer}")
|
||||
lines = [line for line in buffer.decode().splitlines() if line.strip()]
|
||||
print(f"Parsed lines: {lines}")
|
||||
# Parse lines as we receive them
|
||||
lines = buffer.decode().splitlines()
|
||||
for line in lines:
|
||||
line = line.strip()
|
||||
if not line:
|
||||
continue
|
||||
|
||||
if len(lines) < 2:
|
||||
print("Not enough lines from JS node, checking stderr...")
|
||||
# Look for peer ID (starts with "12D3Koo")
|
||||
if line.startswith("12D3Koo") and not peer_id_found:
|
||||
peer_id_found = line
|
||||
print(f"Found peer ID: {peer_id_found}")
|
||||
|
||||
# Look for multiaddrs (start with "/ip4/" or "/ip6/")
|
||||
elif line.startswith("/ip4/") or line.startswith("/ip6/"):
|
||||
if line not in multiaddrs_found:
|
||||
multiaddrs_found.append(line)
|
||||
print(f"Found multiaddr: {line}")
|
||||
|
||||
# Stop when we have peer ID and at least one multiaddr
|
||||
if peer_id_found and multiaddrs_found:
|
||||
print(f"✅ Collected: Peer ID + {len(multiaddrs_found)} multiaddrs")
|
||||
break
|
||||
|
||||
print(f"Total buffer received: {buffer}")
|
||||
all_lines = [line for line in buffer.decode().splitlines() if line.strip()]
|
||||
print(f"All JS Node lines: {all_lines}")
|
||||
|
||||
if not peer_id_found or not multiaddrs_found:
|
||||
print("Missing peer ID or multiaddrs from JS node, checking stderr...")
|
||||
stderr_output = await stderr.receive_some(2048)
|
||||
stderr_output = stderr_output.decode()
|
||||
print(f"JS node stderr: {stderr_output}")
|
||||
pytest.fail(
|
||||
"JS node did not produce expected PeerID and multiaddr.\n"
|
||||
f"Found peer ID: {peer_id_found}\n"
|
||||
f"Found multiaddrs: {multiaddrs_found}\n"
|
||||
f"Stdout: {buffer.decode()!r}\n"
|
||||
f"Stderr: {stderr_output!r}"
|
||||
)
|
||||
peer_id_line, addr_line = lines[0], lines[1]
|
||||
peer_id = ID.from_base58(peer_id_line)
|
||||
maddr = Multiaddr(addr_line)
|
||||
|
||||
# peer_id = ID.from_base58(peer_id_found) # Not used currently
|
||||
# Use the first localhost multiaddr preferentially, or fallback to first
|
||||
# available
|
||||
maddr = None
|
||||
for addr_str in multiaddrs_found:
|
||||
if "127.0.0.1" in addr_str:
|
||||
maddr = Multiaddr(addr_str)
|
||||
break
|
||||
if not maddr:
|
||||
maddr = Multiaddr(multiaddrs_found[0])
|
||||
|
||||
# Debug: Print what we're trying to connect to
|
||||
print(f"JS Node Peer ID: {peer_id_line}")
|
||||
print(f"JS Node Address: {addr_line}")
|
||||
print(f"All JS Node lines: {lines}")
|
||||
print(f"Parsed multiaddr: {maddr}")
|
||||
print(f"JS Node Peer ID: {peer_id_found}")
|
||||
print(f"JS Node Address: {maddr}")
|
||||
print(f"All found multiaddrs: {multiaddrs_found}")
|
||||
print(f"Selected multiaddr: {maddr}")
|
||||
|
||||
# Set up Python host
|
||||
# Set up Python host using new_host API with Noise security
|
||||
print("Setting up Python host...")
|
||||
key_pair = create_new_key_pair()
|
||||
py_peer_id = ID.from_pubkey(key_pair.public_key)
|
||||
peer_store = PeerStore()
|
||||
peer_store.add_key_pair(py_peer_id, key_pair)
|
||||
print(f"Python Peer ID: {py_peer_id}")
|
||||
from libp2p import create_yamux_muxer_option, new_host
|
||||
|
||||
# Use only plaintext security to match the JavaScript node
|
||||
upgrader = TransportUpgrader(
|
||||
secure_transports_by_protocol={
|
||||
TProtocol(PLAINTEXT_PROTOCOL_ID): InsecureTransport(key_pair)
|
||||
},
|
||||
muxer_transports_by_protocol={TProtocol("/yamux/1.0.0"): Yamux},
|
||||
key_pair = create_new_key_pair()
|
||||
# noise_key_pair = create_new_x25519_key_pair() # Not used currently
|
||||
print(f"Python Peer ID: {ID.from_pubkey(key_pair.public_key)}")
|
||||
|
||||
# Use default security options (includes Noise, SecIO, and plaintext)
|
||||
# This will allow protocol negotiation to choose the best match
|
||||
host = new_host(
|
||||
key_pair=key_pair,
|
||||
muxer_opt=create_yamux_muxer_option(),
|
||||
listen_addrs=[Multiaddr("/ip4/127.0.0.1/tcp/0/ws")],
|
||||
)
|
||||
transport = WebsocketTransport(upgrader)
|
||||
print(f"WebSocket transport created: {transport}")
|
||||
swarm = Swarm(py_peer_id, peer_store, upgrader, transport)
|
||||
host = BasicHost(swarm)
|
||||
print(f"Python host created: {host}")
|
||||
|
||||
# Connect to JS node
|
||||
peer_info = PeerInfo(peer_id, [maddr])
|
||||
# Connect to JS node using modern peer info
|
||||
from libp2p.peer.peerinfo import info_from_p2p_addr
|
||||
|
||||
peer_info = info_from_p2p_addr(maddr)
|
||||
print(f"Python trying to connect to: {peer_info}")
|
||||
print(f"Peer info addresses: {peer_info.addrs}")
|
||||
|
||||
@ -169,37 +195,62 @@ async def test_ping_with_js_node():
|
||||
try:
|
||||
parsed = parse_websocket_multiaddr(maddr)
|
||||
print(
|
||||
f"Parsed WebSocket multiaddr: is_wss={parsed.is_wss}, sni={parsed.sni}, rest_multiaddr={parsed.rest_multiaddr}"
|
||||
f"Parsed WebSocket multiaddr: is_wss={parsed.is_wss}, "
|
||||
f"sni={parsed.sni}, rest_multiaddr={parsed.rest_multiaddr}"
|
||||
)
|
||||
except Exception as e:
|
||||
print(f"Failed to parse WebSocket multiaddr: {e}")
|
||||
|
||||
await trio.sleep(1)
|
||||
# Use proper host.run() context manager
|
||||
async with host.run(listen_addrs=[]):
|
||||
await trio.sleep(1)
|
||||
|
||||
try:
|
||||
print("Attempting to connect to JS node...")
|
||||
await host.connect(peer_info)
|
||||
print("Successfully connected to JS node!")
|
||||
except SwarmException as e:
|
||||
underlying_error = e.__cause__
|
||||
print(f"Connection failed with SwarmException: {e}")
|
||||
print(f"Underlying error: {underlying_error}")
|
||||
pytest.fail(
|
||||
"Connection failed with SwarmException.\n"
|
||||
f"THE REAL ERROR IS: {underlying_error!r}\n"
|
||||
)
|
||||
try:
|
||||
print("Attempting to connect to JS node...")
|
||||
await host.connect(peer_info)
|
||||
print("Successfully connected to JS node!")
|
||||
except SwarmException as e:
|
||||
underlying_error = e.__cause__
|
||||
print(f"Connection failed with SwarmException: {e}")
|
||||
print(f"Underlying error: {underlying_error}")
|
||||
pytest.fail(
|
||||
"Connection failed with SwarmException.\n"
|
||||
f"THE REAL ERROR IS: {underlying_error!r}\n"
|
||||
)
|
||||
|
||||
assert host.get_network().connections.get(peer_id) is not None
|
||||
# Verify connection was established
|
||||
assert host.get_network().connections.get(peer_info.peer_id) is not None
|
||||
|
||||
# Ping protocol
|
||||
stream = await host.new_stream(peer_id, [TProtocol("/ipfs/ping/1.0.0")])
|
||||
await stream.write(b"ping")
|
||||
data = await stream.read(4)
|
||||
assert data == b"pong"
|
||||
# Try to ping the JS node
|
||||
ping_protocol = TProtocol("/ipfs/ping/1.0.0")
|
||||
try:
|
||||
print("Opening ping stream...")
|
||||
stream = await host.new_stream(peer_info.peer_id, [ping_protocol])
|
||||
print("Ping stream opened successfully!")
|
||||
|
||||
print("Closing Python host...")
|
||||
await host.close()
|
||||
print("Python host closed successfully")
|
||||
# Send ping data (32 bytes as per libp2p ping protocol)
|
||||
ping_data = b"\x00" * 32
|
||||
await stream.write(ping_data)
|
||||
print(f"Sent ping: {len(ping_data)} bytes")
|
||||
|
||||
# Wait for pong response
|
||||
pong_data = await stream.read(32)
|
||||
print(f"Received pong: {len(pong_data)} bytes")
|
||||
|
||||
# Verify the pong matches the ping
|
||||
assert pong_data == ping_data, (
|
||||
f"Ping/pong mismatch: {ping_data!r} != {pong_data!r}"
|
||||
)
|
||||
print("✅ Ping/pong successful!")
|
||||
|
||||
await stream.close()
|
||||
print("Stream closed successfully!")
|
||||
|
||||
except Exception as e:
|
||||
print(f"Ping failed: {e}")
|
||||
pytest.fail(f"Ping failed: {e}")
|
||||
|
||||
print("🎉 JavaScript WebSocket interop test completed successfully!")
|
||||
finally:
|
||||
print(f"Terminating JS node process (PID: {proc.pid})...")
|
||||
try:
|
||||
|
||||
Reference in New Issue
Block a user