mirror of
https://github.com/varun-r-mallya/py-libp2p.git
synced 2025-12-31 20:36:24 +00:00
* feat: Replace mplex with yamux as default multiplexer in py-libp2p * Retain Mplex alongside Yamux in new_swarm with messaging that Yamux is preferred * moved !BBHII to a constant YAMUX_HEADER_FORMAT at the top of yamux.py with a comment explaining its structure * renamed the news fragment to 534.feature.rst and updated the description * renamed the news fragment to 534.feature.rst and updated the description * added a docstring to clarify that Yamux does not support deadlines natively * Remove the __main__ block entirely from test_yamux.py * Replaced the print statements in test_yamux.py with logging.debug * Added a comment linking to the spec for clarity * Raise NotImplementedError in YamuxStream.set_deadline per review * Add muxed_conn to YamuxStream and test deadline NotImplementedError * Fix Yamux implementation to meet libp2p spec * Fix None handling in YamuxStream.read and Yamux.read_stream * Fix test_connected_peers.py to correctly handle peer connections * fix: Ensure StreamReset is raised on read after local reset in yamux * fix: Map MuxedStreamError to StreamClosed in NetStream.write for Yamux * fix: Raise MuxedStreamReset in Yamux.read_stream for closed streams * fix: Correct Yamux stream read behavior for NetStream tests Fixed est_net_stream_read_after_remote_closed by updating NetStream.read to raise StreamEOF when the stream is remotely closed and no data is available, aligning with test expectations and Fixed est_net_stream_read_until_eof by modifying YamuxStream.read to block until the stream is closed ( ecv_closed=True) for =-1 reads, ensuring data is only returned after remote closure. * fix: Correct Yamux stream read behavior for NetStream tests Fixed est_net_stream_read_after_remote_closed by updating NetStream.read to raise StreamEOF when the stream is remotely closed and no data is available, aligning with test expectations and Fixed est_net_stream_read_until_eof by modifying YamuxStream.read to block until the stream is closed ( ecv_closed=True) for =-1 reads, ensuring data is only returned after remote closure. * fix: raise StreamEOF when reading from closed stream with empty buffer * fix: prioritize returning buffered data even after stream reset * fix: prioritize returning buffered data even after stream reset * fix: Ensure test_net_stream_read_after_remote_closed_and_reset passes in full suite * fix: Add __init__.py to yamux module to fix documentation build * fix: Add __init__.py to yamux module to fix documentation build * fix: Add libp2p.stream_muxer.yamux to libp2p.stream_muxer.rst toctree * fix: Correct title underline length in libp2p.stream_muxer.yamux.rst * fix: Add a = so that is matches the libp2p.stream\_muxer.yamux length * fix(tests): Resolve race condition in network notification test * fix: fixing failing tests and examples with yamux and noise * refactor: remove debug logging and improve x25519 tests * fix: Add functionality for users to choose between Yamux and Mplex * fix: increased trio sleep to 0.1 sec for slow environment * feat: Add test for switching between Yamux and mplex * refactor: move host fixtures to interop tests * chore: Update __init__.py removing unused import removed unused ```python import os import logging ``` * lint: fix import order * fix: Resolve conftest.py conflict by removing trio test support * fix: Resolve test skipping by keeping trio test support * Fix: add a newline at end of the file --------- Co-authored-by: acul71 <luca.pisani@birdo.net> Co-authored-by: acul71 <34693171+acul71@users.noreply.github.com>
103 lines
3.4 KiB
Python
103 lines
3.4 KiB
Python
import pytest
|
|
|
|
from libp2p.crypto.keys import (
|
|
KeyType,
|
|
)
|
|
from libp2p.crypto.x25519 import (
|
|
X25519PrivateKey,
|
|
X25519PublicKey,
|
|
create_new_key_pair,
|
|
)
|
|
|
|
|
|
def test_x25519_public_key_creation():
|
|
# Create a new X25519 key pair
|
|
key_pair = create_new_key_pair()
|
|
public_key = key_pair.public_key
|
|
|
|
# Test that it's an instance of X25519PublicKey
|
|
assert isinstance(public_key, X25519PublicKey)
|
|
|
|
# Test key type
|
|
assert public_key.get_type() == KeyType.X25519
|
|
|
|
# Test to_bytes and from_bytes roundtrip
|
|
key_bytes = public_key.to_bytes()
|
|
reconstructed_key = X25519PublicKey.from_bytes(key_bytes)
|
|
assert isinstance(reconstructed_key, X25519PublicKey)
|
|
assert reconstructed_key.to_bytes() == key_bytes
|
|
|
|
|
|
def test_x25519_private_key_creation():
|
|
# Create a new private key
|
|
private_key = X25519PrivateKey.new()
|
|
|
|
# Test that it's an instance of X25519PrivateKey
|
|
assert isinstance(private_key, X25519PrivateKey)
|
|
|
|
# Test key type
|
|
assert private_key.get_type() == KeyType.X25519
|
|
|
|
# Test to_bytes and from_bytes roundtrip
|
|
key_bytes = private_key.to_bytes()
|
|
reconstructed_key = X25519PrivateKey.from_bytes(key_bytes)
|
|
assert isinstance(reconstructed_key, X25519PrivateKey)
|
|
assert reconstructed_key.to_bytes() == key_bytes
|
|
|
|
|
|
def test_x25519_key_pair_creation():
|
|
# Create a new key pair
|
|
key_pair = create_new_key_pair()
|
|
|
|
# Test that both private and public keys are of correct types
|
|
assert isinstance(key_pair.private_key, X25519PrivateKey)
|
|
assert isinstance(key_pair.public_key, X25519PublicKey)
|
|
|
|
# Test that public key matches private key
|
|
assert (
|
|
key_pair.private_key.get_public_key().to_bytes()
|
|
== key_pair.public_key.to_bytes()
|
|
)
|
|
|
|
|
|
def test_x25519_unsupported_operations():
|
|
# Test that signature operations are not supported
|
|
key_pair = create_new_key_pair()
|
|
|
|
# Test that public key verify raises NotImplementedError
|
|
with pytest.raises(NotImplementedError, match="X25519 does not support signatures"):
|
|
key_pair.public_key.verify(b"data", b"signature")
|
|
|
|
# Test that private key sign raises NotImplementedError
|
|
with pytest.raises(NotImplementedError, match="X25519 does not support signatures"):
|
|
key_pair.private_key.sign(b"data")
|
|
|
|
|
|
def test_x25519_invalid_key_bytes():
|
|
# Test that invalid key bytes raise appropriate exceptions
|
|
with pytest.raises(ValueError, match="An X25519 public key is 32 bytes long"):
|
|
X25519PublicKey.from_bytes(b"invalid_key_bytes")
|
|
|
|
with pytest.raises(ValueError, match="An X25519 private key is 32 bytes long"):
|
|
X25519PrivateKey.from_bytes(b"invalid_key_bytes")
|
|
|
|
|
|
def test_x25519_key_serialization():
|
|
# Test key serialization and deserialization
|
|
key_pair = create_new_key_pair()
|
|
|
|
# Serialize both keys
|
|
private_bytes = key_pair.private_key.to_bytes()
|
|
public_bytes = key_pair.public_key.to_bytes()
|
|
|
|
# Deserialize and verify
|
|
reconstructed_private = X25519PrivateKey.from_bytes(private_bytes)
|
|
reconstructed_public = X25519PublicKey.from_bytes(public_bytes)
|
|
|
|
# Verify the reconstructed keys match the original
|
|
assert reconstructed_private.to_bytes() == private_bytes
|
|
assert reconstructed_public.to_bytes() == public_bytes
|
|
|
|
# Verify the public key derived from reconstructed private key matches
|
|
assert reconstructed_private.get_public_key().to_bytes() == public_bytes
|