Adding initial support for broadcasting transactions over Tor

- Support for ".onion" in --add-exclusive-node and --add-peer
  - Add --anonymizing-proxy for outbound Tor connections
  - Add --anonymous-inbounds for inbound Tor connections
  - Support for sharing ".onion" addresses over Tor connections
  - Support for broadcasting transactions received over RPC exclusively
    over Tor (else broadcast over public IP when Tor not enabled).
This commit is contained in:
Lee Clagett 2018-12-16 17:57:44 +00:00
parent 1e5cd3b35a
commit 973403bc9f
39 changed files with 4298 additions and 831 deletions

View file

@ -37,7 +37,7 @@
TEST(peer_list, peer_list_general)
{
nodetool::peerlist_manager plm;
plm.init(false);
plm.init(nodetool::peerlist_types{}, false);
#define MAKE_IPV4_ADDRESS(a,b,c,d,e) epee::net_utils::ipv4_network_address{MAKE_IP(a,b,c,d),e}
#define ADD_GRAY_NODE(addr_, id_, last_seen_) { nodetool::peerlist_entry ple; ple.last_seen=last_seen_;ple.adr = addr_; ple.id = id_;plm.append_with_peer_gray(ple);}
#define ADD_WHITE_NODE(addr_, id_, last_seen_) { nodetool::peerlist_entry ple;ple.last_seen=last_seen_; ple.adr = addr_; ple.id = id_;plm.append_with_peer_white(ple);}
@ -77,9 +77,180 @@ TEST(peer_list, merge_peer_lists)
//([^ \t]*)\t([^ \t]*):([^ \t]*) \tlast_seen: d(\d+)\.h(\d+)\.m(\d+)\.s(\d+)\n
//ADD_NODE_TO_PL("\2", \3, 0x\1, (1353346618 -(\4*60*60*24+\5*60*60+\6*60+\7 )));\n
nodetool::peerlist_manager plm;
plm.init(false);
plm.init(nodetool::peerlist_types{}, false);
std::vector<nodetool::peerlist_entry> outer_bs;
#define ADD_NODE_TO_PL(ip_, port_, id_, timestamp_) { nodetool::peerlist_entry ple; epee::string_tools::get_ip_int32_from_string(ple.adr.ip, ip_); ple.last_seen = timestamp_; ple.adr.port = port_; ple.id = id_;outer_bs.push_back(ple);}
}
namespace
{
bool check_empty(nodetool::peerlist_storage& peers, std::initializer_list<epee::net_utils::zone> zones)
{
bool pass = false;
for (const epee::net_utils::zone zone : zones)
{
const nodetool::peerlist_types types{peers.take_zone(zone)};
EXPECT_TRUE(types.white.empty());
EXPECT_TRUE(types.gray.empty());
EXPECT_TRUE(types.anchor.empty());
pass = (types.white.empty() && types.gray.empty() && types.anchor.empty());
}
return pass;
}
}
TEST(peerlist_storage, store)
{
using address_type = epee::net_utils::address_type;
using zone = epee::net_utils::zone;
nodetool::peerlist_storage peers{};
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::public_, zone::tor, zone::i2p}));
std::string buffer{};
{
nodetool::peerlist_types types{};
types.white.push_back({epee::net_utils::ipv4_network_address{1000, 10}, 44, 55});
types.white.push_back({net::tor_address::unknown(), 64, 75});
types.gray.push_back({net::tor_address::unknown(), 99, 88});
types.gray.push_back({epee::net_utils::ipv4_network_address{2000, 20}, 84, 45});
types.anchor.push_back({epee::net_utils::ipv4_network_address{999, 654}, 444, 555});
types.anchor.push_back({net::tor_address::unknown(), 14, 33});
types.anchor.push_back({net::tor_address::unknown(), 24, 22});
std::ostringstream stream{};
EXPECT_TRUE(peers.store(stream, types));
buffer = stream.str();
}
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::public_, zone::tor, zone::i2p}));
{
std::istringstream stream{buffer};
boost::optional<nodetool::peerlist_storage> read_peers =
nodetool::peerlist_storage::open(stream, true);
ASSERT_TRUE(bool(read_peers));
peers = std::move(*read_peers);
}
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::i2p}));
nodetool::peerlist_types types = peers.take_zone(zone::public_);
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::public_, zone::i2p}));
ASSERT_EQ(1u, types.white.size());
ASSERT_EQ(address_type::ipv4, types.white[0].adr.get_type_id());
EXPECT_EQ(1000u, types.white[0].adr.template as<epee::net_utils::ipv4_network_address>().ip());
EXPECT_EQ(10u, types.white[0].adr.template as<epee::net_utils::ipv4_network_address>().port());
EXPECT_EQ(44u, types.white[0].id);
EXPECT_EQ(55u, types.white[0].last_seen);
ASSERT_EQ(1u, types.gray.size());
ASSERT_EQ(address_type::ipv4, types.gray[0].adr.get_type_id());
EXPECT_EQ(2000u, types.gray[0].adr.template as<epee::net_utils::ipv4_network_address>().ip());
EXPECT_EQ(20u, types.gray[0].adr.template as<epee::net_utils::ipv4_network_address>().port());
EXPECT_EQ(84u, types.gray[0].id);
EXPECT_EQ(45u, types.gray[0].last_seen);
ASSERT_EQ(1u, types.anchor.size());
ASSERT_EQ(address_type::ipv4, types.anchor[0].adr.get_type_id());
EXPECT_EQ(999u, types.anchor[0].adr.template as<epee::net_utils::ipv4_network_address>().ip());
EXPECT_EQ(654u, types.anchor[0].adr.template as<epee::net_utils::ipv4_network_address>().port());
EXPECT_EQ(444u, types.anchor[0].id);
EXPECT_EQ(555u, types.anchor[0].first_seen);
{
std::ostringstream stream{};
EXPECT_TRUE(peers.store(stream, types));
buffer = stream.str();
}
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::public_, zone::i2p}));
types = peers.take_zone(zone::tor);
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::public_, zone::i2p, zone::tor}));
ASSERT_EQ(1u, types.white.size());
ASSERT_EQ(address_type::tor, types.white[0].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.white[0].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.white[0].adr.template as<net::tor_address>().port());
EXPECT_EQ(64u, types.white[0].id);
EXPECT_EQ(75u, types.white[0].last_seen);
ASSERT_EQ(1u, types.gray.size());
ASSERT_EQ(address_type::tor, types.gray[0].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.gray[0].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.gray[0].adr.template as<net::tor_address>().port());
EXPECT_EQ(99u, types.gray[0].id);
EXPECT_EQ(88u, types.gray[0].last_seen);
ASSERT_EQ(2u, types.anchor.size());
ASSERT_EQ(address_type::tor, types.anchor[0].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.anchor[0].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.anchor[0].adr.template as<net::tor_address>().port());
EXPECT_EQ(14u, types.anchor[0].id);
EXPECT_EQ(33u, types.anchor[0].first_seen);
ASSERT_EQ(address_type::tor, types.anchor[1].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.anchor[1].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.anchor[1].adr.template as<net::tor_address>().port());
EXPECT_EQ(24u, types.anchor[1].id);
EXPECT_EQ(22u, types.anchor[1].first_seen);
{
std::istringstream stream{buffer};
boost::optional<nodetool::peerlist_storage> read_peers =
nodetool::peerlist_storage::open(stream, true);
ASSERT_TRUE(bool(read_peers));
peers = std::move(*read_peers);
}
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::i2p}));
types = peers.take_zone(zone::public_);
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::public_, zone::i2p}));
ASSERT_EQ(1u, types.white.size());
ASSERT_EQ(address_type::ipv4, types.white[0].adr.get_type_id());
EXPECT_EQ(1000u, types.white[0].adr.template as<epee::net_utils::ipv4_network_address>().ip());
EXPECT_EQ(10u, types.white[0].adr.template as<epee::net_utils::ipv4_network_address>().port());
EXPECT_EQ(44u, types.white[0].id);
EXPECT_EQ(55u, types.white[0].last_seen);
ASSERT_EQ(1u, types.gray.size());
ASSERT_EQ(address_type::ipv4, types.gray[0].adr.get_type_id());
EXPECT_EQ(2000u, types.gray[0].adr.template as<epee::net_utils::ipv4_network_address>().ip());
EXPECT_EQ(20u, types.gray[0].adr.template as<epee::net_utils::ipv4_network_address>().port());
EXPECT_EQ(84u, types.gray[0].id);
EXPECT_EQ(45u, types.gray[0].last_seen);
ASSERT_EQ(1u, types.anchor.size());
ASSERT_EQ(address_type::ipv4, types.anchor[0].adr.get_type_id());
EXPECT_EQ(999u, types.anchor[0].adr.template as<epee::net_utils::ipv4_network_address>().ip());
EXPECT_EQ(654u, types.anchor[0].adr.template as<epee::net_utils::ipv4_network_address>().port());
EXPECT_EQ(444u, types.anchor[0].id);
EXPECT_EQ(555u, types.anchor[0].first_seen);
types = peers.take_zone(zone::tor);
EXPECT_TRUE(check_empty(peers, {zone::invalid, zone::public_, zone::i2p, zone::tor}));
ASSERT_EQ(1u, types.white.size());
ASSERT_EQ(address_type::tor, types.white[0].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.white[0].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.white[0].adr.template as<net::tor_address>().port());
EXPECT_EQ(64u, types.white[0].id);
EXPECT_EQ(75u, types.white[0].last_seen);
ASSERT_EQ(1u, types.gray.size());
ASSERT_EQ(address_type::tor, types.gray[0].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.gray[0].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.gray[0].adr.template as<net::tor_address>().port());
EXPECT_EQ(99u, types.gray[0].id);
EXPECT_EQ(88u, types.gray[0].last_seen);
ASSERT_EQ(2u, types.anchor.size());
ASSERT_EQ(address_type::tor, types.anchor[0].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.anchor[0].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.anchor[0].adr.template as<net::tor_address>().port());
EXPECT_EQ(14u, types.anchor[0].id);
EXPECT_EQ(33u, types.anchor[0].first_seen);
ASSERT_EQ(address_type::tor, types.anchor[1].adr.get_type_id());
EXPECT_STREQ(net::tor_address::unknown_str(), types.anchor[1].adr.template as<net::tor_address>().host_str());
EXPECT_EQ(0u, types.anchor[1].adr.template as<net::tor_address>().port());
EXPECT_EQ(24u, types.anchor[1].id);
EXPECT_EQ(22u, types.anchor[1].first_seen);
}