2019-01-07 11:33:07 +01:00
|
|
|
// Copyright 2015-2019 Parity Technologies (UK) Ltd.
|
|
|
|
// This file is part of Parity Ethereum.
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is free software: you can redistribute it and/or modify
|
2016-08-19 10:20:39 +02:00
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is distributed in the hope that it will be useful,
|
2016-08-19 10:20:39 +02:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
|
|
|
|
// You should have received a copy of the GNU General Public License
|
2019-01-07 11:33:07 +01:00
|
|
|
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
|
2016-08-19 10:20:39 +02:00
|
|
|
|
|
|
|
//! Stratum protocol implementation for parity ethereum/bitcoin clients
|
|
|
|
|
2016-11-22 11:56:27 +01:00
|
|
|
extern crate jsonrpc_tcp_server;
|
2016-08-19 10:20:39 +02:00
|
|
|
extern crate jsonrpc_core;
|
2017-01-11 20:02:27 +01:00
|
|
|
extern crate jsonrpc_macros;
|
2018-01-10 13:35:18 +01:00
|
|
|
extern crate ethereum_types;
|
2017-11-10 19:04:55 +01:00
|
|
|
extern crate keccak_hash as hash;
|
2017-09-02 20:09:13 +02:00
|
|
|
extern crate parking_lot;
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-11-17 17:12:12 +01:00
|
|
|
#[macro_use] extern crate log;
|
|
|
|
|
2018-10-22 09:40:50 +02:00
|
|
|
#[cfg(test)] extern crate tokio;
|
2017-10-05 12:35:01 +02:00
|
|
|
#[cfg(test)] extern crate tokio_io;
|
2019-01-08 15:07:20 +01:00
|
|
|
#[cfg(test)] extern crate env_logger;
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-10-16 17:32:15 +02:00
|
|
|
mod traits;
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2016-08-24 18:35:38 +02:00
|
|
|
pub use traits::{
|
|
|
|
JobDispatcher, PushWorkHandler, Error, ServiceConfiguration,
|
|
|
|
};
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
use jsonrpc_tcp_server::{
|
2017-03-22 07:02:14 +01:00
|
|
|
Server as JsonRpcServer, ServerBuilder as JsonRpcServerBuilder,
|
|
|
|
RequestContext, MetaExtractor, Dispatcher, PushMessageError,
|
2017-01-25 11:03:36 +01:00
|
|
|
};
|
|
|
|
use jsonrpc_core::{MetaIoHandler, Params, to_value, Value, Metadata, Compatibility};
|
2017-01-11 20:02:27 +01:00
|
|
|
use jsonrpc_macros::IoDelegate;
|
2016-08-19 10:20:39 +02:00
|
|
|
use std::sync::Arc;
|
|
|
|
|
|
|
|
use std::net::SocketAddr;
|
|
|
|
use std::collections::{HashSet, HashMap};
|
2017-08-30 19:18:28 +02:00
|
|
|
use hash::keccak;
|
2018-01-10 13:35:18 +01:00
|
|
|
use ethereum_types::H256;
|
2018-02-07 17:15:40 +01:00
|
|
|
use parking_lot::RwLock;
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-10-05 12:35:01 +02:00
|
|
|
type RpcResult = Result<jsonrpc_core::Value, jsonrpc_core::Error>;
|
2017-01-11 20:02:27 +01:00
|
|
|
|
2017-03-22 07:02:14 +01:00
|
|
|
const NOTIFY_COUNTER_INITIAL: u32 = 16;
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
/// Container which owns rpc server and stratum implementation
|
|
|
|
pub struct Stratum {
|
|
|
|
/// RPC server
|
|
|
|
///
|
|
|
|
/// It is an `Option` so it can be easily closed and released during `drop` phase
|
|
|
|
rpc_server: Option<JsonRpcServer>,
|
|
|
|
/// stratum protocol implementation
|
|
|
|
///
|
|
|
|
/// It is owned by a container and rpc server
|
|
|
|
implementation: Arc<StratumImpl>,
|
|
|
|
/// Message dispatcher (tcp/ip service)
|
|
|
|
///
|
|
|
|
/// Used to push messages to peers
|
|
|
|
tcp_dispatcher: Dispatcher,
|
2017-01-11 20:02:27 +01:00
|
|
|
}
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
impl Stratum {
|
|
|
|
pub fn start(
|
|
|
|
addr: &SocketAddr,
|
|
|
|
dispatcher: Arc<JobDispatcher>,
|
|
|
|
secret: Option<H256>,
|
|
|
|
) -> Result<Arc<Stratum>, Error> {
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
let implementation = Arc::new(StratumImpl {
|
2018-04-10 10:13:42 +02:00
|
|
|
subscribers: RwLock::default(),
|
|
|
|
job_que: RwLock::default(),
|
2018-02-07 17:15:40 +01:00
|
|
|
dispatcher,
|
2018-04-10 10:13:42 +02:00
|
|
|
workers: Arc::new(RwLock::default()),
|
2018-02-07 17:15:40 +01:00
|
|
|
secret,
|
|
|
|
notify_counter: RwLock::new(NOTIFY_COUNTER_INITIAL),
|
|
|
|
});
|
2017-01-11 20:02:27 +01:00
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
let mut delegate = IoDelegate::<StratumImpl, SocketMetadata>::new(implementation.clone());
|
|
|
|
delegate.add_method_with_meta("mining.subscribe", StratumImpl::subscribe);
|
|
|
|
delegate.add_method_with_meta("mining.authorize", StratumImpl::authorize);
|
|
|
|
delegate.add_method_with_meta("mining.submit", StratumImpl::submit);
|
|
|
|
let mut handler = MetaIoHandler::<SocketMetadata>::with_compatibility(Compatibility::Both);
|
|
|
|
handler.extend_with(delegate);
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
let server_builder = JsonRpcServerBuilder::new(handler);
|
|
|
|
let tcp_dispatcher = server_builder.dispatcher();
|
|
|
|
let server_builder = server_builder.session_meta_extractor(PeerMetaExtractor::new(tcp_dispatcher.clone()));
|
|
|
|
let server = server_builder.start(addr)?;
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
let stratum = Arc::new(Stratum {
|
|
|
|
rpc_server: Some(server),
|
|
|
|
implementation,
|
|
|
|
tcp_dispatcher,
|
|
|
|
});
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
Ok(stratum)
|
2017-01-25 11:03:36 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
impl PushWorkHandler for Stratum {
|
|
|
|
fn push_work_all(&self, payload: String) -> Result<(), Error> {
|
|
|
|
self.implementation.push_work_all(payload, &self.tcp_dispatcher)
|
|
|
|
}
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
fn push_work(&self, payloads: Vec<String>) -> Result<(), Error> {
|
|
|
|
self.implementation.push_work(payloads, &self.tcp_dispatcher)
|
2017-01-25 11:03:36 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
impl Drop for Stratum {
|
|
|
|
fn drop(&mut self) {
|
|
|
|
// shut down rpc server
|
|
|
|
self.rpc_server.take().map(|server| server.close());
|
2017-01-11 20:02:27 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
struct StratumImpl {
|
2016-08-19 10:20:39 +02:00
|
|
|
/// Subscribed clients
|
|
|
|
subscribers: RwLock<Vec<SocketAddr>>,
|
|
|
|
/// List of workers supposed to receive job update
|
|
|
|
job_que: RwLock<HashSet<SocketAddr>>,
|
|
|
|
/// Payload manager
|
|
|
|
dispatcher: Arc<JobDispatcher>,
|
|
|
|
/// Authorized workers (socket - worker_id)
|
|
|
|
workers: Arc<RwLock<HashMap<SocketAddr, String>>>,
|
|
|
|
/// Secret if any
|
|
|
|
secret: Option<H256>,
|
2017-01-25 11:03:36 +01:00
|
|
|
/// Dispatch notify couinter
|
|
|
|
notify_counter: RwLock<u32>,
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
impl StratumImpl {
|
|
|
|
/// rpc method `mining.subscribe`
|
2017-01-25 11:03:36 +01:00
|
|
|
fn subscribe(&self, _params: Params, meta: SocketMetadata) -> RpcResult {
|
2016-08-19 10:20:39 +02:00
|
|
|
use std::str::FromStr;
|
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
self.subscribers.write().push(meta.addr().clone());
|
|
|
|
self.job_que.write().insert(meta.addr().clone());
|
|
|
|
trace!(target: "stratum", "Subscription request from {:?}", meta.addr());
|
|
|
|
|
2017-10-05 12:35:01 +02:00
|
|
|
Ok(match self.dispatcher.initial() {
|
2016-08-19 10:20:39 +02:00
|
|
|
Some(initial) => match jsonrpc_core::Value::from_str(&initial) {
|
2017-02-13 16:38:47 +01:00
|
|
|
Ok(val) => Ok(val),
|
2016-08-19 10:20:39 +02:00
|
|
|
Err(e) => {
|
|
|
|
warn!(target: "stratum", "Invalid payload: '{}' ({:?})", &initial, e);
|
2016-09-01 12:00:00 +02:00
|
|
|
to_value(&[0u8; 0])
|
2016-08-19 10:20:39 +02:00
|
|
|
},
|
|
|
|
},
|
2016-09-01 12:00:00 +02:00
|
|
|
None => to_value(&[0u8; 0]),
|
2017-10-05 12:35:01 +02:00
|
|
|
}.expect("Empty slices are serializable; qed"))
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
/// rpc method `mining.authorize`
|
2017-01-25 11:03:36 +01:00
|
|
|
fn authorize(&self, params: Params, meta: SocketMetadata) -> RpcResult {
|
2017-10-05 12:35:01 +02:00
|
|
|
params.parse::<(String, String)>().map(|(worker_id, secret)|{
|
2016-08-19 10:20:39 +02:00
|
|
|
if let Some(valid_secret) = self.secret {
|
2017-08-30 19:18:28 +02:00
|
|
|
let hash = keccak(secret);
|
2016-08-19 10:20:39 +02:00
|
|
|
if hash != valid_secret {
|
|
|
|
return to_value(&false);
|
|
|
|
}
|
|
|
|
}
|
2017-01-25 11:03:36 +01:00
|
|
|
trace!(target: "stratum", "New worker #{} registered", worker_id);
|
|
|
|
self.workers.write().insert(meta.addr().clone(), worker_id);
|
|
|
|
to_value(true)
|
2017-10-05 12:35:01 +02:00
|
|
|
}).map(|v| v.expect("Only true/false is returned and it's always serializable; qed"))
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
/// rpc method `mining.submit`
|
|
|
|
fn submit(&self, params: Params, meta: SocketMetadata) -> RpcResult {
|
|
|
|
Ok(match params {
|
|
|
|
Params::Array(vals) => {
|
|
|
|
// first two elements are service messages (worker_id & job_id)
|
|
|
|
match self.dispatcher.submit(vals.iter().skip(2)
|
|
|
|
.filter_map(|val| match *val {
|
|
|
|
Value::String(ref s) => Some(s.to_owned()),
|
|
|
|
_ => None
|
|
|
|
})
|
|
|
|
.collect::<Vec<String>>()) {
|
|
|
|
Ok(()) => {
|
|
|
|
self.update_peers(&meta.tcp_dispatcher.expect("tcp_dispatcher is always initialized; qed"));
|
|
|
|
to_value(true)
|
|
|
|
},
|
|
|
|
Err(submit_err) => {
|
|
|
|
warn!("Error while submitting share: {:?}", submit_err);
|
|
|
|
to_value(false)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
_ => {
|
|
|
|
trace!(target: "stratum", "Invalid submit work format {:?}", params);
|
|
|
|
to_value(false)
|
|
|
|
}
|
|
|
|
}.expect("Only true/false is returned and it's always serializable; qed"))
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
/// Helper method
|
|
|
|
fn update_peers(&self, tcp_dispatcher: &Dispatcher) {
|
|
|
|
if let Some(job) = self.dispatcher.job() {
|
|
|
|
if let Err(e) = self.push_work_all(job, tcp_dispatcher) {
|
|
|
|
warn!("Failed to update some of the peers: {:?}", e);
|
|
|
|
}
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
fn push_work_all(&self, payload: String, tcp_dispatcher: &Dispatcher) -> Result<(), Error> {
|
2017-01-25 11:03:36 +01:00
|
|
|
let hup_peers = {
|
|
|
|
let workers = self.workers.read();
|
|
|
|
let next_request_id = {
|
|
|
|
let mut counter = self.notify_counter.write();
|
|
|
|
if *counter == ::std::u32::MAX { *counter = NOTIFY_COUNTER_INITIAL; }
|
|
|
|
else { *counter = *counter + 1 }
|
|
|
|
*counter
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut hup_peers = HashSet::with_capacity(0); // most of the cases won't be needed, hence avoid allocation
|
|
|
|
let workers_msg = format!("{{ \"id\": {}, \"method\": \"mining.notify\", \"params\": {} }}", next_request_id, payload);
|
|
|
|
trace!(target: "stratum", "pushing work for {} workers (payload: '{}')", workers.len(), &workers_msg);
|
|
|
|
for (ref addr, _) in workers.iter() {
|
|
|
|
trace!(target: "stratum", "pusing work to {}", addr);
|
2018-02-07 17:15:40 +01:00
|
|
|
match tcp_dispatcher.push_message(addr, workers_msg.clone()) {
|
2017-01-25 11:03:36 +01:00
|
|
|
Err(PushMessageError::NoSuchPeer) => {
|
|
|
|
trace!(target: "stratum", "Worker no longer connected: {}", &addr);
|
|
|
|
hup_peers.insert(*addr.clone());
|
|
|
|
},
|
|
|
|
Err(e) => {
|
|
|
|
warn!(target: "stratum", "Unexpected transport error: {:?}", e);
|
|
|
|
},
|
|
|
|
Ok(_) => { },
|
|
|
|
}
|
|
|
|
}
|
|
|
|
hup_peers
|
|
|
|
};
|
|
|
|
|
|
|
|
if !hup_peers.is_empty() {
|
|
|
|
let mut workers = self.workers.write();
|
|
|
|
for hup_peer in hup_peers { workers.remove(&hup_peer); }
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2016-08-19 10:20:39 +02:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
fn push_work(&self, payloads: Vec<String>, tcp_dispatcher: &Dispatcher) -> Result<(), Error> {
|
2016-08-19 10:20:39 +02:00
|
|
|
if !payloads.len() > 0 {
|
|
|
|
return Err(Error::NoWork);
|
|
|
|
}
|
|
|
|
let workers = self.workers.read();
|
|
|
|
let addrs = workers.keys().collect::<Vec<&SocketAddr>>();
|
|
|
|
if !workers.len() > 0 {
|
|
|
|
return Err(Error::NoWorkers);
|
|
|
|
}
|
|
|
|
let mut que = payloads;
|
|
|
|
let mut addr_index = 0;
|
|
|
|
while que.len() > 0 {
|
|
|
|
let next_worker = addrs[addr_index];
|
|
|
|
let mut next_payload = que.drain(0..1);
|
2018-02-07 17:15:40 +01:00
|
|
|
tcp_dispatcher.push_message(
|
|
|
|
next_worker,
|
|
|
|
next_payload.nth(0).expect("drained successfully of 0..1, so 0-th element should exist")
|
|
|
|
)?;
|
2016-08-19 10:20:39 +02:00
|
|
|
addr_index = addr_index + 1;
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-07 17:15:40 +01:00
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct SocketMetadata {
|
|
|
|
addr: SocketAddr,
|
|
|
|
// with the new version of jsonrpc-core, SocketMetadata
|
|
|
|
// won't have to implement default, so this field will not
|
|
|
|
// have to be an Option
|
|
|
|
tcp_dispatcher: Option<Dispatcher>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for SocketMetadata {
|
|
|
|
fn default() -> Self {
|
|
|
|
SocketMetadata {
|
|
|
|
addr: "0.0.0.0:0".parse().unwrap(),
|
|
|
|
tcp_dispatcher: None,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl SocketMetadata {
|
|
|
|
pub fn addr(&self) -> &SocketAddr {
|
|
|
|
&self.addr
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Metadata for SocketMetadata { }
|
|
|
|
|
|
|
|
pub struct PeerMetaExtractor {
|
|
|
|
tcp_dispatcher: Dispatcher,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PeerMetaExtractor {
|
|
|
|
fn new(tcp_dispatcher: Dispatcher) -> Self {
|
|
|
|
PeerMetaExtractor {
|
|
|
|
tcp_dispatcher,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl MetaExtractor<SocketMetadata> for PeerMetaExtractor {
|
|
|
|
fn extract(&self, context: &RequestContext) -> SocketMetadata {
|
|
|
|
SocketMetadata {
|
|
|
|
addr: context.peer_addr,
|
|
|
|
tcp_dispatcher: Some(self.tcp_dispatcher.clone()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-19 10:20:39 +02:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
2018-10-22 09:40:50 +02:00
|
|
|
use std::net::{SocketAddr, Shutdown};
|
2017-01-25 11:03:36 +01:00
|
|
|
use std::sync::Arc;
|
|
|
|
|
2018-10-22 09:40:50 +02:00
|
|
|
use tokio::{io, runtime::Runtime, timer::timeout::{self, Timeout}, net::TcpStream};
|
2017-10-05 12:35:01 +02:00
|
|
|
use jsonrpc_core::futures::{Future, future};
|
2016-08-19 10:20:39 +02:00
|
|
|
|
|
|
|
pub struct VoidManager;
|
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
impl JobDispatcher for VoidManager {
|
|
|
|
fn submit(&self, _payload: Vec<String>) -> Result<(), Error> {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
fn dummy_request(addr: &SocketAddr, data: &str) -> Vec<u8> {
|
2018-10-22 09:40:50 +02:00
|
|
|
let mut runtime = Runtime::new().expect("Tokio Runtime should be created with no errors");
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2017-07-29 17:12:07 +02:00
|
|
|
let mut data_vec = data.as_bytes().to_vec();
|
2017-01-25 11:03:36 +01:00
|
|
|
data_vec.extend(b"\n");
|
|
|
|
|
2018-10-22 09:40:50 +02:00
|
|
|
let stream = TcpStream::connect(addr)
|
|
|
|
.and_then(move |stream| {
|
|
|
|
io::write_all(stream, data_vec)
|
2017-01-25 11:03:36 +01:00
|
|
|
})
|
|
|
|
.and_then(|(stream, _)| {
|
2018-10-22 09:40:50 +02:00
|
|
|
stream.shutdown(Shutdown::Write).unwrap();
|
|
|
|
io::read_to_end(stream, Vec::with_capacity(2048))
|
2017-01-25 11:03:36 +01:00
|
|
|
})
|
2018-10-22 09:40:50 +02:00
|
|
|
.and_then(|(_stream, read_buf)| {
|
|
|
|
future::ok(read_buf)
|
2017-01-25 11:03:36 +01:00
|
|
|
});
|
2018-10-22 09:40:50 +02:00
|
|
|
let result = runtime.block_on(stream).expect("Runtime should run with no errors");
|
2017-01-25 11:03:36 +01:00
|
|
|
|
|
|
|
result
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn can_be_started() {
|
2018-04-10 10:13:42 +02:00
|
|
|
let stratum = Stratum::start(&"127.0.0.1:19980".parse().unwrap(), Arc::new(VoidManager), None);
|
2016-08-19 10:20:39 +02:00
|
|
|
assert!(stratum.is_ok());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn records_subscriber() {
|
2019-01-08 15:07:20 +01:00
|
|
|
let _ = ::env_logger::try_init();
|
2017-01-25 11:03:36 +01:00
|
|
|
|
2018-04-10 10:13:42 +02:00
|
|
|
let addr = "127.0.0.1:19985".parse().unwrap();
|
2016-08-19 10:20:39 +02:00
|
|
|
let stratum = Stratum::start(&addr, Arc::new(VoidManager), None).unwrap();
|
2017-01-25 11:03:36 +01:00
|
|
|
let request = r#"{"jsonrpc": "2.0", "method": "mining.subscribe", "params": [], "id": 1}"#;
|
|
|
|
dummy_request(&addr, request);
|
2018-02-07 17:15:40 +01:00
|
|
|
assert_eq!(1, stratum.implementation.subscribers.read().len());
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
struct DummyManager {
|
|
|
|
initial_payload: String
|
|
|
|
}
|
|
|
|
|
|
|
|
impl DummyManager {
|
|
|
|
fn new() -> Arc<DummyManager> {
|
|
|
|
Arc::new(Self::build())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn build() -> DummyManager {
|
|
|
|
DummyManager { initial_payload: r#"[ "dummy payload" ]"#.to_owned() }
|
|
|
|
}
|
|
|
|
|
|
|
|
fn of_initial(mut self, new_initial: &str) -> DummyManager {
|
|
|
|
self.initial_payload = new_initial.to_owned();
|
|
|
|
self
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl JobDispatcher for DummyManager {
|
|
|
|
fn initial(&self) -> Option<String> {
|
|
|
|
Some(self.initial_payload.clone())
|
|
|
|
}
|
2017-01-25 11:03:36 +01:00
|
|
|
|
|
|
|
fn submit(&self, _payload: Vec<String>) -> Result<(), Error> {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn terminated_str(origin: &'static str) -> String {
|
|
|
|
let mut s = String::new();
|
|
|
|
s.push_str(origin);
|
|
|
|
s.push_str("\n");
|
|
|
|
s
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2018-10-22 09:40:50 +02:00
|
|
|
fn receives_initial_payload() {
|
2018-04-10 10:13:42 +02:00
|
|
|
let addr = "127.0.0.1:19975".parse().unwrap();
|
2018-02-07 17:15:40 +01:00
|
|
|
let _stratum = Stratum::start(&addr, DummyManager::new(), None).expect("There should be no error starting stratum");
|
2017-01-25 11:03:36 +01:00
|
|
|
let request = r#"{"jsonrpc": "2.0", "method": "mining.subscribe", "params": [], "id": 2}"#;
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
let response = String::from_utf8(dummy_request(&addr, request)).unwrap();
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
assert_eq!(terminated_str(r#"{"jsonrpc":"2.0","result":["dummy payload"],"id":2}"#), response);
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn can_authorize() {
|
2018-04-10 10:13:42 +02:00
|
|
|
let addr = "127.0.0.1:19970".parse().unwrap();
|
2016-08-19 10:20:39 +02:00
|
|
|
let stratum = Stratum::start(
|
|
|
|
&addr,
|
|
|
|
Arc::new(DummyManager::build().of_initial(r#"["dummy autorize payload"]"#)),
|
|
|
|
None
|
2017-01-25 11:03:36 +01:00
|
|
|
).expect("There should be no error starting stratum");
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
let request = r#"{"jsonrpc": "2.0", "method": "mining.authorize", "params": ["miner1", ""], "id": 1}"#;
|
|
|
|
let response = String::from_utf8(dummy_request(&addr, request)).unwrap();
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2017-01-25 11:03:36 +01:00
|
|
|
assert_eq!(terminated_str(r#"{"jsonrpc":"2.0","result":true,"id":1}"#), response);
|
2018-02-07 17:15:40 +01:00
|
|
|
assert_eq!(1, stratum.implementation.workers.read().len());
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn can_push_work() {
|
2019-01-08 15:07:20 +01:00
|
|
|
let _ = ::env_logger::try_init();
|
2016-08-19 10:20:39 +02:00
|
|
|
|
2018-04-10 10:13:42 +02:00
|
|
|
let addr = "127.0.0.1:19995".parse().unwrap();
|
2016-08-19 10:20:39 +02:00
|
|
|
let stratum = Stratum::start(
|
|
|
|
&addr,
|
2017-01-25 11:03:36 +01:00
|
|
|
Arc::new(DummyManager::build().of_initial(r#"["dummy autorize payload"]"#)),
|
2016-08-19 10:20:39 +02:00
|
|
|
None
|
2017-01-25 11:03:36 +01:00
|
|
|
).expect("There should be no error starting stratum");
|
|
|
|
|
|
|
|
let mut auth_request =
|
|
|
|
r#"{"jsonrpc": "2.0", "method": "mining.authorize", "params": ["miner1", ""], "id": 1}"#
|
|
|
|
.as_bytes()
|
2017-07-29 17:12:07 +02:00
|
|
|
.to_vec();
|
2017-01-25 11:03:36 +01:00
|
|
|
auth_request.extend(b"\n");
|
|
|
|
|
2018-10-22 09:40:50 +02:00
|
|
|
let auth_response = "{\"jsonrpc\":\"2.0\",\"result\":true,\"id\":1}\n";
|
|
|
|
|
|
|
|
let mut runtime = Runtime::new().expect("Tokio Runtime should be created with no errors");
|
|
|
|
let read_buf0 = vec![0u8; auth_response.len()];
|
|
|
|
let read_buf1 = Vec::with_capacity(2048);
|
|
|
|
let stream = TcpStream::connect(&addr)
|
|
|
|
.and_then(move |stream| {
|
|
|
|
io::write_all(stream, auth_request)
|
2017-01-25 11:03:36 +01:00
|
|
|
})
|
|
|
|
.and_then(|(stream, _)| {
|
2018-10-22 09:40:50 +02:00
|
|
|
io::read_exact(stream, read_buf0)
|
2017-01-25 11:03:36 +01:00
|
|
|
})
|
2018-10-22 09:40:50 +02:00
|
|
|
.map_err(|err| panic!("{:?}", err))
|
|
|
|
.and_then(move |(stream, read_buf0)| {
|
|
|
|
assert_eq!(String::from_utf8(read_buf0).unwrap(), auth_response);
|
2017-01-25 11:03:36 +01:00
|
|
|
trace!(target: "stratum", "Received authorization confirmation");
|
2018-10-22 09:40:50 +02:00
|
|
|
Timeout::new(future::ok(stream), ::std::time::Duration::from_millis(100))
|
2017-01-25 11:03:36 +01:00
|
|
|
})
|
2018-10-22 09:40:50 +02:00
|
|
|
.map_err(|err: timeout::Error<()>| panic!("Timeout: {:?}", err))
|
|
|
|
.and_then(move |stream| {
|
2017-01-25 11:03:36 +01:00
|
|
|
trace!(target: "stratum", "Pusing work to peers");
|
|
|
|
stratum.push_work_all(r#"{ "00040008", "100500" }"#.to_owned())
|
|
|
|
.expect("Pushing work should produce no errors");
|
2018-10-22 09:40:50 +02:00
|
|
|
Timeout::new(future::ok(stream), ::std::time::Duration::from_millis(100))
|
2017-01-25 11:03:36 +01:00
|
|
|
})
|
2018-10-22 09:40:50 +02:00
|
|
|
.map_err(|err: timeout::Error<()>| panic!("Timeout: {:?}", err))
|
|
|
|
.and_then(|stream| {
|
2017-01-25 11:03:36 +01:00
|
|
|
trace!(target: "stratum", "Ready to read work from server");
|
2018-10-22 09:40:50 +02:00
|
|
|
stream.shutdown(Shutdown::Write).unwrap();
|
|
|
|
io::read_to_end(stream, read_buf1)
|
2017-01-25 11:03:36 +01:00
|
|
|
})
|
2018-10-22 09:40:50 +02:00
|
|
|
.and_then(|(_, read_buf1)| {
|
2017-01-25 11:03:36 +01:00
|
|
|
trace!(target: "stratum", "Received work from server");
|
2018-10-22 09:40:50 +02:00
|
|
|
future::ok(read_buf1)
|
2017-01-25 11:03:36 +01:00
|
|
|
});
|
|
|
|
let response = String::from_utf8(
|
2018-10-22 09:40:50 +02:00
|
|
|
runtime.block_on(stream).expect("Runtime should run with no errors")
|
2017-01-25 11:03:36 +01:00
|
|
|
).expect("Response should be utf-8");
|
|
|
|
|
|
|
|
assert_eq!(
|
|
|
|
"{ \"id\": 17, \"method\": \"mining.notify\", \"params\": { \"00040008\", \"100500\" } }\n",
|
|
|
|
response);
|
2016-08-19 10:20:39 +02:00
|
|
|
}
|
|
|
|
}
|