Skip to content

Commit 03d3682

Browse files
committed
gateway probe fixes
1 parent 70f1a0b commit 03d3682

File tree

4 files changed

+48
-33
lines changed

4 files changed

+48
-33
lines changed

common/credential-verification/src/upgrade_mode.rs

Lines changed: 34 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -292,29 +292,39 @@ struct UpgradeModeStateInner {
292292
status: UpgradeModeStatus,
293293
}
294294

295-
#[cfg(test)]
296-
pub fn mock_dummy_upgrade_mode_details() -> (UpgradeModeDetails, UnboundedReceiver<CheckRequest>) {
297-
let (um_recheck_tx, um_recheck_rx) = futures::channel::mpsc::unbounded();
298-
299-
const DUMMY_ATTESTER_ED25519_PRIVATE_KEY: [u8; 32] = [
300-
108, 49, 193, 21, 126, 161, 249, 85, 242, 207, 74, 195, 238, 6, 64, 149, 201, 140, 248,
301-
163, 122, 170, 79, 198, 87, 85, 36, 29, 243, 92, 64, 161,
302-
];
303-
304-
pub(crate) fn dummy_attester_public_key() -> ed25519::PublicKey {
305-
let private_key =
306-
ed25519::PrivateKey::from_bytes(&DUMMY_ATTESTER_ED25519_PRIVATE_KEY).unwrap();
307-
private_key.public_key()
308-
}
295+
pub mod testing {
296+
use crate::UpgradeModeState;
297+
use crate::upgrade_mode::{
298+
CheckRequest, UpgradeModeCheckConfig, UpgradeModeCheckRequestSender, UpgradeModeDetails,
299+
};
300+
use futures::channel::mpsc::UnboundedReceiver;
301+
use nym_crypto::asymmetric::ed25519;
302+
use std::time::Duration;
303+
304+
pub fn mock_dummy_upgrade_mode_details() -> (UpgradeModeDetails, UnboundedReceiver<CheckRequest>)
305+
{
306+
let (um_recheck_tx, um_recheck_rx) = futures::channel::mpsc::unbounded();
307+
308+
const DUMMY_ATTESTER_ED25519_PRIVATE_KEY: [u8; 32] = [
309+
108, 49, 193, 21, 126, 161, 249, 85, 242, 207, 74, 195, 238, 6, 64, 149, 201, 140, 248,
310+
163, 122, 170, 79, 198, 87, 85, 36, 29, 243, 92, 64, 161,
311+
];
312+
313+
pub(crate) fn dummy_attester_public_key() -> ed25519::PublicKey {
314+
let private_key =
315+
ed25519::PrivateKey::from_bytes(&DUMMY_ATTESTER_ED25519_PRIVATE_KEY).unwrap();
316+
private_key.public_key()
317+
}
309318

310-
let upgrade_mode_state = UpgradeModeState::new(dummy_attester_public_key());
311-
let upgrade_mode_details = UpgradeModeDetails::new(
312-
UpgradeModeCheckConfig {
313-
// essentially we never want to trigger this in our tests
314-
min_staleness_recheck: Duration::from_nanos(1),
315-
},
316-
UpgradeModeCheckRequestSender::new(um_recheck_tx),
317-
upgrade_mode_state.clone(),
318-
);
319-
(upgrade_mode_details, um_recheck_rx)
319+
let upgrade_mode_state = UpgradeModeState::new(dummy_attester_public_key());
320+
let upgrade_mode_details = UpgradeModeDetails::new(
321+
UpgradeModeCheckConfig {
322+
// essentially we never want to trigger this in our tests
323+
min_staleness_recheck: Duration::from_nanos(1),
324+
},
325+
UpgradeModeCheckRequestSender::new(um_recheck_tx),
326+
upgrade_mode_state.clone(),
327+
);
328+
(upgrade_mode_details, um_recheck_rx)
329+
}
320330
}

gateway/src/node/wireguard/peer_manager.rs

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -309,7 +309,7 @@ mod tests {
309309

310310
use crate::node::wireguard::PeerRegistrator;
311311
use crate::nym_authenticator::config::Authenticator;
312-
use nym_credential_verification::upgrade_mode::mock_dummy_upgrade_mode_details;
312+
use nym_credential_verification::upgrade_mode::testing::mock_dummy_upgrade_mode_details;
313313
use nym_credential_verification::{
314314
bandwidth_storage_manager::BandwidthStorageManager, ecash::MockEcashManager,
315315
};
@@ -403,8 +403,11 @@ mod tests {
403403

404404
let peer = Peer::default();
405405
let ecash_manager = Arc::new(MockEcashManager::new(Box::new(storage.clone())));
406-
let peer_registrator =
407-
PeerRegistrator::new(ecash_manager.clone(), peer_manager, upgrade_mode_details);
406+
let peer_registrator = PeerRegistrator::new(
407+
ecash_manager.clone(),
408+
peer_manager.clone(),
409+
upgrade_mode_details,
410+
);
408411

409412
assert!(peer_manager.add_peer(peer.clone()).await.is_err());
410413

@@ -432,8 +435,11 @@ mod tests {
432435
let peer = Peer::default();
433436
let ecash_manager = Arc::new(MockEcashManager::new(Box::new(storage.clone())));
434437

435-
let peer_registrator =
436-
PeerRegistrator::new(ecash_manager.clone(), peer_manager, upgrade_mode_details);
438+
let peer_registrator = PeerRegistrator::new(
439+
ecash_manager.clone(),
440+
peer_manager.clone(),
441+
upgrade_mode_details,
442+
);
437443

438444
let client_id = storage
439445
.insert_wireguard_peer(&peer, FromStr::from_str("entry_wireguard").unwrap())

integration-tests/src/lp_registration.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ mod tests {
77
use nym_bandwidth_controller::mock::MockBandwidthController;
88
use nym_credential_verification::UpgradeModeState;
99
use nym_credential_verification::ecash::MockEcashManager;
10+
use nym_credential_verification::upgrade_mode::testing::mock_dummy_upgrade_mode_details;
1011
use nym_credential_verification::upgrade_mode::{
1112
UpgradeModeCheckConfig, UpgradeModeCheckRequestSender, UpgradeModeDetails,
12-
mock_dummy_upgrade_mode_details,
1313
};
1414
use nym_credentials_interface::TicketType;
1515
use nym_crypto::asymmetric::{ed25519, x25519};

nym-gateway-probe/src/common/probe_tests.rs

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -246,7 +246,6 @@ pub async fn lp_registration_probe(
246246
info!(" - Gateway public key: {:?}", gateway_data.public_key);
247247
info!(" - Private IPv4: {}", gateway_data.private_ipv4);
248248
info!(" - Private IPv6: {}", gateway_data.private_ipv6);
249-
info!(" - Endpoint: {}", gateway_data.endpoint);
250249
lp_outcome.can_register = true;
251250

252251
Ok(lp_outcome)
@@ -403,9 +402,9 @@ pub async fn wg_probe_lp(
403402

404403
// Build WireGuard endpoint addresses
405404
// Entry endpoint uses entry_ip (host-reachable) + port from registration
406-
let entry_wg_endpoint = format!("{}:{}", entry_ip, entry_gateway_data.endpoint.port());
405+
let entry_wg_endpoint = format!("{}:{}", entry_ip, entry_gateway_data.port);
407406
// Exit endpoint uses exit_ip + port from registration (forwarded via entry)
408-
let exit_wg_endpoint = format!("{}:{}", exit_ip, exit_gateway_data.endpoint.port());
407+
let exit_wg_endpoint = format!("{}:{}", exit_ip, exit_gateway_data.port);
409408

410409
info!("Two-hop WireGuard configuration:");
411410
info!(" Entry gateway:");

0 commit comments

Comments
 (0)