Bitcoin Core  29.1.0
P2P Digital Currency
denialofservice_tests.cpp
Go to the documentation of this file.
1 // Copyright (c) 2011-2022 The Bitcoin Core developers
2 // Distributed under the MIT software license, see the accompanying
3 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 
5 // Unit tests for denial-of-service detection/prevention code
6 
7 #include <banman.h>
8 #include <chainparams.h>
9 #include <common/args.h>
10 #include <net.h>
11 #include <net_processing.h>
12 #include <pubkey.h>
13 #include <script/sign.h>
14 #include <script/signingprovider.h>
15 #include <serialize.h>
16 #include <test/util/net.h>
17 #include <test/util/random.h>
18 #include <test/util/setup_common.h>
19 #include <util/string.h>
20 #include <util/time.h>
21 #include <validation.h>
22 
23 #include <array>
24 #include <stdint.h>
25 
26 #include <boost/test/unit_test.hpp>
27 
28 static CService ip(uint32_t i)
29 {
30  struct in_addr s;
31  s.s_addr = i;
32  return CService(CNetAddr(s), Params().GetDefaultPort());
33 }
34 
35 BOOST_FIXTURE_TEST_SUITE(denialofservice_tests, TestingSetup)
36 
37 // Test eviction of an outbound peer whose chain never advances
38 // Mock a node connection, and use mocktime to simulate a peer
39 // which never sends any headers messages. PeerLogic should
40 // decide to evict that outbound peer, after the appropriate timeouts.
41 // Note that we protect 4 outbound nodes from being subject to
42 // this logic; this test takes advantage of that protection only
43 // being applied to nodes which send headers with sufficient
44 // work.
45 BOOST_AUTO_TEST_CASE(outbound_slow_chain_eviction)
46 {
48 
49  ConnmanTestMsg& connman = static_cast<ConnmanTestMsg&>(*m_node.connman);
50  // Disable inactivity checks for this test to avoid interference
51  connman.SetPeerConnectTimeout(99999s);
52  PeerManager& peerman = *m_node.peerman;
53 
54  // Mock an outbound peer
55  CAddress addr1(ip(0xa0b0c001), NODE_NONE);
56  NodeId id{0};
57  CNode dummyNode1{id++,
58  /*sock=*/nullptr,
59  addr1,
60  /*nKeyedNetGroupIn=*/0,
61  /*nLocalHostNonceIn=*/0,
62  CAddress(),
63  /*addrNameIn=*/"",
65  /*inbound_onion=*/false};
66 
67  connman.Handshake(
68  /*node=*/dummyNode1,
69  /*successfully_connected=*/true,
70  /*remote_services=*/ServiceFlags(NODE_NETWORK | NODE_WITNESS),
71  /*local_services=*/ServiceFlags(NODE_NETWORK | NODE_WITNESS),
72  /*version=*/PROTOCOL_VERSION,
73  /*relay_txs=*/true);
74 
75  // This test requires that we have a chain with non-zero work.
76  {
77  LOCK(cs_main);
78  BOOST_CHECK(m_node.chainman->ActiveChain().Tip() != nullptr);
79  BOOST_CHECK(m_node.chainman->ActiveChain().Tip()->nChainWork > 0);
80  }
81 
82  // Test starts here
83  BOOST_CHECK(peerman.SendMessages(&dummyNode1)); // should result in getheaders
84 
85  {
86  LOCK(dummyNode1.cs_vSend);
87  const auto& [to_send, _more, _msg_type] = dummyNode1.m_transport->GetBytesToSend(false);
88  BOOST_CHECK(!to_send.empty());
89  }
90  connman.FlushSendBuffer(dummyNode1);
91 
92  int64_t nStartTime = GetTime();
93  // Wait 21 minutes
94  SetMockTime(nStartTime+21*60);
95  BOOST_CHECK(peerman.SendMessages(&dummyNode1)); // should result in getheaders
96  {
97  LOCK(dummyNode1.cs_vSend);
98  const auto& [to_send, _more, _msg_type] = dummyNode1.m_transport->GetBytesToSend(false);
99  BOOST_CHECK(!to_send.empty());
100  }
101  // Wait 3 more minutes
102  SetMockTime(nStartTime+24*60);
103  BOOST_CHECK(peerman.SendMessages(&dummyNode1)); // should result in disconnect
104  BOOST_CHECK(dummyNode1.fDisconnect == true);
105 
106  peerman.FinalizeNode(dummyNode1);
107 }
108 
110 void AddRandomOutboundPeer(NodeId& id, std::vector<CNode*>& vNodes, PeerManager& peerLogic, ConnmanTestMsg& connman, ConnectionType connType, bool onion_peer = false)
111 {
112  CAddress addr;
113 
114  if (onion_peer) {
115  auto tor_addr{m_rng.randbytes(ADDR_TORV3_SIZE)};
116  BOOST_REQUIRE(addr.SetSpecial(OnionToString(tor_addr)));
117  }
118 
119  while (!addr.IsRoutable()) {
120  addr = CAddress(ip(m_rng.randbits(32)), NODE_NONE);
121  }
122 
123  vNodes.emplace_back(new CNode{id++,
124  /*sock=*/nullptr,
125  addr,
126  /*nKeyedNetGroupIn=*/0,
127  /*nLocalHostNonceIn=*/0,
128  CAddress(),
129  /*addrNameIn=*/"",
130  connType,
131  /*inbound_onion=*/false});
132  CNode &node = *vNodes.back();
133  node.SetCommonVersion(PROTOCOL_VERSION);
134 
136  node.fSuccessfullyConnected = true;
137 
138  connman.AddTestNode(node);
139 }
140 }; // struct OutboundTest
141 
142 BOOST_FIXTURE_TEST_CASE(stale_tip_peer_management, OutboundTest)
143 {
144  NodeId id{0};
145  auto connman = std::make_unique<ConnmanTestMsg>(0x1337, 0x1337, *m_node.addrman, *m_node.netgroupman, Params());
146  auto peerLogic = PeerManager::make(*connman, *m_node.addrman, nullptr, *m_node.chainman, *m_node.mempool, *m_node.warnings, {});
147 
148  constexpr int max_outbound_full_relay = MAX_OUTBOUND_FULL_RELAY_CONNECTIONS;
149  CConnman::Options options;
151 
152  const auto time_init{GetTime<std::chrono::seconds>()};
153  SetMockTime(time_init);
154  const auto time_later{time_init + 3 * std::chrono::seconds{m_node.chainman->GetConsensus().nPowTargetSpacing} + 1s};
155  connman->Init(options);
156  std::vector<CNode *> vNodes;
157 
158  // Mock some outbound peers
159  for (int i = 0; i < max_outbound_full_relay; ++i) {
160  AddRandomOutboundPeer(id, vNodes, *peerLogic, *connman, ConnectionType::OUTBOUND_FULL_RELAY);
161  }
162 
163  peerLogic->CheckForStaleTipAndEvictPeers();
164 
165  // No nodes should be marked for disconnection while we have no extra peers
166  for (const CNode *node : vNodes) {
167  BOOST_CHECK(node->fDisconnect == false);
168  }
169 
170  SetMockTime(time_later);
171 
172  // Now tip should definitely be stale, and we should look for an extra
173  // outbound peer
174  peerLogic->CheckForStaleTipAndEvictPeers();
175  BOOST_CHECK(connman->GetTryNewOutboundPeer());
176 
177  // Still no peers should be marked for disconnection
178  for (const CNode *node : vNodes) {
179  BOOST_CHECK(node->fDisconnect == false);
180  }
181 
182  // If we add one more peer, something should get marked for eviction
183  // on the next check (since we're mocking the time to be in the future, the
184  // required time connected check should be satisfied).
185  SetMockTime(time_init);
186  AddRandomOutboundPeer(id, vNodes, *peerLogic, *connman, ConnectionType::OUTBOUND_FULL_RELAY);
187  SetMockTime(time_later);
188 
189  peerLogic->CheckForStaleTipAndEvictPeers();
190  for (int i = 0; i < max_outbound_full_relay; ++i) {
191  BOOST_CHECK(vNodes[i]->fDisconnect == false);
192  }
193  // Last added node should get marked for eviction
194  BOOST_CHECK(vNodes.back()->fDisconnect == true);
195 
196  vNodes.back()->fDisconnect = false;
197 
198  // Update the last announced block time for the last
199  // peer, and check that the next newest node gets evicted.
200  peerLogic->UpdateLastBlockAnnounceTime(vNodes.back()->GetId(), GetTime());
201 
202  peerLogic->CheckForStaleTipAndEvictPeers();
203  for (int i = 0; i < max_outbound_full_relay - 1; ++i) {
204  BOOST_CHECK(vNodes[i]->fDisconnect == false);
205  }
206  BOOST_CHECK(vNodes[max_outbound_full_relay-1]->fDisconnect == true);
207  BOOST_CHECK(vNodes.back()->fDisconnect == false);
208 
209  vNodes[max_outbound_full_relay - 1]->fDisconnect = false;
210 
211  // Add an onion peer, that will be protected because it is the only one for
212  // its network, so another peer gets disconnected instead.
213  SetMockTime(time_init);
214  AddRandomOutboundPeer(id, vNodes, *peerLogic, *connman, ConnectionType::OUTBOUND_FULL_RELAY, /*onion_peer=*/true);
215  SetMockTime(time_later);
216  peerLogic->CheckForStaleTipAndEvictPeers();
217 
218  for (int i = 0; i < max_outbound_full_relay - 2; ++i) {
219  BOOST_CHECK(vNodes[i]->fDisconnect == false);
220  }
221  BOOST_CHECK(vNodes[max_outbound_full_relay - 2]->fDisconnect == false);
222  BOOST_CHECK(vNodes[max_outbound_full_relay - 1]->fDisconnect == true);
223  BOOST_CHECK(vNodes[max_outbound_full_relay]->fDisconnect == false);
224 
225  // Add a second onion peer which won't be protected
226  SetMockTime(time_init);
227  AddRandomOutboundPeer(id, vNodes, *peerLogic, *connman, ConnectionType::OUTBOUND_FULL_RELAY, /*onion_peer=*/true);
228  SetMockTime(time_later);
229  peerLogic->CheckForStaleTipAndEvictPeers();
230 
231  BOOST_CHECK(vNodes.back()->fDisconnect == true);
232 
233  for (const CNode *node : vNodes) {
234  peerLogic->FinalizeNode(*node);
235  }
236 
237  connman->ClearTestNodes();
238 }
239 
240 BOOST_FIXTURE_TEST_CASE(block_relay_only_eviction, OutboundTest)
241 {
242  NodeId id{0};
243  auto connman = std::make_unique<ConnmanTestMsg>(0x1337, 0x1337, *m_node.addrman, *m_node.netgroupman, Params());
244  auto peerLogic = PeerManager::make(*connman, *m_node.addrman, nullptr, *m_node.chainman, *m_node.mempool, *m_node.warnings, {});
245 
246  constexpr int max_outbound_block_relay{MAX_BLOCK_RELAY_ONLY_CONNECTIONS};
247  constexpr int64_t MINIMUM_CONNECT_TIME{30};
248  CConnman::Options options;
250 
251  connman->Init(options);
252  std::vector<CNode*> vNodes;
253 
254  // Add block-relay-only peers up to the limit
255  for (int i = 0; i < max_outbound_block_relay; ++i) {
256  AddRandomOutboundPeer(id, vNodes, *peerLogic, *connman, ConnectionType::BLOCK_RELAY);
257  }
258  peerLogic->CheckForStaleTipAndEvictPeers();
259 
260  for (int i = 0; i < max_outbound_block_relay; ++i) {
261  BOOST_CHECK(vNodes[i]->fDisconnect == false);
262  }
263 
264  // Add an extra block-relay-only peer breaking the limit (mocks logic in ThreadOpenConnections)
265  AddRandomOutboundPeer(id, vNodes, *peerLogic, *connman, ConnectionType::BLOCK_RELAY);
266  peerLogic->CheckForStaleTipAndEvictPeers();
267 
268  // The extra peer should only get marked for eviction after MINIMUM_CONNECT_TIME
269  for (int i = 0; i < max_outbound_block_relay; ++i) {
270  BOOST_CHECK(vNodes[i]->fDisconnect == false);
271  }
272  BOOST_CHECK(vNodes.back()->fDisconnect == false);
273 
275  peerLogic->CheckForStaleTipAndEvictPeers();
276  for (int i = 0; i < max_outbound_block_relay; ++i) {
277  BOOST_CHECK(vNodes[i]->fDisconnect == false);
278  }
279  BOOST_CHECK(vNodes.back()->fDisconnect == true);
280 
281  // Update the last block time for the extra peer,
282  // and check that the next youngest peer gets evicted.
283  vNodes.back()->fDisconnect = false;
284  vNodes.back()->m_last_block_time = GetTime<std::chrono::seconds>();
285 
286  peerLogic->CheckForStaleTipAndEvictPeers();
287  for (int i = 0; i < max_outbound_block_relay - 1; ++i) {
288  BOOST_CHECK(vNodes[i]->fDisconnect == false);
289  }
290  BOOST_CHECK(vNodes[max_outbound_block_relay - 1]->fDisconnect == true);
291  BOOST_CHECK(vNodes.back()->fDisconnect == false);
292 
293  for (const CNode* node : vNodes) {
294  peerLogic->FinalizeNode(*node);
295  }
296  connman->ClearTestNodes();
297 }
298 
299 BOOST_AUTO_TEST_CASE(peer_discouragement)
300 {
302 
303  auto banman = std::make_unique<BanMan>(m_args.GetDataDirBase() / "banlist", nullptr, DEFAULT_MISBEHAVING_BANTIME);
304  auto connman = std::make_unique<ConnmanTestMsg>(0x1337, 0x1337, *m_node.addrman, *m_node.netgroupman, Params());
305  auto peerLogic = PeerManager::make(*connman, *m_node.addrman, banman.get(), *m_node.chainman, *m_node.mempool, *m_node.warnings, {});
306 
307  CNetAddr tor_netaddr;
308  BOOST_REQUIRE(
309  tor_netaddr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
310  const CService tor_service{tor_netaddr, Params().GetDefaultPort()};
311 
312  const std::array<CAddress, 3> addr{CAddress{ip(0xa0b0c001), NODE_NONE},
313  CAddress{ip(0xa0b0c002), NODE_NONE},
314  CAddress{tor_service, NODE_NONE}};
315 
316  const CNetAddr other_addr{ip(0xa0b0ff01)}; // Not any of addr[].
317 
318  std::array<CNode*, 3> nodes;
319 
320  banman->ClearBanned();
321  NodeId id{0};
322  nodes[0] = new CNode{id++,
323  /*sock=*/nullptr,
324  addr[0],
325  /*nKeyedNetGroupIn=*/0,
326  /*nLocalHostNonceIn=*/0,
327  CAddress(),
328  /*addrNameIn=*/"",
330  /*inbound_onion=*/false};
331  nodes[0]->SetCommonVersion(PROTOCOL_VERSION);
332  peerLogic->InitializeNode(*nodes[0], NODE_NETWORK);
333  nodes[0]->fSuccessfullyConnected = true;
334  connman->AddTestNode(*nodes[0]);
335  peerLogic->UnitTestMisbehaving(nodes[0]->GetId()); // Should be discouraged
336  BOOST_CHECK(peerLogic->SendMessages(nodes[0]));
337 
338  BOOST_CHECK(banman->IsDiscouraged(addr[0]));
339  BOOST_CHECK(nodes[0]->fDisconnect);
340  BOOST_CHECK(!banman->IsDiscouraged(other_addr)); // Different address, not discouraged
341 
342  nodes[1] = new CNode{id++,
343  /*sock=*/nullptr,
344  addr[1],
345  /*nKeyedNetGroupIn=*/1,
346  /*nLocalHostNonceIn=*/1,
347  CAddress(),
348  /*addrNameIn=*/"",
350  /*inbound_onion=*/false};
351  nodes[1]->SetCommonVersion(PROTOCOL_VERSION);
352  peerLogic->InitializeNode(*nodes[1], NODE_NETWORK);
353  nodes[1]->fSuccessfullyConnected = true;
354  connman->AddTestNode(*nodes[1]);
355  BOOST_CHECK(peerLogic->SendMessages(nodes[1]));
356  // [0] is still discouraged/disconnected.
357  BOOST_CHECK(banman->IsDiscouraged(addr[0]));
358  BOOST_CHECK(nodes[0]->fDisconnect);
359  // [1] is not discouraged/disconnected yet.
360  BOOST_CHECK(!banman->IsDiscouraged(addr[1]));
361  BOOST_CHECK(!nodes[1]->fDisconnect);
362  peerLogic->UnitTestMisbehaving(nodes[1]->GetId());
363  BOOST_CHECK(peerLogic->SendMessages(nodes[1]));
364  // Expect both [0] and [1] to be discouraged/disconnected now.
365  BOOST_CHECK(banman->IsDiscouraged(addr[0]));
366  BOOST_CHECK(nodes[0]->fDisconnect);
367  BOOST_CHECK(banman->IsDiscouraged(addr[1]));
368  BOOST_CHECK(nodes[1]->fDisconnect);
369 
370  // Make sure non-IP peers are discouraged and disconnected properly.
371 
372  nodes[2] = new CNode{id++,
373  /*sock=*/nullptr,
374  addr[2],
375  /*nKeyedNetGroupIn=*/1,
376  /*nLocalHostNonceIn=*/1,
377  CAddress(),
378  /*addrNameIn=*/"",
380  /*inbound_onion=*/false};
381  nodes[2]->SetCommonVersion(PROTOCOL_VERSION);
382  peerLogic->InitializeNode(*nodes[2], NODE_NETWORK);
383  nodes[2]->fSuccessfullyConnected = true;
384  connman->AddTestNode(*nodes[2]);
385  peerLogic->UnitTestMisbehaving(nodes[2]->GetId());
386  BOOST_CHECK(peerLogic->SendMessages(nodes[2]));
387  BOOST_CHECK(banman->IsDiscouraged(addr[0]));
388  BOOST_CHECK(banman->IsDiscouraged(addr[1]));
389  BOOST_CHECK(banman->IsDiscouraged(addr[2]));
390  BOOST_CHECK(nodes[0]->fDisconnect);
391  BOOST_CHECK(nodes[1]->fDisconnect);
392  BOOST_CHECK(nodes[2]->fDisconnect);
393 
394  for (CNode* node : nodes) {
395  peerLogic->FinalizeNode(*node);
396  }
397  connman->ClearTestNodes();
398 }
399 
401 {
403 
404  auto banman = std::make_unique<BanMan>(m_args.GetDataDirBase() / "banlist", nullptr, DEFAULT_MISBEHAVING_BANTIME);
405  auto connman = std::make_unique<CConnman>(0x1337, 0x1337, *m_node.addrman, *m_node.netgroupman, Params());
406  auto peerLogic = PeerManager::make(*connman, *m_node.addrman, banman.get(), *m_node.chainman, *m_node.mempool, *m_node.warnings, {});
407 
408  banman->ClearBanned();
409  int64_t nStartTime = GetTime();
410  SetMockTime(nStartTime); // Overrides future calls to GetTime()
411 
412  CAddress addr(ip(0xa0b0c001), NODE_NONE);
413  NodeId id{0};
414  CNode dummyNode{id++,
415  /*sock=*/nullptr,
416  addr,
417  /*nKeyedNetGroupIn=*/4,
418  /*nLocalHostNonceIn=*/4,
419  CAddress(),
420  /*addrNameIn=*/"",
422  /*inbound_onion=*/false};
423  dummyNode.SetCommonVersion(PROTOCOL_VERSION);
424  peerLogic->InitializeNode(dummyNode, NODE_NETWORK);
425  dummyNode.fSuccessfullyConnected = true;
426 
427  peerLogic->UnitTestMisbehaving(dummyNode.GetId());
428  BOOST_CHECK(peerLogic->SendMessages(&dummyNode));
429  BOOST_CHECK(banman->IsDiscouraged(addr));
430 
431  peerLogic->FinalizeNode(dummyNode);
432 }
433 
static Mutex g_msgproc_mutex
Mutex for anything that is only accessed via the msg processing thread.
Definition: net.h:1011
std::vector< B > randbytes(size_t len) noexcept
Generate random bytes.
Definition: random.h:297
static const int MAX_BLOCK_RELAY_ONLY_CONNECTIONS
Maximum number of block-relay-only outgoing connections.
Definition: net.h:71
void SetPeerConnectTimeout(std::chrono::seconds timeout)
Definition: net.h:43
BOOST_AUTO_TEST_CASE(outbound_slow_chain_eviction)
std::unique_ptr< node::Warnings > warnings
Manages all the node warnings.
Definition: context.h:91
ServiceFlags
nServices flags
Definition: protocol.h:309
Inbound connections are those initiated by a peer.
node::NodeContext m_node
Definition: bitcoin-gui.cpp:42
static constexpr size_t ADDR_TORV3_SIZE
Size of TORv3 address (in bytes).
Definition: netaddress.h:92
static std::unique_ptr< PeerManager > make(CConnman &connman, AddrMan &addrman, BanMan *banman, ChainstateManager &chainman, CTxMemPool &pool, node::Warnings &warnings, Options opts)
void AddRandomOutboundPeer(NodeId &id, std::vector< CNode *> &vNodes, PeerManager &peerLogic, ConnmanTestMsg &connman, ConnectionType connType, bool onion_peer=false)
std::unique_ptr< const NetGroupManager > netgroupman
Definition: context.h:69
void FlushSendBuffer(CNode &node) const
Definition: net.cpp:82
std::unique_ptr< AddrMan > addrman
Definition: context.h:66
bool SetSpecial(const std::string &addr)
Parse a Tor or I2P address and set this object to it.
Definition: netaddress.cpp:211
These are the default connections that we use to connect with the network.
uint16_t GetDefaultPort() const
Definition: chainparams.h:95
std::unique_ptr< CTxMemPool > mempool
Definition: context.h:68
void SetMockTime(int64_t nMockTimeIn)
DEPRECATED Use SetMockTime with chrono type.
Definition: time.cpp:40
static const std::string addr1
Definition: key_tests.cpp:30
BOOST_FIXTURE_TEST_SUITE(cuckoocache_tests, BasicTestingSetup)
Test Suite for CuckooCache.
#define LOCK(cs)
Definition: sync.h:257
FastRandomContext m_rng
Definition: setup_common.h:68
A combination of a network address (CNetAddr) and a (TCP) port.
Definition: netaddress.h:530
BOOST_AUTO_TEST_SUITE_END()
virtual void FinalizeNode(const CNode &node)=0
Handle removal of a peer (clear state)
A CService with information about it as peer.
Definition: protocol.h:366
static const int PROTOCOL_VERSION
network protocol versioning
static CService ip(uint32_t i)
int64_t NodeId
Definition: net.h:97
static const unsigned int DEFAULT_MAX_PEER_CONNECTIONS
The maximum number of peer connections to maintain.
Definition: net.h:77
int m_max_automatic_connections
Definition: net.h:1058
bool IsRoutable() const
Definition: netaddress.cpp:466
Definition: messages.h:20
Network address.
Definition: netaddress.h:111
static constexpr unsigned int DEFAULT_MISBEHAVING_BANTIME
Definition: banman.h:19
const CChainParams & Params()
Return the currently selected parameters.
uint64_t randbits(int bits) noexcept
Generate a random (bits)-bit integer.
Definition: random.h:204
ConnectionType
Different types of connections to a peer.
std::string OnionToString(Span< const uint8_t > addr)
Definition: netaddress.cpp:573
static const int MAX_OUTBOUND_FULL_RELAY_CONNECTIONS
Maximum number of automatic outgoing nodes over which we&#39;ll relay everything (blocks, tx, addrs, etc)
Definition: net.h:67
std::unique_ptr< CConnman > connman
Definition: context.h:67
Information about a peer.
Definition: net.h:672
static constexpr auto MINIMUM_CONNECT_TIME
Minimum time an outbound-peer-eviction candidate must be connected for, in order to evict...
virtual bool SendMessages(CNode *pnode) EXCLUSIVE_LOCKS_REQUIRED(g_msgproc_mutex)=0
Send queued protocol messages to a given node.
virtual void InitializeNode(const CNode &node, ServiceFlags our_services)=0
Initialize a peer (setup state)
int64_t GetTime()
DEPRECATED, see GetTime.
Definition: time.cpp:76
RecursiveMutex cs_main
Mutex to guard access to validation specific variables, such as reading or changing the chainstate...
Definition: cs_main.cpp:8
BOOST_FIXTURE_TEST_CASE(stale_tip_peer_management, OutboundTest)
void AddTestNode(CNode &node)
Definition: net.h:54
std::unique_ptr< ChainstateManager > chainman
Definition: context.h:72
Testing setup that configures a complete environment.
Definition: setup_common.h:121
We use block-relay-only connections to help prevent against partition attacks.
#define BOOST_CHECK(expr)
Definition: object.cpp:17
std::unique_ptr< PeerManager > peerman
Definition: context.h:71