diff --git a/Cargo.toml b/Cargo.toml index 98ed587..5311fa6 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -42,3 +42,6 @@ tonic-build = "0.12" [patch.crates-io.curve25519-dalek] git = "https://github.com/anza-xyz/curve25519-dalek.git" rev = "b500cdc2a920cd5bff9e2dd974d7b97349d61464" + +[features] +test = [] \ No newline at end of file diff --git a/scripts/build-container.sh b/scripts/build-container.sh index 2c21d3d..41d97db 100755 --- a/scripts/build-container.sh +++ b/scripts/build-container.sh @@ -14,7 +14,11 @@ fi cd docker cp ../challenge_instance/challenge.tar.gz challenge.tar.gz -docker build -f challenge.Dockerfile -t detee/hacker-challenge:latest . +if [ -n "$TEST" ]; then + docker build -f challenge.Dockerfile -t detee/hacker-challenge:test . +else + docker build -f challenge.Dockerfile -t detee/hacker-challenge:latest . +fi cd .. echo "Container named 'hacker-challenge' built" diff --git a/scripts/package.sh b/scripts/package.sh index eb42bae..237f5d4 100755 --- a/scripts/package.sh +++ b/scripts/package.sh @@ -20,8 +20,13 @@ if [ "$prerequisites" == "--prep" ]; then (cd occlum/tools/toolchains/utils_lib && ./build.sh) fi -echo "Building the hacker-challenge signed bundle" -occlum-cargo build --release +if [ -n "$TEST" ]; then + echo "Building the hacker-challenge with test feature" + occlum-cargo build --release --features test +else + echo "Building the hacker-challenge" + occlum-cargo build --release +fi strip target/x86_64-unknown-linux-musl/release/hacker-challenge sha256sum target/x86_64-unknown-linux-musl/release/hacker-challenge diff --git a/scripts/testnet.sh b/scripts/testnet.sh index 682a039..6d119e1 100755 --- a/scripts/testnet.sh +++ b/scripts/testnet.sh @@ -31,45 +31,66 @@ function build_mint_sol_tool() { cd .. } -source "${script_dir}/build-container.sh" -build_mint_sol_tool +function run_node() { + custom_flags=$1 + docker run --network dthc -d "${custom_flags}" \ + --device /dev/sgx/provision \ + --device /dev/sgx/enclave \ + detee/hacker-challenge:latest +} -# Cleanup old containers and run the network root -docker ps -a | grep 'hacker-challenge' | awk '{ print $NF }' | xargs docker rm -f || true +TEST=1 ./${script_dir}/build-container.sh +[ -e "${script_dir}/mint_sol" ] || build_mint_sol_tool -echo "Waiting for the network root to start" -docker run --device /dev/sgx/enclave \ - --device /dev/sgx/provision \ - --name "hacker-challenge" \ - -d detee/hacker-challenge:latest +# Cleanup old containers and the network +echo "Creating the network and the root node" +docker ps -a | grep 'dthc' | awk '{ print $NF }' | xargs docker rm -f || true +docker network inspect dthc > /dev/null 2>&1 \ + || docker network create --subnet=172.18.0.0/24 dthc \ + || true + +# 172.18.0.1 is for the network gateway +root_ip="172.18.0.2" + +echo "Waiting for the root node to start" +run_node "--name dthc-root --ip ${root_ip} \ + --env NODE_IP='${root_ip}'" while true; do echo -n "." && sleep 1 - docker logs hacker-challenge | grep -q "SOL" && echo && break + docker logs dthc-root | grep -q "SOL" && echo && break done echo "Sending SOL to the root and waiting for the mint" -address=$(docker logs hacker-challenge | grep 'SOL' | awk '{ print $NF }') +address=$(docker logs dthc-root | grep 'SOL' | awk '{ print $NF }') "${script_dir}"/mint_sol "${address}" while true; do echo -n "." && sleep 1 - docker logs hacker-challenge | grep -q "Mint created" && echo && break + docker logs dthc-root | grep -q "Mint created" && echo && break done echo "Creating the cluster" -for p in {31311..31320}; do - docker run --device /dev/sgx/enclave \ - --device /dev/sgx/provision \ - --env INIT_NODES="172.17.0.2 172.17.0.3 172.17.0.4" \ - -v "/tmp/hacker-challenge${p}:/challenge/main" \ - --name "hacker-challenge${p}" -p "${p}:31372" \ - -d detee/hacker-challenge:latest +for n in {2..20}; do + #init_nodes=$(docker inspect dthc-root --format '{{ .NetworkSettings.Networks.dthc.IPAddress }}') + node_ip="172.18.0.${n}" + node_port=$((31300 + n)) + node_volume="/tmp/dthc${node_port}" + + run_node "--name dthc-${n} --ip ${node_ip} \ + --env NODE_IP='${node_ip}' \ + --env INIT_NODES='${root_ip}' \ + -v ${node_volume}:/challenge/main \ + -p ${node_port}:31372" done sleep 15 # Wait for the cluster to start echo "Running the test mint" -for p in {31311..31320}; do - curl -X POST "127.0.0.1:${p}/mint" \ +for n in {2..20}; do + node_port=$((31300 + n)) + curl -X POST "127.0.0.1:${node_port}/mint" \ --json '{"wallet": "EZT16iP1SQVUFf1AJN6oiE5BZPnyBUqaKDkZ4oZRsvhR"}' \ --connect-timeout 5 2> /dev/null echo "" done + +# curl /metrics +# curl -X POST /mint -d '{"wallet": "EZT16iP1SQVUFf1AJN6oiE5BZPnyBUqaKDkZ4oZRsvhR"}' -H 'Content-Type: application/json' diff --git a/src/datastore.rs b/src/datastore.rs index 9bf53a1..a080673 100644 --- a/src/datastore.rs +++ b/src/datastore.rs @@ -26,7 +26,7 @@ pub struct NodeInfo { impl NodeInfo { pub fn is_newer_than(&self, older_self: &Self) -> bool { - self.keepalive >= older_self.keepalive + self.keepalive > older_self.keepalive } pub fn to_json(&self) -> String { diff --git a/src/main.rs b/src/main.rs index 76bfc8c..cbf14f3 100644 --- a/src/main.rs +++ b/src/main.rs @@ -10,6 +10,7 @@ use crate::{ }; use datastore::State; use detee_sgx::{InstanceMeasurement, RaTlsConfig}; +use std::io::Read; use std::{ fs::File, io::{BufRead, BufReader}, @@ -26,6 +27,16 @@ const INIT_NODES_FILE: &str = "/host/detee_challenge_nodes"; const KEYS_FILE: &str = "/host/main/TRY_TO_HACK_THIS"; const MAX_CONNECTIONS: usize = 3; +#[cfg(feature = "test")] +async fn resolve_my_ip() -> Result { + let node_ip = File::open("/host/detee_node_ip")?; + let mut reader = BufReader::new(node_ip); + let mut ip = String::new(); + reader.read_line(&mut ip)?; + Ok(ip) +} + +#[cfg(not(feature = "test"))] async fn resolve_my_ip() -> Result { let err = "Can't resolve my external IP, try again"; let ip = public_ip::addr_v4().await.ok_or(Error::new(ErrorKind::Other, err))?;