@@ -14,6 +14,7 @@ import (
14
14
"github.com/lightningnetwork/lnd/keychain"
15
15
"github.com/lightningnetwork/lnd/lnwire"
16
16
"github.com/lightningnetwork/lnd/tor"
17
+ "github.com/stretchr/testify/require"
17
18
)
18
19
19
20
type maybeNetConn struct {
@@ -103,9 +104,7 @@ func TestConnectionCorrectness(t *testing.T) {
103
104
// into local variables. If the initial crypto handshake fails, then
104
105
// we'll get a non-nil error here.
105
106
localConn , remoteConn , cleanUp , err := establishTestConnection ()
106
- if err != nil {
107
- t .Fatalf ("unable to establish test connection: %v" , err )
108
- }
107
+ require .NoError (t , err , "unable to establish test connection" )
109
108
defer cleanUp ()
110
109
111
110
// Test out some message full-message reads.
@@ -155,9 +154,7 @@ func TestConnectionCorrectness(t *testing.T) {
155
154
// stalled.
156
155
func TestConcurrentHandshakes (t * testing.T ) {
157
156
listener , netAddr , err := makeListener ()
158
- if err != nil {
159
- t .Fatalf ("unable to create listener connection: %v" , err )
160
- }
157
+ require .NoError (t , err , "unable to create listener connection" )
161
158
defer listener .Close ()
162
159
163
160
const nblocking = 5
@@ -194,9 +191,7 @@ func TestConcurrentHandshakes(t *testing.T) {
194
191
// Now, construct a new private key and use the brontide dialer to
195
192
// connect to the listener.
196
193
remotePriv , err := btcec .NewPrivateKey ()
197
- if err != nil {
198
- t .Fatalf ("unable to generate private key: %v" , err )
199
- }
194
+ require .NoError (t , err , "unable to generate private key" )
200
195
remoteKeyECDH := & keychain.PrivKeyECDH {PrivKey : remotePriv }
201
196
202
197
go func () {
@@ -210,9 +205,7 @@ func TestConcurrentHandshakes(t *testing.T) {
210
205
// This connection should be accepted without error, as the brontide
211
206
// connection should bypass stalled tcp connections.
212
207
conn , err := listener .Accept ()
213
- if err != nil {
214
- t .Fatalf ("unable to accept dial: %v" , err )
215
- }
208
+ require .NoError (t , err , "unable to accept dial" )
216
209
defer conn .Close ()
217
210
218
211
result := <- connChan
@@ -265,9 +258,7 @@ func TestWriteMessageChunking(t *testing.T) {
265
258
// into local variables. If the initial crypto handshake fails, then
266
259
// we'll get a non-nil error here.
267
260
localConn , remoteConn , cleanUp , err := establishTestConnection ()
268
- if err != nil {
269
- t .Fatalf ("unable to establish test connection: %v" , err )
270
- }
261
+ require .NoError (t , err , "unable to establish test connection" )
271
262
defer cleanUp ()
272
263
273
264
// Attempt to write a message which is over 3x the max allowed payload
@@ -322,9 +313,7 @@ func TestBolt0008TestVectors(t *testing.T) {
322
313
// vectors at the appendix of BOLT-0008
323
314
initiatorKeyBytes , err := hex .DecodeString ("1111111111111111111111" +
324
315
"111111111111111111111111111111111111111111" )
325
- if err != nil {
326
- t .Fatalf ("unable to decode hex: %v" , err )
327
- }
316
+ require .NoError (t , err , "unable to decode hex" )
328
317
initiatorPriv , _ := btcec .PrivKeyFromBytes (
329
318
initiatorKeyBytes ,
330
319
)
@@ -333,9 +322,7 @@ func TestBolt0008TestVectors(t *testing.T) {
333
322
// We'll then do the same for the responder.
334
323
responderKeyBytes , err := hex .DecodeString ("212121212121212121212121" +
335
324
"2121212121212121212121212121212121212121" )
336
- if err != nil {
337
- t .Fatalf ("unable to decode hex: %v" , err )
338
- }
325
+ require .NoError (t , err , "unable to decode hex" )
339
326
responderPriv , responderPub := btcec .PrivKeyFromBytes (
340
327
responderKeyBytes ,
341
328
)
@@ -382,15 +369,11 @@ func TestBolt0008TestVectors(t *testing.T) {
382
369
// the payload return is _exactly_ the same as what's specified within
383
370
// the test vectors.
384
371
actOne , err := initiator .GenActOne ()
385
- if err != nil {
386
- t .Fatalf ("unable to generate act one: %v" , err )
387
- }
372
+ require .NoError (t , err , "unable to generate act one" )
388
373
expectedActOne , err := hex .DecodeString ("00036360e856310ce5d294e" +
389
374
"8be33fc807077dc56ac80d95d9cd4ddbd21325eff73f70df608655115" +
390
375
"1f58b8afe6c195782c6a" )
391
- if err != nil {
392
- t .Fatalf ("unable to parse expected act one: %v" , err )
393
- }
376
+ require .NoError (t , err , "unable to parse expected act one" )
394
377
if ! bytes .Equal (expectedActOne , actOne [:]) {
395
378
t .Fatalf ("act one mismatch: expected %x, got %x" ,
396
379
expectedActOne , actOne )
@@ -407,15 +390,11 @@ func TestBolt0008TestVectors(t *testing.T) {
407
390
// produce the _exact_ same byte stream as advertised within the spec's
408
391
// test vectors.
409
392
actTwo , err := responder .GenActTwo ()
410
- if err != nil {
411
- t .Fatalf ("unable to generate act two: %v" , err )
412
- }
393
+ require .NoError (t , err , "unable to generate act two" )
413
394
expectedActTwo , err := hex .DecodeString ("0002466d7fcae563e5cb09a0" +
414
395
"d1870bb580344804617879a14949cf22285f1bae3f276e2470b93aac58" +
415
396
"3c9ef6eafca3f730ae" )
416
- if err != nil {
417
- t .Fatalf ("unable to parse expected act two: %v" , err )
418
- }
397
+ require .NoError (t , err , "unable to parse expected act two" )
419
398
if ! bytes .Equal (expectedActTwo , actTwo [:]) {
420
399
t .Fatalf ("act two mismatch: expected %x, got %x" ,
421
400
expectedActTwo , actTwo )
@@ -430,15 +409,11 @@ func TestBolt0008TestVectors(t *testing.T) {
430
409
// At the final step, we'll generate the last act from the initiator
431
410
// and once again verify that it properly matches the test vectors.
432
411
actThree , err := initiator .GenActThree ()
433
- if err != nil {
434
- t .Fatalf ("unable to generate act three: %v" , err )
435
- }
412
+ require .NoError (t , err , "unable to generate act three" )
436
413
expectedActThree , err := hex .DecodeString ("00b9e3a702e93e3a9948c2e" +
437
414
"d6e5fd7590a6e1c3a0344cfc9d5b57357049aa22355361aa02e55a8f" +
438
415
"c28fef5bd6d71ad0c38228dc68b1c466263b47fdf31e560e139ba" )
439
- if err != nil {
440
- t .Fatalf ("unable to parse expected act three: %v" , err )
441
- }
416
+ require .NoError (t , err , "unable to parse expected act three" )
442
417
if ! bytes .Equal (expectedActThree , actThree [:]) {
443
418
t .Fatalf ("act three mismatch: expected %x, got %x" ,
444
419
expectedActThree , actThree )
@@ -454,20 +429,14 @@ func TestBolt0008TestVectors(t *testing.T) {
454
429
// proper symmetric encryption keys.
455
430
sendingKey , err := hex .DecodeString ("969ab31b4d288cedf6218839b27a3e2" +
456
431
"140827047f2c0f01bf5c04435d43511a9" )
457
- if err != nil {
458
- t .Fatalf ("unable to parse sending key: %v" , err )
459
- }
432
+ require .NoError (t , err , "unable to parse sending key" )
460
433
recvKey , err := hex .DecodeString ("bb9020b8965f4df047e07f955f3c4b884" +
461
434
"18984aadc5cdb35096b9ea8fa5c3442" )
462
- if err != nil {
463
- t .Fatalf ("unable to parse receiving key: %v" , err )
464
- }
435
+ require .NoError (t , err , "unable to parse receiving key" )
465
436
466
437
chainKey , err := hex .DecodeString ("919219dbb2920afa8db80f9a51787a840" +
467
438
"bcf111ed8d588caf9ab4be716e42b01" )
468
- if err != nil {
469
- t .Fatalf ("unable to parse chaining key: %v" , err )
470
- }
439
+ require .NoError (t , err , "unable to parse chaining key" )
471
440
472
441
if ! bytes .Equal (initiator .sendCipher .secretKey [:], sendingKey ) {
473
442
t .Fatalf ("sending key mismatch: expected %x, got %x" ,
0 commit comments