ci: client::circuit::test::bad_extend_crypto test failure
I haven't looked into this yet, but am just documenting the failure.
https://gitlab.torproject.org/opara/arti/-/jobs/1224337
Test failure in the "rust-recent-test-all-features" job:
failures:
---- client::circuit::test::bad_extend_crypto stdout ----
Using RNG seed ARTI_TEST_PRNG=eb16ca03b0141647caee6166989ec416f5113a53e209337cc453d09ecf112cab
E tor_proto::channel::reactor: Running reactor channel_id=UniqId(29)
E tor_proto::client::reactor: Running tunnel reactor tunnel_id=9
E tor_proto::client::reactor::control: reactor received control command tunnel_id=9 msg=AddFakeHop { relay_cell_format: V0, fwd_lasthop: false, rev_lasthop: false, peer_id: Relay(OwnedChanTarget { addrs: [], method: Direct([]), ids: RelayIds { ed_identity: Some(Ed25519Identity { BAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQ }), rsa_identity: Some(RsaIdentity { $0505050505050505050505050505050505050505 }) } }), params: CircParameters { extend_by_ed25519_id: true, ccontrol: CongestionControlParams { alg: FixedWindow(FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }), fixed_window_params: FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }, cwnd_params: CongestionWindowParams { cwnd_init: 124, cwnd_inc_pct_ss: Percentage { value: 100 }, cwnd_inc: 1, cwnd_inc_rate: 31, cwnd_min: 124, cwnd_max: 4294967295, sendme_inc: 31 }, rtt_params: RoundTripEstimatorParams { ewma_cwnd_pct: Percentage { value: 50 }, ewma_max: 10, ewma_ss_max: 2, rtt_reset_pct: Percentage { value: 100 } } }, flow_ctrl: FlowCtrlParameters { cc_xoff_client: CellCount(500), cc_xoff_exit: CellCount(500), cc_xon_rate: CellCount(500), cc_xon_change_pct: 25, cc_xon_ewma_cnt: 2 }, n_incoming_cells_permitted: None, n_outgoing_cells_permitted: None }, done: Sender { complete: false } }
E tor_proto::client::reactor::control: reactor received control command tunnel_id=9 msg=AddFakeHop { relay_cell_format: V0, fwd_lasthop: true, rev_lasthop: true, peer_id: Relay(OwnedChanTarget { addrs: [], method: Direct([]), ids: RelayIds { ed_identity: Some(Ed25519Identity { BAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQ }), rsa_identity: Some(RsaIdentity { $0505050505050505050505050505050505050505 }) } }), params: CircParameters { extend_by_ed25519_id: true, ccontrol: CongestionControlParams { alg: FixedWindow(FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }), fixed_window_params: FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }, cwnd_params: CongestionWindowParams { cwnd_init: 124, cwnd_inc_pct_ss: Percentage { value: 100 }, cwnd_inc: 1, cwnd_inc_rate: 31, cwnd_min: 124, cwnd_max: 4294967295, sendme_inc: 31 }, rtt_params: RoundTripEstimatorParams { ewma_cwnd_pct: Percentage { value: 50 }, ewma_max: 10, ewma_ss_max: 2, rtt_reset_pct: Percentage { value: 100 } } }, flow_ctrl: FlowCtrlParameters { cc_xoff_client: CellCount(500), cc_xoff_exit: CellCount(500), cc_xon_rate: CellCount(500), cc_xon_change_pct: 25, cc_xon_ewma_cnt: 2 }, n_incoming_cells_permitted: None, n_outgoing_cells_permitted: None }, done: Sender { complete: false } }
E tor_proto::client::reactor::control: reactor received control message tunnel_id=9 msg=ExtendNtor { peer_id: OwnedChanTarget { addrs: [], method: Direct([]), ids: RelayIds { ed_identity: Some(Ed25519Identity { BgYGBgYGBgYGBgYGBgYGBgYGBgYGBgYGBgYGBgYGBgY }), rsa_identity: Some(RsaIdentity { $0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a }) } }, public_key: NtorPublicKey { id: RsaIdentity { $0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a }, pk: PublicKey(PublicKey(MontgomeryPoint([57, 92, 178, 107, 131, 179, 205, 75, 145, 219, 169, 145, 62, 86, 42, 232, 125, 33, 236, 221, 86, 132, 61, 167, 202, 147, 154, 106, 105, 0, 18, 83]))) }, linkspecs: [EncodedLinkSpec { lstype: LinkSpecType(RSAID), body: [10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10] }, EncodedLinkSpec { lstype: LinkSpecType(ED25519ID), body: [6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6] }], settings: HopSettings { ccontrol: CongestionControlParams { alg: FixedWindow(FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }), fixed_window_params: FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }, cwnd_params: CongestionWindowParams { cwnd_init: 124, cwnd_inc_pct_ss: Percentage { value: 100 }, cwnd_inc: 1, cwnd_inc_rate: 31, cwnd_min: 124, cwnd_max: 4294967295, sendme_inc: 31 }, rtt_params: RoundTripEstimatorParams { ewma_cwnd_pct: Percentage { value: 50 }, ewma_max: 10, ewma_ss_max: 2, rtt_reset_pct: Percentage { value: 100 } } }, flow_ctrl_params: FlowCtrlParameters { cc_xoff_client: CellCount(500), cc_xoff_exit: CellCount(500), cc_xon_rate: CellCount(500), cc_xon_change_pct: 25, cc_xon_ewma_cnt: 2 }, n_incoming_cells_permitted: None, n_outgoing_cells_permitted: None, relay_crypt_protocol: Tor1(V0) }, done: Sender { complete: false } }
E tor_proto::client::reactor::circuit::extender: Extending circuit circ_id=Circ 9.23.17 target_hop=4 linkspecs=[EncodedLinkSpec { lstype: LinkSpecType(RSAID), body: [10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10] }, EncodedLinkSpec { lstype: LinkSpecType(ED25519ID), body: [6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6] }]
E tor_proto::client::reactor::circuit::extender: waiting for EXTENDED2 cell circ_id=Circ 9.23.17
E tor_proto::client::reactor::circuit: sending relay cell circ_id=Circ 9.23.17 cell=RelayMsgOuter { streamid: None, msg: Extend2(Extend2 { linkspec: [EncodedLinkSpec { lstype: LinkSpecType(RSAID), body: [10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10] }, EncodedLinkSpec { lstype: LinkSpecType(ED25519ID), body: [6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6] }], handshake_type: HandshakeType(NTOR), handshake: [10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 57, 92, 178, 107, 131, 179, 205, 75, 145, 219, 169, 145, 62, 86, 42, 232, 125, 33, 236, 221, 86, 132, 61, 167, 202, 147, 154, 106, 105, 0, 18, 83, 93, 203, 72, 116, 24, 130, 124, 225, 253, 174, 196, 245, 1, 202, 84, 101, 212, 224, 157, 143, 113, 160, 56, 247, 139, 123, 144, 31, 245, 157, 12, 101] }) }
E tor_proto::channel: Sending RELAY_EARLY for 128 channel_id=Chan 29
E tor_proto::client::reactor::circuit: handling cell circ_id=Circ 9.23.17 cell=Relay(Relay { body: .. })
E tor_proto::client::reactor::circuit: Received meta-cell circ_id=Circ 9.23.17 cell=UnparsedRelayMsg { internal: V0([15, 0, 0, 0, 0, 0, 0, 0, 0, 1, 2, 1, 0, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 0, 0, 0, 0, 238, 236, 185, 49, 166, 213, 186, 61, 133, 13, 201, 120, 12, 139, 234, 74, 150, 11, 52, 143, 90, 163, 97, 242, 99, 183, 242, 171, 11, 40, 57, 16, 79, 65, 162, 225, 51, 30, 154, 37, 39, 61, 242, 74, 175, 6, 193, 160, 8, 117, 101, 127, 132, 243, 12, 5, 97, 181, 216, 153, 80, 63, 42, 111, 103, 79, 101, 164, 222, 63, 127, 245, 243, 78, 60, 93, 28, 252, 95, 150, 82, 68, 212, 230, 34, 239, 239, 54, 187, 44, 186, 87, 251, 211, 250, 185, 2, 255, 128, 145, 68, 89, 49, 140, 38, 145, 127, 253, 187, 34, 33, 143, 90, 250, 64, 36, 93, 70, 130, 154, 102, 254, 149, 222, 226, 187, 14, 9, 97, 25, 136, 0, 254, 180, 24, 9, 187, 68, 190, 231, 94, 241, 179, 152, 9, 247, 112, 191, 246, 57, 104, 18, 199, 59, 236, 206, 150, 249, 161, 114, 163, 132, 56, 245, 212, 69, 1, 53, 0, 58, 139, 25, 30, 72, 54, 60, 233, 81, 47, 6, 182, 225, 93, 187, 69, 206, 9, 116, 85, 214, 180, 123, 209, 72, 241, 86, 96, 190, 60, 207, 163, 73, 61, 52, 78, 34, 220, 145, 61, 147, 97, 27, 172, 179, 201, 46, 215, 223, 69, 138, 184, 81, 214, 180, 173, 71, 139, 240, 99, 144, 105, 155, 136, 203, 97, 116]) }
E tor_proto::client::reactor::circuit::extender: Received EXTENDED2 cell; completing handshake. circ_id=Circ 9.23.17
E tor_proto::client::reactor::circuit: meta handler completed circ_id=Circ 9.23.17 result=Err(BadCircHandshakeAuth)
G tor_proto::client::reactor: Tunnel reactor stopped error=Circuit-extension handshake authentication failed tunnel_id=9
G tor_proto::channel::reactor: Reactor stopped channel_id=UniqId(29)
thread 'tokio-runtime-worker' panicked at /usr/local/cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.47.1/src/runtime/blocking/shutdown.rs:51:21:
Cannot drop a runtime in a context where blocking is not allowed. This happens when a runtime is dropped from within an asynchronous context.
Using RNG seed ARTI_TEST_PRNG=7b23b20a4603c2a0ca7b545b18924162cd9091033e879c7c80c577cc9a2e2858
E tor_proto::channel::reactor: Running reactor channel_id=UniqId(121)
E tor_proto::client::reactor: Running tunnel reactor tunnel_id=38
E tor_proto::client::reactor::control: reactor received control command tunnel_id=38 msg=AddFakeHop { relay_cell_format: V0, fwd_lasthop: false, rev_lasthop: false, peer_id: Relay(OwnedChanTarget { addrs: [], method: Direct([]), ids: RelayIds { ed_identity: Some(Ed25519Identity { BAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQ }), rsa_identity: Some(RsaIdentity { $0505050505050505050505050505050505050505 }) } }), params: CircParameters { extend_by_ed25519_id: true, ccontrol: CongestionControlParams { alg: FixedWindow(FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }), fixed_window_params: FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }, cwnd_params: CongestionWindowParams { cwnd_init: 124, cwnd_inc_pct_ss: Percentage { value: 100 }, cwnd_inc: 1, cwnd_inc_rate: 31, cwnd_min: 124, cwnd_max: 4294967295, sendme_inc: 31 }, rtt_params: RoundTripEstimatorParams { ewma_cwnd_pct: Percentage { value: 50 }, ewma_max: 10, ewma_ss_max: 2, rtt_reset_pct: Percentage { value: 100 } } }, flow_ctrl: FlowCtrlParameters { cc_xoff_client: CellCount(500), cc_xoff_exit: CellCount(500), cc_xon_rate: CellCount(500), cc_xon_change_pct: 25, cc_xon_ewma_cnt: 2 }, n_incoming_cells_permitted: None, n_outgoing_cells_permitted: None }, done: Sender { complete: false } }
E tor_proto::client::reactor::control: reactor received control command tunnel_id=38 msg=AddFakeHop { relay_cell_format: V0, fwd_lasthop: true, rev_lasthop: true, peer_id: Relay(OwnedChanTarget { addrs: [], method: Direct([]), ids: RelayIds { ed_identity: Some(Ed25519Identity { BAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQ }), rsa_identity: Some(RsaIdentity { $0505050505050505050505050505050505050505 }) } }), params: CircParameters { extend_by_ed25519_id: true, ccontrol: CongestionControlParams { alg: FixedWindow(FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }), fixed_window_params: FixedWindowParams { circ_window_start: 1000, circ_window_min: 100, circ_window_max: 1000 }, cwnd_params: CongestionWindowParams { cwnd_init: 124, cwnd_inc_pct_ss: Percentage { value: 100 }, cwnd_inc: 1, cwnd_inc_rate: 31, cwnd_min: 124, cwnd_max: 4294967295, sendme_inc: 31 }, rtt_params: RoundTripEstimatorParams { ewma_cwnd_pct: Percentage { value: 50 }, ewma_max: 10, ewma_ss_max: 2, rtt_reset_pct: Percentage { value: 100 } } }, flow_ctrl: FlowCtrlParameters { cc_xoff_client: CellCount(500), cc_xoff_exit: CellCount(500), cc_xon_rate: CellCount(500), cc_xon_change_pct: 25, cc_xon_ewma_cnt: 2 }, n_incoming_cells_permitted: None, n_outgoing_cells_permitted: None }, done: Sender { complete: false } }
E tor_proto::client::reactor::circuit: handling cell circ_id=Circ 38.23.17 cell=Relay(Relay { body: .. })
E tor_proto::client::reactor::circuit: Received meta-cell circ_id=Circ 38.23.17 cell=UnparsedRelayMsg { internal: V0([15, 0, 0, 0, 0, 0, 0, 0, 0, 1, 2, 1, 0, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 99, 0, 0, 0, 0, 205, 182, 167, 5, 217, 45, 6, 65, 107, 147, 36, 186, 233, 100, 6, 126, 211, 155, 165, 69, 218, 100, 227, 4, 82, 13, 27, 22, 1, 54, 14, 5, 227, 44, 138, 205, 188, 46, 70, 51, 208, 126, 25, 33, 35, 197, 158, 159, 27, 91, 76, 238, 147, 33, 255, 108, 9, 180, 1, 212, 251, 124, 124, 85, 121, 109, 64, 60, 165, 8, 247, 154, 42, 240, 193, 35, 62, 73, 134, 248, 201, 123, 5, 123, 19, 145, 161, 241, 88, 143, 194, 46, 239, 168, 43, 168, 139, 33, 131, 21, 207, 160, 56, 181, 145, 67, 63, 205, 175, 203, 60, 133, 86, 251, 181, 145, 166, 253, 90, 35, 157, 99, 25, 212, 71, 194, 128, 247, 144, 183, 179, 240, 145, 220, 48, 210, 218, 50, 221, 212, 125, 217, 202, 251, 105, 212, 73, 255, 38, 222, 136, 92, 202, 248, 65, 166, 88, 216, 151, 84, 12, 193, 239, 131, 183, 201, 95, 42, 225, 214, 83, 56, 70, 31, 15, 173, 119, 4, 4, 169, 144, 75, 102, 53, 241, 244, 102, 21, 106, 225, 15, 156, 150, 154, 57, 19, 139, 160, 5, 129, 55, 78, 124, 160, 209, 119, 155, 113, 182, 93, 112, 133, 114, 135, 193, 33, 183, 255, 223, 157, 153, 234, 187, 62, 90, 80, 31, 79, 7, 96, 110, 45, 192, 221, 1, 123]) }
G tor_proto::client::reactor: Tunnel reactor stopped error=Circuit protocol violation: Unexpected EXTENDED2 cell on client circuit tunnel_id=38
G tor_proto::channel::reactor: Reactor stopped channel_id=UniqId(121)
thread 'client::circuit::test::bad_extend_crypto' panicked at crates/tor-proto/src/client/circuit.rs:1675:13:
assertion failed: matches!(error, Error::BadCircHandshakeAuth)
failures:
client::circuit::test::bad_extend_crypto
test result: FAILED. 209 passed; 1 failed; 1 ignored; 0 measured; 0 filtered out; finished in 8.85s
Running with gitlab-runner 18.5.0 (bda84871)
on 373: ci-x64-runner6-torproject Q9G-3e4Q5, system ID: s_d955e4defe32
feature flags: FF_DISABLE_UMASK_FOR_DOCKER_EXECUTOR:true, FF_TIMESTAMPS:true
Resolving secrets
Preparing the "docker" executor 00:02
Using Docker executor with image docker.io/amd64/rust:1.89.0-bookworm ...
Using effective pull policy of [always] for container docker.io/amd64/rust:1.89.0-bookworm
Pulling docker image docker.io/amd64/rust:1.89.0-bookworm ...
Using docker image sha256:096b9dd60acf6140d936a45412498b7b18338cdf1604f0efa8dcc215a36161cc for docker.io/amd64/rust:1.89.0-bookworm with digest amd64/rust@sha256:7bcd22eb9736d058df31622a6da81656577e366d25047bf62d7b9b67682f060d ...
Not using umask - FF_DISABLE_UMASK_FOR_DOCKER_EXECUTOR is set!
Preparing environment 00:00
Using effective pull policy of [always] for container sha256:2a9bc28e78e0fa3e5d3f3716b1defe3e526084506dfdefdd190a2caad1738531
Running on runner-q9g-3e4q5-project-2997-concurrent-4 via ci-x64-runner6.osuosl.org...
Edited by opara