Files
Shadowbroker/backend/tests/mesh/test_mesh_protocol_hygiene.py
anoracleofra-code 668ce16dc7 v0.9.6: InfoNet hashchain, Wormhole gate encryption, mesh reputation, 16 community contributors
Gate messages now propagate via the Infonet hashchain as encrypted blobs — every node syncs them
through normal chain sync while only Gate members with MLS keys can decrypt. Added mesh reputation
system, peer push workers, voluntary Wormhole opt-in for node participation, fork recovery,
killwormhole scripts, obfuscated terminology, and hardened the self-updater to protect encryption
keys and chain state during updates.

New features: Shodan search, train tracking, Sentinel Hub imagery, 8 new intelligence layers,
CCTV expansion to 11,000+ cameras across 6 countries, Mesh Terminal CLI, prediction markets,
desktop-shell scaffold, and comprehensive mesh test suite (215 frontend + backend tests passing).

Community contributors: @wa1id, @AlborzNazari, @adust09, @Xpirix, @imqdcr, @csysp, @suranyami,
@chr0n1x, @johan-martensson, @singularfailure, @smithbh, @OrfeoTerkuci, @deuza, @tm-const,
@Elhard1, @ttulttul
2026-03-26 05:58:04 -06:00

86 lines
2.5 KiB
Python

import asyncio
def test_x3dh_hkdf_uses_nonzero_ff_salt():
from services.mesh.mesh_wormhole_prekey import _hkdf
derived = _hkdf(b"input-material", "SB-TEST")
assert derived
assert derived != _hkdf(b"input-material", "SB-TEST-ALT")
def test_ratchet_padding_extends_large_payloads():
from services.mesh.mesh_wormhole_ratchet import _build_padded_payload, PAD_MAGIC, PAD_STEP
plaintext = "x" * 5000
padded = _build_padded_payload(plaintext)
assert padded[:4].decode("utf-8") == PAD_MAGIC
assert len(padded) > len(plaintext.encode("utf-8"))
assert len(padded) % PAD_STEP == 0
def test_dead_drop_epoch_shortens_in_high_privacy(monkeypatch):
from services.mesh import mesh_wormhole_dead_drop
monkeypatch.setattr(
mesh_wormhole_dead_drop,
"read_wormhole_settings",
lambda: {"privacy_profile": "high"},
)
assert mesh_wormhole_dead_drop.mailbox_epoch_seconds() == 2 * 60 * 60
def test_relay_jitter_only_applies_in_high_privacy(monkeypatch):
import main
sleeps: list[float] = []
async def fake_sleep(delay: float):
sleeps.append(delay)
monkeypatch.setattr(main, "_high_privacy_profile_enabled", lambda: True)
monkeypatch.setattr(main.asyncio, "sleep", fake_sleep)
asyncio.run(main._maybe_apply_dm_relay_jitter())
assert len(sleeps) == 1
assert 0.05 <= sleeps[0] <= 0.5
def test_high_privacy_refuses_private_tier_clearnet_fallback(monkeypatch):
from services.mesh.mesh_router import MeshEnvelope, MeshRouter, Priority, TransportResult
router = MeshRouter()
internet_attempts: list[str] = []
monkeypatch.setattr(
"services.mesh.mesh_router._high_privacy_profile_blocks_clearnet_fallback",
lambda: True,
)
monkeypatch.setattr(router.tor_arti, "can_reach", lambda _envelope: False)
monkeypatch.setattr(
router.internet,
"send",
lambda *_args, **_kwargs: (
internet_attempts.append("internet"),
TransportResult(True, "internet", "sent"),
)[1],
)
results = router.route(
MeshEnvelope(
sender_id="!sb_sender",
destination="!sb_dest",
payload="ciphertext",
trust_tier="private_transitional",
priority=Priority.NORMAL,
),
{},
)
assert internet_attempts == []
assert len(results) == 1
assert results[0].transport == "policy"
assert "clearnet fallback refused" in results[0].detail