diff --git a/cmd/swarm/access_test.go b/cmd/swarm/access_test.go index 106e6dd91..b4d2e1dbc 100644 --- a/cmd/swarm/access_test.go +++ b/cmd/swarm/access_test.go @@ -54,9 +54,8 @@ var DefaultCurve = crypto.S256() // is then fetched through 2nd node. since the tested code is not key-aware - we can just // fetch from the 2nd node using HTTP BasicAuth func TestAccessPassword(t *testing.T) { - cluster := newTestCluster(t, 1) - defer cluster.Shutdown() - proxyNode := cluster.Nodes[0] + srv := testutil.NewTestSwarmServer(t, serverFunc, nil) + defer srv.Close() dataFilename := testutil.TempFileWithContent(t, data) defer os.RemoveAll(dataFilename) @@ -64,7 +63,7 @@ func TestAccessPassword(t *testing.T) { // upload the file with 'swarm up' and expect a hash up := runSwarm(t, "--bzzapi", - proxyNode.URL, //it doesn't matter through which node we upload content + srv.URL, //it doesn't matter through which node we upload content "up", "--encrypt", dataFilename) @@ -138,7 +137,7 @@ func TestAccessPassword(t *testing.T) { if a.Publisher != "" { t.Fatal("should be empty") } - client := swarm.NewClient(cluster.Nodes[0].URL) + client := swarm.NewClient(srv.URL) hash, err := client.UploadManifest(&m, false) if err != nil { @@ -147,7 +146,7 @@ func TestAccessPassword(t *testing.T) { httpClient := &http.Client{} - url := cluster.Nodes[0].URL + "/" + "bzz:/" + hash + url := srv.URL + "/" + "bzz:/" + hash response, err := httpClient.Get(url) if err != nil { t.Fatal(err) @@ -189,7 +188,7 @@ func TestAccessPassword(t *testing.T) { //download file with 'swarm down' with wrong password up = runSwarm(t, "--bzzapi", - proxyNode.URL, + srv.URL, "down", "bzz:/"+hash, tmp, diff --git a/cmd/swarm/manifest_test.go b/cmd/swarm/manifest_test.go index 9c7808dfa..7ea4e0c45 100644 --- a/cmd/swarm/manifest_test.go +++ b/cmd/swarm/manifest_test.go @@ -26,6 +26,7 @@ import ( "github.com/ethereum/go-ethereum/swarm/api" swarm "github.com/ethereum/go-ethereum/swarm/api/client" + "github.com/ethereum/go-ethereum/swarm/testutil" ) // TestManifestChange tests manifest add, update and remove @@ -57,8 +58,8 @@ func TestManifestChangeEncrypted(t *testing.T) { // Argument encrypt controls whether to use encryption or not. func testManifestChange(t *testing.T, encrypt bool) { t.Parallel() - cluster := newTestCluster(t, 1) - defer cluster.Shutdown() + srv := testutil.NewTestSwarmServer(t, serverFunc, nil) + defer srv.Close() tmp, err := ioutil.TempDir("", "swarm-manifest-test") if err != nil { @@ -94,7 +95,7 @@ func testManifestChange(t *testing.T, encrypt bool) { args := []string{ "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "--recursive", "--defaultpath", indexDataFilename, @@ -109,7 +110,7 @@ func testManifestChange(t *testing.T, encrypt bool) { checkHashLength(t, origManifestHash, encrypt) - client := swarm.NewClient(cluster.Nodes[0].URL) + client := swarm.NewClient(srv.URL) // upload a new file and use its manifest to add it the original manifest. t.Run("add", func(t *testing.T) { @@ -122,14 +123,14 @@ func testManifestChange(t *testing.T, encrypt bool) { humansManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "up", humansDataFilename, ) newManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "manifest", "add", origManifestHash, @@ -177,14 +178,14 @@ func testManifestChange(t *testing.T, encrypt bool) { robotsManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "up", robotsDataFilename, ) newManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "manifest", "add", origManifestHash, @@ -237,14 +238,14 @@ func testManifestChange(t *testing.T, encrypt bool) { indexManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "up", indexDataFilename, ) newManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "manifest", "update", origManifestHash, @@ -295,14 +296,14 @@ func testManifestChange(t *testing.T, encrypt bool) { humansManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "up", robotsDataFilename, ) newManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "manifest", "update", origManifestHash, @@ -348,7 +349,7 @@ func testManifestChange(t *testing.T, encrypt bool) { t.Run("remove", func(t *testing.T) { newManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "manifest", "remove", origManifestHash, @@ -376,7 +377,7 @@ func testManifestChange(t *testing.T, encrypt bool) { t.Run("remove nested", func(t *testing.T) { newManifestHash := runSwarmExpectHash(t, "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "manifest", "remove", origManifestHash, @@ -429,8 +430,8 @@ func TestNestedDefaultEntryUpdateEncrypted(t *testing.T) { func testNestedDefaultEntryUpdate(t *testing.T, encrypt bool) { t.Parallel() - cluster := newTestCluster(t, 1) - defer cluster.Shutdown() + srv := testutil.NewTestSwarmServer(t, serverFunc, nil) + defer srv.Close() tmp, err := ioutil.TempDir("", "swarm-manifest-test") if err != nil { @@ -458,7 +459,7 @@ func testNestedDefaultEntryUpdate(t *testing.T, encrypt bool) { args := []string{ "--bzzapi", - cluster.Nodes[0].URL, + srv.URL, "--recursive", "--defaultpath", indexDataFilename, @@ -473,7 +474,7 @@ func testNestedDefaultEntryUpdate(t *testing.T, encrypt bool) { checkHashLength(t, origManifestHash, encrypt) - client := swarm.NewClient(cluster.Nodes[0].URL) + client := swarm.NewClient(srv.URL) newIndexData := []byte("