// Copyright 2017 The go-ethereum Authors // This file is part of the go-ethereum library. // // The go-ethereum library is free software: you can redistribute it and/or modify // it under the terms of the GNU Lesser General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // The go-ethereum library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with the go-ethereum library. If not, see . package http import ( "archive/tar" "bytes" "context" "encoding/json" "errors" "flag" "fmt" "io" "io/ioutil" "math/big" "mime/multipart" "net/http" "net/url" "os" "path" "strconv" "strings" "testing" "time" "github.com/ethereum/go-ethereum/swarm/storage/feed/lookup" "github.com/ethereum/go-ethereum/common" "github.com/ethereum/go-ethereum/core/types" "github.com/ethereum/go-ethereum/crypto" "github.com/ethereum/go-ethereum/log" "github.com/ethereum/go-ethereum/swarm/api" "github.com/ethereum/go-ethereum/swarm/storage" "github.com/ethereum/go-ethereum/swarm/storage/feed" "github.com/ethereum/go-ethereum/swarm/testutil" ) func init() { loglevel := flag.Int("loglevel", 2, "loglevel") flag.Parse() log.Root().SetHandler(log.CallerFileHandler(log.LvlFilterHandler(log.Lvl(*loglevel), log.StreamHandler(os.Stderr, log.TerminalFormat(true))))) } func serverFunc(api *api.API) TestServer { return NewServer(api, "") } func newTestSigner() (*feed.GenericSigner, error) { privKey, err := crypto.HexToECDSA("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef") if err != nil { return nil, err } return feed.NewGenericSigner(privKey), nil } // Test the transparent resolving of feed updates with bzz:// scheme // // First upload data to bzz:, and store the Swarm hash to the resulting manifest in a feed update. // This effectively uses a feed to store a pointer to content rather than the content itself // Retrieving the update with the Swarm hash should return the manifest pointing directly to the data // and raw retrieve of that hash should return the data func TestBzzWithFeed(t *testing.T) { signer, _ := newTestSigner() // Initialize Swarm test server srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() // put together some data for our test: dataBytes := []byte(` // // Create some data our manifest will point to. Data that could be very big and wouldn't fit in a feed update. // So what we are going to do is upload it to Swarm bzz:// and obtain a **manifest hash** pointing to it: // // MANIFEST HASH --> DATA // // Then, we store that **manifest hash** into a Swarm Feed update. Once we have done this, // we can use the **feed manifest hash** in bzz:// instead, this way: bzz://feed-manifest-hash. // // FEED MANIFEST HASH --> MANIFEST HASH --> DATA // // Given that we can update the feed at any time with a new **manifest hash** but the **feed manifest hash** // stays constant, we have effectively created a fixed address to changing content. (Applause) // // FEED MANIFEST HASH (the same) --> MANIFEST HASH(2) --> DATA(2) ... // `) // POST data to bzz and get back a content-addressed **manifest hash** pointing to it. resp, err := http.Post(fmt.Sprintf("%s/bzz:/", srv.URL), "text/plain", bytes.NewReader([]byte(dataBytes))) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } manifestAddressHex, err := ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } manifestAddress := common.FromHex(string(manifestAddressHex)) log.Info("added data", "manifest", string(manifestAddressHex)) // At this point we have uploaded the data and have a manifest pointing to it // Now store that manifest address in a feed update. // We also want a feed manifest, so we can use it to refer to the feed. // First, create a topic for our feed: topic, _ := feed.NewTopic("interesting topic indeed", nil) // Create a feed update request: updateRequest := feed.NewFirstRequest(topic) // Store the **manifest address** as data into the feed update. updateRequest.SetData(manifestAddress) // Sign the update if err := updateRequest.Sign(signer); err != nil { t.Fatal(err) } log.Info("added data", "data", common.ToHex(manifestAddress)) // Build the feed update http request: feedUpdateURL, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) if err != nil { t.Fatal(err) } query := feedUpdateURL.Query() body := updateRequest.AppendValues(query) // this adds all query parameters and returns the data to be posted query.Set("manifest", "1") // indicate we want a feed manifest back feedUpdateURL.RawQuery = query.Encode() // submit the feed update request to Swarm resp, err = http.Post(feedUpdateURL.String(), "application/octet-stream", bytes.NewReader(body)) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } feedManifestAddressHex, err := ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } feedManifestAddress := &storage.Address{} err = json.Unmarshal(feedManifestAddressHex, feedManifestAddress) if err != nil { t.Fatalf("data %s could not be unmarshaled: %v", feedManifestAddressHex, err) } correctManifestAddrHex := "747c402e5b9dc715a25a4393147512167bab018a007fad7cdcd9adc7fce1ced2" if feedManifestAddress.Hex() != correctManifestAddrHex { t.Fatalf("Response feed manifest address mismatch, expected '%s', got '%s'", correctManifestAddrHex, feedManifestAddress.Hex()) } // get bzz manifest transparent feed update resolve getBzzURL := fmt.Sprintf("%s/bzz:/%s", srv.URL, feedManifestAddress) resp, err = http.Get(getBzzURL) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } retrievedData, err := ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } if !bytes.Equal(retrievedData, []byte(dataBytes)) { t.Fatalf("retrieved data mismatch, expected %x, got %x", dataBytes, retrievedData) } } // Test Swarm feeds using the raw update methods func TestBzzFeed(t *testing.T) { srv := NewTestSwarmServer(t, serverFunc, nil) signer, _ := newTestSigner() defer srv.Close() // data of update 1 update1Data := testutil.RandomBytes(1, 666) update1Timestamp := srv.CurrentTime //data for update 2 update2Data := []byte("foo") topic, _ := feed.NewTopic("foo.eth", nil) updateRequest := feed.NewFirstRequest(topic) updateRequest.SetData(update1Data) if err := updateRequest.Sign(signer); err != nil { t.Fatal(err) } // creates feed and sets update 1 testUrl, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) if err != nil { t.Fatal(err) } urlQuery := testUrl.Query() body := updateRequest.AppendValues(urlQuery) // this adds all query parameters urlQuery.Set("manifest", "1") // indicate we want a manifest back testUrl.RawQuery = urlQuery.Encode() resp, err := http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } b, err := ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } rsrcResp := &storage.Address{} err = json.Unmarshal(b, rsrcResp) if err != nil { t.Fatalf("data %s could not be unmarshaled: %v", b, err) } correctManifestAddrHex := "bb056a5264c295c2b0f613c8409b9c87ce9d71576ace02458160df4cc894210b" if rsrcResp.Hex() != correctManifestAddrHex { t.Fatalf("Response feed manifest mismatch, expected '%s', got '%s'", correctManifestAddrHex, rsrcResp.Hex()) } // get the manifest testRawUrl := fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, rsrcResp) resp, err = http.Get(testRawUrl) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } b, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } manifest := &api.Manifest{} err = json.Unmarshal(b, manifest) if err != nil { t.Fatal(err) } if len(manifest.Entries) != 1 { t.Fatalf("Manifest has %d entries", len(manifest.Entries)) } correctFeedHex := "0x666f6f2e65746800000000000000000000000000000000000000000000000000c96aaa54e2d44c299564da76e1cd3184a2386b8d" if manifest.Entries[0].Feed.Hex() != correctFeedHex { t.Fatalf("Expected manifest Feed '%s', got '%s'", correctFeedHex, manifest.Entries[0].Feed.Hex()) } // take the chance to have bzz: crash on resolving a feed update that does not contain // a swarm hash: testBzzUrl := fmt.Sprintf("%s/bzz:/%s", srv.URL, rsrcResp) resp, err = http.Get(testBzzUrl) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode == http.StatusOK { t.Fatal("Expected error status since feed update does not contain a Swarm hash. Received 200 OK") } _, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } // get non-existent name, should fail testBzzResUrl := fmt.Sprintf("%s/bzz-feed:/bar", srv.URL) resp, err = http.Get(testBzzResUrl) if err != nil { t.Fatal(err) } if resp.StatusCode != http.StatusNotFound { t.Fatalf("Expected get non-existent feed manifest to fail with StatusNotFound (404), got %d", resp.StatusCode) } resp.Body.Close() // get latest update through bzz-feed directly log.Info("get update latest = 1.1", "addr", correctManifestAddrHex) testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex) resp, err = http.Get(testBzzResUrl) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } b, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } if !bytes.Equal(update1Data, b) { t.Fatalf("Expected body '%x', got '%x'", update1Data, b) } // update 2 // Move the clock ahead 1 second srv.CurrentTime++ log.Info("update 2") // 1.- get metadata about this feed testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s/", srv.URL, correctManifestAddrHex) resp, err = http.Get(testBzzResUrl + "?meta=1") if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("Get feed metadata returned %s", resp.Status) } b, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } updateRequest = &feed.Request{} if err = updateRequest.UnmarshalJSON(b); err != nil { t.Fatalf("Error decoding feed metadata: %s", err) } updateRequest.SetData(update2Data) if err = updateRequest.Sign(signer); err != nil { t.Fatal(err) } testUrl, err = url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) if err != nil { t.Fatal(err) } urlQuery = testUrl.Query() body = updateRequest.AppendValues(urlQuery) // this adds all query parameters goodQueryParameters := urlQuery.Encode() // save the query parameters for a second attempt // create bad query parameters in which the signature is missing urlQuery.Del("signature") testUrl.RawQuery = urlQuery.Encode() // 1st attempt with bad query parameters in which the signature is missing resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) if err != nil { t.Fatal(err) } defer resp.Body.Close() expectedCode := http.StatusBadRequest if resp.StatusCode != expectedCode { t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) } // 2nd attempt with bad query parameters in which the signature is of incorrect length urlQuery.Set("signature", "0xabcd") // should be 130 hex chars resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) if err != nil { t.Fatal(err) } defer resp.Body.Close() expectedCode = http.StatusBadRequest if resp.StatusCode != expectedCode { t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) } // 3rd attempt, with good query parameters: testUrl.RawQuery = goodQueryParameters resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) if err != nil { t.Fatal(err) } defer resp.Body.Close() expectedCode = http.StatusOK if resp.StatusCode != expectedCode { t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) } // get latest update through bzz-feed directly log.Info("get update 1.2") testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex) resp, err = http.Get(testBzzResUrl) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } b, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } if !bytes.Equal(update2Data, b) { t.Fatalf("Expected body '%x', got '%x'", update2Data, b) } // test manifest-less queries log.Info("get first update in update1Timestamp via direct query") query := feed.NewQuery(&updateRequest.Feed, update1Timestamp, lookup.NoClue) urlq, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) if err != nil { t.Fatal(err) } values := urlq.Query() query.AppendValues(values) // this adds feed query parameters urlq.RawQuery = values.Encode() resp, err = http.Get(urlq.String()) if err != nil { t.Fatal(err) } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { t.Fatalf("err %s", resp.Status) } b, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatal(err) } if !bytes.Equal(update1Data, b) { t.Fatalf("Expected body '%x', got '%x'", update1Data, b) } } func TestBzzGetPath(t *testing.T) { testBzzGetPath(false, t) testBzzGetPath(true, t) } func testBzzGetPath(encrypted bool, t *testing.T) { var err error testmanifest := []string{ `{"entries":[{"path":"b","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"c","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0}]}`, `{"entries":[{"path":"a","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"b/","hash":"","contentType":"application/bzz-manifest+json","status":0}]}`, `{"entries":[{"path":"a/","hash":"","contentType":"application/bzz-manifest+json","status":0}]}`, } testrequests := make(map[string]int) testrequests["/"] = 2 testrequests["/a/"] = 1 testrequests["/a/b/"] = 0 testrequests["/x"] = 0 testrequests[""] = 0 expectedfailrequests := []string{"", "/x"} reader := [3]*bytes.Reader{} addr := [3]storage.Address{} srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() for i, mf := range testmanifest { reader[i] = bytes.NewReader([]byte(mf)) var wait func(context.Context) error ctx := context.TODO() addr[i], wait, err = srv.FileStore.Store(ctx, reader[i], int64(len(mf)), encrypted) if err != nil { t.Fatal(err) } for j := i + 1; j < len(testmanifest); j++ { testmanifest[j] = strings.Replace(testmanifest[j], fmt.Sprintf("", i), addr[i].Hex(), -1) } err = wait(ctx) if err != nil { t.Fatal(err) } } rootRef := addr[2].Hex() _, err = http.Get(srv.URL + "/bzz-raw:/" + rootRef + "/a") if err != nil { t.Fatalf("Failed to connect to proxy: %v", err) } for k, v := range testrequests { var resp *http.Response var respbody []byte url := srv.URL + "/bzz-raw:/" if k != "" { url += rootRef + "/" + k[1:] + "?content_type=text/plain" } resp, err = http.Get(url) if err != nil { t.Fatalf("Request failed: %v", err) } defer resp.Body.Close() respbody, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatalf("Error while reading response body: %v", err) } if string(respbody) != testmanifest[v] { isexpectedfailrequest := false for _, r := range expectedfailrequests { if k == r { isexpectedfailrequest = true } } if !isexpectedfailrequest { t.Fatalf("Response body does not match, expected: %v, got %v", testmanifest[v], string(respbody)) } } } for k, v := range testrequests { var resp *http.Response var respbody []byte url := srv.URL + "/bzz-hash:/" if k != "" { url += rootRef + "/" + k[1:] } resp, err = http.Get(url) if err != nil { t.Fatalf("Request failed: %v", err) } defer resp.Body.Close() respbody, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatalf("Read request body: %v", err) } if string(respbody) != addr[v].Hex() { isexpectedfailrequest := false for _, r := range expectedfailrequests { if k == r { isexpectedfailrequest = true } } if !isexpectedfailrequest { t.Fatalf("Response body does not match, expected: %v, got %v", addr[v], string(respbody)) } } } ref := addr[2].Hex() for _, c := range []struct { path string json string pageFragments []string }{ { path: "/", json: `{"common_prefixes":["a/"]}`, pageFragments: []string{ fmt.Sprintf("Swarm index of bzz:/%s/", ref), `a/`, }, }, { path: "/a/", json: `{"common_prefixes":["a/b/"],"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/a","mod_time":"0001-01-01T00:00:00Z"}]}`, pageFragments: []string{ fmt.Sprintf("Swarm index of bzz:/%s/a/", ref), `b/`, fmt.Sprintf(`a`, ref), }, }, { path: "/a/b/", json: `{"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/b","mod_time":"0001-01-01T00:00:00Z"},{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/c","mod_time":"0001-01-01T00:00:00Z"}]}`, pageFragments: []string{ fmt.Sprintf("Swarm index of bzz:/%s/a/b/", ref), fmt.Sprintf(`b`, ref), fmt.Sprintf(`c`, ref), }, }, { path: "/x", }, { path: "", }, } { k := c.path url := srv.URL + "/bzz-list:/" if k != "" { url += rootRef + "/" + k[1:] } t.Run("json list "+c.path, func(t *testing.T) { resp, err := http.Get(url) if err != nil { t.Fatalf("HTTP request: %v", err) } defer resp.Body.Close() respbody, err := ioutil.ReadAll(resp.Body) if err != nil { t.Fatalf("Read response body: %v", err) } body := strings.TrimSpace(string(respbody)) if body != c.json { isexpectedfailrequest := false for _, r := range expectedfailrequests { if k == r { isexpectedfailrequest = true } } if !isexpectedfailrequest { t.Errorf("Response list body %q does not match, expected: %v, got %v", k, c.json, body) } } }) t.Run("html list "+c.path, func(t *testing.T) { req, err := http.NewRequest(http.MethodGet, url, nil) if err != nil { t.Fatalf("New request: %v", err) } req.Header.Set("Accept", "text/html") resp, err := http.DefaultClient.Do(req) if err != nil { t.Fatalf("HTTP request: %v", err) } defer resp.Body.Close() b, err := ioutil.ReadAll(resp.Body) if err != nil { t.Fatalf("Read response body: %v", err) } body := string(b) for _, f := range c.pageFragments { if !strings.Contains(body, f) { isexpectedfailrequest := false for _, r := range expectedfailrequests { if k == r { isexpectedfailrequest = true } } if !isexpectedfailrequest { t.Errorf("Response list body %q does not contain %q: body %q", k, f, body) } } } }) } nonhashtests := []string{ srv.URL + "/bzz:/name", srv.URL + "/bzz-immutable:/nonhash", srv.URL + "/bzz-raw:/nonhash", srv.URL + "/bzz-list:/nonhash", srv.URL + "/bzz-hash:/nonhash", } nonhashresponses := []string{ `cannot resolve name: no DNS to resolve name: "name"`, `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, } for i, url := range nonhashtests { var resp *http.Response var respbody []byte resp, err = http.Get(url) if err != nil { t.Fatalf("Request failed: %v", err) } defer resp.Body.Close() respbody, err = ioutil.ReadAll(resp.Body) if err != nil { t.Fatalf("ReadAll failed: %v", err) } if !strings.Contains(string(respbody), nonhashresponses[i]) { t.Fatalf("Non-Hash response body does not match, expected: %v, got: %v", nonhashresponses[i], string(respbody)) } } } func TestBzzTar(t *testing.T) { testBzzTar(false, t) testBzzTar(true, t) } func testBzzTar(encrypted bool, t *testing.T) { srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() fileNames := []string{"tmp1.txt", "tmp2.lock", "tmp3.rtf"} fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"} buf := &bytes.Buffer{} tw := tar.NewWriter(buf) defer tw.Close() for i, v := range fileNames { size := int64(len(fileContents[i])) hdr := &tar.Header{ Name: v, Mode: 0644, Size: size, ModTime: time.Now(), Xattrs: map[string]string{ "user.swarm.content-type": "text/plain", }, } if err := tw.WriteHeader(hdr); err != nil { t.Fatal(err) } // copy the file into the tar stream n, err := io.Copy(tw, bytes.NewBufferString(fileContents[i])) if err != nil { t.Fatal(err) } else if n != size { t.Fatal("size mismatch") } } //post tar stream url := srv.URL + "/bzz:/" if encrypted { url = url + "encrypt" } req, err := http.NewRequest("POST", url, buf) if err != nil { t.Fatal(err) } req.Header.Add("Content-Type", "application/x-tar") req.Header.Add(SwarmTagHeaderName, "test-upload") client := &http.Client{} resp2, err := client.Do(req) if err != nil { t.Fatal(err) } if resp2.StatusCode != http.StatusOK { t.Fatalf("err %s", resp2.Status) } // check that the tag was written correctly tag := srv.Tags.All()[0] testutil.CheckTag(t, tag, 4, 4, 0, 4) swarmHash, err := ioutil.ReadAll(resp2.Body) resp2.Body.Close() if err != nil { t.Fatal(err) } // now do a GET to get a tarball back req, err = http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s", string(swarmHash)), nil) if err != nil { t.Fatal(err) } req.Header.Add("Accept", "application/x-tar") resp2, err = client.Do(req) if err != nil { t.Fatal(err) } defer resp2.Body.Close() if h := resp2.Header.Get("Content-Type"); h != "application/x-tar" { t.Fatalf("Content-Type header expected: application/x-tar, got: %s", h) } expectedFileName := string(swarmHash) + ".tar" expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", expectedFileName) if h := resp2.Header.Get("Content-Disposition"); h != expectedContentDisposition { t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h) } file, err := ioutil.TempFile("", "swarm-downloaded-tarball") if err != nil { t.Fatal(err) } defer os.Remove(file.Name()) _, err = io.Copy(file, resp2.Body) if err != nil { t.Fatalf("error getting tarball: %v", err) } file.Sync() file.Close() tarFileHandle, err := os.Open(file.Name()) if err != nil { t.Fatal(err) } tr := tar.NewReader(tarFileHandle) for { hdr, err := tr.Next() if err == io.EOF { break } else if err != nil { t.Fatalf("error reading tar stream: %s", err) } bb := make([]byte, hdr.Size) _, err = tr.Read(bb) if err != nil && err != io.EOF { t.Fatal(err) } passed := false for i, v := range fileNames { if v == hdr.Name { if string(bb) == fileContents[i] { passed = true break } } } if !passed { t.Fatalf("file %s did not pass content assertion", hdr.Name) } } // now check the tags endpoint } // TestBzzCorrectTagEstimate checks that the HTTP middleware sets the total number of chunks // in the tag according to an estimate from the HTTP request Content-Length header divided // by chunk size (4096). It is needed to be checked BEFORE chunking is done, therefore // concurrency was introduced to slow down the HTTP request func TestBzzCorrectTagEstimate(t *testing.T) { srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() for _, v := range []struct { toEncrypt bool expChunks int64 }{ {toEncrypt: false, expChunks: 248}, {toEncrypt: true, expChunks: 250}, } { pr, pw := io.Pipe() ctx, cancel := context.WithCancel(context.Background()) defer cancel() addr := "" if v.toEncrypt { addr = "encrypt" } req, err := http.NewRequest("POST", srv.URL+"/bzz:/"+addr, pr) if err != nil { t.Fatal(err) } req = req.WithContext(ctx) req.ContentLength = 1000000 req.Header.Add(SwarmTagHeaderName, "1000000") go func() { for { select { case <-ctx.Done(): return case <-time.After(1 * time.Millisecond): _, err := pw.Write([]byte{0}) if err != nil { t.Error(err) } } } }() go func() { transport := http.DefaultTransport _, err := transport.RoundTrip(req) if err != nil { t.Error(err) } }() done := false for !done { switch len(srv.Tags.All()) { case 0: <-time.After(10 * time.Millisecond) case 1: tag := srv.Tags.All()[0] testutil.CheckTag(t, tag, 0, 0, 0, v.expChunks) srv.Tags.Delete(tag.Uid) done = true } } } } // TestBzzRootRedirect tests that getting the root path of a manifest without // a trailing slash gets redirected to include the trailing slash so that // relative URLs work as expected. func TestBzzRootRedirect(t *testing.T) { testBzzRootRedirect(false, t) } func TestBzzRootRedirectEncrypted(t *testing.T) { testBzzRootRedirect(true, t) } func testBzzRootRedirect(toEncrypt bool, t *testing.T) { srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() // create a manifest with some data at the root path data := []byte("data") headers := map[string]string{"Content-Type": "text/plain"} res, hash := httpDo("POST", srv.URL+"/bzz:/", bytes.NewReader(data), headers, false, t) if res.StatusCode != http.StatusOK { t.Fatalf("unexpected status code from server %d want %d", res.StatusCode, http.StatusOK) } // define a CheckRedirect hook which ensures there is only a single // redirect to the correct URL redirected := false httpClient := http.Client{ CheckRedirect: func(req *http.Request, via []*http.Request) error { if redirected { return errors.New("too many redirects") } redirected = true expectedPath := "/bzz:/" + hash + "/" if req.URL.Path != expectedPath { return fmt.Errorf("expected redirect to %q, got %q", expectedPath, req.URL.Path) } return nil }, } // perform the GET request and assert the response res, err := httpClient.Get(srv.URL + "/bzz:/" + hash) if err != nil { t.Fatal(err) } defer res.Body.Close() if !redirected { t.Fatal("expected GET /bzz:/ to redirect to /bzz:// but it didn't") } gotData, err := ioutil.ReadAll(res.Body) if err != nil { t.Fatal(err) } if !bytes.Equal(gotData, data) { t.Fatalf("expected response to equal %q, got %q", data, gotData) } } func TestMethodsNotAllowed(t *testing.T) { srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() databytes := "bar" for _, c := range []struct { url string code int }{ { url: fmt.Sprintf("%s/bzz-list:/", srv.URL), code: http.StatusMethodNotAllowed, }, { url: fmt.Sprintf("%s/bzz-hash:/", srv.URL), code: http.StatusMethodNotAllowed, }, { url: fmt.Sprintf("%s/bzz-immutable:/", srv.URL), code: http.StatusMethodNotAllowed, }, } { res, _ := http.Post(c.url, "text/plain", bytes.NewReader([]byte(databytes))) if res.StatusCode != c.code { t.Fatalf("should have failed. requested url: %s, expected code %d, got %d", c.url, c.code, res.StatusCode) } } } func httpDo(httpMethod string, url string, reqBody io.Reader, headers map[string]string, verbose bool, t *testing.T) (*http.Response, string) { // Build the Request req, err := http.NewRequest(httpMethod, url, reqBody) if err != nil { t.Fatal(err) } for key, value := range headers { req.Header.Set(key, value) } if verbose { t.Log(req.Method, req.URL, req.Header, req.Body) } // Send Request out httpClient := &http.Client{} res, err := httpClient.Do(req) if err != nil { t.Fatal(err) } // Read the HTTP Body buffer, err := ioutil.ReadAll(res.Body) if err != nil { t.Fatal(err) } defer res.Body.Close() body := string(buffer) return res, body } func TestGet(t *testing.T) { srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() for _, testCase := range []struct { uri string method string headers map[string]string expectedStatusCode int assertResponseBody string verbose bool }{ { uri: fmt.Sprintf("%s/", srv.URL), method: "GET", headers: map[string]string{"Accept": "text/html"}, expectedStatusCode: http.StatusOK, assertResponseBody: "Swarm provides censorship resistant storage and communication infrastructure for a sovereign digital society", verbose: false, }, { uri: fmt.Sprintf("%s/", srv.URL), method: "GET", headers: map[string]string{"Accept": "application/json"}, expectedStatusCode: http.StatusOK, assertResponseBody: "Swarm: Please request a valid ENS or swarm hash with the appropriate bzz scheme", verbose: false, }, { uri: fmt.Sprintf("%s/robots.txt", srv.URL), method: "GET", headers: map[string]string{"Accept": "text/html"}, expectedStatusCode: http.StatusOK, assertResponseBody: "User-agent: *\nDisallow: /", verbose: false, }, { uri: fmt.Sprintf("%s/nonexistent_path", srv.URL), method: "GET", headers: map[string]string{}, expectedStatusCode: http.StatusNotFound, verbose: false, }, { uri: fmt.Sprintf("%s/bzz:asdf/", srv.URL), method: "GET", headers: map[string]string{}, expectedStatusCode: http.StatusNotFound, verbose: false, }, { uri: fmt.Sprintf("%s/tbz2/", srv.URL), method: "GET", headers: map[string]string{}, expectedStatusCode: http.StatusNotFound, verbose: false, }, { uri: fmt.Sprintf("%s/bzz-rack:/", srv.URL), method: "GET", headers: map[string]string{}, expectedStatusCode: http.StatusNotFound, verbose: false, }, { uri: fmt.Sprintf("%s/bzz-ls", srv.URL), method: "GET", headers: map[string]string{}, expectedStatusCode: http.StatusNotFound, verbose: false, }} { t.Run("GET "+testCase.uri, func(t *testing.T) { res, body := httpDo(testCase.method, testCase.uri, nil, testCase.headers, testCase.verbose, t) if res.StatusCode != testCase.expectedStatusCode { t.Fatalf("expected status code %d but got %d", testCase.expectedStatusCode, res.StatusCode) } if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) { t.Fatalf("expected response to be: %s but got: %s", testCase.assertResponseBody, body) } }) } } func TestModify(t *testing.T) { srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() headers := map[string]string{"Content-Type": "text/plain"} res, hash := httpDo("POST", srv.URL+"/bzz:/", bytes.NewReader([]byte("data")), headers, false, t) if res.StatusCode != http.StatusOK { t.Fatalf("unexpected status code from server %d want %d", res.StatusCode, http.StatusOK) } for _, testCase := range []struct { uri string method string headers map[string]string requestBody []byte expectedStatusCode int assertResponseBody string assertResponseHeaders map[string]string verbose bool }{ { uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), method: "DELETE", headers: map[string]string{}, expectedStatusCode: http.StatusOK, assertResponseBody: "8b634aea26eec353ac0ecbec20c94f44d6f8d11f38d4578a4c207a84c74ef731", verbose: false, }, { uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), method: "PUT", headers: map[string]string{}, expectedStatusCode: http.StatusMethodNotAllowed, verbose: false, }, { uri: fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, hash), method: "PUT", headers: map[string]string{}, expectedStatusCode: http.StatusMethodNotAllowed, verbose: false, }, { uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), method: "PATCH", headers: map[string]string{}, expectedStatusCode: http.StatusMethodNotAllowed, verbose: false, }, { uri: fmt.Sprintf("%s/bzz-raw:/", srv.URL), method: "POST", headers: map[string]string{}, requestBody: []byte("POSTdata"), expectedStatusCode: http.StatusOK, assertResponseHeaders: map[string]string{"Content-Length": "64"}, verbose: false, }, { uri: fmt.Sprintf("%s/bzz-raw:/encrypt", srv.URL), method: "POST", headers: map[string]string{}, requestBody: []byte("POSTdata"), expectedStatusCode: http.StatusOK, assertResponseHeaders: map[string]string{"Content-Length": "128"}, verbose: false, }, } { t.Run(testCase.method+" "+testCase.uri, func(t *testing.T) { reqBody := bytes.NewReader(testCase.requestBody) res, body := httpDo(testCase.method, testCase.uri, reqBody, testCase.headers, testCase.verbose, t) if res.StatusCode != testCase.expectedStatusCode { t.Fatalf("expected status code %d but got %d, %s", testCase.expectedStatusCode, res.StatusCode, body) } if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) { t.Log(body) t.Fatalf("expected response %s but got %s", testCase.assertResponseBody, body) } for key, value := range testCase.assertResponseHeaders { if res.Header.Get(key) != value { t.Logf("expected %s=%s in HTTP response header but got %s", key, value, res.Header.Get(key)) } } }) } } func TestMultiPartUpload(t *testing.T) { // POST /bzz:/ Content-Type: multipart/form-data verbose := false // Setup Swarm srv := NewTestSwarmServer(t, serverFunc, nil) defer srv.Close() url := fmt.Sprintf("%s/bzz:/", srv.URL) buf := new(bytes.Buffer) form := multipart.NewWriter(buf) form.WriteField("name", "John Doe") file1, _ := form.CreateFormFile("cv", "cv.txt") file1.Write([]byte("John Doe's Credentials")) file2, _ := form.CreateFormFile("profile_picture", "profile.jpg") file2.Write([]byte("imaginethisisjpegdata")) form.Close() headers := map[string]string{ "Content-Type": form.FormDataContentType(), "Content-Length": strconv.Itoa(buf.Len()), } res, body := httpDo("POST", url, buf, headers, verbose, t) if res.StatusCode != http.StatusOK { t.Fatalf("expected POST multipart/form-data to return 200, but it returned %d", res.StatusCode) } if len(body) != 64 { t.Fatalf("expected POST multipart/form-data to return a 64 char manifest but the answer was %d chars long", len(body)) } } // TestBzzGetFileWithResolver tests fetching a file using a mocked ENS resolver func TestBzzGetFileWithResolver(t *testing.T) { resolver := newTestResolveValidator("") srv := NewTestSwarmServer(t, serverFunc, resolver) defer srv.Close() fileNames := []string{"dir1/tmp1.txt", "dir2/tmp2.lock", "dir3/tmp3.rtf"} fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"} buf := &bytes.Buffer{} tw := tar.NewWriter(buf) for i, v := range fileNames { size := len(fileContents[i]) hdr := &tar.Header{ Name: v, Mode: 0644, Size: int64(size), ModTime: time.Now(), Xattrs: map[string]string{ "user.swarm.content-type": "text/plain", }, } if err := tw.WriteHeader(hdr); err != nil { t.Fatal(err) } // copy the file into the tar stream n, err := io.WriteString(tw, fileContents[i]) if err != nil { t.Fatal(err) } else if n != size { t.Fatal("size mismatch") } } if err := tw.Close(); err != nil { t.Fatal(err) } //post tar stream url := srv.URL + "/bzz:/" req, err := http.NewRequest("POST", url, buf) if err != nil { t.Fatal(err) } req.Header.Add("Content-Type", "application/x-tar") client := &http.Client{} serverResponse, err := client.Do(req) if err != nil { t.Fatal(err) } if serverResponse.StatusCode != http.StatusOK { t.Fatalf("err %s", serverResponse.Status) } swarmHash, err := ioutil.ReadAll(serverResponse.Body) serverResponse.Body.Close() if err != nil { t.Fatal(err) } // set the resolved hash to be the swarm hash of what we've just uploaded hash := common.HexToHash(string(swarmHash)) resolver.hash = &hash for _, v := range []struct { addr string path string expectedStatusCode int expectedContentType string expectedFileName string }{ { addr: string(swarmHash), path: fileNames[0], expectedStatusCode: http.StatusOK, expectedContentType: "text/plain", expectedFileName: path.Base(fileNames[0]), }, { addr: "somebogusensname", path: fileNames[0], expectedStatusCode: http.StatusOK, expectedContentType: "text/plain", expectedFileName: path.Base(fileNames[0]), }, } { req, err := http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s/%s", v.addr, v.path), nil) if err != nil { t.Fatal(err) } serverResponse, err := client.Do(req) if err != nil { t.Fatal(err) } defer serverResponse.Body.Close() if serverResponse.StatusCode != v.expectedStatusCode { t.Fatalf("expected %d, got %d", v.expectedStatusCode, serverResponse.StatusCode) } if h := serverResponse.Header.Get("Content-Type"); h != v.expectedContentType { t.Fatalf("Content-Type header expected: %s, got %s", v.expectedContentType, h) } expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", v.expectedFileName) if h := serverResponse.Header.Get("Content-Disposition"); h != expectedContentDisposition { t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h) } } } // TestCalculateNumberOfChunks is a unit test for the chunk-number-according-to-content-length // calculation func TestCalculateNumberOfChunks(t *testing.T) { //test cases: for _, tc := range []struct{ len, chunks int64 }{ {len: 1000, chunks: 1}, {len: 5000, chunks: 3}, {len: 10000, chunks: 4}, {len: 100000, chunks: 26}, {len: 1000000, chunks: 248}, {len: 325839339210, chunks: 79550620 + 621490 + 4856 + 38 + 1}, } { res := calculateNumberOfChunks(tc.len, false) if res != tc.chunks { t.Fatalf("expected result for %d bytes to be %d got %d", tc.len, tc.chunks, res) } } } // TestCalculateNumberOfChunksEncrypted is a unit test for the chunk-number-according-to-content-length // calculation with encryption (branching factor=64) func TestCalculateNumberOfChunksEncrypted(t *testing.T) { //test cases: for _, tc := range []struct{ len, chunks int64 }{ {len: 1000, chunks: 1}, {len: 5000, chunks: 3}, {len: 10000, chunks: 4}, {len: 100000, chunks: 26}, {len: 1000000, chunks: 245 + 4 + 1}, {len: 325839339210, chunks: 79550620 + 1242979 + 19422 + 304 + 5 + 1}, } { res := calculateNumberOfChunks(tc.len, true) if res != tc.chunks { t.Fatalf("expected result for %d bytes to be %d got %d", tc.len, tc.chunks, res) } } } // testResolver implements the Resolver interface and either returns the given // hash if it is set, or returns a "name not found" error type testResolveValidator struct { hash *common.Hash } func newTestResolveValidator(addr string) *testResolveValidator { r := &testResolveValidator{} if addr != "" { hash := common.HexToHash(addr) r.hash = &hash } return r } func (t *testResolveValidator) Resolve(addr string) (common.Hash, error) { if t.hash == nil { return common.Hash{}, fmt.Errorf("DNS name not found: %q", addr) } return *t.hash, nil } func (t *testResolveValidator) Owner(node [32]byte) (addr common.Address, err error) { return } func (t *testResolveValidator) HeaderByNumber(context.Context, *big.Int) (header *types.Header, err error) { return }