forked from cerc-io/plugeth
427316a707
* swarm/storage/mru: Add embedded publickey and remove ENS dep This commit breaks swarm, swarm/api... but tests in swarm/storage/mru pass * swarm: Refactor swarm, swarm/api to mru changes, make tests pass * swarm/storage/mru: Remove self from recv, remove test ens vldtr * swarm/storage/mru: Remove redundant test, expose ResourceHash mthd * swarm/storage/mru: Make HeaderGetter mandatory + godoc fixes * swarm/storage: Remove validator prefix for metadata chunk * swarm/storage/mru: Use Address instead of PublicKey * swarm/storage/mru: Change index from name to metadata chunk addr * swarm/storage/mru: Refactor swarm/api/... to MRU index changes * swarm/storage/mru: Refactor cleanup * swarm/storage/mru: Rebase cleanup * swarm: Use constructor for GenericSigner MRU in swarm.go * swarm/storage: Change to BMTHash for MRU hashing * swarm/storage: Reduce loglevel on chunk validator logs * swarm/storage/mru: Delint * swarm: MRU Rebase cleanup * swarm/storage/mru: client-side mru signatures Rebase to PR #668 and fix all conflicts * swarm/storage/mru: refactor and documentation * swarm/resource/mru: error-checking tests for parseUpdate/newUpdateChunk * swarm/storage/mru: Added resourcemetadata tests * swarm/storage/mru: Added tests for UpdateRequest * swarm/storage/mru: more test coverage for UpdateRequest and comments * swarm/storage/mru: Avoid fake chunks in parseUpdate() * swarm/storage/mru: Documented resource.go extensively moved some functions where they make most sense * swarm/storage/mru: increase test coverage for UpdateRequest and variable name changes throughout to increase consistency * swarm/storage/mru: moved default timestamp to NewCreateRequest- * swarm/storage/mru: lookup refactor * swarm/storage/mru: added comments and renamed raw flag to rawmru * swarm/storage/mru: fix receiver typo * swarm/storage/mru: refactored update chunk new/create * swarm/storage/mru: refactored signature digest to avoid malleability * swarm/storage/mru: optimize update data serialization * swarm/storage/mru: refactor and cleanup * swarm/storage/mru: add timestamp struct and serialization * swarm/storage/mru: fix lint error and mark some old code for deletion * swarm/storage/mru: remove unnecessary variable * swarm/storage/mru: Added more comments throughout * swarm/storage/mru: Refactored metadata chunk layout + extensive error... * swarm/storage/mru: refactor cli parser Changed resource info output to JSON * swarm/storage/mru: refactor serialization for extensibility refactored error messages to NewErrorf * swarm/storage/mru: Moved Signature to resource_sign. Check Sign errors in server tests * swarm/storage/mru: Remove isSafeName() checks * swarm/storage/mru: scrubbed off all references to "block" for time * swarm/storage/mru: removed superfluous isSynced() call. * swarm/storage/mru: remove isMultihash() and ToSafeName functions * swarm/storage/mru: various fixes and comments * swarm/storage/mru: decoupled cli for independent create/update * Made resource name optional * Removed unused LookupPrevious * swarm/storage/mru: Decoupled resource create / update & refactor * swarm/storage/mru: Fixed some comments as per issues raised in PR #743 * swarm/storage/mru: Cosmetic changes as per #743 comments * swarm/storage/mru: refct request encoder/decoder > marshal/unmarshal * swarm/storage/mru: Cosmetic changes as per review in #748 * swarm/storage/mru: removed timestamp proof placeholder * swarm/storage/mru: cosmetic/doc/fixes changes as per comments in #704 * swarm/storage/mru: removed unnecessary check in Handler.update * swarm/storage/mru: Implemented Marshaler/Unmarshaler iface in Request * swarm/storage/mru: Fixed linter error * swarm/storage/mru: removed redundant address in signature digest * swarm/storage/mru: fixed bug: LookupLatestVersionInPeriod not working * swarm/storage/mru: Unfold Request creation API for create or update+create set common time source for mru package * swarm/api/http: fix HandleGetResource error variable shadowed when requesting a resource that does not exist * swarm/storage/mru: Add simple check to detect duplicate updates * swarm/storage/mru: moved Multihash() to the right place. * cmd/swarm: remove unneeded clientaccountmanager.go * swarm/storage/mru: Changed some comments as per reviews in #784 * swarm/storage/mru: Made SignedResourceUpdate.GetDigest() public * swarm/storage/mru: cosmetic changes as per comments in #784 * cmd/swarm: Inverted --multihash flag default * swarm/storage/mru: removed Verify from SignedResourceUpdate.fromChunk * swarm/storage/mru: Moved validation code out of serializer Cosmetic / comment changes * swarm/storage/mru: Added unit tests for UpdateLookup * swarm/storage/mru: Increased coverage of metadata serialization * swarm/storage/mru: Increased test coverage of updateHeader serializers * swarm/storage/mru: Add resourceUpdate serializer test
127 lines
4.3 KiB
Go
127 lines
4.3 KiB
Go
// Copyright 2018 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
package mru
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
)
|
|
|
|
func compareByteSliceToExpectedHex(t *testing.T, variableName string, actualValue []byte, expectedHex string) {
|
|
if hexutil.Encode(actualValue) != expectedHex {
|
|
t.Fatalf("%s: Expected %s to be %s, got %s", t.Name(), variableName, expectedHex, hexutil.Encode(actualValue))
|
|
}
|
|
}
|
|
|
|
func getTestMetadata() *ResourceMetadata {
|
|
return &ResourceMetadata{
|
|
Name: "world news report, every hour, on the hour",
|
|
StartTime: Timestamp{
|
|
Time: 1528880400,
|
|
},
|
|
Frequency: 3600,
|
|
Owner: newCharlieSigner().Address(),
|
|
}
|
|
}
|
|
|
|
func TestMetadataSerializerDeserializer(t *testing.T) {
|
|
metadata := *getTestMetadata()
|
|
|
|
rootAddr, metaHash, chunkData, err := metadata.serializeAndHash() // creates hashes and marshals, in one go
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
const expectedRootAddr = "0xfb0ed7efa696bdb0b54cd75554cc3117ffc891454317df7dd6fefad978e2f2fb"
|
|
const expectedMetaHash = "0xf74a10ce8f26ffc8bfaa07c3031a34b2c61f517955e7deb1592daccf96c69cf0"
|
|
const expectedChunkData = "0x00004f0010dd205b00000000100e0000000000002a776f726c64206e657773207265706f72742c20657665727920686f75722c206f6e2074686520686f7572876a8936a7cd0b79ef0735ad0896c1afe278781c"
|
|
|
|
compareByteSliceToExpectedHex(t, "rootAddr", rootAddr, expectedRootAddr)
|
|
compareByteSliceToExpectedHex(t, "metaHash", metaHash, expectedMetaHash)
|
|
compareByteSliceToExpectedHex(t, "chunkData", chunkData, expectedChunkData)
|
|
|
|
recoveredMetadata := ResourceMetadata{}
|
|
recoveredMetadata.binaryGet(chunkData)
|
|
|
|
if recoveredMetadata != metadata {
|
|
t.Fatalf("Expected that the recovered metadata equals the marshalled metadata")
|
|
}
|
|
|
|
// we are going to mess with the data, so create a backup to go back to it for the next test
|
|
backup := make([]byte, len(chunkData))
|
|
copy(backup, chunkData)
|
|
|
|
chunkData = []byte{1, 2, 3}
|
|
if err := recoveredMetadata.binaryGet(chunkData); err == nil {
|
|
t.Fatal("Expected binaryGet to fail since chunk is too small")
|
|
}
|
|
|
|
// restore backup
|
|
chunkData = make([]byte, len(backup))
|
|
copy(chunkData, backup)
|
|
|
|
// mess with the prefix so it is not zero
|
|
chunkData[0] = 7
|
|
chunkData[1] = 9
|
|
|
|
if err := recoveredMetadata.binaryGet(chunkData); err == nil {
|
|
t.Fatal("Expected binaryGet to fail since prefix bytes are not zero")
|
|
}
|
|
|
|
// restore backup
|
|
chunkData = make([]byte, len(backup))
|
|
copy(chunkData, backup)
|
|
|
|
// mess with the length header to trigger an error
|
|
chunkData[2] = 255
|
|
chunkData[3] = 44
|
|
if err := recoveredMetadata.binaryGet(chunkData); err == nil {
|
|
t.Fatal("Expected binaryGet to fail since header length does not match")
|
|
}
|
|
|
|
// restore backup
|
|
chunkData = make([]byte, len(backup))
|
|
copy(chunkData, backup)
|
|
|
|
// mess with name length header to trigger a chunk too short error
|
|
chunkData[20] = 255
|
|
if err := recoveredMetadata.binaryGet(chunkData); err == nil {
|
|
t.Fatal("Expected binaryGet to fail since name length is incorrect")
|
|
}
|
|
|
|
// restore backup
|
|
chunkData = make([]byte, len(backup))
|
|
copy(chunkData, backup)
|
|
|
|
// mess with name length header to trigger an leftover bytes to read error
|
|
chunkData[20] = 3
|
|
if err := recoveredMetadata.binaryGet(chunkData); err == nil {
|
|
t.Fatal("Expected binaryGet to fail since name length is too small")
|
|
}
|
|
}
|
|
|
|
func TestMetadataSerializerLengthCheck(t *testing.T) {
|
|
metadata := *getTestMetadata()
|
|
|
|
// make a slice that is too small to contain the metadata
|
|
serializedMetadata := make([]byte, 4)
|
|
|
|
if err := metadata.binaryPut(serializedMetadata); err == nil {
|
|
t.Fatal("Expected metadata.binaryPut to fail, since target slice is too small")
|
|
}
|
|
|
|
}
|