forked from cerc-io/plugeth
ad6c39012f
swarm/api: integrate tags to count chunks being split and stored swarm/api/http: integrate tags in middleware for HTTP `POST` calls and assert chunks being calculated and counted correctly swarm: remove deprecated and unused code, add swarm hash to DoneSplit signature, remove calls to the api client from the http package
1410 lines
40 KiB
Go
1410 lines
40 KiB
Go
// Copyright 2017 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package http
|
|
|
|
import (
|
|
"archive/tar"
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"flag"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"math/big"
|
|
"mime/multipart"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/ethereum/go-ethereum/swarm/storage/feed/lookup"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/log"
|
|
"github.com/ethereum/go-ethereum/swarm/api"
|
|
"github.com/ethereum/go-ethereum/swarm/storage"
|
|
"github.com/ethereum/go-ethereum/swarm/storage/feed"
|
|
"github.com/ethereum/go-ethereum/swarm/testutil"
|
|
)
|
|
|
|
func init() {
|
|
loglevel := flag.Int("loglevel", 2, "loglevel")
|
|
flag.Parse()
|
|
log.Root().SetHandler(log.CallerFileHandler(log.LvlFilterHandler(log.Lvl(*loglevel), log.StreamHandler(os.Stderr, log.TerminalFormat(true)))))
|
|
}
|
|
|
|
func serverFunc(api *api.API) TestServer {
|
|
return NewServer(api, "")
|
|
}
|
|
|
|
func newTestSigner() (*feed.GenericSigner, error) {
|
|
privKey, err := crypto.HexToECDSA("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return feed.NewGenericSigner(privKey), nil
|
|
}
|
|
|
|
// Test the transparent resolving of feed updates with bzz:// scheme
|
|
//
|
|
// First upload data to bzz:, and store the Swarm hash to the resulting manifest in a feed update.
|
|
// This effectively uses a feed to store a pointer to content rather than the content itself
|
|
// Retrieving the update with the Swarm hash should return the manifest pointing directly to the data
|
|
// and raw retrieve of that hash should return the data
|
|
func TestBzzWithFeed(t *testing.T) {
|
|
|
|
signer, _ := newTestSigner()
|
|
|
|
// Initialize Swarm test server
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
|
|
// put together some data for our test:
|
|
dataBytes := []byte(`
|
|
//
|
|
// Create some data our manifest will point to. Data that could be very big and wouldn't fit in a feed update.
|
|
// So what we are going to do is upload it to Swarm bzz:// and obtain a **manifest hash** pointing to it:
|
|
//
|
|
// MANIFEST HASH --> DATA
|
|
//
|
|
// Then, we store that **manifest hash** into a Swarm Feed update. Once we have done this,
|
|
// we can use the **feed manifest hash** in bzz:// instead, this way: bzz://feed-manifest-hash.
|
|
//
|
|
// FEED MANIFEST HASH --> MANIFEST HASH --> DATA
|
|
//
|
|
// Given that we can update the feed at any time with a new **manifest hash** but the **feed manifest hash**
|
|
// stays constant, we have effectively created a fixed address to changing content. (Applause)
|
|
//
|
|
// FEED MANIFEST HASH (the same) --> MANIFEST HASH(2) --> DATA(2) ...
|
|
//
|
|
`)
|
|
|
|
// POST data to bzz and get back a content-addressed **manifest hash** pointing to it.
|
|
resp, err := http.Post(fmt.Sprintf("%s/bzz:/", srv.URL), "text/plain", bytes.NewReader([]byte(dataBytes)))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
manifestAddressHex, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
manifestAddress := common.FromHex(string(manifestAddressHex))
|
|
|
|
log.Info("added data", "manifest", string(manifestAddressHex))
|
|
|
|
// At this point we have uploaded the data and have a manifest pointing to it
|
|
// Now store that manifest address in a feed update.
|
|
// We also want a feed manifest, so we can use it to refer to the feed.
|
|
|
|
// First, create a topic for our feed:
|
|
topic, _ := feed.NewTopic("interesting topic indeed", nil)
|
|
|
|
// Create a feed update request:
|
|
updateRequest := feed.NewFirstRequest(topic)
|
|
|
|
// Store the **manifest address** as data into the feed update.
|
|
updateRequest.SetData(manifestAddress)
|
|
|
|
// Sign the update
|
|
if err := updateRequest.Sign(signer); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
log.Info("added data", "data", common.ToHex(manifestAddress))
|
|
|
|
// Build the feed update http request:
|
|
feedUpdateURL, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
query := feedUpdateURL.Query()
|
|
body := updateRequest.AppendValues(query) // this adds all query parameters and returns the data to be posted
|
|
query.Set("manifest", "1") // indicate we want a feed manifest back
|
|
feedUpdateURL.RawQuery = query.Encode()
|
|
|
|
// submit the feed update request to Swarm
|
|
resp, err = http.Post(feedUpdateURL.String(), "application/octet-stream", bytes.NewReader(body))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
|
|
feedManifestAddressHex, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
feedManifestAddress := &storage.Address{}
|
|
err = json.Unmarshal(feedManifestAddressHex, feedManifestAddress)
|
|
if err != nil {
|
|
t.Fatalf("data %s could not be unmarshaled: %v", feedManifestAddressHex, err)
|
|
}
|
|
|
|
correctManifestAddrHex := "747c402e5b9dc715a25a4393147512167bab018a007fad7cdcd9adc7fce1ced2"
|
|
if feedManifestAddress.Hex() != correctManifestAddrHex {
|
|
t.Fatalf("Response feed manifest address mismatch, expected '%s', got '%s'", correctManifestAddrHex, feedManifestAddress.Hex())
|
|
}
|
|
|
|
// get bzz manifest transparent feed update resolve
|
|
getBzzURL := fmt.Sprintf("%s/bzz:/%s", srv.URL, feedManifestAddress)
|
|
resp, err = http.Get(getBzzURL)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
retrievedData, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !bytes.Equal(retrievedData, []byte(dataBytes)) {
|
|
t.Fatalf("retrieved data mismatch, expected %x, got %x", dataBytes, retrievedData)
|
|
}
|
|
}
|
|
|
|
// Test Swarm feeds using the raw update methods
|
|
func TestBzzFeed(t *testing.T) {
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
signer, _ := newTestSigner()
|
|
|
|
defer srv.Close()
|
|
|
|
// data of update 1
|
|
update1Data := testutil.RandomBytes(1, 666)
|
|
update1Timestamp := srv.CurrentTime
|
|
//data for update 2
|
|
update2Data := []byte("foo")
|
|
|
|
topic, _ := feed.NewTopic("foo.eth", nil)
|
|
updateRequest := feed.NewFirstRequest(topic)
|
|
updateRequest.SetData(update1Data)
|
|
|
|
if err := updateRequest.Sign(signer); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// creates feed and sets update 1
|
|
testUrl, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
urlQuery := testUrl.Query()
|
|
body := updateRequest.AppendValues(urlQuery) // this adds all query parameters
|
|
urlQuery.Set("manifest", "1") // indicate we want a manifest back
|
|
testUrl.RawQuery = urlQuery.Encode()
|
|
|
|
resp, err := http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
b, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
rsrcResp := &storage.Address{}
|
|
err = json.Unmarshal(b, rsrcResp)
|
|
if err != nil {
|
|
t.Fatalf("data %s could not be unmarshaled: %v", b, err)
|
|
}
|
|
|
|
correctManifestAddrHex := "bb056a5264c295c2b0f613c8409b9c87ce9d71576ace02458160df4cc894210b"
|
|
if rsrcResp.Hex() != correctManifestAddrHex {
|
|
t.Fatalf("Response feed manifest mismatch, expected '%s', got '%s'", correctManifestAddrHex, rsrcResp.Hex())
|
|
}
|
|
|
|
// get the manifest
|
|
testRawUrl := fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, rsrcResp)
|
|
resp, err = http.Get(testRawUrl)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
b, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
manifest := &api.Manifest{}
|
|
err = json.Unmarshal(b, manifest)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if len(manifest.Entries) != 1 {
|
|
t.Fatalf("Manifest has %d entries", len(manifest.Entries))
|
|
}
|
|
correctFeedHex := "0x666f6f2e65746800000000000000000000000000000000000000000000000000c96aaa54e2d44c299564da76e1cd3184a2386b8d"
|
|
if manifest.Entries[0].Feed.Hex() != correctFeedHex {
|
|
t.Fatalf("Expected manifest Feed '%s', got '%s'", correctFeedHex, manifest.Entries[0].Feed.Hex())
|
|
}
|
|
|
|
// take the chance to have bzz: crash on resolving a feed update that does not contain
|
|
// a swarm hash:
|
|
testBzzUrl := fmt.Sprintf("%s/bzz:/%s", srv.URL, rsrcResp)
|
|
resp, err = http.Get(testBzzUrl)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode == http.StatusOK {
|
|
t.Fatal("Expected error status since feed update does not contain a Swarm hash. Received 200 OK")
|
|
}
|
|
_, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// get non-existent name, should fail
|
|
testBzzResUrl := fmt.Sprintf("%s/bzz-feed:/bar", srv.URL)
|
|
resp, err = http.Get(testBzzResUrl)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusNotFound {
|
|
t.Fatalf("Expected get non-existent feed manifest to fail with StatusNotFound (404), got %d", resp.StatusCode)
|
|
}
|
|
|
|
resp.Body.Close()
|
|
|
|
// get latest update through bzz-feed directly
|
|
log.Info("get update latest = 1.1", "addr", correctManifestAddrHex)
|
|
testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex)
|
|
resp, err = http.Get(testBzzResUrl)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
b, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !bytes.Equal(update1Data, b) {
|
|
t.Fatalf("Expected body '%x', got '%x'", update1Data, b)
|
|
}
|
|
|
|
// update 2
|
|
// Move the clock ahead 1 second
|
|
srv.CurrentTime++
|
|
log.Info("update 2")
|
|
|
|
// 1.- get metadata about this feed
|
|
testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s/", srv.URL, correctManifestAddrHex)
|
|
resp, err = http.Get(testBzzResUrl + "?meta=1")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("Get feed metadata returned %s", resp.Status)
|
|
}
|
|
b, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
updateRequest = &feed.Request{}
|
|
if err = updateRequest.UnmarshalJSON(b); err != nil {
|
|
t.Fatalf("Error decoding feed metadata: %s", err)
|
|
}
|
|
updateRequest.SetData(update2Data)
|
|
if err = updateRequest.Sign(signer); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
testUrl, err = url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
urlQuery = testUrl.Query()
|
|
body = updateRequest.AppendValues(urlQuery) // this adds all query parameters
|
|
goodQueryParameters := urlQuery.Encode() // save the query parameters for a second attempt
|
|
|
|
// create bad query parameters in which the signature is missing
|
|
urlQuery.Del("signature")
|
|
testUrl.RawQuery = urlQuery.Encode()
|
|
|
|
// 1st attempt with bad query parameters in which the signature is missing
|
|
resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
expectedCode := http.StatusBadRequest
|
|
if resp.StatusCode != expectedCode {
|
|
t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
|
|
}
|
|
|
|
// 2nd attempt with bad query parameters in which the signature is of incorrect length
|
|
urlQuery.Set("signature", "0xabcd") // should be 130 hex chars
|
|
resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
expectedCode = http.StatusBadRequest
|
|
if resp.StatusCode != expectedCode {
|
|
t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
|
|
}
|
|
|
|
// 3rd attempt, with good query parameters:
|
|
testUrl.RawQuery = goodQueryParameters
|
|
resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
expectedCode = http.StatusOK
|
|
if resp.StatusCode != expectedCode {
|
|
t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
|
|
}
|
|
|
|
// get latest update through bzz-feed directly
|
|
log.Info("get update 1.2")
|
|
testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex)
|
|
resp, err = http.Get(testBzzResUrl)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
b, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !bytes.Equal(update2Data, b) {
|
|
t.Fatalf("Expected body '%x', got '%x'", update2Data, b)
|
|
}
|
|
|
|
// test manifest-less queries
|
|
log.Info("get first update in update1Timestamp via direct query")
|
|
query := feed.NewQuery(&updateRequest.Feed, update1Timestamp, lookup.NoClue)
|
|
|
|
urlq, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
values := urlq.Query()
|
|
query.AppendValues(values) // this adds feed query parameters
|
|
urlq.RawQuery = values.Encode()
|
|
resp, err = http.Get(urlq.String())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp.Status)
|
|
}
|
|
b, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !bytes.Equal(update1Data, b) {
|
|
t.Fatalf("Expected body '%x', got '%x'", update1Data, b)
|
|
}
|
|
|
|
}
|
|
|
|
func TestBzzGetPath(t *testing.T) {
|
|
testBzzGetPath(false, t)
|
|
testBzzGetPath(true, t)
|
|
}
|
|
|
|
func testBzzGetPath(encrypted bool, t *testing.T) {
|
|
var err error
|
|
|
|
testmanifest := []string{
|
|
`{"entries":[{"path":"b","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"c","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0}]}`,
|
|
`{"entries":[{"path":"a","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"b/","hash":"<key0>","contentType":"application/bzz-manifest+json","status":0}]}`,
|
|
`{"entries":[{"path":"a/","hash":"<key1>","contentType":"application/bzz-manifest+json","status":0}]}`,
|
|
}
|
|
|
|
testrequests := make(map[string]int)
|
|
testrequests["/"] = 2
|
|
testrequests["/a/"] = 1
|
|
testrequests["/a/b/"] = 0
|
|
testrequests["/x"] = 0
|
|
testrequests[""] = 0
|
|
|
|
expectedfailrequests := []string{"", "/x"}
|
|
|
|
reader := [3]*bytes.Reader{}
|
|
|
|
addr := [3]storage.Address{}
|
|
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
|
|
for i, mf := range testmanifest {
|
|
reader[i] = bytes.NewReader([]byte(mf))
|
|
var wait func(context.Context) error
|
|
ctx := context.TODO()
|
|
addr[i], wait, err = srv.FileStore.Store(ctx, reader[i], int64(len(mf)), encrypted)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
for j := i + 1; j < len(testmanifest); j++ {
|
|
testmanifest[j] = strings.Replace(testmanifest[j], fmt.Sprintf("<key%v>", i), addr[i].Hex(), -1)
|
|
}
|
|
err = wait(ctx)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
rootRef := addr[2].Hex()
|
|
|
|
_, err = http.Get(srv.URL + "/bzz-raw:/" + rootRef + "/a")
|
|
if err != nil {
|
|
t.Fatalf("Failed to connect to proxy: %v", err)
|
|
}
|
|
|
|
for k, v := range testrequests {
|
|
var resp *http.Response
|
|
var respbody []byte
|
|
|
|
url := srv.URL + "/bzz-raw:/"
|
|
if k != "" {
|
|
url += rootRef + "/" + k[1:] + "?content_type=text/plain"
|
|
}
|
|
resp, err = http.Get(url)
|
|
if err != nil {
|
|
t.Fatalf("Request failed: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
respbody, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatalf("Error while reading response body: %v", err)
|
|
}
|
|
|
|
if string(respbody) != testmanifest[v] {
|
|
isexpectedfailrequest := false
|
|
|
|
for _, r := range expectedfailrequests {
|
|
if k == r {
|
|
isexpectedfailrequest = true
|
|
}
|
|
}
|
|
if !isexpectedfailrequest {
|
|
t.Fatalf("Response body does not match, expected: %v, got %v", testmanifest[v], string(respbody))
|
|
}
|
|
}
|
|
}
|
|
|
|
for k, v := range testrequests {
|
|
var resp *http.Response
|
|
var respbody []byte
|
|
|
|
url := srv.URL + "/bzz-hash:/"
|
|
if k != "" {
|
|
url += rootRef + "/" + k[1:]
|
|
}
|
|
resp, err = http.Get(url)
|
|
if err != nil {
|
|
t.Fatalf("Request failed: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
respbody, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatalf("Read request body: %v", err)
|
|
}
|
|
|
|
if string(respbody) != addr[v].Hex() {
|
|
isexpectedfailrequest := false
|
|
|
|
for _, r := range expectedfailrequests {
|
|
if k == r {
|
|
isexpectedfailrequest = true
|
|
}
|
|
}
|
|
if !isexpectedfailrequest {
|
|
t.Fatalf("Response body does not match, expected: %v, got %v", addr[v], string(respbody))
|
|
}
|
|
}
|
|
}
|
|
|
|
ref := addr[2].Hex()
|
|
|
|
for _, c := range []struct {
|
|
path string
|
|
json string
|
|
pageFragments []string
|
|
}{
|
|
{
|
|
path: "/",
|
|
json: `{"common_prefixes":["a/"]}`,
|
|
pageFragments: []string{
|
|
fmt.Sprintf("Swarm index of bzz:/%s/", ref),
|
|
`<a class="normal-link" href="a/">a/</a>`,
|
|
},
|
|
},
|
|
{
|
|
path: "/a/",
|
|
json: `{"common_prefixes":["a/b/"],"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/a","mod_time":"0001-01-01T00:00:00Z"}]}`,
|
|
pageFragments: []string{
|
|
fmt.Sprintf("Swarm index of bzz:/%s/a/", ref),
|
|
`<a class="normal-link" href="b/">b/</a>`,
|
|
fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/a">a</a>`, ref),
|
|
},
|
|
},
|
|
{
|
|
path: "/a/b/",
|
|
json: `{"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/b","mod_time":"0001-01-01T00:00:00Z"},{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/c","mod_time":"0001-01-01T00:00:00Z"}]}`,
|
|
pageFragments: []string{
|
|
fmt.Sprintf("Swarm index of bzz:/%s/a/b/", ref),
|
|
fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/b">b</a>`, ref),
|
|
fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/c">c</a>`, ref),
|
|
},
|
|
},
|
|
{
|
|
path: "/x",
|
|
},
|
|
{
|
|
path: "",
|
|
},
|
|
} {
|
|
k := c.path
|
|
url := srv.URL + "/bzz-list:/"
|
|
if k != "" {
|
|
url += rootRef + "/" + k[1:]
|
|
}
|
|
t.Run("json list "+c.path, func(t *testing.T) {
|
|
resp, err := http.Get(url)
|
|
if err != nil {
|
|
t.Fatalf("HTTP request: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
respbody, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatalf("Read response body: %v", err)
|
|
}
|
|
|
|
body := strings.TrimSpace(string(respbody))
|
|
if body != c.json {
|
|
isexpectedfailrequest := false
|
|
|
|
for _, r := range expectedfailrequests {
|
|
if k == r {
|
|
isexpectedfailrequest = true
|
|
}
|
|
}
|
|
if !isexpectedfailrequest {
|
|
t.Errorf("Response list body %q does not match, expected: %v, got %v", k, c.json, body)
|
|
}
|
|
}
|
|
})
|
|
t.Run("html list "+c.path, func(t *testing.T) {
|
|
req, err := http.NewRequest(http.MethodGet, url, nil)
|
|
if err != nil {
|
|
t.Fatalf("New request: %v", err)
|
|
}
|
|
req.Header.Set("Accept", "text/html")
|
|
resp, err := http.DefaultClient.Do(req)
|
|
if err != nil {
|
|
t.Fatalf("HTTP request: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
b, err := ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatalf("Read response body: %v", err)
|
|
}
|
|
|
|
body := string(b)
|
|
|
|
for _, f := range c.pageFragments {
|
|
if !strings.Contains(body, f) {
|
|
isexpectedfailrequest := false
|
|
|
|
for _, r := range expectedfailrequests {
|
|
if k == r {
|
|
isexpectedfailrequest = true
|
|
}
|
|
}
|
|
if !isexpectedfailrequest {
|
|
t.Errorf("Response list body %q does not contain %q: body %q", k, f, body)
|
|
}
|
|
}
|
|
}
|
|
})
|
|
}
|
|
|
|
nonhashtests := []string{
|
|
srv.URL + "/bzz:/name",
|
|
srv.URL + "/bzz-immutable:/nonhash",
|
|
srv.URL + "/bzz-raw:/nonhash",
|
|
srv.URL + "/bzz-list:/nonhash",
|
|
srv.URL + "/bzz-hash:/nonhash",
|
|
}
|
|
|
|
nonhashresponses := []string{
|
|
`cannot resolve name: no DNS to resolve name: "name"`,
|
|
`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
|
|
`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
|
|
`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
|
|
`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
|
|
}
|
|
|
|
for i, url := range nonhashtests {
|
|
var resp *http.Response
|
|
var respbody []byte
|
|
|
|
resp, err = http.Get(url)
|
|
|
|
if err != nil {
|
|
t.Fatalf("Request failed: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
respbody, err = ioutil.ReadAll(resp.Body)
|
|
if err != nil {
|
|
t.Fatalf("ReadAll failed: %v", err)
|
|
}
|
|
if !strings.Contains(string(respbody), nonhashresponses[i]) {
|
|
t.Fatalf("Non-Hash response body does not match, expected: %v, got: %v", nonhashresponses[i], string(respbody))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestBzzTar(t *testing.T) {
|
|
testBzzTar(false, t)
|
|
testBzzTar(true, t)
|
|
}
|
|
|
|
func testBzzTar(encrypted bool, t *testing.T) {
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
fileNames := []string{"tmp1.txt", "tmp2.lock", "tmp3.rtf"}
|
|
fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"}
|
|
|
|
buf := &bytes.Buffer{}
|
|
tw := tar.NewWriter(buf)
|
|
defer tw.Close()
|
|
|
|
for i, v := range fileNames {
|
|
size := int64(len(fileContents[i]))
|
|
hdr := &tar.Header{
|
|
Name: v,
|
|
Mode: 0644,
|
|
Size: size,
|
|
ModTime: time.Now(),
|
|
Xattrs: map[string]string{
|
|
"user.swarm.content-type": "text/plain",
|
|
},
|
|
}
|
|
if err := tw.WriteHeader(hdr); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// copy the file into the tar stream
|
|
n, err := io.Copy(tw, bytes.NewBufferString(fileContents[i]))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
} else if n != size {
|
|
t.Fatal("size mismatch")
|
|
}
|
|
}
|
|
|
|
//post tar stream
|
|
url := srv.URL + "/bzz:/"
|
|
if encrypted {
|
|
url = url + "encrypt"
|
|
}
|
|
req, err := http.NewRequest("POST", url, buf)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
req.Header.Add("Content-Type", "application/x-tar")
|
|
req.Header.Add(SwarmTagHeaderName, "test-upload")
|
|
client := &http.Client{}
|
|
resp2, err := client.Do(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp2.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", resp2.Status)
|
|
}
|
|
|
|
// check that the tag was written correctly
|
|
tag := srv.Tags.All()[0]
|
|
testutil.CheckTag(t, tag, 4, 4, 0, 4)
|
|
|
|
swarmHash, err := ioutil.ReadAll(resp2.Body)
|
|
resp2.Body.Close()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// now do a GET to get a tarball back
|
|
req, err = http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s", string(swarmHash)), nil)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
req.Header.Add("Accept", "application/x-tar")
|
|
resp2, err = client.Do(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer resp2.Body.Close()
|
|
|
|
if h := resp2.Header.Get("Content-Type"); h != "application/x-tar" {
|
|
t.Fatalf("Content-Type header expected: application/x-tar, got: %s", h)
|
|
}
|
|
|
|
expectedFileName := string(swarmHash) + ".tar"
|
|
expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", expectedFileName)
|
|
if h := resp2.Header.Get("Content-Disposition"); h != expectedContentDisposition {
|
|
t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h)
|
|
}
|
|
|
|
file, err := ioutil.TempFile("", "swarm-downloaded-tarball")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer os.Remove(file.Name())
|
|
_, err = io.Copy(file, resp2.Body)
|
|
if err != nil {
|
|
t.Fatalf("error getting tarball: %v", err)
|
|
}
|
|
file.Sync()
|
|
file.Close()
|
|
|
|
tarFileHandle, err := os.Open(file.Name())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tr := tar.NewReader(tarFileHandle)
|
|
|
|
for {
|
|
hdr, err := tr.Next()
|
|
if err == io.EOF {
|
|
break
|
|
} else if err != nil {
|
|
t.Fatalf("error reading tar stream: %s", err)
|
|
}
|
|
bb := make([]byte, hdr.Size)
|
|
_, err = tr.Read(bb)
|
|
if err != nil && err != io.EOF {
|
|
t.Fatal(err)
|
|
}
|
|
passed := false
|
|
for i, v := range fileNames {
|
|
if v == hdr.Name {
|
|
if string(bb) == fileContents[i] {
|
|
passed = true
|
|
break
|
|
}
|
|
}
|
|
}
|
|
if !passed {
|
|
t.Fatalf("file %s did not pass content assertion", hdr.Name)
|
|
}
|
|
}
|
|
|
|
// now check the tags endpoint
|
|
}
|
|
|
|
// TestBzzCorrectTagEstimate checks that the HTTP middleware sets the total number of chunks
|
|
// in the tag according to an estimate from the HTTP request Content-Length header divided
|
|
// by chunk size (4096). It is needed to be checked BEFORE chunking is done, therefore
|
|
// concurrency was introduced to slow down the HTTP request
|
|
func TestBzzCorrectTagEstimate(t *testing.T) {
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
|
|
for _, v := range []struct {
|
|
toEncrypt bool
|
|
expChunks int64
|
|
}{
|
|
{toEncrypt: false, expChunks: 248},
|
|
{toEncrypt: true, expChunks: 250},
|
|
} {
|
|
pr, pw := io.Pipe()
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
addr := ""
|
|
if v.toEncrypt {
|
|
addr = "encrypt"
|
|
}
|
|
req, err := http.NewRequest("POST", srv.URL+"/bzz:/"+addr, pr)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req = req.WithContext(ctx)
|
|
req.ContentLength = 1000000
|
|
req.Header.Add(SwarmTagHeaderName, "1000000")
|
|
|
|
go func() {
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
return
|
|
case <-time.After(1 * time.Millisecond):
|
|
_, err := pw.Write([]byte{0})
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
}
|
|
}()
|
|
go func() {
|
|
transport := http.DefaultTransport
|
|
_, err := transport.RoundTrip(req)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
}()
|
|
done := false
|
|
for !done {
|
|
switch len(srv.Tags.All()) {
|
|
case 0:
|
|
<-time.After(10 * time.Millisecond)
|
|
case 1:
|
|
tag := srv.Tags.All()[0]
|
|
testutil.CheckTag(t, tag, 0, 0, 0, v.expChunks)
|
|
srv.Tags.Delete(tag.Uid)
|
|
done = true
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestBzzRootRedirect tests that getting the root path of a manifest without
|
|
// a trailing slash gets redirected to include the trailing slash so that
|
|
// relative URLs work as expected.
|
|
func TestBzzRootRedirect(t *testing.T) {
|
|
testBzzRootRedirect(false, t)
|
|
}
|
|
func TestBzzRootRedirectEncrypted(t *testing.T) {
|
|
testBzzRootRedirect(true, t)
|
|
}
|
|
|
|
func testBzzRootRedirect(toEncrypt bool, t *testing.T) {
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
|
|
// create a manifest with some data at the root path
|
|
data := []byte("data")
|
|
headers := map[string]string{"Content-Type": "text/plain"}
|
|
res, hash := httpDo("POST", srv.URL+"/bzz:/", bytes.NewReader(data), headers, false, t)
|
|
if res.StatusCode != http.StatusOK {
|
|
t.Fatalf("unexpected status code from server %d want %d", res.StatusCode, http.StatusOK)
|
|
}
|
|
|
|
// define a CheckRedirect hook which ensures there is only a single
|
|
// redirect to the correct URL
|
|
redirected := false
|
|
httpClient := http.Client{
|
|
CheckRedirect: func(req *http.Request, via []*http.Request) error {
|
|
if redirected {
|
|
return errors.New("too many redirects")
|
|
}
|
|
redirected = true
|
|
expectedPath := "/bzz:/" + hash + "/"
|
|
if req.URL.Path != expectedPath {
|
|
return fmt.Errorf("expected redirect to %q, got %q", expectedPath, req.URL.Path)
|
|
}
|
|
return nil
|
|
},
|
|
}
|
|
|
|
// perform the GET request and assert the response
|
|
res, err := httpClient.Get(srv.URL + "/bzz:/" + hash)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer res.Body.Close()
|
|
if !redirected {
|
|
t.Fatal("expected GET /bzz:/<hash> to redirect to /bzz:/<hash>/ but it didn't")
|
|
}
|
|
gotData, err := ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !bytes.Equal(gotData, data) {
|
|
t.Fatalf("expected response to equal %q, got %q", data, gotData)
|
|
}
|
|
}
|
|
|
|
func TestMethodsNotAllowed(t *testing.T) {
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
databytes := "bar"
|
|
for _, c := range []struct {
|
|
url string
|
|
code int
|
|
}{
|
|
{
|
|
url: fmt.Sprintf("%s/bzz-list:/", srv.URL),
|
|
code: http.StatusMethodNotAllowed,
|
|
}, {
|
|
url: fmt.Sprintf("%s/bzz-hash:/", srv.URL),
|
|
code: http.StatusMethodNotAllowed,
|
|
},
|
|
{
|
|
url: fmt.Sprintf("%s/bzz-immutable:/", srv.URL),
|
|
code: http.StatusMethodNotAllowed,
|
|
},
|
|
} {
|
|
res, _ := http.Post(c.url, "text/plain", bytes.NewReader([]byte(databytes)))
|
|
if res.StatusCode != c.code {
|
|
t.Fatalf("should have failed. requested url: %s, expected code %d, got %d", c.url, c.code, res.StatusCode)
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func httpDo(httpMethod string, url string, reqBody io.Reader, headers map[string]string, verbose bool, t *testing.T) (*http.Response, string) {
|
|
// Build the Request
|
|
req, err := http.NewRequest(httpMethod, url, reqBody)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
for key, value := range headers {
|
|
req.Header.Set(key, value)
|
|
}
|
|
if verbose {
|
|
t.Log(req.Method, req.URL, req.Header, req.Body)
|
|
}
|
|
|
|
// Send Request out
|
|
httpClient := &http.Client{}
|
|
res, err := httpClient.Do(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Read the HTTP Body
|
|
buffer, err := ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer res.Body.Close()
|
|
body := string(buffer)
|
|
|
|
return res, body
|
|
}
|
|
|
|
func TestGet(t *testing.T) {
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
|
|
for _, testCase := range []struct {
|
|
uri string
|
|
method string
|
|
headers map[string]string
|
|
expectedStatusCode int
|
|
assertResponseBody string
|
|
verbose bool
|
|
}{
|
|
{
|
|
uri: fmt.Sprintf("%s/", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{"Accept": "text/html"},
|
|
expectedStatusCode: http.StatusOK,
|
|
assertResponseBody: "Swarm: Serverless Hosting Incentivised Peer-To-Peer Storage And Content Distribution",
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{"Accept": "application/json"},
|
|
expectedStatusCode: http.StatusOK,
|
|
assertResponseBody: "Swarm: Please request a valid ENS or swarm hash with the appropriate bzz scheme",
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/robots.txt", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{"Accept": "text/html"},
|
|
expectedStatusCode: http.StatusOK,
|
|
assertResponseBody: "User-agent: *\nDisallow: /",
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/nonexistent_path", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusNotFound,
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz:asdf/", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusNotFound,
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/tbz2/", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusNotFound,
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz-rack:/", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusNotFound,
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz-ls", srv.URL),
|
|
method: "GET",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusNotFound,
|
|
verbose: false,
|
|
}} {
|
|
t.Run("GET "+testCase.uri, func(t *testing.T) {
|
|
res, body := httpDo(testCase.method, testCase.uri, nil, testCase.headers, testCase.verbose, t)
|
|
if res.StatusCode != testCase.expectedStatusCode {
|
|
t.Fatalf("expected status code %d but got %d", testCase.expectedStatusCode, res.StatusCode)
|
|
}
|
|
if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) {
|
|
t.Fatalf("expected response to be: %s but got: %s", testCase.assertResponseBody, body)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestModify(t *testing.T) {
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
headers := map[string]string{"Content-Type": "text/plain"}
|
|
res, hash := httpDo("POST", srv.URL+"/bzz:/", bytes.NewReader([]byte("data")), headers, false, t)
|
|
if res.StatusCode != http.StatusOK {
|
|
t.Fatalf("unexpected status code from server %d want %d", res.StatusCode, http.StatusOK)
|
|
}
|
|
|
|
for _, testCase := range []struct {
|
|
uri string
|
|
method string
|
|
headers map[string]string
|
|
requestBody []byte
|
|
expectedStatusCode int
|
|
assertResponseBody string
|
|
assertResponseHeaders map[string]string
|
|
verbose bool
|
|
}{
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
|
|
method: "DELETE",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusOK,
|
|
assertResponseBody: "8b634aea26eec353ac0ecbec20c94f44d6f8d11f38d4578a4c207a84c74ef731",
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
|
|
method: "PUT",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusMethodNotAllowed,
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, hash),
|
|
method: "PUT",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusMethodNotAllowed,
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
|
|
method: "PATCH",
|
|
headers: map[string]string{},
|
|
expectedStatusCode: http.StatusMethodNotAllowed,
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz-raw:/", srv.URL),
|
|
method: "POST",
|
|
headers: map[string]string{},
|
|
requestBody: []byte("POSTdata"),
|
|
expectedStatusCode: http.StatusOK,
|
|
assertResponseHeaders: map[string]string{"Content-Length": "64"},
|
|
verbose: false,
|
|
},
|
|
{
|
|
uri: fmt.Sprintf("%s/bzz-raw:/encrypt", srv.URL),
|
|
method: "POST",
|
|
headers: map[string]string{},
|
|
requestBody: []byte("POSTdata"),
|
|
expectedStatusCode: http.StatusOK,
|
|
assertResponseHeaders: map[string]string{"Content-Length": "128"},
|
|
verbose: false,
|
|
},
|
|
} {
|
|
t.Run(testCase.method+" "+testCase.uri, func(t *testing.T) {
|
|
reqBody := bytes.NewReader(testCase.requestBody)
|
|
res, body := httpDo(testCase.method, testCase.uri, reqBody, testCase.headers, testCase.verbose, t)
|
|
|
|
if res.StatusCode != testCase.expectedStatusCode {
|
|
t.Fatalf("expected status code %d but got %d, %s", testCase.expectedStatusCode, res.StatusCode, body)
|
|
}
|
|
if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) {
|
|
t.Log(body)
|
|
t.Fatalf("expected response %s but got %s", testCase.assertResponseBody, body)
|
|
}
|
|
for key, value := range testCase.assertResponseHeaders {
|
|
if res.Header.Get(key) != value {
|
|
t.Logf("expected %s=%s in HTTP response header but got %s", key, value, res.Header.Get(key))
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestMultiPartUpload(t *testing.T) {
|
|
// POST /bzz:/ Content-Type: multipart/form-data
|
|
verbose := false
|
|
// Setup Swarm
|
|
srv := NewTestSwarmServer(t, serverFunc, nil)
|
|
defer srv.Close()
|
|
|
|
url := fmt.Sprintf("%s/bzz:/", srv.URL)
|
|
|
|
buf := new(bytes.Buffer)
|
|
form := multipart.NewWriter(buf)
|
|
form.WriteField("name", "John Doe")
|
|
file1, _ := form.CreateFormFile("cv", "cv.txt")
|
|
file1.Write([]byte("John Doe's Credentials"))
|
|
file2, _ := form.CreateFormFile("profile_picture", "profile.jpg")
|
|
file2.Write([]byte("imaginethisisjpegdata"))
|
|
form.Close()
|
|
|
|
headers := map[string]string{
|
|
"Content-Type": form.FormDataContentType(),
|
|
"Content-Length": strconv.Itoa(buf.Len()),
|
|
}
|
|
res, body := httpDo("POST", url, buf, headers, verbose, t)
|
|
|
|
if res.StatusCode != http.StatusOK {
|
|
t.Fatalf("expected POST multipart/form-data to return 200, but it returned %d", res.StatusCode)
|
|
}
|
|
if len(body) != 64 {
|
|
t.Fatalf("expected POST multipart/form-data to return a 64 char manifest but the answer was %d chars long", len(body))
|
|
}
|
|
}
|
|
|
|
// TestBzzGetFileWithResolver tests fetching a file using a mocked ENS resolver
|
|
func TestBzzGetFileWithResolver(t *testing.T) {
|
|
resolver := newTestResolveValidator("")
|
|
srv := NewTestSwarmServer(t, serverFunc, resolver)
|
|
defer srv.Close()
|
|
fileNames := []string{"dir1/tmp1.txt", "dir2/tmp2.lock", "dir3/tmp3.rtf"}
|
|
fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"}
|
|
|
|
buf := &bytes.Buffer{}
|
|
tw := tar.NewWriter(buf)
|
|
|
|
for i, v := range fileNames {
|
|
size := len(fileContents[i])
|
|
hdr := &tar.Header{
|
|
Name: v,
|
|
Mode: 0644,
|
|
Size: int64(size),
|
|
ModTime: time.Now(),
|
|
Xattrs: map[string]string{
|
|
"user.swarm.content-type": "text/plain",
|
|
},
|
|
}
|
|
if err := tw.WriteHeader(hdr); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// copy the file into the tar stream
|
|
n, err := io.WriteString(tw, fileContents[i])
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
} else if n != size {
|
|
t.Fatal("size mismatch")
|
|
}
|
|
}
|
|
|
|
if err := tw.Close(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
//post tar stream
|
|
url := srv.URL + "/bzz:/"
|
|
|
|
req, err := http.NewRequest("POST", url, buf)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
req.Header.Add("Content-Type", "application/x-tar")
|
|
client := &http.Client{}
|
|
serverResponse, err := client.Do(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if serverResponse.StatusCode != http.StatusOK {
|
|
t.Fatalf("err %s", serverResponse.Status)
|
|
}
|
|
swarmHash, err := ioutil.ReadAll(serverResponse.Body)
|
|
serverResponse.Body.Close()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
// set the resolved hash to be the swarm hash of what we've just uploaded
|
|
hash := common.HexToHash(string(swarmHash))
|
|
resolver.hash = &hash
|
|
for _, v := range []struct {
|
|
addr string
|
|
path string
|
|
expectedStatusCode int
|
|
expectedContentType string
|
|
expectedFileName string
|
|
}{
|
|
{
|
|
addr: string(swarmHash),
|
|
path: fileNames[0],
|
|
expectedStatusCode: http.StatusOK,
|
|
expectedContentType: "text/plain",
|
|
expectedFileName: path.Base(fileNames[0]),
|
|
},
|
|
{
|
|
addr: "somebogusensname",
|
|
path: fileNames[0],
|
|
expectedStatusCode: http.StatusOK,
|
|
expectedContentType: "text/plain",
|
|
expectedFileName: path.Base(fileNames[0]),
|
|
},
|
|
} {
|
|
req, err := http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s/%s", v.addr, v.path), nil)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
serverResponse, err := client.Do(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer serverResponse.Body.Close()
|
|
if serverResponse.StatusCode != v.expectedStatusCode {
|
|
t.Fatalf("expected %d, got %d", v.expectedStatusCode, serverResponse.StatusCode)
|
|
}
|
|
|
|
if h := serverResponse.Header.Get("Content-Type"); h != v.expectedContentType {
|
|
t.Fatalf("Content-Type header expected: %s, got %s", v.expectedContentType, h)
|
|
}
|
|
|
|
expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", v.expectedFileName)
|
|
if h := serverResponse.Header.Get("Content-Disposition"); h != expectedContentDisposition {
|
|
t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h)
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
// TestCalculateNumberOfChunks is a unit test for the chunk-number-according-to-content-length
|
|
// calculation
|
|
func TestCalculateNumberOfChunks(t *testing.T) {
|
|
|
|
//test cases:
|
|
for _, tc := range []struct{ len, chunks int64 }{
|
|
{len: 1000, chunks: 1},
|
|
{len: 5000, chunks: 3},
|
|
{len: 10000, chunks: 4},
|
|
{len: 100000, chunks: 26},
|
|
{len: 1000000, chunks: 248},
|
|
{len: 325839339210, chunks: 79550620 + 621490 + 4856 + 38 + 1},
|
|
} {
|
|
res := calculateNumberOfChunks(tc.len, false)
|
|
if res != tc.chunks {
|
|
t.Fatalf("expected result for %d bytes to be %d got %d", tc.len, tc.chunks, res)
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestCalculateNumberOfChunksEncrypted is a unit test for the chunk-number-according-to-content-length
|
|
// calculation with encryption (branching factor=64)
|
|
func TestCalculateNumberOfChunksEncrypted(t *testing.T) {
|
|
|
|
//test cases:
|
|
for _, tc := range []struct{ len, chunks int64 }{
|
|
{len: 1000, chunks: 1},
|
|
{len: 5000, chunks: 3},
|
|
{len: 10000, chunks: 4},
|
|
{len: 100000, chunks: 26},
|
|
{len: 1000000, chunks: 245 + 4 + 1},
|
|
{len: 325839339210, chunks: 79550620 + 1242979 + 19422 + 304 + 5 + 1},
|
|
} {
|
|
res := calculateNumberOfChunks(tc.len, true)
|
|
if res != tc.chunks {
|
|
t.Fatalf("expected result for %d bytes to be %d got %d", tc.len, tc.chunks, res)
|
|
}
|
|
}
|
|
}
|
|
|
|
// testResolver implements the Resolver interface and either returns the given
|
|
// hash if it is set, or returns a "name not found" error
|
|
type testResolveValidator struct {
|
|
hash *common.Hash
|
|
}
|
|
|
|
func newTestResolveValidator(addr string) *testResolveValidator {
|
|
r := &testResolveValidator{}
|
|
if addr != "" {
|
|
hash := common.HexToHash(addr)
|
|
r.hash = &hash
|
|
}
|
|
return r
|
|
}
|
|
|
|
func (t *testResolveValidator) Resolve(addr string) (common.Hash, error) {
|
|
if t.hash == nil {
|
|
return common.Hash{}, fmt.Errorf("DNS name not found: %q", addr)
|
|
}
|
|
return *t.hash, nil
|
|
}
|
|
|
|
func (t *testResolveValidator) Owner(node [32]byte) (addr common.Address, err error) {
|
|
return
|
|
}
|
|
|
|
func (t *testResolveValidator) HeaderByNumber(context.Context, *big.Int) (header *types.Header, err error) {
|
|
return
|
|
}
|