mirror of
https://gitlab.com/pulsechaincom/erigon-pulse.git
synced 2024-12-23 12:07:17 +00:00
170 lines
5.3 KiB
Go
170 lines
5.3 KiB
Go
// Copyright 2020 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package node
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/ledgerwatch/turbo-geth/internal/testlog"
|
|
"github.com/ledgerwatch/turbo-geth/log"
|
|
"github.com/ledgerwatch/turbo-geth/rpc"
|
|
|
|
"github.com/gorilla/websocket"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
// TestCorsHandler makes sure CORS are properly handled on the http server.
|
|
func TestCorsHandler(t *testing.T) {
|
|
srv := createAndStartServer(t, httpConfig{CorsAllowedOrigins: []string{"test", "test.com"}}, false, wsConfig{})
|
|
defer srv.stop()
|
|
|
|
resp := testRequest(t, "origin", "test.com", "", srv)
|
|
assert.Equal(t, "test.com", resp.Header.Get("Access-Control-Allow-Origin"))
|
|
|
|
resp2 := testRequest(t, "origin", "bad", "", srv)
|
|
assert.Equal(t, "", resp2.Header.Get("Access-Control-Allow-Origin"))
|
|
}
|
|
|
|
// TestVhosts makes sure vhosts are properly handled on the http server.
|
|
func TestVhosts(t *testing.T) {
|
|
srv := createAndStartServer(t, httpConfig{Vhosts: []string{"test"}}, false, wsConfig{})
|
|
defer srv.stop()
|
|
|
|
resp := testRequest(t, "", "", "test", srv)
|
|
assert.Equal(t, resp.StatusCode, http.StatusOK)
|
|
|
|
resp2 := testRequest(t, "", "", "bad", srv)
|
|
assert.Equal(t, resp2.StatusCode, http.StatusForbidden)
|
|
}
|
|
|
|
// TestWebsocketOrigins makes sure the websocket origins are properly handled on the websocket server.
|
|
func TestWebsocketOrigins(t *testing.T) {
|
|
srv := createAndStartServer(t, httpConfig{}, true, wsConfig{Origins: []string{"test"}})
|
|
defer srv.stop()
|
|
|
|
dialer := websocket.DefaultDialer
|
|
_, _, err := dialer.Dial("ws://"+srv.listenAddr(), http.Header{
|
|
"Content-type": []string{"application/json"},
|
|
"Sec-WebSocket-Version": []string{"13"},
|
|
"Origin": []string{"test"},
|
|
})
|
|
assert.NoError(t, err)
|
|
|
|
_, _, err = dialer.Dial("ws://"+srv.listenAddr(), http.Header{
|
|
"Content-type": []string{"application/json"},
|
|
"Sec-WebSocket-Version": []string{"13"},
|
|
"Origin": []string{"bad"},
|
|
})
|
|
assert.Error(t, err)
|
|
}
|
|
|
|
// TestIsWebsocket tests if an incoming websocket upgrade request is handled properly.
|
|
func TestIsWebsocket(t *testing.T) {
|
|
r, _ := http.NewRequest("GET", "/", nil)
|
|
|
|
assert.False(t, isWebsocket(r))
|
|
r.Header.Set("upgrade", "websocket")
|
|
assert.False(t, isWebsocket(r))
|
|
r.Header.Set("connection", "upgrade")
|
|
assert.True(t, isWebsocket(r))
|
|
r.Header.Set("connection", "upgrade,keep-alive")
|
|
assert.True(t, isWebsocket(r))
|
|
r.Header.Set("connection", " UPGRADE,keep-alive")
|
|
assert.True(t, isWebsocket(r))
|
|
}
|
|
|
|
func createAndStartServerWithAllowList(t *testing.T, conf httpConfig, ws bool, wsConf wsConfig) *httpServer {
|
|
t.Helper()
|
|
|
|
srv := newHTTPServer(testlog.Logger(t, log.LvlDebug), rpc.DefaultHTTPTimeouts)
|
|
|
|
allowList := rpc.AllowList(map[string]struct{}{"net_version": {}}) //don't allow RPC modules
|
|
|
|
assert.NoError(t, srv.enableRPC(nil, conf, allowList))
|
|
if ws {
|
|
assert.NoError(t, srv.enableWS(nil, wsConf, allowList))
|
|
}
|
|
assert.NoError(t, srv.setListenAddr("localhost", 0))
|
|
assert.NoError(t, srv.start())
|
|
|
|
return srv
|
|
}
|
|
|
|
func createAndStartServer(t *testing.T, conf httpConfig, ws bool, wsConf wsConfig) *httpServer {
|
|
t.Helper()
|
|
|
|
srv := newHTTPServer(testlog.Logger(t, log.LvlDebug), rpc.DefaultHTTPTimeouts)
|
|
|
|
assert.NoError(t, srv.enableRPC(nil, conf, nil))
|
|
if ws {
|
|
assert.NoError(t, srv.enableWS(nil, wsConf, nil))
|
|
}
|
|
assert.NoError(t, srv.setListenAddr("localhost", 0))
|
|
assert.NoError(t, srv.start())
|
|
|
|
return srv
|
|
}
|
|
|
|
func TestAllowList(t *testing.T) {
|
|
srv := createAndStartServerWithAllowList(t, httpConfig{}, false, wsConfig{})
|
|
defer srv.stop()
|
|
|
|
assert.False(t, testCustomRequest(t, srv, "rpc_modules"))
|
|
}
|
|
|
|
func testCustomRequest(t *testing.T, srv *httpServer, method string) bool {
|
|
body := bytes.NewReader([]byte(fmt.Sprintf(`{"jsonrpc":"2.0","id":1,"method":"%s"}`, method)))
|
|
req, _ := http.NewRequest("POST", "http://"+srv.listenAddr(), body)
|
|
req.Header.Set("content-type", "application/json")
|
|
|
|
client := http.DefaultClient
|
|
resp, err := client.Do(req)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
respBody, err := ioutil.ReadAll(resp.Body)
|
|
assert.NoError(t, err)
|
|
|
|
return !strings.Contains(string(respBody), "error")
|
|
}
|
|
|
|
func testRequest(t *testing.T, key, value, host string, srv *httpServer) *http.Response {
|
|
t.Helper()
|
|
|
|
body := bytes.NewReader([]byte(`{"jsonrpc":"2.0","id":1,"method":"rpc_modules"}`))
|
|
req, _ := http.NewRequest("POST", "http://"+srv.listenAddr(), body)
|
|
req.Header.Set("content-type", "application/json")
|
|
if key != "" && value != "" {
|
|
req.Header.Set(key, value)
|
|
}
|
|
if host != "" {
|
|
req.Host = host
|
|
}
|
|
|
|
client := http.DefaultClient
|
|
resp, err := client.Do(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
return resp
|
|
}
|