github.com/Blockdaemon/celo-blockchain@v0.0.0-20200129231733-e667f6b08419/swarm/api/http/server_test.go (about) 1 // Copyright 2017 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package http 18 19 import ( 20 "archive/tar" 21 "bytes" 22 "context" 23 "encoding/json" 24 "errors" 25 "flag" 26 "fmt" 27 "io" 28 "io/ioutil" 29 "math/big" 30 "mime/multipart" 31 "net/http" 32 "net/url" 33 "os" 34 "path" 35 "strconv" 36 "strings" 37 "testing" 38 "time" 39 40 "github.com/ethereum/go-ethereum/common" 41 "github.com/ethereum/go-ethereum/core/types" 42 "github.com/ethereum/go-ethereum/crypto" 43 "github.com/ethereum/go-ethereum/log" 44 "github.com/ethereum/go-ethereum/swarm/api" 45 swarm "github.com/ethereum/go-ethereum/swarm/api/client" 46 "github.com/ethereum/go-ethereum/swarm/storage" 47 "github.com/ethereum/go-ethereum/swarm/storage/feed" 48 "github.com/ethereum/go-ethereum/swarm/storage/feed/lookup" 49 "github.com/ethereum/go-ethereum/swarm/testutil" 50 ) 51 52 func init() { 53 loglevel := flag.Int("loglevel", 2, "loglevel") 54 flag.Parse() 55 log.Root().SetHandler(log.CallerFileHandler(log.LvlFilterHandler(log.Lvl(*loglevel), log.StreamHandler(os.Stderr, log.TerminalFormat(true))))) 56 } 57 58 func serverFunc(api *api.API) TestServer { 59 return NewServer(api, "") 60 } 61 62 func newTestSigner() (*feed.GenericSigner, error) { 63 privKey, err := crypto.HexToECDSA("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef") 64 if err != nil { 65 return nil, err 66 } 67 return feed.NewGenericSigner(privKey), nil 68 } 69 70 // Test the transparent resolving of feed updates with bzz:// scheme 71 // 72 // First upload data to bzz:, and store the Swarm hash to the resulting manifest in a feed update. 73 // This effectively uses a feed to store a pointer to content rather than the content itself 74 // Retrieving the update with the Swarm hash should return the manifest pointing directly to the data 75 // and raw retrieve of that hash should return the data 76 func TestBzzWithFeed(t *testing.T) { 77 78 signer, _ := newTestSigner() 79 80 // Initialize Swarm test server 81 srv := NewTestSwarmServer(t, serverFunc, nil) 82 defer srv.Close() 83 84 // put together some data for our test: 85 dataBytes := []byte(` 86 // 87 // Create some data our manifest will point to. Data that could be very big and wouldn't fit in a feed update. 88 // So what we are going to do is upload it to Swarm bzz:// and obtain a **manifest hash** pointing to it: 89 // 90 // MANIFEST HASH --> DATA 91 // 92 // Then, we store that **manifest hash** into a Swarm Feed update. Once we have done this, 93 // we can use the **feed manifest hash** in bzz:// instead, this way: bzz://feed-manifest-hash. 94 // 95 // FEED MANIFEST HASH --> MANIFEST HASH --> DATA 96 // 97 // Given that we can update the feed at any time with a new **manifest hash** but the **feed manifest hash** 98 // stays constant, we have effectively created a fixed address to changing content. (Applause) 99 // 100 // FEED MANIFEST HASH (the same) --> MANIFEST HASH(2) --> DATA(2) ... 101 // 102 `) 103 104 // POST data to bzz and get back a content-addressed **manifest hash** pointing to it. 105 resp, err := http.Post(fmt.Sprintf("%s/bzz:/", srv.URL), "text/plain", bytes.NewReader([]byte(dataBytes))) 106 if err != nil { 107 t.Fatal(err) 108 } 109 110 defer resp.Body.Close() 111 if resp.StatusCode != http.StatusOK { 112 t.Fatalf("err %s", resp.Status) 113 } 114 manifestAddressHex, err := ioutil.ReadAll(resp.Body) 115 116 if err != nil { 117 t.Fatal(err) 118 } 119 120 manifestAddress := common.FromHex(string(manifestAddressHex)) 121 122 log.Info("added data", "manifest", string(manifestAddressHex)) 123 124 // At this point we have uploaded the data and have a manifest pointing to it 125 // Now store that manifest address in a feed update. 126 // We also want a feed manifest, so we can use it to refer to the feed. 127 128 // First, create a topic for our feed: 129 topic, _ := feed.NewTopic("interesting topic indeed", nil) 130 131 // Create a feed update request: 132 updateRequest := feed.NewFirstRequest(topic) 133 134 // Store the **manifest address** as data into the feed update. 135 updateRequest.SetData(manifestAddress) 136 137 // Sign the update 138 if err := updateRequest.Sign(signer); err != nil { 139 t.Fatal(err) 140 } 141 log.Info("added data", "data", common.ToHex(manifestAddress)) 142 143 // Build the feed update http request: 144 feedUpdateURL, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 145 if err != nil { 146 t.Fatal(err) 147 } 148 query := feedUpdateURL.Query() 149 body := updateRequest.AppendValues(query) // this adds all query parameters and returns the data to be posted 150 query.Set("manifest", "1") // indicate we want a feed manifest back 151 feedUpdateURL.RawQuery = query.Encode() 152 153 // submit the feed update request to Swarm 154 resp, err = http.Post(feedUpdateURL.String(), "application/octet-stream", bytes.NewReader(body)) 155 if err != nil { 156 t.Fatal(err) 157 } 158 defer resp.Body.Close() 159 if resp.StatusCode != http.StatusOK { 160 t.Fatalf("err %s", resp.Status) 161 } 162 163 feedManifestAddressHex, err := ioutil.ReadAll(resp.Body) 164 if err != nil { 165 t.Fatal(err) 166 } 167 feedManifestAddress := &storage.Address{} 168 err = json.Unmarshal(feedManifestAddressHex, feedManifestAddress) 169 if err != nil { 170 t.Fatalf("data %s could not be unmarshaled: %v", feedManifestAddressHex, err) 171 } 172 173 correctManifestAddrHex := "747c402e5b9dc715a25a4393147512167bab018a007fad7cdcd9adc7fce1ced2" 174 if feedManifestAddress.Hex() != correctManifestAddrHex { 175 t.Fatalf("Response feed manifest address mismatch, expected '%s', got '%s'", correctManifestAddrHex, feedManifestAddress.Hex()) 176 } 177 178 // get bzz manifest transparent feed update resolve 179 getBzzURL := fmt.Sprintf("%s/bzz:/%s", srv.URL, feedManifestAddress) 180 resp, err = http.Get(getBzzURL) 181 if err != nil { 182 t.Fatal(err) 183 } 184 defer resp.Body.Close() 185 if resp.StatusCode != http.StatusOK { 186 t.Fatalf("err %s", resp.Status) 187 } 188 retrievedData, err := ioutil.ReadAll(resp.Body) 189 if err != nil { 190 t.Fatal(err) 191 } 192 if !bytes.Equal(retrievedData, []byte(dataBytes)) { 193 t.Fatalf("retrieved data mismatch, expected %x, got %x", dataBytes, retrievedData) 194 } 195 } 196 197 // Test Swarm feeds using the raw update methods 198 func TestBzzFeed(t *testing.T) { 199 srv := NewTestSwarmServer(t, serverFunc, nil) 200 signer, _ := newTestSigner() 201 202 defer srv.Close() 203 204 // data of update 1 205 update1Data := testutil.RandomBytes(1, 666) 206 update1Timestamp := srv.CurrentTime 207 //data for update 2 208 update2Data := []byte("foo") 209 210 topic, _ := feed.NewTopic("foo.eth", nil) 211 updateRequest := feed.NewFirstRequest(topic) 212 updateRequest.SetData(update1Data) 213 214 if err := updateRequest.Sign(signer); err != nil { 215 t.Fatal(err) 216 } 217 218 // creates feed and sets update 1 219 testUrl, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 220 if err != nil { 221 t.Fatal(err) 222 } 223 urlQuery := testUrl.Query() 224 body := updateRequest.AppendValues(urlQuery) // this adds all query parameters 225 urlQuery.Set("manifest", "1") // indicate we want a manifest back 226 testUrl.RawQuery = urlQuery.Encode() 227 228 resp, err := http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 229 if err != nil { 230 t.Fatal(err) 231 } 232 defer resp.Body.Close() 233 if resp.StatusCode != http.StatusOK { 234 t.Fatalf("err %s", resp.Status) 235 } 236 b, err := ioutil.ReadAll(resp.Body) 237 if err != nil { 238 t.Fatal(err) 239 } 240 rsrcResp := &storage.Address{} 241 err = json.Unmarshal(b, rsrcResp) 242 if err != nil { 243 t.Fatalf("data %s could not be unmarshaled: %v", b, err) 244 } 245 246 correctManifestAddrHex := "bb056a5264c295c2b0f613c8409b9c87ce9d71576ace02458160df4cc894210b" 247 if rsrcResp.Hex() != correctManifestAddrHex { 248 t.Fatalf("Response feed manifest mismatch, expected '%s', got '%s'", correctManifestAddrHex, rsrcResp.Hex()) 249 } 250 251 // get the manifest 252 testRawUrl := fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, rsrcResp) 253 resp, err = http.Get(testRawUrl) 254 if err != nil { 255 t.Fatal(err) 256 } 257 defer resp.Body.Close() 258 if resp.StatusCode != http.StatusOK { 259 t.Fatalf("err %s", resp.Status) 260 } 261 b, err = ioutil.ReadAll(resp.Body) 262 if err != nil { 263 t.Fatal(err) 264 } 265 manifest := &api.Manifest{} 266 err = json.Unmarshal(b, manifest) 267 if err != nil { 268 t.Fatal(err) 269 } 270 if len(manifest.Entries) != 1 { 271 t.Fatalf("Manifest has %d entries", len(manifest.Entries)) 272 } 273 correctFeedHex := "0x666f6f2e65746800000000000000000000000000000000000000000000000000c96aaa54e2d44c299564da76e1cd3184a2386b8d" 274 if manifest.Entries[0].Feed.Hex() != correctFeedHex { 275 t.Fatalf("Expected manifest Feed '%s', got '%s'", correctFeedHex, manifest.Entries[0].Feed.Hex()) 276 } 277 278 // take the chance to have bzz: crash on resolving a feed update that does not contain 279 // a swarm hash: 280 testBzzUrl := fmt.Sprintf("%s/bzz:/%s", srv.URL, rsrcResp) 281 resp, err = http.Get(testBzzUrl) 282 if err != nil { 283 t.Fatal(err) 284 } 285 defer resp.Body.Close() 286 if resp.StatusCode == http.StatusOK { 287 t.Fatal("Expected error status since feed update does not contain a Swarm hash. Received 200 OK") 288 } 289 _, err = ioutil.ReadAll(resp.Body) 290 if err != nil { 291 t.Fatal(err) 292 } 293 294 // get non-existent name, should fail 295 testBzzResUrl := fmt.Sprintf("%s/bzz-feed:/bar", srv.URL) 296 resp, err = http.Get(testBzzResUrl) 297 if err != nil { 298 t.Fatal(err) 299 } 300 301 if resp.StatusCode != http.StatusNotFound { 302 t.Fatalf("Expected get non-existent feed manifest to fail with StatusNotFound (404), got %d", resp.StatusCode) 303 } 304 305 resp.Body.Close() 306 307 // get latest update through bzz-feed directly 308 log.Info("get update latest = 1.1", "addr", correctManifestAddrHex) 309 testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex) 310 resp, err = http.Get(testBzzResUrl) 311 if err != nil { 312 t.Fatal(err) 313 } 314 defer resp.Body.Close() 315 if resp.StatusCode != http.StatusOK { 316 t.Fatalf("err %s", resp.Status) 317 } 318 b, err = ioutil.ReadAll(resp.Body) 319 if err != nil { 320 t.Fatal(err) 321 } 322 if !bytes.Equal(update1Data, b) { 323 t.Fatalf("Expected body '%x', got '%x'", update1Data, b) 324 } 325 326 // update 2 327 // Move the clock ahead 1 second 328 srv.CurrentTime++ 329 log.Info("update 2") 330 331 // 1.- get metadata about this feed 332 testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s/", srv.URL, correctManifestAddrHex) 333 resp, err = http.Get(testBzzResUrl + "?meta=1") 334 if err != nil { 335 t.Fatal(err) 336 } 337 defer resp.Body.Close() 338 if resp.StatusCode != http.StatusOK { 339 t.Fatalf("Get feed metadata returned %s", resp.Status) 340 } 341 b, err = ioutil.ReadAll(resp.Body) 342 if err != nil { 343 t.Fatal(err) 344 } 345 updateRequest = &feed.Request{} 346 if err = updateRequest.UnmarshalJSON(b); err != nil { 347 t.Fatalf("Error decoding feed metadata: %s", err) 348 } 349 updateRequest.SetData(update2Data) 350 if err = updateRequest.Sign(signer); err != nil { 351 t.Fatal(err) 352 } 353 testUrl, err = url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 354 if err != nil { 355 t.Fatal(err) 356 } 357 urlQuery = testUrl.Query() 358 body = updateRequest.AppendValues(urlQuery) // this adds all query parameters 359 goodQueryParameters := urlQuery.Encode() // save the query parameters for a second attempt 360 361 // create bad query parameters in which the signature is missing 362 urlQuery.Del("signature") 363 testUrl.RawQuery = urlQuery.Encode() 364 365 // 1st attempt with bad query parameters in which the signature is missing 366 resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 367 if err != nil { 368 t.Fatal(err) 369 } 370 defer resp.Body.Close() 371 expectedCode := http.StatusBadRequest 372 if resp.StatusCode != expectedCode { 373 t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) 374 } 375 376 // 2nd attempt with bad query parameters in which the signature is of incorrect length 377 urlQuery.Set("signature", "0xabcd") // should be 130 hex chars 378 resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 379 if err != nil { 380 t.Fatal(err) 381 } 382 defer resp.Body.Close() 383 expectedCode = http.StatusBadRequest 384 if resp.StatusCode != expectedCode { 385 t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) 386 } 387 388 // 3rd attempt, with good query parameters: 389 testUrl.RawQuery = goodQueryParameters 390 resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 391 if err != nil { 392 t.Fatal(err) 393 } 394 defer resp.Body.Close() 395 expectedCode = http.StatusOK 396 if resp.StatusCode != expectedCode { 397 t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) 398 } 399 400 // get latest update through bzz-feed directly 401 log.Info("get update 1.2") 402 testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex) 403 resp, err = http.Get(testBzzResUrl) 404 if err != nil { 405 t.Fatal(err) 406 } 407 defer resp.Body.Close() 408 if resp.StatusCode != http.StatusOK { 409 t.Fatalf("err %s", resp.Status) 410 } 411 b, err = ioutil.ReadAll(resp.Body) 412 if err != nil { 413 t.Fatal(err) 414 } 415 if !bytes.Equal(update2Data, b) { 416 t.Fatalf("Expected body '%x', got '%x'", update2Data, b) 417 } 418 419 // test manifest-less queries 420 log.Info("get first update in update1Timestamp via direct query") 421 query := feed.NewQuery(&updateRequest.Feed, update1Timestamp, lookup.NoClue) 422 423 urlq, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 424 if err != nil { 425 t.Fatal(err) 426 } 427 428 values := urlq.Query() 429 query.AppendValues(values) // this adds feed query parameters 430 urlq.RawQuery = values.Encode() 431 resp, err = http.Get(urlq.String()) 432 if err != nil { 433 t.Fatal(err) 434 } 435 defer resp.Body.Close() 436 if resp.StatusCode != http.StatusOK { 437 t.Fatalf("err %s", resp.Status) 438 } 439 b, err = ioutil.ReadAll(resp.Body) 440 if err != nil { 441 t.Fatal(err) 442 } 443 if !bytes.Equal(update1Data, b) { 444 t.Fatalf("Expected body '%x', got '%x'", update1Data, b) 445 } 446 447 } 448 449 func TestBzzGetPath(t *testing.T) { 450 testBzzGetPath(false, t) 451 testBzzGetPath(true, t) 452 } 453 454 func testBzzGetPath(encrypted bool, t *testing.T) { 455 var err error 456 457 testmanifest := []string{ 458 `{"entries":[{"path":"b","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"c","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0}]}`, 459 `{"entries":[{"path":"a","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"b/","hash":"<key0>","contentType":"application/bzz-manifest+json","status":0}]}`, 460 `{"entries":[{"path":"a/","hash":"<key1>","contentType":"application/bzz-manifest+json","status":0}]}`, 461 } 462 463 testrequests := make(map[string]int) 464 testrequests["/"] = 2 465 testrequests["/a/"] = 1 466 testrequests["/a/b/"] = 0 467 testrequests["/x"] = 0 468 testrequests[""] = 0 469 470 expectedfailrequests := []string{"", "/x"} 471 472 reader := [3]*bytes.Reader{} 473 474 addr := [3]storage.Address{} 475 476 srv := NewTestSwarmServer(t, serverFunc, nil) 477 defer srv.Close() 478 479 for i, mf := range testmanifest { 480 reader[i] = bytes.NewReader([]byte(mf)) 481 var wait func(context.Context) error 482 ctx := context.TODO() 483 addr[i], wait, err = srv.FileStore.Store(ctx, reader[i], int64(len(mf)), encrypted) 484 if err != nil { 485 t.Fatal(err) 486 } 487 for j := i + 1; j < len(testmanifest); j++ { 488 testmanifest[j] = strings.Replace(testmanifest[j], fmt.Sprintf("<key%v>", i), addr[i].Hex(), -1) 489 } 490 err = wait(ctx) 491 if err != nil { 492 t.Fatal(err) 493 } 494 } 495 496 rootRef := addr[2].Hex() 497 498 _, err = http.Get(srv.URL + "/bzz-raw:/" + rootRef + "/a") 499 if err != nil { 500 t.Fatalf("Failed to connect to proxy: %v", err) 501 } 502 503 for k, v := range testrequests { 504 var resp *http.Response 505 var respbody []byte 506 507 url := srv.URL + "/bzz-raw:/" 508 if k != "" { 509 url += rootRef + "/" + k[1:] + "?content_type=text/plain" 510 } 511 resp, err = http.Get(url) 512 if err != nil { 513 t.Fatalf("Request failed: %v", err) 514 } 515 defer resp.Body.Close() 516 respbody, err = ioutil.ReadAll(resp.Body) 517 if err != nil { 518 t.Fatalf("Error while reading response body: %v", err) 519 } 520 521 if string(respbody) != testmanifest[v] { 522 isexpectedfailrequest := false 523 524 for _, r := range expectedfailrequests { 525 if k == r { 526 isexpectedfailrequest = true 527 } 528 } 529 if !isexpectedfailrequest { 530 t.Fatalf("Response body does not match, expected: %v, got %v", testmanifest[v], string(respbody)) 531 } 532 } 533 } 534 535 for k, v := range testrequests { 536 var resp *http.Response 537 var respbody []byte 538 539 url := srv.URL + "/bzz-hash:/" 540 if k != "" { 541 url += rootRef + "/" + k[1:] 542 } 543 resp, err = http.Get(url) 544 if err != nil { 545 t.Fatalf("Request failed: %v", err) 546 } 547 defer resp.Body.Close() 548 respbody, err = ioutil.ReadAll(resp.Body) 549 if err != nil { 550 t.Fatalf("Read request body: %v", err) 551 } 552 553 if string(respbody) != addr[v].Hex() { 554 isexpectedfailrequest := false 555 556 for _, r := range expectedfailrequests { 557 if k == r { 558 isexpectedfailrequest = true 559 } 560 } 561 if !isexpectedfailrequest { 562 t.Fatalf("Response body does not match, expected: %v, got %v", addr[v], string(respbody)) 563 } 564 } 565 } 566 567 ref := addr[2].Hex() 568 569 for _, c := range []struct { 570 path string 571 json string 572 pageFragments []string 573 }{ 574 { 575 path: "/", 576 json: `{"common_prefixes":["a/"]}`, 577 pageFragments: []string{ 578 fmt.Sprintf("Swarm index of bzz:/%s/", ref), 579 `<a class="normal-link" href="a/">a/</a>`, 580 }, 581 }, 582 { 583 path: "/a/", 584 json: `{"common_prefixes":["a/b/"],"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/a","mod_time":"0001-01-01T00:00:00Z"}]}`, 585 pageFragments: []string{ 586 fmt.Sprintf("Swarm index of bzz:/%s/a/", ref), 587 `<a class="normal-link" href="b/">b/</a>`, 588 fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/a">a</a>`, ref), 589 }, 590 }, 591 { 592 path: "/a/b/", 593 json: `{"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/b","mod_time":"0001-01-01T00:00:00Z"},{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/c","mod_time":"0001-01-01T00:00:00Z"}]}`, 594 pageFragments: []string{ 595 fmt.Sprintf("Swarm index of bzz:/%s/a/b/", ref), 596 fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/b">b</a>`, ref), 597 fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/c">c</a>`, ref), 598 }, 599 }, 600 { 601 path: "/x", 602 }, 603 { 604 path: "", 605 }, 606 } { 607 k := c.path 608 url := srv.URL + "/bzz-list:/" 609 if k != "" { 610 url += rootRef + "/" + k[1:] 611 } 612 t.Run("json list "+c.path, func(t *testing.T) { 613 resp, err := http.Get(url) 614 if err != nil { 615 t.Fatalf("HTTP request: %v", err) 616 } 617 defer resp.Body.Close() 618 respbody, err := ioutil.ReadAll(resp.Body) 619 if err != nil { 620 t.Fatalf("Read response body: %v", err) 621 } 622 623 body := strings.TrimSpace(string(respbody)) 624 if body != c.json { 625 isexpectedfailrequest := false 626 627 for _, r := range expectedfailrequests { 628 if k == r { 629 isexpectedfailrequest = true 630 } 631 } 632 if !isexpectedfailrequest { 633 t.Errorf("Response list body %q does not match, expected: %v, got %v", k, c.json, body) 634 } 635 } 636 }) 637 t.Run("html list "+c.path, func(t *testing.T) { 638 req, err := http.NewRequest(http.MethodGet, url, nil) 639 if err != nil { 640 t.Fatalf("New request: %v", err) 641 } 642 req.Header.Set("Accept", "text/html") 643 resp, err := http.DefaultClient.Do(req) 644 if err != nil { 645 t.Fatalf("HTTP request: %v", err) 646 } 647 defer resp.Body.Close() 648 b, err := ioutil.ReadAll(resp.Body) 649 if err != nil { 650 t.Fatalf("Read response body: %v", err) 651 } 652 653 body := string(b) 654 655 for _, f := range c.pageFragments { 656 if !strings.Contains(body, f) { 657 isexpectedfailrequest := false 658 659 for _, r := range expectedfailrequests { 660 if k == r { 661 isexpectedfailrequest = true 662 } 663 } 664 if !isexpectedfailrequest { 665 t.Errorf("Response list body %q does not contain %q: body %q", k, f, body) 666 } 667 } 668 } 669 }) 670 } 671 672 nonhashtests := []string{ 673 srv.URL + "/bzz:/name", 674 srv.URL + "/bzz-immutable:/nonhash", 675 srv.URL + "/bzz-raw:/nonhash", 676 srv.URL + "/bzz-list:/nonhash", 677 srv.URL + "/bzz-hash:/nonhash", 678 } 679 680 nonhashresponses := []string{ 681 `cannot resolve name: no DNS to resolve name: "name"`, 682 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 683 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 684 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 685 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 686 } 687 688 for i, url := range nonhashtests { 689 var resp *http.Response 690 var respbody []byte 691 692 resp, err = http.Get(url) 693 694 if err != nil { 695 t.Fatalf("Request failed: %v", err) 696 } 697 defer resp.Body.Close() 698 respbody, err = ioutil.ReadAll(resp.Body) 699 if err != nil { 700 t.Fatalf("ReadAll failed: %v", err) 701 } 702 if !strings.Contains(string(respbody), nonhashresponses[i]) { 703 t.Fatalf("Non-Hash response body does not match, expected: %v, got: %v", nonhashresponses[i], string(respbody)) 704 } 705 } 706 } 707 708 func TestBzzTar(t *testing.T) { 709 testBzzTar(false, t) 710 testBzzTar(true, t) 711 } 712 713 func testBzzTar(encrypted bool, t *testing.T) { 714 srv := NewTestSwarmServer(t, serverFunc, nil) 715 defer srv.Close() 716 fileNames := []string{"tmp1.txt", "tmp2.lock", "tmp3.rtf"} 717 fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"} 718 719 buf := &bytes.Buffer{} 720 tw := tar.NewWriter(buf) 721 defer tw.Close() 722 723 for i, v := range fileNames { 724 size := int64(len(fileContents[i])) 725 hdr := &tar.Header{ 726 Name: v, 727 Mode: 0644, 728 Size: size, 729 ModTime: time.Now(), 730 Xattrs: map[string]string{ 731 "user.swarm.content-type": "text/plain", 732 }, 733 } 734 if err := tw.WriteHeader(hdr); err != nil { 735 t.Fatal(err) 736 } 737 738 // copy the file into the tar stream 739 n, err := io.Copy(tw, bytes.NewBufferString(fileContents[i])) 740 if err != nil { 741 t.Fatal(err) 742 } else if n != size { 743 t.Fatal("size mismatch") 744 } 745 } 746 747 //post tar stream 748 url := srv.URL + "/bzz:/" 749 if encrypted { 750 url = url + "encrypt" 751 } 752 req, err := http.NewRequest("POST", url, buf) 753 if err != nil { 754 t.Fatal(err) 755 } 756 req.Header.Add("Content-Type", "application/x-tar") 757 client := &http.Client{} 758 resp2, err := client.Do(req) 759 if err != nil { 760 t.Fatal(err) 761 } 762 if resp2.StatusCode != http.StatusOK { 763 t.Fatalf("err %s", resp2.Status) 764 } 765 swarmHash, err := ioutil.ReadAll(resp2.Body) 766 resp2.Body.Close() 767 if err != nil { 768 t.Fatal(err) 769 } 770 771 // now do a GET to get a tarball back 772 req, err = http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s", string(swarmHash)), nil) 773 if err != nil { 774 t.Fatal(err) 775 } 776 req.Header.Add("Accept", "application/x-tar") 777 resp2, err = client.Do(req) 778 if err != nil { 779 t.Fatal(err) 780 } 781 defer resp2.Body.Close() 782 783 if h := resp2.Header.Get("Content-Type"); h != "application/x-tar" { 784 t.Fatalf("Content-Type header expected: application/x-tar, got: %s", h) 785 } 786 787 expectedFileName := string(swarmHash) + ".tar" 788 expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", expectedFileName) 789 if h := resp2.Header.Get("Content-Disposition"); h != expectedContentDisposition { 790 t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h) 791 } 792 793 file, err := ioutil.TempFile("", "swarm-downloaded-tarball") 794 if err != nil { 795 t.Fatal(err) 796 } 797 defer os.Remove(file.Name()) 798 _, err = io.Copy(file, resp2.Body) 799 if err != nil { 800 t.Fatalf("error getting tarball: %v", err) 801 } 802 file.Sync() 803 file.Close() 804 805 tarFileHandle, err := os.Open(file.Name()) 806 if err != nil { 807 t.Fatal(err) 808 } 809 tr := tar.NewReader(tarFileHandle) 810 811 for { 812 hdr, err := tr.Next() 813 if err == io.EOF { 814 break 815 } else if err != nil { 816 t.Fatalf("error reading tar stream: %s", err) 817 } 818 bb := make([]byte, hdr.Size) 819 _, err = tr.Read(bb) 820 if err != nil && err != io.EOF { 821 t.Fatal(err) 822 } 823 passed := false 824 for i, v := range fileNames { 825 if v == hdr.Name { 826 if string(bb) == fileContents[i] { 827 passed = true 828 break 829 } 830 } 831 } 832 if !passed { 833 t.Fatalf("file %s did not pass content assertion", hdr.Name) 834 } 835 } 836 } 837 838 // TestBzzRootRedirect tests that getting the root path of a manifest without 839 // a trailing slash gets redirected to include the trailing slash so that 840 // relative URLs work as expected. 841 func TestBzzRootRedirect(t *testing.T) { 842 testBzzRootRedirect(false, t) 843 } 844 func TestBzzRootRedirectEncrypted(t *testing.T) { 845 testBzzRootRedirect(true, t) 846 } 847 848 func testBzzRootRedirect(toEncrypt bool, t *testing.T) { 849 srv := NewTestSwarmServer(t, serverFunc, nil) 850 defer srv.Close() 851 852 // create a manifest with some data at the root path 853 client := swarm.NewClient(srv.URL) 854 data := []byte("data") 855 file := &swarm.File{ 856 ReadCloser: ioutil.NopCloser(bytes.NewReader(data)), 857 ManifestEntry: api.ManifestEntry{ 858 Path: "", 859 ContentType: "text/plain", 860 Size: int64(len(data)), 861 }, 862 } 863 hash, err := client.Upload(file, "", toEncrypt) 864 if err != nil { 865 t.Fatal(err) 866 } 867 868 // define a CheckRedirect hook which ensures there is only a single 869 // redirect to the correct URL 870 redirected := false 871 httpClient := http.Client{ 872 CheckRedirect: func(req *http.Request, via []*http.Request) error { 873 if redirected { 874 return errors.New("too many redirects") 875 } 876 redirected = true 877 expectedPath := "/bzz:/" + hash + "/" 878 if req.URL.Path != expectedPath { 879 return fmt.Errorf("expected redirect to %q, got %q", expectedPath, req.URL.Path) 880 } 881 return nil 882 }, 883 } 884 885 // perform the GET request and assert the response 886 res, err := httpClient.Get(srv.URL + "/bzz:/" + hash) 887 if err != nil { 888 t.Fatal(err) 889 } 890 defer res.Body.Close() 891 if !redirected { 892 t.Fatal("expected GET /bzz:/<hash> to redirect to /bzz:/<hash>/ but it didn't") 893 } 894 gotData, err := ioutil.ReadAll(res.Body) 895 if err != nil { 896 t.Fatal(err) 897 } 898 if !bytes.Equal(gotData, data) { 899 t.Fatalf("expected response to equal %q, got %q", data, gotData) 900 } 901 } 902 903 func TestMethodsNotAllowed(t *testing.T) { 904 srv := NewTestSwarmServer(t, serverFunc, nil) 905 defer srv.Close() 906 databytes := "bar" 907 for _, c := range []struct { 908 url string 909 code int 910 }{ 911 { 912 url: fmt.Sprintf("%s/bzz-list:/", srv.URL), 913 code: http.StatusMethodNotAllowed, 914 }, { 915 url: fmt.Sprintf("%s/bzz-hash:/", srv.URL), 916 code: http.StatusMethodNotAllowed, 917 }, 918 { 919 url: fmt.Sprintf("%s/bzz-immutable:/", srv.URL), 920 code: http.StatusMethodNotAllowed, 921 }, 922 } { 923 res, _ := http.Post(c.url, "text/plain", bytes.NewReader([]byte(databytes))) 924 if res.StatusCode != c.code { 925 t.Fatalf("should have failed. requested url: %s, expected code %d, got %d", c.url, c.code, res.StatusCode) 926 } 927 } 928 929 } 930 931 func httpDo(httpMethod string, url string, reqBody io.Reader, headers map[string]string, verbose bool, t *testing.T) (*http.Response, string) { 932 // Build the Request 933 req, err := http.NewRequest(httpMethod, url, reqBody) 934 if err != nil { 935 t.Fatal(err) 936 } 937 for key, value := range headers { 938 req.Header.Set(key, value) 939 } 940 if verbose { 941 t.Log(req.Method, req.URL, req.Header, req.Body) 942 } 943 944 // Send Request out 945 httpClient := &http.Client{} 946 res, err := httpClient.Do(req) 947 if err != nil { 948 t.Fatal(err) 949 } 950 951 // Read the HTTP Body 952 buffer, err := ioutil.ReadAll(res.Body) 953 if err != nil { 954 t.Fatal(err) 955 } 956 defer res.Body.Close() 957 body := string(buffer) 958 959 return res, body 960 } 961 962 func TestGet(t *testing.T) { 963 srv := NewTestSwarmServer(t, serverFunc, nil) 964 defer srv.Close() 965 966 for _, testCase := range []struct { 967 uri string 968 method string 969 headers map[string]string 970 expectedStatusCode int 971 assertResponseBody string 972 verbose bool 973 }{ 974 { 975 uri: fmt.Sprintf("%s/", srv.URL), 976 method: "GET", 977 headers: map[string]string{"Accept": "text/html"}, 978 expectedStatusCode: http.StatusOK, 979 assertResponseBody: "Swarm: Serverless Hosting Incentivised Peer-To-Peer Storage And Content Distribution", 980 verbose: false, 981 }, 982 { 983 uri: fmt.Sprintf("%s/", srv.URL), 984 method: "GET", 985 headers: map[string]string{"Accept": "application/json"}, 986 expectedStatusCode: http.StatusOK, 987 assertResponseBody: "Swarm: Please request a valid ENS or swarm hash with the appropriate bzz scheme", 988 verbose: false, 989 }, 990 { 991 uri: fmt.Sprintf("%s/robots.txt", srv.URL), 992 method: "GET", 993 headers: map[string]string{"Accept": "text/html"}, 994 expectedStatusCode: http.StatusOK, 995 assertResponseBody: "User-agent: *\nDisallow: /", 996 verbose: false, 997 }, 998 { 999 uri: fmt.Sprintf("%s/nonexistent_path", srv.URL), 1000 method: "GET", 1001 headers: map[string]string{}, 1002 expectedStatusCode: http.StatusNotFound, 1003 verbose: false, 1004 }, 1005 { 1006 uri: fmt.Sprintf("%s/bzz:asdf/", srv.URL), 1007 method: "GET", 1008 headers: map[string]string{}, 1009 expectedStatusCode: http.StatusNotFound, 1010 verbose: false, 1011 }, 1012 { 1013 uri: fmt.Sprintf("%s/tbz2/", srv.URL), 1014 method: "GET", 1015 headers: map[string]string{}, 1016 expectedStatusCode: http.StatusNotFound, 1017 verbose: false, 1018 }, 1019 { 1020 uri: fmt.Sprintf("%s/bzz-rack:/", srv.URL), 1021 method: "GET", 1022 headers: map[string]string{}, 1023 expectedStatusCode: http.StatusNotFound, 1024 verbose: false, 1025 }, 1026 { 1027 uri: fmt.Sprintf("%s/bzz-ls", srv.URL), 1028 method: "GET", 1029 headers: map[string]string{}, 1030 expectedStatusCode: http.StatusNotFound, 1031 verbose: false, 1032 }} { 1033 t.Run("GET "+testCase.uri, func(t *testing.T) { 1034 res, body := httpDo(testCase.method, testCase.uri, nil, testCase.headers, testCase.verbose, t) 1035 if res.StatusCode != testCase.expectedStatusCode { 1036 t.Fatalf("expected status code %d but got %d", testCase.expectedStatusCode, res.StatusCode) 1037 } 1038 if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) { 1039 t.Fatalf("expected response to be: %s but got: %s", testCase.assertResponseBody, body) 1040 } 1041 }) 1042 } 1043 } 1044 1045 func TestModify(t *testing.T) { 1046 srv := NewTestSwarmServer(t, serverFunc, nil) 1047 defer srv.Close() 1048 1049 swarmClient := swarm.NewClient(srv.URL) 1050 data := []byte("data") 1051 file := &swarm.File{ 1052 ReadCloser: ioutil.NopCloser(bytes.NewReader(data)), 1053 ManifestEntry: api.ManifestEntry{ 1054 Path: "", 1055 ContentType: "text/plain", 1056 Size: int64(len(data)), 1057 }, 1058 } 1059 1060 hash, err := swarmClient.Upload(file, "", false) 1061 if err != nil { 1062 t.Fatal(err) 1063 } 1064 1065 for _, testCase := range []struct { 1066 uri string 1067 method string 1068 headers map[string]string 1069 requestBody []byte 1070 expectedStatusCode int 1071 assertResponseBody string 1072 assertResponseHeaders map[string]string 1073 verbose bool 1074 }{ 1075 { 1076 uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), 1077 method: "DELETE", 1078 headers: map[string]string{}, 1079 expectedStatusCode: http.StatusOK, 1080 assertResponseBody: "8b634aea26eec353ac0ecbec20c94f44d6f8d11f38d4578a4c207a84c74ef731", 1081 verbose: false, 1082 }, 1083 { 1084 uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), 1085 method: "PUT", 1086 headers: map[string]string{}, 1087 expectedStatusCode: http.StatusMethodNotAllowed, 1088 verbose: false, 1089 }, 1090 { 1091 uri: fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, hash), 1092 method: "PUT", 1093 headers: map[string]string{}, 1094 expectedStatusCode: http.StatusMethodNotAllowed, 1095 verbose: false, 1096 }, 1097 { 1098 uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), 1099 method: "PATCH", 1100 headers: map[string]string{}, 1101 expectedStatusCode: http.StatusMethodNotAllowed, 1102 verbose: false, 1103 }, 1104 { 1105 uri: fmt.Sprintf("%s/bzz-raw:/", srv.URL), 1106 method: "POST", 1107 headers: map[string]string{}, 1108 requestBody: []byte("POSTdata"), 1109 expectedStatusCode: http.StatusOK, 1110 assertResponseHeaders: map[string]string{"Content-Length": "64"}, 1111 verbose: false, 1112 }, 1113 { 1114 uri: fmt.Sprintf("%s/bzz-raw:/encrypt", srv.URL), 1115 method: "POST", 1116 headers: map[string]string{}, 1117 requestBody: []byte("POSTdata"), 1118 expectedStatusCode: http.StatusOK, 1119 assertResponseHeaders: map[string]string{"Content-Length": "128"}, 1120 verbose: false, 1121 }, 1122 } { 1123 t.Run(testCase.method+" "+testCase.uri, func(t *testing.T) { 1124 reqBody := bytes.NewReader(testCase.requestBody) 1125 res, body := httpDo(testCase.method, testCase.uri, reqBody, testCase.headers, testCase.verbose, t) 1126 1127 if res.StatusCode != testCase.expectedStatusCode { 1128 t.Fatalf("expected status code %d but got %d, %s", testCase.expectedStatusCode, res.StatusCode, body) 1129 } 1130 if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) { 1131 t.Log(body) 1132 t.Fatalf("expected response %s but got %s", testCase.assertResponseBody, body) 1133 } 1134 for key, value := range testCase.assertResponseHeaders { 1135 if res.Header.Get(key) != value { 1136 t.Logf("expected %s=%s in HTTP response header but got %s", key, value, res.Header.Get(key)) 1137 } 1138 } 1139 }) 1140 } 1141 } 1142 1143 func TestMultiPartUpload(t *testing.T) { 1144 // POST /bzz:/ Content-Type: multipart/form-data 1145 verbose := false 1146 // Setup Swarm 1147 srv := NewTestSwarmServer(t, serverFunc, nil) 1148 defer srv.Close() 1149 1150 url := fmt.Sprintf("%s/bzz:/", srv.URL) 1151 1152 buf := new(bytes.Buffer) 1153 form := multipart.NewWriter(buf) 1154 form.WriteField("name", "John Doe") 1155 file1, _ := form.CreateFormFile("cv", "cv.txt") 1156 file1.Write([]byte("John Doe's Credentials")) 1157 file2, _ := form.CreateFormFile("profile_picture", "profile.jpg") 1158 file2.Write([]byte("imaginethisisjpegdata")) 1159 form.Close() 1160 1161 headers := map[string]string{ 1162 "Content-Type": form.FormDataContentType(), 1163 "Content-Length": strconv.Itoa(buf.Len()), 1164 } 1165 res, body := httpDo("POST", url, buf, headers, verbose, t) 1166 1167 if res.StatusCode != http.StatusOK { 1168 t.Fatalf("expected POST multipart/form-data to return 200, but it returned %d", res.StatusCode) 1169 } 1170 if len(body) != 64 { 1171 t.Fatalf("expected POST multipart/form-data to return a 64 char manifest but the answer was %d chars long", len(body)) 1172 } 1173 } 1174 1175 // TestBzzGetFileWithResolver tests fetching a file using a mocked ENS resolver 1176 func TestBzzGetFileWithResolver(t *testing.T) { 1177 resolver := newTestResolveValidator("") 1178 srv := NewTestSwarmServer(t, serverFunc, resolver) 1179 defer srv.Close() 1180 fileNames := []string{"dir1/tmp1.txt", "dir2/tmp2.lock", "dir3/tmp3.rtf"} 1181 fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"} 1182 1183 buf := &bytes.Buffer{} 1184 tw := tar.NewWriter(buf) 1185 1186 for i, v := range fileNames { 1187 size := len(fileContents[i]) 1188 hdr := &tar.Header{ 1189 Name: v, 1190 Mode: 0644, 1191 Size: int64(size), 1192 ModTime: time.Now(), 1193 Xattrs: map[string]string{ 1194 "user.swarm.content-type": "text/plain", 1195 }, 1196 } 1197 if err := tw.WriteHeader(hdr); err != nil { 1198 t.Fatal(err) 1199 } 1200 1201 // copy the file into the tar stream 1202 n, err := io.WriteString(tw, fileContents[i]) 1203 if err != nil { 1204 t.Fatal(err) 1205 } else if n != size { 1206 t.Fatal("size mismatch") 1207 } 1208 } 1209 1210 if err := tw.Close(); err != nil { 1211 t.Fatal(err) 1212 } 1213 1214 //post tar stream 1215 url := srv.URL + "/bzz:/" 1216 1217 req, err := http.NewRequest("POST", url, buf) 1218 if err != nil { 1219 t.Fatal(err) 1220 } 1221 req.Header.Add("Content-Type", "application/x-tar") 1222 client := &http.Client{} 1223 serverResponse, err := client.Do(req) 1224 if err != nil { 1225 t.Fatal(err) 1226 } 1227 if serverResponse.StatusCode != http.StatusOK { 1228 t.Fatalf("err %s", serverResponse.Status) 1229 } 1230 swarmHash, err := ioutil.ReadAll(serverResponse.Body) 1231 serverResponse.Body.Close() 1232 if err != nil { 1233 t.Fatal(err) 1234 } 1235 // set the resolved hash to be the swarm hash of what we've just uploaded 1236 hash := common.HexToHash(string(swarmHash)) 1237 resolver.hash = &hash 1238 for _, v := range []struct { 1239 addr string 1240 path string 1241 expectedStatusCode int 1242 expectedContentType string 1243 expectedFileName string 1244 }{ 1245 { 1246 addr: string(swarmHash), 1247 path: fileNames[0], 1248 expectedStatusCode: http.StatusOK, 1249 expectedContentType: "text/plain", 1250 expectedFileName: path.Base(fileNames[0]), 1251 }, 1252 { 1253 addr: "somebogusensname", 1254 path: fileNames[0], 1255 expectedStatusCode: http.StatusOK, 1256 expectedContentType: "text/plain", 1257 expectedFileName: path.Base(fileNames[0]), 1258 }, 1259 } { 1260 req, err := http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s/%s", v.addr, v.path), nil) 1261 if err != nil { 1262 t.Fatal(err) 1263 } 1264 serverResponse, err := client.Do(req) 1265 if err != nil { 1266 t.Fatal(err) 1267 } 1268 defer serverResponse.Body.Close() 1269 if serverResponse.StatusCode != v.expectedStatusCode { 1270 t.Fatalf("expected %d, got %d", v.expectedStatusCode, serverResponse.StatusCode) 1271 } 1272 1273 if h := serverResponse.Header.Get("Content-Type"); h != v.expectedContentType { 1274 t.Fatalf("Content-Type header expected: %s, got %s", v.expectedContentType, h) 1275 } 1276 1277 expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", v.expectedFileName) 1278 if h := serverResponse.Header.Get("Content-Disposition"); h != expectedContentDisposition { 1279 t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h) 1280 } 1281 1282 } 1283 } 1284 1285 // testResolver implements the Resolver interface and either returns the given 1286 // hash if it is set, or returns a "name not found" error 1287 type testResolveValidator struct { 1288 hash *common.Hash 1289 } 1290 1291 func newTestResolveValidator(addr string) *testResolveValidator { 1292 r := &testResolveValidator{} 1293 if addr != "" { 1294 hash := common.HexToHash(addr) 1295 r.hash = &hash 1296 } 1297 return r 1298 } 1299 1300 func (t *testResolveValidator) Resolve(addr string) (common.Hash, error) { 1301 if t.hash == nil { 1302 return common.Hash{}, fmt.Errorf("DNS name not found: %q", addr) 1303 } 1304 return *t.hash, nil 1305 } 1306 1307 func (t *testResolveValidator) Owner(node [32]byte) (addr common.Address, err error) { 1308 return 1309 } 1310 func (t *testResolveValidator) HeaderByNumber(context.Context, *big.Int) (header *types.Header, err error) { 1311 return 1312 }