github.com/Blockdaemon/celo-blockchain@v0.0.0-20200129231733-e667f6b08419/swarm/api/http/server_test.go (about)

     1  // Copyright 2017 The go-ethereum Authors
     2  // This file is part of the go-ethereum library.
     3  //
     4  // The go-ethereum library is free software: you can redistribute it and/or modify
     5  // it under the terms of the GNU Lesser General Public License as published by
     6  // the Free Software Foundation, either version 3 of the License, or
     7  // (at your option) any later version.
     8  //
     9  // The go-ethereum library is distributed in the hope that it will be useful,
    10  // but WITHOUT ANY WARRANTY; without even the implied warranty of
    11  // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    12  // GNU Lesser General Public License for more details.
    13  //
    14  // You should have received a copy of the GNU Lesser General Public License
    15  // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
    16  
    17  package http
    18  
    19  import (
    20  	"archive/tar"
    21  	"bytes"
    22  	"context"
    23  	"encoding/json"
    24  	"errors"
    25  	"flag"
    26  	"fmt"
    27  	"io"
    28  	"io/ioutil"
    29  	"math/big"
    30  	"mime/multipart"
    31  	"net/http"
    32  	"net/url"
    33  	"os"
    34  	"path"
    35  	"strconv"
    36  	"strings"
    37  	"testing"
    38  	"time"
    39  
    40  	"github.com/ethereum/go-ethereum/common"
    41  	"github.com/ethereum/go-ethereum/core/types"
    42  	"github.com/ethereum/go-ethereum/crypto"
    43  	"github.com/ethereum/go-ethereum/log"
    44  	"github.com/ethereum/go-ethereum/swarm/api"
    45  	swarm "github.com/ethereum/go-ethereum/swarm/api/client"
    46  	"github.com/ethereum/go-ethereum/swarm/storage"
    47  	"github.com/ethereum/go-ethereum/swarm/storage/feed"
    48  	"github.com/ethereum/go-ethereum/swarm/storage/feed/lookup"
    49  	"github.com/ethereum/go-ethereum/swarm/testutil"
    50  )
    51  
    52  func init() {
    53  	loglevel := flag.Int("loglevel", 2, "loglevel")
    54  	flag.Parse()
    55  	log.Root().SetHandler(log.CallerFileHandler(log.LvlFilterHandler(log.Lvl(*loglevel), log.StreamHandler(os.Stderr, log.TerminalFormat(true)))))
    56  }
    57  
    58  func serverFunc(api *api.API) TestServer {
    59  	return NewServer(api, "")
    60  }
    61  
    62  func newTestSigner() (*feed.GenericSigner, error) {
    63  	privKey, err := crypto.HexToECDSA("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")
    64  	if err != nil {
    65  		return nil, err
    66  	}
    67  	return feed.NewGenericSigner(privKey), nil
    68  }
    69  
    70  // Test the transparent resolving of feed updates with bzz:// scheme
    71  //
    72  // First upload data to bzz:, and store the Swarm hash to the resulting manifest in a feed update.
    73  // This effectively uses a feed to store a pointer to content rather than the content itself
    74  // Retrieving the update with the Swarm hash should return the manifest pointing directly to the data
    75  // and raw retrieve of that hash should return the data
    76  func TestBzzWithFeed(t *testing.T) {
    77  
    78  	signer, _ := newTestSigner()
    79  
    80  	// Initialize Swarm test server
    81  	srv := NewTestSwarmServer(t, serverFunc, nil)
    82  	defer srv.Close()
    83  
    84  	// put together some data for our test:
    85  	dataBytes := []byte(`
    86  	//
    87  	// Create some data our manifest will point to. Data that could be very big and wouldn't fit in a feed update.
    88  	// So what we are going to do is upload it to Swarm bzz:// and obtain a **manifest hash** pointing to it:
    89  	//
    90  	// MANIFEST HASH --> DATA
    91  	//
    92  	// Then, we store that **manifest hash** into a Swarm Feed update. Once we have done this,
    93  	// we can use the **feed manifest hash** in bzz:// instead, this way: bzz://feed-manifest-hash.
    94  	//
    95  	// FEED MANIFEST HASH --> MANIFEST HASH --> DATA
    96  	//
    97  	// Given that we can update the feed at any time with a new **manifest hash** but the **feed manifest hash**
    98  	// stays constant, we have effectively created a fixed address to changing content. (Applause)
    99  	//
   100  	// FEED MANIFEST HASH (the same) --> MANIFEST HASH(2) --> DATA(2) ...
   101  	//
   102  	`)
   103  
   104  	// POST data to bzz and get back a content-addressed **manifest hash** pointing to it.
   105  	resp, err := http.Post(fmt.Sprintf("%s/bzz:/", srv.URL), "text/plain", bytes.NewReader([]byte(dataBytes)))
   106  	if err != nil {
   107  		t.Fatal(err)
   108  	}
   109  
   110  	defer resp.Body.Close()
   111  	if resp.StatusCode != http.StatusOK {
   112  		t.Fatalf("err %s", resp.Status)
   113  	}
   114  	manifestAddressHex, err := ioutil.ReadAll(resp.Body)
   115  
   116  	if err != nil {
   117  		t.Fatal(err)
   118  	}
   119  
   120  	manifestAddress := common.FromHex(string(manifestAddressHex))
   121  
   122  	log.Info("added data", "manifest", string(manifestAddressHex))
   123  
   124  	// At this point we have uploaded the data and have a manifest pointing to it
   125  	// Now store that manifest address in a feed update.
   126  	// We also want a feed manifest, so we can use it to refer to the feed.
   127  
   128  	// First, create a topic for our feed:
   129  	topic, _ := feed.NewTopic("interesting topic indeed", nil)
   130  
   131  	// Create a feed update request:
   132  	updateRequest := feed.NewFirstRequest(topic)
   133  
   134  	// Store the **manifest address** as data into the feed update.
   135  	updateRequest.SetData(manifestAddress)
   136  
   137  	// Sign the update
   138  	if err := updateRequest.Sign(signer); err != nil {
   139  		t.Fatal(err)
   140  	}
   141  	log.Info("added data", "data", common.ToHex(manifestAddress))
   142  
   143  	// Build the feed update http request:
   144  	feedUpdateURL, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   145  	if err != nil {
   146  		t.Fatal(err)
   147  	}
   148  	query := feedUpdateURL.Query()
   149  	body := updateRequest.AppendValues(query) // this adds all query parameters and returns the data to be posted
   150  	query.Set("manifest", "1")                // indicate we want a feed manifest back
   151  	feedUpdateURL.RawQuery = query.Encode()
   152  
   153  	// submit the feed update request to Swarm
   154  	resp, err = http.Post(feedUpdateURL.String(), "application/octet-stream", bytes.NewReader(body))
   155  	if err != nil {
   156  		t.Fatal(err)
   157  	}
   158  	defer resp.Body.Close()
   159  	if resp.StatusCode != http.StatusOK {
   160  		t.Fatalf("err %s", resp.Status)
   161  	}
   162  
   163  	feedManifestAddressHex, err := ioutil.ReadAll(resp.Body)
   164  	if err != nil {
   165  		t.Fatal(err)
   166  	}
   167  	feedManifestAddress := &storage.Address{}
   168  	err = json.Unmarshal(feedManifestAddressHex, feedManifestAddress)
   169  	if err != nil {
   170  		t.Fatalf("data %s could not be unmarshaled: %v", feedManifestAddressHex, err)
   171  	}
   172  
   173  	correctManifestAddrHex := "747c402e5b9dc715a25a4393147512167bab018a007fad7cdcd9adc7fce1ced2"
   174  	if feedManifestAddress.Hex() != correctManifestAddrHex {
   175  		t.Fatalf("Response feed manifest address mismatch, expected '%s', got '%s'", correctManifestAddrHex, feedManifestAddress.Hex())
   176  	}
   177  
   178  	// get bzz manifest transparent feed update resolve
   179  	getBzzURL := fmt.Sprintf("%s/bzz:/%s", srv.URL, feedManifestAddress)
   180  	resp, err = http.Get(getBzzURL)
   181  	if err != nil {
   182  		t.Fatal(err)
   183  	}
   184  	defer resp.Body.Close()
   185  	if resp.StatusCode != http.StatusOK {
   186  		t.Fatalf("err %s", resp.Status)
   187  	}
   188  	retrievedData, err := ioutil.ReadAll(resp.Body)
   189  	if err != nil {
   190  		t.Fatal(err)
   191  	}
   192  	if !bytes.Equal(retrievedData, []byte(dataBytes)) {
   193  		t.Fatalf("retrieved data mismatch, expected %x, got %x", dataBytes, retrievedData)
   194  	}
   195  }
   196  
   197  // Test Swarm feeds using the raw update methods
   198  func TestBzzFeed(t *testing.T) {
   199  	srv := NewTestSwarmServer(t, serverFunc, nil)
   200  	signer, _ := newTestSigner()
   201  
   202  	defer srv.Close()
   203  
   204  	// data of update 1
   205  	update1Data := testutil.RandomBytes(1, 666)
   206  	update1Timestamp := srv.CurrentTime
   207  	//data for update 2
   208  	update2Data := []byte("foo")
   209  
   210  	topic, _ := feed.NewTopic("foo.eth", nil)
   211  	updateRequest := feed.NewFirstRequest(topic)
   212  	updateRequest.SetData(update1Data)
   213  
   214  	if err := updateRequest.Sign(signer); err != nil {
   215  		t.Fatal(err)
   216  	}
   217  
   218  	// creates feed and sets update 1
   219  	testUrl, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   220  	if err != nil {
   221  		t.Fatal(err)
   222  	}
   223  	urlQuery := testUrl.Query()
   224  	body := updateRequest.AppendValues(urlQuery) // this adds all query parameters
   225  	urlQuery.Set("manifest", "1")                // indicate we want a manifest back
   226  	testUrl.RawQuery = urlQuery.Encode()
   227  
   228  	resp, err := http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   229  	if err != nil {
   230  		t.Fatal(err)
   231  	}
   232  	defer resp.Body.Close()
   233  	if resp.StatusCode != http.StatusOK {
   234  		t.Fatalf("err %s", resp.Status)
   235  	}
   236  	b, err := ioutil.ReadAll(resp.Body)
   237  	if err != nil {
   238  		t.Fatal(err)
   239  	}
   240  	rsrcResp := &storage.Address{}
   241  	err = json.Unmarshal(b, rsrcResp)
   242  	if err != nil {
   243  		t.Fatalf("data %s could not be unmarshaled: %v", b, err)
   244  	}
   245  
   246  	correctManifestAddrHex := "bb056a5264c295c2b0f613c8409b9c87ce9d71576ace02458160df4cc894210b"
   247  	if rsrcResp.Hex() != correctManifestAddrHex {
   248  		t.Fatalf("Response feed manifest mismatch, expected '%s', got '%s'", correctManifestAddrHex, rsrcResp.Hex())
   249  	}
   250  
   251  	// get the manifest
   252  	testRawUrl := fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, rsrcResp)
   253  	resp, err = http.Get(testRawUrl)
   254  	if err != nil {
   255  		t.Fatal(err)
   256  	}
   257  	defer resp.Body.Close()
   258  	if resp.StatusCode != http.StatusOK {
   259  		t.Fatalf("err %s", resp.Status)
   260  	}
   261  	b, err = ioutil.ReadAll(resp.Body)
   262  	if err != nil {
   263  		t.Fatal(err)
   264  	}
   265  	manifest := &api.Manifest{}
   266  	err = json.Unmarshal(b, manifest)
   267  	if err != nil {
   268  		t.Fatal(err)
   269  	}
   270  	if len(manifest.Entries) != 1 {
   271  		t.Fatalf("Manifest has %d entries", len(manifest.Entries))
   272  	}
   273  	correctFeedHex := "0x666f6f2e65746800000000000000000000000000000000000000000000000000c96aaa54e2d44c299564da76e1cd3184a2386b8d"
   274  	if manifest.Entries[0].Feed.Hex() != correctFeedHex {
   275  		t.Fatalf("Expected manifest Feed '%s', got '%s'", correctFeedHex, manifest.Entries[0].Feed.Hex())
   276  	}
   277  
   278  	// take the chance to have bzz: crash on resolving a feed update that does not contain
   279  	// a swarm hash:
   280  	testBzzUrl := fmt.Sprintf("%s/bzz:/%s", srv.URL, rsrcResp)
   281  	resp, err = http.Get(testBzzUrl)
   282  	if err != nil {
   283  		t.Fatal(err)
   284  	}
   285  	defer resp.Body.Close()
   286  	if resp.StatusCode == http.StatusOK {
   287  		t.Fatal("Expected error status since feed update does not contain a Swarm hash. Received 200 OK")
   288  	}
   289  	_, err = ioutil.ReadAll(resp.Body)
   290  	if err != nil {
   291  		t.Fatal(err)
   292  	}
   293  
   294  	// get non-existent name, should fail
   295  	testBzzResUrl := fmt.Sprintf("%s/bzz-feed:/bar", srv.URL)
   296  	resp, err = http.Get(testBzzResUrl)
   297  	if err != nil {
   298  		t.Fatal(err)
   299  	}
   300  
   301  	if resp.StatusCode != http.StatusNotFound {
   302  		t.Fatalf("Expected get non-existent feed manifest to fail with StatusNotFound (404), got %d", resp.StatusCode)
   303  	}
   304  
   305  	resp.Body.Close()
   306  
   307  	// get latest update through bzz-feed directly
   308  	log.Info("get update latest = 1.1", "addr", correctManifestAddrHex)
   309  	testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex)
   310  	resp, err = http.Get(testBzzResUrl)
   311  	if err != nil {
   312  		t.Fatal(err)
   313  	}
   314  	defer resp.Body.Close()
   315  	if resp.StatusCode != http.StatusOK {
   316  		t.Fatalf("err %s", resp.Status)
   317  	}
   318  	b, err = ioutil.ReadAll(resp.Body)
   319  	if err != nil {
   320  		t.Fatal(err)
   321  	}
   322  	if !bytes.Equal(update1Data, b) {
   323  		t.Fatalf("Expected body '%x', got '%x'", update1Data, b)
   324  	}
   325  
   326  	// update 2
   327  	// Move the clock ahead 1 second
   328  	srv.CurrentTime++
   329  	log.Info("update 2")
   330  
   331  	// 1.- get metadata about this feed
   332  	testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s/", srv.URL, correctManifestAddrHex)
   333  	resp, err = http.Get(testBzzResUrl + "?meta=1")
   334  	if err != nil {
   335  		t.Fatal(err)
   336  	}
   337  	defer resp.Body.Close()
   338  	if resp.StatusCode != http.StatusOK {
   339  		t.Fatalf("Get feed metadata returned %s", resp.Status)
   340  	}
   341  	b, err = ioutil.ReadAll(resp.Body)
   342  	if err != nil {
   343  		t.Fatal(err)
   344  	}
   345  	updateRequest = &feed.Request{}
   346  	if err = updateRequest.UnmarshalJSON(b); err != nil {
   347  		t.Fatalf("Error decoding feed metadata: %s", err)
   348  	}
   349  	updateRequest.SetData(update2Data)
   350  	if err = updateRequest.Sign(signer); err != nil {
   351  		t.Fatal(err)
   352  	}
   353  	testUrl, err = url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   354  	if err != nil {
   355  		t.Fatal(err)
   356  	}
   357  	urlQuery = testUrl.Query()
   358  	body = updateRequest.AppendValues(urlQuery) // this adds all query parameters
   359  	goodQueryParameters := urlQuery.Encode()    // save the query parameters for a second attempt
   360  
   361  	// create bad query parameters in which the signature is missing
   362  	urlQuery.Del("signature")
   363  	testUrl.RawQuery = urlQuery.Encode()
   364  
   365  	// 1st attempt with bad query parameters in which the signature is missing
   366  	resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   367  	if err != nil {
   368  		t.Fatal(err)
   369  	}
   370  	defer resp.Body.Close()
   371  	expectedCode := http.StatusBadRequest
   372  	if resp.StatusCode != expectedCode {
   373  		t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
   374  	}
   375  
   376  	// 2nd attempt with bad query parameters in which the signature is of incorrect length
   377  	urlQuery.Set("signature", "0xabcd") // should be 130 hex chars
   378  	resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   379  	if err != nil {
   380  		t.Fatal(err)
   381  	}
   382  	defer resp.Body.Close()
   383  	expectedCode = http.StatusBadRequest
   384  	if resp.StatusCode != expectedCode {
   385  		t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
   386  	}
   387  
   388  	// 3rd attempt, with good query parameters:
   389  	testUrl.RawQuery = goodQueryParameters
   390  	resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   391  	if err != nil {
   392  		t.Fatal(err)
   393  	}
   394  	defer resp.Body.Close()
   395  	expectedCode = http.StatusOK
   396  	if resp.StatusCode != expectedCode {
   397  		t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
   398  	}
   399  
   400  	// get latest update through bzz-feed directly
   401  	log.Info("get update 1.2")
   402  	testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex)
   403  	resp, err = http.Get(testBzzResUrl)
   404  	if err != nil {
   405  		t.Fatal(err)
   406  	}
   407  	defer resp.Body.Close()
   408  	if resp.StatusCode != http.StatusOK {
   409  		t.Fatalf("err %s", resp.Status)
   410  	}
   411  	b, err = ioutil.ReadAll(resp.Body)
   412  	if err != nil {
   413  		t.Fatal(err)
   414  	}
   415  	if !bytes.Equal(update2Data, b) {
   416  		t.Fatalf("Expected body '%x', got '%x'", update2Data, b)
   417  	}
   418  
   419  	// test manifest-less queries
   420  	log.Info("get first update in update1Timestamp via direct query")
   421  	query := feed.NewQuery(&updateRequest.Feed, update1Timestamp, lookup.NoClue)
   422  
   423  	urlq, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   424  	if err != nil {
   425  		t.Fatal(err)
   426  	}
   427  
   428  	values := urlq.Query()
   429  	query.AppendValues(values) // this adds feed query parameters
   430  	urlq.RawQuery = values.Encode()
   431  	resp, err = http.Get(urlq.String())
   432  	if err != nil {
   433  		t.Fatal(err)
   434  	}
   435  	defer resp.Body.Close()
   436  	if resp.StatusCode != http.StatusOK {
   437  		t.Fatalf("err %s", resp.Status)
   438  	}
   439  	b, err = ioutil.ReadAll(resp.Body)
   440  	if err != nil {
   441  		t.Fatal(err)
   442  	}
   443  	if !bytes.Equal(update1Data, b) {
   444  		t.Fatalf("Expected body '%x', got '%x'", update1Data, b)
   445  	}
   446  
   447  }
   448  
   449  func TestBzzGetPath(t *testing.T) {
   450  	testBzzGetPath(false, t)
   451  	testBzzGetPath(true, t)
   452  }
   453  
   454  func testBzzGetPath(encrypted bool, t *testing.T) {
   455  	var err error
   456  
   457  	testmanifest := []string{
   458  		`{"entries":[{"path":"b","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"c","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0}]}`,
   459  		`{"entries":[{"path":"a","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"b/","hash":"<key0>","contentType":"application/bzz-manifest+json","status":0}]}`,
   460  		`{"entries":[{"path":"a/","hash":"<key1>","contentType":"application/bzz-manifest+json","status":0}]}`,
   461  	}
   462  
   463  	testrequests := make(map[string]int)
   464  	testrequests["/"] = 2
   465  	testrequests["/a/"] = 1
   466  	testrequests["/a/b/"] = 0
   467  	testrequests["/x"] = 0
   468  	testrequests[""] = 0
   469  
   470  	expectedfailrequests := []string{"", "/x"}
   471  
   472  	reader := [3]*bytes.Reader{}
   473  
   474  	addr := [3]storage.Address{}
   475  
   476  	srv := NewTestSwarmServer(t, serverFunc, nil)
   477  	defer srv.Close()
   478  
   479  	for i, mf := range testmanifest {
   480  		reader[i] = bytes.NewReader([]byte(mf))
   481  		var wait func(context.Context) error
   482  		ctx := context.TODO()
   483  		addr[i], wait, err = srv.FileStore.Store(ctx, reader[i], int64(len(mf)), encrypted)
   484  		if err != nil {
   485  			t.Fatal(err)
   486  		}
   487  		for j := i + 1; j < len(testmanifest); j++ {
   488  			testmanifest[j] = strings.Replace(testmanifest[j], fmt.Sprintf("<key%v>", i), addr[i].Hex(), -1)
   489  		}
   490  		err = wait(ctx)
   491  		if err != nil {
   492  			t.Fatal(err)
   493  		}
   494  	}
   495  
   496  	rootRef := addr[2].Hex()
   497  
   498  	_, err = http.Get(srv.URL + "/bzz-raw:/" + rootRef + "/a")
   499  	if err != nil {
   500  		t.Fatalf("Failed to connect to proxy: %v", err)
   501  	}
   502  
   503  	for k, v := range testrequests {
   504  		var resp *http.Response
   505  		var respbody []byte
   506  
   507  		url := srv.URL + "/bzz-raw:/"
   508  		if k != "" {
   509  			url += rootRef + "/" + k[1:] + "?content_type=text/plain"
   510  		}
   511  		resp, err = http.Get(url)
   512  		if err != nil {
   513  			t.Fatalf("Request failed: %v", err)
   514  		}
   515  		defer resp.Body.Close()
   516  		respbody, err = ioutil.ReadAll(resp.Body)
   517  		if err != nil {
   518  			t.Fatalf("Error while reading response body: %v", err)
   519  		}
   520  
   521  		if string(respbody) != testmanifest[v] {
   522  			isexpectedfailrequest := false
   523  
   524  			for _, r := range expectedfailrequests {
   525  				if k == r {
   526  					isexpectedfailrequest = true
   527  				}
   528  			}
   529  			if !isexpectedfailrequest {
   530  				t.Fatalf("Response body does not match, expected: %v, got %v", testmanifest[v], string(respbody))
   531  			}
   532  		}
   533  	}
   534  
   535  	for k, v := range testrequests {
   536  		var resp *http.Response
   537  		var respbody []byte
   538  
   539  		url := srv.URL + "/bzz-hash:/"
   540  		if k != "" {
   541  			url += rootRef + "/" + k[1:]
   542  		}
   543  		resp, err = http.Get(url)
   544  		if err != nil {
   545  			t.Fatalf("Request failed: %v", err)
   546  		}
   547  		defer resp.Body.Close()
   548  		respbody, err = ioutil.ReadAll(resp.Body)
   549  		if err != nil {
   550  			t.Fatalf("Read request body: %v", err)
   551  		}
   552  
   553  		if string(respbody) != addr[v].Hex() {
   554  			isexpectedfailrequest := false
   555  
   556  			for _, r := range expectedfailrequests {
   557  				if k == r {
   558  					isexpectedfailrequest = true
   559  				}
   560  			}
   561  			if !isexpectedfailrequest {
   562  				t.Fatalf("Response body does not match, expected: %v, got %v", addr[v], string(respbody))
   563  			}
   564  		}
   565  	}
   566  
   567  	ref := addr[2].Hex()
   568  
   569  	for _, c := range []struct {
   570  		path          string
   571  		json          string
   572  		pageFragments []string
   573  	}{
   574  		{
   575  			path: "/",
   576  			json: `{"common_prefixes":["a/"]}`,
   577  			pageFragments: []string{
   578  				fmt.Sprintf("Swarm index of bzz:/%s/", ref),
   579  				`<a class="normal-link" href="a/">a/</a>`,
   580  			},
   581  		},
   582  		{
   583  			path: "/a/",
   584  			json: `{"common_prefixes":["a/b/"],"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/a","mod_time":"0001-01-01T00:00:00Z"}]}`,
   585  			pageFragments: []string{
   586  				fmt.Sprintf("Swarm index of bzz:/%s/a/", ref),
   587  				`<a class="normal-link" href="b/">b/</a>`,
   588  				fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/a">a</a>`, ref),
   589  			},
   590  		},
   591  		{
   592  			path: "/a/b/",
   593  			json: `{"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/b","mod_time":"0001-01-01T00:00:00Z"},{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/c","mod_time":"0001-01-01T00:00:00Z"}]}`,
   594  			pageFragments: []string{
   595  				fmt.Sprintf("Swarm index of bzz:/%s/a/b/", ref),
   596  				fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/b">b</a>`, ref),
   597  				fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/c">c</a>`, ref),
   598  			},
   599  		},
   600  		{
   601  			path: "/x",
   602  		},
   603  		{
   604  			path: "",
   605  		},
   606  	} {
   607  		k := c.path
   608  		url := srv.URL + "/bzz-list:/"
   609  		if k != "" {
   610  			url += rootRef + "/" + k[1:]
   611  		}
   612  		t.Run("json list "+c.path, func(t *testing.T) {
   613  			resp, err := http.Get(url)
   614  			if err != nil {
   615  				t.Fatalf("HTTP request: %v", err)
   616  			}
   617  			defer resp.Body.Close()
   618  			respbody, err := ioutil.ReadAll(resp.Body)
   619  			if err != nil {
   620  				t.Fatalf("Read response body: %v", err)
   621  			}
   622  
   623  			body := strings.TrimSpace(string(respbody))
   624  			if body != c.json {
   625  				isexpectedfailrequest := false
   626  
   627  				for _, r := range expectedfailrequests {
   628  					if k == r {
   629  						isexpectedfailrequest = true
   630  					}
   631  				}
   632  				if !isexpectedfailrequest {
   633  					t.Errorf("Response list body %q does not match, expected: %v, got %v", k, c.json, body)
   634  				}
   635  			}
   636  		})
   637  		t.Run("html list "+c.path, func(t *testing.T) {
   638  			req, err := http.NewRequest(http.MethodGet, url, nil)
   639  			if err != nil {
   640  				t.Fatalf("New request: %v", err)
   641  			}
   642  			req.Header.Set("Accept", "text/html")
   643  			resp, err := http.DefaultClient.Do(req)
   644  			if err != nil {
   645  				t.Fatalf("HTTP request: %v", err)
   646  			}
   647  			defer resp.Body.Close()
   648  			b, err := ioutil.ReadAll(resp.Body)
   649  			if err != nil {
   650  				t.Fatalf("Read response body: %v", err)
   651  			}
   652  
   653  			body := string(b)
   654  
   655  			for _, f := range c.pageFragments {
   656  				if !strings.Contains(body, f) {
   657  					isexpectedfailrequest := false
   658  
   659  					for _, r := range expectedfailrequests {
   660  						if k == r {
   661  							isexpectedfailrequest = true
   662  						}
   663  					}
   664  					if !isexpectedfailrequest {
   665  						t.Errorf("Response list body %q does not contain %q: body %q", k, f, body)
   666  					}
   667  				}
   668  			}
   669  		})
   670  	}
   671  
   672  	nonhashtests := []string{
   673  		srv.URL + "/bzz:/name",
   674  		srv.URL + "/bzz-immutable:/nonhash",
   675  		srv.URL + "/bzz-raw:/nonhash",
   676  		srv.URL + "/bzz-list:/nonhash",
   677  		srv.URL + "/bzz-hash:/nonhash",
   678  	}
   679  
   680  	nonhashresponses := []string{
   681  		`cannot resolve name: no DNS to resolve name: "name"`,
   682  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   683  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   684  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   685  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   686  	}
   687  
   688  	for i, url := range nonhashtests {
   689  		var resp *http.Response
   690  		var respbody []byte
   691  
   692  		resp, err = http.Get(url)
   693  
   694  		if err != nil {
   695  			t.Fatalf("Request failed: %v", err)
   696  		}
   697  		defer resp.Body.Close()
   698  		respbody, err = ioutil.ReadAll(resp.Body)
   699  		if err != nil {
   700  			t.Fatalf("ReadAll failed: %v", err)
   701  		}
   702  		if !strings.Contains(string(respbody), nonhashresponses[i]) {
   703  			t.Fatalf("Non-Hash response body does not match, expected: %v, got: %v", nonhashresponses[i], string(respbody))
   704  		}
   705  	}
   706  }
   707  
   708  func TestBzzTar(t *testing.T) {
   709  	testBzzTar(false, t)
   710  	testBzzTar(true, t)
   711  }
   712  
   713  func testBzzTar(encrypted bool, t *testing.T) {
   714  	srv := NewTestSwarmServer(t, serverFunc, nil)
   715  	defer srv.Close()
   716  	fileNames := []string{"tmp1.txt", "tmp2.lock", "tmp3.rtf"}
   717  	fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"}
   718  
   719  	buf := &bytes.Buffer{}
   720  	tw := tar.NewWriter(buf)
   721  	defer tw.Close()
   722  
   723  	for i, v := range fileNames {
   724  		size := int64(len(fileContents[i]))
   725  		hdr := &tar.Header{
   726  			Name:    v,
   727  			Mode:    0644,
   728  			Size:    size,
   729  			ModTime: time.Now(),
   730  			Xattrs: map[string]string{
   731  				"user.swarm.content-type": "text/plain",
   732  			},
   733  		}
   734  		if err := tw.WriteHeader(hdr); err != nil {
   735  			t.Fatal(err)
   736  		}
   737  
   738  		// copy the file into the tar stream
   739  		n, err := io.Copy(tw, bytes.NewBufferString(fileContents[i]))
   740  		if err != nil {
   741  			t.Fatal(err)
   742  		} else if n != size {
   743  			t.Fatal("size mismatch")
   744  		}
   745  	}
   746  
   747  	//post tar stream
   748  	url := srv.URL + "/bzz:/"
   749  	if encrypted {
   750  		url = url + "encrypt"
   751  	}
   752  	req, err := http.NewRequest("POST", url, buf)
   753  	if err != nil {
   754  		t.Fatal(err)
   755  	}
   756  	req.Header.Add("Content-Type", "application/x-tar")
   757  	client := &http.Client{}
   758  	resp2, err := client.Do(req)
   759  	if err != nil {
   760  		t.Fatal(err)
   761  	}
   762  	if resp2.StatusCode != http.StatusOK {
   763  		t.Fatalf("err %s", resp2.Status)
   764  	}
   765  	swarmHash, err := ioutil.ReadAll(resp2.Body)
   766  	resp2.Body.Close()
   767  	if err != nil {
   768  		t.Fatal(err)
   769  	}
   770  
   771  	// now do a GET to get a tarball back
   772  	req, err = http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s", string(swarmHash)), nil)
   773  	if err != nil {
   774  		t.Fatal(err)
   775  	}
   776  	req.Header.Add("Accept", "application/x-tar")
   777  	resp2, err = client.Do(req)
   778  	if err != nil {
   779  		t.Fatal(err)
   780  	}
   781  	defer resp2.Body.Close()
   782  
   783  	if h := resp2.Header.Get("Content-Type"); h != "application/x-tar" {
   784  		t.Fatalf("Content-Type header expected: application/x-tar, got: %s", h)
   785  	}
   786  
   787  	expectedFileName := string(swarmHash) + ".tar"
   788  	expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", expectedFileName)
   789  	if h := resp2.Header.Get("Content-Disposition"); h != expectedContentDisposition {
   790  		t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h)
   791  	}
   792  
   793  	file, err := ioutil.TempFile("", "swarm-downloaded-tarball")
   794  	if err != nil {
   795  		t.Fatal(err)
   796  	}
   797  	defer os.Remove(file.Name())
   798  	_, err = io.Copy(file, resp2.Body)
   799  	if err != nil {
   800  		t.Fatalf("error getting tarball: %v", err)
   801  	}
   802  	file.Sync()
   803  	file.Close()
   804  
   805  	tarFileHandle, err := os.Open(file.Name())
   806  	if err != nil {
   807  		t.Fatal(err)
   808  	}
   809  	tr := tar.NewReader(tarFileHandle)
   810  
   811  	for {
   812  		hdr, err := tr.Next()
   813  		if err == io.EOF {
   814  			break
   815  		} else if err != nil {
   816  			t.Fatalf("error reading tar stream: %s", err)
   817  		}
   818  		bb := make([]byte, hdr.Size)
   819  		_, err = tr.Read(bb)
   820  		if err != nil && err != io.EOF {
   821  			t.Fatal(err)
   822  		}
   823  		passed := false
   824  		for i, v := range fileNames {
   825  			if v == hdr.Name {
   826  				if string(bb) == fileContents[i] {
   827  					passed = true
   828  					break
   829  				}
   830  			}
   831  		}
   832  		if !passed {
   833  			t.Fatalf("file %s did not pass content assertion", hdr.Name)
   834  		}
   835  	}
   836  }
   837  
   838  // TestBzzRootRedirect tests that getting the root path of a manifest without
   839  // a trailing slash gets redirected to include the trailing slash so that
   840  // relative URLs work as expected.
   841  func TestBzzRootRedirect(t *testing.T) {
   842  	testBzzRootRedirect(false, t)
   843  }
   844  func TestBzzRootRedirectEncrypted(t *testing.T) {
   845  	testBzzRootRedirect(true, t)
   846  }
   847  
   848  func testBzzRootRedirect(toEncrypt bool, t *testing.T) {
   849  	srv := NewTestSwarmServer(t, serverFunc, nil)
   850  	defer srv.Close()
   851  
   852  	// create a manifest with some data at the root path
   853  	client := swarm.NewClient(srv.URL)
   854  	data := []byte("data")
   855  	file := &swarm.File{
   856  		ReadCloser: ioutil.NopCloser(bytes.NewReader(data)),
   857  		ManifestEntry: api.ManifestEntry{
   858  			Path:        "",
   859  			ContentType: "text/plain",
   860  			Size:        int64(len(data)),
   861  		},
   862  	}
   863  	hash, err := client.Upload(file, "", toEncrypt)
   864  	if err != nil {
   865  		t.Fatal(err)
   866  	}
   867  
   868  	// define a CheckRedirect hook which ensures there is only a single
   869  	// redirect to the correct URL
   870  	redirected := false
   871  	httpClient := http.Client{
   872  		CheckRedirect: func(req *http.Request, via []*http.Request) error {
   873  			if redirected {
   874  				return errors.New("too many redirects")
   875  			}
   876  			redirected = true
   877  			expectedPath := "/bzz:/" + hash + "/"
   878  			if req.URL.Path != expectedPath {
   879  				return fmt.Errorf("expected redirect to %q, got %q", expectedPath, req.URL.Path)
   880  			}
   881  			return nil
   882  		},
   883  	}
   884  
   885  	// perform the GET request and assert the response
   886  	res, err := httpClient.Get(srv.URL + "/bzz:/" + hash)
   887  	if err != nil {
   888  		t.Fatal(err)
   889  	}
   890  	defer res.Body.Close()
   891  	if !redirected {
   892  		t.Fatal("expected GET /bzz:/<hash> to redirect to /bzz:/<hash>/ but it didn't")
   893  	}
   894  	gotData, err := ioutil.ReadAll(res.Body)
   895  	if err != nil {
   896  		t.Fatal(err)
   897  	}
   898  	if !bytes.Equal(gotData, data) {
   899  		t.Fatalf("expected response to equal %q, got %q", data, gotData)
   900  	}
   901  }
   902  
   903  func TestMethodsNotAllowed(t *testing.T) {
   904  	srv := NewTestSwarmServer(t, serverFunc, nil)
   905  	defer srv.Close()
   906  	databytes := "bar"
   907  	for _, c := range []struct {
   908  		url  string
   909  		code int
   910  	}{
   911  		{
   912  			url:  fmt.Sprintf("%s/bzz-list:/", srv.URL),
   913  			code: http.StatusMethodNotAllowed,
   914  		}, {
   915  			url:  fmt.Sprintf("%s/bzz-hash:/", srv.URL),
   916  			code: http.StatusMethodNotAllowed,
   917  		},
   918  		{
   919  			url:  fmt.Sprintf("%s/bzz-immutable:/", srv.URL),
   920  			code: http.StatusMethodNotAllowed,
   921  		},
   922  	} {
   923  		res, _ := http.Post(c.url, "text/plain", bytes.NewReader([]byte(databytes)))
   924  		if res.StatusCode != c.code {
   925  			t.Fatalf("should have failed. requested url: %s, expected code %d, got %d", c.url, c.code, res.StatusCode)
   926  		}
   927  	}
   928  
   929  }
   930  
   931  func httpDo(httpMethod string, url string, reqBody io.Reader, headers map[string]string, verbose bool, t *testing.T) (*http.Response, string) {
   932  	// Build the Request
   933  	req, err := http.NewRequest(httpMethod, url, reqBody)
   934  	if err != nil {
   935  		t.Fatal(err)
   936  	}
   937  	for key, value := range headers {
   938  		req.Header.Set(key, value)
   939  	}
   940  	if verbose {
   941  		t.Log(req.Method, req.URL, req.Header, req.Body)
   942  	}
   943  
   944  	// Send Request out
   945  	httpClient := &http.Client{}
   946  	res, err := httpClient.Do(req)
   947  	if err != nil {
   948  		t.Fatal(err)
   949  	}
   950  
   951  	// Read the HTTP Body
   952  	buffer, err := ioutil.ReadAll(res.Body)
   953  	if err != nil {
   954  		t.Fatal(err)
   955  	}
   956  	defer res.Body.Close()
   957  	body := string(buffer)
   958  
   959  	return res, body
   960  }
   961  
   962  func TestGet(t *testing.T) {
   963  	srv := NewTestSwarmServer(t, serverFunc, nil)
   964  	defer srv.Close()
   965  
   966  	for _, testCase := range []struct {
   967  		uri                string
   968  		method             string
   969  		headers            map[string]string
   970  		expectedStatusCode int
   971  		assertResponseBody string
   972  		verbose            bool
   973  	}{
   974  		{
   975  			uri:                fmt.Sprintf("%s/", srv.URL),
   976  			method:             "GET",
   977  			headers:            map[string]string{"Accept": "text/html"},
   978  			expectedStatusCode: http.StatusOK,
   979  			assertResponseBody: "Swarm: Serverless Hosting Incentivised Peer-To-Peer Storage And Content Distribution",
   980  			verbose:            false,
   981  		},
   982  		{
   983  			uri:                fmt.Sprintf("%s/", srv.URL),
   984  			method:             "GET",
   985  			headers:            map[string]string{"Accept": "application/json"},
   986  			expectedStatusCode: http.StatusOK,
   987  			assertResponseBody: "Swarm: Please request a valid ENS or swarm hash with the appropriate bzz scheme",
   988  			verbose:            false,
   989  		},
   990  		{
   991  			uri:                fmt.Sprintf("%s/robots.txt", srv.URL),
   992  			method:             "GET",
   993  			headers:            map[string]string{"Accept": "text/html"},
   994  			expectedStatusCode: http.StatusOK,
   995  			assertResponseBody: "User-agent: *\nDisallow: /",
   996  			verbose:            false,
   997  		},
   998  		{
   999  			uri:                fmt.Sprintf("%s/nonexistent_path", srv.URL),
  1000  			method:             "GET",
  1001  			headers:            map[string]string{},
  1002  			expectedStatusCode: http.StatusNotFound,
  1003  			verbose:            false,
  1004  		},
  1005  		{
  1006  			uri:                fmt.Sprintf("%s/bzz:asdf/", srv.URL),
  1007  			method:             "GET",
  1008  			headers:            map[string]string{},
  1009  			expectedStatusCode: http.StatusNotFound,
  1010  			verbose:            false,
  1011  		},
  1012  		{
  1013  			uri:                fmt.Sprintf("%s/tbz2/", srv.URL),
  1014  			method:             "GET",
  1015  			headers:            map[string]string{},
  1016  			expectedStatusCode: http.StatusNotFound,
  1017  			verbose:            false,
  1018  		},
  1019  		{
  1020  			uri:                fmt.Sprintf("%s/bzz-rack:/", srv.URL),
  1021  			method:             "GET",
  1022  			headers:            map[string]string{},
  1023  			expectedStatusCode: http.StatusNotFound,
  1024  			verbose:            false,
  1025  		},
  1026  		{
  1027  			uri:                fmt.Sprintf("%s/bzz-ls", srv.URL),
  1028  			method:             "GET",
  1029  			headers:            map[string]string{},
  1030  			expectedStatusCode: http.StatusNotFound,
  1031  			verbose:            false,
  1032  		}} {
  1033  		t.Run("GET "+testCase.uri, func(t *testing.T) {
  1034  			res, body := httpDo(testCase.method, testCase.uri, nil, testCase.headers, testCase.verbose, t)
  1035  			if res.StatusCode != testCase.expectedStatusCode {
  1036  				t.Fatalf("expected status code %d but got %d", testCase.expectedStatusCode, res.StatusCode)
  1037  			}
  1038  			if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) {
  1039  				t.Fatalf("expected response to be: %s but got: %s", testCase.assertResponseBody, body)
  1040  			}
  1041  		})
  1042  	}
  1043  }
  1044  
  1045  func TestModify(t *testing.T) {
  1046  	srv := NewTestSwarmServer(t, serverFunc, nil)
  1047  	defer srv.Close()
  1048  
  1049  	swarmClient := swarm.NewClient(srv.URL)
  1050  	data := []byte("data")
  1051  	file := &swarm.File{
  1052  		ReadCloser: ioutil.NopCloser(bytes.NewReader(data)),
  1053  		ManifestEntry: api.ManifestEntry{
  1054  			Path:        "",
  1055  			ContentType: "text/plain",
  1056  			Size:        int64(len(data)),
  1057  		},
  1058  	}
  1059  
  1060  	hash, err := swarmClient.Upload(file, "", false)
  1061  	if err != nil {
  1062  		t.Fatal(err)
  1063  	}
  1064  
  1065  	for _, testCase := range []struct {
  1066  		uri                   string
  1067  		method                string
  1068  		headers               map[string]string
  1069  		requestBody           []byte
  1070  		expectedStatusCode    int
  1071  		assertResponseBody    string
  1072  		assertResponseHeaders map[string]string
  1073  		verbose               bool
  1074  	}{
  1075  		{
  1076  			uri:                fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
  1077  			method:             "DELETE",
  1078  			headers:            map[string]string{},
  1079  			expectedStatusCode: http.StatusOK,
  1080  			assertResponseBody: "8b634aea26eec353ac0ecbec20c94f44d6f8d11f38d4578a4c207a84c74ef731",
  1081  			verbose:            false,
  1082  		},
  1083  		{
  1084  			uri:                fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
  1085  			method:             "PUT",
  1086  			headers:            map[string]string{},
  1087  			expectedStatusCode: http.StatusMethodNotAllowed,
  1088  			verbose:            false,
  1089  		},
  1090  		{
  1091  			uri:                fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, hash),
  1092  			method:             "PUT",
  1093  			headers:            map[string]string{},
  1094  			expectedStatusCode: http.StatusMethodNotAllowed,
  1095  			verbose:            false,
  1096  		},
  1097  		{
  1098  			uri:                fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
  1099  			method:             "PATCH",
  1100  			headers:            map[string]string{},
  1101  			expectedStatusCode: http.StatusMethodNotAllowed,
  1102  			verbose:            false,
  1103  		},
  1104  		{
  1105  			uri:                   fmt.Sprintf("%s/bzz-raw:/", srv.URL),
  1106  			method:                "POST",
  1107  			headers:               map[string]string{},
  1108  			requestBody:           []byte("POSTdata"),
  1109  			expectedStatusCode:    http.StatusOK,
  1110  			assertResponseHeaders: map[string]string{"Content-Length": "64"},
  1111  			verbose:               false,
  1112  		},
  1113  		{
  1114  			uri:                   fmt.Sprintf("%s/bzz-raw:/encrypt", srv.URL),
  1115  			method:                "POST",
  1116  			headers:               map[string]string{},
  1117  			requestBody:           []byte("POSTdata"),
  1118  			expectedStatusCode:    http.StatusOK,
  1119  			assertResponseHeaders: map[string]string{"Content-Length": "128"},
  1120  			verbose:               false,
  1121  		},
  1122  	} {
  1123  		t.Run(testCase.method+" "+testCase.uri, func(t *testing.T) {
  1124  			reqBody := bytes.NewReader(testCase.requestBody)
  1125  			res, body := httpDo(testCase.method, testCase.uri, reqBody, testCase.headers, testCase.verbose, t)
  1126  
  1127  			if res.StatusCode != testCase.expectedStatusCode {
  1128  				t.Fatalf("expected status code %d but got %d, %s", testCase.expectedStatusCode, res.StatusCode, body)
  1129  			}
  1130  			if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) {
  1131  				t.Log(body)
  1132  				t.Fatalf("expected response %s but got %s", testCase.assertResponseBody, body)
  1133  			}
  1134  			for key, value := range testCase.assertResponseHeaders {
  1135  				if res.Header.Get(key) != value {
  1136  					t.Logf("expected %s=%s in HTTP response header but got %s", key, value, res.Header.Get(key))
  1137  				}
  1138  			}
  1139  		})
  1140  	}
  1141  }
  1142  
  1143  func TestMultiPartUpload(t *testing.T) {
  1144  	// POST /bzz:/ Content-Type: multipart/form-data
  1145  	verbose := false
  1146  	// Setup Swarm
  1147  	srv := NewTestSwarmServer(t, serverFunc, nil)
  1148  	defer srv.Close()
  1149  
  1150  	url := fmt.Sprintf("%s/bzz:/", srv.URL)
  1151  
  1152  	buf := new(bytes.Buffer)
  1153  	form := multipart.NewWriter(buf)
  1154  	form.WriteField("name", "John Doe")
  1155  	file1, _ := form.CreateFormFile("cv", "cv.txt")
  1156  	file1.Write([]byte("John Doe's Credentials"))
  1157  	file2, _ := form.CreateFormFile("profile_picture", "profile.jpg")
  1158  	file2.Write([]byte("imaginethisisjpegdata"))
  1159  	form.Close()
  1160  
  1161  	headers := map[string]string{
  1162  		"Content-Type":   form.FormDataContentType(),
  1163  		"Content-Length": strconv.Itoa(buf.Len()),
  1164  	}
  1165  	res, body := httpDo("POST", url, buf, headers, verbose, t)
  1166  
  1167  	if res.StatusCode != http.StatusOK {
  1168  		t.Fatalf("expected POST multipart/form-data to return 200, but it returned %d", res.StatusCode)
  1169  	}
  1170  	if len(body) != 64 {
  1171  		t.Fatalf("expected POST multipart/form-data to return a 64 char manifest but the answer was %d chars long", len(body))
  1172  	}
  1173  }
  1174  
  1175  // TestBzzGetFileWithResolver tests fetching a file using a mocked ENS resolver
  1176  func TestBzzGetFileWithResolver(t *testing.T) {
  1177  	resolver := newTestResolveValidator("")
  1178  	srv := NewTestSwarmServer(t, serverFunc, resolver)
  1179  	defer srv.Close()
  1180  	fileNames := []string{"dir1/tmp1.txt", "dir2/tmp2.lock", "dir3/tmp3.rtf"}
  1181  	fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"}
  1182  
  1183  	buf := &bytes.Buffer{}
  1184  	tw := tar.NewWriter(buf)
  1185  
  1186  	for i, v := range fileNames {
  1187  		size := len(fileContents[i])
  1188  		hdr := &tar.Header{
  1189  			Name:    v,
  1190  			Mode:    0644,
  1191  			Size:    int64(size),
  1192  			ModTime: time.Now(),
  1193  			Xattrs: map[string]string{
  1194  				"user.swarm.content-type": "text/plain",
  1195  			},
  1196  		}
  1197  		if err := tw.WriteHeader(hdr); err != nil {
  1198  			t.Fatal(err)
  1199  		}
  1200  
  1201  		// copy the file into the tar stream
  1202  		n, err := io.WriteString(tw, fileContents[i])
  1203  		if err != nil {
  1204  			t.Fatal(err)
  1205  		} else if n != size {
  1206  			t.Fatal("size mismatch")
  1207  		}
  1208  	}
  1209  
  1210  	if err := tw.Close(); err != nil {
  1211  		t.Fatal(err)
  1212  	}
  1213  
  1214  	//post tar stream
  1215  	url := srv.URL + "/bzz:/"
  1216  
  1217  	req, err := http.NewRequest("POST", url, buf)
  1218  	if err != nil {
  1219  		t.Fatal(err)
  1220  	}
  1221  	req.Header.Add("Content-Type", "application/x-tar")
  1222  	client := &http.Client{}
  1223  	serverResponse, err := client.Do(req)
  1224  	if err != nil {
  1225  		t.Fatal(err)
  1226  	}
  1227  	if serverResponse.StatusCode != http.StatusOK {
  1228  		t.Fatalf("err %s", serverResponse.Status)
  1229  	}
  1230  	swarmHash, err := ioutil.ReadAll(serverResponse.Body)
  1231  	serverResponse.Body.Close()
  1232  	if err != nil {
  1233  		t.Fatal(err)
  1234  	}
  1235  	// set the resolved hash to be the swarm hash of what we've just uploaded
  1236  	hash := common.HexToHash(string(swarmHash))
  1237  	resolver.hash = &hash
  1238  	for _, v := range []struct {
  1239  		addr                string
  1240  		path                string
  1241  		expectedStatusCode  int
  1242  		expectedContentType string
  1243  		expectedFileName    string
  1244  	}{
  1245  		{
  1246  			addr:                string(swarmHash),
  1247  			path:                fileNames[0],
  1248  			expectedStatusCode:  http.StatusOK,
  1249  			expectedContentType: "text/plain",
  1250  			expectedFileName:    path.Base(fileNames[0]),
  1251  		},
  1252  		{
  1253  			addr:                "somebogusensname",
  1254  			path:                fileNames[0],
  1255  			expectedStatusCode:  http.StatusOK,
  1256  			expectedContentType: "text/plain",
  1257  			expectedFileName:    path.Base(fileNames[0]),
  1258  		},
  1259  	} {
  1260  		req, err := http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s/%s", v.addr, v.path), nil)
  1261  		if err != nil {
  1262  			t.Fatal(err)
  1263  		}
  1264  		serverResponse, err := client.Do(req)
  1265  		if err != nil {
  1266  			t.Fatal(err)
  1267  		}
  1268  		defer serverResponse.Body.Close()
  1269  		if serverResponse.StatusCode != v.expectedStatusCode {
  1270  			t.Fatalf("expected %d, got %d", v.expectedStatusCode, serverResponse.StatusCode)
  1271  		}
  1272  
  1273  		if h := serverResponse.Header.Get("Content-Type"); h != v.expectedContentType {
  1274  			t.Fatalf("Content-Type header expected: %s, got %s", v.expectedContentType, h)
  1275  		}
  1276  
  1277  		expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", v.expectedFileName)
  1278  		if h := serverResponse.Header.Get("Content-Disposition"); h != expectedContentDisposition {
  1279  			t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h)
  1280  		}
  1281  
  1282  	}
  1283  }
  1284  
  1285  // testResolver implements the Resolver interface and either returns the given
  1286  // hash if it is set, or returns a "name not found" error
  1287  type testResolveValidator struct {
  1288  	hash *common.Hash
  1289  }
  1290  
  1291  func newTestResolveValidator(addr string) *testResolveValidator {
  1292  	r := &testResolveValidator{}
  1293  	if addr != "" {
  1294  		hash := common.HexToHash(addr)
  1295  		r.hash = &hash
  1296  	}
  1297  	return r
  1298  }
  1299  
  1300  func (t *testResolveValidator) Resolve(addr string) (common.Hash, error) {
  1301  	if t.hash == nil {
  1302  		return common.Hash{}, fmt.Errorf("DNS name not found: %q", addr)
  1303  	}
  1304  	return *t.hash, nil
  1305  }
  1306  
  1307  func (t *testResolveValidator) Owner(node [32]byte) (addr common.Address, err error) {
  1308  	return
  1309  }
  1310  func (t *testResolveValidator) HeaderByNumber(context.Context, *big.Int) (header *types.Header, err error) {
  1311  	return
  1312  }