github.com/bcnmy/go-ethereum@v1.10.27/rpc/websocket_test.go (about) 1 // Copyright 2018 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package rpc 18 19 import ( 20 "context" 21 "errors" 22 "io" 23 "net" 24 "net/http" 25 "net/http/httptest" 26 "net/http/httputil" 27 "net/url" 28 "strings" 29 "sync/atomic" 30 "testing" 31 "time" 32 33 "github.com/gorilla/websocket" 34 ) 35 36 func TestWebsocketClientHeaders(t *testing.T) { 37 t.Parallel() 38 39 endpoint, header, err := wsClientHeaders("wss://testuser:test-PASS_01@example.com:1234", "https://example.com") 40 if err != nil { 41 t.Fatalf("wsGetConfig failed: %s", err) 42 } 43 if endpoint != "wss://example.com:1234" { 44 t.Fatal("User should have been stripped from the URL") 45 } 46 if header.Get("authorization") != "Basic dGVzdHVzZXI6dGVzdC1QQVNTXzAx" { 47 t.Fatal("Basic auth header is incorrect") 48 } 49 if header.Get("origin") != "https://example.com" { 50 t.Fatal("Origin not set") 51 } 52 } 53 54 // This test checks that the server rejects connections from disallowed origins. 55 func TestWebsocketOriginCheck(t *testing.T) { 56 t.Parallel() 57 58 var ( 59 srv = newTestServer() 60 httpsrv = httptest.NewServer(srv.WebsocketHandler([]string{"http://example.com"})) 61 wsURL = "ws:" + strings.TrimPrefix(httpsrv.URL, "http:") 62 ) 63 defer srv.Stop() 64 defer httpsrv.Close() 65 66 client, err := DialWebsocket(context.Background(), wsURL, "http://ekzample.com") 67 if err == nil { 68 client.Close() 69 t.Fatal("no error for wrong origin") 70 } 71 wantErr := wsHandshakeError{websocket.ErrBadHandshake, "403 Forbidden"} 72 if !errors.Is(err, wantErr) { 73 t.Fatalf("wrong error for wrong origin: %q", err) 74 } 75 76 // Connections without origin header should work. 77 client, err = DialWebsocket(context.Background(), wsURL, "") 78 if err != nil { 79 t.Fatalf("error for empty origin: %v", err) 80 } 81 client.Close() 82 } 83 84 // This test checks whether calls exceeding the request size limit are rejected. 85 func TestWebsocketLargeCall(t *testing.T) { 86 t.Parallel() 87 88 var ( 89 srv = newTestServer() 90 httpsrv = httptest.NewServer(srv.WebsocketHandler([]string{"*"})) 91 wsURL = "ws:" + strings.TrimPrefix(httpsrv.URL, "http:") 92 ) 93 defer srv.Stop() 94 defer httpsrv.Close() 95 96 client, err := DialWebsocket(context.Background(), wsURL, "") 97 if err != nil { 98 t.Fatalf("can't dial: %v", err) 99 } 100 defer client.Close() 101 102 // This call sends slightly less than the limit and should work. 103 var result echoResult 104 arg := strings.Repeat("x", maxRequestContentLength-200) 105 if err := client.Call(&result, "test_echo", arg, 1); err != nil { 106 t.Fatalf("valid call didn't work: %v", err) 107 } 108 if result.String != arg { 109 t.Fatal("wrong string echoed") 110 } 111 112 // This call sends twice the allowed size and shouldn't work. 113 arg = strings.Repeat("x", maxRequestContentLength*2) 114 err = client.Call(&result, "test_echo", arg) 115 if err == nil { 116 t.Fatal("no error for too large call") 117 } 118 } 119 120 func TestWebsocketPeerInfo(t *testing.T) { 121 var ( 122 s = newTestServer() 123 ts = httptest.NewServer(s.WebsocketHandler([]string{"origin.example.com"})) 124 tsurl = "ws:" + strings.TrimPrefix(ts.URL, "http:") 125 ) 126 defer s.Stop() 127 defer ts.Close() 128 129 ctx := context.Background() 130 c, err := DialWebsocket(ctx, tsurl, "origin.example.com") 131 if err != nil { 132 t.Fatal(err) 133 } 134 135 // Request peer information. 136 var connInfo PeerInfo 137 if err := c.Call(&connInfo, "test_peerInfo"); err != nil { 138 t.Fatal(err) 139 } 140 141 if connInfo.RemoteAddr == "" { 142 t.Error("RemoteAddr not set") 143 } 144 if connInfo.Transport != "ws" { 145 t.Errorf("wrong Transport %q", connInfo.Transport) 146 } 147 if connInfo.HTTP.UserAgent != "Go-http-client/1.1" { 148 t.Errorf("wrong HTTP.UserAgent %q", connInfo.HTTP.UserAgent) 149 } 150 if connInfo.HTTP.Origin != "origin.example.com" { 151 t.Errorf("wrong HTTP.Origin %q", connInfo.HTTP.UserAgent) 152 } 153 } 154 155 // This test checks that client handles WebSocket ping frames correctly. 156 func TestClientWebsocketPing(t *testing.T) { 157 t.Parallel() 158 159 var ( 160 sendPing = make(chan struct{}) 161 server = wsPingTestServer(t, sendPing) 162 ctx, cancel = context.WithTimeout(context.Background(), 1*time.Second) 163 ) 164 defer cancel() 165 defer server.Shutdown(ctx) 166 167 client, err := DialContext(ctx, "ws://"+server.Addr) 168 if err != nil { 169 t.Fatalf("client dial error: %v", err) 170 } 171 defer client.Close() 172 173 resultChan := make(chan int) 174 sub, err := client.EthSubscribe(ctx, resultChan, "foo") 175 if err != nil { 176 t.Fatalf("client subscribe error: %v", err) 177 } 178 // Note: Unsubscribe is not called on this subscription because the mockup 179 // server can't handle the request. 180 181 // Wait for the context's deadline to be reached before proceeding. 182 // This is important for reproducing https://github.com/ethereum/go-ethereum/issues/19798 183 <-ctx.Done() 184 close(sendPing) 185 186 // Wait for the subscription result. 187 timeout := time.NewTimer(5 * time.Second) 188 defer timeout.Stop() 189 for { 190 select { 191 case err := <-sub.Err(): 192 t.Error("client subscription error:", err) 193 case result := <-resultChan: 194 t.Log("client got result:", result) 195 return 196 case <-timeout.C: 197 t.Error("didn't get any result within the test timeout") 198 return 199 } 200 } 201 } 202 203 // This checks that the websocket transport can deal with large messages. 204 func TestClientWebsocketLargeMessage(t *testing.T) { 205 var ( 206 srv = NewServer() 207 httpsrv = httptest.NewServer(srv.WebsocketHandler(nil)) 208 wsURL = "ws:" + strings.TrimPrefix(httpsrv.URL, "http:") 209 ) 210 defer srv.Stop() 211 defer httpsrv.Close() 212 213 respLength := wsMessageSizeLimit - 50 214 srv.RegisterName("test", largeRespService{respLength}) 215 216 c, err := DialWebsocket(context.Background(), wsURL, "") 217 if err != nil { 218 t.Fatal(err) 219 } 220 221 var r string 222 if err := c.Call(&r, "test_largeResp"); err != nil { 223 t.Fatal("call failed:", err) 224 } 225 if len(r) != respLength { 226 t.Fatalf("response has wrong length %d, want %d", len(r), respLength) 227 } 228 } 229 230 func TestClientWebsocketSevered(t *testing.T) { 231 t.Parallel() 232 233 var ( 234 server = wsPingTestServer(t, nil) 235 ctx = context.Background() 236 ) 237 defer server.Shutdown(ctx) 238 239 u, err := url.Parse("http://" + server.Addr) 240 if err != nil { 241 t.Fatal(err) 242 } 243 rproxy := httputil.NewSingleHostReverseProxy(u) 244 var severable *severableReadWriteCloser 245 rproxy.ModifyResponse = func(response *http.Response) error { 246 severable = &severableReadWriteCloser{ReadWriteCloser: response.Body.(io.ReadWriteCloser)} 247 response.Body = severable 248 return nil 249 } 250 frontendProxy := httptest.NewServer(rproxy) 251 defer frontendProxy.Close() 252 253 wsURL := "ws:" + strings.TrimPrefix(frontendProxy.URL, "http:") 254 client, err := DialWebsocket(ctx, wsURL, "") 255 if err != nil { 256 t.Fatalf("client dial error: %v", err) 257 } 258 defer client.Close() 259 260 resultChan := make(chan int) 261 sub, err := client.EthSubscribe(ctx, resultChan, "foo") 262 if err != nil { 263 t.Fatalf("client subscribe error: %v", err) 264 } 265 266 // sever the connection 267 severable.Sever() 268 269 // Wait for subscription error. 270 timeout := time.NewTimer(3 * wsPingInterval) 271 defer timeout.Stop() 272 for { 273 select { 274 case err := <-sub.Err(): 275 t.Log("client subscription error:", err) 276 return 277 case result := <-resultChan: 278 t.Error("unexpected result:", result) 279 return 280 case <-timeout.C: 281 t.Error("didn't get any error within the test timeout") 282 return 283 } 284 } 285 } 286 287 // wsPingTestServer runs a WebSocket server which accepts a single subscription request. 288 // When a value arrives on sendPing, the server sends a ping frame, waits for a matching 289 // pong and finally delivers a single subscription result. 290 func wsPingTestServer(t *testing.T, sendPing <-chan struct{}) *http.Server { 291 var srv http.Server 292 shutdown := make(chan struct{}) 293 srv.RegisterOnShutdown(func() { 294 close(shutdown) 295 }) 296 srv.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { 297 // Upgrade to WebSocket. 298 upgrader := websocket.Upgrader{ 299 CheckOrigin: func(r *http.Request) bool { return true }, 300 } 301 conn, err := upgrader.Upgrade(w, r, nil) 302 if err != nil { 303 t.Errorf("server WS upgrade error: %v", err) 304 return 305 } 306 defer conn.Close() 307 308 // Handle the connection. 309 wsPingTestHandler(t, conn, shutdown, sendPing) 310 }) 311 312 // Start the server. 313 listener, err := net.Listen("tcp", "127.0.0.1:0") 314 if err != nil { 315 t.Fatal("can't listen:", err) 316 } 317 srv.Addr = listener.Addr().String() 318 go srv.Serve(listener) 319 return &srv 320 } 321 322 func wsPingTestHandler(t *testing.T, conn *websocket.Conn, shutdown, sendPing <-chan struct{}) { 323 // Canned responses for the eth_subscribe call in TestClientWebsocketPing. 324 const ( 325 subResp = `{"jsonrpc":"2.0","id":1,"result":"0x00"}` 326 subNotify = `{"jsonrpc":"2.0","method":"eth_subscription","params":{"subscription":"0x00","result":1}}` 327 ) 328 329 // Handle subscribe request. 330 if _, _, err := conn.ReadMessage(); err != nil { 331 t.Errorf("server read error: %v", err) 332 return 333 } 334 if err := conn.WriteMessage(websocket.TextMessage, []byte(subResp)); err != nil { 335 t.Errorf("server write error: %v", err) 336 return 337 } 338 339 // Read from the connection to process control messages. 340 var pongCh = make(chan string) 341 conn.SetPongHandler(func(d string) error { 342 t.Logf("server got pong: %q", d) 343 pongCh <- d 344 return nil 345 }) 346 go func() { 347 for { 348 typ, msg, err := conn.ReadMessage() 349 if err != nil { 350 return 351 } 352 t.Logf("server got message (%d): %q", typ, msg) 353 } 354 }() 355 356 // Write messages. 357 var ( 358 wantPong string 359 timer = time.NewTimer(0) 360 ) 361 defer timer.Stop() 362 <-timer.C 363 for { 364 select { 365 case _, open := <-sendPing: 366 if !open { 367 sendPing = nil 368 } 369 t.Logf("server sending ping") 370 conn.WriteMessage(websocket.PingMessage, []byte("ping")) 371 wantPong = "ping" 372 case data := <-pongCh: 373 if wantPong == "" { 374 t.Errorf("unexpected pong") 375 } else if data != wantPong { 376 t.Errorf("got pong with wrong data %q", data) 377 } 378 wantPong = "" 379 timer.Reset(200 * time.Millisecond) 380 case <-timer.C: 381 t.Logf("server sending response") 382 conn.WriteMessage(websocket.TextMessage, []byte(subNotify)) 383 case <-shutdown: 384 conn.Close() 385 return 386 } 387 } 388 } 389 390 // severableReadWriteCloser wraps an io.ReadWriteCloser and provides a Sever() method to drop writes and read empty. 391 type severableReadWriteCloser struct { 392 io.ReadWriteCloser 393 severed int32 // atomic 394 } 395 396 func (s *severableReadWriteCloser) Sever() { 397 atomic.StoreInt32(&s.severed, 1) 398 } 399 400 func (s *severableReadWriteCloser) Read(p []byte) (n int, err error) { 401 if atomic.LoadInt32(&s.severed) > 0 { 402 return 0, nil 403 } 404 return s.ReadWriteCloser.Read(p) 405 } 406 407 func (s *severableReadWriteCloser) Write(p []byte) (n int, err error) { 408 if atomic.LoadInt32(&s.severed) > 0 { 409 return len(p), nil 410 } 411 return s.ReadWriteCloser.Write(p) 412 } 413 414 func (s *severableReadWriteCloser) Close() error { 415 return s.ReadWriteCloser.Close() 416 }