github.com/codingfuture/orig-energi3@v0.8.4/swarm/api/http/server_test.go (about) 1 // Copyright 2018 The Energi Core Authors 2 // Copyright 2017 The go-ethereum Authors 3 // This file is part of the Energi Core library. 4 // 5 // The Energi Core library is free software: you can redistribute it and/or modify 6 // it under the terms of the GNU Lesser General Public License as published by 7 // the Free Software Foundation, either version 3 of the License, or 8 // (at your option) any later version. 9 // 10 // The Energi Core library is distributed in the hope that it will be useful, 11 // but WITHOUT ANY WARRANTY; without even the implied warranty of 12 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 // GNU Lesser General Public License for more details. 14 // 15 // You should have received a copy of the GNU Lesser General Public License 16 // along with the Energi Core library. If not, see <http://www.gnu.org/licenses/>. 17 18 package http 19 20 import ( 21 "archive/tar" 22 "bytes" 23 "context" 24 "encoding/json" 25 "errors" 26 "flag" 27 "fmt" 28 "io" 29 "io/ioutil" 30 "math/big" 31 "mime/multipart" 32 "net/http" 33 "net/url" 34 "os" 35 "path" 36 "strconv" 37 "strings" 38 "testing" 39 "time" 40 41 "github.com/ethereum/go-ethereum/swarm/storage/feed/lookup" 42 43 "github.com/ethereum/go-ethereum/common" 44 "github.com/ethereum/go-ethereum/core/types" 45 "github.com/ethereum/go-ethereum/crypto" 46 "github.com/ethereum/go-ethereum/log" 47 "github.com/ethereum/go-ethereum/swarm/api" 48 swarm "github.com/ethereum/go-ethereum/swarm/api/client" 49 "github.com/ethereum/go-ethereum/swarm/storage" 50 "github.com/ethereum/go-ethereum/swarm/storage/feed" 51 "github.com/ethereum/go-ethereum/swarm/testutil" 52 ) 53 54 func init() { 55 testing.Init() 56 loglevel := flag.Int("loglevel", 2, "loglevel") 57 flag.Parse() 58 log.Root().SetHandler(log.CallerFileHandler(log.LvlFilterHandler(log.Lvl(*loglevel), log.StreamHandler(os.Stderr, log.TerminalFormat(true))))) 59 } 60 61 func serverFunc(api *api.API) TestServer { 62 return NewServer(api, "") 63 } 64 65 func newTestSigner() (*feed.GenericSigner, error) { 66 privKey, err := crypto.HexToECDSA("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef") 67 if err != nil { 68 return nil, err 69 } 70 return feed.NewGenericSigner(privKey), nil 71 } 72 73 // Test the transparent resolving of feed updates with bzz:// scheme 74 // 75 // First upload data to bzz:, and store the Swarm hash to the resulting manifest in a feed update. 76 // This effectively uses a feed to store a pointer to content rather than the content itself 77 // Retrieving the update with the Swarm hash should return the manifest pointing directly to the data 78 // and raw retrieve of that hash should return the data 79 func TestBzzWithFeed(t *testing.T) { 80 81 signer, _ := newTestSigner() 82 83 // Initialize Swarm test server 84 srv := NewTestSwarmServer(t, serverFunc, nil) 85 defer srv.Close() 86 87 // put together some data for our test: 88 dataBytes := []byte(` 89 // 90 // Create some data our manifest will point to. Data that could be very big and wouldn't fit in a feed update. 91 // So what we are going to do is upload it to Swarm bzz:// and obtain a **manifest hash** pointing to it: 92 // 93 // MANIFEST HASH --> DATA 94 // 95 // Then, we store that **manifest hash** into a Swarm Feed update. Once we have done this, 96 // we can use the **feed manifest hash** in bzz:// instead, this way: bzz://feed-manifest-hash. 97 // 98 // FEED MANIFEST HASH --> MANIFEST HASH --> DATA 99 // 100 // Given that we can update the feed at any time with a new **manifest hash** but the **feed manifest hash** 101 // stays constant, we have effectively created a fixed address to changing content. (Applause) 102 // 103 // FEED MANIFEST HASH (the same) --> MANIFEST HASH(2) --> DATA(2) ... 104 // 105 `) 106 107 // POST data to bzz and get back a content-addressed **manifest hash** pointing to it. 108 resp, err := http.Post(fmt.Sprintf("%s/bzz:/", srv.URL), "text/plain", bytes.NewReader([]byte(dataBytes))) 109 if err != nil { 110 t.Fatal(err) 111 } 112 113 defer resp.Body.Close() 114 if resp.StatusCode != http.StatusOK { 115 t.Fatalf("err %s", resp.Status) 116 } 117 manifestAddressHex, err := ioutil.ReadAll(resp.Body) 118 119 if err != nil { 120 t.Fatal(err) 121 } 122 123 manifestAddress := common.FromHex(string(manifestAddressHex)) 124 125 log.Info("added data", "manifest", string(manifestAddressHex)) 126 127 // At this point we have uploaded the data and have a manifest pointing to it 128 // Now store that manifest address in a feed update. 129 // We also want a feed manifest, so we can use it to refer to the feed. 130 131 // First, create a topic for our feed: 132 topic, _ := feed.NewTopic("interesting topic indeed", nil) 133 134 // Create a feed update request: 135 updateRequest := feed.NewFirstRequest(topic) 136 137 // Store the **manifest address** as data into the feed update. 138 updateRequest.SetData(manifestAddress) 139 140 // Sign the update 141 if err := updateRequest.Sign(signer); err != nil { 142 t.Fatal(err) 143 } 144 log.Info("added data", "data", common.ToHex(manifestAddress)) 145 146 // Build the feed update http request: 147 feedUpdateURL, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 148 if err != nil { 149 t.Fatal(err) 150 } 151 query := feedUpdateURL.Query() 152 body := updateRequest.AppendValues(query) // this adds all query parameters and returns the data to be posted 153 query.Set("manifest", "1") // indicate we want a feed manifest back 154 feedUpdateURL.RawQuery = query.Encode() 155 156 // submit the feed update request to Swarm 157 resp, err = http.Post(feedUpdateURL.String(), "application/octet-stream", bytes.NewReader(body)) 158 if err != nil { 159 t.Fatal(err) 160 } 161 defer resp.Body.Close() 162 if resp.StatusCode != http.StatusOK { 163 t.Fatalf("err %s", resp.Status) 164 } 165 166 feedManifestAddressHex, err := ioutil.ReadAll(resp.Body) 167 if err != nil { 168 t.Fatal(err) 169 } 170 feedManifestAddress := &storage.Address{} 171 err = json.Unmarshal(feedManifestAddressHex, feedManifestAddress) 172 if err != nil { 173 t.Fatalf("data %s could not be unmarshaled: %v", feedManifestAddressHex, err) 174 } 175 176 correctManifestAddrHex := "747c402e5b9dc715a25a4393147512167bab018a007fad7cdcd9adc7fce1ced2" 177 if feedManifestAddress.Hex() != correctManifestAddrHex { 178 t.Fatalf("Response feed manifest address mismatch, expected '%s', got '%s'", correctManifestAddrHex, feedManifestAddress.Hex()) 179 } 180 181 // get bzz manifest transparent feed update resolve 182 getBzzURL := fmt.Sprintf("%s/bzz:/%s", srv.URL, feedManifestAddress) 183 resp, err = http.Get(getBzzURL) 184 if err != nil { 185 t.Fatal(err) 186 } 187 defer resp.Body.Close() 188 if resp.StatusCode != http.StatusOK { 189 t.Fatalf("err %s", resp.Status) 190 } 191 retrievedData, err := ioutil.ReadAll(resp.Body) 192 if err != nil { 193 t.Fatal(err) 194 } 195 if !bytes.Equal(retrievedData, []byte(dataBytes)) { 196 t.Fatalf("retrieved data mismatch, expected %x, got %x", dataBytes, retrievedData) 197 } 198 } 199 200 // Test Swarm feeds using the raw update methods 201 func TestBzzFeed(t *testing.T) { 202 srv := NewTestSwarmServer(t, serverFunc, nil) 203 signer, _ := newTestSigner() 204 205 defer srv.Close() 206 207 // data of update 1 208 update1Data := testutil.RandomBytes(1, 666) 209 update1Timestamp := srv.CurrentTime 210 //data for update 2 211 update2Data := []byte("foo") 212 213 topic, _ := feed.NewTopic("foo.eth", nil) 214 updateRequest := feed.NewFirstRequest(topic) 215 updateRequest.SetData(update1Data) 216 217 if err := updateRequest.Sign(signer); err != nil { 218 t.Fatal(err) 219 } 220 221 // creates feed and sets update 1 222 testUrl, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 223 if err != nil { 224 t.Fatal(err) 225 } 226 urlQuery := testUrl.Query() 227 body := updateRequest.AppendValues(urlQuery) // this adds all query parameters 228 urlQuery.Set("manifest", "1") // indicate we want a manifest back 229 testUrl.RawQuery = urlQuery.Encode() 230 231 resp, err := http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 232 if err != nil { 233 t.Fatal(err) 234 } 235 defer resp.Body.Close() 236 if resp.StatusCode != http.StatusOK { 237 t.Fatalf("err %s", resp.Status) 238 } 239 b, err := ioutil.ReadAll(resp.Body) 240 if err != nil { 241 t.Fatal(err) 242 } 243 rsrcResp := &storage.Address{} 244 err = json.Unmarshal(b, rsrcResp) 245 if err != nil { 246 t.Fatalf("data %s could not be unmarshaled: %v", b, err) 247 } 248 249 correctManifestAddrHex := "bb056a5264c295c2b0f613c8409b9c87ce9d71576ace02458160df4cc894210b" 250 if rsrcResp.Hex() != correctManifestAddrHex { 251 t.Fatalf("Response feed manifest mismatch, expected '%s', got '%s'", correctManifestAddrHex, rsrcResp.Hex()) 252 } 253 254 // get the manifest 255 testRawUrl := fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, rsrcResp) 256 resp, err = http.Get(testRawUrl) 257 if err != nil { 258 t.Fatal(err) 259 } 260 defer resp.Body.Close() 261 if resp.StatusCode != http.StatusOK { 262 t.Fatalf("err %s", resp.Status) 263 } 264 b, err = ioutil.ReadAll(resp.Body) 265 if err != nil { 266 t.Fatal(err) 267 } 268 manifest := &api.Manifest{} 269 err = json.Unmarshal(b, manifest) 270 if err != nil { 271 t.Fatal(err) 272 } 273 if len(manifest.Entries) != 1 { 274 t.Fatalf("Manifest has %d entries", len(manifest.Entries)) 275 } 276 correctFeedHex := "0x666f6f2e65746800000000000000000000000000000000000000000000000000c96aaa54e2d44c299564da76e1cd3184a2386b8d" 277 if manifest.Entries[0].Feed.Hex() != correctFeedHex { 278 t.Fatalf("Expected manifest Feed '%s', got '%s'", correctFeedHex, manifest.Entries[0].Feed.Hex()) 279 } 280 281 // take the chance to have bzz: crash on resolving a feed update that does not contain 282 // a swarm hash: 283 testBzzUrl := fmt.Sprintf("%s/bzz:/%s", srv.URL, rsrcResp) 284 resp, err = http.Get(testBzzUrl) 285 if err != nil { 286 t.Fatal(err) 287 } 288 defer resp.Body.Close() 289 if resp.StatusCode == http.StatusOK { 290 t.Fatal("Expected error status since feed update does not contain a Swarm hash. Received 200 OK") 291 } 292 _, err = ioutil.ReadAll(resp.Body) 293 if err != nil { 294 t.Fatal(err) 295 } 296 297 // get non-existent name, should fail 298 testBzzResUrl := fmt.Sprintf("%s/bzz-feed:/bar", srv.URL) 299 resp, err = http.Get(testBzzResUrl) 300 if err != nil { 301 t.Fatal(err) 302 } 303 304 if resp.StatusCode != http.StatusNotFound { 305 t.Fatalf("Expected get non-existent feed manifest to fail with StatusNotFound (404), got %d", resp.StatusCode) 306 } 307 308 resp.Body.Close() 309 310 // get latest update through bzz-feed directly 311 log.Info("get update latest = 1.1", "addr", correctManifestAddrHex) 312 testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex) 313 resp, err = http.Get(testBzzResUrl) 314 if err != nil { 315 t.Fatal(err) 316 } 317 defer resp.Body.Close() 318 if resp.StatusCode != http.StatusOK { 319 t.Fatalf("err %s", resp.Status) 320 } 321 b, err = ioutil.ReadAll(resp.Body) 322 if err != nil { 323 t.Fatal(err) 324 } 325 if !bytes.Equal(update1Data, b) { 326 t.Fatalf("Expected body '%x', got '%x'", update1Data, b) 327 } 328 329 // update 2 330 // Move the clock ahead 1 second 331 srv.CurrentTime++ 332 log.Info("update 2") 333 334 // 1.- get metadata about this feed 335 testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s/", srv.URL, correctManifestAddrHex) 336 resp, err = http.Get(testBzzResUrl + "?meta=1") 337 if err != nil { 338 t.Fatal(err) 339 } 340 defer resp.Body.Close() 341 if resp.StatusCode != http.StatusOK { 342 t.Fatalf("Get feed metadata returned %s", resp.Status) 343 } 344 b, err = ioutil.ReadAll(resp.Body) 345 if err != nil { 346 t.Fatal(err) 347 } 348 updateRequest = &feed.Request{} 349 if err = updateRequest.UnmarshalJSON(b); err != nil { 350 t.Fatalf("Error decoding feed metadata: %s", err) 351 } 352 updateRequest.SetData(update2Data) 353 if err = updateRequest.Sign(signer); err != nil { 354 t.Fatal(err) 355 } 356 testUrl, err = url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 357 if err != nil { 358 t.Fatal(err) 359 } 360 urlQuery = testUrl.Query() 361 body = updateRequest.AppendValues(urlQuery) // this adds all query parameters 362 goodQueryParameters := urlQuery.Encode() // save the query parameters for a second attempt 363 364 // create bad query parameters in which the signature is missing 365 urlQuery.Del("signature") 366 testUrl.RawQuery = urlQuery.Encode() 367 368 // 1st attempt with bad query parameters in which the signature is missing 369 resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 370 if err != nil { 371 t.Fatal(err) 372 } 373 defer resp.Body.Close() 374 expectedCode := http.StatusBadRequest 375 if resp.StatusCode != expectedCode { 376 t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) 377 } 378 379 // 2nd attempt with bad query parameters in which the signature is of incorrect length 380 urlQuery.Set("signature", "0xabcd") // should be 130 hex chars 381 resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 382 if err != nil { 383 t.Fatal(err) 384 } 385 defer resp.Body.Close() 386 expectedCode = http.StatusBadRequest 387 if resp.StatusCode != expectedCode { 388 t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) 389 } 390 391 // 3rd attempt, with good query parameters: 392 testUrl.RawQuery = goodQueryParameters 393 resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body)) 394 if err != nil { 395 t.Fatal(err) 396 } 397 defer resp.Body.Close() 398 expectedCode = http.StatusOK 399 if resp.StatusCode != expectedCode { 400 t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode) 401 } 402 403 // get latest update through bzz-feed directly 404 log.Info("get update 1.2") 405 testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex) 406 resp, err = http.Get(testBzzResUrl) 407 if err != nil { 408 t.Fatal(err) 409 } 410 defer resp.Body.Close() 411 if resp.StatusCode != http.StatusOK { 412 t.Fatalf("err %s", resp.Status) 413 } 414 b, err = ioutil.ReadAll(resp.Body) 415 if err != nil { 416 t.Fatal(err) 417 } 418 if !bytes.Equal(update2Data, b) { 419 t.Fatalf("Expected body '%x', got '%x'", update2Data, b) 420 } 421 422 // test manifest-less queries 423 log.Info("get first update in update1Timestamp via direct query") 424 query := feed.NewQuery(&updateRequest.Feed, update1Timestamp, lookup.NoClue) 425 426 urlq, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL)) 427 if err != nil { 428 t.Fatal(err) 429 } 430 431 values := urlq.Query() 432 query.AppendValues(values) // this adds feed query parameters 433 urlq.RawQuery = values.Encode() 434 resp, err = http.Get(urlq.String()) 435 if err != nil { 436 t.Fatal(err) 437 } 438 defer resp.Body.Close() 439 if resp.StatusCode != http.StatusOK { 440 t.Fatalf("err %s", resp.Status) 441 } 442 b, err = ioutil.ReadAll(resp.Body) 443 if err != nil { 444 t.Fatal(err) 445 } 446 if !bytes.Equal(update1Data, b) { 447 t.Fatalf("Expected body '%x', got '%x'", update1Data, b) 448 } 449 450 } 451 452 func TestBzzGetPath(t *testing.T) { 453 testBzzGetPath(false, t) 454 testBzzGetPath(true, t) 455 } 456 457 func testBzzGetPath(encrypted bool, t *testing.T) { 458 var err error 459 460 testmanifest := []string{ 461 `{"entries":[{"path":"b","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"c","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0}]}`, 462 `{"entries":[{"path":"a","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"b/","hash":"<key0>","contentType":"application/bzz-manifest+json","status":0}]}`, 463 `{"entries":[{"path":"a/","hash":"<key1>","contentType":"application/bzz-manifest+json","status":0}]}`, 464 } 465 466 testrequests := make(map[string]int) 467 testrequests["/"] = 2 468 testrequests["/a/"] = 1 469 testrequests["/a/b/"] = 0 470 testrequests["/x"] = 0 471 testrequests[""] = 0 472 473 expectedfailrequests := []string{"", "/x"} 474 475 reader := [3]*bytes.Reader{} 476 477 addr := [3]storage.Address{} 478 479 srv := NewTestSwarmServer(t, serverFunc, nil) 480 defer srv.Close() 481 482 for i, mf := range testmanifest { 483 reader[i] = bytes.NewReader([]byte(mf)) 484 var wait func(context.Context) error 485 ctx := context.TODO() 486 addr[i], wait, err = srv.FileStore.Store(ctx, reader[i], int64(len(mf)), encrypted) 487 if err != nil { 488 t.Fatal(err) 489 } 490 for j := i + 1; j < len(testmanifest); j++ { 491 testmanifest[j] = strings.Replace(testmanifest[j], fmt.Sprintf("<key%v>", i), addr[i].Hex(), -1) 492 } 493 err = wait(ctx) 494 if err != nil { 495 t.Fatal(err) 496 } 497 } 498 499 rootRef := addr[2].Hex() 500 501 _, err = http.Get(srv.URL + "/bzz-raw:/" + rootRef + "/a") 502 if err != nil { 503 t.Fatalf("Failed to connect to proxy: %v", err) 504 } 505 506 for k, v := range testrequests { 507 var resp *http.Response 508 var respbody []byte 509 510 url := srv.URL + "/bzz-raw:/" 511 if k != "" { 512 url += rootRef + "/" + k[1:] + "?content_type=text/plain" 513 } 514 resp, err = http.Get(url) 515 if err != nil { 516 t.Fatalf("Request failed: %v", err) 517 } 518 defer resp.Body.Close() 519 respbody, err = ioutil.ReadAll(resp.Body) 520 if err != nil { 521 t.Fatalf("Error while reading response body: %v", err) 522 } 523 524 if string(respbody) != testmanifest[v] { 525 isexpectedfailrequest := false 526 527 for _, r := range expectedfailrequests { 528 if k == r { 529 isexpectedfailrequest = true 530 } 531 } 532 if !isexpectedfailrequest { 533 t.Fatalf("Response body does not match, expected: %v, got %v", testmanifest[v], string(respbody)) 534 } 535 } 536 } 537 538 for k, v := range testrequests { 539 var resp *http.Response 540 var respbody []byte 541 542 url := srv.URL + "/bzz-hash:/" 543 if k != "" { 544 url += rootRef + "/" + k[1:] 545 } 546 resp, err = http.Get(url) 547 if err != nil { 548 t.Fatalf("Request failed: %v", err) 549 } 550 defer resp.Body.Close() 551 respbody, err = ioutil.ReadAll(resp.Body) 552 if err != nil { 553 t.Fatalf("Read request body: %v", err) 554 } 555 556 if string(respbody) != addr[v].Hex() { 557 isexpectedfailrequest := false 558 559 for _, r := range expectedfailrequests { 560 if k == r { 561 isexpectedfailrequest = true 562 } 563 } 564 if !isexpectedfailrequest { 565 t.Fatalf("Response body does not match, expected: %v, got %v", addr[v], string(respbody)) 566 } 567 } 568 } 569 570 ref := addr[2].Hex() 571 572 for _, c := range []struct { 573 path string 574 json string 575 pageFragments []string 576 }{ 577 { 578 path: "/", 579 json: `{"common_prefixes":["a/"]}`, 580 pageFragments: []string{ 581 fmt.Sprintf("Swarm index of bzz:/%s/", ref), 582 `<a class="normal-link" href="a/">a/</a>`, 583 }, 584 }, 585 { 586 path: "/a/", 587 json: `{"common_prefixes":["a/b/"],"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/a","mod_time":"0001-01-01T00:00:00Z"}]}`, 588 pageFragments: []string{ 589 fmt.Sprintf("Swarm index of bzz:/%s/a/", ref), 590 `<a class="normal-link" href="b/">b/</a>`, 591 fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/a">a</a>`, ref), 592 }, 593 }, 594 { 595 path: "/a/b/", 596 json: `{"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/b","mod_time":"0001-01-01T00:00:00Z"},{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/c","mod_time":"0001-01-01T00:00:00Z"}]}`, 597 pageFragments: []string{ 598 fmt.Sprintf("Swarm index of bzz:/%s/a/b/", ref), 599 fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/b">b</a>`, ref), 600 fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/c">c</a>`, ref), 601 }, 602 }, 603 { 604 path: "/x", 605 }, 606 { 607 path: "", 608 }, 609 } { 610 k := c.path 611 url := srv.URL + "/bzz-list:/" 612 if k != "" { 613 url += rootRef + "/" + k[1:] 614 } 615 t.Run("json list "+c.path, func(t *testing.T) { 616 resp, err := http.Get(url) 617 if err != nil { 618 t.Fatalf("HTTP request: %v", err) 619 } 620 defer resp.Body.Close() 621 respbody, err := ioutil.ReadAll(resp.Body) 622 if err != nil { 623 t.Fatalf("Read response body: %v", err) 624 } 625 626 body := strings.TrimSpace(string(respbody)) 627 if body != c.json { 628 isexpectedfailrequest := false 629 630 for _, r := range expectedfailrequests { 631 if k == r { 632 isexpectedfailrequest = true 633 } 634 } 635 if !isexpectedfailrequest { 636 t.Errorf("Response list body %q does not match, expected: %v, got %v", k, c.json, body) 637 } 638 } 639 }) 640 t.Run("html list "+c.path, func(t *testing.T) { 641 req, err := http.NewRequest(http.MethodGet, url, nil) 642 if err != nil { 643 t.Fatalf("New request: %v", err) 644 } 645 req.Header.Set("Accept", "text/html") 646 resp, err := http.DefaultClient.Do(req) 647 if err != nil { 648 t.Fatalf("HTTP request: %v", err) 649 } 650 defer resp.Body.Close() 651 b, err := ioutil.ReadAll(resp.Body) 652 if err != nil { 653 t.Fatalf("Read response body: %v", err) 654 } 655 656 body := string(b) 657 658 for _, f := range c.pageFragments { 659 if !strings.Contains(body, f) { 660 isexpectedfailrequest := false 661 662 for _, r := range expectedfailrequests { 663 if k == r { 664 isexpectedfailrequest = true 665 } 666 } 667 if !isexpectedfailrequest { 668 t.Errorf("Response list body %q does not contain %q: body %q", k, f, body) 669 } 670 } 671 } 672 }) 673 } 674 675 nonhashtests := []string{ 676 srv.URL + "/bzz:/name", 677 srv.URL + "/bzz-immutable:/nonhash", 678 srv.URL + "/bzz-raw:/nonhash", 679 srv.URL + "/bzz-list:/nonhash", 680 srv.URL + "/bzz-hash:/nonhash", 681 } 682 683 nonhashresponses := []string{ 684 `cannot resolve name: no DNS to resolve name: "name"`, 685 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 686 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 687 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 688 `cannot resolve nonhash: no DNS to resolve name: "nonhash"`, 689 } 690 691 for i, url := range nonhashtests { 692 var resp *http.Response 693 var respbody []byte 694 695 resp, err = http.Get(url) 696 697 if err != nil { 698 t.Fatalf("Request failed: %v", err) 699 } 700 defer resp.Body.Close() 701 respbody, err = ioutil.ReadAll(resp.Body) 702 if err != nil { 703 t.Fatalf("ReadAll failed: %v", err) 704 } 705 if !strings.Contains(string(respbody), nonhashresponses[i]) { 706 t.Fatalf("Non-Hash response body does not match, expected: %v, got: %v", nonhashresponses[i], string(respbody)) 707 } 708 } 709 } 710 711 func TestBzzTar(t *testing.T) { 712 testBzzTar(false, t) 713 testBzzTar(true, t) 714 } 715 716 func testBzzTar(encrypted bool, t *testing.T) { 717 srv := NewTestSwarmServer(t, serverFunc, nil) 718 defer srv.Close() 719 fileNames := []string{"tmp1.txt", "tmp2.lock", "tmp3.rtf"} 720 fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"} 721 722 buf := &bytes.Buffer{} 723 tw := tar.NewWriter(buf) 724 defer tw.Close() 725 726 for i, v := range fileNames { 727 size := int64(len(fileContents[i])) 728 hdr := &tar.Header{ 729 Name: v, 730 Mode: 0644, 731 Size: size, 732 ModTime: time.Now(), 733 Xattrs: map[string]string{ 734 "user.swarm.content-type": "text/plain", 735 }, 736 } 737 if err := tw.WriteHeader(hdr); err != nil { 738 t.Fatal(err) 739 } 740 741 // copy the file into the tar stream 742 n, err := io.Copy(tw, bytes.NewBufferString(fileContents[i])) 743 if err != nil { 744 t.Fatal(err) 745 } else if n != size { 746 t.Fatal("size mismatch") 747 } 748 } 749 750 //post tar stream 751 url := srv.URL + "/bzz:/" 752 if encrypted { 753 url = url + "encrypt" 754 } 755 req, err := http.NewRequest("POST", url, buf) 756 if err != nil { 757 t.Fatal(err) 758 } 759 req.Header.Add("Content-Type", "application/x-tar") 760 client := &http.Client{} 761 resp2, err := client.Do(req) 762 if err != nil { 763 t.Fatal(err) 764 } 765 if resp2.StatusCode != http.StatusOK { 766 t.Fatalf("err %s", resp2.Status) 767 } 768 swarmHash, err := ioutil.ReadAll(resp2.Body) 769 resp2.Body.Close() 770 if err != nil { 771 t.Fatal(err) 772 } 773 774 // now do a GET to get a tarball back 775 req, err = http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s", string(swarmHash)), nil) 776 if err != nil { 777 t.Fatal(err) 778 } 779 req.Header.Add("Accept", "application/x-tar") 780 resp2, err = client.Do(req) 781 if err != nil { 782 t.Fatal(err) 783 } 784 defer resp2.Body.Close() 785 786 if h := resp2.Header.Get("Content-Type"); h != "application/x-tar" { 787 t.Fatalf("Content-Type header expected: application/x-tar, got: %s", h) 788 } 789 790 expectedFileName := string(swarmHash) + ".tar" 791 expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", expectedFileName) 792 if h := resp2.Header.Get("Content-Disposition"); h != expectedContentDisposition { 793 t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h) 794 } 795 796 file, err := ioutil.TempFile("", "swarm-downloaded-tarball") 797 if err != nil { 798 t.Fatal(err) 799 } 800 defer os.Remove(file.Name()) 801 _, err = io.Copy(file, resp2.Body) 802 if err != nil { 803 t.Fatalf("error getting tarball: %v", err) 804 } 805 file.Sync() 806 file.Close() 807 808 tarFileHandle, err := os.Open(file.Name()) 809 if err != nil { 810 t.Fatal(err) 811 } 812 tr := tar.NewReader(tarFileHandle) 813 814 for { 815 hdr, err := tr.Next() 816 if err == io.EOF { 817 break 818 } else if err != nil { 819 t.Fatalf("error reading tar stream: %s", err) 820 } 821 bb := make([]byte, hdr.Size) 822 _, err = tr.Read(bb) 823 if err != nil && err != io.EOF { 824 t.Fatal(err) 825 } 826 passed := false 827 for i, v := range fileNames { 828 if v == hdr.Name { 829 if string(bb) == fileContents[i] { 830 passed = true 831 break 832 } 833 } 834 } 835 if !passed { 836 t.Fatalf("file %s did not pass content assertion", hdr.Name) 837 } 838 } 839 } 840 841 // TestBzzRootRedirect tests that getting the root path of a manifest without 842 // a trailing slash gets redirected to include the trailing slash so that 843 // relative URLs work as expected. 844 func TestBzzRootRedirect(t *testing.T) { 845 testBzzRootRedirect(false, t) 846 } 847 func TestBzzRootRedirectEncrypted(t *testing.T) { 848 testBzzRootRedirect(true, t) 849 } 850 851 func testBzzRootRedirect(toEncrypt bool, t *testing.T) { 852 srv := NewTestSwarmServer(t, serverFunc, nil) 853 defer srv.Close() 854 855 // create a manifest with some data at the root path 856 client := swarm.NewClient(srv.URL) 857 data := []byte("data") 858 file := &swarm.File{ 859 ReadCloser: ioutil.NopCloser(bytes.NewReader(data)), 860 ManifestEntry: api.ManifestEntry{ 861 Path: "", 862 ContentType: "text/plain", 863 Size: int64(len(data)), 864 }, 865 } 866 hash, err := client.Upload(file, "", toEncrypt) 867 if err != nil { 868 t.Fatal(err) 869 } 870 871 // define a CheckRedirect hook which ensures there is only a single 872 // redirect to the correct URL 873 redirected := false 874 httpClient := http.Client{ 875 CheckRedirect: func(req *http.Request, via []*http.Request) error { 876 if redirected { 877 return errors.New("too many redirects") 878 } 879 redirected = true 880 expectedPath := "/bzz:/" + hash + "/" 881 if req.URL.Path != expectedPath { 882 return fmt.Errorf("expected redirect to %q, got %q", expectedPath, req.URL.Path) 883 } 884 return nil 885 }, 886 } 887 888 // perform the GET request and assert the response 889 res, err := httpClient.Get(srv.URL + "/bzz:/" + hash) 890 if err != nil { 891 t.Fatal(err) 892 } 893 defer res.Body.Close() 894 if !redirected { 895 t.Fatal("expected GET /bzz:/<hash> to redirect to /bzz:/<hash>/ but it didn't") 896 } 897 gotData, err := ioutil.ReadAll(res.Body) 898 if err != nil { 899 t.Fatal(err) 900 } 901 if !bytes.Equal(gotData, data) { 902 t.Fatalf("expected response to equal %q, got %q", data, gotData) 903 } 904 } 905 906 func TestMethodsNotAllowed(t *testing.T) { 907 srv := NewTestSwarmServer(t, serverFunc, nil) 908 defer srv.Close() 909 databytes := "bar" 910 for _, c := range []struct { 911 url string 912 code int 913 }{ 914 { 915 url: fmt.Sprintf("%s/bzz-list:/", srv.URL), 916 code: http.StatusMethodNotAllowed, 917 }, { 918 url: fmt.Sprintf("%s/bzz-hash:/", srv.URL), 919 code: http.StatusMethodNotAllowed, 920 }, 921 { 922 url: fmt.Sprintf("%s/bzz-immutable:/", srv.URL), 923 code: http.StatusMethodNotAllowed, 924 }, 925 } { 926 res, _ := http.Post(c.url, "text/plain", bytes.NewReader([]byte(databytes))) 927 if res.StatusCode != c.code { 928 t.Fatalf("should have failed. requested url: %s, expected code %d, got %d", c.url, c.code, res.StatusCode) 929 } 930 } 931 932 } 933 934 func httpDo(httpMethod string, url string, reqBody io.Reader, headers map[string]string, verbose bool, t *testing.T) (*http.Response, string) { 935 // Build the Request 936 req, err := http.NewRequest(httpMethod, url, reqBody) 937 if err != nil { 938 t.Fatal(err) 939 } 940 for key, value := range headers { 941 req.Header.Set(key, value) 942 } 943 if verbose { 944 t.Log(req.Method, req.URL, req.Header, req.Body) 945 } 946 947 // Send Request out 948 httpClient := &http.Client{} 949 res, err := httpClient.Do(req) 950 if err != nil { 951 t.Fatal(err) 952 } 953 954 // Read the HTTP Body 955 buffer, err := ioutil.ReadAll(res.Body) 956 if err != nil { 957 t.Fatal(err) 958 } 959 defer res.Body.Close() 960 body := string(buffer) 961 962 return res, body 963 } 964 965 func TestGet(t *testing.T) { 966 srv := NewTestSwarmServer(t, serverFunc, nil) 967 defer srv.Close() 968 969 for _, testCase := range []struct { 970 uri string 971 method string 972 headers map[string]string 973 expectedStatusCode int 974 assertResponseBody string 975 verbose bool 976 }{ 977 { 978 uri: fmt.Sprintf("%s/", srv.URL), 979 method: "GET", 980 headers: map[string]string{"Accept": "text/html"}, 981 expectedStatusCode: http.StatusOK, 982 assertResponseBody: "Swarm: Serverless Hosting Incentivised Peer-To-Peer Storage And Content Distribution", 983 verbose: false, 984 }, 985 { 986 uri: fmt.Sprintf("%s/", srv.URL), 987 method: "GET", 988 headers: map[string]string{"Accept": "application/json"}, 989 expectedStatusCode: http.StatusOK, 990 assertResponseBody: "Swarm: Please request a valid ENS or swarm hash with the appropriate bzz scheme", 991 verbose: false, 992 }, 993 { 994 uri: fmt.Sprintf("%s/robots.txt", srv.URL), 995 method: "GET", 996 headers: map[string]string{"Accept": "text/html"}, 997 expectedStatusCode: http.StatusOK, 998 assertResponseBody: "User-agent: *\nDisallow: /", 999 verbose: false, 1000 }, 1001 { 1002 uri: fmt.Sprintf("%s/nonexistent_path", srv.URL), 1003 method: "GET", 1004 headers: map[string]string{}, 1005 expectedStatusCode: http.StatusNotFound, 1006 verbose: false, 1007 }, 1008 { 1009 uri: fmt.Sprintf("%s/bzz:asdf/", srv.URL), 1010 method: "GET", 1011 headers: map[string]string{}, 1012 expectedStatusCode: http.StatusNotFound, 1013 verbose: false, 1014 }, 1015 { 1016 uri: fmt.Sprintf("%s/tbz2/", srv.URL), 1017 method: "GET", 1018 headers: map[string]string{}, 1019 expectedStatusCode: http.StatusNotFound, 1020 verbose: false, 1021 }, 1022 { 1023 uri: fmt.Sprintf("%s/bzz-rack:/", srv.URL), 1024 method: "GET", 1025 headers: map[string]string{}, 1026 expectedStatusCode: http.StatusNotFound, 1027 verbose: false, 1028 }, 1029 { 1030 uri: fmt.Sprintf("%s/bzz-ls", srv.URL), 1031 method: "GET", 1032 headers: map[string]string{}, 1033 expectedStatusCode: http.StatusNotFound, 1034 verbose: false, 1035 }} { 1036 t.Run("GET "+testCase.uri, func(t *testing.T) { 1037 res, body := httpDo(testCase.method, testCase.uri, nil, testCase.headers, testCase.verbose, t) 1038 if res.StatusCode != testCase.expectedStatusCode { 1039 t.Fatalf("expected status code %d but got %d", testCase.expectedStatusCode, res.StatusCode) 1040 } 1041 if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) { 1042 t.Fatalf("expected response to be: %s but got: %s", testCase.assertResponseBody, body) 1043 } 1044 }) 1045 } 1046 } 1047 1048 func TestModify(t *testing.T) { 1049 srv := NewTestSwarmServer(t, serverFunc, nil) 1050 defer srv.Close() 1051 1052 swarmClient := swarm.NewClient(srv.URL) 1053 data := []byte("data") 1054 file := &swarm.File{ 1055 ReadCloser: ioutil.NopCloser(bytes.NewReader(data)), 1056 ManifestEntry: api.ManifestEntry{ 1057 Path: "", 1058 ContentType: "text/plain", 1059 Size: int64(len(data)), 1060 }, 1061 } 1062 1063 hash, err := swarmClient.Upload(file, "", false) 1064 if err != nil { 1065 t.Fatal(err) 1066 } 1067 1068 for _, testCase := range []struct { 1069 uri string 1070 method string 1071 headers map[string]string 1072 requestBody []byte 1073 expectedStatusCode int 1074 assertResponseBody string 1075 assertResponseHeaders map[string]string 1076 verbose bool 1077 }{ 1078 { 1079 uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), 1080 method: "DELETE", 1081 headers: map[string]string{}, 1082 expectedStatusCode: http.StatusOK, 1083 assertResponseBody: "8b634aea26eec353ac0ecbec20c94f44d6f8d11f38d4578a4c207a84c74ef731", 1084 verbose: false, 1085 }, 1086 { 1087 uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), 1088 method: "PUT", 1089 headers: map[string]string{}, 1090 expectedStatusCode: http.StatusMethodNotAllowed, 1091 verbose: false, 1092 }, 1093 { 1094 uri: fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, hash), 1095 method: "PUT", 1096 headers: map[string]string{}, 1097 expectedStatusCode: http.StatusMethodNotAllowed, 1098 verbose: false, 1099 }, 1100 { 1101 uri: fmt.Sprintf("%s/bzz:/%s", srv.URL, hash), 1102 method: "PATCH", 1103 headers: map[string]string{}, 1104 expectedStatusCode: http.StatusMethodNotAllowed, 1105 verbose: false, 1106 }, 1107 { 1108 uri: fmt.Sprintf("%s/bzz-raw:/", srv.URL), 1109 method: "POST", 1110 headers: map[string]string{}, 1111 requestBody: []byte("POSTdata"), 1112 expectedStatusCode: http.StatusOK, 1113 assertResponseHeaders: map[string]string{"Content-Length": "64"}, 1114 verbose: false, 1115 }, 1116 { 1117 uri: fmt.Sprintf("%s/bzz-raw:/encrypt", srv.URL), 1118 method: "POST", 1119 headers: map[string]string{}, 1120 requestBody: []byte("POSTdata"), 1121 expectedStatusCode: http.StatusOK, 1122 assertResponseHeaders: map[string]string{"Content-Length": "128"}, 1123 verbose: false, 1124 }, 1125 } { 1126 t.Run(testCase.method+" "+testCase.uri, func(t *testing.T) { 1127 reqBody := bytes.NewReader(testCase.requestBody) 1128 res, body := httpDo(testCase.method, testCase.uri, reqBody, testCase.headers, testCase.verbose, t) 1129 1130 if res.StatusCode != testCase.expectedStatusCode { 1131 t.Fatalf("expected status code %d but got %d, %s", testCase.expectedStatusCode, res.StatusCode, body) 1132 } 1133 if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) { 1134 t.Log(body) 1135 t.Fatalf("expected response %s but got %s", testCase.assertResponseBody, body) 1136 } 1137 for key, value := range testCase.assertResponseHeaders { 1138 if res.Header.Get(key) != value { 1139 t.Logf("expected %s=%s in HTTP response header but got %s", key, value, res.Header.Get(key)) 1140 } 1141 } 1142 }) 1143 } 1144 } 1145 1146 func TestMultiPartUpload(t *testing.T) { 1147 // POST /bzz:/ Content-Type: multipart/form-data 1148 verbose := false 1149 // Setup Swarm 1150 srv := NewTestSwarmServer(t, serverFunc, nil) 1151 defer srv.Close() 1152 1153 url := fmt.Sprintf("%s/bzz:/", srv.URL) 1154 1155 buf := new(bytes.Buffer) 1156 form := multipart.NewWriter(buf) 1157 form.WriteField("name", "John Doe") 1158 file1, _ := form.CreateFormFile("cv", "cv.txt") 1159 file1.Write([]byte("John Doe's Credentials")) 1160 file2, _ := form.CreateFormFile("profile_picture", "profile.jpg") 1161 file2.Write([]byte("imaginethisisjpegdata")) 1162 form.Close() 1163 1164 headers := map[string]string{ 1165 "Content-Type": form.FormDataContentType(), 1166 "Content-Length": strconv.Itoa(buf.Len()), 1167 } 1168 res, body := httpDo("POST", url, buf, headers, verbose, t) 1169 1170 if res.StatusCode != http.StatusOK { 1171 t.Fatalf("expected POST multipart/form-data to return 200, but it returned %d", res.StatusCode) 1172 } 1173 if len(body) != 64 { 1174 t.Fatalf("expected POST multipart/form-data to return a 64 char manifest but the answer was %d chars long", len(body)) 1175 } 1176 } 1177 1178 // TestBzzGetFileWithResolver tests fetching a file using a mocked ENS resolver 1179 func TestBzzGetFileWithResolver(t *testing.T) { 1180 resolver := newTestResolveValidator("") 1181 srv := NewTestSwarmServer(t, serverFunc, resolver) 1182 defer srv.Close() 1183 fileNames := []string{"dir1/tmp1.txt", "dir2/tmp2.lock", "dir3/tmp3.rtf"} 1184 fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"} 1185 1186 buf := &bytes.Buffer{} 1187 tw := tar.NewWriter(buf) 1188 1189 for i, v := range fileNames { 1190 size := len(fileContents[i]) 1191 hdr := &tar.Header{ 1192 Name: v, 1193 Mode: 0644, 1194 Size: int64(size), 1195 ModTime: time.Now(), 1196 Xattrs: map[string]string{ 1197 "user.swarm.content-type": "text/plain", 1198 }, 1199 } 1200 if err := tw.WriteHeader(hdr); err != nil { 1201 t.Fatal(err) 1202 } 1203 1204 // copy the file into the tar stream 1205 n, err := io.WriteString(tw, fileContents[i]) 1206 if err != nil { 1207 t.Fatal(err) 1208 } else if n != size { 1209 t.Fatal("size mismatch") 1210 } 1211 } 1212 1213 if err := tw.Close(); err != nil { 1214 t.Fatal(err) 1215 } 1216 1217 //post tar stream 1218 url := srv.URL + "/bzz:/" 1219 1220 req, err := http.NewRequest("POST", url, buf) 1221 if err != nil { 1222 t.Fatal(err) 1223 } 1224 req.Header.Add("Content-Type", "application/x-tar") 1225 client := &http.Client{} 1226 serverResponse, err := client.Do(req) 1227 if err != nil { 1228 t.Fatal(err) 1229 } 1230 if serverResponse.StatusCode != http.StatusOK { 1231 t.Fatalf("err %s", serverResponse.Status) 1232 } 1233 swarmHash, err := ioutil.ReadAll(serverResponse.Body) 1234 serverResponse.Body.Close() 1235 if err != nil { 1236 t.Fatal(err) 1237 } 1238 // set the resolved hash to be the swarm hash of what we've just uploaded 1239 hash := common.HexToHash(string(swarmHash)) 1240 resolver.hash = &hash 1241 for _, v := range []struct { 1242 addr string 1243 path string 1244 expectedStatusCode int 1245 expectedContentType string 1246 expectedFileName string 1247 }{ 1248 { 1249 addr: string(swarmHash), 1250 path: fileNames[0], 1251 expectedStatusCode: http.StatusOK, 1252 expectedContentType: "text/plain", 1253 expectedFileName: path.Base(fileNames[0]), 1254 }, 1255 { 1256 addr: "somebogusensname", 1257 path: fileNames[0], 1258 expectedStatusCode: http.StatusOK, 1259 expectedContentType: "text/plain", 1260 expectedFileName: path.Base(fileNames[0]), 1261 }, 1262 } { 1263 req, err := http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s/%s", v.addr, v.path), nil) 1264 if err != nil { 1265 t.Fatal(err) 1266 } 1267 serverResponse, err := client.Do(req) 1268 if err != nil { 1269 t.Fatal(err) 1270 } 1271 defer serverResponse.Body.Close() 1272 if serverResponse.StatusCode != v.expectedStatusCode { 1273 t.Fatalf("expected %d, got %d", v.expectedStatusCode, serverResponse.StatusCode) 1274 } 1275 1276 if h := serverResponse.Header.Get("Content-Type"); h != v.expectedContentType { 1277 t.Fatalf("Content-Type header expected: %s, got %s", v.expectedContentType, h) 1278 } 1279 1280 expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", v.expectedFileName) 1281 if h := serverResponse.Header.Get("Content-Disposition"); h != expectedContentDisposition { 1282 t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h) 1283 } 1284 1285 } 1286 } 1287 1288 // testResolver implements the Resolver interface and either returns the given 1289 // hash if it is set, or returns a "name not found" error 1290 type testResolveValidator struct { 1291 hash *common.Hash 1292 } 1293 1294 func newTestResolveValidator(addr string) *testResolveValidator { 1295 r := &testResolveValidator{} 1296 if addr != "" { 1297 hash := common.HexToHash(addr) 1298 r.hash = &hash 1299 } 1300 return r 1301 } 1302 1303 func (t *testResolveValidator) Resolve(addr string) (common.Hash, error) { 1304 if t.hash == nil { 1305 return common.Hash{}, fmt.Errorf("DNS name not found: %q", addr) 1306 } 1307 return *t.hash, nil 1308 } 1309 1310 func (t *testResolveValidator) Owner(node [32]byte) (addr common.Address, err error) { 1311 return 1312 } 1313 func (t *testResolveValidator) HeaderByNumber(context.Context, *big.Int) (header *types.Header, err error) { 1314 return 1315 }