github.com/codingfuture/orig-energi3@v0.8.4/swarm/api/http/server_test.go (about)

     1  // Copyright 2018 The Energi Core Authors
     2  // Copyright 2017 The go-ethereum Authors
     3  // This file is part of the Energi Core library.
     4  //
     5  // The Energi Core library is free software: you can redistribute it and/or modify
     6  // it under the terms of the GNU Lesser General Public License as published by
     7  // the Free Software Foundation, either version 3 of the License, or
     8  // (at your option) any later version.
     9  //
    10  // The Energi Core library is distributed in the hope that it will be useful,
    11  // but WITHOUT ANY WARRANTY; without even the implied warranty of
    12  // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    13  // GNU Lesser General Public License for more details.
    14  //
    15  // You should have received a copy of the GNU Lesser General Public License
    16  // along with the Energi Core library. If not, see <http://www.gnu.org/licenses/>.
    17  
    18  package http
    19  
    20  import (
    21  	"archive/tar"
    22  	"bytes"
    23  	"context"
    24  	"encoding/json"
    25  	"errors"
    26  	"flag"
    27  	"fmt"
    28  	"io"
    29  	"io/ioutil"
    30  	"math/big"
    31  	"mime/multipart"
    32  	"net/http"
    33  	"net/url"
    34  	"os"
    35  	"path"
    36  	"strconv"
    37  	"strings"
    38  	"testing"
    39  	"time"
    40  
    41  	"github.com/ethereum/go-ethereum/swarm/storage/feed/lookup"
    42  
    43  	"github.com/ethereum/go-ethereum/common"
    44  	"github.com/ethereum/go-ethereum/core/types"
    45  	"github.com/ethereum/go-ethereum/crypto"
    46  	"github.com/ethereum/go-ethereum/log"
    47  	"github.com/ethereum/go-ethereum/swarm/api"
    48  	swarm "github.com/ethereum/go-ethereum/swarm/api/client"
    49  	"github.com/ethereum/go-ethereum/swarm/storage"
    50  	"github.com/ethereum/go-ethereum/swarm/storage/feed"
    51  	"github.com/ethereum/go-ethereum/swarm/testutil"
    52  )
    53  
    54  func init() {
    55  	testing.Init()
    56  	loglevel := flag.Int("loglevel", 2, "loglevel")
    57  	flag.Parse()
    58  	log.Root().SetHandler(log.CallerFileHandler(log.LvlFilterHandler(log.Lvl(*loglevel), log.StreamHandler(os.Stderr, log.TerminalFormat(true)))))
    59  }
    60  
    61  func serverFunc(api *api.API) TestServer {
    62  	return NewServer(api, "")
    63  }
    64  
    65  func newTestSigner() (*feed.GenericSigner, error) {
    66  	privKey, err := crypto.HexToECDSA("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")
    67  	if err != nil {
    68  		return nil, err
    69  	}
    70  	return feed.NewGenericSigner(privKey), nil
    71  }
    72  
    73  // Test the transparent resolving of feed updates with bzz:// scheme
    74  //
    75  // First upload data to bzz:, and store the Swarm hash to the resulting manifest in a feed update.
    76  // This effectively uses a feed to store a pointer to content rather than the content itself
    77  // Retrieving the update with the Swarm hash should return the manifest pointing directly to the data
    78  // and raw retrieve of that hash should return the data
    79  func TestBzzWithFeed(t *testing.T) {
    80  
    81  	signer, _ := newTestSigner()
    82  
    83  	// Initialize Swarm test server
    84  	srv := NewTestSwarmServer(t, serverFunc, nil)
    85  	defer srv.Close()
    86  
    87  	// put together some data for our test:
    88  	dataBytes := []byte(`
    89  	//
    90  	// Create some data our manifest will point to. Data that could be very big and wouldn't fit in a feed update.
    91  	// So what we are going to do is upload it to Swarm bzz:// and obtain a **manifest hash** pointing to it:
    92  	//
    93  	// MANIFEST HASH --> DATA
    94  	//
    95  	// Then, we store that **manifest hash** into a Swarm Feed update. Once we have done this,
    96  	// we can use the **feed manifest hash** in bzz:// instead, this way: bzz://feed-manifest-hash.
    97  	//
    98  	// FEED MANIFEST HASH --> MANIFEST HASH --> DATA
    99  	//
   100  	// Given that we can update the feed at any time with a new **manifest hash** but the **feed manifest hash**
   101  	// stays constant, we have effectively created a fixed address to changing content. (Applause)
   102  	//
   103  	// FEED MANIFEST HASH (the same) --> MANIFEST HASH(2) --> DATA(2) ...
   104  	//
   105  	`)
   106  
   107  	// POST data to bzz and get back a content-addressed **manifest hash** pointing to it.
   108  	resp, err := http.Post(fmt.Sprintf("%s/bzz:/", srv.URL), "text/plain", bytes.NewReader([]byte(dataBytes)))
   109  	if err != nil {
   110  		t.Fatal(err)
   111  	}
   112  
   113  	defer resp.Body.Close()
   114  	if resp.StatusCode != http.StatusOK {
   115  		t.Fatalf("err %s", resp.Status)
   116  	}
   117  	manifestAddressHex, err := ioutil.ReadAll(resp.Body)
   118  
   119  	if err != nil {
   120  		t.Fatal(err)
   121  	}
   122  
   123  	manifestAddress := common.FromHex(string(manifestAddressHex))
   124  
   125  	log.Info("added data", "manifest", string(manifestAddressHex))
   126  
   127  	// At this point we have uploaded the data and have a manifest pointing to it
   128  	// Now store that manifest address in a feed update.
   129  	// We also want a feed manifest, so we can use it to refer to the feed.
   130  
   131  	// First, create a topic for our feed:
   132  	topic, _ := feed.NewTopic("interesting topic indeed", nil)
   133  
   134  	// Create a feed update request:
   135  	updateRequest := feed.NewFirstRequest(topic)
   136  
   137  	// Store the **manifest address** as data into the feed update.
   138  	updateRequest.SetData(manifestAddress)
   139  
   140  	// Sign the update
   141  	if err := updateRequest.Sign(signer); err != nil {
   142  		t.Fatal(err)
   143  	}
   144  	log.Info("added data", "data", common.ToHex(manifestAddress))
   145  
   146  	// Build the feed update http request:
   147  	feedUpdateURL, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   148  	if err != nil {
   149  		t.Fatal(err)
   150  	}
   151  	query := feedUpdateURL.Query()
   152  	body := updateRequest.AppendValues(query) // this adds all query parameters and returns the data to be posted
   153  	query.Set("manifest", "1")                // indicate we want a feed manifest back
   154  	feedUpdateURL.RawQuery = query.Encode()
   155  
   156  	// submit the feed update request to Swarm
   157  	resp, err = http.Post(feedUpdateURL.String(), "application/octet-stream", bytes.NewReader(body))
   158  	if err != nil {
   159  		t.Fatal(err)
   160  	}
   161  	defer resp.Body.Close()
   162  	if resp.StatusCode != http.StatusOK {
   163  		t.Fatalf("err %s", resp.Status)
   164  	}
   165  
   166  	feedManifestAddressHex, err := ioutil.ReadAll(resp.Body)
   167  	if err != nil {
   168  		t.Fatal(err)
   169  	}
   170  	feedManifestAddress := &storage.Address{}
   171  	err = json.Unmarshal(feedManifestAddressHex, feedManifestAddress)
   172  	if err != nil {
   173  		t.Fatalf("data %s could not be unmarshaled: %v", feedManifestAddressHex, err)
   174  	}
   175  
   176  	correctManifestAddrHex := "747c402e5b9dc715a25a4393147512167bab018a007fad7cdcd9adc7fce1ced2"
   177  	if feedManifestAddress.Hex() != correctManifestAddrHex {
   178  		t.Fatalf("Response feed manifest address mismatch, expected '%s', got '%s'", correctManifestAddrHex, feedManifestAddress.Hex())
   179  	}
   180  
   181  	// get bzz manifest transparent feed update resolve
   182  	getBzzURL := fmt.Sprintf("%s/bzz:/%s", srv.URL, feedManifestAddress)
   183  	resp, err = http.Get(getBzzURL)
   184  	if err != nil {
   185  		t.Fatal(err)
   186  	}
   187  	defer resp.Body.Close()
   188  	if resp.StatusCode != http.StatusOK {
   189  		t.Fatalf("err %s", resp.Status)
   190  	}
   191  	retrievedData, err := ioutil.ReadAll(resp.Body)
   192  	if err != nil {
   193  		t.Fatal(err)
   194  	}
   195  	if !bytes.Equal(retrievedData, []byte(dataBytes)) {
   196  		t.Fatalf("retrieved data mismatch, expected %x, got %x", dataBytes, retrievedData)
   197  	}
   198  }
   199  
   200  // Test Swarm feeds using the raw update methods
   201  func TestBzzFeed(t *testing.T) {
   202  	srv := NewTestSwarmServer(t, serverFunc, nil)
   203  	signer, _ := newTestSigner()
   204  
   205  	defer srv.Close()
   206  
   207  	// data of update 1
   208  	update1Data := testutil.RandomBytes(1, 666)
   209  	update1Timestamp := srv.CurrentTime
   210  	//data for update 2
   211  	update2Data := []byte("foo")
   212  
   213  	topic, _ := feed.NewTopic("foo.eth", nil)
   214  	updateRequest := feed.NewFirstRequest(topic)
   215  	updateRequest.SetData(update1Data)
   216  
   217  	if err := updateRequest.Sign(signer); err != nil {
   218  		t.Fatal(err)
   219  	}
   220  
   221  	// creates feed and sets update 1
   222  	testUrl, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   223  	if err != nil {
   224  		t.Fatal(err)
   225  	}
   226  	urlQuery := testUrl.Query()
   227  	body := updateRequest.AppendValues(urlQuery) // this adds all query parameters
   228  	urlQuery.Set("manifest", "1")                // indicate we want a manifest back
   229  	testUrl.RawQuery = urlQuery.Encode()
   230  
   231  	resp, err := http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   232  	if err != nil {
   233  		t.Fatal(err)
   234  	}
   235  	defer resp.Body.Close()
   236  	if resp.StatusCode != http.StatusOK {
   237  		t.Fatalf("err %s", resp.Status)
   238  	}
   239  	b, err := ioutil.ReadAll(resp.Body)
   240  	if err != nil {
   241  		t.Fatal(err)
   242  	}
   243  	rsrcResp := &storage.Address{}
   244  	err = json.Unmarshal(b, rsrcResp)
   245  	if err != nil {
   246  		t.Fatalf("data %s could not be unmarshaled: %v", b, err)
   247  	}
   248  
   249  	correctManifestAddrHex := "bb056a5264c295c2b0f613c8409b9c87ce9d71576ace02458160df4cc894210b"
   250  	if rsrcResp.Hex() != correctManifestAddrHex {
   251  		t.Fatalf("Response feed manifest mismatch, expected '%s', got '%s'", correctManifestAddrHex, rsrcResp.Hex())
   252  	}
   253  
   254  	// get the manifest
   255  	testRawUrl := fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, rsrcResp)
   256  	resp, err = http.Get(testRawUrl)
   257  	if err != nil {
   258  		t.Fatal(err)
   259  	}
   260  	defer resp.Body.Close()
   261  	if resp.StatusCode != http.StatusOK {
   262  		t.Fatalf("err %s", resp.Status)
   263  	}
   264  	b, err = ioutil.ReadAll(resp.Body)
   265  	if err != nil {
   266  		t.Fatal(err)
   267  	}
   268  	manifest := &api.Manifest{}
   269  	err = json.Unmarshal(b, manifest)
   270  	if err != nil {
   271  		t.Fatal(err)
   272  	}
   273  	if len(manifest.Entries) != 1 {
   274  		t.Fatalf("Manifest has %d entries", len(manifest.Entries))
   275  	}
   276  	correctFeedHex := "0x666f6f2e65746800000000000000000000000000000000000000000000000000c96aaa54e2d44c299564da76e1cd3184a2386b8d"
   277  	if manifest.Entries[0].Feed.Hex() != correctFeedHex {
   278  		t.Fatalf("Expected manifest Feed '%s', got '%s'", correctFeedHex, manifest.Entries[0].Feed.Hex())
   279  	}
   280  
   281  	// take the chance to have bzz: crash on resolving a feed update that does not contain
   282  	// a swarm hash:
   283  	testBzzUrl := fmt.Sprintf("%s/bzz:/%s", srv.URL, rsrcResp)
   284  	resp, err = http.Get(testBzzUrl)
   285  	if err != nil {
   286  		t.Fatal(err)
   287  	}
   288  	defer resp.Body.Close()
   289  	if resp.StatusCode == http.StatusOK {
   290  		t.Fatal("Expected error status since feed update does not contain a Swarm hash. Received 200 OK")
   291  	}
   292  	_, err = ioutil.ReadAll(resp.Body)
   293  	if err != nil {
   294  		t.Fatal(err)
   295  	}
   296  
   297  	// get non-existent name, should fail
   298  	testBzzResUrl := fmt.Sprintf("%s/bzz-feed:/bar", srv.URL)
   299  	resp, err = http.Get(testBzzResUrl)
   300  	if err != nil {
   301  		t.Fatal(err)
   302  	}
   303  
   304  	if resp.StatusCode != http.StatusNotFound {
   305  		t.Fatalf("Expected get non-existent feed manifest to fail with StatusNotFound (404), got %d", resp.StatusCode)
   306  	}
   307  
   308  	resp.Body.Close()
   309  
   310  	// get latest update through bzz-feed directly
   311  	log.Info("get update latest = 1.1", "addr", correctManifestAddrHex)
   312  	testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex)
   313  	resp, err = http.Get(testBzzResUrl)
   314  	if err != nil {
   315  		t.Fatal(err)
   316  	}
   317  	defer resp.Body.Close()
   318  	if resp.StatusCode != http.StatusOK {
   319  		t.Fatalf("err %s", resp.Status)
   320  	}
   321  	b, err = ioutil.ReadAll(resp.Body)
   322  	if err != nil {
   323  		t.Fatal(err)
   324  	}
   325  	if !bytes.Equal(update1Data, b) {
   326  		t.Fatalf("Expected body '%x', got '%x'", update1Data, b)
   327  	}
   328  
   329  	// update 2
   330  	// Move the clock ahead 1 second
   331  	srv.CurrentTime++
   332  	log.Info("update 2")
   333  
   334  	// 1.- get metadata about this feed
   335  	testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s/", srv.URL, correctManifestAddrHex)
   336  	resp, err = http.Get(testBzzResUrl + "?meta=1")
   337  	if err != nil {
   338  		t.Fatal(err)
   339  	}
   340  	defer resp.Body.Close()
   341  	if resp.StatusCode != http.StatusOK {
   342  		t.Fatalf("Get feed metadata returned %s", resp.Status)
   343  	}
   344  	b, err = ioutil.ReadAll(resp.Body)
   345  	if err != nil {
   346  		t.Fatal(err)
   347  	}
   348  	updateRequest = &feed.Request{}
   349  	if err = updateRequest.UnmarshalJSON(b); err != nil {
   350  		t.Fatalf("Error decoding feed metadata: %s", err)
   351  	}
   352  	updateRequest.SetData(update2Data)
   353  	if err = updateRequest.Sign(signer); err != nil {
   354  		t.Fatal(err)
   355  	}
   356  	testUrl, err = url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   357  	if err != nil {
   358  		t.Fatal(err)
   359  	}
   360  	urlQuery = testUrl.Query()
   361  	body = updateRequest.AppendValues(urlQuery) // this adds all query parameters
   362  	goodQueryParameters := urlQuery.Encode()    // save the query parameters for a second attempt
   363  
   364  	// create bad query parameters in which the signature is missing
   365  	urlQuery.Del("signature")
   366  	testUrl.RawQuery = urlQuery.Encode()
   367  
   368  	// 1st attempt with bad query parameters in which the signature is missing
   369  	resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   370  	if err != nil {
   371  		t.Fatal(err)
   372  	}
   373  	defer resp.Body.Close()
   374  	expectedCode := http.StatusBadRequest
   375  	if resp.StatusCode != expectedCode {
   376  		t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
   377  	}
   378  
   379  	// 2nd attempt with bad query parameters in which the signature is of incorrect length
   380  	urlQuery.Set("signature", "0xabcd") // should be 130 hex chars
   381  	resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   382  	if err != nil {
   383  		t.Fatal(err)
   384  	}
   385  	defer resp.Body.Close()
   386  	expectedCode = http.StatusBadRequest
   387  	if resp.StatusCode != expectedCode {
   388  		t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
   389  	}
   390  
   391  	// 3rd attempt, with good query parameters:
   392  	testUrl.RawQuery = goodQueryParameters
   393  	resp, err = http.Post(testUrl.String(), "application/octet-stream", bytes.NewReader(body))
   394  	if err != nil {
   395  		t.Fatal(err)
   396  	}
   397  	defer resp.Body.Close()
   398  	expectedCode = http.StatusOK
   399  	if resp.StatusCode != expectedCode {
   400  		t.Fatalf("Update returned %s. Expected %d", resp.Status, expectedCode)
   401  	}
   402  
   403  	// get latest update through bzz-feed directly
   404  	log.Info("get update 1.2")
   405  	testBzzResUrl = fmt.Sprintf("%s/bzz-feed:/%s", srv.URL, correctManifestAddrHex)
   406  	resp, err = http.Get(testBzzResUrl)
   407  	if err != nil {
   408  		t.Fatal(err)
   409  	}
   410  	defer resp.Body.Close()
   411  	if resp.StatusCode != http.StatusOK {
   412  		t.Fatalf("err %s", resp.Status)
   413  	}
   414  	b, err = ioutil.ReadAll(resp.Body)
   415  	if err != nil {
   416  		t.Fatal(err)
   417  	}
   418  	if !bytes.Equal(update2Data, b) {
   419  		t.Fatalf("Expected body '%x', got '%x'", update2Data, b)
   420  	}
   421  
   422  	// test manifest-less queries
   423  	log.Info("get first update in update1Timestamp via direct query")
   424  	query := feed.NewQuery(&updateRequest.Feed, update1Timestamp, lookup.NoClue)
   425  
   426  	urlq, err := url.Parse(fmt.Sprintf("%s/bzz-feed:/", srv.URL))
   427  	if err != nil {
   428  		t.Fatal(err)
   429  	}
   430  
   431  	values := urlq.Query()
   432  	query.AppendValues(values) // this adds feed query parameters
   433  	urlq.RawQuery = values.Encode()
   434  	resp, err = http.Get(urlq.String())
   435  	if err != nil {
   436  		t.Fatal(err)
   437  	}
   438  	defer resp.Body.Close()
   439  	if resp.StatusCode != http.StatusOK {
   440  		t.Fatalf("err %s", resp.Status)
   441  	}
   442  	b, err = ioutil.ReadAll(resp.Body)
   443  	if err != nil {
   444  		t.Fatal(err)
   445  	}
   446  	if !bytes.Equal(update1Data, b) {
   447  		t.Fatalf("Expected body '%x', got '%x'", update1Data, b)
   448  	}
   449  
   450  }
   451  
   452  func TestBzzGetPath(t *testing.T) {
   453  	testBzzGetPath(false, t)
   454  	testBzzGetPath(true, t)
   455  }
   456  
   457  func testBzzGetPath(encrypted bool, t *testing.T) {
   458  	var err error
   459  
   460  	testmanifest := []string{
   461  		`{"entries":[{"path":"b","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"c","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0}]}`,
   462  		`{"entries":[{"path":"a","hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","contentType":"","status":0},{"path":"b/","hash":"<key0>","contentType":"application/bzz-manifest+json","status":0}]}`,
   463  		`{"entries":[{"path":"a/","hash":"<key1>","contentType":"application/bzz-manifest+json","status":0}]}`,
   464  	}
   465  
   466  	testrequests := make(map[string]int)
   467  	testrequests["/"] = 2
   468  	testrequests["/a/"] = 1
   469  	testrequests["/a/b/"] = 0
   470  	testrequests["/x"] = 0
   471  	testrequests[""] = 0
   472  
   473  	expectedfailrequests := []string{"", "/x"}
   474  
   475  	reader := [3]*bytes.Reader{}
   476  
   477  	addr := [3]storage.Address{}
   478  
   479  	srv := NewTestSwarmServer(t, serverFunc, nil)
   480  	defer srv.Close()
   481  
   482  	for i, mf := range testmanifest {
   483  		reader[i] = bytes.NewReader([]byte(mf))
   484  		var wait func(context.Context) error
   485  		ctx := context.TODO()
   486  		addr[i], wait, err = srv.FileStore.Store(ctx, reader[i], int64(len(mf)), encrypted)
   487  		if err != nil {
   488  			t.Fatal(err)
   489  		}
   490  		for j := i + 1; j < len(testmanifest); j++ {
   491  			testmanifest[j] = strings.Replace(testmanifest[j], fmt.Sprintf("<key%v>", i), addr[i].Hex(), -1)
   492  		}
   493  		err = wait(ctx)
   494  		if err != nil {
   495  			t.Fatal(err)
   496  		}
   497  	}
   498  
   499  	rootRef := addr[2].Hex()
   500  
   501  	_, err = http.Get(srv.URL + "/bzz-raw:/" + rootRef + "/a")
   502  	if err != nil {
   503  		t.Fatalf("Failed to connect to proxy: %v", err)
   504  	}
   505  
   506  	for k, v := range testrequests {
   507  		var resp *http.Response
   508  		var respbody []byte
   509  
   510  		url := srv.URL + "/bzz-raw:/"
   511  		if k != "" {
   512  			url += rootRef + "/" + k[1:] + "?content_type=text/plain"
   513  		}
   514  		resp, err = http.Get(url)
   515  		if err != nil {
   516  			t.Fatalf("Request failed: %v", err)
   517  		}
   518  		defer resp.Body.Close()
   519  		respbody, err = ioutil.ReadAll(resp.Body)
   520  		if err != nil {
   521  			t.Fatalf("Error while reading response body: %v", err)
   522  		}
   523  
   524  		if string(respbody) != testmanifest[v] {
   525  			isexpectedfailrequest := false
   526  
   527  			for _, r := range expectedfailrequests {
   528  				if k == r {
   529  					isexpectedfailrequest = true
   530  				}
   531  			}
   532  			if !isexpectedfailrequest {
   533  				t.Fatalf("Response body does not match, expected: %v, got %v", testmanifest[v], string(respbody))
   534  			}
   535  		}
   536  	}
   537  
   538  	for k, v := range testrequests {
   539  		var resp *http.Response
   540  		var respbody []byte
   541  
   542  		url := srv.URL + "/bzz-hash:/"
   543  		if k != "" {
   544  			url += rootRef + "/" + k[1:]
   545  		}
   546  		resp, err = http.Get(url)
   547  		if err != nil {
   548  			t.Fatalf("Request failed: %v", err)
   549  		}
   550  		defer resp.Body.Close()
   551  		respbody, err = ioutil.ReadAll(resp.Body)
   552  		if err != nil {
   553  			t.Fatalf("Read request body: %v", err)
   554  		}
   555  
   556  		if string(respbody) != addr[v].Hex() {
   557  			isexpectedfailrequest := false
   558  
   559  			for _, r := range expectedfailrequests {
   560  				if k == r {
   561  					isexpectedfailrequest = true
   562  				}
   563  			}
   564  			if !isexpectedfailrequest {
   565  				t.Fatalf("Response body does not match, expected: %v, got %v", addr[v], string(respbody))
   566  			}
   567  		}
   568  	}
   569  
   570  	ref := addr[2].Hex()
   571  
   572  	for _, c := range []struct {
   573  		path          string
   574  		json          string
   575  		pageFragments []string
   576  	}{
   577  		{
   578  			path: "/",
   579  			json: `{"common_prefixes":["a/"]}`,
   580  			pageFragments: []string{
   581  				fmt.Sprintf("Swarm index of bzz:/%s/", ref),
   582  				`<a class="normal-link" href="a/">a/</a>`,
   583  			},
   584  		},
   585  		{
   586  			path: "/a/",
   587  			json: `{"common_prefixes":["a/b/"],"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/a","mod_time":"0001-01-01T00:00:00Z"}]}`,
   588  			pageFragments: []string{
   589  				fmt.Sprintf("Swarm index of bzz:/%s/a/", ref),
   590  				`<a class="normal-link" href="b/">b/</a>`,
   591  				fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/a">a</a>`, ref),
   592  			},
   593  		},
   594  		{
   595  			path: "/a/b/",
   596  			json: `{"entries":[{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/b","mod_time":"0001-01-01T00:00:00Z"},{"hash":"011b4d03dd8c01f1049143cf9c4c817e4b167f1d1b83e5c6f0f10d89ba1e7bce","path":"a/b/c","mod_time":"0001-01-01T00:00:00Z"}]}`,
   597  			pageFragments: []string{
   598  				fmt.Sprintf("Swarm index of bzz:/%s/a/b/", ref),
   599  				fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/b">b</a>`, ref),
   600  				fmt.Sprintf(`<a class="normal-link" href="/bzz:/%s/a/b/c">c</a>`, ref),
   601  			},
   602  		},
   603  		{
   604  			path: "/x",
   605  		},
   606  		{
   607  			path: "",
   608  		},
   609  	} {
   610  		k := c.path
   611  		url := srv.URL + "/bzz-list:/"
   612  		if k != "" {
   613  			url += rootRef + "/" + k[1:]
   614  		}
   615  		t.Run("json list "+c.path, func(t *testing.T) {
   616  			resp, err := http.Get(url)
   617  			if err != nil {
   618  				t.Fatalf("HTTP request: %v", err)
   619  			}
   620  			defer resp.Body.Close()
   621  			respbody, err := ioutil.ReadAll(resp.Body)
   622  			if err != nil {
   623  				t.Fatalf("Read response body: %v", err)
   624  			}
   625  
   626  			body := strings.TrimSpace(string(respbody))
   627  			if body != c.json {
   628  				isexpectedfailrequest := false
   629  
   630  				for _, r := range expectedfailrequests {
   631  					if k == r {
   632  						isexpectedfailrequest = true
   633  					}
   634  				}
   635  				if !isexpectedfailrequest {
   636  					t.Errorf("Response list body %q does not match, expected: %v, got %v", k, c.json, body)
   637  				}
   638  			}
   639  		})
   640  		t.Run("html list "+c.path, func(t *testing.T) {
   641  			req, err := http.NewRequest(http.MethodGet, url, nil)
   642  			if err != nil {
   643  				t.Fatalf("New request: %v", err)
   644  			}
   645  			req.Header.Set("Accept", "text/html")
   646  			resp, err := http.DefaultClient.Do(req)
   647  			if err != nil {
   648  				t.Fatalf("HTTP request: %v", err)
   649  			}
   650  			defer resp.Body.Close()
   651  			b, err := ioutil.ReadAll(resp.Body)
   652  			if err != nil {
   653  				t.Fatalf("Read response body: %v", err)
   654  			}
   655  
   656  			body := string(b)
   657  
   658  			for _, f := range c.pageFragments {
   659  				if !strings.Contains(body, f) {
   660  					isexpectedfailrequest := false
   661  
   662  					for _, r := range expectedfailrequests {
   663  						if k == r {
   664  							isexpectedfailrequest = true
   665  						}
   666  					}
   667  					if !isexpectedfailrequest {
   668  						t.Errorf("Response list body %q does not contain %q: body %q", k, f, body)
   669  					}
   670  				}
   671  			}
   672  		})
   673  	}
   674  
   675  	nonhashtests := []string{
   676  		srv.URL + "/bzz:/name",
   677  		srv.URL + "/bzz-immutable:/nonhash",
   678  		srv.URL + "/bzz-raw:/nonhash",
   679  		srv.URL + "/bzz-list:/nonhash",
   680  		srv.URL + "/bzz-hash:/nonhash",
   681  	}
   682  
   683  	nonhashresponses := []string{
   684  		`cannot resolve name: no DNS to resolve name: "name"`,
   685  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   686  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   687  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   688  		`cannot resolve nonhash: no DNS to resolve name: "nonhash"`,
   689  	}
   690  
   691  	for i, url := range nonhashtests {
   692  		var resp *http.Response
   693  		var respbody []byte
   694  
   695  		resp, err = http.Get(url)
   696  
   697  		if err != nil {
   698  			t.Fatalf("Request failed: %v", err)
   699  		}
   700  		defer resp.Body.Close()
   701  		respbody, err = ioutil.ReadAll(resp.Body)
   702  		if err != nil {
   703  			t.Fatalf("ReadAll failed: %v", err)
   704  		}
   705  		if !strings.Contains(string(respbody), nonhashresponses[i]) {
   706  			t.Fatalf("Non-Hash response body does not match, expected: %v, got: %v", nonhashresponses[i], string(respbody))
   707  		}
   708  	}
   709  }
   710  
   711  func TestBzzTar(t *testing.T) {
   712  	testBzzTar(false, t)
   713  	testBzzTar(true, t)
   714  }
   715  
   716  func testBzzTar(encrypted bool, t *testing.T) {
   717  	srv := NewTestSwarmServer(t, serverFunc, nil)
   718  	defer srv.Close()
   719  	fileNames := []string{"tmp1.txt", "tmp2.lock", "tmp3.rtf"}
   720  	fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"}
   721  
   722  	buf := &bytes.Buffer{}
   723  	tw := tar.NewWriter(buf)
   724  	defer tw.Close()
   725  
   726  	for i, v := range fileNames {
   727  		size := int64(len(fileContents[i]))
   728  		hdr := &tar.Header{
   729  			Name:    v,
   730  			Mode:    0644,
   731  			Size:    size,
   732  			ModTime: time.Now(),
   733  			Xattrs: map[string]string{
   734  				"user.swarm.content-type": "text/plain",
   735  			},
   736  		}
   737  		if err := tw.WriteHeader(hdr); err != nil {
   738  			t.Fatal(err)
   739  		}
   740  
   741  		// copy the file into the tar stream
   742  		n, err := io.Copy(tw, bytes.NewBufferString(fileContents[i]))
   743  		if err != nil {
   744  			t.Fatal(err)
   745  		} else if n != size {
   746  			t.Fatal("size mismatch")
   747  		}
   748  	}
   749  
   750  	//post tar stream
   751  	url := srv.URL + "/bzz:/"
   752  	if encrypted {
   753  		url = url + "encrypt"
   754  	}
   755  	req, err := http.NewRequest("POST", url, buf)
   756  	if err != nil {
   757  		t.Fatal(err)
   758  	}
   759  	req.Header.Add("Content-Type", "application/x-tar")
   760  	client := &http.Client{}
   761  	resp2, err := client.Do(req)
   762  	if err != nil {
   763  		t.Fatal(err)
   764  	}
   765  	if resp2.StatusCode != http.StatusOK {
   766  		t.Fatalf("err %s", resp2.Status)
   767  	}
   768  	swarmHash, err := ioutil.ReadAll(resp2.Body)
   769  	resp2.Body.Close()
   770  	if err != nil {
   771  		t.Fatal(err)
   772  	}
   773  
   774  	// now do a GET to get a tarball back
   775  	req, err = http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s", string(swarmHash)), nil)
   776  	if err != nil {
   777  		t.Fatal(err)
   778  	}
   779  	req.Header.Add("Accept", "application/x-tar")
   780  	resp2, err = client.Do(req)
   781  	if err != nil {
   782  		t.Fatal(err)
   783  	}
   784  	defer resp2.Body.Close()
   785  
   786  	if h := resp2.Header.Get("Content-Type"); h != "application/x-tar" {
   787  		t.Fatalf("Content-Type header expected: application/x-tar, got: %s", h)
   788  	}
   789  
   790  	expectedFileName := string(swarmHash) + ".tar"
   791  	expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", expectedFileName)
   792  	if h := resp2.Header.Get("Content-Disposition"); h != expectedContentDisposition {
   793  		t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h)
   794  	}
   795  
   796  	file, err := ioutil.TempFile("", "swarm-downloaded-tarball")
   797  	if err != nil {
   798  		t.Fatal(err)
   799  	}
   800  	defer os.Remove(file.Name())
   801  	_, err = io.Copy(file, resp2.Body)
   802  	if err != nil {
   803  		t.Fatalf("error getting tarball: %v", err)
   804  	}
   805  	file.Sync()
   806  	file.Close()
   807  
   808  	tarFileHandle, err := os.Open(file.Name())
   809  	if err != nil {
   810  		t.Fatal(err)
   811  	}
   812  	tr := tar.NewReader(tarFileHandle)
   813  
   814  	for {
   815  		hdr, err := tr.Next()
   816  		if err == io.EOF {
   817  			break
   818  		} else if err != nil {
   819  			t.Fatalf("error reading tar stream: %s", err)
   820  		}
   821  		bb := make([]byte, hdr.Size)
   822  		_, err = tr.Read(bb)
   823  		if err != nil && err != io.EOF {
   824  			t.Fatal(err)
   825  		}
   826  		passed := false
   827  		for i, v := range fileNames {
   828  			if v == hdr.Name {
   829  				if string(bb) == fileContents[i] {
   830  					passed = true
   831  					break
   832  				}
   833  			}
   834  		}
   835  		if !passed {
   836  			t.Fatalf("file %s did not pass content assertion", hdr.Name)
   837  		}
   838  	}
   839  }
   840  
   841  // TestBzzRootRedirect tests that getting the root path of a manifest without
   842  // a trailing slash gets redirected to include the trailing slash so that
   843  // relative URLs work as expected.
   844  func TestBzzRootRedirect(t *testing.T) {
   845  	testBzzRootRedirect(false, t)
   846  }
   847  func TestBzzRootRedirectEncrypted(t *testing.T) {
   848  	testBzzRootRedirect(true, t)
   849  }
   850  
   851  func testBzzRootRedirect(toEncrypt bool, t *testing.T) {
   852  	srv := NewTestSwarmServer(t, serverFunc, nil)
   853  	defer srv.Close()
   854  
   855  	// create a manifest with some data at the root path
   856  	client := swarm.NewClient(srv.URL)
   857  	data := []byte("data")
   858  	file := &swarm.File{
   859  		ReadCloser: ioutil.NopCloser(bytes.NewReader(data)),
   860  		ManifestEntry: api.ManifestEntry{
   861  			Path:        "",
   862  			ContentType: "text/plain",
   863  			Size:        int64(len(data)),
   864  		},
   865  	}
   866  	hash, err := client.Upload(file, "", toEncrypt)
   867  	if err != nil {
   868  		t.Fatal(err)
   869  	}
   870  
   871  	// define a CheckRedirect hook which ensures there is only a single
   872  	// redirect to the correct URL
   873  	redirected := false
   874  	httpClient := http.Client{
   875  		CheckRedirect: func(req *http.Request, via []*http.Request) error {
   876  			if redirected {
   877  				return errors.New("too many redirects")
   878  			}
   879  			redirected = true
   880  			expectedPath := "/bzz:/" + hash + "/"
   881  			if req.URL.Path != expectedPath {
   882  				return fmt.Errorf("expected redirect to %q, got %q", expectedPath, req.URL.Path)
   883  			}
   884  			return nil
   885  		},
   886  	}
   887  
   888  	// perform the GET request and assert the response
   889  	res, err := httpClient.Get(srv.URL + "/bzz:/" + hash)
   890  	if err != nil {
   891  		t.Fatal(err)
   892  	}
   893  	defer res.Body.Close()
   894  	if !redirected {
   895  		t.Fatal("expected GET /bzz:/<hash> to redirect to /bzz:/<hash>/ but it didn't")
   896  	}
   897  	gotData, err := ioutil.ReadAll(res.Body)
   898  	if err != nil {
   899  		t.Fatal(err)
   900  	}
   901  	if !bytes.Equal(gotData, data) {
   902  		t.Fatalf("expected response to equal %q, got %q", data, gotData)
   903  	}
   904  }
   905  
   906  func TestMethodsNotAllowed(t *testing.T) {
   907  	srv := NewTestSwarmServer(t, serverFunc, nil)
   908  	defer srv.Close()
   909  	databytes := "bar"
   910  	for _, c := range []struct {
   911  		url  string
   912  		code int
   913  	}{
   914  		{
   915  			url:  fmt.Sprintf("%s/bzz-list:/", srv.URL),
   916  			code: http.StatusMethodNotAllowed,
   917  		}, {
   918  			url:  fmt.Sprintf("%s/bzz-hash:/", srv.URL),
   919  			code: http.StatusMethodNotAllowed,
   920  		},
   921  		{
   922  			url:  fmt.Sprintf("%s/bzz-immutable:/", srv.URL),
   923  			code: http.StatusMethodNotAllowed,
   924  		},
   925  	} {
   926  		res, _ := http.Post(c.url, "text/plain", bytes.NewReader([]byte(databytes)))
   927  		if res.StatusCode != c.code {
   928  			t.Fatalf("should have failed. requested url: %s, expected code %d, got %d", c.url, c.code, res.StatusCode)
   929  		}
   930  	}
   931  
   932  }
   933  
   934  func httpDo(httpMethod string, url string, reqBody io.Reader, headers map[string]string, verbose bool, t *testing.T) (*http.Response, string) {
   935  	// Build the Request
   936  	req, err := http.NewRequest(httpMethod, url, reqBody)
   937  	if err != nil {
   938  		t.Fatal(err)
   939  	}
   940  	for key, value := range headers {
   941  		req.Header.Set(key, value)
   942  	}
   943  	if verbose {
   944  		t.Log(req.Method, req.URL, req.Header, req.Body)
   945  	}
   946  
   947  	// Send Request out
   948  	httpClient := &http.Client{}
   949  	res, err := httpClient.Do(req)
   950  	if err != nil {
   951  		t.Fatal(err)
   952  	}
   953  
   954  	// Read the HTTP Body
   955  	buffer, err := ioutil.ReadAll(res.Body)
   956  	if err != nil {
   957  		t.Fatal(err)
   958  	}
   959  	defer res.Body.Close()
   960  	body := string(buffer)
   961  
   962  	return res, body
   963  }
   964  
   965  func TestGet(t *testing.T) {
   966  	srv := NewTestSwarmServer(t, serverFunc, nil)
   967  	defer srv.Close()
   968  
   969  	for _, testCase := range []struct {
   970  		uri                string
   971  		method             string
   972  		headers            map[string]string
   973  		expectedStatusCode int
   974  		assertResponseBody string
   975  		verbose            bool
   976  	}{
   977  		{
   978  			uri:                fmt.Sprintf("%s/", srv.URL),
   979  			method:             "GET",
   980  			headers:            map[string]string{"Accept": "text/html"},
   981  			expectedStatusCode: http.StatusOK,
   982  			assertResponseBody: "Swarm: Serverless Hosting Incentivised Peer-To-Peer Storage And Content Distribution",
   983  			verbose:            false,
   984  		},
   985  		{
   986  			uri:                fmt.Sprintf("%s/", srv.URL),
   987  			method:             "GET",
   988  			headers:            map[string]string{"Accept": "application/json"},
   989  			expectedStatusCode: http.StatusOK,
   990  			assertResponseBody: "Swarm: Please request a valid ENS or swarm hash with the appropriate bzz scheme",
   991  			verbose:            false,
   992  		},
   993  		{
   994  			uri:                fmt.Sprintf("%s/robots.txt", srv.URL),
   995  			method:             "GET",
   996  			headers:            map[string]string{"Accept": "text/html"},
   997  			expectedStatusCode: http.StatusOK,
   998  			assertResponseBody: "User-agent: *\nDisallow: /",
   999  			verbose:            false,
  1000  		},
  1001  		{
  1002  			uri:                fmt.Sprintf("%s/nonexistent_path", srv.URL),
  1003  			method:             "GET",
  1004  			headers:            map[string]string{},
  1005  			expectedStatusCode: http.StatusNotFound,
  1006  			verbose:            false,
  1007  		},
  1008  		{
  1009  			uri:                fmt.Sprintf("%s/bzz:asdf/", srv.URL),
  1010  			method:             "GET",
  1011  			headers:            map[string]string{},
  1012  			expectedStatusCode: http.StatusNotFound,
  1013  			verbose:            false,
  1014  		},
  1015  		{
  1016  			uri:                fmt.Sprintf("%s/tbz2/", srv.URL),
  1017  			method:             "GET",
  1018  			headers:            map[string]string{},
  1019  			expectedStatusCode: http.StatusNotFound,
  1020  			verbose:            false,
  1021  		},
  1022  		{
  1023  			uri:                fmt.Sprintf("%s/bzz-rack:/", srv.URL),
  1024  			method:             "GET",
  1025  			headers:            map[string]string{},
  1026  			expectedStatusCode: http.StatusNotFound,
  1027  			verbose:            false,
  1028  		},
  1029  		{
  1030  			uri:                fmt.Sprintf("%s/bzz-ls", srv.URL),
  1031  			method:             "GET",
  1032  			headers:            map[string]string{},
  1033  			expectedStatusCode: http.StatusNotFound,
  1034  			verbose:            false,
  1035  		}} {
  1036  		t.Run("GET "+testCase.uri, func(t *testing.T) {
  1037  			res, body := httpDo(testCase.method, testCase.uri, nil, testCase.headers, testCase.verbose, t)
  1038  			if res.StatusCode != testCase.expectedStatusCode {
  1039  				t.Fatalf("expected status code %d but got %d", testCase.expectedStatusCode, res.StatusCode)
  1040  			}
  1041  			if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) {
  1042  				t.Fatalf("expected response to be: %s but got: %s", testCase.assertResponseBody, body)
  1043  			}
  1044  		})
  1045  	}
  1046  }
  1047  
  1048  func TestModify(t *testing.T) {
  1049  	srv := NewTestSwarmServer(t, serverFunc, nil)
  1050  	defer srv.Close()
  1051  
  1052  	swarmClient := swarm.NewClient(srv.URL)
  1053  	data := []byte("data")
  1054  	file := &swarm.File{
  1055  		ReadCloser: ioutil.NopCloser(bytes.NewReader(data)),
  1056  		ManifestEntry: api.ManifestEntry{
  1057  			Path:        "",
  1058  			ContentType: "text/plain",
  1059  			Size:        int64(len(data)),
  1060  		},
  1061  	}
  1062  
  1063  	hash, err := swarmClient.Upload(file, "", false)
  1064  	if err != nil {
  1065  		t.Fatal(err)
  1066  	}
  1067  
  1068  	for _, testCase := range []struct {
  1069  		uri                   string
  1070  		method                string
  1071  		headers               map[string]string
  1072  		requestBody           []byte
  1073  		expectedStatusCode    int
  1074  		assertResponseBody    string
  1075  		assertResponseHeaders map[string]string
  1076  		verbose               bool
  1077  	}{
  1078  		{
  1079  			uri:                fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
  1080  			method:             "DELETE",
  1081  			headers:            map[string]string{},
  1082  			expectedStatusCode: http.StatusOK,
  1083  			assertResponseBody: "8b634aea26eec353ac0ecbec20c94f44d6f8d11f38d4578a4c207a84c74ef731",
  1084  			verbose:            false,
  1085  		},
  1086  		{
  1087  			uri:                fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
  1088  			method:             "PUT",
  1089  			headers:            map[string]string{},
  1090  			expectedStatusCode: http.StatusMethodNotAllowed,
  1091  			verbose:            false,
  1092  		},
  1093  		{
  1094  			uri:                fmt.Sprintf("%s/bzz-raw:/%s", srv.URL, hash),
  1095  			method:             "PUT",
  1096  			headers:            map[string]string{},
  1097  			expectedStatusCode: http.StatusMethodNotAllowed,
  1098  			verbose:            false,
  1099  		},
  1100  		{
  1101  			uri:                fmt.Sprintf("%s/bzz:/%s", srv.URL, hash),
  1102  			method:             "PATCH",
  1103  			headers:            map[string]string{},
  1104  			expectedStatusCode: http.StatusMethodNotAllowed,
  1105  			verbose:            false,
  1106  		},
  1107  		{
  1108  			uri:                   fmt.Sprintf("%s/bzz-raw:/", srv.URL),
  1109  			method:                "POST",
  1110  			headers:               map[string]string{},
  1111  			requestBody:           []byte("POSTdata"),
  1112  			expectedStatusCode:    http.StatusOK,
  1113  			assertResponseHeaders: map[string]string{"Content-Length": "64"},
  1114  			verbose:               false,
  1115  		},
  1116  		{
  1117  			uri:                   fmt.Sprintf("%s/bzz-raw:/encrypt", srv.URL),
  1118  			method:                "POST",
  1119  			headers:               map[string]string{},
  1120  			requestBody:           []byte("POSTdata"),
  1121  			expectedStatusCode:    http.StatusOK,
  1122  			assertResponseHeaders: map[string]string{"Content-Length": "128"},
  1123  			verbose:               false,
  1124  		},
  1125  	} {
  1126  		t.Run(testCase.method+" "+testCase.uri, func(t *testing.T) {
  1127  			reqBody := bytes.NewReader(testCase.requestBody)
  1128  			res, body := httpDo(testCase.method, testCase.uri, reqBody, testCase.headers, testCase.verbose, t)
  1129  
  1130  			if res.StatusCode != testCase.expectedStatusCode {
  1131  				t.Fatalf("expected status code %d but got %d, %s", testCase.expectedStatusCode, res.StatusCode, body)
  1132  			}
  1133  			if testCase.assertResponseBody != "" && !strings.Contains(body, testCase.assertResponseBody) {
  1134  				t.Log(body)
  1135  				t.Fatalf("expected response %s but got %s", testCase.assertResponseBody, body)
  1136  			}
  1137  			for key, value := range testCase.assertResponseHeaders {
  1138  				if res.Header.Get(key) != value {
  1139  					t.Logf("expected %s=%s in HTTP response header but got %s", key, value, res.Header.Get(key))
  1140  				}
  1141  			}
  1142  		})
  1143  	}
  1144  }
  1145  
  1146  func TestMultiPartUpload(t *testing.T) {
  1147  	// POST /bzz:/ Content-Type: multipart/form-data
  1148  	verbose := false
  1149  	// Setup Swarm
  1150  	srv := NewTestSwarmServer(t, serverFunc, nil)
  1151  	defer srv.Close()
  1152  
  1153  	url := fmt.Sprintf("%s/bzz:/", srv.URL)
  1154  
  1155  	buf := new(bytes.Buffer)
  1156  	form := multipart.NewWriter(buf)
  1157  	form.WriteField("name", "John Doe")
  1158  	file1, _ := form.CreateFormFile("cv", "cv.txt")
  1159  	file1.Write([]byte("John Doe's Credentials"))
  1160  	file2, _ := form.CreateFormFile("profile_picture", "profile.jpg")
  1161  	file2.Write([]byte("imaginethisisjpegdata"))
  1162  	form.Close()
  1163  
  1164  	headers := map[string]string{
  1165  		"Content-Type":   form.FormDataContentType(),
  1166  		"Content-Length": strconv.Itoa(buf.Len()),
  1167  	}
  1168  	res, body := httpDo("POST", url, buf, headers, verbose, t)
  1169  
  1170  	if res.StatusCode != http.StatusOK {
  1171  		t.Fatalf("expected POST multipart/form-data to return 200, but it returned %d", res.StatusCode)
  1172  	}
  1173  	if len(body) != 64 {
  1174  		t.Fatalf("expected POST multipart/form-data to return a 64 char manifest but the answer was %d chars long", len(body))
  1175  	}
  1176  }
  1177  
  1178  // TestBzzGetFileWithResolver tests fetching a file using a mocked ENS resolver
  1179  func TestBzzGetFileWithResolver(t *testing.T) {
  1180  	resolver := newTestResolveValidator("")
  1181  	srv := NewTestSwarmServer(t, serverFunc, resolver)
  1182  	defer srv.Close()
  1183  	fileNames := []string{"dir1/tmp1.txt", "dir2/tmp2.lock", "dir3/tmp3.rtf"}
  1184  	fileContents := []string{"tmp1textfilevalue", "tmp2lockfilelocked", "tmp3isjustaplaintextfile"}
  1185  
  1186  	buf := &bytes.Buffer{}
  1187  	tw := tar.NewWriter(buf)
  1188  
  1189  	for i, v := range fileNames {
  1190  		size := len(fileContents[i])
  1191  		hdr := &tar.Header{
  1192  			Name:    v,
  1193  			Mode:    0644,
  1194  			Size:    int64(size),
  1195  			ModTime: time.Now(),
  1196  			Xattrs: map[string]string{
  1197  				"user.swarm.content-type": "text/plain",
  1198  			},
  1199  		}
  1200  		if err := tw.WriteHeader(hdr); err != nil {
  1201  			t.Fatal(err)
  1202  		}
  1203  
  1204  		// copy the file into the tar stream
  1205  		n, err := io.WriteString(tw, fileContents[i])
  1206  		if err != nil {
  1207  			t.Fatal(err)
  1208  		} else if n != size {
  1209  			t.Fatal("size mismatch")
  1210  		}
  1211  	}
  1212  
  1213  	if err := tw.Close(); err != nil {
  1214  		t.Fatal(err)
  1215  	}
  1216  
  1217  	//post tar stream
  1218  	url := srv.URL + "/bzz:/"
  1219  
  1220  	req, err := http.NewRequest("POST", url, buf)
  1221  	if err != nil {
  1222  		t.Fatal(err)
  1223  	}
  1224  	req.Header.Add("Content-Type", "application/x-tar")
  1225  	client := &http.Client{}
  1226  	serverResponse, err := client.Do(req)
  1227  	if err != nil {
  1228  		t.Fatal(err)
  1229  	}
  1230  	if serverResponse.StatusCode != http.StatusOK {
  1231  		t.Fatalf("err %s", serverResponse.Status)
  1232  	}
  1233  	swarmHash, err := ioutil.ReadAll(serverResponse.Body)
  1234  	serverResponse.Body.Close()
  1235  	if err != nil {
  1236  		t.Fatal(err)
  1237  	}
  1238  	// set the resolved hash to be the swarm hash of what we've just uploaded
  1239  	hash := common.HexToHash(string(swarmHash))
  1240  	resolver.hash = &hash
  1241  	for _, v := range []struct {
  1242  		addr                string
  1243  		path                string
  1244  		expectedStatusCode  int
  1245  		expectedContentType string
  1246  		expectedFileName    string
  1247  	}{
  1248  		{
  1249  			addr:                string(swarmHash),
  1250  			path:                fileNames[0],
  1251  			expectedStatusCode:  http.StatusOK,
  1252  			expectedContentType: "text/plain",
  1253  			expectedFileName:    path.Base(fileNames[0]),
  1254  		},
  1255  		{
  1256  			addr:                "somebogusensname",
  1257  			path:                fileNames[0],
  1258  			expectedStatusCode:  http.StatusOK,
  1259  			expectedContentType: "text/plain",
  1260  			expectedFileName:    path.Base(fileNames[0]),
  1261  		},
  1262  	} {
  1263  		req, err := http.NewRequest("GET", fmt.Sprintf(srv.URL+"/bzz:/%s/%s", v.addr, v.path), nil)
  1264  		if err != nil {
  1265  			t.Fatal(err)
  1266  		}
  1267  		serverResponse, err := client.Do(req)
  1268  		if err != nil {
  1269  			t.Fatal(err)
  1270  		}
  1271  		defer serverResponse.Body.Close()
  1272  		if serverResponse.StatusCode != v.expectedStatusCode {
  1273  			t.Fatalf("expected %d, got %d", v.expectedStatusCode, serverResponse.StatusCode)
  1274  		}
  1275  
  1276  		if h := serverResponse.Header.Get("Content-Type"); h != v.expectedContentType {
  1277  			t.Fatalf("Content-Type header expected: %s, got %s", v.expectedContentType, h)
  1278  		}
  1279  
  1280  		expectedContentDisposition := fmt.Sprintf("inline; filename=\"%s\"", v.expectedFileName)
  1281  		if h := serverResponse.Header.Get("Content-Disposition"); h != expectedContentDisposition {
  1282  			t.Fatalf("Content-Disposition header expected: %s, got: %s", expectedContentDisposition, h)
  1283  		}
  1284  
  1285  	}
  1286  }
  1287  
  1288  // testResolver implements the Resolver interface and either returns the given
  1289  // hash if it is set, or returns a "name not found" error
  1290  type testResolveValidator struct {
  1291  	hash *common.Hash
  1292  }
  1293  
  1294  func newTestResolveValidator(addr string) *testResolveValidator {
  1295  	r := &testResolveValidator{}
  1296  	if addr != "" {
  1297  		hash := common.HexToHash(addr)
  1298  		r.hash = &hash
  1299  	}
  1300  	return r
  1301  }
  1302  
  1303  func (t *testResolveValidator) Resolve(addr string) (common.Hash, error) {
  1304  	if t.hash == nil {
  1305  		return common.Hash{}, fmt.Errorf("DNS name not found: %q", addr)
  1306  	}
  1307  	return *t.hash, nil
  1308  }
  1309  
  1310  func (t *testResolveValidator) Owner(node [32]byte) (addr common.Address, err error) {
  1311  	return
  1312  }
  1313  func (t *testResolveValidator) HeaderByNumber(context.Context, *big.Int) (header *types.Header, err error) {
  1314  	return
  1315  }