| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421 |
- // Copyright 2020 The go-ethereum Authors
- // This file is part of the go-ethereum library.
- //
- // The go-ethereum library is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Lesser General Public License as published by
- // the Free Software Foundation, either version 3 of the License, or
- // (at your option) any later version.
- //
- // The go-ethereum library is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Lesser General Public License for more details.
- //
- // You should have received a copy of the GNU Lesser General Public License
- // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
- package node
- import (
- "bytes"
- "fmt"
- "net/http"
- "net/url"
- "strconv"
- "strings"
- "testing"
- "time"
- "github.com/ethereum/go-ethereum/internal/testlog"
- "github.com/ethereum/go-ethereum/log"
- "github.com/ethereum/go-ethereum/rpc"
- "github.com/golang-jwt/jwt/v4"
- "github.com/gorilla/websocket"
- "github.com/stretchr/testify/assert"
- )
- // TestCorsHandler makes sure CORS are properly handled on the http server.
- func TestCorsHandler(t *testing.T) {
- srv := createAndStartServer(t, &httpConfig{CorsAllowedOrigins: []string{"test", "test.com"}}, false, &wsConfig{})
- defer srv.stop()
- url := "http://" + srv.listenAddr()
- resp := rpcRequest(t, url, "origin", "test.com")
- assert.Equal(t, "test.com", resp.Header.Get("Access-Control-Allow-Origin"))
- resp2 := rpcRequest(t, url, "origin", "bad")
- assert.Equal(t, "", resp2.Header.Get("Access-Control-Allow-Origin"))
- }
- // TestVhosts makes sure vhosts are properly handled on the http server.
- func TestVhosts(t *testing.T) {
- srv := createAndStartServer(t, &httpConfig{Vhosts: []string{"test"}}, false, &wsConfig{})
- defer srv.stop()
- url := "http://" + srv.listenAddr()
- resp := rpcRequest(t, url, "host", "test")
- assert.Equal(t, resp.StatusCode, http.StatusOK)
- resp2 := rpcRequest(t, url, "host", "bad")
- assert.Equal(t, resp2.StatusCode, http.StatusForbidden)
- }
- type originTest struct {
- spec string
- expOk []string
- expFail []string
- }
- // splitAndTrim splits input separated by a comma
- // and trims excessive white space from the substrings.
- // Copied over from flags.go
- func splitAndTrim(input string) (ret []string) {
- l := strings.Split(input, ",")
- for _, r := range l {
- r = strings.TrimSpace(r)
- if len(r) > 0 {
- ret = append(ret, r)
- }
- }
- return ret
- }
- // TestWebsocketOrigins makes sure the websocket origins are properly handled on the websocket server.
- func TestWebsocketOrigins(t *testing.T) {
- tests := []originTest{
- {
- spec: "*", // allow all
- expOk: []string{"", "http://test", "https://test", "http://test:8540", "https://test:8540",
- "http://test.com", "https://foo.test", "http://testa", "http://atestb:8540", "https://atestb:8540"},
- },
- {
- spec: "test",
- expOk: []string{"http://test", "https://test", "http://test:8540", "https://test:8540"},
- expFail: []string{"http://test.com", "https://foo.test", "http://testa", "http://atestb:8540", "https://atestb:8540"},
- },
- // scheme tests
- {
- spec: "https://test",
- expOk: []string{"https://test", "https://test:9999"},
- expFail: []string{
- "test", // no scheme, required by spec
- "http://test", // wrong scheme
- "http://test.foo", "https://a.test.x", // subdomain variations
- "http://testx:8540", "https://xtest:8540"},
- },
- // ip tests
- {
- spec: "https://12.34.56.78",
- expOk: []string{"https://12.34.56.78", "https://12.34.56.78:8540"},
- expFail: []string{
- "http://12.34.56.78", // wrong scheme
- "http://12.34.56.78:443", // wrong scheme
- "http://1.12.34.56.78", // wrong 'domain name'
- "http://12.34.56.78.a", // wrong 'domain name'
- "https://87.65.43.21", "http://87.65.43.21:8540", "https://87.65.43.21:8540"},
- },
- // port tests
- {
- spec: "test:8540",
- expOk: []string{"http://test:8540", "https://test:8540"},
- expFail: []string{
- "http://test", "https://test", // spec says port required
- "http://test:8541", "https://test:8541", // wrong port
- "http://bad", "https://bad", "http://bad:8540", "https://bad:8540"},
- },
- // scheme and port
- {
- spec: "https://test:8540",
- expOk: []string{"https://test:8540"},
- expFail: []string{
- "https://test", // missing port
- "http://test", // missing port, + wrong scheme
- "http://test:8540", // wrong scheme
- "http://test:8541", "https://test:8541", // wrong port
- "http://bad", "https://bad", "http://bad:8540", "https://bad:8540"},
- },
- // several allowed origins
- {
- spec: "localhost,http://127.0.0.1",
- expOk: []string{"localhost", "http://localhost", "https://localhost:8443",
- "http://127.0.0.1", "http://127.0.0.1:8080"},
- expFail: []string{
- "https://127.0.0.1", // wrong scheme
- "http://bad", "https://bad", "http://bad:8540", "https://bad:8540"},
- },
- }
- for _, tc := range tests {
- srv := createAndStartServer(t, &httpConfig{}, true, &wsConfig{Origins: splitAndTrim(tc.spec)})
- url := fmt.Sprintf("ws://%v", srv.listenAddr())
- for _, origin := range tc.expOk {
- if err := wsRequest(t, url, "Origin", origin); err != nil {
- t.Errorf("spec '%v', origin '%v': expected ok, got %v", tc.spec, origin, err)
- }
- }
- for _, origin := range tc.expFail {
- if err := wsRequest(t, url, "Origin", origin); err == nil {
- t.Errorf("spec '%v', origin '%v': expected not to allow, got ok", tc.spec, origin)
- }
- }
- srv.stop()
- }
- }
- // TestIsWebsocket tests if an incoming websocket upgrade request is handled properly.
- func TestIsWebsocket(t *testing.T) {
- r, _ := http.NewRequest("GET", "/", nil)
- assert.False(t, isWebsocket(r))
- r.Header.Set("upgrade", "websocket")
- assert.False(t, isWebsocket(r))
- r.Header.Set("connection", "upgrade")
- assert.True(t, isWebsocket(r))
- r.Header.Set("connection", "upgrade,keep-alive")
- assert.True(t, isWebsocket(r))
- r.Header.Set("connection", " UPGRADE,keep-alive")
- assert.True(t, isWebsocket(r))
- }
- func Test_checkPath(t *testing.T) {
- tests := []struct {
- req *http.Request
- prefix string
- expected bool
- }{
- {
- req: &http.Request{URL: &url.URL{Path: "/test"}},
- prefix: "/test",
- expected: true,
- },
- {
- req: &http.Request{URL: &url.URL{Path: "/testing"}},
- prefix: "/test",
- expected: true,
- },
- {
- req: &http.Request{URL: &url.URL{Path: "/"}},
- prefix: "/test",
- expected: false,
- },
- {
- req: &http.Request{URL: &url.URL{Path: "/fail"}},
- prefix: "/test",
- expected: false,
- },
- {
- req: &http.Request{URL: &url.URL{Path: "/"}},
- prefix: "",
- expected: true,
- },
- {
- req: &http.Request{URL: &url.URL{Path: "/fail"}},
- prefix: "",
- expected: false,
- },
- {
- req: &http.Request{URL: &url.URL{Path: "/"}},
- prefix: "/",
- expected: true,
- },
- {
- req: &http.Request{URL: &url.URL{Path: "/testing"}},
- prefix: "/",
- expected: true,
- },
- }
- for i, tt := range tests {
- t.Run(strconv.Itoa(i), func(t *testing.T) {
- assert.Equal(t, tt.expected, checkPath(tt.req, tt.prefix))
- })
- }
- }
- func createAndStartServer(t *testing.T, conf *httpConfig, ws bool, wsConf *wsConfig) *httpServer {
- t.Helper()
- srv := newHTTPServer(testlog.Logger(t, log.LvlDebug), rpc.DefaultHTTPTimeouts)
- assert.NoError(t, srv.enableRPC(nil, *conf))
- if ws {
- assert.NoError(t, srv.enableWS(nil, *wsConf))
- }
- assert.NoError(t, srv.setListenAddr("localhost", 0))
- assert.NoError(t, srv.start())
- return srv
- }
- // wsRequest attempts to open a WebSocket connection to the given URL.
- func wsRequest(t *testing.T, url string, extraHeaders ...string) error {
- t.Helper()
- //t.Logf("checking WebSocket on %s (origin %q)", url, browserOrigin)
- headers := make(http.Header)
- // Apply extra headers.
- if len(extraHeaders)%2 != 0 {
- panic("odd extraHeaders length")
- }
- for i := 0; i < len(extraHeaders); i += 2 {
- key, value := extraHeaders[i], extraHeaders[i+1]
- headers.Set(key, value)
- }
- conn, _, err := websocket.DefaultDialer.Dial(url, headers)
- if conn != nil {
- conn.Close()
- }
- return err
- }
- // rpcRequest performs a JSON-RPC request to the given URL.
- func rpcRequest(t *testing.T, url string, extraHeaders ...string) *http.Response {
- t.Helper()
- // Create the request.
- body := bytes.NewReader([]byte(`{"jsonrpc":"2.0","id":1,"method":"rpc_modules","params":[]}`))
- req, err := http.NewRequest("POST", url, body)
- if err != nil {
- t.Fatal("could not create http request:", err)
- }
- req.Header.Set("content-type", "application/json")
- // Apply extra headers.
- if len(extraHeaders)%2 != 0 {
- panic("odd extraHeaders length")
- }
- for i := 0; i < len(extraHeaders); i += 2 {
- key, value := extraHeaders[i], extraHeaders[i+1]
- if strings.EqualFold(key, "host") {
- req.Host = value
- } else {
- req.Header.Set(key, value)
- }
- }
- // Perform the request.
- t.Logf("checking RPC/HTTP on %s %v", url, extraHeaders)
- resp, err := http.DefaultClient.Do(req)
- if err != nil {
- t.Fatal(err)
- }
- return resp
- }
- type testClaim map[string]interface{}
- func (testClaim) Valid() error {
- return nil
- }
- func TestJWT(t *testing.T) {
- var secret = []byte("secret")
- issueToken := func(secret []byte, method jwt.SigningMethod, input map[string]interface{}) string {
- if method == nil {
- method = jwt.SigningMethodHS256
- }
- ss, _ := jwt.NewWithClaims(method, testClaim(input)).SignedString(secret)
- return ss
- }
- srv := createAndStartServer(t, &httpConfig{jwtSecret: []byte("secret")},
- true, &wsConfig{Origins: []string{"*"}, jwtSecret: []byte("secret")})
- wsUrl := fmt.Sprintf("ws://%v", srv.listenAddr())
- htUrl := fmt.Sprintf("http://%v", srv.listenAddr())
- expOk := []func() string{
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + 4}))
- },
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() - 4}))
- },
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{
- "iat": time.Now().Unix(),
- "exp": time.Now().Unix() + 2,
- }))
- },
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{
- "iat": time.Now().Unix(),
- "bar": "baz",
- }))
- },
- }
- for i, tokenFn := range expOk {
- token := tokenFn()
- if err := wsRequest(t, wsUrl, "Authorization", token); err != nil {
- t.Errorf("test %d-ws, token '%v': expected ok, got %v", i, token, err)
- }
- token = tokenFn()
- if resp := rpcRequest(t, htUrl, "Authorization", token); resp.StatusCode != 200 {
- t.Errorf("test %d-http, token '%v': expected ok, got %v", i, token, resp.StatusCode)
- }
- }
- expFail := []func() string{
- // future
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + int64(jwtExpiryTimeout.Seconds()) + 1}))
- },
- // stale
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() - int64(jwtExpiryTimeout.Seconds()) - 1}))
- },
- // wrong algo
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, jwt.SigningMethodHS512, testClaim{"iat": time.Now().Unix() + 4}))
- },
- // expired
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix(), "exp": time.Now().Unix()}))
- },
- // missing mandatory iat
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{}))
- },
- // wrong secret
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken([]byte("wrong"), nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken([]byte{}, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(nil, nil, testClaim{"iat": time.Now().Unix()}))
- },
- // Various malformed syntax
- func() string {
- return fmt.Sprintf("%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer: %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer:%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer\t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- func() string {
- return fmt.Sprintf("Bearer \t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
- },
- }
- for i, tokenFn := range expFail {
- token := tokenFn()
- if err := wsRequest(t, wsUrl, "Authorization", token); err == nil {
- t.Errorf("tc %d-ws, token '%v': expected not to allow, got ok", i, token)
- }
- token = tokenFn()
- if resp := rpcRequest(t, htUrl, "Authorization", token); resp.StatusCode != 403 {
- t.Errorf("tc %d-http, token '%v': expected not to allow, got %v", i, token, resp.StatusCode)
- }
- }
- srv.stop()
- }
|