// Copyright 2015-2017 Parity Technologies (UK) Ltd. // This file is part of Parity. // Parity is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Parity is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Parity. If not, see . //! WebSockets server tests. use std::sync::Arc; use devtools::http_client; use jsonrpc_core::MetaIoHandler; use rand; use ws; use v1::{extractors, informant}; use tests::helpers::{GuardedAuthCodes, Server}; /// Setup a mock signer for tests pub fn serve() -> (Server, usize, GuardedAuthCodes) { let port = 35000 + rand::random::() % 10000; let address = format!("127.0.0.1:{}", port).parse().unwrap(); let io = MetaIoHandler::default(); let authcodes = GuardedAuthCodes::new(); let stats = Arc::new(informant::RpcStats::default()); let res = Server::new(|remote| ::start_ws( &address, io, remote, ws::DomainsValidation::Disabled, ws::DomainsValidation::Disabled, 5, extractors::WsExtractor::new(Some(&authcodes.path)), extractors::WsExtractor::new(Some(&authcodes.path)), extractors::WsStats::new(stats), ).unwrap()); (res, port, authcodes) } /// Test a single request to running server pub fn request(server: Server, request: &str) -> http_client::Response { http_client::request(server.server.addr(), request) } #[cfg(test)] mod testing { use std::time; use hash::keccak; use devtools::http_client; use super::{serve, request}; #[test] fn should_not_redirect_to_parity_host() { // given let (server, port, _) = serve(); // when let response = request(server, &format!("\ GET / HTTP/1.1\r\n\ Host: 127.0.0.1:{}\r\n\ Connection: close\r\n\ \r\n\ {{}} ", port) ); // then assert_eq!(response.status, "HTTP/1.1 200 Ok".to_owned()); } #[test] fn should_block_if_authorization_is_incorrect() { // given let (server, port, _) = serve(); // when let response = request(server, &format!("\ GET / HTTP/1.1\r\n\ Host: 127.0.0.1:{}\r\n\ Connection: Upgrade\r\n\ Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n\ Sec-WebSocket-Protocol: wrong\r\n\ Sec-WebSocket-Version: 13\r\n\ \r\n\ {{}} ", port) ); // then assert_eq!(response.status, "HTTP/1.1 403 Forbidden".to_owned()); http_client::assert_security_headers_present(&response.headers, None); } #[test] fn should_allow_if_authorization_is_correct() { // given let (server, port, mut authcodes) = serve(); let code = authcodes.generate_new().unwrap().replace("-", ""); authcodes.to_file(&authcodes.path).unwrap(); let timestamp = time::UNIX_EPOCH.elapsed().unwrap().as_secs(); // when let response = request(server, &format!("\ GET / HTTP/1.1\r\n\ Host: 127.0.0.1:{}\r\n\ Connection: Close\r\n\ Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n\ Sec-WebSocket-Protocol: {:x}_{}\r\n\ Sec-WebSocket-Version: 13\r\n\ \r\n\ {{}} ", port, keccak(format!("{}:{}", code, timestamp)), timestamp, ) ); // then assert_eq!(response.status, "HTTP/1.1 101 Switching Protocols".to_owned()); } #[test] fn should_allow_initial_connection_but_only_once() { // given let (server, port, authcodes) = serve(); let code = "initial"; let timestamp = time::UNIX_EPOCH.elapsed().unwrap().as_secs(); assert!(authcodes.is_empty()); // when let response1 = http_client::request(server.addr(), &format!("\ GET / HTTP/1.1\r\n\ Host: 127.0.0.1:{}\r\n\ Connection: Close\r\n\ Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n\ Sec-WebSocket-Protocol:{:x}_{}\r\n\ Sec-WebSocket-Version: 13\r\n\ \r\n\ {{}} ", port, keccak(format!("{}:{}", code, timestamp)), timestamp, ) ); let response2 = http_client::request(server.addr(), &format!("\ GET / HTTP/1.1\r\n\ Host: 127.0.0.1:{}\r\n\ Connection: Close\r\n\ Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n\ Sec-WebSocket-Protocol:{:?}_{}\r\n\ Sec-WebSocket-Version: 13\r\n\ \r\n\ {{}} ", port, keccak(format!("{}:{}", code, timestamp)), timestamp, ) ); // then assert_eq!(response1.status, "HTTP/1.1 101 Switching Protocols".to_owned()); assert_eq!(response2.status, "HTTP/1.1 403 Forbidden".to_owned()); http_client::assert_security_headers_present(&response2.headers, None); } }