* Bump beta to version 2.2.1 * fix: Intermittent failing CI due to addr in use (#9885) Allow OS to set port at runtime * Use Weak reference in PubSubClient (#9886) * Fix json tracer overflow (#9873) * Fix json tracer overflow * Replace trace_executed with a direct trace push * Remove unused variable * Add test for 5a51 * Remove duplicate json! * Fix docker script (#9854) * Dockerfile: change source path of the newly added check_sync.sh (#9869) * Allow to seal work on latest block (#9876) * Allow to seal work on latest block. * Test from @todr to check sealing conditions. * gitlab-ci: make android release build succeed (#9743) * use docker cargo config file for android builds * make android build succeed * ethcore: use Machine::verify_transaction on parent block (#9900) * ethcore: use Machine::verify_transaction on parent block also fixes off-by-one activation of transaction permission contract * ethcore: clarify call to verify_transaction * foundation: #6692865, ropsten: #4417537, kovan: #9363457 * Remove rust-toolchain file (#9906) * EIP-712 implementation (#9631) * EIP-712 impl * added more tests * removed size parsing unwrap * corrected TYPE_REGEX to disallow zero sized fixed length arrays, replaced LinkedHashSet with IndexSet, added API spec to docs, fixed Type::Byte encoding branch * use Option<u64> instead of u64 for Type::Array::Length * replace `.iter()` with `.values()` Co-Authored-By: seunlanlege <seunlanlege@gmail.com> * tabify eip712.rs * use proper comments for docs * Cargo.lock: revert unrelated changes * tabify encode.rs * EIP 191 (#9701) * added sign_191 rpc method * fixed hash_structured_data return type * added ConfirmationPayload::SignMessage for non-prefixed signatures, added tests for sign191 * renamed WithValidator -> PresignedTransaction * rename applicationData to data in test * adds docs for EIP191Version, renamed SignRequest to EIP191SignRequest * light-fetch: Differentiate between out-of-gas/manual throw and use required gas from response on failure (#9824) * fix start_gas, handle OOG exceptions & NotEnoughGas * Change START_GAS: 50_000 -> 60_000 * When the `OutOfGas exception` is received then try to double the gas until it succeeds or block gas limit is reached * When `NotEnoughBasGas error` is received then use the required gas provided in the response * fix(light-fetch): ensure block_gas_limit is tried Try the `block_gas_limit` before regard the execution as an error * Update rpc/src/v1/helpers/light_fetch.rs Co-Authored-By: niklasad1 <niklasadolfsson1@gmail.com> * simplify cargo audit * Use block header for building finality (#9914) * ci: nuke the gitlab caches (#9855)
168 lines
4.2 KiB
Rust
168 lines
4.2 KiB
Rust
// Copyright 2015-2018 Parity Technologies (UK) Ltd.
|
|
// This file is part of Parity.
|
|
|
|
// Parity is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! WebSockets server tests.
|
|
|
|
use std::sync::Arc;
|
|
|
|
use devtools::http_client;
|
|
use jsonrpc_core::MetaIoHandler;
|
|
use rand;
|
|
use ws;
|
|
|
|
use v1::{extractors, informant};
|
|
use tests::helpers::{GuardedAuthCodes, Server};
|
|
|
|
/// Setup a mock signer for tests
|
|
pub fn serve() -> (Server<ws::Server>, usize, GuardedAuthCodes) {
|
|
let address = "127.0.0.1:0".parse().unwrap();
|
|
let io = MetaIoHandler::default();
|
|
let authcodes = GuardedAuthCodes::new();
|
|
let stats = Arc::new(informant::RpcStats::default());
|
|
|
|
let res = Server::new(|_| ::start_ws(
|
|
&address,
|
|
io,
|
|
ws::DomainsValidation::Disabled,
|
|
ws::DomainsValidation::Disabled,
|
|
5,
|
|
extractors::WsExtractor::new(Some(&authcodes.path)),
|
|
extractors::WsExtractor::new(Some(&authcodes.path)),
|
|
extractors::WsStats::new(stats),
|
|
).unwrap());
|
|
let port = res.addr().port() as usize;
|
|
|
|
(res, port, authcodes)
|
|
}
|
|
|
|
/// Test a single request to running server
|
|
pub fn request(server: Server<ws::Server>, request: &str) -> http_client::Response {
|
|
http_client::request(server.server.addr(), request)
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod testing {
|
|
use std::time;
|
|
use hash::keccak;
|
|
use devtools::http_client;
|
|
use super::{serve, request};
|
|
|
|
#[test]
|
|
fn should_not_redirect_to_parity_host() {
|
|
// given
|
|
let (server, port, _) = serve();
|
|
|
|
// when
|
|
let response = request(server,
|
|
&format!("\
|
|
GET / HTTP/1.1\r\n\
|
|
Host: 127.0.0.1:{}\r\n\
|
|
Connection: close\r\n\
|
|
\r\n\
|
|
{{}}
|
|
", port)
|
|
);
|
|
|
|
// then
|
|
assert_eq!(response.status, "HTTP/1.1 200 Ok".to_owned());
|
|
}
|
|
|
|
#[test]
|
|
fn should_block_if_authorization_is_incorrect() {
|
|
// given
|
|
let (server, port, _) = serve();
|
|
|
|
// when
|
|
let response = request(server,
|
|
&format!("\
|
|
GET / HTTP/1.1\r\n\
|
|
Host: 127.0.0.1:{}\r\n\
|
|
Connection: Upgrade\r\n\
|
|
Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n\
|
|
Sec-WebSocket-Protocol: wrong\r\n\
|
|
Sec-WebSocket-Version: 13\r\n\
|
|
\r\n\
|
|
{{}}
|
|
", port)
|
|
);
|
|
|
|
// then
|
|
assert_eq!(response.status, "HTTP/1.1 403 Forbidden".to_owned());
|
|
http_client::assert_security_headers_present(&response.headers, None);
|
|
}
|
|
|
|
#[test]
|
|
fn should_allow_if_authorization_is_correct() {
|
|
// given
|
|
let (server, port, mut authcodes) = serve();
|
|
let code = authcodes.generate_new().unwrap().replace("-", "");
|
|
authcodes.to_file(&authcodes.path).unwrap();
|
|
let timestamp = time::UNIX_EPOCH.elapsed().unwrap().as_secs();
|
|
|
|
// when
|
|
let response = request(server,
|
|
&format!("\
|
|
GET / HTTP/1.1\r\n\
|
|
Host: 127.0.0.1:{}\r\n\
|
|
Connection: Close\r\n\
|
|
Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n\
|
|
Sec-WebSocket-Protocol: {:x}_{}\r\n\
|
|
Sec-WebSocket-Version: 13\r\n\
|
|
\r\n\
|
|
{{}}
|
|
",
|
|
port,
|
|
keccak(format!("{}:{}", code, timestamp)),
|
|
timestamp,
|
|
)
|
|
);
|
|
|
|
// then
|
|
assert_eq!(response.status, "HTTP/1.1 101 Switching Protocols".to_owned());
|
|
}
|
|
|
|
#[test]
|
|
fn should_not_allow_initial_connection_even_once() {
|
|
// given
|
|
let (server, port, authcodes) = serve();
|
|
let code = "initial";
|
|
let timestamp = time::UNIX_EPOCH.elapsed().unwrap().as_secs();
|
|
assert!(authcodes.is_empty());
|
|
|
|
// when
|
|
let response1 = http_client::request(server.addr(),
|
|
&format!("\
|
|
GET / HTTP/1.1\r\n\
|
|
Host: 127.0.0.1:{}\r\n\
|
|
Connection: Close\r\n\
|
|
Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==\r\n\
|
|
Sec-WebSocket-Protocol:{:x}_{}\r\n\
|
|
Sec-WebSocket-Version: 13\r\n\
|
|
\r\n\
|
|
{{}}
|
|
",
|
|
port,
|
|
keccak(format!("{}:{}", code, timestamp)),
|
|
timestamp,
|
|
)
|
|
);
|
|
|
|
// then
|
|
assert_eq!(response1.status, "HTTP/1.1 403 Forbidden".to_owned());
|
|
http_client::assert_security_headers_present(&response1.headers, None);
|
|
}
|
|
}
|