package common import ( "context" "encoding/json" "os" "testing" "time" logging "github.com/ipfs/go-log/v2" types "github.com/ipfs-cluster/ipfs-cluster/api" crypto "github.com/libp2p/go-libp2p-core/crypto" peer "github.com/libp2p/go-libp2p-core/peer" rpc "github.com/libp2p/go-libp2p-gorpc" ma "github.com/multiformats/go-multiaddr" ) // Default testing values var ( DefaultReadTimeout = 0 * time.Second DefaultReadHeaderTimeout = 5 * time.Second DefaultWriteTimeout = 0 * time.Second DefaultIdleTimeout = 120 * time.Second DefaultMaxHeaderBytes = minMaxHeaderBytes DefaultHTTPListenAddrs = []string{"/ip4/127.0.0.1/tcp/9094"} DefaultHeaders = map[string][]string{} DefaultCORSAllowedOrigins = []string{"*"} DefaultCORSAllowedMethods = []string{} DefaultCORSAllowedHeaders = []string{} DefaultCORSExposedHeaders = []string{ "Content-Type", "X-Stream-Output", "X-Chunked-Output", "X-Content-Length", } DefaultCORSAllowCredentials = true DefaultCORSMaxAge time.Duration // 0. Means always. ) func defaultFunc(cfg *Config) error { // http addrs := make([]ma.Multiaddr, 0, len(DefaultHTTPListenAddrs)) for _, def := range DefaultHTTPListenAddrs { httpListen, err := ma.NewMultiaddr(def) if err != nil { return err } addrs = append(addrs, httpListen) } cfg.HTTPListenAddr = addrs cfg.PathSSLCertFile = "" cfg.PathSSLKeyFile = "" cfg.ReadTimeout = DefaultReadTimeout cfg.ReadHeaderTimeout = DefaultReadHeaderTimeout cfg.WriteTimeout = DefaultWriteTimeout cfg.IdleTimeout = DefaultIdleTimeout cfg.MaxHeaderBytes = DefaultMaxHeaderBytes // libp2p cfg.ID = "" cfg.PrivateKey = nil cfg.Libp2pListenAddr = nil // Auth cfg.BasicAuthCredentials = nil // Logs cfg.HTTPLogFile = "" // Headers cfg.Headers = DefaultHeaders cfg.CORSAllowedOrigins = DefaultCORSAllowedOrigins cfg.CORSAllowedMethods = DefaultCORSAllowedMethods cfg.CORSAllowedHeaders = DefaultCORSAllowedHeaders cfg.CORSExposedHeaders = DefaultCORSExposedHeaders cfg.CORSAllowCredentials = DefaultCORSAllowCredentials cfg.CORSMaxAge = DefaultCORSMaxAge return nil } var cfgJSON = []byte(` { "listen_multiaddress": "/ip4/127.0.0.1/tcp/12122", "ssl_cert_file": "test/server.crt", "ssl_key_file": "test/server.key", "read_timeout": "30s", "read_header_timeout": "5s", "write_timeout": "1m0s", "idle_timeout": "2m0s", "max_header_bytes": 16384, "basic_auth_credentials": null, "http_log_file": "", "cors_allowed_origins": ["myorigin"], "cors_allowed_methods": ["GET"], "cors_allowed_headers": ["X-Custom"], "cors_exposed_headers": ["X-Chunked-Output"], "cors_allow_credentials": false, "cors_max_age": "1s" } `) func newTestConfig() *Config { cfg := &Config{} cfg.ConfigKey = "testapi" cfg.EnvConfigKey = "cluster_testapi" cfg.Logger = logging.Logger("testapi") cfg.RequestLogger = logging.Logger("testapilog") cfg.DefaultFunc = defaultFunc cfg.APIErrorFunc = func(err error, status int) error { return types.Error{Code: status, Message: err.Error()} } return cfg } func newDefaultTestConfig(t *testing.T) *Config { t.Helper() cfg := newTestConfig() if err := defaultFunc(cfg); err != nil { t.Fatal(err) } return cfg } func TestLoadEmptyJSON(t *testing.T) { cfg := newTestConfig() err := cfg.LoadJSON([]byte(`{}`)) if err != nil { t.Fatal(err) } } func TestLoadJSON(t *testing.T) { cfg := newTestConfig() err := cfg.LoadJSON(cfgJSON) if err != nil { t.Fatal(err) } if cfg.ReadTimeout != 30*time.Second || cfg.WriteTimeout != time.Minute || cfg.ReadHeaderTimeout != 5*time.Second || cfg.IdleTimeout != 2*time.Minute { t.Error("error parsing timeouts") } j := &jsonConfig{} json.Unmarshal(cfgJSON, j) j.HTTPListenMultiaddress = []string{"abc"} tst, _ := json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error decoding listen multiaddress") } j = &jsonConfig{} json.Unmarshal(cfgJSON, j) j.ReadTimeout = "-1" tst, _ = json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error in read_timeout") } j = &jsonConfig{} json.Unmarshal(cfgJSON, j) j.BasicAuthCredentials = make(map[string]string) tst, _ = json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error with empty basic auth map") } j = &jsonConfig{} json.Unmarshal(cfgJSON, j) j.SSLCertFile = "abc" tst, _ = json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error with TLS configuration") } j = &jsonConfig{} json.Unmarshal(cfgJSON, j) j.ID = "abc" tst, _ = json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error with ID") } j = &jsonConfig{} json.Unmarshal(cfgJSON, j) j.Libp2pListenMultiaddress = []string{"abc"} tst, _ = json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error with libp2p address") } j = &jsonConfig{} json.Unmarshal(cfgJSON, j) j.PrivateKey = "abc" tst, _ = json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error with private key") } j = &jsonConfig{} json.Unmarshal(cfgJSON, j) j.MaxHeaderBytes = minMaxHeaderBytes - 1 tst, _ = json.Marshal(j) err = cfg.LoadJSON(tst) if err == nil { t.Error("expected error with MaxHeaderBytes") } } func TestApplyEnvVars(t *testing.T) { username := "admin" password := "thisaintmypassword" user1 := "user1" user1pass := "user1passwd" os.Setenv("CLUSTER_TESTAPI_BASICAUTHCREDENTIALS", username+":"+password+","+user1+":"+user1pass) cfg := newDefaultTestConfig(t) err := cfg.ApplyEnvVars() if err != nil { t.Fatal(err) } if _, ok := cfg.BasicAuthCredentials[username]; !ok { t.Fatalf("username '%s' not set in BasicAuthCreds map: %v", username, cfg.BasicAuthCredentials) } if _, ok := cfg.BasicAuthCredentials[user1]; !ok { t.Fatalf("username '%s' not set in BasicAuthCreds map: %v", user1, cfg.BasicAuthCredentials) } if gotpasswd := cfg.BasicAuthCredentials[username]; gotpasswd != password { t.Errorf("password not what was set in env var, got: %s, want: %s", gotpasswd, password) } if gotpasswd := cfg.BasicAuthCredentials[user1]; gotpasswd != user1pass { t.Errorf("password not what was set in env var, got: %s, want: %s", gotpasswd, user1pass) } } func TestLibp2pConfig(t *testing.T) { ctx := context.Background() cfg := newDefaultTestConfig(t) priv, pub, err := crypto.GenerateKeyPair(crypto.RSA, 2048) if err != nil { t.Fatal(err) } pid, err := peer.IDFromPublicKey(pub) if err != nil { t.Fatal(err) } cfg.ID = pid cfg.PrivateKey = priv addr, _ := ma.NewMultiaddr("/ip4/127.0.0.1/tcp/0") cfg.HTTPListenAddr = []ma.Multiaddr{addr} cfg.Libp2pListenAddr = []ma.Multiaddr{addr} err = cfg.Validate() if err != nil { t.Error(err) } cfgJSON, err := cfg.ToJSON() if err != nil { t.Fatal(err) } err = cfg.LoadJSON(cfgJSON) if err != nil { t.Fatal(err) } // Test creating a new API with a libp2p config rest, err := NewAPI(ctx, cfg, func(c *rpc.Client) []Route { return nil }) if err != nil { t.Fatal(err) } defer rest.Shutdown(ctx) badPid, _ := peer.Decode("QmTQ6oKHDwFjzr4ihirVCLJe8CxanxD3ZjGRYzubFuNDjE") cfg.ID = badPid err = cfg.Validate() if err == nil { t.Error("expected id-privkey mismatch") } cfg.ID = pid cfg.PrivateKey = nil err = cfg.Validate() if err == nil { t.Error("expected missing private key error") } } func TestToJSON(t *testing.T) { cfg := newTestConfig() cfg.LoadJSON(cfgJSON) newjson, err := cfg.ToJSON() if err != nil { t.Fatal(err) } cfg = newTestConfig() err = cfg.LoadJSON(newjson) if err != nil { t.Fatal(err) } } func TestDefault(t *testing.T) { cfg := newDefaultTestConfig(t) if cfg.Validate() != nil { t.Fatal("error validating") } err := defaultFunc(cfg) if err != nil { t.Fatal(err) } cfg.IdleTimeout = -1 if cfg.Validate() == nil { t.Fatal("expected error validating") } }