2020-08-03 20:40:46 +03:00
|
|
|
// Copyright 2020 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2020-04-08 14:33:12 +03:00
|
|
|
package node
|
|
|
|
|
|
|
|
import (
|
2020-08-03 20:40:46 +03:00
|
|
|
"bytes"
|
2021-02-02 12:05:46 +03:00
|
|
|
"fmt"
|
2020-04-08 14:33:12 +03:00
|
|
|
"net/http"
|
2021-02-02 12:05:46 +03:00
|
|
|
"net/url"
|
|
|
|
"strconv"
|
2020-11-19 16:54:49 +03:00
|
|
|
"strings"
|
2020-04-08 14:33:12 +03:00
|
|
|
"testing"
|
2022-03-07 10:30:27 +03:00
|
|
|
"time"
|
2020-04-08 14:33:12 +03:00
|
|
|
|
2020-08-03 20:40:46 +03:00
|
|
|
"github.com/ethereum/go-ethereum/internal/testlog"
|
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2020-04-08 14:33:12 +03:00
|
|
|
"github.com/ethereum/go-ethereum/rpc"
|
2022-03-07 10:30:27 +03:00
|
|
|
"github.com/golang-jwt/jwt/v4"
|
2020-08-03 20:40:46 +03:00
|
|
|
"github.com/gorilla/websocket"
|
2020-04-08 14:33:12 +03:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
2020-08-03 20:40:46 +03:00
|
|
|
// TestCorsHandler makes sure CORS are properly handled on the http server.
|
|
|
|
func TestCorsHandler(t *testing.T) {
|
2021-02-02 12:05:46 +03:00
|
|
|
srv := createAndStartServer(t, &httpConfig{CorsAllowedOrigins: []string{"test", "test.com"}}, false, &wsConfig{})
|
2020-08-03 20:40:46 +03:00
|
|
|
defer srv.stop()
|
2021-02-02 12:05:46 +03:00
|
|
|
url := "http://" + srv.listenAddr()
|
2020-08-03 20:40:46 +03:00
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
resp := rpcRequest(t, url, "origin", "test.com")
|
2020-08-03 20:40:46 +03:00
|
|
|
assert.Equal(t, "test.com", resp.Header.Get("Access-Control-Allow-Origin"))
|
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
resp2 := rpcRequest(t, url, "origin", "bad")
|
2020-08-03 20:40:46 +03:00
|
|
|
assert.Equal(t, "", resp2.Header.Get("Access-Control-Allow-Origin"))
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestVhosts makes sure vhosts are properly handled on the http server.
|
|
|
|
func TestVhosts(t *testing.T) {
|
2021-02-02 12:05:46 +03:00
|
|
|
srv := createAndStartServer(t, &httpConfig{Vhosts: []string{"test"}}, false, &wsConfig{})
|
2020-08-03 20:40:46 +03:00
|
|
|
defer srv.stop()
|
2021-02-02 12:05:46 +03:00
|
|
|
url := "http://" + srv.listenAddr()
|
2020-08-03 20:40:46 +03:00
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
resp := rpcRequest(t, url, "host", "test")
|
2020-08-03 20:40:46 +03:00
|
|
|
assert.Equal(t, resp.StatusCode, http.StatusOK)
|
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
resp2 := rpcRequest(t, url, "host", "bad")
|
2020-08-03 20:40:46 +03:00
|
|
|
assert.Equal(t, resp2.StatusCode, http.StatusForbidden)
|
|
|
|
}
|
2020-04-08 14:33:12 +03:00
|
|
|
|
2020-11-19 16:54:49 +03:00
|
|
|
type originTest struct {
|
|
|
|
spec string
|
|
|
|
expOk []string
|
|
|
|
expFail []string
|
|
|
|
}
|
2020-04-08 14:33:12 +03:00
|
|
|
|
2020-11-19 16:54:49 +03:00
|
|
|
// splitAndTrim splits input separated by a comma
|
|
|
|
// and trims excessive white space from the substrings.
|
|
|
|
// Copied over from flags.go
|
|
|
|
func splitAndTrim(input string) (ret []string) {
|
|
|
|
l := strings.Split(input, ",")
|
|
|
|
for _, r := range l {
|
|
|
|
r = strings.TrimSpace(r)
|
|
|
|
if len(r) > 0 {
|
|
|
|
ret = append(ret, r)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
2020-08-03 20:40:46 +03:00
|
|
|
|
2020-11-19 16:54:49 +03:00
|
|
|
// TestWebsocketOrigins makes sure the websocket origins are properly handled on the websocket server.
|
|
|
|
func TestWebsocketOrigins(t *testing.T) {
|
|
|
|
tests := []originTest{
|
|
|
|
{
|
|
|
|
spec: "*", // allow all
|
|
|
|
expOk: []string{"", "http://test", "https://test", "http://test:8540", "https://test:8540",
|
|
|
|
"http://test.com", "https://foo.test", "http://testa", "http://atestb:8540", "https://atestb:8540"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
spec: "test",
|
|
|
|
expOk: []string{"http://test", "https://test", "http://test:8540", "https://test:8540"},
|
|
|
|
expFail: []string{"http://test.com", "https://foo.test", "http://testa", "http://atestb:8540", "https://atestb:8540"},
|
|
|
|
},
|
|
|
|
// scheme tests
|
|
|
|
{
|
|
|
|
spec: "https://test",
|
|
|
|
expOk: []string{"https://test", "https://test:9999"},
|
|
|
|
expFail: []string{
|
|
|
|
"test", // no scheme, required by spec
|
|
|
|
"http://test", // wrong scheme
|
2022-08-19 09:00:21 +03:00
|
|
|
"http://test.foo", "https://a.test.x", // subdomain variations
|
2020-11-19 16:54:49 +03:00
|
|
|
"http://testx:8540", "https://xtest:8540"},
|
|
|
|
},
|
|
|
|
// ip tests
|
|
|
|
{
|
|
|
|
spec: "https://12.34.56.78",
|
|
|
|
expOk: []string{"https://12.34.56.78", "https://12.34.56.78:8540"},
|
|
|
|
expFail: []string{
|
|
|
|
"http://12.34.56.78", // wrong scheme
|
|
|
|
"http://12.34.56.78:443", // wrong scheme
|
|
|
|
"http://1.12.34.56.78", // wrong 'domain name'
|
|
|
|
"http://12.34.56.78.a", // wrong 'domain name'
|
|
|
|
"https://87.65.43.21", "http://87.65.43.21:8540", "https://87.65.43.21:8540"},
|
|
|
|
},
|
|
|
|
// port tests
|
|
|
|
{
|
|
|
|
spec: "test:8540",
|
|
|
|
expOk: []string{"http://test:8540", "https://test:8540"},
|
|
|
|
expFail: []string{
|
|
|
|
"http://test", "https://test", // spec says port required
|
|
|
|
"http://test:8541", "https://test:8541", // wrong port
|
|
|
|
"http://bad", "https://bad", "http://bad:8540", "https://bad:8540"},
|
|
|
|
},
|
|
|
|
// scheme and port
|
|
|
|
{
|
|
|
|
spec: "https://test:8540",
|
|
|
|
expOk: []string{"https://test:8540"},
|
|
|
|
expFail: []string{
|
|
|
|
"https://test", // missing port
|
|
|
|
"http://test", // missing port, + wrong scheme
|
|
|
|
"http://test:8540", // wrong scheme
|
|
|
|
"http://test:8541", "https://test:8541", // wrong port
|
|
|
|
"http://bad", "https://bad", "http://bad:8540", "https://bad:8540"},
|
|
|
|
},
|
|
|
|
// several allowed origins
|
|
|
|
{
|
|
|
|
spec: "localhost,http://127.0.0.1",
|
|
|
|
expOk: []string{"localhost", "http://localhost", "https://localhost:8443",
|
|
|
|
"http://127.0.0.1", "http://127.0.0.1:8080"},
|
|
|
|
expFail: []string{
|
|
|
|
"https://127.0.0.1", // wrong scheme
|
|
|
|
"http://bad", "https://bad", "http://bad:8540", "https://bad:8540"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range tests {
|
2021-02-02 12:05:46 +03:00
|
|
|
srv := createAndStartServer(t, &httpConfig{}, true, &wsConfig{Origins: splitAndTrim(tc.spec)})
|
|
|
|
url := fmt.Sprintf("ws://%v", srv.listenAddr())
|
2020-11-19 16:54:49 +03:00
|
|
|
for _, origin := range tc.expOk {
|
2022-03-07 10:30:27 +03:00
|
|
|
if err := wsRequest(t, url, "Origin", origin); err != nil {
|
2020-11-19 16:54:49 +03:00
|
|
|
t.Errorf("spec '%v', origin '%v': expected ok, got %v", tc.spec, origin, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for _, origin := range tc.expFail {
|
2022-03-07 10:30:27 +03:00
|
|
|
if err := wsRequest(t, url, "Origin", origin); err == nil {
|
2020-11-19 16:54:49 +03:00
|
|
|
t.Errorf("spec '%v', origin '%v': expected not to allow, got ok", tc.spec, origin)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
srv.stop()
|
|
|
|
}
|
2020-08-03 20:40:46 +03:00
|
|
|
}
|
|
|
|
|
2020-10-07 21:05:14 +03:00
|
|
|
// TestIsWebsocket tests if an incoming websocket upgrade request is handled properly.
|
|
|
|
func TestIsWebsocket(t *testing.T) {
|
|
|
|
r, _ := http.NewRequest("GET", "/", nil)
|
|
|
|
|
|
|
|
assert.False(t, isWebsocket(r))
|
|
|
|
r.Header.Set("upgrade", "websocket")
|
|
|
|
assert.False(t, isWebsocket(r))
|
|
|
|
r.Header.Set("connection", "upgrade")
|
|
|
|
assert.True(t, isWebsocket(r))
|
|
|
|
r.Header.Set("connection", "upgrade,keep-alive")
|
|
|
|
assert.True(t, isWebsocket(r))
|
|
|
|
r.Header.Set("connection", " UPGRADE,keep-alive")
|
|
|
|
assert.True(t, isWebsocket(r))
|
|
|
|
}
|
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
func Test_checkPath(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
req *http.Request
|
|
|
|
prefix string
|
|
|
|
expected bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/test"}},
|
|
|
|
prefix: "/test",
|
|
|
|
expected: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/testing"}},
|
|
|
|
prefix: "/test",
|
|
|
|
expected: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/"}},
|
|
|
|
prefix: "/test",
|
|
|
|
expected: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/fail"}},
|
|
|
|
prefix: "/test",
|
|
|
|
expected: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/"}},
|
|
|
|
prefix: "",
|
|
|
|
expected: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/fail"}},
|
|
|
|
prefix: "",
|
|
|
|
expected: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/"}},
|
|
|
|
prefix: "/",
|
|
|
|
expected: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: &http.Request{URL: &url.URL{Path: "/testing"}},
|
|
|
|
prefix: "/",
|
|
|
|
expected: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tt := range tests {
|
|
|
|
t.Run(strconv.Itoa(i), func(t *testing.T) {
|
|
|
|
assert.Equal(t, tt.expected, checkPath(tt.req, tt.prefix))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func createAndStartServer(t *testing.T, conf *httpConfig, ws bool, wsConf *wsConfig) *httpServer {
|
2020-08-03 20:40:46 +03:00
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
srv := newHTTPServer(testlog.Logger(t, log.LvlDebug), rpc.DefaultHTTPTimeouts)
|
2021-02-02 12:05:46 +03:00
|
|
|
assert.NoError(t, srv.enableRPC(nil, *conf))
|
2020-08-03 20:40:46 +03:00
|
|
|
if ws {
|
2021-02-02 12:05:46 +03:00
|
|
|
assert.NoError(t, srv.enableWS(nil, *wsConf))
|
2020-08-03 20:40:46 +03:00
|
|
|
}
|
|
|
|
assert.NoError(t, srv.setListenAddr("localhost", 0))
|
|
|
|
assert.NoError(t, srv.start())
|
|
|
|
return srv
|
|
|
|
}
|
2020-04-08 14:33:12 +03:00
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
// wsRequest attempts to open a WebSocket connection to the given URL.
|
2022-03-07 10:30:27 +03:00
|
|
|
func wsRequest(t *testing.T, url string, extraHeaders ...string) error {
|
2020-11-19 16:54:49 +03:00
|
|
|
t.Helper()
|
2022-03-07 10:30:27 +03:00
|
|
|
//t.Logf("checking WebSocket on %s (origin %q)", url, browserOrigin)
|
2021-02-02 12:05:46 +03:00
|
|
|
|
|
|
|
headers := make(http.Header)
|
2022-03-07 10:30:27 +03:00
|
|
|
// Apply extra headers.
|
|
|
|
if len(extraHeaders)%2 != 0 {
|
|
|
|
panic("odd extraHeaders length")
|
|
|
|
}
|
|
|
|
for i := 0; i < len(extraHeaders); i += 2 {
|
|
|
|
key, value := extraHeaders[i], extraHeaders[i+1]
|
|
|
|
headers.Set(key, value)
|
2021-02-02 12:05:46 +03:00
|
|
|
}
|
|
|
|
conn, _, err := websocket.DefaultDialer.Dial(url, headers)
|
|
|
|
if conn != nil {
|
|
|
|
conn.Close()
|
|
|
|
}
|
2020-11-19 16:54:49 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
// rpcRequest performs a JSON-RPC request to the given URL.
|
|
|
|
func rpcRequest(t *testing.T, url string, extraHeaders ...string) *http.Response {
|
2020-08-03 20:40:46 +03:00
|
|
|
t.Helper()
|
2020-04-08 14:33:12 +03:00
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
// Create the request.
|
|
|
|
body := bytes.NewReader([]byte(`{"jsonrpc":"2.0","id":1,"method":"rpc_modules","params":[]}`))
|
|
|
|
req, err := http.NewRequest("POST", url, body)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("could not create http request:", err)
|
|
|
|
}
|
2020-08-03 20:40:46 +03:00
|
|
|
req.Header.Set("content-type", "application/json")
|
2021-02-02 12:05:46 +03:00
|
|
|
|
|
|
|
// Apply extra headers.
|
|
|
|
if len(extraHeaders)%2 != 0 {
|
|
|
|
panic("odd extraHeaders length")
|
2020-08-03 20:40:46 +03:00
|
|
|
}
|
2021-02-02 12:05:46 +03:00
|
|
|
for i := 0; i < len(extraHeaders); i += 2 {
|
|
|
|
key, value := extraHeaders[i], extraHeaders[i+1]
|
2022-05-17 14:56:52 +03:00
|
|
|
if strings.EqualFold(key, "host") {
|
2021-02-02 12:05:46 +03:00
|
|
|
req.Host = value
|
|
|
|
} else {
|
|
|
|
req.Header.Set(key, value)
|
|
|
|
}
|
2020-08-03 20:40:46 +03:00
|
|
|
}
|
2020-04-08 14:33:12 +03:00
|
|
|
|
2021-02-02 12:05:46 +03:00
|
|
|
// Perform the request.
|
|
|
|
t.Logf("checking RPC/HTTP on %s %v", url, extraHeaders)
|
|
|
|
resp, err := http.DefaultClient.Do(req)
|
2020-08-03 20:40:46 +03:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
return resp
|
2020-04-08 14:33:12 +03:00
|
|
|
}
|
2022-03-07 10:30:27 +03:00
|
|
|
|
|
|
|
type testClaim map[string]interface{}
|
|
|
|
|
|
|
|
func (testClaim) Valid() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestJWT(t *testing.T) {
|
|
|
|
var secret = []byte("secret")
|
|
|
|
issueToken := func(secret []byte, method jwt.SigningMethod, input map[string]interface{}) string {
|
|
|
|
if method == nil {
|
|
|
|
method = jwt.SigningMethodHS256
|
|
|
|
}
|
|
|
|
ss, _ := jwt.NewWithClaims(method, testClaim(input)).SignedString(secret)
|
|
|
|
return ss
|
|
|
|
}
|
2022-06-02 21:21:35 +03:00
|
|
|
srv := createAndStartServer(t, &httpConfig{jwtSecret: []byte("secret")},
|
|
|
|
true, &wsConfig{Origins: []string{"*"}, jwtSecret: []byte("secret")})
|
|
|
|
wsUrl := fmt.Sprintf("ws://%v", srv.listenAddr())
|
|
|
|
htUrl := fmt.Sprintf("http://%v", srv.listenAddr())
|
|
|
|
|
2022-06-20 11:10:25 +03:00
|
|
|
expOk := []func() string{
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + 4}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() - 4}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{
|
|
|
|
"iat": time.Now().Unix(),
|
|
|
|
"exp": time.Now().Unix() + 2,
|
|
|
|
}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{
|
|
|
|
"iat": time.Now().Unix(),
|
|
|
|
"bar": "baz",
|
|
|
|
}))
|
|
|
|
},
|
2022-03-07 10:30:27 +03:00
|
|
|
}
|
2022-06-20 11:10:25 +03:00
|
|
|
for i, tokenFn := range expOk {
|
|
|
|
token := tokenFn()
|
2022-06-02 21:21:35 +03:00
|
|
|
if err := wsRequest(t, wsUrl, "Authorization", token); err != nil {
|
|
|
|
t.Errorf("test %d-ws, token '%v': expected ok, got %v", i, token, err)
|
|
|
|
}
|
2022-06-20 11:10:25 +03:00
|
|
|
token = tokenFn()
|
2022-06-02 21:21:35 +03:00
|
|
|
if resp := rpcRequest(t, htUrl, "Authorization", token); resp.StatusCode != 200 {
|
|
|
|
t.Errorf("test %d-http, token '%v': expected ok, got %v", i, token, resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|
2022-06-20 11:10:25 +03:00
|
|
|
|
|
|
|
expFail := []func() string{
|
2022-03-07 10:30:27 +03:00
|
|
|
// future
|
2022-06-20 11:10:25 +03:00
|
|
|
func() string {
|
2022-07-28 09:30:50 +03:00
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() + int64(jwtExpiryTimeout.Seconds()) + 1}))
|
2022-06-20 11:10:25 +03:00
|
|
|
},
|
2022-03-07 10:30:27 +03:00
|
|
|
// stale
|
2022-06-20 11:10:25 +03:00
|
|
|
func() string {
|
2022-07-28 09:30:50 +03:00
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix() - int64(jwtExpiryTimeout.Seconds()) - 1}))
|
2022-06-20 11:10:25 +03:00
|
|
|
},
|
2022-03-07 10:30:27 +03:00
|
|
|
// wrong algo
|
2022-06-20 11:10:25 +03:00
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, jwt.SigningMethodHS512, testClaim{"iat": time.Now().Unix() + 4}))
|
|
|
|
},
|
2022-03-07 10:30:27 +03:00
|
|
|
// expired
|
2022-06-20 11:10:25 +03:00
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix(), "exp": time.Now().Unix()}))
|
|
|
|
},
|
2022-03-07 10:30:27 +03:00
|
|
|
// missing mandatory iat
|
2022-06-20 11:10:25 +03:00
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{}))
|
|
|
|
},
|
|
|
|
// wrong secret
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken([]byte("wrong"), nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken([]byte{}, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(nil, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
2022-03-07 10:30:27 +03:00
|
|
|
// Various malformed syntax
|
2022-06-20 11:10:25 +03:00
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("bearer %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer: %v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer:%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer\t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
|
|
|
func() string {
|
|
|
|
return fmt.Sprintf("Bearer \t%v", issueToken(secret, nil, testClaim{"iat": time.Now().Unix()}))
|
|
|
|
},
|
2022-03-07 10:30:27 +03:00
|
|
|
}
|
2022-06-20 11:10:25 +03:00
|
|
|
for i, tokenFn := range expFail {
|
|
|
|
token := tokenFn()
|
2022-03-07 10:30:27 +03:00
|
|
|
if err := wsRequest(t, wsUrl, "Authorization", token); err == nil {
|
|
|
|
t.Errorf("tc %d-ws, token '%v': expected not to allow, got ok", i, token)
|
|
|
|
}
|
2022-06-20 11:10:25 +03:00
|
|
|
token = tokenFn()
|
2022-03-07 10:30:27 +03:00
|
|
|
if resp := rpcRequest(t, htUrl, "Authorization", token); resp.StatusCode != 403 {
|
|
|
|
t.Errorf("tc %d-http, token '%v': expected not to allow, got %v", i, token, resp.StatusCode)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
srv.stop()
|
|
|
|
}
|