443 lines
13 KiB
Go
443 lines
13 KiB
Go
// Package rest provides HTTP types and primitives for REST
|
|
// requests validation and responses handling.
|
|
package rest
|
|
|
|
import (
|
|
"errors"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"sort"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/tendermint/tendermint/crypto"
|
|
"github.com/tendermint/tendermint/crypto/secp256k1"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client/context"
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
"github.com/cosmos/cosmos-sdk/types"
|
|
)
|
|
|
|
func TestBaseReq_Sanitize(t *testing.T) {
|
|
t.Parallel()
|
|
sanitized := BaseReq{ChainID: " test",
|
|
Memo: "memo ",
|
|
From: " cosmos1cq0sxam6x4l0sv9yz3a2vlqhdhvt2k6jtgcse0 ",
|
|
Gas: " ",
|
|
GasAdjustment: " 0.3",
|
|
}.Sanitize()
|
|
require.Equal(t, BaseReq{ChainID: "test",
|
|
Memo: "memo",
|
|
From: "cosmos1cq0sxam6x4l0sv9yz3a2vlqhdhvt2k6jtgcse0",
|
|
Gas: "",
|
|
GasAdjustment: "0.3",
|
|
}, sanitized)
|
|
}
|
|
|
|
func TestBaseReq_ValidateBasic(t *testing.T) {
|
|
fromAddr := "cosmos1cq0sxam6x4l0sv9yz3a2vlqhdhvt2k6jtgcse0"
|
|
tenstakes, err := types.ParseCoins("10stake")
|
|
require.NoError(t, err)
|
|
onestake, err := types.ParseDecCoins("1.0stake")
|
|
require.NoError(t, err)
|
|
|
|
req1 := NewBaseReq(
|
|
fromAddr, "", "nonempty", "", "", 0, 0, tenstakes, nil, false,
|
|
)
|
|
req2 := NewBaseReq(
|
|
"", "", "nonempty", "", "", 0, 0, tenstakes, nil, false,
|
|
)
|
|
req3 := NewBaseReq(
|
|
fromAddr, "", "", "", "", 0, 0, tenstakes, nil, false,
|
|
)
|
|
req4 := NewBaseReq(
|
|
fromAddr, "", "nonempty", "", "", 0, 0, tenstakes, onestake, false,
|
|
)
|
|
req5 := NewBaseReq(
|
|
fromAddr, "", "nonempty", "", "", 0, 0, types.Coins{}, types.DecCoins{}, false,
|
|
)
|
|
|
|
tests := []struct {
|
|
name string
|
|
req BaseReq
|
|
w http.ResponseWriter
|
|
want bool
|
|
}{
|
|
{"ok", req1, httptest.NewRecorder(), true},
|
|
{"neither fees nor gasprices provided", req5, httptest.NewRecorder(), true},
|
|
{"empty from", req2, httptest.NewRecorder(), false},
|
|
{"empty chain-id", req3, httptest.NewRecorder(), false},
|
|
{"fees and gasprices provided", req4, httptest.NewRecorder(), false},
|
|
}
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
require.Equal(t, tt.want, tt.req.ValidateBasic(tt.w))
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestParseHTTPArgs(t *testing.T) {
|
|
t.Parallel()
|
|
req0 := mustNewRequest(t, "", "/", nil)
|
|
req1 := mustNewRequest(t, "", "/?limit=5", nil)
|
|
req2 := mustNewRequest(t, "", "/?page=5", nil)
|
|
req3 := mustNewRequest(t, "", "/?page=5&limit=5", nil)
|
|
|
|
reqE1 := mustNewRequest(t, "", "/?page=-1", nil)
|
|
reqE2 := mustNewRequest(t, "", "/?limit=-1", nil)
|
|
req4 := mustNewRequest(t, "", "/?foo=faa", nil)
|
|
|
|
reqTxH := mustNewRequest(t, "", "/?tx.minheight=12&tx.maxheight=14", nil)
|
|
|
|
tests := []struct {
|
|
name string
|
|
req *http.Request
|
|
w http.ResponseWriter
|
|
tags []string
|
|
page int
|
|
limit int
|
|
err bool
|
|
}{
|
|
{"no params", req0, httptest.NewRecorder(), []string{}, DefaultPage, DefaultLimit, false},
|
|
{"Limit", req1, httptest.NewRecorder(), []string{}, DefaultPage, 5, false},
|
|
{"Page", req2, httptest.NewRecorder(), []string{}, 5, DefaultLimit, false},
|
|
{"Page and limit", req3, httptest.NewRecorder(), []string{}, 5, 5, false},
|
|
|
|
{"error page 0", reqE1, httptest.NewRecorder(), []string{}, DefaultPage, DefaultLimit, true},
|
|
{"error limit 0", reqE2, httptest.NewRecorder(), []string{}, DefaultPage, DefaultLimit, true},
|
|
|
|
{"tags", req4, httptest.NewRecorder(), []string{"foo='faa'"}, DefaultPage, DefaultLimit, false},
|
|
{"tags", reqTxH, httptest.NewRecorder(), []string{"tx.height<=14", "tx.height>=12"}, DefaultPage, DefaultLimit, false},
|
|
}
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
tags, page, limit, err := ParseHTTPArgs(tt.req)
|
|
|
|
sort.Strings(tags)
|
|
|
|
if tt.err {
|
|
require.NotNil(t, err)
|
|
} else {
|
|
require.Nil(t, err)
|
|
require.Equal(t, tt.tags, tags)
|
|
require.Equal(t, tt.page, page)
|
|
require.Equal(t, tt.limit, limit)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestParseQueryHeight(t *testing.T) {
|
|
t.Parallel()
|
|
var emptyHeight int64
|
|
height := int64(1256756)
|
|
|
|
req0 := mustNewRequest(t, "", "/", nil)
|
|
req1 := mustNewRequest(t, "", "/?height=1256756", nil)
|
|
req2 := mustNewRequest(t, "", "/?height=456yui4567", nil)
|
|
req3 := mustNewRequest(t, "", "/?height=-1", nil)
|
|
|
|
tests := []struct {
|
|
name string
|
|
req *http.Request
|
|
w http.ResponseWriter
|
|
cliCtx context.CLIContext
|
|
expectedHeight int64
|
|
expectedOk bool
|
|
}{
|
|
{"no height", req0, httptest.NewRecorder(), context.CLIContext{}, emptyHeight, true},
|
|
{"height", req1, httptest.NewRecorder(), context.CLIContext{}, height, true},
|
|
{"invalid height", req2, httptest.NewRecorder(), context.CLIContext{}, emptyHeight, false},
|
|
{"negative height", req3, httptest.NewRecorder(), context.CLIContext{}, emptyHeight, false},
|
|
}
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
cliCtx, ok := ParseQueryHeightOrReturnBadRequest(tt.w, tt.cliCtx, tt.req)
|
|
if tt.expectedOk {
|
|
require.True(t, ok)
|
|
require.Equal(t, tt.expectedHeight, cliCtx.Height)
|
|
} else {
|
|
require.False(t, ok)
|
|
require.Empty(t, tt.expectedHeight, cliCtx.Height)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestProcessPostResponse(t *testing.T) {
|
|
// mock account
|
|
// PubKey field ensures amino encoding is used first since standard
|
|
// JSON encoding will panic on crypto.PubKey
|
|
|
|
t.Parallel()
|
|
type mockAccount struct {
|
|
Address types.AccAddress `json:"address"`
|
|
Coins types.Coins `json:"coins"`
|
|
PubKey crypto.PubKey `json:"public_key"`
|
|
AccountNumber uint64 `json:"account_number"`
|
|
Sequence uint64 `json:"sequence"`
|
|
}
|
|
|
|
// setup
|
|
ctx := context.NewCLIContext()
|
|
height := int64(194423)
|
|
|
|
privKey := secp256k1.GenPrivKey()
|
|
pubKey := privKey.PubKey()
|
|
addr := types.AccAddress(pubKey.Address())
|
|
coins := types.NewCoins(types.NewCoin("atom", types.NewInt(100)), types.NewCoin("tree", types.NewInt(125)))
|
|
accNumber := uint64(104)
|
|
sequence := uint64(32)
|
|
|
|
acc := mockAccount{addr, coins, pubKey, accNumber, sequence}
|
|
cdc := codec.New()
|
|
codec.RegisterCrypto(cdc)
|
|
cdc.RegisterConcrete(&mockAccount{}, "cosmos-sdk/mockAccount", nil)
|
|
ctx = ctx.WithCodec(cdc)
|
|
|
|
// setup expected results
|
|
jsonNoIndent, err := ctx.Codec.MarshalJSON(acc)
|
|
require.Nil(t, err)
|
|
|
|
respNoIndent := NewResponseWithHeight(height, jsonNoIndent)
|
|
expectedNoIndent, err := ctx.Codec.MarshalJSON(respNoIndent)
|
|
require.Nil(t, err)
|
|
|
|
expectedWithIndent, err := codec.MarshalIndentFromJSON(expectedNoIndent)
|
|
require.Nil(t, err)
|
|
|
|
// check that negative height writes an error
|
|
w := httptest.NewRecorder()
|
|
ctx = ctx.WithHeight(-1)
|
|
PostProcessResponse(w, ctx, acc)
|
|
require.Equal(t, http.StatusInternalServerError, w.Code)
|
|
|
|
// check that height returns expected response
|
|
ctx = ctx.WithHeight(height)
|
|
runPostProcessResponse(t, ctx, acc, expectedNoIndent, false)
|
|
|
|
// check height with indent
|
|
runPostProcessResponse(t, ctx, acc, expectedWithIndent, true)
|
|
}
|
|
|
|
func TestReadRESTReq(t *testing.T) {
|
|
t.Parallel()
|
|
reqBody := ioutil.NopCloser(strings.NewReader(`{"chain_id":"alessio","memo":"text"}`))
|
|
req := &http.Request{Body: reqBody}
|
|
w := httptest.NewRecorder()
|
|
var br BaseReq
|
|
|
|
// test OK
|
|
ReadRESTReq(w, req, codec.New(), &br)
|
|
res := w.Result()
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, BaseReq{ChainID: "alessio", Memo: "text"}, br)
|
|
require.Equal(t, http.StatusOK, res.StatusCode)
|
|
|
|
// test non valid JSON
|
|
reqBody = ioutil.NopCloser(strings.NewReader(`MALFORMED`))
|
|
req = &http.Request{Body: reqBody}
|
|
br = BaseReq{}
|
|
w = httptest.NewRecorder()
|
|
ReadRESTReq(w, req, codec.New(), &br)
|
|
require.Equal(t, br, br)
|
|
res = w.Result()
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, http.StatusBadRequest, res.StatusCode)
|
|
}
|
|
|
|
func TestWriteSimulationResponse(t *testing.T) {
|
|
t.Parallel()
|
|
w := httptest.NewRecorder()
|
|
WriteSimulationResponse(w, codec.New(), 10)
|
|
res := w.Result()
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, http.StatusOK, res.StatusCode)
|
|
bs, err := ioutil.ReadAll(res.Body)
|
|
require.NoError(t, err)
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, `{"gas_estimate":"10"}`, string(bs))
|
|
}
|
|
|
|
func TestParseUint64OrReturnBadRequest(t *testing.T) {
|
|
t.Parallel()
|
|
w := httptest.NewRecorder()
|
|
_, ok := ParseUint64OrReturnBadRequest(w, "100")
|
|
require.True(t, ok)
|
|
require.Equal(t, http.StatusOK, w.Result().StatusCode)
|
|
|
|
w = httptest.NewRecorder()
|
|
_, ok = ParseUint64OrReturnBadRequest(w, "-100")
|
|
require.False(t, ok)
|
|
require.Equal(t, http.StatusBadRequest, w.Result().StatusCode)
|
|
}
|
|
|
|
func TestParseFloat64OrReturnBadRequest(t *testing.T) {
|
|
t.Parallel()
|
|
w := httptest.NewRecorder()
|
|
_, ok := ParseFloat64OrReturnBadRequest(w, "100", 0)
|
|
require.True(t, ok)
|
|
require.Equal(t, http.StatusOK, w.Result().StatusCode)
|
|
|
|
w = httptest.NewRecorder()
|
|
_, ok = ParseFloat64OrReturnBadRequest(w, "bad request", 0)
|
|
require.False(t, ok)
|
|
require.Equal(t, http.StatusBadRequest, w.Result().StatusCode)
|
|
|
|
w = httptest.NewRecorder()
|
|
ret, ok := ParseFloat64OrReturnBadRequest(w, "", 9.0)
|
|
require.Equal(t, float64(9), ret)
|
|
require.True(t, ok)
|
|
require.Equal(t, http.StatusOK, w.Result().StatusCode)
|
|
}
|
|
|
|
func TestParseQueryParamBool(t *testing.T) {
|
|
req := httptest.NewRequest("GET", "/target?boolean=true", nil)
|
|
require.True(t, ParseQueryParamBool(req, "boolean"))
|
|
require.False(t, ParseQueryParamBool(req, "nokey"))
|
|
req = httptest.NewRequest("GET", "/target?boolean=false", nil)
|
|
require.False(t, ParseQueryParamBool(req, "boolean"))
|
|
require.False(t, ParseQueryParamBool(req, ""))
|
|
}
|
|
|
|
func TestPostProcessResponseBare(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
// write bytes
|
|
ctx := context.CLIContext{}
|
|
w := httptest.NewRecorder()
|
|
bs := []byte("text string")
|
|
|
|
PostProcessResponseBare(w, ctx, bs)
|
|
|
|
res := w.Result()
|
|
require.Equal(t, http.StatusOK, res.StatusCode)
|
|
|
|
got, err := ioutil.ReadAll(res.Body)
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, "text string", string(got))
|
|
|
|
// write struct and indent response
|
|
ctx = context.CLIContext{Indent: true}.WithCodec(codec.New())
|
|
w = httptest.NewRecorder()
|
|
data := struct {
|
|
X int `json:"x"`
|
|
S string `json:"s"`
|
|
}{X: 10, S: "test"}
|
|
|
|
PostProcessResponseBare(w, ctx, data)
|
|
|
|
res = w.Result()
|
|
require.Equal(t, http.StatusOK, res.StatusCode)
|
|
|
|
got, err = ioutil.ReadAll(res.Body)
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, `{
|
|
"s": "test",
|
|
"x": "10"
|
|
}`, string(got))
|
|
|
|
// write struct, don't indent response
|
|
ctx = context.CLIContext{Indent: false}.WithCodec(codec.New())
|
|
w = httptest.NewRecorder()
|
|
data = struct {
|
|
X int `json:"x"`
|
|
S string `json:"s"`
|
|
}{X: 10, S: "test"}
|
|
|
|
PostProcessResponseBare(w, ctx, data)
|
|
|
|
res = w.Result()
|
|
require.Equal(t, http.StatusOK, res.StatusCode)
|
|
|
|
got, err = ioutil.ReadAll(res.Body)
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, `{"x":"10","s":"test"}`, string(got))
|
|
|
|
// test marshalling failure
|
|
ctx = context.CLIContext{Indent: false}.WithCodec(codec.New())
|
|
w = httptest.NewRecorder()
|
|
data2 := badJSONMarshaller{}
|
|
|
|
PostProcessResponseBare(w, ctx, data2)
|
|
|
|
res = w.Result()
|
|
require.Equal(t, http.StatusInternalServerError, res.StatusCode)
|
|
|
|
got, err = ioutil.ReadAll(res.Body)
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(func() { res.Body.Close() })
|
|
require.Equal(t, []string{"application/json"}, res.Header["Content-Type"])
|
|
require.Equal(t, `{"error":"couldn't marshal"}`, string(got))
|
|
}
|
|
|
|
type badJSONMarshaller struct{}
|
|
|
|
func (badJSONMarshaller) MarshalJSON() ([]byte, error) {
|
|
return nil, errors.New("couldn't marshal")
|
|
}
|
|
|
|
// asserts that ResponseRecorder returns the expected code and body
|
|
// runs PostProcessResponse on the objects regular interface and on
|
|
// the marshalled struct.
|
|
func runPostProcessResponse(t *testing.T, ctx context.CLIContext, obj interface{}, expectedBody []byte, indent bool) {
|
|
if indent {
|
|
ctx.Indent = indent
|
|
}
|
|
|
|
// test using regular struct
|
|
w := httptest.NewRecorder()
|
|
|
|
PostProcessResponse(w, ctx, obj)
|
|
require.Equal(t, http.StatusOK, w.Code, w.Body)
|
|
|
|
resp := w.Result()
|
|
t.Cleanup(func() { resp.Body.Close() })
|
|
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
require.Nil(t, err)
|
|
require.Equal(t, expectedBody, body)
|
|
|
|
marshalled, err := ctx.Codec.MarshalJSON(obj)
|
|
require.NoError(t, err)
|
|
|
|
if indent {
|
|
marshalled, err = codec.MarshalIndentFromJSON(marshalled)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// test using marshalled struct
|
|
w = httptest.NewRecorder()
|
|
PostProcessResponse(w, ctx, marshalled)
|
|
|
|
require.Equal(t, http.StatusOK, w.Code, w.Body)
|
|
resp = w.Result()
|
|
|
|
t.Cleanup(func() { resp.Body.Close() })
|
|
body, err = ioutil.ReadAll(resp.Body)
|
|
|
|
require.Nil(t, err)
|
|
require.Equal(t, string(expectedBody), string(body))
|
|
}
|
|
|
|
func mustNewRequest(t *testing.T, method, url string, body io.Reader) *http.Request {
|
|
req, err := http.NewRequest(method, url, body)
|
|
require.NoError(t, err)
|
|
err = req.ParseForm()
|
|
require.NoError(t, err)
|
|
return req
|
|
}
|