rippled
Loading...
Searching...
No Matches
ValidatorSite_test.cpp
1//------------------------------------------------------------------------------
2/*
3 This file is part of rippled: https://github.com/ripple/rippled
4 Copyright 2016 Ripple Labs Inc.
5
6 Permission to use, copy, modify, and/or distribute this software for any
7 purpose with or without fee is hereby granted, provided that the above
8 copyright notice and this permission notice appear in all copies.
9
10 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17*/
18//==============================================================================
19
20#include <test/jtx.h>
21#include <test/jtx/TrustedPublisherServer.h>
22#include <test/unit_test/FileDirGuard.h>
23
24#include <xrpld/app/misc/ValidatorSite.h>
25
26#include <xrpl/basics/strHex.h>
27#include <xrpl/protocol/PublicKey.h>
28#include <xrpl/protocol/jss.h>
29
30#include <boost/algorithm/string/join.hpp>
31#include <boost/algorithm/string/predicate.hpp>
32#include <boost/asio.hpp>
33#include <boost/range/adaptor/transformed.hpp>
34
35#include <date/date.h>
36
37#include <chrono>
38
39namespace ripple {
40namespace detail {
41constexpr char const*
43{
44 return R"vl({
45 "public_key": "ED2677ABFFD1B33AC6FBC3062B71F1E8397C1505E1C42C64D11AD1B28FF73F4734",
46 "manifest": "JAAAAAFxIe0md6v/0bM6xvvDBitx8eg5fBUF4cQsZNEa0bKP9z9HNHMh7V0AnEi5D4odY9X2sx+cY8B3OHNjJvMhARRPtTHmWnAhdkDFcg53dAQS1WDMQDLIs2wwwHpScrUnjp1iZwwTXVXXsaRxLztycioto3JgImGdukXubbrjeqCNU02f7Y/+6w0BcBJA3M0EOU+39hmB8vwfgernXZIDQ1+o0dnuXjX73oDLgsacwXzLBVOdBpSAsJwYD+nW8YaSacOHEsWaPlof05EsAg==",
47 "blob" : "{"sequence":37,"expiration":594172800,"validators":[{"validation_public_key":"ED49F8EB8071E26D4E067238D62D67CA6EBFB298B4A72DCFAD536A7EC8925C519B","manifest":"JAAAAAFxIe1J+OuAceJtTgZyONYtZ8puv7KYtKctz61Tan7IklxRm3MhAogMmQTRAFK/+m/XWQfJvXTeMcaiyF6gkhgAssdLOciIdkYwRAIgNxYavJPyHANuxogQY7RNBP9tZogZJxF1wZqzm4a37GgCIBOvbeQ8+P46CCIcy4ZCZA5rZZ+93H0aKJZQ3+IA0OOucBJAASTpQKtEJkeqwHz+jKWNvWl0sHRQZSSJuYiMyyUa7ytpsev6NGoFn1bNpYTgvsaPxoz7vHskDh2Z6gebSDCRCA=="},{"validation_public_key":"ED8108F7D9EE779DC1075EC3CF8EB9004DDF84CD0A0FF5775C9E375CCACDAA3022","manifest":"JAAAAAFxIe2BCPfZ7nedwQdew8+OuQBN34TNCg/1d1yeN1zKzaowInMhAlvPJANQcRUSNUR+NlZuo4kGpYF8l9pHPP1ZROOUcNYRdkYwRAIgRWZZuJLAf3SNMGoFygUlu+eAD51ZoHFMcyoicn0WKucCIGw4n9cVDPOBGC8wlJDy9282x9RdOwo1co2g+NZlc/DNcBJAKJhK/am6L7KE450NVzhpVVoL8OFMo0mFxk8BDG6QO2cSNMN3Oywf40D+Iles9LXxxvvPB6gWSmPlwF7dNR9GAQ=="},{"validation_public_key":"ED7E3BAFF901DE525B00B2C1FE19AF449A080B5F3100C6EC182C867AF61F710FFD","manifest":"JAAAAAFxIe1+O6/5Ad5SWwCywf4Zr0SaCAtfMQDG7Bgshnr2H3EP/XMhA5+GDJh2ApWKCh2N5omx4FAOFEqXMjqy1HJ5E7WA3FrOdkcwRQIhAMRezwjTAL35jpjj15jqoHUvRm7+7iHpU47aKE6HEChZAiBSMIZaMWv6qNJHniYpsYHx4OPPpBoCMMdMVAGfFi9fK3ASQE0TYiIsGv0/ylpqGEBiLkk2XjrA8++Akzpr9vcTtrkHiDDo0cHKO9mRULAXesRrOyFb5QcO0l0VswevD5jlswk="},{"validation_public_key":"ED45E80A04D79CB9DF00AEBD86DCDC1686D6419EA9E5E0E71F1A817E08B5076A55","manifest":"JAAAAAFxIe1F6AoE15y53wCuvYbc3BaG1kGeqeXg5x8agX4ItQdqVXMhAxZo157pcB9de6Smk7hoK3wNCAr4aFZtfAPi7CE4mNJldkcwRQIhALlVjXCfiy/mtXBWsNt77t4jKcNEBpRV8zv+SpU5lCh0AiBa8vo8xxpviYlf4zdG+nQhB2OgfkQZZPMHOt7CaXzXgXASQL8O5p083mg4KKL8uZfMaUqdgzuJ0Gta1lyUWPctTPCxY135XwK+nJAdFsIUFNJ9MPjnpCmSjYVzVa6M5/nAcAI="},{"validation_public_key":"EDD8C88642795CE69C5B780E01702C370F9507D0B64433F17EFE70F2637A40ADB7","manifest":"JAAAAAFxIe3YyIZCeVzmnFt4DgFwLDcPlQfQtkQz8X7+cPJjekCtt3MhAnFfr+r9BXdsXE/cBlJMyd/XsO1A5XEYCctrsvLEX+DmdkcwRQIhANRcRMg9SAXoaOvHDZ2av9RzEaZaVENfQiVgsi+Ox3F0AiB2snSIOm6c4/inbtU0UmWLQTzuwkOdUFPIB8Ax8dmGuHASQMUIfXMj96kcFTSJnMFC/mW/AQ8bKXkFrrk0CUTFFKweEjTq+STrFi6qLL2MT7nveGxsXBCgztjc0qGas9KFWgM="},{"validation_public_key":"EDBDEB901F7C75D0E20C6C42AF03BE0DA40377AF1939A18B3CB3679661DD5F9F74","manifest":"JAAAAAFxIe2965AffHXQ4gxsQq8Dvg2kA3evGTmhizyzZ5Zh3V+fdHMhAg3cyKNPMPqKgR7kIi7c/8GL/YgdBtg4mSAWvwmaevVGdkYwRAIgWzG8GqYg3YpwDs8xXa9XqLHss76KT2uAHRhUXFVUqCQCIG2EvbFKnxezRd9cpPHSt32HXK+P4+aL3p2+vqlCxRR9cBJAboXTmYTayocA3zf9dWEXtyaeOGC1k5WdYURzPleevvalR4xVoXzs38iGPxFr/pA9nL+M4duu0GKCHlVir+fBAg=="},{"validation_public_key":"EDA17871E72B0C570AC4345C60CF02AFBBB740A631B7AD0E1E573216574D9AEA02","manifest":"JAAAAAFxIe2heHHnKwxXCsQ0XGDPAq+7t0CmMbetDh5XMhZXTZrqAnMhAojyuzgtreQkxQj8prHxOsbDcF5fu4XXb0KxEL/Pq5HhdkcwRQIhANfPDLZP47aCWwt5kBnp75BuuCgp9c4BfJPd66SFCw61AiAJvegBvvPIrec+XOSzKRfi5uuXWxtl9Eyr2aPBYXvbRHASQMULYEo7beRfoUCnjk1sTYyY91tLIGLgnnaWXhUm80+zs5IGegk8qijKAtBOMuBC71lAB4KhJc+dB2rpMOFc5gw="},{"validation_public_key":"EDF46EE27AD0E1A714AFECDA816EAB7114614FCB92D0CB4D97B6A88ED43434AFC9","manifest":"JAAAAAFxIe30buJ60OGnFK/s2oFuq3EUYU/LktDLTZe2qI7UNDSvyXMhAw0ATWjVTt4FfeKO7kv6fFgd/go2+d5BSyUcURmRWnTtdkcwRQIhAMwOgDec7QYYNngspg90wEvVbsoh2ux14RPTw+GHaXNlAiALgfEsz+AF4eyX/Y5i44VrFjFFIMWUfOZaQJtsxteM1XASQLOaF0t2ZpqVKd8JESQVY+zU567iAAG2amTPZx95875S9A6Pl+kH5TGHMAeWjgWSqfh3m2HBJX7NIcXb98vy9AA="},{"validation_public_key":"ED6E4C41E59FFBEB51726E54468502FE6437238FA78EA51634E7BF0D09171AEE8F","manifest":"JAAAAAFxIe1uTEHln/vrUXJuVEaFAv5kNyOPp46lFjTnvw0JFxruj3MhAuztGWb/Oi1/V5m5dujWr9HmbKRyK4XYk+kmuFPSgAFrdkYwRAIgfQ+BgXX6QblZy4H05o7GPSIwqS7QQRUW7dqF54IAiiMCIH4XfLw956iEaoxZOk7Kctin2X9hMfaLN7wys9yAUFoZcBJAueEi84XR3Ll1GLJWanW1g1MdUj/0PAxJbw6EEQRuG3zdnuRHNXld6UZAbIkVcP0ztfqulBzjbcsLDOKFEicSBg=="},{"validation_public_key":"EDB6FC8E803EE8EDC2793F1EC917B2EE41D35255618DEB91D3F9B1FC89B75D4539","manifest":"JAAAAAFxIe22/I6APujtwnk/HskXsu5B01JVYY3rkdP5sfyJt11FOXMhA8VdvHFyScByQGTYNGeOvB0+67gWaqefcfvRk5+KwgV1dkYwRAIgZFulO/AiMoczng6i/4BkfzT7j9lxF4PP1ufgrOQaJ8sCIBX/E8Zbpn7tWqgAyNyWpVPkhFmaUMqEry8WoUT1fdGQcBJAv51RqJxgg/VrnrZwiLK2Dc0CKbiLPO5HJ4ZMsjdPT2gRc97rWkAXuV2L6PNFO59xyuoaZmSMlZYvqSGPpfF7Bw=="},{"validation_public_key":"ED691303992FEC64E6BC4BACD36AE6E5AEDC23F2861B6D8EFB9FD77EE3EADE3435","manifest":"JAAAAAFxIe1pEwOZL+xk5rxLrNNq5uWu3CPyhhttjvuf137j6t40NXMhAi2AXJQgo/JuW3r7f/6CcVsGN1YmIj11GiIESHBnQSk8dkcwRQIhANCDEQymrd6veT3ouacF6fhBr5wLw3GmXg1rMCLVvBzZAiA8uWQ+tqd46WmfBexjSBQ2Jd6UAGdrHvjcCQ2ZgSooCnASQFkHl+D7/U3WByYP384+pcFDf2Gi4WIRHVTo58cqdk5CDiwc1T0rDoLhmo41a3f+dsftfwR4aMmwFcPXLnrjrAI="},{"validation_public_key":"EDAD16667F0185DDBB7FA65B22F4B7D310BF5C3E2D9B823FB06A3A41AF8AC83BC1","manifest":"JAAAAAFxIe2tFmZ/AYXdu3+mWyL0t9MQv1w+LZuCP7BqOkGvisg7wXMhAqweE3PIS3E44KhMqKjKtbkBe8H8GbiuoAXAYDRoVRHodkYwRAIgagGkXtowUybdltKojv0lvvflrlQ9IRnPOjekF60iHzgCICg6ZocIMzkUuvO91BEormIWmX4G/MGT2zro6I/PvB8XcBJAcJLXkt/w/kcwEvNiZmi2i2nMn1wiP3LS9NJjBPju8KFLAMg0O9ydQT67U/ALYOeTPTO2/i2Yw9OSlibtqhgzDA=="},{"validation_public_key":"EDC245027A52EE5318095598EC3AB65FF4A3B9F9428E10B2F3C6F39DE15A15C90A","manifest":"JAAAAAFxIe3CRQJ6Uu5TGAlVmOw6tl/0o7n5Qo4QsvPG853hWhXJCnMhA/8/9rKUdA61j/fIEP/cqLpxBlmIhP2rg1d7NaEPyKV+dkcwRQIhAIxE0M/FJ50vfZW6fPpy4yCZumY9n0obrOojUkjm55a0AiBj56O0MpopGoY9HxC/+4wNO36Ho7E9CQeHsnKreDdsAXASQIYUd81jbiVUlET4dGoG2p+cf+2GqEXX5fJMSSyX/qe0XfR4cO+4qlgmjMQdCRDBWABHVvdN/yZyi/rL2c+WrQc="},{"validation_public_key":"ED4246AA3AE9D29863944800CCA91829E4447498A20CD9C3973A6B59346C75AB95","manifest":"JAAAAAFxIe1CRqo66dKYY5RIAMypGCnkRHSYogzZw5c6a1k0bHWrlXMhAkm1lz0c8QXWfJ9b1vB72dLabw8wYId8MtnpsHHBEC8pdkYwRAIgQlb6HJ53hsTAfVid+AOdBVvMF7rahIKNLBHUgn52zBECIGLUqFu8a1AAHRJcVonKYEnmhJwbCXLn+je7na1WD1/ocBJAE4vfvrGSmZC2uAUGmM5dIBtoSgEUey+2VleDYEsce94txYcjR8Z7QLNaliD8w/bD5/hvYQ8meV1Wg1jJFNe0CA=="},{"validation_public_key":"ED2C1468B4A11D281F93EF337C95E4A08DF0000FDEFB6D0EA9BC05FBD5D61A1F5A","manifest":"JAAAAAFxIe0sFGi0oR0oH5PvM3yV5KCN8AAP3vttDqm8BfvV1hofWnMhAkMUmCD2aPmgFDDRmimvSicSIScw6YNr42Dw4RAdwrOAdkcwRQIhAJFOHMg6qTG8v60dhrenYYk6cwOaRXq0RNmLjyyCiz5lAiAdU0YkDUJQhnN8Ry8s+6zTJLiNLbtM8oO/cLnurVpRM3ASQGALarHAsJkSZQtGdM2AaR/joFK/jhDU57+l+RSYjri/ydE20DaKanwkMEoVlBTg7lX4hYjEnmkqo73wIthLOAQ="},{"validation_public_key":"EDA54C85F91219FD259134B6B126AD64AE7204B81DD4052510657E1A5697246AD2","manifest":"JAAAAAJxIe2lTIX5Ehn9JZE0trEmrWSucgS4HdQFJRBlfhpWlyRq0nMhAl8cJerPv+vo1BK611xVTpGxjjr/CuxPTgU8URM4eTZ5dkYwRAIgdK3cQV2Y/viZne/PboKSKewngTuIN2M6c8azwqc20uUCIAc6GoNT+P2YBy49gdau4P7ySwWoQX5nf9dQxiQav5wIcBJAqiCK0d6QRZSpiVHp8O9nlKXCSEhsiSNcWcEFm/fGhJAnAN0Ov9HINId1pxrBn2dKRegLTvYG3Bpbz//HLgEdDA=="},{"validation_public_key":"ED9AE4F5887BA029EB7C0884486D23CF281975F773F44BD213054219882C411CC7","manifest":"JAAAAAFxIe2a5PWIe6Ap63wIhEhtI88oGXX3c/RL0hMFQhmILEEcx3MhAmG2zgv8FBZsZJU8aPapwo9cIqQv4/MSS1oVA5eVMiwLdkYwRAIgF+LOe4eY0gp9ttqh2gnv+z75OqLyOQMpGPALgm+NtOsCICDXBZVPtprmBDkBJkPFSnE55D9eKYRH8z/iY1EtpNplcBJAADEWGVT80Owhd1lh2JsU/oZlmeNF5WN7YvlB8llExaRKEVC+GW9Wg+iNIQ3rmV7P8aNaVuaabG00fOgkgzNhDw=="},{"validation_public_key":"EDA8D29F40CEB28995617641A3BC42692E1DE883214F612FBB62087A148E5F6F9A","manifest":"JAAAAAFxIe2o0p9AzrKJlWF2QaO8QmkuHeiDIU9hL7tiCHoUjl9vmnMhAnYnP7Eg6VgNnEUTRE29d64jQT/iBcWTQtNrUzyD6MJ+dkcwRQIhAOEsV5anTkloSmTZRbimMyBKqHoJYXcBBe8lLiPYC7mUAiAz2aNOpfQ/1LycWloIMvdhxzinq5X7Uas/uOSb9wh8d3ASQLVkfpW/GO6wdT6AuuSJ56TtM343pDNH+iSzxltIfdrPiUxT5rf4k21lQQuPClXm9+SfKrCiUXZK7dj0/GWTYQg="},{"validation_public_key":"ED38B0288EA240B4CDEC18A1A6289EB49007E4EBC0DE944803EB7EF141C5664073","manifest":"JAAAAAFxIe04sCiOokC0zewYoaYonrSQB+TrwN6USAPrfvFBxWZAc3MhAgOKcvIuchalrZw/glTuOxV3IOCcporxMB7JqAVupk1edkcwRQIhAOvRzpe+IYZK1MyInIQZ87JvP2J8SIXCXZMPBCdITBamAiASavJXi9pws8rDDJSxhGMlmE7zI5bSA8ivtRC9Lgq+UXASQDl3eoqLID+ETJNM+zbMuvwvcHEIxeBZkZ9fp5jJv6OCTPwlj4TJSuy1avEWqUYS2riv5Dvl2haFUoCHf4yawAA="},{"validation_public_key":"EDEE10DC36ACD995C8E0E86E3CD2FBF8301A4AC2B8847B61A1935DE4973B407C0E","manifest":"JAAAAAFxIe3uENw2rNmVyODobjzS+/gwGkrCuIR7YaGTXeSXO0B8DnMhAmX0vb7j+lgBjFjbN9RlA86J7AO2Vn6HLquO3aisK4mwdkYwRAIgfxBLn7i4jg/di0U25q6kIbVfTzqbA0SCpQ0I57TOFkcCIFMtJQpENjB2K2EmvBHPvNcwuSPc3vsEeqE2rNJ/cT5DcBJAf68XPFu5RjCeLgpFJM7PKFLgoV8e1nxO5ewjq9Q+TAEGnFyS0IOwf6pOOtIVMdVeXu1v6p4fhXQkdihHt1x6Ag=="},{"validation_public_key":"ED583ECD06C3B7369980E65C78C440A529300F557ED81256283F7DD5AA3513A334","manifest":"JAAAAAFxIe1YPs0Gw7c2mYDmXHjEQKUpMA9VftgSVig/fdWqNROjNHMhAyuUnzZZ1n2/GaTmE1m7H/v9YlZyDEwHY3gSHUA3ICL9dkYwRAIgHx2PHvidoN+5yG9WeAS2k7nwIM8ajxQW6wjvt8kBenACIDNxQPQkDyDJH9seS5C62mAarQmgiN89YS3jhNtnvEIqcBJAj7Jh0Kac+aJdpoepu/+eJKnnFQ7YByZB8eMZ+SS1zLhE+lip/49qqVNcpAxEqfaGtxJzoDDD1/QbuU7NOSPkCg=="},{"validation_public_key":"ED95C5172B2AD7D39434EEBC436B65B3BB7E58D5C1CEFC820B6972ACAD776E286A","manifest":"JAAAAAFxIe2VxRcrKtfTlDTuvENrZbO7fljVwc78ggtpcqytd24oanMhAiqcRde3MQZ075fa4ZNNyRaYJGMdBNkBnn3bQrKseBDQdkYwRAIgU+LfcE71DPVrO+KtUBjQ9D2u0k/Pr7lukO1nPRj6hSACIDNLYC/JFgobCsIa0BGw+6bUnOw9meU3FdXgR7Q7SoqJcBJAXQakOoQnPp3pcLL7zdKCPUX4b+/FC9Unhqp+O9xQFnRaCWVGmk5MJOIMs4WOQdpM1j3OgSsABmRuCXYvwo/nDw=="},{"validation_public_key":"ED90163D2BF0B7788904C4A4118D7D968920E847D88B79178390837DE3CA261562","manifest":"JAAAAAFxIe2QFj0r8Ld4iQTEpBGNfZaJIOhH2It5F4OQg33jyiYVYnMhA72VTRiGhkJBtqgGHDzHj7YbC6+NsEKrFHNuE/LO3Tn5dkYwRAIgf8s+fYt0llrKQ2qiWPnGmb6qJPoe8OnCM3VS29XKbYYCIHGnlJ4OTs2dXugO6Bto63NpDvvqJ+WIwdYKqZ6BiBfzcBJAGvNtkog4pfE5dZRwmic87ZBeeunOh4YpL0SERdxWj43Cs9815zFJuZysSaUX2R/vdE2VKqvSgqqtDEnrMo2oAw=="}]}",
48 "signature" : "9FF30EDC4DED7ABCD0D36389B7C716EED4B5E4F043902853534EBAC7BE966BB3813D5CF25E4DADA5E657CCF019FFD11847FD3CC44B5559A6FCEEE4C3DCFF8D0E",
49 "version": 1
50}
51)vl";
52}
53
56} // namespace detail
57
58namespace test {
60{
61private:
63
64 void
66 {
67 testcase("Config Load");
68
69 using namespace jtx;
70
71 Env env(*this, envconfig(), nullptr, beast::severities::kDisabled);
72 auto trustedSites =
74
75 // load should accept empty sites list
76 std::vector<std::string> emptyCfgSites;
77 BEAST_EXPECT(trustedSites->load(emptyCfgSites));
78
79 // load should accept valid validator site uris
81 {"http://ripple.com/",
82 "http://ripple.com/validators",
83 "http://ripple.com:8080/validators",
84 "http://207.261.33.37/validators",
85 "http://207.261.33.37:8080/validators",
86 "https://ripple.com/validators",
87 "https://ripple.com:443/validators",
88 "file:///etc/opt/ripple/validators.txt",
89 "file:///C:/Lib/validators.txt"
90#if !_MSC_VER
91 ,
92 "file:///"
93#endif
94 });
95 BEAST_EXPECT(trustedSites->load(cfgSites));
96
97 // load should reject validator site uris with invalid schemes
98 std::vector<std::string> badSites({"ftp://ripple.com/validators"});
99 BEAST_EXPECT(!trustedSites->load(badSites));
100
101 badSites[0] = "wss://ripple.com/validators";
102 BEAST_EXPECT(!trustedSites->load(badSites));
103
104 badSites[0] = "ripple.com/validators";
105 BEAST_EXPECT(!trustedSites->load(badSites));
106
107 // Host names are not supported for file URLs
108 badSites[0] = "file://ripple.com/vl.txt";
109 BEAST_EXPECT(!trustedSites->load(badSites));
110
111 // Even local host names are not supported for file URLs
112 badSites[0] = "file://localhost/home/user/vl.txt";
113 BEAST_EXPECT(!trustedSites->load(badSites));
114
115 // Nor IP addresses
116 badSites[0] = "file://127.0.0.1/home/user/vl.txt";
117 BEAST_EXPECT(!trustedSites->load(badSites));
118
119 // File URL path can not be empty
120 badSites[0] = "file://";
121 BEAST_EXPECT(!trustedSites->load(badSites));
122
123#if _MSC_VER // Windows paths strip off the leading /, leaving the path empty
124 // File URL path can not be a directory
125 // (/ is the only path we can reasonably assume is a directory)
126 badSites[0] = "file:///";
127 BEAST_EXPECT(!trustedSites->load(badSites));
128#endif
129 }
130
144 void
146 detail::DirGuard const& good,
148 {
149 testcase << "Fetch list - "
150 << boost::algorithm::join(
151 paths |
152 boost::adaptors::transformed(
153 [](FetchListConfig const& cfg) {
154 return cfg.path +
155 (cfg.ssl ? " [https] v" : " [http] v") +
157 " " + cfg.msg;
158 }),
159 ", ");
160
161 using namespace jtx;
162 using namespace std::chrono_literals;
163
164 Env env(*this, [&]() {
165 auto p = test::jtx::envconfig();
166 p->legacy("database_path", good.subdir().string());
167 return p;
168 }());
169 auto& trustedKeys = env.app().validators();
170 env.timeKeeper().set(env.timeKeeper().now() + 30s);
171
172 test::StreamSink sink;
173 beast::Journal journal{sink};
174
175 std::vector<std::string> emptyCfgKeys;
176 struct publisher
177 {
178 publisher(FetchListConfig const& c) : cfg{c}
179 {
180 }
183 std::string uri;
184 FetchListConfig const& cfg;
185 bool isRetry;
186 };
188
189 auto constexpr listSize = 20;
190 std::vector<std::string> cfgPublishers;
191
192 for (auto const& cfg : paths)
193 {
194 servers.push_back(cfg);
195 auto& item = servers.back();
196 item.isRetry = cfg.path == "/bad-resource";
197 item.list.reserve(listSize);
198 while (item.list.size() < listSize)
199 item.list.push_back(TrustedPublisherServer::randomValidator());
200
201 NetClock::time_point const expires =
202 env.timeKeeper().now() + cfg.expiresFromNow;
203 NetClock::time_point const effective2 =
204 expires - cfg.effectiveOverlap;
205 NetClock::time_point const expires2 =
206 effective2 + cfg.expiresFromNow;
207 item.server = make_TrustedPublisherServer(
208 env.app().getIOContext(),
209 item.list,
210 expires,
211 {{effective2, expires2}},
212 cfg.ssl,
213 cfg.serverVersion);
214 std::string pubHex = strHex(item.server->publisherPublic());
215 cfgPublishers.push_back(pubHex);
216
217 if (item.cfg.failFetch)
218 {
219 // Create a cache file
220 auto const name = good.subdir() / ("cache." + pubHex);
221 std::ofstream o(name.string());
222 o << "{}";
223 }
224
226 uri << (cfg.ssl ? "https://" : "http://")
227 << item.server->local_endpoint() << cfg.path;
228 item.uri = uri.str();
229 }
230
231 BEAST_EXPECT(trustedKeys.load({}, emptyCfgKeys, cfgPublishers));
232
233 // Normally, tests will only need a fraction of this time,
234 // but sometimes DNS resolution takes an inordinate amount
235 // of time, so the test will just wait.
236 auto sites = std::make_unique<ValidatorSite>(env.app(), journal, 12s);
237
239 for (auto const& u : servers)
240 {
241 log << "Testing " << u.uri << std::endl;
242 uris.push_back(u.uri);
243 }
244 sites->load(uris);
245 sites->start();
246 sites->join();
247
248 auto const jv = sites->getJson();
249 for (auto const& u : servers)
250 {
251 for (auto const& val : u.list)
252 {
253 BEAST_EXPECT(
254 trustedKeys.listed(val.masterPublic) != u.cfg.failApply);
255 BEAST_EXPECT(
256 trustedKeys.listed(val.signingPublic) != u.cfg.failApply);
257 }
258
259 Json::Value myStatus;
260 for (auto const& vs : jv[jss::validator_sites])
261 if (vs[jss::uri].asString().find(u.uri) != std::string::npos)
262 myStatus = vs;
263 BEAST_EXPECTS(
264 myStatus[jss::last_refresh_message].asString().empty() !=
265 u.cfg.failFetch,
266 to_string(myStatus) + "\n" + sink.messages().str());
267
268 if (!u.cfg.msg.empty())
269 {
270 BEAST_EXPECTS(
271 sink.messages().str().find(u.cfg.msg) != std::string::npos,
272 sink.messages().str());
273 }
274
275 if (u.cfg.expectedRefreshMin)
276 {
277 BEAST_EXPECTS(
278 myStatus[jss::refresh_interval_min].asInt() ==
279 u.cfg.expectedRefreshMin,
280 to_string(myStatus));
281 }
282
283 if (u.cfg.failFetch)
284 {
285 using namespace std::chrono;
286 std::stringstream nextRefreshStr{
287 myStatus[jss::next_refresh_time].asString()};
288 system_clock::time_point nextRefresh;
289 date::from_stream(nextRefreshStr, "%Y-%b-%d %T", nextRefresh);
290 BEAST_EXPECT(!nextRefreshStr.fail());
291 auto now = system_clock::now();
292 BEAST_EXPECTS(
293 nextRefresh <= now + (u.isRetry ? seconds{30} : minutes{5}),
294 "Now: " + to_string(now) + ", NR: " + nextRefreshStr.str());
295 }
296 }
297 }
298
299 void
301 {
302 testcase << "File list - " << paths[0].first
303 << (paths.size() > 1 ? ", " + paths[1].first : "");
304
305 using namespace jtx;
306
307 Env env(*this);
308
309 test::StreamSink sink;
310 beast::Journal journal{sink};
311
312 struct publisher
313 {
314 std::string uri;
315 std::string expectMsg;
316 bool shouldFail;
317 };
319
320 for (auto const& cfg : paths)
321 {
322 servers.push_back({});
323 auto& item = servers.back();
324 item.shouldFail = !cfg.second.empty();
325 item.expectMsg = cfg.second;
326
328 uri << "file://" << cfg.first;
329 item.uri = uri.str();
330 }
331
332 auto sites = std::make_unique<ValidatorSite>(env.app(), journal);
333
335 for (auto const& u : servers)
336 uris.push_back(u.uri);
337 sites->load(uris);
338 sites->start();
339 sites->join();
340
341 for (auto const& u : servers)
342 {
343 auto const jv = sites->getJson();
344 Json::Value myStatus;
345 for (auto const& vs : jv[jss::validator_sites])
346 if (vs[jss::uri].asString().find(u.uri) != std::string::npos)
347 myStatus = vs;
348 BEAST_EXPECTS(
349 myStatus[jss::last_refresh_message].asString().empty() !=
350 u.shouldFail,
351 to_string(myStatus));
352 if (u.shouldFail)
353 {
354 BEAST_EXPECTS(
355 sink.messages().str().find(u.expectMsg) !=
356 std::string::npos,
357 sink.messages().str());
358 }
359 }
360 }
361
362 void
364 {
365 auto fullPath = [](detail::FileDirGuard const& guard) {
366 auto absPath = absolute(guard.file()).string();
367 if (absPath.front() != '/')
368 absPath.insert(absPath.begin(), '/');
369 return absPath;
370 };
371 {
372 // Create a file with a real validator list
374 *this, "test_val", "vl.txt", detail::realValidatorContents());
375 // Create a file with arbitrary content
377 *this, "test_val", "helloworld.txt", "Hello, world!");
378 // Create a file with malformed Json
380 *this,
381 "test_val",
382 "json.txt",
383 R"json({ "version": 2, "extra" : "value" })json");
384 auto const goodPath = fullPath(good);
385 auto const helloPath = fullPath(hello);
386 auto const jsonPath = fullPath(json);
387 auto const missingPath = jsonPath + ".bad";
388 testFileList({
389 {goodPath, ""},
390 {helloPath,
391 "Unable to parse JSON response from file://" + helloPath},
392 {jsonPath,
393 "Missing fields in JSON response from file://" + jsonPath},
394 {missingPath, "Problem retrieving from file://" + missingPath},
395 });
396 }
397 }
398
399public:
400 void
401 run() override
402 {
403 testConfigLoad();
404
405 detail::DirGuard good(*this, "test_fetch");
406 for (auto ssl : {true, false})
407 {
408 // fetch single site
409 testFetchList(good, {{"/validators", "", ssl}});
410 testFetchList(good, {{"/validators2", "", ssl}});
411 // fetch multiple sites
412 testFetchList(
413 good, {{"/validators", "", ssl}, {"/validators", "", ssl}});
414 testFetchList(
415 good, {{"/validators", "", ssl}, {"/validators2", "", ssl}});
416 testFetchList(
417 good, {{"/validators2", "", ssl}, {"/validators", "", ssl}});
418 testFetchList(
419 good, {{"/validators2", "", ssl}, {"/validators2", "", ssl}});
420 // fetch single site with single redirects
421 testFetchList(good, {{"/redirect_once/301", "", ssl}});
422 testFetchList(good, {{"/redirect_once/302", "", ssl}});
423 testFetchList(good, {{"/redirect_once/307", "", ssl}});
424 testFetchList(good, {{"/redirect_once/308", "", ssl}});
425 // one redirect, one not
426 testFetchList(
427 good,
428 {{"/validators", "", ssl}, {"/redirect_once/302", "", ssl}});
429 testFetchList(
430 good,
431 {{"/validators2", "", ssl}, {"/redirect_once/302", "", ssl}});
432 // UNLs with a "gap" between validUntil of one and validFrom of the
433 // next
434 testFetchList(
435 good,
436 {{"/validators2",
437 "",
438 ssl,
439 false,
440 false,
441 1,
443 std::chrono::seconds{-90}}});
444 // fetch single site with undending redirect (fails to load)
445 testFetchList(
446 good,
447 {{"/redirect_forever/301",
448 "Exceeded max redirects",
449 ssl,
450 true,
451 true}});
452 // two that redirect forever
453 testFetchList(
454 good,
455 {{"/redirect_forever/307",
456 "Exceeded max redirects",
457 ssl,
458 true,
459 true},
460 {"/redirect_forever/308",
461 "Exceeded max redirects",
462 ssl,
463 true,
464 true}});
465 // one undending redirect, one not
466 testFetchList(
467 good,
468 {{"/validators", "", ssl},
469 {"/redirect_forever/302",
470 "Exceeded max redirects",
471 ssl,
472 true,
473 true}});
474 // one undending redirect, one not
475 testFetchList(
476 good,
477 {{"/validators2", "", ssl},
478 {"/redirect_forever/302",
479 "Exceeded max redirects",
480 ssl,
481 true,
482 true}});
483 // invalid redir Location
484 testFetchList(
485 good,
486 {{"/redirect_to/ftp://invalid-url/302",
487 "Invalid redirect location",
488 ssl,
489 true,
490 true}});
491 testFetchList(
492 good,
493 {{"/redirect_to/file://invalid-url/302",
494 "Invalid redirect location",
495 ssl,
496 true,
497 true}});
498 // invalid json
499 testFetchList(
500 good,
501 {{"/validators/bad",
502 "Unable to parse JSON response",
503 ssl,
504 true,
505 true}});
506 testFetchList(
507 good,
508 {{"/validators2/bad",
509 "Unable to parse JSON response",
510 ssl,
511 true,
512 true}});
513 // error status returned
514 testFetchList(
515 good,
516 {{"/bad-resource", "returned bad status", ssl, true, true}});
517 // location field missing
518 testFetchList(
519 good,
520 {{"/redirect_nolo/308",
521 "returned a redirect with no Location",
522 ssl,
523 true,
524 true}});
525 // json fields missing
526 testFetchList(
527 good,
528 {{"/validators/missing",
529 "Missing fields in JSON response",
530 ssl,
531 true,
532 true}});
533 testFetchList(
534 good,
535 {{"/validators2/missing",
536 "Missing fields in JSON response",
537 ssl,
538 true,
539 true}});
540 // timeout
541 testFetchList(
542 good, {{"/sleep/13", "took too long", ssl, true, true}});
543 // bad manifest format using known versions
544 // * Retrieves a v1 formatted list claiming version 2
545 testFetchList(
546 good, {{"/validators", "Missing fields", ssl, true, true, 2}});
547 // * Retrieves a v2 formatted list claiming version 1
548 testFetchList(
549 good, {{"/validators2", "Missing fields", ssl, true, true, 0}});
550 // bad manifest version
551 // Because versions other than 1 are treated as v2, the v1
552 // list won't have the blobs_v2 fields, and thus will claim to have
553 // missing fields
554 testFetchList(
555 good, {{"/validators", "Missing fields", ssl, true, true, 4}});
556 testFetchList(
557 good,
558 {{"/validators2",
559 "1 unsupported version",
560 ssl,
561 false,
562 true,
563 4}});
564 using namespace std::chrono_literals;
565 // get expired validator list
566 testFetchList(
567 good,
568 {{"/validators",
569 "Applied 1 expired validator list(s)",
570 ssl,
571 false,
572 false,
573 1,
574 0s}});
575 testFetchList(
576 good,
577 {{"/validators2",
578 "Applied 1 expired validator list(s)",
579 ssl,
580 false,
581 false,
582 1,
583 0s,
584 -1s}});
585 // force an out-of-range validUntil value
586 testFetchList(
587 good,
588 {{"/validators",
589 "1 invalid validator list(s)",
590 ssl,
591 false,
592 true,
593 1,
595 // force an out-of-range validUntil value on the future list
596 // The first list is accepted. The second fails. The parser
597 // returns the "best" result, so this looks like a success.
598 testFetchList(
599 good,
600 {{"/validators2",
601 "",
602 ssl,
603 false,
604 false,
605 1,
607 299s}});
608 // force an out-of-range validFrom value
609 // The first list is accepted. The second fails. The parser
610 // returns the "best" result, so this looks like a success.
611 testFetchList(
612 good,
613 {{"/validators2",
614 "",
615 ssl,
616 false,
617 false,
618 1,
620 301s}});
621 // force an out-of-range validUntil value on _both_ lists
622 testFetchList(
623 good,
624 {{"/validators2",
625 "2 invalid validator list(s)",
626 ssl,
627 false,
628 true,
629 1,
632 // verify refresh intervals are properly clamped
633 testFetchList(
634 good,
635 {{"/validators/refresh/0",
636 "",
637 ssl,
638 false,
639 false,
640 1,
643 1}}); // minimum of 1 minute
644 testFetchList(
645 good,
646 {{"/validators2/refresh/0",
647 "",
648 ssl,
649 false,
650 false,
651 1,
654 1}}); // minimum of 1 minute
655 testFetchList(
656 good,
657 {{"/validators/refresh/10",
658 "",
659 ssl,
660 false,
661 false,
662 1,
665 10}}); // 10 minutes is fine
666 testFetchList(
667 good,
668 {{"/validators2/refresh/10",
669 "",
670 ssl,
671 false,
672 false,
673 1,
676 10}}); // 10 minutes is fine
677 testFetchList(
678 good,
679 {{"/validators/refresh/2000",
680 "",
681 ssl,
682 false,
683 false,
684 1,
687 60 * 24}}); // max of 24 hours
688 testFetchList(
689 good,
690 {{"/validators2/refresh/2000",
691 "",
692 ssl,
693 false,
694 false,
695 1,
698 60 * 24}}); // max of 24 hours
699 }
700 using namespace boost::filesystem;
701 for (auto const& file : directory_iterator(good.subdir()))
702 {
703 remove_all(file);
704 }
705
706 testFileURLs();
707 }
708};
709
710BEAST_DEFINE_TESTSUITE_PRIO(ValidatorSite, app, ripple, 2);
711
712} // namespace test
713} // namespace ripple
T back(T... args)
Represents a JSON value.
Definition json_value.h:149
std::string asString() const
Returns the unquoted string value.
static Int const maxInt
Definition json_value.h:162
A generic endpoint for log messages.
Definition Journal.h:60
A testsuite class.
Definition suite.h:55
log_os< char > log
Logging output stream.
Definition suite.h:152
testcase_t testcase
Memberspace for declaring test cases.
Definition suite.h:155
virtual ValidatorList & validators()=0
virtual boost::asio::io_context & getIOContext()=0
Create a directory and remove it when it's done.
path const & subdir() const
Write a file in a directory and remove when done.
time_point now() const override
Returns the current time.
std::stringstream const & messages() const
void testFetchList(detail::DirGuard const &good, std::vector< FetchListConfig > const &paths)
void run() override
Runs the suite.
void testFileList(std::vector< std::pair< std::string, std::string > > const &paths)
A transaction testing environment.
Definition Env.h:121
Application & app()
Definition Env.h:261
beast::Journal const journal
Definition Env.h:162
ManualTimeKeeper & timeKeeper()
Definition Env.h:273
Inject raw JSON.
Definition jtx_json.h:33
Set Paths, SendMax on a JTx.
Definition paths.h:35
T endl(T... args)
T is_same_v
constexpr char const * realValidatorContents()
auto constexpr default_expires
auto constexpr default_effective_overlap
std::unique_ptr< Config > envconfig()
creates and initializes a default configuration for jtx::Env
Definition envconfig.h:54
std::shared_ptr< TrustedPublisherServer > make_TrustedPublisherServer(boost::asio::io_context &ioc, std::vector< TrustedPublisherServer::Validator > const &validators, NetClock::time_point validUntil, std::vector< std::pair< NetClock::time_point, NetClock::time_point > > const &futures, bool useSSL=false, int version=1, bool immediateStart=true, int sequence=1)
Use hash_* containers for keys that do not need a cryptographically secure hashing algorithm.
Definition algorithm.h:25
std::string strHex(FwdIt begin, FwdIt end)
Definition strHex.h:30
std::string to_string(base_uint< Bits, Tag > const &a)
Definition base_uint.h:630
STL namespace.
T push_back(T... args)
T reserve(T... args)
T str(T... args)
T to_string(T... args)