//------------------------------------------------------------------------------ /* This file is part of rippled: https://github.com/ripple/rippled Copyright 2016 Ripple Labs Inc. Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ //============================================================================== #include #include #include #include #include #include #include #include #include #include #include #include #include #include namespace ripple { namespace test { class ValidatorSite_test : public beast::unit_test::suite { private: using Validator = TrustedPublisherServer::Validator; static PublicKey randomNode () { return derivePublicKey (KeyType::secp256k1, randomSecretKey()); } static std::string makeManifestString ( PublicKey const& pk, SecretKey const& sk, PublicKey const& spk, SecretKey const& ssk, int seq) { STObject st(sfGeneric); st[sfSequence] = seq; st[sfPublicKey] = pk; st[sfSigningPubKey] = spk; sign(st, HashPrefix::manifest, *publicKeyType(spk), ssk); sign(st, HashPrefix::manifest, *publicKeyType(pk), sk, sfMasterSignature); Serializer s; st.add(s); return base64_encode (std::string( static_cast (s.data()), s.size())); } static Validator randomValidator () { auto const secret = randomSecretKey(); auto const masterPublic = derivePublicKey(KeyType::ed25519, secret); auto const signingKeys = randomKeyPair(KeyType::secp256k1); return { masterPublic, signingKeys.first, makeManifestString ( masterPublic, secret, signingKeys.first, signingKeys.second, 1) }; } void testConfigLoad () { testcase ("Config Load"); using namespace jtx; Env env (*this); auto trustedSites = std::make_unique ( env.app().getIOService(), env.app().validators(), beast::Journal()); // load should accept empty sites list std::vector emptyCfgSites; BEAST_EXPECT(trustedSites->load (emptyCfgSites)); // load should accept valid validator site uris std::vector cfgSites({ "http://ripple.com/", "http://ripple.com/validators", "http://ripple.com:8080/validators", "http://207.261.33.37/validators", "http://207.261.33.37:8080/validators", "https://ripple.com/validators", "https://ripple.com:443/validators"}); BEAST_EXPECT(trustedSites->load (cfgSites)); // load should reject validator site uris with invalid schemes std::vector badSites( {"ftp://ripple.com/validators"}); BEAST_EXPECT(!trustedSites->load (badSites)); badSites[0] = "wss://ripple.com/validators"; BEAST_EXPECT(!trustedSites->load (badSites)); badSites[0] = "ripple.com/validators"; BEAST_EXPECT(!trustedSites->load (badSites)); } class TestSink : public beast::Journal::Sink { public: std::stringstream strm_; TestSink () : Sink (beast::severities::kDebug, false) { } void write (beast::severities::Severity level, std::string const& text) override { if (level < threshold()) return; strm_ << text << std::endl; } }; void testFetchList ( std::vector> const& paths) { testcase << "Fetch list - " << paths[0].first << (paths.size() > 1 ? ", " + paths[1].first : ""); using namespace jtx; Env env (*this); auto& trustedKeys = env.app ().validators (); TestSink sink; beast::Journal journal{sink}; PublicKey emptyLocalKey; std::vector emptyCfgKeys; struct publisher { std::unique_ptr server; std::vector list; std::string uri; std::string expectMsg; bool shouldFail; }; std::vector servers; auto const sequence = 1; auto const version = 1; using namespace std::chrono_literals; NetClock::time_point const expiration = env.timeKeeper().now() + 3600s; auto constexpr listSize = 20; std::vector cfgPublishers; for (auto const& cfg : paths) { auto const publisherSecret = randomSecretKey(); auto const publisherPublic = derivePublicKey(KeyType::ed25519, publisherSecret); auto const pubSigningKeys = randomKeyPair(KeyType::secp256k1); cfgPublishers.push_back(strHex(publisherPublic)); auto const manifest = makeManifestString ( publisherPublic, publisherSecret, pubSigningKeys.first, pubSigningKeys.second, 1); servers.push_back({}); auto& item = servers.back(); item.shouldFail = ! cfg.second.empty(); item.expectMsg = cfg.second; item.list.reserve (listSize); while (item.list.size () < listSize) item.list.push_back (randomValidator()); item.server = std::make_unique ( env.app().getIOService(), pubSigningKeys, manifest, sequence, expiration, version, item.list); std::stringstream uri; uri << "http://" << item.server->local_endpoint() << cfg.first; item.uri = uri.str(); } BEAST_EXPECT(trustedKeys.load ( emptyLocalKey, emptyCfgKeys, cfgPublishers)); auto sites = std::make_unique ( env.app().getIOService(), env.app().validators(), journal); std::vector uris; for (auto const& u : servers) uris.push_back(u.uri); sites->load (uris); sites->start(); sites->join(); for (auto const& u : servers) { for (auto const& val : u.list) { BEAST_EXPECT( trustedKeys.listed (val.masterPublic) != u.shouldFail); BEAST_EXPECT( trustedKeys.listed (val.signingPublic) != u.shouldFail); } auto const jv = sites->getJson(); Json::Value myStatus; for (auto const& vs : jv[jss::validator_sites]) if (vs[jss::uri].asString().find(u.uri) != std::string::npos) myStatus = vs; BEAST_EXPECTS( myStatus[jss::last_refresh_message].asString().empty() != u.shouldFail, to_string(myStatus)); if (u.shouldFail) { BEAST_EXPECTS( sink.strm_.str().find(u.expectMsg) != std::string::npos, sink.strm_.str()); log << " -- Msg: " << myStatus[jss::last_refresh_message].asString() << std::endl; } } } public: void run() override { testConfigLoad (); // fetch single site testFetchList ({{"/validators",""}}); // fetch multiple sites testFetchList ({{"/validators",""}, {"/validators",""}}); // fetch single site with single redirects testFetchList ({{"/redirect_once/301",""}}); testFetchList ({{"/redirect_once/302",""}}); testFetchList ({{"/redirect_once/307",""}}); testFetchList ({{"/redirect_once/308",""}}); // one redirect, one not testFetchList ({{"/validators",""}, {"/redirect_once/302",""}}); // fetch single site with undending redirect (fails to load) testFetchList ({{"/redirect_forever/301", "Exceeded max redirects"}}); // two that redirect forever testFetchList ({ {"/redirect_forever/307","Exceeded max redirects"}, {"/redirect_forever/308","Exceeded max redirects"}}); // one undending redirect, one not testFetchList ( {{"/validators",""}, {"/redirect_forever/302","Exceeded max redirects"}}); // invalid redir Location testFetchList ({ {"/redirect_to/ftp://invalid-url/302", "Invalid redirect location"}}); // invalid json testFetchList ({{"/validators/bad", "Unable to parse JSON response"}}); // error status returned testFetchList ({{"/bad-resource", "returned bad status"}}); // location field missing testFetchList ({ {"/redirect_nolo/308", "returned a redirect with no Location"}}); // json fields missing testFetchList ({ {"/validators/missing", "Missing fields in JSON response"}}); } }; BEAST_DEFINE_TESTSUITE(ValidatorSite, app, ripple); } // test } // ripple