Skip to content
This repository was archived by the owner on Mar 10, 2020. It is now read-only.

Commit 7cf7998

Browse files
authored
fix: remove external urls from addFromURL tests (#834)
Relying on external URLs makes our tests dependent on the availability and response time of these services as well as not being able to run without an internet connection. This PR removes those requests to external URLs and instead spins up test HTTP(s) servers as they are needed to serve the content that `ipfs.util.addFromURL` consumes. This PR also strengthens some of the tests to make assertions that the result received by `ipfs.util.addFromURL` is the same as the result of adding the data directly using `ipfs.add`. resolves #803 License: MIT Signed-off-by: Alan Shaw <alan@tableflip.io>
1 parent 553c3fb commit 7cf7998

File tree

3 files changed

+279
-50
lines changed

3 files changed

+279
-50
lines changed

test/fixtures/ssl/cert.pem

+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
-----BEGIN CERTIFICATE-----
2+
MIIDOzCCAiMCCQCVqVeRIp9pFDANBgkqhkiG9w0BAQUFADBnMQswCQYDVQQGEwJV
3+
UzENMAsGA1UECAwEVXRhaDEOMAwGA1UEBwwFUHJvdm8xIzAhBgNVBAoMGkFDTUUg
4+
U2lnbmluZyBBdXRob3JpdHkgSW5jMRQwEgYDVQQDDAtleGFtcGxlLmNvbTAeFw0x
5+
ODA4MTQyMDEzNTdaFw0xOTEyMjcyMDEzNTdaMFgxCzAJBgNVBAYTAlVTMQ0wCwYD
6+
VQQIDARVdGFoMQ4wDAYDVQQHDAVQcm92bzEWMBQGA1UECgwNQUNNRSBUZWNoIElu
7+
YzESMBAGA1UEAwwJMTI3LjAuMC4xMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
8+
CgKCAQEA6x6mTXV+rC35QW/sPutT1O1cugtnw+UsJx7EGgzyjh7EoXE3gb7sO96P
9+
tOI5zknb0vecckbiVkesmLnAs2iNa1u9EiRr6WHdc+1MfUCxyHRfP731vRZyo0kx
10+
bSXerE0qZ2N3M1XyndZF7VMthKDKIg0ZR0TvdjwLqyLYEHAnRBhJLRS0Oy0fC6Of
11+
VWCO3gIuk1HkTXH+/ZMA/obqrtlisxY85mMdlRz+1PNdZBMf+NxmrXN59uq+JqUu
12+
8/v1oQ8jH2iU9IWeqyawHDEvPW3aDorfaWGyats5Xd3cT2Ph4xF9tBLT+3PDGU8c
13+
oBmTHWDenYn+TCkCseayo1JCO5igJQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQCr
14+
R7eZxicHjJoRcbsPBDQpzx9uSux3uvpN93pyJrXXHiil/5SE7CYeDqv5+nV2p6HA
15+
6KONUAmpId0iHAEi9u+0/LgPWyYQMzT3sfBhkO8RRaMYI87VuKbk5PFmlZbD843+
16+
Qmg3Se2F7BDnTf88xA6QWR4DCejy+ZHfDRFrh3xfFl4tX1UNgqiTGfjPCzblhWx9
17+
ygzlT+flN2j3NkAlhUEV89pnH4EQWILePMTT4wh2XOQj1VFJ+2ATojHFVUTtNWAJ
18+
xrY/Q9cMYsZ++I8i9bHMZoyc1bSUd5CNFpQdfjVzlgMPT9Jj/fzWIQz+wq0KeRLI
19+
dLWsa2MZr0GZnTU39YwH
20+
-----END CERTIFICATE-----

test/fixtures/ssl/privkey.pem

+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
-----BEGIN RSA PRIVATE KEY-----
2+
MIIEogIBAAKCAQEA6x6mTXV+rC35QW/sPutT1O1cugtnw+UsJx7EGgzyjh7EoXE3
3+
gb7sO96PtOI5zknb0vecckbiVkesmLnAs2iNa1u9EiRr6WHdc+1MfUCxyHRfP731
4+
vRZyo0kxbSXerE0qZ2N3M1XyndZF7VMthKDKIg0ZR0TvdjwLqyLYEHAnRBhJLRS0
5+
Oy0fC6OfVWCO3gIuk1HkTXH+/ZMA/obqrtlisxY85mMdlRz+1PNdZBMf+NxmrXN5
6+
9uq+JqUu8/v1oQ8jH2iU9IWeqyawHDEvPW3aDorfaWGyats5Xd3cT2Ph4xF9tBLT
7+
+3PDGU8coBmTHWDenYn+TCkCseayo1JCO5igJQIDAQABAoIBAH5fbfFqOpie6T8T
8+
wj4bTGbA4bsZkD9JeU7ZiXubA/ABd5xyduwky2JugH0vrvRC3IVrE0qU8OiBA7Le
9+
/EUx5/kRSPFsZBf/wwChRiB4WlYsvllLZ76nRxyepZNN7H5dx3Hkk1gjVREi71jd
10+
ATUtGxfsRG77DV5WbcshIlLLhT9iaohsalmClAFBmwhqnRMvOXHiQyRbvB0fOX08
11+
uVlObOqo9jLB8N5C/ux+wFEP4wi/AxVqs9ih7Ss7T7+pmOCVWhOnbYcoY2jdaJ11
12+
iLK4F3rv/jQ82OwUpzrWsPedmZUzlOO8xdV3b8hOcPHs/BKvYed7aHSn6b5eVKKT
13+
zT8vQoECgYEA+K9pvw9K/7+F810MHG+nZ0gtVWmXJp49jB7zQ6QMIex2sUajY2y9
14+
bEJX8T6rdu3qd+HYU4zl3qt+MUnsVQEBNkLPAn3od0qIWXxu1SL2GF8SDV1xJWK1
15+
Fp0YDe9blaz1JsmSgieNcSoSwqE2V97Wfd/m+EUfyhQt9HX55H5UgAUCgYEA8gkW
16+
0xZKuHhBMYpcES2P5H5q6HN2fcEQycMuS3agAOhrFPYUT1DVNhbfNVmbOvL2NRWI
17+
hXixo5SkuEuq2fjmEoeLPTmeKO5LM4IVqovWCYomSftKDpzw4HRn2jvKzi2+mg8J
18+
qktIMqRqHu/O1NUIsszCIu4c5DzUdhr4N7GXOaECgYAEd1oF1Wd6al0kfsJN7G9s
19+
Om6d/xR43BSs5I1n5JVXMqD7FBKxIW3ReOuNaJu5uhIg7wxsi7ZBJoFQr0wwRqFX
20+
8SE4oTxAkDUcrlBrQYJ785Embkwu6LPp4Q5iia7yZDXO6YXZEo7GvoOxvSV1tInT
21+
nubOBKfKgExG/KttQBuSZQKBgAzYOqPdLP35M8yDQTuQJXDE3LuVVRZ7Zn6uowhS
22+
NU+XBgfIv28uJQKH2DSmmrxYJITQrbwXmaXKv6sgKOMEeIFHPDZ1llUpwEftgWTZ
23+
ovRCpqGKenWoEoh25QQJ5Eto1hKq9aJZ+GznmNIne9yDqcCDaVIdPN9H8yaJa97Y
24+
x+PBAoGAOiK6xAbPyJSKDSTGZzdv8+yeOdNeJjRHxKJs+4YsDchmdumrqow83DBP
25+
7ulIJD9pcmsWj+8fntMcsTX5mvzJd5LsKc7Maa5/LtitsLsynu78QFg4Njj8sAKn
26+
3991i8J98DZ9zqmkxJJhGwstCHG+c+Q7lA6kZ1UdbWJwYwIHjAs=
27+
-----END RSA PRIVATE KEY-----

test/util.spec.js

+232-50
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@ const isNode = require('detect-node')
1010
const path = require('path')
1111
const fs = require('fs')
1212
const os = require('os')
13+
const http = require('http')
14+
const https = require('https')
15+
const each = require('async/each')
16+
const waterfall = require('async/waterfall')
17+
const parallel = require('async/parallel')
1318

1419
const IPFSApi = require('../src')
1520
const f = require('./utils/factory')
@@ -32,7 +37,8 @@ describe('.util', () => {
3237
})
3338
})
3439

35-
after((done) => {
40+
after(function (done) {
41+
this.timeout(10 * 1000)
3642
if (!ipfsd) return done()
3743
ipfsd.stop(done)
3844
})
@@ -113,81 +119,257 @@ describe('.util', () => {
113119
})
114120

115121
describe('.urlAdd', () => {
116-
it('http', function (done) {
117-
this.timeout(40 * 1000)
118-
119-
ipfs.util.addFromURL('http://example.com/', (err, result) => {
120-
expect(err).to.not.exist()
121-
expect(result.length).to.equal(1)
122-
done()
122+
let testServers = []
123+
124+
const sslOpts = {
125+
key: fs.readFileSync(path.join(__dirname, 'fixtures', 'ssl', 'privkey.pem')),
126+
cert: fs.readFileSync(path.join(__dirname, 'fixtures', 'ssl', 'cert.pem'))
127+
}
128+
129+
const startTestServer = (handler, opts, cb) => {
130+
if (typeof opts === 'function') {
131+
cb = opts
132+
opts = {}
133+
}
134+
135+
const server = opts.secure
136+
? https.createServer(sslOpts, handler)
137+
: http.createServer(handler)
138+
139+
server.listen((err) => {
140+
if (err) return cb(err)
141+
testServers.push(server)
142+
cb(null, server)
123143
})
144+
}
145+
146+
beforeEach(() => {
147+
// Instructs node to not reject our snake oil SSL certificate when it
148+
// can't verify the certificate authority
149+
process.env.NODE_TLS_REJECT_UNAUTHORIZED = 0
124150
})
125151

126-
it('https', function (done) {
127-
this.timeout(40 * 1000)
152+
afterEach((done) => {
153+
// Reinstate unauthorised SSL cert rejection
154+
process.env.NODE_TLS_REJECT_UNAUTHORIZED = 1
128155

129-
ipfs.util.addFromURL('https://example.com/', (err, result) => {
130-
expect(err).to.not.exist()
131-
expect(result.length).to.equal(1)
132-
done()
156+
each(testServers, (server, cb) => server.close(cb), (err) => {
157+
testServers = []
158+
done(err)
133159
})
134160
})
135161

136-
it('http with redirection', function (done) {
137-
this.timeout(40 * 1000)
138-
139-
ipfs.util.addFromURL('http://covers.openlibrary.org/book/id/969165.jpg', (err, result) => {
162+
it('http', (done) => {
163+
const data = Buffer.from(`TEST${Date.now()}`)
164+
165+
parallel({
166+
server: (cb) => {
167+
const handler = (req, res) => {
168+
res.write(data)
169+
res.end()
170+
}
171+
startTestServer(handler, cb)
172+
},
173+
expectedResult: (cb) => ipfs.add(data, cb)
174+
}, (err, taskResult) => {
140175
expect(err).to.not.exist()
141-
expect(result[0].hash).to.equal('QmaL9zy7YUfvWmtD5ZXp42buP7P4xmZJWFkm78p8FJqgjg')
142-
done()
176+
const { server, expectedResult } = taskResult
177+
178+
const url = `http://127.0.0.1:${server.address().port}/`
179+
ipfs.util.addFromURL(url, (err, result) => {
180+
expect(err).to.not.exist()
181+
expect(result).to.deep.equal(expectedResult)
182+
done()
183+
})
143184
})
144185
})
145186

146-
it('https with redirection', function (done) {
147-
this.timeout(40 * 1000)
187+
it('https', (done) => {
188+
const data = Buffer.from(`TEST${Date.now()}`)
189+
190+
parallel({
191+
server: (cb) => {
192+
const handler = (req, res) => {
193+
res.write(data)
194+
res.end()
195+
}
196+
startTestServer(handler, { secure: true }, cb)
197+
},
198+
expectedResult: (cb) => ipfs.add(data, cb)
199+
}, (err, taskResult) => {
200+
expect(err).to.not.exist()
201+
const { server, expectedResult } = taskResult
148202

149-
ipfs.util.addFromURL('https://coverartarchive.org/release/6e2a1694-d8b9-466a-aa33-b1077b2333c1', (err, result) => {
203+
const url = `https://127.0.0.1:${server.address().port}/`
204+
ipfs.util.addFromURL(url, (err, result) => {
205+
expect(err).to.not.exist()
206+
expect(result).to.deep.equal(expectedResult)
207+
done()
208+
})
209+
})
210+
})
211+
212+
it('http with redirection', (done) => {
213+
const data = Buffer.from(`TEST${Date.now()}`)
214+
215+
waterfall([
216+
(cb) => {
217+
const handler = (req, res) => {
218+
res.write(data)
219+
res.end()
220+
}
221+
startTestServer(handler, cb)
222+
},
223+
(serverA, cb) => {
224+
const url = `http://127.0.0.1:${serverA.address().port}`
225+
const handler = (req, res) => {
226+
res.statusCode = 302
227+
res.setHeader('Location', url)
228+
res.end()
229+
}
230+
startTestServer(handler, (err, serverB) => {
231+
if (err) return cb(err)
232+
cb(null, { a: serverA, b: serverB })
233+
})
234+
}
235+
], (err, servers) => {
150236
expect(err).to.not.exist()
151-
expect(result[0].hash).to.equal('QmSUdDvmXuq5YGrL4M3SEz7UZh5eT9WMuAsd9K34sambSj')
152-
done()
237+
238+
ipfs.add(data, (err, res) => {
239+
expect(err).to.not.exist()
240+
241+
const expectedHash = res[0].hash
242+
const url = `http://127.0.0.1:${servers.b.address().port}`
243+
244+
ipfs.util.addFromURL(url, (err, result) => {
245+
expect(err).to.not.exist()
246+
expect(result[0].hash).to.equal(expectedHash)
247+
done()
248+
})
249+
})
153250
})
154251
})
155252

156-
it('with only-hash=true', function () {
157-
this.timeout(40 * 1000)
253+
it('https with redirection', (done) => {
254+
const data = Buffer.from(`TEST${Date.now()}`)
255+
256+
waterfall([
257+
(cb) => {
258+
const handler = (req, res) => {
259+
res.write(data)
260+
res.end()
261+
}
262+
startTestServer(handler, { secure: true }, cb)
263+
},
264+
(serverA, cb) => {
265+
const url = `https://127.0.0.1:${serverA.address().port}`
266+
const handler = (req, res) => {
267+
res.statusCode = 302
268+
res.setHeader('Location', url)
269+
res.end()
270+
}
271+
startTestServer(handler, { secure: true }, (err, serverB) => {
272+
if (err) return cb(err)
273+
cb(null, { a: serverA, b: serverB })
274+
})
275+
}
276+
], (err, servers) => {
277+
expect(err).to.not.exist()
278+
279+
ipfs.add(data, (err, res) => {
280+
expect(err).to.not.exist()
281+
282+
const expectedHash = res[0].hash
283+
const url = `https://127.0.0.1:${servers.b.address().port}`
158284

159-
return ipfs.util.addFromURL('http://www.randomtext.me/#/gibberish', { onlyHash: true })
160-
.then(out => expectTimeout(ipfs.object.get(out[0].hash), 4000))
285+
ipfs.util.addFromURL(url, (err, result) => {
286+
expect(err).to.not.exist()
287+
expect(result[0].hash).to.equal(expectedHash)
288+
done()
289+
})
290+
})
291+
})
161292
})
162293

163-
it('with wrap-with-directory=true', function (done) {
164-
this.timeout(40 * 1000)
294+
it('with only-hash=true', (done) => {
295+
const handler = (req, res) => {
296+
res.write(`TEST${Date.now()}`)
297+
res.end()
298+
}
165299

166-
ipfs.util.addFromURL('http://ipfs.io/ipfs/QmWjppACLcFLQ2qL38unKQvJBhXH3RUtcGLPk7zmrTwV61/969165.jpg?foo=bar#buzz', {
167-
wrapWithDirectory: true
168-
}, (err, result) => {
300+
startTestServer(handler, (err, server) => {
169301
expect(err).to.not.exist()
170-
expect(result[0].hash).to.equal('QmaL9zy7YUfvWmtD5ZXp42buP7P4xmZJWFkm78p8FJqgjg')
171-
expect(result[0].path).to.equal('969165.jpg')
172-
expect(result[1].hash).to.equal('QmWjppACLcFLQ2qL38unKQvJBhXH3RUtcGLPk7zmrTwV61')
173-
expect(result.length).to.equal(2)
174-
done()
302+
303+
const url = `http://127.0.0.1:${server.address().port}/`
304+
305+
ipfs.util.addFromURL(url, { onlyHash: true }, (err, res) => {
306+
expect(err).to.not.exist()
307+
308+
// A successful object.get for this size data took my laptop ~14ms
309+
let didTimeout = false
310+
const timeoutId = setTimeout(() => {
311+
didTimeout = true
312+
done()
313+
}, 500)
314+
315+
ipfs.object.get(res[0].hash, () => {
316+
clearTimeout(timeoutId)
317+
if (didTimeout) return
318+
expect(new Error('did not timeout')).to.not.exist()
319+
})
320+
})
175321
})
176322
})
177323

178-
it('with wrap-with-directory=true and URL-escaped file name', function (done) {
179-
this.timeout(40 * 1000)
324+
it('with wrap-with-directory=true', (done) => {
325+
const filename = `TEST${Date.now()}.txt`
326+
const data = Buffer.from(`TEST${Date.now()}`)
327+
328+
parallel({
329+
server: (cb) => startTestServer((req, res) => {
330+
res.write(data)
331+
res.end()
332+
}, cb),
333+
expectedResult: (cb) => {
334+
ipfs.add([{ path: filename, content: data }], { wrapWithDirectory: true }, cb)
335+
}
336+
}, (err, taskResult) => {
337+
expect(err).to.not.exist()
338+
339+
const { server, expectedResult } = taskResult
340+
const url = `http://127.0.0.1:${server.address().port}/${filename}?foo=bar#buzz`
341+
342+
ipfs.util.addFromURL(url, { wrapWithDirectory: true }, (err, result) => {
343+
expect(err).to.not.exist()
344+
expect(result).to.deep.equal(expectedResult)
345+
done()
346+
})
347+
})
348+
})
180349

181-
// Sample URL contains URL-escaped ( ) and local diacritics
182-
ipfs.util.addFromURL('https://upload.wikimedia.org/wikipedia/commons/thumb/c/cf/Doma%C5%BElice%2C_Jir%C3%A1skova_43_%289102%29.jpg/320px-Doma%C5%BElice%2C_Jir%C3%A1skova_43_%289102%29.jpg?foo=bar#buzz', {
183-
wrapWithDirectory: true
184-
}, (err, result) => {
350+
it('with wrap-with-directory=true and URL-escaped file name', (done) => {
351+
const filename = '320px-Domažlice,_Jiráskova_43_(9102).jpg'
352+
const data = Buffer.from(`TEST${Date.now()}`)
353+
354+
parallel({
355+
server: (cb) => startTestServer((req, res) => {
356+
res.write(data)
357+
res.end()
358+
}, cb),
359+
expectedResult: (cb) => {
360+
ipfs.add([{ path: filename, content: data }], { wrapWithDirectory: true }, cb)
361+
}
362+
}, (err, taskResult) => {
185363
expect(err).to.not.exist()
186-
expect(result[0].hash).to.equal('QmRJ9ExxSMV4BLF9ZJUb2mLngupm6BXZEek755VHGTJo2Y')
187-
expect(result[0].path).to.equal('320px-Domažlice,_Jiráskova_43_(9102).jpg')
188-
expect(result[1].hash).to.equal('QmbxsHFU3sCfr8wszDHuDLA76C2xCv9HT8L3aC1pBwgaHk')
189-
expect(result.length).to.equal(2)
190-
done()
364+
365+
const { server, expectedResult } = taskResult
366+
const url = `http://127.0.0.1:${server.address().port}/${encodeURIComponent(filename)}?foo=bar#buzz`
367+
368+
ipfs.util.addFromURL(url, { wrapWithDirectory: true }, (err, result) => {
369+
expect(err).to.not.exist()
370+
expect(result).to.deep.equal(expectedResult)
371+
done()
372+
})
191373
})
192374
})
193375

0 commit comments

Comments
 (0)