|
| 1 | +use std::io::Write; |
| 2 | +use std::net::SocketAddr; |
| 3 | + |
| 4 | +use serde_json::Value; |
| 5 | +use tempfile::NamedTempFile; |
| 6 | + |
| 7 | +use crate::server::mock_rpc::MockProvingRpc; |
| 8 | +use crate::server::rpc_api::ProvingRpcServer; |
| 9 | +use crate::server::rpc_impl::SPEC_VERSION; |
| 10 | +use crate::server::tls::{load_tls_acceptor, start_tls_server}; |
| 11 | + |
| 12 | +/// Installs the default rustls crypto provider (aws-lc-rs) if not already installed. |
| 13 | +/// Required by reqwest when using rustls-based TLS. |
| 14 | +fn ensure_crypto_provider() { |
| 15 | + let _ = tokio_rustls::rustls::crypto::aws_lc_rs::default_provider().install_default(); |
| 16 | +} |
| 17 | + |
| 18 | +/// Generates a self-signed certificate and private key using rcgen. |
| 19 | +/// Returns (cert_pem, key_pem) as byte vectors. |
| 20 | +fn generate_self_signed_cert() -> (Vec<u8>, Vec<u8>) { |
| 21 | + let cert = rcgen::generate_simple_self_signed(vec!["localhost".to_string()]) |
| 22 | + .expect("Failed to generate self-signed certificate"); |
| 23 | + let cert_pem = cert.cert.pem().into_bytes(); |
| 24 | + let key_pem = cert.key_pair.serialize_pem().into_bytes(); |
| 25 | + (cert_pem, key_pem) |
| 26 | +} |
| 27 | + |
| 28 | +/// Writes PEM bytes to a temporary file and returns the handle. |
| 29 | +fn write_pem_to_tempfile(pem_bytes: &[u8]) -> NamedTempFile { |
| 30 | + let mut file = NamedTempFile::new().expect("Failed to create temp file"); |
| 31 | + file.write_all(pem_bytes).expect("Failed to write PEM"); |
| 32 | + file.flush().expect("Failed to flush PEM file"); |
| 33 | + file |
| 34 | +} |
| 35 | + |
| 36 | +/// Starts a TLS server with mock RPC methods, returns (addr, server_handle, cert_pem). |
| 37 | +async fn start_test_tls_server() -> (SocketAddr, jsonrpsee::server::ServerHandle, Vec<u8>) { |
| 38 | + let (cert_pem, key_pem) = generate_self_signed_cert(); |
| 39 | + let cert_file = write_pem_to_tempfile(&cert_pem); |
| 40 | + let key_file = write_pem_to_tempfile(&key_pem); |
| 41 | + |
| 42 | + let methods = MockProvingRpc::from_expected_json().into_rpc(); |
| 43 | + let addr: SocketAddr = "127.0.0.1:0".parse().unwrap(); |
| 44 | + |
| 45 | + let (local_addr, handle) = start_tls_server( |
| 46 | + addr, |
| 47 | + cert_file.path(), |
| 48 | + key_file.path(), |
| 49 | + methods, |
| 50 | + 10, // max_connections |
| 51 | + None, |
| 52 | + ) |
| 53 | + .await |
| 54 | + .expect("Failed to start TLS server"); |
| 55 | + |
| 56 | + (local_addr, handle, cert_pem) |
| 57 | +} |
| 58 | + |
| 59 | +#[tokio::test] |
| 60 | +async fn test_https_spec_version_succeeds() { |
| 61 | + ensure_crypto_provider(); |
| 62 | + let (addr, handle, cert_pem) = start_test_tls_server().await; |
| 63 | + |
| 64 | + let cert = reqwest::tls::Certificate::from_pem(&cert_pem) |
| 65 | + .expect("Failed to parse certificate for reqwest"); |
| 66 | + let client = reqwest::Client::builder() |
| 67 | + .add_root_certificate(cert) |
| 68 | + .build() |
| 69 | + .expect("Failed to build HTTPS client"); |
| 70 | + |
| 71 | + let body = serde_json::json!({ |
| 72 | + "jsonrpc": "2.0", |
| 73 | + "id": "1", |
| 74 | + "method": "starknet_specVersion" |
| 75 | + }); |
| 76 | + |
| 77 | + let response = client |
| 78 | + .post(format!("https://localhost:{}", addr.port())) |
| 79 | + .json(&body) |
| 80 | + .send() |
| 81 | + .await |
| 82 | + .expect("HTTPS request failed"); |
| 83 | + |
| 84 | + assert_eq!(response.status(), 200); |
| 85 | + |
| 86 | + let json: Value = response.json().await.expect("Failed to parse response JSON"); |
| 87 | + assert_eq!(json["result"].as_str().unwrap(), SPEC_VERSION); |
| 88 | + |
| 89 | + handle.stop().expect("Failed to stop server"); |
| 90 | +} |
| 91 | + |
| 92 | +#[tokio::test] |
| 93 | +async fn test_http_to_tls_server_fails() { |
| 94 | + ensure_crypto_provider(); |
| 95 | + let (addr, handle, _cert_pem) = start_test_tls_server().await; |
| 96 | + |
| 97 | + let client = reqwest::Client::new(); |
| 98 | + let body = serde_json::json!({ |
| 99 | + "jsonrpc": "2.0", |
| 100 | + "id": "1", |
| 101 | + "method": "starknet_specVersion" |
| 102 | + }); |
| 103 | + |
| 104 | + // Plain HTTP to a TLS server should fail (connection or protocol error). |
| 105 | + let result = client.post(format!("http://localhost:{}", addr.port())).json(&body).send().await; |
| 106 | + |
| 107 | + assert!(result.is_err(), "Expected HTTP to TLS server to fail, but got: {result:?}"); |
| 108 | + |
| 109 | + handle.stop().expect("Failed to stop server"); |
| 110 | +} |
| 111 | + |
| 112 | +#[test] |
| 113 | +fn test_load_tls_acceptor_missing_cert_file() { |
| 114 | + let key_file = write_pem_to_tempfile(b"dummy key content"); |
| 115 | + let result = load_tls_acceptor("/nonexistent/cert.pem".as_ref(), key_file.path()); |
| 116 | + assert!(result.is_err(), "Expected error for missing cert file"); |
| 117 | +} |
| 118 | + |
| 119 | +#[test] |
| 120 | +fn test_load_tls_acceptor_missing_key_file() { |
| 121 | + let cert_file = write_pem_to_tempfile(b"dummy cert content"); |
| 122 | + let result = load_tls_acceptor(cert_file.path(), "/nonexistent/key.pem".as_ref()); |
| 123 | + assert!(result.is_err(), "Expected error for missing key file"); |
| 124 | +} |
| 125 | + |
| 126 | +#[test] |
| 127 | +fn test_load_tls_acceptor_invalid_pem() { |
| 128 | + let cert_file = write_pem_to_tempfile(b"not a valid PEM certificate"); |
| 129 | + let key_file = write_pem_to_tempfile(b"not a valid PEM key"); |
| 130 | + let result = load_tls_acceptor(cert_file.path(), key_file.path()); |
| 131 | + assert!(result.is_err(), "Expected error for invalid PEM content"); |
| 132 | +} |
0 commit comments