123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302 |
- #!/usr/bin/env python3
- #
- # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
- # Copyright (C)2013-2023 The MMGen Project <mmgen@tuta.io>
- #
- # This program is free software: you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation, either version 3 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program. If not, see <http://www.gnu.org/licenses/>.
- """
- test.cmdtest_py_d.ct_shared: Shared methods for the cmdtest.py test suite
- """
- from mmgen.util import get_extension
- from mmgen.wallet import get_wallet_cls
- from ..include.common import cfg,cmp_or_die,strip_ansi_escapes,joinpath
- from .common import ref_bw_file,ref_bw_hash_preset,ref_dir
- class CmdTestShared:
- 'shared methods for the cmdtest.py test suite'
- @property
- def segwit_mmtype(self):
- return ('segwit','bech32')[bool(cfg.bech32)] if self.segwit else None
- @property
- def segwit_arg(self):
- return ['--type=' + self.segwit_mmtype] if self.segwit_mmtype else []
- def txcreate_ui_common(
- self,
- t,
- caller = None,
- menu = [],
- inputs = '1',
- file_desc = 'Unsigned transaction',
- input_sels_prompt = 'to spend',
- bad_input_sels = False,
- interactive_fee = '',
- fee_desc = 'transaction fee',
- fee_info_pat = None,
- add_comment = '',
- view = 't',
- save = True,
- tweaks = [],
- used_chg_addr_resp = None,
- auto_chg_addr = None):
- txdo = (caller or self.test_name)[:4] == 'txdo'
- expect_pat = r'\[q\]uit menu, .*?:.'
- delete_pat = r'Enter account number .*:.'
- confirm_pat = r'Is this what you want.*:.'
- if used_chg_addr_resp is not None:
- t.expect('reuse harms your privacy.*:.*',used_chg_addr_resp,regex=True)
- if auto_chg_addr is not None:
- e1 = 'Choose a change address:.*Enter a number> '
- e2 = fr'Using .*{auto_chg_addr}.* as.*address'
- res = t.expect([e1,e2],regex=True)
- if res == 0:
- choice = [s.split(')')[0].lstrip() for s in t.p.match[0].split('\n') if auto_chg_addr in s][0]
- t.send(f'{choice}\n')
- t.expect(e2,regex=True)
- t.send('y')
- pat = expect_pat
- for choice in menu + ['q']:
- t.expect(pat,choice,regex=True)
- if self.proto.base_proto == 'Ethereum':
- pat = confirm_pat if pat == delete_pat else delete_pat if choice == 'D' else expect_pat
- if bad_input_sels:
- for r in ('x','3-1','9999'):
- t.expect(input_sels_prompt+': ',r+'\n')
- t.expect(input_sels_prompt+': ',inputs+'\n')
- have_est_fee = t.expect([f'{fee_desc}: ','OK? (Y/n): ']) == 1
- if have_est_fee and not interactive_fee:
- t.send('y')
- else:
- if have_est_fee:
- t.send('n')
- t.expect(f'{fee_desc}: ',interactive_fee+'\n')
- else:
- t.send(interactive_fee+'\n')
- if fee_info_pat:
- t.expect(fee_info_pat,regex=True)
- t.expect('OK? (Y/n): ','y')
- t.expect('(Y/n): ','\n') # chg amt OK prompt
- if 'confirm_non_mmgen' in tweaks:
- t.expect('Continue? (Y/n)','\n')
- t.do_comment(add_comment)
- t.view_tx(view)
- if not txdo:
- t.expect('(y/N): ',('n','y')[save])
- t.written_to_file(file_desc)
- return t
- def txsign_ui_common(
- self,
- t,
- caller = None,
- view = 't',
- add_comment = '',
- file_desc = 'Signed transaction',
- ni = False,
- save = True,
- do_passwd = False,
- has_label = False):
- txdo = (caller or self.test_name)[:4] == 'txdo'
- if do_passwd:
- t.passphrase('MMGen wallet',self.wpasswd)
- if not ni and not txdo:
- t.view_tx(view)
- t.do_comment(add_comment,has_label=has_label)
- t.expect('(Y/n): ',('n','y')[save])
- t.written_to_file(file_desc)
- return t
- def txsend_ui_common(
- self,
- t,
- caller = None,
- view = 'n',
- add_comment = '',
- file_desc = 'Sent transaction',
- confirm_send = True,
- bogus_send = True,
- quiet = False,
- has_label = False):
- txdo = (caller or self.test_name)[:4] == 'txdo'
- if not txdo:
- t.license() # MMGEN_NO_LICENSE is set, so does nothing
- t.view_tx(view)
- t.do_comment(add_comment,has_label=has_label)
- self._do_confirm_send(t,quiet=quiet,confirm_send=confirm_send)
- if bogus_send:
- txid = ''
- t.expect('BOGUS transaction NOT sent')
- else:
- txid = strip_ansi_escapes(t.expect_getend('Transaction sent: '))
- assert len(txid) == 64, f'{txid!r}: Incorrect txid length!'
- t.written_to_file(file_desc)
- return txid
- def txsign_end(self,t,tnum=None,has_label=False):
- t.expect('Signing transaction')
- t.do_comment(False,has_label=has_label)
- t.expect(r'Save signed transaction.*?\? \(Y/n\): ','y',regex=True)
- t.written_to_file('Signed transaction' + (' #' + tnum if tnum else ''))
- return t
- def txsign(
- self,
- wf,
- txfile,
- save = True,
- has_label = False,
- extra_opts = [],
- extra_desc = '',
- view = 'n',
- dfl_wallet = False):
- opts = extra_opts + ['-d',self.tmpdir,txfile] + ([wf] if wf else [])
- t = self.spawn('mmgen-txsign', opts, extra_desc)
- t.license()
- t.view_tx(view)
- wcls = get_wallet_cls( ext = 'mmdat' if dfl_wallet else get_extension(wf) )
- if wcls.enc and wcls.type != 'brain':
- t.passphrase(wcls.desc,self.wpasswd)
- if save:
- self.txsign_end(t,has_label=has_label)
- else:
- t.do_comment(False,has_label=has_label)
- t.expect('Save signed transaction? (Y/n): ','n')
- t.expect('not saved')
- t.req_exit_val = 1
- return t
- def ref_brain_chk(self,bw_file=ref_bw_file):
- wf = joinpath(ref_dir,bw_file)
- add_args = [f'-l{self.seed_len}', f'-p{ref_bw_hash_preset}']
- return self.walletchk(wf,add_args=add_args,sid=self.ref_bw_seed_id)
- def walletchk(
- self,
- wf,
- wcls = None,
- add_args = [],
- sid = None,
- extra_desc = '',
- dfl_wallet = False):
- hp = self.hash_preset if hasattr(self,'hash_preset') else '1'
- wcls = wcls or get_wallet_cls(ext=get_extension(wf))
- t = self.spawn('mmgen-walletchk',
- ([] if dfl_wallet else ['-i',wcls.fmt_codes[0]])
- + add_args + ['-p',hp]
- + ([wf] if wf else []),
- extra_desc=extra_desc)
- if wcls.type != 'incog_hidden':
- t.expect(f"Getting {wcls.desc} from file '")
- if wcls.enc and wcls.type != 'brain':
- t.passphrase(wcls.desc,self.wpasswd)
- t.expect(['Passphrase is OK', 'Passphrase.* are correct'],regex=True)
- chk = t.expect_getend(f'Valid {wcls.desc} for Seed ID ')[:8]
- if sid:
- cmp_or_die(chk,sid)
- return t
- def addrgen(
- self,
- wf,
- check_ref = False,
- ftype = 'addr',
- id_str = None,
- extra_args = [],
- mmtype = None,
- stdout = False,
- dfl_wallet = False):
- passgen = ftype[:4] == 'pass'
- if not mmtype and not passgen:
- mmtype = self.segwit_mmtype
- cmd_pfx = (ftype,'pass')[passgen]
- t = self.spawn(
- f'mmgen-{cmd_pfx}gen',
- ['-d',self.tmpdir] + extra_args +
- ([],['--type='+str(mmtype)])[bool(mmtype)] +
- ([],['--stdout'])[stdout] +
- ([],[wf])[bool(wf)] +
- ([],[id_str])[bool(id_str)] +
- [getattr(self,f'{cmd_pfx}_idx_list')],
- extra_desc=f'({mmtype})' if mmtype in ('segwit','bech32') else '')
- t.license()
- wcls = get_wallet_cls( ext = 'mmdat' if dfl_wallet else get_extension(wf) )
- t.passphrase(wcls.desc,self.wpasswd)
- t.expect('Passphrase is OK')
- desc = ('address','password')[passgen]
- chk = t.expect_getend(rf'Checksum for {desc} data .*?: ',regex=True)
- if passgen:
- t.expect('Encrypt password list? (y/N): ','N')
- t.read() if stdout else t.written_to_file(('Addresses','Password list')[passgen])
- if check_ref:
- chk_ref = (
- self.chk_data[self.test_name] if passgen else
- self.chk_data[self.test_name][self.fork][self.proto.testnet])
- cmp_or_die(chk,chk_ref,desc=f'{ftype}list data checksum')
- return t
- def keyaddrgen(self,wf,check_ref=False,mmtype=None):
- if not mmtype:
- mmtype = self.segwit_mmtype
- args = ['-d',self.tmpdir,self.usr_rand_arg,wf,self.addr_idx_list]
- t = self.spawn('mmgen-keygen',
- ([],['--type='+str(mmtype)])[bool(mmtype)] + args,
- extra_desc=f'({mmtype})' if mmtype in ('segwit','bech32') else '')
- t.license()
- wcls = get_wallet_cls(ext=get_extension(wf))
- t.passphrase(wcls.desc,self.wpasswd)
- chk = t.expect_getend(r'Checksum for key-address data .*?: ',regex=True)
- if check_ref:
- chk_ref = self.chk_data[self.test_name][self.fork][self.proto.testnet]
- cmp_or_die(chk,chk_ref,desc='key-address list data checksum')
- t.expect('Encrypt key list? (y/N): ','y')
- t.usr_rand(self.usr_rand_chars)
- t.hash_preset('new key-address list','1')
- t.passphrase_new('new key-address list',self.kapasswd)
- t.written_to_file('Encrypted secret keys')
- return t
- def _do_confirm_send(self,t,quiet=False,confirm_send=True,sure=True):
- if sure:
- t.expect('Are you sure you want to broadcast this')
- m = ('YES, I REALLY WANT TO DO THIS','YES')[quiet]
- t.expect(f'{m!r} to confirm: ',('',m)[confirm_send]+'\n')
|