123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513 |
- #!/usr/bin/env python3
- #
- # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
- # Copyright (C)2013-2023 The MMGen Project <mmgen@tuta.io>
- #
- # This program is free software: you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation, either version 3 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program. If not, see <http://www.gnu.org/licenses/>.
- """
- test/tooltest.py: Tests for the 'mmgen-tool' utility
- """
- import sys,os,time
- from subprocess import run,PIPE
- try:
- from include.test_init import repo_root
- except ImportError:
- from test.include.test_init import repo_root
- from mmgen.cfg import Config
- from mmgen.color import red,yellow,green,blue,cyan
- from mmgen.util import msg,msg_r,Msg,die
- opts_data = {
- 'text': {
- 'desc': "Test suite for the 'mmgen-tool' utility",
- 'usage':'[options] [command]',
- 'options': """
- -h, --help Print this help message
- -C, --coverage Produce code coverage info using trace module
- -d, --debug Produce debugging output (stderr from spawned script)
- --, --longhelp Print help message for long options (common options)
- -l, --list-cmds List and describe the tests and commands in this test suite
- -s, --testing-status List the testing status of all 'mmgen-tool' commands
- -t, --type=t Specify address type (valid choices: 'zcash_z')
- -v, --verbose Produce more verbose output
- """,
- 'notes': """
- If no command is given, the whole suite of tests is run.
- """
- }
- }
- sys.argv = [sys.argv[0]] + ['--skip-cfg-file'] + sys.argv[1:]
- cfg = Config(opts_data=opts_data)
- from test.include.common import (
- set_globals,
- mk_tmpdir,
- cleandir,
- write_to_tmpfile,
- ok,
- read_from_file,
- read_from_tmpfile,
- cmp_or_die,
- getrand,
- getrandhex,
- end_msg,
- init_coverage,
- get_tmpfile,
- )
- set_globals(cfg)
- vmsg = cfg._util.vmsg
- proto = cfg._proto
- assert cfg.type in (None,'zcash_z'), 'Only zcash-z permitted for --type argument'
- cmd_data = {
- 'cryptocoin': {
- 'desc': 'Cryptocoin address/key commands',
- 'cmd_data': {
- 'randwif': (),
- 'randpair': (), # create 4 pairs: uncomp,comp,segwit,bech32
- 'wif2addr': ('randpair','o4'),
- 'wif2hex': ('randpair','o4'),
- 'privhex2pubhex': ('wif2hex','o3'), # segwit only
- 'pubhex2addr': ('privhex2pubhex','o3'), # segwit only
- 'hex2wif': ('wif2hex','io2'), # uncomp, comp
- 'addr2pubhash': ('randpair','o4'), # uncomp, comp, bech32
- 'pubhash2addr': ('addr2pubhash','io4'), # uncomp, comp, bech32
- },
- },
- 'mnemonic': {
- 'desc': 'mnemonic commands',
- 'cmd_data': {
- 'hex2mn': (),
- 'mn2hex': ('hex2mn','io3'),
- 'mn_rand128': (),
- 'mn_rand192': (),
- 'mn_rand256': (),
- 'mn_stats': (),
- 'mn_printlist': (),
- },
- },
- }
- if proto.coin in ('BTC','LTC'):
- cmd_data['cryptocoin']['cmd_data'].update({
- 'pubhex2redeem_script': ('privhex2pubhex','o3'),
- 'wif2redeem_script': ('randpair','o3'),
- 'wif2segwit_pair': ('randpair','o2'),
- 'privhex2addr': ('wif2hex','o4'), # compare with output of randpair
- 'pipetest': ('randpair','o3')
- })
- if proto.coin == 'XMR' or cfg.type == 'zcash_z':
- del cmd_data['cryptocoin']['cmd_data']['pubhash2addr']
- del cmd_data['cryptocoin']['cmd_data']['addr2pubhash']
- tcfg = {
- 'name': 'the tool utility',
- 'enc_passwd': 'Ten Satoshis',
- 'tmpdir': 'test/tmp/10',
- 'tmpdir_num': 10,
- 'refdir': 'test/ref',
- 'txfile': {
- 'btc': ('0B8D5A[15.31789,14,tl=1320969600].rawtx',
- '0C7115[15.86255,14,tl=1320969600].testnet.rawtx'),
- 'bch': ('460D4D-BCH[10.19764,tl=1320969600].rawtx',
- '359FD5-BCH[6.68868,tl=1320969600].testnet.rawtx'),
- 'ltc': ('AF3CDF-LTC[620.76194,1453,tl=1320969600].rawtx',
- 'A5A1E0-LTC[1454.64322,1453,tl=1320969600].testnet.rawtx'),
- },
- 'addrfile': '98831F3A{}[1,31-33,500-501,1010-1011]{}.addrs',
- 'addrfile_chk': {
- 'btc': ('6FEF 6FB9 7B13 5D91','424E 4326 CFFE 5F51'),
- 'bch': ('6FEF 6FB9 7B13 5D91','424E 4326 CFFE 5F51'),
- 'ltc': ('AD52 C3FE 8924 AAF0','4EBE 2E85 E969 1B30'),
- }
- }
- ref_subdir = '' if proto.base_coin == 'BTC' else proto.name.lower()
- altcoin_pfx = '' if proto.base_coin == 'BTC' else '-'+proto.base_coin
- tn_ext = ('','.testnet')[proto.testnet]
- spawn_cmd = [
- 'scripts/exec_wrapper.py',
- os.path.relpath(os.path.join(repo_root,'cmds','mmgen-tool')) ]
- if cfg.coverage:
- d,f = init_coverage()
- spawn_cmd = ['python3','-m','trace','--count','--coverdir='+d,'--file='+f] + spawn_cmd
- elif sys.platform == 'win32':
- spawn_cmd = ['python3'] + spawn_cmd
- add_spawn_args = ['--data-dir='+tcfg['tmpdir']] + ['--{}{}'.format(
- k.replace('_','-'),
- '='+getattr(cfg,k) if getattr(cfg,k) is not True else '')
- for k in ('testnet','rpc_host','regtest','coin','type') if getattr(cfg,k)]
- if cfg.list_cmds:
- fs = ' {:<{w}} - {}'
- Msg('Available commands:')
- w = max(map(len,cmd_data))
- for cmd in cmd_data:
- Msg(fs.format(cmd,cmd_data[cmd]['desc'],w=w))
- Msg('\nAvailable utilities:')
- Msg(fs.format('clean','Clean the tmp directory',w=w))
- sys.exit(0)
- if cfg.testing_status:
- tested_in = {
- 'tooltest.py': [],
- 'cmdtest.py': (
- 'encrypt','decrypt','find_incog_data',
- 'addrfile_chksum','keyaddrfile_chksum','passwdfile_chksum',
- 'add_label','remove_label','remove_address','twview',
- 'getbalance','listaddresses','listaddress',
- 'daemon_version','decrypt_geth_keystore',
- 'mn2hex_interactive','rand2file',
- 'rescan_address','rescan_blockchain','resolve_address',
- 'twexport','twimport','txhist'
- ),
- 'tooltest2.py': run(
- ['python3','test/tooltest2.py','--list-tested-cmds'],
- stdout = PIPE,
- check = True
- ).stdout.decode().split()
- }
- for v in cmd_data.values():
- tested_in['tooltest.py'] += list(v['cmd_data'].keys())
- Msg(green("Testing status of 'mmgen-tool' commands:"))
- for l in ('tooltest.py','tooltest2.py','cmdtest.py'):
- Msg('\n ' + blue(l+':'))
- Msg(' '+'\n '.join(sorted(tested_in[l])))
- ignore = ()
- from mmgen.main_tool import get_cmds
- uc = sorted(
- set(get_cmds()) -
- set(ignore) -
- set(tested_in['tooltest.py']) -
- set(tested_in['tooltest2.py']) -
- set(tested_in['cmdtest.py'])
- )
- if uc:
- Msg(yellow('\n {}\n {}'.format('Untested commands:','\n '.join(uc))))
- sys.exit(0)
- from mmgen.key import is_wif
- from mmgen.addr import is_coin_addr
- def is_wif_loc(s):
- return is_wif(proto,s)
- def is_coin_addr_loc(s):
- return is_coin_addr(proto,s)
- msg_w = 35
- def test_msg(m):
- msg_r(green(f'Testing {m}\n') if cfg.verbose else '{:{w}}'.format(f'Testing {m}', w=msg_w+8))
- compressed = cfg.type or ('','compressed')['C' in proto.mmtypes]
- segwit = ('','segwit')['S' in proto.mmtypes]
- bech32 = ('','bech32')['B' in proto.mmtypes]
- type_compressed_arg = ([],['--type=' + (cfg.type or 'compressed')])[bool(cfg.type) or 'C' in proto.mmtypes]
- type_segwit_arg = ([],['--type=segwit'])['S' in proto.mmtypes]
- type_bech32_arg = ([],['--type=bech32'])['B' in proto.mmtypes]
- class MMGenToolTestUtils:
- def run_cmd(self,name,tool_args,kwargs='',extra_msg='',silent=False,strip=True,add_opts=[],binary=False):
- sys_cmd = (
- spawn_cmd +
- add_spawn_args +
- ['-r0','-d',tcfg['tmpdir']] +
- add_opts +
- [name.lower()] +
- tool_args +
- kwargs.split()
- )
- if extra_msg:
- extra_msg = f'({extra_msg})'
- full_name = ' '.join([name.lower()]+add_opts+kwargs.split()+extra_msg.split())
- if not silent:
- if cfg.verbose:
- sys.stderr.write(green(f'Testing {full_name}\nExecuting '))
- sys.stderr.write(cyan(' '.join(sys_cmd)+'\n'))
- else:
- msg_r('Testing {:{w}}'.format( full_name+':', w=msg_w ))
- cp = run(sys_cmd,stdout=PIPE,stderr=PIPE)
- out = cp.stdout
- err = cp.stderr
- if cfg.debug:
- from test.include.common import dmsg
- try:
- dmsg(err.decode())
- except:
- dmsg(repr(err))
- if not binary:
- out = out.decode()
- if cp.returncode != 0:
- msg('{}\n{}\n{}'.format(
- red('FAILED'),
- yellow('Command stderr output:'),
- err.decode() ))
- die(2,f'Called process returned with an error (retcode {cp.returncode})')
- return (out,out.rstrip())[bool(strip)]
- def run_cmd_chk(self,name,f1,f2,kwargs='',extra_msg='',strip_hex=False,add_opts=[]):
- idata = read_from_file(f1).rstrip()
- odata = read_from_file(f2).rstrip()
- ret = self.run_cmd(name,[odata],kwargs=kwargs,extra_msg=extra_msg,add_opts=add_opts)
- vmsg('In: ' + repr(odata))
- vmsg('Out: ' + repr(ret))
- def cmp_equal(a,b):
- return (a.lstrip('0') == b.lstrip('0')) if strip_hex else (a == b)
- if cmp_equal(ret,idata):
- ok()
- else:
- die(4, f"Error: values don't match:\nIn: {idata!r}\nOut: {ret!r}")
- return ret
- def run_cmd_nochk(self,name,f1,kwargs='',add_opts=[]):
- odata = read_from_file(f1).rstrip()
- ret = self.run_cmd(name,[odata],kwargs=kwargs,add_opts=add_opts)
- vmsg('In: ' + repr(odata))
- vmsg('Out: ' + repr(ret))
- return ret
- def run_cmd_out(self,name,carg=None,Return=False,kwargs='',fn_idx='',extra_msg='',
- literal=False,chkdata='',hush=False,add_opts=[]):
- if carg:
- write_to_tmpfile(tcfg,f'{name}{fn_idx}.in',carg+'\n')
- ret = self.run_cmd(name,([],[carg])[bool(carg)],kwargs=kwargs,
- extra_msg=extra_msg,add_opts=add_opts)
- if carg:
- vmsg('In: ' + repr(carg))
- vmsg('Out: ' + (repr(ret),ret)[literal])
- if ret or ret == '':
- write_to_tmpfile(tcfg,f'{name}{fn_idx}.out',ret+'\n')
- if chkdata:
- cmp_or_die(ret,chkdata)
- return
- if Return:
- return ret
- elif not hush:
- ok()
- else:
- die(4,f'Error for command {name!r}')
- def run_cmd_randinput(self,name,strip=True,add_opts=[]):
- s = getrand(128)
- fn = name+'.in'
- write_to_tmpfile(tcfg,fn,s,binary=True)
- ret = self.run_cmd(name,[get_tmpfile(tcfg,fn)],strip=strip,add_opts=add_opts)
- fn = name+'.out'
- write_to_tmpfile(tcfg,fn,ret+'\n')
- ok()
- vmsg(f'Returned: {ret}')
- tu = MMGenToolTestUtils()
- def ok_or_die(val,chk_func,s,skip_ok=False):
- try:
- ret = chk_func(val)
- except:
- ret = False
- if ret:
- if not skip_ok:
- ok()
- else:
- die(4,f'Returned value {val!r} is not a {s}')
- class MMGenToolTestCmds:
- # Cryptocoin
- def randwif(self,name):
- for n,k in enumerate(['',compressed]):
- ao = ['--type='+k] if k else []
- ret = tu.run_cmd_out(name,add_opts=ao,Return=True,fn_idx=n+1)
- ok_or_die(ret,is_wif_loc,'WIF key')
- def randpair(self,name):
- for n,k in enumerate(['',compressed,segwit,bech32]):
- ao = ['--type='+k] if k else []
- wif,addr = tu.run_cmd_out(name,add_opts=ao,Return=True,fn_idx=n+1,literal=True).split()
- ok_or_die(wif,is_wif_loc,'WIF key',skip_ok=True)
- ok_or_die(addr,is_coin_addr_loc,'Coin address')
- def wif2addr(self,name,f1,f2,f3,f4):
- for n,f,k in (
- (1,f1,''),
- (2,f2,compressed),
- (3,f3,segwit),
- (4,f4,bech32)
- ):
- ao = ['--type='+k] if k else []
- wif = read_from_file(f).split()[0]
- tu.run_cmd_out(name,wif,add_opts=ao,fn_idx=n)
- def wif2hex(self,name,f1,f2,f3,f4):
- for n,f,m in (
- (1,f1,''),
- (2,f2,compressed),
- (3,f3,'{} for {}'.format( compressed or 'uncompressed', segwit or 'p2pkh' )),
- (4,f4,'{} for {}'.format( compressed or 'uncompressed', bech32 or 'p2pkh' ))
- ):
- wif = read_from_file(f).split()[0]
- tu.run_cmd_out(name,wif,fn_idx=n,extra_msg=m)
- def privhex2addr(self,name,f1,f2,f3,f4):
- keys = [read_from_file(f).rstrip() for f in (f1,f2,f3,f4)]
- for n,k in enumerate(('',compressed,segwit,bech32)):
- ao = ['--type='+k] if k else []
- ret = tu.run_cmd(name,[keys[n]],add_opts=ao).rstrip()
- iaddr = read_from_tmpfile(tcfg,f'randpair{n+1}.out').split()[-1]
- vmsg(f'Out: {ret}')
- cmp_or_die(iaddr,ret)
- ok()
- def hex2wif(self,name,f1,f2,f3,f4):
- for fi,fo,k in (
- (f1,f2,''),
- (f3,f4,compressed)):
- ao = ['--type='+k] if k else []
- tu.run_cmd_chk(name,fi,fo,add_opts=ao)
- def addr2pubhash(self,name,f1,f2,f3,f4):
- for n,f,m,ao in (
- (1,f1,'',[]),
- (2,f2,'from {}'.format( compressed or 'uncompressed' ),[]),
- (4,f4,'',type_bech32_arg),
- ):
- addr = read_from_file(f).split()[-1]
- tu.run_cmd_out(name,addr,fn_idx=n,add_opts=ao,extra_msg=m)
- def pubhash2addr(self,name,f1,f2,f3,f4,f5,f6,f7,f8):
- for _,fi,fo,m,ao in (
- (1,f1,f2,'',[]),
- (2,f3,f4,'from {}'.format( compressed or 'uncompressed' ),[]),
- (4,f7,f8,'',type_bech32_arg)
- ):
- tu.run_cmd_chk(name,fi,fo,add_opts=ao,extra_msg=m)
- def privhex2pubhex(self,name,f1,f2,f3): # from Hex2wif
- addr = read_from_file(f3).strip()
- tu.run_cmd_out(name,addr,add_opts=type_compressed_arg,fn_idx=3) # what about uncompressed?
- def pubhex2redeem_script(self,name,f1,f2,f3): # from above
- addr = read_from_file(f3).strip()
- tu.run_cmd_out(name,addr,add_opts=type_segwit_arg,fn_idx=3)
- rs = read_from_tmpfile(tcfg,'privhex2pubhex3.out').strip()
- tu.run_cmd_out('pubhex2addr',rs,add_opts=type_segwit_arg,fn_idx=3,hush=True)
- addr1 = read_from_tmpfile(tcfg,'pubhex2addr3.out').strip()
- addr2 = read_from_tmpfile(tcfg,'randpair3.out').split()[1]
- cmp_or_die(addr1,addr2)
- ok()
- def wif2redeem_script(self,name,f1,f2,f3): # compare output with above
- wif = read_from_file(f3).split()[0]
- ret1 = tu.run_cmd_out(name,wif,add_opts=type_segwit_arg,fn_idx=3,Return=True)
- ret2 = read_from_tmpfile(tcfg,'pubhex2redeem_script3.out').strip()
- cmp_or_die(ret1,ret2)
- ok()
- def wif2segwit_pair(self,name,f1,f2): # does its own checking, so just run
- wif = read_from_file(f2).split()[0]
- tu.run_cmd_out(name,wif,add_opts=type_segwit_arg,fn_idx=2)
- def pubhex2addr(self,name,f1,f2,f3):
- addr = read_from_file(f3).strip()
- tu.run_cmd_out(name,addr,add_opts=type_segwit_arg,fn_idx=3)
- def pipetest(self,name,f1,f2,f3):
- wif = read_from_file(f3).split()[0]
- cmd = ( '{c} {a} wif2hex {wif}' +
- ' | {c} {a} --type=compressed privhex2pubhex -' +
- ' | {c} {a} --type=segwit pubhex2redeem_script -' +
- ' | {c} {a} --type=segwit redeem_script2addr -').format(
- c=' '.join(spawn_cmd),
- a=' '.join(add_spawn_args),
- wif=wif)
- test_msg('command piping')
- if cfg.verbose:
- sys.stderr.write(green('Executing ') + cyan(cmd) + '\n')
- res = run(cmd,stdout=PIPE,shell=True).stdout.decode().strip()
- addr = read_from_tmpfile(tcfg,'wif2addr3.out').strip()
- cmp_or_die(addr,res)
- ok()
- # Mnemonic
- def hex2mn(self,name):
- for n,size,m in ((1,16,'128-bit'),(2,24,'192-bit'),(3,32,'256-bit')):
- hexnum = getrandhex(size)
- tu.run_cmd_out(name,hexnum,fn_idx=n,extra_msg=m)
- def mn2hex(self,name,f1,f2,f3,f4,f5,f6):
- for f_i,f_o,m in ((f1,f2,'128-bit'),(f3,f4,'192-bit'),(f5,f6,'256-bit')):
- tu.run_cmd_chk(name,f_i,f_o,extra_msg=m,strip_hex=True)
- def mn_rand128(self,name):
- tu.run_cmd_out(name)
- def mn_rand192(self,name):
- tu.run_cmd_out(name)
- def mn_rand256(self,name):
- tu.run_cmd_out(name)
- def mn_stats(self,name):
- tu.run_cmd_out(name)
- def mn_printlist(self,name):
- tu.run_cmd(name,[])
- ok()
- # main()
- start_time = int(time.time())
- mk_tmpdir(tcfg['tmpdir'])
- def gen_deps_for_cmd(cdata):
- fns = []
- if cdata:
- name,code = cdata
- io,count = (code[:-1],int(code[-1])) if code[-1] in '0123456789' else (code,1)
- for c in range(count):
- fns += ['{}{}{}'.format(
- name,
- (c+1 if count > 1 else ''),
- ('.in' if ch == 'i' else '.out'),
- ) for ch in io]
- return fns
- def do_cmds(cmd_group):
- tc = MMGenToolTestCmds()
- gdata = cmd_data[cmd_group]['cmd_data']
- for cmd in gdata:
- fns = gen_deps_for_cmd(gdata[cmd])
- cmdline = [cmd] + [os.path.join(tcfg['tmpdir'],fn) for fn in fns]
- getattr(tc,cmd)(*cmdline)
- try:
- if cfg._args:
- if len(cfg._args) != 1:
- die(1,'Only one command may be specified')
- cmd = cfg._args[0]
- if cmd in cmd_data:
- cleandir(tcfg['tmpdir'],do_msg=True)
- msg('Running tests for {}:'.format( cmd_data[cmd]['desc'] ))
- do_cmds(cmd)
- elif cmd == 'clean':
- cleandir(tcfg['tmpdir'],do_msg=True)
- sys.exit(0)
- else:
- die(1,f'{cmd!r}: unrecognized command')
- else:
- cleandir(tcfg['tmpdir'],do_msg=True)
- for cmd in cmd_data:
- msg('Running tests for {}:'.format( cmd_data[cmd]['desc'] ))
- do_cmds(cmd)
- if cmd is not list(cmd_data.keys())[-1]:
- msg('')
- except KeyboardInterrupt:
- die(1,green('\nExiting at user request'))
- end_msg(int(time.time()) - start_time)
|