123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298 |
- #!/usr/bin/env python3
- #
- # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
- # Copyright (C)2013-2020 The MMGen Project <mmgen@tuta.io>
- #
- # This program is free software: you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation, either version 3 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program. If not, see <http://www.gnu.org/licenses/>.
- """
- ts_misc.py: Miscellaneous test groups for the test.py test suite
- """
- from mmgen.globalvars import g
- from test.common import *
- from test.test_py_d.common import *
- from test.test_py_d.ts_base import *
- from test.test_py_d.ts_main import TestSuiteMain
- from mmgen.seed import SeedSource
- class TestSuiteHelp(TestSuiteBase):
- 'help, info and usage screens'
- networks = ('btc','ltc','bch','eth')
- tmpdir_nums = []
- passthru_opts = ('daemon_data_dir','rpc_port','coin','testnet')
- cmd_group = (
- ('helpscreens', (1,'help screens', [])),
- ('longhelpscreens', (1,'help screens (--longhelp)',[])),
- ('opt_show_hash_presets', (1,'info screen (--show-hash-presets)',[])),
- ('tool_help', (1,"'mmgen-tool' usage screen",[])),
- ('test_help', (1,"'test.py' help screens",[])),
- )
- def helpscreens(self,
- arg = '--help',
- scripts = ( 'walletgen','walletconv','walletchk','passchg','subwalletgen',
- 'addrgen','keygen','passgen',
- 'seedsplit','seedjoin',
- 'txcreate','txsign','txsend','txdo','txbump',
- 'addrimport','tool','regtest','autosign')):
- for s in scripts:
- t = self._run_cmd('mmgen-'+s,[arg],extra_desc='(mmgen-{})'.format(s),no_output=True)
- return t
- def longhelpscreens(self):
- return self.helpscreens(arg='--longhelp')
- def opt_show_hash_presets(self):
- return self.helpscreens(
- arg = '--show-hash-presets',
- scripts = (
- 'walletgen','walletconv','walletchk','passchg','subwalletgen',
- 'addrgen','keygen','passgen',
- 'txsign','txdo','txbump'))
- def _run_cmd( self, cmd_name,
- cmd_args = [],
- no_msg = False,
- extra_desc = '',
- cmd_dir = 'cmds',
- no_output = False):
- t = self.spawn( cmd_name,
- args = cmd_args,
- no_msg = no_msg,
- extra_desc = extra_desc,
- cmd_dir = cmd_dir,
- no_output = no_output)
- t.read()
- ret = t.p.wait()
- if ret == 0:
- msg('OK')
- else:
- rdie(1,"\n'{}' returned {}".format(self.test_name,ret))
- t.skip_ok = True
- return t
- def tool_help(self):
- self._run_cmd('mmgen-tool',['help'],extra_desc="('mmgen-tool help')")
- return self._run_cmd('mmgen-tool',['usage'],extra_desc="('mmgen-tool usage')")
- def test_help(self):
- self._run_cmd('test.py',['-h'],cmd_dir='test')
- self._run_cmd('test.py',['-L'],cmd_dir='test',extra_desc='(cmd group list)')
- return self._run_cmd('test.py',['-l'],cmd_dir='test',extra_desc='(cmd list)')
- class TestSuiteOutput(TestSuiteBase):
- 'screen output tests'
- networks = ('btc',)
- tmpdir_nums = []
- cmd_group = (
- ('output_gr', (1,"Greek text", [])),
- ('output_ru', (1,"Russian text", [])),
- ('output_zh', (1,"Chinese text", [])),
- ('output_jp', (1,"Japanese text", []))
- )
- def screen_output(self,lang):
- t = self.spawn('test/misc/utf8_output.py',[lang],cmd_dir='.')
- t.read()
- return t
- def output_gr(self): return self.screen_output('gr')
- def output_ru(self): return self.screen_output('ru')
- def output_zh(self): return self.screen_output('zh')
- def output_jp(self): return self.screen_output('jp')
- class TestSuiteInput(TestSuiteBase):
- 'user input tests'
- networks = ('btc',)
- tmpdir_nums = []
- cmd_group = (
- ('password_entry_noecho', (1,"utf8 password entry", [])),
- ('password_entry_echo', (1,"utf8 password entry (echoed)", [])),
- ('mnemonic_entry_mmgen', (1,"stealth mnemonic entry (MMGen native)", [])),
- ('mnemonic_entry_bip39', (1,"stealth mnemonic entry (BIP39)", [])),
- ('dieroll_entry', (1,"dieroll entry (base6d)", [])),
- ('dieroll_entry_usrrand', (1,"dieroll entry (base6d) with added user entropy", [])),
- )
- def password_entry(self,prompt,cmd_args):
- t = self.spawn('test/misc/password_entry.py',cmd_args,cmd_dir='.')
- pw = 'abc-α'
- t.expect(prompt,pw)
- ret = t.expect_getend('Entered: ')
- assert ret == pw,'Password mismatch! {} != {}'.format(ret,pw)
- return t
- def password_entry_noecho(self):
- if self.skip_for_win():
- msg('Perform this test by hand on MSWin with non-ASCII password abc-α:')
- msg(' test/misc/password_entry.py')
- return 'skip' # getpass() can't handle utf8, and pexpect double-escapes utf8, so skip
- return self.password_entry('Enter passphrase: ',[])
- def password_entry_echo(self):
- if self.skip_for_win():
- msg('Perform this test by hand on MSWin with non-ASCII password abc-α:')
- msg(' test/misc/password_entry.py --echo-passphrase')
- return 'skip' # pexpect double-escapes utf8, so skip
- return self.password_entry('Enter passphrase (echoed): ',['--echo-passphrase'])
- def _user_seed_entry(self,fmt,usr_rand=False,out_fmt=None):
- wcls = SeedSource.fmt_code_to_type(fmt)
- wf = os.path.join(ref_dir,'FE3C6545.{}'.format(wcls.ext))
- if wcls.wclass == 'mnemonic':
- mn = read_from_file(wf).strip().split()
- mn = ['foo'] + mn[:5] + ['grac','graceful'] + mn[5:]
- elif wcls.wclass == 'dieroll':
- mn = list(read_from_file(wf).strip().translate(dict((ord(ws),None) for ws in '\t\n ')))
- for idx,val in ((5,'x'),(18,'0'),(30,'7'),(44,'9')):
- mn.insert(idx,val)
- t = self.spawn('mmgen-walletconv',['-r10','-S','-i',fmt,'-o',out_fmt or fmt])
- t.expect('{} type: {}'.format(capfirst(wcls.wclass),wcls.mn_type))
- t.expect(wcls.choose_seedlen_prompt,'1')
- t.expect('(Y/n): ','y')
- if wcls.wclass == 'mnemonic':
- stealth_mnemonic_entry(t,mn,fmt=fmt)
- elif wcls.wclass == 'dieroll':
- user_dieroll_entry(t,mn)
- if usr_rand:
- t.expect(wcls.user_entropy_prompt,'y')
- t.usr_rand(10)
- else:
- t.expect(wcls.user_entropy_prompt,'n')
- if not usr_rand:
- sid_chk = 'FE3C6545'
- sid = t.expect_getend('Valid {} for Seed ID '.format(wcls.desc))[:8]
- assert sid == sid_chk,'Seed ID mismatch! {} != {}'.format(sid,sid_chk)
- t.expect('to confirm: ','YES\n')
- t.read()
- return t
- def mnemonic_entry_mmgen(self): return self._user_seed_entry('words')
- def mnemonic_entry_bip39(self): return self._user_seed_entry('bip39')
- def dieroll_entry(self): return self._user_seed_entry('dieroll')
- def dieroll_entry_usrrand(self):return self._user_seed_entry('dieroll',usr_rand=True,out_fmt='bip39')
- class TestSuiteTool(TestSuiteMain,TestSuiteBase):
- "tests for interactive 'mmgen-tool' commands"
- networks = ('btc',)
- segwit_opts_ok = False
- tmpdir_nums = [9]
- enc_infn = 'tool_encrypt.in'
- cmd_group = (
- ('tool_find_incog_data', (9,"'mmgen-tool find_incog_data'", [[[hincog_fn],1],[[incog_id_fn],1]])),
- ('tool_rand2file', (9,"'mmgen-tool rand2file'", [])),
- ('tool_encrypt', (9,"'mmgen-tool encrypt' (random data)", [])),
- ('tool_decrypt', (9,"'mmgen-tool decrypt' (random data)", [[[enc_infn+'.mmenc'],9]])),
- ('tool_twview_bad_comment',(9,"'mmgen-tool twview' (with bad comment)", [])),
- # ('tool_encrypt_ref', (9,"'mmgen-tool encrypt' (reference text)", [])),
- )
- def tool_rand2file(self):
- outfile = os.path.join(self.tmpdir,'rand2file.out')
- from mmgen.tool import MMGenToolCmd
- tu = MMGenToolCmd()
- for nbytes in ('1','1023','1K','1048575','1M','1048577','123M'):
- t = self.spawn( 'mmgen-tool',
- ['-d',self.tmpdir,'-r0','rand2file','rand2file.out',nbytes],
- extra_desc='({} byte{})'.format(nbytes,suf(tu.bytespec(nbytes)))
- )
- t.expect('random data written to file')
- t.read()
- t.p.wait()
- t.ok()
- t.skip_ok = True
- return t
- def tool_encrypt(self):
- infile = joinpath(self.tmpdir,self.enc_infn)
- write_to_file(infile,os.urandom(1033),binary=True)
- t = self.spawn('mmgen-tool',['-d',self.tmpdir,self.usr_rand_arg,'encrypt',infile])
- t.usr_rand(self.usr_rand_chars)
- t.hash_preset('user data','1')
- t.passphrase_new('user data',tool_enc_passwd)
- t.written_to_file('Encrypted data')
- return t
- def tool_decrypt(self,f1):
- out_fn = 'tool_encrypt.out'
- t = self.spawn('mmgen-tool',['-d',self.tmpdir,'decrypt',f1,'outfile='+out_fn,'hash_preset=1'])
- t.passphrase('user data',tool_enc_passwd)
- t.written_to_file('Decrypted data')
- d1 = self.read_from_tmpfile(self.enc_infn,binary=True)
- d2 = self.read_from_tmpfile(out_fn,binary=True)
- cmp_or_die(d1,d2)
- return t
- def tool_find_incog_data(self,f1,f2):
- i_id = read_from_file(f2).rstrip()
- vmsg('Incog ID: {}'.format(cyan(i_id)))
- t = self.spawn('mmgen-tool',['-d',self.tmpdir,'find_incog_data',f1,i_id])
- o = t.expect_getend('Incog data for ID {} found at offset '.format(i_id))
- if not g.platform == 'win':
- os.unlink(f1) # causes problems with MSYS2
- cmp_or_die(hincog_offset,int(o))
- return t
- def tool_twview_bad_comment(self): # test correct operation of get_tw_label()
- bw_save = os.getenv('MMGEN_BOGUS_WALLET_DATA')
- os.environ['MMGEN_BOGUS_WALLET_DATA'] = joinpath(ref_dir,'bad-comment-unspent.json')
- t = self.spawn('mmgen-tool',['twview'])
- if bw_save:
- os.environ['MMGEN_BOGUS_WALLET_DATA'] = bw_save
- t.read()
- t.req_exit_val = 2
- return t
- class TestSuiteRefTX(TestSuiteMain,TestSuiteBase):
- 'create a reference transaction file (administrative command)'
- segwit_opts_ok = False
- passthru_opts = ('daemon_data_dir','rpc_port','coin','testnet')
- tmpdir_nums = [31,32,33,34]
- cmd_group = (
- ('ref_tx_addrgen1', (31,'address generation (legacy)', [[[],1]])),
- ('ref_tx_addrgen2', (32,'address generation (compressed)', [[[],1]])),
- ('ref_tx_addrgen3', (33,'address generation (segwit)', [[[],1]])),
- ('ref_tx_addrgen4', (34,'address generation (bech32)', [[[],1]])),
- ('ref_tx_txcreate', (31,'transaction creation',
- ([['addrs'],31],[['addrs'],32],[['addrs'],33],[['addrs'],34]))),
- )
- def __init__(self,trunner,cfgs,spawn):
- if cfgs:
- for n in self.tmpdir_nums:
- cfgs[str(n)].update({ 'addr_idx_list': '1-2',
- 'segwit': n in (33,34),
- 'dep_generators': { 'addrs':'ref_tx_addrgen'+str(n)[-1] }})
- return TestSuiteMain.__init__(self,trunner,cfgs,spawn)
- def ref_tx_addrgen(self,atype):
- if atype not in g.proto.mmtypes: return
- t = self.spawn('mmgen-addrgen',['--outdir='+self.tmpdir,'--type='+atype,dfl_words_file,'1-2'])
- t.read()
- return t
- def ref_tx_addrgen1(self): return self.ref_tx_addrgen(atype='L')
- def ref_tx_addrgen2(self): return self.ref_tx_addrgen(atype='C')
- def ref_tx_addrgen3(self): return self.ref_tx_addrgen(atype='S')
- def ref_tx_addrgen4(self): return self.ref_tx_addrgen(atype='B')
- def ref_tx_txcreate(self,f1,f2,f3,f4):
- sources = ['31','32']
- if 'S' in g.proto.mmtypes: sources += ['33']
- if 'B' in g.proto.mmtypes: sources += ['34']
- return self.txcreate_common(
- addrs_per_wallet = 2,
- sources = sources,
- add_args = ['--locktime=1320969600'],
- do_label = True )
|