ct_tool.py 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. #!/usr/bin/env python3
  2. #
  3. # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
  4. # Copyright (C)2013-2023 The MMGen Project <mmgen@tuta.io>
  5. #
  6. # Project source code repository: https://github.com/mmgen/mmgen-wallet
  7. # Licensed according to the terms of GPL Version 3. See LICENSE for details.
  8. """
  9. test.cmdtest_py_d.ct_tool: tool tests for the MMGen cmdtest.py test suite
  10. """
  11. import sys,os
  12. from mmgen.util import suf
  13. from mmgen.color import cyan
  14. from ..include.common import (
  15. cfg,
  16. vmsg,
  17. read_from_file,
  18. write_to_file,
  19. cmp_or_die,
  20. joinpath,
  21. getrand
  22. )
  23. from .common import hincog_fn,incog_id_fn,hincog_offset,tool_enc_passwd,ref_dir
  24. from .ct_base import CmdTestBase
  25. from .ct_main import CmdTestMain
  26. class CmdTestTool(CmdTestMain,CmdTestBase):
  27. "interactive 'mmgen-tool' commands"
  28. networks = ('btc',)
  29. segwit_opts_ok = False
  30. tmpdir_nums = [9]
  31. enc_infn = 'tool_encrypt.in'
  32. cmd_group = (
  33. ('tool_find_incog_data', (9,"'mmgen-tool find_incog_data'", [[[hincog_fn],1],[[incog_id_fn],1]])),
  34. ('tool_rand2file', (9,"'mmgen-tool rand2file'", [])),
  35. ('tool_encrypt', (9,"'mmgen-tool encrypt' (random data)", [])),
  36. ('tool_decrypt', (9,"'mmgen-tool decrypt' (random data)", [[[enc_infn+'.mmenc'],9]])),
  37. ('tool_twview_bad_comment',(9,"'mmgen-tool twview' (with bad comment)", [])),
  38. ('tool_extract_key_from_geth_wallet',(9,"'mmgen-tool extract_key_from_geth_wallet'", [])),
  39. ('tool_api', (9,'tool API (initialization, config methods, wif2addr)',[])),
  40. # ('tool_encrypt_ref', (9,"'mmgen-tool encrypt' (reference text)", [])),
  41. )
  42. def tool_rand2file(self):
  43. from mmgen.util2 import parse_bytespec
  44. for nbytes in ('1','1023','1K','1048575','1M','1048577','123M'):
  45. t = self.spawn(
  46. 'mmgen-tool',
  47. ['-d',self.tmpdir,'-r0','rand2file','rand2file.out',nbytes],
  48. extra_desc='({} byte{})'.format( nbytes, suf(parse_bytespec(nbytes)) )
  49. )
  50. t.expect('random data written to file')
  51. t.read()
  52. t.p.wait()
  53. t.ok()
  54. t.skip_ok = True
  55. return t
  56. def tool_encrypt(self):
  57. infile = joinpath(self.tmpdir,self.enc_infn)
  58. write_to_file(infile,getrand(1033),binary=True)
  59. t = self.spawn('mmgen-tool',['-d',self.tmpdir,self.usr_rand_arg,'encrypt',infile])
  60. t.usr_rand(self.usr_rand_chars)
  61. t.hash_preset('data','1')
  62. t.passphrase_new('data',tool_enc_passwd)
  63. t.written_to_file('Encrypted data')
  64. return t
  65. def tool_decrypt(self,f1):
  66. out_fn = 'tool_encrypt.out'
  67. t = self.spawn('mmgen-tool',['-d',self.tmpdir,'decrypt',f1,'outfile='+out_fn,'hash_preset=1'])
  68. t.passphrase('data',tool_enc_passwd)
  69. t.written_to_file('Decrypted data')
  70. d1 = self.read_from_tmpfile(self.enc_infn,binary=True)
  71. d2 = self.read_from_tmpfile(out_fn,binary=True)
  72. cmp_or_die(d1,d2)
  73. return t
  74. def tool_find_incog_data(self,f1,f2):
  75. i_id = read_from_file(f2).rstrip()
  76. vmsg(f'Incog ID: {cyan(i_id)}')
  77. t = self.spawn('mmgen-tool',['-d',self.tmpdir,'find_incog_data',f1,i_id])
  78. o = t.expect_getend(f'Incog data for ID {i_id} found at offset ')
  79. if not sys.platform == 'win32':
  80. os.unlink(f1) # causes problems with MSYS2
  81. cmp_or_die(hincog_offset,int(o))
  82. return t
  83. def tool_twview_bad_comment(self): # test correct operation of get_tw_label()
  84. t = self.spawn(
  85. 'mmgen-tool',
  86. ['twview'],
  87. env = { 'MMGEN_BOGUS_UNSPENT_DATA': joinpath(ref_dir,'bad-comment-unspent.json') })
  88. t.expect('cannot be converted to TwComment')
  89. t.req_exit_val = 2
  90. return t
  91. def tool_extract_key_from_geth_wallet(self):
  92. if cfg.no_altcoin:
  93. return 'skip'
  94. fn = 'test/ref/ethereum/geth-wallet.json'
  95. key = '9627ddb68354f5e0ff45fb2da49d7a20a013b7257a83ef4adbbbd87aeaccc75e'
  96. t = self.spawn('mmgen-tool',['-d',self.tmpdir,'extract_key_from_geth_wallet',fn])
  97. t.expect('Enter passphrase: ','\n')
  98. t.expect(key)
  99. return t
  100. def tool_api(self):
  101. t = self.spawn(
  102. 'tool_api_test.py',
  103. (['no_altcoin'] if cfg.no_altcoin else []),
  104. cmd_dir = 'test/misc' )
  105. t.expect('legacy.*compressed.*segwit.*bech32',regex=True)
  106. return t