2017-06-02 20:30:36 +02:00
|
|
|
#!/usr/bin/env python3
|
2020-04-16 19:14:08 +02:00
|
|
|
# Copyright (c) 2017-2020 The Bitcoin Core developers
|
2017-06-02 20:30:36 +02:00
|
|
|
# Distributed under the MIT software license, see the accompanying
|
|
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
"""Class for bitcoind node under test"""
|
|
|
|
|
2018-08-22 01:23:21 +02:00
|
|
|
import contextlib
|
2017-07-11 19:01:44 +02:00
|
|
|
import decimal
|
2017-06-02 20:30:36 +02:00
|
|
|
import errno
|
2018-03-28 15:37:09 +02:00
|
|
|
from enum import Enum
|
2017-06-02 20:30:36 +02:00
|
|
|
import http.client
|
2017-07-11 19:01:44 +02:00
|
|
|
import json
|
2017-06-02 20:30:36 +02:00
|
|
|
import logging
|
2018-02-07 15:57:27 +01:00
|
|
|
import os
|
2017-12-21 00:38:40 +01:00
|
|
|
import re
|
2017-06-02 20:30:36 +02:00
|
|
|
import subprocess
|
2018-02-07 15:36:13 +01:00
|
|
|
import tempfile
|
2017-06-02 20:30:36 +02:00
|
|
|
import time
|
2018-08-02 14:27:37 +02:00
|
|
|
import urllib.parse
|
2018-09-15 11:32:12 +02:00
|
|
|
import collections
|
2018-10-19 18:28:47 +02:00
|
|
|
import shlex
|
|
|
|
import sys
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2017-03-27 15:42:17 +02:00
|
|
|
from .authproxy import JSONRPCException
|
2020-04-03 00:09:15 +02:00
|
|
|
from .descriptors import descsum_create
|
2017-06-02 20:30:36 +02:00
|
|
|
from .util import (
|
2019-04-18 23:45:42 +02:00
|
|
|
MAX_NODES,
|
2018-03-06 22:48:15 +01:00
|
|
|
append_config,
|
2018-04-09 20:07:47 +02:00
|
|
|
delete_cookie_file,
|
2020-04-18 17:03:13 +02:00
|
|
|
get_auth_cookie,
|
2017-06-02 20:30:36 +02:00
|
|
|
get_rpc_proxy,
|
|
|
|
rpc_url,
|
2017-08-16 17:52:24 +02:00
|
|
|
wait_until,
|
2017-03-27 15:42:17 +02:00
|
|
|
p2p_port,
|
2019-12-09 21:02:50 +01:00
|
|
|
EncodeDecimal,
|
2017-06-02 20:30:36 +02:00
|
|
|
)
|
|
|
|
|
2017-08-16 17:52:24 +02:00
|
|
|
BITCOIND_PROC_WAIT_TIMEOUT = 60
|
|
|
|
|
2018-03-28 08:44:30 +02:00
|
|
|
|
|
|
|
class FailedToStartError(Exception):
|
|
|
|
"""Raised when a node fails to start correctly."""
|
|
|
|
|
|
|
|
|
2018-03-28 15:37:09 +02:00
|
|
|
class ErrorMatch(Enum):
|
|
|
|
FULL_TEXT = 1
|
|
|
|
FULL_REGEX = 2
|
|
|
|
PARTIAL_REGEX = 3
|
|
|
|
|
|
|
|
|
2017-06-02 20:30:36 +02:00
|
|
|
class TestNode():
|
|
|
|
"""A class for representing a bitcoind node under test.
|
|
|
|
|
|
|
|
This class contains:
|
|
|
|
|
|
|
|
- state about the node (whether it's running, etc)
|
|
|
|
- a Python subprocess.Popen object representing the running process
|
|
|
|
- an RPC connection to the node
|
2017-03-27 15:42:17 +02:00
|
|
|
- one or more P2P connections to the node
|
|
|
|
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2017-03-27 15:42:17 +02:00
|
|
|
To make things easier for the test writer, any unrecognised messages will
|
|
|
|
be dispatched to the RPC connection."""
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2020-05-18 06:15:55 +02:00
|
|
|
def __init__(self, i, datadir, *, chain, rpchost, timewait, timeout_factor, bitcoind, bitcoin_cli, coverage_dir, cwd, extra_conf=None, extra_args=None, use_cli=False, start_perf=False, use_valgrind=False, version=None, descriptors=False):
|
2018-10-19 18:28:47 +02:00
|
|
|
"""
|
|
|
|
Kwargs:
|
|
|
|
start_perf (bool): If True, begin profiling the node with `perf` as soon as
|
|
|
|
the node starts.
|
|
|
|
"""
|
|
|
|
|
2017-06-02 20:30:36 +02:00
|
|
|
self.index = i
|
2018-01-02 14:57:27 +01:00
|
|
|
self.datadir = datadir
|
2019-06-21 06:15:26 +02:00
|
|
|
self.bitcoinconf = os.path.join(self.datadir, "bitcoin.conf")
|
2018-02-07 15:57:27 +01:00
|
|
|
self.stdout_dir = os.path.join(self.datadir, "stdout")
|
|
|
|
self.stderr_dir = os.path.join(self.datadir, "stderr")
|
2019-07-31 20:11:32 +02:00
|
|
|
self.chain = chain
|
2017-06-02 20:30:36 +02:00
|
|
|
self.rpchost = rpchost
|
2018-08-01 20:37:47 +02:00
|
|
|
self.rpc_timeout = timewait
|
2018-04-19 14:38:59 +02:00
|
|
|
self.binary = bitcoind
|
2017-06-02 20:30:36 +02:00
|
|
|
self.coverage_dir = coverage_dir
|
2019-02-15 12:54:29 +01:00
|
|
|
self.cwd = cwd
|
2019-07-16 21:33:35 +02:00
|
|
|
self.descriptors = descriptors
|
2018-12-10 21:11:37 +01:00
|
|
|
if extra_conf is not None:
|
2018-01-02 14:57:27 +01:00
|
|
|
append_config(datadir, extra_conf)
|
2018-02-15 20:01:43 +01:00
|
|
|
# Most callers will just need to add extra args to the standard list below.
|
2018-03-18 15:26:45 +01:00
|
|
|
# For those callers that need more flexibility, they can just set the args property directly.
|
2018-02-15 20:01:43 +01:00
|
|
|
# Note that common args are set in the config file (see initialize_datadir)
|
2017-06-02 20:30:36 +02:00
|
|
|
self.extra_args = extra_args
|
2019-01-05 20:20:42 +01:00
|
|
|
self.version = version
|
2019-05-03 18:47:27 +02:00
|
|
|
# Configuration for logging is set as command-line args rather than in the bitcoin.conf file.
|
|
|
|
# This means that starting a bitcoind using the temp dir to debug a failed test won't
|
|
|
|
# spam debug.log.
|
2018-03-27 06:35:35 +02:00
|
|
|
self.args = [
|
|
|
|
self.binary,
|
|
|
|
"-datadir=" + self.datadir,
|
|
|
|
"-logtimemicros",
|
|
|
|
"-debug",
|
|
|
|
"-debugexclude=libevent",
|
|
|
|
"-debugexclude=leveldb",
|
2019-02-11 17:18:36 +01:00
|
|
|
"-uacomment=testnode%d" % i,
|
2018-03-27 06:35:35 +02:00
|
|
|
]
|
2019-11-29 16:11:18 +01:00
|
|
|
if use_valgrind:
|
|
|
|
default_suppressions_file = os.path.join(
|
|
|
|
os.path.dirname(os.path.realpath(__file__)),
|
|
|
|
"..", "..", "..", "contrib", "valgrind.supp")
|
|
|
|
suppressions_file = os.getenv("VALGRIND_SUPPRESSIONS_FILE",
|
|
|
|
default_suppressions_file)
|
|
|
|
self.args = ["valgrind", "--suppressions={}".format(suppressions_file),
|
|
|
|
"--gen-suppressions=all", "--exit-on-first-error=yes",
|
|
|
|
"--error-exitcode=1", "--quiet"] + self.args
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2020-05-05 02:06:38 +02:00
|
|
|
if self.version_is_at_least(190000):
|
2019-01-05 20:20:42 +01:00
|
|
|
self.args.append("-logthreadnames")
|
|
|
|
|
2018-04-19 14:38:59 +02:00
|
|
|
self.cli = TestNodeCLI(bitcoin_cli, self.datadir)
|
2017-07-11 19:14:18 +02:00
|
|
|
self.use_cli = use_cli
|
2018-10-19 18:28:47 +02:00
|
|
|
self.start_perf = start_perf
|
2017-07-11 19:01:44 +02:00
|
|
|
|
2017-06-02 20:30:36 +02:00
|
|
|
self.running = False
|
|
|
|
self.process = None
|
|
|
|
self.rpc_connected = False
|
|
|
|
self.rpc = None
|
|
|
|
self.url = None
|
|
|
|
self.log = logging.getLogger('TestFramework.node%d' % i)
|
2018-04-06 16:53:35 +02:00
|
|
|
self.cleanup_on_exit = True # Whether to kill the node when this object goes away
|
2018-10-19 18:28:47 +02:00
|
|
|
# Cache perf subprocesses here by their data output filename.
|
|
|
|
self.perf_subprocesses = {}
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2017-03-27 15:42:17 +02:00
|
|
|
self.p2ps = []
|
2020-05-18 06:15:55 +02:00
|
|
|
self.timeout_factor = timeout_factor
|
2017-03-27 15:42:17 +02:00
|
|
|
|
2019-05-17 19:07:07 +02:00
|
|
|
AddressKeyPair = collections.namedtuple('AddressKeyPair', ['address', 'key'])
|
|
|
|
PRIV_KEYS = [
|
2018-09-11 15:23:05 +02:00
|
|
|
# address , privkey
|
2018-09-15 11:32:12 +02:00
|
|
|
AddressKeyPair('mjTkW3DjgyZck4KbiRusZsqTgaYTxdSz6z', 'cVpF924EspNh8KjYsfhgY96mmxvT6DgdWiTYMtMjuM74hJaU5psW'),
|
|
|
|
AddressKeyPair('msX6jQXvxiNhx3Q62PKeLPrhrqZQdSimTg', 'cUxsWyKyZ9MAQTaAhUQWJmBbSvHMwSmuv59KgxQV7oZQU3PXN3KE'),
|
|
|
|
AddressKeyPair('mnonCMyH9TmAsSj3M59DsbH8H63U3RKoFP', 'cTrh7dkEAeJd6b3MRX9bZK8eRmNqVCMH3LSUkE3dSFDyzjU38QxK'),
|
|
|
|
AddressKeyPair('mqJupas8Dt2uestQDvV2NH3RU8uZh2dqQR', 'cVuKKa7gbehEQvVq717hYcbE9Dqmq7KEBKqWgWrYBa2CKKrhtRim'),
|
|
|
|
AddressKeyPair('msYac7Rvd5ywm6pEmkjyxhbCDKqWsVeYws', 'cQDCBuKcjanpXDpCqacNSjYfxeQj8G6CAtH1Dsk3cXyqLNC4RPuh'),
|
|
|
|
AddressKeyPair('n2rnuUnwLgXqf9kk2kjvVm8R5BZK1yxQBi', 'cQakmfPSLSqKHyMFGwAqKHgWUiofJCagVGhiB4KCainaeCSxeyYq'),
|
|
|
|
AddressKeyPair('myzuPxRwsf3vvGzEuzPfK9Nf2RfwauwYe6', 'cQMpDLJwA8DBe9NcQbdoSb1BhmFxVjWD5gRyrLZCtpuF9Zi3a9RK'),
|
|
|
|
AddressKeyPair('mumwTaMtbxEPUswmLBBN3vM9oGRtGBrys8', 'cSXmRKXVcoouhNNVpcNKFfxsTsToY5pvB9DVsFksF1ENunTzRKsy'),
|
|
|
|
AddressKeyPair('mpV7aGShMkJCZgbW7F6iZgrvuPHjZjH9qg', 'cSoXt6tm3pqy43UMabY6eUTmR3eSUYFtB2iNQDGgb3VUnRsQys2k'),
|
2019-04-18 23:45:42 +02:00
|
|
|
AddressKeyPair('mq4fBNdckGtvY2mijd9am7DRsbRB4KjUkf', 'cN55daf1HotwBAgAKWVgDcoppmUNDtQSfb7XLutTLeAgVc3u8hik'),
|
|
|
|
AddressKeyPair('mpFAHDjX7KregM3rVotdXzQmkbwtbQEnZ6', 'cT7qK7g1wkYEMvKowd2ZrX1E5f6JQ7TM246UfqbCiyF7kZhorpX3'),
|
|
|
|
AddressKeyPair('mzRe8QZMfGi58KyWCse2exxEFry2sfF2Y7', 'cPiRWE8KMjTRxH1MWkPerhfoHFn5iHPWVK5aPqjW8NxmdwenFinJ'),
|
2019-05-17 19:07:07 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
def get_deterministic_priv_key(self):
|
|
|
|
"""Return a deterministic priv key in base58, that only depends on the node's index"""
|
|
|
|
assert len(self.PRIV_KEYS) == MAX_NODES
|
|
|
|
return self.PRIV_KEYS[self.index]
|
2018-09-10 22:58:15 +02:00
|
|
|
|
2018-04-18 21:17:22 +02:00
|
|
|
def _node_msg(self, msg: str) -> str:
|
|
|
|
"""Return a modified msg that identifies this node by its index as a debugging aid."""
|
|
|
|
return "[node %d] %s" % (self.index, msg)
|
|
|
|
|
|
|
|
def _raise_assertion_error(self, msg: str):
|
|
|
|
"""Raise an AssertionError with msg modified to identify this node."""
|
|
|
|
raise AssertionError(self._node_msg(msg))
|
|
|
|
|
2018-04-06 16:53:35 +02:00
|
|
|
def __del__(self):
|
|
|
|
# Ensure that we don't leave any bitcoind processes lying around after
|
|
|
|
# the test ends
|
|
|
|
if self.process and self.cleanup_on_exit:
|
|
|
|
# Should only happen on test failure
|
|
|
|
# Avoid using logger, as that may have already been shutdown when
|
|
|
|
# this destructor is called.
|
2018-04-18 21:17:22 +02:00
|
|
|
print(self._node_msg("Cleaning up leftover process"))
|
2018-04-06 16:53:35 +02:00
|
|
|
self.process.kill()
|
|
|
|
|
2017-10-20 15:27:55 +02:00
|
|
|
def __getattr__(self, name):
|
2017-07-11 19:14:18 +02:00
|
|
|
"""Dispatches any unrecognised messages to the RPC connection or a CLI instance."""
|
|
|
|
if self.use_cli:
|
2019-07-16 21:33:35 +02:00
|
|
|
return getattr(RPCOverloadWrapper(self.cli, True, self.descriptors), name)
|
2017-07-11 19:14:18 +02:00
|
|
|
else:
|
2018-04-18 21:17:22 +02:00
|
|
|
assert self.rpc_connected and self.rpc is not None, self._node_msg("Error: no RPC connection")
|
2019-07-16 21:33:35 +02:00
|
|
|
return getattr(RPCOverloadWrapper(self.rpc, descriptors=self.descriptors), name)
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2019-02-15 12:54:29 +01:00
|
|
|
def start(self, extra_args=None, *, cwd=None, stdout=None, stderr=None, **kwargs):
|
2017-06-02 20:30:36 +02:00
|
|
|
"""Start the node."""
|
2017-06-09 22:35:17 +02:00
|
|
|
if extra_args is None:
|
|
|
|
extra_args = self.extra_args
|
2018-02-07 15:57:27 +01:00
|
|
|
|
|
|
|
# Add a new stdout and stderr file each time bitcoind is started
|
2017-06-09 22:35:17 +02:00
|
|
|
if stderr is None:
|
2018-02-07 15:57:27 +01:00
|
|
|
stderr = tempfile.NamedTemporaryFile(dir=self.stderr_dir, delete=False)
|
|
|
|
if stdout is None:
|
|
|
|
stdout = tempfile.NamedTemporaryFile(dir=self.stdout_dir, delete=False)
|
|
|
|
self.stderr = stderr
|
|
|
|
self.stdout = stdout
|
|
|
|
|
2019-02-15 12:54:29 +01:00
|
|
|
if cwd is None:
|
|
|
|
cwd = self.cwd
|
|
|
|
|
2018-04-09 20:07:47 +02:00
|
|
|
# Delete any existing cookie file -- if such a file exists (eg due to
|
|
|
|
# unclean shutdown), it will get overwritten anyway by bitcoind, and
|
|
|
|
# potentially interfere with our attempt to authenticate
|
2019-07-31 20:11:32 +02:00
|
|
|
delete_cookie_file(self.datadir, self.chain)
|
2018-02-07 16:00:13 +01:00
|
|
|
|
|
|
|
# add environment variable LIBC_FATAL_STDERR_=1 so that libc errors are written to stderr and not the terminal
|
|
|
|
subp_env = dict(os.environ, LIBC_FATAL_STDERR_="1")
|
|
|
|
|
2019-02-15 12:54:29 +01:00
|
|
|
self.process = subprocess.Popen(self.args + extra_args, env=subp_env, stdout=stdout, stderr=stderr, cwd=cwd, **kwargs)
|
2018-02-07 16:00:13 +01:00
|
|
|
|
2017-06-02 20:30:36 +02:00
|
|
|
self.running = True
|
|
|
|
self.log.debug("bitcoind started, waiting for RPC to come up")
|
|
|
|
|
2018-10-19 18:28:47 +02:00
|
|
|
if self.start_perf:
|
|
|
|
self._start_perf()
|
|
|
|
|
2017-06-02 20:30:36 +02:00
|
|
|
def wait_for_rpc_connection(self):
|
|
|
|
"""Sets up an RPC connection to the bitcoind process. Returns False if unable to connect."""
|
2017-08-16 21:46:48 +02:00
|
|
|
# Poll at a rate of four times per second
|
|
|
|
poll_per_s = 4
|
|
|
|
for _ in range(poll_per_s * self.rpc_timeout):
|
2018-03-28 08:44:30 +02:00
|
|
|
if self.process.poll() is not None:
|
2018-04-18 21:17:22 +02:00
|
|
|
raise FailedToStartError(self._node_msg(
|
|
|
|
'bitcoind exited with status {} during initialization'.format(self.process.returncode)))
|
2017-06-02 20:30:36 +02:00
|
|
|
try:
|
2020-05-20 01:12:45 +02:00
|
|
|
rpc = get_rpc_proxy(
|
|
|
|
rpc_url(self.datadir, self.index, self.chain, self.rpchost),
|
|
|
|
self.index,
|
|
|
|
timeout=self.rpc_timeout // 2, # Shorter timeout to allow for one retry in case of ETIMEDOUT
|
|
|
|
coveragedir=self.coverage_dir,
|
|
|
|
)
|
2019-02-06 01:03:09 +01:00
|
|
|
rpc.getblockcount()
|
2017-06-02 20:30:36 +02:00
|
|
|
# If the call to getblockcount() succeeds then the RPC connection is up
|
2020-05-05 02:06:38 +02:00
|
|
|
if self.version_is_at_least(190000):
|
|
|
|
# getmempoolinfo.loaded is available since commit
|
|
|
|
# bb8ae2c (version 0.19.0)
|
|
|
|
wait_until(lambda: rpc.getmempoolinfo()['loaded'])
|
|
|
|
# Wait for the node to finish reindex, block import, and
|
|
|
|
# loading the mempool. Usually importing happens fast or
|
|
|
|
# even "immediate" when the node is started. However, there
|
|
|
|
# is no guarantee and sometimes ThreadImport might finish
|
|
|
|
# later. This is going to cause intermittent test failures,
|
|
|
|
# because generally the tests assume the node is fully
|
|
|
|
# ready after being started.
|
|
|
|
#
|
|
|
|
# For example, the node will reject block messages from p2p
|
|
|
|
# when it is still importing with the error "Unexpected
|
|
|
|
# block message received"
|
|
|
|
#
|
|
|
|
# The wait is done here to make tests as robust as possible
|
|
|
|
# and prevent racy tests and intermittent failures as much
|
|
|
|
# as possible. Some tests might not need this, but the
|
2020-05-18 06:15:55 +02:00
|
|
|
# overhead is trivial, and the added guarantees are worth
|
2020-05-05 02:06:38 +02:00
|
|
|
# the minimal performance cost.
|
2019-02-06 01:03:09 +01:00
|
|
|
self.log.debug("RPC successfully started")
|
|
|
|
if self.use_cli:
|
|
|
|
return
|
|
|
|
self.rpc = rpc
|
2017-06-02 20:30:36 +02:00
|
|
|
self.rpc_connected = True
|
|
|
|
self.url = self.rpc.url
|
|
|
|
return
|
|
|
|
except JSONRPCException as e: # Initialization phase
|
2018-10-06 07:42:11 +02:00
|
|
|
# -28 RPC in warmup
|
|
|
|
# -342 Service unavailable, RPC server started but is shutting down due to error
|
|
|
|
if e.error['code'] != -28 and e.error['code'] != -342:
|
2017-06-02 20:30:36 +02:00
|
|
|
raise # unknown JSON RPC exception
|
2020-04-08 15:45:31 +02:00
|
|
|
except ConnectionResetError:
|
|
|
|
# This might happen when the RPC server is in warmup, but shut down before the call to getblockcount
|
|
|
|
# succeeds. Try again to properly raise the FailedToStartError
|
|
|
|
pass
|
2020-04-14 16:19:13 +02:00
|
|
|
except OSError as e:
|
2020-05-20 01:12:45 +02:00
|
|
|
if e.errno == errno.ETIMEDOUT:
|
|
|
|
pass # Treat identical to ConnectionResetError
|
|
|
|
elif e.errno == errno.ECONNREFUSED:
|
|
|
|
pass # Port not yet open?
|
|
|
|
else:
|
2020-04-14 16:19:13 +02:00
|
|
|
raise # unknown OS error
|
2020-04-18 17:03:13 +02:00
|
|
|
except ValueError as e: # cookie file not found and no rpcuser or rpcpassword; bitcoind is still starting
|
2017-06-02 20:30:36 +02:00
|
|
|
if "No RPC credentials" not in str(e):
|
|
|
|
raise
|
2017-08-18 22:09:58 +02:00
|
|
|
time.sleep(1.0 / poll_per_s)
|
2020-04-17 23:03:25 +02:00
|
|
|
self._raise_assertion_error("Unable to connect to bitcoind after {}s".format(self.rpc_timeout))
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2020-04-18 17:03:13 +02:00
|
|
|
def wait_for_cookie_credentials(self):
|
|
|
|
"""Ensures auth cookie credentials can be read, e.g. for testing CLI with -rpcwait before RPC connection is up."""
|
|
|
|
self.log.debug("Waiting for cookie credentials")
|
|
|
|
# Poll at a rate of four times per second.
|
|
|
|
poll_per_s = 4
|
|
|
|
for _ in range(poll_per_s * self.rpc_timeout):
|
|
|
|
try:
|
|
|
|
get_auth_cookie(self.datadir, self.chain)
|
|
|
|
self.log.debug("Cookie credentials successfully retrieved")
|
|
|
|
return
|
|
|
|
except ValueError: # cookie file not found and no rpcuser or rpcpassword; bitcoind is still starting
|
|
|
|
pass # so we continue polling until RPC credentials are retrieved
|
|
|
|
time.sleep(1.0 / poll_per_s)
|
|
|
|
self._raise_assertion_error("Unable to retrieve cookie credentials after {}s".format(self.rpc_timeout))
|
|
|
|
|
2018-10-05 09:51:10 +02:00
|
|
|
def generate(self, nblocks, maxtries=1000000):
|
|
|
|
self.log.debug("TestNode.generate() dispatches `generate` call to `generatetoaddress`")
|
|
|
|
return self.generatetoaddress(nblocks=nblocks, address=self.get_deterministic_priv_key().address, maxtries=maxtries)
|
|
|
|
|
2017-06-02 20:30:36 +02:00
|
|
|
def get_wallet_rpc(self, wallet_name):
|
2017-07-11 19:14:18 +02:00
|
|
|
if self.use_cli:
|
2019-07-16 21:33:35 +02:00
|
|
|
return RPCOverloadWrapper(self.cli("-rpcwallet={}".format(wallet_name)), True, self.descriptors)
|
2017-07-11 19:14:18 +02:00
|
|
|
else:
|
2018-04-18 21:17:22 +02:00
|
|
|
assert self.rpc_connected and self.rpc, self._node_msg("RPC not connected")
|
2018-08-02 14:27:37 +02:00
|
|
|
wallet_path = "wallet/{}".format(urllib.parse.quote(wallet_name))
|
2019-07-16 21:33:35 +02:00
|
|
|
return RPCOverloadWrapper(self.rpc / wallet_path, descriptors=self.descriptors)
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2020-05-05 02:06:38 +02:00
|
|
|
def version_is_at_least(self, ver):
|
|
|
|
return self.version is None or self.version >= ver
|
|
|
|
|
2018-11-20 18:59:07 +01:00
|
|
|
def stop_node(self, expected_stderr='', wait=0):
|
2017-06-02 20:30:36 +02:00
|
|
|
"""Stop the node."""
|
|
|
|
if not self.running:
|
|
|
|
return
|
|
|
|
self.log.debug("Stopping node")
|
|
|
|
try:
|
2019-01-05 20:20:42 +01:00
|
|
|
# Do not use wait argument when testing older nodes, e.g. in feature_backwards_compatibility.py
|
2020-05-05 02:06:38 +02:00
|
|
|
if self.version_is_at_least(180000):
|
2019-01-05 20:20:42 +01:00
|
|
|
self.stop(wait=wait)
|
|
|
|
else:
|
|
|
|
self.stop()
|
2017-06-02 20:30:36 +02:00
|
|
|
except http.client.CannotSendRequest:
|
|
|
|
self.log.exception("Unable to stop node.")
|
2018-02-07 16:51:13 +01:00
|
|
|
|
2018-10-19 18:28:47 +02:00
|
|
|
# If there are any running perf processes, stop them.
|
|
|
|
for profile_name in tuple(self.perf_subprocesses.keys()):
|
|
|
|
self._stop_perf(profile_name)
|
|
|
|
|
2018-02-07 16:51:13 +01:00
|
|
|
# Check that stderr is as expected
|
|
|
|
self.stderr.seek(0)
|
|
|
|
stderr = self.stderr.read().decode('utf-8').strip()
|
|
|
|
if stderr != expected_stderr:
|
|
|
|
raise AssertionError("Unexpected stderr {} != {}".format(stderr, expected_stderr))
|
|
|
|
|
2018-08-03 19:43:59 +02:00
|
|
|
self.stdout.close()
|
|
|
|
self.stderr.close()
|
|
|
|
|
2017-03-27 15:42:17 +02:00
|
|
|
del self.p2ps[:]
|
2017-06-02 20:30:36 +02:00
|
|
|
|
|
|
|
def is_node_stopped(self):
|
|
|
|
"""Checks whether the node has stopped.
|
|
|
|
|
|
|
|
Returns True if the node has stopped. False otherwise.
|
|
|
|
This method is responsible for freeing resources (self.process)."""
|
|
|
|
if not self.running:
|
|
|
|
return True
|
|
|
|
return_code = self.process.poll()
|
2017-08-16 17:52:24 +02:00
|
|
|
if return_code is None:
|
|
|
|
return False
|
|
|
|
|
|
|
|
# process has stopped. Assert that it didn't return an error code.
|
2018-04-18 21:17:22 +02:00
|
|
|
assert return_code == 0, self._node_msg(
|
|
|
|
"Node returned non-zero exit code (%d) when stopping" % return_code)
|
2017-08-16 17:52:24 +02:00
|
|
|
self.running = False
|
|
|
|
self.process = None
|
|
|
|
self.rpc_connected = False
|
|
|
|
self.rpc = None
|
|
|
|
self.log.debug("Node stopped")
|
|
|
|
return True
|
|
|
|
|
|
|
|
def wait_until_stopped(self, timeout=BITCOIND_PROC_WAIT_TIMEOUT):
|
2020-05-18 06:15:55 +02:00
|
|
|
wait_until(self.is_node_stopped, timeout=timeout, timeout_factor=self.timeout_factor)
|
2017-06-02 20:30:36 +02:00
|
|
|
|
2018-08-22 01:23:21 +02:00
|
|
|
@contextlib.contextmanager
|
2020-01-20 16:32:42 +01:00
|
|
|
def assert_debug_log(self, expected_msgs, unexpected_msgs=None, timeout=2):
|
|
|
|
if unexpected_msgs is None:
|
|
|
|
unexpected_msgs = []
|
2020-05-18 06:15:55 +02:00
|
|
|
time_end = time.time() + timeout * self.timeout_factor
|
2019-07-31 20:11:32 +02:00
|
|
|
debug_log = os.path.join(self.datadir, self.chain, 'debug.log')
|
2018-08-22 01:23:21 +02:00
|
|
|
with open(debug_log, encoding='utf-8') as dl:
|
|
|
|
dl.seek(0, 2)
|
|
|
|
prev_size = dl.tell()
|
2019-09-04 19:17:22 +02:00
|
|
|
|
|
|
|
yield
|
|
|
|
|
|
|
|
while True:
|
|
|
|
found = True
|
|
|
|
with open(debug_log, encoding='utf-8') as dl:
|
|
|
|
dl.seek(prev_size)
|
|
|
|
log = dl.read()
|
|
|
|
print_log = " - " + "\n - ".join(log.splitlines())
|
2020-01-20 16:32:42 +01:00
|
|
|
for unexpected_msg in unexpected_msgs:
|
|
|
|
if re.search(re.escape(unexpected_msg), log, flags=re.MULTILINE):
|
|
|
|
self._raise_assertion_error('Unexpected message "{}" partially matches log:\n\n{}\n\n'.format(unexpected_msg, print_log))
|
2019-09-04 19:17:22 +02:00
|
|
|
for expected_msg in expected_msgs:
|
|
|
|
if re.search(re.escape(expected_msg), log, flags=re.MULTILINE) is None:
|
|
|
|
found = False
|
|
|
|
if found:
|
|
|
|
return
|
|
|
|
if time.time() >= time_end:
|
|
|
|
break
|
|
|
|
time.sleep(0.05)
|
|
|
|
self._raise_assertion_error('Expected messages "{}" does not partially match log:\n\n{}\n\n'.format(str(expected_msgs), print_log))
|
2018-08-22 01:23:21 +02:00
|
|
|
|
2018-10-19 18:28:47 +02:00
|
|
|
@contextlib.contextmanager
|
|
|
|
def profile_with_perf(self, profile_name):
|
|
|
|
"""
|
|
|
|
Context manager that allows easy profiling of node activity using `perf`.
|
|
|
|
|
|
|
|
See `test/functional/README.md` for details on perf usage.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
profile_name (str): This string will be appended to the
|
|
|
|
profile data filename generated by perf.
|
|
|
|
"""
|
|
|
|
subp = self._start_perf(profile_name)
|
|
|
|
|
|
|
|
yield
|
|
|
|
|
|
|
|
if subp:
|
|
|
|
self._stop_perf(profile_name)
|
|
|
|
|
|
|
|
def _start_perf(self, profile_name=None):
|
|
|
|
"""Start a perf process to profile this node.
|
|
|
|
|
|
|
|
Returns the subprocess running perf."""
|
|
|
|
subp = None
|
|
|
|
|
|
|
|
def test_success(cmd):
|
|
|
|
return subprocess.call(
|
|
|
|
# shell=True required for pipe use below
|
|
|
|
cmd, shell=True,
|
|
|
|
stderr=subprocess.DEVNULL, stdout=subprocess.DEVNULL) == 0
|
|
|
|
|
|
|
|
if not sys.platform.startswith('linux'):
|
2019-03-22 18:21:58 +01:00
|
|
|
self.log.warning("Can't profile with perf; only available on Linux platforms")
|
2018-10-19 18:28:47 +02:00
|
|
|
return None
|
|
|
|
|
|
|
|
if not test_success('which perf'):
|
|
|
|
self.log.warning("Can't profile with perf; must install perf-tools")
|
|
|
|
return None
|
|
|
|
|
|
|
|
if not test_success('readelf -S {} | grep .debug_str'.format(shlex.quote(self.binary))):
|
|
|
|
self.log.warning(
|
|
|
|
"perf output won't be very useful without debug symbols compiled into bitcoind")
|
|
|
|
|
|
|
|
output_path = tempfile.NamedTemporaryFile(
|
|
|
|
dir=self.datadir,
|
|
|
|
prefix="{}.perf.data.".format(profile_name or 'test'),
|
|
|
|
delete=False,
|
|
|
|
).name
|
|
|
|
|
|
|
|
cmd = [
|
|
|
|
'perf', 'record',
|
|
|
|
'-g', # Record the callgraph.
|
|
|
|
'--call-graph', 'dwarf', # Compatibility for gcc's --fomit-frame-pointer.
|
|
|
|
'-F', '101', # Sampling frequency in Hz.
|
|
|
|
'-p', str(self.process.pid),
|
|
|
|
'-o', output_path,
|
|
|
|
]
|
|
|
|
subp = subprocess.Popen(cmd, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
|
|
|
self.perf_subprocesses[profile_name] = subp
|
|
|
|
|
|
|
|
return subp
|
|
|
|
|
|
|
|
def _stop_perf(self, profile_name):
|
|
|
|
"""Stop (and pop) a perf subprocess."""
|
|
|
|
subp = self.perf_subprocesses.pop(profile_name)
|
|
|
|
output_path = subp.args[subp.args.index('-o') + 1]
|
|
|
|
|
|
|
|
subp.terminate()
|
|
|
|
subp.wait(timeout=10)
|
|
|
|
|
|
|
|
stderr = subp.stderr.read().decode()
|
|
|
|
if 'Consider tweaking /proc/sys/kernel/perf_event_paranoid' in stderr:
|
|
|
|
self.log.warning(
|
|
|
|
"perf couldn't collect data! Try "
|
|
|
|
"'sudo sysctl -w kernel.perf_event_paranoid=-1'")
|
|
|
|
else:
|
|
|
|
report_cmd = "perf report -i {}".format(output_path)
|
|
|
|
self.log.info("See perf output by running '{}'".format(report_cmd))
|
|
|
|
|
2018-03-28 15:37:09 +02:00
|
|
|
def assert_start_raises_init_error(self, extra_args=None, expected_msg=None, match=ErrorMatch.FULL_TEXT, *args, **kwargs):
|
2018-02-07 15:36:13 +01:00
|
|
|
"""Attempt to start the node and expect it to raise an error.
|
|
|
|
|
2018-02-07 16:38:25 +01:00
|
|
|
extra_args: extra arguments to pass through to bitcoind
|
|
|
|
expected_msg: regex that stderr should match when bitcoind fails
|
|
|
|
|
2018-02-07 15:36:13 +01:00
|
|
|
Will throw if bitcoind starts without an error.
|
2018-02-07 16:38:25 +01:00
|
|
|
Will throw if an expected_msg is provided and it does not match bitcoind's stdout."""
|
2018-02-07 15:57:27 +01:00
|
|
|
with tempfile.NamedTemporaryFile(dir=self.stderr_dir, delete=False) as log_stderr, \
|
|
|
|
tempfile.NamedTemporaryFile(dir=self.stdout_dir, delete=False) as log_stdout:
|
2018-02-07 15:36:13 +01:00
|
|
|
try:
|
2018-02-07 15:57:27 +01:00
|
|
|
self.start(extra_args, stdout=log_stdout, stderr=log_stderr, *args, **kwargs)
|
2018-02-07 15:36:13 +01:00
|
|
|
self.wait_for_rpc_connection()
|
|
|
|
self.stop_node()
|
2018-03-28 08:44:30 +02:00
|
|
|
self.wait_until_stopped()
|
|
|
|
except FailedToStartError as e:
|
|
|
|
self.log.debug('bitcoind failed to start: %s', e)
|
2018-02-07 15:36:13 +01:00
|
|
|
self.running = False
|
|
|
|
self.process = None
|
2018-02-07 16:38:25 +01:00
|
|
|
# Check stderr for expected message
|
2018-02-07 15:36:13 +01:00
|
|
|
if expected_msg is not None:
|
|
|
|
log_stderr.seek(0)
|
2018-03-19 20:35:04 +01:00
|
|
|
stderr = log_stderr.read().decode('utf-8').strip()
|
2018-03-28 15:37:09 +02:00
|
|
|
if match == ErrorMatch.PARTIAL_REGEX:
|
2018-03-19 20:35:04 +01:00
|
|
|
if re.search(expected_msg, stderr, flags=re.MULTILINE) is None:
|
2018-04-18 21:17:22 +02:00
|
|
|
self._raise_assertion_error(
|
|
|
|
'Expected message "{}" does not partially match stderr:\n"{}"'.format(expected_msg, stderr))
|
2018-03-28 15:37:09 +02:00
|
|
|
elif match == ErrorMatch.FULL_REGEX:
|
2018-03-19 20:35:04 +01:00
|
|
|
if re.fullmatch(expected_msg, stderr) is None:
|
2018-04-18 21:17:22 +02:00
|
|
|
self._raise_assertion_error(
|
|
|
|
'Expected message "{}" does not fully match stderr:\n"{}"'.format(expected_msg, stderr))
|
2018-03-28 15:37:09 +02:00
|
|
|
elif match == ErrorMatch.FULL_TEXT:
|
|
|
|
if expected_msg != stderr:
|
2018-04-18 21:17:22 +02:00
|
|
|
self._raise_assertion_error(
|
|
|
|
'Expected message "{}" does not fully match stderr:\n"{}"'.format(expected_msg, stderr))
|
2018-02-07 15:36:13 +01:00
|
|
|
else:
|
|
|
|
if expected_msg is None:
|
|
|
|
assert_msg = "bitcoind should have exited with an error"
|
|
|
|
else:
|
|
|
|
assert_msg = "bitcoind should have exited with expected error " + expected_msg
|
2018-04-18 21:17:22 +02:00
|
|
|
self._raise_assertion_error(assert_msg)
|
2018-02-07 15:36:13 +01:00
|
|
|
|
2018-08-08 23:22:45 +02:00
|
|
|
def add_p2p_connection(self, p2p_conn, *, wait_for_verack=True, **kwargs):
|
2017-03-27 15:42:17 +02:00
|
|
|
"""Add a p2p connection to the node.
|
|
|
|
|
|
|
|
This method adds the p2p connection to the self.p2ps list and also
|
|
|
|
returns the connection to the caller."""
|
|
|
|
if 'dstport' not in kwargs:
|
|
|
|
kwargs['dstport'] = p2p_port(self.index)
|
|
|
|
if 'dstaddr' not in kwargs:
|
|
|
|
kwargs['dstaddr'] = '127.0.0.1'
|
2017-11-17 21:01:24 +01:00
|
|
|
|
2020-05-18 06:15:55 +02:00
|
|
|
p2p_conn.peer_connect(**kwargs, net=self.chain, timeout_factor=self.timeout_factor)()
|
2017-03-27 15:42:17 +02:00
|
|
|
self.p2ps.append(p2p_conn)
|
2018-08-08 23:22:45 +02:00
|
|
|
if wait_for_verack:
|
2020-03-02 20:14:30 +01:00
|
|
|
# Wait for the node to send us the version and verack
|
2018-08-08 23:22:45 +02:00
|
|
|
p2p_conn.wait_for_verack()
|
2020-03-02 20:14:30 +01:00
|
|
|
# At this point we have sent our version message and received the version and verack, however the full node
|
|
|
|
# has not yet received the verack from us (in reply to their version). So, the connection is not yet fully
|
|
|
|
# established (fSuccessfullyConnected).
|
|
|
|
#
|
|
|
|
# This shouldn't lead to any issues when sending messages, since the verack will be in-flight before the
|
|
|
|
# message we send. However, it might lead to races where we are expecting to receive a message. E.g. a
|
|
|
|
# transaction that will be added to the mempool as soon as we return here.
|
|
|
|
#
|
|
|
|
# So syncing here is redundant when we only want to send a message, but the cost is low (a few milliseconds)
|
2020-05-18 06:15:55 +02:00
|
|
|
# in comparison to the upside of making tests less fragile and unexpected intermittent errors less likely.
|
2020-03-02 20:14:30 +01:00
|
|
|
p2p_conn.sync_with_ping()
|
2017-03-27 15:42:17 +02:00
|
|
|
|
|
|
|
return p2p_conn
|
|
|
|
|
|
|
|
@property
|
|
|
|
def p2p(self):
|
|
|
|
"""Return the first p2p connection
|
|
|
|
|
|
|
|
Convenience property - most tests only use a single p2p connection to each
|
|
|
|
node, so this saves having to write node.p2ps[0] many times."""
|
2018-04-18 21:17:22 +02:00
|
|
|
assert self.p2ps, self._node_msg("No p2p connection")
|
2017-03-27 15:42:17 +02:00
|
|
|
return self.p2ps[0]
|
|
|
|
|
2017-11-08 22:28:17 +01:00
|
|
|
def disconnect_p2ps(self):
|
|
|
|
"""Close all p2p connections to the node."""
|
|
|
|
for p in self.p2ps:
|
2017-11-17 21:01:24 +01:00
|
|
|
p.peer_disconnect()
|
|
|
|
del self.p2ps[:]
|
2017-11-08 22:28:17 +01:00
|
|
|
|
2020-03-02 20:14:30 +01:00
|
|
|
|
2017-12-21 10:54:43 +01:00
|
|
|
class TestNodeCLIAttr:
|
|
|
|
def __init__(self, cli, command):
|
|
|
|
self.cli = cli
|
|
|
|
self.command = command
|
|
|
|
|
|
|
|
def __call__(self, *args, **kwargs):
|
|
|
|
return self.cli.send_cli(self.command, *args, **kwargs)
|
|
|
|
|
|
|
|
def get_request(self, *args, **kwargs):
|
|
|
|
return lambda: self(*args, **kwargs)
|
2017-03-27 15:42:17 +02:00
|
|
|
|
2020-03-02 20:14:30 +01:00
|
|
|
|
2019-01-23 21:51:35 +01:00
|
|
|
def arg_to_cli(arg):
|
|
|
|
if isinstance(arg, bool):
|
|
|
|
return str(arg).lower()
|
2020-05-05 17:27:48 +02:00
|
|
|
elif arg is None:
|
|
|
|
return 'null'
|
2019-01-23 21:51:35 +01:00
|
|
|
elif isinstance(arg, dict) or isinstance(arg, list):
|
2019-12-09 21:02:50 +01:00
|
|
|
return json.dumps(arg, default=EncodeDecimal)
|
2019-01-23 21:51:35 +01:00
|
|
|
else:
|
|
|
|
return str(arg)
|
|
|
|
|
2020-03-02 20:14:30 +01:00
|
|
|
|
2017-07-11 19:01:44 +02:00
|
|
|
class TestNodeCLI():
|
|
|
|
"""Interface to bitcoin-cli for an individual node"""
|
|
|
|
def __init__(self, binary, datadir):
|
2018-01-23 19:58:53 +01:00
|
|
|
self.options = []
|
2017-07-11 19:01:44 +02:00
|
|
|
self.binary = binary
|
|
|
|
self.datadir = datadir
|
2017-09-06 18:07:21 +02:00
|
|
|
self.input = None
|
2017-07-11 19:14:18 +02:00
|
|
|
self.log = logging.getLogger('TestFramework.bitcoincli')
|
2017-09-06 18:07:21 +02:00
|
|
|
|
2018-01-23 19:58:53 +01:00
|
|
|
def __call__(self, *options, input=None):
|
|
|
|
# TestNodeCLI is callable with bitcoin-cli command-line options
|
2017-12-21 00:41:12 +01:00
|
|
|
cli = TestNodeCLI(self.binary, self.datadir)
|
2018-01-23 19:58:53 +01:00
|
|
|
cli.options = [str(o) for o in options]
|
2017-12-21 00:41:12 +01:00
|
|
|
cli.input = input
|
|
|
|
return cli
|
2017-07-11 19:01:44 +02:00
|
|
|
|
|
|
|
def __getattr__(self, command):
|
2017-12-21 10:54:43 +01:00
|
|
|
return TestNodeCLIAttr(self, command)
|
|
|
|
|
|
|
|
def batch(self, requests):
|
|
|
|
results = []
|
|
|
|
for request in requests:
|
2018-06-18 23:28:37 +02:00
|
|
|
try:
|
|
|
|
results.append(dict(result=request()))
|
|
|
|
except JSONRPCException as e:
|
|
|
|
results.append(dict(error=e))
|
2017-12-21 10:54:43 +01:00
|
|
|
return results
|
2017-07-11 19:01:44 +02:00
|
|
|
|
2018-01-23 20:00:34 +01:00
|
|
|
def send_cli(self, command=None, *args, **kwargs):
|
2017-07-11 19:01:44 +02:00
|
|
|
"""Run bitcoin-cli command. Deserializes returned string as python object."""
|
2019-01-23 21:51:35 +01:00
|
|
|
pos_args = [arg_to_cli(arg) for arg in args]
|
|
|
|
named_args = [str(key) + "=" + arg_to_cli(value) for (key, value) in kwargs.items()]
|
2017-07-11 19:01:44 +02:00
|
|
|
assert not (pos_args and named_args), "Cannot use positional arguments and named arguments in the same bitcoin-cli call"
|
2018-01-23 19:58:53 +01:00
|
|
|
p_args = [self.binary, "-datadir=" + self.datadir] + self.options
|
2017-07-11 19:01:44 +02:00
|
|
|
if named_args:
|
|
|
|
p_args += ["-named"]
|
2018-01-23 20:00:34 +01:00
|
|
|
if command is not None:
|
|
|
|
p_args += [command]
|
|
|
|
p_args += pos_args + named_args
|
2020-04-20 23:24:54 +02:00
|
|
|
self.log.debug("Running bitcoin-cli {}".format(p_args[2:]))
|
2017-09-06 17:36:13 +02:00
|
|
|
process = subprocess.Popen(p_args, stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE, universal_newlines=True)
|
|
|
|
cli_stdout, cli_stderr = process.communicate(input=self.input)
|
|
|
|
returncode = process.poll()
|
|
|
|
if returncode:
|
2017-12-21 00:38:40 +01:00
|
|
|
match = re.match(r'error code: ([-0-9]+)\nerror message:\n(.*)', cli_stderr)
|
|
|
|
if match:
|
|
|
|
code, message = match.groups()
|
|
|
|
raise JSONRPCException(dict(code=int(code), message=message))
|
2017-09-06 17:36:13 +02:00
|
|
|
# Ignore cli_stdout, raise with cli_stderr
|
|
|
|
raise subprocess.CalledProcessError(returncode, self.binary, output=cli_stderr)
|
2017-12-21 00:38:40 +01:00
|
|
|
try:
|
|
|
|
return json.loads(cli_stdout, parse_float=decimal.Decimal)
|
2019-02-21 00:13:43 +01:00
|
|
|
except json.JSONDecodeError:
|
2017-12-21 00:38:40 +01:00
|
|
|
return cli_stdout.rstrip("\n")
|
2020-04-03 00:09:15 +02:00
|
|
|
|
|
|
|
class RPCOverloadWrapper():
|
2019-07-16 21:33:35 +02:00
|
|
|
def __init__(self, rpc, cli=False, descriptors=False):
|
2020-04-03 00:09:15 +02:00
|
|
|
self.rpc = rpc
|
|
|
|
self.is_cli = cli
|
2019-07-16 21:33:35 +02:00
|
|
|
self.descriptors = descriptors
|
2020-04-03 00:09:15 +02:00
|
|
|
|
|
|
|
def __getattr__(self, name):
|
|
|
|
return getattr(self.rpc, name)
|
|
|
|
|
2020-05-05 17:27:48 +02:00
|
|
|
def createwallet(self, wallet_name, disable_private_keys=None, blank=None, passphrase='', avoid_reuse=None, descriptors=None):
|
2019-07-16 21:33:35 +02:00
|
|
|
if descriptors is None:
|
|
|
|
descriptors = self.descriptors
|
|
|
|
return self.__getattr__('createwallet')(wallet_name, disable_private_keys, blank, passphrase, avoid_reuse, descriptors)
|
|
|
|
|
2020-04-03 00:09:15 +02:00
|
|
|
def importprivkey(self, privkey, label=None, rescan=None):
|
|
|
|
wallet_info = self.getwalletinfo()
|
|
|
|
if 'descriptors' not in wallet_info or ('descriptors' in wallet_info and not wallet_info['descriptors']):
|
|
|
|
return self.__getattr__('importprivkey')(privkey, label, rescan)
|
|
|
|
desc = descsum_create('combo(' + privkey + ')')
|
|
|
|
req = [{
|
|
|
|
'desc': desc,
|
|
|
|
'timestamp': 0 if rescan else 'now',
|
|
|
|
'label': label if label else ''
|
|
|
|
}]
|
|
|
|
import_res = self.importdescriptors(req)
|
|
|
|
if not import_res[0]['success']:
|
|
|
|
raise JSONRPCException(import_res[0]['error'])
|
|
|
|
|
|
|
|
def addmultisigaddress(self, nrequired, keys, label=None, address_type=None):
|
|
|
|
wallet_info = self.getwalletinfo()
|
|
|
|
if 'descriptors' not in wallet_info or ('descriptors' in wallet_info and not wallet_info['descriptors']):
|
|
|
|
return self.__getattr__('addmultisigaddress')(nrequired, keys, label, address_type)
|
|
|
|
cms = self.createmultisig(nrequired, keys, address_type)
|
|
|
|
req = [{
|
|
|
|
'desc': cms['descriptor'],
|
|
|
|
'timestamp': 0,
|
|
|
|
'label': label if label else ''
|
|
|
|
}]
|
|
|
|
import_res = self.importdescriptors(req)
|
|
|
|
if not import_res[0]['success']:
|
|
|
|
raise JSONRPCException(import_res[0]['error'])
|
|
|
|
return cms
|
|
|
|
|
|
|
|
def importpubkey(self, pubkey, label=None, rescan=None):
|
|
|
|
wallet_info = self.getwalletinfo()
|
|
|
|
if 'descriptors' not in wallet_info or ('descriptors' in wallet_info and not wallet_info['descriptors']):
|
|
|
|
return self.__getattr__('importpubkey')(pubkey, label, rescan)
|
|
|
|
desc = descsum_create('combo(' + pubkey + ')')
|
|
|
|
req = [{
|
|
|
|
'desc': desc,
|
|
|
|
'timestamp': 0 if rescan else 'now',
|
|
|
|
'label': label if label else ''
|
|
|
|
}]
|
|
|
|
import_res = self.importdescriptors(req)
|
|
|
|
if not import_res[0]['success']:
|
|
|
|
raise JSONRPCException(import_res[0]['error'])
|
|
|
|
|
|
|
|
def importaddress(self, address, label=None, rescan=None, p2sh=None):
|
|
|
|
wallet_info = self.getwalletinfo()
|
|
|
|
if 'descriptors' not in wallet_info or ('descriptors' in wallet_info and not wallet_info['descriptors']):
|
|
|
|
return self.__getattr__('importaddress')(address, label, rescan, p2sh)
|
|
|
|
is_hex = False
|
|
|
|
try:
|
|
|
|
int(address ,16)
|
|
|
|
is_hex = True
|
|
|
|
desc = descsum_create('raw(' + address + ')')
|
|
|
|
except:
|
|
|
|
desc = descsum_create('addr(' + address + ')')
|
|
|
|
reqs = [{
|
|
|
|
'desc': desc,
|
|
|
|
'timestamp': 0 if rescan else 'now',
|
|
|
|
'label': label if label else ''
|
|
|
|
}]
|
|
|
|
if is_hex and p2sh:
|
|
|
|
reqs.append({
|
|
|
|
'desc': descsum_create('p2sh(raw(' + address + '))'),
|
|
|
|
'timestamp': 0 if rescan else 'now',
|
|
|
|
'label': label if label else ''
|
|
|
|
})
|
|
|
|
import_res = self.importdescriptors(reqs)
|
|
|
|
for res in import_res:
|
|
|
|
if not res['success']:
|
|
|
|
raise JSONRPCException(res['error'])
|