mirror of
https://github.com/bitcoin/bitcoin.git
synced 2024-11-20 02:25:40 +01:00
Merge bitcoin/bitcoin#27081: Modernize rpcauth.py
e4e17907b6
Modernize rpcauth.py and its tests (Pieter Wuille) Pull request description: Use Python3 constructions, and f-strings. ACKs for top commit: jamesob: Github ACKe4e17907b6
Tree-SHA512: 005573d967e04400fec727f45739f138879be703e692745c0a639272d37d221d230f388de23f2615cb954bb47179fb46e53da0410ae9f0865319b91bb2dc01f4
This commit is contained in:
commit
d6ef44cccb
@ -4,22 +4,20 @@
|
||||
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
||||
|
||||
from argparse import ArgumentParser
|
||||
from base64 import urlsafe_b64encode
|
||||
from getpass import getpass
|
||||
from os import urandom
|
||||
|
||||
from secrets import token_hex, token_urlsafe
|
||||
import hmac
|
||||
|
||||
def generate_salt(size):
|
||||
"""Create size byte hex salt"""
|
||||
return urandom(size).hex()
|
||||
return token_hex(size)
|
||||
|
||||
def generate_password():
|
||||
"""Create 32 byte b64 password"""
|
||||
return urlsafe_b64encode(urandom(32)).decode('utf-8')
|
||||
return token_urlsafe(32)
|
||||
|
||||
def password_to_hmac(salt, password):
|
||||
m = hmac.new(bytearray(salt, 'utf-8'), bytearray(password, 'utf-8'), 'SHA256')
|
||||
m = hmac.new(salt.encode('utf-8'), password.encode('utf-8'), 'SHA256')
|
||||
return m.hexdigest()
|
||||
|
||||
def main():
|
||||
@ -38,8 +36,8 @@ def main():
|
||||
password_hmac = password_to_hmac(salt, args.password)
|
||||
|
||||
print('String to be appended to bitcoin.conf:')
|
||||
print('rpcauth={0}:{1}${2}'.format(args.username, salt, password_hmac))
|
||||
print('Your password:\n{0}'.format(args.password))
|
||||
print(f'rpcauth={args.username}:{salt}${password_hmac}')
|
||||
print(f'Your password:\n{args.password}')
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
||||
|
@ -4,7 +4,7 @@
|
||||
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
||||
"""Test share/rpcauth/rpcauth.py
|
||||
"""
|
||||
import base64
|
||||
import re
|
||||
import configparser
|
||||
import hmac
|
||||
import importlib
|
||||
@ -28,18 +28,17 @@ class TestRPCAuth(unittest.TestCase):
|
||||
self.assertEqual(len(self.rpcauth.generate_salt(i)), i * 2)
|
||||
|
||||
def test_generate_password(self):
|
||||
"""Test that generated passwords only consist of urlsafe characters."""
|
||||
r = re.compile(r"[0-9a-zA-Z_-]*")
|
||||
password = self.rpcauth.generate_password()
|
||||
expected_password = base64.urlsafe_b64encode(
|
||||
base64.urlsafe_b64decode(password)).decode('utf-8')
|
||||
self.assertEqual(expected_password, password)
|
||||
self.assertTrue(r.fullmatch(password))
|
||||
|
||||
def test_check_password_hmac(self):
|
||||
salt = self.rpcauth.generate_salt(16)
|
||||
password = self.rpcauth.generate_password()
|
||||
password_hmac = self.rpcauth.password_to_hmac(salt, password)
|
||||
|
||||
m = hmac.new(bytearray(salt, 'utf-8'),
|
||||
bytearray(password, 'utf-8'), 'SHA256')
|
||||
m = hmac.new(salt.encode('utf-8'), password.encode('utf-8'), 'SHA256')
|
||||
expected_password_hmac = m.hexdigest()
|
||||
|
||||
self.assertEqual(expected_password_hmac, password_hmac)
|
||||
|
Loading…
Reference in New Issue
Block a user