mirror of
https://github.com/ElementsProject/lightning.git
synced 2024-12-27 09:04:40 +01:00
da4e33cd0d
If rune contains invalid UTF-8, offers (which implements decode) would produce JSON with invalid UTF-8, which causes lightningd to complain and kill it, and then die because it's an important plugin. So don't decode invalid UTF-8! Reported-by: @jb55 Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2859 lines
115 KiB
Python
2859 lines
115 KiB
Python
from collections import OrderedDict
|
|
from datetime import datetime
|
|
from fixtures import * # noqa: F401,F403
|
|
from hashlib import sha256
|
|
from pyln.client import RpcError, Millisatoshi
|
|
from pyln.proto import Invoice
|
|
from utils import (
|
|
DEVELOPER, only_one, sync_blockheight, TIMEOUT, wait_for, TEST_NETWORK,
|
|
DEPRECATED_APIS, expected_peer_features, expected_node_features,
|
|
expected_channel_features, account_balance,
|
|
check_coin_moves, first_channel_id, EXPERIMENTAL_DUAL_FUND,
|
|
mine_funding_to_announce
|
|
)
|
|
|
|
import ast
|
|
import base64
|
|
import concurrent.futures
|
|
import json
|
|
import os
|
|
import pytest
|
|
import random
|
|
import re
|
|
import signal
|
|
import sqlite3
|
|
import stat
|
|
import subprocess
|
|
import time
|
|
import unittest
|
|
|
|
|
|
def test_option_passthrough(node_factory, directory):
|
|
""" Ensure that registering options works.
|
|
|
|
First attempts without the plugin and then with the plugin.
|
|
Then a plugin tries to register the same option "name" again, fails startup.
|
|
"""
|
|
plugin_path = os.path.join(os.getcwd(), 'contrib/plugins/helloworld.py')
|
|
plugin_path2 = os.path.join(os.getcwd(), 'tests/plugins/options.py')
|
|
|
|
help_out = subprocess.check_output([
|
|
'lightningd/lightningd',
|
|
'--lightning-dir={}'.format(directory),
|
|
'--help'
|
|
]).decode('utf-8')
|
|
assert('--greeting' not in help_out)
|
|
|
|
help_out = subprocess.check_output([
|
|
'lightningd/lightningd',
|
|
'--lightning-dir={}'.format(directory),
|
|
'--plugin={}'.format(plugin_path),
|
|
'--help'
|
|
]).decode('utf-8')
|
|
assert('--greeting' in help_out)
|
|
|
|
# Now try to see if it gets accepted, would fail to start if the
|
|
# option didn't exist
|
|
n = node_factory.get_node(options={'plugin': plugin_path, 'greeting': 'Ciao'})
|
|
n.stop()
|
|
|
|
with pytest.raises(subprocess.CalledProcessError):
|
|
err_out = subprocess.run([
|
|
'lightningd/lightningd',
|
|
'--lightning-dir={}'.format(directory),
|
|
'--plugin={}'.format(plugin_path),
|
|
'--plugin={}'.format(plugin_path2),
|
|
'--help'
|
|
], capture_output=True, check=True).stderr.decode('utf-8')
|
|
|
|
# first come first serve
|
|
assert("error starting plugin '{}': option name '--greeting' is already taken".format(plugin_path2) in err_out)
|
|
|
|
|
|
def test_option_types(node_factory):
|
|
"""Ensure that desired types of options are
|
|
respected in output """
|
|
|
|
plugin_path = os.path.join(os.getcwd(), 'tests/plugins/options.py')
|
|
n = node_factory.get_node(options={
|
|
'plugin': plugin_path,
|
|
'str_opt': 'ok',
|
|
'int_opt': 22,
|
|
'bool_opt': True,
|
|
})
|
|
|
|
assert n.daemon.is_in_log(r"option str_opt ok <class 'str'>")
|
|
assert n.daemon.is_in_log(r"option int_opt 22 <class 'int'>")
|
|
assert n.daemon.is_in_log(r"option bool_opt True <class 'bool'>")
|
|
# flag options aren't passed through if not flagged on
|
|
assert not n.daemon.is_in_log(r"option flag_opt")
|
|
n.stop()
|
|
|
|
# A blank bool_opt should default to false
|
|
n = node_factory.get_node(options={
|
|
'plugin': plugin_path, 'str_opt': 'ok',
|
|
'int_opt': 22,
|
|
'bool_opt': 'true',
|
|
'flag_opt': None,
|
|
})
|
|
|
|
assert n.daemon.is_in_log(r"option bool_opt True <class 'bool'>")
|
|
assert n.daemon.is_in_log(r"option flag_opt True <class 'bool'>")
|
|
n.stop()
|
|
|
|
# What happens if we give it a bad bool-option?
|
|
n = node_factory.get_node(options={
|
|
'plugin': plugin_path,
|
|
'str_opt': 'ok',
|
|
'int_opt': 22,
|
|
'bool_opt': '!',
|
|
}, may_fail=True, start=False)
|
|
|
|
# the node should fail after start, and we get a stderr msg
|
|
n.daemon.start(wait_for_initialized=False, stderr_redir=True)
|
|
assert n.daemon.wait() == 1
|
|
wait_for(lambda: n.daemon.is_in_stderr('bool_opt: ! does not parse as type bool'))
|
|
|
|
# What happens if we give it a bad int-option?
|
|
n = node_factory.get_node(options={
|
|
'plugin': plugin_path,
|
|
'str_opt': 'ok',
|
|
'int_opt': 'notok',
|
|
'bool_opt': 1,
|
|
}, may_fail=True, start=False)
|
|
|
|
# the node should fail after start, and we get a stderr msg
|
|
n.daemon.start(wait_for_initialized=False, stderr_redir=True)
|
|
assert n.daemon.wait() == 1
|
|
assert n.daemon.is_in_stderr('--int_opt: notok does not parse as type int')
|
|
|
|
# Flag opts shouldn't allow any input
|
|
n = node_factory.get_node(options={
|
|
'plugin': plugin_path,
|
|
'str_opt': 'ok',
|
|
'int_opt': 11,
|
|
'bool_opt': 1,
|
|
'flag_opt': True,
|
|
}, may_fail=True, start=False)
|
|
|
|
# the node should fail after start, and we get a stderr msg
|
|
n.daemon.start(wait_for_initialized=False, stderr_redir=True)
|
|
assert n.daemon.wait() == 1
|
|
assert n.daemon.is_in_stderr("--flag_opt: doesn't allow an argument")
|
|
|
|
n = node_factory.get_node(options={
|
|
'plugin': plugin_path,
|
|
'str_optm': ['ok', 'ok2'],
|
|
'int_optm': [11, 12, 13],
|
|
})
|
|
|
|
assert n.daemon.is_in_log(r"option str_optm \['ok', 'ok2'\] <class 'list'>")
|
|
assert n.daemon.is_in_log(r"option int_optm \[11, 12, 13\] <class 'list'>")
|
|
n.stop()
|
|
|
|
|
|
def test_millisatoshi_passthrough(node_factory):
|
|
""" Ensure that Millisatoshi arguments and return work.
|
|
"""
|
|
plugin_path = os.path.join(os.getcwd(), 'tests/plugins/millisatoshis.py')
|
|
n = node_factory.get_node(options={'plugin': plugin_path, 'log-level': 'io'})
|
|
|
|
# By keyword
|
|
ret = n.rpc.call('echo', {'msat': Millisatoshi(17), 'not_an_msat': '22msat'})['echo_msat']
|
|
assert type(ret) == Millisatoshi
|
|
assert ret == Millisatoshi(17)
|
|
|
|
# By position
|
|
ret = n.rpc.call('echo', [Millisatoshi(18), '22msat'])['echo_msat']
|
|
assert type(ret) == Millisatoshi
|
|
assert ret == Millisatoshi(18)
|
|
|
|
|
|
def test_rpc_passthrough(node_factory):
|
|
"""Starting with a plugin exposes its RPC methods.
|
|
|
|
First check that the RPC method appears in the help output and
|
|
then try to call it.
|
|
|
|
"""
|
|
plugin_path = os.path.join(os.getcwd(), 'contrib/plugins/helloworld.py')
|
|
n = node_factory.get_node(options={'plugin': plugin_path, 'greeting': 'Ciao'})
|
|
|
|
# Make sure that the 'hello' command that the helloworld.py plugin
|
|
# has registered is available.
|
|
cmd = [hlp for hlp in n.rpc.help()['help'] if 'hello' in hlp['command']]
|
|
assert(len(cmd) == 1)
|
|
|
|
# Make sure usage message is present.
|
|
assert only_one(n.rpc.help('hello')['help'])['command'] == 'hello [name]'
|
|
# While we're at it, let's check that helloworld.py is logging
|
|
# correctly via the notifications plugin->lightningd
|
|
assert n.daemon.is_in_log('Plugin helloworld.py initialized')
|
|
|
|
# Now try to call it and see what it returns:
|
|
greet = n.rpc.hello(name='World')
|
|
assert(greet == "Ciao World")
|
|
with pytest.raises(RpcError):
|
|
n.rpc.fail()
|
|
|
|
# Try to call a method without enough arguments
|
|
with pytest.raises(RpcError, match="processing bye: missing a required"
|
|
" argument"):
|
|
n.rpc.bye()
|
|
|
|
|
|
def test_plugin_dir(node_factory):
|
|
"""--plugin-dir works"""
|
|
plugin_dir = os.path.join(os.getcwd(), 'contrib/plugins')
|
|
node_factory.get_node(options={'plugin-dir': plugin_dir, 'greeting': 'Mars'})
|
|
|
|
|
|
def test_plugin_slowinit(node_factory):
|
|
"""Tests that the 'plugin' RPC command times out if plugin doesnt respond"""
|
|
os.environ['SLOWINIT_TIME'] = '61'
|
|
n = node_factory.get_node()
|
|
|
|
with pytest.raises(RpcError, match=': timed out before replying to init'):
|
|
n.rpc.plugin_start(os.path.join(os.getcwd(), "tests/plugins/slow_init.py"))
|
|
|
|
# It's not actually configured yet, see what happens;
|
|
# make sure 'rescan' and 'list' controls dont crash
|
|
n.rpc.plugin_rescan()
|
|
n.rpc.plugin_list()
|
|
|
|
|
|
def test_plugin_command(node_factory):
|
|
"""Tests the 'plugin' RPC command"""
|
|
n = node_factory.get_node()
|
|
|
|
# Make sure that the 'hello' command from the helloworld.py plugin
|
|
# is not available.
|
|
cmd = [hlp for hlp in n.rpc.help()["help"] if "hello" in hlp["command"]]
|
|
assert(len(cmd) == 0)
|
|
|
|
# Add the 'contrib/plugins' test dir
|
|
n.rpc.plugin_startdir(directory=os.path.join(os.getcwd(), "contrib/plugins"))
|
|
# Make sure that the 'hello' command from the helloworld.py plugin
|
|
# is now available.
|
|
cmd = [hlp for hlp in n.rpc.help()["help"] if "hello" in hlp["command"]]
|
|
assert(len(cmd) == 1)
|
|
|
|
# Make sure 'rescan' and 'list' subcommands dont crash
|
|
n.rpc.plugin_rescan()
|
|
n.rpc.plugin_list()
|
|
|
|
# Make sure the plugin behaves normally after stop and restart
|
|
assert("Successfully stopped helloworld.py."
|
|
== n.rpc.plugin_stop(plugin="helloworld.py")["result"])
|
|
n.daemon.wait_for_log(r"Killing plugin: stopped by lightningd via RPC")
|
|
n.rpc.plugin_start(plugin=os.path.join(os.getcwd(), "contrib/plugins/helloworld.py"))
|
|
n.daemon.wait_for_log(r"Plugin helloworld.py initialized")
|
|
assert("Hello world" == n.rpc.call(method="hello"))
|
|
|
|
# Now stop the helloworld plugin
|
|
assert("Successfully stopped helloworld.py."
|
|
== n.rpc.plugin_stop(plugin="helloworld.py")["result"])
|
|
n.daemon.wait_for_log(r"Killing plugin: stopped by lightningd via RPC")
|
|
# Make sure that the 'hello' command from the helloworld.py plugin
|
|
# is not available anymore.
|
|
cmd = [hlp for hlp in n.rpc.help()["help"] if "hello" in hlp["command"]]
|
|
assert(len(cmd) == 0)
|
|
|
|
# Test that we cannot start a plugin with 'dynamic' set to False in
|
|
# getmanifest
|
|
with pytest.raises(RpcError, match=r"Not a dynamic plugin"):
|
|
n.rpc.plugin_start(plugin=os.path.join(os.getcwd(), "tests/plugins/static.py"))
|
|
|
|
# Test that we cannot stop a started plugin with 'dynamic' flag set to
|
|
# False
|
|
n2 = node_factory.get_node(options={
|
|
"plugin": os.path.join(os.getcwd(), "tests/plugins/static.py")
|
|
})
|
|
with pytest.raises(RpcError, match=r"static.py cannot be managed when lightningd is up"):
|
|
n2.rpc.plugin_stop(plugin="static.py")
|
|
|
|
# Test that we don't crash when starting a broken plugin
|
|
with pytest.raises(RpcError, match=r": exited before replying to getmanifest"):
|
|
n2.rpc.plugin_start(plugin=os.path.join(os.getcwd(), "tests/plugins/broken.py"))
|
|
|
|
with pytest.raises(RpcError, match=r': timed out before replying to getmanifest'):
|
|
n2.rpc.plugin_start(os.path.join(os.getcwd(), 'contrib/plugins/fail/failtimeout.py'))
|
|
|
|
# Test that we can add a directory with more than one new plugin in it.
|
|
try:
|
|
n.rpc.plugin_startdir(os.path.join(os.getcwd(), "contrib/plugins"))
|
|
except RpcError:
|
|
pass
|
|
|
|
# Usually, it crashes after the above return.
|
|
n.rpc.stop()
|
|
|
|
|
|
def test_plugin_disable(node_factory):
|
|
"""--disable-plugin works"""
|
|
plugin_dir = os.path.join(os.getcwd(), 'contrib/plugins')
|
|
# We used to need plugin-dir before disable-plugin!
|
|
n = node_factory.get_node(options=OrderedDict([('plugin-dir', plugin_dir),
|
|
('disable-plugin',
|
|
'{}/helloworld.py'
|
|
.format(plugin_dir))]))
|
|
with pytest.raises(RpcError):
|
|
n.rpc.hello(name='Sun')
|
|
assert n.daemon.is_in_log('helloworld.py: disabled via disable-plugin')
|
|
n.stop()
|
|
|
|
# Also works by basename.
|
|
n = node_factory.get_node(options=OrderedDict([('plugin-dir', plugin_dir),
|
|
('disable-plugin',
|
|
'helloworld.py')]))
|
|
with pytest.raises(RpcError):
|
|
n.rpc.hello(name='Sun')
|
|
assert n.daemon.is_in_log('helloworld.py: disabled via disable-plugin')
|
|
n.stop()
|
|
|
|
# Other order also works!
|
|
n = node_factory.get_node(options=OrderedDict([('disable-plugin',
|
|
'helloworld.py'),
|
|
('plugin-dir', plugin_dir)]))
|
|
with pytest.raises(RpcError):
|
|
n.rpc.hello(name='Sun')
|
|
assert n.daemon.is_in_log('helloworld.py: disabled via disable-plugin')
|
|
n.stop()
|
|
|
|
# Both orders of explicit specification work.
|
|
n = node_factory.get_node(options=OrderedDict([('disable-plugin',
|
|
'helloworld.py'),
|
|
('plugin',
|
|
'{}/helloworld.py'
|
|
.format(plugin_dir))]))
|
|
with pytest.raises(RpcError):
|
|
n.rpc.hello(name='Sun')
|
|
assert n.daemon.is_in_log('helloworld.py: disabled via disable-plugin')
|
|
n.stop()
|
|
|
|
# Both orders of explicit specification work.
|
|
n = node_factory.get_node(options=OrderedDict([('plugin',
|
|
'{}/helloworld.py'
|
|
.format(plugin_dir)),
|
|
('disable-plugin',
|
|
'helloworld.py')]))
|
|
with pytest.raises(RpcError):
|
|
n.rpc.hello(name='Sun')
|
|
assert n.daemon.is_in_log('helloworld.py: disabled via disable-plugin')
|
|
|
|
# Still disabled if we load directory.
|
|
n.rpc.plugin_startdir(directory=os.path.join(os.getcwd(), "contrib/plugins"))
|
|
n.daemon.wait_for_log('helloworld.py: disabled via disable-plugin')
|
|
n.stop()
|
|
|
|
# Check that list works
|
|
n = node_factory.get_node(options={'disable-plugin':
|
|
['something-else.py', 'helloworld.py']})
|
|
|
|
assert n.rpc.listconfigs()['disable-plugin'] == ['something-else.py', 'helloworld.py']
|
|
|
|
|
|
def test_plugin_hook(node_factory, executor):
|
|
"""The helloworld plugin registers a htlc_accepted hook.
|
|
|
|
The hook will sleep for a few seconds and log a
|
|
message. `lightningd` should wait for the response and only then
|
|
complete the payment.
|
|
|
|
"""
|
|
l1, l2 = node_factory.line_graph(2, opts={'plugin': os.path.join(os.getcwd(), 'contrib/plugins/helloworld.py')})
|
|
start_time = time.time()
|
|
f = executor.submit(l1.pay, l2, 100000)
|
|
l2.daemon.wait_for_log(r'on_htlc_accepted called')
|
|
|
|
# The hook will sleep for 20 seconds before answering, so `f`
|
|
# should take at least that long.
|
|
f.result()
|
|
end_time = time.time()
|
|
assert(end_time >= start_time + 20)
|
|
|
|
|
|
def test_plugin_connect_notifications(node_factory):
|
|
""" test 'connect' and 'disconnect' notifications
|
|
"""
|
|
l1, l2 = node_factory.get_nodes(2, opts={'plugin': os.path.join(os.getcwd(), 'contrib/plugins/helloworld.py')})
|
|
|
|
l1.connect(l2)
|
|
l1.daemon.wait_for_log(r'Received connect event')
|
|
l2.daemon.wait_for_log(r'Received connect event')
|
|
|
|
l2.rpc.disconnect(l1.info['id'])
|
|
l1.daemon.wait_for_log(r'Received disconnect event')
|
|
l2.daemon.wait_for_log(r'Received disconnect event')
|
|
|
|
|
|
def test_failing_plugins(directory):
|
|
fail_plugins = [
|
|
os.path.join(os.getcwd(), 'contrib/plugins/fail/failtimeout.py'),
|
|
os.path.join(os.getcwd(), 'contrib/plugins/fail/doesnotexist.py'),
|
|
]
|
|
|
|
for p in fail_plugins:
|
|
with pytest.raises(subprocess.CalledProcessError):
|
|
subprocess.check_output([
|
|
'lightningd/lightningd',
|
|
'--lightning-dir={}'.format(directory),
|
|
'--plugin={}'.format(p),
|
|
'--help',
|
|
])
|
|
|
|
|
|
def test_pay_plugin(node_factory):
|
|
l1, l2 = node_factory.line_graph(2)
|
|
inv = l2.rpc.invoice(123000, 'label', 'description', 3700)
|
|
|
|
res = l1.rpc.pay(bolt11=inv['bolt11'])
|
|
assert res['status'] == 'complete'
|
|
|
|
with pytest.raises(RpcError, match=r'missing required parameter'):
|
|
l1.rpc.call('pay')
|
|
|
|
# Make sure usage messages are present.
|
|
msg = 'pay bolt11 [amount_msat] [label] [riskfactor] [maxfeepercent] '\
|
|
'[retry_for] [maxdelay] [exemptfee] [localofferid] [exclude] '\
|
|
'[maxfee] [description]'
|
|
if DEVELOPER:
|
|
msg += ' [use_shadow]'
|
|
assert only_one(l1.rpc.help('pay')['help'])['command'] == msg
|
|
|
|
|
|
def test_plugin_connected_hook_chaining(node_factory):
|
|
""" l1 uses the logger_a, reject and logger_b plugin.
|
|
|
|
l1 is configured to accept connections from l2, but not from l3.
|
|
we check that logger_a is always called and logger_b only for l2.
|
|
"""
|
|
opts = [{'plugin':
|
|
[os.path.join(os.getcwd(),
|
|
'tests/plugins/peer_connected_logger_a.py'),
|
|
os.path.join(os.getcwd(),
|
|
'tests/plugins/reject.py'),
|
|
os.path.join(os.getcwd(),
|
|
'tests/plugins/peer_connected_logger_b.py')],
|
|
'allow_warning': True},
|
|
{},
|
|
{'allow_warning': True}]
|
|
|
|
l1, l2, l3 = node_factory.get_nodes(3, opts=opts)
|
|
l2id = l2.info['id']
|
|
l3id = l3.info['id']
|
|
l1.rpc.reject(l3.info['id'])
|
|
|
|
l2.connect(l1)
|
|
l1.daemon.wait_for_logs([
|
|
f"peer_connected_logger_a {l2id}",
|
|
f"{l2id} is allowed",
|
|
f"peer_connected_logger_b {l2id}"
|
|
])
|
|
assert len(l1.rpc.listpeers(l2id)['peers']) == 1
|
|
|
|
l3.connect(l1)
|
|
l1.daemon.wait_for_logs([
|
|
f"peer_connected_logger_a {l3id}",
|
|
f"{l3id} is in reject list"
|
|
])
|
|
|
|
# FIXME: this error occurs *after* connection, so we connect then drop.
|
|
l3.daemon.wait_for_log(r"-connectd: peer_in WIRE_WARNING")
|
|
l3.daemon.wait_for_log(r"You are in reject list")
|
|
|
|
def check_disconnect():
|
|
peers = l1.rpc.listpeers(l3id)['peers']
|
|
return peers == [] or not peers[0]['connected']
|
|
|
|
wait_for(check_disconnect)
|
|
assert not l1.daemon.is_in_log(f"peer_connected_logger_b {l3id}")
|
|
|
|
|
|
@pytest.mark.developer("localhost remote_addr will be filtered without DEVELOEPR")
|
|
def test_peer_connected_remote_addr(node_factory):
|
|
"""This tests the optional tlv `remote_addr` being passed to a plugin.
|
|
|
|
The optional tlv `remote_addr` should only be visible to the initiator l1.
|
|
"""
|
|
pluginpath = os.path.join(os.getcwd(), 'tests/plugins/peer_connected_logger_a.py')
|
|
l1, l2 = node_factory.get_nodes(2, opts={
|
|
'plugin': pluginpath,
|
|
'dev-allow-localhost': None})
|
|
l1id = l1.info['id']
|
|
l2id = l2.info['id']
|
|
|
|
l1.connect(l2)
|
|
l1log = l1.daemon.wait_for_log(f"peer_connected_logger_a {l2id}")
|
|
l2log = l2.daemon.wait_for_log(f"peer_connected_logger_a {l1id}")
|
|
|
|
# the log entries are followed by the peer_connected payload as dict {} like:
|
|
# {'id': '022d223...', 'direction': 'out', 'addr': '127.0.0.1:35289',
|
|
# 'remote_addr': '127.0.0.1:59582', 'features': '8808226aa2'}
|
|
l1payload = eval(l1log[l1log.find('{'):])
|
|
l2payload = eval(l2log[l2log.find('{'):])
|
|
|
|
# check that l1 sees its remote_addr as l2 sees l1
|
|
assert(l1payload['remote_addr'] == l2payload['addr'])
|
|
assert(not l2payload.get('remote_addr')) # l2 can't see a remote_addr
|
|
|
|
|
|
def test_async_rpcmethod(node_factory, executor):
|
|
"""This tests the async rpcmethods.
|
|
|
|
It works in conjunction with the `asynctest` plugin which stashes
|
|
requests and then resolves all of them on the fifth call.
|
|
"""
|
|
l1 = node_factory.get_node(options={'plugin': os.path.join(os.getcwd(), 'tests/plugins/asynctest.py')})
|
|
|
|
results = []
|
|
for i in range(10):
|
|
results.append(executor.submit(l1.rpc.asyncqueue))
|
|
|
|
time.sleep(3)
|
|
|
|
# None of these should have returned yet
|
|
assert len([r for r in results if r.done()]) == 0
|
|
|
|
# This last one triggers the release and all results should be 42,
|
|
# since the last number is returned for all
|
|
l1.rpc.asyncflush(42)
|
|
|
|
assert [r.result() for r in results] == [42] * len(results)
|
|
|
|
|
|
@unittest.skipIf(os.getenv('TEST_DB_PROVIDER', 'sqlite3') != 'sqlite3', "Only sqlite3 implements the db_write_hook currently")
|
|
def test_db_hook(node_factory, executor):
|
|
"""This tests the db hook."""
|
|
dbfile = os.path.join(node_factory.directory, "dblog.sqlite3")
|
|
l1 = node_factory.get_node(options={'plugin': os.path.join(os.getcwd(), 'tests/plugins/dblog.py'),
|
|
'dblog-file': dbfile})
|
|
|
|
# It should see the db being created, and sometime later actually get
|
|
# initted.
|
|
# This precedes startup, so needle already past
|
|
assert l1.daemon.is_in_log(r'plugin-dblog.py: deferring \d+ commands')
|
|
l1.daemon.logsearch_start = 0
|
|
l1.daemon.wait_for_log('plugin-dblog.py: replaying pre-init data:')
|
|
l1.daemon.wait_for_log('plugin-dblog.py: CREATE TABLE version \\(version INTEGER\\)')
|
|
l1.daemon.wait_for_log("plugin-dblog.py: initialized.* 'startup': True")
|
|
|
|
l1.stop()
|
|
|
|
# Databases should be identical.
|
|
db1 = sqlite3.connect(os.path.join(l1.daemon.lightning_dir, TEST_NETWORK, 'lightningd.sqlite3'))
|
|
db2 = sqlite3.connect(dbfile)
|
|
|
|
assert [x for x in db1.iterdump()] == [x for x in db2.iterdump()]
|
|
|
|
|
|
@unittest.skipIf(os.getenv('TEST_DB_PROVIDER', 'sqlite3') != 'sqlite3', "Only sqlite3 implements the db_write_hook currently")
|
|
def test_db_hook_multiple(node_factory, executor):
|
|
"""This tests the db hook for multiple-plugin case."""
|
|
dbfile = os.path.join(node_factory.directory, "dblog.sqlite3")
|
|
l1 = node_factory.get_node(options={'plugin': os.path.join(os.getcwd(), 'tests/plugins/dblog.py'),
|
|
'important-plugin': os.path.join(os.getcwd(), 'tests/plugins/dbdummy.py'),
|
|
'dblog-file': dbfile})
|
|
|
|
# It should see the db being created, and sometime later actually get
|
|
# initted.
|
|
# This precedes startup, so needle already past
|
|
assert l1.daemon.is_in_log(r'plugin-dblog.py: deferring \d+ commands')
|
|
l1.daemon.logsearch_start = 0
|
|
l1.daemon.wait_for_log('plugin-dblog.py: replaying pre-init data:')
|
|
l1.daemon.wait_for_log('plugin-dblog.py: CREATE TABLE version \\(version INTEGER\\)')
|
|
l1.daemon.wait_for_log("plugin-dblog.py: initialized.* 'startup': True")
|
|
|
|
l1.stop()
|
|
|
|
# Databases should be identical.
|
|
db1 = sqlite3.connect(os.path.join(l1.daemon.lightning_dir, TEST_NETWORK, 'lightningd.sqlite3'))
|
|
db2 = sqlite3.connect(dbfile)
|
|
|
|
assert [x for x in db1.iterdump()] == [x for x in db2.iterdump()]
|
|
|
|
|
|
def test_utf8_passthrough(node_factory, executor):
|
|
l1 = node_factory.get_node(options={'plugin': os.path.join(os.getcwd(), 'tests/plugins/utf8.py'),
|
|
'log-level': 'io'})
|
|
|
|
# This works because Python unmangles.
|
|
res = l1.rpc.call('utf8', ['ナンセンス 1杯'])
|
|
assert '\\u' not in res['utf8']
|
|
assert res['utf8'] == 'ナンセンス 1杯'
|
|
|
|
# Now, try native.
|
|
out = subprocess.check_output(['cli/lightning-cli',
|
|
'--network={}'.format(TEST_NETWORK),
|
|
'--lightning-dir={}'
|
|
.format(l1.daemon.lightning_dir),
|
|
'utf8', 'ナンセンス 1杯']).decode('utf-8')
|
|
assert '\\u' not in out
|
|
assert out == '{\n "utf8": "ナンセンス 1杯"\n}\n'
|
|
|
|
|
|
def test_invoice_payment_hook(node_factory):
|
|
""" l1 uses the reject-payment plugin to reject invoices with odd preimages.
|
|
"""
|
|
opts = [{}, {'plugin': os.path.join(os.getcwd(), 'tests/plugins/reject_some_invoices.py')}]
|
|
l1, l2 = node_factory.line_graph(2, opts=opts)
|
|
|
|
# This one works
|
|
inv1 = l2.rpc.invoice(1230, 'label', 'description', preimage='1' * 64)
|
|
l1.rpc.pay(inv1['bolt11'])
|
|
|
|
l2.daemon.wait_for_log('label=label')
|
|
l2.daemon.wait_for_log('msat=')
|
|
l2.daemon.wait_for_log('preimage=' + '1' * 64)
|
|
|
|
# This one will be rejected.
|
|
inv2 = l2.rpc.invoice(1230, 'label2', 'description', preimage='0' * 64)
|
|
with pytest.raises(RpcError):
|
|
l1.rpc.pay(inv2['bolt11'])
|
|
|
|
pstatus = l1.rpc.call('paystatus', [inv2['bolt11']])['pay'][0]
|
|
assert pstatus['attempts'][-1]['failure']['data']['failcodename'] == 'WIRE_TEMPORARY_NODE_FAILURE'
|
|
|
|
l2.daemon.wait_for_log('label=label2')
|
|
l2.daemon.wait_for_log('msat=')
|
|
l2.daemon.wait_for_log('preimage=' + '0' * 64)
|
|
|
|
|
|
def test_invoice_payment_hook_hold(node_factory):
|
|
""" l1 uses the hold_invoice plugin to delay invoice payment.
|
|
"""
|
|
opts = [{}, {'plugin': os.path.join(os.getcwd(), 'tests/plugins/hold_invoice.py'), 'holdtime': TIMEOUT / 2}]
|
|
l1, l2 = node_factory.line_graph(2, opts=opts)
|
|
|
|
inv1 = l2.rpc.invoice(1230, 'label', 'description', preimage='1' * 64)
|
|
l1.rpc.pay(inv1['bolt11'])
|
|
|
|
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_openchannel_hook(node_factory, bitcoind):
|
|
""" l2 uses the reject_odd_funding_amounts plugin to reject some openings.
|
|
"""
|
|
opts = [{}, {'plugin': os.path.join(os.getcwd(), 'tests/plugins/reject_odd_funding_amounts.py')}]
|
|
l1, l2 = node_factory.line_graph(2, fundchannel=False, opts=opts)
|
|
l1.fundwallet(10**6)
|
|
|
|
# Even amount: works.
|
|
l1.rpc.fundchannel(l2.info['id'], 100000)
|
|
|
|
# Make sure plugin got all the vars we expect
|
|
expected = {
|
|
'channel_flags': '1',
|
|
'dust_limit_msat': 546000,
|
|
'htlc_minimum_msat': 0,
|
|
'id': l1.info['id'],
|
|
'max_accepted_htlcs': '483',
|
|
'max_htlc_value_in_flight_msat': 18446744073709551615,
|
|
'to_self_delay': '5',
|
|
}
|
|
|
|
if l2.config('experimental-dual-fund'):
|
|
# openchannel2 var checks
|
|
expected.update({
|
|
'channel_id': '.*',
|
|
'commitment_feerate_per_kw': '7500',
|
|
'funding_feerate_per_kw': '7500',
|
|
'feerate_our_max': '150000',
|
|
'feerate_our_min': '1875',
|
|
'locktime': '.*',
|
|
'their_funding_msat': 100000000,
|
|
'channel_max_msat': 16777215000,
|
|
})
|
|
else:
|
|
expected.update({
|
|
'channel_reserve_msat': 1000000,
|
|
'feerate_per_kw': '7500',
|
|
'funding_msat': 100000000,
|
|
'push_msat': 0,
|
|
})
|
|
|
|
l2.daemon.wait_for_log('reject_odd_funding_amounts.py: {} VARS'.format(len(expected)))
|
|
for k, v in expected.items():
|
|
assert l2.daemon.is_in_log('reject_odd_funding_amounts.py: {}={}'.format(k, v))
|
|
|
|
# Close it.
|
|
txid = l1.rpc.close(l2.info['id'])['txid']
|
|
bitcoind.generate_block(1, txid)
|
|
wait_for(lambda: [c['state'] for c in only_one(l1.rpc.listpeers(l2.info['id'])['peers'])['channels']] == ['ONCHAIN'])
|
|
|
|
# Odd amount: fails
|
|
l1.connect(l2)
|
|
with pytest.raises(RpcError, match=r"I don't like odd amounts"):
|
|
l1.rpc.fundchannel(l2.info['id'], 100001)
|
|
|
|
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_openchannel_hook_error_handling(node_factory, bitcoind):
|
|
""" l2 uses a plugin that should fatal() crash the node.
|
|
|
|
This is because the plugin rejects a channel while
|
|
also setting a close_to address which isn't allowed.
|
|
"""
|
|
opts = {'plugin': os.path.join(os.getcwd(), 'tests/plugins/openchannel_hook_accepter.py')}
|
|
# openchannel_reject_but_set_close_to.py')}
|
|
l1 = node_factory.get_node()
|
|
l2 = node_factory.get_node(options=opts,
|
|
expect_fail=True,
|
|
may_fail=True,
|
|
allow_broken_log=True)
|
|
l1.connect(l2)
|
|
l1.fundwallet(10**6)
|
|
|
|
# next fundchannel should fail fatal() for l2
|
|
with pytest.raises(RpcError, match=r'Owning subdaemon (openingd|dualopend) died'):
|
|
l1.rpc.fundchannel(l2.info['id'], 100004)
|
|
assert l2.daemon.is_in_log("BROKEN.*Plugin rejected openchannel[2]? but also set close_to")
|
|
|
|
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_openchannel_hook_chaining(node_factory, bitcoind):
|
|
""" l2 uses a set of plugin that all use the openchannel_hook.
|
|
|
|
We test that chaining works by using multiple plugins in a way
|
|
that we check for the first plugin that rejects prevents from evaluating
|
|
further plugin responses down the chain.
|
|
|
|
"""
|
|
opts = [{}, {'plugin': [
|
|
os.path.join(os.path.dirname(__file__), '..', 'tests/plugins/openchannel_hook_accept.py'),
|
|
os.path.join(os.path.dirname(__file__), '..', 'tests/plugins/openchannel_hook_accepter.py'),
|
|
os.path.join(os.path.dirname(__file__), '..', 'tests/plugins/openchannel_hook_reject.py')
|
|
]}]
|
|
l1, l2 = node_factory.line_graph(2, fundchannel=False, opts=opts)
|
|
l1.fundwallet(10**6)
|
|
|
|
hook_msg = "openchannel2? hook rejects and says '"
|
|
# 100005sat fundchannel should fail fatal() for l2
|
|
# because hook_accepter.py rejects on that amount 'for a reason'
|
|
with pytest.raises(RpcError, match=r'reject for a reason'):
|
|
l1.rpc.fundchannel(l2.info['id'], 100005)
|
|
|
|
assert l2.daemon.wait_for_log(hook_msg + "reject for a reason")
|
|
# first plugin in the chain was called
|
|
assert l2.daemon.is_in_log("accept on principle")
|
|
# the third plugin must now not be called anymore
|
|
assert not l2.daemon.is_in_log("reject on principle")
|
|
|
|
wait_for(lambda: l1.rpc.listpeers()['peers'] == [])
|
|
l1.rpc.connect(l2.info['id'], 'localhost', l2.port)
|
|
# 100000sat is good for hook_accepter, so it should fail 'on principle'
|
|
# at third hook openchannel_reject.py
|
|
with pytest.raises(RpcError, match=r'reject on principle'):
|
|
l1.rpc.fundchannel(l2.info['id'], 100000)
|
|
assert l2.daemon.wait_for_log(hook_msg + "reject on principle")
|
|
|
|
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_channel_state_changed_bilateral(node_factory, bitcoind):
|
|
""" We open and close a channel and check notifications both sides.
|
|
|
|
The misc_notifications.py plugin logs `channel_state_changed` events.
|
|
"""
|
|
opts = {"plugin": os.path.join(os.getcwd(), "tests/plugins/misc_notifications.py")}
|
|
l1, l2 = node_factory.line_graph(2, opts=opts)
|
|
|
|
l1_id = l1.rpc.getinfo()["id"]
|
|
l2_id = l2.rpc.getinfo()["id"]
|
|
cid = l1.get_channel_id(l2)
|
|
scid = l1.get_channel_scid(l2)
|
|
|
|
# a helper that gives us the next channel_state_changed log entry
|
|
def wait_for_event(node):
|
|
msg = node.daemon.wait_for_log("channel_state_changed.*new_state.*")
|
|
event = ast.literal_eval(re.findall(".*({.*}).*", msg)[0])
|
|
return event
|
|
|
|
# check channel 'opener' and 'closer' within this testcase ...
|
|
assert(l1.rpc.listpeers()['peers'][0]['channels'][0]['opener'] == 'local')
|
|
assert(l2.rpc.listpeers()['peers'][0]['channels'][0]['opener'] == 'remote')
|
|
# the 'closer' should be missing initially
|
|
assert 'closer' not in l1.rpc.listpeers()['peers'][0]['channels'][0]
|
|
assert 'closer' not in l2.rpc.listpeers()['peers'][0]['channels'][0]
|
|
|
|
event1 = wait_for_event(l1)
|
|
event2 = wait_for_event(l2)
|
|
assert(event1['peer_id'] == l2_id) # we only test these IDs the first time
|
|
assert(event1['channel_id'] == cid)
|
|
assert(event1['short_channel_id'] is None) # None until locked in
|
|
assert(event1['cause'] == "user")
|
|
|
|
assert(event2['peer_id'] == l1_id) # we only test these IDs the first time
|
|
assert(event2['channel_id'] == cid)
|
|
assert(event2['short_channel_id'] is None) # None until locked in
|
|
assert(event2['cause'] == "remote")
|
|
|
|
for ev in [event1, event2]:
|
|
# Dual funded channels
|
|
if l1.config('experimental-dual-fund'):
|
|
assert(ev['old_state'] == "DUALOPEND_OPEN_INIT")
|
|
assert(ev['new_state'] == "DUALOPEND_AWAITING_LOCKIN")
|
|
assert(ev['message'] == "Sigs exchanged, waiting for lock-in")
|
|
else:
|
|
assert(ev['old_state'] == "unknown")
|
|
assert(ev['new_state'] == "CHANNELD_AWAITING_LOCKIN")
|
|
assert(ev['message'] == "new channel opened")
|
|
|
|
event1 = wait_for_event(l1)
|
|
event2 = wait_for_event(l2)
|
|
assert(event1['short_channel_id'] == scid)
|
|
if l1.config('experimental-dual-fund'):
|
|
assert(event1['old_state'] == "DUALOPEND_AWAITING_LOCKIN")
|
|
else:
|
|
assert(event1['old_state'] == "CHANNELD_AWAITING_LOCKIN")
|
|
assert(event1['new_state'] == "CHANNELD_NORMAL")
|
|
assert(event1['cause'] == "user")
|
|
assert(event1['message'] == "Lockin complete")
|
|
|
|
assert(event2['short_channel_id'] == scid)
|
|
if l1.config('experimental-dual-fund'):
|
|
assert(event2['old_state'] == "DUALOPEND_AWAITING_LOCKIN")
|
|
else:
|
|
assert(event2['old_state'] == "CHANNELD_AWAITING_LOCKIN")
|
|
assert(event2['new_state'] == "CHANNELD_NORMAL")
|
|
assert(event2['cause'] == "remote")
|
|
assert(event2['message'] == "Lockin complete")
|
|
|
|
# also test the correctness of timestamps once
|
|
assert(datetime.strptime(event1['timestamp'], '%Y-%m-%dT%H:%M:%S.%fZ'))
|
|
assert(datetime.strptime(event2['timestamp'], '%Y-%m-%dT%H:%M:%S.%fZ'))
|
|
|
|
# close channel and look for stateful events
|
|
l1.rpc.close(scid)
|
|
|
|
event1 = wait_for_event(l1)
|
|
assert(event1['old_state'] == "CHANNELD_NORMAL")
|
|
assert(event1['new_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(event1['cause'] == "user")
|
|
assert(event1['message'] == "User or plugin invoked close command")
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "CHANNELD_NORMAL")
|
|
assert(event2['new_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(event2['cause'] == "remote")
|
|
assert(event2['message'] == "Peer closes channel")
|
|
|
|
# 'closer' should now be set accordingly ...
|
|
assert(l1.rpc.listpeers()['peers'][0]['channels'][0]['closer'] == 'local')
|
|
assert(l2.rpc.listpeers()['peers'][0]['channels'][0]['closer'] == 'remote')
|
|
|
|
event1 = wait_for_event(l1)
|
|
assert(event1['old_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(event1['new_state'] == "CLOSINGD_SIGEXCHANGE")
|
|
assert(event1['cause'] == "user")
|
|
assert(event1['message'] == "Start closingd")
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(event2['new_state'] == "CLOSINGD_SIGEXCHANGE")
|
|
assert(event2['cause'] == "remote")
|
|
assert(event2['message'] == "Start closingd")
|
|
|
|
event1 = wait_for_event(l1)
|
|
assert(event1['old_state'] == "CLOSINGD_SIGEXCHANGE")
|
|
assert(event1['new_state'] == "CLOSINGD_COMPLETE")
|
|
assert(event1['cause'] == "user")
|
|
assert(event1['message'] == "Closing complete")
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "CLOSINGD_SIGEXCHANGE")
|
|
assert(event2['new_state'] == "CLOSINGD_COMPLETE")
|
|
assert(event2['cause'] == "remote")
|
|
assert(event2['message'] == "Closing complete")
|
|
|
|
bitcoind.generate_block(100, wait_for_mempool=1) # so it gets settled
|
|
|
|
event1 = wait_for_event(l1)
|
|
assert(event1['old_state'] == "CLOSINGD_COMPLETE")
|
|
assert(event1['new_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event1['cause'] == "user")
|
|
assert(event1['message'] == "Onchain funding spend")
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "CLOSINGD_COMPLETE")
|
|
assert(event2['new_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event2['cause'] == "remote")
|
|
assert(event2['message'] == "Onchain funding spend")
|
|
|
|
event1 = wait_for_event(l1)
|
|
assert(event1['old_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event1['new_state'] == "ONCHAIN")
|
|
assert(event1['cause'] == "user")
|
|
assert(event1['message'] == "Onchain init reply")
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event2['new_state'] == "ONCHAIN")
|
|
assert(event2['cause'] == "remote")
|
|
assert(event2['message'] == "Onchain init reply")
|
|
|
|
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_channel_state_changed_unilateral(node_factory, bitcoind):
|
|
""" We open, disconnect, force-close a channel and check for notifications.
|
|
|
|
The misc_notifications.py plugin logs `channel_state_changed` events.
|
|
"""
|
|
opts = {"plugin": os.path.join(os.getcwd(), "tests/plugins/misc_notifications.py"),
|
|
"allow_warning": True,
|
|
'may_reconnect': True}
|
|
|
|
l1, l2 = node_factory.line_graph(2, opts=opts)
|
|
|
|
l1_id = l1.rpc.getinfo()["id"]
|
|
cid = l1.get_channel_id(l2)
|
|
scid = l1.get_channel_scid(l2)
|
|
|
|
# a helper that gives us the next channel_state_changed log entry
|
|
def wait_for_event(node):
|
|
msg = node.daemon.wait_for_log("channel_state_changed.*new_state.*")
|
|
event = ast.literal_eval(re.findall(".*({.*}).*", msg)[0])
|
|
return event
|
|
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['peer_id'] == l1_id)
|
|
assert(event2['channel_id'] == cid)
|
|
assert(event2['short_channel_id'] is None)
|
|
assert(event2['cause'] == "remote")
|
|
|
|
if l2.config('experimental-dual-fund'):
|
|
assert(event2['old_state'] == "DUALOPEND_OPEN_INIT")
|
|
assert(event2['new_state'] == "DUALOPEND_AWAITING_LOCKIN")
|
|
assert(event2['message'] == "Sigs exchanged, waiting for lock-in")
|
|
else:
|
|
assert(event2['old_state'] == "unknown")
|
|
assert(event2['new_state'] == "CHANNELD_AWAITING_LOCKIN")
|
|
assert(event2['message'] == "new channel opened")
|
|
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['short_channel_id'] == scid)
|
|
if l2.config('experimental-dual-fund'):
|
|
assert(event2['old_state'] == "DUALOPEND_AWAITING_LOCKIN")
|
|
else:
|
|
assert(event2['old_state'] == "CHANNELD_AWAITING_LOCKIN")
|
|
assert(event2['new_state'] == "CHANNELD_NORMAL")
|
|
assert(event2['cause'] == "remote")
|
|
assert(event2['message'] == "Lockin complete")
|
|
|
|
# close channel unilaterally and look for stateful events
|
|
l1.rpc.stop()
|
|
wait_for(lambda: not only_one(l2.rpc.listpeers()['peers'])['connected'])
|
|
l2.rpc.close(scid, 1) # force close after 1sec timeout
|
|
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "CHANNELD_NORMAL")
|
|
assert(event2['new_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(event2['cause'] == "user")
|
|
assert(event2['message'] == "User or plugin invoked close command")
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(event2['new_state'] == "AWAITING_UNILATERAL")
|
|
assert(event2['cause'] == "user")
|
|
assert(event2['message'] == "Forcibly closed by `close` command timeout")
|
|
|
|
# restart l1 now, it will reconnect and l2 will send it an error.
|
|
l1.restart()
|
|
wait_for(lambda: len(l1.rpc.listpeers()['peers']) == 1)
|
|
# check 'closer' on l2 while the peer is not yet forgotten
|
|
assert(l2.rpc.listpeers()['peers'][0]['channels'][0]['closer'] == 'local')
|
|
if EXPERIMENTAL_DUAL_FUND:
|
|
l1.daemon.wait_for_log(r'Peer has reconnected, state')
|
|
l2.daemon.wait_for_log(r'Telling connectd to send error')
|
|
|
|
# l1 will receive error, and go into AWAITING_UNILATERAL
|
|
# FIXME: l2 should re-xmit shutdown, but it doesn't until it's mined :(
|
|
event1 = wait_for_event(l1)
|
|
# Doesn't have closer, since it blames the "protocol"?
|
|
assert 'closer' not in l1.rpc.listpeers()['peers'][0]['channels'][0]
|
|
assert(event1['old_state'] == "CHANNELD_NORMAL")
|
|
assert(event1['new_state'] == "AWAITING_UNILATERAL")
|
|
assert(event1['cause'] == "protocol")
|
|
assert(event1['message'] == "channeld: received ERROR error channel {}: Forcibly closed by `close` command timeout".format(cid))
|
|
|
|
# settle the channel closure
|
|
bitcoind.generate_block(100)
|
|
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "AWAITING_UNILATERAL")
|
|
assert(event2['new_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event2['cause'] == "user")
|
|
assert(event2['message'] == "Onchain funding spend")
|
|
event2 = wait_for_event(l2)
|
|
assert(event2['old_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event2['new_state'] == "ONCHAIN")
|
|
assert(event2['cause'] == "user")
|
|
assert(event2['message'] == "Onchain init reply")
|
|
|
|
# Check 'closer' on l1 while the peer is not yet forgotten
|
|
event1 = wait_for_event(l1)
|
|
assert(l1.rpc.listpeers()['peers'][0]['channels'][0]['closer'] == 'remote')
|
|
|
|
assert(event1['old_state'] == "AWAITING_UNILATERAL")
|
|
assert(event1['new_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event1['cause'] == "onchain")
|
|
assert(event1['message'] == "Onchain funding spend")
|
|
|
|
event1 = wait_for_event(l1)
|
|
assert(event1['old_state'] == "FUNDING_SPEND_SEEN")
|
|
assert(event1['new_state'] == "ONCHAIN")
|
|
assert(event1['cause'] == "onchain")
|
|
assert(event1['message'] == "Onchain init reply")
|
|
|
|
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_channel_state_change_history(node_factory, bitcoind):
|
|
""" We open and close a channel and check for state_canges entries.
|
|
|
|
"""
|
|
l1, l2 = node_factory.line_graph(2)
|
|
scid = l1.get_channel_scid(l2)
|
|
|
|
l1.rpc.close(scid)
|
|
bitcoind.generate_block(100) # so it gets settled
|
|
bitcoind.generate_block(100) # so it gets settled
|
|
|
|
history = l1.rpc.listpeers()['peers'][0]['channels'][0]['state_changes']
|
|
if l1.config('experimental-dual-fund'):
|
|
assert(history[0]['cause'] == "user")
|
|
assert(history[0]['old_state'] == "DUALOPEND_OPEN_INIT")
|
|
assert(history[0]['new_state'] == "DUALOPEND_AWAITING_LOCKIN")
|
|
assert(history[1]['cause'] == "user")
|
|
assert(history[1]['old_state'] == "DUALOPEND_AWAITING_LOCKIN")
|
|
assert(history[1]['new_state'] == "CHANNELD_NORMAL")
|
|
assert(history[2]['cause'] == "user")
|
|
assert(history[2]['new_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(history[3]['cause'] == "user")
|
|
assert(history[3]['new_state'] == "CLOSINGD_SIGEXCHANGE")
|
|
assert(history[4]['cause'] == "user")
|
|
assert(history[4]['new_state'] == "CLOSINGD_COMPLETE")
|
|
assert(history[4]['message'] == "Closing complete")
|
|
else:
|
|
assert(history[0]['cause'] == "user")
|
|
assert(history[0]['old_state'] == "CHANNELD_AWAITING_LOCKIN")
|
|
assert(history[0]['new_state'] == "CHANNELD_NORMAL")
|
|
assert(history[1]['cause'] == "user")
|
|
assert(history[1]['new_state'] == "CHANNELD_SHUTTING_DOWN")
|
|
assert(history[2]['cause'] == "user")
|
|
assert(history[2]['new_state'] == "CLOSINGD_SIGEXCHANGE")
|
|
assert(history[3]['cause'] == "user")
|
|
assert(history[3]['new_state'] == "CLOSINGD_COMPLETE")
|
|
assert(history[3]['message'] == "Closing complete")
|
|
|
|
|
|
@pytest.mark.developer("without DEVELOPER=1, gossip v slow")
|
|
def test_htlc_accepted_hook_fail(node_factory):
|
|
"""Send payments from l1 to l2, but l2 just declines everything.
|
|
|
|
l2 is configured with a plugin that'll hook into htlc_accepted and
|
|
always return failures. The same should also work for forwarded
|
|
htlcs in the second half.
|
|
|
|
"""
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=[
|
|
{},
|
|
{'plugin': os.path.join(os.getcwd(), 'tests/plugins/fail_htlcs.py')},
|
|
{}
|
|
], wait_for_announce=True)
|
|
|
|
# This must fail
|
|
inv = l2.rpc.invoice(1000, "lbl", "desc")
|
|
phash = inv['payment_hash']
|
|
route = l1.rpc.getroute(l2.info['id'], 1000, 1)['route']
|
|
|
|
# Here shouldn't use `pay` command because l2 rejects with WIRE_TEMPORARY_NODE_FAILURE,
|
|
# then it will be excluded when l1 try another pay attempt.
|
|
# Note if the destination is excluded, the route result is undefined.
|
|
l1.rpc.sendpay(route, phash, payment_secret=inv['payment_secret'])
|
|
with pytest.raises(RpcError) as excinfo:
|
|
l1.rpc.waitsendpay(phash)
|
|
assert excinfo.value.error['data']['failcode'] == 0x2002
|
|
assert excinfo.value.error['data']['erring_index'] == 1
|
|
|
|
# And the invoice must still be unpaid
|
|
inv = l2.rpc.listinvoices("lbl")['invoices']
|
|
assert len(inv) == 1 and inv[0]['status'] == 'unpaid'
|
|
|
|
# Now try with forwarded HTLCs: l2 should still fail them
|
|
# This must fail
|
|
inv = l3.rpc.invoice(1000, "lbl", "desc")['bolt11']
|
|
with pytest.raises(RpcError):
|
|
l1.rpc.pay(inv)
|
|
|
|
# And the invoice must still be unpaid
|
|
inv = l3.rpc.listinvoices("lbl")['invoices']
|
|
assert len(inv) == 1 and inv[0]['status'] == 'unpaid'
|
|
|
|
|
|
@pytest.mark.developer("without DEVELOPER=1, gossip v slow")
|
|
def test_htlc_accepted_hook_resolve(node_factory):
|
|
"""l3 creates an invoice, l2 knows the preimage and will shortcircuit.
|
|
"""
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=[
|
|
{},
|
|
{'plugin': os.path.join(os.getcwd(), 'tests/plugins/shortcircuit.py')},
|
|
{}
|
|
], wait_for_announce=True)
|
|
|
|
inv = l3.rpc.invoice(amount_msat=1000, label="lbl", description="desc", preimage="00" * 32)['bolt11']
|
|
l1.rpc.pay(inv)
|
|
|
|
# And the invoice must still be unpaid
|
|
inv = l3.rpc.listinvoices("lbl")['invoices']
|
|
assert len(inv) == 1 and inv[0]['status'] == 'unpaid'
|
|
|
|
|
|
def test_htlc_accepted_hook_direct_restart(node_factory, executor):
|
|
"""l2 restarts while it is pondering what to do with an HTLC.
|
|
"""
|
|
l1, l2 = node_factory.line_graph(2, opts=[
|
|
{'may_reconnect': True},
|
|
{'may_reconnect': True,
|
|
'plugin': os.path.join(os.getcwd(), 'tests/plugins/hold_htlcs.py')}
|
|
])
|
|
|
|
i1 = l2.rpc.invoice(amount_msat=1000, label="direct", description="desc")['bolt11']
|
|
f1 = executor.submit(l1.rpc.pay, i1)
|
|
|
|
l2.daemon.wait_for_log(r'Holding onto an incoming htlc for 10 seconds')
|
|
|
|
# Check that the status mentions the HTLC being held
|
|
l2.rpc.listpeers()
|
|
peers = l2.rpc.listpeers()['peers']
|
|
htlc_status = peers[0]['channels'][0]['htlcs'][0].get('status', None)
|
|
assert htlc_status == "Waiting for the htlc_accepted hook of plugin hold_htlcs.py"
|
|
|
|
needle = l2.daemon.logsearch_start
|
|
l2.restart()
|
|
|
|
# Now it should try again, *after* initializing.
|
|
# This may be before "Server started with public key" swallowed by restart()
|
|
l2.daemon.logsearch_start = needle + 1
|
|
l2.daemon.wait_for_log(r'hold_htlcs.py initializing')
|
|
l2.daemon.wait_for_log(r'Holding onto an incoming htlc for 10 seconds')
|
|
f1.result()
|
|
|
|
|
|
@pytest.mark.developer("without DEVELOPER=1, gossip v slow")
|
|
def test_htlc_accepted_hook_forward_restart(node_factory, executor):
|
|
"""l2 restarts while it is pondering what to do with an HTLC.
|
|
"""
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=[
|
|
{'may_reconnect': True},
|
|
{'may_reconnect': True,
|
|
'plugin': os.path.join(os.getcwd(), 'tests/plugins/hold_htlcs.py')},
|
|
{'may_reconnect': True},
|
|
], wait_for_announce=True)
|
|
|
|
i1 = l3.rpc.invoice(amount_msat=1000, label="direct", description="desc")['bolt11']
|
|
f1 = executor.submit(l1.dev_pay, i1, use_shadow=False)
|
|
|
|
l2.daemon.wait_for_log(r'Holding onto an incoming htlc for 10 seconds')
|
|
|
|
needle = l2.daemon.logsearch_start
|
|
l2.restart()
|
|
|
|
# Now it should try again, *after* initializing.
|
|
# This may be before "Server started with public key" swallowed by restart()
|
|
l2.daemon.logsearch_start = needle + 1
|
|
l2.daemon.wait_for_log(r'hold_htlcs.py initializing')
|
|
l2.daemon.wait_for_log(r'Holding onto an incoming htlc for 10 seconds')
|
|
|
|
# Grab the file where the plugin wrote the onion and read it in for some
|
|
# additional checks
|
|
logline = l2.daemon.wait_for_log(r'Onion written to')
|
|
fname = re.search(r'Onion written to (.*\.json)', logline).group(1)
|
|
onion = json.load(open(fname))
|
|
assert onion['type'] == 'tlv'
|
|
assert re.match(r'^11020203e80401..0608................$', onion['payload'])
|
|
assert len(onion['shared_secret']) == 64
|
|
assert onion['forward_msat'] == Millisatoshi(1000)
|
|
assert len(onion['next_onion']) == 2 * (1300 + 32 + 33 + 1)
|
|
|
|
f1.result()
|
|
|
|
|
|
def test_warning_notification(node_factory):
|
|
""" test 'warning' notifications
|
|
"""
|
|
l1 = node_factory.get_node(options={'plugin': os.path.join(os.getcwd(), 'tests/plugins/pretend_badlog.py')}, allow_broken_log=True)
|
|
|
|
# 1. test 'warn' level
|
|
event = "Test warning notification(for unusual event)"
|
|
l1.rpc.call('pretendbad', {'event': event, 'level': 'warn'})
|
|
|
|
# ensure an unusual log_entry was produced by 'pretendunusual' method
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: Test warning notification\\(for unusual event\\)')
|
|
|
|
# now wait for notification
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: Received warning')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: level: warn')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: time: *')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: source: plugin-pretend_badlog.py')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: log: Test warning notification\\(for unusual event\\)')
|
|
|
|
# 2. test 'error' level, steps like above
|
|
event = "Test warning notification(for broken event)"
|
|
l1.rpc.call('pretendbad', {'event': event, 'level': 'error'})
|
|
l1.daemon.wait_for_log(r'\*\*BROKEN\*\* plugin-pretend_badlog.py: Test warning notification\(for broken event\)')
|
|
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: Received warning')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: level: error')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: time: *')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: source: plugin-pretend_badlog.py')
|
|
l1.daemon.wait_for_log('plugin-pretend_badlog.py: log: Test warning notification\\(for broken event\\)')
|
|
|
|
|
|
@pytest.mark.developer("needs to deactivate shadow routing")
|
|
def test_invoice_payment_notification(node_factory):
|
|
"""
|
|
Test the 'invoice_payment' notification
|
|
"""
|
|
opts = [{}, {"plugin": os.path.join(os.getcwd(), "contrib/plugins/helloworld.py")}]
|
|
l1, l2 = node_factory.line_graph(2, opts=opts)
|
|
|
|
msats = 12345
|
|
preimage = '1' * 64
|
|
label = "a_descriptive_label"
|
|
inv1 = l2.rpc.invoice(msats, label, 'description', preimage=preimage)
|
|
l1.dev_pay(inv1['bolt11'], use_shadow=False)
|
|
|
|
l2.daemon.wait_for_log(r"Received invoice_payment event for label {},"
|
|
" preimage {}, and amount of {}msat"
|
|
.format(label, preimage, msats))
|
|
|
|
|
|
@pytest.mark.developer("needs to deactivate shadow routing")
|
|
def test_invoice_creation_notification(node_factory):
|
|
"""
|
|
Test the 'invoice_creation' notification
|
|
"""
|
|
opts = [{}, {"plugin": os.path.join(os.getcwd(), "contrib/plugins/helloworld.py")}]
|
|
l1, l2 = node_factory.line_graph(2, opts=opts)
|
|
|
|
msats = 12345
|
|
preimage = '1' * 64
|
|
label = "a_descriptive_label"
|
|
l2.rpc.invoice(msats, label, 'description', preimage=preimage)
|
|
|
|
l2.daemon.wait_for_log(r"Received invoice_creation event for label {},"
|
|
" preimage {}, and amount of {}msat"
|
|
.format(label, preimage, msats))
|
|
|
|
|
|
def test_channel_opened_notification(node_factory):
|
|
"""
|
|
Test the 'channel_opened' notification sent at channel funding success.
|
|
"""
|
|
opts = [{}, {"plugin": os.path.join(os.getcwd(), "tests/plugins/misc_notifications.py")}]
|
|
amount = 10**6
|
|
l1, l2 = node_factory.line_graph(2, fundchannel=True, fundamount=amount,
|
|
opts=opts)
|
|
|
|
# Might have already passed, so reset start.
|
|
l2.daemon.logsearch_start = 0
|
|
l2.daemon.wait_for_log(r"A channel was opened to us by {}, "
|
|
"with an amount of {}*"
|
|
.format(l1.info["id"], amount))
|
|
|
|
|
|
@pytest.mark.developer("needs DEVELOPER=1")
|
|
def test_forward_event_notification(node_factory, bitcoind, executor):
|
|
""" test 'forward_event' notifications
|
|
"""
|
|
amount = 10**8
|
|
disconnects = ['-WIRE_UPDATE_FAIL_HTLC', 'permfail']
|
|
plugin = os.path.join(
|
|
os.path.dirname(__file__),
|
|
'plugins',
|
|
'forward_payment_status.py'
|
|
)
|
|
l1, l2, l3, l4, l5 = node_factory.get_nodes(5, opts=[
|
|
{},
|
|
{'plugin': plugin},
|
|
{},
|
|
{},
|
|
{'disconnect': disconnects}])
|
|
|
|
l1.openchannel(l2, confirm=False, wait_for_announce=False)
|
|
l2.openchannel(l3, confirm=False, wait_for_announce=False)
|
|
l2.openchannel(l4, confirm=False, wait_for_announce=False)
|
|
l2.openchannel(l5, confirm=False, wait_for_announce=False)
|
|
|
|
# Generate 5, then make sure everyone is up to date before
|
|
# last one, otherwise they might think it's in the future!
|
|
bitcoind.generate_block(5)
|
|
sync_blockheight(bitcoind, [l1, l2, l3, l4, l5])
|
|
bitcoind.generate_block(1)
|
|
|
|
wait_for(lambda: len(l1.rpc.listchannels()['channels']) == 8)
|
|
|
|
inv = l3.rpc.invoice(amount, "first", "desc")
|
|
payment_hash13 = inv['payment_hash']
|
|
route = l1.rpc.getroute(l3.info['id'], amount, 1)['route']
|
|
|
|
# status: offered -> settled
|
|
l1.rpc.sendpay(route, payment_hash13, payment_secret=inv['payment_secret'])
|
|
l1.rpc.waitsendpay(payment_hash13)
|
|
|
|
# status: offered -> failed
|
|
route = l1.rpc.getroute(l4.info['id'], amount, 1)['route']
|
|
payment_hash14 = "f" * 64
|
|
with pytest.raises(RpcError):
|
|
l1.rpc.sendpay(route, payment_hash14, payment_secret="f" * 64)
|
|
l1.rpc.waitsendpay(payment_hash14)
|
|
|
|
# status: offered -> local_failed
|
|
inv = l5.rpc.invoice(amount, 'onchain_timeout', 'desc')
|
|
payment_hash15 = inv['payment_hash']
|
|
fee = amount * 10 // 1000000 + 1
|
|
c12 = l1.get_channel_scid(l2)
|
|
c25 = l2.get_channel_scid(l5)
|
|
route = [{'amount_msat': amount + fee - 1,
|
|
'id': l2.info['id'],
|
|
'delay': 12,
|
|
'channel': c12},
|
|
{'amount_msat': amount - 1,
|
|
'id': l5.info['id'],
|
|
'delay': 5,
|
|
'channel': c25}]
|
|
|
|
executor.submit(l1.rpc.sendpay, route, payment_hash15, payment_secret=inv['payment_secret'])
|
|
|
|
l5.daemon.wait_for_log('permfail')
|
|
l5.wait_for_channel_onchain(l2.info['id'])
|
|
l2.bitcoin.generate_block(1)
|
|
l2.daemon.wait_for_log(' to ONCHAIN')
|
|
l5.daemon.wait_for_log(' to ONCHAIN')
|
|
|
|
l2.daemon.wait_for_log('Propose handling THEIR_UNILATERAL/OUR_HTLC by OUR_HTLC_TIMEOUT_TO_US .* after 6 blocks')
|
|
bitcoind.generate_block(6)
|
|
|
|
l2.wait_for_onchaind_broadcast('OUR_HTLC_TIMEOUT_TO_US',
|
|
'THEIR_UNILATERAL/OUR_HTLC')
|
|
|
|
bitcoind.generate_block(1)
|
|
l2.daemon.wait_for_log('Resolved THEIR_UNILATERAL/OUR_HTLC by our proposal OUR_HTLC_TIMEOUT_TO_US')
|
|
l5.daemon.wait_for_log('Ignoring output.*: OUR_UNILATERAL/THEIR_HTLC')
|
|
|
|
bitcoind.generate_block(100)
|
|
sync_blockheight(bitcoind, [l2])
|
|
|
|
stats = l2.rpc.listforwards()['forwards']
|
|
assert len(stats) == 3
|
|
plugin_stats = l2.rpc.call('listforwards_plugin')['forwards']
|
|
assert len(plugin_stats) == 6
|
|
|
|
# use stats to build what we expect went to plugin.
|
|
expect = stats[0].copy()
|
|
# First event won't have conclusion.
|
|
del expect['resolved_time']
|
|
expect['status'] = 'offered'
|
|
assert plugin_stats[0] == expect
|
|
expect = stats[0].copy()
|
|
assert plugin_stats[1] == expect
|
|
|
|
expect = stats[1].copy()
|
|
del expect['resolved_time']
|
|
expect['status'] = 'offered'
|
|
assert plugin_stats[2] == expect
|
|
expect = stats[1].copy()
|
|
assert plugin_stats[3] == expect
|
|
|
|
expect = stats[2].copy()
|
|
del expect['failcode']
|
|
del expect['failreason']
|
|
expect['status'] = 'offered'
|
|
assert plugin_stats[4] == expect
|
|
expect = stats[2].copy()
|
|
assert plugin_stats[5] == expect
|
|
|
|
|
|
def test_sendpay_notifications(node_factory, bitcoind):
|
|
""" test 'sendpay_success' and 'sendpay_failure' notifications
|
|
"""
|
|
amount = 10**8
|
|
opts = [{'plugin': os.path.join(os.getcwd(), 'tests/plugins/sendpay_notifications.py')},
|
|
{},
|
|
{'may_reconnect': False}]
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=opts, wait_for_announce=True)
|
|
chanid23 = l2.get_channel_scid(l3)
|
|
|
|
inv1 = l3.rpc.invoice(amount, "first", "desc")
|
|
payment_hash1 = inv1['payment_hash']
|
|
inv2 = l3.rpc.invoice(amount, "second", "desc")
|
|
payment_hash2 = inv2['payment_hash']
|
|
route = l1.rpc.getroute(l3.info['id'], amount, 1)['route']
|
|
|
|
l1.rpc.sendpay(route, payment_hash1, payment_secret=inv1['payment_secret'])
|
|
response1 = l1.rpc.waitsendpay(payment_hash1)
|
|
|
|
l2.rpc.close(chanid23, 1)
|
|
|
|
l1.rpc.sendpay(route, payment_hash2, payment_secret=inv2['payment_secret'])
|
|
with pytest.raises(RpcError) as err:
|
|
l1.rpc.waitsendpay(payment_hash2)
|
|
|
|
results = l1.rpc.call('listsendpays_plugin')
|
|
assert len(results['sendpay_success']) == 1
|
|
assert len(results['sendpay_failure']) == 1
|
|
|
|
assert results['sendpay_success'][0] == response1
|
|
assert results['sendpay_failure'][0] == err.value.error
|
|
|
|
|
|
def test_sendpay_notifications_nowaiter(node_factory):
|
|
opts = [{'plugin': os.path.join(os.getcwd(), 'tests/plugins/sendpay_notifications.py')},
|
|
{},
|
|
{'may_reconnect': False}]
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=opts, wait_for_announce=True)
|
|
chanid23 = l2.get_channel_scid(l3)
|
|
amount = 10**8
|
|
|
|
inv1 = l3.rpc.invoice(amount, "first", "desc")
|
|
payment_hash1 = inv1['payment_hash']
|
|
inv2 = l3.rpc.invoice(amount, "second", "desc")
|
|
payment_hash2 = inv2['payment_hash']
|
|
route = l1.rpc.getroute(l3.info['id'], amount, 1)['route']
|
|
|
|
l1.rpc.sendpay(route, payment_hash1, payment_secret=inv1['payment_secret'])
|
|
l1.daemon.wait_for_log(r'Received a sendpay_success')
|
|
|
|
l2.rpc.close(chanid23, 1)
|
|
|
|
l1.rpc.sendpay(route, payment_hash2, payment_secret=inv2['payment_secret'])
|
|
l1.daemon.wait_for_log(r'Received a sendpay_failure')
|
|
|
|
results = l1.rpc.call('listsendpays_plugin')
|
|
assert len(results['sendpay_success']) == 1
|
|
assert len(results['sendpay_failure']) == 1
|
|
|
|
|
|
def test_rpc_command_hook(node_factory):
|
|
"""Test the `rpc_command` hook chain"""
|
|
plugin = [
|
|
os.path.join(os.getcwd(), "tests/plugins/rpc_command_1.py"),
|
|
os.path.join(os.getcwd(), "tests/plugins/rpc_command_2.py")
|
|
]
|
|
l1 = node_factory.get_node(options={"plugin": plugin})
|
|
|
|
# rpc_command_2 plugin restricts using "sendpay"
|
|
with pytest.raises(RpcError, match=r"rpc_command_2 cannot do this"):
|
|
l1.rpc.call("sendpay")
|
|
|
|
# Both plugins will replace calls made for the "invoice" command
|
|
# The first will win, for the second a warning should be logged
|
|
invoice = l1.rpc.invoice(10**6, "test_side", "test_input")
|
|
decoded = l1.rpc.decodepay(invoice["bolt11"])
|
|
assert decoded["description"] == "rpc_command_1 modified this description"
|
|
l1.daemon.wait_for_log("rpc_command hook 'invoice' already modified, ignoring.")
|
|
|
|
# Disable schema checking here!
|
|
schemas = l1.rpc.jsonschemas
|
|
l1.rpc.jsonschemas = {}
|
|
# rpc_command_1 plugin sends a custom response to "listfunds"
|
|
funds = l1.rpc.listfunds()
|
|
assert funds[0] == "Custom rpc_command_1 result"
|
|
|
|
# Test command redirection to a plugin
|
|
l1.rpc.call('help', [0])
|
|
|
|
# Check the 'already modified' warning is not logged on just 'continue'
|
|
assert not l1.daemon.is_in_log("rpc_command hook 'listfunds' already modified, ignoring.")
|
|
|
|
# Tests removing a chained hook in random order.
|
|
# Note: This will get flaky by design if theres a problem.
|
|
if bool(random.getrandbits(1)):
|
|
l1.rpc.plugin_stop('rpc_command_2.py')
|
|
l1.rpc.plugin_stop('rpc_command_1.py')
|
|
else:
|
|
l1.rpc.plugin_stop('rpc_command_1.py')
|
|
l1.rpc.plugin_stop('rpc_command_2.py')
|
|
|
|
l1.rpc.jsonschemas = schemas
|
|
|
|
|
|
def test_libplugin(node_factory):
|
|
"""Sanity checks for plugins made with libplugin"""
|
|
plugin = os.path.join(os.getcwd(), "tests/plugins/test_libplugin")
|
|
l1 = node_factory.get_node(options={"plugin": plugin,
|
|
'allow-deprecated-apis': False})
|
|
|
|
# Test startup
|
|
assert l1.daemon.is_in_log("test_libplugin initialised!")
|
|
# Test dynamic startup
|
|
l1.rpc.plugin_stop(plugin)
|
|
l1.rpc.plugin_start(plugin)
|
|
l1.rpc.check("helloworld")
|
|
|
|
# Test commands
|
|
assert l1.rpc.call("helloworld") == {"hello": "world"}
|
|
assert l1.rpc.call("helloworld", {"name": "test"}) == {"hello": "test"}
|
|
l1.stop()
|
|
l1.daemon.opts["plugin"] = plugin
|
|
l1.daemon.opts["name"] = "test_opt"
|
|
l1.start()
|
|
assert l1.rpc.call("helloworld") == {"hello": "test_opt"}
|
|
# But param takes over!
|
|
assert l1.rpc.call("helloworld", {"name": "test"}) == {"hello": "test"}
|
|
|
|
# Test hooks and notifications
|
|
l2 = node_factory.get_node()
|
|
l2.connect(l1)
|
|
l1.daemon.wait_for_log("{} peer_connected".format(l2.info["id"]))
|
|
l1.daemon.wait_for_log("{} connected".format(l2.info["id"]))
|
|
|
|
# Test RPC calls FIXME: test concurrent ones ?
|
|
assert l1.rpc.call("testrpc") == l1.rpc.getinfo()
|
|
|
|
# Make sure deprecated options nor commands are mentioned.
|
|
with pytest.raises(RpcError, match=r'Command "testrpc-deprecated" is deprecated'):
|
|
l1.rpc.call('testrpc-deprecated')
|
|
|
|
assert not any([h['command'] == 'testrpc-deprecated'
|
|
for h in l1.rpc.help()['help']])
|
|
with pytest.raises(RpcError, match=r"Deprecated command.*testrpc-deprecated"):
|
|
l1.rpc.help('testrpc-deprecated')
|
|
|
|
assert 'name-deprecated' not in str(l1.rpc.listconfigs())
|
|
|
|
l1.stop()
|
|
l1.daemon.opts["name-deprecated"] = "test_opt"
|
|
|
|
l1.daemon.start(wait_for_initialized=False, stderr_redir=True)
|
|
# Will exit with failure code.
|
|
assert l1.daemon.wait() == 1
|
|
assert l1.daemon.is_in_stderr(r"name-deprecated: deprecated option")
|
|
|
|
del l1.daemon.opts["name-deprecated"]
|
|
l1.start()
|
|
|
|
|
|
def test_libplugin_deprecated(node_factory):
|
|
"""Sanity checks for plugins made with libplugin using deprecated args"""
|
|
plugin = os.path.join(os.getcwd(), "tests/plugins/test_libplugin")
|
|
l1 = node_factory.get_node(options={"plugin": plugin,
|
|
'name-deprecated': 'test_opt depr',
|
|
'allow-deprecated-apis': True})
|
|
|
|
assert l1.rpc.call("helloworld") == {"hello": "test_opt depr"}
|
|
l1.rpc.help('testrpc-deprecated')
|
|
assert l1.rpc.call("testrpc-deprecated") == l1.rpc.getinfo()
|
|
|
|
|
|
@unittest.skipIf(
|
|
not DEVELOPER or DEPRECATED_APIS, "needs LIGHTNINGD_DEV_LOG_IO and new API"
|
|
)
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_plugin_feature_announce(node_factory):
|
|
"""Check that features registered by plugins show up in messages.
|
|
|
|
l1 is the node under test, l2 only serves as the counterparty for a
|
|
channel to check the featurebits in the `channel_announcement`. The plugin
|
|
registers an individual featurebit for each of the locations we can stash
|
|
feature bits in:
|
|
|
|
- 1 << 201 for `init` messages
|
|
- 1 << 203 for `node_announcement`
|
|
- 1 << 205 for bolt11 invoices
|
|
|
|
"""
|
|
plugin = os.path.join(os.path.dirname(__file__), 'plugins/feature-test.py')
|
|
l1, l2 = node_factory.line_graph(
|
|
2, opts=[{'plugin': plugin, 'log-level': 'io'}, {}],
|
|
wait_for_announce=True
|
|
)
|
|
|
|
extra = []
|
|
if l1.config('experimental-dual-fund'):
|
|
extra.append(21) # option-anchor-outputs
|
|
extra.append(29) # option-dual-fund
|
|
|
|
# Check the featurebits we've set in the `init` message from
|
|
# feature-test.py.
|
|
assert l1.daemon.is_in_log(r'\[OUT\] 001000022100....{}'
|
|
.format(expected_peer_features(extra=[201] + extra)))
|
|
|
|
# Check the invoice featurebit we set in feature-test.py
|
|
inv = l1.rpc.invoice(123, 'lbl', 'desc')['bolt11']
|
|
details = Invoice.decode(inv)
|
|
assert(details.featurebits.int & (1 << 205) != 0)
|
|
|
|
# Check the featurebit set in the `node_announcement`
|
|
node = l1.rpc.listnodes(l1.info['id'])['nodes'][0]
|
|
assert node['features'] == expected_node_features(extra=[203] + extra)
|
|
|
|
|
|
def test_hook_chaining(node_factory):
|
|
"""Check that hooks are called in order and the chain exits correctly
|
|
|
|
We start two nodes, l2 will have two plugins registering the same hook
|
|
(`htlc_accepted`) but handle different cases:
|
|
|
|
- the `odd` plugin only handles the "AA"*32 preimage
|
|
- the `even` plugin only handles the "BB"*32 preimage
|
|
|
|
We check that plugins are called in the order they are registering the
|
|
hook, and that they exit the call chain as soon as one plugin returns a
|
|
result that isn't `continue`. On exiting the chain the remaining plugins
|
|
are not called. If no plugin exits the chain we continue to handle
|
|
internally as usual.
|
|
|
|
"""
|
|
l1, l2 = node_factory.line_graph(2)
|
|
|
|
# Start the plugins manually instead of specifying them on the command
|
|
# line, otherwise we cannot guarantee the order in which the hooks are
|
|
# registered.
|
|
p1 = os.path.join(os.path.dirname(__file__), "plugins/hook-chain-odd.py")
|
|
p2 = os.path.join(os.path.dirname(__file__), "plugins/hook-chain-even.py")
|
|
l2.rpc.plugin_start(p1)
|
|
l2.rpc.plugin_start(p2)
|
|
|
|
preimage1 = b'\xAA' * 32
|
|
preimage2 = b'\xBB' * 32
|
|
preimage3 = b'\xCC' * 32
|
|
hash1 = sha256(preimage1).hexdigest()
|
|
hash2 = sha256(preimage2).hexdigest()
|
|
hash3 = sha256(preimage3).hexdigest()
|
|
|
|
inv = l2.rpc.invoice(123, 'odd', "Odd payment handled by the first plugin",
|
|
preimage="AA" * 32)['bolt11']
|
|
l1.rpc.pay(inv)
|
|
|
|
# The first plugin will handle this, the second one should not be called.
|
|
assert(l2.daemon.is_in_log(
|
|
r'plugin-hook-chain-odd.py: htlc_accepted called for payment_hash {}'.format(hash1)
|
|
))
|
|
assert(not l2.daemon.is_in_log(
|
|
r'plugin-hook-chain-even.py: htlc_accepted called for payment_hash {}'.format(hash1)
|
|
))
|
|
|
|
# The second run is with a payment_hash that `hook-chain-even.py` knows
|
|
# about. `hook-chain-odd.py` is called, it returns a `continue`, and then
|
|
# `hook-chain-even.py` resolves it.
|
|
inv = l2.rpc.invoice(
|
|
123, 'even', "Even payment handled by the second plugin", preimage="BB" * 32
|
|
)['bolt11']
|
|
l1.rpc.pay(inv)
|
|
assert(l2.daemon.is_in_log(
|
|
r'plugin-hook-chain-odd.py: htlc_accepted called for payment_hash {}'.format(hash2)
|
|
))
|
|
assert(l2.daemon.is_in_log(
|
|
r'plugin-hook-chain-even.py: htlc_accepted called for payment_hash {}'.format(hash2)
|
|
))
|
|
|
|
# And finally an invoice that neither know about, so it should get settled
|
|
# by the internal invoice handling.
|
|
inv = l2.rpc.invoice(123, 'neither', "Neither plugin handles this",
|
|
preimage="CC" * 32)['bolt11']
|
|
l1.rpc.pay(inv)
|
|
assert(l2.daemon.is_in_log(
|
|
r'plugin-hook-chain-odd.py: htlc_accepted called for payment_hash {}'.format(hash3)
|
|
))
|
|
assert(l2.daemon.is_in_log(
|
|
r'plugin-hook-chain-even.py: htlc_accepted called for payment_hash {}'.format(hash3)
|
|
))
|
|
|
|
|
|
def test_bitcoin_backend(node_factory, bitcoind):
|
|
"""
|
|
This tests interaction with the Bitcoin backend, but not specifically bcli
|
|
"""
|
|
l1 = node_factory.get_node(start=False, options={"disable-plugin": "bcli"},
|
|
may_fail=True, allow_broken_log=True)
|
|
|
|
# We don't start if we haven't all the required methods registered.
|
|
plugin = os.path.join(os.getcwd(), "tests/plugins/bitcoin/part1.py")
|
|
l1.daemon.opts["plugin"] = plugin
|
|
l1.daemon.start(wait_for_initialized=False, stderr_redir=True)
|
|
l1.daemon.wait_for_log("Missing a Bitcoin plugin command")
|
|
# Will exit with failure code.
|
|
assert l1.daemon.wait() == 1
|
|
assert l1.daemon.is_in_stderr(r"Could not access the plugin for sendrawtransaction")
|
|
# Now we should start if all the commands are registered, even if they
|
|
# are registered by two distincts plugins.
|
|
del l1.daemon.opts["plugin"]
|
|
l1.daemon.opts["plugin-dir"] = os.path.join(os.getcwd(),
|
|
"tests/plugins/bitcoin/")
|
|
# (it fails when it tries to use them, so startup fails)
|
|
l1.daemon.start(wait_for_initialized=False)
|
|
l1.daemon.wait_for_log("All Bitcoin plugin commands registered")
|
|
assert l1.daemon.wait() == 1
|
|
|
|
# But restarting with just bcli is ok
|
|
del l1.daemon.opts["plugin-dir"]
|
|
del l1.daemon.opts["disable-plugin"]
|
|
l1.start()
|
|
assert l1.daemon.is_in_log("bitcoin-cli initialized and connected to"
|
|
" bitcoind")
|
|
|
|
|
|
def test_bcli(node_factory, bitcoind, chainparams):
|
|
"""
|
|
This tests the bcli plugin, used to gather Bitcoin data from a local
|
|
bitcoind.
|
|
Mostly sanity checks of the interface..
|
|
"""
|
|
l1, l2 = node_factory.get_nodes(2)
|
|
|
|
# We cant stop it dynamically
|
|
with pytest.raises(RpcError):
|
|
l1.rpc.plugin_stop("bcli")
|
|
|
|
# Failure case of feerate is tested in test_misc.py
|
|
estimates = l1.rpc.call("estimatefees")
|
|
for est in ["opening", "mutual_close", "unilateral_close", "delayed_to_us",
|
|
"htlc_resolution", "penalty", "min_acceptable",
|
|
"max_acceptable"]:
|
|
assert est in estimates
|
|
|
|
resp = l1.rpc.call("getchaininfo")
|
|
assert resp["chain"] == chainparams['name']
|
|
for field in ["headercount", "blockcount", "ibd"]:
|
|
assert field in resp
|
|
|
|
# We shouldn't get upset if we ask for an unknown-yet block
|
|
resp = l1.rpc.call("getrawblockbyheight", {"height": 500})
|
|
assert resp["blockhash"] is resp["block"] is None
|
|
resp = l1.rpc.call("getrawblockbyheight", {"height": 50})
|
|
assert resp["blockhash"] is not None and resp["blockhash"] is not None
|
|
# Some other bitcoind-failure cases for this call are covered in
|
|
# tests/test_misc.py
|
|
|
|
l1.fundwallet(10**5)
|
|
l1.connect(l2)
|
|
fc = l1.rpc.fundchannel(l2.info["id"], 10**4 * 3)
|
|
txo = l1.rpc.call("getutxout", {"txid": fc['txid'], "vout": fc['outnum']})
|
|
assert (Millisatoshi(txo["amount"]) == Millisatoshi(10**4 * 3 * 10**3)
|
|
and txo["script"].startswith("0020"))
|
|
l1.rpc.close(l2.info["id"])
|
|
# When output is spent, it should give us null !
|
|
wait_for(lambda: l1.rpc.call("getutxout", {
|
|
"txid": fc['txid'],
|
|
"vout": fc['outnum']
|
|
})['amount'] is None)
|
|
|
|
resp = l1.rpc.call("sendrawtransaction", {"tx": "dummy", "allowhighfees": False})
|
|
assert not resp["success"] and "decode failed" in resp["errmsg"]
|
|
|
|
|
|
def test_hook_crash(node_factory, executor, bitcoind):
|
|
"""Verify that we fail over if a plugin crashes while handling a hook.
|
|
|
|
We create a star topology, with l1 opening channels to the other nodes,
|
|
and then triggering the plugins on those nodes in order to exercise the
|
|
hook chain. p0 is the interesting plugin because as soon as it get called
|
|
for the htlc_accepted hook it'll crash on purpose. We should still make it
|
|
through the chain, the plugins should all be called and the payment should
|
|
still go through.
|
|
|
|
"""
|
|
p0 = os.path.join(os.path.dirname(__file__), "plugins/hook-crash.py")
|
|
p1 = os.path.join(os.path.dirname(__file__), "plugins/hook-chain-odd.py")
|
|
p2 = os.path.join(os.path.dirname(__file__), "plugins/hook-chain-even.py")
|
|
perm = [
|
|
(p0, p1, p2), # Crashing plugin is first in chain
|
|
(p1, p0, p2), # Crashing plugin is in the middle of the chain
|
|
(p1, p2, p0), # Crashing plugin is last in chain
|
|
]
|
|
|
|
l1 = node_factory.get_node()
|
|
nodes = [node_factory.get_node() for _ in perm]
|
|
|
|
# Start them in any order and we should still always end up with each
|
|
# plugin being called and ultimately the `pay` call should succeed:
|
|
for plugins, n in zip(perm, nodes):
|
|
for p in plugins:
|
|
n.rpc.plugin_start(p)
|
|
l1.openchannel(n, 10**6, confirm=False, wait_for_announce=False)
|
|
|
|
# Mine final openchannel tx first.
|
|
sync_blockheight(bitcoind, [l1] + nodes)
|
|
mine_funding_to_announce(bitcoind, [l1] + nodes, wait_for_mempool=1)
|
|
|
|
wait_for(lambda: len(l1.rpc.listchannels()['channels']) == 2 * len(perm))
|
|
|
|
# Start an RPC call that should error once the plugin crashes.
|
|
f1 = executor.submit(nodes[0].rpc.hold_rpc_call)
|
|
|
|
futures = []
|
|
for n in nodes:
|
|
inv = n.rpc.invoice(123, "lbl", "desc")['bolt11']
|
|
futures.append(executor.submit(l1.rpc.pay, inv))
|
|
|
|
for n in nodes:
|
|
n.daemon.wait_for_logs([
|
|
r'Plugin is about to crash.',
|
|
r'plugin-hook-chain-odd.py: htlc_accepted called for payment_hash',
|
|
r'plugin-hook-chain-even.py: htlc_accepted called for payment_hash',
|
|
])
|
|
|
|
# Collect the results:
|
|
[f.result(TIMEOUT) for f in futures]
|
|
|
|
# Make sure the RPC call was terminated with the correct error
|
|
with pytest.raises(RpcError, match=r'Plugin terminated before replying'):
|
|
f1.result(10)
|
|
|
|
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_feature_set(node_factory):
|
|
plugin = os.path.join(os.path.dirname(__file__), 'plugins/show_feature_set.py')
|
|
l1 = node_factory.get_node(options={"plugin": plugin})
|
|
|
|
fs = l1.rpc.call('getfeatureset')
|
|
|
|
assert fs['init'] == expected_peer_features()
|
|
assert fs['node'] == expected_node_features()
|
|
assert fs['channel'] == expected_channel_features()
|
|
assert 'invoice' in fs
|
|
|
|
|
|
def test_replacement_payload(node_factory):
|
|
"""Test that htlc_accepted plugin hook can replace payload"""
|
|
plugin = os.path.join(os.path.dirname(__file__), 'plugins/replace_payload.py')
|
|
l1, l2 = node_factory.line_graph(
|
|
2,
|
|
opts=[{}, {"plugin": plugin}],
|
|
wait_for_announce=True
|
|
)
|
|
|
|
# Replace with an invalid payload.
|
|
l2.rpc.call('setpayload', ['0000'])
|
|
inv = l2.rpc.invoice(123, 'test_replacement_payload', 'test_replacement_payload')['bolt11']
|
|
with pytest.raises(RpcError, match=r"WIRE_INVALID_ONION_PAYLOAD \(reply from remote\)"):
|
|
l1.rpc.pay(inv)
|
|
|
|
# Replace with valid payload, but corrupt payment_secret
|
|
l2.rpc.call('setpayload', ['corrupt_secret'])
|
|
|
|
with pytest.raises(RpcError, match=r"WIRE_INCORRECT_OR_UNKNOWN_PAYMENT_DETAILS \(reply from remote\)"):
|
|
l1.rpc.pay(inv)
|
|
|
|
assert l2.daemon.wait_for_log("Attept to pay.*with wrong secret")
|
|
|
|
|
|
@pytest.mark.developer("Requires dev_sign_last_tx")
|
|
def test_watchtower(node_factory, bitcoind, directory, chainparams):
|
|
"""Test watchtower hook.
|
|
|
|
l1 and l2 open a channel, make a couple of updates and then l1 cheats on
|
|
l2 while that one is offline. The watchtower plugin meanwhile stashes all
|
|
the penalty transactions and we release the one matching the offending
|
|
commitment transaction.
|
|
|
|
"""
|
|
p = os.path.join(os.path.dirname(__file__), "plugins/watchtower.py")
|
|
l1, l2 = node_factory.line_graph(
|
|
2,
|
|
opts=[{'may_fail': True, 'allow_broken_log': True}, {'plugin': p}]
|
|
)
|
|
channel_id = l1.rpc.listpeers()['peers'][0]['channels'][0]['channel_id']
|
|
|
|
# Force a new commitment
|
|
l1.rpc.pay(l2.rpc.invoice(25000000, 'lbl1', 'desc1')['bolt11'])
|
|
|
|
tx = l1.rpc.dev_sign_last_tx(l2.info['id'])['tx']
|
|
|
|
# Now make sure it is out of date
|
|
l1.rpc.pay(l2.rpc.invoice(25000000, 'lbl2', 'desc2')['bolt11'])
|
|
|
|
# l2 stops watching the chain, allowing the watchtower to react
|
|
l2.stop()
|
|
|
|
# Now l1 cheats
|
|
bitcoind.rpc.sendrawtransaction(tx)
|
|
time.sleep(1)
|
|
bitcoind.generate_block(1)
|
|
|
|
wt_file = os.path.join(
|
|
l2.daemon.lightning_dir,
|
|
chainparams['name'],
|
|
'watchtower.csv'
|
|
)
|
|
|
|
cheat_tx = bitcoind.rpc.decoderawtransaction(tx)
|
|
lastcommitnum = 0
|
|
for l in open(wt_file, 'r'):
|
|
txid, penalty, channel_id_hook, commitnum = l.strip().split(', ')
|
|
assert lastcommitnum == int(commitnum)
|
|
assert channel_id_hook == channel_id
|
|
lastcommitnum += 1
|
|
if txid == cheat_tx['txid']:
|
|
# This one should succeed, since it is a response to the cheat_tx
|
|
bitcoind.rpc.sendrawtransaction(penalty)
|
|
break
|
|
|
|
# Need this to check that l2 gets the funds
|
|
penalty_meta = bitcoind.rpc.decoderawtransaction(penalty)
|
|
|
|
time.sleep(1)
|
|
bitcoind.generate_block(1)
|
|
|
|
# Make sure l2's normal penalty_tx doesn't reach the network
|
|
def mock_sendrawtransaction(tx):
|
|
print("NOT broadcasting", tx)
|
|
|
|
l2.daemon.rpcproxy.mock_rpc('sendrawtransaction', mock_sendrawtransaction)
|
|
|
|
# Restart l2, and it should continue where the watchtower left off:
|
|
l2.start()
|
|
|
|
# l2 will still try to broadcast its latest commitment tx, but it'll fail
|
|
# since l1 has cheated. All commitments share the same prefix, so look for
|
|
# that.
|
|
penalty_prefix = tx[:(4 + 1 + 36) * 2] # version, txin_count, first txin in hex
|
|
l2.daemon.wait_for_log(r'Expected error broadcasting tx {}'.format(penalty_prefix))
|
|
|
|
# Now make sure the penalty output ends up in our wallet
|
|
fund_txids = [o['txid'] for o in l2.rpc.listfunds()['outputs']]
|
|
assert(penalty_meta['txid'] in fund_txids)
|
|
|
|
|
|
def test_plugin_fail(node_factory):
|
|
"""Test that a plugin which fails (not during a command)"""
|
|
plugin = os.path.join(os.path.dirname(__file__), 'plugins/fail_by_itself.py')
|
|
l1 = node_factory.get_node(options={"plugin": plugin})
|
|
|
|
time.sleep(2)
|
|
# It should clean up!
|
|
assert 'failcmd' not in [h['command'] for h in l1.rpc.help()['help']]
|
|
l1.daemon.wait_for_log(r': exited during normal operation')
|
|
|
|
l1.rpc.plugin_start(plugin)
|
|
time.sleep(2)
|
|
# It should clean up!
|
|
assert 'failcmd' not in [h['command'] for h in l1.rpc.help()['help']]
|
|
l1.daemon.wait_for_log(r': exited during normal operation')
|
|
|
|
|
|
@pytest.mark.developer("without DEVELOPER=1, gossip v slow")
|
|
@pytest.mark.openchannel('v1')
|
|
@pytest.mark.openchannel('v2')
|
|
def test_coin_movement_notices(node_factory, bitcoind, chainparams):
|
|
"""Verify that channel coin movements are triggered correctly. """
|
|
|
|
l1_l2_mvts = [
|
|
{'type': 'chain_mvt', 'credit_msat': 0, 'debit_msat': 0, 'tags': ['channel_open']},
|
|
{'type': 'channel_mvt', 'credit_msat': 100001001, 'debit_msat': 0, 'tags': ['routed'], 'fees_msat': '1001msat'},
|
|
{'type': 'channel_mvt', 'credit_msat': 0, 'debit_msat': 50000000, 'tags': ['routed'], 'fees_msat': '501msat'},
|
|
{'type': 'channel_mvt', 'credit_msat': 100000000, 'debit_msat': 0, 'tags': ['invoice'], 'fees_msat': '0msat'},
|
|
{'type': 'channel_mvt', 'credit_msat': 0, 'debit_msat': 50000000, 'tags': ['invoice'], 'fees_msat': '0msat'},
|
|
{'type': 'chain_mvt', 'credit_msat': 0, 'debit_msat': 100001001, 'tags': ['channel_close']},
|
|
]
|
|
|
|
l2_l3_mvts = [
|
|
{'type': 'chain_mvt', 'credit_msat': 1000000000, 'debit_msat': 0, 'tags': ['channel_open', 'opener']},
|
|
{'type': 'channel_mvt', 'credit_msat': 0, 'debit_msat': 100000000, 'tags': ['routed'], 'fees_msat': '1001msat'},
|
|
{'type': 'channel_mvt', 'credit_msat': 50000501, 'debit_msat': 0, 'tags': ['routed'], 'fees_msat': '501msat'},
|
|
{'type': 'chain_mvt', 'credit_msat': 0, 'debit_msat': 950000501, 'tags': ['channel_close']},
|
|
]
|
|
|
|
l3_l2_mvts = [
|
|
{'type': 'chain_mvt', 'credit_msat': 0, 'debit_msat': 0, 'tags': ['channel_open']},
|
|
{'type': 'channel_mvt', 'credit_msat': 100000000, 'debit_msat': 0, 'tags': ['invoice'], 'fees_msat': '0msat'},
|
|
{'type': 'channel_mvt', 'credit_msat': 0, 'debit_msat': 50000501, 'tags': ['invoice'], 'fees_msat': '501msat'},
|
|
{'type': 'chain_mvt', 'credit_msat': 0, 'debit_msat': 49999499, 'tags': ['channel_close']},
|
|
]
|
|
|
|
coin_plugin = os.path.join(os.getcwd(), 'tests/plugins/coin_movements.py')
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=[
|
|
{'may_reconnect': True},
|
|
{'may_reconnect': True, 'plugin': coin_plugin},
|
|
{'may_reconnect': True, 'plugin': coin_plugin},
|
|
], wait_for_announce=True)
|
|
|
|
mine_funding_to_announce(bitcoind, [l1, l2, l3])
|
|
wait_for(lambda: len(l1.rpc.listchannels()['channels']) == 4)
|
|
amount = 10**8
|
|
|
|
inv = l3.rpc.invoice(amount, "first", "desc")
|
|
payment_hash13 = inv['payment_hash']
|
|
route = l1.rpc.getroute(l3.info['id'], amount, 1)['route']
|
|
|
|
# status: offered -> settled
|
|
l1.rpc.sendpay(route, payment_hash13, payment_secret=inv['payment_secret'])
|
|
l1.rpc.waitsendpay(payment_hash13)
|
|
|
|
# status: offered -> failed
|
|
route = l1.rpc.getroute(l3.info['id'], amount, 1)['route']
|
|
payment_hash13 = "f" * 64
|
|
with pytest.raises(RpcError):
|
|
l1.rpc.sendpay(route, payment_hash13, payment_secret=inv['payment_secret'])
|
|
l1.rpc.waitsendpay(payment_hash13)
|
|
|
|
# go the other direction
|
|
inv = l1.rpc.invoice(amount // 2, "first", "desc")
|
|
payment_hash31 = inv['payment_hash']
|
|
route = l3.rpc.getroute(l1.info['id'], amount // 2, 1)['route']
|
|
l3.rpc.sendpay(route, payment_hash31, payment_secret=inv['payment_secret'])
|
|
l3.rpc.waitsendpay(payment_hash31)
|
|
|
|
# receive a payment (endpoint)
|
|
inv = l2.rpc.invoice(amount, "first", "desc")
|
|
payment_hash12 = inv['payment_hash']
|
|
route = l1.rpc.getroute(l2.info['id'], amount, 1)['route']
|
|
l1.rpc.sendpay(route, payment_hash12, payment_secret=inv['payment_secret'])
|
|
l1.rpc.waitsendpay(payment_hash12)
|
|
|
|
# send a payment (originator)
|
|
inv = l1.rpc.invoice(amount // 2, "second", "desc")
|
|
payment_hash21 = inv['payment_hash']
|
|
route = l2.rpc.getroute(l1.info['id'], amount // 2, 1)['route']
|
|
l2.rpc.sendpay(route, payment_hash21, payment_secret=inv['payment_secret'])
|
|
l2.rpc.waitsendpay(payment_hash21)
|
|
|
|
# restart to test index
|
|
l2.restart()
|
|
wait_for(lambda: all(p['channels'][0]['state'] == 'CHANNELD_NORMAL' for p in l2.rpc.listpeers()['peers']))
|
|
|
|
# close the channels down
|
|
chan1 = l2.get_channel_scid(l1)
|
|
chan3 = l2.get_channel_scid(l3)
|
|
chanid_1 = first_channel_id(l2, l1)
|
|
chanid_3 = first_channel_id(l2, l3)
|
|
|
|
l2.rpc.close(chan1)
|
|
l2.daemon.wait_for_logs([
|
|
' to CLOSINGD_COMPLETE',
|
|
'sendrawtx exit 0',
|
|
])
|
|
assert account_balance(l2, chanid_1) == 100001001
|
|
bitcoind.generate_block(6)
|
|
sync_blockheight(bitcoind, [l2])
|
|
l2.daemon.wait_for_log('{}.*FUNDING_TRANSACTION/FUNDING_OUTPUT->MUTUAL_CLOSE depth'.format(l1.info['id']))
|
|
|
|
l2.rpc.close(chan3)
|
|
l2.daemon.wait_for_logs([
|
|
' to CLOSINGD_COMPLETE',
|
|
'sendrawtx exit 0',
|
|
])
|
|
assert account_balance(l2, chanid_3) == 950000501
|
|
bitcoind.generate_block(6)
|
|
sync_blockheight(bitcoind, [l2])
|
|
l2.daemon.wait_for_log('{}.*FUNDING_TRANSACTION/FUNDING_OUTPUT->MUTUAL_CLOSE depth'.format(l3.info['id']))
|
|
l3.daemon.wait_for_log('Resolved FUNDING_TRANSACTION/FUNDING_OUTPUT by MUTUAL_CLOSE')
|
|
|
|
# Ending channel balance should be zero
|
|
assert account_balance(l2, chanid_1) == 0
|
|
assert account_balance(l2, chanid_3) == 0
|
|
|
|
# Verify we recorded all the movements we expect
|
|
check_coin_moves(l3, chanid_3, l3_l2_mvts, chainparams)
|
|
check_coin_moves(l2, chanid_1, l1_l2_mvts, chainparams)
|
|
check_coin_moves(l2, chanid_3, l2_l3_mvts, chainparams)
|
|
|
|
|
|
def test_3847_repro(node_factory, bitcoind):
|
|
"""Reproduces the issue in #3847: duplicate response from plugin
|
|
|
|
l2 holds on to HTLCs until the deadline expires. Then we allow them
|
|
through and either should terminate the payment attempt, and the second
|
|
would return a redundant result.
|
|
|
|
"""
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=[
|
|
{},
|
|
{},
|
|
{
|
|
'plugin': os.path.join(os.getcwd(), 'tests/plugins/hold_htlcs.py'),
|
|
'hold-time': 11,
|
|
'hold-result': 'fail',
|
|
},
|
|
], wait_for_announce=True)
|
|
wait_for(lambda: len(l1.rpc.listchannels()['channels']) == 4)
|
|
|
|
# Amount sufficient to trigger the presplit modifier
|
|
amt = 20 * 1000 * 1000
|
|
|
|
i1 = l3.rpc.invoice(
|
|
amount_msat=amt, label="direct", description="desc"
|
|
)['bolt11']
|
|
with pytest.raises(RpcError):
|
|
l1.rpc.pay(i1, retry_for=10)
|
|
|
|
# We wait for at least two parts, and the bug would cause the `pay` plugin
|
|
# to crash
|
|
l1.daemon.wait_for_logs([r'Payment deadline expired, not retrying'] * 2)
|
|
|
|
# This call to paystatus would fail if the pay plugin crashed (it's
|
|
# provided by the plugin)
|
|
l1.rpc.paystatus(i1)
|
|
|
|
|
|
def test_important_plugin(node_factory):
|
|
# Cache it here.
|
|
pluginsdir = os.path.join(os.path.dirname(__file__), "plugins")
|
|
|
|
n = node_factory.get_node(options={"important-plugin": os.path.join(pluginsdir, "nonexistent")},
|
|
may_fail=True, expect_fail=True,
|
|
allow_broken_log=True, start=False)
|
|
|
|
n.daemon.start(wait_for_initialized=False, stderr_redir=True)
|
|
# Will exit with failure code.
|
|
assert n.daemon.wait() == 1
|
|
assert n.daemon.is_in_stderr(r"Failed to register .*nonexistent: No such file or directory")
|
|
|
|
# Check we exit if the important plugin dies.
|
|
n.daemon.opts['important-plugin'] = os.path.join(pluginsdir, "fail_by_itself.py")
|
|
|
|
n.daemon.start(wait_for_initialized=False)
|
|
# Will exit with failure code.
|
|
assert n.daemon.wait() == 1
|
|
n.daemon.wait_for_log(r'fail_by_itself.py: Plugin marked as important, shutting down lightningd')
|
|
|
|
# Check if the important plugin is disabled, we run as normal.
|
|
n.daemon.opts['disable-plugin'] = "fail_by_itself.py"
|
|
n.daemon.start()
|
|
# Make sure we can call into a plugin RPC (this is from `bcli`) even
|
|
# if fail_by_itself.py is disabled.
|
|
n.rpc.call("estimatefees", {})
|
|
n.stop()
|
|
|
|
# Check if an important plugin dies later, we fail.
|
|
del n.daemon.opts['disable-plugin']
|
|
n.daemon.opts['important-plugin'] = os.path.join(pluginsdir, "suicidal_plugin.py")
|
|
|
|
n.start()
|
|
|
|
with pytest.raises(RpcError):
|
|
n.rpc.call("die", {})
|
|
|
|
# Should exit with exitcode 1
|
|
n.daemon.wait_for_log('suicidal_plugin.py: Plugin marked as important, shutting down lightningd')
|
|
assert n.daemon.wait() == 1
|
|
n.stop()
|
|
|
|
# Check that if a builtin plugin dies, we fail.
|
|
start = n.daemon.logsearch_start
|
|
n.start()
|
|
# Reset logsearch_start, since this will predate message that start() looks for.
|
|
n.daemon.logsearch_start = start
|
|
line = n.daemon.wait_for_log(r'.*started\([0-9]*\).*plugins/pay')
|
|
pidstr = re.search(r'.*started\(([0-9]*)\).*plugins/pay', line).group(1)
|
|
|
|
# Kill pay.
|
|
os.kill(int(pidstr), signal.SIGKILL)
|
|
n.daemon.wait_for_log('pay: Plugin marked as important, shutting down lightningd')
|
|
# Should exit with exitcode 1
|
|
assert n.daemon.wait() == 1
|
|
n.stop()
|
|
|
|
|
|
@pytest.mark.developer("tests developer-only option.")
|
|
def test_dev_builtin_plugins_unimportant(node_factory):
|
|
n = node_factory.get_node(options={"dev-builtin-plugins-unimportant": None})
|
|
n.rpc.plugin_stop(plugin="pay")
|
|
|
|
|
|
def test_htlc_accepted_hook_crash(node_factory, executor):
|
|
"""Test that we do not hang incoming HTLCs if the hook plugin crashes.
|
|
|
|
Reproduces #3748.
|
|
"""
|
|
plugin = os.path.join(os.getcwd(), 'tests/plugins/htlc_accepted-crash.py')
|
|
l1 = node_factory.get_node()
|
|
l2 = node_factory.get_node(
|
|
options={'plugin': plugin},
|
|
allow_broken_log=True
|
|
)
|
|
l1.connect(l2)
|
|
l1.fundchannel(l2)
|
|
|
|
i = l2.rpc.invoice(500, "crashpls", "crashpls")['bolt11']
|
|
|
|
# This should still succeed
|
|
|
|
f = executor.submit(l1.rpc.pay, i)
|
|
|
|
l2.daemon.wait_for_log(r'Crashing on purpose...')
|
|
l2.daemon.wait_for_log(
|
|
r'Hook handler for htlc_accepted failed with an exception.'
|
|
)
|
|
|
|
with pytest.raises(RpcError, match=r'failed: WIRE_TEMPORARY_NODE_FAILURE'):
|
|
f.result(10)
|
|
|
|
|
|
def test_notify(node_factory):
|
|
"""Test that notifications from plugins get ignored"""
|
|
plugins = [os.path.join(os.getcwd(), 'tests/plugins/notify.py'),
|
|
os.path.join(os.getcwd(), 'tests/plugins/notify2.py')]
|
|
l1 = node_factory.get_node(options={'plugin': plugins})
|
|
|
|
assert l1.rpc.call('make_notify') == 'This worked'
|
|
assert l1.rpc.call('call_make_notify') == 'This worked'
|
|
|
|
out = subprocess.check_output(['cli/lightning-cli',
|
|
'--network={}'.format(TEST_NETWORK),
|
|
'--lightning-dir={}'
|
|
.format(l1.daemon.lightning_dir),
|
|
'make_notify']).decode('utf-8').splitlines(keepends=True)
|
|
assert out[0] == '# Beginning stage 1\n'
|
|
assert out[1] == '\r'
|
|
for i in range(100):
|
|
assert out[2 + i].startswith("# Stage 1/2 {:>3}/100 |".format(1 + i))
|
|
if i == 99:
|
|
assert out[2 + i].endswith("|\n")
|
|
else:
|
|
assert out[2 + i].endswith("|\r")
|
|
|
|
assert out[102] == '# Beginning stage 2\n'
|
|
assert out[103] == '\r'
|
|
|
|
for i in range(10):
|
|
assert out[104 + i].startswith("# Stage 2/2 {:>2}/10 |".format(1 + i))
|
|
if i == 9:
|
|
assert out[104 + i].endswith("|\n")
|
|
else:
|
|
assert out[104 + i].endswith("|\r")
|
|
assert out[114] == '"This worked"\n'
|
|
assert len(out) == 115
|
|
|
|
# At debug level, we get the second prompt.
|
|
out = subprocess.check_output(['cli/lightning-cli',
|
|
'--network={}'.format(TEST_NETWORK),
|
|
'--lightning-dir={}'
|
|
.format(l1.daemon.lightning_dir),
|
|
'-N', 'debug',
|
|
'make_notify']).decode('utf-8').splitlines()
|
|
assert out[0] == '# Beginning stage 1'
|
|
assert out[1] == ''
|
|
for i in range(100):
|
|
assert out[2 + i].startswith("# Stage 1/2 {:>3}/100 |".format(1 + i))
|
|
assert out[2 + i].endswith("|")
|
|
assert out[102] == '# Beginning stage 2'
|
|
assert out[103] == ''
|
|
for i in range(10):
|
|
assert out[104 + i].startswith("# Stage 2/2 {:>2}/10 |".format(1 + i))
|
|
assert out[104 + i].endswith("|")
|
|
assert out[114] == '"This worked"'
|
|
assert len(out) == 115
|
|
|
|
# none suppresses
|
|
out = subprocess.check_output(['cli/lightning-cli',
|
|
'--network={}'.format(TEST_NETWORK),
|
|
'--lightning-dir={}'
|
|
.format(l1.daemon.lightning_dir),
|
|
'--notifications=none',
|
|
'make_notify']).decode('utf-8').splitlines()
|
|
assert out == ['"This worked"']
|
|
|
|
|
|
def test_htlc_accepted_hook_failcodes(node_factory):
|
|
plugin = os.path.join(os.path.dirname(__file__), 'plugins/htlc_accepted-failcode.py')
|
|
l1, l2 = node_factory.line_graph(2, opts=[{}, {'plugin': plugin}])
|
|
|
|
# First let's test the newer failure_message, which should get passed
|
|
# through without being mapped.
|
|
tests = {
|
|
'2002': 'WIRE_TEMPORARY_NODE_FAILURE',
|
|
'400F' + 12 * '00': 'WIRE_INCORRECT_OR_UNKNOWN_PAYMENT_DETAILS',
|
|
'4009': 'WIRE_REQUIRED_CHANNEL_FEATURE_MISSING',
|
|
'4016' + 3 * '00': 'WIRE_INVALID_ONION_PAYLOAD',
|
|
}
|
|
|
|
for failmsg, expected in tests.items():
|
|
l2.rpc.setfailcode(msg=failmsg)
|
|
inv = l2.rpc.invoice(42, 'failmsg{}'.format(failmsg), '')['bolt11']
|
|
with pytest.raises(RpcError, match=r'failcodename.: .{}.'.format(expected)):
|
|
l1.rpc.pay(inv)
|
|
|
|
# And now test the older failcode return value. This is deprecated and can
|
|
# be removed once we have removed the failcode correction code in
|
|
# peer_htlcs.c. The following ones get remapped
|
|
tests.update({
|
|
'400F': 'WIRE_TEMPORARY_NODE_FAILURE',
|
|
'4009': 'WIRE_TEMPORARY_NODE_FAILURE',
|
|
'4016': 'WIRE_TEMPORARY_NODE_FAILURE',
|
|
})
|
|
|
|
for failcode, expected in tests.items():
|
|
# Do not attempt with full messages
|
|
if len(failcode) > 4:
|
|
continue
|
|
|
|
l2.rpc.setfailcode(code=failcode)
|
|
inv = l2.rpc.invoice(42, 'failcode{}'.format(failcode), '')['bolt11']
|
|
with pytest.raises(RpcError, match=r'failcodename.: .{}.'.format(expected)):
|
|
l1.rpc.pay(inv)
|
|
|
|
|
|
def test_hook_dep(node_factory):
|
|
dep_a = os.path.join(os.path.dirname(__file__), 'plugins/dep_a.py')
|
|
dep_b = os.path.join(os.path.dirname(__file__), 'plugins/dep_b.py')
|
|
dep_c = os.path.join(os.path.dirname(__file__), 'plugins/dep_c.py')
|
|
l1, l2, l3 = node_factory.line_graph(3, opts=[{},
|
|
{'plugin': dep_b},
|
|
{'plugin': [dep_a, dep_b]}])
|
|
|
|
# l2 complains about the two unknown plugins, only.
|
|
# (Could be already past)
|
|
l2.daemon.logsearch_start = 0
|
|
l2.daemon.wait_for_logs(["unknown plugin dep_a.py",
|
|
"unknown plugin dep_c.py"])
|
|
assert not l2.daemon.is_in_log("unknown plugin (?!dep_a.py|dep_c.py)")
|
|
logstart = l2.daemon.logsearch_start
|
|
|
|
# l3 complains about the dep_c, only.
|
|
assert l3.daemon.is_in_log("unknown plugin dep_c.py")
|
|
assert not l3.daemon.is_in_log("unknown plugin (?!dep_c.py)")
|
|
|
|
# A says it has to be before B.
|
|
l2.rpc.plugin_start(plugin=dep_a)
|
|
l2.daemon.wait_for_log(r"started.*dep_a.py")
|
|
# Still doesn't know about c.
|
|
assert l2.daemon.is_in_log("unknown plugin dep_c.py", logstart)
|
|
|
|
l1.pay(l2, 100000)
|
|
# They must be called in this order!
|
|
l2.daemon.wait_for_log(r"dep_a.py: htlc_accepted called")
|
|
l2.daemon.wait_for_log(r"dep_b.py: htlc_accepted called")
|
|
|
|
# But depc will not load, due to cyclical dep
|
|
with pytest.raises(RpcError, match=r'Cannot meet required hook dependencies'):
|
|
l2.rpc.plugin_start(plugin=dep_c)
|
|
|
|
l1.rpc.plugin_start(plugin=dep_c)
|
|
l1.daemon.wait_for_log(r"started.*dep_c.py")
|
|
|
|
# Complaints about unknown plugin a, but nothing else
|
|
assert l1.daemon.is_in_log("unknown plugin dep_a.py")
|
|
assert not l1.daemon.is_in_log("unknown plugin (?!dep_a.py)")
|
|
|
|
|
|
def test_hook_dep_stable(node_factory):
|
|
# Load in order A, D, E, B.
|
|
# A says it has to be before B, D says it has to be before E.
|
|
# It should load in the order specified.
|
|
|
|
dep_a = os.path.join(os.path.dirname(__file__), 'plugins/dep_a.py')
|
|
dep_b = os.path.join(os.path.dirname(__file__), 'plugins/dep_b.py')
|
|
dep_d = os.path.join(os.path.dirname(__file__), 'plugins/dep_d.py')
|
|
dep_e = os.path.join(os.path.dirname(__file__), 'plugins/dep_e.py')
|
|
l1, l2 = node_factory.line_graph(2, opts=[{},
|
|
{'plugin': [dep_a, dep_d, dep_e, dep_b]}])
|
|
|
|
# dep_a mentions deb_c, but nothing else should be unknown.
|
|
# (Could be already past)
|
|
l2.daemon.logsearch_start = 0
|
|
l2.daemon.wait_for_log("unknown plugin dep_c.py")
|
|
assert not l2.daemon.is_in_log("unknown plugin (?!|dep_c.py)")
|
|
|
|
l1.pay(l2, 100000)
|
|
# They must be called in this order!
|
|
l2.daemon.wait_for_log(r"dep_a.py: htlc_accepted called")
|
|
l2.daemon.wait_for_log(r"dep_d.py: htlc_accepted called")
|
|
l2.daemon.wait_for_log(r"dep_e.py: htlc_accepted called")
|
|
l2.daemon.wait_for_log(r"dep_b.py: htlc_accepted called")
|
|
|
|
|
|
def test_htlc_accepted_hook_failonion(node_factory):
|
|
plugin = os.path.join(os.path.dirname(__file__), 'plugins/htlc_accepted-failonion.py')
|
|
l1, l2 = node_factory.line_graph(2, opts=[{}, {'plugin': plugin}])
|
|
|
|
# an invalid onion
|
|
l2.rpc.setfailonion('0' * (292 * 2))
|
|
inv = l2.rpc.invoice(42, 'failonion000', '')['bolt11']
|
|
with pytest.raises(RpcError):
|
|
l1.rpc.pay(inv)
|
|
|
|
|
|
def test_dynamic_args(node_factory):
|
|
plugin_path = os.path.join(os.getcwd(), 'contrib/plugins/helloworld.py')
|
|
|
|
l1 = node_factory.get_node()
|
|
l1.rpc.plugin_start(plugin_path, greeting='Test arg parsing')
|
|
|
|
assert l1.rpc.call("hello") == "Test arg parsing world"
|
|
plugin = only_one([p for p in l1.rpc.listconfigs()['plugins'] if p['path'] == plugin_path])
|
|
assert plugin['options']['greeting'] == 'Test arg parsing'
|
|
|
|
l1.rpc.plugin_stop(plugin_path)
|
|
|
|
assert [p for p in l1.rpc.listconfigs()['plugins'] if p['path'] == plugin_path] == []
|
|
|
|
|
|
def test_pyln_request_notify(node_factory):
|
|
"""Test that pyln-client plugins can send notifications.
|
|
"""
|
|
plugin_path = os.path.join(
|
|
os.path.dirname(__file__), 'plugins/countdown.py'
|
|
)
|
|
l1 = node_factory.get_node(options={'plugin': plugin_path})
|
|
notifications = []
|
|
|
|
def n(*args, message, **kwargs):
|
|
print("Got a notification:", message)
|
|
notifications.append(message)
|
|
|
|
with l1.rpc.notify(n):
|
|
l1.rpc.countdown(10)
|
|
|
|
expected = ['{}/10'.format(i) for i in range(10)]
|
|
assert expected == notifications
|
|
|
|
# Calling without the context manager we should not get any notifications
|
|
notifications = []
|
|
l1.rpc.countdown(10)
|
|
assert notifications == []
|
|
|
|
|
|
def test_self_disable(node_factory):
|
|
"""Test that plugin can disable itself without penalty.
|
|
"""
|
|
# This disables in response to getmanifest.
|
|
p1 = os.path.join(
|
|
os.path.dirname(__file__), 'plugins/test_selfdisable_after_getmanifest'
|
|
)
|
|
# This disables in response to init.
|
|
p2 = os.path.join(os.getcwd(), "tests/plugins/test_libplugin")
|
|
|
|
pydisable = os.path.join(
|
|
os.path.dirname(__file__), 'plugins/selfdisable.py'
|
|
)
|
|
l1 = node_factory.get_node(options={'important-plugin': [p1, p2],
|
|
'plugin': pydisable,
|
|
'selfdisable': None})
|
|
|
|
# Could happen before it gets set up.
|
|
l1.daemon.logsearch_start = 0
|
|
l1.daemon.wait_for_logs(['test_selfdisable_after_getmanifest: .* disabled itself: Self-disable test after getmanifest',
|
|
'test_libplugin: .* disabled itself at init: Disabled via selfdisable option',
|
|
'selfdisable.py: .* disabled itself at init: init saying disable'])
|
|
|
|
assert p1 not in [p['name'] for p in l1.rpc.plugin_list()['plugins']]
|
|
assert p2 not in [p['name'] for p in l1.rpc.plugin_list()['plugins']]
|
|
assert pydisable not in [p['name'] for p in l1.rpc.plugin_list()['plugins']]
|
|
|
|
# Also works with dynamic load attempts
|
|
with pytest.raises(RpcError, match="Self-disable test after getmanifest"):
|
|
l1.rpc.plugin_start(p1)
|
|
|
|
# Also works with dynamic load attempts
|
|
with pytest.raises(RpcError, match="Disabled via selfdisable option"):
|
|
l1.rpc.plugin_start(p2, selfdisable=True)
|
|
|
|
|
|
def test_custom_notification_topics(node_factory):
|
|
plugin = os.path.join(
|
|
os.path.dirname(__file__), "plugins", "custom_notifications.py"
|
|
)
|
|
l1, l2 = node_factory.line_graph(2, opts=[{'plugin': plugin}, {}])
|
|
l1.rpc.emit()
|
|
l1.daemon.wait_for_log(r'Got a custom notification Hello world')
|
|
|
|
inv = l2.rpc.invoice(42, "lbl", "desc")['bolt11']
|
|
l1.rpc.pay(inv)
|
|
|
|
l1.daemon.wait_for_log(r'Got a pay_success notification from plugin pay for payment_hash [0-9a-f]{64}')
|
|
|
|
# And now make sure that we drop unannounced notifications
|
|
l1.rpc.faulty_emit()
|
|
l1.daemon.wait_for_log(
|
|
r"Plugin attempted to send a notification to topic .* not forwarding"
|
|
)
|
|
time.sleep(1)
|
|
assert not l1.daemon.is_in_log(r'Got the ididntannouncethis event')
|
|
|
|
# The plugin just dist what previously was a fatal mistake (emit
|
|
# an unknown notification), make sure we didn't kill it.
|
|
assert 'custom_notifications.py' in [p['name'] for p in l1.rpc.listconfigs()['plugins']]
|
|
|
|
|
|
def test_restart_on_update(node_factory):
|
|
"""Tests if plugin rescan restarts modified plugins
|
|
"""
|
|
# we need to write plugin content dynamically
|
|
content = """#!/usr/bin/env python3
|
|
from pyln.client import Plugin
|
|
import time
|
|
plugin = Plugin()
|
|
@plugin.init()
|
|
def init(options, configuration, plugin):
|
|
plugin.log("test_restart_on_update %s")
|
|
plugin.run()
|
|
"""
|
|
|
|
# get a node that is not started so we can put a plugin in its lightning_dir
|
|
n = node_factory.get_node(start=False)
|
|
if "dev-no-plugin-checksum" in n.daemon.opts:
|
|
del n.daemon.opts["dev-no-plugin-checksum"]
|
|
|
|
lndir = n.daemon.lightning_dir
|
|
|
|
# write hello world plugin to lndir/plugins
|
|
os.makedirs(os.path.join(lndir, 'plugins'), exist_ok=True)
|
|
path = os.path.join(lndir, 'plugins', 'test_restart_on_update.py')
|
|
file = open(path, 'w+')
|
|
file.write(content % "1")
|
|
file.close()
|
|
os.chmod(path, os.stat(path).st_mode | stat.S_IEXEC)
|
|
|
|
# now fire up the node and wait for the plugin to print hello
|
|
n.daemon.start()
|
|
n.daemon.logsearch_start = 0
|
|
n.daemon.wait_for_log(r"test_restart_on_update 1")
|
|
|
|
# a rescan should not yet reload the plugin on the same file
|
|
n.rpc.plugin_rescan()
|
|
assert not n.daemon.is_in_log(r"Plugin changed, needs restart.")
|
|
|
|
# modify the file
|
|
file = open(path, 'w+')
|
|
file.write(content % "2")
|
|
file.close()
|
|
os.chmod(path, os.stat(path).st_mode | stat.S_IEXEC)
|
|
|
|
# rescan and check
|
|
n.rpc.plugin_rescan()
|
|
n.daemon.wait_for_log(r"Plugin changed, needs restart.")
|
|
n.daemon.wait_for_log(r"test_restart_on_update 2")
|
|
n.stop()
|
|
|
|
|
|
def test_plugin_shutdown(node_factory):
|
|
"""test 'shutdown' notifications, via `plugin stop` or via `stop`"""
|
|
|
|
p = os.path.join(os.getcwd(), "tests/plugins/test_libplugin")
|
|
p2 = os.path.join(os.getcwd(), 'tests/plugins/misc_notifications.py')
|
|
l1 = node_factory.get_node(options={'plugin': [p, p2]})
|
|
|
|
l1.rpc.plugin_stop(p)
|
|
l1.daemon.wait_for_log(r"test_libplugin: shutdown called")
|
|
# FIXME: clean this up!
|
|
l1.daemon.wait_for_log(r"test_libplugin: Killing plugin: exited during normal operation")
|
|
|
|
# Via `plugin stop` it can make RPC calls before it (self-)terminates
|
|
l1.rpc.plugin_stop(p2)
|
|
l1.daemon.wait_for_log(r'misc_notifications.py: via plugin stop, datastore success')
|
|
l1.rpc.plugin_start(p2)
|
|
|
|
# Now try timeout via `plugin stop`
|
|
l1.rpc.plugin_start(p, dont_shutdown=True)
|
|
l1.rpc.plugin_stop(p)
|
|
l1.daemon.wait_for_log(r"test_libplugin: shutdown called")
|
|
l1.daemon.wait_for_log(r"test_libplugin: Timeout on shutdown: killing anyway")
|
|
|
|
# Now, should also shutdown or timeout on finish, RPC calls then fail with error code -5
|
|
l1.rpc.plugin_start(p, dont_shutdown=True)
|
|
l1.rpc.stop()
|
|
l1.daemon.wait_for_logs(['test_libplugin: shutdown called',
|
|
'misc_notifications.py: via lightningd shutdown, datastore failed',
|
|
'test_libplugin: failed to self-terminate in time, killing.'])
|
|
|
|
|
|
def test_commando(node_factory, executor):
|
|
l1, l2 = node_factory.line_graph(2, fundchannel=False)
|
|
|
|
# Nothing works until we've issued a rune.
|
|
fut = executor.submit(l2.rpc.call, method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'method': 'listpeers'})
|
|
with pytest.raises(concurrent.futures.TimeoutError):
|
|
fut.result(10)
|
|
|
|
rune = l1.rpc.commando_rune()['rune']
|
|
|
|
# Bad rune fails
|
|
with pytest.raises(RpcError, match="Not authorized: Not derived from master"):
|
|
l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': 'VXY4AAkrPyH2vzSvOHnI7PDVfS6O04bRQLUCIUFJD5Y9NjQmbWV0aG9kPWludm9pY2UmcmF0ZT0yMZ==',
|
|
'method': 'listpeers'})
|
|
|
|
# This works
|
|
res = l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune,
|
|
'method': 'listpeers'})
|
|
assert len(res['peers']) == 1
|
|
assert res['peers'][0]['id'] == l2.info['id']
|
|
|
|
res = l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune,
|
|
'method': 'listpeers',
|
|
'params': {'id': l2.info['id']}})
|
|
assert len(res['peers']) == 1
|
|
assert res['peers'][0]['id'] == l2.info['id']
|
|
|
|
with pytest.raises(RpcError, match='missing required parameter'):
|
|
l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune,
|
|
'method': 'withdraw'})
|
|
|
|
with pytest.raises(RpcError, match='unknown parameter: foobar'):
|
|
l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'method': 'invoice',
|
|
'rune': rune,
|
|
'params': {'foobar': 1}})
|
|
|
|
ret = l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune,
|
|
'method': 'ping',
|
|
'params': {'id': l2.info['id']}})
|
|
assert 'totlen' in ret
|
|
|
|
# Now, reply will go over a multiple messages!
|
|
ret = l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune,
|
|
'method': 'getlog',
|
|
'params': {'level': 'io'}})
|
|
|
|
assert len(json.dumps(ret)) > 65535
|
|
|
|
# Command will go over multiple messages.
|
|
ret = l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune,
|
|
'method': 'invoice',
|
|
'params': {'amount_msat': 'any',
|
|
'label': 'label',
|
|
'description': 'A' * 200000,
|
|
'deschashonly': True}})
|
|
|
|
assert 'bolt11' in ret
|
|
|
|
# This will fail, will include data.
|
|
with pytest.raises(RpcError, match='No connection to first peer found') as exc_info:
|
|
l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune,
|
|
'method': 'sendpay',
|
|
'params': {'route': [{'amount_msat': 1000,
|
|
'id': l1.info['id'],
|
|
'delay': 12,
|
|
'channel': '1x2x3'}],
|
|
'payment_hash': '00' * 32}})
|
|
assert exc_info.value.error['data']['erring_index'] == 0
|
|
|
|
|
|
def test_commando_rune(node_factory):
|
|
l1, l2 = node_factory.line_graph(2, fundchannel=False)
|
|
|
|
# l1's commando secret is 1241faef85297127c2ac9bde95421b2c51e5218498ae4901dc670c974af4284b.
|
|
# I put that into a test node's commando.py to generate these runes (modified readonly to match ours):
|
|
# $ l1-cli commando-rune
|
|
# "rune": "zKc2W88jopslgUBl0UE77aEe5PNCLn5WwqSusU_Ov3A9MA=="
|
|
# $ l1-cli commando-rune restrictions=readonly
|
|
# "rune": "1PJnoR9a7u4Bhglj2s7rVOWqRQnswIwUoZrDVMKcLTY9MSZtZXRob2RebGlzdHxtZXRob2ReZ2V0fG1ldGhvZD1zdW1tYXJ5Jm1ldGhvZC9saXN0ZGF0YXN0b3Jl"
|
|
# $ l1-cli commando-rune restrictions='time>1656675211'
|
|
# "rune": "RnlWC4lwBULFaObo6ZP8jfqYRyTbfWPqcMT3qW-Wmso9MiZ0aW1lPjE2NTY2NzUyMTE="
|
|
# $ l1-cli commando-rune restrictions='["id^022d223620a359a47ff7","method=listpeers"]'
|
|
# "rune": "lXFWzb51HjWxKV5TmfdiBgd74w0moeyChj3zbLoxmws9MyZpZF4wMjJkMjIzNjIwYTM1OWE0N2ZmNyZtZXRob2Q9bGlzdHBlZXJz"
|
|
# $ l1-cli commando-rune lXFWzb51HjWxKV5TmfdiBgd74w0moeyChj3zbLoxmws9MyZpZF4wMjJkMjIzNjIwYTM1OWE0N2ZmNyZtZXRob2Q9bGlzdHBlZXJz 'pnamelevel!|pnamelevel/io'
|
|
# "rune": "Dw2tzGCoUojAyT0JUw7fkYJYqExpEpaDRNTkyvWKoJY9MyZpZF4wMjJkMjIzNjIwYTM1OWE0N2ZmNyZtZXRob2Q9bGlzdHBlZXJzJnBuYW1lbGV2ZWwhfHBuYW1lbGV2ZWwvaW8="
|
|
|
|
rune1 = l1.rpc.commando_rune()
|
|
assert rune1['rune'] == 'zKc2W88jopslgUBl0UE77aEe5PNCLn5WwqSusU_Ov3A9MA=='
|
|
assert rune1['unique_id'] == '0'
|
|
rune2 = l1.rpc.commando_rune(restrictions="readonly")
|
|
assert rune2['rune'] == '1PJnoR9a7u4Bhglj2s7rVOWqRQnswIwUoZrDVMKcLTY9MSZtZXRob2RebGlzdHxtZXRob2ReZ2V0fG1ldGhvZD1zdW1tYXJ5Jm1ldGhvZC9saXN0ZGF0YXN0b3Jl'
|
|
assert rune2['unique_id'] == '1'
|
|
rune3 = l1.rpc.commando_rune(restrictions="time>1656675211")
|
|
assert rune3['rune'] == 'RnlWC4lwBULFaObo6ZP8jfqYRyTbfWPqcMT3qW-Wmso9MiZ0aW1lPjE2NTY2NzUyMTE='
|
|
assert rune3['unique_id'] == '2'
|
|
rune4 = l1.rpc.commando_rune(restrictions=["id^022d223620a359a47ff7", "method=listpeers"])
|
|
assert rune4['rune'] == 'lXFWzb51HjWxKV5TmfdiBgd74w0moeyChj3zbLoxmws9MyZpZF4wMjJkMjIzNjIwYTM1OWE0N2ZmNyZtZXRob2Q9bGlzdHBlZXJz'
|
|
assert rune4['unique_id'] == '3'
|
|
rune5 = l1.rpc.commando_rune(rune4['rune'], "pnamelevel!|pnamelevel/io")
|
|
assert rune5['rune'] == 'Dw2tzGCoUojAyT0JUw7fkYJYqExpEpaDRNTkyvWKoJY9MyZpZF4wMjJkMjIzNjIwYTM1OWE0N2ZmNyZtZXRob2Q9bGlzdHBlZXJzJnBuYW1lbGV2ZWwhfHBuYW1lbGV2ZWwvaW8='
|
|
assert rune5['unique_id'] == '3'
|
|
rune6 = l1.rpc.commando_rune(rune5['rune'], "parr1!|parr1/io")
|
|
assert rune6['rune'] == '2Wh6F4R51D3esZzp-7WWG51OhzhfcYKaaI8qiIonaHE9MyZpZF4wMjJkMjIzNjIwYTM1OWE0N2ZmNyZtZXRob2Q9bGlzdHBlZXJzJnBuYW1lbGV2ZWwhfHBuYW1lbGV2ZWwvaW8mcGFycjEhfHBhcnIxL2lv'
|
|
assert rune6['unique_id'] == '3'
|
|
rune7 = l1.rpc.commando_rune(restrictions="pnum=0")
|
|
assert rune7['rune'] == 'QJonN6ySDFw-P5VnilZxlOGRs_tST1ejtd-bAYuZfjk9NCZwbnVtPTA='
|
|
assert rune7['unique_id'] == '4'
|
|
rune8 = l1.rpc.commando_rune(rune7['rune'], "rate=3")
|
|
assert rune8['rune'] == 'kSYFx6ON9hr_ExcQLwVkm1ABnvc1TcMFBwLrAVee0EA9NCZwbnVtPTAmcmF0ZT0z'
|
|
assert rune8['unique_id'] == '4'
|
|
rune9 = l1.rpc.commando_rune(rune8['rune'], "rate=1")
|
|
assert rune9['rune'] == 'O8Zr-ULTBKO3_pKYz0QKE9xYl1vQ4Xx9PtlHuist9Rk9NCZwbnVtPTAmcmF0ZT0zJnJhdGU9MQ=='
|
|
assert rune9['unique_id'] == '4'
|
|
|
|
runedecodes = ((rune1, []),
|
|
(rune2, [{'alternatives': ['method^list', 'method^get', 'method=summary'],
|
|
'summary': "method (of command) starts with 'list' OR method (of command) starts with 'get' OR method (of command) equal to 'summary'"},
|
|
{'alternatives': ['method/listdatastore'],
|
|
'summary': "method (of command) unequal to 'listdatastore'"}]),
|
|
(rune4, [{'alternatives': ['id^022d223620a359a47ff7'],
|
|
'summary': "id (of commanding peer) starts with '022d223620a359a47ff7'"},
|
|
{'alternatives': ['method=listpeers'],
|
|
'summary': "method (of command) equal to 'listpeers'"}]),
|
|
(rune5, [{'alternatives': ['id^022d223620a359a47ff7'],
|
|
'summary': "id (of commanding peer) starts with '022d223620a359a47ff7'"},
|
|
{'alternatives': ['method=listpeers'],
|
|
'summary': "method (of command) equal to 'listpeers'"},
|
|
{'alternatives': ['pnamelevel!', 'pnamelevel/io'],
|
|
'summary': "pnamelevel (object parameter 'level') is missing OR pnamelevel (object parameter 'level') unequal to 'io'"}]),
|
|
(rune6, [{'alternatives': ['id^022d223620a359a47ff7'],
|
|
'summary': "id (of commanding peer) starts with '022d223620a359a47ff7'"},
|
|
{'alternatives': ['method=listpeers'],
|
|
'summary': "method (of command) equal to 'listpeers'"},
|
|
{'alternatives': ['pnamelevel!', 'pnamelevel/io'],
|
|
'summary': "pnamelevel (object parameter 'level') is missing OR pnamelevel (object parameter 'level') unequal to 'io'"},
|
|
{'alternatives': ['parr1!', 'parr1/io'],
|
|
'summary': "parr1 (array parameter #1) is missing OR parr1 (array parameter #1) unequal to 'io'"}]),
|
|
(rune7, [{'alternatives': ['pnum=0'],
|
|
'summary': "pnum (number of command parameters) equal to 0"}]),
|
|
(rune8, [{'alternatives': ['pnum=0'],
|
|
'summary': "pnum (number of command parameters) equal to 0"},
|
|
{'alternatives': ['rate=3'],
|
|
'summary': "rate (max per minute) equal to 3"}]),
|
|
(rune9, [{'alternatives': ['pnum=0'],
|
|
'summary': "pnum (number of command parameters) equal to 0"},
|
|
{'alternatives': ['rate=3'],
|
|
'summary': "rate (max per minute) equal to 3"},
|
|
{'alternatives': ['rate=1'],
|
|
'summary': "rate (max per minute) equal to 1"}]))
|
|
for decode in runedecodes:
|
|
rune = decode[0]
|
|
restrictions = decode[1]
|
|
decoded = l1.rpc.decode(rune['rune'])
|
|
assert decoded['type'] == 'rune'
|
|
assert decoded['unique_id'] == rune['unique_id']
|
|
assert decoded['valid'] is True
|
|
assert decoded['restrictions'] == restrictions
|
|
|
|
# Time handling is a bit special, since we annotate the timestamp with how far away it is.
|
|
decoded = l1.rpc.decode(rune3['rune'])
|
|
assert decoded['type'] == 'rune'
|
|
assert decoded['unique_id'] == rune3['unique_id']
|
|
assert decoded['valid'] is True
|
|
assert len(decoded['restrictions']) == 1
|
|
assert decoded['restrictions'][0]['alternatives'] == ['time>1656675211']
|
|
assert decoded['restrictions'][0]['summary'].startswith("time (in seconds since 1970) greater than 1656675211 (")
|
|
|
|
# Replace rune3 with a more useful timestamp!
|
|
expiry = int(time.time()) + 15
|
|
rune3 = l1.rpc.commando_rune(restrictions="time<{}".format(expiry))
|
|
ratelimit_successes = ((rune9, "getinfo", {}),
|
|
(rune8, "getinfo", {}),
|
|
(rune8, "getinfo", {}))
|
|
successes = ((rune1, "listpeers", {}),
|
|
(rune2, "listpeers", {}),
|
|
(rune2, "getinfo", {}),
|
|
(rune2, "getinfo", {}),
|
|
(rune3, "getinfo", {}),
|
|
(rune4, "listpeers", {}),
|
|
(rune5, "listpeers", {'id': l2.info['id']}),
|
|
(rune5, "listpeers", {'id': l2.info['id'], 'level': 'broken'}),
|
|
(rune6, "listpeers", [l2.info['id'], 'broken']),
|
|
(rune6, "listpeers", [l2.info['id']]),
|
|
(rune7, "listpeers", []),
|
|
(rune7, "getinfo", {})) + ratelimit_successes
|
|
failures = ((rune2, "withdraw", {}),
|
|
(rune2, "plugin", {'subcommand': 'list'}),
|
|
(rune3, "getinfo", {}),
|
|
(rune4, "listnodes", {}),
|
|
(rune5, "listpeers", {'id': l2.info['id'], 'level': 'io'}),
|
|
(rune6, "listpeers", [l2.info['id'], 'io']),
|
|
(rune7, "listpeers", [l2.info['id']]),
|
|
(rune7, "listpeers", {'id': l2.info['id']}),
|
|
(rune9, "getinfo", {}),
|
|
(rune8, "getinfo", {}))
|
|
|
|
for rune, cmd, params in successes:
|
|
l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune['rune'],
|
|
'method': cmd,
|
|
'params': params})
|
|
|
|
while time.time() < expiry:
|
|
time.sleep(1)
|
|
|
|
for rune, cmd, params in failures:
|
|
print("{} {}".format(cmd, params))
|
|
with pytest.raises(RpcError, match='Not authorized:') as exc_info:
|
|
l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune['rune'],
|
|
'method': cmd,
|
|
'params': params})
|
|
assert exc_info.value.error['code'] == 0x4c51
|
|
|
|
# rune5 can only be used by l2:
|
|
l3 = node_factory.get_node()
|
|
l3.connect(l1)
|
|
with pytest.raises(RpcError, match='Not authorized:') as exc_info:
|
|
l3.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune5['rune'],
|
|
'method': "listpeers",
|
|
'params': {}})
|
|
assert exc_info.value.error['code'] == 0x4c51
|
|
|
|
# Now wait for ratelimit expiry, ratelimits should reset.
|
|
time.sleep(61)
|
|
|
|
for rune, cmd, params in ratelimit_successes:
|
|
l2.rpc.call(method='commando',
|
|
payload={'peer_id': l1.info['id'],
|
|
'rune': rune['rune'],
|
|
'method': cmd,
|
|
'params': params})
|
|
|
|
|
|
def test_commando_stress(node_factory, executor):
|
|
"""Stress test to slam commando with many large queries"""
|
|
nodes = node_factory.get_nodes(5)
|
|
|
|
rune = nodes[0].rpc.commando_rune()['rune']
|
|
for n in nodes[1:]:
|
|
n.connect(nodes[0])
|
|
|
|
futs = []
|
|
for i in range(1000):
|
|
node = random.choice(nodes[1:])
|
|
futs.append(executor.submit(node.rpc.call, method='commando',
|
|
payload={'peer_id': nodes[0].info['id'],
|
|
'rune': rune,
|
|
'method': 'invoice',
|
|
'params': {'amount_msat': 'any',
|
|
'label': 'label{}'.format(i),
|
|
'description': 'A' * 200000,
|
|
'deschashonly': True}}))
|
|
discards = 0
|
|
for f in futs:
|
|
try:
|
|
f.result(TIMEOUT)
|
|
except RpcError as e:
|
|
assert(e.error['code'] == 0x4c50)
|
|
assert(e.error['message'] == "Invalid JSON")
|
|
discards += 1
|
|
|
|
# Should have exactly one discard msg from each discard
|
|
nodes[0].daemon.wait_for_logs([r"New cmd from .*, replacing old"] * discards)
|
|
|
|
|
|
def test_commando_badrune(node_factory):
|
|
"""Test invalid UTF-8 encodings in rune: used to make us kill the offers plugin which implements decode, as it gave bad utf8!"""
|
|
l1 = node_factory.get_node()
|
|
l1.rpc.decode('5zi6-ugA6hC4_XZ0R7snl5IuiQX4ugL4gm9BQKYaKUU9gCZtZXRob2RebGlzdHxtZXRob2ReZ2V0fG1ldGhvZD1zdW1tYXJ5Jm1ldGhvZC9saXN0ZGF0YXN0b3Jl')
|
|
rune = l1.rpc.commando_rune(restrictions="readonly")
|
|
|
|
binrune = base64.urlsafe_b64decode(rune['rune'])
|
|
# Mangle each part, try decode. Skip most of the boring chars
|
|
# (just '|', '&', '#').
|
|
for i in range(32, len(binrune)):
|
|
for span in (range(0, 32), (124, 38, 35), range(127, 256)):
|
|
for c in span:
|
|
modrune = binrune[:i] + bytes([c]) + binrune[i + 1:]
|
|
try:
|
|
l1.rpc.decode(base64.urlsafe_b64encode(modrune).decode('utf8'))
|
|
except RpcError:
|
|
pass
|