mirror of
https://github.com/bitcoin/bitcoin.git
synced 2026-01-20 07:09:15 +01:00
The encoding arg is confusing, because it is not applied consistently for all IO. Also, it is useless, as the majority of files are ASCII encoded, which are fine to encode and decode with any mode. Moreover, UTF-8 is already required for most scripts to work properly, so setting the encoding twice is redundant. So remove the encoding from most IO. It would be fine to remove from all IO, however I kept it for two files: * contrib/asmap/asmap-tool.py: This specifically looks for utf-8 encoding errors, so it makes sense to sepecify the utf-8 encoding explicitly. * test/functional/test_framework/test_node.py: Reading the debug log in text mode specifically counts the utf-8 characters (not bytes), so it makes sense to specify the utf-8 encoding explicitly.
440 lines
21 KiB
Python
Executable File
440 lines
21 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# Copyright (c) 2018-present The Bitcoin Core developers
|
|
# Distributed under the MIT software license, see the accompanying
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
"""Backwards compatibility functional test
|
|
|
|
Test various backwards compatibility scenarios. Requires previous releases binaries,
|
|
see test/README.md.
|
|
|
|
Due to RPC changes introduced in various versions the below tests
|
|
won't work for older versions without some patches or workarounds.
|
|
|
|
Use only the latest patch version of each release, unless a test specifically
|
|
needs an older patch version.
|
|
"""
|
|
|
|
import json
|
|
import os
|
|
import shutil
|
|
|
|
from test_framework.blocktools import COINBASE_MATURITY
|
|
from test_framework.test_framework import BitcoinTestFramework
|
|
from test_framework.descriptors import descsum_create
|
|
from test_framework.messages import ser_string
|
|
|
|
from test_framework.util import (
|
|
assert_equal,
|
|
assert_greater_than,
|
|
assert_raises_rpc_error,
|
|
)
|
|
|
|
LAST_KEYPOOL_INDEX = 9 # Index of the last derived address with the keypool size of 10
|
|
|
|
class BackwardsCompatibilityTest(BitcoinTestFramework):
|
|
def set_test_params(self):
|
|
self.setup_clean_chain = True
|
|
self.num_nodes = 8
|
|
# Add new version after each release:
|
|
self.extra_args = [
|
|
["-addresstype=bech32", "-whitelist=noban@127.0.0.1"], # Pre-release: use to mine blocks. noban for immediate tx relay
|
|
["-nowallet", "-walletrbf=1", "-addresstype=bech32", "-whitelist=noban@127.0.0.1"], # Pre-release: use to receive coins, swap wallets, etc
|
|
["-nowallet", "-walletrbf=1", "-addresstype=bech32", "-whitelist=noban@127.0.0.1"], # v25.0
|
|
["-nowallet", "-walletrbf=1", "-addresstype=bech32", "-whitelist=noban@127.0.0.1"], # v24.0.1
|
|
["-nowallet", "-walletrbf=1", "-addresstype=bech32", "-whitelist=noban@127.0.0.1"], # v23.0
|
|
["-nowallet", "-walletrbf=1", "-addresstype=bech32", "-whitelist=noban@127.0.0.1", f"-keypool={LAST_KEYPOOL_INDEX + 1}"], # v22.0
|
|
["-nowallet", "-walletrbf=1", "-addresstype=bech32", "-whitelist=noban@127.0.0.1"], # v0.21.0
|
|
["-nowallet", "-walletrbf=1", "-addresstype=bech32", "-whitelist=noban@127.0.0.1"], # v0.20.1
|
|
]
|
|
self.wallet_names = [self.default_wallet_name]
|
|
|
|
def skip_test_if_missing_module(self):
|
|
self.skip_if_no_wallet()
|
|
self.skip_if_no_previous_releases()
|
|
|
|
def setup_nodes(self):
|
|
self.add_nodes(self.num_nodes, extra_args=self.extra_args, versions=[
|
|
None,
|
|
None,
|
|
250000,
|
|
240001,
|
|
230000,
|
|
220000,
|
|
210000,
|
|
200100,
|
|
])
|
|
|
|
self.start_nodes()
|
|
self.import_deterministic_coinbase_privkeys()
|
|
|
|
def split_version(self, node):
|
|
major = node.version // 10000
|
|
minor = (node.version % 10000) // 100
|
|
patch = (node.version % 100)
|
|
return (major, minor, patch)
|
|
|
|
def major_version_equals(self, node, major):
|
|
node_major, _, _ = self.split_version(node)
|
|
return node_major == major
|
|
|
|
def major_version_less_than(self, node, major):
|
|
node_major, _, _ = self.split_version(node)
|
|
return node_major < major
|
|
|
|
def major_version_at_least(self, node, major):
|
|
node_major, _, _ = self.split_version(node)
|
|
return node_major >= major
|
|
|
|
def test_v22_inactivehdchain_path(self):
|
|
self.log.info("Testing inactive hd chain bad derivation path cleanup")
|
|
# 0.21.x and 22.x would both produce bad derivation paths when topping up an inactive hd chain
|
|
# Make sure that this is being automatically cleaned up by migration
|
|
node_master = self.nodes[1]
|
|
node_v22 = self.nodes[self.num_nodes - 3]
|
|
wallet_name = "bad_deriv_path"
|
|
node_v22.createwallet(wallet_name=wallet_name, descriptors=False)
|
|
bad_deriv_wallet = node_v22.get_wallet_rpc(wallet_name)
|
|
|
|
# Make a dump of the wallet to get an unused address
|
|
dump_path = node_v22.wallets_path / f"{wallet_name}.dump"
|
|
bad_deriv_wallet.dumpwallet(dump_path)
|
|
addr = None
|
|
seed = None
|
|
with open(dump_path) as f:
|
|
for line in f:
|
|
if f"hdkeypath=m/0'/0'/{LAST_KEYPOOL_INDEX}'" in line:
|
|
addr = line.split(" ")[4].split("=")[1]
|
|
elif " hdseed=1 " in line:
|
|
seed = line.split(" ")[0]
|
|
assert addr is not None
|
|
assert seed is not None
|
|
# Rotate seed and unload
|
|
bad_deriv_wallet.sethdseed()
|
|
bad_deriv_wallet.unloadwallet()
|
|
# Receive at addr to trigger inactive chain topup on next load
|
|
self.nodes[0].sendtoaddress(addr, 1)
|
|
self.generate(self.nodes[0], 1, sync_fun=self.no_op)
|
|
self.sync_all(nodes=[self.nodes[0], node_master, node_v22])
|
|
node_v22.loadwallet(wallet_name)
|
|
|
|
# Dump again to find bad hd keypath
|
|
bad_deriv_path = f"m/0'/0'/{LAST_KEYPOOL_INDEX}'/0'/0'/{LAST_KEYPOOL_INDEX + 1}'"
|
|
good_deriv_path = f"m/0h/0h/{LAST_KEYPOOL_INDEX + 1}h"
|
|
os.unlink(dump_path)
|
|
bad_deriv_wallet.dumpwallet(dump_path)
|
|
bad_path_addr = None
|
|
with open(dump_path) as f:
|
|
for line in f:
|
|
if f"hdkeypath={bad_deriv_path}" in line:
|
|
bad_path_addr = line.split(" ")[4].split("=")[1]
|
|
assert bad_path_addr is not None
|
|
assert_equal(bad_deriv_wallet.getaddressinfo(bad_path_addr)["hdkeypath"], bad_deriv_path)
|
|
|
|
# Verify that this bad derivation path addr is actually at m/0'/0'/10' by making a new wallet with the same seed but larger keypool
|
|
node_v22.createwallet(wallet_name="path_verify", descriptors=False, blank=True)
|
|
verify_wallet = node_v22.get_wallet_rpc("path_verify")
|
|
verify_wallet.sethdseed(True, seed)
|
|
# Bad addr is after keypool, so need to generate it by refilling
|
|
verify_wallet.keypoolrefill(LAST_KEYPOOL_INDEX + 2)
|
|
assert_equal(verify_wallet.getaddressinfo(bad_path_addr)["hdkeypath"], good_deriv_path.replace("h", "'"))
|
|
|
|
# Migrate with master
|
|
# Since all keymeta records are now deleted after migration, the derivation path
|
|
# should now be correct as it is derived on-the-fly from the inactive hd chain's descriptor
|
|
backup_path = node_v22.wallets_path / f"{wallet_name}.bak"
|
|
bad_deriv_wallet.backupwallet(backup_path)
|
|
wallet_dir_master = os.path.join(node_master.wallets_path, wallet_name)
|
|
os.makedirs(wallet_dir_master, exist_ok=True)
|
|
shutil.copy(backup_path, os.path.join(wallet_dir_master, "wallet.dat"))
|
|
node_master.migratewallet(wallet_name)
|
|
bad_deriv_wallet_master = node_master.get_wallet_rpc(wallet_name)
|
|
assert_equal(bad_deriv_wallet_master.getaddressinfo(bad_path_addr)["hdkeypath"], good_deriv_path)
|
|
bad_deriv_wallet_master.unloadwallet()
|
|
|
|
def check_keymeta(conn):
|
|
# Retrieve all records that have the "keymeta" prefix. The remaining key data varies for each record.
|
|
keymeta_rec = conn.execute(f"SELECT value FROM main where key >= x'{ser_string(b'keymeta').hex()}' AND key < x'{ser_string(b'keymetb').hex()}'").fetchone()
|
|
assert_equal(keymeta_rec, None)
|
|
|
|
wallet_db = node_master.wallets_path / wallet_name / "wallet.dat"
|
|
self.inspect_sqlite_db(wallet_db, check_keymeta)
|
|
|
|
def test_ignore_legacy_during_startup(self, legacy_nodes, node_master):
|
|
self.log.info("Test that legacy wallets are ignored during startup on v29+")
|
|
|
|
legacy_node = legacy_nodes[0]
|
|
wallet_name = f"legacy_up_{legacy_node.version}"
|
|
legacy_node.loadwallet(wallet_name)
|
|
legacy_wallet = legacy_node.get_wallet_rpc(wallet_name)
|
|
|
|
# Move legacy wallet to latest node
|
|
wallet_path = node_master.wallets_path / wallet_name
|
|
wallet_path.mkdir()
|
|
legacy_wallet.backupwallet(wallet_path / "wallet.dat")
|
|
legacy_wallet.unloadwallet()
|
|
|
|
# Write wallet so it is automatically loaded during init
|
|
settings_path = node_master.chain_path / "settings.json"
|
|
with settings_path.open("w") as fp:
|
|
json.dump({"wallet": [wallet_name]}, fp)
|
|
|
|
# Restart latest node and verify that the legacy wallet load is skipped without exiting early during init.
|
|
self.restart_node(node_master.index, extra_args=[])
|
|
# Ensure we receive the warning message and clear the stderr pipe.
|
|
node_master.stderr.seek(0)
|
|
warning_msg = node_master.stderr.read().decode('utf-8').strip()
|
|
assert "The wallet appears to be a Legacy wallet, please use the wallet migration tool (migratewallet RPC or the GUI option)" in warning_msg
|
|
node_master.stderr.truncate(0), node_master.stderr.seek(0) # reset buffer
|
|
|
|
# Verify the node is still running (no shutdown occurred during startup)
|
|
node_master.getblockcount()
|
|
# Reset settings for any subsequent test
|
|
os.remove(settings_path)
|
|
|
|
def run_test(self):
|
|
node_miner = self.nodes[0]
|
|
node_master = self.nodes[1]
|
|
node_v21 = self.nodes[self.num_nodes - 2]
|
|
node_v20 = self.nodes[self.num_nodes - 1] # bdb only
|
|
|
|
legacy_nodes = self.nodes[2:] # Nodes that support legacy wallets
|
|
descriptors_nodes = self.nodes[2:-1] # Nodes that support descriptor wallets
|
|
|
|
self.generatetoaddress(node_miner, COINBASE_MATURITY + 1, node_miner.getnewaddress())
|
|
|
|
# Sanity check the test framework:
|
|
assert_equal(node_v20.getblockchaininfo()["blocks"], COINBASE_MATURITY + 1)
|
|
|
|
self.log.info("Test wallet backwards compatibility...")
|
|
# Create a number of wallets and open them in older versions:
|
|
|
|
# w1: regular wallet, created on master: update this test when default
|
|
# wallets can no longer be opened by older versions.
|
|
node_master.createwallet(wallet_name="w1")
|
|
wallet = node_master.get_wallet_rpc("w1")
|
|
info = wallet.getwalletinfo()
|
|
assert info['private_keys_enabled']
|
|
assert info['keypoolsize'] > 0
|
|
# Create a confirmed transaction, receiving coins
|
|
address = wallet.getnewaddress()
|
|
node_miner.sendtoaddress(address, 10)
|
|
self.sync_mempools()
|
|
self.generate(node_miner, 1)
|
|
# Create a conflicting transaction using RBF
|
|
return_address = node_miner.getnewaddress()
|
|
tx1_id = node_master.sendtoaddress(return_address, 1)
|
|
tx2_id = node_master.bumpfee(tx1_id)["txid"]
|
|
# Confirm the transaction
|
|
self.sync_mempools()
|
|
self.generate(node_miner, 1)
|
|
# Create another conflicting transaction using RBF
|
|
tx3_id = node_master.sendtoaddress(return_address, 1)
|
|
tx4_id = node_master.bumpfee(tx3_id)["txid"]
|
|
self.sync_mempools()
|
|
# Abandon transaction, but don't confirm
|
|
node_master.abandontransaction(tx3_id)
|
|
|
|
# w2: wallet with private keys disabled, created on master: update this
|
|
# test when default wallets private keys disabled can no longer be
|
|
# opened by older versions.
|
|
node_master.createwallet(wallet_name="w2", disable_private_keys=True)
|
|
wallet = node_master.get_wallet_rpc("w2")
|
|
info = wallet.getwalletinfo()
|
|
assert info['private_keys_enabled'] == False
|
|
assert info['keypoolsize'] == 0
|
|
|
|
# w3: blank wallet, created on master: update this
|
|
# test when default blank wallets can no longer be opened by older versions.
|
|
node_master.createwallet(wallet_name="w3", blank=True)
|
|
wallet = node_master.get_wallet_rpc("w3")
|
|
info = wallet.getwalletinfo()
|
|
assert info['private_keys_enabled']
|
|
assert info['keypoolsize'] == 0
|
|
|
|
# Unload wallets and copy to older nodes:
|
|
node_master_wallets_dir = node_master.wallets_path
|
|
node_master.unloadwallet("w1")
|
|
node_master.unloadwallet("w2")
|
|
node_master.unloadwallet("w3")
|
|
|
|
for node in legacy_nodes:
|
|
# Copy wallets to previous version
|
|
for wallet in os.listdir(node_master_wallets_dir):
|
|
dest = node.wallets_path / wallet
|
|
source = node_master_wallets_dir / wallet
|
|
shutil.copytree(source, dest)
|
|
|
|
self.log.info("Test that a wallet made on master can be opened on:")
|
|
# This test only works on the nodes that support descriptor wallets
|
|
# since we can no longer create legacy wallets.
|
|
for node in descriptors_nodes:
|
|
self.log.info(f"- {node.version}")
|
|
for wallet_name in ["w1", "w2", "w3"]:
|
|
if self.major_version_less_than(node, 22) and wallet_name == "w1":
|
|
# Descriptor wallets created after 0.21 have taproot descriptors which 0.21 does not support, tested below
|
|
continue
|
|
# Also try to reopen on master after opening on old
|
|
for n in [node, node_master]:
|
|
n.loadwallet(wallet_name)
|
|
wallet = n.get_wallet_rpc(wallet_name)
|
|
info = wallet.getwalletinfo()
|
|
if wallet_name == "w1":
|
|
assert info['private_keys_enabled'] == True
|
|
assert info['keypoolsize'] > 0
|
|
txs = wallet.listtransactions()
|
|
assert_equal(len(txs), 5)
|
|
assert_equal(txs[1]["txid"], tx1_id)
|
|
assert_equal(txs[2]["walletconflicts"], [tx1_id])
|
|
assert_equal(txs[1]["replaced_by_txid"], tx2_id)
|
|
assert not txs[1]["abandoned"]
|
|
assert_equal(txs[1]["confirmations"], -1)
|
|
assert_equal(txs[2]["blockindex"], 1)
|
|
assert txs[3]["abandoned"]
|
|
assert_equal(txs[4]["walletconflicts"], [tx3_id])
|
|
assert_equal(txs[3]["replaced_by_txid"], tx4_id)
|
|
assert not hasattr(txs[3], "blockindex")
|
|
elif wallet_name == "w2":
|
|
assert info['private_keys_enabled'] == False
|
|
assert info['keypoolsize'] == 0
|
|
else:
|
|
assert info['private_keys_enabled'] == True
|
|
assert info['keypoolsize'] == 0
|
|
|
|
# Copy back to master
|
|
wallet.unloadwallet()
|
|
if n == node:
|
|
shutil.rmtree(node_master.wallets_path / wallet_name)
|
|
shutil.copytree(
|
|
n.wallets_path / wallet_name,
|
|
node_master.wallets_path / wallet_name,
|
|
)
|
|
|
|
# Check that descriptor wallets don't work on legacy only nodes
|
|
self.log.info("Test descriptor wallet incompatibility on v0.20")
|
|
# Descriptor wallets appear to be corrupted wallets to old software
|
|
assert self.major_version_equals(node_v20, 20)
|
|
for wallet_name in ["w1", "w2", "w3"]:
|
|
assert_raises_rpc_error(-4, "Wallet file verification failed: wallet.dat corrupt, salvage failed", node_v20.loadwallet, wallet_name)
|
|
|
|
# w1 cannot be opened by 0.21 since it contains a taproot descriptor
|
|
self.log.info("Test that 0.21 cannot open wallet containing tr() descriptors")
|
|
assert_raises_rpc_error(-1, "map::at", node_v21.loadwallet, "w1")
|
|
|
|
self.log.info("Test that a wallet can upgrade to and downgrade from master, from:")
|
|
for node in descriptors_nodes:
|
|
self.log.info(f"- {node.version}")
|
|
wallet_name = f"up_{node.version}"
|
|
node.createwallet(wallet_name=wallet_name, descriptors=True)
|
|
wallet_prev = node.get_wallet_rpc(wallet_name)
|
|
address = wallet_prev.getnewaddress('', "bech32")
|
|
addr_info = wallet_prev.getaddressinfo(address)
|
|
|
|
hdkeypath = addr_info["hdkeypath"].replace("'", "h")
|
|
pubkey = addr_info["pubkey"]
|
|
|
|
# Make a backup of the wallet file
|
|
backup_path = os.path.join(self.options.tmpdir, f"{wallet_name}.dat")
|
|
wallet_prev.backupwallet(backup_path)
|
|
|
|
# Remove the wallet from old node
|
|
wallet_prev.unloadwallet()
|
|
|
|
# Open backup with sqlite and get flags
|
|
def get_flags(conn):
|
|
flags_rec = conn.execute(f"SELECT value FROM main WHERE key = x'{ser_string(b'flags').hex()}'").fetchone()
|
|
return int.from_bytes(flags_rec[0], byteorder="little")
|
|
|
|
old_flags = self.inspect_sqlite_db(backup_path, get_flags)
|
|
|
|
# Restore the wallet to master
|
|
load_res = node_master.restorewallet(wallet_name, backup_path)
|
|
|
|
# There should be no warnings
|
|
assert "warnings" not in load_res
|
|
|
|
wallet = node_master.get_wallet_rpc(wallet_name)
|
|
info = wallet.getaddressinfo(address)
|
|
descriptor = f"wpkh([{info['hdmasterfingerprint']}{hdkeypath[1:]}]{pubkey})"
|
|
assert_equal(info["desc"], descsum_create(descriptor))
|
|
|
|
# Make backup so the wallet can be copied back to old node
|
|
down_wallet_name = f"re_down_{node.version}"
|
|
down_backup_path = os.path.join(self.options.tmpdir, f"{down_wallet_name}.dat")
|
|
wallet.backupwallet(down_backup_path)
|
|
|
|
# Check that taproot descriptors can be added to 0.21 wallets
|
|
# This must be done after the backup is created so that 0.21 can still load
|
|
# the backup
|
|
if self.major_version_equals(node, 21):
|
|
assert_raises_rpc_error(-12, "No bech32m addresses available", wallet.getnewaddress, address_type="bech32m")
|
|
xpubs = wallet.gethdkeys(active_only=True)
|
|
assert_equal(len(xpubs), 1)
|
|
assert_equal(len(xpubs[0]["descriptors"]), 6)
|
|
wallet.createwalletdescriptor("bech32m")
|
|
xpubs = wallet.gethdkeys(active_only=True)
|
|
assert_equal(len(xpubs), 1)
|
|
assert_equal(len(xpubs[0]["descriptors"]), 8)
|
|
tr_descs = [desc["desc"] for desc in xpubs[0]["descriptors"] if desc["desc"].startswith("tr(")]
|
|
assert_equal(len(tr_descs), 2)
|
|
for desc in tr_descs:
|
|
assert info["hdmasterfingerprint"] in desc
|
|
wallet.getnewaddress(address_type="bech32m")
|
|
|
|
wallet.unloadwallet()
|
|
|
|
# Open the wallet with sqlite and inspect the flags and records
|
|
def check_upgraded_records(conn, old_flags):
|
|
flags_rec = conn.execute(f"SELECT value FROM main WHERE key = x'{ser_string(b'flags').hex()}'").fetchone()
|
|
new_flags = int.from_bytes(flags_rec[0], byteorder="little")
|
|
diff_flags = new_flags & ~old_flags
|
|
|
|
# Check for last hardened xpubs if the flag is newly set
|
|
if diff_flags & (1 << 2):
|
|
self.log.debug("Checking descriptor cache was upgraded")
|
|
# Fetch all records with the walletdescriptorlhcache prefix
|
|
lh_cache_recs = conn.execute(f"SELECT value FROM main where key >= x'{ser_string(b'walletdescriptorlhcache').hex()}' AND key < x'{ser_string(b'walletdescriptorlhcachf').hex()}'").fetchall()
|
|
assert_greater_than(len(lh_cache_recs), 0)
|
|
|
|
self.inspect_sqlite_db(down_backup_path, check_upgraded_records, old_flags)
|
|
|
|
# Check that no automatic upgrade broke downgrading the wallet
|
|
target_dir = node.wallets_path / down_wallet_name
|
|
os.makedirs(target_dir, exist_ok=True)
|
|
shutil.copyfile(
|
|
down_backup_path,
|
|
target_dir / "wallet.dat"
|
|
)
|
|
node.loadwallet(down_wallet_name)
|
|
wallet_res = node.get_wallet_rpc(down_wallet_name)
|
|
info = wallet_res.getaddressinfo(address)
|
|
assert_equal(info, addr_info)
|
|
|
|
self.log.info("Test that a wallet from a legacy only node must be migrated, from:")
|
|
for node in legacy_nodes:
|
|
self.log.info(f"- {node.version}")
|
|
wallet_name = f"legacy_up_{node.version}"
|
|
if self.major_version_at_least(node, 21):
|
|
node.createwallet(wallet_name=wallet_name, descriptors=False)
|
|
else:
|
|
node.createwallet(wallet_name=wallet_name)
|
|
wallet_prev = node.get_wallet_rpc(wallet_name)
|
|
address = wallet_prev.getnewaddress('', "bech32")
|
|
addr_info = wallet_prev.getaddressinfo(address)
|
|
|
|
# Make a backup of the wallet file
|
|
backup_path = os.path.join(self.options.tmpdir, f"{wallet_name}.dat")
|
|
wallet_prev.backupwallet(backup_path)
|
|
|
|
# Remove the wallet from old node
|
|
wallet_prev.unloadwallet()
|
|
|
|
# Restore the wallet to master
|
|
# Legacy wallets are no longer supported. Trying to load these should result in an error
|
|
assert_raises_rpc_error(-18, "The wallet appears to be a Legacy wallet, please use the wallet migration tool (migratewallet RPC or the GUI option)", node_master.restorewallet, wallet_name, backup_path)
|
|
|
|
self.test_v22_inactivehdchain_path()
|
|
self.test_ignore_legacy_during_startup(legacy_nodes, node_master)
|
|
|
|
if __name__ == '__main__':
|
|
BackwardsCompatibilityTest(__file__).main()
|