mirror of
https://github.com/aljazceru/nutshell.git
synced 2026-01-09 03:34:19 +01:00
* first working version but some sats go missing * back at it * make format * restore to main * move mint database * fix some tests * make format * remove old _construct_outputs we reintroduced in merge with main * add type annotations * add wallet private key to tests * wallet: load proofs * fix tests * _generate_secrets with deterministic generation (temporary) * allow wallet initialization with custom private key * add pk to wallet api test * mint scope=module * remove private_key from test_wallet.py to see if it helps with the github tests * readd private keys to tests * workflow without env * add more private key! * readd env * ledger scope session * add default private key for testing * generate private keys if not available * testing * its working!!! * first iteration of bip32 working * get mint info and add many type annotations * tests * fix tests with bip32 * restore from multiple mints * disable profiler * make format * failed POST /mint do not increment secret counter * store derivation path in each token * fix tests * refactor migrations so private keys can be generated by the wallet with .with_db() classmethod * start fixing tests * all tests passing except those that need to set a specific private key * bip39 mnemonic to seed - with db but restore doesnt work yet with custom seed * mnemonic restore works * enter mnemonic in cli * fix tests to use different mnemonic * properly ask user for seed input * tests: dont ask for inputs * try to fix tests * fix cashu -d * fixing * bump version and add more text to mnemonic enter * add more comments * add many more comments and type annotations in the wallet * dont print generated mnemonic and dont wait for input * fix test * does this fix tests? * sigh.... * make format * do not restore from an initialized wallet * fix mnemonics * fix nitpicks * print wallet name if nonstandard wallet * fix merge error and remove comments * poetry lock and requirements * remove unused code * fix tests * mnemonic.lower() and add keyset id if not present for backwards compat * edit comment
344 lines
12 KiB
Python
344 lines
12 KiB
Python
import asyncio
|
|
import copy
|
|
import secrets
|
|
from typing import List
|
|
|
|
import pytest
|
|
import pytest_asyncio
|
|
|
|
from cashu.core.base import Proof, Secret, SecretKind, SigFlags, Tags
|
|
from cashu.core.crypto.secp import PrivateKey, PublicKey
|
|
from cashu.core.helpers import async_unwrap, sum_proofs
|
|
from cashu.core.migrations import migrate_databases
|
|
from cashu.core.settings import settings
|
|
from cashu.wallet import migrations
|
|
from cashu.wallet.wallet import Wallet
|
|
from cashu.wallet.wallet import Wallet as Wallet1
|
|
from cashu.wallet.wallet import Wallet as Wallet2
|
|
from tests.conftest import SERVER_ENDPOINT, mint
|
|
|
|
|
|
async def assert_err(f, msg):
|
|
"""Compute f() and expect an error message 'msg'."""
|
|
try:
|
|
await f
|
|
except Exception as exc:
|
|
if str(exc.args[0]) != msg:
|
|
raise Exception(f"Expected error: {msg}, got: {exc.args[0]}")
|
|
return
|
|
raise Exception(f"Expected error: {msg}, got no error")
|
|
|
|
|
|
def assert_amt(proofs: List[Proof], expected: int):
|
|
"""Assert amounts the proofs contain."""
|
|
assert [p.amount for p in proofs] == expected
|
|
|
|
|
|
@pytest_asyncio.fixture(scope="function")
|
|
async def wallet1(mint):
|
|
wallet1 = await Wallet1.with_db(SERVER_ENDPOINT, "data/wallet_p2pk_1", "wallet1")
|
|
await migrate_databases(wallet1.db, migrations)
|
|
await wallet1.load_mint()
|
|
wallet1.status()
|
|
yield wallet1
|
|
|
|
|
|
@pytest_asyncio.fixture(scope="function")
|
|
async def wallet2(mint):
|
|
wallet2 = await Wallet2.with_db(SERVER_ENDPOINT, "data/wallet_p2pk_2", "wallet2")
|
|
await migrate_databases(wallet2.db, migrations)
|
|
wallet2.private_key = PrivateKey(secrets.token_bytes(32), raw=True)
|
|
await wallet2.load_mint()
|
|
wallet2.status()
|
|
yield wallet2
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_create_p2pk_pubkey(wallet1: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey = await wallet1.create_p2pk_pubkey()
|
|
PublicKey(bytes.fromhex(pubkey), raw=True)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey()
|
|
# p2pk test
|
|
secret_lock = await wallet1.create_p2pk_lock(pubkey_wallet2) # sender side
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
await wallet2.redeem(send_proofs)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_receive_with_wrong_private_key(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey() # receiver side
|
|
# sender side
|
|
secret_lock = await wallet1.create_p2pk_lock(pubkey_wallet2) # sender side
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
# receiver side: wrong private key
|
|
wallet2.private_key = PrivateKey() # wrong private key
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs),
|
|
"Mint Error: no valid signature provided for input.",
|
|
)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_short_locktime_receive_with_wrong_private_key(
|
|
wallet1: Wallet, wallet2: Wallet
|
|
):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey() # receiver side
|
|
# sender side
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
pubkey_wallet2, locktime_seconds=4
|
|
) # sender side
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
# receiver side: wrong private key
|
|
wallet2.private_key = PrivateKey() # wrong private key
|
|
send_proofs_copy = copy.deepcopy(send_proofs)
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs),
|
|
"Mint Error: no valid signature provided for input.",
|
|
)
|
|
await asyncio.sleep(6)
|
|
# should succeed because even with the wrong private key we
|
|
# can redeem the tokens after the locktime
|
|
await wallet2.redeem(send_proofs_copy)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_locktime_with_refund_pubkey(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey() # receiver side
|
|
# sender side
|
|
garbage_pubkey = PrivateKey().pubkey
|
|
assert garbage_pubkey
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
garbage_pubkey.serialize().hex(), # create lock to unspendable pubkey
|
|
locktime_seconds=4, # locktime
|
|
tags=Tags([["refund", pubkey_wallet2]]), # refund pubkey
|
|
) # sender side
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
send_proofs_copy = copy.deepcopy(send_proofs)
|
|
# receiver side: can't redeem since we used a garbage pubkey
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs),
|
|
"Mint Error: no valid signature provided for input.",
|
|
)
|
|
await asyncio.sleep(6)
|
|
# we can now redeem because of the refund locktime
|
|
await wallet2.redeem(send_proofs_copy)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_locktime_with_wrong_refund_pubkey(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey() # receiver side
|
|
# sender side
|
|
garbage_pubkey = PrivateKey().pubkey
|
|
garbage_pubkey_2 = PrivateKey().pubkey
|
|
assert garbage_pubkey
|
|
assert garbage_pubkey_2
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
garbage_pubkey.serialize().hex(), # create lock to unspendable pubkey
|
|
locktime_seconds=4, # locktime
|
|
tags=Tags([["refund", garbage_pubkey_2.serialize().hex()]]), # refund pubkey
|
|
) # sender side
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
send_proofs_copy = copy.deepcopy(send_proofs)
|
|
# receiver side: can't redeem since we used a garbage pubkey
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs),
|
|
"Mint Error: no valid signature provided for input.",
|
|
)
|
|
await asyncio.sleep(6)
|
|
# we still can't redeem it because we used garbage_pubkey_2 as a refund pubkey
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs_copy),
|
|
"Mint Error: no valid signature provided for input.",
|
|
)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_multisig_2_of_2(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet1 = await wallet1.create_p2pk_pubkey()
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey()
|
|
assert pubkey_wallet1 != pubkey_wallet2
|
|
# p2pk test
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
pubkey_wallet2, tags=Tags([["pubkey", pubkey_wallet1]]), n_sigs=2
|
|
)
|
|
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
# add signatures of wallet2
|
|
send_proofs = await wallet1.add_p2pk_witnesses_to_proofs(send_proofs)
|
|
# here we add the signatures of wallet1
|
|
await wallet2.redeem(send_proofs)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_multisig_duplicate_signature(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet1 = await wallet1.create_p2pk_pubkey()
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey()
|
|
assert pubkey_wallet1 != pubkey_wallet2
|
|
# p2pk test
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
pubkey_wallet2, tags=Tags([["pubkey", pubkey_wallet1]]), n_sigs=2
|
|
)
|
|
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
# add signatures of wallet2
|
|
send_proofs = await wallet2.add_p2pk_witnesses_to_proofs(send_proofs)
|
|
# here we add the signatures of wallet1
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs), "Mint Error: p2pk signatures must be unique."
|
|
)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_multisig_quorum_not_met_1_of_2(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet1 = await wallet1.create_p2pk_pubkey()
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey()
|
|
assert pubkey_wallet1 != pubkey_wallet2
|
|
# p2pk test
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
pubkey_wallet2, tags=Tags([["pubkey", pubkey_wallet1]]), n_sigs=2
|
|
)
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs),
|
|
"Mint Error: not enough signatures provided: 1 < 2.",
|
|
)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_multisig_quorum_not_met_2_of_3(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet1 = await wallet1.create_p2pk_pubkey()
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey()
|
|
assert pubkey_wallet1 != pubkey_wallet2
|
|
# p2pk test
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
pubkey_wallet2, tags=Tags([["pubkey", pubkey_wallet1]]), n_sigs=3
|
|
)
|
|
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
# add signatures of wallet1
|
|
send_proofs = await wallet1.add_p2pk_witnesses_to_proofs(send_proofs)
|
|
# here we add the signatures of wallet2
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs),
|
|
"Mint Error: not enough signatures provided: 2 < 3.",
|
|
)
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_multisig_with_duplicate_publickey(wallet1: Wallet, wallet2: Wallet):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey()
|
|
# p2pk test
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
pubkey_wallet2, tags=Tags([["pubkey", pubkey_wallet2]]), n_sigs=2
|
|
)
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
await assert_err(wallet2.redeem(send_proofs), "Mint Error: pubkeys must be unique.")
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_p2pk_multisig_with_wrong_first_private_key(
|
|
wallet1: Wallet, wallet2: Wallet
|
|
):
|
|
await wallet1.mint(64)
|
|
pubkey_wallet1 = await wallet1.create_p2pk_pubkey()
|
|
pubkey_wallet2 = await wallet2.create_p2pk_pubkey()
|
|
wrong_pubklic_key = PrivateKey().pubkey
|
|
assert wrong_pubklic_key
|
|
wrong_public_key_hex = wrong_pubklic_key.serialize().hex()
|
|
|
|
assert wrong_public_key_hex != pubkey_wallet2
|
|
|
|
# p2pk test
|
|
secret_lock = await wallet1.create_p2pk_lock(
|
|
pubkey_wallet2, tags=Tags([["pubkey", wrong_public_key_hex]]), n_sigs=2
|
|
)
|
|
_, send_proofs = await wallet1.split_to_send(
|
|
wallet1.proofs, 8, secret_lock=secret_lock
|
|
)
|
|
# add signatures of wallet1
|
|
send_proofs = await wallet1.add_p2pk_witnesses_to_proofs(send_proofs)
|
|
await assert_err(
|
|
wallet2.redeem(send_proofs), "Mint Error: signature threshold not met. 1 < 2."
|
|
)
|
|
|
|
|
|
def test_tags():
|
|
tags = Tags([["key1", "value1"], ["key2", "value2"], ["key2", "value3"]])
|
|
assert tags.get_tag("key1") == "value1"
|
|
assert tags["key1"] == "value1"
|
|
assert tags.get_tag("key2") == "value2"
|
|
assert tags["key2"] == "value2"
|
|
assert tags.get_tag("key3") is None
|
|
assert tags["key3"] is None
|
|
assert tags.get_tag_all("key2") == ["value2", "value3"]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_secret_initialized_with_tags(wallet1: Wallet):
|
|
tags = Tags([["locktime", "100"], ["n_sigs", "3"], ["sigflag", "SIG_ALL"]])
|
|
pubkey = PrivateKey().pubkey
|
|
assert pubkey
|
|
secret = await wallet1.create_p2pk_lock(
|
|
pubkey=pubkey.serialize().hex(),
|
|
tags=tags,
|
|
)
|
|
assert secret.locktime
|
|
assert secret.locktime == 100
|
|
assert secret.n_sigs
|
|
assert secret.n_sigs == 3
|
|
assert secret.sigflag
|
|
assert secret.sigflag == SigFlags.SIG_ALL
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_secret_initialized_with_arguments(wallet1: Wallet):
|
|
pubkey = PrivateKey().pubkey
|
|
assert pubkey
|
|
secret = await wallet1.create_p2pk_lock(
|
|
pubkey=pubkey.serialize().hex(),
|
|
locktime_seconds=100,
|
|
n_sigs=3,
|
|
sig_all=True,
|
|
)
|
|
assert secret.locktime
|
|
assert secret.locktime > 1689000000
|
|
assert secret.n_sigs
|
|
assert secret.n_sigs == 3
|
|
assert secret.sigflag
|
|
assert secret.sigflag == SigFlags.SIG_ALL
|