#!/usr/bin/env python import pytest from jmdaemon.orderbookwatch import OrderbookWatch from jmdaemon import IRCMessageChannel from jmclient import get_irc_mchannels, load_test_config from jmdaemon.protocol import JM_VERSION, ORDER_KEYS from jmbase.support import hextobin from jmbitcoin.fidelity_bond import FidelityBondProof class DummyDaemon(object): def request_signature_verify(self, a, b, c, d, e, f, g, h): return True class DummyMC(IRCMessageChannel): def __init__(self, configdata, nick, daemon): super().__init__(configdata, daemon=daemon) self.daemon = daemon self.set_nick(nick) def on_welcome(x): print("Simulated on-welcome") def get_ob(): load_test_config() dm = DummyDaemon() mc = DummyMC(get_irc_mchannels()[0], "test", dm) ob = OrderbookWatch() ob.on_welcome = on_welcome ob.set_msgchan(mc) return ob @pytest.mark.parametrize( "badtopic", [("abc|"), ("abcd|def"), ("abc| 0 a qvd"), ]) def test_ob(badtopic): ob = get_ob() topic = ("JoinMarket open outcry pit. /r/joinmarket Discussion in #joinmarket" "| 0 5 LATEST RELEASE v0.2.2. Useful new features. Update ASAP, and " "do not use pre-0.2.0! https://bitcointalk.org/index.php?topic=91911" "6.msg16714124#msg16714124") ob.on_set_topic(topic) #should not throw: ob.on_set_topic(badtopic) #test old version future_ver = str(JM_VERSION + 2) deprecated = topic.replace("| 0 5", "| 0 "+future_ver) ob.on_set_topic(deprecated) @pytest.mark.parametrize( "counterparty, oid, ordertype, minsize, maxsize, txfee, cjfee, expected", [ #good absoffer ("test", "0", "absoffer", "3000", "4000", "2", "300", True), #good reloffer ("test", "0", "reloffer", "3000", "4000", "2", "0.3", True), #dusty minsize OK ("test", "0", "reloffer", "1000", "4000", "2", "0.3", True), #invalid oid ("test", "-2", "reloffer", "3000", "4000", "2", "0.3", False), #invalid minsize ("test", "2", "reloffer", "-3000", "4000", "2", "0.3", False), #invalid maxsize ("test", "2", "reloffer", "3000", "2200000000000000", "2", "0.3", False), #invalid txfee ("test", "2", "reloffer", "3000", "4000", "-1", "0.3", False), #min bigger than max ("test", "2", "reloffer", "4000", "3000", "2", "0.3", False), #non-integer absoffer ("test", "2", "absoffer", "3000", "4000", "2", "0.3", False), #invalid syntax for cjfee ("test", "2", "reloffer", "3000", "4000", "2", "0.-1", False), #invalid type for oid ("test", "xxx", "reloffer", "3000", "4000", "2", "0.3", False), ]) def test_order_seen_cancel(counterparty, oid, ordertype, minsize, maxsize, txfee, cjfee, expected): ob = get_ob() ob.on_order_seen(counterparty, oid, ordertype, minsize, maxsize, txfee, cjfee) if expected: #offer should now be in the orderbook rows = ob.db.execute('SELECT * FROM orderbook;').fetchall() orderbook = [dict([(k, o[k]) for k in ORDER_KEYS]) for o in rows] assert len(orderbook) == 1 #test it can be removed ob.on_order_cancel(counterparty, oid) rows = ob.db.execute('SELECT * FROM orderbook;').fetchall() orderbook = [dict([(k, o[k]) for k in ORDER_KEYS]) for o in rows] assert len(orderbook) == 0 def test_disconnect_leave(): ob = get_ob() t_orderbook = [{u'counterparty': u'J5FA1Gj7Ln4vSGne', u'ordertype': u'reloffer', u'oid': 0, u'minsize': 7500000, u'txfee': 1000, u'maxsize': 599972700, u'cjfee': u'0.0002'}, {u'counterparty': u'J5CFffuuewjG44UJ', u'ordertype': u'reloffer', u'oid': 0, u'minsize': 7500000, u'txfee': 1000, u'maxsize': 599972700, u'cjfee': u'0.0002'}, {u'counterparty': u'J55z23xdjxJjC7er', u'ordertype': u'reloffer', u'oid': 0, u'minsize': 7500000, u'txfee': 1000, u'maxsize': 599972700, u'cjfee': u'0.0002'}, {u'counterparty': u'J54Ghp5PXCdY9H3t', u'ordertype': u'reloffer', u'oid': 0, u'minsize': 7500000, u'txfee': 1000, u'maxsize': 599972700, u'cjfee': u'0.0002'}, {u'counterparty': u'J559UPUSLLjHJpaB', u'ordertype': u'reloffer', u'oid': 0, u'minsize': 7500000, u'txfee': 1000, u'maxsize': 599972700, u'cjfee': u'0.0002'}, {u'counterparty': u'J5cBx1FwUVh9zzoO', u'ordertype': u'reloffer', u'oid': 0, u'minsize': 7500000, u'txfee': 1000, u'maxsize': 599972700, u'cjfee': u'0.0002'}] for o in t_orderbook: ob.on_order_seen(o['counterparty'], o['oid'], o['ordertype'], o['minsize'], o['maxsize'], o['txfee'], o['cjfee']) rows = ob.db.execute('SELECT * FROM orderbook;').fetchall() orderbook = [dict([(k, o[k]) for k in ORDER_KEYS]) for o in rows] assert len(orderbook) == 6 #simulate one cp leaves: ob.on_nick_leave("J5cBx1FwUVh9zzoO") rows = ob.db.execute('SELECT * FROM orderbook;').fetchall() orderbook = [dict([(k, o[k]) for k in ORDER_KEYS]) for o in rows] assert len(orderbook) == 5 #simulate quit ob.on_disconnect() rows = ob.db.execute('SELECT * FROM orderbook;').fetchall() orderbook = [dict([(k, o[k]) for k in ORDER_KEYS]) for o in rows] assert len(orderbook) == 0 @pytest.mark.parametrize( "valid, fidelity_bond_proof, maker_nick, taker_nick", [ ( True, { #nicksig len = 71, certsig len = 71 "nick-signature": (b'0E\x02!\x00\xdbb\x15\x96\xa0\x87\xb8\x1d\xe05\xddV\xa1\x1bn\x8f' + b'q\x90&\x8cG@\x89"2\xb2\x81\x9b\xc00\xa5\xb6\x02 \x03\x14l\xd7BR\xba\x8c:\x88(' + b'\x8e3l\xac\xf5`T\x87\xfa\xf5\xa9\x1f\x19\xc0\xb6\xe9\xbb\xdc\xc7y\x99'), "certificate-signature": ("3045022100eb512af938113badb4d7b29e0c22061c51dadb113a9395e" + "9ed81a46103391213022029170de414964f07228c4f0d404b1386272bae337f0133f1329d948a" + "252fa2a0"), "certificate-pubkey": "0258efb077960d6848f001904857f062fa453de26c1ad8736f55497254f56e8a74", "certificate-expiry": 1, "utxo-pubkey": "02f54f027377e84171296453828aa863c23fc4489453025f49bd3addfb3a359b3d", "txid": "84c88fafe0bb75f507fe3bfb29a93d10b2e80c15a63b2943c1a5fecb5a55cba2", "vout": 0, "locktime": 1640995200 }, "J5A4k9ecQzRRDfBx", "J55VZ6U6ZyFDNeuv" ), ( True, { #nicksig len = 71, certsig len = 70 "nick-signature": (b'0E\x02!\x00\x80\xc6$\x0c\xa1\x15YS\xacHB\xb33\xfa~\x9f\xb9`\xb3' + b'\xfe\xed0\xadHq\xc1~\x03.B\xbb#\x02 #y~]\xd9\xbbX2\xc0\x1b\xe57\xf4\x0f\x1f' + b'\xd6$\x01\xf9\x15Z\xc9X\xa5\x18\xbe\x83\x1a&4Y\xd4'), "certificate-signature": ("304402205669ea394f7381e9abf0b3c013fac2b79d24c02feb86ff153" + "cff83c658d7cf7402200b295ace655687f80738f3733c1dc5f1e2b8f351c017a05b8bd31983dd" + "4d723f"), "certificate-pubkey": "031d1c006a6310dbdf57341efc19c3a43c402379d7ccd2480416cadc7579f973f7", "certificate-expiry": 1, "utxo-pubkey": "02616c56412eb738a9eacfb0550b43a5a2e77e5d5205ea9e2ca8dfac34e50c9754", "txid": "84c88fafe0bb75f507fe3bfb29a93d10b2e80c15a63b2943c1a5fecb5a55cba2", "vout": 1, "locktime": 1893456000 }, "J54LS6YyJPoseqFS", "J55VZ6U6ZyFDNeuv" ), ( True, { #nicksig len = 70, certsig len = 71 "nick-signature": (b'0D\x02 K)\xe9\x17d\x0b\xc0\x82(\xd1\xa2*l\xd8\x0eJ\xc7\x01NV\xbf' + b'\xcb\x02O]\xc0\x11\x01\x01B"\xed\x02 ob\xa1\xf8>\x80U)\xc8\x96\x86\x1b \x0e' + b'\x00.\xf8\x86}\xcd\xf8\x82T\xa2\xb5\x8a4\xdb4\xbe\xf3{'), "certificate-signature": ("3045022100d3beb5660bef33d095f92a3023bbbab15ece48ab2f211fa" + "935b62fe8b764c8c002204892deffb4c9aa0d734aa3f55cc8e2baae4a03fc5a9e571b4f671493" + "f1254df9"), "certificate-pubkey": "03a2d1d15290d6d21204d1153c062970b4ff757a675e47a451fd0ba5c084127807", "certificate-expiry": 1, "utxo-pubkey": "03b9c12c9c31286772349b986653d07232327b284bd0787ad5829a04ac68f59b89", "txid": "70c2995b283db086813d97817264f10b8823b870298d30ab09cb43c6bf2670cf", "vout": 0, "locktime": 1735689600 }, "J59PRzM6ZsdA5uyJ", "J55VZ6U6ZyFDNeuv" ), ( False, { #nick signature with no DER header "nick-signature": (b'ZD\x02 K)\xe9\x17d\x0b\xc0\x82(\xd1\xa2*l\xd8\x0eJ\xc7\x01NV\xbf' + b'\xcb\x02O]\xc0\x11\x01\x01B"\xed\x02 ob\xa1\xf8>\x80U)\xc8\x96\x86\x1b \x0e' + b'\x00.\xf8\x86}\xcd\xf8\x82T\xa2\xb5\x8a4\xdb4\xbe\xf3{'), "certificate-signature": ("3045022100d3beb5660bef33d095f92a3023bbbab15ece48ab2f211fa" + "935b62fe8b764c8c002204892deffb4c9aa0d734aa3f55cc8e2baae4a03fc5a9e571b4f671493" + "f1254df9"), "certificate-pubkey": "03a2d1d15290d6d21204d1153c062970b4ff757a675e47a451fd0ba5c084127807", "certificate-expiry": 1, "utxo-pubkey": "03b9c12c9c31286772349b986653d07232327b284bd0787ad5829a04ac68f59b89", "txid": "70c2995b283db086813d97817264f10b8823b870298d30ab09cb43c6bf2670cf", "vout": 0, "locktime": 1735689600 }, "J59PRzM6ZsdA5uyJ", "J55VZ6U6ZyFDNeuv" ), ( False, { #nick signature which fails ecdsa_verify "nick-signature": (b'0E\x02 K)\xe9\x17d\x0b\xc0\x82(\xd1\xa2*l\xd8\x0eJ\xc7\x01NV\xbf' + b'\xcb\x02O]\xc0\x11\x01\x01B"\xed\x02 ob\xa1\xf8>\x80U)\xc8\x96\x86\x1b \x0e' + b'\x00.\xf8\x86}\xcd\xf8\x82T\xa2\xb5\x8a4\xdb4\xbe\xf3{'), "certificate-signature": ("3045022100d3beb5660bef33d095f92a3023bbbab15ece48ab2f211fa" + "935b62fe8b764c8c002204892deffb4c9aa0d734aa3f55cc8e2baae4a03fc5a9e571b4f671493" + "f1254df9"), "certificate-pubkey": "03a2d1d15290d6d21204d1153c062970b4ff757a675e47a451fd0ba5c084127807", "certificate-expiry": 1, "utxo-pubkey": "03b9c12c9c31286772349b986653d07232327b284bd0787ad5829a04ac68f59b89", "txid": "70c2995b283db086813d97817264f10b8823b870298d30ab09cb43c6bf2670cf", "vout": 0, "locktime": 1735689600 }, "J59PRzM6ZsdA5uyJ", "J55VZ6U6ZyFDNeuv" ), ( False, { #cert signature which fails ecdsa_verify "nick-signature": (b'0D\x02 K)\xe9\x17d\x0b\xc0\x82(\xd1\xa2*l\xd8\x0eJ\xc7\x01NV\xbf' + b'\xcb\x02O]\xc0\x11\x01\x01B"\xed\x02 ob\xa1\xf8>\x80U)\xc8\x96\x86\x1b \x0e' + b'\x00.\xf8\x86}\xcd\xf8\x82T\xa2\xb5\x8a4\xdb4\xbe\xf3{'), "certificate-signature": ("3055022100d3beb5660bef33d095f92a3023bbbab15ece48ab2f211fa" + "935b62fe8b764c8c002204892deffb4c9aa0d734aa3f55cc8e2baae4a03fc5a9e571b4f671493" + "f1254df9"), "certificate-pubkey": "03a2d1d15290d6d21204d1153c062970b4ff757a675e47a451fd0ba5c084127807", "certificate-expiry": 1, "utxo-pubkey": "03b9c12c9c31286772349b986653d07232327b284bd0787ad5829a04ac68f59b89", "txid": "70c2995b283db086813d97817264f10b8823b870298d30ab09cb43c6bf2670cf", "vout": 0, "locktime": 1735689600 }, "J59PRzM6ZsdA5uyJ", "J55VZ6U6ZyFDNeuv" ) ]) def test_fidelity_bond_seen(valid, fidelity_bond_proof, maker_nick, taker_nick): proof = FidelityBondProof( maker_nick, taker_nick, hextobin(fidelity_bond_proof['certificate-pubkey']), fidelity_bond_proof['certificate-expiry'], hextobin(fidelity_bond_proof['certificate-signature']), (hextobin(fidelity_bond_proof['txid']), fidelity_bond_proof['vout']), hextobin(fidelity_bond_proof['utxo-pubkey']), fidelity_bond_proof['locktime'] ) serialized = proof._serialize_proof_msg(fidelity_bond_proof['nick-signature']) ob = get_ob() ob.msgchan.nick = taker_nick ob.on_fidelity_bond_seen(maker_nick, fidelity_bond_cmd_list[0], serialized) rows = ob.db.execute("SELECT * FROM fidelitybonds;").fetchall() assert len(rows) == 1 assert rows[0]["counterparty"] == maker_nick assert rows[0]["takernick"] == taker_nick try: parsed_proof = FidelityBondProof.parse_and_verify_proof_msg(rows[0]["counterparty"], rows[0]["takernick"], rows[0]["proof"]) except ValueError: parsed_proof = None if valid: assert len(rows) == 1 assert rows[0]["counterparty"] == maker_nick assert rows[0]["vout"] == fidelity_bond_proof["vout"] assert rows[0]["locktime"] == fidelity_bond_proof["locktime"] assert rows[0]["certexpiry"] == fidelity_bond_proof["certificate-expiry"] assert rows[0]["txid"] == hextobin(fidelity_bond_proof["txid"]) assert rows[0]["utxopubkey"] == hextobin(fidelity_bond_proof["utxo-pubkey"]) else: assert len(rows) == 0 def test_duplicate_fidelity_bond_rejected(): fidelity_bond_info = ( ( { "nick-signature": (b'0E\x02!\x00\xdbb\x15\x96\xa0\x87\xb8\x1d\xe05\xddV\xa1\x1bn\x8f' + b'q\x90&\x8cG@\x89"2\xb2\x81\x9b\xc00\xa5\xb6\x02 \x03\x14l\xd7BR\xba\x8c:\x88(' + b'\x8e3l\xac\xf5`T\x87\xfa\xf5\xa9\x1f\x19\xc0\xb6\xe9\xbb\xdc\xc7y\x99'), "certificate-signature": ("3045022100eb512af938113badb4d7b29e0c22061c51dadb113a9395e" + "9ed81a46103391213022029170de414964f07228c4f0d404b1386272bae337f0133f1329d948a" + "252fa2a0"), "certificate-pubkey": "0258efb077960d6848f001904857f062fa453de26c1ad8736f55497254f56e8a74", "certificate-expiry": 1, "utxo-pubkey": "02f54f027377e84171296453828aa863c23fc4489453025f49bd3addfb3a359b3d", "txid": "84c88fafe0bb75f507fe3bfb29a93d10b2e80c15a63b2943c1a5fecb5a55cba2", "vout": 0, "locktime": 1640995200 }, "J5A4k9ecQzRRDfBx", "J55VZ6U6ZyFDNeuv" ), ( { "nick-signature": (b'0E\x02!\x00\x80\xc6$\x0c\xa1\x15YS\xacHB\xb33\xfa~\x9f\xb9`\xb3' + b'\xfe\xed0\xadHq\xc1~\x03.B\xbb#\x02 #y~]\xd9\xbbX2\xc0\x1b\xe57\xf4\x0f\x1f' + b'\xd6$\x01\xf9\x15Z\xc9X\xa5\x18\xbe\x83\x1a&4Y\xd4'), "certificate-signature": ("304402205669ea394f7381e9abf0b3c013fac2b79d24c02feb86ff153" + "cff83c658d7cf7402200b295ace655687f80738f3733c1dc5f1e2b8f351c017a05b8bd31983dd" + "4d723f"), "certificate-pubkey": "031d1c006a6310dbdf57341efc19c3a43c402379d7ccd2480416cadc7579f973f7", "certificate-expiry": 1, "utxo-pubkey": "02616c56412eb738a9eacfb0550b43a5a2e77e5d5205ea9e2ca8dfac34e50c9754", "txid": "84c88fafe0bb75f507fe3bfb29a93d10b2e80c15a63b2943c1a5fecb5a55cba2", "vout": 1, "locktime": 1893456000 }, "J54LS6YyJPoseqFS", "J55VZ6U6ZyFDNeuv" ) ) ob = get_ob() fidelity_bond_proof1, maker_nick1, taker_nick1 = fidelity_bond_info[0] proof = FidelityBondProof( maker_nick1, taker_nick1, hextobin(fidelity_bond_proof1['certificate-pubkey']), fidelity_bond_proof1['certificate-expiry'], hextobin(fidelity_bond_proof1['certificate-signature']), (hextobin(fidelity_bond_proof1['txid']), fidelity_bond_proof1['vout']), hextobin(fidelity_bond_proof1['utxo-pubkey']), fidelity_bond_proof1['locktime'] ) serialized1 = proof._serialize_proof_msg(fidelity_bond_proof1['nick-signature']) ob.msgchan.nick = taker_nick1 ob.on_fidelity_bond_seen(maker_nick1, fidelity_bond_cmd_list[0], serialized1) rows = ob.db.execute("SELECT * FROM fidelitybonds;").fetchall() assert len(rows) == 1 #show the same fidelity bond message again, check it gets rejected as duplicate ob.on_fidelity_bond_seen(maker_nick1, fidelity_bond_cmd_list[0], serialized1) rows = ob.db.execute("SELECT * FROM fidelitybonds;").fetchall() assert len(rows) == 1 #show a different fidelity bond and check it does get accepted fidelity_bond_proof2, maker_nick2, taker_nick2 = fidelity_bond_info[1] proof2 = FidelityBondProof( maker_nick1, taker_nick1, hextobin(fidelity_bond_proof2['certificate-pubkey']), fidelity_bond_proof2['certificate-expiry'], hextobin(fidelity_bond_proof2['certificate-signature']), (hextobin(fidelity_bond_proof2['txid']), fidelity_bond_proof2['vout']), hextobin(fidelity_bond_proof2['utxo-pubkey']), fidelity_bond_proof2['locktime'] ) serialized2 = proof2._serialize_proof_msg(fidelity_bond_proof2['nick-signature']) ob.msgchan.nick = taker_nick2 ob.on_fidelity_bond_seen(maker_nick2, fidelity_bond_cmd_list[0], serialized2) rows = ob.db.execute("SELECT * FROM fidelitybonds;").fetchall() assert len(rows) == 2