2019-05-16 18:44:54 +02:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
# Copyright (c) 2019 The Bitcoin Core developers
|
|
|
|
# Distributed under the MIT software license, see the accompanying
|
|
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
"""Test p2p blocksonly"""
|
|
|
|
|
2021-06-24 12:47:04 +02:00
|
|
|
from test_framework.messages import msg_tx, tx_from_hex
|
2024-01-15 20:35:29 +01:00
|
|
|
from test_framework.p2p import P2PInterface
|
2019-05-16 18:44:54 +02:00
|
|
|
from test_framework.test_framework import BitcoinTestFramework
|
|
|
|
from test_framework.util import assert_equal
|
|
|
|
|
|
|
|
|
|
|
|
class P2PBlocksOnly(BitcoinTestFramework):
|
|
|
|
def set_test_params(self):
|
|
|
|
self.num_nodes = 1
|
|
|
|
self.extra_args = [["-blocksonly"]]
|
|
|
|
|
|
|
|
def run_test(self):
|
2020-09-25 14:18:21 +02:00
|
|
|
block_relay_peer = self.nodes[0].add_p2p_connection(P2PInterface())
|
2019-05-16 18:44:54 +02:00
|
|
|
|
2022-06-19 08:02:28 +02:00
|
|
|
self.log.info('Check that txs from p2p are rejected and result in disconnect')
|
2019-05-16 18:44:54 +02:00
|
|
|
prevtx = self.nodes[0].getblock(self.nodes[0].getblockhash(1), 2)['tx'][0]
|
|
|
|
rawtx = self.nodes[0].createrawtransaction(
|
|
|
|
inputs=[{
|
|
|
|
'txid': prevtx['txid'],
|
|
|
|
'vout': 0
|
|
|
|
}],
|
|
|
|
outputs=[{
|
|
|
|
self.nodes[0].get_deterministic_priv_key()[0]: 500 - 0.00125
|
|
|
|
}],
|
|
|
|
)
|
|
|
|
sigtx = self.nodes[0].signrawtransactionwithkey(
|
|
|
|
hexstring=rawtx,
|
|
|
|
privkeys=[self.nodes[0].get_deterministic_priv_key()[1]],
|
|
|
|
prevtxs=[{
|
|
|
|
'txid': prevtx['txid'],
|
|
|
|
'vout': 0,
|
|
|
|
'scriptPubKey': prevtx['vout'][0]['scriptPubKey']['hex'],
|
|
|
|
}],
|
|
|
|
)['hex']
|
|
|
|
assert_equal(self.nodes[0].getnetworkinfo()['localrelay'], False)
|
2022-07-07 17:11:38 +02:00
|
|
|
with self.nodes[0].assert_debug_log(['tx sent in violation of protocol peer=0']):
|
2021-06-24 12:47:04 +02:00
|
|
|
block_relay_peer.send_message(msg_tx(tx_from_hex(sigtx)))
|
2020-09-25 14:18:21 +02:00
|
|
|
block_relay_peer.wait_for_disconnect()
|
2019-05-16 18:44:54 +02:00
|
|
|
assert_equal(self.nodes[0].getmempoolinfo()['size'], 0)
|
|
|
|
|
2022-06-19 08:02:28 +02:00
|
|
|
# Remove the disconnected peer and add a new one.
|
|
|
|
del self.nodes[0].p2ps[0]
|
2020-09-25 14:18:21 +02:00
|
|
|
tx_relay_peer = self.nodes[0].add_p2p_connection(P2PInterface())
|
2022-06-19 08:02:28 +02:00
|
|
|
|
2019-05-16 18:44:54 +02:00
|
|
|
self.log.info('Check that txs from rpc are not rejected and relayed to other peers')
|
|
|
|
assert_equal(self.nodes[0].getpeerinfo()[0]['relaytxes'], True)
|
|
|
|
txid = self.nodes[0].testmempoolaccept([sigtx])[0]['txid']
|
2022-06-19 08:02:28 +02:00
|
|
|
with self.nodes[0].assert_debug_log(['received getdata for: tx {} peer=1'.format(txid)]):
|
2019-05-16 18:44:54 +02:00
|
|
|
self.nodes[0].sendrawtransaction(sigtx)
|
|
|
|
self.bump_mocktime(60)
|
2020-09-25 14:18:21 +02:00
|
|
|
tx_relay_peer.wait_for_tx(txid)
|
2019-05-16 18:44:54 +02:00
|
|
|
assert_equal(self.nodes[0].getmempoolinfo()['size'], 1)
|
|
|
|
|
2020-09-22 22:44:02 +02:00
|
|
|
self.log.info('Check that txs from peers with relay-permission are not rejected and relayed to others')
|
|
|
|
self.log.info("Restarting node 0 with relay permission and blocksonly")
|
|
|
|
self.restart_node(0, ["-persistmempool=0", "-whitelist=relay@127.0.0.1", "-blocksonly"])
|
2020-07-11 10:22:44 +02:00
|
|
|
assert_equal(self.nodes[0].getrawmempool(), [])
|
2020-05-21 14:58:57 +02:00
|
|
|
first_peer = self.nodes[0].add_p2p_connection(P2PInterface())
|
|
|
|
second_peer = self.nodes[0].add_p2p_connection(P2PInterface())
|
|
|
|
peer_1_info = self.nodes[0].getpeerinfo()[0]
|
2020-09-22 22:44:02 +02:00
|
|
|
assert_equal(peer_1_info['permissions'], ['relay'])
|
2020-05-21 14:58:57 +02:00
|
|
|
peer_2_info = self.nodes[0].getpeerinfo()[1]
|
2020-09-22 22:44:02 +02:00
|
|
|
assert_equal(peer_2_info['permissions'], ['relay'])
|
2020-05-21 14:58:57 +02:00
|
|
|
assert_equal(self.nodes[0].testmempoolaccept([sigtx])[0]['allowed'], True)
|
|
|
|
txid = self.nodes[0].testmempoolaccept([sigtx])[0]['txid']
|
|
|
|
|
2020-09-22 22:44:02 +02:00
|
|
|
self.log.info('Check that the tx from first_peer with relay-permission is relayed to others (ie.second_peer)')
|
2020-05-21 14:58:57 +02:00
|
|
|
with self.nodes[0].assert_debug_log(["received getdata"]):
|
2020-09-22 22:44:02 +02:00
|
|
|
# Note that normally, first_peer would never send us transactions since we're a blocksonly node.
|
|
|
|
# By activating blocksonly, we explicitly tell our peers that they should not send us transactions,
|
|
|
|
# and Bitcoin Core respects that choice and will not send transactions.
|
|
|
|
# But if, for some reason, first_peer decides to relay transactions to us anyway, we should relay them to
|
|
|
|
# second_peer since we gave relay permission to first_peer.
|
|
|
|
# See https://github.com/bitcoin/bitcoin/issues/19943 for details.
|
2021-06-24 12:47:04 +02:00
|
|
|
first_peer.send_message(msg_tx(tx_from_hex(sigtx)))
|
2020-09-22 22:44:02 +02:00
|
|
|
self.log.info('Check that the peer with relay-permission is still connected after sending the transaction')
|
2020-05-21 14:58:57 +02:00
|
|
|
assert_equal(first_peer.is_connected, True)
|
2020-09-22 22:44:02 +02:00
|
|
|
self.bump_mocktime(60)
|
2020-05-21 14:58:57 +02:00
|
|
|
second_peer.wait_for_tx(txid)
|
|
|
|
assert_equal(self.nodes[0].getmempoolinfo()['size'], 1)
|
2020-09-22 22:44:02 +02:00
|
|
|
self.log.info("Relay-permission peer's transaction is accepted and relayed")
|
2020-07-11 10:22:44 +02:00
|
|
|
|
2019-05-16 18:44:54 +02:00
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
P2PBlocksOnly().main()
|