2019-02-10 20:07:17 +01:00
#!/usr/bin/env python3
2023-08-16 19:27:31 +02:00
# Copyright (c) 2018-2020 The Bitcoin Core developers
2019-02-10 20:07:17 +01:00
# Distributed under the MIT software license, see the accompanying
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
""" Test createwallet arguments.
"""
2020-11-02 16:54:06 +01:00
from test_framework . address import key_to_p2pkh
from test_framework . descriptors import descsum_create
from test_framework . key import ECKey
2019-02-10 20:07:17 +01:00
from test_framework . test_framework import BitcoinTestFramework
from test_framework . util import (
assert_equal ,
assert_raises_rpc_error ,
)
2020-11-02 16:54:06 +01:00
from test_framework . wallet_util import bytes_to_wif , generate_wif_key
2019-02-10 20:07:17 +01:00
class CreateWalletTest ( BitcoinTestFramework ) :
def set_test_params ( self ) :
self . num_nodes = 1
def skip_test_if_missing_module ( self ) :
self . skip_if_no_wallet ( )
def run_test ( self ) :
node = self . nodes [ 0 ]
node . generate ( 1 ) # Leave IBD for sethdseed
self . nodes [ 0 ] . createwallet ( wallet_name = ' w0 ' )
w0 = node . get_wallet_rpc ( ' w0 ' )
address1 = w0 . getnewaddress ( )
self . log . info ( " Test disableprivatekeys creation. " )
self . nodes [ 0 ] . createwallet ( wallet_name = ' w1 ' , disable_private_keys = True )
w1 = node . get_wallet_rpc ( ' w1 ' )
2019-02-15 00:51:38 +01:00
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w1 . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w1 . getrawchangeaddress )
2019-02-10 20:07:17 +01:00
w1 . importpubkey ( w0 . getaddressinfo ( address1 ) [ ' pubkey ' ] )
self . log . info ( ' Test that private keys cannot be imported ' )
2020-11-02 16:54:06 +01:00
eckey = ECKey ( )
eckey . generate ( )
privkey = bytes_to_wif ( eckey . get_bytes ( ) )
2019-02-10 20:07:17 +01:00
assert_raises_rpc_error ( - 4 , ' Cannot import private keys to a wallet with private keys disabled ' , w1 . importprivkey , privkey )
2020-11-02 16:54:06 +01:00
if self . options . descriptors :
result = w1 . importdescriptors ( [ { ' desc ' : descsum_create ( ' pkh( ' + privkey + ' ) ' ) , ' timestamp ' : ' now ' } ] )
else :
result = w1 . importmulti ( [ { ' scriptPubKey ' : { ' address ' : key_to_p2pkh ( eckey . get_pubkey ( ) . get_bytes ( ) ) } , ' timestamp ' : ' now ' , ' keys ' : [ privkey ] } ] )
assert not result [ 0 ] [ ' success ' ]
assert ' warning ' not in result [ 0 ]
2019-02-10 20:07:17 +01:00
assert_equal ( result [ 0 ] [ ' error ' ] [ ' code ' ] , - 4 )
assert_equal ( result [ 0 ] [ ' error ' ] [ ' message ' ] , ' Cannot import private keys to a wallet with private keys disabled ' )
self . log . info ( " Test blank creation with private keys disabled. " )
self . nodes [ 0 ] . createwallet ( wallet_name = ' w2 ' , disable_private_keys = True , blank = True )
w2 = node . get_wallet_rpc ( ' w2 ' )
2019-02-15 00:51:38 +01:00
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w2 . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w2 . getrawchangeaddress )
2019-02-10 20:07:17 +01:00
w2 . importpubkey ( w0 . getaddressinfo ( address1 ) [ ' pubkey ' ] )
self . log . info ( " Test blank creation with private keys enabled. " )
self . nodes [ 0 ] . createwallet ( wallet_name = ' w3 ' , disable_private_keys = False , blank = True )
w3 = node . get_wallet_rpc ( ' w3 ' )
assert_equal ( w3 . getwalletinfo ( ) [ ' keypoolsize ' ] , 0 )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w3 . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w3 . getrawchangeaddress )
# Import private key
2020-11-02 16:54:06 +01:00
w3 . importprivkey ( generate_wif_key ( ) )
2019-02-10 20:07:17 +01:00
# Imported private keys are currently ignored by the keypool
assert_equal ( w3 . getwalletinfo ( ) [ ' keypoolsize ' ] , 0 )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w3 . getnewaddress )
# Set the seed
2020-11-02 16:54:06 +01:00
if self . options . descriptors :
w3 . importdescriptors ( [ {
' desc ' : descsum_create ( ' pkh(tprv8ZgxMBicQKsPcwuZGKp8TeWppSuLMiLe2d9PupB14QpPeQsqoj3LneJLhGHH13xESfvASyd4EFLJvLrG8b7DrLxEuV7hpF9uUc6XruKA1Wq/0h/*) ' ) ,
' timestamp ' : ' now ' ,
' active ' : True
} ,
{
' desc ' : descsum_create ( ' pkh(tprv8ZgxMBicQKsPcwuZGKp8TeWppSuLMiLe2d9PupB14QpPeQsqoj3LneJLhGHH13xESfvASyd4EFLJvLrG8b7DrLxEuV7hpF9uUc6XruKA1Wq/1h/*) ' ) ,
' timestamp ' : ' now ' ,
' active ' : True ,
' internal ' : True
} ] )
else :
w3 . upgradetohd ( )
2019-02-10 20:07:17 +01:00
assert_equal ( w3 . getwalletinfo ( ) [ ' keypoolsize ' ] , 1 )
w3 . getnewaddress ( )
w3 . getrawchangeaddress ( )
self . log . info ( " Test blank creation with privkeys enabled and then encryption " )
self . nodes [ 0 ] . createwallet ( wallet_name = ' w4 ' , disable_private_keys = False , blank = True )
w4 = node . get_wallet_rpc ( ' w4 ' )
assert_equal ( w4 . getwalletinfo ( ) [ ' keypoolsize ' ] , 0 )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w4 . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w4 . getrawchangeaddress )
# Encrypt the wallet. Nothing should change about the keypool
w4 . encryptwallet ( ' pass ' )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w4 . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w4 . getrawchangeaddress )
# Now set a seed and it should work. Wallet should also be encrypted
2020-03-11 13:38:59 +01:00
w4 . walletpassphrase ( ' pass ' , 60 )
2020-11-02 16:54:06 +01:00
if self . options . descriptors :
w4 . importdescriptors ( [ {
' desc ' : descsum_create ( ' pkh(tprv8ZgxMBicQKsPcwuZGKp8TeWppSuLMiLe2d9PupB14QpPeQsqoj3LneJLhGHH13xESfvASyd4EFLJvLrG8b7DrLxEuV7hpF9uUc6XruKA1Wq/0h/*) ' ) ,
' timestamp ' : ' now ' ,
' active ' : True
} ,
{
' desc ' : descsum_create ( ' pkh(tprv8ZgxMBicQKsPcwuZGKp8TeWppSuLMiLe2d9PupB14QpPeQsqoj3LneJLhGHH13xESfvASyd4EFLJvLrG8b7DrLxEuV7hpF9uUc6XruKA1Wq/1h/*) ' ) ,
' timestamp ' : ' now ' ,
' active ' : True ,
' internal ' : True
} ] )
else :
w4 . upgradetohd ( walletpassphrase = ' pass ' )
2019-02-10 20:07:17 +01:00
w4 . getnewaddress ( )
w4 . getrawchangeaddress ( )
self . log . info ( " Test blank creation with privkeys disabled and then encryption " )
self . nodes [ 0 ] . createwallet ( wallet_name = ' w5 ' , disable_private_keys = True , blank = True )
w5 = node . get_wallet_rpc ( ' w5 ' )
assert_equal ( w5 . getwalletinfo ( ) [ ' keypoolsize ' ] , 0 )
2019-02-15 00:51:38 +01:00
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w5 . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w5 . getrawchangeaddress )
2019-02-10 20:07:17 +01:00
# Encrypt the wallet
assert_raises_rpc_error ( - 16 , " Error: wallet does not contain private keys, nothing to encrypt. " , w5 . encryptwallet , ' pass ' )
2019-02-15 00:51:38 +01:00
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w5 . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , w5 . getrawchangeaddress )
2019-02-10 20:07:17 +01:00
2019-05-16 18:20:05 +02:00
self . log . info ( ' New blank and encrypted wallets can be created ' )
self . nodes [ 0 ] . createwallet ( wallet_name = ' wblank ' , disable_private_keys = False , blank = True , passphrase = ' thisisapassphrase ' )
wblank = node . get_wallet_rpc ( ' wblank ' )
assert_raises_rpc_error ( - 13 , " Error: Please enter the wallet passphrase with walletpassphrase first. " , wblank . signmessage , " needanargument " , " test " )
2020-03-11 21:17:09 +01:00
wblank . walletpassphrase ( ' thisisapassphrase ' , 60 )
2019-05-16 18:20:05 +02:00
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , wblank . getnewaddress )
assert_raises_rpc_error ( - 4 , " Error: This wallet has no available keys " , wblank . getrawchangeaddress )
self . log . info ( ' Test creating a new encrypted wallet. ' )
# Born encrypted wallet is created (has keys)
self . nodes [ 0 ] . createwallet ( wallet_name = ' w6 ' , disable_private_keys = False , blank = False , passphrase = ' thisisapassphrase ' )
w6 = node . get_wallet_rpc ( ' w6 ' )
assert_raises_rpc_error ( - 13 , " Error: Please enter the wallet passphrase with walletpassphrase first. " , w6 . signmessage , " needanargument " , " test " )
2020-03-11 21:17:09 +01:00
w6 . walletpassphrase ( ' thisisapassphrase ' , 60 )
2019-05-16 18:20:05 +02:00
w6 . signmessage ( w6 . getnewaddress ( ) , " test " )
w6 . keypoolrefill ( 1 )
2020-11-02 16:54:06 +01:00
# There should only be 1 key for legacy, 1 for descriptors (dash has only one type of addresses)
2019-05-16 18:20:05 +02:00
walletinfo = w6 . getwalletinfo ( )
2020-11-02 16:54:06 +01:00
keys = 1 if self . options . descriptors else 1
assert_equal ( walletinfo [ ' keypoolsize ' ] , keys )
# hd_internals are not refilled by default for descriptor wallets atm
assert_equal ( walletinfo [ ' keypoolsize_hd_internal ' ] , keys )
2019-08-01 09:10:18 +02:00
# Allow empty passphrase, but there should be a warning
resp = self . nodes [ 0 ] . createwallet ( wallet_name = ' w7 ' , disable_private_keys = False , blank = False , passphrase = ' ' )
2020-11-02 16:54:06 +01:00
assert ' Empty string given as passphrase, wallet will not be encrypted. ' in resp [ ' warning ' ]
2019-08-01 09:10:18 +02:00
w7 = node . get_wallet_rpc ( ' w7 ' )
2020-03-11 21:17:09 +01:00
assert_raises_rpc_error ( - 15 , ' Error: running with an unencrypted wallet, but walletpassphrase was called. ' , w7 . walletpassphrase , ' ' , 60 )
2019-08-01 09:10:18 +02:00
2023-04-09 07:11:22 +02:00
self . log . info ( ' Test making a wallet with avoid reuse flag ' )
self . nodes [ 0 ] . createwallet ( ' w8 ' , False , False , ' ' , True ) # Use positional arguments to check for bug where avoid_reuse could not be set for wallets without needing them to be encrypted
w8 = node . get_wallet_rpc ( ' w8 ' )
assert_raises_rpc_error ( - 15 , ' Error: running with an unencrypted wallet, but walletpassphrase was called. ' , w7 . walletpassphrase , ' ' , 60 )
assert_equal ( w8 . getwalletinfo ( ) [ " avoid_reuse " ] , True )
2019-05-16 18:20:05 +02:00
2019-07-10 21:44:26 +02:00
self . log . info ( ' Using a passphrase with private keys disabled returns error ' )
2019-08-01 09:10:18 +02:00
assert_raises_rpc_error ( - 4 , ' Passphrase provided but private keys are disabled. A passphrase is only used to encrypt private keys, so cannot be used for wallets with private keys disabled. ' , self . nodes [ 0 ] . createwallet , wallet_name = ' w9 ' , disable_private_keys = True , passphrase = ' thisisapassphrase ' )
2019-07-10 21:44:26 +02:00
2019-02-10 20:07:17 +01:00
if __name__ == ' __main__ ' :
CreateWalletTest ( ) . main ( )