2020-09-27 03:43:20 -07:00
|
|
|
from collections import OrderedDict
|
2020-11-18 18:01:45 -08:00
|
|
|
import json
|
2020-08-21 13:36:11 -07:00
|
|
|
|
2021-08-04 15:49:08 -07:00
|
|
|
logger = machine.logger
|
2020-08-21 13:36:11 -07:00
|
|
|
|
2020-07-16 07:48:41 -07:00
|
|
|
def succeed(*cmds):
|
|
|
|
"""Returns the concatenated output of all cmds"""
|
|
|
|
return machine.succeed(*cmds)
|
|
|
|
|
|
|
|
def assert_matches(cmd, regexp):
|
|
|
|
out = succeed(cmd)
|
|
|
|
if not re.search(regexp, out):
|
|
|
|
raise Exception(f"Pattern '{regexp}' not found in '{out}'")
|
|
|
|
|
2020-08-20 04:11:05 -07:00
|
|
|
def assert_full_match(cmd, regexp):
|
2020-07-16 07:48:41 -07:00
|
|
|
out = succeed(cmd)
|
|
|
|
if not re.fullmatch(regexp, out):
|
|
|
|
raise Exception(f"Pattern '{regexp}' doesn't match '{out}'")
|
|
|
|
|
|
|
|
def log_has_string(unit, str):
|
|
|
|
return f"journalctl -b --output=cat -u {unit} --grep='{str}'"
|
|
|
|
|
|
|
|
def assert_no_failure(unit):
|
|
|
|
"""Unit should not have failed since the system is running"""
|
|
|
|
machine.fail(log_has_string(unit, "Failed with result"))
|
|
|
|
|
|
|
|
def assert_running(unit):
|
2020-09-27 03:43:20 -07:00
|
|
|
with machine.nested(f"waiting for unit: {unit}"):
|
|
|
|
machine.wait_for_unit(unit)
|
2020-07-16 07:48:41 -07:00
|
|
|
assert_no_failure(unit)
|
|
|
|
|
2020-09-27 03:43:17 -07:00
|
|
|
def wait_for_open_port(address, port):
|
|
|
|
def is_port_open(_):
|
|
|
|
status, _ = machine.execute(f"nc -z {address} {port}")
|
|
|
|
return status == 0
|
|
|
|
|
2021-08-04 15:49:08 -07:00
|
|
|
with logger.nested(f"Waiting for TCP port {address}:{port}"):
|
2020-09-27 03:43:17 -07:00
|
|
|
retry(is_port_open)
|
|
|
|
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
### Test runner
|
|
|
|
|
|
|
|
tests = OrderedDict()
|
|
|
|
|
|
|
|
def test(name):
|
|
|
|
def x(fn):
|
|
|
|
tests[name] = fn
|
|
|
|
return x
|
|
|
|
|
2020-09-27 03:43:17 -07:00
|
|
|
def run_tests():
|
2020-09-27 03:43:20 -07:00
|
|
|
enabled = enabled_tests.copy()
|
|
|
|
to_run = []
|
|
|
|
for test in tests:
|
|
|
|
if test in enabled:
|
|
|
|
enabled.remove(test)
|
|
|
|
to_run.append(test)
|
|
|
|
if enabled:
|
|
|
|
raise RuntimeError(f"The following tests are enabled but not defined: {enabled}")
|
|
|
|
machine.connect() # Visually separate boot output from the test output
|
|
|
|
for test in to_run:
|
2021-08-04 15:49:08 -07:00
|
|
|
with logger.nested(f"test: {test}"):
|
2020-09-27 03:43:20 -07:00
|
|
|
tests[test]()
|
|
|
|
|
|
|
|
def run_test(test):
|
|
|
|
tests[test]()
|
|
|
|
|
|
|
|
|
|
|
|
### Tests
|
|
|
|
# All tests are executed in the order they are defined here
|
|
|
|
|
|
|
|
@test("security")
|
|
|
|
def _():
|
|
|
|
assert_running("setup-secrets")
|
|
|
|
# Unused secrets should be inaccessible
|
|
|
|
succeed('[[ $(stat -c "%U:%G %a" /secrets/dummy) = "root:root 440" ]]')
|
|
|
|
|
|
|
|
if "secure-node" in enabled_tests:
|
|
|
|
machine.wait_for_unit("bitcoind")
|
|
|
|
# `systemctl status` run by unprivileged users shouldn't leak cgroup info
|
|
|
|
assert_matches(
|
2021-01-30 14:08:42 -08:00
|
|
|
"runuser -u electrs -- systemctl status bitcoind 2>&1 >/dev/null",
|
2020-09-27 03:43:20 -07:00
|
|
|
"Failed to dump process list for 'bitcoind.service', ignoring: Access denied",
|
|
|
|
)
|
|
|
|
# The 'operator' with group 'proc' has full access
|
2021-01-30 14:08:42 -08:00
|
|
|
assert_full_match("runuser -u operator -- systemctl status bitcoind 2>&1 >/dev/null", "")
|
2020-08-21 13:36:11 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("bitcoind")
|
|
|
|
def _():
|
2020-08-02 14:20:51 -07:00
|
|
|
assert_running("bitcoind")
|
|
|
|
machine.wait_until_succeeds("bitcoin-cli getnetworkinfo")
|
2021-01-30 14:08:42 -08:00
|
|
|
assert_matches("runuser -u operator -- bitcoin-cli getnetworkinfo | jq", '"version"')
|
2021-02-17 05:35:31 -08:00
|
|
|
|
|
|
|
regtest = "regtest/" if "regtest" in enabled_tests else ""
|
|
|
|
assert_full_match(f"stat -c '%a' /var/lib/bitcoind/{regtest}.cookie", "640\n")
|
|
|
|
|
2020-08-27 03:17:39 -07:00
|
|
|
# RPC access for user 'public' should be restricted
|
2020-08-02 14:20:51 -07:00
|
|
|
machine.fail(
|
2020-08-27 03:17:39 -07:00
|
|
|
"bitcoin-cli -rpcuser=public -rpcpassword=$(cat /secrets/bitcoin-rpcpassword-public) stop"
|
2020-08-02 14:20:51 -07:00
|
|
|
)
|
|
|
|
machine.wait_until_succeeds(
|
2020-08-27 03:17:39 -07:00
|
|
|
log_has_string("bitcoind", "RPC User public not allowed to call method stop")
|
2020-08-02 14:20:51 -07:00
|
|
|
)
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("electrs")
|
|
|
|
def _():
|
2020-08-02 14:20:51 -07:00
|
|
|
assert_running("electrs")
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("electrs"), 4224) # prometeus metrics provider
|
2020-08-02 14:20:51 -07:00
|
|
|
# Check RPC connection to bitcoind
|
2021-10-05 07:52:02 -07:00
|
|
|
if not "regtest" in enabled_tests:
|
|
|
|
machine.wait_until_succeeds(
|
|
|
|
log_has_string("electrs", "waiting for 0 blocks to download")
|
|
|
|
)
|
2020-10-16 08:43:18 -07:00
|
|
|
|
|
|
|
# Impure: Stops electrs
|
2021-10-05 07:52:02 -07:00
|
|
|
# Stop electrs from spamming the test log with 'waiting for 0 blocks to download' messages
|
2020-10-16 08:43:18 -07:00
|
|
|
@test("stop-electrs")
|
|
|
|
def _():
|
2020-08-02 14:20:51 -07:00
|
|
|
succeed("systemctl stop electrs")
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("liquidd")
|
|
|
|
def _():
|
2020-08-02 14:20:51 -07:00
|
|
|
assert_running("liquidd")
|
|
|
|
machine.wait_until_succeeds("elements-cli getnetworkinfo")
|
2021-01-30 14:08:42 -08:00
|
|
|
assert_matches("runuser -u operator -- elements-cli getnetworkinfo | jq", '"version"')
|
|
|
|
succeed("runuser -u operator -- liquidswap-cli --help")
|
2020-08-02 14:20:51 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("clightning")
|
|
|
|
def _():
|
2020-08-02 14:20:51 -07:00
|
|
|
assert_running("clightning")
|
2021-01-30 14:08:42 -08:00
|
|
|
assert_matches("runuser -u operator -- lightning-cli getinfo | jq", '"id"')
|
2020-11-18 18:01:45 -08:00
|
|
|
if test_data["clightning-plugins"]:
|
|
|
|
plugin_list = succeed("lightning-cli plugin list")
|
|
|
|
plugins = json.loads(plugin_list)["plugins"]
|
|
|
|
active = set(plugin["name"] for plugin in plugins if plugin["active"])
|
|
|
|
failed = set(test_data["clightning-plugins"]).difference(active)
|
|
|
|
if failed:
|
|
|
|
raise Exception(
|
|
|
|
f"The following clightning plugins are inactive:\n{failed}.\n\n"
|
|
|
|
f"Output of 'lightning-cli plugin list':\n{plugin_list}"
|
|
|
|
)
|
|
|
|
else:
|
2021-08-04 15:49:08 -07:00
|
|
|
logger.log("Active clightning plugins:")
|
2020-11-18 18:01:45 -08:00
|
|
|
for p in test_data["clightning-plugins"]:
|
2021-08-04 15:49:08 -07:00
|
|
|
logger.log(os.path.basename(p))
|
2020-08-02 14:20:51 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("lnd")
|
|
|
|
def _():
|
2020-08-04 01:24:49 -07:00
|
|
|
assert_running("lnd")
|
2021-01-30 14:08:42 -08:00
|
|
|
assert_matches("runuser -u operator -- lncli getinfo | jq", '"version"')
|
2020-08-04 01:24:49 -07:00
|
|
|
assert_no_failure("lnd")
|
|
|
|
|
2021-02-03 13:44:43 -08:00
|
|
|
@test("lnd-rest-onion-service")
|
|
|
|
def _():
|
|
|
|
assert_matches("runuser -u operator -- lndconnect-rest-onion -j", ".onion")
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("lightning-loop")
|
|
|
|
def _():
|
2020-09-24 09:39:18 -07:00
|
|
|
assert_running("lightning-loop")
|
2021-01-30 14:08:42 -08:00
|
|
|
assert_matches("runuser -u operator -- loop --version", "version")
|
2020-08-04 01:24:49 -07:00
|
|
|
# Check that lightning-loop fails with the right error, making sure
|
|
|
|
# lightning-loop can connect to lnd
|
|
|
|
machine.wait_until_succeeds(
|
2020-08-30 01:07:02 -07:00
|
|
|
log_has_string(
|
|
|
|
"lightning-loop",
|
|
|
|
"Waiting for lnd to be fully synced to its chain backend, this might take a while",
|
|
|
|
)
|
2020-08-04 01:24:49 -07:00
|
|
|
)
|
|
|
|
|
2021-03-01 01:59:23 -08:00
|
|
|
@test("lightning-pool")
|
|
|
|
def _():
|
|
|
|
assert_running("lightning-pool")
|
|
|
|
assert_matches("su operator -c 'pool --version'", "version")
|
|
|
|
# Check that lightning-pool fails with the right error, making sure
|
|
|
|
# lightning-pool can connect to lnd
|
|
|
|
machine.wait_until_succeeds(
|
|
|
|
log_has_string(
|
|
|
|
"lightning-pool",
|
|
|
|
"Waiting for lnd to be fully synced to its chain backend, this might take a while",
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2021-06-01 18:11:26 -07:00
|
|
|
@test("charge-lnd")
|
|
|
|
def _():
|
|
|
|
# charge-lnd is a oneshot service that is started by a timer under regular operation
|
|
|
|
succeed("systemctl start charge-lnd")
|
|
|
|
assert_no_failure("charge-lnd")
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("btcpayserver")
|
|
|
|
def _():
|
2020-08-12 07:16:22 -07:00
|
|
|
assert_running("nbxplorer")
|
|
|
|
machine.wait_until_succeeds(log_has_string("nbxplorer", "BTC: RPC connection successful"))
|
2021-07-13 07:03:08 -07:00
|
|
|
machine.wait_until_succeeds(log_has_string("nbxplorer", "LBTC: RPC connection successful"))
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("nbxplorer"), 24444)
|
2020-08-12 07:16:22 -07:00
|
|
|
assert_running("btcpayserver")
|
|
|
|
machine.wait_until_succeeds(log_has_string("btcpayserver", "Listening on"))
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("btcpayserver"), 23000)
|
|
|
|
# test lnd custom macaroon
|
|
|
|
assert_matches(
|
2021-01-30 14:08:42 -08:00
|
|
|
"runuser -u btcpayserver -- curl -s --cacert /secrets/lnd-cert "
|
2020-09-27 03:43:17 -07:00
|
|
|
'--header "Grpc-Metadata-macaroon: $(xxd -ps -u -c 1000 /run/lnd/btcpayserver.macaroon)" '
|
|
|
|
f"-X GET https://{ip('lnd')}:8080/v1/getinfo | jq",
|
|
|
|
'"version"',
|
|
|
|
)
|
2021-10-30 05:55:55 -07:00
|
|
|
# Test web server response
|
|
|
|
assert_matches(f"curl -L {ip('btcpayserver')}:23000", "Welcome to your BTCPay Server")
|
2020-08-12 07:16:22 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("spark-wallet")
|
|
|
|
def _():
|
2020-08-02 14:20:51 -07:00
|
|
|
assert_running("spark-wallet")
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("spark-wallet"), 9737)
|
|
|
|
spark_auth = re.search("login=(.*)", succeed("cat /secrets/spark-wallet-login"))[1]
|
|
|
|
assert_matches(f"curl -s {spark_auth}@{ip('spark-wallet')}:9737", "Spark")
|
2020-08-02 14:20:51 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("joinmarket")
|
|
|
|
def _():
|
2020-05-18 02:51:18 -07:00
|
|
|
assert_running("joinmarket")
|
|
|
|
machine.wait_until_succeeds(
|
2020-10-18 09:37:07 -07:00
|
|
|
log_has_string("joinmarket", "JMDaemonServerProtocolFactory starting on 27183")
|
2020-05-18 02:51:18 -07:00
|
|
|
)
|
2020-10-16 08:43:17 -07:00
|
|
|
|
|
|
|
@test("joinmarket-yieldgenerator")
|
|
|
|
def _():
|
2021-10-25 06:30:53 -07:00
|
|
|
if "regtest" in enabled_tests:
|
|
|
|
expected_log_msg = "You do not have the minimum required amount of coins to be a maker"
|
|
|
|
else:
|
|
|
|
expected_log_msg = "Critical error updating blockheight."
|
|
|
|
|
|
|
|
machine.wait_until_succeeds(log_has_string("joinmarket-yieldgenerator", expected_log_msg))
|
2020-05-18 02:51:18 -07:00
|
|
|
|
2021-01-17 04:24:57 -08:00
|
|
|
@test("joinmarket-ob-watcher")
|
|
|
|
def _():
|
2021-08-25 06:50:16 -07:00
|
|
|
# joinmarket-ob-watcher fails on non-synced mainnet nodes.
|
|
|
|
# Also, it doesn't support any of the test networks.
|
|
|
|
machine.wait_until_succeeds(log_has_string("joinmarket-ob-watcher", "unknown error in JSON-RPC"))
|
2021-01-17 04:24:57 -08:00
|
|
|
|
2021-01-14 04:24:26 -08:00
|
|
|
@test("nodeinfo")
|
|
|
|
def _():
|
|
|
|
status, _ = machine.execute("systemctl is-enabled --quiet onion-addresses 2> /dev/null")
|
|
|
|
if status == 0:
|
|
|
|
machine.wait_for_unit("onion-addresses")
|
2021-01-30 14:08:42 -08:00
|
|
|
json_info = succeed("runuser -u operator -- nodeinfo")
|
2021-01-14 04:24:26 -08:00
|
|
|
info = json.loads(json_info)
|
|
|
|
assert info["bitcoind"]["local_address"]
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
@test("secure-node")
|
|
|
|
def _():
|
2021-01-14 04:24:10 -08:00
|
|
|
assert_running("onion-addresses")
|
2020-09-27 03:43:20 -07:00
|
|
|
|
|
|
|
# Run this test before the following tests that shut down services
|
|
|
|
# (and their corresponding network namespaces).
|
|
|
|
@test("netns-isolation")
|
|
|
|
def _():
|
2020-10-29 13:20:24 -07:00
|
|
|
def get_ips(services):
|
|
|
|
enabled = enabled_tests.intersection(services)
|
|
|
|
return " ".join(ip(service) for service in enabled)
|
|
|
|
|
|
|
|
def assert_reachable(src, dests):
|
|
|
|
dest_ips = get_ips(dests)
|
|
|
|
if src in enabled_tests and dest_ips:
|
|
|
|
machine.succeed(f"ip netns exec nb-{src} fping -c1 -t100 {dest_ips}")
|
|
|
|
|
|
|
|
def assert_unreachable(src, dests):
|
|
|
|
dest_ips = get_ips(dests)
|
|
|
|
if src in enabled_tests and dest_ips:
|
|
|
|
machine.fail(
|
|
|
|
# This fails when no host is reachable within 100 ms
|
|
|
|
f"ip netns exec nb-{src} fping -c1 -t100 --reachable=1 {dest_ips}"
|
|
|
|
)
|
|
|
|
|
|
|
|
# These reachability tests are non-exhaustive
|
|
|
|
assert_reachable("bitcoind", ["clightning", "lnd", "liquidd"])
|
|
|
|
assert_unreachable("bitcoind", ["btcpayserver", "spark-wallet", "lightning-loop"])
|
2021-07-13 07:03:08 -07:00
|
|
|
assert_unreachable("btcpayserver", ["bitcoind", "lightning-loop"])
|
2020-08-02 14:20:51 -07:00
|
|
|
|
2020-10-29 13:20:38 -07:00
|
|
|
# netns addresses can not be bound to in the main netns.
|
|
|
|
# This prevents processes in the main netns from impersonating nix-bitcoin services.
|
|
|
|
assert_matches(
|
|
|
|
f"nc -l {ip('bitcoind')} 1080 2>&1 || true", "nc: Cannot assign requested address"
|
|
|
|
)
|
|
|
|
|
2020-10-29 13:20:29 -07:00
|
|
|
if "joinmarket" in enabled_tests:
|
|
|
|
# netns-exec should drop capabilities
|
2021-08-04 15:49:11 -07:00
|
|
|
assert_matches(
|
2021-01-30 14:08:42 -08:00
|
|
|
"runuser -u operator -- netns-exec nb-joinmarket capsh --print | grep Current",
|
2021-08-04 15:49:11 -07:00
|
|
|
re.compile("^Current: =$", re.MULTILINE),
|
2020-10-29 13:20:29 -07:00
|
|
|
)
|
2020-08-02 14:20:51 -07:00
|
|
|
|
2020-10-29 13:20:25 -07:00
|
|
|
if "clightning" in enabled_tests:
|
|
|
|
# netns-exec should fail for unauthorized namespaces
|
|
|
|
machine.fail("netns-exec nb-clightning ip a")
|
|
|
|
|
|
|
|
# netns-exec should only be executable by the operator user
|
2021-01-30 14:08:42 -08:00
|
|
|
machine.fail("runuser -u clightning -- netns-exec nb-bitcoind ip a")
|
2020-06-23 04:03:16 -07:00
|
|
|
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
# Impure: stops bitcoind (and dependent services)
|
|
|
|
@test("backups")
|
|
|
|
def _():
|
2021-01-30 01:47:03 -08:00
|
|
|
# For testing that bitcoind wallets are backed up
|
|
|
|
succeed("bitcoin-cli -named createwallet wallet_name=test blank=true >/dev/null")
|
|
|
|
|
2020-06-23 04:03:16 -07:00
|
|
|
succeed("systemctl stop bitcoind")
|
|
|
|
succeed("systemctl start duplicity")
|
|
|
|
machine.wait_until_succeeds(log_has_string("duplicity", "duplicity.service: Succeeded."))
|
2020-09-27 03:43:18 -07:00
|
|
|
run_duplicity = "export $(cat /secrets/backup-encryption-env); duplicity"
|
|
|
|
# Files in backup and /var/lib should be identical
|
2020-06-23 04:03:16 -07:00
|
|
|
assert_matches(
|
2020-09-27 03:43:18 -07:00
|
|
|
f"{run_duplicity} verify --archive-dir /var/lib/duplicity file:///var/lib/localBackups /var/lib",
|
2020-06-23 04:03:16 -07:00
|
|
|
"0 differences found",
|
|
|
|
)
|
2020-09-27 03:43:18 -07:00
|
|
|
# Backup should include important files
|
2021-01-30 01:47:00 -08:00
|
|
|
files = {
|
2021-01-30 01:47:03 -08:00
|
|
|
"bitcoind": "var/lib/bitcoind/test/wallet.dat",
|
2021-01-30 01:47:00 -08:00
|
|
|
"clightning": "var/lib/clightning/bitcoin/hsm_secret",
|
2021-03-10 05:08:37 -08:00
|
|
|
"lnd": "var/lib/lnd/lnd-seed-mnemonic",
|
|
|
|
"joinmarket": "var/lib/joinmarket/jm-wallet-seed",
|
2021-01-30 01:47:00 -08:00
|
|
|
"btcpayserver": "var/backup/postgresql/btcpaydb.sql.gz",
|
|
|
|
}
|
|
|
|
actual_files = succeed(f"{run_duplicity} list-current-files file:///var/lib/localBackups")
|
|
|
|
|
2021-03-10 05:08:37 -08:00
|
|
|
def assert_file_exists(file):
|
|
|
|
if file not in actual_files:
|
2021-01-30 01:47:00 -08:00
|
|
|
raise Exception(f"Backup file '{file}' is missing.")
|
2020-08-02 14:20:51 -07:00
|
|
|
|
2021-03-10 05:08:37 -08:00
|
|
|
for test, file in files.items():
|
|
|
|
if test in enabled_tests:
|
|
|
|
assert_file_exists(file)
|
|
|
|
|
|
|
|
assert_file_exists("secrets/lnd-wallet-password")
|
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
# Impure: restarts services
|
|
|
|
@test("banlist-and-restart")
|
|
|
|
def _():
|
|
|
|
machine.wait_until_succeeds(log_has_string("bitcoind-import-banlist", "Importing node banlist"))
|
|
|
|
assert_no_failure("bitcoind-import-banlist")
|
2020-08-20 04:11:09 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
# Current time in µs
|
|
|
|
pre_restart = succeed("date +%s.%6N").rstrip()
|
2020-08-20 04:11:09 -07:00
|
|
|
|
2021-03-22 06:38:31 -07:00
|
|
|
# Sanity-check system by restarting bitcoind.
|
|
|
|
# This also restarts all services depending on bitcoind.
|
|
|
|
succeed("systemctl restart bitcoind")
|
2020-09-27 03:43:17 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
# Now that the bitcoind restart triggered a banlist import restart, check that
|
|
|
|
# re-importing already banned addresses works
|
|
|
|
machine.wait_until_succeeds(
|
|
|
|
log_has_string(f"bitcoind-import-banlist --since=@{pre_restart}", "Importing node banlist")
|
|
|
|
)
|
|
|
|
assert_no_failure("bitcoind-import-banlist")
|
|
|
|
|
2020-10-16 08:43:19 -07:00
|
|
|
@test("regtest")
|
|
|
|
def _():
|
2021-03-22 06:38:31 -07:00
|
|
|
def enabled(unit):
|
|
|
|
if unit in enabled_tests:
|
|
|
|
# Wait because the unit might have been restarted in the preceding
|
|
|
|
# 'banlist-and-restart' test
|
|
|
|
machine.wait_for_unit(unit)
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
|
|
|
|
|
|
|
if enabled("electrs"):
|
|
|
|
machine.wait_for_unit("onion-addresses")
|
2021-10-05 07:52:02 -07:00
|
|
|
machine.wait_until_succeeds(log_has_string("electrs", "serving Electrum RPC"))
|
2020-10-16 08:43:19 -07:00
|
|
|
get_block_height_cmd = (
|
|
|
|
"""echo '{"method": "blockchain.headers.subscribe", "id": 0, "params": []}'"""
|
2021-10-05 07:52:02 -07:00
|
|
|
f" | nc {ip('electrs')} 50001 | head -1 | jq -M .result.height"
|
2020-10-16 08:43:19 -07:00
|
|
|
)
|
|
|
|
assert_full_match(get_block_height_cmd, "10\n")
|
2021-03-22 06:38:31 -07:00
|
|
|
if enabled("clightning"):
|
2020-10-16 08:43:19 -07:00
|
|
|
machine.wait_until_succeeds(
|
2021-01-30 14:08:42 -08:00
|
|
|
"[[ $(runuser -u operator -- lightning-cli getinfo | jq -M .blockheight) == 10 ]]"
|
2020-10-16 08:43:19 -07:00
|
|
|
)
|
2021-03-22 06:38:31 -07:00
|
|
|
if enabled("lnd"):
|
2020-10-16 08:43:19 -07:00
|
|
|
machine.wait_until_succeeds(
|
2021-01-30 14:08:42 -08:00
|
|
|
"[[ $(runuser -u operator -- lncli getinfo | jq -M .block_height) == 10 ]]"
|
2020-10-16 08:43:19 -07:00
|
|
|
)
|
2021-03-22 06:38:31 -07:00
|
|
|
if enabled("lightning-loop"):
|
2020-10-18 13:36:33 -07:00
|
|
|
machine.wait_until_succeeds(
|
|
|
|
log_has_string("lightning-loop", "Starting event loop at height 10")
|
|
|
|
)
|
2021-01-30 14:08:42 -08:00
|
|
|
succeed("runuser -u operator -- loop getparams")
|
2021-03-22 06:38:31 -07:00
|
|
|
if enabled("lightning-pool"):
|
2021-03-01 01:59:23 -08:00
|
|
|
machine.wait_until_succeeds(
|
|
|
|
log_has_string("lightning-pool", "lnd is now fully synced to its chain backend")
|
|
|
|
)
|
|
|
|
succeed("runuser -u operator -- pool orders list")
|
2020-10-16 08:43:19 -07:00
|
|
|
|
2020-09-27 03:43:20 -07:00
|
|
|
if "netns-isolation" in enabled_tests:
|
2020-09-27 03:43:31 -07:00
|
|
|
def ip(name):
|
|
|
|
return test_data["netns"][name]["address"]
|
2020-09-27 03:43:20 -07:00
|
|
|
else:
|
|
|
|
def ip(_):
|
|
|
|
return "127.0.0.1"
|