You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
153 lines
5.8 KiB
153 lines
5.8 KiB
#!/usr/bin/env python3 |
|
# Copyright (c) 2015-2017 The Bitcoin Core developers |
|
# Distributed under the MIT software license, see the accompanying |
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php. |
|
"""Test multiple RPC users.""" |
|
|
|
from test_framework.test_framework import BitcoinTestFramework |
|
from test_framework.util import str_to_b64str, assert_equal |
|
|
|
import os |
|
import http.client |
|
import urllib.parse |
|
|
|
class HTTPBasicsTest (BitcoinTestFramework): |
|
def set_test_params(self): |
|
self.num_nodes = 2 |
|
|
|
def setup_chain(self): |
|
super().setup_chain() |
|
#Append rpcauth to bitcoin.conf before initialization |
|
rpcauth = "rpcauth=rt:93648e835a54c573682c2eb19f882535$7681e9c5b74bdd85e78166031d2058e1069b3ed7ed967c93fc63abba06f31144" |
|
rpcauth2 = "rpcauth=rt2:f8607b1a88861fac29dfccf9b52ff9f$ff36a0c23c8c62b4846112e50fa888416e94c17bfd4c42f88fd8f55ec6a3137e" |
|
rpcuser = "rpcuser=rpcuser💻" |
|
rpcpassword = "rpcpassword=rpcpassword🔑" |
|
with open(os.path.join(self.options.tmpdir+"/node0", "litecoin.conf"), 'a', encoding='utf8') as f: |
|
f.write(rpcauth+"\n") |
|
f.write(rpcauth2+"\n") |
|
with open(os.path.join(self.options.tmpdir+"/node1", "litecoin.conf"), 'a', encoding='utf8') as f: |
|
f.write(rpcuser+"\n") |
|
f.write(rpcpassword+"\n") |
|
|
|
def run_test(self): |
|
|
|
################################################## |
|
# Check correctness of the rpcauth config option # |
|
################################################## |
|
url = urllib.parse.urlparse(self.nodes[0].url) |
|
|
|
#Old authpair |
|
authpair = url.username + ':' + url.password |
|
|
|
#New authpair generated via share/rpcuser tool |
|
password = "cA773lm788buwYe4g4WT+05pKyNruVKjQ25x3n0DQcM=" |
|
|
|
#Second authpair with different username |
|
password2 = "8/F3uMDw4KSEbw96U3CA1C4X05dkHDN2BPFjTgZW4KI=" |
|
authpairnew = "rt:"+password |
|
|
|
headers = {"Authorization": "Basic " + str_to_b64str(authpair)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 200) |
|
conn.close() |
|
|
|
#Use new authpair to confirm both work |
|
headers = {"Authorization": "Basic " + str_to_b64str(authpairnew)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 200) |
|
conn.close() |
|
|
|
#Wrong login name with rt's password |
|
authpairnew = "rtwrong:"+password |
|
headers = {"Authorization": "Basic " + str_to_b64str(authpairnew)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 401) |
|
conn.close() |
|
|
|
#Wrong password for rt |
|
authpairnew = "rt:"+password+"wrong" |
|
headers = {"Authorization": "Basic " + str_to_b64str(authpairnew)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 401) |
|
conn.close() |
|
|
|
#Correct for rt2 |
|
authpairnew = "rt2:"+password2 |
|
headers = {"Authorization": "Basic " + str_to_b64str(authpairnew)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 200) |
|
conn.close() |
|
|
|
#Wrong password for rt2 |
|
authpairnew = "rt2:"+password2+"wrong" |
|
headers = {"Authorization": "Basic " + str_to_b64str(authpairnew)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 401) |
|
conn.close() |
|
|
|
############################################################### |
|
# Check correctness of the rpcuser/rpcpassword config options # |
|
############################################################### |
|
url = urllib.parse.urlparse(self.nodes[1].url) |
|
|
|
# rpcuser and rpcpassword authpair |
|
rpcuserauthpair = "rpcuser💻:rpcpassword🔑" |
|
|
|
headers = {"Authorization": "Basic " + str_to_b64str(rpcuserauthpair)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 200) |
|
conn.close() |
|
|
|
#Wrong login name with rpcuser's password |
|
rpcuserauthpair = "rpcuserwrong:rpcpassword" |
|
headers = {"Authorization": "Basic " + str_to_b64str(rpcuserauthpair)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 401) |
|
conn.close() |
|
|
|
#Wrong password for rpcuser |
|
rpcuserauthpair = "rpcuser:rpcpasswordwrong" |
|
headers = {"Authorization": "Basic " + str_to_b64str(rpcuserauthpair)} |
|
|
|
conn = http.client.HTTPConnection(url.hostname, url.port) |
|
conn.connect() |
|
conn.request('POST', '/', '{"method": "getbestblockhash"}', headers) |
|
resp = conn.getresponse() |
|
assert_equal(resp.status, 401) |
|
conn.close() |
|
|
|
|
|
if __name__ == '__main__': |
|
HTTPBasicsTest ().main ()
|
|
|