2020-08-21 13:36:11 -07:00
|
|
|
is_interactive = "is_interactive" in vars()
|
|
|
|
|
|
|
|
|
2020-07-16 07:48:41 -07:00
|
|
|
def succeed(*cmds):
|
|
|
|
"""Returns the concatenated output of all cmds"""
|
|
|
|
return machine.succeed(*cmds)
|
|
|
|
|
|
|
|
|
|
|
|
def assert_matches(cmd, regexp):
|
|
|
|
out = succeed(cmd)
|
|
|
|
if not re.search(regexp, out):
|
|
|
|
raise Exception(f"Pattern '{regexp}' not found in '{out}'")
|
|
|
|
|
|
|
|
|
2020-08-20 04:11:05 -07:00
|
|
|
def assert_full_match(cmd, regexp):
|
2020-07-16 07:48:41 -07:00
|
|
|
out = succeed(cmd)
|
|
|
|
if not re.fullmatch(regexp, out):
|
|
|
|
raise Exception(f"Pattern '{regexp}' doesn't match '{out}'")
|
|
|
|
|
|
|
|
|
|
|
|
def log_has_string(unit, str):
|
|
|
|
return f"journalctl -b --output=cat -u {unit} --grep='{str}'"
|
|
|
|
|
|
|
|
|
|
|
|
def assert_no_failure(unit):
|
|
|
|
"""Unit should not have failed since the system is running"""
|
|
|
|
machine.fail(log_has_string(unit, "Failed with result"))
|
|
|
|
|
|
|
|
|
|
|
|
def assert_running(unit):
|
|
|
|
machine.wait_for_unit(unit)
|
|
|
|
assert_no_failure(unit)
|
|
|
|
|
|
|
|
|
2020-09-27 03:43:17 -07:00
|
|
|
def wait_for_open_port(address, port):
|
|
|
|
def is_port_open(_):
|
|
|
|
status, _ = machine.execute(f"nc -z {address} {port}")
|
|
|
|
return status == 0
|
|
|
|
|
|
|
|
with log.nested(f"Waiting for TCP port {address}:{port}"):
|
|
|
|
retry(is_port_open)
|
|
|
|
|
|
|
|
|
|
|
|
def run_tests():
|
2020-08-21 13:36:11 -07:00
|
|
|
# Don't execute the following test suite when this script is running in interactive mode
|
|
|
|
if is_interactive:
|
|
|
|
raise Exception()
|
|
|
|
|
2020-08-20 04:11:09 -07:00
|
|
|
test_security()
|
2020-08-02 14:20:51 -07:00
|
|
|
|
|
|
|
assert_running("bitcoind")
|
|
|
|
machine.wait_until_succeeds("bitcoin-cli getnetworkinfo")
|
|
|
|
assert_matches("su operator -c 'bitcoin-cli getnetworkinfo' | jq", '"version"')
|
2020-08-27 03:17:39 -07:00
|
|
|
# RPC access for user 'public' should be restricted
|
2020-08-02 14:20:51 -07:00
|
|
|
machine.fail(
|
2020-08-27 03:17:39 -07:00
|
|
|
"bitcoin-cli -rpcuser=public -rpcpassword=$(cat /secrets/bitcoin-rpcpassword-public) stop"
|
2020-08-02 14:20:51 -07:00
|
|
|
)
|
|
|
|
machine.wait_until_succeeds(
|
2020-08-27 03:17:39 -07:00
|
|
|
log_has_string("bitcoind", "RPC User public not allowed to call method stop")
|
2020-08-02 14:20:51 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
assert_running("electrs")
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("electrs"), 4224) # prometeus metrics provider
|
2020-08-02 14:20:51 -07:00
|
|
|
# Check RPC connection to bitcoind
|
|
|
|
machine.wait_until_succeeds(log_has_string("electrs", "NetworkInfo"))
|
|
|
|
# Stop electrs from spamming the test log with 'wait for bitcoind sync' messages
|
|
|
|
succeed("systemctl stop electrs")
|
|
|
|
|
|
|
|
assert_running("liquidd")
|
|
|
|
machine.wait_until_succeeds("elements-cli getnetworkinfo")
|
|
|
|
assert_matches("su operator -c 'elements-cli getnetworkinfo' | jq", '"version"')
|
|
|
|
succeed("su operator -c 'liquidswap-cli --help'")
|
|
|
|
|
|
|
|
assert_running("clightning")
|
|
|
|
assert_matches("su operator -c 'lightning-cli getinfo' | jq", '"id"')
|
|
|
|
|
2020-08-04 01:24:49 -07:00
|
|
|
assert_running("lnd")
|
|
|
|
assert_matches("su operator -c 'lncli getinfo' | jq", '"version"')
|
|
|
|
assert_no_failure("lnd")
|
|
|
|
|
2020-09-24 09:39:18 -07:00
|
|
|
assert_running("lightning-loop")
|
2020-08-04 01:24:49 -07:00
|
|
|
assert_matches("su operator -c 'loop --version'", "version")
|
|
|
|
# Check that lightning-loop fails with the right error, making sure
|
|
|
|
# lightning-loop can connect to lnd
|
|
|
|
machine.wait_until_succeeds(
|
2020-08-30 01:07:02 -07:00
|
|
|
log_has_string(
|
|
|
|
"lightning-loop",
|
|
|
|
"Waiting for lnd to be fully synced to its chain backend, this might take a while",
|
|
|
|
)
|
2020-08-04 01:24:49 -07:00
|
|
|
)
|
|
|
|
|
2020-08-12 07:16:22 -07:00
|
|
|
assert_running("nbxplorer")
|
|
|
|
machine.wait_until_succeeds(log_has_string("nbxplorer", "BTC: RPC connection successful"))
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("nbxplorer"), 24444)
|
2020-08-12 07:16:22 -07:00
|
|
|
assert_running("btcpayserver")
|
|
|
|
machine.wait_until_succeeds(log_has_string("btcpayserver", "Listening on"))
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("btcpayserver"), 23000)
|
|
|
|
# test lnd custom macaroon
|
|
|
|
assert_matches(
|
|
|
|
"sudo -u btcpayserver curl -s --cacert /secrets/lnd-cert "
|
|
|
|
'--header "Grpc-Metadata-macaroon: $(xxd -ps -u -c 1000 /run/lnd/btcpayserver.macaroon)" '
|
|
|
|
f"-X GET https://{ip('lnd')}:8080/v1/getinfo | jq",
|
|
|
|
'"version"',
|
|
|
|
)
|
2020-08-12 07:16:22 -07:00
|
|
|
|
2020-08-02 14:20:51 -07:00
|
|
|
assert_running("spark-wallet")
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("spark-wallet"), 9737)
|
|
|
|
spark_auth = re.search("login=(.*)", succeed("cat /secrets/spark-wallet-login"))[1]
|
|
|
|
assert_matches(f"curl -s {spark_auth}@{ip('spark-wallet')}:9737", "Spark")
|
2020-08-02 14:20:51 -07:00
|
|
|
|
|
|
|
assert_running("lightning-charge")
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("lightning-charge"), 9112)
|
|
|
|
machine.wait_until_succeeds(f"nc -z {ip('lightning-charge')} 9112")
|
|
|
|
charge_auth = re.search("API_TOKEN=(.*)", succeed("cat /secrets/lightning-charge-env"))[1]
|
|
|
|
assert_matches(
|
|
|
|
f"curl -s api-token:{charge_auth}@{ip('lightning-charge')}:9112/info | jq", '"id"'
|
|
|
|
)
|
2020-08-02 14:20:51 -07:00
|
|
|
|
|
|
|
assert_running("nanopos")
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("nanopos"), 9116)
|
|
|
|
assert_matches(f"curl {ip('nanopos')}:9116", "tshirt")
|
2020-08-02 14:20:51 -07:00
|
|
|
|
|
|
|
assert_running("onion-chef")
|
|
|
|
|
2020-05-18 02:51:18 -07:00
|
|
|
assert_running("joinmarket")
|
|
|
|
machine.wait_until_succeeds(
|
|
|
|
log_has_string("joinmarket", "P2EPDaemonServerProtocolFactory starting on 27184")
|
|
|
|
)
|
|
|
|
machine.wait_until_succeeds(
|
2020-09-11 04:53:12 -07:00
|
|
|
log_has_string("joinmarket-yieldgenerator", "Failure to get blockheight",)
|
2020-05-18 02:51:18 -07:00
|
|
|
)
|
|
|
|
|
2020-08-02 14:20:51 -07:00
|
|
|
# FIXME: use 'wait_for_unit' because 'create-web-index' always fails during startup due
|
|
|
|
# to incomplete unit dependencies.
|
|
|
|
# 'create-web-index' implicitly tests 'nodeinfo'.
|
|
|
|
machine.wait_for_unit("create-web-index")
|
2020-08-04 05:17:15 -07:00
|
|
|
assert_running("nginx")
|
2020-09-27 03:43:17 -07:00
|
|
|
wait_for_open_port(ip("nginx"), 80)
|
|
|
|
assert_matches(f"curl {ip('nginx')}", "nix-bitcoin")
|
|
|
|
assert_matches(f"curl -L {ip('nginx')}/store", "tshirt")
|
2020-08-02 14:20:51 -07:00
|
|
|
|
|
|
|
machine.wait_until_succeeds(log_has_string("bitcoind-import-banlist", "Importing node banlist"))
|
|
|
|
assert_no_failure("bitcoind-import-banlist")
|
|
|
|
|
|
|
|
### Additional tests
|
|
|
|
|
|
|
|
# Current time in µs
|
|
|
|
pre_restart = succeed("date +%s.%6N").rstrip()
|
|
|
|
|
|
|
|
# Sanity-check system by restarting all services
|
2020-08-04 01:24:49 -07:00
|
|
|
succeed(
|
|
|
|
"systemctl restart bitcoind clightning lnd lightning-loop spark-wallet lightning-charge nanopos liquidd"
|
|
|
|
)
|
2020-08-02 14:20:51 -07:00
|
|
|
|
|
|
|
# Now that the bitcoind restart triggered a banlist import restart, check that
|
|
|
|
# re-importing already banned addresses works
|
|
|
|
machine.wait_until_succeeds(
|
|
|
|
log_has_string(f"bitcoind-import-banlist --since=@{pre_restart}", "Importing node banlist")
|
|
|
|
)
|
|
|
|
assert_no_failure("bitcoind-import-banlist")
|
|
|
|
|
2020-09-27 03:43:17 -07:00
|
|
|
prestop()
|
2020-06-23 04:03:16 -07:00
|
|
|
|
|
|
|
### Test duplicity
|
|
|
|
|
|
|
|
succeed("systemctl stop bitcoind")
|
|
|
|
succeed("systemctl start duplicity")
|
|
|
|
machine.wait_until_succeeds(log_has_string("duplicity", "duplicity.service: Succeeded."))
|
2020-09-27 03:43:18 -07:00
|
|
|
run_duplicity = "export $(cat /secrets/backup-encryption-env); duplicity"
|
|
|
|
# Files in backup and /var/lib should be identical
|
2020-06-23 04:03:16 -07:00
|
|
|
assert_matches(
|
2020-09-27 03:43:18 -07:00
|
|
|
f"{run_duplicity} verify --archive-dir /var/lib/duplicity file:///var/lib/localBackups /var/lib",
|
2020-06-23 04:03:16 -07:00
|
|
|
"0 differences found",
|
|
|
|
)
|
2020-09-27 03:43:18 -07:00
|
|
|
# Backup should include important files
|
|
|
|
files = succeed(f"{run_duplicity} list-current-files file:///var/lib/localBackups")
|
|
|
|
assert "var/lib/clightning/bitcoin/hsm_secret" in files
|
|
|
|
assert "secrets/lnd-seed-mnemonic" in files
|
|
|
|
assert "secrets/jm-wallet-seed" in files
|
|
|
|
assert "var/lib/bitcoind/wallet.dat" in files
|
|
|
|
assert "var/backup/postgresql/btcpaydb.sql.gz" in files
|
2020-08-02 14:20:51 -07:00
|
|
|
|
2020-08-20 04:11:09 -07:00
|
|
|
|
|
|
|
def test_security():
|
|
|
|
assert_running("setup-secrets")
|
|
|
|
# Unused secrets should be inaccessible
|
|
|
|
succeed('[[ $(stat -c "%U:%G %a" /secrets/dummy) = "root:root 440" ]]')
|
|
|
|
|
|
|
|
# Access to '/proc' should be restricted
|
|
|
|
machine.succeed("grep -Fq hidepid=2 /proc/mounts")
|
|
|
|
|
|
|
|
machine.wait_for_unit("bitcoind")
|
|
|
|
# `systemctl status` run by unprivileged users shouldn't leak cgroup info
|
|
|
|
assert_matches(
|
|
|
|
"sudo -u electrs systemctl status bitcoind 2>&1 >/dev/null",
|
|
|
|
"Failed to dump process list for 'bitcoind.service', ignoring: Access denied",
|
|
|
|
)
|
|
|
|
# The 'operator' with group 'proc' has full access
|
|
|
|
assert_full_match("sudo -u operator systemctl status bitcoind 2>&1 >/dev/null", "")
|
2020-09-27 03:43:17 -07:00
|
|
|
|
|
|
|
|
|
|
|
def ip(_):
|
|
|
|
return "127.0.0.1"
|