1#![cfg_attr(docsrs, feature(doc_auto_cfg))]
2#![cfg_attr(docsrs, cfg_attr(all(), doc = include_str!("../README.md")))]
3
4pub extern crate corepc_client as client;
5
6#[rustfmt::skip]
7mod client_versions;
8mod versions;
9
10use std::ffi::OsStr;
11use std::net::{Ipv4Addr, SocketAddrV4, TcpListener};
12use std::path::PathBuf;
13use std::process::{Child, Command, ExitStatus, Stdio};
14use std::time::Duration;
15use std::{env, fmt, fs, thread};
16
17use anyhow::Context;
18use corepc_client::client_sync::{self, Auth};
19use log::{debug, error, warn};
20use tempfile::TempDir;
21pub use {anyhow, serde_json, tempfile, which};
22
23#[rustfmt::skip] #[doc(inline)]
25pub use self::{
26 client_versions::{types, Client, AddressType},
27 versions::VERSION,
28};
29
30#[derive(Debug)]
31pub struct Node {
33 process: Child,
35 pub client: Client,
37 work_dir: DataDir,
39
40 pub params: ConnectParams,
42}
43
44#[derive(Debug)]
45pub enum DataDir {
48 Persistent(PathBuf),
50 Temporary(TempDir),
52}
53
54impl DataDir {
55 fn path(&self) -> PathBuf {
57 match self {
58 Self::Persistent(path) => path.to_owned(),
59 Self::Temporary(tmp_dir) => tmp_dir.path().to_path_buf(),
60 }
61 }
62}
63
64#[derive(Debug, Clone)]
65pub struct ConnectParams {
67 pub cookie_file: PathBuf,
69 pub rpc_socket: SocketAddrV4,
71 pub p2p_socket: Option<SocketAddrV4>,
73 pub zmq_pub_raw_block_socket: Option<SocketAddrV4>,
75 pub zmq_pub_raw_tx_socket: Option<SocketAddrV4>,
77}
78
79pub struct CookieValues {
80 pub user: String,
81 pub password: String,
82}
83
84impl ConnectParams {
85 fn parse_cookie(content: String) -> Option<CookieValues> {
87 let values: Vec<_> = content.splitn(2, ':').collect();
88 let user = values.first()?.to_string();
89 let password = values.get(1)?.to_string();
90 Some(CookieValues { user, password })
91 }
92
93 pub fn get_cookie_values(&self) -> Result<Option<CookieValues>, std::io::Error> {
95 let cookie = std::fs::read_to_string(&self.cookie_file)?;
96 Ok(self::ConnectParams::parse_cookie(cookie))
97 }
98}
99
100#[derive(Debug, PartialEq, Eq, Clone)]
102pub enum P2P {
103 No,
105 Yes,
107 Connect(SocketAddrV4, bool),
111}
112
113pub enum Error {
115 Io(std::io::Error),
117 Rpc(client_sync::Error),
119 NoFeature,
121 NoEnvVar,
123 NoBitcoindExecutableFound,
126 EarlyExit(ExitStatus),
128 BothDirsSpecified,
130 RpcUserAndPasswordUsed,
133 SkipDownload,
135 NoBitcoindInstance,
137}
138
139impl fmt::Debug for Error {
140 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
141 use Error::*;
142
143 match self {
144 Io(_) => write!(f, "io::Error"), Rpc(_) => write!(f, "bitcoin_rpc::Error"),
146 NoFeature => write!(f, "Called a method requiring a feature to be set, but it's not"),
147 NoEnvVar => write!(f, "Called a method requiring env var `BITCOIND_EXE` to be set, but it's not"),
148 NoBitcoindExecutableFound => write!(f, "`bitcoind` executable is required, provide it with one of the following: set env var `BITCOIND_EXE` or use a feature like \"22_1\" or have `bitcoind` executable in the `PATH`"),
149 EarlyExit(e) => write!(f, "The bitcoind process terminated early with exit code {}", e),
150 BothDirsSpecified => write!(f, "tempdir and staticdir cannot be enabled at same time in configuration options"),
151 RpcUserAndPasswordUsed => write!(f, "`-rpcuser` and `-rpcpassword` cannot be used, it will be deprecated soon and it's recommended to use `-rpcauth` instead which works alongside with the default cookie authentication"),
152 SkipDownload => write!(f, "expecting an auto-downloaded executable but `BITCOIND_SKIP_DOWNLOAD` env var is set"),
153 NoBitcoindInstance => write!(f, "it appears that bitcoind is not reachable"),
154 }
155 }
156}
157
158impl std::fmt::Display for Error {
159 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { write!(f, "{:?}", self) }
160}
161
162impl std::error::Error for Error {
163 fn source(&self) -> Option<&(dyn std::error::Error + 'static)> {
164 use Error::*;
165
166 match *self {
167 Error::Io(ref e) => Some(e),
168 Error::Rpc(ref e) => Some(e),
169 NoFeature
170 | NoEnvVar
171 | NoBitcoindExecutableFound
172 | EarlyExit(_)
173 | BothDirsSpecified
174 | RpcUserAndPasswordUsed
175 | SkipDownload
176 | NoBitcoindInstance => None,
177 }
178 }
179}
180
181const LOCAL_IP: Ipv4Addr = Ipv4Addr::new(127, 0, 0, 1);
182
183const INVALID_ARGS: [&str; 2] = ["-rpcuser", "-rpcpassword"];
184
185#[non_exhaustive]
206#[derive(Debug, PartialEq, Eq, Clone)]
207pub struct Conf<'a> {
208 pub args: Vec<&'a str>,
212
213 pub view_stdout: bool,
215
216 pub p2p: P2P,
218
219 pub network: &'a str,
222
223 pub tmpdir: Option<PathBuf>,
237
238 pub staticdir: Option<PathBuf>,
240
241 pub attempts: u8,
247
248 pub enable_zmq: bool,
250
251 pub wallet: Option<String>,
253}
254
255impl Default for Conf<'_> {
256 fn default() -> Self {
257 Conf {
258 args: vec!["-regtest", "-fallbackfee=0.0001"],
259 view_stdout: false,
260 p2p: P2P::No,
261 network: "regtest",
262 tmpdir: None,
263 staticdir: None,
264 attempts: 3,
265 enable_zmq: false,
266 wallet: Some("default".to_string()),
267 }
268 }
269}
270
271impl Node {
272 pub fn new<S: AsRef<OsStr>>(exe: S) -> anyhow::Result<Node> {
276 Node::with_conf(exe, &Conf::default())
277 }
278
279 pub fn with_conf<S: AsRef<OsStr>>(exe: S, conf: &Conf) -> anyhow::Result<Node> {
281 let tmpdir =
282 conf.tmpdir.clone().or_else(|| env::var("TEMPDIR_ROOT").map(PathBuf::from).ok());
283 let work_dir = match (&tmpdir, &conf.staticdir) {
284 (Some(_), Some(_)) => return Err(Error::BothDirsSpecified.into()),
285 (Some(tmpdir), None) => DataDir::Temporary(TempDir::new_in(tmpdir)?),
286 (None, Some(workdir)) => {
287 fs::create_dir_all(workdir)?;
288 DataDir::Persistent(workdir.to_owned())
289 }
290 (None, None) => DataDir::Temporary(TempDir::new()?),
291 };
292
293 let work_dir_path = work_dir.path();
294 if !work_dir_path.exists() {
295 panic!("work dir does not exist");
296 }
297 debug!("work_dir: {:?}", work_dir_path);
298
299 let cookie_file = work_dir_path.join(conf.network).join(".cookie");
300 let rpc_port = get_available_port()?;
301 let rpc_socket = SocketAddrV4::new(LOCAL_IP, rpc_port);
302 let rpc_url = format!("http://{}", rpc_socket);
303 debug!("rpc_url: {}", rpc_url);
304
305 let (p2p_args, p2p_socket) = match conf.p2p {
306 P2P::No => (vec!["-listen=0".to_string()], None),
307 P2P::Yes => {
308 let p2p_port = get_available_port()?;
309 let p2p_socket = SocketAddrV4::new(LOCAL_IP, p2p_port);
310 let bind_arg = format!("-bind={}", p2p_socket);
311 let args = vec![bind_arg];
312 (args, Some(p2p_socket))
313 }
314 P2P::Connect(other_node_url, listen) => {
315 let p2p_port = get_available_port()?;
316 let p2p_socket = SocketAddrV4::new(LOCAL_IP, p2p_port);
317 let bind_arg = format!("-bind={}", p2p_socket);
318 let connect = format!("-connect={}", other_node_url);
319 let mut args = vec![bind_arg, connect];
320 if listen {
321 args.push("-listen=1".to_string())
322 }
323 (args, Some(p2p_socket))
324 }
325 };
326
327 let (zmq_args, zmq_pub_raw_tx_socket, zmq_pub_raw_block_socket) = match conf.enable_zmq {
328 true => {
329 let zmq_pub_raw_tx_port = get_available_port()?;
330 let zmq_pub_raw_tx_socket = SocketAddrV4::new(LOCAL_IP, zmq_pub_raw_tx_port);
331 let zmq_pub_raw_block_port = get_available_port()?;
332 let zmq_pub_raw_block_socket = SocketAddrV4::new(LOCAL_IP, zmq_pub_raw_block_port);
333 let zmqpubrawblock_arg =
334 format!("-zmqpubrawblock=tcp://0.0.0.0:{}", zmq_pub_raw_block_port);
335 let zmqpubrawtx_arg = format!("-zmqpubrawtx=tcp://0.0.0.0:{}", zmq_pub_raw_tx_port);
336 (
337 vec![zmqpubrawtx_arg, zmqpubrawblock_arg],
338 Some(zmq_pub_raw_tx_socket),
339 Some(zmq_pub_raw_block_socket),
340 )
341 }
342 false => (vec![], None, None),
343 };
344
345 let stdout = if conf.view_stdout { Stdio::inherit() } else { Stdio::null() };
346
347 let datadir_arg = format!("-datadir={}", work_dir_path.display());
348 let rpc_arg = format!("-rpcport={}", rpc_port);
349 let default_args = [&datadir_arg, &rpc_arg];
350 let conf_args = validate_args(conf.args.clone())?;
351
352 debug!(
353 "launching {:?} with args: {:?} {:?} AND custom args: {:?}",
354 exe.as_ref(),
355 default_args,
356 p2p_args,
357 conf_args
358 );
359
360 let mut process = Command::new(exe.as_ref())
361 .args(default_args)
362 .args(&p2p_args)
363 .args(&conf_args)
364 .args(&zmq_args)
365 .stdout(stdout)
366 .spawn()
367 .with_context(|| format!("Error while executing {:?}", exe.as_ref()))?;
368
369 debug!("cookie file: {}", cookie_file.display());
370
371 if let Some(status) = process.try_wait()? {
372 if conf.attempts > 0 {
373 warn!("early exit with: {:?}. Trying to launch again ({} attempts remaining), maybe some other process used our available port", status, conf.attempts);
374 let mut conf = conf.clone();
375 conf.attempts -= 1;
376 return Self::with_conf(exe, &conf)
377 .with_context(|| format!("Remaining attempts {}", conf.attempts));
378 } else {
379 error!("early exit with: {:?}", status);
380 return Err(Error::EarlyExit(status).into());
381 }
382 }
383 thread::sleep(Duration::from_millis(1000));
384 assert!(process.stderr.is_none());
385
386 let mut i = 0;
387 let auth = Auth::CookieFile(cookie_file.clone());
388 let client_base =
389 Client::new_with_auth(&rpc_url, auth.clone()).expect("failed to create client");
390
391 let client = loop {
392 let client_result: Result<serde_json::Value, _> =
394 client_base.call("getblockchaininfo", &[]);
395
396 if client_result.is_ok() {
397 let url = match &conf.wallet {
398 Some(wallet) => {
399 debug!("trying to create/load wallet: {}", wallet);
400 match client_base.create_wallet(wallet) {
402 Ok(json) => {
403 debug!("created wallet: {}", json.name());
404 }
405 Err(e) => {
406 debug!("initial create_wallet failed, try load instead: {:?}", e);
407 let wallet = client_base.load_wallet(wallet)?.name();
408 debug!("loaded wallet: {}", wallet);
409 }
410 }
411 format!("{}/wallet/{}", rpc_url, wallet)
412 }
413 None => rpc_url,
414 };
415 debug!("creating client with url: {}", url);
416 break Client::new_with_auth(&url, auth)?;
417 }
418
419 thread::sleep(Duration::from_millis(1000));
420
421 i += 1;
422 if i > 10 {
423 error!("failed to get a response from bitcoind");
424 return Err(Error::NoBitcoindInstance.into());
425 }
426 };
427
428 Ok(Node {
429 process,
430 client,
431 work_dir,
432 params: ConnectParams {
433 cookie_file,
434 rpc_socket,
435 p2p_socket,
436 zmq_pub_raw_block_socket,
437 zmq_pub_raw_tx_socket,
438 },
439 })
440 }
441
442 pub fn rpc_url(&self) -> String { format!("http://{}", self.params.rpc_socket) }
444
445 #[cfg(any(feature = "0_19_1", not(feature = "download")))]
446 pub fn rpc_url_with_wallet<T: AsRef<str>>(&self, wallet_name: T) -> String {
449 format!("http://{}/wallet/{}", self.params.rpc_socket, wallet_name.as_ref())
450 }
451
452 pub fn workdir(&self) -> PathBuf { self.work_dir.path() }
454
455 pub fn p2p_connect(&self, listen: bool) -> Option<P2P> {
457 self.params.p2p_socket.map(|s| P2P::Connect(s, listen))
458 }
459
460 pub fn stop(&mut self) -> anyhow::Result<ExitStatus> {
462 self.client.stop()?;
463 Ok(self.process.wait()?)
464 }
465
466 #[cfg(any(feature = "0_19_1", not(feature = "download")))]
467 pub fn create_wallet<T: AsRef<str>>(&self, wallet: T) -> anyhow::Result<Client> {
470 let _ = self.client.create_wallet(wallet.as_ref())?;
471 Ok(Client::new_with_auth(
472 &self.rpc_url_with_wallet(wallet),
473 Auth::CookieFile(self.params.cookie_file.clone()),
474 )?)
475 }
476}
477
478#[cfg(feature = "download")]
479impl Node {
480 pub fn from_downloaded() -> anyhow::Result<Node> { Node::new(downloaded_exe_path()?) }
482
483 pub fn from_downloaded_with_conf(conf: &Conf) -> anyhow::Result<Node> {
485 Node::with_conf(downloaded_exe_path()?, conf)
486 }
487}
488
489impl Drop for Node {
490 fn drop(&mut self) {
491 if let DataDir::Persistent(_) = self.work_dir {
492 let _ = self.stop();
493 }
494 let _ = self.process.kill();
495 }
496}
497
498pub fn get_available_port() -> anyhow::Result<u16> {
502 let t = TcpListener::bind(("127.0.0.1", 0))?; Ok(t.local_addr().map(|s| s.port())?)
505}
506
507impl From<std::io::Error> for Error {
508 fn from(e: std::io::Error) -> Self { Error::Io(e) }
509}
510
511impl From<client_sync::Error> for Error {
512 fn from(e: client_sync::Error) -> Self { Error::Rpc(e) }
513}
514
515#[cfg(not(feature = "download"))]
517pub fn downloaded_exe_path() -> anyhow::Result<String> { Err(Error::NoFeature.into()) }
518
519#[cfg(feature = "download")]
521pub fn downloaded_exe_path() -> anyhow::Result<String> {
522 if std::env::var_os("BITCOIND_SKIP_DOWNLOAD").is_some() {
523 return Err(Error::SkipDownload.into());
524 }
525
526 let mut path: PathBuf = env!("OUT_DIR").into();
527 path.push("bitcoin");
528 path.push(format!("bitcoin-{}", VERSION));
529 path.push("bin");
530
531 if cfg!(target_os = "windows") {
532 path.push("bitcoind.exe");
533 } else {
534 path.push("bitcoind");
535 }
536
537 let path = format!("{}", path.display());
538 debug!("path: {}", path);
539 Ok(path)
540}
541
542pub fn exe_path() -> anyhow::Result<String> {
549 if let Ok(path) = std::env::var("BITCOIND_EXE") {
550 return Ok(path);
551 }
552 if let Ok(path) = downloaded_exe_path() {
553 return Ok(path);
554 }
555 which::which("bitcoind")
556 .map_err(|_| Error::NoBitcoindExecutableFound.into())
557 .map(|p| p.display().to_string())
558}
559
560pub fn validate_args(args: Vec<&str>) -> anyhow::Result<Vec<&str>> {
562 args.iter().try_for_each(|arg| {
563 if INVALID_ARGS.iter().any(|x| arg.starts_with(x)) {
565 return Err(Error::RpcUserAndPasswordUsed);
566 }
567 Ok(())
568 })?;
569
570 Ok(args)
571}
572
573#[cfg(test)]
574mod test {
575 use std::net::SocketAddrV4;
576
577 use tempfile::TempDir;
578
579 use super::*;
580 use crate::{exe_path, get_available_port, Conf, Node, LOCAL_IP, P2P};
581
582 #[test]
583 fn test_local_ip() {
584 assert_eq!("127.0.0.1", format!("{}", LOCAL_IP));
585 let port = get_available_port().unwrap();
586 let socket = SocketAddrV4::new(LOCAL_IP, port);
587 assert_eq!(format!("127.0.0.1:{}", port), format!("{}", socket));
588 }
589
590 #[test]
591 fn test_node_get_blockchain_info() {
592 let exe = init();
593 let node = Node::new(exe).unwrap();
594 let info = node.client.get_blockchain_info().unwrap();
595 assert_eq!(0, info.blocks);
596 }
597
598 #[test]
599 fn test_node() {
600 let exe = init();
601 let node = Node::new(exe).unwrap();
602 let info = node.client.get_blockchain_info().unwrap();
603
604 assert_eq!(0, info.blocks);
605 let address = node.client.new_address().unwrap();
606 let _ = node.client.generate_to_address(1, &address).unwrap();
607 let info = node.client.get_blockchain_info().unwrap();
608 assert_eq!(1, info.blocks);
609 }
610
611 #[test]
612 #[cfg(feature = "0_21_2")]
613 fn test_getindexinfo() {
614 let exe = init();
615 let mut conf = Conf::default();
616 conf.args.push("-txindex");
617 let node = Node::with_conf(&exe, &conf).unwrap();
618 assert!(
619 node.client.server_version().unwrap() >= 210_000,
620 "getindexinfo requires bitcoin >0.21"
621 );
622 let info: std::collections::HashMap<String, serde_json::Value> =
623 node.client.call("getindexinfo", &[]).unwrap();
624 assert!(info.contains_key("txindex"));
625 assert!(node.client.server_version().unwrap() >= 210_000);
626 }
627
628 #[test]
629 fn test_p2p() {
630 let exe = init();
631
632 let conf = Conf::<'_> { p2p: P2P::Yes, ..Default::default() };
633 let node = Node::with_conf(&exe, &conf).unwrap();
634 assert_eq!(peers_connected(&node.client), 0);
635
636 let other_conf = Conf::<'_> { p2p: node.p2p_connect(false).unwrap(), ..Default::default() };
637 let other_node = Node::with_conf(&exe, &other_conf).unwrap();
638
639 assert_eq!(peers_connected(&node.client), 1);
640 assert_eq!(peers_connected(&other_node.client), 1);
641 }
642
643 #[cfg(not(target_os = "windows"))] #[test]
645 fn test_data_persistence() {
646 let mut conf = Conf::default();
648 let datadir = TempDir::new().unwrap();
649 conf.staticdir = Some(datadir.path().to_path_buf());
650
651 let node = Node::with_conf(exe_path().unwrap(), &conf).unwrap();
655 let core_addrs = node.client.new_address().unwrap();
656 node.client.generate_to_address(101, &core_addrs).unwrap();
657 let wallet_balance_1 = node.client.get_balance().unwrap();
658 let best_block_1 = node.client.get_best_block_hash().unwrap();
659
660 drop(node);
661
662 let node = Node::with_conf(exe_path().unwrap(), &conf).unwrap();
664
665 let wallet_balance_2 = node.client.get_balance().unwrap();
666 let best_block_2 = node.client.get_best_block_hash().unwrap();
667
668 assert_eq!(best_block_1, best_block_2);
670
671 assert_eq!(wallet_balance_1, wallet_balance_2);
673 }
674
675 #[test]
676 fn test_multi_p2p() {
677 let exe = init();
678
679 let conf_node1 = Conf::<'_> { p2p: P2P::Yes, ..Default::default() };
680 let node1 = Node::with_conf(&exe, &conf_node1).unwrap();
681 assert_eq!(peers_connected(&node1.client), 0);
682
683 let conf_node2 = Conf::<'_> { p2p: node1.p2p_connect(true).unwrap(), ..Default::default() };
685 let node2 = Node::with_conf(&exe, &conf_node2).unwrap();
686
687 let conf_node3 =
689 Conf::<'_> { p2p: node2.p2p_connect(false).unwrap(), ..Default::default() };
690 let node3 = Node::with_conf(exe_path().unwrap(), &conf_node3).unwrap();
691
692 let node1_peers = peers_connected(&node1.client);
694 let node2_peers = peers_connected(&node2.client);
695 let node3_peers = peers_connected(&node3.client);
696
697 assert!(node1_peers >= 1);
699 assert!(node2_peers >= 1);
700 assert_eq!(node3_peers, 1, "listen false but more than 1 peer");
701 }
702
703 #[cfg(feature = "0_19_1")]
704 #[test]
705 fn test_multi_wallet() {
706 use corepc_client::bitcoin::Amount;
707
708 let exe = init();
709 let node = Node::new(exe).unwrap();
710 let alice = node.create_wallet("alice").unwrap();
711 let alice_address = alice.new_address().unwrap();
712 let bob = node.create_wallet("bob").unwrap();
713 let bob_address = bob.new_address().unwrap();
714 node.client.generate_to_address(1, &alice_address).unwrap();
715 node.client.generate_to_address(101, &bob_address).unwrap();
716
717 let balances = alice.get_balances().unwrap();
718 let alice_balances: types::GetBalances = balances;
719
720 let balances = bob.get_balances().unwrap();
721 let bob_balances: types::GetBalances = balances;
722
723 assert_eq!(
724 Amount::from_btc(50.0).unwrap(),
725 Amount::from_btc(alice_balances.mine.trusted).unwrap()
726 );
727 assert_eq!(
728 Amount::from_btc(50.0).unwrap(),
729 Amount::from_btc(bob_balances.mine.trusted).unwrap()
730 );
731 assert_eq!(
732 Amount::from_btc(5000.0).unwrap(),
733 Amount::from_btc(bob_balances.mine.immature).unwrap()
734 );
735 let _txid = alice.send_to_address(&bob_address, Amount::from_btc(1.0).unwrap()).unwrap();
736
737 let balances = alice.get_balances().unwrap();
738 let alice_balances: types::GetBalances = balances;
739
740 assert!(
741 Amount::from_btc(alice_balances.mine.trusted).unwrap()
742 < Amount::from_btc(49.0).unwrap()
743 && Amount::from_btc(alice_balances.mine.trusted).unwrap()
744 > Amount::from_btc(48.9).unwrap()
745 );
746
747 for _ in 0..30 {
749 let balances = bob.get_balances().unwrap();
750 let bob_balances: types::GetBalances = balances;
751
752 if Amount::from_btc(bob_balances.mine.untrusted_pending).unwrap().to_sat() > 0 {
753 break;
754 }
755 std::thread::sleep(std::time::Duration::from_millis(100));
756 }
757 let balances = bob.get_balances().unwrap();
758 let bob_balances: types::GetBalances = balances;
759
760 assert_eq!(
761 Amount::from_btc(1.0).unwrap(),
762 Amount::from_btc(bob_balances.mine.untrusted_pending).unwrap()
763 );
764 assert!(node.create_wallet("bob").is_err(), "wallet already exist");
765 }
766
767 #[test]
768 fn test_node_rpcuser_and_rpcpassword() {
769 let exe = init();
770
771 let mut conf = Conf::default();
772 conf.args.push("-rpcuser=bitcoind");
773 conf.args.push("-rpcpassword=bitcoind");
774
775 let node = Node::with_conf(exe, &conf);
776
777 assert!(node.is_err());
778 }
779
780 #[test]
781 fn test_node_rpcauth() {
782 let exe = init();
783
784 let mut conf = Conf::default();
785 conf.args.push("-rpcauth=bitcoind:cccd5d7fd36e55c1b8576b8077dc1b83$60b5676a09f8518dcb4574838fb86f37700cd690d99bd2fdc2ea2bf2ab80ead6");
788
789 let node = Node::with_conf(exe, &conf).unwrap();
790
791 let auth = Auth::UserPass("bitcoind".to_string(), "bitcoind".to_string());
792 let client = Client::new_with_auth(
793 format!("{}/wallet/default", node.rpc_url().as_str()).as_str(),
794 auth,
795 )
796 .unwrap();
797 let info = client.get_blockchain_info().unwrap();
798 assert_eq!(0, info.blocks);
799
800 let address = client.new_address().unwrap();
801 let _ = client.generate_to_address(1, &address).unwrap();
802 let info = node.client.get_blockchain_info().unwrap();
803 assert_eq!(1, info.blocks);
804 }
805
806 #[test]
807 fn test_get_cookie_user_and_pass() {
808 let exe = init();
809 let node = Node::new(exe).unwrap();
810
811 let user: &str = "bitcoind_user";
812 let password: &str = "bitcoind_password";
813
814 std::fs::write(&node.params.cookie_file, format!("{}:{}", user, password)).unwrap();
815
816 let result_values = node.params.get_cookie_values().unwrap().unwrap();
817
818 assert_eq!(user, result_values.user);
819 assert_eq!(password, result_values.password);
820 }
821
822 #[test]
823 fn zmq_interface_enabled() {
824 let conf = Conf::<'_> { enable_zmq: true, ..Default::default() };
825 let node = Node::with_conf(exe_path().unwrap(), &conf).unwrap();
826
827 assert!(node.params.zmq_pub_raw_tx_socket.is_some());
828 assert!(node.params.zmq_pub_raw_block_socket.is_some());
829 }
830
831 #[test]
832 fn zmq_interface_disabled() {
833 let exe = init();
834 let node = Node::new(exe).unwrap();
835
836 assert!(node.params.zmq_pub_raw_tx_socket.is_none());
837 assert!(node.params.zmq_pub_raw_block_socket.is_none());
838 }
839
840 fn peers_connected(client: &Client) -> usize {
841 let result: Vec<serde_json::Value> = client.call("getpeerinfo", &[]).unwrap();
844 result.len()
845 }
846
847 fn init() -> String {
848 let _ = env_logger::try_init();
849 exe_path().unwrap()
850 }
851}