Merge rust-bitcoin/rust-bitcoin#1234: Serde derive in tests
c822fcf435
Remove helper variables (Martin Habovstiak)70d1a0348e
Use serde derive rather than manual parsing (Martin Habovstiak) Pull request description: Manual parsing Json is tedious and error-prone. It contained a bunch of `unwrap`s and was hard to read. This replaces manual Json parsing with serde_derive implementation. Closes https://github.com/rust-bitcoin/rust-bitcoin/issues/1231 ACKs for top commit: apoelstra: ACKc822fcf435
tcharding: ACKc822fcf435
Tree-SHA512: 0e1df6a62dc8438d67979a00658f8a2820135beebdd01d7275149b06feacd0d18accb86cecbf8c85f9a02ddc724575eaffff079b45cfe0e7765c8559c5eb03f7
This commit is contained in:
commit
ca563c4b27
|
@ -105,9 +105,6 @@ mod test_macros {
|
|||
};
|
||||
}
|
||||
pub(crate) use hex_from_slice;
|
||||
|
||||
macro_rules! hex_decode (($h:ident, $s:expr) => (deserialize::<$h>(&<$crate::prelude::Vec<u8> as $crate::hashes::hex::FromHex>::from_hex($s).unwrap()).unwrap()));
|
||||
pub(crate) use hex_decode;
|
||||
}
|
||||
|
||||
/// Implements several traits for byte-based newtypes.
|
||||
|
|
|
@ -1054,19 +1054,17 @@ fn is_invalid_use_of_sighash_single(sighash: u32, input_index: usize, output_len
|
|||
mod tests {
|
||||
use std::str::FromStr;
|
||||
|
||||
use secp256k1::{self, SecretKey, XOnlyPublicKey};
|
||||
|
||||
use super::*;
|
||||
use crate::address::Address;
|
||||
use crate::blockdata::locktime::absolute;
|
||||
use crate::consensus::deserialize;
|
||||
use crate::crypto::key::PublicKey;
|
||||
use crate::hash_types::Sighash;
|
||||
use crate::hashes::hex::{FromHex, ToHex};
|
||||
use crate::hashes::hex::FromHex;
|
||||
use crate::hashes::{Hash, HashEngine};
|
||||
use crate::internal_macros::{hex_decode, hex_from_slice, hex_into, hex_script};
|
||||
use crate::internal_macros::{hex_from_slice, hex_script};
|
||||
use crate::network::constants::Network;
|
||||
use crate::taproot::{TapBranchHash, TapLeafHash, TapSighashHash, TapTweakHash};
|
||||
use crate::taproot::{TapLeafHash, TapSighashHash};
|
||||
|
||||
extern crate serde_json;
|
||||
|
||||
|
@ -1378,74 +1376,148 @@ mod tests {
|
|||
assert_eq!(expected, hash.into_inner());
|
||||
}
|
||||
|
||||
#[cfg(feature = "serde")]
|
||||
#[test]
|
||||
fn bip_341_sighash_tests() {
|
||||
let data = bip_341_read_json();
|
||||
assert!(data["version"].as_u64().unwrap() == 1u64);
|
||||
let secp = &secp256k1::Secp256k1::new();
|
||||
let key_path = &data["keyPathSpending"].as_array().unwrap()[0];
|
||||
fn sighash_deser_numeric<'de, D>(deserializer: D) -> Result<SchnorrSighashType, D::Error> where D: actual_serde::Deserializer<'de> {
|
||||
use actual_serde::de::{Deserialize, Error, Unexpected};
|
||||
|
||||
let raw_unsigned_tx =
|
||||
hex_decode!(Transaction, key_path["given"]["rawUnsignedTx"].as_str().unwrap());
|
||||
let mut utxos = vec![];
|
||||
for utxo in key_path["given"]["utxosSpent"].as_array().unwrap() {
|
||||
let spk = hex_script!(utxo["scriptPubKey"].as_str().unwrap());
|
||||
let amt = utxo["amountSats"].as_u64().unwrap();
|
||||
utxos.push(TxOut { value: amt, script_pubkey: spk });
|
||||
let raw = u8::deserialize(deserializer)?;
|
||||
SchnorrSighashType::from_consensus_u8(raw)
|
||||
.map_err(|_| D::Error::invalid_value(Unexpected::Unsigned(raw.into()), &"number in range 0-3 or 0x81-0x83"))
|
||||
}
|
||||
|
||||
use crate::hashes::hex::ToHex;
|
||||
use crate::taproot::{TapTweakHash, TapBranchHash};
|
||||
use secp256k1::{self, SecretKey, XOnlyPublicKey};
|
||||
use crate::consensus::serde as con_serde;
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct UtxoSpent {
|
||||
#[serde(rename = "scriptPubKey")]
|
||||
script_pubkey: Script,
|
||||
#[serde(rename = "amountSats")]
|
||||
value: u64,
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct KpsGiven {
|
||||
#[serde(with = "con_serde::With::<con_serde::Hex>")]
|
||||
raw_unsigned_tx: Transaction,
|
||||
utxos_spent: Vec<UtxoSpent>,
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct KpsIntermediary {
|
||||
hash_prevouts: sha256::Hash,
|
||||
hash_outputs: sha256::Hash,
|
||||
hash_sequences: sha256::Hash,
|
||||
hash_amounts: sha256::Hash,
|
||||
hash_script_pubkeys: sha256::Hash,
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct KpsInputSpendingGiven {
|
||||
txin_index: usize,
|
||||
internal_privkey: SecretKey,
|
||||
merkle_root: Option<TapBranchHash>,
|
||||
#[serde(deserialize_with = "sighash_deser_numeric")]
|
||||
hash_type: SchnorrSighashType,
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct KpsInputSpendingIntermediary {
|
||||
internal_pubkey: XOnlyPublicKey,
|
||||
tweak: TapTweakHash,
|
||||
tweaked_privkey: SecretKey,
|
||||
sig_msg: String,
|
||||
//precomputed_used: Vec<String>, // unused
|
||||
sig_hash: TapSighashHash,
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct KpsInputSpendingExpected {
|
||||
witness: Vec<String>,
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct KpsInputSpending {
|
||||
given: KpsInputSpendingGiven,
|
||||
intermediary: KpsInputSpendingIntermediary,
|
||||
expected: KpsInputSpendingExpected,
|
||||
// auxiliary: KpsAuxiliary, //unused
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct KeyPathSpending {
|
||||
given: KpsGiven,
|
||||
intermediary: KpsIntermediary,
|
||||
input_spending: Vec<KpsInputSpending>,
|
||||
}
|
||||
|
||||
#[derive(serde::Deserialize)]
|
||||
#[serde(rename_all = "camelCase")]
|
||||
#[serde(crate = "actual_serde")]
|
||||
struct TestData {
|
||||
version: u64,
|
||||
key_path_spending: Vec<KeyPathSpending>,
|
||||
//script_pubkey: Vec<ScriptPubKey>, // unused
|
||||
}
|
||||
|
||||
let json_str = include_str!("../tests/data/bip341_tests.json");
|
||||
let mut data = serde_json::from_str::<TestData>(json_str).expect("JSON was not well-formatted");
|
||||
|
||||
assert_eq!(data.version, 1u64);
|
||||
let secp = &secp256k1::Secp256k1::new();
|
||||
let key_path = data.key_path_spending.remove(0);
|
||||
|
||||
let raw_unsigned_tx = key_path.given.raw_unsigned_tx;
|
||||
let utxos = key_path.given.utxos_spent.into_iter()
|
||||
.map(|txo| TxOut { value: txo.value, script_pubkey: txo.script_pubkey })
|
||||
.collect::<Vec<_>>();
|
||||
|
||||
// Test intermediary
|
||||
let mut cache = SighashCache::new(&raw_unsigned_tx);
|
||||
let expected_amt_hash = key_path["intermediary"]["hashAmounts"].as_str().unwrap();
|
||||
let expected_outputs_hash = key_path["intermediary"]["hashOutputs"].as_str().unwrap();
|
||||
let expected_prevouts_hash = key_path["intermediary"]["hashPrevouts"].as_str().unwrap();
|
||||
let expected_spks_hash = key_path["intermediary"]["hashScriptPubkeys"].as_str().unwrap();
|
||||
let expected_sequences_hash = key_path["intermediary"]["hashSequences"].as_str().unwrap();
|
||||
|
||||
let expected = key_path.intermediary;
|
||||
// Compute all caches
|
||||
assert_eq!(expected_amt_hash, cache.taproot_cache(&utxos).amounts.to_hex());
|
||||
assert_eq!(expected_outputs_hash, cache.common_cache().outputs.to_hex());
|
||||
assert_eq!(expected_prevouts_hash, cache.common_cache().prevouts.to_hex());
|
||||
assert_eq!(expected_spks_hash, cache.taproot_cache(&utxos).script_pubkeys.to_hex());
|
||||
assert_eq!(expected_sequences_hash, cache.common_cache().sequences.to_hex());
|
||||
assert_eq!(expected.hash_amounts, cache.taproot_cache(&utxos).amounts);
|
||||
assert_eq!(expected.hash_outputs, cache.common_cache().outputs);
|
||||
assert_eq!(expected.hash_prevouts, cache.common_cache().prevouts);
|
||||
assert_eq!(expected.hash_script_pubkeys, cache.taproot_cache(&utxos).script_pubkeys);
|
||||
assert_eq!(expected.hash_sequences, cache.common_cache().sequences);
|
||||
|
||||
for inp in key_path["inputSpending"].as_array().unwrap() {
|
||||
let tx_ind = inp["given"]["txinIndex"].as_u64().unwrap() as usize;
|
||||
let internal_priv_key =
|
||||
hex_from_slice!(SecretKey, inp["given"]["internalPrivkey"].as_str().unwrap());
|
||||
let merkle_root = if inp["given"]["merkleRoot"].is_null() {
|
||||
None
|
||||
} else {
|
||||
Some(hex_into!(TapBranchHash, inp["given"]["merkleRoot"].as_str().unwrap()))
|
||||
};
|
||||
let hash_ty = SchnorrSighashType::from_consensus_u8(
|
||||
inp["given"]["hashType"].as_u64().unwrap() as u8,
|
||||
)
|
||||
.unwrap();
|
||||
for mut inp in key_path.input_spending {
|
||||
let tx_ind = inp.given.txin_index;
|
||||
let internal_priv_key = inp.given.internal_privkey;
|
||||
let merkle_root = inp.given.merkle_root;
|
||||
let hash_ty = inp.given.hash_type;
|
||||
|
||||
let expected_internal_pk = hex_from_slice!(
|
||||
XOnlyPublicKey,
|
||||
inp["intermediary"]["internalPubkey"].as_str().unwrap()
|
||||
);
|
||||
let expected_tweak =
|
||||
hex_into!(TapTweakHash, inp["intermediary"]["tweak"].as_str().unwrap());
|
||||
let expected_tweaked_priv_key =
|
||||
hex_from_slice!(SecretKey, inp["intermediary"]["tweakedPrivkey"].as_str().unwrap());
|
||||
let expected_sig_msg =
|
||||
Vec::<u8>::from_hex(inp["intermediary"]["sigMsg"].as_str().unwrap()).unwrap();
|
||||
let expected_sighash =
|
||||
hex_into!(TapSighashHash, inp["intermediary"]["sigHash"].as_str().unwrap());
|
||||
let sig_str = inp["expected"]["witness"][0].as_str().unwrap();
|
||||
let expected = inp.intermediary;
|
||||
let sig_str = inp.expected.witness.remove(0);
|
||||
let (expected_key_spend_sig, expected_hash_ty) = if sig_str.len() == 128 {
|
||||
(
|
||||
secp256k1::schnorr::Signature::from_str(sig_str).unwrap(),
|
||||
secp256k1::schnorr::Signature::from_str(&sig_str).unwrap(),
|
||||
SchnorrSighashType::Default,
|
||||
)
|
||||
} else {
|
||||
let hash_ty = SchnorrSighashType::from_consensus_u8(
|
||||
Vec::<u8>::from_hex(&sig_str[128..]).unwrap()[0],
|
||||
)
|
||||
.unwrap();
|
||||
let hash_ty = u8::from_str_radix(&sig_str[128..130], 16).unwrap();
|
||||
let hash_ty = SchnorrSighashType::from_consensus_u8(hash_ty).unwrap();
|
||||
(secp256k1::schnorr::Signature::from_str(&sig_str[..128]).unwrap(), hash_ty)
|
||||
};
|
||||
|
||||
|
@ -1472,23 +1544,18 @@ mod tests {
|
|||
let msg = secp256k1::Message::from(sighash);
|
||||
let key_spend_sig = secp.sign_schnorr_with_aux_rand(&msg, &tweaked_keypair, &[0u8; 32]);
|
||||
|
||||
assert_eq!(expected_internal_pk, internal_key);
|
||||
assert_eq!(expected_tweak, tweak);
|
||||
assert_eq!(expected_sig_msg, sig_msg);
|
||||
assert_eq!(expected_sighash, sighash);
|
||||
assert_eq!(expected.internal_pubkey, internal_key);
|
||||
assert_eq!(expected.tweak, tweak);
|
||||
assert_eq!(expected.sig_msg, sig_msg.to_hex());
|
||||
assert_eq!(expected.sig_hash, sighash);
|
||||
assert_eq!(expected_hash_ty, hash_ty);
|
||||
assert_eq!(expected_key_spend_sig, key_spend_sig);
|
||||
|
||||
let tweaked_priv_key = SecretKey::from_keypair(&tweaked_keypair);
|
||||
assert_eq!(expected_tweaked_priv_key, tweaked_priv_key);
|
||||
assert_eq!(expected.tweaked_privkey, tweaked_priv_key);
|
||||
}
|
||||
}
|
||||
|
||||
fn bip_341_read_json() -> serde_json::Value {
|
||||
let json_str = include_str!("../tests/data/bip341_tests.json");
|
||||
serde_json::from_str(json_str).expect("JSON was not well-formatted")
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn sighashtype_fromstr_display() {
|
||||
let sighashtypes = vec![
|
||||
|
|
Loading…
Reference in New Issue