New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Raspberry Pi check; fixing breaking changes when not using built-in Tor #1037
Conversation
Raspi is now failing on the assignment to the
Looks like a mismatch with the I don't get how this worked elsewhere. Running python 3.7.3. Do properties maybe work differently in newer versions? Currently testing this workaround:
|
Confirmed same Switching to the code in this PR resolves the issue. Win10 Tor + Bitcoin Core up and running*!
I eventually found it in The QuickSync blocks were in there, too. So it looks like my python execution environment is isolating the file writes. But when bitcoind starts, it's still looking for its data dir in the normal place. So the node IS running, but now it's running with no bitcoin.conf and is therefore behaving like a new full node doing IBD. I don't know if this is peculiar to my Win10 setup. I just installed python 3.8 via the Microsoft Store earlier today and that's what I'm running against. Looks to me like a permissions/data siloing thing going on. So was the original |
Solved! The big mistake was installing Python 3.8.8 from the Microsoft Store. That's why it was running in that Updated the docs accordingly. |
Great! I've created a pre-release on this branch and it worked really smooth on windows (apart from the security-issues mentioned above). |
Testing on a clean Win10 with the pre-release binaries worked great! Ancient Macbook Air needs a timeout extension (see #1044) but otherwise also working great from latest source (no DMG to play with in the pre-release yet). |
Raspberry Pi cannot use the Linux binaries for Tor Browser or bitcoind, unfortunately. So this detects Raspberry Pi OS and throws up error messages:
Changes for the new built-in Tor support break external Tor setups due to the assumption that there will now be a
torrc_password
in Specterconfig.json
(instead of usingCookieAuthentication
intorrc
). It wasn't clear to me if there was any way to support bothHashedControlPassword
andCookieAuthentication
.Adds a check for
torrc_password
and writes it toconfig.json
if missing.tor.md
docs updated accordingly with manual instructions for hashing the password.It seemed easiest to add this check in
update_tor_controller
but perhaps there's a better place for it.Added
generate_torrc_password()
for DRY consolidation and seems a bit cleaner to not havetor_setup_tasks.py
calling thespecter
object's_save()
.