mirror of https://github.com/oxen-io/oxen-core.git
3581 lines
149 KiB
C++
3581 lines
149 KiB
C++
// Copyright (c) 2014-2019, The Monero Project
|
|
// Copyright (c) 2018, The Loki Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
#include <boost/format.hpp>
|
|
#include <boost/asio/ip/address.hpp>
|
|
#include <boost/algorithm/string.hpp>
|
|
#include <cstdint>
|
|
#include "cryptonote_basic/cryptonote_basic_impl.h"
|
|
#include <chrono>
|
|
#include <exception>
|
|
|
|
#include "wallet_rpc_server_error_codes.h"
|
|
#include "wallet_rpc_server.h"
|
|
#include "wallet/wallet_args.h"
|
|
#include "common/command_line.h"
|
|
#include "common/i18n.h"
|
|
#include "common/signal_handler.h"
|
|
#include "cryptonote_config.h"
|
|
#include "cryptonote_basic/cryptonote_format_utils.h"
|
|
#include "cryptonote_basic/account.h"
|
|
#include "multisig/multisig.h"
|
|
#include "epee/misc_language.h"
|
|
#include "epee/string_coding.h"
|
|
#include "epee/string_tools.h"
|
|
#include "crypto/hash.h"
|
|
#include "mnemonics/electrum-words.h"
|
|
#include "rpc/rpc_args.h"
|
|
#include "rpc/core_rpc_server_commands_defs.h"
|
|
#include "daemonizer/daemonizer.h"
|
|
#include "cryptonote_core/oxen_name_system.h"
|
|
#include "serialization/boost_std_variant.h"
|
|
|
|
#undef OXEN_DEFAULT_LOG_CATEGORY
|
|
#define OXEN_DEFAULT_LOG_CATEGORY "wallet.rpc"
|
|
|
|
namespace rpc = cryptonote::rpc;
|
|
using namespace tools::wallet_rpc;
|
|
|
|
namespace
|
|
{
|
|
constexpr auto DEFAULT_AUTO_REFRESH_PERIOD = 20s;
|
|
|
|
const command_line::arg_descriptor<uint16_t, true> arg_rpc_bind_port = {"rpc-bind-port", "Sets bind port for server"};
|
|
const command_line::arg_descriptor<bool> arg_disable_rpc_login = {"disable-rpc-login", "Disable HTTP authentication for RPC connections served by this process"};
|
|
const command_line::arg_descriptor<bool> arg_restricted = {"restricted-rpc", "Restricts to view-only commands", false};
|
|
const command_line::arg_descriptor<std::string> arg_wallet_dir = {"wallet-dir", "Directory for newly created wallets"};
|
|
const command_line::arg_descriptor<bool> arg_prompt_for_password = {"prompt-for-password", "Prompts for password when not provided", false};
|
|
|
|
constexpr const char default_rpc_username[] = "oxen";
|
|
|
|
std::optional<tools::password_container> password_prompter(const char *prompt, bool verify)
|
|
{
|
|
auto pwd_container = tools::password_container::prompt(verify, prompt);
|
|
if (!pwd_container)
|
|
{
|
|
MERROR("failed to read wallet password");
|
|
}
|
|
return pwd_container;
|
|
}
|
|
|
|
using rpc_func_data = std::pair<
|
|
bool, // restricted
|
|
std::string(*)( // function to invoke
|
|
epee::serialization::portable_storage& ps,
|
|
epee::serialization::storage_entry id,
|
|
std::optional<epee::serialization::storage_entry> params,
|
|
tools::wallet_rpc_server& server)>;
|
|
|
|
template <typename RPC, std::enable_if_t<std::is_base_of_v<RPC_COMMAND, RPC>, int> = 0>
|
|
void register_rpc_command(std::unordered_map<std::string, rpc_func_data>& regs)
|
|
{
|
|
using Request = typename RPC::request;
|
|
using Response = typename RPC::response;
|
|
/// check that wallet_rpc_server.invoke(Request) returns a Response; the code below
|
|
/// will fail anyway if this isn't satisfied, but that compilation failure might be more cryptic.
|
|
using invoke_return_type = decltype(std::declval<tools::wallet_rpc_server>().invoke(std::declval<Request&&>()));
|
|
static_assert(std::is_same<Response, invoke_return_type>::value,
|
|
"Unable to register RPC command: wallet_rpc_server::invoke(Request) is not defined or does not return a Response");
|
|
rpc_func_data invoke = {
|
|
std::is_base_of_v<RESTRICTED, RPC>,
|
|
[]( epee::serialization::portable_storage& ps,
|
|
epee::serialization::storage_entry id,
|
|
std::optional<epee::serialization::storage_entry> params,
|
|
tools::wallet_rpc_server& server) {
|
|
Request req{};
|
|
if (params) {
|
|
if (auto* section = std::get_if<epee::serialization::section>(&*params)) {
|
|
if (!req.load(ps, section))
|
|
throw tools::wallet_rpc_server::parse_error{"Failed to parse JSON parameters"};
|
|
}
|
|
else
|
|
throw std::runtime_error{"only top-level JSON object values are currently supported"};
|
|
}
|
|
epee::json_rpc::response<Response> r{"2.0", server.invoke(std::move(req)), std::move(id)};
|
|
std::string response;
|
|
epee::serialization::store_t_to_json(r, response);
|
|
if (response.capacity() > response.size())
|
|
response += '\n';
|
|
return response;
|
|
}
|
|
};
|
|
|
|
for (const auto& name : RPC::names())
|
|
regs.emplace(name, invoke);
|
|
}
|
|
|
|
|
|
template <typename... RPC>
|
|
std::unordered_map<std::string, rpc_func_data> register_rpc_commands(tools::type_list<RPC...>) {
|
|
std::unordered_map<std::string, rpc_func_data> regs;
|
|
|
|
(register_rpc_command<RPC>(regs), ...);
|
|
|
|
return regs;
|
|
}
|
|
|
|
const auto rpc_commands = register_rpc_commands(wallet_rpc_types{});
|
|
|
|
// Thrown with a code and message to return a json_rpc error.
|
|
class wallet_rpc_error : public std::runtime_error {
|
|
public:
|
|
int16_t code;
|
|
std::string message;
|
|
|
|
wallet_rpc_error(int16_t code, std::string message)
|
|
: runtime_error{"Wallet rpc error: " + message + " (" + std::to_string(code) + ")"},
|
|
code{code},
|
|
message{std::move(message)}
|
|
{}
|
|
};
|
|
|
|
uint32_t convert_priority(uint32_t priority)
|
|
{
|
|
// NOTE: Map all priorites to blink for backwards compatibility purposes
|
|
// and leaving priority 'unimportant' or '1' as the only other alternative.
|
|
uint32_t result = priority;
|
|
if (result != tools::tx_priority_unimportant)
|
|
result = tools::tx_priority_blink;
|
|
return result;
|
|
}
|
|
|
|
} // anon namespace
|
|
|
|
namespace tools
|
|
{
|
|
const char* wallet_rpc_server::tr(const char* str)
|
|
{
|
|
return i18n_translate(str, "tools::wallet_rpc_server");
|
|
}
|
|
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
wallet_rpc_server::wallet_rpc_server(boost::program_options::variables_map vm)
|
|
: rpc_login_file()
|
|
, m_stop(false)
|
|
, m_restricted(false)
|
|
, m_vm(std::move(vm))
|
|
{
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
void wallet_rpc_server::create_rpc_endpoints(uWS::App& http)
|
|
{
|
|
http.post("/json_rpc", [this](HttpResponse* res, HttpRequest* req) {
|
|
if (m_login && !check_auth(*req, *res))
|
|
return;
|
|
handle_json_rpc_request(*res, *req);
|
|
});
|
|
|
|
// Fallback to send a 404 for anything else:
|
|
http.any("/*", [this](HttpResponse* res, HttpRequest* req) {
|
|
if (m_login && !check_auth(*req, *res))
|
|
return;
|
|
MINFO("Invalid HTTP request for " << req->getMethod() << " " << req->getUrl());
|
|
error_response(*res, HTTP_NOT_FOUND);
|
|
});
|
|
}
|
|
|
|
void wallet_rpc_server::handle_json_rpc_request(HttpResponse& res, HttpRequest& req)
|
|
{
|
|
std::vector<std::pair<std::string, std::string>> extra_headers;
|
|
handle_cors(req, extra_headers);
|
|
|
|
res.onAborted([] {});
|
|
res.onData([this, &res, extra_headers=std::move(extra_headers), buffer=""s](std::string_view d, bool done) mutable {
|
|
if (!done) {
|
|
buffer += d;
|
|
return;
|
|
}
|
|
|
|
std::string_view body;
|
|
if (buffer.empty())
|
|
body = d; // bypass copying the string_view to a string
|
|
else
|
|
body = (buffer += d);
|
|
|
|
epee::serialization::portable_storage ps;
|
|
if(!ps.load_from_json(body))
|
|
return jsonrpc_error_response(res, -32700, "Parse error");
|
|
|
|
epee::serialization::storage_entry id{std::string{}};
|
|
ps.get_value("id", id, nullptr);
|
|
|
|
std::string method;
|
|
if(!ps.get_value("method", method, nullptr))
|
|
{
|
|
MINFO("Invalid JSON RPC request from " << get_remote_address(res) << ": no 'method' in request");
|
|
return jsonrpc_error_response(res, -32600, "Invalid Request", id);
|
|
}
|
|
|
|
auto it = rpc_commands.find(method);
|
|
if (it == rpc_commands.end())
|
|
{
|
|
MINFO("Invalid JSON RPC request from " << get_remote_address(res) << ": method '" << method << "' is invalid");
|
|
return jsonrpc_error_response(res, -32601, "Method not found", id);
|
|
}
|
|
MDEBUG("Incoming JSON RPC request for " << method << " from " << get_remote_address(res));
|
|
|
|
const auto& [restricted, invoke_ptr] = it->second;
|
|
|
|
// If it's a restricted command and we're in restricted mode then deny it
|
|
if (restricted && m_restricted) {
|
|
MWARNING("JSON RPC request for restricted command " << method << " in restricted mode from " << get_remote_address(res));
|
|
return jsonrpc_error_response(res, error_code::DENIED, method + " is not available in restricted mode.");
|
|
}
|
|
|
|
// Try to load "params" into a generic epee value; if it fails (because there is no "params")
|
|
// then clear it and pass a null optionsl.
|
|
auto params = std::make_optional<epee::serialization::storage_entry>();
|
|
if (!ps.get_value("params", *params, nullptr))
|
|
params.reset();
|
|
|
|
std::string result;
|
|
wallet_rpc_error json_error{-32603, "Internal error"};
|
|
|
|
try {
|
|
result = invoke_ptr(ps, std::move(id), std::move(params), *this);
|
|
json_error.code = 0;
|
|
} catch (const parse_error& e) {
|
|
json_error = {-32602, "Invalid params"}; // Reserved json code/message value for specifically this failure
|
|
} catch (const wallet_rpc_error& e) {
|
|
json_error = e;
|
|
} catch (const tools::error::no_connection_to_daemon& e) {
|
|
json_error = {error_code::NO_DAEMON_CONNECTION, e.what()};
|
|
} catch (const tools::error::daemon_busy& e) {
|
|
json_error = {error_code::DAEMON_IS_BUSY, e.what()};
|
|
} catch (const tools::error::zero_destination& e) {
|
|
json_error = {error_code::ZERO_DESTINATION, e.what()};
|
|
} catch (const tools::error::not_enough_money& e) {
|
|
json_error = {error_code::NOT_ENOUGH_MONEY, e.what()};
|
|
} catch (const tools::error::not_enough_unlocked_money& e) {
|
|
json_error = {error_code::NOT_ENOUGH_UNLOCKED_MONEY, e.what()};
|
|
} catch (const tools::error::tx_not_possible& e) {
|
|
json_error = {error_code::TX_NOT_POSSIBLE, (boost::format(tr("Transaction not possible. Available only %s, transaction amount %s = %s + %s (fee)")) %
|
|
cryptonote::print_money(e.available()) %
|
|
cryptonote::print_money(e.tx_amount() + e.fee()) %
|
|
cryptonote::print_money(e.tx_amount()) %
|
|
cryptonote::print_money(e.fee())).str()};
|
|
} catch (const tools::error::not_enough_outs_to_mix& e) {
|
|
json_error = {error_code::NOT_ENOUGH_OUTS_TO_MIX, e.what() + std::string(" Please use sweep_dust.")};
|
|
} catch (const error::file_exists& e) {
|
|
json_error = {error_code::WALLET_ALREADY_EXISTS, "Cannot create wallet. Already exists."};
|
|
} catch (const error::invalid_password& e) {
|
|
json_error = {error_code::INVALID_PASSWORD, "Invalid password."};
|
|
} catch (const error::account_index_outofbound& e) {
|
|
json_error = {error_code::ACCOUNT_INDEX_OUT_OF_BOUNDS, e.what()};
|
|
} catch (const error::address_index_outofbound& e) {
|
|
json_error = {error_code::ADDRESS_INDEX_OUT_OF_BOUNDS, e.what()};
|
|
} catch (const error::signature_check_failed& e) {
|
|
json_error = {error_code::WRONG_SIGNATURE, e.what()};
|
|
} catch (const error::tx_blink_rejected& e) {
|
|
json_error = {error_code::BLINK_FAILED, e.what()};
|
|
} catch (const std::exception& e) {
|
|
json_error = {error_code::UNKNOWN_ERROR, e.what()};
|
|
} catch (...) {
|
|
// leave it as unknown error
|
|
}
|
|
|
|
if (json_error.code != 0)
|
|
return jsonrpc_error_response(res, json_error.code, std::move(json_error.message));
|
|
|
|
res.writeHeader("Server", server_header());
|
|
res.writeHeader("Content-Type", "application/json");
|
|
for (const auto& [name, value] : extra_headers)
|
|
res.writeHeader(name, value);
|
|
if (closing()) res.writeHeader("Connection", "close");
|
|
|
|
res.end(result);
|
|
if (closing()) res.close();
|
|
});
|
|
}
|
|
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
void wallet_rpc_server::run_loop()
|
|
{
|
|
// We start 1-2 threads here:
|
|
// - the uWS thread that handles all requests.
|
|
// - a long poll thread (optional).
|
|
// then this parent thread handles injecting refresh jobs (either on a timer, or because of long
|
|
// polling detecting a change) into the uWS thread loop, and shutting down on a signal.
|
|
std::promise<std::pair<uWS::Loop*, std::vector<us_listen_socket_t*>>> loop_promise;
|
|
auto loop_future = loop_promise.get_future();
|
|
|
|
// Start uWS in a thread, then join it.
|
|
|
|
std::thread uws_thread{[this, &loop_promise] {
|
|
uWS::App http;
|
|
try {
|
|
create_rpc_endpoints(http);
|
|
} catch (...) {
|
|
loop_promise.set_exception(std::current_exception());
|
|
}
|
|
|
|
|
|
bool bad = false;
|
|
int good = 0;
|
|
std::vector<us_listen_socket_t*> listening;
|
|
try {
|
|
for (const auto& [addr, port, required] : m_bind)
|
|
http.listen(addr, port, [&listening, req=required, &good, &bad](us_listen_socket_t* sock) {
|
|
listening.push_back(sock);
|
|
if (sock != nullptr) good++;
|
|
else if (req) bad = true;
|
|
});
|
|
|
|
if (!good || bad) {
|
|
std::ostringstream error;
|
|
error << "RPC HTTP server failed to bind; ";
|
|
if (listening.empty()) error << "no valid bind address(es) given";
|
|
else {
|
|
error << "tried to bind to:";
|
|
for (const auto& [addr, port, required] : m_bind)
|
|
error << ' ' << addr << ':' << port;
|
|
}
|
|
throw std::runtime_error{error.str()};
|
|
}
|
|
} catch (...) {
|
|
loop_promise.set_exception(std::current_exception());
|
|
return;
|
|
}
|
|
loop_promise.set_value(std::make_pair(uWS::Loop::get(), std::move(listening)));
|
|
|
|
http.run();
|
|
}};
|
|
|
|
// Wait for startup:
|
|
auto [loop, sockets] = loop_future.get();
|
|
m_loop = loop;
|
|
m_listen_socks = std::move(sockets);
|
|
|
|
if (m_wallet)
|
|
start_long_poll_thread();
|
|
|
|
// Used to prevent queuing up multiple refreshes at once
|
|
std::atomic<bool> refreshing = false;
|
|
|
|
// Now we just hang around and twiddle our thumbs until we're told to quit. (And once in a
|
|
// while we inject a wallet refresh into the uWS loop).
|
|
while (!m_stop.load(std::memory_order_relaxed))
|
|
{
|
|
bool refresh_now = !refreshing && m_wallet && (
|
|
(m_auto_refresh_period > 0s && std::chrono::steady_clock::now() > m_last_auto_refresh_time + m_auto_refresh_period)
|
|
|| m_long_poll_new_changes);
|
|
|
|
if (refresh_now)
|
|
{
|
|
refreshing = true;
|
|
|
|
// Queue the refresh to run in the uWS thread loop
|
|
loop_defer([this, &refreshing] {
|
|
m_long_poll_new_changes = false; // Always consume the change, if we miss one due to thread race, not the end of the world.
|
|
|
|
try {
|
|
if (m_wallet) m_wallet->refresh(m_wallet->is_trusted_daemon());
|
|
} catch (const std::exception& ex) {
|
|
LOG_ERROR("Exception while refreshing: " << ex.what());
|
|
}
|
|
|
|
m_last_auto_refresh_time = std::chrono::steady_clock::now();
|
|
refreshing = false;
|
|
});
|
|
}
|
|
|
|
std::this_thread::sleep_for(250ms);
|
|
}
|
|
|
|
MGINFO("Stopping wallet rpc server");
|
|
MINFO("Shutting down listening HTTP RPC sockets");
|
|
// Stopped: close the sockets, cancel the long poll, and rejoin the threads
|
|
for (auto* s : m_listen_socks)
|
|
us_listen_socket_close(/*ssl=*/false, s);
|
|
m_closing = true;
|
|
|
|
stop_long_poll_thread();
|
|
|
|
MDEBUG("Joining uws thread");
|
|
uws_thread.join();
|
|
|
|
MGINFO("Storing wallet...");
|
|
if (m_wallet)
|
|
m_wallet->store();
|
|
MGINFO("Wallet stopped.");
|
|
}
|
|
void wallet_rpc_server::start_long_poll_thread()
|
|
{
|
|
assert(m_wallet);
|
|
if (m_long_poll_thread.joinable() || m_long_poll_disabled)
|
|
{
|
|
MDEBUG("Not starting long poll thread: " << (m_long_poll_thread.joinable() ? "already running" : "long polling disabled"));
|
|
return;
|
|
}
|
|
MINFO("Starting long poll thread");
|
|
m_long_poll_thread = std::thread{[this] {
|
|
for (;;)
|
|
{
|
|
if (m_long_poll_disabled) return;
|
|
if (m_auto_refresh_period == 0s)
|
|
{
|
|
std::this_thread::sleep_for(100ms);
|
|
continue;
|
|
}
|
|
|
|
try
|
|
{
|
|
if (m_wallet->long_poll_pool_state())
|
|
m_long_poll_new_changes = true;
|
|
}
|
|
catch (...)
|
|
{
|
|
// NOTE: Don't care about error, non fatal.
|
|
}
|
|
}
|
|
}};
|
|
}
|
|
void wallet_rpc_server::stop_long_poll_thread()
|
|
{
|
|
assert(m_wallet);
|
|
if (!m_long_poll_thread.joinable())
|
|
{
|
|
MDEBUG("Not stopping long poll thread: not running");
|
|
return;
|
|
}
|
|
MINFO("Stopping long poll thread");
|
|
m_wallet->cancel_long_poll();
|
|
m_long_poll_disabled = true;
|
|
m_long_poll_thread.join();
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool wallet_rpc_server::init()
|
|
{
|
|
cryptonote::rpc_args rpc_config;
|
|
try {
|
|
rpc_config = cryptonote::rpc_args::process(m_vm);
|
|
} catch (const std::exception& e) {
|
|
MERROR("Failed to process rpc arguments: " << e.what());
|
|
return false;
|
|
}
|
|
|
|
const uint16_t port = command_line::get_arg(m_vm, arg_rpc_bind_port);
|
|
if (!port)
|
|
{
|
|
MERROR("Invalid port " << port << " specified");
|
|
return false;
|
|
}
|
|
|
|
if (!rpc_config.bind_ip || !rpc_config.bind_ip->empty())
|
|
m_bind.emplace_back(rpc_config.bind_ip.value_or("127.0.0.1"), port, rpc_config.require_ipv4);
|
|
if (rpc_config.use_ipv6 && (!rpc_config.bind_ipv6_address || !rpc_config.bind_ipv6_address->empty()))
|
|
m_bind.emplace_back(rpc_config.bind_ipv6_address.value_or("::1"), port, true);
|
|
|
|
const bool disable_auth = command_line::get_arg(m_vm, arg_disable_rpc_login);
|
|
|
|
m_restricted = command_line::get_arg(m_vm, arg_restricted);
|
|
|
|
m_server_header = "oxen-wallet-rpc/"s + (m_restricted ? std::to_string(OXEN_VERSION[0]) : std::string{OXEN_VERSION_STR});
|
|
|
|
m_cors = {rpc_config.access_control_origins.begin(), rpc_config.access_control_origins.end()};
|
|
|
|
if (!command_line::is_arg_defaulted(m_vm, arg_wallet_dir))
|
|
{
|
|
if (!command_line::is_arg_defaulted(m_vm, wallet_args::arg_wallet_file()))
|
|
{
|
|
MERROR(arg_wallet_dir.name << " and " << wallet_args::arg_wallet_file().name << " are incompatible, use only one of them");
|
|
return false;
|
|
}
|
|
m_wallet_dir = fs::u8path(command_line::get_arg(m_vm, arg_wallet_dir));
|
|
if (!m_wallet_dir.empty())
|
|
{
|
|
std::error_code ec;
|
|
if (fs::create_directories(m_wallet_dir, ec))
|
|
fs::permissions(m_wallet_dir, fs::perms::owner_all, ec);
|
|
else if (ec)
|
|
{
|
|
LOG_ERROR(tr("Failed to create directory ") << m_wallet_dir << ": " << ec.message());
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (disable_auth)
|
|
{
|
|
if (rpc_config.login)
|
|
{
|
|
const cryptonote::rpc_args::descriptors arg{};
|
|
LOG_ERROR(tr("Cannot specify --") << arg_disable_rpc_login.name << tr(" and --") << arg.rpc_login.name);
|
|
return false;
|
|
}
|
|
m_login = std::nullopt;
|
|
}
|
|
else // auth enabled
|
|
{
|
|
if (!rpc_config.login)
|
|
{
|
|
std::array<std::uint8_t, 16> rand_128bit{{}};
|
|
crypto::rand(rand_128bit.size(), rand_128bit.data());
|
|
m_login.emplace(
|
|
default_rpc_username,
|
|
epee::string_encoding::base64_encode(rand_128bit.data(), rand_128bit.size())
|
|
);
|
|
|
|
std::string temp = "oxen-wallet-rpc." + std::to_string(port) + ".login";
|
|
rpc_login_file = tools::private_file::create(temp);
|
|
if (!rpc_login_file.handle())
|
|
{
|
|
LOG_ERROR(tr("Failed to create file ") << temp << tr(". Check permissions or remove file"));
|
|
return false;
|
|
}
|
|
std::fputs(m_login->username.c_str(), rpc_login_file.handle());
|
|
std::fputc(':', rpc_login_file.handle());
|
|
const auto& password = m_login->password.password();
|
|
std::fwrite(password.data(), 1, password.size(), rpc_login_file.handle());
|
|
std::fputc('\n', rpc_login_file.handle());
|
|
std::fflush(rpc_login_file.handle());
|
|
if (std::ferror(rpc_login_file.handle()))
|
|
{
|
|
LOG_ERROR(tr("Error writing to file ") << temp);
|
|
return false;
|
|
}
|
|
LOG_PRINT_L0(tr("RPC username/password is stored in file ") << temp);
|
|
}
|
|
else // chosen user/pass
|
|
{
|
|
m_login = rpc_config.login;
|
|
}
|
|
assert(bool(m_login));
|
|
} // end auth enabled
|
|
|
|
m_auto_refresh_period = DEFAULT_AUTO_REFRESH_PERIOD;
|
|
m_last_auto_refresh_time = std::chrono::steady_clock::time_point::min();
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
void wallet_rpc_server::require_open()
|
|
{
|
|
if (!m_wallet)
|
|
throw wallet_rpc_error{error_code::NOT_OPEN, "No wallet file"};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_BALANCE::response wallet_rpc_server::invoke(GET_BALANCE::request&& req)
|
|
{
|
|
require_open();
|
|
GET_BALANCE::response res{};
|
|
{
|
|
res.balance = req.all_accounts ? m_wallet->balance_all(req.strict) : m_wallet->balance(req.account_index, req.strict);
|
|
res.unlocked_balance = req.all_accounts ? m_wallet->unlocked_balance_all(req.strict, &res.blocks_to_unlock, &res.time_to_unlock) : m_wallet->unlocked_balance(req.account_index, req.strict, &res.blocks_to_unlock, &res.time_to_unlock);
|
|
res.multisig_import_needed = m_wallet->multisig() && m_wallet->has_multisig_partial_key_images();
|
|
std::map<uint32_t, std::map<uint32_t, uint64_t>> balance_per_subaddress_per_account;
|
|
std::map<uint32_t, std::map<uint32_t, std::pair<uint64_t, std::pair<uint64_t, uint64_t>>>> unlocked_balance_per_subaddress_per_account;
|
|
if (req.all_accounts)
|
|
{
|
|
for (uint32_t account_index = 0; account_index < m_wallet->get_num_subaddress_accounts(); ++account_index)
|
|
{
|
|
balance_per_subaddress_per_account[account_index] = m_wallet->balance_per_subaddress(account_index, req.strict);
|
|
unlocked_balance_per_subaddress_per_account[account_index] = m_wallet->unlocked_balance_per_subaddress(account_index, req.strict);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
balance_per_subaddress_per_account[req.account_index] = m_wallet->balance_per_subaddress(req.account_index, req.strict);
|
|
unlocked_balance_per_subaddress_per_account[req.account_index] = m_wallet->unlocked_balance_per_subaddress(req.account_index, req.strict);
|
|
}
|
|
std::vector<wallet::transfer_details> transfers;
|
|
m_wallet->get_transfers(transfers);
|
|
for (const auto& p : balance_per_subaddress_per_account)
|
|
{
|
|
uint32_t account_index = p.first;
|
|
std::map<uint32_t, uint64_t> balance_per_subaddress = p.second;
|
|
std::map<uint32_t, std::pair<uint64_t, std::pair<uint64_t, uint64_t>>> unlocked_balance_per_subaddress = unlocked_balance_per_subaddress_per_account[account_index];
|
|
std::set<uint32_t> address_indices;
|
|
if (!req.all_accounts && !req.address_indices.empty())
|
|
{
|
|
address_indices = req.address_indices;
|
|
}
|
|
else
|
|
{
|
|
for (const auto& i : balance_per_subaddress)
|
|
address_indices.insert(i.first);
|
|
}
|
|
for (uint32_t i : address_indices)
|
|
{
|
|
wallet_rpc::GET_BALANCE::per_subaddress_info info{};
|
|
info.account_index = account_index;
|
|
info.address_index = i;
|
|
cryptonote::subaddress_index index = {info.account_index, info.address_index};
|
|
info.address = m_wallet->get_subaddress_as_str(index);
|
|
info.balance = balance_per_subaddress[i];
|
|
info.unlocked_balance = unlocked_balance_per_subaddress[i].first;
|
|
info.blocks_to_unlock = unlocked_balance_per_subaddress[i].second.first;
|
|
info.time_to_unlock = unlocked_balance_per_subaddress[i].second.second;
|
|
info.label = m_wallet->get_subaddress_label(index);
|
|
info.num_unspent_outputs = std::count_if(transfers.begin(), transfers.end(), [&](const wallet::transfer_details& td) { return !td.m_spent && td.m_subaddr_index == index; });
|
|
res.per_subaddress.emplace_back(std::move(info));
|
|
}
|
|
}
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_ADDRESS::response wallet_rpc_server::invoke(GET_ADDRESS::request&& req)
|
|
{
|
|
require_open();
|
|
GET_ADDRESS::response res{};
|
|
{
|
|
THROW_WALLET_EXCEPTION_IF(req.account_index >= m_wallet->get_num_subaddress_accounts(), error::account_index_outofbound);
|
|
res.addresses.clear();
|
|
std::vector<uint32_t> req_address_index;
|
|
if (req.address_index.empty())
|
|
{
|
|
for (uint32_t i = 0; i < m_wallet->get_num_subaddresses(req.account_index); ++i)
|
|
req_address_index.push_back(i);
|
|
}
|
|
else
|
|
{
|
|
req_address_index = req.address_index;
|
|
}
|
|
tools::wallet2::transfer_container transfers;
|
|
m_wallet->get_transfers(transfers);
|
|
for (uint32_t i : req_address_index)
|
|
{
|
|
THROW_WALLET_EXCEPTION_IF(i >= m_wallet->get_num_subaddresses(req.account_index), error::address_index_outofbound);
|
|
res.addresses.resize(res.addresses.size() + 1);
|
|
auto& info = res.addresses.back();
|
|
const cryptonote::subaddress_index index = {req.account_index, i};
|
|
info.address = m_wallet->get_subaddress_as_str(index);
|
|
info.label = m_wallet->get_subaddress_label(index);
|
|
info.address_index = index.minor;
|
|
info.used = std::find_if(transfers.begin(), transfers.end(), [&](const wallet::transfer_details& td) { return td.m_subaddr_index == index; }) != transfers.end();
|
|
}
|
|
res.address = m_wallet->get_subaddress_as_str({req.account_index, 0});
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_ADDRESS_INDEX::response wallet_rpc_server::invoke(GET_ADDRESS_INDEX::request&& req)
|
|
{
|
|
require_open();
|
|
GET_ADDRESS_INDEX::response res{};
|
|
cryptonote::address_parse_info info;
|
|
if(!get_account_address_from_str(info, m_wallet->nettype(), req.address))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address"};
|
|
auto index = m_wallet->get_subaddress_index(info.address);
|
|
if (!index)
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Address doesn't belong to the wallet"};
|
|
res.index = *index;
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CREATE_ADDRESS::response wallet_rpc_server::invoke(CREATE_ADDRESS::request&& req)
|
|
{
|
|
require_open();
|
|
CREATE_ADDRESS::response res{};
|
|
{
|
|
if (req.count < 1 || req.count > 64)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Count must be between 1 and 64."};
|
|
|
|
std::vector<std::string> addresses;
|
|
std::vector<uint32_t> address_indices;
|
|
|
|
addresses.reserve(req.count);
|
|
address_indices.reserve(req.count);
|
|
|
|
for (uint32_t i = 0; i < req.count; i++) {
|
|
m_wallet->add_subaddress(req.account_index, req.label);
|
|
uint32_t new_address_index = m_wallet->get_num_subaddresses(req.account_index) - 1;
|
|
address_indices.push_back(new_address_index);
|
|
addresses.push_back(m_wallet->get_subaddress_as_str({req.account_index, new_address_index}));
|
|
}
|
|
|
|
res.address = addresses[0];
|
|
res.address_index = address_indices[0];
|
|
res.addresses = addresses;
|
|
res.address_indices = address_indices;
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
LABEL_ADDRESS::response wallet_rpc_server::invoke(LABEL_ADDRESS::request&& req)
|
|
{
|
|
require_open();
|
|
LABEL_ADDRESS::response res{};
|
|
{
|
|
m_wallet->set_subaddress_label(req.index, req.label);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_ACCOUNTS::response wallet_rpc_server::invoke(GET_ACCOUNTS::request&& req)
|
|
{
|
|
require_open();
|
|
GET_ACCOUNTS::response res{};
|
|
{
|
|
res.total_balance = 0;
|
|
res.total_unlocked_balance = 0;
|
|
const std::pair<std::map<std::string, std::string>, std::vector<std::string>> account_tags = m_wallet->get_account_tags();
|
|
if (!req.tag.empty() && account_tags.first.count(req.tag) == 0)
|
|
throw wallet_rpc_error{
|
|
error_code::UNKNOWN_ERROR,
|
|
(boost::format(tr("Tag %s is unregistered.")) % req.tag).str()};
|
|
for (cryptonote::subaddress_index subaddr_index = {0,0};
|
|
subaddr_index.major < m_wallet->get_num_subaddress_accounts();
|
|
++subaddr_index.major)
|
|
{
|
|
if (!req.tag.empty() && req.tag != account_tags.second[subaddr_index.major])
|
|
continue;
|
|
wallet_rpc::GET_ACCOUNTS::subaddress_account_info info;
|
|
info.account_index = subaddr_index.major;
|
|
info.base_address = m_wallet->get_subaddress_as_str(subaddr_index);
|
|
info.balance = m_wallet->balance(subaddr_index.major, req.strict_balances);
|
|
info.unlocked_balance = m_wallet->unlocked_balance(subaddr_index.major, req.strict_balances);
|
|
info.label = m_wallet->get_subaddress_label(subaddr_index);
|
|
info.tag = account_tags.second[subaddr_index.major];
|
|
res.subaddress_accounts.push_back(info);
|
|
res.total_balance += info.balance;
|
|
res.total_unlocked_balance += info.unlocked_balance;
|
|
}
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CREATE_ACCOUNT::response wallet_rpc_server::invoke(CREATE_ACCOUNT::request&& req)
|
|
{
|
|
require_open();
|
|
CREATE_ACCOUNT::response res{};
|
|
{
|
|
m_wallet->add_subaddress_account(req.label);
|
|
res.account_index = m_wallet->get_num_subaddress_accounts() - 1;
|
|
res.address = m_wallet->get_subaddress_as_str({res.account_index, 0});
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
LABEL_ACCOUNT::response wallet_rpc_server::invoke(LABEL_ACCOUNT::request&& req)
|
|
{
|
|
require_open();
|
|
LABEL_ACCOUNT::response res{};
|
|
{
|
|
m_wallet->set_subaddress_label({req.account_index, 0}, req.label);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_ACCOUNT_TAGS::response wallet_rpc_server::invoke(GET_ACCOUNT_TAGS::request&& req)
|
|
{
|
|
require_open();
|
|
GET_ACCOUNT_TAGS::response res{};
|
|
const std::pair<std::map<std::string, std::string>, std::vector<std::string>> account_tags = m_wallet->get_account_tags();
|
|
for (const auto& p : account_tags.first)
|
|
{
|
|
res.account_tags.resize(res.account_tags.size() + 1);
|
|
auto& info = res.account_tags.back();
|
|
info.tag = p.first;
|
|
info.label = p.second;
|
|
for (size_t i = 0; i < account_tags.second.size(); ++i)
|
|
{
|
|
if (account_tags.second[i] == info.tag)
|
|
info.accounts.push_back(i);
|
|
}
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
TAG_ACCOUNTS::response wallet_rpc_server::invoke(TAG_ACCOUNTS::request&& req)
|
|
{
|
|
require_open();
|
|
TAG_ACCOUNTS::response res{};
|
|
{
|
|
m_wallet->set_account_tag(req.accounts, req.tag);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
UNTAG_ACCOUNTS::response wallet_rpc_server::invoke(UNTAG_ACCOUNTS::request&& req)
|
|
{
|
|
require_open();
|
|
UNTAG_ACCOUNTS::response res{};
|
|
{
|
|
m_wallet->set_account_tag(req.accounts, "");
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SET_ACCOUNT_TAG_DESCRIPTION::response wallet_rpc_server::invoke(SET_ACCOUNT_TAG_DESCRIPTION::request&& req)
|
|
{
|
|
require_open();
|
|
SET_ACCOUNT_TAG_DESCRIPTION::response res{};
|
|
{
|
|
m_wallet->set_account_tag_description(req.tag, req.description);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_HEIGHT::response wallet_rpc_server::invoke(GET_HEIGHT::request&& req)
|
|
{
|
|
require_open();
|
|
GET_HEIGHT::response res{};
|
|
{
|
|
res.height = m_wallet->get_blockchain_current_height();
|
|
res.immutable_height = m_wallet->get_immutable_height();
|
|
}
|
|
return res;
|
|
}
|
|
|
|
static cryptonote::address_parse_info extract_account_addr(
|
|
cryptonote::network_type nettype,
|
|
std::string_view addr_or_url)
|
|
{
|
|
cryptonote::address_parse_info info;
|
|
if (!get_account_address_from_str_or_url(info, nettype, addr_or_url,
|
|
[](const std::string_view url, const std::vector<std::string> &addresses, bool dnssec_valid) {
|
|
if (!dnssec_valid)
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid DNSSEC for "s + std::string{url}};
|
|
if (addresses.empty())
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "No Oxen address found at "s + std::string{url}};
|
|
return addresses[0];
|
|
}))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address: "s + std::string{addr_or_url}};
|
|
return info;
|
|
}
|
|
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
void wallet_rpc_server::validate_transfer(const std::list<wallet::transfer_destination>& destinations, const std::string& payment_id, std::vector<cryptonote::tx_destination_entry>& dsts, std::vector<uint8_t>& extra, bool at_least_one_destination)
|
|
{
|
|
crypto::hash8 integrated_payment_id = crypto::null_hash8;
|
|
std::string extra_nonce;
|
|
for (auto it = destinations.begin(); it != destinations.end(); it++)
|
|
{
|
|
cryptonote::address_parse_info info = extract_account_addr(m_wallet->nettype(), it->address);
|
|
|
|
cryptonote::tx_destination_entry de;
|
|
de.original = it->address;
|
|
de.addr = info.address;
|
|
de.is_subaddress = info.is_subaddress;
|
|
de.amount = it->amount;
|
|
de.is_integrated = info.has_payment_id;
|
|
dsts.push_back(de);
|
|
|
|
if (info.has_payment_id)
|
|
{
|
|
if (!payment_id.empty() || integrated_payment_id != crypto::null_hash8)
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "A single payment id is allowed per transaction"};
|
|
integrated_payment_id = info.payment_id;
|
|
cryptonote::set_encrypted_payment_id_to_tx_extra_nonce(extra_nonce, integrated_payment_id);
|
|
|
|
/* Append Payment ID data into extra */
|
|
if (!cryptonote::add_extra_nonce_to_tx_extra(extra, extra_nonce))
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Something went wrong with integrated payment_id."};
|
|
}
|
|
}
|
|
|
|
if (at_least_one_destination && dsts.empty())
|
|
throw wallet_rpc_error{error_code::ZERO_DESTINATION, "No destinations for this transfer"};
|
|
|
|
if (!payment_id.empty())
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Standalone payment IDs are obsolete. Use subaddresses or integrated addresses instead"};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
static std::string ptx_to_string(const wallet::pending_tx &ptx)
|
|
{
|
|
std::ostringstream oss;
|
|
boost::archive::portable_binary_oarchive ar(oss);
|
|
try
|
|
{
|
|
ar << ptx;
|
|
}
|
|
catch (...)
|
|
{
|
|
return "";
|
|
}
|
|
return lokimq::to_hex(oss.str());
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
template<typename T> static bool is_error_value(const T &val) { return false; }
|
|
static bool is_error_value(const std::string &s) { return s.empty(); }
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
template<typename T, typename V>
|
|
static bool fill(T &where, V s)
|
|
{
|
|
if (is_error_value(s)) return false;
|
|
where = std::move(s);
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
template<typename T, typename V>
|
|
static bool fill(std::list<T> &where, V s)
|
|
{
|
|
if (is_error_value(s)) return false;
|
|
where.emplace_back(std::move(s));
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
static uint64_t total_amount(const wallet::pending_tx &ptx)
|
|
{
|
|
uint64_t amount = 0;
|
|
for (const auto &dest: ptx.dests) amount += dest.amount;
|
|
return amount;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
template<typename Ts, typename Tu>
|
|
void wallet_rpc_server::fill_response(std::vector<wallet::pending_tx> &ptx_vector,
|
|
bool get_tx_key, Ts& tx_key, Tu &amount, Tu &fee, std::string &multisig_txset, std::string &unsigned_txset, bool do_not_relay, bool blink,
|
|
Ts &tx_hash, bool get_tx_hex, Ts &tx_blob, bool get_tx_metadata, Ts &tx_metadata)
|
|
{
|
|
for (const auto & ptx : ptx_vector)
|
|
{
|
|
if (get_tx_key)
|
|
{
|
|
epee::wipeable_string s = epee::to_hex::wipeable_string(ptx.tx_key);
|
|
for (const crypto::secret_key& additional_tx_key : ptx.additional_tx_keys)
|
|
s += epee::to_hex::wipeable_string(additional_tx_key);
|
|
fill(tx_key, std::string(s.data(), s.size()));
|
|
}
|
|
// Compute amount leaving wallet in tx. By convention dests does not include change outputs
|
|
fill(amount, total_amount(ptx));
|
|
fill(fee, ptx.fee);
|
|
}
|
|
|
|
if (m_wallet->multisig())
|
|
{
|
|
multisig_txset = lokimq::to_hex(m_wallet->save_multisig_tx(ptx_vector));
|
|
if (multisig_txset.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to save multisig tx set after creation"};
|
|
}
|
|
else
|
|
{
|
|
if (m_wallet->watch_only()){
|
|
unsigned_txset = lokimq::to_hex(m_wallet->dump_tx_to_str(ptx_vector));
|
|
if (unsigned_txset.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to save unsigned tx set after creation"};
|
|
}
|
|
else if (!do_not_relay)
|
|
m_wallet->commit_tx(ptx_vector, blink);
|
|
|
|
// populate response with tx hashes
|
|
for (auto & ptx : ptx_vector)
|
|
{
|
|
bool r = fill(tx_hash, tools::type_to_hex(cryptonote::get_transaction_hash(ptx.tx)));
|
|
r = r && (!get_tx_hex || fill(tx_blob, lokimq::to_hex(tx_to_blob(ptx.tx))));
|
|
r = r && (!get_tx_metadata || fill(tx_metadata, ptx_to_string(ptx)));
|
|
if (!r)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to save tx info"};
|
|
}
|
|
}
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
TRANSFER::response wallet_rpc_server::invoke(TRANSFER::request&& req)
|
|
{
|
|
require_open();
|
|
TRANSFER::response res{};
|
|
|
|
std::vector<cryptonote::tx_destination_entry> dsts;
|
|
std::vector<uint8_t> extra;
|
|
|
|
LOG_PRINT_L3("on_transfer starts");
|
|
require_open();
|
|
|
|
// validate the transfer requested and populate dsts & extra
|
|
validate_transfer(req.destinations, req.payment_id, dsts, extra, true);
|
|
|
|
{
|
|
uint32_t priority = convert_priority(req.priority);
|
|
std::optional<uint8_t> hf_version = m_wallet->get_hard_fork_version();
|
|
if (!hf_version)
|
|
throw wallet_rpc_error{error_code::HF_QUERY_FAILED, tools::ERR_MSG_NETWORK_VERSION_QUERY_FAILED};
|
|
cryptonote::oxen_construct_tx_params tx_params = tools::wallet2::construct_params(*hf_version, cryptonote::txtype::standard, priority);
|
|
std::vector<wallet2::pending_tx> ptx_vector = m_wallet->create_transactions_2(dsts, CRYPTONOTE_DEFAULT_TX_MIXIN, req.unlock_time, priority, extra, req.account_index, req.subaddr_indices, tx_params);
|
|
|
|
if (ptx_vector.empty())
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "No transaction created"};
|
|
|
|
// reject proposed transactions if there are more than one. see on_transfer_split below.
|
|
if (ptx_vector.size() != 1)
|
|
throw wallet_rpc_error{error_code::TX_TOO_LARGE, "Transaction would be too large. try /transfer_split."};
|
|
|
|
fill_response(ptx_vector, req.get_tx_key, res.tx_key, res.amount, res.fee, res.multisig_txset, res.unsigned_txset, req.do_not_relay, priority == tx_priority_blink,
|
|
res.tx_hash, req.get_tx_hex, res.tx_blob, req.get_tx_metadata, res.tx_metadata);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
TRANSFER_SPLIT::response wallet_rpc_server::invoke(TRANSFER_SPLIT::request&& req)
|
|
{
|
|
require_open();
|
|
TRANSFER_SPLIT::response res{};
|
|
|
|
std::vector<cryptonote::tx_destination_entry> dsts;
|
|
std::vector<uint8_t> extra;
|
|
|
|
require_open();
|
|
|
|
// validate the transfer requested and populate dsts & extra; RPC_TRANSFER::request and RPC_TRANSFER_SPLIT::request are identical types.
|
|
validate_transfer(req.destinations, req.payment_id, dsts, extra, true);
|
|
|
|
{
|
|
uint32_t priority = convert_priority(req.priority);
|
|
std::optional<uint8_t> hf_version = m_wallet->get_hard_fork_version();
|
|
if (!hf_version)
|
|
throw wallet_rpc_error{error_code::HF_QUERY_FAILED, tools::ERR_MSG_NETWORK_VERSION_QUERY_FAILED};
|
|
|
|
cryptonote::oxen_construct_tx_params tx_params = tools::wallet2::construct_params(*hf_version, cryptonote::txtype::standard, priority);
|
|
LOG_PRINT_L2("on_transfer_split calling create_transactions_2");
|
|
std::vector<wallet2::pending_tx> ptx_vector = m_wallet->create_transactions_2(dsts, CRYPTONOTE_DEFAULT_TX_MIXIN, req.unlock_time, priority, extra, req.account_index, req.subaddr_indices, tx_params);
|
|
LOG_PRINT_L2("on_transfer_split called create_transactions_2");
|
|
|
|
if (ptx_vector.empty())
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "No transaction created"};
|
|
|
|
fill_response(ptx_vector, req.get_tx_keys, res.tx_key_list, res.amount_list, res.fee_list, res.multisig_txset, res.unsigned_txset, req.do_not_relay, priority == tx_priority_blink,
|
|
res.tx_hash_list, req.get_tx_hex, res.tx_blob_list, req.get_tx_metadata, res.tx_metadata_list);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SIGN_TRANSFER::response wallet_rpc_server::invoke(SIGN_TRANSFER::request&& req)
|
|
{
|
|
require_open();
|
|
SIGN_TRANSFER::response res{};
|
|
if (m_wallet->key_on_device())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "command not supported by HW wallet"};
|
|
if(m_wallet->watch_only())
|
|
throw wallet_rpc_error{error_code::WATCH_ONLY, "command not supported by watch-only wallet"};
|
|
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.unsigned_txset, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
|
|
wallet::unsigned_tx_set exported_txs;
|
|
if(!m_wallet->parse_unsigned_tx_from_str(blob, exported_txs))
|
|
throw wallet_rpc_error{error_code::BAD_UNSIGNED_TX_DATA, "cannot load unsigned_txset"};
|
|
|
|
std::vector<wallet::pending_tx> ptxs;
|
|
{
|
|
wallet::signed_tx_set signed_txs;
|
|
std::string ciphertext = m_wallet->sign_tx_dump_to_str(exported_txs, ptxs, signed_txs);
|
|
if (ciphertext.empty())
|
|
throw wallet_rpc_error{error_code::SIGN_UNSIGNED, "Failed to sign unsigned tx"};
|
|
|
|
res.signed_txset = lokimq::to_hex(ciphertext);
|
|
}
|
|
|
|
for (auto &ptx: ptxs)
|
|
{
|
|
res.tx_hash_list.push_back(tools::type_to_hex(cryptonote::get_transaction_hash(ptx.tx)));
|
|
if (req.get_tx_keys)
|
|
{
|
|
res.tx_key_list.push_back(tools::type_to_hex(ptx.tx_key));
|
|
for (const crypto::secret_key& additional_tx_key : ptx.additional_tx_keys)
|
|
res.tx_key_list.back() += tools::type_to_hex(additional_tx_key);
|
|
}
|
|
}
|
|
|
|
if (req.export_raw)
|
|
{
|
|
for (auto &ptx: ptxs)
|
|
{
|
|
res.tx_raw_list.push_back(lokimq::to_hex(cryptonote::tx_to_blob(ptx.tx)));
|
|
}
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
DESCRIBE_TRANSFER::response wallet_rpc_server::invoke(DESCRIBE_TRANSFER::request&& req)
|
|
{
|
|
require_open();
|
|
DESCRIBE_TRANSFER::response res{};
|
|
if (m_wallet->key_on_device())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "command not supported by HW wallet"};
|
|
if(m_wallet->watch_only())
|
|
throw wallet_rpc_error{error_code::WATCH_ONLY, "command not supported by watch-only wallet"};
|
|
if(req.unsigned_txset.empty() && req.multisig_txset.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "no txset provided"};
|
|
|
|
std::vector <wallet::tx_construction_data> tx_constructions;
|
|
if (!req.unsigned_txset.empty()) {
|
|
try {
|
|
wallet::unsigned_tx_set exported_txs;
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.unsigned_txset, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
if (!m_wallet->parse_unsigned_tx_from_str(blob, exported_txs))
|
|
throw wallet_rpc_error{error_code::BAD_UNSIGNED_TX_DATA, "cannot load unsigned_txset"};
|
|
tx_constructions = exported_txs.txes;
|
|
}
|
|
catch (const std::exception &e) {
|
|
throw wallet_rpc_error{error_code::BAD_UNSIGNED_TX_DATA, "failed to parse unsigned transfers: " + std::string(e.what())};
|
|
}
|
|
} else if (!req.multisig_txset.empty()) {
|
|
try {
|
|
wallet::multisig_tx_set exported_txs;
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.multisig_txset, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
if (!m_wallet->parse_multisig_tx_from_str(blob, exported_txs))
|
|
throw wallet_rpc_error{error_code::BAD_MULTISIG_TX_DATA, "cannot load multisig_txset"};
|
|
|
|
for (size_t n = 0; n < exported_txs.m_ptx.size(); ++n) {
|
|
tx_constructions.push_back(exported_txs.m_ptx[n].construction_data);
|
|
}
|
|
}
|
|
catch (const std::exception &e) {
|
|
throw wallet_rpc_error{error_code::BAD_MULTISIG_TX_DATA, "failed to parse multisig transfers: " + std::string(e.what())};
|
|
}
|
|
}
|
|
|
|
try
|
|
{
|
|
// gather info to ask the user
|
|
std::unordered_map<cryptonote::account_public_address, std::pair<std::string, uint64_t>> dests;
|
|
int first_known_non_zero_change_index = -1;
|
|
for (size_t n = 0; n < tx_constructions.size(); ++n)
|
|
{
|
|
const auto &cd = tx_constructions[n];
|
|
res.desc.push_back({0, 0, std::numeric_limits<uint32_t>::max(), 0, {}, "", 0, "", 0, 0, ""});
|
|
wallet_rpc::DESCRIBE_TRANSFER::transfer_description &desc = res.desc.back();
|
|
|
|
std::vector<cryptonote::tx_extra_field> tx_extra_fields;
|
|
bool has_encrypted_payment_id = false;
|
|
crypto::hash8 payment_id8 = crypto::null_hash8;
|
|
if (cryptonote::parse_tx_extra(cd.extra, tx_extra_fields))
|
|
{
|
|
cryptonote::tx_extra_nonce extra_nonce;
|
|
if (find_tx_extra_field_by_type(tx_extra_fields, extra_nonce))
|
|
{
|
|
crypto::hash payment_id;
|
|
if(cryptonote::get_encrypted_payment_id_from_tx_extra_nonce(extra_nonce.nonce, payment_id8))
|
|
{
|
|
if (payment_id8 != crypto::null_hash8)
|
|
{
|
|
desc.payment_id = tools::type_to_hex(payment_id8);
|
|
has_encrypted_payment_id = true;
|
|
}
|
|
}
|
|
else if (cryptonote::get_payment_id_from_tx_extra_nonce(extra_nonce.nonce, payment_id))
|
|
{
|
|
desc.payment_id = tools::type_to_hex(payment_id);
|
|
}
|
|
}
|
|
}
|
|
|
|
for (size_t s = 0; s < cd.sources.size(); ++s)
|
|
{
|
|
desc.amount_in += cd.sources[s].amount;
|
|
size_t ring_size = cd.sources[s].outputs.size();
|
|
if (ring_size < desc.ring_size)
|
|
desc.ring_size = ring_size;
|
|
}
|
|
for (size_t d = 0; d < cd.splitted_dsts.size(); ++d)
|
|
{
|
|
const cryptonote::tx_destination_entry &entry = cd.splitted_dsts[d];
|
|
std::string address = cryptonote::get_account_address_as_str(m_wallet->nettype(), entry.is_subaddress, entry.addr);
|
|
if (has_encrypted_payment_id && !entry.is_subaddress && address != entry.original)
|
|
address = cryptonote::get_account_integrated_address_as_str(m_wallet->nettype(), entry.addr, payment_id8);
|
|
auto i = dests.find(entry.addr);
|
|
if (i == dests.end())
|
|
dests.insert(std::make_pair(entry.addr, std::make_pair(address, entry.amount)));
|
|
else
|
|
i->second.second += entry.amount;
|
|
desc.amount_out += entry.amount;
|
|
}
|
|
if (cd.change_dts.amount > 0)
|
|
{
|
|
auto it = dests.find(cd.change_dts.addr);
|
|
if (it == dests.end())
|
|
throw wallet_rpc_error{error_code::BAD_UNSIGNED_TX_DATA, "Claimed change does not go to a paid address"};
|
|
if (it->second.second < cd.change_dts.amount)
|
|
throw wallet_rpc_error{error_code::BAD_UNSIGNED_TX_DATA, "Claimed change is larger than payment to the change address"};
|
|
if (cd.change_dts.amount > 0)
|
|
{
|
|
if (first_known_non_zero_change_index == -1)
|
|
first_known_non_zero_change_index = n;
|
|
const auto &cdn = tx_constructions[first_known_non_zero_change_index];
|
|
if (memcmp(&cd.change_dts.addr, &cdn.change_dts.addr, sizeof(cd.change_dts.addr)))
|
|
throw wallet_rpc_error{error_code::BAD_UNSIGNED_TX_DATA, "Change goes to more than one address"};
|
|
}
|
|
desc.change_amount += cd.change_dts.amount;
|
|
it->second.second -= cd.change_dts.amount;
|
|
if (it->second.second == 0)
|
|
dests.erase(cd.change_dts.addr);
|
|
}
|
|
|
|
size_t n_dummy_outputs = 0;
|
|
for (auto i = dests.begin(); i != dests.end(); )
|
|
{
|
|
if (i->second.second > 0)
|
|
{
|
|
desc.recipients.push_back({i->second.first, i->second.second});
|
|
}
|
|
else
|
|
++desc.dummy_outputs;
|
|
++i;
|
|
}
|
|
|
|
if (desc.change_amount > 0)
|
|
{
|
|
const auto &cd0 = tx_constructions[0];
|
|
desc.change_address = get_account_address_as_str(m_wallet->nettype(), cd0.subaddr_account > 0, cd0.change_dts.addr);
|
|
}
|
|
|
|
desc.fee = desc.amount_in - desc.amount_out;
|
|
desc.unlock_time = cd.unlock_time;
|
|
desc.extra = epee::to_hex::string({cd.extra.data(), cd.extra.size()});
|
|
}
|
|
}
|
|
catch (const wallet_rpc_error& e)
|
|
{
|
|
throw;
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
throw wallet_rpc_error{error_code::BAD_UNSIGNED_TX_DATA, "failed to parse unsigned transfers"};
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SUBMIT_TRANSFER::response wallet_rpc_server::invoke(SUBMIT_TRANSFER::request&& req)
|
|
{
|
|
require_open();
|
|
SUBMIT_TRANSFER::response res{};
|
|
if (m_wallet->key_on_device())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "command not supported by HW wallet"};
|
|
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.tx_data_hex, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
|
|
std::vector<wallet::pending_tx> ptx_vector;
|
|
if (!m_wallet->parse_tx_from_str(blob, ptx_vector, nullptr))
|
|
throw wallet_rpc_error{error_code::BAD_SIGNED_TX_DATA, "Failed to parse signed tx data."};
|
|
|
|
try
|
|
{
|
|
for (auto &ptx: ptx_vector)
|
|
{
|
|
m_wallet->commit_tx(ptx);
|
|
res.tx_hash_list.push_back(tools::type_to_hex(cryptonote::get_transaction_hash(ptx.tx)));
|
|
}
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
throw wallet_rpc_error{error_code::SIGNED_SUBMISSION, "Failed to submit signed tx: "s + e.what()};
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SWEEP_DUST::response wallet_rpc_server::invoke(SWEEP_DUST::request&& req)
|
|
{
|
|
require_open();
|
|
SWEEP_DUST::response res{};
|
|
|
|
std::vector<wallet2::pending_tx> ptx_vector = m_wallet->create_unmixable_sweep_transactions();
|
|
|
|
fill_response(ptx_vector, req.get_tx_keys, res.tx_key_list, res.amount_list, res.fee_list, res.multisig_txset, res.unsigned_txset, req.do_not_relay, false /*blink*/,
|
|
res.tx_hash_list, req.get_tx_hex, res.tx_blob_list, req.get_tx_metadata, res.tx_metadata_list);
|
|
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SWEEP_ALL::response wallet_rpc_server::invoke(SWEEP_ALL::request&& req)
|
|
{
|
|
std::vector<cryptonote::tx_destination_entry> dsts;
|
|
std::vector<uint8_t> extra;
|
|
|
|
require_open();
|
|
SWEEP_ALL::response res{};
|
|
|
|
// validate the transfer requested and populate dsts & extra
|
|
std::list<wallet::transfer_destination> destination;
|
|
destination.emplace_back();
|
|
destination.back().amount = 0;
|
|
destination.back().address = req.address;
|
|
validate_transfer(destination, req.payment_id, dsts, extra, true);
|
|
|
|
if (req.outputs < 1)
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Amount of outputs should be greater than 0."};
|
|
|
|
std::set<uint32_t> subaddr_indices;
|
|
if (req.subaddr_indices_all)
|
|
{
|
|
for (uint32_t i = 0; i < m_wallet->get_num_subaddresses(req.account_index); ++i)
|
|
subaddr_indices.insert(i);
|
|
}
|
|
else
|
|
{
|
|
subaddr_indices = std::move(req.subaddr_indices);
|
|
}
|
|
|
|
{
|
|
uint32_t priority = convert_priority(req.priority);
|
|
std::vector<wallet2::pending_tx> ptx_vector = m_wallet->create_transactions_all(req.below_amount, dsts[0].addr, dsts[0].is_subaddress, req.outputs, CRYPTONOTE_DEFAULT_TX_MIXIN, req.unlock_time, priority, extra, req.account_index, subaddr_indices);
|
|
|
|
fill_response(ptx_vector, req.get_tx_keys, res.tx_key_list, res.amount_list, res.fee_list, res.multisig_txset, res.unsigned_txset, req.do_not_relay, priority == tx_priority_blink,
|
|
res.tx_hash_list, req.get_tx_hex, res.tx_blob_list, req.get_tx_metadata, res.tx_metadata_list);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SWEEP_SINGLE::response wallet_rpc_server::invoke(SWEEP_SINGLE::request&& req)
|
|
{
|
|
std::vector<cryptonote::tx_destination_entry> dsts;
|
|
std::vector<uint8_t> extra;
|
|
|
|
require_open();
|
|
SWEEP_SINGLE::response res{};
|
|
|
|
if (req.outputs < 1)
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Amount of outputs should be greater than 0."};
|
|
|
|
// validate the transfer requested and populate dsts & extra
|
|
std::list<wallet::transfer_destination> destination;
|
|
destination.emplace_back();
|
|
destination.back().amount = 0;
|
|
destination.back().address = req.address;
|
|
validate_transfer(destination, req.payment_id, dsts, extra, true);
|
|
|
|
crypto::key_image ki;
|
|
if (!tools::hex_to_type(req.key_image, ki))
|
|
throw wallet_rpc_error{error_code::WRONG_KEY_IMAGE, "failed to parse key image"};
|
|
|
|
{
|
|
uint32_t priority = convert_priority(req.priority);
|
|
std::vector<wallet2::pending_tx> ptx_vector = m_wallet->create_transactions_single(ki, dsts[0].addr, dsts[0].is_subaddress, req.outputs, CRYPTONOTE_DEFAULT_TX_MIXIN, req.unlock_time, priority, extra);
|
|
|
|
if (ptx_vector.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "No outputs found"};
|
|
if (ptx_vector.size() > 1)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Multiple transactions are created, which is not supposed to happen"};
|
|
const wallet2::pending_tx &ptx = ptx_vector[0];
|
|
if (ptx.selected_transfers.size() > 1)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "The transaction uses multiple inputs, which is not supposed to happen"};
|
|
|
|
fill_response(ptx_vector, req.get_tx_key, res.tx_key, res.amount, res.fee, res.multisig_txset, res.unsigned_txset, req.do_not_relay, priority == tx_priority_blink,
|
|
res.tx_hash, req.get_tx_hex, res.tx_blob, req.get_tx_metadata, res.tx_metadata);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
RELAY_TX::response wallet_rpc_server::invoke(RELAY_TX::request&& req)
|
|
{
|
|
require_open();
|
|
RELAY_TX::response res{};
|
|
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.hex, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
|
|
wallet::pending_tx ptx;
|
|
try
|
|
{
|
|
std::istringstream iss(blob);
|
|
boost::archive::portable_binary_iarchive ar(iss);
|
|
ar >> ptx;
|
|
}
|
|
catch (...)
|
|
{
|
|
throw wallet_rpc_error{error_code::BAD_TX_METADATA, "Failed to parse tx metadata."};
|
|
}
|
|
|
|
try
|
|
{
|
|
m_wallet->commit_tx(ptx, req.blink);
|
|
}
|
|
catch(const std::exception &e)
|
|
{
|
|
throw wallet_rpc_error{error_code::GENERIC_TRANSFER_ERROR, "Failed to commit tx."};
|
|
}
|
|
|
|
res.tx_hash = tools::type_to_hex(cryptonote::get_transaction_hash(ptx.tx));
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
MAKE_INTEGRATED_ADDRESS::response wallet_rpc_server::invoke(MAKE_INTEGRATED_ADDRESS::request&& req)
|
|
{
|
|
require_open();
|
|
MAKE_INTEGRATED_ADDRESS::response res{};
|
|
{
|
|
crypto::hash8 payment_id;
|
|
if (req.payment_id.empty())
|
|
{
|
|
payment_id = crypto::rand<crypto::hash8>();
|
|
}
|
|
else
|
|
{
|
|
if (!tools::hex_to_type(req.payment_id,payment_id))
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Invalid payment ID"};
|
|
}
|
|
|
|
if (req.standard_address.empty())
|
|
{
|
|
res.integrated_address = m_wallet->get_integrated_address_as_str(payment_id);
|
|
}
|
|
else
|
|
{
|
|
cryptonote::address_parse_info info;
|
|
if(!get_account_address_from_str(info, m_wallet->nettype(), req.standard_address))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address"};
|
|
if (info.is_subaddress)
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Subaddress shouldn't be used"};
|
|
if (info.has_payment_id)
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Already integrated address"};
|
|
if (req.payment_id.empty())
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Payment ID shouldn't be left unspecified"};
|
|
res.integrated_address = get_account_integrated_address_as_str(m_wallet->nettype(), info.address, payment_id);
|
|
}
|
|
res.payment_id = tools::type_to_hex(payment_id);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SPLIT_INTEGRATED_ADDRESS::response wallet_rpc_server::invoke(SPLIT_INTEGRATED_ADDRESS::request&& req)
|
|
{
|
|
require_open();
|
|
SPLIT_INTEGRATED_ADDRESS::response res{};
|
|
{
|
|
cryptonote::address_parse_info info;
|
|
|
|
if(!get_account_address_from_str(info, m_wallet->nettype(), req.integrated_address))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address"};
|
|
if(!info.has_payment_id)
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Address is not an integrated address"};
|
|
res.standard_address = get_account_address_as_str(m_wallet->nettype(), info.is_subaddress, info.address);
|
|
res.payment_id = tools::type_to_hex(info.payment_id);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
STORE::response wallet_rpc_server::invoke(STORE::request&& req)
|
|
{
|
|
require_open();
|
|
m_wallet->store();
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_PAYMENTS::response wallet_rpc_server::invoke(GET_PAYMENTS::request&& req)
|
|
{
|
|
require_open();
|
|
GET_PAYMENTS::response res{};
|
|
crypto::hash payment_id;
|
|
crypto::hash8 payment_id8;
|
|
cryptonote::blobdata payment_id_blob;
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(req.payment_id, payment_id_blob))
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Payment ID has invalid format"};
|
|
|
|
{
|
|
if(sizeof(payment_id) == payment_id_blob.size())
|
|
{
|
|
payment_id = *reinterpret_cast<const crypto::hash*>(payment_id_blob.data());
|
|
}
|
|
else if(sizeof(payment_id8) == payment_id_blob.size())
|
|
{
|
|
payment_id8 = *reinterpret_cast<const crypto::hash8*>(payment_id_blob.data());
|
|
memcpy(payment_id.data, payment_id8.data, 8);
|
|
memset(payment_id.data + 8, 0, 24);
|
|
}
|
|
else
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Payment ID has invalid size: " + req.payment_id};
|
|
}
|
|
|
|
std::list<wallet2::payment_details> payment_list;
|
|
m_wallet->get_payments(payment_id, payment_list);
|
|
for (auto& payment : payment_list)
|
|
{
|
|
wallet_rpc::payment_details& rpc_payment = res.payments.emplace_back();
|
|
rpc_payment.payment_id = req.payment_id;
|
|
rpc_payment.tx_hash = tools::type_to_hex(payment.m_tx_hash);
|
|
rpc_payment.amount = payment.m_amount;
|
|
rpc_payment.block_height = payment.m_block_height;
|
|
rpc_payment.unlock_time = payment.m_unlock_time;
|
|
rpc_payment.locked = !m_wallet->is_transfer_unlocked(payment.m_unlock_time, payment.m_block_height, payment.m_unmined_blink);
|
|
rpc_payment.subaddr_index = payment.m_subaddr_index;
|
|
rpc_payment.address = m_wallet->get_subaddress_as_str(payment.m_subaddr_index);
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_BULK_PAYMENTS::response wallet_rpc_server::invoke(GET_BULK_PAYMENTS::request&& req)
|
|
{
|
|
require_open();
|
|
GET_BULK_PAYMENTS::response res{};
|
|
|
|
/* If the payment ID list is empty, we get payments to any payment ID (or lack thereof) */
|
|
if (req.payment_ids.empty())
|
|
{
|
|
std::list<std::pair<crypto::hash,wallet2::payment_details>> payment_list;
|
|
m_wallet->get_payments(payment_list, req.min_block_height);
|
|
|
|
for (auto & payment : payment_list)
|
|
{
|
|
wallet_rpc::payment_details& rpc_payment = res.payments.emplace_back();
|
|
rpc_payment.payment_id = tools::type_to_hex(payment.first);
|
|
rpc_payment.tx_hash = tools::type_to_hex(payment.second.m_tx_hash);
|
|
rpc_payment.amount = payment.second.m_amount;
|
|
rpc_payment.block_height = payment.second.m_block_height;
|
|
rpc_payment.unlock_time = payment.second.m_unlock_time;
|
|
rpc_payment.subaddr_index = payment.second.m_subaddr_index;
|
|
rpc_payment.address = m_wallet->get_subaddress_as_str(payment.second.m_subaddr_index);
|
|
rpc_payment.locked = !m_wallet->is_transfer_unlocked(payment.second.m_unlock_time, payment.second.m_block_height, payment.second.m_unmined_blink);
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
for (auto & payment_id_str : req.payment_ids)
|
|
{
|
|
crypto::hash payment_id;
|
|
crypto::hash8 payment_id8;
|
|
cryptonote::blobdata payment_id_blob;
|
|
|
|
// TODO - should the whole thing fail because of one bad id?
|
|
bool r;
|
|
if (payment_id_str.size() == 2 * sizeof(payment_id))
|
|
{
|
|
r = tools::hex_to_type(payment_id_str, payment_id);
|
|
}
|
|
else if (payment_id_str.size() == 2 * sizeof(payment_id8))
|
|
{
|
|
r = tools::hex_to_type(payment_id_str, payment_id8);
|
|
if (r)
|
|
{
|
|
memcpy(payment_id.data, payment_id8.data, 8);
|
|
memset(payment_id.data + 8, 0, 24);
|
|
}
|
|
}
|
|
else
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Payment ID has invalid size: " + payment_id_str};
|
|
|
|
if(!r)
|
|
throw wallet_rpc_error{error_code::WRONG_PAYMENT_ID, "Payment ID has invalid format: " + payment_id_str};
|
|
|
|
std::list<wallet2::payment_details> payment_list;
|
|
m_wallet->get_payments(payment_id, payment_list, req.min_block_height);
|
|
|
|
for (auto & payment : payment_list)
|
|
{
|
|
wallet_rpc::payment_details& rpc_payment = res.payments.emplace_back();
|
|
rpc_payment.payment_id = payment_id_str;
|
|
rpc_payment.tx_hash = tools::type_to_hex(payment.m_tx_hash);
|
|
rpc_payment.amount = payment.m_amount;
|
|
rpc_payment.block_height = payment.m_block_height;
|
|
rpc_payment.unlock_time = payment.m_unlock_time;
|
|
rpc_payment.subaddr_index = payment.m_subaddr_index;
|
|
rpc_payment.address = m_wallet->get_subaddress_as_str(payment.m_subaddr_index);
|
|
rpc_payment.locked = !m_wallet->is_transfer_unlocked(payment.m_unlock_time, payment.m_block_height, payment.m_unmined_blink);
|
|
}
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
INCOMING_TRANSFERS::response wallet_rpc_server::invoke(INCOMING_TRANSFERS::request&& req)
|
|
{
|
|
require_open();
|
|
INCOMING_TRANSFERS::response res{};
|
|
if(req.transfer_type.compare("all") != 0 && req.transfer_type.compare("available") != 0 && req.transfer_type.compare("unavailable") != 0)
|
|
throw wallet_rpc_error{error_code::TRANSFER_TYPE, "Transfer type must be one of: all, available, or unavailable"};
|
|
|
|
bool filter = false;
|
|
bool available = false;
|
|
if (req.transfer_type.compare("available") == 0)
|
|
{
|
|
filter = true;
|
|
available = true;
|
|
}
|
|
else if (req.transfer_type.compare("unavailable") == 0)
|
|
{
|
|
filter = true;
|
|
available = false;
|
|
}
|
|
|
|
wallet2::transfer_container transfers;
|
|
m_wallet->get_transfers(transfers);
|
|
|
|
for (const auto& td : transfers)
|
|
{
|
|
if (!filter || available != td.m_spent)
|
|
{
|
|
if (req.account_index != td.m_subaddr_index.major || (!req.subaddr_indices.empty() && req.subaddr_indices.count(td.m_subaddr_index.minor) == 0))
|
|
continue;
|
|
wallet_rpc::transfer_details& rpc_transfers = res.transfers.emplace_back();
|
|
rpc_transfers.amount = td.amount();
|
|
rpc_transfers.spent = td.m_spent;
|
|
rpc_transfers.global_index = td.m_global_output_index;
|
|
rpc_transfers.tx_hash = tools::type_to_hex(td.m_txid);
|
|
rpc_transfers.subaddr_index = {td.m_subaddr_index.major, td.m_subaddr_index.minor};
|
|
rpc_transfers.key_image = td.m_key_image_known ? tools::type_to_hex(td.m_key_image) : "";
|
|
rpc_transfers.block_height = td.m_block_height;
|
|
rpc_transfers.frozen = td.m_frozen;
|
|
rpc_transfers.unlocked = m_wallet->is_transfer_unlocked(td);
|
|
}
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
QUERY_KEY::response wallet_rpc_server::invoke(QUERY_KEY::request&& req)
|
|
{
|
|
require_open();
|
|
QUERY_KEY::response res{};
|
|
|
|
if (req.key_type.compare("mnemonic") == 0)
|
|
{
|
|
epee::wipeable_string seed;
|
|
bool ready;
|
|
if (m_wallet->multisig(&ready))
|
|
{
|
|
if (!ready)
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is multisig, but not yet finalized"};
|
|
if (!m_wallet->get_multisig_seed(seed))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to get multisig seed."};
|
|
}
|
|
else
|
|
{
|
|
if (m_wallet->watch_only())
|
|
throw wallet_rpc_error{error_code::WATCH_ONLY, "The wallet is watch-only. Cannot retrieve seed."};
|
|
if (!m_wallet->is_deterministic())
|
|
throw wallet_rpc_error{error_code::NON_DETERMINISTIC, "The wallet is non-deterministic. Cannot display seed."};
|
|
if (!m_wallet->get_seed(seed))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to get seed."};
|
|
}
|
|
res.key = std::string(seed.data(), seed.size()); // send to the network, then wipe RAM :D
|
|
}
|
|
else if(req.key_type.compare("view_key") == 0)
|
|
{
|
|
epee::wipeable_string key = epee::to_hex::wipeable_string(m_wallet->get_account().get_keys().m_view_secret_key);
|
|
res.key = std::string(key.data(), key.size());
|
|
}
|
|
else if(req.key_type.compare("spend_key") == 0)
|
|
{
|
|
if (m_wallet->watch_only())
|
|
throw wallet_rpc_error{error_code::WATCH_ONLY, "The wallet is watch-only. Cannot retrieve spend key."};
|
|
epee::wipeable_string key = epee::to_hex::wipeable_string(m_wallet->get_account().get_keys().m_spend_secret_key);
|
|
res.key = std::string(key.data(), key.size());
|
|
}
|
|
else
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "key_type " + req.key_type + " not found"};
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
RESCAN_BLOCKCHAIN::response wallet_rpc_server::invoke(RESCAN_BLOCKCHAIN::request&& req)
|
|
{
|
|
require_open();
|
|
m_wallet->rescan_blockchain(req.hard);
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SIGN::response wallet_rpc_server::invoke(SIGN::request&& req)
|
|
{
|
|
require_open();
|
|
if (m_wallet->watch_only())
|
|
throw wallet_rpc_error{error_code::WATCH_ONLY, "Unable to sign a value using a watch-only wallet."};
|
|
|
|
SIGN::response res{};
|
|
|
|
res.signature = m_wallet->sign(req.data, {req.account_index, req.address_index});
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
VERIFY::response wallet_rpc_server::invoke(VERIFY::request&& req)
|
|
{
|
|
require_open();
|
|
VERIFY::response res{};
|
|
|
|
cryptonote::address_parse_info info = extract_account_addr(m_wallet->nettype(), req.address);
|
|
|
|
res.good = m_wallet->verify(req.data, info.address, req.signature);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
STOP_WALLET::response wallet_rpc_server::invoke(STOP_WALLET::request&& req)
|
|
{
|
|
m_stop = true;
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SET_TX_NOTES::response wallet_rpc_server::invoke(SET_TX_NOTES::request&& req)
|
|
{
|
|
require_open();
|
|
|
|
if (req.txids.size() != req.notes.size())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Different amount of txids and notes"};
|
|
|
|
std::list<crypto::hash> txids;
|
|
std::list<std::string>::const_iterator i = req.txids.begin();
|
|
while (i != req.txids.end())
|
|
{
|
|
cryptonote::blobdata txid_blob;
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(*i++, txid_blob) || txid_blob.size() != sizeof(crypto::hash))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
crypto::hash txid = *reinterpret_cast<const crypto::hash*>(txid_blob.data());
|
|
txids.push_back(txid);
|
|
}
|
|
|
|
std::list<crypto::hash>::const_iterator il = txids.begin();
|
|
std::list<std::string>::const_iterator in = req.notes.begin();
|
|
while (il != txids.end())
|
|
{
|
|
m_wallet->set_tx_note(*il++, *in++);
|
|
}
|
|
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_TX_NOTES::response wallet_rpc_server::invoke(GET_TX_NOTES::request&& req)
|
|
{
|
|
require_open();
|
|
GET_TX_NOTES::response res{};
|
|
|
|
std::list<crypto::hash> txids;
|
|
std::list<std::string>::const_iterator i = req.txids.begin();
|
|
while (i != req.txids.end())
|
|
{
|
|
cryptonote::blobdata txid_blob;
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(*i++, txid_blob) || txid_blob.size() != sizeof(crypto::hash))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
crypto::hash txid = *reinterpret_cast<const crypto::hash*>(txid_blob.data());
|
|
txids.push_back(txid);
|
|
}
|
|
|
|
std::list<crypto::hash>::const_iterator il = txids.begin();
|
|
while (il != txids.end())
|
|
{
|
|
res.notes.push_back(m_wallet->get_tx_note(*il++));
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SET_ATTRIBUTE::response wallet_rpc_server::invoke(SET_ATTRIBUTE::request&& req)
|
|
{
|
|
require_open();
|
|
m_wallet->set_attribute(req.key, req.value);
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_ATTRIBUTE::response wallet_rpc_server::invoke(GET_ATTRIBUTE::request&& req)
|
|
{
|
|
require_open();
|
|
GET_ATTRIBUTE::response res{};
|
|
|
|
if (!m_wallet->get_attribute(req.key, res.value))
|
|
throw wallet_rpc_error{error_code::ATTRIBUTE_NOT_FOUND, "Attribute not found."};
|
|
return res;
|
|
}
|
|
GET_TX_KEY::response wallet_rpc_server::invoke(GET_TX_KEY::request&& req)
|
|
{
|
|
require_open();
|
|
GET_TX_KEY::response res{};
|
|
|
|
crypto::hash txid;
|
|
if (!tools::hex_to_type(req.txid, txid))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
crypto::secret_key tx_key;
|
|
std::vector<crypto::secret_key> additional_tx_keys;
|
|
if (!m_wallet->get_tx_key(txid, tx_key, additional_tx_keys))
|
|
throw wallet_rpc_error{error_code::NO_TXKEY, "No tx secret key is stored for this tx"};
|
|
|
|
epee::wipeable_string s;
|
|
s += epee::to_hex::wipeable_string(tx_key);
|
|
for (size_t i = 0; i < additional_tx_keys.size(); ++i)
|
|
s += epee::to_hex::wipeable_string(additional_tx_keys[i]);
|
|
res.tx_key = std::string(s.data(), s.size());
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CHECK_TX_KEY::response wallet_rpc_server::invoke(CHECK_TX_KEY::request&& req)
|
|
{
|
|
require_open();
|
|
CHECK_TX_KEY::response res{};
|
|
|
|
crypto::hash txid;
|
|
if (!tools::hex_to_type(req.txid, txid))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
epee::wipeable_string tx_key_str = req.tx_key;
|
|
if (tx_key_str.size() < 64 || tx_key_str.size() % 64)
|
|
throw wallet_rpc_error{error_code::WRONG_KEY, "Tx key has invalid format"};
|
|
const char *data = tx_key_str.data();
|
|
crypto::secret_key tx_key;
|
|
if (!epee::wipeable_string(data, 64).hex_to_pod(unwrap(unwrap(tx_key))))
|
|
throw wallet_rpc_error{error_code::WRONG_KEY, "Tx key has invalid format"};
|
|
size_t offset = 64;
|
|
std::vector<crypto::secret_key> additional_tx_keys;
|
|
while (offset < tx_key_str.size())
|
|
{
|
|
additional_tx_keys.resize(additional_tx_keys.size() + 1);
|
|
if (!epee::wipeable_string(data + offset, 64).hex_to_pod(unwrap(unwrap(additional_tx_keys.back()))))
|
|
throw wallet_rpc_error{error_code::WRONG_KEY, "Tx key has invalid format"};
|
|
offset += 64;
|
|
}
|
|
|
|
cryptonote::address_parse_info info;
|
|
if(!get_account_address_from_str(info, m_wallet->nettype(), req.address))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address"};
|
|
|
|
m_wallet->check_tx_key(txid, tx_key, additional_tx_keys, info.address, res.received, res.in_pool, res.confirmations);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_TX_PROOF::response wallet_rpc_server::invoke(GET_TX_PROOF::request&& req)
|
|
{
|
|
require_open();
|
|
GET_TX_PROOF::response res{};
|
|
|
|
crypto::hash txid;
|
|
if (!tools::hex_to_type(req.txid, txid))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
cryptonote::address_parse_info info;
|
|
if(!get_account_address_from_str(info, m_wallet->nettype(), req.address))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address"};
|
|
|
|
res.signature = m_wallet->get_tx_proof(txid, info.address, info.is_subaddress, req.message);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CHECK_TX_PROOF::response wallet_rpc_server::invoke(CHECK_TX_PROOF::request&& req)
|
|
{
|
|
require_open();
|
|
CHECK_TX_PROOF::response res{};
|
|
|
|
crypto::hash txid;
|
|
if (!tools::hex_to_type(req.txid, txid))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
cryptonote::address_parse_info info;
|
|
if(!get_account_address_from_str(info, m_wallet->nettype(), req.address))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address"};
|
|
|
|
{
|
|
res.good = m_wallet->check_tx_proof(txid, info.address, info.is_subaddress, req.message, req.signature, res.received, res.in_pool, res.confirmations);
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_SPEND_PROOF::response wallet_rpc_server::invoke(GET_SPEND_PROOF::request&& req)
|
|
{
|
|
require_open();
|
|
GET_SPEND_PROOF::response res{};
|
|
|
|
crypto::hash txid;
|
|
if (!tools::hex_to_type(req.txid, txid))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
res.signature = m_wallet->get_spend_proof(txid, req.message);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CHECK_SPEND_PROOF::response wallet_rpc_server::invoke(CHECK_SPEND_PROOF::request&& req)
|
|
{
|
|
require_open();
|
|
CHECK_SPEND_PROOF::response res{};
|
|
|
|
crypto::hash txid;
|
|
if (!tools::hex_to_type(req.txid, txid))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "TX ID has invalid format"};
|
|
|
|
res.good = m_wallet->check_spend_proof(txid, req.message, req.signature);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_RESERVE_PROOF::response wallet_rpc_server::invoke(GET_RESERVE_PROOF::request&& req)
|
|
{
|
|
require_open();
|
|
GET_RESERVE_PROOF::response res{};
|
|
|
|
std::optional<std::pair<uint32_t, uint64_t>> account_minreserve;
|
|
if (!req.all)
|
|
{
|
|
if (req.account_index >= m_wallet->get_num_subaddress_accounts())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Account index is out of bound"};
|
|
account_minreserve = std::make_pair(req.account_index, req.amount);
|
|
}
|
|
|
|
res.signature = m_wallet->get_reserve_proof(account_minreserve, req.message);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CHECK_RESERVE_PROOF::response wallet_rpc_server::invoke(CHECK_RESERVE_PROOF::request&& req)
|
|
{
|
|
require_open();
|
|
CHECK_RESERVE_PROOF::response res{};
|
|
|
|
cryptonote::address_parse_info info;
|
|
if (!get_account_address_from_str(info, m_wallet->nettype(), req.address))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, "Invalid address"};
|
|
if (info.is_subaddress)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Address must not be a subaddress"};
|
|
|
|
res.good = m_wallet->check_reserve_proof(info.address, req.message, req.signature, res.total, res.spent);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_TRANSFERS::response wallet_rpc_server::invoke(GET_TRANSFERS::request&& req)
|
|
{
|
|
require_open();
|
|
GET_TRANSFERS::response res{};
|
|
|
|
wallet2::get_transfers_args_t args = {};
|
|
args.in = req.in;
|
|
args.out = req.out;
|
|
args.pending = req.pending;
|
|
args.failed = req.failed;
|
|
args.pool = req.pool;
|
|
args.stake = req.stake;
|
|
args.filter_by_height = req.filter_by_height;
|
|
args.min_height = req.min_height;
|
|
args.max_height = req.max_height;
|
|
args.subaddr_indices = req.subaddr_indices;
|
|
args.account_index = req.account_index;
|
|
args.all_accounts = req.all_accounts;
|
|
|
|
std::vector<wallet::transfer_view> transfers;
|
|
m_wallet->get_transfers(args, transfers);
|
|
|
|
for (wallet::transfer_view& entry : transfers)
|
|
{
|
|
// TODO(oxen): This discrepancy between having to use pay_type if type is
|
|
// empty and type if pay type is neither is super unintuitive.
|
|
if (entry.pay_type == wallet::pay_type::in ||
|
|
entry.pay_type == wallet::pay_type::miner ||
|
|
entry.pay_type == wallet::pay_type::governance ||
|
|
entry.pay_type == wallet::pay_type::service_node)
|
|
{
|
|
res.in.push_back(std::move(entry));
|
|
}
|
|
else if (entry.pay_type == wallet::pay_type::out || entry.pay_type == wallet::pay_type::stake)
|
|
{
|
|
res.out.push_back(std::move(entry));
|
|
}
|
|
else if (entry.type == "pending")
|
|
{
|
|
res.pending.push_back(std::move(entry));
|
|
}
|
|
else if (entry.type == "failed")
|
|
{
|
|
res.failed.push_back(std::move(entry));
|
|
}
|
|
else if (entry.type == "pool")
|
|
{
|
|
res.pool.push_back(std::move(entry));
|
|
}
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_TRANSFERS_CSV::response wallet_rpc_server::invoke(GET_TRANSFERS_CSV::request&& req)
|
|
{
|
|
require_open();
|
|
GET_TRANSFERS_CSV::response res{};
|
|
|
|
wallet2::get_transfers_args_t args;
|
|
args.in = req.in;
|
|
args.out = req.out;
|
|
args.stake = req.stake;
|
|
args.pending = req.pending;
|
|
args.failed = req.failed;
|
|
args.pool = req.pool;
|
|
args.coinbase = req.coinbase;
|
|
args.filter_by_height = req.filter_by_height;
|
|
args.min_height = req.min_height;
|
|
args.max_height = req.max_height;
|
|
args.subaddr_indices = req.subaddr_indices;
|
|
args.account_index = req.account_index;
|
|
args.all_accounts = req.all_accounts;
|
|
|
|
std::vector<wallet::transfer_view> transfers;
|
|
m_wallet->get_transfers(args, transfers);
|
|
|
|
const bool formatting = false;
|
|
res.csv = m_wallet->transfers_to_csv(transfers, formatting);
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_TRANSFER_BY_TXID::response wallet_rpc_server::invoke(GET_TRANSFER_BY_TXID::request&& req)
|
|
{
|
|
require_open();
|
|
GET_TRANSFER_BY_TXID::response res{};
|
|
|
|
crypto::hash txid;
|
|
cryptonote::blobdata txid_blob;
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(req.txid, txid_blob))
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "Transaction ID has invalid format"};
|
|
|
|
if(sizeof(txid) == txid_blob.size())
|
|
{
|
|
txid = *reinterpret_cast<const crypto::hash*>(txid_blob.data());
|
|
}
|
|
else
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "Transaction ID has invalid size: " + req.txid};
|
|
|
|
if (req.account_index >= m_wallet->get_num_subaddress_accounts())
|
|
throw wallet_rpc_error{error_code::ACCOUNT_INDEX_OUT_OF_BOUNDS, "Account index is out of bound"};
|
|
|
|
std::list<std::pair<crypto::hash, tools::wallet2::payment_details>> payments;
|
|
m_wallet->get_payments(payments, 0, (uint64_t)-1, req.account_index);
|
|
for (std::list<std::pair<crypto::hash, tools::wallet2::payment_details>>::const_iterator i = payments.begin(); i != payments.end(); ++i) {
|
|
if (i->second.m_tx_hash == txid)
|
|
{
|
|
res.transfers.push_back(m_wallet->make_transfer_view(i->second.m_tx_hash, i->first, i->second));
|
|
}
|
|
}
|
|
|
|
std::list<std::pair<crypto::hash, tools::wallet2::confirmed_transfer_details>> payments_out;
|
|
m_wallet->get_payments_out(payments_out, 0, (uint64_t)-1, req.account_index);
|
|
for (std::list<std::pair<crypto::hash, tools::wallet2::confirmed_transfer_details>>::const_iterator i = payments_out.begin(); i != payments_out.end(); ++i) {
|
|
if (i->first == txid)
|
|
{
|
|
res.transfers.push_back(m_wallet->make_transfer_view(i->first, i->second));
|
|
}
|
|
}
|
|
|
|
std::list<std::pair<crypto::hash, tools::wallet2::unconfirmed_transfer_details>> upayments;
|
|
m_wallet->get_unconfirmed_payments_out(upayments, req.account_index);
|
|
for (std::list<std::pair<crypto::hash, tools::wallet2::unconfirmed_transfer_details>>::const_iterator i = upayments.begin(); i != upayments.end(); ++i) {
|
|
if (i->first == txid)
|
|
{
|
|
res.transfers.push_back(m_wallet->make_transfer_view(i->first, i->second));
|
|
}
|
|
}
|
|
|
|
std::list<std::pair<crypto::hash, tools::wallet2::pool_payment_details>> pool_payments;
|
|
m_wallet->get_unconfirmed_payments(pool_payments, req.account_index);
|
|
for (std::list<std::pair<crypto::hash, tools::wallet2::pool_payment_details>>::const_iterator i = pool_payments.begin(); i != pool_payments.end(); ++i) {
|
|
if (i->second.m_pd.m_tx_hash == txid)
|
|
{
|
|
res.transfers.push_back(m_wallet->make_transfer_view(i->first, i->second));
|
|
}
|
|
}
|
|
|
|
if (!res.transfers.empty())
|
|
{
|
|
res.transfer = res.transfers.front(); // backward compat
|
|
return res;
|
|
}
|
|
|
|
throw wallet_rpc_error{error_code::WRONG_TXID, "Transaction not found."};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
EXPORT_OUTPUTS::response wallet_rpc_server::invoke(EXPORT_OUTPUTS::request&& req)
|
|
{
|
|
require_open();
|
|
EXPORT_OUTPUTS::response res{};
|
|
if (m_wallet->key_on_device())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "command not supported by HW wallet"};
|
|
|
|
res.outputs_data_hex = lokimq::to_hex(m_wallet->export_outputs_to_str(req.all));
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
IMPORT_OUTPUTS::response wallet_rpc_server::invoke(IMPORT_OUTPUTS::request&& req)
|
|
{
|
|
require_open();
|
|
IMPORT_OUTPUTS::response res{};
|
|
if (m_wallet->key_on_device())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "command not supported by HW wallet"};
|
|
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.outputs_data_hex, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
|
|
res.num_imported = m_wallet->import_outputs_from_str(blob);
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
EXPORT_KEY_IMAGES::response wallet_rpc_server::invoke(EXPORT_KEY_IMAGES::request&& req)
|
|
{
|
|
require_open();
|
|
EXPORT_KEY_IMAGES::response res{};
|
|
{
|
|
std::pair<size_t, std::vector<std::pair<crypto::key_image, crypto::signature>>> ski = m_wallet->export_key_images(req.requested_only);
|
|
res.offset = ski.first;
|
|
res.signed_key_images.resize(ski.second.size());
|
|
for (size_t n = 0; n < ski.second.size(); ++n)
|
|
{
|
|
res.signed_key_images[n].key_image = tools::type_to_hex(ski.second[n].first);
|
|
res.signed_key_images[n].signature = tools::type_to_hex(ski.second[n].second);
|
|
}
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
IMPORT_KEY_IMAGES::response wallet_rpc_server::invoke(IMPORT_KEY_IMAGES::request&& req)
|
|
{
|
|
require_open();
|
|
IMPORT_KEY_IMAGES::response res{};
|
|
if (!m_wallet->is_trusted_daemon())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "This command requires a trusted daemon."};
|
|
{
|
|
std::vector<std::pair<crypto::key_image, crypto::signature>> ski;
|
|
ski.resize(req.signed_key_images.size());
|
|
for (size_t n = 0; n < ski.size(); ++n)
|
|
{
|
|
if (!tools::hex_to_type(req.signed_key_images[n].key_image, ski[n].first))
|
|
throw wallet_rpc_error{error_code::WRONG_KEY_IMAGE, "failed to parse key image"};
|
|
|
|
if (!tools::hex_to_type(req.signed_key_images[n].signature, ski[n].second))
|
|
throw wallet_rpc_error{error_code::WRONG_SIGNATURE, "failed to parse signature"};
|
|
}
|
|
uint64_t spent = 0, unspent = 0;
|
|
uint64_t height = m_wallet->import_key_images(ski, req.offset, spent, unspent);
|
|
res.spent = spent;
|
|
res.unspent = unspent;
|
|
res.height = height;
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
MAKE_URI::response wallet_rpc_server::invoke(MAKE_URI::request&& req)
|
|
{
|
|
require_open();
|
|
MAKE_URI::response res{};
|
|
std::string error;
|
|
res.uri = m_wallet->make_uri(req.address, req.payment_id, req.amount, req.tx_description, req.recipient_name, error);
|
|
if (res.uri.empty())
|
|
throw wallet_rpc_error{error_code::WRONG_URI, std::string("Cannot make URI from supplied parameters: ") + error};
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
PARSE_URI::response wallet_rpc_server::invoke(PARSE_URI::request&& req)
|
|
{
|
|
require_open();
|
|
PARSE_URI::response res{};
|
|
std::string error;
|
|
if (!m_wallet->parse_uri(req.uri, res.uri.address, res.uri.payment_id, res.uri.amount, res.uri.tx_description, res.uri.recipient_name, res.unknown_parameters, error))
|
|
throw wallet_rpc_error{error_code::WRONG_URI, "Error parsing URI: " + error};
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_ADDRESS_BOOK_ENTRY::response wallet_rpc_server::invoke(GET_ADDRESS_BOOK_ENTRY::request&& req)
|
|
{
|
|
require_open();
|
|
GET_ADDRESS_BOOK_ENTRY::response res{};
|
|
const auto ab = m_wallet->get_address_book();
|
|
if (req.entries.empty())
|
|
{
|
|
uint64_t idx = 0;
|
|
for (const auto &entry: ab)
|
|
{
|
|
std::string address;
|
|
if (entry.m_has_payment_id)
|
|
address = cryptonote::get_account_integrated_address_as_str(m_wallet->nettype(), entry.m_address, entry.m_payment_id);
|
|
else
|
|
address = get_account_address_as_str(m_wallet->nettype(), entry.m_is_subaddress, entry.m_address);
|
|
res.entries.push_back(wallet_rpc::GET_ADDRESS_BOOK_ENTRY::entry{idx++, address, entry.m_description});
|
|
}
|
|
}
|
|
else
|
|
{
|
|
for (uint64_t idx: req.entries)
|
|
{
|
|
if (idx >= ab.size())
|
|
throw wallet_rpc_error{error_code::WRONG_INDEX, "Index out of range: " + std::to_string(idx)};
|
|
const auto &entry = ab[idx];
|
|
std::string address;
|
|
if (entry.m_has_payment_id)
|
|
address = cryptonote::get_account_integrated_address_as_str(m_wallet->nettype(), entry.m_address, entry.m_payment_id);
|
|
else
|
|
address = get_account_address_as_str(m_wallet->nettype(), entry.m_is_subaddress, entry.m_address);
|
|
res.entries.push_back(wallet_rpc::GET_ADDRESS_BOOK_ENTRY::entry{idx, address, entry.m_description});
|
|
}
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
ADD_ADDRESS_BOOK_ENTRY::response wallet_rpc_server::invoke(ADD_ADDRESS_BOOK_ENTRY::request&& req)
|
|
{
|
|
require_open();
|
|
ADD_ADDRESS_BOOK_ENTRY::response res{};
|
|
|
|
cryptonote::address_parse_info info = extract_account_addr(m_wallet->nettype(), req.address);
|
|
|
|
if (!m_wallet->add_address_book_row(info.address, info.has_payment_id ? &info.payment_id : NULL, req.description, info.is_subaddress))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to add address book entry"};
|
|
res.index = m_wallet->get_address_book().size() - 1;
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
EDIT_ADDRESS_BOOK_ENTRY::response wallet_rpc_server::invoke(EDIT_ADDRESS_BOOK_ENTRY::request&& req)
|
|
{
|
|
require_open();
|
|
|
|
const auto ab = m_wallet->get_address_book();
|
|
if (req.index >= ab.size())
|
|
throw wallet_rpc_error{error_code::WRONG_INDEX, "Index out of range: " + std::to_string(req.index)};
|
|
|
|
tools::wallet2::address_book_row entry = ab[req.index];
|
|
|
|
if (req.set_address)
|
|
{
|
|
cryptonote::address_parse_info info = extract_account_addr(m_wallet->nettype(), req.address);
|
|
entry.m_address = info.address;
|
|
entry.m_is_subaddress = info.is_subaddress;
|
|
if (info.has_payment_id)
|
|
entry.m_payment_id = info.payment_id;
|
|
}
|
|
|
|
if (req.set_description)
|
|
entry.m_description = req.description;
|
|
|
|
if (!m_wallet->set_address_book_row(req.index, entry.m_address, req.set_address && entry.m_has_payment_id ? &entry.m_payment_id : NULL, entry.m_description, entry.m_is_subaddress))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to edit address book entry"};
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
DELETE_ADDRESS_BOOK_ENTRY::response wallet_rpc_server::invoke(DELETE_ADDRESS_BOOK_ENTRY::request&& req)
|
|
{
|
|
require_open();
|
|
|
|
const auto ab = m_wallet->get_address_book();
|
|
if (req.index >= ab.size())
|
|
throw wallet_rpc_error{error_code::WRONG_INDEX, "Index out of range: " + std::to_string(req.index)};
|
|
if (!m_wallet->delete_address_book_row(req.index))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to delete address book entry"};
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
REFRESH::response wallet_rpc_server::invoke(REFRESH::request&& req)
|
|
{
|
|
require_open();
|
|
REFRESH::response res{};
|
|
m_wallet->refresh(m_wallet->is_trusted_daemon(), req.start_height, res.blocks_fetched, res.received_money);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
AUTO_REFRESH::response wallet_rpc_server::invoke(AUTO_REFRESH::request&& req)
|
|
{
|
|
m_auto_refresh_period = req.enable ? req.period ? std::chrono::seconds{req.period} : DEFAULT_AUTO_REFRESH_PERIOD : 0s;
|
|
MINFO("Auto refresh now " << (m_auto_refresh_period != 0s ? std::to_string(std::chrono::duration<float>(m_auto_refresh_period).count()) + " seconds" : std::string("disabled")));
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
RESCAN_SPENT::response wallet_rpc_server::invoke(RESCAN_SPENT::request&& req)
|
|
{
|
|
require_open();
|
|
m_wallet->rescan_spent();
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
START_MINING::response wallet_rpc_server::invoke(START_MINING::request&& req)
|
|
{
|
|
require_open();
|
|
if (!m_wallet->is_trusted_daemon())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "This command requires a trusted daemon."};
|
|
|
|
size_t max_mining_threads_count = (std::max)(tools::get_max_concurrency(), static_cast<unsigned>(2));
|
|
if (req.threads_count < 1 || max_mining_threads_count < req.threads_count)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "The specified number of threads is inappropriate."};
|
|
|
|
rpc::START_MINING::request daemon_req{};
|
|
daemon_req.miner_address = m_wallet->get_account().get_public_address_str(m_wallet->nettype());
|
|
daemon_req.threads_count = req.threads_count;
|
|
|
|
rpc::START_MINING::response daemon_res{};
|
|
bool r = m_wallet->invoke_http<rpc::START_MINING>(daemon_req, daemon_res);
|
|
if (!r || daemon_res.status != rpc::STATUS_OK)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Couldn't start mining due to unknown error."};
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
STOP_MINING::response wallet_rpc_server::invoke(STOP_MINING::request&& req)
|
|
{
|
|
require_open();
|
|
rpc::STOP_MINING::response daemon_res{};
|
|
bool r = m_wallet->invoke_http<rpc::STOP_MINING>({}, daemon_res);
|
|
if (!r || daemon_res.status != rpc::STATUS_OK)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Couldn't stop mining due to unknown error."};
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_LANGUAGES::response wallet_rpc_server::invoke(GET_LANGUAGES::request&& req)
|
|
{
|
|
GET_LANGUAGES::response res{};
|
|
crypto::ElectrumWords::get_language_list(res.languages, true);
|
|
crypto::ElectrumWords::get_language_list(res.languages_local, false);
|
|
return res;
|
|
}
|
|
|
|
namespace {
|
|
namespace po = boost::program_options;
|
|
// Gross hack because wallet2 only takes password via a po::variables_map because it's just great
|
|
// like that.
|
|
po::variables_map password_arg_hack(const std::string& password, po::variables_map vm)
|
|
{
|
|
po::options_description desc("dummy");
|
|
const command_line::arg_descriptor<std::string, true> arg_password = {"password", "password"};
|
|
const char *argv[3];
|
|
int argc = 3;
|
|
argv[0] = "wallet-rpc";
|
|
argv[1] = "--password";
|
|
argv[2] = password.c_str();
|
|
command_line::add_arg(desc, arg_password);
|
|
po::store(po::parse_command_line(argc, argv, desc), vm);
|
|
return vm;
|
|
}
|
|
}
|
|
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CREATE_WALLET::response wallet_rpc_server::invoke(CREATE_WALLET::request&& req)
|
|
{
|
|
if (m_wallet_dir.empty())
|
|
throw wallet_rpc_error{error_code::NO_WALLET_DIR, "No wallet dir configured"};
|
|
|
|
const char *ptr = strchr(req.filename.c_str(), '/');
|
|
#ifdef _WIN32
|
|
if (!ptr)
|
|
ptr = strchr(req.filename.c_str(), '\\');
|
|
if (!ptr)
|
|
ptr = strchr(req.filename.c_str(), ':');
|
|
#endif
|
|
if (ptr)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Invalid filename"};
|
|
fs::path wallet_file = req.filename.empty() ? fs::path{} : m_wallet_dir / fs::u8path(req.filename);
|
|
if (!req.hardware_wallet)
|
|
{
|
|
std::vector<std::string> languages;
|
|
crypto::ElectrumWords::get_language_list(languages, false);
|
|
std::vector<std::string>::iterator it;
|
|
|
|
it = std::find(languages.begin(), languages.end(), req.language);
|
|
if (it == languages.end())
|
|
{
|
|
crypto::ElectrumWords::get_language_list(languages, true);
|
|
it = std::find(languages.begin(), languages.end(), req.language);
|
|
}
|
|
if (it == languages.end())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Unknown language: " + req.language};
|
|
}
|
|
auto vm2 = password_arg_hack(req.password, m_vm);
|
|
std::unique_ptr<tools::wallet2> wal = tools::wallet2::make_new(vm2, true, nullptr).first;
|
|
if (!wal)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to create wallet"};
|
|
|
|
if (!req.hardware_wallet)
|
|
wal->set_seed_language(req.language);
|
|
|
|
rpc::GET_HEIGHT::request hreq{};
|
|
rpc::GET_HEIGHT::response hres{};
|
|
hres.height = 0;
|
|
bool r = wal->invoke_http<rpc::GET_HEIGHT>(hreq, hres);
|
|
if (r)
|
|
wal->set_refresh_from_block_height(hres.height);
|
|
|
|
if (req.hardware_wallet)
|
|
wal->restore_from_device(wallet_file, req.password, req.device_name.empty() ? "Ledger" : req.device_name);
|
|
else
|
|
wal->generate(wallet_file, req.password);
|
|
|
|
if (m_wallet)
|
|
m_wallet->store();
|
|
m_wallet = std::move(wal);
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
OPEN_WALLET::response wallet_rpc_server::invoke(OPEN_WALLET::request&& req)
|
|
{
|
|
if (m_wallet_dir.empty())
|
|
throw wallet_rpc_error{error_code::NO_WALLET_DIR, "No wallet dir configured"};
|
|
|
|
const char *ptr = strchr(req.filename.c_str(), '/');
|
|
#ifdef _WIN32
|
|
if (!ptr)
|
|
ptr = strchr(req.filename.c_str(), '\\');
|
|
if (!ptr)
|
|
ptr = strchr(req.filename.c_str(), ':');
|
|
#endif
|
|
if (ptr)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Invalid filename"};
|
|
|
|
if (m_wallet)
|
|
{
|
|
// stopping the thread resets this but we want to turn it on again for the next wallet:
|
|
bool was_long_polling = !m_long_poll_disabled;
|
|
stop_long_poll_thread();
|
|
m_long_poll_disabled = !was_long_polling;
|
|
if (req.autosave_current)
|
|
m_wallet->store();
|
|
m_wallet.reset();
|
|
}
|
|
|
|
fs::path wallet_file = m_wallet_dir / fs::u8path(req.filename);
|
|
auto vm2 = password_arg_hack(req.password, m_vm);
|
|
std::unique_ptr<tools::wallet2> wal = tools::wallet2::make_from_file(vm2, true, wallet_file, nullptr).first;
|
|
if (!wal)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to open wallet"};
|
|
|
|
m_wallet = std::move(wal);
|
|
start_long_poll_thread();
|
|
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CLOSE_WALLET::response wallet_rpc_server::invoke(CLOSE_WALLET::request&& req)
|
|
{
|
|
require_open();
|
|
|
|
if (req.autosave_current)
|
|
m_wallet->store();
|
|
m_wallet.reset();
|
|
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
CHANGE_WALLET_PASSWORD::response wallet_rpc_server::invoke(CHANGE_WALLET_PASSWORD::request&& req)
|
|
{
|
|
require_open();
|
|
if (m_wallet->verify_password(req.old_password))
|
|
{
|
|
m_wallet->change_password(m_wallet->get_wallet_file(), req.old_password, req.new_password);
|
|
LOG_PRINT_L0("Wallet password changed.");
|
|
}
|
|
else
|
|
throw wallet_rpc_error{error_code::INVALID_PASSWORD, "Invalid original password."};
|
|
return {};
|
|
}
|
|
|
|
static fs::path get_wallet_path(fs::path dir, fs::path filename)
|
|
{
|
|
if (filename.has_parent_path())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Invalid filename"};
|
|
auto wallet_file = filename.empty() ? filename : dir / filename;
|
|
// check if wallet file already exists
|
|
if (std::error_code ec; !wallet_file.empty() && fs::exists(wallet_file, ec))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Wallet already exists."};
|
|
return wallet_file;
|
|
}
|
|
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GENERATE_FROM_KEYS::response wallet_rpc_server::invoke(GENERATE_FROM_KEYS::request&& req)
|
|
{
|
|
if (m_wallet_dir.empty())
|
|
throw wallet_rpc_error{error_code::NO_WALLET_DIR, "No wallet dir configured"};
|
|
|
|
// early check for mandatory fields
|
|
if (req.viewkey.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "field 'viewkey' is mandatory. Please provide a view key you want to restore from."};
|
|
if (req.address.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "field 'address' is mandatory. Please provide a public address."};
|
|
|
|
GENERATE_FROM_KEYS::response res{};
|
|
|
|
auto wallet_file = get_wallet_path(m_wallet_dir, fs::u8path(req.filename));
|
|
|
|
auto vm2 = password_arg_hack(req.password, m_vm);
|
|
auto rc = tools::wallet2::make_new(vm2, true, nullptr);
|
|
std::unique_ptr<wallet2> wal;
|
|
wal = std::move(rc.first);
|
|
if (!wal)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to create wallet"};
|
|
|
|
cryptonote::address_parse_info info;
|
|
if(!get_account_address_from_str(info, wal->nettype(), req.address))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to parse public address"};
|
|
|
|
epee::wipeable_string password = rc.second.password();
|
|
epee::wipeable_string viewkey_string = req.viewkey;
|
|
crypto::secret_key viewkey;
|
|
if (!viewkey_string.hex_to_pod(unwrap(unwrap(viewkey))))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to parse view key secret key"};
|
|
|
|
if (m_wallet && req.autosave_current)
|
|
{
|
|
if (!wallet_file.empty())
|
|
m_wallet->store();
|
|
}
|
|
|
|
{
|
|
if (!req.spendkey.empty())
|
|
{
|
|
epee::wipeable_string spendkey_string = req.spendkey;
|
|
crypto::secret_key spendkey;
|
|
if (!spendkey_string.hex_to_pod(unwrap(unwrap(spendkey))))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to parse spend key secret key"};
|
|
wal->generate(wallet_file, std::move(rc.second).password(), info.address, spendkey, viewkey, false);
|
|
res.info = "Wallet has been generated successfully.";
|
|
}
|
|
else
|
|
{
|
|
wal->generate(wallet_file, std::move(rc.second).password(), info.address, viewkey, false);
|
|
res.info = "Watch-only wallet has been generated successfully.";
|
|
}
|
|
MINFO("Wallet has been generated.\n");
|
|
}
|
|
|
|
if (!wal)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to generate wallet"};
|
|
|
|
// set blockheight if given
|
|
wal->set_refresh_from_block_height(req.restore_height);
|
|
wal->rewrite(wallet_file, password);
|
|
|
|
m_wallet = std::move(wal);
|
|
res.address = m_wallet->get_account().get_public_address_str(m_wallet->nettype());
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
RESTORE_DETERMINISTIC_WALLET::response wallet_rpc_server::invoke(RESTORE_DETERMINISTIC_WALLET::request&& req)
|
|
{
|
|
if (m_wallet_dir.empty())
|
|
throw wallet_rpc_error{error_code::NO_WALLET_DIR, "No wallet dir configured"};
|
|
|
|
// early check for mandatory fields
|
|
if (req.seed.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "field 'seed' is mandatory. Please provide a seed you want to restore from."};
|
|
|
|
RESTORE_DETERMINISTIC_WALLET::response res{};
|
|
|
|
auto wallet_file = get_wallet_path(m_wallet_dir, fs::u8path(req.filename));
|
|
|
|
crypto::secret_key recovery_key;
|
|
std::string old_language;
|
|
|
|
// check the given seed
|
|
{
|
|
if (!crypto::ElectrumWords::words_to_bytes(req.seed, recovery_key, old_language))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Electrum-style word list failed verification"};
|
|
}
|
|
if (m_wallet && req.autosave_current)
|
|
m_wallet->store();
|
|
|
|
// process seed_offset if given
|
|
{
|
|
if (!req.seed_offset.empty())
|
|
{
|
|
recovery_key = cryptonote::decrypt_key(recovery_key, req.seed_offset);
|
|
}
|
|
}
|
|
|
|
auto vm2 = password_arg_hack(req.password, m_vm);
|
|
auto rc = tools::wallet2::make_new(vm2, true, nullptr);
|
|
std::unique_ptr<wallet2> wal;
|
|
wal = std::move(rc.first);
|
|
if (!wal)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to create wallet"};
|
|
|
|
epee::wipeable_string password = rc.second.password();
|
|
|
|
bool was_deprecated_wallet = ((old_language == crypto::ElectrumWords::old_language_name) ||
|
|
crypto::ElectrumWords::get_is_old_style_seed(req.seed));
|
|
|
|
std::string mnemonic_language = old_language;
|
|
if (was_deprecated_wallet)
|
|
{
|
|
// The user had used an older version of the wallet with old style mnemonics.
|
|
res.was_deprecated = true;
|
|
}
|
|
|
|
if (old_language == crypto::ElectrumWords::old_language_name)
|
|
{
|
|
if (req.language.empty())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Wallet was using the old seed language. You need to specify a new seed language."};
|
|
std::vector<std::string> language_list;
|
|
std::vector<std::string> language_list_en;
|
|
crypto::ElectrumWords::get_language_list(language_list);
|
|
crypto::ElectrumWords::get_language_list(language_list_en, true);
|
|
if (std::find(language_list.begin(), language_list.end(), req.language) == language_list.end() &&
|
|
std::find(language_list_en.begin(), language_list_en.end(), req.language) == language_list_en.end())
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Wallet was using the old seed language, and the specified new seed language is invalid."};
|
|
mnemonic_language = req.language;
|
|
}
|
|
|
|
wal->set_seed_language(mnemonic_language);
|
|
|
|
crypto::secret_key recovery_val = wal->generate(wallet_file, std::move(rc.second).password(), recovery_key, true, false, false);
|
|
MINFO("Wallet has been restored.\n");
|
|
|
|
// // Convert the secret key back to seed
|
|
epee::wipeable_string electrum_words;
|
|
if (!crypto::ElectrumWords::bytes_to_words(recovery_val, electrum_words, mnemonic_language))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to encode seed"};
|
|
res.seed = std::string(electrum_words.data(), electrum_words.size());
|
|
|
|
if (!wal)
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Failed to generate wallet"};
|
|
|
|
// set blockheight if given
|
|
wal->set_refresh_from_block_height(req.restore_height);
|
|
wal->rewrite(wallet_file, password);
|
|
|
|
m_wallet = std::move(wal);
|
|
res.address = m_wallet->get_account().get_public_address_str(m_wallet->nettype());
|
|
res.info = "Wallet has been restored successfully.";
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
IS_MULTISIG::response wallet_rpc_server::invoke(IS_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
IS_MULTISIG::response res{};
|
|
res.multisig = m_wallet->multisig(&res.ready, &res.threshold, &res.total);
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
PREPARE_MULTISIG::response wallet_rpc_server::invoke(PREPARE_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
PREPARE_MULTISIG::response res{};
|
|
if (m_wallet->multisig())
|
|
throw wallet_rpc_error{error_code::ALREADY_MULTISIG, "This wallet is already multisig"};
|
|
if (m_wallet->watch_only())
|
|
throw wallet_rpc_error{error_code::WATCH_ONLY, "wallet is watch-only and cannot be made multisig"};
|
|
|
|
res.multisig_info = m_wallet->get_multisig_info();
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
MAKE_MULTISIG::response wallet_rpc_server::invoke(MAKE_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
MAKE_MULTISIG::response res{};
|
|
if (m_wallet->multisig())
|
|
throw wallet_rpc_error{error_code::ALREADY_MULTISIG, "This wallet is already multisig"};
|
|
if (m_wallet->watch_only())
|
|
throw wallet_rpc_error{error_code::WATCH_ONLY, "wallet is watch-only and cannot be made multisig"};
|
|
|
|
res.multisig_info = m_wallet->make_multisig(req.password, req.multisig_info, req.threshold);
|
|
res.address = m_wallet->get_account().get_public_address_str(m_wallet->nettype());
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
EXPORT_MULTISIG::response wallet_rpc_server::invoke(EXPORT_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
EXPORT_MULTISIG::response res{};
|
|
bool ready;
|
|
if (!m_wallet->multisig(&ready))
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is not multisig"};
|
|
if (!ready)
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is multisig, but not yet finalized"};
|
|
|
|
cryptonote::blobdata info;
|
|
info = m_wallet->export_multisig();
|
|
|
|
res.info = lokimq::to_hex(info);
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
IMPORT_MULTISIG::response wallet_rpc_server::invoke(IMPORT_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
IMPORT_MULTISIG::response res{};
|
|
bool ready;
|
|
uint32_t threshold, total;
|
|
if (!m_wallet->multisig(&ready, &threshold, &total))
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is not multisig"};
|
|
if (!ready)
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is multisig, but not yet finalized"};
|
|
|
|
if (req.info.size() < threshold - 1)
|
|
throw wallet_rpc_error{error_code::THRESHOLD_NOT_REACHED, "Needs multisig export info from more participants"};
|
|
|
|
std::vector<cryptonote::blobdata> info;
|
|
info.resize(req.info.size());
|
|
for (size_t n = 0; n < info.size(); ++n)
|
|
{
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.info[n], info[n]))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
}
|
|
|
|
res.n_outputs = m_wallet->import_multisig(info);
|
|
|
|
if (m_wallet->is_trusted_daemon())
|
|
{
|
|
try
|
|
{
|
|
m_wallet->rescan_spent();
|
|
}
|
|
catch (...) {}
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
FINALIZE_MULTISIG::response wallet_rpc_server::invoke(FINALIZE_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
FINALIZE_MULTISIG::response res{};
|
|
bool ready;
|
|
uint32_t threshold, total;
|
|
if (!m_wallet->multisig(&ready, &threshold, &total))
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is not multisig"};
|
|
if (ready)
|
|
throw wallet_rpc_error{error_code::ALREADY_MULTISIG, "This wallet is multisig, and already finalized"};
|
|
|
|
if (req.multisig_info.size() < 1 || req.multisig_info.size() > total)
|
|
throw wallet_rpc_error{error_code::THRESHOLD_NOT_REACHED, "Needs multisig info from more participants"};
|
|
|
|
if (!m_wallet->finalize_multisig(req.password, req.multisig_info))
|
|
throw wallet_rpc_error{error_code::UNKNOWN_ERROR, "Error calling finalize_multisig"};
|
|
res.address = m_wallet->get_account().get_public_address_str(m_wallet->nettype());
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
EXCHANGE_MULTISIG_KEYS::response wallet_rpc_server::invoke(EXCHANGE_MULTISIG_KEYS::request&& req)
|
|
{
|
|
require_open();
|
|
EXCHANGE_MULTISIG_KEYS::response res{};
|
|
bool ready;
|
|
uint32_t threshold, total;
|
|
if (!m_wallet->multisig(&ready, &threshold, &total))
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is not multisig"};
|
|
|
|
if (ready)
|
|
throw wallet_rpc_error{error_code::ALREADY_MULTISIG, "This wallet is multisig, and already finalized"};
|
|
|
|
if (req.multisig_info.size() < 1 || req.multisig_info.size() > total)
|
|
throw wallet_rpc_error{error_code::THRESHOLD_NOT_REACHED, "Needs multisig info from more participants"};
|
|
|
|
{
|
|
res.multisig_info = m_wallet->exchange_multisig_keys(req.password, req.multisig_info);
|
|
if (res.multisig_info.empty())
|
|
{
|
|
res.address = m_wallet->get_account().get_public_address_str(m_wallet->nettype());
|
|
}
|
|
}
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SIGN_MULTISIG::response wallet_rpc_server::invoke(SIGN_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
SIGN_MULTISIG::response res{};
|
|
bool ready;
|
|
uint32_t threshold, total;
|
|
if (!m_wallet->multisig(&ready, &threshold, &total))
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is not multisig"};
|
|
if (!ready)
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is multisig, but not yet finalized"};
|
|
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.tx_data_hex, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
|
|
wallet::multisig_tx_set txs;
|
|
bool r = m_wallet->load_multisig_tx(blob, txs, nullptr);
|
|
if (!r)
|
|
throw wallet_rpc_error{error_code::BAD_MULTISIG_TX_DATA, "Failed to parse multisig tx data."};
|
|
|
|
std::vector<crypto::hash> txids;
|
|
try
|
|
{
|
|
bool r = m_wallet->sign_multisig_tx(txs, txids);
|
|
if (!r)
|
|
throw wallet_rpc_error{error_code::MULTISIG_SIGNATURE, "Failed to sign multisig tx"};
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
throw wallet_rpc_error{error_code::MULTISIG_SIGNATURE, "Failed to sign multisig tx: "s + e.what()};
|
|
}
|
|
|
|
res.tx_data_hex = lokimq::to_hex(m_wallet->save_multisig_tx(txs));
|
|
if (!txids.empty())
|
|
{
|
|
for (const crypto::hash &txid: txids)
|
|
res.tx_hash_list.push_back(tools::type_to_hex(txid));
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SUBMIT_MULTISIG::response wallet_rpc_server::invoke(SUBMIT_MULTISIG::request&& req)
|
|
{
|
|
require_open();
|
|
SUBMIT_MULTISIG::response res{};
|
|
bool ready;
|
|
uint32_t threshold, total;
|
|
if (!m_wallet->multisig(&ready, &threshold, &total))
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is not multisig"};
|
|
if (!ready)
|
|
throw wallet_rpc_error{error_code::NOT_MULTISIG, "This wallet is multisig, but not yet finalized"};
|
|
|
|
cryptonote::blobdata blob;
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(req.tx_data_hex, blob))
|
|
throw wallet_rpc_error{error_code::BAD_HEX, "Failed to parse hex."};
|
|
|
|
tools::wallet2::multisig_tx_set txs;
|
|
bool r = m_wallet->load_multisig_tx(blob, txs, nullptr);
|
|
if (!r)
|
|
throw wallet_rpc_error{error_code::BAD_MULTISIG_TX_DATA, "Failed to parse multisig tx data."};
|
|
|
|
if (txs.m_signers.size() < threshold)
|
|
throw wallet_rpc_error{error_code::THRESHOLD_NOT_REACHED, "Not enough signers signed this transaction."};
|
|
|
|
try
|
|
{
|
|
for (auto &ptx: txs.m_ptx)
|
|
{
|
|
m_wallet->commit_tx(ptx);
|
|
res.tx_hash_list.push_back(tools::type_to_hex(cryptonote::get_transaction_hash(ptx.tx)));
|
|
}
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
throw wallet_rpc_error{error_code::MULTISIG_SUBMISSION, std::string("Failed to submit multisig tx: ") + e.what()};
|
|
}
|
|
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
VALIDATE_ADDRESS::response wallet_rpc_server::invoke(VALIDATE_ADDRESS::request&& req)
|
|
{
|
|
VALIDATE_ADDRESS::response res{};
|
|
cryptonote::address_parse_info info;
|
|
const struct { cryptonote::network_type type; const char *stype; } net_types[] = {
|
|
{ cryptonote::MAINNET, "mainnet" },
|
|
{ cryptonote::TESTNET, "testnet" },
|
|
{ cryptonote::DEVNET, "devnet" },
|
|
};
|
|
if (!req.any_net_type && !m_wallet)
|
|
require_open();
|
|
|
|
for (const auto &net_type: net_types)
|
|
{
|
|
if (!req.any_net_type && (!m_wallet || net_type.type != m_wallet->nettype()))
|
|
continue;
|
|
if (req.allow_openalias)
|
|
{
|
|
res.valid = false;
|
|
try {
|
|
info = extract_account_addr(net_type.type, req.address);
|
|
res.valid = true;
|
|
} catch (...) {}
|
|
|
|
if (res.valid)
|
|
res.openalias_address = info.as_str(net_type.type);
|
|
}
|
|
else
|
|
{
|
|
res.valid = cryptonote::get_account_address_from_str(info, net_type.type, req.address);
|
|
}
|
|
if (res.valid)
|
|
{
|
|
res.integrated = info.has_payment_id;
|
|
res.subaddress = info.is_subaddress;
|
|
res.nettype = net_type.stype;
|
|
return res;
|
|
}
|
|
}
|
|
|
|
res.valid = false;
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SET_DAEMON::response wallet_rpc_server::invoke(SET_DAEMON::request&& req)
|
|
{
|
|
require_open();
|
|
|
|
if (!m_wallet->set_daemon(req.address, std::nullopt, req.proxy, req.trusted))
|
|
throw wallet_rpc_error{error_code::NO_DAEMON_CONNECTION, std::string("Unable to set daemon")};
|
|
|
|
m_wallet->m_http_client.set_https_client_cert(req.ssl_certificate_path, req.ssl_private_key_path);
|
|
m_wallet->m_http_client.set_insecure_https(req.ssl_allow_any_cert);
|
|
m_wallet->m_http_client.set_https_cainfo(req.ssl_ca_file);
|
|
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SET_LOG_LEVEL::response wallet_rpc_server::invoke(SET_LOG_LEVEL::request&& req)
|
|
{
|
|
if (req.level < 0 || req.level > 4)
|
|
throw wallet_rpc_error{error_code::INVALID_LOG_LEVEL, "Error: log level not valid"};
|
|
mlog_set_log_level(req.level);
|
|
return {};
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
SET_LOG_CATEGORIES::response wallet_rpc_server::invoke(SET_LOG_CATEGORIES::request&& req)
|
|
{
|
|
mlog_set_log(req.categories.c_str());
|
|
SET_LOG_CATEGORIES::response res{};
|
|
res.categories = mlog_get_categories();
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
GET_VERSION::response wallet_rpc_server::invoke(GET_VERSION::request&& req)
|
|
{
|
|
GET_VERSION::response res{};
|
|
res.version = WALLET_RPC_VERSION;
|
|
return res;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
//
|
|
// Oxen
|
|
//
|
|
STAKE::response wallet_rpc_server::invoke(STAKE::request&& req)
|
|
{
|
|
require_open();
|
|
STAKE::response res{};
|
|
|
|
crypto::public_key snode_key = {};
|
|
cryptonote::address_parse_info addr_info = {};
|
|
if (!cryptonote::get_account_address_from_str(addr_info, m_wallet->nettype(), req.destination))
|
|
throw wallet_rpc_error{error_code::WRONG_ADDRESS, std::string("Unparsable address given: ") + req.destination};
|
|
|
|
if (!tools::hex_to_type(req.service_node_key, snode_key))
|
|
throw wallet_rpc_error{error_code::WRONG_KEY, std::string("Unparsable service node key given: ") + req.service_node_key};
|
|
|
|
tools::wallet2::stake_result stake_result = m_wallet->create_stake_tx(snode_key, req.amount, 0 /*amount_fraction*/, req.priority, req.subaddr_indices);
|
|
if (stake_result.status != tools::wallet2::stake_result_status::success)
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, stake_result.msg};
|
|
|
|
std::vector<tools::wallet2::pending_tx> ptx_vector = {stake_result.ptx};
|
|
|
|
fill_response(ptx_vector, req.get_tx_key, res.tx_key, res.amount, res.fee, res.multisig_txset, res.unsigned_txset, req.do_not_relay, false /*blink*/,
|
|
res.tx_hash, req.get_tx_hex, res.tx_blob, req.get_tx_metadata, res.tx_metadata);
|
|
|
|
return res;
|
|
}
|
|
|
|
REGISTER_SERVICE_NODE::response wallet_rpc_server::invoke(REGISTER_SERVICE_NODE::request&& req)
|
|
{
|
|
require_open();
|
|
REGISTER_SERVICE_NODE::response res{};
|
|
|
|
std::vector<std::string> args;
|
|
boost::split(args, req.register_service_node_str, boost::is_any_of(" "));
|
|
|
|
if (args.size() > 0)
|
|
{
|
|
if (args[0] == "register_service_node")
|
|
args.erase(args.begin());
|
|
}
|
|
|
|
// NOTE(oxen): Pre-emptively set subaddr_account to 0. We don't support onwards from Infinite Staking which is when this call was implemented.
|
|
tools::wallet2::register_service_node_result register_result = m_wallet->create_register_service_node_tx(args, 0 /*subaddr_account*/);
|
|
if (register_result.status != tools::wallet2::register_service_node_result_status::success)
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, register_result.msg};
|
|
|
|
std::vector<tools::wallet2::pending_tx> ptx_vector = {register_result.ptx};
|
|
fill_response(ptx_vector, req.get_tx_key, res.tx_key, res.amount, res.fee, res.multisig_txset, res.unsigned_txset, req.do_not_relay, false /*blink*/,
|
|
res.tx_hash, req.get_tx_hex, res.tx_blob, req.get_tx_metadata, res.tx_metadata);
|
|
|
|
return res;
|
|
}
|
|
|
|
CAN_REQUEST_STAKE_UNLOCK::response wallet_rpc_server::invoke(CAN_REQUEST_STAKE_UNLOCK::request&& req)
|
|
{
|
|
require_open();
|
|
CAN_REQUEST_STAKE_UNLOCK::response res{};
|
|
|
|
crypto::public_key snode_key = {};
|
|
if (!tools::hex_to_type(req.service_node_key, snode_key))
|
|
throw wallet_rpc_error{error_code::WRONG_KEY, std::string("Unparsable service node key given: ") + req.service_node_key};
|
|
|
|
tools::wallet2::request_stake_unlock_result unlock_result = m_wallet->can_request_stake_unlock(snode_key);
|
|
res.can_unlock = unlock_result.success;
|
|
res.msg = unlock_result.msg;
|
|
return res;
|
|
}
|
|
|
|
// TODO(oxen): Deprecate this and make it return the TX as hex? Then just transfer it as normal? But these have no fees and or amount .. so maybe not?
|
|
REQUEST_STAKE_UNLOCK::response wallet_rpc_server::invoke(REQUEST_STAKE_UNLOCK::request&& req)
|
|
{
|
|
require_open();
|
|
REQUEST_STAKE_UNLOCK::response res{};
|
|
|
|
crypto::public_key snode_key = {};
|
|
if (!tools::hex_to_type(req.service_node_key, snode_key))
|
|
throw wallet_rpc_error{error_code::WRONG_KEY, std::string("Unparsable service node key given: ") + req.service_node_key};
|
|
|
|
tools::wallet2::request_stake_unlock_result unlock_result = m_wallet->can_request_stake_unlock(snode_key);
|
|
if (unlock_result.success)
|
|
{
|
|
try
|
|
{
|
|
m_wallet->commit_tx(unlock_result.ptx);
|
|
}
|
|
catch(const std::exception &e)
|
|
{
|
|
throw wallet_rpc_error{error_code::GENERIC_TRANSFER_ERROR, "Failed to commit tx."};
|
|
}
|
|
}
|
|
else
|
|
throw wallet_rpc_error{error_code::GENERIC_TRANSFER_ERROR, "Cannot request stake unlock: " + unlock_result.msg};
|
|
|
|
res.unlocked = unlock_result.success;
|
|
res.msg = unlock_result.msg;
|
|
return res;
|
|
}
|
|
|
|
LNS_BUY_MAPPING::response wallet_rpc_server::invoke(LNS_BUY_MAPPING::request&& req)
|
|
{
|
|
require_open();
|
|
LNS_BUY_MAPPING::response res{};
|
|
|
|
std::string reason;
|
|
auto type = m_wallet->lns_validate_type(req.type, lns::lns_tx_type::buy, &reason);
|
|
if (!type)
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Invalid LNS buy type: " + reason};
|
|
|
|
std::vector<wallet2::pending_tx> ptx_vector = m_wallet->lns_create_buy_mapping_tx(*type,
|
|
req.owner.size() ? &req.owner : nullptr,
|
|
req.backup_owner.size() ? &req.backup_owner : nullptr,
|
|
req.name,
|
|
req.value,
|
|
&reason,
|
|
req.priority,
|
|
req.account_index,
|
|
req.subaddr_indices);
|
|
if (ptx_vector.empty())
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Failed to create LNS transaction: " + reason};
|
|
|
|
//Save the LNS record to the wallet cache
|
|
std::string name_hash_str = lns::name_to_base64_hash(req.name);
|
|
tools::wallet2::lns_detail detail = {
|
|
*type,
|
|
req.name,
|
|
name_hash_str};
|
|
m_wallet->set_lns_cache_record(detail);
|
|
|
|
fill_response( ptx_vector,
|
|
req.get_tx_key,
|
|
res.tx_key,
|
|
res.amount,
|
|
res.fee,
|
|
res.multisig_txset,
|
|
res.unsigned_txset,
|
|
req.do_not_relay,
|
|
false /*blink*/,
|
|
res.tx_hash,
|
|
req.get_tx_hex,
|
|
res.tx_blob,
|
|
req.get_tx_metadata,
|
|
res.tx_metadata);
|
|
|
|
return res;
|
|
}
|
|
|
|
LNS_RENEW_MAPPING::response wallet_rpc_server::invoke(LNS_RENEW_MAPPING::request&& req)
|
|
{
|
|
require_open();
|
|
LNS_RENEW_MAPPING::response res{};
|
|
|
|
std::string reason;
|
|
auto type = m_wallet->lns_validate_type(req.type, lns::lns_tx_type::renew, &reason);
|
|
if (!type)
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Invalid LNS renewal type: " + reason};
|
|
|
|
std::vector<wallet2::pending_tx> ptx_vector = m_wallet->lns_create_renewal_tx(
|
|
*type, req.name, &reason, req.priority, req.account_index, req.subaddr_indices);
|
|
|
|
if (ptx_vector.empty())
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Failed to create LNS renewal transaction: " + reason};
|
|
|
|
fill_response( ptx_vector,
|
|
req.get_tx_key,
|
|
res.tx_key,
|
|
res.amount,
|
|
res.fee,
|
|
res.multisig_txset,
|
|
res.unsigned_txset,
|
|
req.do_not_relay,
|
|
false /*blink*/,
|
|
res.tx_hash,
|
|
req.get_tx_hex,
|
|
res.tx_blob,
|
|
req.get_tx_metadata,
|
|
res.tx_metadata);
|
|
|
|
return res;
|
|
}
|
|
|
|
LNS_UPDATE_MAPPING::response wallet_rpc_server::invoke(LNS_UPDATE_MAPPING::request&& req)
|
|
{
|
|
require_open();
|
|
LNS_UPDATE_MAPPING::response res{};
|
|
|
|
std::string reason;
|
|
auto type = m_wallet->lns_validate_type(req.type, lns::lns_tx_type::update, &reason);
|
|
if (!type)
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Invalid LNS update type: " + reason};
|
|
|
|
std::vector<wallet2::pending_tx> ptx_vector =
|
|
m_wallet->lns_create_update_mapping_tx(*type,
|
|
req.name,
|
|
req.value.empty() ? nullptr : &req.value,
|
|
req.owner.empty() ? nullptr : &req.owner,
|
|
req.backup_owner.empty() ? nullptr : &req.backup_owner,
|
|
req.signature.empty() ? nullptr : &req.signature,
|
|
&reason,
|
|
req.priority,
|
|
req.account_index,
|
|
req.subaddr_indices);
|
|
|
|
if (ptx_vector.empty())
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Failed to create LNS update transaction: " + reason};
|
|
|
|
// Save the updated LNS record to the wallet cache
|
|
std::string name_hash_str = lns::name_to_base64_hash(req.name);
|
|
m_wallet->delete_lns_cache_record(name_hash_str);
|
|
tools::wallet2::lns_detail detail = {
|
|
*type,
|
|
req.name,
|
|
name_hash_str};
|
|
m_wallet->set_lns_cache_record(detail);
|
|
|
|
fill_response( ptx_vector,
|
|
req.get_tx_key,
|
|
res.tx_key,
|
|
res.amount,
|
|
res.fee,
|
|
res.multisig_txset,
|
|
res.unsigned_txset,
|
|
req.do_not_relay,
|
|
false /*blink*/,
|
|
res.tx_hash,
|
|
req.get_tx_hex,
|
|
res.tx_blob,
|
|
req.get_tx_metadata,
|
|
res.tx_metadata);
|
|
|
|
return res;
|
|
}
|
|
|
|
LNS_MAKE_UPDATE_SIGNATURE::response wallet_rpc_server::invoke(LNS_MAKE_UPDATE_SIGNATURE::request&& req)
|
|
{
|
|
require_open();
|
|
LNS_MAKE_UPDATE_SIGNATURE::response res{};
|
|
|
|
std::string reason;
|
|
lns::mapping_type type;
|
|
std::optional<uint8_t> hf_version = m_wallet->get_hard_fork_version();
|
|
if (!hf_version) throw wallet_rpc_error{error_code::HF_QUERY_FAILED, tools::ERR_MSG_NETWORK_VERSION_QUERY_FAILED};
|
|
if (!lns::validate_mapping_type(req.type, *hf_version, lns::lns_tx_type::update, &type, &reason))
|
|
throw wallet_rpc_error{error_code::WRONG_LNS_TYPE, "Wrong lns type given=" + reason};
|
|
|
|
lns::generic_signature signature;
|
|
if (!m_wallet->lns_make_update_mapping_signature(type,
|
|
req.name,
|
|
req.encrypted_value.size() ? &req.encrypted_value : nullptr,
|
|
req.owner.size() ? &req.owner : nullptr,
|
|
req.backup_owner.size() ? &req.backup_owner : nullptr,
|
|
signature,
|
|
req.account_index,
|
|
&reason))
|
|
throw wallet_rpc_error{error_code::TX_NOT_POSSIBLE, "Failed to create signature for LNS update transaction: " + reason};
|
|
|
|
res.signature = tools::type_to_hex(signature.ed25519);
|
|
return res;
|
|
}
|
|
|
|
LNS_HASH_NAME::response wallet_rpc_server::invoke(LNS_HASH_NAME::request&& req)
|
|
{
|
|
require_open();
|
|
LNS_HASH_NAME::response res{};
|
|
|
|
std::string reason;
|
|
lns::mapping_type type;
|
|
std::optional<uint8_t> hf_version = m_wallet->get_hard_fork_version();
|
|
if (!hf_version) throw wallet_rpc_error{error_code::HF_QUERY_FAILED, tools::ERR_MSG_NETWORK_VERSION_QUERY_FAILED};
|
|
if (!lns::validate_mapping_type(req.type, *hf_version, lns::lns_tx_type::lookup, &type, &reason))
|
|
throw wallet_rpc_error{error_code::WRONG_LNS_TYPE, "Wrong lns type given=" + reason};
|
|
|
|
if (!lns::validate_lns_name(type, req.name, &reason))
|
|
throw wallet_rpc_error{error_code::LNS_BAD_NAME, "Bad lns name given=" + reason};
|
|
|
|
res.name = lns::name_to_base64_hash(req.name);
|
|
return res;
|
|
}
|
|
|
|
LNS_KNOWN_NAMES::response wallet_rpc_server::invoke(LNS_KNOWN_NAMES::request&& req)
|
|
{
|
|
require_open();
|
|
LNS_KNOWN_NAMES::response res{};
|
|
|
|
std::vector<lns::mapping_type> entry_types;
|
|
auto cache = m_wallet->get_lns_cache();
|
|
res.known_names.reserve(cache.size());
|
|
entry_types.reserve(cache.size());
|
|
for (auto& [name, details] : m_wallet->get_lns_cache())
|
|
{
|
|
auto& entry = res.known_names.emplace_back();
|
|
auto& type = entry_types.emplace_back(details.type);
|
|
if (type > lns::mapping_type::lokinet && type <= lns::mapping_type::lokinet_10years)
|
|
type = lns::mapping_type::lokinet;
|
|
entry.type = lns::mapping_type_str(type);
|
|
entry.hashed = details.hashed_name;
|
|
entry.name = details.name;
|
|
}
|
|
|
|
auto nettype = m_wallet->nettype();
|
|
rpc::LNS_NAMES_TO_OWNERS::request lookup_req{};
|
|
lookup_req.include_expired = req.include_expired;
|
|
|
|
uint64_t curr_height = req.include_expired ? m_wallet->get_blockchain_current_height() : 0;
|
|
|
|
// Query oxend for the full record info
|
|
for (auto it = res.known_names.begin(); it != res.known_names.end(); )
|
|
{
|
|
const size_t num_entries = std::distance(it, res.known_names.end());
|
|
const auto end = num_entries < rpc::LNS_NAMES_TO_OWNERS::MAX_REQUEST_ENTRIES
|
|
? res.known_names.end()
|
|
: it + rpc::LNS_NAMES_TO_OWNERS::MAX_REQUEST_ENTRIES;
|
|
lookup_req.entries.clear();
|
|
lookup_req.entries.reserve(std::distance(it, end));
|
|
for (auto it2 = it; it2 != end; it2++)
|
|
{
|
|
auto& e = lookup_req.entries.emplace_back();
|
|
e.name_hash = it2->hashed;
|
|
e.types.push_back(static_cast<uint16_t>(entry_types[std::distance(res.known_names.begin(), it2)]));
|
|
}
|
|
|
|
if (auto [success, records] = m_wallet->lns_names_to_owners(lookup_req); success)
|
|
{
|
|
size_t type_offset = std::distance(res.known_names.begin(), it);
|
|
for (auto& rec : records)
|
|
{
|
|
if (rec.entry_index >= num_entries)
|
|
{
|
|
MWARNING("Got back invalid entry_index " << rec.entry_index << " for a request for " << num_entries << " entries");
|
|
continue;
|
|
}
|
|
|
|
auto& res_e = *(it + rec.entry_index);
|
|
res_e.owner = std::move(rec.owner);
|
|
res_e.backup_owner = std::move(rec.backup_owner);
|
|
res_e.encrypted_value = std::move(rec.encrypted_value);
|
|
res_e.update_height = rec.update_height;
|
|
res_e.expiration_height = rec.expiration_height;
|
|
if (req.include_expired && res_e.expiration_height)
|
|
res_e.expired = *res_e.expiration_height < curr_height;
|
|
res_e.txid = std::move(rec.txid);
|
|
|
|
if (req.decrypt && !res_e.encrypted_value.empty() && lokimq::is_hex(res_e.encrypted_value))
|
|
{
|
|
lns::mapping_value value;
|
|
const auto type = entry_types[type_offset + rec.entry_index];
|
|
std::string errmsg;
|
|
if (lns::mapping_value::validate_encrypted(type, lokimq::from_hex(res_e.encrypted_value), &value, &errmsg)
|
|
&& value.decrypt(res_e.name, type))
|
|
res_e.value = value.to_readable_value(nettype, type);
|
|
else
|
|
MWARNING("Failed to decrypt LNS value for " << res_e.name << (errmsg.empty() ? ""s : ": " + errmsg));
|
|
}
|
|
}
|
|
}
|
|
|
|
it = end;
|
|
}
|
|
|
|
// Erase anything we didn't get a response for (it will have update_height of 0)
|
|
res.known_names.erase(std::remove_if(res.known_names.begin(), res.known_names.end(),
|
|
[](const auto& n) { return n.update_height == 0; }),
|
|
res.known_names.end());
|
|
|
|
// Now sort whatever we got back
|
|
std::sort(res.known_names.begin(), res.known_names.end(),
|
|
[](const auto& a, const auto& b) { return std::make_pair(a.name, a.type) < std::make_pair(b.name, b.type); });
|
|
|
|
return res;
|
|
}
|
|
|
|
LNS_ADD_KNOWN_NAMES::response wallet_rpc_server::invoke(LNS_ADD_KNOWN_NAMES::request&& req)
|
|
{
|
|
require_open();
|
|
|
|
std::optional<uint8_t> hf_version = m_wallet->get_hard_fork_version();
|
|
if (!hf_version) throw wallet_rpc_error{error_code::HF_QUERY_FAILED, tools::ERR_MSG_NETWORK_VERSION_QUERY_FAILED};
|
|
|
|
std::string reason;
|
|
for (auto& rec : req.names)
|
|
{
|
|
lns::mapping_type type;
|
|
if (!lns::validate_mapping_type(rec.type, *hf_version, lns::lns_tx_type::lookup, &type, &reason))
|
|
throw wallet_rpc_error{error_code::WRONG_LNS_TYPE, "Invalid LNS type: " + reason};
|
|
|
|
auto name = tools::lowercase_ascii_string(rec.name);
|
|
if (!lns::validate_lns_name(type, name, &reason))
|
|
throw wallet_rpc_error{error_code::LNS_BAD_NAME, "Invalid LNS name '" + name + "': " + reason};
|
|
|
|
m_wallet->set_lns_cache_record({type, name, lns::name_to_base64_hash(name)});
|
|
}
|
|
|
|
return {};
|
|
}
|
|
|
|
LNS_DECRYPT_VALUE::response wallet_rpc_server::invoke(LNS_DECRYPT_VALUE::request&& req)
|
|
{
|
|
require_open();
|
|
LNS_DECRYPT_VALUE::response res{};
|
|
|
|
// ---------------------------------------------------------------------------------------------
|
|
//
|
|
// Validate encrypted value
|
|
//
|
|
// ---------------------------------------------------------------------------------------------
|
|
if (req.encrypted_value.size() % 2 != 0)
|
|
throw wallet_rpc_error{error_code::LNS_VALUE_LENGTH_NOT_EVEN, "Value length not divisible by 2, length=" + std::to_string(req.encrypted_value.size())};
|
|
|
|
if (req.encrypted_value.size() >= (lns::mapping_value::BUFFER_SIZE * 2))
|
|
throw wallet_rpc_error{error_code::LNS_VALUE_TOO_LONG, "Value too long to decrypt=" + req.encrypted_value};
|
|
|
|
if (!lokimq::is_hex(req.encrypted_value))
|
|
throw wallet_rpc_error{error_code::LNS_VALUE_NOT_HEX, "Value is not hex=" + req.encrypted_value};
|
|
|
|
// ---------------------------------------------------------------------------------------------
|
|
//
|
|
// Validate type and name
|
|
//
|
|
// ---------------------------------------------------------------------------------------------
|
|
std::string reason;
|
|
lns::mapping_type type = {};
|
|
|
|
std::optional<uint8_t> hf_version = m_wallet->get_hard_fork_version();
|
|
if (!hf_version) throw wallet_rpc_error{error_code::HF_QUERY_FAILED, tools::ERR_MSG_NETWORK_VERSION_QUERY_FAILED};
|
|
{
|
|
if (!lns::validate_mapping_type(req.type, *hf_version, lns::lns_tx_type::lookup, &type, &reason))
|
|
throw wallet_rpc_error{error_code::WRONG_LNS_TYPE, "Invalid LNS type: " + reason};
|
|
|
|
if (!lns::validate_lns_name(type, req.name, &reason))
|
|
throw wallet_rpc_error{error_code::LNS_BAD_NAME, "Invalid LNS name '" + req.name + "': " + reason};
|
|
}
|
|
|
|
// ---------------------------------------------------------------------------------------------
|
|
//
|
|
// Decrypt value
|
|
//
|
|
// ---------------------------------------------------------------------------------------------
|
|
lns::mapping_value value = {};
|
|
value.len = req.encrypted_value.size() / 2;
|
|
value.encrypted = true;
|
|
lokimq::from_hex(req.encrypted_value.begin(), req.encrypted_value.end(), value.buffer.begin());
|
|
|
|
if (!value.decrypt(req.name, type))
|
|
throw wallet_rpc_error{error_code::LNS_VALUE_NOT_HEX, "Value decryption failure"};
|
|
|
|
res.value = value.to_readable_value(m_wallet->nettype(), type);
|
|
return res;
|
|
}
|
|
|
|
LNS_ENCRYPT_VALUE::response wallet_rpc_server::invoke(LNS_ENCRYPT_VALUE::request&& req)
|
|
{
|
|
require_open();
|
|
|
|
if (req.value.size() > lns::mapping_value::BUFFER_SIZE)
|
|
throw wallet_rpc_error{error_code::LNS_VALUE_TOO_LONG, "LNS value '" + req.value + "' is too long"};
|
|
|
|
std::string reason;
|
|
std::optional<uint8_t> hf_version = m_wallet->get_hard_fork_version();
|
|
if (!hf_version) throw wallet_rpc_error{error_code::HF_QUERY_FAILED, tools::ERR_MSG_NETWORK_VERSION_QUERY_FAILED};
|
|
|
|
lns::mapping_type type;
|
|
if (!lns::validate_mapping_type(req.type, *hf_version, lns::lns_tx_type::lookup, &type, &reason))
|
|
throw wallet_rpc_error{error_code::WRONG_LNS_TYPE, "Wrong lns type given=" + reason};
|
|
|
|
if (!lns::validate_lns_name(type, req.name, &reason))
|
|
throw wallet_rpc_error{error_code::LNS_BAD_NAME, "Invalid LNS name '" + req.name + "': " + reason};
|
|
|
|
lns::mapping_value value;
|
|
if (!lns::mapping_value::validate(m_wallet->nettype(), type, req.value, &value, &reason))
|
|
throw wallet_rpc_error{error_code::LNS_BAD_VALUE, "Invalid LNS value '" + req.value + "': " + reason};
|
|
|
|
bool old_argon2 = type == lns::mapping_type::session && *hf_version < cryptonote::network_version_16_pulse;
|
|
if (!value.encrypt(req.name, nullptr, old_argon2))
|
|
throw wallet_rpc_error{error_code::LNS_VALUE_ENCRYPT_FAILED, "Value encryption failure"};
|
|
|
|
return {lokimq::to_hex(value.to_view())};
|
|
}
|
|
|
|
std::unique_ptr<tools::wallet2> wallet_rpc_server::load_wallet()
|
|
{
|
|
std::unique_ptr<tools::wallet2> wal;
|
|
{
|
|
const bool testnet = tools::wallet2::has_testnet_option(m_vm);
|
|
const bool devnet = tools::wallet2::has_devnet_option(m_vm);
|
|
if (testnet && devnet)
|
|
throw std::logic_error{tr("Can't specify more than one of --testnet and --devnet")};
|
|
|
|
const auto arg_wallet_file = wallet_args::arg_wallet_file();
|
|
const auto arg_from_json = wallet_args::arg_generate_from_json();
|
|
|
|
const auto wallet_file = command_line::get_arg(m_vm, arg_wallet_file);
|
|
const auto from_json = command_line::get_arg(m_vm, arg_from_json);
|
|
const auto wallet_dir = command_line::get_arg(m_vm, arg_wallet_dir);
|
|
const auto prompt_for_password = command_line::get_arg(m_vm, arg_prompt_for_password);
|
|
const auto password_prompt = prompt_for_password ? password_prompter : nullptr;
|
|
|
|
if(!wallet_file.empty() && !from_json.empty())
|
|
throw std::logic_error{tr("Can't specify more than one of --wallet-file and --generate-from-json")};
|
|
|
|
if (!wallet_dir.empty())
|
|
return nullptr;
|
|
|
|
if (wallet_file.empty() && from_json.empty())
|
|
throw std::logic_error{tr("Must specify --wallet-file or --generate-from-json or --wallet-dir")};
|
|
|
|
LOG_PRINT_L0(tools::wallet_rpc_server::tr("Loading wallet..."));
|
|
if(!wallet_file.empty())
|
|
wal = tools::wallet2::make_from_file(m_vm, true, wallet_file, password_prompt).first;
|
|
else
|
|
wal = tools::wallet2::make_from_json(m_vm, true, from_json, password_prompt).first;
|
|
|
|
if (!wal) // safety check (the above should throw on error)
|
|
throw std::runtime_error{"Failed to create wallet: (unknown reason)"};
|
|
|
|
bool quit = false;
|
|
tools::signal_handler::install([&wal, &quit](int) {
|
|
assert(wal);
|
|
quit = true;
|
|
wal->stop();
|
|
});
|
|
|
|
wal->refresh(wal->is_trusted_daemon());
|
|
// if we ^C during potentially length load/refresh, there's no server loop yet
|
|
if (quit)
|
|
{
|
|
MINFO(tools::wallet_rpc_server::tr("Saving wallet..."));
|
|
wal->store();
|
|
MINFO(tools::wallet_rpc_server::tr("Successfully saved"));
|
|
throw std::runtime_error{tr("Wallet loading cancelled before initial refresh completed")};
|
|
}
|
|
MINFO(tools::wallet_rpc_server::tr("Successfully loaded"));
|
|
}
|
|
return wal;
|
|
}
|
|
|
|
bool wallet_rpc_server::run(bool)
|
|
{
|
|
std::unique_ptr<tools::wallet2> wal;
|
|
try
|
|
{
|
|
wal = load_wallet();
|
|
}
|
|
catch (const std::exception& e)
|
|
{
|
|
LOG_ERROR(tr("Wallet initialization failed: ") << e.what());
|
|
return false;
|
|
}
|
|
|
|
m_long_poll_disabled = tools::wallet2::has_disable_rpc_long_poll(m_vm);
|
|
if (wal) m_wallet = std::move(wal);
|
|
bool r = init();
|
|
CHECK_AND_ASSERT_MES(r, false, tools::wallet_rpc_server::tr("Failed to initialize wallet RPC server"));
|
|
tools::signal_handler::install([this](int) {
|
|
MWARNING("Shutting down...");
|
|
m_stop = true;
|
|
});
|
|
|
|
LOG_PRINT_L0(tools::wallet_rpc_server::tr("Starting wallet RPC server"));
|
|
try
|
|
{
|
|
run_loop();
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
LOG_ERROR(tools::wallet_rpc_server::tr("Failed to run wallet: ") << e.what());
|
|
return false;
|
|
}
|
|
LOG_PRINT_L0(tools::wallet_rpc_server::tr("Stopped wallet RPC server"));
|
|
try
|
|
{
|
|
if (m_wallet)
|
|
{
|
|
LOG_PRINT_L0(tools::wallet_rpc_server::tr("Saving wallet..."));
|
|
m_wallet->store();
|
|
m_wallet->deinit();
|
|
m_wallet.reset();
|
|
LOG_PRINT_L0(tools::wallet_rpc_server::tr("Successfully saved"));
|
|
}
|
|
}
|
|
catch (const std::exception& e)
|
|
{
|
|
LOG_ERROR(tools::wallet_rpc_server::tr("Failed to save wallet: ") << e.what());
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void wallet_rpc_server::stop()
|
|
{
|
|
m_stop = true;
|
|
}
|
|
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
TRY_ENTRY();
|
|
|
|
namespace po = boost::program_options;
|
|
|
|
const auto arg_wallet_file = wallet_args::arg_wallet_file();
|
|
const auto arg_from_json = wallet_args::arg_generate_from_json();
|
|
|
|
auto opt_size = command_line::boost_option_sizes();
|
|
|
|
po::options_description desc_params(wallet_args::tr("Wallet options"), opt_size.first, opt_size.second);
|
|
po::options_description hidden_params("Hidden");
|
|
tools::wallet2::init_options(desc_params, hidden_params);
|
|
command_line::add_arg(desc_params, arg_rpc_bind_port);
|
|
command_line::add_arg(desc_params, arg_disable_rpc_login);
|
|
command_line::add_arg(desc_params, arg_restricted);
|
|
cryptonote::rpc_args::init_options(desc_params, hidden_params);
|
|
command_line::add_arg(desc_params, arg_wallet_file);
|
|
command_line::add_arg(desc_params, arg_from_json);
|
|
command_line::add_arg(desc_params, arg_wallet_dir);
|
|
command_line::add_arg(desc_params, arg_prompt_for_password);
|
|
|
|
daemonizer::init_options(hidden_params, desc_params);
|
|
|
|
auto [vm, should_terminate] = wallet_args::main(
|
|
argc, argv,
|
|
"oxen-wallet-rpc [--wallet-file=<file>|--generate-from-json=<file>|--wallet-dir=<directory>] [--rpc-bind-port=<port>]",
|
|
tools::wallet_rpc_server::tr("This is the RPC oxen wallet. It needs to connect to a oxen\ndaemon to work correctly."),
|
|
desc_params, hidden_params,
|
|
po::positional_options_description(),
|
|
[](const std::string &s, bool emphasis){ epee::set_console_color(emphasis ? epee::console_color_white : epee::console_color_default, emphasis); std::cout << s << std::endl; if (emphasis) epee::reset_console_color(); },
|
|
"oxen-wallet-rpc.log",
|
|
true
|
|
);
|
|
if (!vm)
|
|
return 1;
|
|
if (should_terminate)
|
|
return 0;
|
|
|
|
return daemonizer::daemonize<tools::wallet_rpc_server>("Wallet RPC Daemon", argc, const_cast<const char**>(argv), std::move(*vm))
|
|
? 0 : 1;
|
|
|
|
CATCH_ENTRY_L0("main", 1);
|
|
}
|