2016-09-20 12:19:07 +02:00
|
|
|
extern crate futures;
|
2017-04-13 16:32:07 +02:00
|
|
|
extern crate rpassword;
|
2016-09-20 12:19:07 +02:00
|
|
|
|
|
|
|
extern crate ethcore_util as util;
|
|
|
|
extern crate ethcore_bigint as bigint;
|
|
|
|
|
2017-04-13 16:32:07 +02:00
|
|
|
extern crate parity_rpc as rpc;
|
2016-09-20 12:19:07 +02:00
|
|
|
extern crate parity_rpc_client as client;
|
|
|
|
|
|
|
|
use rpc::v1::types::{U256, ConfirmationRequest};
|
2016-10-18 19:13:43 +02:00
|
|
|
use client::signer_client::SignerRpc;
|
2016-09-20 12:19:07 +02:00
|
|
|
use std::io::{Write, BufRead, BufReader, stdout, stdin};
|
|
|
|
use std::path::PathBuf;
|
|
|
|
use std::fs::File;
|
|
|
|
|
|
|
|
use futures::Future;
|
|
|
|
|
2016-11-02 15:55:03 +01:00
|
|
|
fn sign_interactive(
|
|
|
|
signer: &mut SignerRpc,
|
|
|
|
password: &str,
|
2016-11-02 17:14:05 +01:00
|
|
|
request: ConfirmationRequest
|
|
|
|
) {
|
2016-09-20 12:19:07 +02:00
|
|
|
print!("\n{}\nSign this transaction? (y)es/(N)o/(r)eject: ", request);
|
2016-09-29 14:48:44 +02:00
|
|
|
let _ = stdout().flush();
|
2016-09-20 12:19:07 +02:00
|
|
|
match BufReader::new(stdin()).lines().next() {
|
|
|
|
Some(Ok(line)) => {
|
|
|
|
match line.to_lowercase().chars().nth(0) {
|
|
|
|
Some('y') => {
|
2016-09-30 15:30:17 +02:00
|
|
|
match sign_transaction(signer, request.id, password) {
|
2016-09-20 12:19:07 +02:00
|
|
|
Ok(s) | Err(s) => println!("{}", s),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Some('r') => {
|
|
|
|
match reject_transaction(signer, request.id) {
|
|
|
|
Ok(s) | Err(s) => println!("{}", s),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => ()
|
|
|
|
}
|
|
|
|
}
|
2016-09-29 14:48:44 +02:00
|
|
|
_ => println!("Could not read from stdin")
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-02 15:55:03 +01:00
|
|
|
fn sign_transactions(
|
2016-11-02 17:14:05 +01:00
|
|
|
signer: &mut SignerRpc,
|
|
|
|
password: String
|
2016-11-02 15:55:03 +01:00
|
|
|
) -> Result<String, String> {
|
2016-12-27 12:53:56 +01:00
|
|
|
signer.requests_to_confirm().map(|reqs| {
|
2016-09-20 12:19:07 +02:00
|
|
|
match reqs {
|
2016-09-30 15:30:17 +02:00
|
|
|
Ok(ref reqs) if reqs.is_empty() => {
|
|
|
|
Ok("No transactions in signing queue".to_owned())
|
|
|
|
}
|
2016-09-20 12:19:07 +02:00
|
|
|
Ok(reqs) => {
|
2016-09-30 15:30:17 +02:00
|
|
|
for r in reqs {
|
|
|
|
sign_interactive(signer, &password, r)
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
2016-09-30 15:30:17 +02:00
|
|
|
Ok("".to_owned())
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
Err(err) => {
|
|
|
|
Err(format!("error: {:?}", err))
|
|
|
|
}
|
|
|
|
}
|
2016-09-30 15:30:17 +02:00
|
|
|
}).map_err(|err| {
|
|
|
|
format!("{:?}", err)
|
2016-12-27 12:53:56 +01:00
|
|
|
}).wait()?
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
fn list_transactions(signer: &mut SignerRpc) -> Result<String, String> {
|
2016-12-27 12:53:56 +01:00
|
|
|
signer.requests_to_confirm().map(|reqs| {
|
2016-09-20 12:19:07 +02:00
|
|
|
match reqs {
|
2016-09-30 15:30:17 +02:00
|
|
|
Ok(ref reqs) if reqs.is_empty() => {
|
|
|
|
Ok("No transactions in signing queue".to_owned())
|
|
|
|
}
|
|
|
|
Ok(ref reqs) => {
|
|
|
|
Ok(format!("Transaction queue:\n{}", reqs
|
|
|
|
.iter()
|
|
|
|
.map(|r| format!("{}", r))
|
|
|
|
.collect::<Vec<String>>()
|
|
|
|
.join("\n")))
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
Err(err) => {
|
|
|
|
Err(format!("error: {:?}", err))
|
|
|
|
}
|
|
|
|
}
|
2016-09-30 15:30:17 +02:00
|
|
|
}).map_err(|err| {
|
|
|
|
format!("{:?}", err)
|
2016-12-27 12:53:56 +01:00
|
|
|
}).wait()?
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
|
2016-11-02 15:55:03 +01:00
|
|
|
fn sign_transaction(
|
|
|
|
signer: &mut SignerRpc, id: U256, password: &str
|
|
|
|
) -> Result<String, String> {
|
2016-12-27 12:53:56 +01:00
|
|
|
signer.confirm_request(id, None, None, None, password).map(|res| {
|
2016-09-20 12:19:07 +02:00
|
|
|
match res {
|
|
|
|
Ok(u) => Ok(format!("Signed transaction id: {:#x}", u)),
|
|
|
|
Err(e) => Err(format!("{:?}", e)),
|
|
|
|
}
|
2016-09-30 15:30:17 +02:00
|
|
|
}).map_err(|err| {
|
|
|
|
format!("{:?}", err)
|
2016-12-27 12:53:56 +01:00
|
|
|
}).wait()?
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
|
2016-11-02 15:55:03 +01:00
|
|
|
fn reject_transaction(
|
|
|
|
signer: &mut SignerRpc, id: U256) -> Result<String, String>
|
|
|
|
{
|
2016-12-27 12:53:56 +01:00
|
|
|
signer.reject_request(id).map(|res| {
|
2016-09-20 12:19:07 +02:00
|
|
|
match res {
|
|
|
|
Ok(true) => Ok(format!("Rejected transaction id {:#x}", id)),
|
|
|
|
Ok(false) => Err(format!("No such request")),
|
|
|
|
Err(e) => Err(format!("{:?}", e)),
|
|
|
|
}
|
2016-09-30 15:30:17 +02:00
|
|
|
}).map_err(|err| {
|
|
|
|
format!("{:?}", err)
|
2016-12-27 12:53:56 +01:00
|
|
|
}).wait()?
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// cmds
|
|
|
|
|
2016-12-15 18:23:02 +01:00
|
|
|
pub fn signer_list(
|
2016-11-02 15:55:03 +01:00
|
|
|
signerport: u16, authfile: PathBuf
|
|
|
|
) -> Result<String, String> {
|
|
|
|
let addr = &format!("ws://127.0.0.1:{}", signerport);
|
2016-12-27 12:53:56 +01:00
|
|
|
let mut signer = SignerRpc::new(addr, &authfile).map_err(|err| {
|
2016-09-30 15:30:17 +02:00
|
|
|
format!("{:?}", err)
|
2016-12-27 12:53:56 +01:00
|
|
|
})?;
|
2016-09-30 15:30:17 +02:00
|
|
|
list_transactions(&mut signer)
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
|
2016-12-15 18:23:02 +01:00
|
|
|
pub fn signer_reject(
|
2016-11-02 15:55:03 +01:00
|
|
|
id: Option<usize>, signerport: u16, authfile: PathBuf
|
|
|
|
) -> Result<String, String> {
|
2016-12-27 12:53:56 +01:00
|
|
|
let id = id.ok_or(format!("id required for signer reject"))?;
|
2016-11-02 15:55:03 +01:00
|
|
|
let addr = &format!("ws://127.0.0.1:{}", signerport);
|
2016-12-27 12:53:56 +01:00
|
|
|
let mut signer = SignerRpc::new(addr, &authfile).map_err(|err| {
|
2016-09-30 15:30:17 +02:00
|
|
|
format!("{:?}", err)
|
2016-12-27 12:53:56 +01:00
|
|
|
})?;
|
2016-09-30 15:30:17 +02:00
|
|
|
reject_transaction(&mut signer, U256::from(id))
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
|
2016-12-15 18:23:02 +01:00
|
|
|
pub fn signer_sign(
|
2016-11-02 15:55:03 +01:00
|
|
|
id: Option<usize>,
|
|
|
|
pwfile: Option<PathBuf>,
|
|
|
|
signerport: u16,
|
|
|
|
authfile: PathBuf
|
|
|
|
) -> Result<String, String> {
|
2016-09-30 15:30:17 +02:00
|
|
|
let password;
|
2016-09-20 12:19:07 +02:00
|
|
|
match pwfile {
|
|
|
|
Some(pwfile) => {
|
|
|
|
match File::open(pwfile) {
|
|
|
|
Ok(fd) => {
|
|
|
|
match BufReader::new(fd).lines().next() {
|
2016-09-30 15:30:17 +02:00
|
|
|
Some(Ok(line)) => password = line,
|
2016-09-20 12:19:07 +02:00
|
|
|
_ => return Err(format!("No password in file"))
|
|
|
|
}
|
|
|
|
},
|
2016-11-02 17:14:05 +01:00
|
|
|
Err(e) =>
|
|
|
|
return Err(format!("Could not open password file: {}", e))
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
None => {
|
2016-09-30 15:30:17 +02:00
|
|
|
password = match rpassword::prompt_password_stdout("Password: ") {
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => return Err(format!("{}", e)),
|
|
|
|
}
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-02 17:14:05 +01:00
|
|
|
let addr = &format!("ws://127.0.0.1:{}", signerport);
|
2016-12-27 12:53:56 +01:00
|
|
|
let mut signer = SignerRpc::new(addr, &authfile).map_err(|err| {
|
2016-09-30 15:30:17 +02:00
|
|
|
format!("{:?}", err)
|
2016-12-27 12:53:56 +01:00
|
|
|
})?;
|
2016-09-30 15:30:17 +02:00
|
|
|
|
|
|
|
match id {
|
|
|
|
Some(id) => {
|
|
|
|
sign_transaction(&mut signer, U256::from(id), &password)
|
|
|
|
},
|
|
|
|
None => {
|
|
|
|
sign_transactions(&mut signer, password)
|
2016-09-20 12:19:07 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|