2017-01-25 18:51:41 +01:00
|
|
|
// Copyright 2015-2017 Parity Technologies (UK) Ltd.
|
2016-03-04 12:46:54 +01:00
|
|
|
// This file is part of Parity.
|
|
|
|
|
|
|
|
// Parity is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
|
|
|
|
// Parity is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
|
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2016-03-04 12:53:18 +01:00
|
|
|
//! Account management (personal) rpc implementation
|
2017-05-28 14:40:36 +02:00
|
|
|
use std::sync::Arc;
|
2018-04-14 21:35:58 +02:00
|
|
|
use std::time::Duration;
|
2016-11-06 12:51:53 +01:00
|
|
|
|
2018-01-10 21:44:10 +01:00
|
|
|
use bytes::{Bytes, ToPretty};
|
2018-01-11 17:49:10 +01:00
|
|
|
use ethcore::account_provider::AccountProvider;
|
|
|
|
use transaction::PendingTransaction;
|
2018-01-10 21:44:10 +01:00
|
|
|
use ethereum_types::{H520, U128, Address};
|
|
|
|
use ethkey::{public_to_address, recover, Signature};
|
2018-01-11 17:49:10 +01:00
|
|
|
|
2017-11-14 11:38:17 +01:00
|
|
|
use jsonrpc_core::{BoxFuture, Result};
|
2017-10-05 12:35:01 +02:00
|
|
|
use jsonrpc_core::futures::{future, Future};
|
2016-11-06 12:51:53 +01:00
|
|
|
use v1::helpers::errors;
|
2018-01-10 21:44:10 +01:00
|
|
|
use v1::helpers::dispatch::{self, eth_data_hash, Dispatcher, SignWith};
|
2017-03-29 17:07:58 +02:00
|
|
|
use v1::helpers::accounts::unwrap_provider;
|
2017-01-30 21:08:36 +01:00
|
|
|
use v1::traits::Personal;
|
2018-01-10 21:44:10 +01:00
|
|
|
use v1::types::{
|
|
|
|
H160 as RpcH160, H256 as RpcH256, H520 as RpcH520, U128 as RpcU128,
|
|
|
|
Bytes as RpcBytes,
|
|
|
|
ConfirmationPayload as RpcConfirmationPayload,
|
|
|
|
ConfirmationResponse as RpcConfirmationResponse,
|
|
|
|
TransactionRequest,
|
|
|
|
RichRawTransaction as RpcRichRawTransaction,
|
|
|
|
};
|
2017-01-30 21:08:36 +01:00
|
|
|
use v1::metadata::Metadata;
|
2016-03-04 12:46:54 +01:00
|
|
|
|
2016-03-04 12:53:18 +01:00
|
|
|
/// Account management (personal) rpc implementation.
|
2017-02-08 15:36:53 +01:00
|
|
|
pub struct PersonalClient<D: Dispatcher> {
|
2017-05-28 14:40:36 +02:00
|
|
|
accounts: Option<Arc<AccountProvider>>,
|
2017-02-08 15:36:53 +01:00
|
|
|
dispatcher: D,
|
2016-11-06 12:51:53 +01:00
|
|
|
allow_perm_unlock: bool,
|
2016-03-04 12:46:54 +01:00
|
|
|
}
|
|
|
|
|
2017-02-08 15:36:53 +01:00
|
|
|
impl<D: Dispatcher> PersonalClient<D> {
|
2016-03-04 12:46:54 +01:00
|
|
|
/// Creates new PersonalClient
|
2017-10-24 11:57:55 +02:00
|
|
|
pub fn new(accounts: Option<Arc<AccountProvider>>, dispatcher: D, allow_perm_unlock: bool) -> Self {
|
2016-03-04 12:46:54 +01:00
|
|
|
PersonalClient {
|
2017-10-24 11:57:55 +02:00
|
|
|
accounts,
|
|
|
|
dispatcher,
|
|
|
|
allow_perm_unlock,
|
2016-03-04 12:46:54 +01:00
|
|
|
}
|
|
|
|
}
|
2017-03-29 17:07:58 +02:00
|
|
|
|
2017-11-14 11:38:17 +01:00
|
|
|
fn account_provider(&self) -> Result<Arc<AccountProvider>> {
|
2017-03-29 17:07:58 +02:00
|
|
|
unwrap_provider(&self.accounts)
|
|
|
|
}
|
2016-03-04 12:46:54 +01:00
|
|
|
}
|
|
|
|
|
2017-12-19 10:49:49 +01:00
|
|
|
impl<D: Dispatcher + 'static> PersonalClient<D> {
|
|
|
|
fn do_sign_transaction(&self, meta: Metadata, request: TransactionRequest, password: String) -> BoxFuture<(PendingTransaction, D)> {
|
|
|
|
let dispatcher = self.dispatcher.clone();
|
|
|
|
let accounts = try_bf!(self.account_provider());
|
|
|
|
|
|
|
|
let default = match request.from.as_ref() {
|
|
|
|
Some(account) => Ok(account.clone().into()),
|
|
|
|
None => accounts
|
|
|
|
.dapp_default_address(meta.dapp_id().into())
|
|
|
|
.map_err(|e| errors::account("Cannot find default account.", e)),
|
|
|
|
};
|
|
|
|
|
|
|
|
let default = match default {
|
|
|
|
Ok(default) => default,
|
|
|
|
Err(e) => return Box::new(future::err(e)),
|
|
|
|
};
|
|
|
|
|
|
|
|
Box::new(dispatcher.fill_optional_fields(request.into(), default, false)
|
|
|
|
.and_then(move |filled| {
|
|
|
|
let condition = filled.condition.clone().map(Into::into);
|
|
|
|
dispatcher.sign(accounts, filled, SignWith::Password(password))
|
|
|
|
.map(|tx| tx.into_value())
|
|
|
|
.map(move |tx| PendingTransaction::new(tx, condition))
|
|
|
|
.map(move |tx| (tx, dispatcher))
|
|
|
|
})
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-08 15:36:53 +01:00
|
|
|
impl<D: Dispatcher + 'static> Personal for PersonalClient<D> {
|
2017-01-30 21:08:36 +01:00
|
|
|
type Metadata = Metadata;
|
|
|
|
|
2017-11-14 11:38:17 +01:00
|
|
|
fn accounts(&self) -> Result<Vec<RpcH160>> {
|
2017-03-29 17:07:58 +02:00
|
|
|
let store = self.account_provider()?;
|
2016-12-27 12:53:56 +01:00
|
|
|
let accounts = store.accounts().map_err(|e| errors::account("Could not fetch accounts.", e))?;
|
2016-10-31 17:11:56 +01:00
|
|
|
Ok(accounts.into_iter().map(Into::into).collect::<Vec<RpcH160>>())
|
2016-03-04 12:46:54 +01:00
|
|
|
}
|
|
|
|
|
2017-11-14 11:38:17 +01:00
|
|
|
fn new_account(&self, pass: String) -> Result<RpcH160> {
|
2017-03-29 17:07:58 +02:00
|
|
|
let store = self.account_provider()?;
|
2016-11-06 12:51:53 +01:00
|
|
|
|
|
|
|
store.new_account(&pass)
|
|
|
|
.map(Into::into)
|
|
|
|
.map_err(|e| errors::account("Could not create account.", e))
|
|
|
|
}
|
|
|
|
|
2017-11-14 11:38:17 +01:00
|
|
|
fn unlock_account(&self, account: RpcH160, account_pass: String, duration: Option<RpcU128>) -> Result<bool> {
|
2016-11-06 12:51:53 +01:00
|
|
|
let account: Address = account.into();
|
2017-03-29 17:07:58 +02:00
|
|
|
let store = self.account_provider()?;
|
2016-11-28 17:15:40 +01:00
|
|
|
let duration = match duration {
|
|
|
|
None => None,
|
|
|
|
Some(duration) => {
|
|
|
|
let duration: U128 = duration.into();
|
|
|
|
let v = duration.low_u64() as u32;
|
|
|
|
if duration != v.into() {
|
|
|
|
return Err(errors::invalid_params("Duration", "Invalid Number"));
|
|
|
|
} else {
|
|
|
|
Some(v)
|
|
|
|
}
|
|
|
|
},
|
|
|
|
};
|
2016-11-06 12:51:53 +01:00
|
|
|
|
|
|
|
let r = match (self.allow_perm_unlock, duration) {
|
2017-10-24 11:57:55 +02:00
|
|
|
(false, None) => store.unlock_account_temporarily(account, account_pass),
|
|
|
|
(false, _) => return Err(errors::unsupported(
|
|
|
|
"Time-unlocking is only supported in --geth compatibility mode.",
|
|
|
|
Some("Restart your client with --geth flag or use personal_sendTransaction instead."),
|
|
|
|
)),
|
2016-11-06 12:51:53 +01:00
|
|
|
(true, Some(0)) => store.unlock_account_permanently(account, account_pass),
|
2018-04-14 21:35:58 +02:00
|
|
|
(true, Some(d)) => store.unlock_account_timed(account, account_pass, Duration::from_secs(d.into())),
|
|
|
|
(true, None) => store.unlock_account_timed(account, account_pass, Duration::from_secs(300)),
|
2016-11-06 12:51:53 +01:00
|
|
|
};
|
|
|
|
match r {
|
|
|
|
Ok(_) => Ok(true),
|
2017-10-24 11:57:55 +02:00
|
|
|
Err(err) => Err(errors::account("Unable to unlock the account.", err)),
|
2016-11-06 12:51:53 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-10 21:44:10 +01:00
|
|
|
fn sign(&self, data: RpcBytes, account: RpcH160, password: String) -> BoxFuture<RpcH520> {
|
|
|
|
let dispatcher = self.dispatcher.clone();
|
|
|
|
let accounts = try_bf!(self.account_provider());
|
|
|
|
|
|
|
|
let payload = RpcConfirmationPayload::EthSignMessage((account.clone(), data).into());
|
|
|
|
|
|
|
|
Box::new(dispatch::from_rpc(payload, account.into(), &dispatcher)
|
|
|
|
.and_then(|payload| {
|
|
|
|
dispatch::execute(dispatcher, accounts, payload, dispatch::SignWith::Password(password))
|
|
|
|
})
|
|
|
|
.map(|v| v.into_value())
|
|
|
|
.then(|res| match res {
|
|
|
|
Ok(RpcConfirmationResponse::Signature(signature)) => Ok(signature),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
e => Err(errors::internal("Unexpected result", e)),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn ec_recover(&self, data: RpcBytes, signature: RpcH520) -> BoxFuture<RpcH160> {
|
|
|
|
let signature: H520 = signature.into();
|
|
|
|
let signature = Signature::from_electrum(&signature);
|
|
|
|
let data: Bytes = data.into();
|
|
|
|
|
|
|
|
let hash = eth_data_hash(data);
|
|
|
|
let account = recover(&signature.into(), &hash)
|
|
|
|
.map_err(errors::encryption)
|
|
|
|
.map(|public| {
|
|
|
|
public_to_address(&public).into()
|
|
|
|
});
|
|
|
|
|
|
|
|
Box::new(future::done(account))
|
|
|
|
}
|
|
|
|
|
2017-12-19 10:49:49 +01:00
|
|
|
fn sign_transaction(&self, meta: Metadata, request: TransactionRequest, password: String) -> BoxFuture<RpcRichRawTransaction> {
|
|
|
|
Box::new(self.do_sign_transaction(meta, request, password)
|
|
|
|
.map(|(pending_tx, dispatcher)| dispatcher.enrich(pending_tx.transaction)))
|
|
|
|
}
|
2017-01-30 21:08:36 +01:00
|
|
|
|
2017-12-19 10:49:49 +01:00
|
|
|
fn send_transaction(&self, meta: Metadata, request: TransactionRequest, password: String) -> BoxFuture<RpcH256> {
|
|
|
|
Box::new(self.do_sign_transaction(meta, request, password)
|
2017-02-09 15:01:15 +01:00
|
|
|
.and_then(|(pending_tx, dispatcher)| {
|
2017-08-21 13:46:58 +02:00
|
|
|
let chain_id = pending_tx.chain_id();
|
|
|
|
trace!(target: "miner", "send_transaction: dispatching tx: {} for chain ID {:?}",
|
|
|
|
::rlp::encode(&*pending_tx).into_vec().pretty(), chain_id);
|
2017-02-08 15:36:53 +01:00
|
|
|
|
|
|
|
dispatcher.dispatch_transaction(pending_tx).map(Into::into)
|
2017-12-19 10:49:49 +01:00
|
|
|
})
|
|
|
|
)
|
2016-07-24 17:38:21 +02:00
|
|
|
}
|
2017-02-15 16:57:27 +01:00
|
|
|
|
2017-11-14 11:38:17 +01:00
|
|
|
fn sign_and_send_transaction(&self, meta: Metadata, request: TransactionRequest, password: String) -> BoxFuture<RpcH256> {
|
2017-02-15 16:57:27 +01:00
|
|
|
warn!("Using deprecated personal_signAndSendTransaction, use personal_sendTransaction instead.");
|
|
|
|
self.send_transaction(meta, request, password)
|
|
|
|
}
|
2016-03-04 12:46:54 +01:00
|
|
|
}
|