openethereum/rpc/src/v1/impls/personal.rs

142 lines
4.8 KiB
Rust
Raw Normal View History

// Copyright 2015-2017 Parity Technologies (UK) Ltd.
2016-03-04 12:46:54 +01:00
// This file is part of Parity.
// Parity is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// Parity is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
2016-03-04 12:53:18 +01:00
//! Account management (personal) rpc implementation
use std::sync::Arc;
use ethcore::account_provider::AccountProvider;
use ethcore::transaction::PendingTransaction;
2017-09-04 16:36:49 +02:00
use bigint::prelude::U128;
use util::Address;
use bytes::ToPretty;
use jsonrpc_core::{BoxFuture, Error};
use jsonrpc_core::futures::{future, Future};
use v1::helpers::errors;
use v1::helpers::dispatch::{Dispatcher, SignWith};
2017-03-29 17:07:58 +02:00
use v1::helpers::accounts::unwrap_provider;
use v1::traits::Personal;
use v1::types::{H160 as RpcH160, H256 as RpcH256, U128 as RpcU128, TransactionRequest};
use v1::metadata::Metadata;
2016-03-04 12:46:54 +01:00
2016-03-04 12:53:18 +01:00
/// Account management (personal) rpc implementation.
pub struct PersonalClient<D: Dispatcher> {
accounts: Option<Arc<AccountProvider>>,
dispatcher: D,
allow_perm_unlock: bool,
2016-03-04 12:46:54 +01:00
}
impl<D: Dispatcher> PersonalClient<D> {
2016-03-04 12:46:54 +01:00
/// Creates new PersonalClient
2017-03-29 17:07:58 +02:00
pub fn new(store: &Option<Arc<AccountProvider>>, dispatcher: D, allow_perm_unlock: bool) -> Self {
2016-03-04 12:46:54 +01:00
PersonalClient {
accounts: store.clone(),
dispatcher: dispatcher,
allow_perm_unlock: allow_perm_unlock,
2016-03-04 12:46:54 +01:00
}
}
2017-03-29 17:07:58 +02:00
fn account_provider(&self) -> Result<Arc<AccountProvider>, Error> {
unwrap_provider(&self.accounts)
}
2016-03-04 12:46:54 +01:00
}
impl<D: Dispatcher + 'static> Personal for PersonalClient<D> {
type Metadata = Metadata;
2016-10-31 17:11:56 +01:00
fn accounts(&self) -> Result<Vec<RpcH160>, Error> {
2017-03-29 17:07:58 +02:00
let store = self.account_provider()?;
let accounts = store.accounts().map_err(|e| errors::account("Could not fetch accounts.", e))?;
2016-10-31 17:11:56 +01:00
Ok(accounts.into_iter().map(Into::into).collect::<Vec<RpcH160>>())
2016-03-04 12:46:54 +01:00
}
fn new_account(&self, pass: String) -> Result<RpcH160, Error> {
2017-03-29 17:07:58 +02:00
let store = self.account_provider()?;
store.new_account(&pass)
.map(Into::into)
.map_err(|e| errors::account("Could not create account.", e))
}
2016-11-28 17:15:40 +01:00
fn unlock_account(&self, account: RpcH160, account_pass: String, duration: Option<RpcU128>) -> Result<bool, Error> {
let account: Address = account.into();
2017-03-29 17:07:58 +02:00
let store = self.account_provider()?;
2016-11-28 17:15:40 +01:00
let duration = match duration {
None => None,
Some(duration) => {
let duration: U128 = duration.into();
let v = duration.low_u64() as u32;
if duration != v.into() {
return Err(errors::invalid_params("Duration", "Invalid Number"));
} else {
Some(v)
}
},
};
let r = match (self.allow_perm_unlock, duration) {
(false, _) => store.unlock_account_temporarily(account, account_pass),
(true, Some(0)) => store.unlock_account_permanently(account, account_pass),
2016-11-28 17:15:40 +01:00
(true, Some(d)) => store.unlock_account_timed(account, account_pass, d * 1000),
(true, None) => store.unlock_account_timed(account, account_pass, 300_000),
};
match r {
Ok(_) => Ok(true),
// TODO [ToDr] Proper error here?
Err(_) => Ok(false),
}
}
fn send_transaction(&self, meta: Metadata, request: TransactionRequest, password: String) -> BoxFuture<RpcH256, Error> {
2017-02-09 15:01:15 +01:00
let dispatcher = self.dispatcher.clone();
2017-03-29 17:07:58 +02:00
let accounts = try_bf!(self.account_provider());
2017-02-09 15:01:15 +01:00
let default = match request.from.as_ref() {
Some(account) => Ok(account.clone().into()),
None => accounts
.dapp_default_address(meta.dapp_id().into())
2017-02-09 15:01:15 +01:00
.map_err(|e| errors::account("Cannot find default account.", e)),
};
2017-02-09 15:01:15 +01:00
let default = match default {
Ok(default) => default,
Err(e) => return Box::new(future::err(e)),
};
Box::new(dispatcher.fill_optional_fields(request.into(), default, false)
2017-02-09 15:01:15 +01:00
.and_then(move |filled| {
let condition = filled.condition.clone().map(Into::into);
2017-02-09 21:12:28 +01:00
dispatcher.sign(accounts, filled, SignWith::Password(password))
.map(|tx| tx.into_value())
.map(move |tx| PendingTransaction::new(tx, condition))
.map(move |tx| (tx, dispatcher))
})
2017-02-09 15:01:15 +01:00
.and_then(|(pending_tx, dispatcher)| {
let chain_id = pending_tx.chain_id();
trace!(target: "miner", "send_transaction: dispatching tx: {} for chain ID {:?}",
::rlp::encode(&*pending_tx).into_vec().pretty(), chain_id);
dispatcher.dispatch_transaction(pending_tx).map(Into::into)
}))
}
fn sign_and_send_transaction(&self, meta: Metadata, request: TransactionRequest, password: String) -> BoxFuture<RpcH256, Error> {
warn!("Using deprecated personal_signAndSendTransaction, use personal_sendTransaction instead.");
self.send_transaction(meta, request, password)
}
2016-03-04 12:46:54 +01:00
}