openethereum/rpc/src/v1/impls/parity.rs

423 lines
12 KiB
Rust
Raw Normal View History

// Copyright 2015-2017 Parity Technologies (UK) Ltd.
// This file is part of Parity.
// Parity is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// Parity is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
//! Parity-specific rpc implementation.
use std::sync::{Arc, Weak};
use std::str::FromStr;
use std::collections::{BTreeMap, HashSet};
use futures::{future, Future, BoxFuture};
use ethcore_logger::RotatingLogger;
use util::Address;
use util::misc::version_data;
use crypto::ecies;
use ethkey::{Brain, Generator};
use ethstore::random_phrase;
use ethsync::{SyncProvider, ManageNetwork};
use ethcore::ids::BlockId;
use ethcore::miner::MinerService;
use ethcore::client::{MiningBlockChainClient};
use ethcore::mode::Mode;
use ethcore::account_provider::AccountProvider;
2016-12-11 23:15:52 +01:00
use updater::{Service as UpdateService};
Secretstore RPCs + integration (#5439) * ECDKG protocol prototype * added test for enc/dec math * get rid of decryption_session * added licenses * fix after merge * get rid of unused serde dependency * doc * decryption session [without commutative enc] * failed_dec_session * fixed tests * added commen * added more decryption session tests * helper to localize an issue * more computations to localize error * decryption_session::SessionParams * added tests for EC math to localize problem * secretstore network transport * encryption_session_works_over_network * network errors processing * connecting to KeyServer * licenses * get rid of debug println-s * fixed secretstore args * encryption results are stored in KS database * decryption protocol works over network * enc/dec Session traits * fixing warnings * fix after merge * on-chain ACL checker proto * fixed compilation * fixed compilation * finally fixed <odd>-of-N-scheme * temporary commented test * 1-of-N works in math * scheme 1-of-N works * updated AclStorage with real contract ABI * remove unnecessary unsafety * fixed grumbles * wakeup on access denied * encrypt secretstore messages * 'shadow' decryption * fix grumbles * lost files * secretstore cli-options * decryption seccion when ACL check failed on master * disallow regenerating key for existing document * removed obsolete TODO * fix after merge * switched to tokio_io * fix after merge * fix after merge * fix after merge * fix after merge * fix after merge * fixed test * fix after merge * encryption session errors are now fatal * session timeouts * autorestart decryption session * remove sessions on completion * exclude disconnected nodes from decryption session * test for enc/dec session over network with 1 node * remove debug printlns * fixed 1-of-1 scheme * drop for KeyServerHttpListener * Use standard encryption and decryption (as in RPC) * added some tests * moved DEFAULT_MAC to ethcrypto * rpc_secretstore_encrypt_and_decrypt * serialization with "0x" prefix (RPC compatibility) * secretstore RPC API * fix after merge * fixed typo * secretstore_shadowDecrypt RPC * enable secretstore RPCs by default * fixed test * SecStore RPCs available without SecStore feature * fixed grumbles * lost files * added password argument to Parity RPCs * update docs * lost file
2017-05-05 15:57:29 +02:00
use crypto::DEFAULT_MAC;
use jsonrpc_core::Error;
2016-12-13 14:27:27 +01:00
use jsonrpc_macros::Trailing;
use v1::helpers::{errors, ipfs, SigningQueue, SignerService, NetworkSettings};
2017-03-29 17:07:58 +02:00
use v1::helpers::accounts::unwrap_provider;
use v1::metadata::Metadata;
use v1::traits::Parity;
2016-11-16 17:54:54 +01:00
use v1::types::{
Bytes, U256, H160, H256, H512,
Peers, Transaction, RpcSettings, Histogram,
TransactionStats, LocalTransactionStatus,
2016-12-12 02:57:19 +01:00
BlockNumber, ConsensusCapability, VersionInfo,
OperationsInfo, DappId, ChainStatus,
AccountInfo, HwAccountInfo, RichHeader
2016-11-16 17:54:54 +01:00
};
/// Parity implementation.
2016-12-11 23:15:52 +01:00
pub struct ParityClient<C, M, S: ?Sized, U> where
C: MiningBlockChainClient,
M: MinerService,
S: SyncProvider,
2016-12-11 23:15:52 +01:00
U: UpdateService,
{
client: Weak<C>,
miner: Weak<M>,
sync: Weak<S>,
2016-12-11 23:15:52 +01:00
updater: Weak<U>,
net: Weak<ManageNetwork>,
2017-03-29 17:07:58 +02:00
accounts: Option<Weak<AccountProvider>>,
2016-04-19 09:58:26 +02:00
logger: Arc<RotatingLogger>,
2016-04-21 19:19:42 +02:00
settings: Arc<NetworkSettings>,
signer: Option<Arc<SignerService>>,
dapps_interface: Option<String>,
2016-10-24 12:21:15 +02:00
dapps_port: Option<u16>,
eip86_transition: u64,
}
2016-12-11 23:15:52 +01:00
impl<C, M, S: ?Sized, U> ParityClient<C, M, S, U> where
C: MiningBlockChainClient,
M: MinerService,
S: SyncProvider,
2016-12-11 23:15:52 +01:00
U: UpdateService,
{
/// Creates new `ParityClient`.
pub fn new(
client: &Arc<C>,
miner: &Arc<M>,
sync: &Arc<S>,
2016-12-11 23:15:52 +01:00
updater: &Arc<U>,
net: &Arc<ManageNetwork>,
2017-03-29 17:07:58 +02:00
store: &Option<Arc<AccountProvider>>,
logger: Arc<RotatingLogger>,
settings: Arc<NetworkSettings>,
2016-10-24 12:21:15 +02:00
signer: Option<Arc<SignerService>>,
dapps_interface: Option<String>,
2016-10-24 12:21:15 +02:00
dapps_port: Option<u16>,
) -> Self {
ParityClient {
client: Arc::downgrade(client),
2016-04-19 09:58:26 +02:00
miner: Arc::downgrade(miner),
sync: Arc::downgrade(sync),
2016-12-11 23:15:52 +01:00
updater: Arc::downgrade(updater),
net: Arc::downgrade(net),
2017-03-29 17:07:58 +02:00
accounts: store.as_ref().map(Arc::downgrade),
2016-04-19 09:58:26 +02:00
logger: logger,
2016-04-21 19:19:42 +02:00
settings: settings,
signer: signer,
dapps_interface: dapps_interface,
2016-10-24 12:21:15 +02:00
dapps_port: dapps_port,
eip86_transition: client.eip86_transition(),
}
}
2017-03-29 17:07:58 +02:00
/// Attempt to get the `Arc<AccountProvider>`, errors if provider was not
/// set, or if upgrading the weak reference failed.
fn account_provider(&self) -> Result<Arc<AccountProvider>, Error> {
unwrap_provider(&self.accounts)
}
}
2016-12-11 23:15:52 +01:00
impl<C, M, S: ?Sized, U> Parity for ParityClient<C, M, S, U> where
M: MinerService + 'static,
C: MiningBlockChainClient + 'static,
2016-12-11 23:15:52 +01:00
S: SyncProvider + 'static,
U: UpdateService + 'static,
{
type Metadata = Metadata;
fn accounts_info(&self, dapp: Trailing<DappId>) -> Result<BTreeMap<H160, AccountInfo>, Error> {
let dapp = dapp.0;
2017-03-29 17:07:58 +02:00
let store = self.account_provider()?;
let dapp_accounts = store
.note_dapp_used(dapp.clone().into())
.and_then(|_| store.dapp_addresses(dapp.into()))
.map_err(|e| errors::account("Could not fetch accounts.", e))?
.into_iter().collect::<HashSet<_>>();
let info = store.accounts_info().map_err(|e| errors::account("Could not fetch account info.", e))?;
let other = store.addresses_info();
Ok(info
.into_iter()
.chain(other.into_iter())
.filter(|&(ref a, _)| dapp_accounts.contains(a))
.map(|(a, v)| (H160::from(a), AccountInfo { name: v.name }))
.collect()
)
}
fn hardware_accounts_info(&self) -> Result<BTreeMap<H160, HwAccountInfo>, Error> {
2017-03-29 17:07:58 +02:00
let store = self.account_provider()?;
let info = store.hardware_accounts_info().map_err(|e| errors::account("Could not fetch account info.", e))?;
Ok(info
.into_iter()
.map(|(a, v)| (H160::from(a), HwAccountInfo { name: v.name, manufacturer: v.meta }))
.collect()
)
}
fn default_account(&self, meta: Self::Metadata) -> BoxFuture<H160, Error> {
let dapp_id = meta.dapp_id();
future::ok(
2017-03-29 17:07:58 +02:00
try_bf!(self.account_provider())
.dapp_default_address(dapp_id.into())
.map(Into::into)
.ok()
.unwrap_or_default()
).boxed()
}
fn transactions_limit(&self) -> Result<usize, Error> {
Ok(take_weak!(self.miner).transactions_limit())
2016-04-18 23:13:38 +02:00
}
fn min_gas_price(&self) -> Result<U256, Error> {
Ok(U256::from(take_weak!(self.miner).minimal_gas_price()))
}
fn extra_data(&self) -> Result<Bytes, Error> {
Ok(Bytes::new(take_weak!(self.miner).extra_data()))
}
fn gas_floor_target(&self) -> Result<U256, Error> {
Ok(U256::from(take_weak!(self.miner).gas_floor_target()))
}
2016-04-19 09:58:26 +02:00
fn gas_ceil_target(&self) -> Result<U256, Error> {
Ok(U256::from(take_weak!(self.miner).gas_ceil_target()))
2016-06-23 14:29:16 +02:00
}
fn dev_logs(&self) -> Result<Vec<String>, Error> {
2016-04-19 09:58:26 +02:00
let logs = self.logger.logs();
Ok(logs.as_slice().to_owned())
2016-04-19 09:58:26 +02:00
}
fn dev_logs_levels(&self) -> Result<String, Error> {
Ok(self.logger.levels().to_owned())
2016-04-19 09:58:26 +02:00
}
fn net_chain(&self) -> Result<String, Error> {
Ok(self.settings.chain.clone())
2016-04-21 19:19:42 +02:00
}
fn chain(&self) -> Result<String, Error> {
Ok(take_weak!(self.client).spec_name())
}
fn net_peers(&self) -> Result<Peers, Error> {
let sync = take_weak!(self.sync);
let sync_status = sync.status();
let net_config = take_weak!(self.net).network_config();
let peers = sync.peers().into_iter().map(Into::into).collect();
Ok(Peers {
active: sync_status.num_active_peers,
connected: sync_status.num_peers,
max: sync_status.current_max_peers(net_config.min_peers, net_config.max_peers),
peers: peers
})
2016-04-21 19:19:42 +02:00
}
fn net_port(&self) -> Result<u16, Error> {
Ok(self.settings.network_port)
2016-04-21 19:19:42 +02:00
}
fn node_name(&self) -> Result<String, Error> {
Ok(self.settings.name.clone())
2016-04-21 19:19:42 +02:00
}
fn registry_address(&self) -> Result<Option<H160>, Error> {
Ok(
take_weak!(self.client)
.additional_params()
.get("registrar")
.and_then(|s| Address::from_str(s).ok())
.map(|s| H160::from(s))
)
}
fn rpc_settings(&self) -> Result<RpcSettings, Error> {
Ok(RpcSettings {
enabled: self.settings.rpc_enabled,
interface: self.settings.rpc_interface.clone(),
port: self.settings.rpc_port as u64,
})
2016-04-21 19:19:42 +02:00
}
2016-05-02 16:12:01 +02:00
fn default_extra_data(&self) -> Result<Bytes, Error> {
Ok(Bytes::new(version_data()))
}
2017-02-17 21:38:43 +01:00
fn gas_price_histogram(&self) -> BoxFuture<Histogram, Error> {
future::done(take_weakf!(self.client)
.gas_price_corpus(100)
.histogram(10)
.ok_or_else(errors::not_enough_data)
.map(Into::into)
).boxed()
2016-05-02 16:12:01 +02:00
}
fn unsigned_transactions_count(&self) -> Result<usize, Error> {
match self.signer {
None => Err(errors::signer_disabled()),
Some(ref signer) => Ok(signer.len()),
}
}
fn generate_secret_phrase(&self) -> Result<String, Error> {
Ok(random_phrase(12))
}
fn phrase_to_address(&self, phrase: String) -> Result<H160, Error> {
Ok(Brain::new(phrase).generate().unwrap().address().into())
}
2016-11-28 01:32:40 +01:00
fn list_accounts(&self, count: u64, after: Option<H160>, block_number: Trailing<BlockNumber>) -> Result<Option<Vec<H160>>, Error> {
Ok(take_weak!(self.client)
2016-11-28 01:32:40 +01:00
.list_accounts(block_number.0.into(), after.map(Into::into).as_ref(), count)
.map(|a| a.into_iter().map(Into::into).collect()))
}
2016-11-28 01:32:40 +01:00
fn list_storage_keys(&self, address: H160, count: u64, after: Option<H256>, block_number: Trailing<BlockNumber>) -> Result<Option<Vec<H256>>, Error> {
2016-11-27 11:11:56 +01:00
Ok(take_weak!(self.client)
2016-11-28 01:32:40 +01:00
.list_storage(block_number.0.into(), &address.into(), after.map(Into::into).as_ref(), count)
2016-11-27 11:11:56 +01:00
.map(|a| a.into_iter().map(Into::into).collect()))
}
fn encrypt_message(&self, key: H512, phrase: Bytes) -> Result<Bytes, Error> {
ecies::encrypt(&key.into(), &DEFAULT_MAC, &phrase.0)
.map_err(errors::encryption_error)
.map(Into::into)
}
fn pending_transactions(&self) -> Result<Vec<Transaction>, Error> {
let block_number = take_weak!(self.client).chain_info().best_block_number;
Ok(take_weak!(self.miner).pending_transactions().into_iter().map(|t| Transaction::from_pending(t, block_number, self.eip86_transition)).collect::<Vec<_>>())
}
2016-12-15 18:19:19 +01:00
fn future_transactions(&self) -> Result<Vec<Transaction>, Error> {
let block_number = take_weak!(self.client).chain_info().best_block_number;
Ok(take_weak!(self.miner).future_transactions().into_iter().map(|t| Transaction::from_pending(t, block_number, self.eip86_transition)).collect::<Vec<_>>())
2016-12-15 18:19:19 +01:00
}
2016-11-16 13:37:21 +01:00
fn pending_transactions_stats(&self) -> Result<BTreeMap<H256, TransactionStats>, Error> {
let stats = take_weak!(self.sync).transactions_stats();
Ok(stats.into_iter()
.map(|(hash, stats)| (hash.into(), stats.into()))
.collect()
)
}
2016-11-16 17:54:54 +01:00
fn local_transactions(&self) -> Result<BTreeMap<H256, LocalTransactionStatus>, Error> {
let transactions = take_weak!(self.miner).local_transactions();
let block_number = take_weak!(self.client).chain_info().best_block_number;
2016-11-16 17:54:54 +01:00
Ok(transactions
.into_iter()
.map(|(hash, status)| (hash.into(), LocalTransactionStatus::from(status, block_number, self.eip86_transition)))
2016-11-16 17:54:54 +01:00
.collect()
)
}
2016-10-24 12:21:15 +02:00
fn signer_port(&self) -> Result<u16, Error> {
self.signer
.clone()
.and_then(|signer| signer.address())
.map(|address| address.1)
2016-10-24 12:21:15 +02:00
.ok_or_else(|| errors::signer_disabled())
}
fn dapps_port(&self) -> Result<u16, Error> {
self.dapps_port
.ok_or_else(|| errors::dapps_disabled())
}
2016-10-27 19:29:55 +02:00
fn dapps_interface(&self) -> Result<String, Error> {
self.dapps_interface.clone()
.ok_or_else(|| errors::dapps_disabled())
}
2017-02-17 21:38:43 +01:00
fn next_nonce(&self, address: H160) -> BoxFuture<U256, Error> {
2016-10-27 19:29:55 +02:00
let address: Address = address.into();
2017-02-17 21:38:43 +01:00
let miner = take_weakf!(self.miner);
let client = take_weakf!(self.client);
2016-10-27 19:29:55 +02:00
2017-02-17 21:38:43 +01:00
future::ok(miner.last_nonce(&address)
2016-10-27 19:29:55 +02:00
.map(|n| n + 1.into())
.unwrap_or_else(|| client.latest_nonce(&address))
.into()
2017-02-17 21:38:43 +01:00
).boxed()
2016-10-27 19:29:55 +02:00
}
fn mode(&self) -> Result<String, Error> {
Ok(match take_weak!(self.client).mode() {
Mode::Off => "offline",
Mode::Dark(..) => "dark",
Mode::Passive(..) => "passive",
Mode::Active => "active",
}.into())
}
fn enode(&self) -> Result<String, Error> {
take_weak!(self.sync).enode().ok_or_else(errors::network_disabled)
}
2016-12-11 23:36:38 +01:00
fn consensus_capability(&self) -> Result<ConsensusCapability, Error> {
let updater = take_weak!(self.updater);
Ok(updater.capability().into())
}
2016-12-12 02:57:19 +01:00
fn version_info(&self) -> Result<VersionInfo, Error> {
let updater = take_weak!(self.updater);
Ok(updater.version_info().into())
}
fn releases_info(&self) -> Result<Option<OperationsInfo>, Error> {
let updater = take_weak!(self.updater);
Ok(updater.info().map(Into::into))
}
fn chain_status(&self) -> Result<ChainStatus, Error> {
let chain_info = take_weak!(self.client).chain_info();
let gap = chain_info.ancient_block_number.map(|x| U256::from(x + 1))
.and_then(|first| chain_info.first_block_number.map(|last| (first, U256::from(last))));
Ok(ChainStatus {
block_gap: gap.map(|(x, y)| (x.into(), y.into())),
})
}
fn node_kind(&self) -> Result<::v1::types::NodeKind, Error> {
use ::v1::types::{NodeKind, Availability, Capability};
2017-03-29 17:07:58 +02:00
let availability = match self.accounts {
Some(_) => Availability::Personal,
None => Availability::Public
};
Ok(NodeKind {
2017-03-29 17:07:58 +02:00
availability: availability,
capability: Capability::Full,
})
}
fn block_header(&self, number: Trailing<BlockNumber>) -> BoxFuture<RichHeader, Error> {
const EXTRA_INFO_PROOF: &'static str = "Object exists in in blockchain (fetched earlier), extra_info is always available if object exists; qed";
let client = take_weakf!(self.client);
let id: BlockId = number.0.into();
let encoded = match client.block_header(id.clone()) {
Some(encoded) => encoded,
None => return future::err(errors::unknown_block()).boxed(),
};
future::ok(RichHeader {
inner: encoded.into(),
extra_info: client.block_extra_info(id).expect(EXTRA_INFO_PROOF),
}).boxed()
}
fn ipfs_cid(&self, content: Bytes) -> Result<String, Error> {
ipfs::cid(content)
}
}