Sign and send transaction
This commit is contained in:
parent
f738f5e032
commit
5579582a52
@ -47,7 +47,7 @@ pub struct EthClient<C, S, A, M, EM> where
|
|||||||
A: AccountProvider,
|
A: AccountProvider,
|
||||||
M: MinerService,
|
M: MinerService,
|
||||||
EM: ExternalMinerService {
|
EM: ExternalMinerService {
|
||||||
|
|
||||||
client: Weak<C>,
|
client: Weak<C>,
|
||||||
sync: Weak<S>,
|
sync: Weak<S>,
|
||||||
accounts: Weak<A>,
|
accounts: Weak<A>,
|
||||||
@ -153,6 +153,27 @@ impl<C, S, A, M, EM> EthClient<C, S, A, M, EM> where
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn sign_and_dispatch(&self, request: TransactionRequest, secret: H256) -> Result<Value, Error> {
|
||||||
|
let signed_transaction = {
|
||||||
|
let client = take_weak!(self.client);
|
||||||
|
let miner = take_weak!(self.miner);
|
||||||
|
EthTransaction {
|
||||||
|
nonce: request.nonce
|
||||||
|
.or_else(|| miner
|
||||||
|
.last_nonce(&request.from)
|
||||||
|
.map(|nonce| nonce + U256::one()))
|
||||||
|
.unwrap_or_else(|| client.nonce(&request.from)),
|
||||||
|
action: request.to.map_or(Action::Create, Action::Call),
|
||||||
|
gas: request.gas.unwrap_or_else(|| miner.sensible_gas_limit()),
|
||||||
|
gas_price: request.gas_price.unwrap_or_else(|| miner.sensible_gas_price()),
|
||||||
|
value: request.value.unwrap_or_else(U256::zero),
|
||||||
|
data: request.data.map_or_else(Vec::new, |d| d.to_vec()),
|
||||||
|
}.sign(&secret)
|
||||||
|
};
|
||||||
|
trace!(target: "miner", "send_transaction: dispatching tx: {}", encode(&signed_transaction).to_vec().pretty());
|
||||||
|
self.dispatch_transaction(signed_transaction)
|
||||||
|
}
|
||||||
|
|
||||||
fn sign_call(&self, request: CallRequest) -> Result<SignedTransaction, Error> {
|
fn sign_call(&self, request: CallRequest) -> Result<SignedTransaction, Error> {
|
||||||
let client = take_weak!(self.client);
|
let client = take_weak!(self.client);
|
||||||
let miner = take_weak!(self.miner);
|
let miner = take_weak!(self.miner);
|
||||||
@ -483,27 +504,19 @@ impl<C, S, A, M, EM> Eth for EthClient<C, S, A, M, EM> where
|
|||||||
.and_then(|(request, )| {
|
.and_then(|(request, )| {
|
||||||
let accounts = take_weak!(self.accounts);
|
let accounts = take_weak!(self.accounts);
|
||||||
match accounts.account_secret(&request.from) {
|
match accounts.account_secret(&request.from) {
|
||||||
Ok(secret) => {
|
Ok(secret) => self.sign_and_dispatch(request, secret),
|
||||||
let signed_transaction = {
|
Err(_) => to_value(&H256::zero())
|
||||||
let client = take_weak!(self.client);
|
}
|
||||||
let miner = take_weak!(self.miner);
|
})
|
||||||
EthTransaction {
|
}
|
||||||
nonce: request.nonce
|
|
||||||
.or_else(|| miner
|
fn sign_and_send_transaction(&self, params: Params) -> Result<Value, Error> {
|
||||||
.last_nonce(&request.from)
|
from_params::<(TransactionRequest, String)>(params)
|
||||||
.map(|nonce| nonce + U256::one()))
|
.and_then(|(request, password)| {
|
||||||
.unwrap_or_else(|| client.nonce(&request.from)),
|
let accounts = take_weak!(self.accounts);
|
||||||
action: request.to.map_or(Action::Create, Action::Call),
|
match accounts.locked_account_secret(&request.from, &password) {
|
||||||
gas: request.gas.unwrap_or_else(|| miner.sensible_gas_limit()),
|
Ok(secret) => self.sign_and_dispatch(request, secret),
|
||||||
gas_price: request.gas_price.unwrap_or_else(|| miner.sensible_gas_price()),
|
Err(_) => to_value(&H256::zero()),
|
||||||
value: request.value.unwrap_or_else(U256::zero),
|
|
||||||
data: request.data.map_or_else(Vec::new, |d| d.to_vec()),
|
|
||||||
}.sign(&secret)
|
|
||||||
};
|
|
||||||
trace!(target: "miner", "send_transaction: dispatching tx: {}", encode(&signed_transaction).to_vec().pretty());
|
|
||||||
self.dispatch_transaction(signed_transaction)
|
|
||||||
},
|
|
||||||
Err(_) => { to_value(&H256::zero()) }
|
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
@ -521,6 +521,81 @@ fn rpc_eth_send_transaction() {
|
|||||||
assert_eq!(tester.io.handle_request(request.as_ref()), Some(response));
|
assert_eq!(tester.io.handle_request(request.as_ref()), Some(response));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn rpc_eth_sign_and_send_transaction_with_invalid_password() {
|
||||||
|
let account = TestAccount::new("password123");
|
||||||
|
let address = account.address();
|
||||||
|
|
||||||
|
let tester = EthTester::default();
|
||||||
|
tester.accounts_provider.accounts.write().unwrap().insert(address.clone(), account);
|
||||||
|
let request = r#"{
|
||||||
|
"jsonrpc": "2.0",
|
||||||
|
"method": "eth_signAndSendTransaction",
|
||||||
|
"params": [{
|
||||||
|
"from": ""#.to_owned() + format!("0x{:?}", address).as_ref() + r#"",
|
||||||
|
"to": "0xd46e8dd67c5d32be8058bb8eb970870f07244567",
|
||||||
|
"gas": "0x76c0",
|
||||||
|
"gasPrice": "0x9184e72a000",
|
||||||
|
"value": "0x9184e72a"
|
||||||
|
}, "password321"],
|
||||||
|
"id": 1
|
||||||
|
}"#;
|
||||||
|
|
||||||
|
let response = r#"{"jsonrpc":"2.0","result":"0x0000000000000000000000000000000000000000000000000000000000000000","id":1}"#;
|
||||||
|
|
||||||
|
assert_eq!(tester.io.handle_request(request.as_ref()), Some(response.into()));
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn rpc_eth_sign_and_send_transaction() {
|
||||||
|
let account = TestAccount::new("password123");
|
||||||
|
let address = account.address();
|
||||||
|
let secret = account.secret.clone();
|
||||||
|
|
||||||
|
let tester = EthTester::default();
|
||||||
|
tester.accounts_provider.accounts.write().unwrap().insert(address.clone(), account);
|
||||||
|
let request = r#"{
|
||||||
|
"jsonrpc": "2.0",
|
||||||
|
"method": "eth_signAndSendTransaction",
|
||||||
|
"params": [{
|
||||||
|
"from": ""#.to_owned() + format!("0x{:?}", address).as_ref() + r#"",
|
||||||
|
"to": "0xd46e8dd67c5d32be8058bb8eb970870f07244567",
|
||||||
|
"gas": "0x76c0",
|
||||||
|
"gasPrice": "0x9184e72a000",
|
||||||
|
"value": "0x9184e72a"
|
||||||
|
}, "password123"],
|
||||||
|
"id": 1
|
||||||
|
}"#;
|
||||||
|
|
||||||
|
let t = Transaction {
|
||||||
|
nonce: U256::zero(),
|
||||||
|
gas_price: U256::from(0x9184e72a000u64),
|
||||||
|
gas: U256::from(0x76c0),
|
||||||
|
action: Action::Call(Address::from_str("d46e8dd67c5d32be8058bb8eb970870f07244567").unwrap()),
|
||||||
|
value: U256::from(0x9184e72au64),
|
||||||
|
data: vec![]
|
||||||
|
}.sign(&secret);
|
||||||
|
|
||||||
|
let response = r#"{"jsonrpc":"2.0","result":""#.to_owned() + format!("0x{:?}", t.hash()).as_ref() + r#"","id":1}"#;
|
||||||
|
|
||||||
|
assert_eq!(tester.io.handle_request(request.as_ref()), Some(response));
|
||||||
|
|
||||||
|
tester.miner.last_nonces.write().unwrap().insert(address.clone(), U256::zero());
|
||||||
|
|
||||||
|
let t = Transaction {
|
||||||
|
nonce: U256::one(),
|
||||||
|
gas_price: U256::from(0x9184e72a000u64),
|
||||||
|
gas: U256::from(0x76c0),
|
||||||
|
action: Action::Call(Address::from_str("d46e8dd67c5d32be8058bb8eb970870f07244567").unwrap()),
|
||||||
|
value: U256::from(0x9184e72au64),
|
||||||
|
data: vec![]
|
||||||
|
}.sign(&secret);
|
||||||
|
|
||||||
|
let response = r#"{"jsonrpc":"2.0","result":""#.to_owned() + format!("0x{:?}", t.hash()).as_ref() + r#"","id":1}"#;
|
||||||
|
|
||||||
|
assert_eq!(tester.io.handle_request(request.as_ref()), Some(response));
|
||||||
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
#[ignore]
|
#[ignore]
|
||||||
fn rpc_eth_send_raw_transaction() {
|
fn rpc_eth_send_raw_transaction() {
|
||||||
|
@ -80,6 +80,9 @@ pub trait Eth: Sized + Send + Sync + 'static {
|
|||||||
/// Sends transaction.
|
/// Sends transaction.
|
||||||
fn send_transaction(&self, _: Params) -> Result<Value, Error> { rpc_unimplemented!() }
|
fn send_transaction(&self, _: Params) -> Result<Value, Error> { rpc_unimplemented!() }
|
||||||
|
|
||||||
|
/// Sends transaction and signs it in single call. The account is not unlocked in such case.
|
||||||
|
fn sign_and_send_transaction(&self, _: Params) -> Result<Value, Error> { rpc_unimplemented!() }
|
||||||
|
|
||||||
/// Sends signed transaction.
|
/// Sends signed transaction.
|
||||||
fn send_raw_transaction(&self, _: Params) -> Result<Value, Error> { rpc_unimplemented!() }
|
fn send_raw_transaction(&self, _: Params) -> Result<Value, Error> { rpc_unimplemented!() }
|
||||||
|
|
||||||
@ -152,6 +155,7 @@ pub trait Eth: Sized + Send + Sync + 'static {
|
|||||||
delegate.add_method("eth_getCode", Eth::code_at);
|
delegate.add_method("eth_getCode", Eth::code_at);
|
||||||
delegate.add_method("eth_sign", Eth::sign);
|
delegate.add_method("eth_sign", Eth::sign);
|
||||||
delegate.add_method("eth_sendTransaction", Eth::send_transaction);
|
delegate.add_method("eth_sendTransaction", Eth::send_transaction);
|
||||||
|
delegate.add_method("eth_signAndSendTransaction", Eth::sign_and_send_transaction);
|
||||||
delegate.add_method("eth_sendRawTransaction", Eth::send_raw_transaction);
|
delegate.add_method("eth_sendRawTransaction", Eth::send_raw_transaction);
|
||||||
delegate.add_method("eth_call", Eth::call);
|
delegate.add_method("eth_call", Eth::call);
|
||||||
delegate.add_method("eth_estimateGas", Eth::estimate_gas);
|
delegate.add_method("eth_estimateGas", Eth::estimate_gas);
|
||||||
|
@ -58,13 +58,15 @@ pub enum EncryptedHashMapError {
|
|||||||
InvalidValueFormat(FromBytesError),
|
InvalidValueFormat(FromBytesError),
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Error retrieving value from encrypted hashmap
|
/// Error while signing a message
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub enum SigningError {
|
pub enum SigningError {
|
||||||
/// Account passed does not exist
|
/// Account passed does not exist
|
||||||
NoAccount,
|
NoAccount,
|
||||||
/// Account passed is not unlocked
|
/// Account passed is not unlocked
|
||||||
AccountNotUnlocked,
|
AccountNotUnlocked,
|
||||||
|
/// Invalid passphrase
|
||||||
|
InvalidPassword,
|
||||||
/// Invalid secret in store
|
/// Invalid secret in store
|
||||||
InvalidSecret
|
InvalidSecret
|
||||||
}
|
}
|
||||||
@ -96,6 +98,8 @@ pub trait AccountProvider : Send + Sync {
|
|||||||
fn new_account(&self, pass: &str) -> Result<Address, ::std::io::Error>;
|
fn new_account(&self, pass: &str) -> Result<Address, ::std::io::Error>;
|
||||||
/// Returns secret for unlocked `account`.
|
/// Returns secret for unlocked `account`.
|
||||||
fn account_secret(&self, account: &Address) -> Result<crypto::Secret, SigningError>;
|
fn account_secret(&self, account: &Address) -> Result<crypto::Secret, SigningError>;
|
||||||
|
/// Returns secret for locked account given passphrase.
|
||||||
|
fn locked_account_secret(&self, account: &Address, pass: &str) -> Result<crypto::Secret, SigningError>;
|
||||||
/// Returns signature when unlocked `account` signs `message`.
|
/// Returns signature when unlocked `account` signs `message`.
|
||||||
fn sign(&self, account: &Address, message: &H256) -> Result<crypto::Signature, SigningError> {
|
fn sign(&self, account: &Address, message: &H256) -> Result<crypto::Signature, SigningError> {
|
||||||
self.account_secret(account).and_then(|s| crypto::ec::sign(&s, message).map_err(|_| SigningError::InvalidSecret))
|
self.account_secret(account).and_then(|s| crypto::ec::sign(&s, message).map_err(|_| SigningError::InvalidSecret))
|
||||||
@ -127,7 +131,11 @@ impl AccountProvider for AccountService {
|
|||||||
fn account_secret(&self, account: &Address) -> Result<crypto::Secret, SigningError> {
|
fn account_secret(&self, account: &Address) -> Result<crypto::Secret, SigningError> {
|
||||||
self.secret_store.read().unwrap().account_secret(account)
|
self.secret_store.read().unwrap().account_secret(account)
|
||||||
}
|
}
|
||||||
/// Returns secret for unlocked account
|
/// Returns secret for locked account given passphrase.
|
||||||
|
fn locked_account_secret(&self, account: &Address, pass: &str) -> Result<crypto::Secret, SigningError> {
|
||||||
|
self.secret_store.read().unwrap().locked_account_secret(account, pass)
|
||||||
|
}
|
||||||
|
/// Signs a message using key of given unlocked account address.
|
||||||
fn sign(&self, account: &Address, message: &H256) -> Result<crypto::Signature, SigningError> {
|
fn sign(&self, account: &Address, message: &H256) -> Result<crypto::Signature, SigningError> {
|
||||||
self.secret_store.read().unwrap().sign(account, message)
|
self.secret_store.read().unwrap().sign(account, message)
|
||||||
}
|
}
|
||||||
@ -317,6 +325,16 @@ impl SecretStore {
|
|||||||
ret
|
ret
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns secret for unlocked account.
|
||||||
|
pub fn locked_account_secret(&self, account: &Address, pass: &str) -> Result<crypto::Secret, SigningError> {
|
||||||
|
let secret_id = try!(self.account(&account).ok_or(SigningError::NoAccount));
|
||||||
|
self.get(&secret_id, pass).or_else(|e| Err(match e {
|
||||||
|
EncryptedHashMapError::InvalidPassword => SigningError::InvalidPassword,
|
||||||
|
EncryptedHashMapError::UnknownIdentifier => SigningError::NoAccount,
|
||||||
|
EncryptedHashMapError::InvalidValueFormat(_) => SigningError::InvalidSecret,
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
|
||||||
/// Makes account unlocks expire and removes unused key files from memory
|
/// Makes account unlocks expire and removes unused key files from memory
|
||||||
pub fn collect_garbage(&mut self) {
|
pub fn collect_garbage(&mut self) {
|
||||||
let mut garbage_lock = self.unlocks.write().unwrap();
|
let mut garbage_lock = self.unlocks.write().unwrap();
|
||||||
@ -679,6 +697,29 @@ mod tests {
|
|||||||
assert_eq!(Address::from(kp.public().sha3()), addr);
|
assert_eq!(Address::from(kp.public().sha3()), addr);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn secret_for_locked_account() {
|
||||||
|
// given
|
||||||
|
let temp = RandomTempPath::create_dir();
|
||||||
|
let mut sstore = SecretStore::new_test(&temp);
|
||||||
|
let addr = sstore.new_account("test-pass").unwrap();
|
||||||
|
|
||||||
|
// when
|
||||||
|
// Invalid pass
|
||||||
|
let secret1 = sstore.locked_account_secret(&addr, "test-pass123");
|
||||||
|
// Valid pass
|
||||||
|
let secret2 = sstore.locked_account_secret(&addr, "test-pass");
|
||||||
|
// Account not unlocked
|
||||||
|
let secret3 = sstore.account_secret(&addr);
|
||||||
|
|
||||||
|
|
||||||
|
assert!(secret1.is_err(), "Invalid password should not return secret.");
|
||||||
|
assert!(secret2.is_ok(), "Should return secret provided valid passphrase.");
|
||||||
|
assert!(secret3.is_err(), "Account should still be locked.");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn can_create_service() {
|
fn can_create_service() {
|
||||||
let temp = RandomTempPath::create_dir();
|
let temp = RandomTempPath::create_dir();
|
||||||
|
@ -103,5 +103,16 @@ impl AccountProvider for TestAccountProvider {
|
|||||||
.ok_or(SigningError::NoAccount)
|
.ok_or(SigningError::NoAccount)
|
||||||
.map(|acc| acc.secret.clone())
|
.map(|acc| acc.secret.clone())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn locked_account_secret(&self, address: &Address, pass: &str) -> Result<Secret, SigningError> {
|
||||||
|
let accounts = self.accounts.read().unwrap();
|
||||||
|
match accounts.get(address) {
|
||||||
|
Some(ref acc) if acc.password == pass => {
|
||||||
|
Ok(acc.secret.clone())
|
||||||
|
},
|
||||||
|
Some(ref _acc) => Err(SigningError::InvalidPassword),
|
||||||
|
_ => Err(SigningError::NoAccount),
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user