2021-02-01 18:12:51 +01:00
|
|
|
|
# standard imports
|
|
|
|
|
import logging
|
2021-03-06 18:55:51 +01:00
|
|
|
|
import sys
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
2021-03-29 15:27:53 +02:00
|
|
|
|
# external imports
|
2021-02-01 18:12:51 +01:00
|
|
|
|
import celery
|
2021-03-29 15:27:53 +02:00
|
|
|
|
from chainlib.eth.constant import (
|
|
|
|
|
ZERO_ADDRESS,
|
|
|
|
|
)
|
|
|
|
|
from cic_eth_registry import CICRegistry
|
2021-05-31 17:34:16 +02:00
|
|
|
|
from cic_eth_registry.erc20 import ERC20Token
|
2021-03-29 15:27:53 +02:00
|
|
|
|
from cic_eth_registry.error import UnknownContractError
|
|
|
|
|
from chainlib.eth.address import to_checksum_address
|
|
|
|
|
from chainlib.eth.contract import code
|
|
|
|
|
from chainlib.eth.tx import (
|
|
|
|
|
transaction,
|
|
|
|
|
receipt,
|
|
|
|
|
unpack,
|
|
|
|
|
)
|
|
|
|
|
from chainlib.hash import keccak256_hex_to_hex
|
|
|
|
|
from hexathon import (
|
|
|
|
|
strip_0x,
|
|
|
|
|
add_0x,
|
2021-07-21 19:34:51 +02:00
|
|
|
|
uniform as hex_uniform,
|
2021-03-29 15:27:53 +02:00
|
|
|
|
)
|
|
|
|
|
from chainlib.eth.gas import balance
|
2021-04-04 14:40:59 +02:00
|
|
|
|
from chainqueue.db.enum import (
|
2021-02-13 18:01:48 +01:00
|
|
|
|
StatusEnum,
|
2021-03-29 21:29:29 +02:00
|
|
|
|
StatusBits,
|
2021-02-13 18:01:48 +01:00
|
|
|
|
is_alive,
|
2021-03-29 21:29:29 +02:00
|
|
|
|
is_error_status,
|
|
|
|
|
status_str,
|
2021-02-13 18:01:48 +01:00
|
|
|
|
)
|
2021-04-04 14:40:59 +02:00
|
|
|
|
from chainqueue.error import TxStateChangeError
|
2021-05-31 17:34:16 +02:00
|
|
|
|
from eth_erc20 import ERC20
|
2021-04-04 14:40:59 +02:00
|
|
|
|
|
|
|
|
|
# local imports
|
|
|
|
|
from cic_eth.db.models.base import SessionBase
|
|
|
|
|
from cic_eth.db.models.role import AccountRole
|
|
|
|
|
from cic_eth.db.models.nonce import Nonce
|
2021-02-01 18:12:51 +01:00
|
|
|
|
from cic_eth.error import InitializationError
|
2021-08-28 13:10:18 +02:00
|
|
|
|
from cic_eth.queue.query import get_tx_local
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
app = celery.current_app
|
|
|
|
|
|
|
|
|
|
#logg = logging.getLogger(__file__)
|
|
|
|
|
logg = logging.getLogger()
|
|
|
|
|
|
2021-03-29 21:29:29 +02:00
|
|
|
|
local_fail = StatusBits.LOCAL_ERROR | StatusBits.NODE_ERROR | StatusBits.UNKNOWN_ERROR
|
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
class AdminApi:
|
|
|
|
|
"""Provides an interface to view and manipulate existing transaction tasks and system runtime settings.
|
|
|
|
|
|
|
|
|
|
:param rpc_client: Rpc client to use for blockchain connections.
|
|
|
|
|
:type rpc_client: cic_eth.eth.rpc.RpcClient
|
|
|
|
|
:param queue: Name of worker queue to submit tasks to
|
|
|
|
|
:type queue: str
|
|
|
|
|
"""
|
2021-03-29 15:27:53 +02:00
|
|
|
|
def __init__(self, rpc, queue='cic-eth', call_address=ZERO_ADDRESS):
|
|
|
|
|
self.rpc = rpc
|
2021-02-01 18:12:51 +01:00
|
|
|
|
self.queue = queue
|
2021-03-29 15:27:53 +02:00
|
|
|
|
self.call_address = call_address
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
|
2021-04-25 14:24:17 +02:00
|
|
|
|
def proxy_do(self, chain_spec, o):
|
|
|
|
|
s_proxy = celery.signature(
|
|
|
|
|
'cic_eth.task.rpc_proxy',
|
|
|
|
|
[
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
o,
|
|
|
|
|
'default',
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue
|
|
|
|
|
)
|
|
|
|
|
return s_proxy.apply_async()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def registry(self):
|
|
|
|
|
s_registry = celery.signature(
|
|
|
|
|
'cic_eth.task.registry',
|
|
|
|
|
[],
|
|
|
|
|
queue=self.queue
|
|
|
|
|
)
|
|
|
|
|
return s_registry.apply_async()
|
|
|
|
|
|
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
def unlock(self, chain_spec, address, flags=None):
|
|
|
|
|
s_unlock = celery.signature(
|
|
|
|
|
'cic_eth.admin.ctrl.unlock',
|
|
|
|
|
[
|
2021-03-29 15:27:53 +02:00
|
|
|
|
None,
|
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
address,
|
2021-03-29 15:27:53 +02:00
|
|
|
|
flags,
|
2021-02-01 18:12:51 +01:00
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
return s_unlock.apply_async()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def lock(self, chain_spec, address, flags=None):
|
|
|
|
|
s_lock = celery.signature(
|
|
|
|
|
'cic_eth.admin.ctrl.lock',
|
|
|
|
|
[
|
2021-03-29 15:27:53 +02:00
|
|
|
|
None,
|
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
address,
|
2021-03-29 15:27:53 +02:00
|
|
|
|
flags,
|
2021-02-01 18:12:51 +01:00
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
return s_lock.apply_async()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def get_lock(self):
|
|
|
|
|
s_lock = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.lock.get_lock',
|
2021-02-01 18:12:51 +01:00
|
|
|
|
[],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
2021-03-29 15:27:53 +02:00
|
|
|
|
return s_lock.apply_async()
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
|
2021-10-30 13:19:31 +02:00
|
|
|
|
def tag_account(self, chain_spec, tag, address):
|
2021-02-01 18:12:51 +01:00
|
|
|
|
"""Persistently associate an address with a plaintext tag.
|
|
|
|
|
|
|
|
|
|
Some tags are known by the system and is used to resolve addresses to use for certain transactions.
|
|
|
|
|
|
|
|
|
|
:param tag: Address tag
|
|
|
|
|
:type tag: str
|
|
|
|
|
:param address_hex: Ethereum address to tag
|
|
|
|
|
:type address_hex: str, 0x-hex
|
|
|
|
|
:raises ValueError: Invalid checksum address
|
|
|
|
|
"""
|
2021-03-29 15:27:53 +02:00
|
|
|
|
s_tag = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.set_role',
|
|
|
|
|
[
|
|
|
|
|
tag,
|
2021-10-30 13:19:31 +02:00
|
|
|
|
address,
|
2021-03-29 15:27:53 +02:00
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
return s_tag.apply_async()
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
|
2021-10-30 13:19:31 +02:00
|
|
|
|
def get_tag_account(self, chain_spec, tag=None, address=None):
|
|
|
|
|
if address != None:
|
|
|
|
|
s_tag = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.role',
|
|
|
|
|
[
|
|
|
|
|
address,
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
else:
|
|
|
|
|
s_tag = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.role_account',
|
|
|
|
|
[
|
|
|
|
|
tag,
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
return s_tag.apply_async()
|
|
|
|
|
|
|
|
|
|
|
2021-03-29 15:27:53 +02:00
|
|
|
|
def have_account(self, address_hex, chain_spec):
|
2021-02-15 12:06:28 +01:00
|
|
|
|
s_have = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.have',
|
|
|
|
|
[
|
|
|
|
|
address_hex,
|
2021-03-29 15:27:53 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-15 12:06:28 +01:00
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
2021-03-29 15:27:53 +02:00
|
|
|
|
return s_have.apply_async()
|
2021-02-15 12:06:28 +01:00
|
|
|
|
|
|
|
|
|
|
2021-04-02 15:16:27 +02:00
|
|
|
|
def resend(self, tx_hash_hex, chain_spec, in_place=True, unlock=False):
|
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
logg.debug('resend {}'.format(tx_hash_hex))
|
|
|
|
|
s_get_tx_cache = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.query.get_tx_cache',
|
2021-02-01 18:12:51 +01:00
|
|
|
|
[
|
2021-04-04 14:40:59 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
tx_hash_hex,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
# TODO: This check should most likely be in resend task itself
|
|
|
|
|
tx_dict = s_get_tx_cache.apply_async().get()
|
2021-02-13 18:01:48 +01:00
|
|
|
|
if not is_alive(getattr(StatusEnum, tx_dict['status']).value):
|
2021-02-01 18:12:51 +01:00
|
|
|
|
raise TxStateChangeError('Cannot resend mined or obsoleted transaction'.format(txold_hash_hex))
|
2021-02-13 18:01:48 +01:00
|
|
|
|
|
|
|
|
|
if not in_place:
|
2021-02-01 18:12:51 +01:00
|
|
|
|
raise NotImplementedError('resend as new not yet implemented')
|
|
|
|
|
|
2021-02-13 18:01:48 +01:00
|
|
|
|
s = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.eth.gas.resend_with_higher_gas',
|
2021-02-13 18:01:48 +01:00
|
|
|
|
[
|
2021-04-02 15:16:27 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-13 18:01:48 +01:00
|
|
|
|
None,
|
|
|
|
|
1.01,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
s_manual = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.state.set_manual',
|
2021-02-13 18:01:48 +01:00
|
|
|
|
[
|
2021-05-31 17:34:16 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-13 18:01:48 +01:00
|
|
|
|
tx_hash_hex,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
s_manual.link(s)
|
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
if unlock:
|
|
|
|
|
s_gas = celery.signature(
|
|
|
|
|
'cic_eth.admin.ctrl.unlock_send',
|
|
|
|
|
[
|
2021-04-02 15:16:27 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
tx_dict['sender'],
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
s.link(s_gas)
|
|
|
|
|
|
2021-02-13 18:01:48 +01:00
|
|
|
|
return s_manual.apply_async()
|
2021-05-31 17:34:16 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def check_nonce(self, chain_spec, address):
|
2021-02-01 18:12:51 +01:00
|
|
|
|
s = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.query.get_account_tx',
|
2021-02-01 18:12:51 +01:00
|
|
|
|
[
|
2021-04-04 14:40:59 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
address,
|
|
|
|
|
True,
|
|
|
|
|
False,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
txs = s.apply_async().get()
|
|
|
|
|
|
|
|
|
|
blocking_tx = None
|
|
|
|
|
blocking_nonce = None
|
|
|
|
|
nonce_otx = 0
|
2021-03-29 21:29:29 +02:00
|
|
|
|
last_nonce = -1
|
2021-02-01 18:12:51 +01:00
|
|
|
|
for k in txs.keys():
|
|
|
|
|
s_get_tx = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.query.get_tx',
|
2021-02-01 18:12:51 +01:00
|
|
|
|
[
|
2021-05-31 17:34:16 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
k,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
tx = s_get_tx.apply_async().get()
|
2021-03-29 21:29:29 +02:00
|
|
|
|
logg.debug('checking nonce {} (previous {})'.format(tx['nonce'], last_nonce))
|
2021-02-01 18:12:51 +01:00
|
|
|
|
nonce_otx = tx['nonce']
|
2021-03-29 21:29:29 +02:00
|
|
|
|
if not is_alive(tx['status']) and tx['status'] & local_fail > 0:
|
|
|
|
|
logg.info('permanently errored {} nonce {} status {}'.format(k, nonce_otx, status_str(tx['status'])))
|
|
|
|
|
blocking_tx = k
|
|
|
|
|
blocking_nonce = nonce_otx
|
|
|
|
|
elif nonce_otx - last_nonce > 1:
|
2021-05-31 17:34:16 +02:00
|
|
|
|
logg.debug('tx {}'.format(tx))
|
|
|
|
|
tx_obj = unpack(bytes.fromhex(strip_0x(tx['signed_tx'])), chain_spec)
|
|
|
|
|
logg.error('nonce gap; {} followed {} for account {}'.format(nonce_otx, last_nonce, tx_obj['from']))
|
2021-03-29 21:29:29 +02:00
|
|
|
|
blocking_tx = k
|
|
|
|
|
blocking_nonce = nonce_otx
|
|
|
|
|
break
|
|
|
|
|
last_nonce = nonce_otx
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
return {
|
|
|
|
|
'nonce': {
|
2021-03-29 21:29:29 +02:00
|
|
|
|
#'network': nonce_cache,
|
2021-02-01 18:12:51 +01:00
|
|
|
|
'queue': nonce_otx,
|
|
|
|
|
#'cache': nonce_cache,
|
|
|
|
|
'blocking': blocking_nonce,
|
|
|
|
|
},
|
|
|
|
|
'tx': {
|
2021-05-31 17:34:16 +02:00
|
|
|
|
'blocking': add_0x(blocking_tx),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
}
|
2021-05-31 17:34:16 +02:00
|
|
|
|
}
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
|
2021-05-31 17:34:16 +02:00
|
|
|
|
# TODO: is risky since it does not validate that there is actually a nonce problem?
|
|
|
|
|
def fix_nonce(self, chain_spec, address, nonce):
|
2021-02-01 18:12:51 +01:00
|
|
|
|
s = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.query.get_account_tx',
|
2021-02-01 18:12:51 +01:00
|
|
|
|
[
|
2021-04-04 14:40:59 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
address,
|
|
|
|
|
True,
|
|
|
|
|
False,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
txs = s.apply_async().get()
|
|
|
|
|
|
|
|
|
|
tx_hash_hex = None
|
2021-05-31 17:34:16 +02:00
|
|
|
|
session = SessionBase.create_session()
|
2021-02-01 18:12:51 +01:00
|
|
|
|
for k in txs.keys():
|
2021-08-28 13:10:18 +02:00
|
|
|
|
tx_dict = get_tx_local(chain_spec, k, session=session)
|
2021-02-01 18:12:51 +01:00
|
|
|
|
if tx_dict['nonce'] == nonce:
|
|
|
|
|
tx_hash_hex = k
|
2021-05-31 17:34:16 +02:00
|
|
|
|
session.close()
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
s_nonce = celery.signature(
|
|
|
|
|
'cic_eth.admin.nonce.shift_nonce',
|
|
|
|
|
[
|
2021-05-31 17:34:16 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
tx_hash_hex,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue
|
|
|
|
|
)
|
|
|
|
|
return s_nonce.apply_async()
|
|
|
|
|
|
|
|
|
|
|
2021-03-29 21:29:29 +02:00
|
|
|
|
def account(self, chain_spec, address, include_sender=True, include_recipient=True, renderer=None, w=sys.stdout):
|
2021-02-01 18:12:51 +01:00
|
|
|
|
"""Lists locally originated transactions for the given Ethereum address.
|
|
|
|
|
|
|
|
|
|
Performs a synchronous call to the Celery task responsible for performing the query.
|
|
|
|
|
|
|
|
|
|
:param address: Ethereum address to return transactions for
|
|
|
|
|
:type address: str, 0x-hex
|
|
|
|
|
"""
|
2021-07-21 19:34:51 +02:00
|
|
|
|
|
|
|
|
|
address = add_0x(hex_uniform(strip_0x(address)))
|
2021-03-29 21:29:29 +02:00
|
|
|
|
last_nonce = -1
|
2021-02-01 18:12:51 +01:00
|
|
|
|
s = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.query.get_account_tx',
|
2021-02-17 10:33:18 +01:00
|
|
|
|
[
|
2021-04-04 14:40:59 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-17 10:33:18 +01:00
|
|
|
|
address,
|
|
|
|
|
],
|
2021-02-01 18:12:51 +01:00
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
txs = s.apply_async().get()
|
|
|
|
|
|
|
|
|
|
tx_dict_list = []
|
|
|
|
|
for tx_hash in txs.keys():
|
2021-03-29 21:29:29 +02:00
|
|
|
|
errors = []
|
2021-02-01 18:12:51 +01:00
|
|
|
|
s = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.query.get_tx_cache',
|
|
|
|
|
[
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
tx_hash,
|
|
|
|
|
],
|
2021-02-01 18:12:51 +01:00
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
tx_dict = s.apply_async().get()
|
2021-03-29 21:29:29 +02:00
|
|
|
|
if tx_dict['sender'] == address:
|
|
|
|
|
if tx_dict['nonce'] - last_nonce > 1:
|
2021-04-02 15:16:27 +02:00
|
|
|
|
logg.error('nonce gap; {} followed {} for address {} tx {}'.format(tx_dict['nonce'], last_nonce, tx_dict['sender'], tx_hash))
|
2021-03-29 21:29:29 +02:00
|
|
|
|
errors.append('nonce')
|
|
|
|
|
elif tx_dict['nonce'] == last_nonce:
|
2021-04-02 15:16:27 +02:00
|
|
|
|
logg.info('nonce {} duplicate for address {} in tx {}'.format(tx_dict['nonce'], tx_dict['sender'], tx_hash))
|
2021-03-29 21:29:29 +02:00
|
|
|
|
last_nonce = tx_dict['nonce']
|
|
|
|
|
if not include_sender:
|
|
|
|
|
logg.debug('skipping sender tx {}'.format(tx_dict['tx_hash']))
|
|
|
|
|
continue
|
2021-02-01 18:12:51 +01:00
|
|
|
|
elif tx_dict['recipient'] == address and not include_recipient:
|
|
|
|
|
logg.debug('skipping recipient tx {}'.format(tx_dict['tx_hash']))
|
|
|
|
|
continue
|
|
|
|
|
|
|
|
|
|
o = {
|
|
|
|
|
'nonce': tx_dict['nonce'],
|
|
|
|
|
'tx_hash': tx_dict['tx_hash'],
|
|
|
|
|
'status': tx_dict['status'],
|
|
|
|
|
'date_updated': tx_dict['date_updated'],
|
2021-03-29 21:29:29 +02:00
|
|
|
|
'errors': errors,
|
2021-02-01 18:12:51 +01:00
|
|
|
|
}
|
2021-03-29 21:29:29 +02:00
|
|
|
|
if renderer != None:
|
|
|
|
|
r = renderer(o)
|
|
|
|
|
w.write(r + '\n')
|
|
|
|
|
else:
|
|
|
|
|
tx_dict_list.append(o)
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
return tx_dict_list
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# TODO: Add exception upon non-existent tx aswell as invalid tx data to docstring
|
2021-04-25 14:24:17 +02:00
|
|
|
|
# TODO: This method is WAY too long
|
2021-03-29 21:29:29 +02:00
|
|
|
|
def tx(self, chain_spec, tx_hash=None, tx_raw=None, registry=None, renderer=None, w=sys.stdout):
|
2021-02-01 18:12:51 +01:00
|
|
|
|
"""Output local and network details about a given transaction with local origin.
|
|
|
|
|
|
|
|
|
|
If the transaction hash is given, the raw trasnaction data will be retrieved from the local transaction queue backend. Otherwise the raw transaction data must be provided directly. Only one of transaction hash and transaction data can be passed.
|
|
|
|
|
|
|
|
|
|
:param chain_spec: Chain spec of the transaction's chain context
|
|
|
|
|
:type chain_spec: cic_registry.chain.ChainSpec
|
|
|
|
|
:param tx_hash: Transaction hash of transaction to parse and view
|
|
|
|
|
:type tx_hash: str, 0x-hex
|
|
|
|
|
:param tx_raw: Signed raw transaction data to parse and view
|
|
|
|
|
:type tx_raw: str, 0x-hex
|
|
|
|
|
:raises ValueError: Both tx_hash and tx_raw are passed
|
|
|
|
|
:return: Transaction details
|
|
|
|
|
:rtype: dict
|
|
|
|
|
"""
|
2021-03-06 18:55:51 +01:00
|
|
|
|
problems = []
|
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
if tx_hash != None and tx_raw != None:
|
|
|
|
|
ValueError('Specify only one of hash or raw tx')
|
|
|
|
|
|
|
|
|
|
if tx_raw != None:
|
2021-03-29 15:27:53 +02:00
|
|
|
|
tx_hash = add_0x(keccak256_hex_to_hex(tx_raw))
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
s = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.query.get_tx_cache',
|
|
|
|
|
[
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
tx_hash,
|
|
|
|
|
],
|
2021-02-01 18:12:51 +01:00
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
|
2021-04-04 14:40:59 +02:00
|
|
|
|
t = s.apply_async()
|
|
|
|
|
tx = t.get()
|
2021-05-31 17:34:16 +02:00
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
source_token = None
|
2021-03-29 15:27:53 +02:00
|
|
|
|
if tx['source_token'] != ZERO_ADDRESS:
|
2021-05-31 17:34:16 +02:00
|
|
|
|
source_token_declaration = None
|
2021-04-25 14:24:17 +02:00
|
|
|
|
if registry != None:
|
|
|
|
|
try:
|
2021-05-31 17:34:16 +02:00
|
|
|
|
source_token_declaration = registry.by_address(tx['source_token'], sender_address=self.call_address)
|
2021-04-25 14:24:17 +02:00
|
|
|
|
except UnknownContractError:
|
|
|
|
|
logg.warning('unknown source token contract {} (direct)'.format(tx['source_token']))
|
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.task.registry_address_lookup',
|
|
|
|
|
[
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
tx['source_token'],
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
2021-05-31 17:34:16 +02:00
|
|
|
|
source_token_declaration = t.get()
|
|
|
|
|
|
|
|
|
|
if source_token_declaration != None:
|
|
|
|
|
logg.warning('found declarator record for source token {} but not checking validity'.format(tx['source_token']))
|
|
|
|
|
source_token = ERC20Token(chain_spec, self.rpc, tx['source_token'])
|
|
|
|
|
logg.debug('source token set tup {}'.format(source_token))
|
|
|
|
|
|
2021-04-25 14:24:17 +02:00
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
destination_token = None
|
2021-04-25 14:24:17 +02:00
|
|
|
|
if tx['destination_token'] != ZERO_ADDRESS:
|
2021-05-31 17:34:16 +02:00
|
|
|
|
destination_token_declaration = None
|
2021-04-25 14:24:17 +02:00
|
|
|
|
if registry != None:
|
|
|
|
|
try:
|
2021-05-31 17:34:16 +02:00
|
|
|
|
destination_token_declaration = registry.by_address(tx['destination_token'], sender_address=self.call_address)
|
2021-04-25 14:24:17 +02:00
|
|
|
|
except UnknownContractError:
|
|
|
|
|
logg.warning('unknown destination token contract {}'.format(tx['destination_token']))
|
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.task.registry_address_lookup',
|
|
|
|
|
[
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
tx['destination_token'],
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
2021-05-31 17:34:16 +02:00
|
|
|
|
destination_token_declaration = t.get()
|
|
|
|
|
if destination_token_declaration != None:
|
|
|
|
|
logg.warning('found declarator record for destination token {} but not checking validity'.format(tx['destination_token']))
|
|
|
|
|
destination_token = ERC20Token(chain_spec, self.rpc, tx['destination_token'])
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
tx['sender_description'] = 'Custodial account'
|
|
|
|
|
tx['recipient_description'] = 'Custodial account'
|
|
|
|
|
|
2021-03-29 15:27:53 +02:00
|
|
|
|
o = code(tx['sender'])
|
2021-04-25 14:24:17 +02:00
|
|
|
|
t = self.proxy_do(chain_spec, o)
|
|
|
|
|
r = t.get()
|
2021-03-29 15:27:53 +02:00
|
|
|
|
if len(strip_0x(r, allow_empty=True)) > 0:
|
2021-04-25 14:24:17 +02:00
|
|
|
|
if registry != None:
|
|
|
|
|
try:
|
|
|
|
|
sender_contract = registry.by_address(tx['sender'], sender_address=self.call_address)
|
|
|
|
|
tx['sender_description'] = 'Contract at {}'.format(tx['sender'])
|
|
|
|
|
except UnknownContractError:
|
|
|
|
|
tx['sender_description'] = 'Unknown contract'
|
|
|
|
|
except KeyError as e:
|
|
|
|
|
tx['sender_description'] = 'Unknown contract'
|
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.task.registry_address_lookup',
|
|
|
|
|
[
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
tx['sender'],
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
|
|
|
|
tx['sender_description'] = t.get()
|
|
|
|
|
if tx['sender_description'] == None:
|
|
|
|
|
tx['sender_description'] = 'Unknown contract'
|
|
|
|
|
|
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.have',
|
|
|
|
|
[
|
|
|
|
|
tx['sender'],
|
2021-03-29 15:27:53 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
|
|
|
|
account = t.get()
|
|
|
|
|
if account == None:
|
|
|
|
|
tx['sender_description'] = 'Unknown account'
|
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.role',
|
|
|
|
|
[
|
|
|
|
|
tx['sender'],
|
2021-03-29 15:27:53 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
2021-10-30 13:19:31 +02:00
|
|
|
|
role = t.get()[0][1]
|
2021-02-01 18:12:51 +01:00
|
|
|
|
if role != None:
|
|
|
|
|
tx['sender_description'] = role
|
|
|
|
|
|
2021-03-29 15:27:53 +02:00
|
|
|
|
o = code(tx['recipient'])
|
2021-04-25 14:24:17 +02:00
|
|
|
|
t = self.proxy_do(chain_spec, o)
|
|
|
|
|
r = t.get()
|
2021-03-29 15:27:53 +02:00
|
|
|
|
if len(strip_0x(r, allow_empty=True)) > 0:
|
2021-04-25 14:24:17 +02:00
|
|
|
|
if registry != None:
|
|
|
|
|
try:
|
|
|
|
|
recipient_contract = registry.by_address(tx['recipient'])
|
|
|
|
|
tx['recipient_description'] = 'Contract at {}'.format(tx['recipient'])
|
|
|
|
|
except UnknownContractError as e:
|
|
|
|
|
tx['recipient_description'] = 'Unknown contract'
|
|
|
|
|
except KeyError as e:
|
|
|
|
|
tx['recipient_description'] = 'Unknown contract'
|
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.task.registry_address_lookup',
|
|
|
|
|
[
|
|
|
|
|
chain_spec.asdict(),
|
|
|
|
|
tx['recipient'],
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
|
|
|
|
tx['recipient_description'] = t.get()
|
|
|
|
|
if tx['recipient_description'] == None:
|
|
|
|
|
tx['recipient_description'] = 'Unknown contract'
|
|
|
|
|
|
2021-02-01 18:12:51 +01:00
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.have',
|
|
|
|
|
[
|
|
|
|
|
tx['recipient'],
|
2021-03-29 15:27:53 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
|
|
|
|
account = t.get()
|
|
|
|
|
if account == None:
|
|
|
|
|
tx['recipient_description'] = 'Unknown account'
|
|
|
|
|
else:
|
|
|
|
|
s = celery.signature(
|
|
|
|
|
'cic_eth.eth.account.role',
|
|
|
|
|
[
|
|
|
|
|
tx['recipient'],
|
2021-03-29 15:27:53 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
2021-10-30 13:19:31 +02:00
|
|
|
|
role = t.get()[0][1]
|
2021-02-01 18:12:51 +01:00
|
|
|
|
if role != None:
|
|
|
|
|
tx['recipient_description'] = role
|
|
|
|
|
|
2021-05-31 17:34:16 +02:00
|
|
|
|
erc20_c = ERC20(chain_spec)
|
2021-02-01 18:12:51 +01:00
|
|
|
|
if source_token != None:
|
2021-05-31 17:34:16 +02:00
|
|
|
|
tx['source_token_symbol'] = source_token.symbol
|
|
|
|
|
o = erc20_c.balance_of(tx['source_token'], tx['sender'], sender_address=self.call_address)
|
|
|
|
|
r = self.rpc.do(o)
|
2021-06-30 16:44:17 +02:00
|
|
|
|
tx['sender_token_balance'] = erc20_c.parse_balance(r)
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
if destination_token != None:
|
2021-05-31 17:34:16 +02:00
|
|
|
|
tx['destination_token_symbol'] = destination_token.symbol
|
|
|
|
|
o = erc20_c.balance_of(tx['destination_token'], tx['recipient'], sender_address=self.call_address)
|
|
|
|
|
r = self.rpc.do(o)
|
2021-06-30 16:44:17 +02:00
|
|
|
|
tx['recipient_token_balance'] = erc20_c.parse_balance(r)
|
2021-05-31 17:34:16 +02:00
|
|
|
|
#tx['recipient_token_balance'] = destination_token.function('balanceOf')(tx['recipient']).call()
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
2021-04-02 15:16:27 +02:00
|
|
|
|
# TODO: this can mean either not subitted or culled, need to check other txs with same nonce to determine which
|
|
|
|
|
tx['network_status'] = 'Not in node'
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
2021-03-29 15:27:53 +02:00
|
|
|
|
r = None
|
2021-02-01 18:12:51 +01:00
|
|
|
|
try:
|
2021-03-29 15:27:53 +02:00
|
|
|
|
o = transaction(tx_hash)
|
2021-04-25 14:24:17 +02:00
|
|
|
|
t = self.proxy_do(chain_spec, o)
|
|
|
|
|
r = t.get()
|
2021-04-02 15:16:27 +02:00
|
|
|
|
if r != None:
|
|
|
|
|
tx['network_status'] = 'Mempool'
|
2021-03-29 15:27:53 +02:00
|
|
|
|
except Exception as e:
|
|
|
|
|
logg.warning('(too permissive exception handler, please fix!) {}'.format(e))
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
2021-03-29 15:27:53 +02:00
|
|
|
|
if r != None:
|
|
|
|
|
try:
|
|
|
|
|
o = receipt(tx_hash)
|
2021-04-25 14:24:17 +02:00
|
|
|
|
t = self.proxy_do(chain_spec, o)
|
|
|
|
|
r = t.get()
|
2021-03-29 15:27:53 +02:00
|
|
|
|
logg.debug('h {} o {}'.format(tx_hash, o))
|
|
|
|
|
if int(strip_0x(r['status'])) == 1:
|
|
|
|
|
tx['network_status'] = 'Confirmed'
|
|
|
|
|
else:
|
|
|
|
|
tx['network_status'] = 'Reverted'
|
|
|
|
|
tx['network_block_number'] = r.blockNumber
|
|
|
|
|
tx['network_tx_index'] = r.transactionIndex
|
|
|
|
|
if tx['block_number'] == None:
|
|
|
|
|
problems.append('Queue is missing block number {} for mined tx'.format(r.blockNumber))
|
|
|
|
|
except Exception as e:
|
|
|
|
|
logg.warning('too permissive exception handler, please fix!')
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
o = balance(tx['sender'])
|
2021-04-25 14:24:17 +02:00
|
|
|
|
t = self.proxy_do(chain_spec, o)
|
|
|
|
|
r = t.get()
|
2021-03-29 15:27:53 +02:00
|
|
|
|
tx['sender_gas_balance'] = r
|
|
|
|
|
|
|
|
|
|
o = balance(tx['recipient'])
|
2021-04-25 14:24:17 +02:00
|
|
|
|
t = self.proxy_do(chain_spec, o)
|
|
|
|
|
r = t.get()
|
2021-03-29 15:27:53 +02:00
|
|
|
|
tx['recipient_gas_balance'] = r
|
|
|
|
|
|
2021-04-05 17:07:09 +02:00
|
|
|
|
tx_unpacked = unpack(bytes.fromhex(strip_0x(tx['signed_tx'])), chain_spec)
|
2021-02-01 18:12:51 +01:00
|
|
|
|
tx['gas_price'] = tx_unpacked['gasPrice']
|
|
|
|
|
tx['gas_limit'] = tx_unpacked['gas']
|
2021-03-01 21:15:17 +01:00
|
|
|
|
tx['data'] = tx_unpacked['data']
|
2021-02-01 18:12:51 +01:00
|
|
|
|
|
|
|
|
|
s = celery.signature(
|
2021-04-04 14:40:59 +02:00
|
|
|
|
'cic_eth.queue.state.get_state_log',
|
2021-02-01 18:12:51 +01:00
|
|
|
|
[
|
2021-04-04 14:40:59 +02:00
|
|
|
|
chain_spec.asdict(),
|
2021-02-01 18:12:51 +01:00
|
|
|
|
tx_hash,
|
|
|
|
|
],
|
|
|
|
|
queue=self.queue,
|
|
|
|
|
)
|
|
|
|
|
t = s.apply_async()
|
|
|
|
|
tx['status_log'] = t.get()
|
|
|
|
|
|
2021-03-06 18:55:51 +01:00
|
|
|
|
if len(problems) > 0:
|
|
|
|
|
sys.stderr.write('\n')
|
|
|
|
|
for p in problems:
|
|
|
|
|
sys.stderr.write('!!!{}\n'.format(p))
|
|
|
|
|
|
2021-03-29 21:29:29 +02:00
|
|
|
|
if renderer == None:
|
|
|
|
|
return tx
|
|
|
|
|
|
|
|
|
|
r = renderer(tx)
|
|
|
|
|
w.write(r + '\n')
|
|
|
|
|
return None
|