mirror of
https://github.com/monero-project/monero.git
synced 2024-11-18 00:37:43 +00:00
8f96cfc20a
Since I had to add an ID to the derived classes anyway, this can be used instead. This removes an apparently pointless warning from CLANG too.
1689 lines
66 KiB
C++
1689 lines
66 KiB
C++
// Copyright (c) 2014-2017, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
#include "include_base_utils.h"
|
|
using namespace epee;
|
|
|
|
#include "core_rpc_server.h"
|
|
#include "common/command_line.h"
|
|
#include "common/updates.h"
|
|
#include "common/download.h"
|
|
#include "common/util.h"
|
|
#include "cryptonote_basic/cryptonote_format_utils.h"
|
|
#include "cryptonote_basic/account.h"
|
|
#include "cryptonote_basic/cryptonote_basic_impl.h"
|
|
#include "misc_language.h"
|
|
#include "crypto/hash.h"
|
|
#include "rpc/rpc_args.h"
|
|
#include "core_rpc_server_error_codes.h"
|
|
|
|
#undef MONERO_DEFAULT_LOG_CATEGORY
|
|
#define MONERO_DEFAULT_LOG_CATEGORY "daemon.rpc"
|
|
|
|
#define MAX_RESTRICTED_FAKE_OUTS_COUNT 40
|
|
#define MAX_RESTRICTED_GLOBAL_FAKE_OUTS_COUNT 500
|
|
|
|
namespace cryptonote
|
|
{
|
|
|
|
//-----------------------------------------------------------------------------------
|
|
void core_rpc_server::init_options(boost::program_options::options_description& desc)
|
|
{
|
|
command_line::add_arg(desc, arg_rpc_bind_port);
|
|
command_line::add_arg(desc, arg_testnet_rpc_bind_port);
|
|
command_line::add_arg(desc, arg_restricted_rpc);
|
|
cryptonote::rpc_args::init_options(desc);
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
core_rpc_server::core_rpc_server(
|
|
core& cr
|
|
, nodetool::node_server<cryptonote::t_cryptonote_protocol_handler<cryptonote::core> >& p2p
|
|
)
|
|
: m_core(cr)
|
|
, m_p2p(p2p)
|
|
{}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::init(
|
|
const boost::program_options::variables_map& vm
|
|
)
|
|
{
|
|
m_testnet = command_line::get_arg(vm, command_line::arg_testnet_on);
|
|
m_net_server.set_threads_prefix("RPC");
|
|
|
|
auto p2p_bind_arg = m_testnet ? arg_testnet_rpc_bind_port : arg_rpc_bind_port;
|
|
|
|
auto rpc_config = cryptonote::rpc_args::process(vm);
|
|
if (!rpc_config)
|
|
return false;
|
|
|
|
m_restricted = command_line::get_arg(vm, arg_restricted_rpc);
|
|
|
|
boost::optional<epee::net_utils::http::login> http_login{};
|
|
std::string port = command_line::get_arg(vm, p2p_bind_arg);
|
|
if (rpc_config->login)
|
|
http_login.emplace(std::move(rpc_config->login->username), std::move(rpc_config->login->password).password());
|
|
|
|
return epee::http_server_impl_base<core_rpc_server, connection_context>::init(
|
|
std::move(port), std::move(rpc_config->bind_ip), std::move(http_login)
|
|
);
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::check_core_busy()
|
|
{
|
|
if(m_p2p.get_payload_object().get_core().get_blockchain_storage().is_storing_blockchain())
|
|
{
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
#define CHECK_CORE_BUSY() do { if(!check_core_busy()){res.status = CORE_RPC_STATUS_BUSY;return true;} } while(0)
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::check_core_ready()
|
|
{
|
|
if(!m_p2p.get_payload_object().is_synchronized())
|
|
{
|
|
return false;
|
|
}
|
|
return check_core_busy();
|
|
}
|
|
#define CHECK_CORE_READY() do { if(!check_core_ready()){res.status = CORE_RPC_STATUS_BUSY;return true;} } while(0)
|
|
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_height(const COMMAND_RPC_GET_HEIGHT::request& req, COMMAND_RPC_GET_HEIGHT::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
res.height = m_core.get_current_blockchain_height();
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_info(const COMMAND_RPC_GET_INFO::request& req, COMMAND_RPC_GET_INFO::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
crypto::hash top_hash;
|
|
if (!m_core.get_blockchain_top(res.height, top_hash))
|
|
{
|
|
res.status = "Failed";
|
|
return false;
|
|
}
|
|
++res.height; // turn top block height into blockchain height
|
|
res.top_block_hash = string_tools::pod_to_hex(top_hash);
|
|
res.target_height = m_core.get_target_blockchain_height();
|
|
res.difficulty = m_core.get_blockchain_storage().get_difficulty_for_next_block();
|
|
res.target = m_core.get_blockchain_storage().get_current_hard_fork_version() < 2 ? DIFFICULTY_TARGET_V1 : DIFFICULTY_TARGET_V2;
|
|
res.tx_count = m_core.get_blockchain_storage().get_total_transactions() - res.height; //without coinbase
|
|
res.tx_pool_size = m_core.get_pool_transactions_count();
|
|
res.alt_blocks_count = m_core.get_blockchain_storage().get_alternative_blocks_count();
|
|
uint64_t total_conn = m_p2p.get_connections_count();
|
|
res.outgoing_connections_count = m_p2p.get_outgoing_connections_count();
|
|
res.incoming_connections_count = total_conn - res.outgoing_connections_count;
|
|
res.white_peerlist_size = m_p2p.get_peerlist_manager().get_white_peers_count();
|
|
res.grey_peerlist_size = m_p2p.get_peerlist_manager().get_gray_peers_count();
|
|
res.testnet = m_testnet;
|
|
res.cumulative_difficulty = m_core.get_blockchain_storage().get_db().get_block_cumulative_difficulty(res.height - 1);
|
|
res.block_size_limit = m_core.get_blockchain_storage().get_current_cumulative_blocksize_limit();
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
res.start_time = (uint64_t)m_core.get_start_time();
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
static cryptonote::blobdata get_pruned_tx_blob(const cryptonote::blobdata &blobdata)
|
|
{
|
|
cryptonote::transaction tx;
|
|
|
|
if (!cryptonote::parse_and_validate_tx_from_blob(blobdata, tx))
|
|
{
|
|
MERROR("Failed to parse and validate tx from blob");
|
|
return blobdata;
|
|
}
|
|
|
|
std::stringstream ss;
|
|
binary_archive<true> ba(ss);
|
|
bool r = tx.serialize_base(ba);
|
|
CHECK_AND_ASSERT_MES(r, blobdata, "Failed to serialize rct signatures base");
|
|
return ss.str();
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_blocks(const COMMAND_RPC_GET_BLOCKS_FAST::request& req, COMMAND_RPC_GET_BLOCKS_FAST::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
std::list<std::pair<cryptonote::blobdata, std::list<cryptonote::blobdata> > > bs;
|
|
|
|
if(!m_core.find_blockchain_supplement(req.start_height, req.block_ids, bs, res.current_height, res.start_height, COMMAND_RPC_GET_BLOCKS_FAST_MAX_COUNT))
|
|
{
|
|
res.status = "Failed";
|
|
return false;
|
|
}
|
|
|
|
size_t pruned_size = 0, unpruned_size = 0, ntxes = 0;
|
|
for(auto& bd: bs)
|
|
{
|
|
res.blocks.resize(res.blocks.size()+1);
|
|
res.blocks.back().block = bd.first;
|
|
pruned_size += bd.first.size();
|
|
unpruned_size += bd.first.size();
|
|
res.output_indices.push_back(COMMAND_RPC_GET_BLOCKS_FAST::block_output_indices());
|
|
res.output_indices.back().indices.push_back(COMMAND_RPC_GET_BLOCKS_FAST::tx_output_indices());
|
|
block b;
|
|
if (!parse_and_validate_block_from_blob(bd.first, b))
|
|
{
|
|
res.status = "Invalid block";
|
|
return false;
|
|
}
|
|
bool r = m_core.get_tx_outputs_gindexs(get_transaction_hash(b.miner_tx), res.output_indices.back().indices.back().indices);
|
|
if (!r)
|
|
{
|
|
res.status = "Failed";
|
|
return false;
|
|
}
|
|
size_t txidx = 0;
|
|
ntxes += bd.second.size();
|
|
for(const auto& t: bd.second)
|
|
{
|
|
if (req.prune)
|
|
res.blocks.back().txs.push_back(get_pruned_tx_blob(t));
|
|
else
|
|
res.blocks.back().txs.push_back(t);
|
|
pruned_size += res.blocks.back().txs.back().size();
|
|
unpruned_size += t.size();
|
|
res.output_indices.back().indices.push_back(COMMAND_RPC_GET_BLOCKS_FAST::tx_output_indices());
|
|
bool r = m_core.get_tx_outputs_gindexs(b.tx_hashes[txidx++], res.output_indices.back().indices.back().indices);
|
|
if (!r)
|
|
{
|
|
res.status = "Failed";
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
MDEBUG("on_get_blocks: " << bs.size() << " blocks, " << ntxes << " txes, pruned size " << pruned_size << ", unpruned size " << unpruned_size);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_blocks_by_height(const COMMAND_RPC_GET_BLOCKS_BY_HEIGHT::request& req, COMMAND_RPC_GET_BLOCKS_BY_HEIGHT::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
res.status = "Failed";
|
|
res.blocks.clear();
|
|
res.blocks.reserve(req.heights.size());
|
|
for (uint64_t height : req.heights)
|
|
{
|
|
block blk;
|
|
try
|
|
{
|
|
blk = m_core.get_blockchain_storage().get_db().get_block_from_height(height);
|
|
}
|
|
catch (...)
|
|
{
|
|
res.status = "Error retrieving block at height " + std::to_string(height);
|
|
return true;
|
|
}
|
|
std::list<transaction> txs;
|
|
std::list<crypto::hash> missed_txs;
|
|
m_core.get_transactions(blk.tx_hashes, txs, missed_txs);
|
|
res.blocks.resize(res.blocks.size() + 1);
|
|
res.blocks.back().block = block_to_blob(blk);
|
|
for (auto& tx : txs)
|
|
res.blocks.back().txs.push_back(tx_to_blob(tx));
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_hashes(const COMMAND_RPC_GET_HASHES_FAST::request& req, COMMAND_RPC_GET_HASHES_FAST::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
NOTIFY_RESPONSE_CHAIN_ENTRY::request resp;
|
|
|
|
resp.start_height = req.start_height;
|
|
if(!m_core.find_blockchain_supplement(req.block_ids, resp))
|
|
{
|
|
res.status = "Failed";
|
|
return false;
|
|
}
|
|
res.current_height = resp.total_height;
|
|
res.start_height = resp.start_height;
|
|
res.m_block_ids = std::move(resp.m_block_ids);
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_random_outs(const COMMAND_RPC_GET_RANDOM_OUTPUTS_FOR_AMOUNTS::request& req, COMMAND_RPC_GET_RANDOM_OUTPUTS_FOR_AMOUNTS::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
res.status = "Failed";
|
|
|
|
if (m_restricted)
|
|
{
|
|
if (req.amounts.size() > 100 || req.outs_count > MAX_RESTRICTED_FAKE_OUTS_COUNT)
|
|
{
|
|
res.status = "Too many outs requested";
|
|
return true;
|
|
}
|
|
}
|
|
|
|
if(!m_core.get_random_outs_for_amounts(req, res))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
std::stringstream ss;
|
|
typedef COMMAND_RPC_GET_RANDOM_OUTPUTS_FOR_AMOUNTS::outs_for_amount outs_for_amount;
|
|
typedef COMMAND_RPC_GET_RANDOM_OUTPUTS_FOR_AMOUNTS::out_entry out_entry;
|
|
std::for_each(res.outs.begin(), res.outs.end(), [&](outs_for_amount& ofa)
|
|
{
|
|
ss << "[" << ofa.amount << "]:";
|
|
CHECK_AND_ASSERT_MES(ofa.outs.size(), ;, "internal error: ofa.outs.size() is empty for amount " << ofa.amount);
|
|
std::for_each(ofa.outs.begin(), ofa.outs.end(), [&](out_entry& oe)
|
|
{
|
|
ss << oe.global_amount_index << " ";
|
|
});
|
|
ss << ENDL;
|
|
});
|
|
std::string s = ss.str();
|
|
LOG_PRINT_L2("COMMAND_RPC_GET_RANDOM_OUTPUTS_FOR_AMOUNTS: " << ENDL << s);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_outs_bin(const COMMAND_RPC_GET_OUTPUTS_BIN::request& req, COMMAND_RPC_GET_OUTPUTS_BIN::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
res.status = "Failed";
|
|
|
|
if (m_restricted)
|
|
{
|
|
if (req.outputs.size() > MAX_RESTRICTED_GLOBAL_FAKE_OUTS_COUNT)
|
|
{
|
|
res.status = "Too many outs requested";
|
|
return true;
|
|
}
|
|
}
|
|
|
|
if(!m_core.get_outs(req, res))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_outs(const COMMAND_RPC_GET_OUTPUTS::request& req, COMMAND_RPC_GET_OUTPUTS::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
res.status = "Failed";
|
|
|
|
if (m_restricted)
|
|
{
|
|
if (req.outputs.size() > MAX_RESTRICTED_GLOBAL_FAKE_OUTS_COUNT)
|
|
{
|
|
res.status = "Too many outs requested";
|
|
return true;
|
|
}
|
|
}
|
|
|
|
cryptonote::COMMAND_RPC_GET_OUTPUTS_BIN::request req_bin;
|
|
req_bin.outputs = req.outputs;
|
|
cryptonote::COMMAND_RPC_GET_OUTPUTS_BIN::response res_bin;
|
|
if(!m_core.get_outs(req_bin, res_bin))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
// convert to text
|
|
for (const auto &i: res_bin.outs)
|
|
{
|
|
res.outs.push_back(cryptonote::COMMAND_RPC_GET_OUTPUTS::outkey());
|
|
cryptonote::COMMAND_RPC_GET_OUTPUTS::outkey &outkey = res.outs.back();
|
|
outkey.key = epee::string_tools::pod_to_hex(i.key);
|
|
outkey.mask = epee::string_tools::pod_to_hex(i.mask);
|
|
outkey.unlocked = i.unlocked;
|
|
outkey.height = i.height;
|
|
outkey.txid = epee::string_tools::pod_to_hex(i.txid);
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_random_rct_outs(const COMMAND_RPC_GET_RANDOM_RCT_OUTPUTS::request& req, COMMAND_RPC_GET_RANDOM_RCT_OUTPUTS::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
res.status = "Failed";
|
|
if(!m_core.get_random_rct_outs(req, res))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
std::stringstream ss;
|
|
typedef COMMAND_RPC_GET_RANDOM_RCT_OUTPUTS::out_entry out_entry;
|
|
CHECK_AND_ASSERT_MES(res.outs.size(), true, "internal error: res.outs.size() is empty");
|
|
std::for_each(res.outs.begin(), res.outs.end(), [&](out_entry& oe)
|
|
{
|
|
ss << oe.global_amount_index << " ";
|
|
});
|
|
ss << ENDL;
|
|
std::string s = ss.str();
|
|
LOG_PRINT_L2("COMMAND_RPC_GET_RANDOM_RCT_OUTPUTS: " << ENDL << s);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_indexes(const COMMAND_RPC_GET_TX_GLOBAL_OUTPUTS_INDEXES::request& req, COMMAND_RPC_GET_TX_GLOBAL_OUTPUTS_INDEXES::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
bool r = m_core.get_tx_outputs_gindexs(req.txid, res.o_indexes);
|
|
if(!r)
|
|
{
|
|
res.status = "Failed";
|
|
return true;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
LOG_PRINT_L2("COMMAND_RPC_GET_TX_GLOBAL_OUTPUTS_INDEXES: [" << res.o_indexes.size() << "]");
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_transactions(const COMMAND_RPC_GET_TRANSACTIONS::request& req, COMMAND_RPC_GET_TRANSACTIONS::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
std::vector<crypto::hash> vh;
|
|
for(const auto& tx_hex_str: req.txs_hashes)
|
|
{
|
|
blobdata b;
|
|
if(!string_tools::parse_hexstr_to_binbuff(tx_hex_str, b))
|
|
{
|
|
res.status = "Failed to parse hex representation of transaction hash";
|
|
return true;
|
|
}
|
|
if(b.size() != sizeof(crypto::hash))
|
|
{
|
|
res.status = "Failed, size of data mismatch";
|
|
return true;
|
|
}
|
|
vh.push_back(*reinterpret_cast<const crypto::hash*>(b.data()));
|
|
}
|
|
std::list<crypto::hash> missed_txs;
|
|
std::list<transaction> txs;
|
|
bool r = m_core.get_transactions(vh, txs, missed_txs);
|
|
if(!r)
|
|
{
|
|
res.status = "Failed";
|
|
return true;
|
|
}
|
|
LOG_PRINT_L2("Found " << txs.size() << "/" << vh.size() << " transactions on the blockchain");
|
|
|
|
// try the pool for any missing txes
|
|
size_t found_in_pool = 0;
|
|
std::unordered_set<crypto::hash> pool_tx_hashes;
|
|
if (!missed_txs.empty())
|
|
{
|
|
std::list<transaction> pool_txs;
|
|
bool r = m_core.get_pool_transactions(pool_txs);
|
|
if(r)
|
|
{
|
|
for (std::list<transaction>::const_iterator i = pool_txs.begin(); i != pool_txs.end(); ++i)
|
|
{
|
|
crypto::hash tx_hash = get_transaction_hash(*i);
|
|
std::list<crypto::hash>::iterator mi = std::find(missed_txs.begin(), missed_txs.end(), tx_hash);
|
|
if (mi != missed_txs.end())
|
|
{
|
|
pool_tx_hashes.insert(tx_hash);
|
|
missed_txs.erase(mi);
|
|
txs.push_back(*i);
|
|
++found_in_pool;
|
|
}
|
|
}
|
|
}
|
|
LOG_PRINT_L2("Found " << found_in_pool << "/" << vh.size() << " transactions in the pool");
|
|
}
|
|
|
|
std::list<std::string>::const_iterator txhi = req.txs_hashes.begin();
|
|
std::vector<crypto::hash>::const_iterator vhi = vh.begin();
|
|
for(auto& tx: txs)
|
|
{
|
|
res.txs.push_back(COMMAND_RPC_GET_TRANSACTIONS::entry());
|
|
COMMAND_RPC_GET_TRANSACTIONS::entry &e = res.txs.back();
|
|
|
|
crypto::hash tx_hash = *vhi++;
|
|
e.tx_hash = *txhi++;
|
|
blobdata blob = t_serializable_object_to_blob(tx);
|
|
e.as_hex = string_tools::buff_to_hex_nodelimer(blob);
|
|
if (req.decode_as_json)
|
|
e.as_json = obj_to_json_str(tx);
|
|
e.in_pool = pool_tx_hashes.find(tx_hash) != pool_tx_hashes.end();
|
|
if (e.in_pool)
|
|
{
|
|
e.block_height = std::numeric_limits<uint64_t>::max();
|
|
}
|
|
else
|
|
{
|
|
e.block_height = m_core.get_blockchain_storage().get_db().get_tx_block_height(tx_hash);
|
|
}
|
|
|
|
// fill up old style responses too, in case an old wallet asks
|
|
res.txs_as_hex.push_back(e.as_hex);
|
|
if (req.decode_as_json)
|
|
res.txs_as_json.push_back(e.as_json);
|
|
|
|
// output indices too if not in pool
|
|
if (pool_tx_hashes.find(tx_hash) == pool_tx_hashes.end())
|
|
{
|
|
bool r = m_core.get_tx_outputs_gindexs(tx_hash, e.output_indices);
|
|
if (!r)
|
|
{
|
|
res.status = "Failed";
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
for(const auto& miss_tx: missed_txs)
|
|
{
|
|
res.missed_tx.push_back(string_tools::pod_to_hex(miss_tx));
|
|
}
|
|
|
|
LOG_PRINT_L2(res.txs.size() << " transactions found, " << res.missed_tx.size() << " not found");
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_is_key_image_spent(const COMMAND_RPC_IS_KEY_IMAGE_SPENT::request& req, COMMAND_RPC_IS_KEY_IMAGE_SPENT::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
std::vector<crypto::key_image> key_images;
|
|
for(const auto& ki_hex_str: req.key_images)
|
|
{
|
|
blobdata b;
|
|
if(!string_tools::parse_hexstr_to_binbuff(ki_hex_str, b))
|
|
{
|
|
res.status = "Failed to parse hex representation of key image";
|
|
return true;
|
|
}
|
|
if(b.size() != sizeof(crypto::key_image))
|
|
{
|
|
res.status = "Failed, size of data mismatch";
|
|
}
|
|
key_images.push_back(*reinterpret_cast<const crypto::key_image*>(b.data()));
|
|
}
|
|
std::vector<bool> spent_status;
|
|
bool r = m_core.are_key_images_spent(key_images, spent_status);
|
|
if(!r)
|
|
{
|
|
res.status = "Failed";
|
|
return true;
|
|
}
|
|
res.spent_status.clear();
|
|
for (size_t n = 0; n < spent_status.size(); ++n)
|
|
res.spent_status.push_back(spent_status[n] ? COMMAND_RPC_IS_KEY_IMAGE_SPENT::SPENT_IN_BLOCKCHAIN : COMMAND_RPC_IS_KEY_IMAGE_SPENT::UNSPENT);
|
|
|
|
// check the pool too
|
|
std::vector<cryptonote::tx_info> txs;
|
|
std::vector<cryptonote::spent_key_image_info> ki;
|
|
r = m_core.get_pool_transactions_and_spent_keys_info(txs, ki);
|
|
if(!r)
|
|
{
|
|
res.status = "Failed";
|
|
return true;
|
|
}
|
|
for (std::vector<cryptonote::spent_key_image_info>::const_iterator i = ki.begin(); i != ki.end(); ++i)
|
|
{
|
|
crypto::hash hash;
|
|
crypto::key_image spent_key_image;
|
|
if (parse_hash256(i->id_hash, hash))
|
|
{
|
|
memcpy(&spent_key_image, &hash, sizeof(hash)); // a bit dodgy, should be other parse functions somewhere
|
|
for (size_t n = 0; n < res.spent_status.size(); ++n)
|
|
{
|
|
if (res.spent_status[n] == COMMAND_RPC_IS_KEY_IMAGE_SPENT::UNSPENT)
|
|
{
|
|
if (key_images[n] == spent_key_image)
|
|
{
|
|
res.spent_status[n] = COMMAND_RPC_IS_KEY_IMAGE_SPENT::SPENT_IN_POOL;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_send_raw_tx(const COMMAND_RPC_SEND_RAW_TX::request& req, COMMAND_RPC_SEND_RAW_TX::response& res)
|
|
{
|
|
CHECK_CORE_READY();
|
|
|
|
std::string tx_blob;
|
|
if(!string_tools::parse_hexstr_to_binbuff(req.tx_as_hex, tx_blob))
|
|
{
|
|
LOG_PRINT_L0("[on_send_raw_tx]: Failed to parse tx from hexbuff: " << req.tx_as_hex);
|
|
res.status = "Failed";
|
|
return true;
|
|
}
|
|
|
|
cryptonote_connection_context fake_context = AUTO_VAL_INIT(fake_context);
|
|
tx_verification_context tvc = AUTO_VAL_INIT(tvc);
|
|
if(!m_core.handle_incoming_tx(tx_blob, tvc, false, false, req.do_not_relay) || tvc.m_verifivation_failed)
|
|
{
|
|
if (tvc.m_verifivation_failed)
|
|
{
|
|
LOG_PRINT_L0("[on_send_raw_tx]: tx verification failed");
|
|
}
|
|
else
|
|
{
|
|
LOG_PRINT_L0("[on_send_raw_tx]: Failed to process tx");
|
|
}
|
|
res.status = "Failed";
|
|
if ((res.low_mixin = tvc.m_low_mixin))
|
|
res.reason = "mixin too low";
|
|
if ((res.double_spend = tvc.m_double_spend))
|
|
res.reason = "double spend";
|
|
if ((res.invalid_input = tvc.m_invalid_input))
|
|
res.reason = "invalid input";
|
|
if ((res.invalid_output = tvc.m_invalid_output))
|
|
res.reason = "invalid output";
|
|
if ((res.too_big = tvc.m_too_big))
|
|
res.reason = "too big";
|
|
if ((res.overspend = tvc.m_overspend))
|
|
res.reason = "overspend";
|
|
if ((res.fee_too_low = tvc.m_fee_too_low))
|
|
res.reason = "fee too low";
|
|
if ((res.not_rct = tvc.m_not_rct))
|
|
res.reason = "tx is not ringct";
|
|
return true;
|
|
}
|
|
|
|
if(!tvc.m_should_be_relayed)
|
|
{
|
|
LOG_PRINT_L0("[on_send_raw_tx]: tx accepted, but not relayed");
|
|
res.reason = "Not relayed";
|
|
res.not_relayed = true;
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
|
|
NOTIFY_NEW_TRANSACTIONS::request r;
|
|
r.txs.push_back(tx_blob);
|
|
m_core.get_protocol()->relay_transactions(r, fake_context);
|
|
//TODO: make sure that tx has reached other nodes here, probably wait to receive reflections from other nodes
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_start_mining(const COMMAND_RPC_START_MINING::request& req, COMMAND_RPC_START_MINING::response& res)
|
|
{
|
|
CHECK_CORE_READY();
|
|
account_public_address adr;
|
|
if(!get_account_address_from_str(adr, m_testnet, req.miner_address))
|
|
{
|
|
res.status = "Failed, wrong address";
|
|
LOG_PRINT_L0(res.status);
|
|
return true;
|
|
}
|
|
|
|
unsigned int concurrency_count = boost::thread::hardware_concurrency() * 4;
|
|
|
|
// if we couldn't detect threads, set it to a ridiculously high number
|
|
if(concurrency_count == 0)
|
|
{
|
|
concurrency_count = 257;
|
|
}
|
|
|
|
// if there are more threads requested than the hardware supports
|
|
// then we fail and log that.
|
|
if(req.threads_count > concurrency_count)
|
|
{
|
|
res.status = "Failed, too many threads relative to CPU cores.";
|
|
LOG_PRINT_L0(res.status);
|
|
return true;
|
|
}
|
|
|
|
boost::thread::attributes attrs;
|
|
attrs.set_stack_size(THREAD_STACK_SIZE);
|
|
|
|
if(!m_core.get_miner().start(adr, static_cast<size_t>(req.threads_count), attrs, req.do_background_mining, req.ignore_battery))
|
|
{
|
|
res.status = "Failed, mining not started";
|
|
LOG_PRINT_L0(res.status);
|
|
return true;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_stop_mining(const COMMAND_RPC_STOP_MINING::request& req, COMMAND_RPC_STOP_MINING::response& res)
|
|
{
|
|
if(!m_core.get_miner().stop())
|
|
{
|
|
res.status = "Failed, mining not stopped";
|
|
LOG_PRINT_L0(res.status);
|
|
return true;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_mining_status(const COMMAND_RPC_MINING_STATUS::request& req, COMMAND_RPC_MINING_STATUS::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
|
|
const miner& lMiner = m_core.get_miner();
|
|
res.active = lMiner.is_mining();
|
|
res.is_background_mining_enabled = lMiner.get_is_background_mining_enabled();
|
|
|
|
if ( lMiner.is_mining() ) {
|
|
res.speed = lMiner.get_speed();
|
|
res.threads_count = lMiner.get_threads_count();
|
|
const account_public_address& lMiningAdr = lMiner.get_mining_address();
|
|
res.address = get_account_address_as_str(m_testnet, lMiningAdr);
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_save_bc(const COMMAND_RPC_SAVE_BC::request& req, COMMAND_RPC_SAVE_BC::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
if( !m_core.get_blockchain_storage().store_blockchain() )
|
|
{
|
|
res.status = "Error while storing blockhain";
|
|
return true;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_peer_list(const COMMAND_RPC_GET_PEER_LIST::request& req, COMMAND_RPC_GET_PEER_LIST::response& res)
|
|
{
|
|
std::list<nodetool::peerlist_entry> white_list;
|
|
std::list<nodetool::peerlist_entry> gray_list;
|
|
m_p2p.get_peerlist_manager().get_peerlist_full(gray_list, white_list);
|
|
|
|
|
|
for (auto & entry : white_list)
|
|
{
|
|
if (entry.adr.get_type_id() == epee::net_utils::ipv4_network_address::ID)
|
|
res.white_list.emplace_back(entry.id, entry.adr.as<epee::net_utils::ipv4_network_address>().ip(),
|
|
entry.adr.as<epee::net_utils::ipv4_network_address>().port(), entry.last_seen);
|
|
else
|
|
res.white_list.emplace_back(entry.id, entry.adr.str(), entry.last_seen);
|
|
}
|
|
|
|
for (auto & entry : gray_list)
|
|
{
|
|
if (entry.adr.get_type_id() == epee::net_utils::ipv4_network_address::ID)
|
|
res.gray_list.emplace_back(entry.id, entry.adr.as<epee::net_utils::ipv4_network_address>().ip(),
|
|
entry.adr.as<epee::net_utils::ipv4_network_address>().port(), entry.last_seen);
|
|
else
|
|
res.gray_list.emplace_back(entry.id, entry.adr.str(), entry.last_seen);
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_set_log_hash_rate(const COMMAND_RPC_SET_LOG_HASH_RATE::request& req, COMMAND_RPC_SET_LOG_HASH_RATE::response& res)
|
|
{
|
|
if(m_core.get_miner().is_mining())
|
|
{
|
|
m_core.get_miner().do_print_hashrate(req.visible);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
}
|
|
else
|
|
{
|
|
res.status = CORE_RPC_STATUS_NOT_MINING;
|
|
}
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_set_log_level(const COMMAND_RPC_SET_LOG_LEVEL::request& req, COMMAND_RPC_SET_LOG_LEVEL::response& res)
|
|
{
|
|
if (req.level < 0 || req.level > 4)
|
|
{
|
|
res.status = "Error: log level not valid";
|
|
return true;
|
|
}
|
|
mlog_set_log_level(req.level);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_set_log_categories(const COMMAND_RPC_SET_LOG_CATEGORIES::request& req, COMMAND_RPC_SET_LOG_CATEGORIES::response& res)
|
|
{
|
|
mlog_set_log(req.categories.c_str());
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_transaction_pool(const COMMAND_RPC_GET_TRANSACTION_POOL::request& req, COMMAND_RPC_GET_TRANSACTION_POOL::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
m_core.get_pool_transactions_and_spent_keys_info(res.transactions, res.spent_key_images);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_transaction_pool_hashes(const COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
m_core.get_pool_transaction_hashes(res.tx_hashes);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_transaction_pool_stats(const COMMAND_RPC_GET_TRANSACTION_POOL_STATS::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_STATS::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
m_core.get_pool_transaction_stats(res.pool_stats);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_stop_daemon(const COMMAND_RPC_STOP_DAEMON::request& req, COMMAND_RPC_STOP_DAEMON::response& res)
|
|
{
|
|
// FIXME: replace back to original m_p2p.send_stop_signal() after
|
|
// investigating why that isn't working quite right.
|
|
m_p2p.send_stop_signal();
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_getblockcount(const COMMAND_RPC_GETBLOCKCOUNT::request& req, COMMAND_RPC_GETBLOCKCOUNT::response& res)
|
|
{
|
|
CHECK_CORE_BUSY();
|
|
res.count = m_core.get_current_blockchain_height();
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_getblockhash(const COMMAND_RPC_GETBLOCKHASH::request& req, COMMAND_RPC_GETBLOCKHASH::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy";
|
|
return false;
|
|
}
|
|
if(req.size() != 1)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_PARAM;
|
|
error_resp.message = "Wrong parameters, expected height";
|
|
return false;
|
|
}
|
|
uint64_t h = req[0];
|
|
if(m_core.get_current_blockchain_height() <= h)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_TOO_BIG_HEIGHT;
|
|
error_resp.message = std::string("Too big height: ") + std::to_string(h) + ", current blockchain height = " + std::to_string(m_core.get_current_blockchain_height());
|
|
}
|
|
res = string_tools::pod_to_hex(m_core.get_block_id_by_height(h));
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
// equivalent of strstr, but with arbitrary bytes (ie, NULs)
|
|
// This does not differentiate between "not found" and "found at offset 0"
|
|
uint64_t slow_memmem(const void* start_buff, size_t buflen,const void* pat,size_t patlen)
|
|
{
|
|
const void* buf = start_buff;
|
|
const void* end=(const char*)buf+buflen;
|
|
if (patlen > buflen || patlen == 0) return 0;
|
|
while(buflen>0 && (buf=memchr(buf,((const char*)pat)[0],buflen-patlen+1)))
|
|
{
|
|
if(memcmp(buf,pat,patlen)==0)
|
|
return (const char*)buf - (const char*)start_buff;
|
|
buf=(const char*)buf+1;
|
|
buflen = (const char*)end - (const char*)buf;
|
|
}
|
|
return 0;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_getblocktemplate(const COMMAND_RPC_GETBLOCKTEMPLATE::request& req, COMMAND_RPC_GETBLOCKTEMPLATE::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_ready())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy";
|
|
return false;
|
|
}
|
|
|
|
if(req.reserve_size > 255)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_TOO_BIG_RESERVE_SIZE;
|
|
error_resp.message = "To big reserved size, maximum 255";
|
|
return false;
|
|
}
|
|
|
|
cryptonote::account_public_address acc = AUTO_VAL_INIT(acc);
|
|
|
|
if(!req.wallet_address.size() || !cryptonote::get_account_address_from_str(acc, m_testnet, req.wallet_address))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_WALLET_ADDRESS;
|
|
error_resp.message = "Failed to parse wallet address";
|
|
return false;
|
|
}
|
|
|
|
block b = AUTO_VAL_INIT(b);
|
|
cryptonote::blobdata blob_reserve;
|
|
blob_reserve.resize(req.reserve_size, 0);
|
|
if(!m_core.get_block_template(b, acc, res.difficulty, res.height, res.expected_reward, blob_reserve))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: failed to create block template";
|
|
LOG_ERROR("Failed to create block template");
|
|
return false;
|
|
}
|
|
blobdata block_blob = t_serializable_object_to_blob(b);
|
|
crypto::public_key tx_pub_key = cryptonote::get_tx_pub_key_from_extra(b.miner_tx);
|
|
if(tx_pub_key == null_pkey)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: failed to create block template";
|
|
LOG_ERROR("Failed to tx pub key in coinbase extra");
|
|
return false;
|
|
}
|
|
res.reserved_offset = slow_memmem((void*)block_blob.data(), block_blob.size(), &tx_pub_key, sizeof(tx_pub_key));
|
|
if(!res.reserved_offset)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: failed to create block template";
|
|
LOG_ERROR("Failed to find tx pub key in blockblob");
|
|
return false;
|
|
}
|
|
res.reserved_offset += sizeof(tx_pub_key) + 3; //3 bytes: tag for TX_EXTRA_TAG_PUBKEY(1 byte), tag for TX_EXTRA_NONCE(1 byte), counter in TX_EXTRA_NONCE(1 byte)
|
|
if(res.reserved_offset + req.reserve_size > block_blob.size())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: failed to create block template";
|
|
LOG_ERROR("Failed to calculate offset for ");
|
|
return false;
|
|
}
|
|
blobdata hashing_blob = get_block_hashing_blob(b);
|
|
res.prev_hash = string_tools::pod_to_hex(b.prev_id);
|
|
res.blocktemplate_blob = string_tools::buff_to_hex_nodelimer(block_blob);
|
|
res.blockhashing_blob = string_tools::buff_to_hex_nodelimer(hashing_blob);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_submitblock(const COMMAND_RPC_SUBMITBLOCK::request& req, COMMAND_RPC_SUBMITBLOCK::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
CHECK_CORE_READY();
|
|
if(req.size()!=1)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_PARAM;
|
|
error_resp.message = "Wrong param";
|
|
return false;
|
|
}
|
|
blobdata blockblob;
|
|
if(!string_tools::parse_hexstr_to_binbuff(req[0], blockblob))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_BLOCKBLOB;
|
|
error_resp.message = "Wrong block blob";
|
|
return false;
|
|
}
|
|
|
|
// Fixing of high orphan issue for most pools
|
|
// Thanks Boolberry!
|
|
block b = AUTO_VAL_INIT(b);
|
|
if(!parse_and_validate_block_from_blob(blockblob, b))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_BLOCKBLOB;
|
|
error_resp.message = "Wrong block blob";
|
|
return false;
|
|
}
|
|
|
|
// Fix from Boolberry neglects to check block
|
|
// size, do that with the function below
|
|
if(!m_core.check_incoming_block_size(blockblob))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_BLOCKBLOB_SIZE;
|
|
error_resp.message = "Block bloc size is too big, rejecting block";
|
|
return false;
|
|
}
|
|
|
|
if(!m_core.handle_block_found(b))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_BLOCK_NOT_ACCEPTED;
|
|
error_resp.message = "Block not accepted";
|
|
return false;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
uint64_t core_rpc_server::get_block_reward(const block& blk)
|
|
{
|
|
uint64_t reward = 0;
|
|
for(const tx_out& out: blk.miner_tx.vout)
|
|
{
|
|
reward += out.amount;
|
|
}
|
|
return reward;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::fill_block_header_response(const block& blk, bool orphan_status, uint64_t height, const crypto::hash& hash, block_header_response& response)
|
|
{
|
|
response.major_version = blk.major_version;
|
|
response.minor_version = blk.minor_version;
|
|
response.timestamp = blk.timestamp;
|
|
response.prev_hash = string_tools::pod_to_hex(blk.prev_id);
|
|
response.nonce = blk.nonce;
|
|
response.orphan_status = orphan_status;
|
|
response.height = height;
|
|
response.depth = m_core.get_current_blockchain_height() - height - 1;
|
|
response.hash = string_tools::pod_to_hex(hash);
|
|
response.difficulty = m_core.get_blockchain_storage().block_difficulty(height);
|
|
response.reward = get_block_reward(blk);
|
|
response.block_size = m_core.get_blockchain_storage().get_db().get_block_size(height);
|
|
response.num_txes = blk.tx_hashes.size();
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_last_block_header(const COMMAND_RPC_GET_LAST_BLOCK_HEADER::request& req, COMMAND_RPC_GET_LAST_BLOCK_HEADER::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
uint64_t last_block_height;
|
|
crypto::hash last_block_hash;
|
|
bool have_last_block_hash = m_core.get_blockchain_top(last_block_height, last_block_hash);
|
|
if (!have_last_block_hash)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't get last block hash.";
|
|
return false;
|
|
}
|
|
block last_block;
|
|
bool have_last_block = m_core.get_block_by_hash(last_block_hash, last_block);
|
|
if (!have_last_block)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't get last block.";
|
|
return false;
|
|
}
|
|
bool response_filled = fill_block_header_response(last_block, false, last_block_height, last_block_hash, res.block_header);
|
|
if (!response_filled)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't produce valid response.";
|
|
return false;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_block_header_by_hash(const COMMAND_RPC_GET_BLOCK_HEADER_BY_HASH::request& req, COMMAND_RPC_GET_BLOCK_HEADER_BY_HASH::response& res, epee::json_rpc::error& error_resp){
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
crypto::hash block_hash;
|
|
bool hash_parsed = parse_hash256(req.hash, block_hash);
|
|
if(!hash_parsed)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_PARAM;
|
|
error_resp.message = "Failed to parse hex representation of block hash. Hex = " + req.hash + '.';
|
|
return false;
|
|
}
|
|
block blk;
|
|
bool orphan = false;
|
|
bool have_block = m_core.get_block_by_hash(block_hash, blk, &orphan);
|
|
if (!have_block)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't get block by hash. Hash = " + req.hash + '.';
|
|
return false;
|
|
}
|
|
if (blk.miner_tx.vin.front().type() != typeid(txin_gen))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: coinbase transaction in the block has the wrong type";
|
|
return false;
|
|
}
|
|
uint64_t block_height = boost::get<txin_gen>(blk.miner_tx.vin.front()).height;
|
|
bool response_filled = fill_block_header_response(blk, orphan, block_height, block_hash, res.block_header);
|
|
if (!response_filled)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't produce valid response.";
|
|
return false;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_block_headers_range(const COMMAND_RPC_GET_BLOCK_HEADERS_RANGE::request& req, COMMAND_RPC_GET_BLOCK_HEADERS_RANGE::response& res, epee::json_rpc::error& error_resp){
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
const uint64_t bc_height = m_core.get_current_blockchain_height();
|
|
if (req.start_height >= bc_height || req.end_height >= bc_height || req.start_height > req.end_height)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_TOO_BIG_HEIGHT;
|
|
error_resp.message = "Invalid start/end heights.";
|
|
return false;
|
|
}
|
|
for (uint64_t h = req.start_height; h <= req.end_height; ++h)
|
|
{
|
|
crypto::hash block_hash = m_core.get_block_id_by_height(h);
|
|
block blk;
|
|
bool have_block = m_core.get_block_by_hash(block_hash, blk);
|
|
if (!have_block)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't get block by height. Height = " + boost::lexical_cast<std::string>(h) + ". Hash = " + epee::string_tools::pod_to_hex(block_hash) + '.';
|
|
return false;
|
|
}
|
|
if (blk.miner_tx.vin.front().type() != typeid(txin_gen))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: coinbase transaction in the block has the wrong type";
|
|
return false;
|
|
}
|
|
uint64_t block_height = boost::get<txin_gen>(blk.miner_tx.vin.front()).height;
|
|
if (block_height != h)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: coinbase transaction in the block has the wrong height";
|
|
return false;
|
|
}
|
|
res.headers.push_back(block_header_response());
|
|
bool response_filled = fill_block_header_response(blk, false, block_height, block_hash, res.headers.back());
|
|
if (!response_filled)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't produce valid response.";
|
|
return false;
|
|
}
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_block_header_by_height(const COMMAND_RPC_GET_BLOCK_HEADER_BY_HEIGHT::request& req, COMMAND_RPC_GET_BLOCK_HEADER_BY_HEIGHT::response& res, epee::json_rpc::error& error_resp){
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
if(m_core.get_current_blockchain_height() <= req.height)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_TOO_BIG_HEIGHT;
|
|
error_resp.message = std::string("Too big height: ") + std::to_string(req.height) + ", current blockchain height = " + std::to_string(m_core.get_current_blockchain_height());
|
|
return false;
|
|
}
|
|
crypto::hash block_hash = m_core.get_block_id_by_height(req.height);
|
|
block blk;
|
|
bool have_block = m_core.get_block_by_hash(block_hash, blk);
|
|
if (!have_block)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't get block by height. Height = " + std::to_string(req.height) + '.';
|
|
return false;
|
|
}
|
|
bool response_filled = fill_block_header_response(blk, false, req.height, block_hash, res.block_header);
|
|
if (!response_filled)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't produce valid response.";
|
|
return false;
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_block(const COMMAND_RPC_GET_BLOCK::request& req, COMMAND_RPC_GET_BLOCK::response& res, epee::json_rpc::error& error_resp){
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
crypto::hash block_hash;
|
|
if (!req.hash.empty())
|
|
{
|
|
bool hash_parsed = parse_hash256(req.hash, block_hash);
|
|
if(!hash_parsed)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_PARAM;
|
|
error_resp.message = "Failed to parse hex representation of block hash. Hex = " + req.hash + '.';
|
|
return false;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if(m_core.get_current_blockchain_height() <= req.height)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_TOO_BIG_HEIGHT;
|
|
error_resp.message = std::string("Too big height: ") + std::to_string(req.height) + ", current blockchain height = " + std::to_string(m_core.get_current_blockchain_height());
|
|
return false;
|
|
}
|
|
block_hash = m_core.get_block_id_by_height(req.height);
|
|
}
|
|
block blk;
|
|
bool orphan = false;
|
|
bool have_block = m_core.get_block_by_hash(block_hash, blk, &orphan);
|
|
if (!have_block)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't get block by hash. Hash = " + req.hash + '.';
|
|
return false;
|
|
}
|
|
if (blk.miner_tx.vin.front().type() != typeid(txin_gen))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: coinbase transaction in the block has the wrong type";
|
|
return false;
|
|
}
|
|
uint64_t block_height = boost::get<txin_gen>(blk.miner_tx.vin.front()).height;
|
|
bool response_filled = fill_block_header_response(blk, orphan, block_height, block_hash, res.block_header);
|
|
if (!response_filled)
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_INTERNAL_ERROR;
|
|
error_resp.message = "Internal error: can't produce valid response.";
|
|
return false;
|
|
}
|
|
for (size_t n = 0; n < blk.tx_hashes.size(); ++n)
|
|
{
|
|
res.tx_hashes.push_back(epee::string_tools::pod_to_hex(blk.tx_hashes[n]));
|
|
}
|
|
res.blob = string_tools::buff_to_hex_nodelimer(t_serializable_object_to_blob(blk));
|
|
res.json = obj_to_json_str(blk);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_connections(const COMMAND_RPC_GET_CONNECTIONS::request& req, COMMAND_RPC_GET_CONNECTIONS::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
res.connections = m_p2p.get_payload_object().get_connections();
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_info_json(const COMMAND_RPC_GET_INFO::request& req, COMMAND_RPC_GET_INFO::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
crypto::hash top_hash;
|
|
if (!m_core.get_blockchain_top(res.height, top_hash))
|
|
{
|
|
res.status = "Failed";
|
|
return false;
|
|
}
|
|
++res.height; // turn top block height into blockchain height
|
|
res.top_block_hash = string_tools::pod_to_hex(top_hash);
|
|
res.target_height = m_core.get_target_blockchain_height();
|
|
res.difficulty = m_core.get_blockchain_storage().get_difficulty_for_next_block();
|
|
res.target = m_core.get_blockchain_storage().get_current_hard_fork_version() < 2 ? DIFFICULTY_TARGET_V1 : DIFFICULTY_TARGET_V2;
|
|
res.tx_count = m_core.get_blockchain_storage().get_total_transactions() - res.height; //without coinbase
|
|
res.tx_pool_size = m_core.get_pool_transactions_count();
|
|
res.alt_blocks_count = m_core.get_blockchain_storage().get_alternative_blocks_count();
|
|
uint64_t total_conn = m_p2p.get_connections_count();
|
|
res.outgoing_connections_count = m_p2p.get_outgoing_connections_count();
|
|
res.incoming_connections_count = total_conn - res.outgoing_connections_count;
|
|
res.white_peerlist_size = m_p2p.get_peerlist_manager().get_white_peers_count();
|
|
res.grey_peerlist_size = m_p2p.get_peerlist_manager().get_gray_peers_count();
|
|
res.testnet = m_testnet;
|
|
res.cumulative_difficulty = m_core.get_blockchain_storage().get_db().get_block_cumulative_difficulty(res.height - 1);
|
|
res.block_size_limit = m_core.get_blockchain_storage().get_current_cumulative_blocksize_limit();
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
res.start_time = (uint64_t)m_core.get_start_time();
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_hard_fork_info(const COMMAND_RPC_HARD_FORK_INFO::request& req, COMMAND_RPC_HARD_FORK_INFO::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
const Blockchain &blockchain = m_core.get_blockchain_storage();
|
|
uint8_t version = req.version > 0 ? req.version : blockchain.get_next_hard_fork_version();
|
|
res.version = blockchain.get_current_hard_fork_version();
|
|
res.enabled = blockchain.get_hard_fork_voting_info(version, res.window, res.votes, res.threshold, res.earliest_height, res.voting);
|
|
res.state = blockchain.get_hard_fork_state();
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_bans(const COMMAND_RPC_GETBANS::request& req, COMMAND_RPC_GETBANS::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
auto now = time(nullptr);
|
|
std::map<std::string, time_t> blocked_hosts = m_p2p.get_blocked_hosts();
|
|
for (std::map<std::string, time_t>::const_iterator i = blocked_hosts.begin(); i != blocked_hosts.end(); ++i)
|
|
{
|
|
if (i->second > now) {
|
|
COMMAND_RPC_GETBANS::ban b;
|
|
b.host = i->first;
|
|
b.ip = 0;
|
|
uint32_t ip;
|
|
if (epee::string_tools::get_ip_int32_from_string(ip, i->first))
|
|
b.ip = ip;
|
|
b.seconds = i->second - now;
|
|
res.bans.push_back(b);
|
|
}
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_set_bans(const COMMAND_RPC_SETBANS::request& req, COMMAND_RPC_SETBANS::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
for (auto i = req.bans.begin(); i != req.bans.end(); ++i)
|
|
{
|
|
epee::net_utils::network_address na;
|
|
if (!i->host.empty())
|
|
{
|
|
if (!epee::net_utils::create_network_address(na, i->host))
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_WRONG_PARAM;
|
|
error_resp.message = "Unsupported host type";
|
|
return false;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
na.reset(new epee::net_utils::ipv4_network_address(i->ip, 0));
|
|
}
|
|
if (i->ban)
|
|
m_p2p.block_host(na, i->seconds);
|
|
else
|
|
m_p2p.unblock_host(na);
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_flush_txpool(const COMMAND_RPC_FLUSH_TRANSACTION_POOL::request& req, COMMAND_RPC_FLUSH_TRANSACTION_POOL::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
bool failed = false;
|
|
std::list<crypto::hash> txids;
|
|
if (req.txids.empty())
|
|
{
|
|
std::list<transaction> pool_txs;
|
|
bool r = m_core.get_pool_transactions(pool_txs);
|
|
if (!r)
|
|
{
|
|
res.status = "Failed to get txpool contents";
|
|
return true;
|
|
}
|
|
for (const auto &tx: pool_txs)
|
|
{
|
|
txids.push_back(cryptonote::get_transaction_hash(tx));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
for (const auto &str: req.txids)
|
|
{
|
|
cryptonote::blobdata txid_data;
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(str, txid_data))
|
|
{
|
|
failed = true;
|
|
}
|
|
crypto::hash txid = *reinterpret_cast<const crypto::hash*>(txid_data.data());
|
|
txids.push_back(txid);
|
|
}
|
|
}
|
|
if (!m_core.get_blockchain_storage().flush_txes_from_pool(txids))
|
|
{
|
|
res.status = "Failed to remove one more tx";
|
|
return false;
|
|
}
|
|
|
|
if (failed)
|
|
{
|
|
res.status = "Failed to parse txid";
|
|
return false;
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_output_histogram(const COMMAND_RPC_GET_OUTPUT_HISTOGRAM::request& req, COMMAND_RPC_GET_OUTPUT_HISTOGRAM::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
std::map<uint64_t, std::tuple<uint64_t, uint64_t, uint64_t>> histogram;
|
|
try
|
|
{
|
|
histogram = m_core.get_blockchain_storage().get_output_histogram(req.amounts, req.unlocked, req.recent_cutoff);
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
res.status = "Failed to get output histogram";
|
|
return true;
|
|
}
|
|
|
|
res.histogram.clear();
|
|
res.histogram.reserve(histogram.size());
|
|
for (const auto &i: histogram)
|
|
{
|
|
if (std::get<0>(i.second) >= req.min_count && (std::get<0>(i.second) <= req.max_count || req.max_count == 0))
|
|
res.histogram.push_back(COMMAND_RPC_GET_OUTPUT_HISTOGRAM::entry(i.first, std::get<0>(i.second), std::get<1>(i.second), std::get<2>(i.second)));
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_version(const COMMAND_RPC_GET_VERSION::request& req, COMMAND_RPC_GET_VERSION::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
res.version = CORE_RPC_VERSION;
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_coinbase_tx_sum(const COMMAND_RPC_GET_COINBASE_TX_SUM::request& req, COMMAND_RPC_GET_COINBASE_TX_SUM::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
std::pair<uint64_t, uint64_t> amounts = m_core.get_coinbase_tx_sum(req.height, req.count);
|
|
res.emission_amount = amounts.first;
|
|
res.fee_amount = amounts.second;
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_per_kb_fee_estimate(const COMMAND_RPC_GET_PER_KB_FEE_ESTIMATE::request& req, COMMAND_RPC_GET_PER_KB_FEE_ESTIMATE::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
res.fee = m_core.get_blockchain_storage().get_dynamic_per_kb_fee_estimate(req.grace_blocks);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_get_alternate_chains(const COMMAND_RPC_GET_ALTERNATE_CHAINS::request& req, COMMAND_RPC_GET_ALTERNATE_CHAINS::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
try
|
|
{
|
|
std::list<std::pair<Blockchain::block_extended_info, uint64_t>> chains = m_core.get_blockchain_storage().get_alternative_chains();
|
|
for (const auto &i: chains)
|
|
{
|
|
res.chains.push_back(COMMAND_RPC_GET_ALTERNATE_CHAINS::chain_info{epee::string_tools::pod_to_hex(get_block_hash(i.first.bl)), i.first.height, i.second, i.first.cumulative_difficulty});
|
|
}
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
}
|
|
catch (...)
|
|
{
|
|
res.status = "Error retrieving alternate chains";
|
|
}
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res)
|
|
{
|
|
// TODO
|
|
/*if (m_p2p.get_outgoing_connections_count() > req.out_peers)
|
|
{
|
|
m_p2p.m_config.m_net_config.connections_count = req.out_peers;
|
|
if (m_p2p.get_outgoing_connections_count() > req.out_peers)
|
|
{
|
|
int count = m_p2p.get_outgoing_connections_count() - req.out_peers;
|
|
m_p2p.delete_connections(count);
|
|
}
|
|
}
|
|
|
|
else
|
|
m_p2p.m_config.m_net_config.connections_count = req.out_peers;
|
|
*/
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_start_save_graph(const COMMAND_RPC_START_SAVE_GRAPH::request& req, COMMAND_RPC_START_SAVE_GRAPH::response& res)
|
|
{
|
|
m_p2p.set_save_graph(true);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_stop_save_graph(const COMMAND_RPC_STOP_SAVE_GRAPH::request& req, COMMAND_RPC_STOP_SAVE_GRAPH::response& res)
|
|
{
|
|
m_p2p.set_save_graph(false);
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_update(const COMMAND_RPC_UPDATE::request& req, COMMAND_RPC_UPDATE::response& res)
|
|
{
|
|
static const char software[] = "monero";
|
|
#ifdef BUILD_TAG
|
|
static const char buildtag[] = BOOST_PP_STRINGIZE(BUILD_TAG);
|
|
#else
|
|
static const char buildtag[] = "source";
|
|
#endif
|
|
|
|
if (req.command != "check" && req.command != "download" && req.command != "update")
|
|
{
|
|
res.status = std::string("unknown command: '") + req.command + "'";
|
|
return true;
|
|
}
|
|
|
|
std::string version, hash;
|
|
if (!tools::check_updates(software, buildtag, version, hash))
|
|
{
|
|
res.status = "Error checking for updates";
|
|
return true;
|
|
}
|
|
if (tools::vercmp(version.c_str(), MONERO_VERSION) <= 0)
|
|
{
|
|
res.update = false;
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
res.update = true;
|
|
res.version = version;
|
|
res.user_uri = tools::get_update_url(software, "cli", buildtag, version, true);
|
|
res.auto_uri = tools::get_update_url(software, "cli", buildtag, version, false);
|
|
res.hash = hash;
|
|
if (req.command == "check")
|
|
{
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
|
|
boost::filesystem::path path;
|
|
if (req.path.empty())
|
|
{
|
|
std::string filename;
|
|
const char *slash = strrchr(res.auto_uri.c_str(), '/');
|
|
if (slash)
|
|
filename = slash + 1;
|
|
else
|
|
filename = std::string(software) + "-update-" + version;
|
|
path = epee::string_tools::get_current_module_folder();
|
|
path /= filename;
|
|
}
|
|
else
|
|
{
|
|
path = req.path;
|
|
}
|
|
|
|
crypto::hash file_hash;
|
|
if (!tools::sha256sum(path.string(), file_hash) || (hash != epee::string_tools::pod_to_hex(file_hash)))
|
|
{
|
|
MDEBUG("We don't have that file already, downloading");
|
|
if (!tools::download(path.string(), res.auto_uri))
|
|
{
|
|
MERROR("Failed to download " << res.auto_uri);
|
|
return false;
|
|
}
|
|
if (!tools::sha256sum(path.string(), file_hash))
|
|
{
|
|
MERROR("Failed to hash " << path);
|
|
return false;
|
|
}
|
|
if (hash != epee::string_tools::pod_to_hex(file_hash))
|
|
{
|
|
MERROR("Download from " << res.auto_uri << " does not match the expected hash");
|
|
return false;
|
|
}
|
|
MINFO("New version downloaded to " << path);
|
|
}
|
|
else
|
|
{
|
|
MDEBUG("We already have " << path << " with expected hash");
|
|
}
|
|
res.path = path.string();
|
|
|
|
if (req.command == "download")
|
|
{
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
|
|
res.status = "'update' not implemented yet";
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
bool core_rpc_server::on_relay_tx(const COMMAND_RPC_RELAY_TX::request& req, COMMAND_RPC_RELAY_TX::response& res, epee::json_rpc::error& error_resp)
|
|
{
|
|
if(!check_core_busy())
|
|
{
|
|
error_resp.code = CORE_RPC_ERROR_CODE_CORE_BUSY;
|
|
error_resp.message = "Core is busy.";
|
|
return false;
|
|
}
|
|
|
|
bool failed = false;
|
|
for (const auto &str: req.txids)
|
|
{
|
|
cryptonote::blobdata txid_data;
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(str, txid_data))
|
|
{
|
|
res.status = std::string("Invalid transaction id: ") + str;
|
|
failed = true;
|
|
}
|
|
crypto::hash txid = *reinterpret_cast<const crypto::hash*>(txid_data.data());
|
|
|
|
cryptonote::blobdata txblob;
|
|
bool r = m_core.get_pool_transaction(txid, txblob);
|
|
if (r)
|
|
{
|
|
cryptonote_connection_context fake_context = AUTO_VAL_INIT(fake_context);
|
|
NOTIFY_NEW_TRANSACTIONS::request r;
|
|
r.txs.push_back(txblob);
|
|
m_core.get_protocol()->relay_transactions(r, fake_context);
|
|
//TODO: make sure that tx has reached other nodes here, probably wait to receive reflections from other nodes
|
|
}
|
|
else
|
|
{
|
|
res.status = std::string("Transaction not found in pool: ") + str;
|
|
failed = true;
|
|
}
|
|
}
|
|
|
|
if (failed)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
res.status = CORE_RPC_STATUS_OK;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
const command_line::arg_descriptor<std::string> core_rpc_server::arg_rpc_bind_port = {
|
|
"rpc-bind-port"
|
|
, "Port for RPC server"
|
|
, std::to_string(config::RPC_DEFAULT_PORT)
|
|
};
|
|
|
|
const command_line::arg_descriptor<std::string> core_rpc_server::arg_testnet_rpc_bind_port = {
|
|
"testnet-rpc-bind-port"
|
|
, "Port for testnet RPC server"
|
|
, std::to_string(config::testnet::RPC_DEFAULT_PORT)
|
|
};
|
|
|
|
const command_line::arg_descriptor<bool> core_rpc_server::arg_restricted_rpc = {
|
|
"restricted-rpc"
|
|
, "Restrict RPC to view only commands"
|
|
, false
|
|
};
|
|
} // namespace cryptonote
|