2016-04-20 13:01:00 +03:00
|
|
|
// Copyright (c) 2014-2016, The Monero Project
|
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
//
|
|
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
|
|
|
|
|
|
|
|
#include "wallet_manager.h"
|
|
|
|
#include "wallet.h"
|
2016-11-05 16:59:39 +02:00
|
|
|
#include "common_defines.h"
|
|
|
|
#include "net/http_client.h"
|
2016-04-20 13:01:00 +03:00
|
|
|
|
2016-06-03 14:52:58 +03:00
|
|
|
#include <boost/filesystem.hpp>
|
|
|
|
#include <boost/regex.hpp>
|
|
|
|
|
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
namespace epee {
|
|
|
|
unsigned int g_test_dbg_lock_sleep = 0;
|
|
|
|
}
|
|
|
|
|
2016-12-13 17:21:38 +02:00
|
|
|
namespace Monero {
|
2016-04-20 13:01:00 +03:00
|
|
|
|
|
|
|
Wallet *WalletManagerImpl::createWallet(const std::string &path, const std::string &password,
|
|
|
|
const std::string &language, bool testnet)
|
|
|
|
{
|
|
|
|
WalletImpl * wallet = new WalletImpl(testnet);
|
|
|
|
wallet->create(path, password, language);
|
|
|
|
return wallet;
|
|
|
|
}
|
|
|
|
|
|
|
|
Wallet *WalletManagerImpl::openWallet(const std::string &path, const std::string &password, bool testnet)
|
|
|
|
{
|
|
|
|
WalletImpl * wallet = new WalletImpl(testnet);
|
|
|
|
wallet->open(path, password);
|
2016-12-12 01:42:46 +02:00
|
|
|
//Refresh addressBook
|
|
|
|
wallet->addressBook()->refresh();
|
2016-04-20 13:01:00 +03:00
|
|
|
return wallet;
|
|
|
|
}
|
|
|
|
|
2016-10-08 01:57:09 +03:00
|
|
|
Wallet *WalletManagerImpl::recoveryWallet(const std::string &path, const std::string &memo, bool testnet, uint64_t restoreHeight)
|
2016-04-20 13:01:00 +03:00
|
|
|
{
|
|
|
|
WalletImpl * wallet = new WalletImpl(testnet);
|
2016-10-08 01:57:09 +03:00
|
|
|
if(restoreHeight > 0){
|
|
|
|
wallet->setRefreshFromBlockHeight(restoreHeight);
|
|
|
|
}
|
2016-04-20 13:01:00 +03:00
|
|
|
wallet->recover(path, memo);
|
|
|
|
return wallet;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletManagerImpl::closeWallet(Wallet *wallet)
|
|
|
|
{
|
|
|
|
WalletImpl * wallet_ = dynamic_cast<WalletImpl*>(wallet);
|
|
|
|
bool result = wallet_->close();
|
|
|
|
if (!result) {
|
|
|
|
m_errorString = wallet_->errorString();
|
|
|
|
} else {
|
|
|
|
delete wallet_;
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletManagerImpl::walletExists(const std::string &path)
|
|
|
|
{
|
2016-10-30 16:34:50 +02:00
|
|
|
bool keys_file_exists;
|
|
|
|
bool wallet_file_exists;
|
|
|
|
tools::wallet2::wallet_exists(path, keys_file_exists, wallet_file_exists);
|
|
|
|
if(keys_file_exists){
|
|
|
|
return true;
|
|
|
|
}
|
2016-04-20 13:01:00 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-06-03 14:52:58 +03:00
|
|
|
|
|
|
|
std::vector<std::string> WalletManagerImpl::findWallets(const std::string &path)
|
|
|
|
{
|
|
|
|
std::vector<std::string> result;
|
2016-10-28 23:24:30 +03:00
|
|
|
boost::filesystem::path work_dir(path);
|
|
|
|
// return empty result if path doesn't exist
|
|
|
|
if(!boost::filesystem::is_directory(path)){
|
2016-10-30 16:34:50 +02:00
|
|
|
return result;
|
2016-10-28 23:24:30 +03:00
|
|
|
}
|
2016-06-23 14:47:22 +03:00
|
|
|
const boost::regex wallet_rx("(.*)\\.(keys)$"); // searching for <wallet_name>.keys files
|
2016-06-03 14:52:58 +03:00
|
|
|
boost::filesystem::recursive_directory_iterator end_itr; // Default ctor yields past-the-end
|
|
|
|
for (boost::filesystem::recursive_directory_iterator itr(path); itr != end_itr; ++itr) {
|
|
|
|
// Skip if not a file
|
|
|
|
if (!boost::filesystem::is_regular_file(itr->status()))
|
|
|
|
continue;
|
|
|
|
boost::smatch what;
|
|
|
|
std::string filename = itr->path().filename().string();
|
|
|
|
|
|
|
|
LOG_PRINT_L3("Checking filename: " << filename);
|
|
|
|
|
|
|
|
bool matched = boost::regex_match(filename, what, wallet_rx);
|
|
|
|
if (matched) {
|
2016-06-23 14:47:22 +03:00
|
|
|
// if keys file found, checking if there's wallet file itself
|
2016-07-08 00:42:59 +03:00
|
|
|
std::string wallet_file = (itr->path().parent_path() /= what[1].str()).string();
|
2016-06-23 14:47:22 +03:00
|
|
|
if (boost::filesystem::exists(wallet_file)) {
|
2016-06-03 14:52:58 +03:00
|
|
|
LOG_PRINT_L3("Found wallet: " << wallet_file);
|
|
|
|
result.push_back(wallet_file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
std::string WalletManagerImpl::errorString() const
|
|
|
|
{
|
|
|
|
return m_errorString;
|
|
|
|
}
|
|
|
|
|
2016-11-29 12:54:38 +02:00
|
|
|
void WalletManagerImpl::setDaemonAddress(const std::string &address)
|
2016-04-20 13:01:00 +03:00
|
|
|
{
|
2016-11-29 12:54:38 +02:00
|
|
|
m_daemonAddress = address;
|
|
|
|
}
|
2016-04-20 13:01:00 +03:00
|
|
|
|
2016-11-29 12:54:38 +02:00
|
|
|
bool WalletManagerImpl::connected(uint32_t *version = NULL) const
|
|
|
|
{
|
|
|
|
epee::json_rpc::request<cryptonote::COMMAND_RPC_GET_VERSION::request> req_t = AUTO_VAL_INIT(req_t);
|
|
|
|
epee::json_rpc::response<cryptonote::COMMAND_RPC_GET_VERSION::response, std::string> resp_t = AUTO_VAL_INIT(resp_t);
|
|
|
|
req_t.jsonrpc = "2.0";
|
|
|
|
req_t.id = epee::serialization::storage_entry(0);
|
|
|
|
req_t.method = "get_version";
|
|
|
|
epee::net_utils::http::http_simple_client http_client;
|
|
|
|
bool r = epee::net_utils::invoke_http_json_remote_command2(m_daemonAddress + "/json_rpc", req_t, resp_t, http_client);
|
|
|
|
if (!r)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (version)
|
|
|
|
*version = resp_t.result.version;
|
|
|
|
return true;
|
2016-04-20 13:01:00 +03:00
|
|
|
}
|
|
|
|
|
2016-11-05 16:59:39 +02:00
|
|
|
bool WalletManagerImpl::checkPayment(const std::string &address_text, const std::string &txid_text, const std::string &txkey_text, const std::string &daemon_address, uint64_t &received, uint64_t &height, std::string &error) const
|
|
|
|
{
|
|
|
|
error = "";
|
|
|
|
cryptonote::blobdata txid_data;
|
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(txid_text, txid_data))
|
|
|
|
{
|
|
|
|
error = tr("failed to parse txid");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
crypto::hash txid = *reinterpret_cast<const crypto::hash*>(txid_data.data());
|
|
|
|
|
|
|
|
if (txkey_text.size() < 64 || txkey_text.size() % 64)
|
|
|
|
{
|
|
|
|
error = tr("failed to parse tx key");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
crypto::secret_key tx_key;
|
|
|
|
cryptonote::blobdata tx_key_data;
|
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(txkey_text, tx_key_data))
|
|
|
|
{
|
|
|
|
error = tr("failed to parse tx key");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
tx_key = *reinterpret_cast<const crypto::secret_key*>(tx_key_data.data());
|
|
|
|
|
|
|
|
bool testnet = address_text[0] != '4';
|
|
|
|
cryptonote::account_public_address address;
|
|
|
|
bool has_payment_id;
|
|
|
|
crypto::hash8 payment_id;
|
|
|
|
if(!cryptonote::get_account_integrated_address_from_str(address, has_payment_id, payment_id, testnet, address_text))
|
|
|
|
{
|
|
|
|
error = tr("failed to parse address");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptonote::COMMAND_RPC_GET_TRANSACTIONS::request req;
|
|
|
|
cryptonote::COMMAND_RPC_GET_TRANSACTIONS::response res;
|
|
|
|
req.txs_hashes.push_back(epee::string_tools::pod_to_hex(txid));
|
|
|
|
epee::net_utils::http::http_simple_client http_client;
|
|
|
|
if (!epee::net_utils::invoke_http_json_remote_command2(daemon_address + "/gettransactions", req, res, http_client) ||
|
|
|
|
(res.txs.size() != 1 && res.txs_as_hex.size() != 1))
|
|
|
|
{
|
|
|
|
error = tr("failed to get transaction from daemon");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
cryptonote::blobdata tx_data;
|
|
|
|
bool ok;
|
|
|
|
if (res.txs.size() == 1)
|
|
|
|
ok = epee::string_tools::parse_hexstr_to_binbuff(res.txs.front().as_hex, tx_data);
|
|
|
|
else
|
|
|
|
ok = epee::string_tools::parse_hexstr_to_binbuff(res.txs_as_hex.front(), tx_data);
|
|
|
|
if (!ok)
|
|
|
|
{
|
|
|
|
error = tr("failed to parse transaction from daemon");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
crypto::hash tx_hash, tx_prefix_hash;
|
|
|
|
cryptonote::transaction tx;
|
|
|
|
if (!cryptonote::parse_and_validate_tx_from_blob(tx_data, tx, tx_hash, tx_prefix_hash))
|
|
|
|
{
|
|
|
|
error = tr("failed to validate transaction from daemon");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (tx_hash != txid)
|
|
|
|
{
|
|
|
|
error = tr("failed to get the right transaction from daemon");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
crypto::key_derivation derivation;
|
|
|
|
if (!crypto::generate_key_derivation(address.m_view_public_key, tx_key, derivation))
|
|
|
|
{
|
|
|
|
error = tr("failed to generate key derivation from supplied parameters");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
received = 0;
|
|
|
|
try {
|
|
|
|
for (size_t n = 0; n < tx.vout.size(); ++n)
|
|
|
|
{
|
|
|
|
if (typeid(cryptonote::txout_to_key) != tx.vout[n].target.type())
|
|
|
|
continue;
|
|
|
|
const cryptonote::txout_to_key tx_out_to_key = boost::get<cryptonote::txout_to_key>(tx.vout[n].target);
|
|
|
|
crypto::public_key pubkey;
|
|
|
|
derive_public_key(derivation, n, address.m_spend_public_key, pubkey);
|
|
|
|
if (pubkey == tx_out_to_key.key)
|
|
|
|
{
|
|
|
|
uint64_t amount;
|
|
|
|
if (tx.version == 1)
|
|
|
|
{
|
|
|
|
amount = tx.vout[n].amount;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
rct::key Ctmp;
|
|
|
|
//rct::key amount_key = rct::hash_to_scalar(rct::scalarmultKey(rct::pk2rct(address.m_view_public_key), rct::sk2rct(tx_key)));
|
|
|
|
crypto::key_derivation derivation;
|
|
|
|
bool r = crypto::generate_key_derivation(address.m_view_public_key, tx_key, derivation);
|
|
|
|
if (!r)
|
|
|
|
{
|
|
|
|
LOG_ERROR("Failed to generate key derivation to decode rct output " << n);
|
|
|
|
amount = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
crypto::secret_key scalar1;
|
|
|
|
crypto::derivation_to_scalar(derivation, n, scalar1);
|
|
|
|
rct::ecdhTuple ecdh_info = tx.rct_signatures.ecdhInfo[n];
|
|
|
|
rct::ecdhDecode(ecdh_info, rct::sk2rct(scalar1));
|
|
|
|
rct::key C = tx.rct_signatures.outPk[n].mask;
|
|
|
|
rct::addKeys2(Ctmp, ecdh_info.mask, ecdh_info.amount, rct::H);
|
|
|
|
if (rct::equalKeys(C, Ctmp))
|
|
|
|
amount = rct::h2d(ecdh_info.amount);
|
|
|
|
else
|
|
|
|
amount = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (...) { amount = 0; }
|
|
|
|
}
|
|
|
|
received += amount;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch(const std::exception &e)
|
|
|
|
{
|
|
|
|
LOG_ERROR("error: " << e.what());
|
|
|
|
error = std::string(tr("error: ")) + e.what();
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (received > 0)
|
|
|
|
{
|
|
|
|
LOG_PRINT_L1(get_account_address_as_str(testnet, address) << " " << tr("received") << " " << cryptonote::print_money(received) << " " << tr("in txid") << " " << txid);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG_PRINT_L1(get_account_address_as_str(testnet, address) << " " << tr("received nothing in txid") << " " << txid);
|
|
|
|
}
|
|
|
|
if (res.txs.front().in_pool)
|
|
|
|
{
|
|
|
|
height = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
height = res.txs.front().block_height;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2016-04-20 13:01:00 +03:00
|
|
|
|
2016-11-29 12:54:38 +02:00
|
|
|
uint64_t WalletManagerImpl::blockchainHeight() const
|
|
|
|
{
|
|
|
|
cryptonote::COMMAND_RPC_GET_INFO::request ireq;
|
|
|
|
cryptonote::COMMAND_RPC_GET_INFO::response ires;
|
|
|
|
|
|
|
|
epee::net_utils::http::http_simple_client http_client;
|
|
|
|
if (!epee::net_utils::invoke_http_json_remote_command2(m_daemonAddress + "/getinfo", ireq, ires, http_client))
|
|
|
|
return 0;
|
|
|
|
return ires.height;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t WalletManagerImpl::blockchainTargetHeight() const
|
|
|
|
{
|
|
|
|
cryptonote::COMMAND_RPC_GET_INFO::request ireq;
|
|
|
|
cryptonote::COMMAND_RPC_GET_INFO::response ires;
|
|
|
|
|
|
|
|
epee::net_utils::http::http_simple_client http_client;
|
|
|
|
if (!epee::net_utils::invoke_http_json_remote_command2(m_daemonAddress + "/getinfo", ireq, ires, http_client))
|
|
|
|
return 0;
|
|
|
|
return ires.target_height >= ires.height ? ires.target_height : ires.height;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t WalletManagerImpl::networkDifficulty() const
|
|
|
|
{
|
|
|
|
cryptonote::COMMAND_RPC_GET_INFO::request ireq;
|
|
|
|
cryptonote::COMMAND_RPC_GET_INFO::response ires;
|
|
|
|
|
|
|
|
epee::net_utils::http::http_simple_client http_client;
|
|
|
|
if (!epee::net_utils::invoke_http_json_remote_command2(m_daemonAddress + "/getinfo", ireq, ires, http_client))
|
|
|
|
return 0;
|
|
|
|
return ires.difficulty;
|
|
|
|
}
|
|
|
|
|
|
|
|
double WalletManagerImpl::miningHashRate() const
|
|
|
|
{
|
|
|
|
cryptonote::COMMAND_RPC_MINING_STATUS::request mreq;
|
|
|
|
cryptonote::COMMAND_RPC_MINING_STATUS::response mres;
|
|
|
|
|
|
|
|
epee::net_utils::http::http_simple_client http_client;
|
|
|
|
if (!epee::net_utils::invoke_http_json_remote_command2(m_daemonAddress + "/getinfo", mreq, mres, http_client))
|
|
|
|
return 0.0;
|
|
|
|
if (!mres.active)
|
|
|
|
return 0.0;
|
|
|
|
return mres.speed;
|
|
|
|
}
|
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
|
|
|
|
///////////////////// WalletManagerFactory implementation //////////////////////
|
|
|
|
WalletManager *WalletManagerFactory::getWalletManager()
|
|
|
|
{
|
|
|
|
|
|
|
|
static WalletManagerImpl * g_walletManager = nullptr;
|
|
|
|
|
|
|
|
if (!g_walletManager) {
|
|
|
|
epee::log_space::log_singletone::add_logger(LOGGER_CONSOLE, NULL, NULL, LOG_LEVEL_MAX);
|
|
|
|
g_walletManager = new WalletManagerImpl();
|
|
|
|
}
|
|
|
|
|
|
|
|
return g_walletManager;
|
|
|
|
}
|
|
|
|
|
2016-07-14 12:47:01 +03:00
|
|
|
void WalletManagerFactory::setLogLevel(int level)
|
|
|
|
{
|
|
|
|
epee::log_space::log_singletone::get_set_log_detalisation_level(true, level);
|
|
|
|
}
|
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
|
|
|
|
|
|
|
|
}
|
2016-12-13 17:21:38 +02:00
|
|
|
|
|
|
|
namespace Bitmonero = Monero;
|