2018-01-07 07:05:16 +02:00
|
|
|
// Copyright (c) 2014-2018, The Monero Project
|
2016-04-20 13:01:00 +03:00
|
|
|
//
|
2016-02-15 20:04:00 +02:00
|
|
|
// All rights reserved.
|
2016-04-20 13:01:00 +03:00
|
|
|
//
|
2016-02-15 20:04:00 +02:00
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
2016-04-20 13:01:00 +03:00
|
|
|
//
|
2016-02-15 20:04:00 +02:00
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
2016-04-20 13:01:00 +03:00
|
|
|
//
|
2016-02-15 20:04:00 +02:00
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
2016-04-20 13:01:00 +03:00
|
|
|
//
|
2016-02-15 20:04:00 +02:00
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
2016-04-20 13:01:00 +03:00
|
|
|
//
|
2016-02-15 20:04:00 +02:00
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
2016-04-20 13:01:00 +03:00
|
|
|
//
|
2016-02-15 20:04:00 +02:00
|
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
|
2016-04-03 14:34:38 +03:00
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
#include "wallet.h"
|
|
|
|
#include "pending_transaction.h"
|
2017-01-08 14:17:09 +02:00
|
|
|
#include "unsigned_transaction.h"
|
2016-04-22 13:21:08 +03:00
|
|
|
#include "transaction_history.h"
|
2016-12-12 01:42:46 +02:00
|
|
|
#include "address_book.h"
|
2017-02-19 04:42:10 +02:00
|
|
|
#include "subaddress.h"
|
|
|
|
#include "subaddress_account.h"
|
2016-04-20 13:01:00 +03:00
|
|
|
#include "common_defines.h"
|
2017-08-09 13:38:29 +03:00
|
|
|
#include "common/util.h"
|
2016-04-03 14:34:38 +03:00
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
#include "mnemonics/electrum-words.h"
|
2018-02-25 15:04:36 +02:00
|
|
|
#include "mnemonics/english.h"
|
2016-04-03 14:34:38 +03:00
|
|
|
#include <boost/format.hpp>
|
2016-06-16 16:42:33 +03:00
|
|
|
#include <sstream>
|
2016-12-12 01:42:46 +02:00
|
|
|
#include <unordered_map>
|
2016-04-03 14:34:38 +03:00
|
|
|
|
2018-02-22 20:52:55 +02:00
|
|
|
#ifdef WIN32
|
|
|
|
#include <boost/locale.hpp>
|
|
|
|
#include <boost/filesystem.hpp>
|
|
|
|
#endif
|
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
using namespace std;
|
|
|
|
using namespace cryptonote;
|
2016-02-20 18:04:56 +02:00
|
|
|
|
2017-02-05 21:12:01 +02:00
|
|
|
#undef MONERO_DEFAULT_LOG_CATEGORY
|
|
|
|
#define MONERO_DEFAULT_LOG_CATEGORY "WalletAPI"
|
|
|
|
|
2016-12-13 17:21:38 +02:00
|
|
|
namespace Monero {
|
2016-02-15 20:04:00 +02:00
|
|
|
|
|
|
|
namespace {
|
2016-04-20 13:01:00 +03:00
|
|
|
// copy-pasted from simplewallet
|
2018-03-28 19:30:11 +03:00
|
|
|
static const size_t DEFAULT_MIXIN = 6;
|
2016-09-26 22:50:10 +03:00
|
|
|
static const int DEFAULT_REFRESH_INTERVAL_MILLIS = 1000 * 10;
|
2016-09-28 00:35:10 +03:00
|
|
|
// limit maximum refresh interval as one minute
|
|
|
|
static const int MAX_REFRESH_INTERVAL_MILLIS = 1000 * 60 * 1;
|
2017-01-08 14:47:13 +02:00
|
|
|
// Default refresh interval when connected to remote node
|
|
|
|
static const int DEFAULT_REMOTE_NODE_REFRESH_INTERVAL_MILLIS = 1000 * 10;
|
2017-01-14 15:41:56 +02:00
|
|
|
// Connection timeout 30 sec
|
|
|
|
static const int DEFAULT_CONNECTION_TIMEOUT_MILLIS = 1000 * 30;
|
2018-03-04 15:32:35 +02:00
|
|
|
|
2018-03-27 06:08:28 +03:00
|
|
|
std::string get_default_ringdb_path(cryptonote::network_type nettype)
|
2018-03-04 15:32:35 +02:00
|
|
|
{
|
|
|
|
boost::filesystem::path dir = tools::get_default_data_dir();
|
|
|
|
// remove .bitmonero, replace with .shared-ringdb
|
|
|
|
dir = dir.remove_filename();
|
|
|
|
dir /= ".shared-ringdb";
|
2018-03-27 06:08:28 +03:00
|
|
|
if (nettype == cryptonote::TESTNET)
|
|
|
|
dir /= "testnet";
|
|
|
|
else if (nettype == cryptonote::STAGENET)
|
|
|
|
dir /= "stagenet";
|
2018-03-04 15:32:35 +02:00
|
|
|
return dir.string();
|
|
|
|
}
|
2018-03-21 17:57:15 +02:00
|
|
|
|
|
|
|
void checkMultisigWalletReady(const tools::wallet2* wallet) {
|
|
|
|
if (!wallet) {
|
|
|
|
throw runtime_error("Wallet is not initialized yet");
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ready;
|
|
|
|
if (!wallet->multisig(&ready)) {
|
|
|
|
throw runtime_error("Wallet is not multisig");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ready) {
|
|
|
|
throw runtime_error("Multisig wallet is not finalized yet");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void checkMultisigWalletNotReady(const tools::wallet2* wallet) {
|
|
|
|
if (!wallet) {
|
|
|
|
throw runtime_error("Wallet is not initialized yet");
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ready;
|
|
|
|
if (!wallet->multisig(&ready)) {
|
|
|
|
throw runtime_error("Wallet is not multisig");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ready) {
|
|
|
|
throw runtime_error("Multisig wallet is already finalized");
|
|
|
|
}
|
|
|
|
}
|
2016-04-03 14:34:38 +03:00
|
|
|
}
|
2016-02-20 18:04:56 +02:00
|
|
|
|
2016-05-05 22:24:00 +03:00
|
|
|
struct Wallet2CallbackImpl : public tools::i_wallet2_callback
|
|
|
|
{
|
|
|
|
|
2016-10-07 00:29:13 +03:00
|
|
|
Wallet2CallbackImpl(WalletImpl * wallet)
|
2016-05-16 13:11:44 +03:00
|
|
|
: m_listener(nullptr)
|
2016-10-07 00:29:13 +03:00
|
|
|
, m_wallet(wallet)
|
2016-05-16 13:11:44 +03:00
|
|
|
{
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-05-05 22:24:00 +03:00
|
|
|
~Wallet2CallbackImpl()
|
|
|
|
{
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
void setListener(WalletListener * listener)
|
|
|
|
{
|
2016-05-13 16:25:31 +03:00
|
|
|
m_listener = listener;
|
2016-05-05 22:24:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
WalletListener * getListener() const
|
|
|
|
{
|
|
|
|
return m_listener;
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual void on_new_block(uint64_t height, const cryptonote::block& block)
|
|
|
|
{
|
2017-01-30 19:00:10 +02:00
|
|
|
// Don't flood the GUI with signals. On fast refresh - send signal every 1000th block
|
|
|
|
// get_refresh_from_block_height() returns the blockheight from when the wallet was
|
|
|
|
// created or the restore height specified when wallet was recovered
|
|
|
|
if(height >= m_wallet->m_wallet->get_refresh_from_block_height() || height % 1000 == 0) {
|
|
|
|
// LOG_PRINT_L3(__FUNCTION__ << ": new block. height: " << height);
|
|
|
|
if (m_listener) {
|
|
|
|
m_listener->newBlock(height);
|
|
|
|
}
|
2016-09-23 22:36:37 +03:00
|
|
|
}
|
2016-05-05 22:24:00 +03:00
|
|
|
}
|
2016-05-13 16:25:31 +03:00
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
virtual void on_money_received(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t amount, const cryptonote::subaddress_index& subaddr_index)
|
2016-05-05 22:24:00 +03:00
|
|
|
{
|
|
|
|
|
2017-03-03 16:49:12 +02:00
|
|
|
std::string tx_hash = epee::string_tools::pod_to_hex(txid);
|
2016-05-13 16:25:31 +03:00
|
|
|
|
2016-07-14 12:47:01 +03:00
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": money received. height: " << height
|
2016-05-13 16:25:31 +03:00
|
|
|
<< ", tx: " << tx_hash
|
2017-02-19 04:42:10 +02:00
|
|
|
<< ", amount: " << print_money(amount)
|
|
|
|
<< ", idx: " << subaddr_index);
|
2016-10-07 00:29:13 +03:00
|
|
|
// do not signal on received tx if wallet is not syncronized completely
|
|
|
|
if (m_listener && m_wallet->synchronized()) {
|
2016-05-13 16:25:31 +03:00
|
|
|
m_listener->moneyReceived(tx_hash, amount);
|
2016-07-10 17:17:23 +03:00
|
|
|
m_listener->updated();
|
2016-05-13 16:25:31 +03:00
|
|
|
}
|
2016-05-05 22:24:00 +03:00
|
|
|
}
|
2016-05-13 16:25:31 +03:00
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
virtual void on_unconfirmed_money_received(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx, uint64_t amount, const cryptonote::subaddress_index& subaddr_index)
|
2017-01-12 19:23:23 +02:00
|
|
|
{
|
|
|
|
|
2017-03-03 16:49:12 +02:00
|
|
|
std::string tx_hash = epee::string_tools::pod_to_hex(txid);
|
2017-01-12 19:23:23 +02:00
|
|
|
|
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": unconfirmed money received. height: " << height
|
|
|
|
<< ", tx: " << tx_hash
|
2017-02-19 04:42:10 +02:00
|
|
|
<< ", amount: " << print_money(amount)
|
|
|
|
<< ", idx: " << subaddr_index);
|
2017-01-12 19:23:23 +02:00
|
|
|
// do not signal on received tx if wallet is not syncronized completely
|
|
|
|
if (m_listener && m_wallet->synchronized()) {
|
|
|
|
m_listener->unconfirmedMoneyReceived(tx_hash, amount);
|
|
|
|
m_listener->updated();
|
|
|
|
}
|
2016-05-05 22:24:00 +03:00
|
|
|
}
|
2016-05-13 16:25:31 +03:00
|
|
|
|
2017-08-02 02:23:53 +03:00
|
|
|
virtual void on_money_spent(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& in_tx,
|
2017-02-19 04:42:10 +02:00
|
|
|
uint64_t amount, const cryptonote::transaction& spend_tx, const cryptonote::subaddress_index& subaddr_index)
|
2016-05-05 22:24:00 +03:00
|
|
|
{
|
|
|
|
// TODO;
|
2017-03-03 16:49:12 +02:00
|
|
|
std::string tx_hash = epee::string_tools::pod_to_hex(txid);
|
2016-07-14 12:47:01 +03:00
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": money spent. height: " << height
|
2016-05-13 16:25:31 +03:00
|
|
|
<< ", tx: " << tx_hash
|
2017-02-19 04:42:10 +02:00
|
|
|
<< ", amount: " << print_money(amount)
|
|
|
|
<< ", idx: " << subaddr_index);
|
2016-10-07 00:29:13 +03:00
|
|
|
// do not signal on sent tx if wallet is not syncronized completely
|
|
|
|
if (m_listener && m_wallet->synchronized()) {
|
2016-05-13 16:25:31 +03:00
|
|
|
m_listener->moneySpent(tx_hash, amount);
|
2016-07-10 17:17:23 +03:00
|
|
|
m_listener->updated();
|
2016-05-13 16:25:31 +03:00
|
|
|
}
|
2016-05-05 22:24:00 +03:00
|
|
|
}
|
|
|
|
|
2017-06-13 21:34:51 +03:00
|
|
|
virtual void on_skip_transaction(uint64_t height, const crypto::hash &txid, const cryptonote::transaction& tx)
|
2016-05-05 22:24:00 +03:00
|
|
|
{
|
|
|
|
// TODO;
|
|
|
|
}
|
|
|
|
|
2017-08-05 18:01:50 +03:00
|
|
|
// Light wallet callbacks
|
|
|
|
virtual void on_lw_new_block(uint64_t height)
|
|
|
|
{
|
|
|
|
if (m_listener) {
|
|
|
|
m_listener->newBlock(height);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual void on_lw_money_received(uint64_t height, const crypto::hash &txid, uint64_t amount)
|
|
|
|
{
|
|
|
|
if (m_listener) {
|
|
|
|
std::string tx_hash = epee::string_tools::pod_to_hex(txid);
|
|
|
|
m_listener->moneyReceived(tx_hash, amount);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual void on_lw_unconfirmed_money_received(uint64_t height, const crypto::hash &txid, uint64_t amount)
|
|
|
|
{
|
|
|
|
if (m_listener) {
|
|
|
|
std::string tx_hash = epee::string_tools::pod_to_hex(txid);
|
|
|
|
m_listener->unconfirmedMoneyReceived(tx_hash, amount);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual void on_lw_money_spent(uint64_t height, const crypto::hash &txid, uint64_t amount)
|
|
|
|
{
|
|
|
|
if (m_listener) {
|
|
|
|
std::string tx_hash = epee::string_tools::pod_to_hex(txid);
|
|
|
|
m_listener->moneySpent(tx_hash, amount);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-05 22:24:00 +03:00
|
|
|
WalletListener * m_listener;
|
2016-10-07 00:29:13 +03:00
|
|
|
WalletImpl * m_wallet;
|
2016-05-05 22:24:00 +03:00
|
|
|
};
|
|
|
|
|
2016-02-21 20:18:16 +02:00
|
|
|
Wallet::~Wallet() {}
|
2016-04-03 14:34:38 +03:00
|
|
|
|
2016-05-16 13:11:44 +03:00
|
|
|
WalletListener::~WalletListener() {}
|
|
|
|
|
2016-07-14 12:47:01 +03:00
|
|
|
|
2016-04-19 12:25:03 +03:00
|
|
|
string Wallet::displayAmount(uint64_t amount)
|
|
|
|
{
|
|
|
|
return cryptonote::print_money(amount);
|
|
|
|
}
|
|
|
|
|
2016-06-16 16:42:33 +03:00
|
|
|
uint64_t Wallet::amountFromString(const string &amount)
|
|
|
|
{
|
2016-08-23 13:46:51 +03:00
|
|
|
uint64_t result = 0;
|
2016-06-16 16:42:33 +03:00
|
|
|
cryptonote::parse_amount(result, amount);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t Wallet::amountFromDouble(double amount)
|
|
|
|
{
|
|
|
|
std::stringstream ss;
|
|
|
|
ss << std::fixed << std::setprecision(CRYPTONOTE_DISPLAY_DECIMAL_POINT) << amount;
|
|
|
|
return amountFromString(ss.str());
|
|
|
|
}
|
|
|
|
|
2016-06-23 14:38:22 +03:00
|
|
|
std::string Wallet::genPaymentId()
|
|
|
|
{
|
|
|
|
crypto::hash8 payment_id = crypto::rand<crypto::hash8>();
|
|
|
|
return epee::string_tools::pod_to_hex(payment_id);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-06-24 16:17:06 +03:00
|
|
|
bool Wallet::paymentIdValid(const string &paiment_id)
|
|
|
|
{
|
2016-10-16 15:54:53 +03:00
|
|
|
crypto::hash8 pid8;
|
|
|
|
if (tools::wallet2::parse_short_payment_id(paiment_id, pid8))
|
|
|
|
return true;
|
|
|
|
crypto::hash pid;
|
|
|
|
if (tools::wallet2::parse_long_payment_id(paiment_id, pid))
|
|
|
|
return true;
|
|
|
|
return false;
|
2016-06-24 16:17:06 +03:00
|
|
|
}
|
|
|
|
|
2018-03-05 16:59:16 +02:00
|
|
|
bool Wallet::addressValid(const std::string &str, NetworkType nettype)
|
2016-10-16 18:52:45 +03:00
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
cryptonote::address_parse_info info;
|
2018-03-05 16:59:16 +02:00
|
|
|
return get_account_address_from_str(info, static_cast<cryptonote::network_type>(nettype), str);
|
2016-10-16 18:52:45 +03:00
|
|
|
}
|
|
|
|
|
2018-03-05 16:59:16 +02:00
|
|
|
bool Wallet::keyValid(const std::string &secret_key_string, const std::string &address_string, bool isViewKey, NetworkType nettype, std::string &error)
|
2017-01-26 22:33:36 +02:00
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
cryptonote::address_parse_info info;
|
2018-03-05 16:59:16 +02:00
|
|
|
if(!get_account_address_from_str(info, static_cast<cryptonote::network_type>(nettype), address_string)) {
|
2017-01-26 22:33:36 +02:00
|
|
|
error = tr("Failed to parse address");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptonote::blobdata key_data;
|
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(secret_key_string, key_data) || key_data.size() != sizeof(crypto::secret_key))
|
|
|
|
{
|
|
|
|
error = tr("Failed to parse key");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
crypto::secret_key key = *reinterpret_cast<const crypto::secret_key*>(key_data.data());
|
|
|
|
|
|
|
|
// check the key match the given address
|
|
|
|
crypto::public_key pkey;
|
|
|
|
if (!crypto::secret_key_to_public_key(key, pkey)) {
|
|
|
|
error = tr("failed to verify key");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
bool matchAddress = false;
|
|
|
|
if(isViewKey)
|
2017-02-19 04:42:10 +02:00
|
|
|
matchAddress = info.address.m_view_public_key == pkey;
|
2017-01-26 22:33:36 +02:00
|
|
|
else
|
2017-02-19 04:42:10 +02:00
|
|
|
matchAddress = info.address.m_spend_public_key == pkey;
|
2017-01-26 22:33:36 +02:00
|
|
|
|
|
|
|
if(!matchAddress) {
|
|
|
|
error = tr("key does not match address");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-03-05 16:59:16 +02:00
|
|
|
std::string Wallet::paymentIdFromAddress(const std::string &str, NetworkType nettype)
|
2016-10-16 18:52:45 +03:00
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
cryptonote::address_parse_info info;
|
2018-03-05 16:59:16 +02:00
|
|
|
if (!get_account_address_from_str(info, static_cast<cryptonote::network_type>(nettype), str))
|
2016-10-16 18:52:45 +03:00
|
|
|
return "";
|
2017-02-19 04:42:10 +02:00
|
|
|
if (!info.has_payment_id)
|
2016-10-16 18:52:45 +03:00
|
|
|
return "";
|
2017-02-19 04:42:10 +02:00
|
|
|
return epee::string_tools::pod_to_hex(info.payment_id);
|
2016-10-16 18:52:45 +03:00
|
|
|
}
|
|
|
|
|
2016-08-23 12:35:01 +03:00
|
|
|
uint64_t Wallet::maximumAllowedAmount()
|
|
|
|
{
|
|
|
|
return std::numeric_limits<uint64_t>::max();
|
|
|
|
}
|
|
|
|
|
2018-05-02 05:46:46 +03:00
|
|
|
void Wallet::init(const char *argv0, const char *default_log_base_name, const std::string &log_path, bool console) {
|
2018-02-22 20:52:55 +02:00
|
|
|
#ifdef WIN32
|
|
|
|
// Activate UTF-8 support for Boost filesystem classes on Windows
|
|
|
|
std::locale::global(boost::locale::generator().generate(""));
|
|
|
|
boost::filesystem::path::imbue(std::locale());
|
|
|
|
#endif
|
2017-02-18 22:44:23 +02:00
|
|
|
epee::string_tools::set_module_name_and_folder(argv0);
|
2018-05-02 05:46:46 +03:00
|
|
|
mlog_configure(log_path.empty() ? mlog_get_default_log_path(default_log_base_name) : log_path.c_str(), console);
|
2017-02-18 22:44:23 +02:00
|
|
|
}
|
|
|
|
|
2018-03-04 19:04:18 +02:00
|
|
|
void Wallet::debug(const std::string &category, const std::string &str) {
|
|
|
|
MCDEBUG(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Wallet::info(const std::string &category, const std::string &str) {
|
|
|
|
MCINFO(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Wallet::warning(const std::string &category, const std::string &str) {
|
|
|
|
MCWARNING(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Wallet::error(const std::string &category, const std::string &str) {
|
|
|
|
MCERROR(category.empty() ? MONERO_DEFAULT_LOG_CATEGORY : category.c_str(), str);
|
2017-02-05 21:12:01 +02:00
|
|
|
}
|
2016-06-16 16:42:33 +03:00
|
|
|
|
2016-04-20 13:01:00 +03:00
|
|
|
///////////////////////// WalletImpl implementation ////////////////////////
|
2018-07-30 08:38:55 +03:00
|
|
|
WalletImpl::WalletImpl(NetworkType nettype, uint64_t kdf_rounds)
|
2016-10-07 00:29:13 +03:00
|
|
|
:m_wallet(nullptr)
|
|
|
|
, m_status(Wallet::Status_Ok)
|
|
|
|
, m_wallet2Callback(nullptr)
|
|
|
|
, m_recoveringFromSeed(false)
|
2018-06-04 10:58:13 +03:00
|
|
|
, m_recoveringFromDevice(false)
|
2016-10-07 00:29:13 +03:00
|
|
|
, m_synchronized(false)
|
2016-11-09 19:46:03 +02:00
|
|
|
, m_rebuildWalletCache(false)
|
2016-12-14 13:18:52 +02:00
|
|
|
, m_is_connected(false)
|
2016-02-15 20:04:00 +02:00
|
|
|
{
|
2018-07-30 08:38:55 +03:00
|
|
|
m_wallet = new tools::wallet2(static_cast<cryptonote::network_type>(nettype), kdf_rounds);
|
2016-04-22 13:21:08 +03:00
|
|
|
m_history = new TransactionHistoryImpl(this);
|
2016-10-07 00:29:13 +03:00
|
|
|
m_wallet2Callback = new Wallet2CallbackImpl(this);
|
2016-07-10 17:17:23 +03:00
|
|
|
m_wallet->callback(m_wallet2Callback);
|
|
|
|
m_refreshThreadDone = false;
|
|
|
|
m_refreshEnabled = false;
|
2016-12-12 01:42:46 +02:00
|
|
|
m_addressBook = new AddressBookImpl(this);
|
2017-02-19 04:42:10 +02:00
|
|
|
m_subaddress = new SubaddressImpl(this);
|
|
|
|
m_subaddressAccount = new SubaddressAccountImpl(this);
|
2016-09-30 22:42:15 +03:00
|
|
|
|
2016-09-20 20:08:33 +03:00
|
|
|
|
2016-09-26 22:50:10 +03:00
|
|
|
m_refreshIntervalMillis = DEFAULT_REFRESH_INTERVAL_MILLIS;
|
2016-09-20 20:08:33 +03:00
|
|
|
|
2016-09-18 18:21:44 +03:00
|
|
|
m_refreshThread = boost::thread([this] () {
|
2016-07-10 17:17:23 +03:00
|
|
|
this->refreshThreadFunc();
|
|
|
|
});
|
|
|
|
|
2016-02-15 20:04:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
WalletImpl::~WalletImpl()
|
|
|
|
{
|
2016-12-14 13:18:52 +02:00
|
|
|
|
|
|
|
LOG_PRINT_L1(__FUNCTION__);
|
|
|
|
// Pause refresh thread - prevents refresh from starting again
|
|
|
|
pauseRefresh();
|
|
|
|
// Close wallet - stores cache and stops ongoing refresh operation
|
2017-09-23 01:52:09 +03:00
|
|
|
close(false); // do not store wallet as part of the closing activities
|
2016-12-14 13:18:52 +02:00
|
|
|
// Stop refresh thread
|
2016-07-10 17:17:23 +03:00
|
|
|
stopRefresh();
|
2016-12-14 13:18:52 +02:00
|
|
|
delete m_wallet2Callback;
|
2016-04-22 13:21:08 +03:00
|
|
|
delete m_history;
|
2016-12-12 01:42:46 +02:00
|
|
|
delete m_addressBook;
|
2017-02-19 04:42:10 +02:00
|
|
|
delete m_subaddress;
|
|
|
|
delete m_subaddressAccount;
|
2016-02-21 20:18:16 +02:00
|
|
|
delete m_wallet;
|
2016-12-14 13:18:52 +02:00
|
|
|
LOG_PRINT_L1(__FUNCTION__ << " finished");
|
2016-02-15 20:04:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::create(const std::string &path, const std::string &password, const std::string &language)
|
|
|
|
{
|
2016-03-10 18:43:10 +02:00
|
|
|
|
|
|
|
clearStatus();
|
2016-10-01 21:04:49 +03:00
|
|
|
m_recoveringFromSeed = false;
|
2018-06-04 10:58:13 +03:00
|
|
|
m_recoveringFromDevice = false;
|
2016-02-15 20:04:00 +02:00
|
|
|
bool keys_file_exists;
|
|
|
|
bool wallet_file_exists;
|
|
|
|
tools::wallet2::wallet_exists(path, keys_file_exists, wallet_file_exists);
|
|
|
|
LOG_PRINT_L3("wallet_path: " << path << "");
|
|
|
|
LOG_PRINT_L3("keys_file_exists: " << std::boolalpha << keys_file_exists << std::noboolalpha
|
|
|
|
<< " wallet_file_exists: " << std::boolalpha << wallet_file_exists << std::noboolalpha);
|
|
|
|
|
|
|
|
|
|
|
|
// add logic to error out if new wallet requested but named wallet file exists
|
|
|
|
if (keys_file_exists || wallet_file_exists) {
|
2018-03-21 19:34:15 +02:00
|
|
|
std::string error = "attempting to generate or restore wallet, but specified file(s) exist. Exiting to not risk overwriting.";
|
|
|
|
LOG_ERROR(error);
|
|
|
|
setStatusCritical(error);
|
2016-02-15 20:04:00 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// TODO: validate language
|
2016-03-10 18:43:10 +02:00
|
|
|
m_wallet->set_seed_language(language);
|
2016-02-15 20:04:00 +02:00
|
|
|
crypto::secret_key recovery_val, secret_key;
|
|
|
|
try {
|
|
|
|
recovery_val = m_wallet->generate(path, password, secret_key, false, false);
|
2016-03-15 22:11:38 +02:00
|
|
|
m_password = password;
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2016-03-10 18:43:10 +02:00
|
|
|
} catch (const std::exception &e) {
|
|
|
|
LOG_ERROR("Error creating wallet: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusCritical(e.what());
|
2016-02-15 20:04:00 +02:00
|
|
|
return false;
|
|
|
|
}
|
2016-03-15 22:11:38 +02:00
|
|
|
|
2016-02-15 20:04:00 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-01-10 23:34:15 +02:00
|
|
|
bool WalletImpl::createWatchOnly(const std::string &path, const std::string &password, const std::string &language) const
|
|
|
|
{
|
|
|
|
clearStatus();
|
2018-02-16 13:04:04 +02:00
|
|
|
std::unique_ptr<tools::wallet2> view_wallet(new tools::wallet2(m_wallet->nettype()));
|
2017-01-10 23:34:15 +02:00
|
|
|
|
|
|
|
// Store same refresh height as original wallet
|
|
|
|
view_wallet->set_refresh_from_block_height(m_wallet->get_refresh_from_block_height());
|
|
|
|
|
|
|
|
bool keys_file_exists;
|
|
|
|
bool wallet_file_exists;
|
|
|
|
tools::wallet2::wallet_exists(path, keys_file_exists, wallet_file_exists);
|
|
|
|
LOG_PRINT_L3("wallet_path: " << path << "");
|
|
|
|
LOG_PRINT_L3("keys_file_exists: " << std::boolalpha << keys_file_exists << std::noboolalpha
|
|
|
|
<< " wallet_file_exists: " << std::boolalpha << wallet_file_exists << std::noboolalpha);
|
|
|
|
|
|
|
|
// add logic to error out if new wallet requested but named wallet file exists
|
|
|
|
if (keys_file_exists || wallet_file_exists) {
|
2018-03-21 19:34:15 +02:00
|
|
|
std::string error = "attempting to generate view only wallet, but specified file(s) exist. Exiting to not risk overwriting.";
|
|
|
|
LOG_ERROR(error);
|
|
|
|
setStatusError(error);
|
2017-01-10 23:34:15 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// TODO: validate language
|
|
|
|
view_wallet->set_seed_language(language);
|
|
|
|
|
|
|
|
const crypto::secret_key viewkey = m_wallet->get_account().get_keys().m_view_secret_key;
|
|
|
|
const cryptonote::account_public_address address = m_wallet->get_account().get_keys().m_account_address;
|
|
|
|
|
|
|
|
try {
|
2017-08-18 15:28:46 +03:00
|
|
|
// Generate view only wallet
|
2017-01-10 23:34:15 +02:00
|
|
|
view_wallet->generate(path, password, address, viewkey);
|
2017-08-18 15:28:46 +03:00
|
|
|
|
|
|
|
// Export/Import outputs
|
|
|
|
auto outputs = m_wallet->export_outputs();
|
|
|
|
view_wallet->import_outputs(outputs);
|
|
|
|
|
|
|
|
// Copy scanned blockchain
|
|
|
|
auto bc = m_wallet->export_blockchain();
|
|
|
|
view_wallet->import_blockchain(bc);
|
|
|
|
|
|
|
|
// copy payments
|
|
|
|
auto payments = m_wallet->export_payments();
|
|
|
|
view_wallet->import_payments(payments);
|
|
|
|
|
|
|
|
// copy confirmed outgoing payments
|
|
|
|
std::list<std::pair<crypto::hash, tools::wallet2::confirmed_transfer_details>> out_payments;
|
|
|
|
m_wallet->get_payments_out(out_payments, 0);
|
|
|
|
view_wallet->import_payments_out(out_payments);
|
|
|
|
|
|
|
|
// Export/Import key images
|
|
|
|
// We already know the spent status from the outputs we exported, thus no need to check them again
|
|
|
|
auto key_images = m_wallet->export_key_images();
|
|
|
|
uint64_t spent = 0;
|
|
|
|
uint64_t unspent = 0;
|
|
|
|
view_wallet->import_key_images(key_images,spent,unspent,false);
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-01-10 23:34:15 +02:00
|
|
|
} catch (const std::exception &e) {
|
|
|
|
LOG_ERROR("Error creating view only wallet: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-01-10 23:34:15 +02:00
|
|
|
return false;
|
|
|
|
}
|
2017-08-18 15:28:46 +03:00
|
|
|
// Store wallet
|
|
|
|
view_wallet->store();
|
2017-01-10 23:34:15 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-01-26 22:33:36 +02:00
|
|
|
bool WalletImpl::recoverFromKeys(const std::string &path,
|
|
|
|
const std::string &language,
|
|
|
|
const std::string &address_string,
|
|
|
|
const std::string &viewkey_string,
|
|
|
|
const std::string &spendkey_string)
|
2018-01-11 17:12:27 +02:00
|
|
|
{
|
|
|
|
return recoverFromKeysWithPassword(path, "", language, address_string, viewkey_string, spendkey_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::recoverFromKeysWithPassword(const std::string &path,
|
|
|
|
const std::string &password,
|
|
|
|
const std::string &language,
|
|
|
|
const std::string &address_string,
|
|
|
|
const std::string &viewkey_string,
|
|
|
|
const std::string &spendkey_string)
|
2017-01-26 22:33:36 +02:00
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
cryptonote::address_parse_info info;
|
2018-02-16 13:04:04 +02:00
|
|
|
if(!get_account_address_from_str(info, m_wallet->nettype(), address_string))
|
2017-01-26 22:33:36 +02:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("failed to parse address"));
|
2017-01-26 22:33:36 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// parse optional spend key
|
|
|
|
crypto::secret_key spendkey;
|
|
|
|
bool has_spendkey = false;
|
|
|
|
if (!spendkey_string.empty()) {
|
|
|
|
cryptonote::blobdata spendkey_data;
|
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(spendkey_string, spendkey_data) || spendkey_data.size() != sizeof(crypto::secret_key))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("failed to parse secret spend key"));
|
2017-01-26 22:33:36 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
has_spendkey = true;
|
|
|
|
spendkey = *reinterpret_cast<const crypto::secret_key*>(spendkey_data.data());
|
|
|
|
}
|
|
|
|
|
|
|
|
// parse view secret key
|
2018-06-06 02:32:03 +03:00
|
|
|
bool has_viewkey = true;
|
|
|
|
crypto::secret_key viewkey;
|
2017-01-26 22:33:36 +02:00
|
|
|
if (viewkey_string.empty()) {
|
2018-06-06 02:32:03 +03:00
|
|
|
if(has_spendkey) {
|
|
|
|
has_viewkey = false;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
setStatusError(tr("Neither view key nor spend key supplied, cancelled"));
|
|
|
|
return false;
|
|
|
|
}
|
2017-01-26 22:33:36 +02:00
|
|
|
}
|
2018-06-06 02:32:03 +03:00
|
|
|
if(has_viewkey) {
|
|
|
|
cryptonote::blobdata viewkey_data;
|
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(viewkey_string, viewkey_data) || viewkey_data.size() != sizeof(crypto::secret_key))
|
|
|
|
{
|
|
|
|
setStatusError(tr("failed to parse secret view key"));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
viewkey = *reinterpret_cast<const crypto::secret_key*>(viewkey_data.data());
|
2017-01-26 22:33:36 +02:00
|
|
|
}
|
|
|
|
// check the spend and view keys match the given address
|
|
|
|
crypto::public_key pkey;
|
|
|
|
if(has_spendkey) {
|
|
|
|
if (!crypto::secret_key_to_public_key(spendkey, pkey)) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("failed to verify secret spend key"));
|
2017-01-26 22:33:36 +02:00
|
|
|
return false;
|
|
|
|
}
|
2017-02-19 04:42:10 +02:00
|
|
|
if (info.address.m_spend_public_key != pkey) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("spend key does not match address"));
|
2017-01-26 22:33:36 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2018-06-06 02:32:03 +03:00
|
|
|
if(has_viewkey) {
|
|
|
|
if (!crypto::secret_key_to_public_key(viewkey, pkey)) {
|
|
|
|
setStatusError(tr("failed to verify secret view key"));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (info.address.m_view_public_key != pkey) {
|
|
|
|
setStatusError(tr("view key does not match address"));
|
|
|
|
return false;
|
|
|
|
}
|
2017-01-26 22:33:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
2018-06-06 02:32:03 +03:00
|
|
|
if (has_spendkey && has_viewkey) {
|
2018-01-11 17:12:27 +02:00
|
|
|
m_wallet->generate(path, password, info.address, spendkey, viewkey);
|
2018-06-06 02:32:03 +03:00
|
|
|
LOG_PRINT_L1("Generated new wallet from spend key and view key");
|
2017-01-26 22:33:36 +02:00
|
|
|
}
|
2018-06-06 02:32:03 +03:00
|
|
|
if(!has_spendkey && has_viewkey) {
|
2018-01-11 17:12:27 +02:00
|
|
|
m_wallet->generate(path, password, info.address, viewkey);
|
2017-01-26 22:33:36 +02:00
|
|
|
LOG_PRINT_L1("Generated new view only wallet from keys");
|
|
|
|
}
|
2018-06-06 02:32:03 +03:00
|
|
|
if(has_spendkey && !has_viewkey) {
|
|
|
|
m_wallet->generate(path, password, spendkey, true, false, false);
|
|
|
|
setSeedLanguage(language);
|
|
|
|
LOG_PRINT_L1("Generated deterministic wallet from spend key with seed language: " + language);
|
|
|
|
}
|
2017-01-26 22:33:36 +02:00
|
|
|
|
|
|
|
}
|
|
|
|
catch (const std::exception& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("failed to generate new wallet: ")) + e.what());
|
2017-01-26 22:33:36 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-06-04 10:58:13 +03:00
|
|
|
bool WalletImpl::recoverFromDevice(const std::string &path, const std::string &password, const std::string &device_name)
|
|
|
|
{
|
|
|
|
clearStatus();
|
|
|
|
m_recoveringFromSeed = false;
|
|
|
|
m_recoveringFromDevice = true;
|
|
|
|
try
|
|
|
|
{
|
|
|
|
m_wallet->restore(path, password, device_name);
|
|
|
|
LOG_PRINT_L1("Generated new wallet from device: " + device_name);
|
|
|
|
}
|
|
|
|
catch (const std::exception& e) {
|
|
|
|
setStatusError(string(tr("failed to generate new wallet: ")) + e.what());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2017-01-26 22:33:36 +02:00
|
|
|
|
2016-03-10 18:43:10 +02:00
|
|
|
bool WalletImpl::open(const std::string &path, const std::string &password)
|
|
|
|
{
|
|
|
|
clearStatus();
|
2016-10-01 21:04:49 +03:00
|
|
|
m_recoveringFromSeed = false;
|
2018-06-04 10:58:13 +03:00
|
|
|
m_recoveringFromDevice = false;
|
2016-03-10 18:43:10 +02:00
|
|
|
try {
|
|
|
|
// TODO: handle "deprecated"
|
2016-11-09 19:46:03 +02:00
|
|
|
// Check if wallet cache exists
|
|
|
|
bool keys_file_exists;
|
|
|
|
bool wallet_file_exists;
|
|
|
|
tools::wallet2::wallet_exists(path, keys_file_exists, wallet_file_exists);
|
|
|
|
if(!wallet_file_exists){
|
|
|
|
// Rebuilding wallet cache, using refresh height from .keys file
|
|
|
|
m_rebuildWalletCache = true;
|
|
|
|
}
|
2018-03-27 06:08:28 +03:00
|
|
|
m_wallet->set_ring_database(get_default_ringdb_path(m_wallet->nettype()));
|
2016-03-10 18:43:10 +02:00
|
|
|
m_wallet->load(path, password);
|
2016-03-15 22:11:38 +02:00
|
|
|
|
|
|
|
m_password = password;
|
2016-03-11 16:05:36 +02:00
|
|
|
} catch (const std::exception &e) {
|
2016-03-10 18:43:10 +02:00
|
|
|
LOG_ERROR("Error opening wallet: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusCritical(e.what());
|
2016-03-10 18:43:10 +02:00
|
|
|
}
|
2018-03-21 19:34:15 +02:00
|
|
|
return status() == Status_Ok;
|
2016-03-10 18:43:10 +02:00
|
|
|
}
|
|
|
|
|
2016-03-12 16:41:11 +02:00
|
|
|
bool WalletImpl::recover(const std::string &path, const std::string &seed)
|
2018-01-11 17:12:27 +02:00
|
|
|
{
|
|
|
|
return recover(path, "", seed);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::recover(const std::string &path, const std::string &password, const std::string &seed)
|
2016-03-12 16:41:11 +02:00
|
|
|
{
|
2016-03-15 22:11:38 +02:00
|
|
|
clearStatus();
|
2016-03-12 16:41:11 +02:00
|
|
|
m_errorString.clear();
|
|
|
|
if (seed.empty()) {
|
2018-03-21 19:34:15 +02:00
|
|
|
LOG_ERROR("Electrum seed is empty");
|
|
|
|
setStatusError(tr("Electrum seed is empty"));
|
2016-03-12 16:41:11 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-10-01 21:04:49 +03:00
|
|
|
m_recoveringFromSeed = true;
|
2018-06-04 10:58:13 +03:00
|
|
|
m_recoveringFromDevice = false;
|
2016-03-12 16:41:11 +02:00
|
|
|
crypto::secret_key recovery_key;
|
|
|
|
std::string old_language;
|
|
|
|
if (!crypto::ElectrumWords::words_to_bytes(seed, recovery_key, old_language)) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Electrum-style word list failed verification"));
|
2016-03-12 16:41:11 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-02-25 15:04:36 +02:00
|
|
|
if (old_language == crypto::ElectrumWords::old_language_name)
|
|
|
|
old_language = Language::English().get_language_name();
|
|
|
|
|
2016-03-12 16:41:11 +02:00
|
|
|
try {
|
|
|
|
m_wallet->set_seed_language(old_language);
|
2018-01-11 17:12:27 +02:00
|
|
|
m_wallet->generate(path, password, recovery_key, true, false);
|
2016-10-01 21:04:49 +03:00
|
|
|
|
2016-03-12 16:41:11 +02:00
|
|
|
} catch (const std::exception &e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusCritical(e.what());
|
2016-03-12 16:41:11 +02:00
|
|
|
}
|
2018-03-21 19:34:15 +02:00
|
|
|
return status() == Status_Ok;
|
2016-03-12 16:41:11 +02:00
|
|
|
}
|
|
|
|
|
2017-09-23 01:52:09 +03:00
|
|
|
bool WalletImpl::close(bool store)
|
2016-03-10 18:43:10 +02:00
|
|
|
{
|
2016-08-22 15:53:07 +03:00
|
|
|
|
2016-03-10 18:43:10 +02:00
|
|
|
bool result = false;
|
2016-12-14 13:18:52 +02:00
|
|
|
LOG_PRINT_L1("closing wallet...");
|
2016-03-10 18:43:10 +02:00
|
|
|
try {
|
2017-09-23 01:52:09 +03:00
|
|
|
if (store) {
|
|
|
|
// Do not store wallet with invalid status
|
|
|
|
// Status Critical refers to errors on opening or creating wallets.
|
|
|
|
if (status() != Status_Critical)
|
|
|
|
m_wallet->store();
|
|
|
|
else
|
2018-01-09 23:37:30 +02:00
|
|
|
LOG_ERROR("Status_Critical - not saving wallet");
|
2017-09-23 01:52:09 +03:00
|
|
|
LOG_PRINT_L1("wallet::store done");
|
|
|
|
}
|
2016-12-14 13:18:52 +02:00
|
|
|
LOG_PRINT_L1("Calling wallet::stop...");
|
2016-03-10 18:43:10 +02:00
|
|
|
m_wallet->stop();
|
2016-12-14 13:18:52 +02:00
|
|
|
LOG_PRINT_L1("wallet::stop done");
|
2018-06-12 09:29:33 +03:00
|
|
|
m_wallet->deinit();
|
2016-03-10 18:43:10 +02:00
|
|
|
result = true;
|
2016-08-22 15:53:07 +03:00
|
|
|
clearStatus();
|
2016-03-10 18:43:10 +02:00
|
|
|
} catch (const std::exception &e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusCritical(e.what());
|
2016-03-10 18:43:10 +02:00
|
|
|
LOG_ERROR("Error closing wallet: " << e.what());
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-02-20 18:04:56 +02:00
|
|
|
std::string WalletImpl::seed() const
|
|
|
|
{
|
2018-07-07 02:03:15 +03:00
|
|
|
epee::wipeable_string seed;
|
2016-02-21 20:18:16 +02:00
|
|
|
if (m_wallet)
|
|
|
|
m_wallet->get_seed(seed);
|
2018-07-07 02:03:15 +03:00
|
|
|
return std::string(seed.data(), seed.size()); // TODO
|
2016-02-21 20:18:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string WalletImpl::getSeedLanguage() const
|
|
|
|
{
|
|
|
|
return m_wallet->get_seed_language();
|
2016-02-20 18:04:56 +02:00
|
|
|
}
|
|
|
|
|
2016-02-21 20:18:16 +02:00
|
|
|
void WalletImpl::setSeedLanguage(const std::string &arg)
|
|
|
|
{
|
|
|
|
m_wallet->set_seed_language(arg);
|
|
|
|
}
|
2016-02-15 20:04:00 +02:00
|
|
|
|
2016-03-10 18:43:10 +02:00
|
|
|
int WalletImpl::status() const
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
boost::lock_guard<boost::mutex> l(m_statusMutex);
|
2016-03-10 18:43:10 +02:00
|
|
|
return m_status;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string WalletImpl::errorString() const
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
boost::lock_guard<boost::mutex> l(m_statusMutex);
|
2016-03-10 18:43:10 +02:00
|
|
|
return m_errorString;
|
|
|
|
}
|
|
|
|
|
2018-03-21 19:34:15 +02:00
|
|
|
void WalletImpl::statusWithErrorString(int& status, std::string& errorString) const {
|
|
|
|
boost::lock_guard<boost::mutex> l(m_statusMutex);
|
|
|
|
status = m_status;
|
|
|
|
errorString = m_errorString;
|
|
|
|
}
|
|
|
|
|
2016-03-11 16:05:36 +02:00
|
|
|
bool WalletImpl::setPassword(const std::string &password)
|
|
|
|
{
|
2016-03-15 22:11:38 +02:00
|
|
|
clearStatus();
|
2016-03-11 16:05:36 +02:00
|
|
|
try {
|
|
|
|
m_wallet->rewrite(m_wallet->get_wallet_file(), password);
|
2016-03-15 22:11:38 +02:00
|
|
|
m_password = password;
|
2016-03-11 16:05:36 +02:00
|
|
|
} catch (const std::exception &e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2016-03-11 16:05:36 +02:00
|
|
|
}
|
2018-03-21 19:34:15 +02:00
|
|
|
return status() == Status_Ok;
|
2016-03-11 16:05:36 +02:00
|
|
|
}
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
std::string WalletImpl::address(uint32_t accountIndex, uint32_t addressIndex) const
|
2016-03-12 16:52:58 +02:00
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
return m_wallet->get_subaddress_as_str({accountIndex, addressIndex});
|
2016-03-12 16:52:58 +02:00
|
|
|
}
|
|
|
|
|
2016-06-23 14:38:22 +03:00
|
|
|
std::string WalletImpl::integratedAddress(const std::string &payment_id) const
|
|
|
|
{
|
|
|
|
crypto::hash8 pid;
|
|
|
|
if (!tools::wallet2::parse_short_payment_id(payment_id, pid)) {
|
2016-10-16 15:17:29 +03:00
|
|
|
return "";
|
2016-06-23 14:38:22 +03:00
|
|
|
}
|
2017-02-19 04:42:10 +02:00
|
|
|
return m_wallet->get_integrated_address_as_str(pid);
|
2016-06-23 14:38:22 +03:00
|
|
|
}
|
|
|
|
|
2017-05-02 17:48:38 +03:00
|
|
|
std::string WalletImpl::secretViewKey() const
|
2017-01-10 23:34:15 +02:00
|
|
|
{
|
|
|
|
return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_view_secret_key);
|
|
|
|
}
|
|
|
|
|
2017-05-02 17:48:38 +03:00
|
|
|
std::string WalletImpl::publicViewKey() const
|
|
|
|
{
|
|
|
|
return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_account_address.m_view_public_key);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string WalletImpl::secretSpendKey() const
|
|
|
|
{
|
|
|
|
return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_spend_secret_key);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string WalletImpl::publicSpendKey() const
|
|
|
|
{
|
|
|
|
return epee::string_tools::pod_to_hex(m_wallet->get_account().get_keys().m_account_address.m_spend_public_key);
|
|
|
|
}
|
|
|
|
|
2018-04-10 19:21:25 +03:00
|
|
|
std::string WalletImpl::publicMultisigSignerKey() const
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
crypto::public_key signer = m_wallet->get_multisig_signer_public_key();
|
|
|
|
return epee::string_tools::pod_to_hex(signer);
|
|
|
|
} catch (const std::exception&) {
|
|
|
|
return "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-26 16:19:57 +02:00
|
|
|
std::string WalletImpl::path() const
|
|
|
|
{
|
|
|
|
return m_wallet->path();
|
|
|
|
}
|
|
|
|
|
2016-03-15 22:11:38 +02:00
|
|
|
bool WalletImpl::store(const std::string &path)
|
|
|
|
{
|
|
|
|
clearStatus();
|
|
|
|
try {
|
|
|
|
if (path.empty()) {
|
|
|
|
m_wallet->store();
|
|
|
|
} else {
|
|
|
|
m_wallet->store_to(path, m_password);
|
|
|
|
}
|
|
|
|
} catch (const std::exception &e) {
|
2018-01-09 23:37:30 +02:00
|
|
|
LOG_ERROR("Error saving wallet: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
|
|
|
return false;
|
2016-03-15 22:11:38 +02:00
|
|
|
}
|
|
|
|
|
2018-03-21 19:34:15 +02:00
|
|
|
return true;
|
2016-03-15 22:11:38 +02:00
|
|
|
}
|
|
|
|
|
2016-06-10 12:51:09 +03:00
|
|
|
string WalletImpl::filename() const
|
|
|
|
{
|
|
|
|
return m_wallet->get_wallet_file();
|
|
|
|
}
|
|
|
|
|
|
|
|
string WalletImpl::keysFilename() const
|
|
|
|
{
|
|
|
|
return m_wallet->get_keys_file();
|
|
|
|
}
|
|
|
|
|
2017-08-05 00:28:38 +03:00
|
|
|
bool WalletImpl::init(const std::string &daemon_address, uint64_t upper_transaction_size_limit, const std::string &daemon_username, const std::string &daemon_password, bool use_ssl, bool lightWallet)
|
2016-03-25 16:06:30 +02:00
|
|
|
{
|
|
|
|
clearStatus();
|
2017-08-05 00:28:38 +03:00
|
|
|
m_wallet->set_light_wallet(lightWallet);
|
2017-02-25 23:08:50 +02:00
|
|
|
if(daemon_username != "")
|
|
|
|
m_daemon_login.emplace(daemon_username, daemon_password);
|
2017-08-05 00:28:38 +03:00
|
|
|
return doInit(daemon_address, upper_transaction_size_limit, use_ssl);
|
2016-07-14 12:47:01 +03:00
|
|
|
}
|
|
|
|
|
2017-08-05 00:31:33 +03:00
|
|
|
bool WalletImpl::lightWalletLogin(bool &isNewWallet) const
|
|
|
|
{
|
|
|
|
return m_wallet->light_wallet_login(isNewWallet);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::lightWalletImportWalletRequest(std::string &payment_id, uint64_t &fee, bool &new_request, bool &request_fulfilled, std::string &payment_address, std::string &status)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
cryptonote::COMMAND_RPC_IMPORT_WALLET_REQUEST::response response;
|
|
|
|
if(!m_wallet->light_wallet_import_wallet_request(response)){
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to send import wallet request"));
|
2017-08-05 00:31:33 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
fee = response.import_fee;
|
|
|
|
payment_id = response.payment_id;
|
|
|
|
new_request = response.new_request;
|
|
|
|
request_fulfilled = response.request_fulfilled;
|
|
|
|
payment_address = response.payment_address;
|
|
|
|
status = response.status;
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
|
|
|
LOG_ERROR("Error sending import wallet request: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-08-05 00:31:33 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-10-08 01:57:09 +03:00
|
|
|
void WalletImpl::setRefreshFromBlockHeight(uint64_t refresh_from_block_height)
|
|
|
|
{
|
|
|
|
m_wallet->set_refresh_from_block_height(refresh_from_block_height);
|
|
|
|
}
|
2016-07-14 12:47:01 +03:00
|
|
|
|
2016-10-10 20:34:25 +03:00
|
|
|
void WalletImpl::setRecoveringFromSeed(bool recoveringFromSeed)
|
|
|
|
{
|
|
|
|
m_recoveringFromSeed = recoveringFromSeed;
|
|
|
|
}
|
2016-07-14 12:47:01 +03:00
|
|
|
|
2018-06-04 10:58:13 +03:00
|
|
|
void WalletImpl::setRecoveringFromDevice(bool recoveringFromDevice)
|
|
|
|
{
|
|
|
|
m_recoveringFromDevice = recoveringFromDevice;
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::setSubaddressLookahead(uint32_t major, uint32_t minor)
|
|
|
|
{
|
|
|
|
m_wallet->set_subaddress_lookahead(major, minor);
|
|
|
|
}
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
uint64_t WalletImpl::balance(uint32_t accountIndex) const
|
2016-03-25 16:06:30 +02:00
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
return m_wallet->balance(accountIndex);
|
2016-03-25 16:06:30 +02:00
|
|
|
}
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
uint64_t WalletImpl::unlockedBalance(uint32_t accountIndex) const
|
2016-03-31 12:48:41 +03:00
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
return m_wallet->unlocked_balance(accountIndex);
|
2016-03-31 12:48:41 +03:00
|
|
|
}
|
|
|
|
|
2016-09-23 22:36:37 +03:00
|
|
|
uint64_t WalletImpl::blockChainHeight() const
|
|
|
|
{
|
2017-08-05 01:08:32 +03:00
|
|
|
if(m_wallet->light_wallet()) {
|
|
|
|
return m_wallet->get_light_wallet_scanned_block_height();
|
|
|
|
}
|
2016-09-23 22:36:37 +03:00
|
|
|
return m_wallet->get_blockchain_current_height();
|
|
|
|
}
|
2016-11-10 16:36:16 +02:00
|
|
|
uint64_t WalletImpl::approximateBlockChainHeight() const
|
|
|
|
{
|
|
|
|
return m_wallet->get_approximate_blockchain_height();
|
|
|
|
}
|
2016-09-26 21:35:00 +03:00
|
|
|
uint64_t WalletImpl::daemonBlockChainHeight() const
|
|
|
|
{
|
2017-08-05 01:08:32 +03:00
|
|
|
if(m_wallet->light_wallet()) {
|
|
|
|
return m_wallet->get_light_wallet_scanned_block_height();
|
|
|
|
}
|
2016-12-14 13:18:52 +02:00
|
|
|
if (!m_is_connected)
|
|
|
|
return 0;
|
2016-09-26 21:35:00 +03:00
|
|
|
std::string err;
|
|
|
|
uint64_t result = m_wallet->get_daemon_blockchain_height(err);
|
|
|
|
if (!err.empty()) {
|
|
|
|
LOG_ERROR(__FUNCTION__ << ": " << err);
|
2016-09-28 00:31:21 +03:00
|
|
|
result = 0;
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(err);
|
2016-09-26 21:35:00 +03:00
|
|
|
} else {
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2016-09-26 21:35:00 +03:00
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-10-03 21:47:41 +03:00
|
|
|
uint64_t WalletImpl::daemonBlockChainTargetHeight() const
|
|
|
|
{
|
2017-08-05 01:08:32 +03:00
|
|
|
if(m_wallet->light_wallet()) {
|
|
|
|
return m_wallet->get_light_wallet_blockchain_height();
|
|
|
|
}
|
2016-12-14 13:18:52 +02:00
|
|
|
if (!m_is_connected)
|
|
|
|
return 0;
|
2016-10-03 21:47:41 +03:00
|
|
|
std::string err;
|
|
|
|
uint64_t result = m_wallet->get_daemon_blockchain_target_height(err);
|
|
|
|
if (!err.empty()) {
|
|
|
|
LOG_ERROR(__FUNCTION__ << ": " << err);
|
|
|
|
result = 0;
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(err);
|
2016-10-03 21:47:41 +03:00
|
|
|
} else {
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2016-10-03 21:47:41 +03:00
|
|
|
}
|
2016-12-14 13:18:52 +02:00
|
|
|
// Target height can be 0 when daemon is synced. Use blockchain height instead.
|
|
|
|
if(result == 0)
|
|
|
|
result = daemonBlockChainHeight();
|
2016-10-03 21:47:41 +03:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-12-14 13:18:52 +02:00
|
|
|
bool WalletImpl::daemonSynced() const
|
|
|
|
{
|
|
|
|
if(connected() == Wallet::ConnectionStatus_Disconnected)
|
|
|
|
return false;
|
|
|
|
uint64_t blockChainHeight = daemonBlockChainHeight();
|
|
|
|
return (blockChainHeight >= daemonBlockChainTargetHeight() && blockChainHeight > 1);
|
|
|
|
}
|
|
|
|
|
2016-10-07 00:29:13 +03:00
|
|
|
bool WalletImpl::synchronized() const
|
|
|
|
{
|
|
|
|
return m_synchronized;
|
|
|
|
}
|
|
|
|
|
2016-03-31 16:38:57 +03:00
|
|
|
bool WalletImpl::refresh()
|
|
|
|
{
|
|
|
|
clearStatus();
|
2018-03-21 19:34:15 +02:00
|
|
|
//TODO: make doRefresh return bool to know whether the error occured during refresh or not
|
|
|
|
//otherwise one may try, say, to send transaction, transfer fails and this method returns false
|
2016-07-10 17:17:23 +03:00
|
|
|
doRefresh();
|
2018-03-21 19:34:15 +02:00
|
|
|
return status() == Status_Ok;
|
2016-03-31 16:38:57 +03:00
|
|
|
}
|
|
|
|
|
2016-07-10 17:17:23 +03:00
|
|
|
void WalletImpl::refreshAsync()
|
|
|
|
{
|
2016-12-04 15:13:54 +02:00
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": Refreshing asynchronously..");
|
2016-07-10 17:17:23 +03:00
|
|
|
clearStatus();
|
|
|
|
m_refreshCV.notify_one();
|
|
|
|
}
|
|
|
|
|
2016-09-26 22:50:10 +03:00
|
|
|
void WalletImpl::setAutoRefreshInterval(int millis)
|
2016-09-20 20:40:58 +03:00
|
|
|
{
|
2016-09-28 00:35:10 +03:00
|
|
|
if (millis > MAX_REFRESH_INTERVAL_MILLIS) {
|
|
|
|
LOG_ERROR(__FUNCTION__<< ": invalid refresh interval " << millis
|
|
|
|
<< " ms, maximum allowed is " << MAX_REFRESH_INTERVAL_MILLIS << " ms");
|
|
|
|
m_refreshIntervalMillis = MAX_REFRESH_INTERVAL_MILLIS;
|
|
|
|
} else {
|
|
|
|
m_refreshIntervalMillis = millis;
|
|
|
|
}
|
2016-09-20 20:40:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
int WalletImpl::autoRefreshInterval() const
|
|
|
|
{
|
2016-09-26 22:50:10 +03:00
|
|
|
return m_refreshIntervalMillis;
|
2016-09-20 20:40:58 +03:00
|
|
|
}
|
|
|
|
|
2017-01-08 14:17:09 +02:00
|
|
|
UnsignedTransaction *WalletImpl::loadUnsignedTx(const std::string &unsigned_filename) {
|
|
|
|
clearStatus();
|
|
|
|
UnsignedTransactionImpl * transaction = new UnsignedTransactionImpl(*this);
|
|
|
|
if (!m_wallet->load_unsigned_tx(unsigned_filename, transaction->m_unsigned_tx_set)){
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to load unsigned transactions"));
|
2017-01-08 14:17:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check tx data and construct confirmation message
|
|
|
|
std::string extra_message;
|
|
|
|
if (!transaction->m_unsigned_tx_set.transfers.empty())
|
|
|
|
extra_message = (boost::format("%u outputs to import. ") % (unsigned)transaction->m_unsigned_tx_set.transfers.size()).str();
|
|
|
|
transaction->checkLoadedTx([&transaction](){return transaction->m_unsigned_tx_set.txes.size();}, [&transaction](size_t n)->const tools::wallet2::tx_construction_data&{return transaction->m_unsigned_tx_set.txes[n];}, extra_message);
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatus(transaction->status(), transaction->errorString());
|
2017-01-08 14:17:09 +02:00
|
|
|
|
|
|
|
return transaction;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::submitTransaction(const string &fileName) {
|
|
|
|
clearStatus();
|
2017-01-14 00:00:03 +02:00
|
|
|
std::unique_ptr<PendingTransactionImpl> transaction(new PendingTransactionImpl(*this));
|
2017-01-08 14:17:09 +02:00
|
|
|
|
|
|
|
bool r = m_wallet->load_tx(fileName, transaction->m_pending_tx);
|
|
|
|
if (!r) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatus(Status_Ok, tr("Failed to load transaction from file"));
|
2017-01-08 14:17:09 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!transaction->commit()) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(transaction->m_errorString);
|
2017-01-08 14:17:09 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-01-14 00:00:03 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::exportKeyImages(const string &filename)
|
|
|
|
{
|
|
|
|
if (m_wallet->watch_only())
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Wallet is view only"));
|
2017-01-14 00:00:03 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
if (!m_wallet->export_key_images(filename))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("failed to save file ") + filename);
|
2017-01-14 00:00:03 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2017-03-18 14:56:07 +02:00
|
|
|
catch (const std::exception &e)
|
2017-01-14 00:00:03 +02:00
|
|
|
{
|
|
|
|
LOG_ERROR("Error exporting key images: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-01-14 00:00:03 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::importKeyImages(const string &filename)
|
|
|
|
{
|
2017-08-18 15:29:34 +03:00
|
|
|
if (!trustedDaemon()) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Key images can only be imported with a trusted daemon"));
|
2017-08-18 15:29:34 +03:00
|
|
|
return false;
|
|
|
|
}
|
2017-01-14 00:00:03 +02:00
|
|
|
try
|
|
|
|
{
|
|
|
|
uint64_t spent = 0, unspent = 0;
|
|
|
|
uint64_t height = m_wallet->import_key_images(filename, spent, unspent);
|
|
|
|
LOG_PRINT_L2("Signed key images imported to height " << height << ", "
|
|
|
|
<< print_money(spent) << " spent, " << print_money(unspent) << " unspent");
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
|
|
|
LOG_ERROR("Error exporting key images: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("Failed to import key images: ")) + e.what());
|
2017-01-14 00:00:03 +02:00
|
|
|
return false;
|
|
|
|
}
|
2017-01-08 14:17:09 +02:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
void WalletImpl::addSubaddressAccount(const std::string& label)
|
|
|
|
{
|
|
|
|
m_wallet->add_subaddress_account(label);
|
|
|
|
}
|
|
|
|
size_t WalletImpl::numSubaddressAccounts() const
|
|
|
|
{
|
|
|
|
return m_wallet->get_num_subaddress_accounts();
|
|
|
|
}
|
|
|
|
size_t WalletImpl::numSubaddresses(uint32_t accountIndex) const
|
|
|
|
{
|
|
|
|
return m_wallet->get_num_subaddresses(accountIndex);
|
|
|
|
}
|
|
|
|
void WalletImpl::addSubaddress(uint32_t accountIndex, const std::string& label)
|
|
|
|
{
|
|
|
|
m_wallet->add_subaddress(accountIndex, label);
|
|
|
|
}
|
|
|
|
std::string WalletImpl::getSubaddressLabel(uint32_t accountIndex, uint32_t addressIndex) const
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
return m_wallet->get_subaddress_label({accountIndex, addressIndex});
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
|
|
|
LOG_ERROR("Error getting subaddress label: ") << e.what();
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("Failed to get subaddress label: ")) + e.what());
|
2017-02-19 04:42:10 +02:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
void WalletImpl::setSubaddressLabel(uint32_t accountIndex, uint32_t addressIndex, const std::string &label)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
return m_wallet->set_subaddress_label({accountIndex, addressIndex}, label);
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
|
|
|
LOG_ERROR("Error setting subaddress label: ") << e.what();
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("Failed to set subaddress label: ")) + e.what());
|
2017-02-19 04:42:10 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-21 17:57:15 +02:00
|
|
|
MultisigState WalletImpl::multisig() const {
|
|
|
|
MultisigState state;
|
|
|
|
state.isMultisig = m_wallet->multisig(&state.isReady, &state.threshold, &state.total);
|
|
|
|
|
|
|
|
return state;
|
|
|
|
}
|
|
|
|
|
|
|
|
string WalletImpl::getMultisigInfo() const {
|
|
|
|
try {
|
|
|
|
clearStatus();
|
|
|
|
return m_wallet->get_multisig_info();
|
|
|
|
} catch (const exception& e) {
|
|
|
|
LOG_ERROR("Error on generating multisig info: ") << e.what();
|
|
|
|
setStatusError(string(tr("Failed to get multisig info: ")) + e.what());
|
|
|
|
}
|
|
|
|
|
|
|
|
return string();
|
|
|
|
}
|
|
|
|
|
|
|
|
string WalletImpl::makeMultisig(const vector<string>& info, uint32_t threshold) {
|
|
|
|
try {
|
|
|
|
clearStatus();
|
|
|
|
|
|
|
|
if (m_wallet->multisig()) {
|
|
|
|
throw runtime_error("Wallet is already multisig");
|
|
|
|
}
|
|
|
|
|
|
|
|
return m_wallet->make_multisig(epee::wipeable_string(m_password), info, threshold);
|
|
|
|
} catch (const exception& e) {
|
|
|
|
LOG_ERROR("Error on making multisig wallet: ") << e.what();
|
|
|
|
setStatusError(string(tr("Failed to make multisig: ")) + e.what());
|
|
|
|
}
|
|
|
|
|
|
|
|
return string();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::finalizeMultisig(const vector<string>& extraMultisigInfo) {
|
|
|
|
try {
|
|
|
|
clearStatus();
|
|
|
|
checkMultisigWalletNotReady(m_wallet);
|
|
|
|
|
|
|
|
if (m_wallet->finalize_multisig(epee::wipeable_string(m_password), extraMultisigInfo)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
setStatusError(tr("Failed to finalize multisig wallet creation"));
|
|
|
|
} catch (const exception& e) {
|
|
|
|
LOG_ERROR("Error on finalizing multisig wallet creation: ") << e.what();
|
|
|
|
setStatusError(string(tr("Failed to finalize multisig wallet creation: ")) + e.what());
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::exportMultisigImages(string& images) {
|
|
|
|
try {
|
|
|
|
clearStatus();
|
|
|
|
checkMultisigWalletReady(m_wallet);
|
|
|
|
|
|
|
|
auto blob = m_wallet->export_multisig();
|
|
|
|
images = epee::string_tools::buff_to_hex_nodelimer(blob);
|
|
|
|
return true;
|
|
|
|
} catch (const exception& e) {
|
|
|
|
LOG_ERROR("Error on exporting multisig images: ") << e.what();
|
|
|
|
setStatusError(string(tr("Failed to export multisig images: ")) + e.what());
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t WalletImpl::importMultisigImages(const vector<string>& images) {
|
|
|
|
try {
|
|
|
|
clearStatus();
|
|
|
|
checkMultisigWalletReady(m_wallet);
|
|
|
|
|
|
|
|
std::vector<std::string> blobs;
|
|
|
|
blobs.reserve(images.size());
|
|
|
|
|
|
|
|
for (const auto& image: images) {
|
|
|
|
std::string blob;
|
|
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(image, blob)) {
|
|
|
|
LOG_ERROR("Failed to parse imported multisig images");
|
|
|
|
setStatusError(tr("Failed to parse imported multisig images"));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
blobs.emplace_back(std::move(blob));
|
|
|
|
}
|
|
|
|
|
|
|
|
return m_wallet->import_multisig(blobs);
|
|
|
|
} catch (const exception& e) {
|
|
|
|
LOG_ERROR("Error on importing multisig images: ") << e.what();
|
|
|
|
setStatusError(string(tr("Failed to import multisig images: ")) + e.what());
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
PendingTransaction* WalletImpl::restoreMultisigTransaction(const string& signData) {
|
|
|
|
try {
|
|
|
|
clearStatus();
|
|
|
|
checkMultisigWalletReady(m_wallet);
|
|
|
|
|
|
|
|
string binary;
|
|
|
|
if (!epee::string_tools::parse_hexstr_to_binbuff(signData, binary)) {
|
|
|
|
throw runtime_error("Failed to deserialize multisig transaction");
|
|
|
|
}
|
|
|
|
|
|
|
|
tools::wallet2::multisig_tx_set txSet;
|
|
|
|
if (!m_wallet->load_multisig_tx(binary, txSet, {})) {
|
|
|
|
throw runtime_error("couldn't parse multisig transaction data");
|
|
|
|
}
|
|
|
|
|
|
|
|
auto ptx = new PendingTransactionImpl(*this);
|
|
|
|
ptx->m_pending_tx = txSet.m_ptx;
|
|
|
|
ptx->m_signers = txSet.m_signers;
|
|
|
|
|
|
|
|
return ptx;
|
|
|
|
} catch (exception& e) {
|
|
|
|
LOG_ERROR("Error on restoring multisig transaction: ") << e.what();
|
|
|
|
setStatusError(string(tr("Failed to restore multisig transaction: ")) + e.what());
|
|
|
|
}
|
|
|
|
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
// TODO:
|
|
|
|
// 1 - properly handle payment id (add another menthod with explicit 'payment_id' param)
|
|
|
|
// 2 - check / design how "Transaction" can be single interface
|
|
|
|
// (instead of few different data structures within wallet2 implementation:
|
|
|
|
// - pending_tx;
|
|
|
|
// - transfer_details;
|
|
|
|
// - payment_details;
|
|
|
|
// - unconfirmed_transfer_details;
|
|
|
|
// - confirmed_transfer_details)
|
2016-06-23 16:23:09 +03:00
|
|
|
|
2016-11-09 14:19:22 +02:00
|
|
|
PendingTransaction *WalletImpl::createTransaction(const string &dst_addr, const string &payment_id, optional<uint64_t> amount, uint32_t mixin_count,
|
2017-10-22 16:13:35 +03:00
|
|
|
PendingTransaction::Priority priority, uint32_t subaddr_account, std::set<uint32_t> subaddr_indices)
|
2016-06-27 14:55:13 +03:00
|
|
|
|
2016-04-03 14:34:38 +03:00
|
|
|
{
|
|
|
|
clearStatus();
|
2016-11-08 14:20:42 +02:00
|
|
|
// Pause refresh thread while creating transaction
|
|
|
|
pauseRefresh();
|
2017-01-08 14:17:09 +02:00
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
cryptonote::address_parse_info info;
|
2016-04-12 22:30:20 +03:00
|
|
|
|
2016-06-23 14:38:22 +03:00
|
|
|
// indicates if dst_addr is integrated address (address + payment_id)
|
2016-04-05 15:24:44 +03:00
|
|
|
// TODO: (https://bitcointalk.org/index.php?topic=753252.msg9985441#msg9985441)
|
2016-06-20 22:56:30 +03:00
|
|
|
size_t fake_outs_count = mixin_count > 0 ? mixin_count : m_wallet->default_mixin();
|
2016-04-03 14:34:38 +03:00
|
|
|
if (fake_outs_count == 0)
|
2016-06-20 22:56:30 +03:00
|
|
|
fake_outs_count = DEFAULT_MIXIN;
|
2018-07-19 00:24:53 +03:00
|
|
|
fake_outs_count = m_wallet->adjust_mixin(fake_outs_count);
|
2016-04-03 14:34:38 +03:00
|
|
|
|
2018-01-15 05:05:16 +02:00
|
|
|
uint32_t adjusted_priority = m_wallet->adjust_priority(static_cast<uint32_t>(priority));
|
|
|
|
|
2016-06-23 14:38:22 +03:00
|
|
|
PendingTransactionImpl * transaction = new PendingTransactionImpl(*this);
|
2016-04-03 14:34:38 +03:00
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
do {
|
2018-02-16 13:04:04 +02:00
|
|
|
if(!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), dst_addr)) {
|
2016-04-05 15:24:44 +03:00
|
|
|
// TODO: copy-paste 'if treating as an address fails, try as url' from simplewallet.cpp:1982
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Invalid destination address"));
|
2016-04-05 15:24:44 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2016-06-23 16:23:09 +03:00
|
|
|
|
2016-06-23 14:38:22 +03:00
|
|
|
std::vector<uint8_t> extra;
|
|
|
|
// if dst_addr is not an integrated address, parse payment_id
|
2017-02-19 04:42:10 +02:00
|
|
|
if (!info.has_payment_id && !payment_id.empty()) {
|
2016-06-23 14:38:22 +03:00
|
|
|
// copy-pasted from simplewallet.cpp:2212
|
|
|
|
crypto::hash payment_id_long;
|
|
|
|
bool r = tools::wallet2::parse_long_payment_id(payment_id, payment_id_long);
|
|
|
|
if (r) {
|
|
|
|
std::string extra_nonce;
|
|
|
|
cryptonote::set_payment_id_to_tx_extra_nonce(extra_nonce, payment_id_long);
|
|
|
|
r = add_extra_nonce_to_tx_extra(extra, extra_nonce);
|
|
|
|
} else {
|
2017-02-19 04:42:10 +02:00
|
|
|
r = tools::wallet2::parse_short_payment_id(payment_id, info.payment_id);
|
2016-06-23 14:38:22 +03:00
|
|
|
if (r) {
|
|
|
|
std::string extra_nonce;
|
2017-02-19 04:42:10 +02:00
|
|
|
set_encrypted_payment_id_to_tx_extra_nonce(extra_nonce, info.payment_id);
|
2016-06-23 14:38:22 +03:00
|
|
|
r = add_extra_nonce_to_tx_extra(extra, extra_nonce);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!r) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("payment id has invalid format, expected 16 or 64 character hex string: ") + payment_id);
|
2016-06-23 14:38:22 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2017-02-19 04:42:10 +02:00
|
|
|
else if (info.has_payment_id) {
|
2016-11-18 21:13:43 +02:00
|
|
|
std::string extra_nonce;
|
2017-02-19 04:42:10 +02:00
|
|
|
set_encrypted_payment_id_to_tx_extra_nonce(extra_nonce, info.payment_id);
|
2016-11-18 21:13:43 +02:00
|
|
|
bool r = add_extra_nonce_to_tx_extra(extra, extra_nonce);
|
|
|
|
if (!r) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to add short payment id: ") + epee::string_tools::pod_to_hex(info.payment_id));
|
2016-11-18 21:13:43 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-23 14:38:22 +03:00
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
//std::vector<tools::wallet2::pending_tx> ptx_vector;
|
2016-06-23 14:38:22 +03:00
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
try {
|
2016-11-09 14:19:22 +02:00
|
|
|
if (amount) {
|
|
|
|
vector<cryptonote::tx_destination_entry> dsts;
|
|
|
|
cryptonote::tx_destination_entry de;
|
2017-02-19 04:42:10 +02:00
|
|
|
de.addr = info.address;
|
2016-11-09 14:19:22 +02:00
|
|
|
de.amount = *amount;
|
2017-02-19 04:42:10 +02:00
|
|
|
de.is_subaddress = info.is_subaddress;
|
2016-11-09 14:19:22 +02:00
|
|
|
dsts.push_back(de);
|
|
|
|
transaction->m_pending_tx = m_wallet->create_transactions_2(dsts, fake_outs_count, 0 /* unlock_time */,
|
2018-01-15 05:05:16 +02:00
|
|
|
adjusted_priority,
|
2018-08-10 15:15:40 +03:00
|
|
|
extra, subaddr_account, subaddr_indices);
|
2016-11-09 14:19:22 +02:00
|
|
|
} else {
|
2017-02-19 04:42:10 +02:00
|
|
|
// for the GUI, sweep_all (i.e. amount set as "(all)") will always sweep all the funds in all the addresses
|
|
|
|
if (subaddr_indices.empty())
|
|
|
|
{
|
|
|
|
for (uint32_t index = 0; index < m_wallet->get_num_subaddresses(subaddr_account); ++index)
|
|
|
|
subaddr_indices.insert(index);
|
|
|
|
}
|
|
|
|
transaction->m_pending_tx = m_wallet->create_transactions_all(0, info.address, info.is_subaddress, fake_outs_count, 0 /* unlock_time */,
|
2018-01-15 05:05:16 +02:00
|
|
|
adjusted_priority,
|
2018-08-10 15:15:40 +03:00
|
|
|
extra, subaddr_account, subaddr_indices);
|
2016-11-09 14:19:22 +02:00
|
|
|
}
|
2016-04-05 15:24:44 +03:00
|
|
|
|
2018-03-21 17:57:15 +02:00
|
|
|
if (multisig().isMultisig) {
|
|
|
|
transaction->m_signers = m_wallet->make_multisig_tx_set(transaction->m_pending_tx).m_signers;
|
|
|
|
}
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::daemon_busy&) {
|
|
|
|
// TODO: make it translatable with "tr"?
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("daemon is busy. Please try again later."));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::no_connection_to_daemon&) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("no connection to daemon. Please make sure daemon is running."));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::wallet_rpc_error& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("RPC error: ") + e.to_string());
|
2017-01-20 19:46:14 +02:00
|
|
|
} catch (const tools::error::get_random_outs_error &e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError((boost::format(tr("failed to get random outputs to mix: %s")) % e.what()).str());
|
2017-10-16 16:13:23 +03:00
|
|
|
} catch (const tools::error::not_enough_unlocked_money& e) {
|
2016-06-20 22:56:30 +03:00
|
|
|
std::ostringstream writer;
|
2016-04-05 15:24:44 +03:00
|
|
|
|
2016-10-15 16:30:50 +03:00
|
|
|
writer << boost::format(tr("not enough money to transfer, available only %s, sent amount %s")) %
|
|
|
|
print_money(e.available()) %
|
|
|
|
print_money(e.tx_amount());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2017-10-16 16:13:23 +03:00
|
|
|
} catch (const tools::error::not_enough_money& e) {
|
|
|
|
std::ostringstream writer;
|
|
|
|
|
|
|
|
writer << boost::format(tr("not enough money to transfer, overall balance only %s, sent amount %s")) %
|
|
|
|
print_money(e.available()) %
|
|
|
|
print_money(e.tx_amount());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-10-15 16:30:50 +03:00
|
|
|
} catch (const tools::error::tx_not_possible& e) {
|
|
|
|
std::ostringstream writer;
|
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
writer << boost::format(tr("not enough money to transfer, available only %s, transaction amount %s = %s + %s (fee)")) %
|
|
|
|
print_money(e.available()) %
|
|
|
|
print_money(e.tx_amount() + e.fee()) %
|
|
|
|
print_money(e.tx_amount()) %
|
|
|
|
print_money(e.fee());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::not_enough_outs_to_mix& e) {
|
2016-06-20 22:56:30 +03:00
|
|
|
std::ostringstream writer;
|
2017-07-31 09:50:41 +03:00
|
|
|
writer << tr("not enough outputs for specified ring size") << " = " << (e.mixin_count() + 1) << ":";
|
2016-08-02 23:48:09 +03:00
|
|
|
for (const std::pair<uint64_t, uint64_t> outs_for_amount : e.scanty_outs()) {
|
2017-07-31 09:50:41 +03:00
|
|
|
writer << "\n" << tr("output amount") << " = " << print_money(outs_for_amount.first) << ", " << tr("found outputs to use") << " = " << outs_for_amount.second;
|
2016-04-05 15:24:44 +03:00
|
|
|
}
|
2018-01-31 03:37:54 +02:00
|
|
|
writer << "\n" << tr("Please sweep unmixable outputs.");
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_not_constructed&) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("transaction was not constructed"));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_rejected& e) {
|
2016-06-20 22:56:30 +03:00
|
|
|
std::ostringstream writer;
|
2016-04-05 15:24:44 +03:00
|
|
|
writer << (boost::format(tr("transaction %s was rejected by daemon with status: ")) % get_transaction_hash(e.tx())) << e.status();
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_sum_overflow& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::zero_destination&) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("one of destinations is zero"));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_too_big& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("failed to find a suitable way to split transactions"));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::transfer_error& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("unknown transfer error: ")) + e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::wallet_internal_error& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("internal error: ")) + e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const std::exception& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("unexpected error: ")) + e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (...) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("unknown error"));
|
2016-04-05 15:24:44 +03:00
|
|
|
}
|
|
|
|
} while (false);
|
|
|
|
|
2018-03-21 19:34:15 +02:00
|
|
|
statusWithErrorString(transaction->m_status, transaction->m_errorString);
|
2016-11-08 14:20:42 +02:00
|
|
|
// Resume refresh thread
|
|
|
|
startRefresh();
|
2016-04-05 15:24:44 +03:00
|
|
|
return transaction;
|
|
|
|
}
|
|
|
|
|
2016-11-08 22:03:07 +02:00
|
|
|
PendingTransaction *WalletImpl::createSweepUnmixableTransaction()
|
|
|
|
|
|
|
|
{
|
|
|
|
clearStatus();
|
|
|
|
vector<cryptonote::tx_destination_entry> dsts;
|
|
|
|
cryptonote::tx_destination_entry de;
|
|
|
|
|
|
|
|
PendingTransactionImpl * transaction = new PendingTransactionImpl(*this);
|
|
|
|
|
|
|
|
do {
|
|
|
|
try {
|
2018-08-10 15:15:40 +03:00
|
|
|
transaction->m_pending_tx = m_wallet->create_unmixable_sweep_transactions();
|
2016-11-08 22:03:07 +02:00
|
|
|
|
|
|
|
} catch (const tools::error::daemon_busy&) {
|
2016-04-05 15:24:44 +03:00
|
|
|
// TODO: make it translatable with "tr"?
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("daemon is busy. Please try again later."));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::no_connection_to_daemon&) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("no connection to daemon. Please make sure daemon is running."));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::wallet_rpc_error& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("RPC error: ") + e.to_string());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::get_random_outs_error&) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("failed to get random outputs to mix"));
|
2017-10-16 16:13:23 +03:00
|
|
|
} catch (const tools::error::not_enough_unlocked_money& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError("");
|
2016-06-20 22:56:30 +03:00
|
|
|
std::ostringstream writer;
|
2016-04-05 15:24:44 +03:00
|
|
|
|
2016-10-15 16:30:50 +03:00
|
|
|
writer << boost::format(tr("not enough money to transfer, available only %s, sent amount %s")) %
|
|
|
|
print_money(e.available()) %
|
|
|
|
print_money(e.tx_amount());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2017-10-16 16:13:23 +03:00
|
|
|
} catch (const tools::error::not_enough_money& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError("");
|
2017-10-16 16:13:23 +03:00
|
|
|
std::ostringstream writer;
|
|
|
|
|
|
|
|
writer << boost::format(tr("not enough money to transfer, overall balance only %s, sent amount %s")) %
|
|
|
|
print_money(e.available()) %
|
|
|
|
print_money(e.tx_amount());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-10-15 16:30:50 +03:00
|
|
|
} catch (const tools::error::tx_not_possible& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError("");
|
2016-10-15 16:30:50 +03:00
|
|
|
std::ostringstream writer;
|
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
writer << boost::format(tr("not enough money to transfer, available only %s, transaction amount %s = %s + %s (fee)")) %
|
|
|
|
print_money(e.available()) %
|
|
|
|
print_money(e.tx_amount() + e.fee()) %
|
|
|
|
print_money(e.tx_amount()) %
|
|
|
|
print_money(e.fee());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::not_enough_outs_to_mix& e) {
|
2016-06-20 22:56:30 +03:00
|
|
|
std::ostringstream writer;
|
2017-07-31 09:50:41 +03:00
|
|
|
writer << tr("not enough outputs for specified ring size") << " = " << (e.mixin_count() + 1) << ":";
|
2016-08-02 23:48:09 +03:00
|
|
|
for (const std::pair<uint64_t, uint64_t> outs_for_amount : e.scanty_outs()) {
|
2017-07-31 09:50:41 +03:00
|
|
|
writer << "\n" << tr("output amount") << " = " << print_money(outs_for_amount.first) << ", " << tr("found outputs to use") << " = " << outs_for_amount.second;
|
2016-04-05 15:24:44 +03:00
|
|
|
}
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_not_constructed&) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("transaction was not constructed"));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_rejected& e) {
|
2016-06-20 22:56:30 +03:00
|
|
|
std::ostringstream writer;
|
2016-04-05 15:24:44 +03:00
|
|
|
writer << (boost::format(tr("transaction %s was rejected by daemon with status: ")) % get_transaction_hash(e.tx())) << e.status();
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(writer.str());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_sum_overflow& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::zero_destination&) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("one of destinations is zero"));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::tx_too_big& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("failed to find a suitable way to split transactions"));
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::transfer_error& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("unknown transfer error: ")) + e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const tools::error::wallet_internal_error& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("internal error: ")) + e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (const std::exception& e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(string(tr("unexpected error: ")) + e.what());
|
2016-04-05 15:24:44 +03:00
|
|
|
} catch (...) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("unknown error"));
|
2016-04-05 15:24:44 +03:00
|
|
|
}
|
|
|
|
} while (false);
|
|
|
|
|
2018-03-21 19:34:15 +02:00
|
|
|
statusWithErrorString(transaction->m_status, transaction->m_errorString);
|
2016-04-05 15:24:44 +03:00
|
|
|
return transaction;
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::disposeTransaction(PendingTransaction *t)
|
|
|
|
{
|
|
|
|
delete t;
|
|
|
|
}
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
TransactionHistory *WalletImpl::history()
|
2016-04-19 12:25:03 +03:00
|
|
|
{
|
2016-04-22 13:21:08 +03:00
|
|
|
return m_history;
|
2016-04-19 12:25:03 +03:00
|
|
|
}
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
AddressBook *WalletImpl::addressBook()
|
2016-12-12 01:42:46 +02:00
|
|
|
{
|
|
|
|
return m_addressBook;
|
|
|
|
}
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
Subaddress *WalletImpl::subaddress()
|
|
|
|
{
|
|
|
|
return m_subaddress;
|
|
|
|
}
|
|
|
|
|
|
|
|
SubaddressAccount *WalletImpl::subaddressAccount()
|
|
|
|
{
|
|
|
|
return m_subaddressAccount;
|
|
|
|
}
|
|
|
|
|
2016-05-05 22:24:00 +03:00
|
|
|
void WalletImpl::setListener(WalletListener *l)
|
|
|
|
{
|
|
|
|
// TODO thread synchronization;
|
|
|
|
m_wallet2Callback->setListener(l);
|
|
|
|
}
|
|
|
|
|
2016-06-10 13:52:10 +03:00
|
|
|
uint32_t WalletImpl::defaultMixin() const
|
|
|
|
{
|
|
|
|
return m_wallet->default_mixin();
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::setDefaultMixin(uint32_t arg)
|
|
|
|
{
|
|
|
|
m_wallet->default_mixin(arg);
|
|
|
|
}
|
2016-05-05 22:24:00 +03:00
|
|
|
|
2016-11-05 22:53:45 +02:00
|
|
|
bool WalletImpl::setUserNote(const std::string &txid, const std::string ¬e)
|
|
|
|
{
|
|
|
|
cryptonote::blobdata txid_data;
|
2017-02-14 21:35:44 +02:00
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(txid, txid_data) || txid_data.size() != sizeof(crypto::hash))
|
2016-11-05 22:53:45 +02:00
|
|
|
return false;
|
|
|
|
const crypto::hash htxid = *reinterpret_cast<const crypto::hash*>(txid_data.data());
|
|
|
|
|
|
|
|
m_wallet->set_tx_note(htxid, note);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string WalletImpl::getUserNote(const std::string &txid) const
|
|
|
|
{
|
|
|
|
cryptonote::blobdata txid_data;
|
2017-02-14 21:35:44 +02:00
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(txid, txid_data) || txid_data.size() != sizeof(crypto::hash))
|
2016-11-05 22:53:45 +02:00
|
|
|
return "";
|
|
|
|
const crypto::hash htxid = *reinterpret_cast<const crypto::hash*>(txid_data.data());
|
|
|
|
|
|
|
|
return m_wallet->get_tx_note(htxid);
|
|
|
|
}
|
2016-05-05 22:24:00 +03:00
|
|
|
|
2017-09-12 04:05:41 +03:00
|
|
|
std::string WalletImpl::getTxKey(const std::string &txid_str) const
|
2016-11-06 20:04:59 +02:00
|
|
|
{
|
2017-09-12 04:05:41 +03:00
|
|
|
crypto::hash txid;
|
|
|
|
if(!epee::string_tools::hex_to_pod(txid_str, txid))
|
2016-11-06 20:04:59 +02:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse txid"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return "";
|
2016-11-06 20:04:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
crypto::secret_key tx_key;
|
2017-02-19 04:42:10 +02:00
|
|
|
std::vector<crypto::secret_key> additional_tx_keys;
|
2017-09-12 04:05:41 +03:00
|
|
|
if (m_wallet->get_tx_key(txid, tx_key, additional_tx_keys))
|
2016-11-06 20:04:59 +02:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-09-12 04:05:41 +03:00
|
|
|
std::ostringstream oss;
|
|
|
|
oss << epee::string_tools::pod_to_hex(tx_key);
|
|
|
|
for (size_t i = 0; i < additional_tx_keys.size(); ++i)
|
|
|
|
oss << epee::string_tools::pod_to_hex(additional_tx_keys[i]);
|
|
|
|
return oss.str();
|
2016-11-06 20:04:59 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("no tx keys found for this txid"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::checkTxKey(const std::string &txid_str, std::string tx_key_str, const std::string &address_str, uint64_t &received, bool &in_pool, uint64_t &confirmations)
|
|
|
|
{
|
|
|
|
crypto::hash txid;
|
|
|
|
if (!epee::string_tools::hex_to_pod(txid_str, txid))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse txid"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
crypto::secret_key tx_key;
|
|
|
|
std::vector<crypto::secret_key> additional_tx_keys;
|
|
|
|
if (!epee::string_tools::hex_to_pod(tx_key_str.substr(0, 64), tx_key))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse tx key"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
tx_key_str = tx_key_str.substr(64);
|
|
|
|
while (!tx_key_str.empty())
|
|
|
|
{
|
|
|
|
additional_tx_keys.resize(additional_tx_keys.size() + 1);
|
|
|
|
if (!epee::string_tools::hex_to_pod(tx_key_str.substr(0, 64), additional_tx_keys.back()))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse tx key"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
tx_key_str = tx_key_str.substr(64);
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptonote::address_parse_info info;
|
2018-02-16 13:04:04 +02:00
|
|
|
if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address_str))
|
2017-09-12 04:05:41 +03:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse address"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
m_wallet->check_tx_key(txid, tx_key, additional_tx_keys, info.address, received, in_pool, confirmations);
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-09-12 04:05:41 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-20 11:10:58 +02:00
|
|
|
std::string WalletImpl::getTxProof(const std::string &txid_str, const std::string &address_str, const std::string &message) const
|
2017-09-12 04:05:41 +03:00
|
|
|
{
|
|
|
|
crypto::hash txid;
|
|
|
|
if (!epee::string_tools::hex_to_pod(txid_str, txid))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse txid"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptonote::address_parse_info info;
|
2018-02-16 13:04:04 +02:00
|
|
|
if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address_str))
|
2017-09-12 04:05:41 +03:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse address"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-11-20 11:10:58 +02:00
|
|
|
return m_wallet->get_tx_proof(txid, info.address, info.is_subaddress, message);
|
2017-09-12 04:05:41 +03:00
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-09-12 04:05:41 +03:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::checkTxProof(const std::string &txid_str, const std::string &address_str, const std::string &message, const std::string &signature, bool &good, uint64_t &received, bool &in_pool, uint64_t &confirmations)
|
|
|
|
{
|
|
|
|
crypto::hash txid;
|
|
|
|
if (!epee::string_tools::hex_to_pod(txid_str, txid))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse txid"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
cryptonote::address_parse_info info;
|
2018-02-16 13:04:04 +02:00
|
|
|
if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address_str))
|
2017-09-12 04:05:41 +03:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse address"));
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
good = m_wallet->check_tx_proof(txid, info.address, info.is_subaddress, message, signature, received, in_pool, confirmations);
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-09-12 04:05:41 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-09-12 04:05:41 +03:00
|
|
|
return false;
|
2016-11-06 20:04:59 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-28 18:34:17 +03:00
|
|
|
std::string WalletImpl::getSpendProof(const std::string &txid_str, const std::string &message) const {
|
|
|
|
crypto::hash txid;
|
|
|
|
if(!epee::string_tools::hex_to_pod(txid_str, txid))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse txid"));
|
2017-08-28 18:34:17 +03:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-08-28 18:34:17 +03:00
|
|
|
return m_wallet->get_spend_proof(txid, message);
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-08-28 18:34:17 +03:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::checkSpendProof(const std::string &txid_str, const std::string &message, const std::string &signature, bool &good) const {
|
|
|
|
good = false;
|
|
|
|
crypto::hash txid;
|
|
|
|
if(!epee::string_tools::hex_to_pod(txid_str, txid))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse txid"));
|
2017-08-28 18:34:17 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-08-28 18:34:17 +03:00
|
|
|
good = m_wallet->check_spend_proof(txid, message, signature);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-08-28 18:34:17 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-28 15:50:10 +02:00
|
|
|
std::string WalletImpl::getReserveProof(bool all, uint32_t account_index, uint64_t amount, const std::string &message) const {
|
|
|
|
try
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-12-28 15:50:10 +02:00
|
|
|
boost::optional<std::pair<uint32_t, uint64_t>> account_minreserve;
|
|
|
|
if (!all)
|
|
|
|
{
|
|
|
|
account_minreserve = std::make_pair(account_index, amount);
|
|
|
|
}
|
|
|
|
return m_wallet->get_reserve_proof(account_minreserve, message);
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-12-28 15:50:10 +02:00
|
|
|
return "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::checkReserveProof(const std::string &address, const std::string &message, const std::string &signature, bool &good, uint64_t &total, uint64_t &spent) const {
|
|
|
|
cryptonote::address_parse_info info;
|
2018-02-16 13:04:04 +02:00
|
|
|
if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address))
|
2017-12-28 15:50:10 +02:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse address"));
|
2017-12-28 15:50:10 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (info.is_subaddress)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Address must not be a subaddress"));
|
2017-12-28 15:50:10 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
good = false;
|
|
|
|
try
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2017-12-28 15:50:10 +02:00
|
|
|
good = m_wallet->check_reserve_proof(info.address, message, signature, total, spent);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-12-28 15:50:10 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-08 11:58:46 +02:00
|
|
|
std::string WalletImpl::signMessage(const std::string &message)
|
|
|
|
{
|
|
|
|
return m_wallet->sign(message);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::verifySignedMessage(const std::string &message, const std::string &address, const std::string &signature) const
|
|
|
|
{
|
2017-02-19 04:42:10 +02:00
|
|
|
cryptonote::address_parse_info info;
|
2016-11-08 11:58:46 +02:00
|
|
|
|
2018-02-16 13:04:04 +02:00
|
|
|
if (!cryptonote::get_account_address_from_str(info, m_wallet->nettype(), address))
|
2016-11-08 11:58:46 +02:00
|
|
|
return false;
|
|
|
|
|
2017-02-19 04:42:10 +02:00
|
|
|
return m_wallet->verify(message, info.address, signature);
|
2016-11-08 11:58:46 +02:00
|
|
|
}
|
|
|
|
|
2018-04-10 18:38:54 +03:00
|
|
|
std::string WalletImpl::signMultisigParticipant(const std::string &message) const
|
|
|
|
{
|
|
|
|
clearStatus();
|
|
|
|
|
|
|
|
bool ready = false;
|
|
|
|
if (!m_wallet->multisig(&ready) || !ready) {
|
|
|
|
m_status = Status_Error;
|
|
|
|
m_errorString = tr("The wallet must be in multisig ready state");
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
return m_wallet->sign_multisig_participant(message);
|
|
|
|
} catch (const std::exception& e) {
|
|
|
|
m_status = Status_Error;
|
|
|
|
m_errorString = e.what();
|
|
|
|
}
|
|
|
|
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::verifyMessageWithPublicKey(const std::string &message, const std::string &publicKey, const std::string &signature) const
|
|
|
|
{
|
|
|
|
clearStatus();
|
|
|
|
|
|
|
|
cryptonote::blobdata pkeyData;
|
|
|
|
if(!epee::string_tools::parse_hexstr_to_binbuff(publicKey, pkeyData) || pkeyData.size() != sizeof(crypto::public_key))
|
|
|
|
{
|
|
|
|
m_status = Status_Error;
|
|
|
|
m_errorString = tr("Given string is not a key");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
crypto::public_key pkey = *reinterpret_cast<const crypto::public_key*>(pkeyData.data());
|
|
|
|
return m_wallet->verify_with_public_key(message, pkey, signature);
|
|
|
|
} catch (const std::exception& e) {
|
|
|
|
m_status = Status_Error;
|
|
|
|
m_errorString = e.what();
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
bool WalletImpl::connectToDaemon()
|
|
|
|
{
|
2017-01-14 15:41:56 +02:00
|
|
|
bool result = m_wallet->check_connection(NULL, DEFAULT_CONNECTION_TIMEOUT_MILLIS);
|
2016-04-05 15:24:44 +03:00
|
|
|
if (!result) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError("Error connecting to daemon at " + m_wallet->get_daemon_address());
|
2016-07-10 17:17:23 +03:00
|
|
|
} else {
|
2018-03-21 19:34:15 +02:00
|
|
|
clearStatus();
|
2016-07-10 17:17:23 +03:00
|
|
|
// start refreshing here
|
2016-04-03 14:34:38 +03:00
|
|
|
}
|
2016-04-05 15:24:44 +03:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-11-07 14:00:29 +02:00
|
|
|
Wallet::ConnectionStatus WalletImpl::connected() const
|
|
|
|
{
|
2016-11-26 14:53:33 +02:00
|
|
|
uint32_t version = 0;
|
2017-01-14 15:41:56 +02:00
|
|
|
m_is_connected = m_wallet->check_connection(&version, DEFAULT_CONNECTION_TIMEOUT_MILLIS);
|
2016-12-14 13:18:52 +02:00
|
|
|
if (!m_is_connected)
|
2016-11-07 14:00:29 +02:00
|
|
|
return Wallet::ConnectionStatus_Disconnected;
|
2017-08-05 01:08:32 +03:00
|
|
|
// Version check is not implemented in light wallets nodes/wallets
|
|
|
|
if (!m_wallet->light_wallet() && (version >> 16) != CORE_RPC_VERSION_MAJOR)
|
2016-11-07 14:00:29 +02:00
|
|
|
return Wallet::ConnectionStatus_WrongVersion;
|
|
|
|
return Wallet::ConnectionStatus_Connected;
|
2016-07-14 12:47:01 +03:00
|
|
|
}
|
|
|
|
|
2016-04-26 13:46:20 +03:00
|
|
|
void WalletImpl::setTrustedDaemon(bool arg)
|
|
|
|
{
|
2018-08-10 15:15:40 +03:00
|
|
|
m_wallet->set_trusted_daemon(arg);
|
2016-04-26 13:46:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::trustedDaemon() const
|
|
|
|
{
|
2018-08-10 15:15:40 +03:00
|
|
|
return m_wallet->is_trusted_daemon();
|
2016-04-26 13:46:20 +03:00
|
|
|
}
|
|
|
|
|
2017-01-10 23:34:15 +02:00
|
|
|
bool WalletImpl::watchOnly() const
|
|
|
|
{
|
|
|
|
return m_wallet->watch_only();
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::clearStatus() const
|
2016-04-05 15:24:44 +03:00
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
boost::lock_guard<boost::mutex> l(m_statusMutex);
|
2016-04-05 15:24:44 +03:00
|
|
|
m_status = Status_Ok;
|
|
|
|
m_errorString.clear();
|
|
|
|
}
|
|
|
|
|
2018-03-21 19:34:15 +02:00
|
|
|
void WalletImpl::setStatusError(const std::string& message) const
|
|
|
|
{
|
|
|
|
setStatus(Status_Error, message);
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::setStatusCritical(const std::string& message) const
|
|
|
|
{
|
|
|
|
setStatus(Status_Critical, message);
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::setStatus(int status, const std::string& message) const
|
|
|
|
{
|
|
|
|
boost::lock_guard<boost::mutex> l(m_statusMutex);
|
|
|
|
m_status = status;
|
|
|
|
m_errorString = message;
|
|
|
|
}
|
|
|
|
|
2016-07-10 17:17:23 +03:00
|
|
|
void WalletImpl::refreshThreadFunc()
|
|
|
|
{
|
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": starting refresh thread");
|
|
|
|
|
|
|
|
while (true) {
|
2016-09-18 18:21:44 +03:00
|
|
|
boost::mutex::scoped_lock lock(m_refreshMutex);
|
2016-07-10 17:17:23 +03:00
|
|
|
if (m_refreshThreadDone) {
|
|
|
|
break;
|
|
|
|
}
|
2016-07-14 12:47:01 +03:00
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": waiting for refresh...");
|
2016-09-20 20:40:58 +03:00
|
|
|
// if auto refresh enabled, we wait for the "m_refreshIntervalSeconds" interval.
|
|
|
|
// if not - we wait forever
|
2016-09-26 22:50:10 +03:00
|
|
|
if (m_refreshIntervalMillis > 0) {
|
2018-04-30 20:01:58 +03:00
|
|
|
boost::posix_time::milliseconds wait_for_ms(m_refreshIntervalMillis.load());
|
2016-09-20 20:40:58 +03:00
|
|
|
m_refreshCV.timed_wait(lock, wait_for_ms);
|
|
|
|
} else {
|
|
|
|
m_refreshCV.wait(lock);
|
|
|
|
}
|
|
|
|
|
2016-07-14 12:47:01 +03:00
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": refresh lock acquired...");
|
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": m_refreshEnabled: " << m_refreshEnabled);
|
2018-03-21 19:34:15 +02:00
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": m_status: " << status());
|
2016-12-14 13:18:52 +02:00
|
|
|
if (m_refreshEnabled) {
|
2016-07-14 12:47:01 +03:00
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": refreshing...");
|
2016-07-10 17:17:23 +03:00
|
|
|
doRefresh();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": refresh thread stopped");
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::doRefresh()
|
|
|
|
{
|
|
|
|
// synchronizing async and sync refresh calls
|
2016-09-18 18:21:44 +03:00
|
|
|
boost::lock_guard<boost::mutex> guarg(m_refreshMutex2);
|
2016-07-10 17:17:23 +03:00
|
|
|
try {
|
2016-12-14 13:18:52 +02:00
|
|
|
// Syncing daemon and refreshing wallet simultaneously is very resource intensive.
|
|
|
|
// Disable refresh if wallet is disconnected or daemon isn't synced.
|
2017-08-05 01:08:32 +03:00
|
|
|
if (m_wallet->light_wallet() || daemonSynced()) {
|
2018-06-28 04:20:01 +03:00
|
|
|
m_wallet->refresh(trustedDaemon());
|
2016-12-14 13:18:52 +02:00
|
|
|
if (!m_synchronized) {
|
|
|
|
m_synchronized = true;
|
|
|
|
}
|
|
|
|
// assuming if we have empty history, it wasn't initialized yet
|
2018-01-19 09:54:14 +02:00
|
|
|
// for further history changes client need to update history in
|
2016-12-14 13:18:52 +02:00
|
|
|
// "on_money_received" and "on_money_sent" callbacks
|
|
|
|
if (m_history->count() == 0) {
|
|
|
|
m_history->refresh();
|
|
|
|
}
|
2018-03-04 15:32:35 +02:00
|
|
|
m_wallet->find_and_save_rings(false);
|
2017-01-10 23:34:15 +02:00
|
|
|
} else {
|
|
|
|
LOG_PRINT_L3(__FUNCTION__ << ": skipping refresh - daemon is not synced");
|
|
|
|
}
|
2016-07-10 17:17:23 +03:00
|
|
|
} catch (const std::exception &e) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2016-07-10 17:17:23 +03:00
|
|
|
}
|
2016-07-14 13:33:49 +03:00
|
|
|
if (m_wallet2Callback->getListener()) {
|
|
|
|
m_wallet2Callback->getListener()->refreshed();
|
|
|
|
}
|
2016-07-10 17:17:23 +03:00
|
|
|
}
|
|
|
|
|
2016-07-14 13:33:49 +03:00
|
|
|
|
2016-07-10 17:17:23 +03:00
|
|
|
void WalletImpl::startRefresh()
|
|
|
|
{
|
|
|
|
if (!m_refreshEnabled) {
|
2017-01-30 19:00:10 +02:00
|
|
|
LOG_PRINT_L2(__FUNCTION__ << ": refresh started/resumed...");
|
2016-07-10 17:17:23 +03:00
|
|
|
m_refreshEnabled = true;
|
|
|
|
m_refreshCV.notify_one();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-07-14 13:33:49 +03:00
|
|
|
|
2016-07-10 17:17:23 +03:00
|
|
|
void WalletImpl::stopRefresh()
|
|
|
|
{
|
|
|
|
if (!m_refreshThreadDone) {
|
|
|
|
m_refreshEnabled = false;
|
|
|
|
m_refreshThreadDone = true;
|
2016-09-20 20:08:33 +03:00
|
|
|
m_refreshCV.notify_one();
|
2016-07-10 17:17:23 +03:00
|
|
|
m_refreshThread.join();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-14 13:33:49 +03:00
|
|
|
void WalletImpl::pauseRefresh()
|
|
|
|
{
|
2016-11-08 14:20:42 +02:00
|
|
|
LOG_PRINT_L2(__FUNCTION__ << ": refresh paused...");
|
2016-07-14 13:33:49 +03:00
|
|
|
// TODO synchronize access
|
|
|
|
if (!m_refreshThreadDone) {
|
|
|
|
m_refreshEnabled = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-05 15:24:44 +03:00
|
|
|
|
2016-09-30 02:11:28 +03:00
|
|
|
bool WalletImpl::isNewWallet() const
|
|
|
|
{
|
2016-09-30 22:42:15 +03:00
|
|
|
// in case wallet created without daemon connection, closed and opened again,
|
|
|
|
// it's the same case as if it created from scratch, i.e. we need "fast sync"
|
2016-11-09 19:46:03 +02:00
|
|
|
// with the daemon (pull hashes instead of pull blocks).
|
2017-01-10 23:34:15 +02:00
|
|
|
// If wallet cache is rebuilt, creation height stored in .keys is used.
|
|
|
|
// Watch only wallet is a copy of an existing wallet.
|
2018-06-04 10:58:13 +03:00
|
|
|
return !(blockChainHeight() > 1 || m_recoveringFromSeed || m_recoveringFromDevice || m_rebuildWalletCache) && !watchOnly();
|
2016-09-30 02:11:28 +03:00
|
|
|
}
|
|
|
|
|
2017-08-05 00:28:38 +03:00
|
|
|
bool WalletImpl::doInit(const string &daemon_address, uint64_t upper_transaction_size_limit, bool ssl)
|
2016-09-30 02:11:28 +03:00
|
|
|
{
|
2018-07-08 23:12:33 +03:00
|
|
|
// claim RPC so there's no in-memory encryption for now
|
|
|
|
if (!m_wallet->init(true, daemon_address, m_daemon_login, upper_transaction_size_limit, ssl))
|
2017-01-25 07:16:05 +02:00
|
|
|
return false;
|
2016-09-30 02:11:28 +03:00
|
|
|
|
|
|
|
// in case new wallet, this will force fast-refresh (pulling hashes instead of blocks)
|
2016-12-27 20:38:05 +02:00
|
|
|
// If daemon isn't synced a calculated block height will be used instead
|
2017-08-05 00:28:38 +03:00
|
|
|
//TODO: Handle light wallet scenario where block height = 0.
|
2016-12-27 20:38:05 +02:00
|
|
|
if (isNewWallet() && daemonSynced()) {
|
2017-01-10 23:34:15 +02:00
|
|
|
LOG_PRINT_L2(__FUNCTION__ << ":New Wallet - fast refresh until " << daemonBlockChainHeight());
|
2016-09-30 02:11:28 +03:00
|
|
|
m_wallet->set_refresh_from_block_height(daemonBlockChainHeight());
|
|
|
|
}
|
|
|
|
|
2017-01-10 23:34:15 +02:00
|
|
|
if (m_rebuildWalletCache)
|
|
|
|
LOG_PRINT_L2(__FUNCTION__ << ": Rebuilding wallet cache, fast refresh until block " << m_wallet->get_refresh_from_block_height());
|
|
|
|
|
2016-09-30 02:11:28 +03:00
|
|
|
if (Utils::isAddressLocal(daemon_address)) {
|
|
|
|
this->setTrustedDaemon(true);
|
2017-01-08 14:47:13 +02:00
|
|
|
m_refreshIntervalMillis = DEFAULT_REFRESH_INTERVAL_MILLIS;
|
|
|
|
} else {
|
|
|
|
this->setTrustedDaemon(false);
|
|
|
|
m_refreshIntervalMillis = DEFAULT_REMOTE_NODE_REFRESH_INTERVAL_MILLIS;
|
2016-09-30 02:11:28 +03:00
|
|
|
}
|
2017-01-25 07:16:05 +02:00
|
|
|
return true;
|
2016-09-30 02:11:28 +03:00
|
|
|
}
|
|
|
|
|
2017-01-09 00:53:24 +02:00
|
|
|
bool WalletImpl::parse_uri(const std::string &uri, std::string &address, std::string &payment_id, uint64_t &amount, std::string &tx_description, std::string &recipient_name, std::vector<std::string> &unknown_parameters, std::string &error)
|
|
|
|
{
|
|
|
|
return m_wallet->parse_uri(uri, address, payment_id, amount, tx_description, recipient_name, unknown_parameters, error);
|
|
|
|
}
|
|
|
|
|
2017-08-09 13:38:29 +03:00
|
|
|
std::string WalletImpl::getDefaultDataDir() const
|
|
|
|
{
|
|
|
|
return tools::get_default_data_dir();
|
|
|
|
}
|
|
|
|
|
2017-01-12 23:10:38 +02:00
|
|
|
bool WalletImpl::rescanSpent()
|
|
|
|
{
|
|
|
|
clearStatus();
|
|
|
|
if (!trustedDaemon()) {
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Rescan spent can only be used with a trusted daemon"));
|
2017-01-12 23:10:38 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
m_wallet->rescan_spent();
|
|
|
|
} catch (const std::exception &e) {
|
|
|
|
LOG_ERROR(__FUNCTION__ << " error: " << e.what());
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(e.what());
|
2017-01-12 23:10:38 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2017-03-24 10:59:26 +02:00
|
|
|
|
|
|
|
|
|
|
|
void WalletImpl::hardForkInfo(uint8_t &version, uint64_t &earliest_height) const
|
|
|
|
{
|
|
|
|
m_wallet->get_hard_fork_info(version, earliest_height);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::useForkRules(uint8_t version, int64_t early_blocks) const
|
|
|
|
{
|
|
|
|
return m_wallet->use_fork_rules(version,early_blocks);
|
|
|
|
}
|
|
|
|
|
2018-03-04 15:32:35 +02:00
|
|
|
bool WalletImpl::blackballOutputs(const std::vector<std::string> &pubkeys, bool add)
|
|
|
|
{
|
|
|
|
std::vector<crypto::public_key> raw_pubkeys;
|
|
|
|
raw_pubkeys.reserve(pubkeys.size());
|
|
|
|
for (const std::string &str: pubkeys)
|
|
|
|
{
|
|
|
|
crypto::public_key pkey;
|
|
|
|
if (!epee::string_tools::hex_to_pod(str, pkey))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse output public key"));
|
2018-03-04 15:32:35 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
raw_pubkeys.push_back(pkey);
|
|
|
|
}
|
|
|
|
bool ret = m_wallet->set_blackballed_outputs(raw_pubkeys, add);
|
|
|
|
if (!ret)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to set blackballed outputs"));
|
2018-03-04 15:32:35 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::unblackballOutput(const std::string &pubkey)
|
|
|
|
{
|
|
|
|
crypto::public_key raw_pubkey;
|
|
|
|
if (!epee::string_tools::hex_to_pod(pubkey, raw_pubkey))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse output public key"));
|
2018-03-04 15:32:35 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
bool ret = m_wallet->unblackball_output(raw_pubkey);
|
|
|
|
if (!ret)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to unblackball output"));
|
2018-03-04 15:32:35 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-03-05 17:04:59 +02:00
|
|
|
bool WalletImpl::getRing(const std::string &key_image, std::vector<uint64_t> &ring) const
|
|
|
|
{
|
|
|
|
crypto::key_image raw_key_image;
|
|
|
|
if (!epee::string_tools::hex_to_pod(key_image, raw_key_image))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse key image"));
|
2018-03-05 17:04:59 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
bool ret = m_wallet->get_ring(raw_key_image, ring);
|
|
|
|
if (!ret)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to get ring"));
|
2018-03-05 17:04:59 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-03-14 21:13:55 +02:00
|
|
|
bool WalletImpl::getRings(const std::string &txid, std::vector<std::pair<std::string, std::vector<uint64_t>>> &rings) const
|
|
|
|
{
|
|
|
|
crypto::hash raw_txid;
|
|
|
|
if (!epee::string_tools::hex_to_pod(txid, raw_txid))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse txid"));
|
2018-03-14 21:13:55 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
std::vector<std::pair<crypto::key_image, std::vector<uint64_t>>> raw_rings;
|
|
|
|
bool ret = m_wallet->get_rings(raw_txid, raw_rings);
|
|
|
|
if (!ret)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to get rings"));
|
2018-03-14 21:13:55 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
for (const auto &r: raw_rings)
|
|
|
|
{
|
|
|
|
rings.push_back(std::make_pair(epee::string_tools::pod_to_hex(r.first), r.second));
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-03-05 17:04:59 +02:00
|
|
|
bool WalletImpl::setRing(const std::string &key_image, const std::vector<uint64_t> &ring, bool relative)
|
|
|
|
{
|
|
|
|
crypto::key_image raw_key_image;
|
|
|
|
if (!epee::string_tools::hex_to_pod(key_image, raw_key_image))
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to parse key image"));
|
2018-03-05 17:04:59 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
bool ret = m_wallet->set_ring(raw_key_image, ring, relative);
|
|
|
|
if (!ret)
|
|
|
|
{
|
2018-03-21 19:34:15 +02:00
|
|
|
setStatusError(tr("Failed to set ring"));
|
2018-03-05 17:04:59 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-03-12 14:33:05 +02:00
|
|
|
void WalletImpl::segregatePreForkOutputs(bool segregate)
|
|
|
|
{
|
|
|
|
m_wallet->segregate_pre_fork_outputs(segregate);
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::segregationHeight(uint64_t height)
|
|
|
|
{
|
|
|
|
m_wallet->segregation_height(height);
|
|
|
|
}
|
|
|
|
|
|
|
|
void WalletImpl::keyReuseMitigation2(bool mitigation)
|
|
|
|
{
|
|
|
|
m_wallet->key_reuse_mitigation2(mitigation);
|
|
|
|
}
|
|
|
|
|
2018-07-03 05:33:11 +03:00
|
|
|
bool WalletImpl::lockKeysFile()
|
|
|
|
{
|
|
|
|
return m_wallet->lock_keys_file();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::unlockKeysFile()
|
|
|
|
{
|
|
|
|
return m_wallet->unlock_keys_file();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WalletImpl::isKeysFileLocked()
|
|
|
|
{
|
|
|
|
return m_wallet->is_keys_file_locked();
|
|
|
|
}
|
2016-04-20 13:01:00 +03:00
|
|
|
} // namespace
|
2016-12-13 17:21:38 +02:00
|
|
|
|
|
|
|
namespace Bitmonero = Monero;
|