-
Dmitry Gerasimov authored4046bc46
dap_chain_node_cli_cmd.c 230.30 KiB
/*
* Authors:
* Dmitriy A. Gerasimov <gerasimov.dmitriy@demlabs.net>
* Alexander Lysikov <alexander.lysikov@demlabs.net>
* DeM Labs Inc. https://demlabs.net
* Cellframe Network https://github.com/demlabs-cellframe
* Copyright (c) 2019
* All rights reserved.
This file is part of DAP (Deus Applications Prototypes) the open source project
DAP (Deus Applicaions Prototypes) is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
DAP is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with any DAP based project. If not, see <http://www.gnu.org/licenses/>.
*/
#include <stdlib.h>
#include <stdio.h>
#include <time.h>
#include <stdlib.h>
#include <stddef.h>
#include <stdint.h>
#include <string.h>
#include <stdbool.h>
#include <errno.h>
#include <assert.h>
#include <ctype.h>
#include <dirent.h>
#include <magic.h>
#include <sys/stat.h>
#ifdef WIN32
#include <winsock2.h>
#include <windows.h>
#include <mswsock.h>
#include <ws2tcpip.h>
#include <io.h>
#include "wepoll.h"
#else
#include <sys/types.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <signal.h>
#endif
#include <pthread.h>
#include "iputils/iputils.h"
#include "uthash.h"
#include "utlist.h"
#include "dap_string.h"
#include "dap_hash.h"
#include "dap_chain_common.h"
#include "dap_strfuncs.h"
#include "dap_list.h"
#include "dap_string.h"
#include "dap_cert.h"
#include "dap_cert_file.h"
#include "dap_file_utils.h"
#include "dap_enc_base58.h"
#include "dap_chain_wallet.h"
#include "dap_chain_node.h"
#include "dap_chain_global_db.h"
#include "dap_chain_node_client.h"
#include "dap_chain_node_remote.h"
#include "dap_chain_node_cli_cmd.h"
#include "dap_chain_node_cli_cmd_tx.h"
#include "dap_chain_node_ping.h"
#include "dap_chain_net_srv.h"
#ifndef _WIN32
#include "dap_chain_net_news.h"
#endif
#include "dap_chain_cell.h"
#include "dap_enc_base64.h"
#include <json-c/json.h>
#ifdef DAP_OS_UNIX
#include <dirent.h>
#endif
#include "dap_chain_common.h"
#include "dap_chain_datum.h"
#include "dap_chain_datum_token.h"
#include "dap_chain_datum_tx_items.h"
#include "dap_chain_ledger.h"
#include "dap_chain_mempool.h"
#include "dap_chain_global_db.h"
#include "dap_chain_global_db_remote.h"
#include "dap_stream_ch_chain_net.h"
#include "dap_stream_ch_chain.h"
#include "dap_stream_ch_chain_pkt.h"
#include "dap_stream_ch_chain_net_pkt.h"
#include "dap_enc_base64.h"
#define LOG_TAG "chain_node_cli_cmd"
/**
* @brief dap_chain_node_addr_t* dap_chain_node_addr_get_by_alias
* Find in base addr by alias
*
* return addr, NULL if not found
* @param a_net
* @param a_alias
* @return dap_chain_node_addr_t*
*/
dap_chain_node_addr_t* dap_chain_node_addr_get_by_alias(dap_chain_net_t * a_net, const char *a_alias)
{
dap_chain_node_addr_t *l_addr = NULL;
if(!a_alias)
return NULL;
const char *a_key = a_alias;
size_t l_addr_size = 0;
l_addr = (dap_chain_node_addr_t*) (void*) dap_chain_global_db_gr_get(a_key, &l_addr_size,
a_net->pub.gdb_nodes_aliases);
if(l_addr_size != sizeof(dap_chain_node_addr_t)) {
DAP_DELETE(l_addr);
l_addr = NULL;
}
// DAP_DELETE(addr_str);
return l_addr;
}
/**
* @brief dap_list_t* get_aliases_by_name Get the aliases by name object
* Find in base alias by addr
*
* return list of addr, NULL if not found
* @param l_net
* @param a_addr
* @return dap_list_t*
*/
static dap_list_t* get_aliases_by_name(dap_chain_net_t * l_net, dap_chain_node_addr_t *a_addr)
{
if(!a_addr)
return NULL;
dap_list_t *list_aliases = NULL;
size_t data_size = 0;
// read all aliases
dap_global_db_obj_t *objs = dap_global_db_objs_get(l_net->pub.gdb_nodes_aliases, &data_size);
if(!objs || !data_size)
return NULL;
for(size_t i = 0; i < data_size; i++) {
//dap_chain_node_addr_t addr_i;
dap_global_db_obj_t *obj = objs + i;
if(!obj)
break;
dap_chain_node_addr_t *l_addr = (dap_chain_node_addr_t*) (void*) obj->value;
if(l_addr && obj->value_len == sizeof(dap_chain_node_addr_t) && a_addr->uint64 == l_addr->uint64) {
list_aliases = dap_list_prepend(list_aliases, strdup(obj->key));
}
}
dap_global_db_objs_delete(objs, data_size);
return list_aliases;
}
/**
* @brief dap_chain_node_addr_t* s_node_info_get_addr
*
* @param a_net
* @param a_node_info
* @param a_addr
* @param a_alias_str
* @return dap_chain_node_addr_t*
*/
static dap_chain_node_addr_t* s_node_info_get_addr(dap_chain_net_t * a_net, dap_chain_node_addr_t *a_addr, const char *a_alias_str)
{
dap_chain_node_addr_t *l_address = NULL;
if(a_alias_str && !a_addr->uint64) {
l_address = dap_chain_node_addr_get_by_alias(a_net, a_alias_str);
}
if(a_addr->uint64) {
l_address = DAP_NEW(dap_chain_node_addr_t);
l_address->uint64 = a_addr->uint64;
}
return l_address;
}
/**
* @brief node_info_read_and_reply
* Read node from base
* @param a_net
* @param a_address
* @param a_str_reply
* @return dap_chain_node_info_t*
*/
static dap_chain_node_info_t* node_info_read_and_reply(dap_chain_net_t * a_net, dap_chain_node_addr_t *a_address,
char **a_str_reply)
{
char *l_key = dap_chain_node_addr_to_hash_str(a_address);
if(!l_key)
{
dap_chain_node_cli_set_reply_text(a_str_reply, "can't calculate hash of addr");
return NULL;
}
size_t node_info_size = 0;
dap_chain_node_info_t *node_info;
// read node
node_info = (dap_chain_node_info_t *) dap_chain_global_db_gr_get(l_key, &node_info_size, a_net->pub.gdb_nodes);
if(!node_info) {
dap_chain_node_cli_set_reply_text(a_str_reply, "node not found in base");
DAP_DELETE(l_key);
return NULL;
}
/* if(!node_info->hdr.ext_port)
node_info->hdr.ext_port = 8079; */
size_t node_info_size_must_be = dap_chain_node_info_get_size(node_info);
if(node_info_size_must_be != node_info_size) {
dap_chain_node_cli_set_reply_text(a_str_reply, "node has bad size in base=%u (must be %u)", node_info_size,
node_info_size_must_be);
DAP_DELETE(node_info);
DAP_DELETE(l_key);
return NULL;
}
DAP_DELETE(l_key);
return node_info;
}
/**
* @brief node_info_save_and_reply
* Save node to base
* @param a_net
* @param a_node_info
* @param str_reply
* @return true
* @return false
*/
static bool node_info_save_and_reply(dap_chain_net_t * a_net, dap_chain_node_info_t *a_node_info, char **str_reply)
{
if(!a_node_info || !a_node_info->hdr.address.uint64) {
dap_chain_node_cli_set_reply_text(str_reply, "node addr not found");
return false;
}
char *a_key = dap_chain_node_addr_to_hash_str(&a_node_info->hdr.address);
if(!a_key)
{
dap_chain_node_cli_set_reply_text(str_reply, "can't calculate hash for addr");
return NULL;
}
//char *a_value = dap_chain_node_info_serialize(node_info, NULL);
size_t l_node_info_size = dap_chain_node_info_get_size(a_node_info);
//dap_chain_node_info_t *l_node_info = DAP_NEW_Z_SIZE(dap_chain_node_info_t, l_node_info_size);
//memcpy(l_node_info, a_node_info, l_node_info_size );
//size_t data_len_out = 0;
//dap_chain_node_info_t *a_node_info1 = dap_chain_global_db_gr_get(a_key, &data_len_out, a_net->pub.gdb_nodes);
bool res = dap_chain_global_db_gr_set(a_key, (uint8_t *) a_node_info, l_node_info_size, a_net->pub.gdb_nodes);
//data_len_out = 0;
//dap_chain_node_info_t *a_node_info2 = dap_chain_global_db_gr_get(a_key, &data_len_out, a_net->pub.gdb_nodes);
//DAP_DELETE(a_key);
//DAP_DELETE(a_value);
return res;
}
/**
* @brief node_info_add_with_reply
* Handler of command 'global_db node add'
*
* str_reply[out] for reply
* return 0 Ok, -1 error
* @param a_net
* @param a_node_info
* @param a_alias_str
* @param a_cell_str
* @param a_ipv4_str
* @param a_ipv6_str
* @param a_str_reply
* @return int
*/
static int node_info_add_with_reply(dap_chain_net_t * a_net, dap_chain_node_info_t *a_node_info,
const char *a_alias_str,
const char *a_cell_str, const char *a_ipv4_str, const char *a_ipv6_str, char **a_str_reply)
{
if(!a_node_info->hdr.address.uint64) {
dap_chain_node_cli_set_reply_text(a_str_reply, "not found -addr parameter");
return -1;
}
if(!a_cell_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "not found -cell parameter");
return -1;
}
if(a_ipv4_str)
inet_pton(AF_INET, a_ipv4_str, &(a_node_info->hdr.ext_addr_v4));
if(a_ipv6_str)
inet_pton(AF_INET6, a_ipv6_str, &(a_node_info->hdr.ext_addr_v6));
// check match addr to cell or no
/*dap_chain_node_addr_t *addr = dap_chain_node_gen_addr(&node_info->hdr.cell_id);
if(!dap_chain_node_check_addr(&node_info->hdr.address, &node_info->hdr.cell_id)) {
set_reply_text(str_reply, "cell does not match addr");
return -1;
}*/
if(a_alias_str) {
// add alias
if(!dap_chain_node_alias_register(a_net, a_alias_str, &a_node_info->hdr.address)) {
log_it(L_WARNING, "can't save alias %s", a_alias_str);
dap_chain_node_cli_set_reply_text(a_str_reply, "alias '%s' can't be mapped to addr=0x%lld",
a_alias_str, a_node_info->hdr.address.uint64);
return -1;
}
}
// write to base
bool res = node_info_save_and_reply(a_net, a_node_info, a_str_reply);
if(res)
dap_chain_node_cli_set_reply_text(a_str_reply, "node added");
else
return -1;
if(res)
return 0;
return -1;
}
/**
* @brief node_info_del_with_reply
* Handler of command 'global_db node add'
* @param a_net
* @param a_node_info
* @param alias_str
* @param str_reply str_reply[out] for reply
* @return int
* return 0 Ok, -1 error
*/
static int node_info_del_with_reply(dap_chain_net_t * a_net, dap_chain_node_info_t *a_node_info, const char *alias_str,
char **str_reply)
{
if(!a_node_info->hdr.address.uint64 && !alias_str) {
dap_chain_node_cli_set_reply_text(str_reply, "addr not found");
return -1;
}
// check, current node have this addr or no
uint64_t l_cur_addr = dap_db_get_cur_node_addr(a_net->pub.name);
if(l_cur_addr && l_cur_addr == a_node_info->hdr.address.uint64) {
dap_chain_node_cli_set_reply_text(str_reply, "current node cannot be deleted");
return -1;
}
// find addr by alias or addr_str
dap_chain_node_addr_t *address = s_node_info_get_addr(a_net, &a_node_info->hdr.address, alias_str);
if(!address) {
dap_chain_node_cli_set_reply_text(str_reply, "alias not found");
return -1;
}
char *a_key = dap_chain_node_addr_to_hash_str(address);
if(a_key){
// delete node
int l_res = dap_global_db_del_sync(a_net->pub.gdb_nodes, a_key);
if(l_res == 0) {
// delete all aliases for node address
{
dap_list_t *list_aliases = get_aliases_by_name(a_net, address);
dap_list_t *list = list_aliases;
while(list)
{
const char *alias = (const char *) list->data;
dap_chain_node_alias_delete(a_net, alias);
list = dap_list_next(list);
}
dap_list_free_full(list_aliases, NULL);
}
// set text response
dap_chain_node_cli_set_reply_text(str_reply, "node deleted");
}
else
dap_chain_node_cli_set_reply_text(str_reply, "node not deleted");
DAP_DELETE(a_key);
DAP_DELETE(address);
return l_res;
}
dap_chain_node_cli_set_reply_text(str_reply, "addr to delete can't be defined");
DAP_DELETE(address);
return -1;
}
/**
* @brief link_add_or_del_with_reply
* Handler of command 'global_db node link'
* cmd 'add' or 'del'
* str_reply[out] for reply
* return 0 Ok, -1 error
* @param a_net
* @param a_node_info
* @param cmd
* @param a_alias_str
* @param link
* @param a_str_reply
* @return int
*/
static int link_add_or_del_with_reply(dap_chain_net_t * a_net, dap_chain_node_info_t *a_node_info, const char *cmd,
const char *a_alias_str,
dap_chain_node_addr_t *link, char **a_str_reply)
{
if(!a_node_info->hdr.address.uint64 && !a_alias_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "addr not found");
return -1;
}
if(!link->uint64) {
dap_chain_node_cli_set_reply_text(a_str_reply, "link not found");
return -1;
}
// TODO check the presence of link in the node base
#ifdef DAP_CHAIN_NODE_CHECK_PRESENSE
dap_chain_node_cli_set_reply_text(a_str_reply, "node 0x%016llx not found in base", link->uint64);
return -1;
#endif
// find addr by alias or addr_str
dap_chain_node_addr_t *l_address = s_node_info_get_addr(a_net, &a_node_info->hdr.address, a_alias_str);
if(!l_address) {
dap_chain_node_cli_set_reply_text(a_str_reply, "alias not found");
return -1;
}
dap_chain_node_info_t * l_node_info_read = node_info_read_and_reply(a_net, l_address, a_str_reply);
size_t l_node_info_read_size = dap_chain_node_info_get_size(l_node_info_read);
if(!l_node_info_read)
return -1;
int cmd_int = 0;
if(!strcmp(cmd, "add"))
cmd_int = 1;
else if(!strcmp(cmd, "del"))
cmd_int = 2;
// find link in node_info_read
int index_link = -1;
for(size_t i = 0; i < l_node_info_read->hdr.links_number; i++) {
if(l_node_info_read->links[i].uint64 == link->uint64) {
// link already present
index_link = (int) i;
break;
}
}
bool res_successful = false; // is successful whether add/del
// add link
if(cmd_int == 1) {
if(index_link == -1) {
l_node_info_read->hdr.links_number++;
l_node_info_read_size = dap_chain_node_info_get_size(l_node_info_read);
l_node_info_read = DAP_REALLOC(l_node_info_read, l_node_info_read_size);
memcpy(&(l_node_info_read->links[l_node_info_read->hdr.links_number-1]), link, sizeof(dap_chain_node_addr_t));
res_successful = true;
}
}
// delete link
else if(cmd_int == 2) {
// move link list to one item prev
if(index_link >= 0) {
for(unsigned int j = (unsigned int) index_link; j < (l_node_info_read->hdr.links_number - 1); j++) {
memcpy(&(l_node_info_read->links[j]), &(l_node_info_read->links[j + 1]), sizeof(dap_chain_node_addr_t));
}
l_node_info_read->hdr.links_number--;
res_successful = true;
l_node_info_read = DAP_REALLOC(l_node_info_read, l_node_info_read_size -= sizeof(*link));
}
}
// save edited node_info
if(res_successful) {
bool res = node_info_save_and_reply(a_net, l_node_info_read, a_str_reply);
if(res) {
res_successful = true;
if(cmd_int == 1)
dap_chain_node_cli_set_reply_text(a_str_reply, "link added");
if(cmd_int == 2)
dap_chain_node_cli_set_reply_text(a_str_reply, "link deleted");
}
else {
res_successful = false;
}
}
else {
if(cmd_int == 1) {
if(index_link >= 0)
dap_chain_node_cli_set_reply_text(a_str_reply, "link not added because it is already present");
else
dap_chain_node_cli_set_reply_text(a_str_reply, "link not added");
}
if(cmd_int == 2) {
if(index_link == -1)
dap_chain_node_cli_set_reply_text(a_str_reply, "link not deleted because not found");
else
dap_chain_node_cli_set_reply_text(a_str_reply, "link not deleted");
}
}
DAP_DELETE(l_address);
DAP_DELETE(l_node_info_read);
if(res_successful)
return 0;
return -1;
}
/**
* @brief node_info_dump_with_reply Handler of command 'node dump'
* @param a_net
* @param a_addr
* @param a_is_full
* @param a_alias
* @param a_str_reply
* @return int 0 Ok, -1 error
*/
static int node_info_dump_with_reply(dap_chain_net_t * a_net, dap_chain_node_addr_t * a_addr, bool a_is_full,
const char *a_alias, char **a_str_reply)
{
int l_ret = 0;
dap_string_t *l_string_reply = dap_string_new("Node dump:");
if((a_addr && a_addr->uint64) || a_alias) {
dap_chain_node_addr_t *l_addr = NULL;
if(a_addr && a_addr->uint64) {
l_addr = DAP_NEW(dap_chain_node_addr_t);
l_addr->uint64 = a_addr->uint64;
} else if(a_alias) {
l_addr = dap_chain_node_alias_find(a_net, a_alias);
}
if(!l_addr) {
dap_chain_node_cli_set_reply_text(a_str_reply, "addr not valid");
dap_string_free(l_string_reply, true);
return -1;
}
// read node
dap_chain_node_info_t *node_info_read = node_info_read_and_reply(a_net, l_addr, a_str_reply);
if(!node_info_read) {
DAP_DELETE(l_addr);
dap_string_free(l_string_reply, true);
return -2;
}
// get aliases in form of string
dap_string_t *aliases_string = dap_string_new(NULL);
dap_list_t *list_aliases = get_aliases_by_name(a_net, l_addr);
if(list_aliases)
{
dap_list_t *list = list_aliases;
while(list)
{
const char *alias = (const char *) list->data;
dap_string_append_printf(aliases_string, "\nalias %s", alias);
list = dap_list_next(list);
}
dap_list_free_full(list_aliases, NULL);
}
else
dap_string_append(aliases_string, "\nno aliases");
const int hostlen = 128;
char *host4 = (char*) alloca(hostlen);
char *host6 = (char*) alloca(hostlen);
struct sockaddr_in sa4 = { .sin_family = AF_INET, .sin_addr = node_info_read->hdr.ext_addr_v4 };
const char* str_ip4 = inet_ntop(AF_INET, &(((struct sockaddr_in *) &sa4)->sin_addr), host4, hostlen);
struct sockaddr_in6 sa6 = { .sin6_family = AF_INET6, .sin6_addr = node_info_read->hdr.ext_addr_v6 };
const char* str_ip6 = inet_ntop(AF_INET6, &(((struct sockaddr_in6 *) &sa6)->sin6_addr), host6, hostlen);
// get links in form of string
dap_string_t *links_string = dap_string_new(NULL);
for(unsigned int i = 0; i < node_info_read->hdr.links_number; i++) {
dap_chain_node_addr_t link_addr = node_info_read->links[i];
dap_string_append_printf(links_string, "\nlink%02d address : " NODE_ADDR_FP_STR, i,
NODE_ADDR_FP_ARGS_S(link_addr));
}
dap_string_append_printf(l_string_reply, "\n");
char l_port_str[10];
dap_sprintf(l_port_str,"%d",node_info_read->hdr.ext_port);
// set short reply with node param
if(!a_is_full)
dap_string_append_printf(l_string_reply,
"node address "NODE_ADDR_FP_STR"\tcell 0x%016"DAP_UINT64_FORMAT_x"\tipv4 %s\tport: %s\tnumber of links %u",
NODE_ADDR_FP_ARGS_S(node_info_read->hdr.address),
node_info_read->hdr.cell_id.uint64, str_ip4,
node_info_read->hdr.ext_port ? l_port_str : "default",
node_info_read->hdr.links_number);
else
// set full reply with node param
dap_string_append_printf(l_string_reply,
"node address " NODE_ADDR_FP_STR "\ncell 0x%016"DAP_UINT64_FORMAT_x"\nipv4 %s\nipv6 %s\nport: %s%s\nlinks %u%s",
NODE_ADDR_FP_ARGS_S(node_info_read->hdr.address),
node_info_read->hdr.cell_id.uint64,
str_ip4, str_ip6,
node_info_read->hdr.ext_port ? l_port_str : "default",
aliases_string->str,
node_info_read->hdr.links_number, links_string->str);
dap_string_free(aliases_string, true);
dap_string_free(links_string, true);
DAP_DELETE(l_addr);
DAP_DELETE(node_info_read);
} else { // Dump list with !a_addr && !a_alias
dap_global_db_obj_t *l_objs = NULL;
size_t l_nodes_count = 0;
dap_string_append(l_string_reply, "\n");
// read all node
l_objs = dap_global_db_objs_get(a_net->pub.gdb_nodes, &l_nodes_count);
if(!l_nodes_count || !l_objs) {
dap_string_append_printf(l_string_reply, "No records\n");
dap_chain_node_cli_set_reply_text(a_str_reply, l_string_reply->str);
dap_string_free(l_string_reply, true);
dap_global_db_objs_delete(l_objs, l_nodes_count);
return -1;
} else {
dap_string_append_printf(l_string_reply, "Got %zu records:\n", l_nodes_count);
size_t l_data_size = 0;
// read all aliases
dap_global_db_obj_t *l_aliases_objs = dap_global_db_objs_get(a_net->pub.gdb_nodes_aliases, &l_data_size);
for(size_t i = 0; i < l_nodes_count; i++) {
dap_chain_node_info_t *l_node_info = (dap_chain_node_info_t *)l_objs[i].value;
// read node
dap_chain_node_info_t *l_node_info_read = node_info_read_and_reply(a_net, &l_node_info->hdr.address, NULL);
if (!l_node_info_read) {
log_it(L_ERROR, "Invalid node info object, remove it");
if (dap_global_db_del_sync(a_net->pub.gdb_nodes, l_objs[i].key) !=0 )
log_it(L_CRITICAL, "Can't remove node info object");
continue;
} else
DAP_DELETE(l_node_info_read);
const int hostlen = 128;
char *host4 = (char*) alloca(hostlen);
char *host6 = (char*) alloca(hostlen);
struct sockaddr_in sa4 = { .sin_family = AF_INET, .sin_addr = l_node_info->hdr.ext_addr_v4 };
const char* str_ip4 = inet_ntop(AF_INET, &(((struct sockaddr_in *) &sa4)->sin_addr), host4, hostlen);
struct sockaddr_in6 sa6 = { .sin6_family = AF_INET6, .sin6_addr = l_node_info->hdr.ext_addr_v6 };
const char* str_ip6 = inet_ntop(AF_INET6, &(((struct sockaddr_in6 *) &sa6)->sin6_addr), host6, hostlen);
// get aliases in form of string
dap_string_t *aliases_string = dap_string_new(NULL);
for (size_t i = 0; i < l_data_size; i++) {
//dap_chain_node_addr_t addr_i;
dap_global_db_obj_t *l_obj = l_aliases_objs + i;
if (!l_obj)
break;
dap_chain_node_addr_t *l_addr = (dap_chain_node_addr_t *)l_obj->value;
if (l_addr && l_obj->value_len == sizeof(dap_chain_node_addr_t) &&
l_node_info->hdr.address.uint64 == l_addr->uint64) {
dap_string_append_printf(aliases_string, "\nalias %s", l_obj->key);
}
}
if (!l_data_size)
dap_string_append(aliases_string, "\nno aliases");
// get links in form of string
dap_string_t *links_string = dap_string_new(NULL);
for(unsigned int i = 0; i < l_node_info->hdr.links_number; i++) {
dap_chain_node_addr_t link_addr = l_node_info->links[i];
dap_string_append_printf(links_string, "\nlink%02d address : " NODE_ADDR_FP_STR, i,
NODE_ADDR_FP_ARGS_S(link_addr));
}
if(i)
dap_string_append_printf(l_string_reply, "\n");
char l_port_str[10];
dap_sprintf(l_port_str,"%d", l_node_info->hdr.ext_port);
// set short reply with node param
if(!a_is_full)
dap_string_append_printf(l_string_reply,
"node address "NODE_ADDR_FP_STR"\tcell 0x%016"DAP_UINT64_FORMAT_x"\tipv4 %s\tport: %s\tnumber of links %u",
NODE_ADDR_FP_ARGS_S(l_node_info->hdr.address),
l_node_info->hdr.cell_id.uint64, str_ip4,
l_node_info->hdr.ext_port ? l_port_str : "default",
l_node_info->hdr.links_number);
else
// set full reply with node param
dap_string_append_printf(l_string_reply,
"node address " NODE_ADDR_FP_STR "\ncell 0x%016"DAP_UINT64_FORMAT_x"\nipv4 %s\nipv6 %s\nport: %s%s\nlinks %u%s",
NODE_ADDR_FP_ARGS_S(l_node_info->hdr.address),
l_node_info->hdr.cell_id.uint64,
str_ip4, str_ip6,
l_node_info->hdr.ext_port ? l_port_str : "default",
aliases_string->str,
l_node_info->hdr.links_number, links_string->str);
dap_string_free(aliases_string, true);
dap_string_free(links_string, true);
}
dap_global_db_objs_delete(l_aliases_objs, l_data_size);
}
dap_global_db_objs_delete(l_objs, l_nodes_count);
}
dap_chain_node_cli_set_reply_text(a_str_reply, l_string_reply->str);
dap_string_free(l_string_reply, true);
return l_ret;
}
/**
* @brief com_global_db
* global_db command
* @param a_argc
* @param a_argv
* @param arg_func
* @param a_str_reply
* @return int
* return 0 OK, -1 Err
*/
int com_global_db(int a_argc, char ** a_argv, char **a_str_reply)
{
enum {
CMD_NONE, CMD_NAME_CELL, CMD_ADD, CMD_FLUSH, CMD_RECORD
};
int arg_index = 1;
int cmd_name = CMD_NONE;
// find 'cells' as first parameter only
if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "cells", NULL))
cmd_name = CMD_NAME_CELL;
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "flush", NULL))
cmd_name = CMD_FLUSH;
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "record", NULL))
cmd_name = CMD_RECORD;
switch (cmd_name) {
case CMD_NAME_CELL:
{
if(!arg_index || a_argc < 3) {
dap_chain_node_cli_set_reply_text(a_str_reply, "parameters are not valid");
return -1;
}
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
if(dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index, a_argc, a_argv, a_str_reply, &l_chain, &l_net) < 0)
return -11;
const char *l_cell_str = NULL, *l_chain_str = NULL;
// find cell and chain
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-cell", &l_cell_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-chain", &l_chain_str);
// Check for chain
if(!l_chain_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s requires parameter 'chain' to be valid", a_argv[0]);
return -12;
}
int arg_index_n = ++arg_index;
// find command (add, delete, etc) as second parameter only
int cmd_num = CMD_NONE;
switch (cmd_name) {
case CMD_NAME_CELL:
if((arg_index_n = dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "add", NULL))
!= 0) {
cmd_num = CMD_ADD;
}
dap_chain_cell_id_t l_cell_id = { {0} };
if(l_cell_str) {
dap_digit_from_string(l_cell_str, (uint8_t*) &l_cell_id.raw, sizeof(l_cell_id.raw)); //DAP_CHAIN_CELL_ID_SIZE);
}
switch (cmd_num)
{
// add new node to global_db
case CMD_ADD:
if(!arg_index || a_argc < 7) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameters");
return -1;
}
dap_chain_cell_t *l_cell = dap_chain_cell_create_fill(l_chain, l_cell_id);
int l_ret = dap_chain_cell_file_update(l_cell);
if(l_ret > 0)
dap_chain_node_cli_set_reply_text(a_str_reply, "cell added successfully");
else
dap_chain_node_cli_set_reply_text(a_str_reply, "can't create file for cell 0x%016X ( %s )",
l_cell->id.uint64,l_cell->file_storage_path);
dap_chain_cell_close(l_cell);
return l_ret;
//case CMD_NONE:
default:
dap_chain_node_cli_set_reply_text(a_str_reply, "command %s not recognized", a_argv[1]);
return -1;
}
}
}
case CMD_FLUSH:
{
int res_flush = dap_global_db_flush_sync();
switch (res_flush) {
case 0:
dap_chain_node_cli_set_reply_text(a_str_reply, "Commit data base and filesystem caches to disk completed.\n\n");
break;
case -1:
dap_chain_node_cli_set_reply_text(a_str_reply, "Couldn't open db directory. Can't init cdb\n"
"Reboot the node.\n\n");
break;
case -2:
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't init cdb\n"
"Reboot the node.\n\n");
break;
case -3:
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't init sqlite\n"
"Reboot the node.\n\n");
break;
default:
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't commit data base caches to disk completed.\n"
"Reboot the node.\n\n");
break;
}
return 0;
}
case CMD_RECORD:
{
enum {
SUMCMD_GET, SUMCMD_PIN, SUMCMD_UNPIN
};
if(!arg_index || a_argc < 3) {
dap_chain_node_cli_set_reply_text(a_str_reply, "parameters are not valid");
return -1;
}
int arg_index_n = ++arg_index;
int l_subcmd;
// Get value
if((arg_index_n = dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "get", NULL))!= 0) {
l_subcmd = SUMCMD_GET;
}
// Pin record
else if((arg_index_n = dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "pin", NULL)) != 0) {
l_subcmd = SUMCMD_PIN;
}
// Unpin record
else if((arg_index_n = dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "unpin", NULL)) != 0) {
l_subcmd = SUMCMD_UNPIN;
}
else{
dap_chain_node_cli_set_reply_text(a_str_reply, "Subcommand '%s' not recognized, available subcommands are 'get', 'pin' or 'unpin'", a_argv[2]);
return -1;
}
// read record from database
const char *l_key = NULL;
const char *l_group = NULL;
// find key and group
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-key", &l_key);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-group", &l_group);
size_t l_value_len = 0;
uint8_t l_flags = 0;
bool l_is_pinned = false;
dap_nanotime_t l_ts =0;
uint8_t *l_value =dap_global_db_get_sync(l_group, l_key, &l_value_len, &l_is_pinned, &l_ts);
if(!l_value || !l_value_len) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Record not found\n\n");
return -1;
}
int l_ret = 0;
// prepare record information
switch (l_subcmd) {
case SUMCMD_GET: // Get value
{
dap_hash_fast_t l_hash;
char *l_hash_str = NULL;
if(dap_hash_fast(l_value, l_value_len, &l_hash)) {
l_hash_str = dap_chain_hash_fast_to_str_new(&l_hash);
}
char *l_value_str = DAP_NEW_Z_SIZE(char, l_value_len * 2 + 2);
size_t ret = dap_bin2hex(l_value_str, l_value, l_value_len);
dap_chain_node_cli_set_reply_text(a_str_reply, "Record found\n"
"lenght:\t%u byte\n"
"hash:\t%s\n"
"pinned:\t%s\n"
"value:\t0x%s\n\n", l_value_len, l_hash_str, l_is_pinned ? "Yes" : "No", l_value_str);
DAP_DELETE(l_value_str);
DAP_DELETE(l_hash_str);
break;
}
case SUMCMD_PIN: // Pin record
{
if(l_is_pinned){
dap_chain_node_cli_set_reply_text(a_str_reply, "record already pinned");
break;
}
if(dap_global_db_set_sync( l_group, l_key, l_value, l_value_len,true ) ==0 ){
dap_chain_node_cli_set_reply_text(a_str_reply, "record successfully pinned");
}
else{
dap_chain_node_cli_set_reply_text(a_str_reply, "can't pin the record");
l_ret = -2;
}
break;
}
case SUMCMD_UNPIN: // Unpin record
{
if(!l_is_pinned) {
dap_chain_node_cli_set_reply_text(a_str_reply, "record already unpinned");
break;
}
if(dap_global_db_set_sync(l_group,l_key, l_value, l_value_len, false) == 0 ) {
dap_chain_node_cli_set_reply_text(a_str_reply, "record successfully unpinned");
}
else {
dap_chain_node_cli_set_reply_text(a_str_reply, "can't unpin the record");
l_ret = -2;
}
break;
}
}
DAP_DELETE(l_value);
return l_ret;
}
default:
dap_chain_node_cli_set_reply_text(a_str_reply, "parameters are not valid");
return -1;
}
return -555;
}
/**
* Node command
*/
int com_node(int a_argc, char ** a_argv, char **a_str_reply)
{
enum {
CMD_NONE, CMD_ADD, CMD_DEL, CMD_LINK, CMD_ALIAS, CMD_HANDSHAKE, CMD_CONNECT, CMD_DUMP
};
int arg_index = 1;
int cmd_num = CMD_NONE;
if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "add", NULL)) {
cmd_num = CMD_ADD;
}
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "del", NULL)) {
cmd_num = CMD_DEL;
}
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "link", NULL)) {
cmd_num = CMD_LINK;
}
else
// find add parameter ('alias' or 'handshake')
if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "handshake", NULL)) {
cmd_num = CMD_HANDSHAKE;
}
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "connect", NULL)) {
cmd_num = CMD_CONNECT;
}
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "alias", NULL)) {
cmd_num = CMD_ALIAS;
}
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "dump", NULL)) {
cmd_num = CMD_DUMP;
}
arg_index++;
if(cmd_num == CMD_NONE) {
dap_chain_node_cli_set_reply_text(a_str_reply, "command %s not recognized", a_argv[1]);
return -1;
}
const char *l_addr_str = NULL, *l_port_str = NULL, *alias_str = NULL;
const char *l_cell_str = NULL, *l_link_str = NULL, *a_ipv4_str = NULL, *a_ipv6_str = NULL;
// find net
dap_chain_net_t *l_net = NULL;
if(dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index, a_argc, a_argv, a_str_reply, NULL, &l_net) < 0)
return -11;
// find addr, alias
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-addr", &l_addr_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-port", &l_port_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-alias", &alias_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-cell", &l_cell_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-ipv4", &a_ipv4_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-ipv6", &a_ipv6_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-link", &l_link_str);
// struct to write to the global db
dap_chain_node_addr_t l_node_addr = { 0 };
dap_chain_node_addr_t l_link = { 0 };
dap_chain_node_info_t *l_node_info = NULL;
size_t l_node_info_size = sizeof(l_node_info->hdr) + sizeof(l_link);
if(cmd_num >= CMD_ADD && cmd_num <= CMD_LINK)
l_node_info = DAP_NEW_Z_SIZE(dap_chain_node_info_t, l_node_info_size);
if(l_addr_str) {
if(dap_chain_node_addr_from_str(&l_node_addr, l_addr_str) != 0) {
dap_digit_from_string(l_addr_str, l_node_addr.raw, sizeof(l_node_addr.raw));
}
if(l_node_info)
memcpy(&l_node_info->hdr.address, &l_node_addr, sizeof(dap_chain_node_addr_t));
}
if(l_port_str) {
uint16_t l_node_port = 0;
dap_digit_from_string(l_port_str, &l_node_port, sizeof(uint16_t));
if(l_node_info)
l_node_info->hdr.ext_port = l_node_port;
}
if(l_cell_str && l_node_info) {
dap_digit_from_string(l_cell_str, l_node_info->hdr.cell_id.raw, sizeof(l_node_info->hdr.cell_id.raw)); //DAP_CHAIN_CELL_ID_SIZE);
}
if(l_link_str) {
if(dap_chain_node_addr_from_str(&l_link, l_link_str) != 0) {
dap_digit_from_string(l_link_str, l_link.raw, sizeof(l_link.raw));
}
}
switch (cmd_num)
{
case CMD_ADD:
if(!arg_index || a_argc < 8) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameters");
DAP_DELETE(l_node_info);
return -1;
}
// handler of command 'node add'
int l_ret = node_info_add_with_reply(l_net, l_node_info, alias_str, l_cell_str, a_ipv4_str, a_ipv6_str,
a_str_reply);
DAP_DELETE(l_node_info);
return l_ret;
//break;
case CMD_DEL:
// handler of command 'node del'
{
int l_ret = node_info_del_with_reply(l_net, l_node_info, alias_str, a_str_reply);
DAP_DELETE(l_node_info);
return l_ret;
}
case CMD_LINK:
if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "add", NULL)) {
// handler of command 'node link add -addr <node address> -link <node address>'
int l_ret = link_add_or_del_with_reply(l_net, l_node_info, "add", alias_str, &l_link, a_str_reply);
DAP_DELETE(l_node_info);
return l_ret;
}
else if(dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), "del", NULL)) {
// handler of command 'node link del -addr <node address> -link <node address>'
int l_ret = link_add_or_del_with_reply(l_net, l_node_info, "del", alias_str, &l_link, a_str_reply);
DAP_DELETE(l_node_info);
return l_ret;
}
else {
dap_chain_node_cli_set_reply_text(a_str_reply, "command not recognize, supported format:\n"
"global_db node link <add|del] [-addr <node address> | -alias <node alias>] -link <node address>");
DAP_DELETE(l_node_info);
return -1;
}
case CMD_DUMP: {
// handler of command 'node dump'
bool l_is_full = dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-full", NULL);
return node_info_dump_with_reply(l_net, &l_node_addr, l_is_full, alias_str, a_str_reply);
}
// add alias
case CMD_ALIAS:
if(alias_str) {
if(l_addr_str) {
// add alias
if(!dap_chain_node_alias_register(l_net, alias_str, &l_node_addr))
log_it(L_WARNING, "can't save alias %s", alias_str);
else {
dap_chain_node_cli_set_reply_text(a_str_reply, "alias mapped successfully");
}
}
else {
dap_chain_node_cli_set_reply_text(a_str_reply, "alias can't be mapped because -addr is not found");
return -1;
}
}
else {
dap_chain_node_cli_set_reply_text(a_str_reply, "alias can't be mapped because -alias is not found");
return -1;
}
break;
// make connect
case CMD_CONNECT: {
// get address from alias if addr not defined
if(alias_str && !l_node_addr.uint64) {
dap_chain_node_addr_t *address_tmp = dap_chain_node_addr_get_by_alias(l_net, alias_str);
if(address_tmp) {
memcpy(&l_node_addr, address_tmp, sizeof(*address_tmp));
DAP_DELETE(address_tmp);
}
else {
dap_chain_node_cli_set_reply_text(a_str_reply, "no address found by alias");
return -1;
}
}
// for auto mode
int l_is_auto = 0;
// list of dap_chain_node_addr_t struct
unsigned int l_nodes_count = 0;
dap_list_t *l_node_list = NULL;
dap_chain_node_addr_t *l_remote_node_addr = NULL;
if(!l_node_addr.uint64) {
// check whether auto mode
l_is_auto = dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "auto", NULL);
if(!l_is_auto) {
dap_chain_node_cli_set_reply_text(a_str_reply, "addr not found");
return -1;
}
// if auto mode, then looking for the node address
// get cur node links
bool a_is_only_cur_cell = false;
dap_list_t *l_node_link_list = dap_chain_net_get_link_node_list(l_net, a_is_only_cur_cell);
// get all nodes list if no links
if(!l_node_link_list)
l_node_list = dap_chain_net_get_node_list(l_net);
else
l_node_list = dap_list_concat(l_node_link_list, l_node_list);
// select random node from the list
l_nodes_count = dap_list_length(l_node_list);
if(l_nodes_count > 0) {
unsigned int l_node_pos = rand() % l_nodes_count;
dap_list_t *l_tmp = dap_list_nth(l_node_list, l_node_pos);
l_remote_node_addr = l_tmp->data;
l_node_addr.uint64 = l_remote_node_addr->uint64;
}
if(!l_node_addr.uint64) {
dap_chain_node_cli_set_reply_text(a_str_reply, "no node is available");
return -1;
}
}
dap_chain_node_info_t *l_remote_node_info;
dap_chain_node_client_t *l_node_client;
int res;
do {
l_remote_node_info = node_info_read_and_reply(l_net, &l_node_addr, a_str_reply);
if(!l_remote_node_info) {
return -1;
}
// start connect
l_node_client = dap_chain_node_client_connect(l_net,l_remote_node_info);
if(!l_node_client) {
dap_chain_node_cli_set_reply_text(a_str_reply, "can't connect");
DAP_DELETE(l_remote_node_info);
return -1;
}
// wait connected
int timeout_ms = 7000; // 7 sec = 7000 ms
res = dap_chain_node_client_wait(l_node_client, NODE_CLIENT_STATE_ESTABLISHED, timeout_ms);
// select new node addr
if(l_is_auto && res){
if(l_remote_node_addr && l_nodes_count>1){
l_nodes_count--;
l_node_list = dap_list_remove(l_node_list, l_remote_node_addr);
DAP_DELETE(l_remote_node_addr);
unsigned int l_node_pos = rand() % l_nodes_count;
dap_list_t *l_tmp = dap_list_nth(l_node_list, l_node_pos);
l_remote_node_addr = l_tmp->data;
l_node_addr.uint64 = l_remote_node_addr->uint64;
// clean client struct
dap_chain_node_client_close(l_node_client);
DAP_DELETE(l_remote_node_info);
//return -1;
continue;
}
}
break;
}
while(1);
// for auto mode only
if(l_is_auto) {
//start background thread for testing connect to the nodes
dap_chain_node_ping_background_start(l_net, l_node_list);
dap_list_free_full(l_node_list, NULL);
}
if(res) {
dap_chain_node_cli_set_reply_text(a_str_reply, "no response from remote node(s)");
log_it(L_WARNING, "No response from remote node(s): err code %d", res);
// clean client struct
dap_chain_node_client_close(l_node_client);
//DAP_DELETE(l_remote_node_info);
return -1;
}
log_it(L_NOTICE, "Stream connection established");
dap_stream_ch_chain_sync_request_t l_sync_request = {};
dap_stream_ch_t * l_ch_chain = dap_client_get_stream_ch_unsafe(l_node_client->client, dap_stream_ch_chain_get_id());
// fill begin id
l_sync_request.id_start = 1;
// fill current node address
l_sync_request.node_addr.uint64 = dap_chain_net_get_cur_addr_int(l_net);
// if need to get current node address (feature-2630)
if(!l_sync_request.node_addr.uint64 )
{
log_it(L_NOTICE, "Now get node addr");
uint8_t l_ch_id = dap_stream_ch_chain_net_get_id();
dap_stream_ch_t * l_ch_chain = dap_client_get_stream_ch_unsafe(l_node_client->client, l_ch_id);
int l_res = dap_chain_node_client_set_callbacks( l_node_client->client, l_ch_id);
size_t res = dap_stream_ch_chain_net_pkt_write(l_ch_chain,
DAP_STREAM_CH_CHAIN_NET_PKT_TYPE_NODE_ADDR_LEASE_REQUEST,
//DAP_STREAM_CH_CHAIN_NET_PKT_TYPE_NODE_ADDR_REQUEST,
l_net->pub.id,
NULL, 0);
if(res == 0) {
log_it(L_WARNING, "Can't send DAP_STREAM_CH_CHAIN_NET_PKT_TYPE_NODE_ADDR_REQUEST packet");
dap_chain_node_client_close(l_node_client);
DAP_DELETE(l_remote_node_info);
return -1;
}
int timeout_ms = 15000; // 15 sec = 15 000 ms
l_res = dap_chain_node_client_wait(l_node_client, NODE_CLIENT_STATE_NODE_ADDR_LEASED, timeout_ms);
switch (l_res) {
case 0:
if(l_node_client->cur_node_addr.uint64 != 0) {
l_sync_request.node_addr.uint64 = l_node_client->cur_node_addr.uint64;
log_it(L_INFO, "Node address leased");
l_sync_request.node_addr.uint64 = l_node_client->cur_node_addr.uint64;
// save cur address
// already saved
// dap_db_set_cur_node_addr_exp(l_sync_request.node_addr.uint64, l_net->pub.name);
}
else
log_it(L_WARNING, "Node address leased wrong!");
break;
case -1:
log_it(L_WARNING, "Timeout with addr leasing");
default:
if(l_res != -1)
log_it(L_WARNING, "Node address request error %d", l_res);
/*dap_chain_node_client_close(l_node_client);
DAP_DELETE(l_remote_node_info);
return -1;*/
}
/* if(0 == dap_stream_ch_chain_pkt_write_unsafe(l_ch_chain, DAP_STREAM_CH_CHAIN_NET_PKT_TYPE_NODE_ADDR_REQUEST,
l_net->pub.id, l_chain_id_null, l_chain_cell_id_null, &l_sync_request,
sizeof(l_sync_request))) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Error: Cant send sync chains request");
// clean client struct
dap_chain_node_client_close(l_node_client);
DAP_DELETE(l_remote_node_info);
return -1;
}
dap_stream_ch_set_ready_to_write(l_ch_chain, true);
// wait for finishing of request
timeout_ms = 120000; // 20 min = 1200 sec = 1 200 000 ms
// TODO add progress info to console
res = dap_chain_node_client_wait(l_node_client, NODE_CLIENT_STATE_SYNCED, timeout_ms);
*/
}
log_it(L_NOTICE, "Now lets sync all");
dap_chain_id_t l_chain_id_null = { { 0 } };
dap_chain_cell_id_t l_chain_cell_id_null = { { 0 } };
l_chain_id_null.uint64 = l_net->pub.id.uint64;
l_chain_cell_id_null.uint64 = dap_chain_net_get_cur_cell(l_net) ? dap_chain_net_get_cur_cell(l_net)->uint64 : 0;
log_it(L_INFO, "Requested GLOBAL_DB syncronizatoin, %"DAP_UINT64_FORMAT_U":%"DAP_UINT64_FORMAT_U" period", l_sync_request.id_start,
l_sync_request.id_end);
// copy l_sync_request to current
//dap_stream_ch_chain_t * l_s_ch_chain = DAP_STREAM_CH_CHAIN(l_ch_chain);
//l_s_ch_chain->request_net_id.uint64 = l_net->pub.id.uint64;
//l_s_ch_chain->request_cell_id.uint64 = l_chain_cell_id_null.uint64;
//memcpy(&l_s_ch_chain->request, &l_sync_request, sizeof(l_sync_request));
if(0 == dap_stream_ch_chain_pkt_write_unsafe(l_ch_chain, DAP_STREAM_CH_CHAIN_PKT_TYPE_SYNC_GLOBAL_DB,
l_net->pub.id.uint64, 0, 0, &l_sync_request,
sizeof(l_sync_request))) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Error: Can't send sync chains request");
// clean client struct
dap_chain_node_client_close(l_node_client);
DAP_DELETE(l_remote_node_info);
return -1;
}
dap_stream_ch_set_ready_to_write_unsafe(l_ch_chain, true);
// wait for finishing of request
int timeout_ms = 420000; // 7 min = 420 sec = 420 000 ms
// TODO add progress info to console
res = dap_chain_node_client_wait(l_node_client, NODE_CLIENT_STATE_SYNCED, timeout_ms);
if(res < 0) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Error: can't sync with node "NODE_ADDR_FP_STR,
NODE_ADDR_FP_ARGS_S(l_node_client->remote_node_addr));
dap_chain_node_client_close(l_node_client);
DAP_DELETE(l_remote_node_info);
log_it(L_WARNING, "Gdb synced err -2");
return -2;
}
// flush global_db
dap_global_db_flush_sync();
log_it(L_INFO, "Gdb synced Ok");
// Requesting chains
dap_chain_t *l_chain = NULL;
DL_FOREACH(l_net->pub.chains, l_chain)
{
// reset state NODE_CLIENT_STATE_SYNCED
dap_chain_node_client_reset(l_node_client);
// send request
dap_stream_ch_chain_sync_request_t l_sync_request = {};
dap_chain_hash_fast_t *l_hash = dap_db_get_last_hash_remote(l_node_client->remote_node_addr.uint64, l_chain);
if (l_hash) {
memcpy(&l_sync_request.hash_from, l_hash, sizeof(*l_hash));
DAP_DELETE(l_hash);
}
if(0 == dap_stream_ch_chain_pkt_write_unsafe(l_ch_chain, DAP_STREAM_CH_CHAIN_PKT_TYPE_SYNC_CHAINS,
l_net->pub.id.uint64, l_chain->id.uint64, l_remote_node_info->hdr.cell_id.uint64, &l_sync_request,
sizeof(l_sync_request))) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Error: Can't send sync chains request");
// clean client struct
dap_chain_node_client_close(l_node_client);
DAP_DELETE(l_remote_node_info);
log_it(L_INFO, "Chain '%s' synced error: Can't send sync chains request", l_chain->name);
return -3;
}
log_it(L_NOTICE, "Requested syncronization for chain \"%s\"", l_chain->name);
dap_stream_ch_set_ready_to_write_unsafe(l_ch_chain, true);
// wait for finishing of request
timeout_ms = 120000; // 2 min = 120 sec = 120 000 ms
// TODO add progress info to console
res = dap_chain_node_client_wait(l_node_client, NODE_CLIENT_STATE_SYNCED, timeout_ms);
if(res < 0) {
log_it(L_ERROR, "Error: Can't sync chain %s", l_chain->name);
}
}
log_it(L_INFO, "Chains and gdb are synced");
DAP_DELETE(l_remote_node_info);
//dap_client_disconnect(l_node_client->client);
//l_node_client->client = NULL;
dap_chain_node_client_close(l_node_client);
dap_chain_node_cli_set_reply_text(a_str_reply, "Node sync completed: Chains and gdb are synced");
return 0;
}
// make handshake
case CMD_HANDSHAKE: {
// get address from alias if addr not defined
if(alias_str && !l_node_addr.uint64) {
dap_chain_node_addr_t *address_tmp = dap_chain_node_addr_get_by_alias(l_net, alias_str);
if(address_tmp) {
memcpy(&l_node_addr, address_tmp, sizeof(*address_tmp));
DAP_DELETE(address_tmp);
}
else {
dap_chain_node_cli_set_reply_text(a_str_reply, "No address found by alias");
return -4;
}
}
if(!l_node_addr.uint64) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Addr not found");
return -5;
}
dap_chain_node_info_t *node_info = node_info_read_and_reply(l_net, &l_node_addr, a_str_reply);
if(!node_info)
return -6;
int timeout_ms = 5000; //5 sec = 5000 ms
// start handshake
dap_chain_node_client_t *client = dap_chain_node_client_connect(l_net,node_info);
if(!client) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't connect");
DAP_DELETE(node_info);
return -7;
}
// wait handshake
int res = dap_chain_node_client_wait(client, NODE_CLIENT_STATE_ESTABLISHED, timeout_ms);
if (res) {
dap_chain_node_cli_set_reply_text(a_str_reply, "No response from node");
// clean client struct
dap_chain_node_client_close(client);
DAP_DELETE(node_info);
return -8;
}
DAP_DELETE(node_info);
//Add new established connection in the list
int ret = dap_chain_node_client_list_add(&l_node_addr, client);
switch (ret)
{
case -1:
dap_chain_node_client_close(client);
dap_chain_node_cli_set_reply_text(a_str_reply, "Connection established, but not saved");
return -9;
case -2:
dap_chain_node_client_close(client);
dap_chain_node_cli_set_reply_text(a_str_reply, "Connection already present");
return -10;
}
dap_chain_node_cli_set_reply_text(a_str_reply, "Connection established");
}
break;
}
return 0;
}
/**
* @brief Traceroute command
* return 0 OK, -1 Err
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_traceroute(int argc, char** argv, char **str_reply)
{
#ifdef DAP_OS_LINUX
const char *addr = NULL;
int hops = 0, time_usec = 0;
if(argc > 1)
addr = argv[1];
iputils_set_verbose();
int res = (addr) ? traceroute_util(addr, &hops, &time_usec) : -EADDRNOTAVAIL;
if(res >= 0) {
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s hops=%d time=%.1lf ms", addr, hops,
time_usec * 1. / 1000);
}
else {
if(str_reply) {
switch (-res)
{
case EADDRNOTAVAIL:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", (addr) ? addr : "",
(addr) ? "Name or service not known" : "Host not defined");
break;
case 2:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr,
"Unknown traceroute module");
break;
case 3:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr, "first hop out of range");
break;
case 4:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr,
"max hops cannot be more than 255");
break;
case 5:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr,
"no more than 10 probes per hop");
break;
case 6:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr,
"bad wait specifications");
break;
case 7:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr, "too big packetlen ");
break;
case 8:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr,
"IP version mismatch in addresses specified");
break;
case 9:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr, "bad sendtime");
break;
case 10:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr, "init_ip_options");
break;
case 11:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr, "calloc");
break;
case 12:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr, "parse cmdline");
break;
case 13:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error: %s", addr,
"trace method's init failed");
break;
default:
dap_chain_node_cli_set_reply_text(str_reply, "traceroute %s error(%d) %s", addr, res,
"trace not found");
}
}
}
return res;
#else
UNUSED(argc);
UNUSED(argv);
dap_chain_node_cli_set_reply_text(str_reply, "Not realized for your platform");
return -1;
#endif
}
/**
* @brief com_tracepath
* Tracepath command
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
* return 0 OK, -1 Err
*/
int com_tracepath(int argc, char** argv, char **str_reply)
{
#ifdef DAP_OS_LINUX
const char *addr = NULL;
int hops = 0, time_usec = 0;
if(argc > 1)
addr = argv[1];
iputils_set_verbose();
int res = (addr) ? tracepath_util(addr, &hops, &time_usec) : -EADDRNOTAVAIL;
if(res >= 0) {
if(str_reply)
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s hops=%d time=%.1lf ms", addr, hops,
time_usec * 1. / 1000);
}
else {
if(str_reply) {
switch (-res)
{
case EADDRNOTAVAIL:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", (addr) ? addr : "",
(addr) ? "Name or service not known" : "Host not defined");
break;
case ESOCKTNOSUPPORT:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr, "Can't create socket");
break;
case 2:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr,
"Can't setsockopt IPV6_MTU_DISCOVER");
break;
case 3:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr,
"Can't setsockopt IPV6_RECVERR");
break;
case 4:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr,
"Can't setsockopt IPV6_HOPLIMIT");
break;
case 5:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr,
"Can't setsockopt IP_MTU_DISCOVER");
break;
case 6:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr,
"Can't setsockopt IP_RECVERR");
break;
case 7:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr,
"Can't setsockopt IP_RECVTTL");
break;
case 8:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr, "malloc");
break;
case 9:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr,
"Can't setsockopt IPV6_UNICAST_HOPS");
break;
case 10:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error: %s", addr, "Can't setsockopt IP_TTL");
break;
default:
dap_chain_node_cli_set_reply_text(str_reply, "tracepath %s error(%d) %s", addr, res, "trace not found");
}
}
}
return res;
#else
UNUSED(argc);
UNUSED(argv);
dap_chain_node_cli_set_reply_text(str_reply, "Not realized for your platform");
return -1;
#endif
}
/**
* @brief Ping command
* return 0 OK, -1 Err
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_ping(int argc, char** argv, char **str_reply)
{
#ifdef DAP_OS_LINUX
int n = 4;
if(argc < 2) {
dap_chain_node_cli_set_reply_text(str_reply, "Host not specified");
return -1;
}
const char *n_str = NULL;
int argc_host = 1;
int argc_start = 1;
argc_start = dap_chain_node_cli_find_option_val(argv, argc_start, argc, "-n", &n_str);
if(argc_start) {
argc_host = argc_start + 1;
n = (n_str) ? atoi(n_str) : 4;
}
else {
argc_start = dap_chain_node_cli_find_option_val(argv, argc_start, argc, "-c", &n_str);
if(argc_start) {
argc_host = argc_start + 1;
n = (n_str) ? atoi(n_str) : 4;
}
}
if(n <= 1)
n = 1;
const char *addr = argv[argc_host];
iputils_set_verbose();
ping_handle_t *l_ping_handle = ping_handle_create();
int res = (addr) ? ping_util(l_ping_handle, addr, n) : -EADDRNOTAVAIL;
DAP_DELETE(l_ping_handle);
if(res >= 0) {
if(str_reply)
dap_chain_node_cli_set_reply_text(str_reply, "Ping %s time=%.1lf ms", addr, res * 1. / 1000);
}
else {
if(str_reply) {
switch (-res)
{
case EDESTADDRREQ:
dap_chain_node_cli_set_reply_text(str_reply, "Ping %s error: %s", addr, "Destination address required");
break;
case EADDRNOTAVAIL:
dap_chain_node_cli_set_reply_text(str_reply, "Ping %s error: %s", (addr) ? addr : "",
(addr) ? "Host not found" : "Host not defined");
break;
case EPFNOSUPPORT:
dap_chain_node_cli_set_reply_text(str_reply, "Ping %s error: %s", addr, "Unknown protocol family");
break;
default:
dap_chain_node_cli_set_reply_text(str_reply, "Ping %s error(%d)", addr, -res);
}
}
}
return res;
#else
UNUSED(argc);
UNUSED(argv);
dap_chain_node_cli_set_reply_text(str_reply, "Not realized for your platform");
return -1;
#endif
}
/**
* @brief com_version
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return
*/
int com_version(int argc, char ** argv, char **str_reply)
{
(void) argc;
(void) argv;
#ifndef DAP_VERSION
#pragma message "[!WRN!] DAP_VERSION IS NOT DEFINED. Manual override engaged."
#define DAP_VERSION 0.9-15
#endif
dap_chain_node_cli_set_reply_text(str_reply,
"%s version %s\n", dap_get_appname(), DAP_VERSION );
return 0;
}
/**
* @brief
* Help command
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_help(int argc, char ** argv, char **str_reply)
{
if(argc > 1) {
log_it(L_DEBUG, "Help for command %s", argv[1]);
dap_chain_node_cmd_item_t *l_cmd = dap_chain_node_cli_cmd_find(argv[1]);
if(l_cmd) {
dap_chain_node_cli_set_reply_text(str_reply, "%s:\n%s", l_cmd->doc, l_cmd->doc_ex);
return 0;
} else {
dap_chain_node_cli_set_reply_text(str_reply, "command \"%s\" not recognized", argv[1]);
}
return -1;
} else {
// TODO Read list of commands & return it
log_it(L_DEBUG, "General help requested");
dap_string_t * l_help_list_str = dap_string_new(NULL);
dap_chain_node_cmd_item_t *l_cmd = dap_chain_node_cli_cmd_get_first();
while(l_cmd) {
dap_string_append_printf(l_help_list_str, "%s:\t\t\t%s\n",
l_cmd->name, l_cmd->doc ? l_cmd->doc : "(undocumented command)");
l_cmd = (dap_chain_node_cmd_item_t*) l_cmd->hh.next;
}
dap_chain_node_cli_set_reply_text(str_reply,
"Available commands:\n\n%s\n",
l_help_list_str->len ? l_help_list_str->str : "NO ANY COMMAND WERE DEFINED");
return 0;
}
}
/**
* @brief com_tx_wallet
* Wallet info
* com_tx_create command
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_tx_wallet(int argc, char ** argv, char **str_reply)
{
const char *c_wallets_path = dap_chain_wallet_get_path(g_config);
// Get address of wallet
enum {
CMD_NONE, CMD_WALLET_NEW, CMD_WALLET_LIST, CMD_WALLET_INFO
};
int arg_index = 1;
int cmd_num = CMD_NONE;
// find add parameter ('alias' or 'handshake')
if(dap_chain_node_cli_find_option_val(argv, arg_index, min(argc, arg_index + 1), "new", NULL)) {
cmd_num = CMD_WALLET_NEW;
}
else if(dap_chain_node_cli_find_option_val(argv, arg_index, min(argc, arg_index + 1), "list", NULL)) {
cmd_num = CMD_WALLET_LIST;
}
else if(dap_chain_node_cli_find_option_val(argv, arg_index, min(argc, arg_index + 1), "info", NULL)) {
cmd_num = CMD_WALLET_INFO;
}
arg_index++;
if(cmd_num == CMD_NONE) {
dap_chain_node_cli_set_reply_text(str_reply,
"Format of command: wallet [new -w <wallet_name> | list | info [<-addr <addr>]|[-w <wallet_name> -net <net_name>]");
return -1;
}
dap_chain_node_addr_t address;
memset(&address, 0, sizeof(dap_chain_node_addr_t));
const char *l_addr_str = NULL, *l_wallet_name = NULL, *l_net_name = NULL, *l_sign_type_str = NULL, *l_restore_str = NULL;
// find wallet addr
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-addr", &l_addr_str);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-w", &l_wallet_name);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-net", &l_net_name);
dap_chain_net_t * l_net = l_net_name ? dap_chain_net_by_name( l_net_name) : NULL;
dap_string_t *l_string_ret = dap_string_new(NULL);
switch (cmd_num) {
// new wallet
case CMD_WALLET_NEW: {
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-sign", &l_sign_type_str);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-restore", &l_restore_str);
// rewrite existing wallet
int l_is_force = dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-force", NULL);
if(!l_wallet_name) {
dap_chain_node_cli_set_reply_text(str_reply, "Wallet name option <-w> not defined");
return -1;
}
// Check if wallet name has only digits and English letter
if (!dap_isstralnum(l_wallet_name)){
dap_chain_node_cli_set_reply_text(str_reply, "Wallet name must contains digits and aplhabetical symbols");
return -1;
}
// check wallet existence
if (!l_is_force) {
char *l_file_name = dap_strdup_printf("%s/%s.dwallet", c_wallets_path, l_wallet_name);
FILE *l_exists = fopen(l_file_name, "rb");
DAP_DELETE(l_file_name);
if (l_exists) {
dap_chain_node_cli_set_reply_text(str_reply, "Wallet %s already exists", l_wallet_name);
fclose(l_exists);
return -1;
}
}
dap_sign_type_t l_sign_type;
if (!l_sign_type_str) {
l_sign_type.type = SIG_TYPE_DILITHIUM;
l_sign_type_str = dap_sign_type_to_str(l_sign_type);
} else {
l_sign_type = dap_sign_type_from_str(l_sign_type_str);
if (l_sign_type.type == SIG_TYPE_NULL){
dap_chain_node_cli_set_reply_text(str_reply, "Unknown signature type");
return -1;
}
}
//
// Check unsupported tesla algorithm
//
if (l_sign_type.type == SIG_TYPE_TESLA)
{
dap_chain_node_cli_set_reply_text(str_reply, "Tesla algorithm is no longer supported, please, use another variant");
return -1;
}
uint8_t *l_seed = NULL;
size_t l_seed_size = 0;
size_t l_restore_str_size = dap_strlen(l_restore_str);
if(l_restore_str && l_restore_str_size > 2 && !dap_strncmp(l_restore_str, "0x", 2)) {
l_seed_size = (l_restore_str_size - 2) / 2;
l_seed = DAP_NEW_SIZE(uint8_t, l_seed_size);
if(!dap_hex2bin(l_seed, l_restore_str + 2, l_restore_str_size - 2)){
DAP_DELETE(l_seed);
l_seed = NULL;
l_seed_size = 0;
dap_chain_node_cli_set_reply_text(str_reply, "Resrote hash is invalid, wallet is not created");
return -1;
}
}
// Creates new wallet
dap_chain_wallet_t *l_wallet = dap_chain_wallet_create_with_seed(l_wallet_name, c_wallets_path, l_sign_type,
l_seed, l_seed_size);
dap_chain_addr_t *l_addr = l_net? dap_chain_wallet_get_addr(l_wallet,l_net->pub.id ) : NULL;
if(!l_wallet) {
dap_chain_node_cli_set_reply_text(str_reply, "Wallet is not created besause of internal error");
return -1;
}
char *l_addr_str = l_addr? dap_chain_addr_to_str(l_addr) : NULL;
dap_string_append_printf(l_string_ret, "Wallet '%s' (type=%s) successfully created\n", l_wallet->name, l_sign_type_str);
if ( l_addr_str ) {
dap_string_append_printf(l_string_ret, "new address %s", l_addr_str);
DAP_DELETE(l_addr_str);
}
dap_chain_wallet_close(l_wallet);
}
break;
// wallet list
case CMD_WALLET_LIST: {
DIR * l_dir = opendir(c_wallets_path);
if(l_dir) {
struct dirent * l_dir_entry;
while((l_dir_entry = readdir(l_dir)) != NULL) {
const char *l_file_name = l_dir_entry->d_name;
size_t l_file_name_len = (l_file_name) ? strlen(l_file_name) : 0;
if((l_file_name_len > 8) && (strcmp(l_file_name + l_file_name_len - 8, ".dwallet") == 0)) {
char *l_file_path_tmp = dap_strdup_printf("%s/%s", c_wallets_path, l_file_name);
dap_chain_wallet_t *l_wallet = dap_chain_wallet_open_file(l_file_path_tmp);
if(l_wallet) {
dap_chain_addr_t *l_addr = l_net? dap_chain_wallet_get_addr(l_wallet, l_net->pub.id) : NULL;
char *l_addr_str = dap_chain_addr_to_str(l_addr);
dap_string_append_printf(l_string_ret, "\nwallet: %s\n", l_wallet->name);
if (l_addr_str){
dap_string_append_printf(l_string_ret, "addr: %s\n", (l_addr_str) ? l_addr_str : "-");
DAP_DELETE(l_addr_str);
}
dap_chain_wallet_close(l_wallet);
}
DAP_DELETE(l_file_path_tmp);
}
}
closedir(l_dir);
}
}
break;
// wallet info
case CMD_WALLET_INFO: {
dap_chain_wallet_t *l_wallet = NULL;
dap_chain_addr_t *l_addr = NULL;
if(l_wallet_name) {
l_wallet = dap_chain_wallet_open(l_wallet_name, c_wallets_path);
if ( l_net )
l_addr = (dap_chain_addr_t *) dap_chain_wallet_get_addr(l_wallet, l_net->pub.id );
}
if(!l_addr && l_addr_str)
l_addr = dap_chain_addr_from_str(l_addr_str);
dap_ledger_t *l_ledger = dap_chain_ledger_by_net_name((const char *) l_net_name);
if(!l_net_name && !l_addr ) {
dap_chain_node_cli_set_reply_text(str_reply, "Subcommand info requires parameter '-net'");
return -1;
}
else if (! l_addr){
if((l_ledger = dap_chain_ledger_by_net_name(l_net_name)) == NULL) {
dap_chain_node_cli_set_reply_text(str_reply, "Not found net by name '%s'", l_net_name);
return -1;
}
}else{
l_net = dap_chain_net_by_id(l_addr->net_id);
if (l_net){
l_ledger = l_net->pub.ledger;
l_net_name = l_net->pub.name;
}else{
dap_chain_node_cli_set_reply_text(str_reply, "Can't find network id 0x%08X from address %s", l_addr->net_id.uint64,
l_addr_str);
return -1;
}
}
if(l_addr) {
char *l_addr_str = dap_chain_addr_to_str((dap_chain_addr_t*) l_addr);
if(l_wallet)
dap_string_append_printf(l_string_ret, "wallet: %s\n", l_wallet->name);
dap_string_append_printf(l_string_ret, "addr: %s\n", (l_addr_str) ? l_addr_str : "-");
dap_string_append_printf(l_string_ret, "network: %s\n", (l_net_name ) ? l_net_name : "-");
size_t l_l_addr_tokens_size = 0;
char **l_l_addr_tokens = NULL;
dap_chain_ledger_addr_get_token_ticker_all_fast(l_ledger, l_addr, &l_l_addr_tokens, &l_l_addr_tokens_size);
if(l_l_addr_tokens_size > 0)
dap_string_append_printf(l_string_ret, "balance:\n");
else
dap_string_append_printf(l_string_ret, "balance: 0");
for(size_t i = 0; i < l_l_addr_tokens_size; i++) {
if(l_l_addr_tokens[i]) {
uint256_t l_balance = dap_chain_ledger_calc_balance(l_ledger, l_addr, l_l_addr_tokens[i]);
char *l_balance_coins = dap_chain_balance_to_coins(l_balance);
char *l_balance_datoshi = dap_chain_balance_print(l_balance);
dap_string_append_printf(l_string_ret, "\t%s (%s) %s\n", l_balance_coins,
l_balance_datoshi, l_l_addr_tokens[i]);
if(i < l_l_addr_tokens_size - 1)
dap_string_append_printf(l_string_ret, "\n");
DAP_DELETE(l_balance_coins);
DAP_DELETE(l_balance_datoshi);
}
DAP_DELETE(l_l_addr_tokens[i]);
}
DAP_DELETE(l_l_addr_tokens);
DAP_DELETE(l_addr_str);
if(l_wallet)
dap_chain_wallet_close(l_wallet);
}
else {
if(l_wallet)
dap_chain_wallet_close(l_wallet);
dap_string_free(l_string_ret, true);
dap_chain_node_cli_set_reply_text(str_reply, "Wallet not found");
return -1;
}
}
break;
}
*str_reply = dap_string_free(l_string_ret, false);
return 0;
}
/**
* @brief s_values_parse_net_chain
* @param argc
* @param argv
* @param str_reply
* @param l_chain
* @param l_net
* @return
*/
int dap_chain_node_cli_cmd_values_parse_net_chain(int *a_arg_index, int argc, char ** argv, char ** a_str_reply,
dap_chain_t ** a_chain, dap_chain_net_t ** a_net)
{
const char * l_chain_str = NULL;
const char * l_net_str = NULL;
// Net name
if(a_net)
dap_chain_node_cli_find_option_val(argv, *a_arg_index, argc, "-net", &l_net_str);
else
return -100;
// Select network
if(!l_net_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s requires parameter '-net'", argv[0]);
return -101;
}
if((*a_net = dap_chain_net_by_name(l_net_str)) == NULL) { // Can't find such network
dap_chain_node_cli_set_reply_text(a_str_reply, "%s can't find network \"%s\"", argv[0], l_net_str);
char l_str_to_reply_chain[500] = {0};
char *l_str_to_reply = NULL;
dap_sprintf(l_str_to_reply_chain, "%s can't find network \"%s\"\n", argv[0], l_net_str);
l_str_to_reply = dap_strcat2(l_str_to_reply,l_str_to_reply_chain);
dap_string_t* l_net_str = dap_cli_list_net();
l_str_to_reply = dap_strcat2(l_str_to_reply,l_net_str->str);
dap_chain_node_cli_set_reply_text(a_str_reply, l_str_to_reply);
return -102;
}
// Chain name
if(a_chain) {
dap_chain_node_cli_find_option_val(argv, *a_arg_index, argc, "-chain", &l_chain_str);
// Select chain
if(l_chain_str) {
if((*a_chain = dap_chain_net_get_chain_by_name(*a_net, l_chain_str)) == NULL) { // Can't find such chain
char l_str_to_reply_chain[500] = {0};
char *l_str_to_reply = NULL;
dap_sprintf(l_str_to_reply_chain, "%s requires parameter '-chain' to be valid chain name in chain net %s. Current chain %s is not valid\n",
argv[0], l_net_str, l_chain_str);
l_str_to_reply = dap_strcat2(l_str_to_reply,l_str_to_reply_chain);
dap_chain_t * l_chain;
dap_chain_net_t * l_chain_net = *a_net;
l_str_to_reply = dap_strcat2(l_str_to_reply,"\nAvailable chains:\n");
DL_FOREACH(l_chain_net->pub.chains, l_chain) {
l_str_to_reply = dap_strcat2(l_str_to_reply,"\t");
l_str_to_reply = dap_strcat2(l_str_to_reply,l_chain->name);
l_str_to_reply = dap_strcat2(l_str_to_reply,"\n");
}
dap_chain_node_cli_set_reply_text(a_str_reply, l_str_to_reply);
return -103;
}
}
else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"%s requires parameter '-chain'", argv[0]);
return -104;
}
}
return 0;
}
/**
* @brief
* sign data (datum_token) by certificates (1 or more)
* successful count of signes return in l_sign_counter
* @param l_certs - array with certificates loaded from dcert file
* @param l_datum_token - updated pointer for l_datum_token variable after realloc
* @param l_certs_count - count of certificate
* @param l_datum_data_offset - offset of datum
* @param l_sign_counter - counter of successful data signing operation
* @return dap_chain_datum_token_t*
*/
static dap_chain_datum_token_t * s_sign_cert_in_cycle(dap_cert_t ** l_certs, dap_chain_datum_token_t *l_datum_token, size_t l_certs_count,
size_t *l_datum_signs_offset, uint16_t * l_sign_counter)
{
if (!l_datum_signs_offset) {
log_it(L_DEBUG,"l_datum_data_offset is NULL");
return NULL;
}
size_t l_tsd_size = 0;
if ((l_datum_token->type == DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_DECL) ||
(l_datum_token->type == DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_DECL))
l_tsd_size = l_datum_token->header_native_decl.tsd_total_size;
for(size_t i = 0; i < l_certs_count; i++)
{
dap_sign_t * l_sign = dap_cert_sign(l_certs[i], l_datum_token,
sizeof(*l_datum_token) - sizeof(uint16_t), 0);
if (l_sign) {
size_t l_sign_size = dap_sign_get_size(l_sign);
l_datum_token = DAP_REALLOC(l_datum_token, sizeof(dap_chain_datum_token_t) + *l_datum_signs_offset + l_sign_size);
memcpy(l_datum_token->data_n_tsd + *l_datum_signs_offset, l_sign, l_sign_size);
*l_datum_signs_offset += l_sign_size;
DAP_DELETE(l_sign);
log_it(L_DEBUG,"<-- Signed with '%s'", l_certs[i]->name);
(*l_sign_counter)++;
}
}
return l_datum_token;
}
/**
* @brief com_token_decl_sign
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return
*/
int com_token_decl_sign(int argc, char ** argv, char ** a_str_reply)
{
int arg_index = 1;
const char * l_hash_out_type = NULL;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-H", &l_hash_out_type);
if(!l_hash_out_type)
l_hash_out_type = "hex";
if(dap_strcmp(l_hash_out_type,"hex") && dap_strcmp(l_hash_out_type,"base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
const char * l_datum_hash_str = NULL;
// Chain name
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-datum", &l_datum_hash_str);
if(l_datum_hash_str) {
char * l_datum_hash_hex_str = NULL;
char * l_datum_hash_base58_str = NULL;
const char * l_certs_str = NULL;
dap_cert_t ** l_certs = NULL;
size_t l_certs_count = 0;
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index, argc, argv, a_str_reply, &l_chain, &l_net);
if(!l_net)
return -1;
else {
if(*a_str_reply) {
DAP_DELETE(*a_str_reply);
*a_str_reply = NULL;
}
}
// Certificates thats will be used to sign currend datum token
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-certs", &l_certs_str);
// Load certs lists
if (l_certs_str)
dap_cert_parse_str_list(l_certs_str, &l_certs, &l_certs_count);
if(!l_certs_count) {
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_sign command requres at least one valid certificate to sign the basic transaction of emission");
return -7;
}
char * l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_new(l_chain);
if(!l_gdb_group_mempool) {
l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_by_chain_type(l_net, CHAIN_TYPE_TOKEN);
}
// datum hash may be in hex or base58 format
if(!dap_strncmp(l_datum_hash_str, "0x", 2) || !dap_strncmp(l_datum_hash_str, "0X", 2)) {
l_datum_hash_hex_str = dap_strdup(l_datum_hash_str);
l_datum_hash_base58_str = dap_enc_base58_from_hex_str_to_str(l_datum_hash_str);
} else {
l_datum_hash_hex_str = dap_enc_base58_to_hex_str_from_str(l_datum_hash_str);
l_datum_hash_base58_str = dap_strdup(l_datum_hash_str);
}
const char *l_datum_hash_out_str;
if(!dap_strcmp(l_hash_out_type,"hex"))
l_datum_hash_out_str = l_datum_hash_hex_str;
else
l_datum_hash_out_str = l_datum_hash_base58_str;
log_it(L_DEBUG, "Requested to sign token declaration %s in gdb://%s with certs %s",
l_gdb_group_mempool, l_datum_hash_hex_str, l_certs_str);
dap_chain_datum_t * l_datum = NULL;
size_t l_datum_size = 0;
size_t l_tsd_size = 0;
if((l_datum = (dap_chain_datum_t*) dap_chain_global_db_gr_get(
l_datum_hash_hex_str, &l_datum_size, l_gdb_group_mempool)) != NULL) {
// Check if its token declaration
if(l_datum->header.type_id == DAP_CHAIN_DATUM_TOKEN_DECL) {
dap_chain_datum_token_t *l_datum_token = DAP_DUP_SIZE(l_datum->data, l_datum->header.data_size); // for realloc
DAP_DELETE(l_datum);
if ((l_datum_token->type == DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_DECL) ||
(l_datum_token->type == DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_DECL))
l_tsd_size = l_datum_token->header_native_decl.tsd_total_size;
// Check for signatures, are they all in set and are good enought?
size_t l_signs_size = 0, i = 1;
for (i = 1; i <= l_datum_token->signs_total; i++){
dap_sign_t *l_sign = (dap_sign_t *)(l_datum_token->data_n_tsd + l_tsd_size + l_signs_size);
if( dap_sign_verify(l_sign, l_datum_token, sizeof(*l_datum_token) - sizeof(uint16_t)) != 1) {
log_it(L_WARNING, "Wrong signature %zu for datum_token with key %s in mempool!", i, l_datum_hash_out_str);
dap_chain_node_cli_set_reply_text(a_str_reply,
"Datum %s with datum token has wrong signature %zu, break process and exit",
l_datum_hash_out_str, i);
DAP_DELETE(l_datum_token);
DAP_DELETE(l_gdb_group_mempool);
return -6;
}else{
log_it(L_DEBUG,"Sign %zu passed", i);
}
l_signs_size += dap_sign_get_size(l_sign);
}
log_it(L_DEBUG, "Datum %s with token declaration: %hu signatures are verified well (sign_size = %zu)",
l_datum_hash_out_str, l_datum_token->signs_total, l_signs_size);
// Sign header with all certificates in the list and add signs to the end of token update
uint16_t l_sign_counter = 0;
size_t l_data_size = l_tsd_size + l_signs_size;
l_datum_token = s_sign_cert_in_cycle(l_certs, l_datum_token, l_certs_count, &l_data_size,
&l_sign_counter);
l_datum_token->signs_total += l_sign_counter;
size_t l_token_size = sizeof(*l_datum_token) + l_data_size;
dap_chain_datum_t * l_datum = dap_chain_datum_create(DAP_CHAIN_DATUM_TOKEN_DECL,
l_datum_token, l_token_size);
DAP_DELETE(l_datum_token);
// Calc datum's hash
l_datum_size = dap_chain_datum_size(l_datum);
dap_chain_hash_fast_t l_key_hash={};
dap_hash_fast(l_datum, l_datum_size, &l_key_hash);
char * l_key_str = dap_chain_hash_fast_to_str_new(&l_key_hash);
char * l_key_str_base58 = dap_enc_base58_encode_hash_to_str(&l_key_hash);
const char * l_key_out_str;
if(!dap_strcmp(l_hash_out_type,"hex"))
l_key_out_str = l_key_str;
else
l_key_out_str = l_key_str_base58;
// Add datum to mempool with datum_token hash as a key
if(dap_chain_global_db_gr_set(dap_strdup(l_key_str), (uint8_t *) l_datum, l_datum_size, l_gdb_group_mempool)) {
char* l_hash_str = l_datum_hash_hex_str;
// Remove old datum from pool
if( dap_global_db_del_sync(l_gdb_group_mempool, l_hash_str ) == 0) {
dap_chain_node_cli_set_reply_text(a_str_reply,
"datum %s is replacing the %s in datum pool",
l_key_out_str, l_datum_hash_out_str);
DAP_DELETE(l_datum);
//DAP_DELETE(l_datum_token);
DAP_DELETE(l_gdb_group_mempool);
return 0;
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Warning! Can't remove old datum %s ( new datum %s added normaly in datum pool)",
l_datum_hash_out_str, l_key_out_str);
DAP_DELETE(l_datum);
//DAP_DELETE(l_datum_token);
DAP_DELETE(l_gdb_group_mempool);
return 1;
}
DAP_DELETE(l_hash_str);
DAP_DELETE(l_key_str);
DAP_DELETE(l_key_str_base58);
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Error! datum %s produced from %s can't be placed in mempool",
l_key_out_str, l_datum_hash_out_str);
DAP_DELETE(l_datum);
//DAP_DELETE(l_datum_token);
DAP_DELETE(l_gdb_group_mempool);
DAP_DELETE(l_key_str);
DAP_DELETE(l_key_str_base58);
return -2;
}
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Error! Wrong datum type. token_decl_sign sign only token declarations datum");
return -61;
}
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_decl_sign can't find datum with %s hash in the mempool of %s:%s",l_datum_hash_out_str,l_net? l_net->pub.name: "<undefined>",
l_chain?l_chain->name:"<undefined>");
return -5;
}
DAP_DELETE(l_datum_hash_hex_str);
DAP_DELETE(l_datum_hash_base58_str);
} else {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_decl_sign need -datum <datum hash> argument");
return -2;
}
return 0;
}
/**
* @brief s_com_mempool_list_print_for_chain
*
* @param a_net
* @param a_chain
* @param a_str_tmp
* @param a_hash_out_type
*/
void s_com_mempool_list_print_for_chain(dap_chain_net_t * a_net, dap_chain_t * a_chain, dap_string_t * a_str_tmp, const char *a_hash_out_type){
char * l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_new(a_chain);
if(!l_gdb_group_mempool){
dap_string_append_printf(a_str_tmp, "%s.%s: chain not found\n", a_net->pub.name, a_chain->name);
}else{
size_t l_objs_size = 0;
dap_global_db_obj_t * l_objs = dap_global_db_objs_get(l_gdb_group_mempool, &l_objs_size);
if(l_objs_size > 0)
dap_string_append_printf(a_str_tmp, "%s.%s: Found %zu records :\n", a_net->pub.name, a_chain->name,
l_objs_size);
else
dap_string_append_printf(a_str_tmp, "%s.%s: Not found records\n", a_net->pub.name, a_chain->name);
for(size_t i = 0; i < l_objs_size; i++) {
dap_chain_datum_t *l_datum = (dap_chain_datum_t *)l_objs[i].value;
dap_time_t l_ts_create = (dap_time_t) l_datum->header.ts_create;
if (!l_datum->header.data_size || (l_datum->header.data_size > l_objs[i].value_len)) {
log_it(L_ERROR, "Trash datum in GDB %s.%s, key: %s data_size:%u, value_len:%zu",
a_net->pub.name, a_chain->name, l_objs[i].key, l_datum->header.data_size, l_objs[i].value_len);
dap_global_db_del_sync(l_gdb_group_mempool, l_objs[i].key);
continue;
}
char buf[50] = {[0]='\0'};
dap_hash_fast_t l_data_hash;
char l_data_hash_str[70] = {[0]='\0'};
dap_hash_fast(l_datum->data,l_datum->header.data_size,&l_data_hash);
dap_hash_fast_to_str(&l_data_hash,l_data_hash_str,sizeof (l_data_hash_str)-1);
const char *l_type = NULL;
DAP_DATUM_TYPE_STR(l_datum->header.type_id, l_type)
dap_string_append_printf(a_str_tmp, "hash %s : type_id=%s data_size=%u data_hash=%s ts_create=%s", // \n included in timestamp
l_objs[i].key, l_type,
l_datum->header.data_size, l_data_hash_str, dap_ctime_r(&l_ts_create, buf));
dap_chain_datum_dump(a_str_tmp, l_datum, a_hash_out_type);
}
dap_global_db_objs_delete(l_objs, l_objs_size);
}
DAP_DELETE(l_gdb_group_mempool);
}
/**
* @brief com_token_decl_list
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return
*/
int com_mempool_list(int argc, char ** argv, char ** a_str_reply)
{
int arg_index = 1;
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
const char * l_hash_out_type = "hex";
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-H", &l_hash_out_type);
dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index, argc, argv, a_str_reply, &l_chain, &l_net);
if(!l_net)
return -1;
else {
if(*a_str_reply) {
DAP_DELETE(*a_str_reply);
*a_str_reply = NULL;
}
}
if(l_net) {
dap_string_t * l_str_tmp = dap_string_new(NULL);
if(l_chain)
s_com_mempool_list_print_for_chain(l_net, l_chain, l_str_tmp, l_hash_out_type);
else
DL_FOREACH(l_net->pub.chains, l_chain)
s_com_mempool_list_print_for_chain(l_net, l_chain, l_str_tmp, l_hash_out_type);
dap_chain_node_cli_set_reply_text(a_str_reply, l_str_tmp->str);
dap_string_free(l_str_tmp, false);
return 0;
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Error! Need both -net <network name> and -chain <chain name> params\n");
return -2;
}
}
/**
* @brief com_mempool_delete
* @param argc
* @param argv
* @param arg_func
* @param a_str_reply
* @return
*/
int com_mempool_delete(int argc, char ** argv, char ** a_str_reply)
{
int arg_index = 1;
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
const char * l_hash_out_type = NULL;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-H", &l_hash_out_type);
if(!l_hash_out_type)
l_hash_out_type = "hex";
if(dap_strcmp(l_hash_out_type,"hex") && dap_strcmp(l_hash_out_type,"base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
if(dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index, argc, argv, a_str_reply, &l_chain, &l_net) != 0) {
//dap_chain_node_cli_set_reply_text(a_str_reply, "Error! Need both -net <network name> and -chain <chain name> params\n");
return -1;
}
if(l_chain && l_net) { // UNUSED(l_net)
const char * l_datum_hash_str = NULL;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-datum", &l_datum_hash_str);
if(l_datum_hash_str) {
char *l_datum_hash_hex_str;
char *l_datum_hash_base58_str;
// datum hash may be in hex or base58 format
if(!dap_strncmp(l_datum_hash_str, "0x", 2) || !dap_strncmp(l_datum_hash_str, "0X", 2)) {
l_datum_hash_hex_str = dap_strdup(l_datum_hash_str);
l_datum_hash_base58_str = dap_enc_base58_from_hex_str_to_str(l_datum_hash_str);
}
else {
l_datum_hash_hex_str = dap_enc_base58_to_hex_str_from_str(l_datum_hash_str);
l_datum_hash_base58_str = dap_strdup(l_datum_hash_str);
}
char * l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_new(l_chain);
uint8_t *l_data_tmp = l_datum_hash_hex_str ? dap_chain_global_db_gr_get(l_datum_hash_hex_str, NULL, l_gdb_group_mempool) : NULL;
if(l_data_tmp && dap_global_db_del_sync(l_gdb_group_mempool, l_datum_hash_hex_str) == 0) {
if(!dap_strcmp(l_hash_out_type,"hex"))
dap_chain_node_cli_set_reply_text(a_str_reply, "Datum %s deleted", l_datum_hash_hex_str);
else
dap_chain_node_cli_set_reply_text(a_str_reply, "Datum %s deleted", l_datum_hash_base58_str);
return 0;
} else {
if(!dap_strcmp(l_hash_out_type,"hex"))
dap_chain_node_cli_set_reply_text(a_str_reply, "Error! Can't find datum %s", l_datum_hash_hex_str);
else
dap_chain_node_cli_set_reply_text(a_str_reply, "Error! Can't find datum %s", l_datum_hash_base58_str);
return -4;
}
DAP_DELETE(l_gdb_group_mempool);
DAP_DELETE(l_data_tmp);
DAP_DELETE(l_datum_hash_hex_str);
DAP_DELETE(l_datum_hash_base58_str);
} else {
dap_chain_node_cli_set_reply_text(a_str_reply, "Error! %s requires -datum <datum hash> option", argv[0]);
return -3;
}
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Error! Need both -net <network name> and -chain <chain name> params\n");
return -2;
}
}
/**
* @brief com_mempool_proc
* process mempool datums
* @param argc
* @param argv
* @param arg_func
* @param a_str_reply
* @return
*/
int com_mempool_proc(int argc, char ** argv, char ** a_str_reply)
{
int arg_index = 1;
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
const char * l_hash_out_type = NULL;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-H", &l_hash_out_type);
if(!l_hash_out_type)
l_hash_out_type = "hex";
if(dap_strcmp(l_hash_out_type,"hex") && dap_strcmp(l_hash_out_type,"base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index, argc, argv, a_str_reply, &l_chain, &l_net);
if (!l_net || !l_chain)
return -1;
if(*a_str_reply) {
DAP_DELETE(*a_str_reply);
*a_str_reply = NULL;
}
char * l_gdb_group_mempool = NULL, *l_gdb_group_mempool_tmp;
l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_new(l_chain);
l_gdb_group_mempool_tmp = l_gdb_group_mempool;
// If full or light it doesnt work
if(dap_chain_net_get_role(l_net).enums>= NODE_ROLE_FULL){
dap_chain_node_cli_set_reply_text(a_str_reply, "Need master node role or higher for network %s to process this command", l_net->pub.name);
return -1;
}
const char * l_datum_hash_str = NULL;
int ret = 0;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-datum", &l_datum_hash_str);
if(l_datum_hash_str) {
char * l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_new(l_chain);
dap_string_t * l_str_tmp = dap_string_new(NULL);
size_t l_datum_size=0;
const char *l_datum_hash_out_str;
char *l_datum_hash_hex_str;
char *l_datum_hash_base58_str;
// datum hash may be in hex or base58 format
if(!dap_strncmp(l_datum_hash_str, "0x", 2) || !dap_strncmp(l_datum_hash_str, "0X", 2)) {
l_datum_hash_hex_str = dap_strdup(l_datum_hash_str);
l_datum_hash_base58_str = dap_enc_base58_from_hex_str_to_str(l_datum_hash_str);
}
else {
l_datum_hash_hex_str = dap_enc_base58_to_hex_str_from_str(l_datum_hash_str);
l_datum_hash_base58_str = dap_strdup(l_datum_hash_str);
}
if(!dap_strcmp(l_hash_out_type,"hex"))
l_datum_hash_out_str = l_datum_hash_hex_str;
else
l_datum_hash_out_str = l_datum_hash_base58_str;
dap_chain_datum_t * l_datum = l_datum_hash_hex_str ? (dap_chain_datum_t*) dap_chain_global_db_gr_get(l_datum_hash_hex_str,
&l_datum_size, l_gdb_group_mempool) : NULL;
size_t l_datum_size2= l_datum? dap_chain_datum_size( l_datum): 0;
if (l_datum_size != l_datum_size2 ){
ret = -8;
dap_chain_node_cli_set_reply_text(a_str_reply, "Error! Corrupted datum %s, size by datum headers is %zd when in mempool is only %zd bytes",
l_datum_hash_hex_str, l_datum_size2, l_datum_size);
}else{
if(l_datum) {
char buf[50];
dap_time_t l_ts_create = (dap_time_t)l_datum->header.ts_create;
const char *l_type = NULL;
DAP_DATUM_TYPE_STR(l_datum->header.type_id, l_type);
dap_string_append_printf(l_str_tmp, "hash %s: type_id=%s ts_create=%s data_size=%u\n",
l_datum_hash_out_str, l_type,
dap_ctime_r(&l_ts_create, buf), l_datum->header.data_size);
int l_verify_datum= dap_chain_net_verify_datum_for_add( l_net, l_datum) ;
if (l_verify_datum != 0){
dap_string_append_printf(l_str_tmp, "Error! Datum doesn't pass verifications (code %d) examine node log files",
l_verify_datum);
ret = -9;
}else{
if (l_chain->callback_add_datums){
if (l_chain->callback_add_datums(l_chain, &l_datum, 1) ==0 ){
dap_string_append_printf(l_str_tmp, "Error! Datum doesn't pass verifications, examine node log files");
ret = -6;
}else{
dap_string_append_printf(l_str_tmp, "Datum processed well. ");
if ( dap_global_db_del_sync( l_gdb_group_mempool, l_datum_hash_hex_str) != 0){
dap_string_append_printf(l_str_tmp, "Warning! Can't delete datum from mempool!");
}else
dap_string_append_printf(l_str_tmp, "Removed datum from mempool.");
}
}else{
dap_string_append_printf(l_str_tmp, "Error! Can't move to no-concensus chains from mempool");
ret = -1;
}
}
dap_string_append_printf(l_str_tmp, "\n");
dap_chain_node_cli_set_reply_text(a_str_reply, l_str_tmp->str);
dap_string_free(l_str_tmp, true);
} else {
dap_chain_node_cli_set_reply_text(a_str_reply, "Error! Can't find datum %s", l_datum_hash_str);
ret = -4;
}
}
DAP_DELETE(l_gdb_group_mempool);
DAP_DELETE(l_datum_hash_hex_str);
DAP_DELETE(l_datum_hash_base58_str);
} else {
dap_chain_node_cli_set_reply_text(a_str_reply, "Error! %s requires -datum <datum hash> option", argv[0]);
ret = -5;
}
return ret;
}
/**
* @brief com_token_decl_update
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return
* @details token_update -net <net name> -chain <chain name> -token <token ticker> [-type private] -flags [<Flag 1>][,<Flag 2>]...[,<Flag N>]... [-<Param name 1> <Param Value 1>] [-Param name 2> <Param Value 2>] ...[-<Param Name N> <Param Value N>]\n"
* \t Update token for <netname>:<chain name> with ticker <token ticker>, flags <Flag 1>,<Flag2>...<Flag N>"
* \t and custom parameters list <Param 1>, <Param 2>...<Param N>."
* \n"
* ==Flags=="
* \t ALL_BLOCKED:\t Blocked all permissions, usefull add it first and then add allows what you want to allow\n"
* \t ALL_ALLOWED:\t Allowed all permissions if not blocked them. Be careful with this mode\n"
* \t ALL_FROZEN:\t All permissions are temprorary frozen\n"
* \t ALL_UNFROZEN:\t Unfrozen permissions\n"
* \t STATIC_ALL:\t No token manipulations after declarations at all. Token declares staticly and can't variabed after\n"
* \t STATIC_FLAGS:\t No token manipulations after declarations with flags\n"
* \t STATIC_PERMISSIONS_ALL:\t No all permissions lists manipulations after declarations\n"
* \t STATIC_PERMISSIONS_DATUM_TYPE:\t No datum type permissions lists manipulations after declarations\n"
* \t STATIC_PERMISSIONS_TX_SENDER:\t No tx sender permissions lists manipulations after declarations\n"
* \t STATIC_PERMISSIONS_TX_RECEIVER:\t No tx receiver permissions lists manipulations after declarations\n"
"\n"
"==Params==\n"
"General:\n"
"\t -flags_set <value>:\t Set list of flags from <value> to token declaration\n"
"\t -flags_unset <value>:\t Unset list of flags from <value> from token declaration\n"
"\t -total_supply <value>:\t Set total supply - emission's maximum - to the <value>\n"
"\t -total_signs_valid <value>:\t Set valid signatures count's minimum\n"
"\t -total_signs_add <value>:\t Add signature's pkey fingerprint to the list of owners\n"
"\t -total_signs_remove <value>:\t Remove signature's pkey fingerprint from the owners\n"
"\nDatum type allowed/blocked updates:\n"
"\t -datum_type_allowed_add <value>:\t Add allowed datum type(s)\n"
"\t -datum_type_allowed_remove <value>:\t Remove datum type(s) from allowed\n"
"\t -datum_type_blocked_add <value>:\t Add blocked datum type(s)\n"
"\t -datum_type_blocked_remove <value>:\t Remove datum type(s) from blocked\n"
"\nTx receiver addresses allowed/blocked updates:\n"
"\t -tx_receiver_allowed_add <value>:\t Add allowed tx receiver(s)\n"
"\t -tx_receiver_allowed_remove <value>:\t Remove tx receiver(s) from allowed\n"
"\t -tx_receiver_blocked_add <value>:\t Add blocked tx receiver(s)\n"
"\t -tx_receiver_blocked_remove <value>:\t Remove tx receiver(s) from blocked\n"
"\n Tx sender addresses allowed/blocked updates:\n"
"\t -tx_sender_allowed_add <value>:\t Add allowed tx sender(s)\n"
"\t -tx_sender_allowed_remove <value>:\t Remove tx sender(s) from allowed\n"
"\t -tx_sender_blocked_add <value>:\t Add allowed tx sender(s)\n"
"\t -tx_sender_blocked_remove <value>:\t Remove tx sender(s) from blocked\n"
"\n"
*/
int com_token_update(int a_argc, char ** a_argv, char ** a_str_reply)
{
int l_arg_index = 1;
const char * l_type_str = NULL;
uint16_t l_type = DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_UPDATE;
const char * l_ticker = NULL;
uint16_t l_signs_total = 0;
dap_cert_t ** l_certs = NULL;
size_t l_certs_count = 0;
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
const char * l_hash_out_type = NULL;
dap_chain_node_cli_find_option_val(a_argv, l_arg_index, a_argc, "-H", &l_hash_out_type);
if(!l_hash_out_type)
l_hash_out_type = "hex";
if(dap_strcmp(l_hash_out_type, "hex") && dap_strcmp(l_hash_out_type, "base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
if (dap_chain_node_cli_cmd_values_parse_net_chain(&l_arg_index, a_argc, a_argv, a_str_reply, &l_chain, &l_net))
return -1;
// Token ticker
l_arg_index=dap_chain_node_cli_find_option_val(a_argv, l_arg_index, a_argc, "-token", &l_ticker);
// Check for ticker
if(!l_ticker) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_update requires parameter 'token'");
return -2;
}
// Token type
l_arg_index=dap_chain_node_cli_find_option_val(a_argv, l_arg_index, a_argc, "-type", &l_type_str);
if (l_type_str && strcmp(l_type_str, "private")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_update can't accept type \"%s\"", l_type_str);
return -22;
}
dap_chain_datum_token_t * l_datum_token_update = NULL;
size_t l_datum_data_offset = 0;
uint32_t l_sign_counter = 0;
switch(l_type){
case DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_UPDATE: // 256
case DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_UPDATE: {
dap_list_t *l_tsd_list = dap_list_alloc();
size_t l_tsd_total_size = 0;
l_arg_index++;
while (l_arg_index<a_argc-1){
char * l_arg_param= a_argv[l_arg_index+1];
if ( strcmp( a_argv[l_arg_index],"-flags_set" )==0){ // Flags
char ** l_str_flags = NULL;
l_str_flags = dap_strsplit( l_arg_param,",",0xffff );
uint16_t l_flags = 0;
while (l_str_flags && *l_str_flags){
uint16_t l_flag = dap_chain_datum_token_flag_from_str(*l_str_flags);
if ( l_flag == DAP_CHAIN_DATUM_TOKEN_FLAG_UNDEFINED ){
dap_chain_node_cli_set_reply_text(a_str_reply, "Flag can't be \"%s\"",*l_str_flags);
return -20;
}
l_flags |= (1<<l_flag);
l_str_flags++;
}
// Add flags as set_flags TDS section
dap_tsd_t * l_tsd = dap_tsd_create_scalar(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_SET_FLAGS, l_flags);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-flags_unset" )==0){ // Flags
char ** l_str_flags = NULL;
l_str_flags = dap_strsplit( l_arg_param,",",0xffff );
uint16_t l_flags = 0;
while (l_str_flags && *l_str_flags ){
uint16_t l_flag = dap_chain_datum_token_flag_from_str(*l_str_flags);
if ( l_flag == DAP_CHAIN_DATUM_TOKEN_FLAG_UNDEFINED ){
dap_chain_node_cli_set_reply_text(a_str_reply, "Flag can't be \"%s\"",*l_str_flags);
return -20;
}
l_flags |= l_flag;
l_str_flags++;
}
// Add flags as unset_flags TDS section
dap_tsd_t * l_tsd = dap_tsd_create_scalar(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_UNSET_FLAGS, l_flags);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-signs" )==0){
dap_cert_parse_str_list(l_arg_param, &l_certs, &l_certs_count);
if(!l_certs_count) {
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_update command requres at least one valid certificate to sign the basic transaction of emission");
return -10;
}
} else if ( strcmp( a_argv[l_arg_index],"-total_supply" )==0){ // Total supply
dap_tsd_t * l_tsd;
uint256_t l_param_value = dap_chain_balance_scan(l_arg_param);
l_tsd = dap_tsd_create_scalar(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TOTAL_SUPPLY, l_param_value);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-total_signs_valid" )==0){ // Signs valid
uint16_t l_param_value = (uint16_t)atoi(l_arg_param);
l_signs_total = l_param_value;
dap_tsd_t * l_tsd = dap_tsd_create_scalar(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TOTAL_SIGNS_VALID, l_param_value);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-datum_type_allowed_add" )==0){ // Datum type allowed add
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_DATUM_TYPE_ALLOWED_ADD, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-datum_type_allowed_remove" )==0){ // Datum type allowed remove
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_DATUM_TYPE_ALLOWED_REMOVE, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-datum_type_blocked_add" )==0){ // Datum type blocked add
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_DATUM_TYPE_BLOCKED_ADD, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-datum_type_blocked_remove" )==0){ // Datum type blocked remove
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_DATUM_TYPE_BLOCKED_REMOVE, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_receiver_allowed_add" )==0){ // TX Receiver add
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_ALLOWED_ADD, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_receiver_allowed_remove" )==0){ // TX Receiver remove
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_ALLOWED_REMOVE, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_receiver_blocked_add" )==0){ // TX Receiver blocked add
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_BLOCKED_ADD, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_receiver_blocked_remove" )==0){ // TX Receiver blocked remove
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_BLOCKED_REMOVE, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_sender_allowed_add" )==0){ // TX Sender allowed add
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_ALLOWED_ADD, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_sender_allowed_remove" )==0){ // TX Sender allowed remove
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_ALLOWED_REMOVE, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_sender_blocked_add" )==0){ // TX Sender blocked add
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_BLOCKED_ADD, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
}else if ( strcmp( a_argv[l_arg_index],"-tx_sender_blocked_remove" )==0){ // TX Sender blocked remove
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_BLOCKED_REMOVE, l_arg_param);
dap_list_append( l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size( l_tsd);
} else if (strcmp( a_argv[l_arg_index], "-chain") && strcmp( a_argv[l_arg_index], "-net") &&
strcmp( a_argv[l_arg_index], "-token") && !strcmp( a_argv[l_arg_index], "-type")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Unknown param \"%s\"",a_argv[l_arg_index]);
return -20;
}
l_arg_index+=2;
}
if (!l_tsd_total_size) {
dap_chain_node_cli_set_reply_text(a_str_reply, "No valid params to update");
return -21;
}
// If we have more certs than we need signs - use only first part of the list
if(l_certs_count > l_signs_total)
l_certs_count = l_signs_total;
// Create new datum token
l_datum_token_update = DAP_NEW_Z_SIZE(dap_chain_datum_token_t, sizeof(dap_chain_datum_token_t)+l_tsd_total_size ) ;
l_datum_token_update->type = DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_UPDATE; // 256
dap_snprintf(l_datum_token_update->ticker, sizeof(l_datum_token_update->ticker), "%s", l_ticker);
l_datum_token_update->header_private_update.tsd_total_size = l_tsd_total_size;
// Sign header with all certificates in the list and add signs to the end of token update
uint16_t l_sign_counter = 0;
l_datum_token_update = s_sign_cert_in_cycle(l_certs, l_datum_token_update, l_certs_count, &l_tsd_total_size,
&l_sign_counter);
l_datum_token_update->signs_total = l_sign_counter;
// Add TSD sections in the end
for ( dap_list_t* l_iter=dap_list_first(l_tsd_list); l_iter; l_iter=l_iter->next){
dap_tsd_t * l_tsd = (dap_tsd_t *) l_iter->data;
size_t l_tsd_size = dap_tsd_size( l_tsd);
memcpy(l_datum_token_update->data_n_tsd + l_datum_data_offset, l_tsd, l_tsd_size);
l_datum_data_offset += l_tsd_size;
}
}break;
default:
dap_chain_node_cli_set_reply_text(a_str_reply,
"Unknown token type");
return -8;
}
if (l_sign_counter == 0)
{
dap_chain_node_cli_set_reply_text(a_str_reply,
"Token declaration failed. Successful count of certificate signing is 0");
return -9;
}
dap_chain_datum_t * l_datum = dap_chain_datum_create(DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_UPDATE, l_datum_token_update,
sizeof(l_datum_token_update->header_simple) + l_datum_data_offset);
size_t l_datum_size = dap_chain_datum_size(l_datum);
// Calc datum's hash
dap_chain_hash_fast_t l_key_hash;
dap_hash_fast(l_datum, l_datum_size, &l_key_hash);
char * l_key_str = dap_chain_hash_fast_to_str_new(&l_key_hash);
char * l_key_str_base58 = dap_enc_base58_encode_hash_to_str(&l_key_hash);
// Add datum to mempool with datum_token_update hash as a key
char * l_gdb_group_mempool;
if(l_chain) {
l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_new(l_chain);
}
else {
l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_by_chain_type(l_net, CHAIN_TYPE_TOKEN);
}
if(dap_chain_global_db_gr_set(dap_strdup(l_key_str), (uint8_t *) l_datum, l_datum_size, l_gdb_group_mempool)) {
if(!dap_strcmp(l_hash_out_type,"hex"))
dap_chain_node_cli_set_reply_text(a_str_reply, "datum %s with token update %s is placed in datum pool ", l_key_str, l_ticker);
else
dap_chain_node_cli_set_reply_text(a_str_reply, "datum %s with token update %s is placed in datum pool ", l_key_str_base58, l_ticker);
DAP_DELETE(l_datum);
DAP_DELETE(l_datum_token_update);
DAP_DELETE(l_gdb_group_mempool);
DAP_DELETE(l_key_str);
DAP_DELETE(l_key_str_base58);
return 0;
}
else {
if(!dap_strcmp(l_hash_out_type,"hex"))
dap_chain_node_cli_set_reply_text(a_str_reply, "datum tx %s is not placed in datum pool ", l_key_str);
else
dap_chain_node_cli_set_reply_text(a_str_reply, "datum tx %s is not placed in datum pool ", l_key_str_base58);
DAP_DELETE(l_datum);
DAP_DELETE(l_datum_token_update);
DAP_DELETE(l_gdb_group_mempool);
DAP_DELETE(l_key_str);
DAP_DELETE(l_key_str_base58);
return -2;
}
}
/**
* @brief
*
* @param a_tx_address
* @param l_tsd_list
* @param l_tsd_total_size
* @param flag
* @return dap_list_t*
*/
dap_list_t* s_parse_wallet_addresses(const char *a_tx_address, dap_list_t *l_tsd_list, size_t *l_tsd_total_size, uint32_t flag)
{
if (!a_tx_address){
log_it(L_DEBUG,"a_tx_address is null");
return l_tsd_list;
}
char ** l_str_wallet_addr = NULL;
l_str_wallet_addr = dap_strsplit(a_tx_address,",",0xffff);
if (!l_str_wallet_addr){
log_it(L_DEBUG,"Error in wallet addresses array parsing in tx_receiver_allowed parameter");
return l_tsd_list;
}
while (l_str_wallet_addr && *l_str_wallet_addr){
log_it(L_DEBUG,"Processing wallet address: %s", *l_str_wallet_addr);
dap_chain_addr_t *addr_to = dap_chain_addr_from_str(*l_str_wallet_addr);
if (addr_to){
dap_tsd_t * l_tsd = dap_tsd_create(flag, addr_to, sizeof(dap_chain_addr_t));
l_tsd_list = dap_list_append(l_tsd_list, l_tsd);
*l_tsd_total_size += dap_tsd_size(l_tsd);
}else{
log_it(L_DEBUG,"Error in wallet address parsing");
}
l_str_wallet_addr++;
}
return l_tsd_list;
}
typedef struct _dap_cli_token_additional_params {
const char* flags;
const char* total_signs_valid;
const char* datum_type_allowed;
const char* datum_type_blocked;
const char* tx_receiver_allowed;
const char* tx_receiver_blocked;
const char* tx_sender_allowed;
const char* tx_sender_blocked;
} dap_cli_token_additional_params;
typedef struct _dap_sdk_cli_params {
const char* l_hash_out_type;
dap_chain_t * l_chain;
dap_chain_net_t * l_net;
const char* l_chain_str;
const char* l_net_str;
const char* l_ticker;
const char* l_type_str;
uint16_t l_type;
const char* l_certs_str;
uint16_t l_signs_total;
uint16_t l_signs_emission;
uint256_t l_total_supply;
const char* l_decimals_str;
dap_cli_token_additional_params ext;
} dap_sdk_cli_params, *pdap_sdk_cli_params;
int s_parse_common_token_decl_arg(int a_argc, char ** a_argv, char ** a_str_reply, dap_sdk_cli_params* l_params)
{
l_params->l_type = DAP_CHAIN_DATUM_TOKEN_TYPE_SIMPLE;
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-H", &l_params->l_hash_out_type);
if(!l_params->l_hash_out_type)
l_params->l_hash_out_type = "hex";
if(dap_strcmp(l_params->l_hash_out_type,"hex") && dap_strcmp(l_params->l_hash_out_type,"base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
int l_arg_index = 0;
int l_res = dap_chain_node_cli_cmd_values_parse_net_chain(&l_arg_index, a_argc, a_argv, a_str_reply, &l_params->l_chain, &l_params->l_net);
if(!l_params->l_net || !l_params->l_chain)
return l_res;
else {
if(*a_str_reply) {
DAP_DELETE(*a_str_reply);
*a_str_reply = NULL;
}
}
//net name
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-net", &l_params->l_net_str);
//chainname
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-chain", &l_params->l_chain_str);
//token_ticker
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-token", &l_params->l_ticker);
// Token type
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-type", &l_params->l_type_str);
if (l_params->l_type_str) {
if (strcmp(l_params->l_type_str, "private") == 0){
l_params->l_type = DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_DECL; // 256
}else if (strcmp(l_params->l_type_str, "private_simple") == 0){
l_params->l_type = DAP_CHAIN_DATUM_TOKEN_TYPE_SIMPLE; // 256
}else if (strcmp(l_params->l_type_str, "public_simple") == 0){
l_params->l_type = DAP_CHAIN_DATUM_TOKEN_TYPE_PUBLIC; // 256
}else if (strcmp(l_params->l_type_str, "CF20") == 0){
l_params->l_type = DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_DECL; // 256
}else{
dap_chain_node_cli_set_reply_text(a_str_reply,
"Unknown token type %s was specified. Supported types:\n"
" private_simple\n"
" private\n"
" CF20\n"
"Default token type is private_simple.\n", l_params->l_type_str);
return -1;
}
}
// Certificates thats will be used to sign currend datum token
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-certs", &l_params->l_certs_str);
// Signs number thats own emissioncan't find
const char* l_signs_total_str = NULL;
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-signs_total", &l_signs_total_str);
// Signs total
char* l_tmp = NULL;
if(l_signs_total_str){
if((l_params->l_signs_total = (uint16_t) strtol(l_signs_total_str, &l_tmp, 10)) == 0){
dap_chain_node_cli_set_reply_text(a_str_reply,
"'signs_total' parameter must be unsigned integer value that fits in 2 bytes");
return -8;
}
}
// Signs minimum number thats need to authorize the emission
const char* l_signs_emission_str = NULL;
l_tmp = NULL;
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-signs_emission", &l_signs_emission_str);
if (l_signs_emission_str){
if((l_params->l_signs_emission = (uint16_t) strtol(l_signs_emission_str, &l_tmp, 10)) == 0){
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_decl requires parameter 'signs_emission' to be unsigned integer value that fits in 2 bytes");
return -6;
}
}
// Total supply value
const char* l_total_supply_str = NULL;
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-total_supply", &l_total_supply_str);
if (l_total_supply_str){
l_params->l_total_supply = dap_chain_balance_scan(l_total_supply_str);
if (IS_ZERO_256(l_params->l_total_supply)){
dap_chain_node_cli_set_reply_text(a_str_reply, "'-total_supply' must be unsigned integer value that fits in 8 bytes");
return -4;
}
}
// Total supply value
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-decimals", &l_params->l_decimals_str);
return 0;
}
int s_parse_additional_token_decl_arg(int a_argc, char ** a_argv, char ** a_str_reply, dap_sdk_cli_params* l_params)
{
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-flags", &l_params->ext.flags);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-total_signs_valid", &l_params->ext.total_signs_valid);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-datum_type_allowed", &l_params->ext.datum_type_allowed);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-datum_type_blocked", &l_params->ext.datum_type_blocked);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-tx_receiver_allowed", &l_params->ext.tx_receiver_allowed);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-tx_receiver_blocked", &l_params->ext.tx_receiver_blocked);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-tx_sender_allowed", &l_params->ext.tx_sender_allowed);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-tx_receiver_allowed", &l_params->ext.tx_receiver_allowed);
dap_chain_node_cli_find_option_val(a_argv, 0, a_argc, "-tx_sender_blocked", &l_params->ext.tx_sender_blocked);
return 0;
}
int s_token_decl_check_params(int a_argc, char ** a_argv, char ** a_str_reply, dap_sdk_cli_params* l_params)
{
int l_parse_params = s_parse_common_token_decl_arg(a_argc,a_argv,a_str_reply,l_params);
if (l_parse_params)
return l_parse_params;
l_parse_params = s_parse_additional_token_decl_arg(a_argc,a_argv,a_str_reply,l_params);
if (l_parse_params)
return l_parse_params;
dap_chain_datum_token_t * l_datum_token = NULL;
size_t l_datum_data_offset = 0;
//DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_DECL uses decimals parameter
if (l_params->l_type == DAP_CHAIN_DATUM_TOKEN_TYPE_SIMPLE || l_params->l_type == DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_DECL){
if(IS_ZERO_256(l_params->l_total_supply)) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_decl requires parameter '-total_supply'");
return -3;
}
}
if (!l_params->l_signs_emission){
dap_chain_node_cli_set_reply_text(a_str_reply, "token_decl requires parameter '-signs_emission'");
return -5;
}
if (!l_params->l_signs_total){
dap_chain_node_cli_set_reply_text(a_str_reply, "token_decl requires parameter 'signs_total'");
return -7;
}
if(!l_params->l_ticker){
dap_chain_node_cli_set_reply_text(a_str_reply, "token_decl requires parameter '-token'");
return -2;
}
// check l_decimals in CF20 token
if (l_params->l_type == DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_DECL){
if(!l_params->l_decimals_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_decl requires parameter '-decimals'");
return -3;
} else if (dap_strcmp(l_params->l_decimals_str, "18")) {
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_decl support '-decimals' to be 18 only");
return -4;
}
}
// Check certs list
if(!l_params->l_certs_str){
dap_chain_node_cli_set_reply_text(a_str_reply, "token_decl requires parameter 'certs'");
return -9;
}
return 0;
}
/**
* @brief com_token_decl
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return
* @details token_decl -net <net name> -chain <chain name> -token <token ticker> -total_supply <total supply> -signs_total <sign total> -signs_emission <signs for emission> -certs <certs list>\n"
* \t Declare new simple token for <netname>:<chain name> with ticker <token ticker>, maximum emission <total supply> and <signs for emission> from <signs total> signatures on valid emission\n"
* \t Extended private token declaration\n"
* \t token_decl -net <net name> -chain <chain name> -token <token ticker> -type private -flags [<Flag 1>][,<Flag 2>]...[,<Flag N>]... [-<Param name 1> <Param Value 1>] [-Param name 2> <Param Value 2>] ...[-<Param Name N> <Param Value N>]\n"
* \t Declare new token for <netname>:<chain name> with ticker <token ticker>, flags <Flag 1>,<Flag2>...<Flag N>"
* \t and custom parameters list <Param 1>, <Param 2>...<Param N>."
* \n"
* ==Flags=="
* \t ALL_BLOCKED:\t Blocked all permissions, usefull add it first and then add allows what you want to allow\n"
* \t ALL_ALLOWED:\t Allowed all permissions if not blocked them. Be careful with this mode\n"
* \t ALL_FROZEN:\t All permissions are temprorary frozen\n"
* \t ALL_UNFROZEN:\t Unfrozen permissions\n"
* \t STATIC_ALL:\t No token manipulations after declarations at all. Token declares staticly and can't variabed after\n"
* \t STATIC_FLAGS:\t No token manipulations after declarations with flags\n"
* \t STATIC_PERMISSIONS_ALL:\t No all permissions lists manipulations after declarations\n"
* \t STATIC_PERMISSIONS_DATUM_TYPE:\t No datum type permissions lists manipulations after declarations\n"
* \t STATIC_PERMISSIONS_TX_SENDER:\t No tx sender permissions lists manipulations after declarations\n"
* \t STATIC_PERMISSIONS_TX_RECEIVER:\t No tx receiver permissions lists manipulations after declarations\n"
"\n"
"==Params==\n"
"General:\n"
"\t -flags <value>:\t Set list of flags from <value> to token declaration\n"
"\t -total_supply <value>:\t Set total supply - emission's maximum - to the <value>\n"
"\t -signs_valid <value>:\t Set valid signatures count's minimum\n"
"\t -signs <value>:\t Add signature's pkey fingerprint to the list of owners\n"
"\nDatum type allowed/blocked:\n"
"\t -datum_type_allowed <value>:\t Allowed datum type(s)\n"
"\t -datum_type_blocked <value>:\t Blocked datum type(s)\n"
"\nTx receiver addresses allowed/blocked:\n"
"\t -tx_receiver_allowed <value>:\t Allowed tx receiver(s)\n"
"\t -tx_receiver_blocked <value>:\t Blocked tx receiver(s)\n"
"\n Tx sender addresses allowed/blocked:\n"
"\t -tx_sender_allowed <value>:\t Allowed tx sender(s)\n"
"\t -tx_sender_blocked <value>:\t Blocked tx sender(s)\n"
"\n"
*/
int com_token_decl(int a_argc, char ** a_argv, char ** a_str_reply)
{
int l_arg_index = 1;
const char * l_ticker = NULL;
uint256_t l_total_supply = {}; // 256
uint16_t l_signs_emission = 0;
uint16_t l_signs_total = 0;
dap_cert_t ** l_certs = NULL;
size_t l_certs_count = 0;
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
const char * l_hash_out_type = NULL;
dap_sdk_cli_params* l_params = DAP_NEW_Z(dap_sdk_cli_params);
if (!l_params)
return -1;
l_params->l_type = DAP_CHAIN_DATUM_TOKEN_TYPE_SIMPLE;
int l_parse_params = s_token_decl_check_params(a_argc,a_argv,a_str_reply,l_params);
if (l_parse_params)
return l_parse_params;
dap_chain_datum_token_t * l_datum_token = NULL;
size_t l_datum_data_offset = 0;
// Load certs lists
dap_cert_parse_str_list(l_params->l_certs_str, &l_certs, &l_certs_count);
if(!l_certs_count){
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_decl command requres at least one valid certificate to sign token");
return -10;
}
l_signs_emission = l_params->l_signs_emission;
l_signs_total = l_params->l_signs_total;
l_total_supply = l_params->l_total_supply;
l_chain = l_params->l_chain;
l_net = l_params->l_net;
l_ticker = l_params->l_ticker;
l_hash_out_type = l_params->l_hash_out_type;
switch(l_params->l_type)
{
case DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_DECL:
case DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_DECL:
{ // 256
dap_list_t *l_tsd_list = NULL;
size_t l_tsd_total_size = 0;
uint16_t l_flags = 0;
char ** l_str_flags = NULL;
if (l_params->ext.flags){ // Flags
l_str_flags = dap_strsplit(l_params->ext.flags,",",0xffff );
while (l_str_flags && *l_str_flags){
uint16_t l_flag = dap_chain_datum_token_flag_from_str(*l_str_flags);
if (l_flag == DAP_CHAIN_DATUM_TOKEN_FLAG_UNDEFINED ){
dap_chain_node_cli_set_reply_text(a_str_reply, "Flag can't be \"%s\"",*l_str_flags);
return -20;
}
l_flags |= l_flag; // if we have multiple flags
l_str_flags++;
}
}
if (l_params->ext.total_signs_valid){ // Signs valid
uint16_t l_param_value = (uint16_t)atoi(l_params->ext.total_signs_valid);
l_signs_total = l_param_value;
dap_tsd_t * l_tsd = dap_tsd_create_scalar(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TOTAL_SIGNS_VALID, l_param_value);
l_tsd_list = dap_list_append(l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size(l_tsd);
}
if (l_params->ext.datum_type_allowed){
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_DATUM_TYPE_ALLOWED_ADD, l_params->ext.datum_type_allowed);
l_tsd_list = dap_list_append(l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size(l_tsd);
}
if (l_params->ext.datum_type_blocked){
dap_tsd_t * l_tsd = dap_tsd_create_string(
DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_DATUM_TYPE_BLOCKED_ADD, l_params->ext.datum_type_blocked);
l_tsd_list = dap_list_append(l_tsd_list, l_tsd);
l_tsd_total_size+= dap_tsd_size(l_tsd);
}
if (l_params->ext.tx_receiver_allowed)
l_tsd_list = s_parse_wallet_addresses(l_params->ext.tx_receiver_allowed, l_tsd_list, &l_tsd_total_size, DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_ALLOWED_ADD);
if (l_params->ext.tx_receiver_blocked)
l_tsd_list = s_parse_wallet_addresses(l_params->ext.tx_receiver_blocked, l_tsd_list, &l_tsd_total_size, DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_BLOCKED_ADD);
if (l_params->ext.tx_sender_allowed)
l_tsd_list = s_parse_wallet_addresses(l_params->ext.tx_sender_allowed, l_tsd_list, &l_tsd_total_size, DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_ALLOWED_ADD);
if (l_params->ext.tx_sender_blocked)
l_tsd_list = s_parse_wallet_addresses(l_params->ext.tx_sender_blocked, l_tsd_list, &l_tsd_total_size, DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_BLOCKED_ADD);
// Create new datum token
l_datum_token = DAP_NEW_Z_SIZE(dap_chain_datum_token_t, sizeof(dap_chain_datum_token_t) + l_tsd_total_size) ;
l_datum_token->type = l_params->l_type;
if (l_params->l_type == DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_DECL) {
log_it(L_DEBUG,"Prepared TSD sections for private token on %zd total size", l_tsd_total_size);
dap_snprintf(l_datum_token->ticker, sizeof(l_datum_token->ticker), "%s", l_ticker);
l_datum_token->header_private_decl.flags = l_flags;
l_datum_token->total_supply = l_total_supply;
l_datum_token->signs_valid = l_signs_emission;
l_datum_token->header_private_decl.tsd_total_size = l_tsd_total_size;
} else { //DAP_CHAIN_DATUM_TOKEN_TYPE_NATIVE_DECL
log_it(L_DEBUG,"Prepared TSD sections for CF20 token on %zd total size", l_tsd_total_size);
dap_snprintf(l_datum_token->ticker, sizeof(l_datum_token->ticker), "%s", l_ticker);
l_datum_token->header_native_decl.flags = l_flags;
l_datum_token->signs_valid = l_signs_emission;
l_datum_token->header_native_decl.tsd_total_size = l_tsd_total_size;
l_datum_token->header_native_decl.decimals = atoi(l_params->l_decimals_str);
}
// Add TSD sections in the end
for ( dap_list_t* l_iter=dap_list_first(l_tsd_list); l_iter; l_iter=l_iter->next){
dap_tsd_t * l_tsd = (dap_tsd_t *) l_iter->data;
if (l_tsd == NULL){
log_it(L_ERROR, "NULL tsd in list!");
continue;
}
switch (l_tsd->type){
case DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TOTAL_SIGNS_VALID:
log_it(L_DEBUG,"== TOTAL_SIGNS_VALID: %u",
dap_tsd_get_scalar(l_tsd,uint16_t) );
break;
case DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_DATUM_TYPE_ALLOWED_ADD:
log_it(L_DEBUG,"== DATUM_TYPE_ALLOWED_ADD: %s",
dap_tsd_get_string_const(l_tsd) );
break;
case DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_ALLOWED_ADD:
log_it(L_DEBUG,"== TX_SENDER_ALLOWED_ADD: binary data");
break;
case DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_SENDER_BLOCKED_ADD:
log_it(L_DEBUG,"== TYPE_TX_SENDER_BLOCKED: binary data");
break;
case DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_ALLOWED_ADD:
log_it(L_DEBUG,"== TX_RECEIVER_ALLOWED_ADD: binary data");
break;
case DAP_CHAIN_DATUM_TOKEN_TSD_TYPE_TX_RECEIVER_BLOCKED_ADD:
log_it(L_DEBUG,"== TX_RECEIVER_BLOCKED_ADD: binary data");
break;
default: log_it(L_DEBUG, "== 0x%04X: binary data %u size ",l_tsd->type, l_tsd->size );
}
size_t l_tsd_size = dap_tsd_size(l_tsd);
memcpy(l_datum_token->data_n_tsd + l_datum_data_offset, l_tsd, l_tsd_size);
l_datum_data_offset += l_tsd_size;
}
log_it(L_DEBUG, "%s token declaration '%s' initialized", l_params->l_type == DAP_CHAIN_DATUM_TOKEN_TYPE_PRIVATE_DECL ?
"Private" : "CF20", l_datum_token->ticker);
}break;//end
case DAP_CHAIN_DATUM_TOKEN_TYPE_SIMPLE: { // 256
l_datum_token = DAP_NEW_Z_SIZE(dap_chain_datum_token_t, sizeof(dap_chain_datum_token_t));
l_datum_token->type = DAP_CHAIN_DATUM_TOKEN_TYPE_SIMPLE; // 256
dap_snprintf(l_datum_token->ticker, sizeof(l_datum_token->ticker), "%s", l_ticker);
l_datum_token->total_supply = l_total_supply;
l_datum_token->signs_valid = l_signs_emission;
}break;
default:
dap_chain_node_cli_set_reply_text(a_str_reply,
"Unknown token type");
return -8;
}
// If we have more certs than we need signs - use only first part of the list
if(l_certs_count > l_signs_total)
l_certs_count = l_signs_total;
// Sign header with all certificates in the list and add signs to the end of TSD cetions
uint16_t l_sign_counter = 0;
l_datum_token = s_sign_cert_in_cycle(l_certs, l_datum_token, l_certs_count, &l_datum_data_offset, &l_sign_counter);
l_datum_token->signs_total = l_sign_counter;
// We skip datum creation opeartion, if count of signed certificates in s_sign_cert_in_cycle is 0.
// Usually it happen, when certificate in token_decl or token_update command doesn't contain private data or broken
if (!l_datum_token || l_datum_token->signs_total == 0){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Token declaration failed. Successful count of certificate signing is 0");
return -9;
}
dap_chain_datum_t * l_datum = dap_chain_datum_create(DAP_CHAIN_DATUM_TOKEN_DECL,
l_datum_token,
sizeof(*l_datum_token) + l_datum_data_offset);
DAP_DELETE(l_datum_token);
size_t l_datum_size = dap_chain_datum_size(l_datum);
// Calc datum's hash
dap_chain_hash_fast_t l_key_hash;
dap_hash_fast(l_datum, l_datum_size, &l_key_hash);
char * l_key_str = dap_chain_hash_fast_to_str_new(&l_key_hash);
char * l_key_str_out = dap_strcmp(l_hash_out_type, "hex") ?
dap_enc_base58_encode_hash_to_str(&l_key_hash) : l_key_str;
// Add datum to mempool with datum_token hash as a key
char * l_gdb_group_mempool;
if (l_chain)
l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_new(l_chain);
else
l_gdb_group_mempool = dap_chain_net_get_gdb_group_mempool_by_chain_type(l_net, CHAIN_TYPE_TOKEN);
if (!l_gdb_group_mempool) {
dap_chain_node_cli_set_reply_text(a_str_reply, "No suitable chain for placing token datum found");
DAP_DELETE(l_datum);
return -10;
}
int l_ret = 0;
bool l_placed = dap_chain_global_db_gr_set(l_key_str, (uint8_t *)l_datum, l_datum_size, l_gdb_group_mempool);
dap_chain_node_cli_set_reply_text(a_str_reply, "Datum %s with 256bit token %s is%s placed in datum pool",
l_key_str_out, l_ticker, l_placed ? "" : " not");
//additional checking for incorrect key format
if (l_key_str_out != l_key_str)
DAP_DELETE(l_key_str);
else
DAP_DELETE(l_key_str);
DAP_DELETE(l_datum);
DAP_DELETE(l_params);
if (!l_placed) {
l_ret = -2;
}
return l_ret;
}
/**
* @brief com_token_emit
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return
*/
int com_token_emit(int a_argc, char ** a_argv, char ** a_str_reply)
{
int arg_index = 1;
const char *str_tmp = NULL;
char *str_reply_tmp = NULL;
uint256_t l_emission_value = {};
const char * l_ticker = NULL;
const char * l_addr_str = NULL;
const char * l_emission_hash_str = NULL;
const char * l_emission_hash_str_remove = NULL;
dap_chain_hash_fast_t l_emission_hash, l_datum_emission_hash;
dap_chain_datum_token_emission_t *l_emission = NULL;
size_t l_emission_size;
const char * l_certs_str = NULL;
dap_cert_t ** l_certs = NULL;
size_t l_certs_size = 0;
const char * l_chain_emission_str = NULL;
dap_chain_t * l_chain_emission = NULL;
const char * l_chain_base_tx_str = NULL;
dap_chain_t * l_chain_base_tx = NULL;
dap_chain_net_t * l_net = NULL;
const char * l_hash_out_type = NULL;
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-H", &l_hash_out_type);
if(!l_hash_out_type)
l_hash_out_type = "hex";
if(dap_strcmp(l_hash_out_type,"hex") && dap_strcmp(l_hash_out_type,"base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index,a_argc,a_argv,a_str_reply,NULL, &l_net);
if( ! l_net) { // Can't find such network
return -43;
}
// Token emission
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-emission", &l_emission_hash_str);
// Emission certs
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-certs", &l_certs_str);
// Wallet address that recieves the emission
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-addr", &l_addr_str);
// Token ticker
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-token", &l_ticker);
if(!l_certs_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_emit requires parameter '-certs'");
return -4;
}
dap_cert_parse_str_list(l_certs_str, &l_certs, &l_certs_size);
if(!l_certs_size) {
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_emit command requres at least one valid certificate to sign the basic transaction of emission");
return -5;
}
const char *l_add_sign = NULL;
dap_chain_addr_t *l_addr = NULL;
dap_chain_node_cli_find_option_val(a_argv, arg_index, arg_index + 1, "sign", &l_add_sign);
if (!l_add_sign) { //Create the emission
// Emission value
if(dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-emission_value", &str_tmp)) {
l_emission_value = dap_chain_balance_scan(str_tmp);
}
if (IS_ZERO_256(l_emission_value)) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_emit requires parameter '-emission_value'");
return -1;
}
if(!l_addr_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_emit requires parameter '-addr'");
return -2;
}
if(!l_ticker) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_emit requires parameter '-token'");
return -3;
}
l_addr = dap_chain_addr_from_str(l_addr_str);
if(!l_addr) {
dap_chain_node_cli_set_reply_text(a_str_reply, "address \"%s\" is invalid", l_addr_str);
return -4;
}
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-chain_emission", &l_chain_emission_str);
if(l_chain_emission_str) {
if((l_chain_emission = dap_chain_net_get_chain_by_name(l_net, l_chain_emission_str)) == NULL) { // Can't find such chain
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_create requires parameter '-chain_emission' to be valid chain name in chain net %s",
l_net->pub.name);
return -45;
}
}
} else {
if (l_emission_hash_str) {
DL_FOREACH(l_net->pub.chains, l_chain_emission) {
l_emission = dap_chain_mempool_emission_get(l_chain_emission, l_emission_hash_str);
if (l_emission){
l_emission_hash_str_remove = l_emission_hash_str;
break;
}
}
if (!l_emission){
dap_chain_node_cli_set_reply_text(a_str_reply, "Can' find emission with hash \"%s\" for token %s on network %s",
l_emission_hash_str, l_ticker, l_net->pub.name);
return -32;
}
} else {
dap_chain_node_cli_set_reply_text(a_str_reply, "Subcommand 'sign' recuires parameter '-emission'");
return -31;
}
}
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-chain_base_tx", &l_chain_base_tx_str);
if(l_chain_base_tx_str) {
if((l_chain_base_tx = dap_chain_net_get_chain_by_name(l_net, l_chain_base_tx_str)) == NULL) { // Can't find such chain
dap_chain_node_cli_set_reply_text(a_str_reply,
"token_create requires parameter '-chain_base_tx' to be valid chain name in chain net %s", l_net->pub.name);
DAP_DELETE(l_addr);
return -47;
}
if(!l_ticker) {
dap_chain_node_cli_set_reply_text(a_str_reply, "token_emit requires parameter '-token'");
return -3;
}
}
if (!l_add_sign) {
if (!l_chain_emission)
l_chain_emission = dap_chain_net_get_chain_by_chain_type(l_net, CHAIN_TYPE_EMISSION);
// Create emission datum
l_emission = dap_chain_datum_emission_create(l_emission_value, l_ticker, l_addr);
}
//
//l_emission->data.type_auth.signs_count += l_certs_size;
// Then add signs
for(size_t i = 0; i < l_certs_size; i++)
l_emission = dap_chain_datum_emission_add_sign(l_certs[i]->enc_key, l_emission);
// Calc emission's hash
l_emission_size = dap_chain_datum_emission_get_size((uint8_t *)l_emission);
dap_hash_fast(l_emission, l_emission_size, &l_emission_hash);
// Produce datum
dap_chain_datum_t *l_datum_emission = dap_chain_datum_create(DAP_CHAIN_DATUM_TOKEN_EMISSION,
l_emission,
l_emission_size);
// Delete token emission
DAP_DEL_Z(l_emission);
char *l_gdb_group_mempool_emission = dap_chain_net_get_gdb_group_mempool_new(l_chain_emission);
size_t l_datum_emission_size = sizeof(l_datum_emission->header) + l_datum_emission->header.data_size;
// Calc datum emission's hash
dap_hash_fast(l_datum_emission, l_datum_emission_size, &l_datum_emission_hash);
// return 0 (false) if strings are equivalent
bool l_hex_format = dap_strcmp(l_hash_out_type, "hex") ? false
: true;
l_emission_hash_str = l_hex_format ? dap_chain_hash_fast_to_str_new(&l_datum_emission_hash)
: dap_enc_base58_encode_hash_to_str(&l_datum_emission_hash);
// Add token emission datum to mempool
bool l_placed = dap_chain_global_db_gr_set(l_emission_hash_str,
(uint8_t *)l_datum_emission,
l_datum_emission_size,
l_gdb_group_mempool_emission);
str_reply_tmp = dap_strdup_printf("Datum %s with 256bit emission is%s placed in datum pool",
l_emission_hash_str, l_placed ? "" : " not");
DAP_DEL_Z(l_emission_hash_str);
if (!l_placed) {
DAP_DEL_Z(l_datum_emission);
DAP_DEL_Z(l_certs);
return -1;
}
//remove previous emission datum from mempool if have new signed emission datum
if (l_emission_hash_str_remove)
dap_global_db_del_sync(l_gdb_group_mempool_emission, l_emission_hash_str_remove);
if(l_chain_base_tx) {
dap_chain_hash_fast_t *l_datum_tx_hash = dap_chain_mempool_base_tx_create(l_chain_base_tx, &l_emission_hash,
l_chain_emission->id, l_emission_value, l_ticker,
l_addr, l_certs, l_certs_size);
char *l_tx_hash_str = l_hex_format ? dap_chain_hash_fast_to_str_new(l_datum_tx_hash)
: dap_enc_base58_encode_hash_to_str(l_datum_tx_hash);
dap_chain_node_cli_set_reply_text(a_str_reply, "%s\nDatum %s with 256bit TX is%s placed in datum pool",
str_reply_tmp, l_tx_hash_str, l_placed ? "" : " not");
DAP_DEL_Z(l_tx_hash_str);
DAP_DEL_Z(str_reply_tmp);
} else{ // if transaction was not specified when emission was added we need output only emission result
dap_chain_node_cli_set_reply_text(a_str_reply, str_reply_tmp);
}
DAP_DEL_Z(str_reply_tmp);
DAP_DEL_Z(l_addr);
DAP_DEL_Z(l_certs);
return 0;
}
/**
* @brief com_tx_cond_create
* Create transaction
* com_tx_cond_create command
* @param a_argc
* @param a_argv
* @param a_str_reply
* @return int
*/
int com_tx_cond_create(int a_argc, char ** a_argv, char **a_str_reply)
{
(void) a_argc;
int arg_index = 1;
const char *c_wallets_path = dap_chain_wallet_get_path(g_config);
const char * l_token_ticker = NULL;
const char * l_wallet_str = NULL;
const char * l_cert_str = NULL;
const char * l_value_datoshi_str = NULL;
const char * l_net_name = NULL;
const char * l_unit_str = NULL;
const char * l_srv_uid_str = NULL;
uint256_t l_value_datoshi = {};
const char * l_hash_out_type = NULL;
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-H", &l_hash_out_type);
if(!l_hash_out_type)
l_hash_out_type = "hex";
if(dap_strcmp(l_hash_out_type,"hex") && dap_strcmp(l_hash_out_type,"base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
// Token ticker
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-token", &l_token_ticker);
// Wallet name - from
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-wallet", &l_wallet_str);
// Public certifiacte of condition owner
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-cert", &l_cert_str);
// value datoshi
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-value", &l_value_datoshi_str);
// net
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-net", &l_net_name);
// unit
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-unit", &l_unit_str);
// service
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-srv_uid", &l_srv_uid_str);
if(!l_token_ticker) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_cond_create requires parameter '-token'");
return -1;
}
if (!l_wallet_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_cond_create requires parameter '-wallet'");
return -2;
}
if (!l_cert_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_cond_create requires parameter '-cert'");
return -3;
}
if(!l_value_datoshi_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_cond_create requires parameter '-value'");
return -4;
}
if(!l_net_name) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_cond_create requires parameter '-net'");
return -5;
}
if(!l_unit_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_cond_create requires parameter '-unit'");
return -6;
}
if(!l_srv_uid_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_cond_create requires parameter '-srv_uid'");
return -7;
}
dap_chain_net_srv_uid_t l_srv_uid = {};
l_srv_uid.uint64 = strtoll(l_srv_uid_str, NULL, 10);
if (!l_srv_uid.uint64) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't find service UID %s ", l_srv_uid_str);
return -8;
}
dap_chain_net_srv_price_unit_uid_t l_price_unit = dap_chain_net_srv_price_unit_uid_from_str(l_unit_str);
if(l_price_unit.enm == SERV_UNIT_UNDEFINED) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't recognize unit '%s'. Unit must look like {mb | kb | b | sec | day}",
l_unit_str);
return -9;
}
l_value_datoshi = dap_chain_balance_scan(l_value_datoshi_str);
if(IS_ZERO_256(l_value_datoshi)) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't recognize value '%s' as a number", l_value_datoshi_str);
return -10;
}
dap_chain_net_t * l_net = l_net_name ? dap_chain_net_by_name(l_net_name) : NULL;
if(!l_net) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't find net '%s'", l_net_name);
return -11;
}
dap_chain_wallet_t *l_wallet = dap_chain_wallet_open(l_wallet_str, c_wallets_path);
if(!l_wallet) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't open wallet '%s'", l_wallet);
return -12;
}
dap_cert_t *l_cert_cond = dap_cert_find_by_name(l_cert_str);
if(!l_cert_cond) {
dap_chain_wallet_close(l_wallet);
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't find cert '%s'", l_cert_str);
return -13;
}
dap_enc_key_t *l_key_from = dap_chain_wallet_get_key(l_wallet, 0);
dap_pkey_t *l_key_cond = dap_pkey_from_enc_key(l_cert_cond->enc_key);
if (!l_key_cond) {
dap_chain_wallet_close(l_wallet);
dap_chain_node_cli_set_reply_text(a_str_reply, "Cert '%s' doesn't contain a valid public key", l_cert_str);
return -14;
}
uint256_t l_value_per_unit_max = {};
uint256_t l_value_fee = {};
dap_chain_hash_fast_t *l_tx_cond_hash = dap_chain_mempool_tx_create_cond(l_net, l_key_from, l_key_cond, l_token_ticker,
l_value_datoshi, l_value_per_unit_max, l_price_unit, l_srv_uid, l_value_fee, NULL, 0);
dap_chain_wallet_close(l_wallet);
DAP_DELETE(l_key_cond);
char *l_hash_str;
if(!dap_strcmp(l_hash_out_type, "hex")) {
l_hash_str = l_tx_cond_hash ? dap_chain_hash_fast_to_str_new(l_tx_cond_hash) : NULL;
}
else {
l_hash_str = l_tx_cond_hash ? dap_enc_base58_encode_hash_to_str(l_tx_cond_hash) : NULL;
}
/*dap_chain_node_cli_set_reply_text(str_reply, "cond create=%s\n",
(res == 0) ? "Ok" : (res == -2) ? "False, not enough funds for service fee" : "False");
return res;*/
int l_ret;
// example: cond create succefully hash=0x4AA303EB7C10430C0AAC42F399D265BC7DD09E3983E088E02B8CED38DA22EDA9
if(l_hash_str){
dap_chain_node_cli_set_reply_text(a_str_reply, "cond create succefully hash=%s\n", l_hash_str);
l_ret = 0;
}
else{
dap_chain_node_cli_set_reply_text(a_str_reply, "cond can't create\n");
l_ret = -1;
}
DAP_DELETE(l_hash_str);
return l_ret;
}
/**
* @brief com_mempool_add_ca
* @details Place public CA into the mempool
* @param a_argc
* @param a_argv
* @param a_str_reply
* @return
*/
int com_mempool_add_ca(int a_argc, char ** a_argv, char ** a_str_reply)
{
int arg_index = 1;
// Read params
const char * l_ca_name = NULL;
dap_chain_net_t * l_net = NULL;
dap_chain_t * l_chain = NULL;
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-ca_name", &l_ca_name);
dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index,a_argc, a_argv, a_str_reply, &l_chain, &l_net);
if ( l_net == NULL ){
return -1;
} else if (a_str_reply && *a_str_reply) {
DAP_DELETE(*a_str_reply);
*a_str_reply = NULL;
}
// Chech for chain if was set or not
if ( l_chain == NULL){
// If wasn't set - trying to auto detect
l_chain = dap_chain_net_get_chain_by_chain_type( l_net, CHAIN_TYPE_CA );
if (l_chain == NULL) { // If can't auto detect
// clean previous error code
dap_chain_node_cli_set_reply_text(a_str_reply,
"No chains for CA datum in network \"%s\"", l_net->pub.name );
return -2;
}
}
// Check if '-ca_name' wasn't specified
if (l_ca_name == NULL){
dap_chain_node_cli_set_reply_text(a_str_reply,
"mempool_add_ca_public requires parameter '-ca_name' to specify the certificate name");
return -3;
}
// Find certificate with specified key
dap_cert_t * l_cert = dap_cert_find_by_name( l_ca_name );
if( l_cert == NULL ){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't find \"%s\" certificate", l_ca_name );
return -4;
}
if( l_cert->enc_key == NULL ){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Corrupted certificate \"%s\" without keys certificate", l_ca_name );
return -5;
}
if ( l_cert->enc_key->priv_key_data_size || l_cert->enc_key->priv_key_data){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Certificate \"%s\" has private key data. Please export public only key certificate without private keys", l_ca_name );
return -6;
}
// Serialize certificate into memory
uint32_t l_cert_serialized_size = 0;
byte_t * l_cert_serialized = dap_cert_mem_save( l_cert, &l_cert_serialized_size );
if( l_cert_serialized == NULL){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't serialize in memory certificate \"%s\"", l_ca_name );
return -7;
}
// Now all the chechs passed, forming datum for mempool
dap_chain_datum_t * l_datum = dap_chain_datum_create( DAP_CHAIN_DATUM_CA, l_cert_serialized , l_cert_serialized_size);
DAP_DELETE( l_cert_serialized);
if( l_datum == NULL){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't produce datum from certificate \"%s\"", l_ca_name );
return -7;
}
// Finaly add datum to mempool
char *l_hash_str = dap_chain_mempool_datum_add(l_datum,l_chain);
if (l_hash_str) {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Datum %s was successfully placed to mempool", l_hash_str);
DAP_DELETE(l_hash_str);
return 0;
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't place certificate \"%s\" to mempool", l_ca_name);
DAP_DELETE( l_datum );
return -8;
}
}
/**
* @brief com_chain_ca_copy
* @details copy public CA into the mempool
* @param a_argc
* @param a_argv
* @param a_arg_func
* @param a_str_reply
* @return
*/
int com_chain_ca_copy( int a_argc, char ** a_argv, char ** a_str_reply)
{
return com_mempool_add_ca(a_argc, a_argv, a_str_reply);
}
/**
* @brief com_chain_ca_pub
* @details place public CA into the mempool
* @param a_argc
* @param a_argv
* @param a_arg_func
* @param a_str_reply
* @return
*/
int com_chain_ca_pub( int a_argc, char ** a_argv, char ** a_str_reply)
{
int arg_index = 1;
// Read params
const char * l_ca_name = NULL;
dap_chain_net_t * l_net = NULL;
dap_chain_t * l_chain = NULL;
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-ca_name", &l_ca_name);
dap_chain_node_cli_cmd_values_parse_net_chain(&arg_index,a_argc, a_argv, a_str_reply, &l_chain, &l_net);
dap_cert_t * l_cert = dap_cert_find_by_name( l_ca_name );
if( l_cert == NULL ){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't find \"%s\" certificate", l_ca_name );
return -4;
}
if( l_cert->enc_key == NULL ){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Corrupted certificate \"%s\" without keys certificate", l_ca_name );
return -5;
}
// Create empty new cert
dap_cert_t * l_cert_new = dap_cert_new(l_ca_name);
l_cert_new->enc_key = dap_enc_key_new( l_cert->enc_key->type);
// Copy only public key
l_cert_new->enc_key->pub_key_data = DAP_NEW_Z_SIZE(uint8_t,
l_cert_new->enc_key->pub_key_data_size =
l_cert->enc_key->pub_key_data_size );
memcpy(l_cert_new->enc_key->pub_key_data, l_cert->enc_key->pub_key_data,l_cert->enc_key->pub_key_data_size);
// Serialize certificate into memory
uint32_t l_cert_serialized_size = 0;
byte_t * l_cert_serialized = dap_cert_mem_save( l_cert_new, &l_cert_serialized_size );
if( l_cert_serialized == NULL){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't serialize in memory certificate" );
return -7;
}
if( l_cert_serialized == NULL){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't serialize in memory certificate");
return -7;
}
// Now all the chechs passed, forming datum for mempool
dap_chain_datum_t * l_datum = dap_chain_datum_create( DAP_CHAIN_DATUM_CA, l_cert_serialized , l_cert_serialized_size);
DAP_DELETE( l_cert_serialized);
if( l_datum == NULL){
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't produce datum from certificate");
return -7;
}
// Finaly add datum to mempool
char *l_hash_str = dap_chain_mempool_datum_add(l_datum,l_chain);
if (l_hash_str) {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Datum %s was successfully placed to mempool", l_hash_str);
DAP_DELETE(l_hash_str);
return 0;
} else {
dap_chain_node_cli_set_reply_text(a_str_reply,
"Can't place certificate \"%s\" to mempool", l_ca_name);
DAP_DELETE( l_datum );
return -8;
}
}
static const char* s_json_get_text(struct json_object *a_json, const char *a_key)
{
if(!a_json || !a_key)
return NULL;
struct json_object *l_json = json_object_object_get(a_json, a_key);
if(l_json && json_object_is_type(l_json, json_type_string)) {
// Read text
return json_object_get_string(l_json);
}
return NULL;
}
static bool s_json_get_int64(struct json_object *a_json, const char *a_key, int64_t *a_out)
{
if(!a_json || !a_key || !a_out)
return false;
struct json_object *l_json = json_object_object_get(a_json, a_key);
if(l_json) {
if(json_object_is_type(l_json, json_type_int)) {
// Read number
*a_out = json_object_get_int64(l_json);
return true;
}
}
return false;
}
static bool s_json_get_unit(struct json_object *a_json, const char *a_key, dap_chain_net_srv_price_unit_uid_t *a_out)
{
const char *l_unit_str = s_json_get_text(a_json, a_key);
if(!l_unit_str || !a_out)
return false;
dap_chain_net_srv_price_unit_uid_t l_unit = dap_chain_net_srv_price_unit_uid_from_str(l_unit_str);
if(l_unit.enm == SERV_UNIT_UNDEFINED)
return false;
a_out->enm = l_unit.enm;
return true;
}
static bool s_json_get_uint256(struct json_object *a_json, const char *a_key, uint256_t *a_out)
{
const char *l_uint256_str = s_json_get_text(a_json, a_key);
if(!a_out || !l_uint256_str)
return false;
uint256_t l_value = dap_chain_balance_scan(l_uint256_str);
if(!IS_ZERO_256(l_value)) {
memcpy(a_out, &l_value, sizeof(uint256_t));
return true;
}
return false;
}
// service names: srv_stake, srv_vpn, srv_xchange
static bool s_json_get_srv_uid(struct json_object *a_json, const char *a_key_service_id, const char *a_key_service, uint64_t *a_out)
{
uint64_t l_srv_id;
if(!a_out)
return false;
// Read service id
if(s_json_get_int64(a_json, a_key_service_id, (int64_t*) &l_srv_id)) {
*a_out = l_srv_id;
return true;
}
else {
// Read service as name
const char *l_service = s_json_get_text(a_json, a_key_service);
if(l_service) {
dap_chain_net_srv_t *l_srv = dap_chain_net_srv_get_by_name(l_service);
if(!l_srv)
return false;
*a_out = l_srv->uid.uint64;
return true;
}
}
return false;
}
static dap_chain_wallet_t* s_json_get_wallet(struct json_object *a_json, const char *a_key)
{
dap_enc_key_t *l_enc_key = NULL;
// From wallet
const char *l_wallet_str = s_json_get_text(a_json, a_key);
if(l_wallet_str) {
dap_chain_wallet_t *l_wallet = dap_chain_wallet_open(l_wallet_str, dap_config_get_item_str_default(g_config, "resources", "wallets_path", NULL));
return l_wallet;
}
return NULL;
}
static const dap_cert_t* s_json_get_cert(struct json_object *a_json, const char *a_key)
{
const char *l_cert_name = s_json_get_text(a_json, a_key);
if(l_cert_name) {
dap_cert_t *l_cert = dap_cert_find_by_name(l_cert_name);
return l_cert;
}
return NULL;
}
// Read pkey from wallet or cert
static dap_pkey_t* s_json_get_pkey(struct json_object *a_json)
{
dap_pkey_t *l_pub_key = NULL;
// From wallet
dap_chain_wallet_t *l_wallet = s_json_get_wallet(a_json, "wallet");
if(l_wallet) {
l_pub_key = dap_chain_wallet_get_pkey(l_wallet, 0);
dap_chain_wallet_close(l_wallet);
if(l_pub_key) {
return l_pub_key;
}
}
// From cert
const dap_cert_t *l_cert = s_json_get_cert(a_json, "cert");
if(l_cert) {
l_pub_key = dap_pkey_from_enc_key(l_cert->enc_key);
}
return l_pub_key;
}
/**
* @brief Create transaction from json file
* com_tx_create command
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_tx_create_json(int a_argc, char ** a_argv, char **a_str_reply)
{
int l_arg_index = 1;
int l_err_code = 0;
const char *l_net_name = NULL; // optional parameter
const char *l_chain_name = NULL; // optional parameter
const char *l_json_file_path = NULL;
dap_chain_node_cli_find_option_val(a_argv, l_arg_index, a_argc, "-net", &l_net_name); // optional parameter
dap_chain_node_cli_find_option_val(a_argv, l_arg_index, a_argc, "-chain", &l_chain_name); // optional parameter
dap_chain_node_cli_find_option_val(a_argv, l_arg_index, a_argc, "-json", &l_json_file_path);
if(!l_json_file_path) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Command requires one of parameters '-json <json file path>'");
return -1;
}
// Open json file
struct json_object *l_json = json_object_from_file(l_json_file_path);
if(!l_json) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't open json file: %s", json_util_get_last_err());
return -2;
}
if(!json_object_is_type(l_json, json_type_object)) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Wrong json format");
json_object_put(l_json);
return -3;
}
// Read network from json file
if(!l_net_name) {
struct json_object *l_json_net = json_object_object_get(l_json, "net");
if(l_json_net && json_object_is_type(l_json_net, json_type_string)) {
l_net_name = json_object_get_string(l_json_net);
}
if(!l_net_name) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Command requires parameter '-net' or set net in the json file");
json_object_put(l_json);
return -11;
}
}
dap_chain_net_t *l_net = dap_chain_net_by_name(l_net_name);
if(!l_net) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Not found net by name '%s'", l_net_name);
json_object_put(l_json);
return -12;
}
// Read chain from json file
if(!l_chain_name) {
struct json_object *l_json_chain = json_object_object_get(l_json, "chain");
if(l_json_chain && json_object_is_type(l_json_chain, json_type_string)) {
l_chain_name = json_object_get_string(l_json_chain);
}
}
dap_chain_t *l_chain = dap_chain_net_get_chain_by_name(l_net, l_chain_name);
if(!l_chain) {
l_chain = dap_chain_net_get_chain_by_chain_type(l_net, CHAIN_TYPE_TX);
}
if(!l_chain) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Chain name '%s' not found, try use parameter '-chain' or set chain in the json file", l_chain_name);
json_object_put(l_json);
return -13;
}
// Read items from json file
struct json_object *l_json_items = json_object_object_get(l_json, "items");
size_t l_items_count = json_object_array_length(l_json_items);
bool a = (l_items_count = json_object_array_length(l_json_items));
if(!l_json_items || !json_object_is_type(l_json_items, json_type_array) || !(l_items_count = json_object_array_length(l_json_items))) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Wrong json format: not found array 'items' or array is empty");
json_object_put(l_json);
return -15;
}
// Create transaction
dap_chain_datum_tx_t *l_tx = DAP_NEW_Z_SIZE(dap_chain_datum_tx_t, sizeof(dap_chain_datum_tx_t));
l_tx->header.ts_created = time(NULL);
size_t l_items_ready = 0;
dap_list_t *l_sign_list = NULL;
// Creating and adding items to the transaction
for(size_t i = 0; i < l_items_count; ++i) {
struct json_object *l_json_item_obj = json_object_array_get_idx(l_json_items, i);
if(!l_json_item_obj || !json_object_is_type(l_json_item_obj, json_type_object)) {
continue;
}
struct json_object *l_json_item_type = json_object_object_get(l_json_item_obj, "type");
if(!l_json_item_type && json_object_is_type(l_json_item_type, json_type_string)) {
log_it(L_WARNING, "Item %zu without type", i);
continue;
}
const char *l_item_type_str = json_object_get_string(l_json_item_type);
dap_chain_tx_item_type_t l_item_type = dap_chain_datum_tx_item_str_to_type(l_item_type_str);
if(l_item_type == TX_ITEM_TYPE_UNKNOWN) {
log_it(L_WARNING, "Item %zu has invalid type '%s'", i, l_item_type_str);
continue;
}
// Create an item depending on its type
const uint8_t *l_item = NULL;
switch (l_item_type) {
case TX_ITEM_TYPE_IN: {
// Read prev_hash and out_prev_idx
const char *l_prev_hash_str = s_json_get_text(l_json_item_obj, "prev_hash");
int64_t l_out_prev_idx;
bool l_is_out_prev_idx = s_json_get_int64(l_json_item_obj, "out_prev_idx", &l_out_prev_idx);
// If prev_hash and out_prev_idx were read
if(l_prev_hash_str && l_is_out_prev_idx) {
dap_chain_hash_fast_t l_tx_prev_hash;
if(!dap_chain_hash_fast_from_str(l_prev_hash_str, &l_tx_prev_hash)) {
// Create IN item
dap_chain_tx_in_t *l_in_item = dap_chain_datum_tx_item_in_create(&l_tx_prev_hash, (uint32_t)l_out_prev_idx);
l_item = (const uint8_t*) l_in_item;
}
else {
log_it(L_WARNING, "Invalid 'in' item %zu", i);
continue;
}
}
}
break;
case TX_ITEM_TYPE_OUT:
case TX_ITEM_TYPE_OUT_EXT: {
// Read address and value
uint256_t l_value = { };
const char *l_json_item_addr_str = s_json_get_text(l_json_item_obj, "addr");
bool l_is_value = s_json_get_uint256(l_json_item_obj, "value", &l_value);
if(l_is_value && l_json_item_addr_str) {
dap_chain_addr_t *l_addr = dap_chain_addr_from_str(l_json_item_addr_str);
if(l_addr && !IS_ZERO_256(l_value)) {
if(l_item_type == TX_ITEM_TYPE_OUT) {
// Create OUT item
dap_chain_tx_out_t *l_out_item = dap_chain_datum_tx_item_out_create(l_addr, l_value);
l_item = (const uint8_t*) l_out_item;
}
else if(l_item_type == TX_ITEM_TYPE_OUT_EXT) {
// Read address and value
const char *l_token = s_json_get_text(l_json_item_obj, "token");
if(l_token) {
// Create OUT_EXT item
dap_chain_tx_out_ext_t *l_out_ext_item = dap_chain_datum_tx_item_out_ext_create(l_addr, l_value, l_token);
l_item = (const uint8_t*) l_out_ext_item;
}
else {
log_it(L_WARNING, "Invalid 'out_ext' item %zu", i);
continue;
}
}
}
else {
if(l_item_type == TX_ITEM_TYPE_OUT) {
log_it(L_WARNING, "Invalid 'out' item %zu", i);
}
else if(l_item_type == TX_ITEM_TYPE_OUT_EXT) {
log_it(L_WARNING, "Invalid 'out_ext' item %zu", i);
}
continue;
}
}
}
break;
case TX_ITEM_TYPE_IN_COND: {
// Read prev_hash and out_prev_idx
const char *l_prev_hash_str = s_json_get_text(l_json_item_obj, "prev_hash");
int64_t l_out_prev_idx;
int64_t l_receipt_idx;
bool l_is_out_prev_idx = s_json_get_int64(l_json_item_obj, "out_prev_idx", &l_out_prev_idx);
bool l_is_receipt_idx = s_json_get_int64(l_json_item_obj, "receipt_idx", &l_receipt_idx);
if(l_prev_hash_str && l_is_out_prev_idx && l_is_receipt_idx) {
dap_chain_hash_fast_t l_tx_prev_hash;
if(!dap_chain_hash_fast_from_str(l_prev_hash_str, &l_tx_prev_hash)) {
// Create IN_COND item
dap_chain_tx_in_cond_t *l_in_cond_item = dap_chain_datum_tx_item_in_cond_create(&l_tx_prev_hash, (uint32_t) l_out_prev_idx, (uint32_t) l_receipt_idx);
l_item = (const uint8_t*) l_in_cond_item;
}
}
}
break;
case TX_ITEM_TYPE_OUT_COND: {
// Read subtype of item
const char *l_subtype_str = s_json_get_text(l_json_item_obj, "subtype");
dap_chain_tx_out_cond_subtype_t l_subtype = dap_chain_tx_out_cond_subtype_from_str(l_subtype_str);
switch (l_subtype) {
case DAP_CHAIN_TX_OUT_COND_SUBTYPE_SRV_PAY:{
uint256_t l_value = { };
bool l_is_value = s_json_get_uint256(l_json_item_obj, "value", &l_value);
if(!l_is_value || IS_ZERO_256(l_value)) {
break;
}
uint256_t l_value_max_per_unit = { };
l_is_value = s_json_get_uint256(l_json_item_obj, "value_max_per_unit", &l_value_max_per_unit);
if(!l_is_value || IS_ZERO_256(l_value_max_per_unit)) {
break;
}
dap_chain_net_srv_price_unit_uid_t l_price_unit;
if(!s_json_get_unit(l_json_item_obj, "price_unit", &l_price_unit)) {
break;
}
dap_chain_net_srv_uid_t l_srv_uid;
if(!s_json_get_srv_uid(l_json_item_obj, "service_id", "service", &l_srv_uid.uint64)){
// Default service DAP_CHAIN_NET_SRV_VPN_ID
l_srv_uid.uint64 = 0x0000000000000001;
}
// From "wallet" or "cert"
dap_pkey_t *l_pkey = s_json_get_pkey(l_json_item_obj);
if(!l_pkey) {
break;
}
const char *l_params_str = s_json_get_text(l_json_item_obj, "params");
size_t l_params_size = dap_strlen(l_params_str);
dap_chain_tx_out_cond_t *l_out_cond_item = dap_chain_datum_tx_item_out_cond_create_srv_pay(l_pkey, l_srv_uid, l_value, l_value_max_per_unit,
l_price_unit, l_params_str, l_params_size);
l_item = (const uint8_t*) l_out_cond_item;
DAP_DELETE(l_pkey);
}
break;
case DAP_CHAIN_TX_OUT_COND_SUBTYPE_SRV_XCHANGE: {
dap_chain_net_srv_uid_t l_srv_uid;
if(!s_json_get_srv_uid(l_json_item_obj, "service_id", "service", &l_srv_uid.uint64)) {
// Default service DAP_CHAIN_NET_SRV_XCHANGE_ID
l_srv_uid.uint64 = 0x2;
}
dap_chain_net_t *l_net = dap_chain_net_by_name(s_json_get_text(l_json_item_obj, "net"));
if(!l_net) {
break;
}
const char *l_token = s_json_get_text(l_json_item_obj, "token");
if(!l_token) {
break;
}
uint256_t l_value = { };
if(!s_json_get_uint256(l_json_item_obj, "value", &l_value) || IS_ZERO_256(l_value)) {
break;
}
const char *l_params_str = s_json_get_text(l_json_item_obj, "params");
size_t l_params_size = dap_strlen(l_params_str);
dap_chain_tx_out_cond_t *l_out_cond_item = dap_chain_datum_tx_item_out_cond_create_srv_xchange(l_srv_uid, l_net->pub.id, l_token, l_value, l_params_str, l_params_size);
l_item = (const uint8_t*) l_out_cond_item;
}
break;
case DAP_CHAIN_TX_OUT_COND_SUBTYPE_SRV_STAKE:{
dap_chain_net_srv_uid_t l_srv_uid;
if(!s_json_get_srv_uid(l_json_item_obj, "service_id", "service", &l_srv_uid.uint64)) {
// Default service DAP_CHAIN_NET_SRV_STAKE_ID
l_srv_uid.uint64 = 0x13;
}
uint256_t l_value = { };
if(!s_json_get_uint256(l_json_item_obj, "value", &l_value) || IS_ZERO_256(l_value)) {
break;
}
uint256_t l_fee_value = { };
if(!s_json_get_uint256(l_json_item_obj, "fee", &l_fee_value) || IS_ZERO_256(l_fee_value)) {
break;
}
const char *l_fee_addr_str = s_json_get_text(l_json_item_obj, "fee_addr");
const char *l_hldr_addr_str = s_json_get_text(l_json_item_obj, "hldr_addr");
const char *l_signing_addr_str = s_json_get_text(l_json_item_obj, "signing_addr");
dap_chain_addr_t *l_fee_addr = dap_chain_addr_from_str(l_fee_addr_str);
dap_chain_addr_t *l_hldr_addr = dap_chain_addr_from_str(l_hldr_addr_str);
dap_chain_addr_t *l_signing_addr = dap_chain_addr_from_str(l_signing_addr_str);
if(!l_fee_addr || !l_hldr_addr || !l_signing_addr) {
break;
}
dap_chain_node_addr_t l_signer_node_addr;
const char *l_node_addr_str = s_json_get_text(l_json_item_obj, "node_addr");
if(!l_node_addr_str || dap_chain_node_addr_from_str(&l_signer_node_addr, l_node_addr_str)) {
break;
}
dap_chain_tx_out_cond_t *l_out_cond_item = dap_chain_datum_tx_item_out_cond_create_srv_stake(l_srv_uid, l_value, l_fee_value,
l_fee_addr, l_hldr_addr, l_signing_addr, &l_signer_node_addr);
l_item = (const uint8_t*) l_out_cond_item;
}
break;
case DAP_CHAIN_TX_OUT_COND_SUBTYPE_FEE: {
uint256_t l_value = { };
bool l_is_value = s_json_get_uint256(l_json_item_obj, "value", &l_value);
if(!IS_ZERO_256(l_value)) {
dap_chain_tx_out_cond_t *l_out_cond_item = dap_chain_datum_tx_item_out_cond_create_fee(l_value);
l_item = (const uint8_t*) l_out_cond_item;
}
}
break;
case DAP_CHAIN_TX_OUT_COND_SUBTYPE_UNDEFINED:
log_it(L_WARNING, "Undefined subtype: '%s' of 'out_cond' item %zu ", l_subtype_str, i);
break;
}
}
break;
case TX_ITEM_TYPE_SIG:{
// Save item obj for sign
l_sign_list = dap_list_append(l_sign_list,l_json_item_obj);
}
break;
case TX_ITEM_TYPE_RECEIPT: {
dap_chain_net_srv_uid_t l_srv_uid;
if(!s_json_get_srv_uid(l_json_item_obj, "service_id", "service", &l_srv_uid.uint64)) {
break;
}
dap_chain_net_srv_price_unit_uid_t l_price_unit;
if(!s_json_get_unit(l_json_item_obj, "price_unit", &l_price_unit)) {
break;
}
int64_t l_units;
if(!s_json_get_int64(l_json_item_obj, "units", &l_units)) {
break;
}
uint256_t l_value = { };
if(!s_json_get_uint256(l_json_item_obj, "value", &l_value) || IS_ZERO_256(l_value)) {
break;
}
const char *l_params_str = s_json_get_text(l_json_item_obj, "params");
size_t l_params_size = dap_strlen(l_params_str);
dap_chain_datum_tx_receipt_t *l_receipt = dap_chain_datum_tx_receipt_create(l_srv_uid, l_price_unit, l_units, l_value, l_params_str, l_params_size);
l_item = (const uint8_t*) l_receipt;
}
break;
//case TX_ITEM_TYPE_PKEY:
//break;
//case TX_ITEM_TYPE_TOKEN:
//break;
//case TX_ITEM_TYPE_TOKEN_EXT:
//break;
}
// Add item to transaction
if(l_item) {
dap_chain_datum_tx_add_item(&l_tx, (const uint8_t*) l_item);
l_items_ready++;
}
}
// Add signs
dap_list_t *l_list = l_sign_list;
while(l_list){
bool is_add = false;
struct json_object *l_json_item_obj = (struct json_object*) l_list->data;
// From wallet
dap_chain_wallet_t *l_wallet = s_json_get_wallet(l_json_item_obj, "wallet");
if(l_wallet) {
dap_enc_key_t *l_enc_key = dap_chain_wallet_get_key(l_wallet, 0);
// sign all previous items in transaction
if(dap_chain_datum_tx_add_sign_item(&l_tx, l_enc_key)>0){
is_add = true;
l_items_ready++;
}
dap_chain_wallet_close(l_wallet);
}
// If wallet not found
if(!is_add) {
// From cert
const dap_cert_t *l_cert = s_json_get_cert(l_json_item_obj, "cert");
if(l_cert && l_cert->enc_key) {
// sign all previous items in transaction
if(dap_chain_datum_tx_add_sign_item(&l_tx, l_cert->enc_key) > 0) {
is_add = true;
l_items_ready++;
}
}
}
l_list = dap_list_next(l_list);
}
dap_list_free(l_sign_list);
json_object_put(l_json);
if(l_items_ready<l_items_count) {
if(!l_items_ready)
dap_chain_node_cli_set_reply_text(a_str_reply, "No valid items found to create a transaction");
else
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't create transaction, because only %zu items out of %zu are valid",l_items_ready,l_items_count);
DAP_DELETE(l_tx);
return -30;
}
// Pack transaction into the datum
dap_chain_datum_t *l_datum_tx = dap_chain_datum_create(DAP_CHAIN_DATUM_TX, l_tx, dap_chain_datum_tx_get_size(l_tx));
size_t l_datum_tx_size = dap_chain_datum_size(l_datum_tx);
DAP_DELETE(l_tx);
// Add transaction to mempool
char *l_gdb_group_mempool_base_tx = dap_chain_net_get_gdb_group_mempool_new(l_chain);// get group name for mempool
dap_chain_hash_fast_t *l_datum_tx_hash = DAP_NEW(dap_hash_fast_t);
dap_hash_fast(l_datum_tx, l_datum_tx_size, l_datum_tx_hash);// Calculate datum hash
char *l_tx_hash_str = dap_chain_hash_fast_to_str_new(l_datum_tx_hash);
bool l_placed = dap_global_db_set(l_gdb_group_mempool_base_tx,l_tx_hash_str, l_datum_tx, l_datum_tx_size, true, NULL,NULL );
DAP_DELETE(l_tx_hash_str);
DAP_DELETE(l_datum_tx);
DAP_DELETE(l_gdb_group_mempool_base_tx);
if(!l_placed) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't add transaction to mempool");
return -90;
}
// Completed successfully
dap_chain_node_cli_set_reply_text(a_str_reply, "Transaction with %d items created and added to mempool successfully", l_items_ready);
return l_err_code;
}
/**
* @brief Create transaction
* com_tx_create command
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_tx_create(int argc, char ** argv, char **str_reply)
{
int arg_index = 1;
// int cmd_num = 1;
// const char *value_str = NULL;
const char *addr_base58_to = NULL;
const char *str_tmp = NULL;
const char * l_from_wallet_name = NULL;
const char * l_token_ticker = NULL;
const char * l_net_name = NULL;
const char * l_chain_name = NULL;
const char * l_emission_chain_name = NULL;
const char * l_tx_num_str = NULL;
const char *l_emission_hash_str = NULL;
const char *l_certs_str = NULL;
dap_cert_t **l_certs = NULL;
size_t l_certs_count = 0;
dap_chain_hash_fast_t l_emission_hash = {};
size_t l_tx_num = 0;
uint256_t l_value = {};
uint256_t l_value_fee = {};
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-from_wallet", &l_from_wallet_name);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-from_emission", &l_emission_hash_str);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-emission_chain", &l_emission_chain_name);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-to_addr", &addr_base58_to);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-token", &l_token_ticker);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-net", &l_net_name);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-chain", &l_chain_name);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-tx_num", &l_tx_num_str);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-certs", &l_certs_str);
if(l_tx_num_str)
l_tx_num = strtoul(l_tx_num_str, NULL, 10);
if(dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-fee", &str_tmp)) {
l_value_fee = dap_chain_balance_scan(str_tmp);
} else {
l_value_fee = dap_chain_coins_to_balance("0.1");
}
if(dap_chain_node_cli_find_option_val(argv, arg_index, argc, "-value", &str_tmp)) {
l_value = dap_chain_balance_scan(str_tmp);
}
if(!l_from_wallet_name && !l_emission_hash_str) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires one of parameters '-from_wallet' or '-from_emission'");
return -1;
}
if(!addr_base58_to) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires parameter '-to_addr'");
return -2;
}
if(!l_net_name) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires parameter '-net'");
return -6;
}
if(!l_token_ticker) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires parameter '-token'");
return -6;
}
dap_chain_net_t * l_net = dap_chain_net_by_name(l_net_name);
dap_ledger_t *l_ledger = l_net ? l_net->pub.ledger : NULL;
if(l_net == NULL || (l_ledger = dap_chain_ledger_by_net_name(l_net_name)) == NULL) {
dap_chain_node_cli_set_reply_text(str_reply, "not found net by name '%s'", l_net_name);
return -7;
}
dap_chain_t *l_emission_chain = NULL;
if (l_emission_hash_str) {
if (dap_chain_hash_fast_from_str(l_emission_hash_str, &l_emission_hash)) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires parameter '-from_emission' "
"to be valid string containing hash in hex or base58 format");
return -3;
}
if (!l_emission_chain_name ||
(l_emission_chain = dap_chain_net_get_chain_by_name(l_net, l_emission_chain_name)) == NULL) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires parameter '-emission_chain' "
"to be a valid chain name");
return -9;
}
if(!l_certs_str) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires parameter '-certs'");
return -4;
}
dap_cert_parse_str_list(l_certs_str, &l_certs, &l_certs_count);
if(!l_certs_count) {
dap_chain_node_cli_set_reply_text(str_reply,
"tx_create requires at least one valid certificate to sign the basic transaction of emission");
return -5;
}
}
if(IS_ZERO_256(l_value)) {
dap_chain_node_cli_set_reply_text(str_reply, "tx_create requires parameter '-value' to be valid uint256 value");
return -4;
}
if (IS_ZERO_256(l_value_fee)) {
dap_chain_node_cli_set_reply_text(str_reply,
"tx_create requires parameter '-value_fee' to be valid uint256");
return -5;
}
dap_chain_t * l_chain = dap_chain_net_get_chain_by_name(l_net, l_chain_name);
if(!l_chain) {
l_chain = dap_chain_net_get_chain_by_chain_type(l_net, CHAIN_TYPE_TX);
}
if(!l_chain) {
dap_chain_node_cli_set_reply_text(str_reply, "not found chain name '%s', try use parameter '-chain'",
l_chain_name);
return -8;
}
dap_chain_addr_t *l_addr_to = dap_chain_addr_from_str(addr_base58_to);
if(!l_addr_to) {
dap_chain_node_cli_set_reply_text(str_reply, "destination address is invalid");
return -11;
}
dap_string_t *string_ret = dap_string_new(NULL);
int res = 0;
if (l_emission_hash_str) {
dap_hash_fast_t *l_tx_hash = dap_chain_mempool_base_tx_create(l_chain, &l_emission_hash, l_emission_chain->id,
l_value, l_token_ticker, l_addr_to, l_certs, l_certs_count);
if (l_tx_hash){
char l_tx_hash_str[DAP_CHAIN_HASH_FAST_STR_SIZE];
dap_chain_hash_fast_to_str(l_tx_hash,l_tx_hash_str,sizeof (l_tx_hash_str));
dap_string_append_printf(string_ret, "transfer=Ok\ntx_hash=%s\n",l_tx_hash_str);
DAP_DELETE(l_tx_hash);
}else{
dap_string_append_printf(string_ret, "transfer=False\n");
res = -15;
}
dap_chain_node_cli_set_reply_text(str_reply, string_ret->str);
dap_string_free(string_ret, false);
DAP_DELETE(l_addr_to);
return res;
}
const char *c_wallets_path = dap_chain_wallet_get_path(g_config);
dap_chain_wallet_t * l_wallet = dap_chain_wallet_open(l_from_wallet_name, c_wallets_path);
if(!l_wallet) {
dap_chain_node_cli_set_reply_text(str_reply, "wallet %s does not exist", l_from_wallet_name);
return -9;
}
const dap_chain_addr_t *addr_from = (const dap_chain_addr_t *) dap_chain_wallet_get_addr(l_wallet, l_net->pub.id);
if(!addr_from) {
dap_chain_node_cli_set_reply_text(str_reply, "source address is invalid");
return -10;
}
// Check, if network ID is same as ID in destination wallet address. If not - operation is cancelled.
if (l_addr_to->net_id.uint64 != l_net->pub.id.uint64) {
dap_chain_node_cli_set_reply_text(str_reply, "destination wallet network ID=0x%llx and network ID=0x%llx is not equal. Please, change network name or wallet address",
l_addr_to->net_id.uint64, l_net->pub.id.uint64);
return -13;
}
if(l_tx_num){
res = dap_chain_mempool_tx_create_massive(l_chain, dap_chain_wallet_get_key(l_wallet, 0), addr_from,
l_addr_to, l_token_ticker, l_value, l_value_fee, l_tx_num);
dap_string_append_printf(string_ret, "transfer=%s\n",
(res == 0) ? "Ok" : (res == -2) ? "False, not enough funds for transfer" : "False");
}else{
dap_hash_fast_t * l_tx_hash = dap_chain_mempool_tx_create(l_chain, dap_chain_wallet_get_key(l_wallet, 0), addr_from, l_addr_to,
l_token_ticker, l_value, l_value_fee);
if (l_tx_hash){
char l_tx_hash_str[80]={[0]='\0'};
dap_chain_hash_fast_to_str(l_tx_hash,l_tx_hash_str,sizeof (l_tx_hash_str)-1);
dap_string_append_printf(string_ret, "transfer=Ok\ntx_hash=%s\n",l_tx_hash_str);
DAP_DELETE(l_tx_hash);
}else{
dap_string_append_printf(string_ret, "transfer=False\n");
res = -14;
}
}
dap_chain_node_cli_set_reply_text(str_reply, string_ret->str);
dap_string_free(string_ret, false);
DAP_DELETE(l_addr_to);
dap_chain_wallet_close(l_wallet);
return res;
}
/**
* @brief com_tx_verify
* Verifing transaction
* tx_verify command
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_tx_verify(int a_argc, char **a_argv, char **a_str_reply)
{
const char * l_tx_hash_str = NULL;
dap_chain_net_t * l_net = NULL;
dap_chain_t * l_chain = NULL;
int l_arg_index = 1;
dap_chain_node_cli_find_option_val(a_argv, l_arg_index, a_argc, "-tx", &l_tx_hash_str);
if(!l_tx_hash_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_verify requires parameter '-tx'");
return -1;
}
dap_chain_node_cli_cmd_values_parse_net_chain(&l_arg_index, a_argc, a_argv, a_str_reply, &l_chain, &l_net);
if (!l_net || !l_chain) {
return -2;
} else if (a_str_reply && *a_str_reply) {
DAP_DELETE(*a_str_reply);
*a_str_reply = NULL;
}
dap_hash_fast_t l_tx_hash;
char *l_hex_str_from58 = NULL;
if (dap_chain_hash_fast_from_hex_str(l_tx_hash_str, &l_tx_hash)) {
l_hex_str_from58 = dap_enc_base58_to_hex_str_from_str(l_tx_hash_str);
if (dap_chain_hash_fast_from_hex_str(l_hex_str_from58, &l_tx_hash)) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Invalid tx hash format, need hex or base58");
return -3;
}
}
size_t l_tx_size = 0;
char *l_gdb_group = dap_chain_net_get_gdb_group_mempool_new(l_chain);
dap_chain_datum_tx_t *l_tx = (dap_chain_datum_tx_t *)
dap_chain_global_db_gr_get(l_hex_str_from58 ? l_hex_str_from58 : l_tx_hash_str, &l_tx_size, l_gdb_group);
DAP_DEL_Z(l_hex_str_from58);
if (!l_tx) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Specified tx not found");
return -3;
}
int l_ret = dap_chain_ledger_tx_add_check(l_net->pub.ledger, l_tx);
if (l_ret) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Specified tx verify fail with return code=%d", l_ret);
return -4;
}
dap_chain_node_cli_set_reply_text(a_str_reply, "Specified tx verified successfully");
return 0;
}
/**
* @brief com_tx_history
* tx_history command
* Transaction history for an address
* @param a_argc
* @param a_argv
* @param a_str_reply
* @return int
*/
int com_tx_history(int a_argc, char ** a_argv, char **a_str_reply)
{
int arg_index = 1;
const char *l_addr_base58 = NULL;
const char *l_wallet_name = NULL;
const char *l_net_str = NULL;
const char *l_chain_str = NULL;
const char *l_tx_hash_str = NULL;
dap_chain_t * l_chain = NULL;
dap_chain_net_t * l_net = NULL;
const char * l_hash_out_type = NULL;
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-H", &l_hash_out_type);
if(!l_hash_out_type)
l_hash_out_type = "hex";
if(dap_strcmp(l_hash_out_type,"hex") && dap_strcmp(l_hash_out_type,"base58")) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Invalid parameter -H, valid values: -H <hex | base58>");
return -1;
}
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-addr", &l_addr_base58);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-w", &l_wallet_name);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-net", &l_net_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-chain", &l_chain_str);
dap_chain_node_cli_find_option_val(a_argv, arg_index, a_argc, "-tx", &l_tx_hash_str);
if(!l_addr_base58 && !l_wallet_name && !l_tx_hash_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_history requires parameter '-addr' or '-w' or '-tx'");
return -1;
}
// Select chain network
if(!l_net_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_history requires parameter '-net'");
return -2;
} else {
if((l_net = dap_chain_net_by_name(l_net_str)) == NULL) { // Can't find such network
dap_chain_node_cli_set_reply_text(a_str_reply,
"tx_history requires parameter '-net' to be valid chain network name");
return -3;
}
}
//Select chain emission
if(!l_chain_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "tx_history requires parameter '-chain'");
return -4;
} else {
if((l_chain = dap_chain_net_get_chain_by_name(l_net, l_chain_str)) == NULL) { // Can't find such chain
dap_chain_node_cli_set_reply_text(a_str_reply,
"tx_history requires parameter '-chain' to be valid chain name in chain net %s",
l_net_str);
return -5;
}
}
//char *l_group_mempool = dap_chain_net_get_gdb_group_mempool(l_chain);
//const char *l_chain_group = dap_chain_gdb_get_group(l_chain);
dap_chain_hash_fast_t l_tx_hash;
if(l_tx_hash_str) {
if(dap_chain_hash_fast_from_str(l_tx_hash_str, &l_tx_hash) < 0) {
l_tx_hash_str = NULL;
dap_chain_node_cli_set_reply_text(a_str_reply, "tx hash not recognized");
return -1;
}
// char hash_str[99];
// dap_chain_hash_fast_to_str(&l_tx_hash, hash_str,99);
// int gsdgsd=523;
}
dap_chain_addr_t *l_addr = NULL;
// if need addr
if(!l_tx_hash_str) {
if(l_wallet_name) {
const char *c_wallets_path = dap_chain_wallet_get_path(g_config);
dap_chain_wallet_t * l_wallet = dap_chain_wallet_open(l_wallet_name, c_wallets_path);
if(l_wallet) {
dap_chain_addr_t *l_addr_tmp = (dap_chain_addr_t *) dap_chain_wallet_get_addr(l_wallet, l_net->pub.id);
l_addr = DAP_NEW_SIZE(dap_chain_addr_t, sizeof(dap_chain_addr_t));
memcpy(l_addr, l_addr_tmp, sizeof(dap_chain_addr_t));
dap_chain_wallet_close(l_wallet);
}
}
if(!l_addr && l_addr_base58) {
l_addr = dap_chain_addr_from_str(l_addr_base58);
}
if(!l_addr && !l_tx_hash_str) {
dap_chain_node_cli_set_reply_text(a_str_reply, "wallet address not recognized");
return -1;
}
}
char *l_str_out = l_tx_hash_str ?
dap_db_history_tx(&l_tx_hash, l_chain, l_hash_out_type) :
dap_db_history_addr(l_addr, l_chain, l_hash_out_type);
char *l_str_ret = NULL;
if(l_tx_hash_str) {
l_str_ret = dap_strdup_printf("History for tx hash %s:\n%s", l_tx_hash_str,
l_str_out ? l_str_out : " empty");
}
else if(l_addr) {
char *l_addr_str = dap_chain_addr_to_str(l_addr);
l_str_ret = dap_strdup_printf("History for addr %s:\n%s", l_addr_str,
l_str_out ? l_str_out : " empty");
DAP_DELETE(l_addr_str);
}
dap_chain_node_cli_set_reply_text(a_str_reply, l_str_ret);
DAP_DELETE(l_str_out);
DAP_DELETE(l_str_ret);
return 0;
}
/**
* @brief stats command
*
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_stats(int argc, char ** argv, char **str_reply)
{
enum {
CMD_NONE, CMD_STATS_CPU
};
int arg_index = 1;
int cmd_num = CMD_NONE;
// find add parameter ('cpu')
if (dap_chain_node_cli_find_option_val(argv, arg_index, min(argc, arg_index + 1), "cpu", NULL)) {
cmd_num = CMD_STATS_CPU;
}
switch (cmd_num) {
case CMD_NONE:
default:
dap_chain_node_cli_set_reply_text(str_reply, "format of command: stats cpu");
return -1;
case CMD_STATS_CPU:
#if (defined DAP_OS_UNIX) || (defined __WIN32)
{
dap_cpu_monitor_init();
dap_usleep(500000);
char *str_reply_prev = dap_strdup_printf("");
char *str_delimiter;
dap_cpu_stats_t s_cpu_stats = dap_cpu_get_stats();
for (uint32_t n_cpu_num = 0; n_cpu_num < s_cpu_stats.cpu_cores_count; n_cpu_num++) {
if ((n_cpu_num % 4 == 0) && (n_cpu_num != 0)) {
str_delimiter = dap_strdup_printf("\n");
} else if (n_cpu_num == s_cpu_stats.cpu_cores_count - 1) {
str_delimiter = dap_strdup_printf("");
} else {
str_delimiter = dap_strdup_printf(" ");
}
*str_reply = dap_strdup_printf("%sCPU-%d: %f%%%s", str_reply_prev, n_cpu_num, s_cpu_stats.cpus[n_cpu_num].load, str_delimiter);
DAP_DELETE(str_reply_prev);
DAP_DELETE(str_delimiter);
str_reply_prev = *str_reply;
}
*str_reply = dap_strdup_printf("%s\nTotal: %f%%", str_reply_prev, s_cpu_stats.cpu_summary.load);
DAP_DELETE(str_reply_prev);
break;
}
#else
dap_chain_node_cli_set_reply_text(str_reply, "only Linux or Windows environment supported");
return -1;
#endif // DAP_OS_UNIX
}
return 0;
}
/**
* @brief com_exit
*
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_exit(int argc, char ** argv, char **str_reply)
{
UNUSED(argc);
UNUSED(argv);
UNUSED(str_reply);
//dap_events_stop_all();
exit(0);
return 0;
}
/**
* @brief com_print_log Print log info
* print_log [ts_after <timestamp >] [limit <line numbers>]
* @param argc
* @param argv
* @param arg_func
* @param str_reply
* @return int
*/
int com_print_log(int argc, char ** argv, char **str_reply)
{
int arg_index = 1;
const char * l_str_ts_after = NULL;
const char * l_str_limit = NULL;
int64_t l_ts_after = 0;
long l_limit = 0;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "ts_after", &l_str_ts_after);
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "limit", &l_str_limit);
l_ts_after = (l_str_ts_after) ? strtoll(l_str_ts_after, 0, 10) : -1;
l_limit = (l_str_limit) ? strtol(l_str_limit, 0, 10) : -1;
if(l_ts_after < 0 || !l_str_ts_after) {
dap_chain_node_cli_set_reply_text(str_reply, "requires valid parameter 'l_ts_after'");
return -1;
}
if(!l_limit) {
dap_chain_node_cli_set_reply_text(str_reply, "requires valid parameter 'limit'");
return -1;
}
// get logs from list
char *l_str_ret = dap_log_get_item(l_ts_after, (int) l_limit);
if(!l_str_ret) {
dap_chain_node_cli_set_reply_text(str_reply, "no logs");
return -1;
}
dap_chain_node_cli_set_reply_text(str_reply, l_str_ret);
DAP_DELETE(l_str_ret);
return 0;
}
/**
* @brief cmd_gdb_export
* action for cellframe-node-cli gdb_export command
* @param argc
* @param argv
* @param arg_func
* @param a_str_reply
* @return
*/
int cmd_gdb_export(int argc, char ** argv, char ** a_str_reply)
{
int arg_index = 1;
const char *l_filename = NULL;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "filename", &l_filename);
if (!l_filename) {
dap_chain_node_cli_set_reply_text(a_str_reply, "gdb_export requires parameter 'filename'");
return -1;
}
const char *l_db_path = dap_config_get_item_str(g_config, "resources", "dap_global_db_path");
DIR *dir = opendir(l_db_path);
if (!dir) {
log_it(L_ERROR, "Can't open db directory");
dap_chain_node_cli_set_reply_text(a_str_reply, "Can't open db directory");
return -1;
}
char l_path[strlen(l_db_path) + strlen(l_filename) + 12];
memset(l_path, '\0', sizeof(l_path));
dap_snprintf(l_path, sizeof(l_path), "%s/%s.json", l_db_path, l_filename);
struct json_object *l_json = json_object_new_array();
dap_list_t *l_groups_list = dap_chain_global_db_driver_get_groups_by_mask("*");
for (dap_list_t *l_list = l_groups_list; l_list; l_list = dap_list_next(l_list)) {
size_t l_store_obj_count = 0;
char *l_group_name = (char *)l_list->data;
pdap_store_obj_t l_store_obj = dap_global_db_store_objs_get_sync(l_group_name,0, &l_store_obj_count);
log_it(L_INFO, "Exporting group %s, number of records: %zu", l_group_name, l_store_obj_count);
if (!l_store_obj_count) {
continue;
}
struct json_object *l_json_group = json_object_new_array();
struct json_object *l_json_group_inner = json_object_new_object();
json_object_object_add(l_json_group_inner, "group", json_object_new_string(l_group_name));
for (size_t i = 0; i < l_store_obj_count; ++i) {
size_t l_out_size = DAP_ENC_BASE64_ENCODE_SIZE((int64_t)l_store_obj[i].value_len) + 1;
char *l_value_enc_str = DAP_NEW_Z_SIZE(char, l_out_size);
dap_enc_base64_encode(l_store_obj[i].value, l_store_obj[i].value_len, l_value_enc_str, DAP_ENC_DATA_TYPE_B64);
struct json_object *jobj = json_object_new_object();
json_object_object_add(jobj, "id", json_object_new_int64((int64_t)l_store_obj[i].id));
json_object_object_add(jobj, "key", json_object_new_string(l_store_obj[i].key));
json_object_object_add(jobj, "value", json_object_new_string(l_value_enc_str));
json_object_object_add(jobj, "value_len", json_object_new_int64((int64_t)l_store_obj[i].value_len));
json_object_object_add(jobj, "timestamp", json_object_new_int64((int64_t)l_store_obj[i].timestamp));
json_object_array_add(l_json_group, jobj);
DAP_FREE(l_value_enc_str);
}
json_object_object_add(l_json_group_inner, "records", l_json_group);
json_object_array_add(l_json, l_json_group_inner);
dap_store_obj_free(l_store_obj, l_store_obj_count);
}
dap_list_free_full(l_groups_list, NULL);
if (json_object_to_file(l_path, l_json) == -1) {
#if JSON_C_MINOR_VERSION<15
log_it(L_CRITICAL, "Couldn't export JSON to file, error code %d", errno );
dap_chain_node_cli_set_reply_text (a_str_reply, "Couldn't export JSON to file, error code %d", errno );
#else
log_it(L_CRITICAL, "Couldn't export JSON to file, err '%s'", json_util_get_last_err());
dap_chain_node_cli_set_reply_text(a_str_reply, json_util_get_last_err());
#endif
json_object_put(l_json);
return -1;
}
json_object_put(l_json);
return 0;
}
/**
* @brief cmd_gdb_import
* @param argc
* @param argv
* @param arg_func
* @param a_str_reply
* @return
*/
int cmd_gdb_import(int argc, char ** argv, char ** a_str_reply)
{
int arg_index = 1;
const char *l_filename = NULL;
dap_chain_node_cli_find_option_val(argv, arg_index, argc, "filename", &l_filename);
if (!l_filename) {
dap_chain_node_cli_set_reply_text(a_str_reply, "gdb_import requires parameter 'filename'");
return -1;
}
const char *l_db_path = dap_config_get_item_str(g_config, "resources", "dap_global_db_path");
char l_path[strlen(l_db_path) + strlen(l_filename) + 12];
memset(l_path, '\0', sizeof(l_path));
dap_snprintf(l_path, sizeof(l_path), "%s/%s.json", l_db_path, l_filename);
struct json_object *l_json = json_object_from_file(l_path);
if (!l_json) {
#if JSON_C_MINOR_VERSION<15
log_it(L_CRITICAL, "Import error occured: code %d", errno);
dap_chain_node_cli_set_reply_text(a_str_reply, "Import error occured: code %d",errno);
#else
log_it(L_CRITICAL, "Import error occured: %s", json_util_get_last_err());
dap_chain_node_cli_set_reply_text(a_str_reply, json_util_get_last_err());
#endif
return -1;
}
for (size_t i = 0, l_groups_count = json_object_array_length(l_json); i < l_groups_count; ++i) {
struct json_object *l_group_obj = json_object_array_get_idx(l_json, i);
if (!l_group_obj) {
continue;
}
struct json_object *l_json_group_name = json_object_object_get(l_group_obj, "group");
const char *l_group_name = json_object_get_string(l_json_group_name);
// proc group name
log_it(L_INFO, "Group %zu: %s", i, l_group_name);
struct json_object *l_json_records = json_object_object_get(l_group_obj, "records");
size_t l_records_count = json_object_array_length(l_json_records);
pdap_store_obj_t l_group_store = DAP_NEW_Z_SIZE(dap_store_obj_t, l_records_count * sizeof(dap_store_obj_t));
for (size_t j = 0; j < l_records_count; ++j) {
struct json_object *l_record, *l_id, *l_key, *l_value, *l_value_len, *l_ts;
l_record = json_object_array_get_idx(l_json_records, j);
l_id = json_object_object_get(l_record, "id");
l_key = json_object_object_get(l_record, "key");
l_value = json_object_object_get(l_record, "value");
l_value_len = json_object_object_get(l_record, "value_len");
l_ts = json_object_object_get(l_record, "timestamp");
//
l_group_store[j].id = (uint64_t)json_object_get_int64(l_id);
l_group_store[j].key = dap_strdup(json_object_get_string(l_key));
l_group_store[j].group = dap_strdup(l_group_name);
l_group_store[j].timestamp = json_object_get_int64(l_ts);
l_group_store[j].value_len = (uint64_t)json_object_get_int64(l_value_len);
l_group_store[j].type = 'a';
const char *l_value_str = json_object_get_string(l_value);
char *l_val = DAP_NEW_Z_SIZE(char, l_group_store[j].value_len);
dap_enc_base64_decode(l_value_str, strlen(l_value_str), l_val, DAP_ENC_DATA_TYPE_B64);
l_group_store[j].value = (uint8_t*)l_val;
}
if (dap_chain_global_db_driver_apply(l_group_store, l_records_count)) {
log_it(L_CRITICAL, "An error occured on importing group %s...", l_group_name);
}
//dap_store_obj_free(l_group_store, l_records_count);
}
json_object_put(l_json);
return 0;
}
/*
* block code signer
*/
/*
* enum for dap_chain_sign_file
*/
typedef enum {
SIGNER_ALL_FLAGS = 0x1f,
SIGNER_FILENAME = 1 << 0, // flag - full filename
SIGNER_FILENAME_SHORT = 1 << 1, // flag - filename without extension
SIGNER_FILESIZE = 1 << 2, // flag - size of file
SIGNER_DATE = 1 << 3, // flag - date
SIGNER_MIME_MAGIC = 1 << 4, // flag - mime magic
SIGNER_COUNT = 5 // count flags
} dap_sign_signer_file_t;
static int s_sign_file(const char *a_filename, dap_sign_signer_file_t a_flags, const char *a_cert_name,
dap_sign_t **a_signed, dap_chain_hash_fast_t *a_hash);
static int s_signer_cmd(int a_arg_index, int a_argc, char **a_argv, char **a_str_reply);
static int s_check_cmd(int a_arg_index, int a_argc, char **a_argv, char **a_str_reply);
static uint8_t *s_byte_to_hex(const char *a_line, size_t *a_size);
static uint8_t s_get_num(uint8_t a_byte, int a_pp);
struct opts {
char *name;
uint32_t cmd;
};
#define BUILD_BUG(condition) ((void)sizeof(char[1-2*!!(condition)]))
int com_signer(int a_argc, char **a_argv, char **a_str_reply)
{
enum {
CMD_NONE, CMD_SIGN, CMD_CHECK
};
int arg_index = 1;
int cmd_num = CMD_NONE;
struct opts l_opts[] = {
{ "sign", CMD_SIGN },
{ "check", CMD_CHECK }
};
size_t l_len_opts = sizeof(l_opts) / sizeof(struct opts);
for (size_t i = 0; i < l_len_opts; i++) {
if (dap_chain_node_cli_find_option_val(a_argv, arg_index, min(a_argc, arg_index + 1), l_opts[i].name, NULL)) {
cmd_num = l_opts[i].cmd;
break;
}
}
if(cmd_num == CMD_NONE) {
dap_chain_node_cli_set_reply_text(a_str_reply, "command %s not recognized", a_argv[1]);
return -1;
}
switch (cmd_num) {
case CMD_SIGN:
return s_signer_cmd(arg_index, a_argc, a_argv, a_str_reply);
break;
case CMD_CHECK:
return s_check_cmd(arg_index, a_argc, a_argv, a_str_reply);
break;
}
return -1;
}
static int s_get_key_from_file(const char *a_file, const char *a_mime, const char *a_cert_name, dap_sign_t **a_sign);
static int s_check_cmd(int a_arg_index, int a_argc, char **a_argv, char **a_str_reply)
{
int l_ret = 0;
enum {OPT_FILE, OPT_HASH, OPT_NET, OPT_MIME, OPT_CERT,
OPT_COUNT};
struct opts l_opts_check[] = {
{ "-file", OPT_FILE },
{ "-hash", OPT_HASH },
{ "-net", OPT_NET },
{ "-mime", OPT_MIME },
{ "-cert", OPT_CERT }
};
BUILD_BUG((sizeof(l_opts_check)/sizeof(struct opts)) != OPT_COUNT);
char *l_str_opts_check[OPT_COUNT] = {0};
for (int i = 0; i < OPT_COUNT; i++) {
dap_chain_node_cli_find_option_val(a_argv, a_arg_index, a_argc, l_opts_check[i].name, (const char **) &l_str_opts_check[i]);
}
if (!l_str_opts_check[OPT_CERT]) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s need to be selected", l_opts_check[OPT_CERT].name);
return -1;
}
if (l_str_opts_check[OPT_HASH] && l_str_opts_check[OPT_FILE]) {
dap_chain_node_cli_set_reply_text(a_str_reply, "you can select is only one from (file or hash)");
return -1;
}
dap_chain_net_t *l_network = dap_chain_net_by_name(l_str_opts_check[OPT_NET]);
if (!l_network) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s network not found", l_str_opts_check[OPT_NET]);
return -1;
}
dap_chain_t *l_chain = dap_chain_net_get_chain_by_chain_type(l_network, CHAIN_TYPE_SIGNER);
if (!l_chain) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Not found datum signer in network %s", l_str_opts_check[OPT_NET]);
return -1;
}
int found = 0;
dap_sign_t *l_sign = NULL;
dap_chain_datum_t *l_datum = NULL;
dap_global_db_obj_t *l_objs = NULL;
char *l_gdb_group = NULL;
l_gdb_group = dap_chain_net_get_gdb_group_mempool_new(l_chain);
if (!l_gdb_group) {
dap_chain_node_cli_set_reply_text(a_str_reply, "Not found network group for chain: %s", l_chain->name);
l_ret = -1;
goto end;
}
dap_chain_hash_fast_t l_hash_tmp;
if (l_str_opts_check[OPT_HASH]) {
dap_chain_hash_fast_from_str(l_str_opts_check[OPT_HASH], &l_hash_tmp);
}
if (l_str_opts_check[OPT_FILE]) {
l_ret = s_get_key_from_file(l_str_opts_check[OPT_FILE], l_str_opts_check[OPT_MIME], l_str_opts_check[OPT_CERT], &l_sign);
if (!l_ret) {
l_ret = -1;
goto end;
}
l_datum = dap_chain_datum_create(DAP_CHAIN_DATUM_SIGNER, l_sign->pkey_n_sign, l_sign->header.sign_size);
if (!l_datum) {
dap_chain_node_cli_set_reply_text(a_str_reply, "not created datum");
l_ret = -1;
goto end;
}
dap_hash_fast(l_datum->data, l_datum->header.data_size, &l_hash_tmp);
}
dap_chain_cell_id_t l_cell_id = {0};
dap_chain_atom_iter_t *l_iter = NULL;
dap_chain_cell_t *l_cell_tmp = NULL;
dap_chain_cell_t *l_cell = NULL;
dap_chain_datum_t *l_datum_tmp = NULL;
size_t l_size = 0;
HASH_ITER(hh, l_chain->cells, l_cell, l_cell_tmp) {
l_iter = l_cell->chain->callback_atom_iter_create(l_cell->chain, l_cell->id, 0);
dap_chain_datum_t *l_datum = l_cell->chain->callback_atom_find_by_hash(l_iter, &l_hash_tmp, &l_size);
if (l_datum) {
dap_hash_fast_t l_hash;
dap_hash_fast(l_datum->data, l_datum->header.data_size, &l_hash);
if (!memcmp(l_hash_tmp.raw, l_hash.raw, DAP_CHAIN_HASH_FAST_SIZE)) {
dap_chain_node_cli_set_reply_text(a_str_reply, "found!");
found = 1;
break;
}
}
}
end:
if (l_gdb_group) DAP_FREE(l_gdb_group);
if (!found) {
dap_chain_node_cli_set_reply_text(a_str_reply, "not found!");
}
return 0;
}
static int s_get_key_from_file(const char *a_file, const char *a_mime, const char *a_cert_name, dap_sign_t **a_sign)
{
char **l_items_mime = NULL;
int l_items_mime_count = 0;
uint32_t l_flags_mime = 0;
if (a_mime) {
l_items_mime = dap_parse_items(a_mime, ',', &l_items_mime_count, 0);
}
if (l_items_mime && l_items_mime_count > 0) {
struct opts l_opts_flags[] = {
{ "SIGNER_ALL_FLAGS", SIGNER_ALL_FLAGS },
{ "SIGNER_FILENAME", SIGNER_FILENAME },
{ "SIGNER_FILENAME_SHORT", SIGNER_FILENAME_SHORT },
{ "SIGNER_FILESIZE", SIGNER_FILESIZE },
{ "SIGNER_DATE", SIGNER_DATE },
{ "SIGNER_MIME_MAGIC", SIGNER_MIME_MAGIC }
};
int l_len_opts_flags = sizeof(l_opts_flags) / sizeof (struct opts);
for (int i = 0; i < l_len_opts_flags; i++) {
for (int isub = 0; isub < l_items_mime_count; isub++) {
if (!strncmp (l_opts_flags[i].name, l_items_mime[isub], strlen(l_items_mime[isub]) + 1)) {
l_flags_mime |= l_opts_flags[i].cmd;
break;
}
}
}
/* free l_items_mime */
for (int i = 0; i < l_items_mime_count; i++) {
if (l_items_mime[i]) DAP_FREE(l_items_mime[i]);
}
DAP_FREE(l_items_mime);
l_items_mime_count = 0;
}
if (l_flags_mime == 0) l_flags_mime = SIGNER_ALL_FLAGS;
dap_chain_hash_fast_t l_hash;
int l_ret = s_sign_file(a_file, l_flags_mime, a_cert_name, a_sign, &l_hash);
return l_ret;
}
static int s_signer_cmd(int a_arg_index, int a_argc, char **a_argv, char **a_str_reply)
{
enum {
OPT_FILE, OPT_MIME, OPT_NET, OPT_CHAIN, OPT_CERT,
OPT_COUNT
};
struct opts l_opts_signer[] = {
{ "-file", OPT_FILE },
{ "-mime", OPT_MIME },
{ "-net", OPT_NET },
{ "-chain", OPT_CHAIN },
{ "-cert", OPT_CERT }
};
BUILD_BUG((sizeof(l_opts_signer)/sizeof(struct opts)) != OPT_COUNT);
a_arg_index++;
char *l_opts_sign[OPT_COUNT] = {0};
for (int i = 0; i < OPT_COUNT; i++) {
dap_chain_node_cli_find_option_val(a_argv, a_arg_index, a_argc, l_opts_signer[i].name, (const char **) &l_opts_sign[i]);
}
if (!l_opts_sign[OPT_CERT]) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s need to be selected", l_opts_signer[OPT_CERT].name);
return -1;
}
dap_chain_net_t *l_network = dap_chain_net_by_name(l_opts_sign[OPT_NET]);
if (!l_network) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s network not found", l_opts_sign[OPT_NET]);
return -1;
}
dap_chain_t *l_chain = dap_chain_net_get_chain_by_name(l_network, l_opts_sign[OPT_CHAIN]);
if (!l_chain) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s chain not found", l_opts_sign[OPT_CHAIN]);
return -1;
}
int l_ret = 0;
dap_sign_t *l_sign = NULL;
dap_chain_datum_t *l_datum = NULL;
dap_global_db_obj_t *l_objs = NULL;
l_ret = s_get_key_from_file(l_opts_sign[OPT_FILE], l_opts_sign[OPT_MIME], l_opts_sign[OPT_CERT], &l_sign);
if (!l_ret) {
dap_chain_node_cli_set_reply_text(a_str_reply, "%s cert not found", l_opts_sign[OPT_CERT]);
l_ret = -1;
goto end;
}
l_datum = dap_chain_datum_create(DAP_CHAIN_DATUM_SIGNER, l_sign->pkey_n_sign, l_sign->header.sign_size);
if (!l_datum) {
dap_chain_node_cli_set_reply_text(a_str_reply, "not created datum");
l_ret = -1;
goto end;
}
dap_chain_cell_id_t l_cell_id = {0};
dap_chain_cell_create_fill(l_chain, l_cell_id);
l_ret = l_chain->callback_add_datums(l_chain, &l_datum, 1);
dap_hash_fast_t l_hash;
dap_hash_fast(l_datum->data, l_datum->header.data_size, &l_hash);
char *l_key_str = dap_chain_hash_fast_to_str_new(&l_hash);
dap_chain_node_cli_set_reply_text(a_str_reply, "hash: %s", l_key_str);
DAP_FREE(l_key_str);
end:
if (l_datum) DAP_FREE(l_datum);
return l_ret;
}
/*
SIGNER_ALL_FLAGS = 0 << 0,
SIGNER_FILENAME = 1 << 0, // flag - full filename
SIGNER_FILENAME_SHORT = 1 << 1, // flag - filename without extension
SIGNER_FILESIZE = 1 << 2, // flag - size of file
SIGNER_DATE = 1 << 3, // flag - date
SIGNER_MIME_MAGIC = 1 << 4, // flag - mime magic
SIGNER_COUNT
*/
static char *s_strdup_by_index (const char *a_file, const int a_index);
static dap_tsd_t *s_alloc_metadata (const char *a_file, const int a_meta);
static uint8_t *s_concat_hash_and_mimetypes (dap_chain_hash_fast_t *a_chain, dap_list_t *a_meta_list, size_t *a_fullsize);
/*
* dap_sign_file - sign a file with flags.
* flags - (SIGNER_FILENAME, SIGNER_FILENAME_SHORT, SIGNER_FILESIZE, SIGNER_DATE, SIGNER_MIME_MAGIC) or SIGNER_ALL_FLAGS
* example
* int ret = dap_sign_file ("void.png", SIGNER_ALL_FLAGS); it's sign file with all mime types.
* example
* int ret = dap_sign_file ("void.png", SIGNER_FILENAME | SIGNER_FILESIZE | SIGNER_DATE);
*/
/**
* @brief dap_chain_sign_file
* @param a_chain
* @param a_filename
* @param a_flags
* @return
*/
static int s_sign_file(const char *a_filename, dap_sign_signer_file_t a_flags, const char *a_cert_name,
dap_sign_t **a_signed, dap_chain_hash_fast_t *a_hash)
{
uint32_t l_shift = 1;
int l_count_meta = 0;
int l_index_meta = 0;
char *l_buffer = NULL;
if (a_flags == SIGNER_ALL_FLAGS) {
l_count_meta = SIGNER_COUNT;
a_flags = SIGNER_FILENAME | SIGNER_FILENAME_SHORT | SIGNER_FILESIZE | SIGNER_DATE | SIGNER_MIME_MAGIC;
}
do {
if (a_flags <= 0) break;
for (int i = 0; i < SIGNER_COUNT; i++) {
if (l_shift | a_flags) l_count_meta++;
l_shift <<= 1;
}
} while (0);
size_t l_file_content_size;
if (!dap_file_get_contents(a_filename, &l_buffer, &l_file_content_size)) return 0;
l_shift = 1;
dap_list_t *l_std_list = NULL;
for (int i = 0; i < l_count_meta; i++) {
if (l_shift | a_flags) {
dap_tsd_t *l_item = s_alloc_metadata(a_filename, l_shift & a_flags);
if (l_item) {
l_std_list = dap_list_append(l_std_list, l_item);
l_index_meta++;
}
}
l_shift <<= 1;
}
dap_cert_t *l_cert = dap_cert_find_by_name(a_cert_name);
if (!l_cert) {
DAP_FREE(l_buffer);
return 0;
}
if (!dap_hash_fast(l_buffer, l_file_content_size, a_hash)) {
DAP_FREE(l_buffer);
return 0;
}
size_t l_full_size_for_sign;
uint8_t *l_data = s_concat_hash_and_mimetypes(a_hash, l_std_list, &l_full_size_for_sign);
if (!l_data) {
DAP_FREE(l_buffer);
return 0;
}
*a_signed = dap_sign_create(l_cert->enc_key, l_data, l_full_size_for_sign, 0);
if (*a_signed == NULL) {
DAP_FREE(l_buffer);
return 0;
}
DAP_FREE(l_buffer);
return 1;
}
static byte_t *s_concat_meta (dap_list_t *a_meta, size_t *a_fullsize)
{
if (a_fullsize)
*a_fullsize = 0;
int l_part = 256;
int l_power = 1;
byte_t *l_buf = DAP_CALLOC(l_part * l_power++, 1);
size_t l_counter = 0;
size_t l_part_power = l_part;
int l_index = 0;
for ( dap_list_t* l_iter = dap_list_first(a_meta); l_iter; l_iter = l_iter->next){
if (!l_iter->data) continue;
dap_tsd_t * l_tsd = (dap_tsd_t *) l_iter->data;
l_index = l_counter;
l_counter += strlen((char *)l_tsd->data);
if (l_counter >= l_part_power) {
l_part_power = l_part * l_power++;
l_buf = (byte_t *) DAP_REALLOC(l_buf, l_part_power);
}
memcpy (&l_buf[l_index], l_tsd->data, strlen((char *)l_tsd->data));
}
if (a_fullsize)
*a_fullsize = l_counter;
return l_buf;
}
static uint8_t *s_concat_hash_and_mimetypes (dap_chain_hash_fast_t *a_chain_hash, dap_list_t *a_meta_list, size_t *a_fullsize)
{
if (!a_fullsize) return NULL;
byte_t *l_buf = s_concat_meta (a_meta_list, a_fullsize);
if (!l_buf) return (uint8_t *) l_buf;
size_t l_len_meta_buf = *a_fullsize;
*a_fullsize += sizeof (a_chain_hash->raw) + 1;
uint8_t *l_fullbuf = DAP_CALLOC(*a_fullsize, 1);
uint8_t *l_s = l_fullbuf;
memcpy(l_s, a_chain_hash->raw, sizeof(a_chain_hash->raw));
l_s += sizeof (a_chain_hash->raw);
memcpy(l_s, l_buf, l_len_meta_buf);
DAP_FREE(l_buf);
return l_fullbuf;
}
static char *s_strdup_by_index (const char *a_file, const int a_index)
{
char *l_buf = DAP_CALLOC(a_index + 1, 1);
strncpy (l_buf, a_file, a_index);
return l_buf;
}
static dap_tsd_t *s_alloc_metadata (const char *a_file, const int a_meta)
{
switch (a_meta) {
case SIGNER_FILENAME:
return dap_tsd_create_string(SIGNER_FILENAME, a_file);
break;
case SIGNER_FILENAME_SHORT:
{
char *l_filename_short = NULL;
if ((l_filename_short = strrchr(a_file, '.')) != 0) {
int l_index_of_latest_point = l_filename_short - a_file;
l_filename_short = s_strdup_by_index (a_file, l_index_of_latest_point);
if (!l_filename_short) return NULL;
dap_tsd_t *l_ret = dap_tsd_create_string(SIGNER_FILENAME_SHORT, l_filename_short);
free (l_filename_short);
return l_ret;
}
}
break;
case SIGNER_FILESIZE:
{
struct stat l_st;
stat (a_file, &l_st);
char l_size[513];
snprintf(l_size, 513, "%ld", l_st.st_size);
return dap_tsd_create_string(SIGNER_FILESIZE, l_size);
}
break;
case SIGNER_DATE:
{
struct stat l_st;
stat (a_file, &l_st);
char *l_ctime = ctime(&l_st.st_ctime);
char *l = NULL;
if ((l = strchr(l_ctime, '\n')) != 0) *l = 0;
return dap_tsd_create_string(SIGNER_DATE, l_ctime);
}
break;
case SIGNER_MIME_MAGIC:
{
magic_t l_magic = magic_open(MAGIC_MIME);
if (l_magic == NULL) return NULL;
if (magic_load (l_magic, NULL)) {
magic_close(l_magic);
return NULL;
}
const char *l_str_magic_file = NULL;
dap_tsd_t *l_ret = NULL;
do {
l_str_magic_file = magic_file (l_magic, a_file);
if (!l_str_magic_file) break;
l_ret = dap_tsd_create_string(SIGNER_MIME_MAGIC, l_str_magic_file);
} while (0);
magic_close (l_magic);
return l_ret;
}
break;
default:
return NULL;
}
return NULL;
}