nimbus-eth1/nimbus/rpc/whisper.nim

357 lines
13 KiB
Nim
Raw Normal View History

2019-03-23 20:54:28 +00:00
import
json_rpc/rpcserver, rpc_types, hexstrings, tables, options, sequtils,
eth/[common, rlp, keys, p2p], eth/p2p/rlpx_protocols/whisper_protocol,
nimcrypto/[sysrand, hmac, sha2, pbkdf2]
2019-03-23 20:54:28 +00:00
2019-07-07 10:12:01 +00:00
from stew/byteutils import hexToSeqByte, hexToByteArray
2019-03-23 20:54:28 +00:00
# Whisper RPC implemented mostly as in
# https://github.com/ethereum/go-ethereum/wiki/Whisper-v6-RPC-API
type
WhisperKeys* = ref object
asymKeys*: Table[string, KeyPair]
symKeys*: Table[string, SymKey]
KeyGenerationError = object of CatchableError
2019-03-23 20:54:28 +00:00
proc newWhisperKeys*(): WhisperKeys =
new(result)
result.asymKeys = initTable[string, KeyPair]()
result.symKeys = initTable[string, SymKey]()
proc setupWhisperRPC*(node: EthereumNode, keys: WhisperKeys, rpcsrv: RpcServer) =
2018-08-21 21:23:41 +00:00
rpcsrv.rpc("shh_version") do() -> string:
## Returns string of the current whisper protocol version.
2019-03-23 20:54:28 +00:00
result = whisperVersionStr
rpcsrv.rpc("shh_info") do() -> WhisperInfo:
## Returns diagnostic information about the whisper node.
let config = node.protocolState(Whisper).config
result = WhisperInfo(minPow: config.powRequirement,
maxMessageSize: config.maxMsgSize,
memory: 0,
messages: 0)
2018-08-21 21:23:41 +00:00
2019-03-23 20:54:28 +00:00
# TODO: uint32 instead of uint64 is OK here, but needs to be added in json_rpc
rpcsrv.rpc("shh_setMaxMessageSize") do(size: uint64) -> bool:
## Sets the maximal message size allowed by this node.
## Incoming and outgoing messages with a larger size will be rejected.
## Whisper message size can never exceed the limit imposed by the underlying
## P2P protocol (10 Mb).
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## size: Message size in bytes.
##
## Returns true on success and an error on failure.
result = node.setMaxMessageSize(size.uint32)
if not result:
raise newException(ValueError, "Invalid size")
2018-08-21 21:23:41 +00:00
2019-03-23 20:54:28 +00:00
rpcsrv.rpc("shh_setMinPoW") do(pow: float) -> bool:
## Sets the minimal PoW required by this node.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## pow: The new PoW requirement.
##
## Returns true on success and an error on failure.
# Note: If any of the `peer.powRequirement` calls fails, we do not care and
# don't see this as an error. Could move this to `setPowRequirement` if
# this is the general behaviour we want.
try:
waitFor node.setPowRequirement(pow)
2019-12-04 12:43:18 +00:00
except CatchableError:
trace "setPowRequirement error occured"
2019-03-23 20:54:28 +00:00
result = true
2018-08-21 21:23:41 +00:00
2019-03-23 20:54:28 +00:00
# TODO: change string in to ENodeStr with extra checks
rpcsrv.rpc("shh_markTrustedPeer") do(enode: string) -> bool:
## Marks specific peer trusted, which will allow it to send historic
## (expired) messages.
## Note: This function is not adding new nodes, the node needs to exists as
## a peer.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## enode: Enode of the trusted peer.
##
## Returns true on success and an error on failure.
# TODO: It will now require an enode://pubkey@ip:port uri
# could also accept only the pubkey (like geth)?
let peerNode = newNode(enode)
result = node.setPeerTrusted(peerNode.id)
if not result:
raise newException(ValueError, "Not a peer")
2018-08-21 21:23:41 +00:00
rpcsrv.rpc("shh_newKeyPair") do() -> Identifier:
2019-03-23 20:54:28 +00:00
## Generates a new public and private key pair for message decryption and
## encryption.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## Returns key identifier on success and an error on failure.
result = generateRandomID().Identifier
2019-03-23 20:54:28 +00:00
keys.asymKeys.add(result.string, newKeyPair())
2018-08-21 21:23:41 +00:00
rpcsrv.rpc("shh_addPrivateKey") do(key: PrivateKey) -> Identifier:
2019-03-23 20:54:28 +00:00
## Stores the key pair, and returns its ID.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## key: Private key as hex bytes.
##
## Returns key identifier on success and an error on failure.
result = generateRandomID().Identifier
2019-03-23 20:54:28 +00:00
keys.asymKeys.add(result.string, KeyPair(seckey: key,
pubkey: key.getPublicKey()))
2018-08-21 21:23:41 +00:00
rpcsrv.rpc("shh_deleteKeyPair") do(id: Identifier) -> bool:
2019-03-23 20:54:28 +00:00
## Deletes the specifies key if it exists.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## id: Identifier of key pair
##
## Returns true on success and an error on failure.
var unneeded: KeyPair
result = keys.asymKeys.take(id.string, unneeded)
if not result:
raise newException(ValueError, "Invalid key id")
2018-08-21 21:23:41 +00:00
rpcsrv.rpc("shh_hasKeyPair") do(id: Identifier) -> bool:
2019-03-23 20:54:28 +00:00
## Checks if the whisper node has a private key of a key pair matching the
## given ID.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## id: Identifier of key pair
##
## Returns (true or false) on success and an error on failure.
2019-03-23 20:54:28 +00:00
result = keys.asymkeys.hasKey(id.string)
rpcsrv.rpc("shh_getPublicKey") do(id: Identifier) -> PublicKey:
2019-03-23 20:54:28 +00:00
## Returns the public key for identity ID.
##
## id: Identifier of key pair
##
## Returns public key on success and an error on failure.
# Note: key not found exception as error in case not existing
result = keys.asymkeys[id.string].pubkey
rpcsrv.rpc("shh_getPrivateKey") do(id: Identifier) -> PrivateKey:
2019-03-23 20:54:28 +00:00
## Returns the private key for identity ID.
##
## id: Identifier of key pair
##
## Returns private key on success and an error on failure.
# Note: key not found exception as error in case not existing
result = keys.asymkeys[id.string].seckey
rpcsrv.rpc("shh_newSymKey") do() -> Identifier:
2019-03-23 20:54:28 +00:00
## Generates a random symmetric key and stores it under an ID, which is then
## returned. Can be used encrypting and decrypting messages where the key is
## known to both parties.
##
## Returns key identifier on success and an error on failure.
result = generateRandomID().Identifier
2019-03-23 20:54:28 +00:00
var key: SymKey
if randomBytes(key) != key.len:
raise newException(KeyGenerationError, "Failed generating key")
2019-03-23 20:54:28 +00:00
keys.symKeys.add(result.string, key)
2018-08-21 21:23:41 +00:00
rpcsrv.rpc("shh_addSymKey") do(key: SymKey) -> Identifier:
2019-03-23 20:54:28 +00:00
## Stores the key, and returns its ID.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## key: The raw key for symmetric encryption as hex bytes.
##
## Returns key identifier on success and an error on failure.
result = generateRandomID().Identifier
2019-03-23 20:54:28 +00:00
keys.symKeys.add(result.string, key)
2019-03-23 20:54:28 +00:00
rpcsrv.rpc("shh_generateSymKeyFromPassword") do(password: string) -> Identifier:
2019-03-23 20:54:28 +00:00
## Generates the key from password, stores it, and returns its ID.
##
## password: Password.
##
## Returns key identifier on success and an error on failure.
## Warning: an empty string is used as salt because the shh RPC API does not
## allow for passing a salt. A very good password is necessary (calculate
## yourself what that means :))
var ctx: HMAC[sha256]
var symKey: SymKey
if pbkdf2(ctx, password, "", 65356, symKey) != sizeof(SymKey):
raise newException(KeyGenerationError, "Failed generating key")
result = generateRandomID().Identifier
keys.symKeys.add(result.string, symKey)
2018-08-21 21:23:41 +00:00
rpcsrv.rpc("shh_hasSymKey") do(id: Identifier) -> bool:
2019-03-23 20:54:28 +00:00
## Returns true if there is a key associated with the name string.
## Otherwise, returns false.
2018-08-21 21:23:41 +00:00
##
2019-03-23 20:54:28 +00:00
## id: Identifier of key.
##
## Returns (true or false) on success and an error on failure.
result = keys.symkeys.hasKey(id.string)
rpcsrv.rpc("shh_getSymKey") do(id: Identifier) -> SymKey:
2019-03-23 20:54:28 +00:00
## Returns the symmetric key associated with the given ID.
##
## id: Identifier of key.
##
## Returns Raw key on success and an error on failure.
# Note: key not found exception as error in case not existing
result = keys.symkeys[id.string]
rpcsrv.rpc("shh_deleteSymKey") do(id: Identifier) -> bool:
2019-03-23 20:54:28 +00:00
## Deletes the key associated with the name string if it exists.
##
## id: Identifier of key.
##
## Returns (true or false) on success and an error on failure.
var unneeded: SymKey
result = keys.symKeys.take(id.string, unneeded)
if not result:
raise newException(ValueError, "Invalid key id")
2019-03-23 20:54:28 +00:00
rpcsrv.rpc("shh_subscribe") do(id: string,
options: WhisperFilterOptions) -> Identifier:
2019-03-23 20:54:28 +00:00
## Creates and registers a new subscription to receive notifications for
## inbound whisper messages. Returns the ID of the newly created
## subscription.
##
## id: identifier of function call. In case of Whisper must contain the
## value "messages".
## options: WhisperFilterOptions
##
## Returns the subscription ID on success, the error on failure.
# TODO: implement subscriptions, only for WS & IPC?
2018-08-21 21:23:41 +00:00
discard
2019-03-23 20:54:28 +00:00
rpcsrv.rpc("shh_unsubscribe") do(id: Identifier) -> bool:
2019-03-23 20:54:28 +00:00
## Cancels and removes an existing subscription.
##
## id: Subscription identifier
##
## Returns true on success, the error on failure
2019-03-23 20:54:28 +00:00
result = node.unsubscribeFilter(id.string)
if not result:
raise newException(ValueError, "Invalid filter id")
2019-03-23 20:54:28 +00:00
proc validateOptions[T,U,V](asym: Option[T], sym: Option[U], topic: Option[V]) =
if (asym.isSome() and sym.isSome()) or (asym.isNone() and sym.isNone()):
raise newException(ValueError,
"Either privateKeyID/pubKey or symKeyID must be present")
if asym.isNone() and topic.isNone():
raise newException(ValueError, "Topic mandatory with symmetric key")
rpcsrv.rpc("shh_newMessageFilter") do(options: WhisperFilterOptions) -> Identifier:
2019-03-23 20:54:28 +00:00
## Create a new filter within the node. This filter can be used to poll for
## new messages that match the set of criteria.
##
## options: WhisperFilterOptions
##
## Returns filter identifier on success, error on failure
# Check if either symKeyID or privateKeyID is present, and not both
# Check if there are Topics when symmetric key is used
validateOptions(options.privateKeyID, options.symKeyID, options.topics)
var filter: Filter
if options.privateKeyID.isSome():
filter.privateKey = some(keys.asymKeys[options.privateKeyID.get().string].seckey)
if options.symKeyID.isSome():
filter.symKey= some(keys.symKeys[options.symKeyID.get().string])
filter.src = options.sig
2019-03-23 20:54:28 +00:00
if options.minPow.isSome():
filter.powReq = options.minPow.get()
if options.topics.isSome():
filter.topics = options.topics.get()
2019-03-23 20:54:28 +00:00
if options.allowP2P.isSome():
filter.allowP2P = options.allowP2P.get()
result = node.subscribeFilter(filter).Identifier
2019-03-23 20:54:28 +00:00
rpcsrv.rpc("shh_deleteMessageFilter") do(id: Identifier) -> bool:
2019-03-23 20:54:28 +00:00
## Uninstall a message filter in the node.
##
## id: Filter identifier as returned when the filter was created.
##
## Returns true on success, error on failure.
result = node.unsubscribeFilter(id.string)
if not result:
raise newException(ValueError, "Invalid filter id")
2019-03-23 20:54:28 +00:00
rpcsrv.rpc("shh_getFilterMessages") do(id: Identifier) -> seq[WhisperFilterMessage]:
2019-03-23 20:54:28 +00:00
## Retrieve messages that match the filter criteria and are received between
## the last time this function was called and now.
##
## id: ID of filter that was created with `shh_newMessageFilter`.
##
## Returns array of messages on success and an error on failure.
let messages = node.getFilterMessages(id.string)
for msg in messages:
var filterMsg: WhisperFilterMessage
filterMsg.sig = msg.decoded.src
filterMsg.recipientPublicKey = msg.dst
2019-03-23 20:54:28 +00:00
filterMsg.ttl = msg.ttl
filterMsg.topic = msg.topic
filterMsg.timestamp = msg.timestamp
filterMsg.payload = msg.decoded.payload
# Note: whisper_protocol padding is an Option as there is the
# possibility of 0 padding in case of custom padding.
2019-03-23 20:54:28 +00:00
if msg.decoded.padding.isSome():
filterMsg.padding = msg.decoded.padding.get()
filterMsg.pow = msg.pow
filterMsg.hash = msg.hash
result.add(filterMsg)
rpcsrv.rpc("shh_post") do(message: WhisperPostMessage) -> bool:
## Creates a whisper message and injects it into the network for
## distribution.
##
## message: Whisper message to post.
##
## Returns true on success and an error on failure.
# Check if either symKeyID or pubKey is present, and not both
# Check if there is a Topic when symmetric key is used
validateOptions(message.pubKey, message.symKeyID, message.topic)
var
sigPrivKey: Option[PrivateKey]
symKey: Option[SymKey]
topic: whisper_protocol.Topic
padding: Option[Bytes]
targetPeer: Option[NodeId]
if message.sig.isSome():
sigPrivKey = some(keys.asymKeys[message.sig.get().string].seckey)
if message.symKeyID.isSome():
symKey = some(keys.symKeys[message.symKeyID.get().string])
# Note: If no topic it will be defaulted to 0x00000000
if message.topic.isSome():
topic = message.topic.get()
2019-03-23 20:54:28 +00:00
if message.padding.isSome():
padding = some(hexToSeqByte(message.padding.get().string))
if message.targetPeer.isSome():
targetPeer = some(newNode(message.targetPeer.get()).id)
result = node.postMessage(message.pubKey,
2019-03-23 20:54:28 +00:00
symKey,
sigPrivKey,
ttl = message.ttl.uint32,
topic = topic,
payload = hexToSeqByte(message.payload.string),
padding = padding,
powTime = message.powTime,
powTarget = message.powTarget,
targetPeer = targetPeer)
if not result:
raise newException(ValueError, "Message could not be posted")