2019-11-27 12:22:23 +00:00
|
|
|
// +build !nimbus
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"database/sql"
|
2020-10-27 15:14:00 +00:00
|
|
|
"encoding/json"
|
2019-11-23 17:57:05 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2020-10-26 12:39:42 +00:00
|
|
|
"github.com/status-im/status-go/images"
|
2019-11-23 17:57:05 +00:00
|
|
|
"math/big"
|
2020-07-13 10:45:36 +00:00
|
|
|
"os"
|
2019-11-23 17:57:05 +00:00
|
|
|
"path/filepath"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
|
|
ethcrypto "github.com/ethereum/go-ethereum/crypto"
|
|
|
|
"github.com/ethereum/go-ethereum/ethclient"
|
|
|
|
"github.com/ethereum/go-ethereum/event"
|
|
|
|
"github.com/ethereum/go-ethereum/log"
|
|
|
|
gethnode "github.com/ethereum/go-ethereum/node"
|
2020-01-02 09:10:19 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
"github.com/status-im/status-go/account"
|
|
|
|
"github.com/status-im/status-go/appdatabase"
|
|
|
|
"github.com/status-im/status-go/eth-node/crypto"
|
|
|
|
"github.com/status-im/status-go/eth-node/types"
|
|
|
|
"github.com/status-im/status-go/logutils"
|
|
|
|
"github.com/status-im/status-go/mailserver/registry"
|
|
|
|
"github.com/status-im/status-go/multiaccounts"
|
|
|
|
"github.com/status-im/status-go/multiaccounts/accounts"
|
|
|
|
"github.com/status-im/status-go/node"
|
|
|
|
"github.com/status-im/status-go/params"
|
|
|
|
"github.com/status-im/status-go/rpc"
|
|
|
|
accountssvc "github.com/status-im/status-go/services/accounts"
|
|
|
|
"github.com/status-im/status-go/services/browsers"
|
2020-10-28 07:56:14 +00:00
|
|
|
localnotifications "github.com/status-im/status-go/services/local-notifications"
|
2019-11-23 17:57:05 +00:00
|
|
|
"github.com/status-im/status-go/services/mailservers"
|
|
|
|
"github.com/status-im/status-go/services/permissions"
|
|
|
|
"github.com/status-im/status-go/services/personal"
|
|
|
|
"github.com/status-im/status-go/services/rpcfilters"
|
|
|
|
"github.com/status-im/status-go/services/subscriptions"
|
|
|
|
"github.com/status-im/status-go/services/typeddata"
|
|
|
|
"github.com/status-im/status-go/services/wallet"
|
|
|
|
"github.com/status-im/status-go/signal"
|
|
|
|
"github.com/status-im/status-go/transactions"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
contractQueryTimeout = 1000 * time.Millisecond
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// ErrWhisperClearIdentitiesFailure clearing whisper identities has failed.
|
|
|
|
ErrWhisperClearIdentitiesFailure = errors.New("failed to clear whisper identities")
|
|
|
|
// ErrWhisperIdentityInjectionFailure injecting whisper identities has failed.
|
|
|
|
ErrWhisperIdentityInjectionFailure = errors.New("failed to inject identity into Whisper")
|
2020-02-17 14:38:59 +00:00
|
|
|
// ErrWakuClearIdentitiesFailure clearing whisper identities has failed.
|
|
|
|
ErrWakuClearIdentitiesFailure = errors.New("failed to clear waku identities")
|
|
|
|
// ErrWakuIdentityInjectionFailure injecting whisper identities has failed.
|
|
|
|
ErrWakuIdentityInjectionFailure = errors.New("failed to inject identity into waku")
|
2019-11-23 17:57:05 +00:00
|
|
|
// ErrUnsupportedRPCMethod is for methods not supported by the RPC interface
|
|
|
|
ErrUnsupportedRPCMethod = errors.New("method is unsupported by RPC interface")
|
|
|
|
// ErrRPCClientUnavailable is returned if an RPC client can't be retrieved.
|
|
|
|
// This is a normal situation when a node is stopped.
|
|
|
|
ErrRPCClientUnavailable = errors.New("JSON-RPC client is unavailable")
|
|
|
|
)
|
|
|
|
|
|
|
|
var _ StatusBackend = (*GethStatusBackend)(nil)
|
|
|
|
|
|
|
|
// GethStatusBackend implements the Status.im service over go-ethereum
|
|
|
|
type GethStatusBackend struct {
|
|
|
|
mu sync.Mutex
|
|
|
|
// rootDataDir is the same for all networks.
|
2020-02-17 14:38:59 +00:00
|
|
|
rootDataDir string
|
|
|
|
appDB *sql.DB
|
|
|
|
statusNode *node.StatusNode
|
|
|
|
personalAPI *personal.PublicAPI
|
|
|
|
rpcFilters *rpcfilters.Service
|
|
|
|
multiaccountsDB *multiaccounts.Database
|
|
|
|
accountManager *account.GethManager
|
|
|
|
transactor *transactions.Transactor
|
|
|
|
connectionState connectionState
|
|
|
|
appState appState
|
|
|
|
selectedAccountKeyID string
|
|
|
|
log log.Logger
|
|
|
|
allowAllRPC bool // used only for tests, disables api method restrictions
|
2020-07-29 09:13:47 +00:00
|
|
|
forceStopWallet bool
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewGethStatusBackend create a new GethStatusBackend instance
|
|
|
|
func NewGethStatusBackend() *GethStatusBackend {
|
2019-11-27 12:22:23 +00:00
|
|
|
defer log.Info("Status backend initialized", "backend", "geth", "version", params.Version, "commit", params.GitCommit)
|
2019-11-23 17:57:05 +00:00
|
|
|
|
|
|
|
statusNode := node.New()
|
2019-11-27 12:22:23 +00:00
|
|
|
accountManager := account.NewGethManager()
|
2019-11-23 17:57:05 +00:00
|
|
|
transactor := transactions.NewTransactor()
|
|
|
|
personalAPI := personal.NewAPI()
|
|
|
|
rpcFilters := rpcfilters.New(statusNode)
|
2020-10-28 07:56:14 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
return &GethStatusBackend{
|
|
|
|
statusNode: statusNode,
|
|
|
|
accountManager: accountManager,
|
|
|
|
transactor: transactor,
|
|
|
|
personalAPI: personalAPI,
|
|
|
|
rpcFilters: rpcFilters,
|
|
|
|
log: log.New("package", "status-go/api.GethStatusBackend"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// StatusNode returns reference to node manager
|
|
|
|
func (b *GethStatusBackend) StatusNode() *node.StatusNode {
|
|
|
|
return b.statusNode
|
|
|
|
}
|
|
|
|
|
|
|
|
// AccountManager returns reference to account manager
|
2019-12-19 18:27:27 +00:00
|
|
|
func (b *GethStatusBackend) AccountManager() *account.GethManager {
|
2019-11-23 17:57:05 +00:00
|
|
|
return b.accountManager
|
|
|
|
}
|
|
|
|
|
|
|
|
// Transactor returns reference to a status transactor
|
|
|
|
func (b *GethStatusBackend) Transactor() *transactions.Transactor {
|
|
|
|
return b.transactor
|
|
|
|
}
|
|
|
|
|
2020-02-17 14:38:59 +00:00
|
|
|
// SelectedAccountKeyID returns a Whisper key ID of the selected chat key pair.
|
|
|
|
func (b *GethStatusBackend) SelectedAccountKeyID() string {
|
|
|
|
return b.selectedAccountKeyID
|
2019-12-18 22:24:38 +00:00
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
// IsNodeRunning confirm that node is running
|
|
|
|
func (b *GethStatusBackend) IsNodeRunning() bool {
|
|
|
|
return b.statusNode.IsRunning()
|
|
|
|
}
|
|
|
|
|
|
|
|
// StartNode start Status node, fails if node is already started
|
|
|
|
func (b *GethStatusBackend) StartNode(config *params.NodeConfig) error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
if err := b.startNode(config); err != nil {
|
|
|
|
signal.SendNodeCrashed(err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) UpdateRootDataDir(datadir string) {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
b.rootDataDir = datadir
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) OpenAccounts() error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
if b.multiaccountsDB != nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
db, err := multiaccounts.InitializeDB(filepath.Join(b.rootDataDir, "accounts.sql"))
|
|
|
|
if err != nil {
|
2020-10-13 12:32:47 +00:00
|
|
|
b.log.Error("failed to initialize accounts db", "err", err)
|
2019-11-23 17:57:05 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
b.multiaccountsDB = db
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) GetAccounts() ([]multiaccounts.Account, error) {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
if b.multiaccountsDB == nil {
|
|
|
|
return nil, errors.New("accounts db wasn't initialized")
|
|
|
|
}
|
|
|
|
return b.multiaccountsDB.GetAccounts()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) SaveAccount(account multiaccounts.Account) error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
if b.multiaccountsDB == nil {
|
|
|
|
return errors.New("accounts db wasn't initialized")
|
|
|
|
}
|
|
|
|
return b.multiaccountsDB.SaveAccount(account)
|
|
|
|
}
|
|
|
|
|
2020-07-13 10:45:36 +00:00
|
|
|
func (b *GethStatusBackend) DeleteMulticcount(keyUID string, keyStoreDir string) error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
if b.multiaccountsDB == nil {
|
|
|
|
return errors.New("accounts db wasn't initialized")
|
|
|
|
}
|
|
|
|
|
|
|
|
err := b.multiaccountsDB.DeleteAccount(keyUID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
dbFiles := []string{
|
|
|
|
filepath.Join(b.rootDataDir, fmt.Sprintf("app-%x.sql", keyUID)),
|
|
|
|
filepath.Join(b.rootDataDir, fmt.Sprintf("app-%x.sql-shm", keyUID)),
|
|
|
|
filepath.Join(b.rootDataDir, fmt.Sprintf("app-%x.sql-wal", keyUID)),
|
2020-09-25 07:31:55 +00:00
|
|
|
filepath.Join(b.rootDataDir, fmt.Sprintf("%s.db", keyUID)),
|
|
|
|
filepath.Join(b.rootDataDir, fmt.Sprintf("%s.db-shm", keyUID)),
|
|
|
|
filepath.Join(b.rootDataDir, fmt.Sprintf("%s.db-wal", keyUID)),
|
2020-07-13 10:45:36 +00:00
|
|
|
}
|
|
|
|
for _, path := range dbFiles {
|
|
|
|
if _, err := os.Stat(path); err == nil {
|
|
|
|
err = os.Remove(path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return os.RemoveAll(keyStoreDir)
|
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
func (b *GethStatusBackend) ensureAppDBOpened(account multiaccounts.Account, password string) (err error) {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
if b.appDB != nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if len(b.rootDataDir) == 0 {
|
|
|
|
return errors.New("root datadir wasn't provided")
|
|
|
|
}
|
2020-09-25 07:31:55 +00:00
|
|
|
|
|
|
|
// Migrate file path to fix issue https://github.com/status-im/status-go/issues/2027
|
|
|
|
oldPath := filepath.Join(b.rootDataDir, fmt.Sprintf("app-%x.sql", account.KeyUID))
|
|
|
|
newPath := filepath.Join(b.rootDataDir, fmt.Sprintf("%s.db", account.KeyUID))
|
|
|
|
|
|
|
|
_, err = os.Stat(oldPath)
|
|
|
|
if err == nil {
|
|
|
|
err := os.Rename(oldPath, newPath)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-25 07:31:55 +00:00
|
|
|
|
|
|
|
// rename journals as well, but ignore errors
|
|
|
|
_ = os.Rename(oldPath+"-shm", newPath+"-shm")
|
|
|
|
_ = os.Rename(oldPath+"-wal", newPath+"-wal")
|
2020-09-25 07:31:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
b.appDB, err = appdatabase.InitializeDB(newPath, password)
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
2020-10-13 12:32:47 +00:00
|
|
|
b.log.Error("failed to initialize db", "err", err)
|
2019-11-23 17:57:05 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// StartNodeWithKey instead of loading addresses from database this method derives address from key
|
|
|
|
// and uses it in application.
|
2019-12-18 15:09:04 +00:00
|
|
|
// TODO: we should use a proper struct with optional values instead of duplicating the regular functions
|
|
|
|
// with small variants for keycard, this created too many bugs
|
2019-11-23 17:57:05 +00:00
|
|
|
func (b *GethStatusBackend) startNodeWithKey(acc multiaccounts.Account, password string, keyHex string) error {
|
|
|
|
err := b.ensureAppDBOpened(acc, password)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
conf, err := b.loadNodeConfig()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-02-03 09:20:04 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
if err := logutils.OverrideRootLogWithConfig(conf, false); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-18 15:09:04 +00:00
|
|
|
accountsDB := accounts.NewDB(b.appDB)
|
|
|
|
walletAddr, err := accountsDB.GetWalletAddress()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
watchAddrs, err := accountsDB.GetAddresses()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-11-23 17:57:05 +00:00
|
|
|
chatKey, err := ethcrypto.HexToECDSA(keyHex)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = b.StartNode(conf)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
b.accountManager.SetChatAccount(chatKey)
|
2019-12-18 15:09:04 +00:00
|
|
|
_, err = b.accountManager.SelectedChatAccount()
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-18 15:09:04 +00:00
|
|
|
b.accountManager.SetAccountAddresses(walletAddr, watchAddrs...)
|
2019-11-23 17:57:05 +00:00
|
|
|
err = b.injectAccountIntoServices()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-05 08:00:57 +00:00
|
|
|
err = b.multiaccountsDB.UpdateAccountTimestamp(acc.KeyUID, time.Now().Unix())
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) StartNodeWithKey(acc multiaccounts.Account, password string, keyHex string) error {
|
|
|
|
err := b.startNodeWithKey(acc, password, keyHex)
|
|
|
|
if err != nil {
|
|
|
|
// Stop node for clean up
|
|
|
|
_ = b.StopNode()
|
|
|
|
}
|
|
|
|
signal.SendLoggedIn(err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) startNodeWithAccount(acc multiaccounts.Account, password string) error {
|
|
|
|
err := b.ensureAppDBOpened(acc, password)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
conf, err := b.loadNodeConfig()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := logutils.OverrideRootLogWithConfig(conf, false); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
accountsDB := accounts.NewDB(b.appDB)
|
|
|
|
chatAddr, err := accountsDB.GetChatAddress()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
walletAddr, err := accountsDB.GetWalletAddress()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
status-im/status-react#9203 Faster tx fetching with less request
*** How it worked before this PR on multiaccount creation:
- On multiacc creation we scanned chain for eth and erc20 transfers. For
each address of a new empty multiaccount this scan required
1. two `eth_getBalance` requests to find out that there is no any
balance change between zero and the last block, for eth transfers
2. and `chain-size/100000` (currently ~100) `eth_getLogs` requests,
for erc20 transfers
- For some reason we scanned an address of the chat account as well, and
also accounts were not deduplicated. So even for an empty multiacc we
scanned chain twice for each chat and main wallet addresses, in result
app had to execute about 400 requests.
- As mentioned above, `eth_getBalance` requests were used to check if
there were any eth transfers, and that caused empty history in case
if user already used all available eth (so that both zero and latest
blocks show 0 eth for an address). There might have been transactions
but we wouldn't fetch/show them.
- There was no upper limit for the number of rpc requests during the
scan, so it could require indefinite number of requests; the scanning
algorithm was written so that we persisted the whole history of
transactions or tried to scan form the beginning again in case of
failure, giving up only after 10 minutes of failures. In result
addresses with sufficient number of transactions would never be fully
scanned and during these 10 minutes app could use gigabytes of
internet data.
- Failures were caused by `eth_getBlockByNumber`/`eth_getBlockByHash`
requests. These requests return significantly bigger responses than
`eth_getBalance`/`eth_transactionsCount` and it is likely that
execution of thousands of them in parallel caused failures for
accounts with hundreds of transactions. Even for an account with 12k
we could successfully determine blocks with transaction in a few
minutes using `eth_getBalance` requests, but `eth_getBlock...`
couldn't be processed for this acc.
- There was no caching for for `eth_getBalance` requests, and this
caused in average 3-4 times more such requests than is needed.
*** How it works now on multiaccount creation:
- On multiacc creation we scan chain for last ~30 eth transactions and
then check erc20 in the range where these eth transactions were found.
For an empty address in multiacc this means:
1. two `eth_getBalance` transactions to determine that there was no
balance change between zero and the last block; two
`eth_transactionsCount` requests to determine there are no outgoing
transactions for this address; total 4 requests for eth transfers
2. 20 `eth_getLogs` for erc20 transfers. This number can be lowered,
but that's not a big deal
- Deduplication of addresses is added and also we don't scan chat
account, so a new multiacc requires ~25 (we also request latest block
number and probably execute a few other calls) request to determine
that multiacc is empty (comparing to ~400 before)
- In case if address contains transactions we:
1. determine the range which contains 20-25 outgoing eth/erc20
transactions. This usually requires up to 10 `eth_transactionCount`
requests
2. then we scan chain for eth transfers using `eth_getBalance` and
`eth_transactionCount` (for double checking zero balances)
3. we make sure that we do not scan db for more than 30 blocks with
transfers. That's important for accounts with mostly incoming
transactions, because the range found on the first step might
contain any number of incoming transfers, but only 20-25 outgoing
transactions
4. when we found ~30 blocks in a given range, we update initial
range `from` block using the oldest found block
5. and now we scan db for erc20transfers using `eth_getLogs`
`oldest-found-eth-block`-`latest-block`, we make not more than 20 calls
6. when all blocks which contain incoming/outgoing transfers for a
given address are found, we save these blocks to db and mark that
transfers from these blocks are still to be fetched
7. Then we select latest ~30 (the number can be adjusted) blocks from
these which were found and fetch transfers, this requires 3-4
requests per transfer.
8. we persist scanned range so that we know were to start next time
9. we dispatch an event which tells client that transactions are found
10. client fetches latest 20 transfers
- when user presses "fetch more" button we check if app's db contains next
20 transfers, if not we scan chain again and return transfers after
small fixes
2019-12-18 11:01:46 +00:00
|
|
|
watchAddrs, err := accountsDB.GetWalletAddresses()
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
login := account.LoginParams{
|
|
|
|
Password: password,
|
|
|
|
ChatAddress: chatAddr,
|
|
|
|
WatchAddresses: watchAddrs,
|
|
|
|
MainAccount: walletAddr,
|
|
|
|
}
|
2020-10-28 07:56:14 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
err = b.StartNode(conf)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-10-28 07:56:14 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
err = b.SelectAccount(login)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-05 08:00:57 +00:00
|
|
|
err = b.multiaccountsDB.UpdateAccountTimestamp(acc.KeyUID, time.Now().Unix())
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-10-28 07:56:14 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-06-22 12:03:28 +00:00
|
|
|
func (b *GethStatusBackend) MigrateKeyStoreDir(acc multiaccounts.Account, password, oldDir, newDir string) error {
|
|
|
|
err := b.ensureAppDBOpened(acc, password)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
accountDB := accounts.NewDB(b.appDB)
|
|
|
|
accounts, err := accountDB.GetAccounts()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
settings, err := accountDB.GetSettings()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
addresses := []string{settings.EIP1581Address.Hex(), settings.WalletRootAddress.Hex()}
|
|
|
|
for _, account := range accounts {
|
|
|
|
addresses = append(addresses, account.Address.Hex())
|
|
|
|
}
|
|
|
|
err = b.accountManager.MigrateKeyStoreDir(oldDir, newDir, addresses)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
func (b *GethStatusBackend) StartNodeWithAccount(acc multiaccounts.Account, password string) error {
|
|
|
|
err := b.startNodeWithAccount(acc, password)
|
|
|
|
if err != nil {
|
|
|
|
// Stop node for clean up
|
|
|
|
_ = b.StopNode()
|
|
|
|
}
|
|
|
|
signal.SendLoggedIn(err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-27 09:58:25 +00:00
|
|
|
func (b *GethStatusBackend) SaveAccountAndStartNodeWithKey(acc multiaccounts.Account, password string, settings accounts.Settings, nodecfg *params.NodeConfig, subaccs []accounts.Account, keyHex string) error {
|
|
|
|
err := b.SaveAccount(acc)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = b.ensureAppDBOpened(acc, password)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = b.saveAccountsAndSettings(settings, nodecfg, subaccs)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return b.StartNodeWithKey(acc, password, keyHex)
|
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
// StartNodeWithAccountAndConfig is used after account and config was generated.
|
|
|
|
// In current setup account name and config is generated on the client side. Once/if it will be generated on
|
|
|
|
// status-go side this flow can be simplified.
|
2019-12-27 09:58:25 +00:00
|
|
|
func (b *GethStatusBackend) StartNodeWithAccountAndConfig(
|
|
|
|
account multiaccounts.Account,
|
|
|
|
password string,
|
|
|
|
settings accounts.Settings,
|
|
|
|
nodecfg *params.NodeConfig,
|
|
|
|
subaccs []accounts.Account,
|
|
|
|
) error {
|
2019-11-23 17:57:05 +00:00
|
|
|
err := b.SaveAccount(account)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = b.ensureAppDBOpened(account, password)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-27 09:58:25 +00:00
|
|
|
err = b.saveAccountsAndSettings(settings, nodecfg, subaccs)
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return b.StartNodeWithAccount(account, password)
|
|
|
|
}
|
|
|
|
|
2019-12-27 09:58:25 +00:00
|
|
|
func (b *GethStatusBackend) saveAccountsAndSettings(settings accounts.Settings, nodecfg *params.NodeConfig, subaccs []accounts.Account) error {
|
2019-11-23 17:57:05 +00:00
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
2019-12-27 09:58:25 +00:00
|
|
|
accdb := accounts.NewDB(b.appDB)
|
|
|
|
err := accdb.CreateSettings(settings, *nodecfg)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return accdb.SaveAccounts(subaccs)
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) loadNodeConfig() (*params.NodeConfig, error) {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
2019-12-27 09:58:25 +00:00
|
|
|
var conf params.NodeConfig
|
2020-03-30 11:42:21 +00:00
|
|
|
accountDB := accounts.NewDB(b.appDB)
|
|
|
|
err := accountDB.GetNodeConfig(&conf)
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-03-30 11:42:21 +00:00
|
|
|
|
2020-09-16 07:31:01 +00:00
|
|
|
conf.WakuConfig.Enabled = true
|
|
|
|
conf.WhisperConfig.Enabled = false
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
// NodeConfig.Version should be taken from params.Version
|
|
|
|
// which is set at the compile time.
|
|
|
|
// What's cached is usually outdated so we overwrite it here.
|
|
|
|
conf.Version = params.Version
|
2020-02-03 09:20:04 +00:00
|
|
|
conf.DataDir = filepath.Join(b.rootDataDir, conf.DataDir)
|
|
|
|
conf.ShhextConfig.BackupDisabledDataDir = filepath.Join(b.rootDataDir, conf.ShhextConfig.BackupDisabledDataDir)
|
|
|
|
if len(conf.LogDir) == 0 {
|
|
|
|
conf.LogFile = filepath.Join(b.rootDataDir, conf.LogFile)
|
|
|
|
} else {
|
|
|
|
conf.LogFile = filepath.Join(conf.LogDir, conf.LogFile)
|
|
|
|
}
|
|
|
|
conf.KeyStoreDir = filepath.Join(b.rootDataDir, conf.KeyStoreDir)
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
return &conf, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) rpcFiltersService() gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
|
|
|
return rpcfilters.New(b.statusNode), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) subscriptionService() gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
2020-01-10 10:09:07 +00:00
|
|
|
return subscriptions.New(func() *rpc.Client { return b.statusNode.RPCPrivateClient() }), nil
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) accountsService(accountsFeed *event.Feed) gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
2019-12-30 09:43:51 +00:00
|
|
|
return accountssvc.NewService(accounts.NewDB(b.appDB), b.multiaccountsDB, b.accountManager.Manager, accountsFeed), nil
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) browsersService() gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
|
|
|
return browsers.NewService(browsers.NewDB(b.appDB)), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) permissionsService() gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
|
|
|
return permissions.NewService(permissions.NewDB(b.appDB)), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) mailserversService() gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
|
|
|
return mailservers.NewService(mailservers.NewDB(b.appDB)), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) walletService(network uint64, accountsFeed *event.Feed) gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
|
|
|
return wallet.NewService(wallet.NewDB(b.appDB, network), accountsFeed), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-28 07:56:14 +00:00
|
|
|
func (b *GethStatusBackend) localNotificationsService(network uint64) gethnode.ServiceConstructor {
|
|
|
|
return func(*gethnode.ServiceContext) (gethnode.Service, error) {
|
|
|
|
return localnotifications.NewService(b.appDB, network), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
func (b *GethStatusBackend) startNode(config *params.NodeConfig) (err error) {
|
|
|
|
defer func() {
|
|
|
|
if r := recover(); r != nil {
|
|
|
|
err = fmt.Errorf("node crashed on start: %v", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2020-08-20 09:05:39 +00:00
|
|
|
b.log.Debug("starting node with config", "config", config)
|
2020-02-26 19:35:47 +00:00
|
|
|
// Update config with some defaults.
|
2020-08-20 09:05:39 +00:00
|
|
|
if err := config.UpdateWithDefaults(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
b.log.Debug("updated config with defaults", "config", config)
|
2020-02-26 19:35:47 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
// Start by validating configuration
|
|
|
|
if err := config.Validate(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
accountsFeed := &event.Feed{}
|
|
|
|
services := []gethnode.ServiceConstructor{}
|
|
|
|
services = appendIf(config.UpstreamConfig.Enabled, services, b.rpcFiltersService())
|
|
|
|
services = append(services, b.subscriptionService())
|
|
|
|
services = appendIf(b.appDB != nil && b.multiaccountsDB != nil, services, b.accountsService(accountsFeed))
|
|
|
|
services = appendIf(config.BrowsersConfig.Enabled, services, b.browsersService())
|
|
|
|
services = appendIf(config.PermissionsConfig.Enabled, services, b.permissionsService())
|
|
|
|
services = appendIf(config.MailserversConfig.Enabled, services, b.mailserversService())
|
|
|
|
services = appendIf(config.WalletConfig.Enabled, services, b.walletService(config.NetworkID, accountsFeed))
|
2020-11-17 13:29:34 +00:00
|
|
|
// We ignore for now local notifications flag as users who are upgrading have no mean to enable it
|
|
|
|
services = append(services, b.localNotificationsService(config.NetworkID))
|
2019-11-23 17:57:05 +00:00
|
|
|
|
|
|
|
manager := b.accountManager.GetManager()
|
|
|
|
if manager == nil {
|
|
|
|
return errors.New("ethereum accounts.Manager is nil")
|
|
|
|
}
|
|
|
|
if err = b.statusNode.StartWithOptions(config, node.StartOptions{
|
|
|
|
Services: services,
|
|
|
|
// The peers discovery protocols are started manually after
|
|
|
|
// `node.ready` signal is sent.
|
|
|
|
// It was discussed in https://github.com/status-im/status-go/pull/1333.
|
|
|
|
StartDiscovery: false,
|
|
|
|
AccountsManager: manager,
|
|
|
|
}); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
signal.SendNodeStarted()
|
|
|
|
|
|
|
|
b.transactor.SetNetworkID(config.NetworkID)
|
|
|
|
b.transactor.SetRPC(b.statusNode.RPCClient(), rpc.DefaultCallTimeout)
|
|
|
|
b.personalAPI.SetRPC(b.statusNode.RPCPrivateClient(), rpc.DefaultCallTimeout)
|
|
|
|
|
|
|
|
if err = b.registerHandlers(); err != nil {
|
|
|
|
b.log.Error("Handler registration failed", "err", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
b.log.Info("Handlers registered")
|
|
|
|
|
|
|
|
if st, err := b.statusNode.StatusService(); err == nil {
|
|
|
|
st.SetAccountManager(b.accountManager)
|
|
|
|
}
|
|
|
|
|
|
|
|
if st, err := b.statusNode.PeerService(); err == nil {
|
|
|
|
st.SetDiscoverer(b.StatusNode())
|
|
|
|
}
|
|
|
|
|
2019-12-18 22:24:38 +00:00
|
|
|
// Handle a case when a node is stopped and resumed.
|
|
|
|
// If there is no account selected, an error is returned.
|
|
|
|
if _, err := b.accountManager.SelectedChatAccount(); err == nil {
|
|
|
|
if err := b.injectAccountIntoServices(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else if err != account.ErrNoAccountSelected {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
signal.SendNodeReady()
|
|
|
|
|
|
|
|
if err := b.statusNode.StartDiscovery(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// StopNode stop Status node. Stopped node cannot be resumed.
|
|
|
|
func (b *GethStatusBackend) StopNode() error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
return b.stopNode()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) stopNode() error {
|
|
|
|
if !b.IsNodeRunning() {
|
|
|
|
return node.ErrNoRunningNode
|
|
|
|
}
|
|
|
|
defer signal.SendNodeStopped()
|
|
|
|
return b.statusNode.Stop()
|
|
|
|
}
|
|
|
|
|
|
|
|
// RestartNode restart running Status node, fails if node is not running
|
|
|
|
func (b *GethStatusBackend) RestartNode() error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
|
|
|
|
if !b.IsNodeRunning() {
|
|
|
|
return node.ErrNoRunningNode
|
|
|
|
}
|
|
|
|
|
|
|
|
newcfg := *(b.statusNode.Config())
|
|
|
|
if err := b.stopNode(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return b.startNode(&newcfg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ResetChainData remove chain data from data directory.
|
|
|
|
// Node is stopped, and new node is started, with clean data directory.
|
|
|
|
func (b *GethStatusBackend) ResetChainData() error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
newcfg := *(b.statusNode.Config())
|
|
|
|
if err := b.stopNode(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// config is cleaned when node is stopped
|
|
|
|
if err := b.statusNode.ResetChainData(&newcfg); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
signal.SendChainDataRemoved()
|
|
|
|
return b.startNode(&newcfg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// CallRPC executes public RPC requests on node's in-proc RPC server.
|
|
|
|
func (b *GethStatusBackend) CallRPC(inputJSON string) (string, error) {
|
|
|
|
client := b.statusNode.RPCClient()
|
|
|
|
if client == nil {
|
|
|
|
return "", ErrRPCClientUnavailable
|
|
|
|
}
|
|
|
|
return client.CallRaw(inputJSON), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetNodesFromContract returns a list of nodes from the contract
|
|
|
|
func (b *GethStatusBackend) GetNodesFromContract(rpcEndpoint string, contractAddress string) ([]string, error) {
|
|
|
|
var response []string
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), contractQueryTimeout)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
ethclient, err := ethclient.DialContext(ctx, rpcEndpoint)
|
|
|
|
if err != nil {
|
|
|
|
return response, err
|
|
|
|
}
|
|
|
|
|
|
|
|
contract, err := registry.NewNodes(common.HexToAddress(contractAddress), ethclient)
|
|
|
|
if err != nil {
|
|
|
|
return response, err
|
|
|
|
}
|
|
|
|
|
|
|
|
nodeCount, err := contract.NodeCount(nil)
|
|
|
|
if err != nil {
|
|
|
|
return response, err
|
|
|
|
}
|
|
|
|
|
|
|
|
one := big.NewInt(1)
|
|
|
|
for i := big.NewInt(0); i.Cmp(nodeCount) < 0; i.Add(i, one) {
|
|
|
|
node, err := contract.Nodes(nil, i)
|
|
|
|
if err != nil {
|
|
|
|
return response, err
|
|
|
|
}
|
|
|
|
response = append(response, node)
|
|
|
|
}
|
|
|
|
|
|
|
|
return response, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CallPrivateRPC executes public and private RPC requests on node's in-proc RPC server.
|
|
|
|
func (b *GethStatusBackend) CallPrivateRPC(inputJSON string) (string, error) {
|
|
|
|
client := b.statusNode.RPCPrivateClient()
|
|
|
|
if client == nil {
|
|
|
|
return "", ErrRPCClientUnavailable
|
|
|
|
}
|
|
|
|
return client.CallRaw(inputJSON), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SendTransaction creates a new transaction and waits until it's complete.
|
|
|
|
func (b *GethStatusBackend) SendTransaction(sendArgs transactions.SendTxArgs, password string) (hash types.Hash, err error) {
|
|
|
|
verifiedAccount, err := b.getVerifiedWalletAccount(sendArgs.From.String(), password)
|
|
|
|
if err != nil {
|
|
|
|
return hash, err
|
|
|
|
}
|
|
|
|
|
|
|
|
hash, err = b.transactor.SendTransaction(sendArgs, verifiedAccount)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
go b.rpcFilters.TriggerTransactionSentToUpstreamEvent(hash)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) SendTransactionWithSignature(sendArgs transactions.SendTxArgs, sig []byte) (hash types.Hash, err error) {
|
|
|
|
hash, err = b.transactor.SendTransactionWithSignature(sendArgs, sig)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
go b.rpcFilters.TriggerTransactionSentToUpstreamEvent(hash)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// HashTransaction validate the transaction and returns new sendArgs and the transaction hash.
|
|
|
|
func (b *GethStatusBackend) HashTransaction(sendArgs transactions.SendTxArgs) (transactions.SendTxArgs, types.Hash, error) {
|
|
|
|
return b.transactor.HashTransaction(sendArgs)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignMessage checks the pwd vs the selected account and passes on the signParams
|
|
|
|
// to personalAPI for message signature
|
|
|
|
func (b *GethStatusBackend) SignMessage(rpcParams personal.SignParams) (types.HexBytes, error) {
|
|
|
|
verifiedAccount, err := b.getVerifiedWalletAccount(rpcParams.Address, rpcParams.Password)
|
|
|
|
if err != nil {
|
|
|
|
return types.HexBytes{}, err
|
|
|
|
}
|
|
|
|
return b.personalAPI.Sign(rpcParams, verifiedAccount)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Recover calls the personalAPI to return address associated with the private
|
|
|
|
// key that was used to calculate the signature in the message
|
|
|
|
func (b *GethStatusBackend) Recover(rpcParams personal.RecoverParams) (types.Address, error) {
|
|
|
|
return b.personalAPI.Recover(rpcParams)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignTypedData accepts data and password. Gets verified account and signs typed data.
|
|
|
|
func (b *GethStatusBackend) SignTypedData(typed typeddata.TypedData, address string, password string) (types.HexBytes, error) {
|
|
|
|
account, err := b.getVerifiedWalletAccount(address, password)
|
|
|
|
if err != nil {
|
|
|
|
return types.HexBytes{}, err
|
|
|
|
}
|
|
|
|
chain := new(big.Int).SetUint64(b.StatusNode().Config().NetworkID)
|
|
|
|
sig, err := typeddata.Sign(typed, account.AccountKey.PrivateKey, chain)
|
|
|
|
if err != nil {
|
|
|
|
return types.HexBytes{}, err
|
|
|
|
}
|
|
|
|
return types.HexBytes(sig), err
|
|
|
|
}
|
|
|
|
|
|
|
|
// HashTypedData generates the hash of TypedData.
|
|
|
|
func (b *GethStatusBackend) HashTypedData(typed typeddata.TypedData) (types.Hash, error) {
|
|
|
|
chain := new(big.Int).SetUint64(b.StatusNode().Config().NetworkID)
|
|
|
|
hash, err := typeddata.ValidateAndHash(typed, chain)
|
|
|
|
if err != nil {
|
|
|
|
return types.Hash{}, err
|
|
|
|
}
|
|
|
|
return types.Hash(hash), err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) getVerifiedWalletAccount(address, password string) (*account.SelectedExtKey, error) {
|
|
|
|
config := b.StatusNode().Config()
|
|
|
|
|
|
|
|
db := accounts.NewDB(b.appDB)
|
2019-12-11 13:59:37 +00:00
|
|
|
exists, err := db.AddressExists(types.HexToAddress(address))
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
b.log.Error("failed to query db for a given address", "address", address, "error", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !exists {
|
|
|
|
b.log.Error("failed to get a selected account", "err", transactions.ErrInvalidTxSender)
|
|
|
|
return nil, transactions.ErrAccountDoesntExist
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := b.accountManager.VerifyAccountPassword(config.KeyStoreDir, address, password)
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("failed to verify account", "account", address, "error", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &account.SelectedExtKey{
|
2019-12-19 18:27:27 +00:00
|
|
|
Address: key.Address,
|
2019-11-23 17:57:05 +00:00
|
|
|
AccountKey: key,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// registerHandlers attaches Status callback handlers to running node
|
|
|
|
func (b *GethStatusBackend) registerHandlers() error {
|
|
|
|
var clients []*rpc.Client
|
|
|
|
|
|
|
|
if c := b.StatusNode().RPCClient(); c != nil {
|
|
|
|
clients = append(clients, c)
|
|
|
|
} else {
|
|
|
|
return errors.New("RPC client unavailable")
|
|
|
|
}
|
|
|
|
|
|
|
|
if c := b.StatusNode().RPCPrivateClient(); c != nil {
|
|
|
|
clients = append(clients, c)
|
|
|
|
} else {
|
|
|
|
return errors.New("RPC private client unavailable")
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, client := range clients {
|
|
|
|
client.RegisterHandler(
|
|
|
|
params.AccountsMethodName,
|
|
|
|
func(context.Context, ...interface{}) (interface{}, error) {
|
|
|
|
return b.accountManager.Accounts()
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
if b.allowAllRPC {
|
|
|
|
// this should only happen in unit-tests, this variable is not available outside this package
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
client.RegisterHandler(params.SendTransactionMethodName, unsupportedMethodHandler)
|
|
|
|
client.RegisterHandler(params.PersonalSignMethodName, unsupportedMethodHandler)
|
|
|
|
client.RegisterHandler(params.PersonalRecoverMethodName, unsupportedMethodHandler)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func unsupportedMethodHandler(ctx context.Context, rpcParams ...interface{}) (interface{}, error) {
|
|
|
|
return nil, ErrUnsupportedRPCMethod
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConnectionChange handles network state changes logic.
|
|
|
|
func (b *GethStatusBackend) ConnectionChange(typ string, expensive bool) {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
|
|
|
|
state := connectionState{
|
|
|
|
Type: newConnectionType(typ),
|
|
|
|
Expensive: expensive,
|
|
|
|
}
|
|
|
|
if typ == none {
|
|
|
|
state.Offline = true
|
|
|
|
}
|
|
|
|
|
|
|
|
b.log.Info("Network state change", "old", b.connectionState, "new", state)
|
|
|
|
|
|
|
|
b.connectionState = state
|
|
|
|
|
|
|
|
// logic of handling state changes here
|
|
|
|
// restart node? force peers reconnect? etc
|
|
|
|
}
|
|
|
|
|
|
|
|
// AppStateChange handles app state changes (background/foreground).
|
|
|
|
// state values: see https://facebook.github.io/react-native/docs/appstate.html
|
|
|
|
func (b *GethStatusBackend) AppStateChange(state string) {
|
|
|
|
s, err := parseAppState(state)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("AppStateChange failed, ignoring", "error", err)
|
|
|
|
return // and do nothing
|
|
|
|
}
|
|
|
|
|
|
|
|
b.log.Info("App State changed", "new-state", s)
|
|
|
|
b.appState = s
|
|
|
|
|
2020-11-17 15:54:31 +00:00
|
|
|
if s == appStateBackground {
|
2020-10-28 07:56:14 +00:00
|
|
|
localNotifications, err := b.statusNode.LocalNotificationsService()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Retrieving of local notifications service failed on app state change", "error", err)
|
|
|
|
}
|
|
|
|
|
2020-02-28 16:05:37 +00:00
|
|
|
wallet, err := b.statusNode.WalletService()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Retrieving of wallet service failed on app state change to background", "error", err)
|
|
|
|
return
|
|
|
|
}
|
2020-10-28 07:56:14 +00:00
|
|
|
|
2020-11-17 13:29:34 +00:00
|
|
|
// If we have no local notifications, force wallet stop, otherwise check if it's watching the wallet
|
|
|
|
if localNotifications == nil || (localNotifications != nil && !localNotifications.IsWatchingWallet()) {
|
2020-10-28 07:56:14 +00:00
|
|
|
err = wallet.Stop()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Wallet service stop failed on app state change to background", "error", err)
|
|
|
|
return
|
|
|
|
}
|
2020-02-28 16:05:37 +00:00
|
|
|
}
|
|
|
|
}
|
2020-10-28 07:56:14 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
// TODO: put node in low-power mode if the app is in background (or inactive)
|
|
|
|
// and normal mode if the app is in foreground.
|
|
|
|
}
|
|
|
|
|
2020-07-29 09:13:47 +00:00
|
|
|
func (b *GethStatusBackend) StopWallet() error {
|
|
|
|
wallet, err := b.statusNode.WalletService()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Retrieving of wallet service failed on StopWallet", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if wallet.IsStarted() {
|
|
|
|
err = wallet.Stop()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Wallet service stop failed on StopWallet", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
b.forceStopWallet = true
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-17 15:54:31 +00:00
|
|
|
func (b *GethStatusBackend) StartWallet(watchNewBlocks bool) error {
|
2020-07-29 09:13:47 +00:00
|
|
|
wallet, err := b.statusNode.WalletService()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Retrieving of wallet service failed on StartWallet", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if !wallet.IsStarted() {
|
|
|
|
err = wallet.Start(b.statusNode.Server())
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Wallet service start failed on StartWallet", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-17 15:54:31 +00:00
|
|
|
err = b.startWallet(watchNewBlocks)
|
2020-07-29 09:13:47 +00:00
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Wallet reactor start failed on StartWallet", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
b.forceStopWallet = false
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-10-28 07:56:14 +00:00
|
|
|
func (b *GethStatusBackend) StopLocalNotifications() error {
|
|
|
|
localPN, err := b.statusNode.LocalNotificationsService()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Retrieving of LocalNotifications service failed on StopLocalNotifications", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if localPN.IsStarted() {
|
|
|
|
err = localPN.Stop()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("LocalNotifications service stop failed on StopLocalNotifications", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) StartLocalNotifications() error {
|
|
|
|
localPN, err := b.statusNode.LocalNotificationsService()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Retrieving of local notifications service failed on StartLocalNotifications", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
wallet, err := b.statusNode.WalletService()
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("Retrieving of wallet service failed on StartLocalNotifications", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if !wallet.IsStarted() {
|
|
|
|
b.log.Error("Can't start local notifications service without wallet service")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if !localPN.IsStarted() {
|
|
|
|
err = localPN.Start(b.statusNode.Server())
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("LocalNotifications service start failed on StartLocalNotifications", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = localPN.SubscribeWallet(wallet.GetFeed())
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
b.log.Error("LocalNotifications service could not subscribe to wallet on StartLocalNotifications", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
// Logout clears whisper identities.
|
|
|
|
func (b *GethStatusBackend) Logout() error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
|
|
|
|
err := b.cleanupServices()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = b.closeAppDB()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
b.AccountManager().Logout()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// cleanupServices stops parts of services that doesn't managed by a node and removes injected data from services.
|
|
|
|
func (b *GethStatusBackend) cleanupServices() error {
|
|
|
|
whisperService, err := b.statusNode.WhisperService()
|
|
|
|
switch err {
|
|
|
|
case node.ErrServiceUnknown: // Whisper was never registered
|
|
|
|
case nil:
|
|
|
|
if err := whisperService.DeleteKeyPairs(); err != nil {
|
|
|
|
return fmt.Errorf("%s: %v", ErrWhisperClearIdentitiesFailure, err)
|
|
|
|
}
|
2020-02-17 14:38:59 +00:00
|
|
|
b.selectedAccountKeyID = ""
|
2019-11-23 17:57:05 +00:00
|
|
|
default:
|
|
|
|
return err
|
|
|
|
}
|
2020-02-17 14:38:59 +00:00
|
|
|
wakuService, err := b.statusNode.WakuService()
|
|
|
|
switch err {
|
|
|
|
case node.ErrServiceUnknown: // Waku was never registered
|
|
|
|
case nil:
|
|
|
|
if err := wakuService.DeleteKeyPairs(); err != nil {
|
|
|
|
return fmt.Errorf("%s: %v", ErrWakuClearIdentitiesFailure, err)
|
|
|
|
}
|
|
|
|
b.selectedAccountKeyID = ""
|
|
|
|
default:
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
if b.statusNode.Config().WalletConfig.Enabled {
|
|
|
|
wallet, err := b.statusNode.WalletService()
|
|
|
|
switch err {
|
|
|
|
case node.ErrServiceUnknown:
|
|
|
|
case nil:
|
2020-07-29 09:13:47 +00:00
|
|
|
if wallet.IsStarted() {
|
|
|
|
err = wallet.Stop()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) closeAppDB() error {
|
|
|
|
if b.appDB != nil {
|
|
|
|
err := b.appDB.Close()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
b.appDB = nil
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SelectAccount selects current wallet and chat accounts, by verifying that each address has corresponding account which can be decrypted
|
|
|
|
// using provided password. Once verification is done, the decrypted chat key is injected into Whisper (as a single identity,
|
|
|
|
// all previous identities are removed).
|
|
|
|
func (b *GethStatusBackend) SelectAccount(loginParams account.LoginParams) error {
|
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
|
|
|
|
b.AccountManager().RemoveOnboarding()
|
|
|
|
|
|
|
|
err := b.accountManager.SelectAccount(loginParams)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-18 22:24:38 +00:00
|
|
|
if err := b.injectAccountIntoServices(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *GethStatusBackend) injectAccountIntoServices() error {
|
|
|
|
chatAccount, err := b.accountManager.SelectedChatAccount()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-18 22:24:38 +00:00
|
|
|
identity := chatAccount.AccountKey.PrivateKey
|
2019-11-23 17:57:05 +00:00
|
|
|
whisperService, err := b.statusNode.WhisperService()
|
2019-12-18 22:24:38 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
switch err {
|
|
|
|
case node.ErrServiceUnknown: // Whisper was never registered
|
|
|
|
case nil:
|
2019-12-18 22:24:38 +00:00
|
|
|
if err := whisperService.DeleteKeyPairs(); err != nil { // err is not possible; method return value is incorrect
|
|
|
|
return err
|
|
|
|
}
|
2020-02-17 14:38:59 +00:00
|
|
|
b.selectedAccountKeyID, err = whisperService.AddKeyPair(identity)
|
2019-12-18 22:24:38 +00:00
|
|
|
if err != nil {
|
2019-11-23 17:57:05 +00:00
|
|
|
return ErrWhisperIdentityInjectionFailure
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-02-17 17:18:30 +00:00
|
|
|
if whisperService != nil {
|
|
|
|
st, err := b.statusNode.ShhExtService()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-02-18 11:21:01 +00:00
|
|
|
if err := st.InitProtocol(identity, b.appDB, logutils.ZapLogger()); err != nil {
|
2020-02-17 17:18:30 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-17 14:38:59 +00:00
|
|
|
wakuService, err := b.statusNode.WakuService()
|
|
|
|
|
|
|
|
switch err {
|
|
|
|
case node.ErrServiceUnknown: // Waku was never registered
|
|
|
|
case nil:
|
|
|
|
if err := wakuService.DeleteKeyPairs(); err != nil { // err is not possible; method return value is incorrect
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
b.selectedAccountKeyID, err = wakuService.AddKeyPair(identity)
|
|
|
|
if err != nil {
|
|
|
|
return ErrWakuIdentityInjectionFailure
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if wakuService != nil {
|
|
|
|
st, err := b.statusNode.WakuExtService()
|
2019-11-23 17:57:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-02-19 14:36:16 +00:00
|
|
|
if err := st.InitProtocol(identity, b.appDB, logutils.ZapLogger()); err != nil {
|
2019-11-23 17:57:05 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2019-12-18 22:24:38 +00:00
|
|
|
return nil
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
|
2020-11-17 15:54:31 +00:00
|
|
|
func (b *GethStatusBackend) startWallet(watchNewBlocks bool) error {
|
2019-11-23 17:57:05 +00:00
|
|
|
if !b.statusNode.Config().WalletConfig.Enabled {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
wallet, err := b.statusNode.WalletService()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-11-17 15:54:31 +00:00
|
|
|
accountsDB := accounts.NewDB(b.appDB)
|
|
|
|
watchAddresses, err := accountsDB.GetWalletAddresses()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-10-28 07:56:14 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
mainAccountAddress, err := b.accountManager.MainAccountAddress()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
status-im/status-react#9203 Faster tx fetching with less request
*** How it worked before this PR on multiaccount creation:
- On multiacc creation we scanned chain for eth and erc20 transfers. For
each address of a new empty multiaccount this scan required
1. two `eth_getBalance` requests to find out that there is no any
balance change between zero and the last block, for eth transfers
2. and `chain-size/100000` (currently ~100) `eth_getLogs` requests,
for erc20 transfers
- For some reason we scanned an address of the chat account as well, and
also accounts were not deduplicated. So even for an empty multiacc we
scanned chain twice for each chat and main wallet addresses, in result
app had to execute about 400 requests.
- As mentioned above, `eth_getBalance` requests were used to check if
there were any eth transfers, and that caused empty history in case
if user already used all available eth (so that both zero and latest
blocks show 0 eth for an address). There might have been transactions
but we wouldn't fetch/show them.
- There was no upper limit for the number of rpc requests during the
scan, so it could require indefinite number of requests; the scanning
algorithm was written so that we persisted the whole history of
transactions or tried to scan form the beginning again in case of
failure, giving up only after 10 minutes of failures. In result
addresses with sufficient number of transactions would never be fully
scanned and during these 10 minutes app could use gigabytes of
internet data.
- Failures were caused by `eth_getBlockByNumber`/`eth_getBlockByHash`
requests. These requests return significantly bigger responses than
`eth_getBalance`/`eth_transactionsCount` and it is likely that
execution of thousands of them in parallel caused failures for
accounts with hundreds of transactions. Even for an account with 12k
we could successfully determine blocks with transaction in a few
minutes using `eth_getBalance` requests, but `eth_getBlock...`
couldn't be processed for this acc.
- There was no caching for for `eth_getBalance` requests, and this
caused in average 3-4 times more such requests than is needed.
*** How it works now on multiaccount creation:
- On multiacc creation we scan chain for last ~30 eth transactions and
then check erc20 in the range where these eth transactions were found.
For an empty address in multiacc this means:
1. two `eth_getBalance` transactions to determine that there was no
balance change between zero and the last block; two
`eth_transactionsCount` requests to determine there are no outgoing
transactions for this address; total 4 requests for eth transfers
2. 20 `eth_getLogs` for erc20 transfers. This number can be lowered,
but that's not a big deal
- Deduplication of addresses is added and also we don't scan chat
account, so a new multiacc requires ~25 (we also request latest block
number and probably execute a few other calls) request to determine
that multiacc is empty (comparing to ~400 before)
- In case if address contains transactions we:
1. determine the range which contains 20-25 outgoing eth/erc20
transactions. This usually requires up to 10 `eth_transactionCount`
requests
2. then we scan chain for eth transfers using `eth_getBalance` and
`eth_transactionCount` (for double checking zero balances)
3. we make sure that we do not scan db for more than 30 blocks with
transfers. That's important for accounts with mostly incoming
transactions, because the range found on the first step might
contain any number of incoming transfers, but only 20-25 outgoing
transactions
4. when we found ~30 blocks in a given range, we update initial
range `from` block using the oldest found block
5. and now we scan db for erc20transfers using `eth_getLogs`
`oldest-found-eth-block`-`latest-block`, we make not more than 20 calls
6. when all blocks which contain incoming/outgoing transfers for a
given address are found, we save these blocks to db and mark that
transfers from these blocks are still to be fetched
7. Then we select latest ~30 (the number can be adjusted) blocks from
these which were found and fetch transfers, this requires 3-4
requests per transfer.
8. we persist scanned range so that we know were to start next time
9. we dispatch an event which tells client that transactions are found
10. client fetches latest 20 transfers
- when user presses "fetch more" button we check if app's db contains next
20 transfers, if not we scan chain again and return transfers after
small fixes
2019-12-18 11:01:46 +00:00
|
|
|
uniqAddressesMap := map[common.Address]struct{}{}
|
|
|
|
allAddresses := []common.Address{}
|
|
|
|
mainAddress := common.Address(mainAccountAddress)
|
|
|
|
uniqAddressesMap[mainAddress] = struct{}{}
|
|
|
|
allAddresses = append(allAddresses, mainAddress)
|
|
|
|
for _, addr := range watchAddresses {
|
|
|
|
address := common.Address(addr)
|
|
|
|
if _, ok := uniqAddressesMap[address]; !ok {
|
|
|
|
uniqAddressesMap[address] = struct{}{}
|
|
|
|
allAddresses = append(allAddresses, address)
|
|
|
|
}
|
2019-12-11 13:59:37 +00:00
|
|
|
}
|
status-im/status-react#9203 Faster tx fetching with less request
*** How it worked before this PR on multiaccount creation:
- On multiacc creation we scanned chain for eth and erc20 transfers. For
each address of a new empty multiaccount this scan required
1. two `eth_getBalance` requests to find out that there is no any
balance change between zero and the last block, for eth transfers
2. and `chain-size/100000` (currently ~100) `eth_getLogs` requests,
for erc20 transfers
- For some reason we scanned an address of the chat account as well, and
also accounts were not deduplicated. So even for an empty multiacc we
scanned chain twice for each chat and main wallet addresses, in result
app had to execute about 400 requests.
- As mentioned above, `eth_getBalance` requests were used to check if
there were any eth transfers, and that caused empty history in case
if user already used all available eth (so that both zero and latest
blocks show 0 eth for an address). There might have been transactions
but we wouldn't fetch/show them.
- There was no upper limit for the number of rpc requests during the
scan, so it could require indefinite number of requests; the scanning
algorithm was written so that we persisted the whole history of
transactions or tried to scan form the beginning again in case of
failure, giving up only after 10 minutes of failures. In result
addresses with sufficient number of transactions would never be fully
scanned and during these 10 minutes app could use gigabytes of
internet data.
- Failures were caused by `eth_getBlockByNumber`/`eth_getBlockByHash`
requests. These requests return significantly bigger responses than
`eth_getBalance`/`eth_transactionsCount` and it is likely that
execution of thousands of them in parallel caused failures for
accounts with hundreds of transactions. Even for an account with 12k
we could successfully determine blocks with transaction in a few
minutes using `eth_getBalance` requests, but `eth_getBlock...`
couldn't be processed for this acc.
- There was no caching for for `eth_getBalance` requests, and this
caused in average 3-4 times more such requests than is needed.
*** How it works now on multiaccount creation:
- On multiacc creation we scan chain for last ~30 eth transactions and
then check erc20 in the range where these eth transactions were found.
For an empty address in multiacc this means:
1. two `eth_getBalance` transactions to determine that there was no
balance change between zero and the last block; two
`eth_transactionsCount` requests to determine there are no outgoing
transactions for this address; total 4 requests for eth transfers
2. 20 `eth_getLogs` for erc20 transfers. This number can be lowered,
but that's not a big deal
- Deduplication of addresses is added and also we don't scan chat
account, so a new multiacc requires ~25 (we also request latest block
number and probably execute a few other calls) request to determine
that multiacc is empty (comparing to ~400 before)
- In case if address contains transactions we:
1. determine the range which contains 20-25 outgoing eth/erc20
transactions. This usually requires up to 10 `eth_transactionCount`
requests
2. then we scan chain for eth transfers using `eth_getBalance` and
`eth_transactionCount` (for double checking zero balances)
3. we make sure that we do not scan db for more than 30 blocks with
transfers. That's important for accounts with mostly incoming
transactions, because the range found on the first step might
contain any number of incoming transfers, but only 20-25 outgoing
transactions
4. when we found ~30 blocks in a given range, we update initial
range `from` block using the oldest found block
5. and now we scan db for erc20transfers using `eth_getLogs`
`oldest-found-eth-block`-`latest-block`, we make not more than 20 calls
6. when all blocks which contain incoming/outgoing transfers for a
given address are found, we save these blocks to db and mark that
transfers from these blocks are still to be fetched
7. Then we select latest ~30 (the number can be adjusted) blocks from
these which were found and fetch transfers, this requires 3-4
requests per transfer.
8. we persist scanned range so that we know were to start next time
9. we dispatch an event which tells client that transactions are found
10. client fetches latest 20 transfers
- when user presses "fetch more" button we check if app's db contains next
20 transfers, if not we scan chain again and return transfers after
small fixes
2019-12-18 11:01:46 +00:00
|
|
|
|
2019-11-23 17:57:05 +00:00
|
|
|
return wallet.StartReactor(
|
|
|
|
b.statusNode.RPCClient().Ethclient(),
|
|
|
|
allAddresses,
|
2020-11-17 15:54:31 +00:00
|
|
|
new(big.Int).SetUint64(b.statusNode.Config().NetworkID),
|
|
|
|
watchNewBlocks)
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// InjectChatAccount selects the current chat account using chatKeyHex and injects the key into whisper.
|
2019-12-18 22:24:38 +00:00
|
|
|
// TODO: change the interface and omit the last argument.
|
|
|
|
func (b *GethStatusBackend) InjectChatAccount(chatKeyHex, _ string) error {
|
2019-11-23 17:57:05 +00:00
|
|
|
b.mu.Lock()
|
|
|
|
defer b.mu.Unlock()
|
|
|
|
|
|
|
|
b.accountManager.Logout()
|
|
|
|
|
|
|
|
chatKey, err := ethcrypto.HexToECDSA(chatKeyHex)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
b.accountManager.SetChatAccount(chatKey)
|
|
|
|
|
2019-12-18 22:24:38 +00:00
|
|
|
return b.injectAccountIntoServices()
|
2019-11-23 17:57:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func appendIf(condition bool, services []gethnode.ServiceConstructor, service gethnode.ServiceConstructor) []gethnode.ServiceConstructor {
|
|
|
|
if !condition {
|
|
|
|
return services
|
|
|
|
}
|
|
|
|
return append(services, service)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ExtractGroupMembershipSignatures extract signatures from tuples of content/signature
|
|
|
|
func (b *GethStatusBackend) ExtractGroupMembershipSignatures(signaturePairs [][2]string) ([]string, error) {
|
|
|
|
return crypto.ExtractSignatures(signaturePairs)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignGroupMembership signs a piece of data containing membership information
|
|
|
|
func (b *GethStatusBackend) SignGroupMembership(content string) (string, error) {
|
|
|
|
selectedChatAccount, err := b.accountManager.SelectedChatAccount()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return crypto.SignStringAsHex(content, selectedChatAccount.AccountKey.PrivateKey)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignHash exposes vanilla ECDSA signing for signing a message for Swarm
|
|
|
|
func (b *GethStatusBackend) SignHash(hexEncodedHash string) (string, error) {
|
|
|
|
hash, err := hexutil.Decode(hexEncodedHash)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("SignHash: could not unmarshal the input: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
chatAccount, err := b.accountManager.SelectedChatAccount()
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("SignHash: could not select account: %v", err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
signature, err := ethcrypto.Sign(hash, chatAccount.AccountKey.PrivateKey)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("SignHash: could not sign the hash: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
hexEncodedSignature := types.EncodeHex(signature)
|
|
|
|
return hexEncodedSignature, nil
|
|
|
|
}
|
2020-10-26 12:39:42 +00:00
|
|
|
|
2020-10-27 15:26:22 +00:00
|
|
|
// GetIdentityImages returns an array of json marshalled IdentityImages assigned to the user's identity
|
|
|
|
func (b *GethStatusBackend) GetIdentityImages() (string, error) {
|
2020-10-27 15:14:00 +00:00
|
|
|
idb := images.NewDatabase(b.appDB)
|
|
|
|
iis, err := idb.GetIdentityImages()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
js, err := json.Marshal(iis)
|
|
|
|
|
|
|
|
return string(js), err
|
2020-10-26 12:39:42 +00:00
|
|
|
}
|
|
|
|
|
2020-10-27 15:26:22 +00:00
|
|
|
// GetIdentityImage returns a json object representing the image with the given name
|
|
|
|
func (b *GethStatusBackend) GetIdentityImage(name string) (string, error) {
|
|
|
|
idb := images.NewDatabase(b.appDB)
|
|
|
|
ii, err := idb.GetIdentityImage(name)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
js, err := json.Marshal(ii)
|
|
|
|
|
|
|
|
return string(js), err
|
|
|
|
}
|
|
|
|
|
|
|
|
// StoreIdentityImage takes the filepath of an image, crops it as per the rect coords and finally resizes the image.
|
2020-10-26 15:16:41 +00:00
|
|
|
// The resulting image(s) will be stored in the DB along with other user account information.
|
|
|
|
// aX and aY represent the pixel coordinates of the upper left corner of the image's cropping area
|
|
|
|
// bX and bY represent the pixel coordinates of the lower right corner of the image's cropping area
|
2020-10-27 15:26:22 +00:00
|
|
|
func (b *GethStatusBackend) StoreIdentityImage(filepath string, aX, aY, bX, bY int) (string, error) {
|
2020-10-27 15:14:00 +00:00
|
|
|
iis, err := images.GenerateIdentityImages(filepath, aX, aY, bX, bY)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
idb := images.NewDatabase(b.appDB)
|
|
|
|
err = idb.StoreIdentityImages(iis)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
js, err := json.Marshal(iis)
|
2020-10-26 12:39:42 +00:00
|
|
|
|
2020-10-27 15:14:00 +00:00
|
|
|
return string(js), err
|
2020-10-26 12:39:42 +00:00
|
|
|
}
|
2020-10-27 15:26:22 +00:00
|
|
|
|
|
|
|
// DeleteIdentityImage deletes an IdentityImage from the db with the given name
|
|
|
|
func (b *GethStatusBackend) DeleteIdentityImage(name string) error {
|
|
|
|
idb := images.NewDatabase(b.appDB)
|
|
|
|
return idb.DeleteIdentityImage(name)
|
|
|
|
}
|