// Copyright (c) 2014-2016, The Monero Project // // All rights reserved. // // Redistribution and use in source and binary forms, with or without modification, are // permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, this list of // conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, this list // of conditions and the following disclaimer in the documentation and/or other // materials provided with the distribution. // // 3. Neither the name of the copyright holder nor the names of its contributors may be // used to endorse or promote products derived from this software without specific // prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY // EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL // THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, // STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF // THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. #include "common/dns_utils.h" #include "daemon/command_parser_executor.h" #undef MONERO_DEFAULT_LOG_CATEGORY #define MONERO_DEFAULT_LOG_CATEGORY "daemon" namespace daemonize { t_command_parser_executor::t_command_parser_executor( uint32_t ip , uint16_t port , const boost::optional& login , bool is_rpc , cryptonote::core_rpc_server* rpc_server ) : m_executor(ip, port, login, is_rpc, rpc_server) {} bool t_command_parser_executor::print_peer_list(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_peer_list(); } bool t_command_parser_executor::save_blockchain(const std::vector& args) { if (!args.empty()) return false; return m_executor.save_blockchain(); } bool t_command_parser_executor::show_hash_rate(const std::vector& args) { if (!args.empty()) return false; return m_executor.show_hash_rate(); } bool t_command_parser_executor::hide_hash_rate(const std::vector& args) { if (!args.empty()) return false; return m_executor.hide_hash_rate(); } bool t_command_parser_executor::show_difficulty(const std::vector& args) { if (!args.empty()) return false; return m_executor.show_difficulty(); } bool t_command_parser_executor::show_status(const std::vector& args) { if (!args.empty()) return false; return m_executor.show_status(); } bool t_command_parser_executor::print_connections(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_connections(); } bool t_command_parser_executor::print_blockchain_info(const std::vector& args) { if(!args.size()) { std::cout << "need block index parameter" << std::endl; return false; } uint64_t start_index = 0; uint64_t end_index = 0; if(!epee::string_tools::get_xtype_from_string(start_index, args[0])) { std::cout << "wrong starter block index parameter" << std::endl; return false; } if(args.size() >1 && !epee::string_tools::get_xtype_from_string(end_index, args[1])) { std::cout << "wrong end block index parameter" << std::endl; return false; } return m_executor.print_blockchain_info(start_index, end_index); } bool t_command_parser_executor::set_log_level(const std::vector& args) { if(args.size() != 1) { std::cout << "use: set_log [ | ]" << std::endl; return true; } uint16_t l = 0; if(epee::string_tools::get_xtype_from_string(l, args[0])) { if(4 < l) { std::cout << "wrong number range, use: set_log " << std::endl; return true; } return m_executor.set_log_level(l); } else { return m_executor.set_log_categories(args.front()); } } bool t_command_parser_executor::print_height(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_height(); } bool t_command_parser_executor::print_block(const std::vector& args) { if (args.empty()) { std::cout << "expected: print_block ( | )" << std::endl; return false; } const std::string& arg = args.front(); try { uint64_t height = boost::lexical_cast(arg); return m_executor.print_block_by_height(height); } catch (boost::bad_lexical_cast&) { crypto::hash block_hash; if (parse_hash256(arg, block_hash)) { return m_executor.print_block_by_hash(block_hash); } } return false; } bool t_command_parser_executor::print_transaction(const std::vector& args) { if (args.empty()) { std::cout << "expected: print_tx " << std::endl; return true; } const std::string& str_hash = args.front(); crypto::hash tx_hash; if (parse_hash256(str_hash, tx_hash)) { m_executor.print_transaction(tx_hash); } return true; } bool t_command_parser_executor::is_key_image_spent(const std::vector& args) { if (args.empty()) { std::cout << "expected: is_key_image_spent " << std::endl; return true; } const std::string& str = args.front(); crypto::key_image ki; crypto::hash hash; if (parse_hash256(str, hash)) { memcpy(&ki, &hash, sizeof(ki)); m_executor.is_key_image_spent(ki); } return true; } bool t_command_parser_executor::print_transaction_pool_long(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_transaction_pool_long(); } bool t_command_parser_executor::print_transaction_pool_short(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_transaction_pool_short(); } bool t_command_parser_executor::print_transaction_pool_stats(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_transaction_pool_stats(); } bool t_command_parser_executor::start_mining(const std::vector& args) { if(!args.size()) { std::cout << "Please specify a wallet address to mine for: start_mining []" << std::endl; return true; } cryptonote::account_public_address adr; bool has_payment_id; crypto::hash8 payment_id; bool testnet = false; if(!cryptonote::get_account_integrated_address_from_str(adr, has_payment_id, payment_id, false, args.front())) { if(!cryptonote::get_account_integrated_address_from_str(adr, has_payment_id, payment_id, true, args.front())) { bool dnssec_valid; std::string address_str = tools::dns_utils::get_account_address_as_str_from_url(args.front(), dnssec_valid); if(!cryptonote::get_account_integrated_address_from_str(adr, has_payment_id, payment_id, false, address_str)) { if(!cryptonote::get_account_integrated_address_from_str(adr, has_payment_id, payment_id, true, address_str)) { std::cout << "target account address has wrong format" << std::endl; return true; } else { testnet = true; } } } else { testnet = true; } } if(testnet) std::cout << "Mining to a testnet address, make sure this is intentional!" << std::endl; uint64_t threads_count = 1; if(args.size() > 2) { return false; } else if(args.size() == 2) { bool ok = epee::string_tools::get_xtype_from_string(threads_count, args[1]); threads_count = (ok && 0 < threads_count) ? threads_count : 1; } m_executor.start_mining(adr, threads_count, testnet); return true; } bool t_command_parser_executor::stop_mining(const std::vector& args) { if (!args.empty()) return false; return m_executor.stop_mining(); } bool t_command_parser_executor::stop_daemon(const std::vector& args) { if (!args.empty()) return false; return m_executor.stop_daemon(); } bool t_command_parser_executor::print_status(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_status(); } bool t_command_parser_executor::set_limit(const std::vector& args) { if(args.size()>1) return false; if(args.size()==0) { return m_executor.get_limit(); } int limit; try { limit = std::stoi(args[0]); } catch(std::invalid_argument& ex) { return false; } if (limit==-1) limit=128; limit *= 1024; return m_executor.set_limit(limit); } bool t_command_parser_executor::set_limit_up(const std::vector& args) { if(args.size()>1) return false; if(args.size()==0) { return m_executor.get_limit_up(); } int limit; try { limit = std::stoi(args[0]); } catch(std::invalid_argument& ex) { return false; } if (limit==-1) limit=128; limit *= 1024; return m_executor.set_limit_up(limit); } bool t_command_parser_executor::set_limit_down(const std::vector& args) { if(args.size()>1) return false; if(args.size()==0) { return m_executor.get_limit_down(); } int limit; try { limit = std::stoi(args[0]); } catch(std::invalid_argument& ex) { return false; } if (limit==-1) limit=128; limit *= 1024; return m_executor.set_limit_down(limit); } bool t_command_parser_executor::out_peers(const std::vector& args) { if (args.empty()) return false; unsigned int limit; try { limit = std::stoi(args[0]); } catch(std::invalid_argument& ex) { _erro("stoi exception"); return false; } return m_executor.out_peers(limit); } bool t_command_parser_executor::start_save_graph(const std::vector& args) { if (!args.empty()) return false; return m_executor.start_save_graph(); } bool t_command_parser_executor::stop_save_graph(const std::vector& args) { if (!args.empty()) return false; return m_executor.stop_save_graph(); } bool t_command_parser_executor::hard_fork_info(const std::vector& args) { int version; if (args.size() == 0) { version = 0; } else if (args.size() == 1) { try { version = std::stoi(args[0]); } catch(std::invalid_argument& ex) { return false; } if (version <= 0 || version > 255) return false; } else { return false; } return m_executor.hard_fork_info(version); } bool t_command_parser_executor::show_bans(const std::vector& args) { if (!args.empty()) return false; return m_executor.print_bans(); } bool t_command_parser_executor::ban(const std::vector& args) { if (args.size() != 1 && args.size() != 2) return false; std::string ip = args[0]; time_t seconds = P2P_IP_BLOCKTIME; if (args.size() > 1) { seconds = std::stoi(args[1]); if (seconds == 0) { return false; } } return m_executor.ban(ip, seconds); } bool t_command_parser_executor::unban(const std::vector& args) { if (args.size() != 1) return false; std::string ip = args[0]; return m_executor.unban(ip); } bool t_command_parser_executor::flush_txpool(const std::vector& args) { if (args.size() > 1) return false; std::string txid; if (args.size() == 1) { crypto::hash hash; if (!parse_hash256(args[0], hash)) { std::cout << "failed to parse tx id" << std::endl; return true; } txid = args[0]; } return m_executor.flush_txpool(txid); } bool t_command_parser_executor::output_histogram(const std::vector& args) { if (args.size() > 2) return false; uint64_t min_count = 3; uint64_t max_count = 0; if (args.size() >= 1) { min_count = boost::lexical_cast(args[0]); } if (args.size() >= 2) { max_count = boost::lexical_cast(args[1]); } return m_executor.output_histogram(min_count, max_count); } bool t_command_parser_executor::print_coinbase_tx_sum(const std::vector& args) { if(!args.size()) { std::cout << "need block height parameter" << std::endl; return false; } uint64_t height = 0; uint64_t count = 0; if(!epee::string_tools::get_xtype_from_string(height, args[0])) { std::cout << "wrong starter block height parameter" << std::endl; return false; } if(args.size() >1 && !epee::string_tools::get_xtype_from_string(count, args[1])) { std::cout << "wrong count parameter" << std::endl; return false; } return m_executor.print_coinbase_tx_sum(height, count); } bool t_command_parser_executor::alt_chain_info(const std::vector& args) { if(args.size()) { std::cout << "No parameters allowed" << std::endl; return false; } return m_executor.alt_chain_info(); } bool t_command_parser_executor::print_blockchain_dynamic_stats(const std::vector& args) { if(args.size() != 1) { std::cout << "Exactly one parameter is needed" << std::endl; return false; } uint64_t nblocks = 0; if(!epee::string_tools::get_xtype_from_string(nblocks, args[0]) || nblocks == 0) { std::cout << "wrong number of blocks" << std::endl; return false; } return m_executor.print_blockchain_dynamic_stats(nblocks); } } // namespace daemonize