mirror of
https://codeberg.org/anoncontributorxmr/monero.git
synced 2024-11-30 06:43:28 +01:00
wallet2_api: implement runtime proxy configuration
This commit is contained in:
parent
5d850dde99
commit
76c16822d0
@ -64,6 +64,7 @@ namespace http
|
|||||||
abstract_http_client() {}
|
abstract_http_client() {}
|
||||||
virtual ~abstract_http_client() {}
|
virtual ~abstract_http_client() {}
|
||||||
bool set_server(const std::string& address, boost::optional<login> user, ssl_options_t ssl_options = ssl_support_t::e_ssl_support_autodetect);
|
bool set_server(const std::string& address, boost::optional<login> user, ssl_options_t ssl_options = ssl_support_t::e_ssl_support_autodetect);
|
||||||
|
virtual bool set_proxy(const std::string& address);
|
||||||
virtual void set_server(std::string host, std::string port, boost::optional<login> user, ssl_options_t ssl_options = ssl_support_t::e_ssl_support_autodetect) = 0;
|
virtual void set_server(std::string host, std::string port, boost::optional<login> user, ssl_options_t ssl_options = ssl_support_t::e_ssl_support_autodetect) = 0;
|
||||||
virtual void set_auto_connect(bool auto_connect) = 0;
|
virtual void set_auto_connect(bool auto_connect) = 0;
|
||||||
virtual bool connect(std::chrono::milliseconds timeout) = 0;
|
virtual bool connect(std::chrono::milliseconds timeout) = 0;
|
||||||
|
@ -885,14 +885,6 @@ namespace net_utils
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
typedef http_simple_client_template<blocked_mode_client> http_simple_client;
|
typedef http_simple_client_template<blocked_mode_client> http_simple_client;
|
||||||
|
|
||||||
class http_simple_client_factory : public http_client_factory
|
|
||||||
{
|
|
||||||
public:
|
|
||||||
std::unique_ptr<abstract_http_client> create() override {
|
|
||||||
return std::unique_ptr<epee::net_utils::http::abstract_http_client>(new epee::net_utils::http::http_simple_client());
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -137,6 +137,11 @@ namespace http
|
|||||||
set_server(std::move(parsed.host), std::to_string(parsed.port), std::move(user), std::move(ssl_options));
|
set_server(std::move(parsed.host), std::to_string(parsed.port), std::move(user), std::move(ssl_options));
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool epee::net_utils::http::abstract_http_client::set_proxy(const std::string& address)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -26,9 +26,9 @@
|
|||||||
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
||||||
# THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
# THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
set(net_sources dandelionpp.cpp error.cpp i2p_address.cpp parse.cpp socks.cpp
|
set(net_sources dandelionpp.cpp error.cpp http.cpp i2p_address.cpp parse.cpp socks.cpp
|
||||||
socks_connect.cpp tor_address.cpp zmq.cpp)
|
socks_connect.cpp tor_address.cpp zmq.cpp)
|
||||||
set(net_headers dandelionpp.h error.h i2p_address.h parse.h socks.h socks_connect.h
|
set(net_headers dandelionpp.h error.h http.cpp i2p_address.h parse.h socks.h socks_connect.h
|
||||||
tor_address.h zmq.h)
|
tor_address.h zmq.h)
|
||||||
|
|
||||||
monero_add_library(net ${net_sources} ${net_headers})
|
monero_add_library(net ${net_sources} ${net_headers})
|
||||||
|
70
src/net/http.cpp
Normal file
70
src/net/http.cpp
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
// Copyright (c) 2020, The Monero Project
|
||||||
|
//
|
||||||
|
// All rights reserved.
|
||||||
|
//
|
||||||
|
// Redistribution and use in source and binary forms, with or without modification, are
|
||||||
|
// permitted provided that the following conditions are met:
|
||||||
|
//
|
||||||
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
||||||
|
// conditions and the following disclaimer.
|
||||||
|
//
|
||||||
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
||||||
|
// of conditions and the following disclaimer in the documentation and/or other
|
||||||
|
// materials provided with the distribution.
|
||||||
|
//
|
||||||
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
||||||
|
// used to endorse or promote products derived from this software without specific
|
||||||
|
// prior written permission.
|
||||||
|
//
|
||||||
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
||||||
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||||
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||||||
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||||
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
||||||
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
|
#include "http.h"
|
||||||
|
|
||||||
|
#include "parse.h"
|
||||||
|
#include "socks_connect.h"
|
||||||
|
|
||||||
|
namespace net
|
||||||
|
{
|
||||||
|
namespace http
|
||||||
|
{
|
||||||
|
|
||||||
|
bool client::set_proxy(const std::string &address)
|
||||||
|
{
|
||||||
|
if (address.empty())
|
||||||
|
{
|
||||||
|
set_connector(epee::net_utils::direct_connect{});
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
const auto endpoint = get_tcp_endpoint(address);
|
||||||
|
if (!endpoint)
|
||||||
|
{
|
||||||
|
auto always_fail = net::socks::connector{boost::asio::ip::tcp::endpoint()};
|
||||||
|
set_connector(always_fail);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
set_connector(net::socks::connector{*endpoint});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
disconnect();
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::unique_ptr<epee::net_utils::http::abstract_http_client> client_factory::create()
|
||||||
|
{
|
||||||
|
return std::unique_ptr<epee::net_utils::http::abstract_http_client>(new client());
|
||||||
|
}
|
||||||
|
|
||||||
|
} // namespace http
|
||||||
|
} // namespace net
|
51
src/net/http.h
Normal file
51
src/net/http.h
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
// Copyright (c) 2020, The Monero Project
|
||||||
|
//
|
||||||
|
// All rights reserved.
|
||||||
|
//
|
||||||
|
// Redistribution and use in source and binary forms, with or without modification, are
|
||||||
|
// permitted provided that the following conditions are met:
|
||||||
|
//
|
||||||
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
||||||
|
// conditions and the following disclaimer.
|
||||||
|
//
|
||||||
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
||||||
|
// of conditions and the following disclaimer in the documentation and/or other
|
||||||
|
// materials provided with the distribution.
|
||||||
|
//
|
||||||
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
||||||
|
// used to endorse or promote products derived from this software without specific
|
||||||
|
// prior written permission.
|
||||||
|
//
|
||||||
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
||||||
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||||
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
||||||
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||||
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
||||||
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
|
#pragma once
|
||||||
|
|
||||||
|
#include "net/http_client.h"
|
||||||
|
|
||||||
|
namespace net
|
||||||
|
{
|
||||||
|
namespace http
|
||||||
|
{
|
||||||
|
|
||||||
|
class client : public epee::net_utils::http::http_simple_client
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
bool set_proxy(const std::string &address) override;
|
||||||
|
};
|
||||||
|
|
||||||
|
class client_factory : public epee::net_utils::http::http_client_factory
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
std::unique_ptr<epee::net_utils::http::abstract_http_client> create() override;
|
||||||
|
};
|
||||||
|
|
||||||
|
} // namespace http
|
||||||
|
} // namespace net
|
@ -122,4 +122,39 @@ namespace net
|
|||||||
|
|
||||||
return {epee::net_utils::ipv4_network_subnet{ip, (uint8_t)mask}};
|
return {epee::net_utils::ipv4_network_subnet{ip, (uint8_t)mask}};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
expect<boost::asio::ip::tcp::endpoint> get_tcp_endpoint(const boost::string_ref address)
|
||||||
|
{
|
||||||
|
uint16_t port = 0;
|
||||||
|
expect<epee::net_utils::network_address> parsed = get_network_address(address, port);
|
||||||
|
if (!parsed)
|
||||||
|
{
|
||||||
|
return parsed.error();
|
||||||
|
}
|
||||||
|
|
||||||
|
boost::asio::ip::tcp::endpoint result;
|
||||||
|
switch (parsed->get_type_id())
|
||||||
|
{
|
||||||
|
case epee::net_utils::ipv4_network_address::get_type_id():
|
||||||
|
{
|
||||||
|
const auto &ipv4 = parsed->as<epee::net_utils::ipv4_network_address>();
|
||||||
|
result = boost::asio::ip::tcp::endpoint(boost::asio::ip::address_v4(ipv4.ip()), ipv4.port());
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case epee::net_utils::ipv6_network_address::get_type_id():
|
||||||
|
{
|
||||||
|
const auto &ipv6 = parsed->as<epee::net_utils::ipv6_network_address>();
|
||||||
|
result = boost::asio::ip::tcp::endpoint(ipv6.ip(), ipv6.port());
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return make_error_code(net::error::unsupported_address);
|
||||||
|
}
|
||||||
|
if (result.port() == 0)
|
||||||
|
{
|
||||||
|
return make_error_code(net::error::invalid_port);
|
||||||
|
}
|
||||||
|
|
||||||
|
return result;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -28,6 +28,7 @@
|
|||||||
|
|
||||||
#pragma once
|
#pragma once
|
||||||
|
|
||||||
|
#include <boost/asio/ip/tcp.hpp>
|
||||||
#include <boost/utility/string_ref.hpp>
|
#include <boost/utility/string_ref.hpp>
|
||||||
#include <cstdint>
|
#include <cstdint>
|
||||||
|
|
||||||
@ -65,5 +66,7 @@ namespace net
|
|||||||
*/
|
*/
|
||||||
expect<epee::net_utils::ipv4_network_subnet>
|
expect<epee::net_utils::ipv4_network_subnet>
|
||||||
get_ipv4_subnet_address(boost::string_ref address, bool allow_implicit_32 = false);
|
get_ipv4_subnet_address(boost::string_ref address, bool allow_implicit_32 = false);
|
||||||
|
|
||||||
|
expect<boost::asio::ip::tcp::endpoint> get_tcp_endpoint(const boost::string_ref address);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -938,13 +938,13 @@ string WalletImpl::keysFilename() const
|
|||||||
return m_wallet->get_keys_file();
|
return m_wallet->get_keys_file();
|
||||||
}
|
}
|
||||||
|
|
||||||
bool WalletImpl::init(const std::string &daemon_address, uint64_t upper_transaction_size_limit, const std::string &daemon_username, const std::string &daemon_password, bool use_ssl, bool lightWallet)
|
bool WalletImpl::init(const std::string &daemon_address, uint64_t upper_transaction_size_limit, const std::string &daemon_username, const std::string &daemon_password, bool use_ssl, bool lightWallet, const std::string &proxy_address)
|
||||||
{
|
{
|
||||||
clearStatus();
|
clearStatus();
|
||||||
m_wallet->set_light_wallet(lightWallet);
|
m_wallet->set_light_wallet(lightWallet);
|
||||||
if(daemon_username != "")
|
if(daemon_username != "")
|
||||||
m_daemon_login.emplace(daemon_username, daemon_password);
|
m_daemon_login.emplace(daemon_username, daemon_password);
|
||||||
return doInit(daemon_address, upper_transaction_size_limit, use_ssl);
|
return doInit(daemon_address, proxy_address, upper_transaction_size_limit, use_ssl);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool WalletImpl::lightWalletLogin(bool &isNewWallet) const
|
bool WalletImpl::lightWalletLogin(bool &isNewWallet) const
|
||||||
@ -2088,6 +2088,11 @@ bool WalletImpl::trustedDaemon() const
|
|||||||
return m_wallet->is_trusted_daemon();
|
return m_wallet->is_trusted_daemon();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool WalletImpl::setProxy(const std::string &address)
|
||||||
|
{
|
||||||
|
return m_wallet->set_proxy(address);
|
||||||
|
}
|
||||||
|
|
||||||
bool WalletImpl::watchOnly() const
|
bool WalletImpl::watchOnly() const
|
||||||
{
|
{
|
||||||
return m_wallet->watch_only();
|
return m_wallet->watch_only();
|
||||||
@ -2241,9 +2246,9 @@ void WalletImpl::pendingTxPostProcess(PendingTransactionImpl * pending)
|
|||||||
pending->m_pending_tx = exported_txs.ptx;
|
pending->m_pending_tx = exported_txs.ptx;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool WalletImpl::doInit(const string &daemon_address, uint64_t upper_transaction_size_limit, bool ssl)
|
bool WalletImpl::doInit(const string &daemon_address, const std::string &proxy_address, uint64_t upper_transaction_size_limit, bool ssl)
|
||||||
{
|
{
|
||||||
if (!m_wallet->init(daemon_address, m_daemon_login, boost::asio::ip::tcp::endpoint{}, upper_transaction_size_limit))
|
if (!m_wallet->init(daemon_address, m_daemon_login, proxy_address, upper_transaction_size_limit))
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
// in case new wallet, this will force fast-refresh (pulling hashes instead of blocks)
|
// in case new wallet, this will force fast-refresh (pulling hashes instead of blocks)
|
||||||
|
@ -102,11 +102,12 @@ public:
|
|||||||
bool store(const std::string &path) override;
|
bool store(const std::string &path) override;
|
||||||
std::string filename() const override;
|
std::string filename() const override;
|
||||||
std::string keysFilename() const override;
|
std::string keysFilename() const override;
|
||||||
bool init(const std::string &daemon_address, uint64_t upper_transaction_size_limit = 0, const std::string &daemon_username = "", const std::string &daemon_password = "", bool use_ssl = false, bool lightWallet = false) override;
|
bool init(const std::string &daemon_address, uint64_t upper_transaction_size_limit = 0, const std::string &daemon_username = "", const std::string &daemon_password = "", bool use_ssl = false, bool lightWallet = false, const std::string &proxy_address = "") override;
|
||||||
bool connectToDaemon() override;
|
bool connectToDaemon() override;
|
||||||
ConnectionStatus connected() const override;
|
ConnectionStatus connected() const override;
|
||||||
void setTrustedDaemon(bool arg) override;
|
void setTrustedDaemon(bool arg) override;
|
||||||
bool trustedDaemon() const override;
|
bool trustedDaemon() const override;
|
||||||
|
bool setProxy(const std::string &address) override;
|
||||||
uint64_t balance(uint32_t accountIndex = 0) const override;
|
uint64_t balance(uint32_t accountIndex = 0) const override;
|
||||||
uint64_t unlockedBalance(uint32_t accountIndex = 0) const override;
|
uint64_t unlockedBalance(uint32_t accountIndex = 0) const override;
|
||||||
uint64_t blockChainHeight() const override;
|
uint64_t blockChainHeight() const override;
|
||||||
@ -225,7 +226,7 @@ private:
|
|||||||
void stopRefresh();
|
void stopRefresh();
|
||||||
bool isNewWallet() const;
|
bool isNewWallet() const;
|
||||||
void pendingTxPostProcess(PendingTransactionImpl * pending);
|
void pendingTxPostProcess(PendingTransactionImpl * pending);
|
||||||
bool doInit(const std::string &daemon_address, uint64_t upper_transaction_size_limit = 0, bool ssl = false);
|
bool doInit(const std::string &daemon_address, const std::string &proxy_address, uint64_t upper_transaction_size_limit = 0, bool ssl = false);
|
||||||
|
|
||||||
private:
|
private:
|
||||||
friend class PendingTransactionImpl;
|
friend class PendingTransactionImpl;
|
||||||
|
@ -533,9 +533,10 @@ struct Wallet
|
|||||||
* \param daemon_username
|
* \param daemon_username
|
||||||
* \param daemon_password
|
* \param daemon_password
|
||||||
* \param lightWallet - start wallet in light mode, connect to a openmonero compatible server.
|
* \param lightWallet - start wallet in light mode, connect to a openmonero compatible server.
|
||||||
|
* \param proxy_address - set proxy address, empty string to disable
|
||||||
* \return - true on success
|
* \return - true on success
|
||||||
*/
|
*/
|
||||||
virtual bool init(const std::string &daemon_address, uint64_t upper_transaction_size_limit = 0, const std::string &daemon_username = "", const std::string &daemon_password = "", bool use_ssl = false, bool lightWallet = false) = 0;
|
virtual bool init(const std::string &daemon_address, uint64_t upper_transaction_size_limit = 0, const std::string &daemon_username = "", const std::string &daemon_password = "", bool use_ssl = false, bool lightWallet = false, const std::string &proxy_address = "") = 0;
|
||||||
|
|
||||||
/*!
|
/*!
|
||||||
* \brief createWatchOnly - Creates a watch only wallet
|
* \brief createWatchOnly - Creates a watch only wallet
|
||||||
@ -594,6 +595,7 @@ struct Wallet
|
|||||||
virtual ConnectionStatus connected() const = 0;
|
virtual ConnectionStatus connected() const = 0;
|
||||||
virtual void setTrustedDaemon(bool arg) = 0;
|
virtual void setTrustedDaemon(bool arg) = 0;
|
||||||
virtual bool trustedDaemon() const = 0;
|
virtual bool trustedDaemon() const = 0;
|
||||||
|
virtual bool setProxy(const std::string &address) = 0;
|
||||||
virtual uint64_t balance(uint32_t accountIndex = 0) const = 0;
|
virtual uint64_t balance(uint32_t accountIndex = 0) const = 0;
|
||||||
uint64_t balanceAll() const {
|
uint64_t balanceAll() const {
|
||||||
uint64_t result = 0;
|
uint64_t result = 0;
|
||||||
@ -1298,6 +1300,9 @@ struct WalletManager
|
|||||||
std::string subdir,
|
std::string subdir,
|
||||||
const char *buildtag = nullptr,
|
const char *buildtag = nullptr,
|
||||||
const char *current_version = nullptr);
|
const char *current_version = nullptr);
|
||||||
|
|
||||||
|
//! sets proxy address, empty string to disable
|
||||||
|
virtual bool setProxy(const std::string &address) = 0;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
@ -375,6 +375,10 @@ std::tuple<bool, std::string, std::string, std::string, std::string> WalletManag
|
|||||||
return std::make_tuple(false, "", "", "", "");
|
return std::make_tuple(false, "", "", "", "");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool WalletManagerImpl::setProxy(const std::string &address)
|
||||||
|
{
|
||||||
|
return m_http_client.set_proxy(address);
|
||||||
|
}
|
||||||
|
|
||||||
///////////////////// WalletManagerFactory implementation //////////////////////
|
///////////////////// WalletManagerFactory implementation //////////////////////
|
||||||
WalletManager *WalletManagerFactory::getWalletManager()
|
WalletManager *WalletManagerFactory::getWalletManager()
|
||||||
|
@ -30,7 +30,7 @@
|
|||||||
|
|
||||||
|
|
||||||
#include "wallet/api/wallet2_api.h"
|
#include "wallet/api/wallet2_api.h"
|
||||||
#include "net/http_client.h"
|
#include "net/http.h"
|
||||||
#include <string>
|
#include <string>
|
||||||
|
|
||||||
namespace Monero {
|
namespace Monero {
|
||||||
@ -92,11 +92,12 @@ public:
|
|||||||
bool startMining(const std::string &address, uint32_t threads = 1, bool background_mining = false, bool ignore_battery = true) override;
|
bool startMining(const std::string &address, uint32_t threads = 1, bool background_mining = false, bool ignore_battery = true) override;
|
||||||
bool stopMining() override;
|
bool stopMining() override;
|
||||||
std::string resolveOpenAlias(const std::string &address, bool &dnssec_valid) const override;
|
std::string resolveOpenAlias(const std::string &address, bool &dnssec_valid) const override;
|
||||||
|
bool setProxy(const std::string &address) override;
|
||||||
|
|
||||||
private:
|
private:
|
||||||
WalletManagerImpl() {}
|
WalletManagerImpl() {}
|
||||||
friend struct WalletManagerFactory;
|
friend struct WalletManagerFactory;
|
||||||
epee::net_utils::http::http_simple_client m_http_client;
|
net::http::client m_http_client;
|
||||||
std::string m_errorString;
|
std::string m_errorString;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -48,6 +48,7 @@ using namespace epee;
|
|||||||
#include "wallet_rpc_helpers.h"
|
#include "wallet_rpc_helpers.h"
|
||||||
#include "wallet2.h"
|
#include "wallet2.h"
|
||||||
#include "cryptonote_basic/cryptonote_format_utils.h"
|
#include "cryptonote_basic/cryptonote_format_utils.h"
|
||||||
|
#include "net/parse.h"
|
||||||
#include "rpc/core_rpc_server_commands_defs.h"
|
#include "rpc/core_rpc_server_commands_defs.h"
|
||||||
#include "rpc/core_rpc_server_error_codes.h"
|
#include "rpc/core_rpc_server_error_codes.h"
|
||||||
#include "rpc/rpc_payment_signature.h"
|
#include "rpc/rpc_payment_signature.h"
|
||||||
@ -440,30 +441,14 @@ std::unique_ptr<tools::wallet2> make_basic(const boost::program_options::variabl
|
|||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
boost::asio::ip::tcp::endpoint proxy{};
|
std::string proxy;
|
||||||
if (use_proxy)
|
if (use_proxy)
|
||||||
{
|
{
|
||||||
namespace ip = boost::asio::ip;
|
proxy = command_line::get_arg(vm, opts.proxy);
|
||||||
|
|
||||||
const auto proxy_address = command_line::get_arg(vm, opts.proxy);
|
|
||||||
|
|
||||||
boost::string_ref proxy_port{proxy_address};
|
|
||||||
boost::string_ref proxy_host = proxy_port.substr(0, proxy_port.rfind(":"));
|
|
||||||
if (proxy_port.size() == proxy_host.size())
|
|
||||||
proxy_host = "127.0.0.1";
|
|
||||||
else
|
|
||||||
proxy_port = proxy_port.substr(proxy_host.size() + 1);
|
|
||||||
|
|
||||||
uint16_t port_value = 0;
|
|
||||||
THROW_WALLET_EXCEPTION_IF(
|
THROW_WALLET_EXCEPTION_IF(
|
||||||
!epee::string_tools::get_xtype_from_string(port_value, std::string{proxy_port}),
|
!net::get_tcp_endpoint(proxy),
|
||||||
tools::error::wallet_internal_error,
|
tools::error::wallet_internal_error,
|
||||||
std::string{"Invalid port specified for --"} + opts.proxy.name
|
std::string{"Invalid address specified for --"} + opts.proxy.name);
|
||||||
);
|
|
||||||
|
|
||||||
boost::system::error_code error{};
|
|
||||||
proxy = ip::tcp::endpoint{ip::address::from_string(std::string{proxy_host}, error), port_value};
|
|
||||||
THROW_WALLET_EXCEPTION_IF(bool(error), tools::error::wallet_internal_error, std::string{"Invalid IP address specified for --"} + opts.proxy.name);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
boost::optional<bool> trusted_daemon;
|
boost::optional<bool> trusted_daemon;
|
||||||
@ -1325,18 +1310,17 @@ bool wallet2::set_daemon(std::string daemon_address, boost::optional<epee::net_u
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
//----------------------------------------------------------------------------------------------------
|
//----------------------------------------------------------------------------------------------------
|
||||||
bool wallet2::init(std::string daemon_address, boost::optional<epee::net_utils::http::login> daemon_login, boost::asio::ip::tcp::endpoint proxy, uint64_t upper_transaction_weight_limit, bool trusted_daemon, epee::net_utils::ssl_options_t ssl_options)
|
bool wallet2::set_proxy(const std::string &address)
|
||||||
{
|
{
|
||||||
|
return m_http_client->set_proxy(address);
|
||||||
|
}
|
||||||
|
//----------------------------------------------------------------------------------------------------
|
||||||
|
bool wallet2::init(std::string daemon_address, boost::optional<epee::net_utils::http::login> daemon_login, const std::string &proxy_address, uint64_t upper_transaction_weight_limit, bool trusted_daemon, epee::net_utils::ssl_options_t ssl_options)
|
||||||
|
{
|
||||||
|
CHECK_AND_ASSERT_MES(set_proxy(proxy_address), false, "failed to set proxy address");
|
||||||
m_checkpoints.init_default_checkpoints(m_nettype);
|
m_checkpoints.init_default_checkpoints(m_nettype);
|
||||||
m_is_initialized = true;
|
m_is_initialized = true;
|
||||||
m_upper_transaction_weight_limit = upper_transaction_weight_limit;
|
m_upper_transaction_weight_limit = upper_transaction_weight_limit;
|
||||||
if (proxy != boost::asio::ip::tcp::endpoint{})
|
|
||||||
{
|
|
||||||
epee::net_utils::http::abstract_http_client* abstract_http_client = m_http_client.get();
|
|
||||||
epee::net_utils::http::http_simple_client* http_simple_client = dynamic_cast<epee::net_utils::http::http_simple_client*>(abstract_http_client);
|
|
||||||
CHECK_AND_ASSERT_MES(http_simple_client != nullptr, false, "http_simple_client must be used to set proxy");
|
|
||||||
http_simple_client->set_connector(net::socks::connector{std::move(proxy)});
|
|
||||||
}
|
|
||||||
return set_daemon(daemon_address, daemon_login, trusted_daemon, std::move(ssl_options));
|
return set_daemon(daemon_address, daemon_login, trusted_daemon, std::move(ssl_options));
|
||||||
}
|
}
|
||||||
//----------------------------------------------------------------------------------------------------
|
//----------------------------------------------------------------------------------------------------
|
||||||
|
@ -45,7 +45,7 @@
|
|||||||
#include "cryptonote_basic/account.h"
|
#include "cryptonote_basic/account.h"
|
||||||
#include "cryptonote_basic/account_boost_serialization.h"
|
#include "cryptonote_basic/account_boost_serialization.h"
|
||||||
#include "cryptonote_basic/cryptonote_basic_impl.h"
|
#include "cryptonote_basic/cryptonote_basic_impl.h"
|
||||||
#include "net/http_client.h"
|
#include "net/http.h"
|
||||||
#include "storages/http_abstract_invoke.h"
|
#include "storages/http_abstract_invoke.h"
|
||||||
#include "rpc/core_rpc_server_commands_defs.h"
|
#include "rpc/core_rpc_server_commands_defs.h"
|
||||||
#include "cryptonote_basic/cryptonote_format_utils.h"
|
#include "cryptonote_basic/cryptonote_format_utils.h"
|
||||||
@ -269,7 +269,7 @@ private:
|
|||||||
static bool verify_password(const std::string& keys_file_name, const epee::wipeable_string& password, bool no_spend_key, hw::device &hwdev, uint64_t kdf_rounds);
|
static bool verify_password(const std::string& keys_file_name, const epee::wipeable_string& password, bool no_spend_key, hw::device &hwdev, uint64_t kdf_rounds);
|
||||||
static bool query_device(hw::device::device_type& device_type, const std::string& keys_file_name, const epee::wipeable_string& password, uint64_t kdf_rounds = 1);
|
static bool query_device(hw::device::device_type& device_type, const std::string& keys_file_name, const epee::wipeable_string& password, uint64_t kdf_rounds = 1);
|
||||||
|
|
||||||
wallet2(cryptonote::network_type nettype = cryptonote::MAINNET, uint64_t kdf_rounds = 1, bool unattended = false, std::unique_ptr<epee::net_utils::http::http_client_factory> http_client_factory = std::unique_ptr<epee::net_utils::http::http_simple_client_factory>(new epee::net_utils::http::http_simple_client_factory()));
|
wallet2(cryptonote::network_type nettype = cryptonote::MAINNET, uint64_t kdf_rounds = 1, bool unattended = false, std::unique_ptr<epee::net_utils::http::http_client_factory> http_client_factory = std::unique_ptr<epee::net_utils::http::http_client_factory>(new net::http::client_factory()));
|
||||||
~wallet2();
|
~wallet2();
|
||||||
|
|
||||||
struct multisig_info
|
struct multisig_info
|
||||||
@ -753,13 +753,14 @@ private:
|
|||||||
bool deinit();
|
bool deinit();
|
||||||
bool init(std::string daemon_address = "http://localhost:8080",
|
bool init(std::string daemon_address = "http://localhost:8080",
|
||||||
boost::optional<epee::net_utils::http::login> daemon_login = boost::none,
|
boost::optional<epee::net_utils::http::login> daemon_login = boost::none,
|
||||||
boost::asio::ip::tcp::endpoint proxy = {},
|
const std::string &proxy = "",
|
||||||
uint64_t upper_transaction_weight_limit = 0,
|
uint64_t upper_transaction_weight_limit = 0,
|
||||||
bool trusted_daemon = true,
|
bool trusted_daemon = true,
|
||||||
epee::net_utils::ssl_options_t ssl_options = epee::net_utils::ssl_support_t::e_ssl_support_autodetect);
|
epee::net_utils::ssl_options_t ssl_options = epee::net_utils::ssl_support_t::e_ssl_support_autodetect);
|
||||||
bool set_daemon(std::string daemon_address = "http://localhost:8080",
|
bool set_daemon(std::string daemon_address = "http://localhost:8080",
|
||||||
boost::optional<epee::net_utils::http::login> daemon_login = boost::none, bool trusted_daemon = true,
|
boost::optional<epee::net_utils::http::login> daemon_login = boost::none, bool trusted_daemon = true,
|
||||||
epee::net_utils::ssl_options_t ssl_options = epee::net_utils::ssl_support_t::e_ssl_support_autodetect);
|
epee::net_utils::ssl_options_t ssl_options = epee::net_utils::ssl_support_t::e_ssl_support_autodetect);
|
||||||
|
bool set_proxy(const std::string &address);
|
||||||
|
|
||||||
void stop() { m_run.store(false, std::memory_order_relaxed); m_message_store.stop(); }
|
void stop() { m_run.store(false, std::memory_order_relaxed); m_message_store.stop(); }
|
||||||
|
|
||||||
|
@ -44,7 +44,7 @@ BEGIN_INIT_SIMPLE_FUZZER()
|
|||||||
crypto::secret_key spendkey;
|
crypto::secret_key spendkey;
|
||||||
epee::string_tools::hex_to_pod(spendkey_hex, spendkey);
|
epee::string_tools::hex_to_pod(spendkey_hex, spendkey);
|
||||||
|
|
||||||
wallet->init("", boost::none, boost::asio::ip::tcp::endpoint{}, 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
wallet->init("", boost::none, "", 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
||||||
wallet->set_subaddress_lookahead(1, 1);
|
wallet->set_subaddress_lookahead(1, 1);
|
||||||
wallet->generate("", "", spendkey, true, false);
|
wallet->generate("", "", spendkey, true, false);
|
||||||
END_INIT_SIMPLE_FUZZER()
|
END_INIT_SIMPLE_FUZZER()
|
||||||
|
@ -44,7 +44,7 @@ BEGIN_INIT_SIMPLE_FUZZER()
|
|||||||
crypto::secret_key spendkey;
|
crypto::secret_key spendkey;
|
||||||
epee::string_tools::hex_to_pod(spendkey_hex, spendkey);
|
epee::string_tools::hex_to_pod(spendkey_hex, spendkey);
|
||||||
|
|
||||||
wallet->init("", boost::none, boost::asio::ip::tcp::endpoint{}, 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
wallet->init("", boost::none, "", 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
||||||
wallet->set_subaddress_lookahead(1, 1);
|
wallet->set_subaddress_lookahead(1, 1);
|
||||||
wallet->generate("", "", spendkey, true, false);
|
wallet->generate("", "", spendkey, true, false);
|
||||||
END_INIT_SIMPLE_FUZZER()
|
END_INIT_SIMPLE_FUZZER()
|
||||||
|
@ -45,7 +45,7 @@ BEGIN_INIT_SIMPLE_FUZZER()
|
|||||||
crypto::secret_key spendkey;
|
crypto::secret_key spendkey;
|
||||||
epee::string_tools::hex_to_pod(spendkey_hex, spendkey);
|
epee::string_tools::hex_to_pod(spendkey_hex, spendkey);
|
||||||
|
|
||||||
wallet->init("", boost::none, boost::asio::ip::tcp::endpoint{}, 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
wallet->init("", boost::none, "", 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
||||||
wallet->set_subaddress_lookahead(1, 1);
|
wallet->set_subaddress_lookahead(1, 1);
|
||||||
wallet->generate("", "", spendkey, true, false);
|
wallet->generate("", "", spendkey, true, false);
|
||||||
|
|
||||||
|
@ -71,7 +71,7 @@ static void make_wallet(unsigned int idx, tools::wallet2 &wallet)
|
|||||||
|
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
wallet.init("", boost::none, boost::asio::ip::tcp::endpoint{}, 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
wallet.init("", boost::none, "", 0, true, epee::net_utils::ssl_support_t::e_ssl_support_disabled);
|
||||||
wallet.set_subaddress_lookahead(1, 1);
|
wallet.set_subaddress_lookahead(1, 1);
|
||||||
wallet.generate("", "", spendkey, true, false);
|
wallet.generate("", "", spendkey, true, false);
|
||||||
ASSERT_TRUE(test_addresses[idx].address == wallet.get_account().get_public_address_str(cryptonote::TESTNET));
|
ASSERT_TRUE(test_addresses[idx].address == wallet.get_account().get_public_address_str(cryptonote::TESTNET));
|
||||||
|
Loading…
Reference in New Issue
Block a user