4e01da905a
* changelog * update changelog * crypto: refactor for stargate * fixes * fix keys * changelog
138 lines
3.9 KiB
Go
138 lines
3.9 KiB
Go
package rpc
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/spf13/cobra"
|
|
"github.com/spf13/viper"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
|
"github.com/cosmos/cosmos-sdk/client/input"
|
|
"github.com/cosmos/cosmos-sdk/client/lcd"
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
"github.com/cosmos/cosmos-sdk/crypto/keys"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
authrest "github.com/cosmos/cosmos-sdk/x/auth/client/rest"
|
|
|
|
"github.com/cosmos/ethermint/app"
|
|
"github.com/cosmos/ethermint/crypto/ethsecp256k1"
|
|
"github.com/cosmos/ethermint/crypto/hd"
|
|
"github.com/ethereum/go-ethereum/rpc"
|
|
)
|
|
|
|
const (
|
|
flagUnlockKey = "unlock-key"
|
|
flagWebsocket = "wsport"
|
|
)
|
|
|
|
// EmintServeCmd creates a CLI command to start Cosmos REST server with web3 RPC API and
|
|
// Cosmos rest-server endpoints
|
|
func EmintServeCmd(cdc *codec.Codec) *cobra.Command {
|
|
cmd := lcd.ServeCommand(cdc, registerRoutes)
|
|
cmd.Flags().String(flagUnlockKey, "", "Select a key to unlock on the RPC server")
|
|
cmd.Flags().String(flagWebsocket, "8546", "websocket port to listen to")
|
|
cmd.Flags().StringP(flags.FlagBroadcastMode, "b", flags.BroadcastSync, "Transaction broadcasting mode (sync|async|block)")
|
|
return cmd
|
|
}
|
|
|
|
// registerRoutes creates a new server and registers the `/rpc` endpoint.
|
|
// Rpc calls are enabled based on their associated module (eg. "eth").
|
|
func registerRoutes(rs *lcd.RestServer) {
|
|
s := rpc.NewServer()
|
|
accountName := viper.GetString(flagUnlockKey)
|
|
accountNames := strings.Split(accountName, ",")
|
|
|
|
var privkeys []ethsecp256k1.PrivKey
|
|
if len(accountName) > 0 {
|
|
var err error
|
|
inBuf := bufio.NewReader(os.Stdin)
|
|
|
|
keyringBackend := viper.GetString(flags.FlagKeyringBackend)
|
|
passphrase := ""
|
|
switch keyringBackend {
|
|
case keys.BackendOS:
|
|
break
|
|
case keys.BackendFile:
|
|
passphrase, err = input.GetPassword(
|
|
"Enter password to unlock key for RPC API: ",
|
|
inBuf)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
privkeys, err = unlockKeyFromNameAndPassphrase(accountNames, passphrase)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
apis := GetRPCAPIs(rs.CliCtx, privkeys)
|
|
|
|
// TODO: Allow cli to configure modules https://github.com/ChainSafe/ethermint/issues/74
|
|
whitelist := make(map[string]bool)
|
|
|
|
// Register all the APIs exposed by the services
|
|
for _, api := range apis {
|
|
if whitelist[api.Namespace] || (len(whitelist) == 0 && api.Public) {
|
|
if err := s.RegisterName(api.Namespace, api.Service); err != nil {
|
|
panic(err)
|
|
}
|
|
} else if !api.Public { // TODO: how to handle private apis? should only accept local calls
|
|
if err := s.RegisterName(api.Namespace, api.Service); err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Web3 RPC API route
|
|
rs.Mux.HandleFunc("/", s.ServeHTTP).Methods("POST", "OPTIONS")
|
|
|
|
// Register all other Cosmos routes
|
|
client.RegisterRoutes(rs.CliCtx, rs.Mux)
|
|
authrest.RegisterTxRoutes(rs.CliCtx, rs.Mux)
|
|
app.ModuleBasics.RegisterRESTRoutes(rs.CliCtx, rs.Mux)
|
|
|
|
// start websockets server
|
|
websocketAddr := viper.GetString(flagWebsocket)
|
|
ws := newWebsocketsServer(rs.CliCtx, websocketAddr)
|
|
ws.start()
|
|
}
|
|
|
|
func unlockKeyFromNameAndPassphrase(accountNames []string, passphrase string) ([]ethsecp256k1.PrivKey, error) {
|
|
keybase, err := keys.NewKeyring(
|
|
sdk.KeyringServiceName(),
|
|
viper.GetString(flags.FlagKeyringBackend),
|
|
viper.GetString(flags.FlagHome),
|
|
os.Stdin,
|
|
hd.EthSecp256k1Options()...,
|
|
)
|
|
if err != nil {
|
|
return []ethsecp256k1.PrivKey{}, err
|
|
}
|
|
|
|
// try the for loop with array []string accountNames
|
|
// run through the bottom code inside the for loop
|
|
|
|
keys := make([]ethsecp256k1.PrivKey, len(accountNames))
|
|
for i, acc := range accountNames {
|
|
// With keyring keybase, password is not required as it is pulled from the OS prompt
|
|
privKey, err := keybase.ExportPrivateKeyObject(acc, passphrase)
|
|
if err != nil {
|
|
return []ethsecp256k1.PrivKey{}, err
|
|
}
|
|
|
|
var ok bool
|
|
keys[i], ok = privKey.(ethsecp256k1.PrivKey)
|
|
if !ok {
|
|
panic(fmt.Sprintf("invalid private key type %T at index %d", privKey, i))
|
|
}
|
|
}
|
|
|
|
return keys, nil
|
|
}
|