* all: implement simple checkpoint syncing cmd, les, node: remove callback mechanism cmd, node: remove callback definition les: simplify the registrar les: expose checkpoint rpc services in the light client les, light: don't store untrusted receipt cmd, contracts, les: discard stale checkpoint cmd, contracts/registrar: loose restriction of registeration cmd, contracts: add replay-protection all: off-chain multi-signature contract params: deploy checkpoint contract for rinkeby cmd/registrar: add raw signing mode for registrar cmd/registrar, contracts/registrar, les: fixed messages * cmd/registrar, contracts/registrar: fix lints * accounts/abi/bind, les: address comments * cmd, contracts, les, light, params: minor checkpoint sync cleanups * cmd, eth, les, light: move checkpoint config to config file * cmd, eth, les, params: address comments * eth, les, params: address comments * cmd: polish up the checkpoint admin CLI * cmd, contracts, params: deploy new version contract * cmd/checkpoint-admin: add another flag for clef mode signing * cmd, contracts, les: rename and regen checkpoint oracle with abigen
		
			
				
	
	
		
			167 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			167 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2018 The go-ethereum Authors
 | 
						|
// This file is part of go-ethereum.
 | 
						|
//
 | 
						|
// go-ethereum is free software: you can redistribute it and/or modify
 | 
						|
// it under the terms of the GNU General Public License as published by
 | 
						|
// the Free Software Foundation, either version 3 of the License, or
 | 
						|
// (at your option) any later version.
 | 
						|
//
 | 
						|
// go-ethereum is distributed in the hope that it will be useful,
 | 
						|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | 
						|
// GNU General Public License for more details.
 | 
						|
//
 | 
						|
// You should have received a copy of the GNU General Public License
 | 
						|
// along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
package main
 | 
						|
 | 
						|
import (
 | 
						|
	"io/ioutil"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/ethereum/go-ethereum/accounts/keystore"
 | 
						|
	"github.com/ethereum/go-ethereum/cmd/utils"
 | 
						|
	"github.com/ethereum/go-ethereum/common"
 | 
						|
	"github.com/ethereum/go-ethereum/console"
 | 
						|
	"github.com/ethereum/go-ethereum/contracts/checkpointoracle"
 | 
						|
	"github.com/ethereum/go-ethereum/ethclient"
 | 
						|
	"github.com/ethereum/go-ethereum/params"
 | 
						|
	"github.com/ethereum/go-ethereum/rpc"
 | 
						|
	"gopkg.in/urfave/cli.v1"
 | 
						|
)
 | 
						|
 | 
						|
// newClient creates a client with specified remote URL.
 | 
						|
func newClient(ctx *cli.Context) *ethclient.Client {
 | 
						|
	client, err := ethclient.Dial(ctx.GlobalString(nodeURLFlag.Name))
 | 
						|
	if err != nil {
 | 
						|
		utils.Fatalf("Failed to connect to Ethereum node: %v", err)
 | 
						|
	}
 | 
						|
	return client
 | 
						|
}
 | 
						|
 | 
						|
// newRPCClient creates a rpc client with specified node URL.
 | 
						|
func newRPCClient(url string) *rpc.Client {
 | 
						|
	client, err := rpc.Dial(url)
 | 
						|
	if err != nil {
 | 
						|
		utils.Fatalf("Failed to connect to Ethereum node: %v", err)
 | 
						|
	}
 | 
						|
	return client
 | 
						|
}
 | 
						|
 | 
						|
// getContractAddr retrieves the register contract address through
 | 
						|
// rpc request.
 | 
						|
func getContractAddr(client *rpc.Client) common.Address {
 | 
						|
	var addr string
 | 
						|
	if err := client.Call(&addr, "les_getCheckpointContractAddress"); err != nil {
 | 
						|
		utils.Fatalf("Failed to fetch checkpoint oracle address: %v", err)
 | 
						|
	}
 | 
						|
	return common.HexToAddress(addr)
 | 
						|
}
 | 
						|
 | 
						|
// getCheckpoint retrieves the specified checkpoint or the latest one
 | 
						|
// through rpc request.
 | 
						|
func getCheckpoint(ctx *cli.Context, client *rpc.Client) *params.TrustedCheckpoint {
 | 
						|
	var checkpoint *params.TrustedCheckpoint
 | 
						|
 | 
						|
	if ctx.GlobalIsSet(indexFlag.Name) {
 | 
						|
		var result [3]string
 | 
						|
		index := uint64(ctx.GlobalInt64(indexFlag.Name))
 | 
						|
		if err := client.Call(&result, "les_getCheckpoint", index); err != nil {
 | 
						|
			utils.Fatalf("Failed to get local checkpoint %v, please ensure the les API is exposed", err)
 | 
						|
		}
 | 
						|
		checkpoint = ¶ms.TrustedCheckpoint{
 | 
						|
			SectionIndex: index,
 | 
						|
			SectionHead:  common.HexToHash(result[0]),
 | 
						|
			CHTRoot:      common.HexToHash(result[1]),
 | 
						|
			BloomRoot:    common.HexToHash(result[2]),
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		var result [4]string
 | 
						|
		err := client.Call(&result, "les_latestCheckpoint")
 | 
						|
		if err != nil {
 | 
						|
			utils.Fatalf("Failed to get local checkpoint %v, please ensure the les API is exposed", err)
 | 
						|
		}
 | 
						|
		index, err := strconv.ParseUint(result[0], 0, 64)
 | 
						|
		if err != nil {
 | 
						|
			utils.Fatalf("Failed to parse checkpoint index %v", err)
 | 
						|
		}
 | 
						|
		checkpoint = ¶ms.TrustedCheckpoint{
 | 
						|
			SectionIndex: index,
 | 
						|
			SectionHead:  common.HexToHash(result[1]),
 | 
						|
			CHTRoot:      common.HexToHash(result[2]),
 | 
						|
			BloomRoot:    common.HexToHash(result[3]),
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return checkpoint
 | 
						|
}
 | 
						|
 | 
						|
// newContract creates a registrar contract instance with specified
 | 
						|
// contract address or the default contracts for mainnet or testnet.
 | 
						|
func newContract(client *rpc.Client) (common.Address, *checkpointoracle.CheckpointOracle) {
 | 
						|
	addr := getContractAddr(client)
 | 
						|
	if addr == (common.Address{}) {
 | 
						|
		utils.Fatalf("No specified registrar contract address")
 | 
						|
	}
 | 
						|
	contract, err := checkpointoracle.NewCheckpointOracle(addr, ethclient.NewClient(client))
 | 
						|
	if err != nil {
 | 
						|
		utils.Fatalf("Failed to setup registrar contract %s: %v", addr, err)
 | 
						|
	}
 | 
						|
	return addr, contract
 | 
						|
}
 | 
						|
 | 
						|
// promptPassphrase prompts the user for a passphrase.
 | 
						|
// Set confirmation to true to require the user to confirm the passphrase.
 | 
						|
func promptPassphrase(confirmation bool) string {
 | 
						|
	passphrase, err := console.Stdin.PromptPassword("Passphrase: ")
 | 
						|
	if err != nil {
 | 
						|
		utils.Fatalf("Failed to read passphrase: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if confirmation {
 | 
						|
		confirm, err := console.Stdin.PromptPassword("Repeat passphrase: ")
 | 
						|
		if err != nil {
 | 
						|
			utils.Fatalf("Failed to read passphrase confirmation: %v", err)
 | 
						|
		}
 | 
						|
		if passphrase != confirm {
 | 
						|
			utils.Fatalf("Passphrases do not match")
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return passphrase
 | 
						|
}
 | 
						|
 | 
						|
// getPassphrase obtains a passphrase given by the user. It first checks the
 | 
						|
// --password command line flag and ultimately prompts the user for a
 | 
						|
// passphrase.
 | 
						|
func getPassphrase(ctx *cli.Context) string {
 | 
						|
	passphraseFile := ctx.String(utils.PasswordFileFlag.Name)
 | 
						|
	if passphraseFile != "" {
 | 
						|
		content, err := ioutil.ReadFile(passphraseFile)
 | 
						|
		if err != nil {
 | 
						|
			utils.Fatalf("Failed to read passphrase file '%s': %v",
 | 
						|
				passphraseFile, err)
 | 
						|
		}
 | 
						|
		return strings.TrimRight(string(content), "\r\n")
 | 
						|
	}
 | 
						|
	// Otherwise prompt the user for the passphrase.
 | 
						|
	return promptPassphrase(false)
 | 
						|
}
 | 
						|
 | 
						|
// getKey retrieves the user key through specified key file.
 | 
						|
func getKey(ctx *cli.Context) *keystore.Key {
 | 
						|
	// Read key from file.
 | 
						|
	keyFile := ctx.GlobalString(keyFileFlag.Name)
 | 
						|
	keyJson, err := ioutil.ReadFile(keyFile)
 | 
						|
	if err != nil {
 | 
						|
		utils.Fatalf("Failed to read the keyfile at '%s': %v", keyFile, err)
 | 
						|
	}
 | 
						|
	// Decrypt key with passphrase.
 | 
						|
	passphrase := getPassphrase(ctx)
 | 
						|
	key, err := keystore.DecryptKey(keyJson, passphrase)
 | 
						|
	if err != nil {
 | 
						|
		utils.Fatalf("Failed to decrypt user key '%s': %v", keyFile, err)
 | 
						|
	}
 | 
						|
	return key
 | 
						|
}
 |