| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463 |
- // Copyright 2016 The go-ethereum Authors
- // This file is part of the go-ethereum library.
- //
- // The go-ethereum library is free software: you can redistribute it and/or modify
- // it under the terms of the GNU Lesser General Public License as published by
- // the Free Software Foundation, either version 3 of the License, or
- // (at your option) any later version.
- //
- // The go-ethereum library is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU Lesser General Public License for more details.
- //
- // You should have received a copy of the GNU Lesser General Public License
- // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
- package whisperv5
- import (
- "encoding/json"
- "errors"
- "fmt"
- mathrand "math/rand"
- "github.com/ethereum/go-ethereum/common"
- "github.com/ethereum/go-ethereum/common/hexutil"
- "github.com/ethereum/go-ethereum/crypto"
- "github.com/ethereum/go-ethereum/logger"
- "github.com/ethereum/go-ethereum/logger/glog"
- )
- var whisperOffLineErr = errors.New("whisper is offline")
- // PublicWhisperAPI provides the whisper RPC service.
- type PublicWhisperAPI struct {
- whisper *Whisper
- }
- // NewPublicWhisperAPI create a new RPC whisper service.
- func NewPublicWhisperAPI(w *Whisper) *PublicWhisperAPI {
- return &PublicWhisperAPI{whisper: w}
- }
- // Start starts the Whisper worker threads.
- func (api *PublicWhisperAPI) Start() error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- return api.whisper.Start(nil)
- }
- // Stop stops the Whisper worker threads.
- func (api *PublicWhisperAPI) Stop() error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- return api.whisper.Stop()
- }
- // Version returns the Whisper version this node offers.
- func (api *PublicWhisperAPI) Version() (hexutil.Uint, error) {
- if api.whisper == nil {
- return 0, whisperOffLineErr
- }
- return hexutil.Uint(api.whisper.Version()), nil
- }
- // MarkPeerTrusted marks specific peer trusted, which will allow it
- // to send historic (expired) messages.
- func (api *PublicWhisperAPI) MarkPeerTrusted(peerID hexutil.Bytes) error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- return api.whisper.MarkPeerTrusted(peerID)
- }
- // RequestHistoricMessages requests the peer to deliver the old (expired) messages.
- // data contains parameters (time frame, payment details, etc.), required
- // by the remote email-like server. Whisper is not aware about the data format,
- // it will just forward the raw data to the server.
- //func (api *PublicWhisperAPI) RequestHistoricMessages(peerID hexutil.Bytes, data hexutil.Bytes) error {
- // if api.whisper == nil {
- // return whisperOffLineErr
- // }
- // return api.whisper.RequestHistoricMessages(peerID, data)
- //}
- // HasIdentity checks if the whisper node is configured with the private key
- // of the specified public pair.
- func (api *PublicWhisperAPI) HasIdentity(identity string) (bool, error) {
- if api.whisper == nil {
- return false, whisperOffLineErr
- }
- return api.whisper.HasIdentity(identity), nil
- }
- // DeleteIdentity deletes the specifies key if it exists.
- func (api *PublicWhisperAPI) DeleteIdentity(identity string) error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- api.whisper.DeleteIdentity(identity)
- return nil
- }
- // NewIdentity generates a new cryptographic identity for the client, and injects
- // it into the known identities for message decryption.
- func (api *PublicWhisperAPI) NewIdentity() (string, error) {
- if api.whisper == nil {
- return "", whisperOffLineErr
- }
- identity := api.whisper.NewIdentity()
- return common.ToHex(crypto.FromECDSAPub(&identity.PublicKey)), nil
- }
- // GenerateSymKey generates a random symmetric key and stores it under
- // the 'name' id. Will be used in the future for session key exchange.
- func (api *PublicWhisperAPI) GenerateSymKey(name string) error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- return api.whisper.GenerateSymKey(name)
- }
- // AddSymKey stores the key under the 'name' id.
- func (api *PublicWhisperAPI) AddSymKey(name string, key []byte) error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- return api.whisper.AddSymKey(name, key)
- }
- // HasSymKey returns true if there is a key associated with the name string.
- // Otherwise returns false.
- func (api *PublicWhisperAPI) HasSymKey(name string) (bool, error) {
- if api.whisper == nil {
- return false, whisperOffLineErr
- }
- res := api.whisper.HasSymKey(name)
- return res, nil
- }
- // DeleteSymKey deletes the key associated with the name string if it exists.
- func (api *PublicWhisperAPI) DeleteSymKey(name string) error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- api.whisper.DeleteSymKey(name)
- return nil
- }
- // NewWhisperFilter creates and registers a new message filter to watch for inbound whisper messages.
- // Returns the ID of the newly created Filter.
- func (api *PublicWhisperAPI) NewFilter(args WhisperFilterArgs) (uint32, error) {
- if api.whisper == nil {
- return 0, whisperOffLineErr
- }
- filter := Filter{
- Src: crypto.ToECDSAPub(common.FromHex(args.From)),
- KeySym: api.whisper.GetSymKey(args.KeyName),
- PoW: args.PoW,
- Messages: make(map[common.Hash]*ReceivedMessage),
- AcceptP2P: args.AcceptP2P,
- }
- if len(filter.KeySym) > 0 {
- filter.SymKeyHash = crypto.Keccak256Hash(filter.KeySym)
- }
- filter.Topics = append(filter.Topics, args.Topics...)
- if len(args.Topics) == 0 {
- info := "NewFilter: at least one topic must be specified"
- glog.V(logger.Error).Infof(info)
- return 0, errors.New(info)
- }
- if len(args.KeyName) != 0 && len(filter.KeySym) == 0 {
- info := "NewFilter: key was not found by name: " + args.KeyName
- glog.V(logger.Error).Infof(info)
- return 0, errors.New(info)
- }
- if len(args.To) == 0 && len(filter.KeySym) == 0 {
- info := "NewFilter: filter must contain either symmetric or asymmetric key"
- glog.V(logger.Error).Infof(info)
- return 0, errors.New(info)
- }
- if len(args.To) != 0 && len(filter.KeySym) != 0 {
- info := "NewFilter: filter must not contain both symmetric and asymmetric key"
- glog.V(logger.Error).Infof(info)
- return 0, errors.New(info)
- }
- if len(args.To) > 0 {
- dst := crypto.ToECDSAPub(common.FromHex(args.To))
- if !ValidatePublicKey(dst) {
- info := "NewFilter: Invalid 'To' address"
- glog.V(logger.Error).Infof(info)
- return 0, errors.New(info)
- }
- filter.KeyAsym = api.whisper.GetIdentity(string(args.To))
- if filter.KeyAsym == nil {
- info := "NewFilter: non-existent identity provided"
- glog.V(logger.Error).Infof(info)
- return 0, errors.New(info)
- }
- }
- if len(args.From) > 0 {
- if !ValidatePublicKey(filter.Src) {
- info := "NewFilter: Invalid 'From' address"
- glog.V(logger.Error).Infof(info)
- return 0, errors.New(info)
- }
- }
- id := api.whisper.Watch(&filter)
- return id, nil
- }
- // UninstallFilter disables and removes an existing filter.
- func (api *PublicWhisperAPI) UninstallFilter(filterId uint32) {
- api.whisper.Unwatch(filterId)
- }
- // GetFilterChanges retrieves all the new messages matched by a filter since the last retrieval.
- func (api *PublicWhisperAPI) GetFilterChanges(filterId uint32) []WhisperMessage {
- f := api.whisper.GetFilter(filterId)
- if f != nil {
- newMail := f.Retrieve()
- return toWhisperMessages(newMail)
- }
- return toWhisperMessages(nil)
- }
- // GetMessages retrieves all the known messages that match a specific filter.
- func (api *PublicWhisperAPI) GetMessages(filterId uint32) []WhisperMessage {
- all := api.whisper.Messages(filterId)
- return toWhisperMessages(all)
- }
- // toWhisperMessages converts a Whisper message to a RPC whisper message.
- func toWhisperMessages(messages []*ReceivedMessage) []WhisperMessage {
- msgs := make([]WhisperMessage, len(messages))
- for i, msg := range messages {
- msgs[i] = NewWhisperMessage(msg)
- }
- return msgs
- }
- // Post creates a whisper message and injects it into the network for distribution.
- func (api *PublicWhisperAPI) Post(args PostArgs) error {
- if api.whisper == nil {
- return whisperOffLineErr
- }
- params := MessageParams{
- TTL: args.TTL,
- Dst: crypto.ToECDSAPub(common.FromHex(args.To)),
- KeySym: api.whisper.GetSymKey(args.KeyName),
- Topic: args.Topic,
- Payload: args.Payload,
- Padding: args.Padding,
- WorkTime: args.WorkTime,
- PoW: args.PoW,
- }
- if len(args.From) > 0 {
- pub := crypto.ToECDSAPub(common.FromHex(args.From))
- if !ValidatePublicKey(pub) {
- info := "Post: Invalid 'From' address"
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- params.Src = api.whisper.GetIdentity(string(args.From))
- if params.Src == nil {
- info := "Post: non-existent identity provided"
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- }
- filter := api.whisper.GetFilter(args.FilterID)
- if filter == nil && args.FilterID > 0 {
- info := fmt.Sprintf("Post: wrong filter id %d", args.FilterID)
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- if filter != nil {
- // get the missing fields from the filter
- if params.KeySym == nil && filter.KeySym != nil {
- params.KeySym = filter.KeySym
- }
- if params.Src == nil && filter.Src != nil {
- params.Src = filter.KeyAsym
- }
- if (params.Topic == TopicType{}) {
- sz := len(filter.Topics)
- if sz < 1 {
- info := fmt.Sprintf("Post: no topics in filter # %d", args.FilterID)
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- } else if sz == 1 {
- params.Topic = filter.Topics[0]
- } else {
- // choose randomly
- rnd := mathrand.Intn(sz)
- params.Topic = filter.Topics[rnd]
- }
- }
- }
- // validate
- if len(args.KeyName) != 0 && len(params.KeySym) == 0 {
- info := "Post: key was not found by name: " + args.KeyName
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- if len(args.To) == 0 && len(params.KeySym) == 0 {
- info := "Post: message must be encrypted either symmetrically or asymmetrically"
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- if len(args.To) != 0 && len(params.KeySym) != 0 {
- info := "Post: ambigous encryption method requested"
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- if len(args.To) > 0 {
- if !ValidatePublicKey(params.Dst) {
- info := "Post: Invalid 'To' address"
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- }
- // encrypt and send
- message := NewSentMessage(¶ms)
- envelope, err := message.Wrap(¶ms)
- if err != nil {
- glog.V(logger.Error).Infof(err.Error())
- return err
- }
- if len(envelope.Data) > MaxMessageLength {
- info := "Post: message is too big"
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- if (envelope.Topic == TopicType{} && envelope.IsSymmetric()) {
- info := "Post: topic is missing for symmetric encryption"
- glog.V(logger.Error).Infof(info)
- return errors.New(info)
- }
- if args.PeerID != nil {
- return api.whisper.SendP2PMessage(args.PeerID, envelope)
- }
- return api.whisper.Send(envelope)
- }
- type PostArgs struct {
- TTL uint32 `json:"ttl"`
- From string `json:"from"`
- To string `json:"to"`
- KeyName string `json:"keyname"`
- Topic TopicType `json:"topic"`
- Padding hexutil.Bytes `json:"padding"`
- Payload hexutil.Bytes `json:"payload"`
- WorkTime uint32 `json:"worktime"`
- PoW float64 `json:"pow"`
- FilterID uint32 `json:"filterID"`
- PeerID hexutil.Bytes `json:"peerID"`
- }
- type WhisperFilterArgs struct {
- To string
- From string
- KeyName string
- PoW float64
- Topics []TopicType
- AcceptP2P bool
- }
- // UnmarshalJSON implements the json.Unmarshaler interface, invoked to convert a
- // JSON message blob into a WhisperFilterArgs structure.
- func (args *WhisperFilterArgs) UnmarshalJSON(b []byte) (err error) {
- // Unmarshal the JSON message and sanity check
- var obj struct {
- To string `json:"to"`
- From string `json:"from"`
- KeyName string `json:"keyname"`
- PoW float64 `json:"pow"`
- Topics []interface{} `json:"topics"`
- AcceptP2P bool `json:"acceptP2P"`
- }
- if err := json.Unmarshal(b, &obj); err != nil {
- return err
- }
- args.To = obj.To
- args.From = obj.From
- args.KeyName = obj.KeyName
- args.PoW = obj.PoW
- args.AcceptP2P = obj.AcceptP2P
- // Construct the topic array
- if obj.Topics != nil {
- topics := make([]string, len(obj.Topics))
- for i, field := range obj.Topics {
- switch value := field.(type) {
- case string:
- topics[i] = value
- case nil:
- return fmt.Errorf("topic[%d] is empty", i)
- default:
- return fmt.Errorf("topic[%d] is not a string", i)
- }
- }
- topicsDecoded := make([]TopicType, len(topics))
- for j, s := range topics {
- x := common.FromHex(s)
- if x == nil || len(x) != TopicLength {
- return fmt.Errorf("topic[%d] is invalid", j)
- }
- topicsDecoded[j] = BytesToTopic(x)
- }
- args.Topics = topicsDecoded
- }
- return nil
- }
- // WhisperMessage is the RPC representation of a whisper message.
- type WhisperMessage struct {
- Payload string `json:"payload"`
- Padding string `json:"padding"`
- From string `json:"from"`
- To string `json:"to"`
- Sent uint32 `json:"sent"`
- TTL uint32 `json:"ttl"`
- PoW float64 `json:"pow"`
- Hash string `json:"hash"`
- }
- // NewWhisperMessage converts an internal message into an API version.
- func NewWhisperMessage(message *ReceivedMessage) WhisperMessage {
- return WhisperMessage{
- Payload: common.ToHex(message.Payload),
- Padding: common.ToHex(message.Padding),
- From: common.ToHex(crypto.FromECDSAPub(message.SigToPubKey())),
- To: common.ToHex(crypto.FromECDSAPub(message.Dst)),
- Sent: message.Sent,
- TTL: message.TTL,
- PoW: message.PoW,
- Hash: common.ToHex(message.EnvelopeHash.Bytes()),
- }
- }
|