/* Package options contains a set of common CLI options and helper functions to use them. */ package options import ( "context" "errors" "fmt" "net/url" "os" "runtime" "strconv" "strings" "time" "github.com/nspcc-dev/neo-go/cli/cmdargs" "github.com/nspcc-dev/neo-go/cli/flags" "github.com/nspcc-dev/neo-go/cli/input" "github.com/nspcc-dev/neo-go/pkg/config" "github.com/nspcc-dev/neo-go/pkg/config/netmode" "github.com/nspcc-dev/neo-go/pkg/core/transaction" "github.com/nspcc-dev/neo-go/pkg/encoding/address" "github.com/nspcc-dev/neo-go/pkg/io" "github.com/nspcc-dev/neo-go/pkg/rpcclient" "github.com/nspcc-dev/neo-go/pkg/rpcclient/actor" "github.com/nspcc-dev/neo-go/pkg/rpcclient/invoker" "github.com/nspcc-dev/neo-go/pkg/util" "github.com/nspcc-dev/neo-go/pkg/wallet" "github.com/urfave/cli/v2" "go.uber.org/zap" "go.uber.org/zap/zapcore" "golang.org/x/term" "gopkg.in/yaml.v3" ) const ( // DefaultTimeout is the default timeout used for RPC requests. DefaultTimeout = 10 * time.Second // DefaultAwaitableTimeout is the default timeout used for RPC requests that // require transaction awaiting. It is set to the approximate time of three // Neo N3 mainnet blocks accepting. DefaultAwaitableTimeout = 3 * 15 * time.Second ) // RPCEndpointFlag is a long flag name for an RPC endpoint. It can be used to // check for flag presence in the context. const RPCEndpointFlag = "rpc-endpoint" // Wallet is a set of flags used for wallet operations. var Wallet = []cli.Flag{ &cli.StringFlag{ Name: "wallet", Aliases: []string{"w"}, Usage: "Wallet to use to get the key for transaction signing; conflicts with --wallet-config flag", }, &cli.StringFlag{ Name: "wallet-config", Usage: "Path to wallet config to use to get the key for transaction signing; conflicts with --wallet flag", }, } // Network is a set of flags for choosing the network to operate on // (privnet/mainnet/testnet). var Network = []cli.Flag{ &cli.BoolFlag{ Name: "privnet", Aliases: []string{"p"}, Usage: "Use private network configuration (if --config-file option is not specified)", }, &cli.BoolFlag{ Name: "mainnet", Aliases: []string{"m"}, Usage: "Use mainnet network configuration (if --config-file option is not specified)", }, &cli.BoolFlag{ Name: "testnet", Aliases: []string{"t"}, Usage: "Use testnet network configuration (if --config-file option is not specified)", }, &cli.BoolFlag{ Name: "unittest", Hidden: true, }, } // RPC is a set of flags used for RPC connections (endpoint and timeout). var RPC = []cli.Flag{ &cli.StringFlag{ Name: RPCEndpointFlag, Aliases: []string{"r"}, Usage: "RPC node address", Required: true, Action: cmdargs.EnsureNotEmpty("rpc-endpoint"), }, &cli.DurationFlag{ Name: "timeout", Aliases: []string{"s"}, Value: DefaultTimeout, Usage: "Timeout for the operation", }, } // Historic is a flag for commands that can perform historic invocations. var Historic = &cli.StringFlag{ Name: "historic", Usage: "Use historic state (height, block hash or state root hash)", } // Config is a flag for commands that use node configuration. var Config = &cli.StringFlag{ Name: "config-path", Usage: "Path to directory with per-network configuration files (may be overridden by --config-file option for the configuration file)", } // ConfigFile is a flag for commands that use node configuration and provide // path to the specific config file instead of config path. var ConfigFile = &cli.StringFlag{ Name: "config-file", Usage: "Path to the node configuration file (overrides --config-path option)", } // RelativePath is a flag for commands that use node configuration and provide // a prefix to all relative paths in config files. var RelativePath = &cli.StringFlag{ Name: "relative-path", Usage: "Prefix to all relative paths in the node configuration file", } // Debug is a flag for commands that allow node in debug mode usage. var Debug = &cli.BoolFlag{ Name: "debug", Aliases: []string{"d"}, Usage: "Enable debug logging (LOTS of output, overrides configuration)", } var errInvalidHistoric = errors.New("invalid 'historic' parameter, neither a block number, nor a block/state hash") var errNoWallet = errors.New("no wallet parameter found, specify it with the '--wallet' or '-w' flag or specify wallet config file with the '--wallet-config' flag") var errConflictingWalletFlags = errors.New("--wallet flag conflicts with --wallet-config flag, please, provide one of them to specify wallet location") // GetNetwork examines Context's flags and returns the appropriate network. It // defaults to PrivNet if no flags are given. func GetNetwork(ctx *cli.Context) netmode.Magic { var net = netmode.PrivNet if ctx.Bool("testnet") { net = netmode.TestNet } if ctx.Bool("mainnet") { net = netmode.MainNet } if ctx.Bool("unittest") { net = netmode.UnitTestNet } return net } // GetTimeoutContext returns a context.Context with the default or a user-set timeout. func GetTimeoutContext(ctx *cli.Context) (context.Context, func()) { dur := ctx.Duration("timeout") if dur == 0 { dur = DefaultTimeout } if !ctx.IsSet("timeout") && ctx.Bool("await") { dur = DefaultAwaitableTimeout } return context.WithTimeout(context.Background(), dur) } // GetRPCClient returns an RPC client instance for the given Context. func GetRPCClient(gctx context.Context, ctx *cli.Context) (*rpcclient.Client, cli.ExitCoder) { endpoint := ctx.String(RPCEndpointFlag) c, err := rpcclient.New(gctx, endpoint, rpcclient.Options{}) if err != nil { return nil, cli.Exit(err, 1) } err = c.Init() if err != nil { return nil, cli.Exit(err, 1) } return c, nil } // GetInvoker returns an invoker using the given RPC client, context and signers. // It parses "--historic" parameter to adjust it. func GetInvoker(c *rpcclient.Client, ctx *cli.Context, signers []transaction.Signer) (*invoker.Invoker, cli.ExitCoder) { historic := ctx.String("historic") if historic == "" { return invoker.New(c, signers), nil } if index, err := strconv.ParseUint(historic, 10, 32); err == nil { return invoker.NewHistoricAtHeight(uint32(index), c, signers), nil } if u256, err := util.Uint256DecodeStringLE(historic); err == nil { // Might as well be a block hash, but it makes no practical difference. return invoker.NewHistoricWithState(u256, c, signers), nil } return nil, cli.Exit(errInvalidHistoric, 1) } // GetRPCWithInvoker combines GetRPCClient with GetInvoker for cases where it's // appropriate to do so. func GetRPCWithInvoker(gctx context.Context, ctx *cli.Context, signers []transaction.Signer) (*rpcclient.Client, *invoker.Invoker, cli.ExitCoder) { c, err := GetRPCClient(gctx, ctx) if err != nil { return nil, nil, err } inv, err := GetInvoker(c, ctx, signers) if err != nil { c.Close() return nil, nil, err } return c, inv, err } // GetConfigFromContext looks at the path and the mode flags in the given config and // returns an appropriate config. func GetConfigFromContext(ctx *cli.Context) (config.Config, error) { var ( configFile = ctx.String("config-file") relativePath = ctx.String("relative-path") ) if len(configFile) != 0 { return config.LoadFile(configFile, relativePath) } var configPath = config.DefaultConfigPath if argCp := ctx.String("config-path"); argCp != "" { configPath = argCp } return config.Load(configPath, GetNetwork(ctx), relativePath) } var ( // _winfileSinkRegistered denotes whether zap has registered // user-supplied factory for all sinks with `winfile`-prefixed scheme. _winfileSinkRegistered bool _winfileSinkCloser func() error ) // HandleLoggingParams reads logging parameters. // If a user selected debug level -- function enables it. // If logPath is configured -- function creates a dir and a file for logging. // If logPath is configured on Windows -- function returns closer to be // able to close sink for the opened log output file. // If the program is run in TTY then logger adds timestamp to its entries. func HandleLoggingParams(debug bool, cfg config.ApplicationConfiguration) (*zap.Logger, *zap.AtomicLevel, func() error, error) { var ( level = zapcore.InfoLevel err error ) if len(cfg.LogLevel) > 0 { level, err = zapcore.ParseLevel(cfg.LogLevel) if err != nil { return nil, nil, nil, fmt.Errorf("log setting: %w", err) } } if debug { level = zapcore.DebugLevel } cc := zap.NewProductionConfig() cc.DisableCaller = true cc.DisableStacktrace = true cc.EncoderConfig.EncodeDuration = zapcore.StringDurationEncoder cc.EncoderConfig.EncodeLevel = zapcore.CapitalLevelEncoder if term.IsTerminal(int(os.Stdout.Fd())) { cc.EncoderConfig.EncodeTime = zapcore.ISO8601TimeEncoder } else { cc.EncoderConfig.EncodeTime = func(t time.Time, encoder zapcore.PrimitiveArrayEncoder) {} } cc.Encoding = "console" cc.Level = zap.NewAtomicLevelAt(level) cc.Sampling = nil if logPath := cfg.LogPath; logPath != "" { if err := io.MakeDirForFile(logPath, "logger"); err != nil { return nil, nil, nil, err } if runtime.GOOS == "windows" { if !_winfileSinkRegistered { // See https://github.com/uber-go/zap/issues/621. err := zap.RegisterSink("winfile", func(u *url.URL) (zap.Sink, error) { if u.User != nil { return nil, fmt.Errorf("user and password not allowed with file URLs: got %v", u) } if u.Fragment != "" { return nil, fmt.Errorf("fragments not allowed with file URLs: got %v", u) } if u.RawQuery != "" { return nil, fmt.Errorf("query parameters not allowed with file URLs: got %v", u) } // Error messages are better if we check hostname and port separately. if u.Port() != "" { return nil, fmt.Errorf("ports not allowed with file URLs: got %v", u) } if hn := u.Hostname(); hn != "" && hn != "localhost" { return nil, fmt.Errorf("file URLs must leave host empty or use localhost: got %v", u) } switch u.Path { case "stdout": return os.Stdout, nil case "stderr": return os.Stderr, nil } f, err := os.OpenFile(u.Path[1:], // Remove leading slash left after url.Parse. os.O_WRONLY|os.O_APPEND|os.O_CREATE, 0644) _winfileSinkCloser = func() error { _winfileSinkCloser = nil return f.Close() } return f, err }) if err != nil { return nil, nil, nil, fmt.Errorf("failed to register windows-specific sinc: %w", err) } _winfileSinkRegistered = true } logPath = "winfile:///" + logPath } cc.OutputPaths = []string{logPath} } log, err := cc.Build() return log, &cc.Level, _winfileSinkCloser, err } // GetRPCWithActor returns an RPC client instance and Actor instance for the given context. func GetRPCWithActor(gctx context.Context, ctx *cli.Context, signers []actor.SignerAccount) (*rpcclient.Client, *actor.Actor, cli.ExitCoder) { c, err := GetRPCClient(gctx, ctx) if err != nil { return nil, nil, err } a, actorErr := actor.New(c, signers) if actorErr != nil { c.Close() return nil, nil, cli.Exit(fmt.Errorf("failed to create Actor: %w", actorErr), 1) } return c, a, nil } // GetAccFromContext returns account and wallet from context. If address is not set, default address is used. func GetAccFromContext(ctx *cli.Context) (*wallet.Account, *wallet.Wallet, error) { var addr util.Uint160 wPath := ctx.String("wallet") walletConfigPath := ctx.String("wallet-config") if len(wPath) != 0 && len(walletConfigPath) != 0 { return nil, nil, errConflictingWalletFlags } if len(wPath) == 0 && len(walletConfigPath) == 0 { return nil, nil, errNoWallet } var pass *string if len(walletConfigPath) != 0 { cfg, err := ReadWalletConfig(walletConfigPath) if err != nil { return nil, nil, err } wPath = cfg.Path pass = &cfg.Password } wall, err := wallet.NewWalletFromFile(wPath) if err != nil { return nil, nil, err } addrFlag := ctx.Generic("address").(*flags.Address) if addrFlag.IsSet { addr = addrFlag.Uint160() } else { addr = wall.GetChangeAddress() if addr.Equals(util.Uint160{}) { return nil, wall, errors.New("can't get default address") } } acc, err := GetUnlockedAccount(wall, addr, pass) return acc, wall, err } // GetUnlockedAccount returns account from wallet, address and uses pass to unlock specified account if given. // If the password is not given, then it is requested from user. func GetUnlockedAccount(wall *wallet.Wallet, addr util.Uint160, pass *string) (*wallet.Account, error) { acc := wall.GetAccount(addr) if acc == nil { return nil, fmt.Errorf("wallet contains no account for '%s'", address.Uint160ToString(addr)) } if acc.CanSign() || acc.EncryptedWIF == "" { return acc, nil } if pass == nil { rawPass, err := input.ReadPassword( fmt.Sprintf("Enter account %s password > ", address.Uint160ToString(addr))) if err != nil { return nil, fmt.Errorf("Error reading password: %w", err) } trimmed := strings.TrimRight(string(rawPass), "\n") pass = &trimmed } err := acc.Decrypt(*pass, wall.Scrypt) if err != nil { return nil, err } return acc, nil } // ReadWalletConfig reads wallet config from the given path. func ReadWalletConfig(configPath string) (*config.Wallet, error) { file, err := os.Open(configPath) if err != nil { return nil, err } defer file.Close() configData, err := os.ReadFile(configPath) if err != nil { return nil, fmt.Errorf("unable to read wallet config: %w", err) } cfg := &config.Wallet{} err = yaml.Unmarshal(configData, &cfg) if err != nil { return nil, fmt.Errorf("failed to unmarshal wallet config YAML: %w", err) } return cfg, nil }