mirror of
https://codeberg.org/anoncontributorxmr/monero.git
synced 2024-12-11 00:00:51 +00:00
345 lines
8.9 KiB
C++
345 lines
8.9 KiB
C++
// Copyright (c) 2014-2015, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
#include "cryptonote_core/cryptonote_basic_impl.h"
|
|
#include "daemon/command_parser_executor.h"
|
|
|
|
namespace daemonize {
|
|
|
|
t_command_parser_executor::t_command_parser_executor(
|
|
uint32_t ip
|
|
, uint16_t port
|
|
, bool is_rpc
|
|
, cryptonote::core_rpc_server* rpc_server
|
|
)
|
|
: m_executor(ip, port, is_rpc, rpc_server)
|
|
{}
|
|
|
|
bool t_command_parser_executor::print_peer_list(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.print_peer_list();
|
|
}
|
|
|
|
bool t_command_parser_executor::save_blockchain(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.save_blockchain();
|
|
}
|
|
|
|
bool t_command_parser_executor::show_hash_rate(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.show_hash_rate();
|
|
}
|
|
|
|
bool t_command_parser_executor::hide_hash_rate(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.hide_hash_rate();
|
|
}
|
|
|
|
bool t_command_parser_executor::show_difficulty(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.show_difficulty();
|
|
}
|
|
|
|
bool t_command_parser_executor::print_connections(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.print_connections();
|
|
}
|
|
|
|
bool t_command_parser_executor::print_blockchain_info(const std::vector<std::string>& args)
|
|
{
|
|
if(!args.size())
|
|
{
|
|
std::cout << "need block index parameter" << std::endl;
|
|
return false;
|
|
}
|
|
uint64_t start_index = 0;
|
|
uint64_t end_index = 0;
|
|
if(!epee::string_tools::get_xtype_from_string(start_index, args[0]))
|
|
{
|
|
std::cout << "wrong starter block index parameter" << std::endl;
|
|
return false;
|
|
}
|
|
if(args.size() >1 && !epee::string_tools::get_xtype_from_string(end_index, args[1]))
|
|
{
|
|
std::cout << "wrong end block index parameter" << std::endl;
|
|
return false;
|
|
}
|
|
|
|
return m_executor.print_blockchain_info(start_index, end_index);
|
|
}
|
|
|
|
bool t_command_parser_executor::set_log_level(const std::vector<std::string>& args)
|
|
{
|
|
if(args.size() != 1)
|
|
{
|
|
std::cout << "use: set_log <log_level_number_0-4>" << std::endl;
|
|
return true;
|
|
}
|
|
|
|
uint16_t l = 0;
|
|
if(!epee::string_tools::get_xtype_from_string(l, args[0]))
|
|
{
|
|
std::cout << "wrong number format, use: set_log <log_level_number_0-4>" << std::endl;
|
|
return true;
|
|
}
|
|
|
|
if(LOG_LEVEL_4 < l)
|
|
{
|
|
std::cout << "wrong number range, use: set_log <log_level_number_0-4>" << std::endl;
|
|
return true;
|
|
}
|
|
|
|
return m_executor.set_log_level(l);
|
|
}
|
|
|
|
bool t_command_parser_executor::print_height(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.print_height();
|
|
}
|
|
|
|
bool t_command_parser_executor::print_block(const std::vector<std::string>& args)
|
|
{
|
|
if (args.empty())
|
|
{
|
|
std::cout << "expected: print_block (<block_hash> | <block_height>)" << std::endl;
|
|
return false;
|
|
}
|
|
|
|
const std::string& arg = args.front();
|
|
try
|
|
{
|
|
uint64_t height = boost::lexical_cast<uint64_t>(arg);
|
|
return m_executor.print_block_by_height(height);
|
|
}
|
|
catch (boost::bad_lexical_cast&)
|
|
{
|
|
crypto::hash block_hash;
|
|
if (parse_hash256(arg, block_hash))
|
|
{
|
|
return m_executor.print_block_by_hash(block_hash);
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
bool t_command_parser_executor::print_transaction(const std::vector<std::string>& args)
|
|
{
|
|
if (args.empty())
|
|
{
|
|
std::cout << "expected: print_tx <transaction hash>" << std::endl;
|
|
return true;
|
|
}
|
|
|
|
const std::string& str_hash = args.front();
|
|
crypto::hash tx_hash;
|
|
if (parse_hash256(str_hash, tx_hash))
|
|
{
|
|
m_executor.print_transaction(tx_hash);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool t_command_parser_executor::print_transaction_pool_long(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.print_transaction_pool_long();
|
|
}
|
|
|
|
bool t_command_parser_executor::print_transaction_pool_short(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.print_transaction_pool_short();
|
|
}
|
|
|
|
bool t_command_parser_executor::start_mining(const std::vector<std::string>& args)
|
|
{
|
|
if(!args.size())
|
|
{
|
|
std::cout << "Please specify a wallet address to mine for: start_mining <addr> [threads=1]" << std::endl;
|
|
return true;
|
|
}
|
|
|
|
cryptonote::account_public_address adr;
|
|
if(!cryptonote::get_account_address_from_str(adr, false, args.front()))
|
|
{
|
|
if(!cryptonote::get_account_address_from_str(adr, true, args.front()))
|
|
{
|
|
std::cout << "target account address has wrong format" << std::endl;
|
|
return true;
|
|
}
|
|
std::cout << "Mining to a testnet address, make sure this is intentional!" << std::endl;
|
|
}
|
|
uint64_t threads_count = 1;
|
|
if(args.size() > 2)
|
|
{
|
|
return false;
|
|
}
|
|
else if(args.size() == 2)
|
|
{
|
|
bool ok = epee::string_tools::get_xtype_from_string(threads_count, args[1]);
|
|
threads_count = (ok && 0 < threads_count) ? threads_count : 1;
|
|
}
|
|
|
|
m_executor.start_mining(adr, threads_count);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool t_command_parser_executor::stop_mining(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.stop_mining();
|
|
}
|
|
|
|
bool t_command_parser_executor::stop_daemon(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.stop_daemon();
|
|
}
|
|
|
|
bool t_command_parser_executor::print_status(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
|
|
return m_executor.print_status();
|
|
}
|
|
|
|
bool t_command_parser_executor::set_limit(const std::vector<std::string>& args)
|
|
{
|
|
if(args.size()>1) return false;
|
|
if(args.size()==0) {
|
|
return m_executor.get_limit();
|
|
}
|
|
int limit;
|
|
try {
|
|
limit = std::stoi(args[0]);
|
|
}
|
|
catch(std::invalid_argument& ex) {
|
|
return false;
|
|
}
|
|
if (limit==-1) limit=128;
|
|
limit *= 1024;
|
|
|
|
return m_executor.set_limit(limit);
|
|
}
|
|
|
|
bool t_command_parser_executor::set_limit_up(const std::vector<std::string>& args)
|
|
{
|
|
if(args.size()>1) return false;
|
|
if(args.size()==0) {
|
|
return m_executor.get_limit_up();
|
|
}
|
|
int limit;
|
|
try {
|
|
limit = std::stoi(args[0]);
|
|
}
|
|
catch(std::invalid_argument& ex) {
|
|
return false;
|
|
}
|
|
if (limit==-1) limit=128;
|
|
limit *= 1024;
|
|
|
|
return m_executor.set_limit_up(limit);
|
|
}
|
|
|
|
bool t_command_parser_executor::set_limit_down(const std::vector<std::string>& args)
|
|
{
|
|
if(args.size()>1) return false;
|
|
if(args.size()==0) {
|
|
return m_executor.get_limit_down();
|
|
}
|
|
int limit;
|
|
try {
|
|
limit = std::stoi(args[0]);
|
|
}
|
|
catch(std::invalid_argument& ex) {
|
|
return false;
|
|
}
|
|
if (limit==-1) limit=128;
|
|
limit *= 1024;
|
|
|
|
return m_executor.set_limit_down(limit);
|
|
}
|
|
|
|
bool t_command_parser_executor::fast_exit(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
return m_executor.fast_exit();
|
|
}
|
|
|
|
bool t_command_parser_executor::out_peers(const std::vector<std::string>& args)
|
|
{
|
|
if (args.empty()) return false;
|
|
|
|
unsigned int limit;
|
|
try {
|
|
limit = std::stoi(args[0]);
|
|
}
|
|
|
|
catch(std::invalid_argument& ex) {
|
|
_erro("stoi exception");
|
|
return false;
|
|
}
|
|
|
|
return m_executor.out_peers(limit);
|
|
}
|
|
|
|
bool t_command_parser_executor::start_save_graph(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
return m_executor.start_save_graph();
|
|
}
|
|
|
|
bool t_command_parser_executor::stop_save_graph(const std::vector<std::string>& args)
|
|
{
|
|
if (!args.empty()) return false;
|
|
return m_executor.stop_save_graph();
|
|
}
|
|
|
|
|
|
} // namespace daemonize
|