//------------------------------------------------------------------------------ /* This file is part of rippled: https://github.com/ripple/rippled Copyright (c) 2012-2014 Ripple Labs Inc. Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL , DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ //============================================================================== #include #include #include #include #include #include #include #include #include // Validity::Valid #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include namespace ripple { namespace RPC { namespace detail { // Used to pass extra parameters used when returning a // a SigningFor object. class SigningForParams { private: AccountID const* const multiSigningAcctID_; PublicKey* const multiSignPublicKey_; Buffer* const multiSignature_; public: explicit SigningForParams () : multiSigningAcctID_ (nullptr) , multiSignPublicKey_ (nullptr) , multiSignature_ (nullptr) { } SigningForParams (SigningForParams const& rhs) = delete; SigningForParams ( AccountID const& multiSigningAcctID, PublicKey& multiSignPublicKey, Buffer& multiSignature) : multiSigningAcctID_ (&multiSigningAcctID) , multiSignPublicKey_ (&multiSignPublicKey) , multiSignature_ (&multiSignature) { } bool isMultiSigning () const { return ((multiSigningAcctID_ != nullptr) && (multiSignPublicKey_ != nullptr) && (multiSignature_ != nullptr)); } // When multi-signing we should not edit the tx_json fields. bool editFields () const { return !isMultiSigning(); } // Don't call this method unless isMultiSigning() returns true. AccountID const& getSigner () { return *multiSigningAcctID_; } void setPublicKey (PublicKey const& multiSignPublicKey) { *multiSignPublicKey_ = multiSignPublicKey; } void moveMultiSignature (Buffer&& multiSignature) { *multiSignature_ = std::move (multiSignature); } }; //------------------------------------------------------------------------------ static error_code_i acctMatchesPubKey ( std::shared_ptr accountState, AccountID const& accountID, PublicKey const& publicKey) { auto const publicKeyAcctID = calcAccountID(publicKey); bool const isMasterKey = publicKeyAcctID == accountID; // If we can't get the accountRoot, but the accountIDs match, that's // good enough. if (!accountState) { if (isMasterKey) return rpcSUCCESS; return rpcBAD_SECRET; } // If we *can* get to the accountRoot, check for MASTER_DISABLED. auto const& sle = *accountState; if (isMasterKey) { if (sle.isFlag(lsfDisableMaster)) return rpcMASTER_DISABLED; return rpcSUCCESS; } // The last gasp is that we have public Regular key. if ((sle.isFieldPresent (sfRegularKey)) && (publicKeyAcctID == sle.getAccountID (sfRegularKey))) { return rpcSUCCESS; } return rpcBAD_SECRET; } static Json::Value checkPayment( Json::Value const& params, Json::Value& tx_json, AccountID const& srcAddressID, Role const role, Application& app, std::shared_ptr const& ledger, bool doPath) { // Only path find for Payments. if (tx_json[jss::TransactionType].asString () != "Payment") return Json::Value(); if (!tx_json.isMember (jss::Amount)) return RPC::missing_field_error ("tx_json.Amount"); STAmount amount; if (! amountFromJsonNoThrow (amount, tx_json [jss::Amount])) return RPC::invalid_field_error ("tx_json.Amount"); if (!tx_json.isMember (jss::Destination)) return RPC::missing_field_error ("tx_json.Destination"); auto const dstAccountID = parseBase58( tx_json[jss::Destination].asString()); if (! dstAccountID) return RPC::invalid_field_error ("tx_json.Destination"); if ((doPath == false) && params.isMember (jss::build_path)) return RPC::make_error (rpcINVALID_PARAMS, "Field 'build_path' not allowed in this context."); if (tx_json.isMember (jss::Paths) && params.isMember (jss::build_path)) return RPC::make_error (rpcINVALID_PARAMS, "Cannot specify both 'tx_json.Paths' and 'build_path'"); if (!tx_json.isMember (jss::Paths) && params.isMember (jss::build_path)) { STAmount sendMax; if (tx_json.isMember (jss::SendMax)) { if (! amountFromJsonNoThrow (sendMax, tx_json [jss::SendMax])) return RPC::invalid_field_error ("tx_json.SendMax"); } else { // If no SendMax, default to Amount with sender as issuer. sendMax = amount; sendMax.setIssuer (srcAddressID); } if (sendMax.native () && amount.native ()) return RPC::make_error (rpcINVALID_PARAMS, "Cannot build XRP to XRP paths."); { LegacyPathFind lpf (isUnlimited (role), app); if (!lpf.isOk ()) return rpcError (rpcTOO_BUSY); STPathSet result; if (ledger) { Pathfinder pf(std::make_shared(ledger), srcAddressID, *dstAccountID, sendMax.issue().currency, sendMax.issue().account, amount, boost::none, app); if (pf.findPaths(app.config().PATH_SEARCH_OLD)) { // 4 is the maxium paths pf.computePathRanks(4); STPath fullLiquidityPath; STPathSet paths; result = pf.getBestPaths(4, fullLiquidityPath, paths, sendMax.issue().account); } } auto j = app.journal ("RPCHandler"); JLOG (j.debug()) << "transactionSign: build_path: " << result.getJson (0); if (! result.empty ()) tx_json[jss::Paths] = result.getJson (0); } } return Json::Value(); } //------------------------------------------------------------------------------ // Validate (but don't modify) the contents of the tx_json. // // Returns a pair. The Json::Value will contain error // information if there was an error. On success, the account ID is returned // and the Json::Value will be empty. // // This code does not check the "Sequence" field, since the expectations // for that field are particularly context sensitive. static std::pair checkTxJsonFields ( Json::Value const& tx_json, Role const role, bool const verify, std::chrono::seconds validatedLedgerAge, Config const& config, LoadFeeTrack const& feeTrack) { std::pair ret; if (! tx_json.isObject ()) { ret.first = RPC::object_field_error (jss::tx_json); return ret; } if (! tx_json.isMember (jss::TransactionType)) { ret.first = RPC::missing_field_error ("tx_json.TransactionType"); return ret; } if (! tx_json.isMember (jss::Account)) { ret.first = RPC::make_error (rpcSRC_ACT_MISSING, RPC::missing_field_message ("tx_json.Account")); return ret; } auto const srcAddressID = parseBase58( tx_json[jss::Account].asString()); if (! srcAddressID) { ret.first = RPC::make_error (rpcSRC_ACT_MALFORMED, RPC::invalid_field_message ("tx_json.Account")); return ret; } // Check for current ledger. if (verify && !config.standalone() && (validatedLedgerAge > Tuning::maxValidatedLedgerAge)) { ret.first = rpcError (rpcNO_CURRENT); return ret; } // Check for load. if (feeTrack.isLoadedCluster() && !isUnlimited (role)) { ret.first = rpcError (rpcTOO_BUSY); return ret; } // It's all good. Return the AccountID. ret.second = *srcAddressID; return ret; } //------------------------------------------------------------------------------ // A move-only struct that makes it easy to return either a Json::Value or a // std::shared_ptr from transactionPreProcessImpl (). struct transactionPreProcessResult { Json::Value const first; std::shared_ptr const second; transactionPreProcessResult () = delete; transactionPreProcessResult (transactionPreProcessResult const&) = delete; transactionPreProcessResult (transactionPreProcessResult&& rhs) : first (std::move (rhs.first)) // VS2013 won't default this. , second (std::move (rhs.second)) { } transactionPreProcessResult& operator= (transactionPreProcessResult const&) = delete; transactionPreProcessResult& operator= (transactionPreProcessResult&&) = delete; transactionPreProcessResult (Json::Value&& json) : first (std::move (json)) , second () { } transactionPreProcessResult (std::shared_ptr&& st) : first () , second (std::move (st)) { } }; static transactionPreProcessResult transactionPreProcessImpl ( Json::Value& params, Role role, SigningForParams& signingArgs, std::chrono::seconds validatedLedgerAge, Application& app, std::shared_ptr const& ledger) { auto j = app.journal ("RPCHandler"); Json::Value jvResult; auto const keypair = keypairForSignature (params, jvResult); if (contains_error (jvResult)) return std::move (jvResult); bool const verify = !(params.isMember (jss::offline) && params[jss::offline].asBool()); if (! params.isMember (jss::tx_json)) return RPC::missing_field_error (jss::tx_json); Json::Value& tx_json (params [jss::tx_json]); // Check tx_json fields, but don't add any. auto txJsonResult = checkTxJsonFields ( tx_json, role, verify, validatedLedgerAge, app.config(), app.getFeeTrack()); if (RPC::contains_error (txJsonResult.first)) return std::move (txJsonResult.first); auto const srcAddressID = txJsonResult.second; // This test covers the case where we're offline so the sequence number // cannot be determined locally. If we're offline then the caller must // provide the sequence number. if (!verify && !tx_json.isMember (jss::Sequence)) return RPC::missing_field_error ("tx_json.Sequence"); std::shared_ptr sle = cachedRead(*ledger, keylet::account(srcAddressID).key, ltACCOUNT_ROOT); if (verify && !sle) { // If not offline and did not find account, error. JLOG (j.debug()) << "transactionSign: Failed to find source account " << "in current ledger: " << toBase58(srcAddressID); return rpcError (rpcSRC_ACT_NOT_FOUND); } { Json::Value err = checkFee ( params, role, verify && signingArgs.editFields(), app.config(), app.getFeeTrack(), app.getTxQ(), ledger); if (RPC::contains_error (err)) return std::move (err); err = checkPayment ( params, tx_json, srcAddressID, role, app, ledger, verify && signingArgs.editFields()); if (RPC::contains_error(err)) return std::move (err); } if (signingArgs.editFields()) { if (!tx_json.isMember (jss::Sequence)) { if (! sle) { JLOG (j.debug()) << "transactionSign: Failed to find source account " << "in current ledger: " << toBase58(srcAddressID); return rpcError (rpcSRC_ACT_NOT_FOUND); } tx_json[jss::Sequence] = (*sle)[sfSequence]; } if (!tx_json.isMember (jss::Flags)) tx_json[jss::Flags] = tfFullyCanonicalSig; } // If multisigning then we need to return the public key. if (signingArgs.isMultiSigning()) signingArgs.setPublicKey (keypair.first); if (verify) { if (! sle) // XXX Ignore transactions for accounts not created. return rpcError (rpcSRC_ACT_NOT_FOUND); JLOG (j.trace()) << "verify: " << toBase58(calcAccountID(keypair.first)) << " : " << toBase58(srcAddressID); // Don't do this test if multisigning since the account and secret // probably don't belong together in that case. if (!signingArgs.isMultiSigning()) { // Make sure the account and secret belong together. auto const err = acctMatchesPubKey ( sle, srcAddressID, keypair.first); if (err != rpcSUCCESS) return rpcError (err); } } STParsedJSONObject parsed (std::string (jss::tx_json), tx_json); if (parsed.object == boost::none) { Json::Value err; err [jss::error] = parsed.error [jss::error]; err [jss::error_code] = parsed.error [jss::error_code]; err [jss::error_message] = parsed.error [jss::error_message]; return std::move (err); } std::shared_ptr stpTrans; try { // If we're generating a multi-signature the SigningPubKey must be // empty, otherwise it must be the master account's public key. parsed.object->setFieldVL (sfSigningPubKey, signingArgs.isMultiSigning() ? Slice (nullptr, 0) : keypair.first.slice()); stpTrans = std::make_shared ( std::move (parsed.object.get())); } catch (std::exception&) { return RPC::make_error (rpcINTERNAL, "Exception occurred constructing serialized transaction"); } std::string reason; if (!passesLocalChecks (*stpTrans, reason)) return RPC::make_error (rpcINVALID_PARAMS, reason); // If multisign then return multiSignature, else set TxnSignature field. if (signingArgs.isMultiSigning ()) { Serializer s = buildMultiSigningData (*stpTrans, signingArgs.getSigner ()); auto multisig = ripple::sign ( keypair.first, keypair.second, s.slice()); signingArgs.moveMultiSignature (std::move (multisig)); } else { stpTrans->sign (keypair.first, keypair.second); } return transactionPreProcessResult {std::move (stpTrans)}; } static std::pair transactionConstructImpl (std::shared_ptr const& stpTrans, Rules const& rules, Application& app) { std::pair ret; // Turn the passed in STTx into a Transaction. Transaction::pointer tpTrans; { std::string reason; tpTrans = std::make_shared( stpTrans, reason, app); if (tpTrans->getStatus () != NEW) { ret.first = RPC::make_error (rpcINTERNAL, "Unable to construct transaction: " + reason); return ret; } } try { // Make sure the Transaction we just built is legit by serializing it // and then de-serializing it. If the result isn't equivalent // to the initial transaction then there's something wrong with the // passed-in STTx. { Serializer s; tpTrans->getSTransaction ()->add (s); Blob transBlob = s.getData (); SerialIter sit {makeSlice(transBlob)}; // Check the signature if that's called for. auto sttxNew = std::make_shared (sit); if (!app.checkSigs()) forceValidity(app.getHashRouter(), sttxNew->getTransactionID(), Validity::SigGoodOnly); if (checkValidity(app.getHashRouter(), *sttxNew, rules, app.config()).first != Validity::Valid) { ret.first = RPC::make_error (rpcINTERNAL, "Invalid signature."); return ret; } std::string reason; auto tpTransNew = std::make_shared (sttxNew, reason, app); if (tpTransNew) { if (!tpTransNew->getSTransaction()->isEquivalent ( *tpTrans->getSTransaction())) { tpTransNew.reset (); } tpTrans = std::move (tpTransNew); } } } catch (std::exception&) { // Assume that any exceptions are related to transaction sterilization. tpTrans.reset (); } if (!tpTrans) { ret.first = RPC::make_error (rpcINTERNAL, "Unable to sterilize transaction."); return ret; } ret.second = std::move (tpTrans); return ret; } static Json::Value transactionFormatResultImpl (Transaction::pointer tpTrans) { Json::Value jvResult; try { jvResult[jss::tx_json] = tpTrans->getJson (0); jvResult[jss::tx_blob] = strHex ( tpTrans->getSTransaction ()->getSerializer ().peekData ()); if (temUNCERTAIN != tpTrans->getResult ()) { std::string sToken; std::string sHuman; transResultInfo (tpTrans->getResult (), sToken, sHuman); jvResult[jss::engine_result] = sToken; jvResult[jss::engine_result_code] = tpTrans->getResult (); jvResult[jss::engine_result_message] = sHuman; } } catch (std::exception&) { jvResult = RPC::make_error (rpcINTERNAL, "Exception occurred during JSON handling."); } return jvResult; } } // detail //------------------------------------------------------------------------------ Json::Value checkFee ( Json::Value& request, Role const role, bool doAutoFill, Config const& config, LoadFeeTrack const& feeTrack, TxQ const& txQ, std::shared_ptr const& ledger) { Json::Value& tx (request[jss::tx_json]); if (tx.isMember (jss::Fee)) return Json::Value(); if (! doAutoFill) return RPC::missing_field_error ("tx_json.Fee"); int mult = Tuning::defaultAutoFillFeeMultiplier; int div = Tuning::defaultAutoFillFeeDivisor; if (request.isMember (jss::fee_mult_max)) { if (request[jss::fee_mult_max].isInt()) { mult = request[jss::fee_mult_max].asInt(); } else { return RPC::make_error (rpcHIGH_FEE, RPC::expected_field_message (jss::fee_mult_max, "an integer")); } } if (request.isMember(jss::fee_div_max)) { if (request[jss::fee_div_max].isInt()) { div = request[jss::fee_div_max].asInt(); if (div == 0) return RPC::make_error(rpcINVALID_PARAMS, RPC::expected_field_message(jss::fee_div_max, "non-zero")); } else { return RPC::make_error(rpcHIGH_FEE, RPC::expected_field_message(jss::fee_div_max, "an integer")); } } // Default fee in fee units. std::uint64_t const feeDefault = config.TRANSACTION_FEE_BASE; // Administrative and identified endpoints are exempt from local fees. std::uint64_t const loadFee = feeTrack.scaleFeeLoad (feeDefault, ledger->fees().base, ledger->fees().units, isUnlimited (role)); std::uint64_t fee = loadFee; if (ledger->rules().enabled(featureFeeEscalation, config.features)) { auto const assumeTx = request.isMember("x-assume-tx") && request["x-assume-tx"].isConvertibleTo(Json::uintValue) ? request["x-assume-tx"].asUInt() : 0; auto const metrics = txQ.getMetrics(config, *ledger, assumeTx); assert(metrics); if(metrics) { auto const baseFee = ledger->fees().base; auto escalatedFee = mulDiv( metrics->expFeeLevel, baseFee, metrics->referenceFeeLevel).second; if (mulDiv(escalatedFee, metrics->referenceFeeLevel, baseFee).second < metrics->expFeeLevel) ++escalatedFee; fee = std::max(fee, escalatedFee); } } auto const limit = mulDivThrow(feeTrack.scaleFeeBase ( feeDefault, ledger->fees().base, ledger->fees().units), mult, div); if (fee > limit && fee != loadFee && request.isMember("x-queue-okay") && request["x-queue-okay"].isBool() && request["x-queue-okay"].asBool()) { fee = loadFee; } if (fee > limit) { std::stringstream ss; ss << "Fee of " << fee << " exceeds the requested tx limit of " << limit; return RPC::make_error (rpcHIGH_FEE, ss.str()); } tx [jss::Fee] = static_cast(fee); return Json::Value(); } //------------------------------------------------------------------------------ /** Returns a Json::objectValue. */ Json::Value transactionSign ( Json::Value jvRequest, NetworkOPs::FailHard failType, Role role, std::chrono::seconds validatedLedgerAge, Application& app) { using namespace detail; auto const& ledger = app.openLedger().current(); auto j = app.journal ("RPCHandler"); JLOG (j.debug()) << "transactionSign: " << jvRequest; // Add and amend fields based on the transaction type. SigningForParams signForParams; transactionPreProcessResult preprocResult = transactionPreProcessImpl ( jvRequest, role, signForParams, validatedLedgerAge, app, ledger); if (!preprocResult.second) return preprocResult.first; // Make sure the STTx makes a legitimate Transaction. std::pair txn = transactionConstructImpl ( preprocResult.second, ledger->rules(), app); if (!txn.second) return txn.first; return transactionFormatResultImpl (txn.second); } /** Returns a Json::objectValue. */ Json::Value transactionSubmit ( Json::Value jvRequest, NetworkOPs::FailHard failType, Role role, std::chrono::seconds validatedLedgerAge, Application& app, ProcessTransactionFn const& processTransaction) { using namespace detail; auto const& ledger = app.openLedger().current(); auto j = app.journal ("RPCHandler"); JLOG (j.debug()) << "transactionSubmit: " << jvRequest; // Add and amend fields based on the transaction type. SigningForParams signForParams; transactionPreProcessResult preprocResult = transactionPreProcessImpl ( jvRequest, role, signForParams, validatedLedgerAge, app, ledger); if (!preprocResult.second) return preprocResult.first; // Make sure the STTx makes a legitimate Transaction. std::pair txn = transactionConstructImpl ( preprocResult.second, ledger->rules(), app); if (!txn.second) return txn.first; // Finally, submit the transaction. try { // FIXME: For performance, should use asynch interface processTransaction ( txn.second, isUnlimited (role), true, failType); } catch (std::exception&) { return RPC::make_error (rpcINTERNAL, "Exception occurred during transaction submission."); } return transactionFormatResultImpl (txn.second); } namespace detail { // There are a some field checks shared by transactionSignFor // and transactionSubmitMultiSigned. Gather them together here. static Json::Value checkMultiSignFields (Json::Value const& jvRequest) { if (! jvRequest.isMember (jss::tx_json)) return RPC::missing_field_error (jss::tx_json); Json::Value const& tx_json (jvRequest [jss::tx_json]); if (!tx_json.isObject()) return RPC::invalid_field_message (jss::tx_json); // There are a couple of additional fields we need to check before // we serialize. If we serialize first then we generate less useful //error messages. if (!tx_json.isMember (jss::Sequence)) return RPC::missing_field_error ("tx_json.Sequence"); if (!tx_json.isMember (sfSigningPubKey.getJsonName())) return RPC::missing_field_error ("tx_json.SigningPubKey"); if (!tx_json[sfSigningPubKey.getJsonName()].asString().empty()) return RPC::make_error (rpcINVALID_PARAMS, "When multi-signing 'tx_json.SigningPubKey' must be empty."); return Json::Value (); } // Sort and validate an stSigners array. // // Returns a null Json::Value if there are no errors. static Json::Value sortAndValidateSigners ( STArray& signers, AccountID const& signingForID) { if (signers.empty ()) return RPC::make_param_error ("Signers array may not be empty."); // Signers must be sorted by Account. std::sort (signers.begin(), signers.end(), [](STObject const& a, STObject const& b) { return (a[sfAccount] < b[sfAccount]); }); // Signers may not contain any duplicates. auto const dupIter = std::adjacent_find ( signers.begin(), signers.end(), [] (STObject const& a, STObject const& b) { return (a[sfAccount] == b[sfAccount]); }); if (dupIter != signers.end()) { std::ostringstream err; err << "Duplicate Signers:Signer:Account entries (" << toBase58((*dupIter)[sfAccount]) << ") are not allowed."; return RPC::make_param_error(err.str ()); } // An account may not sign for itself. if (signers.end() != std::find_if (signers.begin(), signers.end(), [&signingForID](STObject const& elem) { return elem[sfAccount] == signingForID; })) { std::ostringstream err; err << "A Signer may not be the transaction's Account (" << toBase58(signingForID) << ")."; return RPC::make_param_error(err.str ()); } return {}; } } // detail /** Returns a Json::objectValue. */ Json::Value transactionSignFor ( Json::Value jvRequest, NetworkOPs::FailHard failType, Role role, std::chrono::seconds validatedLedgerAge, Application& app) { auto const& ledger = app.openLedger().current(); auto j = app.journal ("RPCHandler"); JLOG (j.debug()) << "transactionSignFor: " << jvRequest; // Verify presence of the signer's account field. const char accountField[] = "account"; if (! jvRequest.isMember (accountField)) return RPC::missing_field_error (accountField); // Turn the signer's account into an AccountID for multi-sign. auto const signerAccountID = parseBase58( jvRequest[accountField].asString()); if (! signerAccountID) { return RPC::make_error (rpcSRC_ACT_MALFORMED, RPC::invalid_field_message (accountField)); } if (! jvRequest.isMember (jss::tx_json)) return RPC::missing_field_error (jss::tx_json); { Json::Value& tx_json (jvRequest [jss::tx_json]); if (!tx_json.isObject()) return RPC::object_field_error (jss::tx_json); // If the tx_json.SigningPubKey field is missing, // insert an empty one. if (!tx_json.isMember (sfSigningPubKey.getJsonName())) tx_json[sfSigningPubKey.getJsonName()] = ""; } // When multi-signing, the "Sequence" and "SigningPubKey" fields must // be passed in by the caller. using namespace detail; { Json::Value err = checkMultiSignFields (jvRequest); if (RPC::contains_error (err)) return err; } // Add and amend fields based on the transaction type. Buffer multiSignature; PublicKey multiSignPubKey; SigningForParams signForParams( *signerAccountID, multiSignPubKey, multiSignature); transactionPreProcessResult preprocResult = transactionPreProcessImpl ( jvRequest, role, signForParams, validatedLedgerAge, app, ledger); if (!preprocResult.second) return preprocResult.first; { // Make sure the account and secret belong together. auto const err = acctMatchesPubKey ( cachedRead( *ledger, keylet::account(*signerAccountID).key, ltACCOUNT_ROOT), *signerAccountID, multiSignPubKey); if (err != rpcSUCCESS) return rpcError (err); } // Inject the newly generated signature into tx_json.Signers. auto& sttx = preprocResult.second; { // Make the signer object that we'll inject. STObject signer (sfSigner); signer[sfAccount] = *signerAccountID; signer.setFieldVL (sfTxnSignature, multiSignature); signer.setFieldVL (sfSigningPubKey, multiSignPubKey.slice()); // If there is not yet a Signers array, make one. if (!sttx->isFieldPresent (sfSigners)) sttx->setFieldArray (sfSigners, {}); auto& signers = sttx->peekFieldArray (sfSigners); signers.emplace_back (std::move (signer)); // The array must be sorted and validated. auto err = sortAndValidateSigners (signers, (*sttx)[sfAccount]); if (RPC::contains_error (err)) return err; } // Make sure the STTx makes a legitimate Transaction. std::pair txn = transactionConstructImpl (sttx, ledger->rules(), app); if (!txn.second) return txn.first; return transactionFormatResultImpl (txn.second); } /** Returns a Json::objectValue. */ Json::Value transactionSubmitMultiSigned ( Json::Value jvRequest, NetworkOPs::FailHard failType, Role role, std::chrono::seconds validatedLedgerAge, Application& app, ProcessTransactionFn const& processTransaction) { auto const& ledger = app.openLedger().current(); auto j = app.journal ("RPCHandler"); JLOG (j.debug()) << "transactionSubmitMultiSigned: " << jvRequest; // When multi-signing, the "Sequence" and "SigningPubKey" fields must // be passed in by the caller. using namespace detail; { Json::Value err = checkMultiSignFields (jvRequest); if (RPC::contains_error (err)) return err; } Json::Value& tx_json (jvRequest ["tx_json"]); auto const txJsonResult = checkTxJsonFields ( tx_json, role, true, validatedLedgerAge, app.config(), app.getFeeTrack()); if (RPC::contains_error (txJsonResult.first)) return std::move (txJsonResult.first); auto const srcAddressID = txJsonResult.second; std::shared_ptr sle = cachedRead(*ledger, keylet::account(srcAddressID).key, ltACCOUNT_ROOT); if (!sle) { // If did not find account, error. JLOG (j.debug()) << "transactionSubmitMultiSigned: Failed to find source account " << "in current ledger: " << toBase58(srcAddressID); return rpcError (rpcSRC_ACT_NOT_FOUND); } { Json::Value err = checkFee ( jvRequest, role, false, app.config(), app.getFeeTrack(), app.getTxQ(), ledger); if (RPC::contains_error(err)) return err; err = checkPayment ( jvRequest, tx_json, srcAddressID, role, app, ledger, false); if (RPC::contains_error(err)) return err; } // Grind through the JSON in tx_json to produce a STTx. std::shared_ptr stpTrans; { STParsedJSONObject parsedTx_json ("tx_json", tx_json); if (!parsedTx_json.object) { Json::Value jvResult; jvResult ["error"] = parsedTx_json.error ["error"]; jvResult ["error_code"] = parsedTx_json.error ["error_code"]; jvResult ["error_message"] = parsedTx_json.error ["error_message"]; return jvResult; } try { stpTrans = std::make_shared( std::move(parsedTx_json.object.get())); } catch (std::exception& ex) { std::string reason (ex.what ()); return RPC::make_error (rpcINTERNAL, "Exception while serializing transaction: " + reason); } std::string reason; if (!passesLocalChecks (*stpTrans, reason)) return RPC::make_error (rpcINVALID_PARAMS, reason); } // Validate the fields in the serialized transaction. { // We now have the transaction text serialized and in the right format. // Verify the values of select fields. // // The SigningPubKey must be present but empty. if (!stpTrans->getFieldVL (sfSigningPubKey).empty ()) { std::ostringstream err; err << "Invalid " << sfSigningPubKey.fieldName << " field. Field must be empty when multi-signing."; return RPC::make_error (rpcINVALID_PARAMS, err.str ()); } // The Fee field must be in XRP and greater than zero. auto const fee = stpTrans->getFieldAmount (sfFee); if (!isLegalNet (fee)) { std::ostringstream err; err << "Invalid " << sfFee.fieldName << " field. Fees must be specified in XRP."; return RPC::make_error (rpcINVALID_PARAMS, err.str ()); } if (fee <= 0) { std::ostringstream err; err << "Invalid " << sfFee.fieldName << " field. Fees must be greater than zero."; return RPC::make_error (rpcINVALID_PARAMS, err.str ()); } } // Verify that the Signers field is present. if (! stpTrans->isFieldPresent (sfSigners)) return RPC::missing_field_error ("tx_json.Signers"); // If the Signers field is present the SField guarantees it to be an array. // Get a reference to the Signers array so we can verify and sort it. auto& signers = stpTrans->peekFieldArray (sfSigners); if (signers.empty ()) return RPC::make_param_error("tx_json.Signers array may not be empty."); // The Signers array may only contain Signer objects. if (std::find_if_not(signers.begin(), signers.end(), [](STObject const& obj) { return ( // A Signer object always contains these fields and no others. obj.isFieldPresent (sfAccount) && obj.isFieldPresent (sfSigningPubKey) && obj.isFieldPresent (sfTxnSignature) && obj.getCount() == 3); }) != signers.end()) { return RPC::make_param_error ( "Signers array may only contain Signer entries."); } // The array must be sorted and validated. auto err = sortAndValidateSigners (signers, srcAddressID); if (RPC::contains_error (err)) return err; // Make sure the SerializedTransaction makes a legitimate Transaction. std::pair txn = transactionConstructImpl (stpTrans, ledger->rules(), app); if (!txn.second) return txn.first; // Finally, submit the transaction. try { // FIXME: For performance, should use asynch interface processTransaction ( txn.second, isUnlimited (role), true, failType); } catch (std::exception&) { return RPC::make_error (rpcINTERNAL, "Exception occurred during transaction submission."); } return transactionFormatResultImpl (txn.second); } } // RPC } // ripple