Files
stacks-puppet-node/blockstack_client/actions.py

4619 lines
151 KiB
Python

#!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import print_function
"""
Blockstack-client
~~~~~
copyright: (c) 2014-2015 by Halfmoon Labs, Inc.
copyright: (c) 2016 by Blockstack.org
This file is part of Blockstack-client.
Blockstack-client is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
Blockstack-client is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with Blockstack-client. If not, see <http://www.gnu.org/licenses/>.
"""
"""
Every method that begins with `cli_` in this module
is matched to an action to be taken, based on the
CLI input.
CLI-accessible begin with `cli_`. For exmample, "blockstack transfer ..."
will cause `cli_transfer(...)` to be called.
The following conventions apply to `cli_` methods here:
* Each will always take a Namespace (from ArgumentParser.parse_known_args())
as its first argument.
* Each will return a dict with the requested information. The key 'error'
will be set to indicate an error condition.
If you want to add a new command-line action, implement it here. This
will make it available not only via the command-line, but also via the
local RPC interface and the test suite.
Use the _cli_skel method below a template to create new functions.
"""
import sys
import json
import traceback
import os
import re
import errno
import virtualchain
from socket import error as socket_error
import time
import blockstack_zones
import blockstack_profiles
import requests
import base64
import jsonschema
import threading
from decimal import Decimal
import uuid
requests.packages.urllib3.disable_warnings()
import logging
logging.disable(logging.CRITICAL)
# Hack around absolute paths
current_dir = os.path.abspath(os.path.dirname(__file__))
parent_dir = os.path.abspath(current_dir + '/../')
sys.path.insert(0, parent_dir)
from blockstack_client import (
delete_immutable, delete_mutable, get_all_names, get_consensus_at,
get_immutable, get_immutable_by_name, get_mutable, get_name_blockchain_record,
get_name_cost, get_name_zonefile,
get_nameops_at, get_names_in_namespace, get_names_owned_by_address,
get_namespace_blockchain_record, get_namespace_cost,
is_user_zonefile, list_immutable_data_history, list_update_history,
list_zonefile_history, lookup_snv, put_immutable, put_mutable, zonefile_data_replicate
)
from blockstack_client.profile import put_profile, delete_profile, get_profile
from rpc import local_api_connect, local_api_status, local_api_stop
import rpc as local_rpc
import config
from .config import configure_zonefile, set_advanced_mode, configure, get_utxo_provider_client
from .constants import (
CONFIG_PATH, CONFIG_DIR, FIRST_BLOCK_TIME_UTC,
APPROX_PREORDER_TX_LEN, APPROX_REGISTER_TX_LEN,
APPROX_UPDATE_TX_LEN, APPROX_TRANSFER_TX_LEN,
FIRST_BLOCK_MAINNET, NAME_UPDATE,
BLOCKSTACK_DEBUG, BLOCKSTACK_TEST,
TX_MIN_CONFIRMATIONS, DEFAULT_SESSION_LIFETIME
)
from .b40 import is_b40
from .storage import get_drivers_for_url, get_driver_urls, get_storage_handlers
from pybitcoin import is_b58check_address, serialize_transaction
from pybitcoin.transactions.outputs import calculate_change_amount
from .backend.blockchain import (
get_balance, is_address_usable, get_utxos,
can_receive_name, get_tx_confirmations, get_tx_fee
)
from .backend.registrar import get_wallet as registrar_get_wallet
from .backend.nameops import (
estimate_preorder_tx_fee, estimate_register_tx_fee,
estimate_update_tx_fee, estimate_transfer_tx_fee,
estimate_renewal_tx_fee, estimate_revoke_tx_fee
)
from .backend.safety import *
from .backend.queue import queuedb_remove, queuedb_find
from .backend.queue import extract_entry as queue_extract_entry
from .wallet import *
from .keys import *
from .proxy import *
from .client import analytics_event
from .scripts import UTXOException, is_name_valid, is_valid_hash
from .user import add_user_zonefile_url, remove_user_zonefile_url, user_zonefile_urls, \
make_empty_user_profile, user_zonefile_data_pubkey
from .resolve import *
from .tx import sign_tx, broadcast_tx
from .zonefile import make_empty_zonefile, url_to_uri_record
from .utils import exit_with_error, satoshis_to_btc
from .app import app_publish, app_unpublish, app_get_config, app_get_resource, \
app_put_resource, app_delete_resource, app_make_session
from .data import datastore_mkdir, datastore_rmdir, make_datastore, get_datastore, put_datastore, delete_datastore, \
datastore_getfile, datastore_putfile, datastore_deletefile, datastore_listdir, datastore_stat, \
datastore_rmtree, datastore_get_id, datastore_get_privkey, _mutable_data_make_file, data_blob_serialize, \
data_blob_parse
from .schemas import OP_URLENCODED_PATTERN, OP_NAME_PATTERN, OP_USER_ID_PATTERN, OP_BASE58CHECK_PATTERN
log = config.get_logger()
"""
The _cli_skel method is provided as a template for developers of
cli_ methods.
NOTE: extra cli arguments may be included in function params
NOTE: $NAME_OF_COMMAND must not have embedded whitespaces.
NOTE: As a security precaution, a cli_ function is not accessible
NOTE: via RPC by default. It has to be enabled explicitly. See below.
NOTE: If the "rpc" pragma is present, then the method will be
NOTE: accessible via the RPC interface of the background process
NOTE: Help string in arg and opt must be enclosed in single quotes.
The entire docstr must strictly adhere to this convention:
command: $NAME_OF_COMMAND [rpc]
help: $HELP_STRING
arg: $ARG_NAME ($ARG_TYPE) '$ARG_HELP'
arg: $ARG_NAME ($ARG_TYPE) '$ARG_HELP'
opt: $OPT_ARG_NAME ($OPT_ARG_TYPE) '$OPT_ARG_HELP'
opt: $OPT_ARG_NAME ($OPT_ARG_TYPE) '$OPT_ARG_HELP'
"""
def _cli_skel(args, config_path=CONFIG_PATH):
"""
command: skel
help: Skeleton cli function - developer template
arg: foo (str) 'A required argument - foo'
opt: bar (int) 'An optional argument - bar'
"""
result = {}
# update result as needed
if 'error' in result:
# ensure meaningful error message
result['error'] = 'Error generating skel'
return result
# continue processing the result
return result
def wallet_ensure_exists(config_path=CONFIG_PATH):
"""
Check that the wallet exists
Return {'status': True} on success
Return {'error': ...} on error
"""
if not wallet_exists(config_path=config_path):
return {'error': 'No wallet exists for {}. Please create one with `blockstack setup`'.format(config_path)}
return {'status': True}
def load_zonefile_from_string(fqu, zonefile_data, check_current=True):
"""
Load a zonefile from a string, which can be
either JSON or text. Verify that it is
well-formed and current.
Return {'status': True, 'zonefile': the serialized zonefile data (as a string)} on success.
Return {'error': ...} on error
Return {'error': ..., 'identical': True, 'zonefile': serialized zonefile string} if the zonefile is identical
"""
user_data = str(zonefile_data)
user_zonefile = None
try:
user_data = json.loads(user_data)
except:
log.debug('Zonefile is not a serialized JSON string; try parsing as text')
try:
user_data = blockstack_zones.parse_zone_file(user_data)
user_data = dict(user_data) # force dict. e.g if not defaultdict
except Exception as e:
if BLOCKSTACK_TEST is not None:
log.exception(e)
return {'error': 'Zonefile data is invalid.'}
# is this a zonefile?
try:
user_zonefile = blockstack_zones.make_zone_file(user_data)
except Exception as e:
log.exception(e)
log.error('Invalid zonefile')
return {'error': 'Invalid zonefile\n{}'.format(traceback.format_exc())}
# sanity checks...
if fqu != user_data.get('$origin', ''):
log.error('Zonefile is missing or has invalid $origin')
return {'error': 'Invalid $origin; must use your name'}
if '$ttl' not in user_data:
log.error('Zonefile is missing a TTL')
return {'error': 'Missing $ttl; please supply a positive integer'}
if not is_user_zonefile(user_data):
log.error('Zonefile is non-standard')
return {'error': 'Zonefile is missing or has invalid URI and/or TXT records'}
try:
ttl = int(user_data['$ttl'])
assert ttl >= 0
except Exception as e:
return {'error': 'Invalid $ttl; must be a positive integer'}
if check_current and is_zonefile_current(fqu, user_data):
msg = 'Zonefile data is same as current zonefile; update not needed.'
log.error(msg)
return {'error': msg, 'identical': True, 'zonefile': user_zonefile}
return {'status': True, 'zonefile': user_zonefile}
def get_default_password(password):
"""
Get the default password
"""
return password if password is not None else os.environ.get("BLOCKSTACK_CLIENT_WALLET_PASSWORD", None)
def get_default_interactive(interactive):
"""
Get default interactive setting
"""
if os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) == "1":
return False
else:
return interactive
def cli_setup(args, config_path=CONFIG_PATH, password=None):
"""
command: setup
help: Set up your Blockstack installation
"""
password = get_default_password(password)
interactive = get_default_interactive(True)
ret = {}
log.debug("Set up config file")
# are we configured?
opts = configure(interactive=interactive, force=False, config_file=config_path)
if 'error' in opts:
return opts
class WalletSetupArgs(object):
pass
wallet_args = WalletSetupArgs()
# is our wallet ready?
res = cli_setup_wallet(wallet_args, interactive=interactive, config_path=config_path, password=password)
if 'error' in res:
return res
if 'backup_wallet' in res:
ret['backup_wallet'] = res['backup_wallet']
ret['status'] = True
return ret
def cli_configure(args, config_path=CONFIG_PATH):
"""
command: configure
help: Interactively configure the client
"""
interactive = True
force = True
if os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) == "1":
interactive = False
force = False
opts = configure(interactive=interactive, force=force, config_file=config_path)
result = {}
result['path'] = opts['blockstack-client']['path']
return result
def cli_balance(args, config_path=CONFIG_PATH):
"""
command: balance
help: Get the account balance
"""
config_dir = os.path.dirname(config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
result = {}
addresses = []
satoshis = 0
satoshis, addresses = get_total_balance(wallet_path=wallet_path, config_path=config_path)
if satoshis is None:
log.error('Failed to get balance')
# contains error
return addresses
# convert to BTC
btc = float(Decimal(satoshis / 1e8))
for address_info in addresses:
address_info['bitcoin'] = float(Decimal(address_info['balance'] / 1e8))
address_info['satoshis'] = address_info['balance']
del address_info['balance']
result = {
'total_balance': {
'satoshis': int(satoshis),
'bitcoin': btc
},
'addresses': addresses
}
return result
def cli_withdraw(args, password=None, interactive=True, wallet_keys=None, config_path=CONFIG_PATH):
"""
command: withdraw
help: Transfer funds out of the Blockstack wallet to a new address
arg: address (str) 'The recipient address'
opt: amount (int) 'The amount to withdraw (defaults to all)'
opt: min_confs (int) 'The minimum confirmations for oustanding transactions'
opt: tx_only (str) 'If "True", only return the transaction'
"""
config_dir = os.path.dirname(config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
password = get_default_password(password)
recipient_addr = str(args.address)
amount = getattr(args, 'amount', None)
min_confs = getattr(args, 'min_confs', TX_MIN_CONFIRMATIONS)
tx_only = getattr(args, 'tx_only', False)
if min_confs is None:
min_confs = TX_MIN_CONFIRMATIONS
if tx_only:
if tx_only.lower() in ['1', 'yes', 'true']:
tx_only = True
else:
tx_only = False
if not re.match(OP_BASE58CHECK_PATTERN, recipient_addr):
log.debug("recipient = {}".format(recipient_addr))
return {'error': 'Invalid address'}
if amount is not None and not isinstance(amount, int):
log.debug("amount = {}".format(amount))
return {'error': 'Invalid amount'}
if not isinstance(min_confs, int):
log.debug("min_confs = {}".format(min_confs))
return {'error': 'Invalid min confs'}
if not isinstance(tx_only, bool):
log.debug("tx_only = {}".format(tx_only))
return {'error': 'Invalid tx_only'}
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
if wallet_keys is None:
res = load_wallet(password=password, wallet_path=wallet_path, interactive=interactive, include_private=True)
if 'error' in res:
return res
wallet_keys = res['wallet']
send_addr, _, _ = get_addresses_from_file(config_dir=config_dir, wallet_path=wallet_path)
inputs = get_utxos(str(send_addr), min_confirmations=min_confs, config_path=config_path)
if len(inputs) == 0:
log.error("No UTXOs for {}".format(send_addr))
return {'error': 'Failed to find UTXOs for wallet payment address'}
total_value = sum(inp['value'] for inp in inputs)
def mktx( amt, tx_fee ):
"""
Make the transaction with the given fee
"""
change = 0
if amt is None:
# total transfer, minus tx fee
amt = total_value - tx_fee
if amt < 0:
log.error("Dust: total value = {}, tx fee = {}".format(total_value, tx_fee))
return {'error': 'Cannot withdraw dust'}
else:
change = calculate_change_amount(inputs, amt, tx_fee)
outputs = [
{'script_hex': virtualchain.make_payment_script(recipient_addr),
'value': amt},
]
if amt < total_value and change > 0:
# need change and tx fee
outputs.append(
{'script_hex': virtualchain.make_payment_script(send_addr),
"value": change}
)
serialized_tx = serialize_transaction(inputs, outputs)
signed_tx = sign_tx(serialized_tx, wallet_keys['payment_privkey'])
return signed_tx
tx = mktx(amount, 0)
tx_fee = get_tx_fee(tx, config_path=config_path)
tx = mktx(amount, tx_fee)
if tx_only:
return {'status': True, 'tx': tx}
res = broadcast_tx( tx, config_path=config_path )
return res
def cli_price(args, config_path=CONFIG_PATH, proxy=None, password=None):
"""
command: price
help: Get the price to register a name
arg: name (str) 'Name to query'
opt: recipient (str) 'Address of the recipient, if not this wallet.'
opt: operations (str) 'A CSV of operations to check.'
"""
proxy = get_default_proxy() if proxy is None else proxy
password = get_default_password(password)
fqu = str(args.name)
transfer_address = getattr(args, 'recipient', None)
operations = getattr(args, 'operations', None)
if transfer_address is not None:
transfer_address = str(transfer_address)
if operations is not None:
operations = operations.split(',')
else:
operations = ['preorder', 'register', 'update']
if transfer_address:
operations.append('transfer')
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
error = check_valid_name(fqu)
if error:
return {'error': error}
config_dir = os.path.dirname(config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
payment_privkey_info, owner_privkey_info = None, None
payment_address, owner_address, data_pubkey = (
get_addresses_from_file(config_dir=config_dir, wallet_path=wallet_path)
)
if local_api_status(config_dir=config_dir):
# API server is running. Use actual wallet keys.
log.debug("Try to get wallet keys from API server")
try:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
payment_privkey_info = wallet_keys['payment_privkey']
owner_privkey_info = wallet_keys['owner_privkey']
except (OSError, IOError) as e:
# backend is not running; estimate with addresses
if BLOCKSTACK_DEBUG is not None:
log.exception(e)
log.debug("Could not get wallet keys from API server")
sg = ScatterGather()
res = get_operation_fees( fqu, operations, sg, payment_privkey_info, owner_privkey_info,
proxy=proxy, config_path=config_path, payment_address=payment_address,
owner_address=owner_address, transfer_address=transfer_address )
if not res:
return {'error': 'Failed to get the requisite operation fees'}
# do queries
sg.run_tasks()
# get results
fees = interpret_operation_fees(operations, sg)
if 'error' in fees:
log.error("Failed to get operation fees: {}".format(fees['error']))
return {'error': 'Failed to get some operation fees: {}. Try again with `--debug` for details.'.format(fees['error'])}
analytics_event('Name price', {})
# convert to BTC
btc_keys = [
'preorder_tx_fee', 'register_tx_fee',
'update_tx_fee', 'total_estimated_cost',
'name_price', 'transfer_tx_fee', 'renewal_tx_fee',
'revoke_tx_fee',
]
for k in btc_keys:
if k in fees.keys():
v = {
'satoshis': fees[k],
'btc': satoshis_to_btc(fees[k])
}
fees[k] = v
return fees
def cli_deposit(args, config_path=CONFIG_PATH):
"""
command: deposit
help: Display the address with which to receive bitcoins
"""
config_dir = os.path.dirname(config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
result = {}
result['message'] = 'Send bitcoins to the address specified.'
result['address'], owner_address, data_address = (
get_addresses_from_file(wallet_path=wallet_path)
)
return result
def cli_import(args, config_path=CONFIG_PATH):
"""
command: import
help: Display the address with which to receive names
"""
config_dir = os.path.dirname(config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
result = {}
result['message'] = (
'Send the name you want to receive to the address specified.'
)
payment_address, result['address'], data_address = (
get_addresses_from_file(wallet_path=wallet_path)
)
return result
def cli_names(args, config_path=CONFIG_DIR):
"""
command: names
help: Display the names owned by local addresses
"""
result = {}
config_dir = os.path.dirname(config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
result['names_owned'] = get_all_names_owned(wallet_path)
result['addresses'] = get_owner_addresses_and_names(wallet_path)
return result
def cli_get_registrar_info(args, config_path=CONFIG_PATH, queues=None):
"""
command: get_registrar_info advanced
help: Get information about the backend registrar queues
"""
queues = ['preorder', 'register', 'update', 'transfer', 'renew', 'revoke'] if queues is None else queues
config_dir = os.path.dirname(config_path)
conf = config.get_config(config_path)
rpc = local_api_connect(config_dir=config_dir)
if rpc is None:
return {'error': 'API endpoint not running. Please start it with `api start`'}
try:
current_state = rpc.backend_state()
except Exception, e:
if BLOCKSTACK_DEBUG:
log.exception(e)
log.error("Failed to contact Blockstack daemon")
return {'error': 'Failed to contact blockstack daemon. Please ensure that it is running with the `api` command.'}
queue_types = dict( [(queue_name, []) for queue_name in queues] )
def format_queue_entry(entry):
"""
Determine data to display for a queue entry.
Return {'name': ..., 'tx_hash': ..., 'confirmations': ...}
"""
new_entry = {}
new_entry['name'] = entry['fqu']
confirmations = get_tx_confirmations(
entry['tx_hash'], config_path=config_path
)
confirmations = 0 if confirmations is None else confirmations
new_entry['confirmations'] = confirmations
new_entry['tx_hash'] = entry['tx_hash']
return new_entry
def remove_dups(preorder_queue, register_queue):
"""
Omit duplicates between preorder and register queue
"""
for entry in register_queue:
name = entry['name']
for check_entry in preorder_queue:
if check_entry['name'] == name:
preorder_queue.remove(check_entry)
# extract entries
for entry in current_state:
entry_type = entry['type']
if entry_type not in queue_types:
log.error('Unknown entry type "{}"'.format(entry_type))
continue
queue_types[entry['type']].append(format_queue_entry(entry))
# clean up duplicates
remove_dups(queue_types['preorder'], queue_types['register'])
# remove empty entries
ret = {}
for queue_type in queue_types:
if queue_types[queue_type]:
ret[queue_type] = queue_types[queue_type]
return ret
def get_server_info(config_path=CONFIG_PATH, get_local_info=False):
"""
Get information about the running server,
and any pending operations.
"""
config_dir = os.path.dirname(config_path)
conf = config.get_config(config_path)
resp = getinfo()
result = {}
result['cli_version'] = VERSION
result['advanced_mode'] = conf['advanced_mode']
if 'error' in resp:
result['server_alive'] = False
result['server_error'] = resp['error']
return result
result['server_alive'] = True
result['server_host'] = (
resp.get('server_host') or
conf.get('server')
)
result['server_port'] = (
resp.get('server_port') or
int(conf.get('port'))
)
result['server_version'] = (
resp.get('server_version') or
resp.get('blockstack_version') or
resp.get('blockstore_version')
)
if result['server_version'] is None:
raise Exception('Missing server version')
result['last_block_processed'] = (
resp.get('last_block_processed') or
resp.get('last_block') or
resp.get('blocks')
)
if result['last_block_processed'] is None:
raise Exception('Missing height of block last processed')
result['last_block_seen'] = (
resp.get('last_block_seen') or
resp.get('blockchain_blocks') or
resp.get('bitcoind_blocks')
)
if result['last_block_seen'] is None:
raise Exception('Missing height of last block seen')
try:
result['consensus_hash'] = resp['consensus']
except KeyError:
raise Exception('Missing consensus hash')
if not get_local_info:
return result
queue_info = cli_get_registrar_info(None, config_path=config_path)
if 'error' not in queue_info:
result['queues'] = queue_info
return result
def cli_info(args, config_path=CONFIG_PATH):
"""
command: info
help: Get details about pending name commands
"""
return get_server_info(config_path=config_path, get_local_info=True)
def cli_ping(args, config_path=CONFIG_PATH):
"""
command: ping
help: Check server status and get server details
"""
return get_server_info(config_path=config_path)
def cli_lookup(args, config_path=CONFIG_PATH):
"""
command: lookup
help: Get the zone file and profile for a particular name
arg: name (str) 'The name to look up'
"""
data = {}
blockchain_record = None
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
try:
blockchain_record = get_name_blockchain_record(fqu)
except socket_error:
return {'error': 'Error connecting to server.'}
if 'error' in blockchain_record:
return blockchain_record
if 'value_hash' not in blockchain_record:
return {'error': '{} has no profile'.format(fqu)}
if blockchain_record.get('revoked', False):
msg = 'Name is revoked. Use get_name_blockchain_record for details.'
return {'error': msg}
try:
user_profile, user_zonefile = get_profile(
str(args.name), name_record=blockchain_record, include_raw_zonefile=True, use_legacy=True, use_legacy_zonefile=True
)
if isinstance(user_zonefile, dict) and 'error' in user_zonefile:
return user_zonefile
data['profile'] = user_profile
data['zonefile'] = user_zonefile['raw_zonefile']
except Exception as e:
log.exception(e)
msg = 'Failed to look up name\n{}'
return {'error': msg.format(traceback.format_exc())}
result = data
analytics_event('Name lookup', {})
return result
def cli_whois(args, config_path=CONFIG_PATH):
"""
command: whois
help: Look up the blockchain info for a name
arg: name (str) 'The name to look up'
"""
result = {}
record, fqu = None, str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
try:
record = get_name_blockchain_record(fqu)
except socket_error:
exit_with_error('Error connecting to server.')
if 'error' in record:
return record
if record.get('revoked', False):
msg = 'Name is revoked. Use get_name_blockchain_record for details.'
return {'error': msg}
history = record.get('history', {})
update_heights = []
try:
assert isinstance(history, dict)
# all items must be ints
update_heights = sorted(int(_) for _ in history)
except (AssertionError, ValueError):
return {'error': 'Invalid record data returned'}
result['block_preordered_at'] = record['preorder_block_number']
result['block_renewed_at'] = record['last_renewed']
result['last_transaction_id'] = record['txid']
result['owner_address'] = record['address']
result['owner_script'] = record['sender']
value_hash = record.get('value_hash', None)
if value_hash in [None, 'null', '']:
result['has_zonefile'] = False
else:
result['has_zonefile'] = True
result['zonefile_hash'] = value_hash
if update_heights:
result['last_transaction_height'] = update_heights[-1]
expire_block = record.get('expire_block', None)
if expire_block is not None:
result['expire_block'] = expire_block
analytics_event('Whois', {})
return result
def get_wallet_with_backoff(config_path):
"""
Get the wallet, but keep trying
in the case of a ECONNREFUSED
(i.e. the API daemon could still be initializing)
Return the wallet keys on success (as a dict)
return {'error': ...} on error
"""
wallet_keys = None
i = 0
for i in range(3):
try:
wallet_keys = get_wallet(config_path=config_path)
return wallet_keys
except (IOError, OSError) as se:
if se.errno == errno.ECONNREFUSED:
# still spinning up
log.debug("Still spinning up")
time.sleep(i + 1)
continue
raise
if i == 3:
log.error('Failed to get_wallet')
wallet_keys = {'error': 'Failed to connect to API daemon'}
return wallet_keys
def get_wallet_keys(config_path, password):
"""
Load up the wallet keys
Return the dict with the keys on success
Return {'error': ...} on failure
"""
config_dir = os.path.dirname(config_path)
if local_rpc.is_api_server(config_dir):
# can return directly
return registrar_get_wallet(config_path=config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
status = local_api_status(config_dir=os.path.dirname(config_path))
if not status:
return {'error': 'API endpoint not running. Please start it with `blockstack api start`'}
if not is_wallet_unlocked(config_dir=config_dir):
log.debug('unlocking wallet ({})'.format(config_dir))
res = unlock_wallet(config_dir=config_dir, password=password)
if 'error' in res:
log.error('unlock_wallet: {}'.format(res['error']))
return res
if res.has_key('legacy') and res['legacy']:
log.error("Wallet is in legacy format. Please migrate it to the latest version with `setup_wallet`.")
return {'error': 'Wallet is in legacy format. Please migrate it to the latest version with `setup_wallet.`'}
return get_wallet_with_backoff(config_path)
def prompt_invalid_zonefile():
"""
Prompt the user whether or not to replicate
an invalid zonefile
"""
if os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) == "1":
return True
warning_str = (
'\nWARNING! This zone file data does not look like a zone file.\n'
'If you proceed to use this data, no one will be able to look\n'
'up your profile or any data you replicate with Blockstack.\n\n'
'Proceed? (y/N): '
)
proceed = raw_input(warning_str)
return proceed.lower() in ['y']
def prompt_transfer( new_owner_address ):
"""
Prompt whether or not to proceed with a transfer
"""
if os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) == "1":
return True
warning_str = (
'\nWARNING! This will transfer your name to a different owner.\n'
'The recipient\'s address will be: {}\n.'
'THIS CANNOT BE UNDONE OR CANCELED.\n'
'\n'
'Proceed? (y/N): '
)
proceed = raw_input(warning_str.format(new_owner_address))
return proceed.lower() in ['y']
def is_valid_path(path):
"""
Is the given string a valid path?
"""
if not isinstance(path, str):
return False
return '\x00' not in path
def cli_register(args, config_path=CONFIG_PATH, force_data=False, tx_fee=None,
cost_satoshis=None, interactive=True, password=None, proxy=None):
"""
command: register
help: Register a name
arg: name (str) 'The name to register'
opt: zonefile (str) 'The raw zone file to give this name (or a path to one)'
opt: recipient (str) 'The recipient address, if not this wallet'
opt: min_confs (int) 'The minimum number of confirmations on the initial preorder'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
proxy = get_default_proxy(config_path) if proxy is None else proxy
password = get_default_password(password)
conf = config.get_config(config_path)
assert conf
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
result = {}
fqu = str(args.name)
user_zonefile = getattr(args, 'zonefile', None)
transfer_address = getattr(args, 'recipient', None)
min_payment_confs = getattr(args, 'min_confs', TX_MIN_CONFIRMATIONS)
if min_payment_confs is None:
min_payment_confs = TX_MIN_CONFIRMATIONS
if transfer_address:
if not re.match(OP_BASE58CHECK_PATTERN, transfer_address):
return {'error': 'Not a valid address'}
if user_zonefile:
# is this a path?
zonefile_data_exists = (is_valid_path(user_zonefile) and os.path.exists(user_zonefile) and not force_data)
if zonefile_data_exists:
try:
with open(zonefile_data) as f:
user_zonefile = f.read()
except:
return {'error': 'Failed to read "{}"'.format(zonefile_data)}
# is this valid zonefile data?
try:
zf = blockstack_zones.parse_zone_file(user_zonefile)
assert zf
except:
log.warning("Non-standard zone file")
if interactive:
proceed = prompt_invalid_zonefile()
if not proceed:
return {'error': 'Non-standard zone file'}
else:
# make a default zonefile
_, _, data_pubkey = get_addresses_from_file(config_dir=config_dir)
if not data_pubkey:
return {'error': 'No data key in wallet. Please add one with `setup_wallet`'}
user_zonefile_dict = make_empty_zonefile(fqu, data_pubkey)
user_zonefile = blockstack_zones.make_zone_file(user_zonefile_dict)
# if we have a data key, then make an empty profile and zonefile
user_profile = None
if not transfer_address:
# registering for this wallet. Put an empty profile
_, _, data_pubkey = get_addresses_from_file(config_dir=config_dir)
if not data_pubkey:
return {'error': 'No data key in wallet. Please add one with `setup_wallet`'}
user_profile = make_empty_user_profile()
# name must be well-formed
error = check_valid_name(fqu)
if error:
return {'error': error}
# operation checks (API server only)
if local_rpc.is_api_server(config_dir=config_dir):
# find tx fee, and do sanity checks
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
owner_privkey_info = wallet_keys['owner_privkey']
payment_privkey_info = wallet_keys['payment_privkey']
operations = ['preorder', 'register', 'update']
required_checks = ['is_name_available', 'is_payment_address_usable', 'owner_can_receive']
if transfer_address:
operations.append('transfer')
required_checks.append('recipient_can_receive')
res = check_operations( fqu, operations, owner_privkey_info, payment_privkey_info, min_payment_confs=min_payment_confs,
transfer_address=transfer_address, required_checks=required_checks, config_path=config_path, proxy=proxy )
if 'error' in res:
return res
opchecks = res['opchecks']
if tx_fee is None:
tx_fee = opchecks['preorder_tx_fee']
if cost_satoshis is not None:
if opchecks['name_price'] > cost_satoshis:
return {'error': 'Invalid cost: expected {}, got {}'.format(opchecks['name_price'], cost_satoshis)}
else:
cost_satoshis = opchecks['name_price']
if interactive and os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) != "1":
try:
print("Calculating total registration costs for {}...".format(fqu))
class PriceArgs(object):
pass
price_args = PriceArgs()
price_args.name = fqu
price_args.recipient = transfer_address
costs = cli_price( price_args, config_path=config_path, password=password, proxy=proxy )
if 'error' in costs:
return {'error': 'Failed to get name costs. Please try again with `--debug` to see error messages.'}
cost = costs['total_estimated_cost']
input_prompt = (
'Registering {} will cost about {} BTC.\n'
'Use `blockstack price {}` for a cost breakdown\n'
'\n'
'The entire process takes 48 confirmations, or about 5 hours.\n'
'You need to have Internet access during this time period, so\n'
'this program can send the right transactions at the right\n'
'times.\n\n'
'Continue? (y/N): '
)
input_prompt = input_prompt.format(fqu, cost['btc'], fqu)
user_input = raw_input(input_prompt)
user_input = user_input.lower()
if user_input.lower() != 'y':
print('Not registering.')
exit(0)
except KeyboardInterrupt:
print('\nExiting.')
exit(0)
# forward along to RESTful server (or if we're the RESTful server, call the registrar method)
log.debug("Preorder {}, zonefile={}, profile={}, recipient={} min_confs={} tx_fee={}".format(fqu, user_zonefile, user_profile, transfer_address, min_payment_confs, tx_fee))
rpc = local_api_connect(config_dir=config_dir)
assert rpc
try:
resp = rpc.backend_preorder(fqu, cost_satoshis, user_zonefile, user_profile, transfer_address, min_payment_confs, tx_fee )
except Exception as e:
log.exception(e)
return {'error': 'Error talking to server, try again.'}
if 'error' in resp:
log.debug('RPC error: {}'.format(resp['error']))
return resp
if (not 'success' in resp or not resp['success']) and 'message' in resp:
return {'error': resp['message']}
result = resp
if local_rpc.is_api_server(config_dir):
# log this
total_estimated_cost = {'total_estimated_cost': opchecks['total_estimated_cost']}
analytics_event('Register name', total_estimated_cost)
return result
def cli_update(args, config_path=CONFIG_PATH, password=None,
interactive=True, proxy=None, nonstandard=False,
force_data=False, tx_fee=None):
"""
command: update
help: Set the zone file for a name
arg: name (str) 'The name to update'
opt: data (str) 'A zone file string, or a path to a file with the data.'
opt: nonstandard (str) 'If true, then do not validate or parse the zonefile.'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
if not interactive and getattr(args, 'data', None) is None:
return {'error': 'Zone file data required in non-interactive mode'}
proxy = get_default_proxy() if proxy is None else proxy
password = get_default_password(password)
if hasattr(args, 'nonstandard') and not nonstandard:
if args.nonstandard is not None and args.nonstandard.lower() in ['yes', '1', 'true']:
nonstandard = True
conf = config.get_config(config_path)
assert conf
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
zonefile_data = None
downloaded = False
if getattr(args, 'data', None) is not None:
zonefile_data = str(args.data)
if not local_rpc.is_api_server(config_dir=config_dir):
# verify that we own the name before trying to edit its zonefile
_, owner_address, _ = get_addresses_from_file(config_dir=config_dir)
assert owner_address
res = get_names_owned_by_address( owner_address, proxy=proxy )
if 'error' in res:
return res
if fqu not in res:
return {'error': 'This wallet does not own this name'}
# is this a path?
zonefile_data_exists = is_valid_path(zonefile_data) and os.path.exists(zonefile_data) and not force_data
if zonefile_data is not None and zonefile_data_exists:
try:
with open(zonefile_data) as f:
zonefile_data = f.read()
except:
return {'error': 'Failed to read "{}"'.format(zonefile_data)}
# fetch remotely?
if zonefile_data is None:
zonefile_data_res = get_name_zonefile(
fqu, proxy=proxy, raw_zonefile=True
)
if 'error' not in zonefile_data_res:
zonefile_data = zonefile_data_res['zonefile']
else:
log.warning('Failed to fetch zonefile: {}'.format(zonefile_data_res['error']))
downloaded = True
# load zonefile, if given
user_data_txt, user_data_hash, user_zonefile_dict = None, None, {}
user_data_res = load_zonefile_from_string(fqu, zonefile_data)
if 'error' not in user_data_res or ('identical' in user_data_res and downloaded):
user_data_txt = user_data_res['zonefile']
user_data_hash = storage.get_zonefile_data_hash(user_data_res['zonefile'])
user_zonefile_dict = blockstack_zones.parse_zone_file(user_data_res['zonefile'])
else:
if 'identical' in user_data_res:
# given the same zonefile on the CLI
return {'error': 'Zonefile matches the current name hash; not updating.'}
if not interactive:
if zonefile_data is None or nonstandard:
log.warning('Using non-zonefile data')
else:
return {'error': 'Zone file not updated (invalid)'}
# not a well-formed zonefile (but maybe that's okay! ask the user)
if zonefile_data is not None and interactive:
# something invalid here. prompt overwrite
proceed = prompt_invalid_zonefile()
if not proceed:
msg = 'Zone file not updated (reason: {})'
return {'error': msg.format(user_data_res['error'])}
user_data_txt = zonefile_data
if zonefile_data is not None:
user_data_hash = storage.get_zonefile_data_hash(zonefile_data)
# open the zonefile editor
_, _, data_pubkey = get_addresses_from_file(config_dir=config_dir)
if data_pubkey is None:
return {'error': 'No data public key set in the wallet. Please use `blockstack setup_wallet` to fix this.'}
if interactive and not nonstandard:
if user_zonefile_dict is None:
user_zonefile_dict = make_empty_zonefile(fqu, data_pubkey)
new_zonefile = configure_zonefile(
fqu, user_zonefile_dict, data_pubkey
)
if new_zonefile is None:
# zonefile did not change; nothing to do
return {'error': 'Zonefile did not change. No update sent.'}
user_zonefile_dict = new_zonefile
user_data_txt = blockstack_zones.make_zone_file(user_zonefile_dict)
user_data_hash = storage.get_zonefile_data_hash(user_data_txt)
# forward along to RESTful server (or registrar)
log.debug("Update {}, zonefile={}, zonefile_hash={} tx_fee={}".format(fqu, user_data_txt, user_data_hash, tx_fee))
rpc = local_api_connect(config_dir=config_dir)
assert rpc
try:
# NOTE: already did safety checks
resp = rpc.backend_update(fqu, user_data_txt, None, None, tx_fee )
except Exception as e:
log.exception(e)
return {'error': 'Error talking to server, try again.'}
if 'error' in resp:
log.debug('RPC error: {}'.format(resp['error']))
return resp
if (not 'success' in resp or not resp['success']) and 'message' in resp:
return {'error': resp['message']}
analytics_event('Update name', {})
resp['zonefile_hash'] = user_data_hash
return resp
def cli_transfer(args, config_path=CONFIG_PATH, password=None, interactive=False, proxy=None, tx_fee=None):
"""
command: transfer
help: Transfer a name to a new address
arg: name (str) 'The name to transfer'
arg: address (str) 'The address to receive the name'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
proxy = get_default_proxy() if proxy is None else proxy
password = get_default_password(password)
conf = config.get_config(config_path)
assert conf
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
fqu = str(args.name)
transfer_address = str(args.address)
error = check_valid_name(fqu)
if error:
return {'error': error}
if interactive:
res = prompt_transfer(transfer_address)
if not res:
return {'error': 'Transfer cancelled.'}
# do the name transfer via the RESTful server (or registrar)
rpc = local_api_connect(config_dir=config_dir)
assert rpc
try:
resp = rpc.backend_transfer(fqu, transfer_address, tx_fee )
except Exception as e:
log.exception(e)
return {'error': 'Error talking to server, try again.'}
if 'error' in resp:
log.debug('RPC error: {}'.format(resp['error']))
return resp
if (not 'success' in resp or not resp['success']) and 'message' in resp:
return {'error': resp['message']}
analytics_event('Transfer name', {})
return resp
def cli_renew(args, config_path=CONFIG_PATH, interactive=True, password=None, proxy=None, cost_satoshis=None, tx_fee=None):
"""
command: renew
help: Renew a name
arg: name (str) 'The name to renew'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
conf = config.get_config(config_path)
assert conf
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
if interactive:
print("Calculating total renewal costs for {}...".format(fqu))
# get the costs...
class PriceArgs(object):
pass
price_args = PriceArgs()
price_args.name = fqu
price_args.operations = 'renewal'
costs = cli_price( price_args, config_path=config_path, password=password, proxy=proxy )
if 'error' in costs:
return {'error': 'Failed to get renewal costs. Please try again with `--debug` to see error messages.'}
cost = costs['total_estimated_cost']
if cost_satoshis is None:
cost_satoshis = costs['name_price']['satoshis']
if tx_fee is None:
tx_fee = costs['renewal_tx_fee']['satoshis']
if not local_rpc.is_api_server(config_dir=config_dir):
# also verify that we own the name
_, owner_address, _ = get_addresses_from_file(config_dir=config_dir)
assert owner_address
res = get_names_owned_by_address( owner_address, proxy=proxy )
if 'error' in res:
return res
if fqu not in res:
return {'error': 'This wallet does not own this name'}
if interactive and os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) != "1":
try:
input_prompt = (
'Renewing {} will cost about {} BTC.\n'
'Use `blockstack price {} "" renewal` for a cost breakdown\n'
'\n'
'The entire process takes 12 confirmations, or about 2 hours.\n'
'You need to have Internet access during this time period, so\n'
'this program can send the right transactions at the right\n'
'times.\n\n'
'Continue? (y/N): '
)
input_prompt = input_prompt.format(fqu, cost['btc'], fqu)
user_input = raw_input(input_prompt)
user_input = user_input.lower()
if user_input.lower() != 'y':
print('Not renewing.')
exit(0)
except KeyboardInterrupt:
print('\nExiting.')
exit(0)
rpc = local_api_connect(config_dir=config_dir)
assert rpc
log.debug("Renew {} for {} BTC".format(fqu, cost_satoshis))
try:
resp = rpc.backend_renew(fqu, cost_satoshis, tx_fee )
except Exception as e:
log.exception(e)
return {'error': 'Error talking to server, try again.'}
total_estimated_cost = {'total_estimated_cost': cost}
if 'error' in resp:
log.debug('RPC error: {}'.format(resp['error']))
return resp
if (not 'success' in resp or not resp['success']) and 'message' in resp:
return {'error': resp['message']}
analytics_event('Renew name', total_estimated_cost)
return resp
def cli_revoke(args, config_path=CONFIG_PATH, interactive=True, password=None, proxy=None, tx_fee=None):
"""
command: revoke
help: Revoke a name
arg: name (str) 'The name to revoke'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
conf = config.get_config(config_path)
assert conf
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
if interactive and os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) != "1":
try:
input_prompt = (
'WARNING: This will render your name unusable and\n'
'remove any links it points to.\n'
'THIS CANNOT BE UNDONE OR CANCELLED.\n'
'\n'
'Proceed? (y/N) '
)
user_input = raw_input(input_prompt)
user_input = user_input.lower()
if user_input != 'y':
print('Not revoking.')
exit(0)
except KeyboardInterrupt:
print('\nExiting.')
exit(0)
rpc = local_api_connect(config_dir=config_dir)
assert rpc
log.debug("Revoke {}".format(fqu))
try:
resp = rpc.backend_revoke(fqu, tx_fee)
except Exception as e:
log.exception(e)
return {'error': 'Error talking to server, try again.'}
if 'error' in resp:
log.debug('RPC error: {}'.format(resp['error']))
return resp
if (not 'success' in resp or not resp['success']) and 'message' in resp:
return {'error': resp['message']}
analytics_event('Revoke name', {})
return resp
def cli_migrate(args, config_path=CONFIG_PATH, password=None,
proxy=None, interactive=True, force=False, tx_fee=None):
"""
command: migrate
help: Migrate a name-linked profile to the latest zonefile and profile format
arg: name (str) 'The name to migrate'
opt: force (str) 'Reset the zone file no matter what.'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
password = get_default_password(password)
conf = config.get_config(config_path)
assert conf
res = wallet_ensure_exists(config_path=config_path)
if 'error' in res:
return res
if proxy is None:
proxy = get_default_proxy(config_path=config_path)
fqu = str(args.name)
force = (force or (getattr(args, 'force', '').lower() in ['1', 'yes', 'force', 'true']))
error = check_valid_name(fqu)
if error:
return {'error': error}
# need data public key
_, _, data_pubkey = get_addresses_from_file(config_dir=config_dir)
if data_pubkey is None:
return {'error': 'No data key in wallet'}
res = get_name_zonefile(
fqu, proxy=proxy,
raw_zonefile=True, include_name_record=True
)
user_zonefile = None
user_profile = None
if 'error' not in res:
name_rec = res['name_record']
user_zonefile_txt = res['zonefile']
user_zonefile_hash = storage.get_zonefile_data_hash(user_zonefile_txt)
user_zonefile = None
legacy = False
nonstandard = False
# TODO: handle zone files that do not have data keys.
# try to parse
try:
user_zonefile = blockstack_zones.parse_zone_file(user_zonefile_txt)
legacy = blockstack_profiles.is_profile_in_legacy_format(user_zonefile)
except:
log.warning('Non-standard zonefile {}'.format(user_zonefile_hash))
nonstandard = True
if nonstandard:
if force:
# forcibly reset the zone file
user_profile = make_empty_user_profile()
user_zonefile = make_empty_zonefile(fqu, data_pubkey)
else:
if os.environ.get("BLOCKSTACK_CLIENT_INTERACTIVE_YES", None) != "1":
# prompt
msg = (
''
'WARNING! Non-standard zone file detected.'
'If you proceed, your zone file will be reset.'
''
'Proceed? (y/N): '
)
proceed_str = raw_input(msg)
proceed = proceed_str.lower() in ['y']
if not proceed:
return {'error': 'Non-standard zonefile'}
else:
user_profile = make_empty_user_profile()
user_zonefile = make_empty_zonefile(fqu, data_pubkey)
else:
return {'error': 'Non-standard zonefile'}
# going ahead with zonefile and profile reset
else:
# standard or legacy zone file
if not legacy:
msg = 'Zone file is in the latest format. No migration needed'
return {'error': msg}
# convert
user_profile = blockstack_profiles.get_person_from_legacy_format(user_zonefile)
user_zonefile = make_empty_zonefile(fqu, data_pubkey)
else:
log.error("Failed to get zone file for {}".format(fqu))
return {'error': res['error']}
zonefile_txt = blockstack_zones.make_zone_file(user_zonefile)
zonefile_hash = storage.get_zonefile_data_hash(zonefile_txt)
rpc = local_api_connect(config_dir=config_dir)
assert rpc
try:
resp = rpc.backend_update(fqu, zonefile_txt, user_profile, None, tx_fee)
except Exception as e:
log.exception(e)
return {'error': 'Error talking to server, try again.'}
if 'error' in resp:
log.debug('RPC error: {}'.format(resp['error']))
return resp
if (not 'success' in resp or not resp['success']) and 'message' in resp:
return {'error': resp['message']}
analytics_event('Migrate name', {})
resp['zonefile_hash'] = zonefile_hash
return resp
def cli_wallet_password(args, config_path=CONFIG_PATH, password=None, interactive=True):
"""
command: wallet_password
help: Change your wallet password
opt: old_password (str) 'The old password. It will be prompted if not given.'
opt: new_password (str) 'The new password. It will be prompted if not given.'
"""
password = get_default_password(password)
if password is None:
password = getattr(args, 'password', None)
wallet_path = get_wallet_path(config_path=config_path)
res = load_wallet(password=password, wallet_path=wallet_path, interactive=interactive, include_private=True)
if 'error' in res:
return res
if res['migrated']:
return {'error': 'Wallet is in legacy format. Please migrate it with `setup_wallet`'}
wallet_keys = res['wallet']
password = res['password']
new_password = getattr(args, 'new_password', None)
if new_password is None:
new_password = prompt_wallet_password('Enter new wallet password: ')
new_password_2 = prompt_wallet_password('Re-enter new wallet password: ')
if new_password != new_password_2:
return {'error': 'New passwords do not match'}
if new_password == password:
return {'error': 'Passwords are the same'}
enc_wallet = encrypt_wallet(wallet_keys, new_password)
if 'error' in enc_wallet:
return enc_wallet
legacy_path = backup_wallet(wallet_path=wallet_path)
if legacy_path is None:
return {'error': 'Failed to replace old wallet'}
res = write_wallet(enc_wallet, path=wallet_path)
if 'error' in res:
return res
try:
os.unlink(legacy_path)
except:
pass
return {'status': True}
def cli_setup_wallet(args, config_path=CONFIG_PATH, password=None, interactive=True):
"""
command: setup_wallet
help: Create or upgrade up your wallet.
"""
password = get_default_password(password)
ret = {}
res = wallet_setup(config_path=config_path, interactive=interactive, password=password)
if 'error' in res:
return res
if res.has_key('backup_wallet'):
# return this
ret['backup_wallet'] = res['backup_wallet']
ret['status'] = True
return ret
def cli_set_advanced_mode(args, config_path=CONFIG_PATH):
"""
command: set_advanced_mode
help: Enable advanced commands
arg: status (str) 'On or Off.'
"""
status = str(args.status).lower()
if status not in ['on', 'off']:
return {'error': 'Invalid option; please use "on" or "off"'}
set_advanced_mode((status == 'on'), config_path=config_path)
return {'status': True}
def _get_person_profile(name, proxy=None):
"""
Get the person's zonefile and profile.
Handle legacy zonefiles, but not legacy profiles.
Return {'profile': ..., 'zonefile': ..., 'person': ...} on success
Return {'error': ...} on error
"""
profile, zonefile = get_profile(name, proxy=proxy, use_legacy_zonefile=True)
if 'error' in zonefile:
return {'error': 'Failed to load zonefile: {}'.format(zonefile['error'])}
if blockstack_profiles.is_profile_in_legacy_format(profile):
return {'error': 'Legacy profile'}
person = None
try:
person = blockstack_profiles.Person(profile)
except Exception as e:
log.exception(e)
return {'error': 'Failed to parse profile data into a Person record'}
return {'profile': profile, 'zonefile': zonefile, 'person': person}
def _save_person_profile(name, zonefile, profile, wallet_keys, blockchain_id=None, proxy=None, config_path=CONFIG_PATH):
"""
Save a person's profile, given information fetched with _get_person_profile
Return {'status': True} on success
Return {'error': ...} on error
"""
conf = config.get_config(config_path)
assert conf
required_storage_drivers = conf.get(
'storage_drivers_required_write',
config.BLOCKSTACK_REQUIRED_STORAGE_DRIVERS_WRITE
)
required_storage_drivers = required_storage_drivers.split()
res = put_profile(name, profile, user_zonefile=zonefile,
wallet_keys=wallet_keys, proxy=proxy,
required_drivers=required_storage_drivers, blockchain_id=name,
config_path=config_path )
return res
def _list_accounts(name, proxy=None):
"""
Get the list of accounts in a name's Person-formatted profile.
Return {'accounts': ...} on success
Return {'error': ...} on error
"""
name_info = _get_person_profile(name, proxy=proxy)
if 'error' in name_info:
return name_info
profile = name_info.pop('profile')
zonefile = name_info.pop('zonefile')
person = name_info.pop('person')
accounts = []
if hasattr(person, 'account'):
accounts = person.account
return {'accounts': accounts}
# TODO: consider deprecating for 0.15
def cli_list_accounts( args, proxy=None, config_path=CONFIG_PATH ):
"""
command: list_accounts advanced
help: List the set of accounts in a name's profile.
arg: name (str) 'The name to query.'
"""
if proxy is None:
proxy = get_default_proxy(config_path=config_path)
name = str(args.name)
account_info = _list_accounts(name, proxy=proxy )
if 'error' in account_info:
return account_info
return account_info['accounts']
# TODO: consider deprecating for 0.15
def cli_get_account( args, proxy=None, config_path=CONFIG_PATH ):
"""
command: get_account advanced
help: Get an account from a name's profile.
arg: name (str) 'The name to query.'
arg: service (str) 'The service for which this account was created.'
arg: identifier (str) 'The name of the account.'
"""
if proxy is None:
proxy = get_default_proxy(config_path=config_path)
name = str(args.name)
service = str(args.service)
identifier = str(args.identifier)
account_info = _list_accounts(name, proxy=proxy )
if 'error' in account_info:
return account_info
accounts = account_info['accounts']
for account in accounts:
if not account.has_key('service') or not account.has_key('identifier'):
continue
if account['service'] == service and account['identifier'] == identifier:
return account
return {'error': 'No such account'}
# TODO: consider deprecating for 0.15
def cli_put_account( args, proxy=None, config_path=CONFIG_PATH, password=None, wallet_keys=None ):
"""
command: put_account advanced
help: Add or overwrite an account in a name's profile.
arg: name (str) 'The name to query.'
arg: service (str) 'The service this account is for.'
arg: identifier (str) 'The name of the account.'
arg: content_url (str) 'The URL that points to external contact data.'
opt: extra_data (str) 'A comma-separated list of "name1=value1,name2=value2,name3=value3..." with any extra account information you need in the account.'
"""
password = get_default_password(password)
proxy = get_default_proxy(config_path=config_path) if proxy is None else proxy
config_dir = os.path.dirname(config_path)
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
name = str(args.name)
service = str(args.service)
identifier = str(args.identifier)
content_url = str(args.content_url)
if not is_name_valid(args.name):
return {'error': 'Invalid name'}
if len(args.service) == 0 or len(args.identifier) == 0 or len(args.content_url) == 0:
return {'error': 'Invalid data'}
# parse extra data
extra_data = {}
if hasattr(args, "extra_data") and args.extra_data is not None:
extra_data_str = str(args.extra_data)
if len(extra_data_str) > 0:
extra_data_pairs = extra_data_str.split(",")
for p in extra_data_pairs:
if '=' not in p:
return {'error': "Could not interpret '%s' in '%s'" % (p, extra_data_str)}
parts = p.split("=")
k = parts[0]
if k in ['service', 'identifier', 'contentUrl']:
continue
v = "=".join(parts[1:])
extra_data[k] = v
person_info = _get_person_profile(name, proxy=proxy)
if 'error' in person_info:
return person_info
# make data
new_account = {
'service': service,
'identifier': identifier,
'contentUrl': content_url,
}
new_account.update(extra_data)
zonefile = person_info.pop('zonefile')
profile = person_info.pop('profile')
if not profile.has_key('account'):
profile['account'] = []
# overwrite existing, if given
replaced = False
for i in xrange(0, len(profile['account'])):
account = profile['account'][i]
if not account.has_key('service') or not account.has_key('identifier'):
continue
if account['service'] == service and account['identifier'] == identifier:
profile['account'][i] = new_account
replaced = True
break
if not replaced:
profile['account'].append(new_account)
# save
result = _save_person_profile(name, zonefile, profile, wallet_keys, blockchain_id=name, proxy=proxy, config_path=config_path)
return result
# TODO: consider deprecating for 0.15
def cli_delete_account( args, proxy=None, config_path=CONFIG_PATH, password=None, wallet_keys=None ):
"""
command: delete_account advanced
help: Delete a particular account from a name's profile.
arg: name (str) 'The name to query.'
arg: service (str) 'The service the account is for.'
arg: identifier (str) 'The identifier of the account to delete.'
"""
password = get_default_password(password)
proxy = get_default_proxy(config_path=config_path) if proxy is None else proxy
config_dir = os.path.dirname(config_path)
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
name = str(args.name)
service = str(args.service)
identifier = str(args.identifier)
if not is_name_valid(args.name):
return {'error': 'Invalid name'}
if len(args.service) == 0 or len(args.identifier) == 0:
return {'error': 'Invalid data'}
person_info = _get_person_profile(name, proxy=proxy)
if 'error' in person_info:
return person_info
zonefile = person_info['zonefile']
profile = person_info['profile']
if not profile.has_key('account'):
# nothing to do
return {'error': 'No such account'}
found = False
for i in xrange(0, len(profile['account'])):
account = profile['account'][i]
if not account.has_key('service') or not account.has_key('identifier'):
continue
if account['service'] == service and account['identifier'] == identifier:
profile['account'].pop(i)
found = True
break
if not found:
return {'error': 'No such account'}
result = _save_person_profile(name, zonefile, profile, wallet_keys, blockchain_id=name, proxy=proxy, config_path=config_path)
return result
def cli_import_wallet(args, config_path=CONFIG_PATH, password=None, force=False):
"""
command: import_wallet advanced
help: Set the payment, owner, and data private keys for the wallet.
arg: payment_privkey (str) 'Payment private key. M-of-n multisig is supported by passing the CSV string "m,n,pk1,pk2,...".'
arg: owner_privkey (str) 'Name owner private key. M-of-n multisig is supported by passing the CSV string "m,n,pk1,pk2,...".'
arg: data_privkey (str) 'Data-signing private key. Must be a single private key.'
"""
# we require m and n, even though n can be inferred, so we can at least sanity-check the user's arguments.
# it's hard to get both n and the number of private keys wrong in the same way.
config_dir = os.path.dirname(config_path)
wallet_path = os.path.join(config_dir, WALLET_FILENAME)
password = get_default_password(password)
if force and os.path.exists(wallet_path):
# back up
backup_wallet(wallet_path)
if os.path.exists(wallet_path):
msg = 'Back up or remove current wallet first: {}'
return {
'error': 'Wallet already exists!',
'message': msg.format(wallet_path),
}
if password is None:
while True:
res = make_wallet_password(password)
if 'error' in res and password is None:
print(res['error'])
continue
if password is not None:
return res
password = res['password']
break
try:
assert args.owner_privkey
assert args.payment_privkey
assert args.data_privkey
except Exception, e:
if BLOCKSTACK_DEBUG:
log.exception(e)
return {'error': 'Invalid private keys'}
def parse_multisig_csv(multisig_csv):
"""
Helper to parse 'm,n,pk1,pk2.,,,' into a virtualchain private key bundle.
"""
parts = multisig_csv.split(',')
m = None
n = None
try:
m = int(parts[0])
n = int(parts[1])
assert m <= n
assert len(parts[2:]) == n
except ValueError as ve:
log.exception(ve)
log.debug("Invalid multisig CSV {}".format(multisig_csv))
log.error("Invalid m, n")
return {'error': 'Unparseable m or n'}
except AssertionError as ae:
log.exception(ae)
log.debug("Invalid multisig CSV {}".format(multisig_csv))
log.error("Invalid argument: n must not exceed m, and there must be n private keys")
return {'error': 'Invalid argument: invalid values for m or n'}
keys = parts[2:]
key_info = None
try:
key_info = virtualchain.make_multisig_info(m, keys)
except Exception as e:
if BLOCKSTACK_DEBUG:
log.exception(e)
log.error("Failed to make multisig information from keys")
return {'error': 'Failed to make multisig information'}
return key_info
owner_privkey_info = None
payment_privkey_info = None
data_privkey_info = None
# make absolutely certain that these are valid keys or multisig key strings
try:
owner_privkey_info = virtualchain.BitcoinPrivateKey(str(args.owner_privkey)).to_hex()
except:
log.debug("Owner private key string is not a valid Bitcoin private key")
owner_privkey_info = parse_multisig_csv(args.owner_privkey)
if 'error' in owner_privkey_info:
return owner_privkey_info
try:
payment_privkey_info = virtualchain.BitcoinPrivateKey(str(args.payment_privkey)).to_hex()
except:
log.debug("Payment private key string is not a valid Bitcoin private key")
payment_privkey_info = parse_multisig_csv(args.payment_privkey)
if 'error' in payment_privkey_info:
return payment_privkey_info
try:
data_privkey_info = virtualchain.BitcoinPrivateKey(str(args.data_privkey)).to_hex()
except:
log.error("Only single private keys are supported for data at this time")
return {'error': 'Invalid data private key'}
data = make_wallet(password, config_path=config_path,
payment_privkey_info=payment_privkey_info,
owner_privkey_info=owner_privkey_info,
data_privkey_info=data_privkey_info )
if 'error' in data:
return data
write_wallet(data, path=wallet_path)
if not local_api_status(config_dir=config_dir):
return {'status': True}
# load into RPC daemon, if it is running
rpc = local_api_connect(config_dir=config_dir)
if rpc is None:
log.error("Failed to connect to API endpoint. Trying to shut it down...")
rc = local_rpc.local_api_action('stop', config_dir=config_dir)
if not rc:
log.error("Failed to stop API daemon")
return {'error': 'Failed to load wallet into API endpoint: failed to stop endpoint'}
else:
return {'error': 'Failed to load wallet into API endpoint: failed to connect to endpoint'}
try:
wallet = decrypt_wallet(data, password, config_path=config_path)
if 'error' in wallet:
return {'error': 'Failed to decrypt new wallet'}
rpc.backend_set_wallet( wallet )
except Exception as e:
log.exception(e)
return {'error': 'Failed to load wallet into API endpoint'}
return {'status': True}
def display_wallet_info(payment_address, owner_address, data_public_key, config_path=CONFIG_PATH):
"""
Print out useful wallet information
"""
print('-' * 60)
print('Payment address:\t{}'.format(payment_address))
print('Owner address:\t\t{}'.format(owner_address))
if data_public_key is not None:
print('Data public key:\t{}'.format(data_public_key))
balance = None
if payment_address is not None:
balance = get_balance( payment_address, config_path=config_path )
if balance is None:
print('Failed to look up balance')
else:
balance = satoshis_to_btc(balance)
print('-' * 60)
print('Balance:')
print('{}: {}'.format(payment_address, balance))
print('-' * 60)
names_owned = None
if owner_address is not None:
names_owned = get_names_owned(owner_address)
if names_owned is None or 'error' in names_owned:
print('Failed to look up names owned')
else:
print('Names Owned:')
names_owned = get_names_owned(owner_address)
print('{}: {}'.format(owner_address, names_owned))
print('-' * 60)
def cli_wallet(args, config_path=CONFIG_PATH, interactive=True, password=None):
"""
command: wallet advanced
help: Query wallet information
"""
password = get_default_password(password)
wallet_path = get_wallet_path(config_path=config_path)
payment_address = None
owner_address = None
data_pubkey = None
migrated = False
config_dir = os.path.dirname(config_path)
if local_api_status(config_dir=config_dir):
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
result = wallet_keys
payment_address = result['payment_address']
owner_address = result['owner_address']
data_pubkey = result['data_pubkey']
else:
log.debug("API endpoint does not appear to be running")
res = load_wallet(password=password, wallet_path=wallet_path, interactive=interactive, include_private=True)
if 'error' in res:
return res
wallet = res['wallet']
migrated = res['migrated']
payment_address = wallet['payment_addresses'][0]
owner_address = wallet['owner_addresses'][0]
data_pubkey = wallet['data_pubkey']
result = {
'payment_privkey': wallet['payment_privkey'],
'owner_privkey': wallet['owner_privkey'],
'data_privkey': wallet['data_privkey'],
'payment_address': payment_address,
'owner_address': owner_address,
'data_pubkey': data_pubkey
}
payment_privkey = result.get('payment_privkey', None)
owner_privkey = result.get('owner_privkey', None)
data_privkey = result.get('data_privkey', None)
display_wallet_info(
payment_address,
owner_address,
data_pubkey,
config_path=CONFIG_PATH
)
if migrated:
print ('WARNING: Wallet is in legacy format. Please migrate it with `setup_wallet`.')
print('-' * 60)
print('Payment private key info: {}'.format(privkey_to_string(payment_privkey)))
print('Owner private key info: {}'.format(privkey_to_string(owner_privkey)))
print('Data private key info: {}'.format(privkey_to_string(data_privkey)))
print('-' * 60)
return result
def cli_consensus(args, config_path=CONFIG_PATH):
"""
command: consensus advanced
help: Get current consensus information
opt: block_height (int) 'The block height at which to query the consensus information. If not given, the current height is used.'
"""
result = {}
if args.block_height is None:
# by default get last indexed block
resp = getinfo()
if 'error' in resp:
return resp
if 'last_block_processed' in resp and 'consensus' in resp:
return {'consensus': resp['consensus'], 'block_height': resp['last_block_processed']}
else:
log.debug("Resp is {}".format(resp))
return {'error': 'Server is indexing. Try again shortly.'}
resp = get_consensus_at(int(args.block_height))
data = {}
data['consensus'] = resp
data['block_height'] = args.block_height
result = data
return result
def cli_api(args, password=None, interactive=True, config_path=CONFIG_PATH):
"""
command: api
help: Control the RESTful API endpoint
arg: command (str) '"start", "stop", or "status"'
opt: wallet_password (str) 'The wallet password. Will prompt if required.'
"""
config_dir = CONFIG_DIR
if config_path is not None:
config_dir = os.path.dirname(config_path)
command = str(args.command)
password = get_default_password(password)
if password is None and command == 'start':
password = getattr(args, 'wallet_password', None)
if password is None:
if not interactive:
return {'error': 'No wallet password given, and not in interactive mode'}
password = prompt_wallet_password()
api_pass = getattr(args, 'api_pass', None)
if api_pass is None:
# environment?
api_pass = os.environ.get('BLOCKSTACK_API_PASSWORD', None)
if api_pass is None:
# config file?
conf = config.get_config(config_path)
assert conf
api_pass = conf.get('api_password', None)
if api_pass is None:
return {'error': 'Need --api-password= on the CLI, or `api_password=` set in your config file ({})'.format(config_path)}
rc = local_rpc.local_api_action(str(args.command), config_dir=config_dir, password=password, api_pass=api_pass)
if not rc:
return {'error': 'Failed to {} API server'.format(args.command)}
return {'status': True}
def cli_name_import(args, config_path=CONFIG_PATH):
"""
command: name_import advanced
help: Import a name to a revealed but not-yet-readied namespace
arg: name (str) 'The name to import'
arg: address (str) 'The address of the name recipient'
arg: hash (str) 'The zonefile hash of the name'
arg: privatekey (str) 'One of the private keys of the namespace revealer'
"""
# BROKEN
result = name_import(
str(args.name), str(args.address),
str(args.hash), str(args.privatekey)
)
return result
def cli_namespace_preorder(args, config_path=CONFIG_PATH):
"""
command: namespace_preorder advanced
help: Preorder a namespace
arg: namespace_id (str) 'The namespace ID'
arg: privatekey (str) 'The private key to send and pay for the preorder'
opt: reveal_addr (str) 'The address of the keypair that will import names (automatically generated if not given)'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
# BROKEN
reveal_addr = None
if args.address is not None:
reveal_addr = str(args.address)
result = namespace_preorder(
str(args.namespace_id),
str(args.privatekey),
reveal_addr=reveal_addr
)
return result
def cli_namespace_reveal(args, config_path=CONFIG_PATH):
"""
command: namespace_reveal advanced
help: Reveal a namespace and set its pricing parameters
arg: namespace_id (str) 'The namespace ID'
arg: addr (str) 'The address of the keypair that will import names (given in the namespace preorder)'
arg: lifetime (int) 'The lifetime (in blocks) for each name. Negative means "never expires".'
arg: coeff (int) 'The multiplicative coefficient in the price function.'
arg: base (int) 'The exponential base in the price function.'
arg: bucket_exponents (str) 'A 16-field CSV of name-length exponents in the price function.'
arg: nonalpha_discount (int) 'The denominator that defines the discount for names with non-alpha characters.'
arg: no_vowel_discount (int) 'The denominator that defines the discount for names without vowels.'
arg: privatekey (str) 'The private key of the import keypair (whose address is `addr` above).'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
# BROKEN
bucket_exponents = args.bucket_exponents.split(',')
if len(bucket_exponents) != 16:
msg = '`bucket_exponents` must be a 16-value CSV of integers'
return {'error': msg}
for i in range(len(bucket_exponents)):
try:
bucket_exponents[i] = int(bucket_exponents[i])
assert 0 <= bucket_exponents[i] < 16
except (ValueError, AssertionError) as e:
msg = '`bucket_exponents` must contain integers between 0 and 15, inclusively.'
return {'error': msg}
lifetime = int(args.lifetime)
if lifetime < 0:
lifetime = 0xffffffff # means "infinite" to blockstack-server
# BUG: undefined function
result = namespace_reveal(
str(args.namespace_id),
str(args.addr),
lifetime,
int(args.coeff),
int(args.base),
bucket_exponents,
int(args.nonalpha_discount),
int(args.no_vowel_discount),
str(args.privatekey)
)
return result
def cli_namespace_ready(args, config_path=CONFIG_PATH):
"""
command: namespace_ready advanced
help: Mark a namespace as ready
arg: namespace_id (str) 'The namespace ID'
arg: privatekey (str) 'The private key of the keypair that imports names'
"""
config_dir = os.path.dirname(config_path)
if not local_api_status(config_dir=config_dir):
return {'error': 'API server not running. Please start it with `blockstack api start`.'}
# BROKEN
result = namespace_ready(
str(args.namespace_id),
str(args.privatekey)
)
return result
def cli_put_mutable(args, config_path=CONFIG_PATH, password=None, proxy=None):
"""
command: put_mutable advanced
help: Put signed, versioned data into your storage providers.
arg: name (str) 'The name that points to the zone file to use'
arg: data_id (str) 'The name of the data'
arg: data (str) 'The JSON-serializable data to store'
"""
password = get_default_password(password)
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
config_dir = os.path.dirname(config_path)
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
proxy = get_default_proxy(config_path=config_path) if proxy is None else proxy
result = put_mutable(
str(args.data_id), str(args.data), blockchain_id=fqu,
wallet_keys=wallet_keys, proxy=proxy
)
if 'error' in result:
return result
version = result['version']
fq_data_id = result['fq_data_id']
url = blockstack_mutable_data_url( fqu, fq_data_id, version )
result['url'] = url
return result
def cli_put_immutable(args, config_path=CONFIG_PATH, password=None, proxy=None):
"""
command: put_immutable advanced
help: Put signed, blockchain-hashed data into your storage providers.
arg: name (str) 'The name that points to the zone file to use'
arg: data_id (str) 'The name of the data'
arg: data (str) 'The JSON-formatted data to store'
"""
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
try:
data = json.loads(args.data)
except:
return {'error': 'Invalid JSON'}
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
proxy = get_default_proxy() if proxy is None else proxy
result = put_immutable(
fqu, str(args.data_id), data,
wallet_keys=wallet_keys, proxy=proxy
)
if 'error' in result:
return result
data_hash = result['immutable_data_hash']
url = blockstack_immutable_data_url( fqu, urllib.quote(str(args.data_id)), data_hash )
result['url'] = url
result['hash'] = data_hash
return result
def cli_get_mutable(args, config_path=CONFIG_PATH, proxy=None):
"""
command: get_mutable advanced
help: Get signed, versioned data from storage providers.
arg: name (str) 'The blockchain ID that owns the data'
arg: data_id (str) 'The name of the data'
"""
proxy = get_default_proxy() if proxy is None else proxy
result = get_mutable(str(args.data_id), proxy=proxy, config_path=config_path, blockchain_id=str(args.name))
if 'error' in result:
return result
return {'status': True, 'data': result['data']}
def cli_get_immutable(args, config_path=CONFIG_PATH, proxy=None):
"""
command: get_immutable advanced
help: Get signed, blockchain-hashed data from storage providers.
arg: name (str) 'The name that points to the zone file with the data hash'
arg: data_id_or_hash (str) 'Either the name or the SHA256 of the data to obtain'
"""
proxy = get_default_proxy() if proxy is None else proxy
if is_valid_hash( args.data_id_or_hash ):
result = get_immutable(str(args.name), str(args.data_id_or_hash), proxy=proxy)
if 'error' not in result:
return result
# either not a valid hash, or no such data with this hash.
# maybe this hash-like string is the name of something?
result = get_immutable_by_name(str(args.name), str(args.data_id_or_hash), proxy=proxy)
if 'error' in result:
return result
return {
'data': result['data'],
'hash': result['hash']
}
def cli_get_data(args, config_path=CONFIG_PATH, proxy=None, password=None, wallet_keys=None):
"""
command: get_data advanced
help: Fetch Blockstack data using a blockstack:// URL.
arg: url (str) 'The Blockstack URL'
"""
proxy = get_default_proxy() if proxy is None else proxy
password = get_default_password(password)
url = str(args.url)
try:
res = blockstack_url_fetch( url, proxy=proxy, config_path=config_path)
return res
except PasswordRequiredException:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
res = blockstack_url_fetch( url, proxy=proxy, config_path=config_path, wallet_keys=wallet_keys)
return res
def cli_list_update_history(args, config_path=CONFIG_PATH):
"""
command: list_update_history advanced
help: List the history of update hashes for a name
arg: name (str) 'The name whose data to list'
"""
result = list_update_history(str(args.name))
return result
def cli_list_zonefile_history(args, config_path=CONFIG_PATH):
"""
command: list_zonefile_history advanced
help: List the history of zonefiles for a name (if they can be obtained)
arg: name (str) 'The name whose zonefiles to list'
"""
result = list_zonefile_history(str(args.name))
return result
def cli_list_immutable_data_history(args, config_path=CONFIG_PATH):
"""
command: list_immutable_data_history advanced
help: List all prior hashes of a given immutable datum
arg: name (str) 'The name whose data to list'
arg: data_id (str) 'The data identifier whose history to list'
"""
result = list_immutable_data_history(str(args.name), str(args.data_id))
return result
def cli_delete_immutable(args, config_path=CONFIG_PATH, proxy=None, password=None):
"""
command: delete_immutable advanced
help: Delete an immutable datum from a zonefile.
arg: name (str) 'The name that owns the data'
arg: data_id (str) 'The SHA256 of the data to remove, or the data ID'
"""
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
if proxy is None:
proxy = get_default_proxy()
result = None
if is_valid_hash(str(args.data_id)):
result = delete_immutable(
str(args.name), str(args.data_id),
proxy=proxy, wallet_keys=wallet_keys
)
else:
result = delete_immutable(
str(args.name), None, data_id=str(args.data_id),
proxy=proxy, wallet_keys=wallet_keys
)
return result
def cli_delete_mutable(args, config_path=CONFIG_PATH, password=None, proxy=None):
"""
command: delete_mutable advanced
help: Delete a mutable datum from a profile.
arg: name (str) 'The name that owns the data'
arg: data_id (str) 'The ID of the data to remove'
"""
password = get_default_password(password)
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
config_dir = os.path.dirname(config_path)
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
proxy = get_default_proxy(config_path=config_path) if proxy is None else proxy
result = delete_mutable(str(args.data_id), blockchain_id=str(args.name), proxy=proxy, wallet_keys=wallet_keys)
return result
def cli_get_name_blockchain_record(args, config_path=CONFIG_PATH):
"""
command: get_name_blockchain_record advanced
help: Get the raw blockchain record for a name
arg: name (str) 'The name to list'
"""
result = get_name_blockchain_record(str(args.name))
return result
def cli_get_name_blockchain_history(args, config_path=CONFIG_PATH):
"""
command: get_name_blockchain_history advanced
help: Get a sequence of historic blockchain records for a name
arg: name (str) 'The name to query'
opt: start_block (int) 'The start block height'
opt: end_block (int) 'The end block height'
"""
start_block = args.start_block
if start_block is None:
start_block = FIRST_BLOCK_MAINNET
else:
start_block = int(args.start_block)
end_block = args.end_block
if end_block is None:
# I would love to have to update this number in the future,
# if it proves too small. That would be a great problem
# to have :-)
end_block = 100000000
else:
end_block = int(args.end_block)
result = get_name_blockchain_history(str(args.name), start_block, end_block)
return result
def cli_get_namespace_blockchain_record(args, config_path=CONFIG_PATH):
"""
command: get_namespace_blockchain_record advanced
help: Get the raw namespace blockchain record for a name
arg: namespace_id (str) 'The namespace ID to list'
"""
result = get_namespace_blockchain_record(str(args.namespace_id))
return result
def cli_lookup_snv(args, config_path=CONFIG_PATH):
"""
command: lookup_snv advanced
help: Use SNV to look up a name at a particular block height
arg: name (str) 'The name to query'
arg: block_id (int) 'The block height at which to query the name'
arg: trust_anchor (str) 'The trusted consensus hash, transaction ID, or serial number from a higher block height than `block_id`'
"""
result = lookup_snv(
str(args.name),
int(args.block_id),
str(args.trust_anchor)
)
return result
def cli_get_name_zonefile(args, config_path=CONFIG_PATH):
"""
command: get_name_zonefile advanced
help: Get a name's zonefile
arg: name (str) 'The name to query'
opt: json (str) 'If true is given, try to parse as JSON'
"""
parse_json = getattr(args, 'json', 'false')
parse_json = parse_json is not None and parse_json.lower() in ['true', '1']
result = get_name_zonefile(str(args.name), raw_zonefile=True)
if 'error' in result:
log.error("get_name_zonefile failed: %s" % result['error'])
return result
if 'zonefile' not in result:
return {'error': 'No zonefile data'}
if parse_json:
# try to parse
try:
new_zonefile = decode_name_zonefile(name, result['zonefile'])
assert new_zonefile is not None
result['zonefile'] = new_zonefile
except:
result['warning'] = 'Non-standard zonefile'
return result
def cli_get_names_owned_by_address(args, config_path=CONFIG_PATH):
"""
command: get_names_owned_by_address advanced
help: Get the list of names owned by an address
arg: address (str) 'The address to query'
"""
result = get_names_owned_by_address(str(args.address))
return result
def cli_get_namespace_cost(args, config_path=CONFIG_PATH):
"""
command: get_namespace_cost advanced
help: Get the cost of a namespace
arg: namespace_id (str) 'The namespace ID to query'
"""
result = get_namespace_cost(str(args.namespace_id))
return result
def get_offset_count(offset, count):
return (
int(offset) if offset is not None else -1,
int(count) if count is not None else -1,
)
def cli_get_all_names(args, config_path=CONFIG_PATH):
"""
command: get_all_names advanced
help: Get all names in existence, optionally paginating through them
opt: offset (int) 'The offset into the sorted list of names'
opt: count (int) 'The number of names to return'
"""
offset = int(args.offset) if args.offset is not None else None
count = int(args.count) if args.count is not None else None
result = get_all_names(offset=offset, count=count)
return result
def cli_get_names_in_namespace(args, config_path=CONFIG_PATH):
"""
command: get_names_in_namespace
help: Get the names in a given namespace, optionally paginating through them
arg: namespace_id (str) 'The ID of the namespace to query'
opt: offset (int) 'The offset into the sorted list of names'
opt: count (int) 'The number of names to return'
"""
offset = int(args.offset) if args.offset is not None else None
count = int(args.count) if args.count is not None else None
result = get_names_in_namespace(str(args.namespace_id), offset, count)
return result
def cli_get_nameops_at(args, config_path=CONFIG_PATH):
"""
command: get_nameops_at advanced
help: Get the list of name operations that occurred at a given block number
arg: block_id (int) 'The block height to query'
"""
result = get_nameops_at(int(args.block_id))
return result
def cli_set_zonefile_hash(args, config_path=CONFIG_PATH, password=None, tx_fee=None):
"""
command: set_zonefile_hash advanced
help: Directly set the hash associated with the name in the blockchain.
arg: name (str) 'The name to update'
arg: zonefile_hash (str) 'The RIPEMD160(SHA256(zonefile)) hash'
"""
password = get_default_password(password)
conf = config.get_config(config_path)
assert conf
config_dir = os.path.dirname(config_path)
fqu = str(args.name)
error = check_valid_name(fqu)
if error:
return {'error': error}
zonefile_hash = str(args.zonefile_hash)
if re.match(r'^[a-fA-F0-9]+$', zonefile_hash) is None or len(zonefile_hash) != 40:
return {'error': 'Not a valid zonefile hash'}
# forward along to RESTful server (or registrar)
log.debug("Update {}, zonefile_hash={} tx_fee={}".format(fqu, zonefile_hash, tx_fee))
rpc = local_api_connect(config_dir=config_dir)
assert rpc
try:
resp = rpc.backend_update(fqu, None, None, zonefile_hash, tx_fee )
except Exception as e:
log.exception(e)
return {'error': 'Error talking to server, try again.'}
if 'error' in resp:
log.debug('RPC error: {}'.format(resp['error']))
return resp
if (not 'success' in resp or not resp['success']) and 'message' in resp:
return {'error': resp['message']}
analytics_event('Set zonefile hash', {})
resp['zonefile_hash'] = zonefile_hash
return resp
def cli_unqueue(args, config_path=CONFIG_PATH):
"""
command: unqueue advanced
help: Remove a stuck transaction from the queue.
arg: name (str) 'The affected name'
arg: queue_id (str) 'The type of queue ("preorder", "register", "update", etc)'
arg: txid (str) 'The transaction ID'
"""
conf = config.get_config(config_path)
queue_path = conf['queue_path']
try:
queuedb_remove(
str(args.queue_id), str(args.name),
str(args.txid), path=queue_path
)
except:
msg = 'Failed to remove from queue\n{}'
return {'error': msg.format(traceback.format_exc())}
return {'status': True}
def cli_put_profile(args, config_path=CONFIG_PATH, password=None, proxy=None, force_data=False, wallet_keys=None):
"""
command: put_profile advanced
help: Set the profile for a blockchain ID.
arg: blockchain_id (str) 'The blockchain ID.'
arg: data (str) 'The profile as a JSON string, or a path to the profile.'
"""
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
conf = config.get_config(config_path)
name = str(args.blockchain_id)
profile_json_str = str(args.data)
proxy = get_default_proxy() if proxy is None else proxy
profile = None
if not force_data and is_valid_path(profile_json_str) and os.path.exists(profile_json_str):
# this is a path. try to load it
try:
with open(profile_json_str, 'r') as f:
profile_json_str = f.read()
except:
return {'error': 'Failed to load "{}"'.format(profile_json_str)}
# try to parse it
try:
profile = json.loads(profile_json_str)
except:
return {'error': 'Invalid profile JSON'}
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
required_storage_drivers = conf.get(
'storage_drivers_required_write',
config.BLOCKSTACK_REQUIRED_STORAGE_DRIVERS_WRITE
)
required_storage_drivers = required_storage_drivers.split()
user_zonefile = get_name_zonefile(name, proxy=proxy, wallet_keys=wallet_keys)
if 'error' in user_zonefile:
return user_zonefile
user_zonefile = user_zonefile['zonefile']
if blockstack_profiles.is_profile_in_legacy_format(user_zonefile):
msg = 'Profile in legacy format. Please migrate it with the "migrate" command first.'
return {'error': msg}
res = put_profile(name, profile, user_zonefile=user_zonefile,
wallet_keys=wallet_keys, proxy=proxy,
required_drivers=required_storage_drivers, blockchain_id=name,
config_path=config_path)
if 'error' in res:
return res
return {'status': True}
def cli_delete_profile(args, config_path=CONFIG_PATH, password=None, proxy=None, wallet_keys=None ):
"""
command: delete_profile advanced
help: Delete a profile from a blockchain ID.
arg: blockchain_id (str) 'The blockchain ID.'
"""
proxy = get_default_proxy() if proxy is None else proxy
password = get_default_password(password)
name = str(args.blockchain_id)
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
res = delete_profile(name, user_data_privkey=wallet_keys['data_privkey'], proxy=proxy, wallet_keys=wallet_keys)
return res
def cli_sync_zonefile(args, config_path=CONFIG_PATH, proxy=None, interactive=True, nonstandard=False):
"""
command: sync_zonefile advanced
help: Upload the current zone file to all storage providers.
arg: name (str) 'Name of the zone file to synchronize.'
opt: txid (str) 'NAME_UPDATE transaction ID that set the zone file.'
opt: zonefile (str) 'The zone file (JSON or text), if unavailable from other sources.'
opt: nonstandard (str) 'If true, do not attempt to parse the zonefile. Just upload as-is.'
"""
conf = config.get_config(config_path)
assert 'server' in conf
assert 'port' in conf
assert 'queue_path' in conf
queue_path = conf['queue_path']
name = str(args.name)
proxy = get_default_proxy(config_path=config_path) if proxy is None else proxy
txid = None
if hasattr(args, 'txid'):
txid = getattr(args, 'txid')
user_data, zonefile_hash = None, None
if not nonstandard and getattr(args, 'nonstandard', None):
nonstandard = args.nonstandard.lower() in ['yes', '1', 'true']
if getattr(args, 'zonefile', None) is not None:
# zonefile given
user_data = args.zonefile
valid = False
try:
user_data_res = load_zonefile_from_string(name, user_data)
if 'error' in user_data_res and 'identical' not in user_data_res:
log.warning('Failed to parse zonefile (reason: {})'.format(user_data_res['error']))
else:
valid = True
user_data = user_data_res['zonefile']
except Exception as e:
if BLOCKSTACK_DEBUG is not None:
log.exception(e)
valid = False
# if it's not a valid zonefile, ask if the user wants to sync
if not valid and interactive:
proceed = prompt_invalid_zonefile()
if not proceed:
return {'error': 'Not replicating invalid zone file'}
elif not valid and not nonstandard:
return {'error': 'Not replicating invalid zone file'}
else:
pass
if txid is None or user_data is None:
# load zonefile and txid from queue?
queued_data = queuedb_find('update', name, path=queue_path)
if queued_data:
# find the current one (get raw zonefile)
log.debug("%s updates queued for %s" % (len(queued_data), name))
for queued_zfdata in queued_data:
update_data = queue_extract_entry(queued_zfdata)
zfdata = update_data.get('zonefile', None)
if zfdata is None:
continue
user_data = zfdata
txid = queued_zfdata.get('tx_hash', None)
break
if user_data is None:
# not in queue. Maybe it's available from one of the storage drivers?
log.debug('no pending updates for "{}"; try storage'.format(name))
user_data = get_name_zonefile( name, raw_zonefile=True )
if 'error' in user_data:
msg = 'Failed to get zonefile: {}'
log.error(msg.format(user_data['error']))
return user_data
user_data = user_data['zonefile']
# have user data
zonefile_hash = storage.get_zonefile_data_hash(user_data)
if txid is None:
# not in queue. Fetch from blockstack server
name_rec = get_name_blockchain_record(name, proxy=proxy)
if 'error' in name_rec:
msg = 'Failed to get name record for {}: {}'
log.error(msg.format(name, name_rec['error']))
msg = 'Failed to get name record to look up tx hash.'
return {'error': msg}
# find the tx hash that corresponds to this zonefile
if name_rec['op'] == NAME_UPDATE:
if name_rec['value_hash'] == zonefile_hash:
txid = name_rec['txid']
else:
name_history = name_rec['history']
for history_key in reversed(sorted(name_history)):
name_history_item = name_history[history_key]
op = name_history_item.get('op', None)
if op is None:
continue
if op != NAME_UPDATE:
continue
value_hash = name_history_item.get('value_hash', None)
if value_hash is None:
continue
if value_hash != zonefile_hash:
continue
txid = name_history_item.get('txid', None)
break
if txid is None:
log.error('Unable to lookup txid for update {}, {}'.format(name, zonefile_hash))
return {'error': 'Unable to lookup txid that wrote zonefile'}
# can proceed to replicate
res = zonefile_data_replicate(
name, user_data, txid,
[(conf['server'], conf['port'])],
config_path=config_path
)
if 'error' in res:
log.error('Failed to replicate zonefile: {}'.format(res['error']))
return res
return {'status': True, 'zonefile_hash': zonefile_hash}
def cli_convert_legacy_profile(args, config_path=CONFIG_PATH):
"""
command: convert_legacy_profile advanced
help: Convert a legacy profile into a modern profile.
arg: path (str) 'Path on disk to the JSON file that contains the legacy profile data from Onename'
"""
profile_json_str, profile = None, None
try:
with open(args.path, 'r') as f:
profile_json_str = f.read()
profile = json.loads(profile_json_str)
except:
return {'error': 'Failed to load profile JSON'}
# should have 'profile' key
if 'profile' not in profile:
return {'error': 'JSON has no "profile" key'}
profile = profile['profile']
profile = blockstack_profiles.get_person_from_legacy_format(profile)
return profile
def get_app_name(appname):
"""
Get the application name, or if not given, the default name
"""
return appname if appname is not None else '_default'
def cli_app_publish( args, config_path=CONFIG_PATH, interactive=False, password=None, proxy=None ):
"""
command: app_publish advanced
help: Publish a Blockstack application
arg: blockchain_id (str) 'The blockchain ID that will own the application'
arg: app_domain (str) 'The application domain name'
arg: methods (str) 'A comma-separated list of API methods this application will call'
arg: index_file (str) 'The path to the index file'
opt: urls (str) 'A comma-separated list of URLs to publish the index file to'
opt: drivers (str) 'A comma-separated list of storage drivers for clients to use'
"""
password = get_default_password(password)
blockchain_id = str(args.blockchain_id)
app_domain = str(args.app_domain)
config_dir = os.path.dirname(config_path)
if proxy is None:
proxy = get_default_proxy(config_path)
index_file_data = None
try:
with open(args.index_file, 'r') as f:
index_file_data = f.read()
except:
return {'error': 'Failed to load index file'}
methods = None
if hasattr(args, 'methods') and args.methods is not None:
methods = str(args.methods).split(',')
# TODO: validate
else:
methods = []
drivers = []
if hasattr(args, 'drivers') and args.drivers is not None:
drivers = str(args.drivers).split(",")
uris = []
index_data_id = '{}/index.html'.format(app_domain)
if not hasattr(args, 'urls') or args.urls is not None:
urls = str(args.urls).split(',')
else:
urls = get_driver_urls( index_data_id, get_storage_handlers() )
uris = [url_to_uri_record(u, datum_name=index_data_id) for u in urls]
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
res = app_publish( blockchain_id, app_domain, methods, uris, index_file_data, app_driver_hints=drivers, wallet_keys=wallet_keys, proxy=proxy, config_path=config_path )
if 'error' in res:
return res
return {'status': True}
def cli_app_get_config( args, config_path=CONFIG_PATH, interactive=False, proxy=None ):
"""
command: app_get_config advanced
help: Get the configuration structure for an application.
arg: blockchain_id (str) 'The app owner blockchain ID'
arg: app_domain (str) 'The application domain name'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
blockchain_id = str(args.blockchain_id)
app_domain = str(args.app_domain)
app_config = app_get_config(blockchain_id, app_domain, proxy=proxy, config_path=config_path )
return app_config
def cli_app_get_resource( args, config_path=CONFIG_PATH, interactive=False, proxy=None ):
"""
command: app_get_resource advanced
help: Get an application resource from mutable storage.
arg: blockchain_id (str) 'The app owner blockchain ID'
arg: app_domain (str) 'The application domain name'
arg: res_path (str) 'The resource path'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
blockchain_id = str(args.blockchain_id)
app_domain = str(args.app_domain)
res_path = str(args.res_path)
res = app_get_resource( blockchain_id, app_domain, res_path, proxy=proxy, config_path=config_path )
return res
def cli_app_put_resource( args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None ):
"""
command: app_put_resource advanced
help: Store an application resource from mutable storage.
arg: blockchain_id (str) 'The app owner blockchain ID'
arg: app_domain (str) 'The application domain name'
arg: res_path (str) 'The location to which to store this resource'
arg: res_file (str) 'The path on disk to the resource to upload'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
blockchain_id = str(args.blockchain_id)
app_domain = str(args.app_domain)
res_path = str(args.res_path)
res_file_path = str(args.res_file)
resdata = None
if not os.path.exists(res_file_path):
return {'error': 'No such file or directory'}
with open(res_file_path, "r") as f:
resdata = f.read()
config_dir = os.path.dirname(config_path)
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
res = app_put_resource( blockchain_id, app_domain, res_path, resdata, proxy=proxy, wallet_keys=wallet_keys, config_path=config_path )
return res
def cli_app_delete_resource( args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None ):
"""
command: app_delete_resource advanced
help: Delete an application resource from mutable storage.
arg: blockchain_id (str) 'The app owner blockchain ID'
arg: app_domain (str) 'The application domain name'
arg: res_path (str) 'The location to which to store this resource'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
blockchain_id = str(args.blockchain_id)
app_domain = str(args.app_domain)
res_path = str(args.res_path)
config_dir = os.path.dirname(config_path)
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
res = app_delete_resource( blockchain_id, app_domain, res_path, proxy=proxy, wallet_keys=wallet_keys, config_path=config_path )
return res
def cli_app_signin(args, config_path=CONFIG_PATH, password=None, interactive=True, wallet_keys=None):
"""
command: app_signin advanced
help: Create a session token for the RESTful API for a given application
arg: app_domain (str) 'The application domain'
arg: api_methods (str) 'A CSV of requested methods to call'
opt: session_lifetime (int) 'The lifetime of this token, in seconds'
opt: blockchain_ids (str) 'A CSV of blockchain IDs to use to authenticate content'
opt: app_user_id (str) 'The application user ID to use'
"""
app_domain = str(args.app_domain)
api_methods = str(args.api_methods)
session_lifetime = getattr(args, 'session_lifetime', None)
blockchain_ids = getattr(args, 'blockchain_ids', None)
app_user_id = getattr(args, 'app_user_id', None)
if session_lifetime is None:
session_lifetime = DEFAULT_SESSION_LIFETIME
if app_user_id is not None:
app_user_id = str(app_user_id)
if blockchain_ids is not None:
blockchain_ids = blockchain_ids.split(',')
api_methods = api_methods.split(',')
# TODO: validate API methods
# TODO: fetch api methods from app domain, if need be
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
# RPC daemon must be running
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
log.error("Failed to get wallet keys: {}".format(wallet_keys['error']))
return wallet_keys
master_data_privkey = str(wallet_keys['data_privkey'])
res = app_make_session( app_domain, api_methods, master_data_privkey, blockchain_ids=blockchain_ids, session_lifetime=session_lifetime, config_path=config_path )
if 'error' in res:
log.error("Failed to make session: {}".format(wallet_keys['error']))
return res
return {'status': True, 'token': res['session_token']}
def cli_sign_profile( args, config_path=CONFIG_PATH, proxy=None, password=None, interactive=False ):
"""
command: sign_profile advanced raw
help: Sign a JSON file to be used as a profile.
arg: path (str) 'The path to the profile data on disk.'
opt: privkey (str) 'The optional private key to sign it with (defaults to the data private key in your wallet)'
"""
if proxy is None:
proxy = get_default_proxy(config_path=config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
path = str(args.path)
data_json = None
try:
with open(path, 'r') as f:
dat = f.read()
data_json = json.loads(dat)
except Exception as e:
if os.environ.get("BLOCKSTACK_DEBUG") == "1":
log.exception(e)
log.error("Failed to load {}".format(path))
return {'error': 'Failed to load {}'.format(path)}
privkey = None
if hasattr(args, "privkey") and args.privkey:
privkey = str(args.privkey)
else:
wallet_keys = get_wallet_keys( config_path, password )
if 'error' in wallet_keys:
return wallet_keys
if not wallet_keys.has_key('data_privkey'):
log.error("No data private key in the wallet. You may need to explicitly select a private key.")
return {'error': 'No data private key set.\nTry passing your owner private key.'}
privkey = wallet_keys['data_privkey']
privkey = ECPrivateKey(privkey).to_hex()
pubkey = get_pubkey_hex(privkey)
res = storage.serialize_mutable_data(data_json, privkey, pubkey, profile=True)
if res is None:
return {'error': 'Failed to sign and serialize profile'}
if BLOCKSTACK_DEBUG:
# sanity check
assert storage.parse_mutable_data(res, pubkey)
return res
def cli_verify_profile( args, config_path=CONFIG_PATH, proxy=None, interactive=False ):
"""
command: verify_profile advanced
help: Verify a profile JWT and deserialize it into a profile object.
arg: name (str) 'The name that points to the public key to use to verify.'
arg: path (str) 'The path to the profile data on disk'
opt: pubkey (str) 'The public key to use to verify. Overrides `name`.'
"""
if proxy is None:
proxy = get_default_proxy(config_path=config_path)
name = str(args.name)
path = str(args.path)
pubkey = None
if not os.path.exists(path):
return {'error': 'No such file or directory'}
if hasattr(args, 'pubkey'):
pubkey = str(args.pubkey)
try:
pubkey = ECPublicKey(pubkey).to_hex()
except:
return {'error': 'Invalid public key'}
if pubkey is None:
zonefile_data = None
# get the pubkey
zonefile_data_res = get_name_zonefile(
name, proxy=proxy, raw_zonefile=True
)
if 'error' not in zonefile_data_res:
zonefile_data = zonefile_data_res['zonefile']
else:
return {'error': "Failed to get zonefile data: {}".format(name)}
# parse
zonefile_dict = None
try:
zonefile_dict = blockstack_zones.parse_zone_file(zonefile_data)
except:
return {'error': 'Nonstandard zone file'}
pubkey = user_zonefile_data_pubkey(zonefile_dict)
if pubkey is None:
return {'error': 'No data public key in zone file'}
profile_data = None
try:
with open(path, 'r') as f:
profile_data = f.read()
except:
return {'error': 'Failed to read profile file'}
res = storage.parse_mutable_data(profile_data, pubkey)
if res is None:
return {'error': 'Failed to verify profile'}
return res
def cli_sign_data( args, config_path=CONFIG_PATH, proxy=None, password=None, interactive=False ):
"""
command: sign_data advanced raw
help: Sign data to be used in a data store.
arg: path (str) 'The path to the profile data on disk.'
opt: privkey (str) 'The optional private key to sign it with (defaults to the data private key in your wallet)'
"""
if proxy is None:
proxy = get_default_proxy(config_path=config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
path = str(args.path)
data = None
try:
with open(path, 'r') as f:
data = f.read()
data = data_blob_serialize(data)
except Exception as e:
if os.environ.get("BLOCKSTACK_DEBUG") == "1":
log.exception(e)
log.error("Failed to load {}".format(path))
return {'error': 'Failed to load {}'.format(path)}
privkey = None
if hasattr(args, "privkey") and args.privkey:
privkey = str(args.privkey)
else:
wallet_keys = get_wallet_keys( config_path, password )
if 'error' in wallet_keys:
return wallet_keys
if not wallet_keys.has_key('data_privkey'):
log.error("No data private key in the wallet. You may need to explicitly select a private key.")
return {'error': 'No data private key set.\nTry passing your owner private key.'}
privkey = wallet_keys['data_privkey']
privkey = ECPrivateKey(privkey).to_hex()
pubkey = get_pubkey_hex(privkey)
res = storage.serialize_mutable_data(data, privkey, pubkey)
if res is None:
return {'error': 'Failed to sign and serialize data'}
# sanity check
if BLOCKSTACK_DEBUG:
assert storage.parse_mutable_data(res, pubkey)
return res
def cli_verify_data( args, config_path=CONFIG_PATH, proxy=None, interactive=True ):
"""
command: verify_data advanced raw
help: Verify signed data and return the payload.
arg: name (str) 'The name that points to the public key to use to verify.'
arg: path (str) 'The path to the profile data on disk'
opt: pubkey (str) 'The public key to use to verify. Overrides `name`.'
"""
if proxy is None:
proxy = get_default_proxy(config_path=config_path)
name = str(args.name)
path = str(args.path)
pubkey = None
if not os.path.exists(path):
return {'error': 'No such file or directory'}
if hasattr(args, 'pubkey') and args.pubkey is not None:
pubkey = str(args.pubkey)
try:
pubkey = ECPublicKey(pubkey).to_hex()
except:
return {'error': 'Invalid public key'}
if pubkey is None:
zonefile_data = None
# get the pubkey
zonefile_data_res = get_name_zonefile(
name, proxy=proxy, raw_zonefile=True
)
if 'error' not in zonefile_data_res:
zonefile_data = zonefile_data_res['zonefile']
else:
return {'error': "Failed to get zonefile data: {}".format(name)}
# parse
zonefile_dict = None
try:
zonefile_dict = blockstack_zones.parse_zone_file(zonefile_data)
except:
return {'error': 'Nonstandard zone file'}
pubkey = user_zonefile_data_pubkey(zonefile_dict)
if pubkey is None:
return {'error': 'No data public key in zone file'}
data = None
try:
with open(path, 'r') as f:
data = f.read().strip()
except:
return {'error': 'Failed to read file'}
res = storage.parse_mutable_data(data, pubkey)
if res is None:
return {'error': 'Failed to verify data'}
return data_blob_parse(res)
def cli_list_device_ids( args, config_path=CONFIG_PATH, proxy=None ):
"""
command: list_device_ids advanced
help: Get the list of known devices that write to your data stores
"""
try:
device_ids = config.get_all_device_ids(config_path=config_path)
return {'device_ids': device_ids}
except AssertionError:
return {'error': 'Failed to read config file'}
def cli_get_device_id( args, config_path=CONFIG_PATH, proxy=None ):
"""
command: get_device_id advanced
help: Get this device's ID
"""
try:
device_id = config.get_local_device_id(config_path=config_path)
return {'device_id': device_id}
except AssertionError:
return {'error': 'Failed to read config file'}
def cli_add_device_id( args, config_path=CONFIG_PATH, proxy=None ):
"""
command: add_device_id advanced
help: Add a device that can read and write your data
arg: device_id (str) 'The ID of the device to add'
"""
try:
device_ids = config.get_all_device_ids(config_path=config_path)
device_id_str = ','.join( list(set(device_ids + [str(args.device_id)])) )
config.write_config_field( config_path, 'blockstack-client', 'default_devices', device_id_str )
return {'status': True}
except AssertionError:
return {'error': 'Failed to add device'}
def cli_remove_device_id( args, config_path=CONFIG_PATH, proxy=None ):
"""
command: remove_device_id advanced
help: Remove a device ID so this device will ignore its data
arg: device_id (str) 'The ID of the device to remove'
"""
try:
device_id = str(args.device_id)
device_ids = config.get_all_device_ids(config_path=config_path)
if device_id not in device_ids:
return {'status': True}
device_ids.remove(device_id)
device_id_str = ','.join(device_ids)
config.write_config_field( config_path, 'blockstack-client', 'default_devices', device_id_str )
return {'status': True}
except AssertionError:
return {'error': 'Failed to remove device'}
def _remove_datastore(datastore, datastore_privkey, rmtree=True, force=False, config_path=CONFIG_PATH, proxy=None ):
"""
Delete a user datastore
If rmtree is True, then the datastore will be emptied first.
If force is True, then the datastore will be deleted even if rmtree fails
Return {'status': True} on success
Return {'error': ...} on error
"""
datastore_pubkey = get_pubkey_hex(datastore_privkey)
datastore_id = datastore_get_id(datastore_pubkey)
# clear the datastore
if rmtree:
log.debug("Clear datastore {}".format(datastore_id))
res = datastore_rmtree(datastore, '/', datastore_privkey, config_path=config_path, proxy=proxy)
if 'error' in res and not force:
log.error("Failed to rmtree datastore {}".format(datastore_id))
return {'error': 'Failed to remove all files and directories', 'errno': errno.ENOTEMPTY}
# delete the datastore record
log.debug("Delete datastore {}".format(datastore_id))
return delete_datastore(datastore_privkey, force=force, config_path=config_path, proxy=proxy )
def get_datastore_privkey_info( app_domain, wallet_keys, app_user_privkey=None, password=None, config_path=CONFIG_PATH, proxy=None ):
"""
Get the application datastore private key info
Return {'status': True, 'datastore': ..., 'datastore_privkey': ..., 'datastore_id': ...} on success
Return {'error': ...} on error
"""
master_data_privkey = None
if app_user_privkey is None:
if wallet_keys is None:
password = get_default_password(password)
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
wallet_keys['errno'] = errno.EPERM
return wallet_keys
master_data_privkey = wallet_keys['data_privkey']
res = get_datastore_info( app_user_privkey=app_user_privkey, master_data_privkey=master_data_privkey, app_domain=app_domain, config_path=config_path, proxy=proxy )
return res
def create_datastore_by_type( datastore_type, app_domain, proxy=None, config_path=CONFIG_PATH, password=None, wallet_keys=None ):
"""
Create a datastore or a collection for the given user with the given name.
Return {'status': True} on success
Return {'error': ...} on error
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
if wallet_keys is None:
# RPC daemon must be running
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
wallet_keys['errno'] = errno.EPERM
return wallet_keys
assert 'data_privkey' in wallet_keys, str(wallet_keys)
master_data_privkey = wallet_keys['data_privkey']
assert master_data_privkey is not None and app_domain is not None
res = get_datastore_info( master_data_privkey=master_data_privkey, app_domain=app_domain, config_path=config_path, proxy=proxy )
if 'error' not in res:
# already exists
return {'error': 'Datastore exists', 'errno': errno.EEXIST}
datastore_privkey = datastore_get_privkey( master_data_privkey, app_domain, config_path=config_path )
datastore_info = make_datastore( datastore_type, datastore_privkey, config_path=CONFIG_PATH)
if 'error' in datastore_info:
return datastore_info
res = put_datastore(datastore_info, datastore_privkey, proxy=proxy, config_path=config_path)
if 'error' in res:
return res
return {'status': True}
def get_datastore_by_type( datastore_type, datastore_id, config_path=CONFIG_PATH, proxy=None ):
"""
Get a datastore or collection.
Requires datastore_id, or app_domain and wallet keys (from config_path and password)
Return the datastore object on success, optionally with private key information.
Return {'error': ...} on error
"""
if proxy is None:
proxy = get_default_proxy(config_path)
datastore_info = get_datastore_info( datastore_id=datastore_id, config_path=config_path, proxy=proxy )
if 'error' in datastore_info:
return datastore_info
datastore = datastore_info['datastore']
if datastore['type'] != datastore_type:
return {'error': '{} is a {}'.format(datastore_id, datastore['type'])}
return datastore
def delete_datastore_by_type( datastore_type, app_domain, app_user_privkey=None, force=False, config_path=CONFIG_PATH, proxy=None, password=None, wallet_keys=None ):
"""
Delete a datastore or collection.
Return {'status': True} on success
Return {'error': ...} on error
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
datastore_info = get_datastore_privkey_info( app_domain, wallet_keys, app_user_privkey=app_user_privkey, config_path=config_path, proxy=proxy )
if 'error' in datastore_info:
return datastore_info
datastore = datastore_info['datastore']
if datastore['type'] != datastore_type:
return {'error': '{} is a {}'.format(datastore_id, datastore['type'])}
res = _remove_datastore(datastore, datastore_info['datastore_privkey'], rmtree=True, force=force, config_path=config_path, proxy=proxy )
if 'error' in res:
log.error("Failed to delete datastore record")
return res
return {'status': True}
def datastore_file_get(datastore_type, datastore_id, path, proxy=None, config_path=CONFIG_PATH ):
"""
Get a file from a datastore or collection.
Return {'status': True, 'file': ...} on success
Return {'error': ...} on error
"""
if proxy is None:
proxy = get_default_proxy(config_path)
config_dir = os.path.dirname(config_path)
datastore_info = get_datastore_info( datastore_id=datastore_id, config_path=config_path, proxy=proxy)
if 'error' in datastore_info:
if 'errno' not in datastore_info:
datastore_info['errno'] = errno.EPERM
return datastore_info
datastore = datastore_info['datastore']
if datastore['type'] != datastore_type:
return {'error': '{} is a {}'.format(datastore_id, datastore['type'])}
res = datastore_getfile( datastore, path, config_path=config_path, proxy=proxy )
return res
def datastore_file_put(datastore_type, datastore_privkey, path, data, create=True, app_domain=None, force_data=False, proxy=None, password=None, wallet_keys=None, config_path=CONFIG_PATH ):
"""
Put a file int oa datastore or collection.
need either datastore_id, or access to the wallet and the app_domain
Return {'status': True} on success
Return {'error': ...} on failure.
If this is a collection, then path must be in the root directory
"""
if proxy is None:
proxy = get_default_proxy(config_path)
config_dir = os.path.dirname(config_path)
# is this a path, and are we allowed to take paths?
if is_valid_path(data) and os.path.exists(data) and not force_data:
log.warning("Using data in file {}".format(data))
try:
with open(data) as f:
data = f.read()
except:
return {'error': 'Failed to read "{}"'.format(data)}
datastore_info = get_datastore_privkey_info( app_domain, wallet_keys, app_user_privkey=datastore_privkey, config_path=config_path, proxy=proxy )
if 'error' in datastore_info:
datastore_info['errno'] = errno.EPERM
return datastore_info
datastore = datastore_info['datastore']
datastore_privkey = datastore_info['datastore_privkey']
datastore_id = datastore_info['datastore_id']
assert datastore_id == datastore_get_id(get_pubkey_hex(datastore_privkey))
log.debug("putfile {} to {} (for {})".format(path, datastore_id, app_domain))
res = datastore_putfile( datastore, path, data, datastore_privkey, create=create, config_path=config_path, proxy=proxy )
if 'error' in res:
return res
# make url
url = blockstack_datastore_url( datastore_id, app_domain, path )
res['url'] = url
return res
def datastore_dir_list(datastore_type, datastore_id, path, config_path=CONFIG_PATH, proxy=None ):
"""
List a directory in a datastore or collection
Return {'status': True, 'dir': ...} on success
Return {'error': ...} on error
"""
if proxy is None:
proxy = get_default_proxy(config_path)
config_dir = os.path.dirname(config_path)
datastore_info = get_datastore_info(datastore_id=datastore_id, config_path=config_path, proxy=proxy)
if 'error' in datastore_info:
if 'errno' not in datastore_info:
datastore_info['errno'] = errno.EPERM
return datastore_info
datastore = datastore_info['datastore']
if datastore['type'] != datastore_type:
return {'error': '{} is a {}'.format(datastore_id, datastore['type']), 'errno': errno.EINVAL}
if datastore_type == 'collection':
# can only be '/'
if path != '/':
return {'error': 'Invalid argument: collections do not have directories', 'errno': errno.EINVAL}
res = datastore_listdir( datastore, path, config_path=config_path, proxy=proxy )
return res
def datastore_path_stat(datastore_type, datastore_id, path, proxy=None, config_path=CONFIG_PATH ):
"""
Stat a path in a datastore or collection
Return {'status': True, 'inode': ...} on success
Return {'error': ...} on error
"""
if proxy is None:
proxy = get_default_proxy(config_path)
config_dir = os.path.dirname(config_path)
datastore_info = get_datastore_info(datastore_id=datastore_id, config_path=config_path, proxy=proxy)
if 'error' in datastore_info:
return datastore_info
datastore = datastore_info['datastore']
if datastore['type'] != datastore_type:
return {'error': '{} is a {}'.format(datastore_id, datastore['type'])}
res = datastore_stat( datastore, path, config_path=config_path, proxy=proxy )
return res
def cli_get_datastore( args, config_path=CONFIG_PATH, proxy=None ):
"""
command: get_datastore advanced
help: Get a datastore record
arg: app_user_id (str) 'The application user ID that owns the datastore'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
datastore_id = str(args.app_user_id)
return get_datastore_by_type('datastore', datastore_id, config_path=config_path, proxy=proxy )
def cli_create_datastore( args, config_path=CONFIG_PATH, proxy=None, password=None, wallet_keys=None ):
"""
command: create_datastore advanced
help: Make a new datastore for a given app user account.
arg: app_domain (str) 'The domain name of the application.'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
return create_datastore_by_type('datastore', str(args.app_domain), proxy=proxy, config_path=config_path, password=password, wallet_keys=wallet_keys )
def cli_delete_datastore( args, config_path=CONFIG_PATH, proxy=None, password=None, wallet_keys=None ):
"""
command: delete_datastore advanced
help: Delete a datastore owned by a given user, and all of the data it contains.
arg: app_domain (str) 'The domain of the application for which this datastore exists'
opt: force (str) 'If True, then delete the datastore even if it cannot be emptied'
opt: app_user_privkey (str) 'If given, then this is the app user private key'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
app_domain = str(args.app_domain)
force = False
if hasattr(args, 'force'):
force = (str(args.force).lower() in ['1', 'true', 'force', 'yes'])
app_user_privkey = getattr(args, 'app_user_privkey', None)
if app_user_privkey is not None:
app_user_privkey = str(app_user_privkey)
return delete_datastore_by_type('datastore', app_domain, app_user_privkey=app_user_privkey, force=force, config_path=config_path, proxy=proxy, password=password, wallet_keys=wallet_keys)
def cli_datastore_mkdir( args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None, wallet_keys=None ):
"""
command: datastore_mkdir advanced
help: Make a directory in a datastore.
arg: app_domain (str) 'The application domain of this datastore'
arg: path (str) 'The path to the directory to remove'
opt: app_user_privkey (str) 'The app-specific private key'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
app_domain = str(args.app_domain)
config_dir = os.path.dirname(config_path)
path = str(args.path)
app_user_privkey = getattr(args, 'app_user_privkey', None)
if app_user_privkey is not None:
app_user_privkey = str(app_user_privkey)
master_data_privkey = None
if app_user_privkey is None:
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
wallet_keys['errno'] = errno.EPERM
return wallet_keys
master_data_privkey = wallet_keys['data_privkey']
datastore_info = get_datastore_info(app_user_privkey=app_user_privkey, master_data_privkey=master_data_privkey, app_domain=app_domain, config_path=config_path, proxy=proxy)
if 'error' in datastore_info:
return datastore_info
datastore_id = datastore_info['datastore_id']
datastore = datastore_info['datastore']
datastore_privkey_hex = datastore_info['datastore_privkey']
assert datastore_id == datastore_get_id(get_pubkey_hex(datastore_privkey_hex))
res = datastore_mkdir(datastore, path, datastore_privkey_hex, config_path=config_path, proxy=proxy)
if 'error' in res:
return res
# make url
if not path.endswith('/'):
path += '/'
url = blockstack_datastore_url( datastore_id, app_domain, path )
res['url'] = url
return res
def cli_datastore_rmdir( args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None, wallet_keys=None ):
"""
command: datastore_rmdir advanced
help: Remove a directory in a datastore.
arg: app_domain (str) 'The application domain for this data store'
arg: path (str) 'The path to the directory to remove'
opt: app_user_privkey (str) 'The app-specific user private key'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
app_domain = str(args.app_domain)
path = str(args.path)
app_user_privkey = getattr(args, 'app_user_privkey', None)
if app_user_privkey is not None:
app_user_privkey = str(app_user_privkey)
master_data_privkey = None
if app_user_privkey is None:
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
wallet_keys['errno'] = errno.EPERM
return wallet_keys
master_data_privkey = wallet_keys['data_privkey']
datastore_info = get_datastore_info(app_user_privkey=app_user_privkey, master_data_privkey=master_data_privkey, app_domain=app_domain, config_path=config_path, proxy=proxy)
if 'error' in datastore_info:
return datastore_info
datastore_id = datastore_info['datastore_id']
datastore = datastore_info['datastore']
datastore_privkey_hex = datastore_info['datastore_privkey']
assert datastore_id == datastore_get_id(get_pubkey_hex(datastore_privkey_hex))
res = datastore_rmdir(datastore, path, datastore_privkey_hex, config_path=config_path, proxy=proxy )
return res
def cli_datastore_getfile( args, config_path=CONFIG_PATH, interactive=False, proxy=None ):
"""
command: datastore_getfile advanced
help: Get a file from a datastore.
arg: app_user_id (str) 'The ID of the application user'
arg: path (str) 'The path to the file to load'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
app_user_id = str(args.app_user_id)
path = str(args.path)
return datastore_file_get('datastore', app_user_id, path, config_path=config_path, proxy=proxy)
def cli_datastore_listdir(args, config_path=CONFIG_PATH, interactive=False, proxy=None ):
"""
command: datastore_listdir advanced
help: List a directory in the datastore.
arg: app_user_id (str) 'The ID of the application user'
arg: path (str) 'The path to the directory to list'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
app_user_id = str(args.app_user_id)
path = str(args.path)
return datastore_dir_list('datastore', app_user_id, path, config_path=config_path, proxy=proxy)
def cli_datastore_stat(args, config_path=CONFIG_PATH, interactive=False, proxy=None):
"""
command: datastore_stat advanced
help: Stat a file or directory in the datastore
arg: app_user_id (str) 'The ID of the application user'
arg: path (str) 'The path to the file or directory to stat'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
path = str(args.path)
app_user_id = str(args.app_user_id)
return datastore_path_stat('datastore', app_user_id, path, proxy=proxy, config_path=config_path)
def cli_datastore_putfile(args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None, force_data=False, wallet_keys=None ):
"""
command: datastore_putfile advanced
help: Put a file into the datastore at the given path.
arg: app_domain (str) 'The application for this datastore'
arg: path (str) 'The path to the new file'
arg: data (str) 'The data to store, or a path to a file with the data'
opt: create (str) 'If True, then only succeed if the file does not exist already'
opt: app_user_privkey (str) 'If given, then this is the application user private key'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
app_domain = str(args.app_domain)
path = str(args.path)
data = args.data
create = (str(getattr(args, "create", "")).lower() in ['1', 'create', 'true'])
app_user_privkey = getattr(args, 'app_user_privkey', None)
if app_user_privkey is not None:
app_user_privkey = str(app_user_privkey)
return datastore_file_put('datastore', app_user_privkey, path, data, create=create, app_domain=app_domain, wallet_keys=wallet_keys, password=password, force_data=force_data, proxy=proxy, config_path=config_path )
def cli_datastore_deletefile(args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None, wallet_keys=None ):
"""
command: datastore_deletefile advanced
help: Delete a file from the datastore.
arg: app_domain (str) 'The application domain of this data store'
arg: path (str) 'The path to the file to delete'
opt: app_user_privkey (str) 'If given, then this is the application user private key'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
app_domain = str(args.app_domain)
path = str(args.path)
app_user_privkey = getattr(args, 'app_user_privkey', None)
if app_user_privkey is not None:
app_user_privkey = str(app_user_privkey)
datastore_info = None
master_data_privkey = None
if app_user_privkey is None:
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
wallet_keys['errno'] = errno.EPERM
return wallet_keys
master_data_privkey = wallet_keys['data_privkey']
datastore_info = get_datastore_info(app_user_privkey=app_user_privkey, master_data_privkey=master_data_privkey, app_domain=app_domain, config_path=config_path, proxy=proxy)
if 'error' in datastore_info:
datastore_info['errno'] = errno.EPERM
return datastore_info
datastore_id = datastore_info['datastore_id']
datastore = datastore_info['datastore']
datastore_privkey_hex = datastore_info['datastore_privkey']
assert datastore_id == datastore_get_id(get_pubkey_hex(datastore_privkey_hex))
res = datastore_deletefile( datastore, path, datastore_privkey_hex, config_path=config_path, proxy=proxy )
return res
def cli_datastore_get_id(args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None, wallet_keys=None ):
"""
command: datastore_get_id advanced
help: Get the ID of an application data store
arg: app_domain (str) 'The application domain of this data store'
opt: app_user_privkey (str) 'If given, then this is the application user private key'
"""
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
app_domain = str(args.app_domain)
app_user_privkey = getattr(args, 'app_user_privkey', None)
if app_user_privkey is not None:
app_user_privkey = str(app_user_privkey)
else:
if wallet_keys is None:
wallet_keys = get_wallet_keys(config_path, password)
if 'error' in wallet_keys:
return wallet_keys
master_data_privkey = wallet_keys['data_privkey']
app_user_privkey = datastore_get_privkey( master_data_privkey, app_domain, config_path=config_path )
if app_user_privkey is None:
return {'error': 'Failed to generate app private key'}
app_pubkey = get_pubkey_hex(app_user_privkey)
datastore_id = datastore_get_id( app_pubkey )
return {'status': True, 'datastore_id': datastore_id}
def cli_get_collection( args, config_path=CONFIG_PATH, proxy=None, password=None, wallet_keys=None ):
"""
command: get_collection advanced
help: Get a collection record
arg: collection_name (str) 'The name of the collection'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
collection_domain = str(args.collection_name)
return get_datastore_by_type('collection', collection_domain, config_path=config_path, proxy=proxy )
def cli_create_collection( args, config_path=CONFIG_PATH, proxy=None, password=None, wallet_keys=None ):
"""
command: create_collection advanced
help: Make a new collection for a given user.
arg: collection_domain (str) 'The domain of this collection.'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
collection_domain = str(args.collection_domain)
return create_datastore_by_type('collection', collection_domain, proxy=proxy, config_path=config_path, password=password, wallet_keys=wallet_keys )
def cli_delete_collection( args, config_path=CONFIG_PATH, proxy=None, password=None, wallet_keys=None ):
"""
command: delete_collection advanced
help: Delete a collection owned by a given user, and all of the data it contains.
arg: collection_domain (str) 'The domain of this collection'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
collection_domain = str(args.collection_domain)
return delete_datastore_by_type('collection', collection_domain, force=True, config_path=config_path, proxy=proxy, password=password, wallet_keys=wallet_keys)
def cli_collection_listitems(args, config_path=CONFIG_PATH, wallet_keys=None, password=None, interactive=False, proxy=None ):
"""
command: collection_items advanced
help: List the contents of a collection
arg: collection_domain (str) 'The domain of this collection'
arg: path (str) 'The path to the directory to list'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
collection_domain = str(args.collection_domain)
path = str(args.path)
res = datastore_dir_list('collection', collection_domain, '/', config_path=config_path, proxy=proxy)
if 'error' in res:
return res
# if somehow we get a directory in here, exclude it
dir_info = res['dir']
filtered_dir_info = {}
for name in dir_info.keys():
if dir_info[name]['type'] == MUTABLE_DATUM_FILE_TYPE:
filtered_dir_info[name] = dir_info[name]
return {'status': True, 'dir': filtered_dir_info}
def cli_collection_statitem(args, config_path=CONFIG_PATH, interactive=False, proxy=None):
"""
command: collection_statitem advanced
help: Stat an item in a collection
arg: collection_id (str) 'The ID of this collection'
arg: item_id (str) 'The name of the item to stat'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
collection_id = str(args.collection_id)
item_id = str(args.item_id)
return datastore_path_stat('collection', collection_id, '/{}'.format(item_id), proxy=proxy, config_path=config_path)
def cli_collection_putitem(args, config_path=CONFIG_PATH, interactive=False, proxy=None, password=None, force_data=False, wallet_keys=None ):
"""
command: collection_putitem advanced
help: Put an item into a collection. Overwrites are forbidden.
arg: collection_name (str) 'The collection domain'
arg: item_id (str) 'The item name'
arg: data (str) 'The data to store, or a path to a file with the data'
opt: collection_privkey (str) 'The collection private key'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
collection_domain = str(args.collection_domain)
item_id = str(args.item_id)
data = args.data
collection_privkey = getattr(args, 'collection_privkey', None)
if collection_privkey is not None:
collection_privkey = str(args.collection_privkey)
return datastore_file_put('collection', collection_privkey, '/{}'.format(item_id), data, app_domain=collection_domain,
create=True, force_data=force_data, proxy=proxy, config_path=config_path, wallet_keys=wallet_keys, password=password)
def cli_collection_getitem( args, config_path=CONFIG_PATH, interactive=False, password=None, wallet_keys=None, proxy=None ):
"""
command: collection_getitem advanced
help: Get an item from a collection.
arg: collection_domain (str) 'The domain of this collection'
arg: item_id (str) 'The item to fetch'
"""
if proxy is None:
proxy = get_default_proxy(config_path)
password = get_default_password(password)
config_dir = os.path.dirname(config_path)
collection_domain = str(args.collection_domain)
item_id = str(args.item_id)
return datastore_file_get('collection', collection_domain, '/{}'.format(item_id), password=password, wallet_keys=wallet_keys, config_path=config_path, proxy=proxy)
def cli_start_server( args, config_path=CONFIG_PATH, interactive=False ):
"""
command: start_server advanced
help: Start a Blockstack server
opt: foreground (str) 'If True, then run in the foreground.'
opt: working_dir (str) 'The directory which contains the server state.'
opt: testnet (str) 'If True, then communicate with Bitcoin testnet.'
"""
foreground = False
testnet = False
working_dir = args.working_dir
if args.foreground:
foreground = str(args.foreground)
foreground = (foreground.lower() in ['1', 'true', 'yes', 'foreground'])
if args.testnet:
testnet = str(args.testnet)
testnet = (testnet.lower() in ['1', 'true', 'yes', 'testnet'])
cmds = ['blockstack-server', 'start']
if foreground:
cmds.append('--foreground')
if testnet:
cmds.append('--testnet')
# TODO: use subprocess
if working_dir is not None:
working_dir_envar = 'VIRTUALCHAIN_WORKING_DIR="{}"'.format(working_dir)
cmds = [working_dir_envar] + cmds
cmd_str = " ".join(cmds)
log.debug('Execute: {}'.format(cmd_str))
exit_status = os.system(cmd_str)
if not os.WIFEXITED(exit_status) or os.WEXITSTATUS(exit_status) != 0:
error_str = 'Failed to execute "{}". Exit code {}'.format(cmd_str, exit_status)
return {'error': error_str}
return {'status': True}
def cli_stop_server( args, config_path=CONFIG_PATH, interactive=False ):
"""
command: stop_server advanced
help: Stop a running Blockstack server
opt: working_dir (str) 'The directory which contains the server state.'
"""
working_dir = args.working_dir
cmds = ['blockstack-server', 'stop']
if working_dir is not None:
working_dir_envar = 'VIRTUALCHAIN_WORKING_DIR="{}"'.format(working_dir)
cmds = [working_dir_envar] + cmds
cmd_str = " ".join(cmds)
# TODO: use subprocess
log.debug('Execute: {}'.format(cmd_str))
exit_status = os.system(cmd_str)
if not os.WIFEXITED(exit_status) or os.WEXITSTATUS(exit_status) != 0:
error_str = 'Failed to execute "{}". Exit code {}'.format(cmd_str, exit_status)
return {'error': error_str}
return {'status': True}