|
|
|
#include "twister.h"
|
|
|
|
|
|
|
|
#include "twister_utils.h"
|
|
|
|
|
|
|
|
#include "main.h"
|
|
|
|
#include "init.h"
|
|
|
|
#include "bitcoinrpc.h"
|
|
|
|
|
|
|
|
using namespace json_spirit;
|
|
|
|
using namespace std;
|
|
|
|
|
|
|
|
#include <boost/filesystem.hpp>
|
|
|
|
#include <boost/algorithm/string.hpp>
|
|
|
|
#include <boost/lexical_cast.hpp>
|
|
|
|
|
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
twister::twister()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
// ===================== LIBTORRENT & DHT ===========================
|
|
|
|
|
|
|
|
#include "libtorrent/config.hpp"
|
|
|
|
#include "libtorrent/entry.hpp"
|
|
|
|
#include "libtorrent/bencode.hpp"
|
|
|
|
#include "libtorrent/session.hpp"
|
|
|
|
#include "libtorrent/alert_types.hpp"
|
|
|
|
|
|
|
|
#define TORRENT_DISABLE_GEO_IP
|
|
|
|
#include "libtorrent/aux_/session_impl.hpp"
|
|
|
|
|
|
|
|
#define DEBUG_ACCEPT_POST 1
|
|
|
|
#define DEBUG_EXPIRE_DHT_ITEM 1
|
|
|
|
|
|
|
|
using namespace libtorrent;
|
|
|
|
static session *ses = NULL;
|
|
|
|
static int num_outstanding_resume_data;
|
|
|
|
|
|
|
|
static CCriticalSection cs_dhtgetMap;
|
|
|
|
static map<sha1_hash, alert_manager*> m_dhtgetMap;
|
|
|
|
|
|
|
|
static CCriticalSection cs_twister;
|
|
|
|
static map<std::string, bool> m_specialResources;
|
|
|
|
static map<std::string, bool> m_noExpireResources; // bool is true if expected number after resource string
|
|
|
|
static map<std::string, torrent_handle> m_userTorrent;
|
|
|
|
|
|
|
|
static std::string m_preferredSpamLang = "[en]";
|
|
|
|
static std::string m_receivedSpamMsgStr;
|
|
|
|
static std::string m_receivedSpamUserStr;
|
|
|
|
static int64 m_lastSpamTime = 0;
|
|
|
|
static std::map<std::string,UserData> m_users;
|
|
|
|
|
|
|
|
#define USER_DATA_FILE "user_data"
|
|
|
|
#define GLOBAL_DATA_FILE "global_data"
|
|
|
|
|
|
|
|
sha1_hash dhtTargetHash(std::string const &username, std::string const &resource, std::string const &type)
|
|
|
|
{
|
|
|
|
entry target;
|
|
|
|
target["n"] = username;
|
|
|
|
target["r"] = resource;
|
|
|
|
target["t"] = type;
|
|
|
|
|
|
|
|
std::vector<char> buf;
|
|
|
|
bencode(std::back_inserter(buf), target);
|
|
|
|
return hasher(buf.data(), buf.size()).final();
|
|
|
|
}
|
|
|
|
|
|
|
|
torrent_handle startTorrentUser(std::string const &username)
|
|
|
|
{
|
|
|
|
LOCK(cs_twister);
|
|
|
|
if( !m_userTorrent.count(username) ) {
|
|
|
|
sha1_hash ih = dhtTargetHash(username, "tracker", "m");
|
|
|
|
|
|
|
|
printf("adding torrent for [%s,tracker]\n", username.c_str());
|
|
|
|
add_torrent_params tparams;
|
|
|
|
tparams.info_hash = ih;
|
|
|
|
tparams.name = username;
|
|
|
|
boost::filesystem::path torrentPath = GetDataDir() / "swarm";
|
|
|
|
tparams.save_path= torrentPath.string();
|
|
|
|
|
|
|
|
error_code ec;
|
|
|
|
create_directory(tparams.save_path, ec);
|
|
|
|
|
|
|
|
std::string filename = combine_path(tparams.save_path, to_hex(ih.to_string()) + ".resume");
|
|
|
|
load_file(filename.c_str(), tparams.resume_data);
|
|
|
|
|
|
|
|
m_userTorrent[username] = ses->add_torrent(tparams);
|
|
|
|
m_userTorrent[username].force_dht_announce();
|
|
|
|
torrent_status status = m_userTorrent[username].status();
|
|
|
|
}
|
|
|
|
return m_userTorrent[username];
|
|
|
|
}
|
|
|
|
|
|
|
|
int lastPostKfromTorrent(std::string const &username)
|
|
|
|
{
|
|
|
|
if( !m_userTorrent.count(username) )
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
torrent_status status = m_userTorrent[username].status();
|
|
|
|
return status.last_have;
|
|
|
|
}
|
|
|
|
|
|
|
|
int saveGlobalData(std::string const& filename)
|
|
|
|
{
|
|
|
|
LOCK(cs_twister);
|
|
|
|
entry globalDict;
|
|
|
|
|
|
|
|
globalDict["preferredSpamLang"] = m_preferredSpamLang;
|
|
|
|
globalDict["receivedSpamMsg"] = m_receivedSpamMsgStr;
|
|
|
|
globalDict["receivedSpamUser"] = m_receivedSpamUserStr;
|
|
|
|
globalDict["lastSpamTime"] = m_lastSpamTime;
|
|
|
|
|
|
|
|
std::vector<char> buf;
|
|
|
|
bencode(std::back_inserter(buf), globalDict);
|
|
|
|
return save_file(filename, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
int loadGlobalData(std::string const& filename)
|
|
|
|
{
|
|
|
|
LOCK(cs_twister);
|
|
|
|
std::vector<char> in;
|
|
|
|
if (load_file(filename, in) == 0) {
|
|
|
|
lazy_entry userDict;
|
|
|
|
error_code ec;
|
|
|
|
if (lazy_bdecode(&in[0], &in[0] + in.size(), userDict, ec) == 0) {
|
|
|
|
if( userDict.type() != lazy_entry::dict_t ) goto data_error;
|
|
|
|
|
|
|
|
m_preferredSpamLang = userDict.dict_find_string_value("preferredSpamLang");
|
|
|
|
m_receivedSpamMsgStr = userDict.dict_find_string_value("receivedSpamMsg");
|
|
|
|
m_receivedSpamUserStr = userDict.dict_find_string_value("receivedSpamUser");
|
|
|
|
m_lastSpamTime = userDict.dict_find_int_value("lastSpamTime");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
data_error:
|
|
|
|
printf("loadGlobalData: unexpected bencode type - global_data corrupt!\n");
|
|
|
|
return -2;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void ThreadWaitExtIP()
|
|
|
|
{
|
|
|
|
RenameThread("wait-extip");
|
|
|
|
|
|
|
|
std::string ipStr;
|
|
|
|
|
|
|
|
// wait up to 5 seconds for bitcoin to get the external IP
|
|
|
|
for( int i = 0; i < 10; i++ ) {
|
|
|
|
const CNetAddr paddrPeer("8.8.8.8");
|
|
|
|
CAddress addr( GetLocalAddress(&paddrPeer) );
|
|
|
|
if( addr.IsValid() ) {
|
|
|
|
ipStr = addr.ToStringIP();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
MilliSleep(500);
|
|
|
|
}
|
|
|
|
|
|
|
|
error_code ec;
|
|
|
|
int listen_port = GetListenPort() + LIBTORRENT_PORT_OFFSET;
|
|
|
|
std::string bind_to_interface = "";
|
|
|
|
|
|
|
|
printf("Creating new libtorrent session ext_ip=%s port=%d\n", ipStr.c_str(), listen_port);
|
|
|
|
|
|
|
|
ses = new session(fingerprint("TW", LIBTORRENT_VERSION_MAJOR, LIBTORRENT_VERSION_MINOR, 0, 0)
|
|
|
|
, session::add_default_plugins
|
|
|
|
, alert::dht_notification
|
|
|
|
, ipStr.size() ? ipStr.c_str() : NULL
|
|
|
|
, std::make_pair(listen_port, listen_port));
|
|
|
|
|
|
|
|
std::vector<char> in;
|
|
|
|
boost::filesystem::path sesStatePath = GetDataDir() / "ses_state";
|
|
|
|
if (load_file(sesStatePath.string(), in) == 0)
|
|
|
|
{
|
|
|
|
lazy_entry e;
|
|
|
|
if (lazy_bdecode(&in[0], &in[0] + in.size(), e, ec) == 0)
|
|
|
|
ses->load_state(e);
|
|
|
|
}
|
|
|
|
|
|
|
|
ses->start_upnp();
|
|
|
|
ses->start_natpmp();
|
|
|
|
|
|
|
|
ses->listen_on(std::make_pair(listen_port, listen_port)
|
|
|
|
, ec, bind_to_interface.c_str());
|
|
|
|
if (ec)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "failed to listen%s%s on ports %d-%d: %s\n"
|
|
|
|
, bind_to_interface.empty() ? "" : " on ", bind_to_interface.c_str()
|
|
|
|
, listen_port, listen_port+1, ec.message().c_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
dht_settings dhts;
|
|
|
|
// settings to test local connections
|
|
|
|
dhts.restrict_routing_ips = false;
|
|
|
|
dhts.restrict_search_ips = false;
|
|
|
|
ses->set_dht_settings(dhts);
|
|
|
|
ses->start_dht();
|
|
|
|
|
|
|
|
session_settings settings;
|
|
|
|
// settings to test local connections
|
|
|
|
settings.allow_multiple_connections_per_ip = true;
|
|
|
|
//settings.enable_outgoing_utp = false; // (false to see connections in netstat)
|
|
|
|
//settings.dht_announce_interval = 60; // test
|
|
|
|
//settings.min_announce_interval = 60; // test
|
|
|
|
settings.anonymous_mode = false; // (false => send peer_id, avoid connecting to itself)
|
|
|
|
ses->set_settings(settings);
|
|
|
|
|
|
|
|
printf("libtorrent + dht started\n");
|
|
|
|
|
|
|
|
// wait up to 10 seconds for dht nodes to be set
|
|
|
|
for( int i = 0; i < 10; i++ ) {
|
|
|
|
MilliSleep(1000);
|
|
|
|
session_status ss = ses->status();
|
|
|
|
if( ss.dht_nodes )
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
boost::filesystem::path globalDataPath = GetDataDir() / GLOBAL_DATA_FILE;
|
|
|
|
loadGlobalData(globalDataPath.string());
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs_twister);
|
|
|
|
boost::filesystem::path userDataPath = GetDataDir() / USER_DATA_FILE;
|
|
|
|
loadUserData(userDataPath.string(), m_users);
|
|
|
|
printf("loaded user_data for %zd users\n", m_users.size());
|
|
|
|
|
|
|
|
// now restart the user torrents (all m_following)
|
|
|
|
std::map<std::string,UserData>::const_iterator i;
|
|
|
|
for (i = m_users.begin(); i != m_users.end(); ++i) {
|
|
|
|
UserData const &data = i->second;
|
|
|
|
BOOST_FOREACH(string username, data.m_following) {
|
|
|
|
startTorrentUser(username);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ThreadMaintainDHTNodes()
|
|
|
|
{
|
|
|
|
RenameThread("maintain-dht-nodes");
|
|
|
|
|
|
|
|
while(1) {
|
|
|
|
MilliSleep(5000);
|
|
|
|
|
|
|
|
bool nodesAdded = false;
|
|
|
|
if( ses ) {
|
|
|
|
LOCK(cs_vNodes);
|
|
|
|
vector<CAddress> vAddr = addrman.GetAddr();
|
|
|
|
session_status ss = ses->status();
|
|
|
|
int totalNodesCandidates = (int)(vNodes.size() + vAddr.size());
|
|
|
|
if( (!ss.dht_nodes && totalNodesCandidates) ||
|
|
|
|
ss.dht_nodes < totalNodesCandidates / 2 ) {
|
|
|
|
printf("ThreadMaintainDHTNodes: too few dht_nodes, trying to add some...\n");
|
|
|
|
BOOST_FOREACH(const CAddress &a, vAddr) {
|
|
|
|
std::string addr = a.ToStringIP();
|
|
|
|
int port = a.GetPort() + LIBTORRENT_PORT_OFFSET;
|
|
|
|
printf("Adding dht node (addrman) %s:%d\n", addr.c_str(), port);
|
|
|
|
ses->add_dht_node(std::pair<std::string, int>(addr, port));
|
|
|
|
nodesAdded = true;
|
|
|
|
}
|
|
|
|
BOOST_FOREACH(CNode* pnode, vNodes) {
|
|
|
|
// if !fInbound we created this connection so ip is reachable.
|
|
|
|
// we can't use port number of inbound connection, so try standard port.
|
|
|
|
// only use inbound as last resort (if dht_nodes empty)
|
|
|
|
if( !pnode->fInbound || !ss.dht_nodes ) {
|
|
|
|
std::string addr = pnode->addr.ToStringIP();
|
|
|
|
int port = (!pnode->fInbound) ? pnode->addr.GetPort() : Params().GetDefaultPort();
|
|
|
|
port += LIBTORRENT_PORT_OFFSET;
|
|
|
|
|
|
|
|
printf("Adding dht node (%sbound) %s:%d\n", (!pnode->fInbound) ? "out" : "in",
|
|
|
|
addr.c_str(), port);
|
|
|
|
ses->add_dht_node(std::pair<std::string, int>(addr, port));
|
|
|
|
nodesAdded = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if( nodesAdded ) {
|
|
|
|
LOCK(cs_twister);
|
|
|
|
BOOST_FOREACH(const PAIRTYPE(std::string, torrent_handle)& item, m_userTorrent) {
|
|
|
|
item.second.force_dht_announce();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ThreadSessionAlerts()
|
|
|
|
{
|
|
|
|
static map<sha1_hash, entry> neighborCheck;
|
|
|
|
|
|
|
|
while(!ses) {
|
|
|
|
MilliSleep(200);
|
|
|
|
}
|
|
|
|
while (ses) {
|
|
|
|
alert const* a = ses->wait_for_alert(seconds(10));
|
|
|
|
if (a == 0) continue;
|
|
|
|
|
|
|
|
std::deque<alert*> alerts;
|
|
|
|
ses->pop_alerts(&alerts);
|
|
|
|
std::string now = time_now_string();
|
|
|
|
for (std::deque<alert*>::iterator i = alerts.begin()
|
|
|
|
, end(alerts.end()); i != end; ++i)
|
|
|
|
{
|
|
|
|
// make sure to delete each alert
|
|
|
|
std::auto_ptr<alert> a(*i);
|
|
|
|
|
|
|
|
dht_reply_data_alert const* rd = alert_cast<dht_reply_data_alert>(*i);
|
|
|
|
if (rd)
|
|
|
|
{
|
|
|
|
if( rd->m_lst.size() ) {
|
|
|
|
// use first one to recover target
|
|
|
|
entry const *p = rd->m_lst.begin()->find_key("p");
|
|
|
|
if( p && p->type() == entry::dictionary_t ) {
|
|
|
|
entry const *target = p->find_key("target");
|
|
|
|
if( target && target->type() == entry::dictionary_t ) {
|
|
|
|
entry const *n = target->find_key("n");
|
|
|
|
entry const *r = target->find_key("r");
|
|
|
|
entry const *t = target->find_key("t");
|
|
|
|
if( n && n->type() == entry::string_t &&
|
|
|
|
r && r->type() == entry::string_t &&
|
|
|
|
t && t->type() == entry::string_t) {
|
|
|
|
sha1_hash ih = dhtTargetHash(n->string(), r->string(), t->string());
|
|
|
|
|
|
|
|
LOCK(cs_dhtgetMap);
|
|
|
|
std::map<sha1_hash, alert_manager*>::iterator mi = m_dhtgetMap.find(ih);
|
|
|
|
if( mi != m_dhtgetMap.end() ) {
|
|
|
|
alert_manager *am = (*mi).second;
|
|
|
|
am->post_alert(*rd);
|
|
|
|
} else {
|
|
|
|
printf("ThreadSessionAlerts: received dht [%s,%s,%s] but no alert_manager registered\n",
|
|
|
|
n->string().c_str(), r->string().c_str(), t->string().c_str() );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
dht_get_data_alert const* gd = alert_cast<dht_get_data_alert>(*i);
|
|
|
|
if (gd)
|
|
|
|
{
|
|
|
|
if( gd->m_possiblyNeighbor ) {
|
|
|
|
entry const *n = gd->m_target.find_key("n");
|
|
|
|
entry const *r = gd->m_target.find_key("r");
|
|
|
|
entry const *t = gd->m_target.find_key("t");
|
|
|
|
|
|
|
|
if( n && n->type() == entry::string_t &&
|
|
|
|
r && r->type() == entry::string_t &&
|
|
|
|
t && t->type() == entry::string_t) {
|
|
|
|
|
|
|
|
// if this is a special resource then start another dhtget to make
|
|
|
|
// sure we are really its neighbor. don't do it needless.
|
|
|
|
if( m_specialResources.count(r->string()) ) {
|
|
|
|
// check if user exists
|
|
|
|
CTransaction txOut;
|
|
|
|
uint256 hashBlock;
|
|
|
|
uint256 userhash = SerializeHash(n->string());
|
|
|
|
if( !GetTransaction(userhash, txOut, hashBlock) ) {
|
|
|
|
printf("Special Resource but username is unknown - ignoring\n");
|
|
|
|
} else {
|
|
|
|
// now we do our own search to make sure we are really close to this target
|
|
|
|
sha1_hash ih = dhtTargetHash(n->string(), r->string(), t->string());
|
|
|
|
|
|
|
|
if( !neighborCheck.count(ih) ) {
|
|
|
|
printf("possiblyNeighbor of [%s,%s,%s] - starting a new dhtget to be sure\n",
|
|
|
|
n->string().c_str(),
|
|
|
|
r->string().c_str(),
|
|
|
|
t->string().c_str());
|
|
|
|
|
|
|
|
neighborCheck[ih] = gd->m_target;
|
|
|
|
ses->dht_getData(n->string(), r->string(), t->string() == "m");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
dht_reply_data_done_alert const* dd = alert_cast<dht_reply_data_done_alert>(*i);
|
|
|
|
if (dd)
|
|
|
|
{
|
|
|
|
printf("get_data_done [%s,%s,%s] is_neighbor=%d got_data=%d\n",
|
|
|
|
dd->m_username.c_str(), dd->m_resource.c_str(), dd->m_multi ? "m" : "s",
|
|
|
|
dd->m_is_neighbor, dd->m_got_data);
|
|
|
|
|
|
|
|
sha1_hash ih = dhtTargetHash(dd->m_username, dd->m_resource, dd->m_multi ? "m" : "s");
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs_dhtgetMap);
|
|
|
|
std::map<sha1_hash, alert_manager*>::iterator mi = m_dhtgetMap.find(ih);
|
|
|
|
if( mi != m_dhtgetMap.end() && !dd->m_got_data ) {
|
|
|
|
// post alert to return from wait_for_alert in dhtget()
|
|
|
|
alert_manager *am = (*mi).second;
|
|
|
|
am->post_alert(*dd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if( dd->m_is_neighbor && m_specialResources.count(dd->m_resource) &&
|
|
|
|
neighborCheck.count(ih) ) {
|
|
|
|
// Do something!
|
|
|
|
printf("Neighbor of special resource - do something!\n");
|
|
|
|
if( dd->m_resource == "tracker" ) {
|
|
|
|
startTorrentUser(dd->m_username);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
save_resume_data_alert const* rda = alert_cast<save_resume_data_alert>(*i);
|
|
|
|
if (rda) {
|
|
|
|
num_outstanding_resume_data--;
|
|
|
|
if (!rda->resume_data) continue;
|
|
|
|
|
|
|
|
torrent_handle h = rda->handle;
|
|
|
|
torrent_status st = h.status(torrent_handle::query_save_path);
|
|
|
|
std::vector<char> out;
|
|
|
|
bencode(std::back_inserter(out), *rda->resume_data);
|
|
|
|
save_file(combine_path(st.save_path, to_hex(st.info_hash.to_string()) + ".resume"), out);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (alert_cast<save_resume_data_failed_alert>(*i))
|
|
|
|
{
|
|
|
|
--num_outstanding_resume_data;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void startSessionTorrent(boost::thread_group& threadGroup)
|
|
|
|
{
|
|
|
|
printf("startSessionTorrent (waiting for external IP)\n");
|
|
|
|
|
|
|
|
m_specialResources["tracker"] = true;
|
|
|
|
m_specialResources["swarm"] = true;
|
|
|
|
|
|
|
|
// these are the resources which shouldn't expire (true when numbering is expected)
|
|
|
|
m_noExpireResources["avatar"] = false;
|
|
|
|
m_noExpireResources["profile"] = false;
|
|
|
|
m_noExpireResources["following"] = true;
|
|
|
|
|
|
|
|
|
|
|
|
threadGroup.create_thread(boost::bind(&ThreadWaitExtIP));
|
|
|
|
threadGroup.create_thread(boost::bind(&ThreadMaintainDHTNodes));
|
|
|
|
threadGroup.create_thread(boost::bind(&ThreadSessionAlerts));
|
|
|
|
}
|
|
|
|
|
|
|
|
bool yes(libtorrent::torrent_status const&)
|
|
|
|
{ return true; }
|
|
|
|
|
|
|
|
void stopSessionTorrent()
|
|
|
|
{
|
|
|
|
if( ses ){
|
|
|
|
ses->pause();
|
|
|
|
|
|
|
|
printf("saving resume data\n");
|
|
|
|
std::vector<torrent_status> temp;
|
|
|
|
ses->get_torrent_status(&temp, &yes, 0);
|
|
|
|
for (std::vector<torrent_status>::iterator i = temp.begin();
|
|
|
|
i != temp.end(); ++i)
|
|
|
|
{
|
|
|
|
torrent_status& st = *i;
|
|
|
|
if (!st.handle.is_valid())
|
|
|
|
{
|
|
|
|
printf(" skipping, invalid handle\n");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!st.has_metadata)
|
|
|
|
{
|
|
|
|
printf(" skipping %s, no metadata\n", st.name.c_str());
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!st.need_save_resume)
|
|
|
|
{
|
|
|
|
printf(" skipping %s, resume file up-to-date\n", st.name.c_str());
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// save_resume_data will generate an alert when it's done
|
|
|
|
st.handle.save_resume_data();
|
|
|
|
++num_outstanding_resume_data;
|
|
|
|
printf("\r%d ", num_outstanding_resume_data);
|
|
|
|
}
|
|
|
|
printf("\nwaiting for resume data [%d]\n", num_outstanding_resume_data);
|
|
|
|
while (num_outstanding_resume_data > 0)
|
|
|
|
{
|
|
|
|
MilliSleep(100);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("\nsaving session state\n");
|
|
|
|
|
|
|
|
entry session_state;
|
|
|
|
ses->save_state(session_state);
|
|
|
|
|
|
|
|
std::vector<char> out;
|
|
|
|
bencode(std::back_inserter(out), session_state);
|
|
|
|
boost::filesystem::path sesStatePath = GetDataDir() / "ses_state";
|
|
|
|
save_file(sesStatePath.string(), out);
|
|
|
|
|
|
|
|
delete ses;
|
|
|
|
ses = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
boost::filesystem::path globalDataPath = GetDataDir() / GLOBAL_DATA_FILE;
|
|
|
|
saveGlobalData(globalDataPath.string());
|
|
|
|
|
|
|
|
if( m_users.size() ) {
|
|
|
|
printf("saving user_data (followers and DMs)...\n");
|
|
|
|
boost::filesystem::path userDataPath = GetDataDir() / USER_DATA_FILE;
|
|
|
|
saveUserData(userDataPath.string(), m_users);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("libtorrent + dht stopped\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string createSignature(std::string const &strMessage, CKeyID &keyID)
|
|
|
|
{
|
|
|
|
if (pwalletMain->IsLocked()) {
|
|
|
|
printf("createSignature: Error please enter the wallet passphrase with walletpassphrase first.\n");
|
|
|
|
return std::string();
|
|
|
|
}
|
|
|
|
|
|
|
|
CKey key;
|
|
|
|
if (!pwalletMain->GetKey(keyID, key)) {
|
|
|
|
printf("createSignature: private key not available for given keyid.\n");
|
|
|
|
return std::string();
|
|
|
|
}
|
|
|
|
|
|
|
|
CHashWriter ss(SER_GETHASH, 0);
|
|
|
|
ss << strMessageMagic;
|
|
|
|
ss << strMessage;
|
|
|
|
|
|
|
|
vector<unsigned char> vchSig;
|
|
|
|
if (!key.SignCompact(ss.GetHash(), vchSig)) {
|
|
|
|
printf("createSignature: sign failed.\n");
|
|
|
|
return std::string();
|
|
|
|
}
|
|
|
|
|
|
|
|
return std::string((const char *)&vchSig[0], vchSig.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string createSignature(std::string const &strMessage, std::string const &strUsername)
|
|
|
|
{
|
|
|
|
if (pwalletMain->IsLocked()) {
|
|
|
|
printf("createSignature: Error please enter the wallet passphrase with walletpassphrase first.\n");
|
|
|
|
return std::string();
|
|
|
|
}
|
|
|
|
|
|
|
|
CKeyID keyID;
|
|
|
|
if( !pwalletMain->GetKeyIdFromUsername(strUsername, keyID) ) {
|
|
|
|
printf("createSignature: user '%s' unknown.\n", strUsername.c_str());
|
|
|
|
return std::string();
|
|
|
|
}
|
|
|
|
|
|
|
|
return createSignature( strMessage, keyID );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool getUserPubKey(std::string const &strUsername, CPubKey &pubkey)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
CKeyID keyID;
|
|
|
|
if( pwalletMain->GetKeyIdFromUsername(strUsername, keyID) ) {
|
|
|
|
if( !pwalletMain->GetPubKey(keyID, pubkey) ) {
|
|
|
|
// error? should not have failed.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if( !pubkey.IsValid() ) {
|
|
|
|
CTransaction txOut;
|
|
|
|
uint256 hashBlock;
|
|
|
|
uint256 userhash = SerializeHash(strUsername);
|
|
|
|
if( !GetTransaction(userhash, txOut, hashBlock) ) {
|
|
|
|
//printf("getUserPubKey: user unknown '%s'\n", strUsername.c_str());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector< std::vector<unsigned char> > vData;
|
|
|
|
if( !txOut.pubKey.ExtractPushData(vData) || vData.size() < 1 ) {
|
|
|
|
printf("getUserPubKey: broken pubkey for user '%s'\n", strUsername.c_str());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
pubkey = CPubKey(vData[0]);
|
|
|
|
if( !pubkey.IsValid() ) {
|
|
|
|
printf("getUserPubKey: invalid pubkey for user '%s'\n", strUsername.c_str());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool verifySignature(std::string const &strMessage, std::string const &strUsername, std::string const &strSign)
|
|
|
|
{
|
|
|
|
CPubKey pubkey;
|
|
|
|
if( !getUserPubKey(strUsername, pubkey) ) {
|
|
|
|
printf("verifySignature: no pubkey for user '%s'\n", strUsername.c_str());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
vector<unsigned char> vchSig((const unsigned char*)strSign.data(),
|
|
|
|
(const unsigned char*)strSign.data() + strSign.size());
|
|
|
|
|
|
|
|
CHashWriter ss(SER_GETHASH, 0);
|
|
|
|
ss << strMessageMagic;
|
|
|
|
ss << strMessage;
|
|
|
|
|
|
|
|
CPubKey pubkeyRec;
|
|
|
|
if (!pubkeyRec.RecoverCompact(ss.GetHash(), vchSig))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return (pubkeyRec.GetID() == pubkey.GetID());
|
|
|
|
}
|
|
|
|
|
|
|
|
bool processReceivedDM(lazy_entry const* post)
|
|
|
|
{
|
|
|
|
lazy_entry const* dm = post->dict_find_dict("dm");
|
|
|
|
if( dm ) {
|
|
|
|
ecies_secure_t sec;
|
|
|
|
sec.key = dm->dict_find_string_value("key");
|
|
|
|
sec.mac = dm->dict_find_string_value("mac");
|
|
|
|
sec.orig = dm->dict_find_int_value("orig");
|
|
|
|
sec.body = dm->dict_find_string_value("body");
|
|
|
|
|
|
|
|
LOCK(pwalletMain->cs_wallet);
|
|
|
|
BOOST_FOREACH(const PAIRTYPE(CKeyID, CKeyMetadata)& item, pwalletMain->mapKeyMetadata)
|
|
|
|
{
|
|
|
|
CKey key;
|
|
|
|
if (!pwalletMain->GetKey(item.first, key)) {
|
|
|
|
printf("acceptSignedPost: private key not available trying to decrypt DM.\n");
|
|
|
|
} else {
|
|
|
|
std::string textOut;
|
|
|
|
if( key.Decrypt(sec, textOut) ) {
|
|
|
|
/* this printf is good for debug, but bad for security.
|
|
|
|
printf("Received DM for user '%s' text = '%s'\n",
|
|
|
|
item.second.username.c_str(),
|
|
|
|
textOut.c_str());
|
|
|
|
*/
|
|
|
|
|
|
|
|
std::string n = post->dict_find_string_value("n");
|
|
|
|
|
|
|
|
StoredDirectMsg stoDM;
|
|
|
|
stoDM.m_fromMe = false;
|
|
|
|
stoDM.m_text = textOut;
|
|
|
|
stoDM.m_utcTime = post->dict_find_int_value("time");;
|
|
|
|
|
|
|
|
LOCK(cs_twister);
|
|
|
|
// store this dm in memory list, but prevent duplicates
|
|
|
|
std::vector<StoredDirectMsg> &dmsFromToUser = m_users[item.second.username].m_directmsg[n];
|
|
|
|
std::vector<StoredDirectMsg>::const_iterator it;
|
|
|
|
for( it = dmsFromToUser.begin(); it != dmsFromToUser.end(); ++it ) {
|
|
|
|
if( stoDM.m_utcTime == (*it).m_utcTime &&
|
|
|
|
stoDM.m_text == (*it).m_text ) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if( it == dmsFromToUser.end() ) {
|
|
|
|
dmsFromToUser.push_back(stoDM);
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool acceptSignedPost(char const *data, int data_size, std::string username, int seq, std::string &errmsg, boost::uint32_t *flags)
|
|
|
|
{
|
|
|
|
bool ret = false;
|
|
|
|
char errbuf[200]="";
|
|
|
|
if( flags ) *flags = 0;
|
|
|
|
|
|
|
|
lazy_entry v;
|
|
|
|
int pos;
|
|
|
|
error_code ec;
|
|
|
|
if (lazy_bdecode(data, data + data_size, v, ec, &pos) == 0) {
|
|
|
|
|
|
|
|
if( v.type() == lazy_entry::dict_t ) {
|
|
|
|
lazy_entry const* post = v.dict_find_dict("userpost");
|
|
|
|
std::string sig = v.dict_find_string_value("sig_userpost");
|
|
|
|
|
|
|
|
if( !post || !sig.size() ) {
|
|
|
|
sprintf(errbuf,"missing post or signature.");
|
|
|
|
} else {
|
|
|
|
std::string n = post->dict_find_string_value("n");
|
|
|
|
std::string msg = post->dict_find_string_value("msg");
|
|
|
|
int k = post->dict_find_int_value("k",-1);
|
|
|
|
int height = post->dict_find_int_value("height",-1);
|
|
|
|
|
|
|
|
if( n != username ) {
|
|
|
|
sprintf(errbuf,"expected username '%s' got '%s'",
|
|
|
|
username.c_str(),n.c_str());
|
|
|
|
} else if( k != seq ) {
|
|
|
|
sprintf(errbuf,"expected piece '%d' got '%d'",
|
|
|
|
seq, k);
|
|
|
|
} else if( !validatePostNumberForUser(username, k) ) {
|
|
|
|
sprintf(errbuf,"too much posts from user '%s' rejecting post",
|
|
|
|
username.c_str());
|
|
|
|
} else if( height < 0 || (height > getBestHeight() && getBestHeight()) ) {
|
|
|
|
sprintf(errbuf,"post from future not accepted (height: %d > %d)",
|
|
|
|
height, getBestHeight());
|
|
|
|
} else if( msg.size() && msg.size() > 140 ) {
|
|
|
|
sprintf(errbuf,"msg too big (%zd > 140)", msg.size());
|
|
|
|
} else {
|
|
|
|
std::pair<char const*, int> postbuf = post->data_section();
|
|
|
|
ret = verifySignature(
|
|
|
|
std::string(postbuf.first,postbuf.second),
|
|
|
|
username, sig);
|
|
|
|
if( !ret ) {
|
|
|
|
sprintf(errbuf,"bad post signature");
|
|
|
|
} else {
|
|
|
|
lazy_entry const* rt = post->dict_find_dict("rt");
|
|
|
|
std::string sig_rt = post->dict_find_string_value("sig_rt");
|
|
|
|
|
|
|
|
if( rt ) {
|
|
|
|
if( flags ) (*flags) |= USERPOST_FLAG_RT;
|
|
|
|
std::string username_rt = rt->dict_find_string_value("n");
|
|
|
|
|
|
|
|
std::pair<char const*, int> rtbuf = rt->data_section();
|
|
|
|
ret = verifySignature(
|
|
|
|
std::string(rtbuf.first,rtbuf.second),
|
|
|
|
username_rt, sig_rt);
|
|
|
|
if( !ret ) {
|
|
|
|
sprintf(errbuf,"bad RT signature");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
lazy_entry const* dm = post->dict_find_dict("dm");
|
|
|
|
if( dm && flags ) {
|
|
|
|
(*flags) |= USERPOST_FLAG_DM;
|
|
|
|
processReceivedDM(post);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
errmsg = errbuf;
|
|
|
|
#ifdef DEBUG_ACCEPT_POST
|
|
|
|
if( !ret ) {
|
|
|
|
printf("acceptSignedPost: %s\n",errbuf);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool validatePostNumberForUser(std::string const &username, int k)
|
|
|
|
{
|
|
|
|
CTransaction txOut;
|
|
|
|
uint256 hashBlock;
|
|
|
|
uint256 userhash = SerializeHash(username);
|
|
|
|
if( !GetTransaction(userhash, txOut, hashBlock) ) {
|
|
|
|
printf("validatePostNumberForUser: username is unknown\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
CBlockIndex* pblockindex = mapBlockIndex[hashBlock];
|
|
|
|
|
|
|
|
if( k < 0 )
|
|
|
|
return false;
|
|
|
|
if( getBestHeight() && k > 2*(getBestHeight() - pblockindex->nHeight) + 20)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool usernameExists(std::string const &username)
|
|
|
|
{
|
|
|
|
CTransaction txOut;
|
|
|
|
uint256 hashBlock;
|
|
|
|
uint256 userhash = SerializeHash(username);
|
|
|
|
return GetTransaction(userhash, txOut, hashBlock);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
"userpost" :
|
|
|
|
{
|
|
|
|
"n" : username,
|
|
|
|
"k" : seq number,
|
|
|
|
"t" : "post" / "dm" / "rt"
|
|
|
|
"msg" : message (post/rt)
|
|
|
|
"time" : unix utc
|
|
|
|
"height" : best height at user
|
|
|
|
"dm" : encrypted message (dm) -opt
|
|
|
|
"rt" : original userpost - opt
|
|
|
|
"sig_rt" : sig of rt - opt
|
|
|
|
"reply" : - opt
|
|
|
|
{
|
|
|
|
"n" : reference username
|
|
|
|
"k" : reference k
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"sig_userpost" : signature by userpost.n
|
|
|
|
*/
|
|
|
|
|
|
|
|
bool createSignedUserpost(entry &v, std::string const &username, int k,
|
|
|
|
std::string const &msg, // either msg.size() or
|
|
|
|
entry const *rt, entry const *sig_rt, // rt != NULL or
|
|
|
|
entry const *dm, // dm != NULL.
|
|
|
|
std::string const &reply_n, int reply_k
|
|
|
|
)
|
|
|
|
{
|
|
|
|
entry &userpost = v["userpost"];
|
|
|
|
|
|
|
|
//
|
|
|
|
userpost["n"] = username;
|
|
|
|
userpost["k"] = k;
|
|
|
|
userpost["time"] = GetAdjustedTime();
|
|
|
|
userpost["height"] = getBestHeight() - 1; // be conservative
|
|
|
|
|
|
|
|
if( msg.size() ) {
|
|
|
|
//userpost["t"] = "post";
|
|
|
|
userpost["msg"] = msg;
|
|
|
|
} else if ( rt != NULL && sig_rt != NULL ) {
|
|
|
|
//userpost["t"] = "rt";
|
|
|
|
userpost["rt"] = *rt;
|
|
|
|
userpost["sig_rt"] = *sig_rt;
|
|
|
|
} else if ( dm != NULL ) {
|
|
|
|
//userpost["t"] = "dm";
|
|
|
|
userpost["dm"] = *dm;
|
|
|
|
} else {
|
|
|
|
printf("createSignedUserpost: unknown type\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if( reply_n.size() ) {
|
|
|
|
entry &reply = userpost["reply"];
|
|
|
|
reply["n"]=reply_n;
|
|
|
|
reply["k"]=reply_k;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
|
|
|
|
std::vector<char> buf;
|
|
|
|
bencode(std::back_inserter(buf), userpost);
|
|
|
|
std::string sig = createSignature(std::string(buf.data(),buf.size()), username);
|
|
|
|
if( sig.size() ) {
|
|
|
|
v["sig_userpost"] = sig;
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool createDirectMessage(entry &dm, std::string const &to, std::string const &msg)
|
|
|
|
{
|
|
|
|
CPubKey pubkey;
|
|
|
|
if( !getUserPubKey(to, pubkey) ) {
|
|
|
|
printf("createDirectMessage: no pubkey for user '%s'\n", to.c_str());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
ecies_secure_t sec;
|
|
|
|
bool encrypted = pubkey.Encrypt(msg, sec);
|
|
|
|
|
|
|
|
if( encrypted ) {
|
|
|
|
dm["key"] = sec.key;
|
|
|
|
dm["mac"] = sec.mac;
|
|
|
|
dm["orig"] = sec.orig;
|
|
|
|
dm["body"] = sec.body;
|
|
|
|
}
|
|
|
|
|
|
|
|
return encrypted;
|
|
|
|
}
|
|
|
|
|
|
|
|
int getBestHeight()
|
|
|
|
{
|
|
|
|
return nBestHeight;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool shouldDhtResourceExpire(std::string resource, bool multi, int height)
|
|
|
|
{
|
|
|
|
if ((height + BLOCK_AGE_TO_EXPIRE_DHT_ENTRY) < getBestHeight() ) {
|
|
|
|
if( multi ) {
|
|
|
|
#ifdef DEBUG_EXPIRE_DHT_ITEM
|
|
|
|
printf("shouldDhtResourceExpire: expiring resource multi '%s'\n", resource.c_str());
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string resourceBasic;
|
|
|
|
for(size_t i = 0; i < resource.size() && isalpha(resource.at(i)); i++) {
|
|
|
|
resourceBasic.push_back(resource.at(i));
|
|
|
|
}
|
|
|
|
int resourceNumber = -1;
|
|
|
|
|
|
|
|
if( resource.length() > resourceBasic.length() ) {
|
|
|
|
resourceNumber = atoi( resource.c_str() + resourceBasic.length() );
|
|
|
|
}
|
|
|
|
|
|
|
|
if( !m_noExpireResources.count(resourceBasic) ) {
|
|
|
|
// unknown resource. expire it.
|
|
|
|
printf("shouldDhtResourceExpire: expiring non-special resource '%s'\n", resource.c_str());
|
|
|
|
} else {
|
|
|
|
if( !m_noExpireResources[resourceBasic] && resourceNumber >= 0 ) {
|
|
|
|
// this resource admits no number. expire it!
|
|
|
|
#ifdef DEBUG_EXPIRE_DHT_ITEM
|
|
|
|
printf("shouldDhtResourceExpire: expiring resource with unexpected numbering '%s'\n", resource.c_str());
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if( m_noExpireResources[resourceBasic] && resourceNumber > 200 ) {
|
|
|
|
// try keeping a sane number here, otherwise expire it!
|
|
|
|
#ifdef DEBUG_EXPIRE_DHT_ITEM
|
|
|
|
printf("shouldDhtResourceExpire: expiring resource with numbering too big '%s'\n", resource.c_str());
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
void receivedSpamMessage(std::string const &message, std::string const &user)
|
|
|
|
{
|
|
|
|
LOCK(cs_twister);
|
|
|
|
bool hasSingleLangCode = (message.find("[") == message.rfind("["));
|
|
|
|
bool hasPreferredLang = m_preferredSpamLang.length();
|
|
|
|
bool isSameLang = hasPreferredLang && hasSingleLangCode &&
|
|
|
|
message.find(m_preferredSpamLang) != string::npos;
|
|
|
|
bool currentlyEmpty = !m_receivedSpamMsgStr.length();
|
|
|
|
|
|
|
|
if( currentlyEmpty || (isSameLang && rand() < (RAND_MAX/2)) ) {
|
|
|
|
m_receivedSpamMsgStr = message;
|
|
|
|
m_receivedSpamUserStr = user;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Value dhtput(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || params.size() < 5 || params.size() > 6)
|
|
|
|
throw runtime_error(
|
|
|
|
"dhtput <username> <resource> <s(ingle)/m(ulti)> <value> <sig_user> <seq>\n"
|
|
|
|
"Store resource in dht network");
|
|
|
|
|
|
|
|
EnsureWalletIsUnlocked();
|
|
|
|
|
|
|
|
string strUsername = params[0].get_str();
|
|
|
|
string strResource = params[1].get_str();
|
|
|
|
string strMulti = params[2].get_str();
|
|
|
|
entry value = jsonToEntry(params[3]);
|
|
|
|
string strSigUser = params[4].get_str();
|
|
|
|
|
|
|
|
// Test for private key here to avoid going into dht
|
|
|
|
CKeyID keyID;
|
|
|
|
if( !pwalletMain->GetKeyIdFromUsername(strSigUser, keyID) )
|
|
|
|
throw JSONRPCError(RPC_WALLET_INVALID_ACCOUNT_NAME, "Error: no sig_user in wallet");
|
|
|
|
CKey key;
|
|
|
|
if (!pwalletMain->GetKey(keyID, key))
|
|
|
|
throw JSONRPCError(RPC_WALLET_ERROR, "Private key of sig_user not available");
|
|
|
|
|
|
|
|
bool multi = (strMulti == "m");
|
|
|
|
if( !multi && params.size() != 6 )
|
|
|
|
throw JSONRPCError(RPC_WALLET_ERROR, "Seq parameter required for single");
|
|
|
|
|
|
|
|
int seq = -1;
|
|
|
|
if( params.size() == 6 )
|
|
|
|
seq = params[5].get_int();
|
|
|
|
|
|
|
|
if( !multi && strUsername != strSigUser )
|
|
|
|
throw JSONRPCError(RPC_WALLET_ERROR, "Username must be the same as sig_user for single");
|
|
|
|
|
|
|
|
boost::int64_t timeutc = GetAdjustedTime();
|
|
|
|
|
|
|
|
ses->dht_putData(strUsername, strResource, multi, value, strSigUser, timeutc, seq);
|
|
|
|
|
|
|
|
return Value();
|
|
|
|
}
|
|
|
|
|
|
|
|
Value dhtget(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || params.size() != 3)
|
|
|
|
throw runtime_error(
|
|
|
|
"dhtget <username> <resource> <s(ingle)/m(ulti)>\n"
|
|
|
|
"Get resource from dht network");
|
|
|
|
|
|
|
|
string strUsername = params[0].get_str();
|
|
|
|
string strResource = params[1].get_str();
|
|
|
|
string strMulti = params[2].get_str();
|
|
|
|
|
|
|
|
bool multi = (strMulti == "m");
|
|
|
|
|
|
|
|
alert_manager am(10, alert::dht_notification);
|
|
|
|
sha1_hash ih = dhtTargetHash(strUsername,strResource,strMulti);
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs_dhtgetMap);
|
|
|
|
m_dhtgetMap[ih] = &am;
|
|
|
|
}
|
|
|
|
|
|
|
|
ses->dht_getData(strUsername, strResource, multi);
|
|
|
|
|
|
|
|
Value ret = Array();
|
|
|
|
|
|
|
|
if( am.wait_for_alert(seconds(20)) ) {
|
|
|
|
std::auto_ptr<alert> a(am.get());
|
|
|
|
|
|
|
|
dht_reply_data_alert const* rd = alert_cast<dht_reply_data_alert>(&(*a));
|
|
|
|
if( rd ) {
|
|
|
|
ret = entryToJson(rd->m_lst);
|
|
|
|
} else {
|
|
|
|
// cast failed => dht_reply_data_done_alert => no data
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs_dhtgetMap);
|
|
|
|
m_dhtgetMap.erase(ih);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
Value newpostmsg(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 3 && params.size() != 5))
|
|
|
|
throw runtime_error(
|
|
|
|
"newpostmsg <username> <k> <msg> [reply_n] [reply_k]\n"
|
|
|
|
"Post a new message to swarm");
|
|
|
|
|
|
|
|
EnsureWalletIsUnlocked();
|
|
|
|
|
|
|
|
string strUsername = params[0].get_str();
|
|
|
|
int k = params[1].get_int();
|
|
|
|
string strK = boost::lexical_cast<std::string>(k);
|
|
|
|
string strMsg = params[2].get_str();
|
|
|
|
|
|
|
|
string strReplyN, strReplyK;
|
|
|
|
int replyK = 0;
|
|
|
|
if( params.size() == 5 ) {
|
|
|
|
strReplyN = params[3].get_str();
|
|
|
|
replyK = params[4].get_int();
|
|
|
|
strReplyK = boost::lexical_cast<std::string>(replyK);
|
|
|
|
}
|
|
|
|
|
|
|
|
entry v;
|
|
|
|
if( !createSignedUserpost(v, strUsername, k, strMsg,
|
|
|
|
NULL, NULL, NULL,
|
|
|
|
strReplyN, replyK) )
|
|
|
|
throw JSONRPCError(RPC_INTERNAL_ERROR,"error signing post with private key of user");
|
|
|
|
|
|
|
|
vector<char> buf;
|
|
|
|
bencode(std::back_inserter(buf), v);
|
|
|
|
|
|
|
|
std::string errmsg;
|
|
|
|
if( !acceptSignedPost(buf.data(),buf.size(),strUsername,k,errmsg,NULL) )
|
|
|
|
throw JSONRPCError(RPC_INVALID_PARAMS,errmsg);
|
|
|
|
|
|
|
|
torrent_handle h = startTorrentUser(strUsername);
|
|
|
|
if( h.is_valid() ) {
|
|
|
|
// if member of torrent post it directly
|
|
|
|
h.add_piece(k,buf.data(),buf.size());
|
|
|
|
} else {
|
|
|
|
// TODO: swarm resource forwarding not implemented
|
|
|
|
ses->dht_putData(strUsername, "swarm", false,
|
|
|
|
v, strUsername, GetAdjustedTime(), 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// post to dht as well
|
|
|
|
ses->dht_putData(strUsername, string("post")+strK, false,
|
|
|
|
v, strUsername, GetAdjustedTime(), 1);
|
|
|
|
ses->dht_putData(strUsername, string("status"), false,
|
|
|
|
v, strUsername, GetAdjustedTime(), k);
|
|
|
|
|
|
|
|
// is this a reply? notify
|
|
|
|
if( strReplyN.length() ) {
|
|
|
|
ses->dht_putData(strReplyN, string("replies")+strReplyK, true,
|
|
|
|
v, strUsername, GetAdjustedTime(), 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// split and look for mentions and hashtags
|
|
|
|
vector<string> tokens;
|
|
|
|
boost::algorithm::split(tokens,strMsg,boost::algorithm::is_any_of(" \n\t"),
|
|
|
|
boost::algorithm::token_compress_on);
|
|
|
|
BOOST_FOREACH(string const& token, tokens) {
|
|
|
|
if( token.length() >= 2 ) {
|
|
|
|
string word = token.substr(1);
|
|
|
|
if( token.at(0) == '#') {
|
|
|
|
ses->dht_putData(word, "hashtag", true,
|
|
|
|
v, strUsername, GetAdjustedTime(), 0);
|
|
|
|
} else if( token.at(0) == '@') {
|
|
|
|
ses->dht_putData(word, "mention", true,
|
|
|
|
v, strUsername, GetAdjustedTime(), 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return entryToJson(v);
|
|
|
|
}
|
|
|
|
|
|
|
|
Value newdirectmsg(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || params.size() != 4)
|
|
|
|
throw runtime_error(
|
|
|
|
"newdirectmsg <from> <k> <to> <msg>\n"
|
|
|
|
"Post a new dm to swarm");
|
|
|
|
|
|
|
|
EnsureWalletIsUnlocked();
|
|
|
|
|
|
|
|
string strFrom = params[0].get_str();
|
|
|
|
int k = params[1].get_int();
|
|
|
|
string strTo = params[2].get_str();
|
|
|
|
string strMsg = params[3].get_str();
|
|
|
|
|
|
|
|
entry dm;
|
|
|
|
if( !createDirectMessage(dm, strTo, strMsg) )
|
|
|
|
throw JSONRPCError(RPC_INTERNAL_ERROR,
|
|
|
|
"error encrypting to pubkey of destination user");
|
|
|
|
|
|
|
|
entry v;
|
|
|
|
if( !createSignedUserpost(v, strFrom, k, "",
|
|
|
|
NULL, NULL, &dm,
|
|
|
|
std::string(""), 0) )
|
|
|
|
throw JSONRPCError(RPC_INTERNAL_ERROR,"error signing post with private key of user");
|
|
|
|
|
|
|
|
std::vector<char> buf;
|
|
|
|
bencode(std::back_inserter(buf), v);
|
|
|
|
|
|
|
|
std::string errmsg;
|
|
|
|
if( !acceptSignedPost(buf.data(),buf.size(),strFrom,k,errmsg,NULL) )
|
|
|
|
throw JSONRPCError(RPC_INVALID_PARAMS,errmsg);
|
|
|
|
|
|
|
|
{
|
|
|
|
StoredDirectMsg stoDM;
|
|
|
|
stoDM.m_fromMe = true;
|
|
|
|
stoDM.m_text = strMsg;
|
|
|
|
stoDM.m_utcTime = v["userpost"]["time"].integer();
|
|
|
|
|
|
|
|
LOCK(cs_twister);
|
|
|
|
m_users[strFrom].m_directmsg[strTo].push_back(stoDM);
|
|
|
|
}
|
|
|
|
|
|
|
|
torrent_handle h = startTorrentUser(strFrom);
|
|
|
|
h.add_piece(k,buf.data(),buf.size());
|
|
|
|
|
|
|
|
return entryToJson(v);
|
|
|
|
}
|
|
|
|
|
|
|
|
Value newrtmsg(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 3))
|
|
|
|
throw runtime_error(
|
|
|
|
"newrtmsg <username> <k> <rt_v_object>\n"
|
|
|
|
"Post a new RT to swarm");
|
|
|
|
|
|
|
|
EnsureWalletIsUnlocked();
|
|
|
|
|
|
|
|
string strUsername = params[0].get_str();
|
|
|
|
int k = params[1].get_int();
|
|
|
|
string strK = boost::lexical_cast<std::string>(k);
|
|
|
|
entry vrt = jsonToEntry(params[2].get_obj());
|
|
|
|
entry const *rt = vrt.find_key("userpost");
|
|
|
|
entry const *sig_rt= vrt.find_key("sig_userpost");
|
|
|
|
|
|
|
|
entry v;
|
|
|
|
if( !createSignedUserpost(v, strUsername, k, "",
|
|
|
|
rt, sig_rt, NULL,
|
|
|
|
std::string(""), 0) )
|
|
|
|
throw JSONRPCError(RPC_INTERNAL_ERROR,"error signing post with private key of user");
|
|
|
|
|
|
|
|
vector<char> buf;
|
|
|
|
bencode(std::back_inserter(buf), v);
|
|
|
|
|
|
|
|
std::string errmsg;
|
|
|
|
if( !acceptSignedPost(buf.data(),buf.size(),strUsername,k,errmsg,NULL) )
|
|
|
|
throw JSONRPCError(RPC_INVALID_PARAMS,errmsg);
|
|
|
|
|
|
|
|
torrent_handle h = startTorrentUser(strUsername);
|
|
|
|
if( h.is_valid() ) {
|
|
|
|
// if member of torrent post it directly
|
|
|
|
h.add_piece(k,buf.data(),buf.size());
|
|
|
|
} else {
|
|
|
|
// TODO: swarm resource forwarding not implemented
|
|
|
|
ses->dht_putData(strUsername, "swarm", false,
|
|
|
|
v, strUsername, GetAdjustedTime(), 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// post to dht as well
|
|
|
|
ses->dht_putData(strUsername, string("post")+strK, false,
|
|
|
|
v, strUsername, GetAdjustedTime(), 1);
|
|
|
|
|
|
|
|
// notification to keep track of RTs of the original post
|
|
|
|
if( rt ) {
|
|
|
|
string rt_user = rt->find_key("n")->string();
|
|
|
|
string rt_k = boost::lexical_cast<std::string>(rt->find_key("k")->integer());
|
|
|
|
ses->dht_putData(rt_user, string("rts")+rt_k, true,
|
|
|
|
v, strUsername, GetAdjustedTime(), 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
return entryToJson(v);
|
|
|
|
}
|
|
|
|
|
|
|
|
Value getposts(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || params.size() < 2 || params.size() > 3)
|
|
|
|
throw runtime_error(
|
|
|
|
"getposts <count> '[{\"username\":username,\"max_id\":max_id,\"since_id\":since_id},...]' [flags]\n"
|
|
|
|
"get posts from users\n"
|
|
|
|
"max_id and since_id may be omited");
|
|
|
|
|
|
|
|
int count = params[0].get_int();
|
|
|
|
Array users = params[1].get_array();
|
|
|
|
int flags = (params.size() > 2) ? params[2].get_int() : USERPOST_FLAG_RT;
|
|
|
|
|
|
|
|
std::multimap<int64,entry> postsByTime;
|
|
|
|
|
|
|
|
for( unsigned int u = 0; u < users.size(); u++ ) {
|
|
|
|
Object user = users[u].get_obj();
|
|
|
|
string strUsername;
|
|
|
|
int max_id = std::numeric_limits<int>::max();
|
|
|
|
int since_id = -1;
|
|
|
|
|
|
|
|
for (Object::const_iterator i = user.begin(); i != user.end(); ++i) {
|
|
|
|
if( i->name_ == "username" ) strUsername = i->value_.get_str();
|
|
|
|
if( i->name_ == "max_id" ) max_id = i->value_.get_int();
|
|
|
|
if( i->name_ == "since_id" ) since_id = i->value_.get_int();
|
|
|
|
}
|
|
|
|
|
|
|
|
LOCK(cs_twister);
|
|
|
|
if( strUsername.size() && m_userTorrent.count(strUsername) &&
|
|
|
|
m_userTorrent[strUsername].is_valid() ){
|
|
|
|
|
|
|
|
std::vector<std::string> pieces;
|
|
|
|
m_userTorrent[strUsername].get_pieces(pieces, count, max_id, since_id, flags);
|
|
|
|
|
|
|
|
BOOST_FOREACH(string const& piece, pieces) {
|
|
|
|
lazy_entry v;
|
|
|
|
int pos;
|
|
|
|
error_code ec;
|
|
|
|
if (lazy_bdecode(piece.data(), piece.data()+piece.size(), v, ec, &pos) == 0) {
|
|
|
|
lazy_entry const* post = v.dict_find_dict("userpost");
|
|
|
|
int64 time = post->dict_find_int_value("time",-1);
|
|
|
|
|
|
|
|
entry vEntry;
|
|
|
|
vEntry = v;
|
|
|
|
postsByTime.insert( pair<int64,entry>(time, vEntry) );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Array ret;
|
|
|
|
std::multimap<int64,entry>::reverse_iterator rit;
|
|
|
|
for (rit=postsByTime.rbegin(); rit!=postsByTime.rend() && (int)ret.size() < count; ++rit) {
|
|
|
|
ret.push_back( entryToJson(rit->second) );
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs_twister);
|
|
|
|
if( m_receivedSpamMsgStr.length() ) {
|
|
|
|
// we must agree on an acceptable level here
|
|
|
|
// what about one every eight hours? (not cumulative)
|
|
|
|
if( GetAdjustedTime() > m_lastSpamTime + (8*3600) ) {
|
|
|
|
m_lastSpamTime = GetAdjustedTime();
|
|
|
|
|
|
|
|
entry v;
|
|
|
|
entry &userpost = v["userpost"];
|
|
|
|
|
|
|
|
userpost["n"] = m_receivedSpamUserStr;
|
|
|
|
userpost["k"] = 1;
|
|
|
|
userpost["time"] = GetAdjustedTime();
|
|
|
|
userpost["height"] = getBestHeight();
|
|
|
|
|
|
|
|
userpost["msg"] = m_receivedSpamMsgStr;
|
|
|
|
|
|
|
|
unsigned char vchSig[65];
|
|
|
|
RAND_bytes(vchSig,sizeof(vchSig));
|
|
|
|
v["sig_userpost"] = std::string((const char *)vchSig, sizeof(vchSig));
|
|
|
|
ret.insert(ret.begin(),entryToJson(v));
|
|
|
|
}
|
|
|
|
m_receivedSpamMsgStr = "";
|
|
|
|
m_receivedSpamUserStr = "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
Value getdirectmsgs(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || params.size() < 2 || params.size() > 3)
|
|
|
|
throw runtime_error(
|
|
|
|
"getdirectmsgs <localuser> <count_per_user> '[{\"username\":username,\"max_id\":max_id,\"since_id\":since_id},...]'\n"
|
|
|
|
"get (locally stored) decrypted direct messages sent/received by user <localuser>\n"
|
|
|
|
"max_id and since_id may be omited. up to <count_per_user> are returned for each remote user.");
|
|
|
|
|
|
|
|
string strUsername = params[0].get_str();
|
|
|
|
int count = params[1].get_int();
|
|
|
|
Array remoteusers = params[2].get_array();
|
|
|
|
|
|
|
|
Object ret;
|
|
|
|
for( unsigned int u = 0; u < remoteusers.size(); u++ ) {
|
|
|
|
Object remoteUser = remoteusers[u].get_obj();
|
|
|
|
string remoteUsername;
|
|
|
|
int max_id = std::numeric_limits<int>::max();
|
|
|
|
int since_id = -1;
|
|
|
|
|
|
|
|
for (Object::const_iterator i = remoteUser.begin(); i != remoteUser.end(); ++i) {
|
|
|
|
if( i->name_ == "username" ) remoteUsername = i->value_.get_str();
|
|
|
|
if( i->name_ == "max_id" ) max_id = i->value_.get_int();
|
|
|
|
if( i->name_ == "since_id" ) since_id = i->value_.get_int();
|
|
|
|
}
|
|
|
|
|
|
|
|
LOCK(cs_twister);
|
|
|
|
if( remoteUsername.size() && m_users.count(strUsername) &&
|
|
|
|
m_users[strUsername].m_directmsg.count(remoteUsername) ){
|
|
|
|
std::vector<StoredDirectMsg> &dmsFromToUser = m_users[strUsername].m_directmsg[remoteUsername];
|
|
|
|
max_id = std::min( max_id, (int)dmsFromToUser.size()-1);
|
|
|
|
since_id = std::max( since_id, max_id - count );
|
|
|
|
|
|
|
|
Array userMsgs;
|
|
|
|
for( int i = std::max(since_id+1,0); i <= max_id; i++) {
|
|
|
|
Object dmObj;
|
|
|
|
dmObj.push_back(Pair("id",i));
|
|
|
|
dmObj.push_back(Pair("time",dmsFromToUser.at(i).m_utcTime));
|
|
|
|
dmObj.push_back(Pair("text",dmsFromToUser.at(i).m_text));
|
|
|
|
dmObj.push_back(Pair("fromMe",dmsFromToUser.at(i).m_fromMe));
|
|
|
|
userMsgs.push_back(dmObj);
|
|
|
|
}
|
|
|
|
if( userMsgs.size() ) {
|
|
|
|
ret.push_back(Pair(remoteUsername,userMsgs));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Value setspammsg(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 2))
|
|
|
|
throw runtime_error(
|
|
|
|
"setspammsg <username> <msg>\n"
|
|
|
|
"Set spam message attached to generated blocks");
|
|
|
|
|
|
|
|
string strUsername = params[0].get_str();
|
|
|
|
string strMsg = params[1].get_str();
|
|
|
|
|
|
|
|
LOCK(cs_twister);
|
|
|
|
strSpamUser = strUsername;
|
|
|
|
strSpamMessage = strMsg;
|
|
|
|
|
|
|
|
return Value();
|
|
|
|
}
|
|
|
|
|
|
|
|
Value getspammsg(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 0))
|
|
|
|
throw runtime_error(
|
|
|
|
"getspammsg\n"
|
|
|
|
"get spam message attached to generated blocks");
|
|
|
|
|
|
|
|
Array ret;
|
|
|
|
LOCK(cs_twister);
|
|
|
|
ret.push_back(strSpamUser);
|
|
|
|
ret.push_back(strSpamMessage);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
Value follow(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 2))
|
|
|
|
throw runtime_error(
|
|
|
|
"follow <username> [follow_username1,follow_username2,...]\n"
|
|
|
|
"start following users");
|
|
|
|
|
|
|
|
string localUser = params[0].get_str();
|
|
|
|
Array users = params[1].get_array();
|
|
|
|
|
|
|
|
LOCK(cs_twister);
|
|
|
|
for( unsigned int u = 0; u < users.size(); u++ ) {
|
|
|
|
string username = users[u].get_str();
|
|
|
|
|
|
|
|
if( !m_users[localUser].m_following.count(username) ) {
|
|
|
|
if( m_userTorrent.count(username) ) {
|
|
|
|
// perhaps torrent is already initialized due to neighborhood
|
|
|
|
m_users[localUser].m_following.insert(username);
|
|
|
|
} else {
|
|
|
|
torrent_handle h = startTorrentUser(username);
|
|
|
|
if( h.is_valid() ) {
|
|
|
|
m_users[localUser].m_following.insert(username);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return Value();
|
|
|
|
}
|
|
|
|
|
|
|
|
Value unfollow(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 2))
|
|
|
|
throw runtime_error(
|
|
|
|
"unfollow <username> [unfollow_username1,unfollow_username2,...]\n"
|
|
|
|
"stop following users");
|
|
|
|
|
|
|
|
string localUser = params[0].get_str();
|
|
|
|
Array users = params[1].get_array();
|
|
|
|
|
|
|
|
LOCK(cs_twister);
|
|
|
|
for( unsigned int u = 0; u < users.size(); u++ ) {
|
|
|
|
string username = users[u].get_str();
|
|
|
|
|
|
|
|
if( m_users[localUser].m_following.count(username) ) {
|
|
|
|
m_users[localUser].m_following.erase(username);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return Value();
|
|
|
|
}
|
|
|
|
|
|
|
|
Value getfollowing(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 1))
|
|
|
|
throw runtime_error(
|
|
|
|
"getfollowing <username>\n"
|
|
|
|
"get list of users we follow");
|
|
|
|
|
|
|
|
string localUser = params[0].get_str();
|
|
|
|
|
|
|
|
Array ret;
|
|
|
|
LOCK(cs_twister);
|
|
|
|
BOOST_FOREACH(string username, m_users[localUser].m_following) {
|
|
|
|
ret.push_back(username);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
Value getlasthave(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 1))
|
|
|
|
throw runtime_error(
|
|
|
|
"getlasthave <username>\n"
|
|
|
|
"get last 'have' (higher post number) of each user user we follow");
|
|
|
|
|
|
|
|
string localUser = params[0].get_str();
|
|
|
|
|
|
|
|
Object ret;
|
|
|
|
LOCK(cs_twister);
|
|
|
|
BOOST_FOREACH(string username, m_users[localUser].m_following) {
|
|
|
|
ret.push_back(Pair(username,lastPostKfromTorrent(username)));
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
Value listusernamespartial(const Array& params, bool fHelp)
|
|
|
|
{
|
|
|
|
if (fHelp || (params.size() != 2))
|
|
|
|
throw runtime_error(
|
|
|
|
"listusernamespartial <username_starts_with> <count>\n"
|
|
|
|
"get list of usernames starting with");
|
|
|
|
|
|
|
|
string userStartsWith = params[0].get_str();
|
|
|
|
size_t count = params[1].get_int();
|
|
|
|
|
|
|
|
set<string> retStrings;
|
|
|
|
|
|
|
|
// priorize users in following list
|
|
|
|
{
|
|
|
|
LOCK(pwalletMain->cs_wallet);
|
|
|
|
BOOST_FOREACH(const PAIRTYPE(CKeyID, CKeyMetadata)& item, pwalletMain->mapKeyMetadata) {
|
|
|
|
LOCK(cs_twister);
|
|
|
|
BOOST_FOREACH(const string &user, m_users[item.second.username].m_following) {
|
|
|
|
int toCompare = std::min( userStartsWith.size(), user.size() );
|
|
|
|
if( memcmp( user.data(), userStartsWith.data(), toCompare ) == 0 )
|
|
|
|
retStrings.insert( user );
|
|
|
|
if( retStrings.size() >= count )
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// now the rest, the entire block chain
|
|
|
|
for(CBlockIndex* pindex = pindexBest; pindex && retStrings.size() < count; pindex = pindex->pprev ) {
|
|
|
|
CBlock block;
|
|
|
|
if( !ReadBlockFromDisk(block, pindex) )
|
|
|
|
continue;
|
|
|
|
|
|
|
|
BOOST_FOREACH(const CTransaction&tx, block.vtx) {
|
|
|
|
if( !tx.IsSpamMessage() ) {
|
|
|
|
string txUsername = tx.userName.ExtractSmallString();
|
|
|
|
int toCompare = std::min( userStartsWith.size(), txUsername.size() );
|
|
|
|
if( memcmp( txUsername.data(), userStartsWith.data(), toCompare ) == 0 )
|
|
|
|
retStrings.insert( txUsername );
|
|
|
|
if( retStrings.size() >= count )
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Array ret;
|
|
|
|
BOOST_FOREACH(string username, retStrings) {
|
|
|
|
ret.push_back(username);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|