Branch data Line data Source code
1 : : // Copyright (c) 2009-present The Bitcoin Core developers
2 : : // Distributed under the MIT software license, see the accompanying
3 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 : :
5 : : #include <rpc/server.h>
6 : :
7 : : #include <addrman.h>
8 : : #include <addrman_impl.h>
9 : : #include <banman.h>
10 : : #include <chainparams.h>
11 : : #include <clientversion.h>
12 : : #include <core_io.h>
13 : : #include <net_permissions.h>
14 : : #include <net_processing.h>
15 : : #include <net_types.h>
16 : : #include <netbase.h>
17 : : #include <node/context.h>
18 : : #include <node/protocol_version.h>
19 : : #include <node/warnings.h>
20 : : #include <policy/settings.h>
21 : : #include <protocol.h>
22 : : #include <rpc/blockchain.h>
23 : : #include <rpc/protocol.h>
24 : : #include <rpc/server_util.h>
25 : : #include <rpc/util.h>
26 : : #include <sync.h>
27 : : #include <univalue.h>
28 : : #include <util/chaintype.h>
29 : : #include <util/strencodings.h>
30 : : #include <util/string.h>
31 : : #include <util/time.h>
32 : : #include <util/translation.h>
33 : : #include <validation.h>
34 : :
35 : : #include <chrono>
36 : : #include <optional>
37 : : #include <stdexcept>
38 : : #include <string>
39 : : #include <string_view>
40 : : #include <vector>
41 : :
42 : : using node::NodeContext;
43 : : using util::Join;
44 : :
45 : : const std::vector<std::string> CONNECTION_TYPE_DOC{
46 : : "outbound-full-relay (default automatic connections)",
47 : : "block-relay-only (does not relay transactions or addresses)",
48 : : "inbound (initiated by the peer)",
49 : : "manual (added via addnode RPC or -addnode/-connect configuration options)",
50 : : "addr-fetch (short-lived automatic connection for soliciting addresses)",
51 : : "feeler (short-lived automatic connection for testing addresses)",
52 : : "private-broadcast (short-lived automatic connection for broadcasting privacy-sensitive transactions)"
53 : : };
54 : :
55 : : const std::vector<std::string> TRANSPORT_TYPE_DOC{
56 : : "detecting (peer could be v1 or v2)",
57 : : "v1 (plaintext transport protocol)",
58 : : "v2 (BIP324 encrypted transport protocol)"
59 : : };
60 : :
61 : 61 : static RPCHelpMan getconnectioncount()
62 : : {
63 : 61 : return RPCHelpMan{
64 : 61 : "getconnectioncount",
65 [ + - ]: 122 : "Returns the number of connections to other nodes.\n",
66 : : {},
67 [ + - ]: 122 : RPCResult{
68 [ + - ]: 122 : RPCResult::Type::NUM, "", "The connection count"
69 [ + - ]: 122 : },
70 : 61 : RPCExamples{
71 [ + - + - : 122 : HelpExampleCli("getconnectioncount", "")
+ - ]
72 [ + - + - : 244 : + HelpExampleRpc("getconnectioncount", "")
+ - + - ]
73 [ + - ]: 61 : },
74 : 61 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
75 : : {
76 : 1 : NodeContext& node = EnsureAnyNodeContext(request.context);
77 : 1 : const CConnman& connman = EnsureConnman(node);
78 : :
79 : 1 : return connman.GetNodeCount(ConnectionDirection::Both);
80 : : },
81 [ + - + - ]: 244 : };
82 : : }
83 : :
84 : 71 : static RPCHelpMan ping()
85 : : {
86 : 71 : return RPCHelpMan{
87 : 71 : "ping",
88 [ + - ]: 142 : "Requests that a ping be sent to all other nodes, to measure ping time.\n"
89 : : "Results are provided in getpeerinfo.\n"
90 : : "Ping command is handled in queue with all other commands, so it measures processing backlog, not just network ping.\n",
91 : : {},
92 [ + - + - : 142 : RPCResult{RPCResult::Type::NONE, "", ""},
+ - ]
93 : 71 : RPCExamples{
94 [ + - + - : 142 : HelpExampleCli("ping", "")
+ - ]
95 [ + - + - : 284 : + HelpExampleRpc("ping", "")
+ - + - ]
96 [ + - ]: 71 : },
97 : 71 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
98 : : {
99 : 2 : NodeContext& node = EnsureAnyNodeContext(request.context);
100 : 2 : PeerManager& peerman = EnsurePeerman(node);
101 : :
102 : : // Request that each node send a ping during next message processing pass
103 : 2 : peerman.SendPings();
104 : 2 : return UniValue::VNULL;
105 : : },
106 [ + - + - ]: 284 : };
107 : : }
108 : :
109 : : /** Returns, given services flags, a list of humanly readable (known) network services */
110 : 1 : static UniValue GetServicesNames(ServiceFlags services)
111 : : {
112 : 1 : UniValue servicesNames(UniValue::VARR);
113 : :
114 [ + - - + ]: 1 : for (const auto& flag : serviceFlagsToStr(services)) {
115 [ # # # # ]: 0 : servicesNames.push_back(flag);
116 : 1 : }
117 : :
118 : 1 : return servicesNames;
119 : 0 : }
120 : :
121 : 63 : static RPCHelpMan getpeerinfo()
122 : : {
123 : 63 : return RPCHelpMan{
124 : 63 : "getpeerinfo",
125 [ + - ]: 126 : "Returns data about each connected network peer as a json array of objects.",
126 : : {},
127 [ + - ]: 126 : RPCResult{
128 [ + - ]: 126 : RPCResult::Type::ARR, "", "",
129 : : {
130 [ + - + - ]: 126 : {RPCResult::Type::OBJ, "", "",
131 : : {
132 : : {
133 [ + - + - ]: 126 : {RPCResult::Type::NUM, "id", "Peer index"},
134 [ + - + - ]: 126 : {RPCResult::Type::STR, "addr", "(host:port) The IP address/hostname optionally followed by :port of the peer"},
135 [ + - + - ]: 126 : {RPCResult::Type::STR, "addrbind", /*optional=*/true, "(ip:port) Bind address of the connection to the peer"},
136 [ + - + - ]: 126 : {RPCResult::Type::STR, "addrlocal", /*optional=*/true, "(ip:port) Local address as reported by the peer"},
137 [ + - + - : 126 : {RPCResult::Type::STR, "network", "Network (" + Join(GetNetworkNames(/*append_unroutable=*/true), ", ") + ")"},
+ - + - ]
138 [ + - + - ]: 126 : {RPCResult::Type::NUM, "mapped_as", /*optional=*/true, "Mapped AS (Autonomous System) number at the end of the BGP route to the peer, used for diversifying\n"
139 : : "peer selection (only displayed if the -asmap config option is set)"},
140 [ + - + - ]: 126 : {RPCResult::Type::STR_HEX, "services", "The services offered"},
141 [ + - + - ]: 126 : {RPCResult::Type::ARR, "servicesnames", "the services offered, in human-readable form",
142 : : {
143 [ + - + - ]: 126 : {RPCResult::Type::STR, "SERVICE_NAME", "the service name if it is recognised"}
144 : : }},
145 [ + - + - ]: 126 : {RPCResult::Type::BOOL, "relaytxes", "Whether we relay transactions to this peer"},
146 [ + - + - ]: 126 : {RPCResult::Type::NUM, "last_inv_sequence", "Mempool sequence number of this peer's last INV"},
147 [ + - + - ]: 126 : {RPCResult::Type::NUM, "inv_to_send", "How many txs we have queued to announce to this peer"},
148 [ + - + - ]: 126 : {RPCResult::Type::NUM_TIME, "lastsend", "The " + UNIX_EPOCH_TIME + " of the last send"},
149 [ + - + - ]: 126 : {RPCResult::Type::NUM_TIME, "lastrecv", "The " + UNIX_EPOCH_TIME + " of the last receive"},
150 [ + - + - ]: 126 : {RPCResult::Type::NUM_TIME, "last_transaction", "The " + UNIX_EPOCH_TIME + " of the last valid transaction received from this peer"},
151 [ + - + - ]: 126 : {RPCResult::Type::NUM_TIME, "last_block", "The " + UNIX_EPOCH_TIME + " of the last block received from this peer"},
152 [ + - + - ]: 126 : {RPCResult::Type::NUM, "bytessent", "The total bytes sent"},
153 [ + - + - ]: 126 : {RPCResult::Type::NUM, "bytesrecv", "The total bytes received"},
154 [ + - + - ]: 126 : {RPCResult::Type::NUM_TIME, "conntime", "The " + UNIX_EPOCH_TIME + " of the connection"},
155 [ + - + - ]: 126 : {RPCResult::Type::NUM, "timeoffset", "The time offset in seconds"},
156 [ + - + - ]: 126 : {RPCResult::Type::NUM, "pingtime", /*optional=*/true, "The last ping time in seconds, if any"},
157 [ + - + - ]: 126 : {RPCResult::Type::NUM, "minping", /*optional=*/true, "The minimum observed ping time in seconds, if any"},
158 [ + - + - ]: 126 : {RPCResult::Type::NUM, "pingwait", /*optional=*/true, "The duration in seconds of an outstanding ping (if non-zero)"},
159 [ + - + - ]: 126 : {RPCResult::Type::NUM, "version", "The peer version, such as 70001"},
160 [ + - + - ]: 126 : {RPCResult::Type::STR, "subver", "The string version"},
161 [ + - + - ]: 126 : {RPCResult::Type::BOOL, "inbound", "Inbound (true) or Outbound (false)"},
162 [ + - + - ]: 126 : {RPCResult::Type::BOOL, "bip152_hb_to", "Whether we selected peer as (compact blocks) high-bandwidth peer"},
163 [ + - + - ]: 126 : {RPCResult::Type::BOOL, "bip152_hb_from", "Whether peer selected us as (compact blocks) high-bandwidth peer"},
164 [ + - + - ]: 126 : {RPCResult::Type::NUM, "presynced_headers", "The current height of header pre-synchronization with this peer, or -1 if no low-work sync is in progress"},
165 [ + - + - ]: 126 : {RPCResult::Type::NUM, "synced_headers", "The last header we have in common with this peer"},
166 [ + - + - ]: 126 : {RPCResult::Type::NUM, "synced_blocks", "The last block we have in common with this peer"},
167 [ + - + - ]: 126 : {RPCResult::Type::ARR, "inflight", "",
168 : : {
169 [ + - + - ]: 126 : {RPCResult::Type::NUM, "n", "The heights of blocks we're currently asking from this peer"},
170 : : }},
171 [ + - + - ]: 126 : {RPCResult::Type::BOOL, "addr_relay_enabled", "Whether we participate in address relay with this peer"},
172 [ + - + - ]: 126 : {RPCResult::Type::NUM, "addr_processed", "The total number of addresses processed, excluding those dropped due to rate limiting"},
173 [ + - + - ]: 126 : {RPCResult::Type::NUM, "addr_rate_limited", "The total number of addresses dropped due to rate limiting"},
174 [ + - + - ]: 126 : {RPCResult::Type::ARR, "permissions", "Any special permissions that have been granted to this peer",
175 : : {
176 [ + - + - ]: 126 : {RPCResult::Type::STR, "permission_type", Join(NET_PERMISSIONS_DOC, ",\n") + ".\n"},
177 : : }},
178 [ + - + - ]: 126 : {RPCResult::Type::NUM, "minfeefilter", "The minimum fee rate for transactions this peer accepts"},
179 [ + - + - ]: 126 : {RPCResult::Type::OBJ_DYN, "bytessent_per_msg", "",
180 : : {
181 [ + - + - ]: 126 : {RPCResult::Type::NUM, "msg", "The total bytes sent aggregated by message type\n"
182 : : "When a message type is not listed in this json object, the bytes sent are 0.\n"
183 : : "Only known message types can appear as keys in the object."}
184 : : }},
185 [ + - + - ]: 126 : {RPCResult::Type::OBJ_DYN, "bytesrecv_per_msg", "",
186 : : {
187 [ + - ]: 126 : {RPCResult::Type::NUM, "msg", "The total bytes received aggregated by message type\n"
188 : : "When a message type is not listed in this json object, the bytes received are 0.\n"
189 : : "Only known message types can appear as keys in the object and all bytes received\n"
190 [ + - ]: 126 : "of unknown message types are listed under '"+NET_MESSAGE_TYPE_OTHER+"'."}
191 : : }},
192 [ + - + - : 126 : {RPCResult::Type::STR, "connection_type", "Type of connection: \n" + Join(CONNECTION_TYPE_DOC, ",\n") + ".\n"
+ - ]
193 : : "Please note this output is unlikely to be stable in upcoming releases as we iterate to\n"
194 : 63 : "best capture connection behaviors."},
195 [ + - + - : 126 : {RPCResult::Type::STR, "transport_protocol_type", "Type of transport protocol: \n" + Join(TRANSPORT_TYPE_DOC, ",\n") + ".\n"},
+ - ]
196 [ + - + - ]: 126 : {RPCResult::Type::STR, "session_id", "The session ID for this connection, or \"\" if there is none (\"v2\" transport protocol only).\n"},
197 : : }},
198 : : }},
199 [ + - + - : 6426 : },
+ - + - +
- + - + -
+ - + + +
+ + + + +
+ + + + +
+ - - - -
- - - - -
- - - -
- ]
200 : 63 : RPCExamples{
201 [ + - + - : 126 : HelpExampleCli("getpeerinfo", "")
+ - ]
202 [ + - + - : 252 : + HelpExampleRpc("getpeerinfo", "")
+ - + - ]
203 [ + - ]: 63 : },
204 : 63 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
205 : : {
206 : 1 : NodeContext& node = EnsureAnyNodeContext(request.context);
207 : 1 : const CConnman& connman = EnsureConnman(node);
208 : 1 : const PeerManager& peerman = EnsurePeerman(node);
209 : :
210 : 1 : std::vector<CNodeStats> vstats;
211 [ + - ]: 1 : connman.GetNodeStats(vstats);
212 : :
213 : 1 : UniValue ret(UniValue::VARR);
214 : :
215 [ - + ]: 1 : for (const CNodeStats& stats : vstats) {
216 : 0 : UniValue obj(UniValue::VOBJ);
217 [ # # ]: 0 : CNodeStateStats statestats;
218 [ # # ]: 0 : bool fStateStats = peerman.GetNodeStateStats(stats.nodeid, statestats);
219 : : // GetNodeStateStats() requires the existence of a CNodeState and a Peer object
220 : : // to succeed for this peer. These are created at connection initialisation and
221 : : // exist for the duration of the connection - except if there is a race where the
222 : : // peer got disconnected in between the GetNodeStats() and the GetNodeStateStats()
223 : : // calls. In this case, the peer doesn't need to be reported here.
224 [ # # ]: 0 : if (!fStateStats) {
225 : 0 : continue;
226 : : }
227 [ # # # # : 0 : obj.pushKV("id", stats.nodeid);
# # ]
228 [ # # # # : 0 : obj.pushKV("addr", stats.m_addr_name);
# # ]
229 [ # # # # ]: 0 : if (stats.addrBind.IsValid()) {
230 [ # # # # : 0 : obj.pushKV("addrbind", stats.addrBind.ToStringAddrPort());
# # # # ]
231 : : }
232 [ # # ]: 0 : if (!(stats.addrLocal.empty())) {
233 [ # # # # : 0 : obj.pushKV("addrlocal", stats.addrLocal);
# # ]
234 : : }
235 [ # # # # : 0 : obj.pushKV("network", GetNetworkName(stats.m_network));
# # # # ]
236 [ # # ]: 0 : if (stats.m_mapped_as != 0) {
237 [ # # # # : 0 : obj.pushKV("mapped_as", stats.m_mapped_as);
# # ]
238 : : }
239 : 0 : ServiceFlags services{statestats.their_services};
240 [ # # # # : 0 : obj.pushKV("services", strprintf("%016x", services));
# # # # ]
241 [ # # # # : 0 : obj.pushKV("servicesnames", GetServicesNames(services));
# # ]
242 [ # # # # : 0 : obj.pushKV("relaytxes", statestats.m_relay_txs);
# # ]
243 [ # # # # : 0 : obj.pushKV("last_inv_sequence", statestats.m_last_inv_seq);
# # ]
244 [ # # # # : 0 : obj.pushKV("inv_to_send", statestats.m_inv_to_send);
# # ]
245 [ # # # # : 0 : obj.pushKV("lastsend", count_seconds(stats.m_last_send));
# # ]
246 [ # # # # : 0 : obj.pushKV("lastrecv", count_seconds(stats.m_last_recv));
# # ]
247 [ # # # # : 0 : obj.pushKV("last_transaction", count_seconds(stats.m_last_tx_time));
# # ]
248 [ # # # # : 0 : obj.pushKV("last_block", count_seconds(stats.m_last_block_time));
# # ]
249 [ # # # # : 0 : obj.pushKV("bytessent", stats.nSendBytes);
# # ]
250 [ # # # # : 0 : obj.pushKV("bytesrecv", stats.nRecvBytes);
# # ]
251 [ # # # # : 0 : obj.pushKV("conntime", count_seconds(stats.m_connected));
# # ]
252 [ # # # # : 0 : obj.pushKV("timeoffset", Ticks<std::chrono::seconds>(statestats.time_offset));
# # ]
253 [ # # ]: 0 : if (stats.m_last_ping_time > 0us) {
254 [ # # # # : 0 : obj.pushKV("pingtime", Ticks<SecondsDouble>(stats.m_last_ping_time));
# # ]
255 : : }
256 [ # # ]: 0 : if (stats.m_min_ping_time < std::chrono::microseconds::max()) {
257 [ # # # # : 0 : obj.pushKV("minping", Ticks<SecondsDouble>(stats.m_min_ping_time));
# # ]
258 : : }
259 [ # # ]: 0 : if (statestats.m_ping_wait > 0s) {
260 [ # # # # : 0 : obj.pushKV("pingwait", Ticks<SecondsDouble>(statestats.m_ping_wait));
# # ]
261 : : }
262 [ # # # # : 0 : obj.pushKV("version", stats.nVersion);
# # ]
263 : : // Use the sanitized form of subver here, to avoid tricksy remote peers from
264 : : // corrupting or modifying the JSON output by putting special characters in
265 : : // their ver message.
266 [ # # # # : 0 : obj.pushKV("subver", stats.cleanSubVer);
# # ]
267 [ # # # # : 0 : obj.pushKV("inbound", stats.fInbound);
# # ]
268 [ # # # # : 0 : obj.pushKV("bip152_hb_to", stats.m_bip152_highbandwidth_to);
# # ]
269 [ # # # # : 0 : obj.pushKV("bip152_hb_from", stats.m_bip152_highbandwidth_from);
# # ]
270 [ # # # # : 0 : obj.pushKV("presynced_headers", statestats.presync_height);
# # ]
271 [ # # # # : 0 : obj.pushKV("synced_headers", statestats.nSyncHeight);
# # ]
272 [ # # # # : 0 : obj.pushKV("synced_blocks", statestats.nCommonHeight);
# # ]
273 : 0 : UniValue heights(UniValue::VARR);
274 [ # # ]: 0 : for (const int height : statestats.vHeightInFlight) {
275 [ # # # # ]: 0 : heights.push_back(height);
276 : : }
277 [ # # # # ]: 0 : obj.pushKV("inflight", std::move(heights));
278 [ # # # # : 0 : obj.pushKV("addr_relay_enabled", statestats.m_addr_relay_enabled);
# # ]
279 [ # # # # : 0 : obj.pushKV("addr_processed", statestats.m_addr_processed);
# # ]
280 [ # # # # : 0 : obj.pushKV("addr_rate_limited", statestats.m_addr_rate_limited);
# # ]
281 : 0 : UniValue permissions(UniValue::VARR);
282 [ # # # # ]: 0 : for (const auto& permission : NetPermissions::ToStrings(stats.m_permission_flags)) {
283 [ # # # # ]: 0 : permissions.push_back(permission);
284 : 0 : }
285 [ # # # # ]: 0 : obj.pushKV("permissions", std::move(permissions));
286 [ # # # # : 0 : obj.pushKV("minfeefilter", ValueFromAmount(statestats.m_fee_filter_received));
# # ]
287 : :
288 : 0 : UniValue sendPerMsgType(UniValue::VOBJ);
289 [ # # ]: 0 : for (const auto& i : stats.mapSendBytesPerMsgType) {
290 [ # # ]: 0 : if (i.second > 0)
291 [ # # # # : 0 : sendPerMsgType.pushKV(i.first, i.second);
# # ]
292 : : }
293 [ # # # # ]: 0 : obj.pushKV("bytessent_per_msg", std::move(sendPerMsgType));
294 : :
295 : 0 : UniValue recvPerMsgType(UniValue::VOBJ);
296 [ # # ]: 0 : for (const auto& i : stats.mapRecvBytesPerMsgType) {
297 [ # # ]: 0 : if (i.second > 0)
298 [ # # # # : 0 : recvPerMsgType.pushKV(i.first, i.second);
# # ]
299 : : }
300 [ # # # # ]: 0 : obj.pushKV("bytesrecv_per_msg", std::move(recvPerMsgType));
301 [ # # # # : 0 : obj.pushKV("connection_type", ConnectionTypeAsString(stats.m_conn_type));
# # # # ]
302 [ # # # # : 0 : obj.pushKV("transport_protocol_type", TransportTypeAsString(stats.m_transport_type));
# # # # ]
303 [ # # # # : 0 : obj.pushKV("session_id", stats.m_session_id);
# # ]
304 : :
305 [ # # ]: 0 : ret.push_back(std::move(obj));
306 : 0 : }
307 : :
308 : 1 : return ret;
309 : 1 : },
310 [ + - + - ]: 252 : };
311 [ + - + - : 5922 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
- - ]
312 : :
313 : 55 : static RPCHelpMan addnode()
314 : : {
315 : 55 : return RPCHelpMan{
316 : 55 : "addnode",
317 : : "Attempts to add or remove a node from the addnode list.\n"
318 : : "Or try a connection to a node once.\n"
319 : : "Nodes added using addnode (or -connect) are protected from DoS disconnection and are not required to be\n"
320 : 55 : "full nodes/support SegWit as other outbound peers are (though such peers will not be synced from).\n" +
321 [ + - + - ]: 165 : strprintf("Addnode connections are limited to %u at a time", MAX_ADDNODE_CONNECTIONS) +
322 : 55 : " and are counted separately from the -maxconnections limit.\n",
323 : : {
324 [ + - + - ]: 110 : {"node", RPCArg::Type::STR, RPCArg::Optional::NO, "The IP address/hostname optionally followed by :port of the peer to connect to"},
325 [ + - + - ]: 110 : {"command", RPCArg::Type::STR, RPCArg::Optional::NO, "'add' to add a node to the list, 'remove' to remove a node from the list, 'onetry' to try a connection to the node once"},
326 [ + - + - : 165 : {"v2transport", RPCArg::Type::BOOL, RPCArg::DefaultHint{"set by -v2transport"}, "Attempt to connect using BIP324 v2 transport protocol (ignored for 'remove' command)"},
+ - ]
327 : : },
328 [ + - + - : 110 : RPCResult{RPCResult::Type::NONE, "", ""},
+ - + - ]
329 : 55 : RPCExamples{
330 [ + - + - : 110 : HelpExampleCli("addnode", "\"192.168.0.6:8333\" \"onetry\" true")
+ - ]
331 [ + - + - : 220 : + HelpExampleRpc("addnode", "\"192.168.0.6:8333\", \"onetry\" true")
+ - + - ]
332 [ + - ]: 55 : },
333 : 55 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
334 : : {
335 : 0 : const auto command{self.Arg<std::string_view>("command")};
336 [ # # # # : 0 : if (command != "onetry" && command != "add" && command != "remove") {
# # ]
337 : 0 : throw std::runtime_error(
338 [ # # # # ]: 0 : self.ToString());
339 : : }
340 : :
341 : 0 : NodeContext& node = EnsureAnyNodeContext(request.context);
342 : 0 : CConnman& connman = EnsureConnman(node);
343 : :
344 : 0 : const auto node_arg{self.Arg<std::string_view>("node")};
345 : 0 : bool node_v2transport = connman.GetLocalServices() & NODE_P2P_V2;
346 [ # # ]: 0 : bool use_v2transport = self.MaybeArg<bool>("v2transport").value_or(node_v2transport);
347 : :
348 [ # # # # ]: 0 : if (use_v2transport && !node_v2transport) {
349 [ # # # # ]: 0 : throw JSONRPCError(RPC_INVALID_PARAMETER, "Error: v2transport requested but not enabled (see -v2transport)");
350 : : }
351 : :
352 [ # # ]: 0 : if (command == "onetry")
353 : : {
354 : 0 : CAddress addr;
355 [ # # # # : 0 : connman.OpenNetworkConnection(addr, /*fCountFailure=*/false, /*grant_outbound=*/{}, std::string{node_arg}.c_str(), ConnectionType::MANUAL, use_v2transport);
# # ]
356 : 0 : return UniValue::VNULL;
357 : 0 : }
358 : :
359 [ # # ]: 0 : if (command == "add")
360 : : {
361 [ # # ]: 0 : if (!connman.AddNode({std::string{node_arg}, use_v2transport})) {
362 [ # # # # ]: 0 : throw JSONRPCError(RPC_CLIENT_NODE_ALREADY_ADDED, "Error: Node already added");
363 : : }
364 : : }
365 [ # # ]: 0 : else if (command == "remove")
366 : : {
367 [ # # ]: 0 : if (!connman.RemoveAddedNode(node_arg)) {
368 [ # # # # ]: 0 : throw JSONRPCError(RPC_CLIENT_NODE_NOT_ADDED, "Error: Node could not be removed. It has not been added previously.");
369 : : }
370 : : }
371 : :
372 : 0 : return UniValue::VNULL;
373 [ # # ]: 0 : },
374 [ + - + - : 385 : };
+ + - - ]
375 [ + - + - : 330 : }
+ - - - ]
376 : :
377 : 54 : static RPCHelpMan addconnection()
378 : : {
379 : 54 : return RPCHelpMan{
380 : 54 : "addconnection",
381 [ + - ]: 108 : "Open an outbound connection to a specified node. This RPC is for testing only.\n",
382 : : {
383 [ + - + - ]: 108 : {"address", RPCArg::Type::STR, RPCArg::Optional::NO, "The IP address and port to attempt connecting to."},
384 [ + - + - ]: 108 : {"connection_type", RPCArg::Type::STR, RPCArg::Optional::NO, "Type of connection to open (\"outbound-full-relay\", \"block-relay-only\", \"addr-fetch\" or \"feeler\")."},
385 [ + - + - ]: 108 : {"v2transport", RPCArg::Type::BOOL, RPCArg::Optional::NO, "Attempt to connect using BIP324 v2 transport protocol"},
386 : : },
387 [ + - ]: 108 : RPCResult{
388 [ + - + - ]: 108 : RPCResult::Type::OBJ, "", "",
389 : : {
390 [ + - + - ]: 108 : { RPCResult::Type::STR, "address", "Address of newly added connection." },
391 [ + - + - ]: 108 : { RPCResult::Type::STR, "connection_type", "Type of connection opened." },
392 [ + - + - : 324 : }},
+ + - - ]
393 : 54 : RPCExamples{
394 [ + - + - : 108 : HelpExampleCli("addconnection", "\"192.168.0.6:8333\" \"outbound-full-relay\" true")
+ - ]
395 [ + - + - : 216 : + HelpExampleRpc("addconnection", "\"192.168.0.6:8333\" \"outbound-full-relay\" true")
+ - + - ]
396 [ + - ]: 54 : },
397 : 54 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
398 : : {
399 [ # # ]: 0 : if (Params().GetChainType() != ChainType::REGTEST) {
400 [ # # ]: 0 : throw std::runtime_error("addconnection is for regression testing (-regtest mode) only.");
401 : : }
402 : :
403 [ # # ]: 0 : const std::string address = request.params[0].get_str();
404 [ # # # # ]: 0 : auto conn_type_in{util::TrimStringView(self.Arg<std::string_view>("connection_type"))};
405 : 0 : ConnectionType conn_type{};
406 [ # # ]: 0 : if (conn_type_in == "outbound-full-relay") {
407 : : conn_type = ConnectionType::OUTBOUND_FULL_RELAY;
408 [ # # ]: 0 : } else if (conn_type_in == "block-relay-only") {
409 : : conn_type = ConnectionType::BLOCK_RELAY;
410 [ # # ]: 0 : } else if (conn_type_in == "addr-fetch") {
411 : : conn_type = ConnectionType::ADDR_FETCH;
412 [ # # ]: 0 : } else if (conn_type_in == "feeler") {
413 : : conn_type = ConnectionType::FEELER;
414 : : } else {
415 [ # # # # ]: 0 : throw JSONRPCError(RPC_INVALID_PARAMETER, self.ToString());
416 : : }
417 [ # # ]: 0 : bool use_v2transport{self.Arg<bool>("v2transport")};
418 : :
419 [ # # ]: 0 : NodeContext& node = EnsureAnyNodeContext(request.context);
420 [ # # ]: 0 : CConnman& connman = EnsureConnman(node);
421 : :
422 [ # # # # : 0 : if (use_v2transport && !(connman.GetLocalServices() & NODE_P2P_V2)) {
# # ]
423 [ # # # # ]: 0 : throw JSONRPCError(RPC_INVALID_PARAMETER, "Error: Adding v2transport connections requires -v2transport init flag to be set.");
424 : : }
425 : :
426 [ # # ]: 0 : const bool success = connman.AddConnection(address, conn_type, use_v2transport);
427 [ # # ]: 0 : if (!success) {
428 [ # # # # ]: 0 : throw JSONRPCError(RPC_CLIENT_NODE_CAPACITY_REACHED, "Error: Already at capacity for specified connection type.");
429 : : }
430 : :
431 : 0 : UniValue info(UniValue::VOBJ);
432 [ # # # # : 0 : info.pushKV("address", address);
# # ]
433 [ # # # # : 0 : info.pushKV("connection_type", conn_type_in);
# # ]
434 : :
435 : 0 : return info;
436 : 0 : },
437 [ + - + - : 378 : };
+ + - - ]
438 [ + - + - : 540 : }
+ - + - +
- - - -
- ]
439 : :
440 : 69 : static RPCHelpMan disconnectnode()
441 : : {
442 : 69 : return RPCHelpMan{
443 : 69 : "disconnectnode",
444 [ + - ]: 138 : "Immediately disconnects from the specified peer node.\n"
445 : : "\nStrictly one out of 'address' and 'nodeid' can be provided to identify the node.\n"
446 : : "\nTo disconnect by nodeid, either set 'address' to the empty string, or call using the named 'nodeid' argument only.\n",
447 : : {
448 [ + - + - : 207 : {"address", RPCArg::Type::STR, RPCArg::DefaultHint{"fallback to nodeid"}, "The IP address/port of the node"},
+ - ]
449 [ + - + - : 207 : {"nodeid", RPCArg::Type::NUM, RPCArg::DefaultHint{"fallback to address"}, "The node ID (see getpeerinfo for node IDs)"},
+ - ]
450 : : },
451 [ + - + - : 138 : RPCResult{RPCResult::Type::NONE, "", ""},
+ - + - ]
452 : 69 : RPCExamples{
453 [ + - + - : 138 : HelpExampleCli("disconnectnode", "\"192.168.0.6:8333\"")
+ - ]
454 [ + - + - : 276 : + HelpExampleCli("disconnectnode", "\"\" 1")
+ - + - ]
455 [ + - + - : 276 : + HelpExampleRpc("disconnectnode", "\"192.168.0.6:8333\"")
+ - + - ]
456 [ + - + - : 276 : + HelpExampleRpc("disconnectnode", "\"\", 1")
+ - + - ]
457 [ + - ]: 69 : },
458 : 69 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
459 : : {
460 : 5 : NodeContext& node = EnsureAnyNodeContext(request.context);
461 : 5 : CConnman& connman = EnsureConnman(node);
462 : :
463 : 5 : bool success;
464 : 5 : auto address{self.MaybeArg<std::string_view>("address")};
465 : 5 : auto node_id{self.MaybeArg<int64_t>("nodeid")};
466 : :
467 [ + + + + ]: 5 : if (address && !node_id) {
468 : : /* handle disconnect-by-address */
469 : 1 : success = connman.DisconnectNode(*address);
470 [ + + + - : 4 : } else if (node_id && (!address || address->empty())) {
+ + ]
471 : : /* handle disconnect-by-id */
472 : 1 : success = connman.DisconnectNode(*node_id);
473 : : } else {
474 [ + - + - ]: 6 : throw JSONRPCError(RPC_INVALID_PARAMS, "Only one of address and nodeid should be provided.");
475 : : }
476 : :
477 [ + - ]: 2 : if (!success) {
478 [ + - + - ]: 4 : throw JSONRPCError(RPC_CLIENT_NODE_NOT_CONNECTED, "Node not found in connected nodes");
479 : : }
480 : :
481 : 0 : return UniValue::VNULL;
482 : : },
483 [ + - + - : 414 : };
+ + - - ]
484 [ + - + - : 276 : }
- - ]
485 : :
486 : 61 : static RPCHelpMan getaddednodeinfo()
487 : : {
488 : 61 : return RPCHelpMan{
489 : 61 : "getaddednodeinfo",
490 [ + - ]: 122 : "Returns information about the given added node, or all added nodes\n"
491 : : "(note that onetry addnodes are not listed here)\n",
492 : : {
493 [ + - + - : 183 : {"node", RPCArg::Type::STR, RPCArg::DefaultHint{"all nodes"}, "If provided, return information about this specific node, otherwise all nodes are returned."},
+ - ]
494 : : },
495 [ + - ]: 122 : RPCResult{
496 [ + - + - ]: 122 : RPCResult::Type::ARR, "", "",
497 : : {
498 [ + - + - ]: 122 : {RPCResult::Type::OBJ, "", "",
499 : : {
500 [ + - + - ]: 122 : {RPCResult::Type::STR, "addednode", "The node IP address or name (as provided to addnode)"},
501 [ + - + - ]: 122 : {RPCResult::Type::BOOL, "connected", "If connected"},
502 [ + - + - ]: 122 : {RPCResult::Type::ARR, "addresses", "Only when connected = true",
503 : : {
504 [ + - + - ]: 122 : {RPCResult::Type::OBJ, "", "",
505 : : {
506 [ + - + - ]: 122 : {RPCResult::Type::STR, "address", "The bitcoin server IP and port we're connected to"},
507 [ + - + - ]: 122 : {RPCResult::Type::STR, "connected", "connection, inbound or outbound"},
508 : : }},
509 : : }},
510 : : }},
511 : : }
512 [ + - + - : 1159 : },
+ - + - +
- + + + +
+ + + + -
- - - - -
- - ]
513 : 61 : RPCExamples{
514 [ + - + - : 122 : HelpExampleCli("getaddednodeinfo", "\"192.168.0.201\"")
+ - ]
515 [ + - + - : 244 : + HelpExampleRpc("getaddednodeinfo", "\"192.168.0.201\"")
+ - + - ]
516 [ + - ]: 61 : },
517 : 61 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
518 : : {
519 : 2 : NodeContext& node = EnsureAnyNodeContext(request.context);
520 : 2 : const CConnman& connman = EnsureConnman(node);
521 : :
522 : 2 : std::vector<AddedNodeInfo> vInfo = connman.GetAddedNodeInfo(/*include_connected=*/true);
523 : :
524 [ + - + + ]: 2 : if (auto node{self.MaybeArg<std::string_view>("node")}) {
525 : 1 : bool found = false;
526 [ - + ]: 1 : for (const AddedNodeInfo& info : vInfo) {
527 [ # # # # ]: 0 : if (info.m_params.m_added_node == *node) {
528 [ # # ]: 0 : vInfo.assign(1, info);
529 : : found = true;
530 : : break;
531 : : }
532 : : }
533 : 1 : if (!found) {
534 [ + - + - ]: 2 : throw JSONRPCError(RPC_CLIENT_NODE_NOT_ADDED, "Error: Node has not been added.");
535 : : }
536 : : }
537 : :
538 : 1 : UniValue ret(UniValue::VARR);
539 : :
540 [ - + ]: 1 : for (const AddedNodeInfo& info : vInfo) {
541 : 0 : UniValue obj(UniValue::VOBJ);
542 [ # # # # : 0 : obj.pushKV("addednode", info.m_params.m_added_node);
# # ]
543 [ # # # # : 0 : obj.pushKV("connected", info.fConnected);
# # ]
544 : 0 : UniValue addresses(UniValue::VARR);
545 [ # # ]: 0 : if (info.fConnected) {
546 : 0 : UniValue address(UniValue::VOBJ);
547 [ # # # # : 0 : address.pushKV("address", info.resolvedAddress.ToStringAddrPort());
# # # # ]
548 [ # # # # : 0 : address.pushKV("connected", info.fInbound ? "inbound" : "outbound");
# # # # ]
549 [ # # ]: 0 : addresses.push_back(std::move(address));
550 : 0 : }
551 [ # # # # ]: 0 : obj.pushKV("addresses", std::move(addresses));
552 [ # # ]: 0 : ret.push_back(std::move(obj));
553 : 0 : }
554 : :
555 : 1 : return ret;
556 : 2 : },
557 [ + - + - : 305 : };
+ + - - ]
558 [ + - + - : 976 : }
+ - + - +
- + - + -
+ - - - -
- ]
559 : :
560 : 57 : static RPCHelpMan getnettotals()
561 : : {
562 : 57 : return RPCHelpMan{"getnettotals",
563 [ + - ]: 114 : "Returns information about network traffic, including bytes in, bytes out,\n"
564 : : "and current system time.",
565 : : {},
566 [ + - ]: 114 : RPCResult{
567 [ + - ]: 114 : RPCResult::Type::OBJ, "", "",
568 : : {
569 [ + - + - ]: 114 : {RPCResult::Type::NUM, "totalbytesrecv", "Total bytes received"},
570 [ + - + - ]: 114 : {RPCResult::Type::NUM, "totalbytessent", "Total bytes sent"},
571 [ + - + - ]: 114 : {RPCResult::Type::NUM_TIME, "timemillis", "Current system " + UNIX_EPOCH_TIME + " in milliseconds"},
572 [ + - + - ]: 114 : {RPCResult::Type::OBJ, "uploadtarget", "",
573 : : {
574 [ + - + - ]: 114 : {RPCResult::Type::NUM, "timeframe", "Length of the measuring timeframe in seconds"},
575 [ + - + - ]: 114 : {RPCResult::Type::NUM, "target", "Target in bytes"},
576 [ + - + - ]: 114 : {RPCResult::Type::BOOL, "target_reached", "True if target is reached"},
577 [ + - + - ]: 114 : {RPCResult::Type::BOOL, "serve_historical_blocks", "True if serving historical blocks"},
578 [ + - + - ]: 114 : {RPCResult::Type::NUM, "bytes_left_in_cycle", "Bytes left in current time cycle"},
579 [ + - + - ]: 114 : {RPCResult::Type::NUM, "time_left_in_cycle", "Seconds left in current time cycle"},
580 : : }},
581 : : }
582 [ + - + - : 1311 : },
+ - + + +
+ - - -
- ]
583 : 57 : RPCExamples{
584 [ + - + - : 114 : HelpExampleCli("getnettotals", "")
+ - ]
585 [ + - + - : 228 : + HelpExampleRpc("getnettotals", "")
+ - + - ]
586 [ + - ]: 57 : },
587 : 57 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
588 : : {
589 : 1 : NodeContext& node = EnsureAnyNodeContext(request.context);
590 : 1 : const CConnman& connman = EnsureConnman(node);
591 : :
592 : 1 : UniValue obj(UniValue::VOBJ);
593 [ + - + - : 2 : obj.pushKV("totalbytesrecv", connman.GetTotalBytesRecv());
+ - + - ]
594 [ + - + - : 2 : obj.pushKV("totalbytessent", connman.GetTotalBytesSent());
+ - + - ]
595 [ + - + - : 2 : obj.pushKV("timemillis", TicksSinceEpoch<std::chrono::milliseconds>(SystemClock::now()));
+ - ]
596 : :
597 : 1 : UniValue outboundLimit(UniValue::VOBJ);
598 [ + - + - : 2 : outboundLimit.pushKV("timeframe", count_seconds(connman.GetMaxOutboundTimeframe()));
+ - + - ]
599 [ + - + - : 2 : outboundLimit.pushKV("target", connman.GetMaxOutboundTarget());
+ - + - ]
600 [ + - + - : 2 : outboundLimit.pushKV("target_reached", connman.OutboundTargetReached(false));
+ - + - ]
601 [ + - + - : 2 : outboundLimit.pushKV("serve_historical_blocks", !connman.OutboundTargetReached(true));
+ - + - ]
602 [ + - + - : 2 : outboundLimit.pushKV("bytes_left_in_cycle", connman.GetOutboundTargetBytesLeft());
+ - + - ]
603 [ + - + - : 2 : outboundLimit.pushKV("time_left_in_cycle", count_seconds(connman.GetMaxOutboundTimeLeftInCycle()));
+ - + - ]
604 [ + - + - ]: 2 : obj.pushKV("uploadtarget", std::move(outboundLimit));
605 : 1 : return obj;
606 : 1 : },
607 [ + - + - ]: 228 : };
608 [ + - + - : 1140 : }
+ - + - +
- + - + -
+ - + - +
- - - -
- ]
609 : :
610 : 1 : static UniValue GetNetworksInfo()
611 : : {
612 : 1 : UniValue networks(UniValue::VARR);
613 [ + + ]: 8 : for (int n = 0; n < NET_MAX; ++n) {
614 : 7 : enum Network network = static_cast<enum Network>(n);
615 [ + + ]: 7 : if (network == NET_UNROUTABLE || network == NET_INTERNAL) continue;
616 : 5 : UniValue obj(UniValue::VOBJ);
617 [ + - + - : 10 : obj.pushKV("name", GetNetworkName(network));
+ - + - ]
618 [ + - + - : 10 : obj.pushKV("limited", !g_reachable_nets.Contains(network));
+ - + - ]
619 [ + - + - : 10 : obj.pushKV("reachable", g_reachable_nets.Contains(network));
+ - + - ]
620 [ + - - + ]: 5 : if (const auto proxy = GetProxy(network)) {
621 [ # # # # : 0 : obj.pushKV("proxy", proxy->ToString());
# # # # ]
622 [ # # # # : 0 : obj.pushKV("proxy_randomize_credentials", proxy->m_tor_stream_isolation);
# # ]
623 : : } else {
624 [ + - + - : 10 : obj.pushKV("proxy", std::string());
+ - ]
625 [ + - + - : 10 : obj.pushKV("proxy_randomize_credentials", false);
+ - ]
626 : 0 : }
627 [ + - ]: 5 : networks.push_back(std::move(obj));
628 : 5 : }
629 : 1 : return networks;
630 : 0 : }
631 : :
632 : 59 : static RPCHelpMan getnetworkinfo()
633 : : {
634 : 59 : return RPCHelpMan{"getnetworkinfo",
635 [ + - ]: 118 : "Returns an object containing various state info regarding P2P networking.\n",
636 : : {},
637 [ + - ]: 118 : RPCResult{
638 [ + - ]: 118 : RPCResult::Type::OBJ, "", "",
639 : : {
640 [ + - + - ]: 118 : {RPCResult::Type::NUM, "version", "the server version"},
641 [ + - + - ]: 118 : {RPCResult::Type::STR, "subversion", "the server subversion string"},
642 [ + - + - ]: 118 : {RPCResult::Type::NUM, "protocolversion", "the protocol version"},
643 [ + - + - ]: 118 : {RPCResult::Type::STR_HEX, "localservices", "the services we offer to the network"},
644 [ + - + - ]: 118 : {RPCResult::Type::ARR, "localservicesnames", "the services we offer to the network, in human-readable form",
645 : : {
646 [ + - + - ]: 118 : {RPCResult::Type::STR, "SERVICE_NAME", "the service name"},
647 : : }},
648 [ + - + - ]: 118 : {RPCResult::Type::BOOL, "localrelay", "true if transaction relay is requested from peers"},
649 [ + - + - ]: 118 : {RPCResult::Type::NUM, "timeoffset", "the time offset"},
650 [ + - + - ]: 118 : {RPCResult::Type::NUM, "connections", "the total number of connections"},
651 [ + - + - ]: 118 : {RPCResult::Type::NUM, "connections_in", "the number of inbound connections"},
652 [ + - + - ]: 118 : {RPCResult::Type::NUM, "connections_out", "the number of outbound connections"},
653 [ + - + - ]: 118 : {RPCResult::Type::BOOL, "networkactive", "whether p2p networking is enabled"},
654 [ + - + - ]: 118 : {RPCResult::Type::ARR, "networks", "information per network",
655 : : {
656 [ + - + - ]: 118 : {RPCResult::Type::OBJ, "", "",
657 : : {
658 [ + - + - : 118 : {RPCResult::Type::STR, "name", "network (" + Join(GetNetworkNames(), ", ") + ")"},
+ - + - ]
659 [ + - + - ]: 118 : {RPCResult::Type::BOOL, "limited", "is the network limited using -onlynet?"},
660 [ + - + - ]: 118 : {RPCResult::Type::BOOL, "reachable", "is the network reachable?"},
661 [ + - + - ]: 118 : {RPCResult::Type::STR, "proxy", "(\"host:port\") the proxy that is used for this network, or empty if none"},
662 [ + - + - ]: 118 : {RPCResult::Type::BOOL, "proxy_randomize_credentials", "Whether randomized credentials are used"},
663 : : }},
664 : : }},
665 [ + - + - ]: 118 : {RPCResult::Type::NUM, "relayfee", "minimum relay fee rate for transactions in " + CURRENCY_UNIT + "/kvB"},
666 [ + - + - ]: 118 : {RPCResult::Type::NUM, "incrementalfee", "minimum fee rate increment for mempool limiting or replacement in " + CURRENCY_UNIT + "/kvB"},
667 [ + - + - ]: 118 : {RPCResult::Type::ARR, "localaddresses", "list of local addresses",
668 : : {
669 [ + - + - ]: 118 : {RPCResult::Type::OBJ, "", "",
670 : : {
671 [ + - + - ]: 118 : {RPCResult::Type::STR, "address", "network address"},
672 [ + - + - ]: 118 : {RPCResult::Type::NUM, "port", "network port"},
673 [ + - + - ]: 118 : {RPCResult::Type::NUM, "score", "relative score"},
674 : : }},
675 : : }},
676 [ + - + - : 118 : (IsDeprecatedRPCEnabled("warnings") ?
- + ]
677 [ - - - - : 59 : RPCResult{RPCResult::Type::STR, "warnings", "any network and blockchain warnings (DEPRECATED)"} :
- + - + -
+ - - - -
- - ]
678 [ + - + - : 236 : RPCResult{RPCResult::Type::ARR, "warnings", "any network and blockchain warnings (run with `-deprecatedrpc=warnings` to return the latest warning as a single string)",
+ - + - -
- - - ]
679 : : {
680 [ + - + - : 236 : {RPCResult::Type::STR, "", "warning"},
+ - + - -
- - - ]
681 : : }
682 [ + - + - : 295 : }
+ - + + +
- - - - -
- - - - ]
683 : : ),
684 : : }
685 [ + - + - : 3540 : },
+ - + - +
- + - + -
+ + + + +
+ + + + +
+ + - - -
- - - - -
- - - - ]
686 : 59 : RPCExamples{
687 [ + - + - : 118 : HelpExampleCli("getnetworkinfo", "")
+ - ]
688 [ + - + - : 236 : + HelpExampleRpc("getnetworkinfo", "")
+ - + - ]
689 [ + - ]: 59 : },
690 : 59 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
691 : : {
692 : 1 : LOCK(cs_main);
693 : 1 : UniValue obj(UniValue::VOBJ);
694 [ + - + - : 2 : obj.pushKV("version", CLIENT_VERSION);
+ - ]
695 [ + - + - : 2 : obj.pushKV("subversion", strSubVersion);
+ - ]
696 [ + - + - : 2 : obj.pushKV("protocolversion",PROTOCOL_VERSION);
+ - ]
697 [ + - ]: 1 : NodeContext& node = EnsureAnyNodeContext(request.context);
698 [ + - ]: 1 : if (node.connman) {
699 [ + - ]: 1 : ServiceFlags services = node.connman->GetLocalServices();
700 [ + - + - : 2 : obj.pushKV("localservices", strprintf("%016x", services));
+ - + - ]
701 [ + - + - : 2 : obj.pushKV("localservicesnames", GetServicesNames(services));
+ - ]
702 : : }
703 [ + - ]: 1 : if (node.peerman) {
704 [ + - ]: 1 : auto peerman_info{node.peerman->GetInfo()};
705 [ + - + - : 2 : obj.pushKV("localrelay", !peerman_info.ignores_incoming_txs);
+ - ]
706 [ + - + - : 2 : obj.pushKV("timeoffset", Ticks<std::chrono::seconds>(peerman_info.median_outbound_time_offset));
+ - ]
707 : : }
708 [ + - ]: 1 : if (node.connman) {
709 [ + - + - : 2 : obj.pushKV("networkactive", node.connman->GetNetworkActive());
+ - ]
710 [ + - + - : 2 : obj.pushKV("connections", node.connman->GetNodeCount(ConnectionDirection::Both));
+ - + - ]
711 [ + - + - : 2 : obj.pushKV("connections_in", node.connman->GetNodeCount(ConnectionDirection::In));
+ - + - ]
712 [ + - + - : 2 : obj.pushKV("connections_out", node.connman->GetNodeCount(ConnectionDirection::Out));
+ - + - ]
713 : : }
714 [ + - + - : 2 : obj.pushKV("networks", GetNetworksInfo());
+ - ]
715 [ + - ]: 1 : if (node.mempool) {
716 : : // Those fields can be deprecated, to be replaced by the getmempoolinfo fields
717 [ + - + - : 2 : obj.pushKV("relayfee", ValueFromAmount(node.mempool->m_opts.min_relay_feerate.GetFeePerK()));
+ - ]
718 [ + - + - : 2 : obj.pushKV("incrementalfee", ValueFromAmount(node.mempool->m_opts.incremental_relay_feerate.GetFeePerK()));
+ - ]
719 : : }
720 : 1 : UniValue localAddresses(UniValue::VARR);
721 : 1 : {
722 [ + - ]: 1 : LOCK(g_maplocalhost_mutex);
723 [ - + ]: 1 : for (const std::pair<const CNetAddr, LocalServiceInfo> &item : mapLocalHost)
724 : : {
725 : 0 : UniValue rec(UniValue::VOBJ);
726 [ # # # # : 0 : rec.pushKV("address", item.first.ToStringAddr());
# # # # ]
727 [ # # # # : 0 : rec.pushKV("port", item.second.nPort);
# # ]
728 [ # # # # : 0 : rec.pushKV("score", item.second.nScore);
# # ]
729 [ # # ]: 0 : localAddresses.push_back(std::move(rec));
730 : 0 : }
731 : 0 : }
732 [ + - + - ]: 2 : obj.pushKV("localaddresses", std::move(localAddresses));
733 [ + - + - : 2 : obj.pushKV("warnings", node::GetWarningsForRpc(*CHECK_NONFATAL(node.warnings), IsDeprecatedRPCEnabled("warnings")));
+ - + - +
- + - ]
734 : 2 : return obj;
735 [ + - ]: 2 : },
736 [ + - + - ]: 236 : };
737 [ + - + - : 3481 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - - -
+ - + - +
- + - - +
- - - - -
- - - - -
- - ]
738 : :
739 : 56 : static RPCHelpMan setban()
740 : : {
741 : 56 : return RPCHelpMan{
742 : 56 : "setban",
743 [ + - ]: 112 : "Attempts to add or remove an IP/Subnet from the banned list.\n",
744 : : {
745 [ + - + - ]: 112 : {"subnet", RPCArg::Type::STR, RPCArg::Optional::NO, "The IP/Subnet (see getpeerinfo for nodes IP) with an optional netmask (default is /32 = single IP)"},
746 [ + - + - ]: 112 : {"command", RPCArg::Type::STR, RPCArg::Optional::NO, "'add' to add an IP/Subnet to the list, 'remove' to remove an IP/Subnet from the list"},
747 [ + - + - : 168 : {"bantime", RPCArg::Type::NUM, RPCArg::Default{0}, "time in seconds how long (or until when if [absolute] is set) the IP is banned (0 or empty means using the default time of 24h which can also be overwritten by the -bantime startup argument)"},
+ - ]
748 [ + - + - : 168 : {"absolute", RPCArg::Type::BOOL, RPCArg::Default{false}, "If set, the bantime must be an absolute timestamp expressed in " + UNIX_EPOCH_TIME},
+ - ]
749 : : },
750 [ + - + - : 112 : RPCResult{RPCResult::Type::NONE, "", ""},
+ - + - ]
751 : 56 : RPCExamples{
752 [ + - + - : 112 : HelpExampleCli("setban", "\"192.168.0.6\" \"add\" 86400")
+ - ]
753 [ + - + - : 224 : + HelpExampleCli("setban", "\"192.168.0.0/24\" \"add\"")
+ - + - ]
754 [ + - + - : 224 : + HelpExampleRpc("setban", "\"192.168.0.6\", \"add\", 86400")
+ - + - ]
755 [ + - ]: 56 : },
756 : 56 : [&](const RPCHelpMan& help, const JSONRPCRequest& request) -> UniValue
757 : : {
758 : 0 : auto command{help.Arg<std::string_view>("command")};
759 [ # # # # ]: 0 : if (command != "add" && command != "remove") {
760 [ # # # # ]: 0 : throw std::runtime_error(help.ToString());
761 : : }
762 : 0 : NodeContext& node = EnsureAnyNodeContext(request.context);
763 : 0 : BanMan& banman = EnsureBanman(node);
764 : :
765 : 0 : CSubNet subNet;
766 [ # # ]: 0 : CNetAddr netAddr;
767 [ # # # # ]: 0 : std::string subnet_arg{help.Arg<std::string_view>("subnet")};
768 : 0 : const bool isSubnet{subnet_arg.find('/') != subnet_arg.npos};
769 : :
770 [ # # ]: 0 : if (!isSubnet) {
771 [ # # # # ]: 0 : const std::optional<CNetAddr> addr{LookupHost(subnet_arg, false)};
772 [ # # ]: 0 : if (addr.has_value()) {
773 [ # # # # ]: 0 : netAddr = static_cast<CNetAddr>(MaybeFlipIPv6toCJDNS(CService{addr.value(), /*port=*/0}));
774 : : }
775 : 0 : } else {
776 [ # # ]: 0 : subNet = LookupSubNet(subnet_arg);
777 : : }
778 : :
779 [ # # # # : 0 : if (! (isSubnet ? subNet.IsValid() : netAddr.IsValid()) ) {
# # # # ]
780 [ # # # # ]: 0 : throw JSONRPCError(RPC_CLIENT_INVALID_IP_OR_SUBNET, "Error: Invalid IP/Subnet");
781 : : }
782 : :
783 [ # # ]: 0 : if (command == "add") {
784 [ # # # # : 0 : if (isSubnet ? banman.IsBanned(subNet) : banman.IsBanned(netAddr)) {
# # # # ]
785 [ # # # # ]: 0 : throw JSONRPCError(RPC_CLIENT_NODE_ALREADY_ADDED, "Error: IP/Subnet already banned");
786 : : }
787 : :
788 : 0 : int64_t banTime = 0; //use standard bantime if not specified
789 [ # # # # ]: 0 : if (!request.params[2].isNull())
790 [ # # # # ]: 0 : banTime = request.params[2].getInt<int64_t>();
791 : :
792 [ # # # # : 0 : const bool absolute{request.params[3].isNull() ? false : request.params[3].get_bool()};
# # # # ]
793 : :
794 [ # # # # : 0 : if (absolute && banTime < GetTime()) {
# # ]
795 [ # # # # ]: 0 : throw JSONRPCError(RPC_INVALID_PARAMETER, "Error: Absolute timestamp is in the past");
796 : : }
797 : :
798 [ # # ]: 0 : if (isSubnet) {
799 [ # # ]: 0 : banman.Ban(subNet, banTime, absolute);
800 [ # # ]: 0 : if (node.connman) {
801 [ # # ]: 0 : node.connman->DisconnectNode(subNet);
802 : : }
803 : : } else {
804 [ # # ]: 0 : banman.Ban(netAddr, banTime, absolute);
805 [ # # ]: 0 : if (node.connman) {
806 [ # # ]: 0 : node.connman->DisconnectNode(netAddr);
807 : : }
808 : : }
809 [ # # ]: 0 : } else if(command == "remove") {
810 [ # # # # : 0 : if (!( isSubnet ? banman.Unban(subNet) : banman.Unban(netAddr) )) {
# # # # ]
811 [ # # # # ]: 0 : throw JSONRPCError(RPC_CLIENT_INVALID_IP_OR_SUBNET, "Error: Unban failed. Requested address/subnet was not previously manually banned.");
812 : : }
813 : : }
814 : 0 : return UniValue::VNULL;
815 : 0 : },
816 [ + - + - : 448 : };
+ + - - ]
817 [ + - + - : 448 : }
+ - + - -
- ]
818 : :
819 : 59 : static RPCHelpMan listbanned()
820 : : {
821 : 59 : return RPCHelpMan{
822 : 59 : "listbanned",
823 [ + - ]: 118 : "List all manually banned IPs/Subnets.\n",
824 : : {},
825 [ + - + - ]: 236 : RPCResult{RPCResult::Type::ARR, "", "",
826 : : {
827 [ + - + - ]: 118 : {RPCResult::Type::OBJ, "", "",
828 : : {
829 [ + - + - ]: 118 : {RPCResult::Type::STR, "address", "The IP/Subnet of the banned node"},
830 [ + - + - ]: 118 : {RPCResult::Type::NUM_TIME, "ban_created", "The " + UNIX_EPOCH_TIME + " the ban was created"},
831 [ + - + - ]: 118 : {RPCResult::Type::NUM_TIME, "banned_until", "The " + UNIX_EPOCH_TIME + " the ban expires"},
832 [ + - + - ]: 118 : {RPCResult::Type::NUM_TIME, "ban_duration", "The ban duration, in seconds"},
833 [ + - + - ]: 118 : {RPCResult::Type::NUM_TIME, "time_remaining", "The time remaining until the ban expires, in seconds"},
834 : : }},
835 [ + - + - : 885 : }},
+ - + + +
+ - - -
- ]
836 : 59 : RPCExamples{
837 [ + - + - : 118 : HelpExampleCli("listbanned", "")
+ - ]
838 [ + - + - : 236 : + HelpExampleRpc("listbanned", "")
+ - + - ]
839 [ + - ]: 59 : },
840 : 59 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
841 : : {
842 : 1 : BanMan& banman = EnsureAnyBanman(request.context);
843 : :
844 [ + - ]: 1 : banmap_t banMap;
845 [ + - ]: 1 : banman.GetBanned(banMap);
846 [ + - ]: 1 : const int64_t current_time{GetTime()};
847 : :
848 : 1 : UniValue bannedAddresses(UniValue::VARR);
849 [ - + ]: 1 : for (const auto& entry : banMap)
850 : : {
851 : 0 : const CBanEntry& banEntry = entry.second;
852 : 0 : UniValue rec(UniValue::VOBJ);
853 [ # # # # : 0 : rec.pushKV("address", entry.first.ToString());
# # # # ]
854 [ # # # # : 0 : rec.pushKV("ban_created", banEntry.nCreateTime);
# # ]
855 [ # # # # : 0 : rec.pushKV("banned_until", banEntry.nBanUntil);
# # ]
856 [ # # # # : 0 : rec.pushKV("ban_duration", (banEntry.nBanUntil - banEntry.nCreateTime));
# # ]
857 [ # # # # : 0 : rec.pushKV("time_remaining", (banEntry.nBanUntil - current_time));
# # ]
858 : :
859 [ # # ]: 0 : bannedAddresses.push_back(std::move(rec));
860 : 0 : }
861 : :
862 : 1 : return bannedAddresses;
863 : 1 : },
864 [ + - + - ]: 236 : };
865 [ + - + - : 708 : }
+ - + - +
- + - -
- ]
866 : :
867 : 62 : static RPCHelpMan clearbanned()
868 : : {
869 : 62 : return RPCHelpMan{
870 : 62 : "clearbanned",
871 [ + - ]: 124 : "Clear all banned IPs.\n",
872 : : {},
873 [ + - + - : 124 : RPCResult{RPCResult::Type::NONE, "", ""},
+ - ]
874 : 62 : RPCExamples{
875 [ + - + - : 124 : HelpExampleCli("clearbanned", "")
+ - ]
876 [ + - + - : 248 : + HelpExampleRpc("clearbanned", "")
+ - + - ]
877 [ + - ]: 62 : },
878 : 62 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
879 : : {
880 : 2 : BanMan& banman = EnsureAnyBanman(request.context);
881 : :
882 : 2 : banman.ClearBanned();
883 : :
884 : 2 : return UniValue::VNULL;
885 : : },
886 [ + - + - ]: 248 : };
887 : : }
888 : :
889 : 69 : static RPCHelpMan setnetworkactive()
890 : : {
891 : 69 : return RPCHelpMan{
892 : 69 : "setnetworkactive",
893 [ + - ]: 138 : "Disable/enable all p2p network activity.\n",
894 : : {
895 [ + - + - ]: 138 : {"state", RPCArg::Type::BOOL, RPCArg::Optional::NO, "true to enable networking, false to disable"},
896 : : },
897 [ + - + - : 138 : RPCResult{RPCResult::Type::BOOL, "", "The value that was passed in"},
+ - + - ]
898 [ + - + - ]: 207 : RPCExamples{""},
899 : 69 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
900 : : {
901 : 2 : NodeContext& node = EnsureAnyNodeContext(request.context);
902 : 2 : CConnman& connman = EnsureConnman(node);
903 : :
904 : 2 : connman.SetNetworkActive(request.params[0].get_bool());
905 : :
906 : 2 : return connman.GetNetworkActive();
907 : : },
908 [ + - + - : 345 : };
+ + - - ]
909 [ + - ]: 138 : }
910 : :
911 : 82 : static RPCHelpMan getnodeaddresses()
912 : : {
913 : 82 : return RPCHelpMan{"getnodeaddresses",
914 [ + - ]: 164 : "Return known addresses, after filtering for quality and recency.\n"
915 : : "These can potentially be used to find new peers in the network.\n"
916 : : "The total number of addresses known to the node may be higher.",
917 : : {
918 [ + - + - : 246 : {"count", RPCArg::Type::NUM, RPCArg::Default{1}, "The maximum number of addresses to return. Specify 0 to return all known addresses."},
+ - ]
919 [ + - + - : 246 : {"network", RPCArg::Type::STR, RPCArg::DefaultHint{"all networks"}, "Return only addresses of the specified network. Can be one of: " + Join(GetNetworkNames(), ", ") + "."},
+ - + - +
- ]
920 : : },
921 [ + - ]: 164 : RPCResult{
922 [ + - + - ]: 164 : RPCResult::Type::ARR, "", "",
923 : : {
924 [ + - + - ]: 164 : {RPCResult::Type::OBJ, "", "",
925 : : {
926 [ + - + - ]: 164 : {RPCResult::Type::NUM_TIME, "time", "The " + UNIX_EPOCH_TIME + " when the node was last seen"},
927 [ + - + - ]: 164 : {RPCResult::Type::NUM, "services", "The services offered by the node"},
928 [ + - + - ]: 164 : {RPCResult::Type::STR, "address", "The address of the node"},
929 [ + - + - ]: 164 : {RPCResult::Type::NUM, "port", "The port number of the node"},
930 [ + - + - : 164 : {RPCResult::Type::STR, "network", "The network (" + Join(GetNetworkNames(), ", ") + ") the node connected through"},
+ - + - ]
931 : : }},
932 : : }
933 [ + - + - : 1230 : },
+ - + + +
+ - - -
- ]
934 : 82 : RPCExamples{
935 [ + - + - : 164 : HelpExampleCli("getnodeaddresses", "8")
+ - ]
936 [ + - + - : 328 : + HelpExampleCli("getnodeaddresses", "4 \"i2p\"")
+ - + - ]
937 [ + - + - : 328 : + HelpExampleCli("-named getnodeaddresses", "network=onion count=12")
+ - + - ]
938 [ + - + - : 328 : + HelpExampleRpc("getnodeaddresses", "8")
+ - + - ]
939 [ + - + - : 328 : + HelpExampleRpc("getnodeaddresses", "4, \"i2p\"")
+ - + - ]
940 [ + - ]: 82 : },
941 : 82 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
942 : : {
943 : 23 : NodeContext& node = EnsureAnyNodeContext(request.context);
944 : 23 : const CConnman& connman = EnsureConnman(node);
945 : :
946 [ + + ]: 23 : const int count{request.params[0].isNull() ? 1 : request.params[0].getInt<int>()};
947 [ + + + - : 23 : if (count < 0) throw JSONRPCError(RPC_INVALID_PARAMETER, "Address count out of range");
+ - ]
948 : :
949 [ + + ]: 22 : const std::optional<Network> network{request.params[1].isNull() ? std::nullopt : std::optional<Network>{ParseNetwork(request.params[1].get_str())}};
950 [ + + ]: 22 : if (network == NET_UNROUTABLE) {
951 [ + - + - : 30 : throw JSONRPCError(RPC_INVALID_PARAMETER, strprintf("Network not recognized: %s", request.params[1].get_str()));
+ - + - ]
952 : : }
953 : :
954 : : // returns a shuffled list of CAddress
955 : 7 : const std::vector<CAddress> vAddr{connman.GetAddressesUnsafe(count, /*max_pct=*/0, network)};
956 : 7 : UniValue ret(UniValue::VARR);
957 : :
958 [ - + ]: 7 : for (const CAddress& addr : vAddr) {
959 : 0 : UniValue obj(UniValue::VOBJ);
960 [ # # # # : 0 : obj.pushKV("time", TicksSinceEpoch<std::chrono::seconds>(addr.nTime));
# # ]
961 [ # # # # : 0 : obj.pushKV("services", static_cast<std::underlying_type_t<decltype(addr.nServices)>>(addr.nServices));
# # ]
962 [ # # # # : 0 : obj.pushKV("address", addr.ToStringAddr());
# # # # ]
963 [ # # # # : 0 : obj.pushKV("port", addr.GetPort());
# # # # ]
964 [ # # # # : 0 : obj.pushKV("network", GetNetworkName(addr.GetNetClass()));
# # # # #
# ]
965 [ # # ]: 0 : ret.push_back(std::move(obj));
966 : 0 : }
967 : 7 : return ret;
968 : 7 : },
969 [ + - + - : 492 : };
+ + - - ]
970 [ + - + - : 1312 : }
+ - + - +
- + - + -
+ - - - -
- ]
971 : :
972 : 53 : static RPCHelpMan addpeeraddress()
973 : : {
974 : 53 : return RPCHelpMan{"addpeeraddress",
975 [ + - ]: 106 : "Add the address of a potential peer to an address manager table. This RPC is for testing only.",
976 : : {
977 [ + - + - ]: 106 : {"address", RPCArg::Type::STR, RPCArg::Optional::NO, "The IP address of the peer"},
978 [ + - + - ]: 106 : {"port", RPCArg::Type::NUM, RPCArg::Optional::NO, "The port of the peer"},
979 [ + - + - : 159 : {"tried", RPCArg::Type::BOOL, RPCArg::Default{false}, "If true, attempt to add the peer to the tried addresses table"},
+ - ]
980 : : },
981 [ + - ]: 106 : RPCResult{
982 [ + - + - ]: 106 : RPCResult::Type::OBJ, "", "",
983 : : {
984 [ + - + - ]: 106 : {RPCResult::Type::BOOL, "success", "whether the peer address was successfully added to the address manager table"},
985 [ + - + - ]: 106 : {RPCResult::Type::STR, "error", /*optional=*/true, "error description, if the address could not be added"},
986 : : },
987 [ + - + - : 318 : },
+ + - - ]
988 : 53 : RPCExamples{
989 [ + - + - : 106 : HelpExampleCli("addpeeraddress", "\"1.2.3.4\" 8333 true")
+ - ]
990 [ + - + - : 212 : + HelpExampleRpc("addpeeraddress", "\"1.2.3.4\", 8333, true")
+ - + - ]
991 [ + - ]: 53 : },
992 : 53 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue
993 : : {
994 : 0 : AddrMan& addrman = EnsureAnyAddrman(request.context);
995 : :
996 : 0 : const std::string& addr_string{request.params[0].get_str()};
997 : 0 : const auto port{request.params[1].getInt<uint16_t>()};
998 [ # # ]: 0 : const bool tried{request.params[2].isNull() ? false : request.params[2].get_bool()};
999 : :
1000 : 0 : UniValue obj(UniValue::VOBJ);
1001 [ # # # # ]: 0 : std::optional<CNetAddr> net_addr{LookupHost(addr_string, false)};
1002 [ # # ]: 0 : if (!net_addr.has_value()) {
1003 [ # # # # ]: 0 : throw JSONRPCError(RPC_CLIENT_INVALID_IP_OR_SUBNET, "Invalid IP address");
1004 : : }
1005 : :
1006 : 0 : bool success{false};
1007 : :
1008 [ # # ]: 0 : CService service{net_addr.value(), port};
1009 [ # # ]: 0 : CAddress address{MaybeFlipIPv6toCJDNS(service), ServiceFlags{NODE_NETWORK | NODE_WITNESS}};
1010 : 0 : address.nTime = Now<NodeSeconds>();
1011 : : // The source address is set equal to the address. This is equivalent to the peer
1012 : : // announcing itself.
1013 [ # # # # : 0 : if (addrman.Add({address}, address)) {
# # # # #
# ]
1014 : 0 : success = true;
1015 [ # # ]: 0 : if (tried) {
1016 : : // Attempt to move the address to the tried addresses table.
1017 [ # # # # ]: 0 : if (!addrman.Good(address)) {
1018 : 0 : success = false;
1019 [ # # # # : 0 : obj.pushKV("error", "failed-adding-to-tried");
# # ]
1020 : : }
1021 : : }
1022 : : } else {
1023 [ # # # # : 0 : obj.pushKV("error", "failed-adding-to-new");
# # ]
1024 : : }
1025 : :
1026 [ # # # # : 0 : obj.pushKV("success", success);
# # ]
1027 : 0 : return obj;
1028 : 0 : },
1029 [ + - + - : 371 : };
+ + - - ]
1030 [ + - + - : 530 : }
+ - + - +
- - - -
- ]
1031 : :
1032 : 86 : static RPCHelpMan sendmsgtopeer()
1033 : : {
1034 : 86 : return RPCHelpMan{
1035 : 86 : "sendmsgtopeer",
1036 [ + - ]: 172 : "Send a p2p message to a peer specified by id.\n"
1037 : : "The message type and body must be provided, the message header will be generated.\n"
1038 : : "This RPC is for testing only.",
1039 : : {
1040 [ + - + - ]: 172 : {"peer_id", RPCArg::Type::NUM, RPCArg::Optional::NO, "The peer to send the message to."},
1041 [ + - + - ]: 172 : {"msg_type", RPCArg::Type::STR, RPCArg::Optional::NO, strprintf("The message type (maximum length %i)", CMessageHeader::MESSAGE_TYPE_SIZE)},
1042 [ + - + - ]: 172 : {"msg", RPCArg::Type::STR_HEX, RPCArg::Optional::NO, "The serialized message body to send, in hex, without a message header"},
1043 : : },
1044 [ + - + - : 172 : RPCResult{RPCResult::Type::OBJ, "", "", std::vector<RPCResult>{}},
+ - + - ]
1045 : 86 : RPCExamples{
1046 [ + - + - : 258 : HelpExampleCli("sendmsgtopeer", "0 \"addr\" \"ffffff\"") + HelpExampleRpc("sendmsgtopeer", "0 \"addr\" \"ffffff\"")},
+ - + - +
- + - + -
+ - ]
1047 : 86 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue {
1048 : 33 : const NodeId peer_id{request.params[0].getInt<int64_t>()};
1049 : 33 : const auto msg_type{self.Arg<std::string_view>("msg_type")};
1050 [ + + ]: 33 : if (msg_type.size() > CMessageHeader::MESSAGE_TYPE_SIZE) {
1051 [ + - + - ]: 2 : throw JSONRPCError(RPC_INVALID_PARAMETER, strprintf("Error: msg_type too long, max length is %i", CMessageHeader::MESSAGE_TYPE_SIZE));
1052 : : }
1053 : 32 : auto msg{TryParseHex<unsigned char>(self.Arg<std::string_view>("msg"))};
1054 [ + + ]: 32 : if (!msg.has_value()) {
1055 [ + - + - ]: 38 : throw JSONRPCError(RPC_INVALID_PARAMETER, "Error parsing input for msg");
1056 : : }
1057 : :
1058 [ + - ]: 13 : NodeContext& node = EnsureAnyNodeContext(request.context);
1059 [ + - ]: 13 : CConnman& connman = EnsureConnman(node);
1060 : :
1061 [ + - ]: 13 : CSerializedNetMsg msg_ser;
1062 [ + - + - ]: 13 : msg_ser.data = msg.value();
1063 [ + - ]: 13 : msg_ser.m_type = msg_type;
1064 : :
1065 [ + - ]: 13 : bool success = connman.ForNode(peer_id, [&](CNode* node) {
1066 : 0 : connman.PushMessage(node, std::move(msg_ser));
1067 : 0 : return true;
1068 : : });
1069 : :
1070 [ + - ]: 13 : if (!success) {
1071 [ + - + - ]: 26 : throw JSONRPCError(RPC_MISC_ERROR, "Error: Could not send message to peer");
1072 : : }
1073 : :
1074 : 0 : UniValue ret{UniValue::VOBJ};
1075 : 0 : return ret;
1076 : 13 : },
1077 [ + - + - : 602 : };
+ + - - ]
1078 [ + - + - : 516 : }
+ - - - ]
1079 : :
1080 : 74 : static RPCHelpMan getaddrmaninfo()
1081 : : {
1082 : 74 : return RPCHelpMan{
1083 : 74 : "getaddrmaninfo",
1084 [ + - ]: 148 : "Provides information about the node's address manager by returning the number of "
1085 : : "addresses in the `new` and `tried` tables and their sum for all networks.\n",
1086 : : {},
1087 [ + - ]: 148 : RPCResult{
1088 [ + - ]: 148 : RPCResult::Type::OBJ_DYN, "", "json object with network type as keys", {
1089 [ + - + - : 148 : {RPCResult::Type::OBJ, "network", "the network (" + Join(GetNetworkNames(), ", ") + ", all_networks)", {
+ - + - ]
1090 [ + - + - ]: 148 : {RPCResult::Type::NUM, "new", "number of addresses in the new table, which represent potential peers the node has discovered but hasn't yet successfully connected to."},
1091 [ + - + - ]: 148 : {RPCResult::Type::NUM, "tried", "number of addresses in the tried table, which represent peers the node has successfully connected to in the past."},
1092 [ + - + - ]: 148 : {RPCResult::Type::NUM, "total", "total number of addresses in both new/tried tables"},
1093 : : }},
1094 [ + - + - : 814 : }},
+ - + + +
+ - - -
- ]
1095 [ + - + - : 222 : RPCExamples{HelpExampleCli("getaddrmaninfo", "") + HelpExampleRpc("getaddrmaninfo", "")},
+ - + - +
- + - + -
+ - ]
1096 : 74 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue {
1097 : 1 : AddrMan& addrman = EnsureAnyAddrman(request.context);
1098 : :
1099 : 1 : UniValue ret(UniValue::VOBJ);
1100 [ + + ]: 8 : for (int n = 0; n < NET_MAX; ++n) {
1101 : 7 : enum Network network = static_cast<enum Network>(n);
1102 [ + + ]: 7 : if (network == NET_UNROUTABLE || network == NET_INTERNAL) continue;
1103 : 5 : UniValue obj(UniValue::VOBJ);
1104 [ + - + - : 10 : obj.pushKV("new", addrman.Size(network, true));
+ - + - ]
1105 [ + - + - : 10 : obj.pushKV("tried", addrman.Size(network, false));
+ - + - ]
1106 [ + - + - : 10 : obj.pushKV("total", addrman.Size(network));
+ - + - ]
1107 [ + - + - ]: 10 : ret.pushKV(GetNetworkName(network), std::move(obj));
1108 : 5 : }
1109 : 1 : UniValue obj(UniValue::VOBJ);
1110 [ + - + - : 2 : obj.pushKV("new", addrman.Size(std::nullopt, true));
+ - + - ]
1111 [ + - + - : 2 : obj.pushKV("tried", addrman.Size(std::nullopt, false));
+ - + - ]
1112 [ + - + - : 2 : obj.pushKV("total", addrman.Size());
+ - + - ]
1113 [ + - + - ]: 2 : ret.pushKV("all_networks", std::move(obj));
1114 : 1 : return ret;
1115 : 1 : },
1116 [ + - + - ]: 296 : };
1117 [ + - + - : 592 : }
+ - + - -
- ]
1118 : :
1119 : 0 : UniValue AddrmanEntryToJSON(const AddrInfo& info, const CConnman& connman)
1120 : : {
1121 : 0 : UniValue ret(UniValue::VOBJ);
1122 [ # # # # : 0 : ret.pushKV("address", info.ToStringAddr());
# # # # ]
1123 [ # # ]: 0 : const uint32_t mapped_as{connman.GetMappedAS(info)};
1124 [ # # ]: 0 : if (mapped_as) {
1125 [ # # # # : 0 : ret.pushKV("mapped_as", mapped_as);
# # ]
1126 : : }
1127 [ # # # # : 0 : ret.pushKV("port", info.GetPort());
# # # # ]
1128 [ # # # # : 0 : ret.pushKV("services", static_cast<std::underlying_type_t<decltype(info.nServices)>>(info.nServices));
# # ]
1129 [ # # # # : 0 : ret.pushKV("time", TicksSinceEpoch<std::chrono::seconds>(info.nTime));
# # ]
1130 [ # # # # : 0 : ret.pushKV("network", GetNetworkName(info.GetNetClass()));
# # # # #
# ]
1131 [ # # # # : 0 : ret.pushKV("source", info.source.ToStringAddr());
# # # # ]
1132 [ # # # # : 0 : ret.pushKV("source_network", GetNetworkName(info.source.GetNetClass()));
# # # # #
# ]
1133 [ # # ]: 0 : const uint32_t source_mapped_as{connman.GetMappedAS(info.source)};
1134 [ # # ]: 0 : if (source_mapped_as) {
1135 [ # # # # : 0 : ret.pushKV("source_mapped_as", source_mapped_as);
# # ]
1136 : : }
1137 : 0 : return ret;
1138 : 0 : }
1139 : :
1140 : 2 : UniValue AddrmanTableToJSON(const std::vector<std::pair<AddrInfo, AddressPosition>>& tableInfos, const CConnman& connman)
1141 : : {
1142 : 2 : UniValue table(UniValue::VOBJ);
1143 [ - + ]: 2 : for (const auto& e : tableInfos) {
1144 : 0 : AddrInfo info = e.first;
1145 : 0 : AddressPosition location = e.second;
1146 [ # # ]: 0 : std::ostringstream key;
1147 [ # # # # : 0 : key << location.bucket << "/" << location.position;
# # ]
1148 : : // Address manager tables have unique entries so there is no advantage
1149 : : // in using UniValue::pushKV, which checks if the key already exists
1150 : : // in O(N). UniValue::pushKVEnd is used instead which currently is O(1).
1151 [ # # # # ]: 0 : table.pushKVEnd(key.str(), AddrmanEntryToJSON(info, connman));
1152 : 0 : }
1153 : 2 : return table;
1154 : 0 : }
1155 : :
1156 : 55 : static RPCHelpMan getrawaddrman()
1157 : : {
1158 : 55 : return RPCHelpMan{"getrawaddrman",
1159 [ + - ]: 110 : "EXPERIMENTAL warning: this call may be changed in future releases.\n"
1160 : : "\nReturns information on all address manager entries for the new and tried tables.\n",
1161 : : {},
1162 [ + - ]: 110 : RPCResult{
1163 [ + - ]: 110 : RPCResult::Type::OBJ_DYN, "", "", {
1164 [ + - + - ]: 110 : {RPCResult::Type::OBJ_DYN, "table", "buckets with addresses in the address manager table ( new, tried )", {
1165 [ + - + - ]: 110 : {RPCResult::Type::OBJ, "bucket/position", "the location in the address manager table (<bucket>/<position>)", {
1166 [ + - + - ]: 110 : {RPCResult::Type::STR, "address", "The address of the node"},
1167 [ + - + - ]: 110 : {RPCResult::Type::NUM, "mapped_as", /*optional=*/true, "Mapped AS (Autonomous System) number at the end of the BGP route to the peer, used for diversifying peer selection (only displayed if the -asmap config option is set)"},
1168 [ + - + - ]: 110 : {RPCResult::Type::NUM, "port", "The port number of the node"},
1169 [ + - + - : 110 : {RPCResult::Type::STR, "network", "The network (" + Join(GetNetworkNames(), ", ") + ") of the address"},
+ - + - ]
1170 [ + - + - ]: 110 : {RPCResult::Type::NUM, "services", "The services offered by the node"},
1171 [ + - + - ]: 110 : {RPCResult::Type::NUM_TIME, "time", "The " + UNIX_EPOCH_TIME + " when the node was last seen"},
1172 [ + - + - ]: 110 : {RPCResult::Type::STR, "source", "The address that relayed the address to us"},
1173 [ + - + - : 110 : {RPCResult::Type::STR, "source_network", "The network (" + Join(GetNetworkNames(), ", ") + ") of the source address"},
+ - + - ]
1174 [ + - + - ]: 110 : {RPCResult::Type::NUM, "source_mapped_as", /*optional=*/true, "Mapped AS (Autonomous System) number at the end of the BGP route to the source, used for diversifying peer selection (only displayed if the -asmap config option is set)"}
1175 : : }}
1176 : : }}
1177 : : }
1178 [ + - + - : 1430 : },
+ - + - +
+ + + + +
- - - - -
- ]
1179 : 55 : RPCExamples{
1180 [ + - + - : 110 : HelpExampleCli("getrawaddrman", "")
+ - ]
1181 [ + - + - : 220 : + HelpExampleRpc("getrawaddrman", "")
+ - + - ]
1182 [ + - ]: 55 : },
1183 : 55 : [&](const RPCHelpMan& self, const JSONRPCRequest& request) -> UniValue {
1184 : 1 : AddrMan& addrman = EnsureAnyAddrman(request.context);
1185 : 1 : NodeContext& node_context = EnsureAnyNodeContext(request.context);
1186 : 1 : CConnman& connman = EnsureConnman(node_context);
1187 : :
1188 : 1 : UniValue ret(UniValue::VOBJ);
1189 [ + - + - : 2 : ret.pushKV("new", AddrmanTableToJSON(addrman.GetEntries(false), connman));
+ - + - ]
1190 [ + - + - : 2 : ret.pushKV("tried", AddrmanTableToJSON(addrman.GetEntries(true), connman));
+ - + - ]
1191 : 1 : return ret;
1192 : 0 : },
1193 [ + - + - ]: 220 : };
1194 [ + - + - : 1210 : }
+ - + - +
- + - + -
+ - + - +
- + - -
- ]
1195 : :
1196 : 28 : void RegisterNetRPCCommands(CRPCTable& t)
1197 : : {
1198 : 28 : static const CRPCCommand commands[]{
1199 [ + - ]: 52 : {"network", &getconnectioncount},
1200 [ + - ]: 52 : {"network", &ping},
1201 [ + - ]: 52 : {"network", &getpeerinfo},
1202 [ + - ]: 52 : {"network", &addnode},
1203 [ + - ]: 52 : {"network", &disconnectnode},
1204 [ + - ]: 52 : {"network", &getaddednodeinfo},
1205 [ + - ]: 52 : {"network", &getnettotals},
1206 [ + - ]: 52 : {"network", &getnetworkinfo},
1207 [ + - ]: 52 : {"network", &setban},
1208 [ + - ]: 52 : {"network", &listbanned},
1209 [ + - ]: 52 : {"network", &clearbanned},
1210 [ + - ]: 52 : {"network", &setnetworkactive},
1211 [ + - ]: 52 : {"network", &getnodeaddresses},
1212 [ + - ]: 52 : {"network", &getaddrmaninfo},
1213 [ + - ]: 52 : {"hidden", &addconnection},
1214 [ + - ]: 52 : {"hidden", &addpeeraddress},
1215 [ + - ]: 52 : {"hidden", &sendmsgtopeer},
1216 [ + - ]: 52 : {"hidden", &getrawaddrman},
1217 [ + + + - : 496 : };
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- - - ]
1218 [ + + ]: 532 : for (const auto& c : commands) {
1219 : 504 : t.appendCommand(c.name, &c);
1220 : : }
1221 : 28 : }
|