2021-02-11 15:07:01 +11:00
|
|
|
#![warn(
|
|
|
|
unused_extern_crates,
|
|
|
|
missing_copy_implementations,
|
|
|
|
rust_2018_idioms,
|
|
|
|
clippy::cast_possible_truncation,
|
|
|
|
clippy::cast_sign_loss,
|
|
|
|
clippy::fallible_impl_from,
|
|
|
|
clippy::cast_precision_loss,
|
|
|
|
clippy::cast_possible_wrap,
|
|
|
|
clippy::dbg_macro
|
|
|
|
)]
|
|
|
|
#![forbid(unsafe_code)]
|
|
|
|
#![allow(non_snake_case)]
|
|
|
|
|
|
|
|
use anyhow::{Context, Result};
|
2021-04-22 11:33:36 +10:00
|
|
|
use libp2p::core::multiaddr::Protocol;
|
|
|
|
use libp2p::core::Multiaddr;
|
2021-03-23 16:56:04 +11:00
|
|
|
use libp2p::Swarm;
|
2021-02-11 15:07:01 +11:00
|
|
|
use prettytable::{row, Table};
|
2021-04-22 11:33:36 +10:00
|
|
|
use std::net::{IpAddr, Ipv4Addr, SocketAddr};
|
2021-03-04 11:28:58 +11:00
|
|
|
use std::sync::Arc;
|
2021-02-11 15:07:01 +11:00
|
|
|
use structopt::StructOpt;
|
2021-03-04 11:28:58 +11:00
|
|
|
use swap::asb::command::{Arguments, Command};
|
|
|
|
use swap::asb::config::{
|
2021-04-29 18:50:49 +10:00
|
|
|
default_config_path, initial_setup, query_user_for_initial_testnet_config, read_config, Config,
|
|
|
|
ConfigNotInitialized,
|
2021-02-11 15:07:01 +11:00
|
|
|
};
|
2021-03-04 11:28:58 +11:00
|
|
|
use swap::database::Database;
|
2021-03-17 14:55:42 +11:00
|
|
|
use swap::env::GetConfig;
|
2021-03-04 11:28:58 +11:00
|
|
|
use swap::monero::Amount;
|
2021-03-23 16:56:04 +11:00
|
|
|
use swap::network::swarm;
|
2021-04-01 13:00:15 +11:00
|
|
|
use swap::protocol::alice::event_loop::KrakenRate;
|
2021-03-26 16:13:47 +11:00
|
|
|
use swap::protocol::alice::{run, EventLoop};
|
2021-03-04 11:28:58 +11:00
|
|
|
use swap::seed::Seed;
|
2021-04-22 11:33:36 +10:00
|
|
|
use swap::tor::AuthenticatedClient;
|
|
|
|
use swap::{asb, bitcoin, env, kraken, monero, tor};
|
2021-02-11 15:07:01 +11:00
|
|
|
use tracing::{info, warn};
|
2021-02-22 12:41:04 +11:00
|
|
|
use tracing_subscriber::filter::LevelFilter;
|
2021-02-11 15:07:01 +11:00
|
|
|
|
|
|
|
#[macro_use]
|
|
|
|
extern crate prettytable;
|
|
|
|
|
2021-02-19 15:31:39 +11:00
|
|
|
const DEFAULT_WALLET_NAME: &str = "asb-wallet";
|
2021-02-11 15:07:01 +11:00
|
|
|
|
|
|
|
#[tokio::main]
|
|
|
|
async fn main() -> Result<()> {
|
2021-04-08 13:09:52 +10:00
|
|
|
asb::tracing::init(LevelFilter::DEBUG).expect("initialize tracing");
|
2021-02-11 15:07:01 +11:00
|
|
|
|
|
|
|
let opt = Arguments::from_args();
|
|
|
|
|
|
|
|
let config_path = if let Some(config_path) = opt.config {
|
|
|
|
config_path
|
|
|
|
} else {
|
|
|
|
default_config_path()?
|
|
|
|
};
|
|
|
|
|
|
|
|
let config = match read_config(config_path.clone())? {
|
|
|
|
Ok(config) => config,
|
|
|
|
Err(ConfigNotInitialized {}) => {
|
|
|
|
initial_setup(config_path.clone(), query_user_for_initial_testnet_config)?;
|
|
|
|
read_config(config_path)?.expect("after initial setup config can be read")
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
info!(
|
|
|
|
"Database and Seed will be stored in directory: {}",
|
|
|
|
config.data.dir.display()
|
|
|
|
);
|
|
|
|
|
2021-02-02 10:39:34 +11:00
|
|
|
let db_path = config.data.dir.join("database");
|
|
|
|
|
|
|
|
let db = Database::open(config.data.dir.join(db_path).as_path())
|
2021-02-11 15:07:01 +11:00
|
|
|
.context("Could not open database")?;
|
|
|
|
|
2021-03-31 16:40:40 +11:00
|
|
|
let seed =
|
|
|
|
Seed::from_file_or_generate(&config.data.dir).expect("Could not retrieve/initialize seed");
|
2021-02-11 15:07:01 +11:00
|
|
|
|
2021-03-31 16:40:40 +11:00
|
|
|
let env_config = env::Testnet::get_config();
|
2021-02-11 15:07:01 +11:00
|
|
|
|
2021-03-31 16:40:40 +11:00
|
|
|
match opt.cmd {
|
2021-04-01 13:00:15 +11:00
|
|
|
Command::Start {
|
|
|
|
max_buy,
|
|
|
|
ask_spread,
|
2021-04-29 19:26:19 +10:00
|
|
|
resume_only,
|
2021-04-01 13:00:15 +11:00
|
|
|
} => {
|
2021-03-31 16:38:54 +11:00
|
|
|
let bitcoin_wallet = init_bitcoin_wallet(&config, &seed, env_config).await?;
|
|
|
|
let monero_wallet = init_monero_wallet(&config, env_config).await?;
|
2021-02-11 15:07:01 +11:00
|
|
|
|
2021-03-31 17:03:51 +11:00
|
|
|
let bitcoin_balance = bitcoin_wallet.balance().await?;
|
|
|
|
info!("Bitcoin balance: {}", bitcoin_balance);
|
|
|
|
|
|
|
|
let monero_balance = monero_wallet.get_balance().await?;
|
|
|
|
if monero_balance == Amount::ZERO {
|
|
|
|
let deposit_address = monero_wallet.get_main_address();
|
|
|
|
warn!(
|
|
|
|
"The Monero balance is 0, make sure to deposit funds at: {}",
|
|
|
|
deposit_address
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
info!("Monero balance: {}", monero_balance);
|
|
|
|
}
|
|
|
|
|
2021-04-01 12:09:51 +11:00
|
|
|
let kraken_price_updates = kraken::connect()?;
|
2021-02-16 16:37:44 +11:00
|
|
|
|
2021-04-22 11:33:36 +10:00
|
|
|
// setup Tor hidden services
|
|
|
|
let tor_client =
|
|
|
|
tor::Client::new(config.tor.socks5_port).with_control_port(config.tor.control_port);
|
|
|
|
let _ac = match tor_client.assert_tor_running().await {
|
|
|
|
Ok(_) => {
|
|
|
|
tracing::info!("Tor found. Setting up hidden service. ");
|
|
|
|
let ac =
|
|
|
|
register_tor_services(config.network.clone().listen, tor_client, &seed)
|
|
|
|
.await?;
|
|
|
|
Some(ac)
|
|
|
|
}
|
|
|
|
Err(_) => {
|
|
|
|
tracing::warn!("Tor not found. Running on clear net. ");
|
|
|
|
None
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-05-04 14:57:50 +10:00
|
|
|
let current_balance = monero_wallet.get_balance().await?;
|
|
|
|
let lock_fee = monero_wallet.static_tx_fee_estimate();
|
|
|
|
let kraken_rate = KrakenRate::new(ask_spread, kraken_price_updates);
|
|
|
|
let mut swarm = swarm::alice(
|
|
|
|
&seed,
|
|
|
|
current_balance,
|
|
|
|
lock_fee,
|
|
|
|
max_buy,
|
|
|
|
kraken_rate.clone(),
|
|
|
|
resume_only,
|
|
|
|
)?;
|
2021-04-08 10:02:13 +10:00
|
|
|
|
|
|
|
for listen in config.network.listen {
|
|
|
|
Swarm::listen_on(&mut swarm, listen.clone())
|
|
|
|
.with_context(|| format!("Failed to listen on network interface {}", listen))?;
|
|
|
|
}
|
2021-03-23 16:56:04 +11:00
|
|
|
|
2021-03-16 17:08:19 +11:00
|
|
|
let (event_loop, mut swap_receiver) = EventLoop::new(
|
2021-03-23 16:56:04 +11:00
|
|
|
swarm,
|
2021-03-17 14:55:42 +11:00
|
|
|
env_config,
|
2021-02-11 15:07:01 +11:00
|
|
|
Arc::new(bitcoin_wallet),
|
|
|
|
Arc::new(monero_wallet),
|
|
|
|
Arc::new(db),
|
2021-05-04 14:57:50 +10:00
|
|
|
kraken_rate,
|
2021-03-02 16:22:39 +11:00
|
|
|
max_buy,
|
2021-02-11 15:07:01 +11:00
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
|
2021-03-16 17:08:19 +11:00
|
|
|
tokio::spawn(async move {
|
|
|
|
while let Some(swap) = swap_receiver.recv().await {
|
|
|
|
tokio::spawn(async move {
|
|
|
|
let swap_id = swap.swap_id;
|
|
|
|
match run(swap).await {
|
|
|
|
Ok(state) => {
|
|
|
|
tracing::debug!(%swap_id, "Swap finished with state {}", state)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
tracing::error!(%swap_id, "Swap failed with {:#}", e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2021-02-11 15:07:01 +11:00
|
|
|
info!("Our peer id is {}", event_loop.peer_id());
|
|
|
|
|
|
|
|
event_loop.run().await;
|
|
|
|
}
|
|
|
|
Command::History => {
|
|
|
|
let mut table = Table::new();
|
|
|
|
|
|
|
|
table.add_row(row!["SWAP ID", "STATE"]);
|
|
|
|
|
2021-03-26 15:16:19 +11:00
|
|
|
for (swap_id, state) in db.all_alice()? {
|
2021-02-11 15:07:01 +11:00
|
|
|
table.add_row(row![swap_id, state]);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Print the table to stdout
|
|
|
|
table.printstd();
|
|
|
|
}
|
2021-03-31 16:55:28 +11:00
|
|
|
Command::WithdrawBtc { amount, address } => {
|
|
|
|
let bitcoin_wallet = init_bitcoin_wallet(&config, &seed, env_config).await?;
|
|
|
|
|
|
|
|
let amount = match amount {
|
|
|
|
Some(amount) => amount,
|
|
|
|
None => {
|
|
|
|
bitcoin_wallet
|
|
|
|
.max_giveable(address.script_pubkey().len())
|
|
|
|
.await?
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let psbt = bitcoin_wallet.send_to_address(address, amount).await?;
|
|
|
|
let signed_tx = bitcoin_wallet.sign_and_finalize(psbt).await?;
|
|
|
|
|
|
|
|
bitcoin_wallet.broadcast(signed_tx, "withdraw").await?;
|
|
|
|
}
|
2021-03-31 17:03:51 +11:00
|
|
|
Command::Balance => {
|
|
|
|
let bitcoin_wallet = init_bitcoin_wallet(&config, &seed, env_config).await?;
|
|
|
|
let monero_wallet = init_monero_wallet(&config, env_config).await?;
|
|
|
|
|
|
|
|
let bitcoin_balance = bitcoin_wallet.balance().await?;
|
|
|
|
let monero_balance = monero_wallet.get_balance().await?;
|
|
|
|
|
|
|
|
tracing::info!("Current balance: {}, {}", bitcoin_balance, monero_balance);
|
|
|
|
}
|
2021-02-11 15:07:01 +11:00
|
|
|
};
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2021-03-31 16:38:54 +11:00
|
|
|
async fn init_bitcoin_wallet(
|
|
|
|
config: &Config,
|
|
|
|
seed: &Seed,
|
|
|
|
env_config: swap::env::Config,
|
|
|
|
) -> Result<bitcoin::Wallet> {
|
|
|
|
let wallet_dir = config.data.dir.join("wallet");
|
|
|
|
|
|
|
|
let wallet = bitcoin::Wallet::new(
|
|
|
|
config.bitcoin.electrum_rpc_url.clone(),
|
|
|
|
&wallet_dir,
|
|
|
|
seed.derive_extended_private_key(env_config.bitcoin_network)?,
|
2021-03-17 14:55:42 +11:00
|
|
|
env_config,
|
2021-05-03 09:48:40 +10:00
|
|
|
config.bitcoin.target_block,
|
2021-02-11 15:07:01 +11:00
|
|
|
)
|
2021-03-31 16:38:54 +11:00
|
|
|
.await
|
|
|
|
.context("Failed to initialize Bitcoin wallet")?;
|
2021-02-17 10:56:39 +11:00
|
|
|
|
2021-03-31 16:38:54 +11:00
|
|
|
wallet.sync().await?;
|
2021-02-17 10:56:39 +11:00
|
|
|
|
2021-03-31 16:38:54 +11:00
|
|
|
Ok(wallet)
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn init_monero_wallet(
|
|
|
|
config: &Config,
|
|
|
|
env_config: swap::env::Config,
|
|
|
|
) -> Result<monero::Wallet> {
|
|
|
|
let wallet = monero::Wallet::open_or_create(
|
2021-02-24 18:00:07 +11:00
|
|
|
config.monero.wallet_rpc_url.clone(),
|
|
|
|
DEFAULT_WALLET_NAME.to_string(),
|
2021-03-17 14:55:42 +11:00
|
|
|
env_config,
|
2021-03-16 19:24:41 +11:00
|
|
|
)
|
|
|
|
.await?;
|
2021-02-11 15:07:01 +11:00
|
|
|
|
2021-03-31 16:38:54 +11:00
|
|
|
Ok(wallet)
|
2021-02-11 15:07:01 +11:00
|
|
|
}
|
2021-04-22 11:33:36 +10:00
|
|
|
|
|
|
|
/// Registers a hidden service for each network.
|
|
|
|
/// Note: Once ac goes out of scope, the services will be de-registered.
|
|
|
|
async fn register_tor_services(
|
|
|
|
networks: Vec<Multiaddr>,
|
|
|
|
tor_client: tor::Client,
|
|
|
|
seed: &Seed,
|
|
|
|
) -> Result<AuthenticatedClient> {
|
|
|
|
let mut ac = tor_client.into_authenticated_client().await?;
|
|
|
|
|
|
|
|
let hidden_services_details = networks
|
|
|
|
.iter()
|
|
|
|
.flat_map(|network| {
|
|
|
|
network.iter().map(|protocol| match protocol {
|
|
|
|
Protocol::Tcp(port) => Some((
|
|
|
|
port,
|
|
|
|
SocketAddr::new(IpAddr::from(Ipv4Addr::new(127, 0, 0, 1)), port),
|
|
|
|
)),
|
|
|
|
_ => {
|
|
|
|
// We only care for Tcp for now.
|
|
|
|
None
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
.filter_map(|details| details)
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
|
|
|
let key = seed.derive_torv3_key();
|
|
|
|
|
|
|
|
ac.add_services(&hidden_services_details, &key).await?;
|
|
|
|
|
|
|
|
let onion_address = key
|
|
|
|
.public()
|
|
|
|
.get_onion_address()
|
|
|
|
.get_address_without_dot_onion();
|
|
|
|
|
|
|
|
hidden_services_details.iter().for_each(|(port, _)| {
|
|
|
|
tracing::info!("/onion3/{}:{}", onion_address, port);
|
|
|
|
});
|
|
|
|
|
|
|
|
Ok(ac)
|
|
|
|
}
|