From 72d3a7d6c36ff871b45c8bbe142ee2a63188fa13 Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Thu, 14 Nov 2024 02:08:09 +0300 Subject: [PATCH 01/12] Initial limitations implementation --- Cargo.lock | 1 + consensus/core/src/config/mod.rs | 4 +++ rpc/core/src/api/ops.rs | 4 +++ rpc/core/src/error.rs | 3 ++ rpc/macros/src/core/mod.rs | 1 + rpc/macros/src/core/service.rs | 19 +++++++++++++ rpc/macros/src/lib.rs | 6 ++++ rpc/service/Cargo.toml | 1 + rpc/service/src/flags.rs | 44 ++++++++++++++++++++++++++++ rpc/service/src/lib.rs | 1 + rpc/service/src/service.rs | 49 +++++++++++++++++++++++++++++++- 11 files changed, 132 insertions(+), 1 deletion(-) create mode 100644 rpc/macros/src/core/mod.rs create mode 100644 rpc/macros/src/core/service.rs create mode 100644 rpc/service/src/flags.rs diff --git a/Cargo.lock b/Cargo.lock index a951993e90..858e051d30 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -3090,6 +3090,7 @@ dependencies = [ "kaspa-p2p-lib", "kaspa-perf-monitor", "kaspa-rpc-core", + "kaspa-rpc-macros", "kaspa-txscript", "kaspa-utils", "kaspa-utils-tower", diff --git a/consensus/core/src/config/mod.rs b/consensus/core/src/config/mod.rs index d62bf15a94..6296d376f0 100644 --- a/consensus/core/src/config/mod.rs +++ b/consensus/core/src/config/mod.rs @@ -68,6 +68,9 @@ pub struct Config { /// A scale factor to apply to memory allocation bounds pub ram_scale: f64, + + /// Bitwise flag for configuring allowed RPC calls + pub rpc_flags: u128, } impl Config { @@ -95,6 +98,7 @@ impl Config { initial_utxo_set: Default::default(), disable_upnp: false, ram_scale: 1.0, + rpc_flags: u128::MAX, } } diff --git a/rpc/core/src/api/ops.rs b/rpc/core/src/api/ops.rs index 26ca356eb0..9cae7d4943 100644 --- a/rpc/core/src/api/ops.rs +++ b/rpc/core/src/api/ops.rs @@ -139,6 +139,10 @@ pub enum RpcApiOps { } impl RpcApiOps { + pub fn bitmask(&self) -> u128 { + 1 << (*self as u128 - 110) // Only applies for RPC methods -- means it covers all calls up to 237. + } + pub fn is_subscription(&self) -> bool { matches!( self, diff --git a/rpc/core/src/error.rs b/rpc/core/src/error.rs index 0e2bfee225..adbdff9b1c 100644 --- a/rpc/core/src/error.rs +++ b/rpc/core/src/error.rs @@ -60,6 +60,9 @@ pub enum RpcError { #[error("Transaction {0} not found")] TransactionNotFound(TransactionId), + #[error("Method unavailable. Disabled through RPC flags.")] + UnauthorizedMethod, + #[error("Method unavailable. Run the node with the --utxoindex argument.")] NoUtxoIndex, diff --git a/rpc/macros/src/core/mod.rs b/rpc/macros/src/core/mod.rs new file mode 100644 index 0000000000..1f278a4d51 --- /dev/null +++ b/rpc/macros/src/core/mod.rs @@ -0,0 +1 @@ +pub mod service; diff --git a/rpc/macros/src/core/service.rs b/rpc/macros/src/core/service.rs new file mode 100644 index 0000000000..a46f31ac3a --- /dev/null +++ b/rpc/macros/src/core/service.rs @@ -0,0 +1,19 @@ +use proc_macro::TokenStream; +use quote::quote; +use syn::{parse_macro_input, ItemFn, Path}; + +pub fn auth(attr: TokenStream, item: TokenStream) -> TokenStream { + let api_op = parse_macro_input!(attr as Path); + let mut func = parse_macro_input!(item as ItemFn); + + let check = syn::parse2(quote! { + if !self.flags.has_enabled(#api_op) { + // As macro processing happens after async_trait processing its wrapped with async_trait return type + return std::boxed::Box::pin(std::future::ready(Err(RpcError::UnauthorizedMethod))); + } + }) + .unwrap(); + + func.block.stmts.insert(0, check); + quote!(#func).into() +} diff --git a/rpc/macros/src/lib.rs b/rpc/macros/src/lib.rs index 9ca49bf54a..dbbfe37b88 100644 --- a/rpc/macros/src/lib.rs +++ b/rpc/macros/src/lib.rs @@ -1,5 +1,6 @@ use proc_macro::TokenStream; use proc_macro_error::proc_macro_error; +mod core; mod grpc; mod handler; mod wrpc; @@ -45,3 +46,8 @@ pub fn build_grpc_server_interface(input: TokenStream) -> TokenStream { pub fn test_wrpc_serializer(input: TokenStream) -> TokenStream { wrpc::test::build_test(input) } + +#[proc_macro_attribute] +pub fn auth(attr: TokenStream, item: TokenStream) -> TokenStream { + core::service::auth(attr, item) +} diff --git a/rpc/service/Cargo.toml b/rpc/service/Cargo.toml index 54e9764088..ce68439a2a 100644 --- a/rpc/service/Cargo.toml +++ b/rpc/service/Cargo.toml @@ -24,6 +24,7 @@ kaspa-p2p-flows.workspace = true kaspa-p2p-lib.workspace = true kaspa-perf-monitor.workspace = true kaspa-rpc-core.workspace = true +kaspa-rpc-macros.workspace = true kaspa-txscript.workspace = true kaspa-utils.workspace = true kaspa-utils-tower.workspace = true diff --git a/rpc/service/src/flags.rs b/rpc/service/src/flags.rs new file mode 100644 index 0000000000..6d44dd0ff3 --- /dev/null +++ b/rpc/service/src/flags.rs @@ -0,0 +1,44 @@ +use kaspa_rpc_core::api::ops::RpcApiOps; + +// Struct to manage flags as a combined bitmask +#[derive(Debug)] +pub struct Flags { + bitmask: u128, +} + +impl Flags { + // Create an empty flag set + pub fn new() -> Self { + Flags { bitmask: 0 } + } + + // Adds a flag + pub fn add(&mut self, op: RpcApiOps) { + self.bitmask |= op.bitmask(); + } + + // Removes a flag + pub fn remove(&mut self, op: RpcApiOps) { + self.bitmask &= !op.bitmask(); + } + + // Check if a flag is enabled + pub fn has_enabled(&self, op: RpcApiOps) -> bool { + (self.bitmask & op.bitmask()) != 0 + } + + // Create a flag set from a slice of operations + pub fn from_ops(ops: &[RpcApiOps]) -> Self { + let mut permissions = Flags::new(); + for &op in ops { + permissions.add(op); + } + permissions + } +} + +impl From for Flags { + fn from(bitmask: u128) -> Self { + Flags { bitmask } + } +} diff --git a/rpc/service/src/lib.rs b/rpc/service/src/lib.rs index 6d5e825765..54beb17665 100644 --- a/rpc/service/src/lib.rs +++ b/rpc/service/src/lib.rs @@ -1,3 +1,4 @@ pub mod collector; pub mod converter; +pub mod flags; pub mod service; diff --git a/rpc/service/src/service.rs b/rpc/service/src/service.rs index d75ff770b0..ffbc93cc9b 100644 --- a/rpc/service/src/service.rs +++ b/rpc/service/src/service.rs @@ -3,6 +3,7 @@ use super::collector::{CollectorFromConsensus, CollectorFromIndex}; use crate::converter::feerate_estimate::{FeeEstimateConverter, FeeEstimateVerboseConverter}; use crate::converter::{consensus::ConsensusConverter, index::IndexConverter, protocol::ProtocolConverter}; +use crate::flags::Flags; use crate::service::NetworkType::{Mainnet, Testnet}; use async_trait::async_trait; use kaspa_consensus_core::api::counters::ProcessingCounters; @@ -53,6 +54,7 @@ use kaspa_notify::{ use kaspa_p2p_flows::flow_context::FlowContext; use kaspa_p2p_lib::common::ProtocolError; use kaspa_perf_monitor::{counters::CountersSnapshot, Monitor as PerfMonitor}; +use kaspa_rpc_core::api::ops::RpcApiOps; use kaspa_rpc_core::{ api::{ connection::DynRpcConnection, @@ -63,6 +65,7 @@ use kaspa_rpc_core::{ notify::connection::ChannelConnection, Notification, RpcError, RpcResult, }; +use kaspa_rpc_macros::auth; use kaspa_txscript::{extract_script_pub_key_address, pay_to_address_script}; use kaspa_utils::expiring_cache::ExpiringCache; use kaspa_utils::sysinfo::SystemInfo; @@ -118,6 +121,7 @@ pub struct RpcCoreService { system_info: SystemInfo, fee_estimate_cache: ExpiringCache, fee_estimate_verbose_cache: ExpiringCache>, + flags: Flags, } const RPC_CORE: &str = "rpc-core"; @@ -195,10 +199,12 @@ impl RpcCoreService { // Protocol converter let protocol_converter = Arc::new(ProtocolConverter::new(flow_context.clone())); - // Create the rcp-core notifier + // Create the rpc-core notifier let notifier = Arc::new(Notifier::new(RPC_CORE, EVENT_TYPE_ARRAY[..].into(), collectors, subscribers, subscription_context, 1, policies)); + let flags: Flags = config.rpc_flags.into(); + Self { consensus_manager, notifier, @@ -221,6 +227,7 @@ impl RpcCoreService { system_info, fee_estimate_cache: ExpiringCache::new(Duration::from_millis(500), Duration::from_millis(1000)), fee_estimate_verbose_cache: ExpiringCache::new(Duration::from_millis(500), Duration::from_millis(1000)), + flags, } } @@ -288,6 +295,7 @@ impl RpcCoreService { #[async_trait] impl RpcApi for RpcCoreService { + #[auth(RpcApiOps::SubmitBlock)] async fn submit_block_call( &self, _connection: Option<&DynRpcConnection>, @@ -350,6 +358,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and } } + #[auth(RpcApiOps::GetBlockTemplate)] async fn get_block_template_call( &self, _connection: Option<&DynRpcConnection>, @@ -386,6 +395,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } + #[auth(RpcApiOps::GetCurrentBlockColor)] async fn get_current_block_color_call( &self, _connection: Option<&DynRpcConnection>, @@ -399,6 +409,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and } } + #[auth(RpcApiOps::GetBlock)] async fn get_block_call(&self, _connection: Option<&DynRpcConnection>, request: GetBlockRequest) -> RpcResult { // TODO: test let session = self.consensus_manager.consensus().session().await; @@ -411,6 +422,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } + #[auth(RpcApiOps::GetBlocks)] async fn get_blocks_call( &self, _connection: Option<&DynRpcConnection>, @@ -464,6 +476,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetBlocksResponse { block_hashes, blocks }) } + #[auth(RpcApiOps::GetInfo)] async fn get_info_call(&self, _connection: Option<&DynRpcConnection>, _request: GetInfoRequest) -> RpcResult { let is_nearly_synced = self.consensus_manager.consensus().unguarded_session().async_is_nearly_synced().await; Ok(GetInfoResponse { @@ -477,6 +490,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } + #[auth(RpcApiOps::GetMempoolEntry)] async fn get_mempool_entry_call( &self, _connection: Option<&DynRpcConnection>, @@ -490,6 +504,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetMempoolEntryResponse::new(self.consensus_converter.get_mempool_entry(&session, &transaction))) } + #[auth(RpcApiOps::GetMempoolEntries)] async fn get_mempool_entries_call( &self, _connection: Option<&DynRpcConnection>, @@ -506,6 +521,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetMempoolEntriesResponse::new(mempool_entries)) } + #[auth(RpcApiOps::GetMempoolEntriesByAddresses)] async fn get_mempool_entries_by_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -532,6 +548,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetMempoolEntriesByAddressesResponse::new(mempool_entries)) } + #[auth(RpcApiOps::SubmitTransaction)] async fn submit_transaction_call( &self, _connection: Option<&DynRpcConnection>, @@ -557,6 +574,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(SubmitTransactionResponse::new(transaction_id)) } + #[auth(RpcApiOps::SubmitTransactionReplacement)] async fn submit_transaction_replacement_call( &self, _connection: Option<&DynRpcConnection>, @@ -574,6 +592,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(SubmitTransactionReplacementResponse::new(transaction_id, (&*replaced_transaction).into())) } + #[auth(RpcApiOps::GetCurrentNetwork)] async fn get_current_network_call( &self, _connection: Option<&DynRpcConnection>, @@ -582,6 +601,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetCurrentNetworkResponse::new(*self.config.net)) } + #[auth(RpcApiOps::GetSubnetwork)] async fn get_subnetwork_call( &self, _connection: Option<&DynRpcConnection>, @@ -590,10 +610,12 @@ NOTE: This error usually indicates an RPC conversion error between the node and Err(RpcError::NotImplemented) } + #[auth(RpcApiOps::GetSink)] async fn get_sink_call(&self, _connection: Option<&DynRpcConnection>, _: GetSinkRequest) -> RpcResult { Ok(GetSinkResponse::new(self.consensus_manager.consensus().unguarded_session().async_get_sink().await)) } + #[auth(RpcApiOps::GetSinkBlueScore)] async fn get_sink_blue_score_call( &self, _connection: Option<&DynRpcConnection>, @@ -603,6 +625,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetSinkBlueScoreResponse::new(session.async_get_ghostdag_data(session.async_get_sink().await).await?.blue_score)) } + #[auth(RpcApiOps::GetVirtualChainFromBlock)] async fn get_virtual_chain_from_block_call( &self, _connection: Option<&DynRpcConnection>, @@ -631,6 +654,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetVirtualChainFromBlockResponse::new(virtual_chain_batch.removed, virtual_chain_batch.added, accepted_transaction_ids)) } + #[auth(RpcApiOps::GetBlockCount)] async fn get_block_count_call( &self, _connection: Option<&DynRpcConnection>, @@ -639,6 +663,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(self.consensus_manager.consensus().unguarded_session().async_estimate_block_count().await) } + #[auth(RpcApiOps::GetUtxosByAddresses)] async fn get_utxos_by_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -653,6 +678,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetUtxosByAddressesResponse::new(self.index_converter.get_utxos_by_addresses_entries(&entry_map))) } + #[auth(RpcApiOps::GetBalanceByAddress)] async fn get_balance_by_address_call( &self, _connection: Option<&DynRpcConnection>, @@ -666,6 +692,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetBalanceByAddressResponse::new(balance)) } + #[auth(RpcApiOps::GetBalancesByAddresses)] async fn get_balances_by_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -687,6 +714,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetBalancesByAddressesResponse::new(entries)) } + #[auth(RpcApiOps::GetCoinSupply)] async fn get_coin_supply_call( &self, _connection: Option<&DynRpcConnection>, @@ -700,6 +728,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetCoinSupplyResponse::new(MAX_SOMPI, circulating_sompi)) } + #[auth(RpcApiOps::GetDaaScoreTimestampEstimate)] async fn get_daa_score_timestamp_estimate_call( &self, _connection: Option<&DynRpcConnection>, @@ -759,6 +788,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetDaaScoreTimestampEstimateResponse::new(timestamps)) } + #[auth(RpcApiOps::GetFeeEstimate)] async fn get_fee_estimate_call( &self, _connection: Option<&DynRpcConnection>, @@ -770,6 +800,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetFeeEstimateResponse { estimate }) } + #[auth(RpcApiOps::GetFeeEstimateExperimental)] async fn get_fee_estimate_experimental_call( &self, connection: Option<&DynRpcConnection>, @@ -794,10 +825,12 @@ NOTE: This error usually indicates an RPC conversion error between the node and } } + #[auth(RpcApiOps::Ping)] async fn ping_call(&self, _connection: Option<&DynRpcConnection>, _: PingRequest) -> RpcResult { Ok(PingResponse {}) } + #[auth(RpcApiOps::GetHeaders)] async fn get_headers_call( &self, _connection: Option<&DynRpcConnection>, @@ -806,6 +839,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Err(RpcError::NotImplemented) } + #[auth(RpcApiOps::GetBlockDagInfo)] async fn get_block_dag_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -828,6 +862,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and )) } + #[auth(RpcApiOps::EstimateNetworkHashesPerSecond)] async fn estimate_network_hashes_per_second_call( &self, _connection: Option<&DynRpcConnection>, @@ -860,6 +895,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and )) } + #[auth(RpcApiOps::AddPeer)] async fn add_peer_call(&self, _connection: Option<&DynRpcConnection>, request: AddPeerRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("AddPeer RPC command called while node in safe RPC mode -- ignoring."); @@ -874,6 +910,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(AddPeerResponse {}) } + #[auth(RpcApiOps::GetPeerAddresses)] async fn get_peer_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -883,6 +920,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetPeerAddressesResponse::new(address_manager.get_all_addresses(), address_manager.get_all_banned_addresses())) } + #[auth(RpcApiOps::Ban)] async fn ban_call(&self, _connection: Option<&DynRpcConnection>, request: BanRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("Ban RPC command called while node in safe RPC mode -- ignoring."); @@ -900,6 +938,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(BanResponse {}) } + #[auth(RpcApiOps::Unban)] async fn unban_call(&self, _connection: Option<&DynRpcConnection>, request: UnbanRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("Unban RPC command called while node in safe RPC mode -- ignoring."); @@ -914,6 +953,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(UnbanResponse {}) } + #[auth(RpcApiOps::GetConnectedPeerInfo)] async fn get_connected_peer_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -924,6 +964,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetConnectedPeerInfoResponse::new(peer_info)) } + #[auth(RpcApiOps::Shutdown)] async fn shutdown_call(&self, _connection: Option<&DynRpcConnection>, _: ShutdownRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("Shutdown RPC command called while node in safe RPC mode -- ignoring."); @@ -945,6 +986,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(ShutdownResponse {}) } + #[auth(RpcApiOps::ResolveFinalityConflict)] async fn resolve_finality_conflict_call( &self, _connection: Option<&DynRpcConnection>, @@ -957,6 +999,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Err(RpcError::NotImplemented) } + #[auth(RpcApiOps::GetConnections)] async fn get_connections_call( &self, _connection: Option<&DynRpcConnection>, @@ -975,6 +1018,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetConnectionsResponse { clients, peers, profile_data }) } + #[auth(RpcApiOps::GetMetrics)] async fn get_metrics_call(&self, _connection: Option<&DynRpcConnection>, req: GetMetricsRequest) -> RpcResult { let CountersSnapshot { resident_set_size, @@ -1068,6 +1112,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(response) } + #[auth(RpcApiOps::GetSystemInfo)] async fn get_system_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -1086,6 +1131,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(response) } + #[auth(RpcApiOps::GetServerInfo)] async fn get_server_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -1106,6 +1152,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } + #[auth(RpcApiOps::GetSyncStatus)] async fn get_sync_status_call( &self, _connection: Option<&DynRpcConnection>, From 35a557de911d724ba564f9f17b9b72643c2d6de2 Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Tue, 10 Dec 2024 20:43:45 +0300 Subject: [PATCH 02/12] Complete Namespaces implementation --- Cargo.lock | 2 + consensus/core/src/config/mod.rs | 4 -- kaspad/src/args.rs | 17 +++++- kaspad/src/daemon.rs | 1 + rpc/core/src/api/ops.rs | 4 -- rpc/core/src/error.rs | 4 +- rpc/macros/src/core/service.rs | 8 +-- rpc/macros/src/lib.rs | 4 +- rpc/service/Cargo.toml | 4 +- rpc/service/src/flags.rs | 44 --------------- rpc/service/src/lib.rs | 2 +- rpc/service/src/namespace.rs | 84 +++++++++++++++++++++++++++++ rpc/service/src/service.rs | 92 ++++++++++++++++---------------- 13 files changed, 160 insertions(+), 110 deletions(-) delete mode 100644 rpc/service/src/flags.rs create mode 100644 rpc/service/src/namespace.rs diff --git a/Cargo.lock b/Cargo.lock index 858e051d30..541d3802f6 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -3096,6 +3096,8 @@ dependencies = [ "kaspa-utils-tower", "kaspa-utxoindex", "log", + "serde", + "thiserror", "tokio", "triggered", "workflow-rpc", diff --git a/consensus/core/src/config/mod.rs b/consensus/core/src/config/mod.rs index 6296d376f0..d62bf15a94 100644 --- a/consensus/core/src/config/mod.rs +++ b/consensus/core/src/config/mod.rs @@ -68,9 +68,6 @@ pub struct Config { /// A scale factor to apply to memory allocation bounds pub ram_scale: f64, - - /// Bitwise flag for configuring allowed RPC calls - pub rpc_flags: u128, } impl Config { @@ -98,7 +95,6 @@ impl Config { initial_utxo_set: Default::default(), disable_upnp: false, ram_scale: 1.0, - rpc_flags: u128::MAX, } } diff --git a/kaspad/src/args.rs b/kaspad/src/args.rs index 56dd7c1de7..a988f1dffb 100644 --- a/kaspad/src/args.rs +++ b/kaspad/src/args.rs @@ -5,6 +5,7 @@ use kaspa_consensus_core::{ }; use kaspa_core::kaspad_env::version; use kaspa_notify::address::tracker::Tracker; +use kaspa_rpc_service::namespace::Namespaces; use kaspa_utils::networking::ContextualNetAddress; use kaspa_wrpc_server::address::WrpcNetAddress; use serde::Deserialize; @@ -90,6 +91,8 @@ pub struct Args { #[serde(rename = "nogrpc")] pub disable_grpc: bool, pub ram_scale: f64, + #[serde(rename = "rpcapi")] + pub rpc_namespaces: Option, } impl Default for Args { @@ -140,6 +143,7 @@ impl Default for Args { disable_dns_seeding: false, disable_grpc: false, ram_scale: 1.0, + rpc_namespaces: None, } } } @@ -369,7 +373,15 @@ Setting to 0 prevents the preallocation and sets the maximum to {}, leading to 0 .help("Apply a scale factor to memory allocation bounds. Nodes with limited RAM (~4-8GB) should set this to ~0.3-0.5 respectively. Nodes with a large RAM (~64GB) can set this value to ~3.0-4.0 and gain superior performance especially for syncing peers faster"), ) - ; + .arg( + Arg::new("rpc-api") + .long("rpc-api") + .value_name("namespaces") + .require_equals(true) + .default_missing_value(None) + .value_parser(clap::value_parser!(Namespaces)) + .help("Specify allowed RPC namespaces exposed over RPC servers."), + ); #[cfg(feature = "devnet-prealloc")] let cmd = cmd @@ -448,6 +460,7 @@ impl Args { disable_dns_seeding: arg_match_unwrap_or::(&m, "nodnsseed", defaults.disable_dns_seeding), disable_grpc: arg_match_unwrap_or::(&m, "nogrpc", defaults.disable_grpc), ram_scale: arg_match_unwrap_or::(&m, "ram-scale", defaults.ram_scale), + rpc_namespaces: m.get_one::("rpc-api").cloned().or(defaults.rpc_namespaces), #[cfg(feature = "devnet-prealloc")] num_prealloc_utxos: m.get_one::("num-prealloc-utxos").cloned(), @@ -560,4 +573,6 @@ fn arg_match_many_unwrap_or(m: &clap::ArgMatch --override-dag-params-file= Overrides DAG params (allowed only on devnet) -s, --service= Service command {install, remove, start, stop} --nogrpc Don't initialize the gRPC server + --rpc-api= Set available namespaces over RPC server(s). + (By default all namespaces are enabled) */ diff --git a/kaspad/src/daemon.rs b/kaspad/src/daemon.rs index db9f32c165..d0ef9dbd2e 100644 --- a/kaspad/src/daemon.rs +++ b/kaspad/src/daemon.rs @@ -574,6 +574,7 @@ do you confirm? (answer y/n or pass --yes to the Kaspad command line to confirm p2p_tower_counters.clone(), grpc_tower_counters.clone(), system_info, + args.rpc_namespaces.clone(), )); let grpc_service_broadcasters: usize = 3; // TODO: add a command line argument or derive from other arg/config/host-related fields let grpc_service = if !args.disable_grpc { diff --git a/rpc/core/src/api/ops.rs b/rpc/core/src/api/ops.rs index 9cae7d4943..26ca356eb0 100644 --- a/rpc/core/src/api/ops.rs +++ b/rpc/core/src/api/ops.rs @@ -139,10 +139,6 @@ pub enum RpcApiOps { } impl RpcApiOps { - pub fn bitmask(&self) -> u128 { - 1 << (*self as u128 - 110) // Only applies for RPC methods -- means it covers all calls up to 237. - } - pub fn is_subscription(&self) -> bool { matches!( self, diff --git a/rpc/core/src/error.rs b/rpc/core/src/error.rs index adbdff9b1c..aed068ed15 100644 --- a/rpc/core/src/error.rs +++ b/rpc/core/src/error.rs @@ -60,8 +60,8 @@ pub enum RpcError { #[error("Transaction {0} not found")] TransactionNotFound(TransactionId), - #[error("Method unavailable. Disabled through RPC flags.")] - UnauthorizedMethod, + #[error("Method unavailable. {0} namespace is not available.")] + UnauthorizedMethod(String), #[error("Method unavailable. Run the node with the --utxoindex argument.")] NoUtxoIndex, diff --git a/rpc/macros/src/core/service.rs b/rpc/macros/src/core/service.rs index a46f31ac3a..ed34670e67 100644 --- a/rpc/macros/src/core/service.rs +++ b/rpc/macros/src/core/service.rs @@ -2,14 +2,14 @@ use proc_macro::TokenStream; use quote::quote; use syn::{parse_macro_input, ItemFn, Path}; -pub fn auth(attr: TokenStream, item: TokenStream) -> TokenStream { - let api_op = parse_macro_input!(attr as Path); +pub fn namespace(attr: TokenStream, item: TokenStream) -> TokenStream { + let api_namespace = parse_macro_input!(attr as Path); let mut func = parse_macro_input!(item as ItemFn); let check = syn::parse2(quote! { - if !self.flags.has_enabled(#api_op) { + if !self.namespaces.is_enabled(&#api_namespace) { // As macro processing happens after async_trait processing its wrapped with async_trait return type - return std::boxed::Box::pin(std::future::ready(Err(RpcError::UnauthorizedMethod))); + return std::boxed::Box::pin(std::future::ready(Err(RpcError::UnauthorizedMethod(#api_namespace.to_string())))); } }) .unwrap(); diff --git a/rpc/macros/src/lib.rs b/rpc/macros/src/lib.rs index dbbfe37b88..c5c3ac95ff 100644 --- a/rpc/macros/src/lib.rs +++ b/rpc/macros/src/lib.rs @@ -48,6 +48,6 @@ pub fn test_wrpc_serializer(input: TokenStream) -> TokenStream { } #[proc_macro_attribute] -pub fn auth(attr: TokenStream, item: TokenStream) -> TokenStream { - core::service::auth(attr, item) +pub fn namespace(attr: TokenStream, item: TokenStream) -> TokenStream { + core::service::namespace(attr, item) } diff --git a/rpc/service/Cargo.toml b/rpc/service/Cargo.toml index ce68439a2a..d57e7cae8c 100644 --- a/rpc/service/Cargo.toml +++ b/rpc/service/Cargo.toml @@ -34,4 +34,6 @@ async-trait.workspace = true log.workspace = true tokio.workspace = true triggered.workspace = true -workflow-rpc.workspace = true \ No newline at end of file +workflow-rpc.workspace = true +thiserror.workspace = true +serde.workspace = true \ No newline at end of file diff --git a/rpc/service/src/flags.rs b/rpc/service/src/flags.rs deleted file mode 100644 index 6d44dd0ff3..0000000000 --- a/rpc/service/src/flags.rs +++ /dev/null @@ -1,44 +0,0 @@ -use kaspa_rpc_core::api::ops::RpcApiOps; - -// Struct to manage flags as a combined bitmask -#[derive(Debug)] -pub struct Flags { - bitmask: u128, -} - -impl Flags { - // Create an empty flag set - pub fn new() -> Self { - Flags { bitmask: 0 } - } - - // Adds a flag - pub fn add(&mut self, op: RpcApiOps) { - self.bitmask |= op.bitmask(); - } - - // Removes a flag - pub fn remove(&mut self, op: RpcApiOps) { - self.bitmask &= !op.bitmask(); - } - - // Check if a flag is enabled - pub fn has_enabled(&self, op: RpcApiOps) -> bool { - (self.bitmask & op.bitmask()) != 0 - } - - // Create a flag set from a slice of operations - pub fn from_ops(ops: &[RpcApiOps]) -> Self { - let mut permissions = Flags::new(); - for &op in ops { - permissions.add(op); - } - permissions - } -} - -impl From for Flags { - fn from(bitmask: u128) -> Self { - Flags { bitmask } - } -} diff --git a/rpc/service/src/lib.rs b/rpc/service/src/lib.rs index 54beb17665..742eb23f85 100644 --- a/rpc/service/src/lib.rs +++ b/rpc/service/src/lib.rs @@ -1,4 +1,4 @@ pub mod collector; pub mod converter; -pub mod flags; +pub mod namespace; pub mod service; diff --git a/rpc/service/src/namespace.rs b/rpc/service/src/namespace.rs new file mode 100644 index 0000000000..0f86996710 --- /dev/null +++ b/rpc/service/src/namespace.rs @@ -0,0 +1,84 @@ +use serde::Deserialize; +use std::collections::HashSet; +use std::str::FromStr; +use thiserror::Error; + +/// Enum representing available namespace groups +#[derive(Debug, Hash, Eq, PartialEq, Clone, Deserialize)] +pub enum Namespace { + General, + Networking, + DAG, + Mining, + Wallet, + Metrics, + Mempool, +} + +#[derive(Debug, Error)] +pub enum NamespaceError { + #[error("Invalid namespace value: {0}")] + InvalidValue(String), +} + +impl FromStr for Namespace { + type Err = NamespaceError; + + fn from_str(s: &str) -> Result { + match s { + "General" => Ok(Namespace::General), + "Networking" => Ok(Namespace::Networking), + "DAG" => Ok(Namespace::DAG), + "Mining" => Ok(Namespace::Mining), + "Wallet" => Ok(Namespace::Wallet), + "Metrics" => Ok(Namespace::Metrics), + "Mempool" => Ok(Namespace::Mempool), + _ => Err(NamespaceError::InvalidValue(s.to_string())), + } + } +} + +impl std::fmt::Display for Namespace { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + match self { + Namespace::General => write!(f, "General"), + Namespace::Networking => write!(f, "Networking"), + Namespace::DAG => write!(f, "DAG"), + Namespace::Mining => write!(f, "Mining"), + Namespace::Wallet => write!(f, "Wallet"), + Namespace::Metrics => write!(f, "Metrics"), + Namespace::Mempool => write!(f, "Mempool"), + } + } +} + +#[derive(Debug, Clone, Deserialize)] +pub struct Namespaces { + enabled: HashSet, +} + +impl Namespaces { + /// Check if a namespace is enabled + pub fn is_enabled(&self, namespace: &Namespace) -> bool { + self.enabled.contains(namespace) + } +} + +impl FromStr for Namespaces { + type Err = NamespaceError; + + fn from_str(s: &str) -> Result { + let enabled = s + .split(',') + .map(str::trim) // To support case like "DAG, Metrics" + .map(|name| name.parse::()) + .collect::, _>>()?; + Ok(Namespaces { enabled }) + } +} + +impl Default for Namespaces { + fn default() -> Self { + Self { enabled: HashSet::from([Namespace::General, Namespace::DAG, Namespace::Wallet]) } + } +} diff --git a/rpc/service/src/service.rs b/rpc/service/src/service.rs index ffbc93cc9b..35045cc8af 100644 --- a/rpc/service/src/service.rs +++ b/rpc/service/src/service.rs @@ -3,7 +3,7 @@ use super::collector::{CollectorFromConsensus, CollectorFromIndex}; use crate::converter::feerate_estimate::{FeeEstimateConverter, FeeEstimateVerboseConverter}; use crate::converter::{consensus::ConsensusConverter, index::IndexConverter, protocol::ProtocolConverter}; -use crate::flags::Flags; +use crate::namespace::{Namespace, Namespaces}; use crate::service::NetworkType::{Mainnet, Testnet}; use async_trait::async_trait; use kaspa_consensus_core::api::counters::ProcessingCounters; @@ -54,7 +54,6 @@ use kaspa_notify::{ use kaspa_p2p_flows::flow_context::FlowContext; use kaspa_p2p_lib::common::ProtocolError; use kaspa_perf_monitor::{counters::CountersSnapshot, Monitor as PerfMonitor}; -use kaspa_rpc_core::api::ops::RpcApiOps; use kaspa_rpc_core::{ api::{ connection::DynRpcConnection, @@ -65,7 +64,7 @@ use kaspa_rpc_core::{ notify::connection::ChannelConnection, Notification, RpcError, RpcResult, }; -use kaspa_rpc_macros::auth; +use kaspa_rpc_macros::namespace; use kaspa_txscript::{extract_script_pub_key_address, pay_to_address_script}; use kaspa_utils::expiring_cache::ExpiringCache; use kaspa_utils::sysinfo::SystemInfo; @@ -121,7 +120,7 @@ pub struct RpcCoreService { system_info: SystemInfo, fee_estimate_cache: ExpiringCache, fee_estimate_verbose_cache: ExpiringCache>, - flags: Flags, + namespaces: Namespaces, } const RPC_CORE: &str = "rpc-core"; @@ -147,6 +146,7 @@ impl RpcCoreService { p2p_tower_counters: Arc, grpc_tower_counters: Arc, system_info: SystemInfo, + namespaces: Option, ) -> Self { // This notifier UTXOs subscription granularity to index-processor or consensus notifier let policies = match index_notifier { @@ -203,8 +203,6 @@ impl RpcCoreService { let notifier = Arc::new(Notifier::new(RPC_CORE, EVENT_TYPE_ARRAY[..].into(), collectors, subscribers, subscription_context, 1, policies)); - let flags: Flags = config.rpc_flags.into(); - Self { consensus_manager, notifier, @@ -227,7 +225,7 @@ impl RpcCoreService { system_info, fee_estimate_cache: ExpiringCache::new(Duration::from_millis(500), Duration::from_millis(1000)), fee_estimate_verbose_cache: ExpiringCache::new(Duration::from_millis(500), Duration::from_millis(1000)), - flags, + namespaces: namespaces.unwrap_or_default(), } } @@ -295,7 +293,7 @@ impl RpcCoreService { #[async_trait] impl RpcApi for RpcCoreService { - #[auth(RpcApiOps::SubmitBlock)] + #[namespace(Namespace::Mining)] async fn submit_block_call( &self, _connection: Option<&DynRpcConnection>, @@ -358,7 +356,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and } } - #[auth(RpcApiOps::GetBlockTemplate)] + #[namespace(Namespace::Mining)] async fn get_block_template_call( &self, _connection: Option<&DynRpcConnection>, @@ -395,7 +393,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } - #[auth(RpcApiOps::GetCurrentBlockColor)] + #[namespace(Namespace::Mining)] async fn get_current_block_color_call( &self, _connection: Option<&DynRpcConnection>, @@ -409,7 +407,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and } } - #[auth(RpcApiOps::GetBlock)] + #[namespace(Namespace::DAG)] async fn get_block_call(&self, _connection: Option<&DynRpcConnection>, request: GetBlockRequest) -> RpcResult { // TODO: test let session = self.consensus_manager.consensus().session().await; @@ -422,7 +420,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } - #[auth(RpcApiOps::GetBlocks)] + #[namespace(Namespace::DAG)] async fn get_blocks_call( &self, _connection: Option<&DynRpcConnection>, @@ -476,7 +474,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetBlocksResponse { block_hashes, blocks }) } - #[auth(RpcApiOps::GetInfo)] + #[namespace(Namespace::General)] async fn get_info_call(&self, _connection: Option<&DynRpcConnection>, _request: GetInfoRequest) -> RpcResult { let is_nearly_synced = self.consensus_manager.consensus().unguarded_session().async_is_nearly_synced().await; Ok(GetInfoResponse { @@ -490,7 +488,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } - #[auth(RpcApiOps::GetMempoolEntry)] + #[namespace(Namespace::Mempool)] async fn get_mempool_entry_call( &self, _connection: Option<&DynRpcConnection>, @@ -504,7 +502,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetMempoolEntryResponse::new(self.consensus_converter.get_mempool_entry(&session, &transaction))) } - #[auth(RpcApiOps::GetMempoolEntries)] + #[namespace(Namespace::Mempool)] async fn get_mempool_entries_call( &self, _connection: Option<&DynRpcConnection>, @@ -521,7 +519,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetMempoolEntriesResponse::new(mempool_entries)) } - #[auth(RpcApiOps::GetMempoolEntriesByAddresses)] + #[namespace(Namespace::Mempool)] async fn get_mempool_entries_by_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -548,7 +546,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetMempoolEntriesByAddressesResponse::new(mempool_entries)) } - #[auth(RpcApiOps::SubmitTransaction)] + #[namespace(Namespace::Wallet)] async fn submit_transaction_call( &self, _connection: Option<&DynRpcConnection>, @@ -574,7 +572,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(SubmitTransactionResponse::new(transaction_id)) } - #[auth(RpcApiOps::SubmitTransactionReplacement)] + #[namespace(Namespace::Wallet)] async fn submit_transaction_replacement_call( &self, _connection: Option<&DynRpcConnection>, @@ -592,7 +590,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(SubmitTransactionReplacementResponse::new(transaction_id, (&*replaced_transaction).into())) } - #[auth(RpcApiOps::GetCurrentNetwork)] + #[namespace(Namespace::General)] async fn get_current_network_call( &self, _connection: Option<&DynRpcConnection>, @@ -601,7 +599,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetCurrentNetworkResponse::new(*self.config.net)) } - #[auth(RpcApiOps::GetSubnetwork)] + #[namespace(Namespace::Networking)] async fn get_subnetwork_call( &self, _connection: Option<&DynRpcConnection>, @@ -610,12 +608,12 @@ NOTE: This error usually indicates an RPC conversion error between the node and Err(RpcError::NotImplemented) } - #[auth(RpcApiOps::GetSink)] + #[namespace(Namespace::DAG)] async fn get_sink_call(&self, _connection: Option<&DynRpcConnection>, _: GetSinkRequest) -> RpcResult { Ok(GetSinkResponse::new(self.consensus_manager.consensus().unguarded_session().async_get_sink().await)) } - #[auth(RpcApiOps::GetSinkBlueScore)] + #[namespace(Namespace::DAG)] async fn get_sink_blue_score_call( &self, _connection: Option<&DynRpcConnection>, @@ -625,7 +623,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetSinkBlueScoreResponse::new(session.async_get_ghostdag_data(session.async_get_sink().await).await?.blue_score)) } - #[auth(RpcApiOps::GetVirtualChainFromBlock)] + #[namespace(Namespace::DAG)] async fn get_virtual_chain_from_block_call( &self, _connection: Option<&DynRpcConnection>, @@ -654,7 +652,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetVirtualChainFromBlockResponse::new(virtual_chain_batch.removed, virtual_chain_batch.added, accepted_transaction_ids)) } - #[auth(RpcApiOps::GetBlockCount)] + #[namespace(Namespace::DAG)] async fn get_block_count_call( &self, _connection: Option<&DynRpcConnection>, @@ -663,7 +661,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(self.consensus_manager.consensus().unguarded_session().async_estimate_block_count().await) } - #[auth(RpcApiOps::GetUtxosByAddresses)] + #[namespace(Namespace::Wallet)] async fn get_utxos_by_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -678,7 +676,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetUtxosByAddressesResponse::new(self.index_converter.get_utxos_by_addresses_entries(&entry_map))) } - #[auth(RpcApiOps::GetBalanceByAddress)] + #[namespace(Namespace::Wallet)] async fn get_balance_by_address_call( &self, _connection: Option<&DynRpcConnection>, @@ -692,7 +690,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetBalanceByAddressResponse::new(balance)) } - #[auth(RpcApiOps::GetBalancesByAddresses)] + #[namespace(Namespace::Wallet)] async fn get_balances_by_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -714,7 +712,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetBalancesByAddressesResponse::new(entries)) } - #[auth(RpcApiOps::GetCoinSupply)] + #[namespace(Namespace::DAG)] async fn get_coin_supply_call( &self, _connection: Option<&DynRpcConnection>, @@ -728,7 +726,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetCoinSupplyResponse::new(MAX_SOMPI, circulating_sompi)) } - #[auth(RpcApiOps::GetDaaScoreTimestampEstimate)] + #[namespace(Namespace::Wallet)] // TODO: think again async fn get_daa_score_timestamp_estimate_call( &self, _connection: Option<&DynRpcConnection>, @@ -788,7 +786,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetDaaScoreTimestampEstimateResponse::new(timestamps)) } - #[auth(RpcApiOps::GetFeeEstimate)] + #[namespace(Namespace::Wallet)] async fn get_fee_estimate_call( &self, _connection: Option<&DynRpcConnection>, @@ -800,7 +798,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetFeeEstimateResponse { estimate }) } - #[auth(RpcApiOps::GetFeeEstimateExperimental)] + #[namespace(Namespace::Wallet)] async fn get_fee_estimate_experimental_call( &self, connection: Option<&DynRpcConnection>, @@ -825,12 +823,12 @@ NOTE: This error usually indicates an RPC conversion error between the node and } } - #[auth(RpcApiOps::Ping)] + #[namespace(Namespace::General)] async fn ping_call(&self, _connection: Option<&DynRpcConnection>, _: PingRequest) -> RpcResult { Ok(PingResponse {}) } - #[auth(RpcApiOps::GetHeaders)] + #[namespace(Namespace::DAG)] async fn get_headers_call( &self, _connection: Option<&DynRpcConnection>, @@ -839,7 +837,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Err(RpcError::NotImplemented) } - #[auth(RpcApiOps::GetBlockDagInfo)] + #[namespace(Namespace::DAG)] async fn get_block_dag_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -862,7 +860,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and )) } - #[auth(RpcApiOps::EstimateNetworkHashesPerSecond)] + #[namespace(Namespace::DAG)] async fn estimate_network_hashes_per_second_call( &self, _connection: Option<&DynRpcConnection>, @@ -895,7 +893,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and )) } - #[auth(RpcApiOps::AddPeer)] + #[namespace(Namespace::Networking)] async fn add_peer_call(&self, _connection: Option<&DynRpcConnection>, request: AddPeerRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("AddPeer RPC command called while node in safe RPC mode -- ignoring."); @@ -910,7 +908,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(AddPeerResponse {}) } - #[auth(RpcApiOps::GetPeerAddresses)] + #[namespace(Namespace::Networking)] async fn get_peer_addresses_call( &self, _connection: Option<&DynRpcConnection>, @@ -920,7 +918,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetPeerAddressesResponse::new(address_manager.get_all_addresses(), address_manager.get_all_banned_addresses())) } - #[auth(RpcApiOps::Ban)] + #[namespace(Namespace::Networking)] async fn ban_call(&self, _connection: Option<&DynRpcConnection>, request: BanRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("Ban RPC command called while node in safe RPC mode -- ignoring."); @@ -938,7 +936,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(BanResponse {}) } - #[auth(RpcApiOps::Unban)] + #[namespace(Namespace::Networking)] async fn unban_call(&self, _connection: Option<&DynRpcConnection>, request: UnbanRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("Unban RPC command called while node in safe RPC mode -- ignoring."); @@ -953,7 +951,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(UnbanResponse {}) } - #[auth(RpcApiOps::GetConnectedPeerInfo)] + #[namespace(Namespace::Networking)] async fn get_connected_peer_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -964,7 +962,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetConnectedPeerInfoResponse::new(peer_info)) } - #[auth(RpcApiOps::Shutdown)] + #[namespace(Namespace::General)] async fn shutdown_call(&self, _connection: Option<&DynRpcConnection>, _: ShutdownRequest) -> RpcResult { if !self.config.unsafe_rpc { warn!("Shutdown RPC command called while node in safe RPC mode -- ignoring."); @@ -986,7 +984,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(ShutdownResponse {}) } - #[auth(RpcApiOps::ResolveFinalityConflict)] + #[namespace(Namespace::DAG)] async fn resolve_finality_conflict_call( &self, _connection: Option<&DynRpcConnection>, @@ -999,7 +997,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Err(RpcError::NotImplemented) } - #[auth(RpcApiOps::GetConnections)] + #[namespace(Namespace::Networking)] async fn get_connections_call( &self, _connection: Option<&DynRpcConnection>, @@ -1018,7 +1016,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(GetConnectionsResponse { clients, peers, profile_data }) } - #[auth(RpcApiOps::GetMetrics)] + #[namespace(Namespace::Metrics)] async fn get_metrics_call(&self, _connection: Option<&DynRpcConnection>, req: GetMetricsRequest) -> RpcResult { let CountersSnapshot { resident_set_size, @@ -1112,7 +1110,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(response) } - #[auth(RpcApiOps::GetSystemInfo)] + #[namespace(Namespace::Metrics)] async fn get_system_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -1131,7 +1129,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and Ok(response) } - #[auth(RpcApiOps::GetServerInfo)] + #[namespace(Namespace::General)] async fn get_server_info_call( &self, _connection: Option<&DynRpcConnection>, @@ -1152,7 +1150,7 @@ NOTE: This error usually indicates an RPC conversion error between the node and }) } - #[auth(RpcApiOps::GetSyncStatus)] + #[namespace(Namespace::DAG)] async fn get_sync_status_call( &self, _connection: Option<&DynRpcConnection>, From 5375fef0f24a2ed54f30b6b29f30a695a03cf849 Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Tue, 10 Dec 2024 20:44:57 +0300 Subject: [PATCH 03/12] Enable all namespaces by default --- rpc/service/src/namespace.rs | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/rpc/service/src/namespace.rs b/rpc/service/src/namespace.rs index 0f86996710..5ca689e41a 100644 --- a/rpc/service/src/namespace.rs +++ b/rpc/service/src/namespace.rs @@ -79,6 +79,16 @@ impl FromStr for Namespaces { impl Default for Namespaces { fn default() -> Self { - Self { enabled: HashSet::from([Namespace::General, Namespace::DAG, Namespace::Wallet]) } + Self { + enabled: HashSet::from([ + Namespace::General, + Namespace::Networking, + Namespace::DAG, + Namespace::Mining, + Namespace::Wallet, + Namespace::Metrics, + Namespace::Mempool, + ]), + } } } From 09062862c127d6f9e2e8f431de73974486be1f4c Mon Sep 17 00:00:00 2001 From: KaffinPX <73744616+KaffinPX@users.noreply.github.com> Date: Tue, 10 Dec 2024 20:58:21 +0300 Subject: [PATCH 04/12] Fix a rename of arg --- kaspad/src/args.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kaspad/src/args.rs b/kaspad/src/args.rs index a988f1dffb..7716589fc9 100644 --- a/kaspad/src/args.rs +++ b/kaspad/src/args.rs @@ -91,7 +91,7 @@ pub struct Args { #[serde(rename = "nogrpc")] pub disable_grpc: bool, pub ram_scale: f64, - #[serde(rename = "rpcapi")] + #[serde(rename = "rpc-api")] pub rpc_namespaces: Option, } From e23b1b8452a0d478eb1885eaa9144dd9cd4d1810 Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Tue, 10 Dec 2024 23:21:37 +0300 Subject: [PATCH 05/12] Update Extending RpcApi.md to include namespace part --- rpc/core/src/api/Extending RpcApi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rpc/core/src/api/Extending RpcApi.md b/rpc/core/src/api/Extending RpcApi.md index 0940d78227..892eee77b9 100644 --- a/rpc/core/src/api/Extending RpcApi.md +++ b/rpc/core/src/api/Extending RpcApi.md @@ -23,7 +23,7 @@ As an illustration, let's pretend that we add a new `submit_block` method. Implement the first as a call to the second. (ie. `async fn submit_block(&self, block: RpcBlock, allow_non_daa_blocks: bool) -> RpcResult` and `async fn submit_block_call(&self, request: SubmitBlockRequest) -> RpcResult;`) -6. Implement the function having a `_call` suffix into `kaspa_rpc_core::server::service::RpcCoreService`. +6. Implement the function having a `_call` suffix into `kaspa_rpc_core::server::service::RpcCoreService` and wrap it with namespace macro with its corresponding category. ## rpc-grpc From fc92be6c7bcd6823a9c5e1e4f68b362505dd536c Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Thu, 12 Dec 2024 01:00:39 +0300 Subject: [PATCH 06/12] Add ``namespaces`` field to getInfo call --- rpc/core/src/api/mod.rs | 1 + .../src/namespace.rs => core/src/api/namespaces.rs} | 8 ++++++++ rpc/core/src/model/message.rs | 5 ++++- rpc/core/src/model/tests.rs | 3 ++- rpc/core/src/wasm/message.rs | 1 + rpc/grpc/core/proto/rpc.proto | 1 + rpc/grpc/core/src/convert/message.rs | 2 ++ rpc/grpc/server/src/tests/rpc_core_mock.rs | 2 ++ rpc/service/src/lib.rs | 1 - rpc/service/src/service.rs | 3 ++- wallet/core/src/tests/rpc_core_mock.rs | 3 ++- 11 files changed, 25 insertions(+), 5 deletions(-) rename rpc/{service/src/namespace.rs => core/src/api/namespaces.rs} (91%) diff --git a/rpc/core/src/api/mod.rs b/rpc/core/src/api/mod.rs index a75056a841..90c81d62b4 100644 --- a/rpc/core/src/api/mod.rs +++ b/rpc/core/src/api/mod.rs @@ -7,3 +7,4 @@ pub mod ctl; pub mod notifications; pub mod ops; pub mod rpc; +pub mod namespaces; \ No newline at end of file diff --git a/rpc/service/src/namespace.rs b/rpc/core/src/api/namespaces.rs similarity index 91% rename from rpc/service/src/namespace.rs rename to rpc/core/src/api/namespaces.rs index 5ca689e41a..00818751bb 100644 --- a/rpc/service/src/namespace.rs +++ b/rpc/core/src/api/namespaces.rs @@ -62,6 +62,14 @@ impl Namespaces { pub fn is_enabled(&self, namespace: &Namespace) -> bool { self.enabled.contains(namespace) } + + /// Return enabled namespaces as string for get_info + pub fn enabled_namespaces(&self) -> Vec { + self.enabled + .iter() + .map(|namespace| namespace.to_string()) + .collect::>() + } } impl FromStr for Namespaces { diff --git a/rpc/core/src/model/message.rs b/rpc/core/src/model/message.rs index ba8d6abf76..553e14f70b 100644 --- a/rpc/core/src/model/message.rs +++ b/rpc/core/src/model/message.rs @@ -269,6 +269,7 @@ pub struct GetInfoResponse { pub server_version: String, pub is_utxo_indexed: bool, pub is_synced: bool, + pub namespaces: Vec, pub has_notify_command: bool, pub has_message_id: bool, } @@ -281,6 +282,7 @@ impl Serializer for GetInfoResponse { store!(String, &self.server_version, writer)?; store!(bool, &self.is_utxo_indexed, writer)?; store!(bool, &self.is_synced, writer)?; + store!(Vec, &self.namespaces, writer)?; store!(bool, &self.has_notify_command, writer)?; store!(bool, &self.has_message_id, writer)?; @@ -296,10 +298,11 @@ impl Deserializer for GetInfoResponse { let server_version = load!(String, reader)?; let is_utxo_indexed = load!(bool, reader)?; let is_synced = load!(bool, reader)?; + let namespaces = load!(Vec, reader)?; let has_notify_command = load!(bool, reader)?; let has_message_id = load!(bool, reader)?; - Ok(Self { p2p_id, mempool_size, server_version, is_utxo_indexed, is_synced, has_notify_command, has_message_id }) + Ok(Self { p2p_id, mempool_size, server_version, is_utxo_indexed, is_synced, namespaces, has_notify_command, has_message_id }) } } diff --git a/rpc/core/src/model/tests.rs b/rpc/core/src/model/tests.rs index d931f5ac23..5ca5bb559c 100644 --- a/rpc/core/src/model/tests.rs +++ b/rpc/core/src/model/tests.rs @@ -1,7 +1,7 @@ #[cfg(test)] mod mockery { - use crate::{model::*, RpcScriptClass}; + use crate::{model::*, RpcScriptClass, api::namespaces::{Namespaces}}; use kaspa_addresses::{Prefix, Version}; use kaspa_consensus_core::api::BlockCount; use kaspa_consensus_core::network::NetworkType; @@ -486,6 +486,7 @@ mod mockery { server_version: "0.4.2".to_string(), is_utxo_indexed: true, is_synced: false, + namespaces: Namespaces::default().enabled_namespaces(), has_notify_command: true, has_message_id: false, } diff --git a/rpc/core/src/wasm/message.rs b/rpc/core/src/wasm/message.rs index 85c0857023..01bf83dcf4 100644 --- a/rpc/core/src/wasm/message.rs +++ b/rpc/core/src/wasm/message.rs @@ -243,6 +243,7 @@ declare! { serverVersion : string; isUtxoIndexed : boolean; isSynced : boolean; + namespaces : string[]; /** GRPC ONLY */ hasNotifyCommand : boolean; /** GRPC ONLY */ diff --git a/rpc/grpc/core/proto/rpc.proto b/rpc/grpc/core/proto/rpc.proto index e218681b65..d7716ee7ec 100644 --- a/rpc/grpc/core/proto/rpc.proto +++ b/rpc/grpc/core/proto/rpc.proto @@ -702,6 +702,7 @@ message GetInfoResponseMessage{ string serverVersion = 3; bool isUtxoIndexed = 4; bool isSynced = 5; + repeated string namespaces = 6; bool hasNotifyCommand = 11; bool hasMessageId = 12; RPCError error = 1000; diff --git a/rpc/grpc/core/src/convert/message.rs b/rpc/grpc/core/src/convert/message.rs index 67ac60650c..a7b0852d47 100644 --- a/rpc/grpc/core/src/convert/message.rs +++ b/rpc/grpc/core/src/convert/message.rs @@ -182,6 +182,7 @@ from!(item: RpcResult<&kaspa_rpc_core::GetInfoResponse>, protowire::GetInfoRespo server_version: item.server_version.clone(), is_utxo_indexed: item.is_utxo_indexed, is_synced: item.is_synced, + namespaces: item.namespaces.clone(), has_notify_command: item.has_notify_command, has_message_id: item.has_message_id, error: None, @@ -637,6 +638,7 @@ try_from!(item: &protowire::GetInfoResponseMessage, RpcResult Date: Thu, 12 Dec 2024 01:03:08 +0300 Subject: [PATCH 07/12] Formatting issues etc. --- kaspad/src/args.rs | 2 +- rpc/core/src/api/mod.rs | 2 +- rpc/core/src/api/namespaces.rs | 5 +---- rpc/core/src/model/tests.rs | 2 +- rpc/service/src/service.rs | 2 +- wallet/core/src/tests/rpc_core_mock.rs | 4 ++-- 6 files changed, 7 insertions(+), 10 deletions(-) diff --git a/kaspad/src/args.rs b/kaspad/src/args.rs index 7716589fc9..4c21335be0 100644 --- a/kaspad/src/args.rs +++ b/kaspad/src/args.rs @@ -5,7 +5,7 @@ use kaspa_consensus_core::{ }; use kaspa_core::kaspad_env::version; use kaspa_notify::address::tracker::Tracker; -use kaspa_rpc_service::namespace::Namespaces; +use kaspa_rpc_core::api::namespaces::Namespaces; use kaspa_utils::networking::ContextualNetAddress; use kaspa_wrpc_server::address::WrpcNetAddress; use serde::Deserialize; diff --git a/rpc/core/src/api/mod.rs b/rpc/core/src/api/mod.rs index 90c81d62b4..68a2f1145b 100644 --- a/rpc/core/src/api/mod.rs +++ b/rpc/core/src/api/mod.rs @@ -4,7 +4,7 @@ pub mod connection; pub mod ctl; +pub mod namespaces; pub mod notifications; pub mod ops; pub mod rpc; -pub mod namespaces; \ No newline at end of file diff --git a/rpc/core/src/api/namespaces.rs b/rpc/core/src/api/namespaces.rs index 00818751bb..43af01dac5 100644 --- a/rpc/core/src/api/namespaces.rs +++ b/rpc/core/src/api/namespaces.rs @@ -65,10 +65,7 @@ impl Namespaces { /// Return enabled namespaces as string for get_info pub fn enabled_namespaces(&self) -> Vec { - self.enabled - .iter() - .map(|namespace| namespace.to_string()) - .collect::>() + self.enabled.iter().map(|namespace| namespace.to_string()).collect::>() } } diff --git a/rpc/core/src/model/tests.rs b/rpc/core/src/model/tests.rs index 5ca5bb559c..17d40c8318 100644 --- a/rpc/core/src/model/tests.rs +++ b/rpc/core/src/model/tests.rs @@ -1,7 +1,7 @@ #[cfg(test)] mod mockery { - use crate::{model::*, RpcScriptClass, api::namespaces::{Namespaces}}; + use crate::{api::namespaces::Namespaces, model::*, RpcScriptClass}; use kaspa_addresses::{Prefix, Version}; use kaspa_consensus_core::api::BlockCount; use kaspa_consensus_core::network::NetworkType; diff --git a/rpc/service/src/service.rs b/rpc/service/src/service.rs index 8e02af4abb..6a29a1225e 100644 --- a/rpc/service/src/service.rs +++ b/rpc/service/src/service.rs @@ -56,9 +56,9 @@ use kaspa_perf_monitor::{counters::CountersSnapshot, Monitor as PerfMonitor}; use kaspa_rpc_core::{ api::{ connection::DynRpcConnection, + namespaces::{Namespace, Namespaces}, ops::{RPC_API_REVISION, RPC_API_VERSION}, rpc::{RpcApi, MAX_SAFE_WINDOW_SIZE}, - namespaces::{Namespace, Namespaces} }, model::*, notify::connection::ChannelConnection, diff --git a/wallet/core/src/tests/rpc_core_mock.rs b/wallet/core/src/tests/rpc_core_mock.rs index f5dff163d2..13a4c71e5a 100644 --- a/wallet/core/src/tests/rpc_core_mock.rs +++ b/wallet/core/src/tests/rpc_core_mock.rs @@ -9,7 +9,7 @@ use kaspa_notify::scope::Scope; use kaspa_notify::subscription::context::SubscriptionContext; use kaspa_notify::subscription::{MutationPolicies, UtxosChangedMutationPolicy}; use kaspa_rpc_core::api::ctl::RpcCtl; -use kaspa_rpc_core::{api::connection::DynRpcConnection, api::rpc::RpcApi, api::namespaces::Namespaces, *}; +use kaspa_rpc_core::{api::connection::DynRpcConnection, api::namespaces::Namespaces, api::rpc::RpcApi, *}; use kaspa_rpc_core::{notify::connection::ChannelConnection, RpcResult}; use std::sync::Arc; @@ -92,7 +92,7 @@ impl RpcApi for RpcCoreMock { is_synced: false, has_notify_command: false, has_message_id: false, - namespaces: Namespaces::default().enabled_namespaces() + namespaces: Namespaces::default().enabled_namespaces(), }) } From e51a809f15b43803808709cbb4a12d37f1af3585 Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Thu, 12 Dec 2024 01:25:26 +0300 Subject: [PATCH 08/12] A simple test --- testing/integration/src/rpc_tests.rs | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/testing/integration/src/rpc_tests.rs b/testing/integration/src/rpc_tests.rs index 3c4df601b3..a341f66896 100644 --- a/testing/integration/src/rpc_tests.rs +++ b/testing/integration/src/rpc_tests.rs @@ -15,7 +15,7 @@ use kaspa_notify::{ SinkBlueScoreChangedScope, UtxosChangedScope, VirtualChainChangedScope, VirtualDaaScoreChangedScope, }, }; -use kaspa_rpc_core::{api::rpc::RpcApi, model::*, Notification}; +use kaspa_rpc_core::{api::{namespaces::Namespaces, rpc::RpcApi}, model::*, Notification}; use kaspa_utils::{fd_budget, networking::ContextualNetAddress}; use kaspad_lib::args::Args; use tokio::task::JoinHandle; @@ -231,6 +231,7 @@ async fn sanity_test() { assert!(response.is_utxo_indexed); assert!(response.has_message_id); assert!(response.has_notify_command); + assert_eq!(response.namespaces, Namespaces::default().enabled_namespaces()); }) } From e4dbbfe22d2dfd185695c029a5e4da276226a99b Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Thu, 12 Dec 2024 03:08:53 +0300 Subject: [PATCH 09/12] Better Namespaces testing --- testing/integration/src/rpc_tests.rs | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/testing/integration/src/rpc_tests.rs b/testing/integration/src/rpc_tests.rs index a341f66896..f73ded6120 100644 --- a/testing/integration/src/rpc_tests.rs +++ b/testing/integration/src/rpc_tests.rs @@ -15,7 +15,7 @@ use kaspa_notify::{ SinkBlueScoreChangedScope, UtxosChangedScope, VirtualChainChangedScope, VirtualDaaScoreChangedScope, }, }; -use kaspa_rpc_core::{api::{namespaces::Namespaces, rpc::RpcApi}, model::*, Notification}; +use kaspa_rpc_core::{api::{namespaces::{Namespace, Namespaces}, rpc::RpcApi}, model::*, Notification}; use kaspa_utils::{fd_budget, networking::ContextualNetAddress}; use kaspad_lib::args::Args; use tokio::task::JoinHandle; @@ -231,7 +231,7 @@ async fn sanity_test() { assert!(response.is_utxo_indexed); assert!(response.has_message_id); assert!(response.has_notify_command); - assert_eq!(response.namespaces, Namespaces::default().enabled_namespaces()); + assert!(Namespaces::from_str(&response.namespaces.join(",")).unwrap().is_enabled(&Namespace::General)) }) } From 5cf2a140a0cf70d7886594d8dfeea1cde5fab4a6 Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Thu, 12 Dec 2024 03:10:26 +0300 Subject: [PATCH 10/12] Keep compatibility w old serializer & deserializer --- rpc/core/src/model/message.rs | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/rpc/core/src/model/message.rs b/rpc/core/src/model/message.rs index 553e14f70b..8960e7a388 100644 --- a/rpc/core/src/model/message.rs +++ b/rpc/core/src/model/message.rs @@ -282,9 +282,9 @@ impl Serializer for GetInfoResponse { store!(String, &self.server_version, writer)?; store!(bool, &self.is_utxo_indexed, writer)?; store!(bool, &self.is_synced, writer)?; - store!(Vec, &self.namespaces, writer)?; store!(bool, &self.has_notify_command, writer)?; store!(bool, &self.has_message_id, writer)?; + store!(Vec, &self.namespaces, writer)?; Ok(()) } @@ -298,9 +298,9 @@ impl Deserializer for GetInfoResponse { let server_version = load!(String, reader)?; let is_utxo_indexed = load!(bool, reader)?; let is_synced = load!(bool, reader)?; - let namespaces = load!(Vec, reader)?; let has_notify_command = load!(bool, reader)?; let has_message_id = load!(bool, reader)?; + let namespaces = load!(Vec, reader)?; Ok(Self { p2p_id, mempool_size, server_version, is_utxo_indexed, is_synced, namespaces, has_notify_command, has_message_id }) } From eb2219559634d19a67d4cce21240add18a014922 Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Thu, 12 Dec 2024 03:12:28 +0300 Subject: [PATCH 11/12] A simple formatting --- testing/integration/src/rpc_tests.rs | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/testing/integration/src/rpc_tests.rs b/testing/integration/src/rpc_tests.rs index f73ded6120..a1372c7a74 100644 --- a/testing/integration/src/rpc_tests.rs +++ b/testing/integration/src/rpc_tests.rs @@ -15,7 +15,14 @@ use kaspa_notify::{ SinkBlueScoreChangedScope, UtxosChangedScope, VirtualChainChangedScope, VirtualDaaScoreChangedScope, }, }; -use kaspa_rpc_core::{api::{namespaces::{Namespace, Namespaces}, rpc::RpcApi}, model::*, Notification}; +use kaspa_rpc_core::{ + api::{ + namespaces::{Namespace, Namespaces}, + rpc::RpcApi, + }, + model::*, + Notification, +}; use kaspa_utils::{fd_budget, networking::ContextualNetAddress}; use kaspad_lib::args::Args; use tokio::task::JoinHandle; From 5f26cde6661193b17337b203d667b5183ddee2ed Mon Sep 17 00:00:00 2001 From: KaffinPX Date: Sun, 15 Dec 2024 04:13:40 +0300 Subject: [PATCH 12/12] Cover subscriptions --- rpc/core/src/api/namespaces.rs | 16 ++++++++++++++++ rpc/service/src/service.rs | 5 +++++ 2 files changed, 21 insertions(+) diff --git a/rpc/core/src/api/namespaces.rs b/rpc/core/src/api/namespaces.rs index 43af01dac5..33e240f6b3 100644 --- a/rpc/core/src/api/namespaces.rs +++ b/rpc/core/src/api/namespaces.rs @@ -1,3 +1,4 @@ +use kaspa_notify::scope::Scope; use serde::Deserialize; use std::collections::HashSet; use std::str::FromStr; @@ -63,6 +64,21 @@ impl Namespaces { self.enabled.contains(namespace) } + // Determine the namespace associated with a given subscription scope + pub fn get_scope_namespace(&self, scope: &Scope) -> Namespace { + match scope { + Scope::BlockAdded(_) => Namespace::DAG, + Scope::VirtualChainChanged(_) => Namespace::DAG, + Scope::FinalityConflict(_) => Namespace::DAG, + Scope::FinalityConflictResolved(_) => Namespace::DAG, + Scope::UtxosChanged(_) => Namespace::Wallet, + Scope::SinkBlueScoreChanged(_) => Namespace::DAG, + Scope::VirtualDaaScoreChanged(_) => Namespace::DAG, + Scope::PruningPointUtxoSetOverride(_) => Namespace::DAG, + Scope::NewBlockTemplate(_) => Namespace::Mining, + } + } + /// Return enabled namespaces as string for get_info pub fn enabled_namespaces(&self) -> Vec { self.enabled.iter().map(|namespace| namespace.to_string()).collect::>() diff --git a/rpc/service/src/service.rs b/rpc/service/src/service.rs index 6a29a1225e..a6c805f96e 100644 --- a/rpc/service/src/service.rs +++ b/rpc/service/src/service.rs @@ -1180,6 +1180,11 @@ NOTE: This error usually indicates an RPC conversion error between the node and /// Start sending notifications of some type to a listener. async fn start_notify(&self, id: ListenerId, scope: Scope) -> RpcResult<()> { + let namespace = self.namespaces.get_scope_namespace(&scope); + if !self.namespaces.is_enabled(&namespace) { + return Err(RpcError::UnauthorizedMethod(namespace.to_string())); + } + match scope { Scope::UtxosChanged(ref utxos_changed_scope) if !self.config.unsafe_rpc && utxos_changed_scope.addresses.is_empty() => { // The subscription to blanket UtxosChanged notifications is restricted to unsafe mode only