mirror of
https://github.com/kaspanet/kaspad.git
synced 2025-03-30 15:08:33 +00:00

* Add fee estimation to wallet * Add fee rate to kaspawallet parse * Update go version * Get rid of golint * Add RBF support to wallet * Fix bump_fee UTXO lookup and fix wrong change address * impl storage mass as per KIP9 * Use CalculateTransactionOverallMass where needed * Some fixes * Minor typos * Fix test * update version * BroadcastRBF -> BroadcastReplacement * rc3 * align proto files to only use camel case (fixed on RK as well) * Rename to FeePolicy and add MaxFee option + todo * apply max fee constrains * increase minChangeTarget to 10kas * fmt * Some fixes * fix description: maximum -> minimum * put min feerate check in the correct location * Fix calculateFeeLimits nil handling * Add validations to CLI flags * Change to rc6 * Add checkTransactionFeeRate * Add failed broadcast transactions on send error` * Fix estimateFee change value * Estimate fee correctly for --send-all * On estimateFee always assume that the recipient has ECDSA address * remove patch version --------- Co-authored-by: Michael Sutton <msutton@cs.huji.ac.il>
118 lines
3.7 KiB
Go
118 lines
3.7 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/kaspanet/kaspad/cmd/kaspawallet/daemon/client"
|
|
"github.com/kaspanet/kaspad/cmd/kaspawallet/daemon/pb"
|
|
"github.com/kaspanet/kaspad/cmd/kaspawallet/keys"
|
|
"github.com/kaspanet/kaspad/cmd/kaspawallet/libkaspawallet"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
func bumpFee(conf *bumpFeeConfig) error {
|
|
keysFile, err := keys.ReadKeysFile(conf.NetParams(), conf.KeysFile)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(keysFile.ExtendedPublicKeys) > len(keysFile.EncryptedMnemonics) {
|
|
return errors.Errorf("Cannot use 'bump-fee' command for multisig wallet without all of the keys")
|
|
}
|
|
|
|
daemonClient, tearDown, err := client.Connect(conf.DaemonAddress)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer tearDown()
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), daemonTimeout)
|
|
defer cancel()
|
|
|
|
var feePolicy *pb.FeePolicy
|
|
if conf.FeeRate > 0 {
|
|
feePolicy = &pb.FeePolicy{
|
|
FeePolicy: &pb.FeePolicy_ExactFeeRate{
|
|
ExactFeeRate: conf.FeeRate,
|
|
},
|
|
}
|
|
} else if conf.MaxFeeRate > 0 {
|
|
feePolicy = &pb.FeePolicy{
|
|
FeePolicy: &pb.FeePolicy_MaxFeeRate{MaxFeeRate: conf.MaxFeeRate},
|
|
}
|
|
} else if conf.MaxFee > 0 {
|
|
feePolicy = &pb.FeePolicy{
|
|
FeePolicy: &pb.FeePolicy_MaxFee{MaxFee: conf.MaxFee},
|
|
}
|
|
}
|
|
|
|
createUnsignedTransactionsResponse, err :=
|
|
daemonClient.BumpFee(ctx, &pb.BumpFeeRequest{
|
|
TxID: conf.TxID,
|
|
From: conf.FromAddresses,
|
|
UseExistingChangeAddress: conf.UseExistingChangeAddress,
|
|
FeePolicy: feePolicy,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(conf.Password) == 0 {
|
|
conf.Password = keys.GetPassword("Password:")
|
|
}
|
|
mnemonics, err := keysFile.DecryptMnemonics(conf.Password)
|
|
if err != nil {
|
|
if strings.Contains(err.Error(), "message authentication failed") {
|
|
fmt.Fprintf(os.Stderr, "Password decryption failed. Sometimes this is a result of not "+
|
|
"specifying the same keys file used by the wallet daemon process.\n")
|
|
}
|
|
return err
|
|
}
|
|
|
|
signedTransactions := make([][]byte, len(createUnsignedTransactionsResponse.Transactions))
|
|
for i, unsignedTransaction := range createUnsignedTransactionsResponse.Transactions {
|
|
signedTransaction, err := libkaspawallet.Sign(conf.NetParams(), mnemonics, unsignedTransaction, keysFile.ECDSA)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
signedTransactions[i] = signedTransaction
|
|
}
|
|
|
|
fmt.Printf("Broadcasting %d transaction(s)\n", len(signedTransactions))
|
|
// Since we waited for user input when getting the password, which could take unbound amount of time -
|
|
// create a new context for broadcast, to reset the timeout.
|
|
broadcastCtx, broadcastCancel := context.WithTimeout(context.Background(), daemonTimeout)
|
|
defer broadcastCancel()
|
|
|
|
const chunkSize = 100 // To avoid sending a message bigger than the gRPC max message size, we split it to chunks
|
|
for offset := 0; offset < len(signedTransactions); offset += chunkSize {
|
|
end := len(signedTransactions)
|
|
if offset+chunkSize <= len(signedTransactions) {
|
|
end = offset + chunkSize
|
|
}
|
|
|
|
chunk := signedTransactions[offset:end]
|
|
response, err := daemonClient.BroadcastReplacement(broadcastCtx, &pb.BroadcastRequest{Transactions: chunk})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
fmt.Printf("Broadcasted %d transaction(s) (broadcasted %.2f%% of the transactions so far)\n", len(chunk), 100*float64(end)/float64(len(signedTransactions)))
|
|
fmt.Println("Broadcasted Transaction ID(s): ")
|
|
for _, txID := range response.TxIDs {
|
|
fmt.Printf("\t%s\n", txID)
|
|
}
|
|
}
|
|
|
|
if conf.Verbose {
|
|
fmt.Println("Serialized Transaction(s) (can be parsed via the `parse` command or resent via `broadcast`): ")
|
|
for _, signedTx := range signedTransactions {
|
|
fmt.Printf("\t%x\n\n", signedTx)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|