aboutsummaryrefslogtreecommitdiff
path: root/src/rpc/core_rpc_server.h (follow)
AgeCommit message (Collapse)AuthorFilesLines
2020-04-04Merge pull request #6357luigi11111-1/+1
42a7a4d daemon: auto public nodes - cache and prioritize most stable nodes (xiphon)
2020-03-12rpc: add --rpc-payment-allow-free-loopbackmoneromooo-monero1-0/+2
This allows RPC coming from the loopback interface to not have to pay for service. This makes it possible to run an externally accessible RPC server for payment while also having a local RPC server that can be run unrestricted and payment free.
2020-02-28Merge pull request #6215Alexander Blair1-0/+1
a2578892 --disable-ban-rpc option to prevent RPC users from banning (naughtyfox)
2020-02-28daemon: auto public nodes - cache and prioritize most stable nodesxiphon1-1/+1
2019-12-04--disable-ban-rpc option to prevent RPC users from banningnaughtyfox1-0/+1
2019-11-29daemon: run with -rpc-payment-address and --rpc-restricted-bind-portmoneromooo-monero1-1/+2
2019-10-25rpc: add a flush_cache RPCmoneromooo-monero1-0/+2
This allows flushing internal caches (for now, the bad tx cache, which will allow debugging a stuck monerod after it has failed to verify a transaction in a block, since it would otherwise not try again, making subsequent log changes pointless)
2019-10-25simplewallet: add public_nodes commandmoneromooo-monero1-1/+1
Lists nodes exposing their RPC port for public use
2019-10-25daemon, wallet: new pay for RPC use systemmoneromooo-monero1-1/+20
Daemons intended for public use can be set up to require payment in the form of hashes in exchange for RPC service. This enables public daemons to receive payment for their work over a large number of calls. This system behaves similarly to a pool, so payment takes the form of valid blocks every so often, yielding a large one off payment, rather than constant micropayments. This system can also be used by third parties as a "paywall" layer, where users of a service can pay for use by mining Monero to the service provider's address. An example of this for web site access is Primo, a Monero mining based website "paywall": https://github.com/selene-kovri/primo This has some advantages: - incentive to run a node providing RPC services, thereby promoting the availability of third party nodes for those who can't run their own - incentive to run your own node instead of using a third party's, thereby promoting decentralization - decentralized: payment is done between a client and server, with no third party needed - private: since the system is "pay as you go", you don't need to identify yourself to claim a long lived balance - no payment occurs on the blockchain, so there is no extra transactional load - one may mine with a beefy server, and use those credits from a phone, by reusing the client ID (at the cost of some privacy) - no barrier to entry: anyone may run a RPC node, and your expected revenue depends on how much work you do - Sybil resistant: if you run 1000 idle RPC nodes, you don't magically get more revenue - no large credit balance maintained on servers, so they have no incentive to exit scam - you can use any/many node(s), since there's little cost in switching servers - market based prices: competition between servers to lower costs - incentive for a distributed third party node system: if some public nodes are overused/slow, traffic can move to others - increases network security - helps counteract mining pools' share of the network hash rate - zero incentive for a payer to "double spend" since a reorg does not give any money back to the miner And some disadvantages: - low power clients will have difficulty mining (but one can optionally mine in advance and/or with a faster machine) - payment is "random", so a server might go a long time without a block before getting one - a public node's overall expected payment may be small Public nodes are expected to compete to find a suitable level for cost of service. The daemon can be set up this way to require payment for RPC services: monerod --rpc-payment-address 4xxxxxx \ --rpc-payment-credits 250 --rpc-payment-difficulty 1000 These values are an example only. The --rpc-payment-difficulty switch selects how hard each "share" should be, similar to a mining pool. The higher the difficulty, the fewer shares a client will find. The --rpc-payment-credits switch selects how many credits are awarded for each share a client finds. Considering both options, clients will be awarded credits/difficulty credits for every hash they calculate. For example, in the command line above, 0.25 credits per hash. A client mining at 100 H/s will therefore get an average of 25 credits per second. For reference, in the current implementation, a credit is enough to sync 20 blocks, so a 100 H/s client that's just starting to use Monero and uses this daemon will be able to sync 500 blocks per second. The wallet can be set to automatically mine if connected to a daemon which requires payment for RPC usage. It will try to keep a balance of 50000 credits, stopping mining when it's at this level, and starting again as credits are spent. With the example above, a new client will mine this much credits in about half an hour, and this target is enough to sync 500000 blocks (currently about a third of the monero blockchain). There are three new settings in the wallet: - credits-target: this is the amount of credits a wallet will try to reach before stopping mining. The default of 0 means 50000 credits. - auto-mine-for-rpc-payment-threshold: this controls the minimum credit rate which the wallet considers worth mining for. If the daemon credits less than this ratio, the wallet will consider mining to be not worth it. In the example above, the rate is 0.25 - persistent-rpc-client-id: if set, this allows the wallet to reuse a client id across runs. This means a public node can tell a wallet that's connecting is the same as one that connected previously, but allows a wallet to keep their credit balance from one run to the other. Since the wallet only mines to keep a small credit balance, this is not normally worth doing. However, someone may want to mine on a fast server, and use that credit balance on a low power device such as a phone. If left unset, a new client ID is generated at each wallet start, for privacy reasons. To mine and use a credit balance on two different devices, you can use the --rpc-client-secret-key switch. A wallet's client secret key can be found using the new rpc_payments command in the wallet. Note: anyone knowing your RPC client secret key is able to use your credit balance. The wallet has a few new commands too: - start_mining_for_rpc: start mining to acquire more credits, regardless of the auto mining settings - stop_mining_for_rpc: stop mining to acquire more credits - rpc_payments: display information about current credits with the currently selected daemon The node has an extra command: - rpc_payments: display information about clients and their balances The node will forget about any balance for clients which have been inactive for 6 months. Balances carry over on node restart.
2019-09-25ban peers sending bad pow outrightmoneromooo-monero1-1/+1
PoW is expensive to verify, so be strict
2019-08-27daemon: automatic public nodes discovering and bootstrap daemon switchingxiphon1-2/+5
2019-08-15Merge pull request #5649luigi11111-0/+3
a182df2 Bans for RPC connections (hyc)
2019-07-29rpc: implement get_public_nodes commandxiphon1-0/+2
2019-07-24Merge pull request #5623luigi11111-0/+4
b8cfa92 rpc: implement set_bootstrap_daemon method (xiphon)
2019-07-24Merge pull request #5530luigi11111-4/+0
6abaaaa remove obsolete save_graph skeleton code (moneromooo-monero)
2019-07-16allow blocking whole subnetsmoneromooo-monero1-0/+2
2019-06-16Bans for RPC connectionsHoward Chu1-0/+3
Make bans control RPC sessions too. And auto-ban some bad requests. Drops HTTP connections whenever response code is 500.
2019-06-10rpc: implement set_bootstrap_daemon methodxiphon1-0/+4
2019-05-10remove obsolete save_graph skeleton codemoneromooo-monero1-4/+0
2019-04-15rpc: set default log category in core_rpc_server.hmoneromooo-monero1-0/+3
2019-04-06Change SSL certificate file list to OpenSSL builtin load_verify_locationLee Clagett1-1/+1
Specifying SSL certificates for peer verification does an exact match, making it a not-so-obvious alias for the fingerprints option. This changes the checks to OpenSSL which loads concatenated certificate(s) from a single file and does a certificate-authority (chain of trust) check instead. There is no drop in security - a compromised exact match fingerprint has the same worse case failure. There is increased security in allowing separate long-term CA key and short-term SSL server keys. This also removes loading of the system-default CA files if a custom CA file or certificate fingerprint is specified.
2019-03-24New interactive daemon command 'print_net_stats': Global traffic statsrbrunner71-0/+2
2019-03-17Merge pull request #5190Riccardo Spagni1-0/+1
551104fb daemon: add --public-node mode, RPC port propagation over P2P (xiphon)
2019-03-05Update 2019 copyrightbinaryFate1-1/+1
2019-03-05epee: add SSL supportMartijn Otto1-0/+1
RPC connections now have optional tranparent SSL. An optional private key and certificate file can be passed, using the --{rpc,daemon}-ssl-private-key and --{rpc,daemon}-ssl-certificate options. Those have as argument a path to a PEM format private private key and certificate, respectively. If not given, a temporary self signed certificate will be used. SSL can be enabled or disabled using --{rpc}-ssl, which accepts autodetect (default), disabled or enabled. Access can be restricted to particular certificates using the --rpc-ssl-allowed-certificates, which takes a list of paths to PEM encoded certificates. This can allow a wallet to connect to only the daemon they think they're connected to, by forcing SSL and listing the paths to the known good certificates. To generate long term certificates: openssl genrsa -out /tmp/KEY 4096 openssl req -new -key /tmp/KEY -out /tmp/REQ openssl x509 -req -days 999999 -sha256 -in /tmp/REQ -signkey /tmp/KEY -out /tmp/CERT /tmp/KEY is the private key, and /tmp/CERT is the certificate, both in PEM format. /tmp/REQ can be removed. Adjust the last command to set expiration date, etc, as needed. It doesn't make a whole lot of sense for monero anyway, since most servers will run with one time temporary self signed certificates anyway. SSL support is transparent, so all communication is done on the existing ports, with SSL autodetection. This means you can start using an SSL daemon now, but you should not enforce SSL yet or nothing will talk to you.
2019-02-25daemon: add --public-node mode, RPC port propagation over P2Pxiphon1-0/+1
2019-02-02epee: add SSL supportmoneromooo-monero1-0/+5
RPC connections now have optional tranparent SSL. An optional private key and certificate file can be passed, using the --{rpc,daemon}-ssl-private-key and --{rpc,daemon}-ssl-certificate options. Those have as argument a path to a PEM format private private key and certificate, respectively. If not given, a temporary self signed certificate will be used. SSL can be enabled or disabled using --{rpc}-ssl, which accepts autodetect (default), disabled or enabled. Access can be restricted to particular certificates using the --rpc-ssl-allowed-certificates, which takes a list of paths to PEM encoded certificates. This can allow a wallet to connect to only the daemon they think they're connected to, by forcing SSL and listing the paths to the known good certificates. To generate long term certificates: openssl genrsa -out /tmp/KEY 4096 openssl req -new -key /tmp/KEY -out /tmp/REQ openssl x509 -req -days 999999 -sha256 -in /tmp/REQ -signkey /tmp/KEY -out /tmp/CERT /tmp/KEY is the private key, and /tmp/CERT is the certificate, both in PEM format. /tmp/REQ can be removed. Adjust the last command to set expiration date, etc, as needed. It doesn't make a whole lot of sense for monero anyway, since most servers will run with one time temporary self signed certificates anyway. SSL support is transparent, so all communication is done on the existing ports, with SSL autodetection. This means you can start using an SSL daemon now, but you should not enforce SSL yet or nothing will talk to you.
2019-01-28rpc: fix internal daemon calls in restricted rpc getting partial datamoneromooo-monero1-60/+60
2019-01-22Pruningmoneromooo-monero1-0/+2
The blockchain prunes seven eighths of prunable tx data. This saves about two thirds of the blockchain size, while keeping the node useful as a sync source for an eighth of the blockchain. No other data is currently pruned. There are three ways to prune a blockchain: - run monerod with --prune-blockchain - run "prune_blockchain" in the monerod console - run the monero-blockchain-prune utility The first two will prune in place. Due to how LMDB works, this will not reduce the blockchain size on disk. Instead, it will mark parts of the file as free, so that future data will use that free space, causing the file to not grow until free space grows scarce. The third way will create a second database, a pruned copy of the original one. Since this is a new file, this one will be smaller than the original one. Once the database is pruned, it will stay pruned as it syncs. That is, there is no need to use --prune-blockchain again, etc.
2018-12-12Merge pull request #4903Riccardo Spagni1-0/+2
dc1c1252 add command pop_blocks (Jason Wong)
2018-12-04Merge pull request #4859Riccardo Spagni1-2/+1
6f2497bc Don't cache nettype in core_rpc_server use m_core (doy-lee)
2018-11-28add command pop_blocksJason Wong1-0/+2
add new public method to Blockchain and update according to code review update after review: better lock/unlock, try catch and coding style
2018-11-20rpc: speedup get_output_distributionmoneromooo-monero1-0/+2
and decrease the amount of data carried around
2018-11-16Don't cache nettype in core_rpc_server use m_coredoy-lee1-2/+1
This can go out of sync with m_core's nettype if you run in fakechain mode since entering fakechain mode is done through code not the command line and core_rpc_server only looks at the command line to figure out the nettype.
2018-09-14remove obsolete daemon selection of fake outs and old tx constructionmoneromooo-monero1-6/+0
2018-09-11v8: per byte fee, pad bulletproofs, fixed 11 ring sizemoneromooo-monero1-2/+2
2018-07-19Merge pull request #4033luigi11111-1/+3
3e46db9 rpc: add a non binary get_transaction_pool_hashes RPC (moneromooo-monero)
2018-06-29add --regtest and --fixed-difficulty for regression testingvictorsintnicolaas1-0/+2
on_generateblocks RPC call combines functionality from the on_getblocktemplate and on_submitblock RPC calls to allow rapid block creation. Difficulty is set permanently to 1 for regtest. Makes use of FAKECHAIN network type, but takes hard fork heights from mainchain Default reserve_size in generate_blocks RPC call is now 1. If it is 0, the following error occurs 'Failed to calculate offset for'. Queries hard fork heights info of other network types
2018-06-21rpc: add a non binary get_transaction_pool_hashes RPCmoneromooo-monero1-1/+3
2018-05-31Merge pull request #3561luigi11111-1/+1
353e9c0 Core RPC: optionally add POW hash to block_header_response (stoffu)
2018-04-05Core RPC: optionally add POW hash to block_header_responsestoffu1-1/+1
2018-03-23rpc: make get_output_distribution a non-restricted RPCmoneromooo-monero1-1/+1
so that those nodes can still be used for sending transactions
2018-03-16add RPC to get a histogram of outputs of a given amountmoneromooo-monero1-0/+2
2018-03-05Stagenetstoffu1-4/+4
2018-02-16options: remove testnet-* optionswhythat1-3/+1
2018-02-16Merge pull request #3165Riccardo Spagni1-1/+13
7539603f Bootstrap daemon (stoffu)
2018-01-30Bootstrap daemonstoffu1-1/+13
2018-01-29Allow the number of incoming connections to be limitedErik de Castro Lopo1-0/+2
It was already possible to limit outgoing connections. One might want to do this on home network connections with high bandwidth but low usage caps.
2018-01-26Update 2018 copyrightxmr-eric1-1/+1
2018-01-06Implement #3045, fixing RPC snakecasesNick Johnson1-0/+18
2017-11-17RPC: allow binding of restricted port in addition to core portTim L1-1/+6
2017-11-14Merge pull request #2651Riccardo Spagni1-1/+1
118a1bed rpc: make get_coinbase_tx_sum a restricted RPC (moneromooo-monero)
2017-11-08Protect node privacy by proper filtering in restricted-mode RPC answersbinaryFate1-4/+4
This patch allows to filter out sensitive information for queries that rely on the pool state, when running in restricted mode. This filtering is only applied to data sent back to RPC queries. Results of inline commands typed locally in the daemon are not affected. In practice, when running with `--restricted-rpc`: * get_transaction_pool will list relayed transactions with the fields "last relayed time" and "received time" set to zero. * get_transaction_pool will not list transaction that have do_not_relay set to true, and will not list key images that are used only for such transactions * get_transaction_pool_hashes.bin will not list such transaction * get_transaction_pool_stats will not count such transactions in any of the aggregated values that are computed The implementation does not make filtering the default, so developers should be mindful of this if they add new RPC functionality. Fixes #2590.
2017-10-14rpc: make get_coinbase_tx_sum a restricted RPCmoneromooo-monero1-1/+1
It's pretty slow and I/O intensive
2017-10-02Merge pull request #2470Riccardo Spagni1-0/+4
2e59f6ea rpc: add new RPCs to get and set limits (MaxXor)
2017-09-19rpc: add new RPCs to get and set limitsMaxXor1-0/+4
2017-09-08rpc: get_txpool_backlog is now unrestrictedmoneromooo-monero1-1/+1
2017-08-26rpc: add a new RPC to get current txpool backlog (sizes and fees)moneromooo-monero1-0/+2
2017-08-07Merge pull request #2149Riccardo Spagni1-0/+2
158c3ecf core: thread most of handle_incoming_tx (moneromooo-monero) f57ee382 cryptonote_protocol: retry stale spans early (moneromooo-monero) 90df52e1 cryptonote_protocol: light cleanup (moneromooo-monero) 84e23156 cryptonote_protocol: avoid spurious SYNCHRONIZED OK messages (moneromooo-monero) 5be43fcd cryptonote_protocol_handler: sync speedup (moneromooo-monero)
2017-08-07cryptonote_protocol_handler: sync speedupmoneromooo-monero1-0/+2
A block queue is now placed between block download and block processing. Blocks are now requested only from one peer (unless starved). Includes a new sync_info coommand.
2017-07-04Add on_get_alt_blocks_hashes RPC callmoneroexamples1-0/+2
2017-06-01Speedup print_pool_statsHoward Chu1-0/+2
Since we're just counting txs, there's no reason to deserialize all the blobs.
2017-04-02daemon: new relay_tx command and RPCmoneromooo-monero1-0/+2
2017-03-23core, wallet: faster tx pool scanningmoneromooo-monero1-0/+2
Includes a new RPC to get tx pool hashes fast.
2017-02-24daemon/rpc: updates command and RPCmoneromooo-monero1-0/+2
subcommands "check", "download", and "update". update is not yet implemented.
2017-02-21update copyright year, fix occasional lack of newline at line endRiccardo Spagni1-1/+1
2017-02-06Add server auth to monerod, and client auth to wallet-cli and wallet-rpcLee Clagett1-8/+0
2017-01-22p2p: always recreate a new peer id on startupmoneromooo-monero1-0/+2
This prevents easy fingerprinting when you change IPs, and will be a must when kovri gets used.
2017-01-15Merge pull request #1569Riccardo Spagni1-0/+2
16b8b66a specify restore height by YYYY-MM-DD format (kenshi84)
2017-01-16specify restore height by YYYY-MM-DD formatkenshi841-0/+2
2017-01-16Change logging to easylogging++moneromooo-monero1-0/+2
This replaces the epee and data_loggers logging systems with a single one, and also adds filename:line and explicit severity levels. Categories may be defined, and logging severity set by category (or set of categories). epee style 0-4 log level maps to a sensible severity configuration. Log files now also rotate when reaching 100 MB. To select which logs to output, use the MONERO_LOGS environment variable, with a comma separated list of categories (globs are supported), with their requested severity level after a colon. If a log matches more than one such setting, the last one in the configuration string applies. A few examples: This one is (mostly) silent, only outputting fatal errors: MONERO_LOGS=*:FATAL This one is very verbose: MONERO_LOGS=*:TRACE This one is totally silent (logwise): MONERO_LOGS="" This one outputs all errors and warnings, except for the "verify" category, which prints just fatal errors (the verify category is used for logs about incoming transactions and blocks, and it is expected that some/many will fail to verify, hence we don't want the spam): MONERO_LOGS=*:WARNING,verify:FATAL Log levels are, in decreasing order of priority: FATAL, ERROR, WARNING, INFO, DEBUG, TRACE Subcategories may be added using prefixes and globs. This example will output net.p2p logs at the TRACE level, but all other net* logs only at INFO: MONERO_LOGS=*:ERROR,net*:INFO,net.p2p:TRACE Logs which are intended for the user (which Monero was using a lot through epee, but really isn't a nice way to go things) should use the "global" category. There are a few helper macros for using this category, eg: MGINFO("this shows up by default") or MGINFO_RED("this is red"), to try to keep a similar look and feel for now. Existing epee log macros still exist, and map to the new log levels, but since they're used as a "user facing" UI element as much as a logging system, they often don't map well to log severities (ie, a log level 0 log may be an error, or may be something we want the user to see, such as an important info). In those cases, I tried to use the new macros. In other cases, I left the existing macros in. When modifying logs, it is probably best to switch to the new macros with explicit levels. The --log-level options and set_log commands now also accept category settings, in addition to the epee style log levels.
2016-12-17rpc: new function and RPC to get alternative chain infomoneromooo-monero1-0/+2
2016-11-22Add a get_outs (fully text based) version of get_outs.binmoneromooo-monero1-1/+3
2016-10-31rpc: add a dynamic fee estimation RPC callmoneromooo-monero1-0/+2
2016-10-10changed params from start/end index to height/countDion Ahmetaj1-2/+2
2016-10-10attempted to remove whitespace spamDion Ahmetaj1-17/+17
2016-10-10added print_coinbase_tx_sum optionDion Ahmetaj1-17/+19
2016-10-04Merge pull request #1164Riccardo Spagni1-0/+2
179b1f4 daemon: implement missing print_bc and matching RPC (moneromooo-monero)
2016-10-04Merge pull request #1171Riccardo Spagni1-2/+0
6390673 Removed all code related to fast_exit (NanoAkron)
2016-10-03Removed all code related to fast_exitNanoAkron1-2/+0
2016-10-02daemon: implement missing print_bc and matching RPCmoneromooo-monero1-0/+2
2016-09-29Noticed two spellings of the word 'response' in the codebase, one 'responce' ↵NanoAkron1-1/+1
and the other 'response'. Fixed to the standard spelling 'response'. This may fix some functionality - some calls had mixed spellings.
2016-09-18epee: optionally restrict HTTP service to a configurable user agentmoneromooo-monero1-0/+1
This is intended to catch traffic coming from a web browser, so we avoid issues with a web page sending a transfer RPC to the wallet. Requiring a particular user agent can act as a simple password scheme, while we wait for 0MQ and proper authentication to be merged.
2016-08-28core: new /getrandom_rctouts.bin binary RPC callmoneromooo-monero1-0/+2
to get random ringct outputs to mix with
2016-08-11Fake outs set is now decided by the walletmoneromooo-monero1-0/+2
This plugs a privacy leak from the wallet to the daemon, as the daemon could previously see what input is included as a transaction input, which the daemon hadn't previously supplied. Now, the wallet requests a particular set of outputs, including the real one. This can result in transactions that can't be accepted if the wallet happens to select too many outputs with non standard unlock times. The daemon could know this and select another output, but the wallet is blind to it. It's currently very unlikely since I don't think anything uses non default unlock times. The wallet requests more outputs than necessary so it can use spares if any of the returns outputs are still locked. If there are not enough spares to reach the desired mixin, the transaction will fail.
2016-07-20Merge pull request #902Riccardo Spagni1-0/+2
014f3a0 Add a daemon RPC version, and make simplewallet check it (moneromooo-monero)
2016-07-10Add a daemon RPC version, and make simplewallet check itmoneromooo-monero1-0/+2
If the version is different, simplewallet will refuse to use that daemon, unless --allow-mismatched-daemon-version is used.
2016-07-10rpc: fix get_bans and set_bans RPC names, they were missing a _moneromooo-monero1-2/+2
2016-05-16Restrict also 'get_connections' and 'getbans' APIs.osensei1-2/+2
2016-05-14Don't allow 'flush_txpool' and 'setbans' JSON_RPC methods when running in ↵osensei1-2/+2
restricted mode.
2016-04-17Add GET_HASHES_FAST rpc, use it in walletHoward Chu1-0/+2
When m_refresh_from_block_height has been set, only hashes will be retrieved up to that height, instead of full blocks. The same will be done for "refresh <height>" when the specified height is beyond the current local blockchain.
2016-03-26New RPC and daemon command to get output histogrammoneromooo-monero1-0/+2
This is a list of existing output amounts along with the number of outputs of that amount in the blockchain. The daemon command takes: - no parameters: all outputs with at least 3 instances - one parameter: all outputs with at least that many instances - two parameters: all outputs within that many instances The default starts at 3 to avoid massive spamming of all dust outputs in the blockchain, and is the current minimum mixin requirement. An optional vector of amounts may be passed, to request histogram only for those outputs.
2016-01-30new flush_txpool command, and associated RPC callmoneromooo-monero1-0/+2
It can flush a particular tx, or the whole pool (the RPC command can flush a list of transactions too)
2015-12-31updated copyright yearRiccardo Spagni1-1/+1
2015-11-30Merge pull request #505Riccardo Spagni1-12/+14
7574297 core_rpc_server: add a --restricted-rpc option (moneromooo-monero)
2015-11-27core_rpc_server: add a --restricted-rpc optionmoneromooo-monero1-12/+14
It does not expose the RPC for commands like start_mining, etc (ie, commands a public node operator might want to be restricted)
2015-11-26add RPC calls and commands to get/set bansmoneromooo-monero1-0/+4
2015-10-26rpc: fix hard_fork_info RPCmoneromooo-monero1-0/+1
I had never tested it, obviously
2015-10-13core_rpc_server: add a getblock RPC command, and fix print_blockmoneromooo-monero1-0/+2
2015-09-19Add an RPC call and daemon command to get info on hard fork votingmoneromooo-monero1-0/+1
2015-08-11Add a is_key_image_spent daemon command and RPC callmoneromooo-monero1-0/+2
2015-05-28core_rpc_server: add a getter for the testnet flagmoneromooo-monero1-0/+1
2015-04-01remerged; commands JSON. logging upgrade. doxygenrfree2monero1-0/+8
2015-03-27Restore daemon interactive modeThomas Winget1-27/+28
Daemon interactive mode is now working again. RPC mapped calls in daemon and wallet have both had connection_context removed as an argument as that argument was not being used anywhere.
2015-02-24RPC calls for background daemon added inThomas Winget1-0/+11
The RPC calls the daemon executable uses to talk to the running daemon instance have mostly been added back in. Rate limiting has not been added in upstream, but is on its way in a separate effort, so those calls are still NOPed out.
2015-02-24Daemonize changes pulled in -- daemon buildsThomas Winget1-1/+9
many RPC functions added by the daemonize changes (and related changes on the upstream dev branch that were not merged) were commented out (apart from return). Other than that, this *should* work...at any rate, it builds, and that's something.
2015-01-02year updated in licenseRiccardo Spagni1-1/+1
2014-09-15Separate testnet address prefixZachary Michaels1-3/+6
2014-09-15Separate rpc port for testnetZachary Michaels1-2/+8
2014-07-23License updated to BSD 3-clausefluffypony1-3/+29
2014-07-22Add get_info command to daemon json rpcZachary Michaels1-0/+2
2014-07-18Added get_connections RPC call to daemonThomas Winget1-0/+2
2014-06-02Merge pull request #20 from artifexd/wallet_refreshmonero-project1-0/+1
Enable wallet refresh before blockchain is saved or completely sync'd.
2014-06-01Enable wallet refresh before blockchain is saved or completely sync'd.artifexd1-0/+1
2014-05-25'mining_status' Daemon RPC commandNeozaru1-0/+2
2014-05-16Added 'save_bc' command in daemon for saving blockchain remotelyNeozaru1-0/+2
2014-04-09Port mapping with UPnPAntonio Juarez1-5/+15
2014-03-20some fixesAntonio Juarez1-16/+17
2014-03-03moved all stuff to githubAntonio Juarez1-0/+75