accounts: improve API and add documentation

- Sign takes common.Address, not Account
- Import/Export methods work with encrypted JSON keys
This commit is contained in:
Felix Lange 2016-04-05 01:08:50 +02:00
parent 91aaddaeb3
commit 46df50be18
6 changed files with 97 additions and 58 deletions

View File

@ -14,9 +14,10 @@
// You should have received a copy of the GNU Lesser General Public License // You should have received a copy of the GNU Lesser General Public License
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
// Package implements a private key management facility. // Package accounts implements encrypted storage of secp256k1 private keys.
// //
// This abstracts part of a user's interaction with an account she controls. // Keys are stored as encrypted JSON files according to the Web3 Secret Storage specification.
// See https://github.com/ethereum/wiki/wiki/Web3-Secret-Storage-Definition for more information.
package accounts package accounts
import ( import (
@ -41,8 +42,15 @@ var (
ErrDecrypt = errors.New("could not decrypt key with given passphrase") ErrDecrypt = errors.New("could not decrypt key with given passphrase")
) )
// Account represents a stored key.
// When used as an argument, it selects a unique key file to act on.
type Account struct { type Account struct {
Address common.Address Address common.Address // Ethereum account address derived from the key
// File contains the key file name.
// When Acccount is used as an argument to select a key, File can be left blank to
// select just by address or set to the basename or absolute path of a file in the key
// directory. Accounts returned by Manager will always contain an absolute path.
File string File string
} }
@ -54,6 +62,7 @@ func (acc *Account) UnmarshalJSON(raw []byte) error {
return json.Unmarshal(raw, &acc.Address) return json.Unmarshal(raw, &acc.Address)
} }
// Manager manages a key storage directory on disk.
type Manager struct { type Manager struct {
cache *addrCache cache *addrCache
keyStore keyStore keyStore keyStore
@ -66,6 +75,7 @@ type unlocked struct {
abort chan struct{} abort chan struct{}
} }
// NewManager creates a manager for the given directory.
func NewManager(keydir string, scryptN, scryptP int) *Manager { func NewManager(keydir string, scryptN, scryptP int) *Manager {
keydir, _ = filepath.Abs(keydir) keydir, _ = filepath.Abs(keydir)
am := &Manager{keyStore: &keyStorePassphrase{keydir, scryptN, scryptP}} am := &Manager{keyStore: &keyStorePassphrase{keydir, scryptN, scryptP}}
@ -73,6 +83,8 @@ func NewManager(keydir string, scryptN, scryptP int) *Manager {
return am return am
} }
// NewPlaintextManager creates a manager for the given directory.
// Deprecated: Use NewManager.
func NewPlaintextManager(keydir string) *Manager { func NewPlaintextManager(keydir string) *Manager {
keydir, _ = filepath.Abs(keydir) keydir, _ = filepath.Abs(keydir)
am := &Manager{keyStore: &keyStorePlain{keydir}} am := &Manager{keyStore: &keyStorePlain{keydir}}
@ -91,19 +103,23 @@ func (am *Manager) init(keydir string) {
}) })
} }
// HasAddress reports whether a key with the given address is present.
func (am *Manager) HasAddress(addr common.Address) bool { func (am *Manager) HasAddress(addr common.Address) bool {
return am.cache.hasAddress(addr) return am.cache.hasAddress(addr)
} }
// Accounts returns all key files present in the directory.
func (am *Manager) Accounts() []Account { func (am *Manager) Accounts() []Account {
return am.cache.accounts() return am.cache.accounts()
} }
func (am *Manager) DeleteAccount(a Account, auth string) error { // DeleteAccount deletes the key matched by account if the passphrase is correct.
// If a contains no filename, the address must match a unique key.
func (am *Manager) DeleteAccount(a Account, passphrase string) error {
// Decrypting the key isn't really necessary, but we do // Decrypting the key isn't really necessary, but we do
// it anyway to check the password and zero out the key // it anyway to check the password and zero out the key
// immediately afterwards. // immediately afterwards.
a, key, err := am.getDecryptedKey(a, auth) a, key, err := am.getDecryptedKey(a, passphrase)
if key != nil { if key != nil {
zeroKey(key.PrivateKey) zeroKey(key.PrivateKey)
} }
@ -120,15 +136,15 @@ func (am *Manager) DeleteAccount(a Account, auth string) error {
return err return err
} }
func (am *Manager) Sign(a Account, toSign []byte) (signature []byte, err error) { // Sign signs hash with an unlocked private key matching the given address.
func (am *Manager) Sign(addr common.Address, hash []byte) (signature []byte, err error) {
am.mu.RLock() am.mu.RLock()
defer am.mu.RUnlock() defer am.mu.RUnlock()
unlockedKey, found := am.unlocked[a.Address] unlockedKey, found := am.unlocked[addr]
if !found { if !found {
return nil, ErrLocked return nil, ErrLocked
} }
signature, err = crypto.Sign(toSign, unlockedKey.PrivateKey) return crypto.Sign(hash, unlockedKey.PrivateKey)
return signature, err
} }
// Unlock unlocks the given account indefinitely. // Unlock unlocks the given account indefinitely.
@ -136,6 +152,7 @@ func (am *Manager) Unlock(a Account, keyAuth string) error {
return am.TimedUnlock(a, keyAuth, 0) return am.TimedUnlock(a, keyAuth, 0)
} }
// Lock removes the private key with the given address from memory.
func (am *Manager) Lock(addr common.Address) error { func (am *Manager) Lock(addr common.Address) error {
am.mu.Lock() am.mu.Lock()
if unl, found := am.unlocked[addr]; found { if unl, found := am.unlocked[addr]; found {
@ -147,9 +164,9 @@ func (am *Manager) Lock(addr common.Address) error {
return nil return nil
} }
// TimedUnlock unlocks the account with the given address. The account // TimedUnlock unlocks the given account with. The account
// stays unlocked for the duration of timeout. A timeout of 0 unlocks the account // stays unlocked for the duration of timeout. A timeout of 0 unlocks the account
// until the program exits. // until the program exits. The account must match a unique key.
// //
// If the accout is already unlocked, TimedUnlock extends or shortens // If the accout is already unlocked, TimedUnlock extends or shortens
// the active unlock timeout. // the active unlock timeout.
@ -210,8 +227,10 @@ func (am *Manager) expire(addr common.Address, u *unlocked, timeout time.Duratio
} }
} }
func (am *Manager) NewAccount(auth string) (Account, error) { // NewAccount generates a new key and stores it into the key directory,
_, account, err := storeNewKey(am.keyStore, crand.Reader, auth) // encrypting it with the passphrase.
func (am *Manager) NewAccount(passphrase string) (Account, error) {
_, account, err := storeNewKey(am.keyStore, crand.Reader, passphrase)
if err != nil { if err != nil {
return Account{}, err return Account{}, err
} }
@ -221,52 +240,69 @@ func (am *Manager) NewAccount(auth string) (Account, error) {
return account, nil return account, nil
} }
func (am *Manager) AccountByIndex(index int) (Account, error) { // AccountByIndex returns the ith account.
func (am *Manager) AccountByIndex(i int) (Account, error) {
accounts := am.Accounts() accounts := am.Accounts()
if index < 0 || index >= len(accounts) { if i < 0 || i >= len(accounts) {
return Account{}, fmt.Errorf("account index %d out of range [0, %d]", index, len(accounts)-1) return Account{}, fmt.Errorf("account index %d out of range [0, %d]", i, len(accounts)-1)
} }
return accounts[index], nil return accounts[i], nil
} }
// USE WITH CAUTION = this will save an unencrypted private key on disk // Export exports as a JSON key, encrypted with newPassphrase.
// no cli or js interface func (am *Manager) Export(a Account, passphrase, newPassphrase string) (keyJSON []byte, err error) {
func (am *Manager) Export(path string, a Account, keyAuth string) error { _, key, err := am.getDecryptedKey(a, passphrase)
_, key, err := am.getDecryptedKey(a, keyAuth)
if err != nil { if err != nil {
return err return nil, err
} }
return crypto.SaveECDSA(path, key.PrivateKey) var N, P int
if store, ok := am.keyStore.(*keyStorePassphrase); ok {
N, P = store.scryptN, store.scryptP
} else {
N, P = StandardScryptN, StandardScryptP
}
return EncryptKey(key, newPassphrase, N, P)
} }
func (am *Manager) Import(path string, keyAuth string) (Account, error) { // Import stores the given encrypted JSON key into the key directory.
priv, err := crypto.LoadECDSA(path) func (am *Manager) Import(keyJSON []byte, passphrase, newPassphrase string) (Account, error) {
key, err := DecryptKey(keyJSON, passphrase)
if key != nil && key.PrivateKey != nil {
defer zeroKey(key.PrivateKey)
}
if err != nil { if err != nil {
return Account{}, err return Account{}, err
} }
return am.ImportECDSA(priv, keyAuth) return am.importKey(key, newPassphrase)
} }
func (am *Manager) ImportECDSA(priv *ecdsa.PrivateKey, keyAuth string) (Account, error) { // ImportECDSA stores the given key into the key directory, encrypting it with the passphrase.
key := newKeyFromECDSA(priv) func (am *Manager) ImportECDSA(priv *ecdsa.PrivateKey, passphrase string) (Account, error) {
return am.importKey(newKeyFromECDSA(priv), passphrase)
}
func (am *Manager) importKey(key *Key, passphrase string) (Account, error) {
a := Account{Address: key.Address, File: am.keyStore.JoinPath(keyFileName(key.Address))} a := Account{Address: key.Address, File: am.keyStore.JoinPath(keyFileName(key.Address))}
if err := am.keyStore.StoreKey(a.File, key, keyAuth); err != nil { if err := am.keyStore.StoreKey(a.File, key, passphrase); err != nil {
return Account{}, err return Account{}, err
} }
am.cache.add(a) am.cache.add(a)
return a, nil return a, nil
} }
func (am *Manager) Update(a Account, authFrom, authTo string) error { // Update changes the passphrase of an existing account.
a, key, err := am.getDecryptedKey(a, authFrom) func (am *Manager) Update(a Account, passphrase, newPassphrase string) error {
a, key, err := am.getDecryptedKey(a, passphrase)
if err != nil { if err != nil {
return err return err
} }
return am.keyStore.StoreKey(a.File, key, authTo) return am.keyStore.StoreKey(a.File, key, newPassphrase)
} }
func (am *Manager) ImportPreSaleKey(keyJSON []byte, password string) (Account, error) { // ImportPreSaleKey decrypts the given Ethereum presale wallet and stores
a, _, err := importPreSaleKey(am.keyStore, keyJSON, password) // a key file in the key directory. The key file is encrypted with the same passphrase.
func (am *Manager) ImportPreSaleKey(keyJSON []byte, passphrase string) (Account, error) {
a, _, err := importPreSaleKey(am.keyStore, keyJSON, passphrase)
if err != nil { if err != nil {
return a, err return a, err
} }

View File

@ -76,7 +76,7 @@ func TestSign(t *testing.T) {
if err := am.Unlock(a1, ""); err != nil { if err := am.Unlock(a1, ""); err != nil {
t.Fatal(err) t.Fatal(err)
} }
if _, err := am.Sign(a1, testSigData); err != nil { if _, err := am.Sign(a1.Address, testSigData); err != nil {
t.Fatal(err) t.Fatal(err)
} }
} }
@ -89,7 +89,7 @@ func TestTimedUnlock(t *testing.T) {
a1, err := am.NewAccount(pass) a1, err := am.NewAccount(pass)
// Signing without passphrase fails because account is locked // Signing without passphrase fails because account is locked
_, err = am.Sign(a1, testSigData) _, err = am.Sign(a1.Address, testSigData)
if err != ErrLocked { if err != ErrLocked {
t.Fatal("Signing should've failed with ErrLocked before unlocking, got ", err) t.Fatal("Signing should've failed with ErrLocked before unlocking, got ", err)
} }
@ -100,14 +100,14 @@ func TestTimedUnlock(t *testing.T) {
} }
// Signing without passphrase works because account is temp unlocked // Signing without passphrase works because account is temp unlocked
_, err = am.Sign(a1, testSigData) _, err = am.Sign(a1.Address, testSigData)
if err != nil { if err != nil {
t.Fatal("Signing shouldn't return an error after unlocking, got ", err) t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
} }
// Signing fails again after automatic locking // Signing fails again after automatic locking
time.Sleep(350 * time.Millisecond) time.Sleep(250 * time.Millisecond)
_, err = am.Sign(a1, testSigData) _, err = am.Sign(a1.Address, testSigData)
if err != ErrLocked { if err != ErrLocked {
t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err) t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
} }
@ -126,7 +126,7 @@ func TestOverrideUnlock(t *testing.T) {
} }
// Signing without passphrase works because account is temp unlocked // Signing without passphrase works because account is temp unlocked
_, err = am.Sign(a1, testSigData) _, err = am.Sign(a1.Address, testSigData)
if err != nil { if err != nil {
t.Fatal("Signing shouldn't return an error after unlocking, got ", err) t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
} }
@ -137,14 +137,14 @@ func TestOverrideUnlock(t *testing.T) {
} }
// Signing without passphrase still works because account is temp unlocked // Signing without passphrase still works because account is temp unlocked
_, err = am.Sign(a1, testSigData) _, err = am.Sign(a1.Address, testSigData)
if err != nil { if err != nil {
t.Fatal("Signing shouldn't return an error after unlocking, got ", err) t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
} }
// Signing fails again after automatic locking // Signing fails again after automatic locking
time.Sleep(150 * time.Millisecond) time.Sleep(250 * time.Millisecond)
_, err = am.Sign(a1, testSigData) _, err = am.Sign(a1.Address, testSigData)
if err != ErrLocked { if err != ErrLocked {
t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err) t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
} }
@ -166,7 +166,7 @@ func TestSignRace(t *testing.T) {
} }
end := time.Now().Add(500 * time.Millisecond) end := time.Now().Add(500 * time.Millisecond)
for time.Now().Before(end) { for time.Now().Before(end) {
if _, err := am.Sign(a1, testSigData); err == ErrLocked { if _, err := am.Sign(a1.Address, testSigData); err == ErrLocked {
return return
} else if err != nil { } else if err != nil {
t.Errorf("Sign error: %v", err) t.Errorf("Sign error: %v", err)

View File

@ -146,9 +146,9 @@ func newKeyFromECDSA(privateKeyECDSA *ecdsa.PrivateKey) *Key {
return key return key
} }
// generate key whose address fits into < 155 bits so it can fit into // NewKeyForDirectICAP generates a key whose address fits into < 155 bits so it can fit
// the Direct ICAP spec. for simplicity and easier compatibility with // into the Direct ICAP spec. for simplicity and easier compatibility with other libs, we
// other libs, we retry until the first byte is 0. // retry until the first byte is 0.
func NewKeyForDirectICAP(rand io.Reader) *Key { func NewKeyForDirectICAP(rand io.Reader) *Key {
randBytes := make([]byte, 64) randBytes := make([]byte, 64)
_, err := rand.Read(randBytes) _, err := rand.Read(randBytes)

View File

@ -23,6 +23,7 @@ import (
"github.com/codegangsta/cli" "github.com/codegangsta/cli"
"github.com/ethereum/go-ethereum/accounts" "github.com/ethereum/go-ethereum/accounts"
"github.com/ethereum/go-ethereum/cmd/utils" "github.com/ethereum/go-ethereum/cmd/utils"
"github.com/ethereum/go-ethereum/crypto"
"github.com/ethereum/go-ethereum/logger" "github.com/ethereum/go-ethereum/logger"
"github.com/ethereum/go-ethereum/logger/glog" "github.com/ethereum/go-ethereum/logger/glog"
) )
@ -308,9 +309,13 @@ func accountImport(ctx *cli.Context) {
if len(keyfile) == 0 { if len(keyfile) == 0 {
utils.Fatalf("keyfile must be given as argument") utils.Fatalf("keyfile must be given as argument")
} }
key, err := crypto.LoadECDSA(keyfile)
if err != nil {
utils.Fatalf("keyfile must be given as argument")
}
accman := utils.MakeAccountManager(ctx) accman := utils.MakeAccountManager(ctx)
passphrase := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx)) passphrase := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
acct, err := accman.Import(keyfile, passphrase) acct, err := accman.ImportECDSA(key, passphrase)
if err != nil { if err != nil {
utils.Fatalf("Could not create the account: %v", err) utils.Fatalf("Could not create the account: %v", err)
} }

View File

@ -254,8 +254,7 @@ func (be *registryAPIBackend) Transact(fromStr, toStr, nonceStr, valueStr, gasSt
tx = types.NewTransaction(nonce, to, value, gas, price, data) tx = types.NewTransaction(nonce, to, value, gas, price, data)
} }
acc := accounts.Account{Address: from} signature, err := be.am.Sign(from, tx.SigHash().Bytes())
signature, err := be.am.Sign(acc, tx.SigHash().Bytes())
if err != nil { if err != nil {
return "", err return "", err
} }

View File

@ -1086,9 +1086,8 @@ func (s *PublicTransactionPoolAPI) GetTransactionReceipt(txHash common.Hash) (ma
} }
// sign is a helper function that signs a transaction with the private key of the given address. // sign is a helper function that signs a transaction with the private key of the given address.
func (s *PublicTransactionPoolAPI) sign(address common.Address, tx *types.Transaction) (*types.Transaction, error) { func (s *PublicTransactionPoolAPI) sign(addr common.Address, tx *types.Transaction) (*types.Transaction, error) {
acc := accounts.Account{Address: address} signature, err := s.am.Sign(addr, tx.SigHash().Bytes())
signature, err := s.am.Sign(acc, tx.SigHash().Bytes())
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -1181,10 +1180,10 @@ func (s *PublicTransactionPoolAPI) SendRawTransaction(encodedTx string) (string,
return tx.Hash().Hex(), nil return tx.Hash().Hex(), nil
} }
// Sign signs the given hash using the key that matches the address. The key must be unlocked in order to sign the // Sign signs the given hash using the key that matches the address. The key must be
// hash. // unlocked in order to sign the hash.
func (s *PublicTransactionPoolAPI) Sign(address common.Address, hash common.Hash) (string, error) { func (s *PublicTransactionPoolAPI) Sign(addr common.Address, hash common.Hash) (string, error) {
signature, error := s.am.Sign(accounts.Account{Address: address}, hash[:]) signature, error := s.am.Sign(addr, hash[:])
return common.ToHex(signature), error return common.ToHex(signature), error
} }