forked from cerc-io/plugeth
accounts, cmd, eth, internal, miner, node: wallets and HD APIs
This commit is contained in:
parent
b3c0e9d3cc
commit
fad5eb0a87
@ -18,162 +18,128 @@
|
|||||||
package accounts
|
package accounts
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
|
||||||
"errors"
|
|
||||||
"math/big"
|
"math/big"
|
||||||
"reflect"
|
|
||||||
"sync"
|
|
||||||
|
|
||||||
"github.com/ethereum/go-ethereum/common"
|
"github.com/ethereum/go-ethereum/common"
|
||||||
"github.com/ethereum/go-ethereum/core/types"
|
"github.com/ethereum/go-ethereum/core/types"
|
||||||
|
"github.com/ethereum/go-ethereum/event"
|
||||||
)
|
)
|
||||||
|
|
||||||
// ErrUnknownAccount is returned for any requested operation for which no backend
|
// Account represents an Ethereum account located at a specific location defined
|
||||||
// provides the specified account.
|
// by the optional URL field.
|
||||||
var ErrUnknownAccount = errors.New("unknown account")
|
|
||||||
|
|
||||||
// ErrNotSupported is returned when an operation is requested from an account
|
|
||||||
// backend that it does not support.
|
|
||||||
var ErrNotSupported = errors.New("not supported")
|
|
||||||
|
|
||||||
// Account represents a stored key.
|
|
||||||
// When used as an argument, it selects a unique key to act on.
|
|
||||||
type Account struct {
|
type Account struct {
|
||||||
Address common.Address // Ethereum account address derived from the key
|
Address common.Address `json:"address"` // Ethereum account address derived from the key
|
||||||
URL string // Optional resource locator within a backend
|
URL string `json:"url"` // Optional resource locator within a backend
|
||||||
backend Backend // Backend where this account originates from
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (acc *Account) MarshalJSON() ([]byte, error) {
|
// Wallet represents a software or hardware wallet that might contain one or more
|
||||||
return []byte(`"` + acc.Address.Hex() + `"`), nil
|
// accounts (derived from the same seed).
|
||||||
|
type Wallet interface {
|
||||||
|
// Type retrieves a textual representation of the type of the wallet.
|
||||||
|
Type() string
|
||||||
|
|
||||||
|
// URL retrieves the canonical path under which this wallet is reachable. It is
|
||||||
|
// user by upper layers to define a sorting order over all wallets from multiple
|
||||||
|
// backends.
|
||||||
|
URL() string
|
||||||
|
|
||||||
|
// Status returns a textual status to aid the user in the current state of the
|
||||||
|
// wallet.
|
||||||
|
Status() string
|
||||||
|
|
||||||
|
// Open initializes access to a wallet instance. It is not meant to unlock or
|
||||||
|
// decrypt account keys, rather simply to establish a connection to hardware
|
||||||
|
// wallets and/or to access derivation seeds.
|
||||||
|
//
|
||||||
|
// The passphrase parameter may or may not be used by the implementation of a
|
||||||
|
// particular wallet instance. The reason there is no passwordless open method
|
||||||
|
// is to strive towards a uniform wallet handling, oblivious to the different
|
||||||
|
// backend providers.
|
||||||
|
//
|
||||||
|
// Please note, if you open a wallet, you must close it to release any allocated
|
||||||
|
// resources (especially important when working with hardware wallets).
|
||||||
|
Open(passphrase string) error
|
||||||
|
|
||||||
|
// Close releases any resources held by an open wallet instance.
|
||||||
|
Close() error
|
||||||
|
|
||||||
|
// Accounts retrieves the list of signing accounts the wallet is currently aware
|
||||||
|
// of. For hierarchical deterministic wallets, the list will not be exhaustive,
|
||||||
|
// rather only contain the accounts explicitly pinned during account derivation.
|
||||||
|
Accounts() []Account
|
||||||
|
|
||||||
|
// Contains returns whether an account is part of this particular wallet or not.
|
||||||
|
Contains(account Account) bool
|
||||||
|
|
||||||
|
// Derive attempts to explicitly derive a hierarchical deterministic account at
|
||||||
|
// the specified derivation path. If requested, the derived account will be added
|
||||||
|
// to the wallet's tracked account list.
|
||||||
|
Derive(path string, pin bool) (Account, error)
|
||||||
|
|
||||||
|
// SignHash requests the wallet to sign the given hash.
|
||||||
|
//
|
||||||
|
// It looks up the account specified either solely via its address contained within,
|
||||||
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
||||||
|
//
|
||||||
|
// If the wallet requires additional authentication to sign the request (e.g.
|
||||||
|
// a password to decrypt the account, or a PIN code o verify the transaction),
|
||||||
|
// an AuthNeededError instance will be returned, containing infos for the user
|
||||||
|
// about which fields or actions are needed. The user may retry by providing
|
||||||
|
// the needed details via SignHashWithPassphrase, or by other means (e.g. unlock
|
||||||
|
// the account in a keystore).
|
||||||
|
SignHash(account Account, hash []byte) ([]byte, error)
|
||||||
|
|
||||||
|
// SignTx requests the wallet to sign the given transaction.
|
||||||
|
//
|
||||||
|
// It looks up the account specified either solely via its address contained within,
|
||||||
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
||||||
|
//
|
||||||
|
// If the wallet requires additional authentication to sign the request (e.g.
|
||||||
|
// a password to decrypt the account, or a PIN code o verify the transaction),
|
||||||
|
// an AuthNeededError instance will be returned, containing infos for the user
|
||||||
|
// about which fields or actions are needed. The user may retry by providing
|
||||||
|
// the needed details via SignTxWithPassphrase, or by other means (e.g. unlock
|
||||||
|
// the account in a keystore).
|
||||||
|
SignTx(account Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error)
|
||||||
|
|
||||||
|
// SignHashWithPassphrase requests the wallet to sign the given hash with the
|
||||||
|
// given passphrase as extra authentication information.
|
||||||
|
//
|
||||||
|
// It looks up the account specified either solely via its address contained within,
|
||||||
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
||||||
|
SignHashWithPassphrase(account Account, passphrase string, hash []byte) ([]byte, error)
|
||||||
|
|
||||||
|
// SignTxWithPassphrase requests the wallet to sign the given transaction, with the
|
||||||
|
// given passphrase as extra authentication information.
|
||||||
|
//
|
||||||
|
// It looks up the account specified either solely via its address contained within,
|
||||||
|
// or optionally with the aid of any location metadata from the embedded URL field.
|
||||||
|
SignTxWithPassphrase(account Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (acc *Account) UnmarshalJSON(raw []byte) error {
|
// Backend is a "wallet provider" that may contain a batch of accounts they can
|
||||||
return json.Unmarshal(raw, &acc.Address)
|
// sign transactions with and upon request, do so.
|
||||||
|
type Backend interface {
|
||||||
|
// Wallets retrieves the list of wallets the backend is currently aware of.
|
||||||
|
//
|
||||||
|
// The returned wallets are not opened by default. For software HD wallets this
|
||||||
|
// means that no base seeds are decrypted, and for hardware wallets that no actual
|
||||||
|
// connection is established.
|
||||||
|
//
|
||||||
|
// The resulting wallet list will be sorted alphabetically based on its internal
|
||||||
|
// URL assigned by the backend. Since wallets (especially hardware) may come and
|
||||||
|
// go, the same wallet might appear at a different positions in the list during
|
||||||
|
// subsequent retrievals.
|
||||||
|
Wallets() []Wallet
|
||||||
|
|
||||||
|
// Subscribe creates an async subscription to receive notifications when the
|
||||||
|
// backend detects the arrival or departure of a wallet.
|
||||||
|
Subscribe(sink chan<- WalletEvent) event.Subscription
|
||||||
}
|
}
|
||||||
|
|
||||||
// Manager is an overarching account manager that can communicate with various
|
// WalletEvent is an event fired by an account backend when a wallet arrival or
|
||||||
// backends for signing transactions.
|
// departure is detected.
|
||||||
type Manager struct {
|
type WalletEvent struct {
|
||||||
backends []Backend // List of currently registered backends (ordered by registration)
|
Wallet Wallet // Wallet instance arrived or departed
|
||||||
index map[reflect.Type]Backend // Set of currently registered backends
|
Arrive bool // Whether the wallet was added or removed
|
||||||
lock sync.RWMutex
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewManager creates a generic account manager to sign transaction via various
|
|
||||||
// supported backends.
|
|
||||||
func NewManager(backends ...Backend) *Manager {
|
|
||||||
am := &Manager{
|
|
||||||
backends: backends,
|
|
||||||
index: make(map[reflect.Type]Backend),
|
|
||||||
}
|
|
||||||
for _, backend := range backends {
|
|
||||||
am.index[reflect.TypeOf(backend)] = backend
|
|
||||||
}
|
|
||||||
return am
|
|
||||||
}
|
|
||||||
|
|
||||||
// Backend retrieves the backend with the given type from the account manager.
|
|
||||||
func (am *Manager) Backend(backend reflect.Type) Backend {
|
|
||||||
return am.index[backend]
|
|
||||||
}
|
|
||||||
|
|
||||||
// Accounts returns all signer accounts registered under this account manager.
|
|
||||||
func (am *Manager) Accounts() []Account {
|
|
||||||
am.lock.RLock()
|
|
||||||
defer am.lock.RUnlock()
|
|
||||||
|
|
||||||
var all []Account
|
|
||||||
for _, backend := range am.backends { // TODO(karalabe): cache these after subscriptions are in
|
|
||||||
accounts := backend.Accounts()
|
|
||||||
for i := 0; i < len(accounts); i++ {
|
|
||||||
accounts[i].backend = backend
|
|
||||||
}
|
|
||||||
all = append(all, accounts...)
|
|
||||||
}
|
|
||||||
return all
|
|
||||||
}
|
|
||||||
|
|
||||||
// HasAddress reports whether a key with the given address is present.
|
|
||||||
func (am *Manager) HasAddress(addr common.Address) bool {
|
|
||||||
am.lock.RLock()
|
|
||||||
defer am.lock.RUnlock()
|
|
||||||
|
|
||||||
for _, backend := range am.backends {
|
|
||||||
if backend.HasAddress(addr) {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
// SignHash requests the account manager to get the hash signed with an arbitrary
|
|
||||||
// signing backend holding the authorization for the specified account.
|
|
||||||
func (am *Manager) SignHash(acc Account, hash []byte) ([]byte, error) {
|
|
||||||
am.lock.RLock()
|
|
||||||
defer am.lock.RUnlock()
|
|
||||||
|
|
||||||
if err := am.ensureBackend(&acc); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return acc.backend.SignHash(acc, hash)
|
|
||||||
}
|
|
||||||
|
|
||||||
// SignTx requests the account manager to get the transaction signed with an
|
|
||||||
// arbitrary signing backend holding the authorization for the specified account.
|
|
||||||
func (am *Manager) SignTx(acc Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
|
||||||
am.lock.RLock()
|
|
||||||
defer am.lock.RUnlock()
|
|
||||||
|
|
||||||
if err := am.ensureBackend(&acc); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return acc.backend.SignTx(acc, tx, chainID)
|
|
||||||
}
|
|
||||||
|
|
||||||
// SignHashWithPassphrase requests the account manager to get the hash signed with
|
|
||||||
// an arbitrary signing backend holding the authorization for the specified account.
|
|
||||||
func (am *Manager) SignHashWithPassphrase(acc Account, passphrase string, hash []byte) ([]byte, error) {
|
|
||||||
am.lock.RLock()
|
|
||||||
defer am.lock.RUnlock()
|
|
||||||
|
|
||||||
if err := am.ensureBackend(&acc); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return acc.backend.SignHashWithPassphrase(acc, passphrase, hash)
|
|
||||||
}
|
|
||||||
|
|
||||||
// SignTxWithPassphrase requests the account manager to get the transaction signed
|
|
||||||
// with an arbitrary signing backend holding the authorization for the specified
|
|
||||||
// account.
|
|
||||||
func (am *Manager) SignTxWithPassphrase(acc Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
|
||||||
am.lock.RLock()
|
|
||||||
defer am.lock.RUnlock()
|
|
||||||
|
|
||||||
if err := am.ensureBackend(&acc); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return acc.backend.SignTxWithPassphrase(acc, passphrase, tx, chainID)
|
|
||||||
}
|
|
||||||
|
|
||||||
// ensureBackend ensures that the account has a correctly set backend and that
|
|
||||||
// it is still alive.
|
|
||||||
//
|
|
||||||
// Please note, this method assumes the manager lock is held!
|
|
||||||
func (am *Manager) ensureBackend(acc *Account) error {
|
|
||||||
// If we have a backend, make sure it's still live
|
|
||||||
if acc.backend != nil {
|
|
||||||
if _, exists := am.index[reflect.TypeOf(acc.backend)]; !exists {
|
|
||||||
return ErrUnknownAccount
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
// If we don't have a known backend, look up one that can service it
|
|
||||||
for _, backend := range am.backends {
|
|
||||||
if backend.HasAddress(acc.Address) { // TODO(karalabe): this assumes unique addresses per backend
|
|
||||||
acc.backend = backend
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return ErrUnknownAccount
|
|
||||||
}
|
}
|
||||||
|
@ -1,88 +0,0 @@
|
|||||||
// Copyright 2017 The go-ethereum Authors
|
|
||||||
// This file is part of the go-ethereum library.
|
|
||||||
//
|
|
||||||
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
||||||
// it under the terms of the GNU Lesser General Public License as published by
|
|
||||||
// the Free Software Foundation, either version 3 of the License, or
|
|
||||||
// (at your option) any later version.
|
|
||||||
//
|
|
||||||
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
||||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
// GNU Lesser General Public License for more details.
|
|
||||||
//
|
|
||||||
// You should have received a copy of the GNU Lesser General Public License
|
|
||||||
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
||||||
|
|
||||||
package accounts
|
|
||||||
|
|
||||||
import (
|
|
||||||
"math/big"
|
|
||||||
|
|
||||||
"github.com/ethereum/go-ethereum/common"
|
|
||||||
"github.com/ethereum/go-ethereum/core/types"
|
|
||||||
)
|
|
||||||
|
|
||||||
// Backend is an "account provider" that can specify a batch of accounts it can
|
|
||||||
// sign transactions with and upon request, do so.
|
|
||||||
type Backend interface {
|
|
||||||
// Accounts retrieves the list of signing accounts the backend is currently aware of.
|
|
||||||
Accounts() []Account
|
|
||||||
|
|
||||||
// HasAddress reports whether an account with the given address is present.
|
|
||||||
HasAddress(addr common.Address) bool
|
|
||||||
|
|
||||||
// SignHash requests the backend to sign the given hash.
|
|
||||||
//
|
|
||||||
// It looks up the account specified either solely via its address contained within,
|
|
||||||
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
||||||
//
|
|
||||||
// If the backend requires additional authentication to sign the request (e.g.
|
|
||||||
// a password to decrypt the account, or a PIN code o verify the transaction),
|
|
||||||
// an AuthNeededError instance will be returned, containing infos for the user
|
|
||||||
// about which fields or actions are needed. The user may retry by providing
|
|
||||||
// the needed details via SignHashWithPassphrase, or by other means (e.g. unlock
|
|
||||||
// the account in a keystore).
|
|
||||||
SignHash(acc Account, hash []byte) ([]byte, error)
|
|
||||||
|
|
||||||
// SignTx requests the backend to sign the given transaction.
|
|
||||||
//
|
|
||||||
// It looks up the account specified either solely via its address contained within,
|
|
||||||
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
||||||
//
|
|
||||||
// If the backend requires additional authentication to sign the request (e.g.
|
|
||||||
// a password to decrypt the account, or a PIN code o verify the transaction),
|
|
||||||
// an AuthNeededError instance will be returned, containing infos for the user
|
|
||||||
// about which fields or actions are needed. The user may retry by providing
|
|
||||||
// the needed details via SignTxWithPassphrase, or by other means (e.g. unlock
|
|
||||||
// the account in a keystore).
|
|
||||||
SignTx(acc Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error)
|
|
||||||
|
|
||||||
// SignHashWithPassphrase requests the backend to sign the given transaction with
|
|
||||||
// the given passphrase as extra authentication information.
|
|
||||||
//
|
|
||||||
// It looks up the account specified either solely via its address contained within,
|
|
||||||
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
||||||
SignHashWithPassphrase(acc Account, passphrase string, hash []byte) ([]byte, error)
|
|
||||||
|
|
||||||
// SignTxWithPassphrase requests the backend to sign the given transaction, with the
|
|
||||||
// given passphrase as extra authentication information.
|
|
||||||
//
|
|
||||||
// It looks up the account specified either solely via its address contained within,
|
|
||||||
// or optionally with the aid of any location metadata from the embedded URL field.
|
|
||||||
SignTxWithPassphrase(acc Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error)
|
|
||||||
|
|
||||||
// TODO(karalabe,fjl): watching and caching needs the Go subscription system
|
|
||||||
// Watch requests the backend to send a notification to the specified channel whenever
|
|
||||||
// an new account appears or an existing one disappears.
|
|
||||||
//Watch(chan AccountEvent) error
|
|
||||||
|
|
||||||
// Unwatch requests the backend stop sending notifications to the given channel.
|
|
||||||
//Unwatch(chan AccountEvent) error
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO(karalabe,fjl): watching and caching needs the Go subscription system
|
|
||||||
// type AccountEvent struct {
|
|
||||||
// Account Account
|
|
||||||
// Added bool
|
|
||||||
// }
|
|
@ -16,7 +16,34 @@
|
|||||||
|
|
||||||
package accounts
|
package accounts
|
||||||
|
|
||||||
import "fmt"
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ErrUnknownAccount is returned for any requested operation for which no backend
|
||||||
|
// provides the specified account.
|
||||||
|
var ErrUnknownAccount = errors.New("unknown account")
|
||||||
|
|
||||||
|
// ErrUnknownWallet is returned for any requested operation for which no backend
|
||||||
|
// provides the specified wallet.
|
||||||
|
var ErrUnknownWallet = errors.New("unknown wallet")
|
||||||
|
|
||||||
|
// ErrNotSupported is returned when an operation is requested from an account
|
||||||
|
// backend that it does not support.
|
||||||
|
var ErrNotSupported = errors.New("not supported")
|
||||||
|
|
||||||
|
// ErrInvalidPassphrase is returned when a decryption operation receives a bad
|
||||||
|
// passphrase.
|
||||||
|
var ErrInvalidPassphrase = errors.New("invalid passphrase")
|
||||||
|
|
||||||
|
// ErrWalletAlreadyOpen is returned if a wallet is attempted to be opened the
|
||||||
|
// secodn time.
|
||||||
|
var ErrWalletAlreadyOpen = errors.New("wallet already open")
|
||||||
|
|
||||||
|
// ErrWalletClosed is returned if a wallet is attempted to be opened the
|
||||||
|
// secodn time.
|
||||||
|
var ErrWalletClosed = errors.New("wallet closed")
|
||||||
|
|
||||||
// AuthNeededError is returned by backends for signing requests where the user
|
// AuthNeededError is returned by backends for signing requests where the user
|
||||||
// is required to provide further authentication before signing can succeed.
|
// is required to provide further authentication before signing can succeed.
|
||||||
|
@ -39,11 +39,11 @@ import (
|
|||||||
// exist yet, the code will attempt to create a watcher at most this often.
|
// exist yet, the code will attempt to create a watcher at most this often.
|
||||||
const minReloadInterval = 2 * time.Second
|
const minReloadInterval = 2 * time.Second
|
||||||
|
|
||||||
type accountsByFile []accounts.Account
|
type accountsByURL []accounts.Account
|
||||||
|
|
||||||
func (s accountsByFile) Len() int { return len(s) }
|
func (s accountsByURL) Len() int { return len(s) }
|
||||||
func (s accountsByFile) Less(i, j int) bool { return s[i].URL < s[j].URL }
|
func (s accountsByURL) Less(i, j int) bool { return s[i].URL < s[j].URL }
|
||||||
func (s accountsByFile) Swap(i, j int) { s[i], s[j] = s[j], s[i] }
|
func (s accountsByURL) Swap(i, j int) { s[i], s[j] = s[j], s[i] }
|
||||||
|
|
||||||
// AmbiguousAddrError is returned when attempting to unlock
|
// AmbiguousAddrError is returned when attempting to unlock
|
||||||
// an address for which more than one file exists.
|
// an address for which more than one file exists.
|
||||||
@ -63,26 +63,28 @@ func (err *AmbiguousAddrError) Error() string {
|
|||||||
return fmt.Sprintf("multiple keys match address (%s)", files)
|
return fmt.Sprintf("multiple keys match address (%s)", files)
|
||||||
}
|
}
|
||||||
|
|
||||||
// addressCache is a live index of all accounts in the keystore.
|
// accountCache is a live index of all accounts in the keystore.
|
||||||
type addressCache struct {
|
type accountCache struct {
|
||||||
keydir string
|
keydir string
|
||||||
watcher *watcher
|
watcher *watcher
|
||||||
mu sync.Mutex
|
mu sync.Mutex
|
||||||
all accountsByFile
|
all accountsByURL
|
||||||
byAddr map[common.Address][]accounts.Account
|
byAddr map[common.Address][]accounts.Account
|
||||||
throttle *time.Timer
|
throttle *time.Timer
|
||||||
|
notify chan struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
func newAddrCache(keydir string) *addressCache {
|
func newAccountCache(keydir string) (*accountCache, chan struct{}) {
|
||||||
ac := &addressCache{
|
ac := &accountCache{
|
||||||
keydir: keydir,
|
keydir: keydir,
|
||||||
byAddr: make(map[common.Address][]accounts.Account),
|
byAddr: make(map[common.Address][]accounts.Account),
|
||||||
|
notify: make(chan struct{}, 1),
|
||||||
}
|
}
|
||||||
ac.watcher = newWatcher(ac)
|
ac.watcher = newWatcher(ac)
|
||||||
return ac
|
return ac, ac.notify
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ac *addressCache) accounts() []accounts.Account {
|
func (ac *accountCache) accounts() []accounts.Account {
|
||||||
ac.maybeReload()
|
ac.maybeReload()
|
||||||
ac.mu.Lock()
|
ac.mu.Lock()
|
||||||
defer ac.mu.Unlock()
|
defer ac.mu.Unlock()
|
||||||
@ -91,14 +93,14 @@ func (ac *addressCache) accounts() []accounts.Account {
|
|||||||
return cpy
|
return cpy
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ac *addressCache) hasAddress(addr common.Address) bool {
|
func (ac *accountCache) hasAddress(addr common.Address) bool {
|
||||||
ac.maybeReload()
|
ac.maybeReload()
|
||||||
ac.mu.Lock()
|
ac.mu.Lock()
|
||||||
defer ac.mu.Unlock()
|
defer ac.mu.Unlock()
|
||||||
return len(ac.byAddr[addr]) > 0
|
return len(ac.byAddr[addr]) > 0
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ac *addressCache) add(newAccount accounts.Account) {
|
func (ac *accountCache) add(newAccount accounts.Account) {
|
||||||
ac.mu.Lock()
|
ac.mu.Lock()
|
||||||
defer ac.mu.Unlock()
|
defer ac.mu.Unlock()
|
||||||
|
|
||||||
@ -111,18 +113,28 @@ func (ac *addressCache) add(newAccount accounts.Account) {
|
|||||||
copy(ac.all[i+1:], ac.all[i:])
|
copy(ac.all[i+1:], ac.all[i:])
|
||||||
ac.all[i] = newAccount
|
ac.all[i] = newAccount
|
||||||
ac.byAddr[newAccount.Address] = append(ac.byAddr[newAccount.Address], newAccount)
|
ac.byAddr[newAccount.Address] = append(ac.byAddr[newAccount.Address], newAccount)
|
||||||
|
|
||||||
|
select {
|
||||||
|
case ac.notify <- struct{}{}:
|
||||||
|
default:
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// note: removed needs to be unique here (i.e. both File and Address must be set).
|
// note: removed needs to be unique here (i.e. both File and Address must be set).
|
||||||
func (ac *addressCache) delete(removed accounts.Account) {
|
func (ac *accountCache) delete(removed accounts.Account) {
|
||||||
ac.mu.Lock()
|
ac.mu.Lock()
|
||||||
defer ac.mu.Unlock()
|
defer ac.mu.Unlock()
|
||||||
|
|
||||||
ac.all = removeAccount(ac.all, removed)
|
ac.all = removeAccount(ac.all, removed)
|
||||||
if ba := removeAccount(ac.byAddr[removed.Address], removed); len(ba) == 0 {
|
if ba := removeAccount(ac.byAddr[removed.Address], removed); len(ba) == 0 {
|
||||||
delete(ac.byAddr, removed.Address)
|
delete(ac.byAddr, removed.Address)
|
||||||
} else {
|
} else {
|
||||||
ac.byAddr[removed.Address] = ba
|
ac.byAddr[removed.Address] = ba
|
||||||
}
|
}
|
||||||
|
select {
|
||||||
|
case ac.notify <- struct{}{}:
|
||||||
|
default:
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func removeAccount(slice []accounts.Account, elem accounts.Account) []accounts.Account {
|
func removeAccount(slice []accounts.Account, elem accounts.Account) []accounts.Account {
|
||||||
@ -137,7 +149,7 @@ func removeAccount(slice []accounts.Account, elem accounts.Account) []accounts.A
|
|||||||
// find returns the cached account for address if there is a unique match.
|
// find returns the cached account for address if there is a unique match.
|
||||||
// The exact matching rules are explained by the documentation of accounts.Account.
|
// The exact matching rules are explained by the documentation of accounts.Account.
|
||||||
// Callers must hold ac.mu.
|
// Callers must hold ac.mu.
|
||||||
func (ac *addressCache) find(a accounts.Account) (accounts.Account, error) {
|
func (ac *accountCache) find(a accounts.Account) (accounts.Account, error) {
|
||||||
// Limit search to address candidates if possible.
|
// Limit search to address candidates if possible.
|
||||||
matches := ac.all
|
matches := ac.all
|
||||||
if (a.Address != common.Address{}) {
|
if (a.Address != common.Address{}) {
|
||||||
@ -169,9 +181,10 @@ func (ac *addressCache) find(a accounts.Account) (accounts.Account, error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ac *addressCache) maybeReload() {
|
func (ac *accountCache) maybeReload() {
|
||||||
ac.mu.Lock()
|
ac.mu.Lock()
|
||||||
defer ac.mu.Unlock()
|
defer ac.mu.Unlock()
|
||||||
|
|
||||||
if ac.watcher.running {
|
if ac.watcher.running {
|
||||||
return // A watcher is running and will keep the cache up-to-date.
|
return // A watcher is running and will keep the cache up-to-date.
|
||||||
}
|
}
|
||||||
@ -189,18 +202,22 @@ func (ac *addressCache) maybeReload() {
|
|||||||
ac.throttle.Reset(minReloadInterval)
|
ac.throttle.Reset(minReloadInterval)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ac *addressCache) close() {
|
func (ac *accountCache) close() {
|
||||||
ac.mu.Lock()
|
ac.mu.Lock()
|
||||||
ac.watcher.close()
|
ac.watcher.close()
|
||||||
if ac.throttle != nil {
|
if ac.throttle != nil {
|
||||||
ac.throttle.Stop()
|
ac.throttle.Stop()
|
||||||
}
|
}
|
||||||
|
if ac.notify != nil {
|
||||||
|
close(ac.notify)
|
||||||
|
ac.notify = nil
|
||||||
|
}
|
||||||
ac.mu.Unlock()
|
ac.mu.Unlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
// reload caches addresses of existing accounts.
|
// reload caches addresses of existing accounts.
|
||||||
// Callers must hold ac.mu.
|
// Callers must hold ac.mu.
|
||||||
func (ac *addressCache) reload() {
|
func (ac *accountCache) reload() {
|
||||||
accounts, err := ac.scan()
|
accounts, err := ac.scan()
|
||||||
if err != nil && glog.V(logger.Debug) {
|
if err != nil && glog.V(logger.Debug) {
|
||||||
glog.Errorf("can't load keys: %v", err)
|
glog.Errorf("can't load keys: %v", err)
|
||||||
@ -213,10 +230,14 @@ func (ac *addressCache) reload() {
|
|||||||
for _, a := range accounts {
|
for _, a := range accounts {
|
||||||
ac.byAddr[a.Address] = append(ac.byAddr[a.Address], a)
|
ac.byAddr[a.Address] = append(ac.byAddr[a.Address], a)
|
||||||
}
|
}
|
||||||
|
select {
|
||||||
|
case ac.notify <- struct{}{}:
|
||||||
|
default:
|
||||||
|
}
|
||||||
glog.V(logger.Debug).Infof("reloaded keys, cache has %d accounts", len(ac.all))
|
glog.V(logger.Debug).Infof("reloaded keys, cache has %d accounts", len(ac.all))
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ac *addressCache) scan() ([]accounts.Account, error) {
|
func (ac *accountCache) scan() ([]accounts.Account, error) {
|
||||||
files, err := ioutil.ReadDir(ac.keydir)
|
files, err := ioutil.ReadDir(ac.keydir)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
@ -53,11 +53,11 @@ var (
|
|||||||
func TestWatchNewFile(t *testing.T) {
|
func TestWatchNewFile(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
dir, am := tmpKeyStore(t, false)
|
dir, ks := tmpKeyStore(t, false)
|
||||||
defer os.RemoveAll(dir)
|
defer os.RemoveAll(dir)
|
||||||
|
|
||||||
// Ensure the watcher is started before adding any files.
|
// Ensure the watcher is started before adding any files.
|
||||||
am.Accounts()
|
ks.Accounts()
|
||||||
time.Sleep(200 * time.Millisecond)
|
time.Sleep(200 * time.Millisecond)
|
||||||
|
|
||||||
// Move in the files.
|
// Move in the files.
|
||||||
@ -71,11 +71,17 @@ func TestWatchNewFile(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// am should see the accounts.
|
// ks should see the accounts.
|
||||||
var list []accounts.Account
|
var list []accounts.Account
|
||||||
for d := 200 * time.Millisecond; d < 5*time.Second; d *= 2 {
|
for d := 200 * time.Millisecond; d < 5*time.Second; d *= 2 {
|
||||||
list = am.Accounts()
|
list = ks.Accounts()
|
||||||
if reflect.DeepEqual(list, wantAccounts) {
|
if reflect.DeepEqual(list, wantAccounts) {
|
||||||
|
// ks should have also received change notifications
|
||||||
|
select {
|
||||||
|
case <-ks.changes:
|
||||||
|
default:
|
||||||
|
t.Fatalf("wasn't notified of new accounts")
|
||||||
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
time.Sleep(d)
|
time.Sleep(d)
|
||||||
@ -86,12 +92,12 @@ func TestWatchNewFile(t *testing.T) {
|
|||||||
func TestWatchNoDir(t *testing.T) {
|
func TestWatchNoDir(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
// Create am but not the directory that it watches.
|
// Create ks but not the directory that it watches.
|
||||||
rand.Seed(time.Now().UnixNano())
|
rand.Seed(time.Now().UnixNano())
|
||||||
dir := filepath.Join(os.TempDir(), fmt.Sprintf("eth-keystore-watch-test-%d-%d", os.Getpid(), rand.Int()))
|
dir := filepath.Join(os.TempDir(), fmt.Sprintf("eth-keystore-watch-test-%d-%d", os.Getpid(), rand.Int()))
|
||||||
am := NewKeyStore(dir, LightScryptN, LightScryptP)
|
ks := NewKeyStore(dir, LightScryptN, LightScryptP)
|
||||||
|
|
||||||
list := am.Accounts()
|
list := ks.Accounts()
|
||||||
if len(list) > 0 {
|
if len(list) > 0 {
|
||||||
t.Error("initial account list not empty:", list)
|
t.Error("initial account list not empty:", list)
|
||||||
}
|
}
|
||||||
@ -105,12 +111,18 @@ func TestWatchNoDir(t *testing.T) {
|
|||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// am should see the account.
|
// ks should see the account.
|
||||||
wantAccounts := []accounts.Account{cachetestAccounts[0]}
|
wantAccounts := []accounts.Account{cachetestAccounts[0]}
|
||||||
wantAccounts[0].URL = file
|
wantAccounts[0].URL = file
|
||||||
for d := 200 * time.Millisecond; d < 8*time.Second; d *= 2 {
|
for d := 200 * time.Millisecond; d < 8*time.Second; d *= 2 {
|
||||||
list = am.Accounts()
|
list = ks.Accounts()
|
||||||
if reflect.DeepEqual(list, wantAccounts) {
|
if reflect.DeepEqual(list, wantAccounts) {
|
||||||
|
// ks should have also received change notifications
|
||||||
|
select {
|
||||||
|
case <-ks.changes:
|
||||||
|
default:
|
||||||
|
t.Fatalf("wasn't notified of new accounts")
|
||||||
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
time.Sleep(d)
|
time.Sleep(d)
|
||||||
@ -119,7 +131,7 @@ func TestWatchNoDir(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestCacheInitialReload(t *testing.T) {
|
func TestCacheInitialReload(t *testing.T) {
|
||||||
cache := newAddrCache(cachetestDir)
|
cache, _ := newAccountCache(cachetestDir)
|
||||||
accounts := cache.accounts()
|
accounts := cache.accounts()
|
||||||
if !reflect.DeepEqual(accounts, cachetestAccounts) {
|
if !reflect.DeepEqual(accounts, cachetestAccounts) {
|
||||||
t.Fatalf("got initial accounts: %swant %s", spew.Sdump(accounts), spew.Sdump(cachetestAccounts))
|
t.Fatalf("got initial accounts: %swant %s", spew.Sdump(accounts), spew.Sdump(cachetestAccounts))
|
||||||
@ -127,7 +139,7 @@ func TestCacheInitialReload(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestCacheAddDeleteOrder(t *testing.T) {
|
func TestCacheAddDeleteOrder(t *testing.T) {
|
||||||
cache := newAddrCache("testdata/no-such-dir")
|
cache, notify := newAccountCache("testdata/no-such-dir")
|
||||||
cache.watcher.running = true // prevent unexpected reloads
|
cache.watcher.running = true // prevent unexpected reloads
|
||||||
|
|
||||||
accs := []accounts.Account{
|
accs := []accounts.Account{
|
||||||
@ -163,14 +175,24 @@ func TestCacheAddDeleteOrder(t *testing.T) {
|
|||||||
for _, a := range accs {
|
for _, a := range accs {
|
||||||
cache.add(a)
|
cache.add(a)
|
||||||
}
|
}
|
||||||
|
select {
|
||||||
|
case <-notify:
|
||||||
|
default:
|
||||||
|
t.Fatalf("notifications didn't fire for adding new accounts")
|
||||||
|
}
|
||||||
// Add some of them twice to check that they don't get reinserted.
|
// Add some of them twice to check that they don't get reinserted.
|
||||||
cache.add(accs[0])
|
cache.add(accs[0])
|
||||||
cache.add(accs[2])
|
cache.add(accs[2])
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-notify:
|
||||||
|
t.Fatalf("notifications fired for adding existing accounts")
|
||||||
|
default:
|
||||||
|
}
|
||||||
// Check that the account list is sorted by filename.
|
// Check that the account list is sorted by filename.
|
||||||
wantAccounts := make([]accounts.Account, len(accs))
|
wantAccounts := make([]accounts.Account, len(accs))
|
||||||
copy(wantAccounts, accs)
|
copy(wantAccounts, accs)
|
||||||
sort.Sort(accountsByFile(wantAccounts))
|
sort.Sort(accountsByURL(wantAccounts))
|
||||||
list := cache.accounts()
|
list := cache.accounts()
|
||||||
if !reflect.DeepEqual(list, wantAccounts) {
|
if !reflect.DeepEqual(list, wantAccounts) {
|
||||||
t.Fatalf("got accounts: %s\nwant %s", spew.Sdump(accs), spew.Sdump(wantAccounts))
|
t.Fatalf("got accounts: %s\nwant %s", spew.Sdump(accs), spew.Sdump(wantAccounts))
|
||||||
@ -190,6 +212,11 @@ func TestCacheAddDeleteOrder(t *testing.T) {
|
|||||||
}
|
}
|
||||||
cache.delete(accounts.Account{Address: common.HexToAddress("fd9bd350f08ee3c0c19b85a8e16114a11a60aa4e"), URL: "something"})
|
cache.delete(accounts.Account{Address: common.HexToAddress("fd9bd350f08ee3c0c19b85a8e16114a11a60aa4e"), URL: "something"})
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-notify:
|
||||||
|
default:
|
||||||
|
t.Fatalf("notifications didn't fire for deleting accounts")
|
||||||
|
}
|
||||||
// Check content again after deletion.
|
// Check content again after deletion.
|
||||||
wantAccountsAfterDelete := []accounts.Account{
|
wantAccountsAfterDelete := []accounts.Account{
|
||||||
wantAccounts[1],
|
wantAccounts[1],
|
||||||
@ -212,7 +239,7 @@ func TestCacheAddDeleteOrder(t *testing.T) {
|
|||||||
|
|
||||||
func TestCacheFind(t *testing.T) {
|
func TestCacheFind(t *testing.T) {
|
||||||
dir := filepath.Join("testdata", "dir")
|
dir := filepath.Join("testdata", "dir")
|
||||||
cache := newAddrCache(dir)
|
cache, _ := newAccountCache(dir)
|
||||||
cache.watcher.running = true // prevent unexpected reloads
|
cache.watcher.running = true // prevent unexpected reloads
|
||||||
|
|
||||||
accs := []accounts.Account{
|
accs := []accounts.Account{
|
@ -37,23 +37,34 @@ import (
|
|||||||
"github.com/ethereum/go-ethereum/common"
|
"github.com/ethereum/go-ethereum/common"
|
||||||
"github.com/ethereum/go-ethereum/core/types"
|
"github.com/ethereum/go-ethereum/core/types"
|
||||||
"github.com/ethereum/go-ethereum/crypto"
|
"github.com/ethereum/go-ethereum/crypto"
|
||||||
|
"github.com/ethereum/go-ethereum/event"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
ErrNeedPasswordOrUnlock = accounts.NewAuthNeededError("password or unlock")
|
ErrLocked = accounts.NewAuthNeededError("password or unlock")
|
||||||
ErrNoMatch = errors.New("no key for given address or file")
|
ErrNoMatch = errors.New("no key for given address or file")
|
||||||
ErrDecrypt = errors.New("could not decrypt key with given passphrase")
|
ErrDecrypt = errors.New("could not decrypt key with given passphrase")
|
||||||
)
|
)
|
||||||
|
|
||||||
// BackendType can be used to query the account manager for encrypted keystores.
|
// KeyStoreType is the reflect type of a keystore backend.
|
||||||
var BackendType = reflect.TypeOf(new(KeyStore))
|
var KeyStoreType = reflect.TypeOf(&KeyStore{})
|
||||||
|
|
||||||
|
// Maximum time between wallet refreshes (if filesystem notifications don't work).
|
||||||
|
const walletRefreshCycle = 3 * time.Second
|
||||||
|
|
||||||
// KeyStore manages a key storage directory on disk.
|
// KeyStore manages a key storage directory on disk.
|
||||||
type KeyStore struct {
|
type KeyStore struct {
|
||||||
cache *addressCache
|
storage keyStore // Storage backend, might be cleartext or encrypted
|
||||||
keyStore keyStore
|
cache *accountCache // In-memory account cache over the filesystem storage
|
||||||
mu sync.RWMutex
|
changes chan struct{} // Channel receiving change notifications from the cache
|
||||||
unlocked map[common.Address]*unlocked
|
unlocked map[common.Address]*unlocked // Currently unlocked account (decrypted private keys)
|
||||||
|
|
||||||
|
wallets []accounts.Wallet // Wallet wrappers around the individual key files
|
||||||
|
updateFeed event.Feed // Event feed to notify wallet additions/removals
|
||||||
|
updateScope event.SubscriptionScope // Subscription scope tracking current live listeners
|
||||||
|
updating bool // Whether the event notification loop is running
|
||||||
|
|
||||||
|
mu sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
type unlocked struct {
|
type unlocked struct {
|
||||||
@ -64,7 +75,7 @@ type unlocked struct {
|
|||||||
// NewKeyStore creates a keystore for the given directory.
|
// NewKeyStore creates a keystore for the given directory.
|
||||||
func NewKeyStore(keydir string, scryptN, scryptP int) *KeyStore {
|
func NewKeyStore(keydir string, scryptN, scryptP int) *KeyStore {
|
||||||
keydir, _ = filepath.Abs(keydir)
|
keydir, _ = filepath.Abs(keydir)
|
||||||
ks := &KeyStore{keyStore: &keyStorePassphrase{keydir, scryptN, scryptP}}
|
ks := &KeyStore{storage: &keyStorePassphrase{keydir, scryptN, scryptP}}
|
||||||
ks.init(keydir)
|
ks.init(keydir)
|
||||||
return ks
|
return ks
|
||||||
}
|
}
|
||||||
@ -73,20 +84,136 @@ func NewKeyStore(keydir string, scryptN, scryptP int) *KeyStore {
|
|||||||
// Deprecated: Use NewKeyStore.
|
// Deprecated: Use NewKeyStore.
|
||||||
func NewPlaintextKeyStore(keydir string) *KeyStore {
|
func NewPlaintextKeyStore(keydir string) *KeyStore {
|
||||||
keydir, _ = filepath.Abs(keydir)
|
keydir, _ = filepath.Abs(keydir)
|
||||||
ks := &KeyStore{keyStore: &keyStorePlain{keydir}}
|
ks := &KeyStore{storage: &keyStorePlain{keydir}}
|
||||||
ks.init(keydir)
|
ks.init(keydir)
|
||||||
return ks
|
return ks
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ks *KeyStore) init(keydir string) {
|
func (ks *KeyStore) init(keydir string) {
|
||||||
|
// Lock the mutex since the account cache might call back with events
|
||||||
|
ks.mu.Lock()
|
||||||
|
defer ks.mu.Unlock()
|
||||||
|
|
||||||
|
// Initialize the set of unlocked keys and the account cache
|
||||||
ks.unlocked = make(map[common.Address]*unlocked)
|
ks.unlocked = make(map[common.Address]*unlocked)
|
||||||
ks.cache = newAddrCache(keydir)
|
ks.cache, ks.changes = newAccountCache(keydir)
|
||||||
|
|
||||||
// TODO: In order for this finalizer to work, there must be no references
|
// TODO: In order for this finalizer to work, there must be no references
|
||||||
// to ks. addressCache doesn't keep a reference but unlocked keys do,
|
// to ks. addressCache doesn't keep a reference but unlocked keys do,
|
||||||
// so the finalizer will not trigger until all timed unlocks have expired.
|
// so the finalizer will not trigger until all timed unlocks have expired.
|
||||||
runtime.SetFinalizer(ks, func(m *KeyStore) {
|
runtime.SetFinalizer(ks, func(m *KeyStore) {
|
||||||
m.cache.close()
|
m.cache.close()
|
||||||
})
|
})
|
||||||
|
// Create the initial list of wallets from the cache
|
||||||
|
accs := ks.cache.accounts()
|
||||||
|
ks.wallets = make([]accounts.Wallet, len(accs))
|
||||||
|
for i := 0; i < len(accs); i++ {
|
||||||
|
ks.wallets[i] = &keystoreWallet{account: accs[i], keystore: ks}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wallets implements accounts.Backend, returning all single-key wallets from the
|
||||||
|
// keystore directory.
|
||||||
|
func (ks *KeyStore) Wallets() []accounts.Wallet {
|
||||||
|
// Make sure the list of wallets is in sync with the account cache
|
||||||
|
ks.refreshWallets()
|
||||||
|
|
||||||
|
ks.mu.RLock()
|
||||||
|
defer ks.mu.RUnlock()
|
||||||
|
|
||||||
|
cpy := make([]accounts.Wallet, len(ks.wallets))
|
||||||
|
copy(cpy, ks.wallets)
|
||||||
|
return cpy
|
||||||
|
}
|
||||||
|
|
||||||
|
// refreshWallets retrieves the current account list and based on that does any
|
||||||
|
// necessary wallet refreshes.
|
||||||
|
func (ks *KeyStore) refreshWallets() {
|
||||||
|
// Retrieve the current list of accounts
|
||||||
|
accs := ks.cache.accounts()
|
||||||
|
|
||||||
|
// Transform the current list of wallets into the new one
|
||||||
|
ks.mu.Lock()
|
||||||
|
|
||||||
|
wallets := make([]accounts.Wallet, 0, len(accs))
|
||||||
|
events := []accounts.WalletEvent{}
|
||||||
|
|
||||||
|
for _, account := range accs {
|
||||||
|
// Drop wallets while they were in front of the next account
|
||||||
|
for len(ks.wallets) > 0 && ks.wallets[0].URL() < account.URL {
|
||||||
|
events = append(events, accounts.WalletEvent{Wallet: ks.wallets[0], Arrive: false})
|
||||||
|
ks.wallets = ks.wallets[1:]
|
||||||
|
}
|
||||||
|
// If there are no more wallets or the account is before the next, wrap new wallet
|
||||||
|
if len(ks.wallets) == 0 || ks.wallets[0].URL() > account.URL {
|
||||||
|
wallet := &keystoreWallet{account: account, keystore: ks}
|
||||||
|
|
||||||
|
events = append(events, accounts.WalletEvent{Wallet: wallet, Arrive: true})
|
||||||
|
wallets = append(wallets, wallet)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// If the account is the same as the first wallet, keep it
|
||||||
|
if ks.wallets[0].Accounts()[0] == account {
|
||||||
|
wallets = append(wallets, ks.wallets[0])
|
||||||
|
ks.wallets = ks.wallets[1:]
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Drop any leftover wallets and set the new batch
|
||||||
|
for _, wallet := range ks.wallets {
|
||||||
|
events = append(events, accounts.WalletEvent{Wallet: wallet, Arrive: false})
|
||||||
|
}
|
||||||
|
ks.wallets = wallets
|
||||||
|
ks.mu.Unlock()
|
||||||
|
|
||||||
|
// Fire all wallet events and return
|
||||||
|
for _, event := range events {
|
||||||
|
ks.updateFeed.Send(event)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Subscribe implements accounts.Backend, creating an async subscription to
|
||||||
|
// receive notifications on the addition or removal of keystore wallets.
|
||||||
|
func (ks *KeyStore) Subscribe(sink chan<- accounts.WalletEvent) event.Subscription {
|
||||||
|
// We need the mutex to reliably start/stop the update loop
|
||||||
|
ks.mu.Lock()
|
||||||
|
defer ks.mu.Unlock()
|
||||||
|
|
||||||
|
// Subscribe the caller and track the subscriber count
|
||||||
|
sub := ks.updateScope.Track(ks.updateFeed.Subscribe(sink))
|
||||||
|
|
||||||
|
// Subscribers require an active notification loop, start it
|
||||||
|
if !ks.updating {
|
||||||
|
ks.updating = true
|
||||||
|
go ks.updater()
|
||||||
|
}
|
||||||
|
return sub
|
||||||
|
}
|
||||||
|
|
||||||
|
// updater is responsible for maintaining an up-to-date list of wallets stored in
|
||||||
|
// the keystore, and for firing wallet addition/removal events. It listens for
|
||||||
|
// account change events from the underlying account cache, and also periodically
|
||||||
|
// forces a manual refresh (only triggers for systems where the filesystem notifier
|
||||||
|
// is not running).
|
||||||
|
func (ks *KeyStore) updater() {
|
||||||
|
for {
|
||||||
|
// Wait for an account update or a refresh timeout
|
||||||
|
select {
|
||||||
|
case <-ks.changes:
|
||||||
|
case <-time.After(walletRefreshCycle):
|
||||||
|
}
|
||||||
|
// Run the wallet refresher
|
||||||
|
ks.refreshWallets()
|
||||||
|
|
||||||
|
// If all our subscribers left, stop the updater
|
||||||
|
ks.mu.Lock()
|
||||||
|
if ks.updateScope.Count() == 0 {
|
||||||
|
ks.updating = false
|
||||||
|
ks.mu.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ks.mu.Unlock()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// HasAddress reports whether a key with the given address is present.
|
// HasAddress reports whether a key with the given address is present.
|
||||||
@ -118,6 +245,7 @@ func (ks *KeyStore) Delete(a accounts.Account, passphrase string) error {
|
|||||||
err = os.Remove(a.URL)
|
err = os.Remove(a.URL)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
ks.cache.delete(a)
|
ks.cache.delete(a)
|
||||||
|
ks.refreshWallets()
|
||||||
}
|
}
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@ -131,7 +259,7 @@ func (ks *KeyStore) SignHash(a accounts.Account, hash []byte) ([]byte, error) {
|
|||||||
|
|
||||||
unlockedKey, found := ks.unlocked[a.Address]
|
unlockedKey, found := ks.unlocked[a.Address]
|
||||||
if !found {
|
if !found {
|
||||||
return nil, ErrNeedPasswordOrUnlock
|
return nil, ErrLocked
|
||||||
}
|
}
|
||||||
// Sign the hash using plain ECDSA operations
|
// Sign the hash using plain ECDSA operations
|
||||||
return crypto.Sign(hash, unlockedKey.PrivateKey)
|
return crypto.Sign(hash, unlockedKey.PrivateKey)
|
||||||
@ -145,7 +273,7 @@ func (ks *KeyStore) SignTx(a accounts.Account, tx *types.Transaction, chainID *b
|
|||||||
|
|
||||||
unlockedKey, found := ks.unlocked[a.Address]
|
unlockedKey, found := ks.unlocked[a.Address]
|
||||||
if !found {
|
if !found {
|
||||||
return nil, ErrNeedPasswordOrUnlock
|
return nil, ErrLocked
|
||||||
}
|
}
|
||||||
// Depending on the presence of the chain ID, sign with EIP155 or homestead
|
// Depending on the presence of the chain ID, sign with EIP155 or homestead
|
||||||
if chainID != nil {
|
if chainID != nil {
|
||||||
@ -221,10 +349,9 @@ func (ks *KeyStore) TimedUnlock(a accounts.Account, passphrase string, timeout t
|
|||||||
// it with a timeout would be confusing.
|
// it with a timeout would be confusing.
|
||||||
zeroKey(key.PrivateKey)
|
zeroKey(key.PrivateKey)
|
||||||
return nil
|
return nil
|
||||||
} else {
|
|
||||||
// Terminate the expire goroutine and replace it below.
|
|
||||||
close(u.abort)
|
|
||||||
}
|
}
|
||||||
|
// Terminate the expire goroutine and replace it below.
|
||||||
|
close(u.abort)
|
||||||
}
|
}
|
||||||
if timeout > 0 {
|
if timeout > 0 {
|
||||||
u = &unlocked{Key: key, abort: make(chan struct{})}
|
u = &unlocked{Key: key, abort: make(chan struct{})}
|
||||||
@ -250,7 +377,7 @@ func (ks *KeyStore) getDecryptedKey(a accounts.Account, auth string) (accounts.A
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return a, nil, err
|
return a, nil, err
|
||||||
}
|
}
|
||||||
key, err := ks.keyStore.GetKey(a.Address, a.URL, auth)
|
key, err := ks.storage.GetKey(a.Address, a.URL, auth)
|
||||||
return a, key, err
|
return a, key, err
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -277,13 +404,14 @@ func (ks *KeyStore) expire(addr common.Address, u *unlocked, timeout time.Durati
|
|||||||
// NewAccount generates a new key and stores it into the key directory,
|
// NewAccount generates a new key and stores it into the key directory,
|
||||||
// encrypting it with the passphrase.
|
// encrypting it with the passphrase.
|
||||||
func (ks *KeyStore) NewAccount(passphrase string) (accounts.Account, error) {
|
func (ks *KeyStore) NewAccount(passphrase string) (accounts.Account, error) {
|
||||||
_, account, err := storeNewKey(ks.keyStore, crand.Reader, passphrase)
|
_, account, err := storeNewKey(ks.storage, crand.Reader, passphrase)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return accounts.Account{}, err
|
return accounts.Account{}, err
|
||||||
}
|
}
|
||||||
// Add the account to the cache immediately rather
|
// Add the account to the cache immediately rather
|
||||||
// than waiting for file system notifications to pick it up.
|
// than waiting for file system notifications to pick it up.
|
||||||
ks.cache.add(account)
|
ks.cache.add(account)
|
||||||
|
ks.refreshWallets()
|
||||||
return account, nil
|
return account, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -294,7 +422,7 @@ func (ks *KeyStore) Export(a accounts.Account, passphrase, newPassphrase string)
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
var N, P int
|
var N, P int
|
||||||
if store, ok := ks.keyStore.(*keyStorePassphrase); ok {
|
if store, ok := ks.storage.(*keyStorePassphrase); ok {
|
||||||
N, P = store.scryptN, store.scryptP
|
N, P = store.scryptN, store.scryptP
|
||||||
} else {
|
} else {
|
||||||
N, P = StandardScryptN, StandardScryptP
|
N, P = StandardScryptN, StandardScryptP
|
||||||
@ -325,11 +453,12 @@ func (ks *KeyStore) ImportECDSA(priv *ecdsa.PrivateKey, passphrase string) (acco
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (ks *KeyStore) importKey(key *Key, passphrase string) (accounts.Account, error) {
|
func (ks *KeyStore) importKey(key *Key, passphrase string) (accounts.Account, error) {
|
||||||
a := accounts.Account{Address: key.Address, URL: ks.keyStore.JoinPath(keyFileName(key.Address))}
|
a := accounts.Account{Address: key.Address, URL: ks.storage.JoinPath(keyFileName(key.Address))}
|
||||||
if err := ks.keyStore.StoreKey(a.URL, key, passphrase); err != nil {
|
if err := ks.storage.StoreKey(a.URL, key, passphrase); err != nil {
|
||||||
return accounts.Account{}, err
|
return accounts.Account{}, err
|
||||||
}
|
}
|
||||||
ks.cache.add(a)
|
ks.cache.add(a)
|
||||||
|
ks.refreshWallets()
|
||||||
return a, nil
|
return a, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -339,17 +468,18 @@ func (ks *KeyStore) Update(a accounts.Account, passphrase, newPassphrase string)
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
return ks.keyStore.StoreKey(a.URL, key, newPassphrase)
|
return ks.storage.StoreKey(a.URL, key, newPassphrase)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ImportPreSaleKey decrypts the given Ethereum presale wallet and stores
|
// ImportPreSaleKey decrypts the given Ethereum presale wallet and stores
|
||||||
// a key file in the key directory. The key file is encrypted with the same passphrase.
|
// a key file in the key directory. The key file is encrypted with the same passphrase.
|
||||||
func (ks *KeyStore) ImportPreSaleKey(keyJSON []byte, passphrase string) (accounts.Account, error) {
|
func (ks *KeyStore) ImportPreSaleKey(keyJSON []byte, passphrase string) (accounts.Account, error) {
|
||||||
a, _, err := importPreSaleKey(ks.keyStore, keyJSON, passphrase)
|
a, _, err := importPreSaleKey(ks.storage, keyJSON, passphrase)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return a, err
|
return a, err
|
||||||
}
|
}
|
||||||
ks.cache.add(a)
|
ks.cache.add(a)
|
||||||
|
ks.refreshWallets()
|
||||||
return a, nil
|
return a, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -18,14 +18,17 @@ package keystore
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
"math/rand"
|
||||||
"os"
|
"os"
|
||||||
"runtime"
|
"runtime"
|
||||||
|
"sort"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/ethereum/go-ethereum/accounts"
|
"github.com/ethereum/go-ethereum/accounts"
|
||||||
"github.com/ethereum/go-ethereum/common"
|
"github.com/ethereum/go-ethereum/common"
|
||||||
|
"github.com/ethereum/go-ethereum/event"
|
||||||
)
|
)
|
||||||
|
|
||||||
var testSigData = make([]byte, 32)
|
var testSigData = make([]byte, 32)
|
||||||
@ -122,8 +125,8 @@ func TestTimedUnlock(t *testing.T) {
|
|||||||
|
|
||||||
// Signing without passphrase fails because account is locked
|
// Signing without passphrase fails because account is locked
|
||||||
_, err = ks.SignHash(accounts.Account{Address: a1.Address}, testSigData)
|
_, err = ks.SignHash(accounts.Account{Address: a1.Address}, testSigData)
|
||||||
if err != ErrNeedPasswordOrUnlock {
|
if err != ErrLocked {
|
||||||
t.Fatal("Signing should've failed with ErrNeedPasswordOrUnlock before unlocking, got ", err)
|
t.Fatal("Signing should've failed with ErrLocked before unlocking, got ", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Signing with passphrase works
|
// Signing with passphrase works
|
||||||
@ -140,8 +143,8 @@ func TestTimedUnlock(t *testing.T) {
|
|||||||
// Signing fails again after automatic locking
|
// Signing fails again after automatic locking
|
||||||
time.Sleep(250 * time.Millisecond)
|
time.Sleep(250 * time.Millisecond)
|
||||||
_, err = ks.SignHash(accounts.Account{Address: a1.Address}, testSigData)
|
_, err = ks.SignHash(accounts.Account{Address: a1.Address}, testSigData)
|
||||||
if err != ErrNeedPasswordOrUnlock {
|
if err != ErrLocked {
|
||||||
t.Fatal("Signing should've failed with ErrNeedPasswordOrUnlock timeout expired, got ", err)
|
t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -180,8 +183,8 @@ func TestOverrideUnlock(t *testing.T) {
|
|||||||
// Signing fails again after automatic locking
|
// Signing fails again after automatic locking
|
||||||
time.Sleep(250 * time.Millisecond)
|
time.Sleep(250 * time.Millisecond)
|
||||||
_, err = ks.SignHash(accounts.Account{Address: a1.Address}, testSigData)
|
_, err = ks.SignHash(accounts.Account{Address: a1.Address}, testSigData)
|
||||||
if err != ErrNeedPasswordOrUnlock {
|
if err != ErrLocked {
|
||||||
t.Fatal("Signing should've failed with ErrNeedPasswordOrUnlock timeout expired, got ", err)
|
t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -201,7 +204,7 @@ func TestSignRace(t *testing.T) {
|
|||||||
}
|
}
|
||||||
end := time.Now().Add(500 * time.Millisecond)
|
end := time.Now().Add(500 * time.Millisecond)
|
||||||
for time.Now().Before(end) {
|
for time.Now().Before(end) {
|
||||||
if _, err := ks.SignHash(accounts.Account{Address: a1.Address}, testSigData); err == ErrNeedPasswordOrUnlock {
|
if _, err := ks.SignHash(accounts.Account{Address: a1.Address}, testSigData); err == ErrLocked {
|
||||||
return
|
return
|
||||||
} else if err != nil {
|
} else if err != nil {
|
||||||
t.Errorf("Sign error: %v", err)
|
t.Errorf("Sign error: %v", err)
|
||||||
@ -212,6 +215,145 @@ func TestSignRace(t *testing.T) {
|
|||||||
t.Errorf("Account did not lock within the timeout")
|
t.Errorf("Account did not lock within the timeout")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Tests that the wallet notifier loop starts and stops correctly based on the
|
||||||
|
// addition and removal of wallet event subscriptions.
|
||||||
|
func TestWalletNotifierLifecycle(t *testing.T) {
|
||||||
|
// Create a temporary kesytore to test with
|
||||||
|
dir, ks := tmpKeyStore(t, false)
|
||||||
|
defer os.RemoveAll(dir)
|
||||||
|
|
||||||
|
// Ensure that the notification updater is not running yet
|
||||||
|
time.Sleep(250 * time.Millisecond)
|
||||||
|
ks.mu.RLock()
|
||||||
|
updating := ks.updating
|
||||||
|
ks.mu.RUnlock()
|
||||||
|
|
||||||
|
if updating {
|
||||||
|
t.Errorf("wallet notifier running without subscribers")
|
||||||
|
}
|
||||||
|
// Subscribe to the wallet feed and ensure the updater boots up
|
||||||
|
updates := make(chan accounts.WalletEvent)
|
||||||
|
|
||||||
|
subs := make([]event.Subscription, 2)
|
||||||
|
for i := 0; i < len(subs); i++ {
|
||||||
|
// Create a new subscription
|
||||||
|
subs[i] = ks.Subscribe(updates)
|
||||||
|
|
||||||
|
// Ensure the notifier comes online
|
||||||
|
time.Sleep(250 * time.Millisecond)
|
||||||
|
ks.mu.RLock()
|
||||||
|
updating = ks.updating
|
||||||
|
ks.mu.RUnlock()
|
||||||
|
|
||||||
|
if !updating {
|
||||||
|
t.Errorf("sub %d: wallet notifier not running after subscription", i)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Unsubscribe and ensure the updater terminates eventually
|
||||||
|
for i := 0; i < len(subs); i++ {
|
||||||
|
// Close an existing subscription
|
||||||
|
subs[i].Unsubscribe()
|
||||||
|
|
||||||
|
// Ensure the notifier shuts down at and only at the last close
|
||||||
|
for k := 0; k < int(walletRefreshCycle/(250*time.Millisecond))+2; k++ {
|
||||||
|
ks.mu.RLock()
|
||||||
|
updating = ks.updating
|
||||||
|
ks.mu.RUnlock()
|
||||||
|
|
||||||
|
if i < len(subs)-1 && !updating {
|
||||||
|
t.Fatalf("sub %d: event notifier stopped prematurely", i)
|
||||||
|
}
|
||||||
|
if i == len(subs)-1 && !updating {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
time.Sleep(250 * time.Millisecond)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
t.Errorf("wallet notifier didn't terminate after unsubscribe")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Tests that wallet notifications and correctly fired when accounts are added
|
||||||
|
// or deleted from the keystore.
|
||||||
|
func TestWalletNotifications(t *testing.T) {
|
||||||
|
// Create a temporary kesytore to test with
|
||||||
|
dir, ks := tmpKeyStore(t, false)
|
||||||
|
defer os.RemoveAll(dir)
|
||||||
|
|
||||||
|
// Subscribe to the wallet feed
|
||||||
|
updates := make(chan accounts.WalletEvent, 1)
|
||||||
|
sub := ks.Subscribe(updates)
|
||||||
|
defer sub.Unsubscribe()
|
||||||
|
|
||||||
|
// Randomly add and remove account and make sure events and wallets are in sync
|
||||||
|
live := make(map[common.Address]accounts.Account)
|
||||||
|
for i := 0; i < 1024; i++ {
|
||||||
|
// Execute a creation or deletion and ensure event arrival
|
||||||
|
if create := len(live) == 0 || rand.Int()%4 > 0; create {
|
||||||
|
// Add a new account and ensure wallet notifications arrives
|
||||||
|
account, err := ks.NewAccount("")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("failed to create test account: %v", err)
|
||||||
|
}
|
||||||
|
select {
|
||||||
|
case event := <-updates:
|
||||||
|
if !event.Arrive {
|
||||||
|
t.Errorf("departure event on account creation")
|
||||||
|
}
|
||||||
|
if event.Wallet.Accounts()[0] != account {
|
||||||
|
t.Errorf("account mismatch on created wallet: have %v, want %v", event.Wallet.Accounts()[0], account)
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
t.Errorf("wallet arrival event not fired on account creation")
|
||||||
|
}
|
||||||
|
live[account.Address] = account
|
||||||
|
} else {
|
||||||
|
// Select a random account to delete (crude, but works)
|
||||||
|
var account accounts.Account
|
||||||
|
for _, a := range live {
|
||||||
|
account = a
|
||||||
|
break
|
||||||
|
}
|
||||||
|
// Remove an account and ensure wallet notifiaction arrives
|
||||||
|
if err := ks.Delete(account, ""); err != nil {
|
||||||
|
t.Fatalf("failed to delete test account: %v", err)
|
||||||
|
}
|
||||||
|
select {
|
||||||
|
case event := <-updates:
|
||||||
|
if event.Arrive {
|
||||||
|
t.Errorf("arrival event on account deletion")
|
||||||
|
}
|
||||||
|
if event.Wallet.Accounts()[0] != account {
|
||||||
|
t.Errorf("account mismatch on deleted wallet: have %v, want %v", event.Wallet.Accounts()[0], account)
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
t.Errorf("wallet departure event not fired on account creation")
|
||||||
|
}
|
||||||
|
delete(live, account.Address)
|
||||||
|
}
|
||||||
|
// Retrieve the list of wallets and ensure it matches with our required live set
|
||||||
|
liveList := make([]accounts.Account, 0, len(live))
|
||||||
|
for _, account := range live {
|
||||||
|
liveList = append(liveList, account)
|
||||||
|
}
|
||||||
|
sort.Sort(accountsByURL(liveList))
|
||||||
|
|
||||||
|
wallets := ks.Wallets()
|
||||||
|
if len(liveList) != len(wallets) {
|
||||||
|
t.Errorf("wallet list doesn't match required accounts: have %v, want %v", wallets, liveList)
|
||||||
|
} else {
|
||||||
|
for j, wallet := range wallets {
|
||||||
|
if accs := wallet.Accounts(); len(accs) != 1 {
|
||||||
|
t.Errorf("wallet %d: contains invalid number of accounts: have %d, want 1", j, len(accs))
|
||||||
|
} else if accs[0] != liveList[j] {
|
||||||
|
t.Errorf("wallet %d: account mismatch: have %v, want %v", j, accs[0], liveList[j])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Sleep a bit to avoid same-timestamp keyfiles
|
||||||
|
time.Sleep(10 * time.Millisecond)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func tmpKeyStore(t *testing.T, encrypted bool) (string, *KeyStore) {
|
func tmpKeyStore(t *testing.T, encrypted bool) (string, *KeyStore) {
|
||||||
d, err := ioutil.TempDir("", "eth-keystore-test")
|
d, err := ioutil.TempDir("", "eth-keystore-test")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
133
accounts/keystore/keystore_wallet.go
Normal file
133
accounts/keystore/keystore_wallet.go
Normal file
@ -0,0 +1,133 @@
|
|||||||
|
// Copyright 2017 The go-ethereum Authors
|
||||||
|
// This file is part of the go-ethereum library.
|
||||||
|
//
|
||||||
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Lesser General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Lesser General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Lesser General Public License
|
||||||
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package keystore
|
||||||
|
|
||||||
|
import (
|
||||||
|
"math/big"
|
||||||
|
|
||||||
|
"github.com/ethereum/go-ethereum/accounts"
|
||||||
|
"github.com/ethereum/go-ethereum/core/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
// keystoreWallet implements the accounts.Wallet interface for the original
|
||||||
|
// keystore.
|
||||||
|
type keystoreWallet struct {
|
||||||
|
account accounts.Account // Single account contained in this wallet
|
||||||
|
keystore *KeyStore // Keystore where the account originates from
|
||||||
|
}
|
||||||
|
|
||||||
|
// Type implements accounts.Wallet, returning the textual type of the wallet.
|
||||||
|
func (w *keystoreWallet) Type() string {
|
||||||
|
return "secret-storage"
|
||||||
|
}
|
||||||
|
|
||||||
|
// URL implements accounts.Wallet, returning the URL of the account within.
|
||||||
|
func (w *keystoreWallet) URL() string {
|
||||||
|
return w.account.URL
|
||||||
|
}
|
||||||
|
|
||||||
|
// Status implements accounts.Wallet, always returning "open", since there is no
|
||||||
|
// concept of open/close for plain keystore accounts.
|
||||||
|
func (w *keystoreWallet) Status() string {
|
||||||
|
return "Open"
|
||||||
|
}
|
||||||
|
|
||||||
|
// Open implements accounts.Wallet, but is a noop for plain wallets since there
|
||||||
|
// is no connection or decryption step necessary to access the list of accounts.
|
||||||
|
func (w *keystoreWallet) Open(passphrase string) error { return nil }
|
||||||
|
|
||||||
|
// Close implements accounts.Wallet, but is a noop for plain wallets since is no
|
||||||
|
// meaningful open operation.
|
||||||
|
func (w *keystoreWallet) Close() error { return nil }
|
||||||
|
|
||||||
|
// Accounts implements accounts.Wallet, returning an account list consisting of
|
||||||
|
// a single account that the plain kestore wallet contains.
|
||||||
|
func (w *keystoreWallet) Accounts() []accounts.Account {
|
||||||
|
return []accounts.Account{w.account}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Contains implements accounts.Wallet, returning whether a particular account is
|
||||||
|
// or is not wrapped by this wallet instance.
|
||||||
|
func (w *keystoreWallet) Contains(account accounts.Account) bool {
|
||||||
|
return account.Address == w.account.Address && (account.URL == "" || account.URL == w.account.URL)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Derive implements accounts.Wallet, but is a noop for plain wallets since there
|
||||||
|
// is no notion of hierarchical account derivation for plain keystore accounts.
|
||||||
|
func (w *keystoreWallet) Derive(path string, pin bool) (accounts.Account, error) {
|
||||||
|
return accounts.Account{}, accounts.ErrNotSupported
|
||||||
|
}
|
||||||
|
|
||||||
|
// SignHash implements accounts.Wallet, attempting to sign the given hash with
|
||||||
|
// the given account. If the wallet does not wrap this particular account, an
|
||||||
|
// error is returned to avoid account leakage (even though in theory we may be
|
||||||
|
// able to sign via our shared keystore backend).
|
||||||
|
func (w *keystoreWallet) SignHash(account accounts.Account, hash []byte) ([]byte, error) {
|
||||||
|
// Make sure the requested account is contained within
|
||||||
|
if account.Address != w.account.Address {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
if account.URL != "" && account.URL != w.account.URL {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
// Account seems valid, request the keystore to sign
|
||||||
|
return w.keystore.SignHash(account, hash)
|
||||||
|
}
|
||||||
|
|
||||||
|
// SignTx implements accounts.Wallet, attempting to sign the given transaction
|
||||||
|
// with the given account. If the wallet does not wrap this particular account,
|
||||||
|
// an error is returned to avoid account leakage (even though in theory we may
|
||||||
|
// be able to sign via our shared keystore backend).
|
||||||
|
func (w *keystoreWallet) SignTx(account accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
||||||
|
// Make sure the requested account is contained within
|
||||||
|
if account.Address != w.account.Address {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
if account.URL != "" && account.URL != w.account.URL {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
// Account seems valid, request the keystore to sign
|
||||||
|
return w.keystore.SignTx(account, tx, chainID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// SignHashWithPassphrase implements accounts.Wallet, attempting to sign the
|
||||||
|
// given hash with the given account using passphrase as extra authentication.
|
||||||
|
func (w *keystoreWallet) SignHashWithPassphrase(account accounts.Account, passphrase string, hash []byte) ([]byte, error) {
|
||||||
|
// Make sure the requested account is contained within
|
||||||
|
if account.Address != w.account.Address {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
if account.URL != "" && account.URL != w.account.URL {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
// Account seems valid, request the keystore to sign
|
||||||
|
return w.keystore.SignHashWithPassphrase(account, passphrase, hash)
|
||||||
|
}
|
||||||
|
|
||||||
|
// SignTxWithPassphrase implements accounts.Wallet, attempting to sign the given
|
||||||
|
// transaction with the given account using passphrase as extra authentication.
|
||||||
|
func (w *keystoreWallet) SignTxWithPassphrase(account accounts.Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
||||||
|
// Make sure the requested account is contained within
|
||||||
|
if account.Address != w.account.Address {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
if account.URL != "" && account.URL != w.account.URL {
|
||||||
|
return nil, accounts.ErrUnknownAccount
|
||||||
|
}
|
||||||
|
// Account seems valid, request the keystore to sign
|
||||||
|
return w.keystore.SignTxWithPassphrase(account, passphrase, tx, chainID)
|
||||||
|
}
|
@ -27,14 +27,14 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type watcher struct {
|
type watcher struct {
|
||||||
ac *addressCache
|
ac *accountCache
|
||||||
starting bool
|
starting bool
|
||||||
running bool
|
running bool
|
||||||
ev chan notify.EventInfo
|
ev chan notify.EventInfo
|
||||||
quit chan struct{}
|
quit chan struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
func newWatcher(ac *addressCache) *watcher {
|
func newWatcher(ac *accountCache) *watcher {
|
||||||
return &watcher{
|
return &watcher{
|
||||||
ac: ac,
|
ac: ac,
|
||||||
ev: make(chan notify.EventInfo, 10),
|
ev: make(chan notify.EventInfo, 10),
|
||||||
|
@ -23,6 +23,6 @@ package keystore
|
|||||||
|
|
||||||
type watcher struct{ running bool }
|
type watcher struct{ running bool }
|
||||||
|
|
||||||
func newWatcher(*addressCache) *watcher { return new(watcher) }
|
func newWatcher(*accountCache) *watcher { return new(watcher) }
|
||||||
func (*watcher) start() {}
|
func (*watcher) start() {}
|
||||||
func (*watcher) close() {}
|
func (*watcher) close() {}
|
||||||
|
194
accounts/manager.go
Normal file
194
accounts/manager.go
Normal file
@ -0,0 +1,194 @@
|
|||||||
|
// Copyright 2017 The go-ethereum Authors
|
||||||
|
// This file is part of the go-ethereum library.
|
||||||
|
//
|
||||||
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Lesser General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Lesser General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Lesser General Public License
|
||||||
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package accounts
|
||||||
|
|
||||||
|
import (
|
||||||
|
"reflect"
|
||||||
|
"sort"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"github.com/ethereum/go-ethereum/event"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Manager is an overarching account manager that can communicate with various
|
||||||
|
// backends for signing transactions.
|
||||||
|
type Manager struct {
|
||||||
|
backends map[reflect.Type][]Backend // Index of backends currently registered
|
||||||
|
updaters []event.Subscription // Wallet update subscriptions for all backends
|
||||||
|
updates chan WalletEvent // Subscription sink for backend wallet changes
|
||||||
|
wallets []Wallet // Cache of all wallets from all registered backends
|
||||||
|
|
||||||
|
feed event.Feed // Wallet feed notifying of arrivals/departures
|
||||||
|
|
||||||
|
quit chan chan error
|
||||||
|
lock sync.RWMutex
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewManager creates a generic account manager to sign transaction via various
|
||||||
|
// supported backends.
|
||||||
|
func NewManager(backends ...Backend) *Manager {
|
||||||
|
// Subscribe to wallet notifications from all backends
|
||||||
|
updates := make(chan WalletEvent, 4*len(backends))
|
||||||
|
|
||||||
|
subs := make([]event.Subscription, len(backends))
|
||||||
|
for i, backend := range backends {
|
||||||
|
subs[i] = backend.Subscribe(updates)
|
||||||
|
}
|
||||||
|
// Retrieve the initial list of wallets from the backends and sort by URL
|
||||||
|
var wallets []Wallet
|
||||||
|
for _, backend := range backends {
|
||||||
|
wallets = merge(wallets, backend.Wallets()...)
|
||||||
|
}
|
||||||
|
// Assemble the account manager and return
|
||||||
|
am := &Manager{
|
||||||
|
backends: make(map[reflect.Type][]Backend),
|
||||||
|
updaters: subs,
|
||||||
|
updates: updates,
|
||||||
|
wallets: wallets,
|
||||||
|
quit: make(chan chan error),
|
||||||
|
}
|
||||||
|
for _, backend := range backends {
|
||||||
|
kind := reflect.TypeOf(backend)
|
||||||
|
am.backends[kind] = append(am.backends[kind], backend)
|
||||||
|
}
|
||||||
|
go am.update()
|
||||||
|
|
||||||
|
return am
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close terminates the account manager's internal notification processes.
|
||||||
|
func (am *Manager) Close() error {
|
||||||
|
errc := make(chan error)
|
||||||
|
am.quit <- errc
|
||||||
|
return <-errc
|
||||||
|
}
|
||||||
|
|
||||||
|
// update is the wallet event loop listening for notifications from the backends
|
||||||
|
// and updating the cache of wallets.
|
||||||
|
func (am *Manager) update() {
|
||||||
|
// Close all subscriptions when the manager terminates
|
||||||
|
defer func() {
|
||||||
|
am.lock.Lock()
|
||||||
|
for _, sub := range am.updaters {
|
||||||
|
sub.Unsubscribe()
|
||||||
|
}
|
||||||
|
am.updaters = nil
|
||||||
|
am.lock.Unlock()
|
||||||
|
}()
|
||||||
|
|
||||||
|
// Loop until termination
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case event := <-am.updates:
|
||||||
|
// Wallet event arrived, update local cache
|
||||||
|
am.lock.Lock()
|
||||||
|
if event.Arrive {
|
||||||
|
am.wallets = merge(am.wallets, event.Wallet)
|
||||||
|
} else {
|
||||||
|
am.wallets = drop(am.wallets, event.Wallet)
|
||||||
|
}
|
||||||
|
am.lock.Unlock()
|
||||||
|
|
||||||
|
// Notify any listeners of the event
|
||||||
|
am.feed.Send(event)
|
||||||
|
|
||||||
|
case errc := <-am.quit:
|
||||||
|
// Manager terminating, return
|
||||||
|
errc <- nil
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Backends retrieves the backend(s) with the given type from the account manager.
|
||||||
|
func (am *Manager) Backends(kind reflect.Type) []Backend {
|
||||||
|
return am.backends[kind]
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wallets returns all signer accounts registered under this account manager.
|
||||||
|
func (am *Manager) Wallets() []Wallet {
|
||||||
|
am.lock.RLock()
|
||||||
|
defer am.lock.RUnlock()
|
||||||
|
|
||||||
|
cpy := make([]Wallet, len(am.wallets))
|
||||||
|
copy(cpy, am.wallets)
|
||||||
|
return cpy
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wallet retrieves the wallet associated with a particular URL.
|
||||||
|
func (am *Manager) Wallet(url string) (Wallet, error) {
|
||||||
|
am.lock.RLock()
|
||||||
|
defer am.lock.RUnlock()
|
||||||
|
|
||||||
|
for _, wallet := range am.Wallets() {
|
||||||
|
if wallet.URL() == url {
|
||||||
|
return wallet, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil, ErrUnknownWallet
|
||||||
|
}
|
||||||
|
|
||||||
|
// Find attempts to locate the wallet corresponding to a specific account. Since
|
||||||
|
// accounts can be dynamically added to and removed from wallets, this method has
|
||||||
|
// a linear runtime in the number of wallets.
|
||||||
|
func (am *Manager) Find(account Account) (Wallet, error) {
|
||||||
|
am.lock.RLock()
|
||||||
|
defer am.lock.RUnlock()
|
||||||
|
|
||||||
|
for _, wallet := range am.wallets {
|
||||||
|
if wallet.Contains(account) {
|
||||||
|
return wallet, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil, ErrUnknownAccount
|
||||||
|
}
|
||||||
|
|
||||||
|
// Subscribe creates an async subscription to receive notifications when the
|
||||||
|
// manager detects the arrival or departure of a wallet from any of its backends.
|
||||||
|
func (am *Manager) Subscribe(sink chan<- WalletEvent) event.Subscription {
|
||||||
|
return am.feed.Subscribe(sink)
|
||||||
|
}
|
||||||
|
|
||||||
|
// merge is a sorted analogue of append for wallets, where the ordering of the
|
||||||
|
// origin list is preserved by inserting new wallets at the correct position.
|
||||||
|
//
|
||||||
|
// The original slice is assumed to be already sorted by URL.
|
||||||
|
func merge(slice []Wallet, wallets ...Wallet) []Wallet {
|
||||||
|
for _, wallet := range wallets {
|
||||||
|
n := sort.Search(len(slice), func(i int) bool { return slice[i].URL() >= wallet.URL() })
|
||||||
|
if n == len(slice) {
|
||||||
|
slice = append(slice, wallet)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
slice = append(slice[:n], append([]Wallet{wallet}, slice[n:]...)...)
|
||||||
|
}
|
||||||
|
return slice
|
||||||
|
}
|
||||||
|
|
||||||
|
// drop is the couterpart of merge, which looks up wallets from within the sorted
|
||||||
|
// cache and removes the ones specified.
|
||||||
|
func drop(slice []Wallet, wallets ...Wallet) []Wallet {
|
||||||
|
for _, wallet := range wallets {
|
||||||
|
n := sort.Search(len(slice), func(i int) bool { return slice[i].URL() >= wallet.URL() })
|
||||||
|
if n == len(slice) {
|
||||||
|
// Wallet not found, may happen during startup
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
slice = append(slice[:n], slice[n+1:]...)
|
||||||
|
}
|
||||||
|
return slice
|
||||||
|
}
|
205
accounts/usbwallet/ledger_hub.go
Normal file
205
accounts/usbwallet/ledger_hub.go
Normal file
@ -0,0 +1,205 @@
|
|||||||
|
// Copyright 2017 The go-ethereum Authors
|
||||||
|
// This file is part of the go-ethereum library.
|
||||||
|
//
|
||||||
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Lesser General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Lesser General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Lesser General Public License
|
||||||
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
// This file contains the implementation for interacting with the Ledger hardware
|
||||||
|
// wallets. The wire protocol spec can be found in the Ledger Blue GitHub repo:
|
||||||
|
// https://raw.githubusercontent.com/LedgerHQ/blue-app-eth/master/doc/ethapp.asc
|
||||||
|
|
||||||
|
// +build !ios
|
||||||
|
|
||||||
|
package usbwallet
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/ethereum/go-ethereum/accounts"
|
||||||
|
"github.com/ethereum/go-ethereum/event"
|
||||||
|
"github.com/karalabe/gousb/usb"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ledgerDeviceIDs are the known device IDs that Ledger wallets use.
|
||||||
|
var ledgerDeviceIDs = []deviceID{
|
||||||
|
{Vendor: 0x2c97, Product: 0x0000}, // Ledger Blue
|
||||||
|
{Vendor: 0x2c97, Product: 0x0001}, // Ledger Nano S
|
||||||
|
}
|
||||||
|
|
||||||
|
// Maximum time between wallet refreshes (if USB hotplug notifications don't work).
|
||||||
|
const ledgerRefreshCycle = time.Second
|
||||||
|
|
||||||
|
// Minimum time between wallet refreshes to avoid USB trashing.
|
||||||
|
const ledgerRefreshThrottling = 500 * time.Millisecond
|
||||||
|
|
||||||
|
// LedgerHub is a accounts.Backend that can find and handle Ledger hardware wallets.
|
||||||
|
type LedgerHub struct {
|
||||||
|
ctx *usb.Context // Context interfacing with a libusb instance
|
||||||
|
|
||||||
|
refreshed time.Time // Time instance when the list of wallets was last refreshed
|
||||||
|
wallets []accounts.Wallet // List of Ledger devices currently tracking
|
||||||
|
updateFeed event.Feed // Event feed to notify wallet additions/removals
|
||||||
|
updateScope event.SubscriptionScope // Subscription scope tracking current live listeners
|
||||||
|
updating bool // Whether the event notification loop is running
|
||||||
|
|
||||||
|
quit chan chan error
|
||||||
|
lock sync.RWMutex
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewLedgerHub creates a new hardware wallet manager for Ledger devices.
|
||||||
|
func NewLedgerHub() (*LedgerHub, error) {
|
||||||
|
// Initialize the USB library to access Ledgers through
|
||||||
|
ctx, err := usb.NewContext()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// Create the USB hub, start and return it
|
||||||
|
hub := &LedgerHub{
|
||||||
|
ctx: ctx,
|
||||||
|
quit: make(chan chan error),
|
||||||
|
}
|
||||||
|
hub.refreshWallets()
|
||||||
|
|
||||||
|
return hub, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wallets implements accounts.Backend, returning all the currently tracked USB
|
||||||
|
// devices that appear to be Ledger hardware wallets.
|
||||||
|
func (hub *LedgerHub) Wallets() []accounts.Wallet {
|
||||||
|
// Make sure the list of wallets is up to date
|
||||||
|
hub.refreshWallets()
|
||||||
|
|
||||||
|
hub.lock.RLock()
|
||||||
|
defer hub.lock.RUnlock()
|
||||||
|
|
||||||
|
cpy := make([]accounts.Wallet, len(hub.wallets))
|
||||||
|
copy(cpy, hub.wallets)
|
||||||
|
return cpy
|
||||||
|
}
|
||||||
|
|
||||||
|
// refreshWallets scans the USB devices attached to the machine and updates the
|
||||||
|
// list of wallets based on the found devices.
|
||||||
|
func (hub *LedgerHub) refreshWallets() {
|
||||||
|
// Don't scan the USB like crazy it the user fetches wallets in a loop
|
||||||
|
hub.lock.RLock()
|
||||||
|
elapsed := time.Since(hub.refreshed)
|
||||||
|
hub.lock.RUnlock()
|
||||||
|
|
||||||
|
if elapsed < ledgerRefreshThrottling {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// Retrieve the current list of Ledger devices
|
||||||
|
var devIDs []deviceID
|
||||||
|
var busIDs []uint16
|
||||||
|
|
||||||
|
hub.ctx.ListDevices(func(desc *usb.Descriptor) bool {
|
||||||
|
// Gather Ledger devices, don't connect any just yet
|
||||||
|
for _, id := range ledgerDeviceIDs {
|
||||||
|
if desc.Vendor == id.Vendor && desc.Product == id.Product {
|
||||||
|
devIDs = append(devIDs, deviceID{Vendor: desc.Vendor, Product: desc.Product})
|
||||||
|
busIDs = append(busIDs, uint16(desc.Bus)<<8+uint16(desc.Address))
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Not ledger, ignore and don't connect either
|
||||||
|
return false
|
||||||
|
})
|
||||||
|
// Transform the current list of wallets into the new one
|
||||||
|
hub.lock.Lock()
|
||||||
|
|
||||||
|
wallets := make([]accounts.Wallet, 0, len(devIDs))
|
||||||
|
events := []accounts.WalletEvent{}
|
||||||
|
|
||||||
|
for i := 0; i < len(devIDs); i++ {
|
||||||
|
devID, busID := devIDs[i], busIDs[i]
|
||||||
|
url := fmt.Sprintf("ledger://%03d:%03d", busID>>8, busID&0xff)
|
||||||
|
|
||||||
|
// Drop wallets while they were in front of the next account
|
||||||
|
for len(hub.wallets) > 0 && hub.wallets[0].URL() < url {
|
||||||
|
events = append(events, accounts.WalletEvent{Wallet: hub.wallets[0], Arrive: false})
|
||||||
|
hub.wallets = hub.wallets[1:]
|
||||||
|
}
|
||||||
|
// If there are no more wallets or the account is before the next, wrap new wallet
|
||||||
|
if len(hub.wallets) == 0 || hub.wallets[0].URL() > url {
|
||||||
|
wallet := &ledgerWallet{context: hub.ctx, hardwareID: devID, locationID: busID, url: url}
|
||||||
|
|
||||||
|
events = append(events, accounts.WalletEvent{Wallet: wallet, Arrive: true})
|
||||||
|
wallets = append(wallets, wallet)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// If the account is the same as the first wallet, keep it
|
||||||
|
if hub.wallets[0].URL() == url {
|
||||||
|
wallets = append(wallets, hub.wallets[0])
|
||||||
|
hub.wallets = hub.wallets[1:]
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Drop any leftover wallets and set the new batch
|
||||||
|
for _, wallet := range hub.wallets {
|
||||||
|
events = append(events, accounts.WalletEvent{Wallet: wallet, Arrive: false})
|
||||||
|
}
|
||||||
|
hub.refreshed = time.Now()
|
||||||
|
hub.wallets = wallets
|
||||||
|
hub.lock.Unlock()
|
||||||
|
|
||||||
|
// Fire all wallet events and return
|
||||||
|
for _, event := range events {
|
||||||
|
hub.updateFeed.Send(event)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Subscribe implements accounts.Backend, creating an async subscription to
|
||||||
|
// receive notifications on the addition or removal of Ledger wallets.
|
||||||
|
func (hub *LedgerHub) Subscribe(sink chan<- accounts.WalletEvent) event.Subscription {
|
||||||
|
// We need the mutex to reliably start/stop the update loop
|
||||||
|
hub.lock.Lock()
|
||||||
|
defer hub.lock.Unlock()
|
||||||
|
|
||||||
|
// Subscribe the caller and track the subscriber count
|
||||||
|
sub := hub.updateScope.Track(hub.updateFeed.Subscribe(sink))
|
||||||
|
|
||||||
|
// Subscribers require an active notification loop, start it
|
||||||
|
if !hub.updating {
|
||||||
|
hub.updating = true
|
||||||
|
go hub.updater()
|
||||||
|
}
|
||||||
|
return sub
|
||||||
|
}
|
||||||
|
|
||||||
|
// updater is responsible for maintaining an up-to-date list of wallets stored in
|
||||||
|
// the keystore, and for firing wallet addition/removal events. It listens for
|
||||||
|
// account change events from the underlying account cache, and also periodically
|
||||||
|
// forces a manual refresh (only triggers for systems where the filesystem notifier
|
||||||
|
// is not running).
|
||||||
|
func (hub *LedgerHub) updater() {
|
||||||
|
for {
|
||||||
|
// Wait for a USB hotplug event (not supported yet) or a refresh timeout
|
||||||
|
select {
|
||||||
|
//case <-hub.changes: // reenable on hutplug implementation
|
||||||
|
case <-time.After(ledgerRefreshCycle):
|
||||||
|
}
|
||||||
|
// Run the wallet refresher
|
||||||
|
hub.refreshWallets()
|
||||||
|
|
||||||
|
// If all our subscribers left, stop the updater
|
||||||
|
hub.lock.Lock()
|
||||||
|
if hub.updateScope.Count() == 0 {
|
||||||
|
hub.updating = false
|
||||||
|
hub.lock.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
hub.lock.Unlock()
|
||||||
|
}
|
||||||
|
}
|
@ -43,14 +43,8 @@ import (
|
|||||||
"github.com/karalabe/gousb/usb"
|
"github.com/karalabe/gousb/usb"
|
||||||
)
|
)
|
||||||
|
|
||||||
// ledgerDeviceIDs are the known device IDs that Ledger wallets use.
|
// ledgerDerivationPath is the base derivation parameters used by the wallet.
|
||||||
var ledgerDeviceIDs = []deviceID{
|
var ledgerDerivationPath = []uint32{0x80000000 + 44, 0x80000000 + 60, 0x80000000 + 0, 0}
|
||||||
{Vendor: 0x2c97, Product: 0x0000}, // Ledger Blue
|
|
||||||
{Vendor: 0x2c97, Product: 0x0001}, // Ledger Nano S
|
|
||||||
}
|
|
||||||
|
|
||||||
// ledgerDerivationPath is the key derivation parameters used by the wallet.
|
|
||||||
var ledgerDerivationPath = [4]uint32{0x80000000 + 44, 0x80000000 + 60, 0x80000000 + 0, 0}
|
|
||||||
|
|
||||||
// ledgerOpcode is an enumeration encoding the supported Ledger opcodes.
|
// ledgerOpcode is an enumeration encoding the supported Ledger opcodes.
|
||||||
type ledgerOpcode byte
|
type ledgerOpcode byte
|
||||||
@ -78,274 +72,297 @@ const (
|
|||||||
|
|
||||||
// ledgerWallet represents a live USB Ledger hardware wallet.
|
// ledgerWallet represents a live USB Ledger hardware wallet.
|
||||||
type ledgerWallet struct {
|
type ledgerWallet struct {
|
||||||
device *usb.Device // USB device advertising itself as a Ledger wallet
|
context *usb.Context // USB context to interface libusb through
|
||||||
input usb.Endpoint // Input endpoint to send data to this device
|
hardwareID deviceID // USB identifiers to identify this device type
|
||||||
output usb.Endpoint // Output endpoint to receive data from this device
|
locationID uint16 // USB bus and address to identify this device instance
|
||||||
|
url string // Textual URL uniquely identifying this wallet
|
||||||
|
|
||||||
address common.Address // Current address of the wallet (may be zero if Ethereum app offline)
|
device *usb.Device // USB device advertising itself as a Ledger wallet
|
||||||
url string // Textual URL uniquely identifying this wallet
|
input usb.Endpoint // Input endpoint to send data to this device
|
||||||
version [3]byte // Current version of the Ledger Ethereum app (zero if app is offline)
|
output usb.Endpoint // Output endpoint to receive data from this device
|
||||||
}
|
failure error // Any failure that would make the device unusable
|
||||||
|
|
||||||
// LedgerHub is a USB hardware wallet interface that can find and handle Ledger
|
version [3]byte // Current version of the Ledger Ethereum app (zero if app is offline)
|
||||||
// wallets.
|
accounts []accounts.Account // List of derive accounts pinned on the Ledger
|
||||||
type LedgerHub struct {
|
paths map[common.Address][]uint32 // Known derivation paths for signing operations
|
||||||
ctx *usb.Context // Context interfacing with a libusb instance
|
|
||||||
|
|
||||||
wallets map[uint16]*ledgerWallet // Apparent Ledger wallets (some may be inactive)
|
|
||||||
accounts []accounts.Account // List of active Ledger accounts
|
|
||||||
index map[common.Address]uint16 // Set of addresses with active wallets
|
|
||||||
|
|
||||||
quit chan chan error
|
quit chan chan error
|
||||||
lock sync.RWMutex
|
lock sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewLedgerHub creates a new hardware wallet manager for Ledger devices.
|
// Type implements accounts.Wallet, returning the textual type of the wallet.
|
||||||
func NewLedgerHub() (*LedgerHub, error) {
|
func (w *ledgerWallet) Type() string {
|
||||||
// Initialize the USB library to access Ledgers through
|
return "ledger"
|
||||||
ctx, err := usb.NewContext()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
// Create the USB hub, start and return it
|
|
||||||
hub := &LedgerHub{
|
|
||||||
ctx: ctx,
|
|
||||||
wallets: make(map[uint16]*ledgerWallet),
|
|
||||||
index: make(map[common.Address]uint16),
|
|
||||||
quit: make(chan chan error),
|
|
||||||
}
|
|
||||||
go hub.watch()
|
|
||||||
return hub, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Accounts retrieves the live of accounts currently known by the Ledger hub.
|
// URL implements accounts.Wallet, returning the URL of the Ledger device.
|
||||||
func (hub *LedgerHub) Accounts() []accounts.Account {
|
func (w *ledgerWallet) URL() string {
|
||||||
hub.lock.RLock()
|
return w.url
|
||||||
defer hub.lock.RUnlock()
|
}
|
||||||
|
|
||||||
cpy := make([]accounts.Account, len(hub.accounts))
|
// Status implements accounts.Wallet, always whether the Ledger is opened, closed
|
||||||
copy(cpy, hub.accounts)
|
// or whether the Ethereum app was not started on it.
|
||||||
|
func (w *ledgerWallet) Status() string {
|
||||||
|
w.lock.RLock()
|
||||||
|
defer w.lock.RUnlock()
|
||||||
|
|
||||||
|
if w.failure != nil {
|
||||||
|
return fmt.Sprintf("Failed: %v", w.failure)
|
||||||
|
}
|
||||||
|
if w.device == nil {
|
||||||
|
return "Closed"
|
||||||
|
}
|
||||||
|
if w.version == [3]byte{0, 0, 0} {
|
||||||
|
return "Ethereum app not started"
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("Ethereum app v%d.%d.%d", w.version[0], w.version[1], w.version[2])
|
||||||
|
}
|
||||||
|
|
||||||
|
// Open implements accounts.Wallet, attempting to open a USB connection to the
|
||||||
|
// Ledger hardware wallet. The Ledger does not require a user passphrase so that
|
||||||
|
// is silently discarded.
|
||||||
|
func (w *ledgerWallet) Open(passphrase string) error {
|
||||||
|
w.lock.Lock()
|
||||||
|
defer w.lock.Unlock()
|
||||||
|
|
||||||
|
// If the wallet was already opened, don't try to open again
|
||||||
|
if w.device != nil {
|
||||||
|
return accounts.ErrWalletAlreadyOpen
|
||||||
|
}
|
||||||
|
// Otherwise iterate over all USB devices and find this again (no way to directly do this)
|
||||||
|
// Iterate over all attached devices and fetch those seemingly Ledger
|
||||||
|
devices, err := w.context.ListDevices(func(desc *usb.Descriptor) bool {
|
||||||
|
// Only open this single specific device
|
||||||
|
return desc.Vendor == w.hardwareID.Vendor && desc.Product == w.hardwareID.Product &&
|
||||||
|
uint16(desc.Bus)<<8+uint16(desc.Address) == w.locationID
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// Device opened, attach to the input and output endpoints
|
||||||
|
device := devices[0]
|
||||||
|
|
||||||
|
var invalid string
|
||||||
|
switch {
|
||||||
|
case len(device.Descriptor.Configs) == 0:
|
||||||
|
invalid = "no endpoint config available"
|
||||||
|
case len(device.Descriptor.Configs[0].Interfaces) == 0:
|
||||||
|
invalid = "no endpoint interface available"
|
||||||
|
case len(device.Descriptor.Configs[0].Interfaces[0].Setups) == 0:
|
||||||
|
invalid = "no endpoint setup available"
|
||||||
|
case len(device.Descriptor.Configs[0].Interfaces[0].Setups[0].Endpoints) < 2:
|
||||||
|
invalid = "not enough IO endpoints available"
|
||||||
|
}
|
||||||
|
if invalid != "" {
|
||||||
|
device.Close()
|
||||||
|
return fmt.Errorf("ledger wallet [%s] invalid: %s", w.url, invalid)
|
||||||
|
}
|
||||||
|
// Open the input and output endpoints to the device
|
||||||
|
input, err := device.OpenEndpoint(
|
||||||
|
device.Descriptor.Configs[0].Config,
|
||||||
|
device.Descriptor.Configs[0].Interfaces[0].Number,
|
||||||
|
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Number,
|
||||||
|
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Endpoints[1].Address,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
device.Close()
|
||||||
|
return fmt.Errorf("ledger wallet [%s] input open failed: %v", w.url, err)
|
||||||
|
}
|
||||||
|
output, err := device.OpenEndpoint(
|
||||||
|
device.Descriptor.Configs[0].Config,
|
||||||
|
device.Descriptor.Configs[0].Interfaces[0].Number,
|
||||||
|
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Number,
|
||||||
|
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Endpoints[0].Address,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
device.Close()
|
||||||
|
return fmt.Errorf("ledger wallet [%s] output open failed: %v", w.url, err)
|
||||||
|
}
|
||||||
|
// Wallet seems to be successfully opened, guess if the Ethereum app is running
|
||||||
|
w.device, w.input, w.output = device, input, output
|
||||||
|
|
||||||
|
w.paths = make(map[common.Address][]uint32)
|
||||||
|
w.quit = make(chan chan error)
|
||||||
|
defer func() {
|
||||||
|
go w.heartbeat()
|
||||||
|
}()
|
||||||
|
|
||||||
|
if _, err := w.deriveAddress(ledgerDerivationPath); err != nil {
|
||||||
|
// Ethereum app is not running, nothing more to do, return
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Try to resolve the Ethereum app's version, will fail prior to v1.0.2
|
||||||
|
if w.resolveVersion() != nil {
|
||||||
|
w.version = [3]byte{1, 0, 0} // Assume worst case, can't verify if v1.0.0 or v1.0.1
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// heartbeat is a health check loop for the Ledger wallets to periodically verify
|
||||||
|
// whether they are still present or if they malfunctioned. It is needed because:
|
||||||
|
// - libusb on Windows doesn't support hotplug, so we can't detect USB unplugs
|
||||||
|
// - communication timeout on the Ledger requires a device power cycle to fix
|
||||||
|
func (w *ledgerWallet) heartbeat() {
|
||||||
|
// Execute heartbeat checks until termination or error
|
||||||
|
var (
|
||||||
|
errc chan error
|
||||||
|
fail error
|
||||||
|
)
|
||||||
|
for errc == nil && fail == nil {
|
||||||
|
// Wait until termination is requested or the heartbeat cycle arrives
|
||||||
|
select {
|
||||||
|
case errc = <-w.quit:
|
||||||
|
// Termination requested
|
||||||
|
continue
|
||||||
|
case <-time.After(time.Second):
|
||||||
|
// Heartbeat time
|
||||||
|
}
|
||||||
|
// Execute a tiny data exchange to see responsiveness
|
||||||
|
w.lock.Lock()
|
||||||
|
if err := w.resolveVersion(); err == usb.ERROR_IO || err == usb.ERROR_NO_DEVICE {
|
||||||
|
w.failure = err
|
||||||
|
fail = err
|
||||||
|
}
|
||||||
|
w.lock.Unlock()
|
||||||
|
}
|
||||||
|
// In case of error, wait for termination
|
||||||
|
if fail != nil {
|
||||||
|
errc = <-w.quit
|
||||||
|
}
|
||||||
|
errc <- fail
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close implements accounts.Wallet, closing the USB connection to the Ledger.
|
||||||
|
func (w *ledgerWallet) Close() error {
|
||||||
|
// Terminate the health checks
|
||||||
|
errc := make(chan error)
|
||||||
|
w.quit <- errc
|
||||||
|
herr := <-errc // Save for later, we *must* close the USB
|
||||||
|
|
||||||
|
// Terminate the device connection
|
||||||
|
w.lock.Lock()
|
||||||
|
defer w.lock.Unlock()
|
||||||
|
|
||||||
|
if err := w.device.Close(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
w.device, w.input, w.output, w.paths, w.quit = nil, nil, nil, nil, nil
|
||||||
|
|
||||||
|
return herr // If all went well, return any health-check errors
|
||||||
|
}
|
||||||
|
|
||||||
|
// Accounts implements accounts.Wallet, returning the list of accounts pinned to
|
||||||
|
// the Ledger hardware wallet.
|
||||||
|
func (w *ledgerWallet) Accounts() []accounts.Account {
|
||||||
|
w.lock.RLock()
|
||||||
|
defer w.lock.RUnlock()
|
||||||
|
|
||||||
|
cpy := make([]accounts.Account, len(w.accounts))
|
||||||
|
copy(cpy, w.accounts)
|
||||||
return cpy
|
return cpy
|
||||||
}
|
}
|
||||||
|
|
||||||
// HasAddress reports whether an account with the given address is present.
|
// Contains implements accounts.Wallet, returning whether a particular account is
|
||||||
func (hub *LedgerHub) HasAddress(addr common.Address) bool {
|
// or is not pinned into this Ledger instance. Although we could attempt to resolve
|
||||||
hub.lock.RLock()
|
// unpinned accounts, that would be an non-negligible hardware operation.
|
||||||
defer hub.lock.RUnlock()
|
func (w *ledgerWallet) Contains(account accounts.Account) bool {
|
||||||
|
w.lock.RLock()
|
||||||
|
defer w.lock.RUnlock()
|
||||||
|
|
||||||
_, known := hub.index[addr]
|
_, exists := w.paths[account.Address]
|
||||||
return known
|
return exists
|
||||||
}
|
}
|
||||||
|
|
||||||
// SignHash is not supported for Ledger wallets, so this method will always
|
// Derive implements accounts.Wallet, deriving a new account at the specific
|
||||||
// return an error.
|
// derivation path. If pin is set to true, the account will be added to the list
|
||||||
func (hub *LedgerHub) SignHash(acc accounts.Account, hash []byte) ([]byte, error) {
|
// of tracked accounts.
|
||||||
|
func (w *ledgerWallet) Derive(path string, pin bool) (accounts.Account, error) {
|
||||||
|
w.lock.Lock()
|
||||||
|
defer w.lock.Unlock()
|
||||||
|
|
||||||
|
// If the wallet is closed, or the Ethereum app doesn't run, abort
|
||||||
|
if w.device == nil || w.version == [3]byte{0, 0, 0} {
|
||||||
|
return accounts.Account{}, accounts.ErrWalletClosed
|
||||||
|
}
|
||||||
|
// All seems fine, convert the user derivation path to Ledger representation
|
||||||
|
path = strings.TrimPrefix(path, "/")
|
||||||
|
|
||||||
|
parts := strings.Split(path, "/")
|
||||||
|
lpath := make([]uint32, len(parts))
|
||||||
|
for i, part := range parts {
|
||||||
|
// Handle hardened paths
|
||||||
|
if strings.HasSuffix(part, "'") {
|
||||||
|
lpath[i] = 0x80000000
|
||||||
|
part = strings.TrimSuffix(part, "'")
|
||||||
|
}
|
||||||
|
// Handle the non hardened component
|
||||||
|
val, err := strconv.Atoi(part)
|
||||||
|
if err != nil {
|
||||||
|
return accounts.Account{}, fmt.Errorf("path element %d: %v", i, err)
|
||||||
|
}
|
||||||
|
lpath[i] += uint32(val)
|
||||||
|
}
|
||||||
|
// Try to derive the actual account and update it's URL if succeeful
|
||||||
|
address, err := w.deriveAddress(lpath)
|
||||||
|
if err != nil {
|
||||||
|
return accounts.Account{}, err
|
||||||
|
}
|
||||||
|
account := accounts.Account{
|
||||||
|
Address: address,
|
||||||
|
URL: fmt.Sprintf("%s/%s", w.url, path),
|
||||||
|
}
|
||||||
|
// If pinning was requested, track the account
|
||||||
|
if pin {
|
||||||
|
if _, ok := w.paths[address]; !ok {
|
||||||
|
w.accounts = append(w.accounts, account)
|
||||||
|
w.paths[address] = lpath
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return account, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// SignHash implements accounts.Wallet, however signing arbitrary data is not
|
||||||
|
// supported for Ledger wallets, so this method will always return an error.
|
||||||
|
func (w *ledgerWallet) SignHash(acc accounts.Account, hash []byte) ([]byte, error) {
|
||||||
return nil, accounts.ErrNotSupported
|
return nil, accounts.ErrNotSupported
|
||||||
}
|
}
|
||||||
|
|
||||||
// SignTx sends the transaction over to the Ledger wallet to request a confirmation
|
// SignTx implements accounts.Wallet. It sends the transaction over to the Ledger
|
||||||
// from the user. It returns either the signed transaction or a failure if the user
|
// wallet to request a confirmation from the user. It returns either the signed
|
||||||
// denied the transaction.
|
// transaction or a failure if the user denied the transaction.
|
||||||
//
|
//
|
||||||
// Note, if the version of the Ethereum application running on the Ledger wallet is
|
// Note, if the version of the Ethereum application running on the Ledger wallet is
|
||||||
// too old to sign EIP-155 transactions, but such is requested nonetheless, an error
|
// too old to sign EIP-155 transactions, but such is requested nonetheless, an error
|
||||||
// will be returned opposed to silently signing in Homestead mode.
|
// will be returned opposed to silently signing in Homestead mode.
|
||||||
func (hub *LedgerHub) SignTx(acc accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
func (w *ledgerWallet) SignTx(account accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
||||||
hub.lock.RLock()
|
w.lock.Lock()
|
||||||
defer hub.lock.RUnlock()
|
defer w.lock.Unlock()
|
||||||
|
|
||||||
// If the account contains the device URL, flatten it to make sure
|
// Make sure the requested account is contained within
|
||||||
var id uint16
|
path, ok := w.paths[account.Address]
|
||||||
if acc.URL != "" {
|
|
||||||
if parts := strings.Split(acc.URL, "."); len(parts) == 2 {
|
|
||||||
bus, busErr := strconv.Atoi(parts[0])
|
|
||||||
addr, addrErr := strconv.Atoi(parts[1])
|
|
||||||
|
|
||||||
if busErr == nil && addrErr == nil {
|
|
||||||
id = uint16(bus)<<8 + uint16(addr)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// If the id is still zero, URL is either missing or bad, resolve
|
|
||||||
if id == 0 {
|
|
||||||
var ok bool
|
|
||||||
if id, ok = hub.index[acc.Address]; !ok {
|
|
||||||
return nil, accounts.ErrUnknownAccount
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// Retrieve the wallet associated with the URL
|
|
||||||
wallet, ok := hub.wallets[id]
|
|
||||||
if !ok {
|
if !ok {
|
||||||
return nil, accounts.ErrUnknownAccount
|
return nil, accounts.ErrUnknownAccount
|
||||||
}
|
}
|
||||||
// Ensure the wallet is capable of signing the given transaction
|
// Ensure the wallet is capable of signing the given transaction
|
||||||
if chainID != nil && wallet.version[0] <= 1 && wallet.version[1] <= 0 && wallet.version[2] <= 2 {
|
if chainID != nil && w.version[0] <= 1 && w.version[1] <= 0 && w.version[2] <= 2 {
|
||||||
return nil, fmt.Errorf("Ledger v%d.%d.%d doesn't support signing this transaction, please update to v1.0.3 at least",
|
return nil, fmt.Errorf("Ledger v%d.%d.%d doesn't support signing this transaction, please update to v1.0.3 at least",
|
||||||
wallet.version[0], wallet.version[1], wallet.version[2])
|
w.version[0], w.version[1], w.version[2])
|
||||||
}
|
}
|
||||||
return wallet.sign(tx, chainID)
|
return w.sign(path, account.Address, tx, chainID)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SignHashWithPassphrase is not supported for Ledger wallets, so this method
|
// SignHashWithPassphrase implements accounts.Wallet, however signing arbitrary
|
||||||
// will always return an error.
|
// data is not supported for Ledger wallets, so this method will always return
|
||||||
func (hub *LedgerHub) SignHashWithPassphrase(acc accounts.Account, passphrase string, hash []byte) ([]byte, error) {
|
// an error.
|
||||||
|
func (w *ledgerWallet) SignHashWithPassphrase(account accounts.Account, passphrase string, hash []byte) ([]byte, error) {
|
||||||
return nil, accounts.ErrNotSupported
|
return nil, accounts.ErrNotSupported
|
||||||
}
|
}
|
||||||
|
|
||||||
// SignTxWithPassphrase requests the backend to sign the given transaction, with the
|
// SignTxWithPassphrase implements accounts.Wallet, attempting to sign the given
|
||||||
// given passphrase as extra authentication information. Since the Ledger does not
|
// transaction with the given account using passphrase as extra authentication.
|
||||||
// support this feature, it will just silently ignore the passphrase.
|
// Since the Ledger does not support extra passphrases, it is silently ignored.
|
||||||
func (hub *LedgerHub) SignTxWithPassphrase(acc accounts.Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
func (w *ledgerWallet) SignTxWithPassphrase(account accounts.Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
||||||
return hub.SignTx(acc, tx, chainID)
|
return w.SignTx(account, tx, chainID)
|
||||||
}
|
|
||||||
|
|
||||||
// Close terminates the usb watching for Ledger wallets and returns when it
|
|
||||||
// successfully terminated.
|
|
||||||
func (hub *LedgerHub) Close() error {
|
|
||||||
// Terminate the USB scanner
|
|
||||||
errc := make(chan error)
|
|
||||||
hub.quit <- errc
|
|
||||||
err := <-errc
|
|
||||||
|
|
||||||
// Release the USB interface and return
|
|
||||||
hub.ctx.Close()
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// watch starts watching the local machine's USB ports for the connection or
|
|
||||||
// disconnection of Ledger devices.
|
|
||||||
func (hub *LedgerHub) watch() {
|
|
||||||
for {
|
|
||||||
// Rescan the USB ports for devices newly added or removed
|
|
||||||
hub.rescan()
|
|
||||||
|
|
||||||
// Sleep for a certain amount of time or until terminated
|
|
||||||
select {
|
|
||||||
case errc := <-hub.quit:
|
|
||||||
errc <- nil
|
|
||||||
return
|
|
||||||
case <-time.After(time.Second):
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// rescan searches the USB ports for attached Ledger hardware wallets.
|
|
||||||
func (hub *LedgerHub) rescan() {
|
|
||||||
hub.lock.Lock()
|
|
||||||
defer hub.lock.Unlock()
|
|
||||||
|
|
||||||
// Iterate over all connected Ledger devices and do a heartbeat test
|
|
||||||
for id, wallet := range hub.wallets {
|
|
||||||
// If the device doesn't respond (io error on Windows, no device on Linux), drop
|
|
||||||
if err := wallet.resolveVersion(); err == usb.ERROR_IO || err == usb.ERROR_NO_DEVICE {
|
|
||||||
// Wallet disconnected or at least in a useless state
|
|
||||||
if wallet.address == (common.Address{}) {
|
|
||||||
glog.V(logger.Info).Infof("ledger wallet [%03d.%03d] disconnected", wallet.device.Bus, wallet.device.Address)
|
|
||||||
} else {
|
|
||||||
// A live account disconnected, remove it from the tracked accounts
|
|
||||||
for i, account := range hub.accounts {
|
|
||||||
if account.Address == wallet.address && account.URL == wallet.url {
|
|
||||||
hub.accounts = append(hub.accounts[:i], hub.accounts[i+1:]...)
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
delete(hub.index, wallet.address)
|
|
||||||
|
|
||||||
glog.V(logger.Info).Infof("ledger wallet [%03d.%03d] v%d.%d.%d disconnected: %s", wallet.device.Bus, wallet.device.Address,
|
|
||||||
wallet.version[0], wallet.version[1], wallet.version[2], wallet.address.Hex())
|
|
||||||
}
|
|
||||||
delete(hub.wallets, id)
|
|
||||||
wallet.device.Close()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// Iterate over all attached devices and fetch those seemingly Ledger
|
|
||||||
devices, _ := hub.ctx.ListDevices(func(desc *usb.Descriptor) bool {
|
|
||||||
// Discard all devices not advertizing as Ledger
|
|
||||||
ledger := false
|
|
||||||
for _, id := range ledgerDeviceIDs {
|
|
||||||
if desc.Vendor == id.Vendor && desc.Product == id.Product {
|
|
||||||
ledger = true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if !ledger {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
// If we have an already known Ledger, skip opening it
|
|
||||||
id := uint16(desc.Bus)<<8 + uint16(desc.Address)
|
|
||||||
if _, known := hub.wallets[id]; known {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
// New Ledger device, open it for communication
|
|
||||||
return true
|
|
||||||
})
|
|
||||||
// Start tracking all wallets which newly appeared
|
|
||||||
var err error
|
|
||||||
for _, device := range devices {
|
|
||||||
// Make sure the alleged device has the correct IO endpoints
|
|
||||||
wallet := &ledgerWallet{
|
|
||||||
device: device,
|
|
||||||
url: fmt.Sprintf("%03d.%03d", device.Bus, device.Address),
|
|
||||||
}
|
|
||||||
var invalid string
|
|
||||||
switch {
|
|
||||||
case len(device.Descriptor.Configs) == 0:
|
|
||||||
invalid = "no endpoint config available"
|
|
||||||
case len(device.Descriptor.Configs[0].Interfaces) == 0:
|
|
||||||
invalid = "no endpoint interface available"
|
|
||||||
case len(device.Descriptor.Configs[0].Interfaces[0].Setups) == 0:
|
|
||||||
invalid = "no endpoint setup available"
|
|
||||||
case len(device.Descriptor.Configs[0].Interfaces[0].Setups[0].Endpoints) < 2:
|
|
||||||
invalid = "not enough IO endpoints available"
|
|
||||||
}
|
|
||||||
if invalid != "" {
|
|
||||||
glog.V(logger.Debug).Infof("ledger wallet [%s] deemed invalid: %s", wallet.url, invalid)
|
|
||||||
device.Close()
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Open the input and output endpoints to the device
|
|
||||||
wallet.input, err = device.OpenEndpoint(
|
|
||||||
device.Descriptor.Configs[0].Config,
|
|
||||||
device.Descriptor.Configs[0].Interfaces[0].Number,
|
|
||||||
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Number,
|
|
||||||
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Endpoints[1].Address,
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
glog.V(logger.Debug).Infof("ledger wallet [%s] input open failed: %v", wallet.url, err)
|
|
||||||
device.Close()
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
wallet.output, err = device.OpenEndpoint(
|
|
||||||
device.Descriptor.Configs[0].Config,
|
|
||||||
device.Descriptor.Configs[0].Interfaces[0].Number,
|
|
||||||
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Number,
|
|
||||||
device.Descriptor.Configs[0].Interfaces[0].Setups[0].Endpoints[0].Address,
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
glog.V(logger.Debug).Infof("ledger wallet [%s] output open failed: %v", wallet.url, err)
|
|
||||||
device.Close()
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Start tracking the device as a probably Ledger wallet
|
|
||||||
id := uint16(device.Bus)<<8 + uint16(device.Address)
|
|
||||||
hub.wallets[id] = wallet
|
|
||||||
|
|
||||||
if wallet.resolveAddress() != nil {
|
|
||||||
glog.V(logger.Info).Infof("ledger wallet [%s] connected, Ethereum app not started", wallet.url)
|
|
||||||
} else {
|
|
||||||
// Try to resolve the Ethereum app's version, will fail prior to v1.0.2
|
|
||||||
if wallet.resolveVersion() != nil {
|
|
||||||
wallet.version = [3]byte{1, 0, 0} // Assume worst case, can't verify if v1.0.0 or v1.0.1
|
|
||||||
}
|
|
||||||
hub.accounts = append(hub.accounts, accounts.Account{
|
|
||||||
Address: wallet.address,
|
|
||||||
URL: wallet.url,
|
|
||||||
})
|
|
||||||
hub.index[wallet.address] = id
|
|
||||||
|
|
||||||
glog.V(logger.Info).Infof("ledger wallet [%s] v%d.%d.%d connected: %s", wallet.url,
|
|
||||||
wallet.version[0], wallet.version[1], wallet.version[2], wallet.address.Hex())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// resolveVersion retrieves the current version of the Ethereum wallet app running
|
// resolveVersion retrieves the current version of the Ethereum wallet app running
|
||||||
@ -379,8 +396,8 @@ func (wallet *ledgerWallet) resolveVersion() error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// resolveAddress retrieves the currently active Ethereum address from a Ledger
|
// deriveAddress retrieves the currently active Ethereum address from a Ledger
|
||||||
// wallet and caches it for future reference.
|
// wallet at the specified derivation path.
|
||||||
//
|
//
|
||||||
// The address derivation protocol is defined as follows:
|
// The address derivation protocol is defined as follows:
|
||||||
//
|
//
|
||||||
@ -410,33 +427,34 @@ func (wallet *ledgerWallet) resolveVersion() error {
|
|||||||
// Ethereum address length | 1 byte
|
// Ethereum address length | 1 byte
|
||||||
// Ethereum address | 40 bytes hex ascii
|
// Ethereum address | 40 bytes hex ascii
|
||||||
// Chain code if requested | 32 bytes
|
// Chain code if requested | 32 bytes
|
||||||
func (wallet *ledgerWallet) resolveAddress() error {
|
func (w *ledgerWallet) deriveAddress(derivationPath []uint32) (common.Address, error) {
|
||||||
// Flatten the derivation path into the Ledger request
|
// Flatten the derivation path into the Ledger request
|
||||||
path := make([]byte, 1+4*len(ledgerDerivationPath))
|
path := make([]byte, 1+4*len(derivationPath))
|
||||||
path[0] = byte(len(ledgerDerivationPath))
|
path[0] = byte(len(derivationPath))
|
||||||
for i, component := range ledgerDerivationPath {
|
for i, component := range derivationPath {
|
||||||
binary.BigEndian.PutUint32(path[1+4*i:], component)
|
binary.BigEndian.PutUint32(path[1+4*i:], component)
|
||||||
}
|
}
|
||||||
// Send the request and wait for the response
|
// Send the request and wait for the response
|
||||||
reply, err := wallet.exchange(ledgerOpRetrieveAddress, ledgerP1DirectlyFetchAddress, ledgerP2DiscardAddressChainCode, path)
|
reply, err := w.exchange(ledgerOpRetrieveAddress, ledgerP1DirectlyFetchAddress, ledgerP2DiscardAddressChainCode, path)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return common.Address{}, err
|
||||||
}
|
}
|
||||||
// Discard the public key, we don't need that for now
|
// Discard the public key, we don't need that for now
|
||||||
if len(reply) < 1 || len(reply) < 1+int(reply[0]) {
|
if len(reply) < 1 || len(reply) < 1+int(reply[0]) {
|
||||||
return errors.New("reply lacks public key entry")
|
return common.Address{}, errors.New("reply lacks public key entry")
|
||||||
}
|
}
|
||||||
reply = reply[1+int(reply[0]):]
|
reply = reply[1+int(reply[0]):]
|
||||||
|
|
||||||
// Extract the Ethereum hex address string
|
// Extract the Ethereum hex address string
|
||||||
if len(reply) < 1 || len(reply) < 1+int(reply[0]) {
|
if len(reply) < 1 || len(reply) < 1+int(reply[0]) {
|
||||||
return errors.New("reply lacks address entry")
|
return common.Address{}, errors.New("reply lacks address entry")
|
||||||
}
|
}
|
||||||
hexstr := reply[1 : 1+int(reply[0])]
|
hexstr := reply[1 : 1+int(reply[0])]
|
||||||
|
|
||||||
// Decode the hex sting into an Ethereum address and return
|
// Decode the hex sting into an Ethereum address and return
|
||||||
hex.Decode(wallet.address[:], hexstr)
|
var address common.Address
|
||||||
return nil
|
hex.Decode(address[:], hexstr)
|
||||||
|
return address, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// sign sends the transaction to the Ledger wallet, and waits for the user to
|
// sign sends the transaction to the Ledger wallet, and waits for the user to
|
||||||
@ -473,15 +491,15 @@ func (wallet *ledgerWallet) resolveAddress() error {
|
|||||||
// signature V | 1 byte
|
// signature V | 1 byte
|
||||||
// signature R | 32 bytes
|
// signature R | 32 bytes
|
||||||
// signature S | 32 bytes
|
// signature S | 32 bytes
|
||||||
func (wallet *ledgerWallet) sign(tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
func (w *ledgerWallet) sign(derivationPath []uint32, address common.Address, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) {
|
||||||
// We need to modify the timeouts to account for user feedback
|
// We need to modify the timeouts to account for user feedback
|
||||||
defer func(old time.Duration) { wallet.device.ReadTimeout = old }(wallet.device.ReadTimeout)
|
defer func(old time.Duration) { w.device.ReadTimeout = old }(w.device.ReadTimeout)
|
||||||
wallet.device.ReadTimeout = time.Minute
|
w.device.ReadTimeout = time.Minute
|
||||||
|
|
||||||
// Flatten the derivation path into the Ledger request
|
// Flatten the derivation path into the Ledger request
|
||||||
path := make([]byte, 1+4*len(ledgerDerivationPath))
|
path := make([]byte, 1+4*len(derivationPath))
|
||||||
path[0] = byte(len(ledgerDerivationPath))
|
path[0] = byte(len(derivationPath))
|
||||||
for i, component := range ledgerDerivationPath {
|
for i, component := range derivationPath {
|
||||||
binary.BigEndian.PutUint32(path[1+4*i:], component)
|
binary.BigEndian.PutUint32(path[1+4*i:], component)
|
||||||
}
|
}
|
||||||
// Create the transaction RLP based on whether legacy or EIP155 signing was requeste
|
// Create the transaction RLP based on whether legacy or EIP155 signing was requeste
|
||||||
@ -512,7 +530,7 @@ func (wallet *ledgerWallet) sign(tx *types.Transaction, chainID *big.Int) (*type
|
|||||||
chunk = len(payload)
|
chunk = len(payload)
|
||||||
}
|
}
|
||||||
// Send the chunk over, ensuring it's processed correctly
|
// Send the chunk over, ensuring it's processed correctly
|
||||||
reply, err = wallet.exchange(ledgerOpSignTransaction, op, 0, payload[:chunk])
|
reply, err = w.exchange(ledgerOpSignTransaction, op, 0, payload[:chunk])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@ -543,9 +561,8 @@ func (wallet *ledgerWallet) sign(tx *types.Transaction, chainID *big.Int) (*type
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if sender != wallet.address {
|
if sender != address {
|
||||||
glog.V(logger.Error).Infof("Ledger signer mismatch: expected %s, got %s", wallet.address.Hex(), sender.Hex())
|
return nil, fmt.Errorf("signer mismatch: expected %s, got %s", address.Hex(), sender.Hex())
|
||||||
return nil, fmt.Errorf("signer mismatch: expected %s, got %s", wallet.address.Hex(), sender.Hex())
|
|
||||||
}
|
}
|
||||||
return signed, nil
|
return signed, nil
|
||||||
}
|
}
|
||||||
@ -583,7 +600,7 @@ func (wallet *ledgerWallet) sign(tx *types.Transaction, chainID *big.Int) (*type
|
|||||||
// APDU P2 | 1 byte
|
// APDU P2 | 1 byte
|
||||||
// APDU length | 1 byte
|
// APDU length | 1 byte
|
||||||
// Optional APDU data | arbitrary
|
// Optional APDU data | arbitrary
|
||||||
func (wallet *ledgerWallet) exchange(opcode ledgerOpcode, p1 ledgerParam1, p2 ledgerParam2, data []byte) ([]byte, error) {
|
func (w *ledgerWallet) exchange(opcode ledgerOpcode, p1 ledgerParam1, p2 ledgerParam2, data []byte) ([]byte, error) {
|
||||||
// Construct the message payload, possibly split into multiple chunks
|
// Construct the message payload, possibly split into multiple chunks
|
||||||
var chunks [][]byte
|
var chunks [][]byte
|
||||||
for left := data; len(left) > 0 || len(chunks) == 0; {
|
for left := data; len(left) > 0 || len(chunks) == 0; {
|
||||||
@ -613,9 +630,9 @@ func (wallet *ledgerWallet) exchange(opcode ledgerOpcode, p1 ledgerParam1, p2 le
|
|||||||
|
|
||||||
// Send over to the device
|
// Send over to the device
|
||||||
if glog.V(logger.Core) {
|
if glog.V(logger.Core) {
|
||||||
glog.Infof("-> %03d.%03d: %x", wallet.device.Bus, wallet.device.Address, msg)
|
glog.Infof("-> %03d.%03d: %x", w.device.Bus, w.device.Address, msg)
|
||||||
}
|
}
|
||||||
if _, err := wallet.input.Write(msg); err != nil {
|
if _, err := w.input.Write(msg); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -624,11 +641,11 @@ func (wallet *ledgerWallet) exchange(opcode ledgerOpcode, p1 ledgerParam1, p2 le
|
|||||||
for {
|
for {
|
||||||
// Read the next chunk from the Ledger wallet
|
// Read the next chunk from the Ledger wallet
|
||||||
chunk := make([]byte, 64)
|
chunk := make([]byte, 64)
|
||||||
if _, err := io.ReadFull(wallet.output, chunk); err != nil {
|
if _, err := io.ReadFull(w.output, chunk); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if glog.V(logger.Core) {
|
if glog.V(logger.Core) {
|
||||||
glog.Infof("<- %03d.%03d: %x", wallet.device.Bus, wallet.device.Address, chunk)
|
glog.Infof("<- %03d.%03d: %x", w.device.Bus, w.device.Address, chunk)
|
||||||
}
|
}
|
||||||
// Make sure the transport header matches
|
// Make sure the transport header matches
|
||||||
if chunk[0] != 0x01 || chunk[1] != 0x01 || chunk[2] != 0x05 {
|
if chunk[0] != 0x01 || chunk[1] != 0x01 || chunk[2] != 0x05 {
|
@ -181,8 +181,13 @@ nodes.
|
|||||||
|
|
||||||
func accountList(ctx *cli.Context) error {
|
func accountList(ctx *cli.Context) error {
|
||||||
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
||||||
for i, acct := range stack.AccountManager().Accounts() {
|
|
||||||
fmt.Printf("Account #%d: {%x} %s\n", i, acct.Address, acct.URL)
|
var index int
|
||||||
|
for _, wallet := range stack.AccountManager().Wallets() {
|
||||||
|
for _, account := range wallet.Accounts() {
|
||||||
|
fmt.Printf("Account #%d: {%x} %s\n", index, account.Address, account.URL)
|
||||||
|
index++
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
@ -276,7 +281,7 @@ func accountCreate(ctx *cli.Context) error {
|
|||||||
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
||||||
password := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
|
password := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
|
||||||
|
|
||||||
ks := stack.AccountManager().Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
account, err := ks.NewAccount(password)
|
account, err := ks.NewAccount(password)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
utils.Fatalf("Failed to create account: %v", err)
|
utils.Fatalf("Failed to create account: %v", err)
|
||||||
@ -292,7 +297,7 @@ func accountUpdate(ctx *cli.Context) error {
|
|||||||
utils.Fatalf("No accounts specified to update")
|
utils.Fatalf("No accounts specified to update")
|
||||||
}
|
}
|
||||||
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
||||||
ks := stack.AccountManager().Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
|
|
||||||
account, oldPassword := unlockAccount(ctx, ks, ctx.Args().First(), 0, nil)
|
account, oldPassword := unlockAccount(ctx, ks, ctx.Args().First(), 0, nil)
|
||||||
newPassword := getPassPhrase("Please give a new password. Do not forget this password.", true, 0, nil)
|
newPassword := getPassPhrase("Please give a new password. Do not forget this password.", true, 0, nil)
|
||||||
@ -315,7 +320,7 @@ func importWallet(ctx *cli.Context) error {
|
|||||||
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
||||||
passphrase := getPassPhrase("", false, 0, utils.MakePasswordList(ctx))
|
passphrase := getPassPhrase("", false, 0, utils.MakePasswordList(ctx))
|
||||||
|
|
||||||
ks := stack.AccountManager().Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
acct, err := ks.ImportPreSaleKey(keyJson, passphrase)
|
acct, err := ks.ImportPreSaleKey(keyJson, passphrase)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
utils.Fatalf("%v", err)
|
utils.Fatalf("%v", err)
|
||||||
@ -336,7 +341,7 @@ func accountImport(ctx *cli.Context) error {
|
|||||||
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
stack := utils.MakeNode(ctx, clientIdentifier, gitCommit)
|
||||||
passphrase := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
|
passphrase := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
|
||||||
|
|
||||||
ks := stack.AccountManager().Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
acct, err := ks.ImportECDSA(key, passphrase)
|
acct, err := ks.ImportECDSA(key, passphrase)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
utils.Fatalf("Could not create the account: %v", err)
|
utils.Fatalf("Could not create the account: %v", err)
|
||||||
|
@ -246,7 +246,7 @@ func startNode(ctx *cli.Context, stack *node.Node) {
|
|||||||
utils.StartNode(stack)
|
utils.StartNode(stack)
|
||||||
|
|
||||||
// Unlock any account specifically requested
|
// Unlock any account specifically requested
|
||||||
ks := stack.AccountManager().Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
|
|
||||||
passwords := utils.MakePasswordList(ctx)
|
passwords := utils.MakePasswordList(ctx)
|
||||||
accounts := strings.Split(ctx.GlobalString(utils.UnlockedAccountFlag.Name), ",")
|
accounts := strings.Split(ctx.GlobalString(utils.UnlockedAccountFlag.Name), ",")
|
||||||
|
@ -100,7 +100,7 @@ func MakeSystemNode(privkey string, test *tests.BlockTest) (*node.Node, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
// Create the keystore and inject an unlocked account if requested
|
// Create the keystore and inject an unlocked account if requested
|
||||||
ks := stack.AccountManager().Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
|
|
||||||
if len(privkey) > 0 {
|
if len(privkey) > 0 {
|
||||||
key, err := crypto.HexToECDSA(privkey)
|
key, err := crypto.HexToECDSA(privkey)
|
||||||
|
@ -329,7 +329,7 @@ func getAccount(ctx *cli.Context, stack *node.Node) *ecdsa.PrivateKey {
|
|||||||
}
|
}
|
||||||
// Otherwise try getting it from the keystore.
|
// Otherwise try getting it from the keystore.
|
||||||
am := stack.AccountManager()
|
am := stack.AccountManager()
|
||||||
ks := am.Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := am.Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
|
|
||||||
return decryptStoreAccount(ks, keyid)
|
return decryptStoreAccount(ks, keyid)
|
||||||
}
|
}
|
||||||
|
@ -726,7 +726,7 @@ func RegisterEthService(ctx *cli.Context, stack *node.Node, extra []byte) {
|
|||||||
if networks > 1 {
|
if networks > 1 {
|
||||||
Fatalf("The %v flags are mutually exclusive", netFlags)
|
Fatalf("The %v flags are mutually exclusive", netFlags)
|
||||||
}
|
}
|
||||||
ks := stack.AccountManager().Backend(keystore.BackendType).(*keystore.KeyStore)
|
ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
|
|
||||||
ethConf := ð.Config{
|
ethConf := ð.Config{
|
||||||
Etherbase: MakeEtherbase(ks, ctx),
|
Etherbase: MakeEtherbase(ks, ctx),
|
||||||
|
@ -364,8 +364,10 @@ func (s *Ethereum) Etherbase() (eb common.Address, err error) {
|
|||||||
if s.etherbase != (common.Address{}) {
|
if s.etherbase != (common.Address{}) {
|
||||||
return s.etherbase, nil
|
return s.etherbase, nil
|
||||||
}
|
}
|
||||||
if accounts := s.AccountManager().Accounts(); len(accounts) > 0 {
|
if wallets := s.AccountManager().Wallets(); len(wallets) > 0 {
|
||||||
return accounts[0].Address, nil
|
if accounts := wallets[0].Accounts(); len(accounts) > 0 {
|
||||||
|
return accounts[0].Address, nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return common.Address{}, fmt.Errorf("etherbase address must be explicitly specified")
|
return common.Address{}, fmt.Errorf("etherbase address must be explicitly specified")
|
||||||
}
|
}
|
||||||
|
@ -188,8 +188,14 @@ func NewPublicAccountAPI(am *accounts.Manager) *PublicAccountAPI {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Accounts returns the collection of accounts this node manages
|
// Accounts returns the collection of accounts this node manages
|
||||||
func (s *PublicAccountAPI) Accounts() []accounts.Account {
|
func (s *PublicAccountAPI) Accounts() []common.Address {
|
||||||
return s.am.Accounts()
|
var addresses []common.Address
|
||||||
|
for _, wallet := range s.am.Wallets() {
|
||||||
|
for _, account := range wallet.Accounts() {
|
||||||
|
addresses = append(addresses, account.Address)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return addresses
|
||||||
}
|
}
|
||||||
|
|
||||||
// PrivateAccountAPI provides an API to access accounts managed by this node.
|
// PrivateAccountAPI provides an API to access accounts managed by this node.
|
||||||
@ -210,14 +216,51 @@ func NewPrivateAccountAPI(b Backend) *PrivateAccountAPI {
|
|||||||
|
|
||||||
// ListAccounts will return a list of addresses for accounts this node manages.
|
// ListAccounts will return a list of addresses for accounts this node manages.
|
||||||
func (s *PrivateAccountAPI) ListAccounts() []common.Address {
|
func (s *PrivateAccountAPI) ListAccounts() []common.Address {
|
||||||
accounts := s.am.Accounts()
|
var addresses []common.Address
|
||||||
addresses := make([]common.Address, len(accounts))
|
for _, wallet := range s.am.Wallets() {
|
||||||
for i, acc := range accounts {
|
for _, account := range wallet.Accounts() {
|
||||||
addresses[i] = acc.Address
|
addresses = append(addresses, account.Address)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return addresses
|
return addresses
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// rawWallet is a JSON representation of an accounts.Wallet interface, with its
|
||||||
|
// data contents extracted into plain fields.
|
||||||
|
type rawWallet struct {
|
||||||
|
Type string `json:"type"`
|
||||||
|
URL string `json:"url"`
|
||||||
|
Status string `json:"status"`
|
||||||
|
Accounts []accounts.Account `json:"accounts"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListWallets will return a list of wallets this node manages.
|
||||||
|
func (s *PrivateAccountAPI) ListWallets() []rawWallet {
|
||||||
|
var wallets []rawWallet
|
||||||
|
for _, wallet := range s.am.Wallets() {
|
||||||
|
wallets = append(wallets, rawWallet{
|
||||||
|
Type: wallet.Type(),
|
||||||
|
URL: wallet.URL(),
|
||||||
|
Status: wallet.Status(),
|
||||||
|
Accounts: wallet.Accounts(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
return wallets
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeriveAccount requests a HD wallet to derive a new account, optionally pinning
|
||||||
|
// it for later reuse.
|
||||||
|
func (s *PrivateAccountAPI) DeriveAccount(url string, path string, pin *bool) (accounts.Account, error) {
|
||||||
|
wallet, err := s.am.Wallet(url)
|
||||||
|
if err != nil {
|
||||||
|
return accounts.Account{}, err
|
||||||
|
}
|
||||||
|
if pin == nil {
|
||||||
|
pin = new(bool)
|
||||||
|
}
|
||||||
|
return wallet.Derive(path, *pin)
|
||||||
|
}
|
||||||
|
|
||||||
// NewAccount will create a new account and returns the address for the new account.
|
// NewAccount will create a new account and returns the address for the new account.
|
||||||
func (s *PrivateAccountAPI) NewAccount(password string) (common.Address, error) {
|
func (s *PrivateAccountAPI) NewAccount(password string) (common.Address, error) {
|
||||||
acc, err := fetchKeystore(s.am).NewAccount(password)
|
acc, err := fetchKeystore(s.am).NewAccount(password)
|
||||||
@ -229,7 +272,7 @@ func (s *PrivateAccountAPI) NewAccount(password string) (common.Address, error)
|
|||||||
|
|
||||||
// fetchKeystore retrives the encrypted keystore from the account manager.
|
// fetchKeystore retrives the encrypted keystore from the account manager.
|
||||||
func fetchKeystore(am *accounts.Manager) *keystore.KeyStore {
|
func fetchKeystore(am *accounts.Manager) *keystore.KeyStore {
|
||||||
return am.Backend(keystore.BackendType).(*keystore.KeyStore)
|
return am.Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ImportRawKey stores the given hex encoded ECDSA key into the key directory,
|
// ImportRawKey stores the given hex encoded ECDSA key into the key directory,
|
||||||
@ -270,16 +313,25 @@ func (s *PrivateAccountAPI) LockAccount(addr common.Address) bool {
|
|||||||
// tries to sign it with the key associated with args.To. If the given passwd isn't
|
// tries to sign it with the key associated with args.To. If the given passwd isn't
|
||||||
// able to decrypt the key it fails.
|
// able to decrypt the key it fails.
|
||||||
func (s *PrivateAccountAPI) SendTransaction(ctx context.Context, args SendTxArgs, passwd string) (common.Hash, error) {
|
func (s *PrivateAccountAPI) SendTransaction(ctx context.Context, args SendTxArgs, passwd string) (common.Hash, error) {
|
||||||
|
// Set some sanity defaults and terminate on failure
|
||||||
if err := args.setDefaults(ctx, s.b); err != nil {
|
if err := args.setDefaults(ctx, s.b); err != nil {
|
||||||
return common.Hash{}, err
|
return common.Hash{}, err
|
||||||
}
|
}
|
||||||
|
// Look up the wallet containing the requested signer
|
||||||
|
account := accounts.Account{Address: args.From}
|
||||||
|
|
||||||
|
wallet, err := s.am.Find(account)
|
||||||
|
if err != nil {
|
||||||
|
return common.Hash{}, err
|
||||||
|
}
|
||||||
|
// Assemble the transaction and sign with the wallet
|
||||||
tx := args.toTransaction()
|
tx := args.toTransaction()
|
||||||
|
|
||||||
var chainID *big.Int
|
var chainID *big.Int
|
||||||
if config := s.b.ChainConfig(); config.IsEIP155(s.b.CurrentBlock().Number()) {
|
if config := s.b.ChainConfig(); config.IsEIP155(s.b.CurrentBlock().Number()) {
|
||||||
chainID = config.ChainId
|
chainID = config.ChainId
|
||||||
}
|
}
|
||||||
signed, err := s.am.SignTxWithPassphrase(accounts.Account{Address: args.From}, passwd, tx, chainID)
|
signed, err := wallet.SignTxWithPassphrase(account, passwd, tx, chainID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return common.Hash{}, err
|
return common.Hash{}, err
|
||||||
}
|
}
|
||||||
@ -308,7 +360,15 @@ func signHash(data []byte) []byte {
|
|||||||
//
|
//
|
||||||
// https://github.com/ethereum/go-ethereum/wiki/Management-APIs#personal_sign
|
// https://github.com/ethereum/go-ethereum/wiki/Management-APIs#personal_sign
|
||||||
func (s *PrivateAccountAPI) Sign(ctx context.Context, data hexutil.Bytes, addr common.Address, passwd string) (hexutil.Bytes, error) {
|
func (s *PrivateAccountAPI) Sign(ctx context.Context, data hexutil.Bytes, addr common.Address, passwd string) (hexutil.Bytes, error) {
|
||||||
signature, err := s.b.AccountManager().SignHashWithPassphrase(accounts.Account{Address: addr}, passwd, signHash(data))
|
// Look up the wallet containing the requested signer
|
||||||
|
account := accounts.Account{Address: addr}
|
||||||
|
|
||||||
|
wallet, err := s.b.AccountManager().Find(account)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// Assemble sign the data with the wallet
|
||||||
|
signature, err := wallet.SignHashWithPassphrase(account, passwd, signHash(data))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@ -521,16 +581,15 @@ func (s *PublicBlockChainAPI) doCall(ctx context.Context, args CallArgs, blockNr
|
|||||||
if state == nil || err != nil {
|
if state == nil || err != nil {
|
||||||
return nil, common.Big0, err
|
return nil, common.Big0, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set sender address or use a default if none specified
|
// Set sender address or use a default if none specified
|
||||||
addr := args.From
|
addr := args.From
|
||||||
if addr == (common.Address{}) {
|
if addr == (common.Address{}) {
|
||||||
accounts := s.b.AccountManager().Accounts()
|
if wallets := s.b.AccountManager().Wallets(); len(wallets) > 0 {
|
||||||
if len(accounts) > 0 {
|
if accounts := wallets[0].Accounts(); len(accounts) > 0 {
|
||||||
addr = accounts[0].Address
|
addr = accounts[0].Address
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set default gas & gas price if none were set
|
// Set default gas & gas price if none were set
|
||||||
gas, gasPrice := args.Gas.ToInt(), args.GasPrice.ToInt()
|
gas, gasPrice := args.Gas.ToInt(), args.GasPrice.ToInt()
|
||||||
if gas.BitLen() == 0 {
|
if gas.BitLen() == 0 {
|
||||||
@ -539,7 +598,6 @@ func (s *PublicBlockChainAPI) doCall(ctx context.Context, args CallArgs, blockNr
|
|||||||
if gasPrice.BitLen() == 0 {
|
if gasPrice.BitLen() == 0 {
|
||||||
gasPrice = new(big.Int).Mul(big.NewInt(50), common.Shannon)
|
gasPrice = new(big.Int).Mul(big.NewInt(50), common.Shannon)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create new call message
|
// Create new call message
|
||||||
msg := types.NewMessage(addr, args.To, 0, args.Value.ToInt(), gas, gasPrice, args.Data, false)
|
msg := types.NewMessage(addr, args.To, 0, args.Value.ToInt(), gas, gasPrice, args.Data, false)
|
||||||
|
|
||||||
@ -1032,11 +1090,19 @@ func (s *PublicTransactionPoolAPI) GetTransactionReceipt(txHash common.Hash) (ma
|
|||||||
|
|
||||||
// sign is a helper function that signs a transaction with the private key of the given address.
|
// sign is a helper function that signs a transaction with the private key of the given address.
|
||||||
func (s *PublicTransactionPoolAPI) sign(addr common.Address, tx *types.Transaction) (*types.Transaction, error) {
|
func (s *PublicTransactionPoolAPI) sign(addr common.Address, tx *types.Transaction) (*types.Transaction, error) {
|
||||||
|
// Look up the wallet containing the requested signer
|
||||||
|
account := accounts.Account{Address: addr}
|
||||||
|
|
||||||
|
wallet, err := s.b.AccountManager().Find(account)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// Request the wallet to sign the transaction
|
||||||
var chainID *big.Int
|
var chainID *big.Int
|
||||||
if config := s.b.ChainConfig(); config.IsEIP155(s.b.CurrentBlock().Number()) {
|
if config := s.b.ChainConfig(); config.IsEIP155(s.b.CurrentBlock().Number()) {
|
||||||
chainID = config.ChainId
|
chainID = config.ChainId
|
||||||
}
|
}
|
||||||
return s.b.AccountManager().SignTx(accounts.Account{Address: addr}, tx, chainID)
|
return wallet.SignTx(account, tx, chainID)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SendTxArgs represents the arguments to sumbit a new transaction into the transaction pool.
|
// SendTxArgs represents the arguments to sumbit a new transaction into the transaction pool.
|
||||||
@ -1101,16 +1167,25 @@ func submitTransaction(ctx context.Context, b Backend, tx *types.Transaction) (c
|
|||||||
// SendTransaction creates a transaction for the given argument, sign it and submit it to the
|
// SendTransaction creates a transaction for the given argument, sign it and submit it to the
|
||||||
// transaction pool.
|
// transaction pool.
|
||||||
func (s *PublicTransactionPoolAPI) SendTransaction(ctx context.Context, args SendTxArgs) (common.Hash, error) {
|
func (s *PublicTransactionPoolAPI) SendTransaction(ctx context.Context, args SendTxArgs) (common.Hash, error) {
|
||||||
|
// Set some sanity defaults and terminate on failure
|
||||||
if err := args.setDefaults(ctx, s.b); err != nil {
|
if err := args.setDefaults(ctx, s.b); err != nil {
|
||||||
return common.Hash{}, err
|
return common.Hash{}, err
|
||||||
}
|
}
|
||||||
|
// Look up the wallet containing the requested signer
|
||||||
|
account := accounts.Account{Address: args.From}
|
||||||
|
|
||||||
|
wallet, err := s.b.AccountManager().Find(account)
|
||||||
|
if err != nil {
|
||||||
|
return common.Hash{}, err
|
||||||
|
}
|
||||||
|
// Assemble the transaction and sign with the wallet
|
||||||
tx := args.toTransaction()
|
tx := args.toTransaction()
|
||||||
|
|
||||||
var chainID *big.Int
|
var chainID *big.Int
|
||||||
if config := s.b.ChainConfig(); config.IsEIP155(s.b.CurrentBlock().Number()) {
|
if config := s.b.ChainConfig(); config.IsEIP155(s.b.CurrentBlock().Number()) {
|
||||||
chainID = config.ChainId
|
chainID = config.ChainId
|
||||||
}
|
}
|
||||||
signed, err := s.b.AccountManager().SignTx(accounts.Account{Address: args.From}, tx, chainID)
|
signed, err := wallet.SignTx(account, tx, chainID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return common.Hash{}, err
|
return common.Hash{}, err
|
||||||
}
|
}
|
||||||
@ -1154,7 +1229,15 @@ func (s *PublicTransactionPoolAPI) SendRawTransaction(ctx context.Context, encod
|
|||||||
//
|
//
|
||||||
// https://github.com/ethereum/wiki/wiki/JSON-RPC#eth_sign
|
// https://github.com/ethereum/wiki/wiki/JSON-RPC#eth_sign
|
||||||
func (s *PublicTransactionPoolAPI) Sign(addr common.Address, data hexutil.Bytes) (hexutil.Bytes, error) {
|
func (s *PublicTransactionPoolAPI) Sign(addr common.Address, data hexutil.Bytes) (hexutil.Bytes, error) {
|
||||||
signature, err := s.b.AccountManager().SignHash(accounts.Account{Address: addr}, signHash(data))
|
// Look up the wallet containing the requested signer
|
||||||
|
account := accounts.Account{Address: addr}
|
||||||
|
|
||||||
|
wallet, err := s.b.AccountManager().Find(account)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// Sign the requested hash with the wallet
|
||||||
|
signature, err := wallet.SignHash(account, signHash(data))
|
||||||
if err == nil {
|
if err == nil {
|
||||||
signature[64] += 27 // Transform V from 0/1 to 27/28 according to the yellow paper
|
signature[64] += 27 // Transform V from 0/1 to 27/28 according to the yellow paper
|
||||||
}
|
}
|
||||||
@ -1200,7 +1283,7 @@ func (s *PublicTransactionPoolAPI) PendingTransactions() ([]*RPCTransaction, err
|
|||||||
signer = types.NewEIP155Signer(tx.ChainId())
|
signer = types.NewEIP155Signer(tx.ChainId())
|
||||||
}
|
}
|
||||||
from, _ := types.Sender(signer, tx)
|
from, _ := types.Sender(signer, tx)
|
||||||
if s.b.AccountManager().HasAddress(from) {
|
if _, err := s.b.AccountManager().Find(accounts.Account{Address: from}); err == nil {
|
||||||
transactions = append(transactions, newRPCPendingTransaction(tx))
|
transactions = append(transactions, newRPCPendingTransaction(tx))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -448,6 +448,18 @@ web3._extend({
|
|||||||
name: 'ecRecover',
|
name: 'ecRecover',
|
||||||
call: 'personal_ecRecover',
|
call: 'personal_ecRecover',
|
||||||
params: 2
|
params: 2
|
||||||
|
}),
|
||||||
|
new web3._extend.Method({
|
||||||
|
name: 'deriveAccount',
|
||||||
|
call: 'personal_deriveAccount',
|
||||||
|
params: 3
|
||||||
|
})
|
||||||
|
],
|
||||||
|
properties:
|
||||||
|
[
|
||||||
|
new web3._extend.Property({
|
||||||
|
name: 'listWallets',
|
||||||
|
getter: 'personal_listWallets'
|
||||||
})
|
})
|
||||||
]
|
]
|
||||||
})
|
})
|
||||||
|
@ -386,8 +386,11 @@ func (self *worker) makeCurrent(parent *types.Block, header *types.Header) error
|
|||||||
work.family.Add(ancestor.Hash())
|
work.family.Add(ancestor.Hash())
|
||||||
work.ancestors.Add(ancestor.Hash())
|
work.ancestors.Add(ancestor.Hash())
|
||||||
}
|
}
|
||||||
accounts := self.eth.AccountManager().Accounts()
|
wallets := self.eth.AccountManager().Wallets()
|
||||||
|
accounts := make([]accounts.Account, 0, len(wallets))
|
||||||
|
for _, wallet := range wallets {
|
||||||
|
accounts = append(accounts, wallet.Accounts()...)
|
||||||
|
}
|
||||||
// Keep track of transactions which return errors so they can be removed
|
// Keep track of transactions which return errors so they can be removed
|
||||||
work.tcount = 0
|
work.tcount = 0
|
||||||
work.ownedAccounts = accountAddressesSet(accounts)
|
work.ownedAccounts = accountAddressesSet(accounts)
|
||||||
|
@ -402,7 +402,7 @@ func (c *Config) parsePersistentNodes(path string) []*discover.Node {
|
|||||||
return nodes
|
return nodes
|
||||||
}
|
}
|
||||||
|
|
||||||
func makeAccountManager(conf *Config) (am *accounts.Manager, ephemeralKeystore string, err error) {
|
func makeAccountManager(conf *Config) (*accounts.Manager, string, error) {
|
||||||
scryptN := keystore.StandardScryptN
|
scryptN := keystore.StandardScryptN
|
||||||
scryptP := keystore.StandardScryptP
|
scryptP := keystore.StandardScryptP
|
||||||
if conf.UseLightweightKDF {
|
if conf.UseLightweightKDF {
|
||||||
@ -410,7 +410,11 @@ func makeAccountManager(conf *Config) (am *accounts.Manager, ephemeralKeystore s
|
|||||||
scryptP = keystore.LightScryptP
|
scryptP = keystore.LightScryptP
|
||||||
}
|
}
|
||||||
|
|
||||||
var keydir string
|
var (
|
||||||
|
keydir string
|
||||||
|
ephemeral string
|
||||||
|
err error
|
||||||
|
)
|
||||||
switch {
|
switch {
|
||||||
case filepath.IsAbs(conf.KeyStoreDir):
|
case filepath.IsAbs(conf.KeyStoreDir):
|
||||||
keydir = conf.KeyStoreDir
|
keydir = conf.KeyStoreDir
|
||||||
@ -425,7 +429,7 @@ func makeAccountManager(conf *Config) (am *accounts.Manager, ephemeralKeystore s
|
|||||||
default:
|
default:
|
||||||
// There is no datadir.
|
// There is no datadir.
|
||||||
keydir, err = ioutil.TempDir("", "go-ethereum-keystore")
|
keydir, err = ioutil.TempDir("", "go-ethereum-keystore")
|
||||||
ephemeralKeystore = keydir
|
ephemeral = keydir
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, "", err
|
return nil, "", err
|
||||||
@ -433,7 +437,6 @@ func makeAccountManager(conf *Config) (am *accounts.Manager, ephemeralKeystore s
|
|||||||
if err := os.MkdirAll(keydir, 0700); err != nil {
|
if err := os.MkdirAll(keydir, 0700); err != nil {
|
||||||
return nil, "", err
|
return nil, "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Assemble the account manager and supported backends
|
// Assemble the account manager and supported backends
|
||||||
backends := []accounts.Backend{
|
backends := []accounts.Backend{
|
||||||
keystore.NewKeyStore(keydir, scryptN, scryptP),
|
keystore.NewKeyStore(keydir, scryptN, scryptP),
|
||||||
@ -443,5 +446,22 @@ func makeAccountManager(conf *Config) (am *accounts.Manager, ephemeralKeystore s
|
|||||||
} else {
|
} else {
|
||||||
backends = append(backends, ledgerhub)
|
backends = append(backends, ledgerhub)
|
||||||
}
|
}
|
||||||
return accounts.NewManager(backends...), ephemeralKeystore, nil
|
am := accounts.NewManager(backends...)
|
||||||
|
|
||||||
|
// Start some logging for the user
|
||||||
|
changes := make(chan accounts.WalletEvent, 16)
|
||||||
|
am.Subscribe(changes)
|
||||||
|
go func() {
|
||||||
|
for event := range changes {
|
||||||
|
if event.Arrive {
|
||||||
|
glog.V(logger.Info).Infof("New %s wallet appeared: %s", event.Wallet.Type(), event.Wallet.URL())
|
||||||
|
if err := event.Wallet.Open(""); err != nil {
|
||||||
|
glog.V(logger.Warn).Infof("Failed to open %s wallet %s: %v", event.Wallet.Type(), event.Wallet.URL(), err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
glog.V(logger.Info).Infof("Old %s wallet disappeared: %s", event.Wallet.Type(), event.Wallet.URL())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
return am, ephemeral, nil
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user