mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-06 18:28:03 +00:00
6963272451
* draft * revert * WIP * all that remains is tests * update Cargo.lock * tests WIP * WIP refactor node-template-runtime and node-runtime * implments sc_cli::RuntimeAdapter for node_template_runtime::Runtime * final draft * fix update_config for subcommands * proper AccountId decoding * test-runtime tests * revert * move RuntimeAdapter to cli-utils * use &'static str for TryFrom::<&'a str>::Error for Ss58AddressFormat * tests * add frame-system to sc-cli dev-dependencies * add frame-system to sc-cli dev-dependencies * fix ui test * wip * fixed inspect test * bump impl version * bump impl version, fixx spaces remove todos * pallet-balances-cli, rustc for some reason cannot resolve pallet_balances_cli in node-cli 😩 * wip * Subcommand::run takes &self * can't believe i missed that 🤦🏾♂️ * bump wasm-bindgen for some reason * adds key subcommand, rename generate-node-key to generate-node-id * cargo update and crossed fingers 🤞🏽 * update ui test * update more ui tests * should be all good now * revert subkey change * revert subkey change * adds frame-utilities-cli * Apply suggestions from code review Co-authored-by: Benjamin Kampmann <ben@gnunicorn.org> * removes frame from sc-cli, fix license * my editor and ci disagrees on line width * bump spec version * turn off default features for parity-scale-codec * enable full_crypto feature for sp-core in cli-utils * merge frame-utilities-cli with pallet-balances-cli * remove full_crypto feature from sp_core in cli-utils * bump Cargo.lock * cli-utils -> frame-utils * rename BlockNumber to GenericNumber, fix spaces * fix spaces * construct additional_signed manually * sign test * remove unused vars * implement subkey with frame-utilities-cli and sc_cli * fix moduleid test * CI and clion disagree on line widths * adds associated Params type to SignedExtensionProvider * Apply suggestions from code review Co-authored-by: Benjamin Kampmann <ben@gnunicorn.org> * move some code around * removes unneccesary generic params * moves module_id back to frame_utilities_cli * Apply suggestions from code review Co-authored-by: Benjamin Kampmann <ben@gnunicorn.org> Co-authored-by: Bastian Köcher <bkchr@users.noreply.github.com> * remove print_ext * remove MaybeDisplay from pallet_balances::Trait::Balance * a lot of stuff tbh * adds ExtrasParamsBuilder * remove tests for ModuleIdCmd * address comments from PR * bump Cargo.lock * manually insert key into keystore * remove unnecessary SharedParams * add validation to vanity pattern, remove unused arg * remove SharedParams from Sign, Vanity, Verify * remove SharedParams from ModuleIdCmd, remove expect from Verify, new line to Cargo.toml * remove SharedParams from InsertCmd * 🤦🏾♂️ * deleted prometheus.yml * move a few things around * fix vanity test Co-authored-by: Benjamin Kampmann <ben@gnunicorn.org> Co-authored-by: Bastian Köcher <bkchr@users.noreply.github.com> Co-authored-by: Benjamin Kampmann <ben@parity.io>
105 lines
3.0 KiB
Rust
105 lines
3.0 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2019-2020 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: GPL-3.0-or-later WITH Classpath-exception-2.0
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
//! implementation of the `verify` subcommand
|
|
|
|
use crate::{error, utils, with_crypto_scheme, CryptoSchemeFlag};
|
|
use sp_core::{Public, crypto::Ss58Codec};
|
|
use structopt::StructOpt;
|
|
|
|
/// The `verify` command
|
|
#[derive(Debug, StructOpt)]
|
|
#[structopt(
|
|
name = "verify",
|
|
about = "Verify a signature for a message, provided on STDIN, with a given (public or secret) key"
|
|
)]
|
|
pub struct VerifyCmd {
|
|
/// Signature, hex-encoded.
|
|
sig: String,
|
|
|
|
/// The public or secret key URI.
|
|
/// If the value is a file, the file content is used as URI.
|
|
/// If not given, you will be prompted for the URI.
|
|
uri: Option<String>,
|
|
|
|
/// Message to verify, if not provided you will be prompted to
|
|
/// pass the message via STDIN
|
|
#[structopt(long)]
|
|
message: Option<String>,
|
|
|
|
/// The message on STDIN is hex-encoded data
|
|
#[structopt(long)]
|
|
hex: bool,
|
|
|
|
#[allow(missing_docs)]
|
|
#[structopt(flatten)]
|
|
pub crypto_scheme: CryptoSchemeFlag,
|
|
}
|
|
|
|
impl VerifyCmd {
|
|
/// Run the command
|
|
pub fn run(&self) -> error::Result<()> {
|
|
let message = utils::read_message(self.message.as_ref(), self.hex)?;
|
|
let sig_data = utils::decode_hex(&self.sig)?;
|
|
let uri = utils::read_uri(self.uri.as_ref())?;
|
|
let uri = if uri.starts_with("0x") {
|
|
&uri[2..]
|
|
} else {
|
|
&uri
|
|
};
|
|
|
|
with_crypto_scheme!(
|
|
self.crypto_scheme.scheme,
|
|
verify(sig_data, message, uri)
|
|
)
|
|
}
|
|
}
|
|
|
|
fn verify<Pair>(sig_data: Vec<u8>, message: Vec<u8>, uri: &str) -> error::Result<()>
|
|
where
|
|
Pair: sp_core::Pair,
|
|
Pair::Signature: Default + AsMut<[u8]>,
|
|
{
|
|
let mut signature = Pair::Signature::default();
|
|
if sig_data.len() != signature.as_ref().len() {
|
|
return Err(error::Error::Other(format!(
|
|
"signature has an invalid length. read {} bytes, expected {} bytes",
|
|
sig_data.len(),
|
|
signature.as_ref().len(),
|
|
)));
|
|
}
|
|
signature.as_mut().copy_from_slice(&sig_data);
|
|
|
|
let pubkey = if let Ok(pubkey_vec) = hex::decode(uri) {
|
|
Pair::Public::from_slice(pubkey_vec.as_slice())
|
|
} else {
|
|
Pair::Public::from_string(uri)
|
|
.map_err(|_| {
|
|
error::Error::Other(format!("Invalid URI; expecting either a secret URI or a public URI."))
|
|
})?
|
|
};
|
|
|
|
if Pair::verify(&signature, &message, &pubkey) {
|
|
println!("Signature verifies correctly.");
|
|
} else {
|
|
return Err(error::Error::Other("Signature invalid.".into()))
|
|
}
|
|
|
|
Ok(())
|
|
}
|