mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-08 07:48:00 +00:00
dcd77a147c
* Be a little safer with total issuance. * PairT instead of _Pair * Remove rev causing upset * Remove fees stuff. * Fix build (including tests) * Update runtime, bump version * Fix * Handle gas refunds properly. * Rename identifier ala #2025 * Address grumbles * New not-quite-linear-typing API * Slimmer API * More linear-type test fixes * Fix tests * Tidy * Fix some grumbles * Keep unchecked functions private * Remove another less-than-safe currency function and ensure that contracts module can never create cash. * Address a few grumbles and fix tests
168 lines
4.8 KiB
Rust
168 lines
4.8 KiB
Rust
// Copyright 2017-2019 Parity Technologies (UK) Ltd.
|
|
// This file is part of Substrate.
|
|
|
|
// Substrate is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Substrate is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Substrate. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! Keystore (and session key management) for ed25519 based chains like Polkadot.
|
|
|
|
// Silence: `use of deprecated item 'std::error::Error::cause': replaced by Error::source, which can support downcasting`
|
|
// https://github.com/paritytech/substrate/issues/1547
|
|
#![allow(deprecated)]
|
|
|
|
use std::collections::HashMap;
|
|
use std::path::PathBuf;
|
|
use std::fs::{self, File};
|
|
use std::io::{self, Write};
|
|
|
|
use error_chain::{bail, error_chain, error_chain_processing, impl_error_chain_processed,
|
|
impl_extract_backtrace, impl_error_chain_kind};
|
|
|
|
use substrate_primitives::{ed25519::{Pair, Public}, Pair as PairT};
|
|
|
|
pub use crypto::KEY_ITERATIONS;
|
|
|
|
error_chain! {
|
|
foreign_links {
|
|
Io(io::Error);
|
|
Json(serde_json::Error);
|
|
}
|
|
|
|
errors {
|
|
InvalidPassword {
|
|
description("Invalid password"),
|
|
display("Invalid password"),
|
|
}
|
|
InvalidPhrase {
|
|
description("Invalid recovery phrase (BIP39) data"),
|
|
display("Invalid recovery phrase (BIP39) data"),
|
|
}
|
|
InvalidSeed {
|
|
description("Invalid seed"),
|
|
display("Invalid seed"),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Key store.
|
|
pub struct Store {
|
|
path: PathBuf,
|
|
additional: HashMap<Public, Pair>,
|
|
}
|
|
|
|
impl Store {
|
|
/// Create a new store at the given path.
|
|
pub fn open(path: PathBuf) -> Result<Self> {
|
|
fs::create_dir_all(&path)?;
|
|
Ok(Store { path, additional: HashMap::new() })
|
|
}
|
|
|
|
/// Generate a new key, placing it into the store.
|
|
pub fn generate(&self, password: &str) -> Result<Pair> {
|
|
let (pair, phrase) = Pair::generate_with_phrase(Some(password));
|
|
let mut file = File::create(self.key_file_path(&pair.public()))?;
|
|
::serde_json::to_writer(&file, &phrase)?;
|
|
file.flush()?;
|
|
Ok(pair)
|
|
}
|
|
|
|
/// Create a new key from seed. Do not place it into the store.
|
|
pub fn generate_from_seed(&mut self, seed: &str) -> Result<Pair> {
|
|
let pair = Pair::from_string(seed, None)
|
|
.map_err(|_| Error::from(ErrorKind::InvalidSeed))?;
|
|
self.additional.insert(pair.public(), pair.clone());
|
|
Ok(pair)
|
|
}
|
|
|
|
/// Load a key file with given public key.
|
|
pub fn load(&self, public: &Public, password: &str) -> Result<Pair> {
|
|
if let Some(pair) = self.additional.get(public) {
|
|
return Ok(pair.clone());
|
|
}
|
|
let path = self.key_file_path(public);
|
|
let file = File::open(path)?;
|
|
|
|
let phrase: String = ::serde_json::from_reader(&file)?;
|
|
let pair = Pair::from_phrase(&phrase, Some(password))
|
|
.map_err(|_| Error::from(ErrorKind::InvalidPhrase))?;
|
|
if &pair.public() != public {
|
|
bail!(ErrorKind::InvalidPassword);
|
|
}
|
|
Ok(pair)
|
|
}
|
|
|
|
/// Get public keys of all stored keys.
|
|
pub fn contents(&self) -> Result<Vec<Public>> {
|
|
let mut public_keys: Vec<Public> = self.additional.keys().cloned().collect();
|
|
for entry in fs::read_dir(&self.path)? {
|
|
let entry = entry?;
|
|
let path = entry.path();
|
|
|
|
// skip directories and non-unicode file names (hex is unicode)
|
|
if let Some(name) = path.file_name().and_then(|n| n.to_str()) {
|
|
if name.len() != 64 { continue }
|
|
|
|
match hex::decode(name) {
|
|
Ok(ref hex) if hex.len() == 32 => {
|
|
let mut buf = [0; 32];
|
|
buf.copy_from_slice(&hex[..]);
|
|
|
|
public_keys.push(Public(buf));
|
|
}
|
|
_ => continue,
|
|
}
|
|
}
|
|
}
|
|
|
|
Ok(public_keys)
|
|
}
|
|
|
|
fn key_file_path(&self, public: &Public) -> PathBuf {
|
|
let mut buf = self.path.clone();
|
|
buf.push(hex::encode(public.as_slice()));
|
|
buf
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use tempdir::TempDir;
|
|
|
|
#[test]
|
|
fn basic_store() {
|
|
let temp_dir = TempDir::new("keystore").unwrap();
|
|
let store = Store::open(temp_dir.path().to_owned()).unwrap();
|
|
|
|
assert!(store.contents().unwrap().is_empty());
|
|
|
|
let key = store.generate("thepassword").unwrap();
|
|
let key2 = store.load(&key.public(), "thepassword").unwrap();
|
|
|
|
assert!(store.load(&key.public(), "notthepassword").is_err());
|
|
|
|
assert_eq!(key.public(), key2.public());
|
|
|
|
assert_eq!(store.contents().unwrap()[0], key.public());
|
|
}
|
|
|
|
#[test]
|
|
fn test_generate_from_seed() {
|
|
let temp_dir = TempDir::new("keystore").unwrap();
|
|
let mut store = Store::open(temp_dir.path().to_owned()).unwrap();
|
|
|
|
let pair = store.generate_from_seed("0x3d97c819d68f9bafa7d6e79cb991eebcd77d966c5334c0b94d9e1fa7ad0869dc").unwrap();
|
|
assert_eq!("5DKUrgFqCPV8iAXx9sjy1nyBygQCeiUYRFWurZGhnrn3HBL8", pair.public().to_ss58check());
|
|
}
|
|
}
|