2019-07-24 18:59:15 +00:00
|
|
|
package generator
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/pborman/uuid"
|
2020-01-02 09:10:19 +00:00
|
|
|
|
2019-12-11 13:59:37 +00:00
|
|
|
"github.com/status-im/status-go/eth-node/crypto"
|
2020-01-06 11:07:05 +00:00
|
|
|
"github.com/status-im/status-go/eth-node/keystore"
|
2019-12-11 13:59:37 +00:00
|
|
|
"github.com/status-im/status-go/eth-node/types"
|
2019-07-24 18:59:15 +00:00
|
|
|
"github.com/status-im/status-go/extkeys"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// ErrAccountNotFoundByID is returned when the selected account doesn't exist in memory.
|
|
|
|
ErrAccountNotFoundByID = errors.New("account not found")
|
|
|
|
// ErrAccountCannotDeriveChildKeys is returned when trying to derive child accounts from a normal key.
|
|
|
|
ErrAccountCannotDeriveChildKeys = errors.New("selected account cannot derive child keys")
|
|
|
|
// ErrAccountManagerNotSet is returned when the account mananger instance is not set.
|
|
|
|
ErrAccountManagerNotSet = errors.New("account manager not set")
|
|
|
|
)
|
|
|
|
|
|
|
|
type AccountManager interface {
|
2019-12-19 18:27:27 +00:00
|
|
|
AddressToDecryptedAccount(address, password string) (types.Account, *types.Key, error)
|
2019-07-24 18:59:15 +00:00
|
|
|
ImportSingleExtendedKey(extKey *extkeys.ExtendedKey, password string) (address, pubKey string, err error)
|
2019-12-11 13:59:37 +00:00
|
|
|
ImportAccount(privateKey *ecdsa.PrivateKey, password string) (types.Address, error)
|
2019-07-24 18:59:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type Generator struct {
|
|
|
|
am AccountManager
|
|
|
|
accounts map[string]*account
|
|
|
|
sync.Mutex
|
|
|
|
}
|
|
|
|
|
|
|
|
func New(am AccountManager) *Generator {
|
|
|
|
return &Generator{
|
|
|
|
am: am,
|
|
|
|
accounts: make(map[string]*account),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) Generate(mnemonicPhraseLength int, n int, bip39Passphrase string) ([]GeneratedAccountInfo, error) {
|
|
|
|
entropyStrength, err := MnemonicPhraseLengthToEntropyStrength(mnemonicPhraseLength)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
infos := make([]GeneratedAccountInfo, 0)
|
|
|
|
|
|
|
|
for i := 0; i < n; i++ {
|
|
|
|
mnemonic := extkeys.NewMnemonic()
|
|
|
|
mnemonicPhrase, err := mnemonic.MnemonicPhrase(entropyStrength, extkeys.EnglishLanguage)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("can not create mnemonic seed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
info, err := g.ImportMnemonic(mnemonicPhrase, bip39Passphrase)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
infos = append(infos, info)
|
|
|
|
}
|
|
|
|
|
|
|
|
return infos, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) ImportPrivateKey(privateKeyHex string) (IdentifiedAccountInfo, error) {
|
|
|
|
privateKeyHex = strings.TrimPrefix(privateKeyHex, "0x")
|
|
|
|
privateKey, err := crypto.HexToECDSA(privateKeyHex)
|
|
|
|
if err != nil {
|
|
|
|
return IdentifiedAccountInfo{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
acc := &account{
|
|
|
|
privateKey: privateKey,
|
|
|
|
}
|
|
|
|
|
|
|
|
id := g.addAccount(acc)
|
|
|
|
|
|
|
|
return acc.toIdentifiedAccountInfo(id), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) ImportJSONKey(json string, password string) (IdentifiedAccountInfo, error) {
|
|
|
|
key, err := keystore.DecryptKey([]byte(json), password)
|
|
|
|
if err != nil {
|
|
|
|
return IdentifiedAccountInfo{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
acc := &account{
|
|
|
|
privateKey: key.PrivateKey,
|
|
|
|
}
|
|
|
|
|
|
|
|
id := g.addAccount(acc)
|
|
|
|
|
|
|
|
return acc.toIdentifiedAccountInfo(id), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) ImportMnemonic(mnemonicPhrase string, bip39Passphrase string) (GeneratedAccountInfo, error) {
|
|
|
|
mnemonic := extkeys.NewMnemonic()
|
|
|
|
masterExtendedKey, err := extkeys.NewMaster(mnemonic.MnemonicSeed(mnemonicPhrase, bip39Passphrase))
|
|
|
|
if err != nil {
|
|
|
|
return GeneratedAccountInfo{}, fmt.Errorf("can not create master extended key: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
acc := &account{
|
|
|
|
privateKey: masterExtendedKey.ToECDSA(),
|
|
|
|
extendedKey: masterExtendedKey,
|
|
|
|
}
|
|
|
|
|
|
|
|
id := g.addAccount(acc)
|
|
|
|
|
|
|
|
return acc.toGeneratedAccountInfo(id, mnemonicPhrase), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) GenerateAndDeriveAddresses(mnemonicPhraseLength int, n int, bip39Passphrase string, pathStrings []string) ([]GeneratedAndDerivedAccountInfo, error) {
|
|
|
|
masterAccounts, err := g.Generate(mnemonicPhraseLength, n, bip39Passphrase)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
accs := make([]GeneratedAndDerivedAccountInfo, n)
|
|
|
|
|
|
|
|
for i := 0; i < len(masterAccounts); i++ {
|
|
|
|
acc := masterAccounts[i]
|
|
|
|
derived, err := g.DeriveAddresses(acc.ID, pathStrings)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
accs[i] = acc.toGeneratedAndDerived(derived)
|
|
|
|
}
|
|
|
|
|
|
|
|
return accs, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) DeriveAddresses(accountID string, pathStrings []string) (map[string]AccountInfo, error) {
|
|
|
|
acc, err := g.findAccount(accountID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pathAccounts, err := g.deriveChildAccounts(acc, pathStrings)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pathAccountsInfo := make(map[string]AccountInfo)
|
|
|
|
|
|
|
|
for pathString, childAccount := range pathAccounts {
|
|
|
|
pathAccountsInfo[pathString] = childAccount.toAccountInfo()
|
|
|
|
}
|
|
|
|
|
|
|
|
return pathAccountsInfo, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) StoreAccount(accountID string, password string) (AccountInfo, error) {
|
|
|
|
if g.am == nil {
|
|
|
|
return AccountInfo{}, ErrAccountManagerNotSet
|
|
|
|
}
|
|
|
|
|
|
|
|
acc, err := g.findAccount(accountID)
|
|
|
|
if err != nil {
|
|
|
|
return AccountInfo{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return g.store(acc, password)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) StoreDerivedAccounts(accountID string, password string, pathStrings []string) (map[string]AccountInfo, error) {
|
|
|
|
if g.am == nil {
|
|
|
|
return nil, ErrAccountManagerNotSet
|
|
|
|
}
|
|
|
|
|
|
|
|
acc, err := g.findAccount(accountID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pathAccounts, err := g.deriveChildAccounts(acc, pathStrings)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pathAccountsInfo := make(map[string]AccountInfo)
|
|
|
|
|
|
|
|
for pathString, childAccount := range pathAccounts {
|
|
|
|
info, err := g.store(childAccount, password)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pathAccountsInfo[pathString] = info
|
|
|
|
}
|
|
|
|
|
|
|
|
return pathAccountsInfo, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) LoadAccount(address string, password string) (IdentifiedAccountInfo, error) {
|
|
|
|
if g.am == nil {
|
|
|
|
return IdentifiedAccountInfo{}, ErrAccountManagerNotSet
|
|
|
|
}
|
|
|
|
|
|
|
|
_, key, err := g.am.AddressToDecryptedAccount(address, password)
|
|
|
|
if err != nil {
|
|
|
|
return IdentifiedAccountInfo{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := ValidateKeystoreExtendedKey(key); err != nil {
|
|
|
|
return IdentifiedAccountInfo{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
acc := &account{
|
|
|
|
privateKey: key.PrivateKey,
|
|
|
|
extendedKey: key.ExtendedKey,
|
|
|
|
}
|
|
|
|
|
|
|
|
id := g.addAccount(acc)
|
|
|
|
|
|
|
|
return acc.toIdentifiedAccountInfo(id), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) deriveChildAccounts(acc *account, pathStrings []string) (map[string]*account, error) {
|
|
|
|
pathAccounts := make(map[string]*account)
|
|
|
|
|
|
|
|
for _, pathString := range pathStrings {
|
|
|
|
childAccount, err := g.deriveChildAccount(acc, pathString)
|
|
|
|
if err != nil {
|
|
|
|
return pathAccounts, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pathAccounts[pathString] = childAccount
|
|
|
|
}
|
|
|
|
|
|
|
|
return pathAccounts, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) deriveChildAccount(acc *account, pathString string) (*account, error) {
|
|
|
|
_, path, err := decodePath(pathString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if acc.extendedKey.IsZeroed() && len(path) == 0 {
|
|
|
|
return acc, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if acc.extendedKey.IsZeroed() {
|
|
|
|
return nil, ErrAccountCannotDeriveChildKeys
|
|
|
|
}
|
|
|
|
|
|
|
|
childExtendedKey, err := acc.extendedKey.Derive(path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &account{
|
|
|
|
privateKey: childExtendedKey.ToECDSA(),
|
|
|
|
extendedKey: childExtendedKey,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) store(acc *account, password string) (AccountInfo, error) {
|
|
|
|
if acc.extendedKey != nil {
|
|
|
|
if _, _, err := g.am.ImportSingleExtendedKey(acc.extendedKey, password); err != nil {
|
|
|
|
return AccountInfo{}, err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if _, err := g.am.ImportAccount(acc.privateKey, password); err != nil {
|
|
|
|
return AccountInfo{}, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
g.Reset()
|
|
|
|
|
|
|
|
return acc.toAccountInfo(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) addAccount(acc *account) string {
|
|
|
|
g.Lock()
|
|
|
|
defer g.Unlock()
|
|
|
|
|
|
|
|
id := uuid.NewRandom().String()
|
|
|
|
g.accounts[id] = acc
|
|
|
|
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reset resets the accounts map removing all the accounts from memory.
|
|
|
|
func (g *Generator) Reset() {
|
|
|
|
g.Lock()
|
|
|
|
defer g.Unlock()
|
|
|
|
|
|
|
|
g.accounts = make(map[string]*account)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g *Generator) findAccount(accountID string) (*account, error) {
|
|
|
|
g.Lock()
|
|
|
|
defer g.Unlock()
|
|
|
|
|
|
|
|
acc, ok := g.accounts[accountID]
|
|
|
|
if !ok {
|
|
|
|
return nil, ErrAccountNotFoundByID
|
|
|
|
}
|
|
|
|
|
|
|
|
return acc, nil
|
|
|
|
}
|