2017-05-16 12:09:52 +00:00
|
|
|
package node
|
2016-07-27 11:47:41 +00:00
|
|
|
|
2016-06-15 19:50:35 +00:00
|
|
|
import (
|
2017-05-15 21:49:22 +00:00
|
|
|
"bytes"
|
2016-06-20 15:21:45 +00:00
|
|
|
"errors"
|
2016-06-15 19:50:35 +00:00
|
|
|
"fmt"
|
2017-05-06 21:53:18 +00:00
|
|
|
"io/ioutil"
|
2017-05-15 21:49:22 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2016-06-15 19:50:35 +00:00
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
"github.com/ethereum/go-ethereum/accounts"
|
2017-05-06 21:53:18 +00:00
|
|
|
"github.com/ethereum/go-ethereum/accounts/keystore"
|
2017-05-16 12:09:52 +00:00
|
|
|
gethcommon "github.com/ethereum/go-ethereum/common"
|
2016-06-21 14:34:38 +00:00
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
2016-09-11 11:44:14 +00:00
|
|
|
"github.com/status-im/status-go/extkeys"
|
2017-05-16 12:09:52 +00:00
|
|
|
"github.com/status-im/status-go/geth/common"
|
2016-06-15 19:50:35 +00:00
|
|
|
)
|
|
|
|
|
2017-05-03 14:24:48 +00:00
|
|
|
// errors
|
2016-06-15 19:50:35 +00:00
|
|
|
var (
|
2017-05-03 14:24:48 +00:00
|
|
|
ErrAddressToAccountMappingFailure = errors.New("cannot retrieve a valid account for a given address")
|
|
|
|
ErrAccountToKeyMappingFailure = errors.New("cannot retrieve a valid key for a given account")
|
2016-08-21 06:45:59 +00:00
|
|
|
ErrWhisperIdentityInjectionFailure = errors.New("failed to inject identity into Whisper")
|
2016-08-29 00:31:16 +00:00
|
|
|
ErrWhisperClearIdentitiesFailure = errors.New("failed to clear whisper identities")
|
2016-08-23 21:32:04 +00:00
|
|
|
ErrNoAccountSelected = errors.New("no account has been selected, please login")
|
2016-09-11 11:44:14 +00:00
|
|
|
ErrInvalidMasterKeyCreated = errors.New("can not create master extended key")
|
2016-06-15 19:50:35 +00:00
|
|
|
)
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
// AccountManager represents account manager interface
|
|
|
|
type AccountManager struct {
|
|
|
|
nodeManager common.NodeManager
|
|
|
|
selectedAccount *common.SelectedExtKey // account that was processed during the last call to SelectAccount()
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewAccountManager returns new node account manager
|
|
|
|
func NewAccountManager(nodeManager common.NodeManager) *AccountManager {
|
|
|
|
return &AccountManager{
|
|
|
|
nodeManager: nodeManager,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// CreateAccount creates an internal geth account
|
2016-08-23 21:32:04 +00:00
|
|
|
// BIP44-compatible keys are generated: CKD#1 is stored as account key, CKD#2 stored as sub-account root
|
|
|
|
// Public key of CKD#1 is returned, with CKD#2 securely encoded into account key file (to be used for
|
|
|
|
// sub-account derivations)
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) CreateAccount(password string) (address, pubKey, mnemonic string, err error) {
|
2016-08-23 21:32:04 +00:00
|
|
|
// generate mnemonic phrase
|
2017-05-16 12:09:52 +00:00
|
|
|
mn := extkeys.NewMnemonic(extkeys.Salt)
|
|
|
|
mnemonic, err = mn.MnemonicPhrase(128, extkeys.EnglishLanguage)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
2016-09-11 11:44:14 +00:00
|
|
|
return "", "", "", fmt.Errorf("can not create mnemonic seed: %v", err)
|
2016-08-23 21:32:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// generate extended master key (see BIP32)
|
2017-05-16 12:09:52 +00:00
|
|
|
extKey, err := extkeys.NewMaster(mn.MnemonicSeed(mnemonic, password), []byte(extkeys.Salt))
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
2016-09-11 11:44:14 +00:00
|
|
|
return "", "", "", fmt.Errorf("can not create master extended key: %v", err)
|
2016-08-23 21:32:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// import created key into account keystore
|
2017-05-16 12:09:52 +00:00
|
|
|
address, pubKey, err = m.importExtendedKey(extKey, password)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", "", "", err
|
|
|
|
}
|
2016-06-29 11:32:04 +00:00
|
|
|
|
2016-08-23 21:32:04 +00:00
|
|
|
return address, pubKey, mnemonic, nil
|
2016-08-18 00:15:58 +00:00
|
|
|
}
|
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// CreateChildAccount creates sub-account for an account identified by parent address.
|
2016-08-23 21:32:04 +00:00
|
|
|
// CKD#2 is used as root for master accounts (when parentAddress is "").
|
|
|
|
// Otherwise (when parentAddress != ""), child is derived directly from parent.
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) CreateChildAccount(parentAddress, password string) (address, pubKey string, err error) {
|
|
|
|
keyStore, err := m.nodeManager.AccountKeyStore()
|
2016-09-11 11:44:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
2016-08-23 21:32:04 +00:00
|
|
|
}
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
if parentAddress == "" && m.selectedAccount != nil { // derive from selected account by default
|
|
|
|
parentAddress = m.selectedAccount.Address.Hex()
|
2016-08-23 21:32:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if parentAddress == "" {
|
|
|
|
return "", "", ErrNoAccountSelected
|
|
|
|
}
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
account, err := common.ParseAccountString(parentAddress)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", "", ErrAddressToAccountMappingFailure
|
|
|
|
}
|
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// make sure that given password can decrypt key associated with a given parent address
|
2017-02-27 12:52:10 +00:00
|
|
|
account, accountKey, err := keyStore.AccountDecryptedKey(account, password)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", "", fmt.Errorf("%s: %v", ErrAccountToKeyMappingFailure.Error(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
parentKey, err := extkeys.NewKeyFromString(accountKey.ExtendedKey.String())
|
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
// derive child key
|
|
|
|
childKey, err := parentKey.Child(accountKey.SubAccountIndex)
|
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
2017-05-03 14:24:48 +00:00
|
|
|
if err = keyStore.IncSubAccountIndex(account, password); err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
2016-09-27 13:51:08 +00:00
|
|
|
accountKey.SubAccountIndex++
|
2016-08-18 00:15:58 +00:00
|
|
|
|
2016-08-23 21:32:04 +00:00
|
|
|
// import derived key into account keystore
|
2017-05-16 12:09:52 +00:00
|
|
|
address, pubKey, err = m.importExtendedKey(childKey, password)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2016-08-18 00:15:58 +00:00
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// update in-memory selected account
|
2017-05-16 12:09:52 +00:00
|
|
|
if m.selectedAccount != nil {
|
|
|
|
m.selectedAccount.AccountKey = accountKey
|
2016-09-27 13:51:08 +00:00
|
|
|
}
|
|
|
|
|
2016-08-23 21:32:04 +00:00
|
|
|
return address, pubKey, nil
|
|
|
|
}
|
2016-08-21 06:45:59 +00:00
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// RecoverAccount re-creates master key using given details.
|
2016-08-23 21:32:04 +00:00
|
|
|
// Once master key is re-generated, it is inserted into keystore (if not already there).
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) RecoverAccount(password, mnemonic string) (address, pubKey string, err error) {
|
2016-08-23 21:32:04 +00:00
|
|
|
// re-create extended key (see BIP32)
|
2017-05-16 12:09:52 +00:00
|
|
|
mn := extkeys.NewMnemonic(extkeys.Salt)
|
|
|
|
extKey, err := extkeys.NewMaster(mn.MnemonicSeed(mnemonic, password), []byte(extkeys.Salt))
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
2016-09-11 11:44:14 +00:00
|
|
|
return "", "", ErrInvalidMasterKeyCreated
|
2016-08-23 21:32:04 +00:00
|
|
|
}
|
2016-08-18 00:15:58 +00:00
|
|
|
|
2016-08-23 21:32:04 +00:00
|
|
|
// import re-created key into account keystore
|
2017-05-16 12:09:52 +00:00
|
|
|
address, pubKey, err = m.importExtendedKey(extKey, password)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
2016-08-18 00:15:58 +00:00
|
|
|
}
|
2016-06-15 19:50:35 +00:00
|
|
|
|
2016-08-23 21:32:04 +00:00
|
|
|
return address, pubKey, nil
|
2016-06-15 19:50:35 +00:00
|
|
|
}
|
2016-06-20 15:21:45 +00:00
|
|
|
|
2017-05-06 21:53:18 +00:00
|
|
|
// VerifyAccountPassword tries to decrypt a given account key file, with a provided password.
|
|
|
|
// If no error is returned, then account is considered verified.
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) VerifyAccountPassword(keyStoreDir, address, password string) (*keystore.Key, error) {
|
2017-05-15 21:49:22 +00:00
|
|
|
var err error
|
|
|
|
var keyJSON []byte
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
addressObj := gethcommon.BytesToAddress(gethcommon.FromHex(address))
|
2017-05-15 21:49:22 +00:00
|
|
|
checkAccountKey := func(path string, fileInfo os.FileInfo) error {
|
|
|
|
if len(keyJSON) > 0 || fileInfo.IsDir() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
keyJSON, err = ioutil.ReadFile(path)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("invalid account key file: %v", err)
|
|
|
|
}
|
|
|
|
if !bytes.Contains(keyJSON, []byte(fmt.Sprintf(`"address":"%s"`, addressObj.Hex()[2:]))) {
|
|
|
|
keyJSON = []byte{}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// locate key within key store directory (address should be within the file)
|
|
|
|
err = filepath.Walk(keyStoreDir, func(path string, fileInfo os.FileInfo, err error) error {
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return checkAccountKey(path, fileInfo)
|
|
|
|
})
|
2017-05-06 21:53:18 +00:00
|
|
|
if err != nil {
|
2017-05-15 21:49:22 +00:00
|
|
|
return nil, fmt.Errorf("cannot traverse key store folder: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(keyJSON) == 0 {
|
|
|
|
return nil, fmt.Errorf("cannot locate account for address: %x", addressObj)
|
2017-05-06 21:53:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
key, err := keystore.DecryptKey(keyJSON, password)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// avoid swap attack
|
2017-05-15 21:49:22 +00:00
|
|
|
if key.Address != addressObj {
|
|
|
|
return nil, fmt.Errorf("account mismatch: have %x, want %x", key.Address, addressObj)
|
2017-05-06 21:53:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return key, nil
|
|
|
|
}
|
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// SelectAccount selects current account, by verifying that address has corresponding account which can be decrypted
|
2016-08-23 21:32:04 +00:00
|
|
|
// using provided password. Once verification is done, decrypted key is injected into Whisper (as a single identity,
|
|
|
|
// all previous identities are removed).
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) SelectAccount(address, password string) error {
|
|
|
|
keyStore, err := m.nodeManager.AccountKeyStore()
|
2016-09-11 11:44:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2016-08-21 06:45:59 +00:00
|
|
|
}
|
2016-06-21 18:29:38 +00:00
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
account, err := common.ParseAccountString(address)
|
2016-08-21 06:45:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return ErrAddressToAccountMappingFailure
|
|
|
|
}
|
2016-06-21 18:29:38 +00:00
|
|
|
|
2017-02-27 12:52:10 +00:00
|
|
|
account, accountKey, err := keyStore.AccountDecryptedKey(account, password)
|
2016-08-21 06:45:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("%s: %v", ErrAccountToKeyMappingFailure.Error(), err)
|
|
|
|
}
|
2016-07-04 12:28:49 +00:00
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
whisperService, err := m.nodeManager.WhisperService()
|
2016-09-11 11:44:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2016-06-21 18:29:38 +00:00
|
|
|
}
|
2016-09-11 11:44:14 +00:00
|
|
|
|
2017-05-02 14:35:37 +00:00
|
|
|
if err := whisperService.SelectKeyPair(accountKey.PrivateKey); err != nil {
|
2016-08-21 06:45:59 +00:00
|
|
|
return ErrWhisperIdentityInjectionFailure
|
|
|
|
}
|
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// persist account key for easier recovery of currently selected key
|
2017-05-16 12:09:52 +00:00
|
|
|
subAccounts, err := m.findSubAccounts(accountKey.ExtendedKey, accountKey.SubAccountIndex)
|
2016-09-27 13:51:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-05-16 12:09:52 +00:00
|
|
|
m.selectedAccount = &common.SelectedExtKey{
|
2016-09-27 13:51:08 +00:00
|
|
|
Address: account.Address,
|
|
|
|
AccountKey: accountKey,
|
|
|
|
SubAccounts: subAccounts,
|
|
|
|
}
|
2016-08-23 21:32:04 +00:00
|
|
|
|
2016-08-21 06:45:59 +00:00
|
|
|
return nil
|
|
|
|
}
|
2016-06-21 18:29:38 +00:00
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
// SelectedAccount returns currently selected account
|
|
|
|
func (m *AccountManager) SelectedAccount() (*common.SelectedExtKey, error) {
|
|
|
|
if m.selectedAccount == nil {
|
|
|
|
return nil, ErrNoAccountSelected
|
|
|
|
}
|
|
|
|
return m.selectedAccount, nil
|
|
|
|
}
|
2017-01-24 18:42:55 +00:00
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
// ReSelectAccount selects previously selected account, often, after node restart.
|
|
|
|
func (m *AccountManager) ReSelectAccount() error {
|
|
|
|
selectedAccount := m.selectedAccount
|
2017-01-24 18:42:55 +00:00
|
|
|
if selectedAccount == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
whisperService, err := m.nodeManager.WhisperService()
|
2017-01-24 18:42:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-05-02 14:35:37 +00:00
|
|
|
if err := whisperService.SelectKeyPair(selectedAccount.AccountKey.PrivateKey); err != nil {
|
2017-01-24 18:42:55 +00:00
|
|
|
return ErrWhisperIdentityInjectionFailure
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-09-27 13:51:08 +00:00
|
|
|
// Logout clears whisper identities
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) Logout() error {
|
|
|
|
whisperService, err := m.nodeManager.WhisperService()
|
2016-09-11 11:44:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2016-08-29 00:31:16 +00:00
|
|
|
}
|
|
|
|
|
2017-05-02 14:35:37 +00:00
|
|
|
err = whisperService.DeleteKeyPairs()
|
2016-08-29 00:31:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("%s: %v", ErrWhisperClearIdentitiesFailure, err)
|
|
|
|
}
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
m.selectedAccount = nil
|
2016-08-23 21:32:04 +00:00
|
|
|
|
2016-08-29 00:31:16 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-08-23 21:32:04 +00:00
|
|
|
// importExtendedKey processes incoming extended key, extracts required info and creates corresponding account key.
|
|
|
|
// Once account key is formed, that key is put (if not already) into keystore i.e. key is *encoded* into key file.
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) importExtendedKey(extKey *extkeys.ExtendedKey, password string) (address, pubKey string, err error) {
|
|
|
|
keyStore, err := m.nodeManager.AccountKeyStore()
|
2016-09-11 11:44:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
|
2016-08-23 21:32:04 +00:00
|
|
|
// imports extended key, create key file (if necessary)
|
2017-02-27 12:52:10 +00:00
|
|
|
account, err := keyStore.ImportExtendedKey(extKey, password)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
2016-09-11 11:44:14 +00:00
|
|
|
return "", "", err
|
2016-08-23 21:32:04 +00:00
|
|
|
}
|
|
|
|
address = fmt.Sprintf("%x", account.Address)
|
|
|
|
|
|
|
|
// obtain public key to return
|
2017-02-27 12:52:10 +00:00
|
|
|
account, key, err := keyStore.AccountDecryptedKey(account, password)
|
2016-08-23 21:32:04 +00:00
|
|
|
if err != nil {
|
2016-09-11 11:44:14 +00:00
|
|
|
return address, "", err
|
2016-08-23 21:32:04 +00:00
|
|
|
}
|
2017-05-16 12:09:52 +00:00
|
|
|
pubKey = gethcommon.ToHex(crypto.FromECDSAPub(&key.PrivateKey.PublicKey))
|
2016-08-23 21:32:04 +00:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
2016-09-27 13:51:08 +00:00
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
// AccountsListRequestHandler returns handler to process account list request
|
|
|
|
func (m *AccountManager) AccountsListRequestHandler() func(entities []gethcommon.Address) []gethcommon.Address {
|
|
|
|
return func(entities []gethcommon.Address) []gethcommon.Address {
|
|
|
|
if m.selectedAccount == nil {
|
|
|
|
return []gethcommon.Address{}
|
|
|
|
}
|
2016-09-27 13:51:08 +00:00
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
m.refreshSelectedAccount()
|
|
|
|
|
|
|
|
filtered := make([]gethcommon.Address, 0)
|
|
|
|
for _, account := range entities {
|
|
|
|
// main account
|
|
|
|
if m.selectedAccount.Address.Hex() == account.Hex() {
|
|
|
|
filtered = append(filtered, account)
|
|
|
|
} else {
|
|
|
|
// sub accounts
|
|
|
|
for _, subAccount := range m.selectedAccount.SubAccounts {
|
|
|
|
if subAccount.Address.Hex() == account.Hex() {
|
|
|
|
filtered = append(filtered, account)
|
|
|
|
}
|
2016-09-27 13:51:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
return filtered
|
|
|
|
}
|
2016-09-27 13:51:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// refreshSelectedAccount re-populates list of sub-accounts of the currently selected account (if any)
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) refreshSelectedAccount() {
|
|
|
|
if m.selectedAccount == nil {
|
2016-09-27 13:51:08 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-05-16 12:09:52 +00:00
|
|
|
accountKey := m.selectedAccount.AccountKey
|
2016-09-27 13:51:08 +00:00
|
|
|
if accountKey == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// re-populate list of sub-accounts
|
2017-05-16 12:09:52 +00:00
|
|
|
subAccounts, err := m.findSubAccounts(accountKey.ExtendedKey, accountKey.SubAccountIndex)
|
2016-09-27 13:51:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2017-05-16 12:09:52 +00:00
|
|
|
m.selectedAccount = &common.SelectedExtKey{
|
|
|
|
Address: m.selectedAccount.Address,
|
|
|
|
AccountKey: m.selectedAccount.AccountKey,
|
2016-09-27 13:51:08 +00:00
|
|
|
SubAccounts: subAccounts,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// findSubAccounts traverses cached accounts and adds as a sub-accounts any
|
|
|
|
// that belong to the currently selected account.
|
|
|
|
// The extKey is CKD#2 := root of sub-accounts of the main account
|
2017-05-16 12:09:52 +00:00
|
|
|
func (m *AccountManager) findSubAccounts(extKey *extkeys.ExtendedKey, subAccountIndex uint32) ([]accounts.Account, error) {
|
|
|
|
keyStore, err := m.nodeManager.AccountKeyStore()
|
2016-09-27 13:51:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return []accounts.Account{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
subAccounts := make([]accounts.Account, 0)
|
|
|
|
if extKey.Depth == 5 { // CKD#2 level
|
|
|
|
// gather possible sub-account addresses
|
2017-05-16 12:09:52 +00:00
|
|
|
subAccountAddresses := make([]gethcommon.Address, 0)
|
2016-09-27 13:51:08 +00:00
|
|
|
for i := uint32(0); i < subAccountIndex; i++ {
|
|
|
|
childKey, err := extKey.Child(i)
|
|
|
|
if err != nil {
|
|
|
|
return []accounts.Account{}, err
|
|
|
|
}
|
|
|
|
subAccountAddresses = append(subAccountAddresses, crypto.PubkeyToAddress(childKey.ToECDSA().PublicKey))
|
|
|
|
}
|
|
|
|
|
|
|
|
// see if any of the gathered addresses actually exist in cached accounts list
|
2017-02-27 12:52:10 +00:00
|
|
|
for _, cachedAccount := range keyStore.Accounts() {
|
2016-09-27 13:51:08 +00:00
|
|
|
for _, possibleAddress := range subAccountAddresses {
|
|
|
|
if possibleAddress.Hex() == cachedAccount.Address.Hex() {
|
|
|
|
subAccounts = append(subAccounts, cachedAccount)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return subAccounts, nil
|
|
|
|
}
|
2017-05-16 12:09:52 +00:00
|
|
|
|
|
|
|
// AddressToDecryptedAccount tries to load decrypted key for a given account.
|
|
|
|
// The running node, has a keystore directory which is loaded on start. Key file
|
|
|
|
// for a given address is expected to be in that directory prior to node start.
|
|
|
|
func (m *AccountManager) AddressToDecryptedAccount(address, password string) (accounts.Account, *keystore.Key, error) {
|
|
|
|
keyStore, err := m.nodeManager.AccountKeyStore()
|
|
|
|
if err != nil {
|
|
|
|
return accounts.Account{}, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
account, err := common.ParseAccountString(address)
|
|
|
|
if err != nil {
|
|
|
|
return accounts.Account{}, nil, ErrAddressToAccountMappingFailure
|
|
|
|
}
|
|
|
|
|
|
|
|
return keyStore.AccountDecryptedKey(account, password)
|
|
|
|
}
|