196 lines
6.0 KiB
Go
196 lines
6.0 KiB
Go
package walletconnect
|
|
|
|
import (
|
|
"database/sql"
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/event"
|
|
"github.com/ethereum/go-ethereum/log"
|
|
|
|
"github.com/status-im/status-go/account"
|
|
"github.com/status-im/status-go/eth-node/crypto"
|
|
"github.com/status-im/status-go/eth-node/types"
|
|
"github.com/status-im/status-go/multiaccounts/accounts"
|
|
"github.com/status-im/status-go/params"
|
|
"github.com/status-im/status-go/rpc/network"
|
|
"github.com/status-im/status-go/services/wallet/transfer"
|
|
)
|
|
|
|
type Service struct {
|
|
db *sql.DB
|
|
networkManager *network.Manager
|
|
accountsDB *accounts.Database
|
|
eventFeed *event.Feed
|
|
|
|
transactionManager *transfer.TransactionManager
|
|
gethManager *account.GethManager
|
|
|
|
config *params.NodeConfig
|
|
}
|
|
|
|
func NewService(db *sql.DB, networkManager *network.Manager, accountsDB *accounts.Database,
|
|
transactionManager *transfer.TransactionManager, gethManager *account.GethManager, eventFeed *event.Feed,
|
|
config *params.NodeConfig) *Service {
|
|
return &Service{
|
|
db: db,
|
|
networkManager: networkManager,
|
|
accountsDB: accountsDB,
|
|
eventFeed: eventFeed,
|
|
transactionManager: transactionManager,
|
|
gethManager: gethManager,
|
|
config: config,
|
|
}
|
|
}
|
|
|
|
func (s *Service) PairSessionProposal(proposal SessionProposal) (*PairSessionResponse, error) {
|
|
if !proposal.Valid() {
|
|
return nil, ErrorInvalidSessionProposal
|
|
}
|
|
|
|
var (
|
|
chains []uint64
|
|
eipChains []string
|
|
)
|
|
|
|
if len(proposal.Params.RequiredNamespaces) == 0 {
|
|
// return all we support
|
|
allChains, err := s.networkManager.GetAll()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get all chains: %w", err)
|
|
}
|
|
for _, chain := range allChains {
|
|
chains = append(chains, chain.ChainID)
|
|
eipChains = append(eipChains, fmt.Sprintf("%s:%d", SupportedEip155Namespace, chain.ChainID))
|
|
}
|
|
} else {
|
|
var proposedChains []string
|
|
for key, ns := range proposal.Params.RequiredNamespaces {
|
|
if !strings.Contains(key, SupportedEip155Namespace) {
|
|
log.Warn("Some namespaces are not supported; wanted: ", key, "; supported: ", SupportedEip155Namespace)
|
|
return nil, ErrorNamespaceNotSupported
|
|
}
|
|
|
|
if strings.Contains(key, ":") {
|
|
proposedChains = append(proposedChains, key)
|
|
} else {
|
|
proposedChains = append(proposedChains, ns.Chains...)
|
|
}
|
|
}
|
|
|
|
chains, eipChains = sessionProposalToSupportedChain(proposedChains, func(chainID uint64) bool {
|
|
return s.networkManager.Find(chainID) != nil
|
|
})
|
|
|
|
if len(chains) != len(proposedChains) {
|
|
log.Warn("Some chains are not supported; wanted: ", proposedChains, "; supported: ", chains)
|
|
return nil, ErrorChainsNotSupported
|
|
}
|
|
}
|
|
|
|
activeAccounts, err := s.accountsDB.GetActiveAccounts()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get active accounts: %w", err)
|
|
}
|
|
|
|
allWalletAccountsReadyForTransaction := make([]*accounts.Account, 0, 1)
|
|
for _, acc := range activeAccounts {
|
|
if !acc.IsWalletAccountReadyForTransaction() {
|
|
continue
|
|
}
|
|
allWalletAccountsReadyForTransaction = append(allWalletAccountsReadyForTransaction, acc)
|
|
}
|
|
|
|
result := &PairSessionResponse{
|
|
SessionProposal: proposal,
|
|
SupportedNamespaces: map[string]Namespace{
|
|
SupportedEip155Namespace: Namespace{
|
|
Methods: []string{params.SendTransactionMethodName,
|
|
params.SendRawTransactionMethodName,
|
|
params.PersonalSignMethodName,
|
|
params.SignMethodName,
|
|
params.SignTransactionMethodName,
|
|
params.SignTypedDataMethodName,
|
|
params.WalletSwitchEthereumChainMethodName,
|
|
},
|
|
Events: []string{"accountsChanged", "chainChanged"},
|
|
Chains: eipChains,
|
|
Accounts: caip10Accounts(allWalletAccountsReadyForTransaction, chains),
|
|
},
|
|
},
|
|
}
|
|
|
|
// TODO #12434: respond async
|
|
return result, nil
|
|
}
|
|
|
|
func (s *Service) RecordSuccessfulPairing(proposal SessionProposal) error {
|
|
var icon string
|
|
if len(proposal.Params.Proposer.Metadata.Icons) > 0 {
|
|
icon = proposal.Params.Proposer.Metadata.Icons[0]
|
|
}
|
|
return InsertPairing(s.db, Pairing{
|
|
Topic: proposal.Params.PairingTopic,
|
|
Expiry: proposal.Params.Expiry,
|
|
Active: true,
|
|
AppName: proposal.Params.Proposer.Metadata.Name,
|
|
URL: proposal.Params.Proposer.Metadata.URL,
|
|
Description: proposal.Params.Proposer.Metadata.Description,
|
|
Icon: icon,
|
|
Verified: proposal.Params.Verify.Verified,
|
|
})
|
|
}
|
|
|
|
func (s *Service) ChangePairingState(topic Topic, active bool) error {
|
|
return ChangePairingState(s.db, topic, active)
|
|
}
|
|
|
|
func (s *Service) HasActivePairings() (bool, error) {
|
|
return HasActivePairings(s.db, time.Now().Unix())
|
|
}
|
|
|
|
func (s *Service) SessionRequest(request SessionRequest) (response *transfer.TxResponse, err error) {
|
|
// TODO #12434: should we check topic for validity? It might make sense if we
|
|
// want to cache the paired sessions
|
|
|
|
if request.Params.Request.Method == params.SendTransactionMethodName {
|
|
return s.buildTransaction(request)
|
|
} else if request.Params.Request.Method == params.SignTransactionMethodName {
|
|
return s.buildTransaction(request)
|
|
} else if request.Params.Request.Method == params.PersonalSignMethodName {
|
|
return s.buildMessage(request, 1, 0, false)
|
|
} else if request.Params.Request.Method == params.SignMethodName {
|
|
return s.buildMessage(request, 0, 1, false)
|
|
} else if request.Params.Request.Method == params.SignTypedDataMethodName {
|
|
return s.buildMessage(request, 0, 1, true)
|
|
}
|
|
|
|
// TODO #12434: respond async
|
|
return nil, ErrorMethodNotSupported
|
|
}
|
|
|
|
func (s *Service) AuthRequest(address common.Address, authMessage string) (*transfer.TxResponse, error) {
|
|
account, err := s.accountsDB.GetAccountByAddress(types.Address(address))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get active account: %w", err)
|
|
}
|
|
|
|
kp, err := s.accountsDB.GetKeypairByKeyUID(account.KeyUID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
byteArray := []byte(authMessage)
|
|
hash := crypto.TextHash(byteArray)
|
|
|
|
return &transfer.TxResponse{
|
|
KeyUID: account.KeyUID,
|
|
Address: account.Address,
|
|
AddressPath: account.Path,
|
|
SignOnKeycard: kp.MigratedToKeycard(),
|
|
MessageToSign: types.HexBytes(hash),
|
|
}, nil
|
|
}
|