2020-09-22 14:53:52 +02:00
|
|
|
// Copyright 2015-2020 Parity Technologies (UK) Ltd.
|
|
|
|
// This file is part of OpenEthereum.
|
2019-02-07 14:34:24 +01:00
|
|
|
|
2020-09-22 14:53:52 +02:00
|
|
|
// OpenEthereum is free software: you can redistribute it and/or modify
|
2019-02-07 14:34:24 +01:00
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
|
2020-09-22 14:53:52 +02:00
|
|
|
// OpenEthereum is distributed in the hope that it will be useful,
|
2019-02-07 14:34:24 +01:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
|
|
|
|
// You should have received a copy of the GNU General Public License
|
2020-09-22 14:53:52 +02:00
|
|
|
// along with OpenEthereum. If not, see <http://www.gnu.org/licenses/>.
|
2019-02-07 14:34:24 +01:00
|
|
|
|
|
|
|
use std::sync::Arc;
|
|
|
|
|
2021-03-12 10:12:42 +01:00
|
|
|
use crypto::publickey;
|
2019-02-07 14:34:24 +01:00
|
|
|
use dir::Directories;
|
2021-03-12 10:12:42 +01:00
|
|
|
use ethereum_types::{Address, H160};
|
2019-02-07 14:34:24 +01:00
|
|
|
use ethkey::Password;
|
|
|
|
|
2021-03-12 14:55:49 +01:00
|
|
|
use crate::params::{AccountsConfig, SpecType};
|
2019-02-07 14:34:24 +01:00
|
|
|
|
|
|
|
#[cfg(not(feature = "accounts"))]
|
|
|
|
mod accounts {
|
|
|
|
use super::*;
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
/// Dummy AccountProvider
|
|
|
|
pub struct AccountProvider;
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
impl ::ethcore::miner::LocalAccounts for AccountProvider {
|
2019-02-14 15:54:44 +01:00
|
|
|
fn is_local(&self, _address: &Address) -> bool {
|
2019-02-07 14:34:24 +01:00
|
|
|
false
|
2020-08-05 06:08:03 +02:00
|
|
|
}
|
2019-02-07 14:34:24 +01:00
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-14 15:54:44 +01:00
|
|
|
pub fn prepare_account_provider(
|
|
|
|
_spec: &SpecType,
|
|
|
|
_dirs: &Directories,
|
|
|
|
_data_dir: &str,
|
|
|
|
_cfg: AccountsConfig,
|
|
|
|
_passwords: &[Password],
|
|
|
|
) -> Result<AccountProvider, String> {
|
2020-09-22 14:53:52 +02:00
|
|
|
warn!("Note: Your instance of OpenEthereum is running without account support. Some CLI options are ignored.");
|
2019-02-07 14:34:24 +01:00
|
|
|
Ok(AccountProvider)
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
pub fn miner_local_accounts(_: Arc<AccountProvider>) -> AccountProvider {
|
|
|
|
AccountProvider
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
pub fn miner_author(
|
|
|
|
_spec: &SpecType,
|
|
|
|
_dirs: &Directories,
|
|
|
|
_account_provider: &Arc<AccountProvider>,
|
|
|
|
_engine_signer: Address,
|
|
|
|
_passwords: &[Password],
|
|
|
|
) -> Result<Option<::ethcore::miner::Author>, String> {
|
|
|
|
Ok(None)
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
pub fn accounts_list(
|
|
|
|
_account_provider: Arc<AccountProvider>,
|
2020-07-29 10:36:15 +02:00
|
|
|
) -> Arc<dyn Fn() -> Vec<Address> + Send + Sync> {
|
2019-02-07 14:34:24 +01:00
|
|
|
Arc::new(|| vec![])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "accounts")]
|
|
|
|
mod accounts {
|
|
|
|
use super::*;
|
2021-03-24 15:15:10 +01:00
|
|
|
use crate::{ethereum_types::H256, upgrade::upgrade_key_location};
|
2021-03-12 10:12:42 +01:00
|
|
|
use std::str::FromStr;
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2021-03-12 14:55:49 +01:00
|
|
|
pub use crate::accounts::AccountProvider;
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
/// Pops along with error messages when a password is missing or invalid.
|
|
|
|
const VERIFY_PASSWORD_HINT: &str = "Make sure valid password is present in files passed using `--password` or in the configuration file.";
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
/// Initialize account provider
|
|
|
|
pub fn prepare_account_provider(
|
|
|
|
spec: &SpecType,
|
|
|
|
dirs: &Directories,
|
|
|
|
data_dir: &str,
|
|
|
|
cfg: AccountsConfig,
|
|
|
|
passwords: &[Password],
|
|
|
|
) -> Result<AccountProvider, String> {
|
2021-03-12 14:55:49 +01:00
|
|
|
use crate::accounts::AccountProviderSettings;
|
2019-02-07 14:34:24 +01:00
|
|
|
use ethstore::{accounts_dir::RootDiskDirectory, EthStore};
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
let path = dirs.keys_path(data_dir);
|
|
|
|
upgrade_key_location(&dirs.legacy_keys_path(cfg.testnet), &path);
|
|
|
|
let dir = Box::new(
|
|
|
|
RootDiskDirectory::create(&path)
|
|
|
|
.map_err(|e| format!("Could not open keys directory: {}", e))?,
|
|
|
|
);
|
|
|
|
let account_settings = AccountProviderSettings {
|
|
|
|
unlock_keep_secret: cfg.enable_fast_unlock,
|
|
|
|
blacklisted_accounts: match *spec {
|
2019-11-11 21:57:38 +01:00
|
|
|
SpecType::Morden
|
|
|
|
| SpecType::Ropsten
|
|
|
|
| SpecType::Kovan
|
|
|
|
| SpecType::Goerli
|
|
|
|
| SpecType::Sokol
|
|
|
|
| SpecType::Dev => vec![],
|
2021-03-12 10:12:42 +01:00
|
|
|
_ => vec![H160::from_str("00a329c0648769a73afac7f9381e08fb43dbea72")
|
|
|
|
.expect("the string is valid hex; qed")],
|
2019-02-07 14:34:24 +01:00
|
|
|
},
|
|
|
|
};
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
let ethstore = EthStore::open_with_iterations(dir, cfg.iterations)
|
|
|
|
.map_err(|e| format!("Could not open keys directory: {}", e))?;
|
|
|
|
if cfg.refresh_time > 0 {
|
|
|
|
ethstore.set_refresh_time(::std::time::Duration::from_secs(cfg.refresh_time));
|
|
|
|
}
|
|
|
|
let account_provider = AccountProvider::new(Box::new(ethstore), account_settings);
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
// Add development account if running dev chain:
|
|
|
|
if let SpecType::Dev = *spec {
|
|
|
|
insert_dev_account(&account_provider);
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
for a in cfg.unlocked_accounts {
|
|
|
|
// Check if the account exists
|
|
|
|
if !account_provider.has_account(a) {
|
|
|
|
return Err(format!(
|
|
|
|
"Account {} not found for the current chain. {}",
|
|
|
|
a,
|
|
|
|
build_create_account_hint(spec, &dirs.keys)
|
|
|
|
));
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
// Check if any passwords have been read from the password file(s)
|
|
|
|
if passwords.is_empty() {
|
|
|
|
return Err(format!(
|
|
|
|
"No password found to unlock account {}. {}",
|
|
|
|
a, VERIFY_PASSWORD_HINT
|
|
|
|
));
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
if !passwords.iter().any(|p| {
|
|
|
|
account_provider
|
|
|
|
.unlock_account_permanently(a, (*p).clone())
|
|
|
|
.is_ok()
|
2020-08-05 06:08:03 +02:00
|
|
|
}) {
|
2019-02-07 14:34:24 +01:00
|
|
|
return Err(format!(
|
|
|
|
"No valid password to unlock account {}. {}",
|
|
|
|
a, VERIFY_PASSWORD_HINT
|
|
|
|
));
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
}
|
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
Ok(account_provider)
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
pub struct LocalAccounts(Arc<AccountProvider>);
|
|
|
|
impl ::ethcore::miner::LocalAccounts for LocalAccounts {
|
|
|
|
fn is_local(&self, address: &Address) -> bool {
|
|
|
|
self.0.has_account(*address)
|
2020-08-05 06:08:03 +02:00
|
|
|
}
|
2019-02-07 14:34:24 +01:00
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
pub fn miner_local_accounts(account_provider: Arc<AccountProvider>) -> LocalAccounts {
|
|
|
|
LocalAccounts(account_provider)
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
pub fn miner_author(
|
|
|
|
spec: &SpecType,
|
|
|
|
dirs: &Directories,
|
|
|
|
account_provider: &Arc<AccountProvider>,
|
|
|
|
engine_signer: Address,
|
|
|
|
passwords: &[Password],
|
|
|
|
) -> Result<Option<::ethcore::miner::Author>, String> {
|
|
|
|
use ethcore::engines::EngineSigner;
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
// Check if engine signer exists
|
|
|
|
if !account_provider.has_account(engine_signer) {
|
|
|
|
return Err(format!(
|
|
|
|
"Consensus signer account not found for the current chain. {}",
|
|
|
|
build_create_account_hint(spec, &dirs.keys)
|
|
|
|
));
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
// Check if any passwords have been read from the password file(s)
|
|
|
|
if passwords.is_empty() {
|
|
|
|
return Err(format!(
|
|
|
|
"No password found for the consensus signer {}. {}",
|
|
|
|
engine_signer, VERIFY_PASSWORD_HINT
|
|
|
|
));
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
let mut author = None;
|
|
|
|
for password in passwords {
|
|
|
|
let signer = parity_rpc::signer::EngineSigner::new(
|
|
|
|
account_provider.clone(),
|
|
|
|
engine_signer,
|
|
|
|
password.clone(),
|
|
|
|
);
|
2021-03-24 15:15:10 +01:00
|
|
|
// sign dummy msg to check if password and account can be used.
|
|
|
|
if signer.sign(H256::from_low_u64_be(1)).is_ok() {
|
2019-02-07 14:34:24 +01:00
|
|
|
author = Some(::ethcore::miner::Author::Sealer(Box::new(signer)));
|
2020-08-05 06:08:03 +02:00
|
|
|
}
|
2019-02-07 14:34:24 +01:00
|
|
|
}
|
|
|
|
if author.is_none() {
|
|
|
|
return Err(format!(
|
|
|
|
"No valid password for the consensus signer {}. {}",
|
|
|
|
engine_signer, VERIFY_PASSWORD_HINT
|
|
|
|
));
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
Ok(author)
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
pub fn accounts_list(
|
|
|
|
account_provider: Arc<AccountProvider>,
|
2020-07-29 10:36:15 +02:00
|
|
|
) -> Arc<dyn Fn() -> Vec<Address> + Send + Sync> {
|
2019-02-07 14:34:24 +01:00
|
|
|
Arc::new(move || account_provider.accounts().unwrap_or_default())
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
fn insert_dev_account(account_provider: &AccountProvider) {
|
2021-03-12 10:12:42 +01:00
|
|
|
let secret = publickey::Secret::from_str(
|
|
|
|
"4d5db4107d237df6a3d58ee5f70ae63d73d7658d4026f2eefd2f204c81682cb7",
|
|
|
|
)
|
|
|
|
.expect("Valid account;qed");
|
|
|
|
let dev_account = publickey::KeyPair::from_secret(secret.clone())
|
2019-02-07 14:34:24 +01:00
|
|
|
.expect("Valid secret produces valid key;qed");
|
|
|
|
if !account_provider.has_account(dev_account.address()) {
|
|
|
|
match account_provider.insert_account(secret, &Password::from(String::new())) {
|
|
|
|
Err(e) => warn!("Unable to add development account: {}", e),
|
|
|
|
Ok(address) => {
|
|
|
|
let _ = account_provider
|
|
|
|
.set_account_name(address.clone(), "Development Account".into());
|
|
|
|
let _ = account_provider.set_account_meta(
|
|
|
|
address,
|
|
|
|
::serde_json::to_string(
|
|
|
|
&(vec![
|
|
|
|
(
|
|
|
|
"description",
|
|
|
|
"Never use this account outside of development chain!",
|
|
|
|
),
|
|
|
|
("passwordHint", "Password is empty string"),
|
|
|
|
]
|
|
|
|
.into_iter()
|
|
|
|
.collect::<::std::collections::HashMap<_, _>>()),
|
2020-08-05 06:08:03 +02:00
|
|
|
)
|
2019-02-07 14:34:24 +01:00
|
|
|
.expect("Serialization of hashmap does not fail."),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2020-08-05 06:08:03 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-07 14:34:24 +01:00
|
|
|
// Construct an error `String` with an adaptive hint on how to create an account.
|
|
|
|
fn build_create_account_hint(spec: &SpecType, keys: &str) -> String {
|
2020-09-22 14:53:52 +02:00
|
|
|
format!("You can create an account via RPC, UI or `openethereum account new --chain {} --keys-path {}`.", spec, keys)
|
2019-02-07 14:34:24 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub use self::accounts::{
|
2020-09-02 17:43:14 +02:00
|
|
|
accounts_list, miner_author, miner_local_accounts, prepare_account_provider, AccountProvider,
|
2019-02-07 14:34:24 +01:00
|
|
|
};
|