// Copyright 2015, 2016 Ethcore (UK) Ltd. // This file is part of Parity. // Parity is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Parity is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Parity. If not, see . //! Account management. use std::fmt; use std::collections::HashMap; use util::{Address as H160, H256, H520, RwLock}; use ethstore::{SecretStore, Error as SSError, SafeAccount, EthStore}; use ethstore::dir::{KeyDirectory}; use ethstore::ethkey::{Address as SSAddress, Message as SSMessage, Secret as SSSecret, Random, Generator}; /// Type of unlock. #[derive(Clone)] enum Unlock { /// If account is unlocked temporarily, it should be locked after first usage. Temp, /// Account unlocked permantently can always sign message. /// Use with caution. Perm, } /// Data associated with account. #[derive(Clone)] struct AccountData { unlock: Unlock, password: String, } /// `AccountProvider` errors. #[derive(Debug)] pub enum Error { /// Returned when account is not unlocked. NotUnlocked, /// Returned when signing fails. SStore(SSError), } impl fmt::Display for Error { fn fmt(&self, f: &mut fmt::Formatter) -> Result<(), fmt::Error> { match *self { Error::NotUnlocked => write!(f, "Account is locked"), Error::SStore(ref e) => write!(f, "{}", e), } } } impl From for Error { fn from(e: SSError) -> Self { Error::SStore(e) } } macro_rules! impl_bridge_type { ($name: ident, $size: expr, $core: ident, $store: ident) => { /// Primitive pub struct $name([u8; $size]); impl From<[u8; $size]> for $name { fn from(s: [u8; $size]) -> Self { $name(s) } } impl From<$core> for $name { fn from(s: $core) -> Self { $name(s.0) } } impl From<$store> for $name { fn from(s: $store) -> Self { $name(s.into()) } } impl Into<$core> for $name { fn into(self) -> $core { $core(self.0) } } impl Into<$store> for $name { fn into(self) -> $store { $store::from(self.0) } } } } impl_bridge_type!(Secret, 32, H256, SSSecret); impl_bridge_type!(Message, 32, H256, SSMessage); impl_bridge_type!(Address, 20, H160, SSAddress); struct NullDir; impl KeyDirectory for NullDir { fn load(&self) -> Result, SSError> { Ok(vec![]) } fn insert(&self, _account: SafeAccount) -> Result<(), SSError> { Ok(()) } fn remove(&self, _address: &SSAddress) -> Result<(), SSError> { Ok(()) } } /// Account management. /// Responsible for unlocking accounts. pub struct AccountProvider { unlocked: RwLock>, sstore: Box, } impl AccountProvider { /// Creates new account provider. pub fn new(sstore: Box) -> Self { AccountProvider { unlocked: RwLock::new(HashMap::new()), sstore: sstore, } } /// Creates not disk backed provider. pub fn transient_provider() -> Self { AccountProvider { unlocked: RwLock::new(HashMap::new()), sstore: Box::new(EthStore::open(Box::new(NullDir)).unwrap()) } } /// Creates new random account. pub fn new_account(&self, password: &str) -> Result { let secret = Random.generate().unwrap().secret().clone(); let address = try!(self.sstore.insert_account(secret, password)); Ok(Address::from(address).into()) } /// Inserts new account into underlying store. /// Does not unlock account! pub fn insert_account(&self, secret: S, password: &str) -> Result where Secret: From { let s = Secret::from(secret); let address = try!(self.sstore.insert_account(s.into(), password)); Ok(Address::from(address).into()) } /// Returns addresses of all accounts. pub fn accounts(&self) -> Vec { self.sstore.accounts().into_iter().map(|a| H160(a.into())).collect() } /// Helper method used for unlocking accounts. fn unlock_account(&self, account: A, password: String, unlock: Unlock) -> Result<(), Error> where Address: From { let a = Address::from(account); let account = a.into(); // verify password by signing dump message // result may be discarded let _ = try!(self.sstore.sign(&account, &password, &Default::default())); // check if account is already unlocked pernamently, if it is, do nothing { let unlocked = self.unlocked.read(); if let Some(data) = unlocked.get(&account) { if let Unlock::Perm = data.unlock { return Ok(()) } } } let data = AccountData { unlock: unlock, password: password, }; let mut unlocked = self.unlocked.write(); unlocked.insert(account, data); Ok(()) } /// Unlocks account permanently. pub fn unlock_account_permanently(&self, account: A, password: String) -> Result<(), Error> where Address: From { self.unlock_account(account, password, Unlock::Perm) } /// Unlocks account temporarily (for one signing). pub fn unlock_account_temporarily(&self, account: A, password: String) -> Result<(), Error> where Address: From { self.unlock_account(account, password, Unlock::Temp) } /// Checks if given account is unlocked pub fn is_unlocked(&self, account: A) -> bool where Address: From { let account = Address::from(account).into(); let unlocked = self.unlocked.read(); unlocked.get(&account).is_some() } /// Signs the message. Account must be unlocked. pub fn sign(&self, account: A, message: M) -> Result where Address: From, Message: From { let account = Address::from(account).into(); let message = Message::from(message).into(); let data = { let unlocked = self.unlocked.read(); try!(unlocked.get(&account).ok_or(Error::NotUnlocked)).clone() }; if let Unlock::Temp = data.unlock { let mut unlocked = self.unlocked.write(); unlocked.remove(&account).expect("data exists: so key must exist: qed"); } let signature = try!(self.sstore.sign(&account, &data.password, &message)); Ok(H520(signature.into())) } /// Unlocks an account, signs the message, and locks it again. pub fn sign_with_password(&self, account: A, password: String, message: M) -> Result where Address: From, Message: From { let account = Address::from(account).into(); let message = Message::from(message).into(); let signature = try!(self.sstore.sign(&account, &password, &message)); Ok(H520(signature.into())) } } #[cfg(test)] mod tests { use super::AccountProvider; use ethstore::ethkey::{Generator, Random}; #[test] fn unlock_account_temp() { let kp = Random.generate().unwrap(); let ap = AccountProvider::transient_provider(); assert!(ap.insert_account(kp.secret().clone(), "test").is_ok()); assert!(ap.unlock_account_temporarily(kp.address(), "test1".into()).is_err()); assert!(ap.unlock_account_temporarily(kp.address(), "test".into()).is_ok()); assert!(ap.sign(kp.address(), [0u8; 32]).is_ok()); assert!(ap.sign(kp.address(), [0u8; 32]).is_err()); } #[test] fn unlock_account_perm() { let kp = Random.generate().unwrap(); let ap = AccountProvider::transient_provider(); assert!(ap.insert_account(kp.secret().clone(), "test").is_ok()); assert!(ap.unlock_account_permanently(kp.address(), "test1".into()).is_err()); assert!(ap.unlock_account_permanently(kp.address(), "test".into()).is_ok()); assert!(ap.sign(kp.address(), [0u8; 32]).is_ok()); assert!(ap.sign(kp.address(), [0u8; 32]).is_ok()); assert!(ap.unlock_account_temporarily(kp.address(), "test".into()).is_ok()); assert!(ap.sign(kp.address(), [0u8; 32]).is_ok()); assert!(ap.sign(kp.address(), [0u8; 32]).is_ok()); } }