1use std::{convert::TryFrom, str::FromStr};
5
6use super::{KeyInfo, KeyStore, errors::Error, wallet_helpers};
7use crate::shim::{address::Address, crypto::SignatureType};
8use serde::{Deserialize, Serialize};
9
10#[cfg(test)]
11use {
12 crate::shim::crypto::Signature,
13 ahash::{HashMap, HashMapExt as _},
14};
15
16#[derive(Clone, PartialEq, Debug, Eq, Serialize, Deserialize)]
18pub struct Key {
19 pub key_info: KeyInfo,
20 pub public_key: Vec<u8>,
22 pub address: Address,
23}
24
25impl TryFrom<KeyInfo> for Key {
26 type Error = crate::key_management::errors::Error;
27
28 fn try_from(key_info: KeyInfo) -> Result<Self, Self::Error> {
29 let public_key = wallet_helpers::to_uncompressed_public_key(
30 *key_info.key_type(),
31 key_info.private_key(),
32 )?;
33 let address = wallet_helpers::new_address(*key_info.key_type(), &public_key)?;
34 Ok(Key {
35 key_info,
36 public_key,
37 address,
38 })
39 }
40}
41
42#[cfg(test)]
48#[derive(Clone, PartialEq, Debug, Eq)]
49pub struct Wallet {
50 keys: HashMap<Address, Key>,
51 keystore: KeyStore,
52}
53
54#[cfg(test)]
55impl Wallet {
56 pub fn new(keystore: KeyStore) -> Self {
58 Wallet {
59 keys: HashMap::new(),
60 keystore,
61 }
62 }
63
64 pub fn new_from_keys(keystore: KeyStore, key_vec: impl IntoIterator<Item = Key>) -> Self {
66 let mut keys: HashMap<Address, Key> = HashMap::new();
67 for item in key_vec.into_iter() {
68 keys.insert(item.address, item);
69 }
70 Wallet { keys, keystore }
71 }
72
73 pub fn find_key(&mut self, addr: &Address) -> Result<Key, Error> {
77 if let Some(k) = self.keys.get(addr) {
78 return Ok(k.clone());
79 }
80 let key = try_find_key(addr, &self.keystore)?;
81 self.keys.insert(*addr, key.clone());
82 Ok(key)
83 }
84
85 pub fn sign(&mut self, addr: &Address, msg: &[u8]) -> Result<Signature, Error> {
87 let key = self.find_key(addr).map_err(|_| Error::KeyNotExists)?;
90 wallet_helpers::sign(*key.key_info.key_type(), key.key_info.private_key(), msg)
91 }
92
93 pub fn export(&mut self, addr: &Address) -> Result<KeyInfo, Error> {
95 let k = self.find_key(addr)?;
96 Ok(k.key_info)
97 }
98
99 pub fn import(&mut self, key_info: KeyInfo) -> Result<Address, Error> {
102 let k = Key::try_from(key_info)?;
103 let addr = format!("wallet-{}", k.address);
104 self.keystore.put(&addr, k.key_info)?;
105 Ok(k.address)
106 }
107
108 pub fn list_addrs(&self) -> Result<Vec<Address>, Error> {
111 list_addrs(&self.keystore)
112 }
113
114 pub fn get_default(&self) -> Result<Address, Error> {
116 let key_info = self.keystore.get("default")?;
117 let k = Key::try_from(key_info)?;
118 Ok(k.address)
119 }
120
121 pub fn set_default(&mut self, addr: Address) -> anyhow::Result<()> {
123 let addr_string = format!("wallet-{addr}");
124 let key_info = self.keystore.get(&addr_string)?;
125 if self.keystore.get("default").is_ok() {
126 self.keystore.remove("default")?; }
131 self.keystore.put("default", key_info)?;
132 Ok(())
133 }
134
135 pub fn generate_addr(&mut self, typ: SignatureType) -> anyhow::Result<Address> {
138 let key = generate_key(typ)?;
139 let addr = format!("wallet-{}", key.address);
140 self.keystore.put(&addr, key.key_info.clone())?;
141 self.keys.insert(key.address, key.clone());
142 let value = self.keystore.get("default");
143 if value.is_err() {
144 self.keystore
145 .put("default", key.key_info.clone())
146 .map_err(|err| Error::Other(err.to_string()))?;
147 }
148
149 Ok(key.address)
150 }
151
152 pub fn has_key(&mut self, addr: &Address) -> bool {
155 self.find_key(addr).is_ok()
156 }
157}
158
159pub fn get_default(keystore: &KeyStore) -> Result<Option<Address>, Error> {
161 if let Ok(key_info) = keystore.get("default") {
162 let k = Key::try_from(key_info)?;
163 Ok(Some(k.address))
164 } else {
165 Ok(None)
166 }
167}
168
169pub fn list_addrs(keystore: &KeyStore) -> Result<Vec<Address>, Error> {
172 let mut all = keystore.list();
173 all.sort();
174 let mut out = Vec::new();
175 for i in all {
176 if let Some(addr_str) = i.strip_prefix("wallet-")
177 && let Ok(addr) = crate::shim::address::StrictAddress::from_str(addr_str)
178 {
179 out.push(addr.into());
180 }
181 }
182 Ok(out)
183}
184
185pub fn remove_key(addr: &Address, keystore: &mut KeyStore) -> Result<(), Error> {
187 let key_string = format!("wallet-{addr}");
188 let deleted_keyinfo = keystore
189 .remove(&key_string)
190 .map_err(|_| Error::KeyNotExists)?;
191 if let Ok(default_keyinfo) = keystore.get("default")
192 && default_keyinfo == deleted_keyinfo
193 {
194 keystore
195 .remove("default")
196 .map_err(|_| Error::KeyNotExists)?;
197 }
198 println!("wallet {addr} deleted");
199 Ok(())
200}
201
202pub fn try_find(addr: &Address, keystore: &KeyStore) -> Result<KeyInfo, Error> {
204 let key_string = format!("wallet-{addr}");
205 match keystore.get(&key_string) {
206 Ok(k) => Ok(k),
207 Err(_) => {
208 let mut new_addr = addr.to_string();
209 if new_addr.len() < 2 {
210 return Err(Error::Other(format!("Invalid addr {new_addr}")));
211 }
212 new_addr.replace_range(0..1, "t");
215 let key_string = format!("wallet-{new_addr}");
216 let key_info = match keystore.get(&key_string) {
217 Ok(k) => k,
218 Err(_) => keystore.get(&format!("wallet-f{}", &new_addr[1..]))?,
219 };
220 Ok(key_info)
221 }
222 }
223}
224
225pub fn try_find_key(addr: &Address, keystore: &KeyStore) -> Result<Key, Error> {
226 let ki = try_find(addr, keystore)?;
227 ki.try_into()
228}
229
230pub fn export_key_info(addr: &Address, keystore: &KeyStore) -> Result<KeyInfo, Error> {
232 let key = try_find_key(addr, keystore)?;
233 Ok(key.key_info)
234}
235
236pub fn generate_key(typ: SignatureType) -> Result<Key, Error> {
238 let private_key = wallet_helpers::generate(typ)?;
239 let key_info = KeyInfo::new(typ, private_key);
240 Key::try_from(key_info)
241}
242
243#[cfg(test)]
244mod tests {
245 use crate::utils::encoding::{blake2b_256, keccak_256};
246 use bls_signatures::{PrivateKey as BlsPrivate, Serialize};
247
248 use super::*;
249 use crate::key_management::{KeyStoreConfig, generate};
250
251 fn construct_priv_keys() -> Vec<Key> {
252 let mut secp_keys = Vec::new();
253 let mut bls_keys = Vec::new();
254 let mut delegated_keys = Vec::new();
255 for _ in 1..5 {
256 let secp_priv_key = generate(SignatureType::Secp256k1).unwrap();
257 let secp_key_info = KeyInfo::new(SignatureType::Secp256k1, secp_priv_key);
258 let secp_key = Key::try_from(secp_key_info).unwrap();
259 secp_keys.push(secp_key);
260
261 let bls_priv_key = generate(SignatureType::Bls).unwrap();
262 let bls_key_info = KeyInfo::new(SignatureType::Bls, bls_priv_key);
263 let bls_key = Key::try_from(bls_key_info).unwrap();
264 bls_keys.push(bls_key);
265
266 let delegated_priv_key = generate(SignatureType::Delegated).unwrap();
267 let delegated_key_info = KeyInfo::new(SignatureType::Delegated, delegated_priv_key);
268 let delegated_key = Key::try_from(delegated_key_info).unwrap();
269 delegated_keys.push(delegated_key);
270 }
271
272 secp_keys.append(bls_keys.as_mut());
273 secp_keys.append(delegated_keys.as_mut());
274 secp_keys
275 }
276
277 fn generate_wallet() -> Wallet {
278 let key_vec = construct_priv_keys();
279 Wallet::new_from_keys(KeyStore::new(KeyStoreConfig::Memory).unwrap(), key_vec)
280 }
281
282 #[test]
283 fn contains_key() {
284 let key_vec = construct_priv_keys();
285 let found_key = key_vec[0].clone();
286 let addr = key_vec[0].address;
287
288 let mut wallet =
289 Wallet::new_from_keys(KeyStore::new(KeyStoreConfig::Memory).unwrap(), key_vec);
290
291 assert_eq!(wallet.find_key(&addr).unwrap(), found_key);
293 assert!(wallet.has_key(&addr));
295
296 let new_priv_key = generate(SignatureType::Bls).unwrap();
297 let pub_key =
298 wallet_helpers::to_uncompressed_public_key(SignatureType::Bls, new_priv_key.as_slice())
299 .unwrap();
300 let address = Address::new_bls(pub_key.as_slice()).unwrap();
301
302 assert!(!wallet.has_key(&address));
304 assert!(matches!(
307 wallet.find_key(&address).unwrap_err(),
308 Error::KeyInfo
309 ));
310 assert!(!wallet.has_key(&address));
312 }
313
314 #[test]
315 fn secp_sign() {
316 let key_vec = construct_priv_keys();
317 let priv_key_bytes = key_vec[2].key_info.private_key().clone();
318 let addr = key_vec[2].address;
319
320 let keystore = KeyStore::new(KeyStoreConfig::Memory).unwrap();
321 let mut wallet = Wallet::new_from_keys(keystore, key_vec);
322 let msg = [0u8; 64];
323
324 let msg_sig = wallet.sign(&addr, &msg).unwrap();
325
326 let msg_complete = blake2b_256(&msg);
327 let priv_key = k256::ecdsa::SigningKey::from_slice(&priv_key_bytes).unwrap();
328 let (sig, recovery_id) = priv_key.sign_prehash_recoverable(&msg_complete).unwrap();
329 let mut new_bytes = [0; 65];
330 new_bytes[..64].copy_from_slice(&sig.to_bytes());
331 new_bytes[64] = recovery_id.to_byte();
332 let actual = Signature::new_secp256k1(new_bytes.to_vec());
333 assert_eq!(msg_sig, actual)
334 }
335
336 #[test]
337 fn bls_sign() {
338 let key_vec = construct_priv_keys();
339 let priv_key_bytes = key_vec[4].key_info.private_key().clone();
340 let addr = key_vec[4].address;
341 let mut wallet =
342 Wallet::new_from_keys(KeyStore::new(KeyStoreConfig::Memory).unwrap(), key_vec);
343
344 let msg = [0u8; 64];
345 let msg_sign = wallet.sign(&addr, &msg).unwrap();
346
347 let priv_key = BlsPrivate::from_bytes(&priv_key_bytes).unwrap();
348 let sig = priv_key.sign(msg);
349 let actual = Signature::new_bls(sig.as_bytes());
350 assert_eq!(msg_sign, actual);
351 }
352
353 #[test]
354 fn delegated_sign() {
355 let key_vec = construct_priv_keys();
356 let priv_key_bytes = key_vec[9].key_info.private_key().clone();
357 let addr = key_vec[9].address;
358
359 let keystore = KeyStore::new(KeyStoreConfig::Memory).unwrap();
360 let mut wallet = Wallet::new_from_keys(keystore, key_vec);
361 let msg = [0u8; 64];
362
363 let msg_sig = wallet.sign(&addr, &msg).unwrap();
364
365 let msg_complete = keccak_256(&msg);
366 let priv_key = k256::ecdsa::SigningKey::from_slice(&priv_key_bytes).unwrap();
367 let (sig, recovery_id) = priv_key.sign_prehash_recoverable(&msg_complete).unwrap();
368 let mut new_bytes = [0; 65];
369 new_bytes[..64].copy_from_slice(&sig.to_bytes());
370 new_bytes[64] = recovery_id.to_byte();
371 let actual = Signature::new_delegated(new_bytes.to_vec());
372 assert_eq!(msg_sig, actual)
373 }
374
375 #[test]
376 fn import_export() {
377 let key_vec = construct_priv_keys();
378 let key = key_vec[0].clone();
379 let keystore = KeyStore::new(KeyStoreConfig::Memory).unwrap();
380 let mut wallet = Wallet::new_from_keys(keystore, key_vec);
381
382 let key_info = wallet.export(&key.address).unwrap();
383 assert_eq!(key_info, key.key_info);
385
386 let new_priv_key = generate(SignatureType::Secp256k1).unwrap();
387 let pub_key = wallet_helpers::to_uncompressed_public_key(
388 SignatureType::Secp256k1,
389 new_priv_key.as_slice(),
390 )
391 .unwrap();
392 let test_addr = Address::new_secp256k1(pub_key.as_slice()).unwrap();
393 let key_info_err = wallet.export(&test_addr).unwrap_err();
394 assert!(matches!(key_info_err, Error::KeyInfo));
396
397 let test_key_info = KeyInfo::new(SignatureType::Secp256k1, new_priv_key);
398 assert!(wallet.import(test_key_info.clone()).is_ok());
400
401 let duplicate_error = wallet.import(test_key_info).unwrap_err();
402 assert!(matches!(duplicate_error, Error::KeyExists));
405 }
406
407 #[test]
408 fn list_addr() {
409 let key_vec = construct_priv_keys();
410 let mut addr_string_vec = Vec::new();
411
412 let mut key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
413
414 for i in &key_vec {
415 addr_string_vec.push(i.address.to_string());
416
417 let addr_string = format!("wallet-{}", i.address);
418 key_store.put(&addr_string, i.key_info.clone()).unwrap();
419 }
420
421 addr_string_vec.sort();
422
423 let mut addr_vec = Vec::new();
424
425 for addr in addr_string_vec {
426 addr_vec.push(Address::from_str(addr.as_str()).unwrap())
427 }
428
429 let wallet = Wallet::new(key_store);
430
431 let test_addr_vec = wallet.list_addrs().unwrap();
432
433 assert_eq!(test_addr_vec, addr_vec);
436 }
437
438 #[test]
439 fn generate_new_key() {
440 let mut wallet = generate_wallet();
441 let addr = wallet.generate_addr(SignatureType::Bls).unwrap();
442 let key = wallet.keystore.get("default").unwrap();
443 assert_eq!(&SignatureType::Bls, key.key_type());
446
447 let address = format!("wallet-{addr}");
448
449 let key_info = wallet.keystore.get(&address).unwrap();
450 let key = wallet.keys.get(&addr).unwrap();
451
452 assert_eq!(key_info.key_type(), &SignatureType::Bls);
455 assert_eq!(key.address, addr);
456 }
457
458 #[test]
459 fn get_set_default() {
460 let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
461 let mut wallet = Wallet::new(key_store);
462 assert!(matches!(wallet.get_default().unwrap_err(), Error::KeyInfo));
464
465 let new_priv_key = generate(SignatureType::Secp256k1).unwrap();
466 let pub_key = wallet_helpers::to_uncompressed_public_key(
467 SignatureType::Secp256k1,
468 new_priv_key.as_slice(),
469 )
470 .unwrap();
471 let test_addr = Address::new_secp256k1(pub_key.as_slice()).unwrap();
472
473 let key_info = KeyInfo::new(SignatureType::Secp256k1, new_priv_key);
474 let test_addr_string = format!("wallet-{test_addr}");
475
476 wallet.keystore.put(&test_addr_string, key_info).unwrap();
477
478 assert!(wallet.set_default(test_addr).is_ok());
480
481 assert_eq!(wallet.get_default().unwrap(), test_addr);
484 }
485
486 #[test]
487 fn secp_verify() {
488 let secp_priv_key = generate(SignatureType::Secp256k1).unwrap();
489 let secp_key_info = KeyInfo::new(SignatureType::Secp256k1, secp_priv_key);
490 let secp_key = Key::try_from(secp_key_info).unwrap();
491 let addr = secp_key.address;
492 let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
493 let mut wallet = Wallet::new_from_keys(key_store, vec![secp_key]);
494
495 let msg = [0u8; 64];
496
497 let sig = wallet.sign(&addr, &msg).unwrap();
498 sig.verify(&msg, &addr).unwrap();
499
500 let invalid_addr = wallet.generate_addr(SignatureType::Secp256k1).unwrap();
502 assert!(sig.verify(&msg, &invalid_addr).is_err())
503 }
504
505 #[test]
506 fn bls_verify_test() {
507 let bls_priv_key = generate(SignatureType::Bls).unwrap();
508 let bls_key_info = KeyInfo::new(SignatureType::Bls, bls_priv_key);
509 let bls_key = Key::try_from(bls_key_info).unwrap();
510 let addr = bls_key.address;
511 let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
512 let mut wallet = Wallet::new_from_keys(key_store, vec![bls_key]);
513
514 let msg = [0u8; 64];
515
516 let sig = wallet.sign(&addr, &msg).unwrap();
517 sig.verify(&msg, &addr).unwrap();
518
519 let invalid_addr = wallet.generate_addr(SignatureType::Bls).unwrap();
521 assert!(sig.verify(&msg, &invalid_addr).is_err())
522 }
523
524 #[test]
525 fn delegated_verify() {
526 let delegated_priv_key = generate(SignatureType::Delegated).unwrap();
527 let delegated_key_info = KeyInfo::new(SignatureType::Delegated, delegated_priv_key);
528 let delegated_key = Key::try_from(delegated_key_info).unwrap();
529 let addr = delegated_key.address;
530
531 let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
532 let mut wallet = Wallet::new_from_keys(key_store, vec![delegated_key]);
533
534 let msg = [0u8; 64];
535
536 let sig = wallet.sign(&addr, &msg).unwrap();
537 sig.verify(&msg, &addr).unwrap();
538
539 let invalid_addr = wallet.generate_addr(SignatureType::Delegated).unwrap();
541 assert!(sig.verify(&msg, &invalid_addr).is_err())
542 }
543}