Skip to main content

forest/key_management/
wallet.rs

1// Copyright 2019-2026 ChainSafe Systems
2// SPDX-License-Identifier: Apache-2.0, MIT
3
4use std::{convert::TryFrom, str::FromStr};
5
6use super::{KeyInfo, KeyStore, errors::Error, wallet_helpers};
7use crate::shim::{address::Address, crypto::SignatureType};
8use serde::{Deserialize, Serialize};
9
10#[cfg(test)]
11use {
12    crate::shim::crypto::Signature,
13    ahash::{HashMap, HashMapExt as _},
14};
15
16/// A key, this contains a `KeyInfo`, an address, and a public key.
17#[derive(Clone, PartialEq, Debug, Eq, Serialize, Deserialize)]
18pub struct Key {
19    pub key_info: KeyInfo,
20    // Vec<u8> is used because The public keys for BLS and SECP256K1 are not of the same type
21    pub public_key: Vec<u8>,
22    pub address: Address,
23}
24
25impl TryFrom<KeyInfo> for Key {
26    type Error = crate::key_management::errors::Error;
27
28    fn try_from(key_info: KeyInfo) -> Result<Self, Self::Error> {
29        let public_key = wallet_helpers::to_uncompressed_public_key(
30            *key_info.key_type(),
31            key_info.private_key(),
32        )?;
33        let address = wallet_helpers::new_address(*key_info.key_type(), &public_key)?;
34        Ok(Key {
35            key_info,
36            public_key,
37            address,
38        })
39    }
40}
41
42// This is a Wallet, it contains 2 HashMaps:
43// - keys which is a HashMap of Keys resolved by their Address
44// - keystore which is a HashMap of KeyInfos resolved by their Address
45/// A wallet is a collection of private keys with optional persistence and
46/// optional encryption.
47#[cfg(test)]
48#[derive(Clone, PartialEq, Debug, Eq)]
49pub struct Wallet {
50    keys: HashMap<Address, Key>,
51    keystore: KeyStore,
52}
53
54#[cfg(test)]
55impl Wallet {
56    /// Return a new wallet with a given `KeyStore`
57    pub fn new(keystore: KeyStore) -> Self {
58        Wallet {
59            keys: HashMap::new(),
60            keystore,
61        }
62    }
63
64    /// Return a wallet from a given amount of keys.
65    pub fn new_from_keys(keystore: KeyStore, key_vec: impl IntoIterator<Item = Key>) -> Self {
66        let mut keys: HashMap<Address, Key> = HashMap::new();
67        for item in key_vec.into_iter() {
68            keys.insert(item.address, item);
69        }
70        Wallet { keys, keystore }
71    }
72
73    // If this key does not exist in the keys hashmap, check if this key is in
74    // the keystore, if it is, then add it to keys, otherwise return Error
75    /// Return the key that is resolved by a given address,
76    pub fn find_key(&mut self, addr: &Address) -> Result<Key, Error> {
77        if let Some(k) = self.keys.get(addr) {
78            return Ok(k.clone());
79        }
80        let key = try_find_key(addr, &self.keystore)?;
81        self.keys.insert(*addr, key.clone());
82        Ok(key)
83    }
84
85    /// Return the resultant `Signature` after signing a given message
86    pub fn sign(&mut self, addr: &Address, msg: &[u8]) -> Result<Signature, Error> {
87        // this will return an error if the key cannot be found in either the keys
88        // hashmap or it is not found in the keystore
89        let key = self.find_key(addr).map_err(|_| Error::KeyNotExists)?;
90        wallet_helpers::sign(*key.key_info.key_type(), key.key_info.private_key(), msg)
91    }
92
93    /// Return the `KeyInfo` for a given address
94    pub fn export(&mut self, addr: &Address) -> Result<KeyInfo, Error> {
95        let k = self.find_key(addr)?;
96        Ok(k.key_info)
97    }
98
99    /// Add `KeyInfo` to the wallet, return the address that resolves to this
100    /// newly added `KeyInfo`
101    pub fn import(&mut self, key_info: KeyInfo) -> Result<Address, Error> {
102        let k = Key::try_from(key_info)?;
103        let addr = format!("wallet-{}", k.address);
104        self.keystore.put(&addr, k.key_info)?;
105        Ok(k.address)
106    }
107
108    /// Return a vector that contains all of the addresses in the wallet's
109    /// `KeyStore`
110    pub fn list_addrs(&self) -> Result<Vec<Address>, Error> {
111        list_addrs(&self.keystore)
112    }
113
114    /// Return the address of the default `KeyInfo` in the wallet
115    pub fn get_default(&self) -> Result<Address, Error> {
116        let key_info = self.keystore.get("default")?;
117        let k = Key::try_from(key_info)?;
118        Ok(k.address)
119    }
120
121    /// Set a default `KeyInfo` to the wallet
122    pub fn set_default(&mut self, addr: Address) -> anyhow::Result<()> {
123        let addr_string = format!("wallet-{addr}");
124        let key_info = self.keystore.get(&addr_string)?;
125        if self.keystore.get("default").is_ok() {
126            self.keystore.remove("default")?; // This line should
127            // unregister current
128            // default key then
129            // continue
130        }
131        self.keystore.put("default", key_info)?;
132        Ok(())
133    }
134
135    /// Generate a new address that fits the requirement of the given
136    /// `SignatureType`
137    pub fn generate_addr(&mut self, typ: SignatureType) -> anyhow::Result<Address> {
138        let key = generate_key(typ)?;
139        let addr = format!("wallet-{}", key.address);
140        self.keystore.put(&addr, key.key_info.clone())?;
141        self.keys.insert(key.address, key.clone());
142        let value = self.keystore.get("default");
143        if value.is_err() {
144            self.keystore
145                .put("default", key.key_info.clone())
146                .map_err(|err| Error::Other(err.to_string()))?;
147        }
148
149        Ok(key.address)
150    }
151
152    /// Return whether or not the Wallet contains a key that is resolved by the
153    /// supplied address
154    pub fn has_key(&mut self, addr: &Address) -> bool {
155        self.find_key(addr).is_ok()
156    }
157}
158
159/// Return the default address for `KeyStore`
160pub fn get_default(keystore: &KeyStore) -> Result<Option<Address>, Error> {
161    if let Ok(key_info) = keystore.get("default") {
162        let k = Key::try_from(key_info)?;
163        Ok(Some(k.address))
164    } else {
165        Ok(None)
166    }
167}
168
169/// Return vector of addresses sorted by their string representation in
170/// `KeyStore`
171pub fn list_addrs(keystore: &KeyStore) -> Result<Vec<Address>, Error> {
172    let mut all = keystore.list();
173    all.sort();
174    let mut out = Vec::new();
175    for i in all {
176        if let Some(addr_str) = i.strip_prefix("wallet-")
177            && let Ok(addr) = crate::shim::address::StrictAddress::from_str(addr_str)
178        {
179            out.push(addr.into());
180        }
181    }
182    Ok(out)
183}
184
185/// Removes a key corresponding to given address
186pub fn remove_key(addr: &Address, keystore: &mut KeyStore) -> Result<(), Error> {
187    let key_string = format!("wallet-{addr}");
188    let deleted_keyinfo = keystore
189        .remove(&key_string)
190        .map_err(|_| Error::KeyNotExists)?;
191    if let Ok(default_keyinfo) = keystore.get("default")
192        && default_keyinfo == deleted_keyinfo
193    {
194        keystore
195            .remove("default")
196            .map_err(|_| Error::KeyNotExists)?;
197    }
198    println!("wallet {addr} deleted");
199    Ok(())
200}
201
202/// Returns key info corresponding to given address
203pub fn try_find(addr: &Address, keystore: &KeyStore) -> Result<KeyInfo, Error> {
204    let key_string = format!("wallet-{addr}");
205    match keystore.get(&key_string) {
206        Ok(k) => Ok(k),
207        Err(_) => {
208            let mut new_addr = addr.to_string();
209            if new_addr.len() < 2 {
210                return Err(Error::Other(format!("Invalid addr {new_addr}")));
211            }
212            // Try to replace prefix with testnet, for backwards compatibility
213            // * We might be able to remove this, look into variants
214            new_addr.replace_range(0..1, "t");
215            let key_string = format!("wallet-{new_addr}");
216            let key_info = match keystore.get(&key_string) {
217                Ok(k) => k,
218                Err(_) => keystore.get(&format!("wallet-f{}", &new_addr[1..]))?,
219            };
220            Ok(key_info)
221        }
222    }
223}
224
225pub fn try_find_key(addr: &Address, keystore: &KeyStore) -> Result<Key, Error> {
226    let ki = try_find(addr, keystore)?;
227    ki.try_into()
228}
229
230/// Return `KeyInfo` for given address in `KeyStore`
231pub fn export_key_info(addr: &Address, keystore: &KeyStore) -> Result<KeyInfo, Error> {
232    let key = try_find_key(addr, keystore)?;
233    Ok(key.key_info)
234}
235
236/// Generate new key of given `SignatureType`
237pub fn generate_key(typ: SignatureType) -> Result<Key, Error> {
238    let private_key = wallet_helpers::generate(typ)?;
239    let key_info = KeyInfo::new(typ, private_key);
240    Key::try_from(key_info)
241}
242
243#[cfg(test)]
244mod tests {
245    use crate::utils::encoding::{blake2b_256, keccak_256};
246    use bls_signatures::{PrivateKey as BlsPrivate, Serialize};
247
248    use super::*;
249    use crate::key_management::{KeyStoreConfig, generate};
250
251    fn construct_priv_keys() -> Vec<Key> {
252        let mut secp_keys = Vec::new();
253        let mut bls_keys = Vec::new();
254        let mut delegated_keys = Vec::new();
255        for _ in 1..5 {
256            let secp_priv_key = generate(SignatureType::Secp256k1).unwrap();
257            let secp_key_info = KeyInfo::new(SignatureType::Secp256k1, secp_priv_key);
258            let secp_key = Key::try_from(secp_key_info).unwrap();
259            secp_keys.push(secp_key);
260
261            let bls_priv_key = generate(SignatureType::Bls).unwrap();
262            let bls_key_info = KeyInfo::new(SignatureType::Bls, bls_priv_key);
263            let bls_key = Key::try_from(bls_key_info).unwrap();
264            bls_keys.push(bls_key);
265
266            let delegated_priv_key = generate(SignatureType::Delegated).unwrap();
267            let delegated_key_info = KeyInfo::new(SignatureType::Delegated, delegated_priv_key);
268            let delegated_key = Key::try_from(delegated_key_info).unwrap();
269            delegated_keys.push(delegated_key);
270        }
271
272        secp_keys.append(bls_keys.as_mut());
273        secp_keys.append(delegated_keys.as_mut());
274        secp_keys
275    }
276
277    fn generate_wallet() -> Wallet {
278        let key_vec = construct_priv_keys();
279        Wallet::new_from_keys(KeyStore::new(KeyStoreConfig::Memory).unwrap(), key_vec)
280    }
281
282    #[test]
283    fn contains_key() {
284        let key_vec = construct_priv_keys();
285        let found_key = key_vec[0].clone();
286        let addr = key_vec[0].address;
287
288        let mut wallet =
289            Wallet::new_from_keys(KeyStore::new(KeyStoreConfig::Memory).unwrap(), key_vec);
290
291        // make sure that this address resolves to the right key
292        assert_eq!(wallet.find_key(&addr).unwrap(), found_key);
293        // make sure that has_key returns true as well
294        assert!(wallet.has_key(&addr));
295
296        let new_priv_key = generate(SignatureType::Bls).unwrap();
297        let pub_key =
298            wallet_helpers::to_uncompressed_public_key(SignatureType::Bls, new_priv_key.as_slice())
299                .unwrap();
300        let address = Address::new_bls(pub_key.as_slice()).unwrap();
301
302        // test to see if the new key has been created and added to the wallet
303        assert!(!wallet.has_key(&address));
304        // test to make sure that the newly made key cannot be added to the wallet
305        // because it is not found in the keystore
306        assert!(matches!(
307            wallet.find_key(&address).unwrap_err(),
308            Error::KeyInfo
309        ));
310        // sanity check to make sure that the key has not been added to the wallet
311        assert!(!wallet.has_key(&address));
312    }
313
314    #[test]
315    fn secp_sign() {
316        let key_vec = construct_priv_keys();
317        let priv_key_bytes = key_vec[2].key_info.private_key().clone();
318        let addr = key_vec[2].address;
319
320        let keystore = KeyStore::new(KeyStoreConfig::Memory).unwrap();
321        let mut wallet = Wallet::new_from_keys(keystore, key_vec);
322        let msg = [0u8; 64];
323
324        let msg_sig = wallet.sign(&addr, &msg).unwrap();
325
326        let msg_complete = blake2b_256(&msg);
327        let priv_key = k256::ecdsa::SigningKey::from_slice(&priv_key_bytes).unwrap();
328        let (sig, recovery_id) = priv_key.sign_prehash_recoverable(&msg_complete).unwrap();
329        let mut new_bytes = [0; 65];
330        new_bytes[..64].copy_from_slice(&sig.to_bytes());
331        new_bytes[64] = recovery_id.to_byte();
332        let actual = Signature::new_secp256k1(new_bytes.to_vec());
333        assert_eq!(msg_sig, actual)
334    }
335
336    #[test]
337    fn bls_sign() {
338        let key_vec = construct_priv_keys();
339        let priv_key_bytes = key_vec[4].key_info.private_key().clone();
340        let addr = key_vec[4].address;
341        let mut wallet =
342            Wallet::new_from_keys(KeyStore::new(KeyStoreConfig::Memory).unwrap(), key_vec);
343
344        let msg = [0u8; 64];
345        let msg_sign = wallet.sign(&addr, &msg).unwrap();
346
347        let priv_key = BlsPrivate::from_bytes(&priv_key_bytes).unwrap();
348        let sig = priv_key.sign(msg);
349        let actual = Signature::new_bls(sig.as_bytes());
350        assert_eq!(msg_sign, actual);
351    }
352
353    #[test]
354    fn delegated_sign() {
355        let key_vec = construct_priv_keys();
356        let priv_key_bytes = key_vec[9].key_info.private_key().clone();
357        let addr = key_vec[9].address;
358
359        let keystore = KeyStore::new(KeyStoreConfig::Memory).unwrap();
360        let mut wallet = Wallet::new_from_keys(keystore, key_vec);
361        let msg = [0u8; 64];
362
363        let msg_sig = wallet.sign(&addr, &msg).unwrap();
364
365        let msg_complete = keccak_256(&msg);
366        let priv_key = k256::ecdsa::SigningKey::from_slice(&priv_key_bytes).unwrap();
367        let (sig, recovery_id) = priv_key.sign_prehash_recoverable(&msg_complete).unwrap();
368        let mut new_bytes = [0; 65];
369        new_bytes[..64].copy_from_slice(&sig.to_bytes());
370        new_bytes[64] = recovery_id.to_byte();
371        let actual = Signature::new_delegated(new_bytes.to_vec());
372        assert_eq!(msg_sig, actual)
373    }
374
375    #[test]
376    fn import_export() {
377        let key_vec = construct_priv_keys();
378        let key = key_vec[0].clone();
379        let keystore = KeyStore::new(KeyStoreConfig::Memory).unwrap();
380        let mut wallet = Wallet::new_from_keys(keystore, key_vec);
381
382        let key_info = wallet.export(&key.address).unwrap();
383        // test to see if export returns the correct key_info
384        assert_eq!(key_info, key.key_info);
385
386        let new_priv_key = generate(SignatureType::Secp256k1).unwrap();
387        let pub_key = wallet_helpers::to_uncompressed_public_key(
388            SignatureType::Secp256k1,
389            new_priv_key.as_slice(),
390        )
391        .unwrap();
392        let test_addr = Address::new_secp256k1(pub_key.as_slice()).unwrap();
393        let key_info_err = wallet.export(&test_addr).unwrap_err();
394        // test to make sure that an error is raised when an incorrect address is added
395        assert!(matches!(key_info_err, Error::KeyInfo));
396
397        let test_key_info = KeyInfo::new(SignatureType::Secp256k1, new_priv_key);
398        // make sure that key_info has been imported to wallet
399        assert!(wallet.import(test_key_info.clone()).is_ok());
400
401        let duplicate_error = wallet.import(test_key_info).unwrap_err();
402        // make sure that error is thrown when attempted to re-import a duplicate
403        // key_info
404        assert!(matches!(duplicate_error, Error::KeyExists));
405    }
406
407    #[test]
408    fn list_addr() {
409        let key_vec = construct_priv_keys();
410        let mut addr_string_vec = Vec::new();
411
412        let mut key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
413
414        for i in &key_vec {
415            addr_string_vec.push(i.address.to_string());
416
417            let addr_string = format!("wallet-{}", i.address);
418            key_store.put(&addr_string, i.key_info.clone()).unwrap();
419        }
420
421        addr_string_vec.sort();
422
423        let mut addr_vec = Vec::new();
424
425        for addr in addr_string_vec {
426            addr_vec.push(Address::from_str(addr.as_str()).unwrap())
427        }
428
429        let wallet = Wallet::new(key_store);
430
431        let test_addr_vec = wallet.list_addrs().unwrap();
432
433        // check to see if the addrs in wallet are the same as the key_vec before it was
434        // added to the wallet
435        assert_eq!(test_addr_vec, addr_vec);
436    }
437
438    #[test]
439    fn generate_new_key() {
440        let mut wallet = generate_wallet();
441        let addr = wallet.generate_addr(SignatureType::Bls).unwrap();
442        let key = wallet.keystore.get("default").unwrap();
443        // make sure that the newly generated key is the default key - checking by key
444        // type
445        assert_eq!(&SignatureType::Bls, key.key_type());
446
447        let address = format!("wallet-{addr}");
448
449        let key_info = wallet.keystore.get(&address).unwrap();
450        let key = wallet.keys.get(&addr).unwrap();
451
452        // these assertions will make sure that the key has actually been added to the
453        // wallet
454        assert_eq!(key_info.key_type(), &SignatureType::Bls);
455        assert_eq!(key.address, addr);
456    }
457
458    #[test]
459    fn get_set_default() {
460        let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
461        let mut wallet = Wallet::new(key_store);
462        // check to make sure that there is no default
463        assert!(matches!(wallet.get_default().unwrap_err(), Error::KeyInfo));
464
465        let new_priv_key = generate(SignatureType::Secp256k1).unwrap();
466        let pub_key = wallet_helpers::to_uncompressed_public_key(
467            SignatureType::Secp256k1,
468            new_priv_key.as_slice(),
469        )
470        .unwrap();
471        let test_addr = Address::new_secp256k1(pub_key.as_slice()).unwrap();
472
473        let key_info = KeyInfo::new(SignatureType::Secp256k1, new_priv_key);
474        let test_addr_string = format!("wallet-{test_addr}");
475
476        wallet.keystore.put(&test_addr_string, key_info).unwrap();
477
478        // check to make sure that the set_default function completed without error
479        assert!(wallet.set_default(test_addr).is_ok());
480
481        // check to make sure that the test_addr is actually the default addr for the
482        // wallet
483        assert_eq!(wallet.get_default().unwrap(), test_addr);
484    }
485
486    #[test]
487    fn secp_verify() {
488        let secp_priv_key = generate(SignatureType::Secp256k1).unwrap();
489        let secp_key_info = KeyInfo::new(SignatureType::Secp256k1, secp_priv_key);
490        let secp_key = Key::try_from(secp_key_info).unwrap();
491        let addr = secp_key.address;
492        let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
493        let mut wallet = Wallet::new_from_keys(key_store, vec![secp_key]);
494
495        let msg = [0u8; 64];
496
497        let sig = wallet.sign(&addr, &msg).unwrap();
498        sig.verify(&msg, &addr).unwrap();
499
500        // invalid verify check
501        let invalid_addr = wallet.generate_addr(SignatureType::Secp256k1).unwrap();
502        assert!(sig.verify(&msg, &invalid_addr).is_err())
503    }
504
505    #[test]
506    fn bls_verify_test() {
507        let bls_priv_key = generate(SignatureType::Bls).unwrap();
508        let bls_key_info = KeyInfo::new(SignatureType::Bls, bls_priv_key);
509        let bls_key = Key::try_from(bls_key_info).unwrap();
510        let addr = bls_key.address;
511        let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
512        let mut wallet = Wallet::new_from_keys(key_store, vec![bls_key]);
513
514        let msg = [0u8; 64];
515
516        let sig = wallet.sign(&addr, &msg).unwrap();
517        sig.verify(&msg, &addr).unwrap();
518
519        // invalid verify check
520        let invalid_addr = wallet.generate_addr(SignatureType::Bls).unwrap();
521        assert!(sig.verify(&msg, &invalid_addr).is_err())
522    }
523
524    #[test]
525    fn delegated_verify() {
526        let delegated_priv_key = generate(SignatureType::Delegated).unwrap();
527        let delegated_key_info = KeyInfo::new(SignatureType::Delegated, delegated_priv_key);
528        let delegated_key = Key::try_from(delegated_key_info).unwrap();
529        let addr = delegated_key.address;
530
531        let key_store = KeyStore::new(KeyStoreConfig::Memory).unwrap();
532        let mut wallet = Wallet::new_from_keys(key_store, vec![delegated_key]);
533
534        let msg = [0u8; 64];
535
536        let sig = wallet.sign(&addr, &msg).unwrap();
537        sig.verify(&msg, &addr).unwrap();
538
539        // invalid verify check
540        let invalid_addr = wallet.generate_addr(SignatureType::Delegated).unwrap();
541        assert!(sig.verify(&msg, &invalid_addr).is_err())
542    }
543}