aboutsummaryrefslogtreecommitdiffstats
path: root/accounts/account_manager.go
diff options
context:
space:
mode:
authorGustav Simonsson <gustav.simonsson@gmail.com>2015-02-26 00:29:23 +0800
committerGustav Simonsson <gustav.simonsson@gmail.com>2015-02-26 00:37:12 +0800
commitb296b36d2b2aaa2f81d26b3c133ace2714c58a7d (patch)
treeba6817a91c1598f2587f9972494c7b0338918172 /accounts/account_manager.go
parentfe730239400e73babf829857272c42af7563efce (diff)
downloadgo-tangerine-b296b36d2b2aaa2f81d26b3c133ace2714c58a7d.tar
go-tangerine-b296b36d2b2aaa2f81d26b3c133ace2714c58a7d.tar.gz
go-tangerine-b296b36d2b2aaa2f81d26b3c133ace2714c58a7d.tar.bz2
go-tangerine-b296b36d2b2aaa2f81d26b3c133ace2714c58a7d.tar.lz
go-tangerine-b296b36d2b2aaa2f81d26b3c133ace2714c58a7d.tar.xz
go-tangerine-b296b36d2b2aaa2f81d26b3c133ace2714c58a7d.tar.zst
go-tangerine-b296b36d2b2aaa2f81d26b3c133ace2714c58a7d.zip
Add automatic locking / unlocking of accounts
* Change account signing API to two sign functions; Sign without passphrase - works if account is unlocked Sign with passphrase - always works and unlocks the account * Account stays unlocked for X ms and is then automatically locked
Diffstat (limited to 'accounts/account_manager.go')
-rw-r--r--accounts/account_manager.go48
1 files changed, 39 insertions, 9 deletions
diff --git a/accounts/account_manager.go b/accounts/account_manager.go
index f7a7506ba..4d63bd0f2 100644
--- a/accounts/account_manager.go
+++ b/accounts/account_manager.go
@@ -34,24 +34,33 @@ package accounts
import (
crand "crypto/rand"
+ "errors"
"github.com/ethereum/go-ethereum/crypto"
+ "sync"
+ "time"
)
+var ErrLocked = errors.New("account is locked; please request passphrase")
+
// TODO: better name for this struct?
type Account struct {
Address []byte
}
type AccountManager struct {
- keyStore crypto.KeyStore2
+ keyStore crypto.KeyStore2
+ unlockedKeys map[string]crypto.Key
+ unlockedMilliSeconds int
+ mutex sync.Mutex
}
-// TODO: get key by addr - modify KeyStore2 GetKey to work with addr
-
-// TODO: pass through passphrase for APIs which require access to private key?
-func NewAccountManager(keyStore crypto.KeyStore2) AccountManager {
+func NewAccountManager(keyStore crypto.KeyStore2, unlockMilliSeconds int) AccountManager {
+ keysMap := make(map[string]crypto.Key)
am := &AccountManager{
- keyStore: keyStore,
+ keyStore: keyStore,
+ unlockedKeys: keysMap,
+ unlockedMilliSeconds: unlockMilliSeconds,
+ mutex: sync.Mutex{}, // for accessing unlockedKeys map
}
return *am
}
@@ -60,11 +69,26 @@ func (am AccountManager) DeleteAccount(address []byte, auth string) error {
return am.keyStore.DeleteKey(address, auth)
}
-func (am *AccountManager) Sign(fromAccount *Account, keyAuth string, toSign []byte) (signature []byte, err error) {
+func (am *AccountManager) Sign(fromAccount *Account, toSign []byte) (signature []byte, err error) {
+ am.mutex.Lock()
+ unlockedKey := am.unlockedKeys[string(fromAccount.Address)]
+ am.mutex.Unlock()
+ if unlockedKey.Address == nil {
+ return nil, ErrLocked
+ }
+ signature, err = crypto.Sign(toSign, unlockedKey.PrivateKey)
+ return signature, err
+}
+
+func (am *AccountManager) SignLocked(fromAccount *Account, keyAuth string, toSign []byte) (signature []byte, err error) {
key, err := am.keyStore.GetKey(fromAccount.Address, keyAuth)
if err != nil {
return nil, err
}
+ am.mutex.Lock()
+ am.unlockedKeys[string(fromAccount.Address)] = *key
+ am.mutex.Unlock()
+ go unlockLater(am, fromAccount.Address)
signature, err = crypto.Sign(toSign, key.PrivateKey)
return signature, err
}
@@ -80,8 +104,6 @@ func (am AccountManager) NewAccount(auth string) (*Account, error) {
return ua, err
}
-// set of accounts == set of keys in given key store
-// TODO: do we need persistence of accounts as well?
func (am *AccountManager) Accounts() ([]Account, error) {
addresses, err := am.keyStore.GetKeyAddresses()
if err != nil {
@@ -97,3 +119,11 @@ func (am *AccountManager) Accounts() ([]Account, error) {
}
return accounts, err
}
+
+func unlockLater(am *AccountManager, addr []byte) {
+ time.Sleep(time.Millisecond * time.Duration(am.unlockedMilliSeconds))
+ am.mutex.Lock()
+ // TODO: how do we know the key is actually gone from memory?
+ delete(am.unlockedKeys, string(addr))
+ am.mutex.Unlock()
+}