aboutsummaryrefslogtreecommitdiffstats
path: root/signer/core
diff options
context:
space:
mode:
authorMartin Holst Swende <martin@swende.se>2019-02-12 21:00:02 +0800
committerGitHub <noreply@github.com>2019-02-12 21:00:02 +0800
commit75d292bcf673e1b10ac883f8767d092d2f45fd9a (patch)
tree072e2ddae84bfae2e1f0a72e8aeaa9dc82c6d937 /signer/core
parentedf976ee8e7e1561cf11cbdc5a0c5edb497dda34 (diff)
downloadgo-tangerine-75d292bcf673e1b10ac883f8767d092d2f45fd9a.tar
go-tangerine-75d292bcf673e1b10ac883f8767d092d2f45fd9a.tar.gz
go-tangerine-75d292bcf673e1b10ac883f8767d092d2f45fd9a.tar.bz2
go-tangerine-75d292bcf673e1b10ac883f8767d092d2f45fd9a.tar.lz
go-tangerine-75d292bcf673e1b10ac883f8767d092d2f45fd9a.tar.xz
go-tangerine-75d292bcf673e1b10ac883f8767d092d2f45fd9a.tar.zst
go-tangerine-75d292bcf673e1b10ac883f8767d092d2f45fd9a.zip
clef: external signing fixes + signing data (#19003)
* signer/clef: make use of json-rpc notification * signer: tidy up output of OnApprovedTx * accounts/external, signer: implement remote signing of text, make accounts_sign take hexdata * clef: added basic testscript * signer, external, api: add clique signing test to debug rpc, fix clique signing in clef * signer: fix clique interoperability between geth and clef * clef: rename networkid switch to chainid * clef: enable chainid flag * clef, signer: minor changes from review * clef: more tests for signer
Diffstat (limited to 'signer/core')
-rw-r--r--signer/core/api.go2
-rw-r--r--signer/core/cliui.go8
-rw-r--r--signer/core/signed_data.go104
-rw-r--r--signer/core/stdioui.go18
4 files changed, 79 insertions, 53 deletions
diff --git a/signer/core/api.go b/signer/core/api.go
index 0521dce47..25057dd12 100644
--- a/signer/core/api.go
+++ b/signer/core/api.go
@@ -41,7 +41,7 @@ const (
// ExternalAPIVersion -- see extapi_changelog.md
ExternalAPIVersion = "5.0.0"
// InternalAPIVersion -- see intapi_changelog.md
- InternalAPIVersion = "3.1.0"
+ InternalAPIVersion = "3.2.0"
)
// ExternalAPI defines the external API through which signing requests are made.
diff --git a/signer/core/cliui.go b/signer/core/cliui.go
index 71d489d45..3ffc6b191 100644
--- a/signer/core/cliui.go
+++ b/signer/core/cliui.go
@@ -18,12 +18,12 @@ package core
import (
"bufio"
+ "encoding/json"
"fmt"
"os"
"strings"
"sync"
- "github.com/davecgh/go-spew/spew"
"github.com/ethereum/go-ethereum/common/hexutil"
"github.com/ethereum/go-ethereum/internal/ethapi"
"github.com/ethereum/go-ethereum/log"
@@ -264,7 +264,11 @@ func (ui *CommandlineUI) ShowInfo(message string) {
func (ui *CommandlineUI) OnApprovedTx(tx ethapi.SignTransactionResult) {
fmt.Printf("Transaction signed:\n ")
- spew.Dump(tx.Tx)
+ if jsn, err := json.MarshalIndent(tx.Tx, " ", " "); err != nil {
+ fmt.Printf("WARN: marshalling error %v\n", err)
+ } else {
+ fmt.Println(string(jsn))
+ }
}
func (ui *CommandlineUI) OnSignerStartup(info StartupInfo) {
diff --git a/signer/core/signed_data.go b/signer/core/signed_data.go
index ac0b97bca..e481f5e1d 100644
--- a/signer/core/signed_data.go
+++ b/signer/core/signed_data.go
@@ -121,8 +121,8 @@ var typedDataReferenceTypeRegexp = regexp.MustCompile(`^[A-Z](\w*)(\[\])?$`)
// sign receives a request and produces a signature
// Note, the produced signature conforms to the secp256k1 curve R, S and V values,
-// where the V value will be 27 or 28 for legacy reasons.
-func (api *SignerAPI) sign(addr common.MixedcaseAddress, req *SignDataRequest) (hexutil.Bytes, error) {
+// where the V value will be 27 or 28 for legacy reasons, if legacyV==true.
+func (api *SignerAPI) sign(addr common.MixedcaseAddress, req *SignDataRequest, legacyV bool) (hexutil.Bytes, error) {
// We make the request prior to looking up if we actually have the account, to prevent
// account-enumeration via the API
@@ -140,11 +140,13 @@ func (api *SignerAPI) sign(addr common.MixedcaseAddress, req *SignDataRequest) (
return nil, err
}
// Sign the data with the wallet
- signature, err := wallet.SignDataWithPassphrase(account, res.Password, req.ContentType, req.Hash)
+ signature, err := wallet.SignDataWithPassphrase(account, res.Password, req.ContentType, req.Rawdata)
if err != nil {
return nil, err
}
- signature[64] += 27 // Transform V from 0/1 to 27/28 according to the yellow paper
+ if legacyV {
+ signature[64] += 27 // Transform V from 0/1 to 27/28 according to the yellow paper
+ }
return signature, nil
}
@@ -153,17 +155,16 @@ func (api *SignerAPI) sign(addr common.MixedcaseAddress, req *SignDataRequest) (
//
// Different types of validation occur.
func (api *SignerAPI) SignData(ctx context.Context, contentType string, addr common.MixedcaseAddress, data interface{}) (hexutil.Bytes, error) {
- var req, err = api.determineSignatureFormat(ctx, contentType, addr, data)
+ var req, transformV, err = api.determineSignatureFormat(ctx, contentType, addr, data)
if err != nil {
return nil, err
}
- signature, err := api.sign(addr, req)
+ signature, err := api.sign(addr, req, transformV)
if err != nil {
api.UI.ShowError(err.Error())
return nil, err
}
-
return signature, nil
}
@@ -173,12 +174,14 @@ func (api *SignerAPI) SignData(ctx context.Context, contentType string, addr com
// charset, ok := params["charset"]
// As it is now, we accept any charset and just treat it as 'raw'.
// This method returns the mimetype for signing along with the request
-func (api *SignerAPI) determineSignatureFormat(ctx context.Context, contentType string, addr common.MixedcaseAddress, data interface{}) (*SignDataRequest, error) {
- var req *SignDataRequest
-
+func (api *SignerAPI) determineSignatureFormat(ctx context.Context, contentType string, addr common.MixedcaseAddress, data interface{}) (*SignDataRequest, bool, error) {
+ var (
+ req *SignDataRequest
+ useEthereumV = true // Default to use V = 27 or 28, the legacy Ethereum format
+ )
mediaType, _, err := mime.ParseMediaType(contentType)
if err != nil {
- return nil, err
+ return nil, useEthereumV, err
}
switch mediaType {
@@ -186,7 +189,7 @@ func (api *SignerAPI) determineSignatureFormat(ctx context.Context, contentType
// Data with an intended validator
validatorData, err := UnmarshalValidatorData(data)
if err != nil {
- return nil, err
+ return nil, useEthereumV, err
}
sighash, msg := SignTextValidator(validatorData)
message := []*NameValueType{
@@ -201,55 +204,63 @@ func (api *SignerAPI) determineSignatureFormat(ctx context.Context, contentType
// Clique is the Ethereum PoA standard
stringData, ok := data.(string)
if !ok {
- return nil, fmt.Errorf("input for %v plain must be an hex-encoded string", ApplicationClique.Mime)
+ return nil, useEthereumV, fmt.Errorf("input for %v must be an hex-encoded string", ApplicationClique.Mime)
}
cliqueData, err := hexutil.Decode(stringData)
if err != nil {
- return nil, err
+ return nil, useEthereumV, err
}
header := &types.Header{}
if err := rlp.DecodeBytes(cliqueData, header); err != nil {
- return nil, err
+ return nil, useEthereumV, err
+ }
+ // The incoming clique header is already truncated, sent to us with a extradata already shortened
+ if len(header.Extra) < 65 {
+ // Need to add it back, to get a suitable length for hashing
+ newExtra := make([]byte, len(header.Extra)+65)
+ copy(newExtra, header.Extra)
+ header.Extra = newExtra
}
// Get back the rlp data, encoded by us
- cliqueData = clique.CliqueRLP(header)
- sighash, err := SignCliqueHeader(header)
+ sighash, cliqueRlp, err := cliqueHeaderHashAndRlp(header)
if err != nil {
- return nil, err
+ return nil, useEthereumV, err
}
message := []*NameValueType{
{
- Name: "Clique block",
+ Name: "Clique header",
Typ: "clique",
- Value: fmt.Sprintf("clique block %d [0x%x]", header.Number, header.Hash()),
+ Value: fmt.Sprintf("clique header %d [0x%x]", header.Number, header.Hash()),
},
}
- req = &SignDataRequest{ContentType: mediaType, Rawdata: cliqueData, Message: message, Hash: sighash}
+ // Clique uses V on the form 0 or 1
+ useEthereumV = false
+ req = &SignDataRequest{ContentType: mediaType, Rawdata: cliqueRlp, Message: message, Hash: sighash}
default: // also case TextPlain.Mime:
// Calculates an Ethereum ECDSA signature for:
// hash = keccak256("\x19${byteVersion}Ethereum Signed Message:\n${message length}${message}")
// We expect it to be a string
- stringData, ok := data.(string)
- if !ok {
- return nil, fmt.Errorf("input for text/plain must be a string")
- }
- //plainData, err := hexutil.Decode(stringdata)
- //if err != nil {
- // return nil, err
- //}
- sighash, msg := accounts.TextAndHash([]byte(stringData))
- message := []*NameValueType{
- {
- Name: "message",
- Typ: "text/plain",
- Value: msg,
- },
+ if stringData, ok := data.(string); !ok {
+ return nil, useEthereumV, fmt.Errorf("input for text/plain must be an hex-encoded string")
+ } else {
+ if textData, err := hexutil.Decode(stringData); err != nil {
+ return nil, useEthereumV, err
+ } else {
+ sighash, msg := accounts.TextAndHash(textData)
+ message := []*NameValueType{
+ {
+ Name: "message",
+ Typ: "text/plain",
+ Value: msg,
+ },
+ }
+ req = &SignDataRequest{ContentType: mediaType, Rawdata: []byte(msg), Message: message, Hash: sighash}
+ }
}
- req = &SignDataRequest{ContentType: mediaType, Rawdata: []byte(msg), Message: message, Hash: sighash}
}
req.Address = addr
req.Meta = MetadataFromContext(ctx)
- return req, nil
+ return req, useEthereumV, nil
}
@@ -262,20 +273,21 @@ func SignTextValidator(validatorData ValidatorData) (hexutil.Bytes, string) {
return crypto.Keccak256([]byte(msg)), msg
}
-// SignCliqueHeader returns the hash which is used as input for the proof-of-authority
+// cliqueHeaderHashAndRlp returns the hash which is used as input for the proof-of-authority
// signing. It is the hash of the entire header apart from the 65 byte signature
// contained at the end of the extra data.
//
// The method requires the extra data to be at least 65 bytes -- the original implementation
// in clique.go panics if this is the case, thus it's been reimplemented here to avoid the panic
// and simply return an error instead
-func SignCliqueHeader(header *types.Header) (hexutil.Bytes, error) {
- //hash := common.Hash{}
+func cliqueHeaderHashAndRlp(header *types.Header) (hash, rlp []byte, err error) {
if len(header.Extra) < 65 {
- return nil, fmt.Errorf("clique header extradata too short, %d < 65", len(header.Extra))
+ err = fmt.Errorf("clique header extradata too short, %d < 65", len(header.Extra))
+ return
}
- hash := clique.SealHash(header)
- return hash.Bytes(), nil
+ rlp = clique.CliqueRLP(header)
+ hash = clique.SealHash(header).Bytes()
+ return hash, rlp, err
}
// SignTypedData signs EIP-712 conformant typed data
@@ -293,7 +305,7 @@ func (api *SignerAPI) SignTypedData(ctx context.Context, addr common.MixedcaseAd
sighash := crypto.Keccak256(rawData)
message := typedData.Format()
req := &SignDataRequest{ContentType: DataTyped.Mime, Rawdata: rawData, Message: message, Hash: sighash}
- signature, err := api.sign(addr, req)
+ signature, err := api.sign(addr, req, true)
if err != nil {
api.UI.ShowError(err.Error())
return nil, err
@@ -722,7 +734,7 @@ func (nvt *NameValueType) Pprint(depth int) string {
output.WriteString(sublevel)
}
} else {
- output.WriteString(fmt.Sprintf("%s\n", nvt.Value))
+ output.WriteString(fmt.Sprintf("%q\n", nvt.Value))
}
return output.String()
}
diff --git a/signer/core/stdioui.go b/signer/core/stdioui.go
index 64032386f..e169a8bc0 100644
--- a/signer/core/stdioui.go
+++ b/signer/core/stdioui.go
@@ -49,6 +49,16 @@ func (ui *StdIOUI) dispatch(serviceMethod string, args interface{}, reply interf
return err
}
+// notify sends a request over the stdio, and does not listen for a response
+func (ui *StdIOUI) notify(serviceMethod string, args interface{}) error {
+ ctx := context.Background()
+ err := ui.client.Notify(ctx, serviceMethod, args)
+ if err != nil {
+ log.Info("Error", "exc", err.Error())
+ }
+ return err
+}
+
func (ui *StdIOUI) ApproveTx(request *SignTxRequest) (SignTxResponse, error) {
var result SignTxResponse
err := ui.dispatch("ApproveTx", request, &result)
@@ -86,27 +96,27 @@ func (ui *StdIOUI) ApproveNewAccount(request *NewAccountRequest) (NewAccountResp
}
func (ui *StdIOUI) ShowError(message string) {
- err := ui.dispatch("ShowError", &Message{message}, nil)
+ err := ui.notify("ShowError", &Message{message})
if err != nil {
log.Info("Error calling 'ShowError'", "exc", err.Error(), "msg", message)
}
}
func (ui *StdIOUI) ShowInfo(message string) {
- err := ui.dispatch("ShowInfo", Message{message}, nil)
+ err := ui.notify("ShowInfo", Message{message})
if err != nil {
log.Info("Error calling 'ShowInfo'", "exc", err.Error(), "msg", message)
}
}
func (ui *StdIOUI) OnApprovedTx(tx ethapi.SignTransactionResult) {
- err := ui.dispatch("OnApprovedTx", tx, nil)
+ err := ui.notify("OnApprovedTx", tx)
if err != nil {
log.Info("Error calling 'OnApprovedTx'", "exc", err.Error(), "tx", tx)
}
}
func (ui *StdIOUI) OnSignerStartup(info StartupInfo) {
- err := ui.dispatch("OnSignerStartup", info, nil)
+ err := ui.notify("OnSignerStartup", info)
if err != nil {
log.Info("Error calling 'OnSignerStartup'", "exc", err.Error(), "info", info)
}