db_signatory.rs 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360
  1. //! Main Signatory implementation
  2. //!
  3. //! It is named db_signatory because it uses a database to maintain state.
  4. use std::collections::HashMap;
  5. use std::sync::Arc;
  6. use bitcoin::bip32::{DerivationPath, Xpriv};
  7. use bitcoin::secp256k1::{self, Secp256k1};
  8. use cdk_common::dhke::{sign_message, verify_message};
  9. use cdk_common::mint::MintKeySetInfo;
  10. use cdk_common::nuts::{BlindSignature, BlindedMessage, CurrencyUnit, Id, MintKeySet, Proof};
  11. use cdk_common::{database, Error, PublicKey};
  12. use tokio::sync::RwLock;
  13. use tracing::instrument;
  14. use crate::common::{create_new_keyset, derivation_path_from_unit, init_keysets};
  15. use crate::signatory::{RotateKeyArguments, Signatory, SignatoryKeySet, SignatoryKeysets};
  16. /// In-memory Signatory
  17. ///
  18. /// This is the default signatory implementation for the mint.
  19. ///
  20. /// The private keys and the all key-related data is stored in memory, in the same process, but it
  21. /// is not accessible from the outside.
  22. pub struct DbSignatory {
  23. keysets: RwLock<HashMap<Id, (MintKeySetInfo, MintKeySet)>>,
  24. active_keysets: RwLock<HashMap<CurrencyUnit, Id>>,
  25. localstore: Arc<dyn database::MintKeysDatabase<Err = database::Error> + Send + Sync>,
  26. secp_ctx: Secp256k1<secp256k1::All>,
  27. custom_paths: HashMap<CurrencyUnit, DerivationPath>,
  28. xpriv: Xpriv,
  29. xpub: PublicKey,
  30. }
  31. impl DbSignatory {
  32. /// Creates a new MemorySignatory instance
  33. pub async fn new(
  34. localstore: Arc<dyn database::MintKeysDatabase<Err = database::Error> + Send + Sync>,
  35. seed: &[u8],
  36. mut supported_units: HashMap<CurrencyUnit, (u64, u8)>,
  37. custom_paths: HashMap<CurrencyUnit, DerivationPath>,
  38. ) -> Result<Self, Error> {
  39. let secp_ctx = Secp256k1::new();
  40. let xpriv = Xpriv::new_master(bitcoin::Network::Bitcoin, seed).expect("RNG busted");
  41. let (mut active_keysets, active_keyset_units) = init_keysets(
  42. xpriv,
  43. &secp_ctx,
  44. &localstore,
  45. &supported_units,
  46. &custom_paths,
  47. )
  48. .await?;
  49. supported_units.entry(CurrencyUnit::Auth).or_insert((0, 1));
  50. let mut tx = localstore.begin_transaction().await?;
  51. // Create new keysets for supported units that aren't covered by the current keysets
  52. for (unit, (fee, max_order)) in supported_units {
  53. if !active_keyset_units.contains(&unit) {
  54. let derivation_path = match custom_paths.get(&unit) {
  55. Some(path) => path.clone(),
  56. None => {
  57. derivation_path_from_unit(unit.clone(), 0).ok_or(Error::UnsupportedUnit)?
  58. }
  59. };
  60. let (keyset, keyset_info) = create_new_keyset(
  61. &secp_ctx,
  62. xpriv,
  63. derivation_path,
  64. Some(0),
  65. unit.clone(),
  66. max_order,
  67. fee,
  68. // TODO: add and connect settings for this
  69. None,
  70. );
  71. let id = keyset_info.id;
  72. tx.add_keyset_info(keyset_info).await?;
  73. tx.set_active_keyset(unit, id).await?;
  74. active_keysets.insert(id, keyset);
  75. }
  76. }
  77. tx.commit().await?;
  78. let keys = Self {
  79. keysets: Default::default(),
  80. active_keysets: Default::default(),
  81. localstore,
  82. custom_paths,
  83. xpub: xpriv.to_keypair(&secp_ctx).public_key().into(),
  84. secp_ctx,
  85. xpriv,
  86. };
  87. keys.reload_keys_from_db().await?;
  88. Ok(keys)
  89. }
  90. /// Load all the keysets from the database, even if they are not active.
  91. ///
  92. /// Since the database is owned by this process, we can load all the keysets in memory, and use
  93. /// it as the primary source, and the database as the persistence layer.
  94. ///
  95. /// Any operation performed with keysets, are done through this trait and never to the database
  96. /// directly.
  97. async fn reload_keys_from_db(&self) -> Result<(), Error> {
  98. let mut keysets = self.keysets.write().await;
  99. let mut active_keysets = self.active_keysets.write().await;
  100. keysets.clear();
  101. active_keysets.clear();
  102. let db_active_keysets = self.localstore.get_active_keysets().await?;
  103. for mut info in self.localstore.get_keyset_infos().await? {
  104. let id = info.id;
  105. let keyset = self.generate_keyset(&info);
  106. info.active = db_active_keysets.get(&info.unit) == Some(&info.id);
  107. if info.active {
  108. active_keysets.insert(info.unit.clone(), id);
  109. }
  110. keysets.insert(id, (info, keyset));
  111. }
  112. Ok(())
  113. }
  114. fn generate_keyset(&self, keyset_info: &MintKeySetInfo) -> MintKeySet {
  115. MintKeySet::generate_from_xpriv(
  116. &self.secp_ctx,
  117. self.xpriv,
  118. keyset_info.max_order,
  119. keyset_info.unit.clone(),
  120. keyset_info.derivation_path.clone(),
  121. keyset_info.final_expiry,
  122. keyset_info.id.get_version(),
  123. )
  124. }
  125. }
  126. #[async_trait::async_trait]
  127. impl Signatory for DbSignatory {
  128. fn name(&self) -> String {
  129. format!("Signatory {}", env!("CARGO_PKG_VERSION"))
  130. }
  131. #[instrument(skip_all)]
  132. async fn blind_sign(
  133. &self,
  134. blinded_messages: Vec<BlindedMessage>,
  135. ) -> Result<Vec<BlindSignature>, Error> {
  136. let keysets = self.keysets.read().await;
  137. blinded_messages
  138. .into_iter()
  139. .map(|blinded_message| {
  140. let BlindedMessage {
  141. amount,
  142. blinded_secret,
  143. keyset_id,
  144. ..
  145. } = blinded_message;
  146. let (info, key) = keysets.get(&keyset_id).ok_or(Error::UnknownKeySet)?;
  147. if !info.active {
  148. return Err(Error::InactiveKeyset);
  149. }
  150. let key_pair = key.keys.get(&amount).ok_or(Error::UnknownKeySet)?;
  151. let c = sign_message(&key_pair.secret_key, &blinded_secret)?;
  152. let blinded_signature = BlindSignature::new(
  153. amount,
  154. c,
  155. keyset_id,
  156. &blinded_message.blinded_secret,
  157. key_pair.secret_key.clone(),
  158. )?;
  159. Ok(blinded_signature)
  160. })
  161. .collect::<Result<Vec<_>, _>>()
  162. }
  163. #[tracing::instrument(skip_all)]
  164. async fn verify_proofs(&self, proofs: Vec<Proof>) -> Result<(), Error> {
  165. let keysets = self.keysets.read().await;
  166. proofs.into_iter().try_for_each(|proof| {
  167. let (_, key) = keysets.get(&proof.keyset_id).ok_or(Error::UnknownKeySet)?;
  168. let key_pair = key.keys.get(&proof.amount).ok_or(Error::UnknownKeySet)?;
  169. verify_message(&key_pair.secret_key, proof.c, proof.secret.as_bytes())?;
  170. Ok(())
  171. })
  172. }
  173. #[tracing::instrument(skip_all)]
  174. async fn keysets(&self) -> Result<SignatoryKeysets, Error> {
  175. Ok(SignatoryKeysets {
  176. pubkey: self.xpub,
  177. keysets: self
  178. .keysets
  179. .read()
  180. .await
  181. .values()
  182. .map(|k| k.into())
  183. .collect::<Vec<_>>(),
  184. })
  185. }
  186. /// Add current keyset to inactive keysets
  187. /// Generate new keyset
  188. #[tracing::instrument(skip(self))]
  189. async fn rotate_keyset(&self, args: RotateKeyArguments) -> Result<SignatoryKeySet, Error> {
  190. let path_index = if let Some(current_keyset_id) =
  191. self.localstore.get_active_keyset_id(&args.unit).await?
  192. {
  193. let keyset_info = self
  194. .localstore
  195. .get_keyset_info(&current_keyset_id)
  196. .await?
  197. .ok_or(Error::UnknownKeySet)?;
  198. keyset_info.derivation_path_index.unwrap_or(1) + 1
  199. } else {
  200. 1
  201. };
  202. let derivation_path = match self.custom_paths.get(&args.unit) {
  203. Some(path) => path.clone(),
  204. None => derivation_path_from_unit(args.unit.clone(), path_index)
  205. .ok_or(Error::UnsupportedUnit)?,
  206. };
  207. let (keyset, info) = create_new_keyset(
  208. &self.secp_ctx,
  209. self.xpriv,
  210. derivation_path,
  211. Some(path_index),
  212. args.unit.clone(),
  213. args.max_order,
  214. args.input_fee_ppk,
  215. // TODO: add and connect settings for this
  216. None,
  217. );
  218. let id = info.id;
  219. let mut tx = self.localstore.begin_transaction().await?;
  220. tx.add_keyset_info(info.clone()).await?;
  221. tx.set_active_keyset(args.unit, id).await?;
  222. tx.commit().await?;
  223. self.reload_keys_from_db().await?;
  224. Ok((&(info, keyset)).into())
  225. }
  226. }
  227. #[cfg(test)]
  228. mod test {
  229. use std::collections::HashSet;
  230. use bitcoin::key::Secp256k1;
  231. use bitcoin::Network;
  232. use cdk_common::{Amount, MintKeySet, PublicKey};
  233. use super::*;
  234. #[test]
  235. fn mint_mod_generate_keyset_from_seed() {
  236. let seed = "test_seed".as_bytes();
  237. let keyset = MintKeySet::generate_from_seed(
  238. &Secp256k1::new(),
  239. seed,
  240. 2,
  241. CurrencyUnit::Sat,
  242. derivation_path_from_unit(CurrencyUnit::Sat, 0).unwrap(),
  243. None,
  244. cdk_common::nut02::KeySetVersion::Version00,
  245. );
  246. assert_eq!(keyset.unit, CurrencyUnit::Sat);
  247. assert_eq!(keyset.keys.len(), 2);
  248. let expected_amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = vec![
  249. (
  250. Amount::from(1),
  251. PublicKey::from_hex(
  252. "0257aed43bf2c1cdbe3e7ae2db2b27a723c6746fc7415e09748f6847916c09176e",
  253. )
  254. .unwrap(),
  255. ),
  256. (
  257. Amount::from(2),
  258. PublicKey::from_hex(
  259. "03ad95811e51adb6231613f9b54ba2ba31e4442c9db9d69f8df42c2b26fbfed26e",
  260. )
  261. .unwrap(),
  262. ),
  263. ]
  264. .into_iter()
  265. .collect();
  266. let amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = keyset
  267. .keys
  268. .iter()
  269. .map(|(amount, pair)| (*amount, pair.public_key))
  270. .collect();
  271. assert_eq!(amounts_and_pubkeys, expected_amounts_and_pubkeys);
  272. }
  273. #[test]
  274. fn mint_mod_generate_keyset_from_xpriv() {
  275. let seed = "test_seed".as_bytes();
  276. let network = Network::Bitcoin;
  277. let xpriv = Xpriv::new_master(network, seed).expect("Failed to create xpriv");
  278. let keyset = MintKeySet::generate_from_xpriv(
  279. &Secp256k1::new(),
  280. xpriv,
  281. 2,
  282. CurrencyUnit::Sat,
  283. derivation_path_from_unit(CurrencyUnit::Sat, 0).unwrap(),
  284. None,
  285. cdk_common::nut02::KeySetVersion::Version00,
  286. );
  287. assert_eq!(keyset.unit, CurrencyUnit::Sat);
  288. assert_eq!(keyset.keys.len(), 2);
  289. let expected_amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = vec![
  290. (
  291. Amount::from(1),
  292. PublicKey::from_hex(
  293. "0257aed43bf2c1cdbe3e7ae2db2b27a723c6746fc7415e09748f6847916c09176e",
  294. )
  295. .unwrap(),
  296. ),
  297. (
  298. Amount::from(2),
  299. PublicKey::from_hex(
  300. "03ad95811e51adb6231613f9b54ba2ba31e4442c9db9d69f8df42c2b26fbfed26e",
  301. )
  302. .unwrap(),
  303. ),
  304. ]
  305. .into_iter()
  306. .collect();
  307. let amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = keyset
  308. .keys
  309. .iter()
  310. .map(|(amount, pair)| (*amount, pair.public_key))
  311. .collect();
  312. assert_eq!(amounts_and_pubkeys, expected_amounts_and_pubkeys);
  313. }
  314. }