lib.rs 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523
  1. //! In memory signatory
  2. //!
  3. //! Implements the Signatory trait from cdk-common to manage the key in-process, to be included
  4. //! inside the mint to be executed as a single process.
  5. //!
  6. //! Even if it is embedded in the same process, the keys are not accessible from the outside of this
  7. //! module, all communication is done through the Signatory trait and the signatory manager.
  8. use std::collections::{HashMap, HashSet};
  9. use std::sync::Arc;
  10. use bitcoin::bip32::{ChildNumber, DerivationPath, Xpriv};
  11. use bitcoin::secp256k1::{self, Secp256k1};
  12. use cdk_common::amount::Amount;
  13. use cdk_common::database::{self, MintDatabase};
  14. use cdk_common::dhke::{sign_message, verify_message};
  15. use cdk_common::error::Error;
  16. use cdk_common::mint::MintKeySetInfo;
  17. use cdk_common::nuts::nut01::MintKeyPair;
  18. use cdk_common::nuts::{
  19. self, BlindSignature, BlindedMessage, CurrencyUnit, Id, KeySet, KeySetInfo, KeysResponse,
  20. KeysetResponse, Kind, MintKeySet, Proof,
  21. };
  22. use cdk_common::secret;
  23. use cdk_common::signatory::Signatory;
  24. use cdk_common::util::unix_time;
  25. use tokio::sync::RwLock;
  26. pub mod proto;
  27. pub use proto::client::RemoteSigner;
  28. /// Generate new [`MintKeySetInfo`] from path
  29. #[tracing::instrument(skip_all)]
  30. fn create_new_keyset<C: secp256k1::Signing>(
  31. secp: &secp256k1::Secp256k1<C>,
  32. xpriv: Xpriv,
  33. derivation_path: DerivationPath,
  34. derivation_path_index: Option<u32>,
  35. unit: CurrencyUnit,
  36. max_order: u8,
  37. input_fee_ppk: u64,
  38. ) -> (MintKeySet, MintKeySetInfo) {
  39. let keyset = MintKeySet::generate(
  40. secp,
  41. xpriv
  42. .derive_priv(secp, &derivation_path)
  43. .expect("RNG busted"),
  44. unit,
  45. max_order,
  46. );
  47. let keyset_info = MintKeySetInfo {
  48. id: keyset.id,
  49. unit: keyset.unit.clone(),
  50. active: true,
  51. valid_from: unix_time(),
  52. valid_to: None,
  53. derivation_path,
  54. derivation_path_index,
  55. max_order,
  56. input_fee_ppk,
  57. };
  58. (keyset, keyset_info)
  59. }
  60. fn derivation_path_from_unit(unit: CurrencyUnit, index: u32) -> Option<DerivationPath> {
  61. let unit_index = unit.derivation_index()?;
  62. Some(DerivationPath::from(vec![
  63. ChildNumber::from_hardened_idx(0).expect("0 is a valid index"),
  64. ChildNumber::from_hardened_idx(unit_index).expect("0 is a valid index"),
  65. ChildNumber::from_hardened_idx(index).expect("0 is a valid index"),
  66. ]))
  67. }
  68. /// In-memory Signatory
  69. ///
  70. /// This is the default signatory implementation for the mint.
  71. ///
  72. /// The private keys and the all key-related data is stored in memory, in the same process, but it
  73. /// is not accessible from the outside.
  74. pub struct MemorySignatory {
  75. keysets: RwLock<HashMap<Id, MintKeySet>>,
  76. localstore: Arc<dyn MintDatabase<Err = database::Error> + Send + Sync>,
  77. secp_ctx: Secp256k1<secp256k1::All>,
  78. xpriv: Xpriv,
  79. }
  80. impl MemorySignatory {
  81. /// Creates a new MemorySignatory instance
  82. pub async fn new(
  83. localstore: Arc<dyn MintDatabase<Err = database::Error> + Send + Sync>,
  84. seed: &[u8],
  85. supported_units: HashMap<CurrencyUnit, (u64, u8)>,
  86. custom_paths: HashMap<CurrencyUnit, DerivationPath>,
  87. ) -> Result<Self, Error> {
  88. let secp_ctx = Secp256k1::new();
  89. let xpriv = Xpriv::new_master(bitcoin::Network::Bitcoin, seed).expect("RNG busted");
  90. let mut active_keysets = HashMap::new();
  91. let keysets_infos = localstore.get_keyset_infos().await?;
  92. let mut active_keyset_units = vec![];
  93. if !keysets_infos.is_empty() {
  94. tracing::debug!("Setting all saved keysets to inactive");
  95. for keyset in keysets_infos.clone() {
  96. // Set all to in active
  97. let mut keyset = keyset;
  98. keyset.active = false;
  99. localstore.add_keyset_info(keyset).await?;
  100. }
  101. let keysets_by_unit: HashMap<CurrencyUnit, Vec<MintKeySetInfo>> =
  102. keysets_infos.iter().fold(HashMap::new(), |mut acc, ks| {
  103. acc.entry(ks.unit.clone()).or_default().push(ks.clone());
  104. acc
  105. });
  106. for (unit, keysets) in keysets_by_unit {
  107. let mut keysets = keysets;
  108. keysets.sort_by(|a, b| b.derivation_path_index.cmp(&a.derivation_path_index));
  109. let highest_index_keyset = keysets
  110. .first()
  111. .cloned()
  112. .expect("unit will not be added to hashmap if empty");
  113. let keysets: Vec<MintKeySetInfo> = keysets
  114. .into_iter()
  115. .filter(|ks| ks.derivation_path_index.is_some())
  116. .collect();
  117. if let Some((input_fee_ppk, max_order)) = supported_units.get(&unit) {
  118. let derivation_path_index = if keysets.is_empty() {
  119. 1
  120. } else if &highest_index_keyset.input_fee_ppk == input_fee_ppk
  121. && &highest_index_keyset.max_order == max_order
  122. {
  123. let id = highest_index_keyset.id;
  124. let keyset = MintKeySet::generate_from_xpriv(
  125. &secp_ctx,
  126. xpriv,
  127. highest_index_keyset.max_order,
  128. highest_index_keyset.unit.clone(),
  129. highest_index_keyset.derivation_path.clone(),
  130. );
  131. active_keysets.insert(id, keyset);
  132. let mut keyset_info = highest_index_keyset;
  133. keyset_info.active = true;
  134. localstore.add_keyset_info(keyset_info).await?;
  135. localstore.set_active_keyset(unit, id).await?;
  136. continue;
  137. } else {
  138. highest_index_keyset.derivation_path_index.unwrap_or(0) + 1
  139. };
  140. let derivation_path = match custom_paths.get(&unit) {
  141. Some(path) => path.clone(),
  142. None => derivation_path_from_unit(unit.clone(), derivation_path_index)
  143. .ok_or(Error::UnsupportedUnit)?,
  144. };
  145. let (keyset, keyset_info) = create_new_keyset(
  146. &secp_ctx,
  147. xpriv,
  148. derivation_path,
  149. Some(derivation_path_index),
  150. unit.clone(),
  151. *max_order,
  152. *input_fee_ppk,
  153. );
  154. let id = keyset_info.id;
  155. localstore.add_keyset_info(keyset_info).await?;
  156. localstore.set_active_keyset(unit.clone(), id).await?;
  157. active_keysets.insert(id, keyset);
  158. active_keyset_units.push(unit.clone());
  159. }
  160. }
  161. }
  162. for (unit, (fee, max_order)) in supported_units {
  163. if !active_keyset_units.contains(&unit) {
  164. let derivation_path = match custom_paths.get(&unit) {
  165. Some(path) => path.clone(),
  166. None => {
  167. derivation_path_from_unit(unit.clone(), 0).ok_or(Error::UnsupportedUnit)?
  168. }
  169. };
  170. let (keyset, keyset_info) = create_new_keyset(
  171. &secp_ctx,
  172. xpriv,
  173. derivation_path,
  174. Some(0),
  175. unit.clone(),
  176. max_order,
  177. fee,
  178. );
  179. let id = keyset_info.id;
  180. localstore.add_keyset_info(keyset_info).await?;
  181. localstore.set_active_keyset(unit, id).await?;
  182. active_keysets.insert(id, keyset);
  183. }
  184. }
  185. Ok(Self {
  186. keysets: RwLock::new(HashMap::new()),
  187. secp_ctx,
  188. localstore,
  189. xpriv,
  190. })
  191. }
  192. }
  193. impl MemorySignatory {
  194. fn generate_keyset(&self, keyset_info: MintKeySetInfo) -> MintKeySet {
  195. MintKeySet::generate_from_xpriv(
  196. &self.secp_ctx,
  197. self.xpriv,
  198. keyset_info.max_order,
  199. keyset_info.unit,
  200. keyset_info.derivation_path,
  201. )
  202. }
  203. async fn load_and_get_keyset(&self, id: &Id) -> Result<MintKeySetInfo, Error> {
  204. let keysets = self.keysets.read().await;
  205. let keyset_info = self
  206. .localstore
  207. .get_keyset_info(id)
  208. .await?
  209. .ok_or(Error::UnknownKeySet)?;
  210. if keysets.contains_key(id) {
  211. return Ok(keyset_info);
  212. }
  213. drop(keysets);
  214. let id = keyset_info.id;
  215. let mut keysets = self.keysets.write().await;
  216. keysets.insert(id, self.generate_keyset(keyset_info.clone()));
  217. Ok(keyset_info)
  218. }
  219. #[tracing::instrument(skip(self))]
  220. async fn get_keypair_for_amount(
  221. &self,
  222. keyset_id: &Id,
  223. amount: &Amount,
  224. ) -> Result<MintKeyPair, Error> {
  225. let keyset_info = self.load_and_get_keyset(keyset_id).await?;
  226. let active = self
  227. .localstore
  228. .get_active_keyset_id(&keyset_info.unit)
  229. .await?
  230. .ok_or(Error::InactiveKeyset)?;
  231. // Check that the keyset is active and should be used to sign
  232. if keyset_info.id != active {
  233. return Err(Error::InactiveKeyset);
  234. }
  235. let keysets = self.keysets.read().await;
  236. let keyset = keysets.get(keyset_id).ok_or(Error::UnknownKeySet)?;
  237. match keyset.keys.get(amount) {
  238. Some(key_pair) => Ok(key_pair.clone()),
  239. None => Err(Error::AmountKey),
  240. }
  241. }
  242. }
  243. #[async_trait::async_trait]
  244. impl Signatory for MemorySignatory {
  245. async fn blind_sign(&self, blinded_message: BlindedMessage) -> Result<BlindSignature, Error> {
  246. let BlindedMessage {
  247. amount,
  248. blinded_secret,
  249. keyset_id,
  250. ..
  251. } = blinded_message;
  252. let key_pair = self.get_keypair_for_amount(&keyset_id, &amount).await?;
  253. let c = sign_message(&key_pair.secret_key, &blinded_secret)?;
  254. let blinded_signature = BlindSignature::new(
  255. amount,
  256. c,
  257. keyset_id,
  258. &blinded_message.blinded_secret,
  259. key_pair.secret_key,
  260. )?;
  261. Ok(blinded_signature)
  262. }
  263. async fn verify_proof(&self, proof: Proof) -> Result<(), Error> {
  264. // Check if secret is a nut10 secret with conditions
  265. if let Ok(secret) =
  266. <&secret::Secret as TryInto<nuts::nut10::Secret>>::try_into(&proof.secret)
  267. {
  268. // Checks and verifes known secret kinds.
  269. // If it is an unknown secret kind it will be treated as a normal secret.
  270. // Spending conditions will **not** be check. It is up to the wallet to ensure
  271. // only supported secret kinds are used as there is no way for the mint to
  272. // enforce only signing supported secrets as they are blinded at
  273. // that point.
  274. match secret.kind {
  275. Kind::P2PK => {
  276. proof.verify_p2pk()?;
  277. }
  278. Kind::HTLC => {
  279. proof.verify_htlc()?;
  280. }
  281. }
  282. }
  283. let key_pair = self
  284. .get_keypair_for_amount(&proof.keyset_id, &proof.amount)
  285. .await?;
  286. verify_message(&key_pair.secret_key, proof.c, proof.secret.as_bytes())?;
  287. Ok(())
  288. }
  289. async fn keyset(&self, keyset_id: Id) -> Result<Option<KeySet>, Error> {
  290. self.load_and_get_keyset(&keyset_id).await?;
  291. Ok(self
  292. .keysets
  293. .read()
  294. .await
  295. .get(&keyset_id)
  296. .map(|k| k.clone().into()))
  297. }
  298. async fn keyset_pubkeys(&self, keyset_id: Id) -> Result<KeysResponse, Error> {
  299. self.load_and_get_keyset(&keyset_id).await?;
  300. Ok(KeysResponse {
  301. keysets: vec![self
  302. .keysets
  303. .read()
  304. .await
  305. .get(&keyset_id)
  306. .ok_or(Error::UnknownKeySet)?
  307. .clone()
  308. .into()],
  309. })
  310. }
  311. async fn pubkeys(&self) -> Result<KeysResponse, Error> {
  312. let active_keysets = self.localstore.get_active_keysets().await?;
  313. let active_keysets: HashSet<&Id> = active_keysets.values().collect();
  314. for id in active_keysets.iter() {
  315. let _ = self.load_and_get_keyset(id).await?;
  316. }
  317. let keysets = self.keysets.read().await;
  318. Ok(KeysResponse {
  319. keysets: keysets
  320. .values()
  321. .filter_map(|k| match active_keysets.contains(&k.id) {
  322. true => Some(k.clone().into()),
  323. false => None,
  324. })
  325. .collect(),
  326. })
  327. }
  328. async fn keysets(&self) -> Result<KeysetResponse, Error> {
  329. let keysets = self.localstore.get_keyset_infos().await?;
  330. let active_keysets: HashSet<Id> = self
  331. .localstore
  332. .get_active_keysets()
  333. .await?
  334. .values()
  335. .cloned()
  336. .collect();
  337. Ok(KeysetResponse {
  338. keysets: keysets
  339. .into_iter()
  340. .map(|k| KeySetInfo {
  341. id: k.id,
  342. unit: k.unit,
  343. active: active_keysets.contains(&k.id),
  344. input_fee_ppk: k.input_fee_ppk,
  345. })
  346. .collect(),
  347. })
  348. }
  349. /// Add current keyset to inactive keysets
  350. /// Generate new keyset
  351. #[tracing::instrument(skip(self))]
  352. async fn rotate_keyset(
  353. &self,
  354. unit: CurrencyUnit,
  355. derivation_path_index: u32,
  356. max_order: u8,
  357. input_fee_ppk: u64,
  358. custom_paths: HashMap<CurrencyUnit, DerivationPath>,
  359. ) -> Result<(), Error> {
  360. let derivation_path = match custom_paths.get(&unit) {
  361. Some(path) => path.clone(),
  362. None => derivation_path_from_unit(unit.clone(), derivation_path_index)
  363. .ok_or(Error::UnsupportedUnit)?,
  364. };
  365. let (keyset, keyset_info) = create_new_keyset(
  366. &self.secp_ctx,
  367. self.xpriv,
  368. derivation_path,
  369. Some(derivation_path_index),
  370. unit.clone(),
  371. max_order,
  372. input_fee_ppk,
  373. );
  374. let id = keyset_info.id;
  375. self.localstore.add_keyset_info(keyset_info).await?;
  376. self.localstore.set_active_keyset(unit, id).await?;
  377. let mut keysets = self.keysets.write().await;
  378. keysets.insert(id, keyset);
  379. Ok(())
  380. }
  381. }
  382. #[cfg(test)]
  383. mod test {
  384. use bitcoin::key::Secp256k1;
  385. use bitcoin::Network;
  386. use cdk_common::MintKeySet;
  387. use nuts::PublicKey;
  388. use super::*;
  389. #[test]
  390. fn mint_mod_generate_keyset_from_seed() {
  391. let seed = "test_seed".as_bytes();
  392. let keyset = MintKeySet::generate_from_seed(
  393. &Secp256k1::new(),
  394. seed,
  395. 2,
  396. CurrencyUnit::Sat,
  397. derivation_path_from_unit(CurrencyUnit::Sat, 0).unwrap(),
  398. );
  399. assert_eq!(keyset.unit, CurrencyUnit::Sat);
  400. assert_eq!(keyset.keys.len(), 2);
  401. let expected_amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = vec![
  402. (
  403. Amount::from(1),
  404. PublicKey::from_hex(
  405. "0257aed43bf2c1cdbe3e7ae2db2b27a723c6746fc7415e09748f6847916c09176e",
  406. )
  407. .unwrap(),
  408. ),
  409. (
  410. Amount::from(2),
  411. PublicKey::from_hex(
  412. "03ad95811e51adb6231613f9b54ba2ba31e4442c9db9d69f8df42c2b26fbfed26e",
  413. )
  414. .unwrap(),
  415. ),
  416. ]
  417. .into_iter()
  418. .collect();
  419. let amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = keyset
  420. .keys
  421. .iter()
  422. .map(|(amount, pair)| (*amount, pair.public_key))
  423. .collect();
  424. assert_eq!(amounts_and_pubkeys, expected_amounts_and_pubkeys);
  425. }
  426. #[test]
  427. fn mint_mod_generate_keyset_from_xpriv() {
  428. let seed = "test_seed".as_bytes();
  429. let network = Network::Bitcoin;
  430. let xpriv = Xpriv::new_master(network, seed).expect("Failed to create xpriv");
  431. let keyset = MintKeySet::generate_from_xpriv(
  432. &Secp256k1::new(),
  433. xpriv,
  434. 2,
  435. CurrencyUnit::Sat,
  436. derivation_path_from_unit(CurrencyUnit::Sat, 0).unwrap(),
  437. );
  438. assert_eq!(keyset.unit, CurrencyUnit::Sat);
  439. assert_eq!(keyset.keys.len(), 2);
  440. let expected_amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = vec![
  441. (
  442. Amount::from(1),
  443. PublicKey::from_hex(
  444. "0257aed43bf2c1cdbe3e7ae2db2b27a723c6746fc7415e09748f6847916c09176e",
  445. )
  446. .unwrap(),
  447. ),
  448. (
  449. Amount::from(2),
  450. PublicKey::from_hex(
  451. "03ad95811e51adb6231613f9b54ba2ba31e4442c9db9d69f8df42c2b26fbfed26e",
  452. )
  453. .unwrap(),
  454. ),
  455. ]
  456. .into_iter()
  457. .collect();
  458. let amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = keyset
  459. .keys
  460. .iter()
  461. .map(|(amount, pair)| (*amount, pair.public_key))
  462. .collect();
  463. assert_eq!(amounts_and_pubkeys, expected_amounts_and_pubkeys);
  464. }
  465. }