db_signatory.rs 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384
  1. //! Main Signatory implementation
  2. //!
  3. //! It is named db_signatory because it uses a database to maintain state.
  4. use std::collections::HashMap;
  5. use std::sync::Arc;
  6. use bitcoin::bip32::{DerivationPath, Xpriv};
  7. use bitcoin::secp256k1::{self, Secp256k1};
  8. use cdk_common::dhke::{sign_message, verify_message};
  9. use cdk_common::mint::MintKeySetInfo;
  10. use cdk_common::nuts::{BlindSignature, BlindedMessage, CurrencyUnit, Id, MintKeySet, Proof};
  11. use cdk_common::{database, Error, PublicKey};
  12. use tokio::sync::RwLock;
  13. use tracing::instrument;
  14. use crate::common::{create_new_keyset, derivation_path_from_unit, init_keysets};
  15. use crate::signatory::{RotateKeyArguments, Signatory, SignatoryKeySet, SignatoryKeysets};
  16. /// In-memory Signatory
  17. ///
  18. /// This is the default signatory implementation for the mint.
  19. ///
  20. /// The private keys and the all key-related data is stored in memory, in the same process, but it
  21. /// is not accessible from the outside.
  22. #[allow(missing_debug_implementations)]
  23. pub struct DbSignatory {
  24. keysets: RwLock<HashMap<Id, (MintKeySetInfo, MintKeySet)>>,
  25. active_keysets: RwLock<HashMap<CurrencyUnit, Id>>,
  26. localstore: Arc<dyn database::MintKeysDatabase<Err = database::Error> + Send + Sync>,
  27. secp_ctx: Secp256k1<secp256k1::All>,
  28. custom_paths: HashMap<CurrencyUnit, DerivationPath>,
  29. xpriv: Xpriv,
  30. xpub: PublicKey,
  31. }
  32. impl DbSignatory {
  33. /// Creates a new MemorySignatory instance
  34. ///
  35. /// # Panics
  36. ///
  37. /// Panics if the seed produces an invalid master key (should never happen with valid entropy).
  38. pub async fn new(
  39. localstore: Arc<dyn database::MintKeysDatabase<Err = database::Error> + Send + Sync>,
  40. seed: &[u8],
  41. mut supported_units: HashMap<CurrencyUnit, (u64, u8)>,
  42. custom_paths: HashMap<CurrencyUnit, DerivationPath>,
  43. ) -> Result<Self, Error> {
  44. let secp_ctx = Secp256k1::new();
  45. let xpriv = Xpriv::new_master(bitcoin::Network::Bitcoin, seed).expect("RNG busted");
  46. let (mut active_keysets, active_keyset_units) = init_keysets(
  47. xpriv,
  48. &secp_ctx,
  49. &localstore,
  50. &supported_units,
  51. &custom_paths,
  52. )
  53. .await?;
  54. supported_units.entry(CurrencyUnit::Auth).or_insert((0, 1));
  55. let mut tx = localstore.begin_transaction().await?;
  56. // Create new keysets for supported units that aren't covered by the current keysets
  57. for (unit, (fee, max_order)) in supported_units {
  58. if !active_keyset_units.contains(&unit) {
  59. let derivation_path = match custom_paths.get(&unit) {
  60. Some(path) => path.clone(),
  61. None => {
  62. derivation_path_from_unit(unit.clone(), 0).ok_or(Error::UnsupportedUnit)?
  63. }
  64. };
  65. let amounts = (0..max_order)
  66. .map(|i| 2_u64.pow(i as u32))
  67. .collect::<Vec<_>>();
  68. let (keyset, keyset_info) = create_new_keyset(
  69. &secp_ctx,
  70. xpriv,
  71. derivation_path,
  72. Some(0),
  73. unit.clone(),
  74. &amounts,
  75. fee,
  76. // TODO: add and connect settings for this
  77. None,
  78. );
  79. let id = keyset_info.id;
  80. tx.add_keyset_info(keyset_info).await?;
  81. tx.set_active_keyset(unit, id).await?;
  82. active_keysets.insert(id, keyset);
  83. }
  84. }
  85. tx.commit().await?;
  86. let keys = Self {
  87. keysets: Default::default(),
  88. active_keysets: Default::default(),
  89. localstore,
  90. custom_paths,
  91. xpub: xpriv.to_keypair(&secp_ctx).public_key().into(),
  92. secp_ctx,
  93. xpriv,
  94. };
  95. keys.reload_keys_from_db().await?;
  96. Ok(keys)
  97. }
  98. /// Load all the keysets from the database, even if they are not active.
  99. ///
  100. /// Since the database is owned by this process, we can load all the keysets in memory, and use
  101. /// it as the primary source, and the database as the persistence layer.
  102. ///
  103. /// Any operation performed with keysets, are done through this trait and never to the database
  104. /// directly.
  105. async fn reload_keys_from_db(&self) -> Result<(), Error> {
  106. let mut keysets = self.keysets.write().await;
  107. let mut active_keysets = self.active_keysets.write().await;
  108. keysets.clear();
  109. active_keysets.clear();
  110. let db_active_keysets = self.localstore.get_active_keysets().await?;
  111. for mut info in self.localstore.get_keyset_infos().await? {
  112. let id = info.id;
  113. let keyset = self.generate_keyset(&info);
  114. info.active = db_active_keysets.get(&info.unit) == Some(&info.id);
  115. if info.active {
  116. active_keysets.insert(info.unit.clone(), id);
  117. }
  118. keysets.insert(id, (info, keyset));
  119. }
  120. Ok(())
  121. }
  122. fn generate_keyset(&self, keyset_info: &MintKeySetInfo) -> MintKeySet {
  123. MintKeySet::generate_from_xpriv(
  124. &self.secp_ctx,
  125. self.xpriv,
  126. &keyset_info.amounts,
  127. keyset_info.unit.clone(),
  128. keyset_info.derivation_path.clone(),
  129. keyset_info.input_fee_ppk,
  130. keyset_info.final_expiry,
  131. keyset_info.id.get_version(),
  132. )
  133. }
  134. }
  135. #[async_trait::async_trait]
  136. impl Signatory for DbSignatory {
  137. fn name(&self) -> String {
  138. format!("Signatory {}", env!("CARGO_PKG_VERSION"))
  139. }
  140. #[instrument(skip_all)]
  141. async fn blind_sign(
  142. &self,
  143. blinded_messages: Vec<BlindedMessage>,
  144. ) -> Result<Vec<BlindSignature>, Error> {
  145. let keysets = self.keysets.read().await;
  146. blinded_messages
  147. .into_iter()
  148. .map(|blinded_message| {
  149. let BlindedMessage {
  150. amount,
  151. blinded_secret,
  152. keyset_id,
  153. ..
  154. } = blinded_message;
  155. let (info, key) = keysets.get(&keyset_id).ok_or(Error::UnknownKeySet)?;
  156. if !info.active {
  157. return Err(Error::InactiveKeyset);
  158. }
  159. let key_pair = key.keys.get(&amount).ok_or(Error::UnknownKeySet)?;
  160. let c = sign_message(&key_pair.secret_key, &blinded_secret)?;
  161. let blinded_signature = BlindSignature::new(
  162. amount,
  163. c,
  164. keyset_id,
  165. &blinded_message.blinded_secret,
  166. key_pair.secret_key.clone(),
  167. )?;
  168. Ok(blinded_signature)
  169. })
  170. .collect::<Result<Vec<_>, _>>()
  171. }
  172. #[tracing::instrument(skip_all)]
  173. async fn verify_proofs(&self, proofs: Vec<Proof>) -> Result<(), Error> {
  174. let keysets = self.keysets.read().await;
  175. proofs.into_iter().try_for_each(|proof| {
  176. let (_, key) = keysets.get(&proof.keyset_id).ok_or(Error::UnknownKeySet)?;
  177. let key_pair = key.keys.get(&proof.amount).ok_or(Error::UnknownKeySet)?;
  178. verify_message(&key_pair.secret_key, proof.c, proof.secret.as_bytes())?;
  179. Ok(())
  180. })
  181. }
  182. #[tracing::instrument(skip_all)]
  183. async fn keysets(&self) -> Result<SignatoryKeysets, Error> {
  184. Ok(SignatoryKeysets {
  185. pubkey: self.xpub,
  186. keysets: self
  187. .keysets
  188. .read()
  189. .await
  190. .values()
  191. .map(|k| k.into())
  192. .collect::<Vec<_>>(),
  193. })
  194. }
  195. /// Add current keyset to inactive keysets
  196. /// Generate new keyset
  197. #[tracing::instrument(skip(self))]
  198. async fn rotate_keyset(&self, args: RotateKeyArguments) -> Result<SignatoryKeySet, Error> {
  199. let (path_index, amounts) = if let Some(current_keyset_id) =
  200. self.localstore.get_active_keyset_id(&args.unit).await?
  201. {
  202. let keyset_info = self
  203. .localstore
  204. .get_keyset_info(&current_keyset_id)
  205. .await?
  206. .ok_or(Error::UnknownKeySet)?;
  207. (
  208. keyset_info.derivation_path_index.unwrap_or(1) + 1,
  209. keyset_info.amounts,
  210. )
  211. } else {
  212. (1, vec![])
  213. };
  214. let derivation_path = match self.custom_paths.get(&args.unit) {
  215. Some(path) => path.clone(),
  216. None => derivation_path_from_unit(args.unit.clone(), path_index)
  217. .ok_or(Error::UnsupportedUnit)?,
  218. };
  219. let amounts = if args.amounts.is_empty() {
  220. if amounts.is_empty() {
  221. return Err(Error::Custom("Amounts cannot be empty".to_string()));
  222. }
  223. amounts
  224. } else {
  225. args.amounts
  226. };
  227. let (keyset, info) = create_new_keyset(
  228. &self.secp_ctx,
  229. self.xpriv,
  230. derivation_path,
  231. Some(path_index),
  232. args.unit.clone(),
  233. &amounts,
  234. args.input_fee_ppk,
  235. // TODO: add and connect settings for this
  236. None,
  237. );
  238. let id = info.id;
  239. let mut tx = self.localstore.begin_transaction().await?;
  240. tx.add_keyset_info(info.clone()).await?;
  241. tx.set_active_keyset(args.unit, id).await?;
  242. tx.commit().await?;
  243. self.reload_keys_from_db().await?;
  244. Ok((&(info, keyset)).into())
  245. }
  246. }
  247. #[cfg(test)]
  248. mod test {
  249. use std::collections::HashSet;
  250. use bitcoin::key::Secp256k1;
  251. use bitcoin::Network;
  252. use cdk_common::{Amount, MintKeySet, PublicKey};
  253. use super::*;
  254. #[test]
  255. fn mint_mod_generate_keyset_from_seed() {
  256. let seed = "test_seed".as_bytes();
  257. let keyset = MintKeySet::generate_from_seed(
  258. &Secp256k1::new(),
  259. seed,
  260. &[1, 2],
  261. CurrencyUnit::Sat,
  262. derivation_path_from_unit(CurrencyUnit::Sat, 0).unwrap(),
  263. 0,
  264. None,
  265. cdk_common::nut02::KeySetVersion::Version00,
  266. );
  267. assert_eq!(keyset.unit, CurrencyUnit::Sat);
  268. assert_eq!(keyset.keys.len(), 2);
  269. let expected_amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = vec![
  270. (
  271. Amount::from(1),
  272. PublicKey::from_hex(
  273. "0257aed43bf2c1cdbe3e7ae2db2b27a723c6746fc7415e09748f6847916c09176e",
  274. )
  275. .unwrap(),
  276. ),
  277. (
  278. Amount::from(2),
  279. PublicKey::from_hex(
  280. "03ad95811e51adb6231613f9b54ba2ba31e4442c9db9d69f8df42c2b26fbfed26e",
  281. )
  282. .unwrap(),
  283. ),
  284. ]
  285. .into_iter()
  286. .collect();
  287. let amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = keyset
  288. .keys
  289. .iter()
  290. .map(|(amount, pair)| (*amount, pair.public_key))
  291. .collect();
  292. assert_eq!(amounts_and_pubkeys, expected_amounts_and_pubkeys);
  293. }
  294. #[test]
  295. fn mint_mod_generate_keyset_from_xpriv() {
  296. let seed = "test_seed".as_bytes();
  297. let network = Network::Bitcoin;
  298. let xpriv = Xpriv::new_master(network, seed).expect("Failed to create xpriv");
  299. let keyset = MintKeySet::generate_from_xpriv(
  300. &Secp256k1::new(),
  301. xpriv,
  302. &[1, 2],
  303. CurrencyUnit::Sat,
  304. derivation_path_from_unit(CurrencyUnit::Sat, 0).unwrap(),
  305. 0,
  306. None,
  307. cdk_common::nut02::KeySetVersion::Version00,
  308. );
  309. assert_eq!(keyset.unit, CurrencyUnit::Sat);
  310. assert_eq!(keyset.keys.len(), 2);
  311. let expected_amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = vec![
  312. (
  313. Amount::from(1),
  314. PublicKey::from_hex(
  315. "0257aed43bf2c1cdbe3e7ae2db2b27a723c6746fc7415e09748f6847916c09176e",
  316. )
  317. .unwrap(),
  318. ),
  319. (
  320. Amount::from(2),
  321. PublicKey::from_hex(
  322. "03ad95811e51adb6231613f9b54ba2ba31e4442c9db9d69f8df42c2b26fbfed26e",
  323. )
  324. .unwrap(),
  325. ),
  326. ]
  327. .into_iter()
  328. .collect();
  329. let amounts_and_pubkeys: HashSet<(Amount, PublicKey)> = keyset
  330. .keys
  331. .iter()
  332. .map(|(amount, pair)| (*amount, pair.public_key))
  333. .collect();
  334. assert_eq!(amounts_and_pubkeys, expected_amounts_and_pubkeys);
  335. }
  336. }