github.com/neatio-net/neatio@v1.7.3-0.20231114194659-f4d7a2226baa/chain/accounts/usbwallet/wallet.go (about) 1 // Copyright 2017 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 // Package usbwallet implements support for USB hardware wallets. 18 package usbwallet 19 20 import ( 21 "context" 22 "fmt" 23 "io" 24 "math/big" 25 "sync" 26 "time" 27 28 "github.com/karalabe/hid" 29 "github.com/neatio-net/neatio" 30 "github.com/neatio-net/neatio/chain/accounts" 31 "github.com/neatio-net/neatio/chain/core/types" 32 "github.com/neatio-net/neatio/chain/log" 33 "github.com/neatio-net/neatio/utilities/common" 34 ) 35 36 // Maximum time between wallet health checks to detect USB unplugs. 37 const heartbeatCycle = time.Second 38 39 // Minimum time to wait between self derivation attempts, even it the user is 40 // requesting accounts like crazy. 41 const selfDeriveThrottling = time.Second 42 43 // driver defines the vendor specific functionality hardware wallets instances 44 // must implement to allow using them with the wallet lifecycle management. 45 type driver interface { 46 // Status returns a textual status to aid the user in the current state of the 47 // wallet. It also returns an error indicating any failure the wallet might have 48 // encountered. 49 Status() (string, error) 50 51 // Open initializes access to a wallet instance. The passphrase parameter may 52 // or may not be used by the implementation of a particular wallet instance. 53 Open(device io.ReadWriter, passphrase string) error 54 55 // Close releases any resources held by an open wallet instance. 56 Close() error 57 58 // Heartbeat performs a sanity check against the hardware wallet to see if it 59 // is still online and healthy. 60 Heartbeat() error 61 62 // Derive sends a derivation request to the USB device and returns the Ethereum 63 // address located on that path. 64 Derive(path accounts.DerivationPath) (common.Address, error) 65 66 // SignTx sends the transaction to the USB device and waits for the user to confirm 67 // or deny the transaction. 68 SignTx(path accounts.DerivationPath, tx *types.Transaction, chainID *big.Int) (common.Address, *types.Transaction, error) 69 } 70 71 // wallet represents the common functionality shared by all USB hardware 72 // wallets to prevent reimplementing the same complex maintenance mechanisms 73 // for different vendors. 74 type wallet struct { 75 hub *Hub // USB hub scanning 76 driver driver // Hardware implementation of the low level device operations 77 url *accounts.URL // Textual URL uniquely identifying this wallet 78 79 info hid.DeviceInfo // Known USB device infos about the wallet 80 device *hid.Device // USB device advertising itself as a hardware wallet 81 82 accounts []accounts.Account // List of derive accounts pinned on the hardware wallet 83 paths map[common.Address]accounts.DerivationPath // Known derivation paths for signing operations 84 85 deriveNextPath accounts.DerivationPath // Next derivation path for account auto-discovery 86 deriveNextAddr common.Address // Next derived account address for auto-discovery 87 deriveChain neatio.ChainStateReader // Blockchain state reader to discover used account with 88 deriveReq chan chan struct{} // Channel to request a self-derivation on 89 deriveQuit chan chan error // Channel to terminate the self-deriver with 90 91 healthQuit chan chan error 92 93 // Locking a hardware wallet is a bit special. Since hardware devices are lower 94 // performing, any communication with them might take a non negligible amount of 95 // time. Worse still, waiting for user confirmation can take arbitrarily long, 96 // but exclusive communication must be upheld during. Locking the entire wallet 97 // in the mean time however would stall any parts of the system that don't want 98 // to communicate, just read some state (e.g. list the accounts). 99 // 100 // As such, a hardware wallet needs two locks to function correctly. A state 101 // lock can be used to protect the wallet's software-side internal state, which 102 // must not be held exlusively during hardware communication. A communication 103 // lock can be used to achieve exclusive access to the device itself, this one 104 // however should allow "skipping" waiting for operations that might want to 105 // use the device, but can live without too (e.g. account self-derivation). 106 // 107 // Since we have two locks, it's important to know how to properly use them: 108 // - Communication requires the `device` to not change, so obtaining the 109 // commsLock should be done after having a stateLock. 110 // - Communication must not disable read access to the wallet state, so it 111 // must only ever hold a *read* lock to stateLock. 112 commsLock chan struct{} // Mutex (buf=1) for the USB comms without keeping the state locked 113 stateLock sync.RWMutex // Protects read and write access to the wallet struct fields 114 115 log log.Logger // Contextual logger to tag the base with its id 116 } 117 118 // URL implements accounts.Wallet, returning the URL of the USB hardware device. 119 func (w *wallet) URL() accounts.URL { 120 return *w.url // Immutable, no need for a lock 121 } 122 123 // Status implements accounts.Wallet, returning a custom status message from the 124 // underlying vendor-specific hardware wallet implementation. 125 func (w *wallet) Status() (string, error) { 126 w.stateLock.RLock() // No device communication, state lock is enough 127 defer w.stateLock.RUnlock() 128 129 status, failure := w.driver.Status() 130 if w.device == nil { 131 return "Closed", failure 132 } 133 return status, failure 134 } 135 136 // Open implements accounts.Wallet, attempting to open a USB connection to the 137 // hardware wallet. 138 func (w *wallet) Open(passphrase string) error { 139 w.stateLock.Lock() // State lock is enough since there's no connection yet at this point 140 defer w.stateLock.Unlock() 141 142 // If the device was already opened once, refuse to try again 143 if w.paths != nil { 144 return accounts.ErrWalletAlreadyOpen 145 } 146 // Make sure the actual device connection is done only once 147 if w.device == nil { 148 device, err := w.info.Open() 149 if err != nil { 150 return err 151 } 152 w.device = device 153 w.commsLock = make(chan struct{}, 1) 154 w.commsLock <- struct{}{} // Enable lock 155 } 156 // Delegate device initialization to the underlying driver 157 if err := w.driver.Open(w.device, passphrase); err != nil { 158 return err 159 } 160 // Connection successful, start life-cycle management 161 w.paths = make(map[common.Address]accounts.DerivationPath) 162 163 w.deriveReq = make(chan chan struct{}) 164 w.deriveQuit = make(chan chan error) 165 w.healthQuit = make(chan chan error) 166 167 go w.heartbeat() 168 go w.selfDerive() 169 170 // Notify anyone listening for wallet events that a new device is accessible 171 go w.hub.updateFeed.Send(accounts.WalletEvent{Wallet: w, Kind: accounts.WalletOpened}) 172 173 return nil 174 } 175 176 // heartbeat is a health check loop for the USB wallets to periodically verify 177 // whether they are still present or if they malfunctioned. 178 func (w *wallet) heartbeat() { 179 w.log.Debug("USB wallet health-check started") 180 defer w.log.Debug("USB wallet health-check stopped") 181 182 // Execute heartbeat checks until termination or error 183 var ( 184 errc chan error 185 err error 186 ) 187 for errc == nil && err == nil { 188 // Wait until termination is requested or the heartbeat cycle arrives 189 select { 190 case errc = <-w.healthQuit: 191 // Termination requested 192 continue 193 case <-time.After(heartbeatCycle): 194 // Heartbeat time 195 } 196 // Execute a tiny data exchange to see responsiveness 197 w.stateLock.RLock() 198 if w.device == nil { 199 // Terminated while waiting for the lock 200 w.stateLock.RUnlock() 201 continue 202 } 203 <-w.commsLock // Don't lock state while resolving version 204 err = w.driver.Heartbeat() 205 w.commsLock <- struct{}{} 206 w.stateLock.RUnlock() 207 208 if err != nil { 209 w.stateLock.Lock() // Lock state to tear the wallet down 210 w.close() 211 w.stateLock.Unlock() 212 } 213 // Ignore non hardware related errors 214 err = nil 215 } 216 // In case of error, wait for termination 217 if err != nil { 218 w.log.Debug("USB wallet health-check failed", "err", err) 219 errc = <-w.healthQuit 220 } 221 errc <- err 222 } 223 224 // Close implements accounts.Wallet, closing the USB connection to the device. 225 func (w *wallet) Close() error { 226 // Ensure the wallet was opened 227 w.stateLock.RLock() 228 hQuit, dQuit := w.healthQuit, w.deriveQuit 229 w.stateLock.RUnlock() 230 231 // Terminate the health checks 232 var herr error 233 if hQuit != nil { 234 errc := make(chan error) 235 hQuit <- errc 236 herr = <-errc // Save for later, we *must* close the USB 237 } 238 // Terminate the self-derivations 239 var derr error 240 if dQuit != nil { 241 errc := make(chan error) 242 dQuit <- errc 243 derr = <-errc // Save for later, we *must* close the USB 244 } 245 // Terminate the device connection 246 w.stateLock.Lock() 247 defer w.stateLock.Unlock() 248 249 w.healthQuit = nil 250 w.deriveQuit = nil 251 w.deriveReq = nil 252 253 if err := w.close(); err != nil { 254 return err 255 } 256 if herr != nil { 257 return herr 258 } 259 return derr 260 } 261 262 // close is the internal wallet closer that terminates the USB connection and 263 // resets all the fields to their defaults. 264 // 265 // Note, close assumes the state lock is held! 266 func (w *wallet) close() error { 267 // Allow duplicate closes, especially for health-check failures 268 if w.device == nil { 269 return nil 270 } 271 // Close the device, clear everything, then return 272 w.device.Close() 273 w.device = nil 274 275 w.accounts, w.paths = nil, nil 276 w.driver.Close() 277 278 return nil 279 } 280 281 // Accounts implements accounts.Wallet, returning the list of accounts pinned to 282 // the USB hardware wallet. If self-derivation was enabled, the account list is 283 // periodically expanded based on current chain state. 284 func (w *wallet) Accounts() []accounts.Account { 285 // Attempt self-derivation if it's running 286 reqc := make(chan struct{}, 1) 287 select { 288 case w.deriveReq <- reqc: 289 // Self-derivation request accepted, wait for it 290 <-reqc 291 default: 292 // Self-derivation offline, throttled or busy, skip 293 } 294 // Return whatever account list we ended up with 295 w.stateLock.RLock() 296 defer w.stateLock.RUnlock() 297 298 cpy := make([]accounts.Account, len(w.accounts)) 299 copy(cpy, w.accounts) 300 return cpy 301 } 302 303 // selfDerive is an account derivation loop that upon request attempts to find 304 // new non-zero accounts. 305 func (w *wallet) selfDerive() { 306 w.log.Debug("USB wallet self-derivation started") 307 defer w.log.Debug("USB wallet self-derivation stopped") 308 309 // Execute self-derivations until termination or error 310 var ( 311 reqc chan struct{} 312 errc chan error 313 err error 314 ) 315 for errc == nil && err == nil { 316 // Wait until either derivation or termination is requested 317 select { 318 case errc = <-w.deriveQuit: 319 // Termination requested 320 continue 321 case reqc = <-w.deriveReq: 322 // Account discovery requested 323 } 324 // Derivation needs a chain and device access, skip if either unavailable 325 w.stateLock.RLock() 326 if w.device == nil || w.deriveChain == nil { 327 w.stateLock.RUnlock() 328 reqc <- struct{}{} 329 continue 330 } 331 select { 332 case <-w.commsLock: 333 default: 334 w.stateLock.RUnlock() 335 reqc <- struct{}{} 336 continue 337 } 338 // Device lock obtained, derive the next batch of accounts 339 var ( 340 accs []accounts.Account 341 paths []accounts.DerivationPath 342 343 nextAddr = w.deriveNextAddr 344 nextPath = w.deriveNextPath 345 346 context = context.Background() 347 ) 348 for empty := false; !empty; { 349 // Retrieve the next derived Ethereum account 350 if nextAddr == (common.Address{}) { 351 if nextAddr, err = w.driver.Derive(nextPath); err != nil { 352 w.log.Warn("USB wallet account derivation failed", "err", err) 353 break 354 } 355 } 356 // Check the account's status against the current chain state 357 var ( 358 balance *big.Int 359 nonce uint64 360 ) 361 balance, err = w.deriveChain.BalanceAt(context, nextAddr, nil) 362 if err != nil { 363 w.log.Warn("USB wallet balance retrieval failed", "err", err) 364 break 365 } 366 nonce, err = w.deriveChain.NonceAt(context, nextAddr, nil) 367 if err != nil { 368 w.log.Warn("USB wallet nonce retrieval failed", "err", err) 369 break 370 } 371 // If the next account is empty, stop self-derivation, but add it nonetheless 372 if balance.Sign() == 0 && nonce == 0 { 373 empty = true 374 } 375 // We've just self-derived a new account, start tracking it locally 376 path := make(accounts.DerivationPath, len(nextPath)) 377 copy(path[:], nextPath[:]) 378 paths = append(paths, path) 379 380 account := accounts.Account{ 381 Address: nextAddr, 382 URL: accounts.URL{Scheme: w.url.Scheme, Path: fmt.Sprintf("%s/%s", w.url.Path, path)}, 383 } 384 accs = append(accs, account) 385 386 // Display a log message to the user for new (or previously empty accounts) 387 if _, known := w.paths[nextAddr]; !known || (!empty && nextAddr == w.deriveNextAddr) { 388 w.log.Info("USB wallet discovered new account", "address", nextAddr, "path", path, "balance", balance, "nonce", nonce) 389 } 390 // Fetch the next potential account 391 if !empty { 392 nextAddr = common.Address{} 393 nextPath[len(nextPath)-1]++ 394 } 395 } 396 // Self derivation complete, release device lock 397 w.commsLock <- struct{}{} 398 w.stateLock.RUnlock() 399 400 // Insert any accounts successfully derived 401 w.stateLock.Lock() 402 for i := 0; i < len(accs); i++ { 403 if _, ok := w.paths[accs[i].Address]; !ok { 404 w.accounts = append(w.accounts, accs[i]) 405 w.paths[accs[i].Address] = paths[i] 406 } 407 } 408 // Shift the self-derivation forward 409 // TODO(karalabe): don't overwrite changes from wallet.SelfDerive 410 w.deriveNextAddr = nextAddr 411 w.deriveNextPath = nextPath 412 w.stateLock.Unlock() 413 414 // Notify the user of termination and loop after a bit of time (to avoid trashing) 415 reqc <- struct{}{} 416 if err == nil { 417 select { 418 case errc = <-w.deriveQuit: 419 // Termination requested, abort 420 case <-time.After(selfDeriveThrottling): 421 // Waited enough, willing to self-derive again 422 } 423 } 424 } 425 // In case of error, wait for termination 426 if err != nil { 427 w.log.Debug("USB wallet self-derivation failed", "err", err) 428 errc = <-w.deriveQuit 429 } 430 errc <- err 431 } 432 433 // Contains implements accounts.Wallet, returning whether a particular account is 434 // or is not pinned into this wallet instance. Although we could attempt to resolve 435 // unpinned accounts, that would be an non-negligible hardware operation. 436 func (w *wallet) Contains(account accounts.Account) bool { 437 w.stateLock.RLock() 438 defer w.stateLock.RUnlock() 439 440 _, exists := w.paths[account.Address] 441 return exists 442 } 443 444 // Derive implements accounts.Wallet, deriving a new account at the specific 445 // derivation path. If pin is set to true, the account will be added to the list 446 // of tracked accounts. 447 func (w *wallet) Derive(path accounts.DerivationPath, pin bool) (accounts.Account, error) { 448 // Try to derive the actual account and update its URL if successful 449 w.stateLock.RLock() // Avoid device disappearing during derivation 450 451 if w.device == nil { 452 w.stateLock.RUnlock() 453 return accounts.Account{}, accounts.ErrWalletClosed 454 } 455 <-w.commsLock // Avoid concurrent hardware access 456 address, err := w.driver.Derive(path) 457 w.commsLock <- struct{}{} 458 459 w.stateLock.RUnlock() 460 461 // If an error occurred or no pinning was requested, return 462 if err != nil { 463 return accounts.Account{}, err 464 } 465 account := accounts.Account{ 466 Address: address, 467 URL: accounts.URL{Scheme: w.url.Scheme, Path: fmt.Sprintf("%s/%s", w.url.Path, path)}, 468 } 469 if !pin { 470 return account, nil 471 } 472 // Pinning needs to modify the state 473 w.stateLock.Lock() 474 defer w.stateLock.Unlock() 475 476 if _, ok := w.paths[address]; !ok { 477 w.accounts = append(w.accounts, account) 478 w.paths[address] = path 479 } 480 return account, nil 481 } 482 483 // SelfDerive implements accounts.Wallet, trying to discover accounts that the 484 // user used previously (based on the chain state), but ones that he/she did not 485 // explicitly pin to the wallet manually. To avoid chain head monitoring, self 486 // derivation only runs during account listing (and even then throttled). 487 func (w *wallet) SelfDerive(base accounts.DerivationPath, chain neatio.ChainStateReader) { 488 w.stateLock.Lock() 489 defer w.stateLock.Unlock() 490 491 w.deriveNextPath = make(accounts.DerivationPath, len(base)) 492 copy(w.deriveNextPath[:], base[:]) 493 494 w.deriveNextAddr = common.Address{} 495 w.deriveChain = chain 496 } 497 498 // SignHash implements accounts.Wallet, however signing arbitrary data is not 499 // supported for hardware wallets, so this method will always return an error. 500 func (w *wallet) SignHash(account accounts.Account, hash []byte) ([]byte, error) { 501 return nil, accounts.ErrNotSupported 502 } 503 504 // SignTx implements accounts.Wallet. It sends the transaction over to the Ledger 505 // wallet to request a confirmation from the user. It returns either the signed 506 // transaction or a failure if the user denied the transaction. 507 // 508 // Note, if the version of the Ethereum application running on the Ledger wallet is 509 // too old to sign EIP-155 transactions, but such is requested nonetheless, an error 510 // will be returned opposed to silently signing in Homestead mode. 511 func (w *wallet) SignTx(account accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) { 512 w.stateLock.RLock() // Comms have own mutex, this is for the state fields 513 defer w.stateLock.RUnlock() 514 515 // If the wallet is closed, abort 516 if w.device == nil { 517 return nil, accounts.ErrWalletClosed 518 } 519 // Make sure the requested account is contained within 520 path, ok := w.paths[account.Address] 521 if !ok { 522 return nil, accounts.ErrUnknownAccount 523 } 524 // All infos gathered and metadata checks out, request signing 525 <-w.commsLock 526 defer func() { w.commsLock <- struct{}{} }() 527 528 // Ensure the device isn't screwed with while user confirmation is pending 529 // TODO(karalabe): remove if hotplug lands on Windows 530 w.hub.commsLock.Lock() 531 w.hub.commsPend++ 532 w.hub.commsLock.Unlock() 533 534 defer func() { 535 w.hub.commsLock.Lock() 536 w.hub.commsPend-- 537 w.hub.commsLock.Unlock() 538 }() 539 // Sign the transaction and verify the sender to avoid hardware fault surprises 540 sender, signed, err := w.driver.SignTx(path, tx, chainID) 541 if err != nil { 542 return nil, err 543 } 544 if sender != account.Address { 545 //return nil, fmt.Errorf("signer mismatch: expected %s, got %s", account.Address.Hex(), sender.Hex()) 546 return nil, fmt.Errorf("signer mismatch: expected %s, got %s", account.Address.String(), sender.String()) 547 } 548 return signed, nil 549 } 550 551 func (w *wallet) SignTxWithAddress(account accounts.Account, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) { 552 return tx, fmt.Errorf("No support SignTxWithAddress with this wallet") 553 } 554 555 // SignHashWithPassphrase implements accounts.Wallet, however signing arbitrary 556 // data is not supported for Ledger wallets, so this method will always return 557 // an error. 558 func (w *wallet) SignHashWithPassphrase(account accounts.Account, passphrase string, hash []byte) ([]byte, error) { 559 return w.SignHash(account, hash) 560 } 561 562 // SignTxWithPassphrase implements accounts.Wallet, attempting to sign the given 563 // transaction with the given account using passphrase as extra authentication. 564 // Since USB wallets don't rely on passphrases, these are silently ignored. 565 func (w *wallet) SignTxWithPassphrase(account accounts.Account, passphrase string, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) { 566 return w.SignTx(account, tx, chainID) 567 }