Commit 6b5c3925 authored by Shawn Tabrizi's avatar Shawn Tabrizi Committed by asynchronous rob
Browse files

Add claims prefix to the claims trait (#309)

* Add claims prefix to the genesis configuration

* Claims module not included in runtime yet

So we don't need to set any genesis config yet

* Use Param rather than Storage
parent 146dcd82
Pipeline #42091 passed with stages
in 16 minutes and 5 seconds
...@@ -19,7 +19,7 @@ ...@@ -19,7 +19,7 @@
use rstd::prelude::*; use rstd::prelude::*;
use sr_io::{keccak_256, secp256k1_ecdsa_recover}; use sr_io::{keccak_256, secp256k1_ecdsa_recover};
use srml_support::{StorageValue, StorageMap, decl_event, decl_storage, decl_module}; use srml_support::{StorageValue, StorageMap, decl_event, decl_storage, decl_module};
use srml_support::traits::Currency; use srml_support::traits::{Currency, Get};
use system::ensure_none; use system::ensure_none;
use parity_codec::{Encode, Decode}; use parity_codec::{Encode, Decode};
#[cfg(feature = "std")] #[cfg(feature = "std")]
...@@ -35,6 +35,7 @@ pub trait Trait: system::Trait { ...@@ -35,6 +35,7 @@ pub trait Trait: system::Trait {
/// The overarching event type. /// The overarching event type.
type Event: From<Event<Self>> + Into<<Self as system::Trait>::Event>; type Event: From<Event<Self>> + Into<<Self as system::Trait>::Event>;
type Currency: Currency<Self::AccountId>; type Currency: Currency<Self::AccountId>;
type Prefix: Get<&'static [u8]>;
} }
type EthereumAddress = [u8; 20]; type EthereumAddress = [u8; 20];
...@@ -86,32 +87,8 @@ decl_storage! { ...@@ -86,32 +87,8 @@ decl_storage! {
} }
add_extra_genesis { add_extra_genesis {
config(claims): Vec<(EthereumAddress, BalanceOf<T>)>; config(claims): Vec<(EthereumAddress, BalanceOf<T>)>;
}
}
// Constructs the message that Ethereum RPC's `personal_sign` and `eth_sign` would sign.
fn ethereum_signable_message(what: &[u8]) -> Vec<u8> {
let prefix = b"Pay DOTs to the Polkadot account:";
let mut l = prefix.len() + what.len();
let mut rev = Vec::new();
while l > 0 {
rev.push(b'0' + (l % 10) as u8);
l /= 10;
} }
let mut v = b"\x19Ethereum Signed Message:\n".to_vec();
v.extend(rev.into_iter().rev());
v.extend_from_slice(&prefix[..]);
v.extend_from_slice(what);
v
}
// Attempts to recover the Ethereum address from a message signature signed by using
// the Ethereum RPC's `personal_sign` and `eth_sign`.
fn eth_recover(s: &EcdsaSignature, what: &[u8]) -> Option<EthereumAddress> {
let msg = keccak_256(&ethereum_signable_message(what));
let mut res = EthereumAddress::default();
res.copy_from_slice(&keccak_256(&secp256k1_ecdsa_recover(&s.to_blob(), &msg).ok()?[..])[12..]);
Some(res)
} }
decl_module! { decl_module! {
...@@ -123,7 +100,7 @@ decl_module! { ...@@ -123,7 +100,7 @@ decl_module! {
fn claim(origin, dest: T::AccountId, ethereum_signature: EcdsaSignature) { fn claim(origin, dest: T::AccountId, ethereum_signature: EcdsaSignature) {
ensure_none(origin)?; ensure_none(origin)?;
let signer = dest.using_encoded(|data| eth_recover(&ethereum_signature, data)) let signer = dest.using_encoded(|data| Self::eth_recover(&ethereum_signature, data))
.ok_or("Invalid Ethereum signature")?; .ok_or("Invalid Ethereum signature")?;
let balance_due = <Claims<T>>::take(&signer) let balance_due = <Claims<T>>::take(&signer)
...@@ -143,6 +120,33 @@ decl_module! { ...@@ -143,6 +120,33 @@ decl_module! {
} }
} }
impl<T: Trait> Module<T> {
// Constructs the message that Ethereum RPC's `personal_sign` and `eth_sign` would sign.
fn ethereum_signable_message(what: &[u8]) -> Vec<u8> {
let prefix = T::Prefix::get();
let mut l = prefix.len() + what.len();
let mut rev = Vec::new();
while l > 0 {
rev.push(b'0' + (l % 10) as u8);
l /= 10;
}
let mut v = b"\x19Ethereum Signed Message:\n".to_vec();
v.extend(rev.into_iter().rev());
v.extend_from_slice(&prefix[..]);
v.extend_from_slice(what);
v
}
// Attempts to recover the Ethereum address from a message signature signed by using
// the Ethereum RPC's `personal_sign` and `eth_sign`.
fn eth_recover(s: &EcdsaSignature, what: &[u8]) -> Option<EthereumAddress> {
let msg = keccak_256(&Self::ethereum_signable_message(what));
let mut res = EthereumAddress::default();
res.copy_from_slice(&keccak_256(&secp256k1_ecdsa_recover(&s.to_blob(), &msg).ok()?[..])[12..]);
Some(res)
}
}
impl<T: Trait> ValidateUnsigned for Module<T> { impl<T: Trait> ValidateUnsigned for Module<T> {
type Call = Call<T>; type Call = Call<T>;
...@@ -156,7 +160,7 @@ impl<T: Trait> ValidateUnsigned for Module<T> { ...@@ -156,7 +160,7 @@ impl<T: Trait> ValidateUnsigned for Module<T> {
match call { match call {
Call::claim(account, ethereum_signature) => { Call::claim(account, ethereum_signature) => {
let signer = account.using_encoded(|data| eth_recover(&ethereum_signature, data)); let signer = account.using_encoded(|data| Self::eth_recover(&ethereum_signature, data));
let signer = if let Some(signer) = signer { let signer = if let Some(signer) = signer {
signer signer
} else { } else {
...@@ -196,7 +200,7 @@ mod tests { ...@@ -196,7 +200,7 @@ mod tests {
BuildStorage, traits::{BlakeTwo256, IdentityLookup}, testing::Header BuildStorage, traits::{BlakeTwo256, IdentityLookup}, testing::Header
}; };
use balances; use balances;
use srml_support::{impl_outer_origin, assert_ok, assert_err, assert_noop}; use srml_support::{impl_outer_origin, assert_ok, assert_err, assert_noop, parameter_types};
impl_outer_origin! { impl_outer_origin! {
pub enum Origin for Test {} pub enum Origin for Test {}
...@@ -227,9 +231,15 @@ mod tests { ...@@ -227,9 +231,15 @@ mod tests {
type DustRemoval = (); type DustRemoval = ();
type TransferPayment = (); type TransferPayment = ();
} }
parameter_types!{
pub const Prefix: &'static [u8] = b"Pay DOTs to the Polkadot account:";
}
impl Trait for Test { impl Trait for Test {
type Event = (); type Event = ();
type Currency = Balances; type Currency = Balances;
type Prefix = Prefix;
} }
type Balances = balances::Module<Test>; type Balances = balances::Module<Test>;
type Claims = Module<Test>; type Claims = Module<Test>;
...@@ -246,7 +256,7 @@ mod tests { ...@@ -246,7 +256,7 @@ mod tests {
res res
} }
fn alice_sig(what: &[u8]) -> EcdsaSignature { fn alice_sig(what: &[u8]) -> EcdsaSignature {
let msg = keccak256(&ethereum_signable_message(what)); let msg = keccak256(&Claims::ethereum_signable_message(what));
let (sig, recovery_id) = secp256k1::sign(&secp256k1::Message::parse(&msg), &alice_secret()).unwrap(); let (sig, recovery_id) = secp256k1::sign(&secp256k1::Message::parse(&msg), &alice_secret()).unwrap();
let sig: ([u8; 32], [u8; 32]) = Decode::decode(&mut &sig.serialize()[..]).unwrap(); let sig: ([u8; 32], [u8; 32]) = Decode::decode(&mut &sig.serialize()[..]).unwrap();
EcdsaSignature(sig.0, sig.1, recovery_id.serialize() as i8) EcdsaSignature(sig.0, sig.1, recovery_id.serialize() as i8)
...@@ -255,7 +265,7 @@ mod tests { ...@@ -255,7 +265,7 @@ mod tests {
secp256k1::SecretKey::parse(&keccak256(b"Bob")).unwrap() secp256k1::SecretKey::parse(&keccak256(b"Bob")).unwrap()
} }
fn bob_sig(what: &[u8]) -> EcdsaSignature { fn bob_sig(what: &[u8]) -> EcdsaSignature {
let msg = keccak256(&ethereum_signable_message(what)); let msg = keccak256(&Claims::ethereum_signable_message(what));
let (sig, recovery_id) = secp256k1::sign(&secp256k1::Message::parse(&msg), &bob_secret()).unwrap(); let (sig, recovery_id) = secp256k1::sign(&secp256k1::Message::parse(&msg), &bob_secret()).unwrap();
let sig: ([u8; 32], [u8; 32]) = Decode::decode(&mut &sig.serialize()[..]).unwrap(); let sig: ([u8; 32], [u8; 32]) = Decode::decode(&mut &sig.serialize()[..]).unwrap();
EcdsaSignature(sig.0, sig.1, recovery_id.serialize() as i8) EcdsaSignature(sig.0, sig.1, recovery_id.serialize() as i8)
...@@ -327,11 +337,13 @@ mod tests { ...@@ -327,11 +337,13 @@ mod tests {
#[test] #[test]
fn real_eth_sig_works() { fn real_eth_sig_works() {
let sig = hex!["7505f2880114da51b3f5d535f8687953c0ab9af4ab81e592eaebebf53b728d2b6dfd9b5bcd70fee412b1f31360e7c2774009305cb84fc50c1d0ff8034dfa5fff1c"]; with_externalities(&mut new_test_ext(), || {
let sig = EcdsaSignature::from_blob(&sig); let sig = hex!["7505f2880114da51b3f5d535f8687953c0ab9af4ab81e592eaebebf53b728d2b6dfd9b5bcd70fee412b1f31360e7c2774009305cb84fc50c1d0ff8034dfa5fff1c"];
let who = 42u64.encode(); let sig = EcdsaSignature::from_blob(&sig);
let signer = eth_recover(&sig, &who).unwrap(); let who = 42u64.encode();
assert_eq!(signer, hex!["DF67EC7EAe23D2459694685257b6FC59d1BAA1FE"]); let signer = Claims::eth_recover(&sig, &who).unwrap();
assert_eq!(signer, hex!["DF67EC7EAe23D2459694685257b6FC59d1BAA1FE"]);
});
} }
#[test] #[test]
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment