/
vault.go
146 lines (119 loc) · 3.08 KB
/
vault.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
package vault
import (
"encoding/json"
"fmt"
"os"
eos "github.com/eoscanada/eos-go"
"github.com/eoscanada/eos-go/ecc"
)
// Vault represents an `eosc` wallet. It contains the encrypted
// material to load a KeyBag, which is the signing provider for
// signing transactions using the `eos-go` library (which includes the
// embedded keosd-compatible wallet).
type Vault struct {
Kind string `json:"kind"`
Version int `json:"version"`
Comment string `json:"comment"`
SecretBoxWrap string `json:"secretbox_wrap"`
SecretBoxCiphertext string `json:"secretbox_ciphertext"`
KeyBag *eos.KeyBag `json:"-"`
}
// type ShamirWrapping struct {
// Shares int `json:"shares"`
// Threshold int `json:"threshold"`
// Parts [][]byte `json:"parts"`
// }
func NewVaultFromWalletFile(filename string) (*Vault, error) {
v := NewVault()
fl, err := os.Open(filename)
if err != nil {
return nil, err
}
defer fl.Close()
err = json.NewDecoder(fl).Decode(&v)
if err != nil {
return nil, err
}
return v, nil
}
func NewVaultFromKeysFile(keysFile string) (*Vault, error) {
v := NewVault()
return v, nil
}
func NewVaultFromSingleKey(privKey string) (*Vault, error) {
v := NewVault()
return v, nil
}
// NewVault returns an empty vault, unsaved and with no keys.
func NewVault() *Vault {
return &Vault{
Kind: "eosc-vault-wallet",
Version: 1,
KeyBag: eos.NewKeyBag(),
}
}
// NewKeyPair creates a new EOS keypair, saves the private key in the
// local wallet and returns the public key. It does NOT save the
// wallet, you better do that soon after.
func (v *Vault) NewKeyPair() (pub ecc.PublicKey, err error) {
privKey, err := ecc.NewRandomPrivateKey()
if err != nil {
return
}
v.KeyBag.Keys = append(v.KeyBag.Keys, privKey)
pub = privKey.PublicKey()
return
}
func (v *Vault) AddPrivateKey(privateKey *ecc.PrivateKey) (pub ecc.PublicKey) {
v.KeyBag.Keys = append(v.KeyBag.Keys, privateKey)
pub = privateKey.PublicKey()
return
}
func (v *Vault) PrintPublicKeys() {
fmt.Printf("Public keys contained within (%d in total):\n", len(v.KeyBag.Keys))
for _, key := range v.KeyBag.Keys {
fmt.Println("-", key.PublicKey().String())
}
}
// WriteToFile writes the Vault to disk. You need to encrypt before
// writing to file, otherwise you might lose much :)
func (v *Vault) WriteToFile(filename string) error {
cnt, err := json.MarshalIndent(v, "", " ")
if err != nil {
return err
}
fl, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
if err != nil {
return err
}
_, err = fl.Write(cnt)
if err != nil {
fl.Close()
return err
}
return fl.Close()
}
func (v *Vault) Open(boxer SecretBoxer) error {
data, err := boxer.Open(v.SecretBoxCiphertext)
if err != nil {
return err
}
err = json.Unmarshal(data, v.KeyBag)
if err != nil {
return err
}
return nil
}
func (v *Vault) Seal(boxer SecretBoxer) error {
payload, err := json.Marshal(v.KeyBag)
if err != nil {
return err
}
v.SecretBoxWrap = boxer.WrapType()
cipherText, err := boxer.Seal(payload)
if err != nil {
return err
}
v.SecretBoxCiphertext = cipherText
return nil
}