1
0
mirror of https://github.com/kremalicious/metamask-extension.git synced 2024-11-25 03:20:23 +01:00
metamask-extension/app/scripts/lib/trezorKeyring.js

294 lines
7.8 KiB
JavaScript
Raw Normal View History

2018-06-10 09:52:32 +02:00
const { EventEmitter } = require('events')
const ethUtil = require('ethereumjs-util')
// const sigUtil = require('eth-sig-util')
const hdPathString = `m/44'/60'/0'/0`
2018-06-11 00:48:42 +02:00
const keyringType = 'Trezor Hardware'
2018-06-11 07:52:41 +02:00
const Transaction = require('ethereumjs-tx')
const pathBase = 'm'
2018-06-10 09:52:32 +02:00
const TrezorConnect = require('./trezor-connect.js')
const HDKey = require('hdkey')
2018-06-11 07:52:41 +02:00
const TREZOR_MIN_FIRMWARE_VERSION = '1.5.2'
2018-06-11 03:10:22 +02:00
const log = require('loglevel')
2018-06-10 09:52:32 +02:00
class TrezorKeyring extends EventEmitter {
constructor (opts = {}) {
super()
this.type = keyringType
this.accounts = []
this.hdk = new HDKey()
this.deserialize(opts)
this.page = 0
this.perPage = 5
2018-06-11 07:52:41 +02:00
this.unlockedAccount = 0
2018-06-10 09:52:32 +02:00
}
serialize () {
2018-06-11 01:02:54 +02:00
return Promise.resolve({
2018-06-11 00:48:42 +02:00
hdPath: this.hdPath,
accounts: this.accounts,
page: this.page,
})
2018-06-10 09:52:32 +02:00
}
deserialize (opts = {}) {
this.hdPath = opts.hdPath || hdPathString
this.accounts = opts.accounts || []
2018-06-11 00:48:42 +02:00
this.page = opts.page || 0
2018-06-10 09:52:32 +02:00
return Promise.resolve()
}
unlock () {
2018-06-11 00:48:42 +02:00
2018-06-10 09:52:32 +02:00
if (this.hdk.publicKey) return Promise.resolve()
return new Promise((resolve, reject) => {
TrezorConnect.getXPubKey(
this.hdPath,
response => {
if (response.success) {
this.hdk.publicKey = new Buffer(response.publicKey, 'hex')
this.hdk.chainCode = new Buffer(response.chainCode, 'hex')
resolve()
} else {
reject(response.error || 'Unknown error')
}
},
2018-06-11 07:52:41 +02:00
TREZOR_MIN_FIRMWARE_VERSION
2018-06-10 09:52:32 +02:00
)
})
}
2018-06-11 01:02:54 +02:00
setAccountToUnlock (index) {
2018-06-11 07:52:41 +02:00
this.unlockedAccount = parseInt(index, 10)
2018-06-11 01:02:54 +02:00
}
2018-06-10 09:52:32 +02:00
addAccounts (n = 1) {
2018-06-11 00:48:42 +02:00
2018-06-10 09:52:32 +02:00
return new Promise((resolve, reject) => {
return this.unlock()
.then(_ => {
2018-06-11 07:52:41 +02:00
const from = this.unlockedAccount
2018-06-11 01:02:54 +02:00
const to = from + 1
2018-06-10 09:52:32 +02:00
this.accounts = []
for (let i = from; i < to; i++) {
2018-06-11 07:52:41 +02:00
this.accounts.push(this.getEthAddress(pathBase, i))
2018-06-10 09:52:32 +02:00
this.page = 0
}
resolve(this.accounts)
})
.catch(e => {
reject(e)
})
})
}
async getPage () {
2018-06-11 00:48:42 +02:00
2018-06-10 09:52:32 +02:00
return new Promise((resolve, reject) => {
return this.unlock()
.then(_ => {
2018-06-11 07:52:41 +02:00
2018-06-10 09:52:32 +02:00
const from = this.page === 0 ? 0 : (this.page - 1) * this.perPage
const to = from + this.perPage
const accounts = []
for (let i = from; i < to; i++) {
2018-06-11 07:52:41 +02:00
2018-06-10 09:52:32 +02:00
accounts.push({
2018-06-11 07:52:41 +02:00
address: this.getEthAddress(pathBase, i),
2018-06-10 09:52:32 +02:00
balance: 0,
index: i,
})
}
2018-06-11 03:10:22 +02:00
log.debug(accounts)
2018-06-10 09:52:32 +02:00
resolve(accounts)
})
.catch(e => {
reject(e)
})
})
}
async getPrevAccountSet () {
this.page--
return await this.getPage()
}
async getNextAccountSet () {
this.page++
return await this.getPage()
}
getAccounts () {
return Promise.resolve(this.accounts.slice())
}
2018-06-11 07:52:41 +02:00
padLeftEven (hex) {
return hex.length % 2 !== 0 ? `0${hex}` : hex
}
cleanData (buf) {
return this.padLeftEven(ethUtil.bufferToHex(buf).substring(2).toLowerCase())
}
getEthAddress (pathBase, i) {
const dkey = this.hdk.derive(`${pathBase}/${i}`)
const address = ethUtil
.publicToAddress(dkey.publicKey, true)
.toString('hex')
return ethUtil.toChecksumAddress(address)
}
2018-06-10 09:52:32 +02:00
// tx is an instance of the ethereumjs-transaction class.
async signTransaction (address, tx) {
2018-06-11 07:52:41 +02:00
return new Promise((resolve, reject) => {
log.debug('sign transaction ', address, tx)
const account = `m/44'/60'/0'/${this.unlockedAccount}`
const txData = {
account,
nonce: this.cleanData(tx.nonce),
gasPrice: this.cleanData(tx.gasPrice),
gasLimit: this.cleanData(tx.gasLimit),
to: this.cleanData(tx.to),
value: this.cleanData(tx.value),
data: this.cleanData(tx.data),
chainId: tx._chainId,
}
TrezorConnect.ethereumSignTx(
txData.account,
txData.nonce,
txData.gasPrice,
txData.gasLimit,
txData.to,
txData.value,
txData.data === '' ? null : txData.data,
txData.chainId,
response => {
if (response.success) {
tx.v = `0x${response.v.toString(16)}`
tx.r = `0x${response.r}`
tx.s = `0x${response.s}`
log.debug('about to create new tx with data', tx)
const signedTx = new Transaction(tx)
log.debug('signature is valid?', signedTx.verifySignature())
const addressSignedWith = ethUtil.toChecksumAddress(`0x${signedTx.from.toString('hex')}`)
const correctAddress = ethUtil.toChecksumAddress(address)
if (addressSignedWith !== correctAddress) {
// throw new Error('signature doesnt match the right address')
log.error('signature doesnt match the right address', addressSignedWith, correctAddress)
}
resolve(signedTx)
} else {
throw new Error(response.error || 'Unknown error')
}
},
TREZOR_MIN_FIRMWARE_VERSION)
})
2018-06-10 09:52:32 +02:00
}
async signMessage (withAccount, data) {
throw new Error('Not supported on this device')
}
// For personal_sign, we need to prefix the message:
async signPersonalMessage (withAccount, message) {
throw new Error('Not supported on this device')
/*
await this.lock.acquire()
try {
// Look before we leap
await this._checkCorrectTrezorAttached()
let accountId = await this._findAddressId(withAccount)
let eth = await this._getEth()
let msgHex = ethUtil.stripHexPrefix(message)
let TrezorSig = await eth.signPersonalMessage(
this._derivePath(accountId),
msgHex
)
let signature = this._personalToRawSig(TrezorSig)
// Since look before we leap check is racy, also check that signature is for account expected
let addressSignedWith = sigUtil.recoverPersonalSignature({
data: message,
sig: signature,
})
if (addressSignedWith.toLowerCase() !== withAccount.toLowerCase()) {
throw new Error(
`Signature is for ${addressSignedWith} but expected ${withAccount} - is the correct Trezor device attached?`
)
}
return signature
2018-06-11 01:02:54 +02:00
2018-06-10 09:52:32 +02:00
} finally {
await this.lock.release()
} */
}
async signTypedData (withAccount, typedData) {
throw new Error('Not supported on this device')
}
async exportAccount (address) {
throw new Error('Not supported on this device')
}
async _findAddressId (addr) {
const result = this.accounts.indexOf(addr)
if (result === -1) throw new Error('Unknown address')
else return result
}
async _addressFromId (i) {
/* Must be called with lock acquired
const eth = await this._getEth()
return (await eth.getAddress(this._derivePath(i))).address*/
const result = this.accounts[i]
if (!result) throw new Error('Unknown address')
else return result
}
async _checkCorrectTrezorAttached () {
return true
/* Must be called with lock acquired
if (this.accounts.length > 0) {
const expectedFirstAccount = this.accounts[0]
let actualFirstAccount = await this._addressFromId(0)
if (expectedFirstAccount !== actualFirstAccount) {
throw new Error(
`Incorrect Trezor device attached - expected device containg account ${expectedFirstAccount}, but found ${actualFirstAccount}`
)
}
}*/
}
_derivePath (i) {
return this.hdPath + '/' + i
}
_personalToRawSig (TrezorSig) {
var v = TrezorSig['v'] - 27
v = v.toString(16)
if (v.length < 2) {
v = '0' + v
}
return '0x' + TrezorSig['r'] + TrezorSig['s'] + v
}
}
TrezorKeyring.type = keyringType
2018-06-11 00:48:42 +02:00
module.exports = TrezorKeyring