main.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327
  1. package main
  2. import (
  3. "encoding/hex"
  4. "errors"
  5. "fmt"
  6. "github.com/ethereum/go-ethereum/common"
  7. "github.com/ethereum/go-ethereum/console/prompt"
  8. tronaddr "github.com/fbsobreira/gotron-sdk/pkg/address"
  9. logging "github.com/ipfs/go-log/v2"
  10. "github.com/urfave/cli/v2"
  11. "google.golang.org/grpc"
  12. "gorm.io/gorm"
  13. "io/ioutil"
  14. "key-manager/conf"
  15. "key-manager/crypto"
  16. "key-manager/dao"
  17. "key-manager/service"
  18. "net"
  19. "os"
  20. "strings"
  21. )
  22. var log = logging.Logger("main")
  23. func main() {
  24. _ = logging.SetLogLevel("*", "INFO")
  25. app := cli.App{
  26. Name: "key-manager",
  27. Usage: "eth and tron key manager service",
  28. Commands: []*cli.Command{
  29. initCmd,
  30. runCmd,
  31. whitelistCmd,
  32. },
  33. EnableBashCompletion: true,
  34. }
  35. if err := app.Run(os.Args); err != nil {
  36. fmt.Fprintf(os.Stderr, "ERROR: %s\n\n", err)
  37. os.Exit(1)
  38. }
  39. }
  40. var initCmd = &cli.Command{
  41. Name: "init",
  42. Usage: "init key-manager service",
  43. Flags: []cli.Flag{
  44. &cli.StringFlag{
  45. Name: "config",
  46. Usage: "config file path",
  47. },
  48. },
  49. Action: func(cctx *cli.Context) error {
  50. err := conf.InitConfig(cctx.String("config"))
  51. if err != nil {
  52. return err
  53. }
  54. db, err := dao.InitMysqlDB()
  55. if err != nil {
  56. return err
  57. }
  58. _, err = db.GetPassword()
  59. if err == nil {
  60. return errors.New("password already set")
  61. }
  62. if !errors.Is(err, gorm.ErrRecordNotFound) {
  63. return err
  64. }
  65. log.Info("Please set a password for the encrypted mnemonic")
  66. password, err := stdinPassword(true)
  67. if err != nil {
  68. return err
  69. }
  70. scrypt := crypto.Scrypt(password)
  71. scryptKey := hex.EncodeToString(scrypt)
  72. err = db.CreatePassword(&dao.Password{
  73. Password: scryptKey,
  74. })
  75. if err != nil {
  76. return err
  77. }
  78. return nil
  79. },
  80. }
  81. var runCmd = &cli.Command{
  82. Name: "run",
  83. Usage: "run key-manager process",
  84. Flags: []cli.Flag{
  85. &cli.StringFlag{
  86. Name: "listen",
  87. Usage: "The host address and port on which the key manager will listen",
  88. Value: "127.0.0.1:5556",
  89. },
  90. &cli.StringFlag{
  91. Name: "config",
  92. Usage: "config file path",
  93. },
  94. &cli.StringFlag{
  95. Name: "password",
  96. Usage: "password file path",
  97. },
  98. },
  99. Action: func(cctx *cli.Context) error {
  100. err := conf.InitConfig(cctx.String("config"))
  101. if err != nil {
  102. return err
  103. }
  104. db, err := dao.InitMysqlDB()
  105. if err != nil {
  106. return err
  107. }
  108. scrypt, err := db.GetPassword()
  109. if errors.Is(err, gorm.ErrRecordNotFound) {
  110. return errors.New("please set a password first. run: key-manager init")
  111. } else if err != nil {
  112. return err
  113. }
  114. scryptKey, err := hex.DecodeString(scrypt)
  115. if err != nil {
  116. return err
  117. }
  118. var password string
  119. if cctx.IsSet("password") {
  120. p := cctx.String("password")
  121. data, err := ioutil.ReadFile(p)
  122. if err != nil {
  123. return err
  124. }
  125. password = strings.TrimSpace(string(data))
  126. } else {
  127. var err error
  128. password, err = stdinPassword(false)
  129. if err != nil {
  130. return err
  131. }
  132. }
  133. ok, err := crypto.VerifyScrypt(password, scryptKey)
  134. if err != nil {
  135. return err
  136. }
  137. if !ok {
  138. return errors.New("password verification failed")
  139. }
  140. listen := cctx.String("listen")
  141. listener, err := net.Listen("tcp", listen)
  142. if err != nil {
  143. return err
  144. }
  145. log.Infof("grpc server Listing on: %s", listen)
  146. grpcServer := grpc.NewServer()
  147. server, err := service.NewKeyManager(db, password)
  148. if err != nil {
  149. return err
  150. }
  151. service.RegisterKeyManagerServer(grpcServer, server)
  152. if err = grpcServer.Serve(listener); err != nil {
  153. log.Error(err)
  154. return err
  155. }
  156. return nil
  157. },
  158. }
  159. var whitelistCmd = &cli.Command{
  160. Name: "whitelist",
  161. Usage: "whitelist tools",
  162. Subcommands: []*cli.Command{
  163. listCmd,
  164. addCmd,
  165. deleteCmd,
  166. },
  167. }
  168. var addCmd = &cli.Command{
  169. Name: "add",
  170. Usage: "add whitelist address",
  171. ArgsUsage: "[name] [address]",
  172. Flags: []cli.Flag{
  173. &cli.StringFlag{
  174. Name: "config",
  175. Usage: "config file path",
  176. },
  177. },
  178. Action: func(cctx *cli.Context) error {
  179. err := conf.InitConfig(cctx.String("config"))
  180. if err != nil {
  181. return err
  182. }
  183. db, err := dao.InitMysqlDB()
  184. if err != nil {
  185. return err
  186. }
  187. if cctx.NArg() != 2 {
  188. return errors.New("params need [name] [address]")
  189. }
  190. name := cctx.Args().Get(0)
  191. address := cctx.Args().Get(1)
  192. if address[:2] == "0x" {
  193. address = common.HexToAddress(address).String()
  194. } else {
  195. addr, err := tronaddr.Base58ToAddress(address)
  196. if err != nil {
  197. return err
  198. }
  199. address = addr.String()
  200. }
  201. err = db.CreateWhitelist(&dao.Whitelist{
  202. Name: name,
  203. WhiteAddress: address,
  204. })
  205. if err != nil {
  206. return err
  207. }
  208. fmt.Printf("add whitelist address success, name: %s, addr: %s \n", name, address)
  209. return nil
  210. },
  211. }
  212. var deleteCmd = &cli.Command{
  213. Name: "delete",
  214. Usage: "delete whitelist address",
  215. ArgsUsage: "[name]",
  216. Flags: []cli.Flag{
  217. &cli.StringFlag{
  218. Name: "config",
  219. Usage: "config file path",
  220. },
  221. },
  222. Action: func(cctx *cli.Context) error {
  223. err := conf.InitConfig(cctx.String("config"))
  224. if err != nil {
  225. return err
  226. }
  227. db, err := dao.InitMysqlDB()
  228. if err != nil {
  229. return err
  230. }
  231. if cctx.NArg() != 1 {
  232. return errors.New("params need [name]")
  233. }
  234. name := cctx.Args().Get(0)
  235. err = db.DeleteWhitelist(name)
  236. if err != nil {
  237. return err
  238. }
  239. fmt.Printf("delete whitelist address success, name: %s \n", name)
  240. return nil
  241. },
  242. }
  243. var listCmd = &cli.Command{
  244. Name: "list",
  245. Usage: "list whitelist address",
  246. Flags: []cli.Flag{
  247. &cli.StringFlag{
  248. Name: "config",
  249. Usage: "config file path",
  250. },
  251. },
  252. Action: func(cctx *cli.Context) error {
  253. err := conf.InitConfig(cctx.String("config"))
  254. if err != nil {
  255. return err
  256. }
  257. db, err := dao.InitMysqlDB()
  258. if err != nil {
  259. return err
  260. }
  261. list, err := db.GetAllWhitelists()
  262. if err != nil {
  263. return err
  264. }
  265. for _, l := range list {
  266. fmt.Printf("whitelist address, name: %s, addr: %s \n", l.Name, l.WhiteAddress)
  267. }
  268. return nil
  269. },
  270. }
  271. func stdinPassword(isConfirm bool) (string, error) {
  272. password, err := prompt.Stdin.PromptPassword("Password: ")
  273. if err != nil {
  274. return "", err
  275. }
  276. if isConfirm {
  277. confirm, err := prompt.Stdin.PromptPassword("Confirm Password: ")
  278. if err != nil {
  279. return "", fmt.Errorf("failed to read password confirmation: %v", err)
  280. }
  281. if password != confirm {
  282. return "", errors.New("passwords do not match")
  283. }
  284. }
  285. return password, nil
  286. }