407 lines
11 KiB
Go
407 lines
11 KiB
Go
package cli
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/spf13/cobra"
|
|
"github.com/spf13/viper"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
|
"github.com/cosmos/cosmos-sdk/client/tx"
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
|
kmultisig "github.com/cosmos/cosmos-sdk/crypto/keys/multisig"
|
|
"github.com/cosmos/cosmos-sdk/crypto/types/multisig"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
"github.com/cosmos/cosmos-sdk/types/errors"
|
|
signingtypes "github.com/cosmos/cosmos-sdk/types/tx/signing"
|
|
"github.com/cosmos/cosmos-sdk/version"
|
|
authclient "github.com/cosmos/cosmos-sdk/x/auth/client"
|
|
"github.com/cosmos/cosmos-sdk/x/auth/client/rest"
|
|
"github.com/cosmos/cosmos-sdk/x/auth/signing"
|
|
)
|
|
|
|
// GetSignCommand returns the sign command
|
|
func GetMultiSignCommand() *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "multisign [file] [name] [[signature]...]",
|
|
Short: "Generate multisig signatures for transactions generated offline",
|
|
Long: strings.TrimSpace(
|
|
fmt.Sprintf(`Sign transactions created with the --generate-only flag that require multisig signatures.
|
|
|
|
Read one or more signatures from one or more [signature] file, generate a multisig signature compliant to the
|
|
multisig key [name], and attach the key name to the transaction read from [file].
|
|
|
|
Example:
|
|
$ %s tx multisign transaction.json k1k2k3 k1sig.json k2sig.json k3sig.json
|
|
|
|
If --signature-only flag is on, output a JSON representation
|
|
of only the generated signature.
|
|
|
|
If the --offline flag is on, the client will not reach out to an external node.
|
|
Account number or sequence number lookups are not performed so you must
|
|
set these parameters manually.
|
|
|
|
The current multisig implementation defaults to amino-json sign mode.
|
|
The SIGN_MODE_DIRECT sign mode is not supported.'
|
|
`,
|
|
version.AppName,
|
|
),
|
|
),
|
|
RunE: makeMultiSignCmd(),
|
|
Args: cobra.MinimumNArgs(3),
|
|
}
|
|
|
|
cmd.Flags().Bool(flagSigOnly, false, "Print only the generated signature, then exit")
|
|
cmd.Flags().String(flags.FlagOutputDocument, "", "The document is written to the given file instead of STDOUT")
|
|
cmd.Flags().Bool(flagAmino, false, "Generate Amino-encoded JSON suitable for submitting to the txs REST endpoint")
|
|
flags.AddTxFlagsToCmd(cmd)
|
|
cmd.Flags().String(flags.FlagChainID, "", "network chain ID")
|
|
|
|
return cmd
|
|
}
|
|
|
|
func makeMultiSignCmd() func(cmd *cobra.Command, args []string) (err error) {
|
|
return func(cmd *cobra.Command, args []string) (err error) {
|
|
clientCtx, err := client.GetClientTxContext(cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
parsedTx, err := authclient.ReadTxFromFile(clientCtx, args[0])
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
txFactory := tx.NewFactoryCLI(clientCtx, cmd.Flags())
|
|
if txFactory.SignMode() == signingtypes.SignMode_SIGN_MODE_UNSPECIFIED {
|
|
txFactory = txFactory.WithSignMode(signingtypes.SignMode_SIGN_MODE_LEGACY_AMINO_JSON) //nolint:staticcheck
|
|
}
|
|
|
|
txCfg := clientCtx.TxConfig
|
|
txBuilder, err := txCfg.WrapTxBuilder(parsedTx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
multisigInfo, err := getMultisigInfo(clientCtx, args[1])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
multisigPub := multisigInfo.GetPubKey().(*kmultisig.LegacyAminoPubKey)
|
|
multisigSig := multisig.NewMultisig(len(multisigPub.PubKeys))
|
|
if !clientCtx.Offline {
|
|
accnum, seq, err := clientCtx.AccountRetriever.GetAccountNumberSequence(clientCtx, multisigInfo.GetAddress())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
txFactory = txFactory.WithAccountNumber(accnum).WithSequence(seq)
|
|
}
|
|
|
|
// read each signature and add it to the multisig if valid
|
|
for i := 2; i < len(args); i++ {
|
|
sigs, err := unmarshalSignatureJSON(clientCtx, args[i])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
signingData := signing.SignerData{
|
|
ChainID: txFactory.ChainID(),
|
|
AccountNumber: txFactory.AccountNumber(),
|
|
Sequence: txFactory.Sequence(),
|
|
}
|
|
|
|
for _, sig := range sigs {
|
|
err = signing.VerifySignature(sig.PubKey, signingData, sig.Data, txCfg.SignModeHandler(), txBuilder.GetTx())
|
|
if err != nil {
|
|
addr, _ := sdk.AccAddressFromHex(sig.PubKey.Address().String())
|
|
return fmt.Errorf("couldn't verify signature for address %s", addr)
|
|
}
|
|
|
|
if err := multisig.AddSignatureV2(multisigSig, sig, multisigPub.GetPubKeys()); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
sigV2 := signingtypes.SignatureV2{
|
|
PubKey: multisigPub,
|
|
Data: multisigSig,
|
|
Sequence: txFactory.Sequence(),
|
|
}
|
|
|
|
err = txBuilder.SetSignatures(sigV2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
sigOnly, _ := cmd.Flags().GetBool(flagSigOnly)
|
|
|
|
aminoJSON, _ := cmd.Flags().GetBool(flagAmino)
|
|
|
|
var json []byte
|
|
|
|
if aminoJSON {
|
|
stdTx, err := tx.ConvertTxToStdTx(clientCtx.LegacyAmino, txBuilder.GetTx())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
req := rest.BroadcastReq{
|
|
Tx: stdTx,
|
|
Mode: "block|sync|async",
|
|
}
|
|
|
|
json, _ = clientCtx.LegacyAmino.MarshalJSON(req)
|
|
|
|
} else {
|
|
json, err = marshalSignatureJSON(txCfg, txBuilder, sigOnly)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
outputDoc, _ := cmd.Flags().GetString(flags.FlagOutputDocument)
|
|
if outputDoc == "" {
|
|
cmd.Printf("%s\n", json)
|
|
return
|
|
}
|
|
|
|
fp, err := os.OpenFile(outputDoc, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0644)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defer func() {
|
|
err2 := fp.Close()
|
|
if err == nil {
|
|
err = err2
|
|
}
|
|
}()
|
|
|
|
err = clientCtx.PrintBytes(json)
|
|
|
|
return
|
|
}
|
|
}
|
|
|
|
func GetMultiSignBatchCmd() *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "multisign-batch [file] [name] [[signature-file]...]",
|
|
Short: "Assemble multisig transactions in batch from batch signatures",
|
|
Long: strings.TrimSpace(
|
|
fmt.Sprintf(`Assemble a batch of multisig transactions generated by batch sign command.
|
|
|
|
Read one or more signatures from one or more [signature] file, generate a multisig signature compliant to the
|
|
multisig key [name], and attach the key name to the transaction read from [file].
|
|
|
|
Example:
|
|
$ %s tx multisign-batch transactions.json multisigk1k2k3 k1sigs.json k2sigs.json k3sig.json
|
|
|
|
The current multisig implementation defaults to amino-json sign mode.
|
|
The SIGN_MODE_DIRECT sign mode is not supported.'
|
|
`, version.AppName,
|
|
),
|
|
),
|
|
PreRun: preSignCmd,
|
|
RunE: makeBatchMultisignCmd(),
|
|
Args: cobra.MinimumNArgs(3),
|
|
}
|
|
|
|
cmd.Flags().Bool(flagNoAutoIncrement, false, "disable sequence auto increment")
|
|
cmd.Flags().String(
|
|
flagMultisig, "",
|
|
"Address of the multisig account that the transaction signs on behalf of",
|
|
)
|
|
cmd.Flags().String(flags.FlagOutputDocument, "", "The document is written to the given file instead of STDOUT")
|
|
flags.AddTxFlagsToCmd(cmd)
|
|
|
|
return cmd
|
|
}
|
|
|
|
func makeBatchMultisignCmd() func(cmd *cobra.Command, args []string) error {
|
|
return func(cmd *cobra.Command, args []string) (err error) {
|
|
var clientCtx client.Context
|
|
|
|
clientCtx, err = client.GetClientTxContext(cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
txCfg := clientCtx.TxConfig
|
|
txFactory := tx.NewFactoryCLI(clientCtx, cmd.Flags())
|
|
if txFactory.SignMode() == signingtypes.SignMode_SIGN_MODE_UNSPECIFIED {
|
|
txFactory = txFactory.WithSignMode(signingtypes.SignMode_SIGN_MODE_LEGACY_AMINO_JSON) //nolint:staticcheck
|
|
}
|
|
|
|
var infile = os.Stdin
|
|
if args[0] != "-" {
|
|
infile, err = os.Open(args[0])
|
|
defer func() {
|
|
err2 := infile.Close()
|
|
if err == nil {
|
|
err = err2
|
|
}
|
|
}()
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("couldn't open %s: %w", args[0], err)
|
|
}
|
|
}
|
|
scanner := authclient.NewBatchScanner(txCfg, infile)
|
|
|
|
multisigInfo, err := getMultisigInfo(clientCtx, args[1])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var signatureBatch [][]signingtypes.SignatureV2
|
|
for i := 2; i < len(args); i++ {
|
|
sigs, err := readSignaturesFromFile(clientCtx, args[i])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
signatureBatch = append(signatureBatch, sigs)
|
|
}
|
|
|
|
if !clientCtx.Offline {
|
|
accnum, seq, err := clientCtx.AccountRetriever.GetAccountNumberSequence(clientCtx, multisigInfo.GetAddress())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
txFactory = txFactory.WithAccountNumber(accnum).WithSequence(seq)
|
|
}
|
|
|
|
// prepare output document
|
|
closeFunc, err := setOutputFile(cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defer closeFunc()
|
|
clientCtx.WithOutput(cmd.OutOrStdout())
|
|
|
|
for i := 0; scanner.Scan(); i++ {
|
|
txBldr, err := txCfg.WrapTxBuilder(scanner.Tx())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
multisigPub := multisigInfo.GetPubKey().(*kmultisig.LegacyAminoPubKey)
|
|
multisigSig := multisig.NewMultisig(len(multisigPub.PubKeys))
|
|
signingData := signing.SignerData{
|
|
ChainID: txFactory.ChainID(),
|
|
AccountNumber: txFactory.AccountNumber(),
|
|
Sequence: txFactory.Sequence(),
|
|
}
|
|
|
|
for _, sig := range signatureBatch {
|
|
err = signing.VerifySignature(sig[i].PubKey, signingData, sig[i].Data, txCfg.SignModeHandler(), txBldr.GetTx())
|
|
if err != nil {
|
|
return fmt.Errorf("couldn't verify signature: %w %v", err, sig)
|
|
}
|
|
|
|
if err := multisig.AddSignatureV2(multisigSig, sig[i], multisigPub.GetPubKeys()); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
sigV2 := signingtypes.SignatureV2{
|
|
PubKey: multisigPub,
|
|
Data: multisigSig,
|
|
Sequence: txFactory.Sequence(),
|
|
}
|
|
|
|
err = txBldr.SetSignatures(sigV2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
sigOnly, _ := cmd.Flags().GetBool(flagSigOnly)
|
|
aminoJSON, _ := cmd.Flags().GetBool(flagAmino)
|
|
|
|
var json []byte
|
|
|
|
if aminoJSON {
|
|
stdTx, err := tx.ConvertTxToStdTx(clientCtx.LegacyAmino, txBldr.GetTx())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
req := rest.BroadcastReq{
|
|
Tx: stdTx,
|
|
Mode: "block|sync|async",
|
|
}
|
|
|
|
json, _ = clientCtx.LegacyAmino.MarshalJSON(req)
|
|
|
|
} else {
|
|
json, err = marshalSignatureJSON(txCfg, txBldr, sigOnly)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
err = clientCtx.PrintString(fmt.Sprintf("%s\n", json))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if viper.GetBool(flagNoAutoIncrement) {
|
|
continue
|
|
}
|
|
sequence := txFactory.Sequence() + 1
|
|
txFactory = txFactory.WithSequence(sequence)
|
|
}
|
|
|
|
return scanner.UnmarshalErr()
|
|
}
|
|
}
|
|
|
|
func unmarshalSignatureJSON(clientCtx client.Context, filename string) (sigs []signingtypes.SignatureV2, err error) {
|
|
var bytes []byte
|
|
if bytes, err = ioutil.ReadFile(filename); err != nil {
|
|
return
|
|
}
|
|
return clientCtx.TxConfig.UnmarshalSignatureJSON(bytes)
|
|
}
|
|
|
|
func readSignaturesFromFile(ctx client.Context, filename string) (sigs []signingtypes.SignatureV2, err error) {
|
|
bz, err := ioutil.ReadFile(filename)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
newString := strings.TrimSuffix(string(bz), "\n")
|
|
lines := strings.Split(newString, "\n")
|
|
|
|
for _, bz := range lines {
|
|
sig, err := ctx.TxConfig.UnmarshalSignatureJSON([]byte(bz))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
sigs = append(sigs, sig...)
|
|
}
|
|
return sigs, nil
|
|
}
|
|
|
|
func getMultisigInfo(clientCtx client.Context, name string) (keyring.Info, error) {
|
|
kb := clientCtx.Keyring
|
|
multisigInfo, err := kb.Key(name)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "error getting keybase multisig account")
|
|
}
|
|
if multisigInfo.GetType() != keyring.TypeMulti {
|
|
return nil, fmt.Errorf("%q must be of type %s: %s", name, keyring.TypeMulti, multisigInfo.GetType())
|
|
}
|
|
|
|
return multisigInfo, nil
|
|
}
|