Merge PR #3748: Multisig Display UX Improvements

This commit is contained in:
Alexander Bezobchuk 2019-03-01 16:29:33 -05:00 committed by Jack Zampolin
parent c2aecb8b0e
commit 47a44fb580
20 changed files with 387 additions and 187 deletions

View File

@ -58,8 +58,14 @@ decoded automatically.
* [\#3653] Prompt user confirmation prior to signing and broadcasting a transaction. * [\#3653] Prompt user confirmation prior to signing and broadcasting a transaction.
* [\#3670] CLI support for showing bech32 addresses in Ledger devices * [\#3670] CLI support for showing bech32 addresses in Ledger devices
* [\#3711] Update `tx sign` to use `--from` instead of the deprecated `--name` CLI flag. * [\#3711] Update `tx sign` to use `--from` instead of the deprecated `--name`
* [\#3730](https://github.com/cosmos/cosmos-sdk/issues/3730) Improve workflow for `gaiad gentx` with offline public keys, by outputting stdtx file that needs to be signed. CLI flag.
* [\#3738] Improve multisig UX:
* `gaiacli keys show -o json` now includes constituent pubkeys, respective weights and threshold
* `gaiacli keys show --show-multisig` now displays constituent pubkeys, respective weights and threshold
* `gaiacli tx sign --validate-signatures` now displays multisig signers with their respective weights
* [\#3730](https://github.com/cosmos/cosmos-sdk/issues/3730) Improve workflow for
`gaiad gentx` with offline public keys, by outputting stdtx file that needs to be signed.
* [\#3761](https://github.com/cosmos/cosmos-sdk/issues/3761) Querying account related information using custom querier in auth module * [\#3761](https://github.com/cosmos/cosmos-sdk/issues/3761) Querying account related information using custom querier in auth module
### Gaia ### Gaia

View File

@ -142,7 +142,7 @@ func runAddCmd(_ *cobra.Command, args []string) error {
} }
pk := multisig.NewPubKeyMultisigThreshold(multisigThreshold, pks) pk := multisig.NewPubKeyMultisigThreshold(multisigThreshold, pks)
if _, err := kb.CreateOffline(name, pk); err != nil { if _, err := kb.CreateMulti(name, pk); err != nil {
return err return err
} }
@ -263,7 +263,7 @@ func printCreate(info keys.Info, showMnemonic bool, mnemonic string) error {
switch output { switch output {
case OutputFormatText: case OutputFormatText:
fmt.Fprintln(os.Stderr) fmt.Fprintln(os.Stderr)
printKeyInfo(info, Bech32KeyOutput) printKeyInfo(info, keys.Bech32KeyOutput)
// print mnemonic unless requested not to. // print mnemonic unless requested not to.
if showMnemonic { if showMnemonic {
@ -273,7 +273,7 @@ func printCreate(info keys.Info, showMnemonic bool, mnemonic string) error {
fmt.Fprintln(os.Stderr, mnemonic) fmt.Fprintln(os.Stderr, mnemonic)
} }
case OutputFormatJSON: case OutputFormatJSON:
out, err := Bech32KeyOutput(info) out, err := keys.Bech32KeyOutput(info)
if err != nil { if err != nil {
return err return err
} }

View File

@ -6,35 +6,37 @@ import (
"testing" "testing"
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
"github.com/cosmos/cosmos-sdk/crypto/keys"
) )
type testCases struct { type testCases struct {
Keys []KeyOutput Keys []keys.KeyOutput
Answers []KeyOutput Answers []keys.KeyOutput
JSON [][]byte JSON [][]byte
} }
func getTestCases() testCases { func getTestCases() testCases {
return testCases{ return testCases{
[]KeyOutput{ []keys.KeyOutput{
{"A", "B", "C", "D", "E"}, {"A", "B", "C", "D", "E", 0, nil},
{"A", "B", "C", "D", ""}, {"A", "B", "C", "D", "", 0, nil},
{"", "B", "C", "D", ""}, {"", "B", "C", "D", "", 0, nil},
{"", "", "", "", ""}, {"", "", "", "", "", 0, nil},
}, },
make([]KeyOutput, 4), make([]keys.KeyOutput, 4),
[][]byte{ [][]byte{
[]byte(`{"name":"A","type":"B","address":"C","pub_key":"D","mnemonic":"E"}`), []byte(`{"name":"A","type":"B","address":"C","pubkey":"D","mnemonic":"E"}`),
[]byte(`{"name":"A","type":"B","address":"C","pub_key":"D"}`), []byte(`{"name":"A","type":"B","address":"C","pubkey":"D"}`),
[]byte(`{"name":"","type":"B","address":"C","pub_key":"D"}`), []byte(`{"name":"","type":"B","address":"C","pubkey":"D"}`),
[]byte(`{"name":"","type":"","address":"","pub_key":""}`), []byte(`{"name":"","type":"","address":"","pubkey":""}`),
}, },
} }
} }
func TestMarshalJSON(t *testing.T) { func TestMarshalJSON(t *testing.T) {
type args struct { type args struct {
o KeyOutput o keys.KeyOutput
} }
data := getTestCases() data := getTestCases()

View File

@ -6,7 +6,6 @@ import (
"github.com/cosmos/cosmos-sdk/crypto" "github.com/cosmos/cosmos-sdk/crypto"
"github.com/cosmos/cosmos-sdk/crypto/keys" "github.com/cosmos/cosmos-sdk/crypto/keys"
"github.com/cosmos/cosmos-sdk/crypto/keys/hd"
sdk "github.com/cosmos/cosmos-sdk/types" sdk "github.com/cosmos/cosmos-sdk/types"
"github.com/spf13/cobra" "github.com/spf13/cobra"
@ -27,39 +26,29 @@ const (
// FlagBechPrefix defines a desired Bech32 prefix encoding for a key. // FlagBechPrefix defines a desired Bech32 prefix encoding for a key.
FlagDevice = "device" FlagDevice = "device"
flagMultiSigThreshold = "multisig-threshold" flagMultiSigThreshold = "multisig-threshold"
flagShowMultiSig = "show-multisig"
defaultMultiSigKeyName = "multi" defaultMultiSigKeyName = "multi"
) )
var _ keys.Info = (*multiSigKey)(nil)
type multiSigKey struct {
name string
key tmcrypto.PubKey
}
func (m multiSigKey) GetName() string { return m.name }
func (m multiSigKey) GetType() keys.KeyType { return keys.TypeLocal }
func (m multiSigKey) GetPubKey() tmcrypto.PubKey { return m.key }
func (m multiSigKey) GetAddress() sdk.AccAddress { return sdk.AccAddress(m.key.Address()) }
func (m multiSigKey) GetPath() (*hd.BIP44Params, error) {
return nil, fmt.Errorf("BIP44 Paths are not available for this type")
}
func showKeysCmd() *cobra.Command { func showKeysCmd() *cobra.Command {
cmd := &cobra.Command{ cmd := &cobra.Command{
Use: "show [name]", Use: "show [name [name...]]",
Short: "Show key info for the given name", Short: "Show key info for the given name",
Long: `Return public details of one local key.`, Long: `Return public details of a single local key. If multiple names are
Args: cobra.MinimumNArgs(1), provided, then an ephemeral multisig key will be created under the name "multi"
RunE: runShowCmd, consisting of all the keys provided by name and multisig threshold.`,
Args: cobra.MinimumNArgs(1),
RunE: runShowCmd,
} }
cmd.Flags().String(FlagBechPrefix, sdk.PrefixAccount, "The Bech32 prefix encoding for a key (acc|val|cons)") cmd.Flags().String(FlagBechPrefix, sdk.PrefixAccount, "The Bech32 prefix encoding for a key (acc|val|cons)")
cmd.Flags().BoolP(FlagAddress, "a", false, "output the address only (overrides --output)") cmd.Flags().BoolP(FlagAddress, "a", false, "Output the address only (overrides --output)")
cmd.Flags().BoolP(FlagPublicKey, "p", false, "output the public key only (overrides --output)") cmd.Flags().BoolP(FlagPublicKey, "p", false, "Output the public key only (overrides --output)")
cmd.Flags().BoolP(FlagDevice, "d", false, "output the address in the device") cmd.Flags().BoolP(FlagDevice, "d", false, "Output the address in the device")
cmd.Flags().Uint(flagMultiSigThreshold, 1, "K out of N required signatures") cmd.Flags().Uint(flagMultiSigThreshold, 1, "K out of N required signatures")
cmd.Flags().BoolP(flagShowMultiSig, "m", false, "Output multisig pubkey constituents, threshold, and weights")
return cmd return cmd
} }
@ -79,6 +68,7 @@ func runShowCmd(cmd *cobra.Command, args []string) (err error) {
if err != nil { if err != nil {
return err return err
} }
pks[i] = info.GetPubKey() pks[i] = info.GetPubKey()
} }
@ -87,16 +77,15 @@ func runShowCmd(cmd *cobra.Command, args []string) (err error) {
if err != nil { if err != nil {
return err return err
} }
multikey := multisig.NewPubKeyMultisigThreshold(multisigThreshold, pks) multikey := multisig.NewPubKeyMultisigThreshold(multisigThreshold, pks)
info = multiSigKey{ info = keys.NewMultiInfo(defaultMultiSigKeyName, multikey)
name: defaultMultiSigKeyName,
key: multikey,
}
} }
isShowAddr := viper.GetBool(FlagAddress) isShowAddr := viper.GetBool(FlagAddress)
isShowPubKey := viper.GetBool(FlagPublicKey) isShowPubKey := viper.GetBool(FlagPublicKey)
isShowDevice := viper.GetBool(FlagDevice) isShowDevice := viper.GetBool(FlagDevice)
isShowMultiSig := viper.GetBool(flagShowMultiSig)
isOutputSet := false isOutputSet := false
tmp := cmd.Flag(cli.OutputFlag) tmp := cmd.Flag(cli.OutputFlag)
@ -122,6 +111,8 @@ func runShowCmd(cmd *cobra.Command, args []string) (err error) {
printKeyAddress(info, bechKeyOut) printKeyAddress(info, bechKeyOut)
case isShowPubKey: case isShowPubKey:
printPubKey(info, bechKeyOut) printPubKey(info, bechKeyOut)
case isShowMultiSig:
printMultiSigKeyInfo(info, bechKeyOut)
default: default:
printKeyInfo(info, bechKeyOut) printKeyInfo(info, bechKeyOut)
} }
@ -163,11 +154,11 @@ func validateMultisigThreshold(k, nKeys int) error {
func getBechKeyOut(bechPrefix string) (bechKeyOutFn, error) { func getBechKeyOut(bechPrefix string) (bechKeyOutFn, error) {
switch bechPrefix { switch bechPrefix {
case sdk.PrefixAccount: case sdk.PrefixAccount:
return Bech32KeyOutput, nil return keys.Bech32KeyOutput, nil
case sdk.PrefixValidator: case sdk.PrefixValidator:
return Bech32ValKeyOutput, nil return keys.Bech32ValKeyOutput, nil
case sdk.PrefixConsensus: case sdk.PrefixConsensus:
return Bech32ConsKeyOutput, nil return keys.Bech32ConsKeyOutput, nil
} }
return nil, fmt.Errorf("invalid Bech32 prefix encoding provided: %s", bechPrefix) return nil, fmt.Errorf("invalid Bech32 prefix encoding provided: %s", bechPrefix)

View File

@ -10,22 +10,21 @@ import (
"github.com/spf13/viper" "github.com/spf13/viper"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"github.com/tendermint/tendermint/crypto"
"github.com/tendermint/tendermint/crypto/multisig"
"github.com/tendermint/tendermint/crypto/secp256k1" "github.com/tendermint/tendermint/crypto/secp256k1"
"github.com/tendermint/tendermint/libs/cli" "github.com/tendermint/tendermint/libs/cli"
) )
func Test_multiSigKey_Properties(t *testing.T) { func Test_multiSigKey_Properties(t *testing.T) {
tmpKey1 := secp256k1.GenPrivKeySecp256k1([]byte("mySecret")) tmpKey1 := secp256k1.GenPrivKeySecp256k1([]byte("mySecret"))
pk := multisig.NewPubKeyMultisigThreshold(1, []crypto.PubKey{tmpKey1.PubKey()})
tmp := multiSigKey{ tmp := keys.NewMultiInfo("myMultisig", pk)
name: "myMultisig",
key: tmpKey1.PubKey(),
}
assert.Equal(t, "myMultisig", tmp.GetName()) assert.Equal(t, "myMultisig", tmp.GetName())
assert.Equal(t, keys.TypeLocal, tmp.GetType()) assert.Equal(t, keys.TypeMulti, tmp.GetType())
assert.Equal(t, "015ABFFB09DB738A45745A91E8C401423ECE4016", tmp.GetPubKey().Address().String()) assert.Equal(t, "79BF2B5B418A85329EC2149D1854D443F56F5A9F", tmp.GetPubKey().Address().String())
assert.Equal(t, "cosmos1q9dtl7cfmdec53t5t2g733qpgglvusqk6xdntl", tmp.GetAddress().String()) assert.Equal(t, "cosmos10xljkk6p32zn98kzzjw3s4x5g06k7k5lz6flcv", tmp.GetAddress().String())
} }
func Test_showKeysCmd(t *testing.T) { func Test_showKeysCmd(t *testing.T) {
@ -134,9 +133,9 @@ func Test_getBechKeyOut(t *testing.T) {
}{ }{
{"empty", args{""}, nil, true}, {"empty", args{""}, nil, true},
{"wrong", args{"???"}, nil, true}, {"wrong", args{"???"}, nil, true},
{"acc", args{sdk.PrefixAccount}, Bech32KeyOutput, false}, {"acc", args{sdk.PrefixAccount}, keys.Bech32KeyOutput, false},
{"val", args{sdk.PrefixValidator}, Bech32ValKeyOutput, false}, {"val", args{sdk.PrefixValidator}, keys.Bech32ValKeyOutput, false},
{"cons", args{sdk.PrefixConsensus}, Bech32ConsKeyOutput, false}, {"cons", args{sdk.PrefixConsensus}, keys.Bech32ConsKeyOutput, false},
} }
for _, tt := range tests { for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) { t.Run(tt.name, func(t *testing.T) {

View File

@ -1,13 +1,6 @@
package keys package keys
// used for outputting keys.Info over REST // used for outputting keys.Info over REST
type KeyOutput struct {
Name string `json:"name"`
Type string `json:"type"`
Address string `json:"address"`
PubKey string `json:"pub_key"`
Mnemonic string `json:"mnemonic,omitempty"`
}
// AddNewKey request a new key // AddNewKey request a new key
type AddNewKey struct { type AddNewKey struct {

View File

@ -9,7 +9,6 @@ import (
"github.com/cosmos/cosmos-sdk/client" "github.com/cosmos/cosmos-sdk/client"
"github.com/cosmos/cosmos-sdk/crypto/keys" "github.com/cosmos/cosmos-sdk/crypto/keys"
sdk "github.com/cosmos/cosmos-sdk/types"
) )
// available output formats. // available output formats.
@ -21,7 +20,7 @@ const (
defaultKeyDBName = "keys" defaultKeyDBName = "keys"
) )
type bechKeyOutFn func(keyInfo keys.Info) (KeyOutput, error) type bechKeyOutFn func(keyInfo keys.Info) (keys.KeyOutput, error)
// GetKeyInfo returns key info for a given name. An error is returned if the // GetKeyInfo returns key info for a given name. An error is returned if the
// keybase cannot be retrieved or getting the info fails. // keybase cannot be retrieved or getting the info fails.
@ -90,68 +89,22 @@ func getLazyKeyBaseFromDir(rootDir string) (keys.Keybase, error) {
return keys.New(defaultKeyDBName, filepath.Join(rootDir, "keys")), nil return keys.New(defaultKeyDBName, filepath.Join(rootDir, "keys")), nil
} }
// create a list of KeyOutput in bech32 format func printKeyTextHeader() {
func Bech32KeysOutput(infos []keys.Info) ([]KeyOutput, error) { fmt.Printf("NAME:\tTYPE:\tADDRESS:\t\t\t\t\tPUBKEY:\n")
kos := make([]KeyOutput, len(infos))
for i, info := range infos {
ko, err := Bech32KeyOutput(info)
if err != nil {
return nil, err
}
kos[i] = ko
}
return kos, nil
} }
// create a KeyOutput in bech32 format func printMultiSigKeyTextHeader() {
func Bech32KeyOutput(info keys.Info) (KeyOutput, error) { fmt.Printf("WEIGHT:\tTHRESHOLD:\tADDRESS:\t\t\t\t\tPUBKEY:\n")
accAddr := sdk.AccAddress(info.GetPubKey().Address().Bytes())
bechPubKey, err := sdk.Bech32ifyAccPub(info.GetPubKey())
if err != nil {
return KeyOutput{}, err
}
return KeyOutput{
Name: info.GetName(),
Type: info.GetType().String(),
Address: accAddr.String(),
PubKey: bechPubKey,
}, nil
} }
// Bech32ConsKeyOutput returns key output for a consensus node's key func printMultiSigKeyInfo(keyInfo keys.Info, bechKeyOut bechKeyOutFn) {
// information. ko, err := bechKeyOut(keyInfo)
func Bech32ConsKeyOutput(keyInfo keys.Info) (KeyOutput, error) {
consAddr := sdk.ConsAddress(keyInfo.GetPubKey().Address().Bytes())
bechPubKey, err := sdk.Bech32ifyConsPub(keyInfo.GetPubKey())
if err != nil { if err != nil {
return KeyOutput{}, err panic(err)
} }
return KeyOutput{ printMultiSigKeyTextHeader()
Name: keyInfo.GetName(), printMultiSigKeyOutput(ko)
Type: keyInfo.GetType().String(),
Address: consAddr.String(),
PubKey: bechPubKey,
}, nil
}
// Bech32ValKeyOutput returns key output for a validator's key information.
func Bech32ValKeyOutput(keyInfo keys.Info) (KeyOutput, error) {
valAddr := sdk.ValAddress(keyInfo.GetPubKey().Address().Bytes())
bechPubKey, err := sdk.Bech32ifyValPub(keyInfo.GetPubKey())
if err != nil {
return KeyOutput{}, err
}
return KeyOutput{
Name: keyInfo.GetName(),
Type: keyInfo.GetType().String(),
Address: valAddr.String(),
PubKey: bechPubKey,
}, nil
} }
func printKeyInfo(keyInfo keys.Info, bechKeyOut bechKeyOutFn) { func printKeyInfo(keyInfo keys.Info, bechKeyOut bechKeyOutFn) {
@ -162,8 +115,9 @@ func printKeyInfo(keyInfo keys.Info, bechKeyOut bechKeyOutFn) {
switch viper.Get(cli.OutputFlag) { switch viper.Get(cli.OutputFlag) {
case OutputFormatText: case OutputFormatText:
fmt.Printf("NAME:\tTYPE:\tADDRESS:\t\t\t\t\t\tPUBKEY:\n") printKeyTextHeader()
printKeyOutput(ko) printKeyOutput(ko)
case "json": case "json":
out, err := MarshalJSON(ko) out, err := MarshalJSON(ko)
if err != nil { if err != nil {
@ -175,29 +129,38 @@ func printKeyInfo(keyInfo keys.Info, bechKeyOut bechKeyOutFn) {
} }
func printInfos(infos []keys.Info) { func printInfos(infos []keys.Info) {
kos, err := Bech32KeysOutput(infos) kos, err := keys.Bech32KeysOutput(infos)
if err != nil { if err != nil {
panic(err) panic(err)
} }
switch viper.Get(cli.OutputFlag) { switch viper.Get(cli.OutputFlag) {
case OutputFormatText: case OutputFormatText:
fmt.Printf("NAME:\tTYPE:\tADDRESS:\t\t\t\t\t\tPUBKEY:\n") printKeyTextHeader()
for _, ko := range kos { for _, ko := range kos {
printKeyOutput(ko) printKeyOutput(ko)
} }
case OutputFormatJSON: case OutputFormatJSON:
out, err := MarshalJSON(kos) out, err := MarshalJSON(kos)
if err != nil { if err != nil {
panic(err) panic(err)
} }
fmt.Println(string(out)) fmt.Println(string(out))
} }
} }
func printKeyOutput(ko KeyOutput) { func printKeyOutput(ko keys.KeyOutput) {
fmt.Printf("%s\t%s\t%s\t%s\n", ko.Name, ko.Type, ko.Address, ko.PubKey) fmt.Printf("%s\t%s\t%s\t%s\n", ko.Name, ko.Type, ko.Address, ko.PubKey)
} }
func printMultiSigKeyOutput(ko keys.KeyOutput) {
for _, pk := range ko.PubKeys {
fmt.Printf("%d\t%d\t\t%s\t%s\n", pk.Weight, ko.Threshold, pk.Address, pk.PubKey)
}
}
func printKeyAddress(info keys.Info, bechKeyOut bechKeyOutFn) { func printKeyAddress(info keys.Info, bechKeyOut bechKeyOutFn) {
ko, err := bechKeyOut(info) ko, err := bechKeyOut(info)
if err != nil { if err != nil {

View File

@ -19,8 +19,9 @@ import (
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
"github.com/cosmos/cosmos-sdk/client" "github.com/cosmos/cosmos-sdk/client"
"github.com/cosmos/cosmos-sdk/client/keys" clientkeys "github.com/cosmos/cosmos-sdk/client/keys"
"github.com/cosmos/cosmos-sdk/client/utils" "github.com/cosmos/cosmos-sdk/client/utils"
"github.com/cosmos/cosmos-sdk/crypto/keys"
"github.com/cosmos/cosmos-sdk/client/rpc" "github.com/cosmos/cosmos-sdk/client/rpc"
"github.com/cosmos/cosmos-sdk/client/tx" "github.com/cosmos/cosmos-sdk/client/tx"
@ -558,7 +559,7 @@ func getKeys(t *testing.T, port string) []keys.KeyOutput {
// POST /keys Create a new account locally // POST /keys Create a new account locally
func doKeysPost(t *testing.T, port, name, password, mnemonic string, account int, index int) keys.KeyOutput { func doKeysPost(t *testing.T, port, name, password, mnemonic string, account int, index int) keys.KeyOutput {
pk := keys.AddNewKey{name, password, mnemonic, account, index} pk := clientkeys.AddNewKey{name, password, mnemonic, account, index}
req, err := cdc.MarshalJSON(pk) req, err := cdc.MarshalJSON(pk)
require.NoError(t, err) require.NoError(t, err)
@ -584,7 +585,7 @@ func getKeysSeed(t *testing.T, port string) string {
// POST /keys/{name}/recove Recover a account from a seed // POST /keys/{name}/recove Recover a account from a seed
func doRecoverKey(t *testing.T, port, recoverName, recoverPassword, mnemonic string, account uint32, index uint32) { func doRecoverKey(t *testing.T, port, recoverName, recoverPassword, mnemonic string, account uint32, index uint32) {
pk := keys.RecoverKey{recoverPassword, mnemonic, int(account), int(index)} pk := clientkeys.RecoverKey{recoverPassword, mnemonic, int(account), int(index)}
req, err := cdc.MarshalJSON(pk) req, err := cdc.MarshalJSON(pk)
require.NoError(t, err) require.NoError(t, err)
@ -612,7 +613,7 @@ func getKey(t *testing.T, port, name string) keys.KeyOutput {
// PUT /keys/{name} Update the password for this account in the KMS // PUT /keys/{name} Update the password for this account in the KMS
func updateKey(t *testing.T, port, name, oldPassword, newPassword string, fail bool) { func updateKey(t *testing.T, port, name, oldPassword, newPassword string, fail bool) {
kr := keys.UpdateKeyReq{oldPassword, newPassword} kr := clientkeys.UpdateKeyReq{oldPassword, newPassword}
req, err := cdc.MarshalJSON(kr) req, err := cdc.MarshalJSON(kr)
require.NoError(t, err) require.NoError(t, err)
keyEndpoint := fmt.Sprintf("/keys/%s", name) keyEndpoint := fmt.Sprintf("/keys/%s", name)
@ -626,7 +627,7 @@ func updateKey(t *testing.T, port, name, oldPassword, newPassword string, fail b
// DELETE /keys/{name} Remove an account // DELETE /keys/{name} Remove an account
func deleteKey(t *testing.T, port, name, password string) { func deleteKey(t *testing.T, port, name, password string) {
dk := keys.DeleteKeyReq{password} dk := clientkeys.DeleteKeyReq{password}
req, err := cdc.MarshalJSON(dk) req, err := cdc.MarshalJSON(dk)
require.NoError(t, err) require.NoError(t, err)
keyEndpoint := fmt.Sprintf("/keys/%s", name) keyEndpoint := fmt.Sprintf("/keys/%s", name)

View File

@ -701,7 +701,7 @@ func TestGaiaCLISendGenerateSignAndBroadcast(t *testing.T) {
// Test sign --validate-signatures // Test sign --validate-signatures
success, stdout, _ = f.TxSign(keyFoo, unsignedTxFile.Name(), "--validate-signatures") success, stdout, _ = f.TxSign(keyFoo, unsignedTxFile.Name(), "--validate-signatures")
require.False(t, success) require.False(t, success)
require.Equal(t, fmt.Sprintf("Signers:\n 0: %v\n\nSignatures:\n\n", fooAddr.String()), stdout) require.Equal(t, fmt.Sprintf("Signers:\n 0: %v\n\nSignatures:\n\n", fooAddr.String()), stdout)
// Test sign // Test sign
success, stdout, _ = f.TxSign(keyFoo, unsignedTxFile.Name()) success, stdout, _ = f.TxSign(keyFoo, unsignedTxFile.Name())
@ -718,7 +718,7 @@ func TestGaiaCLISendGenerateSignAndBroadcast(t *testing.T) {
// Test sign --validate-signatures // Test sign --validate-signatures
success, stdout, _ = f.TxSign(keyFoo, signedTxFile.Name(), "--validate-signatures") success, stdout, _ = f.TxSign(keyFoo, signedTxFile.Name(), "--validate-signatures")
require.True(t, success) require.True(t, success)
require.Equal(t, fmt.Sprintf("Signers:\n 0: %v\n\nSignatures:\n 0: %v\t[OK]\n\n", fooAddr.String(), require.Equal(t, fmt.Sprintf("Signers:\n 0: %v\n\nSignatures:\n 0: %v\t\t\t[OK]\n\n", fooAddr.String(),
fooAddr.String()), stdout) fooAddr.String()), stdout)
// Ensure foo has right amount of funds // Ensure foo has right amount of funds

View File

@ -14,10 +14,11 @@ import (
cmn "github.com/tendermint/tendermint/libs/common" cmn "github.com/tendermint/tendermint/libs/common"
"github.com/cosmos/cosmos-sdk/client/keys" clientkeys "github.com/cosmos/cosmos-sdk/client/keys"
"github.com/cosmos/cosmos-sdk/cmd/gaia/app" "github.com/cosmos/cosmos-sdk/cmd/gaia/app"
appInit "github.com/cosmos/cosmos-sdk/cmd/gaia/init" appInit "github.com/cosmos/cosmos-sdk/cmd/gaia/init"
"github.com/cosmos/cosmos-sdk/codec" "github.com/cosmos/cosmos-sdk/codec"
"github.com/cosmos/cosmos-sdk/crypto/keys"
"github.com/cosmos/cosmos-sdk/server" "github.com/cosmos/cosmos-sdk/server"
"github.com/cosmos/cosmos-sdk/tests" "github.com/cosmos/cosmos-sdk/tests"
sdk "github.com/cosmos/cosmos-sdk/types" sdk "github.com/cosmos/cosmos-sdk/types"
@ -260,7 +261,7 @@ func (f *Fixtures) KeysShow(name string, flags ...string) keys.KeyOutput {
cmd := fmt.Sprintf("gaiacli keys show --home=%s %s", f.GCLIHome, name) cmd := fmt.Sprintf("gaiacli keys show --home=%s %s", f.GCLIHome, name)
out, _ := tests.ExecuteT(f.T, addFlags(cmd, flags), "") out, _ := tests.ExecuteT(f.T, addFlags(cmd, flags), "")
var ko keys.KeyOutput var ko keys.KeyOutput
err := keys.UnmarshalJSON([]byte(out), &ko) err := clientkeys.UnmarshalJSON([]byte(out), &ko)
require.NoError(f.T, err) require.NoError(f.T, err)
return ko return ko
} }

View File

@ -135,8 +135,8 @@ following delegation and commission default parameters:
return err return err
} }
if info.GetType() == kbkeys.TypeOffline { if info.GetType() == kbkeys.TypeOffline || info.GetType() == kbkeys.TypeMulti {
fmt.Println("Offline key passed in. Use `gaiacli tx sign` command to sign:") fmt.Println("Offline key passed in. Use `gaiacli tx sign` command to sign:")
return utils.PrintUnsignedStdTx(txBldr, cliCtx, []sdk.Msg{msg}, true) return utils.PrintUnsignedStdTx(txBldr, cliCtx, []sdk.Msg{msg}, true)
} }

View File

@ -1,9 +1,10 @@
package keys package keys
import ( import (
amino "github.com/tendermint/go-amino"
cryptoAmino "github.com/tendermint/tendermint/crypto/encoding/amino"
"github.com/cosmos/cosmos-sdk/crypto/keys/hd" "github.com/cosmos/cosmos-sdk/crypto/keys/hd"
"github.com/tendermint/go-amino"
"github.com/tendermint/tendermint/crypto/encoding/amino"
) )
var cdc = amino.NewCodec() var cdc = amino.NewCodec()
@ -15,4 +16,5 @@ func init() {
cdc.RegisterConcrete(localInfo{}, "crypto/keys/localInfo", nil) cdc.RegisterConcrete(localInfo{}, "crypto/keys/localInfo", nil)
cdc.RegisterConcrete(ledgerInfo{}, "crypto/keys/ledgerInfo", nil) cdc.RegisterConcrete(ledgerInfo{}, "crypto/keys/ledgerInfo", nil)
cdc.RegisterConcrete(offlineInfo{}, "crypto/keys/offlineInfo", nil) cdc.RegisterConcrete(offlineInfo{}, "crypto/keys/offlineInfo", nil)
cdc.RegisterConcrete(multiInfo{}, "crypto/keys/multiInfo", nil)
} }

View File

@ -7,7 +7,7 @@ import (
"reflect" "reflect"
"strings" "strings"
"errors" "github.com/pkg/errors"
"github.com/cosmos/cosmos-sdk/crypto" "github.com/cosmos/cosmos-sdk/crypto"
"github.com/cosmos/cosmos-sdk/crypto/keys/hd" "github.com/cosmos/cosmos-sdk/crypto/keys/hd"
@ -15,10 +15,10 @@ import (
"github.com/cosmos/cosmos-sdk/crypto/keys/mintkey" "github.com/cosmos/cosmos-sdk/crypto/keys/mintkey"
"github.com/cosmos/cosmos-sdk/types" "github.com/cosmos/cosmos-sdk/types"
"github.com/cosmos/go-bip39" bip39 "github.com/cosmos/go-bip39"
tmcrypto "github.com/tendermint/tendermint/crypto" tmcrypto "github.com/tendermint/tendermint/crypto"
"github.com/tendermint/tendermint/crypto/encoding/amino" cryptoAmino "github.com/tendermint/tendermint/crypto/encoding/amino"
"github.com/tendermint/tendermint/crypto/secp256k1" "github.com/tendermint/tendermint/crypto/secp256k1"
dbm "github.com/tendermint/tendermint/libs/db" dbm "github.com/tendermint/tendermint/libs/db"
) )
@ -152,12 +152,18 @@ func (kb dbKeybase) CreateLedger(name string, algo SigningAlgo, account uint32,
return kb.writeLedgerKey(name, pub, *hdPath), nil return kb.writeLedgerKey(name, pub, *hdPath), nil
} }
// CreateOffline creates a new reference to an offline keypair // CreateOffline creates a new reference to an offline keypair. It returns the
// It returns the created key info // created key info.
func (kb dbKeybase) CreateOffline(name string, pub tmcrypto.PubKey) (Info, error) { func (kb dbKeybase) CreateOffline(name string, pub tmcrypto.PubKey) (Info, error) {
return kb.writeOfflineKey(name, pub), nil return kb.writeOfflineKey(name, pub), nil
} }
// CreateMulti creates a new reference to a multisig (offline) keypair. It
// returns the created key info.
func (kb dbKeybase) CreateMulti(name string, pub tmcrypto.PubKey) (Info, error) {
return kb.writeMultisigKey(name, pub), nil
}
func (kb *dbKeybase) persistDerivedKey(seed []byte, passwd, name, fullHdPath string) (info Info, err error) { func (kb *dbKeybase) persistDerivedKey(seed []byte, passwd, name, fullHdPath string) (info Info, err error) {
// create master key and derive first key: // create master key and derive first key:
masterPriv, ch := hd.ComputeMastersFromSeed(seed) masterPriv, ch := hd.ComputeMastersFromSeed(seed)
@ -222,7 +228,9 @@ func (kb dbKeybase) Sign(name, passphrase string, msg []byte) (sig []byte, pub t
if err != nil { if err != nil {
return return
} }
var priv tmcrypto.PrivKey var priv tmcrypto.PrivKey
switch info.(type) { switch info.(type) {
case localInfo: case localInfo:
linfo := info.(localInfo) linfo := info.(localInfo)
@ -230,39 +238,49 @@ func (kb dbKeybase) Sign(name, passphrase string, msg []byte) (sig []byte, pub t
err = fmt.Errorf("private key not available") err = fmt.Errorf("private key not available")
return return
} }
priv, err = mintkey.UnarmorDecryptPrivKey(linfo.PrivKeyArmor, passphrase) priv, err = mintkey.UnarmorDecryptPrivKey(linfo.PrivKeyArmor, passphrase)
if err != nil { if err != nil {
return nil, nil, err return nil, nil, err
} }
case ledgerInfo: case ledgerInfo:
linfo := info.(ledgerInfo) linfo := info.(ledgerInfo)
priv, err = crypto.NewPrivKeyLedgerSecp256k1(linfo.Path) priv, err = crypto.NewPrivKeyLedgerSecp256k1(linfo.Path)
if err != nil { if err != nil {
return return
} }
case offlineInfo:
linfo := info.(offlineInfo) case offlineInfo, multiInfo:
_, err := fmt.Fprintf(os.Stderr, "Bytes to sign:\n%s", msg) _, err := fmt.Fprintf(os.Stderr, "Message to sign:\n\n%s\n", msg)
if err != nil { if err != nil {
return nil, nil, err return nil, nil, err
} }
buf := bufio.NewReader(os.Stdin) buf := bufio.NewReader(os.Stdin)
_, err = fmt.Fprintf(os.Stderr, "\nEnter Amino-encoded signature:\n") _, err = fmt.Fprintf(os.Stderr, "\nEnter Amino-encoded signature:\n")
if err != nil { if err != nil {
return nil, nil, err return nil, nil, err
} }
// Will block until user inputs the signature // Will block until user inputs the signature
signed, err := buf.ReadString('\n') signed, err := buf.ReadString('\n')
if err != nil { if err != nil {
return nil, nil, err return nil, nil, err
} }
cdc.MustUnmarshalBinaryLengthPrefixed([]byte(signed), sig)
return sig, linfo.GetPubKey(), nil if err := cdc.UnmarshalBinaryLengthPrefixed([]byte(signed), sig); err != nil {
return nil, nil, errors.Wrap(err, "failed to decode signature")
}
return sig, info.GetPubKey(), nil
} }
sig, err = priv.Sign(msg) sig, err = priv.Sign(msg)
if err != nil { if err != nil {
return nil, nil, err return nil, nil, err
} }
pub = priv.PubKey() pub = priv.PubKey()
return sig, pub, nil return sig, pub, nil
} }
@ -272,7 +290,9 @@ func (kb dbKeybase) ExportPrivateKeyObject(name string, passphrase string) (tmcr
if err != nil { if err != nil {
return nil, err return nil, err
} }
var priv tmcrypto.PrivKey var priv tmcrypto.PrivKey
switch info.(type) { switch info.(type) {
case localInfo: case localInfo:
linfo := info.(localInfo) linfo := info.(localInfo)
@ -284,11 +304,11 @@ func (kb dbKeybase) ExportPrivateKeyObject(name string, passphrase string) (tmcr
if err != nil { if err != nil {
return nil, err return nil, err
} }
case ledgerInfo:
return nil, errors.New("only works on local private keys") case ledgerInfo, offlineInfo, multiInfo:
case offlineInfo:
return nil, errors.New("only works on local private keys") return nil, errors.New("only works on local private keys")
} }
return priv, nil return priv, nil
} }
@ -426,6 +446,12 @@ func (kb dbKeybase) writeOfflineKey(name string, pub tmcrypto.PubKey) Info {
return info return info
} }
func (kb dbKeybase) writeMultisigKey(name string, pub tmcrypto.PubKey) Info {
info := NewMultiInfo(name, pub)
kb.writeInfo(name, info)
return info
}
func (kb dbKeybase) writeInfo(name string, info Info) { func (kb dbKeybase) writeInfo(name string, info Info) {
// write the info by key // write the info by key
key := infoKey(name) key := infoKey(name)

View File

@ -127,6 +127,16 @@ func (lkb lazyKeybase) CreateOffline(name string, pubkey crypto.PubKey) (info In
return newDbKeybase(db).CreateOffline(name, pubkey) return newDbKeybase(db).CreateOffline(name, pubkey)
} }
func (lkb lazyKeybase) CreateMulti(name string, pubkey crypto.PubKey) (info Info, err error) {
db, err := dbm.NewGoLevelDB(lkb.name, lkb.dir)
if err != nil {
return nil, err
}
defer db.Close()
return newDbKeybase(db).CreateMulti(name, pubkey)
}
func (lkb lazyKeybase) Update(name, oldpass string, getNewpass func() (string, error)) error { func (lkb lazyKeybase) Update(name, oldpass string, getNewpass func() (string, error)) error {
db, err := dbm.NewGoLevelDB(lkb.name, lkb.dir) db, err := dbm.NewGoLevelDB(lkb.name, lkb.dir)
if err != nil { if err != nil {

111
crypto/keys/output.go Normal file
View File

@ -0,0 +1,111 @@
package keys
import (
sdk "github.com/cosmos/cosmos-sdk/types"
)
// KeyOutput defines a structure wrapping around an Info object used for output
// functionality.
type KeyOutput struct {
Name string `json:"name"`
Type string `json:"type"`
Address string `json:"address"`
PubKey string `json:"pubkey"`
Mnemonic string `json:"mnemonic,omitempty"`
Threshold uint `json:"threshold,omitempty"`
PubKeys []multisigPubKeyOutput `json:"pubkeys,omitempty"`
}
type multisigPubKeyOutput struct {
Address string `json:"address"`
PubKey string `json:"pubkey"`
Weight uint `json:"weight"`
}
// Bech32KeysOutput returns a slice of KeyOutput objects, each with the "acc"
// Bech32 prefixes, given a slice of Info objects. It returns an error if any
// call to Bech32KeyOutput fails.
func Bech32KeysOutput(infos []Info) ([]KeyOutput, error) {
kos := make([]KeyOutput, len(infos))
for i, info := range infos {
ko, err := Bech32KeyOutput(info)
if err != nil {
return nil, err
}
kos[i] = ko
}
return kos, nil
}
// Bech32ConsKeyOutput create a KeyOutput in with "cons" Bech32 prefixes.
func Bech32ConsKeyOutput(keyInfo Info) (KeyOutput, error) {
consAddr := sdk.ConsAddress(keyInfo.GetPubKey().Address().Bytes())
bechPubKey, err := sdk.Bech32ifyConsPub(keyInfo.GetPubKey())
if err != nil {
return KeyOutput{}, err
}
return KeyOutput{
Name: keyInfo.GetName(),
Type: keyInfo.GetType().String(),
Address: consAddr.String(),
PubKey: bechPubKey,
}, nil
}
// Bech32ValKeyOutput create a KeyOutput in with "val" Bech32 prefixes.
func Bech32ValKeyOutput(keyInfo Info) (KeyOutput, error) {
valAddr := sdk.ValAddress(keyInfo.GetPubKey().Address().Bytes())
bechPubKey, err := sdk.Bech32ifyValPub(keyInfo.GetPubKey())
if err != nil {
return KeyOutput{}, err
}
return KeyOutput{
Name: keyInfo.GetName(),
Type: keyInfo.GetType().String(),
Address: valAddr.String(),
PubKey: bechPubKey,
}, nil
}
// Bech32KeyOutput create a KeyOutput in with "acc" Bech32 prefixes. If the
// public key is a multisig public key, then the threshold and constituent
// public keys will be added.
func Bech32KeyOutput(info Info) (KeyOutput, error) {
accAddr := sdk.AccAddress(info.GetPubKey().Address().Bytes())
bechPubKey, err := sdk.Bech32ifyAccPub(info.GetPubKey())
if err != nil {
return KeyOutput{}, err
}
ko := KeyOutput{
Name: info.GetName(),
Type: info.GetType().String(),
Address: accAddr.String(),
PubKey: bechPubKey,
}
if mInfo, ok := info.(multiInfo); ok {
pubKeys := make([]multisigPubKeyOutput, len(mInfo.PubKeys))
for i, pk := range mInfo.PubKeys {
accAddr := sdk.AccAddress(pk.PubKey.Address().Bytes())
bechPubKey, err := sdk.Bech32ifyAccPub(pk.PubKey)
if err != nil {
return KeyOutput{}, err
}
pubKeys[i] = multisigPubKeyOutput{accAddr.String(), bechPubKey, pk.Weight}
}
ko.Threshold = mInfo.Threshold
ko.PubKeys = pubKeys
}
return ko, nil
}

View File

@ -3,10 +3,11 @@ package keys
import ( import (
"fmt" "fmt"
"github.com/tendermint/tendermint/crypto"
"github.com/tendermint/tendermint/crypto/multisig"
"github.com/cosmos/cosmos-sdk/crypto/keys/hd" "github.com/cosmos/cosmos-sdk/crypto/keys/hd"
"github.com/cosmos/cosmos-sdk/types" "github.com/cosmos/cosmos-sdk/types"
"github.com/tendermint/tendermint/crypto"
) )
// Keybase exposes operations on a generic keystore // Keybase exposes operations on a generic keystore
@ -39,6 +40,9 @@ type Keybase interface {
// CreateOffline creates, stores, and returns a new offline key reference // CreateOffline creates, stores, and returns a new offline key reference
CreateOffline(name string, pubkey crypto.PubKey) (info Info, err error) CreateOffline(name string, pubkey crypto.PubKey) (info Info, err error)
// CreateMulti creates, stores, and returns a new multsig (offline) key reference
CreateMulti(name string, pubkey crypto.PubKey) (info Info, err error)
// The following operations will *only* work on locally-stored keys // The following operations will *only* work on locally-stored keys
Update(name, oldpass string, getNewpass func() (string, error)) error Update(name, oldpass string, getNewpass func() (string, error)) error
Import(name string, armor string) (err error) Import(name string, armor string) (err error)
@ -61,12 +65,14 @@ const (
TypeLocal KeyType = 0 TypeLocal KeyType = 0
TypeLedger KeyType = 1 TypeLedger KeyType = 1
TypeOffline KeyType = 2 TypeOffline KeyType = 2
TypeMulti KeyType = 3
) )
var keyTypes = map[KeyType]string{ var keyTypes = map[KeyType]string{
TypeLocal: "local", TypeLocal: "local",
TypeLedger: "ledger", TypeLedger: "ledger",
TypeOffline: "offline", TypeOffline: "offline",
TypeMulti: "multi",
} }
// String implements the stringer interface for KeyType. // String implements the stringer interface for KeyType.
@ -88,9 +94,12 @@ type Info interface {
GetPath() (*hd.BIP44Params, error) GetPath() (*hd.BIP44Params, error)
} }
var _ Info = &localInfo{} var (
var _ Info = &ledgerInfo{} _ Info = &localInfo{}
var _ Info = &offlineInfo{} _ Info = &ledgerInfo{}
_ Info = &offlineInfo{}
_ Info = &multiInfo{}
)
// localInfo is the public information about a locally stored key // localInfo is the public information about a locally stored key
type localInfo struct { type localInfo struct {
@ -196,6 +205,54 @@ func (i offlineInfo) GetPath() (*hd.BIP44Params, error) {
return nil, fmt.Errorf("BIP44 Paths are not available for this type") return nil, fmt.Errorf("BIP44 Paths are not available for this type")
} }
type multisigPubKeyInfo struct {
PubKey crypto.PubKey `json:"pubkey"`
Weight uint `json:"weight"`
}
type multiInfo struct {
Name string `json:"name"`
PubKey crypto.PubKey `json:"pubkey"`
Threshold uint `json:"threshold"`
PubKeys []multisigPubKeyInfo `json:"pubkeys"`
}
func NewMultiInfo(name string, pub crypto.PubKey) Info {
multiPK := pub.(multisig.PubKeyMultisigThreshold)
pubKeys := make([]multisigPubKeyInfo, len(multiPK.PubKeys))
for i, pk := range multiPK.PubKeys {
// TODO: Recursively check pk for total weight?
pubKeys[i] = multisigPubKeyInfo{pk, 1}
}
return &multiInfo{
Name: name,
PubKey: pub,
Threshold: multiPK.K,
PubKeys: pubKeys,
}
}
func (i multiInfo) GetType() KeyType {
return TypeMulti
}
func (i multiInfo) GetName() string {
return i.Name
}
func (i multiInfo) GetPubKey() crypto.PubKey {
return i.PubKey
}
func (i multiInfo) GetAddress() types.AccAddress {
return i.PubKey.Address().Bytes()
}
func (i multiInfo) GetPath() (*hd.BIP44Params, error) {
return nil, fmt.Errorf("BIP44 Paths are not available for this type")
}
// encoding info // encoding info
func writeInfo(i Info) []byte { func writeInfo(i Info) []byte {
return cdc.MustMarshalBinaryLengthPrefixed(i) return cdc.MustMarshalBinaryLengthPrefixed(i)

View File

@ -4,10 +4,11 @@ import (
"encoding/hex" "encoding/hex"
"testing" "testing"
"github.com/cosmos/cosmos-sdk/crypto/keys/hd"
"github.com/cosmos/cosmos-sdk/types"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"github.com/tendermint/tendermint/crypto/secp256k1" "github.com/tendermint/tendermint/crypto/secp256k1"
"github.com/cosmos/cosmos-sdk/crypto/keys/hd"
"github.com/cosmos/cosmos-sdk/types"
) )
func Test_writeReadLedgerInfo(t *testing.T) { func Test_writeReadLedgerInfo(t *testing.T) {

View File

@ -683,7 +683,7 @@ gaiacli query distr rewards <delegator_address>
Multisig transactions require signatures of multiple private keys. Thus, generating and signing Multisig transactions require signatures of multiple private keys. Thus, generating and signing
a transaction from a multisig account involve cooperation among the parties involved. A multisig a transaction from a multisig account involve cooperation among the parties involved. A multisig
transaction can be initiated by any of the key holders, and at least one of them would need to transaction can be initiated by any of the key holders, and at least one of them would need to
import other parties' public keys into their local database and generate a multisig public key import other parties' public keys into their Keybase and generate a multisig public key
in order to finalize and broadcast the transaction. in order to finalize and broadcast the transaction.
For example, given a multisig key comprising the keys `p1`, `p2`, and `p3`, each of which is held For example, given a multisig key comprising the keys `p1`, `p2`, and `p3`, each of which is held
@ -692,17 +692,17 @@ generate the multisig account public key:
``` ```
gaiacli keys add \ gaiacli keys add \
--pubkey=cosmospub1addwnpepqtd28uwa0yxtwal5223qqr5aqf5y57tc7kk7z8qd4zplrdlk5ez5kdnlrj4 \ p2 \
p2 --pubkey=cosmospub1addwnpepqtd28uwa0yxtwal5223qqr5aqf5y57tc7kk7z8qd4zplrdlk5ez5kdnlrj4
gaiacli keys add \ gaiacli keys add \
--pubkey=cosmospub1addwnpepqgj04jpm9wrdml5qnss9kjxkmxzywuklnkj0g3a3f8l5wx9z4ennz84ym5t \ p3 \
p3 --pubkey=cosmospub1addwnpepqgj04jpm9wrdml5qnss9kjxkmxzywuklnkj0g3a3f8l5wx9z4ennz84ym5t
gaiacli keys add \ gaiacli keys add \
--multisig-threshold=2 p1p2p3 \
--multisig-threshold=2 \
--multisig=p1,p2,p3 --multisig=p1,p2,p3
p1p2p3
``` ```
A new multisig public key `p1p2p3` has been stored, and its address will be A new multisig public key `p1p2p3` has been stored, and its address will be
@ -712,6 +712,15 @@ used as signer of multisig transactions:
gaiacli keys show --address p1p2p3 gaiacli keys show --address p1p2p3
``` ```
You may also view multisig threshold, pubkey constituents and respective weights
by viewing the JSON output of the key or passing the `--show-multisig` flag:
```bash
gaiacli keys show p1p2p3 -o json
gaiacli keys show p1p2p3 --show-multisig
```
The first step to create a multisig transaction is to initiate it on behalf The first step to create a multisig transaction is to initiate it on behalf
of the multisig address created above: of the multisig address created above:
@ -726,10 +735,10 @@ The file `unsignedTx.json` contains the unsigned transaction encoded in JSON.
```bash ```bash
gaiacli tx sign \ gaiacli tx sign \
unsignedTx.json \
--multisig=<multisig_address> \ --multisig=<multisig_address> \
--name=p1 \ --from=p1 \
--output-document=p1signature.json \ --output-document=p1signature.json \
unsignedTx.json
``` ```
Once the signature is generated, `p1` transmits both `unsignedTx.json` and Once the signature is generated, `p1` transmits both `unsignedTx.json` and
@ -738,10 +747,10 @@ respective signature:
```bash ```bash
gaiacli tx sign \ gaiacli tx sign \
unsignedTx.json \
--multisig=<multisig_address> \ --multisig=<multisig_address> \
--name=p2 \ --from=p2 \
--output-document=p2signature.json \ --output-document=p2signature.json \
unsignedTx.json
``` ```
`p1p2p3` is a 2-of-3 multisig key, therefore one additional signature `p1p2p3` is a 2-of-3 multisig key, therefore one additional signature

View File

@ -66,9 +66,8 @@ func makeMultiSignCmd(cdc *amino.Codec) func(cmd *cobra.Command, args []string)
if err != nil { if err != nil {
return return
} }
if multisigInfo.GetType() != crkeys.TypeOffline { if multisigInfo.GetType() != crkeys.TypeMulti {
return fmt.Errorf("%q must be of type offline: %s", return fmt.Errorf("%q must be of type %s: %s", args[1], crkeys.TypeMulti, multisigInfo.GetType())
args[1], multisigInfo.GetType())
} }
multisigPub := multisigInfo.GetPubKey().(multisig.PubKeyMultisigThreshold) multisigPub := multisigInfo.GetPubKey().(multisig.PubKeyMultisigThreshold)

View File

@ -3,10 +3,12 @@ package cli
import ( import (
"fmt" "fmt"
"os" "os"
"strings"
"github.com/spf13/cobra" "github.com/spf13/cobra"
"github.com/spf13/viper" "github.com/spf13/viper"
amino "github.com/tendermint/go-amino" amino "github.com/tendermint/go-amino"
"github.com/tendermint/tendermint/crypto/multisig"
"github.com/cosmos/cosmos-sdk/client" "github.com/cosmos/cosmos-sdk/client"
"github.com/cosmos/cosmos-sdk/client/context" "github.com/cosmos/cosmos-sdk/client/context"
@ -54,18 +56,21 @@ be generated via the 'multisign' command.
Args: cobra.ExactArgs(1), Args: cobra.ExactArgs(1),
} }
cmd.Flags().String(flagMultisig, "", cmd.Flags().String(
"Address of the multisig account on behalf of which the "+ flagMultisig, "",
"transaction shall be signed") "Address of the multisig account on behalf of which the transaction shall be signed",
cmd.Flags().Bool(flagAppend, true, )
"Append the signature to the existing ones. "+ cmd.Flags().Bool(
"If disabled, old signatures would be overwritten. Ignored if --multisig is on") flagAppend, true,
"Append the signature to the existing ones. If disabled, old signatures would be overwritten. Ignored if --multisig is on",
)
cmd.Flags().Bool(
flagValidateSigs, false,
"Print the addresses that must sign the transaction, those who have already signed it, and make sure that signatures are in the correct order",
)
cmd.Flags().Bool(flagSigOnly, false, "Print only the generated signature, then exit") cmd.Flags().Bool(flagSigOnly, false, "Print only the generated signature, then exit")
cmd.Flags().Bool(flagValidateSigs, false, "Print the addresses that must sign the transaction, "+
"those who have already signed it, and make sure that signatures are in the correct order")
cmd.Flags().Bool(flagOffline, false, "Offline mode. Do not query a full node") cmd.Flags().Bool(flagOffline, false, "Offline mode. Do not query a full node")
cmd.Flags().String(flagOutfile, "", cmd.Flags().String(flagOutfile, "", "The document will be written to the given file instead of STDOUT")
"The document will be written to the given file instead of STDOUT")
// add the flags here and return the command // add the flags here and return the command
return client.PostCommands(cmd)[0] return client.PostCommands(cmd)[0]
@ -177,7 +182,7 @@ func printAndValidateSigs(
signers := stdTx.GetSigners() signers := stdTx.GetSigners()
for i, signer := range signers { for i, signer := range signers {
fmt.Printf(" %v: %v\n", i, signer.String()) fmt.Printf(" %v: %v\n", i, signer.String())
} }
success := true success := true
@ -194,6 +199,11 @@ func printAndValidateSigs(
sigAddr := sdk.AccAddress(sig.Address()) sigAddr := sdk.AccAddress(sig.Address())
sigSanity := "OK" sigSanity := "OK"
var (
multiSigHeader string
multiSigMsg string
)
if i >= len(signers) || !sigAddr.Equals(signers[i]) { if i >= len(signers) || !sigAddr.Equals(signers[i]) {
sigSanity = "ERROR: signature does not match its respective signer" sigSanity = "ERROR: signature does not match its respective signer"
success = false success = false
@ -219,7 +229,26 @@ func printAndValidateSigs(
} }
} }
fmt.Printf(" %v: %v\t[%s]\n", i, sigAddr.String(), sigSanity) multiPK, ok := sig.PubKey.(multisig.PubKeyMultisigThreshold)
if ok {
var multiSig multisig.Multisignature
cliCtx.Codec.MustUnmarshalBinaryBare(sig.Signature, &multiSig)
var b strings.Builder
b.WriteString("\n MultiSig Signatures:\n")
for i := 0; i < multiSig.BitArray.Size(); i++ {
if multiSig.BitArray.GetIndex(i) {
addr := sdk.AccAddress(multiPK.PubKeys[i].Address().Bytes())
b.WriteString(fmt.Sprintf(" %d: %s (weight: %d)\n", i, addr, 1))
}
}
multiSigHeader = fmt.Sprintf(" [multisig threshold: %d/%d]", multiPK.K, len(multiPK.PubKeys))
multiSigMsg = b.String()
}
fmt.Printf(" %d: %s\t\t\t[%s]%s%s\n", i, sigAddr.String(), sigSanity, multiSigHeader, multiSigMsg)
} }
fmt.Println("") fmt.Println("")