1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
// Copyright 2021 Axiom-Team
//
// This file is part of Duniter-v2S.
//
// Duniter-v2S is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, version 3 of the License.
//
// Duniter-v2S is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with Duniter-v2S. If not, see <https://www.gnu.org/licenses/>.

use sc_cli::{
    utils, with_crypto_scheme, CryptoScheme, Error, KeystoreParams, SharedParams, SubstrateCli,
};
use sc_keystore::LocalKeystore;
use sc_service::config::{BasePath, KeystoreConfig};
use sp_core::crypto::{AccountId32, KeyTypeId, SecretString};
use sp_keystore::{Keystore, KeystorePtr};
use std::sync::Arc;

#[derive(Debug, clap::Subcommand)]
pub enum KeySubcommand {
    /// Generate session keys and store them in the keystore
    GenerateSessionKeys(GenSessionKeysCmd),

    #[allow(missing_docs)]
    #[clap(flatten)]
    Key(sc_cli::KeySubcommand),
}

impl KeySubcommand {
    /// Run the command
    pub fn run<C: SubstrateCli>(&self, cli: &C) -> Result<(), Error> {
        match self {
            Self::GenerateSessionKeys(cmd) => cmd.run(cli),
            Self::Key(cmd) => cmd.run(cli),
        }
    }
}

#[derive(Debug, clap::Args)]
pub struct GenSessionKeysCmd {
    /// The secret key URI.
    /// If the value is a file, the file content is used as URI.
    /// If not given, you will be prompted for the URI.
    #[clap(long)]
    suri: Option<String>,

    #[allow(missing_docs)]
    #[clap(flatten)]
    pub shared_params: SharedParams,

    #[allow(missing_docs)]
    #[clap(flatten)]
    pub keystore_params: KeystoreParams,
}

const KEY_TYPES: [(KeyTypeId, CryptoScheme); 4] = [
    (KeyTypeId(*b"gran"), CryptoScheme::Ed25519),
    (KeyTypeId(*b"babe"), CryptoScheme::Sr25519),
    (KeyTypeId(*b"imon"), CryptoScheme::Sr25519),
    (KeyTypeId(*b"audi"), CryptoScheme::Sr25519),
];

impl GenSessionKeysCmd {
    /// Run the command
    pub fn run<C: SubstrateCli>(&self, cli: &C) -> Result<(), Error> {
        let suri = utils::read_uri(self.suri.as_ref())?;
        let base_path = self
            .shared_params
            .base_path()?
            .unwrap_or_else(|| BasePath::from_project("", "", &C::executable_name()));
        let chain_id = self.shared_params.chain_id(self.shared_params.is_dev());
        let chain_spec = cli.load_spec(&chain_id)?;
        let config_dir = base_path.config_dir(chain_spec.id());

        let mut public_keys_bytes = Vec::with_capacity(128);
        for (key_type_id, crypto_scheme) in KEY_TYPES {
            let (keystore, public) = match self.keystore_params.keystore_config(&config_dir)? {
                KeystoreConfig::Path { path, password } => {
                    let public =
                        with_crypto_scheme!(crypto_scheme, to_vec(&suri, password.clone()))?;
                    let keystore: KeystorePtr = Arc::new(LocalKeystore::open(path, password)?);
                    (keystore, public)
                }
                _ => unreachable!("keystore_config always returns path and password; qed"),
            };

            Keystore::insert(&*keystore, key_type_id, &suri, &public[..])
                .map_err(|_| Error::KeystoreOperation)?;

            public_keys_bytes.extend_from_slice(&public[..]);
        }

        let mut buffer = [0; 32];
        // grandpa
        buffer.copy_from_slice(&public_keys_bytes[..32]);
        println!("grandpa: {}", AccountId32::new(buffer));
        // babe
        buffer.copy_from_slice(&public_keys_bytes[32..64]);
        println!("babe: {}", AccountId32::new(buffer));
        // im_online
        buffer.copy_from_slice(&public_keys_bytes[64..96]);
        println!("im_online: {}", AccountId32::new(buffer));
        // authority discovery
        buffer.copy_from_slice(&public_keys_bytes[96..]);
        println!("authority_discovery: {}", AccountId32::new(buffer));

        println!("Session Keys: 0x{}", hex::encode(public_keys_bytes));
        Ok(())
    }
}

fn to_vec<P: sp_core::Pair>(uri: &str, pass: Option<SecretString>) -> Result<Vec<u8>, Error> {
    let p = utils::pair_from_suri::<P>(uri, pass)?;
    Ok(p.public().as_ref().to_vec())
}