bridgekey.go 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148
  1. package guardiand
  2. import (
  3. "crypto/ecdsa"
  4. "crypto/rand"
  5. "errors"
  6. "fmt"
  7. "io/ioutil"
  8. "log"
  9. "os"
  10. ethcrypto "github.com/ethereum/go-ethereum/crypto"
  11. "github.com/spf13/cobra"
  12. "golang.org/x/crypto/openpgp/armor"
  13. "google.golang.org/protobuf/proto"
  14. "github.com/certusone/wormhole/node/pkg/devnet"
  15. nodev1 "github.com/certusone/wormhole/node/pkg/proto/node/v1"
  16. )
  17. var keyDescription *string
  18. const (
  19. GuardianKeyArmoredBlock = "WORMHOLE GUARDIAN PRIVATE KEY"
  20. )
  21. func init() {
  22. keyDescription = KeygenCmd.Flags().String("desc", "", "Human-readable key description (optional)")
  23. }
  24. var KeygenCmd = &cobra.Command{
  25. Use: "keygen [KEYFILE]",
  26. Short: "Create guardian key at the specified path",
  27. Run: runKeygen,
  28. Args: cobra.ExactArgs(1),
  29. }
  30. func runKeygen(cmd *cobra.Command, args []string) {
  31. lockMemory()
  32. setRestrictiveUmask()
  33. log.Print("Creating new key at ", args[0])
  34. gk, err := ecdsa.GenerateKey(ethcrypto.S256(), rand.Reader)
  35. if err != nil {
  36. log.Fatalf("failed to generate key: %v", err)
  37. }
  38. err = writeGuardianKey(gk, *keyDescription, args[0], false)
  39. if err != nil {
  40. log.Fatalf("failed to write key: %v", err)
  41. }
  42. }
  43. // loadGuardianKey loads a serialized guardian key from disk.
  44. func loadGuardianKey(filename string) (*ecdsa.PrivateKey, error) {
  45. f, err := os.Open(filename)
  46. if err != nil {
  47. return nil, fmt.Errorf("failed to open file: %w", err)
  48. }
  49. p, err := armor.Decode(f)
  50. if err != nil {
  51. return nil, fmt.Errorf("failed to read armored file: %w", err)
  52. }
  53. if p.Type != GuardianKeyArmoredBlock {
  54. return nil, fmt.Errorf("invalid block type: %s", p.Type)
  55. }
  56. b, err := ioutil.ReadAll(p.Body)
  57. if err != nil {
  58. return nil, fmt.Errorf("failed to read file: %w", err)
  59. }
  60. var m nodev1.GuardianKey
  61. err = proto.Unmarshal(b, &m)
  62. if err != nil {
  63. return nil, fmt.Errorf("failed to deserialize protobuf: %w", err)
  64. }
  65. if !*unsafeDevMode && m.UnsafeDeterministicKey {
  66. return nil, errors.New("refusing to use deterministic key in production")
  67. }
  68. gk, err := ethcrypto.ToECDSA(m.Data)
  69. if err != nil {
  70. return nil, fmt.Errorf("failed to deserialize raw key data: %w", err)
  71. }
  72. return gk, nil
  73. }
  74. // writeGuardianKey serializes a guardian key and writes it to disk.
  75. func writeGuardianKey(key *ecdsa.PrivateKey, description string, filename string, unsafe bool) error {
  76. if _, err := os.Stat(filename); !os.IsNotExist(err) {
  77. return errors.New("refusing to override existing key")
  78. }
  79. m := &nodev1.GuardianKey{
  80. Data: ethcrypto.FromECDSA(key),
  81. UnsafeDeterministicKey: unsafe,
  82. }
  83. // The private key is a really long-lived piece of data, and we really want to use the stable binary
  84. // protobuf encoding with field tags to make sure that we can safely evolve it in the future.
  85. b, err := proto.Marshal(m)
  86. if err != nil {
  87. panic(err)
  88. }
  89. f, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE, 0600)
  90. if err != nil {
  91. return fmt.Errorf("failed to open file: %w", err)
  92. }
  93. headers := map[string]string{
  94. "PublicKey": ethcrypto.PubkeyToAddress(key.PublicKey).String(),
  95. }
  96. if description != "" {
  97. headers["Description"] = description
  98. }
  99. a, err := armor.Encode(f, GuardianKeyArmoredBlock, headers)
  100. if err != nil {
  101. panic(err)
  102. }
  103. _, err = a.Write(b)
  104. if err != nil {
  105. return fmt.Errorf("failed to write to file: %w", err)
  106. }
  107. err = a.Close()
  108. if err != nil {
  109. return err
  110. }
  111. return f.Close()
  112. }
  113. // generateDevnetGuardianKey returns a deterministic testnet key.
  114. func generateDevnetGuardianKey() (*ecdsa.PrivateKey, error) {
  115. // Figure out our devnet index
  116. idx, err := devnet.GetDevnetIndex()
  117. if err != nil {
  118. return nil, err
  119. }
  120. // Generate guardian key
  121. return devnet.DeterministicEcdsaKeyByIndex(ethcrypto.S256(), uint64(idx)), nil
  122. }