Skip to content
Snippets Groups Projects
Select Git revision
  • b4cbca182d66b62c2dadb8328127a2b5569c53d3
  • master default protected
  • network/gtest-1000 protected
  • upgradable-multisig
  • runtime/gtest-1000
  • network/gdev-800 protected
  • cgeek/issue-297-cpu
  • gdev-800-tests
  • update-docker-compose-rpc-squid-names
  • fix-252
  • 1000i100-test
  • hugo/tmp-0.9.1
  • network/gdev-803 protected
  • hugo/endpoint-gossip
  • network/gdev-802 protected
  • hugo/distance-precompute
  • network/gdev-900 protected
  • tuxmain/anonymous-tx
  • debug/podman
  • hugo/195-doc
  • hugo/195-graphql-schema
  • gtest-1000-0.11.0 protected
  • gtest-1000 protected
  • gdev-900-0.10.1 protected
  • gdev-900-0.10.0 protected
  • gdev-900-0.9.2 protected
  • gdev-800-0.8.0 protected
  • gdev-900-0.9.1 protected
  • gdev-900-0.9.0 protected
  • gdev-803 protected
  • gdev-802 protected
  • runtime-801 protected
  • gdev-800 protected
  • runtime-800-bis protected
  • runtime-800 protected
  • runtime-800-backup protected
  • runtime-701 protected
  • runtime-700 protected
  • runtime-600 protected
  • runtime-500 protected
  • v0.4.1 protected
41 results

pallet_provide_randomness.rs

Blame
  • key.rs 4.40 KiB
    // Copyright 2021 Axiom-Team
    //
    // This file is part of Duniter-v2S.
    //
    // Duniter-v2S is free software: you can redistribute it and/or modify
    // it under the terms of the GNU Affero General Public License as published by
    // the Free Software Foundation, version 3 of the License.
    //
    // Duniter-v2S is distributed in the hope that it will be useful,
    // but WITHOUT ANY WARRANTY; without even the implied warranty of
    // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    // GNU Affero General Public License for more details.
    //
    // You should have received a copy of the GNU Affero General Public License
    // along with Duniter-v2S. If not, see <https://www.gnu.org/licenses/>.
    
    use sc_cli::{
        utils, with_crypto_scheme, CryptoScheme, Error, KeystoreParams, SharedParams, SubstrateCli,
    };
    use sc_keystore::LocalKeystore;
    use sc_service::config::{BasePath, KeystoreConfig};
    use sp_core::crypto::{AccountId32, KeyTypeId, SecretString};
    use sp_keystore::{Keystore, KeystorePtr};
    use std::sync::Arc;
    
    #[derive(Debug, clap::Subcommand)]
    pub enum KeySubcommand {
        /// Generate session keys and store them in the keystore
        GenerateSessionKeys(GenSessionKeysCmd),
    
        #[allow(missing_docs)]
        #[clap(flatten)]
        Key(sc_cli::KeySubcommand),
    }
    
    impl KeySubcommand {
        /// Run the command
        pub fn run<C: SubstrateCli>(&self, cli: &C) -> Result<(), Error> {
            match self {
                Self::GenerateSessionKeys(cmd) => cmd.run(cli),
                Self::Key(cmd) => cmd.run(cli),
            }
        }
    }
    
    #[derive(Debug, clap::Args)]
    pub struct GenSessionKeysCmd {
        /// The secret key URI.
        /// If the value is a file, the file content is used as URI.
        /// If not given, you will be prompted for the URI.
        #[clap(long)]
        suri: Option<String>,
    
        #[allow(missing_docs)]
        #[clap(flatten)]
        pub shared_params: SharedParams,
    
        #[allow(missing_docs)]
        #[clap(flatten)]
        pub keystore_params: KeystoreParams,
    }
    
    const KEY_TYPES: [(KeyTypeId, CryptoScheme); 4] = [
        (KeyTypeId(*b"gran"), CryptoScheme::Ed25519),
        (KeyTypeId(*b"babe"), CryptoScheme::Sr25519),
        (KeyTypeId(*b"imon"), CryptoScheme::Sr25519),
        (KeyTypeId(*b"audi"), CryptoScheme::Sr25519),
    ];
    
    impl GenSessionKeysCmd {
        /// Run the command
        pub fn run<C: SubstrateCli>(&self, cli: &C) -> Result<(), Error> {
            let suri = utils::read_uri(self.suri.as_ref())?;
            let base_path = self
                .shared_params
                .base_path()?
                .unwrap_or_else(|| BasePath::from_project("", "", &C::executable_name()));
            let chain_id = self.shared_params.chain_id(self.shared_params.is_dev());
            let chain_spec = cli.load_spec(&chain_id)?;
            let config_dir = base_path.config_dir(chain_spec.id());
    
            let mut public_keys_bytes = Vec::with_capacity(128);
            for (key_type_id, crypto_scheme) in KEY_TYPES {
                let (keystore, public) = match self.keystore_params.keystore_config(&config_dir)? {
                    KeystoreConfig::Path { path, password } => {
                        let public =
                            with_crypto_scheme!(crypto_scheme, to_vec(&suri, password.clone()))?;
                        let keystore: KeystorePtr = Arc::new(LocalKeystore::open(path, password)?);
                        (keystore, public)
                    }
                    _ => unreachable!("keystore_config always returns path and password; qed"),
                };
    
                Keystore::insert(&*keystore, key_type_id, &suri, &public[..])
                    .map_err(|_| Error::KeystoreOperation)?;
    
                public_keys_bytes.extend_from_slice(&public[..]);
            }
    
            let mut buffer = [0; 32];
            // grandpa
            buffer.copy_from_slice(&public_keys_bytes[..32]);
            println!("grandpa: {}", AccountId32::new(buffer));
            // babe
            buffer.copy_from_slice(&public_keys_bytes[32..64]);
            println!("babe: {}", AccountId32::new(buffer));
            // im_online
            buffer.copy_from_slice(&public_keys_bytes[64..96]);
            println!("im_online: {}", AccountId32::new(buffer));
            // authority discovery
            buffer.copy_from_slice(&public_keys_bytes[96..]);
            println!("authority_discovery: {}", AccountId32::new(buffer));
    
            println!("Session Keys: 0x{}", hex::encode(public_keys_bytes));
            Ok(())
        }
    }
    
    fn to_vec<P: sp_core::Pair>(uri: &str, pass: Option<SecretString>) -> Result<Vec<u8>, Error> {
        let p = utils::pair_from_suri::<P>(uri, pass)?;
        Ok(p.public().as_ref().to_vec())
    }