-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor/wallet generic signer #1783
base: master
Are you sure you want to change the base?
Conversation
OBorce
commented
Jun 18, 2024
•
edited
Loading
edited
- add a generic signer provider for creating a software or a hardware signer
- make account key chain generic to allow using it with and without a VRF keychain
- add an implementation for the trezor signer
- copy auto generated trezor client to communicate with a connected trezor device
- add new hardware-wallet option when creating and opening a wallet in the CLI and RPC wallet commands
e1f4596
to
37b71b9
Compare
626b7d1
to
fb2af0d
Compare
726bb45
to
855cfce
Compare
@@ -287,3 +287,6 @@ opt-level = 2 | |||
[profile.dist] | |||
inherits = "release" | |||
lto = "off" | |||
|
|||
[features] | |||
trezor = [] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it should be enabled in CI
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this comment is still valid. We can't run tests on CI but we can at least build the code
1cd8110
to
c23f38d
Compare
let db = Arc::new(Store::new(DefaultBackend::new_in_memory()).unwrap()); | ||
let mut db_tx = db.transaction_rw_unlocked(None).unwrap(); | ||
|
||
let master_key_chain = MasterKeyChain::new_from_mnemonic( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- why mnemonic?
- I don't fully understand how it's tested, this is run manually right? It looks like possible to run emulator with cli and automate this. Let's maybe discuss it because I'm afraid such functionality is not tested enough
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The current test assumes the device will be initialized with the same mnemonic, but that can be fixed later as the tests can't run automatically now anyway.
To automate the tests I think we will need first to make the signing async, so that we can return from the wallet the status of the signing, i.e. when it is waiting for a button to be pressed on the trezor device
|
||
/// Create a wallet using a connected hardware wallet. Only the public keys will be kept in | ||
/// the software wallet | ||
#[arg(long, conflicts_with_all(["mnemonic", "passphrase"]))] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it also conflicts with whether_to_store_seed_phrase
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
whether_to_store_seed_phrase was a required parameter I am not sure if we should break backwards compatibility or not, that is why I left it alone, and just check that it is set to false.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should thenwhether_to_store_seed_phrase
be marked with required_unless_present("hardware_wallet")
or something like that? So people won't have to type it every time for hardware.
c23f38d
to
4824da8
Compare
6c3d058
to
037f258
Compare
Destination::AnyoneCanSpend, | ||
), | ||
TxOutput::DataDeposit(vec![1, 2, 3]), | ||
TxOutput::Htlc(OutputValue::Coin(burn_amount), Box::new(hash_lock)), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
there also should be a case for spending Htlc utxo with a secret
assert!(!devices.is_empty()); | ||
let client = devices.pop().unwrap().connect().unwrap(); | ||
|
||
let mut signer = TrezorSigner::new(chain_config.clone(), Arc::new(Mutex::new(client))); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- There should be some negative cases: where trezor failed to sign inputs with unknown keys or something like that.
- How does device become aware of private keys? I see that at the beginning of the test a key chain is created from mnemonic, but how trezor is related to that I don't understand (like initialising it with test mnemonic of something)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok I keep forgetting that this is manual test. So basically you have to recover a wallet from test mnemonic right?
- it will rescan the blokchain on wallet creation - wallet-create will only scan forward from the current block height
b459b54
to
dc97e1b
Compare