[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

crypto-bundle/bc-wallet-common-hdwallet-controller

Repository files navigation

Bc-wallet-common-hdwallet-controller

Description

Application for control access to mnemonic derivation wallets. Application support flow for:

  • Create and manage mnemonic wallets
  • Open and manager wallet sessions
  • Prepare and close signature request

HdWallet-controller application is first part of hdwallet applications bundle. HdWallet-api application is second part of bundle which present in another repository - bc-wallet-common-hdwallet-api Third part - target blockchain plugin. For example:

Api

Service has three types of API:

Controller MangerAPI

Main purpose of ManagerAPI of bc-wallet-common-hdwallet-controller application is:

  • Limited access to HDWallet controller gRPC and nats-RPC methods
  • High-level wallet control - create or disable wallets, getting wallet info.
  • Getting information about HDWallet accounts

ManagerAPI Protection

ManagerAPI protected by JWT access token - common token for whole crypto-bundle system. You must provide SHA-256 hash of system token to application via Vault secrets - value of JWT_SYSTEM_ACCESS_TOKEN_HASH key from crypto-bundle/bc-wallet-common/jwt bucket

Controller WalletAPI

Main purpose of WalletAPI of bc-wallet-common-hdwallet-controller application is:

  • Limited access to wallet-level gRPC method
  • Getting information about wallet
  • Getting information about wallet sessions
  • Start, close wallet sessions
  • Getting information about HDWallet accounts
  • Prepare and execute sign requests

WalletAPI Protection

WalletAPI protected by JWT access-token. New access token will be created after execution of AddNewWallet or ImportWallet method. WalletAPI access tokens have access roles:

  • Reader role - can execute all gRPC methods except PrepareSignRequest, ExecuteSignReques
  • Signed role - can execute all gRPC methods
  • Fake signer - can execute all gRPC methods except ExecuteSignRequest

Also, WalletAPI protected by PoW-shield. Algorithm used for Proof of Work shield is Hashcash. Data for proof calculation:

  • Protobuf message body
  • Obscurity data (Last WalletSession UUID or content of JWT-token for first proof of wallet)
  • Nonce

Example of PoW-shield calculation - pkg/grpc/controller/interceptor_pow.go

Integration

Example of gRPC integration with HDWallet-controller application you can see in integration test /pkg/grpc/controller

Infrastructure dependencies

  • PostgreSQL as main persistent storage
  • Redis or redis-protocol compatible cache-server as cache storage
  • Nats - for communication between processing perimeters
  • Hashicorp Vault as service provider of secrets management and as provider of encrypt/decrypt sensitive information flow flow
  • Instance of bc-wallet-common-hdwallet-api for target blockchain

PostgreSQL

Database: bc-wallet-tron-hdwallet

Users:

  • Controller application:

    • Username: bc-wallet-tron-hdwallet-controller
    • Privileges: SELECT, INSERT, UPDATE
  • Migrator application:

    • Username: bc-wallet-tron-hdwallet-migrator
    • Privileges: CREATE, DELETE, DROP, SELECT, INSERT, UPDATE
  • Terraformer application:

    • Username: bc-wallet-tron-hdwallet-terraformer
    • Privileges: CREATE, DELETE, DROP, SELECT, INSERT, UPDATE
  • Migrations:

Redis

Redis used for store values of next entities:

  • Mnemonic Wallet's:
    • Key name template: <STAGE_PREFIX>__<APPLICATION_NAME>__MNEMONIC-WALLETS.<WALLET_UUID>
    • Example: DEV__BC-WALLET-TRON-HDWALLET-CONTROLLER__MNEMONIC-WALLETS.f14cf623-b1f3-40cf-8eb2-e18e51be08c
    • Expiration time: infinite
  • Mnemonic wallets sessions:
    • Key name template: <STAGE_PREFIX>__<APPLICATION_NAME>__MNEMONIC-WALLETS-SESSIONS.<WALLET_SESSION_UUID>
    • Example: DEV__BC-WALLET-TRON-HDWALLET-CONTROLLER__MNEMONIC-WALLETS-SESSIONS.f14cf623-b1f3-40cf-8eb2-e18e51be08c
    • Expiration time: equal to default wallet session expiration time from DEFAULT_WALLET_UNLOAD_INTERVAL env variable
  • Signature requests:
    • Key name template: <STAGE_PREFIX>__<APPLICATION_NAME>__SIGN_REQUESTS.<SIGN_REQUEST_UUID>
    • Example: DEV__BC-WALLET-TRON-HDWALLET-CONTROLLER__SIGN-REQUESTS.5dc0da6b-90ac-4fb2-8a1b-6f52f9df5c65
    • Expiration time: will expire with parent wallet session

Hashicorp Vault

Application required common and personal bucket with some secrets. Also, required personal auth token.

Tron example

Example for tron blockchain:

Auth token: bc-wallet-tron-hdwallet-controller

vault token create -display-name bc-wallet-tron-hdwallet-controller 

Buckets:

  • crypto-bundle/bc-wallet-common/jwt
    • JWT_SECRET_KEY - Application level JWT secret key
    • JWT_SYSTEM_ACCESS_TOKEN_HASH - SHA-256 hash of common crypto-bundle system JWT-token
  • crypto-bundle/bc-wallet-common/transit
    • VAULT_COMMON_TRANSIT_KEY
  • crypto-bundle/bc-wallet-tron-hdwallet/common
    • POSTGRESQL_DATABASE_NAME
    • VAULT_APP_ENCRYPTION_KEY
  • crypto-bundle/bc-wallet-tron-hdwallet/controller
    • NATS_PASSWORD
    • NATS_USER
    • POSTGRESQL_PASSWORD
    • POSTGRESQL_USERNAME
    • REDIS_PASSWORD
    • REDIS_USER
  • crypto-bundle/bc-wallet-tron-hdwallet/migrator
    • POSTGRESQL_PASSWORD
    • POSTGRESQL_USERNAME
  • crypto-bundle/bc-wallet-tron-hdwallet/terraformer
    • NATS_PASSWORD
    • NATS_USER
    • POSTGRESQL_PASSWORD
    • POSTGRESQL_USERNAME
    • REDIS_PASSWORD
    • REDIS_USER

Also, application required two encryption keys:

  • Common for whole crypto-bundle project transit key - crypto-bundle-bc-wallet-common-transit-key. Value with transit key name will be loaded from VAULT_COMMON_TRANSIT_KEY Vault variable, which stored in common bucket - crypto-bundle/bc-wallet-common/transit.

  • Target encryption key for hdwallet-controller and hdwallet-api - crypto-bundle-bc-wallet-tron-hdwallet Value with transit key name will be loaded from VAULT_APP_ENCRYPTION_KEY Vault variable, which stored in common bucket - crypto-bundle/bc-wallet-tron-hdwallet/common.

Bc-wallet-common-hdwallet-api

Repository of hdwallet-api - bc-wallet-common-hdwallet-api

Application must work in pair with instance bc-wallet-common-hdwallet-api. For example in case of Tron blockchain: Instance of bc-wallet-common-hdwallet-controller - bc-wallet-tron-hdwallet-controller must work instance of bc-wallet-common-hdwallet-api - bc-wallet-tron-hdwallet-api.

Communication between blockchain via gRPC unix-file socket connection. You can control socket file path by change HDWALLET_UNIX_SOCKET_PATH environment variable. Also, you can set target blockchain of hdwallet-controller and hdwallet-api via PROCESSING_NETWORK env variable.

Environment variables

Full example of env variables you can see in env-controller-example.env file.

Deployment

Currently, support only kubernetes deployment flow via Helm

Kubernetes

Application must be deployed as part of bc-wallet-<BLOCKCHAIN_NAME>-hdwallet bundle. Application must be started as single container in Kubernetes Pod with shared volume.

You can see example of HELM-chart deployment application in next repositories:

Contributors

Licence

bc-wallet-common-hdwallet-controller is licensed under the MIT NON-AI License.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages