2018-06-21 14:28:34 +00:00
|
|
|
# This file is part of the Trezor project.
|
2016-11-25 21:53:55 +00:00
|
|
|
#
|
2021-11-26 14:50:43 +00:00
|
|
|
# Copyright (C) 2012-2022 SatoshiLabs and contributors
|
2016-11-25 21:53:55 +00:00
|
|
|
#
|
|
|
|
# This library is free software: you can redistribute it and/or modify
|
2018-06-21 14:28:34 +00:00
|
|
|
# it under the terms of the GNU Lesser General Public License version 3
|
|
|
|
# as published by the Free Software Foundation.
|
2016-11-25 21:53:55 +00:00
|
|
|
#
|
|
|
|
# This library is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU Lesser General Public License for more details.
|
|
|
|
#
|
2018-06-21 14:28:34 +00:00
|
|
|
# You should have received a copy of the License along with this library.
|
|
|
|
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
|
2024-11-15 16:31:22 +00:00
|
|
|
from __future__ import annotations
|
2016-11-25 21:53:55 +00:00
|
|
|
|
2018-05-11 13:24:24 +00:00
|
|
|
import logging
|
2020-01-06 15:05:54 +00:00
|
|
|
import os
|
2024-11-15 16:31:22 +00:00
|
|
|
import typing as t
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
from . import mapping, messages, models
|
|
|
|
from .mapping import ProtobufMapping
|
|
|
|
from .tools import parse_path
|
|
|
|
from .transport import Transport, get_transport
|
|
|
|
from .transport.thp.channel_data import ChannelData
|
|
|
|
from .transport.thp.protocol_and_channel import ProtocolAndChannel
|
|
|
|
from .transport.thp.protocol_v1 import ProtocolV1
|
|
|
|
from .transport.thp.protocol_v2 import ProtocolV2
|
2018-12-03 15:56:01 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
if t.TYPE_CHECKING:
|
|
|
|
from .transport.session import Session
|
2023-02-17 10:44:31 +00:00
|
|
|
|
2018-05-11 13:24:24 +00:00
|
|
|
LOG = logging.getLogger(__name__)
|
2016-06-29 20:40:37 +00:00
|
|
|
|
2018-12-03 15:56:01 +00:00
|
|
|
MAX_PASSPHRASE_LENGTH = 50
|
2020-08-14 08:06:53 +00:00
|
|
|
MAX_PIN_LENGTH = 50
|
2016-06-29 20:40:37 +00:00
|
|
|
|
2020-01-29 14:19:44 +00:00
|
|
|
PASSPHRASE_ON_DEVICE = object()
|
feat(python): add full type information
WIP - typing the trezorctl apps
typing functions trezorlib/cli
addressing most of mypy issue for trezorlib apps and _internal folder
fixing broken device tests by changing asserts in debuglink.py
addressing most of mypy issues in trezorlib/cli folder
adding types to some untyped functions, mypy section in setup.cfg
typing what can be typed, some mypy fixes, resolving circular import issues
importing type objects in "if TYPE_CHECKING:" branch
fixing CI by removing assert in emulator, better ignore comments
CI assert fix, style fixes, new config options
fixup! CI assert fix, style fixes, new config options
type fixes after rebasing on master
fixing python3.6 and 3.7 unittests by importing Literal from typing_extensions
couple mypy and style fixes
fixes and improvements from code review
silencing all but one mypy issues
trial of typing the tools.expect function
fixup! trial of typing the tools.expect function
@expect and @session decorators correctly type-checked
Optional args in CLI where relevant, not using general list/tuple/dict where possible
python/Makefile commands, adding them into CI, ignoring last mypy issue
documenting overload for expect decorator, two mypy fixes coming from that
black style fix
improved typing of decorators, pyright config file
addressing or ignoring pyright errors, replacing mypy in CI by pyright
fixing incomplete assert causing device tests to fail
pyright issue that showed in CI but not locally, printing pyright version in CI
fixup! pyright issue that showed in CI but not locally, printing pyright version in CI
unifying type:ignore statements for pyright usage
resolving PIL.Image issues, pyrightconfig not excluding anything
replacing couple asserts with TypeGuard on safe_issubclass
better error handling of usb1 import for webusb
better error handling of hid import
small typing details found out by strict pyright mode
improvements from code review
chore(python): changing List to Sequence for protobuf messages
small code changes to reflect the protobuf change to Sequence
importing TypedDict from typing_extensions to support 3.6 and 3.7
simplify _format_access_list function
fixup! simplify _format_access_list function
typing tools folder
typing helper-scripts folder
some click typing
enforcing all functions to have typed arguments
reverting the changed argument name in tools
replacing TransportType with Transport
making PinMatrixRequest.type protobuf attribute required
reverting the protobuf change, making argument into get_pin Optional
small fixes in asserts
solving the session decorator type issues
fixup! solving the session decorator type issues
improvements from code review
fixing new pyright errors introduced after version increase
changing -> Iterable to -> Sequence in enumerate_devices, change in wait_for_devices
style change in debuglink.py
chore(python): adding type annotation to Sequences in messages.py
better "self and cls" types on Transport
fixup! better "self and cls" types on Transport
fixing some easy things from strict pyright run
2021-11-03 22:12:53 +00:00
|
|
|
PASSPHRASE_TEST_PATH = parse_path("44h/1h/0h/0/0")
|
2020-01-29 14:19:44 +00:00
|
|
|
|
2018-12-04 14:42:28 +00:00
|
|
|
OUTDATED_FIRMWARE_ERROR = """
|
|
|
|
Your Trezor firmware is out of date. Update it with the following command:
|
|
|
|
trezorctl firmware-update
|
2021-04-16 14:18:48 +00:00
|
|
|
Or visit https://suite.trezor.io/
|
2018-12-04 14:42:28 +00:00
|
|
|
""".strip()
|
|
|
|
|
2017-06-23 19:31:42 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
LOG = logging.getLogger(__name__)
|
2019-02-01 13:34:00 +00:00
|
|
|
|
2018-11-14 13:44:05 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
class TrezorClient:
|
|
|
|
button_callback: t.Callable[[Session, t.Any], t.Any] | None = None
|
|
|
|
pin_callback: t.Callable[[Session, t.Any], t.Any] | None = None
|
2018-11-13 15:12:20 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
_management_session: Session | None = None
|
|
|
|
_features: messages.Features | None = None
|
2023-10-17 10:02:40 +00:00
|
|
|
|
2019-11-08 08:43:32 +00:00
|
|
|
def __init__(
|
2020-09-25 11:59:16 +00:00
|
|
|
self,
|
2024-11-15 16:31:22 +00:00
|
|
|
transport: Transport,
|
|
|
|
protobuf_mapping: ProtobufMapping | None = None,
|
|
|
|
protocol: ProtocolAndChannel | None = None,
|
feat(python): add full type information
WIP - typing the trezorctl apps
typing functions trezorlib/cli
addressing most of mypy issue for trezorlib apps and _internal folder
fixing broken device tests by changing asserts in debuglink.py
addressing most of mypy issues in trezorlib/cli folder
adding types to some untyped functions, mypy section in setup.cfg
typing what can be typed, some mypy fixes, resolving circular import issues
importing type objects in "if TYPE_CHECKING:" branch
fixing CI by removing assert in emulator, better ignore comments
CI assert fix, style fixes, new config options
fixup! CI assert fix, style fixes, new config options
type fixes after rebasing on master
fixing python3.6 and 3.7 unittests by importing Literal from typing_extensions
couple mypy and style fixes
fixes and improvements from code review
silencing all but one mypy issues
trial of typing the tools.expect function
fixup! trial of typing the tools.expect function
@expect and @session decorators correctly type-checked
Optional args in CLI where relevant, not using general list/tuple/dict where possible
python/Makefile commands, adding them into CI, ignoring last mypy issue
documenting overload for expect decorator, two mypy fixes coming from that
black style fix
improved typing of decorators, pyright config file
addressing or ignoring pyright errors, replacing mypy in CI by pyright
fixing incomplete assert causing device tests to fail
pyright issue that showed in CI but not locally, printing pyright version in CI
fixup! pyright issue that showed in CI but not locally, printing pyright version in CI
unifying type:ignore statements for pyright usage
resolving PIL.Image issues, pyrightconfig not excluding anything
replacing couple asserts with TypeGuard on safe_issubclass
better error handling of usb1 import for webusb
better error handling of hid import
small typing details found out by strict pyright mode
improvements from code review
chore(python): changing List to Sequence for protobuf messages
small code changes to reflect the protobuf change to Sequence
importing TypedDict from typing_extensions to support 3.6 and 3.7
simplify _format_access_list function
fixup! simplify _format_access_list function
typing tools folder
typing helper-scripts folder
some click typing
enforcing all functions to have typed arguments
reverting the changed argument name in tools
replacing TransportType with Transport
making PinMatrixRequest.type protobuf attribute required
reverting the protobuf change, making argument into get_pin Optional
small fixes in asserts
solving the session decorator type issues
fixup! solving the session decorator type issues
improvements from code review
fixing new pyright errors introduced after version increase
changing -> Iterable to -> Sequence in enumerate_devices, change in wait_for_devices
style change in debuglink.py
chore(python): adding type annotation to Sequences in messages.py
better "self and cls" types on Transport
fixup! better "self and cls" types on Transport
fixing some easy things from strict pyright run
2021-11-03 22:12:53 +00:00
|
|
|
) -> None:
|
2017-09-04 11:36:08 +00:00
|
|
|
self.transport = transport
|
2024-11-15 16:31:22 +00:00
|
|
|
|
|
|
|
if protobuf_mapping is None:
|
|
|
|
self.mapping = mapping.DEFAULT_MAPPING
|
2014-03-28 15:26:48 +00:00
|
|
|
else:
|
2024-11-15 16:31:22 +00:00
|
|
|
self.mapping = protobuf_mapping
|
|
|
|
if protocol is None:
|
|
|
|
try:
|
|
|
|
self.protocol = self._get_protocol()
|
|
|
|
except Exception as e:
|
|
|
|
print(e)
|
|
|
|
else:
|
|
|
|
self.protocol = protocol
|
|
|
|
self.protocol.mapping = self.mapping
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def resume(
|
|
|
|
cls,
|
|
|
|
transport: Transport,
|
|
|
|
channel_data: ChannelData,
|
|
|
|
protobuf_mapping: ProtobufMapping | None = None,
|
|
|
|
) -> TrezorClient:
|
|
|
|
if protobuf_mapping is None:
|
|
|
|
protobuf_mapping = mapping.DEFAULT_MAPPING
|
|
|
|
protocol_v1 = ProtocolV1(transport, protobuf_mapping)
|
|
|
|
if channel_data.protocol_version == 2:
|
|
|
|
try:
|
|
|
|
protocol_v1.write(messages.Ping(message="Sanity check - to resume"))
|
|
|
|
except Exception as e:
|
|
|
|
print(type(e))
|
|
|
|
response = protocol_v1.read()
|
|
|
|
if (
|
|
|
|
isinstance(response, messages.Failure)
|
|
|
|
and response.code == messages.FailureType.InvalidProtocol
|
|
|
|
):
|
|
|
|
protocol = ProtocolV2(transport, protobuf_mapping, channel_data)
|
|
|
|
protocol.write(0, messages.Ping())
|
|
|
|
response = protocol.read(0)
|
|
|
|
if not isinstance(response, messages.Success):
|
|
|
|
LOG.debug("Failed to resume ProtocolV2")
|
|
|
|
raise Exception("Failed to resume ProtocolV2")
|
|
|
|
LOG.debug("Protocol V2 detected - can be resumed")
|
2018-11-13 15:05:49 +00:00
|
|
|
else:
|
2024-11-15 16:31:22 +00:00
|
|
|
LOG.debug("Failed to resume ProtocolV2")
|
|
|
|
raise Exception("Failed to resume ProtocolV2")
|
|
|
|
else:
|
|
|
|
protocol = ProtocolV1(transport, protobuf_mapping, channel_data)
|
|
|
|
return TrezorClient(transport, protobuf_mapping, protocol)
|
2020-04-29 13:46:47 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
def get_session(
|
2021-10-20 11:15:33 +00:00
|
|
|
self,
|
2024-11-15 16:31:22 +00:00
|
|
|
passphrase: str | None = None,
|
|
|
|
derive_cardano: bool = False,
|
|
|
|
) -> Session:
|
|
|
|
"""
|
|
|
|
Returns initialized session (with derived seed).
|
|
|
|
|
|
|
|
Will fail if the device is not initialized
|
2020-04-29 13:46:47 +00:00
|
|
|
"""
|
2024-11-15 16:31:22 +00:00
|
|
|
from .transport.session import SessionV1, SessionV2
|
|
|
|
|
|
|
|
if isinstance(self.protocol, ProtocolV1):
|
2024-11-25 09:40:05 +00:00
|
|
|
if passphrase is None:
|
|
|
|
passphrase = ""
|
2024-11-15 16:31:22 +00:00
|
|
|
return SessionV1.new(self, passphrase, derive_cardano)
|
|
|
|
if isinstance(self.protocol, ProtocolV2):
|
|
|
|
return SessionV2.new(self, passphrase, derive_cardano)
|
|
|
|
raise NotImplementedError # TODO
|
|
|
|
|
2024-11-22 22:10:24 +00:00
|
|
|
def resume_session(self, session: Session):
|
2024-11-25 09:40:05 +00:00
|
|
|
"""
|
|
|
|
Note: this function potentially modifies the input session.
|
|
|
|
"""
|
2024-11-22 22:10:24 +00:00
|
|
|
from trezorlib.transport.session import SessionV1, SessionV2
|
2024-11-25 09:40:05 +00:00
|
|
|
from trezorlib.debuglink import SessionDebugWrapper
|
|
|
|
|
|
|
|
if isinstance(session, SessionDebugWrapper):
|
|
|
|
session = session._session
|
2024-11-22 22:10:24 +00:00
|
|
|
|
|
|
|
if isinstance(session, SessionV2):
|
|
|
|
return session
|
|
|
|
elif isinstance(session, SessionV1):
|
|
|
|
session.init_session()
|
|
|
|
return session
|
|
|
|
|
|
|
|
else:
|
|
|
|
raise NotImplementedError
|
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
def get_management_session(self, new_session: bool = False) -> Session:
|
|
|
|
from .transport.session import SessionV1, SessionV2
|
|
|
|
|
|
|
|
if not new_session and self._management_session is not None:
|
|
|
|
return self._management_session
|
|
|
|
if isinstance(self.protocol, ProtocolV1):
|
|
|
|
self._management_session = SessionV1.new(self, "", False)
|
|
|
|
elif isinstance(self.protocol, ProtocolV2):
|
|
|
|
self._management_session = SessionV2(self, b"\x00")
|
|
|
|
assert self._management_session is not None
|
|
|
|
return self._management_session
|
|
|
|
|
|
|
|
@property
|
|
|
|
def features(self) -> messages.Features:
|
|
|
|
if self._features is None:
|
|
|
|
self._features = self.protocol.get_features()
|
|
|
|
assert self._features is not None
|
|
|
|
return self._features
|
|
|
|
|
|
|
|
@property
|
|
|
|
def model(self) -> models.TrezorModel:
|
|
|
|
f = self.features
|
|
|
|
model = models.by_name(f.model or "1")
|
|
|
|
|
|
|
|
if model is None:
|
|
|
|
raise RuntimeError(
|
|
|
|
"Unsupported Trezor model"
|
|
|
|
f" (internal_model: {f.internal_model}, model: {f.model})"
|
2021-10-20 11:15:33 +00:00
|
|
|
)
|
2024-11-15 16:31:22 +00:00
|
|
|
return model
|
|
|
|
|
|
|
|
@property
|
|
|
|
def version(self) -> tuple[int, int, int]:
|
|
|
|
f = self.features
|
|
|
|
ver = (
|
|
|
|
f.major_version,
|
|
|
|
f.minor_version,
|
|
|
|
f.patch_version,
|
2021-10-20 11:15:33 +00:00
|
|
|
)
|
2024-11-15 16:31:22 +00:00
|
|
|
return ver
|
2014-01-27 10:25:27 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
def refresh_features(self) -> None:
|
|
|
|
self.protocol.update_features()
|
|
|
|
self._features = self.protocol.get_features()
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
def ensure_unlocked(self) -> None:
|
|
|
|
# TODO implement
|
|
|
|
raise NotImplementedError
|
2013-09-13 03:31:24 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
def _get_protocol(self) -> ProtocolAndChannel:
|
|
|
|
self.transport.open()
|
2020-04-29 13:46:47 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
protocol = ProtocolV1(self.transport, mapping.DEFAULT_MAPPING)
|
2020-04-29 13:46:47 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
protocol.write(messages.Initialize())
|
2020-04-29 13:46:47 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
response = protocol.read()
|
|
|
|
self.transport.close()
|
|
|
|
if isinstance(response, messages.Failure):
|
|
|
|
if response.code == messages.FailureType.InvalidProtocol:
|
|
|
|
LOG.debug("Protocol V2 detected")
|
|
|
|
protocol = ProtocolV2(self.transport, self.mapping)
|
|
|
|
return protocol
|
2020-04-29 13:46:47 +00:00
|
|
|
|
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
def get_default_client(
|
|
|
|
path: t.Optional[str] = None,
|
|
|
|
**kwargs: t.Any,
|
|
|
|
) -> "TrezorClient":
|
|
|
|
"""Get a client for a connected Trezor device.
|
2020-04-29 13:46:47 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
Returns a TrezorClient instance with minimum fuss.
|
2020-04-29 13:46:47 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
If path is specified, does a prefix-search for the specified device. Otherwise, uses
|
|
|
|
the value of TREZOR_PATH env variable, or finds first connected Trezor.
|
|
|
|
If no UI is supplied, instantiates the default CLI UI.
|
|
|
|
"""
|
2020-12-11 10:41:15 +00:00
|
|
|
|
2024-11-15 16:31:22 +00:00
|
|
|
if path is None:
|
|
|
|
path = os.getenv("TREZOR_PATH")
|
|
|
|
|
|
|
|
transport = get_transport(path, prefix_search=True)
|
|
|
|
|
|
|
|
return TrezorClient(transport, **kwargs)
|
|
|
|
|
|
|
|
|
|
|
|
# class TrezorClient(t.Generic[UI]):
|
|
|
|
# """Trezor client, a connection to a Trezor device.
|
|
|
|
|
|
|
|
# This class allows you to manage connection state, send and receive protobuf
|
|
|
|
# messages, handle user interactions, and perform some generic tasks
|
|
|
|
# (send a cancel message, initialize or clear a session, ping the device).
|
|
|
|
# """
|
|
|
|
|
|
|
|
# model: models.TrezorModel
|
|
|
|
# transport: "Transport"
|
|
|
|
# session_id: t.Optional[bytes]
|
|
|
|
# ui: UI
|
|
|
|
# features: messages.Features
|
|
|
|
|
|
|
|
# def __init__(
|
|
|
|
# self,
|
|
|
|
# transport: "Transport",
|
|
|
|
# ui: UI,
|
|
|
|
# session_id: t.Optional[bytes] = None,
|
|
|
|
# derive_cardano: t.Optional[bool] = None,
|
|
|
|
# model: t.Optional[models.TrezorModel] = None,
|
|
|
|
# _init_device: bool = True,
|
|
|
|
# ) -> None:
|
|
|
|
# """Create a TrezorClient instance.
|
|
|
|
|
|
|
|
# You have to provide a `transport`, i.e., a raw connection to the device. You can
|
|
|
|
# use `trezorlib.transport.get_transport` to find one.
|
|
|
|
|
|
|
|
# You have to provide a UI implementation for the three kinds of interaction:
|
|
|
|
# - button request (notify the user that their interaction is needed)
|
|
|
|
# - PIN request (on T1, ask the user to input numbers for a PIN matrix)
|
|
|
|
# - passphrase request (ask the user to enter a passphrase) See `trezorlib.ui` for
|
|
|
|
# details.
|
|
|
|
|
|
|
|
# You can supply a `session_id` you might have saved in the previous session. If
|
|
|
|
# you do, the user might not need to enter their passphrase again.
|
|
|
|
|
|
|
|
# You can provide Trezor model information. If not provided, it is detected from
|
|
|
|
# the model name reported at initialization time.
|
|
|
|
|
|
|
|
# By default, the instance will open a connection to the Trezor device, send an
|
|
|
|
# `Initialize` message, set up the `features` field from the response, and connect
|
|
|
|
# to a session. By specifying `_init_device=False`, this step is skipped. Notably,
|
|
|
|
# this means that `client.features` is unset. Use `client.init_device()` or
|
|
|
|
# `client.refresh_features()` to fix that, otherwise A LOT OF THINGS will break.
|
|
|
|
# Only use this if you are _sure_ that you know what you are doing. This feature
|
|
|
|
# might be removed at any time.
|
|
|
|
# """
|
|
|
|
# LOG.info(f"creating client instance for device: {transport.get_path()}")
|
|
|
|
# # Here, self.model could be set to None. Unless _init_device is False, it will
|
|
|
|
# # get correctly reconfigured as part of the init_device flow.
|
|
|
|
# self.model = model # type: ignre ["None" is incompatible with "TrezorModel"]
|
|
|
|
# if self.model:
|
|
|
|
# self.mapping = self.model.default_mapping
|
|
|
|
# else:
|
|
|
|
# self.mapping = mapping.DEFAULT_MAPPING
|
|
|
|
# self.transport = transport
|
|
|
|
# self.ui = ui
|
|
|
|
# self.session_counter = 0
|
|
|
|
# self.session_id = session_id
|
|
|
|
# if _init_device:
|
|
|
|
# self.init_device(session_id=session_id, derive_cardano=derive_cardano)
|
|
|
|
# self.resume_session()
|
|
|
|
|
|
|
|
# def open(self) -> None:
|
|
|
|
# if self.session_counter == 0:
|
|
|
|
# session_id = self.transport.resume_session(b"")
|
|
|
|
# if self.session_id != session_id:
|
|
|
|
# print("Failed to resume session, allocated a new session")
|
|
|
|
# self.session_id = session_id
|
|
|
|
# self.transport.deprecated_begin_session()
|
|
|
|
# self.session_counter += 1
|
|
|
|
|
|
|
|
# def resume_session(self) -> None:
|
|
|
|
# new_id = self.transport.resume_session(self.session_id or b"")
|
|
|
|
# if self.session_id != new_id:
|
|
|
|
# print("Failed to resume session, allocated a new session")
|
|
|
|
# self.session_id = new_id
|
|
|
|
|
|
|
|
# def close(self) -> None:
|
|
|
|
# self.session_counter = max(self.session_counter - 1, 0)
|
|
|
|
# if self.session_counter == 0:
|
|
|
|
# # TODO call EndSession here?
|
|
|
|
# self.transport.deprecated_end_session()
|
|
|
|
|
|
|
|
# def cancel(self) -> None:
|
|
|
|
# self._raw_write(messages.Cancel())
|
|
|
|
|
|
|
|
# def call_raw(self, msg: "MessageType") -> "MessageType":
|
|
|
|
# __tracebackhide__ = True # for pytest # pylint: disable=W0612
|
|
|
|
|
|
|
|
# self._raw_write(msg)
|
|
|
|
# x = self._raw_read()
|
|
|
|
# return x
|
|
|
|
|
|
|
|
# def _raw_write(self, msg: "MessageType") -> None:
|
|
|
|
# __tracebackhide__ = True # for pytest # pylint: disable=W0612
|
|
|
|
# LOG.debug(
|
|
|
|
# f"sending message: {msg.__class__.__name__}",
|
|
|
|
# extra={"protobuf": msg},
|
|
|
|
# )
|
|
|
|
# msg_type, msg_bytes = self.mapping.encode(msg)
|
|
|
|
# LOG.log(
|
|
|
|
# DUMP_BYTES,
|
|
|
|
# f"encoded as type {msg_type} ({len(msg_bytes)} bytes): {msg_bytes.hex()}",
|
|
|
|
# )
|
|
|
|
# self.transport.write(msg_type, msg_bytes)
|
|
|
|
|
|
|
|
# def _raw_read(self) -> "MessageType":
|
|
|
|
# __tracebackhide__ = True # for pytest # pylint: disable=W0612
|
|
|
|
# msg_type, msg_bytes = self.transport.read()
|
|
|
|
# print("type/data", msg_type, msg_bytes)
|
|
|
|
# LOG.log(
|
|
|
|
# DUMP_BYTES,
|
|
|
|
# f"received type {msg_type} ({len(msg_bytes)} bytes): {msg_bytes.hex()}",
|
|
|
|
# )
|
|
|
|
# msg = self.mapping.decode(msg_type, msg_bytes)
|
|
|
|
# LOG.debug(
|
|
|
|
# f"received message: {msg.__class__.__name__}",
|
|
|
|
# extra={"protobuf": msg},
|
|
|
|
# )
|
|
|
|
# return msg
|
|
|
|
|
|
|
|
# def _callback_pin(self, msg: messages.PinMatrixRequest) -> "MessageType":
|
|
|
|
# try:
|
|
|
|
# pin = self.ui.get_pin(msg.type)
|
|
|
|
# except exceptions.Cancelled:
|
|
|
|
# self.call_raw(messages.Cancel())
|
|
|
|
# raise
|
|
|
|
|
|
|
|
# if any(d not in "123456789" for d in pin) or not (
|
|
|
|
# 1 <= len(pin) <= MAX_PIN_LENGTH
|
|
|
|
# ):
|
|
|
|
# self.call_raw(messages.Cancel())
|
|
|
|
# raise ValueError("Invalid PIN provided")
|
|
|
|
|
|
|
|
# resp = self.call_raw(messages.PinMatrixAck(pin=pin))
|
|
|
|
# if isinstance(resp, messages.Failure) and resp.code in (
|
|
|
|
# messages.FailureType.PinInvalid,
|
|
|
|
# messages.FailureType.PinCancelled,
|
|
|
|
# messages.FailureType.PinExpected,
|
|
|
|
# ):
|
|
|
|
# raise exceptions.PinException(resp.code, resp.message)
|
|
|
|
# else:
|
|
|
|
# return resp
|
|
|
|
|
|
|
|
# def _callback_passphrase(self, msg: messages.PassphraseRequest) -> "MessageType":
|
|
|
|
# available_on_device = Capability.PassphraseEntry in self.features.capabilities
|
|
|
|
|
|
|
|
# def send_passphrase(
|
|
|
|
# passphrase: t.Optional[str] = None, on_device: t.Optional[bool] = None
|
|
|
|
# ) -> "MessageType":
|
|
|
|
# msg = messages.PassphraseAck(passphrase=passphrase, on_device=on_device)
|
|
|
|
# resp = self.call_raw(msg)
|
|
|
|
# if isinstance(resp, messages.Deprecated_PassphraseStateRequest):
|
|
|
|
# self.session_id = resp.state
|
|
|
|
# resp = self.call_raw(messages.Deprecated_PassphraseStateAck())
|
|
|
|
# return resp
|
|
|
|
|
|
|
|
# # short-circuit old style entry
|
|
|
|
# if msg._on_device is True:
|
|
|
|
# return send_passphrase(None, None)
|
|
|
|
|
|
|
|
# try:
|
|
|
|
# passphrase = self.ui.get_passphrase(available_on_device=available_on_device)
|
|
|
|
# except exceptions.Cancelled:
|
|
|
|
# self.call_raw(messages.Cancel())
|
|
|
|
# raise
|
|
|
|
|
|
|
|
# if passphrase is PASSPHRASE_ON_DEVICE:
|
|
|
|
# if not available_on_device:
|
|
|
|
# self.call_raw(messages.Cancel())
|
|
|
|
# raise RuntimeError("Device is not capable of entering passphrase")
|
|
|
|
# else:
|
|
|
|
# return send_passphrase(on_device=True)
|
|
|
|
|
|
|
|
# # else process host-entered passphrase
|
|
|
|
# if not isinstance(passphrase, str):
|
|
|
|
# raise RuntimeError("Passphrase must be a str")
|
|
|
|
# passphrase = Mnemonic.normalize_string(passphrase)
|
|
|
|
# if len(passphrase) > MAX_PASSPHRASE_LENGTH:
|
|
|
|
# self.call_raw(messages.Cancel())
|
|
|
|
# raise ValueError("Passphrase too long")
|
|
|
|
|
|
|
|
# return send_passphrase(passphrase, on_device=False)
|
|
|
|
|
|
|
|
# def _callback_button(self, msg: messages.ButtonRequest) -> "MessageType":
|
|
|
|
# __tracebackhide__ = True # for pytest # pylint: disable=W0612
|
|
|
|
# # do this raw - send ButtonAck first, notify UI later
|
|
|
|
# self._raw_write(messages.ButtonAck())
|
|
|
|
# self.ui.button_request(msg)
|
|
|
|
# return self._raw_read()
|
|
|
|
|
|
|
|
# @session
|
|
|
|
# def call(self, msg: "MessageType") -> "MessageType":
|
|
|
|
# self.check_firmware_version()
|
|
|
|
# resp = self.call_raw(msg)
|
|
|
|
# while True:
|
|
|
|
# if isinstance(resp, messages.PinMatrixRequest):
|
|
|
|
# resp = self._callback_pin(resp)
|
|
|
|
# elif isinstance(resp, messages.PassphraseRequest):
|
|
|
|
# resp = self._callback_passphrase(resp)
|
|
|
|
# elif isinstance(resp, messages.ButtonRequest):
|
|
|
|
# resp = self._callback_button(resp)
|
|
|
|
# elif isinstance(resp, messages.Failure):
|
|
|
|
# print("self.call-failure")
|
|
|
|
|
|
|
|
# if resp.code == messages.FailureType.ActionCancelled:
|
|
|
|
# raise exceptions.Cancelled
|
|
|
|
# raise exceptions.TrezorFailure(resp)
|
|
|
|
# else:
|
|
|
|
# print("self.call-end")
|
|
|
|
# return resp
|
|
|
|
|
|
|
|
# def _refresh_features(self, features: messages.Features) -> None:
|
|
|
|
# """Update internal fields based on passed-in Features message."""
|
|
|
|
|
|
|
|
# if not self.model:
|
|
|
|
# # Trezor Model One bootloader 1.8.0 or older does not send model name
|
|
|
|
# model = models.by_internal_name(features.internal_model)
|
|
|
|
# if model is None:
|
|
|
|
# model = models.by_name(features.model or "1")
|
|
|
|
# if model is None:
|
|
|
|
# raise RuntimeError(
|
|
|
|
# "Unsupported Trezor model"
|
|
|
|
# f" (internal_model: {features.internal_model}, model: {features.model})"
|
|
|
|
# )
|
|
|
|
# self.model = model
|
|
|
|
|
|
|
|
# if features.vendor not in self.model.vendors:
|
|
|
|
# raise RuntimeError("Unsupported device")
|
|
|
|
|
|
|
|
# self.features = features
|
|
|
|
# self.version = (
|
|
|
|
# self.features.major_version,
|
|
|
|
# self.features.minor_version,
|
|
|
|
# self.features.patch_version,
|
|
|
|
# )
|
|
|
|
# self.check_firmware_version(warn_only=True)
|
|
|
|
# if self.features.session_id is not None:
|
|
|
|
# self.session_id = self.features.session_id
|
|
|
|
# self.features.session_id = None
|
|
|
|
|
|
|
|
# @session
|
|
|
|
# def refresh_features(self) -> messages.Features:
|
|
|
|
# """Reload features from the device.
|
|
|
|
|
|
|
|
# Should be called after changing settings or performing operations that affect
|
|
|
|
# device state.
|
|
|
|
# """
|
|
|
|
# resp = self.call_raw(messages.GetFeatures())
|
|
|
|
# if not isinstance(resp, messages.Features):
|
|
|
|
# raise exceptions.TrezorException("Unexpected response to GetFeatures")
|
|
|
|
# self._refresh_features(resp)
|
|
|
|
# return resp
|
|
|
|
|
|
|
|
# def init_device(
|
|
|
|
# self,
|
|
|
|
# *,
|
|
|
|
# session_id: t.Optional[bytes] = None,
|
|
|
|
# new_session: bool = False,
|
|
|
|
# derive_cardano: t.Optional[bool] = None,
|
|
|
|
# ) -> t.Optional[bytes]:
|
|
|
|
# """Initialize the device and return a session ID.
|
|
|
|
|
|
|
|
# You can optionally specify a session ID. If the session still exists on the
|
|
|
|
# device, the same session ID will be returned and the session is resumed.
|
|
|
|
# Otherwise a different session ID is returned.
|
|
|
|
|
|
|
|
# Specify `new_session=True` to open a fresh session. Since firmware version
|
|
|
|
# 1.9.0/2.3.0, the previous session will remain cached on the device, and can be
|
|
|
|
# resumed by calling `init_device` again with the appropriate session ID.
|
|
|
|
|
|
|
|
# If neither `new_session` nor `session_id` is specified, the current session ID
|
|
|
|
# will be reused. If no session ID was cached, a new session ID will be allocated
|
|
|
|
# and returned.
|
|
|
|
|
|
|
|
# # Version notes:
|
|
|
|
|
|
|
|
# Trezor One older than 1.9.0 does not have session management. Optional arguments
|
|
|
|
# have no effect and the function returns None
|
|
|
|
|
|
|
|
# Trezor T older than 2.3.0 does not have session cache. Requesting a new session
|
|
|
|
# will overwrite the old one. In addition, this function will always return None.
|
|
|
|
# A valid session_id can be obtained from the `session_id` attribute, but only
|
|
|
|
# after a passphrase-protected call is performed. You can use the following code:
|
|
|
|
|
|
|
|
# >>> client.init_device()
|
|
|
|
# >>> client.ensure_unlocked()
|
|
|
|
# >>> valid_session_id = client.session_id
|
|
|
|
# """
|
|
|
|
# if new_session:
|
|
|
|
# self.session_id = None
|
|
|
|
# elif session_id is not None:
|
|
|
|
# self.session_id = session_id
|
|
|
|
|
|
|
|
# print("before init conn")
|
|
|
|
|
|
|
|
# resp = self.transport.initialize_connection(
|
|
|
|
# mapping=self.mapping,
|
|
|
|
# session_id=session_id,
|
|
|
|
# derive_cardano=derive_cardano,
|
|
|
|
# )
|
|
|
|
# print("here")
|
|
|
|
# if isinstance(resp, messages.Failure):
|
|
|
|
# # can happen if `derive_cardano` does not match the current session
|
|
|
|
# raise exceptions.TrezorFailure(resp)
|
|
|
|
# if not isinstance(resp, messages.Features):
|
|
|
|
# raise exceptions.TrezorException("Unexpected response to Initialize")
|
|
|
|
|
|
|
|
# if self.session_id is not None and resp.session_id == self.session_id:
|
|
|
|
# LOG.info("Successfully resumed session")
|
|
|
|
# elif session_id is not None:
|
|
|
|
# LOG.info("Failed to resume session")
|
|
|
|
|
|
|
|
# # TT < 2.3.0 compatibility:
|
|
|
|
# # _refresh_features will clear out the session_id field. We want this function
|
|
|
|
# # to return its value, so that callers can rely on it being either a valid
|
|
|
|
# # session_id, or None if we can't do that.
|
|
|
|
# # Older TT FW does not report session_id in Features and self.session_id might
|
|
|
|
# # be invalid because TT will not allocate a session_id until a passphrase
|
|
|
|
# # exchange happens.
|
|
|
|
# reported_session_id = resp.session_id
|
|
|
|
# self._refresh_features(resp)
|
|
|
|
# print("there:", reported_session_id)
|
|
|
|
# return reported_session_id
|
|
|
|
|
|
|
|
# def is_outdated(self) -> bool:
|
|
|
|
# if self.features.bootloader_mode:
|
|
|
|
# return False
|
|
|
|
# return self.version < self.model.minimum_version
|
|
|
|
|
|
|
|
# def check_firmware_version(self, warn_only: bool = False) -> None:
|
|
|
|
# if self.is_outdated():
|
|
|
|
# if warn_only:
|
|
|
|
# warnings.warn("Firmware is out of date", stacklevel=2)
|
|
|
|
# else:
|
|
|
|
# raise exceptions.OutdatedFirmwareError(OUTDATED_FIRMWARE_ERROR)
|
|
|
|
|
|
|
|
# @expect(messages.Success, field="message", ret_type=str)
|
|
|
|
# def ping(
|
|
|
|
# self,
|
|
|
|
# msg: str,
|
|
|
|
# button_protection: bool = False,
|
|
|
|
# ) -> "MessageType":
|
|
|
|
# # We would like ping to work on any valid TrezorClient instance, but
|
|
|
|
# # due to the protection modes, we need to go through self.call, and that will
|
|
|
|
# # raise an exception if the firmware is too old.
|
|
|
|
# # So we short-circuit the simplest variant of ping with call_raw.
|
|
|
|
# if not button_protection:
|
|
|
|
# # XXX this should be: `with self:`
|
|
|
|
# try:
|
|
|
|
# self.open()
|
|
|
|
# resp = self.call_raw(messages.Ping(message=msg))
|
|
|
|
# if isinstance(resp, messages.ButtonRequest):
|
|
|
|
# # device is PIN-locked.
|
|
|
|
# # respond and hope for the best
|
|
|
|
# resp = self._callback_button(resp)
|
|
|
|
# return resp
|
|
|
|
# finally:
|
|
|
|
# self.close()
|
|
|
|
|
|
|
|
# return self.call(
|
|
|
|
# messages.Ping(message=msg, button_protection=button_protection)
|
|
|
|
# )
|
|
|
|
|
|
|
|
# def get_device_id(self) -> t.Optional[str]:
|
|
|
|
# return self.features.device_id
|
|
|
|
|
|
|
|
# @session
|
|
|
|
# def lock(self, *, _refresh_features: bool = True) -> None:
|
|
|
|
# """Lock the device.
|
|
|
|
|
|
|
|
# If the device does not have a PIN configured, this will do nothing.
|
|
|
|
# Otherwise, a lock screen will be shown and the device will prompt for PIN
|
|
|
|
# before further actions.
|
|
|
|
|
|
|
|
# This call does _not_ invalidate passphrase cache. If passphrase is in use,
|
|
|
|
# the device will not prompt for it after unlocking.
|
|
|
|
|
|
|
|
# To invalidate passphrase cache, use `end_session()`. To lock _and_ invalidate
|
|
|
|
# passphrase cache, use `clear_session()`.
|
|
|
|
# """
|
|
|
|
# # Private argument _refresh_features can be used internally to avoid
|
|
|
|
# # refreshing in cases where we will refresh soon anyway. This is used
|
|
|
|
# # in TrezorClient.clear_session()
|
|
|
|
# self.call(messages.LockDevice())
|
|
|
|
# if _refresh_features:
|
|
|
|
# self.refresh_features()
|
|
|
|
|
|
|
|
# @session
|
|
|
|
# def ensure_unlocked(self) -> None:
|
|
|
|
# """Ensure the device is unlocked and a passphrase is cached.
|
|
|
|
|
|
|
|
# If the device is locked, this will prompt for PIN. If passphrase is enabled
|
|
|
|
# and no passphrase is cached for the current session, the device will also
|
|
|
|
# prompt for passphrase.
|
|
|
|
|
|
|
|
# After calling this method, further actions on the device will not prompt for
|
|
|
|
# PIN or passphrase until the device is locked or the session becomes invalid.
|
|
|
|
# """
|
|
|
|
# from .btc import get_address
|
|
|
|
|
|
|
|
# get_address(self, "Testnet", PASSPHRASE_TEST_PATH)
|
|
|
|
# self.refresh_features()
|
|
|
|
|
|
|
|
# def end_session(self) -> None:
|
|
|
|
# """Close the current session and clear cached passphrase.
|
|
|
|
|
|
|
|
# The session will become invalid until `init_device()` is called again.
|
|
|
|
# If passphrase is enabled, further actions will prompt for it again.
|
|
|
|
|
|
|
|
# This is a no-op in bootloader mode, as it does not support session management.
|
|
|
|
# """
|
|
|
|
# # since: 2.3.4, 1.9.4
|
|
|
|
# print("end session")
|
|
|
|
# try:
|
|
|
|
# if not self.features.bootloader_mode:
|
|
|
|
# self.transport.end_session(self.session_id or b"")
|
|
|
|
# # self.call(messages.EndSession())
|
|
|
|
# except exceptions.TrezorFailure:
|
|
|
|
# # A failure most likely means that the FW version does not support
|
|
|
|
# # the EndSession call. We ignore the failure and clear the local session_id.
|
|
|
|
# # The client-side end result is identical.
|
|
|
|
# pass
|
|
|
|
# except ValueError as e:
|
|
|
|
# print(e)
|
|
|
|
# print(e.args)
|
|
|
|
# self.session_id = None
|
|
|
|
|
|
|
|
# @session
|
|
|
|
# def clear_session(self) -> None:
|
|
|
|
# """Lock the device and present a fresh session.
|
|
|
|
|
|
|
|
# The current session will be invalidated and a new one will be started. If the
|
|
|
|
# device has PIN enabled, it will become locked.
|
|
|
|
|
|
|
|
# Equivalent to calling `lock()`, `end_session()` and `init_device()`.
|
|
|
|
# """
|
|
|
|
# self.lock(_refresh_features=False)
|
|
|
|
# self.end_session()
|
|
|
|
# self.init_device(new_session=True)
|