* Update codebase to simplify clientCtx loading from cmd * make ReadTxCommandFlags and ReadQueryCommandFlags private * fix build error * fix conflicts
205 lines
5.6 KiB
Go
205 lines
5.6 KiB
Go
package cli
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
|
"github.com/cosmos/cosmos-sdk/client/tx"
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
|
kmultisig "github.com/cosmos/cosmos-sdk/crypto/keys/multisig"
|
|
"github.com/cosmos/cosmos-sdk/crypto/types/multisig"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
signingtypes "github.com/cosmos/cosmos-sdk/types/tx/signing"
|
|
"github.com/cosmos/cosmos-sdk/version"
|
|
authclient "github.com/cosmos/cosmos-sdk/x/auth/client"
|
|
"github.com/cosmos/cosmos-sdk/x/auth/client/rest"
|
|
"github.com/cosmos/cosmos-sdk/x/auth/signing"
|
|
)
|
|
|
|
// GetSignCommand returns the sign command
|
|
func GetMultiSignCommand() *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "multisign [file] [name] [[signature]...]",
|
|
Short: "Generate multisig signatures for transactions generated offline",
|
|
Long: strings.TrimSpace(
|
|
fmt.Sprintf(`Sign transactions created with the --generate-only flag that require multisig signatures.
|
|
|
|
Read signature(s) from [signature] file(s), generate a multisig signature compliant to the
|
|
multisig key [name], and attach it to the transaction read from [file].
|
|
|
|
Example:
|
|
$ %s multisign transaction.json k1k2k3 k1sig.json k2sig.json k3sig.json
|
|
|
|
If the flag --signature-only flag is on, it outputs a JSON representation
|
|
of the generated signature only.
|
|
|
|
The --offline flag makes sure that the client will not reach out to an external node.
|
|
Thus account number or sequence number lookups will not be performed and it is
|
|
recommended to set such parameters manually.
|
|
`,
|
|
version.AppName,
|
|
),
|
|
),
|
|
RunE: makeMultiSignCmd(),
|
|
Args: cobra.MinimumNArgs(3),
|
|
}
|
|
|
|
cmd.Flags().Bool(flagSigOnly, false, "Print only the generated signature, then exit")
|
|
cmd.Flags().String(flags.FlagOutputDocument, "", "The document will be written to the given file instead of STDOUT")
|
|
cmd.Flags().Bool(flagAmino, false, "Generate Amino encoded JSON suitable for submiting to the txs REST endpoint")
|
|
flags.AddTxFlagsToCmd(cmd)
|
|
cmd.Flags().String(flags.FlagChainID, "", "network chain ID")
|
|
|
|
return cmd
|
|
}
|
|
|
|
func makeMultiSignCmd() func(cmd *cobra.Command, args []string) (err error) {
|
|
return func(cmd *cobra.Command, args []string) (err error) {
|
|
clientCtx, err := client.GetClientTxContext(cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
parsedTx, err := authclient.ReadTxFromFile(clientCtx, args[0])
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
txFactory := tx.NewFactoryCLI(clientCtx, cmd.Flags())
|
|
if txFactory.SignMode() == signingtypes.SignMode_SIGN_MODE_UNSPECIFIED {
|
|
txFactory = txFactory.WithSignMode(signingtypes.SignMode_SIGN_MODE_LEGACY_AMINO_JSON)
|
|
}
|
|
|
|
txCfg := clientCtx.TxConfig
|
|
txBuilder, err := txCfg.WrapTxBuilder(parsedTx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
backend, _ := cmd.Flags().GetString(flags.FlagKeyringBackend)
|
|
|
|
inBuf := bufio.NewReader(cmd.InOrStdin())
|
|
kb, err := keyring.New(sdk.KeyringServiceName(), backend, clientCtx.HomeDir, inBuf)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
multisigInfo, err := kb.Key(args[1])
|
|
if err != nil {
|
|
return
|
|
}
|
|
if multisigInfo.GetType() != keyring.TypeMulti {
|
|
return fmt.Errorf("%q must be of type %s: %s", args[1], keyring.TypeMulti, multisigInfo.GetType())
|
|
}
|
|
|
|
multisigPub := multisigInfo.GetPubKey().(*kmultisig.LegacyAminoPubKey)
|
|
multisigSig := multisig.NewMultisig(len(multisigPub.PubKeys))
|
|
if !clientCtx.Offline {
|
|
accnum, seq, err := clientCtx.AccountRetriever.GetAccountNumberSequence(clientCtx, multisigInfo.GetAddress())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
txFactory = txFactory.WithAccountNumber(accnum).WithSequence(seq)
|
|
}
|
|
|
|
// read each signature and add it to the multisig if valid
|
|
for i := 2; i < len(args); i++ {
|
|
sigs, err := unmarshalSignatureJSON(clientCtx, args[i])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
signingData := signing.SignerData{
|
|
ChainID: txFactory.ChainID(),
|
|
AccountNumber: txFactory.AccountNumber(),
|
|
Sequence: txFactory.Sequence(),
|
|
}
|
|
|
|
for _, sig := range sigs {
|
|
err = signing.VerifySignature(sig.PubKey, signingData, sig.Data, txCfg.SignModeHandler(), txBuilder.GetTx())
|
|
if err != nil {
|
|
return fmt.Errorf("couldn't verify signature: %w", err)
|
|
}
|
|
|
|
if err := multisig.AddSignatureV2(multisigSig, sig, multisigPub.GetPubKeys()); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
sigV2 := signingtypes.SignatureV2{
|
|
PubKey: multisigPub,
|
|
Data: multisigSig,
|
|
Sequence: txFactory.Sequence(),
|
|
}
|
|
|
|
err = txBuilder.SetSignatures(sigV2)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
sigOnly, _ := cmd.Flags().GetBool(flagSigOnly)
|
|
|
|
aminoJSON, _ := cmd.Flags().GetBool(flagAmino)
|
|
|
|
var json []byte
|
|
|
|
if aminoJSON {
|
|
stdTx, err := tx.ConvertTxToStdTx(clientCtx.LegacyAmino, txBuilder.GetTx())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
req := rest.BroadcastReq{
|
|
Tx: stdTx,
|
|
Mode: "block|sync|async",
|
|
}
|
|
|
|
json, _ = clientCtx.LegacyAmino.MarshalJSON(req)
|
|
|
|
} else {
|
|
json, err = marshalSignatureJSON(txCfg, txBuilder, sigOnly)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
outputDoc, _ := cmd.Flags().GetString(flags.FlagOutputDocument)
|
|
if outputDoc == "" {
|
|
cmd.Printf("%s\n", json)
|
|
return
|
|
}
|
|
|
|
fp, err := os.OpenFile(outputDoc, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0644)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defer func() {
|
|
err2 := fp.Close()
|
|
if err == nil {
|
|
err = err2
|
|
}
|
|
}()
|
|
|
|
err = clientCtx.PrintBytes(json)
|
|
|
|
return
|
|
}
|
|
}
|
|
|
|
func unmarshalSignatureJSON(clientCtx client.Context, filename string) (sigs []signingtypes.SignatureV2, err error) {
|
|
var bytes []byte
|
|
if bytes, err = ioutil.ReadFile(filename); err != nil {
|
|
return
|
|
}
|
|
return clientCtx.TxConfig.UnmarshalSignatureJSON(bytes)
|
|
}
|