crypto/keyring: `Keybase` interface gives way to its successor: `Keyring`. `LegacyKeybase` interface is added in order to guarantee limited backward compatibility with the old `Keybase` interface for the sole purpose of migrating keys across the new keyring backends. The package no longer depends on the `github.com/types.Config` singleton. `SupportedAlgos` and `SupportedLedgerAlgos` methods have been removed. The keyring just fails when trying to perform an action with an unsupported algorithm. crypto/ subdirs reorganization: `crypto/keys/hd` was moved to `crypto/hd`, which now groups together all HD wallets related types and utilities. client/input: * Removal of unnecessary `GetCheckPassword`, `PrintPrefixed` functions. * `GetConfirmation`'s signature changed to take in a io.Writer for better integration with `cobra.Command` types. client/context: * In-memory keyring is allocated in the context when `--gen-only` flag is passed in. `GetFromFields` does no longer silently allocate a keyring, it takes one as argument. Co-authored with @jgimeno Co-authored-by: Jonathan Gimeno <jgimeno@gmail.com>
46 lines
1.1 KiB
Go
46 lines
1.1 KiB
Go
package keys
|
|
|
|
import (
|
|
"bufio"
|
|
|
|
"github.com/spf13/cobra"
|
|
"github.com/spf13/viper"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
|
"github.com/cosmos/cosmos-sdk/client/input"
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
)
|
|
|
|
// ExportKeyCommand exports private keys from the key store.
|
|
func ExportKeyCommand() *cobra.Command {
|
|
return &cobra.Command{
|
|
Use: "export <name>",
|
|
Short: "Export private keys",
|
|
Long: `Export a private key from the local keybase in ASCII-armored encrypted format.`,
|
|
Args: cobra.ExactArgs(1),
|
|
RunE: runExportCmd,
|
|
}
|
|
}
|
|
|
|
func runExportCmd(cmd *cobra.Command, args []string) error {
|
|
buf := bufio.NewReader(cmd.InOrStdin())
|
|
kb, err := keyring.New(sdk.KeyringServiceName(), viper.GetString(flags.FlagKeyringBackend), viper.GetString(flags.FlagHome), buf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
encryptPassword, err := input.GetPassword("Enter passphrase to encrypt the exported key:", buf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
armored, err := kb.ExportPrivKeyArmor(args[0], encryptPassword)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cmd.Println(armored)
|
|
return nil
|
|
}
|