2021-04-18 15:54:18 +00:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client/keys"
|
|
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"github.com/tendermint/tendermint/libs/cli"
|
|
|
|
|
|
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
2021-06-29 17:02:21 +00:00
|
|
|
clientkeys "github.com/tharsis/ethermint/client/keys"
|
2021-06-22 10:49:18 +00:00
|
|
|
"github.com/tharsis/ethermint/crypto/hd"
|
2021-04-18 15:54:18 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// KeyCommands registers a sub-tree of commands to interact with
|
|
|
|
// local private key storage.
|
|
|
|
func KeyCommands(defaultNodeHome string) *cobra.Command {
|
|
|
|
cmd := &cobra.Command{
|
|
|
|
Use: "keys",
|
|
|
|
Short: "Manage your application's keys",
|
|
|
|
Long: `Keyring management commands. These keys may be in any format supported by the
|
|
|
|
Tendermint crypto library and can be used by light-clients, full nodes, or any other application
|
|
|
|
that needs to sign with a private key.
|
|
|
|
|
|
|
|
The keyring supports the following backends:
|
|
|
|
|
|
|
|
os Uses the operating system's default credentials store.
|
|
|
|
file Uses encrypted file-based keystore within the app's configuration directory.
|
|
|
|
This keyring will request a password each time it is accessed, which may occur
|
|
|
|
multiple times in a single command resulting in repeated password prompts.
|
|
|
|
kwallet Uses KDE Wallet Manager as a credentials management application.
|
|
|
|
pass Uses the pass command line utility to store and retrieve keys.
|
|
|
|
test Stores keys insecurely to disk. It does not prompt for a password to be unlocked
|
|
|
|
and it should be use only for testing purposes.
|
|
|
|
|
|
|
|
kwallet and pass backends depend on external tools. Refer to their respective documentation for more
|
|
|
|
information:
|
|
|
|
KWallet https://github.com/KDE/kwallet
|
|
|
|
pass https://www.passwordstore.org/
|
|
|
|
|
|
|
|
The pass backend requires GnuPG: https://gnupg.org/
|
|
|
|
`,
|
|
|
|
}
|
|
|
|
|
|
|
|
// support adding Ethereum supported keys
|
|
|
|
addCmd := keys.AddKeyCommand()
|
|
|
|
|
|
|
|
// update the default signing algorithm value to "eth_secp256k1"
|
|
|
|
algoFlag := addCmd.Flag("algo")
|
|
|
|
algoFlag.DefValue = string(hd.EthSecp256k1Type)
|
|
|
|
err := algoFlag.Value.Set(string(hd.EthSecp256k1Type))
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
addCmd.RunE = runAddCmd
|
|
|
|
|
|
|
|
cmd.AddCommand(
|
|
|
|
keys.MnemonicKeyCommand(),
|
|
|
|
addCmd,
|
|
|
|
keys.ExportKeyCommand(),
|
|
|
|
keys.ImportKeyCommand(),
|
|
|
|
keys.ListKeysCmd(),
|
|
|
|
keys.ShowKeysCmd(),
|
|
|
|
flags.LineBreak,
|
|
|
|
keys.DeleteKeyCommand(),
|
|
|
|
keys.ParseKeyStringCommand(),
|
|
|
|
keys.MigrateCommand(),
|
|
|
|
flags.LineBreak,
|
|
|
|
UnsafeExportEthKeyCommand(),
|
|
|
|
UnsafeImportKeyCommand(),
|
|
|
|
)
|
|
|
|
|
|
|
|
cmd.PersistentFlags().String(flags.FlagHome, defaultNodeHome, "The application home directory")
|
|
|
|
cmd.PersistentFlags().String(flags.FlagKeyringDir, "", "The client Keyring directory; if omitted, the default 'home' directory will be used")
|
|
|
|
cmd.PersistentFlags().String(flags.FlagKeyringBackend, keyring.BackendFile, "Select keyring's backend (os|file|test)")
|
|
|
|
cmd.PersistentFlags().String(cli.OutputFlag, "text", "Output format (text|json)")
|
|
|
|
return cmd
|
|
|
|
}
|
|
|
|
|
|
|
|
func runAddCmd(cmd *cobra.Command, args []string) error {
|
|
|
|
buf := bufio.NewReader(cmd.InOrStdin())
|
|
|
|
clientCtx := client.GetClientContextFromCmd(cmd)
|
|
|
|
|
|
|
|
var (
|
|
|
|
kr keyring.Keyring
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
|
|
|
|
dryRun, _ := cmd.Flags().GetBool(flags.FlagDryRun)
|
|
|
|
if dryRun {
|
|
|
|
kr, err = keyring.New(sdk.KeyringServiceName(), keyring.BackendMemory, clientCtx.KeyringDir, buf, hd.EthSecp256k1Option())
|
|
|
|
} else {
|
|
|
|
backend, _ := cmd.Flags().GetString(flags.FlagKeyringBackend)
|
|
|
|
kr, err = keyring.New(sdk.KeyringServiceName(), backend, clientCtx.KeyringDir, buf, hd.EthSecp256k1Option())
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-06-29 17:02:21 +00:00
|
|
|
return clientkeys.RunAddCmd(clientCtx.WithKeyring(kr), cmd, args, buf)
|
2021-04-18 15:54:18 +00:00
|
|
|
}
|