259 lines
7.3 KiB
Go
259 lines
7.3 KiB
Go
|
package keys
|
||
|
|
||
|
import (
|
||
|
"bufio"
|
||
|
"errors"
|
||
|
"fmt"
|
||
|
|
||
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
||
|
"github.com/cosmos/cosmos-sdk/client/input"
|
||
|
clientkeys "github.com/cosmos/cosmos-sdk/client/keys"
|
||
|
cosmosKeys "github.com/cosmos/cosmos-sdk/crypto/keys"
|
||
|
|
||
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
||
|
"github.com/cosmos/ethermint/crypto/keys"
|
||
|
|
||
|
"github.com/spf13/cobra"
|
||
|
"github.com/spf13/viper"
|
||
|
|
||
|
"github.com/cosmos/go-bip39"
|
||
|
|
||
|
"github.com/tendermint/tendermint/libs/cli"
|
||
|
)
|
||
|
|
||
|
const (
|
||
|
flagInteractive = "interactive"
|
||
|
flagRecover = "recover"
|
||
|
flagNoBackup = "no-backup"
|
||
|
// flagDryRun = "dry-run"
|
||
|
flagAccount = "account"
|
||
|
flagIndex = "index"
|
||
|
// flagNoSort = "nosort"
|
||
|
|
||
|
// DefaultKeyPass contains the default key password for genesis transactions
|
||
|
DefaultKeyPass = "12345678"
|
||
|
|
||
|
mnemonicEntropySize = 256
|
||
|
)
|
||
|
|
||
|
func addKeyCommand() *cobra.Command {
|
||
|
cmd := &cobra.Command{
|
||
|
Use: "add <name>",
|
||
|
Short: "Add an encrypted private key (either newly generated or recovered), encrypt it, and save to disk",
|
||
|
Long: `Derive a new private key and encrypt to disk.
|
||
|
Optionally specify a BIP39 mnemonic, a BIP39 passphrase to further secure the mnemonic,
|
||
|
and a bip32 HD path to derive a specific account. The key will be stored under the given name
|
||
|
and encrypted with the given password. The only input that is required is the encryption password.
|
||
|
|
||
|
If run with -i, it will prompt the user for BIP44 path, BIP39 mnemonic, and passphrase.
|
||
|
The flag --recover allows one to recover a key from a seed passphrase.
|
||
|
If run with --dry-run, a key would be generated (or recovered) but not stored to the
|
||
|
local keystore.
|
||
|
Use the --pubkey flag to add arbitrary public keys to the keystore for constructing
|
||
|
multisig transactions.
|
||
|
`,
|
||
|
Args: cobra.ExactArgs(1),
|
||
|
RunE: runAddCmd,
|
||
|
}
|
||
|
// cmd.Flags().StringSlice(flagMultisig, nil, "Construct and store a multisig public key (implies --pubkey)")
|
||
|
// cmd.Flags().Uint(flagMultiSigThreshold, 1, "K out of N required signatures. For use in conjunction with --multisig")
|
||
|
// cmd.Flags().Bool(flagNoSort, false, "Keys passed to --multisig are taken in the order they're supplied")
|
||
|
cmd.Flags().String(FlagPublicKey, "", "Parse a public key in bech32 format and save it to disk")
|
||
|
cmd.Flags().BoolP(flagInteractive, "i", false, "Interactively prompt user for BIP39 passphrase and mnemonic")
|
||
|
// cmd.Flags().Bool(flags.FlagUseLedger, false, "Store a local reference to a private key on a Ledger device")
|
||
|
cmd.Flags().Bool(flagRecover, false, "Provide seed phrase to recover existing key instead of creating")
|
||
|
cmd.Flags().Bool(flagNoBackup, false, "Don't print out seed phrase (if others are watching the terminal)")
|
||
|
// cmd.Flags().Bool(flagDryRun, false, "Perform action, but don't add key to local keystore")
|
||
|
cmd.Flags().Uint32(flagAccount, 0, "Account number for HD derivation")
|
||
|
cmd.Flags().Uint32(flagIndex, 0, "Address index number for HD derivation")
|
||
|
cmd.Flags().Bool(flags.FlagIndentResponse, false, "Add indent to JSON response")
|
||
|
return cmd
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
input
|
||
|
- bip39 mnemonic
|
||
|
- bip39 passphrase
|
||
|
- bip44 path
|
||
|
- local encryption password
|
||
|
output
|
||
|
- armor encrypted private key (saved to file)
|
||
|
*/
|
||
|
func runAddCmd(cmd *cobra.Command, args []string) error {
|
||
|
var kb cosmosKeys.Keybase
|
||
|
var err error
|
||
|
var encryptPassword string
|
||
|
|
||
|
inBuf := bufio.NewReader(cmd.InOrStdin())
|
||
|
name := args[0]
|
||
|
|
||
|
interactive := viper.GetBool(flagInteractive)
|
||
|
showMnemonic := !viper.GetBool(flagNoBackup)
|
||
|
|
||
|
kb, err = clientkeys.NewKeyBaseFromHomeFlag()
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
_, err = kb.Get(name)
|
||
|
if err == nil {
|
||
|
// account exists, ask for user confirmation
|
||
|
response, err2 := input.GetConfirmation(fmt.Sprintf("override the existing name %s", name), inBuf)
|
||
|
if err2 != nil {
|
||
|
return err2
|
||
|
}
|
||
|
if !response {
|
||
|
return errors.New("aborted")
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// ask for a password when generating a local key
|
||
|
if viper.GetString(FlagPublicKey) == "" && !viper.GetBool(flags.FlagUseLedger) {
|
||
|
encryptPassword, err = input.GetCheckPassword(
|
||
|
"Enter a passphrase to encrypt your key to disk:",
|
||
|
"Repeat the passphrase:", inBuf)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
// }
|
||
|
|
||
|
if viper.GetString(FlagPublicKey) != "" {
|
||
|
pk, err := sdk.GetAccPubKeyBech32(viper.GetString(FlagPublicKey))
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
_, err = kb.CreateOffline(name, pk)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
account := uint32(viper.GetInt(flagAccount))
|
||
|
index := uint32(viper.GetInt(flagIndex))
|
||
|
|
||
|
// // If we're using ledger, only thing we need is the path and the bech32 prefix.
|
||
|
// if viper.GetBool(flags.FlagUseLedger) {
|
||
|
// bech32PrefixAccAddr := sdk.GetConfig().GetBech32AccountAddrPrefix()
|
||
|
// info, err := kb.CreateLedger(name, keys.Secp256k1, bech32PrefixAccAddr, account, index)
|
||
|
// if err != nil {
|
||
|
// return err
|
||
|
// }
|
||
|
|
||
|
// return printCreate(cmd, info, false, "")
|
||
|
// }
|
||
|
|
||
|
// Get bip39 mnemonic
|
||
|
var mnemonic string
|
||
|
var bip39Passphrase string
|
||
|
|
||
|
if interactive || viper.GetBool(flagRecover) {
|
||
|
bip39Message := "Enter your bip39 mnemonic"
|
||
|
if !viper.GetBool(flagRecover) {
|
||
|
bip39Message = "Enter your bip39 mnemonic, or hit enter to generate one."
|
||
|
}
|
||
|
|
||
|
mnemonic, err = input.GetString(bip39Message, inBuf)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if !bip39.IsMnemonicValid(mnemonic) {
|
||
|
return errors.New("invalid mnemonic")
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if len(mnemonic) == 0 {
|
||
|
// read entropy seed straight from crypto.Rand and convert to mnemonic
|
||
|
entropySeed, err := bip39.NewEntropy(mnemonicEntropySize)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
mnemonic, err = bip39.NewMnemonic(entropySeed[:])
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// override bip39 passphrase
|
||
|
if interactive {
|
||
|
bip39Passphrase, err = input.GetString(
|
||
|
"Enter your bip39 passphrase. This is combined with the mnemonic to derive the seed. "+
|
||
|
"Most users should just hit enter to use the default, \"\"", inBuf)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
// if they use one, make them re-enter it
|
||
|
if len(bip39Passphrase) != 0 {
|
||
|
p2, err := input.GetString("Repeat the passphrase:", inBuf)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if bip39Passphrase != p2 {
|
||
|
return errors.New("passphrases don't match")
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
info, err := kb.CreateAccount(name, mnemonic, bip39Passphrase, encryptPassword, account, index)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
// Recover key from seed passphrase
|
||
|
if viper.GetBool(flagRecover) {
|
||
|
// Hide mnemonic from output
|
||
|
showMnemonic = false
|
||
|
mnemonic = ""
|
||
|
}
|
||
|
|
||
|
return printCreate(cmd, info, showMnemonic, mnemonic)
|
||
|
}
|
||
|
|
||
|
func printCreate(cmd *cobra.Command, info cosmosKeys.Info, showMnemonic bool, mnemonic string) error {
|
||
|
output := viper.Get(cli.OutputFlag)
|
||
|
|
||
|
switch output {
|
||
|
case clientkeys.OutputFormatText:
|
||
|
cmd.PrintErrln()
|
||
|
printKeyInfo(info, keys.Bech32KeyOutput)
|
||
|
|
||
|
// print mnemonic unless requested not to.
|
||
|
if showMnemonic {
|
||
|
cmd.PrintErrln("\n**Important** write this mnemonic phrase in a safe place.")
|
||
|
cmd.PrintErrln("It is the only way to recover your account if you ever forget your password.")
|
||
|
cmd.PrintErrln("")
|
||
|
cmd.PrintErrln(mnemonic)
|
||
|
}
|
||
|
case clientkeys.OutputFormatJSON:
|
||
|
out, err := keys.Bech32KeyOutput(info)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if showMnemonic {
|
||
|
out.Mnemonic = mnemonic
|
||
|
}
|
||
|
|
||
|
var jsonString []byte
|
||
|
if viper.GetBool(flags.FlagIndentResponse) {
|
||
|
jsonString, err = cdc.MarshalJSONIndent(out, "", " ")
|
||
|
} else {
|
||
|
jsonString, err = cdc.MarshalJSON(out)
|
||
|
}
|
||
|
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
cmd.PrintErrln(string(jsonString))
|
||
|
default:
|
||
|
return fmt.Errorf("I can't speak: %s", output)
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|