laconicd-deprecated/client/export.go

88 lines
2.5 KiB
Go
Raw Normal View History

package client
import (
"bufio"
"fmt"
"strings"
"github.com/cosmos/cosmos-sdk/client"
"github.com/cosmos/cosmos-sdk/client/input"
2021-04-17 10:00:07 +00:00
"github.com/cosmos/cosmos-sdk/crypto"
2021-04-18 15:54:18 +00:00
"github.com/ethereum/go-ethereum/common/hexutil"
ethcrypto "github.com/ethereum/go-ethereum/crypto"
"github.com/spf13/cobra"
2021-04-17 10:00:07 +00:00
"github.com/cerc-io/laconicd/crypto/ethsecp256k1"
"github.com/cerc-io/laconicd/crypto/hd"
2021-04-18 15:54:18 +00:00
"github.com/cosmos/cosmos-sdk/crypto/keyring"
)
// UnsafeExportEthKeyCommand exports a key with the given name as a private key in hex format.
func UnsafeExportEthKeyCommand() *cobra.Command {
return &cobra.Command{
Use: "unsafe-export-eth-key [name]",
Short: "**UNSAFE** Export an Ethereum private key",
Long: `**UNSAFE** Export an Ethereum private key unencrypted to use in dev tooling`,
Args: cobra.ExactArgs(1),
RunE: func(cmd *cobra.Command, args []string) error {
2022-10-10 10:38:33 +00:00
clientCtx := client.GetClientContextFromCmd(cmd).WithKeyringOptions(hd.EthSecp256k1Option())
clientCtx, err := client.ReadPersistentCommandFlags(clientCtx, cmd.Flags())
if err != nil {
return err
}
decryptPassword := ""
conf := true
2021-04-17 10:00:07 +00:00
2022-10-10 10:38:33 +00:00
inBuf := bufio.NewReader(cmd.InOrStdin())
switch clientCtx.Keyring.Backend() {
2021-04-17 10:00:07 +00:00
case keyring.BackendFile:
decryptPassword, err = input.GetPassword(
"**WARNING this is an unsafe way to export your unencrypted private key**\nEnter key password:",
inBuf)
2021-04-17 10:00:07 +00:00
case keyring.BackendOS:
conf, err = input.GetConfirmation(
"**WARNING** this is an unsafe way to export your unencrypted private key, are you sure?",
2021-04-17 10:00:07 +00:00
inBuf, cmd.ErrOrStderr())
}
if err != nil || !conf {
return err
}
// Exports private key from keybase using password
2022-10-10 10:38:33 +00:00
armor, err := clientCtx.Keyring.ExportPrivKeyArmor(args[0], decryptPassword)
2021-04-17 10:00:07 +00:00
if err != nil {
return err
}
privKey, algo, err := crypto.UnarmorDecryptPrivKey(armor, decryptPassword)
if err != nil {
return err
}
2021-04-17 10:00:07 +00:00
if algo != ethsecp256k1.KeyType {
return fmt.Errorf("invalid key algorithm, got %s, expected %s", algo, ethsecp256k1.KeyType)
}
2021-09-07 17:29:24 +00:00
// Converts key to Ethermint secp256k1 implementation
2021-04-18 15:54:18 +00:00
ethPrivKey, ok := privKey.(*ethsecp256k1.PrivKey)
if !ok {
2021-04-17 10:00:07 +00:00
return fmt.Errorf("invalid private key type %T, expected %T", privKey, &ethsecp256k1.PrivKey{})
}
2021-09-07 17:29:24 +00:00
key, err := ethPrivKey.ToECDSA()
if err != nil {
return err
}
// Formats key for output
2021-09-07 17:29:24 +00:00
privB := ethcrypto.FromECDSA(key)
keyS := strings.ToUpper(hexutil.Encode(privB)[2:])
fmt.Println(keyS)
return nil
},
}
}