29d3abcf09
* Reuse cosmos-sdk client library to create keyring Extracted from https://github.com/evmos/ethermint/pull/1168 Cleanup cmd code for easier to migration to cosmos-sdk 0.46 * Update cosmos-sdk v0.46 prepare for implementing cosmos-sdk feemarket and tx prioritization changelog refactor cmd use sdkmath fix lint fix unit tests fix unit test genesis fix unit tests fix unit test env setup fix unit tests fix unit tests register PrivKey impl fix extension options fix lint fix unit tests make HandlerOption.Validate private gofumpt fix msg response decoding fix sim test bump cosmos-sdk version fix sim test sdk 46 fix unit test fix unit tests update ibc-go
88 lines
2.5 KiB
Go
88 lines
2.5 KiB
Go
package client
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
"github.com/cosmos/cosmos-sdk/client/input"
|
|
"github.com/cosmos/cosmos-sdk/crypto"
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
ethcrypto "github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/spf13/cobra"
|
|
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
|
"github.com/evmos/ethermint/crypto/ethsecp256k1"
|
|
"github.com/evmos/ethermint/crypto/hd"
|
|
)
|
|
|
|
// UnsafeExportEthKeyCommand exports a key with the given name as a private key in hex format.
|
|
func UnsafeExportEthKeyCommand() *cobra.Command {
|
|
return &cobra.Command{
|
|
Use: "unsafe-export-eth-key [name]",
|
|
Short: "**UNSAFE** Export an Ethereum private key",
|
|
Long: `**UNSAFE** Export an Ethereum private key unencrypted to use in dev tooling`,
|
|
Args: cobra.ExactArgs(1),
|
|
RunE: func(cmd *cobra.Command, args []string) error {
|
|
clientCtx := client.GetClientContextFromCmd(cmd).WithKeyringOptions(hd.EthSecp256k1Option())
|
|
clientCtx, err := client.ReadPersistentCommandFlags(clientCtx, cmd.Flags())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
decryptPassword := ""
|
|
conf := true
|
|
|
|
inBuf := bufio.NewReader(cmd.InOrStdin())
|
|
switch clientCtx.Keyring.Backend() {
|
|
case keyring.BackendFile:
|
|
decryptPassword, err = input.GetPassword(
|
|
"**WARNING this is an unsafe way to export your unencrypted private key**\nEnter key password:",
|
|
inBuf)
|
|
case keyring.BackendOS:
|
|
conf, err = input.GetConfirmation(
|
|
"**WARNING** this is an unsafe way to export your unencrypted private key, are you sure?",
|
|
inBuf, cmd.ErrOrStderr())
|
|
}
|
|
if err != nil || !conf {
|
|
return err
|
|
}
|
|
|
|
// Exports private key from keybase using password
|
|
armor, err := clientCtx.Keyring.ExportPrivKeyArmor(args[0], decryptPassword)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
privKey, algo, err := crypto.UnarmorDecryptPrivKey(armor, decryptPassword)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if algo != ethsecp256k1.KeyType {
|
|
return fmt.Errorf("invalid key algorithm, got %s, expected %s", algo, ethsecp256k1.KeyType)
|
|
}
|
|
|
|
// Converts key to Ethermint secp256k1 implementation
|
|
ethPrivKey, ok := privKey.(*ethsecp256k1.PrivKey)
|
|
if !ok {
|
|
return fmt.Errorf("invalid private key type %T, expected %T", privKey, ðsecp256k1.PrivKey{})
|
|
}
|
|
|
|
key, err := ethPrivKey.ToECDSA()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Formats key for output
|
|
privB := ethcrypto.FromECDSA(key)
|
|
keyS := strings.ToUpper(hexutil.Encode(privB)[2:])
|
|
|
|
fmt.Println(keyS)
|
|
|
|
return nil
|
|
},
|
|
}
|
|
}
|