github.com/aigarnetwork/aigar@v0.0.0-20191115204914-d59a6eb70f8e/cmd/geth/accountcmd.go (about) 1 // Copyright 2018 The go-ethereum Authors 2 // Copyright 2019 The go-aigar Authors 3 // This file is part of the go-aigar library. 4 // 5 // The go-aigar library is free software: you can redistribute it and/or modify 6 // it under the terms of the GNU Lesser General Public License as published by 7 // the Free Software Foundation, either version 3 of the License, or 8 // (at your option) any later version. 9 // 10 // The go-aigar library is distributed in the hope that it will be useful, 11 // but WITHOUT ANY WARRANTY; without even the implied warranty of 12 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 // GNU Lesser General Public License for more details. 14 // 15 // You should have received a copy of the GNU Lesser General Public License 16 // along with the go-aigar library. If not, see <http://www.gnu.org/licenses/>. 17 18 package main 19 20 import ( 21 "fmt" 22 "io/ioutil" 23 24 "github.com/AigarNetwork/aigar/accounts" 25 "github.com/AigarNetwork/aigar/accounts/keystore" 26 "github.com/AigarNetwork/aigar/cmd/utils" 27 "github.com/AigarNetwork/aigar/console" 28 "github.com/AigarNetwork/aigar/crypto" 29 "github.com/AigarNetwork/aigar/log" 30 "gopkg.in/urfave/cli.v1" 31 ) 32 33 var ( 34 walletCommand = cli.Command{ 35 Name: "wallet", 36 Usage: "Manage Ethereum presale wallets", 37 ArgsUsage: "", 38 Category: "ACCOUNT COMMANDS", 39 Description: ` 40 geth wallet import /path/to/my/presale.wallet 41 42 will prompt for your password and imports your ether presale account. 43 It can be used non-interactively with the --password option taking a 44 passwordfile as argument containing the wallet password in plaintext.`, 45 Subcommands: []cli.Command{ 46 { 47 48 Name: "import", 49 Usage: "Import Ethereum presale wallet", 50 ArgsUsage: "<keyFile>", 51 Action: utils.MigrateFlags(importWallet), 52 Category: "ACCOUNT COMMANDS", 53 Flags: []cli.Flag{ 54 utils.DataDirFlag, 55 utils.KeyStoreDirFlag, 56 utils.PasswordFileFlag, 57 utils.LightKDFFlag, 58 }, 59 Description: ` 60 geth wallet [options] /path/to/my/presale.wallet 61 62 will prompt for your password and imports your ether presale account. 63 It can be used non-interactively with the --password option taking a 64 passwordfile as argument containing the wallet password in plaintext.`, 65 }, 66 }, 67 } 68 69 accountCommand = cli.Command{ 70 Name: "account", 71 Usage: "Manage accounts", 72 Category: "ACCOUNT COMMANDS", 73 Description: ` 74 75 Manage accounts, list all existing accounts, import a private key into a new 76 account, create a new account or update an existing account. 77 78 It supports interactive mode, when you are prompted for password as well as 79 non-interactive mode where passwords are supplied via a given password file. 80 Non-interactive mode is only meant for scripted use on test networks or known 81 safe environments. 82 83 Make sure you remember the password you gave when creating a new account (with 84 either new or import). Without it you are not able to unlock your account. 85 86 Note that exporting your key in unencrypted format is NOT supported. 87 88 Keys are stored under <DATADIR>/keystore. 89 It is safe to transfer the entire directory or the individual keys therein 90 between ethereum nodes by simply copying. 91 92 Make sure you backup your keys regularly.`, 93 Subcommands: []cli.Command{ 94 { 95 Name: "list", 96 Usage: "Print summary of existing accounts", 97 Action: utils.MigrateFlags(accountList), 98 Flags: []cli.Flag{ 99 utils.DataDirFlag, 100 utils.KeyStoreDirFlag, 101 }, 102 Description: ` 103 Print a short summary of all accounts`, 104 }, 105 { 106 Name: "new", 107 Usage: "Create a new account", 108 Action: utils.MigrateFlags(accountCreate), 109 Flags: []cli.Flag{ 110 utils.DataDirFlag, 111 utils.KeyStoreDirFlag, 112 utils.PasswordFileFlag, 113 utils.LightKDFFlag, 114 }, 115 Description: ` 116 geth account new 117 118 Creates a new account and prints the address. 119 120 The account is saved in encrypted format, you are prompted for a password. 121 122 You must remember this password to unlock your account in the future. 123 124 For non-interactive use the password can be specified with the --password flag: 125 126 Note, this is meant to be used for testing only, it is a bad idea to save your 127 password to file or expose in any other way. 128 `, 129 }, 130 { 131 Name: "update", 132 Usage: "Update an existing account", 133 Action: utils.MigrateFlags(accountUpdate), 134 ArgsUsage: "<address>", 135 Flags: []cli.Flag{ 136 utils.DataDirFlag, 137 utils.KeyStoreDirFlag, 138 utils.LightKDFFlag, 139 }, 140 Description: ` 141 geth account update <address> 142 143 Update an existing account. 144 145 The account is saved in the newest version in encrypted format, you are prompted 146 for a password to unlock the account and another to save the updated file. 147 148 This same command can therefore be used to migrate an account of a deprecated 149 format to the newest format or change the password for an account. 150 151 For non-interactive use the password can be specified with the --password flag: 152 153 geth account update [options] <address> 154 155 Since only one password can be given, only format update can be performed, 156 changing your password is only possible interactively. 157 `, 158 }, 159 { 160 Name: "import", 161 Usage: "Import a private key into a new account", 162 Action: utils.MigrateFlags(accountImport), 163 Flags: []cli.Flag{ 164 utils.DataDirFlag, 165 utils.KeyStoreDirFlag, 166 utils.PasswordFileFlag, 167 utils.LightKDFFlag, 168 }, 169 ArgsUsage: "<keyFile>", 170 Description: ` 171 geth account import <keyfile> 172 173 Imports an unencrypted private key from <keyfile> and creates a new account. 174 Prints the address. 175 176 The keyfile is assumed to contain an unencrypted private key in hexadecimal format. 177 178 The account is saved in encrypted format, you are prompted for a password. 179 180 You must remember this password to unlock your account in the future. 181 182 For non-interactive use the password can be specified with the -password flag: 183 184 geth account import [options] <keyfile> 185 186 Note: 187 As you can directly copy your encrypted accounts to another ethereum instance, 188 this import mechanism is not needed when you transfer an account between 189 nodes. 190 `, 191 }, 192 }, 193 } 194 ) 195 196 func accountList(ctx *cli.Context) error { 197 stack, _ := makeConfigNode(ctx) 198 var index int 199 for _, wallet := range stack.AccountManager().Wallets() { 200 for _, account := range wallet.Accounts() { 201 fmt.Printf("Account #%d: {%x} %s\n", index, account.Address, &account.URL) 202 index++ 203 } 204 } 205 return nil 206 } 207 208 // tries unlocking the specified account a few times. 209 func unlockAccount(ks *keystore.KeyStore, address string, i int, passwords []string) (accounts.Account, string) { 210 account, err := utils.MakeAddress(ks, address) 211 if err != nil { 212 utils.Fatalf("Could not list accounts: %v", err) 213 } 214 for trials := 0; trials < 3; trials++ { 215 prompt := fmt.Sprintf("Unlocking account %s | Attempt %d/%d", address, trials+1, 3) 216 password := getPassPhrase(prompt, false, i, passwords) 217 err = ks.Unlock(account, password) 218 if err == nil { 219 log.Info("Unlocked account", "address", account.Address.Hex()) 220 return account, password 221 } 222 if err, ok := err.(*keystore.AmbiguousAddrError); ok { 223 log.Info("Unlocked account", "address", account.Address.Hex()) 224 return ambiguousAddrRecovery(ks, err, password), password 225 } 226 if err != keystore.ErrDecrypt { 227 // No need to prompt again if the error is not decryption-related. 228 break 229 } 230 } 231 // All trials expended to unlock account, bail out 232 utils.Fatalf("Failed to unlock account %s (%v)", address, err) 233 234 return accounts.Account{}, "" 235 } 236 237 // getPassPhrase retrieves the password associated with an account, either fetched 238 // from a list of preloaded passphrases, or requested interactively from the user. 239 func getPassPhrase(prompt string, confirmation bool, i int, passwords []string) string { 240 // If a list of passwords was supplied, retrieve from them 241 if len(passwords) > 0 { 242 if i < len(passwords) { 243 return passwords[i] 244 } 245 return passwords[len(passwords)-1] 246 } 247 // Otherwise prompt the user for the password 248 if prompt != "" { 249 fmt.Println(prompt) 250 } 251 password, err := console.Stdin.PromptPassword("Password: ") 252 if err != nil { 253 utils.Fatalf("Failed to read password: %v", err) 254 } 255 if confirmation { 256 confirm, err := console.Stdin.PromptPassword("Repeat password: ") 257 if err != nil { 258 utils.Fatalf("Failed to read password confirmation: %v", err) 259 } 260 if password != confirm { 261 utils.Fatalf("Passwords do not match") 262 } 263 } 264 return password 265 } 266 267 func ambiguousAddrRecovery(ks *keystore.KeyStore, err *keystore.AmbiguousAddrError, auth string) accounts.Account { 268 fmt.Printf("Multiple key files exist for address %x:\n", err.Addr) 269 for _, a := range err.Matches { 270 fmt.Println(" ", a.URL) 271 } 272 fmt.Println("Testing your password against all of them...") 273 var match *accounts.Account 274 for _, a := range err.Matches { 275 if err := ks.Unlock(a, auth); err == nil { 276 match = &a 277 break 278 } 279 } 280 if match == nil { 281 utils.Fatalf("None of the listed files could be unlocked.") 282 } 283 fmt.Printf("Your password unlocked %s\n", match.URL) 284 fmt.Println("In order to avoid this warning, you need to remove the following duplicate key files:") 285 for _, a := range err.Matches { 286 if a != *match { 287 fmt.Println(" ", a.URL) 288 } 289 } 290 return *match 291 } 292 293 // accountCreate creates a new account into the keystore defined by the CLI flags. 294 func accountCreate(ctx *cli.Context) error { 295 cfg := gethConfig{Node: defaultNodeConfig()} 296 // Load config file. 297 if file := ctx.GlobalString(configFileFlag.Name); file != "" { 298 if err := loadConfig(file, &cfg); err != nil { 299 utils.Fatalf("%v", err) 300 } 301 } 302 utils.SetNodeConfig(ctx, &cfg.Node) 303 scryptN, scryptP, keydir, err := cfg.Node.AccountConfig() 304 305 if err != nil { 306 utils.Fatalf("Failed to read configuration: %v", err) 307 } 308 309 password := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx)) 310 311 account, err := keystore.StoreKey(keydir, password, scryptN, scryptP) 312 313 if err != nil { 314 utils.Fatalf("Failed to create account: %v", err) 315 } 316 fmt.Printf("\nYour new key was generated\n\n") 317 fmt.Printf("Public address of the key: %s\n", account.Address.Hex()) 318 fmt.Printf("Path of the secret key file: %s\n\n", account.URL.Path) 319 fmt.Printf("- You can share your public address with anyone. Others need it to interact with you.\n") 320 fmt.Printf("- You must NEVER share the secret key with anyone! The key controls access to your funds!\n") 321 fmt.Printf("- You must BACKUP your key file! Without the key, it's impossible to access account funds!\n") 322 fmt.Printf("- You must REMEMBER your password! Without the password, it's impossible to decrypt the key!\n\n") 323 return nil 324 } 325 326 // accountUpdate transitions an account from a previous format to the current 327 // one, also providing the possibility to change the pass-phrase. 328 func accountUpdate(ctx *cli.Context) error { 329 if len(ctx.Args()) == 0 { 330 utils.Fatalf("No accounts specified to update") 331 } 332 stack, _ := makeConfigNode(ctx) 333 ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore) 334 335 for _, addr := range ctx.Args() { 336 account, oldPassword := unlockAccount(ks, addr, 0, nil) 337 newPassword := getPassPhrase("Please give a new password. Do not forget this password.", true, 0, nil) 338 if err := ks.Update(account, oldPassword, newPassword); err != nil { 339 utils.Fatalf("Could not update the account: %v", err) 340 } 341 } 342 return nil 343 } 344 345 func importWallet(ctx *cli.Context) error { 346 keyfile := ctx.Args().First() 347 if len(keyfile) == 0 { 348 utils.Fatalf("keyfile must be given as argument") 349 } 350 keyJSON, err := ioutil.ReadFile(keyfile) 351 if err != nil { 352 utils.Fatalf("Could not read wallet file: %v", err) 353 } 354 355 stack, _ := makeConfigNode(ctx) 356 passphrase := getPassPhrase("", false, 0, utils.MakePasswordList(ctx)) 357 358 ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore) 359 acct, err := ks.ImportPreSaleKey(keyJSON, passphrase) 360 if err != nil { 361 utils.Fatalf("%v", err) 362 } 363 fmt.Printf("Address: {%x}\n", acct.Address) 364 return nil 365 } 366 367 func accountImport(ctx *cli.Context) error { 368 keyfile := ctx.Args().First() 369 if len(keyfile) == 0 { 370 utils.Fatalf("keyfile must be given as argument") 371 } 372 key, err := crypto.LoadECDSA(keyfile) 373 if err != nil { 374 utils.Fatalf("Failed to load the private key: %v", err) 375 } 376 stack, _ := makeConfigNode(ctx) 377 passphrase := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx)) 378 379 ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore) 380 acct, err := ks.ImportECDSA(key, passphrase) 381 if err != nil { 382 utils.Fatalf("Could not create the account: %v", err) 383 } 384 fmt.Printf("Address: {%x}\n", acct.Address) 385 return nil 386 }