github.com/aigarnetwork/aigar@v0.0.0-20191115204914-d59a6eb70f8e/cmd/geth/accountcmd.go (about)

     1  //  Copyright 2018 The go-ethereum Authors
     2  //  Copyright 2019 The go-aigar Authors
     3  //  This file is part of the go-aigar library.
     4  //
     5  //  The go-aigar library is free software: you can redistribute it and/or modify
     6  //  it under the terms of the GNU Lesser General Public License as published by
     7  //  the Free Software Foundation, either version 3 of the License, or
     8  //  (at your option) any later version.
     9  //
    10  //  The go-aigar library is distributed in the hope that it will be useful,
    11  //  but WITHOUT ANY WARRANTY; without even the implied warranty of
    12  //  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    13  //  GNU Lesser General Public License for more details.
    14  //
    15  //  You should have received a copy of the GNU Lesser General Public License
    16  //  along with the go-aigar library. If not, see <http://www.gnu.org/licenses/>.
    17  
    18  package main
    19  
    20  import (
    21  	"fmt"
    22  	"io/ioutil"
    23  
    24  	"github.com/AigarNetwork/aigar/accounts"
    25  	"github.com/AigarNetwork/aigar/accounts/keystore"
    26  	"github.com/AigarNetwork/aigar/cmd/utils"
    27  	"github.com/AigarNetwork/aigar/console"
    28  	"github.com/AigarNetwork/aigar/crypto"
    29  	"github.com/AigarNetwork/aigar/log"
    30  	"gopkg.in/urfave/cli.v1"
    31  )
    32  
    33  var (
    34  	walletCommand = cli.Command{
    35  		Name:      "wallet",
    36  		Usage:     "Manage Ethereum presale wallets",
    37  		ArgsUsage: "",
    38  		Category:  "ACCOUNT COMMANDS",
    39  		Description: `
    40      geth wallet import /path/to/my/presale.wallet
    41  
    42  will prompt for your password and imports your ether presale account.
    43  It can be used non-interactively with the --password option taking a
    44  passwordfile as argument containing the wallet password in plaintext.`,
    45  		Subcommands: []cli.Command{
    46  			{
    47  
    48  				Name:      "import",
    49  				Usage:     "Import Ethereum presale wallet",
    50  				ArgsUsage: "<keyFile>",
    51  				Action:    utils.MigrateFlags(importWallet),
    52  				Category:  "ACCOUNT COMMANDS",
    53  				Flags: []cli.Flag{
    54  					utils.DataDirFlag,
    55  					utils.KeyStoreDirFlag,
    56  					utils.PasswordFileFlag,
    57  					utils.LightKDFFlag,
    58  				},
    59  				Description: `
    60  	geth wallet [options] /path/to/my/presale.wallet
    61  
    62  will prompt for your password and imports your ether presale account.
    63  It can be used non-interactively with the --password option taking a
    64  passwordfile as argument containing the wallet password in plaintext.`,
    65  			},
    66  		},
    67  	}
    68  
    69  	accountCommand = cli.Command{
    70  		Name:     "account",
    71  		Usage:    "Manage accounts",
    72  		Category: "ACCOUNT COMMANDS",
    73  		Description: `
    74  
    75  Manage accounts, list all existing accounts, import a private key into a new
    76  account, create a new account or update an existing account.
    77  
    78  It supports interactive mode, when you are prompted for password as well as
    79  non-interactive mode where passwords are supplied via a given password file.
    80  Non-interactive mode is only meant for scripted use on test networks or known
    81  safe environments.
    82  
    83  Make sure you remember the password you gave when creating a new account (with
    84  either new or import). Without it you are not able to unlock your account.
    85  
    86  Note that exporting your key in unencrypted format is NOT supported.
    87  
    88  Keys are stored under <DATADIR>/keystore.
    89  It is safe to transfer the entire directory or the individual keys therein
    90  between ethereum nodes by simply copying.
    91  
    92  Make sure you backup your keys regularly.`,
    93  		Subcommands: []cli.Command{
    94  			{
    95  				Name:   "list",
    96  				Usage:  "Print summary of existing accounts",
    97  				Action: utils.MigrateFlags(accountList),
    98  				Flags: []cli.Flag{
    99  					utils.DataDirFlag,
   100  					utils.KeyStoreDirFlag,
   101  				},
   102  				Description: `
   103  Print a short summary of all accounts`,
   104  			},
   105  			{
   106  				Name:   "new",
   107  				Usage:  "Create a new account",
   108  				Action: utils.MigrateFlags(accountCreate),
   109  				Flags: []cli.Flag{
   110  					utils.DataDirFlag,
   111  					utils.KeyStoreDirFlag,
   112  					utils.PasswordFileFlag,
   113  					utils.LightKDFFlag,
   114  				},
   115  				Description: `
   116      geth account new
   117  
   118  Creates a new account and prints the address.
   119  
   120  The account is saved in encrypted format, you are prompted for a password.
   121  
   122  You must remember this password to unlock your account in the future.
   123  
   124  For non-interactive use the password can be specified with the --password flag:
   125  
   126  Note, this is meant to be used for testing only, it is a bad idea to save your
   127  password to file or expose in any other way.
   128  `,
   129  			},
   130  			{
   131  				Name:      "update",
   132  				Usage:     "Update an existing account",
   133  				Action:    utils.MigrateFlags(accountUpdate),
   134  				ArgsUsage: "<address>",
   135  				Flags: []cli.Flag{
   136  					utils.DataDirFlag,
   137  					utils.KeyStoreDirFlag,
   138  					utils.LightKDFFlag,
   139  				},
   140  				Description: `
   141      geth account update <address>
   142  
   143  Update an existing account.
   144  
   145  The account is saved in the newest version in encrypted format, you are prompted
   146  for a password to unlock the account and another to save the updated file.
   147  
   148  This same command can therefore be used to migrate an account of a deprecated
   149  format to the newest format or change the password for an account.
   150  
   151  For non-interactive use the password can be specified with the --password flag:
   152  
   153      geth account update [options] <address>
   154  
   155  Since only one password can be given, only format update can be performed,
   156  changing your password is only possible interactively.
   157  `,
   158  			},
   159  			{
   160  				Name:   "import",
   161  				Usage:  "Import a private key into a new account",
   162  				Action: utils.MigrateFlags(accountImport),
   163  				Flags: []cli.Flag{
   164  					utils.DataDirFlag,
   165  					utils.KeyStoreDirFlag,
   166  					utils.PasswordFileFlag,
   167  					utils.LightKDFFlag,
   168  				},
   169  				ArgsUsage: "<keyFile>",
   170  				Description: `
   171      geth account import <keyfile>
   172  
   173  Imports an unencrypted private key from <keyfile> and creates a new account.
   174  Prints the address.
   175  
   176  The keyfile is assumed to contain an unencrypted private key in hexadecimal format.
   177  
   178  The account is saved in encrypted format, you are prompted for a password.
   179  
   180  You must remember this password to unlock your account in the future.
   181  
   182  For non-interactive use the password can be specified with the -password flag:
   183  
   184      geth account import [options] <keyfile>
   185  
   186  Note:
   187  As you can directly copy your encrypted accounts to another ethereum instance,
   188  this import mechanism is not needed when you transfer an account between
   189  nodes.
   190  `,
   191  			},
   192  		},
   193  	}
   194  )
   195  
   196  func accountList(ctx *cli.Context) error {
   197  	stack, _ := makeConfigNode(ctx)
   198  	var index int
   199  	for _, wallet := range stack.AccountManager().Wallets() {
   200  		for _, account := range wallet.Accounts() {
   201  			fmt.Printf("Account #%d: {%x} %s\n", index, account.Address, &account.URL)
   202  			index++
   203  		}
   204  	}
   205  	return nil
   206  }
   207  
   208  // tries unlocking the specified account a few times.
   209  func unlockAccount(ks *keystore.KeyStore, address string, i int, passwords []string) (accounts.Account, string) {
   210  	account, err := utils.MakeAddress(ks, address)
   211  	if err != nil {
   212  		utils.Fatalf("Could not list accounts: %v", err)
   213  	}
   214  	for trials := 0; trials < 3; trials++ {
   215  		prompt := fmt.Sprintf("Unlocking account %s | Attempt %d/%d", address, trials+1, 3)
   216  		password := getPassPhrase(prompt, false, i, passwords)
   217  		err = ks.Unlock(account, password)
   218  		if err == nil {
   219  			log.Info("Unlocked account", "address", account.Address.Hex())
   220  			return account, password
   221  		}
   222  		if err, ok := err.(*keystore.AmbiguousAddrError); ok {
   223  			log.Info("Unlocked account", "address", account.Address.Hex())
   224  			return ambiguousAddrRecovery(ks, err, password), password
   225  		}
   226  		if err != keystore.ErrDecrypt {
   227  			// No need to prompt again if the error is not decryption-related.
   228  			break
   229  		}
   230  	}
   231  	// All trials expended to unlock account, bail out
   232  	utils.Fatalf("Failed to unlock account %s (%v)", address, err)
   233  
   234  	return accounts.Account{}, ""
   235  }
   236  
   237  // getPassPhrase retrieves the password associated with an account, either fetched
   238  // from a list of preloaded passphrases, or requested interactively from the user.
   239  func getPassPhrase(prompt string, confirmation bool, i int, passwords []string) string {
   240  	// If a list of passwords was supplied, retrieve from them
   241  	if len(passwords) > 0 {
   242  		if i < len(passwords) {
   243  			return passwords[i]
   244  		}
   245  		return passwords[len(passwords)-1]
   246  	}
   247  	// Otherwise prompt the user for the password
   248  	if prompt != "" {
   249  		fmt.Println(prompt)
   250  	}
   251  	password, err := console.Stdin.PromptPassword("Password: ")
   252  	if err != nil {
   253  		utils.Fatalf("Failed to read password: %v", err)
   254  	}
   255  	if confirmation {
   256  		confirm, err := console.Stdin.PromptPassword("Repeat password: ")
   257  		if err != nil {
   258  			utils.Fatalf("Failed to read password confirmation: %v", err)
   259  		}
   260  		if password != confirm {
   261  			utils.Fatalf("Passwords do not match")
   262  		}
   263  	}
   264  	return password
   265  }
   266  
   267  func ambiguousAddrRecovery(ks *keystore.KeyStore, err *keystore.AmbiguousAddrError, auth string) accounts.Account {
   268  	fmt.Printf("Multiple key files exist for address %x:\n", err.Addr)
   269  	for _, a := range err.Matches {
   270  		fmt.Println("  ", a.URL)
   271  	}
   272  	fmt.Println("Testing your password against all of them...")
   273  	var match *accounts.Account
   274  	for _, a := range err.Matches {
   275  		if err := ks.Unlock(a, auth); err == nil {
   276  			match = &a
   277  			break
   278  		}
   279  	}
   280  	if match == nil {
   281  		utils.Fatalf("None of the listed files could be unlocked.")
   282  	}
   283  	fmt.Printf("Your password unlocked %s\n", match.URL)
   284  	fmt.Println("In order to avoid this warning, you need to remove the following duplicate key files:")
   285  	for _, a := range err.Matches {
   286  		if a != *match {
   287  			fmt.Println("  ", a.URL)
   288  		}
   289  	}
   290  	return *match
   291  }
   292  
   293  // accountCreate creates a new account into the keystore defined by the CLI flags.
   294  func accountCreate(ctx *cli.Context) error {
   295  	cfg := gethConfig{Node: defaultNodeConfig()}
   296  	// Load config file.
   297  	if file := ctx.GlobalString(configFileFlag.Name); file != "" {
   298  		if err := loadConfig(file, &cfg); err != nil {
   299  			utils.Fatalf("%v", err)
   300  		}
   301  	}
   302  	utils.SetNodeConfig(ctx, &cfg.Node)
   303  	scryptN, scryptP, keydir, err := cfg.Node.AccountConfig()
   304  
   305  	if err != nil {
   306  		utils.Fatalf("Failed to read configuration: %v", err)
   307  	}
   308  
   309  	password := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
   310  
   311  	account, err := keystore.StoreKey(keydir, password, scryptN, scryptP)
   312  
   313  	if err != nil {
   314  		utils.Fatalf("Failed to create account: %v", err)
   315  	}
   316  	fmt.Printf("\nYour new key was generated\n\n")
   317  	fmt.Printf("Public address of the key:   %s\n", account.Address.Hex())
   318  	fmt.Printf("Path of the secret key file: %s\n\n", account.URL.Path)
   319  	fmt.Printf("- You can share your public address with anyone. Others need it to interact with you.\n")
   320  	fmt.Printf("- You must NEVER share the secret key with anyone! The key controls access to your funds!\n")
   321  	fmt.Printf("- You must BACKUP your key file! Without the key, it's impossible to access account funds!\n")
   322  	fmt.Printf("- You must REMEMBER your password! Without the password, it's impossible to decrypt the key!\n\n")
   323  	return nil
   324  }
   325  
   326  // accountUpdate transitions an account from a previous format to the current
   327  // one, also providing the possibility to change the pass-phrase.
   328  func accountUpdate(ctx *cli.Context) error {
   329  	if len(ctx.Args()) == 0 {
   330  		utils.Fatalf("No accounts specified to update")
   331  	}
   332  	stack, _ := makeConfigNode(ctx)
   333  	ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
   334  
   335  	for _, addr := range ctx.Args() {
   336  		account, oldPassword := unlockAccount(ks, addr, 0, nil)
   337  		newPassword := getPassPhrase("Please give a new password. Do not forget this password.", true, 0, nil)
   338  		if err := ks.Update(account, oldPassword, newPassword); err != nil {
   339  			utils.Fatalf("Could not update the account: %v", err)
   340  		}
   341  	}
   342  	return nil
   343  }
   344  
   345  func importWallet(ctx *cli.Context) error {
   346  	keyfile := ctx.Args().First()
   347  	if len(keyfile) == 0 {
   348  		utils.Fatalf("keyfile must be given as argument")
   349  	}
   350  	keyJSON, err := ioutil.ReadFile(keyfile)
   351  	if err != nil {
   352  		utils.Fatalf("Could not read wallet file: %v", err)
   353  	}
   354  
   355  	stack, _ := makeConfigNode(ctx)
   356  	passphrase := getPassPhrase("", false, 0, utils.MakePasswordList(ctx))
   357  
   358  	ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
   359  	acct, err := ks.ImportPreSaleKey(keyJSON, passphrase)
   360  	if err != nil {
   361  		utils.Fatalf("%v", err)
   362  	}
   363  	fmt.Printf("Address: {%x}\n", acct.Address)
   364  	return nil
   365  }
   366  
   367  func accountImport(ctx *cli.Context) error {
   368  	keyfile := ctx.Args().First()
   369  	if len(keyfile) == 0 {
   370  		utils.Fatalf("keyfile must be given as argument")
   371  	}
   372  	key, err := crypto.LoadECDSA(keyfile)
   373  	if err != nil {
   374  		utils.Fatalf("Failed to load the private key: %v", err)
   375  	}
   376  	stack, _ := makeConfigNode(ctx)
   377  	passphrase := getPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
   378  
   379  	ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore)
   380  	acct, err := ks.ImportECDSA(key, passphrase)
   381  	if err != nil {
   382  		utils.Fatalf("Could not create the account: %v", err)
   383  	}
   384  	fmt.Printf("Address: {%x}\n", acct.Address)
   385  	return nil
   386  }