github.com/kisexp/xdchain@v0.0.0-20211206025815-490d6b732aa7/cmd/geth/accountcmd.go (about) 1 // Copyright 2016 The go-ethereum Authors 2 // This file is part of go-ethereum. 3 // 4 // go-ethereum is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // go-ethereum is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU General Public License for more details. 13 // 14 // You should have received a copy of the GNU General Public License 15 // along with go-ethereum. If not, see <http://www.gnu.org/licenses/>. 16 17 package main 18 19 import ( 20 "fmt" 21 "io/ioutil" 22 23 "github.com/kisexp/xdchain/accounts" 24 "github.com/kisexp/xdchain/accounts/keystore" 25 "github.com/kisexp/xdchain/cmd/utils" 26 "github.com/kisexp/xdchain/crypto" 27 "github.com/kisexp/xdchain/log" 28 "gopkg.in/urfave/cli.v1" 29 ) 30 31 var ( 32 walletCommand = cli.Command{ 33 Name: "wallet", 34 Usage: "Manage Ethereum presale wallets", 35 ArgsUsage: "", 36 Category: "ACCOUNT COMMANDS", 37 Description: ` 38 geth wallet import /path/to/my/presale.wallet 39 40 will prompt for your password and imports your ether presale account. 41 It can be used non-interactively with the --password option taking a 42 passwordfile as argument containing the wallet password in plaintext.`, 43 Subcommands: []cli.Command{ 44 { 45 46 Name: "import", 47 Usage: "Import Ethereum presale wallet", 48 ArgsUsage: "<keyFile>", 49 Action: utils.MigrateFlags(importWallet), 50 Category: "ACCOUNT COMMANDS", 51 Flags: []cli.Flag{ 52 utils.DataDirFlag, 53 utils.KeyStoreDirFlag, 54 utils.PasswordFileFlag, 55 utils.LightKDFFlag, 56 }, 57 Description: ` 58 geth wallet [options] /path/to/my/presale.wallet 59 60 will prompt for your password and imports your ether presale account. 61 It can be used non-interactively with the --password option taking a 62 passwordfile as argument containing the wallet password in plaintext.`, 63 }, 64 }, 65 } 66 67 accountCommand = cli.Command{ 68 Name: "account", 69 Usage: "Manage accounts", 70 Category: "ACCOUNT COMMANDS", 71 Description: ` 72 73 Manage accounts, list all existing accounts, import a private key into a new 74 account, create a new account or update an existing account. 75 76 It supports interactive mode, when you are prompted for password as well as 77 non-interactive mode where passwords are supplied via a given password file. 78 Non-interactive mode is only meant for scripted use on test networks or known 79 safe environments. 80 81 Make sure you remember the password you gave when creating a new account (with 82 either new or import). Without it you are not able to unlock your account. 83 84 Note that exporting your key in unencrypted format is NOT supported. 85 86 Keys are stored under <DATADIR>/keystore. 87 It is safe to transfer the entire directory or the individual keys therein 88 between ethereum nodes by simply copying. 89 90 Make sure you backup your keys regularly.`, 91 Subcommands: []cli.Command{ 92 { 93 Name: "list", 94 Usage: "Print summary of existing accounts", 95 Action: utils.MigrateFlags(accountList), 96 Flags: []cli.Flag{ 97 utils.DataDirFlag, 98 utils.KeyStoreDirFlag, 99 }, 100 Description: ` 101 Print a short summary of all accounts`, 102 }, 103 { 104 Name: "new", 105 Usage: "Create a new account", 106 Action: utils.MigrateFlags(accountCreate), 107 Flags: []cli.Flag{ 108 utils.DataDirFlag, 109 utils.KeyStoreDirFlag, 110 utils.PasswordFileFlag, 111 utils.LightKDFFlag, 112 }, 113 Description: ` 114 geth account new 115 116 Creates a new account and prints the address. 117 118 The account is saved in encrypted format, you are prompted for a password. 119 120 You must remember this password to unlock your account in the future. 121 122 For non-interactive use the password can be specified with the --password flag: 123 124 Note, this is meant to be used for testing only, it is a bad idea to save your 125 password to file or expose in any other way. 126 `, 127 }, 128 { 129 Name: "update", 130 Usage: "Update an existing account", 131 Action: utils.MigrateFlags(accountUpdate), 132 ArgsUsage: "<address>", 133 Flags: []cli.Flag{ 134 utils.DataDirFlag, 135 utils.KeyStoreDirFlag, 136 utils.LightKDFFlag, 137 }, 138 Description: ` 139 geth account update <address> 140 141 Update an existing account. 142 143 The account is saved in the newest version in encrypted format, you are prompted 144 for a password to unlock the account and another to save the updated file. 145 146 This same command can therefore be used to migrate an account of a deprecated 147 format to the newest format or change the password for an account. 148 149 For non-interactive use the password can be specified with the --password flag: 150 151 geth account update [options] <address> 152 153 Since only one password can be given, only format update can be performed, 154 changing your password is only possible interactively. 155 `, 156 }, 157 { 158 Name: "import", 159 Usage: "Import a private key into a new account", 160 Action: utils.MigrateFlags(accountImport), 161 Flags: []cli.Flag{ 162 utils.DataDirFlag, 163 utils.KeyStoreDirFlag, 164 utils.PasswordFileFlag, 165 utils.LightKDFFlag, 166 }, 167 ArgsUsage: "<keyFile>", 168 Description: ` 169 geth account import <keyfile> 170 171 Imports an unencrypted private key from <keyfile> and creates a new account. 172 Prints the address. 173 174 The keyfile is assumed to contain an unencrypted private key in hexadecimal format. 175 176 The account is saved in encrypted format, you are prompted for a password. 177 178 You must remember this password to unlock your account in the future. 179 180 For non-interactive use the password can be specified with the -password flag: 181 182 geth account import [options] <keyfile> 183 184 Note: 185 As you can directly copy your encrypted accounts to another ethereum instance, 186 this import mechanism is not needed when you transfer an account between 187 nodes. 188 `, 189 }, 190 quorumAccountPluginCommands, 191 }, 192 } 193 ) 194 195 func accountList(ctx *cli.Context) error { 196 stack, _ := makeConfigNode(ctx) 197 var index int 198 for _, wallet := range stack.AccountManager().Wallets() { 199 for _, account := range wallet.Accounts() { 200 fmt.Printf("Account #%d: {%x} %s\n", index, account.Address, &account.URL) 201 index++ 202 } 203 } 204 return nil 205 } 206 207 // tries unlocking the specified account a few times. 208 func unlockAccount(ks *keystore.KeyStore, address string, i int, passwords []string) (accounts.Account, string) { 209 account, err := utils.MakeAddress(ks, address) 210 if err != nil { 211 utils.Fatalf("Could not list accounts: %v", err) 212 } 213 for trials := 0; trials < 3; trials++ { 214 prompt := fmt.Sprintf("Unlocking account %s | Attempt %d/%d", address, trials+1, 3) 215 password := utils.GetPassPhraseWithList(prompt, false, i, passwords) 216 err = ks.Unlock(account, password) 217 if err == nil { 218 log.Info("Unlocked account", "address", account.Address.Hex()) 219 return account, password 220 } 221 if err, ok := err.(*keystore.AmbiguousAddrError); ok { 222 log.Info("Unlocked account", "address", account.Address.Hex()) 223 return ambiguousAddrRecovery(ks, err, password), password 224 } 225 if err != keystore.ErrDecrypt { 226 // No need to prompt again if the error is not decryption-related. 227 break 228 } 229 } 230 // All trials expended to unlock account, bail out 231 utils.Fatalf("Failed to unlock account %s (%v)", address, err) 232 233 return accounts.Account{}, "" 234 } 235 236 func ambiguousAddrRecovery(ks *keystore.KeyStore, err *keystore.AmbiguousAddrError, auth string) accounts.Account { 237 fmt.Printf("Multiple key files exist for address %x:\n", err.Addr) 238 for _, a := range err.Matches { 239 fmt.Println(" ", a.URL) 240 } 241 fmt.Println("Testing your password against all of them...") 242 var match *accounts.Account 243 for _, a := range err.Matches { 244 if err := ks.Unlock(a, auth); err == nil { 245 match = &a 246 break 247 } 248 } 249 if match == nil { 250 utils.Fatalf("None of the listed files could be unlocked.") 251 } 252 fmt.Printf("Your password unlocked %s\n", match.URL) 253 fmt.Println("In order to avoid this warning, you need to remove the following duplicate key files:") 254 for _, a := range err.Matches { 255 if a != *match { 256 fmt.Println(" ", a.URL) 257 } 258 } 259 return *match 260 } 261 262 // accountCreate creates a new account into the keystore defined by the CLI flags. 263 func accountCreate(ctx *cli.Context) error { 264 cfg := gethConfig{Node: defaultNodeConfig()} 265 // Load config file. 266 if file := ctx.GlobalString(configFileFlag.Name); file != "" { 267 if err := loadConfig(file, &cfg); err != nil { 268 utils.Fatalf("%v", err) 269 } 270 } 271 utils.SetNodeConfig(ctx, &cfg.Node) 272 scryptN, scryptP, keydir, err := cfg.Node.AccountConfig() 273 274 if err != nil { 275 utils.Fatalf("Failed to read configuration: %v", err) 276 } 277 278 password := utils.GetPassPhraseWithList("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx)) 279 280 account, err := keystore.StoreKey(keydir, password, scryptN, scryptP) 281 282 if err != nil { 283 utils.Fatalf("Failed to create account: %v", err) 284 } 285 fmt.Printf("\nYour new key was generated\n\n") 286 fmt.Printf("Public address of the key: %s\n", account.Address.Hex()) 287 fmt.Printf("Path of the secret key file: %s\n\n", account.URL.Path) 288 fmt.Printf("- You can share your public address with anyone. Others need it to interact with you.\n") 289 fmt.Printf("- You must NEVER share the secret key with anyone! The key controls access to your funds!\n") 290 fmt.Printf("- You must BACKUP your key file! Without the key, it's impossible to access account funds!\n") 291 fmt.Printf("- You must REMEMBER your password! Without the password, it's impossible to decrypt the key!\n\n") 292 return nil 293 } 294 295 // accountUpdate transitions an account from a previous format to the current 296 // one, also providing the possibility to change the pass-phrase. 297 func accountUpdate(ctx *cli.Context) error { 298 if len(ctx.Args()) == 0 { 299 utils.Fatalf("No accounts specified to update") 300 } 301 stack, _ := makeConfigNode(ctx) 302 ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore) 303 304 for _, addr := range ctx.Args() { 305 account, oldPassword := unlockAccount(ks, addr, 0, nil) 306 newPassword := utils.GetPassPhraseWithList("Please give a new password. Do not forget this password.", true, 0, nil) 307 if err := ks.Update(account, oldPassword, newPassword); err != nil { 308 utils.Fatalf("Could not update the account: %v", err) 309 } 310 } 311 return nil 312 } 313 314 func importWallet(ctx *cli.Context) error { 315 keyfile := ctx.Args().First() 316 if len(keyfile) == 0 { 317 utils.Fatalf("keyfile must be given as argument") 318 } 319 keyJSON, err := ioutil.ReadFile(keyfile) 320 if err != nil { 321 utils.Fatalf("Could not read wallet file: %v", err) 322 } 323 324 stack, _ := makeConfigNode(ctx) 325 passphrase := utils.GetPassPhraseWithList("", false, 0, utils.MakePasswordList(ctx)) 326 327 ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore) 328 acct, err := ks.ImportPreSaleKey(keyJSON, passphrase) 329 if err != nil { 330 utils.Fatalf("%v", err) 331 } 332 fmt.Printf("Address: {%x}\n", acct.Address) 333 return nil 334 } 335 336 func accountImport(ctx *cli.Context) error { 337 keyfile := ctx.Args().First() 338 if len(keyfile) == 0 { 339 utils.Fatalf("keyfile must be given as argument") 340 } 341 key, err := crypto.LoadECDSA(keyfile) 342 if err != nil { 343 utils.Fatalf("Failed to load the private key: %v", err) 344 } 345 stack, _ := makeConfigNode(ctx) 346 passphrase := utils.GetPassPhraseWithList("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx)) 347 348 ks := stack.AccountManager().Backends(keystore.KeyStoreType)[0].(*keystore.KeyStore) 349 acct, err := ks.ImportECDSA(key, passphrase) 350 if err != nil { 351 utils.Fatalf("Could not create the account: %v", err) 352 } 353 fmt.Printf("Address: {%x}\n", acct.Address) 354 return nil 355 }