mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 12:57:18 +00:00
323769bf1a
* disable-remote-signer-tls flag * use flag in edit-config * send requests without TLS * change warning message * fix account list output test Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
111 lines
3.4 KiB
Go
111 lines
3.4 KiB
Go
package accounts
|
|
|
|
import (
|
|
"github.com/prysmaticlabs/prysm/shared/cmd"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
"github.com/prysmaticlabs/prysm/shared/tos"
|
|
"github.com/prysmaticlabs/prysm/validator/flags"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
// WalletCommands for accounts for Prysm validators.
|
|
var WalletCommands = &cli.Command{
|
|
Name: "wallet",
|
|
Category: "wallet",
|
|
Usage: "defines commands for interacting with eth2 validator wallets",
|
|
Subcommands: []*cli.Command{
|
|
{
|
|
Name: "create",
|
|
Usage: "creates a new wallet with a desired type of keymanager: " +
|
|
"either on-disk (imported), derived, or using remote credentials",
|
|
Flags: cmd.WrapFlags([]cli.Flag{
|
|
flags.WalletDirFlag,
|
|
flags.KeymanagerKindFlag,
|
|
flags.GrpcRemoteAddressFlag,
|
|
flags.DisableRemoteSignerTlsFlag,
|
|
flags.RemoteSignerCertPathFlag,
|
|
flags.RemoteSignerKeyPathFlag,
|
|
flags.RemoteSignerCACertPathFlag,
|
|
flags.WalletPasswordFileFlag,
|
|
flags.Mnemonic25thWordFileFlag,
|
|
flags.SkipMnemonic25thWordCheckFlag,
|
|
featureconfig.Mainnet,
|
|
featureconfig.PyrmontTestnet,
|
|
featureconfig.ToledoTestnet,
|
|
cmd.AcceptTosFlag,
|
|
}),
|
|
Before: func(cliCtx *cli.Context) error {
|
|
if err := cmd.LoadFlagsFromConfig(cliCtx, cliCtx.Command.Flags); err != nil {
|
|
return err
|
|
}
|
|
return tos.VerifyTosAcceptedOrPrompt(cliCtx)
|
|
},
|
|
Action: func(cliCtx *cli.Context) error {
|
|
featureconfig.ConfigureValidator(cliCtx)
|
|
if _, err := CreateAndSaveWalletCli(cliCtx); err != nil {
|
|
log.Fatalf("Could not create a wallet: %v", err)
|
|
}
|
|
return nil
|
|
},
|
|
},
|
|
{
|
|
Name: "edit-config",
|
|
Usage: "edits a wallet configuration options, such as gRPC connection credentials and TLS certificates",
|
|
Flags: cmd.WrapFlags([]cli.Flag{
|
|
flags.WalletDirFlag,
|
|
flags.GrpcRemoteAddressFlag,
|
|
flags.DisableRemoteSignerTlsFlag,
|
|
flags.RemoteSignerCertPathFlag,
|
|
flags.RemoteSignerKeyPathFlag,
|
|
flags.RemoteSignerCACertPathFlag,
|
|
featureconfig.Mainnet,
|
|
featureconfig.PyrmontTestnet,
|
|
featureconfig.ToledoTestnet,
|
|
cmd.AcceptTosFlag,
|
|
}),
|
|
Before: func(cliCtx *cli.Context) error {
|
|
if err := cmd.LoadFlagsFromConfig(cliCtx, cliCtx.Command.Flags); err != nil {
|
|
return err
|
|
}
|
|
return tos.VerifyTosAcceptedOrPrompt(cliCtx)
|
|
},
|
|
Action: func(cliCtx *cli.Context) error {
|
|
featureconfig.ConfigureValidator(cliCtx)
|
|
if err := EditWalletConfigurationCli(cliCtx); err != nil {
|
|
log.Fatalf("Could not edit wallet configuration: %v", err)
|
|
}
|
|
return nil
|
|
},
|
|
},
|
|
{
|
|
Name: "recover",
|
|
Usage: "uses a derived wallet seed recovery phase to recreate an existing HD wallet",
|
|
Flags: cmd.WrapFlags([]cli.Flag{
|
|
flags.WalletDirFlag,
|
|
flags.MnemonicFileFlag,
|
|
flags.WalletPasswordFileFlag,
|
|
flags.NumAccountsFlag,
|
|
flags.Mnemonic25thWordFileFlag,
|
|
flags.SkipMnemonic25thWordCheckFlag,
|
|
featureconfig.Mainnet,
|
|
featureconfig.PyrmontTestnet,
|
|
featureconfig.ToledoTestnet,
|
|
cmd.AcceptTosFlag,
|
|
}),
|
|
Before: func(cliCtx *cli.Context) error {
|
|
if err := cmd.LoadFlagsFromConfig(cliCtx, cliCtx.Command.Flags); err != nil {
|
|
return err
|
|
}
|
|
return tos.VerifyTosAcceptedOrPrompt(cliCtx)
|
|
},
|
|
Action: func(cliCtx *cli.Context) error {
|
|
featureconfig.ConfigureValidator(cliCtx)
|
|
if err := RecoverWalletCli(cliCtx); err != nil {
|
|
log.Fatalf("Could not recover wallet: %v", err)
|
|
}
|
|
return nil
|
|
},
|
|
},
|
|
},
|
|
}
|