mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 12:57:18 +00:00
9d979de4ed
* implementation using petname and keystore * writing new account to disk along with password * more logic for properly writing accounts * print out mnemonic * save deposit data rlp * write deposit tx and ssz deposit data to account path * wrap up account creation * fix prompt * generate deposit tx * direct account creation test * fix up formatting * lint * match formatting * more sustainable approach towards unmarshaling config file * resolve feedback * fix broken import * comprehensive tests for create account * tests pass * Merge branch 'master' into direct-keys * tidy * Merge branch 'direct-keys' of github.com:prysmaticlabs/prysm into direct-keys * Merge refs/heads/master into direct-keys * gaz * Merge branch 'direct-keys' of github.com:prysmaticlabs/prysm into direct-keys * nondeterministic names * comment * gaz * better error wrap * Merge refs/heads/master into direct-keys * docker deps * Merge branch 'direct-keys' of github.com:prysmaticlabs/prysm into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * Merge refs/heads/master into direct-keys * ivan feedback * Merge refs/heads/master into direct-keys * Update validator/accounts/v2/wallet.go Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * fixed tests and comments * Merge refs/heads/master into direct-keys
311 lines
9.1 KiB
Go
311 lines
9.1 KiB
Go
package v2
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"path"
|
|
"unicode"
|
|
|
|
"github.com/manifoldco/promptui"
|
|
strongPasswords "github.com/nbutton23/zxcvbn-go"
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/validator/flags"
|
|
v2keymanager "github.com/prysmaticlabs/prysm/validator/keymanager/v2"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/direct"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
var log = logrus.WithField("prefix", "accounts-v2")
|
|
|
|
const (
|
|
minPasswordLength = 8
|
|
// Min password score of 3 out of 5 based on the https://github.com/nbutton23/zxcvbn-go
|
|
// library for strong-entropy password computation.
|
|
minPasswordScore = 3
|
|
)
|
|
|
|
var keymanagerKindSelections = map[v2keymanager.Kind]string{
|
|
v2keymanager.Direct: "Direct, On-Disk Accounts (Recommended)",
|
|
v2keymanager.Derived: "Derived Accounts (Advanced)",
|
|
v2keymanager.Remote: "Remote Accounts (Advanced)",
|
|
}
|
|
|
|
// NewAccount creates a new validator account from user input. If a user
|
|
// does not have an initialized wallet at the specified wallet path, this
|
|
// method will create a new wallet and ask user for input for their new wallet's
|
|
// available options.
|
|
func NewAccount(cliCtx *cli.Context) error {
|
|
// Read a wallet's directory from user input.
|
|
walletDir, err := inputWalletDir(cliCtx)
|
|
if err != nil {
|
|
log.Fatalf("Could not parse wallet directory: %v", err)
|
|
}
|
|
|
|
// Read the directory for password storage from user input.
|
|
passwordsDirPath := inputPasswordsDirectory(cliCtx)
|
|
|
|
ctx := context.Background()
|
|
// Check if the user has a wallet at the specified path.
|
|
// If a user does not have a wallet, we instantiate one
|
|
// based on specified options.
|
|
var wallet *Wallet
|
|
var isNewWallet bool
|
|
ok, err := hasWalletDir(walletDir)
|
|
if err != nil {
|
|
log.Fatalf("Could not check if wallet exists at %s: %v", walletDir, err)
|
|
}
|
|
if ok {
|
|
// Read the wallet from the specified path.
|
|
wallet, err = OpenWallet(ctx, &WalletConfig{
|
|
PasswordsDir: passwordsDirPath,
|
|
WalletDir: walletDir,
|
|
})
|
|
if err != nil {
|
|
log.Fatalf("Could not read wallet at specified path %s: %v", walletDir, err)
|
|
}
|
|
} else {
|
|
// Determine the desired keymanager kind for the wallet from user input.
|
|
keymanagerKind, err := inputKeymanagerKind(cliCtx)
|
|
if err != nil {
|
|
log.Fatalf("Could not select keymanager kind: %v", err)
|
|
}
|
|
|
|
walletConfig := &WalletConfig{
|
|
PasswordsDir: passwordsDirPath,
|
|
WalletDir: walletDir,
|
|
KeymanagerKind: keymanagerKind,
|
|
}
|
|
wallet, err = CreateWallet(ctx, walletConfig)
|
|
if err != nil {
|
|
log.Fatalf("Could not create wallet at specified path %s: %v", walletDir, err)
|
|
}
|
|
isNewWallet = true
|
|
}
|
|
|
|
// We initialize a new keymanager depending on the user's selected keymanager kind.
|
|
var keymanager v2keymanager.IKeymanager
|
|
if isNewWallet {
|
|
keymanager, err = initializeNewKeymanager(ctx, wallet)
|
|
} else {
|
|
keymanager, err = initializeExistingKeymanager(ctx, wallet)
|
|
}
|
|
if err != nil {
|
|
log.Fatalf("Could not initialize keymanager: %v", err)
|
|
}
|
|
|
|
// Read the new account's password from user input.
|
|
password, err := inputAccountPassword(cliCtx)
|
|
if err != nil {
|
|
log.Fatalf("Could not read password: %v", err)
|
|
}
|
|
|
|
// Create a new validator account using the specified keymanager.
|
|
if err := keymanager.CreateAccount(ctx, password); err != nil {
|
|
log.Fatalf("Could not create account in wallet: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Initializes a keymanager. If a config file exists in the wallet, it
|
|
// reads the config file and initializes the keymanager that way. Otherwise,
|
|
// writes a new configuration file to the wallet and returns the initialized
|
|
// keymanager for use.
|
|
func initializeNewKeymanager(ctx context.Context, wallet *Wallet) (v2keymanager.IKeymanager, error) {
|
|
var keymanager v2keymanager.IKeymanager
|
|
var err error
|
|
switch wallet.KeymanagerKind() {
|
|
case v2keymanager.Direct:
|
|
keymanager = direct.NewKeymanager(ctx, wallet, direct.DefaultConfig())
|
|
case v2keymanager.Derived:
|
|
return nil, errors.New("derived keymanager is unimplemented, work in progress")
|
|
case v2keymanager.Remote:
|
|
return nil, errors.New("remote keymanager is unimplemented, work in progress")
|
|
default:
|
|
log.Fatal("Keymanager type must be specified")
|
|
}
|
|
keymanagerConfig, err := keymanager.MarshalConfigFile(ctx)
|
|
if err != nil {
|
|
log.Fatalf("Could not marshal keymanager config file: %v", err)
|
|
}
|
|
if err := wallet.WriteKeymanagerConfigToDisk(ctx, keymanagerConfig); err != nil {
|
|
log.Fatalf("Could not write keymanager config file to disk: %v", err)
|
|
}
|
|
return keymanager, nil
|
|
}
|
|
|
|
func initializeExistingKeymanager(
|
|
ctx context.Context, wallet *Wallet,
|
|
) (v2keymanager.IKeymanager, error) {
|
|
var keymanager v2keymanager.IKeymanager
|
|
switch wallet.KeymanagerKind() {
|
|
case v2keymanager.Direct:
|
|
configFile, err := wallet.ReadKeymanagerConfigFromDisk(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
cfg, err := direct.UnmarshalConfigFile(configFile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
keymanager = direct.NewKeymanager(ctx, wallet, cfg)
|
|
case v2keymanager.Derived:
|
|
return nil, errors.New("derived keymanager is unimplemented, work in progress")
|
|
case v2keymanager.Remote:
|
|
return nil, errors.New("remote keymanager is unimplemented, work in progress")
|
|
default:
|
|
return nil, errors.New("keymanager kind must be specified")
|
|
}
|
|
return keymanager, nil
|
|
}
|
|
|
|
// Check if a user has an existing wallet at the specified path.
|
|
func hasWalletDir(walletPath string) (bool, error) {
|
|
_, err := os.Stat(walletPath)
|
|
if os.IsNotExist(err) {
|
|
return false, nil
|
|
}
|
|
return true, err
|
|
}
|
|
|
|
func inputWalletDir(cliCtx *cli.Context) (string, error) {
|
|
walletDir := cliCtx.String(flags.WalletDirFlag.Name)
|
|
if walletDir == flags.DefaultValidatorDir() {
|
|
walletDir = path.Join(walletDir, walletDefaultDirName)
|
|
}
|
|
prompt := promptui.Prompt{
|
|
Label: "Enter a wallet directory",
|
|
Validate: validateDirectoryPath,
|
|
Default: walletDir,
|
|
}
|
|
walletPath, err := prompt.Run()
|
|
if err != nil {
|
|
return "", fmt.Errorf("could not determine wallet directory: %v", formatPromptError(err))
|
|
}
|
|
return walletPath, nil
|
|
}
|
|
|
|
func inputKeymanagerKind(_ *cli.Context) (v2keymanager.Kind, error) {
|
|
promptSelect := promptui.Select{
|
|
Label: "Select a type of wallet",
|
|
Items: []string{
|
|
keymanagerKindSelections[v2keymanager.Direct],
|
|
keymanagerKindSelections[v2keymanager.Derived],
|
|
keymanagerKindSelections[v2keymanager.Remote],
|
|
},
|
|
}
|
|
selection, _, err := promptSelect.Run()
|
|
if err != nil {
|
|
return v2keymanager.Direct, fmt.Errorf("could not select wallet type: %v", formatPromptError(err))
|
|
}
|
|
return v2keymanager.Kind(selection), nil
|
|
}
|
|
|
|
func inputAccountPassword(_ *cli.Context) (string, error) {
|
|
var hasValidPassword bool
|
|
var walletPassword string
|
|
var err error
|
|
for !hasValidPassword {
|
|
prompt := promptui.Prompt{
|
|
Label: "New account password",
|
|
Validate: validatePasswordInput,
|
|
Mask: '*',
|
|
}
|
|
|
|
walletPassword, err = prompt.Run()
|
|
if err != nil {
|
|
return "", fmt.Errorf("could not read wallet password: %v", formatPromptError(err))
|
|
}
|
|
|
|
prompt = promptui.Prompt{
|
|
Label: "Confirm password",
|
|
Mask: '*',
|
|
}
|
|
confirmPassword, err := prompt.Run()
|
|
if err != nil {
|
|
return "", fmt.Errorf("could not read password confirmation: %v", formatPromptError(err))
|
|
}
|
|
if walletPassword != confirmPassword {
|
|
log.Error("Passwords do not match")
|
|
continue
|
|
}
|
|
hasValidPassword = true
|
|
}
|
|
return walletPassword, nil
|
|
}
|
|
|
|
func inputPasswordsDirectory(cliCtx *cli.Context) string {
|
|
passwordsDir := cliCtx.String(flags.WalletPasswordsDirFlag.Name)
|
|
if passwordsDir == flags.DefaultValidatorDir() {
|
|
passwordsDir = path.Join(passwordsDir, walletDefaultDirName, passwordsDefaultDirName)
|
|
}
|
|
prompt := promptui.Prompt{
|
|
Label: "Passwords directory",
|
|
Validate: validateDirectoryPath,
|
|
Default: passwordsDir,
|
|
}
|
|
passwordsPath, err := prompt.Run()
|
|
if err != nil {
|
|
log.Fatalf("Could not determine passwords directory: %v", formatPromptError(err))
|
|
}
|
|
return passwordsPath
|
|
}
|
|
|
|
// Validate a strong password input for new accounts,
|
|
// including a min length, at least 1 number and at least
|
|
// 1 special character.
|
|
func validatePasswordInput(input string) error {
|
|
var (
|
|
hasMinLen = false
|
|
hasLetter = false
|
|
hasNumber = false
|
|
hasSpecial = false
|
|
)
|
|
if len(input) >= minPasswordLength {
|
|
hasMinLen = true
|
|
}
|
|
for _, char := range input {
|
|
switch {
|
|
case unicode.IsLetter(char):
|
|
hasLetter = true
|
|
case unicode.IsNumber(char):
|
|
hasNumber = true
|
|
case unicode.IsPunct(char) || unicode.IsSymbol(char):
|
|
hasSpecial = true
|
|
}
|
|
}
|
|
if !(hasMinLen && hasLetter && hasNumber && hasSpecial) {
|
|
return errors.New(
|
|
"password must have more than 8 characters, at least 1 special character, and 1 number",
|
|
)
|
|
}
|
|
strength := strongPasswords.PasswordStrength(input, nil)
|
|
if strength.Score < minPasswordScore {
|
|
return errors.New(
|
|
"password is too easy to guess, try a stronger password",
|
|
)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func validateDirectoryPath(input string) error {
|
|
if len(input) == 0 {
|
|
return errors.New("directory path must not be empty")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func formatPromptError(err error) error {
|
|
switch err {
|
|
case promptui.ErrAbort:
|
|
return errors.New("wallet creation aborted, closing")
|
|
case promptui.ErrInterrupt:
|
|
return errors.New("keyboard interrupt, closing")
|
|
case promptui.ErrEOF:
|
|
return errors.New("no input received, closing")
|
|
default:
|
|
return err
|
|
}
|
|
}
|