mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-15 14:38:20 +00:00
c72db6f96a
* Refactor input code, deduplicate into directory and password * Change to filepath * Rename * Make consts visible to whole validator package * Fix * Try commands and fix * Fix defaults * Fixes * Merge branch 'master' into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Remove consts and add comment * Merge branch 'refactor-input-prompts' of github.com:prysmaticlabs/prysm into refactor-input-prompts * Undo * Fixes * Update validator/accounts/v2/prompt.go * Merge refs/heads/master into refactor-input-prompts * gofmt * Merge refs/heads/master into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Merge branch 'master' into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Fix * Merge refs/heads/master into refactor-input-prompts * Merge refs/heads/master into refactor-input-prompts * Accounts V2: Simplify Wallet Save/Read To and From Disk Functions (#6686) * simplify wallet functions * fix build * futher simplify wallet * simplify read/write methods * move direct functions to direct keymanager * further move direct km specific funcs * cleanup * simplify the direct tests * fixed tests * lint * further simplify * tidy * fix config write * fixed test Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com> * conflict resolution * trim
107 lines
4.1 KiB
Go
107 lines
4.1 KiB
Go
package v2
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/validator/flags"
|
|
v2keymanager "github.com/prysmaticlabs/prysm/validator/keymanager/v2"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/derived"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/direct"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/remote"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
// CreateWallet from user input with a desired keymanager. If a
|
|
// wallet already exists in the path, it suggests the user alternatives
|
|
// such as how to edit their existing wallet configuration.
|
|
func CreateWallet(cliCtx *cli.Context) error {
|
|
w, err := NewWallet(cliCtx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not check if wallet directory exists")
|
|
}
|
|
switch w.KeymanagerKind() {
|
|
case v2keymanager.Direct:
|
|
if err = createDirectKeymanagerWallet(cliCtx, w); err != nil {
|
|
return errors.Wrap(err, "could not initialize wallet with direct keymanager")
|
|
}
|
|
log.WithField("wallet-path", w.accountsPath).Infof(
|
|
"Successfully created wallet with on-disk keymanager configuration. " +
|
|
"Make a new validator account with ./prysm.sh validator accounts-v2 create",
|
|
)
|
|
case v2keymanager.Derived:
|
|
if err = createDerivedKeymanagerWallet(cliCtx, w); err != nil {
|
|
return errors.Wrap(err, "could not initialize wallet with derived keymanager")
|
|
}
|
|
log.WithField("wallet-path", w.accountsPath).Infof(
|
|
"Successfully created HD wallet and saved configuration to disk. " +
|
|
"Make a new validator account with ./prysm.sh validator accounts-2 create",
|
|
)
|
|
case v2keymanager.Remote:
|
|
if err = createRemoteKeymanagerWallet(cliCtx, w); err != nil {
|
|
return errors.Wrap(err, "could not initialize wallet with remote keymanager")
|
|
}
|
|
log.WithField("wallet-path", w.accountsPath).Infof(
|
|
"Successfully created wallet with remote keymanager configuration",
|
|
)
|
|
default:
|
|
return errors.Wrapf(err, "keymanager type %s is not supported", w.KeymanagerKind())
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func createDirectKeymanagerWallet(cliCtx *cli.Context, wallet *Wallet) error {
|
|
keymanagerConfig, err := direct.MarshalConfigFile(context.Background(), direct.DefaultConfig())
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal keymanager config file")
|
|
}
|
|
if err := wallet.WriteKeymanagerConfigToDisk(context.Background(), keymanagerConfig); err != nil {
|
|
return errors.Wrap(err, "could not write keymanager config to disk")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func createDerivedKeymanagerWallet(cliCtx *cli.Context, wallet *Wallet) error {
|
|
skipMnemonicConfirm := cliCtx.Bool(flags.SkipMnemonicConfirmFlag.Name)
|
|
ctx := context.Background()
|
|
walletPassword, err := inputPassword(cliCtx, newWalletPasswordPromptText, confirmPass)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
seedConfig, err := derived.InitializeWalletSeedFile(ctx, walletPassword, skipMnemonicConfirm)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not initialize new wallet seed file")
|
|
}
|
|
seedConfigFile, err := derived.MarshalEncryptedSeedFile(ctx, seedConfig)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal encrypted wallet seed file")
|
|
}
|
|
keymanagerConfig, err := derived.MarshalConfigFile(ctx, derived.DefaultConfig())
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal keymanager config file")
|
|
}
|
|
if err := wallet.WriteKeymanagerConfigToDisk(ctx, keymanagerConfig); err != nil {
|
|
return errors.Wrap(err, "could not write keymanager config to disk")
|
|
}
|
|
if err := wallet.WriteEncryptedSeedToDisk(ctx, seedConfigFile); err != nil {
|
|
return errors.Wrap(err, "could not write encrypted wallet seed config to disk")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func createRemoteKeymanagerWallet(cliCtx *cli.Context, wallet *Wallet) error {
|
|
conf, err := inputRemoteKeymanagerConfig(cliCtx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not input remote keymanager config")
|
|
}
|
|
ctx := context.Background()
|
|
keymanagerConfig, err := remote.MarshalConfigFile(ctx, conf)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal config file")
|
|
}
|
|
if err := wallet.WriteKeymanagerConfigToDisk(ctx, keymanagerConfig); err != nil {
|
|
return errors.Wrap(err, "could not write keymanager config to disk")
|
|
}
|
|
return nil
|
|
}
|