prysm-pulse/validator/accounts/v2/import.go
Ivan Martinez c72db6f96a
Accounts V2: Refactor prompts, deduplicate into directory and password (#6674)
* Refactor input code, deduplicate into directory and password
* Change to filepath
* Rename
* Make consts visible to whole validator package
* Fix
* Try commands and fix
* Fix defaults
* Fixes
* Merge branch 'master' into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Remove consts and add comment
* Merge branch 'refactor-input-prompts' of github.com:prysmaticlabs/prysm into refactor-input-prompts
* Undo
* Fixes
* Update validator/accounts/v2/prompt.go
* Merge refs/heads/master into refactor-input-prompts
* gofmt
* Merge refs/heads/master into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Merge branch 'master' into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Fix
* Merge refs/heads/master into refactor-input-prompts
* Merge refs/heads/master into refactor-input-prompts
* Accounts V2: Simplify Wallet Save/Read To and From Disk Functions (#6686)

* simplify wallet functions

* fix build

* futher simplify wallet

* simplify read/write methods

* move direct functions to direct keymanager

* further move direct km specific funcs

* cleanup

* simplify the direct tests

* fixed tests

* lint

* further simplify

* tidy

* fix config write

* fixed test

Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
* conflict resolution
* trim
2020-07-23 03:10:23 +00:00

151 lines
4.2 KiB
Go

package v2
import (
"archive/zip"
"context"
"fmt"
"io"
"os"
"path/filepath"
"strings"
"github.com/logrusorgru/aurora"
"github.com/pkg/errors"
"github.com/prysmaticlabs/prysm/validator/flags"
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/direct"
"github.com/urfave/cli/v2"
)
// ImportAccount uses the archived account made from ExportAccount to import an account and
// asks the users for account passwords.
func ImportAccount(cliCtx *cli.Context) error {
wallet, err := OpenWallet(cliCtx)
if err != nil {
return errors.Wrap(err, "could not open wallet")
}
keymanager, err := wallet.InitializeKeymanager(context.Background(), true /* skip mnemonic confirm */)
if err != nil {
return errors.Wrap(err, "could not initialize keymanager")
}
km, ok := keymanager.(*direct.Keymanager)
if !ok {
return errors.New("can only export accounts for a non-HD wallet")
}
backupDir, err := inputDirectory(cliCtx, importDirPromptText, flags.BackupDirFlag)
if err != nil {
return errors.Wrap(err, "could not parse output directory")
}
accountsImported, err := unzipArchiveToTarget(backupDir, wallet.AccountsDir())
if err != nil {
return errors.Wrap(err, "could not unzip archive")
}
au := aurora.NewAurora(true)
var loggedAccounts []string
for _, accountName := range accountsImported {
loggedAccounts = append(loggedAccounts, fmt.Sprintf("%s", au.BrightGreen(accountName).Bold()))
}
fmt.Printf("Importing accounts: %s\n", strings.Join(loggedAccounts, ", "))
for _, accountName := range accountsImported {
if err := km.EnterPasswordForAccount(cliCtx, accountName); err != nil {
return errors.Wrap(err, "could not set account password")
}
}
if err := logAccountsImported(wallet, km, accountsImported); err != nil {
return errors.Wrap(err, "could not log accounts imported")
}
return nil
}
func unzipArchiveToTarget(archiveDir string, target string) ([]string, error) {
archiveFile := filepath.Join(archiveDir, archiveFilename)
reader, err := zip.OpenReader(archiveFile)
if err != nil {
return nil, errors.Wrap(err, "could not open reader for archive")
}
perms := os.FileMode(0700)
if err := os.MkdirAll(target, perms); err != nil {
return nil, errors.Wrap(err, "could not parent path for folder")
}
var accounts []string
for _, file := range reader.File {
path := filepath.Join(target, file.Name)
parentFolder := filepath.Dir(path)
if file.FileInfo().IsDir() {
accounts = append(accounts, file.FileInfo().Name())
if err := os.MkdirAll(path, perms); err != nil {
return nil, errors.Wrap(err, "could not make path for file")
}
continue
} else {
if err := os.MkdirAll(parentFolder, perms); err != nil {
return nil, errors.Wrap(err, "could not make path for file")
}
}
if err := copyFileFromZipToPath(file, path); err != nil {
return nil, err
}
}
return accounts, nil
}
func copyFileFromZipToPath(file *zip.File, path string) error {
fileReader, err := file.Open()
if err != nil {
return err
}
defer func() {
if err := fileReader.Close(); err != nil {
log.WithError(err).Error("Could not close file")
}
}()
targetFile, err := os.Create(path)
if err != nil {
return errors.Wrap(err, "could not open file")
}
defer func() {
if err := targetFile.Close(); err != nil {
log.WithError(err).Error("Could not close target")
}
}()
if _, err := io.Copy(targetFile, fileReader); err != nil {
return errors.Wrap(err, "could not copy file")
}
return nil
}
func logAccountsImported(wallet *Wallet, keymanager *direct.Keymanager, accountNames []string) error {
au := aurora.NewAurora(true)
numAccounts := au.BrightYellow(len(accountNames))
fmt.Println("")
if len(accountNames) == 1 {
fmt.Printf("Imported %d validator account\n", numAccounts)
} else {
fmt.Printf("Imported %d validator accounts\n", numAccounts)
}
for _, accountName := range accountNames {
fmt.Println("")
fmt.Printf("%s\n", au.BrightGreen(accountName).Bold())
publicKey, err := keymanager.PublicKeyForAccount(accountName)
if err != nil {
return errors.Wrap(err, "could not get public key")
}
fmt.Printf("%s %#x\n", au.BrightMagenta("[public key]").Bold(), publicKey)
dirPath := au.BrightCyan("(wallet dir)")
fmt.Printf("%s %s\n", dirPath, filepath.Join(wallet.AccountsDir(), accountName))
}
return nil
}