mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-15 14:38:20 +00:00
ee1adddd24
* Fix accounts v2 runtime * Accounts V2: Fix issues found by rkapka * Add to help * Merge refs/heads/master into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime * Fixes * add back error * Make new wallet error cleaner * Fix text * Fix log * Add case for normal error * Update validator/flags/flags.go Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Merge branch 'master' of github.com:prysmaticlabs/prysm into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime * Fix comment * Merge refs/heads/master into fix-v2-runtime * fix comment * Fix test * Merge branch 'master' into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime * Merge refs/heads/master into fix-v2-runtime
119 lines
4.5 KiB
Go
119 lines
4.5 KiB
Go
package v2
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/validator/flags"
|
|
v2keymanager "github.com/prysmaticlabs/prysm/validator/keymanager/v2"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/derived"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/direct"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/v2/remote"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
// CreateWallet from user input with a desired keymanager. If a
|
|
// wallet already exists in the path, it suggests the user alternatives
|
|
// such as how to edit their existing wallet configuration.
|
|
func CreateWallet(cliCtx *cli.Context) error {
|
|
keymanagerKind, err := inputKeymanagerKind(cliCtx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
w, err := NewWallet(cliCtx, keymanagerKind)
|
|
if err != nil && !errors.Is(err, ErrWalletExists) {
|
|
return errors.Wrap(err, "could not check if wallet directory exists")
|
|
}
|
|
if errors.Is(err, ErrWalletExists) {
|
|
return ErrWalletExists
|
|
}
|
|
switch w.KeymanagerKind() {
|
|
case v2keymanager.Direct:
|
|
if err = createDirectKeymanagerWallet(cliCtx, w); err != nil {
|
|
return errors.Wrap(err, "could not initialize wallet with direct keymanager")
|
|
}
|
|
log.WithField("wallet-path", w.accountsPath).Infof(
|
|
"Successfully created wallet with on-disk keymanager configuration. " +
|
|
"Make a new validator account with ./prysm.sh validator accounts-v2 create",
|
|
)
|
|
case v2keymanager.Derived:
|
|
if err = createDerivedKeymanagerWallet(cliCtx, w); err != nil {
|
|
return errors.Wrap(err, "could not initialize wallet with derived keymanager")
|
|
}
|
|
log.WithField("wallet-path", w.accountsPath).Infof(
|
|
"Successfully created HD wallet and saved configuration to disk. " +
|
|
"Make a new validator account with ./prysm.sh validator accounts-2 create",
|
|
)
|
|
case v2keymanager.Remote:
|
|
if err = createRemoteKeymanagerWallet(cliCtx, w); err != nil {
|
|
return errors.Wrap(err, "could not initialize wallet with remote keymanager")
|
|
}
|
|
log.WithField("wallet-path", w.accountsPath).Infof(
|
|
"Successfully created wallet with remote keymanager configuration",
|
|
)
|
|
default:
|
|
return errors.Wrapf(err, "keymanager type %s is not supported", w.KeymanagerKind())
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func createDirectKeymanagerWallet(cliCtx *cli.Context, wallet *Wallet) error {
|
|
if err := wallet.SaveWallet(); err != nil {
|
|
return errors.Wrap(err, "could not save wallet to disk")
|
|
}
|
|
keymanagerConfig, err := direct.MarshalConfigFile(context.Background(), direct.DefaultConfig())
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal keymanager config file")
|
|
}
|
|
if err := wallet.WriteKeymanagerConfigToDisk(context.Background(), keymanagerConfig); err != nil {
|
|
return errors.Wrap(err, "could not write keymanager config to disk")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func createDerivedKeymanagerWallet(cliCtx *cli.Context, wallet *Wallet) error {
|
|
skipMnemonicConfirm := cliCtx.Bool(flags.SkipMnemonicConfirmFlag.Name)
|
|
ctx := context.Background()
|
|
seedConfig, err := derived.InitializeWalletSeedFile(ctx, wallet.walletPassword, skipMnemonicConfirm)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not initialize new wallet seed file")
|
|
}
|
|
seedConfigFile, err := derived.MarshalEncryptedSeedFile(ctx, seedConfig)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal encrypted wallet seed file")
|
|
}
|
|
keymanagerConfig, err := derived.MarshalConfigFile(ctx, derived.DefaultConfig())
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal keymanager config file")
|
|
}
|
|
if err := wallet.SaveWallet(); err != nil {
|
|
return errors.Wrap(err, "could not save wallet to disk")
|
|
}
|
|
if err := wallet.WriteKeymanagerConfigToDisk(ctx, keymanagerConfig); err != nil {
|
|
return errors.Wrap(err, "could not write keymanager config to disk")
|
|
}
|
|
if err := wallet.WriteEncryptedSeedToDisk(ctx, seedConfigFile); err != nil {
|
|
return errors.Wrap(err, "could not write encrypted wallet seed config to disk")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func createRemoteKeymanagerWallet(cliCtx *cli.Context, wallet *Wallet) error {
|
|
conf, err := inputRemoteKeymanagerConfig(cliCtx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not input remote keymanager config")
|
|
}
|
|
ctx := context.Background()
|
|
keymanagerConfig, err := remote.MarshalConfigFile(ctx, conf)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not marshal config file")
|
|
}
|
|
if err := wallet.SaveWallet(); err != nil {
|
|
return errors.Wrap(err, "could not save wallet to disk")
|
|
}
|
|
if err := wallet.WriteKeymanagerConfigToDisk(ctx, keymanagerConfig); err != nil {
|
|
return errors.Wrap(err, "could not write keymanager config to disk")
|
|
}
|
|
return nil
|
|
}
|