cmd/geth: remove unlock commandline flag (#30737)
This is one further step towards removing account management from `geth`. This PR deprecates the flag `unlock`, and makes the flag moot: unlock via geth is no longer possible.
This commit is contained in:
parent
ec280e030f
commit
a5f0001845
|
@ -44,8 +44,7 @@ func byURL(a, b accounts.Account) int {
|
||||||
return a.URL.Cmp(b.URL)
|
return a.URL.Cmp(b.URL)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AmbiguousAddrError is returned when attempting to unlock
|
// AmbiguousAddrError is returned when an address matches multiple files.
|
||||||
// an address for which more than one file exists.
|
|
||||||
type AmbiguousAddrError struct {
|
type AmbiguousAddrError struct {
|
||||||
Addr common.Address
|
Addr common.Address
|
||||||
Matches []accounts.Account
|
Matches []accounts.Account
|
||||||
|
|
|
@ -1 +0,0 @@
|
||||||
{"address":"f466859ead1932d743d622cb74fc058882e8648a","crypto":{"cipher":"aes-128-ctr","ciphertext":"cb664472deacb41a2e995fa7f96fe29ce744471deb8d146a0e43c7898c9ddd4d","cipherparams":{"iv":"dfd9ee70812add5f4b8f89d0811c9158"},"kdf":"scrypt","kdfparams":{"dklen":32,"n":8,"p":16,"r":8,"salt":"0d6769bf016d45c479213990d6a08d938469c4adad8a02ce507b4a4e7b7739f1"},"mac":"bac9af994b15a45dd39669fc66f9aa8a3b9dd8c22cb16e4d8d7ea089d0f1a1a9"},"id":"472e8b3d-afb6-45b5-8111-72c89895099a","version":3}
|
|
|
@ -1 +0,0 @@
|
||||||
{"address":"f466859ead1932d743d622cb74fc058882e8648a","crypto":{"cipher":"aes-128-ctr","ciphertext":"cb664472deacb41a2e995fa7f96fe29ce744471deb8d146a0e43c7898c9ddd4d","cipherparams":{"iv":"dfd9ee70812add5f4b8f89d0811c9158"},"kdf":"scrypt","kdfparams":{"dklen":32,"n":8,"p":16,"r":8,"salt":"0d6769bf016d45c479213990d6a08d938469c4adad8a02ce507b4a4e7b7739f1"},"mac":"bac9af994b15a45dd39669fc66f9aa8a3b9dd8c22cb16e4d8d7ea089d0f1a1a9"},"id":"472e8b3d-afb6-45b5-8111-72c89895099a","version":3}
|
|
|
@ -1 +0,0 @@
|
||||||
{"address":"7ef5a6135f1fd6a02593eedc869c6d41d934aef8","crypto":{"cipher":"aes-128-ctr","ciphertext":"1d0839166e7a15b9c1333fc865d69858b22df26815ccf601b28219b6192974e1","cipherparams":{"iv":"8df6caa7ff1b00c4e871f002cb7921ed"},"kdf":"scrypt","kdfparams":{"dklen":32,"n":8,"p":16,"r":8,"salt":"e5e6ef3f4ea695f496b643ebd3f75c0aa58ef4070e90c80c5d3fb0241bf1595c"},"mac":"6d16dfde774845e4585357f24bce530528bc69f4f84e1e22880d34fa45c273e5"},"id":"950077c7-71e3-4c44-a4a1-143919141ed4","version":3}
|
|
|
@ -29,12 +29,9 @@ import (
|
||||||
// the manager will buffer in its channel.
|
// the manager will buffer in its channel.
|
||||||
const managerSubBufferSize = 50
|
const managerSubBufferSize = 50
|
||||||
|
|
||||||
// Config contains the settings of the global account manager.
|
// Config is a legacy struct which is not used
|
||||||
//
|
|
||||||
// TODO(rjl493456442, karalabe, holiman): Get rid of this when account management
|
|
||||||
// is removed in favor of Clef.
|
|
||||||
type Config struct {
|
type Config struct {
|
||||||
InsecureUnlockAllowed bool // Whether account unlocking in insecure environment is allowed
|
InsecureUnlockAllowed bool // Unused legacy-parameter
|
||||||
}
|
}
|
||||||
|
|
||||||
// newBackendEvent lets the manager know it should
|
// newBackendEvent lets the manager know it should
|
||||||
|
@ -47,7 +44,6 @@ type newBackendEvent struct {
|
||||||
// Manager is an overarching account manager that can communicate with various
|
// Manager is an overarching account manager that can communicate with various
|
||||||
// backends for signing transactions.
|
// backends for signing transactions.
|
||||||
type Manager struct {
|
type Manager struct {
|
||||||
config *Config // Global account manager configurations
|
|
||||||
backends map[reflect.Type][]Backend // Index of backends currently registered
|
backends map[reflect.Type][]Backend // Index of backends currently registered
|
||||||
updaters []event.Subscription // Wallet update subscriptions for all backends
|
updaters []event.Subscription // Wallet update subscriptions for all backends
|
||||||
updates chan WalletEvent // Subscription sink for backend wallet changes
|
updates chan WalletEvent // Subscription sink for backend wallet changes
|
||||||
|
@ -78,7 +74,6 @@ func NewManager(config *Config, backends ...Backend) *Manager {
|
||||||
}
|
}
|
||||||
// Assemble the account manager and return
|
// Assemble the account manager and return
|
||||||
am := &Manager{
|
am := &Manager{
|
||||||
config: config,
|
|
||||||
backends: make(map[reflect.Type][]Backend),
|
backends: make(map[reflect.Type][]Backend),
|
||||||
updaters: subs,
|
updaters: subs,
|
||||||
updates: updates,
|
updates: updates,
|
||||||
|
@ -106,11 +101,6 @@ func (am *Manager) Close() error {
|
||||||
return <-errc
|
return <-errc
|
||||||
}
|
}
|
||||||
|
|
||||||
// Config returns the configuration of account manager.
|
|
||||||
func (am *Manager) Config() *Config {
|
|
||||||
return am.config
|
|
||||||
}
|
|
||||||
|
|
||||||
// AddBackend starts the tracking of an additional backend for wallet updates.
|
// AddBackend starts the tracking of an additional backend for wallet updates.
|
||||||
// cmd/geth assumes once this func returns the backends have been already integrated.
|
// cmd/geth assumes once this func returns the backends have been already integrated.
|
||||||
func (am *Manager) AddBackend(backend Backend) {
|
func (am *Manager) AddBackend(backend Backend) {
|
||||||
|
|
|
@ -17,14 +17,16 @@
|
||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/ethereum/go-ethereum/accounts"
|
"github.com/ethereum/go-ethereum/accounts"
|
||||||
"github.com/ethereum/go-ethereum/accounts/keystore"
|
"github.com/ethereum/go-ethereum/accounts/keystore"
|
||||||
"github.com/ethereum/go-ethereum/cmd/utils"
|
"github.com/ethereum/go-ethereum/cmd/utils"
|
||||||
|
"github.com/ethereum/go-ethereum/common"
|
||||||
"github.com/ethereum/go-ethereum/crypto"
|
"github.com/ethereum/go-ethereum/crypto"
|
||||||
"github.com/ethereum/go-ethereum/log"
|
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -191,7 +193,7 @@ nodes.
|
||||||
// makeAccountManager creates an account manager with backends
|
// makeAccountManager creates an account manager with backends
|
||||||
func makeAccountManager(ctx *cli.Context) *accounts.Manager {
|
func makeAccountManager(ctx *cli.Context) *accounts.Manager {
|
||||||
cfg := loadBaseConfig(ctx)
|
cfg := loadBaseConfig(ctx)
|
||||||
am := accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: cfg.Node.InsecureUnlockAllowed})
|
am := accounts.NewManager(nil)
|
||||||
keydir, isEphemeral, err := cfg.Node.GetKeyStoreDir()
|
keydir, isEphemeral, err := cfg.Node.GetKeyStoreDir()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
utils.Fatalf("Failed to get the keystore directory: %v", err)
|
utils.Fatalf("Failed to get the keystore directory: %v", err)
|
||||||
|
@ -219,60 +221,22 @@ func accountList(ctx *cli.Context) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// tries unlocking the specified account a few times.
|
// readPasswordFromFile reads the first line of the given file, trims line endings,
|
||||||
func unlockAccount(ks *keystore.KeyStore, address string, i int, passwords []string) (accounts.Account, string) {
|
// and returns the password and whether the reading was successful.
|
||||||
account, err := utils.MakeAddress(ks, address)
|
func readPasswordFromFile(path string) (string, bool) {
|
||||||
|
if path == "" {
|
||||||
|
return "", false
|
||||||
|
}
|
||||||
|
text, err := os.ReadFile(path)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
utils.Fatalf("Could not list accounts: %v", err)
|
utils.Fatalf("Failed to read password file: %v", err)
|
||||||
}
|
}
|
||||||
for trials := 0; trials < 3; trials++ {
|
lines := strings.Split(string(text), "\n")
|
||||||
prompt := fmt.Sprintf("Unlocking account %s | Attempt %d/%d", address, trials+1, 3)
|
if len(lines) == 0 {
|
||||||
password := utils.GetPassPhraseWithList(prompt, false, i, passwords)
|
return "", false
|
||||||
err = ks.Unlock(account, password)
|
|
||||||
if err == nil {
|
|
||||||
log.Info("Unlocked account", "address", account.Address.Hex())
|
|
||||||
return account, password
|
|
||||||
}
|
}
|
||||||
if err, ok := err.(*keystore.AmbiguousAddrError); ok {
|
// Sanitise DOS line endings.
|
||||||
log.Info("Unlocked account", "address", account.Address.Hex())
|
return strings.TrimRight(lines[0], "\r"), true
|
||||||
return ambiguousAddrRecovery(ks, err, password), password
|
|
||||||
}
|
|
||||||
if err != keystore.ErrDecrypt {
|
|
||||||
// No need to prompt again if the error is not decryption-related.
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// All trials expended to unlock account, bail out
|
|
||||||
utils.Fatalf("Failed to unlock account %s (%v)", address, err)
|
|
||||||
|
|
||||||
return accounts.Account{}, ""
|
|
||||||
}
|
|
||||||
|
|
||||||
func ambiguousAddrRecovery(ks *keystore.KeyStore, err *keystore.AmbiguousAddrError, auth string) accounts.Account {
|
|
||||||
fmt.Printf("Multiple key files exist for address %x:\n", err.Addr)
|
|
||||||
for _, a := range err.Matches {
|
|
||||||
fmt.Println(" ", a.URL)
|
|
||||||
}
|
|
||||||
fmt.Println("Testing your password against all of them...")
|
|
||||||
var match *accounts.Account
|
|
||||||
for i, a := range err.Matches {
|
|
||||||
if e := ks.Unlock(a, auth); e == nil {
|
|
||||||
match = &err.Matches[i]
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if match == nil {
|
|
||||||
utils.Fatalf("None of the listed files could be unlocked.")
|
|
||||||
return accounts.Account{}
|
|
||||||
}
|
|
||||||
fmt.Printf("Your password unlocked %s\n", match.URL)
|
|
||||||
fmt.Println("In order to avoid this warning, you need to remove the following duplicate key files:")
|
|
||||||
for _, a := range err.Matches {
|
|
||||||
if a != *match {
|
|
||||||
fmt.Println(" ", a.URL)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return *match
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// accountCreate creates a new account into the keystore defined by the CLI flags.
|
// accountCreate creates a new account into the keystore defined by the CLI flags.
|
||||||
|
@ -292,8 +256,10 @@ func accountCreate(ctx *cli.Context) error {
|
||||||
scryptP = keystore.LightScryptP
|
scryptP = keystore.LightScryptP
|
||||||
}
|
}
|
||||||
|
|
||||||
password := utils.GetPassPhraseWithList("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
|
password, ok := readPasswordFromFile(ctx.Path(utils.PasswordFileFlag.Name))
|
||||||
|
if !ok {
|
||||||
|
password = utils.GetPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true)
|
||||||
|
}
|
||||||
account, err := keystore.StoreKey(keydir, password, scryptN, scryptP)
|
account, err := keystore.StoreKey(keydir, password, scryptN, scryptP)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -323,10 +289,23 @@ func accountUpdate(ctx *cli.Context) error {
|
||||||
ks := backends[0].(*keystore.KeyStore)
|
ks := backends[0].(*keystore.KeyStore)
|
||||||
|
|
||||||
for _, addr := range ctx.Args().Slice() {
|
for _, addr := range ctx.Args().Slice() {
|
||||||
account, oldPassword := unlockAccount(ks, addr, 0, nil)
|
if !common.IsHexAddress(addr) {
|
||||||
newPassword := utils.GetPassPhraseWithList("Please give a new password. Do not forget this password.", true, 0, nil)
|
return errors.New("address must be specified in hexadecimal form")
|
||||||
if err := ks.Update(account, oldPassword, newPassword); err != nil {
|
}
|
||||||
utils.Fatalf("Could not update the account: %v", err)
|
account := accounts.Account{Address: common.HexToAddress(addr)}
|
||||||
|
newPassword := utils.GetPassPhrase("Please give a NEW password. Do not forget this password.", true)
|
||||||
|
updateFn := func(attempt int) error {
|
||||||
|
prompt := fmt.Sprintf("Please provide the OLD password for account %s | Attempt %d/%d", addr, attempt+1, 3)
|
||||||
|
password := utils.GetPassPhrase(prompt, false)
|
||||||
|
return ks.Update(account, password, newPassword)
|
||||||
|
}
|
||||||
|
// let user attempt unlock thrice.
|
||||||
|
err := updateFn(0)
|
||||||
|
for attempts := 1; attempts < 3 && errors.Is(err, keystore.ErrDecrypt); attempts++ {
|
||||||
|
err = updateFn(attempts)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("could not update account: %w", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
|
@ -347,10 +326,12 @@ func importWallet(ctx *cli.Context) error {
|
||||||
if len(backends) == 0 {
|
if len(backends) == 0 {
|
||||||
utils.Fatalf("Keystore is not available")
|
utils.Fatalf("Keystore is not available")
|
||||||
}
|
}
|
||||||
|
password, ok := readPasswordFromFile(ctx.Path(utils.PasswordFileFlag.Name))
|
||||||
|
if !ok {
|
||||||
|
password = utils.GetPassPhrase("", false)
|
||||||
|
}
|
||||||
ks := backends[0].(*keystore.KeyStore)
|
ks := backends[0].(*keystore.KeyStore)
|
||||||
passphrase := utils.GetPassPhraseWithList("", false, 0, utils.MakePasswordList(ctx))
|
acct, err := ks.ImportPreSaleKey(keyJSON, password)
|
||||||
|
|
||||||
acct, err := ks.ImportPreSaleKey(keyJSON, passphrase)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
utils.Fatalf("%v", err)
|
utils.Fatalf("%v", err)
|
||||||
}
|
}
|
||||||
|
@ -373,9 +354,11 @@ func accountImport(ctx *cli.Context) error {
|
||||||
utils.Fatalf("Keystore is not available")
|
utils.Fatalf("Keystore is not available")
|
||||||
}
|
}
|
||||||
ks := backends[0].(*keystore.KeyStore)
|
ks := backends[0].(*keystore.KeyStore)
|
||||||
passphrase := utils.GetPassPhraseWithList("Your new account is locked with a password. Please give a password. Do not forget this password.", true, 0, utils.MakePasswordList(ctx))
|
password, ok := readPasswordFromFile(ctx.Path(utils.PasswordFileFlag.Name))
|
||||||
|
if !ok {
|
||||||
acct, err := ks.ImportECDSA(key, passphrase)
|
password = utils.GetPassPhrase("Your new account is locked with a password. Please give a password. Do not forget this password.", true)
|
||||||
|
}
|
||||||
|
acct, err := ks.ImportECDSA(key, password)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
utils.Fatalf("Could not create the account: %v", err)
|
utils.Fatalf("Could not create the account: %v", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,7 +20,6 @@ import (
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"runtime"
|
"runtime"
|
||||||
"strings"
|
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/cespare/cp"
|
"github.com/cespare/cp"
|
||||||
|
@ -171,12 +170,12 @@ func TestAccountUpdate(t *testing.T) {
|
||||||
"f466859ead1932d743d622cb74fc058882e8648a")
|
"f466859ead1932d743d622cb74fc058882e8648a")
|
||||||
defer geth.ExpectExit()
|
defer geth.ExpectExit()
|
||||||
geth.Expect(`
|
geth.Expect(`
|
||||||
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
Please give a NEW password. Do not forget this password.
|
||||||
!! Unsupported terminal, password will be echoed.
|
!! Unsupported terminal, password will be echoed.
|
||||||
Password: {{.InputLine "foobar"}}
|
|
||||||
Please give a new password. Do not forget this password.
|
|
||||||
Password: {{.InputLine "foobar2"}}
|
Password: {{.InputLine "foobar2"}}
|
||||||
Repeat password: {{.InputLine "foobar2"}}
|
Repeat password: {{.InputLine "foobar2"}}
|
||||||
|
Please provide the OLD password for account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
||||||
|
Password: {{.InputLine "foobar"}}
|
||||||
`)
|
`)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -206,172 +205,3 @@ Password: {{.InputLine "wrong"}}
|
||||||
Fatal: could not decrypt key with given password
|
Fatal: could not decrypt key with given password
|
||||||
`)
|
`)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUnlockFlag(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
||||||
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "console", "--exec", "loadScript('testdata/empty.js')")
|
|
||||||
geth.Expect(`
|
|
||||||
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
||||||
!! Unsupported terminal, password will be echoed.
|
|
||||||
Password: {{.InputLine "foobar"}}
|
|
||||||
undefined
|
|
||||||
`)
|
|
||||||
geth.ExpectExit()
|
|
||||||
|
|
||||||
wantMessages := []string{
|
|
||||||
"Unlocked account",
|
|
||||||
"=0xf466859eAD1932D743d622CB74FC058882E8648A",
|
|
||||||
}
|
|
||||||
for _, m := range wantMessages {
|
|
||||||
if !strings.Contains(geth.StderrText(), m) {
|
|
||||||
t.Errorf("stderr text does not contain %q", m)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestUnlockFlagWrongPassword(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
||||||
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "console", "--exec", "loadScript('testdata/empty.js')")
|
|
||||||
|
|
||||||
defer geth.ExpectExit()
|
|
||||||
geth.Expect(`
|
|
||||||
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
||||||
!! Unsupported terminal, password will be echoed.
|
|
||||||
Password: {{.InputLine "wrong1"}}
|
|
||||||
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 2/3
|
|
||||||
Password: {{.InputLine "wrong2"}}
|
|
||||||
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 3/3
|
|
||||||
Password: {{.InputLine "wrong3"}}
|
|
||||||
Fatal: Failed to unlock account f466859ead1932d743d622cb74fc058882e8648a (could not decrypt key with given password)
|
|
||||||
`)
|
|
||||||
}
|
|
||||||
|
|
||||||
// https://github.com/ethereum/go-ethereum/issues/1785
|
|
||||||
func TestUnlockFlagMultiIndex(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
||||||
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--unlock", "0,2", "console", "--exec", "loadScript('testdata/empty.js')")
|
|
||||||
|
|
||||||
geth.Expect(`
|
|
||||||
Unlocking account 0 | Attempt 1/3
|
|
||||||
!! Unsupported terminal, password will be echoed.
|
|
||||||
Password: {{.InputLine "foobar"}}
|
|
||||||
Unlocking account 2 | Attempt 1/3
|
|
||||||
Password: {{.InputLine "foobar"}}
|
|
||||||
undefined
|
|
||||||
`)
|
|
||||||
geth.ExpectExit()
|
|
||||||
|
|
||||||
wantMessages := []string{
|
|
||||||
"Unlocked account",
|
|
||||||
"=0x7EF5A6135f1FD6a02593eEdC869c6D41D934aef8",
|
|
||||||
"=0x289d485D9771714CCe91D3393D764E1311907ACc",
|
|
||||||
}
|
|
||||||
for _, m := range wantMessages {
|
|
||||||
if !strings.Contains(geth.StderrText(), m) {
|
|
||||||
t.Errorf("stderr text does not contain %q", m)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestUnlockFlagPasswordFile(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
||||||
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--password", "testdata/passwords.txt", "--unlock", "0,2", "console", "--exec", "loadScript('testdata/empty.js')")
|
|
||||||
|
|
||||||
geth.Expect(`
|
|
||||||
undefined
|
|
||||||
`)
|
|
||||||
geth.ExpectExit()
|
|
||||||
|
|
||||||
wantMessages := []string{
|
|
||||||
"Unlocked account",
|
|
||||||
"=0x7EF5A6135f1FD6a02593eEdC869c6D41D934aef8",
|
|
||||||
"=0x289d485D9771714CCe91D3393D764E1311907ACc",
|
|
||||||
}
|
|
||||||
for _, m := range wantMessages {
|
|
||||||
if !strings.Contains(geth.StderrText(), m) {
|
|
||||||
t.Errorf("stderr text does not contain %q", m)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestUnlockFlagPasswordFileWrongPassword(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
||||||
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--password",
|
|
||||||
"testdata/wrong-passwords.txt", "--unlock", "0,2")
|
|
||||||
defer geth.ExpectExit()
|
|
||||||
geth.Expect(`
|
|
||||||
Fatal: Failed to unlock account 0 (could not decrypt key with given password)
|
|
||||||
`)
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestUnlockFlagAmbiguous(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
store := filepath.Join("..", "..", "accounts", "keystore", "testdata", "dupes")
|
|
||||||
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
||||||
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--keystore",
|
|
||||||
store, "--unlock", "f466859ead1932d743d622cb74fc058882e8648a",
|
|
||||||
"console", "--exec", "loadScript('testdata/empty.js')")
|
|
||||||
defer geth.ExpectExit()
|
|
||||||
|
|
||||||
// Helper for the expect template, returns absolute keystore path.
|
|
||||||
geth.SetTemplateFunc("keypath", func(file string) string {
|
|
||||||
abs, _ := filepath.Abs(filepath.Join(store, file))
|
|
||||||
return abs
|
|
||||||
})
|
|
||||||
geth.Expect(`
|
|
||||||
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
||||||
!! Unsupported terminal, password will be echoed.
|
|
||||||
Password: {{.InputLine "foobar"}}
|
|
||||||
Multiple key files exist for address f466859ead1932d743d622cb74fc058882e8648a:
|
|
||||||
keystore://{{keypath "1"}}
|
|
||||||
keystore://{{keypath "2"}}
|
|
||||||
Testing your password against all of them...
|
|
||||||
Your password unlocked keystore://{{keypath "1"}}
|
|
||||||
In order to avoid this warning, you need to remove the following duplicate key files:
|
|
||||||
keystore://{{keypath "2"}}
|
|
||||||
undefined
|
|
||||||
`)
|
|
||||||
geth.ExpectExit()
|
|
||||||
|
|
||||||
wantMessages := []string{
|
|
||||||
"Unlocked account",
|
|
||||||
"=0xf466859eAD1932D743d622CB74FC058882E8648A",
|
|
||||||
}
|
|
||||||
for _, m := range wantMessages {
|
|
||||||
if !strings.Contains(geth.StderrText(), m) {
|
|
||||||
t.Errorf("stderr text does not contain %q", m)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestUnlockFlagAmbiguousWrongPassword(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
store := filepath.Join("..", "..", "accounts", "keystore", "testdata", "dupes")
|
|
||||||
geth := runMinimalGeth(t, "--port", "0", "--ipcdisable", "--datadir", tmpDatadirWithKeystore(t),
|
|
||||||
"--unlock", "f466859ead1932d743d622cb74fc058882e8648a", "--keystore",
|
|
||||||
store, "--unlock", "f466859ead1932d743d622cb74fc058882e8648a")
|
|
||||||
|
|
||||||
defer geth.ExpectExit()
|
|
||||||
|
|
||||||
// Helper for the expect template, returns absolute keystore path.
|
|
||||||
geth.SetTemplateFunc("keypath", func(file string) string {
|
|
||||||
abs, _ := filepath.Abs(filepath.Join(store, file))
|
|
||||||
return abs
|
|
||||||
})
|
|
||||||
geth.Expect(`
|
|
||||||
Unlocking account f466859ead1932d743d622cb74fc058882e8648a | Attempt 1/3
|
|
||||||
!! Unsupported terminal, password will be echoed.
|
|
||||||
Password: {{.InputLine "wrong"}}
|
|
||||||
Multiple key files exist for address f466859ead1932d743d622cb74fc058882e8648a:
|
|
||||||
keystore://{{keypath "1"}}
|
|
||||||
keystore://{{keypath "2"}}
|
|
||||||
Testing your password against all of them...
|
|
||||||
Fatal: None of the listed files could be unlocked.
|
|
||||||
`)
|
|
||||||
geth.ExpectExit()
|
|
||||||
}
|
|
||||||
|
|
|
@ -23,11 +23,9 @@ import (
|
||||||
"slices"
|
"slices"
|
||||||
"sort"
|
"sort"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/ethereum/go-ethereum/accounts"
|
"github.com/ethereum/go-ethereum/accounts"
|
||||||
"github.com/ethereum/go-ethereum/accounts/keystore"
|
|
||||||
"github.com/ethereum/go-ethereum/cmd/utils"
|
"github.com/ethereum/go-ethereum/cmd/utils"
|
||||||
"github.com/ethereum/go-ethereum/common"
|
"github.com/ethereum/go-ethereum/common"
|
||||||
"github.com/ethereum/go-ethereum/console/prompt"
|
"github.com/ethereum/go-ethereum/console/prompt"
|
||||||
|
@ -353,14 +351,14 @@ func geth(ctx *cli.Context) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// startNode boots up the system node and all registered protocols, after which
|
// startNode boots up the system node and all registered protocols, after which
|
||||||
// it unlocks any requested accounts, and starts the RPC/IPC interfaces and the
|
// it starts the RPC/IPC interfaces and the miner.
|
||||||
// miner.
|
|
||||||
func startNode(ctx *cli.Context, stack *node.Node, isConsole bool) {
|
func startNode(ctx *cli.Context, stack *node.Node, isConsole bool) {
|
||||||
// Start up the node itself
|
// Start up the node itself
|
||||||
utils.StartNode(ctx, stack, isConsole)
|
utils.StartNode(ctx, stack, isConsole)
|
||||||
|
|
||||||
// Unlock any account specifically requested
|
if ctx.IsSet(utils.UnlockedAccountFlag.Name) {
|
||||||
unlockAccounts(ctx, stack)
|
log.Warn(`The "unlock" flag has been deprecated and has no effect`)
|
||||||
|
}
|
||||||
|
|
||||||
// Register wallet event handlers to open and auto-derive wallets
|
// Register wallet event handlers to open and auto-derive wallets
|
||||||
events := make(chan accounts.WalletEvent, 16)
|
events := make(chan accounts.WalletEvent, 16)
|
||||||
|
@ -427,33 +425,3 @@ func startNode(ctx *cli.Context, stack *node.Node, isConsole bool) {
|
||||||
}()
|
}()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// unlockAccounts unlocks any account specifically requested.
|
|
||||||
func unlockAccounts(ctx *cli.Context, stack *node.Node) {
|
|
||||||
var unlocks []string
|
|
||||||
inputs := strings.Split(ctx.String(utils.UnlockedAccountFlag.Name), ",")
|
|
||||||
for _, input := range inputs {
|
|
||||||
if trimmed := strings.TrimSpace(input); trimmed != "" {
|
|
||||||
unlocks = append(unlocks, trimmed)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
// Short circuit if there is no account to unlock.
|
|
||||||
if len(unlocks) == 0 {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
// If insecure account unlocking is not allowed if node's APIs are exposed to external.
|
|
||||||
// Print warning log to user and skip unlocking.
|
|
||||||
if !stack.Config().InsecureUnlockAllowed && stack.Config().ExtRPCEnabled() {
|
|
||||||
utils.Fatalf("Account unlock with HTTP access is forbidden!")
|
|
||||||
}
|
|
||||||
backends := stack.AccountManager().Backends(keystore.KeyStoreType)
|
|
||||||
if len(backends) == 0 {
|
|
||||||
log.Warn("Failed to unlock accounts, keystore is not available")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
ks := backends[0].(*keystore.KeyStore)
|
|
||||||
passwords := utils.MakePasswordList(ctx)
|
|
||||||
for i, account := range unlocks {
|
|
||||||
unlockAccount(ks, account, i, passwords)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -499,12 +499,6 @@ var (
|
||||||
}
|
}
|
||||||
|
|
||||||
// Account settings
|
// Account settings
|
||||||
UnlockedAccountFlag = &cli.StringFlag{
|
|
||||||
Name: "unlock",
|
|
||||||
Usage: "Comma separated list of accounts to unlock",
|
|
||||||
Value: "",
|
|
||||||
Category: flags.AccountCategory,
|
|
||||||
}
|
|
||||||
PasswordFileFlag = &cli.PathFlag{
|
PasswordFileFlag = &cli.PathFlag{
|
||||||
Name: "password",
|
Name: "password",
|
||||||
Usage: "Password file to use for non-interactive password input",
|
Usage: "Password file to use for non-interactive password input",
|
||||||
|
@ -517,12 +511,6 @@ var (
|
||||||
Value: "",
|
Value: "",
|
||||||
Category: flags.AccountCategory,
|
Category: flags.AccountCategory,
|
||||||
}
|
}
|
||||||
InsecureUnlockAllowedFlag = &cli.BoolFlag{
|
|
||||||
Name: "allow-insecure-unlock",
|
|
||||||
Usage: "Allow insecure account unlocking when account-related RPCs are exposed by http",
|
|
||||||
Category: flags.AccountCategory,
|
|
||||||
}
|
|
||||||
|
|
||||||
// EVM settings
|
// EVM settings
|
||||||
VMEnableDebugFlag = &cli.BoolFlag{
|
VMEnableDebugFlag = &cli.BoolFlag{
|
||||||
Name: "vmdebug",
|
Name: "vmdebug",
|
||||||
|
@ -1268,31 +1256,6 @@ func MakeDatabaseHandles(max int) int {
|
||||||
return int(raised / 2) // Leave half for networking and other stuff
|
return int(raised / 2) // Leave half for networking and other stuff
|
||||||
}
|
}
|
||||||
|
|
||||||
// MakeAddress converts an account specified directly as a hex encoded string or
|
|
||||||
// a key index in the key store to an internal account representation.
|
|
||||||
func MakeAddress(ks *keystore.KeyStore, account string) (accounts.Account, error) {
|
|
||||||
// If the specified account is a valid address, return it
|
|
||||||
if common.IsHexAddress(account) {
|
|
||||||
return accounts.Account{Address: common.HexToAddress(account)}, nil
|
|
||||||
}
|
|
||||||
// Otherwise try to interpret the account as a keystore index
|
|
||||||
index, err := strconv.Atoi(account)
|
|
||||||
if err != nil || index < 0 {
|
|
||||||
return accounts.Account{}, fmt.Errorf("invalid account address or index %q", account)
|
|
||||||
}
|
|
||||||
log.Warn("-------------------------------------------------------------------")
|
|
||||||
log.Warn("Referring to accounts by order in the keystore folder is dangerous!")
|
|
||||||
log.Warn("This functionality is deprecated and will be removed in the future!")
|
|
||||||
log.Warn("Please use explicit addresses! (can search via `geth account list`)")
|
|
||||||
log.Warn("-------------------------------------------------------------------")
|
|
||||||
|
|
||||||
accs := ks.Accounts()
|
|
||||||
if len(accs) <= index {
|
|
||||||
return accounts.Account{}, fmt.Errorf("index %d higher than number of accounts %d", index, len(accs))
|
|
||||||
}
|
|
||||||
return accs[index], nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// setEtherbase retrieves the etherbase from the directly specified command line flags.
|
// setEtherbase retrieves the etherbase from the directly specified command line flags.
|
||||||
func setEtherbase(ctx *cli.Context, cfg *ethconfig.Config) {
|
func setEtherbase(ctx *cli.Context, cfg *ethconfig.Config) {
|
||||||
if ctx.IsSet(MinerEtherbaseFlag.Name) {
|
if ctx.IsSet(MinerEtherbaseFlag.Name) {
|
||||||
|
@ -1313,24 +1276,6 @@ func setEtherbase(ctx *cli.Context, cfg *ethconfig.Config) {
|
||||||
cfg.Miner.PendingFeeRecipient = common.BytesToAddress(b)
|
cfg.Miner.PendingFeeRecipient = common.BytesToAddress(b)
|
||||||
}
|
}
|
||||||
|
|
||||||
// MakePasswordList reads password lines from the file specified by the global --password flag.
|
|
||||||
func MakePasswordList(ctx *cli.Context) []string {
|
|
||||||
path := ctx.Path(PasswordFileFlag.Name)
|
|
||||||
if path == "" {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
text, err := os.ReadFile(path)
|
|
||||||
if err != nil {
|
|
||||||
Fatalf("Failed to read password file: %v", err)
|
|
||||||
}
|
|
||||||
lines := strings.Split(string(text), "\n")
|
|
||||||
// Sanitise DOS line endings.
|
|
||||||
for i := range lines {
|
|
||||||
lines[i] = strings.TrimRight(lines[i], "\r")
|
|
||||||
}
|
|
||||||
return lines
|
|
||||||
}
|
|
||||||
|
|
||||||
func SetP2PConfig(ctx *cli.Context, cfg *p2p.Config) {
|
func SetP2PConfig(ctx *cli.Context, cfg *p2p.Config) {
|
||||||
setNodeKey(ctx, cfg)
|
setNodeKey(ctx, cfg)
|
||||||
setNAT(ctx, cfg)
|
setNAT(ctx, cfg)
|
||||||
|
@ -1412,7 +1357,7 @@ func SetNodeConfig(ctx *cli.Context, cfg *node.Config) {
|
||||||
cfg.USB = ctx.Bool(USBFlag.Name)
|
cfg.USB = ctx.Bool(USBFlag.Name)
|
||||||
}
|
}
|
||||||
if ctx.IsSet(InsecureUnlockAllowedFlag.Name) {
|
if ctx.IsSet(InsecureUnlockAllowedFlag.Name) {
|
||||||
cfg.InsecureUnlockAllowed = ctx.Bool(InsecureUnlockAllowedFlag.Name)
|
log.Warn(fmt.Sprintf("Option %q is deprecated and has no effect", InsecureUnlockAllowedFlag.Name))
|
||||||
}
|
}
|
||||||
if ctx.IsSet(DBEngineFlag.Name) {
|
if ctx.IsSet(DBEngineFlag.Name) {
|
||||||
dbEngine := ctx.String(DBEngineFlag.Name)
|
dbEngine := ctx.String(DBEngineFlag.Name)
|
||||||
|
@ -1805,13 +1750,15 @@ func SetEthConfig(ctx *cli.Context, stack *node.Node, cfg *ethconfig.Config) {
|
||||||
passphrase string
|
passphrase string
|
||||||
err error
|
err error
|
||||||
)
|
)
|
||||||
if list := MakePasswordList(ctx); len(list) > 0 {
|
if path := ctx.Path(PasswordFileFlag.Name); path != "" {
|
||||||
// Just take the first value. Although the function returns a possible multiple values and
|
if text, err := os.ReadFile(path); err != nil {
|
||||||
// some usages iterate through them as attempts, that doesn't make sense in this setting,
|
Fatalf("Failed to read password file: %v", err)
|
||||||
// when we're definitely concerned with only one account.
|
} else {
|
||||||
passphrase = list[0]
|
if lines := strings.Split(string(text), "\n"); len(lines) > 0 {
|
||||||
|
passphrase = strings.TrimRight(lines[0], "\r") // Sanitise DOS line endings.
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unlock the developer account by local keystore.
|
// Unlock the developer account by local keystore.
|
||||||
var ks *keystore.KeyStore
|
var ks *keystore.KeyStore
|
||||||
if keystores := stack.AccountManager().Backends(keystore.KeyStoreType); len(keystores) > 0 {
|
if keystores := stack.AccountManager().Backends(keystore.KeyStoreType); len(keystores) > 0 {
|
||||||
|
|
|
@ -159,6 +159,17 @@ var (
|
||||||
Usage: "This used to enable the 'personal' namespace.",
|
Usage: "This used to enable the 'personal' namespace.",
|
||||||
Category: flags.DeprecatedCategory,
|
Category: flags.DeprecatedCategory,
|
||||||
}
|
}
|
||||||
|
UnlockedAccountFlag = &cli.StringFlag{
|
||||||
|
Name: "unlock",
|
||||||
|
Usage: "Comma separated list of accounts to unlock (deprecated)",
|
||||||
|
Value: "",
|
||||||
|
Category: flags.DeprecatedCategory,
|
||||||
|
}
|
||||||
|
InsecureUnlockAllowedFlag = &cli.BoolFlag{
|
||||||
|
Name: "allow-insecure-unlock",
|
||||||
|
Usage: "Allow insecure account unlocking when account-related RPCs are exposed by http (deprecated)",
|
||||||
|
Category: flags.DeprecatedCategory,
|
||||||
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
// showDeprecated displays deprecated flags that will be soon removed from the codebase.
|
// showDeprecated displays deprecated flags that will be soon removed from the codebase.
|
||||||
|
|
|
@ -45,18 +45,3 @@ func GetPassPhrase(text string, confirmation bool) string {
|
||||||
}
|
}
|
||||||
return password
|
return password
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetPassPhraseWithList retrieves the password associated with an account, either fetched
|
|
||||||
// from a list of preloaded passphrases, or requested interactively from the user.
|
|
||||||
func GetPassPhraseWithList(text string, confirmation bool, index int, passwords []string) string {
|
|
||||||
// If a list of passwords was supplied, retrieve from them
|
|
||||||
if len(passwords) > 0 {
|
|
||||||
if index < len(passwords) {
|
|
||||||
return passwords[index]
|
|
||||||
}
|
|
||||||
return passwords[len(passwords)-1]
|
|
||||||
}
|
|
||||||
// Otherwise prompt the user for the password
|
|
||||||
password := GetPassPhrase(text, confirmation)
|
|
||||||
return password
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,76 +0,0 @@
|
||||||
// Copyright 2020 The go-ethereum Authors
|
|
||||||
// This file is part of go-ethereum.
|
|
||||||
//
|
|
||||||
// go-ethereum is free software: you can redistribute it and/or modify
|
|
||||||
// it under the terms of the GNU General Public License as published by
|
|
||||||
// the Free Software Foundation, either version 3 of the License, or
|
|
||||||
// (at your option) any later version.
|
|
||||||
//
|
|
||||||
// go-ethereum is distributed in the hope that it will be useful,
|
|
||||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
// GNU General Public License for more details.
|
|
||||||
//
|
|
||||||
// You should have received a copy of the GNU General Public License
|
|
||||||
// along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.
|
|
||||||
|
|
||||||
// Package utils contains internal helper functions for go-ethereum commands.
|
|
||||||
package utils
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestGetPassPhraseWithList(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
type args struct {
|
|
||||||
text string
|
|
||||||
confirmation bool
|
|
||||||
index int
|
|
||||||
passwords []string
|
|
||||||
}
|
|
||||||
tests := []struct {
|
|
||||||
name string
|
|
||||||
args args
|
|
||||||
want string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
"test1",
|
|
||||||
args{
|
|
||||||
"text1",
|
|
||||||
false,
|
|
||||||
0,
|
|
||||||
[]string{"zero", "one", "two"},
|
|
||||||
},
|
|
||||||
"zero",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"test2",
|
|
||||||
args{
|
|
||||||
"text2",
|
|
||||||
false,
|
|
||||||
5,
|
|
||||||
[]string{"zero", "one", "two"},
|
|
||||||
},
|
|
||||||
"two",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"test3",
|
|
||||||
args{
|
|
||||||
"text3",
|
|
||||||
true,
|
|
||||||
1,
|
|
||||||
[]string{"zero", "one", "two"},
|
|
||||||
},
|
|
||||||
"one",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
for _, tt := range tests {
|
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
if got := GetPassPhraseWithList(tt.args.text, tt.args.confirmation, tt.args.index, tt.args.passwords); got != tt.want {
|
|
||||||
t.Errorf("GetPassPhraseWithList() = %v, want %v", got, tt.want)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -416,7 +416,7 @@ func allBlobTxs(addr common.Address, config *params.ChainConfig) []txData {
|
||||||
func newTestAccountManager(t *testing.T) (*accounts.Manager, accounts.Account) {
|
func newTestAccountManager(t *testing.T) (*accounts.Manager, accounts.Account) {
|
||||||
var (
|
var (
|
||||||
dir = t.TempDir()
|
dir = t.TempDir()
|
||||||
am = accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: true})
|
am = accounts.NewManager(nil)
|
||||||
b = keystore.NewKeyStore(dir, 2, 1)
|
b = keystore.NewKeyStore(dir, 2, 1)
|
||||||
testKey, _ = crypto.HexToECDSA("b71c71a67e1177ad4e901695e1b4b9ee17ae16c6668d313eac2f96dbcda3f291")
|
testKey, _ = crypto.HexToECDSA("b71c71a67e1177ad4e901695e1b4b9ee17ae16c6668d313eac2f96dbcda3f291")
|
||||||
)
|
)
|
||||||
|
|
|
@ -83,7 +83,7 @@ type Config struct {
|
||||||
// scrypt KDF at the expense of security.
|
// scrypt KDF at the expense of security.
|
||||||
UseLightweightKDF bool `toml:",omitempty"`
|
UseLightweightKDF bool `toml:",omitempty"`
|
||||||
|
|
||||||
// InsecureUnlockAllowed allows user to unlock accounts in unsafe http environment.
|
// InsecureUnlockAllowed is a deprecated option to allow users to accounts in unsafe http environment.
|
||||||
InsecureUnlockAllowed bool `toml:",omitempty"`
|
InsecureUnlockAllowed bool `toml:",omitempty"`
|
||||||
|
|
||||||
// NoUSB disables hardware wallet monitoring and connectivity.
|
// NoUSB disables hardware wallet monitoring and connectivity.
|
||||||
|
|
|
@ -130,7 +130,7 @@ func New(conf *Config) (*Node, error) {
|
||||||
node.keyDirTemp = isEphem
|
node.keyDirTemp = isEphem
|
||||||
// Creates an empty AccountManager with no backends. Callers (e.g. cmd/geth)
|
// Creates an empty AccountManager with no backends. Callers (e.g. cmd/geth)
|
||||||
// are required to add the backends later on.
|
// are required to add the backends later on.
|
||||||
node.accman = accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: conf.InsecureUnlockAllowed})
|
node.accman = accounts.NewManager(nil)
|
||||||
|
|
||||||
// Initialize the p2p server. This creates the node key and discovery databases.
|
// Initialize the p2p server. This creates the node key and discovery databases.
|
||||||
node.server.Config.PrivateKey = node.config.NodeKey()
|
node.server.Config.PrivateKey = node.config.NodeKey()
|
||||||
|
|
|
@ -184,9 +184,7 @@ func StartClefAccountManager(ksLocation string, nousb, lightKDF bool, scpath str
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
return accounts.NewManager(nil, backends...)
|
||||||
// Clef doesn't allow insecure http account unlock.
|
|
||||||
return accounts.NewManager(&accounts.Config{InsecureUnlockAllowed: false}, backends...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// MetadataFromContext extracts Metadata from a given context.Context
|
// MetadataFromContext extracts Metadata from a given context.Context
|
||||||
|
|
Loading…
Reference in New Issue