mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-01 01:57:56 +00:00
e3e651f72c
* Happy new year Updates the copyright years and fixes wrong license headers. * Fix the template * Split HEADER into HEADER-APACHE & HEADER-GPL
119 lines
3.8 KiB
Rust
119 lines
3.8 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2018-2021 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: GPL-3.0-or-later WITH Classpath-exception-2.0
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
use crate::error::Result;
|
|
use sc_service::config::KeystoreConfig;
|
|
use std::{fs, path::{PathBuf, Path}};
|
|
use structopt::StructOpt;
|
|
use crate::error;
|
|
use sp_core::crypto::SecretString;
|
|
|
|
/// default sub directory for the key store
|
|
const DEFAULT_KEYSTORE_CONFIG_PATH: &'static str = "keystore";
|
|
|
|
/// Parameters of the keystore
|
|
#[derive(Debug, StructOpt)]
|
|
pub struct KeystoreParams {
|
|
/// Specify custom URIs to connect to for keystore-services
|
|
#[structopt(long = "keystore-uri")]
|
|
pub keystore_uri: Option<String>,
|
|
|
|
/// Specify custom keystore path.
|
|
#[structopt(long = "keystore-path", value_name = "PATH", parse(from_os_str))]
|
|
pub keystore_path: Option<PathBuf>,
|
|
|
|
/// Use interactive shell for entering the password used by the keystore.
|
|
#[structopt(
|
|
long = "password-interactive",
|
|
conflicts_with_all = &[ "password", "password-filename" ]
|
|
)]
|
|
pub password_interactive: bool,
|
|
|
|
/// Password used by the keystore.
|
|
#[structopt(
|
|
long = "password",
|
|
parse(try_from_str = secret_string_from_str),
|
|
conflicts_with_all = &[ "password-interactive", "password-filename" ]
|
|
)]
|
|
pub password: Option<SecretString>,
|
|
|
|
/// File that contains the password used by the keystore.
|
|
#[structopt(
|
|
long = "password-filename",
|
|
value_name = "PATH",
|
|
parse(from_os_str),
|
|
conflicts_with_all = &[ "password-interactive", "password" ]
|
|
)]
|
|
pub password_filename: Option<PathBuf>,
|
|
}
|
|
|
|
/// Parse a sercret string, returning a displayable error.
|
|
pub fn secret_string_from_str(s: &str) -> std::result::Result<SecretString, String> {
|
|
std::str::FromStr::from_str(s).map_err(|_| "Could not get SecretString".to_string())
|
|
}
|
|
|
|
impl KeystoreParams {
|
|
/// Get the keystore configuration for the parameters
|
|
///
|
|
/// Returns a vector of remote-urls and the local Keystore configuration
|
|
pub fn keystore_config(&self, config_dir: &Path) -> Result<(Option<String>, KeystoreConfig)> {
|
|
let password = if self.password_interactive {
|
|
#[cfg(not(target_os = "unknown"))]
|
|
{
|
|
let password = input_keystore_password()?;
|
|
Some(SecretString::new(password))
|
|
}
|
|
#[cfg(target_os = "unknown")]
|
|
None
|
|
} else if let Some(ref file) = self.password_filename {
|
|
let password = fs::read_to_string(file)
|
|
.map_err(|e| format!("{}", e))?;
|
|
Some(SecretString::new(password))
|
|
} else {
|
|
self.password.clone()
|
|
};
|
|
|
|
let path = self
|
|
.keystore_path
|
|
.clone()
|
|
.unwrap_or_else(|| config_dir.join(DEFAULT_KEYSTORE_CONFIG_PATH));
|
|
|
|
Ok((self.keystore_uri.clone(), KeystoreConfig::Path { path, password }))
|
|
}
|
|
|
|
/// helper method to fetch password from `KeyParams` or read from stdin
|
|
pub fn read_password(&self) -> error::Result<Option<SecretString>> {
|
|
let (password_interactive, password) = (self.password_interactive, self.password.clone());
|
|
|
|
let pass = if password_interactive {
|
|
let password = rpassword::read_password_from_tty(Some("Key password: "))?;
|
|
Some(SecretString::new(password))
|
|
} else {
|
|
password
|
|
};
|
|
|
|
Ok(pass)
|
|
}
|
|
}
|
|
|
|
#[cfg(not(target_os = "unknown"))]
|
|
fn input_keystore_password() -> Result<String> {
|
|
rpassword::read_password_from_tty(Some("Keystore password: "))
|
|
.map_err(|e| format!("{:?}", e).into())
|
|
}
|