1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
//! command `login`
use crate::{keystore, result::Result};
use std::path::PathBuf;
use structopt::StructOpt;
/// Log in to account
#[derive(Debug, StructOpt)]
pub struct Login {
/// The default keystore path is ~/.gear/keystore and ~/.gear/keystore.json
///
/// @WARNING: THIS WILL ONLY BE SECURE IF THE keystore IS SECURE.
/// when you have NO PASSWORD, If it can be got by an attacker then
/// they can also get your key.
///
/// - If `s` is a possibly `0x` prefixed 64-digit hex string, then it will be interpreted
/// directly as a `MiniSecretKey` (aka "seed" in `subkey`).
///
/// - If `s` is a valid BIP-39 key phrase of 12, 15, 18, 21 or 24 words, then the key will
/// be derived from it. In this case:
/// - the phrase may be followed by one or more items delimited by `/` characters.
/// - the path may be followed by `///`, in which case everything after the `///` is treated
/// as a password.
///
/// - If `s` begins with a `/` character it is prefixed with the Substrate public `DEV_PHRASE`
/// and
/// interpreted as above.
pub suri: Option<String>,
/// The path of the json file generated from the polkadotjs wallet.
pub json: Option<PathBuf>,
/// password of the signer account
#[structopt(short, long)]
pub passwd: Option<String>,
}
impl Login {
/// exec command login
pub fn exec(&self) -> Result<()> {
let signer = match (&self.suri, &self.json) {
(Some(suri), _) => keystore::login(suri, self.passwd.as_ref().map(|p| p.as_ref()))?,
(None, Some(json)) => {
keystore::decode_json_file(json, self.passwd.as_ref().map(|p| p.as_ref()))?
}
_ => {
if let Ok(pair) = keystore::cache(self.passwd.as_deref()) {
pair
} else {
keystore::generate(self.passwd.as_ref().map(|p| p.as_ref()))?
}
}
};
println!("Successfully logged in as {}!", signer.account_id());
Ok(())
}
}