1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
//! command `login`
use crate::{keystore, result::Result};
use std::path::PathBuf;
use structopt::StructOpt;
/// Log in to account
#[derive(Debug, StructOpt)]
pub struct Login {
/// The default keystore path is ~/.gear/keystore and ~/.gear/keystore.json
///
/// @WARNING: THIS WILL ONLY BE SECURE IF THE keystore IS SECURE.
/// when you have NO PASSWORD, If it can be got by an attacker then
/// they can also get your key.
///
/// - If `s` is a possibly `0x` prefixed 64-digit hex string, then it will be interpreted
/// directly as a `MiniSecretKey` (aka "seed" in `subkey`).
///
/// - If `s` is a valid BIP-39 key phrase of 12, 15, 18, 21 or 24 words, then the key will
/// be derived from it. In this case:
/// - the phrase may be followed by one or more items delimited by `/` characters.
/// - the path may be followed by `///`, in which case everything after the `///` is treated
/// as a password.
///
/// - If `s` begins with a `/` character it is prefixed with the Substrate public `DEV_PHRASE`
/// and
/// interpreted as above.
pub suri: Option<String>,
/// The path of the json file generated from the polkadotjs wallet.
pub json: Option<PathBuf>,
/// password of the signer account
#[structopt(short, long)]
pub passwd: Option<String>,
}
impl Login {
/// exec command login
pub fn exec(&self) -> Result<()> {
let signer = match (&self.suri, &self.json) {
(Some(suri), _) => keystore::login(suri, self.passwd.as_ref().map(|p| p.as_ref()))?,
(None, Some(json)) => {
keystore::decode_json_file(json, self.passwd.as_ref().map(|p| p.as_ref()))?
}
_ => {
if let Ok(pair) = keystore::cache(self.passwd.as_deref()) {
pair
} else {
keystore::generate(self.passwd.as_ref().map(|p| p.as_ref()))?
}
}
};
println!("Successfully logged in as {}!", signer.account_id());
Ok(())
}
}