Browse Source

mmgen-autosign: reimplement using new Autosign class

The MMGen Project 1 year ago
parent
commit
7b56d5bb2d
2 changed files with 411 additions and 349 deletions
  1. 369 0
      mmgen/autosign.py
  2. 42 349
      mmgen/main_autosign.py

+ 369 - 0
mmgen/autosign.py

@@ -0,0 +1,369 @@
+#!/usr/bin/env python3
+#
+# mmgen = Multi-Mode GENerator, a command-line cryptocurrency wallet
+# Copyright (C)2013-2023 The MMGen Project <mmgen@tuta.io>
+# Licensed under the GNU General Public License, Version 3:
+#   https://www.gnu.org/licenses
+# Public project repositories:
+#   https://github.com/mmgen/mmgen
+#   https://gitlab.com/mmgen/mmgen
+
+"""
+autosign: Auto-sign MMGen transactions and message files
+"""
+
+import sys,os,asyncio
+from subprocess import run,PIPE,DEVNULL
+from collections import namedtuple
+
+from .util import msg,msg_r,ymsg,rmsg,gmsg,bmsg,die,suf,fmt_list
+from .color import yellow,red,orange
+from .wallet import Wallet
+
+class Autosign:
+
+	dfl_mountpoint = os.path.join(os.sep,'mnt','tx')
+	wallet_dir     = os.path.join(os.sep,'dev','shm','autosign')
+	disk_label_dir = os.path.join(os.sep,'dev','disk','by-label')
+	part_label = 'MMGEN_TX'
+
+	mn_fmts    = {
+		'mmgen': 'words',
+		'bip39': 'bip39',
+	}
+	dfl_mn_fmt = 'mmgen'
+
+	have_msg_dir = False
+
+	def __init__(self,cfg):
+
+		if cfg.mnemonic_fmt:
+			if cfg.mnemonic_fmt not in self.mn_fmts:
+				die(1,'{!r}: invalid mnemonic format (must be one of: {})'.format(
+					cfg.mnemonic_fmt,
+					fmt_list( self.mn_fmts, fmt='no_spc' ) ))
+
+		self.cfg = cfg
+
+		self.mountpoint = cfg.mountpoint or self.dfl_mountpoint
+
+		self.tx_dir  = os.path.join( self.mountpoint, 'tx' )
+		self.msg_dir = os.path.join( self.mountpoint, 'msg' )
+		self.keyfile = os.path.join( self.mountpoint, 'autosign.key' )
+
+		cfg.outdir = self.tx_dir
+		cfg.passwd_file = self.keyfile
+
+	async def check_daemons_running(self):
+
+		if 'coin' in self.cfg._uopts:
+			die(1,'--coin option not supported with this command.  Use --coins instead')
+
+		if self.cfg.coins:
+			coins = self.cfg.coins.upper().split(',')
+		else:
+			ymsg('Warning: no coins specified, defaulting to BTC')
+			coins = ['BTC']
+
+		from .protocol import init_proto
+		for coin in coins:
+			proto = init_proto( self.cfg,  coin, testnet=self.cfg.network=='testnet', need_amt=True )
+			if proto.sign_mode == 'daemon':
+				self.cfg._util.vmsg(f'Checking {coin} daemon')
+				from .rpc import rpc_init
+				from .exception import SocketError
+				try:
+					await rpc_init( self.cfg, proto )
+				except SocketError as e:
+					die(2,f'{coin} daemon not running or not listening on port {proto.rpc_port}')
+	@property
+	def wallet_files(self):
+
+		if not hasattr(self,'_wallet_files'):
+
+			try:
+				dirlist = os.listdir(self.wallet_dir)
+			except:
+				die(1,f'Cannot open wallet directory {self.wallet_dir!r}. Did you run ‘mmgen-autosign setup’?')
+
+			fns = [fn for fn in dirlist if fn.endswith('.mmdat')]
+			if fns:
+				self._wallet_files = [os.path.join(self.wallet_dir,fn) for fn in fns]
+			else:
+				die(1,'No wallet files present!')
+
+		return self._wallet_files
+
+	def do_mount(self):
+
+		if not os.path.ismount(self.mountpoint):
+			if run( ['mount',self.mountpoint], stderr=DEVNULL, stdout=DEVNULL ).returncode == 0:
+				msg(f'Mounting {self.mountpoint}')
+
+		self.have_msg_dir = os.path.isdir(self.msg_dir)
+
+		from stat import S_ISDIR,S_IWUSR,S_IRUSR 
+		for cdir in [self.tx_dir] + ([self.msg_dir] if self.have_msg_dir else []):
+			try:
+				ds = os.stat(cdir)
+				assert S_ISDIR(ds.st_mode), f'{cdir!r} is not a directory!'
+				assert ds.st_mode & S_IWUSR|S_IRUSR == S_IWUSR|S_IRUSR, f'{cdir!r} is not read/write for this user!'
+			except:
+				die(1,f'{cdir!r} missing or not read/writable by user!')
+
+	def do_umount(self):
+		if os.path.ismount(self.mountpoint):
+			run( ['sync'], check=True )
+			msg(f'Unmounting {self.mountpoint}')
+			run( ['umount',self.mountpoint], check=True )
+
+	async def sign_object(self,d,fn):
+		from .tx import UnsignedTX
+		from .tx.sign import txsign
+		from .rpc import rpc_init
+		try:
+			if d.desc == 'transaction':
+				tx1 = UnsignedTX( cfg=self.cfg, filename=fn )
+				if tx1.proto.sign_mode == 'daemon':
+					tx1.rpc = await rpc_init( self.cfg, tx1.proto )
+				tx2 = await txsign( self.cfg, tx1, self.wallet_files[:], None, None )
+				if tx2:
+					tx2.file.write(ask_write=False)
+					return tx2
+				else:
+					return False
+			elif d.desc == 'message file':
+				from .msg import UnsignedMsg,SignedMsg
+				m = UnsignedMsg( self.cfg, infile=fn )
+				await m.sign( wallet_files=self.wallet_files[:] )
+				m = SignedMsg( self.cfg, data=m.__dict__ )
+				m.write_to_file(
+					outdir = os.path.abspath(self.msg_dir),
+					ask_overwrite = False )
+				if m.data.get('failed_sids'):
+					die('MsgFileFailedSID',f'Failed Seed IDs: {fmt_list(m.data["failed_sids"],fmt="bare")}')
+				return m
+		except Exception as e:
+			ymsg(f'An error occurred with {d.desc} {fn!r}:\n    {e!s}')
+			return False
+		except:
+			ymsg(f'An error occurred with {d.desc} {fn!r}')
+			return False
+
+	async def sign(self,target):
+
+		_td = namedtuple('tdata',['desc','rawext','sigext','dir','fail_desc'])
+
+		d = {
+			'msg': _td('message file', 'rawmsg.json', 'sigmsg.json', self.msg_dir, 'sign or signed incompletely'),
+			'tx':  _td('transaction',  'rawtx',       'sigtx',       self.tx_dir,  'sign'),
+		}[target]
+
+		raw      = [fn[:-len(d.rawext)] for fn in os.listdir(d.dir) if fn.endswith('.'+d.rawext)]
+		signed   = [fn[:-len(d.sigext)] for fn in os.listdir(d.dir) if fn.endswith('.'+d.sigext)]
+		unsigned = [os.path.join( d.dir, fn+d.rawext ) for fn in raw if fn not in signed]
+
+		if unsigned:
+			ok = []
+			bad = []
+			for fn in unsigned:
+				ret = await self.sign_object(d,fn)
+				if ret:
+					ok.append(ret)
+				else:
+					bad.append(fn)
+				self.cfg._util.qmsg('')
+			await asyncio.sleep(0.3)
+			msg(f'{len(ok)} {d.desc}{suf(ok)} signed')
+			if bad:
+				rmsg(f'{len(bad)} {d.desc}{suf(bad)} failed to {d.fail_desc}')
+			if ok and not self.cfg.no_summary:
+				self.print_summary(d,ok)
+			if bad:
+				msg('')
+				rmsg(f'Failed {d.desc}s:')
+				def gen_bad_disp():
+					if d.desc == 'transaction':
+						for fn in sorted(bad):
+							yield red(fn)
+					elif d.desc == 'message file':
+						for rawfn in sorted(bad):
+							sigfn = rawfn[:-len(d.rawext)] + d.sigext
+							yield orange(sigfn) if os.path.exists(sigfn) else red(rawfn)
+				msg('  {}\n'.format( '\n  '.join(gen_bad_disp()) ))
+			return False if bad else True
+		else:
+			msg(f'No unsigned {d.desc}s')
+			await asyncio.sleep(0.5)
+			return True
+
+	def decrypt_wallets(self):
+		msg(f'Unlocking wallet{suf(self.wallet_files)} with key from {self.cfg.passwd_file!r}')
+		fails = 0
+		for wf in self.wallet_files:
+			try:
+				Wallet( self.cfg, wf, ignore_in_fmt=True )
+			except SystemExit as e:
+				if e.code != 0:
+					fails += 1
+
+		return False if fails else True
+
+	def print_summary(self,d,signed_objects):
+
+		if d.desc == 'message file':
+			gmsg('\nSigned message files:')
+			for m in signed_objects:
+				gmsg('  ' + os.path.join( self.msg_dir, m.signed_filename ))
+			return
+
+		if self.cfg.full_summary:
+			bmsg('\nAutosign summary:\n')
+			def gen():
+				for tx in signed_objects:
+					yield tx.info.format(terse=True)
+			msg_r('\n'.join(gen()))
+			return
+
+		def gen():
+			for tx in signed_objects:
+				non_mmgen = [o for o in tx.outputs if not o.mmid]
+				if non_mmgen:
+					yield (tx,non_mmgen)
+
+		body = list(gen())
+
+		if body:
+			bmsg('\nAutosign summary:')
+			fs = '{}  {} {}'
+			t_wid,a_wid = 6,44
+
+			def gen():
+				yield fs.format('TX ID ','Non-MMGen outputs'+' '*(a_wid-17),'Amount')
+				yield fs.format('-'*t_wid, '-'*a_wid, '-'*7)
+				for tx,non_mmgen in body:
+					for nm in non_mmgen:
+						yield fs.format(
+							tx.txid.fmt( width=t_wid, color=True ) if nm is non_mmgen[0] else ' '*t_wid,
+							nm.addr.fmt( width=a_wid, color=True ),
+							nm.amt.hl() + ' ' + yellow(tx.coin))
+
+			msg('\n' + '\n'.join(gen()))
+		else:
+			msg('\nNo non-MMGen outputs')
+
+	async def do_sign(self):
+		if not self.cfg.stealth_led:
+			self.led.set('busy')
+		self.do_mount()
+		key_ok = self.decrypt_wallets()
+		if key_ok:
+			if self.cfg.stealth_led:
+				self.led.set('busy')
+			ret1 = await self.sign('tx')
+			ret2 = await self.sign('msg') if self.have_msg_dir else True
+			ret = ret1 and ret2
+			self.do_umount()
+			self.led.set(('standby','off','error')[(not ret)*2 or bool(self.cfg.stealth_led)])
+			return ret
+		else:
+			msg('Password is incorrect!')
+			self.do_umount()
+			if not self.cfg.stealth_led:
+				self.led.set('error')
+			return False
+
+	def wipe_existing_key(self):
+		try: os.stat(self.keyfile)
+		except: pass
+		else:
+			from .fileutil import shred_file
+			msg(f'\nShredding existing key {self.keyfile!r}')
+			shred_file( self.keyfile, verbose=self.cfg.verbose )
+
+	def create_key(self):
+		kdata = os.urandom(32).hex()
+		desc = f'key file {self.keyfile!r}'
+		msg('Creating ' + desc)
+		try:
+			with open(self.keyfile,'w') as fp:
+				fp.write(kdata+'\n')
+			os.chmod(self.keyfile,0o400)
+			msg('Wrote ' + desc)
+		except:
+			die(2,'Unable to write ' + desc)
+
+	def gen_key(self,no_unmount=False):
+		self.create_wallet_dir()
+		if not self.get_insert_status():
+			die(1,'Removable device not present!')
+		self.do_mount()
+		self.wipe_existing_key()
+		self.create_key()
+		if not no_unmount:
+			self.do_umount()
+
+	def remove_wallet_dir(self):
+		msg(f'Deleting {self.wallet_dir!r}')
+		import shutil
+		try: shutil.rmtree(self.wallet_dir)
+		except: pass
+
+	def create_wallet_dir(self):
+		try: os.mkdir(self.wallet_dir)
+		except: pass
+		try: os.stat(self.wallet_dir)
+		except: die(2,f'Unable to create wallet directory {self.wallet_dir!r}')
+
+	def setup(self):
+		self.remove_wallet_dir()
+		self.gen_key(no_unmount=True)
+		ss_in  = Wallet( self.cfg, in_fmt=self.mn_fmts[self.cfg.mnemonic_fmt or self.dfl_mn_fmt] )
+		ss_out = Wallet( self.cfg, ss=ss_in )
+		ss_out.write_to_file( desc='autosign wallet', outdir=self.wallet_dir )
+
+	def get_insert_status(self):
+		if self.cfg.no_insert_check:
+			return True
+		try: os.stat(os.path.join( self.disk_label_dir, self.part_label ))
+		except: return False
+		else: return True
+
+	async def do_loop(self):
+		n,prev_status = 0,False
+		if not self.cfg.stealth_led:
+			self.led.set('standby')
+		while True:
+			status = self.get_insert_status()
+			if status and not prev_status:
+				msg('Device insertion detected')
+				await self.do_sign()
+			prev_status = status
+			if not n % 10:
+				msg_r(f"\r{' '*17}\rWaiting")
+				sys.stderr.flush()
+			await asyncio.sleep(1)
+			msg_r('.')
+			n += 1
+
+	def at_exit(self,exit_val,message=None):
+		if message:
+			msg(message)
+		self.led.stop()
+		sys.exit(int(exit_val))
+
+	def init_exit_handler(self):
+
+		def handler(arg1,arg2):
+			self.at_exit(1,'\nCleaning up...')
+
+		import signal
+		signal.signal( signal.SIGTERM, handler )
+		signal.signal( signal.SIGINT, handler )
+
+	def init_led(self):
+		from .led import LEDControl
+		self.led = LEDControl(
+			enabled = self.cfg.led,
+			simulate = os.getenv('MMGEN_TEST_SUITE_AUTOSIGN_LED_SIMULATE') )
+		self.led.set('off')

+ 42 - 349
mmgen/main_autosign.py

@@ -20,40 +20,27 @@
 mmgen-autosign: Auto-sign MMGen transactions and message files
 mmgen-autosign: Auto-sign MMGen transactions and message files
 """
 """
 
 
-import sys,os,asyncio,signal,shutil
-from subprocess import run,PIPE,DEVNULL
-from collections import namedtuple
-from stat import *
+import sys
 
 
 from .cfg import Config
 from .cfg import Config
-from .util import msg,msg_r,ymsg,rmsg,gmsg,bmsg,die,suf,fmt_list,async_run,exit_if_mswin
-from .color import yellow,red,orange
-
-mountpoint   = '/mnt/tx'
-tx_dir       = '/mnt/tx/tx'
-msg_dir      = '/mnt/tx/msg'
-part_label   = 'MMGEN_TX'
-wallet_dir   = '/dev/shm/autosign'
-mn_fmts      = {
-	'mmgen': 'words',
-	'bip39': 'bip39',
-}
-mn_fmt_dfl   = 'mmgen'
+from .util import die,fmt_list,exit_if_mswin,async_run
+
+exit_if_mswin('autosigning')
 
 
 opts_data = {
 opts_data = {
 	'sets': [('stealth_led', True, 'led', True)],
 	'sets': [('stealth_led', True, 'led', True)],
 	'text': {
 	'text': {
 		'desc': 'Auto-sign MMGen transactions and message files',
 		'desc': 'Auto-sign MMGen transactions and message files',
 		'usage':'[opts] [command]',
 		'usage':'[opts] [command]',
-		'options': f"""
+		'options': """
 -h, --help            Print this help message
 -h, --help            Print this help message
 --, --longhelp        Print help message for long options (common options)
 --, --longhelp        Print help message for long options (common options)
 -c, --coins=c         Coins to sign for (comma-separated list)
 -c, --coins=c         Coins to sign for (comma-separated list)
 -I, --no-insert-check Don’t check for device insertion
 -I, --no-insert-check Don’t check for device insertion
 -l, --led             Use status LED to signal standby, busy and error
 -l, --led             Use status LED to signal standby, busy and error
--m, --mountpoint=M    Specify an alternate mountpoint 'M' (default: {mountpoint!r})
+-m, --mountpoint=M    Specify an alternate mountpoint 'M' (default: {asi.dfl_mountpoint!r})
 -M, --mnemonic-fmt=F  During setup, prompt for mnemonic seed phrase of format
 -M, --mnemonic-fmt=F  During setup, prompt for mnemonic seed phrase of format
-                      'F' (choices: {fmt_list(mn_fmts,fmt='no_spc')}; default: {mn_fmt_dfl!r})
+                      'F' (choices: {mn_fmts}; default: {asi.dfl_mn_fmt!r})
 -n, --no-summary      Don’t print a transaction summary
 -n, --no-summary      Don’t print a transaction summary
 -s, --stealth-led     Stealth LED mode - signal busy and error only, and only
 -s, --stealth-led     Stealth LED mode - signal busy and error only, and only
                       after successful authorization.
                       after successful authorization.
@@ -63,11 +50,12 @@ opts_data = {
 -q, --quiet           Produce quieter output
 -q, --quiet           Produce quieter output
 -v, --verbose         Produce more verbose output
 -v, --verbose         Produce more verbose output
 """,
 """,
-	'notes': f"""
+	'notes': """
 
 
                               COMMANDS
                               COMMANDS
 
 
-gen_key - generate the wallet encryption key and copy it to {mountpoint!r}
+gen_key - generate the wallet encryption key and copy it to the mountpoint
+          (currently configured as {asi.mountpoint!r})
 setup   - generate the wallet encryption key and wallet
 setup   - generate the wallet encryption key and wallet
 wait    - start in loop mode: wait-mount-sign-unmount-wait
 wait    - start in loop mode: wait-mount-sign-unmount-wait
 
 
@@ -91,14 +79,15 @@ writable root directory and a directory named '/tx', where unsigned MMGen
 transactions are placed. Optionally, the directory '/msg' may also be created
 transactions are placed. Optionally, the directory '/msg' may also be created
 and unsigned message files created by `mmgen-msg` placed in this directory.
 and unsigned message files created by `mmgen-msg` placed in this directory.
 
 
-On the signing machine the mount point {mountpoint!r} must exist and /etc/fstab
-must contain the following entry:
+On the signing machine the mount point (currently configured as {asi.mountpoint!r})
+must exist and /etc/fstab must contain the following entry:
 
 
     LABEL='MMGEN_TX' /mnt/tx auto noauto,user 0 0
     LABEL='MMGEN_TX' /mnt/tx auto noauto,user 0 0
 
 
-Transactions are signed with a wallet on the signing machine (in the directory
-{wallet_dir!r}) encrypted with a 64-character hexadecimal password saved
-in the file `autosign.key` in the root of the removable device partition.
+Transactions are signed with a wallet on the signing machine located in the wallet
+directory (currently configured as {asi.wallet_dir!r}) encrypted with a 64-character
+hexadecimal password saved in the file `autosign.key` in the root of the removable
+device partition.
 
 
 The password and wallet can be created in one operation by invoking the
 The password and wallet can be created in one operation by invoking the
 command with 'setup' with the removable device inserted.  In this case, the
 command with 'setup' with the removable device inserted.  In this case, the
@@ -108,7 +97,7 @@ Alternatively, the password and wallet can be created separately by first
 invoking the command with 'gen_key' and then creating and encrypting the
 invoking the command with 'gen_key' and then creating and encrypting the
 wallet using the -P (--passwd-file) option:
 wallet using the -P (--passwd-file) option:
 
 
-    $ mmgen-walletconv -r0 -q -iwords -d{wallet_dir} -p1 -P/mnt/tx/autosign.key -Llabel
+    $ mmgen-walletconv -r0 -q -iwords -d{asi.wallet_dir} -p1 -P/mnt/tx/autosign.key -Llabel
 
 
 Note that the hash preset must be '1'.  Multiple wallets are permissible.
 Note that the hash preset must be '1'.  Multiple wallets are permissible.
 
 
@@ -117,6 +106,13 @@ each signing session.
 
 
 This command is currently available only on Linux-based platforms.
 This command is currently available only on Linux-based platforms.
 """
 """
+	},
+	'code': {
+		'options': lambda s: s.format(
+			asi     = asi,
+			mn_fmts = fmt_list( asi.mn_fmts, fmt='no_spc' ),
+		),
+		'notes': lambda s: s.format(asi=asi)
 	}
 	}
 }
 }
 
 
@@ -128,347 +124,44 @@ cfg = Config(
 		'usr_randchars': 0,
 		'usr_randchars': 0,
 		'hash_preset': '1',
 		'hash_preset': '1',
 		'label': 'Autosign Wallet',
 		'label': 'Autosign Wallet',
-	})
+	},
+	do_post_init = True )
 
 
 cmd_args = cfg._args
 cmd_args = cfg._args
 
 
 type(cfg)._set_ok += ('outdir','passwd_file')
 type(cfg)._set_ok += ('outdir','passwd_file')
 
 
-exit_if_mswin('autosigning')
+from .autosign import Autosign
+asi = Autosign(cfg)
 
 
-if cfg.mnemonic_fmt:
-	if cfg.mnemonic_fmt not in mn_fmts:
-		die(1,'{!r}: invalid mnemonic format (must be one of: {})'.format(
-			cfg.mnemonic_fmt,
-			fmt_list(mn_fmts,fmt='no_spc') ))
-
-from .wallet import Wallet
-from .tx import UnsignedTX
-from .tx.sign import txsign
-from .protocol import init_proto
-from .rpc import rpc_init
-
-if cfg.mountpoint:
-	mountpoint = cfg.mountpoint
-
-keyfile = os.path.join(mountpoint,'autosign.key')
-msg_dir = os.path.join(mountpoint,'msg')
-tx_dir  = os.path.join(mountpoint,'tx')
-
-cfg.outdir = tx_dir
-cfg.passwd_file = keyfile
-
-async def check_daemons_running():
-	if cfg.coin != type(cfg).coin:
-		die(1,'--coin option not supported with this command.  Use --coins instead')
-	if cfg.coins:
-		coins = cfg.coins.upper().split(',')
-	else:
-		ymsg('Warning: no coins specified, defaulting to BTC')
-		coins = ['BTC']
-
-	for coin in coins:
-		proto = init_proto( cfg,  coin, testnet=cfg.network=='testnet', need_amt=True )
-		if proto.sign_mode == 'daemon':
-			cfg._util.vmsg(f'Checking {coin} daemon')
-			from .exception import SocketError
-			try:
-				await rpc_init(cfg,proto)
-			except SocketError as e:
-				die(2,f'{coin} daemon not running or not listening on port {proto.rpc_port}')
-
-def get_wallet_files():
-	try:
-		dlist = os.listdir(wallet_dir)
-	except:
-		die(1,f"Cannot open wallet directory {wallet_dir!r}. Did you run 'mmgen-autosign setup'?")
-
-	fns = [x for x in dlist if x.endswith('.mmdat')]
-	if fns:
-		return [os.path.join(wallet_dir,w) for w in fns]
-	else:
-		die(1,'No wallet files present!')
-
-def do_mount():
-	if not os.path.ismount(mountpoint):
-		if run(['mount',mountpoint],stderr=DEVNULL,stdout=DEVNULL).returncode == 0:
-			msg(f'Mounting {mountpoint}')
-	global have_msg_dir
-	have_msg_dir = os.path.isdir(msg_dir)
-	for cdir in [tx_dir] + ([msg_dir] if have_msg_dir else []):
-		try:
-			ds = os.stat(cdir)
-			assert S_ISDIR(ds.st_mode), f'{cdir!r} is not a directory!'
-			assert ds.st_mode & S_IWUSR|S_IRUSR == S_IWUSR|S_IRUSR, f'{cdir!r} is not read/write for this user!'
-		except:
-			die(1,f'{cdir!r} missing or not read/writable by user!')
-
-def do_umount():
-	if os.path.ismount(mountpoint):
-		run(['sync'],check=True)
-		msg(f'Unmounting {mountpoint}')
-		run(['umount',mountpoint],check=True)
-
-async def sign_object(d,fn):
-	try:
-		if d.desc == 'transaction':
-			tx1 = UnsignedTX(cfg=cfg,filename=fn)
-			if tx1.proto.sign_mode == 'daemon':
-				tx1.rpc = await rpc_init(cfg,tx1.proto)
-			tx2 = await txsign(cfg,tx1,wfs[:],None,None)
-			if tx2:
-				tx2.file.write(ask_write=False)
-				return tx2
-			else:
-				return False
-		elif d.desc == 'message file':
-			from .msg import UnsignedMsg,SignedMsg
-			m = UnsignedMsg(cfg,infile=fn)
-			await m.sign(wallet_files=wfs[:])
-			m = SignedMsg(cfg,data=m.__dict__)
-			m.write_to_file(
-				outdir = os.path.abspath(msg_dir),
-				ask_overwrite = False )
-			if m.data.get('failed_sids'):
-				die('MsgFileFailedSID',f'Failed Seed IDs: {fmt_list(m.data["failed_sids"],fmt="bare")}')
-			return m
-	except Exception as e:
-		ymsg(f'An error occurred with {d.desc} {fn!r}:\n    {e!s}')
-		return False
-	except:
-		ymsg(f'An error occurred with {d.desc} {fn!r}')
-		return False
-
-async def sign(target):
-	td = namedtuple('tdata',['desc','rawext','sigext','dir','fail_desc'])
-	d = {
-		'msg': td('message file', 'rawmsg.json', 'sigmsg.json', msg_dir, 'sign or signed incompletely'),
-		'tx':  td('transaction',  'rawtx',       'sigtx',       tx_dir,  'sign'),
-	}[target]
-
-	raw      = [fn[:-len(d.rawext)] for fn in os.listdir(d.dir) if fn.endswith('.'+d.rawext)]
-	signed   = [fn[:-len(d.sigext)] for fn in os.listdir(d.dir) if fn.endswith('.'+d.sigext)]
-	unsigned = [os.path.join(d.dir,fn+d.rawext) for fn in raw if fn not in signed]
-
-	if unsigned:
-		ok,bad = ([],[])
-		for fn in unsigned:
-			ret = await sign_object(d,fn)
-			if ret:
-				ok.append(ret)
-			else:
-				bad.append(fn)
-			cfg._util.qmsg('')
-		await asyncio.sleep(0.3)
-		msg(f'{len(ok)} {d.desc}{suf(ok)} signed')
-		if bad:
-			rmsg(f'{len(bad)} {d.desc}{suf(bad)} failed to {d.fail_desc}')
-		if ok and not cfg.no_summary:
-			print_summary(d,ok)
-		if bad:
-			msg('')
-			rmsg(f'Failed {d.desc}s:')
-			def gen_bad_disp():
-				if d.desc == 'transaction':
-					for fn in sorted(bad):
-						yield red(fn)
-				elif d.desc == 'message file':
-					for rawfn in sorted(bad):
-						sigfn = rawfn[:-len(d.rawext)] + d.sigext
-						yield orange(sigfn) if os.path.exists(sigfn) else red(rawfn)
-			msg('  {}\n'.format( '\n  '.join(gen_bad_disp()) ))
-		return False if bad else True
-	else:
-		msg(f'No unsigned {d.desc}s')
-		await asyncio.sleep(0.5)
-		return True
-
-def decrypt_wallets():
-	msg(f'Unlocking wallet{suf(wfs)} with key from {cfg.passwd_file!r}')
-	fails = 0
-	for wf in wfs:
-		try:
-			Wallet(cfg,wf,ignore_in_fmt=True)
-		except SystemExit as e:
-			if e.code != 0:
-				fails += 1
-
-	return False if fails else True
-
-def print_summary(d,signed_objects):
-
-	if d.desc == 'message file':
-		gmsg('\nSigned message files:')
-		for m in signed_objects:
-			gmsg('  ' + os.path.join(msg_dir,m.signed_filename) )
-		return
-
-	if cfg.full_summary:
-		bmsg('\nAutosign summary:\n')
-		def gen():
-			for tx in signed_objects:
-				yield tx.info.format(terse=True)
-		msg_r(''.join(gen()))
-		return
-
-	def gen():
-		for tx in signed_objects:
-			non_mmgen = [o for o in tx.outputs if not o.mmid]
-			if non_mmgen:
-				yield (tx,non_mmgen)
-
-	body = list(gen())
-
-	if body:
-		bmsg('\nAutosign summary:')
-		fs = '{}  {} {}'
-		t_wid,a_wid = 6,44
-
-		def gen():
-			yield fs.format('TX ID ','Non-MMGen outputs'+' '*(a_wid-17),'Amount')
-			yield fs.format('-'*t_wid, '-'*a_wid, '-'*7)
-			for tx,non_mmgen in body:
-				for nm in non_mmgen:
-					yield fs.format(
-						tx.txid.fmt(width=t_wid,color=True) if nm is non_mmgen[0] else ' '*t_wid,
-						nm.addr.fmt(width=a_wid,color=True),
-						nm.amt.hl() + ' ' + yellow(tx.coin))
-
-		msg('\n'.join(gen()))
-	else:
-		msg('No non-MMGen outputs')
-
-async def do_sign():
-	if not cfg.stealth_led:
-		led.set('busy')
-	do_mount()
-	key_ok = decrypt_wallets()
-	if key_ok:
-		if cfg.stealth_led:
-			led.set('busy')
-		ret1 = await sign('tx')
-		ret2 = await sign('msg') if have_msg_dir else True
-		ret = ret1 and ret2
-		do_umount()
-		led.set(('standby','off','error')[(not ret)*2 or bool(cfg.stealth_led)])
-		return ret
-	else:
-		msg('Password is incorrect!')
-		do_umount()
-		if not cfg.stealth_led:
-			led.set('error')
-		return False
-
-def wipe_existing_key():
-	try: os.stat(keyfile)
-	except: pass
-	else:
-		from .fileutil import shred_file
-		msg(f'\nShredding existing key {keyfile!r}')
-		shred_file( keyfile, verbose=cfg.verbose )
-
-def create_key():
-	kdata = os.urandom(32).hex()
-	desc = f'key file {keyfile!r}'
-	msg('Creating ' + desc)
-	try:
-		with open(keyfile,'w') as fp:
-			fp.write(kdata+'\n')
-		os.chmod(keyfile,0o400)
-		msg('Wrote ' + desc)
-	except:
-		die(2,'Unable to write ' + desc)
-
-def gen_key(no_unmount=False):
-	create_wallet_dir()
-	if not get_insert_status():
-		die(1,'Removable device not present!')
-	do_mount()
-	wipe_existing_key()
-	create_key()
-	if not no_unmount:
-		do_umount()
-
-def remove_wallet_dir():
-	msg(f'Deleting {wallet_dir!r}')
-	try: shutil.rmtree(wallet_dir)
-	except: pass
-
-def create_wallet_dir():
-	try: os.mkdir(wallet_dir)
-	except: pass
-	try: os.stat(wallet_dir)
-	except: die(2,f'Unable to create wallet directory {wallet_dir!r}')
-
-def setup():
-	remove_wallet_dir()
-	gen_key(no_unmount=True)
-	ss_in = Wallet(cfg,in_fmt=mn_fmts[cfg.mnemonic_fmt or mn_fmt_dfl])
-	ss_out = Wallet(cfg,ss=ss_in)
-	ss_out.write_to_file(desc='autosign wallet',outdir=wallet_dir)
-
-def get_insert_status():
-	if cfg.no_insert_check:
-		return True
-	try: os.stat(os.path.join('/dev/disk/by-label',part_label))
-	except: return False
-	else: return True
-
-async def do_loop():
-	n,prev_status = 0,False
-	if not cfg.stealth_led:
-		led.set('standby')
-	while True:
-		status = get_insert_status()
-		if status and not prev_status:
-			msg('Device insertion detected')
-			await do_sign()
-		prev_status = status
-		if not n % 10:
-			msg_r(f"\r{' '*17}\rWaiting")
-			sys.stderr.flush()
-		await asyncio.sleep(1)
-		msg_r('.')
-		n += 1
+cfg._post_init()
 
 
 if len(cmd_args) not in (0,1):
 if len(cmd_args) not in (0,1):
 	cfg._opts.usage()
 	cfg._opts.usage()
 
 
 if len(cmd_args) == 1:
 if len(cmd_args) == 1:
 	cmd = cmd_args[0]
 	cmd = cmd_args[0]
-	if cmd in ('gen_key','setup'):
-		(gen_key if cmd == 'gen_key' else setup)()
+	if cmd == 'gen_key':
+		asi.gen_key()
+		sys.exit(0)
+	elif cmd == 'setup':
+		asi.setup()
 		sys.exit(0)
 		sys.exit(0)
 	elif cmd != 'wait':
 	elif cmd != 'wait':
 		die(1,f'{cmd!r}: unrecognized command')
 		die(1,f'{cmd!r}: unrecognized command')
 
 
-wfs = get_wallet_files()
+asi.init_led()
 
 
-def at_exit(exit_val,message='\nCleaning up...'):
-	if message:
-		msg(message)
-	led.stop()
-	sys.exit(exit_val)
-
-def handler(a,b):
-	at_exit(1)
-
-signal.signal(signal.SIGTERM,handler)
-signal.signal(signal.SIGINT,handler)
-
-from .led import LEDControl
-led = LEDControl(
-	enabled = cfg.led,
-	simulate = os.getenv('MMGEN_TEST_SUITE_AUTOSIGN_LED_SIMULATE') )
-led.set('off')
+asi.init_exit_handler()
 
 
 async def main():
 async def main():
-	await check_daemons_running()
 
 
-	if len(cmd_args) == 0:
-		ret = await do_sign()
-		at_exit(int(not ret),message='')
+	await asi.check_daemons_running()
+
+	if not cmd_args:
+		ret = await asi.do_sign()
+		asi.at_exit(not ret)
 	elif cmd_args[0] == 'wait':
 	elif cmd_args[0] == 'wait':
-		await do_loop()
+		await asi.do_loop()
 
 
 async_run(main())
 async_run(main())