@@ -20,46 +20,46 @@ as well as derive secrets used in channel commitments.
2020METHODS
2121-------
2222
23- ** encrypt** * hsm\_ secret* * password*
23+ ** encrypt** * hsm\_ secret\_ path * * password*
2424
25- Encrypt the ` hsm_secret ` file so that it can only be decrypted at
25+ Encrypt the ` hsm_secret_path ` file so that it can only be decrypted at
2626** lightningd** startup.
2727You must give the option ** --encrypted-hsm** to ** lightningd** .
28- The password of the ` hsm_secret ` file will be asked whenever you
28+ The password of the ` hsm_secret_path ` file will be asked whenever you
2929start ** lightningd** .
3030
31- ** decrypt** * hsm\_ secret* * password*
31+ ** decrypt** * hsm\_ secret\_ path * * password*
3232
33- Decrypt the ` hsm_secret ` file that was encrypted with the ** encrypt**
33+ Decrypt the ` hsm_secret_path ` file that was encrypted with the ** encrypt**
3434method.
3535
36- ** dumpcommitments** * node\_ id* * channel\_ dbid* * depth* * hsm\_ secret* \[ * password* \]
36+ ** dumpcommitments** * node\_ id* * channel\_ dbid* * depth* * hsm\_ secret\_ path * \[ * password* \]
3737
3838 Show the per-commitment secret and point of up to * depth* commitments,
3939of the specified channel with the specified peer,
4040identified by the channel database index.
41- Specify * password* if the ` hsm_secret ` is encrypted.
41+ Specify * password* if the ` hsm_secret_path ` is encrypted.
4242
43- ** guesstoremote** * p2wpkh* * node\_ id* * max\_ channel\_ dbid* * hsm\_ secret* \[ * password* \]
43+ ** guesstoremote** * p2wpkh* * node\_ id* * max\_ channel\_ dbid* * hsm\_ secret\_ path * \[ * password* \]
4444
4545 Brute-force the private key to our funds from a remote unilateral close
4646of a channel, in a case where we have lost all database data except for
47- our ` hsm_secret ` .
47+ our ` hsm_secret_path ` .
4848The peer must be the one to close the channel (and the funds will remain
4949unrecoverable until the channel is closed).
5050* max\_ channel\_ dbid* is your own guess on what the * channel\_ dbid* was,
5151or at least the maximum possible value,
5252and is usually no greater than the number of channels that the node has
5353ever had.
54- Specify * password* if the ` hsm_secret ` is encrypted.
54+ Specify * password* if the ` hsm_secret_path ` is encrypted.
5555
5656** generatehsm** * hsm\_ secret\_ path*
5757 Generates a new hsm\_ secret using BIP39.
5858
5959** checkhsm** * hsm\_ secret\_ path*
6060 Checks that hsm\_ secret matches a BIP39 passphrase.
6161
62- ** dumponchaindescriptors** \[ * --show-secrets* \] * hsm\_ secret* \[ * network* \]
62+ ** dumponchaindescriptors** \[ * --show-secrets* \] * hsm\_ secret\_ path * \[ * network* \]
6363 Dump output descriptors for our onchain wallet.
6464This command requires the path to the hsm\_ secret containing the wallet seed.
6565If the flag * --show-secrets* is set the command will show the BIP32 extended private
@@ -74,7 +74,7 @@ password.
7474To generate descriptors using testnet master keys, you may specify * testnet* as
7575the last parameter. By default, mainnet-encoded keys are generated.
7676
77- ** makerune** * hsm\_ secret*
77+ ** makerune** * hsm\_ secret\_ path *
7878 Make a master rune for this node (with ` uniqueid ` 0)
7979This produces the same results as lightning-commando-rune(7) on a fresh node.
8080You will still need to create a rune once the node starts, if you want commando to work (as it is only activated once it has generated one).
@@ -85,6 +85,9 @@ You will still need to create a rune once the node starts, if you want commando
8585** getemergencyrecover** * emergency.recover\_ path*
8686 Print out the bech32 encoded emergency.recover file.
8787
88+ ** getnodeid** * hsm\_ secret\_ path*
89+ Print out the node id that a node using this hsm secret would have: useful for verifying that you are accessing the correct secret!
90+
8891BUGS
8992----
9093
0 commit comments