JSON-RPC Namespaces - personal

The JSON-RPC API’s personal namespace has historically been used to manage accounts and sign transactions and data over RPC. However, it has now been deprecated in favour of using Clef as an external signer and account manager. One of the major changes is moving away from indiscriminate locking and unlocking of accounts and instead using Clef to explicitly approve or deny specific actions. The first section on this page shows the suggested replacement for each method in personal. The second section shows the deprecated methods for archival purposes.

Method replacements

The following list shows each method from the personal namespace and the intended method in Clef that supercedes it.

personal_listAccounts

personal_listAccounts displays the addresses of all accounts in the keystore. It is identical to eth.accounts. Calling eth.accounts requires manual approval in Clef (unless a rule for it has been attested). There is also Clef’s list-accounts command that can be called from the terminal.

Examples:

Copy

# eth_accounts using curl
curl -X POST --data '{"jsonrpc":"2.0","method":"eth_accounts","params":[],"id":1}'

Copy

// eth_accounts in Etn-sc's JS console
eth.accounts;

Copy

# clef list-accounts in the terminal
clef list-accounts

personal_deriveAccount

personal_deriveAccount requests a hardware wallet to derive a new account, optionally pinning it for later use. This method is identical to clef_deriveAccount. The Clef method is not externally exposed so it must be called via a UI.

personal.ecRecover

personal_ecRecover returns the address for the account that was used to create a signature. An equivalent method, account_ecRecover is available on the Clef external API.

Example call:

Copy

curl --data '{"id": 4, "jsonrpc": "2.0", "method": "account_ecRecover","params": ["0xaabbccdd",     "0x5b6693f153b48ec1c706ba4169960386dbaa6903e249cc79a8e6ddc434451d417e1e57327872c7f538beeb323c300afa9999a3d4a5de6caf3be0d5ef832b67ef1c"]}' -X POST localhost:8550

personal_importRawKey

personal.importRawKey was used to create a new account in the keystore from a raw private key. Clef has an equivalent method that can be invoked in the terminal using:

Copy

clef importraw <private-key-as-hex-string>

personal_listWallets

As opposed to listAccounts, this method lists full details, including usb path or keystore-file paths. The equivalent method is clef_listWallets. This method can be called from the terminal using:

Copy

clef list-wallets

personal_newAccount

personal_newAccount was used to create a new accoutn and save it in the keystore. Clef has an equivalent method, account_new. It can be accessed on the terminal using an http request or using a Clef command:

Example call (curl):

Copy

curl --data '{"id": 1, "jsonrpc": "2.0", "method": "account_new", "params": []}' -X POST localhost:8550

Example call (Clef command):

Copy

clef newaccount

Both require manual approval in Clef unless a custom ruleset is in place.

personal_openWallet

personal_OpenWallet initiates a hardware wallet opening procedure by establishing a USB connection and then attempting to authenticate via the provided passphrase. Note, the method may return an extra challenge requiring a second open (e.g. the Trezor PIN matrix challenge). personal_openWallet is identical to clef_openWallet. The Clef method is not externally eposed, meaning it must be called via a UI.

personal_sendTransaction

personal_sendTransaction ws used to sign and submit a transaction. This can be done using eth_sendTransaction, requiring manual approval in Clef.

Example call (Javascript console):

Copy

// this command requires 2x approval in Clef because it loads account data via eth.accounts[0]
// and eth.accounts[1]
var tx = { from: eth.accounts[0], to: eth.accounts[1], value: web3.toWei(0.1, 'ether') };

// then send the transaction
eth.sendTransaction(tx);

Example call (terminal)

Copy

curl --data '{"id":1, "jsonrpc":"2.0", "method":"eth_sendTransaction", "params":[{"from": "0xE70CAD05D0D54Ae3C9Fe5442f901E0433f9bd14B", "to":"0x4FDc03d09Ffca5Bba3138149E29D85C8A9E2Ac42", "gas":"21000","gasPrice":"20000000000", "nonce":"94"}]}' -H "Content-Type: application/json" -X POST localhost:8545

personal_sign

The sign method calculates an Ethereum specific signature with sign(keccak256(“\x19Ethereum Signed Message:\n” + len(message) + message)). Adding a prefix to the message makes the calculated signature recognisable as an Ethereum specific signature. This prevents misuse where a malicious DApp can sign arbitrary data (e.g. transaction) and use the signature to impersonate the victim.

personal.sign is equivalent to Clef’s account_signData. It returns the calculated signature.

Example call:

Copy

curl --data {"id": 3, "jsonrpc": "2.0", "method": "account_signData", "params": ["data/plain", "0x1923f626bb8dc025849e00f99c25fe2b2f7fb0db","0xaabbccdd"]} -X POST localhost:8550

Clef also has account_signTypedData that signs data structured according to EIP-712 and returns the signature.

Example call (use the following as a template for in curl --data -X POST localhost:8550 -H “Content-Type: application/json”)

Copy

{
  "id": 68,
  "jsonrpc": "2.0",
  "method": "account_signTypedData",
  "params": [
    "0xcd2a3d9f938e13cd947ec05abc7fe734df8dd826",
    {
      "types": {
        "EIP712Domain": [
          {
            "name": "name",
            "type": "string"
          },
          {
            "name": "version",
            "type": "string"
          },
          {
            "name": "chainId",
            "type": "uint256"
          },
          {
            "name": "verifyingContract",
            "type": "address"
          }
        ],
        "Person": [
          {
            "name": "name",
            "type": "string"
          },
          {
            "name": "wallet",
            "type": "address"
          }
        ],
        "Mail": [
          {
            "name": "from",
            "type": "Person"
          },
          {
            "name": "to",
            "type": "Person"
          },
          {
            "name": "contents",
            "type": "string"
          }
        ]
      },
      "primaryType": "Mail",
      "domain": {
        "name": "Ether Mail",
        "version": "1",
        "chainId": 1,
        "verifyingContract": "0xCcCCccccCCCCcCCCCCCcCcCccCcCCCcCcccccccC"
      },
      "message": {
        "from": {
          "name": "Cow",
          "wallet": "0xCD2a3d9F938E13CD947Ec05AbC7FE734Df8DD826"
        },
        "to": {
          "name": "Bob",
          "wallet": "0xbBbBBBBbbBBBbbbBbbBbbbbBBbBbbbbBbBbbBBbB"
        },
        "contents": "Hello, Bob!"
      }
    }
  ]
}

personal_signTransaction

personal_signTransaction was used to create and sign a transaction from the given arguments. The transaction was returned in RLP-form, not broadcast to other nodes. The equivalent method is Clef’s account_signTransaction from the external API. The arguments are a transaction object ({“from”: , “to”: , “gas”: , “maxPriorityFeePerGas”: , “MaxFeePerGas”: , “value”: , “data”: , “nonce”: })) and an optional method signature that enables Clef to decode the calldata and show the user the methods, arguments and values being sent.

Example call (terminal):

Copy

curl --data '{"id": 2, "jsonrpc": "2.0", "method": "account_signTransaction", "params": [{"from": "0x1923f626bb8dc025849e00f99c25fe2b2f7fb0db", "gas": "0x55555","gasPrice": "0x1234", "input": "0xabcd", "nonce": "0x0", "to": "0x07a565b7ed7d7a678680a4c162885bedbb695fe0", "value": "0x1234"}]}' -X POST -H "Content-Type: application/json" localhost:8550

Methods without replacements

Thjere are a few methods that were available in the personal namepsace that have been deprecated without replacements. These are:

personal_unlockAccount

There is no need for a direct replacement for personal_unlockAccount. Using Clef to manually approve actions or to attest custom rulesets is a much more secure way to interact with accounts without needing to indiscriminately unlock accounts.

personal_lockAccount

There is no need for a direct replacement for personal_lockAccount because account locking/unlocking is replaced by Clef’s approve/deny logic. This is a more secure way to interact with accounts.

personal.unpair

Unpair deletes a pairing between some specific types of smartcard wallet and Etn-sc. There is not yet an equivalent method in Clef.

personal_initializeWallet

InitializeWallet is for initializing some specific types of smartcard wallet at a provided URL. There is not yet a corresponding method in Clef.

Deprecated method documentation

The personal API managed private keys in the key store. It is now deprecated in favour of using Clef for interacting with accounts. The following documentation should be treated as archive information and users should migrate to using Clef for account interactions.

personal_deriveAccount

Requests a HD wallet to derive a new account, optionally pinning it for later reuse.

CLIENT METHOD INVOCATION
Console personal.deriveAccount(url, path, pin)
RPC {“method”: “personal_deriveAccount”, “params”: [string, string, bool]}

personal_importRawKey

Imports the given unencrypted private key (hex string) into the key store, encrypting it with the passphrase.

Returns the address of the new account.

CLIENT METHOD INVOCATION
Console personal.importRawKey(keydata, passphrase)
RPC {“method”: “personal_importRawKey”, “params”: [string, string]}

personal_initializeWallets

Initializes a new wallet at the provided URL by generating and returning a new private key.

CLIENT METHOD INVOCATION
Console personal.initializeWallet(url)
RPC {“method”: “personal_initializeWallet”, “params”: [string]}

personal_listAccounts

Returns all the Ethereum account addresses of all keys in the key store.

CLIENT METHOD INVOCATION
Console personal.listAccounts
RPC {“method”: “personal_listAccounts”, “params”: }

Example

Copy

> personal.listAccounts
["0x5e97870f263700f46aa00d967821199b9bc5a120", "0x3d80b31a78c30fc628f20b2c89d7ddbf6e53cedc"]

personal_listWallets

Returns a list of wallets this node manages.

CLIENT METHOD INVOCATION
Console personal.listWallets
RPC {“method”: “personal_listWallets”, “params”: }

Example

Copy

> personal.listWallets
[{
  accounts: [{
    address: "0x51594065a986c58d4698c23e3d932b68a22c4d21",
    url: "keystore:///var/folders/cp/k3x0xm3959qf9l0pcbbdxdt80000gn/T/go-ethereum-keystore65174700/UTC--2022-06-28T10-31-09.477982000Z--51594065a986c58d4698c23e3d932b68a22c4d21"
  }],
  status: "Unlocked",
  url: "keystore:///var/folders/cp/k3x0xm3959qf9l0pcbbdxdt80000gn/T/go-ethereum-keystore65174700/UTC--2022-06-28T10-31-09.477982000Z--51594065a986c58d4698c23e3d932b68a22c4d21"
}]

personal_lockAccount

Removes the private key with given address from memory. The account can no longer be used to send transactions.

CLIENT METHOD INVOCATION
Console personal.lockAccount(address)
RPC {“method”: “personal_lockAccount”, “params”: [string]}

personal_newAccount

Generates a new private key and stores it in the key store directory. The key file is encrypted with the given passphrase. Returns the address of the new account. At the etn-sc console, newAccount will prompt for a passphrase when it is not supplied as the argument.

CLIENT METHOD INVOCATION
Console personal.newAccount()
RPC {“method”: “personal_newAccount”, “params”: [string]}

Example

Copy

> personal.newAccount()
Passphrase:
Repeat passphrase:
"0x5e97870f263700f46aa00d967821199b9bc5a120"

The passphrase can also be supplied as a string.

Copy

> personal.newAccount("h4ck3r")
"0x3d80b31a78c30fc628f20b2c89d7ddbf6e53cedc"

personal_openWallet

Initiates a hardware wallet opening procedure by establishing a USB connection and then attempting to authenticate via the provided passphrase. Note, the method may return an extra challenge requiring a second open (e.g. the Trezor PIN matrix challenge).

CLIENT METHOD INVOCATION
Console personal.openWallet(url, passphrase)
RPC {“method”: “personal_openWallet”, “params”: [string, string]}

personal_unlockAccount

Decrypts the key with the given address from the key store.

Both passphrase and unlock duration are optional when using the JavaScript console. If the passphrase is not supplied as an argument, the console will prompt for the passphrase interactively. The unencrypted key will be held in memory until the unlock duration expires. If the unlock duration defaults to 300 seconds. An explicit duration of zero seconds unlocks the key until etn-sc exits.

The account can be used with eth_sign and eth_sendTransaction while it is unlocked.

CLIENT METHOD INVOCATION
Console personal.unlockAccount(address, passphrase, duration)
RPC {“method”: “personal_unlockAccount”, “params”: [string, string, number]}

Examples

Copy

> personal.unlockAccount("0x5e97870f263700f46aa00d967821199b9bc5a120")
Unlock account 0x5e97870f263700f46aa00d967821199b9bc5a120
Passphrase:
true

Supplying the passphrase and unlock duration as arguments:

Copy

> personal.unlockAccount("0x5e97870f263700f46aa00d967821199b9bc5a120", "foo", 30)
true

To type in the passphrase and still override the default unlock duration, pass null as the passphrase.

Copy

> personal.unlockAccount("0x5e97870f263700f46aa00d967821199b9bc5a120", null, 30)
Unlock account 0x5e97870f263700f46aa00d967821199b9bc5a120
Passphrase:
true

personal_unpair

Deletes a pairing between wallet and Etn-sc.

CLIENT METHOD INVOCATION
Console personal.unpair(url, pin)
RPC {“method”: “personal_unpair”, “params”: [string, string]}

personal_sendTransaction

Validate the given passphrase and submit transaction.

The transaction is the same argument as for eth_sendTransaction (i.e. transaction object) and contains the from address. If the passphrase can be used to decrypt the private key belogging to tx.from the transaction is verified, signed and send onto the network. The account is not unlocked globally in the node and cannot be used in other RPC calls.

CLIENT METHOD INVOCATION
Console personal.sendTransaction(tx, passphrase)
RPC {“method”: “personal_sendTransaction”, “params”: [tx, string]}

Examples

Copy

> var tx = {from: "0x391694e7e0b0cce554cb130d723a9d27458f9298", to: "0xafa3f8684e54059998bc3a7b0d2b0da075154d66", value: web3.toWei(1.23, "ether")}
undefined
> personal.sendTransaction(tx, "passphrase")
0x8474441674cdd47b35b875fd1a530b800b51a5264b9975fb21129eeb8c18582f

personal_sign

The sign method calculates an Ethereum specific signature with: sign(keccak256(“\x19Ethereum Signed Message:\n” + len(message) + message)).

By adding a prefix to the message makes the calculated signature recognisable as an Ethereum specific signature. This prevents misuse where a malicious DApp can sign arbitrary data (e.g. transaction) and use the signature to impersonate the victim.

See ecRecover to verify the signature.

CLIENT METHOD INVOCATION
Console personal.sign(message, account, [password])
RPC {“method”: “personal_sign”, “params”: [message, account, password]}

Examples

Copy

> personal.sign("0xdeadbeaf", "0x9b2055d370f73ec7d8a03e965129118dc8f5bf83", "")
"0xa3f20717a250c2b0b729b7e5becbff67fdaef7e0699da4de7ca5895b02a170a12d887fd3b17bfdce3481f10bea41f45ba9f709d39ce8325427b57afcfc994cee1b"

personal_signTransaction

SignTransaction will create a transaction from the given arguments and tries to sign it with the key associated with tx.from. If the given passwd isn’t able to decrypt the key it fails. The transaction is returned in RLP-form, not broadcast to other nodes. The first argument is a transaction object and the second argument is the password, similar to personal_sendTransaction.

CLIENT METHOD INVOCATION
Console personal.signTransaction(tx, passphrase)
RPC {“method”: “personal_signTransaction”, “params”: [tx, string]}

personal_ecRecover

ecRecover returns the address associated with the private key that was used to calculate the signature in personal_sign.

CLIENT METHOD INVOCATION
Console personal.ecRecover(message, signature)
RPC {“method”: “personal_ecRecover”, “params”: [message, signature]}

Examples

Copy

> personal.sign("0xdeadbeaf", "0x9b2055d370f73ec7d8a03e965129118dc8f5bf83", "")
"0xa3f20717a250c2b0b729b7e5becbff67fdaef7e0699da4de7ca5895b02a170a12d887fd3b17bfdce3481f10bea41f45ba9f709d39ce8325427b57afcfc994cee1b"
> personal.ecRecover("0xdeadbeaf", "0xa3f20717a250c2b0b729b7e5becbff67fdaef7e0699da4de7ca5895b02a170a12d887fd3b17bfdce3481f10bea41f45ba9f709d39ce8325427b57afcfc994cee1b")
"0x9b2055d370f73ec7d8a03e965129118dc8f5bf83"