Skip to content
Snippets Groups Projects
  1. Feb 09, 2025
    • Nicolas80's avatar
      * Bumped version to 0.4.0 · e9348bac
      Nicolas80 authored
      * Added a CHANGELOG.md file
      * Adapted config.md example of vault usage
      * Adapted some of the command descriptions to be more consistent
      e9348bac
  2. Feb 08, 2025
    • Nicolas80's avatar
      * Added support to show g1v1 base58 public key from (ed25519) ss58 address,... · 66c7c2a8
      Nicolas80 authored
      * Added support to show g1v1 base58 public key from (ed25519) ss58 address, AccountId, ed25519::Public with tests for those
      * Renamed SecretFormat.Cesium to SecretFormat.G1v1
         * Adapted `clap` display help to reflect the change
         * Still supporting using "cesium" as "-S" secret format argument and mapping it to SecretFormat.G1v1
      * Adapted display of vault
         * Changed column "Format" into "Crypto", showing either "ed25519" or "sr25519" instead of "cesium" or "substrate"
         * Adapted 1st row header to "SS58 Address/G1v1 public key"
         * For "ed25519" account, showing a 2nd row just below containing "└ G1v1: <base58 public key value>"
         * Adapted test cases and added a G1v1 account example
      * Adapted (String) Display of vault_account to include "g1v1_pub_key" value when crypto_scheme is Ed25519
      66c7c2a8
  3. Feb 03, 2025
  4. Jan 26, 2025
    • Nicolas80's avatar
      * Added sc_cli::arg_enums::CryptoScheme partial copy in keys.rs · 3d7b15c0
      Nicolas80 authored
      * Started to investigate being able to make subkey command and trying to use sp_core::crypto::CryptoType instead of custom KeyPair
      * Big refactoring to have all in one vault_account db table; using recursion through `parent` property
      * Added AccountTreeNode object and related methods to be able to more easily handle whole tree of accounts
      * Removed now unused vault_derivation
      * Replaced remaining usages of `rpassword` and removed the dependency
      * Added `indoc` dependency to support cleaner display of multi-line strings in tests
      3d7b15c0
  5. Jan 04, 2025
  6. Jan 03, 2025
  7. Jan 01, 2025
  8. Dec 29, 2024
  9. Dec 28, 2024
    • Nicolas80's avatar
      Adding db persistence for all SecretFormat of vault keys as well as supporting derivations · badf52ce
      Nicolas80 authored
      * Added "/.idea" exclusion in .gitignore (for when using JetBrains IDEs)
      * Added dialoguer dependency for easier user input handling (see in inputs.rs)
      * Added sea-orm dependency to allow having DB entity mappings and use a local sqlite file database
      * Added rstest test dependency for parameterized tests support
      * Added derivation tests for each SecretFormat (including cesium v1 key derivation, using sp_core::ed25519::Pair)
      * Made a lot of changes to add vault_account and vault_derivation db tables to persist vault keys & derivations
      * Added support for KeyPair::Ed25519 linking to sp_core::ed25519::Pair which can be created from secret seed retrieved from nacl::sign::Keypair (which is created from cesium id + secret)
      ** This was necessary to allow deriving keys from "cesium v1" keys (to be reviewed - it might be a bad idea to permit that from a security point of view)
      * Only kept original (substrate) keyfiles support for migration (use "vault list-files" and "vault migrate")
      * Added possibility to give either "-a" Address or "-v" Vault Name as general option
      * Added extra commands in Vault
      ** list-files: (deprecated)List available key files (needs to be migrated with command "vault migrate" in order to use them)
      ** migrate: (deprecated)Migrate old key files into db (will have to provide password for each key)
      ** 'list' now has sub-commands 'all' or 'root' to show all keys or only root keys (without derivation path)
      ** use: "Use specific vault key (changes the config address)", which will have the same behaviour as `gcli <-a <Address>|-v <VaultName>> config save` (left a FIXME in there to review)
      ** derivation: Add a derivation to an existing (root) vault key
      ** rename: Give a meaningful vault name to a vault key or derivation
      ** remove: Remove a vault key (and potential derivations if it's a root key)
      * Had to bubble up "await" and "async" in a lot of places
      * ...
      badf52ce
  10. Feb 16, 2024
    • Hugo Trentesaux's avatar
      add vault (!22) · 4166a7b4
      Hugo Trentesaux authored
      * move into function
      
      * remove unnecessary complexity
      
      * wip add phrase generation
      
      * prepare 0.2.7 release
      
      * remove dep
      
      * add predefined keys and update doc
      
      * wip add save from cmd line
      
      * improve error management
      
      * allow to store password-protected secret
      
      * wip use rage for password-encrypted keys
      
      * wip poc for keystore
      0.2.7
      4166a7b4
  11. Feb 12, 2024
  12. Nov 24, 2023
  13. Nov 16, 2023
  14. Jun 08, 2023
  15. Jun 02, 2023
    • Hugo Trentesaux's avatar
      refac · 84043f18
      Hugo Trentesaux authored
      WIP add tracking progress
      
      WIP refac progress tracking
      
      WIP generic runtime
      
      wip needing runtime name
      
      wip refac smith cert
      84043f18
  16. Mar 17, 2023
  17. Mar 16, 2023
Loading