-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add support for OS specific keychains #1703
base: main
Are you sure you want to change the base?
Conversation
87a3101
to
432ca74
Compare
8732084
to
a6756f1
Compare
- previously we were creating a new keyring entry for each interaction with the keyring - this change will allow us use a mock keyring entry for testing
072a3af
to
e120595
Compare
required for keyring crate
bd666c6
to
57ba3a4
Compare
8366b5c
to
6a4b0ff
Compare
6a4b0ff
to
f263d8d
Compare
@@ -39,6 +49,10 @@ pub struct Cmd { | |||
#[arg(long, short = 's')] | |||
pub as_secret: bool, | |||
|
|||
/// Save in OS-specific secure store | |||
#[arg(long)] | |||
pub secure_store: bool, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
would it make sense to add an alias for this arg: keychain
for mac, secret-service
for linux and windows-credential-manager
for windows?
@@ -46,7 +46,7 @@ jobs: | |||
- run: rustup target add ${{ matrix.sys.target }} | |||
|
|||
- if: matrix.sys.target == 'aarch64-unknown-linux-gnu' | |||
run: sudo apt-get update && sudo apt-get -y install gcc-aarch64-linux-gnu g++-aarch64-linux-gnu libudev-dev | |||
run: sudo apt-get update && sudo apt-get -y install gcc-aarch64-linux-gnu g++-aarch64-linux-gnu libudev-dev libdbus-1-dev |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The keyring crate requires this pkg as a dependency, so I am including it on several of these linux workflows. I just wanted to point this out as a dependency and see if there is any other way I should handle this.
this change was made so that we can concat the KeyName with secure story prefix and service
Addresses #1481
I updated this branch to point at main instead of feat/add_stellar_ledger so we wouldn't have too many PRs stacked on each other.
This adds support for using secrets stored in OS specific key rings.
cargo run keys generate --secure-store ee-25-a --network local --no-fund
cargo run keys generate --secure-store ee-25-b --network local --fund
cargo run keys fund ee-25-b --network local
cargo run keys address ee-25-a
cargo run keys show ee-25-a
should not display the secure store's secret and return an error:❌ error: Secure Store does not reveal secret key