-
Notifications
You must be signed in to change notification settings - Fork 974
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request]: Keys Management #415
Comments
The cosmos-sdk uses this for key storage: https://github.com/cosmos/cosmos-sdk/blob/master/crypto/keyring/doc.go |
Yes @liamsi. I suggest if we continue w/ using lens, we should be consistent and use SDK's keyring. |
I think independent of lens we should be consistent and use SDK's keyring. |
We already do with #420 |
While reviewing #420 I went deeper into SDK's keyring. My observations are:
|
I believe that all the Celestia wallets(like Kepler) should be super/light clients by default, so celestia-node(which implements those) has to contain first-class wallet support. |
Another requirement: when constructing keyring, allow users to pass custom Ref: #420 |
@renaynay, this shouldn't be a requirement, but optional feature that tightens security for users. As otherwise, before sending any the user would need to write the password. But it can be undesirable:
Personally, I would like to have this feature, but I would not call this a requirement. |
"Allow users to specify a custom key name we should also allow custom path to the keyring, not necessary under store/keys, so that users can access keyrings elsewhere" |
Any estimates on delivery of this feature? |
Allow users to indicate whether they want the mnemonic for generated key to be logged. |
@tzdybal we already have a basic key utility that is taken from cosmos-sdk. It can be accessed via |
Grooming 16/11/2022: This issue is touching org wide decision making and we need help to understand how to resolve this org wise |
is this a blocker for incentivized testnet or mainnet? |
Not a blocker. We can live with what CosmosSDK provides for now and for mainnet |
ok, removing my assignment then |
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
Summary
Celestia Node can CRUD keys
Impact on users
It will be beneficial to produce a feature that allows Celestia Node to do CRUD on keys as this can allow signing Txs.
Currently, we have a merged ADR #369 that is proposing a state interaction for Celestia Node and a respective PR #411
Implementation ideas
As we are already using RPC approach lately, we can use it for this feature
Urgency
Medium
The text was updated successfully, but these errors were encountered: