-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refactor(client/keys): hide inputting when keys add -i
ask for bip39 passphrase
#18743
Conversation
WalkthroughThe changes involve enhancing security and robustness in the handling of sensitive input, specifically for key management in the client application. The passphrase input process now hides the input and checks for minimum length, improving security. Additionally, the update includes error handling for non-existent or unauthorized module accounts in the Changes
Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on X ? TipsChat with CodeRabbit Bot (
|
keys add -i
ask for bip39 passphrase
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This maybe break some old scripts that using length < 8 passphrase
Yeah, so I don't think we can merge that. People having short passwords would get locked out of re-adding their keys on a new machine.
Okay, let's just remove the length limitation~ |
@julienrbrt Done, I have reverted the limit for inputting length |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ACK. I hope people will write it down properly and don't make the same typo twice :D
Description
I think we should hide the inputting for bip39 passphrase when running
<simd> keys add -i
, and there is a repeat confirmation flow already hereNote:
This maybe break some old scripts that using length < 8 passphrase
Screenshots
Case using empty passphrase:
Case using custom passphrase hat length > 8:
Case using custom passphrase that length < 8: