Skip to content

Commit ac6013d

Browse files
Cleanup clippy and fmt
1 parent d299684 commit ac6013d

5 files changed

Lines changed: 35 additions & 59 deletions

File tree

cmd/soroban-cli/src/commands/keys/add.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ impl Cmd {
8181

8282
let seed_phrase: SeedPhrase = secret_key.parse()?;
8383

84-
let secret = secure_store::save_secret(print, &self.name, seed_phrase)?;
84+
let secret = secure_store::save_secret(print, &self.name, &seed_phrase)?;
8585
Ok(secret.parse()?)
8686
} else {
8787
let prompt = "Type a secret key or 12/24 word seed phrase:";

cmd/soroban-cli/src/commands/keys/generate.rs

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ impl Cmd {
127127
fn secret(&self, print: &Print) -> Result<Secret, Error> {
128128
let seed_phrase = self.seed_phrase()?;
129129
if self.secure_store {
130-
let secret = secure_store::save_secret(print, &self.name, seed_phrase)?;
130+
let secret = secure_store::save_secret(print, &self.name, &seed_phrase)?;
131131
Ok(secret.parse()?)
132132
} else if self.as_secret {
133133
let secret: Secret = seed_phrase.into();
@@ -215,7 +215,6 @@ mod tests {
215215
assert!(matches!(identity, Key::Secret(Secret::SecureStore { .. })));
216216
}
217217

218-
219218
#[tokio::test]
220219
async fn test_storing_in_secure_store_returns_error_when_additional_libs_not_enabled() {
221220
let (test_locator, mut cmd) = set_up_test();

cmd/soroban-cli/src/signer/keyring.rs

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1+
use crate::print::Print;
12
use ed25519_dalek::Signer;
23
use sep5::seed_phrase::SeedPhrase;
34
use zeroize::Zeroize;
4-
use crate::print::Print;
55

66
use keyring::Entry;
77

@@ -36,10 +36,12 @@ impl StellarEntry {
3636
if let Ok(key) = self.get_public_key(None) {
3737
print.warnln(format!(
3838
"A key for {0} already exists in your operating system's secure store: {1}",
39-
self.name, key));
39+
self.name, key
40+
));
4041
} else {
4142
print.infoln(format!(
42-
"Saving a new key to your operating system's secure store: {0}", self.name
43+
"Saving a new key to your operating system's secure store: {0}",
44+
self.name
4345
));
4446
self.set_seed_phrase(seed_phrase)?;
4547
};
@@ -62,11 +64,8 @@ impl StellarEntry {
6264
print.infoln("This key was already removed from the secure store.");
6365
Ok(())
6466
}
65-
_ => {
66-
Err(Error::Keyring(e.into()))
67-
}
68-
}
69-
67+
_ => Err(Error::Keyring(e)),
68+
},
7069
}
7170
}
7271

cmd/soroban-cli/src/signer/mod.rs

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,9 @@ pub struct SecureStoreEntry {
379379

380380
impl SecureStoreEntry {
381381
pub fn sign_tx_hash(&self, tx_hash: [u8; 32]) -> Result<DecoratedSignature, Error> {
382-
let hint = SignatureHint(secure_store::get_public_key(&self.name, self.hd_path)?.0[28..].try_into()?);
382+
let hint = SignatureHint(
383+
secure_store::get_public_key(&self.name, self.hd_path)?.0[28..].try_into()?,
384+
);
383385

384386
let signed_tx_hash = secure_store::sign_tx_data(&self.name, self.hd_path, &tx_hash)?;
385387

cmd/soroban-cli/src/signer/secure_store.rs

Lines changed: 23 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -28,92 +28,68 @@ pub enum Error {
2828

2929
#[cfg(feature = "additional-libs")]
3030
mod secure_store_impl {
31-
use super::*;
31+
use super::{Error, Print, PublicKey, SeedPhrase, StellarEntry, ENTRY_PREFIX};
3232
const ENTRY_SERVICE: &str = "org.stellar.cli";
3333

34-
pub fn get_public_key(
35-
entry_name: &str,
36-
index: Option<usize>,
37-
) -> Result<PublicKey, Error> {
34+
pub fn get_public_key(entry_name: &str, index: Option<usize>) -> Result<PublicKey, Error> {
3835
let entry = StellarEntry::new(entry_name)?;
3936
Ok(entry.get_public_key(index)?)
4037
}
41-
42-
pub fn delete_secret(
43-
print: &Print,
44-
entry_name: &str,
45-
) -> Result<(), Error> {
38+
39+
pub fn delete_secret(print: &Print, entry_name: &str) -> Result<(), Error> {
4640
let entry = StellarEntry::new(entry_name)?;
47-
entry.delete_seed_phrase(print)?;
48-
49-
Ok(())
41+
Ok(entry.delete_seed_phrase(print)?)
5042
}
51-
43+
5244
pub fn save_secret(
5345
print: &Print,
5446
entry_name: &str,
55-
seed_phrase: SeedPhrase,
47+
seed_phrase: &SeedPhrase,
5648
) -> Result<String, Error> {
5749
// secure_store:org.stellar.cli:<key name>
58-
let entry_name_with_prefix = format!(
59-
"{}{}-{}",
60-
ENTRY_PREFIX,
61-
ENTRY_SERVICE,
62-
entry_name
63-
);
64-
65-
//checking that the entry name is valid before writing to the secure store
66-
// let secret = entry_name_with_prefix.parse()?;
67-
// without this, we end up saving to the keychain without verifying that it is a valid secret name. FIXME
50+
let entry_name_with_prefix = format!("{ENTRY_PREFIX}{ENTRY_SERVICE}-{entry_name}");
6851

6952
let entry = StellarEntry::new(&entry_name_with_prefix)?;
70-
entry.write(seed_phrase, print)?;
53+
entry.write(seed_phrase.clone(), print)?;
7154

72-
return Ok(entry_name_with_prefix)
55+
Ok(entry_name_with_prefix)
7356
}
74-
57+
7558
pub fn sign_tx_data(
7659
entry_name: &str,
7760
hd_path: Option<usize>,
7861
data: &[u8],
7962
) -> Result<Vec<u8>, Error> {
8063
let entry = StellarEntry::new(entry_name)?;
81-
return Ok(entry.sign_data(data, hd_path)?)
64+
Ok(entry.sign_data(data, hd_path)?)
8265
}
8366
}
8467

8568
#[cfg(not(feature = "additional-libs"))]
8669
mod secure_store_impl {
87-
use super::*;
70+
use super::{Error, Print, PublicKey, SeedPhrase};
8871

89-
pub fn get_public_key(
90-
_entry_name: &str,
91-
_index: Option<usize>,
92-
) -> Result<PublicKey, Error> {
93-
return Err(Error::FeatureNotEnabled);
72+
pub fn get_public_key(_entry_name: &str, _index: Option<usize>) -> Result<PublicKey, Error> {
73+
Err(Error::FeatureNotEnabled)
9474
}
95-
96-
pub fn delete_secret(
97-
_print: &Print,
98-
_entry_name: &str,
99-
) -> Result<(), Error> {
100-
return Err(Error::FeatureNotEnabled);
75+
76+
pub fn delete_secret(_print: &Print, _entry_name: &str) -> Result<(), Error> {
77+
Err(Error::FeatureNotEnabled)
10178
}
102-
79+
10380
pub fn save_secret(
10481
_print: &Print,
10582
_entry_name: &str,
106-
_seed_phrase: SeedPhrase,
83+
_seed_phrase: &SeedPhrase,
10784
) -> Result<String, Error> {
108-
return Err(Error::FeatureNotEnabled);
85+
Err(Error::FeatureNotEnabled)
10986
}
110-
87+
11188
pub fn sign_tx_data(
11289
_entry_name: &str,
11390
_hd_path: Option<usize>,
11491
_data: &[u8],
11592
) -> Result<Vec<u8>, Error> {
116-
return Err(Error::FeatureNotEnabled);
93+
Err(Error::FeatureNotEnabled)
11794
}
11895
}
119-

0 commit comments

Comments
 (0)