hippius 0.2.46__py3-none-any.whl → 0.2.48__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {hippius-0.2.46.dist-info → hippius-0.2.48.dist-info}/METADATA +1 -1
- {hippius-0.2.46.dist-info → hippius-0.2.48.dist-info}/RECORD +7 -7
- hippius_sdk/__init__.py +1 -1
- hippius_sdk/ipfs.py +3 -1
- hippius_sdk/key_storage.py +9 -1
- {hippius-0.2.46.dist-info → hippius-0.2.48.dist-info}/WHEEL +0 -0
- {hippius-0.2.46.dist-info → hippius-0.2.48.dist-info}/entry_points.txt +0 -0
@@ -1,4 +1,4 @@
|
|
1
|
-
hippius_sdk/__init__.py,sha256=
|
1
|
+
hippius_sdk/__init__.py,sha256=AiRoiySW_2WO5IKG__Z_MYFakK1gmdfLzgocYj3Va0A,1474
|
2
2
|
hippius_sdk/cli.py,sha256=aqKOYSBSWt7UhcpFt7wf9yIPJ3bznpsJ6ehOnuZ4usI,18235
|
3
3
|
hippius_sdk/cli_assets.py,sha256=rjH3Z5A1CQr2d5CIAAAb0WMCjoZZlMWcdo0f93KqluE,635
|
4
4
|
hippius_sdk/cli_handlers.py,sha256=HkZldE8ZDS6WHu8aSoeS_rYZ4kp3F-Kdzu-weY1c0vU,128258
|
@@ -13,12 +13,12 @@ hippius_sdk/db/migrations/20241202000001_switch_to_subaccount_encryption.sql,sha
|
|
13
13
|
hippius_sdk/db/setup_database.sh,sha256=STp03qxkp2RmIVr6YZIcvQQm-_LLUOb6Jobh-52HWmg,3115
|
14
14
|
hippius_sdk/db_utils.py,sha256=-x0rbN0as7Tn3PJPZBYCgreZe52FLH40ppA1TLxsg90,1851
|
15
15
|
hippius_sdk/errors.py,sha256=LScJJmawVAx7aRzqqQguYSkf9iazSjEQEBNlD_GXZ6Y,1589
|
16
|
-
hippius_sdk/ipfs.py,sha256=
|
16
|
+
hippius_sdk/ipfs.py,sha256=c4tfS5VymZYph9yXuFr40teefyVi7APq9oIpFiIXlDI,104651
|
17
17
|
hippius_sdk/ipfs_core.py,sha256=xsY0Ox6anmrkbrxkRr2RXzEukB-EEaW_oMvO0Va3vjQ,13148
|
18
|
-
hippius_sdk/key_storage.py,sha256=
|
18
|
+
hippius_sdk/key_storage.py,sha256=HWV9mM5Zkq_xxn7A72L7gvlYBtcmMwOyeFdtl8ExlmE,8315
|
19
19
|
hippius_sdk/substrate.py,sha256=4a7UIE4UqGcDW7luKTBgSDqfb2OIZusB39G1UiRs_YU,50158
|
20
20
|
hippius_sdk/utils.py,sha256=rJ611yvwKSyiBpYU3w-SuyQxoghMGU-ePuslrPv5H5g,7388
|
21
|
-
hippius-0.2.
|
22
|
-
hippius-0.2.
|
23
|
-
hippius-0.2.
|
24
|
-
hippius-0.2.
|
21
|
+
hippius-0.2.48.dist-info/METADATA,sha256=1PAHyZ4VTndg9W1qoG24yLc_TDWUOsCosWwUHsVebmE,30088
|
22
|
+
hippius-0.2.48.dist-info/WHEEL,sha256=Zb28QaM1gQi8f4VCBhsUklF61CTlNYfs9YAZn-TOGFk,88
|
23
|
+
hippius-0.2.48.dist-info/entry_points.txt,sha256=bFAZjW3vndretf9-8s587jA2ebMVI7puhn_lVs8jPc8,149
|
24
|
+
hippius-0.2.48.dist-info/RECORD,,
|
hippius_sdk/__init__.py
CHANGED
@@ -26,7 +26,7 @@ from hippius_sdk.config import (
|
|
26
26
|
from hippius_sdk.ipfs import IPFSClient, S3PublishResult, S3DownloadResult
|
27
27
|
from hippius_sdk.utils import format_cid, format_size, hex_to_ipfs_cid
|
28
28
|
|
29
|
-
__version__ = "0.2.
|
29
|
+
__version__ = "0.2.48"
|
30
30
|
__all__ = [
|
31
31
|
"HippiusClient",
|
32
32
|
"IPFSClient",
|
hippius_sdk/ipfs.py
CHANGED
@@ -2064,7 +2064,7 @@ class IPFSClient:
|
|
2064
2064
|
|
2065
2065
|
if existing_key_b64:
|
2066
2066
|
# Use existing key
|
2067
|
-
logger.
|
2067
|
+
logger.info(
|
2068
2068
|
"Using existing encryption key for account+bucket combination"
|
2069
2069
|
)
|
2070
2070
|
encryption_key_bytes = base64.b64decode(existing_key_b64)
|
@@ -2084,7 +2084,9 @@ class IPFSClient:
|
|
2084
2084
|
import nacl.secret
|
2085
2085
|
|
2086
2086
|
box = nacl.secret.SecretBox(encryption_key_bytes)
|
2087
|
+
logger.info("encrypting...")
|
2087
2088
|
content_bytes = box.encrypt(content_bytes)
|
2089
|
+
logger.info("finished encryption!")
|
2088
2090
|
else:
|
2089
2091
|
# Fallback to the original encryption system if key_storage is not available
|
2090
2092
|
if not self.encryption_available:
|
hippius_sdk/key_storage.py
CHANGED
@@ -19,6 +19,10 @@ try:
|
|
19
19
|
except ImportError:
|
20
20
|
ASYNCPG_AVAILABLE = False
|
21
21
|
|
22
|
+
import logging
|
23
|
+
|
24
|
+
logger = logging.getLogger()
|
25
|
+
|
22
26
|
|
23
27
|
class KeyStorageError(Exception):
|
24
28
|
"""Base exception for key storage operations."""
|
@@ -202,7 +206,9 @@ def is_key_storage_enabled() -> bool:
|
|
202
206
|
"""
|
203
207
|
# Check if explicitly disabled
|
204
208
|
config_value = get_config_value("key_storage", "enabled", None)
|
205
|
-
|
209
|
+
|
210
|
+
logger.info(f"encryption config.key_storage {config_value=}")
|
211
|
+
if not config_value:
|
206
212
|
return False
|
207
213
|
|
208
214
|
# If explicitly enabled, return True
|
@@ -211,6 +217,8 @@ def is_key_storage_enabled() -> bool:
|
|
211
217
|
|
212
218
|
# If not set in config, auto-detect based on asyncpg availability
|
213
219
|
# This allows users who install [key_storage] extra to use it without manual config
|
220
|
+
logger.info(f"db orm available {ASYNCPG_AVAILABLE=}")
|
221
|
+
|
214
222
|
return ASYNCPG_AVAILABLE
|
215
223
|
|
216
224
|
|
File without changes
|
File without changes
|