Key Management
$ umeed keys --help
Keyring management commands. These keys may be in any format supported by the
Tendermint crypto library and can be used by light-clients, full nodes, or any other application
that needs to sign with a private key.
The keyring supports the following backends:
os Uses the operating system's default credentials store.
file Uses encrypted file-based keystore within the app's configuration directory.
This keyring will request a password each time it is accessed, which may occur
multiple times in a single command resulting in repeated password prompts.
kwallet Uses KDE Wallet Manager as a credentials management application.
pass Uses the pass command line utility to store and retrieve keys.
test Stores keys insecurely to disk. It does not prompt for a password to be unlocked
and it should be use only for testing purposes.
kwallet and pass backends depend on external tools. Refer to their respective documentation for more
information:
KWallet https://github.com/KDE/kwallet
pass https://www.passwordstore.org/
The pass backend requires GnuPG: https://gnupg.org/
Usage:
umeed keys [command]
Available Commands:
add Add an encrypted private key (either newly generated or recovered), encrypt it, and save to <name> file
delete Delete the given keys
export Export private keys
import Import private keys into the local keybase
import-hex Import private keys into the local keybase
list List all keys
list-key-types List all key types
migrate Migrate keys from amino to proto serialization format
mnemonic Compute the bip39 mnemonic for some input entropy
parse Parse address from hex to bech32 and vice versa
rename Rename an existing key
show Retrieve key information by name or address
Flags:
-h, --help help for keys
--home string The application home directory (default "$HOME.umee")
--keyring-backend string Select keyring's backend (os|file|kwallet|pass|test|memory) (default "os")
--keyring-dir string The client Keyring directory; if omitted, the default 'home' directory will be used
--output string Output format (text|json) (default "text")
Global Flags:
--log_format string The logging format (json|plain) (default "plain")
--log_level string The logging level (trace|debug|info|warn|error|fatal|panic) (default "info")
--log_no_color Disable colored logs
--trace print out full stack trace on errors
Use "umeed keys [command] --help" for more information about a command.
New Key
// by default --keyring-backend will `os`
$ umeed keys add new-key --keyring-backend test
- address: umee1ffzd88cg4qj0jndjaqnv3py2u3vp9tv0jnupty
name: new-key
pubkey: '{"@type":"/cosmos.crypto.secp256k1.PubKey","key":"ApXv3XqNrTT4uT3gsOgvVF1SOhfQjw/cEuonn7Az6xNb"}'
type: local
**Important** write this mnemonic phrase in a safe place.
It is the only way to recover your account if you ever forget your password.
file marble chef chase chaos page disease spirit phrase update congress spoon renew lock unusual ancient knife life siege mystery cloud dynamic tissue heart
Keys List
$ umeed keys list --keyring-backend test
- address: umee1ffzd88cg4qj0jndjaqnv3py2u3vp9tv0jnupty
name: new-key
pubkey: '{"@type":"/cosmos.crypto.secp256k1.PubKey","key":"ApXv3XqNrTT4uT3gsOgvVF1SOhfQjw/cEuonn7Az6xNb"}'
type: local
Show Key Info
$ umeed keys show new-key --keyring-backend test
- address: umee1ffzd88cg4qj0jndjaqnv3py2u3vp9tv0jnupty
name: new-key
pubkey: '{"@type":"/cosmos.crypto.secp256k1.PubKey","key":"ApXv3XqNrTT4uT3gsOgvVF1SOhfQjw/cEuonn7Az6xNb"}'
type: local