Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ledger derivation path not accepting initial m/ as valid #299

Closed
JagoFigueroa opened this issue Nov 7, 2023 · 0 comments · Fixed by #301
Closed

Ledger derivation path not accepting initial m/ as valid #299

JagoFigueroa opened this issue Nov 7, 2023 · 0 comments · Fixed by #301
Assignees
Labels
bug Something isn't working

Comments

@JagoFigueroa
Copy link

Describe the bug
While testing the feature for custom derivation paths on ledger we noticed that the initial m/ of the path is not accepted as a valid argument.

To Reproduce
Access a safe from the cli with the ledger connected and try the following commands:

blockchain > 0x6D04edC44F7C88faa670683036edC2F6FC10b86e > load_ledger_cli_owners --derivation-path m/44'/60'/0'/0/0
HwDevice exception: The provided derivation path is not valid
blockchain > 0x6D04edC44F7C88faa670683036edC2F6FC10b86e > load_ledger_cli_owners --derivation-path m'/44'/60'/0'/0/0
HwDevice exception: The provided derivation path is not valid
blockchain > 0x6D04edC44F7C88faa670683036edC2F6FC10b86e > load_ledger_cli_owners --derivation-path 44'/60'/0'/0/0
Loaded account 0x454a478d2482C1d251F149424053d4485aDD3dC5 with balance=0.044340226882541042 ether.
Ledger account cannot be defined as sender

Current behavior
load_ledger_cli_owners --derivation-path m/44'/60'/0'/0/0 not valid

Expected behavior
load_ledger_cli_owners --derivation-path m/44'/60'/0'/0/0 should be valid

@JagoFigueroa JagoFigueroa added the bug Something isn't working label Nov 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants