Add OS keychain for persistent nsec sessions (roadmap #1)

- Rust: store_nsec / load_nsec / delete_nsec Tauri commands via keyring crate
  (macOS Keychain, Windows Credential Manager, Linux Secret Service)
- On nsec login: key is stored in OS keychain keyed by hex pubkey
- On startup: restoreSession() auto-loads nsec from keychain and re-establishes
  the NDK signer — no manual re-login required after restart
- On logout: keychain entry is deleted
- Graceful degradation: if keychain is unavailable (e.g. Linux without a Secret
  Service daemon), the app starts logged-out — same UX as before, no crash

Also updates ROADMAP.md with 4 new items from the Windows playtest (multi-account
switcher, NWC wizard, system tray, zap history view) and reorders the list.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
Jure
2026-03-10 17:21:44 +01:00
parent ee26edfe65
commit 4ef824a26a
6 changed files with 123 additions and 22 deletions

View File

@@ -2,6 +2,7 @@ import { create } from "zustand";
import { NDKPrivateKeySigner } from "@nostr-dev-kit/ndk";
import { getNDK, publishContactList } from "../lib/nostr";
import { nip19 } from "@nostr-dev-kit/ndk";
import { invoke } from "@tauri-apps/api/core";
interface UserState {
pubkey: string | null;
@@ -14,6 +15,7 @@ interface UserState {
loginWithNsec: (nsec: string) => Promise<void>;
loginWithPubkey: (pubkey: string) => Promise<void>;
logout: () => void;
restoreSession: () => Promise<void>;
fetchOwnProfile: () => Promise<void>;
fetchFollows: () => Promise<void>;
follow: (pubkey: string) => Promise<void>;
@@ -55,10 +57,13 @@ export const useUserStore = create<UserState>((set, get) => ({
set({ pubkey, npub, loggedIn: true, loginError: null });
// Store login (pubkey only, never the nsec)
// Persist pubkey for session restoration
localStorage.setItem("wrystr_pubkey", pubkey);
localStorage.setItem("wrystr_login_type", "nsec");
// Store nsec in OS keychain (best-effort — gracefully ignored if unavailable)
invoke<void>("store_nsec", { pubkey, nsec: nsecInput }).catch(() => {});
// Fetch profile and follows
get().fetchOwnProfile();
get().fetchFollows();
@@ -99,11 +104,39 @@ export const useUserStore = create<UserState>((set, get) => ({
logout: () => {
const ndk = getNDK();
ndk.signer = undefined;
const { pubkey } = get();
if (pubkey) {
invoke<void>("delete_nsec", { pubkey }).catch(() => {});
}
localStorage.removeItem("wrystr_pubkey");
localStorage.removeItem("wrystr_login_type");
set({ pubkey: null, npub: null, profile: null, follows: [], loggedIn: false, loginError: null });
},
restoreSession: async () => {
const savedPubkey = localStorage.getItem("wrystr_pubkey");
const savedLoginType = localStorage.getItem("wrystr_login_type");
if (!savedPubkey) return;
if (savedLoginType === "pubkey") {
await get().loginWithPubkey(savedPubkey);
return;
}
if (savedLoginType === "nsec") {
try {
const nsec = await invoke<string | null>("load_nsec", { pubkey: savedPubkey });
if (nsec) {
await get().loginWithNsec(nsec);
}
// If no keychain entry (first run after feature lands, or keychain unavailable),
// the user will be prompted to log in again — same as before.
} catch {
// Keychain unavailable (e.g. no secret service on this Linux session) — stay logged out.
}
}
},
fetchOwnProfile: async () => {
const { pubkey } = get();
if (!pubkey) return;