Skip to content
This repository was archived by the owner on Feb 8, 2026. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions api/plugin.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,8 @@ import (
"github.com/sirupsen/logrus"
v1 "github.com/vultisig/commondata/go/vultisig/vault/v1"
"github.com/vultisig/mobile-tss-lib/tss"
vcommon "github.com/vultisig/verifier/common"
vtypes "github.com/vultisig/verifier/types"
vgcommon "github.com/vultisig/vultisig-go/common"

"github.com/vultisig/plugin/common"
"github.com/vultisig/plugin/internal/sigutil"
Expand Down Expand Up @@ -233,7 +233,7 @@ func (s *Server) verifyPolicySignature(policy vtypes.PluginPolicy) bool {
s.logger.WithError(err).Error("fail to get vault")
return false
}
derivedPublicKey, err := tss.GetDerivedPubKey(vault.PublicKeyEcdsa, vault.HexChainCode, vcommon.Ethereum.GetDerivePath(), false)
derivedPublicKey, err := tss.GetDerivedPubKey(vault.PublicKeyEcdsa, vault.HexChainCode, vgcommon.Ethereum.GetDerivePath(), false)
if err != nil {
s.logger.WithError(err).Error("failed to get derived public key")
return false
Expand All @@ -251,14 +251,14 @@ func (s *Server) getVault(publicKeyECDSA, pluginId string) (*v1.Vault, error) {
if len(s.cfg.EncryptionSecret) == 0 {
return nil, fmt.Errorf("no encryption secret")
}
fileName := vcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
fileName := vgcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
vaultContent, err := s.vaultStorage.GetVault(fileName)
if err != nil {
s.logger.WithError(err).Error("fail to get vault")
return nil, fmt.Errorf("failed to get vault, err: %w", err)
}

v, err := vcommon.DecryptVaultFromBackup(s.cfg.EncryptionSecret, vaultContent)
v, err := vgcommon.DecryptVaultFromBackup(s.cfg.EncryptionSecret, vaultContent)
if err != nil {
return nil, fmt.Errorf("failed to decrypt vault,err: %w", err)
}
Expand Down
17 changes: 9 additions & 8 deletions api/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,12 +14,13 @@ import (
"github.com/labstack/echo/v4/middleware"
"github.com/labstack/gommon/log"
"github.com/sirupsen/logrus"
vcommon "github.com/vultisig/verifier/common"
vv "github.com/vultisig/verifier/common/vultisig_validator"
"github.com/vultisig/verifier/plugin"
"github.com/vultisig/verifier/plugin/tasks"
vtypes "github.com/vultisig/verifier/types"
"github.com/vultisig/verifier/vault"
vgcommon "github.com/vultisig/vultisig-go/common"
vgtypes "github.com/vultisig/vultisig-go/types"

"github.com/vultisig/plugin/internal/scheduler"
"github.com/vultisig/plugin/service"
Expand Down Expand Up @@ -159,21 +160,21 @@ func (s *Server) GetVault(c echo.Context) error {
return c.JSON(http.StatusBadRequest, NewErrorResponse("pluginId is required"))
}

filePathName := vcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
filePathName := vgcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
content, err := s.vaultStorage.GetVault(filePathName)
if err != nil {
wrappedErr := fmt.Errorf("fail to read file in GetVault, err: %w", err)
s.logger.Error(wrappedErr)
return wrappedErr
}

v, err := vcommon.DecryptVaultFromBackup(s.cfg.EncryptionSecret, content)
v, err := vgcommon.DecryptVaultFromBackup(s.cfg.EncryptionSecret, content)
if err != nil {
s.logger.WithError(err).Error("fail to decrypt vault")
return c.JSON(http.StatusInternalServerError, NewErrorResponse("fail to get vault"))
}

return c.JSON(http.StatusOK, vtypes.VaultGetResponse{
return c.JSON(http.StatusOK, vgtypes.VaultGetResponse{
Name: v.Name,
PublicKeyEcdsa: v.PublicKeyEcdsa,
PublicKeyEddsa: v.PublicKeyEddsa,
Expand Down Expand Up @@ -204,7 +205,7 @@ func (s *Server) SignMessages(c echo.Context) error {
s.logger.Errorf("fail to set session, err: %v", err)
}

filePathName := vcommon.GetVaultBackupFilename(req.PublicKey, req.PluginID)
filePathName := vgcommon.GetVaultBackupFilename(req.PublicKey, req.PluginID)
content, err := s.vaultStorage.GetVault(filePathName)
if err != nil {
wrappedErr := fmt.Errorf("fail to read file in SignMessages, err: %w", err)
Expand All @@ -213,7 +214,7 @@ func (s *Server) SignMessages(c echo.Context) error {
return wrappedErr
}

_, err = vcommon.DecryptVaultFromBackup(s.cfg.EncryptionSecret, content)
_, err = vgcommon.DecryptVaultFromBackup(s.cfg.EncryptionSecret, content)
if err != nil {
return fmt.Errorf("fail to decrypt vault from the backup, err: %w", err)
}
Expand Down Expand Up @@ -266,7 +267,7 @@ func (s *Server) DeleteVault(c echo.Context) error {
return c.JSON(http.StatusBadRequest, NewErrorResponse("pluginId is required"))
}

fileName := vcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
fileName := vgcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
if err := s.vaultStorage.DeleteFile(fileName); err != nil {
return c.JSON(http.StatusInternalServerError, NewErrorResponse(err.Error()))
}
Expand Down Expand Up @@ -294,7 +295,7 @@ func (s *Server) ExistVault(c echo.Context) error {
return c.JSON(http.StatusBadRequest, NewErrorResponse("plugin id is required"))
}

filePathName := vcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
filePathName := vgcommon.GetVaultBackupFilename(publicKeyECDSA, pluginId)
exist, err := s.vaultStorage.Exist(filePathName)
if err != nil || !exist {
return c.NoContent(http.StatusBadRequest)
Expand Down
6 changes: 3 additions & 3 deletions common/vault.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@ import (
"fmt"

v1 "github.com/vultisig/commondata/go/vultisig/vault/v1"
vcommon "github.com/vultisig/verifier/common"
vtypes "github.com/vultisig/verifier/types"
vault "github.com/vultisig/verifier/vault"
vgcommon "github.com/vultisig/vultisig-go/common"
)

func GetVaultFromPolicy(s vault.Storage, policy vtypes.PluginPolicy, encryptionSecret string) (*v1.Vault, error) {
vaultFileName := vcommon.GetVaultBackupFilename(policy.PublicKey, policy.PluginID.String())
vaultFileName := vgcommon.GetVaultBackupFilename(policy.PublicKey, policy.PluginID.String())
vaultContent, err := s.GetVault(vaultFileName)
if err != nil {
return nil, fmt.Errorf("failed to get vault")
Expand All @@ -20,5 +20,5 @@ func GetVaultFromPolicy(s vault.Storage, policy vtypes.PluginPolicy, encryptionS
return nil, fmt.Errorf("vault not found")
}

return vcommon.DecryptVaultFromBackup(encryptionSecret, vaultContent)
return vgcommon.DecryptVaultFromBackup(encryptionSecret, vaultContent)
}
7 changes: 4 additions & 3 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,10 @@ require (
github.com/spf13/viper v1.20.1
github.com/vultisig/commondata v0.0.0-20250710214228-61d9ed8f7778
github.com/vultisig/mobile-tss-lib v0.0.0-20250316003201-2e7e570a4a74
github.com/vultisig/recipes v0.0.0-20250811174115-368ae4bab6f6
github.com/vultisig/verifier v0.0.0-20250814230939-fd9719226c8f
github.com/vultisig/recipes v0.0.0-20250818151719-db3f03c3254c
github.com/vultisig/verifier v0.0.0-20250820091538-a29a985cae1d
github.com/vultisig/vultiserver v0.0.0-20250715212748-4b23f9849e4b
github.com/vultisig/vultisig-go v0.0.0-20250818095937-af97443fcbbe
golang.org/x/sync v0.14.0
google.golang.org/protobuf v1.36.6
)
Expand Down Expand Up @@ -142,7 +143,7 @@ require (
github.com/tendermint/go-amino v0.16.0 // indirect
github.com/tklauser/go-sysconf v0.3.12 // indirect
github.com/tklauser/numcpus v0.6.1 // indirect
github.com/vultisig/go-wrappers v0.0.0-20250403041248-86911e8aa33f // indirect
github.com/vultisig/go-wrappers v0.0.0-20250716071337-34a5c0f4d6e0 // indirect
go.etcd.io/bbolt v1.3.8 // indirect
golang.org/x/exp v0.0.0-20250305212735-054e65f0b394 // indirect
google.golang.org/genproto/googleapis/api v0.0.0-20250106144421-5f5ef82da422 // indirect
Expand Down
14 changes: 8 additions & 6 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -755,16 +755,18 @@ github.com/valyala/fasttemplate v1.2.2 h1:lxLXG0uE3Qnshl9QyaK6XJxMXlQZELvChBOCmQ
github.com/valyala/fasttemplate v1.2.2/go.mod h1:KHLXt3tVN2HBp8eijSv/kGJopbvo7S+qRAEEKiv+SiQ=
github.com/vultisig/commondata v0.0.0-20250710214228-61d9ed8f7778 h1:XJ1hoo37JKGLmfxD4wYhXO8TJFBdUBnbxxK+zagJ4c4=
github.com/vultisig/commondata v0.0.0-20250710214228-61d9ed8f7778/go.mod h1:UMc5q0Myab+BvzAe67UQrXTXwKGYNxK7bky7DJM+dl8=
github.com/vultisig/go-wrappers v0.0.0-20250403041248-86911e8aa33f h1:124Xlloih1FOOXv/HTdgl4syIRBa/xfKFXAecrZSPQE=
github.com/vultisig/go-wrappers v0.0.0-20250403041248-86911e8aa33f/go.mod h1:UfGCxUQW08kiwxyNBiHwXe+ePPuBmHVVS+BS51aU/Jg=
github.com/vultisig/go-wrappers v0.0.0-20250716071337-34a5c0f4d6e0 h1:EdgQHZjzkY2nAhxr99zgbcs+3/8U1t6XW7ETiBEAr80=
github.com/vultisig/go-wrappers v0.0.0-20250716071337-34a5c0f4d6e0/go.mod h1:UfGCxUQW08kiwxyNBiHwXe+ePPuBmHVVS+BS51aU/Jg=
github.com/vultisig/mobile-tss-lib v0.0.0-20250316003201-2e7e570a4a74 h1:goqwk4nQ/NEVIb3OPP9SUx7/u9ZfsUIcd5fIN/e4DVU=
github.com/vultisig/mobile-tss-lib v0.0.0-20250316003201-2e7e570a4a74/go.mod h1:nOykk4nOy1L3yXtLSlYvVsgizBnCQ3tR2N5uwGPdvaM=
github.com/vultisig/recipes v0.0.0-20250811174115-368ae4bab6f6 h1:WY/4K26uOvPwp1fjy5zXENdNR+iJRltNGmtsn78zoSk=
github.com/vultisig/recipes v0.0.0-20250811174115-368ae4bab6f6/go.mod h1:Ot3lrUnnSw67Hep+MelclVPgNLDxJP01Ezixw/1RYRE=
github.com/vultisig/verifier v0.0.0-20250814230939-fd9719226c8f h1:hsPcIZJ128zm2SpbON+OYsfecgcpT0l7DUMV4s9WNrY=
github.com/vultisig/verifier v0.0.0-20250814230939-fd9719226c8f/go.mod h1:mPPBi5y9pCE/FUS8ibMTsEx3uR5rvia7bt7GEl6Kvv0=
github.com/vultisig/recipes v0.0.0-20250818151719-db3f03c3254c h1:oebbFeSAG8zGjCfhj5D4rhK0LtjlpTRhwQSYa4oVSCU=
github.com/vultisig/recipes v0.0.0-20250818151719-db3f03c3254c/go.mod h1:f2XBQu8WO5jwTeWCGiuogg6y9y2dBdjLRqHR7z1f5es=
github.com/vultisig/verifier v0.0.0-20250820091538-a29a985cae1d h1:PT7uf9dKpnFVHzZdLGf4/cTbU1LS669OMaybi1T4Ft4=
github.com/vultisig/verifier v0.0.0-20250820091538-a29a985cae1d/go.mod h1:3NVvxDlbaIRSAvUF6Kq0lik7xm7UJ/u7JdHKqkrLcNI=
github.com/vultisig/vultiserver v0.0.0-20250715212748-4b23f9849e4b h1:Ed2DOWo8fA0KG6e36rzUmGpxcOQjmWTbxWyvUbI5by8=
github.com/vultisig/vultiserver v0.0.0-20250715212748-4b23f9849e4b/go.mod h1:HwP2IgW6Mcu/gX8paFuKvfibrGE9UmPgkOFTub6dskM=
github.com/vultisig/vultisig-go v0.0.0-20250818095937-af97443fcbbe h1:wPXoiswP3HP68g9TbI7GN8Xd8I3M/IbzOs2dypDpH6Y=
github.com/vultisig/vultisig-go v0.0.0-20250818095937-af97443fcbbe/go.mod h1:jOf+2n1Eo/XZjiUbHjTfraPMw4HAZZ0Sw9Z6+vpQrU4=
github.com/xordataexchange/crypt v0.0.3-0.20170626215501-b2862e3d0a77/go.mod h1:aYKd//L2LvnjZzWKhF00oedf4jCCReLcmhLdhm1A27Q=
github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1 h1:gEOO8jv9F4OT7lGCjxCBTO/36wtF6j2nSip77qHd4x4=
github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1/go.mod h1:Ohn+xnUBiLI6FVj/9LpzZWtj1/D6lUovWYBkxHVV3aM=
Expand Down
4 changes: 2 additions & 2 deletions plugin/fees/fees.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import (
"github.com/google/uuid"
"github.com/hibiken/asynq"
"github.com/sirupsen/logrus"
vcommon "github.com/vultisig/verifier/common"
"github.com/vultisig/verifier/plugin"
"github.com/vultisig/verifier/plugin/keysign"
"github.com/vultisig/verifier/plugin/tx_indexer"
vtypes "github.com/vultisig/verifier/types"
vgcommon "github.com/vultisig/vultisig-go/common"
"golang.org/x/sync/errgroup"
"golang.org/x/sync/semaphore"

Expand Down Expand Up @@ -323,7 +323,7 @@ func (fp *FeePlugin) executeFeeTransaction(ctx context.Context, run types.FeeRun
fp.logger.WithFields(logrus.Fields{
"publicKey": feePolicy.PublicKey,
}).Info("Getting vault")
vaultFileName := vcommon.GetVaultBackupFilename(feePolicy.PublicKey, vtypes.PluginVultisigFees_feee.String())
vaultFileName := vgcommon.GetVaultBackupFilename(feePolicy.PublicKey, vtypes.PluginVultisigFees_feee.String())
vaultContent, err := fp.vaultStorage.GetVault(vaultFileName)
if err != nil {
return fmt.Errorf("failed to get vault: %w", err)
Expand Down
11 changes: 5 additions & 6 deletions plugin/fees/transaction.go
Original file line number Diff line number Diff line change
Expand Up @@ -13,15 +13,14 @@ import (
"github.com/sirupsen/logrus"
"github.com/vultisig/mobile-tss-lib/tss"
"github.com/vultisig/plugin/common"
rcommon "github.com/vultisig/recipes/common"
"github.com/vultisig/recipes/engine"
reth "github.com/vultisig/recipes/ethereum"
resolver "github.com/vultisig/recipes/resolver"

rtypes "github.com/vultisig/recipes/types"
"github.com/vultisig/verifier/address"
vcommon "github.com/vultisig/verifier/common"
vtypes "github.com/vultisig/verifier/types"
"github.com/vultisig/vultisig-go/address"
vgcommon "github.com/vultisig/vultisig-go/common"

gcommon "github.com/ethereum/go-ethereum/common"
"github.com/ethereum/go-ethereum/common/hexutil"
Expand Down Expand Up @@ -50,7 +49,7 @@ func (fp *FeePlugin) proposeTransactions(ctx context.Context, policy vtypes.Plug
}

// Get the ethereum derived addresses from the vaults master public key
ethAddress, _, _, err := address.GetAddress(vault.PublicKeyEcdsa, vault.HexChainCode, vcommon.Ethereum)
ethAddress, _, _, err := address.GetAddress(vault.PublicKeyEcdsa, vault.HexChainCode, vgcommon.Ethereum)
if err != nil {
return nil, fmt.Errorf("failed to get eth address: %v", err)
}
Expand Down Expand Up @@ -129,7 +128,7 @@ func (fp *FeePlugin) proposeTransactions(ctx context.Context, policy vtypes.Plug
{
Message: base64.StdEncoding.EncodeToString(txHashToSign.Bytes()),
RawMessage: txHex,
Chain: vcommon.Ethereum,
Chain: vgcommon.Ethereum,
Hash: base64.StdEncoding.EncodeToString(msgHash[:]),
HashFunction: vtypes.HashFunction_SHA256,
},
Expand Down Expand Up @@ -247,7 +246,7 @@ func (fp *FeePlugin) ValidateProposedTransactions(policy vtypes.PluginPolicy, tx
}

// Evaluate if the transaction is allowed by the policy
_, err = eng.Evaluate(recipe, rcommon.Chain(keysignMessage.Chain), txBytes)
_, err = eng.Evaluate(recipe, vgcommon.Chain(keysignMessage.Chain), txBytes)
if err != nil {
return fmt.Errorf("failed to evaluate transaction: %w", err)
}
Expand Down
2 changes: 1 addition & 1 deletion plugin/payroll/payroll.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import (
"github.com/vultisig/plugin/storage"
"github.com/vultisig/recipes/sdk/evm"
"github.com/vultisig/recipes/types"
"github.com/vultisig/verifier/common"
"github.com/vultisig/verifier/plugin"
"github.com/vultisig/verifier/plugin/keysign"
"github.com/vultisig/verifier/plugin/tx_indexer"
"github.com/vultisig/verifier/vault"
"github.com/vultisig/vultisig-go/common"
)

var _ plugin.Spec = (*Plugin)(nil)
Expand Down
4 changes: 2 additions & 2 deletions plugin/payroll/policy.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,10 +4,10 @@ import (
"encoding/base64"
"fmt"

rcommon "github.com/vultisig/recipes/common"
"github.com/vultisig/recipes/engine"
"github.com/vultisig/verifier/plugin"
vtypes "github.com/vultisig/verifier/types"
vgcommon "github.com/vultisig/vultisig-go/common"
)

func (p *Plugin) ValidateProposedTransactions(policy vtypes.PluginPolicy, txs []vtypes.PluginKeysignRequest) error {
Expand All @@ -30,7 +30,7 @@ func (p *Plugin) ValidateProposedTransactions(policy vtypes.PluginPolicy, txs []
return fmt.Errorf("failed to decode transaction: %w", err)
}

_, err = eng.Evaluate(recipe, rcommon.Chain(keysignMessage.Chain), txBytes)
_, err = eng.Evaluate(recipe, vgcommon.Chain(keysignMessage.Chain), txBytes)
if err != nil {
return fmt.Errorf("failed to evaluate transaction: %w", err)
}
Expand Down
19 changes: 9 additions & 10 deletions plugin/payroll/transaction.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,17 +16,16 @@ import (
"github.com/sirupsen/logrus"
"github.com/vultisig/mobile-tss-lib/tss"
"github.com/vultisig/plugin/internal/scheduler"
rcommon "github.com/vultisig/recipes/common"
"github.com/vultisig/recipes/ethereum"
"github.com/vultisig/recipes/sdk/evm"
rtypes "github.com/vultisig/recipes/types"
"github.com/vultisig/recipes/util"
"github.com/vultisig/verifier/address"
vcommon "github.com/vultisig/verifier/common"
"github.com/vultisig/verifier/plugin"
"github.com/vultisig/verifier/plugin/tx_indexer/pkg/storage"
vtypes "github.com/vultisig/verifier/types"
"github.com/vultisig/vultiserver/contexthelper"
"github.com/vultisig/vultisig-go/address"
vgcommon "github.com/vultisig/vultisig-go/common"
"golang.org/x/sync/errgroup"

"github.com/vultisig/plugin/common"
Expand Down Expand Up @@ -116,7 +115,7 @@ func (p *Plugin) ProposeTransactions(policy vtypes.PluginPolicy) ([]vtypes.Plugi
return nil, fmt.Errorf("failed to get vault from policy: %w", err)
}

ethAddress, _, _, err := address.GetAddress(vault.PublicKeyEcdsa, vault.HexChainCode, vcommon.Ethereum)
ethAddress, _, _, err := address.GetAddress(vault.PublicKeyEcdsa, vault.HexChainCode, vgcommon.Ethereum)
if err != nil {
return nil, fmt.Errorf("failed to get eth address: %w", err)
}
Expand All @@ -126,7 +125,7 @@ func (p *Plugin) ProposeTransactions(policy vtypes.PluginPolicy) ([]vtypes.Plugi
return nil, fmt.Errorf("failed to get recipe from policy: %w", err)
}

chain := rcommon.Ethereum
chain := vgcommon.Ethereum
ethEvmID, err := chain.EvmID()
if err != nil {
return nil, fmt.Errorf("failed to get EVM ID for chain %s: %w", chain, err)
Expand Down Expand Up @@ -187,7 +186,7 @@ func (p *Plugin) ProposeTransactions(policy vtypes.PluginPolicy) ([]vtypes.Plugi
txToTrack, e := p.txIndexerService.CreateTx(ctx, storage.CreateTxDto{
PluginID: policy.PluginID,
PolicyID: policy.ID,
ChainID: vcommon.Chain(chain),
ChainID: vgcommon.Chain(chain),
TokenID: tokenID,
FromPublicKey: policy.PublicKey,
ToPublicKey: recipient,
Expand All @@ -207,7 +206,7 @@ func (p *Plugin) ProposeTransactions(policy vtypes.PluginPolicy) ([]vtypes.Plugi
{
TxIndexerID: txToTrack.ID.String(),
Message: base64.StdEncoding.EncodeToString(txHashToSign.Bytes()),
Chain: vcommon.Chain(chain),
Chain: vgcommon.Chain(chain),
Hash: base64.StdEncoding.EncodeToString(msgHash[:]),
HashFunction: vtypes.HashFunction_SHA256,
},
Expand Down Expand Up @@ -256,7 +255,7 @@ func (p *Plugin) SigningComplete(
"from_public_key": signRequest.PublicKey,
"to_address": tx.To().Hex(),
"hash": tx.Hash().Hex(),
"chain": vcommon.Ethereum.String(),
"chain": vgcommon.Ethereum.String(),
}).Info("tx successfully signed and broadcasted")
return nil
}
Expand Down Expand Up @@ -339,11 +338,11 @@ func (p *Plugin) GetRecipeSpecification() (*rtypes.RecipeSchema, error) {

func (p *Plugin) genUnsignedTx(
ctx context.Context,
chain rcommon.Chain,
chain vgcommon.Chain,
senderAddress, tokenID, amount, to string,
) ([]byte, error) {
switch chain {
case rcommon.Ethereum:
case vgcommon.Ethereum:
amt, ok := new(big.Int).SetString(amount, 10)
if !ok {
return nil, fmt.Errorf("failed to parse amount: %s", amount)
Expand Down
6 changes: 3 additions & 3 deletions scripts/dev/add_balance/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,8 +16,8 @@ import (
"github.com/ethereum/go-ethereum/crypto"
"github.com/ethereum/go-ethereum/ethclient"

"github.com/vultisig/verifier/address"
vcommon "github.com/vultisig/verifier/common"
"github.com/vultisig/vultisig-go/address"
vgcommon "github.com/vultisig/vultisig-go/common"
)

const (
Expand Down Expand Up @@ -59,7 +59,7 @@ func main() {
}
compressedPubKeyHex := string(rawKeyBytes)

derivedAddress, _, _, err := address.GetAddress(compressedPubKeyHex, hexChainCode, vcommon.Ethereum)
derivedAddress, _, _, err := address.GetAddress(compressedPubKeyHex, hexChainCode, vgcommon.Ethereum)
if err != nil {
panic(err)
}
Expand Down
Loading