-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remote Key Manager API(web3signer) #10302
Conversation
providedPublicKeys, err := km.client.GetPublicKeys(ctx, km.publicKeysURL) | ||
if err != nil { | ||
erroredResponsesTotal.Inc() | ||
return nil, errors.Wrap(err, fmt.Sprintf("could not get public keys from remote server url: %v", km.publicKeysURL)) | ||
} | ||
// makes sure that if the public keys are deleted the validator does not call URL again. | ||
km.publicKeysUrlCalled = true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there no scenario where we should revert the value back to false
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not after it starts, this is to avoid it from calling the URL endpoint accidentally after removing the last key ( when there are 0 keys)
if found { | ||
importedRemoteKeysStatuses[i] = ðpbservice.ImportedRemoteKeysStatus{ | ||
Status: ethpbservice.ImportedRemoteKeysStatus_DUPLICATE, | ||
Message: fmt.Sprintf("Duplicate pubkey: %v, already in use", hexutil.Encode(pubKey[:])), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Message: fmt.Sprintf("Duplicate pubkey: %v, already in use", hexutil.Encode(pubKey[:])), | |
Message: fmt.Sprintf("Duplicate pubkey: %#x, already in use", pubKey[:]), |
I think this should also work. If it does, you can make similar changes in other places.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tried doing this but it displays in the weird byte version not the 0x.....
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
…abs/prysm into remote-keymanager-api
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
Co-authored-by: Radosław Kapka <[email protected]>
What type of PR is this?
Feature
What does this PR do? Why is it needed?
As a node operator, I would like to be able to list, import, and delete public keys defined for Prysm's Web3Signer feature.
The definitions of these APIs are consistent across all client teams and listed here. This will enable institutions to migrate keys from clients via web3signer as well as
Which issues(s) does this PR fix?
Fixes #10293