Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement feerecipient API for keymanager (VC) #3173

Closed
Tracked by #622
paulhauner opened this issue May 9, 2022 · 1 comment
Closed
Tracked by #622

Implement feerecipient API for keymanager (VC) #3173

paulhauner opened this issue May 9, 2022 · 1 comment
Assignees
Labels
bellatrix Required to support the Bellatrix Upgrade

Comments

@paulhauner
Copy link
Member

Description

An endpoint has been added to the keymanager API (our VC implements this) to support dynamically changing the suggested fee recipient:

ethereum/keymanager-APIs#24

I've had a few questions about this from large pools, it seems like desirable functionality. It should be fairly straight-forward to implement. We'll want to make sure we update our suggested fee recipient docs to include this method and describe how it interacts with the other methods we have.

@paulhauner paulhauner added the bellatrix Required to support the Bellatrix Upgrade label May 9, 2022
@ethDreamer ethDreamer self-assigned this May 16, 2022
bors bot pushed a commit that referenced this issue Jul 6, 2022
## Issue Addressed

* #3173 

## Proposed Changes

Moved all `fee_recipient_file` related logic inside the `ValidatorStore` as it makes more sense to have this all together there. I tested this with the validators I have on `mainnet-shadow-fork-5` and everything appeared to work well. Only technicality is that I can't get the method to return `401` when the authorization header is not specified (it returns `400` instead). Fixing this is probably quite difficult given that none of `warp`'s rejections have code `401`.. I don't really think this matters too much though as long as it fails.
bors bot pushed a commit that referenced this issue Jul 6, 2022
## Issue Addressed

* #3173 

## Proposed Changes

Moved all `fee_recipient_file` related logic inside the `ValidatorStore` as it makes more sense to have this all together there. I tested this with the validators I have on `mainnet-shadow-fork-5` and everything appeared to work well. Only technicality is that I can't get the method to return `401` when the authorization header is not specified (it returns `400` instead). Fixing this is probably quite difficult given that none of `warp`'s rejections have code `401`.. I don't really think this matters too much though as long as it fails.
bors bot pushed a commit that referenced this issue Jul 6, 2022
## Issue Addressed

* #3173 

## Proposed Changes

Moved all `fee_recipient_file` related logic inside the `ValidatorStore` as it makes more sense to have this all together there. I tested this with the validators I have on `mainnet-shadow-fork-5` and everything appeared to work well. Only technicality is that I can't get the method to return `401` when the authorization header is not specified (it returns `400` instead). Fixing this is probably quite difficult given that none of `warp`'s rejections have code `401`.. I don't really think this matters too much though as long as it fails.
bors bot pushed a commit that referenced this issue Jul 6, 2022
## Issue Addressed

* #3173 

## Proposed Changes

Moved all `fee_recipient_file` related logic inside the `ValidatorStore` as it makes more sense to have this all together there. I tested this with the validators I have on `mainnet-shadow-fork-5` and everything appeared to work well. Only technicality is that I can't get the method to return `401` when the authorization header is not specified (it returns `400` instead). Fixing this is probably quite difficult given that none of `warp`'s rejections have code `401`.. I don't really think this matters too much though as long as it fails.
@paulhauner
Copy link
Member Author

Resolved via #3213 🎉

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bellatrix Required to support the Bellatrix Upgrade
Projects
None yet
Development

No branches or pull requests

2 participants