-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure Signing e2e Integration #993
base: main
Are you sure you want to change the base?
Conversation
Provide From conversion impls to construct PrivateKey and Signature from byte arrays. The conversions into PrivateKey are fallible, while a Signature is allowed to be constructed from any 64 bytes.
Add TestSigner providing an in-process Signing implementation for tests.
TryFromBytes is not needed, neither is the public key as a member of HashiCorpVault state.
…yz/movement into musitdev/alloy-integration
pub verifier: Arc< | ||
Box<dyn VerifierOperations<CelestiaBlob, IntermediateBlobRepresentation> + Send + Sync>, | ||
>, | ||
pub signing_key: SigningKey<C>, | ||
pub signer: Arc<Signer<O, C>>, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So we're punting the blob signature curve choice as a generic parameter up to here, but the VerifierOperations
trait does not fix it, so...
|
||
Ok(Self { | ||
config: config.clone(), | ||
celestia_namespace: config.celestia_namespace(), | ||
default_client: client.clone(), | ||
verifier: Arc::new(Box::new(Verifier::<C>::new( | ||
verifier: Arc::new(Box::new(Verifier::<Secp256k1>::new( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
... so this concrete implementation is responsible for hooking the verifier with the correct curve choice.
Co-authored-by: Mikhail Zabaluev <[email protected]> Co-authored-by: Liam Monninger <[email protected]>
The |
Co-authored-by: Richard Melkonian <[email protected]> Co-authored-by: Icarus131 <[email protected]> Co-authored-by: primata <[email protected]> Co-authored-by: musitdev <[email protected]> Co-authored-by: Andy Golay <[email protected]> Co-authored-by: Icarus131 <[email protected]> Co-authored-by: Mikhail Zabaluev <[email protected]>
Co-authored-by: Mikhail Zabaluev <[email protected]>
I saw I was pinged for a review. What is the command for running this and the other tests? I see the tests in Also does |
Summary
misc
.Integrates secure signing work and prepares e2e testing.
Identifier
is used to render aLoadedSigner
struct, which currently wraps any of theHashiCropVault
,AwsKms
, orLocal
signers provided here.Secp256k1
signer from theConfig
into theDA Light Node
is implemented here.MAPTOS_PRIVATE_KEY
,MCR_SETTLEMENT_KEY
, andMOVEMENT_DA_SIGNER
to match the canonical string serialization here, s.t. the overlay runs and can toggel different backends. The overlay will then be expanded upon.Changelog
Testing
Outstanding issues