-
Notifications
You must be signed in to change notification settings - Fork 1.9k
Add DKGRecipient P256 key #19161
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add DKGRecipient P256 key #19161
Conversation
bd37cf2 to
c0e9ebc
Compare
… into PRIV-149-p256-key
| } | ||
|
|
||
| // EnsureKey verifies whether the DKGRecipient key has been seeded, if not, it creates it. | ||
| func (ks *dkgRecipient) EnsureKey(ctx context.Context) error { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@vreff Not sure if you were planning on doing this in a later PR, but we should call this in application.go (wherever we call the code for the workflowkey); all nodes should automatically get a key of this type
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, have it as a planned change here: #19160
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am adding a configuration field DKGRecipientEnabled that gates the creation of the key, though. Is this falling out of fashion, and we would rather just create the key for all nodes no matter what these days? Happy to do either.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would think we do need to gate the creation.
Not all nodes will be vault DON nodes right @cedric-cordenier ?
The base branch was changed.
|
* Add dkgresult database * add p256 key to keystore * tests * Add dkgresult database * make gomodtidy * make generate * fix lint / possible overflow error * fix lint * update test package * Update to use new keyring * make gomodtidy * make gomodtidy * make generate * remove ensurekey * add more tests * fix lint * changeset * gomodtidy




This PR adds a DKGRecipient P256 key to the keystore.
Related:
#19162
#19160
smartcontractkit/chainlink-common#1508