Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
93 commits
Select commit Hold shift + click to select a range
c68125d
bump version
ltitanb Apr 2, 2025
d9979a2
Successful cross-compilation, but runtime has memory allocation issues
jclapis May 5, 2025
97ef653
Working with OpenSSL static-linked
jclapis May 6, 2025
91eefe2
Got dynamic linking working, added a feature flag to toggle dynamic v…
jclapis May 6, 2025
de09415
Fixed the vendored build arg
jclapis May 6, 2025
3aee63d
Reintroduced the cargo chef setup
jclapis May 6, 2025
c07c717
Ported the cross-compilation stuff into PBS
jclapis May 6, 2025
699b7ec
Split the dockerfiles into separate builder / image definitions
jclapis May 7, 2025
7165f12
Added a build guide
jclapis May 7, 2025
9438dae
Refactored the Github release action to use the Docker builder
jclapis May 13, 2025
12c020a
Fixed the Docker image binary filenames
jclapis May 13, 2025
53cafc0
Cleaned up the Darwin artifact step
jclapis May 13, 2025
58c6117
Made the CI workflow and justfile use the same toolchain as the source
jclapis May 14, 2025
45e581b
Revert "Made the CI workflow and justfile use the same toolchain as t…
jclapis May 14, 2025
24a10c5
Testing removal of OpenSSL vendored option
jclapis May 14, 2025
e36da54
Updating just in the CI workflow
jclapis May 14, 2025
843b110
Merge branch 'main' into cross-compile
jclapis May 28, 2025
e7c6d19
Refactored the signer to support host and port config settings
jclapis May 21, 2025
6117219
Updated docs
jclapis May 21, 2025
c0f591d
Fixing Clippy in CI workflow
jclapis May 21, 2025
adbd34a
Removed obviated CI setup
jclapis May 28, 2025
e3488b3
Minor dedup of RwLock guard acquisition
jclapis May 20, 2025
c3d7ec4
Added rate limiting for signer clients with repeated JWT auth failures
jclapis May 22, 2025
9ddad64
Added Signer config validation
jclapis May 22, 2025
c62185e
Started unit test setup for the Signer
jclapis May 22, 2025
dc73c62
Finished a basic signer module unit test
jclapis May 28, 2025
6c3d967
Added a JWT failure unit test
jclapis May 28, 2025
6464638
Added a rate limit test and cleaned up a bit
jclapis May 28, 2025
0313f18
Added unique ports to unit tests for parallel execution
jclapis May 28, 2025
346eea4
Cleaned up the build Dockerfile and removed an extra dependency layer
jclapis May 28, 2025
7b20d2f
Ported the build script over to the justfile
jclapis May 29, 2025
cf3f0b1
Merge branch 'main' into cross-compile
jclapis May 29, 2025
ca9f4a1
Added a justfile recipe for installing protoc
jclapis May 29, 2025
3eed526
Merge branch 'cross-compile' into add-ip-bind-to-signer
jclapis May 29, 2025
aa6ad96
Merge branch 'add-ip-bind-to-signer' into rate-limit-jwt
jclapis May 29, 2025
fc872ac
Merge branch 'main' into add-ip-bind-to-signer
jclapis Jun 3, 2025
ca0c6e8
Merge branch 'add-ip-bind-to-signer' into rate-limit-jwt
jclapis Jun 3, 2025
40d34aa
Merge branch 'main' into add-ip-bind-to-signer
jclapis Jun 9, 2025
d537288
Update crates/cli/src/docker_init.rs
jclapis Jun 9, 2025
7afb763
Added example signer config params
jclapis Jun 9, 2025
09ac821
Cleaned up signer config loading from feedback
jclapis Jun 9, 2025
cf39d86
Merge remote-tracking branch 'origin/add-ip-bind-to-signer' into add-…
jclapis Jun 9, 2025
2431937
Merge branch 'add-ip-bind-to-signer' into rate-limit-jwt
jclapis Jun 9, 2025
2e1198b
Merge branch 'main' into rate-limit-jwt
jclapis Jun 9, 2025
ccaf97d
Added JWT auth fields to the example config
jclapis Jun 10, 2025
145ebe8
Started building the JWT config file
jclapis Jun 12, 2025
bb0e023
Added tests
jclapis Jun 12, 2025
71a7605
Started migration from JWTS_ENV to the config file
jclapis Jun 12, 2025
615774e
Signing requests now uses the module's signing ID
jclapis Jun 16, 2025
af6076d
Finished added signing ID support and a quick test
jclapis Jun 17, 2025
cc13a6f
Fixed some example config parameters
jclapis Jun 18, 2025
488547a
Added a test to ensure modules can't create the same sigs
jclapis Jun 18, 2025
ef3d8f2
Merge branch 'rate-limit-jwt' into prevent-cross-module-sigs
jclapis Jun 18, 2025
6fd4327
Made the jwt_config_file optional
jclapis Jun 18, 2025
d9ef82f
Started working on docs
jclapis Jun 24, 2025
83db727
Redid implementation with the original JWTS env var
jclapis Jun 26, 2025
8d08c11
Started the signer doc
jclapis Jun 26, 2025
64b49f2
Overhauled the signing_id setup to be directly in the signed struct
jclapis Jul 1, 2025
8b65b1e
Made proposer commitments nested Merkle trees to allow Dirk support
jclapis Jul 1, 2025
9967033
Added the signer request guide
jclapis Jul 1, 2025
adb1cb8
Added quotes to some HTML
jclapis Jul 1, 2025
1c3a07d
Added some simple JWT secret info
jclapis Jul 2, 2025
daf3147
Adding a closing tag
jclapis Jul 2, 2025
fa36a34
Merge branch 'main' into prevent-cross-module-sigs
jclapis Jul 8, 2025
d5641df
Added prop commit signature verification helpers for modules to use
jclapis Jul 9, 2025
5da31bf
Fixed some params in da_commit
jclapis Jul 10, 2025
bfd72c5
Merge branch 'main' into prevent-cross-module-sigs
jclapis Jul 14, 2025
1a0efec
Cleaned load_module_signing_configs a bit
jclapis Jul 14, 2025
ee282da
Fixed some docs language
jclapis Jul 14, 2025
133447d
Refactored into compute_prop_commit_signing_root
jclapis Jul 15, 2025
5935659
CBST2-04: Update JWT secrets on reload and revoke module endpoint (#295)
ManuelBilbao Jul 27, 2025
9f72aff
Merge branch 'main' into prevent-cross-module-sigs
jclapis Jul 28, 2025
509dba8
Signing IDs are no longer optional in the config
jclapis Jul 28, 2025
2c507d7
Refactored some of the signer consts for consistency
jclapis Jul 28, 2025
d1ad9c9
Merge branch 'refactor-signer-consts' into prevent-cross-module-sigs
jclapis Jul 28, 2025
ff716a0
Updated the Signer API docs
jclapis Jul 29, 2025
91f2cb4
Merge branch 'main' into sigp-audit-fixes
jclapis Jul 30, 2025
de61066
Merge sigp-audit-fixes (#348)
jclapis Jul 30, 2025
db08d77
Merge branch 'sigp-audit-fixes' into prevent-cross-module-sigs
jclapis Jul 30, 2025
ce29c3a
Move from [u8; 32] to B256 everywhere (#347)
jclapis Jul 30, 2025
46e6f94
Merge branch 'main' into sigp-audit-fixes
jclapis Jul 31, 2025
b837e44
Merge branch 'sigp-audit-fixes' into prevent-cross-module-sigs
jclapis Jul 31, 2025
874e07d
Cleaned up some hashmap usage
jclapis Aug 4, 2025
3ad11a8
Removed compute_tree_hash_root()
jclapis Aug 4, 2025
a75605e
Some minor cleanup
jclapis Aug 4, 2025
d091a90
Fixed some docs
jclapis Aug 4, 2025
b802fec
Merge branch 'main' into sigp-audit-fixes
jclapis Aug 12, 2025
0313cc2
Merge branch 'sigp-audit-fixes' into prevent-cross-module-sigs
jclapis Aug 12, 2025
151e811
Merge branch 'main' into sigp-audit-fixes
jclapis Aug 13, 2025
358b3cb
Merge branch 'sigp-audit-fixes' into prevent-cross-module-sigs
jclapis Aug 13, 2025
92ca168
Merge branch 'Commit-Boost-prevent-cross-module-sigs' into HEAD
sambacha Aug 15, 2025
9dc2273
chore(trunk): wip
sambacha Aug 17, 2025
6f2363f
chore(fmt): apply
sambacha Aug 17, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .gitattributes
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
* merge=mergiraf
2 changes: 2 additions & 0 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
[workspace]
members = ["benches/*", "bin", "crates/*", "examples/builder_log", "examples/da_commit", "examples/status_api", "tests"]
members = ["benches/*", "bin", "crates/cli", "crates/common", "crates/metrics", "crates/pbs", "crates/signer", "examples/builder_log", "examples/da_commit", "examples/status_api", "tests"]
resolver = "2"

[workspace.package]
Expand Down
83 changes: 76 additions & 7 deletions api/signer-api.yml
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ paths:

/signer/v1/request_signature:
post:
summary: Send a signature request
summary: Request a signature for a 32-byte blob of data (typically a hash), signed by the requested BLS or ECDSA key.
tags:
- Signer
security:
Expand All @@ -81,15 +81,15 @@ paths:
type: string
enum: [consensus, proxy_bls, proxy_ecdsa]
pubkey:
description: Public key of the validator for consensus signatures
description: The 48-byte BLS public key, with optional `0x` prefix, of the proposer key that you want to request a signature from.
$ref: "#/components/schemas/BlsPubkey"
proxy:
description: BLS proxy pubkey or ECDSA address for proxy signatures
description: The 48-byte BLS public key (for `proxy_bls` mode) or the 20-byte Ethereum address (for `proxy_ecdsa` mode), with optional `0x` prefix, of the proxy key that you want to request a signature from.
oneOf:
- $ref: "#/components/schemas/BlsPubkey"
- $ref: "#/components/schemas/EcdsaAddress"
object_root:
description: The root of the object to be signed
description: The 32-byte data you want to sign, with optional `0x` prefix.
type: string
format: hex
pattern: "^0x[a-fA-F0-9]{64}$"
Expand All @@ -112,7 +112,7 @@ paths:
object_root: "0x3e9f4a78b5c21d64f0b8e3d9a7f5c02b4d1e67a3c8f29b5d6e4a3b1c8f72e6d9"
responses:
"200":
description: Success
description: A successful signature response. The returned signature is the Merkle root hash of the provided `object_root` field and the requesting module's Signing ID as specified in the Commit-Boost configuration. For details on this signature, see the [signature structure documentation](https://commit-boost.github.io/commit-boost-client/developing/prop-commit-signing.md#structure-of-a-signature).
content:
application/json:
schema:
Expand All @@ -126,8 +126,45 @@ paths:
value: "0xa3ffa9241f78279f1af04644cb8c79c2d8f02bcf0e28e2f186f6dcccac0a869c2be441fda50f0dea895cfce2e53f0989a3ffa9241f78279f1af04644cb8c79c2d8f02bcf0e28e2f186f6dcccac0a869c2be441fda50f0dea895cfce2e53f0989"
ProxyEcdsa:
value: "0x985b495f49d1b96db3bba3f6c5dd1810950317c10d4c2042bd316f338cdbe74359072e209b85e56ac492092d7860063dd096ca31b4e164ef27e3f8d508e656801c"
"400":
description: |
This can occur in several scenarios:

- You requested an operation while using the Dirk signer mode instead of locally-managed signer mode, but Dirk doesn't support that operation.
- Something went wrong while preparing your request; the error text will provide more information.
content:
application/json:
schema:
type: object
required:
- code
- message
properties:
code:
type: number
example: 400
message:
type: string
example: "Bad request: Invalid pubkey format"
"401":
description: The requesting module did not provide a JWT string in the request's authorization header, or the JWT string was not configured in the signer service's configuration file as belonging to the module.
content:
application/json:
schema:
type: object
required:
- code
- message
properties:
code:
type: number
example: 401
message:
type: string
example: "Unauthorized"

"404":
description: Unknown value (pubkey, etc.)
description: You either requested a route that doesn't exist, or you requested a signature from a key that does not exist.
content:
application/json:
schema:
Expand All @@ -142,8 +179,24 @@ paths:
message:
type: string
example: "Unknown pubkey"
"429":
description: Your module attempted and failed JWT authentication too many times recently, and is currently timed out. It cannot make any more requests until the timeout ends.
content:
application/json:
schema:
type: object
required:
- code
- message
properties:
code:
type: number
example: 429
message:
type: string
example: "Too many requests"
"500":
description: Internal error
description: Your request was valid, but something went wrong internally that prevented it from being fulfilled.
content:
application/json:
schema:
Expand All @@ -158,6 +211,22 @@ paths:
message:
type: string
example: "Internal error"
"502":
description: The signer service is running in Dirk signer mode, but Dirk could not be reached.
content:
application/json:
schema:
type: object
required:
- code
- message
properties:
code:
type: number
example: 502
message:
type: string
example: "Bad gateway: Dirk signer service is unreachable"

/signer/v1/generate_proxy_key:
post:
Expand Down
1 change: 1 addition & 0 deletions benches/pbs/src/main.rs
Original file line number Diff line number Diff line change
Expand Up @@ -162,6 +162,7 @@ fn get_mock_validator(bench: BenchConfig) -> RelayClient {
target_first_request_ms: None,
frequency_get_header_ms: None,
validator_registration_batch_size: None,
bid_boost: None,
};

RelayClient::new(config).unwrap()
Expand Down
3 changes: 3 additions & 0 deletions bin/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,9 @@ pub mod prelude {
load_pbs_custom_config, LogsSettings, StartCommitModuleConfig, PBS_MODULE_NAME,
},
pbs::{BuilderEvent, BuilderEventClient, OnBuilderApiEvent},
signature::{
verify_proposer_commitment_signature_bls, verify_proposer_commitment_signature_ecdsa,
},
signer::{BlsPublicKey, BlsSignature, EcdsaSignature},
types::Chain,
utils::{initialize_tracing_log, utcnow_ms, utcnow_ns, utcnow_sec, utcnow_us},
Expand Down
6 changes: 4 additions & 2 deletions config.example.toml
Original file line number Diff line number Diff line change
Expand Up @@ -152,10 +152,10 @@ url = "http://0xa119589bb33ef52acbb8116832bec2b58fca590fe5c85eac5d3230b44d5bc09f
# - Dirk: a remote Dirk instance
# - Local: a local Signer module
# More details on the docs (https://commit-boost.github.io/commit-boost-client/get_started/configuration/#signer-module)
# [signer]
[signer]
# Docker image to use for the Signer module.
# OPTIONAL, DEFAULT: ghcr.io/commit-boost/signer:latest
# docker_image = "ghcr.io/commit-boost/signer:latest"
docker_image = "ghcr.io/commit-boost/signer:latest"
# Host to bind the Signer API server to
# OPTIONAL, DEFAULT: 127.0.0.1
host = "127.0.0.1"
Expand Down Expand Up @@ -249,6 +249,8 @@ proxy_dir = "./proxies"
[[modules]]
# Unique ID of the module
id = "DA_COMMIT"
# Unique hash that the Signer service will combine with the incoming data in signing requests to generate a signature specific to this module
signing_id = "0x6a33a23ef26a4836979edff86c493a69b26ccf0b4a16491a815a13787657431b"
# Type of the module. Supported values: commit, events
type = "commit"
# Docker image of the module
Expand Down
33 changes: 18 additions & 15 deletions crates/cli/src/docker_init.rs
Original file line number Diff line number Diff line change
Expand Up @@ -6,16 +6,16 @@ use std::{

use cb_common::{
config::{
CommitBoostConfig, LogsSettings, ModuleKind, SignerConfig, SignerType, BUILDER_PORT_ENV,
BUILDER_URLS_ENV, CHAIN_SPEC_ENV, CONFIG_DEFAULT, CONFIG_ENV, DIRK_CA_CERT_DEFAULT,
DIRK_CA_CERT_ENV, DIRK_CERT_DEFAULT, DIRK_CERT_ENV, DIRK_DIR_SECRETS_DEFAULT,
DIRK_DIR_SECRETS_ENV, DIRK_KEY_DEFAULT, DIRK_KEY_ENV, JWTS_ENV, LOGS_DIR_DEFAULT,
LOGS_DIR_ENV, METRICS_PORT_ENV, MODULE_ID_ENV, MODULE_JWT_ENV, PBS_ENDPOINT_ENV,
PBS_MODULE_NAME, PROXY_DIR_DEFAULT, PROXY_DIR_ENV, PROXY_DIR_KEYS_DEFAULT,
PROXY_DIR_KEYS_ENV, PROXY_DIR_SECRETS_DEFAULT, PROXY_DIR_SECRETS_ENV, SIGNER_DEFAULT,
SIGNER_DIR_KEYS_DEFAULT, SIGNER_DIR_KEYS_ENV, SIGNER_DIR_SECRETS_DEFAULT,
SIGNER_DIR_SECRETS_ENV, SIGNER_ENDPOINT_ENV, SIGNER_KEYS_ENV, SIGNER_MODULE_NAME,
SIGNER_PORT_DEFAULT, SIGNER_URL_ENV,
CommitBoostConfig, LogsSettings, ModuleKind, SignerConfig, SignerType, ADMIN_JWT_ENV,
BUILDER_PORT_ENV, BUILDER_URLS_ENV, CHAIN_SPEC_ENV, CONFIG_DEFAULT, CONFIG_ENV,
DIRK_CA_CERT_DEFAULT, DIRK_CA_CERT_ENV, DIRK_CERT_DEFAULT, DIRK_CERT_ENV,
DIRK_DIR_SECRETS_DEFAULT, DIRK_DIR_SECRETS_ENV, DIRK_KEY_DEFAULT, DIRK_KEY_ENV, JWTS_ENV,
LOGS_DIR_DEFAULT, LOGS_DIR_ENV, METRICS_PORT_ENV, MODULE_ID_ENV, MODULE_JWT_ENV,
PBS_ENDPOINT_ENV, PBS_MODULE_NAME, PROXY_DIR_DEFAULT, PROXY_DIR_ENV,
PROXY_DIR_KEYS_DEFAULT, PROXY_DIR_KEYS_ENV, PROXY_DIR_SECRETS_DEFAULT,
PROXY_DIR_SECRETS_ENV, SIGNER_DEFAULT, SIGNER_DIR_KEYS_DEFAULT, SIGNER_DIR_KEYS_ENV,
SIGNER_DIR_SECRETS_DEFAULT, SIGNER_DIR_SECRETS_ENV, SIGNER_ENDPOINT_ENV, SIGNER_KEYS_ENV,
SIGNER_MODULE_NAME, SIGNER_PORT_DEFAULT, SIGNER_URL_ENV,
},
pbs::{BUILDER_V1_API_PATH, GET_STATUS_PATH},
signer::{ProxyStore, SignerLoader},
Expand Down Expand Up @@ -86,8 +86,8 @@ pub async fn handle_docker_init(config_path: PathBuf, output_dir: PathBuf) -> Re

let mut warnings = Vec::new();

let needs_signer_module = cb_config.pbs.with_signer ||
cb_config.modules.as_ref().is_some_and(|modules| {
let needs_signer_module = cb_config.pbs.with_signer
|| cb_config.modules.as_ref().is_some_and(|modules| {
modules.iter().any(|module| matches!(module.kind, ModuleKind::Commit))
});

Expand Down Expand Up @@ -161,9 +161,10 @@ pub async fn handle_docker_init(config_path: PathBuf, output_dir: PathBuf) -> Re

// depends_on
let mut module_dependencies = IndexMap::new();
module_dependencies.insert("cb_signer".into(), DependsCondition {
condition: "service_healthy".into(),
});
module_dependencies.insert(
"cb_signer".into(),
DependsCondition { condition: "service_healthy".into() },
);

Service {
container_name: Some(module_cid.clone()),
Expand Down Expand Up @@ -333,6 +334,7 @@ pub async fn handle_docker_init(config_path: PathBuf, output_dir: PathBuf) -> Re
let mut signer_envs = IndexMap::from([
get_env_val(CONFIG_ENV, CONFIG_DEFAULT),
get_env_same(JWTS_ENV),
get_env_same(ADMIN_JWT_ENV),
]);

// Bind the signer API to 0.0.0.0
Expand Down Expand Up @@ -366,6 +368,7 @@ pub async fn handle_docker_init(config_path: PathBuf, output_dir: PathBuf) -> Re

// write jwts to env
envs.insert(JWTS_ENV.into(), format_comma_separated(&jwts));
envs.insert(ADMIN_JWT_ENV.into(), random_jwt_secret());

// volumes
let mut volumes = vec![config_volume.clone()];
Expand Down
1 change: 1 addition & 0 deletions crates/common/src/commit/constants.rs
Original file line number Diff line number Diff line change
Expand Up @@ -3,3 +3,4 @@ pub const REQUEST_SIGNATURE_PATH: &str = "/signer/v1/request_signature";
pub const GENERATE_PROXY_KEY_PATH: &str = "/signer/v1/generate_proxy_key";
pub const STATUS_PATH: &str = "/status";
pub const RELOAD_PATH: &str = "/reload";
pub const REVOKE_MODULE_PATH: &str = "/revoke_jwt";
43 changes: 37 additions & 6 deletions crates/common/src/commit/request.rs
Original file line number Diff line number Diff line change
@@ -1,21 +1,26 @@
use std::{
collections::HashMap,
fmt::{self, Debug, Display},
str::FromStr,
};

use alloy::{
hex,
primitives::{Address, B256},
primitives::{aliases::B32, Address, B256},
rpc::types::beacon::BlsSignature,
};
use derive_more::derive::From;
use serde::{Deserialize, Serialize};
use serde::{Deserialize, Deserializer, Serialize};
use tree_hash::TreeHash;
use tree_hash_derive::TreeHash;

use crate::{
constants::COMMIT_BOOST_DOMAIN, error::BlstErrorWrapper, signature::verify_signed_message,
signer::BlsPublicKey, types::Chain,
config::decode_string_to_map,
constants::COMMIT_BOOST_DOMAIN,
error::BlstErrorWrapper,
signature::verify_signed_message,
signer::BlsPublicKey,
types::{Chain, ModuleId},
};

pub trait ProxyId: AsRef<[u8]> + Debug + Clone + Copy + TreeHash + Display {}
Expand Down Expand Up @@ -57,7 +62,8 @@ impl<T: ProxyId> SignedProxyDelegation<T> {
&self.message.delegator,
&self.message,
&self.signature,
COMMIT_BOOST_DOMAIN,
None,
&B32::from(COMMIT_BOOST_DOMAIN),
)
}
}
Expand Down Expand Up @@ -198,6 +204,31 @@ pub struct GetPubkeysResponse {
pub keys: Vec<ConsensusProxyMap>,
}

#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct ReloadRequest {
#[serde(default, deserialize_with = "deserialize_jwt_secrets")]
pub jwt_secrets: Option<HashMap<ModuleId, String>>,
pub admin_secret: Option<String>,
}

pub fn deserialize_jwt_secrets<'de, D>(
deserializer: D,
) -> Result<Option<HashMap<ModuleId, String>>, D::Error>
where
D: Deserializer<'de>,
{
let raw: String = Deserialize::deserialize(deserializer)?;

decode_string_to_map(&raw)
.map(Some)
.map_err(|_| serde::de::Error::custom("Invalid format".to_string()))
}

#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct RevokeModuleRequest {
pub module_id: ModuleId,
}

/// Map of consensus pubkeys to proxies
#[derive(Debug, Clone, Deserialize, Serialize)]
pub struct ConsensusProxyMap {
Expand Down Expand Up @@ -288,7 +319,7 @@ mod tests {

let _: SignedProxyDelegationBls = serde_json::from_str(data).unwrap();

let data = r#"{
let data = r#"{
"message": {
"delegator": "0xa3366b54f28e4bf1461926a3c70cdb0ec432b5c92554ecaae3742d33fb33873990cbed1761c68020e6d3c14d30a22050",
"proxy": "0x4ca9939a8311a7cab3dde201b70157285fa81a9d"
Expand Down
1 change: 1 addition & 0 deletions crates/common/src/config/constants.rs
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ pub const SIGNER_JWT_AUTH_FAIL_TIMEOUT_SECONDS_DEFAULT: u32 = 5 * 60;

/// Comma separated list module_id=jwt_secret
pub const JWTS_ENV: &str = "CB_JWTS";
pub const ADMIN_JWT_ENV: &str = "CB_SIGNER_ADMIN_JWT";

/// Path to json file with plaintext keys (testing only)
pub const SIGNER_KEYS_ENV: &str = "CB_SIGNER_LOADER_FILE";
Expand Down
Loading