-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added configure method to greenlight proto file, regenerated grpc fil… #275
Conversation
2851c11
to
53d59ad
Compare
53d59ad
to
3602193
Compare
3602193
to
e46fbfd
Compare
Somehow the tests seem to be hanging indefinitely. Could this be related to the |
When running
I'll try rebasing |
The removal of the permissive policy filter broke it (8277142). I think I can fix the Using https://gitlab.com/lightning-signer/validating-lightning-signer/-/blob/main/vls-core/src/setup_channel_tests.rs#L228 for reference* |
Yeah, that's a bit of a tricky one, but I'm glad we are actually triggering a policy violation by using an external scriptpubkey. We probably want to have the client sign off on the configure step, and pass that down to the signer at startup too. This way we can add the configured variables to the processing on the signer (by adding the scriptpubkey to the allowlist at startup of the signer, thus make it so the node accepts it). In the meantime, can you try and see if adding an excemption to the |
e46fbfd
to
168336a
Compare
I added |
I think we probably need to take a bit of a step back and see how we can convince the signer that it's allowed to close to a given address. Generally speaking the configuration must be settable only by authorized clients. This is very similar to how access control is already done for the RPC, so we could just reuse that technique:
As a further simplification we can also just always prepend the LinksHere are the locations where we already handle RPC payloads and their signatures, to show where these customizations are needed: RPC payload serialization and attestation via client identity signature: greenlight/libs/gl-client/src/node/service.rs Lines 76 to 145 in f913907
Middleware layer collecting the signature context: greenlight/libs/gl-plugin/src/node/mod.rs Lines 504 to 523 in f913907
Signature context tracking: greenlight/libs/gl-plugin/src/node/mod.rs Lines 554 to 644 in f913907
Signature context being added to the signature request: greenlight/libs/gl-plugin/src/node/mod.rs Line 291 in f913907
Where the signer resolves changes to the command that caused it: greenlight/libs/gl-client/src/signer/mod.rs Line 317 in f913907
We likely want to do the following:
Since the payload is already verified before we reach the It's quite a few moving pieces, but it gives a very nice insight into how E2E verification works from start to finish :-) |
795467f
to
dfcf1a1
Compare
…es, and added python bindings. Added functionality to allow the last configure request to be sent to the signer on every signing request.
dfcf1a1
to
e0d0b1d
Compare
…es, and added python bindings.