-
Notifications
You must be signed in to change notification settings - Fork 838
client: Jwt token based auth for engine api enabled via rpcEngineAuth arg
#1751
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report
Flags with carried forward coverage won't be shown. Click here to find out more. |
|
looks great, thanks so much for doing and sticking through! can't believe you also got the ws auth working, that is very cool. we're just missing some coverage on the ws auth now, would you be able to add a few cases to the rpc.spec tests to get coverage on the lines? then I'll approve and merge in :) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks fantastic, thank you! will merge in after ci completes
thank you @ryanio ❤️, and thanks a ton for your edits/improvs/feedback 🙏 happy to contribute to ethereumjs! 🚀 |
Kiln spec v2 has jwt based auth for the engine json rpc requests through both http/websocket protocols. Following are some salient features of implementing same in this PR:
--jwt-secretparam to specify the file for jwt secret, in its absence a random 256 bit key is generated (and dumped in a file)--rpcEngineAuthparam addition to enable the above authentication mechanism, so that the requests remain backward compatible till all clients move to jwt authThis PR is a fresh pull in continuation to this previous PR #1723
cc: @ryanio