-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
charon combine
should have --no-verify
flag
#2321
Comments
charon compose
should have --no-verify
flagcharon combine
should have --no-verify
flag
@gsora not sure if we should allow users to combine keys if their cluster locks are malformed? |
@xenowits #2300 is a great example: the cluster lock was modified because the withdrawal address was wrong, but since users needed the cluster to work it was executed with Now that Without Also the fact that config hash doesn't match doesn't imply a malformed cluster lock: in this case, while the config hash was different, the cluster lock was well-formed and worked fine with This is why |
This flag warns the user if any of the cluster manifest files fail hash verification. It behaves like exactly like `charon run --no-verify`. The code will not stop if a diverging set of validator keys is present in the cluster manifests, but will error if not all public keys yielded by the combined private keys are present in the validator keys set. category: feature ticket: #2321
This flag warns the user if any of the cluster manifest files fail hash verification. It behaves like exactly like `charon run --no-verify`. The code will not stop if a diverging set of validator keys is present in the cluster manifests, but will error if not all public keys yielded by the combined private keys are present in the validator keys set. category: feature ticket: #2321
🎯 Problem to be solved
In #2300 @sugh01 tried combining cluster keys whose lock file has been modified without re-generating the lock hash, hence invalid for
charon run
unless executed with--no-verify
.🛠️ Proposed solution
Implement the same
--no-verify
logic incharon combine
ascharon run
, so that a cluster lock with wrong lock hash can still be combined.At the moment
combine
checks that all the lock files yield the same SHA256 hash.The logic must change: if
--no-verify
is specified,combine
must check that all the validator public keys and its associated key shares are the same in all lock files involved, rather than checking the cluster lock hash.🧪 Tests
✅ Acceptance criteria
Given a user with a non-verifiable cluster lock, resulted from out-of-band modifications after the DKG process
When the user tries to recombine the validator private keys with the
combine
commandAnd the user specifies
--no-verify
ascombine
parameterAnd the validator public keys and shares are the same in all the specified cluster locks
Then
combine
combines the validator keys specified in the cluster lock successfullyThe text was updated successfully, but these errors were encountered: