You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Would be nice if signers started with --require-authentication were supported.
Presumably (but I haven't really looked at the details) one would need to add an auth private key (preferably referencing a file, so it can be generated service-side and only the pubkey exported) to the config and supply a signature along with requests to the signer.
The text was updated successfully, but these errors were encountered:
append the public key hash of the signer, in bytes, without prefix
append the message being signed, in bytes, without prefix
sign these appended bytes from 1. 2. and 3. with the authorized key
add the resulting signature string (in base58 format, prefixed, for example spsig...) as an authentication header in the signature request.
Note that in order to support any kind of authorized key type (tz1, tz2...) 4. and 5. will likely require adding pytezos as a requirement to TRD. That's quite heavy. However, this is very much needed on my end.
@852Kerfunkle are you still around? Are you still happy to make a PR?
Would be nice if signers started with
--require-authentication
were supported.Presumably (but I haven't really looked at the details) one would need to add an auth private key (preferably referencing a file, so it can be generated service-side and only the pubkey exported) to the config and supply a signature along with requests to the signer.
The text was updated successfully, but these errors were encountered: