Keystore signer impl#1598
Merged
connorwstein merged 6 commits intoARCH-331-keystore-encryptor-2from Oct 10, 2025
Merged
Conversation
✅ API Diff Results - No breaking changes |
connorwstein
commented
Oct 8, 2025
| } | ||
|
|
||
| type VerifyRequest struct { | ||
| KeyName string |
Contributor
Author
There was a problem hiding this comment.
General pattern I'm thinking about here:
- KeyName is bound to private key material specifically and only used in APIs which need that access
- For APIs that don't use private key material directly (but still belong in the API as they do cryptographic operations), supply all the inputs up front so its stateless. More flexible that way
| func publicKeyFromPrivateKey(privateKeyBytes internal.Raw, keyType KeyType) ([]byte, error) { | ||
| switch keyType { | ||
| case Ed25519: | ||
| return ed25519.PublicKey(internal.Bytes(privateKeyBytes)), nil |
Contributor
Author
There was a problem hiding this comment.
critical issue caught in testing the signing, casting instead of properly converting.
jmank88
reviewed
Oct 8, 2025
jmank88
reviewed
Oct 9, 2025
jmank88
approved these changes
Oct 9, 2025
cedric-cordenier
approved these changes
Oct 10, 2025
ac08a79
into
ARCH-331-keystore-encryptor-2
10 of 12 checks passed
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Note I thought about passing a hash function parameter (e.g. nilable crypto.Hash, with the idea that the more we can encapsulate cryptographic stuff the better) but ended up thinking its not worth it: