Replies: 3 comments 5 replies
-
You can find some hints in the /// Configuration of the client keystore.
#[derive(Debug, Clone)]
pub enum KeystoreConfig {
/// Keystore at a path on-disk. Recommended for native nodes.
Path {
/// The path of the keystore.
path: PathBuf,
/// Node keystore's password.
password: Option<SecretString>
},
/// In-memory keystore. Recommended for in-browser nodes.
InMemory,
} It appears as though you are able to configure a path on disk from where the node will read its keys. |
Beta Was this translation helpful? Give feedback.
-
Maybe this will help, apologies for long post, items omitted that have nothing to do with the keystore. At present the keystore is stored at specified
|
Beta Was this translation helpful? Give feedback.
-
It might help to think about the different types of keys we need.
I would suggest one keystore that stores the Aura, Grandpa and CFE / Controller keys. *I'm using these interchangeably but not sure if they really are. Polkadot has a the notion of controller keys for stakers and session keys for... I'm not quite sure what? @andyjsbell ? Either way I think we only need one of the two, it doesn't really matter what we call it. |
Beta Was this translation helpful? Give feedback.
-
Ideally we have one place to manage the keys across the state chain and the CFE. It's probably easiest to use the substrate standard and then have the CFE read from that keystore, as the CFE needs to use the chain's keys anyway, to submit extrinsics back to the chain.
How does substrate do it? and does anyone have ideas on how the CFE might then use the substrate keys?
Beta Was this translation helpful? Give feedback.
All reactions