Skip to content

Conversation

@spypsy
Copy link
Member

@spypsy spypsy commented Dec 17, 2025

Fixes A-354

Implements ExtendedValidatorKeyStore utilizing ValidatorHASigner.
Updated interfaces to return null when the signature isn't acquired & updated handling of signing for null results.

Also some cleanup on previous HA work like consolidating config

@spypsy spypsy marked this pull request as ready for review December 17, 2025 18:19
@socket-security
Copy link

socket-security bot commented Dec 17, 2025

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addednpm/​@​aztec/​validator-ha-signer@​0.0.0-use.local100100100100100

View full report

@AztecBot
Copy link
Collaborator

AztecBot commented Dec 22, 2025

Flakey Tests

🤖 says: This CI run detected 1 tests that failed, but were tolerated due to a .test_patterns.yml entry.

\033FLAKED\033 (\0338;;http://ci.aztec-labs.com/af3c1628e48a756a�af3c1628e48a756a8;;�\033): BOX=react BROWSER=chromium run_compose_test react-chromium box boxes (147s) (code: 1) (\033spypsy\033: fixes + checkpoint updates)

Fixes [A-354](https://linear.app/aztec-labs/issue/A-354/integrate-slash-protection-in-signing-path)

Implements `ExtendedValidatorKeyStore` utilizing `ValidatorHASigner`.
Updated interfaces to return `null` when the signature isn't acquired & updated handling of signing for `null` results.

Also some cleanup on previous HA work like consolidating config
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants