Skip to content

Conversation

@hendoxc
Copy link
Contributor

@hendoxc hendoxc commented Oct 20, 2025

No description provided.

@github-actions
Copy link

👋 hendoxc, thanks for creating this pull request!

To help reviewers, please consider creating future PRs as drafts first. This allows you to self-review and make any final changes before notifying the team.

Once you're ready, you can mark it as "Ready for review" to request feedback. Thanks!

@github-actions
Copy link

github-actions bot commented Oct 20, 2025

✅ API Diff Results - No breaking changes


📄 View full apidiff report

jmank88
jmank88 previously approved these changes Oct 20, 2025
Copy link
Contributor

@jmank88 jmank88 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM though this will only cover chain relayers.

@github-actions
Copy link

This PR is stale because it has been open 30 days with no activity.
Remove the stale label or comment or this will be closed in 7 days.

@github-actions github-actions bot added the Stale label Nov 20, 2025
ilija42
ilija42 previously approved these changes Nov 24, 2025
@github-actions
Copy link

This PR is stale because it has been open 30 days with no activity.
Remove the stale label or comment or this will be closed in 7 days.

@github-actions github-actions bot added the Stale label Dec 25, 2025
@github-actions
Copy link

github-actions bot commented Jan 1, 2026

This PR has been automatically closed because it has been stale for > 30 days.
If you wish to continue working on this PR, please reopen it and make any necessary changes.

@github-actions github-actions bot closed this Jan 1, 2026
@github-actions github-actions bot deleted the INFOPLAT-2963-beholder-rotating-auth-headers-loop-wire-up branch January 1, 2026 00:50
@engnke engnke restored the INFOPLAT-2963-beholder-rotating-auth-headers-loop-wire-up branch January 20, 2026 17:59
@engnke engnke reopened this Jan 20, 2026
@engnke
Copy link
Contributor

engnke commented Jan 20, 2026

LGTM though this will only cover chain relayers.

Hi @jmank88 we've reopened this PR as it fell though the cracks and went stale but its still relevant & needed. Per this comment is there somewhere else we should be wiring up a signer for loop server?

@jmank88
Copy link
Contributor

jmank88 commented Jan 20, 2026

LGTM though this will only cover chain relayers.

Hi @jmank88 we've reopened this PR as it fell though the cracks and went stale but its still relevant & needed. Per this comment is there somewhere else we should be wiring up a signer for loop server?

There is not one general place unfortunately, because we do not have the keystore until some deferred constructor is called like with relayers. However, the capability Initialise method would cover many. We would have to look at each of the others individually.

@engnke engnke dismissed stale reviews from jmank88 and ilija42 via 81a1030 January 20, 2026 20:57
Copilot AI review requested due to automatic review settings January 20, 2026 20:57
@engnke engnke requested a review from a team as a code owner January 20, 2026 20:57
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR integrates the Beholder client's signing mechanism by setting up CSA and P2P keystores as signers for authentication header generation in both the relayer and standard capabilities components.

Changes:

  • Configured Beholder client to use CSA keystore for signing in the relayer's NewRelayer function
  • Configured Beholder client to use P2P keystore for signing in standard capabilities initialization
  • Removed trailing whitespace from config file

Reviewed changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 1 comment.

File Description
pkg/loop/internal/relayer/relayer.go Extracts CSA keystore client and sets it as Beholder's signer before creating new relayer
pkg/loop/internal/core/services/capability/standard/standard_capabilities.go Sets P2P keystore as Beholder's signer during standard capabilities initialization
pkg/loop/cmd/loopinstall/config.go Removes trailing newline for formatting consistency

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines 4 to +6
"context"
"fmt"
"github.com/smartcontractkit/chainlink-common/pkg/beholder"
Copy link

Copilot AI Jan 20, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The import statement for 'github.com/smartcontractkit/chainlink-common/pkg/beholder' should be placed in the grouped import block (after line 9) with the other external imports, rather than between standard library imports. This violates Go's import grouping convention which separates standard library, external, and internal imports.

Copilot uses AI. Check for mistakes.
@github-actions github-actions bot removed the Stale label Jan 21, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants