Skip to content

Commit

Permalink
Update description to more closely follow jwt-secret spec
Browse files Browse the repository at this point in the history
  • Loading branch information
nflaig committed Mar 28, 2024
1 parent eb0db88 commit 2dc07ed
Showing 1 changed file with 6 additions and 5 deletions.
11 changes: 6 additions & 5 deletions keymanager-oapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,11 +12,12 @@ info:
All requests by default send and receive JSON, and as such should have either or both of the "Content-Type: application/json"
and "Accept: application/json" headers.
All sensitive routes are to be authenticated with a token. This token should be provided by the user via a secure channel:
- Log the token file path to stdout when running the binary with the key manager API enabled
- Read the token from a file available to the binary, the path to the token file should be configurable
- If the token file does not exist or is empty, generate a new token and write it to the file
- The token should remain the same across multiple restarts of the binary
All sensitive routes MUST be authenticated with a token.
The keymanager binary SHOULD accept a configuration parameter: `token-file`, which designates a file containing the hex-encoded token
of at least 256 bits. If such a parameter is not given, the client SHOULD generate such a token and write it to a file, to be reused
across multiple restarts of the binary. If such a parameter is given, but the file or token cannot be read, the client SHOULD treat this
as an error: either abort the startup, or show the error and continue without exposing the keymanager routes.
version: "v1.0.0"
contact:
name: Ethereum Github
Expand Down

0 comments on commit 2dc07ed

Please sign in to comment.