Skip to content
This repository has been archived by the owner on Jun 3, 2020. It is now read-only.

Implement chain-specific keyrings (closes #231, #111) #232

Merged
merged 1 commit into from Apr 19, 2019

Conversation

tarcieri
Copy link
Contributor

@tarcieri tarcieri commented Apr 18, 2019

Moves from a single global keyring to chain-specific keyrings, where keys/signers can be potentially shared across chains if desired.

This enables true multitenancy for supporting multiple chains with a single KMS instance, and resolves lingering questions around the access control model, namely that each connection has an associated chain ID, and signing operations are isolated to that chain's keyring.

Moves from a single global keyring to chain-specific keyrings, where
keys/signers can be potentially shared across chains if desired.

This enables true multitenancy for supporting multiple chains with a
single KMS instance, and reloves lingering questions around the access
control model, namely that each connection has an associated chain ID,
and signing operations are isolated to that chain's keyring.
@liangping
Copy link

awesome. save a lot of money for us.

Copy link
Contributor

@liamsi liamsi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

utACK

@tarcieri tarcieri merged commit 74e934b into master Apr 19, 2019
@tarcieri tarcieri deleted the chain-specific-keyrings branch April 19, 2019 21:16
@tarcieri tarcieri mentioned this pull request Jul 30, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants