-
Notifications
You must be signed in to change notification settings - Fork 260
Add signer-proxy as a recommended solution for AWS KMS or YubiHSM key management #1280
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
✅ Deploy Preview for docs-optimism ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
📝 WalkthroughWalkthroughThe pull request introduces additional documentation for key management in chain operators, specifically expanding the "Hot wallets" section of the key-management page. The new content focuses on the use of an open-source tool called "signer-proxy" that enables integration with AWS Key Management Service (KMS) and YubiHSM2 hardware security modules. The documentation provides technical details about how the signer-proxy tool connects to these key management systems and offers an endpoint compatible with the Sequence DiagramsequenceDiagram
participant Client
participant SignerProxy
participant AWS KMS/YubiHSM2
Client->>SignerProxy: eth_signTransaction request
SignerProxy->>AWS KMS/YubiHSM2: Request transaction signing
AWS KMS/YubiHSM2-->>SignerProxy: Signed transaction
SignerProxy-->>Client: Return signed transaction
This sequence diagram illustrates the workflow of the signer-proxy tool, showing how transaction signing requests are securely processed through AWS KMS or YubiHSM2 key management systems. Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
Documentation and Community
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (1)
pages/builders/chain-operators/management/key-management.mdx (1)
29-32
: Enhance the signer-proxy documentation section.While technically accurate, this section could be more helpful with the following improvements:
- Specify the primary purpose upfront (e.g., "To secure your privileged role keys...")
- Combine the two paragraphs to avoid repetition
- Add basic setup instructions or configuration guidance
Consider this revision:
-If you intend to manage your keys using AWS KMS or YubiHSM2, you can use [signer-proxy](https://github.com/upnodedev/signer-proxy). - -[signer-proxy](https://github.com/upnodedev/signer-proxy) is an open-source tool that connects to your AWS KMS or YubiHSM2 backend and exposes an endpoint compatible with the `eth_signTransaction` RPC method. +To secure privileged role keys using AWS KMS or YubiHSM2, use [signer-proxy](https://github.com/upnodedev/signer-proxy). This open-source tool connects to your key management backend and provides an `eth_signTransaction` RPC endpoint. To get started: + +1. Install and configure signer-proxy +2. Configure your OP Stack services to use the signer-proxy RPC server +3. Follow the security best practices in the signer-proxy documentation
📜 Review details
Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (1)
pages/builders/chain-operators/management/key-management.mdx
(1 hunks)
🧰 Additional context used
📓 Path-based instructions (1)
pages/builders/chain-operators/management/key-management.mdx (1)
Pattern **/*.mdx
: "ALWAYS review Markdown content THOROUGHLY with the following criteria:
- Use proper nouns in place of personal pronouns like 'We' and 'Our' to maintain consistency in communal documentation.
- Avoid gender-specific language and use the imperative form.
- Monitor capitalization for emphasis. Avoid using all caps, italics, or bold for emphasis.
- Ensure proper nouns are capitalized in sentences.
- Apply the Oxford comma.
- Use proper title case for buttons, tab names, page names, and links. Sentence case should be used for body content and short phrases, even in links.
- Use correct spelling and grammar at all times (IMPORTANT).
- For H1, H2, and H3 headers:
- Use sentence case, capitalizing only the first word.
- Preserve the capitalization of proper nouns, technical terms, and acronyms as defined in the 'nouns.txt' file located in the root directory of the project.
- Do not automatically lowercase words that appear in the 'nouns.txt' file, regardless of their position in the header.
- Flag any headers that seem to inconsistently apply these rules for manual review.
- When reviewing capitalization, always refer to the 'nouns.txt' file for the correct capitalization of proper nouns and technical terms specific to the project.
"
⏰ Context from checks skipped due to timeout of 90000ms (3)
- GitHub Check: Redirect rules - docs-optimism
- GitHub Check: Header rules - docs-optimism
- GitHub Check: Pages changed - docs-optimism
🔇 Additional comments (1)
pages/builders/chain-operators/management/key-management.mdx (1)
Line range hint
1-24
: Document structure and formatting look good!The document follows proper heading hierarchy, uses correct sentence case in headers, and maintains consistent capitalization of technical terms.
Also applies to: 33-47
🧰 Tools
🪛 LanguageTool
[style] ~26-~26: ‘in conjunction with’ might be wordy. Consider a shorter alternative.
Context: ...tions configurations. This can be used in conjunction with theeth_signTransaction
RPC method. ...(EN_WORDINESS_PREMIUM_IN_CONJUNCTION_WITH)
Hi @bradleycamacho @sbvegan we would like to discuss on getting this pull request merged. Do you have any recommendation or should we move our Readme.md to this key management page? |
Description
We have developed signer-proxy, an open-source tool that connects AWS KMS or YubiHSM2 backend and exposes an endpoint compatible with the
eth_signTransaction
RPC method.This enables OP Stack chain operators to easily use AWS KMS or YubiHSM2 to secure their key for privileged roles by just launching the signer-proxy server and configure OP Stack services according to use signer-proxy RPC server instead.
This pull request add recommendation to use signer-proxy in the Key Management page.
Additional context
Our grant proposal: https://app.charmverse.io/op-grants/research-on-using-yubihsm-and-aws-kms-hardware-signer-on-op-stack-41211765826072866
Retro Funding 5: https://round5.retrolist.app/project/0xd4ed99cc6aaf73ca63b32f7a03b5427ac1d2955bf9efc31eb14f5773016988d0
Metadata