From ad019f0e5aeca668e2d9244776c01fc791fd61a4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Cl=C3=A9ment=20=27birdy=27=20Danjou?= Date: Thu, 8 Feb 2024 11:36:45 +0100 Subject: [PATCH] fix: move KmsEndpointAddr to precompiles to avoid touching generated files --- fhevm/precompiles.go | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/fhevm/precompiles.go b/fhevm/precompiles.go index 483af34..e6bb4ba 100644 --- a/fhevm/precompiles.go +++ b/fhevm/precompiles.go @@ -10,6 +10,7 @@ import ( "fmt" "math/big" "math/bits" + "os" "time" "github.com/ethereum/go-ethereum/common" @@ -30,7 +31,8 @@ type PrecompiledContract interface { RequiredGas(environment *EVMEnvironment, input []byte) uint64 // RequiredGas calculates the contract gas use Run(environment *EVMEnvironment, caller common.Address, addr common.Address, input []byte, readOnly bool) (ret []byte, err error) } - +// URL of the KMS gRPC endpoint +var KmsEndpointAddr = os.Getenv("KMS_ENDPOINT_ADDR") var signatureFheAdd = makeKeccakSignature("fheAdd(uint256,uint256,bytes1)") var signatureCast = makeKeccakSignature("cast(uint256,bytes1)") var signatureDecrypt = makeKeccakSignature("decrypt(uint256)") @@ -2118,7 +2120,7 @@ func reencryptRun(environment EVMEnvironment, caller common.Address, addr common Proof: proof, } - conn, err := grpc.Dial(kms.KmsEndpointAddr, grpc.WithTransportCredentials(insecure.NewCredentials())) + conn, err := grpc.Dial(KmsEndpointAddr, grpc.WithTransportCredentials(insecure.NewCredentials())) if err != nil { return nil, errors.New("kms unreachable") } @@ -2247,7 +2249,7 @@ func decryptValue(environment EVMEnvironment, ct *tfheCiphertext) (uint64, error Proof: proof, } - conn, err := grpc.Dial(kms.KmsEndpointAddr, grpc.WithTransportCredentials(insecure.NewCredentials())) + conn, err := grpc.Dial(KmsEndpointAddr, grpc.WithTransportCredentials(insecure.NewCredentials())) if err != nil { return 0, errors.New("kms unreachable") }