From 2275dec5a00a9a174cf119bcecbbfbdb3ac8f641 Mon Sep 17 00:00:00 2001 From: Pete Date: Fri, 17 Jan 2025 09:33:57 -0600 Subject: [PATCH] yarn format --- .../data-availability-committees/02-deploy-das.mdx | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/arbitrum-docs/run-arbitrum-node/data-availability-committees/02-deploy-das.mdx b/arbitrum-docs/run-arbitrum-node/data-availability-committees/02-deploy-das.mdx index 8e8f4a634..0cb6f5636 100644 --- a/arbitrum-docs/run-arbitrum-node/data-availability-committees/02-deploy-das.mdx +++ b/arbitrum-docs/run-arbitrum-node/data-availability-committees/02-deploy-das.mdx @@ -422,15 +422,19 @@ Finally, as explained in the previous section, if you're also running a mirror D By default the batch poster uses the same ECDSA key to sign `das_store` requests as it uses to sign the batch transactions sent to the sequencer inbox contract. Many installations use an external signer for securing the batch poster's key. While using an external signer is suported for signing batch transactions, it is not currently supported for signing the requests sent to the DA Committee. Currently, if you want to use an external signer for the batch transactions together with AnyTrust, you must generate a separate key for signing the requests sent to the DA Committee. If a wallet file is used the account must be named "l1-batch-poster". The batch poster would need to have the configuration for the external signer + ``` --node.batch-poster.data-poster.external-signer... ``` + and the configuration for the key which is only used for signing DA Committee requests. + ``` --node.batch-poster.parent-chain-wallet... ``` The Committee servers would need to additionaly specify the public key to accept signed messages from. + ``` --data-availability.extra-signature-checking-public-key ```