Skip to content
This repository has been archived by the owner on Apr 5, 2024. It is now read-only.

Commit

Permalink
Deprecate ethsigner (#542)
Browse files Browse the repository at this point in the history
Update readme to make it clear EthSigner is no longer supported

Signed-off-by: Jason Frame <jason.frame@consensys.net>
  • Loading branch information
jframe authored Apr 4, 2024
1 parent 7c0f3ae commit 7a2a1d3
Show file tree
Hide file tree
Showing 4 changed files with 10 additions and 27 deletions.
21 changes: 0 additions & 21 deletions .circleci/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -211,27 +211,6 @@ jobs:
workflows:
version: 2
nightly:
triggers:
- schedule:
cron: "0 17 * * *"
filters:
branches:
only:
- master
jobs:
- build:
context:
- protocols-dockerhub
- dockerScan:
context:
- protocols-dockerhub
- acceptanceTests:
requires:
- build
context:
- protocols-dockerhub
- protocols-signers
default:
jobs:
- build:
Expand Down
6 changes: 5 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,11 @@
# EthSigner
# EthSigner [DEPRECATED]
A transaction signing application to be used with a web3 provider. All questions, queries and other discussion can be found on [Discord].

## ⚠️ Project Deprecation ⚠️
EthSigner is no longer supported. Please migrate to [Web3Signer](https://github.com/ConsenSys/web3signer) which includes all EthSigner functionality.

---

As part of our ongoing commitment to deliver the best remote signing solutions, we are announcing a change in our product offerings.

We have decided to deprecate our EthSigner product to focus our efforts on enhancing [Web3Signer](https://github.com/ConsenSys/web3signer), our newly comprehensive remote signing solution. This is rooted in our strategy to streamline our offerings and focus on a single, robust product that will provide functionality for both transaction and Ethereum validator signing. We hope this makes it applicable to all your use-cases like public Ethereum signing, staking infrastructure offerings, and in private network contexts.
Expand Down
8 changes: 4 additions & 4 deletions gradle/owasp-suppression.xml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="UTF-8"?>
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
<!-- See https://jeremylong.github.io/DependencyCheck/general/suppression.html for examples -->
<suppress until="2024-03-16">
<suppress until="2024-06-16">
<notes><![CDATA[
Suppress CVE-2023-36415 as this should only be applicable on version up to but excluding 1.10.2.
https://github.com/jeremylong/DependencyCheck/issues/5992
Expand All @@ -26,21 +26,21 @@
]]></notes>
<cve>CVE-2020-8908</cve>
</suppress>
<suppress until="2024-03-16">
<suppress until="2024-06-16">
<notes><![CDATA[
FP per issue #6100 - CVE-2023-36052 since it is related to Azure-cli not to the azure-core libraries
]]></notes>
<packageUrl regex="true">^pkg:maven/com\.azure/azure*@*.*$</packageUrl>
<cve>CVE-2023-36052</cve>
</suppress>
<suppress until="2024-03-16">
<suppress until="2024-06-16">
<notes><![CDATA[
CVE relates to attach on gRPC servers (not clients) and is dependent on the Netty version used
]]></notes>
<packageUrl regex="true">^pkg:maven/io\.grpc/grpc\-.*$</packageUrl>
<cve>CVE-2023-44487</cve>
</suppress>
<suppress until="2024-03-16">
<suppress until="2024-06-16">
<notes><![CDATA[
CVE relates to usage hostname verification when using TLS and doesn't apply as we use Tuweni for this
]]></notes>
Expand Down
2 changes: 1 addition & 1 deletion gradle/versions.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ dependencyManagement {

dependency 'io.rest-assured:rest-assured:4.4.0'

dependencySet(group: 'io.vertx', version: '4.4.6') {
dependencySet(group: 'io.vertx', version: '4.4.9') {
entry 'vertx-codegen'
entry 'vertx-core'
entry 'vertx-unit'
Expand Down

0 comments on commit 7a2a1d3

Please sign in to comment.