diff --git a/disperser/apiserver/server.go b/disperser/apiserver/server.go index b6ad332a2..eff6c8ba3 100644 --- a/disperser/apiserver/server.go +++ b/disperser/apiserver/server.go @@ -136,24 +136,7 @@ func (s *DispersalServer) DisperseBlobAuthenticated(stream pb.Disperser_Disperse return api.NewErrorInvalidArg(err.Error()) } - // Get the ethereum address associated with the public key. This is just for convenience so we can put addresses instead of public keys in the allowlist. - // Decode public key - // publicKeyBytes, err := hexutil.Decode(blob.RequestHeader.AccountID) - // if err != nil { - // s.metrics.HandleInvalidArgRpcRequest("DisperseBlobAuthenticated") - // s.metrics.HandleInvalidArgRequest("DisperseBlobAuthenticated") - // return api.NewErrorInvalidArg(fmt.Sprintf("failed to decode account ID (%v): %v", blob.RequestHeader.AccountID, err)) - // } - - // pubKey, err := crypto.UnmarshalPubkey(publicKeyBytes) - // if err != nil { - // s.metrics.HandleInvalidArgRpcRequest("DisperseBlobAuthenticated") - // s.metrics.HandleInvalidArgRequest("DisperseBlobAuthenticated") - // return api.NewErrorInvalidArg(fmt.Sprintf("failed to decode public key (%v): %v", hexutil.Encode(publicKeyBytes), err)) - // } - - // authenticatedAddress := crypto.PubkeyToAddress(*pubKey).String() - authenticatedAddress := blob.RequestHeader.AccountID + authenticatedAddress := blob.RequestHeader.BlobAuthHeader.AccountID // Send back challenge to client challengeBytes := make([]byte, 32)