Is that so the events on the signer relay doesnt reveal the user pubkey? So is NostrSigner::pubic_key the signer pubkey or the user pubkey? I cache the user pubkey locally so I'd like to optionally supply this (any the signer pubkey if i need to store this too) to prevent blocking if reusing the signer info. If the user info gets changed I'd like it to error when signing.
Discussion
In new version (for now in master branch) `NostrSigner::public_key` return the user public key.
In the last release depends by the signer, but during my tests I saw that the same key is used (so the signer key match the user one), at least in amber and nsec.app.
Ok, ill check it out but it looks like I have some refactoring to do now that NostrSigner is now a dynamic trait.
Please also check part 2 of the last upgrade, might be easier to read and add some clarifications: https://github.com/nostr-protocol/nips/pull/1553
Thanks!
I'm finding that with v36 `NostrConnect::new()` is blocking until the remote signer responds to a request for the public key.
```
let signer = Arc::new(NostrConnect::new(
uri,
nostr::Keys::from_str(app_key).context("invalid app key")?,
Duration::from_secs(10 * 60),
None,
)?);
```
I realised that it was blocking elsewhere. But it would be save a trip if I could supply the user public key if it was known to prevent this from becoming blocking.
I've added `NostrConnect::set_user_public_key` at commit ce05916f4acef2351e6ab648e4e7296a6d10f8d9
thanks. I've suggested so `bootstrap` shouldn't fail after `set_user_public_key` is called.