mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-17 23:38:46 +00:00
2c9474ab7f
* begin on the proto definitions * define remote signer service protos * basic implementation * remote keymanager docs * finalize remote client doc * amend response * fix proto defs * test new and begin test sign * test sign done * Merge branch 'master' into remote-keymanager-v2 * remote oneof * rename * Merge branch 'remote-keymanager-v2' of github.com:prysmaticlabs/prysm into remote-keymanager-v2 * fix build * Merge refs/heads/master into remote-keymanager-v2 * viz * Merge branch 'remote-keymanager-v2' of github.com:prysmaticlabs/prysm into remote-keymanager-v2 * Merge refs/heads/master into remote-keymanager-v2 * Merge refs/heads/master into remote-keymanager-v2 * Update validator/keymanager/v2/remote/remote_test.go Co-authored-by: Ivan Martinez <ivanthegreatdev@gmail.com> * Update validator/accounts/v2/wallet.go Co-authored-by: Ivan Martinez <ivanthegreatdev@gmail.com> * fmt
43 lines
1.1 KiB
Go
43 lines
1.1 KiB
Go
package testing
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
|
|
validatorpb "github.com/prysmaticlabs/prysm/proto/validator/accounts/v2"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
)
|
|
|
|
// MockKeymanager --
|
|
type MockKeymanager struct {
|
|
ConfigFileContents []byte
|
|
PublicKeys [][48]byte
|
|
PubkeystoSecretKeys map[[48]byte]bls.SecretKey
|
|
}
|
|
|
|
// CreateAccount --
|
|
func (m *MockKeymanager) CreateAccount(ctx context.Context, password string) (string, error) {
|
|
return "", nil
|
|
}
|
|
|
|
// MarshalConfigFile --
|
|
func (m *MockKeymanager) MarshalConfigFile(ctx context.Context) ([]byte, error) {
|
|
return m.ConfigFileContents, nil
|
|
}
|
|
|
|
// FetchValidatingPublicKeys --
|
|
func (m *MockKeymanager) FetchValidatingPublicKeys(ctx context.Context) ([][48]byte, error) {
|
|
return m.PublicKeys, nil
|
|
}
|
|
|
|
// Sign --
|
|
func (m *MockKeymanager) Sign(ctx context.Context, req *validatorpb.SignRequest) (bls.Signature, error) {
|
|
pubKey := bytesutil.ToBytes48(req.PublicKey)
|
|
secretKey, ok := m.PubkeystoSecretKeys[pubKey]
|
|
if !ok {
|
|
return nil, errors.New("no secret key found")
|
|
}
|
|
return secretKey.Sign(req.SigningRoot), nil
|
|
}
|