mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-24 20:37:17 +00:00
5ff9ae2108
* Move to keymanager * Move to keymanager * Merge branch 'keymanager' of github.com:mcdee/prysm into keymanager * Lint * Fix visibility * Bazel fix * Merge remote-tracking branch 'upstream/master' into keymanager * logrus->log * Merge branch 'master' into keymanager * Merge remote-tracking branch 'upstream/master' into keymanager * Merge branch 'master' into keymanager * Merge branch 'master' into keymanager * Merge branch 'master' into keymanager * Merge branch 'master' into keymanager * Fix test after merge * Merge branch 'master' into keymanager * And again
47 lines
1.4 KiB
Go
47 lines
1.4 KiB
Go
package keymanager
|
|
|
|
import (
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
)
|
|
|
|
// Direct is a key manager that holds all secret keys directly.
|
|
type Direct struct {
|
|
// Key to the map is the bytes of the public key.
|
|
publicKeys map[[48]byte]*bls.PublicKey
|
|
// Key to the map is the bytes of the public key.
|
|
secretKeys map[[48]byte]*bls.SecretKey
|
|
}
|
|
|
|
// NewDirect creates a new direct key manager from the secret keys provided to it.
|
|
func NewDirect(sks []*bls.SecretKey) *Direct {
|
|
res := &Direct{
|
|
publicKeys: make(map[[48]byte]*bls.PublicKey),
|
|
secretKeys: make(map[[48]byte]*bls.SecretKey),
|
|
}
|
|
for _, sk := range sks {
|
|
publicKey := sk.PublicKey()
|
|
pubKey := bytesutil.ToBytes48(publicKey.Marshal())
|
|
res.publicKeys[pubKey] = publicKey
|
|
res.secretKeys[pubKey] = sk
|
|
}
|
|
return res
|
|
}
|
|
|
|
// FetchValidatingKeys fetches the list of public keys that should be used to validate with.
|
|
func (km *Direct) FetchValidatingKeys() ([][48]byte, error) {
|
|
keys := make([][48]byte, 0, len(km.publicKeys))
|
|
for key := range km.publicKeys {
|
|
keys = append(keys, key)
|
|
}
|
|
return keys, nil
|
|
}
|
|
|
|
// Sign signs a message for the validator to broadcast.
|
|
func (km *Direct) Sign(pubKey [48]byte, root [32]byte, domain uint64) (*bls.Signature, error) {
|
|
if secretKey, exists := km.secretKeys[pubKey]; exists {
|
|
return secretKey.Sign(root[:], domain), nil
|
|
}
|
|
return nil, ErrNoSuchKey
|
|
}
|