mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 21:07:18 +00:00
f75a8efc0d
* rem opts * rem more km opts * more removal of km opts * removal of km opts * definition of internal accounts store * refactor enable/disable * enable build * fix rpc * remove keymanageropts * fix imported tests * table driven tests for enable disable * table driven tests for disable * comprehensive tests for disable * tests complete for enable and disable * pass enable disable tests * clarify imported * fix deadlocks * imported tests pass * remove enable disable entrypoints * better derived text * deep source suggestions * gaz * tidy Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
120 lines
4.3 KiB
Go
120 lines
4.3 KiB
Go
package derived
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/pkg/errors"
|
|
validatorpb "github.com/prysmaticlabs/prysm/proto/validator/accounts/v2"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/validator/accounts/iface"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/imported"
|
|
"github.com/sirupsen/logrus"
|
|
util "github.com/wealdtech/go-eth2-util"
|
|
)
|
|
|
|
var (
|
|
log = logrus.WithField("prefix", "derived-keymanager")
|
|
)
|
|
|
|
const (
|
|
// DerivationPathFormat describes the structure of how keys are derived from a master key.
|
|
DerivationPathFormat = "m / purpose / coin_type / account_index / withdrawal_key / validating_key"
|
|
// ValidatingKeyDerivationPathTemplate defining the hierarchical path for validating
|
|
// keys for Prysm eth2 validators. According to EIP-2334, the format is as follows:
|
|
// m / purpose / coin_type / account_index / withdrawal_key / validating_key
|
|
ValidatingKeyDerivationPathTemplate = "m/12381/3600/%d/0/0"
|
|
)
|
|
|
|
// SetupConfig includes configuration values for initializing
|
|
// a keymanager, such as passwords, the wallet, and more.
|
|
type SetupConfig struct {
|
|
Wallet iface.Wallet
|
|
}
|
|
|
|
// Keymanager implementation for derived, HD keymanager using EIP-2333 and EIP-2334.
|
|
type Keymanager struct {
|
|
importedKM *imported.Keymanager
|
|
}
|
|
|
|
// NewKeymanager instantiates a new derived keymanager from configuration options.
|
|
func NewKeymanager(
|
|
ctx context.Context,
|
|
cfg *SetupConfig,
|
|
) (*Keymanager, error) {
|
|
importedKM, err := imported.NewKeymanager(ctx, &imported.SetupConfig{
|
|
Wallet: cfg.Wallet,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &Keymanager{
|
|
importedKM: importedKM,
|
|
}, nil
|
|
}
|
|
|
|
// RecoverAccountsFromMnemonic given a mnemonic phrase, is able to regenerate N accounts
|
|
// from a derived seed, encrypt them according to the EIP-2334 JSON standard, and write them
|
|
// to disk. Then, the mnemonic is never stored nor used by the validator.
|
|
func (dr *Keymanager) RecoverAccountsFromMnemonic(
|
|
ctx context.Context, mnemonic, mnemonicPassphrase string, numAccounts int,
|
|
) error {
|
|
seed, err := seedFromMnemonic(mnemonic, mnemonicPassphrase)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not initialize new wallet seed file")
|
|
}
|
|
privKeys := make([][]byte, numAccounts)
|
|
pubKeys := make([][]byte, numAccounts)
|
|
for i := 0; i < numAccounts; i++ {
|
|
privKey, err := util.PrivateKeyFromSeedAndPath(
|
|
seed, fmt.Sprintf(ValidatingKeyDerivationPathTemplate, i),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
privKeys[i] = privKey.Marshal()
|
|
pubKeys[i] = privKey.PublicKey().Marshal()
|
|
}
|
|
return dr.importedKM.ImportKeypairs(ctx, privKeys, pubKeys)
|
|
}
|
|
|
|
// ExtractKeystores retrieves the secret keys for specified public keys
|
|
// in the function input, encrypts them using the specified password,
|
|
// and returns their respective EIP-2335 keystores.
|
|
func (dr *Keymanager) ExtractKeystores(
|
|
ctx context.Context, publicKeys []bls.PublicKey, password string,
|
|
) ([]*keymanager.Keystore, error) {
|
|
return dr.importedKM.ExtractKeystores(ctx, publicKeys, password)
|
|
}
|
|
|
|
// ValidatingAccountNames for the derived keymanager.
|
|
func (dr *Keymanager) ValidatingAccountNames(_ context.Context) ([]string, error) {
|
|
return dr.importedKM.ValidatingAccountNames()
|
|
}
|
|
|
|
// Sign signs a message using a validator key.
|
|
func (dr *Keymanager) Sign(ctx context.Context, req *validatorpb.SignRequest) (bls.Signature, error) {
|
|
return dr.importedKM.Sign(ctx, req)
|
|
}
|
|
|
|
// FetchValidatingPublicKeys fetches the list of validating public keys from the keymanager.
|
|
func (dr *Keymanager) FetchValidatingPublicKeys(ctx context.Context) ([][48]byte, error) {
|
|
return dr.importedKM.FetchValidatingPublicKeys(ctx)
|
|
}
|
|
|
|
// FetchAllValidatingPublicKeys fetches the list of all public keys (including disabled ones) from the keymanager.
|
|
func (dr *Keymanager) FetchAllValidatingPublicKeys(ctx context.Context) ([][48]byte, error) {
|
|
return dr.importedKM.FetchAllValidatingPublicKeys(ctx)
|
|
}
|
|
|
|
// FetchValidatingPrivateKeys fetches the list of validating private keys from the keymanager.
|
|
func (dr *Keymanager) FetchValidatingPrivateKeys(ctx context.Context) ([][32]byte, error) {
|
|
return dr.importedKM.FetchValidatingPrivateKeys(ctx)
|
|
}
|
|
|
|
// DeleteAccounts for a derived keymanager.
|
|
func (dr *Keymanager) DeleteAccounts(ctx context.Context, publicKeys [][]byte) error {
|
|
return dr.importedKM.DeleteAccounts(ctx, publicKeys)
|
|
}
|