Documentation ¶
Index ¶
- Variables
- func GetFieldNameForKey(unknownKey Key) (string, error)
- func NewInMemory(db *sqlx.DB, scryptParams utils.ScryptParams, lggr logger.Logger, ...) *master
- func NewORM(db *sqlx.DB, lggr logger.Logger, cfg pg.QConfig) ksORM
- type CSA
- type DKGEncrypt
- type DKGSign
- type DefaultEVMChainIDFunc
- type Eth
- type Key
- type KeyNotFoundError
- type LegacyKeyStorage
- type Master
- type ORM
- type VRF
Constants ¶
This section is empty.
Variables ¶
var ( ErrLocked = errors.New("Keystore is locked") ErrKeyNotFound = errors.New("Key not found") ErrKeyExists = errors.New("Key already exists") )
var ErrCSAKeyExists = errors.New("can only have 1 CSA key")
ErrCSAKeyExists describes the error when the CSA key already exists
var (
ErrMissingVRFKey = errors.New("unable to find VRF key")
)
Functions ¶
func GetFieldNameForKey ¶
func NewInMemory ¶
func NewInMemory(db *sqlx.DB, scryptParams utils.ScryptParams, lggr logger.Logger, cfg pg.QConfig) *master
NewInMemory sets up a keystore which NOOPs attempts to access the `encrypted_key_rings` table. Accessing `evm.key_states` will still hit the DB.
Types ¶
type CSA ¶
type CSA interface { Get(id string) (csakey.KeyV2, error) GetAll() ([]csakey.KeyV2, error) Create() (csakey.KeyV2, error) Add(key csakey.KeyV2) error Delete(id string) (csakey.KeyV2, error) Import(keyJSON []byte, password string) (csakey.KeyV2, error) Export(id string, password string) ([]byte, error) EnsureKey() error }
type CSAKeystoreInterface interface {
type DKGEncrypt ¶
type DKGEncrypt interface { Get(id string) (dkgencryptkey.Key, error) GetAll() ([]dkgencryptkey.Key, error) Create() (dkgencryptkey.Key, error) Add(key dkgencryptkey.Key) error Delete(id string) (dkgencryptkey.Key, error) Import(keyJSON []byte, password string) (dkgencryptkey.Key, error) Export(id string, password string) ([]byte, error) EnsureKey() error }
DKGEncrypt provides encryption keys for the DKG.
type DKGSign ¶
type DKGSign interface { Get(id string) (dkgsignkey.Key, error) GetAll() ([]dkgsignkey.Key, error) Create() (dkgsignkey.Key, error) Add(key dkgsignkey.Key) error Delete(id string) (dkgsignkey.Key, error) Import(keyJSON []byte, password string) (dkgsignkey.Key, error) Export(id string, password string) ([]byte, error) EnsureKey() error }
DKGSign provides signing keys for the DKG.
type DefaultEVMChainIDFunc ¶
DefaultEVMChainIDFunc is a func for getting a default evm chain ID - necessary because it is lazily evaluated
type Eth ¶
type Eth interface { Get(id string) (ethkey.KeyV2, error) GetAll() ([]ethkey.KeyV2, error) Create(chainIDs ...*big.Int) (ethkey.KeyV2, error) Delete(id string) (ethkey.KeyV2, error) Import(keyJSON []byte, password string, chainIDs ...*big.Int) (ethkey.KeyV2, error) Export(id string, password string) ([]byte, error) Enable(address common.Address, chainID *big.Int, qopts ...pg.QOpt) error Disable(address common.Address, chainID *big.Int, qopts ...pg.QOpt) error Add(address common.Address, chainID *big.Int, qopts ...pg.QOpt) error EnsureKeys(chainIDs ...*big.Int) error SubscribeToKeyChanges() (ch chan struct{}, unsub func()) SignTx(fromAddress common.Address, tx *types.Transaction, chainID *big.Int) (*types.Transaction, error) EnabledKeysForChain(chainID *big.Int) (keys []ethkey.KeyV2, err error) GetRoundRobinAddress(chainID *big.Int, addresses ...common.Address) (address common.Address, err error) CheckEnabled(address common.Address, chainID *big.Int) error GetState(id string, chainID *big.Int) (ethkey.State, error) GetStatesForKeys([]ethkey.KeyV2) ([]ethkey.State, error) GetStateForKey(ethkey.KeyV2) (ethkey.State, error) GetStatesForChain(chainID *big.Int) ([]ethkey.State, error) EnabledAddressesForChain(chainID *big.Int) (addresses []common.Address, err error) XXXTestingOnlySetState(ethkey.State) XXXTestingOnlyAdd(key ethkey.KeyV2) }
Eth is the external interface for EthKeyStore
type KeyNotFoundError ¶
KeyNotFoundError is returned when we don't find a requested key
func (KeyNotFoundError) Error ¶
func (e KeyNotFoundError) Error() string
type LegacyKeyStorage ¶
type LegacyKeyStorage struct {
// contains filtered or unexported fields
}
func (*LegacyKeyStorage) StoreUnsupported ¶
func (k *LegacyKeyStorage) StoreUnsupported(allRawKeysJson []byte, keyRing *keyRing) error
StoreUnsupported will store the raw keys that no longer have support in the node it will check if raw json contains keys that have not been added to the key ring and stores them internally
func (*LegacyKeyStorage) UnloadUnsupported ¶
func (k *LegacyKeyStorage) UnloadUnsupported(supportedRawKeyRingJson []byte) ([]byte, error)
UnloadUnsupported will inject the unsupported keys into the raw key ring json
type Master ¶
type VRF ¶
type VRF interface { Get(id string) (vrfkey.KeyV2, error) GetAll() ([]vrfkey.KeyV2, error) Create() (vrfkey.KeyV2, error) Add(key vrfkey.KeyV2) error Delete(id string) (vrfkey.KeyV2, error) Import(keyJSON []byte, password string) (vrfkey.KeyV2, error) Export(id string, password string) ([]byte, error) GenerateProof(id string, seed *big.Int) (vrfkey.Proof, error) }