-
Notifications
You must be signed in to change notification settings - Fork 22
/
admin_untaint_key.go
105 lines (85 loc) · 3.03 KB
/
admin_untaint_key.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
// Copyright (C) 2023 Gobalsky Labs Limited
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as
// published by the Free Software Foundation, either version 3 of the
// License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package api
import (
"context"
"fmt"
"code.vegaprotocol.io/vega/libs/jsonrpc"
"github.com/mitchellh/mapstructure"
)
type AdminUntaintKeyParams struct {
Wallet string `json:"wallet"`
PublicKey string `json:"publicKey"`
}
type AdminUntaintKey struct {
walletStore WalletStore
}
// Handle marks the specified public key as tainted. It makes it unusable for
// transaction signing.
func (h *AdminUntaintKey) Handle(ctx context.Context, rawParams jsonrpc.Params) (jsonrpc.Result, *jsonrpc.ErrorDetails) {
params, err := validateUntaintKeyParams(rawParams)
if err != nil {
return nil, InvalidParams(err)
}
if exist, err := h.walletStore.WalletExists(ctx, params.Wallet); err != nil {
return nil, InternalError(fmt.Errorf("could not verify the wallet exists: %w", err))
} else if !exist {
return nil, InvalidParams(ErrWalletDoesNotExist)
}
alreadyUnlocked, err := h.walletStore.IsWalletAlreadyUnlocked(ctx, params.Wallet)
if err != nil {
return nil, InternalError(fmt.Errorf("could not verify whether the wallet is already unlock or not: %w", err))
}
if !alreadyUnlocked {
return nil, RequestNotPermittedError(ErrWalletIsLocked)
}
w, err := h.walletStore.GetWallet(ctx, params.Wallet)
if err != nil {
return nil, InternalError(fmt.Errorf("could not retrieve the wallet: %w", err))
}
if !w.HasPublicKey(params.PublicKey) {
return nil, InvalidParams(ErrPublicKeyDoesNotExist)
}
if err := w.UntaintKey(params.PublicKey); err != nil {
return nil, InternalError(fmt.Errorf("could not remove the taint from the key: %w", err))
}
if err := h.walletStore.UpdateWallet(ctx, w); err != nil {
return nil, InternalError(fmt.Errorf("could not save the wallet: %w", err))
}
return nil, nil
}
func validateUntaintKeyParams(rawParams jsonrpc.Params) (AdminUntaintKeyParams, error) {
if rawParams == nil {
return AdminUntaintKeyParams{}, ErrParamsRequired
}
params := AdminUntaintKeyParams{}
if err := mapstructure.Decode(rawParams, ¶ms); err != nil {
return AdminUntaintKeyParams{}, ErrParamsDoNotMatch
}
if params.Wallet == "" {
return AdminUntaintKeyParams{}, ErrWalletIsRequired
}
if params.PublicKey == "" {
return AdminUntaintKeyParams{}, ErrPublicKeyIsRequired
}
return params, nil
}
func NewAdminUntaintKey(
walletStore WalletStore,
) *AdminUntaintKey {
return &AdminUntaintKey{
walletStore: walletStore,
}
}