|
| 1 | +package key_recovery_manager |
| 2 | + |
| 3 | +import ( |
| 4 | + "fmt" |
| 5 | + "github.com/rocket-pool/node-manager-core/beacon" |
| 6 | + "github.com/rocket-pool/node-manager-core/utils" |
| 7 | + "github.com/rocket-pool/smartnode/v2/rocketpool-daemon/common/validator" |
| 8 | + "golang.org/x/exp/maps" |
| 9 | + "strings" |
| 10 | +) |
| 11 | + |
| 12 | +type DryRunKeyRecoveryManager struct { |
| 13 | + manager *validator.ValidatorManager |
| 14 | +} |
| 15 | + |
| 16 | +func NewDryRunKeyRecoveryManager(m *validator.ValidatorManager) *DryRunKeyRecoveryManager { |
| 17 | + return &DryRunKeyRecoveryManager{ |
| 18 | + manager: m, |
| 19 | + } |
| 20 | +} |
| 21 | + |
| 22 | +func (d *DryRunKeyRecoveryManager) RecoverMinipoolKeys() ([]beacon.ValidatorPubkey, map[beacon.ValidatorPubkey]error, error) { |
| 23 | + status, err := d.manager.GetWalletStatus() |
| 24 | + if err != nil { |
| 25 | + return []beacon.ValidatorPubkey{}, map[beacon.ValidatorPubkey]error{}, err |
| 26 | + } |
| 27 | + |
| 28 | + rpNode, mpMgr, err := d.manager.InitializeBindings(status) |
| 29 | + if err != nil { |
| 30 | + return []beacon.ValidatorPubkey{}, map[beacon.ValidatorPubkey]error{}, err |
| 31 | + } |
| 32 | + |
| 33 | + publicKeys, err := d.manager.GetMinipools(rpNode, mpMgr) |
| 34 | + if err != nil { |
| 35 | + return []beacon.ValidatorPubkey{}, map[beacon.ValidatorPubkey]error{}, err |
| 36 | + } |
| 37 | + |
| 38 | + recoveredCustomPublicKeys, unrecoverableCustomPublicKeys, _ := d.checkForAndRecoverCustomKeys(publicKeys) |
| 39 | + recoveredPublicKeys, unrecoverablePublicKeys := d.recoverConventionalKeys(publicKeys) |
| 40 | + |
| 41 | + allRecoveredPublicKeys := []beacon.ValidatorPubkey{} |
| 42 | + allRecoveredPublicKeys = append(allRecoveredPublicKeys, maps.Keys(recoveredCustomPublicKeys)...) |
| 43 | + allRecoveredPublicKeys = append(allRecoveredPublicKeys, recoveredPublicKeys...) |
| 44 | + |
| 45 | + for publicKey, err := range unrecoverablePublicKeys { |
| 46 | + unrecoverableCustomPublicKeys[publicKey] = err |
| 47 | + } |
| 48 | + |
| 49 | + return allRecoveredPublicKeys, unrecoverablePublicKeys, nil |
| 50 | +} |
| 51 | + |
| 52 | +func (d *DryRunKeyRecoveryManager) checkForAndRecoverCustomKeys(publicKeys map[beacon.ValidatorPubkey]bool) (map[beacon.ValidatorPubkey]bool, map[beacon.ValidatorPubkey]error, error) { |
| 53 | + |
| 54 | + recoveredKeys := make(map[beacon.ValidatorPubkey]bool) |
| 55 | + recoveryFailures := make(map[beacon.ValidatorPubkey]error) |
| 56 | + var passwords map[string]string |
| 57 | + |
| 58 | + keyFiles, err := d.manager.LoadFiles() |
| 59 | + if err != nil { |
| 60 | + return recoveredKeys, recoveryFailures, err |
| 61 | + } |
| 62 | + |
| 63 | + if len(keyFiles) > 0 { |
| 64 | + passwords, err = d.manager.LoadCustomKeyPasswords() |
| 65 | + if err != nil { |
| 66 | + return recoveredKeys, recoveryFailures, err |
| 67 | + } |
| 68 | + |
| 69 | + for _, file := range keyFiles { |
| 70 | + keystore, err := d.manager.ReadCustomKeystore(file) |
| 71 | + if err != nil { |
| 72 | + continue |
| 73 | + } |
| 74 | + |
| 75 | + if _, exists := publicKeys[keystore.Pubkey]; !exists { |
| 76 | + err := fmt.Errorf("custom keystore for pubkey %s not found in minipool keyset", keystore.Pubkey.Hex()) |
| 77 | + recoveryFailures[keystore.Pubkey] = err |
| 78 | + continue |
| 79 | + } |
| 80 | + |
| 81 | + formattedPublicKey := strings.ToUpper(utils.RemovePrefix(keystore.Pubkey.Hex())) |
| 82 | + password, exists := passwords[formattedPublicKey] |
| 83 | + if !exists { |
| 84 | + err := fmt.Errorf("custom keystore for pubkey %s needs a password, but none was provided", keystore.Pubkey.Hex()) |
| 85 | + recoveryFailures[keystore.Pubkey] = err |
| 86 | + continue |
| 87 | + } |
| 88 | + |
| 89 | + privateKey, err := d.manager.DecryptCustomKeystore(keystore, password) |
| 90 | + if err != nil { |
| 91 | + err := fmt.Errorf("error recreating private key for validator %s: %w", keystore.Pubkey.Hex(), err) |
| 92 | + recoveryFailures[keystore.Pubkey] = err |
| 93 | + continue |
| 94 | + } |
| 95 | + |
| 96 | + reconstructedPublicKey := beacon.ValidatorPubkey(privateKey.PublicKey().Marshal()) |
| 97 | + if reconstructedPublicKey != keystore.Pubkey { |
| 98 | + err := fmt.Errorf("private keystore file %s claims to be for validator %s but it's for validator %s", file.Name(), keystore.Pubkey.Hex(), reconstructedPublicKey.Hex()) |
| 99 | + recoveryFailures[keystore.Pubkey] = err |
| 100 | + continue |
| 101 | + } |
| 102 | + |
| 103 | + recoveredKeys[reconstructedPublicKey] = true |
| 104 | + } |
| 105 | + } |
| 106 | + |
| 107 | + return recoveredKeys, recoveryFailures, nil |
| 108 | +} |
| 109 | + |
| 110 | +func (d *DryRunKeyRecoveryManager) recoverConventionalKeys(publicKeys map[beacon.ValidatorPubkey]bool) ([]beacon.ValidatorPubkey, map[beacon.ValidatorPubkey]error) { |
| 111 | + recoveredPublicKeys := []beacon.ValidatorPubkey{} |
| 112 | + unrecoverablePublicKeys := map[beacon.ValidatorPubkey]error{} |
| 113 | + |
| 114 | + bucketStart := uint64(0) |
| 115 | + for { |
| 116 | + if bucketStart >= bucketLimit { |
| 117 | + break |
| 118 | + } |
| 119 | + bucketEnd := bucketStart + bucketSize |
| 120 | + if bucketEnd > bucketLimit { |
| 121 | + bucketEnd = bucketLimit |
| 122 | + } |
| 123 | + |
| 124 | + keys, err := d.manager.GetValidatorKeys(bucketStart, bucketEnd-bucketStart) |
| 125 | + if err != nil { |
| 126 | + continue |
| 127 | + } |
| 128 | + |
| 129 | + for _, validatorKey := range keys { |
| 130 | + if exists := publicKeys[validatorKey.PublicKey]; exists { |
| 131 | + delete(publicKeys, validatorKey.PublicKey) |
| 132 | + recoveredPublicKeys = append(recoveredPublicKeys, validatorKey.PublicKey) |
| 133 | + } else { |
| 134 | + err := fmt.Errorf("keystore for pubkey %s not found in minipool keyset", validatorKey.PublicKey) |
| 135 | + unrecoverablePublicKeys[validatorKey.PublicKey] = err |
| 136 | + continue |
| 137 | + } |
| 138 | + } |
| 139 | + |
| 140 | + if len(publicKeys) == 0 { |
| 141 | + // All keys have been recovered. |
| 142 | + break |
| 143 | + } |
| 144 | + |
| 145 | + bucketStart = bucketEnd |
| 146 | + } |
| 147 | + |
| 148 | + return recoveredPublicKeys, unrecoverablePublicKeys |
| 149 | +} |
0 commit comments