@@ -39,7 +39,8 @@ func (h *DecryptionKeySharesHandler) ValidateMessage(ctx context.Context, msg p2
39
39
}
40
40
41
41
obsKeyperDB := obskeyperdatabase .New (h .dbpool )
42
- keyperSet , err := obsKeyperDB .GetKeyperSetByKeyperConfigIndex (ctx , int64 (keyShares .Eon ))
42
+
43
+ keyperSet , err := obsKeyperDB .GetKeyperSetByKeyperConfigIndex (ctx , int64 (keyShares .Eon )) //nolint:gosec // disable G115
43
44
if err != nil {
44
45
return pubsub .ValidationReject , errors .Wrapf (err ,
45
46
"failed to get keyper set from database for keyper set index %d" ,
@@ -90,19 +91,21 @@ func (h *DecryptionKeySharesHandler) HandleMessage(ctx context.Context, msg p2pm
90
91
91
92
identitiesHash := computeIdentitiesHashFromShares (keyShares .Shares )
92
93
err := serviceDB .InsertDecryptionSignature (ctx , database.InsertDecryptionSignatureParams {
93
- Eon : int64 (keyShares .Eon ),
94
- KeyperIndex : int64 (keyShares .KeyperIndex ),
94
+ Eon : int64 (keyShares .Eon ), //nolint:gosec // disable G115
95
+ KeyperIndex : int64 (keyShares .KeyperIndex ), //nolint:gosec // disable G115
95
96
IdentitiesHash : identitiesHash ,
96
97
Signature : extra .Signature ,
97
98
})
98
99
if err != nil {
99
100
return []p2pmsg.Message {}, errors .Wrap (err , "failed to insert vote" )
100
101
}
101
102
102
- keyperSet , err := obsKeyperDB .GetKeyperSetByKeyperConfigIndex (ctx , int64 (keyShares .Eon ))
103
+ keyperSet , err := obsKeyperDB .GetKeyperSetByKeyperConfigIndex (ctx , int64 (keyShares .Eon )) //nolint:gosec // disable G115
103
104
if err != nil {
104
105
return []p2pmsg.Message {}, errors .Wrapf (err , "failed to get keyper set from database for index %d" , keyShares .Eon )
105
106
}
107
+
108
+ //nolint:gosec // disable G115
106
109
signatures , err := serviceDB .GetDecryptionSignatures (ctx , database.GetDecryptionSignaturesParams {
107
110
Eon : int64 (keyShares .Eon ),
108
111
IdentitiesHash : identitiesHash ,
@@ -117,6 +120,7 @@ func (h *DecryptionKeySharesHandler) HandleMessage(ctx context.Context, msg p2pm
117
120
keys := []* p2pmsg.Key {}
118
121
for _ , share := range keyShares .GetShares () {
119
122
decryptionKeyDB , err := keyperCoreDB .GetDecryptionKey (ctx , corekeyperdatabase.GetDecryptionKeyParams {
123
+ //nolint:gosec // disable G115
120
124
Eon : int64 (keyShares .Eon ),
121
125
EpochID : share .IdentityPreimage ,
122
126
})
@@ -132,6 +136,7 @@ func (h *DecryptionKeySharesHandler) HandleMessage(ctx context.Context, msg p2pm
132
136
signerIndices := []uint64 {}
133
137
signaturesCum := [][]byte {}
134
138
for _ , signature := range signatures {
139
+ //nolint:gosec // disable G115
135
140
signerIndices = append (signerIndices , uint64 (signature .KeyperIndex ))
136
141
signaturesCum = append (signaturesCum , signature .Signature )
137
142
}
@@ -170,6 +175,7 @@ func validateSignerIndices(extra *p2pmsg.ShutterServiceDecryptionKeysExtra, n in
170
175
return pubsub .ValidationReject , errors .New ("signer indices not ordered" )
171
176
}
172
177
}
178
+ //nolint:gosec // disable G115
173
179
if signerIndex >= uint64 (n ) {
174
180
return pubsub .ValidationReject , errors .New ("signer index out of range" )
175
181
}
@@ -182,6 +188,7 @@ func ValidateDecryptionKeysSignatures(
182
188
extra * p2pmsg.ShutterServiceDecryptionKeysExtra ,
183
189
keyperSet * obskeyperdatabase.KeyperSet ,
184
190
) (pubsub.ValidationResult , error ) {
191
+ //nolint:gosec // disable G115
185
192
if int32 (len (extra .SignerIndices )) != keyperSet .Threshold {
186
193
return pubsub .ValidationReject , errors .Errorf ("expected %d signers, got %d" , keyperSet .Threshold , len (extra .SignerIndices ))
187
194
}
@@ -230,6 +237,7 @@ func (h *DecryptionKeysHandler) ValidateMessage(ctx context.Context, msg p2pmsg.
230
237
}
231
238
232
239
obsKeyperDB := obskeyperdatabase .New (h .dbpool )
240
+ //nolint:gosec // disable G115
233
241
keyperSet , err := obsKeyperDB .GetKeyperSetByKeyperConfigIndex (ctx , int64 (keys .Eon ))
234
242
if err != nil {
235
243
return pubsub .ValidationReject , errors .Wrapf (err , "failed to get keyper set from database for eon %d" , keys .Eon )
@@ -256,8 +264,9 @@ func (h *DecryptionKeysHandler) HandleMessage(ctx context.Context, msg p2pmsg.Me
256
264
identitiesHash := computeIdentitiesHash (identityPreimages )
257
265
for i , keyperIndex := range extra .SignerIndices {
258
266
err := serviceDB .InsertDecryptionSignature (ctx , database.InsertDecryptionSignatureParams {
267
+ //nolint:gosec // disable G115
259
268
Eon : int64 (keys .Eon ),
260
- KeyperIndex : int64 (keyperIndex ),
269
+ KeyperIndex : int64 (keyperIndex ), //nolint:gosec // disable G115
261
270
IdentitiesHash : identitiesHash ,
262
271
Signature : extra .Signature [i ],
263
272
})
0 commit comments