2024-02-18 01:16:49 +00:00
|
|
|
# beacon_chain
|
2024-01-06 14:26:56 +00:00
|
|
|
# Copyright (c) 2018-2024 Status Research & Development GmbH
|
2022-02-11 20:40:49 +00:00
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
2023-01-20 14:14:37 +00:00
|
|
|
{.push raises: [].}
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
import
|
|
|
|
std/[os, sequtils, times],
|
2023-09-05 20:39:01 +00:00
|
|
|
stew/[byteutils, base10],
|
2022-06-21 08:29:16 +00:00
|
|
|
chronicles,
|
2022-05-31 11:05:15 +00:00
|
|
|
./spec/eth2_apis/rest_beacon_client,
|
2022-02-11 20:40:49 +00:00
|
|
|
./spec/signatures,
|
|
|
|
./validators/keystore_management,
|
|
|
|
"."/[conf, beacon_clock, filepath]
|
|
|
|
|
2023-03-20 11:58:54 +00:00
|
|
|
type
|
|
|
|
ValidatorStorageKind* {.pure.} = enum
|
|
|
|
Keystore, Identifier
|
|
|
|
|
|
|
|
ValidatorStorage* = object
|
|
|
|
case kind: ValidatorStorageKind
|
|
|
|
of ValidatorStorageKind.Keystore:
|
|
|
|
privateKey: ValidatorPrivKey
|
|
|
|
of ValidatorStorageKind.Identifier:
|
|
|
|
ident: ValidatorIdent
|
|
|
|
|
|
|
|
proc getSignedExitMessage(
|
|
|
|
config: BeaconNodeConf,
|
|
|
|
storage: ValidatorStorage,
|
|
|
|
validatorKeyAsStr: string,
|
|
|
|
exitAtEpoch: Epoch,
|
|
|
|
validatorIdx: uint64,
|
|
|
|
fork: Fork,
|
|
|
|
genesis_validators_root: Eth2Digest
|
|
|
|
): SignedVoluntaryExit =
|
|
|
|
|
|
|
|
let signingKey =
|
|
|
|
case storage.kind
|
|
|
|
of ValidatorStorageKind.Identifier:
|
|
|
|
let
|
|
|
|
validatorsDir = config.validatorsDir
|
|
|
|
keystoreDir = validatorsDir / validatorKeyAsStr
|
2022-02-11 20:40:49 +00:00
|
|
|
|
2023-03-20 11:58:54 +00:00
|
|
|
if not dirExists(keystoreDir):
|
|
|
|
echo "The validator keystores directory '" & validatorsDir &
|
|
|
|
"' does not contain a keystore for the selected validator " &
|
|
|
|
"with public key '" & validatorKeyAsStr & "'."
|
|
|
|
quit 1
|
2022-02-11 20:40:49 +00:00
|
|
|
|
2023-03-20 11:58:54 +00:00
|
|
|
let signingItem = loadKeystore(
|
|
|
|
validatorsDir,
|
|
|
|
config.secretsDir,
|
|
|
|
validatorKeyAsStr,
|
|
|
|
config.nonInteractive,
|
|
|
|
nil)
|
2022-02-11 20:40:49 +00:00
|
|
|
|
2023-03-20 11:58:54 +00:00
|
|
|
if signingItem.isNone:
|
|
|
|
fatal "Unable to continue without decrypted signing key"
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
signingItem.get().privateKey
|
|
|
|
|
|
|
|
of ValidatorStorageKind.Keystore:
|
|
|
|
storage.privateKey
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
var signedExit = SignedVoluntaryExit(
|
|
|
|
message: VoluntaryExit(
|
|
|
|
epoch: exitAtEpoch,
|
2023-03-20 11:58:54 +00:00
|
|
|
validator_index: validatorIdx
|
|
|
|
)
|
|
|
|
)
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
signedExit.signature =
|
2023-03-20 11:58:54 +00:00
|
|
|
get_voluntary_exit_signature(fork, genesis_validators_root,
|
|
|
|
signedExit.message,
|
|
|
|
signingKey).toValidatorSig()
|
2022-02-11 20:40:49 +00:00
|
|
|
signedExit
|
|
|
|
|
|
|
|
type
|
|
|
|
ClientExitAction = enum
|
2023-04-25 06:44:01 +00:00
|
|
|
abort = "q"
|
|
|
|
confirm = "I understand the implications of submitting a voluntary exit"
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
proc askForExitConfirmation(): ClientExitAction =
|
|
|
|
template ask(prompt: string): string =
|
|
|
|
try:
|
|
|
|
stdout.write prompt, ": "
|
|
|
|
stdin.readLine()
|
|
|
|
except IOError:
|
|
|
|
fatal "Failed to read user input from stdin"
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
echoP "PLEASE BEWARE!"
|
|
|
|
|
|
|
|
echoP "Publishing a voluntary exit is an irreversible operation! " &
|
|
|
|
"You won't be able to restart again with the same validator."
|
|
|
|
|
|
|
|
echoP "You must keep your validator running for at least 5 epochs " &
|
|
|
|
"(32 minutes) after requesting a validator exit, as you will " &
|
|
|
|
"still be required to perform validator duties until your exit " &
|
|
|
|
"has been processed. The number of epochs could be significantly " &
|
|
|
|
"higher depending on how many other validators are queued to exit."
|
|
|
|
|
|
|
|
echoP "As such, we recommend you keep track of your validator's status " &
|
|
|
|
"using an Eth2 block explorer before shutting down your beacon node."
|
|
|
|
|
|
|
|
var choice = ""
|
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
while not(choice == $ClientExitAction.confirm or
|
|
|
|
choice == $ClientExitAction.abort) :
|
2022-02-11 20:40:49 +00:00
|
|
|
echoP "To proceed to submitting your voluntary exit, please type '" &
|
2023-04-25 06:44:01 +00:00
|
|
|
$ClientExitAction.confirm &
|
2022-02-11 20:40:49 +00:00
|
|
|
"' (without the quotes) in the prompt below and " &
|
|
|
|
"press ENTER or type 'q' to quit."
|
|
|
|
echo ""
|
|
|
|
|
|
|
|
choice = ask "Your choice"
|
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
if choice == $ClientExitAction.confirm:
|
|
|
|
ClientExitAction.confirm
|
2022-02-11 20:40:49 +00:00
|
|
|
else:
|
2023-04-25 06:44:01 +00:00
|
|
|
ClientExitAction.abort
|
2022-02-11 20:40:49 +00:00
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
proc getValidator*(decryptor: var MultipleKeystoresDecryptor,
|
|
|
|
name: string): Result[ValidatorStorage, string] =
|
2023-03-20 11:58:54 +00:00
|
|
|
let ident = ValidatorIdent.decodeString(name)
|
|
|
|
if ident.isErr():
|
|
|
|
if not(isFile(name)):
|
|
|
|
return err($ident.error)
|
2023-04-25 06:44:01 +00:00
|
|
|
let key = decryptor.importKeystoreFromFile(name)
|
2023-03-20 11:58:54 +00:00
|
|
|
if key.isErr():
|
|
|
|
return err(key.error())
|
|
|
|
ok(ValidatorStorage(kind: ValidatorStorageKind.Keystore,
|
|
|
|
privateKey: key.get()))
|
|
|
|
else:
|
|
|
|
ok(ValidatorStorage(kind: ValidatorStorageKind.Identifier,
|
|
|
|
ident: ident.get()))
|
|
|
|
|
2023-06-24 12:27:15 +00:00
|
|
|
func getIdent*(storage: ValidatorStorage): ValidatorIdent =
|
2023-03-20 11:58:54 +00:00
|
|
|
case storage.kind
|
|
|
|
of ValidatorStorageKind.Keystore:
|
|
|
|
ValidatorIdent(kind: ValidatorQueryKind.Key,
|
|
|
|
key: storage.privateKey.toPubKey().toPubKey())
|
|
|
|
of ValidatorStorageKind.Identifier:
|
|
|
|
storage.ident
|
|
|
|
|
2022-02-11 20:40:49 +00:00
|
|
|
proc restValidatorExit(config: BeaconNodeConf) {.async.} =
|
|
|
|
let
|
2024-09-24 04:23:38 +00:00
|
|
|
client =
|
|
|
|
block:
|
|
|
|
let
|
|
|
|
flags = {RestClientFlag.CommaSeparatedArray,
|
|
|
|
RestClientFlag.ResolveAlways}
|
|
|
|
socketFlags = {SocketFlags.TcpNoDelay}
|
|
|
|
|
|
|
|
RestClientRef.new(config.restUrlForExit, flags = flags,
|
|
|
|
socketFlags = socketFlags).valueOr:
|
|
|
|
raise (ref RestError)(msg: $error)
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
stateIdHead = StateIdent(kind: StateQueryKind.Named,
|
|
|
|
value: StateIdentType.Head)
|
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
# Before making any REST requests, we'll make sure that the supplied
|
|
|
|
# inputs are correct:
|
|
|
|
var validators: seq[ValidatorStorage]
|
|
|
|
if config.exitAllValidatorsFlag:
|
|
|
|
var keystoreCache = KeystoreCacheRef.init()
|
|
|
|
for keystore in listLoadableKeystores(config, keystoreCache):
|
|
|
|
validators.add ValidatorStorage(kind: ValidatorStorageKind.Keystore,
|
|
|
|
privateKey: keystore.privateKey)
|
|
|
|
else:
|
|
|
|
var decryptor: MultipleKeystoresDecryptor
|
|
|
|
defer: dispose decryptor
|
2024-03-03 01:04:45 +00:00
|
|
|
for pubkey in config.exitedValidators:
|
2023-04-25 06:44:01 +00:00
|
|
|
let validatorStorage = decryptor.getValidator(pubkey).valueOr:
|
|
|
|
fatal "Incorrect validator index, key or keystore path specified",
|
2024-03-03 01:04:45 +00:00
|
|
|
value = pubkey, reason = error
|
2023-04-25 06:44:01 +00:00
|
|
|
quit 1
|
|
|
|
validators.add validatorStorage
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
let genesis = try:
|
|
|
|
let response = await client.getGenesisPlain()
|
|
|
|
if response.status == 200:
|
|
|
|
let genesis = decodeBytes(GetGenesisResponse,
|
|
|
|
response.data,
|
|
|
|
response.contentType)
|
|
|
|
if genesis.isErr():
|
|
|
|
raise newException(RestError, $genesis.error)
|
|
|
|
genesis.get().data
|
|
|
|
else:
|
|
|
|
raiseGenericError(response)
|
2023-03-20 11:58:54 +00:00
|
|
|
except CatchableError as exc:
|
2022-02-11 20:40:49 +00:00
|
|
|
fatal "Failed to obtain the genesis validators root of the network",
|
2023-03-20 11:58:54 +00:00
|
|
|
reason = exc.msg
|
2022-02-11 20:40:49 +00:00
|
|
|
quit 1
|
|
|
|
|
2023-06-24 12:27:15 +00:00
|
|
|
let currentEpoch = block:
|
2022-02-11 20:40:49 +00:00
|
|
|
let
|
2024-01-06 14:26:56 +00:00
|
|
|
beaconClock = BeaconClock.init(genesis.genesis_time).valueOr:
|
|
|
|
error "Server returned invalid genesis time", genesis
|
|
|
|
quit 1
|
|
|
|
|
2022-02-11 20:40:49 +00:00
|
|
|
time = getTime()
|
|
|
|
slot = beaconClock.toSlot(time).slot
|
2023-06-24 12:27:15 +00:00
|
|
|
Epoch(slot.uint64 div 32)
|
|
|
|
|
|
|
|
let exitAtEpoch = if config.exitAtEpoch.isSome:
|
|
|
|
Epoch config.exitAtEpoch.get
|
|
|
|
else:
|
|
|
|
currentEpoch
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
let fork = try:
|
|
|
|
let response = await client.getStateForkPlain(stateIdHead)
|
|
|
|
if response.status == 200:
|
|
|
|
let fork = decodeBytes(GetStateForkResponse,
|
|
|
|
response.data,
|
|
|
|
response.contentType)
|
|
|
|
if fork.isErr():
|
|
|
|
raise newException(RestError, $fork.error)
|
|
|
|
fork.get().data
|
|
|
|
else:
|
|
|
|
raiseGenericError(response)
|
2023-03-20 11:58:54 +00:00
|
|
|
except CatchableError as exc:
|
2022-02-11 20:40:49 +00:00
|
|
|
fatal "Failed to obtain the fork id of the head state",
|
2023-03-20 11:58:54 +00:00
|
|
|
reason = exc.msg
|
2022-02-11 20:40:49 +00:00
|
|
|
quit 1
|
|
|
|
|
2024-10-09 06:37:35 +00:00
|
|
|
# https://github.com/ethereum/consensus-specs/blob/v1.5.0-alpha.8/specs/phase0/beacon-chain.md#voluntary-exits
|
2024-02-26 08:48:07 +00:00
|
|
|
# https://github.com/ethereum/consensus-specs/blob/v1.4.0-beta.0/specs/deneb/beacon-chain.md#modified-process_voluntary_exit
|
2023-06-24 12:27:15 +00:00
|
|
|
let signingFork = try:
|
2023-09-05 20:39:01 +00:00
|
|
|
let response = await client.getSpecVC()
|
2023-06-24 12:27:15 +00:00
|
|
|
if response.status == 200:
|
2024-02-26 08:48:07 +00:00
|
|
|
let forkConfig = response.data.data.getConsensusForkConfig()
|
|
|
|
if forkConfig.isErr:
|
|
|
|
raise newException(RestError, "Invalid config: " & forkConfig.error)
|
2024-10-16 17:20:39 +00:00
|
|
|
let
|
|
|
|
capellaForkVersion =
|
|
|
|
try:
|
|
|
|
forkConfig.get()[ConsensusFork.Capella].version
|
|
|
|
except KeyError:
|
|
|
|
raise newException(RestError,
|
|
|
|
ConsensusFork.Capella.forkVersionConfigKey() & " missing")
|
|
|
|
denebForkEpoch =
|
|
|
|
try:
|
|
|
|
forkConfig.get()[ConsensusFork.Deneb].epoch
|
|
|
|
except KeyError:
|
|
|
|
raise newException(RestError,
|
|
|
|
ConsensusFork.Deneb.forkEpochConfigKey() & " missing")
|
2024-02-26 08:48:07 +00:00
|
|
|
voluntary_exit_signature_fork(
|
2024-10-16 17:20:39 +00:00
|
|
|
fork, capellaForkVersion, currentEpoch, denebForkEpoch)
|
2023-06-24 12:27:15 +00:00
|
|
|
else:
|
|
|
|
raise newException(RestError, "Error response (" & $response.status & ")")
|
|
|
|
except CatchableError as exc:
|
|
|
|
fatal "Failed to obtain the config spec of the beacon node",
|
|
|
|
reason = exc.msg
|
|
|
|
quit 1
|
|
|
|
|
2024-02-25 21:09:23 +00:00
|
|
|
debug "Signing fork obtained", fork, signingFork
|
2023-09-05 20:39:01 +00:00
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
if not config.printData:
|
|
|
|
case askForExitConfirmation()
|
|
|
|
of ClientExitAction.abort:
|
|
|
|
quit 0
|
|
|
|
of ClientExitAction.confirm:
|
|
|
|
discard
|
|
|
|
|
|
|
|
var hadErrors = false
|
|
|
|
for validator in validators:
|
|
|
|
let restValidator = try:
|
2023-09-05 20:39:01 +00:00
|
|
|
let response = await client.getStateValidatorPlain(
|
|
|
|
stateIdHead, validator.getIdent)
|
2023-04-25 06:44:01 +00:00
|
|
|
if response.status == 200:
|
|
|
|
let validatorInfo = decodeBytes(GetStateValidatorResponse,
|
|
|
|
response.data, response.contentType)
|
|
|
|
if validatorInfo.isErr():
|
|
|
|
raise newException(RestError, $validatorInfo.error)
|
|
|
|
validatorInfo.get().data
|
|
|
|
else:
|
|
|
|
raiseGenericError(response)
|
|
|
|
except CatchableError as exc:
|
|
|
|
fatal "Failed to obtain information for validator", reason = exc.msg
|
2023-03-20 11:58:54 +00:00
|
|
|
quit 1
|
2022-02-11 20:40:49 +00:00
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
let
|
|
|
|
validatorIdx = restValidator.index.uint64
|
|
|
|
validatorKey = restValidator.validator.pubkey
|
2023-03-20 11:58:54 +00:00
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
let
|
|
|
|
genesis_validators_root = genesis.genesis_validators_root
|
|
|
|
validatorKeyAsStr = "0x" & $validatorKey
|
|
|
|
signedExit = getSignedExitMessage(config,
|
|
|
|
validator,
|
|
|
|
validatorKeyAsStr,
|
|
|
|
exitAtEpoch,
|
|
|
|
validatorIdx,
|
2024-02-25 21:09:23 +00:00
|
|
|
signingFork,
|
2023-04-25 06:44:01 +00:00
|
|
|
genesis_validators_root)
|
|
|
|
|
|
|
|
if config.printData:
|
|
|
|
let bytes = encodeBytes(signedExit, "application/json").valueOr:
|
|
|
|
error "Unable to serialize signed exit message", reason = error
|
|
|
|
hadErrors = true
|
|
|
|
continue
|
|
|
|
|
|
|
|
echoP "You can use following command to send voluntary exit message to " &
|
|
|
|
"remote beacon node host:\n"
|
|
|
|
|
|
|
|
echo "curl -X 'POST' \\"
|
|
|
|
echo " '" & config.restUrlForExit &
|
|
|
|
"/eth/v1/beacon/pool/voluntary_exits' \\"
|
|
|
|
echo " -H 'Accept: */*' \\"
|
|
|
|
echo " -H 'Content-Type: application/json' \\"
|
|
|
|
echo " -d '" & string.fromBytes(bytes) & "'"
|
|
|
|
quit 0
|
|
|
|
else:
|
|
|
|
try:
|
2022-02-11 20:40:49 +00:00
|
|
|
let
|
2023-04-25 06:44:01 +00:00
|
|
|
validatorDesc = $validatorIdx & "(" & validatorKeyAsStr[0..9] & ")"
|
2023-03-20 11:58:54 +00:00
|
|
|
response = await client.submitPoolVoluntaryExit(signedExit)
|
|
|
|
success = response.status == 200
|
|
|
|
if success:
|
|
|
|
echo "Successfully published voluntary exit for validator " &
|
2023-04-25 06:44:01 +00:00
|
|
|
validatorDesc & "."
|
2023-03-20 11:58:54 +00:00
|
|
|
else:
|
2023-04-25 06:44:01 +00:00
|
|
|
hadErrors = true
|
2023-03-20 11:58:54 +00:00
|
|
|
let responseError = try:
|
2023-09-27 14:45:33 +00:00
|
|
|
RestJson.decode(response.data, RestErrorMessage)
|
2023-03-20 11:58:54 +00:00
|
|
|
except CatchableError as exc:
|
2023-04-25 06:44:01 +00:00
|
|
|
error "Failed to decode invalid error server response on " &
|
2023-03-20 11:58:54 +00:00
|
|
|
"`submitPoolVoluntaryExit` request", reason = exc.msg
|
2023-04-25 06:44:01 +00:00
|
|
|
continue
|
2023-03-20 11:58:54 +00:00
|
|
|
|
|
|
|
let
|
|
|
|
responseMessage = responseError.message
|
|
|
|
responseStacktraces = responseError.stacktraces
|
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
echo "The voluntary exit for validator " & validatorDesc &
|
|
|
|
" was not submitted successfully."
|
2023-03-20 11:58:54 +00:00
|
|
|
echo responseMessage & ":"
|
|
|
|
for el in responseStacktraces.get():
|
|
|
|
echo el
|
|
|
|
echoP "Please try again."
|
2023-04-25 06:44:01 +00:00
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to send the signed exit message",
|
|
|
|
signedExit, reason = err.msg
|
|
|
|
hadErrors = true
|
2022-02-11 20:40:49 +00:00
|
|
|
|
2023-04-25 06:44:01 +00:00
|
|
|
if hadErrors:
|
|
|
|
quit 1
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
proc handleValidatorExitCommand(config: BeaconNodeConf) {.async.} =
|
2022-05-31 11:05:15 +00:00
|
|
|
await restValidatorExit(config)
|
2022-02-11 20:40:49 +00:00
|
|
|
|
2022-06-21 08:29:16 +00:00
|
|
|
proc doDeposits*(config: BeaconNodeConf, rng: var HmacDrbgContext) {.
|
2023-08-25 09:29:07 +00:00
|
|
|
raises: [CatchableError].} =
|
2022-02-11 20:40:49 +00:00
|
|
|
case config.depositsCmd
|
|
|
|
of DepositsCmd.createTestnetDeposits:
|
|
|
|
if config.eth2Network.isNone:
|
|
|
|
fatal "Please specify the intended testnet for the deposits"
|
|
|
|
quit 1
|
|
|
|
let metadata = config.loadEth2Network()
|
|
|
|
var seed: KeySeed
|
|
|
|
defer: burnMem(seed)
|
|
|
|
var walletPath: WalletPathPair
|
|
|
|
|
|
|
|
if config.existingWalletId.isSome:
|
|
|
|
let
|
|
|
|
id = config.existingWalletId.get
|
|
|
|
found = findWallet(config, id).valueOr:
|
|
|
|
fatal "Failed to locate wallet", error = error
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
if found.isSome:
|
|
|
|
walletPath = found.get
|
|
|
|
else:
|
|
|
|
fatal "Unable to find wallet with the specified name/uuid", id
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
var unlocked = unlockWalletInteractively(walletPath.wallet)
|
|
|
|
if unlocked.isOk:
|
|
|
|
swap(seed, unlocked.get)
|
|
|
|
else:
|
|
|
|
# The failure will be reported in `unlockWalletInteractively`.
|
|
|
|
quit 1
|
|
|
|
else:
|
|
|
|
var walletRes = createWalletInteractively(rng, config)
|
|
|
|
if walletRes.isErr:
|
|
|
|
fatal "Unable to create wallet", err = walletRes.error
|
|
|
|
quit 1
|
|
|
|
else:
|
|
|
|
swap(seed, walletRes.get.seed)
|
|
|
|
walletPath = walletRes.get.walletPath
|
|
|
|
|
2022-03-22 17:06:21 +00:00
|
|
|
if (let res = secureCreatePath(config.outValidatorsDir); res.isErr):
|
|
|
|
fatal "Could not create directory",
|
|
|
|
path = config.outValidatorsDir, err = ioErrorMsg(res.error)
|
2022-02-11 20:40:49 +00:00
|
|
|
quit QuitFailure
|
|
|
|
|
2022-03-22 17:06:21 +00:00
|
|
|
if (let res = secureCreatePath(config.outSecretsDir); res.isErr):
|
|
|
|
fatal "Could not create directory",
|
|
|
|
path = config.outSecretsDir, err = ioErrorMsg(res.error)
|
2022-02-11 20:40:49 +00:00
|
|
|
quit QuitFailure
|
|
|
|
|
|
|
|
let deposits = generateDeposits(
|
|
|
|
metadata.cfg,
|
|
|
|
rng,
|
|
|
|
seed,
|
|
|
|
walletPath.wallet.nextAccount,
|
|
|
|
config.totalDeposits,
|
|
|
|
config.outValidatorsDir,
|
2022-05-10 00:32:12 +00:00
|
|
|
config.outSecretsDir,
|
|
|
|
@[], 0, 0,
|
|
|
|
KeystoreMode.Fast)
|
2022-02-11 20:40:49 +00:00
|
|
|
|
|
|
|
if deposits.isErr:
|
|
|
|
fatal "Failed to generate deposits", err = deposits.error
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
try:
|
|
|
|
let depositDataPath = if config.outDepositsFile.isSome:
|
|
|
|
config.outDepositsFile.get.string
|
|
|
|
else:
|
|
|
|
config.outValidatorsDir / "deposit_data-" & $epochTime() & ".json"
|
|
|
|
|
|
|
|
let launchPadDeposits =
|
|
|
|
mapIt(deposits.value, LaunchPadDeposit.init(metadata.cfg, it))
|
|
|
|
|
|
|
|
Json.saveFile(depositDataPath, launchPadDeposits)
|
|
|
|
echo "Deposit data written to \"", depositDataPath, "\""
|
|
|
|
|
|
|
|
walletPath.wallet.nextAccount += deposits.value.len
|
|
|
|
let status = saveWallet(walletPath)
|
|
|
|
if status.isErr:
|
|
|
|
fatal "Failed to update wallet file after generating deposits",
|
|
|
|
wallet = walletPath.path,
|
|
|
|
error = status.error
|
|
|
|
quit 1
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to create launchpad deposit data file", err = err.msg
|
|
|
|
quit 1
|
|
|
|
#[
|
|
|
|
of DepositsCmd.status:
|
|
|
|
echo "The status command is not implemented yet"
|
|
|
|
quit 1
|
|
|
|
]#
|
|
|
|
|
|
|
|
of DepositsCmd.`import`:
|
|
|
|
let validatorKeysDir = if config.importedDepositsDir.isSome:
|
|
|
|
config.importedDepositsDir.get
|
|
|
|
else:
|
|
|
|
let cwd = os.getCurrentDir()
|
|
|
|
if dirExists(cwd / "validator_keys"):
|
|
|
|
InputDir(cwd / "validator_keys")
|
|
|
|
else:
|
|
|
|
echo "The default search path for validator keys is a sub-directory " &
|
2023-03-20 11:58:54 +00:00
|
|
|
"named 'validator_keys' in the current working directory. " &
|
|
|
|
" Since no such directory exists, please either provide the " &
|
|
|
|
"correct path as an argument or copy the imported keys in the " &
|
|
|
|
"expected location."
|
2022-02-11 20:40:49 +00:00
|
|
|
quit 1
|
|
|
|
|
|
|
|
importKeystoresFromDir(
|
2023-02-16 17:25:48 +00:00
|
|
|
rng, config.importMethod,
|
2022-02-11 20:40:49 +00:00
|
|
|
validatorKeysDir.string,
|
|
|
|
config.validatorsDir, config.secretsDir)
|
|
|
|
|
|
|
|
of DepositsCmd.exit:
|
|
|
|
waitFor handleValidatorExitCommand(config)
|