mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 12:57:18 +00:00
81c53c26fb
* Update seed domains (#3872) * Remove Transfers (#3870) * Remove active index roots and compact committee roots (#3869) * Update inclusion reward (#3886) * Alter proposer selection logic (#3884) * Fix early committee bias (#3888) * Remove shards and committees (#3896) * Epoch spec tests v0.9 (#3907) * Block spec test v0.9 (#3905) * rm'ed in protobuf * build proto * build proto * build proto * fix core package * Gazelle * Fixed all the tests * Fixed static test * Comment out spec test for now * One more skip * fix-roundRobinSync (#3862) * Starting but need new seed function * Revert initial sync * Updated Proposer Slashing * Fixed all tests * Lint * Update inclusion reward * Fill randao mixes with eth1 data hash * Test * Fixing test part1 * All tests passing * One last test * Updated config * Build proto * Proper skip message * Conflict and fmt * Removed crosslinks and shards. Built * Format and gazelle * Fixed all the block package tests * Fixed all the helper tests * All epoch package tests pass * All core package tests pass * Fixed operation tests * Started fixing rpc test * RPC tests passed! * Fixed all init sync tests * All tests pass * Fixed blockchain tests * Lint * Lint * Preston's feedback * Starting * Remove container * Fixed block spec tests * All passing except for block_processing test * Failing block processing test * Starting * Add AggregateAndProof * All mainnet test passes * Update deposit contract (#3906) * Proto spec tests v0.9 (#3908) * Starting * Add AggregateAndProof * Unskip block util tests (#3910) * rm'ed in protobuf * build proto * build proto * build proto * fix core package * Gazelle * Fixed all the tests * Fixed static test * Comment out spec test for now * One more skip * fix-roundRobinSync (#3862) * Starting but need new seed function * Revert initial sync * Updated Proposer Slashing * Fixed all tests * Lint * Update inclusion reward * Fill randao mixes with eth1 data hash * Test * Fixing test part1 * All tests passing * One last test * Updated config * Build proto * Proper skip message * Conflict and fmt * Removed crosslinks and shards. Built * Format and gazelle * Fixed all the block package tests * Fixed all the helper tests * All epoch package tests pass * All core package tests pass * Fixed operation tests * Started fixing rpc test * RPC tests passed! * Fixed all init sync tests * All tests pass * Fixed blockchain tests * Lint * Lint * Preston's feedback * Starting * Remove container * Fixed block spec tests * All passing except for block_processing test * Failing block processing test * Starting * Add AggregateAndProof * All mainnet test passes * Unskip block util tests * Slot processing spec test V0.9 (#3912) * Starting * Add AggregateAndProof * Unskip slot processing mainnet test * Unskip minimal spec test for finalization (#3920) * Remove outdated interop tests (#3922) * Rm outdated interop tests * Rm test runner * Gazelle * Update validator to use proposer slot (#3919) * Fix committee assignment (#3931) * Replace shard with committee index (#3930) * Conflict * Clean up (#3933) * Remove shard filter in db (#3936) * Remove lightouse compatibility test (#3939) * Update Committee Cache for v0.9 (#3948) * Updated committee cache * Removed shuffled indices cache * Started testing run time * Lint * Fixed test * Safeguard against nil head state * address edge case * add test * Fixed TestRoundRobinSync by doubling the epochs * Unskip TestProtoCompatability (#3958) * Unskip TestProtoCompatability * Update WORKSPACE * Fix minimal config (#3959) * fix minimal configs * fix hardcoded value in test * Simplify verify att time (#3961) * update readme for deposit contract, regen bindings for vyper 0.1.0b12 (#3963) * update readme for deposit contract, regen bindings * medium * Check nil base state (#3964) * Copy Block When Receiving it From Sync (#3966) * copy block * clone for other service methods too * Change logging of Bitfield (#3956) * change logging of bits * preston's review * Unskip Beacon Server Test (#3962) * run test till the end * fix up proto message types * fmt * resolve broken tests * better error handling * fixing new logic to use archived proposer info * fix up logic * clip using the max effective balance * broken build fix with num arg mismatch * amend archive * archival logic changed * rename test * archive both proposer and attester seeds * page size 100 * further experiments * further experimentation, archivedProposerIndex seems wrong * test passes * rem log * fix broken test * fix test * gaz * fix imports * ethapis
129 lines
4.7 KiB
Go
129 lines
4.7 KiB
Go
package accounts
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
|
|
"github.com/pkg/errors"
|
|
contract "github.com/prysmaticlabs/prysm/contracts/deposit-contract"
|
|
"github.com/prysmaticlabs/prysm/shared/keystore"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
var log = logrus.WithField("prefix", "accounts")
|
|
|
|
// DecryptKeysFromKeystore extracts a set of validator private keys from
|
|
// an encrypted keystore directory and a password string.
|
|
func DecryptKeysFromKeystore(directory string, password string) (map[string]*keystore.Key, error) {
|
|
validatorPrefix := params.BeaconConfig().ValidatorPrivkeyFileName
|
|
ks := keystore.NewKeystore(directory)
|
|
validatorKeys, err := ks.GetKeys(directory, validatorPrefix, password)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "could not get private key")
|
|
}
|
|
return validatorKeys, nil
|
|
}
|
|
|
|
// VerifyAccountNotExists checks if a validator has not yet created an account
|
|
// and keystore in the provided directory string.
|
|
func VerifyAccountNotExists(directory string, password string) error {
|
|
if directory == "" || password == "" {
|
|
return errors.New("expected a path to the validator keystore and password to be provided, received nil")
|
|
}
|
|
shardWithdrawalKeyFile := params.BeaconConfig().WithdrawalPrivkeyFileName
|
|
validatorKeyFile := params.BeaconConfig().ValidatorPrivkeyFileName
|
|
// First, if the keystore already exists, throws an error as there can only be
|
|
// one keystore per validator client.
|
|
ks := keystore.NewKeystore(directory)
|
|
if _, err := ks.GetKeys(directory, shardWithdrawalKeyFile, password); err == nil {
|
|
return fmt.Errorf("keystore at path already exists: %s", shardWithdrawalKeyFile)
|
|
}
|
|
if _, err := ks.GetKeys(directory, validatorKeyFile, password); err == nil {
|
|
return fmt.Errorf("keystore at path already exists: %s", validatorKeyFile)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// NewValidatorAccount sets up a validator client's secrets and generates the necessary deposit data
|
|
// parameters needed to deposit into the deposit contract on the ETH1.0 chain. Specifically, this
|
|
// generates a BLS private and public key, and then logs the serialized deposit input hex string
|
|
// to be used in an ETH1.0 transaction by the validator.
|
|
func NewValidatorAccount(directory string, password string) error {
|
|
shardWithdrawalKeyFile := directory + params.BeaconConfig().WithdrawalPrivkeyFileName
|
|
validatorKeyFile := directory + params.BeaconConfig().ValidatorPrivkeyFileName
|
|
ks := keystore.NewKeystore(directory)
|
|
// If the keystore does not exists at the path, we create a new one for the validator.
|
|
shardWithdrawalKey, err := keystore.NewKey(rand.Reader)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
shardWithdrawalKeyFile = shardWithdrawalKeyFile + hex.EncodeToString(shardWithdrawalKey.PublicKey.Marshal())[:12]
|
|
if err := ks.StoreKey(shardWithdrawalKeyFile, shardWithdrawalKey, password); err != nil {
|
|
return errors.Wrap(err, "unable to store key %v")
|
|
}
|
|
log.WithField(
|
|
"path",
|
|
shardWithdrawalKeyFile,
|
|
).Info("Keystore generated for shard withdrawals at path")
|
|
validatorKey, err := keystore.NewKey(rand.Reader)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
validatorKeyFile = validatorKeyFile + hex.EncodeToString(validatorKey.PublicKey.Marshal())[:12]
|
|
if err := ks.StoreKey(validatorKeyFile, validatorKey, password); err != nil {
|
|
return errors.Wrap(err, "unable to store key %v")
|
|
}
|
|
log.WithField(
|
|
"path",
|
|
validatorKeyFile,
|
|
).Info("Keystore generated for validator signatures at path")
|
|
|
|
data, depositRoot, err := keystore.DepositInput(validatorKey, shardWithdrawalKey, params.BeaconConfig().MaxEffectiveBalance)
|
|
if err != nil {
|
|
return errors.Wrap(err, "unable to generate deposit data")
|
|
}
|
|
testAcc, err := contract.Setup()
|
|
if err != nil {
|
|
return errors.Wrap(err, "unable to create simulated backend")
|
|
}
|
|
testAcc.TxOpts.GasLimit = 1000000
|
|
|
|
tx, err := testAcc.Contract.Deposit(testAcc.TxOpts, data.PublicKey, data.WithdrawalCredentials, data.Signature, depositRoot)
|
|
if err != nil {
|
|
return errors.Wrap(err, "unable to create deposit transaction")
|
|
}
|
|
log.Info(`Account creation complete! Copy and paste the raw transaction data shown below when issuing a transaction into the ETH1.0 deposit contract to activate your validator client`)
|
|
fmt.Printf(`
|
|
========================Raw Transaction Data=======================
|
|
|
|
%#x
|
|
|
|
===================================================================
|
|
`, tx.Data())
|
|
return nil
|
|
}
|
|
|
|
// Exists checks if a validator account at a given keystore path exists.
|
|
func Exists(keystorePath string) (bool, error) {
|
|
/* #nosec */
|
|
f, err := os.Open(keystorePath)
|
|
if err != nil {
|
|
return false, nil
|
|
}
|
|
defer func() {
|
|
if err := f.Close(); err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
}()
|
|
|
|
_, err = f.Readdirnames(1) // Or f.Readdir(1)
|
|
if err == io.EOF {
|
|
return false, nil
|
|
}
|
|
return true, err
|
|
}
|