@aztec/cli 0.0.1-commit.b655e406 → 0.0.1-commit.fce3e4f
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/dest/cmds/aztec_node/block_number.d.ts +1 -1
- package/dest/cmds/aztec_node/get_block.d.ts +1 -1
- package/dest/cmds/aztec_node/get_current_base_fee.d.ts +1 -1
- package/dest/cmds/aztec_node/get_l1_to_l2_message_witness.d.ts +1 -1
- package/dest/cmds/aztec_node/get_logs.d.ts +1 -1
- package/dest/cmds/aztec_node/get_node_info.d.ts +1 -1
- package/dest/cmds/aztec_node/index.d.ts +1 -1
- package/dest/cmds/contracts/index.d.ts +1 -1
- package/dest/cmds/contracts/inspect_contract.d.ts +1 -1
- package/dest/cmds/contracts/inspect_contract.d.ts.map +1 -1
- package/dest/cmds/contracts/inspect_contract.js +3 -9
- package/dest/cmds/contracts/parse_parameter_struct.d.ts +1 -1
- package/dest/cmds/infrastructure/index.d.ts +1 -1
- package/dest/cmds/infrastructure/sequencers.d.ts +1 -1
- package/dest/cmds/infrastructure/setup_l2_contract.d.ts +1 -1
- package/dest/cmds/l1/advance_epoch.d.ts +1 -1
- package/dest/cmds/l1/assume_proven_through.d.ts +1 -1
- package/dest/cmds/l1/bridge_erc20.d.ts +1 -1
- package/dest/cmds/l1/create_l1_account.d.ts +1 -1
- package/dest/cmds/l1/deploy_l1_contracts.d.ts +1 -1
- package/dest/cmds/l1/deploy_new_rollup.d.ts +1 -1
- package/dest/cmds/l1/get_l1_addresses.d.ts +1 -1
- package/dest/cmds/l1/get_l1_balance.d.ts +1 -1
- package/dest/cmds/l1/governance_utils.d.ts +5 -5
- package/dest/cmds/l1/governance_utils.d.ts.map +1 -1
- package/dest/cmds/l1/index.d.ts +1 -1
- package/dest/cmds/l1/prover_stats.d.ts +1 -1
- package/dest/cmds/l1/prover_stats.d.ts.map +1 -1
- package/dest/cmds/l1/prover_stats.js +28 -28
- package/dest/cmds/l1/trigger_seed_snapshot.d.ts +2 -2
- package/dest/cmds/l1/trigger_seed_snapshot.d.ts.map +1 -1
- package/dest/cmds/l1/update_l1_validators.d.ts +6 -6
- package/dest/cmds/l1/update_l1_validators.d.ts.map +1 -1
- package/dest/cmds/l1/update_l1_validators.js +2 -2
- package/dest/cmds/misc/compute_selector.d.ts +1 -1
- package/dest/cmds/misc/example_contracts.d.ts +1 -1
- package/dest/cmds/misc/generate_bootnode_enr.d.ts +1 -1
- package/dest/cmds/misc/generate_p2p_private_key.d.ts +1 -1
- package/dest/cmds/misc/generate_secret_and_hash.d.ts +1 -1
- package/dest/cmds/misc/generate_secret_key.d.ts +1 -1
- package/dest/cmds/misc/get_canonical_sponsored_fpc_address.d.ts +1 -1
- package/dest/cmds/misc/index.d.ts +1 -1
- package/dest/cmds/misc/update/common.d.ts +1 -1
- package/dest/cmds/misc/update/github.d.ts +1 -1
- package/dest/cmds/misc/update/noir.d.ts +1 -1
- package/dest/cmds/misc/update/npm.d.ts +1 -1
- package/dest/cmds/misc/update/npm.js +1 -1
- package/dest/cmds/misc/update/utils.d.ts +1 -1
- package/dest/cmds/misc/update.d.ts +1 -1
- package/dest/cmds/validator_keys/add.d.ts +1 -1
- package/dest/cmds/validator_keys/add.d.ts.map +1 -1
- package/dest/cmds/validator_keys/add.js +20 -7
- package/dest/cmds/validator_keys/generate_bls_keypair.d.ts +1 -1
- package/dest/cmds/validator_keys/generate_bls_keypair.d.ts.map +1 -1
- package/dest/cmds/validator_keys/generate_bls_keypair.js +2 -1
- package/dest/cmds/validator_keys/index.d.ts +1 -1
- package/dest/cmds/validator_keys/index.d.ts.map +1 -1
- package/dest/cmds/validator_keys/index.js +16 -4
- package/dest/cmds/validator_keys/new.d.ts +7 -4
- package/dest/cmds/validator_keys/new.d.ts.map +1 -1
- package/dest/cmds/validator_keys/new.js +87 -16
- package/dest/cmds/validator_keys/shared.d.ts +4 -4
- package/dest/cmds/validator_keys/shared.d.ts.map +1 -1
- package/dest/cmds/validator_keys/shared.js +29 -27
- package/dest/cmds/validator_keys/staker.d.ts +38 -0
- package/dest/cmds/validator_keys/staker.d.ts.map +1 -0
- package/dest/cmds/validator_keys/staker.js +207 -0
- package/dest/cmds/validator_keys/utils.d.ts +25 -0
- package/dest/cmds/validator_keys/utils.d.ts.map +1 -0
- package/dest/cmds/validator_keys/utils.js +52 -0
- package/dest/config/cached_fetch.d.ts +1 -1
- package/dest/config/chain_l2_config.d.ts +11 -10
- package/dest/config/chain_l2_config.d.ts.map +1 -1
- package/dest/config/chain_l2_config.js +64 -34
- package/dest/config/enrich_env.d.ts +1 -1
- package/dest/config/get_l1_config.d.ts +1 -1
- package/dest/config/index.d.ts +1 -1
- package/dest/config/network_config.d.ts +2 -2
- package/dest/config/network_config.d.ts.map +1 -1
- package/dest/config/network_config.js +19 -5
- package/dest/utils/aztec.d.ts +1 -1
- package/dest/utils/aztec.d.ts.map +1 -1
- package/dest/utils/commands.d.ts +2 -2
- package/dest/utils/commands.d.ts.map +1 -1
- package/dest/utils/encoding.d.ts +1 -1
- package/dest/utils/github.d.ts +1 -1
- package/dest/utils/index.d.ts +1 -1
- package/dest/utils/inspect.d.ts +1 -1
- package/dest/utils/setup_contracts.d.ts +1 -1
- package/package.json +34 -29
- package/public_include_metric_prefixes.json +1 -0
- package/src/cmds/contracts/inspect_contract.ts +3 -10
- package/src/cmds/l1/prover_stats.ts +36 -29
- package/src/cmds/l1/update_l1_validators.ts +2 -2
- package/src/cmds/misc/update/npm.ts +1 -1
- package/src/cmds/validator_keys/add.ts +20 -10
- package/src/cmds/validator_keys/generate_bls_keypair.ts +2 -1
- package/src/cmds/validator_keys/index.ts +67 -21
- package/src/cmds/validator_keys/new.ts +109 -23
- package/src/cmds/validator_keys/shared.ts +30 -26
- package/src/cmds/validator_keys/staker.ts +300 -0
- package/src/cmds/validator_keys/utils.ts +80 -0
- package/src/config/chain_l2_config.ts +86 -45
- package/src/config/network_config.ts +26 -5
|
@@ -11,4 +11,4 @@ export declare function atomicUpdateFile(filePath: string, contents: string): Pr
|
|
|
11
11
|
* @returns The Nargo.toml contents as a string
|
|
12
12
|
*/
|
|
13
13
|
export declare function prettyPrintNargoToml(config: NoirPackageConfig): string;
|
|
14
|
-
//# sourceMappingURL=
|
|
14
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXRpbHMuZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9jbWRzL21pc2MvdXBkYXRlL3V0aWxzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sS0FBSyxFQUFFLGlCQUFpQixFQUFFLE1BQU0sd0JBQXdCLENBQUM7QUFNaEU7Ozs7R0FJRztBQUNILHdCQUFzQixnQkFBZ0IsQ0FBQyxRQUFRLEVBQUUsTUFBTSxFQUFFLFFBQVEsRUFBRSxNQUFNLGlCQXFCeEU7QUFFRDs7OztHQUlHO0FBQ0gsd0JBQWdCLG9CQUFvQixDQUFDLE1BQU0sRUFBRSxpQkFBaUIsR0FBRyxNQUFNLENBVXRFIn0=
|
|
@@ -1,3 +1,3 @@
|
|
|
1
1
|
import type { LogFn } from '@aztec/foundation/log';
|
|
2
2
|
export declare function updateProject(projectPath: string, contracts: string[], aztecVersion: string, log: LogFn): Promise<void>;
|
|
3
|
-
//# sourceMappingURL=
|
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXBkYXRlLmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY21kcy9taXNjL3VwZGF0ZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEtBQUssRUFBRSxLQUFLLEVBQUUsTUFBTSx1QkFBdUIsQ0FBQztBQVluRCx3QkFBc0IsYUFBYSxDQUNqQyxXQUFXLEVBQUUsTUFBTSxFQUNuQixTQUFTLEVBQUUsTUFBTSxFQUFFLEVBQ25CLFlBQVksRUFBRSxNQUFNLEVBQ3BCLEdBQUcsRUFBRSxLQUFLLEdBQ1QsT0FBTyxDQUFDLElBQUksQ0FBQyxDQTJDZiJ9
|
|
@@ -2,4 +2,4 @@ import type { LogFn } from '@aztec/foundation/log';
|
|
|
2
2
|
import type { NewValidatorKeystoreOptions } from './new.js';
|
|
3
3
|
export type AddValidatorKeysOptions = NewValidatorKeystoreOptions;
|
|
4
4
|
export declare function addValidatorKeys(existing: string, options: AddValidatorKeysOptions, log: LogFn): Promise<void>;
|
|
5
|
-
//# sourceMappingURL=
|
|
5
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYWRkLmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY21kcy92YWxpZGF0b3Jfa2V5cy9hZGQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQ0EsT0FBTyxLQUFLLEVBQUUsS0FBSyxFQUFFLE1BQU0sdUJBQXVCLENBQUM7QUFRbkQsT0FBTyxLQUFLLEVBQUUsMkJBQTJCLEVBQUUsTUFBTSxVQUFVLENBQUM7QUFXNUQsTUFBTSxNQUFNLHVCQUF1QixHQUFHLDJCQUEyQixDQUFDO0FBRWxFLHdCQUFzQixnQkFBZ0IsQ0FBQyxRQUFRLEVBQUUsTUFBTSxFQUFFLE9BQU8sRUFBRSx1QkFBdUIsRUFBRSxHQUFHLEVBQUUsS0FBSyxpQkFvR3BHIn0=
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"add.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/add.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAQnD,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,UAAU,CAAC;
|
|
1
|
+
{"version":3,"file":"add.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/add.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAQnD,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,UAAU,CAAC;AAW5D,MAAM,MAAM,uBAAuB,GAAG,2BAA2B,CAAC;AAElE,wBAAsB,gBAAgB,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,uBAAuB,EAAE,GAAG,EAAE,KAAK,iBAoGpG"}
|
|
@@ -3,8 +3,15 @@ import { wordlist } from '@scure/bip39/wordlists/english.js';
|
|
|
3
3
|
import { dirname, isAbsolute, join } from 'path';
|
|
4
4
|
import { generateMnemonic } from 'viem/accounts';
|
|
5
5
|
import { buildValidatorEntries, logValidatorSummaries, maybePrintJson, writeBlsBn254ToFile, writeEthJsonV3ToFile, writeKeystoreFile } from './shared.js';
|
|
6
|
+
import { validateBlsPathOptions, validatePublisherOptions, validateRemoteSignerOptions } from './utils.js';
|
|
6
7
|
export async function addValidatorKeys(existing, options, log) {
|
|
7
|
-
|
|
8
|
+
// validate bls-path inputs before proceeding with key generation
|
|
9
|
+
validateBlsPathOptions(options);
|
|
10
|
+
// validate publisher options
|
|
11
|
+
validatePublisherOptions(options);
|
|
12
|
+
// validate remote signer options
|
|
13
|
+
validateRemoteSignerOptions(options);
|
|
14
|
+
const { dataDir, file, count, publisherCount = 0, publishers, mnemonic, accountIndex = 0, addressIndex, ikm, blsPath, json, feeRecipient: feeRecipientOpt, coinbase: coinbaseOpt, remoteSigner: remoteSignerOpt, password, encryptedKeystoreDir } = options;
|
|
8
15
|
const validatorCount = typeof count === 'number' && Number.isFinite(count) && count > 0 ? Math.floor(count) : 1;
|
|
9
16
|
const baseAddressIndex = addressIndex ?? 0;
|
|
10
17
|
const keystore = loadKeystoreFile(existing);
|
|
@@ -17,7 +24,6 @@ export async function addValidatorKeys(existing, options, log) {
|
|
|
17
24
|
throw new Error('feeRecipient is required (either present in existing file or via --fee-recipient)');
|
|
18
25
|
}
|
|
19
26
|
const coinbase = coinbaseOpt ?? first.coinbase;
|
|
20
|
-
const fundingAccount = fundingAccountOpt ?? first.fundingAccount;
|
|
21
27
|
const derivedRemoteSigner = first.attester?.remoteSignerUrl || first.attester?.eth?.remoteSignerUrl;
|
|
22
28
|
const remoteSigner = remoteSignerOpt ?? derivedRemoteSigner;
|
|
23
29
|
// Ensure we always have a mnemonic for key derivation if none was provided
|
|
@@ -27,28 +33,35 @@ export async function addValidatorKeys(existing, options, log) {
|
|
|
27
33
|
const { validators, summaries } = await buildValidatorEntries({
|
|
28
34
|
validatorCount,
|
|
29
35
|
publisherCount,
|
|
36
|
+
publishers,
|
|
30
37
|
accountIndex,
|
|
31
38
|
baseAddressIndex: effectiveBaseAddressIndex,
|
|
32
39
|
mnemonic: mnemonicToUse,
|
|
33
40
|
ikm,
|
|
34
41
|
blsPath,
|
|
35
|
-
blsOnly,
|
|
36
42
|
feeRecipient,
|
|
37
43
|
coinbase,
|
|
38
|
-
remoteSigner
|
|
39
|
-
fundingAccount
|
|
44
|
+
remoteSigner
|
|
40
45
|
});
|
|
41
46
|
keystore.validators.push(...validators);
|
|
42
47
|
// If password provided, write ETH JSON V3 and BLS BN254 keystores and replace plaintext
|
|
43
48
|
if (password !== undefined) {
|
|
44
|
-
|
|
49
|
+
let targetDir;
|
|
50
|
+
if (encryptedKeystoreDir && encryptedKeystoreDir.length > 0) {
|
|
51
|
+
targetDir = encryptedKeystoreDir;
|
|
52
|
+
} else if (dataDir && dataDir.length > 0) {
|
|
53
|
+
targetDir = dataDir;
|
|
54
|
+
} else {
|
|
55
|
+
targetDir = dirname(existing);
|
|
56
|
+
}
|
|
45
57
|
await writeEthJsonV3ToFile(keystore.validators, {
|
|
46
58
|
outDir: targetDir,
|
|
47
59
|
password
|
|
48
60
|
});
|
|
49
61
|
await writeBlsBn254ToFile(keystore.validators, {
|
|
50
62
|
outDir: targetDir,
|
|
51
|
-
password
|
|
63
|
+
password,
|
|
64
|
+
blsPath
|
|
52
65
|
});
|
|
53
66
|
}
|
|
54
67
|
let outputPath = existing;
|
|
@@ -9,4 +9,4 @@ export type GenerateBlsKeypairOptions = {
|
|
|
9
9
|
out?: string;
|
|
10
10
|
};
|
|
11
11
|
export declare function generateBlsKeypair(options: GenerateBlsKeypairOptions, log: LogFn): Promise<void>;
|
|
12
|
-
//# sourceMappingURL=
|
|
12
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"generate_bls_keypair.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/generate_bls_keypair.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;
|
|
1
|
+
{"version":3,"file":"generate_bls_keypair.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/generate_bls_keypair.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAOnD,MAAM,MAAM,yBAAyB,GAAG;IACtC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,EAAE,CAAC,EAAE,OAAO,CAAC;IACb,UAAU,CAAC,EAAE,OAAO,CAAC;IACrB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF,wBAAsB,kBAAkB,CAAC,OAAO,EAAE,yBAAyB,EAAE,GAAG,EAAE,KAAK,iBAetF"}
|
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
import { deriveBlsPrivateKey } from '@aztec/foundation/crypto';
|
|
2
2
|
import { writeFile } from 'fs/promises';
|
|
3
3
|
import { computeBlsPublicKeyCompressed, withValidatorIndex } from './shared.js';
|
|
4
|
+
import { defaultBlsPath } from './utils.js';
|
|
4
5
|
export async function generateBlsKeypair(options, log) {
|
|
5
6
|
const { mnemonic, ikm, blsPath, compressed = true, json, out } = options;
|
|
6
|
-
const path = withValidatorIndex(blsPath ??
|
|
7
|
+
const path = withValidatorIndex(blsPath ?? defaultBlsPath, 0);
|
|
7
8
|
const priv = deriveBlsPrivateKey(mnemonic, ikm, path);
|
|
8
9
|
const pub = await computeBlsPublicKeyCompressed(priv);
|
|
9
10
|
const result = {
|
|
@@ -1,4 +1,4 @@
|
|
|
1
1
|
import type { LogFn } from '@aztec/foundation/log';
|
|
2
2
|
import { Command } from 'commander';
|
|
3
3
|
export declare function injectCommands(program: Command, log: LogFn): Command;
|
|
4
|
-
//# sourceMappingURL=
|
|
4
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9jbWRzL3ZhbGlkYXRvcl9rZXlzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sS0FBSyxFQUFFLEtBQUssRUFBRSxNQUFNLHVCQUF1QixDQUFDO0FBRW5ELE9BQU8sRUFBRSxPQUFPLEVBQUUsTUFBTSxXQUFXLENBQUM7QUFLcEMsd0JBQWdCLGNBQWMsQ0FBQyxPQUFPLEVBQUUsT0FBTyxFQUFFLEdBQUcsRUFBRSxLQUFLLFdBc0kxRCJ9
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAKpC,wBAAgB,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,WAsI1D"}
|
|
@@ -1,18 +1,30 @@
|
|
|
1
1
|
import { parseAztecAddress, parseEthereumAddress, parseHex, parseOptionalInteger } from '../../utils/commands.js';
|
|
2
|
+
import { defaultBlsPath } from './utils.js';
|
|
2
3
|
export function injectCommands(program, log) {
|
|
3
4
|
const group = program.command('validator-keys').aliases([
|
|
4
|
-
'valKeys'
|
|
5
|
+
'valKeys',
|
|
6
|
+
'valkeys'
|
|
5
7
|
]).description('Manage validator keystores for node operators');
|
|
6
|
-
group.command('new').summary('Generate a new validator keystore JSON').description('Generates a new validator keystore with ETH secp256k1 accounts and optional BLS accounts').option('--data-dir <path>', 'Directory to store keystore(s). Defaults to ~/.aztec/keystore').option('--file <name>', 'Keystore file name. Defaults to key1.json (or keyN.json if key1.json exists)').option('--count <N>', 'Number of validators to generate', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default
|
|
8
|
+
group.command('new').summary('Generate a new validator keystore JSON').description('Generates a new validator keystore with ETH secp256k1 accounts and optional BLS accounts').option('--data-dir <path>', 'Directory to store keystore(s). Defaults to ~/.aztec/keystore').option('--file <name>', 'Keystore file name. Defaults to key1.json (or keyN.json if key1.json exists)').option('--count <N>', 'Number of validators to generate', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default 0)', (value)=>parseOptionalInteger(value, 0)).option('--publishers <privateKeys>', 'Comma-separated list of publisher private keys for all validators.', (value)=>value.split(',').map((key)=>key.trim())).option('--mnemonic <mnemonic>', 'Mnemonic for ETH/BLS derivation').option('--passphrase <str>', 'Optional passphrase for mnemonic').option('--account-index <N>', 'Base account index for ETH/BLS derivation', parseOptionalInteger).option('--address-index <N>', 'Base address index for ETH/BLS derivation', parseOptionalInteger).option('--coinbase <address>', 'Coinbase ETH address to use when proposing. Defaults to attester address.', parseEthereumAddress)// TODO: add funding account back in when implemented
|
|
9
|
+
// .option('--funding-account <privateKey|address>', 'ETH private key (or address for remote signer setup) to fund publishers')
|
|
10
|
+
.option('--remote-signer <url>', 'Default remote signer URL for accounts in this file').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', `EIP-2334 path (default ${defaultBlsPath})`).option('--password <str>', 'Password for writing keystore files (ETH JSON V3 and BLS EIP-2335). Empty string allowed').option('--encrypted-keystore-dir <dir>', 'Output directory for encrypted keystore file(s)').option('--json', 'Echo resulting JSON to stdout').option('--staker-output', 'Generate a single staker output JSON file with an array of validator entries').option('--gse-address <address>', 'GSE contract address (required with --staker-output)', parseEthereumAddress).option('--l1-rpc-urls <urls>', 'L1 RPC URLs (comma-separated, required with --staker-output)', (value)=>value.split(',')).option('-c, --l1-chain-id <number>', 'L1 chain ID (required with --staker-output)', (value)=>parseInt(value), 31337).requiredOption('--fee-recipient <address>', 'Aztec address that will receive fees', parseAztecAddress).action(async (options)=>{
|
|
7
11
|
const { newValidatorKeystore } = await import('./new.js');
|
|
8
12
|
await newValidatorKeystore(options, log);
|
|
9
13
|
});
|
|
10
|
-
group.command('add').summary('Augment an existing validator keystore JSON').description('Adds attester/publisher/BLS entries to an existing keystore using the same flags as new').argument('<existing>', 'Path to existing keystore JSON').option('--data-dir <path>', 'Directory where keystore(s) live').option('--file <name>', 'Override output file name').option('--count <N>', 'Number of validators to add', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default
|
|
14
|
+
group.command('add').summary('Augment an existing validator keystore JSON').description('Adds attester/publisher/BLS entries to an existing keystore using the same flags as new').argument('<existing>', 'Path to existing keystore JSON').option('--data-dir <path>', 'Directory where keystore(s) live. (default: ~/.aztec/keystore)').option('--file <name>', 'Override output file name. (default: key<N>.json)').option('--count <N>', 'Number of validators to add. (default: 1)', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default 0)', (value)=>parseOptionalInteger(value, 0)).option('--publishers <privateKeys>', 'Comma-separated list of publisher private keys for all validators.', (value)=>value.split(',').map((key)=>key.trim())).option('--mnemonic <mnemonic>', 'Mnemonic for ETH/BLS derivation').option('--passphrase <str>', 'Optional passphrase for mnemonic').option('--account-index <N>', 'Base account index for ETH/BLS derivation', parseOptionalInteger).option('--address-index <N>', 'Base address index for ETH/BLS derivation', parseOptionalInteger).option('--coinbase <address>', 'Coinbase ETH address to use when proposing. Defaults to attester address.', parseEthereumAddress)// TODO: add funding account back in when implemented
|
|
15
|
+
// .option('--funding-account <privateKey|address>', 'ETH private key (or address for remote signer setup) to fund publishers')
|
|
16
|
+
.option('--remote-signer <url>', 'Default remote signer URL for accounts in this file').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', `EIP-2334 path (default ${defaultBlsPath})`).option('--empty', 'Generate an empty skeleton without keys').option('--password <str>', 'Password for writing keystore files (ETH JSON V3 and BLS EIP-2335). Empty string allowed').option('--encrypted-keystore-dir <dir>', 'Output directory for encrypted keystore file(s)').option('--json', 'Echo resulting JSON to stdout').requiredOption('--fee-recipient <address>', 'Aztec address that will receive fees', parseAztecAddress).action(async (existing, options)=>{
|
|
11
17
|
const { addValidatorKeys } = await import('./add.js');
|
|
12
18
|
await addValidatorKeys(existing, options, log);
|
|
13
19
|
});
|
|
20
|
+
group.command('staker').summary('Generate staking JSON from keystore').description('Reads a validator keystore and outputs staking data with BLS public keys for each attester (skips mnemonics)').requiredOption('--from <keystore>', 'Path to keystore JSON file').option('--password <password>', 'Password for decrypting encrypted keystores (if not specified in keystore file)').requiredOption('--gse-address <address>', 'GSE contract address', parseEthereumAddress).option('--l1-rpc-urls <urls>', 'L1 RPC URLs (comma-separated)', (value)=>value.split(','), [
|
|
21
|
+
'http://localhost:8545'
|
|
22
|
+
]).option('-c, --l1-chain-id <number>', 'L1 chain ID', (value)=>parseInt(value), 31337).option('--output <file>', 'Output file path (if not specified, JSON is written to stdout)').action(async (options)=>{
|
|
23
|
+
const { generateStakerJson } = await import('./staker.js');
|
|
24
|
+
await generateStakerJson(options, log);
|
|
25
|
+
});
|
|
14
26
|
// top-level convenience: aztec generate-bls-keypair
|
|
15
|
-
program.command('generate-bls-keypair').description('Generate a BLS keypair with convenience flags').option('--mnemonic <mnemonic>', 'Mnemonic for BLS derivation').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>',
|
|
27
|
+
program.command('generate-bls-keypair').description('Generate a BLS keypair with convenience flags').option('--mnemonic <mnemonic>', 'Mnemonic for BLS derivation').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', `EIP-2334 path (default ${defaultBlsPath})`).option('--g2', 'Derive on G2 subgroup').option('--compressed', 'Output compressed public key').option('--json', 'Print JSON output to stdout').option('--out <file>', 'Write output to file').action(async (options)=>{
|
|
16
28
|
const { generateBlsKeypair } = await import('./generate_bls_keypair.js');
|
|
17
29
|
await generateBlsKeypair(options, log);
|
|
18
30
|
});
|
|
@@ -6,6 +6,7 @@ export type NewValidatorKeystoreOptions = {
|
|
|
6
6
|
file?: string;
|
|
7
7
|
count?: number;
|
|
8
8
|
publisherCount?: number;
|
|
9
|
+
publishers?: string[];
|
|
9
10
|
mnemonic?: string;
|
|
10
11
|
passphrase?: string;
|
|
11
12
|
accountIndex?: number;
|
|
@@ -13,14 +14,16 @@ export type NewValidatorKeystoreOptions = {
|
|
|
13
14
|
separatePublisher?: boolean;
|
|
14
15
|
ikm?: string;
|
|
15
16
|
blsPath?: string;
|
|
16
|
-
blsOnly?: boolean;
|
|
17
17
|
password?: string;
|
|
18
|
-
|
|
18
|
+
encryptedKeystoreDir?: string;
|
|
19
19
|
json?: boolean;
|
|
20
20
|
feeRecipient: AztecAddress;
|
|
21
21
|
coinbase?: EthAddress;
|
|
22
22
|
remoteSigner?: string;
|
|
23
|
-
|
|
23
|
+
stakerOutput?: boolean;
|
|
24
|
+
gseAddress?: EthAddress;
|
|
25
|
+
l1RpcUrls?: string[];
|
|
26
|
+
l1ChainId?: number;
|
|
24
27
|
};
|
|
25
28
|
export declare function newValidatorKeystore(options: NewValidatorKeystoreOptions, log: LogFn): Promise<void>;
|
|
26
|
-
//# sourceMappingURL=
|
|
29
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibmV3LmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY21kcy92YWxpZGF0b3Jfa2V5cy9uZXcudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBRUEsT0FBTyxLQUFLLEVBQUUsVUFBVSxFQUFFLE1BQU0sK0JBQStCLENBQUM7QUFDaEUsT0FBTyxLQUFLLEVBQUUsS0FBSyxFQUFFLE1BQU0sdUJBQXVCLENBQUM7QUFDbkQsT0FBTyxLQUFLLEVBQUUsWUFBWSxFQUFFLE1BQU0sNkJBQTZCLENBQUM7QUF5QmhFLE1BQU0sTUFBTSwyQkFBMkIsR0FBRztJQUN4QyxPQUFPLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDakIsSUFBSSxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2QsS0FBSyxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2YsY0FBYyxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ3hCLFVBQVUsQ0FBQyxFQUFFLE1BQU0sRUFBRSxDQUFDO0lBQ3RCLFFBQVEsQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUNsQixVQUFVLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDcEIsWUFBWSxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ3RCLFlBQVksQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUN0QixpQkFBaUIsQ0FBQyxFQUFFLE9BQU8sQ0FBQztJQUM1QixHQUFHLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDYixPQUFPLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDakIsUUFBUSxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2xCLG9CQUFvQixDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQzlCLElBQUksQ0FBQyxFQUFFLE9BQU8sQ0FBQztJQUNmLFlBQVksRUFBRSxZQUFZLENBQUM7SUFDM0IsUUFBUSxDQUFDLEVBQUUsVUFBVSxDQUFDO0lBQ3RCLFlBQVksQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUN0QixZQUFZLENBQUMsRUFBRSxPQUFPLENBQUM7SUFDdkIsVUFBVSxDQUFDLEVBQUUsVUFBVSxDQUFDO0lBQ3hCLFNBQVMsQ0FBQyxFQUFFLE1BQU0sRUFBRSxDQUFDO0lBQ3JCLFNBQVMsQ0FBQyxFQUFFLE1BQU0sQ0FBQztDQUNwQixDQUFDO0FBRUYsd0JBQXNCLG9CQUFvQixDQUFDLE9BQU8sRUFBRSwyQkFBMkIsRUFBRSxHQUFHLEVBQUUsS0FBSyxpQkF1SjFGIn0=
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"new.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/new.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"new.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/new.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAyBhE,MAAM,MAAM,2BAA2B,GAAG;IACxC,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IACtB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,iBAAiB,CAAC,EAAE,OAAO,CAAC;IAC5B,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAC9B,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,YAAY,EAAE,YAAY,CAAC;IAC3B,QAAQ,CAAC,EAAE,UAAU,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,UAAU,CAAC,EAAE,UAAU,CAAC;IACxB,SAAS,CAAC,EAAE,MAAM,EAAE,CAAC;IACrB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,wBAAsB,oBAAoB,CAAC,OAAO,EAAE,2BAA2B,EAAE,GAAG,EAAE,KAAK,iBAuJ1F"}
|
|
@@ -1,38 +1,56 @@
|
|
|
1
|
+
import { prettyPrintJSON } from '@aztec/cli/utils';
|
|
2
|
+
import { GSEContract, createEthereumChain } from '@aztec/ethereum';
|
|
1
3
|
import { wordlist } from '@scure/bip39/wordlists/english.js';
|
|
2
|
-
import {
|
|
4
|
+
import { writeFile } from 'fs/promises';
|
|
5
|
+
import { basename, dirname, join } from 'path';
|
|
6
|
+
import { createPublicClient, fallback, http } from 'viem';
|
|
3
7
|
import { generateMnemonic, mnemonicToAccount } from 'viem/accounts';
|
|
4
8
|
import { buildValidatorEntries, logValidatorSummaries, maybePrintJson, resolveKeystoreOutputPath, writeBlsBn254ToFile, writeEthJsonV3ToFile, writeKeystoreFile } from './shared.js';
|
|
9
|
+
import { processAttesterAccounts } from './staker.js';
|
|
10
|
+
import { validateBlsPathOptions, validatePublisherOptions, validateRemoteSignerOptions, validateStakerOutputOptions } from './utils.js';
|
|
5
11
|
export async function newValidatorKeystore(options, log) {
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
12
|
+
// validate bls-path inputs before proceeding with key generation
|
|
13
|
+
validateBlsPathOptions(options);
|
|
14
|
+
// validate staker output options before proceeding with key generation
|
|
15
|
+
validateStakerOutputOptions(options);
|
|
16
|
+
// validate publisher options
|
|
17
|
+
validatePublisherOptions(options);
|
|
18
|
+
// validate remote signer options
|
|
19
|
+
validateRemoteSignerOptions(options);
|
|
20
|
+
const { dataDir, file, count, publisherCount = 0, publishers, json, coinbase, accountIndex = 0, addressIndex = 0, feeRecipient, remoteSigner, blsPath, ikm, mnemonic: _mnemonic, password, encryptedKeystoreDir, stakerOutput, gseAddress, l1RpcUrls, l1ChainId } = options;
|
|
10
21
|
const mnemonic = _mnemonic ?? generateMnemonic(wordlist);
|
|
22
|
+
if (!_mnemonic && !json) {
|
|
23
|
+
log('No mnemonic provided, generating new one...');
|
|
24
|
+
log(`Using new mnemonic:`);
|
|
25
|
+
log('');
|
|
26
|
+
log(mnemonic);
|
|
27
|
+
log('');
|
|
28
|
+
}
|
|
11
29
|
const validatorCount = typeof count === 'number' && Number.isFinite(count) && count > 0 ? Math.floor(count) : 1;
|
|
12
30
|
const { outputPath } = await resolveKeystoreOutputPath(dataDir, file);
|
|
31
|
+
const keystoreOutDir = dirname(outputPath);
|
|
13
32
|
const { validators, summaries } = await buildValidatorEntries({
|
|
14
33
|
validatorCount,
|
|
15
34
|
publisherCount,
|
|
35
|
+
publishers,
|
|
16
36
|
accountIndex,
|
|
17
37
|
baseAddressIndex: addressIndex,
|
|
18
38
|
mnemonic,
|
|
19
39
|
ikm,
|
|
20
40
|
blsPath,
|
|
21
|
-
blsOnly,
|
|
22
41
|
feeRecipient,
|
|
23
42
|
coinbase,
|
|
24
|
-
remoteSigner
|
|
25
|
-
fundingAccount
|
|
43
|
+
remoteSigner
|
|
26
44
|
});
|
|
27
45
|
// If password provided, write ETH JSON V3 and BLS BN254 keystores and replace plaintext
|
|
28
46
|
if (password !== undefined) {
|
|
29
|
-
const
|
|
47
|
+
const encryptedKeystoreOutDir = encryptedKeystoreDir && encryptedKeystoreDir.length > 0 ? encryptedKeystoreDir : keystoreOutDir;
|
|
30
48
|
await writeEthJsonV3ToFile(validators, {
|
|
31
|
-
outDir:
|
|
49
|
+
outDir: encryptedKeystoreOutDir,
|
|
32
50
|
password
|
|
33
51
|
});
|
|
34
52
|
await writeBlsBn254ToFile(validators, {
|
|
35
|
-
outDir:
|
|
53
|
+
outDir: encryptedKeystoreOutDir,
|
|
36
54
|
password
|
|
37
55
|
});
|
|
38
56
|
}
|
|
@@ -41,13 +59,61 @@ export async function newValidatorKeystore(options, log) {
|
|
|
41
59
|
validators
|
|
42
60
|
};
|
|
43
61
|
await writeKeystoreFile(outputPath, keystore);
|
|
44
|
-
|
|
45
|
-
|
|
62
|
+
// Generate staker outputs if requested
|
|
63
|
+
const allStakerOutputs = [];
|
|
64
|
+
if (stakerOutput && gseAddress && l1RpcUrls && l1ChainId !== undefined) {
|
|
65
|
+
const chain = createEthereumChain(l1RpcUrls, l1ChainId);
|
|
66
|
+
const publicClient = createPublicClient({
|
|
67
|
+
chain: chain.chainInfo,
|
|
68
|
+
transport: fallback(l1RpcUrls.map((url)=>http(url)))
|
|
69
|
+
});
|
|
70
|
+
const gse = new GSEContract(publicClient, gseAddress);
|
|
71
|
+
// Extract keystore base name without extension for unique staker output filenames
|
|
72
|
+
const keystoreBaseName = basename(outputPath, '.json');
|
|
73
|
+
// Process each validator
|
|
74
|
+
for(let i = 0; i < validators.length; i++){
|
|
75
|
+
const validator = validators[i];
|
|
76
|
+
const outputs = await processAttesterAccounts(validator.attester, gse, password);
|
|
77
|
+
// Collect all staker outputs
|
|
78
|
+
for(let j = 0; j < outputs.length; j++){
|
|
79
|
+
allStakerOutputs.push(outputs[j]);
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
// Write a single JSON file with all staker outputs
|
|
83
|
+
if (allStakerOutputs.length > 0) {
|
|
84
|
+
const stakerOutputPath = join(keystoreOutDir, `${keystoreBaseName}_staker_output.json`);
|
|
85
|
+
await writeFile(stakerOutputPath, prettyPrintJSON(allStakerOutputs), 'utf-8');
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
const outputData = !_mnemonic ? {
|
|
89
|
+
...keystore,
|
|
90
|
+
generatedMnemonic: mnemonic
|
|
91
|
+
} : keystore;
|
|
92
|
+
// Handle JSON output
|
|
93
|
+
if (json) {
|
|
94
|
+
if (stakerOutput && allStakerOutputs.length > 0) {
|
|
95
|
+
const combinedOutput = {
|
|
96
|
+
keystore: outputData,
|
|
97
|
+
staker: allStakerOutputs
|
|
98
|
+
};
|
|
99
|
+
maybePrintJson(log, json, combinedOutput);
|
|
100
|
+
} else {
|
|
101
|
+
maybePrintJson(log, json, outputData);
|
|
102
|
+
}
|
|
103
|
+
} else {
|
|
46
104
|
log(`Wrote validator keystore to ${outputPath}`);
|
|
105
|
+
if (stakerOutput && allStakerOutputs.length > 0) {
|
|
106
|
+
const keystoreBaseName = basename(outputPath, '.json');
|
|
107
|
+
const stakerOutputPath = join(keystoreOutDir, `${keystoreBaseName}_staker_output.json`);
|
|
108
|
+
log(`Wrote staker output for ${allStakerOutputs.length} validator(s) to ${stakerOutputPath}`);
|
|
109
|
+
log('');
|
|
110
|
+
}
|
|
47
111
|
}
|
|
48
|
-
//
|
|
49
|
-
|
|
50
|
-
|
|
112
|
+
// print a concise summary of public keys (addresses and BLS pubkeys) if no --json options was selected
|
|
113
|
+
if (!json) {
|
|
114
|
+
logValidatorSummaries(log, summaries);
|
|
115
|
+
}
|
|
116
|
+
if (mnemonic && remoteSigner && !json) {
|
|
51
117
|
for(let i = 0; i < validatorCount; i++){
|
|
52
118
|
const addrIdx = addressIndex + i;
|
|
53
119
|
const acct = mnemonicToAccount(mnemonic, {
|
|
@@ -57,4 +123,9 @@ export async function newValidatorKeystore(options, log) {
|
|
|
57
123
|
log(`attester address: ${acct.address} remoteSignerUrl: ${remoteSigner}`);
|
|
58
124
|
}
|
|
59
125
|
}
|
|
126
|
+
// Log staker outputs if not in JSON mode
|
|
127
|
+
if (!json && stakerOutput && allStakerOutputs.length > 0) {
|
|
128
|
+
log('\nStaker outputs:');
|
|
129
|
+
log(prettyPrintJSON(allStakerOutputs));
|
|
130
|
+
}
|
|
60
131
|
}
|
|
@@ -10,18 +10,17 @@ export type ValidatorSummary = {
|
|
|
10
10
|
export type BuildValidatorsInput = {
|
|
11
11
|
validatorCount: number;
|
|
12
12
|
publisherCount?: number;
|
|
13
|
+
publishers?: string[];
|
|
13
14
|
accountIndex: number;
|
|
14
15
|
baseAddressIndex: number;
|
|
15
16
|
mnemonic: string;
|
|
16
17
|
ikm?: string;
|
|
17
18
|
blsPath?: string;
|
|
18
|
-
blsOnly?: boolean;
|
|
19
19
|
feeRecipient: AztecAddress;
|
|
20
20
|
coinbase?: EthAddress;
|
|
21
21
|
remoteSigner?: string;
|
|
22
|
-
fundingAccount?: EthAddress;
|
|
23
22
|
};
|
|
24
|
-
export declare function withValidatorIndex(path: string,
|
|
23
|
+
export declare function withValidatorIndex(path: string, accountIndex?: number, addressIndex?: number): string;
|
|
25
24
|
/**
|
|
26
25
|
* Compute a compressed BN254 G1 public key from a private key.
|
|
27
26
|
* @param privateKeyHex - Private key as 0x-prefixed hex string
|
|
@@ -57,6 +56,7 @@ export declare function writeBn254BlsKeystore(outDir: string, fileNameBase: stri
|
|
|
57
56
|
export declare function writeBlsBn254ToFile(validators: ValidatorKeyStore[], options: {
|
|
58
57
|
outDir: string;
|
|
59
58
|
password: string;
|
|
59
|
+
blsPath?: string;
|
|
60
60
|
}): Promise<void>;
|
|
61
61
|
/** Writes an Ethereum JSON V3 keystore using ethers, returns absolute path */
|
|
62
62
|
export declare function writeEthJsonV3Keystore(outDir: string, fileNameBase: string, password: string, privateKeyHex: string): Promise<string>;
|
|
@@ -65,4 +65,4 @@ export declare function writeEthJsonV3ToFile(validators: ValidatorKeyStore[], op
|
|
|
65
65
|
outDir: string;
|
|
66
66
|
password: string;
|
|
67
67
|
}): Promise<void>;
|
|
68
|
-
//# sourceMappingURL=
|
|
68
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"shared.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/shared.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,UAAU,EAAE,aAAa,EAAE,iBAAiB,EAAE,MAAM,4BAA4B,CAAC;AAC/F,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;
|
|
1
|
+
{"version":3,"file":"shared.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/shared.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,UAAU,EAAE,aAAa,EAAE,iBAAiB,EAAE,MAAM,4BAA4B,CAAC;AAC/F,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAWhE,MAAM,MAAM,gBAAgB,GAAG;IAAE,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,YAAY,CAAC,EAAE,MAAM,EAAE,CAAA;CAAE,CAAC;AAEvG,MAAM,MAAM,oBAAoB,GAAG;IACjC,cAAc,EAAE,MAAM,CAAC;IACvB,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IACtB,YAAY,EAAE,MAAM,CAAC;IACrB,gBAAgB,EAAE,MAAM,CAAC;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,YAAY,EAAE,YAAY,CAAC;IAC3B,QAAQ,CAAC,EAAE,UAAU,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB,CAAC;AAEF,wBAAgB,kBAAkB,CAAC,IAAI,EAAE,MAAM,EAAE,YAAY,GAAE,MAAU,EAAE,YAAY,GAAE,MAAU,UAqBlG;AAED;;;;GAIG;AACH,wBAAsB,6BAA6B,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAE1F;AAED,wBAAgB,iBAAiB,CAC/B,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,YAAY,EAAE,MAAM,EACpB,YAAY,CAAC,EAAE,MAAM,GACpB,UAAU,GAAG,aAAa,CAK5B;AAED,wBAAsB,qBAAqB,CAAC,KAAK,EAAE,oBAAoB;;;GAuEtE;AAED,wBAAsB,yBAAyB,CAAC,OAAO,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,MAAM;;;GAoB9E;AAED,wBAAsB,iBAAiB,CAAC,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,OAAO,iBAGtE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,QAsB9E;AAED,wBAAgB,cAAc,CAAC,GAAG,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,GAAG,SAAS,EAAE,GAAG,EAAE,OAAO,QAIrF;AAED;;;;;;;;;;;GAWG;AACH,wBAAsB,qBAAqB,CACzC,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,EACrB,SAAS,EAAE,MAAM,EACjB,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC,CASjB;AAED,yGAAyG;AACzG,wBAAsB,mBAAmB,CACvC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAC;IAAC,OAAO,CAAC,EAAE,MAAM,CAAA;CAAE,GAC9D,OAAO,CAAC,IAAI,CAAC,CAuBf;AAED,8EAA8E;AAC9E,wBAAsB,sBAAsB,CAC1C,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,CAQjB;AAED,kGAAkG;AAClG,wBAAsB,oBAAoB,CACxC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAA;CAAE,GAC5C,OAAO,CAAC,IAAI,CAAC,CAsCf"}
|
|
@@ -7,10 +7,27 @@ import { access, writeFile } from 'fs/promises';
|
|
|
7
7
|
import { homedir } from 'os';
|
|
8
8
|
import { dirname, isAbsolute, join } from 'path';
|
|
9
9
|
import { mnemonicToAccount } from 'viem/accounts';
|
|
10
|
-
|
|
10
|
+
import { defaultBlsPath } from './utils.js';
|
|
11
|
+
export function withValidatorIndex(path, accountIndex = 0, addressIndex = 0) {
|
|
12
|
+
// NOTE: The legacy BLS CLI is to allow users who generated keys in 2.1.4 to be able to use the same command
|
|
13
|
+
// to re-generate their keys. In 2.1.5 we switched how we append addresses to the path so this is to maintain backwards compatibility.
|
|
14
|
+
const useLegacyBlsCli = [
|
|
15
|
+
'true',
|
|
16
|
+
'1',
|
|
17
|
+
'yes',
|
|
18
|
+
'y'
|
|
19
|
+
].includes(process.env.LEGACY_BLS_CLI ?? '');
|
|
20
|
+
const defaultBlsPathParts = defaultBlsPath.split('/');
|
|
11
21
|
const parts = path.split('/');
|
|
12
|
-
if (parts.length
|
|
13
|
-
|
|
22
|
+
if (parts.length == defaultBlsPathParts.length && parts.every((part, index)=>part === defaultBlsPathParts[index])) {
|
|
23
|
+
if (useLegacyBlsCli) {
|
|
24
|
+
// In 2.1.4, we were using address-index in parts[3] and did NOT use account-index, check lines 32 & 84
|
|
25
|
+
// https://github.com/AztecProtocol/aztec-packages/blob/v2.1.4/yarn-project/cli/src/cmds/validator_keys/shared.ts
|
|
26
|
+
parts[3] = String(addressIndex);
|
|
27
|
+
} else {
|
|
28
|
+
parts[3] = String(accountIndex);
|
|
29
|
+
parts[5] = String(addressIndex);
|
|
30
|
+
}
|
|
14
31
|
return parts.join('/');
|
|
15
32
|
}
|
|
16
33
|
return path;
|
|
@@ -33,29 +50,16 @@ export function deriveEthAttester(mnemonic, baseAccountIndex, addressIndex, remo
|
|
|
33
50
|
} : '0x' + Buffer.from(acct.getHdKey().privateKey).toString('hex');
|
|
34
51
|
}
|
|
35
52
|
export async function buildValidatorEntries(input) {
|
|
36
|
-
const { validatorCount, publisherCount = 0, accountIndex, baseAddressIndex, mnemonic, ikm, blsPath,
|
|
37
|
-
const defaultBlsPath = 'm/12381/3600/0/0/0';
|
|
53
|
+
const { validatorCount, publisherCount = 0, publishers, accountIndex, baseAddressIndex, mnemonic, ikm, blsPath, feeRecipient, coinbase, remoteSigner } = input;
|
|
38
54
|
const summaries = [];
|
|
39
55
|
const validators = await Promise.all(Array.from({
|
|
40
56
|
length: validatorCount
|
|
41
57
|
}, async (_unused, i)=>{
|
|
42
58
|
const addressIndex = baseAddressIndex + i;
|
|
43
59
|
const basePath = blsPath ?? defaultBlsPath;
|
|
44
|
-
const perValidatorPath = withValidatorIndex(basePath, addressIndex);
|
|
45
|
-
const blsPrivKey =
|
|
60
|
+
const perValidatorPath = withValidatorIndex(basePath, accountIndex, addressIndex);
|
|
61
|
+
const blsPrivKey = ikm || mnemonic ? deriveBlsPrivateKey(mnemonic, ikm, perValidatorPath) : undefined;
|
|
46
62
|
const blsPubCompressed = blsPrivKey ? await computeBlsPublicKeyCompressed(blsPrivKey) : undefined;
|
|
47
|
-
if (blsOnly) {
|
|
48
|
-
const attester = {
|
|
49
|
-
bls: blsPrivKey
|
|
50
|
-
};
|
|
51
|
-
summaries.push({
|
|
52
|
-
attesterBls: blsPubCompressed
|
|
53
|
-
});
|
|
54
|
-
return {
|
|
55
|
-
attester,
|
|
56
|
-
feeRecipient
|
|
57
|
-
};
|
|
58
|
-
}
|
|
59
63
|
const ethAttester = deriveEthAttester(mnemonic, accountIndex, addressIndex, remoteSigner);
|
|
60
64
|
const attester = blsPrivKey ? {
|
|
61
65
|
eth: ethAttester,
|
|
@@ -63,7 +67,10 @@ export async function buildValidatorEntries(input) {
|
|
|
63
67
|
} : ethAttester;
|
|
64
68
|
let publisherField;
|
|
65
69
|
const publisherAddresses = [];
|
|
66
|
-
if (
|
|
70
|
+
if (publishers && publishers.length > 0) {
|
|
71
|
+
publisherAddresses.push(...publishers);
|
|
72
|
+
publisherField = publishers.length === 1 ? publishers[0] : publishers;
|
|
73
|
+
} else if (publisherCount > 0) {
|
|
67
74
|
const publishersBaseIndex = baseAddressIndex + validatorCount + i * publisherCount;
|
|
68
75
|
const publisherAccounts = Array.from({
|
|
69
76
|
length: publisherCount
|
|
@@ -97,8 +104,7 @@ export async function buildValidatorEntries(input) {
|
|
|
97
104
|
publisher: publisherField
|
|
98
105
|
} : {},
|
|
99
106
|
feeRecipient,
|
|
100
|
-
coinbase
|
|
101
|
-
fundingAccount
|
|
107
|
+
coinbase: coinbase ?? attesterEthAddress
|
|
102
108
|
};
|
|
103
109
|
}));
|
|
104
110
|
return {
|
|
@@ -202,7 +208,7 @@ export function maybePrintJson(log, jsonFlag, obj) {
|
|
|
202
208
|
continue;
|
|
203
209
|
}
|
|
204
210
|
const pub = await computeBlsPublicKeyCompressed(blsKey);
|
|
205
|
-
const path =
|
|
211
|
+
const path = options.blsPath ?? defaultBlsPath;
|
|
206
212
|
const fileBase = `${String(i + 1)}_${pub.slice(2, 18)}`;
|
|
207
213
|
const keystorePath = await writeBn254BlsKeystore(options.outDir, fileBase, options.password, blsKey, pub, path);
|
|
208
214
|
if (typeof att === 'object') {
|
|
@@ -263,9 +269,5 @@ export function maybePrintJson(log, jsonFlag, obj) {
|
|
|
263
269
|
v.publisher = await maybeEncryptEth(pub, `publisher_${i + 1}`);
|
|
264
270
|
}
|
|
265
271
|
}
|
|
266
|
-
// Optional fundingAccount within validator
|
|
267
|
-
if ('fundingAccount' in v) {
|
|
268
|
-
v.fundingAccount = await maybeEncryptEth(v.fundingAccount, `funding_${i + 1}`);
|
|
269
|
-
}
|
|
270
272
|
}
|
|
271
273
|
}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
import { GSEContract } from '@aztec/ethereum';
|
|
2
|
+
import type { EthAddress } from '@aztec/foundation/eth-address';
|
|
3
|
+
import type { LogFn } from '@aztec/foundation/log';
|
|
4
|
+
import type { AttesterAccounts } from '@aztec/node-keystore/types';
|
|
5
|
+
export type StakerOptions = {
|
|
6
|
+
from: string;
|
|
7
|
+
password?: string;
|
|
8
|
+
output?: string;
|
|
9
|
+
gseAddress: EthAddress;
|
|
10
|
+
l1RpcUrls: string[];
|
|
11
|
+
l1ChainId: number;
|
|
12
|
+
};
|
|
13
|
+
export type StakerOutput = {
|
|
14
|
+
attester: string;
|
|
15
|
+
publicKeyG1: {
|
|
16
|
+
x: string;
|
|
17
|
+
y: string;
|
|
18
|
+
};
|
|
19
|
+
publicKeyG2: {
|
|
20
|
+
x0: string;
|
|
21
|
+
x1: string;
|
|
22
|
+
y0: string;
|
|
23
|
+
y1: string;
|
|
24
|
+
};
|
|
25
|
+
proofOfPossession: {
|
|
26
|
+
x: string;
|
|
27
|
+
y: string;
|
|
28
|
+
};
|
|
29
|
+
};
|
|
30
|
+
/**
|
|
31
|
+
* Process AttesterAccounts (which can be a single attester, array, or mnemonic)
|
|
32
|
+
*/
|
|
33
|
+
export declare function processAttesterAccounts(attesterAccounts: AttesterAccounts, gse: GSEContract, password?: string): Promise<StakerOutput[]>;
|
|
34
|
+
/**
|
|
35
|
+
* Main staker command function
|
|
36
|
+
*/
|
|
37
|
+
export declare function generateStakerJson(options: StakerOptions, log: LogFn): Promise<void>;
|
|
38
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"staker.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/staker.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAuB,MAAM,iBAAiB,CAAC;AAGnE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAEhE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,KAAK,EAEV,gBAAgB,EAKjB,MAAM,4BAA4B,CAAC;AAQpC,MAAM,MAAM,aAAa,GAAG;IAC1B,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,UAAU,EAAE,UAAU,CAAC;IACvB,SAAS,EAAE,MAAM,EAAE,CAAC;IACpB,SAAS,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF,MAAM,MAAM,YAAY,GAAG;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,WAAW,EAAE;QACX,CAAC,EAAE,MAAM,CAAC;QACV,CAAC,EAAE,MAAM,CAAC;KACX,CAAC;IACF,WAAW,EAAE;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;KACZ,CAAC;IACF,iBAAiB,EAAE;QACjB,CAAC,EAAE,MAAM,CAAC;QACV,CAAC,EAAE,MAAM,CAAC;KACX,CAAC;CACH,CAAC;AA2KF;;GAEG;AACH,wBAAsB,uBAAuB,CAC3C,gBAAgB,EAAE,gBAAgB,EAClC,GAAG,EAAE,WAAW,EAChB,QAAQ,CAAC,EAAE,MAAM,GAChB,OAAO,CAAC,YAAY,EAAE,CAAC,CAqBzB;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,OAAO,EAAE,aAAa,EAAE,GAAG,EAAE,KAAK,GAAG,OAAO,CAAC,IAAI,CAAC,CA+C1F"}
|