@aztec/cli 0.0.1-commit.b655e406 → 0.0.1-commit.fce3e4f

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (105) hide show
  1. package/README.md +1 -1
  2. package/dest/cmds/aztec_node/block_number.d.ts +1 -1
  3. package/dest/cmds/aztec_node/get_block.d.ts +1 -1
  4. package/dest/cmds/aztec_node/get_current_base_fee.d.ts +1 -1
  5. package/dest/cmds/aztec_node/get_l1_to_l2_message_witness.d.ts +1 -1
  6. package/dest/cmds/aztec_node/get_logs.d.ts +1 -1
  7. package/dest/cmds/aztec_node/get_node_info.d.ts +1 -1
  8. package/dest/cmds/aztec_node/index.d.ts +1 -1
  9. package/dest/cmds/contracts/index.d.ts +1 -1
  10. package/dest/cmds/contracts/inspect_contract.d.ts +1 -1
  11. package/dest/cmds/contracts/inspect_contract.d.ts.map +1 -1
  12. package/dest/cmds/contracts/inspect_contract.js +3 -9
  13. package/dest/cmds/contracts/parse_parameter_struct.d.ts +1 -1
  14. package/dest/cmds/infrastructure/index.d.ts +1 -1
  15. package/dest/cmds/infrastructure/sequencers.d.ts +1 -1
  16. package/dest/cmds/infrastructure/setup_l2_contract.d.ts +1 -1
  17. package/dest/cmds/l1/advance_epoch.d.ts +1 -1
  18. package/dest/cmds/l1/assume_proven_through.d.ts +1 -1
  19. package/dest/cmds/l1/bridge_erc20.d.ts +1 -1
  20. package/dest/cmds/l1/create_l1_account.d.ts +1 -1
  21. package/dest/cmds/l1/deploy_l1_contracts.d.ts +1 -1
  22. package/dest/cmds/l1/deploy_new_rollup.d.ts +1 -1
  23. package/dest/cmds/l1/get_l1_addresses.d.ts +1 -1
  24. package/dest/cmds/l1/get_l1_balance.d.ts +1 -1
  25. package/dest/cmds/l1/governance_utils.d.ts +5 -5
  26. package/dest/cmds/l1/governance_utils.d.ts.map +1 -1
  27. package/dest/cmds/l1/index.d.ts +1 -1
  28. package/dest/cmds/l1/prover_stats.d.ts +1 -1
  29. package/dest/cmds/l1/prover_stats.d.ts.map +1 -1
  30. package/dest/cmds/l1/prover_stats.js +28 -28
  31. package/dest/cmds/l1/trigger_seed_snapshot.d.ts +2 -2
  32. package/dest/cmds/l1/trigger_seed_snapshot.d.ts.map +1 -1
  33. package/dest/cmds/l1/update_l1_validators.d.ts +6 -6
  34. package/dest/cmds/l1/update_l1_validators.d.ts.map +1 -1
  35. package/dest/cmds/l1/update_l1_validators.js +2 -2
  36. package/dest/cmds/misc/compute_selector.d.ts +1 -1
  37. package/dest/cmds/misc/example_contracts.d.ts +1 -1
  38. package/dest/cmds/misc/generate_bootnode_enr.d.ts +1 -1
  39. package/dest/cmds/misc/generate_p2p_private_key.d.ts +1 -1
  40. package/dest/cmds/misc/generate_secret_and_hash.d.ts +1 -1
  41. package/dest/cmds/misc/generate_secret_key.d.ts +1 -1
  42. package/dest/cmds/misc/get_canonical_sponsored_fpc_address.d.ts +1 -1
  43. package/dest/cmds/misc/index.d.ts +1 -1
  44. package/dest/cmds/misc/update/common.d.ts +1 -1
  45. package/dest/cmds/misc/update/github.d.ts +1 -1
  46. package/dest/cmds/misc/update/noir.d.ts +1 -1
  47. package/dest/cmds/misc/update/npm.d.ts +1 -1
  48. package/dest/cmds/misc/update/npm.js +1 -1
  49. package/dest/cmds/misc/update/utils.d.ts +1 -1
  50. package/dest/cmds/misc/update.d.ts +1 -1
  51. package/dest/cmds/validator_keys/add.d.ts +1 -1
  52. package/dest/cmds/validator_keys/add.d.ts.map +1 -1
  53. package/dest/cmds/validator_keys/add.js +20 -7
  54. package/dest/cmds/validator_keys/generate_bls_keypair.d.ts +1 -1
  55. package/dest/cmds/validator_keys/generate_bls_keypair.d.ts.map +1 -1
  56. package/dest/cmds/validator_keys/generate_bls_keypair.js +2 -1
  57. package/dest/cmds/validator_keys/index.d.ts +1 -1
  58. package/dest/cmds/validator_keys/index.d.ts.map +1 -1
  59. package/dest/cmds/validator_keys/index.js +16 -4
  60. package/dest/cmds/validator_keys/new.d.ts +7 -4
  61. package/dest/cmds/validator_keys/new.d.ts.map +1 -1
  62. package/dest/cmds/validator_keys/new.js +87 -16
  63. package/dest/cmds/validator_keys/shared.d.ts +4 -4
  64. package/dest/cmds/validator_keys/shared.d.ts.map +1 -1
  65. package/dest/cmds/validator_keys/shared.js +29 -27
  66. package/dest/cmds/validator_keys/staker.d.ts +38 -0
  67. package/dest/cmds/validator_keys/staker.d.ts.map +1 -0
  68. package/dest/cmds/validator_keys/staker.js +207 -0
  69. package/dest/cmds/validator_keys/utils.d.ts +25 -0
  70. package/dest/cmds/validator_keys/utils.d.ts.map +1 -0
  71. package/dest/cmds/validator_keys/utils.js +52 -0
  72. package/dest/config/cached_fetch.d.ts +1 -1
  73. package/dest/config/chain_l2_config.d.ts +11 -10
  74. package/dest/config/chain_l2_config.d.ts.map +1 -1
  75. package/dest/config/chain_l2_config.js +64 -34
  76. package/dest/config/enrich_env.d.ts +1 -1
  77. package/dest/config/get_l1_config.d.ts +1 -1
  78. package/dest/config/index.d.ts +1 -1
  79. package/dest/config/network_config.d.ts +2 -2
  80. package/dest/config/network_config.d.ts.map +1 -1
  81. package/dest/config/network_config.js +19 -5
  82. package/dest/utils/aztec.d.ts +1 -1
  83. package/dest/utils/aztec.d.ts.map +1 -1
  84. package/dest/utils/commands.d.ts +2 -2
  85. package/dest/utils/commands.d.ts.map +1 -1
  86. package/dest/utils/encoding.d.ts +1 -1
  87. package/dest/utils/github.d.ts +1 -1
  88. package/dest/utils/index.d.ts +1 -1
  89. package/dest/utils/inspect.d.ts +1 -1
  90. package/dest/utils/setup_contracts.d.ts +1 -1
  91. package/package.json +34 -29
  92. package/public_include_metric_prefixes.json +1 -0
  93. package/src/cmds/contracts/inspect_contract.ts +3 -10
  94. package/src/cmds/l1/prover_stats.ts +36 -29
  95. package/src/cmds/l1/update_l1_validators.ts +2 -2
  96. package/src/cmds/misc/update/npm.ts +1 -1
  97. package/src/cmds/validator_keys/add.ts +20 -10
  98. package/src/cmds/validator_keys/generate_bls_keypair.ts +2 -1
  99. package/src/cmds/validator_keys/index.ts +67 -21
  100. package/src/cmds/validator_keys/new.ts +109 -23
  101. package/src/cmds/validator_keys/shared.ts +30 -26
  102. package/src/cmds/validator_keys/staker.ts +300 -0
  103. package/src/cmds/validator_keys/utils.ts +80 -0
  104. package/src/config/chain_l2_config.ts +86 -45
  105. package/src/config/network_config.ts +26 -5
@@ -11,4 +11,4 @@ export declare function atomicUpdateFile(filePath: string, contents: string): Pr
11
11
  * @returns The Nargo.toml contents as a string
12
12
  */
13
13
  export declare function prettyPrintNargoToml(config: NoirPackageConfig): string;
14
- //# sourceMappingURL=utils.d.ts.map
14
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXRpbHMuZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9jbWRzL21pc2MvdXBkYXRlL3V0aWxzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sS0FBSyxFQUFFLGlCQUFpQixFQUFFLE1BQU0sd0JBQXdCLENBQUM7QUFNaEU7Ozs7R0FJRztBQUNILHdCQUFzQixnQkFBZ0IsQ0FBQyxRQUFRLEVBQUUsTUFBTSxFQUFFLFFBQVEsRUFBRSxNQUFNLGlCQXFCeEU7QUFFRDs7OztHQUlHO0FBQ0gsd0JBQWdCLG9CQUFvQixDQUFDLE1BQU0sRUFBRSxpQkFBaUIsR0FBRyxNQUFNLENBVXRFIn0=
@@ -1,3 +1,3 @@
1
1
  import type { LogFn } from '@aztec/foundation/log';
2
2
  export declare function updateProject(projectPath: string, contracts: string[], aztecVersion: string, log: LogFn): Promise<void>;
3
- //# sourceMappingURL=update.d.ts.map
3
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXBkYXRlLmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY21kcy9taXNjL3VwZGF0ZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEtBQUssRUFBRSxLQUFLLEVBQUUsTUFBTSx1QkFBdUIsQ0FBQztBQVluRCx3QkFBc0IsYUFBYSxDQUNqQyxXQUFXLEVBQUUsTUFBTSxFQUNuQixTQUFTLEVBQUUsTUFBTSxFQUFFLEVBQ25CLFlBQVksRUFBRSxNQUFNLEVBQ3BCLEdBQUcsRUFBRSxLQUFLLEdBQ1QsT0FBTyxDQUFDLElBQUksQ0FBQyxDQTJDZiJ9
@@ -2,4 +2,4 @@ import type { LogFn } from '@aztec/foundation/log';
2
2
  import type { NewValidatorKeystoreOptions } from './new.js';
3
3
  export type AddValidatorKeysOptions = NewValidatorKeystoreOptions;
4
4
  export declare function addValidatorKeys(existing: string, options: AddValidatorKeysOptions, log: LogFn): Promise<void>;
5
- //# sourceMappingURL=add.d.ts.map
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYWRkLmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY21kcy92YWxpZGF0b3Jfa2V5cy9hZGQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQ0EsT0FBTyxLQUFLLEVBQUUsS0FBSyxFQUFFLE1BQU0sdUJBQXVCLENBQUM7QUFRbkQsT0FBTyxLQUFLLEVBQUUsMkJBQTJCLEVBQUUsTUFBTSxVQUFVLENBQUM7QUFXNUQsTUFBTSxNQUFNLHVCQUF1QixHQUFHLDJCQUEyQixDQUFDO0FBRWxFLHdCQUFzQixnQkFBZ0IsQ0FBQyxRQUFRLEVBQUUsTUFBTSxFQUFFLE9BQU8sRUFBRSx1QkFBdUIsRUFBRSxHQUFHLEVBQUUsS0FBSyxpQkFvR3BHIn0=
@@ -1 +1 @@
1
- {"version":3,"file":"add.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/add.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAQnD,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,UAAU,CAAC;AAU5D,MAAM,MAAM,uBAAuB,GAAG,2BAA2B,CAAC;AAElE,wBAAsB,gBAAgB,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,uBAAuB,EAAE,GAAG,EAAE,KAAK,iBA2FpG"}
1
+ {"version":3,"file":"add.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/add.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAQnD,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,UAAU,CAAC;AAW5D,MAAM,MAAM,uBAAuB,GAAG,2BAA2B,CAAC;AAElE,wBAAsB,gBAAgB,CAAC,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,uBAAuB,EAAE,GAAG,EAAE,KAAK,iBAoGpG"}
@@ -3,8 +3,15 @@ import { wordlist } from '@scure/bip39/wordlists/english.js';
3
3
  import { dirname, isAbsolute, join } from 'path';
4
4
  import { generateMnemonic } from 'viem/accounts';
5
5
  import { buildValidatorEntries, logValidatorSummaries, maybePrintJson, writeBlsBn254ToFile, writeEthJsonV3ToFile, writeKeystoreFile } from './shared.js';
6
+ import { validateBlsPathOptions, validatePublisherOptions, validateRemoteSignerOptions } from './utils.js';
6
7
  export async function addValidatorKeys(existing, options, log) {
7
- const { dataDir, file, count, publisherCount = 0, mnemonic, accountIndex = 0, addressIndex, ikm, blsPath, blsOnly, json, feeRecipient: feeRecipientOpt, coinbase: coinbaseOpt, fundingAccount: fundingAccountOpt, remoteSigner: remoteSignerOpt, password, outDir } = options;
8
+ // validate bls-path inputs before proceeding with key generation
9
+ validateBlsPathOptions(options);
10
+ // validate publisher options
11
+ validatePublisherOptions(options);
12
+ // validate remote signer options
13
+ validateRemoteSignerOptions(options);
14
+ const { dataDir, file, count, publisherCount = 0, publishers, mnemonic, accountIndex = 0, addressIndex, ikm, blsPath, json, feeRecipient: feeRecipientOpt, coinbase: coinbaseOpt, remoteSigner: remoteSignerOpt, password, encryptedKeystoreDir } = options;
8
15
  const validatorCount = typeof count === 'number' && Number.isFinite(count) && count > 0 ? Math.floor(count) : 1;
9
16
  const baseAddressIndex = addressIndex ?? 0;
10
17
  const keystore = loadKeystoreFile(existing);
@@ -17,7 +24,6 @@ export async function addValidatorKeys(existing, options, log) {
17
24
  throw new Error('feeRecipient is required (either present in existing file or via --fee-recipient)');
18
25
  }
19
26
  const coinbase = coinbaseOpt ?? first.coinbase;
20
- const fundingAccount = fundingAccountOpt ?? first.fundingAccount;
21
27
  const derivedRemoteSigner = first.attester?.remoteSignerUrl || first.attester?.eth?.remoteSignerUrl;
22
28
  const remoteSigner = remoteSignerOpt ?? derivedRemoteSigner;
23
29
  // Ensure we always have a mnemonic for key derivation if none was provided
@@ -27,28 +33,35 @@ export async function addValidatorKeys(existing, options, log) {
27
33
  const { validators, summaries } = await buildValidatorEntries({
28
34
  validatorCount,
29
35
  publisherCount,
36
+ publishers,
30
37
  accountIndex,
31
38
  baseAddressIndex: effectiveBaseAddressIndex,
32
39
  mnemonic: mnemonicToUse,
33
40
  ikm,
34
41
  blsPath,
35
- blsOnly,
36
42
  feeRecipient,
37
43
  coinbase,
38
- remoteSigner,
39
- fundingAccount
44
+ remoteSigner
40
45
  });
41
46
  keystore.validators.push(...validators);
42
47
  // If password provided, write ETH JSON V3 and BLS BN254 keystores and replace plaintext
43
48
  if (password !== undefined) {
44
- const targetDir = outDir && outDir.length > 0 ? outDir : dataDir && dataDir.length > 0 ? dataDir : dirname(existing);
49
+ let targetDir;
50
+ if (encryptedKeystoreDir && encryptedKeystoreDir.length > 0) {
51
+ targetDir = encryptedKeystoreDir;
52
+ } else if (dataDir && dataDir.length > 0) {
53
+ targetDir = dataDir;
54
+ } else {
55
+ targetDir = dirname(existing);
56
+ }
45
57
  await writeEthJsonV3ToFile(keystore.validators, {
46
58
  outDir: targetDir,
47
59
  password
48
60
  });
49
61
  await writeBlsBn254ToFile(keystore.validators, {
50
62
  outDir: targetDir,
51
- password
63
+ password,
64
+ blsPath
52
65
  });
53
66
  }
54
67
  let outputPath = existing;
@@ -9,4 +9,4 @@ export type GenerateBlsKeypairOptions = {
9
9
  out?: string;
10
10
  };
11
11
  export declare function generateBlsKeypair(options: GenerateBlsKeypairOptions, log: LogFn): Promise<void>;
12
- //# sourceMappingURL=generate_bls_keypair.d.ts.map
12
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1 +1 @@
1
- {"version":3,"file":"generate_bls_keypair.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/generate_bls_keypair.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAMnD,MAAM,MAAM,yBAAyB,GAAG;IACtC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,EAAE,CAAC,EAAE,OAAO,CAAC;IACb,UAAU,CAAC,EAAE,OAAO,CAAC;IACrB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF,wBAAsB,kBAAkB,CAAC,OAAO,EAAE,yBAAyB,EAAE,GAAG,EAAE,KAAK,iBAetF"}
1
+ {"version":3,"file":"generate_bls_keypair.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/generate_bls_keypair.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAOnD,MAAM,MAAM,yBAAyB,GAAG;IACtC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,EAAE,CAAC,EAAE,OAAO,CAAC;IACb,UAAU,CAAC,EAAE,OAAO,CAAC;IACrB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF,wBAAsB,kBAAkB,CAAC,OAAO,EAAE,yBAAyB,EAAE,GAAG,EAAE,KAAK,iBAetF"}
@@ -1,9 +1,10 @@
1
1
  import { deriveBlsPrivateKey } from '@aztec/foundation/crypto';
2
2
  import { writeFile } from 'fs/promises';
3
3
  import { computeBlsPublicKeyCompressed, withValidatorIndex } from './shared.js';
4
+ import { defaultBlsPath } from './utils.js';
4
5
  export async function generateBlsKeypair(options, log) {
5
6
  const { mnemonic, ikm, blsPath, compressed = true, json, out } = options;
6
- const path = withValidatorIndex(blsPath ?? 'm/12381/3600/0/0/0', 0);
7
+ const path = withValidatorIndex(blsPath ?? defaultBlsPath, 0);
7
8
  const priv = deriveBlsPrivateKey(mnemonic, ikm, path);
8
9
  const pub = await computeBlsPublicKeyCompressed(priv);
9
10
  const result = {
@@ -1,4 +1,4 @@
1
1
  import type { LogFn } from '@aztec/foundation/log';
2
2
  import { Command } from 'commander';
3
3
  export declare function injectCommands(program: Command, log: LogFn): Command;
4
- //# sourceMappingURL=index.d.ts.map
4
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9jbWRzL3ZhbGlkYXRvcl9rZXlzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sS0FBSyxFQUFFLEtBQUssRUFBRSxNQUFNLHVCQUF1QixDQUFDO0FBRW5ELE9BQU8sRUFBRSxPQUFPLEVBQUUsTUFBTSxXQUFXLENBQUM7QUFLcEMsd0JBQWdCLGNBQWMsQ0FBQyxPQUFPLEVBQUUsT0FBTyxFQUFFLEdBQUcsRUFBRSxLQUFLLFdBc0kxRCJ9
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAIpC,wBAAgB,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,WAyF1D"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAKpC,wBAAgB,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,WAsI1D"}
@@ -1,18 +1,30 @@
1
1
  import { parseAztecAddress, parseEthereumAddress, parseHex, parseOptionalInteger } from '../../utils/commands.js';
2
+ import { defaultBlsPath } from './utils.js';
2
3
  export function injectCommands(program, log) {
3
4
  const group = program.command('validator-keys').aliases([
4
- 'valKeys'
5
+ 'valKeys',
6
+ 'valkeys'
5
7
  ]).description('Manage validator keystores for node operators');
6
- group.command('new').summary('Generate a new validator keystore JSON').description('Generates a new validator keystore with ETH secp256k1 accounts and optional BLS accounts').option('--data-dir <path>', 'Directory to store keystore(s). Defaults to ~/.aztec/keystore').option('--file <name>', 'Keystore file name. Defaults to key1.json (or keyN.json if key1.json exists)').option('--count <N>', 'Number of validators to generate', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default 1)', (value)=>parseOptionalInteger(value, 0)).option('--mnemonic <mnemonic>', 'Mnemonic for ETH/BLS derivation').option('--passphrase <str>', 'Optional passphrase for mnemonic').option('--account-index <N>', 'Base account index for ETH derivation', parseOptionalInteger).option('--address-index <N>', 'Base address index for ETH derivation', parseOptionalInteger).option('--coinbase <address>', 'Coinbase ETH address to use when proposing', parseEthereumAddress).option('--funding-account <address>', 'ETH account to fund publishers', parseEthereumAddress).option('--remote-signer <url>', 'Default remote signer URL for accounts in this file').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', 'EIP-2334 path (default m/12381/3600/0/0/0)').option('--bls-only', 'Generate only BLS keys').option('--password <str>', 'Password for writing keystore files (ETH JSON V3 and BLS EIP-2335). Empty string allowed').option('--out-dir <dir>', 'Output directory for generated keystore file(s)').option('--json', 'Echo resulting JSON to stdout').requiredOption('--fee-recipient <address>', 'Aztec address that will receive fees', parseAztecAddress).action(async (options)=>{
8
+ group.command('new').summary('Generate a new validator keystore JSON').description('Generates a new validator keystore with ETH secp256k1 accounts and optional BLS accounts').option('--data-dir <path>', 'Directory to store keystore(s). Defaults to ~/.aztec/keystore').option('--file <name>', 'Keystore file name. Defaults to key1.json (or keyN.json if key1.json exists)').option('--count <N>', 'Number of validators to generate', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default 0)', (value)=>parseOptionalInteger(value, 0)).option('--publishers <privateKeys>', 'Comma-separated list of publisher private keys for all validators.', (value)=>value.split(',').map((key)=>key.trim())).option('--mnemonic <mnemonic>', 'Mnemonic for ETH/BLS derivation').option('--passphrase <str>', 'Optional passphrase for mnemonic').option('--account-index <N>', 'Base account index for ETH/BLS derivation', parseOptionalInteger).option('--address-index <N>', 'Base address index for ETH/BLS derivation', parseOptionalInteger).option('--coinbase <address>', 'Coinbase ETH address to use when proposing. Defaults to attester address.', parseEthereumAddress)// TODO: add funding account back in when implemented
9
+ // .option('--funding-account <privateKey|address>', 'ETH private key (or address for remote signer setup) to fund publishers')
10
+ .option('--remote-signer <url>', 'Default remote signer URL for accounts in this file').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', `EIP-2334 path (default ${defaultBlsPath})`).option('--password <str>', 'Password for writing keystore files (ETH JSON V3 and BLS EIP-2335). Empty string allowed').option('--encrypted-keystore-dir <dir>', 'Output directory for encrypted keystore file(s)').option('--json', 'Echo resulting JSON to stdout').option('--staker-output', 'Generate a single staker output JSON file with an array of validator entries').option('--gse-address <address>', 'GSE contract address (required with --staker-output)', parseEthereumAddress).option('--l1-rpc-urls <urls>', 'L1 RPC URLs (comma-separated, required with --staker-output)', (value)=>value.split(',')).option('-c, --l1-chain-id <number>', 'L1 chain ID (required with --staker-output)', (value)=>parseInt(value), 31337).requiredOption('--fee-recipient <address>', 'Aztec address that will receive fees', parseAztecAddress).action(async (options)=>{
7
11
  const { newValidatorKeystore } = await import('./new.js');
8
12
  await newValidatorKeystore(options, log);
9
13
  });
10
- group.command('add').summary('Augment an existing validator keystore JSON').description('Adds attester/publisher/BLS entries to an existing keystore using the same flags as new').argument('<existing>', 'Path to existing keystore JSON').option('--data-dir <path>', 'Directory where keystore(s) live').option('--file <name>', 'Override output file name').option('--count <N>', 'Number of validators to add', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default 1)', (value)=>parseOptionalInteger(value, 0)).option('--mnemonic <mnemonic>', 'Mnemonic for ETH/BLS derivation').option('--passphrase <str>', 'Optional passphrase for mnemonic').option('--account-index <N>', 'Base account index for ETH derivation', parseOptionalInteger).option('--address-index <N>', 'Base address index for ETH derivation', parseOptionalInteger).option('--coinbase <address>', 'Coinbase ETH address to use when proposing', parseEthereumAddress).option('--funding-account <address>', 'ETH account to fund publishers', parseEthereumAddress).option('--remote-signer <url>', 'Default remote signer URL for accounts in this file').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', 'EIP-2334 path (default m/12381/3600/0/0/0)').option('--bls-only', 'Generate only BLS keys').option('--empty', 'Generate an empty skeleton without keys').option('--password <str>', 'Password for writing keystore files (ETH JSON V3 and BLS EIP-2335). Empty string allowed').option('--out-dir <dir>', 'Output directory for generated keystore file(s)').option('--json', 'Echo resulting JSON to stdout').requiredOption('--fee-recipient <address>', 'Aztec address that will receive fees', parseAztecAddress).action(async (existing, options)=>{
14
+ group.command('add').summary('Augment an existing validator keystore JSON').description('Adds attester/publisher/BLS entries to an existing keystore using the same flags as new').argument('<existing>', 'Path to existing keystore JSON').option('--data-dir <path>', 'Directory where keystore(s) live. (default: ~/.aztec/keystore)').option('--file <name>', 'Override output file name. (default: key<N>.json)').option('--count <N>', 'Number of validators to add. (default: 1)', parseOptionalInteger).option('--publisher-count <N>', 'Number of publisher accounts per validator (default 0)', (value)=>parseOptionalInteger(value, 0)).option('--publishers <privateKeys>', 'Comma-separated list of publisher private keys for all validators.', (value)=>value.split(',').map((key)=>key.trim())).option('--mnemonic <mnemonic>', 'Mnemonic for ETH/BLS derivation').option('--passphrase <str>', 'Optional passphrase for mnemonic').option('--account-index <N>', 'Base account index for ETH/BLS derivation', parseOptionalInteger).option('--address-index <N>', 'Base address index for ETH/BLS derivation', parseOptionalInteger).option('--coinbase <address>', 'Coinbase ETH address to use when proposing. Defaults to attester address.', parseEthereumAddress)// TODO: add funding account back in when implemented
15
+ // .option('--funding-account <privateKey|address>', 'ETH private key (or address for remote signer setup) to fund publishers')
16
+ .option('--remote-signer <url>', 'Default remote signer URL for accounts in this file').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', `EIP-2334 path (default ${defaultBlsPath})`).option('--empty', 'Generate an empty skeleton without keys').option('--password <str>', 'Password for writing keystore files (ETH JSON V3 and BLS EIP-2335). Empty string allowed').option('--encrypted-keystore-dir <dir>', 'Output directory for encrypted keystore file(s)').option('--json', 'Echo resulting JSON to stdout').requiredOption('--fee-recipient <address>', 'Aztec address that will receive fees', parseAztecAddress).action(async (existing, options)=>{
11
17
  const { addValidatorKeys } = await import('./add.js');
12
18
  await addValidatorKeys(existing, options, log);
13
19
  });
20
+ group.command('staker').summary('Generate staking JSON from keystore').description('Reads a validator keystore and outputs staking data with BLS public keys for each attester (skips mnemonics)').requiredOption('--from <keystore>', 'Path to keystore JSON file').option('--password <password>', 'Password for decrypting encrypted keystores (if not specified in keystore file)').requiredOption('--gse-address <address>', 'GSE contract address', parseEthereumAddress).option('--l1-rpc-urls <urls>', 'L1 RPC URLs (comma-separated)', (value)=>value.split(','), [
21
+ 'http://localhost:8545'
22
+ ]).option('-c, --l1-chain-id <number>', 'L1 chain ID', (value)=>parseInt(value), 31337).option('--output <file>', 'Output file path (if not specified, JSON is written to stdout)').action(async (options)=>{
23
+ const { generateStakerJson } = await import('./staker.js');
24
+ await generateStakerJson(options, log);
25
+ });
14
26
  // top-level convenience: aztec generate-bls-keypair
15
- program.command('generate-bls-keypair').description('Generate a BLS keypair with convenience flags').option('--mnemonic <mnemonic>', 'Mnemonic for BLS derivation').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', 'EIP-2334 path (default m/12381/3600/0/0/0)').option('--g2', 'Derive on G2 subgroup').option('--compressed', 'Output compressed public key').option('--json', 'Print JSON output to stdout').option('--out <file>', 'Write output to file').action(async (options)=>{
27
+ program.command('generate-bls-keypair').description('Generate a BLS keypair with convenience flags').option('--mnemonic <mnemonic>', 'Mnemonic for BLS derivation').option('--ikm <hex>', 'Initial keying material for BLS (alternative to mnemonic)', (value)=>parseHex(value, 32)).option('--bls-path <path>', `EIP-2334 path (default ${defaultBlsPath})`).option('--g2', 'Derive on G2 subgroup').option('--compressed', 'Output compressed public key').option('--json', 'Print JSON output to stdout').option('--out <file>', 'Write output to file').action(async (options)=>{
16
28
  const { generateBlsKeypair } = await import('./generate_bls_keypair.js');
17
29
  await generateBlsKeypair(options, log);
18
30
  });
@@ -6,6 +6,7 @@ export type NewValidatorKeystoreOptions = {
6
6
  file?: string;
7
7
  count?: number;
8
8
  publisherCount?: number;
9
+ publishers?: string[];
9
10
  mnemonic?: string;
10
11
  passphrase?: string;
11
12
  accountIndex?: number;
@@ -13,14 +14,16 @@ export type NewValidatorKeystoreOptions = {
13
14
  separatePublisher?: boolean;
14
15
  ikm?: string;
15
16
  blsPath?: string;
16
- blsOnly?: boolean;
17
17
  password?: string;
18
- outDir?: string;
18
+ encryptedKeystoreDir?: string;
19
19
  json?: boolean;
20
20
  feeRecipient: AztecAddress;
21
21
  coinbase?: EthAddress;
22
22
  remoteSigner?: string;
23
- fundingAccount?: EthAddress;
23
+ stakerOutput?: boolean;
24
+ gseAddress?: EthAddress;
25
+ l1RpcUrls?: string[];
26
+ l1ChainId?: number;
24
27
  };
25
28
  export declare function newValidatorKeystore(options: NewValidatorKeystoreOptions, log: LogFn): Promise<void>;
26
- //# sourceMappingURL=new.d.ts.map
29
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibmV3LmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY21kcy92YWxpZGF0b3Jfa2V5cy9uZXcudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBRUEsT0FBTyxLQUFLLEVBQUUsVUFBVSxFQUFFLE1BQU0sK0JBQStCLENBQUM7QUFDaEUsT0FBTyxLQUFLLEVBQUUsS0FBSyxFQUFFLE1BQU0sdUJBQXVCLENBQUM7QUFDbkQsT0FBTyxLQUFLLEVBQUUsWUFBWSxFQUFFLE1BQU0sNkJBQTZCLENBQUM7QUF5QmhFLE1BQU0sTUFBTSwyQkFBMkIsR0FBRztJQUN4QyxPQUFPLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDakIsSUFBSSxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2QsS0FBSyxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2YsY0FBYyxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ3hCLFVBQVUsQ0FBQyxFQUFFLE1BQU0sRUFBRSxDQUFDO0lBQ3RCLFFBQVEsQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUNsQixVQUFVLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDcEIsWUFBWSxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ3RCLFlBQVksQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUN0QixpQkFBaUIsQ0FBQyxFQUFFLE9BQU8sQ0FBQztJQUM1QixHQUFHLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDYixPQUFPLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDakIsUUFBUSxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2xCLG9CQUFvQixDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQzlCLElBQUksQ0FBQyxFQUFFLE9BQU8sQ0FBQztJQUNmLFlBQVksRUFBRSxZQUFZLENBQUM7SUFDM0IsUUFBUSxDQUFDLEVBQUUsVUFBVSxDQUFDO0lBQ3RCLFlBQVksQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUN0QixZQUFZLENBQUMsRUFBRSxPQUFPLENBQUM7SUFDdkIsVUFBVSxDQUFDLEVBQUUsVUFBVSxDQUFDO0lBQ3hCLFNBQVMsQ0FBQyxFQUFFLE1BQU0sRUFBRSxDQUFDO0lBQ3JCLFNBQVMsQ0FBQyxFQUFFLE1BQU0sQ0FBQztDQUNwQixDQUFDO0FBRUYsd0JBQXNCLG9CQUFvQixDQUFDLE9BQU8sRUFBRSwyQkFBMkIsRUFBRSxHQUFHLEVBQUUsS0FBSyxpQkF1SjFGIn0=
@@ -1 +1 @@
1
- {"version":3,"file":"new.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/new.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAgBhE,MAAM,MAAM,2BAA2B,GAAG;IACxC,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,iBAAiB,CAAC,EAAE,OAAO,CAAC;IAC5B,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,YAAY,EAAE,YAAY,CAAC;IAC3B,QAAQ,CAAC,EAAE,UAAU,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,cAAc,CAAC,EAAE,UAAU,CAAC;CAC7B,CAAC;AAEF,wBAAsB,oBAAoB,CAAC,OAAO,EAAE,2BAA2B,EAAE,GAAG,EAAE,KAAK,iBA+E1F"}
1
+ {"version":3,"file":"new.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/new.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAyBhE,MAAM,MAAM,2BAA2B,GAAG;IACxC,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IACtB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,iBAAiB,CAAC,EAAE,OAAO,CAAC;IAC5B,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAC9B,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,YAAY,EAAE,YAAY,CAAC;IAC3B,QAAQ,CAAC,EAAE,UAAU,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,UAAU,CAAC,EAAE,UAAU,CAAC;IACxB,SAAS,CAAC,EAAE,MAAM,EAAE,CAAC;IACrB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,wBAAsB,oBAAoB,CAAC,OAAO,EAAE,2BAA2B,EAAE,GAAG,EAAE,KAAK,iBAuJ1F"}
@@ -1,38 +1,56 @@
1
+ import { prettyPrintJSON } from '@aztec/cli/utils';
2
+ import { GSEContract, createEthereumChain } from '@aztec/ethereum';
1
3
  import { wordlist } from '@scure/bip39/wordlists/english.js';
2
- import { dirname } from 'path';
4
+ import { writeFile } from 'fs/promises';
5
+ import { basename, dirname, join } from 'path';
6
+ import { createPublicClient, fallback, http } from 'viem';
3
7
  import { generateMnemonic, mnemonicToAccount } from 'viem/accounts';
4
8
  import { buildValidatorEntries, logValidatorSummaries, maybePrintJson, resolveKeystoreOutputPath, writeBlsBn254ToFile, writeEthJsonV3ToFile, writeKeystoreFile } from './shared.js';
9
+ import { processAttesterAccounts } from './staker.js';
10
+ import { validateBlsPathOptions, validatePublisherOptions, validateRemoteSignerOptions, validateStakerOutputOptions } from './utils.js';
5
11
  export async function newValidatorKeystore(options, log) {
6
- const { dataDir, file, count, publisherCount = 0, json, coinbase, accountIndex = 0, addressIndex = 0, feeRecipient, remoteSigner, fundingAccount, blsOnly, blsPath, ikm, mnemonic: _mnemonic, password, outDir } = options;
7
- if (remoteSigner && !_mnemonic) {
8
- throw new Error('Using --remote-signer requires a deterministic key source. Provide --mnemonic to derive keys, or omit --remote-signer to write new private keys to keystore.');
9
- }
12
+ // validate bls-path inputs before proceeding with key generation
13
+ validateBlsPathOptions(options);
14
+ // validate staker output options before proceeding with key generation
15
+ validateStakerOutputOptions(options);
16
+ // validate publisher options
17
+ validatePublisherOptions(options);
18
+ // validate remote signer options
19
+ validateRemoteSignerOptions(options);
20
+ const { dataDir, file, count, publisherCount = 0, publishers, json, coinbase, accountIndex = 0, addressIndex = 0, feeRecipient, remoteSigner, blsPath, ikm, mnemonic: _mnemonic, password, encryptedKeystoreDir, stakerOutput, gseAddress, l1RpcUrls, l1ChainId } = options;
10
21
  const mnemonic = _mnemonic ?? generateMnemonic(wordlist);
22
+ if (!_mnemonic && !json) {
23
+ log('No mnemonic provided, generating new one...');
24
+ log(`Using new mnemonic:`);
25
+ log('');
26
+ log(mnemonic);
27
+ log('');
28
+ }
11
29
  const validatorCount = typeof count === 'number' && Number.isFinite(count) && count > 0 ? Math.floor(count) : 1;
12
30
  const { outputPath } = await resolveKeystoreOutputPath(dataDir, file);
31
+ const keystoreOutDir = dirname(outputPath);
13
32
  const { validators, summaries } = await buildValidatorEntries({
14
33
  validatorCount,
15
34
  publisherCount,
35
+ publishers,
16
36
  accountIndex,
17
37
  baseAddressIndex: addressIndex,
18
38
  mnemonic,
19
39
  ikm,
20
40
  blsPath,
21
- blsOnly,
22
41
  feeRecipient,
23
42
  coinbase,
24
- remoteSigner,
25
- fundingAccount
43
+ remoteSigner
26
44
  });
27
45
  // If password provided, write ETH JSON V3 and BLS BN254 keystores and replace plaintext
28
46
  if (password !== undefined) {
29
- const keystoreOutDir = outDir && outDir.length > 0 ? outDir : dirname(outputPath);
47
+ const encryptedKeystoreOutDir = encryptedKeystoreDir && encryptedKeystoreDir.length > 0 ? encryptedKeystoreDir : keystoreOutDir;
30
48
  await writeEthJsonV3ToFile(validators, {
31
- outDir: keystoreOutDir,
49
+ outDir: encryptedKeystoreOutDir,
32
50
  password
33
51
  });
34
52
  await writeBlsBn254ToFile(validators, {
35
- outDir: keystoreOutDir,
53
+ outDir: encryptedKeystoreOutDir,
36
54
  password
37
55
  });
38
56
  }
@@ -41,13 +59,61 @@ export async function newValidatorKeystore(options, log) {
41
59
  validators
42
60
  };
43
61
  await writeKeystoreFile(outputPath, keystore);
44
- maybePrintJson(log, json, keystore);
45
- if (!json) {
62
+ // Generate staker outputs if requested
63
+ const allStakerOutputs = [];
64
+ if (stakerOutput && gseAddress && l1RpcUrls && l1ChainId !== undefined) {
65
+ const chain = createEthereumChain(l1RpcUrls, l1ChainId);
66
+ const publicClient = createPublicClient({
67
+ chain: chain.chainInfo,
68
+ transport: fallback(l1RpcUrls.map((url)=>http(url)))
69
+ });
70
+ const gse = new GSEContract(publicClient, gseAddress);
71
+ // Extract keystore base name without extension for unique staker output filenames
72
+ const keystoreBaseName = basename(outputPath, '.json');
73
+ // Process each validator
74
+ for(let i = 0; i < validators.length; i++){
75
+ const validator = validators[i];
76
+ const outputs = await processAttesterAccounts(validator.attester, gse, password);
77
+ // Collect all staker outputs
78
+ for(let j = 0; j < outputs.length; j++){
79
+ allStakerOutputs.push(outputs[j]);
80
+ }
81
+ }
82
+ // Write a single JSON file with all staker outputs
83
+ if (allStakerOutputs.length > 0) {
84
+ const stakerOutputPath = join(keystoreOutDir, `${keystoreBaseName}_staker_output.json`);
85
+ await writeFile(stakerOutputPath, prettyPrintJSON(allStakerOutputs), 'utf-8');
86
+ }
87
+ }
88
+ const outputData = !_mnemonic ? {
89
+ ...keystore,
90
+ generatedMnemonic: mnemonic
91
+ } : keystore;
92
+ // Handle JSON output
93
+ if (json) {
94
+ if (stakerOutput && allStakerOutputs.length > 0) {
95
+ const combinedOutput = {
96
+ keystore: outputData,
97
+ staker: allStakerOutputs
98
+ };
99
+ maybePrintJson(log, json, combinedOutput);
100
+ } else {
101
+ maybePrintJson(log, json, outputData);
102
+ }
103
+ } else {
46
104
  log(`Wrote validator keystore to ${outputPath}`);
105
+ if (stakerOutput && allStakerOutputs.length > 0) {
106
+ const keystoreBaseName = basename(outputPath, '.json');
107
+ const stakerOutputPath = join(keystoreOutDir, `${keystoreBaseName}_staker_output.json`);
108
+ log(`Wrote staker output for ${allStakerOutputs.length} validator(s) to ${stakerOutputPath}`);
109
+ log('');
110
+ }
47
111
  }
48
- // Always print a concise summary of public keys (addresses and BLS pubkeys)
49
- logValidatorSummaries(log, summaries);
50
- if (!blsOnly && mnemonic && remoteSigner) {
112
+ // print a concise summary of public keys (addresses and BLS pubkeys) if no --json options was selected
113
+ if (!json) {
114
+ logValidatorSummaries(log, summaries);
115
+ }
116
+ if (mnemonic && remoteSigner && !json) {
51
117
  for(let i = 0; i < validatorCount; i++){
52
118
  const addrIdx = addressIndex + i;
53
119
  const acct = mnemonicToAccount(mnemonic, {
@@ -57,4 +123,9 @@ export async function newValidatorKeystore(options, log) {
57
123
  log(`attester address: ${acct.address} remoteSignerUrl: ${remoteSigner}`);
58
124
  }
59
125
  }
126
+ // Log staker outputs if not in JSON mode
127
+ if (!json && stakerOutput && allStakerOutputs.length > 0) {
128
+ log('\nStaker outputs:');
129
+ log(prettyPrintJSON(allStakerOutputs));
130
+ }
60
131
  }
@@ -10,18 +10,17 @@ export type ValidatorSummary = {
10
10
  export type BuildValidatorsInput = {
11
11
  validatorCount: number;
12
12
  publisherCount?: number;
13
+ publishers?: string[];
13
14
  accountIndex: number;
14
15
  baseAddressIndex: number;
15
16
  mnemonic: string;
16
17
  ikm?: string;
17
18
  blsPath?: string;
18
- blsOnly?: boolean;
19
19
  feeRecipient: AztecAddress;
20
20
  coinbase?: EthAddress;
21
21
  remoteSigner?: string;
22
- fundingAccount?: EthAddress;
23
22
  };
24
- export declare function withValidatorIndex(path: string, index: number): string;
23
+ export declare function withValidatorIndex(path: string, accountIndex?: number, addressIndex?: number): string;
25
24
  /**
26
25
  * Compute a compressed BN254 G1 public key from a private key.
27
26
  * @param privateKeyHex - Private key as 0x-prefixed hex string
@@ -57,6 +56,7 @@ export declare function writeBn254BlsKeystore(outDir: string, fileNameBase: stri
57
56
  export declare function writeBlsBn254ToFile(validators: ValidatorKeyStore[], options: {
58
57
  outDir: string;
59
58
  password: string;
59
+ blsPath?: string;
60
60
  }): Promise<void>;
61
61
  /** Writes an Ethereum JSON V3 keystore using ethers, returns absolute path */
62
62
  export declare function writeEthJsonV3Keystore(outDir: string, fileNameBase: string, password: string, privateKeyHex: string): Promise<string>;
@@ -65,4 +65,4 @@ export declare function writeEthJsonV3ToFile(validators: ValidatorKeyStore[], op
65
65
  outDir: string;
66
66
  password: string;
67
67
  }): Promise<void>;
68
- //# sourceMappingURL=shared.d.ts.map
68
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1 +1 @@
1
- {"version":3,"file":"shared.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/shared.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,UAAU,EAAE,aAAa,EAAE,iBAAiB,EAAE,MAAM,4BAA4B,CAAC;AAC/F,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAShE,MAAM,MAAM,gBAAgB,GAAG;IAAE,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,YAAY,CAAC,EAAE,MAAM,EAAE,CAAA;CAAE,CAAC;AAEvG,MAAM,MAAM,oBAAoB,GAAG;IACjC,cAAc,EAAE,MAAM,CAAC;IACvB,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,YAAY,EAAE,MAAM,CAAC;IACrB,gBAAgB,EAAE,MAAM,CAAC;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,YAAY,EAAE,YAAY,CAAC;IAC3B,QAAQ,CAAC,EAAE,UAAU,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,cAAc,CAAC,EAAE,UAAU,CAAC;CAC7B,CAAC;AAEF,wBAAgB,kBAAkB,CAAC,IAAI,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,UAO7D;AAED;;;;GAIG;AACH,wBAAsB,6BAA6B,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAE1F;AAED,wBAAgB,iBAAiB,CAC/B,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,YAAY,EAAE,MAAM,EACpB,YAAY,CAAC,EAAE,MAAM,GACpB,UAAU,GAAG,aAAa,CAK5B;AAED,wBAAsB,qBAAqB,CAAC,KAAK,EAAE,oBAAoB;;;GA6EtE;AAED,wBAAsB,yBAAyB,CAAC,OAAO,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,MAAM;;;GAoB9E;AAED,wBAAsB,iBAAiB,CAAC,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,OAAO,iBAGtE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,QAsB9E;AAED,wBAAgB,cAAc,CAAC,GAAG,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,GAAG,SAAS,EAAE,GAAG,EAAE,OAAO,QAIrF;AAED;;;;;;;;;;;GAWG;AACH,wBAAsB,qBAAqB,CACzC,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,EACrB,SAAS,EAAE,MAAM,EACjB,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC,CASjB;AAED,yGAAyG;AACzG,wBAAsB,mBAAmB,CACvC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAA;CAAE,GAC5C,OAAO,CAAC,IAAI,CAAC,CAuBf;AAED,8EAA8E;AAC9E,wBAAsB,sBAAsB,CAC1C,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,CAQjB;AAED,kGAAkG;AAClG,wBAAsB,oBAAoB,CACxC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAA;CAAE,GAC5C,OAAO,CAAC,IAAI,CAAC,CA2Cf"}
1
+ {"version":3,"file":"shared.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/shared.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,UAAU,EAAE,aAAa,EAAE,iBAAiB,EAAE,MAAM,4BAA4B,CAAC;AAC/F,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAWhE,MAAM,MAAM,gBAAgB,GAAG;IAAE,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,YAAY,CAAC,EAAE,MAAM,EAAE,CAAA;CAAE,CAAC;AAEvG,MAAM,MAAM,oBAAoB,GAAG;IACjC,cAAc,EAAE,MAAM,CAAC;IACvB,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IACtB,YAAY,EAAE,MAAM,CAAC;IACrB,gBAAgB,EAAE,MAAM,CAAC;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,YAAY,EAAE,YAAY,CAAC;IAC3B,QAAQ,CAAC,EAAE,UAAU,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB,CAAC;AAEF,wBAAgB,kBAAkB,CAAC,IAAI,EAAE,MAAM,EAAE,YAAY,GAAE,MAAU,EAAE,YAAY,GAAE,MAAU,UAqBlG;AAED;;;;GAIG;AACH,wBAAsB,6BAA6B,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAE1F;AAED,wBAAgB,iBAAiB,CAC/B,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,YAAY,EAAE,MAAM,EACpB,YAAY,CAAC,EAAE,MAAM,GACpB,UAAU,GAAG,aAAa,CAK5B;AAED,wBAAsB,qBAAqB,CAAC,KAAK,EAAE,oBAAoB;;;GAuEtE;AAED,wBAAsB,yBAAyB,CAAC,OAAO,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,MAAM;;;GAoB9E;AAED,wBAAsB,iBAAiB,CAAC,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,OAAO,iBAGtE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,QAsB9E;AAED,wBAAgB,cAAc,CAAC,GAAG,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,GAAG,SAAS,EAAE,GAAG,EAAE,OAAO,QAIrF;AAED;;;;;;;;;;;GAWG;AACH,wBAAsB,qBAAqB,CACzC,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,EACrB,SAAS,EAAE,MAAM,EACjB,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC,CASjB;AAED,yGAAyG;AACzG,wBAAsB,mBAAmB,CACvC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAC;IAAC,OAAO,CAAC,EAAE,MAAM,CAAA;CAAE,GAC9D,OAAO,CAAC,IAAI,CAAC,CAuBf;AAED,8EAA8E;AAC9E,wBAAsB,sBAAsB,CAC1C,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,CAQjB;AAED,kGAAkG;AAClG,wBAAsB,oBAAoB,CACxC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAA;CAAE,GAC5C,OAAO,CAAC,IAAI,CAAC,CAsCf"}
@@ -7,10 +7,27 @@ import { access, writeFile } from 'fs/promises';
7
7
  import { homedir } from 'os';
8
8
  import { dirname, isAbsolute, join } from 'path';
9
9
  import { mnemonicToAccount } from 'viem/accounts';
10
- export function withValidatorIndex(path, index) {
10
+ import { defaultBlsPath } from './utils.js';
11
+ export function withValidatorIndex(path, accountIndex = 0, addressIndex = 0) {
12
+ // NOTE: The legacy BLS CLI is to allow users who generated keys in 2.1.4 to be able to use the same command
13
+ // to re-generate their keys. In 2.1.5 we switched how we append addresses to the path so this is to maintain backwards compatibility.
14
+ const useLegacyBlsCli = [
15
+ 'true',
16
+ '1',
17
+ 'yes',
18
+ 'y'
19
+ ].includes(process.env.LEGACY_BLS_CLI ?? '');
20
+ const defaultBlsPathParts = defaultBlsPath.split('/');
11
21
  const parts = path.split('/');
12
- if (parts.length >= 4 && parts[0] === 'm' && parts[1] === '12381' && parts[2] === '3600') {
13
- parts[3] = String(index);
22
+ if (parts.length == defaultBlsPathParts.length && parts.every((part, index)=>part === defaultBlsPathParts[index])) {
23
+ if (useLegacyBlsCli) {
24
+ // In 2.1.4, we were using address-index in parts[3] and did NOT use account-index, check lines 32 & 84
25
+ // https://github.com/AztecProtocol/aztec-packages/blob/v2.1.4/yarn-project/cli/src/cmds/validator_keys/shared.ts
26
+ parts[3] = String(addressIndex);
27
+ } else {
28
+ parts[3] = String(accountIndex);
29
+ parts[5] = String(addressIndex);
30
+ }
14
31
  return parts.join('/');
15
32
  }
16
33
  return path;
@@ -33,29 +50,16 @@ export function deriveEthAttester(mnemonic, baseAccountIndex, addressIndex, remo
33
50
  } : '0x' + Buffer.from(acct.getHdKey().privateKey).toString('hex');
34
51
  }
35
52
  export async function buildValidatorEntries(input) {
36
- const { validatorCount, publisherCount = 0, accountIndex, baseAddressIndex, mnemonic, ikm, blsPath, blsOnly, feeRecipient, coinbase, remoteSigner, fundingAccount } = input;
37
- const defaultBlsPath = 'm/12381/3600/0/0/0';
53
+ const { validatorCount, publisherCount = 0, publishers, accountIndex, baseAddressIndex, mnemonic, ikm, blsPath, feeRecipient, coinbase, remoteSigner } = input;
38
54
  const summaries = [];
39
55
  const validators = await Promise.all(Array.from({
40
56
  length: validatorCount
41
57
  }, async (_unused, i)=>{
42
58
  const addressIndex = baseAddressIndex + i;
43
59
  const basePath = blsPath ?? defaultBlsPath;
44
- const perValidatorPath = withValidatorIndex(basePath, addressIndex);
45
- const blsPrivKey = blsOnly || ikm || mnemonic ? deriveBlsPrivateKey(mnemonic, ikm, perValidatorPath) : undefined;
60
+ const perValidatorPath = withValidatorIndex(basePath, accountIndex, addressIndex);
61
+ const blsPrivKey = ikm || mnemonic ? deriveBlsPrivateKey(mnemonic, ikm, perValidatorPath) : undefined;
46
62
  const blsPubCompressed = blsPrivKey ? await computeBlsPublicKeyCompressed(blsPrivKey) : undefined;
47
- if (blsOnly) {
48
- const attester = {
49
- bls: blsPrivKey
50
- };
51
- summaries.push({
52
- attesterBls: blsPubCompressed
53
- });
54
- return {
55
- attester,
56
- feeRecipient
57
- };
58
- }
59
63
  const ethAttester = deriveEthAttester(mnemonic, accountIndex, addressIndex, remoteSigner);
60
64
  const attester = blsPrivKey ? {
61
65
  eth: ethAttester,
@@ -63,7 +67,10 @@ export async function buildValidatorEntries(input) {
63
67
  } : ethAttester;
64
68
  let publisherField;
65
69
  const publisherAddresses = [];
66
- if (publisherCount > 0) {
70
+ if (publishers && publishers.length > 0) {
71
+ publisherAddresses.push(...publishers);
72
+ publisherField = publishers.length === 1 ? publishers[0] : publishers;
73
+ } else if (publisherCount > 0) {
67
74
  const publishersBaseIndex = baseAddressIndex + validatorCount + i * publisherCount;
68
75
  const publisherAccounts = Array.from({
69
76
  length: publisherCount
@@ -97,8 +104,7 @@ export async function buildValidatorEntries(input) {
97
104
  publisher: publisherField
98
105
  } : {},
99
106
  feeRecipient,
100
- coinbase,
101
- fundingAccount
107
+ coinbase: coinbase ?? attesterEthAddress
102
108
  };
103
109
  }));
104
110
  return {
@@ -202,7 +208,7 @@ export function maybePrintJson(log, jsonFlag, obj) {
202
208
  continue;
203
209
  }
204
210
  const pub = await computeBlsPublicKeyCompressed(blsKey);
205
- const path = 'm/12381/3600/0/0/0';
211
+ const path = options.blsPath ?? defaultBlsPath;
206
212
  const fileBase = `${String(i + 1)}_${pub.slice(2, 18)}`;
207
213
  const keystorePath = await writeBn254BlsKeystore(options.outDir, fileBase, options.password, blsKey, pub, path);
208
214
  if (typeof att === 'object') {
@@ -263,9 +269,5 @@ export function maybePrintJson(log, jsonFlag, obj) {
263
269
  v.publisher = await maybeEncryptEth(pub, `publisher_${i + 1}`);
264
270
  }
265
271
  }
266
- // Optional fundingAccount within validator
267
- if ('fundingAccount' in v) {
268
- v.fundingAccount = await maybeEncryptEth(v.fundingAccount, `funding_${i + 1}`);
269
- }
270
272
  }
271
273
  }
@@ -0,0 +1,38 @@
1
+ import { GSEContract } from '@aztec/ethereum';
2
+ import type { EthAddress } from '@aztec/foundation/eth-address';
3
+ import type { LogFn } from '@aztec/foundation/log';
4
+ import type { AttesterAccounts } from '@aztec/node-keystore/types';
5
+ export type StakerOptions = {
6
+ from: string;
7
+ password?: string;
8
+ output?: string;
9
+ gseAddress: EthAddress;
10
+ l1RpcUrls: string[];
11
+ l1ChainId: number;
12
+ };
13
+ export type StakerOutput = {
14
+ attester: string;
15
+ publicKeyG1: {
16
+ x: string;
17
+ y: string;
18
+ };
19
+ publicKeyG2: {
20
+ x0: string;
21
+ x1: string;
22
+ y0: string;
23
+ y1: string;
24
+ };
25
+ proofOfPossession: {
26
+ x: string;
27
+ y: string;
28
+ };
29
+ };
30
+ /**
31
+ * Process AttesterAccounts (which can be a single attester, array, or mnemonic)
32
+ */
33
+ export declare function processAttesterAccounts(attesterAccounts: AttesterAccounts, gse: GSEContract, password?: string): Promise<StakerOutput[]>;
34
+ /**
35
+ * Main staker command function
36
+ */
37
+ export declare function generateStakerJson(options: StakerOptions, log: LogFn): Promise<void>;
38
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1 @@
1
+ {"version":3,"file":"staker.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/staker.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAuB,MAAM,iBAAiB,CAAC;AAGnE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAEhE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,KAAK,EAEV,gBAAgB,EAKjB,MAAM,4BAA4B,CAAC;AAQpC,MAAM,MAAM,aAAa,GAAG;IAC1B,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,UAAU,EAAE,UAAU,CAAC;IACvB,SAAS,EAAE,MAAM,EAAE,CAAC;IACpB,SAAS,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF,MAAM,MAAM,YAAY,GAAG;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,WAAW,EAAE;QACX,CAAC,EAAE,MAAM,CAAC;QACV,CAAC,EAAE,MAAM,CAAC;KACX,CAAC;IACF,WAAW,EAAE;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;KACZ,CAAC;IACF,iBAAiB,EAAE;QACjB,CAAC,EAAE,MAAM,CAAC;QACV,CAAC,EAAE,MAAM,CAAC;KACX,CAAC;CACH,CAAC;AA2KF;;GAEG;AACH,wBAAsB,uBAAuB,CAC3C,gBAAgB,EAAE,gBAAgB,EAClC,GAAG,EAAE,WAAW,EAChB,QAAQ,CAAC,EAAE,MAAM,GAChB,OAAO,CAAC,YAAY,EAAE,CAAC,CAqBzB;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,OAAO,EAAE,aAAa,EAAE,GAAG,EAAE,KAAK,GAAG,OAAO,CAAC,IAAI,CAAC,CA+C1F"}